Results 51 to 60 of about 207,450 (214)

Multi-Agent Cooperation for Particle Accelerator Control [PDF]

open access: yes, 1996
We present practical investigations in a real industrial controls environment for justifying theoretical DAI (Distributed Artificial Intelligence) results, and we discuss theoretical aspects of practical investigations for accelerator control and ...
Skarek, P., Varga, László Zsolt
core   +1 more source

Tactile tensions: uncertainty, mutuality, and therianthropic nightmares in Highland Odisha Tact et tensions : incertitude, mutualité et cauchemars thérianthropiques dans les hautes terres de l'Odisha

open access: yesJournal of the Royal Anthropological Institute, EarlyView.
In the central highlands of Odisha, India, Kutia Kondh families navigate a precarious reality shaped by productive autonomy, decentralized authority, and material and relational uncertainty. Abundance and destitution are finely balanced in a world where humans, animals, ancestors, and spirits are co‐present and co‐dependent but also opaque and ...
Sam Wilby
wiley   +1 more source

Beamspace Unitary ESPRIT Algorithm for Angle Estimation in Bistatic MIMO Radar

open access: yesInternational Journal of Antennas and Propagation, 2015
The beamspace unitary ESPRIT (B-UESPRIT) algorithm for estimating the joint direction of arrival (DOA) and the direction of departure (DOD) in bistatic multiple-input multiple-output (MIMO) radar is proposed. The conjugate centrosymmetrized DFT matrix is
Dang Xiaofang   +3 more
doaj   +1 more source

Practical Reasoning and Rationality [PDF]

open access: yes, 2013
Proceedings of the DRUMS II Workshop 9 - 11 February 1996, Windsor, UK (Funded by Esprit III BRA ...
Bell, John, Huang, Zhisheng
core  

Communication and control in small batch part manufacturing [PDF]

open access: yes, 1993
This paper reports on the development of a real-time control network as an integrated part of a shop floor control system for small batch part manufacturing. The shop floor control system is called the production control system (PCS).
Curtis, W.   +2 more
core   +2 more sources

Society beyond morality: mimesis, sovereignty, and being not‐human in the Nyau associations of Malawi La société par‐delà la moralité : mimèse, souveraineté et existence non humaine dans les sociétés Nyau du Malawi

open access: yesJournal of the Royal Anthropological Institute, EarlyView.
Nyau masked dancers embodying a variety of people, animals, and objects appear at many public events in Chewa areas of Malawi. Understood to be the physical manifestation of ancestral spirits, these entities are classified as ‘not human’ and transgress ordinary morality, mocking and threatening audiences.
Sam Farrell
wiley   +1 more source

Hasard et Littérature dans Les Essais et au XVIe siècle : de la « Rencontre »

open access: yesRevue Italienne d'Etudes Françaises, 2018
En prenant pour bases le Thrésor de Nicot puis les Essais de Montaigne, l’article examine le spectre sémantique du terme « rencontre » dans le français du XVIe siècle, passant du domaine de la référence (rencontre militaire, rencontre amicale) à celui de
Olivier Guerrier
doaj   +1 more source

“Disguised in scarlet”. Hume and Turin in 17481 [PDF]

open access: yes, 2010
Archive Research concerning the following subjects: Hume in Turin (8 May - 29 November 1748) as secretary and aide-de-camp to General St Clair. St Clair's mission and correspondence (his letters written by Hume).
Mazza, Emilio, Piccoli, Edoardo
core  

«Différant des Autres», Espacements et Temporalités Spectrales

open access: yesAnthropology of Consciousness, EarlyView.
ABSTRACT That night that he agreed to our suggestion that we accompany him outside, for the whole night or until the overflow has passed, M seemed to be in direct contact with all the layers of astronomy, inhabiting all temporalities simultaneously. Outside, lying/sitting on the picnic table, in the pitch‐black darkness of the night in the woods, under
Amélie‐Anne Mailhot
wiley   +1 more source

Enhancing Two-Factor Authentication Security by Analyzing and Detecting SMS OTP-Interception Techniques in Android Malware

open access: yesIEEE Access
Two-factor authentication (2FA) is a foundational security mechanism that significantly enhances user identity verification’s reliability. Despite the availability of various 2FA implementation methods, a considerable proportion still relies on ...
Maciej Bartlomiejczyk   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy