首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Recoverability of block-sparse signals by convex relaxation methods is considered for the underdetermined linear model. In previous works, some explicit but pessimistic recoverability results which were associated with the dictionary were presented. This paper shows the recoverability of block-sparse signals are associated with the block structure when a random dictionary is given. Several probability inequalities are obtained to show how the recoverability changes along with the block structure parameters, such as the number of nonzero blocks, the block length, the dimension of the measurements and the dimension of the block-sparse representation signal. Also, this paper concludes that if the block-sparse structure can be considered, the recoverability of the signals wil be improved. Numerical examples are given to il ustrate the availability of the presented theoretical results.  相似文献   

2.
This paper deals with the blind separation of nonstation-ary sources and direction-of-arrival (DOA) estimation in the under-determined case, when there are more sources than sensors. We assume the sources to be time-frequency (TF) disjoint to a certain extent. In particular, the number of sources presented at any TF neighborhood is strictly less than that of sensors. We can identify the real number of active sources and achieve separation in any TF neighborhood by the sparse representation method. Compared with the subspace-based algorithm under the same sparseness assumption, which suffers from the extra noise effect since it can-not estimate the true number of active sources, the proposed algorithm can estimate the number of active sources and their cor-responding TF values in any TF neighborhood simultaneously. An-other contribution of this paper is a new estimation procedure for the DOA of sources in the underdetermined case, which combines the TF sparseness of sources and the clustering technique. Sim-ulation results demonstrate the validity and high performance of the proposed algorithm in both blind source separation (BSS) and DOA estimation.  相似文献   

3.
通过对合成孔径雷达(synthetic-aperture-radar,SAR)图像相干斑噪声的特点分析,提出一种基于贝叶斯模型的shearlet域SAR图像去噪方法。首先将变换后的SAR图像在shearlet域进行稀疏表示,得到稀疏系数的分布;其次利用贝叶斯模型进行信号和噪声检测的建模,得到最佳的阈值;然后根据稀疏系数在不同方向上相关性不同的特点,利用自适应加权收缩算法对SAR图像噪声进行平滑处理;最后利用降噪后的高频子图像和低频子图像进行逆shearlet变换,得到SAR重构图像。通过在MSTAR数据库上的实验表明,该算法在滤除相干斑噪声的效果上比其他方法更好,并且不会损失图像的边缘特性。  相似文献   

4.
This paper uses an extensive network approach to "East Turkistan" activities by building both the one-mode and the bipartite networks for these activities.In the one-mode network,centrality analysis and spectrum analysis are used to describe the importance of each vertex.On this basis,two types of core vertices——The center of communities and the intermediary vertices among communities— are distinguished.The weighted extreme optimization(WEO) algorithm is also applied to detect communities in the one-mode network.In the "terrorist-terrorist organization" bipartite network,the authors adopt centrality analysis as well as clustering analysis based on the original bipartite network in order to calculate the importance of each vertex,and apply the edge clustering coefficient algorithm to detect the communities.The comparative and empirical analysis indicates that this research has been proved to be an effective way to identify the core members,key organizations,and communities in the network of "East Turkistan" terrorist activity.The results can provide a scientific basis for the analysis of "East Turkistan" terrorist activity,and thus provide decision support for the real work of "anti-terrorism".  相似文献   

5.
A switching variability index (SVl) constant false alarm rate (CFAR) detector is proposed for improving the detection performance of VI-CFAR detectors in multiple targets backgrounds. When the presence of non-homogeneity in CFAR reference windows is indicated by a VI-CFAR detector, a switching- CFAR detector is introduced to optimize the performance of the VI-CFAR detector in homogeneous, multiple targets and clutter edge backgrounds. The structure and parameters selection method of the SVI-CFAR detector is presented. Comparisons with classic CFAR detectors and recently proposed detectors are also given. Theoretical analysis and simulation results show that SVICFAR detector maintains the good performance of the VI-CFAR detector in homogeneous and clutter edge backgrounds, while greatly improving the capacity of anti-multi targets.  相似文献   

6.
A new iterative algorithm is proposed to reconstruct an unknown sparse signal from a set of projected measurements. Unlike existing greedy pursuit methods which only consider the atoms having the highest correlation with the residual signal, the proposed algorithm not only considers the higher correlation atoms but also reserves the lower correlation atoms with the residual signal. In the lower correlation atoms, only a few are correct which usually impact the reconstructive performance and decide the reconstruction dynamic range of greedy pursuit methods. The others are redundant. In order to avoid redundant atoms impacting the reconstructive accuracy, the Bayesian pursuit algorithm is used to eliminate them. Simulation results show that the proposed algorithm can improve the reconstructive dynamic range and the reconstructive accuracy. Furthermore, better noise immunity compared with the existing greedy pursuit methods can be obtained.  相似文献   

7.
It often happens that at the end of Olympics games the medals won by more than one country are many and close in total number as in the 2008 games where China won 100 medals with many gold ones and the United States won 110 medals but with a lesser number of gold medals. The question is: Although it is often done arbitrarily, is there a way to quantify the values of gold, silver and bronze medals legitimately to resolve this concern? This short exposition shows that there is by using the author's theory for the measurement of intangibles, the Analytic Hierarchy Process.  相似文献   

8.
The asymptotic and stable properties of general stochastic functional differential equations are investigated by the multiple Lyapunov function method, which admits non-negative up-per bounds for the stochastic derivatives of the Lyapunov functions, a theorem for asymptotic properties of the LaSal e-type described by limit sets of the solutions of the equations is obtained. Based on the asymptotic properties to the limit set, a theorem of asymptotic stability of the stochastic functional differential equations is also established, which enables us to construct the Lyapunov functions more easily in application. Particularly, the wel-known classical theorem on stochastic stability is a special case of our result, the operator LV is not required to be negative which is more general to fulfil and the stochastic perturbation plays an important role in it. These show clearly the improvement of the traditional method to find the Lyapunov functions. A numerical simulation example is given to il ustrate the usage of the method.  相似文献   

9.
While it is very reasonable to use a multigraph consisting of multiple edges between vertices to represent various relationships, the multigraph has not drawn much attention in research. To visualize such a multigraph, a clear layout representing a global structure is of great importance, and interactive visual analysis which allows the multiple edges to be adjusted in appropriate ways for detailed presentation is also essential. A novel interactive two-phase approach to visualizing and exploring multigraph is proposed. The approach consists of two phases: the first phase improves the previous popular works on force-directed methods to produce a brief drawing for the aggregation graph of the input multigraph, while the second phase proposes two interactive strategies, the magnifier model and the thematic-oriented subgraph model. The former highlights the internal details of an aggregation edge which is selected interactively by user, and draws the details in a magnifying view by cubic Bezier curves; the latter highlights only the thematic subgraph consisting of the selected multiple edges that the user concerns. The efficiency of the proposed approach is demonstrated with a real-world multigraph dataset and how it is used effectively is discussed for various potential applications.  相似文献   

10.
An adaptive actuator failure compensation scheme is proposed for attitude tracking control of spacecraft with unknown disturbances and uncertain actuator failures. A new feature of this adaptive control scheme is the adaptation of the failure pattern parameter estimates, as well as the failure signal parameter estimates, for direct adaptive actuator failure compensation. Based on an adaptive backstepping control design, the estimates of the disturbance parameters are used to solve the disturbance rejection problem. The unknown disturbances are compensated completely with the stability of the whole closed-loop system. The scheme is not only able to accommodate uncertain actuator failures, but also robust against unknown external disturbances. Simulation results verify the desired adaptive actuator failure compensation performance.  相似文献   

11.
In this paper, an interconnected wave-ODE system with K-V damping in the wave equation and unknown parameters in the ODE is considered. It is found that the spectrum of the system operator is composed of two parts: Point spectrum and continuous spectrum. The continuous spectrum consists of an isolated point 1 1/d, and there are two branches of the asymptotic eigenvalues: The first branch is accumulating towards 1 -2, and the other branch tends to -∞. It is shown that there is a sequence of generalized eigenfunctions, which forms a Riesz basis for the Hilbert state space. As a consequence, the spectrum-determined growth condition and exponential stability of the system are concluded.  相似文献   

12.
The robust bounded flight control scheme is developed for the uncertain longitudinal flight dynamics of the fighter with control input saturation invoking the backstepping technique. To enhance the disturbance rejection ability of the robust flight control for fighters, the sliding mode disturbance observer is designed to estimate the compounded disturbance including the unknown external disturbance and the effect of the control input saturation. Based on the backstepping technique and the compounded disturbance estimated output, the robust bounded flight control scheme is proposed for the fighter with the unknown external disturbance and the control input saturation. The closed-loop system stability under the developed robust bounded flight control scheme is rigorously proved using the Lyapunov method and the uniformly asymptotical convergences of all closed-loop signals are guaranteed. Finally, simulation results are presented to show the effectiveness of the proposed robust bounded flight control scheme for the uncertain longitudinal flight dynamics of the fighter.  相似文献   

13.
The problem of stochastically allocating redundant com- ponents to increase the system lifetime is an important topic of reliability. An optimal redundancy allocation is proposed, which maximizes the expected lifetime of a reliability system with sub- systems consisting of components in parallel. The constraints are minimizing the total resources and the sizes of subsystems. In this system, each switching is independent with each other and works with probability p. Two optimization problems are studied by an incremental algorithm and dynamic programming technique respectively. The incremental algorithm proposed could obtain an approximate optimal solution, and the dynamic programming method could generate the optimal solution,  相似文献   

14.
Spiking neural P systems with anti-spikes (ASN P systems) are variant forms of spiking neural P systems, which are inspired by inhibitory impulses/spikes or inhibitory synapses. The typical feature of ASN P systems is when a neuron contains both spikes and anti-spikes, spikes and anti-spikes wil immediately annihilate each other in a maximal way. In this paper, a restricted variant of ASN P systems, cal ed ASN P systems without anni-hilating priority, is considered, where the annihilating rule is used as the standard rule, i.e., it is not obligatory to use in the neuron associated with both spikes and anti-spikes. If the annihilating rule is used in a neuron, the annihilation wil consume one time unit. As a result, such systems using two categories of spiking rules (identified by (a, a) and (a,a^-)) can achieve Turing completeness as number accepting devices.  相似文献   

15.
Impressive advances in space technology are enabling complex missions, with potentially significant and long term impacts on human life and activities. In the vision of future space exploration, communication links among planets, satel ites, spacecrafts and crewed vehicles wil be designed according to a new paradigm, known as the disruption tolerant networking. In this scenario, space channel peculiarities impose a massive reengineering of many of the protocols usually adopted in terrestrial networks; among them, security solutions are to be deeply reviewed, and tailored to the specific space requirements. Security is to be provided not only to the payload data exchanged on the network, but also to the telecommands sent to a spacecraft, along possibly differentiated paths. Starting from the secure space telecommand design developed by the Consultative Committee for Space Data Systems as a response to agency-based requirements, an adaptive link layer security architecture is proposed to address some of the chal enges for future space networks. Based on the analysis of the communication environment and the error diffusion properties of the authentication algorithms, a suitable mechanism is proposed to classify frame retransmission requests on the basis of the originating event (error or security attack) and reduce the impact of security operations. An adaptive algorithm to optimize the space control protocol, based on estimates of the time varying space channel, is also presented. The simulation results clearly demonstrate that the proposed architecture is feasible and efficient, especially when facing malicious attacks against frame transmission.  相似文献   

16.
The consensus problems of multi-agents with time-varying delays and switching topologies are studied. First, assume that an agent receives state information from its neighbors with fixed communication delays and processes its own state information with time-varying self-delay respectively. The state time-delay feedback is introduced into the existing consensus protocol to begenerate an improved protocol. Then a sufficient condition is derived which can make the system with time-varying self-delays achieve the consensus. On this basis, a specific form of consensus equilibrium influenced by the initial states of agents, time-delays and state feedback intensity is figured out. In addition, the multi-agent consensus is considered with time-varying topologies. Finally, simulations are presented to il ustrate the validity of theoretical results.  相似文献   

17.
This paper generalizes a method of generating shift sequences in the interleaved construc- tion proposed by Gong. With the new shift sequences, some new families of p-ary sequences with desired properties can be obtained. A lower bound on the number of new families of binary sequences is also established.  相似文献   

18.
This paper presents an approach to the challenging is- sue of passive source localization in shallow water using a mobile short horizontal linear array with length less than ten meters. The short array can be conveniently placed on autonomous underwa- ter vehicles and deployed for adaptive spatial sampling. However, the use of such small aperture passive sonar systems makes it difficult to acquire sufficient spatial gain for localizing long-range sources. To meet the requirement, a localization approach that employs matched-field based techniques that enable the short ho- rizontal linear array is used to passively localize acoustic sources in shallow water. Furthermore, the broadband processing and inter-position processing provide robustness against ocean en- vironmental mismatch and enhance the stability of the estimation process. The proposed approach's ability to localize acoustic sources in shallow water at different signal-to-noise ratios is examined through the synthetic test cases where the sources are located at the endfire and some other bearing of the mobile short horizontal linear array. The presented results demonstrate that the positional parameters of the estimated source build up over time as the array moves at a low speed along a straight line at a constant depth.  相似文献   

19.
In a reliability comparative test, the joint censoring model is usually adopted to evaluate the performances of units with the same facility. However, most researchers ignore the pos- sibility that there is more than one factor for the failure when a test unit fails. To solve this problem, we consider a joint Type-II hybrid censoring model for the analysis of exponential competing failure data. Based on the maximum likelihood theory, we compute the maximum likelihood estimators (MLEs) of parameters and then obtain the condition ensuring MLEs existence for every unknown parameter. Then we derive the conditional exact distributions and corresponding moment properties for parameters by the moment generating function (MGF). A Monte-Carlo simulation is conducted to compare the performances of different ways. And finally, we conduct a numerical example to illustrate the proposed method.  相似文献   

20.
In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号