共查询到20条相似文献,搜索用时 15 毫秒
1.
Castilla M. de Vicuna L.C. Lopez M. Lopez O. Matas J. 《Power Electronics, IEEE Transactions on》2000,15(6):960-973
The design of sliding mode control schemes for quantum resonant converters is introduced hy means of two different approaches. First, an easy-to-use procedure for devising nonlinear control structures is established, using Lyapunov's well-known stability criteria. Second, an alternative method that provides linear sliding surfaces is also developed, considering reaching, existence, and stability conditions. The application of both control design techniques is illustrated in detail by means of three selected examples. The advantages and drawbacks of the resulting control circuits are examined. Simulation and experimental results corroborate the expected features of the close-loop quantum converters 相似文献
2.
Window flow control in a quasi-M/D/1 cut-through switching network with noisy channel is discussed. Two acknowledgment schemes for window edge control at the entry node are proposed, and their various properties investigated 相似文献
3.
Morita H. Kobayashi K. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1993,39(6):1840-1846
The authors modify the algorithm of Z. Ziv and A. Lempel (1977), LZ77, restricting pointers to start only at the boundary of a previously parsed phrase in a window. Although the number of parsed phrases should increase more than those in LZ77, the number of bits needed to encoded pointers is considerably reduced since the number of possible positions to be encoded is much smaller. It is shown that, for any stationary finite state source, the modified LZ77 code is asymptotically optimal with the convergence rate O(log log M/log M), where M is the size of a sliding window 相似文献
4.
It is shown that implementing a practical self-stabilizing sliding window protocol requires a bound on the maximum delay or maximum memory of the communication channel involved. This motivates using communication channel models that incorporate a delay or memory bound. For such models, two new ARQ protocols are presented that self-stabilize by using 1 bit of overhead in each transmitted message. The protocols operate like selective repeat ARQ, except that when a fault places them in an incorrect (unsafe) state, the additional bit in the protocol messages allows automatic recovery. Following a transient fault, the bounded delay protocol stabilizes within four round-trip times. The bounded memory protocol stabilizes after sending at most 2(K+n) messages, where K the is maximum number of messages that can be stored in one direction on the channel, and n is the window size of the sender 相似文献
5.
Adaptive feedforward and feedback control schemes for sliding mode controlled power converters 总被引:3,自引:0,他引:3
Siew-Chong Tan Lai Y.M. Tse C.K. Cheung M.K.H. 《Power Electronics, IEEE Transactions on》2006,21(1):182-192
A major disadvantage of applying sliding mode control to dc/dc converters is that the steady-state switching frequency is affected by line and load variations. This is undesirable as it complicates the design of the input and output filters. To reduce switching frequency deviation in the events of line and load variations, an adaptive feedforward control scheme that varies the hysteresis band according to the change of line input voltage and an adaptive feedback control scheme that varies the control parameter (i.e., sliding coefficient) according to the change of the output load are proposed. This paper presents a thorough investigation into the problem and the effectiveness of the proposed solutions. In addition, methods of implementing the proposed adaptive control strategies are discussed. Experimental results confirm that the adaptive control schemes are capable of reducing the switching frequency variations caused by both line and load variations. 相似文献
6.
7.
The problem of designing burst reducing flow controllers for traffic in an ATM network is studied. By requiring that the output flow obey certain burstiness constraints, it is shown that an optimal design exists and that it can be easily implemented in real time. Two versions of the problem are considered. The first one places constraints on the buffer size and the second one on the maximum delay that a cell can experience. Both problems are solved for arbitrary traffic processes. To treat the problems in this generality the authors introduce reflection mappings and use them, in a rather novel way, to establish optimality results. As a by-product of the analysis and methods, the optimality of the popular leaky bucket flow control scheme is also established 相似文献
8.
The authors make the case in favor of an integrated approach to ATM flow control. They contend that both rate and credit schemes have advantages and disadvantages, and that to a large extent they can be viewed as complementary 相似文献
9.
