quantized control via locational optimization
標簽: optimization locational quantized control
上傳時間: 2017-09-28
上傳用戶:417313137
Within this book the fundamental concepts associated with the topic of power electronic control are covered alongside the latest equipment and devices, new application areas and associated computer-assisted methods. *A practical guide to the control of reactive power systems *Ideal for postgraduate and professional courses *Covers the latest equipment and computer-aided analysis
標簽: power electronic electrical system
上傳時間: 2015-02-20
上傳用戶:12345654321
可編程邏輯器件相關專輯 96冊 1.77GPLC Control Panel 2.0 梯形圖編程軟件.rar
標簽:
上傳時間: 2014-05-05
上傳用戶:時代將軍
可編程邏輯器件相關專輯 96冊 1.77GPLC Control Panel 2.0 梯形圖編程軟件.exe
標簽:
上傳時間: 2014-05-05
上傳用戶:時代將軍
這是robust control design with matlab 書里的部分M文件,挺不錯的
標簽: matlab robust
上傳時間: 2016-04-20
上傳用戶:sunlight2016
Predictive Control with Constraints ,主要介紹含限制的模型預測控制設計理論
標簽: Predictive Control with Constraints 模型預測控制
上傳時間: 2018-10-08
上傳用戶:jsxzzcm
obot control, a subject aimed at making robots behave as desired, has been extensively developed for more than two decades. Among many books being published on this subject, a common feature is to treat a robot as a single system that is to be controlled by a variety of control algorithms depending on different scenarios and control objectives. However, when a robot becomes more complex and its degrees of freedom of motion increase substantially, the needed control computation can easily go beyond the scope a modern computer can handle within a pre-specified sampling period. A solution is to base the control on subsystem dynamics.
標簽: decomposition virtual control
上傳時間: 2019-09-04
上傳用戶:txb96
This is a great introductory book for manipulators. There are clear examples to help walk through kinematics, dynamics and control.
標簽: Robotics Planning modeling Control and
上傳時間: 2019-10-28
上傳用戶:xiangpingfly100
Abstract—In the future communication applications, users may obtain their messages that have different importance levels distributively from several available sources, such as distributed storage or even devices belonging to other users. This scenario is the best modeled by the multilevel diversity coding systems (MDCS). To achieve perfect (information-theoretic) secrecy against wiretap channels, this paper investigates the fundamental limits on the secure rate region of the asymmetric MDCS (AMDCS), which include the symmetric case as a special case. Threshold perfect secrecy is added to the AMDCS model. The eavesdropper may have access to any one but not more than one subset of the channels but know nothing about the sources, as long as the size of the subset is not above the security level. The question of whether superposition (source separation) coding is optimal for such an AMDCS with threshold perfect secrecy is answered. A class of secure AMDCS (S-AMDCS) with an arbitrary number of encoders is solved, and it is shown that linear codes are optimal for this class of instances. However, in contrast with the secure symmetric MDCS, superposition is shown to be not optimal for S-AMDCS in general. In addition, necessary conditions on the existence of a secrecy key are determined as a design guideline.
標簽: Fundamental Limits Secure Class on of
上傳時間: 2020-01-04
上傳用戶:kddlas
Transmit power in wireless cellular networks is a key degree of freedom in the management of interference, energy, and connectivity. Power control in both uplink and downlink of a cellular network has been extensively studied, especially over the last 15 years, and some of the results have enabled the continuous evolution and significant impact of the digital cellular technology.
標簽: Cellular Networks Wireless Control Power in
上傳時間: 2020-05-31
上傳用戶:shancjb