Author of the publication

Assessment of visual space recognition in patients with unilateral spatial neglect using head mounted display (HMD) system: Case study with left unilateral spatial neglect.

, , , , and . SII, page 712-716. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Design Methodology for a DPA-Resistant Cryptographic LSI with RSL Techniques., , , and . CHES, volume 5747 of Lecture Notes in Computer Science, page 189-204. Springer, (2009)Application of Image Reconstruction by Means of Chirp z-Transform., , , , and . MVA, page 77-80. (1990)A Design Methodology for a DPA-Resistant Circuit with RSL Techniques., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (12): 2497-2508 (2010)Reconstructing a Deblurred 3D Structure in a Turbid Medium from a Single Blurred 2D Image - For Near-Infrared Transillumination Imaging of a Human Body., , and . Sensors, 22 (15): 5747 (2022)TRC-Unet: Transformer Connections for Near-infrared Blurred Image Segmentation., , and . ICPR, page 4211-4218. IEEE, (2022)Theoretical analysis of body hair movement in ELF electric field exposure in different environmental conditions., , and . EMBC, page 4573-4576. IEEE, (2013)Assessment of visual space recognition in patients with visual field defects using head mounted display (HMD) system: Case study with severe visual field defect., , , , and . EMBC, page 6929-6932. IEEE, (2013)Intrusion Detection Method Using Enhanced Whitelist Based on Cooperation of System Development, System Deployment, and Device Development Domains in CPS., , , , and . NBiS, volume 22 of Lecture Notes on Data Engineering and Communications Technologies, page 430-444. Springer, (2018)Unified Coprocessor Architecture for Secure Key Storage and Challenge-Response Authentication., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (1): 264-274 (2014)Feasibility study for optical BAN., , , , and . ISMICT, page 14-17. IEEE, (2013)