首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 18 毫秒
1.
This paper first develops a Lyapunov-type theorem to study global well-posedness(existence and uniqueness of the strong variational solution)and asymptotic stability in probability of nonlinear stochastic evolution systems(SESs)driven by a special class of Levy processes,which consist of Wiener and compensated Poisson processes.This theorem is then utilized to develop an approach to solve an inverse optimal stabilization problem for SESs driven by Levy processes.The inverse optimal control design achieves global well-posedness and global asymptotic stability of the closed-loop system,and minimizes a meaningful cost functional that penalizes both states and control.The approach does not require to solve a Hamilton-Jacobi-Bellman equation(HJBE).An optimal stabilization of the evolution of the frequency of a certain genetic character from the population is included to illustrate the theoretical developments.  相似文献   

2.
The modern technological advancement influences the growth of the cyber–physical system and cyber–social system to a more advanced computing system cyber–physical–social system (CPSS). Therefore, CPSS leads the data science revolution by promoting tri-space information resource from a single space. The establishment of CPSSs increases the related privacy concerns. To provide privacy on CPSSs data, various privacy-preserving schemes have been introduced in the recent past. However, technological advancement in CPSSs requires the modifications of previous techniques to suit its dynamics. Meanwhile, differential privacy has emerged as an effective method to safeguard CPSSs data privacy. To completely comprehend the state-of-the-art developments and learn the field’s research directions, this article provides a comprehensive review of differentially private data fusion and deep learning in CPSSs. Additionally, we present a novel differentially private data fusion and deep learning Framework for Cyber–Physical–Social Systems , and various future research directions for CPSSs.  相似文献   

3.
Tim J. Leech 《EDPACS》2015,51(3):6-10
Many years ago I wrote a seminal article titled “Control & Risk Self-Assessment: The Dawn of a New Era in Corporate Governance.” That article, and the ideas in it, played a significant role launching my first company in 1991, and had a significant impact on the profession globally. Almost 25 years later this article describes recent developments and forces that will almost certainly see the onset of an even more profound and significant transformation—truly the dawn of a new era in internal auditing.  相似文献   

4.
Networks−on−chip (NoC) are an alternative to alleviate the problems of legacy interconnect fabrics. However, many emerging technology NoC are developed and are now seen as their potential substitutes. In this context, this work introduces how the NoC industry is involved in the NoC technology design−trends and promotion. Secondly, an extensive discussion on the outstanding research problems and challenges for conventional and emerging technology NoC is developed. The related security concerns are particularly investigated.  相似文献   

5.
International Journal of Control, Automation and Systems - This paper studies the dynamic output feedback consensus control problem of linear heterogeneous multi-agent systems under the...  相似文献   

6.
7.
8.
Drawing from the institutional theory and resource-based view, we investigated the effects of a firm’s activities and levels of enterprise systems adoption and the effectiveness of the enterprise systems in supporting the firm (enterprise systems assimilation) on business performance. Empirical results suggest that institutional forces and IS resources significantly influence the enterprise systems adoption, which indirectly impacts the enterprise systems assimilation. Further, the enterprise systems adoption significantly influences business performance, and the enterprise systems assimilation mediates the effect of the enterprise systems adoption on business performance.  相似文献   

9.
10.
1IntroductionWhen estimated signal includes both state and unknown input of the system,estimation problemis referred to as state and input hybrid estimation(in the following,only hybrid estimation will beused for brevity).Hybrid estimation is originated f…  相似文献   

11.
《Ergonomics》2012,55(5):437-453
Abstract

Efficiency at ‘ mental ’ tasks was observed when performed according to a time schedule imposed by following one of two different 4-hour shift systems for a period of 12 consecutive days. Twenty-eight subjects were assigned either to a ‘ rotating ’ system, in which each 4-hour period of the 24 hours was worked once every 72 hours in a repeating cycle, or to a ‘ stabilized ’ system, in which the work periods were from 1230 to 1630 and 2400-0400 each day. In the rotating system, alterations in the level of several aspects of performance at different times of day were found to be related quite closely to concurrent fluctuations in body temperature arising from its natural circadian rhythm. A shift in the phase of this rhythm in response to the now sleep/waking cycle imposed by the stabilized system was accompanied by a corresponding change in the relative levels of performance observed in the two work periods. Thus in both systems body temperature was, in effect, a predictor of performance efficiency. Some implications for the organization of shift working are discussed  相似文献   

12.
13.
This paper proposes an adaptive synchronization problem for the master and slave structure of linear systems with nonlinear perturbations and mixed time-varying delays comprising different discrete and distributed time delays. Using an appropriate Lyapunov-Krasovskii functional, some delay-dependent sufficient conditions and an adaptation law including the master-slave parame- ters are established for designing a delayed synchronization law in terms of linear matrix inequalities(LMIs). The time-varying cont...  相似文献   

