7 resultados para Chain of custody of traces

em Cambridge University Engineering Department Publications Database


Relevância:

100.00% 100.00%

Publicador:

Resumo:

We have investigated the magnetization reversal process of a single chain of identical nanomagnetic dots fabricated from 30 nm thick Ni 80Fe20. The structures consist of two 5 μm wide support wires bridged with a single chain of identical dots of diameter δ in the range 100-250 nm. For fields applied perpendicular to the single chain, we observed an unusual size dependent hysteretic behavior in the magnetoresistance curve at high field. This is due to the magnetostatic interaction arising from the proximity of the magnetic charges. We are able to deduce from a simple micromagnetic simulation that the reversal process in the chain of dots with δ=100nm is mediated by a collective process of nearly coherent spin rotation. The magnetotransport measurements along the chain reveal a complex magnetization reversal process in the chain of nanomagnets. © 2002 American Institute of Physics.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

RFID is a technology that enables the automated capture of observations of uniquely identified physical objects as they move through supply chains. Discovery Services provide links to repositories that have traceability information about specific physical objects. Each supply chain party publishes records to a Discovery Service to create such links and also specifies access control policies to restrict who has visibility of link information, since it is commercially sensitive and could reveal inventory levels, flow patterns, trading relationships, etc. The requirement of being able to share information on a need-to-know basis, e.g. within the specific chain of custody of an individual object, poses a particular challenge for authorization and access control, because in many supply chain situations the information owner might not have sufficient knowledge about all the companies who should be authorized to view the information, because the path taken by an individual physical object only emerges over time, rather than being fully pre-determined at the time of manufacture. This led us to consider novel approaches to delegate trust and to control access to information. This paper presents an assessment of visibility restriction mechanisms for Discovery Services capable of handling emergent object paths. We compare three approaches: enumerated access control (EAC), chain-of-communication tokens (CCT), and chain-of-trust assertions (CTA). A cost model was developed to estimate the additional cost of restricting visibility in a baseline traceability system and the estimates were used to compare the approaches and to discuss the trade-offs. © 2012 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents explicit solutions for a few distributed LQG problems in which players communicate their states with delays. The resulting control structure is reminiscent of a simple management hierarchy, in which a top level input is modified by newer, more localized information as it gets passed down the chain of command. It is hoped that the controller forms arising through optimization may lend insight into the control strategies of biological and social systems with communication delays. © 2011 IEEE.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an analysis of the slow-peaking phenomenon, a pitfall of low-gain designs that imposes basic limitations to large regions of attraction in nonlinear control systems. The phenomenon is best understood on a chain of integrators perturbed by a vector field up(x, u) that satisfies p(x, 0) = 0. Because small controls (or low-gain designs) are sufficient to stabilize the unperturbed chain of integrators, it may seem that smaller controls, which attenuate the perturbation up(x, u) in a large compact set, can be employed to achieve larger regions of attraction. This intuition is false, however, and peaking may cause a loss of global controllability unless severe growth restrictions are imposed on p(x, u). These growth restrictions are expressed as a higher order condition with respect to a particular weighted dilation related to the peaking exponents of the nominal system. When this higher order condition is satisfied, an explicit control law is derived that achieves global asymptotic stability of x = 0. This stabilization result is extended to more general cascade nonlinear systems in which the perturbation p(x, v) v, v = (ξ, u) T, contains the state ξ and the control u of a stabilizable subsystem ξ = a(ξ, u). As an illustration, a control law is derived that achieves global stabilization of the frictionless ball-and-beam model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Hourly productivity levels in the UK still remain behind those in some competitor countries. The government devotes much policy attention to enhancing productivity and continues to emphasise its five drivers - investment, innovation, skills, enterprise, and competition. This article argues that it is investment broadly defined that is the key to sustained productivity improvement. The emphasis should be on improving productivity simultaneously with improving the quality of production. Only thus will the gains be widely shared. In achieving these aims there are two prerequisites for policy-makers. The first is to ensure better coordination of policy than appears to be currently achieved by the present departmental structures in Whitehall. The second is to recognize fully the long and complex chain of causation that can be triggered by pulling on one policy lever. Such complexity can only be fully understood by more research on what actually goes on inside the black box of the organization. © 2006 Oxford University Press.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper introduces the problem of passive control of a chain of N identical masses in which there is an identical passive connection between neighbouring masses and a similar connection to a movable point. The problem arises in the design of multi-storey buildings which are subjected to earthquake disturbances, but applies in other situations, for example vehicle platoons. The paper will study the scalar transfer functions from the disturbance to a given intermass displacement. It will be shown that these transfer functions can be conveniently represented in the form of complex iterative maps and that these maps provide a method to establish boundedness in N of the H ∞-norm of these transfer functions for certain choices of interconnection impedance. © 2013 IEEE.