Search results for "Controls"

showing 5 items of 55 documents

Modeling and Backstepping Control of the Electronic Throttle System

2013

Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2013/871674 Open access Electronic throttle is widely used in modern automotive engines. An electronic throttle system regulates the throttle plate angle by using a DC servo motor to adjust the inlet airflow rate of an internal combustion engine. Its application leads to improvements in vehicle drivability, fuel economy, and emissions. In this paper, by taking into account the dynamical behavior of the electronic throttle, the mechanism model is first built, and then the mechanism model is transformed into the state-space model. Based on the s…

state-space modelingbacksteppingAutomotive engineEngineeringArticle SubjectGeneral Mathematicsback-stepping controlsinternal combustion enginesVDP::Technology: 500::Electrotechnical disciplines: 540ServomotorThrottleControl theorybackstepping design techniquecomputer simulationCruise controlbusiness.industrylcsh:MathematicsGeneral Engineeringbackstepping controllertracking performancelcsh:QA1-939fuel economyVDP::Mathematics and natural science: 400::Mathematics: 410Internal combustion enginelcsh:TA1-2040BacksteppingControl systemdynamical behaviorselectronic throttleautomotive enginebusinesslcsh:Engineering (General). Civil engineering (General)Mathematical Problems in Engineering
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

Supporting Cyber Resilience with Semantic Wiki

2016

Cyber resilient organizations, their functions and computing infrastructures, should be tolerant towards rapid and unexpected changes in the environment. Information security is an organization-wide common mission; whose success strongly depends on efficient knowledge sharing. For this purpose, semantic wikis have proved their strength as a flexible collaboration and knowledge sharing platforms. However, there has not been notable academic research on how semantic wikis could be used as information security management platform in organizations for improved cyber resilience. In this paper, we propose to use semantic wiki as an agile information security management platform. More precisely, t…

ta113021110 strategic defence & security studiesEngineeringKnowledge managementCloud computing securitybusiness.industryStandard of Good Practiceinformation security management0211 other engineering and technologies02 engineering and technologyInformation securitycyber resiliencesemantic wikiSecurity information and event managementrisk managementSecurity controlsResilience (organizational)World Wide WebITIL security managementInformation security management020204 information systems0202 electrical engineering electronic engineering information engineeringbusiness
researchProduct

Évaluation ergonomique du serveur intranet Bull

1997

Rapport de contrat Bull INRIA; Évaluation par inspection du serveur intranet Bull

évaluation par inspection[SHS.INFO]Humanities and Social Sciences/Library and information sciences[SCCO.COMP]Cognitive science/Computer scienceSoftware_PROGRAMMINGTECHNIQUES[SHS.INFO] Humanities and Social Sciences/Library and information sciencesdocument électroniqueComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSInformationSystems_MODELSANDPRINCIPLES[SCCO.COMP] Cognitive science/Computer science[ SCCO.COMP ] Cognitive science/Computer scienceComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION[ SHS.INFO ] Humanities and Social Sciences/Library and information sciencesergonomie informatiquedocument numériqueHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGévaluation d'un intranet
researchProduct

Annales des travaux des auditeurs de l'IHEDN 2006 : "Les évolutions récentes en Chine"

2006

CD rom; International audience

évolutionsHardware_MEMORYSTRUCTURES[ SHS.HIST ] Humanities and Social Sciences/HistoryAmérique latine[SHS]Humanities and Social SciencesIHEDN[SHS.HIST] Humanities and Social Sciences/History[ SHS ] Humanities and Social Sciences[SHS] Humanities and Social SciencesauditeursHardware_CONTROLSTRUCTURESANDMICROPROGRAMMING[SHS.HIST]Humanities and Social Sciences/HistoryChineComputingMilieux_MISCELLANEOUS
researchProduct