首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 83 毫秒
1.
This paper addresses the problem of robust \(L_2{-}L_\infty \) control in delta domain for a class of Takagi–Sugeno (TS) fuzzy systems with interval time-varying delays and disturbance input. In particular, the system under study involves state time delay, uncertainties and fast sampling period \(\mathcal {T}\). The main aim of this work was to design a \(L_2{-}L_\infty \) controller such that the proposed TS fuzzy system is robustly asymptotically stable with a \(L_2{-}L_\infty \) prescribed performance level \(\gamma >0\). Based on the proper Lyapunov–Krasovskii functional (LKF) involving lower and upper bound of time delay and free-weighting technique, a new set of delay-dependent sufficient conditions in terms of linear matrix inequalities (LMIs) are established for obtaining the required result. The result reveals that the asymptotic stability is achieved quickly when the sampling frequency is high. Finally, a numerical example based on the truck–trailer model is given to demonstrate the effectiveness and potential of the proposed design technique.  相似文献   

2.
This paper investigates the problems of stability and \({L_\infty }\)-gain analysis for a class of positive switched systems with time-varying delay. Attention is focused on designing a state-dependent switching rule such that the system satisfies a prescribed \({L_\infty }\)-gain performance level, where the proposed scheme does not require the switching instants to be known in advance. By constructing an appropriate co-positive type Lyapunov–Krasovskii functional, sufficient conditions for exponential stability with \({L_\infty }\)-gain performance of the underlying systems are derived. Furthermore, the stability along the switching surface is analyzed. Finally, two examples are presented to demonstrate the effectiveness of the proposed method.  相似文献   

3.
The \(L_{1}\)-norm constrained normalized subband adaptive filter with variable norm-bound parameter \((L_{1}\hbox {NCNSAF-V})\) algorithm and its variable step size version VSS-\(L_{1}\)NCNSAF-V are proposed in this paper, which are more superior to some existing algorithms in the sparse system. The proposed \(L_{1}\)NCNSAF-V is derived by using the Lagrange multiplier method, and the VSS-\(L_{1}\)NCNSAF-V is obtained by minimizing the statistical square of the Euclidean norm of the noise-free subband a posterior error vector. The simulation results demonstrate that the proposed algorithms achieve good performance.  相似文献   

4.
Three fractional-order transfer functions are analyzed for differences in realizing (\(1+\alpha \)) order lowpass filters approximating a traditional Butterworth magnitude response. These transfer functions are realized by replacing traditional capacitors with fractional-order capacitors (\(Z=1/s^{\alpha }C\) where \(0\le \alpha \le 1\)) in biquadratic filter topologies. This analysis examines the differences in least squares error, stability, \(-\)3 dB frequency, higher-order implementations, and parameter sensitivity to determine the most suitable (\(1+\alpha \)) order transfer function for the approximated Butterworth magnitude responses. Each fractional-order transfer function for \((1+\alpha )=1.5\) is realized using a Tow–Thomas biquad a verified using SPICE simulations.  相似文献   

5.
This paper investigates the finite frequency (FF) \(H_\infty \) control problem of two-dimensional (2-D) continuous systems in Roesser Model. Our attention is focused on designing state feedback controllers guaranteeing the bounded-input-bounded-output stability and FF \(H_\infty \) performance of the corresponding closed-loop system. A generalized 2-D Kalman-Yakubovich-Popov (KYP) lemma is presented for 2-D continuous systems. By the generalized 2-D KYP lemma, the existence conditions of \(H_\infty \) controllers are obtained in terms of linear matrix inequalities. Two examples are given to validate the proposed methods.  相似文献   

6.
The performance of two-way relay (TWR)-assisted mixed radio-frequency/free-space optical (RF/FSO) system is evaluated in this letter. The proposed system employs decode-and-forward relaying phenomena where the relay is basically an interfacing node between two source nodes \(S_1\) and \(S_2\), where \(S_1\) supports RF signal, while \(S_2\) supports FSO signal. The TWR-assisted system helps in achieving spectral efficiency by managing bidirectional communication in three time slots, thus maximizing the achievable rate of the network. The RF link is subjected to generalized \(\eta -\mu \) distribution, and the optical channel is affected by path loss, pointing errors and gamma–gamma (gg) distributed atmospheric turbulence. The novel expressions for the probability density function and cumulative distribution function of the equivalent end-to-end signal-to-noise ratio (SNR) are derived. Capitalizing on these derived statistics of end-to-end SNR, the expressions of outage probability and the bit-error rate for different binary modulations and M-ary modulations are provided.  相似文献   

7.
This paper is concerned with the problem of robust state feedback \(H_\infty \) stabilization for a class of uncertain two-dimensional (2-D) continuous state delayed systems. The parameter uncertainties are assumed to be norm-bounded. Firstly, a new delay-dependent sufficient condition for the robust asymptotical stability of uncertain 2-D continuous systems with state delay is developed. Secondly, a sufficient condition for \(H_\infty \) disturbance attenuation performance of the given system is derived. Thirdly, a stabilizing state feedback controller is proposed such that the resulting closed-loop system is robustly asymptotically stable and achieves a prescribed \(H_\infty \) disturbance attenuation level. All results are developed in terms of linear matrix inequalities. Finally, two examples are provided to validate the effectiveness of the proposed method.  相似文献   

8.
A fractor is a simple fractional-order system. Its transfer function is \(1/Fs^{\alpha }\); the coefficient, F, is called the fractance, and \(\alpha \) is called the exponent of the fractor. This paper presents how a fractor can be realized, using RC ladder circuit, meeting the predefined specifications on both F and \(\alpha \). Besides, commonly reported fractors have \(\alpha \) between 0 and 1. So, their constant phase angles (CPA) are always restricted between \(0^{\circ }\) and \(-90^{\circ }\). This work has employed GIC topology to realize fractors from any of the four quadrants, which means fractors with \(\alpha \) between \(-\)2 and +2. Hence, one can achieve any desired CPA between \(+180^{\circ }\) and \(-180^{\circ }\). The paper also exhibits how these GIC parameters can be used to tune the fractance of emulated fractors in real time, thus realizing dynamic fractors. In this work, a number of fractors are developed as per proposed technique, their impedance characteristics are studied, and fractance values are tuned experimentally.  相似文献   

9.
The r-round (iterated) Even–Mansour cipher (also known as key-alternating cipher) defines a block cipher from r fixed public n-bit permutations \(P_1,\ldots ,P_r\) as follows: Given a sequence of n-bit round keys \(k_0,\ldots ,k_r\), an n-bit plaintext x is encrypted by xoring round key \(k_0\), applying permutation \(P_1\), xoring round key \(k_1\), etc. The (strong) pseudorandomness of this construction in the random permutation model (i.e., when the permutations \(P_1,\ldots ,P_r\) are public random permutation oracles that the adversary can query in a black-box way) was studied in a number of recent papers, culminating with the work of Chen and Steinberger (EUROCRYPT 2014), who proved that the r-round Even–Mansour cipher is indistinguishable from a truly random permutation up to \(\mathcal {O}(2^{\frac{rn}{r+1}})\) queries of any adaptive adversary (which is an optimal security bound since it matches a simple distinguishing attack). All results in this entire line of work share the common restriction that they only hold under the assumption that the round keys \(k_0,\ldots ,k_r\) and the permutations \(P_1,\ldots ,P_r\) are independent. In particular, for two rounds, the current state of knowledge is that the block cipher \(E(x)=k_2\oplus P_2(k_1\oplus P_1(k_0\oplus x))\) is provably secure up to \(\mathcal {O}(2^{2n/3})\) queries of the adversary, when \(k_0\), \(k_1\), and \(k_2\) are three independent n-bit keys, and \(P_1\) and \(P_2\) are two independent random n-bit permutations. In this paper, we ask whether one can obtain a similar bound for the two-round Even–Mansour cipher from just one n-bit key and one n-bit permutation. Our answer is positive: When the three n-bit round keys \(k_0\), \(k_1\), and \(k_2\) are adequately derived from an n-bit master key k, and the same permutation P is used in place of \(P_1\) and \(P_2\), we prove a qualitatively similar \(\widetilde{\mathcal {O}}(2^{2n/3})\) security bound (in the random permutation model). To the best of our knowledge, this is the first “beyond the birthday bound” security result for AES-like ciphers that does not assume independent round keys.  相似文献   

10.
In the paper, the problem of model reduction is considered for the distillation column linear system. For a given stable distillation column linear system, the objective is to find the construction of a reduced-order model, which approximates the original system well in the robust \(H_\infty \) performance. Some sufficient conditions to characterize the \(H_\infty \) norm bound error performance are proposed in terms of linear matrix inequalities (LMIs). Following the proposed projection approach, the \(H_\infty \) model reduction problem is solved, which casts the model reduction subject to LMIs constraints. Finally, a practical example of the distillation column linear system is provided to illustrate the effectiveness of the proposed method.  相似文献   

