共查询到20条相似文献,搜索用时 406 毫秒
1.
In this paper, the concept of globally exponentially attractive set is proposed and used to consider the ultimate bounds of the family of Lorenz systems with varying parameters. Explicit estimations of the ultimate bounds are derived. The results presented in this paper contain all the existing results as special cases. In particular, the critical cases, b→ 1^+ and a→0^+, for which the previous methods failed, have been solved using a unified formula. 相似文献
2.
3.
A min-max model predictive control strategy is proposed for a class of constrained nonlinear system whose trajectories can
be embedded within those of a bank of linear parameter varying (LPV) models. The embedding LPV models can yield much better
approximation of the nonlinear system dynamics than a single LTV model. For each LPV model, a parameter-dependent Lyapunov
function is introduced to obtain poly-quadratically stable control law and to guarantee the feasibility and stability of the
original nonlinear system. This approach can greatly reduce computational burden in traditional nonlinear predictive control
strategy. Finally a simulation example illustrating the strategy is presented.
Supported by the National Natural Science Foundation of China (Grant Nos. 60774015, 60825302, 60674018), the National High-Tech
Research & Development Program of China (Grant No. 2007AA041403), the Specialized Research Fund for the Doctoral Program of
Higher Education of China (Grant No. 20060248001), and partly by Shanghai Natural Science Foundation (Grant No. 07JC14016) 相似文献
4.
New delay-dependent criterion for the stability of recurrent neural networks with time-varying delay
This paper is concerned with the global asymptotic stability of a class of recurrent neural networks with interval time-varying
delay. By constructing a suitable Lyapunov functional, a new criterion is established to ensure the global asymptotic stability
of the concerned neural networks, which can be expressed in the form of linear matrix inequality and independent of the size
of derivative of time varying delay. Two numerical examples show the effectiveness of the obtained results.
Supported by the National Natural Science Foundation of China (Grant Nos. 60534010, 60728307, 60774048, 60774093), the Program
for Cheung Kong Scholars and Innovative Research Groups of China (Grant No. 60521003) and the National High-Tech Research
& Development Program of China (Grant No. 2006AA04Z183), China Postdoctoral Sciencer Foundation (Grant No. 20080431150), and
the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 200801451096) 相似文献
5.
Moving object segmentation is one of the most challenging issues in computer vision. In this paper, we propose a new algorithm
for static camera foreground segmentation. It combines Gaussian mixture model (GMM) and active contours method, and produces
much better results than conventional background subtraction methods. It formulates foreground segmentation as an energy minimization
problem and minimizes the energy function using curve evolution method. Our algorithm integrates the GMM background model,
shadow elimination term and curve evolution edge stopping term into energy function. It achieves more accurate segmentation
than existing methods of the same type. Promising results on real images demonstrate the potential of the presented method.
Supported by National Basic Research Program of China (Grant No. 2006CB303105), the Chinese Ministry of Education Innovation
Team Fund Project (Grant No. IRT0707), the National Natural Science Foundation of China (Grant Nos. 60673109 and 60801053),
Beijing Excellent Doctoral Thesis Program (Grant No. YB20081000401), Beijing Municipal Natural Science Foundation (Grant No.
4082025), and Doctoral Foundation of China (Grant No. 20070004037) 相似文献
6.
We address the problem of 3D human pose estimation in a single real scene image. Normally, 3D pose estimation from real image
needs background subtraction to extract the appropriate features. We do not make such assumption. In this paper, a two-step
approach is proposed, first, instead of applying background subtraction to get the segmentation of human, we combine the segmentation
with human detection using an ISM-based detector. Then, silhouette feature can be extracted and 3D pose estimation is solved
as a regression problem. RVMs and ridge regression method are applied to solve this problem. The results show the robustness
and accuracy of our method.
Supported by the National Basic Research Program of China (Grant No. 2006CB303103), and Key Program of the National Natural
Science Foundation of China (Grant No. 60833009) 相似文献
7.
