Littérature scientifique sur le sujet « Critical applications »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Critical applications ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Articles de revues sur le sujet "Critical applications"

1

Kazymyr, Volodymyr, Andrii Mokrohuz et Mykola Moshel. « MINIMAL HTTP HEADER FOR TRAFFIC CRITICAL APPLICATIONS ». TECHNICAL SCIENCES AND TECHNOLOG IES, no 2(8) (2017) : 123–28. http://dx.doi.org/10.25140/2411-5363-2017-2(8)-123-128.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Thackray, Richard, Peter F. Morris et Ken Ridal. « Alloys for critical applications ». Ironmaking & ; Steelmaking 37, no 4 (mai 2010) : 242–50. http://dx.doi.org/10.1179/030192310x12628786049314.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Padula, Marco, et Giuliana Rubbia Rinaldi. « Mission-critical web applications ». Interactions 6, no 4 (juillet 1999) : 52–66. http://dx.doi.org/10.1145/306412.306435.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Sharma, Deepak, et Sohan Garg. « A critical study of fuzzy logic systems and its applications ». International Journal of Trend in Scientific Research and Development Volume-1, Issue-1 (31 décembre 2016) : 56–58. http://dx.doi.org/10.31142/ijtsrd105.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Redmill, Felix. « Computers in safety-critical applications ». Computing & ; Control Engineering Journal 3, no 4 (1992) : 178. http://dx.doi.org/10.1049/cce:19920046.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Fetzer, Christof. « Building Critical Applications Using Microservices ». IEEE Security & ; Privacy 14, no 6 (novembre 2016) : 86–89. http://dx.doi.org/10.1109/msp.2016.129.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Nina Santi et Nathalie Mitton. « A resource management survey for mission-critical and time-critical applications in multiaccess edge computing ». ITU Journal on Future and Evolving Technologies 2, no 2 (10 novembre 2021) : 61–80. http://dx.doi.org/10.52953/bqvo3992.

Texte intégral
Résumé :
Multiaccess Edge Computing (MEC) brings additional computing power in proximity of mobile users, reducing latency, saving energy and alleviating the network's bandwidth. This proximity is beneficial, especially for mission-critical applications where each second matters, such as disaster management or military operations. Moreover, it enables MEC resources embedded on mobile units like drones or robots that are flexible to be deployed for mission-critical applications. However, the MEC servers are capacity-limited and thus need an acute management of their resources. The mobile resources also need a smart deployment scheme to deliver their services efficiently. In this survey, we review mission-critical applications, resource allocation and deployment of mobile resources techniques in the context of the MEC. First, we introduce the technical specifics and uses of MEC in mission-critical applications to highlight their needs and requirements. Then, we discuss the resource allocation schemes for MEC and assess their fit depending on the application needs. In the same fashion, we finally review the deployment of MEC mobile resources. We believe this work could serve as a helping hand to design efficient MEC resource management schemes that respond to challenging environments such as mission-critical applications.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Suryawanshi, Rajesh, Shubham Sutar et Dr Sunita Jadhav. « Emergency Application for Emergency Services in Critical Condition ». International Journal for Research in Applied Science and Engineering Technology 10, no 12 (31 décembre 2022) : 563–64. http://dx.doi.org/10.22214/ijraset.2022.47911.

Texte intégral
Résumé :
Abstract: Emergency calling is fundamental and critical for devices because they must work for Android users while satisfying various carrier and regulatory requirements all over the world. Emergencies can happen anywhere and at any time. The very nature of an emergency is unpredictable and can change in scope and impact. Being prepared and planning ahead is critical to protecting lives, the environment, and property. To overcome problems while facing emergency situations we need a simple and easy application. For this, we create an application that has automatic call and location-sharing services in an emergency situation. This will help us to share the location with our family and nearby hospitals or OPDs and also be useful to the automatic message sending & SOS. For this, we select some famous emergency applications and study them. But some applications are region-based applications And every application has different features. Due to this, it is difficult to use an emergency application in emergency situations. To overcome this problem we develop an application that is not region- based, consists of all features, and is easy to use in any condition.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Axer, Philip, Jonas Diemer, Mircea Negrean, Maurice Sebastian, Simon Schliecker et Rolf Ernst. « Mastering MPSoCs for Mixed-critical Applications ». IPSJ Transactions on System LSI Design Methodology 4 (2011) : 91–116. http://dx.doi.org/10.2197/ipsjtsldm.4.91.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Al Dhoayan, Mohammed, Huda Alghamdi et YaseenM Arabi. « Machine learning applications in critical care ». Saudi Critical Care Journal 3, no 1 (2019) : 29. http://dx.doi.org/10.4103/2543-1854.259475.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Thèses sur le sujet "Critical applications"

1

Wu, Weihang. « Architectural Reasoning for Safety Critical Software Applications ». Thesis, University of York, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485150.

Texte intégral
Résumé :
In recent years, there has been substantial move towards architecture-based development for safety-critical software applications. Nevertheless, techniques for architectural design have not been developed to the extent necessary to guarantee the safety of these systems. In particular, current practices often focus upon architectural modelling without making the underlying design deliberation explicit. Although a number of protection mechanisms have been codified in both research and practice, there is little practical guidance mi how to exploit them to address application-specific safety concerns. This thesis defines and demonstrates a coherent and effective approach to eliciting and formulating safety concerns, evaluating and mitigating safety concerns, and arguing about safety within the evolutionary architecting process. The elicitation and formulation of safety concerns are based upon the unification of goals and scenarios from both positive .and negative perspectives. The evaluation of safety concerns is based upon the application of Object-Oriented Bayesian Belief Networks and mitigation space is informed by the evaluation results and the formulation of safety concerns. Safety argumentation of architectures is based upon the definition of a set of patterns of argument. Guidance on safety argument review is also provided. Through addressing safety concerns in the early system development lifecyc1e, there can be an increased level of design confidence in the architectures developed for safety-critical software applications. Evaluation of the approach is conducted through a number of academic and industrial case studies.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Haylock, James Alexander. « Fault tolerant drives for safety critical applications ». Thesis, University of Newcastle Upon Tyne, 1998. http://hdl.handle.net/10443/352.

Texte intégral
Résumé :
The correct operation of adjustable speed drives, which form part of a larger system, is often essential to the operation of the system as a whole. In certain applications the failure of such a drive could result in a threat to human safety and these applications are termed 'safety critical'. The chance of a component failure resulting in non-operation of the drive can be dramatically reduced by adopting a fault tolerant design. A fault tolerant drive must continue to operate throughout the occurrence of any single point failure without undue disturbance to the power output. Thereafter the drive must be capable of producing rated output indefinitely in the presence of the fault. The work presented in this thesis shows that fault tolerance can be achieved without severe penalties in terms of cost or power to mass ratio. The design of a novel permanent magnet drive is presented and a 'proof of concept' demonstrator has been built, based on a 20 kW, 13000 RPM aircraft fuel pump specffication. A novel current controller with near optimal transient performance is developed to enable precise shaping of the phase currents at high shaft speeds. The best operating regime for the machine is investigated to optimise the power to mass ratio of the drive. A list of the most likely electrical faults is considered. Some faults result in large fault currents and require rapid detection to prevent fault propagation. Several novel fault sensors are discussed. Fault detection and identification schemes are developed, including new schemes for rapid detection of turn to turn faults and power device short circuit faults. Post fault control schemes are described which enable the drive to continue to operate indefinitely in the presence of each fault. Finally, results show the initially healthy drive operating up to, through and beyond the introduction of each of the most serious faults.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Kurd, Zeshan. « Artificial neural networks in safety-critical applications ». Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428472.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Venugopalan, Vigneshwaran. « Supervisory wireless control for critical industrial applications ». Thesis, University of Sheffield, 2014. http://etheses.whiterose.ac.uk/8501/.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Rohrmair, Gordon Thomas. « Use of CSP to verify security-critical applications ». Thesis, University of Oxford, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433325.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Schwager, Mac. « Towards verifiable adaptive control for safety critical applications ». Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32344.

