نتایج جستجو برای: fuzzy supervisor
تعداد نتایج: 101429 فیلتر نتایج به سال:
In this paper, we present a complete digital signature message stream, just the way the RSA digital signature scheme does it. We will focus on the operations with large numbers due to the fact that operating with large numbers is the essence of RSA that cannot be understood by the usual illustrative examples with small numbers[1].
This paper describes emergent neurobiological characteristics of an intelligent multiple-controller that has been developed for simultaneously controlling the throttle, brake and steering subsystems of a validated vehicle model. Sample simulation results demonstrate the effectiveness of the proposed approach. While not explicitly designed for, the controller exhibits discrete behaviours, develo...
This thesis describes a proposed risk identification process that is intended to systematically identify potential risks that could materialize within a company’s supply chain that would affect component supply. The process is based on a specific situation at Nokia though is intended to extend to other companies that rely extensively on outsourced component manufacturing. An analysis of the cur...
Supervisor reduction procedure can be used to construct the reduced supervisor with a reduced number of states in discrete-event systems. The main concepts which are used in this procedure are control consistency of states, control cover, induced supervisor, and normality of the reduced supervisor w.r.t. the original supervisor. In this paper, it is proved that the reduced supervisor, construct...
Vehicular ad-hoc network (VANET) provides vehicle to vehicle and vehicle to RSAs (Road side antennas) communication. By using Multichannel TDMA MAC protocol, once per frame each node is ensured to access the Control channel which may cause delay at the receiver end. The Proposed “Vehicle Speed Synchronized protocol” will work on Control channel as well as on Service channel. The proposed protoc...
What difference does robotic telepresence make to the management of ambiguity in distributed knowledge work? We examined this question in a post-surgical intensive care where remote medical workers struggled to coordinate their work in the face of ambiguities related to their extremely sick patients. Our in-depth field study allowed us to explore how differently ambiguity was managed when night...
Credential revocation is a critical problem in grid environments and remains unaddressed in existing grid security solutions. We present a novel grid authentication system that solves the revocation problem. It guarantees instantaneous revocation of both long-term digital identities of hosts/users and short-lived identities of user proxies. With our approach, revocation information is guarantee...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید