A subset of an Abelian group has unique differences if for all nonzeros. when viewed as additive noise, sets with unique differences amplify the output entropy as much as possible for a large class of input distributi...
详细信息
A subset of an Abelian group has unique differences if for all nonzeros. when viewed as additive noise, sets with unique differences amplify the output entropy as much as possible for a large class of input distributions, which is known as entropy amplification property. Aperiodic (noise) distributions arise as extreme cases in the investigation of the rate loss in side information problems such as channel coding with additive interference known at the encoder and lossy source coding with side information at the decoder. The decoder outputs a reconstruction, which is required to satisfy a distortion constraint. Reconstructing the clean source with some distortion is equivalent to reconstructing the encrypted source with the same distortion. Using the EAP, the rate loss can be arbitrarily large and arbitrarily close to 100%.
This paper considers observer design for a class of continuous-time descriptor systems with Lipschitz constraint. The constraint is a function of time, state and control input variables of the system. A new and simple...
详细信息
This paper considers observer design for a class of continuous-time descriptor systems with Lipschitz constraint. The constraint is a function of time, state and control input variables of the system. A new and simple approach is developed to design both full-order and reduced-order observers of the system. The sufficient condition is equivalent to the solvability of a linear matrix inequality. An illustrative example is presented to show the effectiveness of the proposed approach.
In this paper a synchronization controller for differential mobile robots is proposed. The synchronization goal is to control the angular position of each wheel to a desired trajectory and at the same time the differe...
详细信息
An adaptive joint power control/rate allocation policies which maximize system throughput for multiaccess and broadcast fading channels with random packet arrivals and queueing is established in this paper.
An adaptive joint power control/rate allocation policies which maximize system throughput for multiaccess and broadcast fading channels with random packet arrivals and queueing is established in this paper.
Δ-modulated Feedback control of a linear system introduces nonlinearity into the system through switchings between two input values. It has been found that Δ-modulation gives rise to periodic orbits. The existence o...
详细信息
A general technique for the generation of canonical channel models and demonstrate the application of the technique to time-frequency and time-scale integral kernel operators is developed. As an example, the derivatio...
详细信息
A general technique for the generation of canonical channel models and demonstrate the application of the technique to time-frequency and time-scale integral kernel operators is developed. As an example, the derivation of Sayeed/Aazhang's time-frequency canonical channel characterization that forms the basis for the time-frequency RAKE receiver is shown. Then, a canonical time-scale channel model for wideband communication is developed.
This paper considers globally asymptotic stabilization for a class of singular bilinear systems. By the system matrices a sufficient condition for the globally asymptotic stabilization is presented and under the condi...
详细信息
This paper considers globally asymptotic stabilization for a class of singular bilinear systems. By the system matrices a sufficient condition for the globally asymptotic stabilization is presented and under the condition continuous static state feedback and dynamic output feedback controllers are constructed, respectively. By means of LaSalle invariant principle and the separation principle for singular nonlinear systems the globally asymptotic stability of the closed loop systems is verified.
This paper designs space-time codes for standard PSK and QAM signal constellations that have flexible rate, diversity and require no constellation expansion. Central to this construction are binary partitions of the P...
详细信息
This paper designs space-time codes for standard PSK and QAM signal constellations that have flexible rate, diversity and require no constellation expansion. Central to this construction are binary partitions of the PSK and QAM constellations that appear in codes designed for the Gaussian channel. The space-time codes presented here are designed by separately specifying the different levels of the binary partition in the space-time array. The individual levels are addressed by either the binary symmetric matrices associated with codewords in a Kerdock code or other families of binary matrices. Binary properties of these sets are sufficient to verify the diversity property of the codewords in the complex domain. Larger sets of binary symmetric matrices (such as the set used in Delsarte-Goethals codes) are used to trade diversity protection for increased rate.
Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper The scheme attempts to achieve both effi...
详细信息
ISBN:
(纸本)0769522092
Considering the solution of dynamic access problems in a user hierarchy, a novel scheme based on one-way hash function is proposed to manage the cryptographic keys in the paper The scheme attempts to achieve both efficiency and non-iteration in deriving the successor secret key. Besides, the other issues in relation with dynamic access control problems, such as adding/deleting classes, adding/deleting relationships and changing secret keys, can be held good to the scheme. In view of security, a competent central authority must provide the user a convenient way to change his/her key at any time; therefore, the design toward the algorithm in the paper contains such a function. What weight to mention especially among these characteristics of the scheme is the simplification of procedure in changing the private key, and no other current keys need altering simultaneously.
A new algorithm for fixed-offset Ground Penetrating Radar imaging is derived. The forward model of this inversion scheme is based on the Born approximation and the dyadic Green function for a two-layer medium. The for...
详细信息
ISBN:
(纸本)9090179593
A new algorithm for fixed-offset Ground Penetrating Radar imaging is derived. The forward model of this inversion scheme is based on the Born approximation and the dyadic Green function for a two-layer medium. The forward model is inverted using the Wavelet Galerkin Algorithms for solving integral equations. We use the Laplacian operator to regularize the ill-posedness of the inverse problem. Numerical results are provided to illustrate performance of the inversion scheme.
暂无评论