首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 523 毫秒
1.
The finite horizon H 2/H control problem of mean-field type for discrete-time systems is considered in this paper. Firstly, the authors derive a mean-field stochastic bounded real lemma (SBRL). Secondly, a sufficient condition for the solvability of discrete-time mean-field stochastic linearquadratic (LQ) optimal control is presented. Thirdly, based on SBRL and LQ results, this paper establishes a sufficient condition for the existence of discrete-time stochastic H 2/H control of meanfield type via the solvability of coupled matrix-valued equations.  相似文献   

2.
This paper is concerned with the H control problem for a class of nonlinear stochastic Markov jump systems with time-delay and system state-, control input- and external disturbancedependent noise. Firstly, by solving a set of Hamilton-Jacobi inequalities (HJIs), the exponential mean square H controller design of delayed nonlinear stochastic Markov systems is presented. Secondly, by using fuzzy T-S model approach, the H controller can be designed via solving a set of linear matrix inequalities (LMIs) instead of HJIs. Finally, two numerical examples are provided to show the effectiveness of the proposed design methods.  相似文献   

3.
This paper considers the Rosenau equation with a moving control?t u + ?_t?_x~4 u + ?_xu + u?x u = a(x + ct)h(x, t), c = 0, x ∈ T = R/(2πZ), t 0.The authors prove that the Rosenau equation with a moving control is locally exact controllable in Hs(T) with s ≥ 0 and globally exponential stable in H~s(T) with s ≥ 2. The two results nontrivially extend the work of(Rosier L and Zhang B Y, 2013) from the BBM equation to the Rosenau equation.  相似文献   

4.
The problem of navigation for the distributed satellites system using relative range measurements is investigated. Firstly, observability for every participating satellites is analyzed based on the nonlinear Keplerian model containing J2 perturbation and the nonlinear measurements. It is proven that the minimum number of tracking satellites to assure the observability of the distributed satellites system is three. Additionally, the analysis shows that the J2 perturbation and the nonlinearity make little contribution to improve the observability for the navigation. Then, a quasi-consistent extended Kalman filter based navigation algorithm is proposed, which is quasi-consistent and can provide an online evaluation of the navigation precision. The simulation illustrates the feasibility and effectiveness of the proposed navigation algorithm for the distributed satellites system.  相似文献   

5.
The authors establish weighted L2-estimates of solutions for the damped wave equations with variable coefficients u tt ? divA(x)?u+au t = 0 in ? n under the assumption a(x) ≥ a0[1+ρ(x)]?l, where a0 > 0, l < 1, ρ(x) is the distance function of the metric g = A?1(x) on ? n . The authors show that these weighted L2-estimates are closely related to the geometrical properties of the metric g = A?1(x).  相似文献   

6.
The weight hierarchy of a linear [n; k; q] code C over GF(q) is the sequence (d 1, d 2, ···, d k ) where d r is the smallest support of any r-dimensional subcode of C. “Determining all possible weight hierarchies of general linear codes” is a basic theoretical issue and has important scientific significance in communication system. However, it is impossible for q-ary linear codes of dimension k when q and k are slightly larger, then a reasonable formulation of the problem is modified as: “Determine almost all weight hierarchies of general q-ary linear codes of dimension k”. In this paper, based on the finite projective geometry method, the authors study q-ary linear codes of dimension 5 in class IV, and find new necessary conditions of their weight hierarchies, and classify their weight hierarchies into 6 subclasses. The authors also develop and improve the method of the subspace set, thus determine almost all weight hierarchies of 5-dimensional linear codes in class IV. It opens the way to determine the weight hierarchies of the rest two of 5-dimensional codes (classes III and VI), and break through the difficulties. Furthermore, the new necessary conditions show that original necessary conditions of the weight hierarchies of k-dimensional codes were not enough (not most tight nor best), so, it is important to excogitate further new necessary conditions for attacking and solving the k-dimensional problem.  相似文献   

7.
This paper is devoted to the construction of one-Lee weight codes and two-Lee weight codes over F p + vF p (v 2 = v) with type \({p^{2{k_1}}}{p^{{k_2}}}{p^{{k_3}}}\) based on two different distance-preserving Gray maps from ((F p + vF p ) n , Lee weight) to (F p 2n , Hamming weight), where p is a prime. Moreover, the authors prove that the obtained two-Lee weight codes are projective only when p = 2.  相似文献   

8.
This paper presents a new algorithm for computing the extended Hensel construction(EHC) of multivariate polynomials in main variable x and sub-variables u_1, u_2, ···, u_m over a number field K. This algorithm first constructs a set by using the resultant of two initial coprime factors w.r.t. x, and then obtains the Hensel factors by comparing the coefficients of x~i on both sides of an equation. Since the Hensel factors are polynomials of the main variable with coefficients in fraction field K(u_1, u_2, ···, u_m), the computation cost of handling rational functions can be high. Therefore,the authors use a method which multiplies resultant and removes the denominators of the rational functions. Unlike previously-developed algorithms that use interpolation functions or Gr?bner basis, the algorithm relies little on polynomial division, and avoids multiplying by different factors when removing the denominators of Hensel factors. All algorithms are implemented using Magma, a computational algebra system and experiments indicate that our algorithm is more efficient.  相似文献   

9.
This paper firstly gives some necessary conditions on one-Gray weight linear codes. And then we use these results to construct several classes of one-Gray weight linear codes over ?4+u?4(u 2 = u) with type \({16^{{k_1}}}{8^{{k_2}}}{8^{{k_3}}}{4^{{k_4}}}{4^{{k_5}}}{4^{{k_6}}}{2^{{k_7}}}{2^{{k_8}}}\) based on a distance-preserving Gray map from (?4 + u?4) n to ? 4 2n . Secondly, the authors use the similar approach to do works on two-Gray (projective) weight linear codes. Finally, some examples are given to illustrate the construction methods.  相似文献   

10.
This paper considers partial function linear models of the form Y =∫X(t)β(t)dt + g(T)with Y measured with error. The authors propose an estimation procedure when the basis functions are data driven, such as with functional principal components. Estimators of β(t) and g(t) with the primary data and validation data are presented and some asymptotic results are given. Finite sample properties are investigated through some simulation study and a real data application.  相似文献   

11.
By constructing a Gray map, a class of constacyclic codes over ring R = R+vR is studied. Using cyclic codes and negacyclic codes of length p s over ring R, the structure of (1?2v)-constacyclic codes and dual codes of length p s over ring R are given, the Gray images of (1 ? 2v)-constacyclic codes in a particular case are also studied. It is shown that linear codes of length p s over ring R are (1?2v)-constacyclic codes if and only if their Gray images are distance-invariant cyclic codes of length 2p s over ring R.  相似文献   

12.
The trace inverse functions Tr(λx~(-1)) over the finite field F_(2~n) are a class of very important Boolean functions and are used in many stream ciphers such as SFINKS,RAKAPOSHI,the simple counter stream cipher(SCSC) presented by Si W and Ding C(2012),etc.In order to evaluate the security of those ciphers in resistance to(fast) algebraic attacks,the authors need to characterize algebraic properties of Tr(λx~(-1)).However,currently only some bounds on algebraic immunity of Tr(λx~(-1)) are given in the public literature,for example,the NGG upper bound and the Bayev lower bound,etc.This paper gives the exact value of the algebraic immunity of Tr(λx~(-1)) over F_(2~n),that is,AI(Tr(λx~(-1))) =[2n~(1/2)]- 2,where n ≥ 2,A ∈ F_(2~n) and λ≠ 0,which shows that Dalai's conjecture on the algebraic immunity of Tr(λx~(-1)) is correct.What is more,the authors demonstrate some weak properties of Tr(λx~(-1)) against fast algebraic attacks.  相似文献   

13.
Generalized B-splines have been employed as geometric modeling and numerical simulation tools for isogeometric analysis(IGA for short). However, the previous models used in IGA,such as trigonometric generalized B-splines or hyperbolic generalized B-splines, are not the unified mathematical representation of conics and polynomial parametric curves/surfaces. In this paper,a unified approach to construct the generalized non-uniform B-splines over the space spanned by{α(t), β(t), ξ(t), η(t), 1, t, ···, t~(n-4)} is proposed, and the corresponding isogeometric analysis framework for PDE solving is also studied. Compared with the NURBS-IGA method, the proposed frameworks have several advantages such as high accuracy, easy-to-compute derivatives and integrals due to the non-rational form. Furthermore, with the proposed spline models, isogeometric analysis can be performed on the computational domain bounded by transcendental curves/surfaces, such as the involute of circle, the helix/helicoid, the catenary/catenoid and the cycloid. Several numerical examples for isogeometric heat conduction problems are presented to show the effectiveness of the proposed methods.  相似文献   

14.
Linear mixed effect models with skew-normal errors and distribution-free random effects are considered. The ANOVA-type F-tests are proposed to test the significance of random effects and the hypothesis on fixed effects of interest, respectively. Both tests are proved to be exact F-tests under this model, and the exact confidence interval for fixed effects of interest is derived. Simulation results are given to study the powers of ANOVA-type tests.  相似文献   

15.
This paper deduces the structure of LCD negacyclic codes over the finite field Fq, where q is an odd prime power. Based on the study of q-cyclotomic cosets modulo 2 n, the authors obtain the parameters of LCD negacyclic codes of lengths n =(q+1)/2,(q~m-1)/2(q-1)and q~(t·2~τ)-1/2(q~t +1), respectively. And many optimal codes are given. Moreover, the authors research two special classes of MDS LCD negacyclic codes of length n |(q-1)/2 and n |(q+1)2, respectively.  相似文献   

16.
Along with the rapid development of economics and enhancement of industrialization, the power demand keeps rising and frequently creates mismatch between demand and supply in electricity. This provides miscellaneous energy buy-back programs with great opportunities. Such programs, when activated, offer certain amount of financial compensations to participants for reducing their energy consumption during peak time. They aim at encouraging participants to shift their electricity usage from peak to non-peak time, and thereby release the demand pressure during peak time. This paper considers a periodic-review joint pricing and inventory decision model under an energy buy-back program over finite planning horizons, in which the compensation levels, setup cost and additive random demand function are incorporated. The objective is to maximize a manufacturer’s expected total profit. By using Veinott’s conditions, it is shown that the manufacturer’s optimal decision is a state dependent (s, S, P) policy under a peak market condition, or partly an (s, S, A, P) policy under the normal market condition.  相似文献   

17.
This study provides a framework of target costing to extend its original scope when the underlying distribution is non-normal. The new specification limits can be derived by listening to the market price from Taguchi loss function. Later, the new specification limits can be linked through the non-normality-based C^^pk value along with non-normality-based X^^-Rcontrol charts to derive goal control limits. Moreover, an example is provided to illustrate the usefulness of the proposed framework of target costing by relentlessly reducing cost and improving product quality to gain competitiveness in the marketplace.  相似文献   

18.
For the two-parameter inverse Gaussian distribution denoted by I G(μ,λ),the authors employ a linear Bayes procedure to estimate the parameters μ and λ.The superiority of the proposed linear Bayes estimator(LBE) over both the classical UMVUE and the maximum likelihood estimator(MLE) is established in terms of the mean squared error matrix(MSEM) criterion.Compared with the usual Bayes estimator,which is obtained by an MCMC method,the proposed LBE is simple and easy to use.Some numerical results are presented to verify that the LBE performs well.  相似文献   

19.
Reliability is a desirable performance indicator of many real-world systems to measure the quality level. One general method for evaluating multi-state reliability is using d-minimal paths (d-MPs). However, being an NP-hard problem, searching for all d-MPs is a rather challenging task. This paper proposes an improved algorithm to solve the d-MP problem. To reduce the search space of d-MPs, a concept of lower capacity bound is introduced into the d-MP problem, and an effective technique is developed to find lower capacity bounds. Meanwhile, the fast enumeration method which is a recent improvement to the traditional enumeration method is employed to solve d-MPs. In addition, by introducing the operation of transforming undirected edges into directed edges, the proposed algorithm is applicable to solving both directed networks and undirected networks. Through numerical experiments, it is found that the proposed algorithm holds a distinct advantage over the existing methods in solving all d-MPs.  相似文献   

20.
This paper addresses a dynamic lot sizing problem with bounded inventory and stockout where both no backlogging and backlogging allowed cases are considered. The stockout option means that there is outsourcing in a period only when the inventory level at that period is non-positive. The production capacity is unlimited and production cost functions are linear but with fixed charges. The problem is that of satisfying all demands in the planning horizon at minimal total cost. We show that the no backlogging case can be solved in ) O(T 2) time with general concave inventory holding and outsourcing cost functions where T is the length of the planning horizon. The complexity can be reduced to O(T) when the inventory holding cost functions are also linear and have some realistic properties, even if the outsourcing cost functions remain general concave functions. When the inventory holding and outsourcing cost functions are linear, the backlogging case can be solved in O(T 3logT) time whether the outsourcing level at each period is bounded by the sum of the demand of that period and backlogging level from previous periods, or only by the demand of that period.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号