نتایج جستجو برای: task space control
تعداد نتایج: 2014523 فیلتر نتایج به سال:
One of the biggest problems of SMEs is their tendencies to financial distress because of insufficient finance background. In this study, an early warning system (EWS) model based on data mining for financial risk detection is presented. CHAID algorithm has been used for development of the EWS. Developed EWS can be served like a tailor made financial advisor in decision making process of the fir...
Rich client-side applications written in HTML5 proliferate on diverse platforms, access sensitive data, and need to maintain dataconfinement invariants. Applications currently enforce these invariants using implicit, ad-hoc mechanisms. We propose a new primitive called a data-confined sandbox or DCS. A DCS enables complete mediation of communication channels with a small TCB. Our primitive exte...
Two experiments examined the general claim that animations can help students learn algorithms more effectively. Animations and instructions that explicitly required learners to predict the behavior of an algorithm were used during training. Post-test problems were designed to measure how well learners could predict algorithm behavior in new situations as well as measure learners' conceptual und...
The transmission time of an electromagnetic signal in the vicinity of the earth is calculated to c and contains an orbital Sagnac term. On earth, the synchronisation of TCB can be realised by atomic clocks, but not the one of TCG. The principle of equivalence is discussed.
This paper presents the architecture and algorithms developed for Dom Dinis, a simple compass-guided robot built by the authors. This includes environment exploration, task planning and task execution. Environment exploration, based on repeating a reactive goal search, enables a progressive construction of a grid-based map. Based on the (possibly incomplete) map, the robot is able to plan its t...
The major task in quantum control theory is to find an external field that transforms the system from one state to another or executes a predetermined unitary transformation. We investigate the difficulty of computing the control field as the size of the Hilbert space is increased. In the models studied the controls form a small closed subalgebra of operators. Complete controllability is obtain...
We consider here passive mechanical wrists, capable of imparting a desired dumping matrix to a grasped workpiece. Previous work 112. 131 has shown how to select a dumping matrix such that an assembly operatwn can be modc force-guided Thc passive mechanical wrist is to be progmnvnable it can adopt a widc range of damping matrices by virtue of a number of t u d e dampers which inrcrconneet the jo...
Recent years have witnessed increased adoption of hosted hypervisors in virtualized computer systems. By non-intrusively extending commodity OSs, hosted hypervisors can effectively take advantage of a variety of mature and stable features as well as the existing broad user base of commodity OSs. However, virtualizing a computer system is still a rather complex task. As a result, existing hosted...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید