To install an Access Control System, activities and checklists.
Per L. HovingPublished in: Comput. Secur. (1983)
Keyphrases
- control system
- control algorithm
- fuzzy logic
- activity recognition
- remote access
- access control
- real time
- control strategy
- closed loop
- skill levels
- control law
- fuzzy control
- mobile devices
- information systems
- digital libraries
- database systems
- pid controller
- decision making
- real environment
- dc motor
- matlab simulation
- real world