Search

Your search keyword '"lcsh:Cybernetics"' showing total 513 results

Search Constraints

Start Over You searched for: Descriptor "lcsh:Cybernetics" Remove constraint Descriptor: "lcsh:Cybernetics"
513 results on '"lcsh:Cybernetics"'

Search Results

1. Chi teme i giudici robot

2. La lama della rete. Forme della violenza contro le donne sul web

3. Application of information communication technology (ICT) to legislative drafting: case studies of legislative drafting assistant softwares in Nigeria and Canada

4. Second‐order terminal sliding mode control based on perturbation estimation for nanopositioning stage

5. OVERVIEW OF PIRATED SOFTWARE ON CAMPUS: EDUCATORS' PERSPECTIVE

6. THE EFFECTIVENESS OF E-LEARNING APPLICATION BASED ON FRAMEWORK CODEIGNITER IN THE COVID19 PANDEMIC PERIOD (CASE STUDY STAIN TEUNGKU DIRUNDENG MEULABOH)

7. La violazione dei requisiti di sicurezza informatica di cui all’articolo 32 del GDPR

8. REPLICATION OF COMPARATIVE METHODS FOR SINGLE DATABASE PERFORMANCE IN CENTOS OPERATION SYSTEM WITH MAXSCALE

9. THE DEVELOPMENT OF WEB BASED LEARNING MEDIA NETWORK AND COMPUTER BASIC AT SMK NEGERI 1 LEMBAH MELINTANG

10. Review on vision‐based tracking in surgical navigation

11. Dynamic parameter identification of upper‐limb rehabilitation robot system based on variable parameter particle swarm optimisation

12. Active steering control for vehicle rollover risk reduction based on slip angle estimation

13. Gesture recognition for transhumeral prosthesis control using EMG and NIR

14. IMPLEMENTASI ALGORITMA NAIVE BAYES DAN RANDOM FOREST DALAM MEMPREDIKSI PRESTASI AKADEMIK MAHASISWA UNIVERSITAS ISLAM NEGERI AR-RANIRY BANDA ACEH

15. ANALISIS DAN PERANCANGAN SISTEM INFORMASI PENGARSIPAN SURAT BERBASIS WEB PADA KANTOR LURAH DESA DAYAH TUHA

16. IMPLEMENTASI DAN ANALISIS CLOUD GAMING SKYEGRID PADA PERANGKAT ANDROID

17. PENERAPANA METODE NATIONAL INSTITUTE OF STANDARS AND TECHNOLOGY (NIST) DALAM ANALISIS FORENSIK DIGITAL UNTUK PENANGANAN CYBER CRIME

18. ANALISA PROSES MIGRASI MYSQL NON-CLUSTER KE CLUSTER DALAM MENANGANI FAIL-OVER SISTEM AKADEMIK UNIVERSITAS SYIAH KUALA

19. Vision‐based tip position tracking control of two‐link flexible manipulator

20. Non‐linear optimal control for multi‐DOF electro‐hydraulic robotic manipulators

21. Linear geometric algebra rotor estimator for efficient mesh deformation

22. Survey of UAV motion planning

23. Modified constrained adaptive formation control scheme for autonomous underwater vehicles under communication delays

24. Failsafe mechanism design of multicopters based on supervisory control theory

25. Filtering enhanced tomographic PIV reconstruction based on deep neural networks

26. La conservazione dei documenti che alimentano il Fascicolo Sanitario Elettronico

27. I dati non personali: la natura e il valore

28. Perché scrivere chiaro. Dal semplicismo alla pertinenza del linguaggio giuridico (ai fini del discorso e dei suoi destinatari)

30. An Interactive Content Media on Information System iLearning+

31. GSA to Obtain SVM Kernel Parameter for Thyroid Nodule Classification

32. Classification of Traffic Vehicle Density Using Deep Learning

33. Chatbot in Bahasa Indonesia using NLP to Provide Banking Information

34. Combination of AHP Method and VIKOR Method For Assesing Sunday School Teacher

35. The Evaluation QS-WFQ Scheduling Algorithm For IoT Transmission To Cloud

36. Agent-based Truck Appointment System for Containers Pick-up Time Negotiation

37. Oversampling Method To Handling Imbalanced Datasets Problem In Binary Logistic Regression Algorithm

38. The Analysis of Web Server Security For Multiple Attacks in The Tic Timor IP Network

39. Clustering User Characteristics Based on the influence of Hashtags on the Instagram Platform

40. Spatial Condition in Intuitionistic Fuzzy C-Means Clustering for Segmentation of Teeth in Dental Panoramic Radiographs

41. L'accesso all’informazione giuridica e in particolare al dato bibliografico relativo alla dottrina giuridica: un confronto fra il panorama francese e quello italiano

42. Application of Text Message Held in Image Using Combination of Least Significant Bit Method and One Time Pad

43. Evoluzione documentale ed evoluzione istituzionale. Il caso del Sistema Informativo Integrato per i mercati dell’energia

44. I processi automatici di decisione: profili critici sui modelli di analisi e impatti nella relazione con i diritti individuali

45. ICT e integrazione: strumenti di e-government a supporto dell’accesso all’informazione e del processo di inclusione nelle società interculturali

46. Percorsi di cittadinanza interculturale e digitale con le nuove generazioni: il progetto #IOPARTECIPO

47. Modification of Stemming Algorithm Using A Non Deterministic Approach To Indonesian Text

48. Robust tracking control of a robot manipulator using a passivity‐based extended‐state observer approach

49. Modern Issues in Cyber Forensics and Digital Intelligence: A Critical, Case-Studies-Based Overview in Light of the Announced Legislative Reforms

50. Extreme learning‐based non‐linear model predictive controller for an autonomous underwater vehicle: simulation and experimental results

Catalog

Books, media, physical & digital resources