نتایج جستجو برای: based control

تعداد نتایج: 3958361  

Journal: :archives of trauma research 0
ali davoudi-kiakalayeh trauma research center, guilan university of medical sciences,سازمان اصلی تایید شده: دانشگاه علوم پزشکی گیلان (guilan university of medical sciences) reza mohammadi department of public health sciences, division of social medicine, karolinska institutet, sweden shahrokh yousefzadeh-chabok trauma research center, guilan university of medical sciences,سازمان اصلی تایید شده: دانشگاه علوم پزشکی گیلان (guilan university of medical sciences)

background drowning is a serious but neglected health problem in low-and middle-income countries. objectives to describe the effectiveness of drowning prevention program on the reduction of drowning mortality rates in rural settings at the north of iran, and guide its replication elsewhere. patients and methods this interventional design included pre- and post-intervention observations in the r...

Journal: :journal of electrical and computer engineering innovations 0
hamed chenarani department of electrical and electronic engineering, shiraz university of technology, shiraz, iran. tahereh binazadeh department of electrical and electronic engineering, shiraz university of technology, shiraz, iran.

this paper presents some analyses about the robust practical stability of a class of nonlinear affine systems in the presence of non-vanishing perturbations based on the passivity concept. the given analyses confirm the robust passivity property of the perturbed nonlinear systems in a certain region. moreover, robust control laws are designed to guarantee the practical stability of the perturbe...

Jozsef Dombi, Tamas Szepe

Fuzzy control is one of the most important parts of fuzzy theory for which several approaches exist. Mamdani uses $alpha$-cuts and builds the union of the membership functions which is called the aggregated consequence function. The resulting function is the starting point of the defuzzification process. In this article, we define a more natural way to calculate the aggregated consequence funct...

2012
Xin Jin Ram Krishnan Ravi S. Sandhu

Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the dominant access control models (i.e, discretionary-DAC, mandatory-MAC and role based-RBAC) while unifying their advantages. Although some proposals for ABAC have been published, and even implemented and standardized, there is no consensus on precisely what is meant by ABAC ...

2007
M. Cremonini S. De Capitani di Vimercati P. Samarati

Advancements in location technologies reliability and precision are fostering the development of location-based services that make use of the location information of users. An increasingly important category of such services is represented by Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with access conditions based on the physical position of...

پایان نامه :0 1374

the following question poped up: is there any relationship between iranian high school efl learners reading comprehension and listening comprehension? then the following null hypothesis (ho) was developed to the test the above, mentioned question. "there is no relationship between high school efl learners reading comprehension and listening comprehension. for nearly 16 weeks, the experimental g...

Journal: :CoRR 2013
Muhammad Umar Aftab Amna Nisar Asif Adeel Ashraf Burhan Gill

Institutional collaborative systems focus on providing the fast, and secure connections to students, teaching and non-teaching staff members. Access control is more important in these types of systems because different kind of users access the system on different levels. So a proper architecture must be there for these kinds of systems, for providing an efficient and secure system. As lot of wo...

Journal: :JSW 2015
Kui Liu Zhurong Zhou Qianguo Chen Xiaoli Yang

The traditional manual way of thesis management is increasingly satisfying the demand of thesis guidance and administrative management in the information age. To improve the traditional manual undergraduate thesis writing, guidance and administrative management process in Southwest University of China, a Role-based access control (RBAC) Workflow model for thesis management is developed. In the ...

Journal: :JSW 2013
Sylvia L. Osborn He Wang

Delegation in access control takes place in the presence of an access control model, when a user is unable to perform their administratively assigned permissions. In this paper, we discuss the meanings of the word “delegation” found in the literature, focusing on its use in access control. In the context of a rolebased access control model, we survey many possible ways in which delegation can b...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید