نتایج جستجو برای: mobile base
تعداد نتایج: 421872 فیلتر نتایج به سال:
Mobile robotic systems, which include a mobile platform with one or more manipulators, mounted at specific locations on the mobile base, are of great interest in a number of applications. In this paper, after thorough kinematic studies on the platform and manipulator motions, a systematic methodology will be presented to obtain the dynamic equations for such systems without violating the base n...
Mobile robotic systems, which include a mobile platform with one or more manipulators, mounted at specific locations on the mobile base, are of great interest in a number of applications. In this paper, after thorough kinematic studies on the platform and manipulator motions, a systematic methodology will be presented to obtain the dynamic equations for such systems without violating the base n...
-WiMAX (Worldwide Interoperability for Microwave Access) is an emerging technology that can provide wireless broadband access at the data rates of 70 Mbps over 50 kilometres to both home and business customers. WiMAX is cost effective and offers higher data rates than other wireless networks. It supports both fixed and mobile applications. WiMAX is easier to deploy as compared to other networks...
This paper presents a computational technique for determining the maximum allowable load of wheeled mobile manipulators for a desired trajectory. Full load motion of mobile manipulators while carrying a load is an important consideration in their application and motion planning. The number of factors limits the maximum allowable loads, which can be achieved by a mobile manipulator during a give...
The evolution of mobile communications, during the last decades, has led to a rapid increase in the number of users that mobile operators have to serve. To cope with this increase, mobile operators increment the number of base stations they are using resulting in an escalation of the corresponding energy footprint. This is why; the reduction of the total energy that is consumed from base statio...
Mobile communication is more vulnerable to security attacks such as interception and unauthorized access than xed network communication. To overcome these problems, many protocols have been proposed to provide a secure channel between a mobile station and a base station. However, the public-key based protocols are not fully utilized due to the poor computing power and the small battery capacity...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید