Author of the publication

EMG Control for a Five-fingered Underactuated Prosthetic Hand Based on Wavelet Transform and Sample Entropy.

, , , , , and . IROS, page 3215-3220. IEEE, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sneak-Path Based Test and Diagnosis for 1R RRAM Crossbar Using Voltage Bias Technique., , , , and . DAC, page 38:1-38:6. ACM, (2017)Efficient Conditional Privacy-Preserving Authentication Scheme Using Revocation Messages for VANET., , , , and . ICCCN, page 1-8. IEEE, (2018)Design and development of a 7-DOF humanoid arm., , , and . ROBIO, page 277-282. IEEE, (2012)A power series based inverse-kinematics solution of a humanoid robot hand with coupled joints., , , and . ROBIO, page 1455-1460. IEEE, (2016)The Probability of Dual Hesitant Fuzzy Event and Its Applications to Bayesian Network Inferences., , , and . ICNC-FSKD, volume 1074 of Advances in Intelligent Systems and Computing, page 736-755. Springer, (2019)Methodological Framework for the Transition from Requirements to Software Architectures., , and . ISD, page 139-151. Springer, (2012)Exemplar-based image inpainting using structure consistent patch matching., , , and . Neurocomputing, (2017)A Novel Test Method for Metallic CNTs in CNFET-Based SRAMs., , , , , , and . IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 35 (7): 1192-1205 (2016)A Security Evaluation Method Based on Threat Classification for Web Service., , , and . J. Softw., 6 (4): 595-603 (2011)Commutative encryption and watermarking based on orthogonal decomposition., , and . Multim. Tools Appl., 70 (3): 1617-1635 (2014)