default search action
Can Isik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j12]Pallav Kumar Bera, Can Isik:
A Data Mining Based Protection and Classification of Transients for Two-Core Symmetric Phase Angle Regulators. IEEE Access 9: 72937-72948 (2021) - [j11]Rajesh Kumar, Can Isik, Vir V. Phoha:
Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to Wearable Sensor-based Gait Authentication. DTRAP 2(3): 23:1-23:17 (2021) - [j10]Pallav Kumar Bera, Can Isik, Vajendra Kumar:
Discrimination of Internal Faults and Other Transients in an Interconnected System With Power Transformers and Phase Angle Regulators. IEEE Syst. J. 15(3): 3450-3461 (2021) - 2007
- [j9]Murat Hüsnü Sazli, Can Isik:
Neural network implementation of the BCJR algorithm. Digit. Signal Process. 17(1): 353-359 (2007) - 2005
- [j8]Sanggil Kang, Can Isik:
Partially connected feedforward neural networks structured by input types. IEEE Trans. Neural Networks 16(1): 175-184 (2005) - 1997
- [j7]M. Kemal Ciliz, Can Isik:
On-line learning control of manipulators based on artificial neural network models. Robotica 15(3): 293-304 (1997) - 1993
- [j6]Dan Simon, Can Isik:
Suboptimal Robot Joint Interpolation Within User-Specified Knot Tolerances. J. Field Robotics 10(7): 889-911 (1993) - 1991
- [j5]Dan Simon, Can Isik:
Optimal trigonometric robot joint trajectories. Robotica 9(4): 379-386 (1991) - 1989
- [j4]M. Kemal Ciliz, Can Isik:
Fuzzy rule-based motion controller for an autonomous mobile robot. Robotica 7(1): 37-42 (1989) - 1988
- [j3]Can Isik:
Inference engines for fuzzy rule-based control. Int. J. Approx. Reason. 2(2): 102 (1988) - [j2]Can Isik:
Inference engines for fuzzy rule-based control. Int. J. Approx. Reason. 2(2): 177-187 (1988) - [j1]Can Isik, Alexander M. Meystel:
Pilot level of a hierarchical controller for an unmanned mobile robot. IEEE J. Robotics Autom. 4(3): 241-255 (1988)
Conference and Workshop Papers
- 2023
- [c8]Rajesh Kumar, Can Isik, Chilukuri Krishna Mohan:
Dictionary Attack on IMU-based Gait Authentication. AISec@CCS 2023: 115-126 - 2018
- [c7]Pallav Kumar Bera, Rajesh Kumar, Can Isik:
Identification of internal faults in indirect symmetrical phase shift transformers using ensemble learning. ISSPIT 2018: 1-6 - 2003
- [c6]Can Isik, Sanggil Kang:
Partially Connected Neural Networks for Mapping Problems. ICEIS (2) 2003: 469-473 - 1993
- [c5]Can Isik, A. Mete Çakmakci:
Identification of a nonlinear multivariable dynamic process using feed-forward networks. ICNN 1993: 564-567 - 1992
- [c4]M. Kemal Ciliz, Can Isik:
Stability and convergence of neurologic model based robotic controllers. ICRA 1992: 2051-2056 - 1989
- [c3]Jian Fei, Can Isik:
Adapting to environmental variations in a rule-based mobile robot controller. SMC 1989: 332-333 - 1986
- [c2]Can Isik, Alex Meystel:
Decision making at a level of a hierarchical control for unmanned robot. ICRA 1986: 1772-1778 - 1985
- [c1]E. Koch, C. Yeh, G. Hillel, Alex Meystel, Can Isik:
Simulation of path planning for a system with vision and map updating. ICRA 1985: 146-160
Data and Artifacts
- 2024
- [d3]Pallav Bera, Samita Pani, Can Isik, Ramesh Bansal:
Transients in transmission lines connected to Photovoltaic Farms (Dataset). IEEE DataPort, 2024 - 2022
- [d2]Pallav Kumar Bera, Can Isik:
Data: Transients in Indirect Symmetrical Phase Shift Transformers. IEEE DataPort, 2022 - [d1]Pallav Kumar Bera, Can Isik, Vajendra Kumar:
Transients and Faults in Power Transformers and Phase Angle Regulators (DATASET). IEEE DataPort, 2022
Informal and Other Publications
- 2023
- [i5]Rajesh Kumar, Can Isik, Chilukuri K. Mohan:
Dictionary Attack on IMU-based Gait Authentication. CoRR abs/2309.11766 (2023) - 2020
- [i4]Pallav Kumar Bera, Can Isik, Vajendra Kumar:
Discrimination of Internal Faults and Other Transients in an Interconnected System with Power Transformers and Phase Angle Regulators. CoRR abs/2004.06003 (2020) - [i3]Pallav Kumar Bera, Can Isik:
Intelligent Protection & Classification of Transients in Two-Core Symmetric Phase Angle Regulating Transformers. CoRR abs/2006.09865 (2020) - [i2]Rajesh Kumar, Can Isik, Vir V. Phoha:
Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication. CoRR abs/2012.09950 (2020) - 2018
- [i1]Pallav Kumar Bera, Rajesh Kumar, Can Isik:
Identification of Internal Faults in Indirect Symmetrical Phase Shift Transformers Using Ensemble Learning. CoRR abs/1811.04537 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 23:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint