Author of the publication

EMG-Based Control for Three-Dimensional Upper Limb Movement Assistance Using a Cable-Based Upper Limb Rehabilitation Robot.

, , , and . ICIRA (1), volume 10462 of Lecture Notes in Computer Science, page 273-279. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A new method of micro-motion parameters estimation based on cyclic autocorrelation function., , , , , and . Sci. China Inf. Sci., 56 (10): 1-11 (2013)Secure Electronic Ticketing System based on Consortium Blockchain., , , and . KSII Trans. Internet Inf. Syst., 13 (10): 5219-5243 (2019)Unknown network attack detection based on open-set recognition and active learning in drone network., , , and . Trans. Emerg. Telecommun. Technol., (2022)Time-Varying Kelvin Wake Model and Microwave Velocity Observation., , and . Sensors, 20 (6): 1575 (2020)Expectation-Maximization Attention Cross Residual Network for Single Image Super-Resolution., , and . CVPR Workshops, page 888-896. Computer Vision Foundation / IEEE, (2021)EMG-Based Control for Three-Dimensional Upper Limb Movement Assistance Using a Cable-Based Upper Limb Rehabilitation Robot., , , and . ICIRA (1), volume 10462 of Lecture Notes in Computer Science, page 273-279. Springer, (2017)Nonlinear disturbance observer based sliding mode control of a cable-driven rehabilitation robot., , , and . ICORR, page 664-669. IEEE, (2017)A Novel Approach for Objectness Estimation Based on Saliency Segmentation and Superpixels Clustering., , , and . ICGEC, volume 834 of Advances in Intelligent Systems and Computing, page 605-613. Springer, (2018)Secure hierarchical authentication protocol in VANET., , , and . IET Inf. Secur., 14 (1): 99-110 (2020)Blockchain-Based Anti-Key-Leakage Key Aggregation Searchable Encryption for IoT., , , and . IEEE Internet Things J., 7 (2): 1502-1518 (2020)