Login / Signup
A trusted user-to-role and role-to-key access control scheme.
Hsing-Chung Chen
Published in:
Soft Comput. (2016)
Keyphrases
</>
control scheme
dynamic model
closed loop
real time
control system
back propagation
input output
control strategy