• Title/Summary/Keyword: identification technology

Search Result 4,347, Processing Time 0.037 seconds

Time-varying modal parameters identification of large flexible spacecraft using a recursive algorithm

  • Ni, Zhiyu;Wu, Zhigang;Wu, Shunan
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.17 no.2
    • /
    • pp.184-194
    • /
    • 2016
  • In existing identification methods for on-orbit spacecraft, such as eigensystem realization algorithm (ERA) and subspace method identification (SMI), singular value decomposition (SVD) is used frequently to estimate the modal parameters. However, these identification methods are often used to process the linear time-invariant system, and there is a lower computation efficiency using the SVD when the system order of spacecraft is high. In this study, to improve the computational efficiency in identifying time-varying modal parameters of large spacecraft, a faster recursive algorithm called fast approximated power iteration (FAPI) is employed. This approach avoids the SVD and can be provided as an alternative spacecraft identification method, and the latest modal parameters obtained can be applied for updating the controller parameters timely (e.g. the self-adaptive control problem). In numerical simulations, two large flexible spacecraft models, the Engineering Test Satellite-VIII (ETS-VIII) and Soil Moisture Active/Passive (SMAP) satellite, are established. The identification results show that this recursive algorithm can obtain the time-varying modal parameters, and the computation time is reduced significantly.

Useful Control Equations for Practitioners on Dynamic Process Control

  • Suzuki, Tomomichi;Ojima, Yoshikazu
    • International Journal of Quality Innovation
    • /
    • v.3 no.2
    • /
    • pp.174-182
    • /
    • 2002
  • System identification and controller formulation are essential in dynamic process control. In system identification, data for system identification are obtained, and then they are analyzed so that the system model of the process is built, identified, and diagnosed. In controller formulation, the control equation is derived based on the result of the system identification. There has been much theoretical research on system identification and controller formulation. These theories are very useful when they are appropriately applied. To our regret, however, these theories are not always effectively applied in practice because the engineers and the operators who manage the process often do not have the necessary understanding of required time series analysis methods. On the other hand, because of widespread use of statistical packages, system identification such as estimating ARMA models can be done with little understanding of time series analysis methods. Therefore, it might be said that the most theoretically difficult part in practice is the controller formulation. In this paper, lists of control equations are proposed as a useful tool for practitioners to use. The tool supports bridging the gap between theory and practice in dynamic process control. Also, for some models, the generalized control equations are obtained.

Meta learning-based open-set identification system for specific emitter identification in non-cooperative scenarios

  • Xie, Cunxiang;Zhang, Limin;Zhong, Zhaogen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1755-1777
    • /
    • 2022
  • The development of wireless communication technology has led to the underutilization of radio spectra. To address this limitation, an intelligent cognitive radio network was developed. Specific emitter identification (SEI) is a key technology in this network. However, in realistic non-cooperative scenarios, the system may detect signal classes beyond those in the training database, and only a few labeled signal samples are available for network training, both of which deteriorate identification performance. To overcome these challenges, a meta-learning-based open-set identification system is proposed for SEI. First, the received signals were pre-processed using bi-spectral analysis and a Radon transform to obtain signal representation vectors, which were then fed into an open-set SEI network. This network consisted of a deep feature extractor and an intrinsic feature memorizer that can detect signals of unknown classes and classify signals of different known classes. The training loss functions and the procedures of the open-set SEI network were then designed for parameter optimization. Considering the few-shot problems of open-set SEI, meta-training loss functions and meta-training procedures that require only a few labeled signal samples were further developed for open-set SEI network training. The experimental results demonstrate that this approach outperforms other state-of-the-art SEI methods in open-set scenarios. In addition, excellent open-set SEI performance was achieved using at least 50 training signal samples, and effective operation in low signal-to-noise ratio (SNR) environments was demonstrated.

Identification of AGE-precursors and AGE formation in glycation-induced BSA peptides

  • Ahmad, Waqar;Li, Lili;Deng, Yulin
    • BMB Reports
    • /
    • v.41 no.7
    • /
    • pp.516-522
    • /
    • 2008
  • The glycation of BSA leads to protein/peptide modifications that result in the formation of AGEs. AGEs react with the amino groups of N-terminal amino acid residues, particularly arginine and lysine residues. Enhanced AGE formation exists in the blood and tissues of diabetics, as well as in aging and other disorders. The Identification of AGEs is of great importance. Mass spectrometry has been applied to identify and structurally elucidate AGEs. Here, we report on the identification of AGE-peptides and AGE precursors based on relative mass changes as a result of specific AGE formation. HPLC-ESIMS, ESI-MS/MS, and the Mascot database were used. The relative mass changes due to the specific type of AGE formation were added to the identified peptides followed by a manual search of the glycated samples, which resulted in the identification of seven peptides for the formation of five AGEs, namely CML, pyrraline, imidazolone A, imidazolone B, and AFGP. Four glycated peptides (FPK, ECCDKPLLEK, IETMR, and HLVDEPQNLIK) were identified in the formation of AGE-precursors.

A cable tension identification technology using percussion sound

  • Wang, Guowei;Lu, Wensheng;Yuan, Cheng;Kong, Qingzhao
    • Smart Structures and Systems
    • /
    • v.29 no.3
    • /
    • pp.475-484
    • /
    • 2022
  • The loss of cable tension for civil infrastructure reduces structural bearing capacity and causes harmful deformation of structures. Currently, most of the structural health monitoring (SHM) approaches for cables rely on contact transducers. This paper proposes a cable tension identification technology using percussion sound, which provides a fast determination of steel cable tension without physical contact between cables and sensors. Notably, inspired by the concept of tensioning strings for piano tuning, this proposed technology predicts cable tension value by deep learning assisted classification of "percussion" sound from tapping a steel cable. To simulate the non-linear mapping of human ears to sound and to better quantify the minor changes in the high-frequency bands of the sound spectrum generated by percussions, Mel-frequency cepstral coefficients (MFCCs) were extracted as acoustic features to train the deep learning network. A convolutional neural network (CNN) with four convolutional layers and two global pooling layers was employed to identify the cable tension in a certain designed range. Moreover, theoretical and finite element methods (FEM) were conducted to prove the feasibility of the proposed technology. Finally, the identification performance of the proposed technology was experimentally investigated. Overall, results show that the proposed percussion-based technology has great potentials for estimating cable tension for in-situ structural safety assessment.

The Study on RFID Traceability System for Animal Identification (동물식별 개체이력정보 추적을 위한 RFID 검색 시스템 구현에 관한 연구)

  • Paek, Min-Ho;Ko, Sung-Seok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.31 no.1
    • /
    • pp.116-123
    • /
    • 2008
  • Food and Agriculture Organization (FAO) and many countries make an effort to conserve and utilization of animal genetic resources to prepare for our unpredictable future. In order to protect the customer and the producer from the animal diseases and unjust distribution, many country seek to appropriate solution. Among the solutions, RFID technology can be used as a basic technology, since this technology can be applied in the conservancy and utilization of animal genetic resources, object management for improved animal and traceability of animal's distribution flow. There are two main issues in making the efficient RFID environment. The first issue is the standardization of code system for object identification. International Organization for Standard (ISO) published the standard which regulates RFID of animal (ISO 11784 and ISO 11785). Based on these standards, many countries have tried to establish their national standard. In Korea, National Institute of Animal Science (NIAS) playa main role in establishing the standard of object identification code based on ISO 11784. Even though the standard format of object's identification is well established, the RFID system may not be operated well without the standardization of RFID network and related equipment. In Korea, National Internet Development Agency of Korea (NIDA) has proposed the RFID Network at 2006, which can be applied in the different kind of system at each phase. But, the implementation case of this RFID Network does not reported yet, since many company or agency who introduce RFID technology, implemented as an isolated individual system. In our study, we show that RFID network can be utilized for any kind of system at each phase, and propose the improvement point in order to be widely used.

