理学 >>> 信息科学与系统科学 >>> 信息科学与系统科学基础学科 系统学 控制理论 系统评估与可行性分析 系统工程方法论 系统工程 信息科学秘系统科学其他学科
搜索结果: 1-15 共查到信息科学与系统科学 Using相关记录30条 . 查询时间(0.44 秒)
Recent advances in contemporary Virtual Reality (VR) technologies are going to have a significant impact on veryday life. Through VR it is possible to virtually explore a computer-generated environmen...
Locating the boundary parameters of pupil and iris and segmenting the noise free iris portion are the most challenging phases of an automated iris recognition system. In this paper, we have presented ...
This paper describes how to efficiently solve a robust optimal control problem using recently developed primal-dual interior-point methods. Among potential applications are model predictive control. T...
We describe a method for truncating the coefficients of a linear controller while guaranteeing that a given set of relaxed performance constraints is met. Our method sequentially and greedily truncate...
How do young children direct their attention to other people in the natural world? Although many studies have examined the perception of faces and of goal-directed actions, relatively little work ha...
In this paper we construct suboptimal H-infinity controllers which satisfy a new robust performance condition, using the receding horizon technique. A method is described for the synthesis of H-infini...
The search for a polynomial Lyapunov function proving delay-independent stability of multivariate nonlinear polynomial delay differential equations is approached using semidefinite programming. The fu...
The Phase-Locked Loop(PLL) is a key component of modern electronic communication and control systems. PLL is designed to extract signals from transmission channels. It plays an important role in syste...
The object of this paper is to outline a stability theory for input-output problems using functional methods. More particularly, the aim is to derive open loop conditions for the boundedness and conti...
A team of computer scientists at the University of California, San Diego, has taken an unprecedented, in-depth look at how malware operators use the computers they infect to mine Bitcoin, a virtual cu...
While some write once memory (WOM) codes are inherently decodable, others require the added knowledge of the current generation in order to successfully decode the state of the memory. If there is no ...
In this paper, numerical methods are suggested to compute the discrete and the continuous spectrum of a signal with respect to the Zakharov-Shabat system, a Lax operator underlying numerous integrable...
This paper studies a downlink multiuser transmit beamforming design under spherical channel uncertainties, using a worst-case robust formulation. This robust design problem is nonconvex. Recently, a c...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...