نتایج جستجو برای: wave based control
تعداد نتایج: 4124569 فیلتر نتایج به سال:
The radio frequency identification (RFID) is a technology for automatic identification of items, particularly in supply chain, but it is becoming increasingly important for industrial applications. Unlike barcode technology that detects the optical signals reflected from barcode labels, RFID uses radio waves to transmit the information from an RFID tag affixed to the physical object. In contras...
Asymptotically exact and nonlocal fourth order nonlinear evolution equations are derived for two coupled fourth order nonlinear evolution equations have been derived in deep water for two capillary-gravity wave packets propagating in the same direction in the presence of wind flowing over water.We have used a general method, based on Zakharov integral equation.On the basis of these evolution eq...
Wave diffraction is a very important phenomenon in marine engineering and several models have been developed for its simulation. The new version of SWAN, a third generation spectral model, includes an approximation to wave diffraction. The approximation is based on the mild-slope equation for refraction and diffraction, omitting phase information. The objective this paper is to evaluate the per...
Objective: Mindful-based interventions have been the focus of attention among the third wave of cognitive-behavioral followers, in recent years. A variety of interventional techniques such as acceptance, emotional control, cognitive restructuring are increasingly incorporated into the interventional framework directed to help slow-paced population parents and caregivers. Method: The present stu...
The rapid emergence of GPS enabled devices, sensors and mobile equipment in commercial as well as government organizations has led to considerable research in timeand location-based access control schemes. Location-based access policies enhance the security of an application by restricting access to an object only from specified locations. On the other hand, temporal constraints provide granula...
Community computing is an agent-based development paradigm for ubiquitous computing systems. In a community computing system, ubiquitous services are provided by cooperation among agents. While agents cooperate, they interact with each other continuously to access data of other agents and/or to execute other agent’s actions. However, in cases of security-critical ubiquitous services such as med...
This paper offers several contributions for separation of duty (SoD) administration in role-based access control (RBAC) systems. We first introduce a new formal framework, based on business perspective, where SoD constraints are analyzed introducing the activity concept. This notion helps organizations define SoD constraints in terms of business requirements and reduces management complexity in...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید