الذكاء الاصطناعي

Fault detection and isolation using hybrid parameter estimation and fuzzy logic residual evaluation

فبراير 11, 2002

DOI:

Publisher: Slovensko društvo INFORMATIKA

/ Belkacem Athamena

Other Researches

Smart Contracts and Blockchain-Based Tools for Privacy-Preservation

This research paper aims to investigate smart contracts and Blockchain technology to build a privacy-sensitive application focusing on a Digital Medication Plan (DMR) containing prescriptions. The DMR is used just as a use case. However, the propose...

Impact of religious tourism on the economic development, energy consumption and environmental degradation: evidence from the Kingdom of Saudi Arabia

Purpose: Saudi Arabia is the main destination of religious tourism, as it has many spiritual places. With the passage of years, the figures for pilgrim visits are increasing, which is contributing to the economic growth of the Kingdom of Saudi Arabi...

Retention contracts with asymmetric information: optimistic approach vs pessimistic approach

Purpose: This paper aims to focus on the utilization of retention contracts to screen and discipline managers in a context in which the council, board of directors, possesses incomplete information about the consequences of managers’ decisions. The ...

Retention Contracts under Partial Information Electoral Competition Case Study

This study copes with a class of principal-agent problems where information asymmetry represents an important characteristic. The paper examines the relationship between the principal and agents. The principal has to perform two agents’ screening an...

Formal Approach to Data Accuracy Evaluation

Usually, data quality is defined by multiple attributes that allow classifying the output data (such as completeness, freshness, and accuracy) or the methods exploiting these data (such as dependability, performance, and protection). Among the sugge...

Managing asymmetric information effects in decision making: Task complexity-based model

This paper proposes a formal model to manage the impact of asymmetric information in decision-making by using principal-agent problems in which an agent (who has incomplete information) must decide to perform or not perform a task on behalf of the p...

Identity Identification and Management in the Internet of Things

Henceforth, users agreed on the necessity of continuous Internet connection independently of the place, the manner, and the time. Nowadays, several elite services are accessible by people over the Internet of Things (IoT), which is a heterogeneous n...

Identity Management System Model in the Internet of Things

This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply describes the IdMS features ...