Author of the publication

TARS Mobile App with Deep Fingertip Detector for the Visually Impaired.

, , , and . IHSI, volume 1131 of Advances in Intelligent Systems and Computing, page 301-306. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Agent-Based Batch Process Control Systems., , , , , and . KES, volume 3214 of Lecture Notes in Computer Science, page 398-404. Springer, (2004)Analogical Reasoning Based on Task Ontologies for On-Line Support., , , , , , , , and . KES (1), volume 3681 of Lecture Notes in Computer Science, page 155-161. Springer, (2005)Plant Model Generation for Countermeasures Planning., , , and . KES (3), volume 5179 of Lecture Notes in Computer Science, page 17-24. Springer, (2008)Integration of Multi-agent Controller and Scheduler for Multi-purpose and Multi-batch Plant., , , , , , , , and . KES (2), volume 4693 of Lecture Notes in Computer Science, page 736-743. Springer, (2007)TARS Mobile App with Deep Fingertip Detector for the Visually Impaired., , , and . IHSI, volume 1131 of Advances in Intelligent Systems and Computing, page 301-306. Springer, (2020)Safety securing approach against cyber-attacks for process control system., , , , , , and . Comput. Chem. Eng., (2013)Detection of Cyber-attacks with Zone Dividing and PCA., , , , , , and . KES, volume 22 of Procedia Computer Science, page 727-736. Elsevier, (2013)Object Detection to Evaluate Image-to-Image Translation on Different Road Conditions., , and . IHSI, volume 1131 of Advances in Intelligent Systems and Computing, page 143-149. Springer, (2020)Dynamic zoning based on situational activitie for ICS security., , , , , , , and . ASCC, page 1-5. IEEE, (2015)Consistency Checking Method of Inventory Control for Countermeasures Planning System., , , and . KES (2), volume 6277 of Lecture Notes in Computer Science, page 417-426. Springer, (2010)