CSpace

Browse/Search Results:  1-10 of 37 Help

Selected(0)Clear Items/Page:    Sort:
FIR system identification with set-valued and precise observations from multiple sensors 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2019, 卷号: 62, 期号: 5, 页码: 16
Authors:  Zhang, Hang;  Wang, Ting;  Zhao, Yanlong
Favorite  |  View/Download:0/0  |  Submit date:2020/01/10
system identification  FIR system  set-valued  precise  fusion estimation  quasi-convex combination estimator  
Parameter Estimation Based on Set-valued Signals: Theory and Application 期刊论文
ACTA MATHEMATICAE APPLICATAE SINICA-ENGLISH SERIES, 2019, 卷号: 35, 期号: 2, 页码: 255-263
Authors:  Wang, Ting;  Zhang, Hang;  Zhao, Yan-long
Favorite  |  View/Download:0/0  |  Submit date:2020/01/10
set-valued signals  parameter estimation  one-time completed algorithms  iterative estimation algorithms  recursive estimation algorithms  
firsystemidentificationwithsetvaluedandpreciseobservationsfrommultiplesensors 期刊论文
sciencechinainformationscience, 2019, 卷号: 62, 期号: 5
Authors:  Zhang Hang;  Wang Ting;  Zhao Yanlong
Favorite  |  View/Download:0/0  |  Submit date:2020/01/10
parameterestimationbasedonsetvaluedsignalstheoryandapplication 期刊论文
actamathematicaeapplicataesinica, 2019, 卷号: 35, 期号: 2, 页码: 255
Authors:  Wang Ting;  Zhang Hang;  Zhao Yanlong
Favorite  |  View/Download:0/0  |  Submit date:2020/01/10
Information Security Protocol Based System Identification with Binary-Valued Observations 期刊论文
JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2018, 卷号: 31, 期号: 4, 页码: 946-963
Authors:  Xu, Changbao;  Zhao, Yanlong;  Zhang, Ji-Feng
Favorite  |  View/Download:7/0  |  Submit date:2018/07/30
Cryptography  identification algorithm  information security  passive attacks  security protocol  time complexity  
Average Consensus of Multi-Agent Systems Under Directed Topologies and Binary-Valued Communications 期刊论文
IEEE ACCESS, 2018, 卷号: 6, 页码: 55995-56006
Authors:  Wang, Ting;  Zhang, Hang;  Zhao, Yanlong
Favorite  |  View/Download:3/0  |  Submit date:2019/01/11
Binary-valued communications  multi-agent systems  average consensus  state estimation  control design  directed topologies  
informationsecurityprotocolbasedsystemidentificationwithbinaryvaluedobservations 期刊论文
journalofsystemsscienceandcomplexity, 2018, 卷号: 031, 期号: 004, 页码: 946
Authors:  Xu Changbao;  Zhao Yanlong;  Zhang Jifeng
Favorite  |  View/Download:0/0  |  Submit date:2020/01/10
Decision-implementation complexity of cooperative game systems 期刊论文
SCIENCE CHINA-INFORMATION SCIENCES, 2017, 卷号: 60, 期号: 11, 页码: 18
Authors:  Xu, Changbao;  Zhao, Yanlong;  Zhang, Ji-Feng
Favorite  |  View/Download:3/0  |  Submit date:2018/07/30
cooperative game  distributed protocol  optimal control  decision-implementation complexity  two-phase protocol  
Identification of Wiener systems with quantized inputs and binary-valued output observations 期刊论文
AUTOMATICA, 2017, 卷号: 78, 页码: 280-286
Authors:  Guo, Jin;  Wang, Le Yi;  Yin, George;  Zhao, Yanlong;  Zhang, Ji-Feng
Favorite  |  View/Download:9/0  |  Submit date:2018/07/30
Identification  Wiener system  Quantized input  Binary-valued observation  Asymptotic efficiency  
A Robust and Powerful Set-Valued Approach to Rare Variant Association Analyses of Secondary Traits in Case-Control Sequencing Studies 期刊论文
GENETICS, 2017, 卷号: 205, 期号: 3, 页码: 1049-1062
Authors:  Kang, Guolian;  Bi, Wenjian;  Zhang, Hang;  Pounds, Stanley;  Cheng, Cheng;  Shete, Sanjay;  Zou, Fei;  Zhao, Yanlong;  Zhang, Ji-Feng;  Yue, Weihua
Favorite  |  View/Download:3/0  |  Submit date:2018/07/30
secondary traits  rare variants association analyses  case-control sequencing study  set-valued model