Showing 401 - 420 results of 892 for search '"Commandant"', query time: 0.05s Refine Results
  1. 401
  2. 402

    Method for determining of statistical characteristics of evaluated distance obtained from measurements of Doppler frequency offsets by V. V. Legkostup

    Published 2022-06-01
    “…Despite the fact that the object guidance loop is closed according to the time difference of arrival information, it is necessary to enter the distance between the object and the center of the navigation system into the algorithm for generating control commands in order to stabilize the frequency response of the control loop and eliminate dynamic errors. …”
    Get full text
    Article
  3. 403

    La langue guarani, symbole instrumentalisé de la construction de la nation paraguayenne by Christine Pic-Gillard

    Published 2008-11-01
    “…The use of the Guarani language has certainly allowed the construction of the specific national identity based on a bilingualism and a bi-culture shared by all the citizens.Nevertheless new obstacles have emerged which question the opportunity to develop a minority language while Spanish is expanding in  North and South Americas and while the command of English seems to be an asset for emerging countries. …”
    Get full text
    Article
  4. 404

    Operation Optimization of Microgrid System Based on Intelligent System Model by Jian Kang

    Published 2022-01-01
    “…In addition, this paper adopts the method of extracting the harmonic current command in the synchronous coordinate system based on the band-pass filter composed of SOGI and combines the RDFT algorithm to determine the number of harmonics that can be compensated and the degree of compensation for the harmonic number. …”
    Get full text
    Article
  5. 405

    Horaţiu şi Augustus by Alexandra Ciocârlie

    Published 2018-12-01
    “…Originally, while being on the republican side, the poet participates in the battle from Philippi, in which he was enrolled as tribune, and was fighting under command of Brutus. In his first satires and epodes, characterised by a realistic expressiveness, he manifests a reserved attitude towards Octavian, whom he indirectly mentions in passing. …”
    Get full text
    Article
  6. 406

    Maulānā Maudūdī and the genesis of Islamic Economics by Arshad Zaman

    Published 2021-08-01
    “…Or, as arrangements in law and government for the provision of livelihoods, akin to the German tradition of Polizeiwissenschaft in a Staatswissenschaft, but from the Islamic perspective of commanding the right and forbidding the wrong (especially, allowing wages, rents and profits, but not interest).…”
    Get full text
    Article
  7. 407

    A Cable-Passive Damper System for Sway and Skew Motion Control of a Crane Spreader by La Duc Viet, Youngjin Park

    Published 2015-01-01
    “…While the crane control problem is often approached by applying a certain active control command to some parts of the crane, this paper proposes a cable-passive damper system to reduce the vibration of a four-cable suspended crane spreader. …”
    Get full text
    Article
  8. 408

    Height Control of Supersonic Sea-Skimming Missiles Based on Online Parameter Identification by Zhenyu Jiang, Xiaobin Tang, Xiaoshuai Fan, Shifeng Zhang

    Published 2024-01-01
    “…Secondly, a backstepping control method was designed to regulate the height of sea-skimming missiles. Control commands were generated based on online identification and state estimation, as well as the additional angle of attack caused by wind being compensated. …”
    Get full text
    Article
  9. 409

    The French aire in Jane Eyre by Emily Eells

    Published 2013-09-01
    “…Rochester calls on his command of French in an attempt to define his non-conventional relationship with Jane. …”
    Get full text
    Article
  10. 410

    Eunug in die antieke Nabye Ooste by M. Nel

    Published 2008-06-01
    “…The term is used in a different sense when it refers to a foreign person, i.e. a person in an official capacity in a king’s court (as in Gen. 37), or a military commander (as in 1 Kings 22:9; 2 Kings 8:7; 23:12; 25;19; Jer. 52:25). …”
    Get full text
    Article
  11. 411

    The history, current state and future possibilities of the non-invasive brain computer interfaces by Frederico Caiado, Arkadiy Ukolov

    Published 2025-03-01
    “…BCIs have evolved from early studies in neurophysiology to real-world applications that convert brain impulses into executable commands. The study discusses the two main categories of BCIs: invasive and non-invasive, highlighting their benefits and limitations. …”
    Get full text
    Article
  12. 412

