Search results for "Computer"
showing 10 items of 30657 documents
Robust H<inf>&#x221E;</inf> control of Markovian jump systems with mixed time delays
2010
In this paper, the problem of stability analysis and control synthesis for Markovian jump linear systems with time delays and norm-bounded uncertainties is studied. The model under consideration consists of different time-invariant discrete, neutral and distributed delays. Delay-dependent sufficient conditions for the design of a mode-dependent delayed state feedback H ∞ control are given in terms of linear matrix inequalities (LMIs). A controller which guarantees stochastic stability and a prescribed level of H ∞ performance for the closed-loop system is then developed. A Lyapunov-Krasovskii functional (LKF) method underlies the control design. A numerical example with simulation results i…
A Self-Contained Biometric Sensor for Ubiquitous Authentication
2007
This paper describes a real-life behavior framework in simulation game based on Probabilistic State Machine (PSM) with Gaussian random distribution. According to the dynamic environment information, NPC can generate behavior planning autonomously associated with defined FSM. After planning process, we illuminate Gaussian probabilistic function for real-life action simulation in time and spatial domains. The expected value of distribution is estimated during behavior planning process and variance is determined by NPC personality in order to realize real life behavior simulation. We experiment the framework and Gaussian PSM on a restaurant simulation game. Furthermore we give some suggestions…
The Radon-Wigner Transform and Its Application to First-order Optical Systems
2009
The Radon-Wigner transform is presented as a tool for the description of 1st-order optical systems. The input/output relationships for this phase-space representation are obtained and their application in analysis and design tasks is pointed out.
Complex objects classified by morphological shape analysis and elliptical Fourier descriptors
2005
This chapter deals with the classification of complex objects by morphological shape analysis and elliptical Fourier descriptors. An unsupervised method has been proposed to identify components with specific shapes by a simple edge detector and to classify them via the description of their contours. A particular application has been arranged in order to evaluate the goodness of this approach when discriminating between normal and pathological human megakaryocytes. Alterations in these cells can occur in many pathological processes and in such cases the pattern, size and shape of the cytoplasm and/or of the nucleus are extremely varied.
Operator (Quasi-)Similarity, Quasi-Hermitian Operators and All that
2016
Motivated by the recent developments of pseudo-Hermitian quantum mechanics, we analyze the structure generated by unbounded metric operators in a Hilbert space. To that effect, we consider the notions of similarity and quasi-similarity between operators and explore to what extent they preserve spectral properties. Then we study quasi-Hermitian operators, bounded or not, that is, operators that are quasi-similar to their adjoint and we discuss their application in pseudo-Hermitian quantum mechanics. Finally, we extend the analysis to operators in a partial inner product space (pip-space), in particular the scale of Hilbert space s generated by a single unbounded metric operator.
Arm Space Decomposition as a Strategy for Tackling Large Scale Multi-armed Bandit Problems
2013
Recent multi-armed bandit based optimization schemes provide near-optimal balancing of arm exploration against arm exploitation, allowing the optimal arm to be identified with probability arbitrarily close to unity. However, the convergence speed drops dramatically as the number of bandit arms grows large, simply because singling out the optimal arm requires experimentation with all of the available arms. Furthermore, effective exploration and exploitation typically demands computational resources that grow linearly with the number of arms. Although the former problem can be remedied to some degree when prior knowledge about arm correlation is available, the latter problem persists. In this…
Predictive control of networked systems with communication delays
2012
This paper studies the problem of predictive output feedback control for networked control systems with random communication delays. A networked predictive control scheme is employed to compensate for random communication delays, which mainly consists of the control prediction generator and network delay compensator. Furthermore, a new strategy of designing the time-varying predictive controller with mixed random delays for networked systems is proposed. Then the system can be formulated as a Markovian jump system. New techniques are presented to deal with the distributed delay in the discrete-time domain. Based on analysis of closed-loop networked predictive control systems, the designed p…
Modal analysis for random response of MDOF systems
1990
The usefulness of the mode-superposition method of multidegrees of freedom systems excited by stochastic vector processes is here presented. The differential equations of moments of every order are written in compact form by means of the Kronecker algebra; then the method for integration of these equations is presented for both classically and non-classically damped systems, showing that the fundamental operator available for evaluating the response in the deterministic analysis is also useful for evaluating the response in the stochastic analysis.
Variable fractional Fourier processor: a simple implementation: erratum
1997
Polaroid-Type Operators
2018
In this chapter we introduce the classes of polaroid-type operators, i.e., those operators T ∈ L(X) for which the isolated points of the spectrum σ(T) are poles of the resolvent, or the isolated points of the approximate point spectrum σap(T) are left poles of the resolvent. We also consider the class of all hereditarily polaroid operators, i.e., those operators T ∈ L(X) for which all the restrictions to closed invariant subspaces are polaroid. The class of polaroid operators, as well as the class of hereditarily polaroid operators, is very large. We shall see that every generalized scalar operator is hereditarily polaroid, and this implies that many classes of operators acting on Hilbert s…