In this paper, we focus on the issue of adaptive H∞- control design for a class of linear parameter-varying (LPV) systems based on the Hamiltonian-Jacobi-Isaac (HJI) method. By combining the idea of polynomially para...
详细信息
The cellular neural network (CNN) is a powerful technique to mimic the local function of biological neural circuits for real-time image and video processing. Recently, it is widely accepted that using a set of CNNs in...
详细信息
Due to the increasing complexity of industrial production systems, there exists a need for the development of efficient formal approaches for their analysis and control. Various methods have been proposed and examined...
详细信息
Due to the increasing complexity of industrial production systems, there exists a need for the development of efficient formal approaches for their analysis and control. Various methods have been proposed and examined from researchers, without being widely adopted for direct industrial use. In general, an industrial production line can be modelled as a Discrete Event System, but a more accurate representation would result, if we considered it as a real-time system. This paper presents a new mathematical abstraction for modelling real-time systems. In comparison with the conventional methods, the proposed method introduces new formulation parameters and handles variables in a different manner. It gives the opportunity to handle both discrete and real valued variables as inputs, outputs or both. A formal definition of the method is given and some examples of computations or runs of two typical examples are also presented.
In this paper, we propose a diagnosis algorithm to detect faults of induction motor using the linear discriminant analysis. First, after reducing the input dimension of the current value vector measured at each period...
详细信息
In this presentation, we show some counter-examples to a naive belief that the security of QKD is based on no-cloning theorem. One example is shown by explicitly proving that one can indeed generate an unconditionally...
详细信息
ISBN:
(纸本)0780391519
In this presentation, we show some counter-examples to a naive belief that the security of QKD is based on no-cloning theorem. One example is shown by explicitly proving that one can indeed generate an unconditionally secure key from Alice's two-photon emission part in "SARG04 protocol" proposed by V. Scarani et al., in Phys. Rev. Lett. 92, 057901 (2004). This protocol differs from BB84 only in the classical communication. It is, thus, interesting to see how only the classical communication of QKD protocol might qualitatively change its security. We also show that one can generate an unconditionally secure key from the single to the four-photon part in a generalized SARG04 that uses six states. Finally, we also compare the bit error rate threshold of these protocols with the one in BB84 and the original six-state protocol assuming a depolarizing channel.
It is well known that the nonblocking supervisory control problem is NP-hard, subject in particular to combinatorial state explosion that is exponential in the number of system components. To manage this complexity we...
详细信息
In this paper, we deal with the issue of robust delay-independent asymptotic stability and robust disturbance attenuation problem for linear parameter-dependent systems. Using Hamiltonian-Jacoby-Isaac approach, a para...
详细信息
In this paper, using the fuzzy theory and gray theory, a concept of the degree of fuzzy infection and a new reliability analysis method based on the relation of fuzzy infection were proposed, and the mathematical mode...
详细信息
We consider a motion planning method based on cooperative biological swarming models with virtual attractive and repulsive potentials (VARP). We derive a map between the model and fan speeds for the Kelly, a second or...
详细信息
in avionics and automotive applications of computing, special care must be taken of issues related to safety. Assurance must be provided that computer hardware or software does not contribute to situations, which may ...
详细信息
暂无评论