نتایج جستجو برای: Linear transfer function

تعداد نتایج: 1865370  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بوعلی سینا - دانشکده علوم پایه 1391

abstract: in this thesis, we focus to class of convex optimization problem whose objective function is given as a linear function and a convex function of a linear transformation of the decision variables and whose feasible region is a polytope. we show that there exists an optimal solution to this class of problems on a face of the constraint polytope of feasible region. based on this, we dev...

Journal: :پژوهش های علوم و صنایع غذایی ایران 0
mahmoud sadeghi masoud yavarmanesh mostafa shahidi nojhabi

nowadays, it has demonstrated that viruses can be transmitted by water and foods. therefore, it causes the research to develop for detecting different viruses in water and foods. among foods, milk can transfer potentially pathogenic viruses. on the other hand, to achieve every method for recovery and extraction of viruses in raw milk it needs to know about impact of milk components on viruses. ...

Neural network is one of the new soft computing methods commonly used for prediction of the thermodynamic properties of pure fluids and mixtures. In this study, we have used this soft computing method to predict the coefficients of the Antoine vapor pressure equation. Three transfer functions of tan-sigmoid (tansig), log-sigmoid (logsig), and linear were used to evaluate the performance of diff...

Journal: :IEEE Transactions on Automatic Control 1983

Journal: :روش های عددی در مهندسی (استقلال) 0
مسعود سبحانی و احمدرضا تابش m. sobhani and a. a. tabesh

in this paper, a new algorithm for system identification based on frequency response is presented. in this method, given a set of magnitudes and phases of the system transfer function in a set of discrete frequencies, a system of linear equations is derived which has a unique and exact solution for the coefficients of the transfer function provided that the data is noise-free and the degrees of...

An optimal artificial neural network (ANN) has been developed to predict the Nusselt number of non-Newtonian nanofluids. The resulting ANN is a multi-layer perceptron with two hidden layers consisting of six and nine neurons, respectively. The tangent sigmoid transfer function is the best for both hidden layers and the linear transfer function is the best transfer function for the output layer....

M. Sobhani and A. A. Tabesh,

In this paper, a new algorithm for system identification based on frequency response is presented. In this method, given a set of magnitudes and phases of the system transfer function in a set of discrete frequencies, a system of linear equations is derived which has a unique and exact solution for the coefficients of the transfer function provided that the data is noise-free and the degrees of...

M. Sobhani and A. A. Tabesh,

In this paper, a new algorithm for system identification based on frequency response is presented. In this method, given a set of magnitudes and phases of the system transfer function in a set of discrete frequencies, a system of linear equations is derived which has a unique and exact solution for the coefficients of the transfer function provided that the data is noise-free and the degrees of...

Journal: :Automatica 2013
Ian R. Petersen

This paper considers the structure of uncertain linear systems building on concepts of robust unobservability and possible controllability which were introduced in previous papers. The paper presents a new characterization of the possibly controllable states for the case in which a certain system transfer function is non-zero. This result complements the result of a previous paper which present...

Journal: :IACR Cryptology ePrint Archive 2005
Ivan Damgård Serge Fehr Louis Salvail Christian Schaffner

We study unconditionally secure 1-out-of-2 Oblivious Transfer (1-2 OT). We first point out that a standard security requirement for 1-2 OT of bits, namely that the receiver only learns one of the bits sent, holds if and only if the receiver has no information on the XOR of the two bits. We then generalize this to 1-2 OT of strings and show that the security can be characterized in terms of bina...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید