Parameter identification and synchronization of dynamical system by introducing an auxiliary subsystem.
Peng, Haipeng, Li, Lixiang, Sun, Fei, Yang, Yixian, Li, Xiaowen (2010)
Advances in Difference Equations [electronic only]
Similarity:
Peng, Haipeng, Li, Lixiang, Sun, Fei, Yang, Yixian, Li, Xiaowen (2010)
Advances in Difference Equations [electronic only]
Similarity:
Gandino, E., Marchesiello, S. (2010)
Mathematical Problems in Engineering
Similarity:
Cruz, Ronaldo Vieira, Góes, Luiz Carlos Sandoval (2010)
Mathematical Problems in Engineering
Similarity:
Majumdar, Kaushik, Myers, Mark H. (2006)
Computational & Mathematical Methods in Medicine
Similarity:
Kostas S. Tsakalis (1997)
Kybernetika
Similarity:
Volodymyr Lynnyk, Sergej Čelikovský (2010)
Kybernetika
Similarity:
In this paper, a modified version of the Chaos Shift Keying (CSK) scheme for secure encryption and decryption of data will be discussed. The classical CSK method determines the correct value of binary signal through checking which initially unsynchronized system is getting synchronized. On the contrary, the new anti-synchronization CSK (ACSK) scheme determines the wrong value of binary signal through checking which already synchronized system is loosing synchronization. The ACSK scheme...
Andreas Rauh, Saif S. Butt, Harald Aschemann (2013)
International Journal of Applied Mathematics and Computer Science
Similarity:
The focus of this paper is to develop reliable observer and filtering techniques for finite-dimensional battery models that adequately describe the charging and discharging behaviors. For this purpose, an experimentally validated battery model taken from the literature is extended by a mathematical description that represents parameter variations caused by aging. The corresponding disturbance models account for the fact that neither the state of charge, nor the above-mentioned parameter...
Vepa, Ranjan (2010)
Mathematical Problems in Engineering
Similarity: