A Numerical Approach to Trajectory Planning for Yoyo Movement

来源 :上海交通大学学报(英文版) | 被引量 : 0次 | 上传用户:lkjh321
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
其他文献
Authentication is the basis of the security of IEEE 802.11i standard. The authentication process in 802.11i involves two important protocols: a 4-way handshake and a group key handshake. A formal analysis of authentication in 802.11i is given via a belief
With life cycle assessment (LCA) methodology, a life cycle model of coal-based vehicle fuels (CBVFs) including coal-based dimethyl ether (CBDME) and coal-based diesel (CBD) is established. Their primary energy consumption (PEC) and global warming potentia
This paper deals with the design and performance analysis of transmit precoder optimization for multiple input multiple output (MIMO) systems with limited feedback of channel state information. A capacity criterion based optimal codebook construction algo
Multivariate hash functions are a type of hash functions whose compression function is explicitly defined as a sequence of multivariate equations. Billet et al designed the hash function MQ-HASH and Ding et al proposed a similar construction. In this pape