Frampeik frå ei faren tid
نویسندگان
چکیده
منابع مشابه
Automatic ei
This paper describes a general approach for automatically programming a behavior-based robot. New behaviors are learned by trial and error using a performance feedback function as reinforcement. Two algorithms for behavior learning are described that combine techniques for propagating reinforcement values temporally across actions and spatially across states. A behavior-based robot called OBELI...
متن کاملTID Effect in SOI Technology
In this paper, a brief overview of TID effect in SOI technology is presented. The introduction of buried oxide(BOX) adds vulnerability to TID effect in SOI transistors because of its large thickness. Also the BOX introduces special charge traps, the delocalized spin centers, which in most cases are positive. The charge buildup in BOX could increase the leakage current in front gate transistor i...
متن کاملTiD - Documentation of TOBI Interface D
4 TiD Message 2 4.1 Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 4.2 Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 4.3 Description . . . . . . . . . . . . . . . . . . ....
متن کاملEI / c from the lattice *
Results from a lattice calculation of the matrix elements of the weak Hamiltonian which determine c’ are presented. They suggest a smaller value of 8/c than previously estimated. Submitted to Physics Letters * Work supported in part by the Department of Energy, contract DE-AC03-76SF00515 5 J. Robert Oppenheimer Fellow $ Present address: Brown University, Providence, RI 02912
متن کاملAmalgamation of Cyclic Bit Operation in SD-EI Image Encryption Method: An Advanced Version of SD-EI Method: SD-EI Ver-2
In this paper, the author presents an advanced version of image encryption technique, which is itself an upgraded version of SD-EI image encryption method. In this new method, SD-EI Ver-2, there are more bit wise manipulations compared to original SD-EI method. The proposed method consist of three stages: 1) First, a number is generated from the password and each pixel of the image is converted...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Tidsskrift for Den norske legeforening
سال: 2009
ISSN: 0029-2001
DOI: 10.4045/tidsskr.09.0889