FAN JianCun YIN QinYe & WANG WenJie School of Electronic Information Engineering Xi’an Jiaotong University Xi’an China 《中国科学F辑(英文版)》2009,52(6):1067-1074
Focusing on space-time block code (STBC) systems with unknown co-channel interference, an oblique projection-based robust
linear receiver is proposed in this paper. Based on the oblique projection, the desired signal subspace and interference-plus-noise
subspace are first identified from the received signal. Then the matched filter receiver is used to decode the STBC encoded
signals in the desired signal subspace. Simulation results show that the proposed linear receiver obtains significant performance
improvement over conventional Capon-type receivers under finite sample-size situations and in the presence of channel estimation
errors.
Supported partially by the National Natural Science Foundation of China (Grant Nos. 60572046, 60502022, 60772095), and the
National High-Tech Research & Development Program of China (Grant No. 2006AA01Z220) 相似文献
8.
Ji Wang Senior Member CCF Xiao-Dong Ma Wei Dong Hou-Feng Xu and Wan-Wei Liu Member CCF 《计算机科学技术学报》2009,24(2):347-356
We present a demand-driven approach to memory leak detection algorithm based on flow- and context-sensitive pointer analysis.
The detection algorithm firstly assumes the presence of a memory leak at some program point and then runs a backward analysis
to see if this assumption can be disproved. Our algorithm computes the memory abstraction of programs based on points-to graph
resulting from flow- and context-sensitive pointer analysis. We have implemented the algorithm in the SUIF2 compiler infrastructure
and used the implementation to analyze a set of C benchmark programs. The experimental results show that the approach has
better precision with satisfied scalability as expected.
This work is supported by the National Natural Science Foundation of China under Grant Nos. 60725206, 60673118, and 90612009,
the National High-Tech Research and Development 863 Program of China under Grant No. 2006AA01Z429, the National Basic Research
973 Program of China under Grant No. 2005CB321802, the Program for New Century Excellent Talents in University under Grant
No. NCET-04-0996, and the Hunan Natural Science Foundation under Grant No. 07JJ1011. 相似文献
9.
A Trust-Based Approach to Estimating the Confidence of the Software System in Open Environments 总被引:1,自引:0,他引:1 下载免费PDF全文
Emerging with open environments, the software paradigms, such as open resource coalition and Internetware, present several novel characteristics including user-centric, non-central control, and continual evolution. The goal of obtaining high confidence on such systems is more di?cult to achieve. The general developer-oriented metrics and testing-based methods which are adopted in the traditional measurement for high confidence software seem to be infeasible in the new situation. Firstly, the software develo... 相似文献
10.
This paper presents the definition of multi-dimensional scalability of the Internet architecture, and puts forward a mathematical method to evaluate Internet scalability based on a variety of constraints. Then, the method is employed to study the Internet scalability problem in performance, scale and service scalability. Based on the examples, theoretical analysis and experimental simulation are conducted to address the scalability issue. The results show that the proposed definition and evaluation method of multi-dimensional Internet scalability can effectively evaluate the scalability of the Internet in every aspect, thus providing rational suggestions and methods for evaluation of the next generation Internet architecture. 相似文献
11.
We investigate the multiple access channels (MAC) where sources can cooperate via half-duplex relaying and refer to it as
cooperative MAC channels (CMAC). Assuming perfect channel state information (CSI) at the transmitters and the receivers, we
determine the bounds on the achievable rate region of a Gaussian CMAC channel and an inner bound on the outage capacity region
of a fading CMAC channel. Based on superposition modulation, a half-duplex cooperative relay scheme with optimal resource
allocation is proposed to achieve the bounds of capacity region. Analytical results and simulation results show that the achievable
rate region of a Gaussian CMAC channel is larger than that of a Gaussian MAC channel with direct transmission (DT) schemes.
But they have the same achievable sum rate. Moreover, the proposed scheme can provide higher outage capacity region than DT
schemes in a fading MAC channel due to the fact that sources can share the resources with each other to reduce outages.
Supported partially by the National Natural Science Foundation of China (Grant No. 60672079), the Natural Science Foundation
of Jiangsu Province (Grant No. BK2006701), and the Natinoal High-Tech Research & Development Program of China (Grant No. 2007AA01Z267) 相似文献
12.
Estimation of differential geometric properties on a discrete surface is a fundamental work in computer graphics and computer
vision. In this paper, we present an accurate and robust method for estimating differential quantities from unorganized point
cloud. The principal curvatures and principal directions at each point are computed with the help of partial derivatives of
the unit normal vector at that point, where the normal derivatives are estimated by fitting a linear function to each component
of the normal vectors in a neighborhood. This method takes into account the normal information of all neighboring points and
computes curvatures directly from the variation of unit normal vectors, which improves the accuracy and robustness of curvature
estimation on irregular sampled noisy data. The main advantage of our approach is that the estimation of curvatures at a point
does not rely on the accuracy of the normal vector at that point, and the normal vectors can be refined in the process of
curvature estimation. Compared with the state of the art methods for estimating curvatures and Darboux frames on both synthetic
and real point clouds, the approach is shown to be more accurate and robust for noisy and unorganized point cloud data.
Supported in part by the National Natural Science Foundation of China (Grant Nos. 60672148, 60872120), the National High-Tech
Research & Development Program of China (Grant Nos. 2006AA01Z301, 2008AA01Z301), and Beijing Municipal Natural Science Foundation
(Grant No. 4062033) 相似文献
13.
The investigation of the multimode beamforming network (BFN) has been developed from its scattering matrix (S-matrix) analysis.
A substrate integrated waveguide (SIW) BFN is designed and fabricated on a single Rogers 5880 substrate. This device is not
only marked by features of conventional BFN, such as Butler matrix, but also has additional benefits, e.g. more compact configuration
and higher radiation efficiency. Measured and simulated results based on the proposed structure are in a good agreement, which
indicates that this novel type of BFN has good characteristics and presents an excellent candidate in the development of intelligent
microwave and millimeter-wave multibeam antenna systems.
Supported by the National Natural Science Foundation of China (Grant No. 60621002), the National High-Tech Research & Development
Program of China (Grant No. 2007AA01Z2B4), and the Scientific Research Foundation of Graduate School of Southeast University 相似文献
14.
This paper studies the power allocation problem for the non-orthogonal decode-and-forward (NDF) cooperation protocol with
selection relaying. With the availability of the magnitudes of all channel gains at the source, the power allocation is explored
that maximizes the mutual information between the source and destination subject to a total power constraint. The minimum
power that avoids the outage of the relay is set as a condition, under which the power allocation problem becomes one of selecting
the optimal one from several allocation factor triplets. It is shown that the power allocation scheme can provide considerable
performance gain, and the non-orthogonal cooperation protocol is superior to the orthogonal protocol and direct transmission.
Supported by the Project of Natural Science Foundation of Jiangsu Province (Grant No. BK2006701), the National Natural Science
Foundation of China (Grant No. 60672079), and the National High-Tech Research & Development Program of China (Grant No. 2007AA01Z267) 相似文献
15.
A new modeling approach for nonlinear systems with rate-dependent hysteresis is proposed. The approach is used for the modeling
of the giant magnetostrictive actuator, which has the rate-dependent nonlinear property. The models built are simpler than
the existed approaches. Compared with the experiment result, the model built can well describe the hysteresis nonlinear of
the actuator for input signals with complex frequency. An adaptive direct inverse control approach is proposed based on the
fuzzy tree model and inverse learning and special learning that are used in neural network broadly. In this approach, the
inverse model of the plant is identified to be the initial controller firstly. Then, the inverse model is connected with the
plant in series and the linear parameters of the controller are adjusted using the least mean square algorithm by on-line
manner. The direct inverse control approach based on the fuzzy tree model is applied on the tracing control of the actuator
by simulation. The simulation results show the correctness of the approach.
Supported by the National Natural Science Foundation of China (Grant No. 60534020), the National Basic Research Program of
China (Grant No. G2002cb312205-04), the Research Fund for the Doctoral Program of Higher Education (Grant No. 20070006060),
and the Key Subject Foundation of Beijing (Grant Nos. XK100060526, XK100060422) 相似文献
16.
