虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

BI-linear

  • 通过提高保证成本的状态延迟控制和量子自适应控制的一台四轮直升机的控制策略

    Improved guaranteed cost control and quantum adaptive control are developed in this study for a quadrotor helicopter with state delay and actuator faults. Improved guaranteed cost control is designed to eliminate disturbance effects and guarantee the robust stability of a quadrotor helicopter with state delay. The inapplicability of guaranteed cost control to the quadrotor linear model is addressed by combining guaranteed cost control with a model reference linear quadratic regulator. In the event of actuator faults, quadrotor tracking performance is maintained through quantum adaptive control. Finally, the availability of the proposed scheme is verified through numerical simulation

    标签: Control Helicopter Guaranteed Quadrotor Adaptive Strategy Improved Quantum Delay State

    上传时间: 2017-07-15

    上传用户:bingzi_ml

  • 在人们的生产实践中

    在人们的生产实践中,经常会遇到如何利用现有资源来安排生产,以取得最大经济 效益的问题。此类问题构成了运筹学的一个重要分支—数学规划,而线性规划(Linear Programming 简记 LP)则是数学规划的一个重要分支。自从 1947 年 G. B. Dantzig 提出 求解线性规划的单纯形方法以来,线性规划在理论上趋向成熟,在实用中日益广泛与深 入。特别是在计算机能处理成千上万个约束条件和决策变量的线性规划问题之后,线性 规划的适用领域更为广泛了,已成为现代管理中经常采用的基本方法之一。 1.1 线性规划的实

    标签: 实践

    上传时间: 2018-09-17

    上传用户:中国宏军

  • 标日初级超详细笔记

    1.   日语假名及其发音一览     平  片  罗     平  片  罗     平  片  罗     平  片  罗     平  片  罗    假  假  马     假  假  马     假  假  马     假  假  马     假  假  马    音            音            音            音            音 ______________________________________________________________________________   あ  ア  a       い  イ  i       う  ウ  u       え  エ  e       お  オ  o      か  カ  ka      き  キ  ki      く  ク  ku      け  ケ  ke      こ  コ  ko     さ  サ  sa      し  シ  si/shi  す  ス  su      せ  セ  se      そ  ソ  so     た  タ  ta      ち  チ  chi     つ  ツ  tsu     て  テ  te      と  ト  to     な  ナ  na      に  ニ  ni      ぬ  ヌ  nu      ね  ネ  ne      の  ノ  no     は  ハ  ha      ひ  ヒ  hi      ふ  フ  fu      へ  ヘ  he      ほ  ホ  ho     ま  マ  ma      み  ミ  mi      む  ム  mu      め  メ  me      も  モ  mo     や  ヤ  ya                     ゆ  ユ  yu                     よ  ヨ  yo     ら  ラ  ra      り  リ  ri      る  ル  ru      れ  レ  re      ろ  ロ  ro     わ  ワ  wa                                                    を  ヲ    o/wo     ん  ン  n         が  ガ  ga      ぎ  ギ  gi      ぐ  グ  gu      げ  ゲ  ge      ご  ゴ  go     ざ  ザ  za      じ  ジ  zi/ji   ず  ズ  zu      ぜ  ゼ  ze      ぞ  ゾ  zo     だ  ダ  da      ぢ  ヂ  ji/di   づ  ヅ  zu/du   で  デ  de      ど  ド  do     ば  バ  ba      び  ビ  bi      ぶ  ブ  bu      べ  ベ  be      ぼ  ボ  bo     ぱ  パ  pa      ぴ  ピ  pi      ぷ  プ  pu      ぺ  ペ  pe      ぽ  ポ  po       きゃ キャ kya                  きゅ キュ kyu                  きょ キョ kyo     しゃ シャ sya                  しゅ シュ syu                  しょ ショ syo     ちゃ チャ cya                  ちゅ チュ cyu                  ちょ チョ cyo     にゃ ニャ nya                  にゅ ニュ nyu                  にょ ニョ nyo     ひゃ ヒャ hya                  ひゅ ヒュ hyu                  ひょ ヒョ hyo     みゃ ミャ mya                  みゅ ミュ myu                  みょ ミョ myo     りゃ リャ rya                  りゅ リュ ryu                  りょ リョ ryo     ぎゃ ギャ gya                  ぎゅ ギュ gyu                  ぎょ ギョ gyo じゃ ジャ zya/ja               じゅ ジュ yu/ju                じょ ジョzyo/jo     びゃ ビャ bya                  びゅ ビュ byu                  びょ ビョ byo     ぴゃ ピャ pya                  ぴゅ ピュ pyu                  ぴょ ピョ pyo

    标签: 日语

    上传时间: 2019-07-19

    上传用户:sxc1997

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Advances+in+Mobile+Radio+Access+Networks

    This book gives a comprehensive overview of the technologies for the advances of mobile radio access networks. The topics covered include linear transmitters, superconducting filters and cryogenic radio frequency (RF) front head, radio over fiber, software radio base stations, mobile terminal positioning, high speed downlink packet access (HSDPA), multiple antenna systems such as smart antennas and multiple input and multiple output (MIMO) systems, orthogonal frequency division multiplexing (OFDM) systems, IP-based radio access networks (RAN), autonomic networks, and ubiquitous networks. 

    标签: Advances Networks Access Mobile Radio in

    上传时间: 2020-05-26

    上传用户:shancjb

  • Full-Duplex+Small+Cells

    The recent developments in full duplex (FD) commu- nication promise doubling the capacity of cellular networks using self interference cancellation (SIC) techniques. FD small cells with device-to-device (D2D) communication links could achieve the expected capacity of the future cellular networks (5G). In this work, we consider joint scheduling and dynamic power algorithm (DPA) for a single cell FD small cell network with D2D links (D2DLs). We formulate the optimal user selection and power control as a non-linear programming (NLP) optimization problem to get the optimal user scheduling and transmission power in a given TTI. Our numerical results show that using DPA gives better overall throughput performance than full power transmission algorithm (FPA). Also, simultaneous transmissions (combination of uplink (UL), downlink (DL), and D2D occur 80% of the time thereby increasing the spectral efficiency and network capacity

    标签: Full-Duplex Cells Small

    上传时间: 2020-05-27

    上传用户:shancjb

  • Multi-Functional MIMO Systems

    The family of recent wireless standards included the optional employment of Multiple-Input Multiple-Output(MIMO)techniques.This was motivatedby the observationaccordingto the classic Shannon–Hartley law that the achievable channel capacity increases logarithmically with the transmit power. In contrast, the MIMO capacity increases linearly with the number of transmit antennas, provided that the number of receive antennas is equal to the number of transmit antennas. With the further proviso that the total transmit power is increased in proportion to the number of transmit antennas, a linear capacity increase is achieved upon increasing the transmit power, which justifies the spectacular success of MIMO systems.

    标签: Multi-Functional Systems MIMO

    上传时间: 2020-05-31

    上传用户:shancjb

  • Probability and Random Processes

    Many good textbooks exist on probability and random processes written at the under- graduate level to the research level. However, there is no one handy and ready book that explains most of the essential topics, such as random variables and most of their frequently used discrete and continuous probability distribution functions; moments, transformation, and convergences of random variables; characteristic and generating functions; estimation theory and the associated orthogonality principle; vector random variables; random processes and their autocovariance and cross-covariance functions; sta- tionarity concepts; and random processes through linear systems and the associated Wiener and Kalman filters. 

    标签: Probability Processes Random and

    上传时间: 2020-05-31

    上传用户:shancjb

  • Intelligent Networked Teleoperation Control

    This book describes a unifying framework to networked teleoperation systems cutting across multiple research fields including networked control system for linear and nonlinear forms, bilateral teleoperation, trilateral teleoperation, multilateral teleoperation, cooperative teleoperation, and some teleoperation application examples. Networked control has been deeply studied at the intersection of systems & control and robotics for a long time, and many scholarly books on the topic have been already published. Nevertheless, the approach remains active even in several new research fields, such as bilateral teleoperation, single master and multiple slaves, trilateral teleoperation, and multilateral teleoperation

    标签: Teleoperation Intelligent Networked Control

    上传时间: 2020-06-10

    上传用户:shancjb

  • Intelligent+Control+Systems+with+LabVIEW™

    Control systems are becoming more important every day. At the beginning, the in- dustry used sequential controls for solving a lot of industrial applications in control systems, and then the linear systems gave us a huge increase in applying automatic linear control on industrial application. One of the most recent methods for control- ling industrial applications is intelligent control, which is based on human behavior or concerning natural process.

    标签: Intelligent Control Systems LabVIEW with

    上传时间: 2020-06-10

    上传用户:shancjb