Login / Signup
An Access Control System with Time-constraint Using Support Vector Machines.
Chin-Chen Chang
Iuon-Chang Lin
Chia-Te Liao
Published in:
Int. J. Netw. Secur. (2006)
Keyphrases
</>
control system
closed loop
access control
control law
learning to classify
control strategy
real time
fuzzy logic
random access
dc motor
multi agent systems
linear programming
social networks
databases
data sets
control method
fuzzy controller
control architecture
real environment
speed control
database