    Analysis of Cooperative Defense System of Water Conservancy Network Security Based on Software Defined Security by XIAO Yaoxuan, MU Duo, QIN Zening, GUO Dongbao

    Published 2023-01-01
    “…In view of the increasingly concealed,complicated,and intelligent network attacks,this paper analyzes the security protection status and network security problems faced by the water conservancy network.A cooperative defense system of water conservancy network security is proposed,and a cooperative defense control system of network security is designed according to the system.On the basis of software defined security architecture,the control layer and security layer of traditional hardware or virtualized security devices are separated.The security resource pool provides security protection,and the security control platform is responsible for management and command delivery.Furthermore,security services can be arranged according to different protection requirements to construct multiple security protection mechanisms,so as to provide technical support for realizing the cooperative defense capability of water conservancy network security featuring internal and external cooperation and linkage between the upper and lower levels.…”
    Get full text
    Article
  13. 413

    Armenian Population in Malatia in the 16th Century According To Cadastral Registers by İlhan, Türkmen

    Published 2015-06-01
    “…After the Battle of Manzikert, Armenians started to settle in Malatia under the command of Phileratos. But they could never become a sovereign state in this region. …”
    Get full text
    Article
  14. 414

    RASP based Web security detection method by Hang YU, Shuai WANG, Huamin JIN

    Published 2020-11-01
    “…At present,the traditional Web security detection methods act on the input and output of the program,which can not prevent malicious code entering the program after being distorted and confused,and it is difficult to meet the new requirements of Web application security protection.Based on the in-depth analysis of the risk of traditional data flow monitoring methods,combined with the technical characteristics of rasp,a Web security detection method based on rasp was proposed.The rasp probe was embedded in the parameters of authority discrimination function,system command execution function and database operation function in Web application,and the change of data flow was detected in real-time at the code interpreter level.This method was implemented based on Java language.It was proved in the laboratory that this method is better than the traditional Web security detection method in accuracy and detection time.Finally,the deployment and application scenarios of this method were analyzed and proposed.…”
    Get full text
    Article
  15. 415
  16. 416

    Power and Statebuilding in the Anglo-Norman World: An Overview by Judith Ann Green

    Published 2020-04-01
    “…This paper explores, in the context of the Anglo-Norman world, some of the characteristics implicit in ideas of the state: relatively fixed frontiers, a sovereign authority with the power to maintain justice, raise taxes and deploy armies, and to command the allegiance of its inhabitants. Normandy and England are considered both separately and together as an “empire”. …”
    Get full text
    Article
  17. 417

    Profile-Tracking-Based Adaptive Guidance Law against Maneuvering Targets by Jingshuai Huang, Hongbo Zhang, Guojian Tang, Weimin Bao

    Published 2019-01-01
    “…Furthermore, a guidance-command-conversion scheme is presented to convert the law into the one appropriate for endoatmospheric interceptions. …”
    Get full text
    Article
  18. 418

    A Real-Time Facial Expression Recognition System for Online Games by Ce Zhan, Wanqing Li, Philip Ogunbona, Farzad Safaei

    Published 2008-01-01
    “…Although detailed facial animation has already been achieved in a number of MOGs, players have to use text commands to control the expressions of avatars. In this paper, we propose an automatic expression recognition system that can be integrated into an MOG to control the facial expressions of avatars. …”
    Get full text
    Article
  19. 419

    Virtual assistant robot for physical training exercises supervision by Robinson Jimenez-Moreno, Anny Astrid Espitia Cubillos, Esperanza Rodríguez Carmona

    Published 2024-11-01
    “…To do this, deep learning algorithms such as convolutional networks and short- and long-term memory networks are used to recognize voice commands and the user's video actions. A predefined dialogue template is used to guide a user's training cycle based on the execution of the exercises: push-ups, abdominal, jump or squat. …”
    Get full text
    Article
  20. 420

    Odezwa feldmarszałka Iwana Dybicza do żołnierzy polskich ze stycznia 1831 roku jako przykład propagandy wojennej czasów powstania listopadowego by Łukasz Jewuła

    Published 2024-01-01
    “… In January 1831, during the November Uprising, the commander-in-chief of Russian troops Ivan Diebitsch issued the summons to the Polish soldiers. …”
    Get full text
    Article