Results 51 to 60 of about 549,018 (333)

Linear Algebra-Based Multivariable Controller Design for Gas Turbine Machines with State-Derivative Feedback

open access: yesMachines
This paper presents a linear algebra-based control algorithm for multivariable gas turbine systems using matrix polynomial theory and the Kronecker product to assign block roots (i.e., block eigenvectors with prescribed latent structure). State and state-
Belkacem Bekhiti   +3 more
doaj   +1 more source

A SURJECTIVITY PROBLEM FOR MATRICES AND NULL CONTROLLABILITY FOR DIFFERENCE AND DIFFERENTIAL MATRIX EQUATIONS [PDF]

open access: yesSurveys in Mathematics and its Applications, 2020
Let P be a complex polynomial. We prove that the associated polynomial matrix-valued function \tildeP is surjective if for each λ ∈ ℂ the polynomial P-λ has at least a simple zero. The null controllability for difference and differential matrix equations
Donal O'Regan, Constantin Buşe
doaj  

Symmetric Linearizations for Matrix Polynomials [PDF]

open access: yesSIAM Journal on Matrix Analysis and Applications, 2007
The aim of this paper is to gain new insight into the vector spaces of pencils \({\mathbf L}_1(P)\) and \({\mathbf L}_2(P)\), and their intersection \(\text{DL}(P)\), that arise in connection with the linearization of the polynomial eigenvalue problem \(P(\lambda)x = 0\).
Higham, Nicholas J.   +3 more
openaire   +1 more source

On Hermite-Hermite matrix polynomials [PDF]

open access: yesMathematica Bohemica, 2008
Summary: The definition of Hermite-Hermite matrix polynomials is introduced starting from the Hermite matrix polynomials. An explicit representation, a matrix recurrence relation for the Hermite-Hermite matrix polynomials are given and differential equations satisfied by them is presented.
Metwally, M. S.   +2 more
openaire   +1 more source

On the representation of solutions of delayed differential equations via Laplace transform

open access: yesElectronic Journal of Qualitative Theory of Differential Equations, 2016
In this paper, the unilateral Laplace transform is used to derive a closed-form formula for a solution of a system of nonhomogeneous linear differential equations with any finite number of constant delays and linear parts given by pairwise permutable ...
Michal Pospíšil, Frantisek Jaros
doaj   +1 more source

The Kalman-Yakubovich-Popov lemma in a behavioural framework [PDF]

open access: yes, 1997
The classical Kalman-Yakubovich-Popov Lemma provides a link between dissipativity of a system in state-space form and the solution to a linear matrix inequality.
Geest, Robert van der, Trentelman, Harry
core   +3 more sources

Triangularizing matrix polynomials

open access: yesLinear Algebra and its Applications, 2013
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Taslaman, Leo   +2 more
openaire   +1 more source

Characterization of Defect Distribution in an Additively Manufactured AlSi10Mg as a Function of Processing Parameters and Correlations with Extreme Value Statistics

open access: yesAdvanced Engineering Materials, EarlyView.
Predicting extreme defects in additive manufacturing remains a key challenge limiting its structural reliability. This study proposes a statistical framework that integrates Extreme Value Theory with advanced process indicators to explore defect–process relationships and improve the estimation of critical defect sizes. The approach provides a basis for
Muhammad Muteeb Butt   +8 more
wiley   +1 more source

Characteristic Polynomial and Eigenproblem of Triangular Matrix over Interval Min-Plus Algebra

open access: yesJTAM (Jurnal Teori dan Aplikasi Matematika)
A min-plus algebra is a linear algebra over the semiring R_ε', equipped with the operations “"⊕'=min" ” and “⊗=+”. In min-plus algebra, there is the concept of characteristic polynomial obtained from permanent of matrix.
Anita Dwi Rahmawati   +2 more
doaj   +1 more source

An Implementation of Image Secret Sharing Scheme Based on Matrix Operations

open access: yesMathematics, 2022
The image secret sharing scheme shares a secret image as multiple shadows. The secret image can be recovered from shadow images that meet a threshold number.
Zihan Ren, Peng Li, Xin Wang
doaj   +1 more source

Home - About - Disclaimer - Privacy