Your English writing platform
Free sign upSuggestions(1)
Exact(2)
Two main approaches of model-driven engineering (MDE) are suitable to face these problems; domain specific modeling languages (DSML) and model transformation methods.
Over the past decades, the problem of asymptotic stability analysis for (1.1) has been discussed in [14, 21, 29, 30, 34, 35] by using several model transformation methods and the Lyapunov-Krasovskii functional approach, while the problem of exponential stability analysis has been studied with the use of the model transformation technique and the Lyapunov-Krasovskii functional approach in [34].
Similar(58)
To facilitate the controller design, a model transformation method is proposed to transform the LTV system into a linear time-invariant (LTI) system with norm-bounded uncertainties.
In the derivation process, neither model transformation method nor free-weighting matrix approach is used.
In [7], the results are derived without the use of the model transformation method and the bounding technique, while the authors have used the model transformation method, radially unboundedness, and the Lyapunov-Krasovskii functional approach in [23].
Han [5] obtained delay-dependent stability conditions for uncertain neutral time-varying system by model transformation method, due to cross terms of model transformation, results are less conservative.
This algorithm utilizes cepstral mean subtraction (CMS) normalization ability and principal component analysis (PCA) compression and de-correlation capability in the combination with PMC model transformation method.
Many methods have been proposed to reduce the conservatism of the stability criteria, such as the model transformation method, the free-weighting-matrix approach, constructing novel Lyapunov functionals method, the delay decomposition technique, and the weighting-matrix decomposition method.
From the model transformation method, we have the Leibniz-Newton formula of the form begin{aligned} &0=x t -x bigl(t-tau(t) bigr)- int_{t-tau(t)}^{t}dot{x}(s),ds, end{aligned} (3.1) begin{aligned} &0=x t -x x bigl t-taumatau(t) bigl t-tau_{t-gammatau(t)}^{t}dot{x}(s),ds, end{aligned} (3.2) where γ is a given positive real constant.
Simulations to confirm the feasibility of the proposed models and transformation methods are presented.
In this work we present a Model Driven Engineering methodology that addresses validation and verification of security requirements by using formal methods and model transformation algorithms.
Write better and faster with AI suggestions while staying true to your unique style.
Since I tried Ludwig back in 2017, I have been constantly using it in both editing and translation. Ever since, I suggest it to my translators at ProSciEditing.
Justyna Jupowicz-Kozak
CEO of Professional Science Editing for Scientists @ prosciediting.com