-
561
Lvov and Sandomir Offensive Operation: the Look 70 Years
Published 2015-02-01“…The operation, which was later called the Lvov-Sandomierz, turned into a major offensive of more than 400 km and lasted from July 13 to August 29, 1944. The Soviet Supreme Command was seeking to crush Army Group "Northern Ukraine", liberate Western Ukraine and take the war to the south east Poland. …”
Get full text
Article -
562
An Approach to Automatic Building Information Modeling-Based Generation of Finite Element Models of Different Complexity and Finite Element Dimensionality
Published 2025-01-01“…Subsequently, ANSYS MAPDL commands are generated and written to the macro file. (3) The approach is illustrated by an example of a laboratory test structure. …”
Get full text
Article -
563
-
564
-
565
-
566
-
567
-
568
The "Low Slow and Small" UAV target detection and tracking algorithm based on improved YOLOv7 and DeepSort
Published 2025-02-01Get full text
Article -
569
Reliable Multicasting Service for Densely Deployed Military Sensor Networks
Published 2015-08-01“…Wireless sensor networks (WSNs) have drawn attention for military applications where a large number of light-weight sensor nodes can detect enemies and intruders in the battlefield and alert a command post (CP) to our forces. In particular, in the military sensor networks, QoS (quality-of-service) is one of the most important requirements to support their mission-critical applications. …”
Get full text
Article -
570
Thomas Aquinas: on law, tyranny and resistance
Published 2010-06-01“…When those who bear the law command things which exceed the competence of such authority, the subject is free to obey or disobey. …”
Get full text
Article -
571
Robotic Vision with the Conformal Camera: Modeling Perisaccadic Perception
Published 2010-01-01“…The brain's visuosaccadic circuitry uses the oculomotor command of each impending saccade to shift receptive fields (RFs) to cortical locations before the eyes take them there, giving a continuous and stable view of the world. …”
Get full text
Article -
572
Geste, geste punitif et institution judiciaire
Published 2011-11-01“…Ces technologies, qui se traduisent par des dispositifs de contrôle inédits, à savoir précisément la surveillance électronique, apparaissent, de par la place importante qu’elles occupent dans le champ des pénalités et de par l’investissement intensif des pouvoirs publics qu’elles commandent aujourd’hui, comme ne devant désormais rencontrer aucun frein. …”
Get full text
Article -
573
Les Najāḥides
Published 2023-07-01“…The recruitment of slave soldiers allowed the installation of a military power in Zabīd whose command was vested in the qā'id, who bore the title of vizier as well. …”
Get full text
Article -
574
Time-Frequency Feature Extraction of HRRP Using AGR and NMF for SAR ATR
Published 2015-01-01Get full text
Article -
575
Usages et limites de la violence de guerre à la haute époque hellénistique
Published 2024-12-01“…Did the ongoing struggles and rivalries between the various Greek powers for command of conquered territories lead to a shift in tolerance thresholds? …”
Get full text
Article -
576
Chain Routing Algorithm of Wireless Sensor Networks for Streetlight Monitoring System
Published 2013-01-01“…Finally, cluster head node received the data of sensor nodes, used the data fusion algorithm to reduce data redundancy, transmitted the fused data to sink node with multi-hop routing among cluster head nodes and transmitted the client's commands to the controlled nodes. The simulation results show that CRASMS algorithm keeps the advantage of PEGASIS algorithm in terms of energy consumption and the advantage of LEACH algorithm in terms of data transmission delay, overcomes the lack of PEGASIS algorithm in terms of data transmission delay and the lack of LEACH algorithm in terms of node energy consumption. …”
Get full text
Article -
577
Research Progress on Human Umbilical Cord Mesenchymal Stem Cells in the Treatment of Knee Osteoarthritis
Published 2025-01-01Get full text
Article -
578
Accurate Reaching after Active But Not Passive Movements of the Hand: Evidence for Forward Modeling
Published 2008-01-01“…Converging behavioral findings support recent models of motor control suggesting that estimates of the future positions of a limb as well as the expected sensory consequences of a planned movement may be derived, in part, from efference copies of motor commands. These estimates are referred to as forward models. …”
Get full text
Article -
579
Prediction of the Flight Dynamics of Maneuvering Multirotor Aircraft
Published 2024-01-01“…The flight dynamics model determines the motion of the aircraft based on the total loads and commanded motor speeds. The aerodynamic loads of the rotors are predicted using a modified blade element momentum theory (BEMT)–based approach that considers nonuniform inflow conditions at the rotor discs. …”
Get full text
Article -
580
Polariton lattices as binarized neuromorphic networks
Published 2025-01-01“…The system’s performance was evaluated using diverse datasets, including the MNIST dataset for image recognition and the Speech Commands dataset for voice recognition tasks. In both scenarios, the proposed system demonstrates the potential to outperform existing polaritonic neuromorphic systems. …”
Get full text
Article