es and abstracts of these six papers are listed below: Paper 1: Title: Sensor fault identification based on error-correcting output codes method Authors: Rui Zhou, Jie Chen, Fang D...
— In this work, we report our solutions to the problems given in the 2014 International Micro Aerial Vehicle Competition, held in Delft, the Netherlands, August 2014, which invol...
Jin Q. Cui, Swee King Phang, Kevin Z. Y. Ang, Fei ...
— In industrial robotics applications, teach pendant has been widely used by human operators to pre-define action trajectories for robot manipulators to execute as primitives. T...
Yan Wu, Wei Liang Chan, Yanan Li, Keng Peng Tee, R...
— A modular relative Jacobian is recently derived and is expressed in terms of the individual Jacobians of stand-alone manipulators. It includes a wrench transformation matrix, w...
Rodrigo S. Jamisola, Petar Kormushev, Darwin G. Ca...
— This paper deals control and navigation of the wheelchair for elderly and disabled based on kinematic model iris motion and image processing. Cirrus Power Wheelchair was modell...
Razvan Solea, Adrian Filipescu, Adriana Filipescu,...
— Architecture was perceived for many centuries as the design of static buildings that will last for extended periods of time, with static changes or additions at most. Tradition...
—Autonomous mobility on demand (AMOD) has emerged as a promising solution for urban transportation. Compared to prevailing systems, AMOD promises sustainable, affordable personal...
Katarzyna Anna Marczuk, Harold Soh Soon Hong, Carl...
The IPv6 privacy extension introduces temporary addresses to protect against address-based correlation, i. e., the attribution of different transactions to the same origin using ad...
Abstract. PHP is the most popular scripting language for web applications. Because no native solution to compile or protect PHP scripts exists, PHP applications are usually shipped...
Abstract. Handheld devices today do not continuously verify the identity of the user while sensitive activities are performed. This enables attackers, who can either compromise the...
Rahul Murmuria, Angelos Stavrou, Daniel Barbar&aac...