Search
Search Results
-
Type-1 Fuzzy Logic
This chapter introduces the basic concepts, notation, and basic operations for the type-1 fuzzy sets that will be needed in the following chapters.... -
Human Recognition using Face, Fingerprint and Voice
We describe in this chapter a new approach for human recognition using as information the face, fingerprint, and voice of a person. We have described... -
-
-
-
-
RTLinux-Based Controller for the SuperMARIO Mobile Robot
In the last years a new way to implement Real Time control systems has been opened, in connection with the diffusion of the open-source operating... -
Vision Based Motion Planning of Humanoid Robots
Vision is the most effective sensing form for humans in understanding their environment, recognition of the objects around them and navigating from... -
Evolution of Locomotion Controllers for Legged Robots
The construction of a locomotion controller for legged robots is a difficult and time consuming process. This task can be automated through the use... -
Thresholding Segmentation and Classification in Automated Ultrasonic Testing Image of Electrical Contact
This paper is concerned with the thresholding segmentation of ultrasonic C-scan image for defect with artificial intelligence and support vector... -
6 Conclusion
Controllable underactuated manipulators were successfully developed based on the nonlinear control theoretic approach. The nonholonomic gear is... -
4 Design of the chained form manipulator
Nonholonomic underactuated systems are typically modelled as highly nonlinear ones, which becomes obvious as the dimension of the system increases.... -
Extremal Properties of Random Structures
The extremal characteristics of random structures, including trees, graphs, and networks, are discussed. A statistical physics approach is employed... -
On the Analysis of Backtrack Proceduresfor the Colouring of Random Graphs
Backtrack search algorithms are procedures capable of deciding whether a decision problem has a solution or not through a sequence of trials and... -
Attacks and Cascades in Complex Networks
This paper reviews two problems in the security of complex networks: cascades of overload failures on nodes and range-based attacks on links.... -
Tomography and Stability of Complex Networks
We study the structure of generalized random graphs with a given degree distribution P(k), and review studies on their behavior under both random... -
Topology, Hierarchy, and Correlations in Internet Graphs
We present a statistical analysis of different metrics characterizing the topological properties of Internet maps, collected at two different... -
The Small World Phenomenonin Hybrid Power Law Graphs
The small world phenomenon, that consistently occurs in numerous existing networks, refers to two similar but different properties — small average... -
4. How to Decide and Act? Use Intelligent Systems and Control Techniques
In robot soccer, the game situation in the playground is typically read in terms of the robots’ postures and the ball’s position. Using real-time... -
On The Problem of Simultaneous Localization, Map Building, and Servoing of Autonomous Vehicles
In this chapter, we consider three of the main problems that arise in the navigation of autonomous vehicles in partially or totally unknown...