A single-hop OSI structured network with multiple layers of sliding window flow control and packet fragmentation between layers is analyzed. An approximation algorithm is presented to hierarchically reduce the network to a single queue whose performance characteristics represent the original network. Network transmission characteristics are restricted to Erlang distributions. Validation against exact and simulation results showed that the approximation algorithm has a satisfactory error level 相似文献
10.
Signed sliding window algorithms for modulo multiplication 总被引:2,自引:0,他引:2
The signed sliding window (SSW) number system for accelerating long-wordlength modulo multiplication is introduced. Compared with the previously published unsigned sliding window (USW) number system, SSW reduces the average number of nonzero digits in a number or reduces the amount of pre-computation required. In addition, how USW and SSW can be combined advantageously with Montgomery's algorithm for modulo reduction is described 相似文献
11.
12.
LTE-A下行传输中采用的多达8天线端口的增强型MIMO技术,为了保证对LTE系统的后向兼容以及确保UE对最大8天线端口和反馈更大的带宽信道状态信息(CSI),引入了新的参考信号CSI-RS。分析了LMMSE信道估计算法,提出了一种基于LMMSE滑动窗的信道估计算法。仿真结果表明,该算法既节约了导频资源占用率,又提高了系统的发送效率。 相似文献
13.
一种基于滑动窗口技术的入侵检测方法 总被引:1,自引:0,他引:1
网络数据流在一段时间内会发生概念性变化,这可能会降低入侵检测的精度.针对网络数据流的这一特性,提出了一种能识别并适应概念飘移的基于滑动窗口的入侵检测方法,它能根据数据流的概念漂移的状况自动调整训练窗口并对检测模式进行及时的更新. 相似文献
14.
15.
16.
Wijayasuriya S.S.H. Norton G.H. McGeehan J.P. 《Vehicular Technology, IEEE Transactions on》1996,45(3):503-521
We detail the development of a near-far (NF) resistant sliding window decorrelating algorithm (SLWA) that overcomes the near-far problem (NFP) pertaining to the conventional linear correlation receiver (CLCR) and alleviates some of the limitations of the standard decorrelator. The SLWA architecture is extended to incorporate differentially coherent multipath (RAKE) diversity combining techniques and hence achieves simultaneous rejection of multiuser and multipath interference. This paper also presents a novel algorithm for updating the decorrelator coefficients using a fully parallel architecture. We present a mathematical model for the performance of a sliding window scheme, the main contribution of which is the analysis of finite sequence length multipath decorrelation under the practical limitation of incomplete RAKE combining. In addition to numerical results, we present results pertaining to capacity improvements achieved over the CLCR, derived from a simulation of a multiuser direct-sequence code-division multiple-access (DS-CDMA) mobile radio system 相似文献
17.
18.
19.
Hyoung-Kyu Song 《Communications Letters, IEEE》1999,3(7):211-213
A simultaneous sliding window channel estimation and timing adjustment method is proposed for adaptive maximum-likelihood sequence equalizer (MLSE) in the global system for mobile communication (GSM) system, and also a tuning scheme based on least mean squared (LMS) algorithm is presented in order to improve the performance of equalizer. Simulation results show that the proposed channel estimation technique is effective for channel estimation of the adaptive equalizer 相似文献
20.
为解决轨迹差分隐私保护中存在的隐私预算与服务质量等问题,提出了一种融合预测扰动的轨迹差分隐私保护机制。首先,利用马尔可夫链和指数扰动方法预测满足差分隐私和时空安全的扰动位置,并引入服务相似地图检测该位置的可用性;如果预测成功,则直接采用预测位置替代差分扰动的位置,以降低连续查询的隐私开销并提高服务质量。在此基础上,设计基于w滑动窗口的轨迹隐私预算分配机制,确保轨迹中任意连续的w次查询满足ε-差分隐私,解决连续查询的轨迹隐私问题。此外,基于敏感度地图设计一种隐私定制策略,通过自定义语义位置的隐私敏感度,实现隐私预算的量身定制,从而进一步提高其利用率。最后,利用真实数据集对所提方案进行实验分析,结果显示所提方案提供了更好的隐私保护水平和服务质量。 相似文献