This paper considers the design of linear time-varying networks and of nonlinear time-invariant networks, the latter being operated in the small-signal mode. In the first part, the design example considered is a netwo...
详细信息
This paper considers the design of linear time-varying networks and of nonlinear time-invariant networks, the latter being operated in the small-signal mode. In the first part, the design example considered is a network whose time delay is a prescribed function of time. A quadratic performance criterion 'is formulated and the design is obtained iteratively by steepest descent. The second part of the paper considers the design of a nonlinear timeinvariant network with variable bias sources whose small-signal equivalent network is identical with a given linear time-varying network. Explicit conditions are given under which this can be done.
The two-volume set LNCS 7565 and 7566 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2012), Distributed Objects and Applications - Secure ...
详细信息
ISBN:
(数字)9783642336065
ISBN:
(纸本)9783642336058
The two-volume set LNCS 7565 and 7566 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2012), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2012), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2012) held as part of OTM 2012 in September 2012 in Rome, Italy. The 53 revised full papers presented were carefully reviewed and selected from a total of 169 submissions. The 22 full papers included in the first volume constitute the proceedings of CoopIS 2012 and are organized in topical sections on business process design; process verification and analysis; service-oriented architectures and cloud; security, risk, and prediction; discovery and detection; collaboration; and 5 short papers.
The area of adaptive systems, which encompasses recursive identification, adaptive control, filtering, and signal processing, has been one of the most active areas of the past decade. Since adaptive controllers are fu...
详细信息
ISBN:
(数字)9781441985682
ISBN:
(纸本)9780387979885;9781461264392
The area of adaptive systems, which encompasses recursive identification, adaptive control, filtering, and signal processing, has been one of the most active areas of the past decade. Since adaptive controllers are fundamentally nonlinear controllers which are applied to nominally linear, possibly stochastic and time-varying systems, their theoretical analysis is usually very difficult. Nevertheless, over the past decade much fundamental progress has been made on some key questions concerning their stability, convergence, performance, and robustness. Moreover, adaptive controllers have been successfully employed in numerous practical applications, and have even entered the marketplace.
The two-volume set LNCS 7565 and 7566 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2012), Distributed Objects and Applications - Secure ...
详细信息
ISBN:
(数字)9783642336157
ISBN:
(纸本)9783642336140
The two-volume set LNCS 7565 and 7566 constitutes the refereed proceedings of three confederated international conferences: Cooperative Information Systems (CoopIS 2012), Distributed Objects and Applications - Secure Virtual Infrastructures (DOA-SVI 2012), and Ontologies, DataBases and Applications of SEmantics (ODBASE 2012) held as part of OTM 2012 in September 2012 in Rome, Italy. The 53 revised full papers presented were carefully reviewed and selected from a total of 169 submissions. The 31 full papers included in the second volume constitute the proceedings of DOA-SVI 2012 with 10 full papers organized in topical sections on privacy in the cloud; resource management and assurance; context, compliance and attack; and ODBASE 2012 with 21 full papers organized in topical sections on using ontologies and semantics; applying probalistic techniques to semantic information; exploiting and querying semantic information; and managing and storing semantic information.
暂无评论