Oversampling is widely used in practical applications of digital signal processing. As the fractional Fourier transform has
been developed and applied in signal processing fields, it is necessary to consider the oversampling theorem in the fractional
Fourier domain. In this paper, the oversampling theorem in the fractional Fourier domain is analyzed. The fractional Fourier
spectral relation between the original oversampled sequence and its subsequences is derived first, and then the expression
for exact reconstruction of the missing samples in terms of the subsequences is obtained. Moreover, by taking a chirp signal
as an example, it is shown that, reconstruction of the missing samples in the oversampled signal is suitable in the fractional
Fourier domain for the signal whose time-frequency distribution has the minimum support in the fractional Fourier domain.
Supported partially by the National Natural Science Foundation of China for Distinguished Young Scholars (Grant No. 60625104),
the National Natural Science Foundation of China (Grant Nos. 60890072, 60572094), and the National Basic Research Program
of China (Grant No. 2009CB724003) 相似文献
17.
Yu-YueDu Chang-JunJiang 《计算机科学技术学报》2004,19(2):0-0
Temporal colored Petri nets, an extension of temporal Petri nets, are introduced in this paper. It can distinguish the personality of individuals (tokens), describe clearly the causal and temporal relationships betwee nevents in concurrent systems, and represent elegantly certain fundamental properties of concurrent systems, such as eventuality and fairness. The use of this method is illustrated with an example of modeling and formal verification of an online stock trading system. The functional correctness of the modeled system is formally verified based on the temporal colored Petri net model and temporal assertions. Also, some main properties of the system are analyzed. It has been demonstrated sufficiently that temporal colored Petri nets can verify efficiently some time-related properties of concurrent systems, and provide both the power of dynamic representation graphically and the function of logical inference formally. Finally. future work is described. 相似文献
18.
The highlight line model is a powerful tool in assessing the quality of a surface. It increases the flexibility of an interactive
design environment. In this paper, a method to generate a highlight line model on an arbitrary triangular mesh is presented.
Based on the highlight line model, a technique to remove local shape irregularities of a triangular mesh is then presented.
The shape modification is done by solving a minimization problem and performing an iterative procedure. The new technique
improves not only the shape quality of the mesh surface, but also the shape of the highlight line model. It provides an intuitive
and yet suitable method for locally optimizing the shape of a triangular mesh.
Supported by National Science Foundation of China (Grant Nos. 60533070, 60625202), National Basic Research Program of China
(Grant No. 2004CB719400), National High-Tech Research & Development Program of China (Grant No. 2007AA040401), Fok Ying Tung
Education Foundation (Grant No. 111070), National Science Foundation of USA (Grant Nos. DMI-0422126, DMS-0310645), and Kentucky
Science & Technology Corporation (Grant No. COMM-Fund-712) 相似文献
19.
Neural Network Algorithm for Designing FIR Filters Utilizing Frequency-Response Masking Technique 下载免费PDF全文
Xiao-Hua Wang 《计算机科学技术学报》2009,24(3):463-471
This paper presents a new joint optimization method for the design of sharp linear-phase finite-impulse response (FIR) digital filters which are synthesized by using basic and multistage frequency-response-masking(FRM) techniques.The method is based on a batch back-propagation neural network algorithm with a variable learning rate mode.We propose the following two-step optimization technique in order to reduce the complexity.At the first step,an initial FRM filter is designed by alternately optimizing th... 相似文献
20.
IPv6 protocol plays an important role in the next generation of Internet (NGI). It is expected that the elegant coexistence of IPv4 and IPv6 is the key point of IPv6 transition. To solve the transition problem, we propose a mesh unicast framework and a multicast framework in this paper. We describe two reference models for the mesh unicast framework, and put forward two potential solutions for the multicast framework. A Linux-based prototype is implemented for IPv4 over IPv6 scenario and a test bed is deployed with 8 nodes on CERNET2. The deployment demon- strates the advantages of the framework. 相似文献