Showing 1 - 18 results of 18 for search '(("criminal system") OR ("critical system"))', query time: 0.11s Refine Results
  1. 1

    Critical Systems Heuristics for Sustainable Management of Iran's Water-Energy-Food Nexus by Samira Ebrahimi, Mohammad Reza Fathi, Meisam Shahbazi

    Published 2025-06-01
    “…This study employs Critical Systems Heuristics (CSH), a reflective and emancipatory approach, to examine the systemic challenges and underlying assumptions within the WEF nexus in Iran. …”
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Stabilization of nonlinear safety-critical systems by relaxed converse Lyapunov-barrier approach and its applications in robotic systems by Haoqi Li, Jiangping Hu, Xiaoming Hu, Bijoy K. Ghosh

    Published 2024-11-01
    “…Abstract Combining safety objectives with stability objectives is crucial for safety-critical systems. Existing studies generally unified these two objectives by constructing Lyapunov-type barrier functions. …”
    Get full text
    Article
  5. 5

    Performance Analysis and Reliability Prediction of Multi‐State Service Systems With Multiple Failure Modes of Unreliable Server: An Engineering Perspective by Shreekant Varshney, Mohit Bajaj, Kapil Kumar Choudhary, Mukesh Pushkarna, Ievgen Zaitsev

    Published 2025-07-01
    “…Further, the differential‐difference equations are implemented to construct the mathematical model, and the Laplace transformation is applied to demonstrate the state probability distribution. Several critical system performance measures, such as mean‐time‐to‐failure (MTTF), machining systems' reliability, and steady‐state availability, are thoroughly investigated to evaluate machining system stability and efficiency. …”
    Get full text
    Article
  6. 6

    Foreign Forensic Technologies: The Concept of Relevance by I. E. Nikitina

    Published 2020-12-01
    “…For forensic experts, the relevance assessment is determined by data describing the cognitive object, perceived by the cognizing subject in different object’s reflections.Foreign criminal systems take great interest in recognizing the importance of the concept of relevance. …”
    Get full text
    Article
  7. 7
  8. 8

    instancespace: A Python package for insightful algorithm testing through Instance Space Analysis by Yusuf Berdan Güzel, Kushagra Khare, Nathan Harvey, Kian Dsouza, Dong Hyeog Jang, Junheng Chen, Cheng Ze Lam, Mario Andrés Muñoz

    Published 2025-09-01
    “…This package supports research by streamlining the testing process, providing unbiased metrics, and facilitating more informed algorithmic design and deployment decisions, particularly for complex and safety-critical systems.…”
    Get full text
    Article
  9. 9

    Research on error control method for polynomial approximation based on equal amplitude oscillation theorem by Letong Zhou, Liguo Zhao

    Published 2025-08-01
    “…This can provide theoretical support for extreme deviation suppression in engineering fields, especially in safety-critical systems.…”
    Get full text
    Article
  10. 10

    Reasons for the increase in cyber attacks: analysis of technical and non-technical factors by A. V. Vasilyev

    Published 2023-11-01
    “…Software errors, vulnerabilities, and deficiencies in network protocols pose a persistent security threat, particularly amidst the rising number of connected devices and the complexity of managing critical systems. The dynamic nature of attacks and evolving penetration methods make cyber threats highly adaptable to the conditions of the modern network environment.Furthermore, the expanded use of social media and the virtualization of social life bring increased comfort but also provide fertile ground for cyber attacks, amplifying the volume of accessible information for potential malicious actors. …”
    Get full text
    Article
  11. 11

    Proving Properties of Discrete-Valued Functions Using Deductive Proof: Application to the Square Root by Vassil Todorov, Safouan Taha, Frederic Boulanger, Armando Hernandez

    Published 2019-12-01
    “…Other industries (e.g. aerospace, railway, nuclear) that produce critical systems requiring certification also took the path of formal verification techniques. …”
    Get full text
    Article
  12. 12

    Translation from Event-B into Eiffel by Sofia Reznikova, Victor Rivera, Joo Young Lee, Manuel Mazzara

    Published 2018-12-01
    “…Formal modelling languages play a key role in the development of software: they enable users to specify functional requirements that serve as documentation as well; they enable users to prove the correctness of system properties, especially for critical systems. However, there is still an open question on how to map formal models to a specific programming language. …”
    Get full text
    Article
  13. 13

    How Do Meta-Organizations Reach Collective Action? A Comparative Study of Digital Transformation in Healthcare by Chienhung Chen, Chih-Yuan Wang, Zhao-Hong Cheng, Kune-Ping Shieh

    Published 2025-08-01
    “…Meta-organizational distributed approaches particularly suit contexts requiring clinical autonomy and adaptation to diverse environments, while traditional centralized approaches promote consistency in critical systems. These findings extend meta-organization theory by identifying specific mechanisms that overcome limited formal authority challenges. …”
    Get full text
    Article
  14. 14

    Neural Image Compression and Explanation by Xiang Li, Shihao Ji

    Published 2020-01-01
    “…Explaining the prediction of deep neural networks (DNNs) and semantic image compression are two active research areas of deep learning with a numerous of applications in decision-critical systems, such as surveillance cameras, drones and self-driving cars, where interpretable decision is critical and storage/network bandwidth is limited. …”
    Get full text
    Article
  15. 15

    Certified Robustness of Antenna Selecting Neural Networks for Massive MIMO Wireless Communications by Jaekwon Kim, Hyo-Sang Lim, Kwanghoon Choi

    Published 2025-01-01
    “…While empirical robustness against finite random inputs sampled from a uniform distribution may suffice for general applications, certified robustness ensuring consistent inference under all possible perturbations is essential for safety-critical systems. Although certified robustness is well studied in vision and language tasks, we are the first, to our knowledge, to explore its application in telecommunications. …”
    Get full text
    Article
  16. 16

    Potential of Graphic Organizers in Developing Communicative Competence in Learning Russian as a Foreign Language by Sharofat T. Chorieva

    Published 2025-06-01
    “…They contribute not only to the formation of foreign-language communicative competence, but also develop a creative approach, the ability to work in a team, logical-critical, systemic, creative thinking, and independent work skills. …”
    Get full text
    Article
  17. 17
  18. 18

    Valuing and retaining the dental workforce: a mixed-methods exploration of workforce sustainability in the North East of England by Heidi Stelling, Megan Brown, Bryan Burford, Paul Blaylock, Gillian Vance

    Published 2025-05-01
    “…Conclusion Findings highlight critical systemic barriers that threaten workforce sustainability in NHS dentistry. …”
    Get full text
    Article