scholarly journals IDENTIFICATION IN FORM OF STATES SPACE AND INITIAL CONDITIONS IMPACT UPON ITS RESULTS

2019 ◽  
Vol 2019 (4) ◽  
pp. 76-79
Author(s):  
Илья Швырков ◽  
Il'ya Shvyrikov ◽  
Алексей Юдин ◽  
Aleksey Yudin

The aim of the work consists in the reveal of the most stable method of identification, in the reveal of factors influencing the parameter definition result of the melt model during leucosapphire singlecrystal growth by Kyropoulos’ method. Investigation methods are based on an engineering process computer modeling under the assumption that the object of control is an aperiodic link of the second order. The comparison of identification results is carried out through different methods built-in Matlab system, their adequacy is defined by actual processes. As a result of investigations there is obtained a description of an aperiodic link of the second order in the form of states space, an interpretation of results obtained in the form of a time constant of object control is given. It is shown that the engineering process description obtained in the form of states space is adequate, the availability of non-zero initial conditions (non-zero speed of technological parameter changes) has no influence upon an identification process. There are ob-tained dynamic characteristics for a set of experimental data by Process Models and Space State methods. The application of Space State method is recommended.

2020 ◽  
Vol 2020 (1) ◽  
Author(s):  
Emin Bešo ◽  
Senada Kalabušić ◽  
Naida Mujić ◽  
Esmir Pilav

AbstractWe consider the second-order rational difference equation $$ {x_{n+1}=\gamma +\delta \frac{x_{n}}{x^{2}_{n-1}}}, $$xn+1=γ+δxnxn−12, where γ, δ are positive real numbers and the initial conditions $x_{-1}$x−1 and $x_{0}$x0 are positive real numbers. Boundedness along with global attractivity and Neimark–Sacker bifurcation results are established. Furthermore, we give an asymptotic approximation of the invariant curve near the equilibrium point.


Filomat ◽  
2018 ◽  
Vol 32 (18) ◽  
pp. 6203-6210
Author(s):  
Vahidin Hadziabdic ◽  
Midhat Mehuljic ◽  
Jasmin Bektesevic ◽  
Naida Mujic

In this paper we will present the Julia set and the global behavior of a quadratic second order difference equation of type xn+1 = axnxn-1 + ax2n-1 + bxn-1 where a > 0 and 0 ? b < 1 with non-negative initial conditions.


Mathematics ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. 230
Author(s):  
Juan-Carlos Cortés ◽  
Ana Navarro-Quiles ◽  
José-Vicente Romero ◽  
María-Dolores Roselló

In this contribution, we construct approximations for the density associated with the solution of second-order linear differential equations whose coefficients are analytic stochastic processes about regular-singular points. Our analysis is based on the combination of a random Fröbenius technique together with the random variable transformation technique assuming mild probabilistic conditions on the initial conditions and coefficients. The new results complete the ones recently established by the authors for the same class of stochastic differential equations, but about regular points. In this way, this new contribution allows us to study, for example, the important randomized Bessel differential equation.


Author(s):  
Mohammad Zulkernine ◽  
Sheikh I. Ahamed

The rapid development and expansion of network-based applications have changed the computing world in the last decade. However, this overwhelming success has an Achilles’ heel: most software-controlled systems are prone to attacks both by internal and external users of the highly connected computing systems. These software systems must be engineered with reliable protection mechanisms, while still delivering the expected value of the software to their customers within the budgeted time and cost. The principal obstacle in achieving these two different but interdependent objectives is that current software engineering processes do not provide enough support for the software developers to achieve security goals. In this chapter, we reemphasize the principal objectives of both software engineering and security engineering, and strive to identify the major steps of a software security engineering process that will be useful for building secure software systems. Both software engineering and security engineering are ever-evolving disciplines, and software security engineering is still in its infancy. This chapter proposes a unification of the process models of software engineering and security engineering in order to improve the steps of the software life cycle that would better address the underlying objectives of both engineering processes. This unification will facilitate the incorporation of the advancement of the features of one engineering process into the other. The chapter also provides a brief overview and survey of the current state-of-the-art of software engineering and security engineering with respect to computer systems.


Author(s):  
Mohammad Zulkernine ◽  
Sheikh I. Ahamed

The rapid development and expansion of network-based applications have changed the computing world in the last decade. However, this overwhelming success has an Achilles’ heel: most software-controlled systems are prone to attacks both by internal and external users of the highly connected computing systems. These software systems must be engineered with reliable protection mechanisms, while still delivering the expected value of the software to their customers within the budgeted time and cost. The principal obstacle in achieving these two different but interdependent objectives is that current software engineering processes do not provide enough support for the software developers to achieve security goals. In this chapter, we reemphasize the principal objectives of both software engineering and security engineering, and strive to identify the major steps of a software security engineering process that will be useful for building secure software systems. Both software engineering and security engineering are ever-evolving disciplines, and software security engineering is still in its infancy. This chapter proposes a unification of the process models of software engineering and security engineering in order to improve the steps of the software life cycle that would better address the underlying objectives of both engineering processes. This unification will facilitate the incorporation of the advancement of the features of one engineering process into the other. The chapter also provides a brief overview and survey of the current state-of-the-art of software engineering and security engineering with respect to computer systems.


Sign in / Sign up

Export Citation Format

Share Document