نتایج جستجو برای: linear control system
تعداد نتایج: 3578793 فیلتر نتایج به سال:
a phase-locked loop (pll) based frequency synthesizer is an important circuit that is used in many applications, especially in communication systems such as ethernet receivers, disk drive read/write channels, digital mobile receivers, high-speed memory interfaces, system clock recovery and wireless communication system. other than requiring good signal purity such as low phase noise and low spu...
we present a numerical study of a one-dimensional version of the burridge-knopoff model [16] of n-site chain of spring-blocks with stick-slip dynamics. our numerical analysis and computer simulations lead to a set of different results corresponding to different boundary conditions. it is shown that we can convert a chaotic behaviour system to a highly ordered and periodic behaviour by making on...
چکیده ندارد.
We present a numerical study of a one-dimensional version of the Burridge-Knopoff model [16] of N-site chain of spring-blocks with stick-slip dynamics. Our numerical analysis and computer simulations lead to a set of different results corresponding to different boundary conditions. It is shown that we can convert a chaotic behaviour system to a highly ordered and periodic behaviour by making on...
در این پایان نامه با استفاده از تکنولوژی روز و امکانات داخل کشور طریقه اتوماسیون سیستم تاسیساتی یک کارخانه نساجی (کارخانه نساجی اطلس پود) همراه با منوهای مربوطه و توضیحات کامل برنامه نویسی و طراحی بلوک های برنامه و سایر قسمتهای برنامه ارائه گشته است. علاوه بر این، برنامه با نمونه آمریکایی آن مقایسه و مزیت های آن نسبت به آمریکایی توضیح داده شده است. همچنین تمامی بلوک های برنامه بصورت شماتیکی بطو...
there are two significant goals in teleoperation systems: stability and performance. this paper introduces an lmi-based robust control method for bilateral transparent teleoperation systems in presence of model mismatch. the uncertainties in time delay in communication channel, task environment and model parameters of master-slave systems is called model mismatch. the time delay in communicatio...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
چکیده ندارد.
in this paper we present a method for solving fuzzy linear systemsby two crisp linear systems. also necessary and sufficient conditions for existenceof solution are given. some numerical examples illustrate the efficiencyof the method.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید