A new multi-step adaptive predictive control algorithm for a class of bilinear systems is presented. The structure of the bilinear system is converted into a simple linear model by using nonlinear support vector machi...A new multi-step adaptive predictive control algorithm for a class of bilinear systems is presented. The structure of the bilinear system is converted into a simple linear model by using nonlinear support vector machine (SVM) dynamic approximation with analytical control law derived. The method does not need on-line parameters estimation because the system’s internal model has been transformed into an off-line global model. Compared with other traditional methods, this control law reduces on-line parameter estimating burden. In addition, its overall linear behavior treating method allows an analytical control law available and avoids on-line nonlinear optimization. Simulation results are presented in the article to illustrate the efficiency of the method.展开更多
In this paper, using the Hirota's bilineax method, we consider the N = 1 supersymmetric Sawada-Kotera- Ramani equation and obtain the Bazcklund transformation of it. Its one- and two-supersoliton solutions axe obtain...In this paper, using the Hirota's bilineax method, we consider the N = 1 supersymmetric Sawada-Kotera- Ramani equation and obtain the Bazcklund transformation of it. Its one- and two-supersoliton solutions axe obtained and N-supersoliton solutions for N ≥ 3 are given under the condition kiξj = kjξi.展开更多
An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, b...An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.展开更多
Recently some (1+1)-dimensional nonlinear wave equations with linearly dispersive terms were shown to possess compacton-like and solitary pattern-like solutions. In this paper, with the aid of Maple, new solutions of ...Recently some (1+1)-dimensional nonlinear wave equations with linearly dispersive terms were shown to possess compacton-like and solitary pattern-like solutions. In this paper, with the aid of Maple, new solutions of (2+1)-dimensional generalization of mKd V equation, which is of only linearly dispersive terms, are investigated using three new transformations. As a consequence, it is shown that this (2+ 1)-dimensional equation also possesses new compacton-like solutions and solitary pattern-like solutions.展开更多
基金Project (No. 60421002) supported by the National Natural ScienceFoundation of China
文摘A new multi-step adaptive predictive control algorithm for a class of bilinear systems is presented. The structure of the bilinear system is converted into a simple linear model by using nonlinear support vector machine (SVM) dynamic approximation with analytical control law derived. The method does not need on-line parameters estimation because the system’s internal model has been transformed into an off-line global model. Compared with other traditional methods, this control law reduces on-line parameter estimating burden. In addition, its overall linear behavior treating method allows an analytical control law available and avoids on-line nonlinear optimization. Simulation results are presented in the article to illustrate the efficiency of the method.
文摘In this paper, using the Hirota's bilineax method, we consider the N = 1 supersymmetric Sawada-Kotera- Ramani equation and obtain the Bazcklund transformation of it. Its one- and two-supersoliton solutions axe obtained and N-supersoliton solutions for N ≥ 3 are given under the condition kiξj = kjξi.
基金The National Hi-Tech Research and Development Program (863) of China (No. 2005AA145110)The Pudong New Area Technology Innovation Public Service Platform of China (No. PDP2005-04)
文摘An identity-based verifiably committed signature scheme (IB-VCS) was proposed, which is proved secure in the standard model (i.e., without random oracles). It enjoys the setup-free property and stand-alone property, both of which make an exchange protocol more practical. The scheme is unconditionally secure against the cheating signer, its security against the cheating verifier is reduced to the computational Diffie-Hellman (CDH) problem in the underlying group, it is secure against the cheating trusted third party if the underlying Paterson Schuldt's identity based signature (IBS) scheme is secure, which is proven true based on the CDH assumption in the standard model.
基金浙江省自然科学基金,中国博士后科学基金,中国科学院资助项目,教育部留学回国人员科研启动基金,Scientific Research Foundation for Returned Overseas Chinese Scholars of Ministry of Education of China
文摘Recently some (1+1)-dimensional nonlinear wave equations with linearly dispersive terms were shown to possess compacton-like and solitary pattern-like solutions. In this paper, with the aid of Maple, new solutions of (2+1)-dimensional generalization of mKd V equation, which is of only linearly dispersive terms, are investigated using three new transformations. As a consequence, it is shown that this (2+ 1)-dimensional equation also possesses new compacton-like solutions and solitary pattern-like solutions.