Sciweavers

5234 search results - page 737 / 1047
» Simulation of Computer Network Attacks
Sort
View
ICNS
2007
IEEE
15 years 11 months ago
Combination of Zero-Forcing Nulling and Fuzzy Parallel Multistage Detection for MIMO Systems
We propose zero-forcing (ZF) nulling followed by fuzzy parallel multistage detection for multi-input multi-output system. The parallel detector consists of two or more stages, the...
Tseng Shu-Ming, Yu Hung-Chieh, Huang Yao-Min
ICNSC
2007
IEEE
15 years 11 months ago
Unstable Object Stabilization and Control Using a DD Robot Manipulator
— This paper addresses the issue of robotic manipulation of multi-DOF inverted pendulums. A control scheme is designed using Lyaponov stability theory for both the robot position...
Zhao-Hui Jiang, Kouya Kamise
ICNSC
2007
IEEE
15 years 11 months ago
Dynamic Analysis and Traversability Prediction of Tracked Vehicles on Soft Terrain
– Unmanned ground vehicles are widely used in industries where repetitive tasks or high risk missions are required. Such vehicles usually operate on soft deformable terrains and ...
Said Al-Milli, Kaspar Althoefer, Lakmal D. Senevir...
SASO
2007
IEEE
15 years 11 months ago
Adaptive Self-optimization in Distributed Dynamic Environments
Grid and ubiquitous computing systems generally consist of a large number of networked nodes with applications implemented as distributed services or processes, respectively. A cr...
Wolfgang Trumler, Andreas Pietzowski, Benjamin Sat...
APNOMS
2007
Springer
15 years 11 months ago
Segment Based Caching Replacement Algorithm in Streaming Media Transcoding Proxy
To support various devices for multimedia services, it needs to some adaptation technologies. A transcoding is one of major fields in adaptive multimedia delivery. A transcoding pr...
Yoohyun Park, Yong-Ju Lee, Hag-Young Kim, Kyongsok...