首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
In this paper we consider the problem of obtaining minimal-order representations of generalized state-space systems described by equations of the formE x(t)=A x(t)+B u(t),y(t)=C x(t)+D u(t) withE singular and det(sE–A)0. The underlying principle is that of removal of impulsive and exponential uncontrollable and unobservable modes. When this is followed by the removal of the remaining impulsive modes, we get a minimal-order generalized or standard state-space representation. Simple reduction procedures and numerical algorithms based on these principles are developed and illustrated by means of two numerical examples.P. Misra's research was supported in part by AFWAL, Wright Patterson Air Force Base under Grant F33615-88-C-3605. R. V. Patel's research was supported by NSERC of Canada under Grant A1345.  相似文献   

2.
Let A(t) and B(t) (t≥0) be variable n×n-matrices. Assuming that the system [(x)\dot]=A(t)x\dot{x}=A(t)x is exponentially stable and the matrix norm of the integral ò0t (B(s)-A(s)) ds\int_{0}^{t} (B(s)-A(s))\,ds is sufficiently small, for the system [(x)\dot]=B(t)x\dot{x}=B(t)x we derive explicit stability conditions, which improve the well-known ones in appropriate situations. The results are illustrated by a numerical example.  相似文献   

3.
A new theory and realization methodology for the inverse-system/deconvolution problem associated with dynamical systems is developed. This new theory, based on the assumption of a finite-dimensional, linearized dynamical system and uncertain input signalss(t) that have a feature calledwaveform structure, effectively overcomes the longstanding difficulties of realizing inverse systems for linear systems that have more poles than zeros and/or have zeros in the right half-plane. The results obtained here are derived for both continuous and discrete-time linear systems, using either analog or digital signal processing, and includetime-varying systems with uncertainvector input signalss(t)=(s 1 (t)...sr(t)) and/orvector output measurementsy(t)=(y 1 (t)...y m (t)).  相似文献   

4.
We consider the family ? of exponential polynomials. $$f_T (z): = f_0 (z) + f_1 (z)e^{ - zT_1 } + f_2 (z)e^{ - T_2 } + \cdots + f_n (z)e^{ - zT_n } ,T : = T_1 \times T_2 \times \cdots \times T_n ,$$ where thef k(z),k=0(1)n, are real polynomials under the degree restriction deg(f 0)>deg(f k),k=1(1)n, and theT k,k=1(1)n, are intervals inR +. The functions in ? are characteristic functions of linear, retarded dynamical systems with constant coefficients and finitely many interval-valued discrete delays. A stability criterion for ? is expounded; ? is stable if (a) ? contains a stable member and (b) a certain functionalT:S(y) →; {0, 1} vanishes fory in a compact interval inR +. Here,S(y) is the boundary of a circular are regionS(y) in the complex plane derived fromf T. Tools needed for a computer implementation are compiled.  相似文献   

5.
LetX 1,X 2,... be a stationary sequence of random variables with Pr{X t, x}=F(x),t=1, 2,... Also let i n,(t) ,i=1,...,n, denote the ith order statistic (OS) in the moving sample (X t–N ,...,X t,...,X t+N) of odd sizen=2N+1. ThenY t=a i X i n(t) with a i=1 is an order-statistics filter. In practicea i0,i=1,...,n. Fort>N, the sequence {Y t} is also stationary. IfX 1 X 2, ... are independent, the autocorrelation function (r)=corr(Y t,Y t+r) is zero forr >n – 1 and forr n – 1 can be evaluated directly in terms of the means, variances, and covariances of the OS in random samples of sizen +r fromF(x).In special cases several authors have observed that the spectral density functionf() of {Y t} is initially decreasing for > 0. This result is made more precise and shown to hold generally under white noise. The effect of outliers (impulses) is also discussed.This research was supported by the U.S. Army Research Office.  相似文献   

6.
Exponentially graded semiconductor layers are of interest for use as buffers in heteroepitaxial devices because of their tapered dislocation density and strain profiles. Here we have calculated the critical layer thickness for the onset of lattice relaxation in exponentially graded In x Ga1?x As/GaAs (001) heteroepitaxial layers. Upwardly convex grading with \( x = x_{\infty } \left( {1 - {\rm e}^{ - \gamma /y} } \right) \) was considered, where y is the distance from the GaAs interface, γ is a grading length constant, and x is the limiting mole fraction of In. For these structures the critical layer thickness was determined by an energy-minimization approach and also by consideration of force balance on grown-in dislocations. The force balance calculations underestimate the critical layer thickness unless one accounts for the fact that the first misfit dislocations are introduced at a finite distance above the interface. The critical layer thickness determined by energy minimization, or by a detailed force balance model, is approximately \( h_{\rm{c}} \approx <Exponentially graded semiconductor layers are of interest for use as buffers in heteroepitaxial devices because of their tapered dislocation density and strain profiles. Here we have calculated the critical layer thickness for the onset of lattice relaxation in exponentially graded In x Ga1−x As/GaAs (001) heteroepitaxial layers. Upwardly convex grading with x = x ( 1 - e - g/y ) x = x_{\infty } \left( {1 - {\rm e}^{ - \gamma /y} } \right) was considered, where y is the distance from the GaAs interface, γ is a grading length constant, and x is the limiting mole fraction of In. For these structures the critical layer thickness was determined by an energy-minimization approach and also by consideration of force balance on grown-in dislocations. The force balance calculations underestimate the critical layer thickness unless one accounts for the fact that the first misfit dislocations are introduced at a finite distance above the interface. The critical layer thickness determined by energy minimization, or by a detailed force balance model, is approximately hc ? < h_{\rm{c}} \approx < Although these results were developed for exponentially graded In x Ga1−x As/GaAs (001), they may be generalized to other material systems for application to the design of exponentially graded buffer layers in metamorphic device structures such as modulation-doped field-effect transistors and light-emitting diodes.  相似文献   

7.
8.
In this paper, we investigate the problem of approximating a given (not necessarily bandlimited) signal, x(t), by a (bandlimited) interpolation or sampling series of the form:
where is a given positive parameter, the approximation error being measured in the L 2(R) norm.When for all t R with X() L1(R), approximation in the uniform norm yields the well-known error estimate,
\sigma } {\left| {X\left( \omega \right)} \right|d\omega }.$$ " align="middle" vspace="20%" border="0">
An analogous result using the L 2norm,
\sigma } {\left| {X(\omega )} \right|} ^2 d\omega ,$$ " align="middle" vspace="20%" border="0">
has been reported in the recent literature [1], [2] for x(t) C (R) L 1(R), X() L 1 L 2(R) and c an absolute constant independent of x(t).Our principal result is the following:Given absolute constants > 0 and > 0, a continuous, bandlimited signal x (t) L 1 L 2(R) can be constructed with
such that
\sigma } {\left| {X_\beta (\omega )} \right|^2 } d\omega .$$ " align="middle" vspace="20%" border="0">
This shows that a result of the form (*) with an absolute constant c cannot hold in general, even with the added restriction to finite bandwidth signals.  相似文献   

9.
LetP(y,M) be a family of polynomials, depending on a controller parameter vector y in n+1, defined as follows: a family of interval matrices, and y in n+1, set Given an initial stabilizing controller y0, this paper provides a simple method to robustify y0, i.e., to obtain a controller parameter vector y1 which is more robust than y0. Furthermore we define the stability factort for a given robustly stable controller y, which serves as a measure of the robustness of y.  相似文献   

10.
Structural and optical properties of two- and three-layer epitaxial heterostructures containing GaInP/Ga x In1 − x As y P1 − y quaternary alloy layers were studied. Domain formation due to spinodal decomposition of the quaternary alloy was detected in three-layer heterostructures. As a result, an additional long-wavelength band appears in the photoluminescence spectra, and an additional doublet of the line appears in X-ray diffraction patterns of the (006) line. The domain composition was determined on the basis of Vegard’s law and the Kouphal equation. Original Russian Text ? E.P. Domashevskaya, N.N. Gordienko, N.A. Rumyantseva, B.L. Agapov, P.V. Seredin, L.A. Bityutskaya, I.N. Arsent’ev, L.S. Vavilova, I.S. Tarasov, 2008, published in Fizika i Tekhnika Poluprovodnikov, 2008, Vol. 42, No. 9, pp. 1086–1093.  相似文献   

11.
An analytical procedure for the estimation of the focus of expansion (FOE) location is introduced. The method is applied to a vector field which has been obtained from the analysis of the relative translational movement of a rigid body with respect to the acquiring camera (monocular system). A polynomial model is fitted to the vector field; the order and shape of the model are determined by the kinetic analysis of the Euclidean camera centered coordinate system in which the camera is moving, and some hypothesis concerning the approximation of the inverse of the depth function 1/Z(x, y). Two basic properties of complex differentiation theory are applied, assuming that each vector of the optic flow is a real-valued complex function of the form v(x, y)=vx(x, y)+ivy(x, y). These properties provide the set of points for which both components of the vector field vx(x, y) and vy(x, y) are harmonic and, as a subset, the set of points for which both components are zero. The use of perspective projection states that the FOE is the locus where vx(x, y)=0=vy(x, y) and, therefore, where the conditions stated by both properties meet.  相似文献   

12.
It is shown that transformation of photoelectric characteristics of sensors based on Cd1 − x Zn x Te (x = 0.05–0.15) crystals into parametric spectral I(λ)-dI/dλ, kinetic I(t)-dI/dt, and dynamic U-Iy) f, λ signatures (I(λ) is the photocurrent, U is the voltage, f is the frequency, t is the time, and y is the coordinate) makes it possible to reveal integrative photoresponse features caused by the photoresponse asymmetry and nonlinearity. Indices of asymmetry and balance of dynamic and energy photoinduced states are suggested; these indices represent systematically the effect of multiscale fields on photoelectronic processes. Using these indices, the ranges of external effects at which systematic features of photoresponse of sensors are minimal or maximal are determined, which makes it possible to increase the efficiency of purposeful selection and treatment of sensors.  相似文献   

13.
It is shown that for each memberG of a large class of causal time invariant nonlinear input-output maps, with inputs and outputs defined on the nonnegative integers, there is a functionalA on the input set such that (Gs)(k) has the representationA(F k s) for allk and each inputs, in whichF k is a simple linear map that does not depend onG. More specifically, this holds—with anA that is unique in a certain important sense—for anyG that has approximately finite memory and meets a certain often-satisfied additional condition. Similar results are given for a corresponding continuous-time case in which inputs and outputs are defined on +. An example shows that the members of a large family of feedback systems have these A-map representations.  相似文献   

14.
A new statistical test for selecting the order of a nonstationary AR modelyk is presented based on the predictive least-squares principle. This test is of the same order as the accumulated cost function n = k=1 n ( k * k )2;i.e., * wherey k * is the predictive least-square estimate. It is constructed to show how many times the integrated AR processy k is differenced in order to obtain a stationary AR process given that the exact order of the process is unknown.  相似文献   

15.
An N argument function f(x 1,...,x N ) is called t-private if a protocol for computing f exists so that no coalition of at most t parties can infer any additional information from the execution, other than the value of the function. The motivation of this work is to understand what levels of privacy are attainable. So far, only two levels of privacy are known for N argument functions which are defined over finite domains: functions that are N-private and functions that are (N – 1)/2-private but not N/2-private.In this work we show that the privacy hierarchy for N-argument functions which are defined over finite domains, has exactly (N + 1)/2 levels. We prove this by constructing, for any N/2 t N – 2, an N-argument function which is t-private but not (t + 1)-private.This research was supported by US-Israel Binational Science Foundation Grant 88-00282.  相似文献   

16.
This paper studies the behavior of motions of large-scale (LS) semistate systems (SSS) governed byP i (t)x i =M i (t,x i )x i +f i (t)+h i (t, x), i=1,2,...,s, =(x 1 T x 2 T x s T )T, where matricesP i (t) are singular. Using Lyapunov's approach and the tools for LS system analysis, a variant of attractivity and ultimate boundedness of appropriate time-variable sets are investigated. The results are based on a specific choice of the aggregate functions. It is assumed that the reduction of equations to a normal form of lower order is inconvenient. The aggregation-decomposition approach used in this paper reduces the dimensionality of an aggregate matrix of the system to the number of its systems. Motion properties of LS systems are deduced from the properties of its isolated subsystems, the character of interconnections, and the conditions imposed on the system aggregate matrix. Sufficient algebraic conditions for the above-mentioned motion properties are developed.  相似文献   

17.
In this paper we study the reliability behaviour of a two-unit cold standby system with priority. At time t = 0, the priority unit (p) begins to work and the standby unit (s) is in cold standby. The p-unit has priority whether it is working or being repaired. A single repairman is available, and the repaired unit is as good as new. We assume that the p-unit's working time X1 has a general life distribution F(x), and its repair time Y1 has a general distribution G(x). The s-unit's working time X2 has an exponential distribution with mean , and its repair time has an exponential distribution with mean . Using the Markov renewal process and stochastic comparison, we give bounds of the mean time to the first failure of the system, and the system's availability.  相似文献   

18.
We study the natural problem of secure n-party computation (in the computationally unbounded attack model) of circuits over an arbitrary finite non-Abelian group (G,?), which we call G-circuits. Besides its intrinsic interest, this problem is also motivating by a completeness result of Barrington, stating that such protocols can be applied for general secure computation of arbitrary functions. For flexibility, we are interested in protocols which only require black-box access to the group G (i.e. the only computations performed by players in the protocol are a group operation, a group inverse, or sampling a uniformly random group element). Our investigations focus on the passive adversarial model, where up to t of the n participating parties are corrupted. Our results are as follows. We initiate a novel approach for the construction of black-box protocols for G-circuits based on k-of-k threshold secret-sharing schemes, which are efficiently implementable over any black-box (non-Abelian) group G. We reduce the problem of constructing such protocols to a combinatorial coloring problem in planar graphs. We then give three constructions for such colorings. Our first approach leads to a protocol with optimal resilience t<n/2, but it requires exponential communication complexity $O({\binom{2 t+1}{t}}^{2} \cdot N_{g})$ group elements and round complexity $O(\binom{2 t + 1}{t} \cdot N_{g})$ , for a G-circuit of size N g . Nonetheless, using this coloring recursively, we obtain another protocol to t-privately compute G-circuits with communication complexity $\mathcal{P}\mathit{oly}(n)\cdot N_{g}$ for any tO(n 1?? ) where ? is any positive constant. For our third protocol, there is a probability δ (which can be made arbitrarily small) for the coloring to be flawed in term of security, in contrast to the first two techniques, where the colorings are always secure (we call this protocol probabilistic, and those earlier protocols deterministic). This third protocol achieves optimal resilience t<n/2. It has communication complexity O(n 5.056(n+log?δ ?1)2?N g ) and the number of rounds is O(n 2.528?(n+log?δ ?1)?N g ).  相似文献   

19.
The ilmenite–hematite (1 − x) FeTiO3 · xFe2O3 solid solution system is considered to be a novel material for spin-electronics, microelectronics, high-temperature electronics, and radhard electronics. This paper focuses on thin films of composition x = 0.33 grown on (100) MgO single-crystal substrates using pulsed-laser deposition (PLD) under different argon–oxygen mixtures. The surface of the MgO was found to possess MgO2 crystals, yielding an orientation relationship, [001] MgO ∥ [011] MgO2 and (00)MgO ∥ (10) MgO2. The structural characterizations show that the films are crystalline and homogeneous without any secondary phase. The films show a weak and inclined (110) growth epitaxy. A bandgap of 3.4–3.7 eV was obtained for these films from optical measurements carried out in the UV–visible region. Electrical measurements confirmed the semiconducting behavior. However, the resistivity was found to increase substantially on the slightest addition of oxygen into the chamber.  相似文献   

20.
The algebraic nonlinearity of an n-bit boolean function is defined as the degree of the polynomial f(X) Z 2[x 1, x 2,..., x n] that represents f. We prove that the average degree of an ANF polynomial for an n-bit function is n+o(1). Further, for a balanced n-bit function, any subfunction obtained by holding less than n-[log n]- 1 bits constant is also expected to be nonaffine. A function is partially linear if f(X) has some indeterminates that only occur in terms bounded by degree 1. Boolean functions which can be mapped to partially linear functions via a linear transformation are said to have a linear structure, and are a potentially weak class of functions for cryptography. We prove that the number of n-bit functions that have a linear structure is asymptotic .The author is presently employed by the Distributed System Technology Center, Brisbane, Australia.Project sponsored in part by NSERC operating Grant OGP0121648, and the National Security Agency under Grant Number MDA904-91-H-0012. The United States Government is authorized to reproduce and distribute reprints notwithstanding any copyright notation hereon.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号