Gotowa bibliografia na temat „Critical control”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Critical control”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Critical control"

1

Cullyer, John. "Safety-critical control systems". Computing & Control Engineering Journal 2, nr 5 (1991): 202. http://dx.doi.org/10.1049/cce:19910055.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Brewer, Ross. "Protecting critical control systems". Network Security 2012, nr 3 (marzec 2012): 7–10. http://dx.doi.org/10.1016/s1353-4858(12)70044-2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Dickinson, Don. "Protecting Critical Control Systems". Opflow 40, nr 8 (sierpień 2014): 8–9. http://dx.doi.org/10.5991/opf.2014.40.0054.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Kim, Hak-Jae, Tae-Wook Hahn, Ji-Hun Juong, Gyung-Jin Bahk i Chong-Hae Hong. "Evaluation of Biological Critical Control Points Using Escherichia coli Genotyping". Korean Journal for Food Science of Animal Resources 29, nr 6 (31.12.2009): 695–701. http://dx.doi.org/10.5851/kosfa.2009.29.6.695.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Clain, Jeremy. "Glucose control in critical care". World Journal of Diabetes 6, nr 9 (2015): 1082. http://dx.doi.org/10.4239/wjd.v6.i9.1082.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Schultz, Jack C., Manfred Mackauer, Lester E. Ehler i Jens Roland. "Critical Issues in Biological Control". Ecology 72, nr 3 (czerwiec 1991): 1173. http://dx.doi.org/10.2307/1940620.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Shultz, Jack C. "Critical Issues in Biological Control?" Ecology 72, nr 3 (czerwiec 1991): 1173. http://dx.doi.org/10.2307/1940621.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Preiser, Jean-Charles. "Glycemic control during critical illness". Expert Review of Endocrinology & Metabolism 6, nr 5 (wrzesień 2011): 681–88. http://dx.doi.org/10.1586/eem.11.58.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Afifi, Sherif. "Glycemic Control in Critical Care". International Anesthesiology Clinics 47, nr 1 (2009): 139–51. http://dx.doi.org/10.1097/aia.0b013e318194ffc6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Perks, Bob. "Critical perspectives in management control". British Accounting Review 22, nr 3 (wrzesień 1990): 290–91. http://dx.doi.org/10.1016/0890-8389(90)90012-7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "Critical control"

1

Misner, Scottie, i Carol Curtis. "HACCP - Hazard Analysis Critical Control Points". College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2008. http://hdl.handle.net/10150/146434.

Pełny tekst źródła
Streszczenie:
1p.
HACCP, pronounced has-up, is a food safety self-inspection system that combines up-to-date technical information with step-by-step procedures to evaluate and monitor the flow of food throughout a food establishment from receiving to service. This publication introduces this system to readers and outlines 6 simple HACCP principles to reduce the occurrence of food-borne illness at home.
Style APA, Harvard, Vancouver, ISO itp.
2

Åkerberg, Johan. "On Security in Safety-Critical Process Control". Licentiate thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.

Pełny tekst źródła
Streszczenie:

This Licentiate thesis is about security in automation networks with emphasis on fieldbus communication. In the process industry, network and system security have become even more important since the introduction of Ethernet-based fieldbus protocols. As an example, a successful attack on a power plant, supporting large cities with energy, could result in a temporal but total power loss. Such attacks could be devastating for the society. The security threats are real, and motivations for attacking industrial communication systems may be political or economical.

The visions of autonomous systems, which can be supervised, diagnosed and maintained from remote is not far from reality, but stress the need for security and safety measures. Wired fieldbus protocols are mature when it comes to safety and there are existing standards for safe communication. In a setup like an autonomous system security measures over safe communication has to be taken into account.

The state-of-the-art in automation security is to use firewalls to restrict incoming and outgoing traffic to the networks. Firewalls can be deployed between different automation networks, i.e. server, control, and fieldbus networks, and even protect a single automation cell with a dedicated firewall. If an adversary can penetrate the perimeter defenses, no other security countermeasures exist in process automation to protect the safety-critical communication from sabotage.

In this thesis we initially explore the possibilities of security attacks on the automation protocols PROFINET IO and PROFIsafe. We show that it is possible to attack safety-related communication to take control of safety-critical fieldbus nodes. We propose the concept of Security Modules in combination with PROFINET IO and PROFIsafe to achieve safe and secure real-time fieldbus communication.

Style APA, Harvard, Vancouver, ISO itp.
3

Ifill, Wilson. "B annotations in critical control systems development". Thesis, University of Surrey, 2008. http://epubs.surrey.ac.uk/842966/.

Pełny tekst źródła
Streszczenie:
The design and implementation of critical controllers benefit from development in a formal method such as B. However, B does not support execution specification directly, which is a requirement in controller design. The aim here is to develop a set of annotations so that they can be used by a B design engineer to capture execution requirements, while creating the B model. The annotations, once shown to be machine-annotation consistent with the B machine, can be used independently from the machine to assess the correctness of CSP controllers developed to detail the control behaviour. CSP-B is a formal method integration that can be used to develop critical controller with both state and event behaviour. The advantages of using annotations is that the execution requirements can be captured and shown to be machine-annotation consistent during state operation development, and that a control loop invariant does not have to be independently developed. Handel-C is used on route to hardware synthesis as it supports the implementation of concurrency and the manipulation of state. Annotations are utilised again to guide the translation of the B and control annotations into Handel-C. This PhD. work has three main aims. Firstly, to introduce a set of annotations to describe control directives to permit controller development in B. The annotations capture execution requirements. They give rise to proof obligations that when discharged prove that the annotations are machine-annotation consistent with the machine they are written in, and therefore will not cause the machine to diverge. Secondly, we have proven that CSP controllers that are consistent with the annotations will preserve the non-divergence property established between the machine and the annotations. Thirdly, we show how annotation refinement is possible, and show a range of mappings from the annotated B and the consistent controller to Handel-C. The development of mappings demonstrates the feasibility of automatic translation of annotated B to Handel-C.
Style APA, Harvard, Vancouver, ISO itp.
4

Binnie, Iona B. "Critical dimension control : influencing factors and measurement". Thesis, University of Edinburgh, 1991. http://hdl.handle.net/1842/10815.

Pełny tekst źródła
Streszczenie:
Advanced Lithography continues to be the limiting factor in the drive for higher levels of microcircuit integration. The key to the successful management of a lithography process is the integration of full measurement and instrumentation functions with the process, and the adoption of effective process control strategies. The aim of this research is to improve the understanding of critical dimension (CD) control by an investigation of the sources of variations in linewidth dimensions. Having identified the key factors, it should be possible to characterize and control their influence. Experimental analysis suggests that film thickness and photoresist thickness have a profound effect on linewidth dimensions. Simulation techniques are used to establish a theory which uses standing wave patterns within film stacks to predict reflectance and exposure threshold, as well as the dimensions of the developed resist images. This theory is later corroborated by measurements on test wafers. Having established the need to monitor film thickness variations, a novel metrology technique which incorporates both film thickness and linewidth uniformity measurements is introduced. The technique is based on the optical characteristics of a 'chequerboard' test pattern, consisting of clear and opaque squares. The chequerboard effectively enhances deviations in CD by translating changes in linewidth into an area change on the chequerboard. The technique was originally based on the measurement of light transmitted through glass wafers. The implementation of the technique using reflectance from silicon wafers is described, and possible future developments of the system are discussed.
Style APA, Harvard, Vancouver, ISO itp.
5

Åkerberg, Johan. "On security in safety-critical process control /". Västerås : School of Innovation, Design and Engineering, Mälardalen University, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7334.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Venugopalan, Vigneshwaran. "Supervisory wireless control for critical industrial applications". Thesis, University of Sheffield, 2014. http://etheses.whiterose.ac.uk/8501/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems". Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/20710/1/Robert_Dawson_Thesis.pdf.

Pełny tekst źródła
Streszczenie:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrastructures depend on. This thesis addresses securing control systems, focusing on securing the communications for supervisory control and data acquisition (SCADA) systems. We review the architectures of SCADA systems and produce a list of the system constraints that relate to securing these systems. With these constraints in mind, we survey both the existing work in information and SCADA security, observing the need to investigate further the problem of secure communications for SCADA systems. We then present risk modelling techniques, and model the risk in a simple SCADA system, using the ISM, a software tool for modelling information security risk. In modelling the risk, we verify the hypothesis that securing the communications channel is an essential part of an effective security strategy for SCADA systems. After looking at risk modelling, and establishing the value of securing communications, we move on to key management for SCADA systems. Appropriate key management techniques are a crucial part of secure communications, and form an important part of the contributions made in this work. We present a key management protocol that has been designed to run under the constraints specific to SCADA systems. A reductionist security proof is developed for a simplified version of the protocol, showing it is secure in the Bellare Rogaway model.
Style APA, Harvard, Vancouver, ISO itp.
8

Dawson, Robert Edward. "Secure communications for critical infrastructure control systems". Queensland University of Technology, 2008. http://eprints.qut.edu.au/20710/.

Pełny tekst źródła
Streszczenie:
In March 2000, 1 million litres of raw sewage was released into the water system of Maroochy Shire on Queensland’s sunshine coast. This environmental disaster was caused by a disgruntled ex-contractor using a radio transmitter to illicitly access the electronically controlled pumps in the control system. In 2007 CNN screened video footage of an experimental attack against a electrical generator. The attack caused the generator to shake and smoke, visually showing the damage caused by cyber attack. These attacks highlight the importance of securing the control systems which our critical infrastructures depend on. This thesis addresses securing control systems, focusing on securing the communications for supervisory control and data acquisition (SCADA) systems. We review the architectures of SCADA systems and produce a list of the system constraints that relate to securing these systems. With these constraints in mind, we survey both the existing work in information and SCADA security, observing the need to investigate further the problem of secure communications for SCADA systems. We then present risk modelling techniques, and model the risk in a simple SCADA system, using the ISM, a software tool for modelling information security risk. In modelling the risk, we verify the hypothesis that securing the communications channel is an essential part of an effective security strategy for SCADA systems. After looking at risk modelling, and establishing the value of securing communications, we move on to key management for SCADA systems. Appropriate key management techniques are a crucial part of secure communications, and form an important part of the contributions made in this work. We present a key management protocol that has been designed to run under the constraints specific to SCADA systems. A reductionist security proof is developed for a simplified version of the protocol, showing it is secure in the Bellare Rogaway model.
Style APA, Harvard, Vancouver, ISO itp.
9

Schwager, Mac. "Towards verifiable adaptive control for safety critical applications". Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32344.

Pełny tekst źródła
Streszczenie:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 2005.
Includes bibliographical references (p. 97-101).
To be implementable in safety critical applications, adaptive controllers must be shown to behave strictly according to predetermined specifications. This thesis presents two tools for verifying specifications relevant to practical direct-adaptive control systems. The first tool is derived from an asymptotic analysis of the error dynamics of a direct adaptive controller and uncertain linear plant. The analysis yields a so called Reduced Linear Asymptotic System, which can be used for designing adaptive systems to meet transient specifications. The tool is demonstrated in two design examples from flight mechanics, and verified in numerical simulation. The second tool developed is an algorithm for direct-adaptive control of plants with magnitude saturation constraints on multiple inputs. The algorithm is a non-trivial extension of an existing technique for single input systems with saturation. Boundeness of all signals is proved for initial conditions in a compact region. In addition, the notion of a class of multi-dimensional saturation functions is introduced. The saturation compensation technique is demonstrated in numerical simulation. Finally, these tools are applied to design a direct-adaptive controller for a realistic multi-input aircraft model to accomplish control reconfiguration in the case of unforeseen failure, damage, or disturbances. A novel control design for incorporating control allocation and reconfiguration is introduced. The adaptive system is shown in numerical simulation to have favorable transient qualities and to give a stable response with input saturation constraints.
by Mac Schwager.
S.M.
Style APA, Harvard, Vancouver, ISO itp.
10

Lundahl, Kristoffer. "Modeling and Optimization for Critical Vehicle Maneuvers". Licentiate thesis, Linköpings universitet, Fordonssystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-94010.

Pełny tekst źródła
Streszczenie:
As development in sensor technology, situation awareness systems, and computational hardware for vehicle systems progress, an opportunity for more advanced and sophisticated vehicle safety-systems arises. With the increased level of available information---such as position on the road, road curvature and knowledge about surrounding obstacles---future systems could be seen utilizing more advanced controls, exploiting at-the-limit behavior of the vehicle. Having this in mind, optimization methods have emerged as a powerful tool for offline vehicle-performance evaluation, providing inspiration to new control strategies, and by direct implementation in on-board systems. This will, however, require a careful choice of modeling and objectives, since the solution to the optimization problem will rely on this. With emphasis on vehicle modeling for optimization-based maneuvering applications, a vehicle-dynamics testbed has been developed. Using this vehicle in a series of experiments, most extensively in a double lane-change maneuver, verified the functionality and capability of the equipment. Further, a comparative study was performed, considering vehicle models based on the single-track model, extended with, e.g., tire-force saturation, tire-force lag and roll dynamics. The ability to predict vehicle behavior was evaluated against measurement data from the vehicle testbed. A platform for solving vehicle-maneuvering optimization-problems has been developed, with state-of-the-art optimization tools, such as JModelica.org and Ipopt. This platform is utilized for studies concerning the influence different vehicle-model configurations have on the solution to critical maneuvering problems. In particular, different tire modeling approaches, as well as vehicle-chassis models of various complexity, are investigated. Also, the influence different road-surface conditions-e.g., asphalt, snow and ice-have on the solution to time-optimal maneuvers is studied. The results show that even for less complex models-such as a single-track model with a Magic Formula based tire-model-accurate predictions can be obtained when compared to measurement data. The general observation regarding vehicle modeling for the time-critical maneuvers is similar; even the least complex models can be seen to capture certain characteristics analogous to those of higher complexity. Analyzing the results from the optimization problems, it is seen that the overall dynamics, such as resultant forces and yaw moment, obtained for different model configurations, correlates very well. For different road surfaces, the solutions will of course differ due to the various levels of tire-forces being possible to realize. However, remarkably similar vehicle paths are obtained, regardless of surface. These are valuable observations, since they imply that models of less complexity could be utilized in future on-board optimization-algorithms, to generate, e.g., yaw moment and vehicle paths. In combination with additional information from enhanced situation-awareness systems, this enables more advanced safety-systems to be considered for future vehicles.
Style APA, Harvard, Vancouver, ISO itp.

Książki na temat "Critical control"

1

Chua, Wai Fong, Tony Lowe i Tony Puxty, red. Critical Perspectives in Management Control. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-07658-1.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Manfred, Mackauer, Ehler Lester E i Roland Jens, red. Critical issues in biological control. Andover, Hants [England]: Intercept, 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Fong, Chua Wai, Lowe Tony i Puxty Anthony, red. Critical perspectives in management control. Basingstoke: Macmillan, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

1955-, Chua Wai Fong, Lowe Tony i Puxty Anthony G, red. Critical perspectives in management control. Basingstoke: Macmillan, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Chua, Waifong. Critical perspectives in management control. Basingstoke: Macmillan, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Manfred, Mackauer, Ehler Lester E i Roland Jens, red. Critical issues in biological control. Andover: Intercept, 1989.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Davis, Nanette J. Social control of deviance: A critical perspective. New York: McGraw-Hill Pub. Co., 1990.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

K, Mumby Dennis, red. Narrative and social control: Critical perspectives. Newbury Park [Calif.]: Sage Publications, 1993.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Mumby, Dennis. Narrative and Social Control: Critical Perspectives. 2455 Teller Road, Thousand Oaks California 91320 United States: SAGE Publications, Inc., 1993. http://dx.doi.org/10.4135/9781483345277.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Gordon, Belcher, McIver Duncan E, Szalai Kenneth J i Advisory Group for Aerospace Research and Development. Guidance and Control Panel. Working Group 09., red. Validation of flight critical control systems. Neuilly sur Seine: Agard, 1991.

Znajdź pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Critical control"

1

Cohen, Max, i Calin Belta. "Safety-Critical Control". W Adaptive and Learning-Based Control of Safety-Critical Systems, 29–56. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29310-8_3.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Hudak-Roos, Martha, i E. Spencer Garrett. "Monitoring Critical Control Point Critical Limits". W HACCP, 62–71. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-8818-0_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Hudak-Roos, Martha, i E. Spencer Garrett. "Monitoring Critical Control Point Critical Limits". W HACCP, 62–71. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-6542-6_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Novillo, Ernesto. "Critical Velocity of Turbomachines". W Vibration Control Engineering, 125–43. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003175230-6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Humber, John. "Control Points and Critical Control Points". W HACCP, 97–104. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-8818-0_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Humber, John. "Control Points and Critical Control Points". W HACCP, 97–104. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-6542-6_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Sperber, William H. "Determining Critical Control Points". W HACCP, 39–49. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-8818-0_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Krishnan, Armin. "Critical Loss of Control". W Why Paramilitary Operations Fail, 133–55. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-71631-2_6.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Sperber, William H. "Determining Critical Control Points". W HACCP, 39–49. Boston, MA: Springer US, 1992. http://dx.doi.org/10.1007/978-1-4684-6542-6_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Cohen, Max, i Calin Belta. "Adaptive Safety-Critical Control". W Adaptive and Learning-Based Control of Safety-Critical Systems, 77–94. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29310-8_5.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Critical control"