14.
Planning Support Systems (PSSs) are a family of computer based instruments specifically designed to support actors in their complex tasks in the field of planning. There is a gap between the high expectations that PSS developers have about the usefulness of their instruments and the instruments’ application in daily planning practice. PSS academics have proposed several ways to close this so-called implementation gap through a range of software, hardware and orgware approaches. Several of these approaches have been applied in practical planning settings. There is however a lack of consistent and structured reporting on the effectiveness of these approaches in improving PSS performance. Therefore, it is hard to distinguish between successful and less successful strategies, and it is difficult to draw overall lessons. This paper (1) proposes a comprehensive multidimensional framework that operationalizes PSS performance, and (2) analyses how recent PSS implementation studies have reported on this performance. The developed framework, based on literature from Group Model Building and group psychology, is sensitive to a wide variety of performance dimensions and therefore forms a useful guideline for assessing PSS implementation strategies. Studying these in a common framework supports the potential transfer of lessons to other PSS implementations. Most of the analyzed studies only posed hypotheses about which dimensions are improved through a specific strategy, but did not report on measuring impacts. By structurally measuring the effectiveness of a range of strategies to improve PSS implementation, lessons can be exchanged and a consistent body of knowledge can be built.  相似文献   

15.
Performance of cryptanalytic quantum search algorithms is mainly inferred from query complexity which hides overhead induced by an implementation. To shed light on quantitative complexity analysis removing hidden factors, we provide a framework for estimating time–space complexity, with carefully accounting for characteristics of target cryptographic functions. Processor and circuit parallelization methods are taken into account, resulting in the time–space trade-off curves in terms of depth and qubit. The method guides how to rank different circuit designs in order of their efficiency. The framework is applied to representative cryptosystems NIST referred to as a guideline for security parameters, reassessing the security strengths of AES and SHA-2.  相似文献   

16.
This research examines users’ motives for adopting and using social networking sites (SNSs), with the aim of providing a better understanding of the fundamental reasons behind SNS adoption behavior. To uncover the relationship between the attributes of SNSs and users’ perceptions of their consequences and values, this study integrates a means–end approach with uses and gratifications theory and thereby extends the technique to a communication media selection context. Laddering interviews identify users’ perceptions of five attributes, 10 consequences, and four values associated with SNS adoption (i.e., Facebook). The results show that belonging, hedonism, self-esteem, and reciprocity are the four main values users attain through SNS adoption. Furthermore, the chains associated with SNS adoption can be represented in a hierarchical value map. This study should help practitioners design online communication platforms that more closely fit their users’ needs and provide users with safer, more friendly, and thus more attractive environments.  相似文献   

17.
International Journal of Computer-Supported Collaborative Learning - The increasing use of digital learning tools and platforms in formal and informal learning settings has provided broad access to...  相似文献   

18.
The notion of kontrast, or the ability of certain linguistic expressions to generate a set of alternatives, originally proposed by Vallduví and Vilkuna (1998) as a clause-level concept, is re-analyzed here as connecting the level of information packaging in the clause and the level of discourse structure in the following way: kontrast is encoded at the clausal level but has repercussions for discourse structure. This claim is supported by evidence from the distribution properties of three colloquial Russian particles -to, e, andved' which are analyzed as unambiguous markers of kontrast. Both the placement of these particles at the clausal level and their role in discourse are viewed as consequences of the type of the kontrast set and the cognitive status of information marked by each particle.  相似文献   

19.
Cloud service certifications (CSCs) are assessed by practitioners to support strategic cloud adoption decisions with the aim to reduce information asymmetries. Both businesses and consumers scrutinize CSCs’ assurances as ex ante signals indicating a cloud provider’s future service quality. While some research has examined the aggregate effects of certifications on decision variables, recipients’ evaluations of certifications and their assurances before making IT-related decisions have received little attention. Furthermore, prior research has predominantly focused on privacy and security assurances in e-commerce certifications. Drawing on signaling theory, we propose that certifications are signals that recipients decompose into a set of fine-grained assurance signals that they weigh to evaluate certifications. We evaluate the responses of 113 company representatives and 317 consumers to a best-worst scaling survey to examine the relative importance these two groups attach to ten assurances from CSCs. Our results show that similar to other online contexts, security and privacy are important assurances, but additional assurances related to availability, the customer friendliness of contracts, and legal compliance are also demanded, particularly by companies. Privacy, security, and availability are most crucial to both companies and consumers, but their relative importance varies substantially between the two groups. Post-hoc subgroup analyses reveal significant differences in assurances’ relative importance for provider and user companies, adopter and non-adopter consumers as well as companies using different types of services and from different industries. Our findings indicate that recipients evaluate certifications as a bundle of signals with varying importance due to recipients’ characteristics and context. With this conceptualization, we contribute to an advanced understanding of the sense-making of certifications and lay out how it influences cloud service adoption theories. Our study has practical implications for certification authorities that design CSCs as well as for providing insights to cloud service providers on customers who draw on CSC assurances when making cloud service adoption decisions.  相似文献   

20.
Universal Access in the Information Society - The use of e-learning in training courses has been expanding, particularly in areas related to management. However, no previous studies have examined...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号