首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this paper, the $\mathcal{H}_{\infty}$ filtering problem for a class of short-time switched discrete-time linear systems is investigated. For such systems, switching always occurs in some short interval. Since the error state may attain large unacceptable values in short-time switching intervals, besides the asymptotic stability of error dynamics, the boundedness of error state is also significant for short-time switched systems. Thus the designed filter is composed of two parts: asymptotic filter, based upon the existing results, ensures the asymptotic stability of the system during normal, relatively long interval, and finite-time filter ensures system to be finite-time bounded during the short interval of switching, which is the main concern in this paper. By introducing the concept of finite-time boundedness, the proposed filter is formulated as a set of sub-filters ensuring the error dynamics $\mathcal{H}_{\infty}$ finite-time bounded in the short switching interval. Finally, a numerical example is provided to illustrate the effectiveness of this approach.  相似文献   

2.
The electronic structures of Co-based potential thermoelectric (TE) oxides, including $\hbox{Ca}_3\hbox{Co}_4\hbox{O}_9$ and $\hbox{Bi}_{2}\hbox{Sr}_{2}\hbox{Co}_2\hbox{O}_{y}$ (y = 8 + δ) single crystals and polycrystalline $\hbox{Ca}_3\hbox{Co}_2\hbox{O}_6$ , have been investigated by employing soft x-ray absorption spectroscopy (XAS) and photoemission spectroscopy (PES). Co 2p XAS measurements show that Co ions are nearly trivalent ( $\hbox{Co}^{3+}$ ) in all of these Co-based TE oxides with a small mixture of $\hbox{Co}^{4+}$ ions in $\hbox{Bi}_{2}\hbox{Sr}_{2}\hbox{Co}_2\hbox{O}_{y}$ . Valence-band PES and O 1s XAS measurements show that the occupied Co 3d states are located at the top of the valence bands and that the lowest unoccupied states have the primarily Co 3d character, respectively. These findings suggest the importance of the Co 3d electronic structures in determining TE properties of these Co-based oxides.  相似文献   

3.
Multiple input multiple output (MIMO) communication systems with orthogonal frequency division multiplexing (OFDM) has a great role to play for 4G broadband wireless communications. In this paper, a space time frequency (STF) code is presented with reduced decoder complexity and to achieve code rate $\text{ M }_\mathrm{T}$ with full diversity of $\text{ M }_{\mathrm{T}} \text{ M }_{\mathrm{R}} \text{ N }_{\mathrm{b}}$ L i.e., product of number of transmit antennas ( $\text{ M }_\mathrm{T}$ ), receive antennas $(\text{ M }_{\mathrm{R}})$ , fading blocks $(\text{ N }_{\mathrm{b}})$ and channel taps (L). The maximum achievable diversity with high rate of STF block coded MIMO-OFDM is analyzed and verified by simulation results. The decoder complexity is resolved by employing several approaches like maximum likelihood (ML), sphere decoder (SD) and array processing. The performance of STF code is compared with existing layered algebraic STF code in terms of decoder complexity and bit error rate (BER). Further, the closed form expressions for BER performance of STFBC MIMO-OFDM systems are derived and evaluated for frequency selective block fading channels with MPSK constellations.  相似文献   

4.
In many actual engineering applications, the Markovian jump among subsystems often occurs in some short finite-time intervals. For this class of Markovian jump systems, called short-time Markovian jump systems in this paper, the state boundedness during the short-time Markovian jump interval is of great interest. By introducing the concepts of finite-time stochastic stability and boundedness, sufficient conditions ensuring short-time Markovian jump system to be $\mathcal{H}_{\infty}$ finite-time stochastic bounded are derived. Then, the control synthesis problem is studied, where both asymptotic stability and finite-time stochastic boundedness are considered. Finally, an LMI-based design algorithm is proposed to solve the control synthesis problem. Several numerical examples are given to illustrate the results proposed in this paper.  相似文献   

5.
This paper deals with the problem of decentralized $\mathcal{L}_{2}$ $\mathcal{L}_{\infty}$ filtering for a class of interconnected (or large-scale) Markovian jump systems with constant time delays. The purpose is to present delay-dependent conditions for the existence of mode-dependent decentralized filters, which guarantees that the filtering error system is stochastically stable with a prescribed $\mathcal{L}_{2}$ $\mathcal{L}_{\infty}$ disturbance attenuation level. Such a purpose is achieved by using a mode-dependent centralized Lyapunov functional together with the so-called Jensen’s inequality. The obtained synthesis conditions are expressed in terms of linear matrix inequalities (LMIs), which leads to a convex design method for the concerned filters. An example including numerical and simulation results is provided finally to illustrate the effectiveness of the proposed design method.  相似文献   

6.
The intermetallic compound \(\hbox {CeRu}_4\hbox {Sn}_6\) has been tentatively classified as Kondo insulator. This class of material, especially non-cubic representatives, is not yet fully understood. Here we report thermopower measurements on single-crystalline \(\hbox {CeRu}_4\hbox {Sn}_6\) between 2 K and 650 K, along the main crystallographic directions. Large positive thermopower is observed in the directions along which the hybridization is strong and a Kondo insulating gap forms. A negative contribution to the thermopower dominates for the crystallographic \(c\) axis where hybridization is weak and metallicity prevails.  相似文献   

7.
This paper examines the problem of robust state feedback control of networked control systems with a simple congestion control scheme. This simple congestion control scheme is based on comparing current measurements with last transmitted measurements. If their difference is less than a prescribed percentage of the current measurements then no measurement is transmitted to the controller. The controller always uses the last transmitted measurements to control the system. With this simple congestion control scheme, a robust $\mathcal {H}_{\infty}$ state feedback controller design methodology is developed based on the Lyapunov–Krasovskii functional approach. Sufficient conditions for the existence of delay mode dependent controllers are given in terms of bilinear matrix inequalities (BMIs). These BMIs are converted into quasi-convex linear matrix inequalities (LMIs) and solved by using the cone complementarity linearization algorithm. The effectiveness of the simple congestion control in terms of reducing the network bandwidth is elaborated using simulation examples.  相似文献   

8.
In this paper, the multiclass downlink capacity and the interference statistics of the sectors of a cigar-shaped microcells using wideband code-division multiple-access with soft handover mode are analyzed. The two-slope propagation model with log-normal shadowing is used in the analysis where a model of 8 cigar-shaped microcells is utilized. The performance of the downlink is studied for different [sector range R, standard deviation of the shadowing ( $\sigma _{1}$ and $\sigma _{2})$ and propagation exponents ( $\text{ s}_{1}$ and $\text{ s}_{2})$ ]. It is found that increasing the sector range from 500 to 1,000 m will increase the sector downlink capacity. Also, it is found that increasing the value of the propagation parameters ( $\sigma _{1}$ and $\sigma _{2})$ will reduce the downlink sector capacity. It is noticed that, the effect of changing the propagation exponent $\text{ s}_{1}$ is null while increasing the propagation exponent $\text{ s}_{2}$ will increase the downlink capacity.  相似文献   

9.
A variational model for image segmentation consists of a data term and a regularization term. Usually, the data term is chosen as squared $\text{ L }_{2}$ norm, and the regularization term is determined by the prior assumption. In this paper, we present a novel model in the framework of MAP (maximum a posteriori). A new iteratively reweighted $\text{ L }_{2}$ norm is used in the data term, which shares the advantages of $\text{ L }_{2}$ and mixed $\text{ L }_{21}$ norm. An edge weighting function is addressed in the regularization term, which enforces the ability to reduce the outlier effects and preserve edges. An improved region-based graph cuts algorithm is proposed to solve this model efficiently. Numerical experiments show our method can get better segmentation results, especially in terms of removing outliers and preserving edges.  相似文献   

10.
A theoretical study is presented on complex pseudoternary Bi-doped \(\hbox{Mg}_{2}\hbox{Si}_{1-x-y}\hbox{Sn}_{x}\hbox{Ge}_{y}\) materials, which have recently been revealed to reach high thermoelectric figures of merit (ZT) of ~1.4. Morphological characterization by scanning electron microscopy and energy-dispersive x-ray spectroscopy indicated that the investigated samples were multiphase and that the alloy with nominal composition \(\hbox{Mg}_{2}\hbox{Si}_{0.55}\hbox{Sn}_{0.4}\hbox{Ge}_{0.05}\) contained three phases: \(\hbox{Mg}_{2}\hbox{Si}_{0.35}\hbox{Sn}_{0.6}\hbox{Ge}_{0.05}\) (Sn-rich phase), \(\hbox{Mg}_{2}\hbox{Si}_{0.65}\hbox{Sn}_{0.3}\hbox{Ge}_{0.05}\) (Si-rich phase), and \(\hbox{Mg}_{2}\hbox{Si}_{0.15}\hbox{Sn}_{0.5}\hbox{Ge}_{0.35}\) (Ge-rich phase). The electronic structure of all these phases was calculated in the framework of the fully charge self-consistent Korringa–Kohn–Rostoker method with the coherent potential approximation (KKR-CPA) to treat chemical disorder. Electron transport coefficients such as the electrical conductivity, thermopower, and the electronic part of the thermal conductivity were studied by combining the KKR-CPA technique with Boltzmann transport theory. The two-dimensional (2D) plots (as a function of electron carrier concentration and temperature), computed for the thermopower and power factor, well support the large thermoelectric efficiency detected experimentally. Finally, employing the experimental value of the lattice thermal conductivity as an adjustable parameter, it is shown that ZT ≈ 1.4 can be reached for an optimized Bi content near T ≈ 900 K in case of the nominal composition as well as the Sn-rich phase. The question of the effect of disorder on the convergence of the conduction bands and thus the electron transport properties is addressed through detailed examination of the Fermi surfaces.  相似文献   

11.
Graphene films prepared by heating the SiC $ (000\bar{1}) $ surface (the C-face of the {0001} surface) in a Si-rich environment have been studied using low-energy electron diffraction (LEED) and low-energy electron microscopy. Upon graphitization, an interface with $ \sqrt {43} \times \sqrt {43} - R \pm 7.6^\circ $ symmetry is observed by in situ LEED. After oxidation, the interface displays $ \sqrt 3 \times \sqrt 3 - R 30^\circ $ symmetry. Electron reflectivity measurements indicate that these interface structures arise from a graphene-like “buffer layer” that forms between the graphene and the SiC, similar to that observed on Si-face SiC. From a dynamical LEED structure calculation for the oxidized C-face surface, it is found to consist of a graphene layer sitting on top of a silicate (Si2O3) layer, with the silicate layer having the well-known structure as previously studied on bare SiC $ (000\bar{1}) $ surfaces. Based on this result, the structure of the interface prior to oxidation is discussed.  相似文献   

12.
Log-domain Delta-Sigma ( $\Delta \Sigma$ ) modulators are attractive for implementing analog-to-digital (A/D) converters (ADCs) targeting low-power low-voltage applications. Previously reported log-domain $\Delta \Sigma$ modulators were limited to 1-bit quantization and, hence, could not benefit from the advantages associated with multibit quantization (namely, reduced in-band quantization noise, and increased modulator stability). Unlike classical $\Delta \Sigma$ modulators, directly extending a log-domain $\Delta \Sigma$ modulator with a 1-bit quantizer to a log-domain $\Delta \Sigma$ modulator with a multibit quantizer is challenging, in terms of CMOS circuit implementation. Additionally, the realization of log-domain $\Delta \Sigma$ modulators targeting high-resolution applications necessitates minimization of distortion and noise in the log-domain loop-filter. This paper discusses the challenges of multibit quantization and digital-to-analog (D/A) conversion in the log-domain, and presents a novel multibit log-domain $\Delta \Sigma$ modulator, practical for CMOS implementation. SIMULINK models of log-domain $\Delta \Sigma$ modulator circuits are proposed, and the effects of various circuit non-idealities are investigated, including the effects of log-domain compression–expansion mismatch. Furthermore, this paper proposes novel low-distortion log-domain analog blocks suitable for high-resolution analog-to-digital (A/D) conversion applications. Circuit simulation results of a proposed third-order 3-bit class AB log-domain $\Delta \Sigma$ loop-filter demonstrate 10.4-bit signal-to-noise-and-distortion-ratio (SNDR) over a 10 kHz bandwidth with a $0.84\,V_{pp}$ differential signal input, while operating from a 0.8 V supply and consuming a total power of $35.5\,\upmu \hbox {W}.$   相似文献   

