Marzban et al., 2013 - Google Patents

Solution of linear optimal control problems with time delay using a composite Chebyshev finite difference method

Marzban et al., 2013

View PDF
Document ID
1586126639250830795
Author
Marzban H
Hoseini S
Publication year
Publication venue
Optimal Control Applications and Methods

External Links

Snippet

In this paper, a composite Chebyshev finite difference method is introduced and applied for finding the solution of optimal control of time‐delay systems with a quadratic performance index. This method is an extension of the Chebyshev finite difference scheme. The proposed …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30312Storage and indexing structures; Management thereof
    • G06F17/30321Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30943Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type
    • G06F17/30946Information retrieval; Database structures therefor; File system structures therefor details of database functions independent of the retrieved data type indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/18Complex mathematical operations for evaluating statistical data, e.g. average values, frequency distributions, probability functions, regression analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F7/00Methods or arrangements for processing data by operating upon the order or content of the data handled
    • G06F7/38Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation
    • G06F7/48Methods or arrangements for performing computations using exclusively denominational number representation, e.g. using binary, ternary, decimal representation using non-contact-making devices, e.g. tube, solid state device; using unspecified devices
    • G06F7/4806Computations with complex numbers
    • G06F7/4818Computations with complex numbers using coordinate rotation digital computer [CORDIC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Similar Documents

Publication Publication Date Title
Marzban et al. Solution of linear optimal control problems with time delay using a composite Chebyshev finite difference method
Abd-Elhameed et al. New Spectral Second Kind Chebyshev Wavelets Algorithm for Solving Linear and Nonlinear Second‐Order Differential Equations Involving Singular and Bratu Type Equations
Tian et al. Dynamic analysis and robust control of a chaotic system with hidden attractor
Wang et al. Consensus in second‐order multi‐agent systems via impulsive control using position‐only information with heterogeneous delays
Zhao New exact solutions for a higher‐order wave equation of KdV type using the multiple simplest equation method
Naz et al. Reductions and new exact solutions of ZK, Gardner KP, and modified KP equations via generalized double reduction theorem
Lehotzky et al. A pseudospectral tau approximation for time delay systems and its comparison with other weighted‐residual‐type methods
Zhou et al. Numerical Solution of Time‐Fractional Diffusion‐Wave Equations via Chebyshev Wavelets Collocation Method
Marzban et al. An efficient discretization scheme for solving nonlinear optimal control problems with multiple time delays
Amırov et al. Inverse Problems for the Quadratic Pencil of the Sturm‐Liouville Equations with Impulse
Marzban Optimal control of linear multi‐delay systems based on a multi‐interval decomposition scheme
Nguyen‐Van et al. New class of discrete‐time models for non‐linear systems through discretisation of integration gains
Zhang et al. General solution of linear fractional neutral differential difference equations
Wang et al. Exponential dichotomies of impulsive dynamic systems with applications on time scales
Bansal et al. Modified‐expansion method for finding exact wave solutions of the coupled Klein–Gordon–Schrödinger equation
Jator et al. Integrating Oscillatory General Second‐Order Initial Value Problems Using a Block Hybrid Method of Order 11
El-Zahar Piecewise Approximate Analytical Solutions of High‐Order Singular Perturbation Problems with a Discontinuous Source Term
Lai et al. Improving the accuracy of the charge simulation method for numerical conformal mapping
Ramezani Numerical analysis nonlinear multi‐term time fractional differential equation with collocation method via fractional B‐spline
Saadatmandi et al. A pseudospectral method for nonlinear Duffing equation involving both integral and non‐integral forcing terms
Kalyani et al. Solution of boundary value problems by approaching spline techniques
Jator et al. Block Hybrid k‐Step Backward Differentiation Formulas for Large Stiff Systems
Saeed et al. Haar wavelet operational matrix method for fractional oscillation equations
Costabile et al. Numerical solution of high order Bernoulli boundary value problems
Qasim et al. Treating transcendental functions in partial differential equations using the variational iteration method with Bernstein polynomials