Search ResultsElectronic Resources 
by
Liles, Karina, author.
Format:
Excerpt:
with two conditions: A) with a non-adaptive robot (control group); and B) with a socially adaptive
by
Mellott, Matthew J., author.
Format:
Excerpt:
Medium access control (MAC) is a fundamental problem in wireless networks. In ad-hoc wireless
by
Chakma, Avijoy, author.
Format:
Excerpt:
system. An efficient PM2.5 monitoring is of great benefit for human health and air pollution control. In
by
Ogemuno, Emamuzo Cletus, author.
Format:
Excerpt:
network access control. Also known as typing dynamics, keystroke refers to a method that identifies users
by
Gundala palle, Santosh reddy, author.
Format:
Excerpt:
Controlling Applications etc.) in IoT which requires quick response to react and control the situations if
by
Thames, Lane. editor.
Format:
Excerpt:
Viewpoint of Industrial Control System Security: An Inference-based Intrusion Detection System -- Practical
by
Bandekar, Ashutosh, author.
Format:
Excerpt:
limited power resource available to these wireless devices. Since users, as well as attackers, can control
by
Crawford, Chris S., author.
Format:
Excerpt:
into applications for various purposes such as device control, user-state monitoring, training and
by
Kang, Tae Seung, author.
Format:
Excerpt:
control problem of the cart-pole (inverted pendulum) and fish locomotion. Experiments demonstrate that the
by
Sylvertooth, Randall Earl, author.
Format:
Excerpt:
for the future performance of other emerging AI robotic control systems, as they come online in the
by
Lankhorst, Marc. author.
Format:
Excerpt:
An enterprise architecture tries to describe and control an organisation’s structure, processes
by
Xu, Bo, author.
Format:
Excerpt:
number of control points. In addition to this idea, the super-reduced idea and the mesh refinement are

Select an Action





