共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
3.
《Neural Networks, IEEE Transactions on》2008,19(8):1494-1495
4.
《Neural Networks, IEEE Transactions on》2009,20(8):1363-1367
5.
In the recent paper by Cetinkaya et al , admission control tests are derived by approximating the sum of two Gumbel distributed random variables by a Gumbel distributed random variable. In fact, the sum of two Gumbel distributed random variables does not follow a Gumbel distribution. Here, explicit expressions are derived for the probability density function (pdf) and the cumulative distribution function (cdf) of the exact distribution of the sum. The discrepancy between the exact and the approximate distributions is studied numerically. 相似文献
6.
In constructing an observer for a discrete-time nonlinear system, the system is commonly required to satisfy a certain kind of "uniform" observability condition, that is, the state should always be reconstructible from observation windows of a specific length, irrespective of the values of the state and inputs. In this technical note, it is proved that this "uniform" requirement is unnecessary in the sense that if the initial state and inputs are on a compact set, then the "uniform" observability is derived from its non-uniform counterpart. 相似文献
7.
《Neural Networks, IEEE Transactions on》2009,20(3):540-541
8.
Van-Nam Huynh Nakamori Y. 《IEEE transactions on systems, man, and cybernetics. Part A, Systems and humans : a publication of the IEEE Systems, Man, and Cybernetics Society》2010,40(1):205-209
In a recent paper, Liu have proposed the so-called F -algorithm which conditionally reduces the computational complexity of the Meyerowitz-Richman-Walker algorithm for the computation of the aggregate-uncertainty measure in the Dempster-Shafer theory of evidence, along with an illustration of its application in a practical scenario of target identification. In this correspondence, we will point out several technical mistakes, which some of them lead to some inexact or incomplete statements in the paper of Liu The corrections of these mistakes will be made, and some further improvement and results will be derived. 相似文献
9.
10.
This letter describes an attack on the recently proposed ldquowatermarking method based on significant difference of wavelet coefficient quantizationrdquo by Lin While the method is shown to be robust against many signal processing operations, security of the watermarking scheme under intentional attack exploiting knowledge of the implementation has been neglected. We demonstrate a straightforward attack which retains the fidelity of the image. The method is therefore not suitable for copyright protection applications. Further, we propose a countermeasure which mitigates the shortcoming. 相似文献
11.
Stability analysis and optimality are important in any systems. In the paper, "optimal fuzzy controller design: local concept approach," optimal fuzzy controller is design for Takagi-Sugeno fuzzy model. Unfortunately, it seems that some errors are happen and no simple correction can be done. In this paper, we show that some errors exit in the aforementioned paper with simple and clear examples. 相似文献
12.
Weisheng Chen 《Neural Networks, IEEE Transactions on》2009,20(5):897-898
The purpose of this comment is to point out some mistakes in the above paper. It is shown that the main results of the paper cannot stand in general. Also, it is pointed out that after some corrections, the proposed control algorithm is still applicable to a more simple system. For simplicity, all the symbols in this comment are the same as those in the above paper. 相似文献
13.
14.
Huixia Liu Keyi Xing Song Gao 《IEEE transactions on systems, man, and cybernetics. Part A, Systems and humans : a publication of the IEEE Systems, Man, and Cybernetics Society》2009,39(6):1348-1350
It was claimed recently in the paper by Li and Zhou that ldquoa polynomial time algorithm for finding the set of elementary siphons in S3PRs is proposed, which avoids complete siphon enumerationrdquo. However, this is incorrect because Proposition 1 and Corollary 6 of the aforementioned paper, which lead to the claim, are both incorrect. In this correspondence paper, Proposition 1 and Corollary 6 are disproved. As a consequence, some claims of the aforesaid paper are denied. Two examples are presented to disprove some claims of the previously mentioned paper. 相似文献
15.
《Automatic Control, IEEE Transactions on》2009,54(12):2920-2921
16.
17.
A “Globally” Convergent Controller for Multi-Machine Power Systems Using Structure-Preserving Models
Dib W. Ortega R. Barabanov A. Lamnabhi-Lagarrigue F. 《Automatic Control, IEEE Transactions on》2009,54(9):2179-2185
The design of excitation controllers to improve transient stabilization of power systems is a topic of renewed interest in the control community. Existence of a state-feedback stabilizing law for multi-machine aggregated reduced network models has recently been established. In this paper we extend this result in two directions: first, in contrast with aggregated models, we consider the more natural and widely popular structure-preserving models that preserve the identity of the network components (generators, loads and lines) and allow for a more realistic treatment of the loads. Second, we explicitly compute a control law that, under a detectability assumption, ensures that all trajectories converge to the desired equilibrium point, provided that they start and remain in the region where the model makes physical sense. 相似文献
18.
《Fuzzy Systems, IEEE Transactions on》2008,16(6):1664-1666
19.
This paper contains a security analysis of the construction of a public key steganographic system based on chaos theory and the Euler theorem (PKS-CE) as proposed by Lou and Sung in a previous issue of this transactions. Our analysis results in attack strategies on two different layers: first, we identify weaknesses of the embedding function, which allow a passive warden to tell steganographic images from clean carriers apart. Second, we show that the allegedly asymmetric trap-door function in fact can be efficiently inverted solely with the knowledge of its public parameters, thus revealing the secret message as plain text to a passive adversary. Experimental results from a re-implementation further indicate that the claimed robustness of the embedded message against transformations of the carrier medium was far too optimistic. Finally, we demonstrate that a secure alternative system can easily be constructed from standard primitives if the strong assumptions made in PKS-CE for the mutual key exchange can actually be fulfilled. 相似文献
20.
《Robotics, IEEE Transactions on》2009,25(2):475-475
In the above titled paper (ibid., vol. 24, no. 3, pp. 527-536, Jun 08), it is stated in Sec. IV-D3 that the characteristic number of the first variant of the "god object" method applied to texture synthesis is 1. This statement is not always true, and clarification of this issue is presented here. 相似文献