نتایج جستجو برای: control methods

تعداد نتایج: 2926900  

2007
Natalia Kwasnikowska Jan Van den Bussche

Modern scientific research is characterized by extensive computerized data processing of laboratory results and other scientific data. Such processes are often complex, consisting of several data manipulating steps. We refer to such processes as dataflows, to distinguish them from more general workflows. General workflows also emphasize the control flow aspect of a process, whereas our focus is...

Journal: :Bio Systems 2011
T. K. Kar Ashim Batabyal

This paper focuses on the study of a nonlinear mathematical SIR epidemic model with a vaccination program. We have discussed the existence and the stability of both the disease free and endemic equilibrium. Vaccine induced reproduction number is determined and the impact of vaccination in reducing the vaccine induced reproduction number is discussed. Then to achieve control of the disease, a co...

2016
Richard Banach Michael J. Butler

Hybrid and cyberphysical systems pose significant challenges for a formal development formalism based on pure discrete events. This paper compares the capabilities of (conventional) Event-B for modelling such systems with the corresponding capabilities of the Hybrid Event-B formalism, whose design was intended expressly for such systems. We do the comparison in the context of a simple water tan...

2011
Michael Huth

Related Concepts – Access-control architectures – Formal verification – Identity management – Model-based development – Policy languages – Security policies Definition A formal method is any technique or method that aids in the construction and validation of computer-based systems and is based, in total or in part, on rigorous mathematics. Access control [8] refers to any method or mechanism by...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت دبیر شهید رجایی - دانشکده علوم انسانی 1392

this study investigated the impact of explicit instruction of morphemic analysis and synthesis on the vocabulary development of the students. the participants were 90 junior high school students divided into two experimental groups and one control group. morphological awareness techniques (analysis/synthesis) and conventional techniques were used to teach vocabulary in the experimental groups a...

2007
Indrakshi Ray Manachai Toahchoodee

With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of such information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for spatio-temporal-based access control is needed tha...

1996
Adam Lowell Schwartz James W. Demmel Shankar Sastry

THEORY AND IMPLEMENTATION OF NUMERICAL METHODS BASED ON RUNGE-KUTTA INTEGRATION FOR SOLVING OPTIMAL CONTROL PROBLEMS

2015
Christian Gierds

We consider open systems being described by an interface and behavior in form of an protocol. Interaction between open systems means exchange of messages. For the interaction to be correct, the interacting open systems must be able to terminate. The interaction of independently developed open systems is not guaranteed to be correct. Although one open system provides functionality a second open ...

2005
Giuseppe Conte Paris Pennesi G. Conte P. Pennesi

This paper describes a model predictive control strategy to tackle the inventory control problem in Supply Chains. The problem is formulated as a receding-horizon optimization problem and the market demand is considered an external unknown disturbance. The behaviour of the Supply Chain is modelled by discrete time difference equations, both the control variables and the output variables are con...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید