Author of the publication

Stiffness and elastic Deformation of a 3-leg 5-DOF Parallel manipulator with One Composite leg.

, , , , , , and . I. J. Robotics and Automation, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Degree elevation operator and geometric construction of C-B-spline curves., , and . SCIENCE CHINA Information Sciences, 53 (9): 1753-1764 (2010)Microarray-in-a-tube system in the function of detection human papillomavirus genotypes., , , , , and . BMEI, page 222-226. IEEE, (2014)Optimization for randomly described arrays based on geometry descriptors., and . ICASSP, page 549-553. IEEE, (2015)China's 1 km Merged Gauge, Radar and Satellite Experimental Precipitation Dataset., , , , and . Remote Sensing, 10 (2): 264 (2018)Hybrid Multilevel Sparse Reconstruction for a Whole Domain Bioluminescence Tomography Using Adaptive Finite Element., , , , and . Comp. Math. Methods in Medicine, (2013)A Memristive Diode Bridge-Based Canonical Chua's Circuit., , , , and . Entropy, 16 (12): 6464-6476 (2014)Developing User Personas to Aid in the Design of a User-Centered Natural Product-Drug Interaction Information Resource for Researchers., , , , , , , , , and 3 other author(s). AMIA, AMIA, (2018)Betweenness Centrality Based k-Anonymity for Privacy Preserving in Social Networks., , , and . MoMM, page 3-7. ACM, (2018)Development of Optimization Design Software for Bevel Gear Based on Integer Serial Number Encoding Genetic Algorithm., , , , and . JSW, 6 (5): 915-922 (2011)Native API Based Windows Anomaly Intrusion Detection Method Using SVM., , and . SUTC (1), page 514-519. IEEE Computer Society, (2006)