Academic literature on the topic 'Control tuple'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Control tuple.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Control tuple"

1

GONZÁLEZ, LUIS. "ALGORITHM COMPARING BINARY STRING PROBABILITIES IN COMPLEX STOCHASTIC BOOLEAN SYSTEMS USING INTRINSIC ORDER GRAPH." Advances in Complex Systems 10, supp01 (August 2007): 111–43. http://dx.doi.org/10.1142/s0219525907001136.

Full text
Abstract:
This paper deals with a special kind of complex systems which depend on an arbitrary (and usually large) number n of random Boolean variables. The so-called complex stochastic Boolean systems often appear in many different scientific, technical or social areas. Clearly, there are 2n binary states associated to such a complex system. Each one of them is given by a binary string u = (u1,…,un) ∈ {0, 1}n of n bits, which has a certain occurrence probability Pr {u}. The behavior of a complex stochastic Boolean system is determined by the current values of its 2n binary n-tuple probabilities Pr {u}
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Xi, Zhifu Tao, Huayou Chen, and Ligang Zhou. "A MAGDM Method Based on 2-Tuple Linguistic Heronian Mean and New Operational Laws." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 24, no. 04 (August 2016): 593–627. http://dx.doi.org/10.1142/s0218488516500288.

Full text
Abstract:
In this paper, we investigate the multiple attributes group decision making (MAGDM) problem with 2-tuple linguistic information. According to some closed operational laws of 2-tuple linguistic, some Algebra t-norm and s-norm based Heronian aggregation operators of 2-tuple linguistic information are put forward, the desired properties and the special cases where the parameters take different values are also discussed. Furthermore, a method of MAGDM under 2-tuple linguistic environment is proposed based on the Algebra t-norm and s-norm based 2-tuple linguistic Heronian mean operator or the Algeb
APA, Harvard, Vancouver, ISO, and other styles
3

Faizi, Shahzad, Tabasam Rashid, and Sohail Zafar. "A Multicriteria Decision-Making Approach Based on Fuzzy AHP with Intuitionistic 2-Tuple Linguistic Sets." Advances in Fuzzy Systems 2018 (August 1, 2018): 1–12. http://dx.doi.org/10.1155/2018/5789192.

Full text
Abstract:
In the modern literature related to linguistic decision-making, the 2-tuple linguistic representation model and its useful applications in various fields have been extensively studied and used during the last decade. Recently, some useful multicriteria decision-making (MCDM) methods have been introduced based on fuzzy analytic hierarchy process (AHP) for 2-tuple linguistic representation model. By keeping in mind the importance of this linguistic model, in this paper, we introduce a fuzzy AHP methodology for intuitionistic 2-tuple linguistic sets (I2TLSs) which is a useful extension of the 2-t
APA, Harvard, Vancouver, ISO, and other styles
4

PEI, ZHENG, LI ZOU, and LIANGZHONG YI. "A LINGUISTIC AGGREGATION OPERATOR INCLUDING WEIGHTS FOR LINGUISTIC VALUES AND EXPERTS IN GROUP DECISION MAKING." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 21, no. 06 (December 2013): 927–43. http://dx.doi.org/10.1142/s0218488513500426.

Full text
Abstract:
Different linguistic aggregation methods have been proposed and applied in the linguistic decision making problems. Generally, weights for experts or criteria are considered in linguistic aggregation processes. In this paper, we provide a method to discovery new forms to compute weights and new interpretations in the linguistic ordered weighted averaging operator. In linguistic decision analysis, it can be noticed that some of initial linguistic values used by experts have priority over others linguistic values in evaluation processes. We formalize the priority over initial linguistic values a
APA, Harvard, Vancouver, ISO, and other styles
5

Qin, Jindong, and Xinwang Liu. "2-tuple linguistic Muirhead mean operators for multiple attribute group decision making and its application to supplier selection." Kybernetes 45, no. 1 (January 11, 2016): 2–29. http://dx.doi.org/10.1108/k-11-2014-0271.

Full text
Abstract:
Purpose – The purpose of this paper is to develop some 2-tuple linguistic aggregation operators based on Muirhead mean (MM), which is combined with multiple attribute group decision making (MAGDM) and applied the proposed MAGDM model for supplier selection under 2-tuple linguistic environment. Design/methodology/approach – The supplier selection problem can be regarded as a typical MAGDM problem, in which the decision information should be aggregated. In this paper, the authors investigate the MAGDM problems with 2-tuple linguistic information based on traditional MM operator. The MM operator
APA, Harvard, Vancouver, ISO, and other styles
6

Abiteboul, Serge, and Seymour Ginsburg. "Tuple sequences and lexicographic indexes." Journal of the ACM 33, no. 3 (May 1986): 409–22. http://dx.doi.org/10.1145/5925.5926.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

YANG, WEI. "INDUCED CHOQUET INTEGRALS OF 2-TUPLE LINGUISTIC INFORMATION." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 21, no. 02 (April 2013): 175–200. http://dx.doi.org/10.1142/s0218488513500104.

Full text
Abstract:
The group decision making problem with inter-dependent or interactive attributes is studied. By using the Choquet integral and the inducing variables, we develop the induced 2-tuple correlated averaging (ITCA) operator, the generalized induced 2-tuple correlated averaging (GITCA) operator and the quasi-arithmetic induced 2-tuple correlated averaging (QITCA) operator. The characteristics of the proposed operators are that the evaluation values of decision makers are in linguistic arguments, the correlations among the elements can be reflected and the ordering of the arguments is based on other
APA, Harvard, Vancouver, ISO, and other styles
8

SANG, XIUZHI, and XINWANG LIU. "PARAMETERIZED 2-TUPLE LINGUISTIC MOST PREFERRED OWA OPERATORS AND THEIR APPLICATION IN DECISION MAKING." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 21, no. 06 (December 2013): 799–819. http://dx.doi.org/10.1142/s0218488513500384.

Full text
Abstract:
The most preferred OWA (MP-OWA) operator is a new method to aggregate preference information with crisp numbers, whose weights are related with the frequency of the most preferred assessment to each criteria. However, people are usually not able to estimate their preference degrees with crisp number, since they have a vague knowledge about the preference assessment. In this paper, we propose a 2-tuple linguistic MP-OWA (LMP-OWA) operator. It is useful because it can be used to make decision with linguistic preference relations, and the weighting vector is not only connected to the maximum freq
APA, Harvard, Vancouver, ISO, and other styles
9

Han, Chun Yan, Lian Zhong Liu, and Yi Fei Yuan. "Time Constraints of Access Control." Applied Mechanics and Materials 602-605 (August 2014): 3791–95. http://dx.doi.org/10.4028/www.scientific.net/amm.602-605.3791.

Full text
Abstract:
Currently, researches on time constraints for access control are not complete. To solve this problem, this paper enriches the time constraints for access control from the following aspects: firstly, we propose a four-tuple representation of time constraint by combining discrete time representation and periodic time representation; secondly, we put forward a function of computing the time of state changing on the basis of (1); finally, aiming at conflicts detecting and resolution for time constraints, we raise an algorithm for conflicts detection and resolution based on XACML and entities overl
APA, Harvard, Vancouver, ISO, and other styles
10

Kulik, B. A. "N-tuple algebra-based probabilistic logic." Journal of Computer and Systems Sciences International 46, no. 1 (February 2007): 111–20. http://dx.doi.org/10.1134/s1064230707010133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Control tuple"

1

Sheng, Quanzheng Computer Science &amp Engineering Faculty of Engineering UNSW. "Composite web services provisioning in dynamic environments." Awarded by:University of New South Wales. Computer Science and Engineering, 2006. http://handle.unsw.edu.au/1959.4/23457.

Full text
Abstract:
Web services composition is emerging as a promising technology for the effective automation of application-to-application collaborations. The application integration problems have been subject of much research in the past years. However, with growth in importance of business process automation and highly dynamic nature of the Internet, this research has taken on a new significance and importance. Adequate solutions to this problem will be very important to make enterprise systems more flexible, robust and usable in the future. In this dissertation, we present a novel approach for the declarati
APA, Harvard, Vancouver, ISO, and other styles
2

Zettervall, Hang. "Fuzzy Set Theory Applied to Make Medical Prognoses for Cancer Patients." Doctoral thesis, Blekinge Tekniska Högskola [bth.se], Faculty of Engineering - Department of Mathematics and Natural Sciences, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-00574.

Full text
Abstract:
As we all know the classical set theory has a deep-rooted influence in the traditional mathematics. According to the two-valued logic, an element can belong to a set or cannot. In the former case, the element’s membership degree will be assigned to one, whereas in the latter case it takes the zero value. With other words, a feeling of imprecision or fuzziness in the two-valued logic does not exist. With the rapid development of science and technology, more and more scientists have gradually come to realize the vital importance of the multi-valued logic. Thus, in 1965, Professor Lotfi A. Zadeh
APA, Harvard, Vancouver, ISO, and other styles
3

Fan, Yang, Hidehiko Masuhara, Tomoyuki Aotani, Flemming Nielson, and Hanne Riis Nielson. "AspectKE*: Security aspects with program analysis for distributed systems." Universität Potsdam, 2010. http://opus.kobv.de/ubp/volltexte/2010/4136/.

Full text
Abstract:
Enforcing security policies to distributed systems is difficult, in particular, when a system contains untrusted components. We designed AspectKE*, a distributed AOP language based on a tuple space, to tackle this issue. In AspectKE*, aspects can enforce access control policies that depend on future behavior of running processes. One of the key language features is the predicates and functions that extract results of static program analysis, which are useful for defining security aspects that have to know about future behavior of a program. AspectKE* also provides a novel variable binding mech
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Control tuple"

1

Bayless, Jonathan. Point Reyes National Seashore: Tule elk management plan and environmental assessment. Point Reyes, CA: Point Reyes National Seashore, National Park Service, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

United States. Bureau of Reclamation. Klamath Basin Area Office. Environmental assessment for an integrated pest management program for leased lands at Lower Klamath and Tule Lake National Wildlife refuges, Oregon/California. Klamath Falls, Or: Bureau of Reclamation, Klamath Basin Area Office, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Konate, Lassana. Rapport d'étude: Sensiblité des vecteurs de paludisme à la permethrine et à la deltamethrine en imprégnation sur tulle moustiquaire : étude menée dans les régions de Louga et de Kolda. [Senegal]: République du Sénégal, Ministère de la santé, Service national des grandes endémies, Coordination nationale du PNLP, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Inc, New Horizon Technologies, ed. Draft environmental assessment for an integrated pest management program for leased lands at Lower Klamath and Tule Lake National Wildlife Refuges, Oregon/California. [Portland, Or.?]: U.S. Fish and Wildlife Service, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Inc, New Horizon Technologies, and Klamath Basin National Wildlife Refuge Complex., eds. Integrated pest management plan for leased lands at Lower Klamath and Tule Lake National Wildlife refuges, Oregon/California: Draft. Klamath Falls, Or: Bureau of Reclamation, Klamath Basin Area Office, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Inc, New Horizon Technologies, and Klamath Basin National Wildlife Refuge Complex., eds. Environmental assessment for an integrated pest management program for leased lands at Lower Klamath and Tule Lake National Wildlife refuges, Oregon/California. Klamath Falls, OR: Bureau of Reclamation, Klamath Basin Area Office, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Control tuple"

1

Zhao, Shuai, Bo Cheng, Le Yu, Shou-lu Hou, Yang Zhang, and Jun-liang Chen. "Internet of Things Service Provisioning Platform for Cross-Application Cooperation." In Securing the Internet of Things, 655–78. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch033.

Full text
Abstract:
With the development of Internet of Things (IoT), large-scale of resources and applications atop them emerge. However, most of existing efforts are “silo” solutions, there is a tight-coupling between the device and the application. The paradigm for IoT and its corresponding infrastructure are required to move away from isolated solutions towards cooperative models. Recent works have focused on applying Service Oriented Architecture (SOA) to IoT service provisioning. Other than the traditional services of cyberspace which are oriented to a two-tuple problem domain, IoT services are faced with a three-tuple problem domain of user requirement, cyberspace and physical space. One challenge of existing works is lacking of efficient mechanism to on-demand provisioning the sensing information in a loosely-coupled, decentralized way and then dynamically coordinate the relevant services to rapidly respond to changes in the physical world. Another challenge is how to systematically and effectively access (plug) the heterogeneous devices without intrusive changing. This paper proposes a service provisioning platform which enables to access heterogeneous devices and expose device capabilities as light-weighted service, and presents an event-based message interaction mode to facilitate the asynchronous, on-demand sharing of sensing information in distributed, loosely-coupled IoT environment. It provides the basic infrastructure for IoT application pattern: inner-domain high-degree autonomy and inter-domain dynamic coordination. The practicability of platform is validated by experimental evaluations and a District Heating Control and Information System (DHCIS).
APA, Harvard, Vancouver, ISO, and other styles
2

Indraratne, Harith, and Gábor Hosszú. "Fine-Grained Data Access for Networking Applications." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 568–73. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch076.

