?
Обратное Z-преобразование при идентификации дискретных систем с запаздыванием
Известия высших учебных заведений. Приборостроение. 2014. Т. 57. № 5. С. 15-25.
Akhmetsafina R., Ахметсафин Р. Д.
Language:
Russian
Akhmetsafina R., Известия высших учебных заведений. Радиоэлектроника 2016 № 6 С. 7-11
An algorithm for inverse modified Z-transform with delay is considered. The delay parameter is a fraction of the sampling period. The fractional part of the delay is computed as the solution of the equation representing the rational transfer function of continuous part ...
Added: December 4, 2016
Семененко А.Н., Шалумов М. А., Малов А. В. et al., Динамика сложных систем 2012 Т. 6 № 3 С. 106-110
In article tasks in view of creation of a technique of identification of thermal parametres, a method of cooling by means of thermal tubes and working out of a subsystem of modelling of thermal processes in radio-electronic means of any design are proved also. ...
Added: November 19, 2013
Afanasiev V., Крестникова Д. Г., Нейрокомпьютеры: разработка, применение 2009 № 9 С. 29-36
Приведен метод идентификации нестационарного объекта при помощи настройки параметров модели на основе прошлых измерений, которые проходят на фоне помех в виде гауссовского белого шума. Приведен также алгоритм построения линейного фильтра на основе фильтра Калмана. Представлены схемы моделирования в системе MATLAB Simulink. Приведены результаты идентификации при разных вариантах настройки параметров фильтра. ...
Added: March 18, 2013
Tumanov M., Дифференциальные уравнения 2016 Т. 52 № 8 С. 1138
Исследована устойчивость системы автоматического управления с периодическим запаздыванием. ...
Added: October 26, 2017
Akhmetsafina R., Ахметсафин Р. Д., Мехатроника, автоматизация, управление 2013 № 7 С. 2-8
The paper deals with the algorithm of the identification of discrete systems with variable delay, consisting of an ideal sampler, zero-order hold and the linear continuous part. The delay parameter (fractional part of time delay) is estimated through the inverse modified Z-transform. The estimation is based on the equality of the continuous-time part step response ...
Added: August 4, 2013
Tsaregorodtsev A. V., Тараскин М. М., Дербин Е. А., Национальная безопасность / nota bene 2012 № 6 С. 60-68
One of the approaches to the assessment of threats, vulnerabilities and risks in the protection of information in organizations , allowing to fully analyze and document requirements related to information security in the organization. Using this approach will allow to avoid the costs of redundant safety measures arising from the subjective assessment of the risks ...
Added: March 17, 2014
Prazdnichnykh A., Glazov M., Ren L. et al., Physical Review B: Condensed Matter and Materials Physics 2021 Vol. 103 No. 8 P. 085302-1-085302-12
The exciton valley dynamics in van der Waals heterostructures with transition metal dichalcogenide monolayers is driven by the long-range exchange interaction between the electron and the hole in the exciton. It couples the states active in the opposite circular polarizations resulting in the longitudinal-transverse splitting of excitons propagating in the monolayer plane. Here we study ...
Added: March 5, 2021
Sobolevsky A. A., Качество. Инновации. Образование 2012 № 82 С. 22-27
The paper presents an analysis of learning management systems in a number of Russian and foreign universities. The sets of data stored in the extended electronic systems to support the educational process based on Web services are described. An algorithm for functioning of the system for numerical evaluation of competences of students, as well as ...
Added: March 27, 2013
IEEE, 2019
The book provides the list of scientific researches in such areas as innovations, tendencies, practical problems and strategies of development for financial, economic, industrial, energy, medical, biological, transport and other large-scale systems.
All publications are reffered according to scopus requirements. ...
Added: October 24, 2019
Romanov A., Tumkovskiy S., Иванова Г. А., Вестник РГРТУ 2015 Т. 2 № 52 С. 61-66
A review of the networks-on-chip modeling methods is given. A high-level model of networks-on-chip based on the programming language Java, which helps to accelerate the modeling process by several orders, compared to HDL‑models is developed. The results of simulation of networks-on-chip based on regular and quasi-optimal topologies with the number of nodes up to 100 ...
Added: June 21, 2015
М. : ИКИ РАН, 2011
Added: March 26, 2013
Barcelona : IEEE, 2017
International Conference on Control, Decision and Information Technologies. ...
Added: January 17, 2018
Petrov V., M. Komarov, D. Moltchanov et al., IEEE Transactions on Wireless Communications 2017 Vol. 16 No. 3 P. 1791-1808
The fifth generation wireless systems are expected to rely on a large number of small cells to massively offload traffic from the cellular and even from the wireless local area networks. To enable this functionality, mm-wave (EHF) and Terahertz (THF) bands are being actively explored. These bands are characterized by unique propagation properties compared with ...
Added: March 12, 2018
Vostrikov A. V., Borisov N., Abrameshin A. E., Качество. Инновации. Образование 2013 № 8 (99) С. 61-65
In work research of numerical stability of earlier reduced scheme of numerical integration of system of the linear ordinary differential equations developed by authors is conducted. The received condition of numerical stability of the reducing scheme proves possibility of use of this scheme in practice. Operability of the reduced scheme was tested on a real ...
Added: September 9, 2013
Мещеряков Р. В., Iskhakov A., Evsyutin O., Информатика и автоматизация (Труды СПИИРАН) 2020 Т. 19 № 5 С. 1089-1122
At present, the problem of creating methodological security of cyberphysical systems, in particular, the design and implementation of information security subsystems is acute. At the same time, the landscape of threats and vulnerabilities typical for a wide range of hardware and software technologies used in cyberphysical systems is extremely wide and complex. In this context, ...
Added: November 13, 2020
Зеленоград : МИЭТ, 2013
В сборнике тезисов докладов 20-й Всероссийской межвузовской научно-технической конференции "Микроэлектроника и информатика 2013", которая проводится в год 55-летия образования г. Зеленограда, признанного в стране и мире центра микроэлектроники и нанотехнологий, представлены результаты научных исследований студентов, аспирантов и молодых ученых зеленоградских предприятий и вузов России по следующим приоритетным направлениям развития науки и техники микро- и наноэлектроника, ...
Added: May 31, 2013
Красноярск : ИВМ СО РАН, 2013
Труды Пятой Международной конференции «Системный анализ и информационные технологии» САИТ-2013 (19–25 сентября 2013 г., г.Красноярск, Россия): ...
Added: November 18, 2013
Morozov I., Norman G. E., Insepov Z. et al., Physical Review Special Topics - Accelerators and Beams 2012 Vol. 15 P. 053501
This paper describes the surface environment of the dense plasma arcs that damage rf accelerators, tokamaks, and other high gradient structures. We simulate the dense, nonideal plasma sheath near a metallic surface using molecular dynamics (MD) to evaluate sheaths in the non-Debye region for high density, low temperature plasmas. We use direct two-component MD simulations ...
Added: October 28, 2013
Lychkina N. N., Глазков Д. Н., Хоружевская А. П., Логистика и управление цепями поставок 2014 Т. 05 № 64 С. 57-63
В статье демонстрируется применение метода имитационного моделирования в среде AnyLogic в целях оптимизации логистической сети промышленной компании, работающей на рынке промышленных газов. В модели детализированы основные процессы, связанные с транпортировкой продукта, обслуживанием заявок клиентов и распределением продукта потребителям. Были учтены факторы, носящие стохастический характер, такие как неритмичность производства, погодные условия, влияющие на уровень спроса, количество ...
Added: November 30, 2014
Guimarães R. R., Passos L., Filho R. H. et al., IEEE Network 2019 Vol. 33 No. 2 P. 126-131
Distinguishing outliers from normal data in wireless sensor networks has been a big challenge in the anomaly detection domain, mostly due to the nature of the anomalies, such as software or hardware failures, reading errors or malicious attacks, just to name a few. In this article, we introduce an anomaly detection-based OPF classifier in the ...
Added: December 19, 2018
Васенина Д., Plaksin M. A., Вестник Пермского университета. Серия: Информационные системы и технологии 2010 № 2(39) С. 5-14
The program for automation of the checking algorithmic right of the beginner's programs written in language Pascal from «The electronic teacher of bases of programming» project is described. Right UseChecker allows to automate a part of work of the teacher on training to bases of programming. ...
Added: November 11, 2012
Buzmakov A. V., Zolotov D. A., Asadchikov V. E. et al., Кристаллография 2011 Т. 56 № 3 С. 426-430
Представлены результаты исследования дефектов в синтетическом кристалле LiF с использованием метода рентгеновской топо-томографии на лабораторных рентгеновских источниках с пространственным разрешением ~ 10 мкм. Для восстановления дефектной трехмерной структуры кристалла на основании дифракционных данных применялся алгебраический метод реконструкции. Представленные в работе результаты хорошо согласуются с данными топографических исследований, проведенных по методу Ланга. ...
Added: April 12, 2012
М. : Физматлит, 2013
Conference is devoted to application of the integrated models and soft computing in artificial intelligence. ...
Added: May 26, 2013
Terekhovich V., Эпистемология и философия науки 2019 Т. 56 № 1 С. 169-184
The framework of simple opposition realism - anti-realism is not enough to analyze the views on the reality of unobservable objects of quantum theory. First, it is necessary to distinguish between realism in relation to the theory and realism in relation to the theory’s objects. Secondly, realism in relation to classical objects can be combined, ...
Added: February 12, 2020