Rozprawy doktorskie na temat „Verification of control systems”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Verification of control systems”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Wang, Xuan. "Verification of digital controller implementations /". Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1073.pdf.
Pełny tekst źródłaKoleini, Masoud. "Verification of temporal-epistemic properties of access control systems". Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3706/.
Pełny tekst źródłaLahijanian, Morteza M. "Formal verification and control of discrete-time stochastic systems". Thesis, Boston University, 2013. https://hdl.handle.net/2144/12804.
Pełny tekst źródłaThis thesis establishes theoretical and computational frameworks for formal verification and control synthesis for discrete-time stochastic systems. Given a temporal logic specification, the system is analyzed to determine the probability that the specification is achieved, and an input law is automatically generated to maximize this probability. The approach consists of three main steps: constructing an abstraction of the stochastic system as a finite Markov model, mapping the given specification onto this abstraction, and finding a control policy to maximize the probability of satisfying the specification. The framework uses Probabilistic Computation Tree Logic (PCTL) as the specification language. The verification and synthesis algorithms are inspired by the field of probabilistic model checking. In abstraction, a method for the computation of the exact transition probability bounds between the regions of interest in the domain of the stochastic system is first developed. These bounds are then used to construct an Interval-valued Markov Chain (IMC) or a Bounded-parameter Markov Decision Process (BMDP) abstraction for the system. Then, a representative transition probability is used to construct an approximating Markov chain (MC) for the stochastic system. The exact bound of the approximation error and an explicit expression for its grovvth over time are derived. To achieve a desired error value, an adaptive refinement algorithm that takes advantage of the linear dynamics of the system is employed. To verify the properties of the continuous domain stochastic system against a finite-time PCTL specification, IMC and BMDP verification algorithms are designed. These algorithms have low computational complexity and are inspired by the MC model checking algorithms. The low computational complexity is achieved by over approximating the probabilities of satisfaction. To increase the precision of the method, two adaptive refinement procedures are proposed. Furthermore, a method of generating the control strategy that maximizes the probability of satisfaction of a PCTL specification for Markov Decision Processes (MDPs) is developed. Through a similar method, a formal synthesis framework is constructed for continuous domain stochastic systems by utilizing their BMDP abstractions. These methodologies are then applied in robotics applications as a means of automatically deploying a mobile robot subject to noisy sensors and actuators from PCTL specifications. This technique is demonstrated through simulation and experimental case studies of deployment of a robot in an indoor environment. The contributions of the thesis include verification and synthesis frameworks for discrete time stochastic linear systems, abstraction schemes for stochastic systems to MCs, IMCs, and BMDPs, model checking algorithms with low computational complexity for IMCs and BMDPs against finite-time PCTL formulas, synthesis algorithms for Markov Decision Processes (MDPs) from PCTL formulas, and a computational framework for automatic deployment of a mobile robot from PCTL specifications. The approaches were validated by simulations and experiments. The algorithms and techniques in this thesis help to make discrete-time stochastic systems a more useful and effective class of models for analysis and control of real world systems.
de, Carvalho Gomes Pedro, i Attilio Picoco. "Sound Extraction of Control-Flow Graphs from open Java Bytecode Systems". KTH, Teoretisk datalogi, TCS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-104076.
Pełny tekst źródłaQC 20121029
Verification of Control-Flow Properties of Programs with Procedures(CVPP)
Danielsson, Fredrik K. J. "Off-line programming, verification and optimisation of industrial control systems". Thesis, De Montfort University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.269247.
Pełny tekst źródłaPark, Taeshin 1966. "Formal verification and dynamic validation of logic-based control systems". Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50358.
Pełny tekst źródłaHa, Vida Uyen 1980. "Verification of an attitude control system". Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/87408.
Pełny tekst źródłaIncludes bibliographical references (p. 74).
by Vida Uyen Ha.
M.Eng.and S.B.
STESINA, FABRIZIO. "Design and verification of Guidance, Navigation and Control systems for space applications". Doctoral thesis, Politecnico di Torino, 2014. http://hdl.handle.net/11583/2540688.
Pełny tekst źródłaLow, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment". Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.
Pełny tekst źródłaHu, Zhongjun. "Switching-Based Harmonic Disturbance Rejection for Uncertain Systems: An Experimental Verification". The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1577987902093915.
Pełny tekst źródłaBhattacharyya, Siddhartha. "HIERARCHICAL HYBRID-MODEL BASED DESIGN, VERIFICATION, SIMULATION, AND SYNTHESIS OF MISSION CONTROL FOR AUTONOMOUS UNDERWATER VEHICLES". UKnowledge, 2005. http://uknowledge.uky.edu/gradschool_diss/344.
Pełny tekst źródłaHerbert, Eric W. "NPSAT1 magnetic attitude control system algorithm verification, validation, and air-bearing tests". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FHerbert.pdf.
Pełny tekst źródłaThesis advisor(s): Barry Leonard, Xiaoping Yun. Includes bibliographical references (p. 185-186). Also available online.
Ellis, Joshua Randolph. "Modeling, Dynamics, and Control of Tethered Satellite Systems". Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/26456.
Pełny tekst źródłaPh. D.
Silva, Sérgio António Inácio da. "Type-based protocol conformance and aliasing control in concurrent java programs". Master's thesis, Faculdade de Ciências e Tecnologia, 2012. http://hdl.handle.net/10362/8476.
Pełny tekst źródłaIn an object-oriented setting, objects are modeled by their state and operations. The programmer should be aware of how each operation implicitly changes the state of an object. This is due to the fact that in certain states some operations might not be available, e.g., reading from a file when it is closed. Additional care must be taken if we consider aliasing, since many references to the same object might be held and manipulated. This hinders the ability to identify the source of a modification to an object, thus making it harder to track down its state. These difficulties increase in a concurrent setting, due to the unpredictability of the behavior of concurrent programs. Concurrent programs are complex and very hard to reason about and debug. Some of the errors that arise in concurrent programs are due to simultaneous accesses to shared memory by different threads, resulting in unpredictable outcomes due to the possible execution interleavings. This kind of errors are generally known as race conditions. Software verification and specification are important in software design and implementation as they provide early error detection, and can check conformity to a given specification, ensuring some intended correctness properties. To this end, our work builds on the work of Spatial-Behavioral types formalism providing object ownership support. Our approach consists in the integration of a behavioral type system, developed for a core fragment of the Java programming language, in the standard Java development process.
PTDC/EIA-CCO/104583/2008 research scholarship
Zhang, Jiafeng [Verfasser], i Georg [Akademischer Betreuer] Frey. "Modeling and verification of reconfigurable discrete event control systems / Jiafeng Zhang. Betreuer: Georg Frey". Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2015. http://d-nb.info/1080521577/34.
Pełny tekst źródłaBarros, Tomás. "Formal specification and verification of distributed component systems". Nice, 2005. http://www.theses.fr/2005NICE4048.
Pełny tekst źródłaSecreted phospholipases A2 (sPLA2) are potent inhibitors of Human Immunodeficiency Virus (HIV) replication. In order to gain insights of their antiviral effects we have cloned a bee-venom sPLA2 (bvPLA2) resistant HIV strain, HIVRBV-3. Our goal is to elucidate the molecular mechanisms that confer bvPLA2 resistance to HIVRBV-3. HIV enters cell via fusion o viral and plasma membrane. Furthermore, it is generally admitted that HIV endosomal entry is a dead end route of infection. We show that HIVRBV-3 entry is highly dependent on the molecular mechanisms of endocytosis, particularly those of vesicular trafficking. We were able to show, using three different ways of investigation, that HIVRBV-3 replication in different cell lines is inhibited by lysosomotropic agents, and by drug that affect the cytoskeleton (actin microfilaments and microtubules) polymerization. We further demonstrate that HIVRBV-3 envelope glycoprotein directs HIVRBV-3 in this particularly entry route and that is sufficient to confer bvPLA2 resistance to a HIV bfPLA2 sensitive strain. We are currently investigating the role played by uncommon mutations in the variable loops of HIVRBV-3 envelope glycoprotein, in directing the HIVRBV-3 entry pathway. These uncommon mutations are also specific of long-term non-progressor HIV strains? This lead us to assess the role played by endogenous human sPLA2 in the physiopathology of the HIV infection. Altogether our results suggest a new resistance mechanism at the cellular level. Indeed, HIV may overcome the inhibitory effect of an intracytoplasmic block by using an alternative entry pathway
Bihi, Thabo George. "Assembly-setup verification and quality control using machine vision within a reconfigurable assembly system". Thesis, [Bloemfontein?] : Central University of Technology, Free State, 2014. http://hdl.handle.net/11462/188.
