Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Security problems for a pseudorandom sequence generator based on the Chen chaotic system., and . Comput. Phys. Commun., 184 (9): 2178-2181 (2013)Indoor mobile robot navigation using deep convolutional neural network., and . J. Intell. Fuzzy Syst., 39 (4): 5475-5486 (2020)Image Visual Sensor Used in Health-Care Navigation in Indoor Scenes Using Deep Reinforcement Learning (DRL) and Control Sensor Robot for Patients Data Health Information., and . J. Medical Imaging Health Informatics, 11 (1): 104-113 (2021)Human victim detection with Deformable Part Models., , , and . SIU, page 947-950. IEEE, (2015)Survey on learning-based scene extrapolation in robotics., and . Int. J. Intell. Robotics Appl., 8 (1): 251-268 (March 2024)Impact of artificial dataset enlargement on performance of deformable part models., , , , and . SIU, page 193-196. IEEE, (2016)Routing with Dijkstra in Mobile Ad-Hoc Networks., , , , , and . RoboCup, volume 8371 of Lecture Notes in Computer Science, page 316-325. Springer, (2013)Physiological Data-Based Evaluation of a Social Robot Navigation System., , , , , , and . RO-MAN, page 994-999. IEEE, (2020)Security analysis of an image encryption algorithm based on chaos and DNA encoding., , and . SIU, page 1-4. IEEE, (2013)R-SLAM: Resilient localization and mapping in challenging environments., , , , and . Robotics Auton. Syst., (2017)