13.
This paper deals with the problem of delay-dependent robust $H_{\infty }$ H ∞ filtering for uncertain two-dimensional (2-D) continuous systems described by Roesser state space model with time-varying delays, with the uncertain parameters assumed to be of polytopic type. A sufficient condition for $H_{\infty }$ H ∞ noise attenuation is derived in terms of linear matrix inequalities, so a robust $H_{\infty }$ H ∞ filter can be obtained by solving a convex optimization problem. Finally, some examples are provided to illustrate the effectiveness of the proposed methodology.  相似文献   

14.
The conductivity of a silicon substrate with a Si(111) $\sqrt {21} $ × $\sqrt {21} $ -(Au, Ag) surface phase is studied. It is found that the surface conductivity of such a substrate varies depending on the ratio of the amounts of gold and silver in the given structure. An analysis of the behavior of the Si(111) $\sqrt {21} $ × $\sqrt {21} $ -(Au, Ag) surface conductivity during silver adsorption indicates the effect of a space-charge layer in the surface region of the substrate on the measurement results.  相似文献   

15.
Speed and complexity of a reverse converter are two important factors that affect the performance of a residue number system. In this paper, two efficient reverse converters are proposed for the 4-moduli sets {2 \(^{2n-1}-1\) , 2 \(^{n}\) , 2 \(^{n}+1\) , 2 \(^{n}-1\) } and {2 \(^{2n-1}\) , 2 \(^{2n-1}-1\) , 2 \(^{n}+1\) , 2 \(^{n}-1\) } with 5 \(n\) -bit and 6 \(n\) -bit dynamic range, respectively. The proposed reverse converter for moduli set {2 \(^{2n-1}-1\) , 2 \(^{n}\) , 2 \(^{n}+1\) , 2 \(^{n}-1\) } has been designed based on CRT and New CRT-I algorithms and in two-level structure. Also, an efficient reverse converter for moduli set {2 \(^{2n-1}\) , 2 \(^{2n-1}-1\) , 2 \(^{n}+1\) , 2 \(^{n}-1\) } has been designed by applying New CRT-I algorithm. The proposed reverse converters are based on adders and hence can be simply implemented by VLSI circuit technology. The proposed reverse converters offer less delay and hardware cost when compared with the recently introduced reverse converters for the moduli sets {2 \(^{n}+1\) , 2 \(^{n}-1\) ,2 \(^{n}\) , 2 \(^{2n+1}-1\) } and {2 \(^{n}+1\) , 2 \(^{n}-1\) , 2 \(^{2n}\) , 2 \(^{2n+1}-1\) }.  相似文献   

16.
The paper presents a new linearized, of high performance, fully differential transconductor, based on class AB second generation current conveyor (CCII) in CMOS technology. The proposed circuit is composed by two positive CCII cells connected in series and a common mode feedback loop. Unlike other CMOS circuits on the basis of CCII reported in the literature, the proposed transconductor cell allows to obtain a higher transconductance value, an improved linearity and operates at high frequency for a 3.3 V supply voltage. As an application, the new transconductor cell in CMOS technology is used for designing a 4th order differential $\hbox {G}_\mathrm{m}$ -C low-pass filters in different approximations (Butterworth and Chebyshev) operating up to 300 MHz cut-off frequency. The simulations performed in 130 nm CMOS process confirm the theoretical results.  相似文献   

17.
In this note, we show the existence of constant-round computational zero-knowledge proofs of knowledge for all $\mathcal {NP}$ . The existence of constant-round zero-knowledge proofs was proven by Goldreich and Kahan (Journal of Cryptology, 1996), and the existence of constant-round zero-knowledge arguments of knowledge was proven by Feige and Shamir (CRYPTO, 1989). However, the existence of constant-round zero-knowledge proofs of knowledge for all $\mathcal {NP}$ is folklore, to the best of our knowledge, since no proof of this fact has been published.  相似文献   

18.
Key-Dependent Message Security: Generic Amplification and Completeness   总被引:1,自引:0,他引:1  
Key-dependent message (KDM) secure encryption schemes provide secrecy even when the attacker sees encryptions of messages related to the secret-key sk. Namely, the scheme should remain secure even when messages of the form f(sk) are encrypted, where f is taken from some function class $\mathcal{F}$ . A KDM amplification procedure takes an encryption scheme which satisfies $\mathcal{F}$ -KDM security, and boosts it into a $\mathcal{G}$ -KDM secure scheme, where the function class $\mathcal{G}$ should be richer than $\mathcal{F}$ . It was recently shown by Brakerski et al. (TCC 2011) and Barak et al. (EUROCRYPT 2010) that a strong form of amplification is possible, provided that the underlying encryption scheme satisfies some special additional properties. In this work, we prove the first generic KDM amplification theorem which relies solely on the KDM security of the underlying scheme without making any other assumptions. Specifically, we show that an elementary form of KDM security against functions in which each output bit either copies or flips a single bit of the key (a.k.a. projections) can be amplified into KDM security with respect to any function family that can be computed in arbitrary fixed polynomial-time. Furthermore, our amplification theorem and its proof are insensitive to the exact setting of KDM security, and they hold in the presence of multiple-keys and in the symmetric-key/public-key and the CPA/CCA cases. As a result, we can amplify the security of most known KDM constructions, including ones that could not be amplified before. Finally, we study the minimal conditions under which full-KDM security (with respect to all functions) can be achieved. We show that under strong notion of KDM security, the existence of fully homomorphic encryption which allows to encrypt the secret-key (i.e., “cyclic-secure”) is not only sufficient for full-KDM security, as shown by Barak et al., but also necessary. On the other hand, we observe that for standard KDM security, this condition can be relaxed by adopting Gentry’s bootstrapping technique (STOC 2009) to the KDM setting.  相似文献   

19.
In 2008 and 2009, Gaudry and Diem proposed an index calculus method for the resolution of the discrete logarithm on the group of points of an elliptic curve defined over a small degree extension field $\mathbb{F}_{q^{n}}$ . In this paper, we study a variation of this index calculus method, improving the overall asymptotic complexity when $n = \varOmega(\sqrt [3]{\log_{2} q})$ . In particular, we are able to successfully obtain relations on $E(\mathbb{F}_{q^{5}})$ , whereas the more expensive computational complexity of Gaudry and Diem’s initial algorithm makes it impractical in this case. An important ingredient of this result is a variation of Faugère’s Gröbner basis algorithm F4, which significantly speeds up the relation computation. We show how this index calculus also applies to oracle-assisted resolutions of the static Diffie–Hellman problem on these elliptic curves.  相似文献   

20.
The GLV method of Gallant, Lambert, and Vanstone (CRYPTO 2001) computes any multiple kP of a point P of prime order n lying on an elliptic curve with a low-degree endomorphism Φ (called GLV curve) over $\mathbb{F}_{p}$ as $$kP = k_1P + k_2\varPhi(P) \quad\text{with } \max \bigl\{ |k_1|,|k_2| \bigr\} \leq C_1\sqrt{n} $$ for some explicit constant C 1>0. Recently, Galbraith, Lin, and Scott (EUROCRYPT 2009) extended this method to all curves over $\mathbb{F}_{p^{2}}$ which are twists of curves defined over $\mathbb{F}_{p}$ . We show in this work how to merge the two approaches in order to get, for twists of any GLV curve over $\mathbb{F}_{p^{2}}$ , a four-dimensional decomposition together with fast endomorphisms Φ,Ψ over $\mathbb{F}_{p^{2}}$ acting on the group generated by a point P of prime order n, resulting in a proven decomposition for any scalar k∈[1,n] given by $$kP=k_1P+ k_2\varPhi(P)+ k_3\varPsi(P) + k_4\varPsi\varPhi(P) \quad \text{with } \max_i \bigl(|k_i| \bigr)< C_2\, n^{1/4} $$ for some explicit C 2>0. Remarkably, taking the best C 1,C 2, we obtain C 2/C 1<412, independently of the curve, ensuring in theory an almost constant relative speedup. In practice, our experiments reveal that the use of the merged GLV–GLS approach supports a scalar multiplication that runs up to 1.5 times faster than the original GLV method. We then improve this performance even further by exploiting the Twisted Edwards model and show that curves originally slower may become extremely efficient on this model. In addition, we analyze the performance of the method on a multicore setting and describe how to efficiently protect GLV-based scalar multiplication against several side-channel attacks. Our implementations improve the state-of-the-art performance of scalar multiplication on elliptic curves over large prime characteristic fields for a variety of scenarios including side-channel protected and unprotected cases with sequential and multicore execution.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号