Robust stability of linear systems in presence of bounded uncertain time-varying time delays is studied. The time delay robustness problem is treated in the Integral Quadratic Constraint (IQC) framework. The stability...
详细信息
Robust stability of linear systems in presence of bounded uncertain time-varying time delays is studied. The time delay robustness problem is treated in the Integral Quadratic Constraint (IQC) framework. The stability criterion is formulated as frequency dependent linear matrix inequalities. The criterion can be equivalently formulated as a Semi-Definite Program (SDP) by applying Kalman-Yakubovich-Popov (KYP) lemma. Therefore, checking the criterion can be done efficiently by using various SDP solvers.
As one of the most important characteristics of structural steels, toughness is assessed by the Charpy V-notch impact test. The absorbed impact energy and the transition temperature defined at a given Charpy energy le...
详细信息
As one of the most important characteristics of structural steels, toughness is assessed by the Charpy V-notch impact test. The absorbed impact energy and the transition temperature defined at a given Charpy energy level are regarded as the common criteria for toughness assessment. This paper aims at establishing generic toughness prediction models which link materials compositions and processing conditions with Charpy impact properties. Hybrid knowledge-based neural-fuzzy modeling techniques which incorporate linguistic knowledge into data-driven neural-fuzzy models have been used to develop the Charpy properties prediction models for thermomechanically controlled rolled (TMCR) steels. Two basic ways of knowledge incorporation are introduced to improve the performance of the obtained fuzzy models. Simulation experiments show that both numeric data and linguistic information can be combined in a unified framework and that both Charpy impact energy and the impact transition temperature (ITT) can be predicted by the same model
In this presentation, we show some counter-examples to a naive belief that the security of QKD is based on no-cloning theorem. One example is shown by explicitly proving that one can indeed generate an unconditionally...
详细信息
ISBN:
(纸本)0780391519
In this presentation, we show some counter-examples to a naive belief that the security of QKD is based on no-cloning theorem. One example is shown by explicitly proving that one can indeed generate an unconditionally secure key from Alice's two-photon emission part in "SARG04 protocol" proposed by V. Scarani et al., in Phys. Rev. Lett. 92, 057901 (2004). This protocol differs from BB84 only in the classical communication. It is, thus, interesting to see how only the classical communication of QKD protocol might qualitatively change its security. We also show that one can generate an unconditionally secure key from the single to the four-photon part in a generalized SARG04 that uses six states. Finally, we also compare the bit error rate threshold of these protocols with the one in BB84 and the original six-state protocol assuming a depolarizing channel.
It is well known that the nonblocking supervisory control problem is NP-hard, subject in particular to combinatorial state explosion that is exponential in the number of system components. To manage this complexity we...
详细信息
This paper discusses low level control of the humanoid UT-Theta which has been been developed at the University of Tokyo. This innovative humanoid walking robot is equipped with knee joint switchable between active an...
详细信息
In this paper, we aim at developing a System-on-Chip, SoC, which can capture image as well as produce vehicle lane map at the same time. We adopt Peak-Finding based lane detection algorithm that can achieve high recog...
详细信息
Considered both the situation with unknown control function matrices and the situation with linear unmodeled input dynamics, adaptive neural robust controller was designed by using adaptive backstepping method for a c...
详细信息
This paper deals with the data-driven design of observer based FDI systems. The basic idea is to identify parity space and the related matrices, instead of a state space model of the process under consideration, direc...
详细信息
We consider a motion planning method based on cooperative biological swarming models with virtual attractive and repulsive potentials (VARP). We derive a map between the model and fan speeds for the Kelly, a second or...
详细信息
This paper studies the open problem of reduced- and fixed-order H ∞ synthesis. Often, this non-convex constraint is tackled with iterative convex optimisation procedure over LMI constraints. In this paper, an evoluti...
详细信息
This paper studies the open problem of reduced- and fixed-order H ∞ synthesis. Often, this non-convex constraint is tackled with iterative convex optimisation procedure over LMI constraints. In this paper, an evolutionary approach is proposed such that the trial and error approach involved in LMI techniques might be overcome. The order of the controller is optimised as a multiobjective problem over a set of controller structures, H ∞ , and time-domain specifications. Numerical results are presented with its counterpart the LMI procedure design, that show the advantage of investigating the Pareto optimal set resulting from the design procedure proposed.
暂无评论