Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On-line Data-driven Fuzzy Clustering with Applications to Real-time Robotic Tracking., , and . ICRA, page 5039-5044. IEEE, (2004)Control and data transmission for internet robots., , , , and . ICRA, page 1659-1664. IEEE, (2003)Optimal Route Selection and Resource Allocation in Multi-Hop Cognitive Radio Networks., , , , and . GLOBECOM, page 1-6. IEEE, (2009)Power Network Vulnerability Detection Based on Improved Adaboost Algorithm., , , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 641-650. Springer, (2018)A Delay Step Based Geolocation Data Verification Method., , , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 426-438. Springer, (2018)A Distributed Security Feature Selection Algorithm Based on K-means in Power Grid System., , , and . ICCCS (2), volume 11064 of Lecture Notes in Computer Science, page 439-449. Springer, (2018)Active actuation system of wireless capsule endoscope based on magnetic field., , , and . ROBIO, page 99-103. IEEE, (2007)The force model of wireless active actuation for capsule endoscope in the GI tract., , , and . ROBIO, page 93-98. IEEE, (2007)An extensible telemonitoring architecture based on mobile agent method., , , and . ROBIO, page 1537-1542. IEEE, (2009)An active disturbance rejection control technique for the turntable system with motor moment fluctuation., , and . ICCA, page 80-85. IEEE, (2010)