Author of the publication

Real-Time Robust Model Predictive Control of Mobile Robots Based on Recurrent Neural Networks.

, , , and . ICONIP (3), volume 9491 of Lecture Notes in Computer Science, page 289-296. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IEEE Access Special Section: Security Analytics and Intelligence for Cyber Physical Systems., , , , and . IEEE Access, (2020)Security Threats and Countermeasures of Unmanned Aerial Vehicle Communications., , , and . IEEE Commun. Stand. Mag., 5 (4): 41-47 (2021)Influence Spread in Geo-Social Networks: A Multiobjective Optimization Perspective., , , , , and . IEEE Trans. Cybern., 51 (5): 2663-2675 (2021)PerContRep: a practical reputation system for pervasive content services., , and . J. Supercomput., 70 (3): 1051-1074 (2014)LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey., , and . IEEE Access, (2018)Right-and-left visual field stimulation: A frequency and space mixed coding method for SSVEP based brain-computer interface., , and . Sci. China Inf. Sci., 54 (12): 2492-2498 (2011)Nonvolatile Flexible Memory Based on a Planar Zigzag-Type Nitrogen-Doped Picene., , , , , , , , , and . Adv. Intell. Syst., 2 (12): 2000155 (2020)Power Division for Green Cellular Network., , and . IEEE Netw., 37 (2): 174-180 (March 2023)SVsearcher: A more accurate structural variation detection method in long read data., , and . Comput. Biol. Medicine, (May 2023)Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory., , and . Comput. Secur., (2014)