An efficient access control scheme in user hierarchy based on polynomial interpolation and hash function.
Ashok Kumar DasAdrijit GoswamiVanga OdeluPublished in: Int. J. Commun. Networks Distributed Syst. (2014)
Keyphrases
- control scheme
- hash functions
- closed loop
- control system
- control strategy
- dynamic model
- control law
- predictive control
- neural network controller
- control loop
- robotic manipulator
- robot manipulators
- controller design
- hash table
- adaptive neural control
- pid controller
- fuzzy controller
- access control
- similarity search
- neural network
- control algorithm
- hash tables
- experimental data