-
121
-
122
Hidradenitis secondary to nirogacestat, a recently approved desmoid tumor medication
Published 2025-03-01Get full text
Article -
123
-
124
-
125
Development of Real-Time Maneuver Library Generation Technique for Implementing Tactical Maneuvers of Fixed-Wing Aircraft
Published 2020-01-01“…Firstly, the general maneuver libraries are defined, and then 7th-order polynomials are used to create the maneuver libraries. The attitude command attitude hold (ACAH) system, the rate command rate hold (RCRH) system, and the speed command speed hold (SCSH) system using the proportional-integral-derivative (PID) control technique are designed to minimize the complexity of the flight control system (FCS) and to reduce the weight and volume of the payload. …”
Get full text
Article -
126
Data Driven Real-Time Dynamic Voltage Control Using Decentralized Execution Multi-Agent Deep Reinforcement Learning
Published 2024-01-01“…Each agent has independent actor neural networks to output generator control commands and critic neural networks that evaluate command performance. …”
Get full text
Article -
127
CNN Based Automatic Speech Recognition: A Comparative Study
Published 2024-08-01“…This paper presents the development of a deep learning and speech command recognition system. The Google Speech Commands Dataset has been used for training. …”
Get full text
Article -
128
AN ANALYSIS OF SPEECH FUNCTION AT TRADITIONAL SHOPPING CENTER IN LANGSA
Published 2019-08-01“…The data were analyzed and classified into four types of speech functions namely statement, question, offer, and command. The findings indicated based on longer and short conversation there are statement 43 (40,18%), question 53(49,53%), offer 7 (6,5%), command 4 (3,73%) while on short conversation are statement 13 (30.9%), Question 22 (52,3%), offer 5(11,9%) and Command 2(4,7%). …”
Get full text
Article -
129
-
130
Brain local structural connectomes and the subtypes of the medial temporal lobe parcellations
Published 2025-02-01Get full text
Article -
131
-
132
-
133
The tragedy of the South-Western Front: Kyiv disaster of 1941
Published 2022-12-01“…Among the main ones, the following have been highlighted: incorrect assessment of Germany’s strategic priorities at the initial stage of the war; unpreparedness for a defensive war on one’s own territory; the advantage of the enemy in the tactics of fighting; lack of coordination of actions between military branches; loss of command of troops at all levels, from the General Staff to corps and division commanders; wrong personnel policy, as a result of which unprofessional persons who met the “main” criterion, such as personal loyalty to Stalin, came to the leadership of the Red Army; gross mistakes of the command, incompetence and voluntarism in setting tasks on the part of the Headquarters of the Supreme High Command (the highest military leadership of the country), etc.…”
Get full text
Article -
134
-
135
-
136
A Hybrid PID-Fuzzy Control for Linear SISO Systems with Variant Communication Delays
Published 2012-01-01“…The purpose of this approach is to adjust, by using the fuzzy logic, the command provided by the PID controller. The input for the fuzzy logic controller (FLC) is represented by the delay and the variation of delay, and the output is used to adapt the PID controller’s command to the new value of the communication delay which occurs in the network. …”
Get full text
Article -
137
Design and Construction of a Voice Control System for Appliances Using Android Via Bluetooth.
Published 2023“…This Project report represents/shows a detailed system of controlling appliances using voice commands. The most common method of controlling appliances is by pressing the switches manually and this becomes very difficult for the elderly or physically handicapped people. …”
Get full text
Thesis -
138
-
139
Post Varicella Necrotising Fasciitis Afflicting Upper Limb in Young Child: A Rare Case Report
Published 2024-03-01Get full text
Article -
140
Flood Diversion Algorithm for Anticollision in RFID System
Published 2015-04-01“…Thirdly, in the identification processing, for reducing data transmission, the reader needs only to send a three-dimensional-vector command to tags, tags respond to the command with part of collision-bit parameters, and stack and queue are adopted to store precious request command and tags' ID to avoid repeatedly transmitting them between the reader and the tags. …”
Get full text
Article