To solve the security of data transmission in network, a secure communication method based on time-delayed hyperchaotic synchronization is presented. By selecting the typical hyperchaotic system, the communication sys...
To solve the security of data transmission in network, a secure communication method based on time-delayed hyperchaotic synchronization is presented. By selecting the typical hyperchaotic system, the communication system synchronization scheme is designed to realize the recovery of the encrypted signal, and the security performance of the method is analyzed by simulation. The simulation results show that the synchronization method has the characteristics of high security and is easy to implement.
Multiple model adaptive control (MMAC) with second-level adaptation is a recently proposed methodology for dealing with systems where the parametric uncertainty is large. Compared with the multiple model switching sch...
详细信息
Multiple model adaptive control (MMAC) with second-level adaptation is a recently proposed methodology for dealing with systems where the parametric uncertainty is large. Compared with the multiple model switching scheme, the new scheme can lead to significant improvements in performance. Some research has been conducted using the new scheme, but all of the results concern linear systems with an adaptive identification model set. In this study, MMAC with second-level adaptation scheme is extended to non-linear systems in strict feedback form, and the fixed identification model set is under consideration. This is motivated by the fact that a smooth controller can lead to smooth performance and the fixed identification model set gains potential advantages over the adaptive identification model set, especially for the case that the parameters of the system change over the time. Design details are presented and the stability of MMAC with second-level adaptation using a fixed identification model set for non-linear systems is given, which has not been discussed before. Finally, two simulations are performed to show that this scheme performs much better than conventional schemes, including adaptive control and multiple-model switching schemes, in terms of convergence speed and transient performance.
A great amount of existing knowledge is required during the development of aero-craft system. At present, the existing knowledge organization model construct different knowledge model for different stages is difficult...
详细信息
Seabed geoacoustic parameters and associated uncertainties are important for sonar performance prediction and related applications, and the feasibility of jointly using pressure and vector fields to increase geoacoust...
详细信息
Based on three-channel SAR-GMTI system, the velocity and location of the deceptive moving target generated by single jammer are studied. Study result shows that both the deceptive stationary target and moving target c...
详细信息
ISBN:
(纸本)9781509043118
Based on three-channel SAR-GMTI system, the velocity and location of the deceptive moving target generated by single jammer are studied. Study result shows that both the deceptive stationary target and moving target can be considered as moving target, and the estimated azimuth location which has nothing to do with the setting value is the same as jammer.
Parallel coordinates can visualize multidimensional data efficiently,during to its shortage in displaying time-varying data,we present a new method to add time dimension,which can extend parallel coordinates into 3D s...
详细信息
Parallel coordinates can visualize multidimensional data efficiently,during to its shortage in displaying time-varying data,we present a new method to add time dimension,which can extend parallel coordinates into 3D space(3D-Parallel Coordinates)consisted of attribute,range and time *** that timevarying multidimensional data can be displayed as polygonal line cluster for recording and analyzing.A technique called clipping shade is taken to highlight datasets around the current time,and results reveal that 3D-Parallel Coordinates can effectively analyze attribute's time-varying character.
Analized the task and general form of the software management;pionted out the shortages of the software repository on *** introduced the Role-Based Access Control model(RBAC model) which was introduced into the constr...
详细信息
Analized the task and general form of the software management;pionted out the shortages of the software repository on *** introduced the Role-Based Access Control model(RBAC model) which was introduced into the construction of software repository service by combining with the requirement of security management about software repository.A hierarchical access control model based on RBAC was proposed,and it database of the software repository based on RBAC was *** effective application of this model in the process of software management can ensure the convenience of software distribution;and meanwhile it can effectively improve the security of the software packages.
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty-network boundary partition and protection. These two problems are discussed in this paper. A method of multidim...
详细信息
ISBN:
(纸本)9781509051557
The exposure of PRISM reminds us of network sovereignty. There are two problems about network sovereignty-network boundary partition and protection. These two problems are discussed in this paper. A method of multidimensional network boundary partition is proposed based on comprehensive analysis of existing schemes. And network boundary protection is studied based on standard rules of cyber warfare. Characteristic of network boundary protection technique is analyzed and methods are proposed about how to construct network boundary protection.
Heterogeneous multi-core platforms, e.g., ARM's ***, are a promising trend to improve the performance and energy efficiency of future mobile systems. However, the immediate benefits and the challenges to take adva...
详细信息
Downward-looking MIMO array 3-D synthetic aperture radar is a hot research recently, it overcomes the layover and can acquire more information with the affordable antenna elements. The multiple transmitters and receiv...
详细信息
暂无评论