Texte intégral
Résumé :
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2005.
Includes bibliographical references (p. 97-101).
To be implementable in safety critical applications, adaptive controllers must be shown to behave strictly according to predetermined specifications. This thesis presents two tools for verifying specifications relevant to practical direct-adaptive control systems. The first tool is derived from an asymptotic analysis of the error dynamics of a direct adaptive controller and uncertain linear plant. The analysis yields a so called Reduced Linear Asymptotic System, which can be used for designing adaptive systems to meet transient specifications. The tool is demonstrated in two design examples from flight mechanics, and verified in numerical simulation. The second tool developed is an algorithm for direct-adaptive control of plants with magnitude saturation constraints on multiple inputs. The algorithm is a non-trivial extension of an existing technique for single input systems with saturation. Boundeness of all signals is proved for initial conditions in a compact region. In addition, the notion of a class of multi-dimensional saturation functions is introduced. The saturation compensation technique is demonstrated in numerical simulation. Finally, these tools are applied to design a direct-adaptive controller for a realistic multi-input aircraft model to accomplish control reconfiguration in the case of unforeseen failure, damage, or disturbances. A novel control design for incorporating control allocation and reconfiguration is introduced. The adaptive system is shown in numerical simulation to have favorable transient qualities and to give a stable response with input saturation constraints.
by Mac Schwager.
S.M.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Furht, Borko, David Joseph, David Gluch et John Parker. « OPEN SYSTEMS FOR TIME-CRITICAL APPLICATIONS IN TELEMETRY ». International Foundation for Telemetering, 1990. http://hdl.handle.net/10150/613465.

Texte intégral
Résumé :
International Telemetering Conference Proceedings / October 29-November 02, 1990 / Riviera Hotel and Convention Center, Las Vegas, Nevada
In this paper we discuss the next generation of open real-time systems for time critical applications in telemetry. Traditionally, real-time computing has been a realm of proprietary systems, with real-time applications written in assembly language. With the escalating cost of software development and the need for porting real-time applications to state-of-the-art hardware without massive conversion efforts, there is a need for real-time applications to be portable so that they can be moved to newer hardware platforms easily. Therefore, the next generation of real-time systems will be based on open systems incorporating industry standards, which will reduce system cost and time to market, increase availability of software packages, increase ease-of-use, and facilitate system integration. The open real-time system strategy, presented in this paper, is based on hardware architectures using off-the-shelf microprocessors, Motorola 680X0 and 88X00 families, and the REAL/IX operating system, a fully preemptive real-time UNIX operating system, developed by MODCOMP.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Bion, Julian Fleetwoo. « Severity scoring and its applications in critical illness ». Thesis, Imperial College London, 1990. http://hdl.handle.net/10044/1/47775.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Jiang, Xiaolin. « Wireless Communication Networks for Time-critical Industrial Applications ». Licentiate thesis, KTH, Nätverk och systemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239019.

Texte intégral
Résumé :
Wireless communication is of paramount importance to enable the vision of Industry 4.0. Compared to mobile communications, industrial communications pose demanding requirements in terms of ultra low latency and high reliability. Currently, for the most time-critical industrial applications, there is no available wireless solutions satisfying these latency requirements. This thesis studies effective techniques to reduce the latency for the time-critical industrial applications, especially from the Physical Layer (PHY) point of view. The thesis is organized in two main parts. In the first part, the available methods for low latency are surveyed and analyzed in terms of end-to-end latency. It is argued that the enabling techniques should be optimized together to reduce the end-to-end latency while satisfying other requirements such as reliability and throughput. Moreover, the realistic timing constraints of different PHY algorithms, hardware, and mechanisms are derived based on the state-of-art wireless implementations. In the second part, a revision of PHY with an optimized PHY structure is proposed to reduce the latency. It is shown that a PHY with just a short one-symbol preamble and dedicated packet detection and synchronization algorithms for short packets is robust to carrier frequency offsets and false alarms by both theoretical and site experiments. The investigations of this thesis show that revising the PHY structure/parameters is effective to reduce the packet transmission time, and further improve the latency performance of wireless communication network for time-critical industrial applications. In the future, we include the PHY results of this thesis in the investigation of the Medium Access Control (MAC), for industrial wireless communications with very low latencies.

QC 20181116

Styles APA, Harvard, Vancouver, ISO, etc.
10

Lu, Yu. « Probabilistic verification of satellite systems for mission critical applications ». Thesis, University of Glasgow, 2016. http://theses.gla.ac.uk/7586/.

Texte intégral
Résumé :
In this thesis, we present a quantitative approach using probabilistic verification techniques for the analysis of reliability, availability, maintainability, and safety (RAMS) properties of satellite systems. The subject of our research is satellites used in mission critical industrial applications. A strong case for using probabilistic model checking to support RAMS analysis of satellite systems is made by our verification results. This study is intended to build a foundation to help reliability engineers with a basic background in model checking to apply probabilistic model checking to small satellite systems. We make two major contributions. One of these is the approach of RAMS analysis to satellite systems. In the past, RAMS analysis has been extensively applied to the field of electrical and electronics engineering. It allows system designers and reliability engineers to predict the likelihood of failures from the indication of historical or current operational data. There is a high potential for the application of RAMS analysis in the field of space science and engineering. However, there is a lack of standardisation and suitable procedures for the correct study of RAMS characteristics for satellite systems. This thesis considers the promising application of RAMS analysis to the case of satellite design, use, and maintenance, focusing on its system segments. Data collection and verification procedures are discussed, and a number of considerations are also presented on how to predict the probability of failure. Our second contribution is leveraging the power of probabilistic model checking to analyse satellite systems. We present techniques for analysing satellite systems that differ from the more common quantitative approaches based on traditional simulation and testing. These techniques have not been applied in this context before. We present the use of probabilistic techniques via a suite of detailed examples, together with their analysis. Our presentation is done in an incremental manner: in terms of complexity of application domains and system models, and a detailed PRISM model of each scenario. We also provide results from practical work together with a discussion about future improvements.
Styles APA, Harvard, Vancouver, ISO, etc.

Livres sur le sujet "Critical applications"

1

Avižienis, Algirdas, et Jean-Claude Laprie, dir. Dependable Computing for Critical Applications. Vienna : Springer Vienna, 1991. http://dx.doi.org/10.1007/978-3-7091-9123-1.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Avižienis, Algirdas. Dependable Computing for Critical Applications. Vienna : Springer Vienna, 1991.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Television : Critical methods and applications. 3e éd. Mahwah, N.J : Lawrence Erlbaum Associates, 2007.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Algirdas, Avižienis, et Laprie J. C, dir. Dependable computing for critical applications. Wien : Springer-Verlag, 1991.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Television : Critical methods and applications. 4e éd. New York, NY : Routledge, 2011.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Butler, Jeremy G. Television : Critical methods and applications. 2e éd. Mahwah, N.J : Lawrence Erlbaum Associates, 2001.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Butler, Jeremy G. Television : Critical methods and applications. Belmont, Calif : Wadsworth Publishing Company, 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Television : Critical methods and applications. 2e éd. Mahwah, N.J : Lawrence Erlbaum Associates, 2002.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Television : Critical methods and applications. Belmont, Cal : Wadsworth Pub., 1994.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Cristian, Flaviu, Gerard Le Lann et Teresa Lunt, dir. Dependable Computing for Critical Applications 4. Vienna : Springer Vienna, 1995. http://dx.doi.org/10.1007/978-3-7091-9396-9.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Chapitres de livres sur le sujet "Critical applications"

1

Wolf, Marko. « Security-Critical Vehicular Applications ». Dans Security Engineering for Vehicular IT Systems, 49–75. Wiesbaden : Vieweg+Teubner, 2009. http://dx.doi.org/10.1007/978-3-8348-9581-3_4.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Hu, Xiaolong. « Filing Patent Applications ». Dans Smoothing a Critical Transition, 87–100. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-4035-6_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Rass, Stefan, Stefan Schauer, Sandra König et Quanyan Zhu. « Critical Infrastructures ». Dans Advanced Sciences and Technologies for Security Applications, 21–42. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-46908-5_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Giritli Nygren, Katarina, Anna Olofsson et Susanna Öhman. « Methodological Applications ». Dans Critical Studies in Risk and Uncertainty, 133–56. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-33524-3_8.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Astic, Isabelle, Coline Aunis, Jérome Dupire, Viviane Gal, Eric Gressier-Soudan, Christophe Pitrey, Matthieu Roy et al. « Pervasive Games and Critical Applications ». Dans Computer Science and Ambient Intelligence, 263–84. Hoboken, NJ USA : John Wiley & Sons, Inc., 2013. http://dx.doi.org/10.1002/9781118580974.ch12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Blieberger, Johann. « Loops for Safety Critical Applications ». Dans Safe Comp 95, 269–82. London : Springer London, 1995. http://dx.doi.org/10.1007/978-1-4471-3054-3_19.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Kane, Robert L., et Gary G. Kay. « Computer Applications in Neuropsychological Assessment ». Dans Critical Issues in Neuropsychology, 359–92. Boston, MA : Springer US, 1997. http://dx.doi.org/10.1007/978-1-4757-9820-3_11.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Motreanu, D., et P. D. Panagiotopoulos. « Nonsmooth Critical Point Theory ». Dans Nonconvex Optimization and Its Applications, 35–58. Boston, MA : Springer US, 1999. http://dx.doi.org/10.1007/978-1-4615-4064-9_2.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Henkel, Malte. « Further Developments and Applications ». Dans Conformal Invariance and Critical Phenomena, 219–60. Berlin, Heidelberg : Springer Berlin Heidelberg, 1999. http://dx.doi.org/10.1007/978-3-662-03937-3_12.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Purnell, Larry. « Critical Reflection ». Dans Global Applications of Culturally Competent Health Care : Guidelines for Practice, 97–112. Cham : Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-69332-3_10.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Actes de conférences sur le sujet "Critical applications"

1

Guch, S., et Douglas P. Stanley. « Lasers for airborne applications ». Dans Critical Review Collection. SPIE, 1992. http://dx.doi.org/10.1117/12.161581.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Cheng, Li-Jen, et Keung L. Luke. « Photorefractive semiconductors and applications ». Dans Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.178621.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Breckinridge, James B. « Advanced applications : an overview ». Dans Critical Review Collection. SPIE, 1997. http://dx.doi.org/10.1117/12.279812.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Feigelson, Robert S. « Optical materials for ultraviolet applications ». Dans Critical Review Collection. SPIE, 1996. http://dx.doi.org/10.1117/12.245187.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Halmos, Maurice J., et John H. S. Wang. « Laser radar systems and applications ». Dans Critical Review Collection. SPIE, 1992. http://dx.doi.org/10.1117/12.161579.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

McMurtrey, James E., Lawrence A. Corp, Moon S. Kim, Emmett W. Chappelle, Craig S. T. Daughtry et J. D. DiBenedetto. « Fluorescence techniques in agricultural applications ». Dans Critical Review Collection. SPIE, 2001. http://dx.doi.org/10.1117/12.420099.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Bell, Alan E. « Mass storage systems and applications ». Dans Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.192213.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Hibbard, Douglas L. « Electroless nickel for optical applications ». Dans Critical Review Collection. SPIE, 1997. http://dx.doi.org/10.1117/12.279806.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Hong, John H. « Applications of photorefractors for signal processing ». Dans Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.178624.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Raguin, Daniel H., Scott M. Norton et G. Michael Morris. « Subwavelength structured surfaces and their applications ». Dans Critical Review Collection. SPIE, 1993. http://dx.doi.org/10.1117/12.170186.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.

Rapports d'organisations sur le sujet "Critical applications"

1

Pham, H., et M. Pham. Software reliability models for critical applications. Office of Scientific and Technical Information (OSTI), décembre 1991. http://dx.doi.org/10.2172/10105800.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Pham, H., et M. Pham. Software reliability models for critical applications. Office of Scientific and Technical Information (OSTI), décembre 1991. http://dx.doi.org/10.2172/6017897.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Srivastava, A. N., et T. C. Stauffer. Superconductor critical current standards for fusion applications. Gaithersburg, MD : National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.ir.5027.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

David Schwam, John Wallace et Sebastian Birceanu. Die Materials for Critical Applications and Increased Production Rates. Office of Scientific and Technical Information (OSTI), novembre 2002. http://dx.doi.org/10.2172/806823.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
5

Dellin, T. A. 1998 technology roadmap for integrated circuits used in critical applications. Office of Scientific and Technical Information (OSTI), septembre 1998. http://dx.doi.org/10.2172/296751.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Renier, J., et C. Parks. Executive summary : Reactor critical benchmark calculations for burnup credit applications. Office of Scientific and Technical Information (OSTI), avril 1990. http://dx.doi.org/10.2172/6882841.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Alberts, Christopher, Audrey Dorofee, James Stevens et Carol Woody. OCTAVE(Federal Registration)-S Implementation Guide, Version 1.0, Volume 7 : Critical Asset Worksheets for Applications. Fort Belvoir, VA : Defense Technical Information Center, janvier 2005. http://dx.doi.org/10.21236/ada430828.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
8

Bonne, Susan M., et Jason K. Rupert. Use of Unified Modeling Language (UML) in Model-Based Development (MBD) For Safety-Critical Applications. Fort Belvoir, VA : Defense Technical Information Center, décembre 2014. http://dx.doi.org/10.21236/ada621409.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Mishchenko, Yuriy. Applications of Canonical transformations and nontrivial vacuum solutions to flavor mixing and critical phenomena in quantum field theory. Office of Scientific and Technical Information (OSTI), décembre 2004. http://dx.doi.org/10.2172/955491.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Li, Lingxi, Yaobin Chen, Renren Tian, Feng Li, Howell Li et James R. Sturdevant. An Integrated Critical Information Delivery Platform for Smart Segment Dissemination to Road Users. Purdue University, 2022. http://dx.doi.org/10.5703/1288284317440.

Texte intégral
Résumé :
An integrated critical information delivery platform for smart segment dissemination to road users was developed. A statewide baseline milepost geodatabase was created at 0.1-mile resolution with tools, protocols, and interfaces that allow other data sources to be efficiently utilized. A variety of data sources (e.g., INRIX, CARS, Doppler, camera images, connected vehicle data, automated vehicle location) were integrated into existing and new dashboards for stakeholders to monitor roadway conditions and after-action reviews. Additionally, based on these data sources, algorithms were developed and an API was created to identify hazardous road conditions when the location of the end-user mobile device was given. Message delivery schemes were successfully implemented to issue alerts to drivers, which were integrated with two in-vehicle smartphone applications. The performance of the integrated platform was evaluated using both the driving simulator and a number of simulated and on-road tests. The results demonstrated the system was able to disseminate data in real-time using the developed platform.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie