intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

The machine control

Xem 1-10 trên 10 kết quả The machine control
  • In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.

    pdf185p runthenight04 02-02-2023 7 2   Download

  • The thesis focuses on researching and developing solutions to shared resources allocation for users in distributed system and optimally communication resources allocation for distributed system in virtualization system based on network coding.

    pdf27p gaocaolon6 30-07-2020 31 2   Download

  • In this paper, we propose a mechanism to optimize range of EV by integrating some of the best methods to estimate rotor position, efficient temperature control modules and machine learning algorithms that analyze the vehicle’s environment and driving pattern.

    pdf10p lucastanguyen 01-06-2020 20 2   Download

  • (BQ) Electrical Discharge Machining (EDM) is a non-traditional machining process which has the ability to machine hard, difficult to machine materials and the parts with complex internal shapes by using precisely controlled sparks that occurs between an electrode and a work piece in the presence of a dielectric fluid.

    pdf9p xuanphuongdhts 27-03-2017 68 3   Download

  • Another class of linear codes, known as Convolutional codes. We study the structure of the encoder. We study different ways for representing the encoder.Convolutional codes offer an approach to error control coding substantially different from that of block codes. A convolutional encoder: encodes the entire data stream, into a single codeword. does not need to segment the data stream into blocks of fixed size (Convolutional codes are often forced to block structure by periodic truncation). is a machine with memory.

    ppt20p doanhung_dtvtk10 24-03-2013 50 5   Download

  • Exposure of cells to ionizing radiation induces activation of multiple signal-ing pathways that play a critical role in controlling cell death. However, the basis for linkage between signaling pathways and the cell-death machin-ery in response to ionizing radiation remains unclear.

    pdf13p media19 06-03-2013 34 3   Download

  • Protein degradation in the cytosol ofEscherichia coliis carried out by a variety of different proteolytic machines, including ClpAP. The ClpA com-ponent is a hexameric AAA+ (ATPase associated with various cellular activities) chaperone that utilizes the energy of ATP to control substrate recognition and unfolding.

    pdf11p media19 06-03-2013 36 2   Download

  • Computer-aided manufacturing (CAM) is the use of computer software to control machine tools and related machinery in the manufacturing of workpieces.[1][2][3][4][5] This is not the only definition for CAM, but it is the most common;[1] CAM may also

    doc4p dthi16088 21-03-2011 114 5   Download

  • International Rectifier's IRAMS10UP60A is an Integrated Power Module developed and optimized for electronic motor control in appliance applications such as washing machines and refrigerators. Plug N Drive technology offers an extremely compact, high performance AC motor-driver in a single isolated package for a very simple design. A built-in temperature monitor and over-temperature/over-current protection, along with the short-circuit rated IGBTs and integrated under-voltage lockout function, deliver high level of protection and fail-safe operation.

    pdf17p hoanthuc 16-11-2010 107 15   Download

  • The class file verifier (which includes the bytecode verifier) checks that the program obeys the rules of the Java Virtual Machine (but note that this does not necessarily mean that it obeys the rules of the Java language). 3. The security manager imposes local restrictions on the things that the program is allowed to do. It is perfectly possible to customize this to allow code limited access to carefully controlled resources. This could mean allowing no access to the local file system, and network access only to the location from which the code, or its Web page, came. You...

    pdf20p giangtanthon 10-02-2010 134 25   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2