This Letter investigates synchronization of two nonidentical Lur'e systems with time-varying delay and parameter mismatches via impulsive control. Based on the theory of impulsive functional differential equations...
详细信息
This Letter investigates synchronization of two nonidentical Lur'e systems with time-varying delay and parameter mismatches via impulsive control. Based on the theory of impulsive functional differential equations, sufficient conditions for impulsive synchronization with a bound on the synchronization error are derived. An illustrative example is provided to validate the proposed method.
The constant modulus algorithm (CMA) has been widely used in the blind equalization of quadrature amplitude modulation (QAM) signals, but it has slow convergence rate and large steady state mean square error and the p...
详细信息
The constant modulus algorithm (CMA) is one widely used algorithm for blind equalization of quadrature amplitude modulation (QAM) signals. The algorithm exhibits slow convergence rate and large steady state mean squar...
详细信息
The carrier recovery is one key technique in the demodulation of high order quadrature amplitude modulation (QAM) signals. A carrier recovery algorithm which switches between multi-threshold polarity decision mode and...
详细信息
There many researches about modulation mode classification of the MPSK signals, but these studies pay few attentions to some especial MPSK signals such as OQPSK or pi/4QPSK. However, the signals are very important in ...
详细信息
ISBN:
(纸本)9781424437092
There many researches about modulation mode classification of the MPSK signals, but these studies pay few attentions to some especial MPSK signals such as OQPSK or pi/4QPSK. However, the signals are very important in the digital communications. The method of classification of the QPSK, OQPSK, pi/4QPSK and 8PSK has discussed in this paper, because these MPSK signals have similar constellations or spectrum. The method of the classification and parameter estimation based on the statistical and spectral characters of the instantaneous phase difference (IPD) is proposed. The simulation results of the digital signals indicate that this method is availability when the SNR is higher than 5dB.
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis...
详细信息
The constant modulus algorithm (CMA) is one widely used algorithm for blind equalization of QAM signals. The algorithm exhibits slow convergence rate and large steady state mean square error and the phase-blind nature...
详细信息
ISBN:
(纸本)9781934142141
The constant modulus algorithm (CMA) is one widely used algorithm for blind equalization of QAM signals. The algorithm exhibits slow convergence rate and large steady state mean square error and the phase-blind nature in comparison with the algorithms used in conventional data-aided equalization schemes. In this paper, a variable step size modified constant modulus algorithm is proposed. The proposed algorithm can speed up convergence rate and decrease steady state mean square error and correct phase error and frequency offset at the same time. The simulation results demonstrate the effectiveness of the proposed algorithm in improving convergence rate and reducing steady state mean square error.
A modeling and verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML (Unified Modeling Language) to model the function requir...
详细信息
ISBN:
(纸本)9781424472369
A modeling and verification methodology is presented for railway interlocking system which is regarded as a safety-critical system. The methodology utilizes UML (Unified Modeling Language) to model the function requirement and FSM (Finite State Machine) to verity the safety requirements of the specification. The device specifications of railway interlocking system are modeled with UML, and dynamic behaviors of the device and whole system are modeled with FSM, the safety specification is translated LTL (Linear Temporal Logic) and analyzed with NuSMV. We try to show the feasibility of improving the reliability and reducing revalidation efforts when designing and developing a decentralized railway signaling system.
Evolutionary games are widely studied in the fields of biology, sociology, economics and informatics. People's interests focus on how cooperation emerged in a system that individuals are selfish. We studied the it...
详细信息
ISBN:
(纸本)9787894631046
Evolutionary games are widely studied in the fields of biology, sociology, economics and informatics. People's interests focus on how cooperation emerged in a system that individuals are selfish. We studied the iterated Prisoner's Dilemma Game evolved on BA network with genetic algorithm. Nodes in network could remember the game historical strategies and coded into gene. We show that memory length has gentle effect on cooperation level, and that some characteristic genes and frequentlyused genes emerge after some generations. We also find that cooperate strategy distributed on different degree-nodes equably. These findings give new perspectives to the illustration of cooperation behavior in biological group and society.
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the exis...
详细信息
It is unfeasible to analyze the security events by the manual way for the security manager, because the number of the events is huge and the information contained in the events is meaningless. After analyzing the existing algorithms of security events correlation, we propose an attack scenario reconstruction technology based on state machine. The processes of attackers intruding into the cyberspace can be restored and the more comprehensive attack scenario description information will be generated using this technology. This working lets the security manager more comfy. The state machine based attack scenario reconstruction technology processes security events using clustering analysis and causal analysis concurrently, it builds a correlation state machine in memory for every attack scenario tree which is predefined by the security manager, when security events are coming, the certain state machines will process them, if the condition is satisfied, an attack scenario description information will be generated and then sent to the security manager. The correlating technology based on state machine is more timely and accurately, and at last, we use the DARPA2000 Intrusion Scenario Specific Data Sets to validate the technology, the experiment results show that it is feasible to analyze security events using the technology we proposed.
暂无评论