نتایج جستجو برای: control methods

تعداد نتایج: 2926900  

2002
Volker Mehrmann Hongguo Xu

We study classical control problems like pole assignment, stabilization, linear quadratic control and H∞ control from a numerical analysis point of view. We present several examples that show the difficulties with classical approaches and suggest reformulations of the problems in a more general framework. We also discuss some new algorithmic approaches.

2004
Liviu Panait Sean Luke

Bloat control is an important aspect of evolutionary computation methods, such as genetic programming, which must deal with genomes of arbitrary size. We introduce three new methods for bloat control: Biased Multi-Objective Parsimony Pressure (BMOPP), the Waiting Room, and Death by Size. These methods are unusual approaches to bloat control, and are not only useful in various circumstances, but...

Journal: :Revue scientifique et technique 1994
F Jongejan G Uilenberg

Ticks are the most important ectoparasites of livestock in tropical and sub-tropical areas, and are responsible for severe economic losses both through the direct effects of blood sucking and indirectly as vectors of pathogens and toxins. Feeding by large numbers of ticks causes reduction in live weight gain and anaemia among domestic animals, while tick bites also reduce the quality of hides. ...

Journal: :The Ulster Medical Journal 2008
John Bale

TIERE is perhaps no literature dealing with specific disease addressed to the patient so voluminous as that on the subject of diabetes. This can probably be explained by the fact that there is no other disease in which the physician has to rely, to the same extent, upon self-treatment by the patient. Yet in spite of the plethora of books, this small volume, written by a certified dietitian, wil...

2005

As mosquitoes can transmit a number of diseases such as dengue fever, malaria, Japanese encephalitis, yellow fever etc., efforts have been made to control them. Control measures could be aimed at different stages of the insect in its life cycle. The measures can be classified as biological, environmental (physical) and chemical control. Integrated mosquito management approach should be adopted ...

2008
Laszlo Huber Brian T. Irving Milan M. Jovanović

In this paper, a systematic overview of PLL-based closed-loop control methods for interleaved DCM/CCM boundary boost PFC converters is presented. It is shown that the PLL-based closed-loop methods always provide stable operation, unlike the open-loop control methods, where the only method which results in stable operation is the slave synchronization to the turn-on instant of the master with cu...

1998
Virgil D. Gligor Serban I. Gavrila David F. Ferraiolo

In this paper we define formally a wide variety of separation-of-duty (SoD) properties, which include the best known to date, and establish their relationships within a formal model of role-based access control (RBAC). The formalism helps remove all ambiguities of informal definition, and offers a wide choice of implementation strategies. We also explore the composability of SoD properties and ...

1998
Mats Per Erik Heimdahl Constance L. Heitmeyer

High assurance computer systems are computer systems where convincing evidence is required that the system satis es a collection of critical properties. To operate correctly, these systems must satisfy properties such as safety and security. Examples of high assurance systems include ight control systems, medical systems, and control systems for nuclear plants. In addition, increased reliance o...

Journal: :Computers & Security 2006
Indrakshi Ray Mahendra Kumar

With the growing use of wireless networks and mobile devices, we are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, and it can also be exploited to launch attacks. For critical applications, such as the military, a formal model for location-based access control is ne...

2000
Pablo Galiasso Oliver Bremer John Hale Sujeet Shenoi David F. Ferraiolo Vincent C. Hu

Existing software infrastructures and middleware provide uniform security services across heterogeneous information networks. However, few, if any, tools exist that support access control policy management for and between large enterprise information networks. Insiders often exploit gaps in policies to mount devastating attacks. This paper presents a Policy Machine and Policy Mediation Architec...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید