Academic literature on the topic 'Formal control models'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Formal control models.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Formal control models"

1

Vilihura, Vladislav, Yuriy Gorbenko, Vitaliy Yesin, and Serhiy Rassomakhin. "Using formal security models in secure databases." Physico-mathematical modelling and informational technologies, no. 32 (July 7, 2021): 70–74. http://dx.doi.org/10.15407/fmmit2021.32.070.

Full text
Abstract:
The paper contains key provisions (requirements) that should be followed when building secure databases using the capabilities of the main formal access control models, such as discretionary access control models, mandatory access control models, role-based access control models. At the same time, it is noted that any security model does not provide protection but only provides the principle of building a secure database, the implementation of which should ensure the security properties inherent in the model. The security of the database is equally determined by: the properties of the model itself (one or more), its (their) adequacy to the threats affecting the system, and how it (they) is correctly implemented(s). The decisive factor in making a decision is always an assessment of a specific situation, which will allow you to make the right choice, including the complex use of formal models.
APA, Harvard, Vancouver, ISO, and other styles
2

Bi, Henry H., and John Nolt. "Toward a Formal Semantics for Control-Flow Process Models." Journal of Database Management 23, no. 2 (April 2012): 72–97. http://dx.doi.org/10.4018/jdm.2012040104.

Full text
Abstract:
A number of information systems have been developed to automate business processes. For process modeling, verification, and automation in information systems, a formal semantics of control-flow process models is needed. Usually process modeling languages (e.g., BPMN, EPC, IDEF3, UML, and WfMC standards) are used to represent control-flow process models. When these process modeling languages are developed, their informal semantics are typically described using examples, but their formal semantics are not defined. Although many different semantics for control-flow process models have been proposed, the existing semantics specifications have limitations because they do not support certain desirable features. In this paper, we propose a new formal semantics for control-flow process models. We show that it is more accurate, complete, and applicable than the existing semantics specifications.
APA, Harvard, Vancouver, ISO, and other styles
3

Bakker, Otto J., Jack C. Chaplin, Lavindra de Silva, Paolo Felli, David Sanderson, Brian Logan, and Svetan Ratchev. "Toward Process Control from Formal Models of Transformable Manufacturing Systems." Procedia CIRP 63 (2017): 521–26. http://dx.doi.org/10.1016/j.procir.2017.03.159.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pattee, H. H. "The limitations of formal models of measurement, control, and cognition." Applied Mathematics and Computation 56, no. 2-3 (July 1993): 111–30. http://dx.doi.org/10.1016/0096-3003(93)90118-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tittus, M., and B. Egardt. "On the Use of Multiple Models and Formal Control Synthesis in Batch Control." IFAC Proceedings Volumes 29, no. 1 (June 1996): 6096–101. http://dx.doi.org/10.1016/s1474-6670(17)58658-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grobelna, Iwona. "Formal Verification of Control Modules in Cyber-Physical Systems." Sensors 20, no. 18 (September 10, 2020): 5154. http://dx.doi.org/10.3390/s20185154.

Full text
Abstract:
The paper proposes a novel formal verification method for a state-based control module of a cyber-physical system. The initial specification in the form of user-friendly UML state machine diagrams is written as an abstract rule-based logical model. The logical model is then used both for formal verification using the model checking technique and for prototype implementation in FPGA devices. The model is automatically transformed into a verifiable model in nuXmv format and into synthesizable code in VHDL language, which ensures that the resulting models are consistent with each other. It also allows the early detection of any errors related to the specification. A case study of a manufacturing automation system is presented to illustrate the approach.
APA, Harvard, Vancouver, ISO, and other styles
7

Schall, Jeffrey D., Thomas J. Palmeri, and Gordon D. Logan. "Models of inhibitory control." Philosophical Transactions of the Royal Society B: Biological Sciences 372, no. 1718 (February 27, 2017): 20160193. http://dx.doi.org/10.1098/rstb.2016.0193.

Full text
Abstract:
We survey models of response inhibition having different degrees of mathematical, computational and neurobiological specificity and generality. The independent race model accounts for performance of the stop-signal or countermanding task in terms of a race between GO and STOP processes with stochastic finishing times. This model affords insights into neurophysiological mechanisms that are reviewed by other authors in this volume. The formal link between the abstract GO and STOP processes and instantiating neural processes is articulated through interactive race models consisting of stochastic accumulator GO and STOP units. This class of model provides quantitative accounts of countermanding performance and replicates the dynamics of neural activity producing that performance. The interactive race can be instantiated in a network of biophysically plausible spiking excitatory and inhibitory units. Other models seek to account for interactions between units in frontal cortex, basal ganglia and superior colliculus. The strengths, weaknesses and relationships of the different models will be considered. We will conclude with a brief survey of alternative modelling approaches and a summary of problems to be addressed including accounting for differences across effectors, species, individuals, task conditions and clinical deficits. This article is part of the themed issue ‘Movement suppression: brain mechanisms for stopping and stillness’.
APA, Harvard, Vancouver, ISO, and other styles
8

Seidner, C., and O. H. Roux. "Formal Methods for Systems Engineering Behavior Models." IEEE Transactions on Industrial Informatics 4, no. 4 (November 2008): 280–91. http://dx.doi.org/10.1109/tii.2008.2008998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Das, Sukanta, and Mihir K. Chakraborty. "Formal Logic of Cellular Automata." Complex Systems 30, no. 2 (June 15, 2021): 187–203. http://dx.doi.org/10.25088/complexsystems.30.2.187.

Full text
Abstract:
This paper develops a formal logic, named L CA , targeting modeling of one-dimensional binary cellular automata. We first develop the syntax of L CA , then give semantics to L CA in the domain of all binary strings. Then the elementary cellular automata and four-neighborhood binary cellular automata are shown as models of the logic. These instances point out that there are other models of L CA . Finally it is proved that any one-dimensional binary cellular automaton is a model of the proposed logic.
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Bo, Jia Di Qiu, and Ming Ming Chen. "Designing Access Control Policy Using Formal Concept Analysis." Applied Mechanics and Materials 602-605 (August 2014): 3822–25. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3822.

Full text
Abstract:
The need to securely share information among collaborating entities is increasingly becoming important. It often needed to implement access control (AC) models. The objective of this paper is to design access control policy using formal concept analysis, which is based on mathematical lattice and order theory. We provide discussion on how FCA can be used to capture RBAC constraints. We show with FCA, we can express more intend constrains than it can be done in traditional RBAC approach. The experimental results show that the approach is more resilient to dynamic computer environment.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Formal control models"

1

Sieunarine, Clint Vaalmicki. "Evolving access control : formal models and analysis." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:46dde528-207c-4e86-a282-20e73a5de10c.

Full text
Abstract:
Any model of access control has two fundamental aims: to ensure that resources are protected from inappropriate access and to ensure that access by authorised users is appropriate. Traditionally, approaches to access control have fallen into one of two categories: discretionary access control (DAC) or mandatory access control (MAC). More recently, role-based access control (RBAC) has offered the potential for a more manageable and flexible alternative. Typically, though, whichever model is adopted, any changes in the access control policy will have to be brought about via the intervention of a trusted administrator. In an ever-more connected world, with a drive towards autonomic computing, it is inevitable that a need for systems that support automatic policy updates in response to changes in the environment or user actions will emerge. Indeed, data management guidelines and legislation are often written at such a high level of abstraction that there is almost an implicit assumption that policies should react to contextual changes. Furthermore, as access control policies become more complicated, there is a clear need to express and reason about such entities at a higher level of abstraction for any meaningful analysis to be tractable, especially when consideration of complex state is involved. This thesis describes research conducted in formalising an approach to access control, termed evolving access control (EAC), that can support the automatic evolution of policies based on observed changes in the environment as dictated by high-level requirements embodied in a metapolicy. The contribution of this research is a formal, conceptual model of EAC which supports the construction, analysis and deployment of metapolicies and policies. The formal EAC model provides a framework to construct and describe metapolicies and to reason about how they manage the evolution of policies. Additionally, the model is used to analyse metapolicies for desirable properties, and to verify that policies adhere to the high-level requirements of the metapolicy. Furthermore, the model also allows the translation of verified policies to machine-readable representations, which can then be deployed in a system that supports fine-grained, dynamic access control.
APA, Harvard, Vancouver, ISO, and other styles
2

Ahlman, Karin. "Improving formal analysis of computerised rail traffic control systems using domain models." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-283398.

Full text
Abstract:
During the formal analysis of a computerized railway control system, it may be difficult to understand if a found counterexample to a requirement is a scenario which can happen in the real world or not. By putting sensible constraints on the inputs to the system, i.e. by defining a domain model for the system, some impossible scenarios are excluded from the formal analysis, which means that the formal analysis is simplified. This thesis presents a domain model for railway control systems, expressing constraints on how trains can behave in a railway network. The railway network is abstracted into a simple graph structure and the model is described in a temporal predicate logic using operators for the initial (I) and the next (X) value. The model is carefully defined in order not to introduce any unrealistic behavior.
APA, Harvard, Vancouver, ISO, and other styles
3

Muhammad, W. "Assistance à l'Abstraction de Composants Virtuels pour la Vérification Rapide de Systèmes Numériques." Phd thesis, Université de Nice Sophia-Antipolis, 2008. http://tel.archives-ouvertes.fr/tel-00454617.

Full text
Abstract:
De nos jours la conception des IP (IP: Intellectual Property) peut bénéficier de nouvelles techniques de vérification symbolique: abstraction de donnée et analyse statique formelle. Nous pensons qu'il est nécessaire de séparer clairement le Contrôle des Données avant toute vérification automatique. Nous avons proposé une définition du contrôle qui repose sur l'idée intuitive qu'il a un impact sur le séquencement de données. Autour de cette idée, le travail a consisté à s'appuyer sur la sémantique des opérateurs booléens et proposer une extension qui exprime cette notion deséquencement. Ceci nous a mené à la conclusion que la séparation parfaite du contrôle et des données est illusoire car les calculs dépendent trop de la représentation syntaxique. Pour atteindre notre objectif, nous nous sommes alors basés sur la connaissance fournie par le concepteur: séparation a priori des entrées contrôle et des entrées données. De cela, nous avons proposé un algorithme de slicing pour partitionner le modèle. Une abstraction fut alors obtenue dans le cas où le contrôle est bien indépendant des données. Pour accélérer les simulations, nous avons remplacé le traitement de données, défini au niveau bit par un modèle d'exécution fonctionnel, tout en gardant inchangé la partie contrôle. Ce modèle intègre des aspects temporels qui permet de se greffer sur des outils de model checking. Nous introduisons la notion de significativité support des données intentionnelles dans les modèles IP. La significativité est utilisée pour représenter des dépendances de données booléennes en vue de vérifier formellement et statiquement les lots de données. Nous proposons plusieurs approximations qui mettent en oeuvre cette nouvelle notion.
APA, Harvard, Vancouver, ISO, and other styles
4

MOREIRA, Anne Lorayne Gerônimo Silva Augusto. "Modelagem e verificação automática de um protocolo de controle de fluxo adaptativo usando traços de execução." Universidade Federal de Campina Grande, 2016. http://dspace.sti.ufcg.edu.br:8080/jspui/handle/riufcg/768.

Full text
Abstract:
Submitted by Maria Medeiros (maria.dilva1@ufcg.edu.br) on 2018-05-22T14:55:43Z No. of bitstreams: 1 ANNE LORAYNE GERÕNIMO SILVA AUGUSTO MOREIRA - DISSERTAÇÃO (PPGCC) 2016.pdf: 843001 bytes, checksum: 3c03d468b4f80d420da1bad90adf7ca0 (MD5)
Made available in DSpace on 2018-05-22T14:55:43Z (GMT). No. of bitstreams: 1 ANNE LORAYNE GERÕNIMO SILVA AUGUSTO MOREIRA - DISSERTAÇÃO (PPGCC) 2016.pdf: 843001 bytes, checksum: 3c03d468b4f80d420da1bad90adf7ca0 (MD5) Previous issue date: 2016
Capes
O desenvolvimento de sistemas embarcados possibilitou uma forte expansão no número de aplicações dependentes de dispositivos programáveis em áreas tão distintas como automobilística, sistemas financeiros e sistemas médicos. Uma eventual falha em algum desses sistemas pode provocar diferentes graus de danos e prejuízos e, por isso, exige-se um alto grau de confiabilidade em seu funcionamento. O aumento da complexidade dos novos sistemas computacionais e a pressão econômica e busca de novos mercados, concorrem para a busca da redução nos prazos de entrega dos dispositivos programáveis e de seus softwares e sistemas embarcados. Este trabalho apresenta um estudo de caso para a utilização de um método de verificação formal de software aplicado a um sistema computacional de controle de fluxo adaptativo para Gateways Bluetooth Low-Energy utilizados em sistemas de monitoramento remoto de pacientes. Os resultados obtidos neste trabalho confirmam a viabilidade da aplicação do método na verificação formal do software proposto.
The embedded system development had a positive impact on the expansion of applications dependent on programmable devices inside many areas such as automotive industry, financial services, and medical systems. A failure in any of these systems can cause losses and damages on many levels. Therefore, embedded systems require a high level of reliability while operating. The increasing complexity of these new computational systems, the cost-effective pressure, and the new market demand, contribute to reduce the delivery deadlines of the programmable devices, their softwares, and embedded systems. This research presents a case study in which we evaluated the usage of a formal verification method applied to a computational controlling system, with adaptive flow, for Gateway Bluetooth Low Energy used in patient monitoring systems. The results obtained in this study confirm the application feasibility of the formal verification method of the proposed software.
APA, Harvard, Vancouver, ISO, and other styles
5

Duplouy, Yann. "Applying Formal Methods to Autonomous Vehicle Control." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLN048/document.

Full text
Abstract:
Cette thèse s'inscrit dans le cadre de la conception de véhicules autonomes, et plus spécifiquement de la vérification de contrôleurs de tels véhicules. Nos contributions à la résolution de ce problème sont les suivantes : (1) fournir une syntaxe et une sémantique pour un modèle de systèmes hybrides, (2) étendre les fonctionnalités du model checker statistique Cosmos à ce modèle et (3) valider empiriquement la pertinence de notre approche sur des cas d'étude typiques du véhicule autonome.Nous avons choisi de combiner le modèle des réseaux de Petri stochastiques de haut niveau (qui était le formalisme d'entrée de Cosmos) avec le formalisme d'entrée de Simulink afin d'atteindre un pouvoir d'expression suffisant. En effet Simulink est très largement utilisé dans le domaine automobile et de nombreux contrôleurs sont spécifiés avec cet outil. Or Simulink n'a pas de sémantique formellement définie. Ceci nous a conduit à concevoir une telle sémantique en deux temps : tout d'abord en introduisant une sémantique dite exacte mais qui n'est pas opérationnelle puis en la complétant par une sémantique approchée intégrant le facteur d'approximation recherché.Afin de combiner le modèle à événements discrets des réseaux de Petri et le modèle continu spécifié en Simulink, nous avons proposé au niveau syntaxique une interfacereposant sur de nouveaux types de transitions et au niveau sémantique une extension de la boucle de simulation. L'évaluation de ce nouveau formalisme a été entièrement implémentée dans Cosmos.Grace à ce nouveau formalisme, nous avons développé et étudié les deux cas d'étude suivants : d'une part une circulation dense sur une section d'autoroute et d'autre part l'insertion du véhicule dans une voie rapide. L'analyse des modélisations correspondantes a démontré la pertinence de notre approche
This thesis takes place in the context of autonomous vehicle design, and concerns more specifically the verification of controllers of such vehicles. Our contributions are the following: (1) give a syntax and a semantics for a hybrid system model, (2) extend the capacities of the model-checker Cosmos to that kind of models, and (3) empirically confirm the relevance of our approach on typical case studies handling autonomous vehicles.We chose to combine high-level stochastic Petri nets (which is the input formalism of Cosmos) with the input formalism of Simulink, to obtain an adequate expressive power. Indeed, Simulink is largely used in the automotive industry and numerous controllers have been specified using this tool. However, there is no formal semantics for Simulink, which lead us to define such a semantics in two steps:first, we propose an exact (but not operational) semantics, then we complete it by an approximate semantics that includes the targeted approximation level.In order to combine the discrete event model of Petri nets and the continous model specified in Simulink, we define a syntactic interface that relies on new transition types; its semantics consists of an extension of the simulation loop. The evaluation of this new formalism has been entirely implemented into Cosmos.Using this new formalism, we have designed and studied the two following case studies: on one hand, a heavy traffic on a motorway segment, and on the other hand the insertion of a vehicle into a motorway. Our approach has been validated by the analysis of the corresponding models
APA, Harvard, Vancouver, ISO, and other styles
6

Moeti, Sekhonyana. "Formal analysis of state estimation for nonlinear model predictive control." Master's thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/20065.

Full text
Abstract:
The main goal of this study is to carry out a closed-loop performance analysis of state estimation methods when implemented in the formulation of nonlinear model predictive control. The analysis is facilitated by two nonlinear optimal state estimation methods: augmented state EKF (ASEKF) and augmented state UKF (ASUKF) for comparison purposes. Each state estimation method is coupled to the same NMPC controller to form state estimation-based NMPC controllers, that is, to form the ASEKF-NMPC and ASUKFNMPC controllers. The resulting NMPC controllers are applied for position control of the magnetic levitation system to validate their closed-loop performances. The ASEKFNMPC and ASUKF-NMPC controllers are further applied for the angular position control of the inverted pendulum mounted on a cart system for comparative analysis. The controlled system is perturbed with different error sources: output step disturbance and 5%parametric plant-model mismatch. Output step disturbance is introduced to the system to disturb the pendulum from its upright position while the 5% mismatch is applied to the parameters of the model of the controlled system throughout the simulation. To facilitate fair analysis, Pareto front ranking method is chosen as an evaluation method whereby the cost functions are defined according to the author's preferences. The cost functions served as performance markers for analyzing performance of ASEKF and ASUKF in NMPC formulation in multidimensional space. The tunable parameters of the ASEKFNMPC and ASUKF-NMPC controllers are chosen to be the decision variables of the evaluation problem. The state estimation methods are evaluated in terms of estimation accuracy, system's response time, peak overshoot and control performance. The Level Diagrams tool is used for good visualization of the Pareto fronts to evaluate which estimator performs better in the closed-loop. Finally, the points on the Level Diagrams which provide a performance closest to the desired are selected and tested through simulation runs on the inverted pendulum on a moving cart system.
APA, Harvard, Vancouver, ISO, and other styles
7

Benson, Glenn Stuart. "A formal protection model of security in distributed systems." Diss., Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/12238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ianagui, André Seiji Sandes. "Modelagem e controle de atuador antagônico de liga de memória de forma." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/3/3152/tde-15072013-164506/.

Full text
Abstract:
Este trabalho apresenta a modelagem, identificação de parâmetros e projeto do sistema de controle de um atuador rotacional antagônico com refrigeração forçada baseado em fios de liga de memória de forma, tendo em vista a aplicação em manipuladores robóticos. O modelo é baseado na abordagem de transformação de fases por subcamadas, que leva em conta a alta não linearidade que ocorre devido à dinâmica de transformação de fases do fio de memória de forma (especialmente a alta histerese envolvida). Um algoritmo de otimização por meio de Programação Quadrática Sequencial é então usado para se estimar os parâmetros do modelo de difícil obtenção exata, como as temperaturas de transição de fase dos fios de liga de memória de forma e o coeficiente de convecção. A função objetivo adotada é o erro entre a posição medida experimentalmente e a posição obtida por meio de modelagem e simulação. Parte-se de valores de parâmetros iniciais de tabela para a aplicação do algoritmo. Os resultados são em seguida comparados e avaliados com experimentos independentes em malha aberta, com o modelo apresentando boa correlação com a planta para uma excitação de até 2,0 Hz. Por fim, um sistema de controle não linear por modos deslizantes baseado no modelo é desenvolvido e simulado utilizando o modelo estimado, tanto em modo de controle de torque como em controle de posição. Aplica-se um controlador com camada limite e linearização utilizando a realimentação dos estados e o modelo estimado. Este tipo de controlador é robusto a eventuais diferenças entre o modelo e o sistema real. O controlador é então utilizado num modelo sistema de experimental, a partir do qual são obtidos resultados de desempenho dinâmico e exatidão do atuador controlado ao mesmo tempo em que são feitas comparações com os resultados das simulações. Por fim, demonstra-se que os objetivos iniciais do trabalho são atingidos, ao se realizar satisfatoriamente o controle de posição e de torque com robustez, exatidão e desempenho dinâmico adequados à aplicação prevista.
This work presents the modeling, grey-box parameter estimation and control design of a force-cooled antagonistic shape memory alloy (SMA) rotational actuator, having in mind the application in robotic manipulators. The model is based on a sub-layer phase transformation approach, taking account the large non-linearities that rise from the phase-transformation dynamics (in special, the highly hysteretic dynamics). An optimization Quadratic Sequential Programming Algorithm is used to for estimate estimating the model parameters, which are hard to obtain accurately, like the such as phase transition temperatures of the shape memory alloy wires and the convection coefficient. The objective function adopted is the error between the experimentally measured position and the position obtained by means of modeling and simulation. Initial parameters for the algorithm application are taken from factory tables\' datasheets. The results are then compared and evaluated with independent open loop experiments. At last, a model based nonlinear shape memory alloy SMA control scheme is designed and simulated using the estimated model, in torque and position control modes. The control scheme applied uses limit layer and feedback linearization using based on the estimated model. This control scheme is robust to eventual mismatch between modeling and the real system. The controller is then used in an experimental model, from which results of dynamic behavior and accuracy of the controlled actuator are obtained and compared with the simulated results. At last, it is showed that the initial objectives of this work are achieved, by satisfactorily performing position and torque control with robustness, accuracy and dynamic performances adequate to the application targeted.
APA, Harvard, Vancouver, ISO, and other styles
9

Brown, Douglas Graeme. "Formal network behaviour analysis using model checking." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93693/1/Douglas_Brown_Thesis.pdf.

Full text
Abstract:
In this research we modelled computer network devices to ensure their communication behaviours meet various network standards. By modelling devices as finite-state machines and examining their properties in a range of configurations, we discovered a flaw in a common network protocol and produced a technique to improve organisations' network security against data theft.
APA, Harvard, Vancouver, ISO, and other styles
10

Cohen, Raphaël P. "Formal Verification and Validation of Convex Optimization Algorithms For model Predictive Control." Thesis, Toulouse, ISAE, 2018. http://www.theses.fr/2018ESAE0030/document.

Full text
Abstract:
L’efficacité des méthodes d’optimisation modernes, associée à l’augmentation des ressources informatiques, a conduit à la possibilité d’utiliser ces algorithmes d’optimisation en temps réel agissant dans des rôles critiques. Cependant, cela ne peut se produire sans porter une certaine attention à la validité de ces algorithmes. Ce doctorat traite de la vérification formelle des algorithmes d'optimisation convexe lors qu'ils sont utilisés pour la guidance de systèmes dynamiques. En outre, nous démontrons comment les preuves théoriques des algorithmes d'optimisation en temps réel peuvent être utilisées pour décrire les propriétés fonctionnelles au niveau du code, les rendant ainsi accessibles à la communauté des méthodes formelles
The efficiency of modern optimization methods, coupled with increasing computational resources, has led to the possibility of real-time optimization algorithms acting in safety critical roles. However, this cannot happen without addressing proper attention to the soundness of these algorithms. This PhD thesis discusses the formal verification of convex optimization algorithms with a particular emphasis on receding-horizon controllers. Additionally, we demonstrate how theoretical proofs of real-time optimization algorithms can be used to describe functional properties at the code level, thereby making it accessible for the formal methods community
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Formal control models"

1

Cortier, Véronique, and Steve Kremer. Formal models and techniques for analyzing security protocols. Amsterdam: IOS Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Solozhentsev, E. D. Risk Management Technologies: With Logic and Probabilistic Models. Dordrecht: Springer Netherlands, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vera, Roberto Garduño. Modelo bibliográfico basado en formatos de intercambio y en normas internacionales orientado al control bibliográfico universal. México, D.F: Universidad Nacional Autónoma de México, Centro Universitario de Investigaciones Bibliotecológicas, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Varlamov, Oleg. Mivar databases and rules. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1508665.

Full text
Abstract:
The multidimensional open epistemological active network MOGAN is the basis for the transition to a qualitatively new level of creating logical artificial intelligence. Mivar databases and rules became the foundation for the creation of MOGAN. The results of the analysis and generalization of data representation structures of various data models are presented: from relational to "Entity — Relationship" (ER-model). On the basis of this generalization, a new model of data and rules is created: the mivar information space "Thing-Property-Relation". The logic-computational processing of data in this new model of data and rules is shown, which has linear computational complexity relative to the number of rules. MOGAN is a development of Rule - Based Systems and allows you to quickly and easily design algorithms and work with logical reasoning in the "If..., Then..." format. An example of creating a mivar expert system for solving problems in the model area "Geometry"is given. Mivar databases and rules can be used to model cause-and-effect relationships in different subject areas and to create knowledge bases of new-generation applied artificial intelligence systems and real-time mivar expert systems with the transition to"Big Knowledge". The textbook in the field of training "Computer Science and Computer Engineering" is intended for students, bachelors, undergraduates, postgraduates studying artificial intelligence methods used in information processing and management systems, as well as for users and specialists who create mivar knowledge models, expert systems, automated control systems and decision support systems. Keywords: cybernetics, artificial intelligence, mivar, mivar networks, databases, data models, expert system, intelligent systems, multidimensional open epistemological active network, MOGAN, MIPRA, KESMI, Wi!Mi, Razumator, knowledge bases, knowledge graphs, knowledge networks, Big knowledge, products, logical inference, decision support systems, decision-making systems, autonomous robots, recommendation systems, universal knowledge tools, expert system designers, logical artificial intelligence.
APA, Harvard, Vancouver, ISO, and other styles
5

Varlamov, Oleg. 18 examples of mivar expert systems. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1248446.

Full text
Abstract:
Many years of research on mivar technologies of logical artificial intelligence have allowed us to create a new powerful, versatile and fast tool, which is called "multidimensional open gnoseological active net" — "multidimensional open gnoseological active net: MOGAN". This tool allows you to quickly and easily design algorithms and work with logical reasoning in the "If..., Then..." format, and it can be used to model cause-and-effect relationships in different subject areas and create knowledge bases of new-generation applied artificial intelligence systems and real-time mivar expert systems with "Big Knowledge". The reader, after studying this tutorial, you will be able to create mivar expert system with the help of CASMI Wi!Mi. Designed for students, bachelors, masters and postgraduate students studying artificial intelligence methods, as well as for users, experts and specialists, creating a system of information processing and management, mivar models, expert systems, automated control systems, systems of decision support and Recommender systems.
APA, Harvard, Vancouver, ISO, and other styles
6

Bula Caraballo, Germán Ulises, ed. Spinoza. Bogotá. Colombia: Universidad de La Salle. Ediciones Unisalle, 2017. http://dx.doi.org/10.19052/9789585400764.

Full text
Abstract:
Si se considera que la sociedad actual, tal como funciona, funciona bien, resulta sensato pensar en maneras de conservar su funcionamiento; para quien piensa que es urgente la transformación radical, resulta suicida ser conservador. Este libro es para quienes piensan lo segundo. Como explica Werner Jaeger en Paideia, la educación, consiste en la producción de seres humanos según cierto modelo. Como el alfarero que moldea una vasija, cada sociedad. ¿En qué consistirá una educación pensada para transformar las sociedades, en lugar de conservarlas? Este libro desarrolla una idea de educación a partir de la filosofía de Spinoza, según la cual la formación no consiste en adquisición de una forma, según un molde adecuado, sino en el incremento en maneras de ser, en la felxibilización de la propia forma, en la autorrealización, como la entiende el filósofo noruego Arne Naess. La construcción de esta nueva idea de formación implica una reconstrucción del pensamiento de Spinoza, en la que se descubren afinidades entre este pensador y la fenomenología fe Edmund Husserl, la idea de individuación de Gilbert Simondon, la cibernética y la poesía de Walt Whitman. Esta visión de la educación implica una nueva concepción de la institucionalidad educativa: habrían que ceder gran parte del control a la periferia (profesores, alumnos, instituciones), en contra del estricto control que hoy en día se ejerce mediante el ranqueo y las pruebas estandarizadas. Para medir el éxito de una educación encaminada a producir la diferencia, es necesario combinar la heteroevaluación mediante estándares con una autoevaluación genuina, es decir, una evaluación en la que el evaluado mismo especifica los raseros y dimensiones con que ha de medirse. Más allá de lo institucional, esta visión de la educación implica una nueva concepción de la cohesión social, basada no en la homogeneización, sino en la producción de múltiples y rizomáticas relaciones de simbiosis basadas en diversidad misma.
APA, Harvard, Vancouver, ISO, and other styles
7

Akat'eva, Marina. Information and communication the concept of accounting theory. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1080408.

Full text
Abstract:
The monograph is devoted to theoretical and methodological aspects of information and communication of the concept of accounting theory — meaningful and professionally appraised by the author, including historical context. It considers the fundamental provisions of the concept formed in the respective paradigms, principles and postulates, presents the modern understanding of information and communication components of the accounting system of the economic entity, including civil-legal framework, practical issues of organization, planning, coordination and control of generated accounting information. Intended for scientific workers and specialists of accounting and economic profile, other specialists, and graduate and undergraduate students.
APA, Harvard, Vancouver, ISO, and other styles
8

Gámez Gutiérrez, Jorge Alberto. Emprendimiento, creatividad e innovación. Bogotá. Colombia: Universidad de La Salle. Ediciones Unisalle, 2015. http://dx.doi.org/10.19052/9789588939087.

Full text
Abstract:
Emprender es una forma de vida que se orienta a la solución creativa de problemas y refuerza las características de las personas que aspiran a controlar su vida. Las personas emprendedoras ven lo que otros ignoran, aprovechan las oportunidades, enfrentan los problemas, pueden comunicar mejor sus ideas, tienen la capacidad de trabajar en equipo, aceptan las consecuencias de sus actos y gestionan los recursos con eficiencia para el beneficio de las sociedades que los rodean. Este texto está dirigido a quiénes cursan espacios académicos de emprendimiento, creatividad e innovación. Pretende dotar de herramientas a los emprendedores para que sus ideas empresariales y sociales se consoliden a mediano plazo, con un sólido marco teórico y modelos para explicar el fenómeno emprendedor y sus particularidades.
APA, Harvard, Vancouver, ISO, and other styles
9

TAP 2010 (2010 Málaga, Spain). Tests and proofs: 4th international conference, TAP 2010, Malaga, Spain, July 1-2, 2010 ; proceedings. Berlin: Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Containing Russia's nuclear firebirds: Harmony and change at the International Science and Technology Center. Athens, Ga: University of Georgia Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Formal control models"

1

Kumar, N. V. Narendra, and R. K. Shyamasundar. "A Complete Generative Label Model for Lattice-Based Access Control Models." In Software Engineering and Formal Methods, 35–53. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-66197-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Haddad, Amal. "Meca: A Tool for Access Control Models." In B 2007: Formal Specification and Development in B, 281–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11955757_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Joshi, Sanjay, Jeffrey S. Smith, and Richard A. Wysk. "Formal Models for Control of Flexible Manufacturing Systems." In Operations Research in Production Planning and Control, 184–200. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/978-3-642-78063-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Smith, Jeffrey S., and Sanjay B. Joshi. "Formal models of execution function in shop floor control." In Computer control of flexible manufacturing systems, 285–314. Dordrecht: Springer Netherlands, 1994. http://dx.doi.org/10.1007/978-94-011-1230-7_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Clarke, Edmund, Orna Grumberg, Muralidhar Talupur, and Dong Wang. "Highlevel Verification of Control Intensive Systems Using Predicate Abstraction." In Formal Methods and Models for System Design, 159–79. Boston, MA: Springer US, 2004. http://dx.doi.org/10.1007/978-1-4020-8052-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Jessica, and Xiaoshan Zhao. "Formal Models for Web Navigations with Session Control and Browser Cache." In Formal Methods and Software Engineering, 46–60. Berlin, Heidelberg: Springer Berlin Heidelberg, 2004. http://dx.doi.org/10.1007/978-3-540-30482-1_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Champion, Adrien, Rémi Delmas, Michael Dierkes, Pierre-Loïc Garoche, Romain Jobredeaux, and Pierre Roux. "Formal Methods for the Analysis of Critical Control Systems Models: Combining Non-linear and Linear Analyses." In Formal Methods for Industrial Critical Systems, 1–16. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-41010-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lawall, Alexander. "Hypergraph-Based Access Control Using Organizational Models and Formal Language Expressions – $$\mathcal {HGAC}$$ HGAC." In Communications in Computer and Information Science, 98–119. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30162-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Reed, JN, DM Jackson, B. Deianov, and GM Reed. "Automated formal analysis of networks: FDR models of arbitrary topologies and flow-control mechanisms." In Fundamental Approaches to Software Engineering, 239–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/bfb0053594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ferrari, Alessio, Gianluca Magnani, Daniele Grasso, and Alessandro Fantechi. "Model Checking Interlocking Control Tables." In FORMS/FORMAT 2010, 107–15. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-14261-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Formal control models"

1

Weippl, Edgar. "Session details: Formal Techniques I." In SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3254595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zou, Xukai. "Session details: Formal Techniques II." In SACMAT'17: The 22nd ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3254597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meywerk, Tim, Arthur Niedzwiecki, Vladimir Herdt, and Rolf Drechsler. "Simulation-Based Debugging of Formal Environment Models*." In 2022 30th Mediterranean Conference on Control and Automation (MED). IEEE, 2022. http://dx.doi.org/10.1109/med54222.2022.9837055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gong, Haijun, Paolo Zuliani, Qinsi Wang, and Edmund M. Clarke. "Formal analysis for logical models of pancreatic cancer." In 2011 50th IEEE Conference on Decision and Control and European Control Conference (CDC-ECC 2011). IEEE, 2011. http://dx.doi.org/10.1109/cdc.2011.6161052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Blaszczyk, Piotr, Wojciech Turek, and Krzysztof Cetnarowicz. "Formal model for micro-scale traffic simulation and control." In 2013 18th International Conference on Methods & Models in Automation & Robotics (MMAR). IEEE, 2013. http://dx.doi.org/10.1109/mmar.2013.6669924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Idani, Akram, and Mario Cortes-Cornax. "Towards a model driven formal approach for merging data, access control and business processes." In MODELS '20: ACM/IEEE 23rd International Conference on Model Driven Engineering Languages and Systems. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3417990.3420046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mandrioli, Claudio, Alberto Leva, and Martina Maggio. "Dynamic Models for the Formal Verification of Big Data Applications Via Stochastic Model Checking." In 2018 IEEE Conference on Control Technology and Applications (CCTA). IEEE, 2018. http://dx.doi.org/10.1109/ccta.2018.8511410.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abdallah, Ali E., and Etienne J. Khayat. "Formal Z Specifications of Several Flat Role-Based Access Control Models." In 30th Annual IEEE/NASA Software Engineering Workshop. IEEE, 2006. http://dx.doi.org/10.1109/sew.2006.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Majumdar, Rupak, Indranil Saha, and Zilong Wang. "Systematic testing for control applications." In 2010 8th IEEE/ACM International Conference on Formal Methods and Models for Codesign (MEMOCODE 2010). IEEE, 2010. http://dx.doi.org/10.1109/memcod.2010.5558629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Schiffl, Jonas, Matthias Grundmann, Marc Leinweber, Oliver Stengele, Sebastian Friebe, and Bernhard Beckert. "Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control." In SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3450569.3463574.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Formal control models"

1

Roszman, Larry, Derek Armstrong, Aram Khalali, and Gwen Hickling. Dynamic Control and Formal Models of Multi-Agent Interactions and Behaviors. Fort Belvoir, VA: Defense Technical Information Center, May 2005. http://dx.doi.org/10.21236/ada435125.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Coble, Jeff, Larry Roszman, and Tiffany Frazier. Dynamic Control and Formal Models of Multi-Agent Interactions and Behaviors. Fort Belvoir, VA: Defense Technical Information Center, February 2003. http://dx.doi.org/10.21236/ada412536.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bobashev, Georgiy, John Holloway, Eric Solano, and Boris Gutkin. A Control Theory Model of Smoking. RTI Press, June 2017. http://dx.doi.org/10.3768/rtipress.2017.op.0040.1706.

Full text
Abstract:
We present a heuristic control theory model that describes smoking under restricted and unrestricted access to cigarettes. The model is based on the allostasis theory and uses a formal representation of a multiscale opponent process. The model simulates smoking behavior of an individual and produces both short-term (“loading up” after not smoking for a while) and long-term smoking patterns (e.g., gradual transition from a few cigarettes to one pack a day). By introducing a formal representation of withdrawal- and craving-like processes, the model produces gradual increases over time in withdrawal- and craving-like signals associated with abstinence and shows that after 3 months of abstinence, craving disappears. The model was programmed as a computer application allowing users to select simulation scenarios. The application links images of brain regions that are activated during the binge/intoxication, withdrawal, or craving with corresponding simulated states. The model was calibrated to represent smoking patterns described in peer-reviewed literature; however, it is generic enough to be adapted to other drugs, including cocaine and opioids. Although the model does not mechanistically describe specific neurobiological processes, it can be useful in prevention and treatment practices as an illustration of drug-using behaviors and expected dynamics of withdrawal and craving during abstinence.
APA, Harvard, Vancouver, ISO, and other styles
4

Fuchs, Marcel, Ishaiah Segal, Ehude Dayan, and K. Jordan. Improving Greenhouse Microclimate Control with the Help of Plant Temperature Measurements. United States Department of Agriculture, May 1995. http://dx.doi.org/10.32747/1995.7604930.bard.

Full text
Abstract:
A model of the energy balance of a transpiring crop in a greenhouse was developed in a format suitable for use in climate control algorithms aimed at dissipating excess heat during the warm periods. The model's parameters use external climatic variables as input. It incorporates radiation and convective transfer functions related to the operation of control devices like shading screens, vents, fans and enhanced evaporative cooling devices. The model identified the leaf boundary-layer resistance and the leaf stomatal and cuticular resistance as critical parameters regulating the temperature of the foliage. Special experiments evaluated these variables and established their relation to environmental factors. The research established that for heat load conditions in Mediterranean and arid climates transpiring crops maintained their foliage temperature within the range allowing high productivity. Results specify that a water supply ensuring minimum leaf resistance to remain below 100 s m-1, and a ventilation rate of 30 air exchanges per hour, are the conditions needed to achieve self cooling. Two vegetable crops, tomato and sweet pepper fulfilled maintained their leaf resistance within the prescribed range at maturity, i.e., during the critical warm season. The research evaluates the effects of additional cooling obtained from wet pad systems and spray wetting of foliage.
APA, Harvard, Vancouver, ISO, and other styles
5

Bilovska, Natalia. TACTICS OF APPROACHING THE AUTHOR CLOSER TO THE READER: INTERACTIVE COOPERATION. Ivan Franko National University of Lviv, February 2022. http://dx.doi.org/10.30970/vjo.2022.51.11408.

Full text
Abstract:
The article clarifies the features of interactive relationships, which are modeled by the addresser of modern media text for maximum impact on the addressee. The author controls the perception of the text, focusing on linguistic competence and an objective picture of the reader’s world. A pragmatic approach to journalistic text makes it possible to identify explicit and implicit forms of dialogue: modeling feedback and interactive settings that can turn a hypothetical reader into a real one, adapting to the addressee’s language thesaurus. Discursive openness to the exchange of views with the addressee leads to the fact that the entire media text becomes a guarantee of commonality of addresser-addressee interpretations. The difference between the addresser and the addressee is minimized, their connection is strengthened through the combination of linguistic consciousness, which, in turn, forms a special structure and semantics of the journalistic text, in which the emphasis is not on I but on the Other. The addressee in some implicit or explicit form is always in all segments of the media text, and the author establishes a trusting relationship with the reader through the phatic linguistic means that the addressee relates to himself. Approaching the addressee is a sign of modern journalistic texts, which show a tendency to dialogue and democratization of forms of mass communication, and their characteristic feature is the actualization in the center of attention of the addressee, latent (mediated by written text) dialogue with which is modeled as real. The addressee in the process of establishing contact with the author of the media text also becomes the part of broad cognitive space. This opportunity is realized if the journalist has different types of competence – communicative and procedural, that is, is able to compare their own thesaurus, their own knowledge with the thesaurus and the picture of the world of his reader. Modern journalism is characterized by the search for contact with the addressee and new effective models of influence and intimacy of relationships that contribute to the creation of a single cognitive space for both, which, in turn, will allow the recipient to move from knowledge to understanding.
APA, Harvard, Vancouver, ISO, and other styles
6

Maydykovskiy, Igor. Consciousness as a new form of the matter’s state. Intellectual Archive, August 2021. http://dx.doi.org/10.32370/iaj.2555.

Full text
Abstract:
The article discusses the physical model of the implicative form of Consciousness in the form of a holographic wave matrix, for which the material basis is directly the phase environment that fills the entire Space. It is shown that a similar form of Consciousness that exists outside the human brain can be represented as a kind of software shell that controls all forms of matter by implementing a fractal cyclic iterative algorithm. The condition for the completion of each iterative cycle at each scale level is the observance of the laws of symmetry that ensure the survival of the object in the process of copying-incarnation.
APA, Harvard, Vancouver, ISO, and other styles
7

Heide-Ottosen, Sif, Yahye Abdi, Abdullahi Ahmed Nor, James Khalil, and Martine Zeuthen. Journeys through Extremism: The Experiences of Former Members of Al-Shabaab. RESOLVE Network, October 2022. http://dx.doi.org/10.37805/cbags2022.3.

Full text
Abstract:
This research report applies the Attitudes-Behaviors Corrective (ABC) Model of Violent Extremism to map personal journeys in and out of al-Shabaab, the al-Qaeda affiliate operating in Somalia and the wider Horn of Africa. The ABC Model provides a framework through which to analyze individual trajectories in relation to sympathy for and actual involvement in violent extremism. The study was designed to deliver key insights for policy and practice by revealing the extent to which these journeys vary between respondents. The ABC Model was also designed as a platform through which to explore drivers of attitudinal and behavioral change, offering a granular understanding of the processes of joining and leaving the group. This report features the findings from interviews with thirteen ex-members of the group, including those from its intelligence agency (the Amniyat), military wing (the Jabhat), and police force (the Hizbah), as well as drivers, teachers, and others in support roles. These findings provide important considerations for the design of interventions to prevent further involvement and to facilitate disengagements from the group, including recommendations for communications campaigns, rehabilitation services, and the relevance of territorial control.
APA, Harvard, Vancouver, ISO, and other styles
8

Carrillo-Maldonado, Paul, Karla Arias, Wladimir Zanoni, Zoe Cruz, and Sebastián Ruiz. Local Socieconomic Impacts of Large-scale Mining Projects in Ecuador: The Case of Fruta del Norte. Inter-American Development Bank, January 2023. http://dx.doi.org/10.18235/0004693.

Full text
Abstract:
This study seeks to determine whether the Fruta del Norte project affected the main economic and social indicators of the Yantzaza canton, where the large-scale mining project is located. To do so, the analysis centers on key economic variables (such as business productivity and employment) and development variables (such as health and school enrollment). The specific methodology used is a synthetic control model, which enables the generation of a counterfactual for the treated canton. The findings suggest that Fruta del Norte had a positive impact on local economic activity in Yantzaza. The local economic dynamism spurred by Fruta del Norte had positive effects on local formal employment; however, increases in the rates of school dropout and adolescent pregnancy were observed.
APA, Harvard, Vancouver, ISO, and other styles
9

Ohad, Nir, and Robert Fischer. Control of Fertilization-Independent Development by the FIE1 Gene. United States Department of Agriculture, August 2000. http://dx.doi.org/10.32747/2000.7575290.bard.

Full text
Abstract:
A fundamental problem in biology is to understand how fertilization initiates reproductive development. During plant reproduction, one sperm cell fuses with the egg to form an embryo, whereas a second sperm cell fuses with the adjacent central cell nucleus to form the endosperm tissue that supports embryo and/or seedling development. To understand the mechanisms that initiate reproduction, we have isolated mutants of Arabidopsis that allow for replication of the central cell and subsequent endosperm development without fertilization. In this project we have cloned the MEA gene and showed that it encode a SET- domain polycomb protein. Such proteins are known to form chromatin-protein complexes that repress homeotic gene transcription and influence cell proliferation from Drosophylla to mammals. We propose a model whereby MEA and an additional polycomb protein we have cloned, FIE , function to suppress a critical aspect of early plant reproduction and endosperm development, until fertilization occurs. Using a molecular approach we were able to determine that FIE and MEA interact physically, suggesting that these proteins have been conserved also during the evolution of flowering plants. The analysis of MEA expression pattern revealed that it is an imprinted gene that displays parent-of- origin-dependent monoallelic expression specifically in the endosperm tissue. Silencing of the paternal MEA allele in the endosperm and the phenotype of mutant mea seeds support the parental conflict theory for the evolution of imprinting in plants and mammals. These results contribute new information on the initiation of endosperm development and provide a unique entry point to study asexual reproduction and apomixis which is expected to improve crop production.
APA, Harvard, Vancouver, ISO, and other styles
10

Landau, Sergei Yan, John W. Walker, Avi Perevolotsky, Eugene D. Ungar, Butch Taylor, and Daniel Waldron. Goats for maximal efficacy of brush control. United States Department of Agriculture, March 2008. http://dx.doi.org/10.32747/2008.7587731.bard.

Full text
Abstract:
Background. Brush encroachment constitutes a serious problem in both Texas and Israel. We addressed the issue of efficacy of livestock herbivory - in the form of goat browsing - to change the ecological balance to the detriment of the shrub vegetation. Shrub consumption by goats is kept low by plant chemical defenses such as tannins and terpenes. Scientists at TAES and ARO have developed an innovative, cost-effective methodology using fecal Near Infrared Spectrometry to elucidate the dietary percentage of targeted, browse species (terpene-richredberry and blueberry juniper in the US, and tannin-rich Pistacialentiscus in Israel) for a large number of animals. The original research objectives of this project were: 1. to clarify the relative preference of goat breeds and the individual variation of goats within breeds, when consuming targeted brush species; 2. to assess the heritability of browse intake and validate the concept of breeding goat lines that exhibit high preference for chemically defended brush, using juniper as a model; 3. to clarify the relative contributions of genetics and learning on the preference for target species; 4. to identify mechanisms that are associated with greater intake of brush from the two target species; 5. to establish when the target species are the most vulnerable to grazing. (Issue no.5 was addressed only partly.) Major conclusions, solutions, achievements: Both the Israel and US scientists put significant efforts into improving and validating the technique of Fecal NIRS for predicting the botanical composition of goat diets. Israeli scientists validated the use of observational data for calibrating fecal NIRS, while US scientists established that calibrations could be used across animals differing in breed and age but that caution should be used in making comparisons between different sexes. These findings are important because the ability to select goat breeds or individuals within a breed for maximal efficiency of brush control is dependent upon accurate measurement of the botanical composition of the diet. In Israel it was found that Damascus goats consume diets more than twice richer in P. lentiscus than Mamber or Boer goats. In the US no differences were found between Angora and Boer cross goats but significant differences were found between individuals within breeds in juniper dietary percentage. In both countries, intervention strategies were found that further increased the consumption of the chemically defended plant. In Israel feeding polyethylene glycol (PEG, MW 4,000) that forms high-affinity complexes with tannins increased P. lentiscus dietary percentage an average of 7 percentage units. In the US feeding a protein supplement, which enhances rates of P450-catalyzed oxidations and therefore the rate of oxidation of monoterpenes, increased juniper consumption 5 percentage units. However, the effects of these interventions were not as large as breed or individual animal effects. Also, in a wide array of competitive tannin-binding assays in Israel with trypsin, salivary proteins did not bind more tannic acid or quebracho tannin than non-specific bovine serum albumin, parotid saliva did not bind more tannins than mixed saliva, no response of tannin-binding was found to levels of dietary tannins, and the breed effect was of minor importance, if any. These fundings strongly suggest that salivary proteins are not the first line of defense from tannin astringency in goats. In the US relatively low values for heritability and repeatability for juniper consumption were found (13% and 30%, respectively), possibly resulting from sampling error or non-genetic transfer of foraging behavior, i.e., social learning. Both alternatives seem to be true as significant variation between sequential observations were noted on the same animal and cross fostering studies conducted in Israel demonstrated that kids raised by Mamber goats showed lower propensity to consume P. lentiscus than counterparts raised by Damascus goats.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography