13 research outputs found

    New structures and algorithms for adaptive system identification and channel equalization

    Get PDF
    The main drawback of the ADF is that it takes lot of iteration and fails to identify nonlinear systems. BAF converges fast while maintaining the same performance as ADF but its performance degrades at nonlinear conditions.In this thesis we propose an ANN, which provides better and faster converges when employed for identifying nonlinear systems. This network employs chebyschev based nonlinear inputs updated with the RLS algorithm. Through extensive computer simulation it is demonstrated that CFLANN updated with RLS is a better candidate compared to FLANN and MLP in terms of less complex structure, less number of input simple needed and does accurate identification

    Adaptive non linear system identification and channel equalization usinf functional link artificial neural network

    Get PDF
    In system theory, characterization and identification are fundamental problems. When the plant behavior is completely unknown, it may be characterized using certain model and then, its identification may be carried out with some artificial neural networks(ANN) like multilayer perceptron(MLP) or functional link artificial neural network(FLANN) using some learning rules such as back propagation (BP) algorithm. They offer flexibility, adaptability and versatility, so that a variety of approaches may be used to meet a specific goal, depending upon the circumstances and the requirements of the design specifications. The primary aim of the present thesis is to provide a framework for the systematic design of adaptation laws for nonlinear system identification and channel equalization. While constructing an artificial neural network the designer is often faced with the problem of choosing a network of the right size for the task. The advantages of using a smaller neural network are cheaper cost of computation and better generalization ability. However, a network which is too small may never solve the problem, while a larger network may even have the advantage of a faster learning rate. Thus it makes sense to start with a large network and then reduce its size. For this reason a Genetic Algorithm (GA) based pruning strategy is reported. GA is based upon the process of natural selection and does not require error gradient statistics. As a consequence, a GA is able to find a global error minimum. Transmission bandwidth is one of the most precious resources in digital communication systems. Communication channels are usually modeled as band-limited linear finite impulse response (FIR) filters with low pass frequency response. When the amplitude and the envelope delay response are not constant within the bandwidth of the filter, the channel distorts the transmitted signal causing intersymbol interference (ISI). The addition of noise during propagation also degrades the quality of the received signal. All the signal processing methods used at the receiver's end to compensate the introduced channel distortion and recover the transmitted symbols are referred as channel equalization techniques.When the nonlinearity associated with the system or the channel is more the number of branches in FLANN increases even some cases give poor performance. To decrease the number of branches and increase the performance a two stage FLANN called cascaded FLANN (CFLANN) is proposed.This thesis presents a comprehensive study covering artificial neural network (ANN) implementation for nonlinear system identification and channel equalization. Three ANN structures, MLP, FLANN, CFLANN and their conventional gradient-descent training methods are extensively studied. Simulation results demonstrate that FLANN and CFLANN methods are directly applicable for a large class of nonlinear control systems and communication problems

    Application of Wilcoxon Norm for increased Outlier Insensitivity in Function Approximation Problems

    Get PDF
    In system theory, characterization and identification are fundamental problems. When the plant behavior is completely unknown, it may be characterized using certain model and then, its identification may be carried out with some artificial neural networks(ANN) (like multilayer perceptron(MLP) or functional link artificial neural network(FLANN) ) or Radial Basis Functions(RBF) using some learning rules such as the back propagation (BP) algorithm. They offer flexibility, adaptability and versatility, for the use of a variety of approaches to meet a specific goal, depending upon the circumstances and the requirements of the design specifications. The first aim of the present thesis is to provide a framework for the systematic design of adaptation laws for nonlinear system identification and channel equalization. While constructing an artificial neural network or a radial basis function neural network, the designer is often faced with the problem of choosing a network of the right size for the task. Using a smaller neural network decreases the cost of computation and increases generalization ability. However, a network which is too small may never solve the problem, while a larger network might be able to. Transmission bandwidth being one of the most precious resources in digital communication, Communication channels are usually modeled as band-limited linear finite impulse response (FIR) filters with low pass frequency response

    Towards Authentication of IoMT Devices via RF Signal Classification

    Get PDF
    The increasing reliance on the Internet of Medical Things (IoMT) raises great concern in terms of cybersecurity, either at the device’s physical level or at the communication and transmission level. This is particularly important as these systems process very sensitive and private data, including personal health data from multiple patients such as real-time body measurements. Due to these concerns, cybersecurity mechanisms and strategies must be in place to protect these medical systems, defending them from compromising cyberattacks. Authentication is an essential cybersecurity technique for trustworthy IoMT communications. However, current authentication methods rely on upper-layer identity verification or key-based cryptography which can be inadequate to the heterogeneous Internet of Things (IoT) environments. This thesis proposes the development of a Machine Learning (ML) method that serves as a foundation for Radio Frequency Fingerprinting (RFF) in the authentication of IoMT devices in medical applications to improve the flexibility of such mechanisms. This technique allows the authentication of medical devices by their physical layer characteristics, i.e. of their emitted signal. The development of ML models serves as the foundation for RFF, allowing it to evaluate and categorise the released signal and enable RFF authentication. Multiple feature take part of the proposed decision making process of classifying the device, which then is implemented in a medical gateway, resulting in a novel IoMT technology.A confiança crescente na IoMT suscita grande preocupação em termos de cibersegurança, quer ao nível físico do dispositivo quer ao nível da comunicação e ao nível de transmissão. Isto é particularmente importante, uma vez que estes sistemas processam dados muito sensíveis e dados, incluindo dados pessoais de saúde de diversos pacientes, tais como dados em tempo real de medidas do corpo. Devido a estas preocupações, os mecanismos e estratégias de ciber-segurança devem estar em vigor para proteger estes sistemas médicos, defendendo-os de ciberataques comprometedores. A autenticação é uma técnica essencial de ciber-segurança para garantir as comunicações em sistemas IoMT de confiança. No entanto, os métodos de autenticação atuais focam-se na verificação de identidade na camada superior ou criptografia baseada em chaves que podem ser inadequadas para a ambientes IoMT heterogéneos. Esta tese propõe o desenvolvimento de um método de ML que serve como base para o RFF na autenticação de dispositivos IoMT para melhorar a flexibilidade de tais mecanismos. Isto permite a autenticação dos dispositivos médicos pelas suas características de camada física, ou seja, a partir do seu sinal emitido. O desenvolvimento de modelos de ML serve de base para o RFF, permitindo-lhe avaliar e categorizar o sinal libertado e permitir a autenticação do RFF. Múltiplas features fazem parte do processo de tomada de decisão proposto para classificar o dispositivo, que é implementada num gateway médico, resultando numa nova tecnologia IoMT

    Methodology for utilising prior knowledge in constructing data-based process monitoring systems with an application to a dearomatisation process

    Get PDF
    Global competition is forcing the process industry to optimise the production processes. One key factor in optimisation is effective process state monitoring and fault detection. Another motivator to improve process monitoring systems are the substantial losses of revenue resulting from abnormal process conditions. It has been estimated that the petrochemical industry in the US alone loses 20 billion dollars per year because of unoptimal handling of abnormal process situations. Traditionally, the monitoring systems have been based on first principle models, constructed by specialists with process specific expertise. In contrast, the use of data-based modelling methods require less expertise and offers the possibilities to build and update the monitoring models in a short period of time, thus allowing more efficient development of monitoring systems. The aims of this thesis are to augment data-driven modelling with existing process knowledge, to combine different data-based modelling methods, and to utilise calculated variables in modelling in order to improve the accuracy of fault detection and identification (FDI) and to provide all necessary diagnostic information for fault tolerant control. The suggested improvements are included in a methodology for setting up FDI systems. The methodology has been tested by building FDI systems for detecting faults in two online quality analysers in a simulated and in a real industrial dearomatisation process at the Naantali oil refinery (Neste Oil Oyj). In developing an FDI system, background information about the user requirements for the monitoring system is first acquired. The information is then analysed and suitable modelling methods are selected according to the guidelines given in the methodology. Second, the process data are prepared for the modelling methods and augmented with appropriate calculated variables. Next, the input variable sets are determined with the introduced method and the models are constructed. After the estimation accuracy of the models is validated, the values of the fault detection parameters are determined. Finally, the fault detection performance of the system is tested. The system was evaluated during a period of one month at the Naantali refinery in 2007. The monitoring system was able to detect all the introduced analyser faults and to provide the information needed for a fault tolerant control system, thus validating the methodology. The effects of a number of suggested improvements in data-based modelling are analysed by means of a comparison study

    Space Communications: Theory and Applications. Volume 3: Information Processing and Advanced Techniques. A Bibliography, 1958 - 1963

    Get PDF
    Annotated bibliography on information processing and advanced communication techniques - theory and applications of space communication

    The Fourier analysis of saccadic eye movements

    Get PDF
    This thesis examines saccadic eye movements in the frequency domain and develops sensitive tools for characterising their dynamics. It tests a variety of saccade models and provides the first strong empirical evidence that saccades are time-optimal. By enabling inferences on the neural command, it also allows for better clinical differentiation of abnormalities and the evaluation of putative mechanisms for the development of congenital nystagmus. Chapters 3 and 4 show how Fourier transforms reveal sharp minima in saccade frequency spectra, which are robust to instrument noise. The minima allow models based purely on the output trajectory, purely on the neural input, or both, to be directly compared and distinguished. The standard, most commonly accepted model based on bang-bang control theory is discounted. Chapter 5 provides the first empirical evidence that saccades are time-optimal by demonstrating that saccade bandwidths overlap across amplitude onto a single slope at high frequencies. In Chapter 6, the overlap also allows optimal (Wiener) filtering in the frequency domain without a priori assumptions. Deconvolution of the aggregate neural driving signal is then possible for current models of the oculomotor plant. The final two chapters apply these Fourier techniques to the quick phases of physiological (optokinetic) nystagmus and of pathological (congenital) nystagmus. These quick phases are commonly assumed to be saccadic in origin. This assumption is thoroughly tested and found to hold, but with subtle differences implying that the smooth pursuit system interacts with the saccade system during the movement. This interaction is taken into account in Chapter 8 in the assessment of congenital nystagmus quick phases, which are found to be essentially normal. Congenital nystagmus models based on saccadic abnormalities are appraised

    Challenges and Open Questions of Machine Learning in Computer Security

    Get PDF
    This habilitation thesis presents advancements in machine learning for computer security, arising from problems in network intrusion detection and steganography. The thesis put an emphasis on explanation of traits shared by steganalysis, network intrusion detection, and other security domains, which makes these domains different from computer vision, speech recognition, and other fields where machine learning is typically studied. Then, the thesis presents methods developed to at least partially solve the identified problems with an overall goal to make machine learning based intrusion detection system viable. Most of them are general in the sense that they can be used outside intrusion detection and steganalysis on problems with similar constraints. A common feature of all methods is that they are generally simple, yet surprisingly effective. According to large-scale experiments they almost always improve the prior art, which is likely caused by being tailored to security problems and designed for large volumes of data. Specifically, the thesis addresses following problems: anomaly detection with low computational and memory complexity such that efficient processing of large data is possible; multiple-instance anomaly detection improving signal-to-noise ration by classifying larger group of samples; supervised classification of tree-structured data simplifying their encoding in neural networks; clustering of structured data; supervised training with the emphasis on the precision in top p% of returned data; and finally explanation of anomalies to help humans understand the nature of anomaly and speed-up their decision. Many algorithms and method presented in this thesis are deployed in the real intrusion detection system protecting millions of computers around the globe

    Software and hardware implementation techniques for digital communications-related algorithms

    Get PDF
    There are essentially three areas addressed in the body of this thesis. (a) The first is a theoretical investigation into the design and development of a practically realizable implementation of a maximum-likelihood detection process to deal with digital data transmission over HF radio links. These links exhibit multipath properties with delay spreads that can easily extend over 12 to 15 milliseconds. The project was sponsored by the Ministry of Defence through the auspices of the Science and Engineering Research Council. The primary objective was to transmit voice band data at a minimum rate of 2.4 kb/s continuously for long periods of time during the day or night. Computer simulation models of HF propagation channels were created to simulate atmospheric and multipath effects of transmission from London to Washington DC, Ankara, and as far as Melbourne, Australia. Investigations into HF channel estimation are not the subject of this thesis. The detection process assumed accurate knowledge of the channel. [Continues.
    corecore