2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring) 2019
DOI: 10.1109/vtcspring.2019.8746526
|View full text |Cite
|
Sign up to set email alerts
|

Modeling with Thinging for Intelligent Monitoring System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…Currently, no formal proof exists that the five TM stages are sufficient to describe all behavior processes. The TM model has been applied to many real systems, such as in phone communication [29], physical security [17], vehicle tracking [19], intelligent monitoring [32], asset management [20], information leakage [22], engineering plants [23], inventory management processes [24], procurement processes [26], public key infrastructure network architecture [26], bank check processing [35], waste water treatment [39], computer attacks [26], provenance [42], services in banking industry architecture network [31], and digital circuits [37]. Additionally, we will expend extensive effort to partially substantiate the claim of the genericity of the TM stages in different fields.…”
Section: Tm Substantiationmentioning
confidence: 99%
“…Currently, no formal proof exists that the five TM stages are sufficient to describe all behavior processes. The TM model has been applied to many real systems, such as in phone communication [29], physical security [17], vehicle tracking [19], intelligent monitoring [32], asset management [20], information leakage [22], engineering plants [23], inventory management processes [24], procurement processes [26], public key infrastructure network architecture [26], bank check processing [35], waste water treatment [39], computer attacks [26], provenance [42], services in banking industry architecture network [31], and digital circuits [37]. Additionally, we will expend extensive effort to partially substantiate the claim of the genericity of the TM stages in different fields.…”
Section: Tm Substantiationmentioning
confidence: 99%
“…The TM model has been applied to many real systems, such as phone communication [16], physical security [17], vehicle tracking [18], unmanned aerial vehicles [19], and programming [20]. www.ijacsa.thesai.org…”
Section: Thing Machine With Five Generic Processesmentioning
confidence: 99%
“…9, 2019 364 | P a g e www.ijacsa.thesai.org Triggering the not busy state results in taking a new customer from the queue, as mentioned previously (10), and also updates the queue data (16). Thus,  The front value is retrieved (17) and decremented (18), and the new value is stored (19).…”
Section: Thing Machine Modeling Examplementioning
confidence: 99%