Author of the publication

Simultaneous Estimation of Contraction Ratio and Parameter of McKibben Pneumatic Artificial Muscle Model Using Log-Normalized Unscented Kalman Filter.

, , and . CPSNA, page 44-48. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Kogiso, Kiminao
add a person with the name Kogiso, Kiminao
 

Other publications of authors with the same name

Reference Governor for Constrained Systems with Time-varying References., and . MFI, page 359-364. IEEE, (2006)Gray-box identification of McKibben pneumatic artificial muscle using interpolation of load-dependent parameters., , and . AIM, page 1228-1234. IEEE, (2013)Cyber-Secure Teleoperation With Encrypted Four-Channel Bilateral Control., , , , , and . CoRR, (2023)Constrained remote control of construction machine with time-varying delay and packet loss., , , , , and . Adv. Robotics, 37 (1-2): 46-60 (January 2023)Secure Observer-based Motion Control based on Controller Encryption., , , , and . ACC, page 2978-2983. IEEE, (2019)An off-line reference management technique for a class of nonlinear systems., , and . CDC, page 560-565. IEEE, (2007)Dynamic Quantizer for Encrypted Observer-based Control., and . CDC, page 5477-5482. IEEE, (2020)Simultaneous Estimation of Contraction Ratio and Parameter of McKibben Pneumatic Artificial Muscle Model Using Log-Normalized Unscented Kalman Filter., , and . CPSNA, page 44-48. IEEE Computer Society, (2016)Experimental Validation of the Attack-Detection Capability of Encrypted Control Systems Using Man-in-the-Middle Attacks., , and . IEEE Access, (2024)Secure Motion-Copying via Homomorphic Encryption., , and . CoRR, (2023)