Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
21,063
result(s) for
"Identification Data processing."
Sort by:
A real-time in-memory discovery service : leveraging hierarchical packaging information in a unique identifier network to retrieve track and trace information
The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called \"Discovery Service\" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.
Biometrics in Identity Management: Concepts to Applications
2011
In today's digital infrastructure we have to interact with an increasing number of systems, both in the physical and virtual world. Identity management (IdM) -- the process of identifying an individual and controlling access to resources based on their associated privileges -- is becoming progressively complex. This has brought the spotlight on the importance of effective and efficient means of ascertaining an individual's identity. Biometric technologies like fingerprint recognition, face recognition, iris recognition etc. have a long history of use in law enforcement applications and are now transitioning towards commercial applications like password replacements, ATM authentication and others.This unique book provides you with comprehensive coverage of commercially available biometric technologies, their underlying principles, operational challenges and benefits, and deployment considerations. It also offers a look at the future direction these technologies are taking. By focusing on factors that drive the practical implementation of biometric technologies, this book serves to bridge the gap between academic researchers and industry practitioners. This book focuses on design, development, and deployment issues related to biometric technologies, including operational challenges, integration strategies, technical evaluations of biometric systems, standardization and privacy preserving principles, and several open questions which need to be answered for successful deployments.
Digital Identification: Privacy, Security and Technology
by
Lottie Gould
2024
This book explores how to leverage the power of artificial intelligence (AI) to create a secure digital identity, and how to leverage those capabilities with digital infrastructure, such as mobile ID, to make internet access safer, more available, and more equitable for everyone. Digital identification is a long-overdue and necessary tool for the U.S. economy to transition into the digital age, while preventing fraud, ensuring privacy, and improving equity.
Identification of Aerodynamic Coefficients of Longitudinal Movement and Error Estimates for Onboard Measurements of Supercritical Angles of Attack
by
Stulovskii, A V
,
Korsun, O N
,
Ovcharenko, V N
in
Aerodynamic coefficients
,
Aerodynamics
,
Airspeed
2018
We propose an identification method for the aerodynamic coefficients of the lift force, drag force, and pitch moment in the supercritical range of angles of attack. The investigated models take into account the hysteresis with respect to the angle of attack, which is the main specific feature of aerodynamic coefficients in the specified range. Also, we consider the problem to find and correct errors of onboard measurements in the channels of the angle of attack and the air speed and the computational model for the forces and moments created by engines with a deflected thrust vector. We provide processing examples for the flight test data obtained during maneuvers on supercritical angles of attack; they confirm the efficiency of the proposed methods.
Journal Article
Cluster Variational-Selective Method of Passive Location for Triangulation Measuring Systems
by
Chepel, E N
,
Nasenkov, I G
,
Bulychev, Yu G
in
Clusters
,
Measurement techniques
,
Site selection
2018
Based on the mathematical apparatus of cluster and variational-selective analysis, we develop a new intellectual-analytic method for constructing an estimate of irradiating the target position for the case of significant a priori indeterminacy with respect to the functioning conditions of a triangulation measuring system. This method is an alternative to the known methods of maximal verisimilitude, minimal squares, and minimum of various geometric and cinematic discrepancies, applied traditionally for solving the passive location problem within the normal functioning conditions of the system. We provide the results of comparative analysis and practical recommendations for applying the method.
Journal Article
Identification of Constant Parameters of Dynamic Systems by a Time-Frequency Method
by
Ovcharenko, V N
,
Evstratov, A R
,
Poplavskii, B K
in
Differential equations
,
Dynamical systems
,
Estimation
2018
A time-frequency method for identifying linear dynamic systems of a general form with constant parameters and delays in their observable variables is considered. The identification problem is found to be decomposable into the problem of estimating unknown parameters and the problem of estimating the initial conditions. Applying the time-frequency method to identify the differential equation of the Van der Pol oscillator, which is nonlinear by both its state and parameters, is considered. Examples are used to show that the time-frequency method solves the identification problem both for stable and unstable dynamic systems.
Journal Article
An algebraic criterion for detecting the fact and time a fault occurs in control systems of dynamic plants
2016
This paper proposes a new algebraic criterion for fault detection in control systems of dynamic plants; this criterion uses only the measurements of input and output signals and is based on the solvability condition for the problem of identifying the mathematical model of a dynamic plant. To estimate the proposed criterion, it is compared with a criterion based on analyzing prediction errors in solving a fault detection problem for a stabilizer actuator.
Journal Article
Theoretical and applied aspects of the mathematical apparatus of permutation-masking transformations
by
Ivakina, S. S.
,
Bulychev, Yu. G.
,
Bulychev, V. Yu
in
Broadband
,
Communication research
,
Computer science
2017
We develop the mathematical apparatus of permutation-masking transformations (PMTs) of different types, enabling us to assign the full set of possible images to the initial generating function. We study the algebraic, spectral, and autocorrelation properties of these transformations. We substantiate the possibility of constructing complex broadband (in the frequency sense) images based on a simple generating function. We study the action of these transformations on stationary random processes, in particular, noncorrelated ones (of the white noise type). The developed apparatus can be applied in many areas, in particular related with the synthesis of the optimal ensembles of signals for communication and management systems; sounding signals for problems of radio-location and navigation; and coding, masking, and enciphering information; and also optimal signal processing in noisy conditions. We consider a demonstrational model example showing the possibility of raising the resolution and estimating quality of the signal parameters on the base of a modified correlator.
Journal Article