-
341
Finite-Time Antisaturation Tracking Control for Hypersonic Vehicle with Uncertain Dynamics
Published 2020-01-01“…An adaptive neural finite-time backstepping control strategy is constructed by designing modified virtual commands and compensation signals. The minimum learning parameter algorithm based on a radial basis function is employed to approximate the unknown dynamics with low computational burden. …”
Get full text
Article -
342
Robust Distributed Reprogramming Protocol of Wireless Sensor Networks for Healthcare Systems
Published 2015-11-01“…Wireless reprogramming is a process for propagating a new code image or relevant commands to sensor nodes in WSNs. In this paper, we propose a robust distributed reprogramming protocol of WSNs for healthcare systems, in which the security requirements are proved to be secure based on the elliptic curve discrete logarithm problem, such as existential unforgeability of signature for code image, authenticity of code image, freshness, and node compromised tolerance.…”
Get full text
Article -
343
Study on RF module in UHF OFDM node for mobile multimedia sensor network
Published 2008-01-01“…It can be applied to very important person (VIP) motorcade video wireless monitoring system, public security emergency command system, and battlefield surveillance system, etc.…”
Get full text
Article -
344
Initial development of IEEE Very Small Size Soccer robots: Electromechanics, Computer Vision System and Navigation Strategy
Published 2023-12-01“…From these odometry data, the proposed navigation strategy based on vector fields calculates commands to the robots, allowing different robot roles in the soccer match (striker, defender, and goalkeeper). …”
Get full text
Article -
345
DESIGN AND RESEARCH OF INTELLIGENT CONTROL SYSTEM FOR BELT CONVEYOR
Published 2019-01-01“…The intelligent control of belt conveyor is realized by issuing control commands to the system equipment through the interface of the upper computer and displaying the operation status and fault alarm information of each equipment intuitively and dynamically. …”
Get full text
Article -
346
In search of tradition material in Zephaniah 1:7-13
Published 2000-12-01“…The mentioning of a coming theophany, a sacrificial meal and a disregard for the first commandment point in the direction of the Sinai tradition. …”
Get full text
Article -
347
-
348
Sistem Kendali Perangkat Elektronik Jarak Jauh Berbasis Jaringan Nirkabel Menggunakan Secure Shell (SSH) dan robot Operating System (ROS)
Published 2020-12-01“…When android smartphone send ROS message command to the Raspberry Pi to make the GPIO to active high, the system will instruct the relay to turn on the electronic devices. …”
Get full text
Article -
349
-
350
Decreased Breg/Th17 Ratio Improved the Prognosis of Patients with Ulcerative Colitis
Published 2018-01-01Get full text
Article -
351
Lactobacillus rhamnosus: An emerging probiotic with therapeutic potential for depression
Published 2025-01-01Get full text
Article -
352
-
353
-
354
Viols nazis en Drôme (1944)
Published 2021-02-01“…What with “opportunistic” rape or mass-rape as in St Donat sur l’Herbasse, in the Vercors, or in the Drôme valley, this criminal practice brought about hundreds victims.The german command made use of the Ost-Legion’s Mongols giving them a free hand to carry out their crimes on women and very young girls. …”
Get full text
Article -
355
Beginning of the Basic Biomedical Sciences teaching at the Cienfuegos Medical Sciences Faculty. Development of Histology from 1982 to 1994
Published 2023-05-01“…Finlay Medical Sciences detachment are mentioned in this research, the result of the Commander in Chief Fidel Castro Ruz’ thought to universalize the teaching of medical sciences throughout the country. …”
Get full text
Article -
356
Design and Control Optimization of Compensation Mechanism of Crystallizer Automatic Slag Adding Machine
Published 2018-01-01“…The appropriate electronic control command curve is fitted and adjusted in real time to ensure that the central speed of the discharge port is basically stable,which is to solve the uneven problem. …”
Get full text
Article -
357
Factors of activity of the troops of NKVD of the USSR during the East Prussian strategic offensive operation
Published 2023-05-01“…They include changes in the command and control system and the structure of the troops, as well as new tasks, the implementation of which was entrusted to the troops of NKVD of the USSR. …”
Get full text
Article -
358
Les rumeurs de l’oubli dans les romans de Sylvie Germain ou l’exploration germanienne de l’hypomnésie
Published 2018-02-01“…Sylvie Germain’s novels explore these « abuses of forgetting » : the forgetfulness commanded by amnesty policies ; the forgetting imposed by the policies of censorship and confiscation of testimony ; the oblivion orchestrated by the occultation of memory. …”
Get full text
Article -
359
Training of personnel for the Red Army signal troops during the Great Patriotic War
Published 2023-09-01“…The article deals with the problems of staffing the communications troops with qualified military personnel during the Great Patriotic War based on the materials of the inspection of educational institutions, advanced training courses for command staff and regimental schools of the Main Directorate of Communications of the Red Army. …”
Get full text
Article -
360
BotCatcher:botnet detection system based on deep learning
Published 2018-08-01“…Machine learning technology has wide application in botnet detection.However,with the changes of the forms and command and control mechanisms of botnets,selecting features manually becomes increasingly difficult.To solve this problem,a botnet detection system called BotCatcher based on deep learning was proposed.It automatically extracted features from time and space dimension,and established classifier through multiple neural network constructions.BotCatcher does not depend on any prior knowledge which about the protocol and the topology,and works without manually selecting features.The experimental results show that the proposed model has good performance in botnet detection and has ability to accurately identify botnet traffic .…”
Get full text
Article