-
201
Data Driven Real-Time Dynamic Voltage Control Using Decentralized Execution Multi-Agent Deep Reinforcement Learning
Published 2024-01-01“…Each agent has independent actor neural networks to output generator control commands and critic neural networks that evaluate command performance. …”
Get full text
Article -
202
CNN Based Automatic Speech Recognition: A Comparative Study
Published 2024-08-01“…This paper presents the development of a deep learning and speech command recognition system. The Google Speech Commands Dataset has been used for training. …”
Get full text
Article -
203
AN ANALYSIS OF SPEECH FUNCTION AT TRADITIONAL SHOPPING CENTER IN LANGSA
Published 2019-08-01“…The data were analyzed and classified into four types of speech functions namely statement, question, offer, and command. The findings indicated based on longer and short conversation there are statement 43 (40,18%), question 53(49,53%), offer 7 (6,5%), command 4 (3,73%) while on short conversation are statement 13 (30.9%), Question 22 (52,3%), offer 5(11,9%) and Command 2(4,7%). …”
Get full text
Article -
204
Stability Analysis of a Wind Turbine Controlled by Direct Torque Control
Published 2024-05-01“…To meet these requirements, the use of appropriate commands for the control of the production systems is necessary. …”
Get full text
Article -
205
Long non-coding RNA H19 in oral squamous cell carcinoma: A theragnostic approach using salivary exosomes
Published 2024-06-01Get full text
Article -
206
Nanoengineered chemotherapy - A novel therapeutic strategy in oral cancer
Published 2024-06-01Get full text
Article -
207
-
208
Brain local structural connectomes and the subtypes of the medial temporal lobe parcellations
Published 2025-02-01Get full text
Article -
209
-
210
The tragedy of the South-Western Front: Kyiv disaster of 1941
Published 2022-12-01“…Among the main ones, the following have been highlighted: incorrect assessment of Germany’s strategic priorities at the initial stage of the war; unpreparedness for a defensive war on one’s own territory; the advantage of the enemy in the tactics of fighting; lack of coordination of actions between military branches; loss of command of troops at all levels, from the General Staff to corps and division commanders; wrong personnel policy, as a result of which unprofessional persons who met the “main” criterion, such as personal loyalty to Stalin, came to the leadership of the Red Army; gross mistakes of the command, incompetence and voluntarism in setting tasks on the part of the Headquarters of the Supreme High Command (the highest military leadership of the country), etc.…”
Get full text
Article -
211
APM:agent protection mechanism applied for IaaS platform
Published 2018-04-01“…The interference of false or fake test data on IaaS platform will contaminate the evaluation results,confusing users’ choices for IaaS services.To solve this problem,an agent protection mechanism (APM) for IaaS platform test environment was proposed.It ensured the integrity and commanded validity of the agent without additional hardware or software.Also an effectiveness verification approach based on requests was presented to detect APM failure problems timely.An experiment environment according to APM was implemented to evaluate the effectiveness and the performance overhead.Experimental results show that the APM is effective in protecting agent integrity and command validation,and its performance overhead is minor.…”
Get full text
Article -
212
-
213
-
214
CD44: From diagnosis to therapy in the journey of oral cancer
Published 2024-06-01Get full text
Article -
215
-
216
-
217
Exploring the potential of bioluminescence in oral cancer
Published 2024-03-01Get full text
Article -
218
Promoting oral cancer awareness in LGBTQ+ communities - Diversity in oral health
Published 2024-09-01Get full text
Article -
219
NGS revolutionizing oral cancer: From genetic profiling to personalized therapy
Published 2024-06-01Get full text
Article -
220
A Hybrid PID-Fuzzy Control for Linear SISO Systems with Variant Communication Delays
Published 2012-01-01“…The purpose of this approach is to adjust, by using the fuzzy logic, the command provided by the PID controller. The input for the fuzzy logic controller (FLC) is represented by the delay and the variation of delay, and the output is used to adapt the PID controller’s command to the new value of the communication delay which occurs in the network. …”
Get full text
Article