نتایج جستجو برای: process detection

تعداد نتایج: 1826329  

Journal: :Mechanical Systems and Signal Processing 1993

Journal: :Journal of Korean Institute of Industrial Engineers 2015

ژورنال: کنترل 2022

Fault detection has always been important in aviation systems to prevent many accidents. This process is possible in different ways. In this paper, we first identify the longitudinal axis plane model using neural network approach. Then based on the obtained model and using fuzzy logic, the aircraft status sensor fault detection unit was designed. The simulation results show that the fault detec...

Journal: :international journal of automotive engineering 0
a. khodayari m. yousefi

in recent years due to improvements of technology within automobile industry, design process of advanced driver assistance systems for collision avoidance and traffic management has been investigated in both academics and industrial levels. detection of traffic signs is an effective method to reach the mentioned aims. in this paper a new intelligent driver assistance system based on traffic sig...

A hardware attack that enables the attacker to alter the main circuit with malicious hardware during either design or the fabrication process is studied and analyzed. This attack, known as the hardware Trojan, has different objectives such as destroying hardware, changing circuit characteristics or extracting sensitive information. So hardware Trojan detection and hardware security are critical...

Jafari , Marzieh, Safdarinezhad , Alireza , Shakeri , Iman ,

Today, medicinal plants have a special place in the economy and health of a society. Due to the natural growth of many of these products, the necessity of zoning them for optimum and optimal utilization seems necessary. Traditional zoning solutions are not efficient due to their low accuracy and speed, therefore a new approach is needed. Remote sensing data have many applications in various fie...

Mehdi Abadi Sa'eed Jalili

In this paper, we propose an approach for automatic generation of novel intrusion signatures. This approach can be used in the signature-based Network Intrusion Detection Systems (NIDSs) and for the automation of the process of intrusion detection in these systems. In the proposed approach, first, by using several one-class classifiers, the profile of the normal network traffic is established. ...

Policy evaluation is a process to determine whether a request submitted by a user satisfies the access control policies defined by an organization. Modality conflict is one of the main issues in policy evaluation. Existing modality conflict detection approaches do not consider complex condition attributes such as spatial and temporal constraints. An effective authorization propagation rule is n...

Journal: :Indonesian Journal of Electrical Engineering and Computer Science 2021

This paper presents a novel approach for improving the computation speed of ball detection and obstacle processes in our robot. The conditions robot still have slow processing speed, this condition makes not real-time robot's movement is hampered. To build good world model, things to note are information detection. focus research increase process around process, it necessary optimize use OpenCV...

Djamil Rezki Laid Kahloul Leila Hayet Mouss Nafissa Rezki Okba Kazar

The objective of the current paper is to present an intelligent system for complex process monitoring, based on artificial intelligence technologies. This system aims to realize with success all the complex process monitoring tasks that are: detection, diagnosis, identification and reconfiguration. For this purpose, the development of a multi-agent system that combines multiple intelligences su...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید