نتایج جستجو برای: wave based control

تعداد نتایج: 4124569  

Journal: :Journal of the Visualization Society of Japan 1999

Journal: :Eng. Appl. of AI 2008
Pavel Vrba Filip Macurek Vladimír Marík

The radio frequency identification (RFID) is a technology for automatic identification of items, particularly in supply chain, but it is becoming increasingly important for industrial applications. Unlike barcode technology that detects the optical signals reflected from barcode labels, RFID uses radio waves to transmit the information from an RFID tag affixed to the physical object. In contras...

J. Mondal K. Dhar

Asymptotically exact and nonlocal fourth order nonlinear evolution equations are derived for two coupled fourth order nonlinear evolution equations have been derived in deep water for two capillary-gravity wave packets propagating in the same direction in the presence of wind flowing over water.We have used a general method, based on Zakharov integral equation.On the basis of these evolution eq...

Journal: مهندسی دریا 2010
Amir Etemad-Shahidi, Mohammad Saeed Najafi,

Wave diffraction is a very important phenomenon in marine engineering and several models have been developed for its simulation. The new version of SWAN, a third generation spectral model, includes an approximation to wave diffraction. The approximation is based on the mild-slope equation for refraction and diffraction, omitting phase information. The objective this paper is to evaluate the per...

ژورنال: کودکان استثنایی 2019

Objective: Mindful-based interventions have been the focus of attention among the third wave of cognitive-behavioral followers, in recent years. A variety of interventional techniques such as acceptance, emotional control, cognitive restructuring are increasingly incorporated into the interventional framework directed to help slow-paced population parents and caregivers. Method: The present stu...

2006
Mahendra Kumar Richard E. Newman

The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in timeand location-based access control schemes. Location-based access policies enhance the security of an application by restricting access to an object only from specified locations. On the other hand, temporal constraints provide granula...

2008
Youna Jung Amirreza Masoumzadeh James B. D. Joshi Minkoo Kim

Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among agents. While agents cooperate, they interact with each other continuously to access data of other agents and/or to execute other agent’s actions. However, in cases of security-critical ubiquitous services such as med...

Journal: :CoRR 2008
Alessandro Colantonio Roberto Di Pietro Alberto Ocello

This paper offers several contributions for separation of duty (SoD) administration in role-based access control (RBAC) systems. We first introduce a new formal framework, based on business perspective, where SoD constraints are analyzed introducing the activity concept. This notion helps organizations define SoD constraints in terms of business requirements and reduces management complexity in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید