توجه: محتویات این صفحه به صورت خودکار پردازش شده و مقاله‌های نویسندگانی با تشابه اسمی، همگی در بخش یکسان نمایش داده می‌شوند.
۱A Performance Comparison of Different Back Propagation Neural Networks in Inverse Kinematics
نویسنده(ها): ،
اطلاعات انتشار: دوازدهمین کنفرانس سالانه انجمن کامپیوتر ایران، سال
تعداد صفحات: ۶
Error Back Propagation, a class of neural networks, is proposed to solve the inverse kinematics problem in robotic manipulator. In this approach a network has been trained to learn a desired set of joint angles positions from a given set of end effectors positions. This paper demonstrates some methods of Back Propagation neural network which can be used to solve inverse kinematics. Next the performance of these methods has been compared for inverse kinematics problems. The used Error Back Propagation techniques are the Standard, Momentum and Delta Bar– Delta.<\div>

۲fuzzy model and adaptive control in intelligent welding robot
اطلاعات انتشار: دهمین کنفرانس سالانه انجمن کامپیوتر ایران، سال
تعداد صفحات: ۸
Quality of the multi –layer welding depends on the first layer welding . In order to get a high quality of the welding it is necessary to make a stable back bead and melting the base metals in narrow gap welding it is difficult to control the bead height and back bead simultaneously bu using conventional welding to improve this problem the author proposes a cooperative control of the welding equipments including the welding power source the electrode wire feeder and the welding robot i.e. the welding torch is not only oscillating on the groove but also moving back and forth switch back wekding method . in thie forward process the are is given to the root edges to get a wide back bead.<\div>

۳security in semantic web
نویسنده(ها): ،
اطلاعات انتشار: دهمین کنفرانس سالانه انجمن کامپیوتر ایران، سال
تعداد صفحات: ۸
this paper discusses on security issues of semantic web for query –answering dialogs it emphasizes that the current security model of document based web lacks necessary abilities to respond to a web of connected concepts the proposed solution is a two layer approach for including security measures at the top layer queries are filtered out for simple security constrints the second layer lays inside the inference engine which prevents traversing over some concepts and relationships during a query processing.<\div>
نمایش نتایج ۱ تا ۳ از میان ۳ نتیجه