Showing 201 - 220 results of 892 for search '"commander"', query time: 0.04s Refine Results
  1. 201

    Data Driven Real-Time Dynamic Voltage Control Using Decentralized Execution Multi-Agent Deep Reinforcement Learning by Yuling Wang, Vijay Vittal

    Published 2024-01-01
    “…Each agent has independent actor neural networks to output generator control commands and critic neural networks that evaluate command performance. …”
    Get full text
    Article
  2. 202

    CNN Based Automatic Speech Recognition: A Comparative Study by Hilal Ilgaz, Beyza Akkoyun, Özlem Alpay, M. Ali Akcayol

    Published 2024-08-01
    “…This paper presents the development of a deep learning and speech command recognition system. The Google Speech Commands Dataset has been used for training. …”
    Get full text
    Article
  3. 203

    AN ANALYSIS OF SPEECH FUNCTION AT TRADITIONAL SHOPPING CENTER IN LANGSA by Irma Dewi Isda

    Published 2019-08-01
    “…The data were analyzed and classified into four types of speech functions namely statement, question, offer, and command. The findings indicated based on longer and short conversation there are  statement 43 (40,18%), question 53(49,53%), offer 7 (6,5%), command 4 (3,73%) while on short conversation are statement 13 (30.9%), Question 22 (52,3%), offer 5(11,9%) and Command 2(4,7%). …”
    Get full text
    Article
  4. 204

    Stability Analysis of a Wind Turbine Controlled by Direct Torque Control by Djamel Ikni, Elena Raducan

    Published 2024-05-01
    “…To meet these requirements, the use of appropriate commands for the control of the production systems is necessary. …”
    Get full text
    Article
  5. 205
  6. 206
  7. 207
  8. 208
  9. 209
  10. 210

    The tragedy of the South-Western Front: Kyiv disaster of 1941 by O. K. Maliutina, K. Z. Maliutin

    Published 2022-12-01
    “…Among the main ones, the following have been highlighted: incorrect assessment of Germany’s strategic priorities at the initial stage of the war; unpreparedness for a defensive war on one’s own territory; the advantage of the enemy in the tactics of fighting; lack of coordination of actions between military branches; loss of command of troops at all levels, from the General Staff to corps and division commanders; wrong personnel policy, as a result of which unprofessional persons who met the “main” criterion, such as personal loyalty to Stalin, came to the leadership of the Red Army; gross mistakes of the command, incompetence and voluntarism in setting tasks on the part of the Headquarters of the Supreme High Command (the highest military leadership of the country), etc.…”
    Get full text
    Article
  11. 211

    APM:agent protection mechanism applied for IaaS platform by Peiru FAN, Bo ZHAO, Mingtao NI, Zhihong CHEN

    Published 2018-04-01
    “…The interference of false or fake test data on IaaS platform will contaminate the evaluation results,confusing users’ choices for IaaS services.To solve this problem,an agent protection mechanism (APM) for IaaS platform test environment was proposed.It ensured the integrity and commanded validity of the agent without additional hardware or software.Also an effectiveness verification approach based on requests was presented to detect APM failure problems timely.An experiment environment according to APM was implemented to evaluate the effectiveness and the performance overhead.Experimental results show that the APM is effective in protecting agent integrity and command validation,and its performance overhead is minor.…”
    Get full text
    Article
  12. 212
  13. 213
  14. 214
  15. 215
  16. 216
  17. 217
  18. 218
  19. 219
  20. 220

    A Hybrid PID-Fuzzy Control for Linear SISO Systems with Variant Communication Delays by Adrian-Bogdan Hanchevici, Monica Patrascu, Ioan Dumitrache

    Published 2012-01-01
    “…The purpose of this approach is to adjust, by using the fuzzy logic, the command provided by the PID controller. The input for the fuzzy logic controller (FLC) is represented by the delay and the variation of delay, and the output is used to adapt the PID controller’s command to the new value of the communication delay which occurs in the network. …”
    Get full text
    Article