首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 243 毫秒
1.
1.IntroductionInstreamciphers,booleanfunctionf:Z7~ZZhasbeenusedtoproducekeysequences.Butwhichkindofbooleanfunctionisbettertogeneratekeysequencesisnotcertain,andweshouldconsideritaccordingtodifferentcriteria.In[1],C.Mitchellgavesomecriteriaandenumeratedthe…  相似文献   

2.
基于特殊阵列递归构造Bent互补函数偶族   总被引:2,自引:0,他引:2  
单值并元相关函数互补码偶是一类并元自相关函数为脉冲函数的一族码偶。这样的码偶具有能将码偶中的一方码与另一方码的并元移位区分开来的特性。为了进一步研究单值并元相关函数互补码偶,并为其研究提供有效的数学工具,提出了一类新的类Bent函数———Bent互补函数偶族。进一步研究了Bent互补函数偶族的构造方法,给出了应用列正交阵列和列并元最佳阵列偶由低维Bent互补函数偶族递归构造高维Bent互补函数偶族的方法。应用Bent互补函数偶族与单值并元相关函数互补码偶的等价关系,相应地可以构造出许多单值并元相关函数互补码偶。  相似文献   

3.
变时滞广义神经网络的指数稳定性   总被引:1,自引:1,他引:1  
讨论具有可变时滞的Cohen Grossberg广义神经网络平衡态的稳定性问题。以推广的Halanay微分不等式为工具,通过构造合适的Lyapunov函数,结合Dini导数和不等式技巧,对具有可变时滞(适合于任何时滞有界情况)的广义神经网络平衡态的指数稳定性进行分析。在适当的假设条件下,得到了系统渐近指数稳定的几个充分性判据,与此同时也给出了相应的Lyapunov指数。  相似文献   

4.
Tu and Deng proposed a class of bent functions which are of optimal algebraic immunity under the assumption of a combinatorial conjecture.In this paper,the authors compute the dual of the Tu-Deng functions and then show that they are still of optimal algebraic immunity under the assumption of the same conjecture.For another class of Boolean functions constructed by Tang,et al.which are of optimal algebraic immunity with similar forms to Tu-Deng functions,the authors show that they are not bent functions by using some basic properties of binary complete Kloosterman sums.  相似文献   

5.
<正> This paper investigates the stability of impulsive linear hybrid systems with time delay.And a number of delay-independent/delay-dependent stability criteria are obtained by using Lyapunovfunctions or Lyapunov functionals.Two examples are also presented to illustrate the effectiveness ofthe obtained results or to compare with the existing results.  相似文献   

6.
<正>In this paper,we investigate the pth moment uniformly asymptotic stability of impulsive stochastic functional differential systems by extending some Razumikhin-type theorems.Based on the Lyapunov functions and Razumikhin techniques,some criteria are established and their applications to impulsive stochastic delay systems are proposed.An illustrative example shows the effectiveness of our results.  相似文献   

7.
非线性微分-代数系统稳定性的几个判据   总被引:2,自引:0,他引:2  
研究非线性微分-代数系统的稳定性问题,给出利用非线性函数的偏导数矩阵判别非线性微分-代数系统平衡态稳定和不稳定的几个判据,所得结果形式简洁,易于应用.最后利用例子说明所得判据的有效性  相似文献   

8.
A method of minimizing rankings inconsistency is proposed for a decision-making problem with rankings of alternatives given by multiple decision makers according to multiple criteria. For each criteria, at first, the total inconsistency between the rankings of all alternatives for the group and the ones for every decision maker is defined after the decision maker weights in respect to the criteria are considered. Similarly, the otal nconsistency between their final rankings for the group and the ones under every criteria is determined after the criteria weights are taken into account. Then two nonlinear integer programming models minimizing respectively the two total inconsistencies above are developed and then transformed to two dynamic programming models to obtain separately the rankings of all alternatives for the group with respect to each criteria and their final rankings. A supplier selection case illustrated the proposed method, and some discussions on the results verified its effectiveness. This work develops a new measurement of ordinal preferences’ inconsistency in multi-criteria group decision-making (MCGDM) and extends the cook-seiford social selection function to MCGDM considering weights of criteria and decision makers and can obtain unique ranking result.  相似文献   

9.
SomeTechniquesforSolvingOrdinaryDifferentialEquationswithDiscontinuitiesinReal-timeSimulation¥XieYajun;LiuDegui&LiBohu(Beijin...  相似文献   

10.
1.INTRODUCTION Filteringisaveryimportantissueinsystemsdiagno sis,surveillanceandcontrol.Byfiltering,wereferto theproblemwhichamountstoextracttheinformation fromthemeasuredoutputtoprovideanestimateof thestate(oralinearcombinationofthestate).Clas sicalworksinthisdomainaretheonesofKalmanin thestochasticframe work[1].Inthecasewherethere existsuncertaintyinthemodelandinsufficientstatis ticalinformationaboutthenoiseinput,theKalman filteringschemeisnolongerapplicable.Therefore, validstrategi…  相似文献   

11.
Based on the results of (Wang 2001), we give some applications of division problem in spaces of entirefunctions of finite type. Especially, when ρ=1 and H is the support functions of a bounded convex domainof C~N, our theorems extend the results of(Krivosheev 1991)and(Lelong 1986).  相似文献   

12.
用遗传程序设计实现复杂函数的自动建模   总被引:25,自引:7,他引:18  
采用遗传程序设计的方法实现复杂函数的自动建模,程序中用树的分层结构表示复杂函数,并设计了相应的遗传算子(包括杂交算子和变异算子)以及停机条件。实例测试的结果表明采用遗传程序设计的方法得到的模型比传统的方法得到的模型要好,甚至优于专家设计的一些模型。  相似文献   

13.
This paper considers the drive-response synchronization in finite-time and fixed-time of inertial neural networks with time-varying and distributed delays(mixed delays). First, by constructing a proper variable substitution, the original inertial neural networks can be rewritten as a first-order differential system. Second, by constructing Lyapunov functions and using differential inequalities,some new and effective criteria are obtained for ensuring the finite-time synchronization. Finally, three numerical examples are also given at the end of this paper to show the effectiveness of the results.  相似文献   

14.
一类遗传退火算法的函数优化性能分析   总被引:2,自引:0,他引:2  
蓝海  王雄  王凌 《系统仿真学报》2001,13(Z1):111-113
针对复杂函数的最优化的遗传退火算法,此文提出了一种基于邻域函数的尺度参数自寻优和多操作的基于概率接受思想的变异操作及竞争生存的种群数量控制策略的改进遗传退火算法.基于典型算例的仿真结果验证了本文算法对高维复杂函数最优化的有效性和高效性,其性能明显优于传统遗传退火算法、改进的进化规划方法以及遗传-ALOPEX算法.  相似文献   

15.
基于属性价值函数估计的不确定多属性决策方法   总被引:1,自引:0,他引:1  
针对属性权重为实数,且权重信息完全未知的不确定多属性决策问题,提出了一种基于属性价值函数估计的决策分析方法。首先,对多属性效用函数和价值函数进行了分析;然后,采用曲线拟合的方法确定属性价值函数的近似表达式,计算决策方案各属性的价值函数值,根据价值函数的可加性确定各方案的价值函数值,以此对方案进行排序与择优。最后给出一个算例,验证了所提方法的有效性。  相似文献   

16.
在加强型哈·多经济增长模型、罗伯特投资函数以及博西和金亚舟博士的工作基础上 ,分析了影响经济增长的因素 ,构造了 IB模型 ( Investment Banking Function Model) ,并对模型进行求解和处理 ,从而得到了较为简洁的数理关系和相应的结论 .  相似文献   

17.
An approach to identification of linear continuous-time system is studied with modulating functions. Based on wavelet analysis theory, the multi-resolution modulating functions are designed, and the corresponding filters have been analyzed. Using linear modulating filters, we can obtain an identification model that is parameterized directly in continuous-time model parameters. By applying the results from discrete-time model identification to the obtained identification model, a continuous-time estimation method is developed. Considering the accuracy of parameter estimates, an instrumental variable (Ⅳ) method is proposed, and the design of modulating integral filter is discussed. The relationship between the accuracy of identification and the parameter of modulating filter is investigated, and some points about designing Gaussian wavelet modulating function are outlined. Finally, a simulation study is also included to verify the theoretical results.  相似文献   

18.
1 Introductionln 1979, China initiated its "reform and open policy'. Since then China'S economy hasgradually shifted from 'Central planning" to 'socialist marketn, and has achieved the fastesteconomic growth in the world. Mirroring such change, Chinese government hasendeavored to use more market instruments to regulate the economy instead of theadministrative tools to Hirect" the economy as before. ln 1984, the Chinese governmentestablished the People'S Bank of China (PBC) as the first …  相似文献   

19.
非线性时变系统的部分指数稳定性分析   总被引:1,自引:0,他引:1  
讨论了非线性时变系统平凡解的部分指数稳定性和全局部分指数稳定性。分别利用数量与向量Lyapunov函数并结合数量与向量比较原理,得到了保证系统平凡解部分指数稳定和全局部分指数稳定的一系列充分条件。作为特殊情形,对于一类定常拟线性系统,在一定的条件下,若其对应的线性系统的平凡解是部分渐近稳定的,利用二次型Lyapunov函数得到了保证拟线性系统的平凡解是全局部分指数稳定的一个代数判据,这些结果在实际应用中具有一定的指导意义。最后用两个数值例子对所得主要结果加以阐明。  相似文献   

20.
Most cipher systems designed thus far are binary-valued or integer-valued cipher systems. Their security relies on the assumption that one-way functions exist. Though the existence of one-way functions has not been proved yet, most cryptographic researchers believe that one-way functions exist. In addition, many candidates for one-way functions have been proposed. Therefore, the key step for developing real-valued cipher systems is to define real one-way functions and to propose candidates for them. In this paper, based on computational complexity theory over the real field, we give two definitions of real one-way functions; one is for digital one-way functions and the other is for general one-way functions. Candidates for these two classes of one-way functions are also proposed. Moreover, we present two examples to demonstrate that the candidates for both digital one-way functions and general one-way functions can be applied to construct secure real-valued cipher systems.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号