Optimization-Based Automatic Docking and Berthing of ASVs Using Exteroceptive Sensors: Theory and Experiments
نویسندگان
چکیده
منابع مشابه
synthesis of amido alkylnaphthols using nano-magnetic particles and surfactants
we used dbsa and nano-magnetic for the synthesis of amido alkylnaphtols.
15 صفحه اولtask-based instruction, consciousness-raising and iranian efl learners acquisition and use of collocation
the present study sought to examine whether a task-based approach could have an impact on raising awareness of collocations. moreover, it sought to investigate the facilitative role of consciousness-raising tasks of collocations in the communicative instances of use. to this end, 68 intermediate learners of english were selected via a placement test. the participants were taught with classroom ...
15 صفحه اولon the relationship between using discourse markers and the quality of expository and argumentative academic writing of iranian english majors
the aim of the present study was to investigate the frequency and the type of discourse markers used in the argumentative and expository writings of iranian efl learners and the differences between these text features in the two essay genres. the study also aimed at examining the influence of the use of discourse markers on the participants’ writing quality. to this end the discourse markers us...
15 صفحه اولthe analysis of the role of the speech acts theory in translating and dubbing hollywood films
از محوری ترین اثراتی که یک فیلم سینمایی ایجاد می کند دیالوگ هایی است که هنرپیش گان فیلم میگویند. به زعم یک فیلم ساز, یک شیوه متأثر نمودن مخاطب از اثر منظوره نیروی گفتارهای گوینده, مثل نیروی عاطفی, ترس آور, غم انگیز, هیجان انگیز و غیره, است. این مطالعه به بررسی این مسأله مبادرت کرده است که آیا نیروی فراگفتاری هنرپیش گان به مثابه ی اعمال گفتاری در پنج فیلم هالیوودی در نسخه های دوبله شده باز تولید...
15 صفحه اولautomatic verification of authentication protocols using genetic programming
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
15 صفحه اولذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2020
ISSN: 2169-3536
DOI: 10.1109/access.2020.3037171