The above paper(1) has considered the design of a finite-bit power-of-two quantizer algorithm when identifying the parameters of a time-invariant plant. This letter presents the design equations of the above algorithm...
详细信息
The above paper(1) has considered the design of a finite-bit power-of-two quantizer algorithm when identifying the parameters of a time-invariant plant. This letter presents the design equations of the above algorithm when the plant parameters are randomly time-varying.
Gradient techniques which use a weighting matrix to accelerate convergence are shown to be bilinear in the neighborhood of the extremum, while the gradient method itself behaves as a linear system. An investigation of...
详细信息
Gradient techniques which use a weighting matrix to accelerate convergence are shown to be bilinear in the neighborhood of the extremum, while the gradient method itself behaves as a linear system. An investigation of their reachable sets at the extremum provides a basis for explaining the improved performance experienced in practice. Using concepts from bilinear control theory, two new algorithms are designed which achieve further improvements in performance.
A contemporary system building design notation was adopted for the engineering of TRIUMF's new VAX-based data acquisition and analysis system. The requirements of automated systems' design notations are discus...
详细信息
A contemporary system building design notation was adopted for the engineering of TRIUMF's new VAX-based data acquisition and analysis system. The requirements of automated systems' design notations are discussed and the elements of the chosen notation described. Finally the group's experience in designing a data acquisition system with these techniques is presented.
The design and analysis of algorithms is one of the two essential cornerstone topics in computer science. However, some students think it hard to grasp and often learn by rote, thus they usually can't improve thei...
详细信息
ISBN:
(纸本)9781424435197
The design and analysis of algorithms is one of the two essential cornerstone topics in computer science. However, some students think it hard to grasp and often learn by rote, thus they usually can't improve their ability of algorithmdesign and algorithmanalysis. To address the problem, we advocate the incorporation of formal derivation into the design and analysis of algorithms. Formal algorithm derivation is valuable in revealing wonderful ideas behind algorithm, and ensuring resultant algorithm correctness. It would be helpful in showing where the algorithmic ideas come, thus enable the improvement of students' understanding and study. The detailed teaching design is presented in the paper.
This paper proposes a general framework for analyzing continuous-time systems controlled by event-triggered algorithms. Closed-loop systems resulting from using both static and dynamic output (or state) feedback laws ...
详细信息
ISBN:
(纸本)9781509028733
This paper proposes a general framework for analyzing continuous-time systems controlled by event-triggered algorithms. Closed-loop systems resulting from using both static and dynamic output (or state) feedback laws that are implemented via asynchronous event-triggered techniques are modeled as hybrid systems given in terms of hybrid inclusions and studied using recently developed tools for robust stability. Properties of the proposed models, including stability of compact sets, robustness, and Zeno behavior of solutions are addressed. The framework and results are illustrated in several event-triggered strategies available in the literature.
Screening methods are beneficial for studies involving simulations that have a large number of variables where a relatively small (but unknown) subset is important. In this paper, we show how a newly proposed Lasso-op...
详细信息
ISBN:
(纸本)9781479939503;9781479920778
Screening methods are beneficial for studies involving simulations that have a large number of variables where a relatively small (but unknown) subset is important. In this paper, we show how a newly proposed Lasso-optimal screening design and analysis method can be useful for efficiently conducting simulation screening experiments. Our approach uses new criteria for generating supersaturated designs, and a new algorithm for selecting the optimal tuning parameters for Lasso model selection. We generate a 24x69 Lasso optimal supersaturated design, illustrate its potential with a numerical evaluation, and apply it to an agent-based simulation of maritime escort operations in the Strait of Gibraltar. This application is part of a larger project that seeks to leverage simulation models during the ship design process, and so construct ships that are both cost effective and operationally effective. The supersaturated screening design has already proved beneficial for model verification and validation.
The synchronous assumption has made it possible to develop efficient procedures for establishing functional equivalence between different implementations in the domains of synchronous circuits and synchronous reactive...
详细信息
ISBN:
(纸本)0769507867
The synchronous assumption has made it possible to develop efficient procedures for establishing functional equivalence between different implementations in the domains of synchronous circuits and synchronous reactive systems. This notion is extended to embedded systems that do not satisfy the synchronous assumption inside their boundaries but only at the interface with the environment [5]. Efficient, But conservative, synchronous equivalence analysisalgorithms have been developed. In this work, we propose extensions to these algorithms that allow trading off the complexity with the conservativeness of the results.
Connectivity kappa(G) of a network G is traditionally considered to be the primary metric for evaluation of its fault-tolerance capability. However, connectivity as a metric has several limitations - e.g., it has no m...
详细信息
ISBN:
(纸本)9781612842332
Connectivity kappa(G) of a network G is traditionally considered to be the primary metric for evaluation of its fault-tolerance capability. However, connectivity as a metric has several limitations - e.g., it has no mechanism to distinguish between localized and random faults. Also it does not provide any information about the network state, if the number of failures exceed kappa(G). The network state information that might be of interest in such a scenario is the size of the largest connected component. In this paper, we address both these limitations and introduce a new metric called region-based largest component size (RBLCS), that provides the largest size of the component in which the network decomposes once all the nodes of a region fail. We study the computational complexity of finding RBLCS for a given network. In addition, we study the problem of least cost design of a network with a target value of RBLCS. We prove that the optimal design problem is NP-complete and present a heuristic to solve the problem. We evaluate our heuristic by comparing its solutions with the optimal solutions. Experimental results demonstrate that our heuristic produces near optimal solution in a fraction of time needed to find the optimal.
With the development and application of the multi-function radars (MFRs), it is imperative to analyse the behaviour for jamming decisions. Simulation software for MFR behaviour analysis is designed and developed for t...
详细信息
ISBN:
(纸本)9781509062690
With the development and application of the multi-function radars (MFRs), it is imperative to analyse the behaviour for jamming decisions. Simulation software for MFR behaviour analysis is designed and developed for the purpose of recognizing the operating modes and predicting the future waveforms. The software is composed of three modules of training, recognition and prediction. The training module trains the radar model by training algorithm utilize the radar signal in the database, getting the prior probabilities and transition probabilities of multiple states;and the latter two modules recognize and predict the MFR behaviours by analysing the intercepted signals based on the pre-trained model. Simulations with a hypothetical MFR signal sequence in a typical scenario are presented, showing that the software is effective in extracting the characteristics and inferring the schedule schemes. The result is helpful in making intelligent jamming decisions, and supporting the adaptive radar countermeasures.
In this paper we present a resource conscious dynamic scheduling strategy for handling large volume computationally intensive loads in a Grid system involving multiple sources and sinks/processing nodes. We consider a...
详细信息
ISBN:
(纸本)0769522564
In this paper we present a resource conscious dynamic scheduling strategy for handling large volume computationally intensive loads in a Grid system involving multiple sources and sinks/processing nodes. We consider a "pull-based" strategy, wherein the processing nodes request load from the sources. We employ the Incremental Balancing Strategy (IBS) algorithm proposed in the literature and propose a buffer estimation strategy to derive optimal load distribution. Here, we consider non-time critical loads that arrive at arbitrary times with time varying buffer availability at sinks and utilize buffer reclamation techniques so as to schedule the loads. We demonstrate detailed workings of the proposed algorithm with illustrative examples using real-life parameters derived from STAR experiments in BNL for scheduling large volume loads.
暂无评论