In decentralized control it is known that the system can be stabilized only if the so-called fixed modes are all stable. If we have input constraints then (semi-)global stability requires all poles to be in the closed...
详细信息
In decentralized control it is known that the system can be stabilized only if the so-called fixed modes are all stable. If we have input constraints then (semi-)global stability requires all poles to be in the closed left half plane. This paper establishes that these two requirements are necessary and sufficient for stabilizability of a decentralized system with input saturation.
Recently, the automotive performance improvement is requested. The fuel cost of the automotive greatly depends on the weight of the car. We can improve the automotive performance by lightening and car. The body materi...
详细信息
Recently, the automotive performance improvement is requested. The fuel cost of the automotive greatly depends on the weight of the car. We can improve the automotive performance by lightening and car. The body material of the car is being replaced from iron with the aluminum base alloy. The fuel cost of the car made by all aluminum base alloy are said about 35.5 km/litter. However the forming of the aluminum base alloy is very difficult due to the limit of the forced restrictions. In this research, the explosive forming of the aluminum base alloy carried out to improve the deformability of them. A very high performance of the explosive forming of the aluminum base alloy is reported.
A new transform coder for arbitrarily shaped regions in ultrasonic data is proposed. In the encoder, a block-based DCT(Discrete Cosine Transform) is applied to the resulting image block after shifting pixels within th...
详细信息
A new transform coder for arbitrarily shaped regions in ultrasonic data is proposed. In the encoder, a block-based DCT(Discrete Cosine Transform) is applied to the resulting image block after shifting pixels within the image segment to block border and padding the mean value of the pixels to empty region. For reducing the transmission bit rate, the transform coefficients located in padded region are truncated and only the remaining transform coefficients are transmitted to the decoder. In the decoder, the transform coefficients truncated in the encoder are recovered using received transform coefficients and a block-based inverse DCT is performed.
A linear matrix inequality approach to compute ∞ guaranteed costs by means of parameter-dependent Lyapunov functions is presented in this paper. The uncertain linear time-invariant systems are supposed to belong to c...
详细信息
The design of a low loss quasi-optical beam splitter which is required to provide efficient diplexing of the bands 316.5-325.5 GHz and 349.5-358.5 GHz is presented. To minimise the filter insertion loss, the chosen ar...
详细信息
The design of a low loss quasi-optical beam splitter which is required to provide efficient diplexing of the bands 316.5-325.5 GHz and 349.5-358.5 GHz is presented. To minimise the filter insertion loss, the chosen architecture is a three-layer freestanding array of dipole slot elements. Floquet modal analysis and finite element method computer models are used to establish the geometry of the periodic structure and to predict its spectral response. Two different micromachining approaches have been employed to fabricate close packed arrays of 460 μm long elements in the screens that form the basic building block of the 30mm diameter multilayer frequency selec.ive surface. Comparisons between simulated and measured transmission coefficients for the individual dichroic surfaces are used to determine the accuracy of the computer models and to confirm the suitability of the fabrication methods.
In this letter, we propose a packet access control algorithm for non-real-time, interactive packet services via dedicated channels in the uplink of wideband code-division multiple-access (WCDMA) systems. We first deri...
详细信息
In this letter, we propose a packet access control algorithm for non-real-time, interactive packet services via dedicated channels in the uplink of wideband code-division multiple-access (WCDMA) systems. We first derive an analytical expression of packet throughput as a function of packet queuing delay and the required signal-to-interference-plus-noise-density ratio. Based on such a relationship, we then propose a packet access control algorithm that not only maximizes the packet throughput per cell, but also provides quality of service (QoS) assurance. Practical aspects of a CDMA system such as the effects of power control inaccuracy and other cell interference are considered in the analysis.
The main aim of this work is to make improvements to Mirine 2.2, a Korean grammar-checker that takes Korean language properties into account and to develop a system that satisfies user expectations. Particular attenti...
详细信息
The main aim of this work is to make improvements to Mirine 2.2, a Korean grammar-checker that takes Korean language properties into account and to develop a system that satisfies user expectations. Particular attention is given to processing Korean texts that may contain users' grammatical and practical errors. In order to treat these errors efficiently, the system includes methods based on asymmetric relations from which partial parsing and the potential governing relationship are derived, implying the starting point for checking, the direction for parsing, and the limits of the scope for parsing. To organize partial parsing efficiently, the system requires an appropriate knowledge base. As its essential prerequisites, this study (a) considers the factors from which the various error types encountered while parsing various Korean texts arise;(b) extracts general patterns from the linguistic or extra-linguistic factors obtained in this manner;and (c) demonstrates how the system, based on a linguistic analysis, procures an adequate knowledge base for partial parsing to satisfy end-users. Mirine 2.2 achieves an F-measure of about 0.80 in detecting unknown erroneous words;an F-measure of about 0.98 when not considering unknown words;and 98.94% precision in correcting erroneous words.
In this paper, we present universal Reed-Solomon (RS) decoder that can be adapted to any channel environment. We use hardware/software co-design method that can provide flexibility like software and performance like h...
详细信息
ISBN:
(纸本)1932415106
In this paper, we present universal Reed-Solomon (RS) decoder that can be adapted to any channel environment. We use hardware/software co-design method that can provide flexibility like software and performance like hardware to the proposed decoder. Only adjusting parameters on software, it can alter its code-block length and error correcting capability on-the-fly. Limitation of error correcting capability of the proposed decoder depends on hardware part. Since universal RS decoder is efficiently partitioned through measuring computation time and hardware size in function level, required hardware can be minimized for code variations. The proposed universal RS decoder uses Berlekamp algorithm for decoding and is implemented on AMBA-based SoC platform, which has on-chip ARM processor, on-chip memory and on-chip FPGA.
We present an analysis of cryptanalytic attacks on a new cryptosystem based on the finite-field wavelet. Encryption and decryption of this new cryptographic algorithm are performed by the synthesis and analysis banks ...
详细信息
ISBN:
(纸本)0889864020
We present an analysis of cryptanalytic attacks on a new cryptosystem based on the finite-field wavelet. Encryption and decryption of this new cryptographic algorithm are performed by the synthesis and analysis banks of a nonlinear finite-field wavelet transform whose filter coefficients are determined by the keys of the users. We study the security of the block-cipher wavelet cryptosystem in response to classical attacks and those specific to this algorithm, particularly those which use variations of the interpolation attack, and discrete Fourier transform techniques. This paper shows that the chosen ciphertext attack (CCA) of the wavelet encryption system reduces to the problem of solving systems of equations over finite fields. By considering existing classical and structure-specific attacks, we conclude that the lowest complexity of any of these attacks is not better than an exhaustive key search.
暂无评论