Full text
Abstract:
Current-day network applications require much more secure data storages than anticipated before. With millions of anonymous users using same networking applications, security of data behind the applications have become a major concern of database developers and security experts. In most security incidents, the databases attached to the applications are targeted, and attacks have been made. Most of these applications require allowing data manipulation at several granular levels to the users accessing the applications—not just table and view level, but tuple level. A database that supports fine-grained access control restricts the rows a user sees, based on his/her credentials. Generally, this restriction is enforced by a query modification mechanism automatically done at the database. This feature enables per-user data access within a single database, with the assurance of physical data separation. It is enabled by associating one or more security policies with tables, views, table columns, and table rows. Such a model is ideal for minimizing the complexity of the security enforcements in databases based on network applications. With fine-grained access controls, one can create fast, scalable, and secure network applications. Each application can be written to find the correct balance between performance and security, so that each data transaction is performed as quickly and safely as possible. Today, the database vendors like Oracle 10g, and IBM DB2 provides commercial implementations of fine-grained access control methods, such as filtering rows, masking columns selectively based on the policy, and applying the policy only when certain columns are accessed. The behavior of the fine-grained access control model can also be increased through the use of multiple types of policies based on the nature of the application, making the feature applicable to multiple situations. Meanwhile, Microsoft SQL Server2005 has also come up with emerging features to control the access to databases using fine-grained access controls. Fine-grained access control does not cover all the security issues related to Internet databases, but when implemented, it supports building secure databases rapidly and bringing down the complexity of security management issues.
APA, Harvard, Vancouver, ISO, and other styles
3

"Discarding irrelevant tuples." In Meta-Level Control for Deductive Database Systems, 47–98. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-53754-6_49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Preferring useful tuples." In Meta-Level Control for Deductive Database Systems, 134–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 1991. http://dx.doi.org/10.1007/3-540-53754-6_53.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Control tuple"

1

Thion, Romuald, François Lesueur, and Meriam Talbi. "Tuple-based access control." In SAC 2015: Symposium on Applied Computing. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/2695664.2695758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hu, Tao, Jianjun Yang, and Jie Yao. "Study on Evidence Reliability Weighting Method Based on Two-tuple Linguistic." In 2016 International Conference on Intelligent Control and Computer Application (ICCA 2016). Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/icca-16.2016.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wei Guiwu and Wang Xiaorong. "Two-tuple linguistic multiple attribute group decision making based on the group ideal alternative." In 2008 Chinese Control Conference (CCC). IEEE, 2008. http://dx.doi.org/10.1109/chicc.2008.4604920.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sui, Bo, Lijuan Yan, Yufang Yang, and Jianwei Gao. "Two-tuple Linguistic Multi-attribute Decision-making based on Grey Target Theory." In 2014 International Conference on Mechatronics, Electronic, Industrial and Control Engineering. Paris, France: Atlantis Press, 2014. http://dx.doi.org/10.2991/meic-14.2014.154.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Haolun, and Ranjun Deng. "Approach of linguistic group decision making based on combination weighting 2-tuple linguistic VIKOR." In 2018 Chinese Control And Decision Conference (CCDC). IEEE, 2018. http://dx.doi.org/10.1109/ccdc.2018.8407468.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cheng, Peipei, Bin Zhou, Zichun Chen, and Jing Tan. "The TOPSIS method for decision making with 2-tuple linguistic intuitionistic fuzzy sets." In 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). IEEE, 2017. http://dx.doi.org/10.1109/iaeac.2017.8054284.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Xu, Yejun, and Ling Huang. "An Approach to Group Decision Making Problems Based on 2-Tuple Linguistic Aggregation Operators." In 2008 ISECS International Colloquium on Computing, Communication, Control, and Management. IEEE, 2008. http://dx.doi.org/10.1109/cccm.2008.40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Xixiang Zhang, Xiaojing Liu, Yun Zhang, and Jing Lei. "Estimation of missing values in an incomplete linguistic 2-tuple judgment matrix based on additive consistency." In 2008 Chinese Control and Decision Conference (CCDC). IEEE, 2008. http://dx.doi.org/10.1109/ccdc.2008.4597674.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lei, Li, Zheng Lijuan, and Guo Ge. "A method for emergency plan evaluation under group decision makers based on 2-tuple prioritized OWA operator." In 2016 Chinese Control and Decision Conference (CCDC). IEEE, 2016. http://dx.doi.org/10.1109/ccdc.2016.7531335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shmyrin, A. M., and A. G. Yartsev. "Effect of Number of Data Tuples on Results of Mixed Control of the Neighborhood Model." In 2018 International Russian Automation Conference (RusAutoCon). IEEE, 2018. http://dx.doi.org/10.1109/rusautocon.2018.8501710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!