نتایج جستجو برای: computing methodologies

تعداد نتایج: 466250  

2009
Kemalettin Erbatur

Soft computing methodologies, when used in combination with sliding-mode control (SMC) systems, aim to alleviate implementation difficulties of SMCs or to intelligently tune the controller parameters. In this paper, it is proposed to combine adaptive fuzzy systems with SMCs to solve the chattering problem of sliding-mode control for robotic applications. In the design of the controller, special...

2010
Shahid Siddiq Aasim Ali Kamran Malik

Ubiquitous Computing (UC) is an emerging technology of sharing the information by using large collection of computing devices. Sharing of information is in terms of availability of information at every time, every where and in invisible form. In Ubiquitous computing power of desktop paradigm is distributed to every day electronic devices in an invisible mode. Rather saying that we are living in...

2015
Wei Zhang

This paper initially analyzes the methods of four attack types, including Probing, DoS (Denial of Service), R2L (Remote to Local) and U2R (User to Root). It then categorizes attacks into four cases which are, respectively, one host-one host, one host-many hosts, many hosts-one host and many hosts-many hosts. Categorization is based on resource and destination addresses of network packages. Gran...

2002
Erwin Aitenbichler Max Mühlhäuser

Research on ubiquitous computing (UC) infrastructures at the Telecooperation Group emphasizes ears-and-mouth devices for nomadic users. In this context, the following document describes the prototype of such a device. This voicecentric headset features a Bluetooth radio for wireless network connectivity and a combination of sensors to gather context information, such as the location of the mobi...

2012
Tobias Ackermann Thomas Widjaja Alexander Benlian Peter Buxmann

Despite increasing interest in IT outsourcing (ITO) and the various benefits it promises, Cloud Computing (CC) as the currently most prevalent ITO paradigm still entails serious IT security risks. Little attention has been paid so far to fully and unambiguously capture the complex nature of IT security risks and how to measure it. Against this backdrop, we first propose a comprehensive conceptu...

2008
Moez Ben MBarka

The combination of cryptographic tools and tamper-resistant mechanisms appeared first in military applications to secure communication links using tamper-resistant cipher machines. The spread of ATM networks brought the technology into the commercial mainstream. During the last years, the use of embedded cryptographic processors has spread from low-cost cryptoprocessors, such as smart cards use...

2005
María José del Jesus Pedro González Francisco Herrera Mikel Mesonero

Nowadays, face to face contact with the client is fundamental to the development of marketing acts. In this sense trade fairs are a basic instrument in company marketing policies, especially in Industrial Marketing. In this paper, we study the use of Soft Computing methodologies, specifically Fuzzy Logic and Genetic Algorithms, in the design of the Data Mining algorithms most proper to this pro...

2010
Žarko Ćojbašić Vlastimir Nikolić Ivan Ćirić Sorin Grigorescu

In this paper, the computationally intelligent modeling approach for fluidized bed combustion process is considered, as well as intelligent process control based on developed models and soft computing methodologies. Applied genetic optimization and fuzzy modeling approach are combined with proposed intelligent control strategies. Efficient fuzzy nonlinear FBC process modeling by combining sever...

2010
Vladimir Privman

We consider approaches for controlling the buildup of noise by design of gates for chemical and biomolecular computing, in order to realize stable, scalable networks for multi-step information processing. Solvable rate-equation models are introduced and used to illustrate several recently developed concepts and methodologies. We also outline future challenges and possible research directions.

2006
Dr Samuel Mann Lesley Smith

This paper describes the pathway by which have arrived at teaching a particular combination of agile and structured methodologies in a software engineering course within a vocational computing degree. The background of teaching to a pure structured approach is followed by descriptions of eight iterations of increasing agility. The current approach: the “agile framework” is introduced and descri...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید