Author of the publication

Autonomous location control of a robot manipulator for live maintenance of high-voltage transmission lines.

, , , , , , and . Industrial Robot, 44 (5): 671-686 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Trust with User Preference for Effective Web Service Composition., , , , and . IEEE Trans. Serv. Comput., 10 (4): 574-588 (2017)New Constructions of Binary Sequences with Good Autocorrelation Based on Interleaving Technique., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (12): 2874-2878 (2011)Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks., , , , and . J. Frankl. Inst., 357 (8): 4983-5003 (2020)Fighting strategies in a market with counterfeits., , and . Ann. Oper. Res., 192 (1): 49-66 (2012)Iterative learning control of polyhydroxybutyrate production in a sequencing batch reactor., , and . MMAR, page 459-464. IEEE, (2015)Reliable modeling of chemical duarability of high level waste glass using bootstrap aggregated neural networks., , , and . ICNC, page 178-183. IEEE, (2013)A note on the bivariate distribution representation of two perfectly correlated random variables by Dirac's $δ$-function, and . CoRR, (2012)2-Adic Complexity of Self-Shrinking Sequence., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (11): 2462-2465 (2011)Analysis of Critical Website Characteristics: A Cross-Category Study of Successful Websites., and . J. Comput. Inf. Syst., 46 (2): 14-24 (2005)基于云模型和半监督聚类的入侵检测算法 (Intrusion Detection Algorithm Based on Cluster and Cloud Model)., and . 计算机科学, 42 (2): 147-149 (2015)