The aim of this study is threefold. First, a qualitative information security risk survey is implemented in human resources department of a logistics company. Second, a machine learning risk classification and predict...
详细信息
Boolean Differential Calculus (BDC) extends Boolean *** Boolean algebra is focused on values of logic functions,BDC allows the evaluation of changes of the function values. Such changes can be investigated between cer...
详细信息
ISBN:
(纸本)9781608451821
Boolean Differential Calculus (BDC) extends Boolean *** Boolean algebra is focused on values of logic functions,BDC allows the evaluation of changes of the function values. Such changes can be investigated between certain pairs of function values as well as regarding whole subspaces. Due to the same basic data structures, BDC can be applied to any task described by logic functions and equations together with the Boolean *** used is BDC in analysis, synthesis, and testing of digital circuits. In this chapter, we introduce basic definitions of BDC together with some typical applications.
By using the finite displacements theory, this paper establishes relations of dependency between the initial and the final positions of the car batteries and the geometric and design parameters of the robot. For this,...
详细信息
The aim of this paper is to investigate the efficiency of sequence alignment. The parallel computational model is based on mpiBlast algorithm, data decomposition and manager-worker algorithmic paradigm utilizing massa...
详细信息
ISBN:
(纸本)9789604742509
The aim of this paper is to investigate the efficiency of sequence alignment. The parallel computational model is based on mpiBlast algorithm, data decomposition and manager-worker algorithmic paradigm utilizing massage passing based on MPI and is verified on the basis of flat parallel program implementation on a supercomputer BlueGene/P.
The paper gives an insight of the work done so far in modelling and implementation of user adapted software systems or adaptive web sites. We introduce a five layer framework which gives to our adaptive web based syst...
详细信息
In the literature, there are several proposed block ciphers like AES, Square, Shark and Hierocrypt which use S-boxes that are based on inversion mapping over a finite field. Because of the simple algebraic structure o...
详细信息
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas ex...
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas exist. However, when it comes to designing a generalised predictive controller (GPC) four parameters have to be specified. To choose those parameters is not a trivial task since they are not directly related to control or regulation performance. The presented tuning method exploits model-parameters to select suitable controller parameters. Additionally, a Rhinehart filter is incorporated in the design to decrease the impact of noise, therefore, a fifth parameter has to be optimised. The proposed method has been tested in simulation and on a real system.
For a generic loop: while (constraints) {updates} it is well known that the termination problem is undecidable in general, even for a simple class of polynomial programs. If the constraints or the updating function in...
详细信息
Multicore has become a trend on server and client computers in recent years. Parallelization is one way to fully utilize the computing power provided by multicore architectures. Most applications of interest have comp...
详细信息
In developing multi-UAV(Unmanned Aerial Vehicle) system, a simulation environment is essential to verify the functionalities of the whole system with higher productivity and reduced risks of accidents. Simulations of ...
详细信息
暂无评论