Zobrazeno 1 - 10
of 77
pro vyhledávání: '"Weimin Ge"'
Publikováno v:
Journal of Robotics, Vol 2018 (2018)
A 2-RPU&2-SPS spatial parallel mechanism (SPM) is researched. Firstly, the number and property of degrees of freedom (DOF) of the SPM are analyzed by screw theory. There are two rotational and two translational movements (2R2T) of the mechanism that
Externí odkaz:
https://doaj.org/article/b4cf7bfb42764b00819301e54d2acd26
Publikováno v:
Advances in Mechanical Engineering, Vol 9 (2017)
A unit module of the mobile modular reconfigurable robot (M 2 rBot) with the 12 connection ways is first introduced. For expressing the spatial connection relations and the traversing paths of the M 2 rBot, a novel method of the automatic generation
Externí odkaz:
https://doaj.org/article/55fd5617fcb14e5f9bb0eb924e911722
Publikováno v:
Applied Sciences, Vol 9, Iss 16, p 3312 (2019)
In order to realize the non-destructive intelligent identification of weld surface defects, an intelligent recognition method based on deep learning is proposed, which is mainly formed by convolutional neural network (CNN) and forest random. First, t
Externí odkaz:
https://doaj.org/article/a89811c11e524ed2984c41d8e9ee32fc
Publikováno v:
International Symposium on Robotics, Artificial Intelligence, and Information Engineering (RAIIE 2022).
Publikováno v:
2022 7th Asia-Pacific Conference on Intelligent Robot Systems (ACIRS).
Publikováno v:
2022 7th Asia-Pacific Conference on Intelligent Robot Systems (ACIRS).
Publikováno v:
Robotica. :1-22
SUMMARY Double inverted pendulum model, stationary or on a cart, is computationally the simplest out of the range of reasonable models used for anthropomorphic robots motion synthesis. However, it is still not sufficient for describing more complex s
Publikováno v:
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE).
Publikováno v:
TASE
The continuous discovery of software vulnerabilities have brought great challenges to the cyber security, which will lead to severe systematical or individual losses after being exploited. But the harshly increasing of software vulnerabilities overwh
Publikováno v:
Expert Systems with Applications. 195:116407