نتایج جستجو برای: formal control
تعداد نتایج: 1441030 فیلتر نتایج به سال:
As the level of distribution of resources in a shop floor grows, the development of control software for distributed shop floor control is of significant interest. Since hand-woven control software is expensive and difficult to reconfigure, a formal methodology that supports generating control software rapidly is in need of exploitation. Although a number of approaches to formal specification a...
We demonstrate how one can use the formal concept analysis (FCA) to obtain the role hierarchy for the role based access control from the existing access control matrix. We also discuss assesed by means of FCA the quality of security system and finding users with excess permissions.
We provide sufficient optimality conditions for optimal control problems with bang-bang controls. Building on a structural assumption on the adjoint state, we additionally need a weak second-order condition. This second-order condition is formulated with functions from an extended critical cone, and it is equivalent to a formulation posed on measures supported on the set where the adjoint state...
This paper proposes a system-wide optimal resource dispatch strategy that enables a shift from a primarily energy cost-based approach, to a strategy using simultaneous price signals for energy, power and ramping behavior. A formal method to compute the optimal sub-hourly power trajectory is derived for a system when the price of energy and ramping are both significant. Optimal control functions...
This article presents a formal method that enables to design a logic control system from specifications given in natural language. The aim of the proposed method is to prevent designer's faults coming from specifications misinterpretation. A significant part of the article is devoted to the presentation of the formal framework that underlies this formal design method: the algebra II. The operat...
We present a specification approach of secured systems as transition systems and security policies as constraints that guard the transitions. In this context, security properties are expressed as invariants. Then we propose an abduction algorithm to generate possible security policies for a given transition-based system. Because abduction is guided by invariants, the generated security policies...
This paper describes a combination of techniques from control engineering and formal methods in order to specify and implement control systems for hatch process operations. It extends previous work by providing a non-trivial specification for the top-level polling loop of a control system, and defining composition techniques for controllers. Batch process operations are common in industrial pra...
Although formal and informal control mechanisms are often simultaneously used to govern systems development projects, considerable disagreement exists about whether the use of one strengthens or diminishes the benefits of the other. In other words, are they complements or substitutes? Competing theoretical perspectives favor both sides of the argument, and neither the information systems (IS) c...
abstract given the importance of the text’s formal aspects, in addition to its content, poetry presents special challenges to translators. poetry has its own distinctive features that cannot be rendered into another language easily. the translation of poetry into poetry entails preserving the rhyme, figurative language and the general tone of the original. the present study was an attempt to i...
One of the primary concerns in developing computer embedded safety-critical systems is how to develop quality software. Software must fulll its functional requirements and must not contribute to the violation of safety properties of the entire system. To this end, capturing error free and satisfactory functional requirements is crucial before proceeding to the subsequent development phases. We ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید