Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Authentication Method for Privacy Protection in Smart Grid Environment., , and . J. Appl. Math., (2014)Challenges and implemented technologies used in autonomous drone racing., , , , , , , , , and 8 other author(s). Intell. Serv. Robotics, 12 (2): 137-148 (2019)Goal directed motion control of 3D human characters., and . SMC, page 4334-4339. IEEE, (1998)The wearable lullaby: improving sleep quality of caregivers of dementia patients., and . CHI Extended Abstracts, page 409-414. ACM, (2013)Doctoral chairs., and . ISMAR, page 1. IEEE Computer Society, (2013)An Adaptive Intelligent Recommendation Scheme for Smart Learning Contents Management Systems., , and . MUE, volume 240 of Lecture Notes in Electrical Engineering, page 57-66. Springer, (2013)Secure Model against APT in m-Connected SCADA Network., , and . IJDSN, (2014)A fuzzy-PD controller for an autonomous aerial robot., , , and . URAI, page 325-327. IEEE, (2017)A Study of Emoticon Use in Instant Messaging from Smartphone., , and . HCI (3), volume 8512 of Lecture Notes in Computer Science, page 155-165. Springer, (2014)Balancing Fun and Learning through a User Interface: A Case Study of Wii Game., , and . KSII Trans. Internet Inf. Syst., 13 (7): 3638-3653 (2019)