There have been serious concerns recently about the security of microchips from hardware trojan horse insertion during manufacturing. This issue has been raised recently due to ou...
Francis G. Wolff, Christos A. Papachristou, Swarup...
Power consumption is becoming a primary concern as a result of tremendous increasing in computer power usage. Innumerable methods and techniques have been exploited to address thi...
Mobile technologies imply many opportunities for marketing, in particular a direct communication with consumers without time or location barriers. However, some aspects of mobile ...
Parissa Haghirian, Maria Madlberger, Akihiro Inoue
Designing web sites that are responsive to customer needs is a critical prerequisite for the success of online services. Recently, a usability evaluation procedure, based on the M...
Anne P. Massey, Vijay Khatri, Mitzi M. Montoya-Wei...
—In this paper the dynamic analysis of a cable drive parallel manipulator is described in detail. The manipulator architecture is a simplified planer version adopted from the str...
Yousef Babazadeh Bedoustani, Hamid D. Taghirad, Mo...