Author of the publication

Assessment of visual space recognition in patients with unilateral spatial neglect using head mounted display (HMD) system: Case study with left unilateral spatial neglect.

, , , , and . SII, page 712-716. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Potential wireless technologies in mobile communications., , , , and . ICC, page 1121-1125. IEEE, (1999)Performance of real-time video transmission using error control over Rayleigh and Rician fading channels., , and . PIMRC, page 1061-1065. IEEE, (1998)Improved Subset Difference Method with Ternary Tree., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (11): 2034-2044 (2010)A New (k, n)-Threshold Secret Sharing Scheme and Its Extension., , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 455-470. Springer, (2008)A New Tree-structure-specified Multisignature Scheme for a Document Circulation System., , , , and . SECRYPT, page 362-369. SciTePress, (2011)Augmented Reality (AR) Application Superimposing the Falling Risks of Older Adults in Residential Settings and Coping Strategies: Building an Image-Based Scene Detection Model., , , , , , and . HCI (49), volume 14055 of Lecture Notes in Computer Science, page 117-124. Springer, (2023)Implementation of remote system using touchless palmprint recognition algorithm., , , , and . MoMM, page 33-41. ACM, (2010)Side-Channel Analysis of the K2 Stream Cipher., , , , and . ACISP, volume 6168 of Lecture Notes in Computer Science, page 53-73. Springer, (2010)Assessment of visual space recognition in patients with unilateral spatial neglect using head mounted display (HMD) system: Case study with left unilateral spatial neglect., , , , and . SII, page 712-716. IEEE, (2013)K2 Stream Cipher., , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 214-226. Springer, (2007)