نتایج جستجو برای: called control run

تعداد نتایج: 1694080  

2010
Seyed Morteza Babamir Saeed Jalili

To make an event-triggered real-time system safe in application layer, this study presents a specification-based run-time verification (RV) and fault tolerance approach in following steps: i) System is isolated from its environment by modeling interaction between them; ii) Considering safety requirements violation, observation-verification-tolerance rules are systematically obtained; and iii) R...

2017
Falin Wu Jiemin Chen Yuan Liang

Quadrotors are gaining an increasing interest in public and extensively explored in recent years. In many situations, a team of quadrotors is desired to operate in a certain shape, which is also called formation. In this paper, a linear PID controller is used to control each single quadrotor and a slide mode controller is adopted to solve the formation flying problem which employs the leader-fo...

2009
Adrian Lienhard Julien Fierz Oscar Nierstrasz

Conventional debugging tools present developers with means to explore the run-time context in which an error has occurred. In many cases this is enough to help the developer discover the faulty source code and correct it. However, rather often errors occur due to code that has executed in the past, leaving certain objects in an inconsistent state. The actual run-time error only occurs when thes...

Considering profiles as functional variables, two control charts are proposed for their monitoring in phase II. Due to its conformity with the nature of real-world profiles, applying functional model leads to proposed control charts obtained through functional data analysis techniques with desired features. These include simplicity in calculation and possibility of using them for different prof...

Let G be a finite group and C(G) be the family of representative conjugacy classes of subgroups of G. The matrix whose H;K-entry is the number of fixed points of the set G=K under the action of H is called the table of marks of G where H;K run through all elements in C(G). In this paper, we compute the table of marks and the markaracter table of groups of order pqr where p, q, r are prime numbers.

Journal: :CoRR 2017
Yüksel Arslan

Most attacks are launched inside the companies by the employees of the same company. These kinds of attacks are generally against layer-2, not against layer-3 or IP. These attacks abuse the switch operation at layer-2. One of the attacks of this kind is Address Resolution Protocol (ARP) Spoofing (sometimes it is called ARP poisoning). This attack is classified as the “man in the middle” (MITM) ...

2005
Ray C. Fair

Ragnar Frisch proposed in 1936 a procedure for estimating natural variable values by modifying what are now called structural macroeconometric models. This paper shows that Frisch’s procedure can be used to illuminate natural concepts using today’s models. The procedure also forces one to be precise regarding the assumptions used in moving from a short-run model to a medium-run or long-run model.

Journal: :The Lancet 1919

Journal: :Consensus 2023

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید