نتایج جستجو برای: protection systems

تعداد نتایج: 1344171  

2004
Paresh Date Alexander Lanzon

Center for Analysis of Risk and Optimisation Modelling Applications, School of Information Systems, Computing and Mathematics, Brunel University, Uxbridge UB8 3PH, U.K. Department of Systems Engineering, Research School of Information Sciences and Engineering, The Australian National University, Canberra ACT 0200, Australia National ICT Australia Ltd., Locked Bag 8001, Canberra ACT 2601, Australia

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علوم پایه دامغان 1389

in this thesis, ‎‎using‎‎ ‎concept‎s‎ ‎of‎ ‎wavelet‎s‎ ‎theory ‎‎‎som‎e‎ ‎methods‎‎ ‎of‎ ‎th‎e ‎solving‎‎ ‎optimal‎‎ ‎‎con‎tr‎ol‎ problems ‎(ocps)‎‎. ‎g‎overned by time-delay systems is investigated. ‎th‎is‎ thesis contains ‎tw‎o parts. ‎‎first, the method of obtaining ‎o‎f ‎the‎ ‎‎ocps‎ in time delay systems by linear legendre multiwavelets is ‎ ‎presented‎.‎‎‎‎ the main advantage of the meth...

A. Akbari A. Patooghy E. Aerabi M. Fazeli M. Kaykha

Embedded systems are suggestive targets for code injection attacks in the recent years. Software protection mechanisms, and in general computers, are not usually applicable in embedded systems since they have limited resources like memory and process power. In this paper we investigate side channel characteristics of embedded systems and their applicability in code injection attack detection. T...

2012
Eduardo de Paiva Luiz A. R. da Rosa

The skyshine radiation phenomenon consists of the scattering of primary photon beams in the atmosphere above the roof of a medical linear accelerator facility, generating an additional dose at ground level in the vicinity of the treatment room. Thus, with respect to radioprotection, this situation plays an important role when the roof is designed with little shielding and there are buildings ne...

2012
Zitha Mokomane

Dr. Zitha Mokomane is a Senior Research Specialist in the Population Health, Health Systems and Innovation research programme at the Human Sciences Research Council in South Africa. She holds a MA and a PhD (Family Demography), both from the Australian National University. Before joining the Human Science Research Council, Dr Mokomane was a Senior Lecturer in the Department of Population Studie...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید باهنر کرمان - دانشکده ریاضی و کامپیوتر 1389

چکیده در این پایاننامه ابتدا فضاهای متریک فازی را به صورت مشاهدهگرایانه بررسی میکنیم. فضاهای متریک فازی و توپولوژی تولید شده توسط این متریک معرفی شدهاند. سپس بر اساس فضاهایی که در فصل اول معرفی شدهاند آشوب توپولوژیکی، مینیمالیتی و مجموعههای متقاطع در شیوههای مختلف بررسی شده- اند. در فصل سوم مفهوم مجموعههای جاذب فازی به عنوان یک مفهوم پایهای در سیستمهای نیم-دینامیکی نسبی، تعریف شده است. ...

2003
R. Wilkins

Transient voltage surge suppressors (TVSSs) using MOV technology are widely used to protect power systems and components against the effects of transient overvoltages. However MOVs can fail explosively under certain conditions, and protection is needed. Thermal protectors provide protection against failure under sustained power-frequency overvoltages, and in the paper the requirements for and p...

2015
Hubert Chanson

For the last decades, the design floods of numerous embankment reservoirs were re-evaluated, and the revised spillway outflows are typically larger than those used in the original designs. As a result, a number of overtopping protection systems were developed for embankments and earthfill dams, with applications encompassing river dykes, coastal barriers for storm surge and tsunami protections....

2011
D. E. Denning W. L. Ruzzo

Theories of protection powerful enough to resolve security questions of computer systems are considered. Mo single theory of protection is adequate for proving whether the security afforded by an arbitrary protection system suffices to safeguard data from unauthorized access. When theories of protection are restricted' to computer systems which are bounded in size, adequate theories exist, but ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید