intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Control device

Xem 1-20 trên 66 kết quả Control device
  • In this study, an RS-485 protocol for Arduino boards that operate in Master-Slave networks was developed. Network operations could be carried out independently on the main thread program, and devices in the network could react quickly to information received.

    pdf10p viling 11-10-2024 1 0   Download

  • This paper proposes a mapping method to unify two workspaces for the robot arm on the teleoperation system and apply the haptic method when the robot enters the singularity area. The teleoperation system mainly consists of a single master and a single slave.

    pdf13p viling 11-10-2024 1 0   Download

  • In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.

    pdf185p runthenight04 02-02-2023 7 2   Download

  • The objectives of the study are: to extend the literature in several ways. First, the relationship between strategictype and organisational capabilities has been predominately investigated in the context of the private sector, not the public sector; To provide evidence about the comparative impacts of two contemporary control devices adapted by management of GBEs, as organisations that operated in a nexus between private sector market conditions and public sector ownership and oversight conditions; To provide evidence about the mix of congruency factors (i.e.

    pdf261p runthenight04 02-02-2023 7 2   Download

  • This work introduces a simple process to synthesize directly bi-phase a-/g-Fe2O3 submicron flowers on a Fe foil in NH4OH. The flowers were assembled by using many nanoplates with an estimated thickness of 20e80 nm. The shapes and dimensions of the flowers can be controlled by the treatment time.

    pdf6p meyerowitz 25-12-2021 10 0   Download

  • This paper proposes a security framework for Internet of Things (IoT) based on blockchain. The solution provides the two features: (1) Access control for IoT devices, which allows users to pay a fee to the device’s owner to access the device for a certain period of time.

    pdf9p viaespa2711 31-07-2021 29 4   Download

  • The analytical expression for the self-Kerr nonlinear coefficient in a three-level V-type atomic medium is found in the presence of the Doppler effect. Based on the analytical results, we have analyzed the enhancement and control of the Kerr nonlinear coefficient under the condition of electromagnetically induced transparency. It is shown that the Kerr nonlinear coefficient is significantly enhanced around the resonant frequency of both the probe and coupling fields.

    pdf12p nguaconbaynhay10 19-02-2021 29 4   Download

  • Software-defined networking (SDN) represents a new structure of computer network that simplifies and improves network management by splitting the control plane and data plane. Since SDN is regarded as a new research issue, the application of SDN in practice faces some barriers. Most network devices such as routers and switches that implement SDN functionalities are expensive. An alternative solution in SDN research and experiments is to use network emulators. By using Mininet, an open source network emulator, this study simulates SDN implementations in different environments.

    pdf13p nguaconbaynhay10 19-02-2021 26 1   Download

  • The greatest advantage of this method is its accuracy and rapidness. The EEW system issues several alarm messages during the course of one earthquake, improving the accuracy of the warning as the amount of available data increases. The EEWis transmitted to many kinds of devices and used for personal safety and automatic control. It is very important to observe strong motion in real-time using a dense network in order to improve the EEWsystem.

    pdf8p meriday 20-04-2019 17 1   Download

  • Chương 5 - Programmable controllers. Chương này gồm có những nội dung chính sau: PLC/PC Overview, Siemens SIMATIC S7-x00 seri PLCs, STEP 7 – 300/400 Programming Language, WinCC. Mời các bạn cùng tham khảo.

    pdf38p tieu_vu16 03-01-2019 31 2   Download

  • In this paper, physico-chemical and mineralogical properties of fly ash from Pha Lai, Mong Duong and Ninh Binh thermal power stations were studied for ultilization to improve soil properties. Results shows that the properties of fly ash depend on the nature of parent coal, conditions of combustion, type of emission control devices, and storage and handling methods.

    pdf8p nguyenvanhoangvnu 12-06-2017 37 1   Download

  • Lecture "International accounting - Chapter 6: Internal control and cash" has content: Internal control, the sarbanes - oxleyact (SOX), the components of internal control, internal controls for e commerce, the bank account as a control device, the bank reconciliation,... and other contrens.

    pdf8p bautroibinhyen12 07-01-2017 61 2   Download

  • Bài giảng "Hệ điều hành - Chương 2: Quản lý xuất nhập" trình các nội dung chính sau: Nhiệm vụ của bộ phận quản lý xuất nhập, các thiết bị xuất nhập, mô hình phân lớp trong quản lý xuất nhập, bộ điều khiển thiết bị(device controller), trình điều khiển thiết bị(device driver), cơ chế DMA, quản lý lỗi và bảo vệ quá trình xuất nhập. Mời các bạn cùng tham khảo nội dung chi tiết.

    pdf36p nhasinhaoanh_06 21-09-2015 65 7   Download

  • The Newport Breeze E150 Ventilator is intended for use by properly trained and qualified persons. It is restricted for use by and upon the direction of a physician. Before attempting to use this device in an actual life-support situation, the operating personnel must become practiced in the function and the effect of the various controls. Please read references!

    pdf63p minhhoan2006 16-06-2014 90 3   Download

  • Thông thường khi sử dụng Windows bạn muốn truy cập nhanh các chức năng hệ thống từ menu chuột phải như: Add/Remove Programs, Run Cleanup, Control Panel, Device Manager, Registry Editor, Windows Update, Task Manager … chúng ta thường can thiệp vào Registry.

    pdf4p sunshine_10 29-07-2013 92 5   Download

  • The simplest IP telephone system uses two basic components: - IP telephone: end device allowing humans to place and receive calls. - Media Gateway Controller: providing overall control and coordination between IP phones; allowing a caller to locate a callee (e.g. call forwarding)

    pdf46p vanmanh1008 24-06-2013 63 4   Download

  • When building a LAN that satisfies the needs of a small or medium-sized business, your plan is more likely to be successful if a hierarchical design model is used. Divided into discrete layers. Each layer has a specific purpose. Becomes modular – maintenance, performance.Interfaces with end devices. Routers, switches, bridges, wireless access points. Provides a means of connecting and controlling which devices are allowed to communicate on the network.

    pdf43p vanmanh1008 21-05-2013 58 6   Download

  • Introduction Data into a computer (via a keyboard) is encoded by the electronics within the keyboard into an equivalent binary-coded pattern using standard coding schemes: Two most common schemes: EBCDIC (Extended Binary Coded Decimal Interchange Code): 8-bit code ASCII ((American Standards Committee for Information Interchange): 7-bit code

    ppt87p doanhung_dtvtk10 19-03-2013 80 7   Download

  • The microprocessor is the core of computer systems. Nowadays many communication, digital entertainment, portable devices, are controlled by them. A designer should know what types of components he needs, ways to reduce production costs and product reliable.

    ppt39p lqvang02 02-02-2013 63 6   Download

  • “Access control includes authentication, authorization and audit. It also includes measures such as physical devices, including biometric scans and metal locks, hidden paths, digital signatures, encryption, social barriers, and monitoring by humans and automated systems.” -- Wikipedia

    ppt32p muathu_102 28-01-2013 97 3   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2