نتایج جستجو برای: control methods
تعداد نتایج: 2926900 فیلتر نتایج به سال:
Modern scientific research is characterized by extensive computerized data processing of laboratory results and other scientific data. Such processes are often complex, consisting of several data manipulating steps. We refer to such processes as dataflows, to distinguish them from more general workflows. General workflows also emphasize the control flow aspect of a process, whereas our focus is...
This paper focuses on the study of a nonlinear mathematical SIR epidemic model with a vaccination program. We have discussed the existence and the stability of both the disease free and endemic equilibrium. Vaccine induced reproduction number is determined and the impact of vaccination in reducing the vaccine induced reproduction number is discussed. Then to achieve control of the disease, a co...
Hybrid and cyberphysical systems pose significant challenges for a formal development formalism based on pure discrete events. This paper compares the capabilities of (conventional) Event-B for modelling such systems with the corresponding capabilities of the Hybrid Event-B formalism, whose design was intended expressly for such systems. We do the comparison in the context of a simple water tan...
Related Concepts – Access-control architectures – Formal verification – Identity management – Model-based development – Policy languages – Security policies Definition A formal method is any technique or method that aids in the construction and validation of computer-based systems and is based, in total or in part, on rigorous mathematics. Access control [8] refers to any method or mechanism by...
this study investigated the impact of explicit instruction of morphemic analysis and synthesis on the vocabulary development of the students. the participants were 90 junior high school students divided into two experimental groups and one control group. morphological awareness techniques (analysis/synthesis) and conventional techniques were used to teach vocabulary in the experimental groups a...
With the growing advancement of pervasive computing technologies, we are moving towards an era where spatio-temporal information will be necessary for access control. The use of such information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, a formal model for spatio-temporal-based access control is needed tha...
The Effects of Coupling Adaptive Time-Stepping and Adjoint-State Methods for Optimal Control Problems
THEORY AND IMPLEMENTATION OF NUMERICAL METHODS BASED ON RUNGE-KUTTA INTEGRATION FOR SOLVING OPTIMAL CONTROL PROBLEMS
We consider open systems being described by an interface and behavior in form of an protocol. Interaction between open systems means exchange of messages. For the interaction to be correct, the interacting open systems must be able to terminate. The interaction of independently developed open systems is not guaranteed to be correct. Although one open system provides functionality a second open ...
This paper describes a model predictive control strategy to tackle the inventory control problem in Supply Chains. The problem is formulated as a receding-horizon optimization problem and the market demand is considered an external unknown disturbance. The behaviour of the Supply Chain is modelled by discrete time difference equations, both the control variables and the output variables are con...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید