نتایج جستجو برای: physical control
تعداد نتایج: 1911876 فیلتر نتایج به سال:
Physical security has received increased attention after 9/11. However, access control to physical units has not been explored much. On the other hand, there is a rich literature on access control to information. These two areas appear converging as seen by recent products and studies. However, use of different notations and implementation details make this convergence harder. We need to try to...
Whether a control application should be considered CPS or not depends on (at least) three different things. A control system is a CPS when the temporal effects of the implementation platform caused by computing and communication, needs to modeled and included in the design at a more detailed levels than what is traditionally done in computer-based control (periodic sampling and constant latenci...
The advance of embedded systems and networking technology has facilitated a paradigm shift in engineering system design, from centralized to distributed. This shift has lead to significant interest in the design and analysis of multi-agent networks. A multi-agent network, or networked multi-agent system, consists of a set of agents, or nodes that may represent processors, robots, and so on. The...
background: regular physical activity has a positive effect on physical, mental, and social aspects of individual and community health. regarding prevalence of non-communicable diseases such as primary hypertension, osteoporosis, and cardiovascular diseases that sedentary is responsible for them, health policy makers plan to encourage people to do more physical activity. growth of beneficial he...
Access control devices and systems comprise an important part of every security system. Even the simplest single-door access control system includes at least an electric strike to automatically unlock the door, a timer to make sure that the door does not stay open all day, and a bell or light to indicate when the door is opened or that it has not reclosed properly. In a large-scale security sys...
With the growth of wireless networks and mobile devices, we are moving closer towards an era of cyberphysical systems (CPSs). Such systems have the potential to benefit numerous applications in areas as diverse as military, financial, and health care. However, security issues must be addressed before CPSs can be widely deployed. The problem is serious because CPSs involve interactions between a...
The method of coherent control allows one to exploit classical and quantum-mechanical interferences to control the dynamics of atomic, molecular, and solid-state systems, and to drive them into novel, non-equilibrium states. This technique has been widely applied to control both electronic and vibrational degrees of freedom in a variety of systems. Typically, a sequence of femtosecond pulses ex...
The subject and methodology of an emerging field related to physics, control theory and indormation theory are outlined. The paradigm of cybernetical physics as studying physical systems by cybernetical means is discussed. Examples of transformation laws describing excitability properties of dissipative and bistable systems are presented. A possibility of application to analysis and design of i...
It is well known that energy-balancing control is stymied by the presence of pervasive dissipation. To overcome this problem in electrical circuits, the alternative paradigm of power shaping was introduced in Ortega, Jeltsema, and Scherpen (2003)—where, as suggested by its name, stabilization is achieved shaping a function akin to the power instead of the energy function. In this paper we exten...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید