虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

bi-linear

  • Coding the Matrix

    Coding the Matrix _ Linear Algebra through Computer Science Applications 著名线性代数和矩阵课程的课本,亚马逊销量第一

    标签: Coding Matrix the

    上传时间: 2016-11-14

    上传用户:kitool

  • 无刷直流电动机Matlab仿真建模及模型中S函数的编写

    选择文件 X 无刷直流电动机Matlab仿真建模及模型中S函数

    标签: Matlab 无刷直流电动机 仿真建模 S函数 模型 编写

    上传时间: 2017-03-13

    上传用户:Lincy

  • 通过提高保证成本的状态延迟控制和量子自适应控制的一台四轮直升机的控制策略

    Improved guaranteed cost control and quantum adaptive control are developed in this study for a quadrotor helicopter with state delay and actuator faults. Improved guaranteed cost control is designed to eliminate disturbance effects and guarantee the robust stability of a quadrotor helicopter with state delay. The inapplicability of guaranteed cost control to the quadrotor linear model is addressed by combining guaranteed cost control with a model reference linear quadratic regulator. In the event of actuator faults, quadrotor tracking performance is maintained through quantum adaptive control. Finally, the availability of the proposed scheme is verified through numerical simulation

    标签: Control Helicopter Guaranteed Quadrotor Adaptive Strategy Improved Quantum Delay State

    上传时间: 2017-07-15

    上传用户:bingzi_ml

  • 在人们的生产实践中

    在人们的生产实践中,经常会遇到如何利用现有资源来安排生产,以取得最大经济 效益的问题。此类问题构成了运筹学的一个重要分支—数学规划,而线性规划(Linear Programming 简记 LP)则是数学规划的一个重要分支。自从 1947 年 G. B. Dantzig 提出 求解线性规划的单纯形方法以来,线性规划在理论上趋向成熟,在实用中日益广泛与深 入。特别是在计算机能处理成千上万个约束条件和决策变量的线性规划问题之后,线性 规划的适用领域更为广泛了,已成为现代管理中经常采用的基本方法之一。 1.1 线性规划的实

    标签: 实践

    上传时间: 2018-09-17

    上传用户:中国宏军

  • 标日初级超详细笔记

    1.   日语假名及其发音一览     平  片  罗     平  片  罗     平  片  罗     平  片  罗     平  片  罗    假  假  马     假  假  马     假  假  马     假  假  马     假  假  马    音            音            音            音            音 ______________________________________________________________________________   あ  ア  a       い  イ  i       う  ウ  u       え  エ  e       お  オ  o      か  カ  ka      き  キ  ki      く  ク  ku      け  ケ  ke      こ  コ  ko     さ  サ  sa      し  シ  si/shi  す  ス  su      せ  セ  se      そ  ソ  so     た  タ  ta      ち  チ  chi     つ  ツ  tsu     て  テ  te      と  ト  to     な  ナ  na      に  ニ  ni      ぬ  ヌ  nu      ね  ネ  ne      の  ノ  no     は  ハ  ha      ひ  ヒ  hi      ふ  フ  fu      へ  ヘ  he      ほ  ホ  ho     ま  マ  ma      み  ミ  mi      む  ム  mu      め  メ  me      も  モ  mo     や  ヤ  ya                     ゆ  ユ  yu                     よ  ヨ  yo     ら  ラ  ra      り  リ  ri      る  ル  ru      れ  レ  re      ろ  ロ  ro     わ  ワ  wa                                                    を  ヲ    o/wo     ん  ン  n         が  ガ  ga      ぎ  ギ  gi      ぐ  グ  gu      げ  ゲ  ge      ご  ゴ  go     ざ  ザ  za      じ  ジ  zi/ji   ず  ズ  zu      ぜ  ゼ  ze      ぞ  ゾ  zo     だ  ダ  da      ぢ  ヂ  ji/di   づ  ヅ  zu/du   で  デ  de      ど  ド  do     ば  バ  ba      び  ビ  bi      ぶ  ブ  bu      べ  ベ  be      ぼ  ボ  bo     ぱ  パ  pa      ぴ  ピ  pi      ぷ  プ  pu      ぺ  ペ  pe      ぽ  ポ  po       きゃ キャ kya                  きゅ キュ kyu                  きょ キョ kyo     しゃ シャ sya                  しゅ シュ syu                  しょ ショ syo     ちゃ チャ cya                  ちゅ チュ cyu                  ちょ チョ cyo     にゃ ニャ nya                  にゅ ニュ nyu                  にょ ニョ nyo     ひゃ ヒャ hya                  ひゅ ヒュ hyu                  ひょ ヒョ hyo     みゃ ミャ mya                  みゅ ミュ myu                  みょ ミョ myo     りゃ リャ rya                  りゅ リュ ryu                  りょ リョ ryo     ぎゃ ギャ gya                  ぎゅ ギュ gyu                  ぎょ ギョ gyo じゃ ジャ zya/ja               じゅ ジュ yu/ju                じょ ジョzyo/jo     びゃ ビャ bya                  びゅ ビュ byu                  びょ ビョ byo     ぴゃ ピャ pya                  ぴゅ ピュ pyu                  ぴょ ピョ pyo

    标签: 日语

    上传时间: 2019-07-19

    上传用户:sxc1997

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • 飞行器半实物仿真

    fds 选择文件 X 飞行器半实物仿真初案_

    标签: 飞行器 半实物仿真

    上传时间: 2020-03-06

    上传用户:stormfree

  • Advances+in+Mobile+Radio+Access+Networks

    This book gives a comprehensive overview of the technologies for the advances of mobile radio access networks. The topics covered include linear transmitters, superconducting filters and cryogenic radio frequency (RF) front head, radio over fiber, software radio base stations, mobile terminal positioning, high speed downlink packet access (HSDPA), multiple antenna systems such as smart antennas and multiple input and multiple output (MIMO) systems, orthogonal frequency division multiplexing (OFDM) systems, IP-based radio access networks (RAN), autonomic networks, and ubiquitous networks. 

    标签: Advances Networks Access Mobile Radio in

    上传时间: 2020-05-26

    上传用户:shancjb

  • Full-Duplex+Small+Cells

    The recent developments in full duplex (FD) commu- nication promise doubling the capacity of cellular networks using self interference cancellation (SIC) techniques. FD small cells with device-to-device (D2D) communication links could achieve the expected capacity of the future cellular networks (5G). In this work, we consider joint scheduling and dynamic power algorithm (DPA) for a single cell FD small cell network with D2D links (D2DLs). We formulate the optimal user selection and power control as a non-linear programming (NLP) optimization problem to get the optimal user scheduling and transmission power in a given TTI. Our numerical results show that using DPA gives better overall throughput performance than full power transmission algorithm (FPA). Also, simultaneous transmissions (combination of uplink (UL), downlink (DL), and D2D occur 80% of the time thereby increasing the spectral efficiency and network capacity

    标签: Full-Duplex Cells Small

    上传时间: 2020-05-27

    上传用户:shancjb

  • Multi-Functional MIMO Systems

    The family of recent wireless standards included the optional employment of Multiple-Input Multiple-Output(MIMO)techniques.This was motivatedby the observationaccordingto the classic Shannon–Hartley law that the achievable channel capacity increases logarithmically with the transmit power. In contrast, the MIMO capacity increases linearly with the number of transmit antennas, provided that the number of receive antennas is equal to the number of transmit antennas. With the further proviso that the total transmit power is increased in proportion to the number of transmit antennas, a linear capacity increase is achieved upon increasing the transmit power, which justifies the spectacular success of MIMO systems.

    标签: Multi-Functional Systems MIMO

    上传时间: 2020-05-31

    上传用户:shancjb