期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Analysis and Causal Formulation Proof of an Optimal Iterative Learning Algorithm
1
作者 Vassiliki Vita 《Intelligent Control and Automation》 2010年第2期90-95,共6页
Iterative learning control (ILC) is used to control systems that operate in a repetitive mode, improving track-ing accuracy of the control by transferring data from one repetition of a task, to the next. In this paper... Iterative learning control (ILC) is used to control systems that operate in a repetitive mode, improving track-ing accuracy of the control by transferring data from one repetition of a task, to the next. In this paper an op-timal iterative learning algorithm for discrete linear systems is analyzed and a solution for its attainment is proposed. Finally the mathematical proof of the algorithm’s causal formulation is also provided in its com-plete form, since its implementation requires its causal formulation. 展开更多
关键词 Casual FORMULATION DISCRETE Systems ITERATIVE Learning Control
下载PDF
A DAISY Book Production System over the Internet
2
作者 Surachai Suksakulchai Settachai Chaisanit 《通讯和计算机(中英文版)》 2011年第9期744-750,共7页
关键词 互联网接入 生产系统 图书 菊花 应用软件开发 网页浏览器 WEB浏览器 在线生产
下载PDF
A Robust Chaos-Based Image Cryptosystem with an Improved Key Generator and Plain Image Sensitivity Mechanism
3
作者 Hidayet Ogras Mustafa Türk 《Journal of Information Security》 2017年第1期23-41,共19页
In this paper, we propose an effective gray image cryptosystem containing Arnold cat map for pixel permutation and an improved Logistic map for the generation of encryption keys to be used for pixel modification. Firs... In this paper, we propose an effective gray image cryptosystem containing Arnold cat map for pixel permutation and an improved Logistic map for the generation of encryption keys to be used for pixel modification. Firstly, a new chaotic map is designed to show better performance than the standard one in terms of key space range, complexity and uniformity. Generated secret key is not only sensitive to the control parameters and initial condition of the improved map but also strongly depend on the plain image characteristic which provides an effective resistance against statistical and differential attacks. Additionally, to get higher encryption strength of the cryptosystem, both confusion and diffusion processes are performed with different keys in every iterations. Theoretical analysis and simulation results confirm that the proposed algorithm has superior security and effectively encrypts and decrypts the gray images as well. 展开更多
关键词 Chaos IMAGE CRYPTOSYSTEM Logistic MAP Diffusion ARNOLD Cat MAP
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部