Showing 161 - 180 results of 892 for search '"Commandant"', query time: 0.05s Refine Results
  1. 161
  2. 162
  3. 163
  4. 164
  5. 165
  6. 166
  7. 167

    LRST: searching tree anti-collision algorithm with low-redundancy by Qiong HUANG, Jiang-tao LING, Min ZHANG, Xiao-long YANG

    Published 2014-06-01
    “…In order to reduce the length of query command, the prefix matching circuit in tag was replaced with a counter, which eliminated the prefix as the parameter of query command. …”
    Get full text
    Article
  8. 168
  9. 169

    Data Driven Real-Time Dynamic Voltage Control Using Decentralized Execution Multi-Agent Deep Reinforcement Learning by Yuling Wang, Vijay Vittal

    Published 2024-01-01
    “…Each agent has independent actor neural networks to output generator control commands and critic neural networks that evaluate command performance. …”
    Get full text
    Article
  10. 170

    CNN Based Automatic Speech Recognition: A Comparative Study by Hilal Ilgaz, Beyza Akkoyun, Özlem Alpay, M. Ali Akcayol

    Published 2024-08-01
    “…This paper presents the development of a deep learning and speech command recognition system. The Google Speech Commands Dataset has been used for training. …”
    Get full text
    Article
  11. 171

    AN ANALYSIS OF SPEECH FUNCTION AT TRADITIONAL SHOPPING CENTER IN LANGSA by Irma Dewi Isda

    Published 2019-08-01
    “…The data were analyzed and classified into four types of speech functions namely statement, question, offer, and command. The findings indicated based on longer and short conversation there are  statement 43 (40,18%), question 53(49,53%), offer 7 (6,5%), command 4 (3,73%) while on short conversation are statement 13 (30.9%), Question 22 (52,3%), offer 5(11,9%) and Command 2(4,7%). …”
    Get full text
    Article
  12. 172

    Stability Analysis of a Wind Turbine Controlled by Direct Torque Control by Djamel Ikni, Elena Raducan

    Published 2024-05-01
    “…To meet these requirements, the use of appropriate commands for the control of the production systems is necessary. …”
    Get full text
    Article
  13. 173
  14. 174
  15. 175
  16. 176
  17. 177
  18. 178

    The tragedy of the South-Western Front: Kyiv disaster of 1941 by O. K. Maliutina, K. Z. Maliutin

    Published 2022-12-01
    “…Among the main ones, the following have been highlighted: incorrect assessment of Germany’s strategic priorities at the initial stage of the war; unpreparedness for a defensive war on one’s own territory; the advantage of the enemy in the tactics of fighting; lack of coordination of actions between military branches; loss of command of troops at all levels, from the General Staff to corps and division commanders; wrong personnel policy, as a result of which unprofessional persons who met the “main” criterion, such as personal loyalty to Stalin, came to the leadership of the Red Army; gross mistakes of the command, incompetence and voluntarism in setting tasks on the part of the Headquarters of the Supreme High Command (the highest military leadership of the country), etc.…”
    Get full text
    Article
  19. 179

    APM:agent protection mechanism applied for IaaS platform by Peiru FAN, Bo ZHAO, Mingtao NI, Zhihong CHEN

    Published 2018-04-01
    “…The interference of false or fake test data on IaaS platform will contaminate the evaluation results,confusing users’ choices for IaaS services.To solve this problem,an agent protection mechanism (APM) for IaaS platform test environment was proposed.It ensured the integrity and commanded validity of the agent without additional hardware or software.Also an effectiveness verification approach based on requests was presented to detect APM failure problems timely.An experiment environment according to APM was implemented to evaluate the effectiveness and the performance overhead.Experimental results show that the APM is effective in protecting agent integrity and command validation,and its performance overhead is minor.…”
    Get full text
    Article
  20. 180