1.

Record Nr.

UNINA9910299666603321

Autore

Ebihara Yoshio

Titolo

S-Variable Approach to LMI-Based Robust Control / / by Yoshio Ebihara, Dimitri Peaucelle, Denis Arzelier

Pubbl/distr/stampa

London : , : Springer London : , : Imprint : Springer, , 2015

ISBN

1-4471-6606-X

Edizione

[1st ed. 2015.]

Descrizione fisica

1 online resource (260 p.)

Collana

Communications and Control Engineering, , 0178-5354

Disciplina

519

519.6

620

629.8

Soggetti

Automatic control

System theory

Mathematical optimization

Control and Systems Theory

Systems Theory, Control

Optimization

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Description based upon print version of record.

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Introduction -- Robust Performance Analysis of LTI Systems -- Descriptor Case and System Augmentation -- Robust State-Feedback Synthesis for LTI Systems -- Multi-Objective Controller Synthesis for LTI Systems -- Static Output-Feedback Synthesis -- Robust Performance Analysis of Discrete-Time Periodic Systems -- Robust Controller Synthesis of Periodic Discrete-Time Systems.

Sommario/riassunto

This book shows how the use of S-variables (SVs) in enhancing the range of problems that can be addressed with the already-versatile linear matrix inequality (LMI) approach to control can, in many cases, be put on a more unified, methodical footing. Beginning with the fundamentals of the SV approach, the text shows how the basic idea can be used for each problem (and when it should not be employed at all). The specific adaptations of the method necessitated by each problem are also detailed. The problems dealt with in the book have



the common traits that: analytic closed-form solutions are not available; and LMIs can be applied to produce numerical solutions with a certain amount of conservatism. Typical examples are robustness analysis of linear systems affected by parametric uncertainties and the synthesis of a linear controller satisfying multiple, often  conflicting, design specifications. For problems in which LMI methods produce conservative results, the SV approach is shown to achieve greater accuracy. The authors emphasize the simplicity and easy comprehensibility of the SV approach and show how it can be implemented in programs without difficulty so that its power becomes readily apparent. The S-Variable Approach to LMI-Based Robust Control is a useful reference for academic control researchers, applied mathematicians and graduate students interested in LMI methods and convex optimization and will also be of considerable assistance to practising control engineers faced with problems of conservatism in their systems and controllers.

2.

Record Nr.

UNINA9910484552103321

Titolo

Theory of Cryptography : 12th International Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part I / / edited by Yevgeniy Dodis, Jesper Buus Nielsen

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2015

ISBN

3-662-46494-2

Edizione

[1st ed. 2015.]

Descrizione fisica

1 online resource (XX, 660 p. 89 illus.)

Collana

Security and Cryptology, , 2946-1863 ; ; 9014

Disciplina

005.82

Soggetti

Cryptography

Data encryption (Computer science)

Data protection

Computer science

Algorithms

Computer science - Mathematics

Discrete mathematics

Cryptology

Data and Information Security

Theory of Computation

Discrete Mathematics in Computer Science



Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Foundations -- Symmetric Key -- Multiparty Computation -- Concurrent and Resettable Security -- Non-malleable Codes and Tampering -- Privacy Amplification -- Encryption and Key Exchange.

Sommario/riassunto

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concurrent and resettable security, non-malleable codes and tampering, privacy amplification, encryption an key exchange, pseudorandom functions and applications, proofs and verifiable computation, differential privacy, functional encryption, obfuscation.