• 제목/요약/키워드: Positive Real Function

검색결과 135건 처리시간 0.029초

Speed Gradient 알고리즘을 이용한 적응제어 (Adaptive Control Based on Speed-Gradient Algorithm)

  • 정사철;김진환;이정규;함운철
    • 전자공학회논문지B
    • /
    • 제31B권3호
    • /
    • pp.39-46
    • /
    • 1994
  • In this paper, three types of parameter update law which can be used in model reference adaptive control are suggested based on speed-gradient algorithm which was introduced by Fradkov. It is shown that the parameter update law which was proposed by Narendra is a special from of these laws and that proposed parameter update laws can insure the global stability under some conditions such as attainability and convexity. We also comment that the transfer function of reference model shoud be positive real for the realization of parameter update law.

  • PDF

FXLMS 알고리즘을 이용한 외란보상 제어기 설계 (Disturbance Compensation Control by FXLMS Algorithm)

  • 강민식
    • 한국정밀공학회지
    • /
    • 제20권11호
    • /
    • pp.100-107
    • /
    • 2003
  • This paper represents a disturbance compensation control for attenuating disturbance responses. In the consideration of the requirements on the model accuracy in the model based compensator designs, an experimental feed forward compensator design based on adaptive estimation by Filtered-x least mean square (FXLMS) algorithm is proposed. The convergence properties of the FXLMS algorithm are discussed and its conditions for the asymptotic convergence are derived theoretically. The effectiveness of the proposed method and the theoretical proof are verified by computer simulation.

Lyapunov 안정도이론에 기초를 둔 이산기준모델 적응제어 (Discrete Model Reference Adaptive Control based on Lyapunov's Stability Theory)

  • 함운철;최계근
    • 대한전자공학회논문지
    • /
    • 제24권6호
    • /
    • pp.942-947
    • /
    • 1987
  • In this paper, we suggest a new adaptive control theory for discrete-time single-input single output systems based on the Lyapunov's stability theory by using the fact that the transfer function of the model is strictly positive real. And also, obervers are used in the structure of controller. The result of computer simulation shows that the proposed algorithm can be applied to both stable and unstable plants.

  • PDF

General Laws of the Iterated Logarithm for Levy Processes

  • Wee, In-Suk;Kim, Yun-Kyong
    • Journal of the Korean Statistical Society
    • /
    • 제17권1호
    • /
    • pp.30-45
    • /
    • 1988
  • Let ${X(t) : 0 \leq t < \infty}$ be a real-valued process with stationary independent increments. In this paper, we obtain necesary and sufficint condition for there to exist a positive, nondecreasing function $\beta(t)$ so that $0 < lim sup $\mid$X(t)$\mid$/\beta(t) < \infty$ a.s. both as t tends to zero and infinity. When no such $\beta(t)$ exists we give a simple integral test for whether $lim sup $\mid$X(t)$\mid$/\beta(t)$ is zero or infinity for a given $\beta(t)$.

  • PDF

시간지연이 존재하는 기준모델 적응제어 시스템의 설계 (Model Reference Adaptive Control System Design with Time-Delay)

  • 양균석;이응구;이두수
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1988년도 전기.전자공학 학술대회 논문집
    • /
    • pp.895-897
    • /
    • 1988
  • This paper is concerned with linear system containing time delay in model reference adaptive control. An algorithm is developed using Lyapunov second method and properties of strictly positive real function.

  • PDF

Efficient Illegal Contents Detection and Attacker Profiling in Real Environments

  • Kim, Jin-gang;Lim, Sueng-bum;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.2115-2130
    • /
    • 2022
  • With the development of over-the-top (OTT) services, the demand for content is increasing, and you can easily and conveniently acquire various content in the online environment. As a result, copyrighted content can be easily copied and distributed, resulting in serious copyright infringement. Some special forms of online service providers (OSP) use filtering-based technologies to protect copyrights, but illegal uploaders use methods that bypass traditional filters. Uploading with a title that bypasses the filter cannot use a similar search method to detect illegal content. In this paper, we propose a technique for profiling the Heavy Uploader by normalizing the bypassed content title and efficiently detecting illegal content. First, the word is extracted from the normalized title and converted into a bit-array to detect illegal works. This Bloom Filter method has a characteristic that there are false positives but no false negatives. The false positive rate has a trade-off relationship with processing performance. As the false positive rate increases, the processing performance increases, and when the false positive rate decreases, the processing performance increases. We increased the detection rate by directly comparing the word to the result of increasing the false positive rate of the Bloom Filter. The processing time was also as fast as when the false positive rate was increased. Afterwards, we create a function that includes information about overall piracy and identify clustering-based heavy uploaders. Analyze the behavior of heavy uploaders to find the first uploader and detect the source site.

WEAKTYPE $L^1(R^n)$-ESTIMATE FOR CRETAIN MAXIMAL OPERATORS

  • Kim, Yong-Cheol
    • 대한수학회지
    • /
    • 제34권4호
    • /
    • pp.1029-1036
    • /
    • 1997
  • Let ${A_t)}_{t>0}$ be a dilation group given by $A_t = exp(-P log t)$, where P is a real $n \times n$ matrix whose eigenvalues has strictly positive real part. Let $\nu$ be the trace of P and $P^*$ denote the adjoint of pp. Suppose that $K$ is a function defined on $R^n$ such that $$\mid$K(x)$\mid$ \leq k($\mid$x$\mid$_Q)$ for a bounded and decreasing function $k(t) on R_+$ satisfying $k \diamond $\mid$\cdot$\mid$_Q \in \cup_{\varepsilon >0}L^1((1 + $\mid$x$\mid$)^\varepsilon dx)$ where $Q = \int_{0}^{\infty} exp(-tP^*) exp(-tP)$ dt and the norm $$\mid$\cdot$\mid$_Q$ stands for $$\mid$x$\mid$_Q = \sqrt{}, x \in R^n$. For $f \in L^1(R^n)$, define $mf(x) = sup_{t>0}$\mid$K_t * f(x)$\mid$$ where $K_t(X) = t^{-\nu}K(A_{1/t}^* x)$. Then we show that $m$ is a bounded operator of $L^1(R^n) into L^{1, \infty}(R^n)$.

  • PDF

2007·2009 개정 초등 과학 교과서 '우리 몸의 구조와 기능' 단원의 편집디자인에 따른 초등학생들의 시각적 주의 분석 (Analysis of Elementary School Students' Visual Attention on the Editorial Design of 'Structure and Function of Our Body' in the 2007·2009 Revised Elementary Science Textbook)

  • 신원섭
    • 한국초등과학교육학회지:초등과학교육
    • /
    • 제36권4호
    • /
    • pp.428-438
    • /
    • 2017
  • The purpose of this study is to analyze the visual attention of elementary school students according to the editorial design of the 2007 2009 revised elementary science textbook 'Structure and function of our body'. For this purpose, eye movements were collected while elementary school students were watching real textbooks wearing mobile eye tracker. The BeGaze 3.7 program of SMI company was used analyzing eye movements. Twenty-six elementary school students participated voluntarily in mobile tracking research. Elementary students learned the contents of textbook related to 'digestive organ' and 'respiratory organ' by using double reading learning strategy. The results of this study are as follows. First, as a result of pre- and post-knowledge tests, there was no statistically significant difference in learning effect between 2007 revised and 2009 revised textbook editing design. Second, elementary school students tended to give more visual attention to text than textbook illustrations. Third, the selective attention and persistent attention of elementary students showed a very strong positive correlation (.940), but the selective attention and self-control showed a strong positive correlation (.499). Fourth, students with high level of attention and low level showed high visual occupancy in text than in illustrations. Fifth, elementary school students preferred the 2009 revised science textbook to the 2007 revised.

BLASCHKE PRODUCTS AND RATIONAL FUNCTIONS WITH SIEGEL DISKS

  • Katagata, Koh
    • 대한수학회지
    • /
    • 제46권1호
    • /
    • pp.151-170
    • /
    • 2009
  • Let m be a positive integer. We show that for any given real number ${\alpha}\;{\in}\;[0,\;1]$ and complex number $\mu$ with $|\mu|{\leq}1$ which satisfy $e^{2{\pi}i{\alpha}}{\mu}^m\;{\neq}\;1$, there exists a Blaschke product B of degree 2m + 1 which has a fixed point of multiplier ${\mu}^m$ at the point at infinity such that the restriction of the Blaschke product B on the unit circle is a critical circle map with rotation number $\alpha$. Moreover if the given real number $\alpha$ is irrational of bounded type, then a modified Blaschke product of B is quasiconformally conjugate to some rational function of degree m + 1 which has a fixed point of multiplier ${\mu}^m$ at the point at infinity and a Siegel disk whose boundary is a quasicircle containing its critical point.

SPECTRAL ANALYSIS FOR THE CLASS OF INTEGRAL OPERATORS ARISING FROM WELL-POSED BOUNDARY VALUE PROBLEMS OF FINITE BEAM DEFLECTION ON ELASTIC FOUNDATION: CHARACTERISTIC EQUATION

  • Choi, Sung Woo
    • 대한수학회보
    • /
    • 제58권1호
    • /
    • pp.71-111
    • /
    • 2021
  • We consider the boundary value problem for the deflection of a finite beam on an elastic foundation subject to vertical loading. We construct a one-to-one correspondence �� from the set of equivalent well-posed two-point boundary conditions to gl(4, ℂ). Using ��, we derive eigenconditions for the integral operator ��M for each well-posed two-point boundary condition represented by M ∈ gl(4, 8, ℂ). Special features of our eigenconditions include; (1) they isolate the effect of the boundary condition M on Spec ��M, (2) they connect Spec ��M to Spec ����,α,k whose structure has been well understood. Using our eigenconditions, we show that, for each nonzero real λ ∉ Spec ����,α,k, there exists a real well-posed boundary condition M such that λ ∈ Spec ��M. This in particular shows that the integral operators ��M, arising from well-posed boundary conditions, may not be positive nor contractive in general, as opposed to ����,α,k.