The machine control
-
In this thesis, focus on the wireless links between devices equipped by deployed operating personnel and intermediary access point infrastructure. We use multi-radio (MR) platforms, wireless devices with multiple and diverse transceiver technologies, to produce robust and reliable links through adaptive control of available transceivers. Primarily, we study the application of intelligent control techniques, namely reinforcement learning (RL), for adaptive control over diverse transceivers to achieve the desired robustness and reliability under dynamic environmental conditions.
185p runthenight04 02-02-2023 7 2 Download
-
The thesis focuses on researching and developing solutions to shared resources allocation for users in distributed system and optimally communication resources allocation for distributed system in virtualization system based on network coding.
27p gaocaolon6 30-07-2020 31 2 Download
-
In this paper, we propose a mechanism to optimize range of EV by integrating some of the best methods to estimate rotor position, efficient temperature control modules and machine learning algorithms that analyze the vehicle’s environment and driving pattern.
10p lucastanguyen 01-06-2020 20 2 Download
-
(BQ) Electrical Discharge Machining (EDM) is a non-traditional machining process which has the ability to machine hard, difficult to machine materials and the parts with complex internal shapes by using precisely controlled sparks that occurs between an electrode and a work piece in the presence of a dielectric fluid.
9p xuanphuongdhts 27-03-2017 68 3 Download
-
Another class of linear codes, known as Convolutional codes. We study the structure of the encoder. We study different ways for representing the encoder.Convolutional codes offer an approach to error control coding substantially different from that of block codes. A convolutional encoder: encodes the entire data stream, into a single codeword. does not need to segment the data stream into blocks of fixed size (Convolutional codes are often forced to block structure by periodic truncation). is a machine with memory.
20p doanhung_dtvtk10 24-03-2013 50 5 Download
-
Exposure of cells to ionizing radiation induces activation of multiple signal-ing pathways that play a critical role in controlling cell death. However, the basis for linkage between signaling pathways and the cell-death machin-ery in response to ionizing radiation remains unclear.
13p media19 06-03-2013 34 3 Download
-
Protein degradation in the cytosol ofEscherichia coliis carried out by a variety of different proteolytic machines, including ClpAP. The ClpA com-ponent is a hexameric AAA+ (ATPase associated with various cellular activities) chaperone that utilizes the energy of ATP to control substrate recognition and unfolding.
11p media19 06-03-2013 36 2 Download
-
Computer-aided manufacturing (CAM) is the use of computer software to control machine tools and related machinery in the manufacturing of workpieces.[1][2][3][4][5] This is not the only definition for CAM, but it is the most common;[1] CAM may also
4p dthi16088 21-03-2011 114 5 Download
-
International Rectifier's IRAMS10UP60A is an Integrated Power Module developed and optimized for electronic motor control in appliance applications such as washing machines and refrigerators. Plug N Drive technology offers an extremely compact, high performance AC motor-driver in a single isolated package for a very simple design. A built-in temperature monitor and over-temperature/over-current protection, along with the short-circuit rated IGBTs and integrated under-voltage lockout function, deliver high level of protection and fail-safe operation.
17p hoanthuc 16-11-2010 107 15 Download
-
The class file verifier (which includes the bytecode verifier) checks that the program obeys the rules of the Java Virtual Machine (but note that this does not necessarily mean that it obeys the rules of the Java language). 3. The security manager imposes local restrictions on the things that the program is allowed to do. It is perfectly possible to customize this to allow code limited access to carefully controlled resources. This could mean allowing no access to the local file system, and network access only to the location from which the code, or its Web page, came. You...
20p giangtanthon 10-02-2010 134 25 Download