Showing 101 - 120 results of 3,864 for search '"any"', query time: 0.05s Refine Results
  1. 101
  2. 102

    Adaptive control of unmanned quadrotor with partial actuator failure using model reference adaptive control (MRAC) with dynamic inversion by Agarwal, Anmol, Ng, Ee Meng, Low, Kin Huat

    Published 2021
    “…This paper proposes to analyze algorithm for adaptive control, mainly focused on the model reference adaptive control (MRAC) such that despite any uncertainty the plant parameters remain close to the behavior of a desired reference model along with dynamic inversion as an adaptive controller for such scenarios which helps in decoupling of the flight states for the non-linear system. …”
    Get full text
    Conference Paper
  3. 103

    Modeling of outdoor natural ventilation and energy performance for buildings in an industrial park by Tan, Joel Heang Kuan.

    Published 2013
    “…One method of cooling without the use of any electricity is by using natural convection. …”
    Get full text
    Final Year Project (FYP)
  4. 104

    Neural-network-based robust linearization and compensation technique for sensors under nonlinear environmental influences by Patra, Jagdish Chandra, Chakraborty, Goutam, Meher, Pramod Kumar

    Published 2011
    “…A multilayer perceptron is utilized to transfer the nonlinear CPS characteristics at any operating temperature to a linearized response characteristics. …”
    Get full text
    Get full text
    Journal Article
  5. 105

    Hybrid K -means clustering and support vector machine method for via and metal line detections in delayered IC images by Cheng, Deruo, Shi, Yiqiong, Lin, Tong, Gwee, Bah-Hwee, Toh, Kar-Ann

    Published 2019
    “…The main contributions of the proposed method include: 1) fully automated detection of via and metal line positions without any need of human interventions and 2) novel hybrid methodology to embody K-means clustering and support vector machine for retrieving precise positions of vias and metal lines in contrast to the individual techniques, which can only provide a region for the detected elements. …”
    Get full text
    Get full text
    Journal Article
  6. 106

    ASIC-based design of NMR system health monitor for mission/safety–critical applications by Balasubramanian, Parvathavarthini

    Published 2018
    “…In passive NMR, at least a majority (N + 1)/2 out of N function modules is expected to operate correctly at any time, where N is odd. Apart from a conventional realization of the NMR system, it would be useful to provide a concurrent indication of the system’s health so that an appropriate remedial action may be initiated depending upon an application’s safety criticality. …”
    Get full text
    Get full text
    Journal Article
  7. 107

    Enhanced hidden moving target defense in smart grids by Tian, Jue, Tan, Rui, Guan, Xiaohong, Liu, Ting

    Published 2019
    “…Moreover, we analyze the completeness of MTD and show that any hidden MTD is incomplete in that FDI attacks may bypass the hidden MTD opportunistically. …”
    Get full text
    Get full text
    Journal Article
  8. 108

    Hardware-efficient systolic-like modular design for two-dimensional discrete wavelet transform by Meher, Pramod Kumar, Mohanty, Basant Kumar, Patra, Jagdish Chandra

    Published 2011
    “…The storage space is found to occupy most of the area in the existing 2-D DWT structures but the proposed structure does not require any on-chip or off-chip storage of input samples or storage/transposition of intermediate output. …”
    Get full text
    Get full text
    Journal Article
  9. 109

    ISO/IEC 27001 : 2022(E): Information security, cybersecurity and privacy protection - Information security management systems - Requirements by The International Organization for Standardization issuing body 656412, International Organization for Standardization (Online service) 656413

    Published 2022
    “…The ISO/IEC 27001 standard provides companies of any size and from all sectors of activity with guidance for establishing, implementing, maintaining and continually improving an information security management system. …”
    software, multimedia
  10. 110
  11. 111
  12. 112
  13. 113
  14. 114
  15. 115

    Implementation of Dijkstra's shortest path algorithm for vehicle routing by Pang, Jacquelyn Jiaqi

    Published 2017
    “…My project is to implement Dijkstra’s algorithms via COM programming to find the shortest path between any two locations.…”
    Get full text
    Final Year Project (FYP)
  16. 116
  17. 117

    The moral inefficacy of carbon offsetting by John, TM, Askell, A, Wilkinson, H

    Published 2024
    “…Standard moral theories hence deny that such offsetting succeeds. Indeed, we show that any moral theory that allows offsetting in this setting faces a dilemma between allowing any wrong to be offset, no matter how grievous, and recognising an implausibly sharp discontinuity between offsettable actions and non-offsettable actions. …”
    Journal article
  18. 118

    Flow and deformation due to periodic loading in a soft porous material by Fiori, M, Pramanik, S, Macminn, CW

    Published 2023
    “…We develop analytical solutions for slow loading at any amplitude and for infinitesimal amplitude at any period. …”
    Journal article
  19. 119

    NEGOTIATE your way to RICHES / by Wink, Peter, 1966-, author 655681

    Published 2003
    “…Negotiate Your Way to Riches is unlike any negotiating book you've ever read. This book not only cover business negotiations, it also teaches you how to get deals on everyday personal purchases. …”
    text
  20. 120