نتایج جستجو برای Compliant Mechanism

تعداد نتایج: 418937  

2007
H. van der Kooij,

This chapter discusses the advantages and feasibility of using compliant actuators in exoskeletons. We designed compliant actuation for use in a gait rehabilitation robot. In such a gait rehabilitation robot large forces are required to support the patient. In case of poststroke patients only the affected leg has to be supported while the movement of the unaffected leg should not be hindered. N...

2010
Bogdan Carbunar, Radu Sion,

We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data retention guarantees. Clients can outsource their database to a server with full confidentiality and data access privacy, and, for data retention, the server ensures client access WORM semantics. In general simple confidentiality a...

Journal: :Softw., Pract. Exper. 2000
Ronald Morrison, Dharini Balasubramaniam, R. Mark Greenwood, Graham N. C. Kirby, Kenneth R. Mayes, David S. Munro, Brian Warboys,

The changing needs of modern application systems demand new and radical software architectures to support them. The attraction of persistent systems is that they define precisely the extent to which they are open, thereby allowing the dynamically changing resource requirements of applications to be tracked accurately within the persistent environment. Thus, an ever-growing body of work is being...

2003
CHRISTOPH M. HOFFMANN, WEIQIANG YANG,

We examine a dual-quaternion formulation for expressing the relative rigid body motion between two objects when incidence constraints are to be observed. The incidences are between points, lines and planes, of the two parts. Both parametric and implicit representations are investigated. Several examples illustrate the techniques .

1997
Wolfgang Emmerich, Anthony Finkelstein, Carlo Montangero, Richard Stevens,

Software engineering standards determine practices that `compliant' software processes shall follow. Standards generally de ne practices in terms of constraints that must hold for documents or the information in these documents. The document types identi ed by standards include not only typical development products, such as user requirements, but also process-oriented documents, such as progres...

2001
Martin de Lasa, Martin Buehler,

This paper presents a new dynamic walking controllers for quadrupedal robots with compliant legs. The algorithm implements a "walking bound" gait, (running bound without ight phase), requires only one actuator per leg at the hip, and commands a constant hip velocity during stance. The algorithm has been implemented successfully on our Scout II quadruped robot and has yielded stable walking for ...

2014
Jon Claerbout, Antoine Guitton,

Ricker compliant deconvolution spikes at the center lobe of the Ricker wavelet. It enables deconvolution to preserve and enhance seismogram polarities. Expressing the phase spectrum as a function of lag, it works by suppressing the phase at small lags. A byproduct of this decon is a pseudo-unitary (very clean) debubble filter where bubbles are lifted off the data while onset waveforms (usually ...

2008
M. Santer,

Compliant multistable structures are presented which exhibit a large geometric change when actuated between their stable states. It is demonstrated how asymmetric-bistability is achieved through the combination of linear and nonlinear springs. Finite element analytical techniques are provided which enable the design of such structures, and which illustrate how the presence of imperfections can ...

2013
Ragib Hasan,

Today’s cloud computing architectures often lack support for computer forensic investigations. Besides this, the existing digital forensics tools cannot cope with the dynamic nature of the cloud. This paper explores the challenges of digital forensics in the cloud, possible attacks on cloud-evidence, and mitigation strategies against those challenges. Digital Forensics in the Cloud To identify ...

2003
Arnas Kupšys, Stefan Pleisch, André Schiper, Matthias Wiesmann,

Group communication provides communication primitives with various semantics and their use greatly simplifies the development of highly available services. However, despite tremendous advances in research and numerous prototypes, group communication stays confined to small niches and academic prototypes. In contrast, message-oriented middleware such as the Java Messaging Service (JMS) is widely...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید