Citation: | DONG Que, JIANG Zhi-hong, HUANG Qiang. Study on singularity analysis with differential transform method for 3-RRUR parallel robot based on Jacobian matrix[J].JOURNAL OF BEIJING INSTITUTE OF TECHNOLOGY, 2011, 20(3): 372-378. |
[1] |
Scholkopf B, Burges C J C, Smola A J. Advances in kernel methods—support vector learning [M]. Cambridge,MA: MIT Press, 1999.
|
[2] |
Hearst M A, Scholkopf B, Dumais S, et al. Trends and controversies—support vector machines [J]. IEEE Intelligent Systems, 1998,13(4):18-28.
|
[3] |
Eric C. Hacker’s attack analyze and defense[M]. Su Lei, transl. Beijing: Publishing House of Electronics Industry,2002. (in Chinese)
|
[4] |
Burges C J C. Geometry and invariance in kernel based methods //Burges C, Smola A. Advance in Kernel Methods—Support Vector Learning. Cambridge, MA: MIT Press,1999.
|
[5] |
Jia Yubin. A study on micro quartz angular rate sensor . Beijing: Department of Optical Engineering, Beijing Institute of Technology,1999. (in Chinese)
|
[6] |
Chang C C, Lin C J. LIBSVM: library for support vector machines . (2001-06-19) . http://www.csie.ntu.edu.tw/cjlin/libsvml.
|
[7] |
Swanson R S, Musa S. The estimation of obstacle and terrain clobber probabilities, AIAA 75-1118 . Cambridge: University of Cambridge Press, 1975.
|