Learn More
As the individual PC hacking and game hacking by economical purpose increase rapidly recently, malicious codes attacking Windows system are often represented. Techniques to insert DLL within memory of target process are widely spread in order to acquire concealment channel of malicious code, detour ways of avoiding security systems and get specified(More)
This paper is concerned with an optimal shape control problem for the stationary Navier–Stokes system. A two–dimensional channel flow of an incompressible, viscous fluid is examined to determine the shape of a bump on a part of the boundary that minimizes the viscous drag. By introducing an artificial compressibility term to relax the incompressibility(More)
Soldiers often should carry heavy loads on their back for a long time during military operations. To this end, exoskeleton robots have been developed to enhance mobility and reduce the muscle fatigue caused by heavy loads. This paper presents a locomotion control strategy for a hydraulic lower extremity exoskeleton robot developed for military purposes. The(More)
A novel non-contact electronic joystick using a single hall-sensor is designed, which detects a horizontal vector in the magnetic field. Furthermore, in this paper, the nonlinear character between the output of the hall-sensor and the movement of joystick bar is illustrated. The dynamic horizontal vector of the magnetic flux is detected by the hall-sensor(More)
A non-contact electronic joystick using a single hall-sensor is newly designed, which detects a horizontal vector in the magnetic field. Furthermore, in this paper, the nonlinear character between the output of the hall-sensor and the movement of joystick bar is illustrated. The dynamic horizontal vector of the magnetic flux is detected by the hall-sensor(More)
  • 1