Pełny tekst źródłaThe project is aimed at exploring the application of Machine Vision in a Reconfigurable Manufacturing System (RMS) Environment. The Machine Vision System interfaces with the RMS to verify the reconfiguration and positioning of devices within the assembly system, and inspects the product for defects that infringe on the quality of that product. The vision system interfaces to the Multi-agent System (MAS), which is in charge of scheduling and allocating resources of the RMS, in order to communicate and exchange data regarding the quality of the product. The vision system is comprised of a Compact Vision System (CVS) device with fire-wire cameras to aid in the image acquisition, inspection and verification process. Various hardware and software manufacturers offer a platform to implement this with a multiple array of vision equipment and software packages. The most appropriate devices and software platform were identified for the implementation of the project. An investigation into illumination was also undertaken in order to determine whether external lighting sources would be required at the point of inspection. Integration into the assembly system involved the establishment communication between the vision system and assembly system controller.
Kiekbusch, Lisa [Verfasser], Karsten [Akademischer Betreuer] Berns i Peter [Akademischer Betreuer] Liggesmeyer. "Analysis and Verification of Complex Robot Systems using Behaviour-Based Control / Lisa Kiekbusch ; Karsten Berns, Peter Liggesmeyer". Kaiserslautern : Technische Universität Kaiserslautern, 2017. http://d-nb.info/1128149273/34.
Pełny tekst źródłaZhou, Yichao. "Lip password-based speaker verification system with unknown language alphabet". HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/562.
Pełny tekst źródłaKATO, TOMOYUKI. "Modification of the Cal Poly Spacecraft Simulator System for Robust Control Law Verification". DigitalCommons@CalPoly, 2014. https://digitalcommons.calpoly.edu/theses/1201.
Pełny tekst źródłaWu, Wan. "Analytical and Numerical Methods Applied to Nonlinear Vessel Dynamics and Code Verification for Chaotic Systems". Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/30099.
Pełny tekst źródłaPh. D.
Salehi, Pour Mehr Vahid. "Development and Verification of Control and Protection Strategies in Hybrid AC/DC Power Systems for Smart Grid Applications". FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/804.
Pełny tekst źródłaFaria, Daniel C. "VERIFICATION AND VALIDATION OF A SAFETY SYSTEM FOR A FUEL-CELL RESEARCH FACILITY: A CASE STUDY". Ohio : Ohio University, 2007. http://www.ohiolink.edu/etd/view.cgi?ohiou1180552564.
Pełny tekst źródłaPakmehr, Mehrdad. "Towards verifiable adaptive control of gas turbine engines". Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/49025.
Pełny tekst źródłaBraman, Julia Marie Badger Murray Richard M. Murray Richard M. "Safety verification and failure analysis of goal-based hybrid control systems /cJulia M.B. Braman ; Richard Murray, committee chair and advisor". Diss., Pasadena, Calif. : California Institute of Technology, 2009. http://resolver.caltech.edu/CaltechETD:etd-05292009-111937.
Pełny tekst źródłaKureksiz, Funda. "A Real Time Test Setup Design And Realization For Performance Verification Of Controller Designs For Unmanned Air Vehichles". Master's thesis, METU, 2008. http://etd.lib.metu.edu.tr/upload/2/12609393/index.pdf.
Pełny tekst źródłaWilliams, Steve. "Advanced Test Range Verification at RF Without Flights". International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/605960.
Pełny tekst źródłaFlight and weapons test ranges typically include multiple Telemetry Sites (TM Sites) that receive telemetry from platforms being flown on the range. Received telemetry is processed and forwarded by them to a Range Control Center (RCC) which is responsible for flight safety, and for delivering captured best source telemetry to those responsible for the platform being flown. When range equipment or operations are impaired in their ability to receive telemetry or process it correctly, expensive and/or one-of-a-kind platforms may have to be destroyed in flight to maintain safety margins, resulting in substantial monetary loss, valuable data loss, schedule disruption and potential safety concerns. Less severe telemetry disruptions can also result in missing or garbled telemetry data, negatively impacting platform test, analysis and design modification cycles. This paper provides a high level overview of a physics-compliant Range Test System (RTS) built upon Radio Frequency (RF) Channel Simulator technology. The system is useful in verifying range operation with most range equipment configured to function as in an actual mission. The system generates RF signals with appropriate RF link effects associated with range and range rate between the flight platform and multiple telemetry tracking stations. It also emulates flight and RF characteristics of the platform, to include signal parameters, antenna modeling, body shielding and accurate flight parameters. The system is useful for hardware, software, firmware and process testing, regression testing, and fault detection test, as well as range customer assurance, and range personnel training against nominal and worst-case conditions.
Björkman, Carl. "Computing component specifications from global system requirements". Thesis, KTH, Teoretisk datalogi, TCS, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210843.
Pełny tekst źródłaOm vi har ett program med strikta kontrollflödeskrav och vill garantera att vissa systemkrav uppfylls genom att verifiera formella egenskaper av detta program, samtidigt som en del av kodbasen är i form av ett plug-in eller tredjeparts-bibliotek som vi inte har tillgång till vid verifieringen, så kan proceduren som presenteras i detta examensarbete användas för att generera de systemkrav som de plug-in eller tredjeparts-bibliotek behöver uppfylla för att slutprodukten ska passera de givna systemkraven. Detta examensarbete bygger på en transformationsprocedur som omvandlar kontrollflödesegenskaper på en beteendemässig form till en strukturell form. Kontrollflödes-egenskaperna fokuserar uteslutande på kontrollflöden i den meningen att de abstraherar bort all form av programdata och berör enbart anrop- och retur-händelser. Med beteendemässiga egenskaper syftar vi på egenskaper som berör exekverings-beteende och med strukturella egenskaper syftar vi på egenskaper som berör ordningen på instruktionerna i källkoden eller objektkoden. Resultatet i detta examensarbete tar denna transformationsprocedur ett steg längre och antar att vissa metoder (eller funktioner eller procedurer beroende på programmeringsspråk) är redan givna i formen av modeller som kallas flödesgrafer, medan resten av metoderna fortfarande är ospecificerade. Utdata blir då en mängd av strukturella restriktioner för de ospecificerade metoderna, som de måste följa för att en fulländning av den partiella flödesgrafen ska satisfiera den beteendemässiga formeln.
Su, Jinya. "Fault estimation algorithms : design and verification". Thesis, Loughborough University, 2016. https://dspace.lboro.ac.uk/2134/23231.
Pełny tekst źródłaSchlesinger, Sebastian [Verfasser], Sabine [Akademischer Betreuer] Glesner, Sabine [Gutachter] Glesner, Holger [Gutachter] Giese i Ina [Gutachter] Schäfer. "Formal verification of model refactorings for hybrid control systems / Sebastian Schlesinger ; Gutachter: Sabine Glesner, Holger Giese, Ina Schäfer ; Betreuer: Sabine Glesner". Berlin : Technische Universität Berlin, 2018. http://d-nb.info/1170228321/34.
Pełny tekst źródłaSoulat, Romain. "Synthesis of correct-by-design schedulers for hybrid systems". Phd thesis, École normale supérieure de Cachan - ENS Cachan, 2014. http://tel.archives-ouvertes.fr/tel-01062337.
Pełny tekst źródłaTuzov, Ilya. "Dependability-driven Strategies to Improve the Design and Verification of Safety-Critical HDL-based Embedded Systems". Doctoral thesis, Universitat Politècnica de València, 2021. http://hdl.handle.net/10251/159883.
Pełny tekst źródła[CA] La utilització de sistemes encastats en cada vegada més àmbits d'aplicació està portant al fet que el seu disseny haja d'enfrontar-se a majors requisits de rendiment, consum d'energia i àrea (PPA). Així mateix, la seua utilització en aplicacions crítiques provoca que hagen de complir amb estrictes requisits de confiabilitat per a garantir el seu correcte funcionament durant períodes prolongats de temps. En particular, l'ús de dispositius lògics programables de tipus FPGA és un gran desafiament des de la perspectiva de la confiabilitat, ja que aquests dispositius són molt sensibles a la radiació. Per tot això, la confiabilitat ha de considerar-se com un dels criteris principals per a la presa de decisions al llarg del tot flux de disseny, que ha de complementar-se amb diversos processos que permeten aconseguir estrictes requisits de confiabilitat. Primer, l'avaluació de la robustesa del disseny permet identificar els seus punts febles, guiant així la definició de mecanismes de tolerància a fallades. Segon, l'eficàcia dels mecanismes definits ha de validar-se experimentalment. Tercer, l'avaluació comparativa de la confiabilitat permet als dissenyadors seleccionar els components predissenyats (IP), les tecnologies d'implementació i les eines de disseny (EDA) més adequades des de la perspectiva de la confiabilitat. Finalment, l'exploració de l'espai de disseny (DSE) permet configurar de manera òptima els components i les eines seleccionats, millorant així la confiabilitat i les mètriques PPA de la implementació resultant. Tots els processos anteriorment esmentats es basen en tècniques d'injecció de fallades per a poder avaluar la robustesa del sistema dissenyat. A pesar que existeix una àmplia varietat de tècniques d'injecció de fallades, diverses problemes encara han d'abordar-se per a cobrir les necessitats plantejades en el flux de disseny. Aquelles solucions basades en simulació (SBFI) han d'adaptar-se als models de nivell d'implementació, tenint en compte l'arquitectura dels diversos components de la tecnologia utilitzada. Les tècniques d'injecció de fallades basades en FPGAs (FFI) han d'abordar problemes relacionats amb la granularitat de l'anàlisi per a poder localitzar els punts febles del disseny. Un altre desafiament és la reducció del cost temporal dels experiments d'injecció de fallades. A causa de l'alta complexitat dels dissenys actuals, el temps experimental dedicat a l'avaluació de la confiabilitat pot ser excessiu fins i tot en aquells escenaris més simples, mentre que pot ser inviable en aquells processos relacionats amb l'avaluació de múltiples configuracions alternatives del disseny. Finalment, aquests processos orientats a la confiabilitat manquen d'un suport instrumental que permeta cobrir el flux de disseny amb tota la seua varietat de llenguatges de descripció de maquinari, tecnologies d'implementació i eines de disseny. Aquesta tesi aborda els reptes anteriorment esmentats amb la finalitat d'integrar, de manera eficaç, aquests processos orientats a la confiabilitat en el flux de disseny. Primerament, es proposen nous mètodes d'injecció de fallades que permeten una avaluació de la confiabilitat, precisa i detallada, en diferents nivells del flux de disseny. Segon, es defineixen noves tècniques per a l'acceleració dels experiments d'injecció que milloren el seu cost temporal. Tercer, es defineix dues estratègies DSE que permeten configurar de manera òptima (des de la perspectiva de la confiabilitat) els components IP i les eines EDA, amb un cost experimental mínim. Quart, es proposa un kit d'eines (DAVOS) que automatitza i incorpora amb eficàcia els processos orientats a la confiabilitat en el flux de disseny semicustom. Finalment, es demostra la utilitat i eficàcia de les propostes mitjançant un cas d'estudi en el qual s'implementen tres processadors encastats en un FPGA de Xilinx serie 7.
