虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

MODEL

  • 通过提高保证成本的状态延迟控制和量子自适应控制的一台四轮直升机的控制策略

    Improved guaranteed cost control and quantum adaptive control are developed in this study for a quadrotor helicopter with state delay and actuator faults. Improved guaranteed cost control is designed to eliminate disturbance effects and guarantee the robust stability of a quadrotor helicopter with state delay. The inapplicability of guaranteed cost control to the quadrotor linear MODEL is addressed by combining guaranteed cost control with a MODEL reference linear quadratic regulator. In the event of actuator faults, quadrotor tracking performance is maintained through quantum adaptive control. Finally, the availability of the proposed scheme is verified through numerical simulation

    标签: Control Helicopter Guaranteed Quadrotor Adaptive Strategy Improved Quantum Delay State

    上传时间: 2017-07-15

    上传用户:bingzi_ml

  • MATLAB Managing MODEL Based Design

    MATLAB官方教材,关于模型设计和模型仿真

    标签: Managing MATLAB Design Based MODEL

    上传时间: 2017-08-13

    上传用户:HUSTomato

  • 基于频率插值的4.0kbps 语音编码器的性能和设计(英文)

    The 4.0 kbit/s speech codec described in this paper is based on a Frequency Domain Interpolative (FDI) coding technique, which belongs to the class of prototype waveform Interpolation (PWI) coding techniques. The codec also has an integrated voice activity detector (VAD) and a noise reduction capability. The input signal is subjected to LPC analysis and the prediction residual is separated into a slowly evolving waveform (SEW) and a rapidly evolving waveform (REW) components. The SEW magnitude component is quantized using a hierarchical predictive vector quantization approach. The REW magnitude is quantized using a gain and a sub-band based shape. SEW and REW phases are derived at the decoder using a phase MODEL, based on a transmitted measure of voice periodicity. The spectral (LSP) parameters are quantized using a combination of scalar and vector quantizers. The 4.0 kbits/s coder has an algorithmic delay of 60 ms and an estimated floating point complexity of 21.5 MIPS. The performance of this coder has been evaluated using in-house MOS tests under various conditions such as background noise. channel errors, self-tandem. and DTX mode of operation, and has been shown to be statistically equivalent to ITU-T (3.729 8 kbps codec across all conditions tested.

    标签: frequency-domain interpolation performance Design kbit_s speech coder based and of

    上传时间: 2018-04-08

    上传用户:kilohorse

  • LibSVM

    Libsvm is a simple, easy-to-use, and efficient software for SVM classification and regression. It solves C-SVM classification, nu-SVM classification, one-class-SVM, epsilon-SVM regression, and nu-SVM regression. It also provides an automatic MODEL selection tool for C-SVM classification.

    标签: LibSVM

    上传时间: 2019-06-09

    上传用户:lyaiqing

  • 灰色预测模型

    灰色预测模型(Gray Forecast MODEL)是通过 少量的、不完全的信息,建立数学模型并做出预 测的一种预测方法.当我们应用运筹学的思想方法 解决实际问题,制定发展战略和政策、进行重大 问题的决策时,都必须对未来进行科学的预测. 预测是根据客观事物的过去和现在的发展规律, 借助于科学的方法对其未来的发展趋势和状况进 行描述和分析,并形成科学的假设和判断.

    标签: 灰色预测模型

    上传时间: 2019-07-21

    上传用户:Tqco702

  • MODEL-change.

    abaqus 关于生死单元的模型 学习用

    标签: MODEL-change

    上传时间: 2019-07-30

    上传用户:adog2003

  • Fundamental Limits on a Class of Secure

    Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best MODELed by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS MODEL. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.

    标签: Fundamental Limits Secure Class on of

    上传时间: 2020-01-04

    上传用户:kddlas

  • Hybrid+Analog-Digital+Precoding

    In this paper we revisit hybrid analog-digital precoding systems with emphasis on their MODELling and radio-frequency (RF) losses, to realistically evaluate their benefits in 5G system implementations. For this, we decompose the analog beamforming networks (ABFN) as a bank of commonly used RF components and formulate realistic MODEL constraints based on their S-parameters. Specifically, we concentrate on fully-connected ABFN (FC-ABFN) and Butler networks for implementing the discrete Fourier transform (DFT) in the RF domain. The results presented in this paper reveal that the performance and energy efficiency of hybrid precoding systems are severely affected, once practical factors are considered in the overall design. In this context, we also show that Butler RF networks are capable of providing better performances than FC-ABFN for systems with a large number of RF chains.

    标签: Analog-Digital Precoding Hybrid

    上传时间: 2020-05-27

    上传用户:shancjb

  • Signal Processing for Telecommunications

    This paper presents a Hidden Markov MODEL (HMM)-based speech enhancement method, aiming at reducing non-stationary noise from speech signals. The system is based on the assumption that the speech and the noise are additive and uncorrelated. Cepstral features are used to extract statistical information from both the speech and the noise. A-priori statistical information is collected from long training sequences into ergodic hidden Markov MODELs. Given the ergodic MODELs for the speech and the noise, a compensated speech-noise MODEL is created by means of parallel MODEL combination, using a log-normal approximation. During the compensation, the mean of every mixture in the speech and noise MODEL is stored. The stored means are then used in the enhancement process to create the most likely speech and noise power spectral distributions using the forward algorithm combined with mixture probability. The distributions are used to generate a Wiener filter for every observation. The paper includes a performance evaluation of the speech enhancer for stationary as well as non-stationary noise environment.

    标签: Telecommunications Processing Signal for

    上传时间: 2020-06-01

    上传用户:shancjb

  • Stochastic Geometry and Wireless Networks Volume I

    Part I provides a compact survey on classical stochastic geometry MODELs. The basic MODELs defined in this part will be used and extended throughout the whole monograph, and in particular to SINR based MODELs. Note however that these classical stochastic MODELs can be used in a variety of contexts which go far beyond the MODELing of wireless networks. Chapter 1 reviews the definition and basic properties of Poisson point processes in Euclidean space. We review key operations on Poisson point processes (thinning, superposition, displacement) as well as key formulas like Campbell’s formula. Chapter 2 is focused on properties of the spatial shot-noise process: its continuity properties, its Laplace transform, its moments etc. Both additive and max shot-noise processes are studied. Chapter 3 bears on coverage processes, and in particular on the Boolean MODEL. Its basic coverage characteristics are reviewed. We also give a brief account of its percolation properties. Chapter 4 studies random tessellations; the main focus is on Poisson–Voronoi tessellations and cells. We also discuss various random objects associated with bivariate point processes such as the set of points of the first point process that fall in a Voronoi cell w.r.t. the second point process.

    标签: Stochastic Geometry Networks Wireless Volume and

    上传时间: 2020-06-01

    上传用户:shancjb