نتایج جستجو برای: based control
تعداد نتایج: 3958361 فیلتر نتایج به سال:
background drowning is a serious but neglected health problem in low-and middle-income countries. objectives to describe the effectiveness of drowning prevention program on the reduction of drowning mortality rates in rural settings at the north of iran, and guide its replication elsewhere. patients and methods this interventional design included pre- and post-intervention observations in the r...
this paper presents some analyses about the robust practical stability of a class of nonlinear affine systems in the presence of non-vanishing perturbations based on the passivity concept. the given analyses confirm the robust passivity property of the perturbed nonlinear systems in a certain region. moreover, robust control laws are designed to guarantee the practical stability of the perturbe...
Fuzzy control is one of the most important parts of fuzzy theory for which several approaches exist. Mamdani uses $alpha$-cuts and builds the union of the membership functions which is called the aggregated consequence function. The resulting function is the starting point of the defuzzification process. In this article, we define a more natural way to calculate the aggregated consequence funct...
Recently, there has been considerable interest in attribute based access control (ABAC) to overcome the limitations of the dominant access control models (i.e, discretionary-DAC, mandatory-MAC and role based-RBAC) while unifying their advantages. Although some proposals for ABAC have been published, and even implemented and standardized, there is no consensus on precisely what is meant by ABAC ...
Advancements in location technologies reliability and precision are fostering the development of location-based services that make use of the location information of users. An increasingly important category of such services is represented by Location-based Access Control (LBAC) systems that integrate traditional access control mechanisms with access conditions based on the physical position of...
the following question poped up: is there any relationship between iranian high school efl learners reading comprehension and listening comprehension? then the following null hypothesis (ho) was developed to the test the above, mentioned question. "there is no relationship between high school efl learners reading comprehension and listening comprehension. for nearly 16 weeks, the experimental g...
Institutional collaborative systems focus on providing the fast, and secure connections to students, teaching and non-teaching staff members. Access control is more important in these types of systems because different kind of users access the system on different levels. So a proper architecture must be there for these kinds of systems, for providing an efficient and secure system. As lot of wo...
The traditional manual way of thesis management is increasingly satisfying the demand of thesis guidance and administrative management in the information age. To improve the traditional manual undergraduate thesis writing, guidance and administrative management process in Southwest University of China, a Role-based access control (RBAC) Workflow model for thesis management is developed. In the ...
Delegation in access control takes place in the presence of an access control model, when a user is unable to perform their administratively assigned permissions. In this paper, we discuss the meanings of the word “delegation” found in the literature, focusing on its use in access control. In the context of a rolebased access control model, we survey many possible ways in which delegation can b...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید