Ad hoc networks are receiving more and more attentions these years due to their flexibility. This paper introduces the setup of a wireless testbed based on IBM laptops and Cisco wireless cards, discusses the implement...
详细信息
The objective of this paper is to propose an intelligent security management system using simulation based analysis, which is capable to monitor network status, evaluate vulnerabilities, generate defense strategies, a...
详细信息
A Verilog HDL-based fault simulator for testing embedded cores-based synchronous sequential circuits is proposed in the paper to detect single stuck-line faults The simulator emulates a typical BIST (built-in self-tes...
详细信息
Content adaptable applications are often used in ubiquitous computing environment, and it aims to service the adaptable contents to users. In this environment, the services are dynamically selected and provided, the c...
详细信息
A linearized inverse scattering method, so called the Kirchhoff inversion, is formulated in time domain for SH‐waves measured by a contact ultrasonic transducer and tested using experimental data. The data for recons...
A linearized inverse scattering method, so called the Kirchhoff inversion, is formulated in time domain for SH‐waves measured by a contact ultrasonic transducer and tested using experimental data. The data for reconstruction are experimentally obtained by measuring ultrasonic echoes from artificial flaws in steel plate specimens. For an efficient and accurate data collection, a contact SH‐wave linear array transducer is used. The shapes of the artificial flaws are reconstructed by the Kirchhoff inversion and the conventional SAFT (Synthetic Aperture Focusing Technique) using the waves from a single ray path. Comparison of the two methods shows that the Kirchhoff inversion works well for experimental data and outperforms SAFT although only an illuminated portion of the flaw boundaries is reconstructed by either method. In order to gain more information on the flaw boundaries, the Kirchhoff inversion which takes into account multiple ray paths is also tested with the same experimental data. As a result, it is shown that a larger part of the flaw boundaries can be visualized by considering the multiple ray paths.
Based on the triangulation method, the 3D motion of an object can be completely recognized by a stereo camera. However, the question whether or not the 3D motion of an object can be completely recognized by a motionle...
详细信息
Based on the triangulation method, the 3D motion of an object can be completely recognized by a stereo camera. However, the question whether or not the 3D motion of an object can be completely recognized by a motionless / fixed monocular camera is the yet-unanswered question. In this paper we propose a method using a motionless monocular camera of which the focus is changed in cycle to recognize the absolute 3D motion of an object. We name the method motion from focus.
The design and implementation of a control program for biped walking robots using the genetic algorithms (GA) are presented. The most difficult problem with biped walking robots is that they have too many possible gai...
详细信息
ISBN:
(纸本)0780391225
The design and implementation of a control program for biped walking robots using the genetic algorithms (GA) are presented. The most difficult problem with biped walking robots is that they have too many possible gaits. Generally it is impossible to find the optimal gait for a given rout. In order to control biped walking robots, we bave employed GA to determine the gaits of the robots. It is known that keeping the zero moment point (ZMP) in certain area is necessary for stable movement of a biped walking robot Deriving ZMP is not theoretically difficult;it is just a matter of solving kinetic equations. The problem is that, for a certain series of ZMPs, the robot can have too many gaits and too hard to find the optimal one. We are using a control program using GA to produce approximately optimal gaits.
In general, the support vector regression (SVR) is very suitable to approximate a high dimensionality space and ill-posed problem in modeling. That is, the SVR consists of a quadratic programming problem that can be s...
详细信息
This paper is concerned with the definition and computation of channel capacity of continuous time additive Gaussian channels, when the channel is subject to uncertainty, the noise power spectral density is known and ...
详细信息
The fracture property of amorphous metal was studied by a large scale molecular dynamics (MD) simulation. The Finnis-Sinclair potential for α-iron was used as an inter-atomic potential. At first, we made a model amor...
详细信息
ISBN:
(纸本)9781617820632
The fracture property of amorphous metal was studied by a large scale molecular dynamics (MD) simulation. The Finnis-Sinclair potential for α-iron was used as an inter-atomic potential. At first, we made a model amorphous metal by melting-rapid quenching simulation. And then a crystal growth simulation in the amorphous was performed. We used circular model, and the cracktip is assumed to be at the center. In order to analyze the crack growth characteristics in an infinite domain, the linear elastic solution of Mode I crack was used as a boundary condition. The periodic boundary condition was used to the thickness direction. The crack opens in similar fashion and it has smooth surfaces during the amorphous state. As it deformed, some clusters of bcc-crystal nucleate around the cracktip and they grow rapidly. The distribution of deformation zones and deformation mechanism are significantly altered. The grains are not deformed while they are relatively small. The emission of dislocations from the cracktip is observed, after the crystal phase covered the crack-tip surfaces. The grain size appeared small in the vicinity of the crack-tip, and becomes gradually large as it separates form the crack-tip.
暂无评论