135 resultados para time delay systems


Relevância:

100.00% 100.00%

Publicador:

Resumo:

This study considers the problem of stability analysis of discrete-time two-dimensional (2D) Roesser systems with interval time-varying delays. New 2D finite-sum inequalities, which provide a tighter lower bound than the existing ones based on 2D Jensen-type inequalities, are first developed. Based on an improved Lyapunov-Krasovskii functional, the newly derived inequalities are then utilised to establish delay-range-dependent linear matrix inequality-based stability conditions for a class of discrete time-delay 2D systems. The effectiveness of the obtained results is demonstrated by numerical examples.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper investigates the problem of robust observer-based stabilization for a class of one-sided nonlinear discrete-time systems subjected to unknown inputs. We propose a simple simultaneous state and input estimator. A nonlinear controller is then proposed to compensate for the effects of unknown inputs and to ensure asymptotic stability in a closed loop. Several mathematical artifacts are used to deduce stability conditions expressed in terms of linear matrix inequalities. To show high performances of the proposed technique, a relevant example is provided with comparisons to recent results.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper deals with the practical aspects of reduced-order distributed functional state observers design for interconnected linear systems subject to time delays in the interconnections. Contrary to some estimation strategies which only take the ideal instantaneous output information into account, the proposed scheme incorporates output information that is inevitably encountered with time delays in the course of its transmission from the distanced subsystems. It is proved that such estimator possesses less restrictive existence conditions with the acceptance of measurement data from other interrelated subsystems. Upon the satisfaction of the established existence conditions, it will be demonstrated through a simple design procedure and simulation results that a feasible observer can be realized for a given numerical system.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Differential space-time modulation (DSTM) techniques developed for multi-antenna systems allow the receiver to detect the transmitted signal without the knowledge of the fading channels. It can be viewed as an extension of differential phase-shift keying (DPSK) in single antenna systems. In this paper, we derived the pairwise error probability upper bound of differential space-time coded systems with spatially correlated Rayleigh fading channels. Based on the performance analysis, we develop a novel DSTM scheme which can exploit the spatial correlation in the fading channels. It is found that by carefully designing the initial transmitted signal matrix, the performance of the differential space-time coded systems can be significantly improved.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper considers the design of a common linear functional observer for two linear time-invariant systems with unknown inputs. A structure for a common observer which only uses the available output information is proposed. Here, for the proposed structure, we show that the simultaneous functional observation problem of two plants is reduced to a problem of designing two observers: the first is a full-order unknown input observer of one of the two systems; the second observer is a common unknown input observer of a system comprises two-connected systems. In general, the existence conditions for the second observer are very difficult to satisfy. This paper thus concludes that it is indeed very difficult to find a common observer for two linear systems with unknown inputs.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper presents a distributed protocol for communication among autonomous underwater vehicles. It is a complementary approach for coordination between the autonomous underwater vehicles. This paper mainly describes different methods for underwater communication. One of the methods is brute force approach in which messages are broadcasted to all the communication nodes, which in turn will broadcast the acknowledgement. Issues relating to this brute force approach are time delay, number of hops, power consumption, message collision and other practical issues. These issues are discussed and solved by proposing a new method to improve efficiency of this proposed approach and its effectiveness in communication among autonomous underwater vehicles.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

The thesis analyses the issues of implementing real-time software systems in industrial applications. The benefit is the development of the Integrated Mega Project Development Model, to improve the effectiveness of planning and timely delivery of software, the quality of the delivered software and reducing problems associated with integrating software systems.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

Each year, large amounts of money and labor are spent on patching the vulnerabilities in operating systems and various popular software to prevent exploitation by worms. Modeling the propagation process can help us to devise effective strategies against those worms' spreading. This paper presents a microcosmic analysis of worm propagation procedures. Our proposed model is different from traditional methods and examines deep inside the propagation procedure among nodes in the network by concentrating on the propagation probability and time delay described by a complex matrix. Moreover, since the analysis gives a microcosmic insight into a worm's propagation, the proposed model can avoid errors that are usually concealed in the traditional macroscopic analytical models. The objectives of this paper are to address three practical aspects of preventing worm propagation: (i) where do we patch? (ii) how many nodes do we need to patch? (iii) when do we patch? We implement a series of experiments to evaluate the effects of each major component in our microcosmic model. Based on the results drawn from the experiments, for high-risk vulnerabilities, it is critical that networks reduce the number of vulnerable nodes to below 80%. We believe our microcosmic model can benefit the security industry by allowing them to save significant money in the deployment of their security patching schemes.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper, a novel robust finite-horizon Kalman filter is developed for discrete linear time-varying systems with missing measurements and normbounded parameter uncertainties. The missing measurements are modelled by a Bernoulli distributed sequence and the system parameter uncertainties are in the state and output matrices. A two stage recursive structure is considered for the Kalman filter and its parameters are determined guaranteeing that the covariances of the state estimation errorsare not more than the known upper bound. Finally, simulation results are presented to illustrate the outperformance of the proposed robust estimator compared with the previous results in the literature.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

In this paper, we derive a new inequality, which encompasses the discrete Jensen inequality. The new inequality is applied to analyze stability of linear discrete systems with an interval time-varying delay and a less conservative stability condition is obtained. Two numerical examples are given to show the effectiveness of the obtained stability condition.

Relevância:

90.00% 90.00%

Publicador:

Resumo:

This paper focuses on designing an adaptive controller for controlling traffic signal timing. Urban traffic is an inevitable part in modern cities and traffic signal controllers are effective tools to control it. In this regard, this paper proposes a distributed neural network (NN) controller for traffic signal timing. This controller applies cuckoo search (CS) optimization methods to find the optimal parameters in design of an adaptive traffic signal timing control system. The evaluation of the performance of the designed controller is done in a multi-intersection traffic network. The developed controller shows a promising improvement in reducing travel delay time compared to traditional fixed-time control systems.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper presents a new method for blind source separation by exploiting phase and frequency redundancy of cyclostationary signals in a complementary way. It requires a weaker separation condition than those methods which only exploit the phase diversity or the frequency diversity of the source signals. The separation criterion is to diagonalize a polynomial matrix whose coefficient matrices consist of the correlation and cyclic correlation matrices, at time delay .TAU. = 0, of multiple measurements. An algorithm is proposed to perform the blind source separation. Computer simulation results illustrate the performance of the new algorithm in comparison with the existing ones.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This paper presents a new approach for blind separation of unknown cyclostationary signals from instantaneous mixtures. The proposed method can perfectly separate the mixed source signals so long as they have either different cyclic frequencies or clock phases. This is a weaker condition than those required by the algorithms. The separation criterion is to diagonalize a polynomial matrix whose coefficient matrices consist of the correlation and cyclic correlation matrices, at time delay τ=0, of multiple measurements.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Wireless sensor networks represent a new generation of real-time embedded systems with significantly different communication constraints from the traditional networked systems. With their development, a new attack called a path-based DoS (PDoS) attack has appeared. In a PDoS attack, an adversary, either inside or outside the network, overwhelms sensor nodes by flooding a multi-hop end-to end communication path with either replayed packets or injected spurious packets. Detection and recovery from PDoS attacks have not been given much attention in the literature. In this article, we propose a solution using mobile agents which can detect PDoS attacks easily and efficiently and recover the compromised nodes.