Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
We present a setup to control a four- nger anthropomorphic robot hand using a dataglove. To be able to accurately use the dataglove we implemented a nonlinear learning calibration...
Max Fischer, P. Patrick van der Smagt, Gerd Hirzin...
Thispaper presents a new hybrid range image segmentation approach. Two separate techniques are applied consecutively. First, iin edge based segmentation technique extracts the edg...
This paper presents the use of angular position control approaches for a flexible robot manipulator with disturbances effect in the dynamic system. Delayed Feedback Signal (DFS) a...
Mohd Ashraf Ahmad, Zaharuddin Mohamed, Haszuraidah...
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...