首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 312 毫秒
1.
宽带声传播、匹配场定位、水下环境仿真等技术的发展对水声传播提出了越来越高的要求,如何开发快速准确并与实际海洋环境条件相吻合的三维声传播模型,并充分利用现代计算机技术实现声传播的快速计算已成为水声技术的一个重要研究方向。基于波束位移射线简正波(BDRM)理论,将射线-简正波方法和简正波-抛物方程方法结合起来,建立三维射线-简正波-抛物方程模型,同时为满足三维声场计算的时间需求,设计了射线-简正波-抛物方程模型并行算法,在高性能集群系统上的测试分析结果表明,设计的并行算法具有较高的并行计算效率。  相似文献   

2.
Calibration is a processing procedure for across-track interferometric synthetic aperture radar (InSAR) to achieve an accurate three-dimensional location. A calibration technique, called weighted joint calibration, for the generation of wide-area geocoded digital elevation models (DEMs) is proposed. It cali- brates multiple InSAR scenes simultaneously, and allows reducing the number of required ground control points (GCPs) by using tie points (TPs). This approach may ensure the continuity of three- dimensional location among adjacent scenes, which is necessary for mosaic and fusion of data coming from different scenes. In addition, it introduces weights to calibration to discriminate GCPs and TPs with different coherences and locations. This paper presents the principles and methodology of this weighted joint calibration technique and illustrates its successful application in airborne In- SAR data.  相似文献   

3.
This paper deals with the blind separation of nonstation-ary sources and direction-of-arrival (DOA) estimation in the under-determined case, when there are more sources than sensors. We assume the sources to be time-frequency (TF) disjoint to a certain extent. In particular, the number of sources presented at any TF neighborhood is strictly less than that of sensors. We can identify the real number of active sources and achieve separation in any TF neighborhood by the sparse representation method. Compared with the subspace-based algorithm under the same sparseness assumption, which suffers from the extra noise effect since it can-not estimate the true number of active sources, the proposed algorithm can estimate the number of active sources and their cor-responding TF values in any TF neighborhood simultaneously. An-other contribution of this paper is a new estimation procedure for the DOA of sources in the underdetermined case, which combines the TF sparseness of sources and the clustering technique. Sim-ulation results demonstrate the validity and high performance of the proposed algorithm in both blind source separation (BSS) and DOA estimation.  相似文献   

4.
It often happens that at the end of Olympics games the medals won by more than one country are many and close in total number as in the 2008 games where China won 100 medals with many gold ones and the United States won 110 medals but with a lesser number of gold medals. The question is: Although it is often done arbitrarily, is there a way to quantify the values of gold, silver and bronze medals legitimately to resolve this concern? This short exposition shows that there is by using the author's theory for the measurement of intangibles, the Analytic Hierarchy Process.  相似文献   

5.
The asymptotic and stable properties of general stochastic functional differential equations are investigated by the multiple Lyapunov function method, which admits non-negative up-per bounds for the stochastic derivatives of the Lyapunov functions, a theorem for asymptotic properties of the LaSal e-type described by limit sets of the solutions of the equations is obtained. Based on the asymptotic properties to the limit set, a theorem of asymptotic stability of the stochastic functional differential equations is also established, which enables us to construct the Lyapunov functions more easily in application. Particularly, the wel-known classical theorem on stochastic stability is a special case of our result, the operator LV is not required to be negative which is more general to fulfil and the stochastic perturbation plays an important role in it. These show clearly the improvement of the traditional method to find the Lyapunov functions. A numerical simulation example is given to il ustrate the usage of the method.  相似文献   

6.
In this paper, an interconnected wave-ODE system with K-V damping in the wave equation and unknown parameters in the ODE is considered. It is found that the spectrum of the system operator is composed of two parts: Point spectrum and continuous spectrum. The continuous spectrum consists of an isolated point 1 1/d, and there are two branches of the asymptotic eigenvalues: The first branch is accumulating towards 1 -2, and the other branch tends to -∞. It is shown that there is a sequence of generalized eigenfunctions, which forms a Riesz basis for the Hilbert state space. As a consequence, the spectrum-determined growth condition and exponential stability of the system are concluded.  相似文献   

7.
The robust bounded flight control scheme is developed for the uncertain longitudinal flight dynamics of the fighter with control input saturation invoking the backstepping technique. To enhance the disturbance rejection ability of the robust flight control for fighters, the sliding mode disturbance observer is designed to estimate the compounded disturbance including the unknown external disturbance and the effect of the control input saturation. Based on the backstepping technique and the compounded disturbance estimated output, the robust bounded flight control scheme is proposed for the fighter with the unknown external disturbance and the control input saturation. The closed-loop system stability under the developed robust bounded flight control scheme is rigorously proved using the Lyapunov method and the uniformly asymptotical convergences of all closed-loop signals are guaranteed. Finally, simulation results are presented to show the effectiveness of the proposed robust bounded flight control scheme for the uncertain longitudinal flight dynamics of the fighter.  相似文献   

8.
Spiking neural P systems with anti-spikes (ASN P systems) are variant forms of spiking neural P systems, which are inspired by inhibitory impulses/spikes or inhibitory synapses. The typical feature of ASN P systems is when a neuron contains both spikes and anti-spikes, spikes and anti-spikes wil immediately annihilate each other in a maximal way. In this paper, a restricted variant of ASN P systems, cal ed ASN P systems without anni-hilating priority, is considered, where the annihilating rule is used as the standard rule, i.e., it is not obligatory to use in the neuron associated with both spikes and anti-spikes. If the annihilating rule is used in a neuron, the annihilation wil consume one time unit. As a result, such systems using two categories of spiking rules (identified by (a, a) and (a,a^-)) can achieve Turing completeness as number accepting devices.  相似文献   

9.
The consensus problems of multi-agents with time-varying delays and switching topologies are studied. First, assume that an agent receives state information from its neighbors with fixed communication delays and processes its own state information with time-varying self-delay respectively. The state time-delay feedback is introduced into the existing consensus protocol to begenerate an improved protocol. Then a sufficient condition is derived which can make the system with time-varying self-delays achieve the consensus. On this basis, a specific form of consensus equilibrium influenced by the initial states of agents, time-delays and state feedback intensity is figured out. In addition, the multi-agent consensus is considered with time-varying topologies. Finally, simulations are presented to il ustrate the validity of theoretical results.  相似文献   

10.
This paper generalizes a method of generating shift sequences in the interleaved construc- tion proposed by Gong. With the new shift sequences, some new families of p-ary sequences with desired properties can be obtained. A lower bound on the number of new families of binary sequences is also established.  相似文献   

11.
In the field of supercomputing, one key issue for scal-able shared-memory multiprocessors is the design of the directory which denotes the sharing state for a cache block. A good direc-tory design intends to achieve three key attributes: reasonable memory overhead, sharer position precision and implementation complexity. However, researchers often face the problem that gain-ing one attribute may result in losing another. The paper proposes an elastic pointer directory (EPD) structure based on the analysis of shared-memory applications, taking the fact that the number of sharers for each directory entry is typical y smal . Analysis re-sults show that for 4 096 nodes, the ratio of memory overhead to the ful-map directory is 2.7%. Theoretical analysis and cycle-accurate execution-driven simulations on a 16 and 64-node cache coherence non uniform memory access (CC-NUMA) multiproces-sor show that the corresponding pointer overflow probability is reduced significantly. The performance is observed to be better than that of a limited pointers directory and almost identical to the ful-map directory, except for the slight implementation complex-ity. Using the directory cache to explore directory access locality is also studied. The experimental result shows that this is a promis-ing approach to be used in the state-of-the-art high performance computing domain.  相似文献   

12.
In a reliability comparative test, the joint censoring model is usually adopted to evaluate the performances of units with the same facility. However, most researchers ignore the pos- sibility that there is more than one factor for the failure when a test unit fails. To solve this problem, we consider a joint Type-II hybrid censoring model for the analysis of exponential competing failure data. Based on the maximum likelihood theory, we compute the maximum likelihood estimators (MLEs) of parameters and then obtain the condition ensuring MLEs existence for every unknown parameter. Then we derive the conditional exact distributions and corresponding moment properties for parameters by the moment generating function (MGF). A Monte-Carlo simulation is conducted to compare the performances of different ways. And finally, we conduct a numerical example to illustrate the proposed method.  相似文献   

13.
This paper investigates the structures and properties of one-Lee weight codes and two-Lee weight projective codes over Z4.The authors first give the Pless identities on the Lee weight of linear codes over Z4.Then the authors study the necessary conditions for linear codes to have one-Lee weight and two-Lee projective weight respectively,the construction methods of one-Lee weight and two-Lee weight projective codes over Z4 are also given.Finally,the authors recall the weight-preserving Gray map from(Z4n,Lee weight)to(F2(2n),Hamming weight),and produce a family of binary optimal oneweight linear codes and a family of optimal binary two-weight projective linear codes,which reach the Plotkin bound and the Griesmer bound.  相似文献   

14.
A hybrid method for synthesizing antenna's three dimensional (3D) pattern is proposed to obtain the low sidelobe feature of truncated cone conformal phased arrays. In this method, the elements of truncated cone conformal phased arrays are projected to the tangent plane in one generatrix of the truncated cone. Then two dimensional (2D) Chebyshev amplitude distribution optimization is respectively used in two mutual vertical directions of the tangent plane. According to the location of the elements, the excitation current amplitude distribution of each element on the conformal structure is derived reversely, then the excitation current amplitude is further optimized by using the genetic algorithm (GA). A truncated cone problem with 8x8 elements on it, and a 3D pattern desired side lobe level (SLL) up to 35 dB, is studied. By using the hybrid method, the optimal goal is accomplished with acceptable CPU time, which indicates that this hybrid method for the low sidelobe synthesis is feasible.  相似文献   

15.
Analysis and design techniques for cooperative flocking of nonholonomic multi-robot systems with connectivity maintenance on directed graphs are presented. First, a set of bounded and smoothly distributed control protocols are devised via carefully designing a class of bounded artificial potential fields (APF) which could guarantee the connectivity maintenance, col ision avoidance and distance stabilization simultaneously during the system evolution. The connectivity of the underlying network can be preserved, and the desired stable flocking behavior can be achieved provided that the initial communication topology is strongly connected rather than undirected or balanced, which relaxes the constraints for group topology and extends the previous work to more generalized directed graphs. Furthermore, the proposed control algorithm is extended to solve the flocking problem with a virtual leader. In this case, it is shown that al robots can asymptotically move with the desired velocity and orientation even if there is only one informed robot in the team. Finally, nontrivial simulations and experiments are conducted to verify the effectiveness of the proposed algorithm.  相似文献   

16.
An algorithm based on eigenanalysis technique and Walsh-Hadamard transform (WriT) is proposed. The algorithm contains two steps. Firstly, the received sequence is divided into temporal windows, and a covariance matrix is computed. The linear feedback shift register (LFSR) sequence is reconstructed from the first eigenvector of this matrix. Secondly, equations according to the recovered LFSR sequence are constructed, and the Walsh spectrum corresponding to the equations is computed. The feedback polynomial of LFSR is estimated from the Walsh spectrum. The validity of the algorithm is verified by the simulation result. Finally, case studies are presented to illustrate the performance of the blind reconstruction method.  相似文献   

17.
This paper investigates a distributed coordination control scheme using an adaptive terminal sliding mode for formation flying spacecraft with coupled attitude and translational dynamics. In order to overcome the singularity of the traditional fast terminal sliding manifold, a novel fast terminal sliding manifold is given. And then, based on the adaptive control method, a continuous robust coordinated controller is designed to compensate external disturbances and to alleviate the chattering phenomenon. The theoretical analysis shows that the coordinated controller can guarantee the finite-time stability of the overall closed-loop system through local information exchange, and numerical simulations also demonstrate its effectiveness.  相似文献   

18.
This paper considers the additive hazards iliary covariate information to improve the efficiency regression analysis by utilizing continuous aux- of the statistical inference when the primary covariate is ascertained only for a randomly selected subsample. The authors construct a martingale based estimating equation for the regression parameter and establish the asymptotic consistency and normality of the resultant estimators. Simulation study shows that the proposed method can greatly improve the efficiency compared with the estimator which discards the auxiliary covariate information in a variety of settings. A real example is also provided as an illustration.  相似文献   

19.
DCT domain filtering method for multi-antenna code acquisition   总被引:4,自引:0,他引:4       下载免费PDF全文
For global navigation satellite system (GNSS) signals in Gaussian and Rayleigh fading channel, a novel signal detection algorithm is proposed. Under the low frequency uncertainty case, after performing discrete cosine transform (DCT) to the outputs of the partial matched filter (PMF) for every antenna, the high order com- ponents in the transforming domain will be filtered, then the equalgain (EG) combination for the inverse discrete cosine transform (IDCT) reconstructed signal would be done subsequently. Thus, due to the different frequency distribution characteristics between the noise and signals, after EG combination, the energy of signals has almost no loss and the noise energy is greatly reduced. The theoretical analysis and simulation results show that the detection algorithm can effectively improve the signal-to-noise ratio of the captured signal and increase the probability of detection under the same false alarm probability. In addition, it should be pointed out that this method can also be applied to Rayleigh fading channels with moving antenna.  相似文献   

20.
An opportunistic maintenance model is presented for a continuously deteriorating series system with economical de-pendence. The system consists of two kinds of units, which are respectively subjected to the deterioration failure described by Gamma process and the random failure described by Poisson process. A two-level opportunistic policy defined by three decision parameters is proposed to coordinate the different maintenance actions and minimize the long-run maintenance cost rate of the system. A computable expression of the average cost rate is established by using the renewal property of the stochastic process of the maintained system state. The optimal values of three deci- sion parameters are derived by an iteration approach based on the characteristic of Gamma process. The behavior of the proposed policy is illustrated through a numerical experiment. Comparative study with the widely used corrective maintenance policy demonstrates the advantage of the proposed opportunistic maintenance method in significantly reducing the maintenance cost. Simultane- ously, the applicable area of this opportunistic model is discussed by the sensitivity analysis of the set-up cost and random failure rate.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号