A Slot Allocated Blocking Anti-Collision Algorithm for RFID Tag Identification

  • Qing, Yang;Jiancheng, Li;Hongyi, Wang;Xianghua, Zeng;Liming, Zheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2160-2179
    • /
    • 2015
  • In many Radio Frequency Identification (RFID) applications, the reader recognizes the tags within its scope repeatedly. For these applications, some algorithms such as the adaptive query splitting algorithm (AQS) and the novel semi-blocking AQS (SBA) were proposed. In these algorithms, a staying tag retransmits its ID to the reader to be identified, even though the ID of the tag is stored in the reader's memory. When the length of tag ID is long, the reader consumes a long time to identify the staying tags. To overcome this deficiency, we propose a slot allocated blocking anti-collision algorithm (SABA). In SABA, the reader assigns a unique slot to each tag in its range by using a slot allocation mechanism. Based on the allocated slot, each staying tag only replies a short data to the reader in the identification process. As a result, the amount of data transmitted by the staying tags is reduced greatly and the identification rate of the reader is improved effectively. The identification rate and the data amount transmitted by tags of SABA are analyzed theoretically and verified by various simulations. The simulation and analysis results show that the performance of SABA is superior to the existing algorithms significantly.

Trend and future prospect on the development of technology for electronic security system (기계경비시스템의 기술 변화추세와 개발전망)

  • Chung, Tae-Hwang;So, Sung-Young
    • Korean Security Journal
    • /
    • no.19
    • /
    • pp.225-244
    • /
    • 2009
  • Electronic security system is composed mainly of electronic-information-communication device, so system technology, configuration and management of the electronic security system could be affected by the change of information-communication environment. This study is to propose the future prospect on the development of technique for electronic security system through the analysis of the trend and the actual condition on the development of technique. This study is based on literature study and interview with user and provider of electronic security system, also survey was carried out by system provider and members of security integration company to come up with more practical result. Hybrid DVR technology that has multi-function such as motion detection, target tracking and image identification is expected to be developed. And 'Embedded IP camera' technology that internet server and image identification software are built in. Those technologies could change the configuration and management of CCTV system. Fingerprint identification technology and face identification technology are continually developed to get more reliability, but continual development of surveillance and three-dimension identification technology for more efficient face identification system is needed. As radio identification and tracking function of RFID is appreciated as very useful for access control system, hardware and software of RFID technology is expected to be developed, but government's support for market revitalization is necessary. Behavior pattern identification sensor technology is expected to be developed and could replace passive infrared sensor that cause system error, giving security guard firm confidence for response. The principle of behavior pattern identification is similar to image identification, so those two technology could be integrated with tracking technology and radio identification technology of RFID for total monitoring system. For more efficient electronic security system, middle-ware's role is very important to integrate the technology of electronic security system, this could make possible of installing the integrated security system.

  • PDF

THE PROBLEMS OF MODELLING AND IDENTIFICATION OF SOURCES OF NOISE IN MACHINES

  • Zbigniew Dabrowski;Stanilaw Radkowski
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1994.06a
    • /
    • pp.758-763
    • /
    • 1994
  • The work discusses the problems of modelling of the process of acoustic signal generation in machines. We have pointed out that in the task of minimizing of both moise and vibration, the key problem is identification of sources and paths of propagation, both in terms of their location and of definition of their characteristic features. Properly conducted identification makes possible the use of relatively simple mathematical models and this fact is particularly important for a broad application of the proposed methods in practice.

  • PDF

Automatic Identification of Business Services Using EA Ontology (EA 온톨로지 기반 비즈니스 서비스 자동 식별방안)

  • Jeong, Chan-Ki;Hwang, Sang-Kyu
    • Journal of Information Technology Services
    • /
    • v.9 no.3
    • /
    • pp.179-191
    • /
    • 2010
  • Service identification and composition is one of the key characteristics for a successful Service-Oriented Computing, being receiving a lot of attention from researchers in recent years. In the Service-Oriented Analysis, the identification of business services has to be preceded before application services are identified. Most approaches addressing the derivation of business services are based on heuristic methods and human experts. The manual identification of business services is highly expensive and ambiguous task, and it may result in the service design with bad quality because of errors and misconception. Although a few of approaches of automatic service identification are proposed, most of them are in focus on technical architectures and application services. In this paper, we propose a model on the automatic identification of business services by horizontal and vertical service alignment using Enterprise Architecture as an ontology. We verify the effectiveness of the proposed model of business services identification through a case study based on Department of Defense Enterprise Architecture.