11.
In this work, two-channel perfect reconstruction quadrature mirror filter (QMF) bank has been proposed based on the prototype filter using windowing method. A novel window function based on logarithmic function along with the spline function is utilized for the design of prototype filter. The proposed window has a variable parameter ‘\(\alpha \)’, which varies the peak side lobe level and rate of fall-off side lobe level which in turn affects the peak reconstruction error (PRE) and amplitude distortion (\(e_{am}\)) of the QMF bank . The transition width of the prototype is controlled by the spline function using the parameter ‘\(\mu \)’. The perfect reconstruction condition is satisfied by setting the cutoff frequency (\(\omega _{c}\)) of the prototype low-pass filter at ‘\(\pi /2\)’. The performance of the proposed design method has been evaluated in terms of mean square error in the pass band, mean square error in the stop band, first side lobe attenuation (\(A_{1}\)), peak reconstruction error (PRE) and amplitude error (\(e_{am}\)) for different values of ‘\(\alpha \)’ and ‘\(\mu \)’. The results are provided and compared with the existing methods.  相似文献   

12.
In this paper, we propose an LC-VCO using automatic amplitude control and filtering technique to eliminate frequency noise around 2\(\omega _0\). The LC-VCO is designed with TSMC 130 nm CMOS RF technology, and biased in subthreshold regime in order to get more negative transconductance to overcome the losses in the LC-Tank and achieve less power consumption. The designed VCO operates at 5.17 GHz and can be tuned from 5.17 to 7.398 GHz, which is corresponding to 35.5% tuning range. The VCO consumes through it 495–440.5 \(\upmu\)W from 400 mV dc supply. This VCO achieves a phase noise of \(-\,122.3\) and \(-\,111.7\) dBc/Hz at 1 MHz offset from 5.17 and 7.39 GHz carrier, respectively. The calculated Figure-of-merits (FoM) at 1 MHz offset from 5.17 and 7.39 GHz is \(-\,199.7\) and \(-\,192.4\) dBc/Hz, respectively. And it is under \(-\,190.5\) dBc/Hz through all the tuning range. The FoM\(_T\) at 1 MHz offset from 5.17 GHz carrier is \(-\,210.6\) dBc/Hz. The proposed design was simulated for three different temperatures (\(-\,55\), 27, \(125\,^{\circ }\hbox {C}\)), and three supply voltages (0.45, 0.4, 0.35 V), it was concluded that the designed LC-VCO presents high immunity to PVT variations, and can be used for multi-standard wireless LAN communication protocols 802.11a/b/g.  相似文献   

13.
The equivalence of system is an important concept in multidimensional (\(n\)D) system, which is closely related to equivalence of multivariate polynomial matrices. This paper mainly investigates the equivalence of some \(n\)D polynomial matrices, several new results and conditions on the reduction by equivalence of a given \(n\)D polynomial matrix to its Smith form are obtained.  相似文献   

14.
The \(H_{\infty }\) control design problem is solved for the class of 2D discrete singular systems with delays. More precisely, the problem addressed is the design of state-feedback controllers such that the acceptability, internal stability and causality of the resulting closed-loop system are guaranteed, while a prescribed \(H_\infty \) performance level is simultaneously fulfilled. By establishing a novel version of the bounded real lemma, a linear matrix inequality condition is derived for the existence of these \(H_\infty \) controllers. They can then be designed by solving an iterative algorithm based on LMI optimizations. An illustrative example shows the applicability of the algorithm proposed.  相似文献   

15.
This paper considers the asymptotical synchronization and \(H_\infty \) synchronization for coupled neutral-type delay partial differential systems (NDPDSs). First, we construct a coupled synchronization error dynamic. Using the method of nonsingular matrix transformation, we decouple these coupled synchronization error dynamical systems. Then we study the asymptotical stability of the decoupled synchronization error dynamical systems through the Lyapunov–Krasovskii functional method, which implies the asymptotical synchronization of the coupled NDPDSs. Furthermore, when external disturbances enter the coupled NDPDSs, the \(H_\infty \) synchronization problem is also considered. The equivalence between the \(H_\infty \) stability of decoupled synchronization error dynamical systems and the \(H_\infty \) synchronization of coupled NDPDSs is proved by rigorous mathematical analysis. Then the criterion for the \(H_\infty \) stabilization is presented, which guarantees the \(H_\infty \) synchronization of the coupled NDPDSs. Moreover, as a remarkable difference between the ordinary differential systems and partial differential systems, the effect of the spatial domain on the synchronization is revealed through the obtained criteria. At last, numerical examples are given to illustrate the correctness of our results.  相似文献   

16.
In this paper, a reweighted \(l_1\) norm penalty algorithm for direction of arrival (DOA) estimation in monostatic multiple-input multiple-output radar is proposed. In the proposed method, exploiting the inherent multidimensional structure of received data after matched filtering, the singular value decomposition (SVD) technique of the data matrix is employed to reduce the dimension of the received signal. Then a novel weight matrix is designed for reweighting the \(l_1\) norm minimization by exploiting the coefficients of the reduced-dimensional Capon (RD-Capon) spatial spectrum. The proposed algorithm enhances the sparsity of the solution by the reweighted \(l_1\) norm constraint minimization, and the DOAs can be estimated by finding the non-zero rows of the recovered matrix. Owing to utilizing the SVD technique and the novel weight matrix, the proposed algorithm can provide better angle estimation performance than RD-Capon and \(l_1\)-SRACV algorithms. Furthermore, it is suitable for coherent sources and has a low sensitivity to the incorrect determination of the source numbers. The effectiveness and superior performance of the proposed algorithm are demonstrated by numerical simulations.  相似文献   

17.
This paper presents efficient protocols for securely computing the following two problems: (1) The fundamental problem of pattern matching. This problem is defined in the two-party setting, where party \(P_1\) holds a pattern and party \(P_2\) holds a text. The goal of \(P_1\) is to learn where the pattern appears in the text, without revealing it to \(P_2\) or learning anything else about \(P_2\)’s text. This problem has been widely studied for decades due to its broad applicability. We present several protocols for several notions of security. We further generalize one of our solutions to solve additional pattern matching-related problems of interest. (2) Our construction from above, in the malicious case, is based on a novel protocol for secure oblivious automata evaluation which is of independent interest. In this problem, party \(P_1\) holds an automaton and party \(P_2\) holds an input string, and they need to decide whether the automaton accepts the input, without learning anything else. Our protocol obtains full security in the face of malicious adversaries.  相似文献   

18.
In this paper, we investigate the impact of the transmitter finite extinction ratio and the receiver carrier recovery phase offset on the error performance of two optically preamplified hybrid M-ary pulse position modulation (PPM) systems with coherent detection. The first system, referred to as PB-mPPM, combines polarization division multiplexing (PDM) with binary phase-shift keying and M-ary PPM, and the other system, referred to as PQ-mPPM, combines PDM with quadrature phase-shift keying and M-ary PPM. We provide new expressions for the probability of bit error for PB-mPPM and PQ-mPPM under finite extinction ratios and phase offset. The extinction ratio study indicates that the coherent systems PB-mPPM and PQ-mPPM outperform the direct-detection ones. It also shows that at \(P_b=10^{-9}\) PB-mPPM has a slight advantage over PQ-mPPM. For example, for a symbol size \(M=16\) and extinction ratio \(r=30\) dB, PB-mPPM requires 0.6 dB less SNR per bit than PQ-mPPM to achieve \(P_b=10^{-9}\). This investigation demonstrates that PB-mPPM is less complex and less sensitive to the variations of the offset angle \(\theta \) than PQ-mPPM. For instance, for \(M=16\), \(r=30\) dB, and \(\theta =10^{\circ }\) PB-mPPM requires 1.6 dB less than PQ-mPPM to achieve \(P_b=10^{-9}\). However, PB-mPPM enhanced robustness to phase offset comes at the expense of a reduced bandwidth efficiency when compared to PQ-mPPM. For example, for \(M=2\) its bandwidth efficiency is 60 % that of PQ-mPPM and \(\approx 86\,\%\) for \(M=1024\). For these reasons, PB-mPPM can be considered a reasonable design trade-off for M-ary PPM systems.  相似文献   

19.
The paper deals with the problem of finite-time \(L_1\) control for positive Markovian jump systems with partly known transition rates. Firstly, by constructing a linear co-positive Lyapunov function, sufficient conditions for finite-time boundedness and \(L_1\) finite-time boundedness of the open-loop system are developed. Then, an effective method is proposed for the construction of the state feedback controller. These sufficient criteria are derived in the form of linear programming. A key point of this paper is to extend the special requirement of completely known transition rates to more general form that covers completely known and completely unknown transition rates as two special cases. Finally, two examples are given, which include a mathematical model of virus mutation treatment to illustrate the validity of the obtained results.  相似文献   

20.
Total variation (TV) denoising is a commonly used method for recovering 1-D signal or 2-D image from additive white Gaussian noise observation. In this paper, we define the Moreau enhanced function of \(L_1\) norm as \({\varPhi }_\alpha (x)\) and introduce the minmax-concave TV (MCTV) in the form of \({\varPhi }_\alpha (Dx)\), where D is the finite difference operator. We present that MCTV approaches \(\Vert Dx\Vert _0\) if the non-convexity parameter \(\alpha \) is chosen properly and apply it to denoising problem. MCTV can strongly induce the signal sparsity in gradient domain, and moreover, its form allows us to develop corresponding fast optimization algorithms. We also prove that although this regularization term is non-convex, the cost function can maintain convexity by specifying \(\alpha \) in a proper range. Experimental results demonstrate the effectiveness of MCTV for both 1-D signal and 2-D image denoising.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号