[EN] Embedded systems are steadily extending their application areas, dealing with increasing requirements in performance, power consumption, and area (PPA). Whenever embedded systems are used in safety-critical applications, they must also meet rigorous dependability requirements to guarantee their correct operation during an extended period of time. Meeting these requirements is especially challenging for those systems that are based on Field Programmable Gate Arrays (FPGAs), since they are very susceptible to Single Event Upsets. This leads to increased dependability threats, especially in harsh environments. In such a way, dependability should be considered as one of the primary criteria for decision making throughout the whole design flow, which should be complemented by several dependability-driven processes. First, dependability assessment quantifies the robustness of hardware designs against faults and identifies their weak points. Second, dependability-driven verification ensures the correctness and efficiency of fault mitigation mechanisms. Third, dependability benchmarking allows designers to select (from a dependability perspective) the most suitable IP cores, implementation technologies, and electronic design automation (EDA) tools. Finally, dependability-aware design space exploration (DSE) allows to optimally configure the selected IP cores and EDA tools to improve as much as possible the dependability and PPA features of resulting implementations. The aforementioned processes rely on fault injection testing to quantify the robustness of the designed systems. Despite nowadays there exists a wide variety of fault injection solutions, several important problems still should be addressed to better cover the needs of a dependability-driven design flow. In particular, simulation-based fault injection (SBFI) should be adapted to implementation-level HDL models to take into account the architecture of diverse logic primitives, while keeping the injection procedures generic and low-intrusive. Likewise, the granularity of FPGA-based fault injection (FFI) should be refined to the enable accurate identification of weak points in FPGA-based designs. Another important challenge, that dependability-driven processes face in practice, is the reduction of SBFI and FFI experimental effort. The high complexity of modern designs raises the experimental effort beyond the available time budgets, even in simple dependability assessment scenarios, and it becomes prohibitive in presence of alternative design configurations. Finally, dependability-driven processes lack an instrumental support covering the semicustom design flow in all its variety of description languages, implementation technologies, and EDA tools. Existing fault injection tools only partially cover the individual stages of the design flow, being usually specific to a particular design representation level and implementation technology. This work addresses the aforementioned challenges by efficiently integrating dependability-driven processes into the design flow. First, it proposes new SBFI and FFI approaches that enable an accurate and detailed dependability assessment at different levels of the design flow. Second, it improves the performance of dependability-driven processes by defining new techniques for accelerating SBFI and FFI experiments. Third, it defines two DSE strategies that enable the optimal dependability-aware tuning of IP cores and EDA tools, while reducing as much as possible the robustness evaluation effort. Fourth, it proposes a new toolkit (DAVOS) that automates and seamlessly integrates the aforementioned dependability-driven processes into the semicustom design flow. Finally, it illustrates the usefulness and efficiency of these proposals through a case study consisting of three soft-core embedded processors implemented on a Xilinx 7-series SoC FPGA.
Tuzov, I. (2020). Dependability-driven Strategies to Improve the Design and Verification of Safety-Critical HDL-based Embedded Systems [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/159883
TESIS
Hejase, Mohammad. "Dynamic Probabilistic Risk Assessment of Autonomous Vehicle Systems". The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1546473181365722.
Pełny tekst źródłaNeupane, Mahesh Raj. "Optimization of a sequential alignment verification and positioning system (SAVPS) for proton radiosurgery". CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2784.
Pełny tekst źródłaLavaei, Abolfazl [Verfasser], Martin [Akademischer Betreuer] Buss, Sadegh [Gutachter] Soudjani, Majid [Gutachter] Zamani i Martin [Gutachter] Buss. "Automated Verification and Control of Large-Scale Stochastic Cyber-Physical Systems: Compositional Techniques / Abolfazl Lavaei ; Gutachter: Sadegh Soudjani, Majid Zamani, Martin Buss ; Betreuer: Martin Buss". München : Universitätsbibliothek der TU München, 2019. http://d-nb.info/1205463143/34.
Pełny tekst źródłaAlmajed, Yasser M. "A framework for an adaptive early warning and response system for insider privacy breaches". Thesis, De Montfort University, 2015. http://hdl.handle.net/2086/11129.
Pełny tekst źródłaRust, Ian Charles. "Control of a nonlinear underactuated system with adaptation, numerical stability verification, and the use of the LQR Trees algorithm". Thesis, Massachusetts Institute of Technology, 2010. http://hdl.handle.net/1721.1/59934.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (p. 54).
Underactuated robotics, though surrounded by an established body of work, has certain limitations when nonlinear adaptive control principles are applied. This thesis applies a nonlinear adaptative controller that avoids many of these limitations using alterations inspired by the control of a similar underactuated system, the cart-pole. Due to the complexity of the system, a sums-of-squares MATLAB toolbox is used to generate a suitable Lyapunov Candidate used for proofs of stability, with claims of local stability made using Barbalat's Lemma. This provides us with a local domain of attraction for the altered classical nonlinear adaptive controller. In addition, the algorithm known as LQR Trees is applied to the system in order to create a controller with a larger region of attraction and lower torque requirements, though without an adaptive component. Both control systems are implemented in simulations using MATLAB.
by Ian Charles Rust.
S.B.
Lopes, Daniel Pedro Ferreira. "Face verication for an access control system in unconstrained environment". Master's thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/23395.
Pełny tekst źródłaO reconhecimento facial tem vindo a receber bastante atenção ao longo dos últimos anos não só na comunidade cientifica, como também no ramo comercial. Uma das suas várias aplicações e o seu uso num controlo de acessos onde um indivíduo tem uma ou várias fotos associadas a um documento de identificação (também conhecido como verificação de identidade). Embora atualmente o estado da arte apresente muitos estudos em que tanto apresentam novos algoritmos de reconhecimento como melhorias aos já desenvolvidos, existem mesmo assim muitos problemas ligados a ambientes não controlados, a aquisição de imagem e a escolha dos algoritmos de deteção e de reconhecimento mais eficazes. Esta tese aborda um ambiente desafiador para a verificação facial: um cenário não controlado para o acesso a infraestruturas desportivas. Uma vez que não existem condições de iluminação controladas nem plano de fundo controlado, isto torna um cenário complicado para a implementação de um sistema de verificação facial. Esta tese apresenta um estudo sobre os mais importantes algoritmos de detecção e reconhecimento facial assim como técnicas de pré-processamento tais como o alinhamento facial, a igualização de histograma, com o objetivo de melhorar a performance dos mesmos. Também em são apresentados dois métodos para a aquisição de imagens envolvendo a seleção de imagens e calibração da câmara. São apresentados resultados experimentais detalhados baseados em duas bases de dados criadas especificamente para este estudo. No uso de técnicas de pré-processamento apresentadas, foi possível presenciar melhorias até 20% do desempenho dos algoritmos de reconhecimento referentes a verificação de identidade. Com os métodos apresentados para os testes ao ar livre, foram conseguidas melhorias na ordem dos 30%.
Face Recognition has been received great attention over the last years, not only on the research community, but also on the commercial side. One of the many uses of face recognition is its use on access control systems where a person has one or several photos associated to an Identi cation Document (also known as identity veri cation). Although there are many studies nowadays, both presenting new algorithms or just improvements of the already developed ones, there are still many open problems regarding face recognition in uncontrolled environments, from the image acquisition conditions to the choice of the most e ective detection and recognition algorithms, just to name a few. This thesis addresses a challenging environment for face veri cation: an unconstrained environment for sports infrastructures access. As there are no controlled lightning conditions nor controlled background, this makes a di cult scenario to implement a face veri cation system. This thesis presents a study of some of the most important facial detection and recognition algorithms as well as some pre-processing techniques, such as face alignment and histogram equalization, with the aim to improve their performance. It also introduces some methods for a more e cient image acquisition based on image selection and camera calibration, specially designed for addressing this problem. Detailed experimental results are presented based on two new databases created speci cally for this study. Using pre-processing techniques, it was possible to improve the recognition algorithms performances up to 20% regarding veri cation results. With the methods presented for the outdoor tests, performances had improvements up to 30%
Larsson, Rickard, i Kenny Andersson. "Construction, testing and verification of a brushless excitation system with wireless control of the field current in a synchronous generator". Thesis, Uppsala universitet, Elektricitetslära, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-341021.
Pełny tekst źródłaQuinton, Sophie. "Design, vérification et implémentation de systèmes à composants". Phd thesis, Université de Grenoble, 2011. http://tel.archives-ouvertes.fr/tel-00685854.
Pełny tekst źródłaKwaa-Aidoo, Ephrem K. "Culturally aligned security in banking. A system for rural banking in Ghana". Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.
Pełny tekst źródłaSulyman, Muhammad, i Shahid Ali. "Applying Model Checking for Verifying the Functional Requirements of a Scania’s Vehicle Control System". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-15447.
Pełny tekst źródłaKwaa-Aidoo, Ephrem Kwaku. "Culturally aligned security in banking : a system for rural banking in Ghana". Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/4433.
Pełny tekst źródłaFürmetz, Maria Verfasser], Peter [Akademischer Betreuer] Predehl, Günther [Akademischer Betreuer] [Hasinger i Lothar [Akademischer Betreuer] Oberauer. "Design, development and verification of the eROSITA thermal control system / Maria Fürmetz. Gutachter: Lothar Oberauer ; Günther Hasinger. Betreuer: Peter Predehl ; Günther Hasinger". München : Universitätsbibliothek der TU München, 2012. http://d-nb.info/1031514996/34.
Pełny tekst źródłaXausa, Ilaria [Verfasser], Matthias [Akademischer Betreuer] Gerdts i Olivier [Akademischer Betreuer] Bokanowski. "Verification of Collision Avoidance Systems using Optimal Control and Sensitivity Analysis / Ilaria Xausa. Universität der Bundeswehr München, Fakultät für Luft- und Raumfahrttechnik. Betreuer: Matthias Gerdts. Gutachter: Matthias Gerdts ; Olivier Bokanowski". Neubiberg : Universitätsbibliothek der Universität der Bundeswehr München, 2015. http://d-nb.info/1081029749/34.
Pełny tekst źródłaXausa, Ilaria Verfasser], Matthias [Akademischer Betreuer] [Gerdts i Olivier [Akademischer Betreuer] Bokanowski. "Verification of Collision Avoidance Systems using Optimal Control and Sensitivity Analysis / Ilaria Xausa. Universität der Bundeswehr München, Fakultät für Luft- und Raumfahrttechnik. Betreuer: Matthias Gerdts. Gutachter: Matthias Gerdts ; Olivier Bokanowski". Neubiberg : Universitätsbibliothek der Universität der Bundeswehr München, 2015. http://nbn-resolving.de/urn:nbn:de:bvb:706-4394.
Pełny tekst źródłaWild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems". Doctoral thesis, Universitätsbibliothek Chemnitz, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-217284.
Pełny tekst źródłaWild, Stefan. "Enhancing Security in Managing Personal Data by Web Systems". Universitätsverlag Chemnitz, 2016. https://monarch.qucosa.de/id/qucosa%3A20629.
Pełny tekst źródłaCastillo, Castañeda Eduardo. "Principes, techniques et outils de simulation : vérification et exécution d'actions robotiques". Grenoble INPG, 1994. http://www.theses.fr/1994INPG0123.
Pełny tekst źródłaCohen, Philippe. "Realisation dans le cadre d'une methode de conception orientee edif, d'un systeme de cao pour les vlsi". Paris 6, 1988. http://www.theses.fr/1988PA066156.
Pełny tekst źródła