首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
It is necessary to welcome the publication of the paper by Park and Bongiorno Jr (Park, K. and Bongiorno Jr, J.J. (2009 Park, K and Bongiorno Jr, JJ. 2009. Persistent Inputs and the Standard H2-multivariable Control Problem. International Journal of Control, 82: 20022012. [Taylor &; Francis Online], [Web of Science ®] [Google Scholar]), ‘Persistent Inputs and the Standard H2-multivariable Control Problem’, International Journal of Control, 82, 2002–2012) in which the special cases in H2-optimisation problems are considered. However, for correct orientation of readers we would like to note some publications which, in our opinion, are connected to a problem given by Park and Bongiorno Jr (2009 Park, K and Bongiorno Jr, JJ. 2009. Persistent Inputs and the Standard H2-multivariable Control Problem. International Journal of Control, 82: 20022012. [Taylor &; Francis Online], [Web of Science ®] [Google Scholar]), but are absent there.  相似文献   

2.
A general flatness-based framework for non-linear continuous-time predictive control is presented. It extends the results of Fliess and Marquez (2000 Fliess, M and Marquez, R. 2000. Continuous-time Linear Predictive Control and Flatness: A Module-theoretic Setting with Examples. International Journal of Control, 73: 606623. [Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) to the non-linear case. The mathematical setting, which is valid for multivariable systems, is provided by the theory of flatness-based exact feedforward linearisation introduced by the authors (Hagenmeyer and Delaleau 2003b Hagenmeyer, V and Delaleau, E. 2003b. Exact Feedforward Linearization Based on Differential Flatness. International Journal of Control, 76: 537556. [Taylor &; Francis Online], [Web of Science ®] [Google Scholar]). Thereby differential flatness does not only yield an easy calculation of the predicted trajectories considering the respective system constraints, but allows to use simple linear feedback parts in a two-degree-of-freedom control structure. Moreover, this formalism permits one to handle non-minimum phase systems, and furthermore to deal with parameter uncertainties and exogenous perturbations. Respective robustness analysis tools are available. Finally, an induction drive example is discussed in detail and experimental results for this fast electro-mechanical system are presented.  相似文献   

3.
In this article, we complement the shortcoming of the inventory economic production quantity (EPQ) model developed by Huang and Huang (2008 Huang, YF and Huang, HF. 2008. Optimal Inventory Replenishment Policy for the EPQ Model Under Trade Credit Derived Without Derivatives. International Journal of Systems Science, 39: 539546. [Taylor &; Francis Online], [Web of Science ®] [Google Scholar]), ‘Optimal Inventory Replenishment Policy for the EPQ Model Under Trade Credit Derived Without Derivatives’, International Journal of Systems Science, 39, 539–546), and propose an arithmetic–geometric inequality method to obtain the global optimal solution without taking complex differential calculus or using tedious algebraic manipulations. Finally, we provide an economical interpretation of the theoretical result so that the reader can understand the insight of the result.  相似文献   

4.
ABSTRACT

Image hiding methods embed a secret image into a host image. The resultant stego-image does not attract the interceptors that would not detect the differences between the host image and the stego-image. To exploit the great developments in the area of image compression and to improve the quality of stego-image, this paper proposes a new method to embed the secret image into the host image. Basically, the secret image is compressed and then embedded into host image. The embedding method is based on the Optimal Pixel Adjustment Process (OPAP) and genetic algorithm. In the paper we addressed the important issues to build such systems. The experimental results showed that the proposed method can improve the quality from 60% to 80% when compared with the simple Least Significant Bit (LSB) replacement methods. Adding to that, the mean square error of the stego-image is much lower compared with other methods (Chan & Cheng, 2004 Chan, C.K. and Cheng, L.M. 2004. Hiding data in images by simple LSB substitution. Pattern Recognition, 37(3): 469474. [Crossref], [Web of Science ®] [Google Scholar]; Chang, Hsiao, & Chan, 2003 Chang, C.C., Hsiao, J.Y. and Chan, C.S. 2003. Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy. Pattern Recognition, 36(7): 15831595. [Crossref], [Web of Science ®] [Google Scholar]; Thien & Lin, 2003 Thien, C.C. and Lin, J.C. 2003. A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recognition, 36(12): 28752881. [Crossref], [Web of Science ®] [Google Scholar]; Tseng, Chan, Ho, & Chu, 208; Wang, Lin, & Lin, 2001 Wang, R.Z., Lin, C.F. and Lin, J.C. 2001. Image hiding by optimal LSB substitution and genetic algorithm. Pattern Recognition, 34(3): 671683. [Crossref], [Web of Science ®] [Google Scholar]). Also, the proposed technique improves capacity. In other words, we can embed a secret image with size 450?×?450 inside a hosting image with size 512?×?512.  相似文献   

5.
Leap et al. (2016 Leap, T., T. McDevitt, K. Novak, and N. Siermine. 2016. Further improvements to the Bauer-Millward attack on the Hill cipher. Cryptologia 40:116.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) reduced the time complexity of the Bauer-Millward (2007 Bauer, C., and K. Millward. 2007. Cracking matrix encryption row by row. Cryptologia 31(1):7683.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) ciphertext-only attack on the Hill cipher from 𝒪(Ln) to 𝒪(Ln?1), where L is the length of the alphabet, and n is the block size. This article presents an attack that reduces the complexity to 𝒪(Ln?1?s), 0?≤?s?≤?n???1. The practical limitation on the size of s is the memory available on the computer being used for the attack. Specifically, the computer must be able to hold Ls integer arrays of length N, where N is the number of blocks of ciphertext. The key idea is not to iterate over potential rows of the decryption matrix, but to iterate over randomly chosen characters in the plaintext. This attack also admits a straightforward parallel implementation on multiple processors to further decrease the run time of the attack.  相似文献   

6.
In this study, we investigate a continuous review inventory model to reduce lead time, yield variability and setup cost simultaneously through capital investments. We assume that the backorder rate is depending on the length of the lead time through the amount of shortages. We also assume that lead time demand's distribution is not known but its first and second moments are known. We apply minimax distribution free procedure to minimise the expected total annual cost. By using logarithmic investment function we describe the relationship between the reduction in lead time, yield variability and setup cost with capital investment. This function was used in many existing models. Our main aim is to determine the optimal capital investment and ordering policies that minimises the expected total annual cost. To find out the optimal solution, an algorithm is given. With the help of this algorithm, optimal capital investment and ordering policies are wrought out. Numerical examples are given to elucidate the model. Our proposed model greatly differs from the model existing in the literature (the model by Lin and Hou (2005 Lin, LC and Hou, KL. 2005. An Inventory System with Investment to Reduce Yield Variability and Setup Cost. Journal of the Operational Research Society, 56: 6774. [Taylor &; Francis Online], [Web of Science ®] [Google Scholar])) viz: (1) In the above model, yield variability and setup cost were reduced through capital investment. In our model we reduce yield variability setup cost and also the lead time, which plays a vital role in any business. By reducing lead time we can improve the service level to the customer so as to increase the competitive edge in business. (2) In the model (the model by Lin and Hou (2005 Lin, LC and Hou, KL. 2005. An Inventory System with Investment to Reduce Yield Variability and Setup Cost. Journal of the Operational Research Society, 56: 6774. [Taylor &; Francis Online], [Web of Science ®] [Google Scholar])), it was assumed that lead time demand follows normal distribution. But in our model we take the distribution of lead time demand as distribution free. That is, it can follow any distribution which is more general. (3) In the above model (the model by Lin and Hou (2005 Lin, LC and Hou, KL. 2005. An Inventory System with Investment to Reduce Yield Variability and Setup Cost. Journal of the Operational Research Society, 56: 6774. [Taylor &; Francis Online], [Web of Science ®] [Google Scholar])), shortages are completely backlogged. But we consider partial backlogging and take the backlogging rate as 0 ≤ B ≤ 1. If we set backlogging rate B = 1 we get the above model. That is, the above model is particular case of our model. (4) We also assume that the backorder rate depends on the length of the lead time through the amount of shortages. If the lead time is longer then shortage accumulation is higher. The patience of customers will result in failure in business since some customers may turn to some other supplier. Hence, the backorder rate will be reduced. This assumption is very realistic.  相似文献   

7.
We study the problem of how much error is introduced in approximating the dynamics of a large vehicular platoon by using a partial differential equation, as was done in Barooah, Mehta, and Hespanha [Barooah, P., Mehta, P.G., and Hespanha, J.P. (2009 Barooah, P, Mehta, PG and Hespanha, JP. 2009. Mistuning-based Decentralised Control of Vehicular Platoons for Improved Closed Loop Stability. IEEE Transactions on Automatic Control, 54: 21002113. [Crossref], [Web of Science ®] [Google Scholar]), ‘Mistuning-based Decentralised Control of Vehicular Platoons for Improved Closed Loop Stability’, IEEE Transactions on Automatic Control, 54, 2100–2113], Hao, Barooah, and Mehta [Hao, H., Barooah, P., and Mehta, P.G. (2011), ‘Stability Margin Scaling Laws of Distributed Formation Control as a Function of Network Structure’, IEEE Transactions on Automatic Control, 56, 923–929]. In particular, we examine the difference between the stability margins of the coupled-ordinary differential equations (ODE) model and its partial differential equation (PDE) approximation, which we call the approximation error. The stability margin is defined as the absolute value of the real part of the least stable pole. The PDE model has proved useful in the design of distributed control schemes (Barooah et al. 2009 Barooah, P, Mehta, PG and Hespanha, JP. 2009. Mistuning-based Decentralised Control of Vehicular Platoons for Improved Closed Loop Stability. IEEE Transactions on Automatic Control, 54: 21002113. [Crossref], [Web of Science ®] [Google Scholar]; Hao et al. 2011 Hao, H, Barooah, P and Mehta, PG. 2011. Stability Margin Scaling Laws of Distributed Formation Control as a Function of Network Structure. IEEE Transactions on Automatic Control, 56: 923929. [Crossref], [Web of Science ®] [Google Scholar]); it provides insight into the effect of gains of local controllers on the closed-loop stability margin that is lacking in the coupled-ODE model. Here we show that the ratio of the approximation error to the stability margin is O(1/N), where N is the number of vehicles. Thus, the PDE model is an accurate approximation of the coupled-ODE model when N is large. Numerical computations are provided to corroborate the analysis.  相似文献   

8.
《国际计算机数学杂志》2012,89(7):1023-1038
Based on the Logarithmic-Quadratic Proximal (LQP) method 2 Auslender, A., Teboulle, M. and Ben-Tiba, S. 1999. A logarithmic-quadratic proximal method for variational inequalities. Comput. Optim. Appl., 12: 3140. [Crossref], [Web of Science ®] [Google Scholar], we propose a new prediction-correction method for nonlinear complementarity problem (NCP). We obtain the predictor through a simplified inexact logarithmic-quadratic proximal method under a relaxed inexact criterion. The corrector is obtained by the improved extragradient method. Under certain conditions, the global convergence of the proposed method is proved. Preliminary numerical results indicate the efficiency of the proposed method.  相似文献   

9.
This article takes stock of the current state of research on knowledge processes in virtual teams (VTs) and consolidates the extent research findings. Virtual teams, on the one hand, constitute important organisational entities that facilitate the integration of diverse and distributed knowledge resources. On the other hand, collaborating in a virtual environment creates particular challenges for the knowledge processes. The article seeks to consolidate the diverse evidence on knowledge processes in VTs with a specific focus on identifying the factors that influence the effectiveness of these knowledge processes. The article draws on the four basic knowledge processes outlined by Alavi and Leidner (2001 Alavi, M.Leidner, D.E., 2001. Review: knowledge management and knowledge management systems: conceptual foundations and research issues. MIS Quarterly, 25 (1), 107136. doi: 10.2307/3250961[Crossref], [Web of Science ®] [Google Scholar]) (i.e. creation, transferring, storage/retrieval and application) to frame the investigation and discuss the extent research. The consolidation of the existing research findings allows us to recognise the gaps in the understanding of knowledge processes in VTs and identify the important avenues for future research.  相似文献   

10.
11.
In a recent paper, Begum et al. (2012 Begum, R., Sahoo, R.R., and Sahu, S.K. (2012), ‘A Replenishment Policy for Items with Price-Dependent Demand, Time-Proportional Deterioration and no Shortages’, International Journal of Systems Science, 43, 903910.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar], International Journal of Systems Science, 43, 903–910) established pricing and replenishment policy for an inventory system with price-sensitive demand rate, time-proportional deterioration rate which follows three parameters, Weibull distribution and no shortages. In their model formulation, it is observed that the retailer's stock level reaches zero before the deterioration occurs. Consequently, the model resulted in traditional inventory model with price sensitive demand rate and no shortages. Hence, the main purpose of this note is to modify and present complete model formulation for Begum et al. (2012) Begum, R., Sahoo, R.R., and Sahu, S.K. (2012), ‘A Replenishment Policy for Items with Price-Dependent Demand, Time-Proportional Deterioration and no Shortages’, International Journal of Systems Science, 43, 903910.[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]. The proposed model is validated by a numerical example and the sensitivity analysis of parameters is carried out.  相似文献   

12.
《Ergonomics》2012,55(6):747-754
Firefighting demands performing heavy muscular work under adverse and potentially dangerous conditions. Although the physiological and psychological responses to simulated firefighting activities have been described, the heat strain has not been characterised using standardised indices of exercise–heat strain. The purpose of the study is to describe the physiological and perceptual strain associated with working in personal protective equipment and performing simulated firefighting activities in a hot environment using recently developed strain indices (Physiological Strain Index (PhSI); Perceptual Strain Index (PeSI)). Data from two previously published studies (Smith et al. 1995 Smith, D. L. 1995. Selected physiological and psychological responses to physical activity in different configurations of firefighting gear. Ergonomics, 38: 20652077. [Taylor & Francis Online], [Web of Science ®] [Google Scholar], 2001 Smith, D. L. 2001. Effect of strenuous live-fire fire fighting drills on hematological, blood chemistry and psychological measures. Journal of Thermal Biology, 26: 375379. [Crossref], [Web of Science ®] [Google Scholar]) – one a laboratory-based study and one a field-based study – were re-analysed incorporating the strain indices. The laboratory study involved walking on a treadmill for 15 min while wearing three different clothing and equipment configurations. The field study involved three trials of standardised firefighting tasks in a live-fire training structure (mean trial length = 5.76 min). Heart rate, rectal temperature, thermal sensations and ratings of perceived exertion were collected in each study. PhSI and PeSI values were calculated using the formulae developed by Moran et al. (1998b Moran, D. S., Shitzer, A. and Pandolf, K. B. 1998b. A physiological strain index to evaluate heat stress. American Journal of Physiology, 275: R129R134. [Crossref], [PubMed], [Web of Science ®] [Google Scholar]) and Tikuisis et al. (2002 Tikuisis, P., McLellan, T. M. and Selkirk, G. 2002. Perceptual versus physiological heat strain during exercise-heat stress. Medicine & Science in Sports & Exercise, 34: 14541461. [Crossref], [PubMed], [Web of Science ®] [Google Scholar]), respectively. PhSI and PeSI increased significantly over time in both studies. Even relatively brief bouts of exercise while wearing heavy impermeable clothing or simulated firefighting activity in the heat results in moderate to high levels of heat strain as assessed by PhSI and PeSI.  相似文献   

13.
Using the well-known Arrow and Karlin (1958) Arrow, K.J., and Karlin, S. (1958), ‘Production over Time with Increasing Marginal Costs’, in Studies in the Mathematical Theory of Inventory and Production, eds. K.J. Arrow and S. Karlin, Stanford: Stanford University Press, pp. 6169. [Google Scholar] dynamic production–inventory model and the model with tradable emission permits which was presented by Dobos (2005 Dobos, I. (2005), ‘The Effects of Emission Trading on Production and Inventories in the Arrow–Karlin Model’, International Journal of Production Economics, 93–94, 301308.[Crossref], [Web of Science ®] [Google Scholar], 2007) Dobos I. (2007), ‘Tradable Emission Permits and Production-inventory Strategies of the Firm’, International Journal of Production Economics, 108, 329333.[Crossref], [Web of Science ®] [Google Scholar], we develop a model of the production–inventory system with deteriorating items and tradable emission permits. The objective of this paper is to apply the optimal control theory to solve the production–inventory problem with deteriorating items and tradable emission permits, and derive the optimal inventory level and the optimal production rate that minimise the total cost. The results are discussed with a numerical example and a sensitivity analysis of the optimal solution with respect to the parameters of the production–inventory system is carried out.  相似文献   

14.
This paper presents further results on the robust control method for qubit systems in Dong et al. (2013) Dong, D., Petersen, I.R., &; Rabitz, H. (2013). Sampled-data design for robust control of a single qubit. IEEE Transactions on Automatic Control, 58, 26542659.[Crossref], [Web of Science ®] [Google Scholar]. Based on the properties of an antisymmetric system, an alternative method is presented to analyse and exclude singularity intervals in the proof of partial original results. For the case of amplitude damping decoherence, a larger sampling period is presented when the upper bound of the probability of failure is small enough. For the case of phase damping decoherence, a larger sampling period is given when the lower bound of the target coherence is large enough. Furthermore, we provide improved sampling periods for amplitude damping decoherence and phase damping decoherence without the above prior constraints.  相似文献   

15.
There are many algorithms currently available to approximate solutions to the ‘travelling salesman’ problem of finding the shortest route connecting n points in a complete tour. Conley (1988 CONLEY , W. C. , ( 1988 ), Int. J. Systems Sei. , 19 , 2115 .[Taylor &; Francis Online], [Web of Science ®] [Google Scholar]) presents a multi–stage simulation on a rank ordered distance array to solve a one vehicle problem for n = 20. A modification of that approach is presented here to deal with sending out two delivery trucks (or one truck making two trips) to touch all n points and return. An example for n = 33 is developed. The multi–stage simulation approach is then compared with other techniques.  相似文献   

16.
ABSTRACT

We propose a method, called QSQN-WF, for evaluating queries to Datalog¬ databases under the well-founded semantics. It is the first one that is set-at-a-time and strictly goal-directed w.r.t. SLS-resolution defined by Przymusinski. These properties are important for reducing accesses to the secondary storage and redundant computations. The first property distinguishes our method from the one based on SLG-resolution by Chen, Swift, and Warren (1995 Chen, W., T. Swift, and D. S. Warren. 1995. Efficient top-down computation of queries under the well-founded semantics. Journal of Logic Programming 24 (3):16199. doi:10.1016/0743-1066(94)00028-5[Crossref] [Google Scholar]) (which is tuple-at-a-time). The second property distinguishes our method from the ones based on the magic-sets transformation by Kemp, Srivastava, and Stuckey (1995 Kemp, D. B., D. Srivastava, and P. J. Stuckey. 1995. Bottom-up evaluation and query optimization of well-founded models. Theoretical Computer Science 146 (1 & 2):14584. doi:10.1016/0304-3975(94)00153-a[Crossref], [Web of Science ®] [Google Scholar]) and Morishita (1996 Morishita, S. 1996. An extension of Van Gelder's alternating fixpoint to magic programs. Journal of Computer and System Sciences 52 (3):50621. doi:10.1006/jcss.1996.0038[Crossref], [Web of Science ®] [Google Scholar]), which use magic atoms not in the most appropriate way and are not strictly goal-directed w.r.t. SLS-resolution. Our method follows SLS-resolution, with Van Gelder’s alternating fixpoint semantics on the background, but uses a query-subquery net to implement tabulation and the set-at-a-time technique, reduce redundant computations, and allow any control strategy within each iteration of the main loop. It is sound and complete w.r.t. the well-founded semantics and has PTIME data complexity.  相似文献   

17.
In previous work, Nescolarde-Selva and Usó-Doménech (2014a Nescolarde-Selva, J. and J. L. Usó-Doménech. “Semiotic Vision of Ideologies.” Found Sci 19 (2014a): 263282.[Crossref], [Web of Science ®] [Google Scholar], b) discussed the theory that complex belief systems have a topological structure. In this article it is suggested that this structure is also fuzzy. We introduce the concepts of fuzzy sets in the context of beliefs (substantive and derived), and between derived beliefs themselves. Also introduced are the concepts of fuzzy covering and fuzzy invariance and the relationships between them.  相似文献   

18.
《国际计算机数学杂志》2012,89(12):2568-2583
We present semi-local and local convergence results for Newton's method in order to approximate a locally unique solution of a nonlinear equation in a Banach space setting. Our technique is more flexible than in earlier studies such that [J.A. Ezquerro, D. González, and M.A. Hernández, Majorizing sequences for Newton's method from initial value problems, J. Comput. Appl. Math. 236 (2012), pp. 2246–2258; J.A. Ezquerro, D. González, and M.A. Hernández, A general semi-local convergence result for Newton's method under centred conditions for the second derivative, ESAIM: Math. Model. Numer. Anal. 47 (2013), pp. 149–167]. The operator involved is twice Fréchet-differentiable. We also assume certain centred Lipschitz-type conditions for the derivative which are more precise than the Lipschitz conditions used in earlier works. Numerical examples are used to show that our results apply to solve equations but earlier ones do not in the semi-local case. In the local case we obtain a larger convergence ball. These advantages are obtained under the same computational cost as before [17 J.A. Ezquerro, D. González, and M.A. Hernández, Majorizing sequences for Newton's method from initial value problems, J. Comput. Appl. Math. 236 (2012), pp. 22462258. doi: 10.1016/j.cam.2011.11.012[Crossref], [Web of Science ®] [Google Scholar],18 J.A. Ezquerro, D. González, and M.A. Hernández, A general semilocal convergence result for Newton's method under centered conditions for the second derivative, ESAIM: Math. Model. Numer. Anal. 47 (2013), pp. 149167. doi: 10.1051/m2an/2012026[Crossref], [Web of Science ®] [Google Scholar]].  相似文献   

19.
20.
ABSTRACT

Multiple Base Notational System (MBNS) steganography (Zhang & Wang, 2005 Zhang, X. and Wang, S. 2005. Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Processing Letters, 12(1): 6770. [Crossref], [Web of Science ®] [Google Scholar]) scheme employs human vision sensitivity to hide a large amount of secret bits into a still image with a high imperceptibility and is demonstrated to be robust to statistical analysis. In MBNS steganography, secret data are converted into symbols in a notational system with multiple bases. The pixels of a host image are then altered such that their remainders are equal to the symbols, when the pixel values are divided by the bases. Empirically it is observed that the moments of the entropy measure of the remainders in a stego image are larger than that of its clean counterpart. Based on this observation, we propose an active steganalytic approach which effectively breaks the MBNS steganography even with 5% payload capacity, utilizing these moments as features and also makes an estimation of the embedding rate. Experimental results demonstrate that the proposed scheme significantly outperforms prior arts in classification accuracy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号