1

Hannemann-Mantalas, Lynda C., i Harry J. Levinson. "Semiconductor process control". W Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.187456.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

van Bezooijen, Roelof W. H. "Star sensors for autonomous attitude control and navigation". W Critical Review Collection. SPIE, 1992. http://dx.doi.org/10.1117/12.161586.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Gershbock, Richard. "Image acquisition: quality control for document image scanners". W Critical Review Collection. SPIE, 1991. http://dx.doi.org/10.1117/12.48889.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Bezdek, James C. "Pattern recognition, neural networks, fuzzy control: what's next?" W Critical Review Collection. SPIE, 1994. http://dx.doi.org/10.1117/12.171190.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Duncan, William. "Combined arms command and control (CAC2): advanced technology demonstration (ATD)". W Critical Review Collection. SPIE, 1995. http://dx.doi.org/10.1117/12.205531.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Marshall, Lawrence, Martin Weaver, William T. Thodos i Bradley W. Schilling. "Integrated sight modules: fire control technology for the 21st century". W Critical Review Collection. SPIE, 1995. http://dx.doi.org/10.1117/12.205539.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Kuo, Sen M. "Adaptive active noise control systems: algorithms and digital signal processing (DSP) implementations". W Critical Review Collection. SPIE, 1995. http://dx.doi.org/10.1117/12.204209.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Buchman, T. "Control theories in critical illness and critical care". W 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601). IEEE, 2004. http://dx.doi.org/10.1109/cdc.2004.1428582.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Buchman, T. "Control theories in critical illness and critical care". W 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601). IEEE, 2004. http://dx.doi.org/10.1109/cdc.2004.1429197.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Buchman, T. "Control theories in critical illness and critical care". W 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601). IEEE, 2004. http://dx.doi.org/10.1109/cdc.2004.1429480.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Raporty organizacyjne na temat "Critical control"

1

Stilwell, Daniel J., Michel Pleimling i Uwe C. Tauber. Toward Control of Universal Scaling in Critical Dynamics. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2016. http://dx.doi.org/10.21236/ad1008825.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Musliner, David J., Robert P. Goldman, Michael J. Pelican, Kurt D. Krebsbach i Edmund H. Dunfee. SA-CIRCA: Self-Adaptive Control for Mission-Critical Systems. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2002. http://dx.doi.org/10.21236/ada407314.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Freeman, Jared T., i Daniel Serfaty. Team Collaboration for Command and Control: A Critical Thinking Model. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2002. http://dx.doi.org/10.21236/ada458622.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Noble, David. High Leverage Command and Control Functions with Critical Human Roles. Fort Belvoir, VA: Defense Technical Information Center, styczeń 1999. http://dx.doi.org/10.21236/ada461212.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Babcock, Wade, i Jerome Persh. Safeguarding America's Critical Technologies (and Avoiding Personal Risk) An Introduction to Export Control and Critical Technology Restrictions. Fort Belvoir, VA: Defense Technical Information Center, styczeń 2002. http://dx.doi.org/10.21236/ada406354.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Boren, Dale W. Management of Test Complexity for Emerging Safety Critical Control Systems Program. Fort Belvoir, VA: Defense Technical Information Center, maj 2006. http://dx.doi.org/10.21236/ada455899.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Musliner, David J., Robert P. Goldman, Michael J. Pelican i Kurt D. Drebsbach. MASA-CIRCA: Multi-Agent Self-Adaptive Control for Mission-Critical Systems. Fort Belvoir, VA: Defense Technical Information Center, luty 2004. http://dx.doi.org/10.21236/ada421747.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Shih, Tsung-Ming A., Steven M. Duniho i John H. McDonough. Control of Nerve Agent-Induced Seizures is Critical for Neuroprotection and Survival. Fort Belvoir, VA: Defense Technical Information Center, sierpień 2002. http://dx.doi.org/10.21236/ada417799.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Wilson, Patrick, L. D. Stephenson i Ashok Kumar. Critical Evaluation of Lock Automation and Control Equipment at Corps-Operated Navigation Locks. Fort Belvoir, VA: Defense Technical Information Center, lipiec 2001. http://dx.doi.org/10.21236/ada397446.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Wilson, Patrick, L. D. Stephenson i Ashok Kumar. Critical Evaluation of Lock Automation and Control Equipment at Corps-Operated Navigation Locks. Fort Belvoir, VA: Defense Technical Information Center, wrzesień 2000. http://dx.doi.org/10.21236/ada383865.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii