280,487 research outputs found
Online identification of a two-mass system in frequency domain using a Kalman filter
Some of the most widely recognized online parameter estimation techniques used in different servomechanism are the extended Kalman filter (EKF) and recursive least squares (RLS) methods. Without loss of generality, these methods are based on a prior knowledge of the model structure of the system to be identified, and thus, they can be regarded as parametric identification methods. This paper proposes an on-line non-parametric frequency response identification routine that is based on a fixed-coefficient Kalman filter, which is configured to perform like a Fourier transform. The approach exploits the knowledge of the excitation signal by updating the Kalman filter gains with the known time-varying frequency of chirp signal. The experimental results demonstrate the effectiveness of the proposed online identification method to estimate a non-parametric model of the closed loop controlled servomechanism in a selected band of frequencies
PID control system analysis, design, and technology
Designing and tuning a proportional-integral-derivative
(PID) controller appears to be conceptually intuitive, but can
be hard in practice, if multiple (and often conflicting) objectives
such as short transient and high stability are to be achieved.
Usually, initial designs obtained by all means need to be adjusted
repeatedly through computer simulations until the closed-loop
system performs or compromises as desired. This stimulates
the development of "intelligent" tools that can assist engineers
to achieve the best overall PID control for the entire operating
envelope. This development has further led to the incorporation
of some advanced tuning algorithms into PID hardware modules.
Corresponding to these developments, this paper presents a
modern overview of functionalities and tuning methods in patents,
software packages and commercial hardware modules. It is seen
that many PID variants have been developed in order to improve
transient performance, but standardising and modularising PID
control are desired, although challenging. The inclusion of system
identification and "intelligent" techniques in software based PID
systems helps automate the entire design and tuning process to
a useful degree. This should also assist future development of
"plug-and-play" PID controllers that are widely applicable and
can be set up easily and operate optimally for enhanced productivity,
improved quality and reduced maintenance requirements
Wireless Interference Identification with Convolutional Neural Networks
The steadily growing use of license-free frequency bands requires reliable
coexistence management for deterministic medium utilization. For interference
mitigation, proper wireless interference identification (WII) is essential. In
this work we propose the first WII approach based upon deep convolutional
neural networks (CNNs). The CNN naively learns its features through
self-optimization during an extensive data-driven GPU-based training process.
We propose a CNN example which is based upon sensing snapshots with a limited
duration of 12.8 {\mu}s and an acquisition bandwidth of 10 MHz. The CNN differs
between 15 classes. They represent packet transmissions of IEEE 802.11 b/g,
IEEE 802.15.4 and IEEE 802.15.1 with overlapping frequency channels within the
2.4 GHz ISM band. We show that the CNN outperforms state-of-the-art WII
approaches and has a classification accuracy greater than 95% for
signal-to-noise ratio of at least -5 dB
Data compression for estimation of the physical parameters of stable and unstable linear systems
A two-stage method for the identification of physical system parameters from experimental data is presented. The first stage compresses the data as an empirical model which encapsulates the data content at frequencies of interest. The second stage then uses data extracted from the empirical model of the first stage within a nonlinear estimation scheme to estimate the unknown physical parameters. Furthermore, the paper proposes use of exponential data weighting in the identification of partially unknown, unstable systems so that they can be treated in the same framework as stable systems. Experimental data are used to demonstrate the efficacy of the proposed approach
On the Selection of Tuning Methodology of FOPID Controllers for the Control of Higher Order Processes
In this paper, a comparative study is done on the time and frequency domain
tuning strategies for fractional order (FO) PID controllers to handle higher
order processes. A new fractional order template for reduced parameter modeling
of stable minimum/non-minimum phase higher order processes is introduced and
its advantage in frequency domain tuning of FOPID controllers is also
presented. The time domain optimal tuning of FOPID controllers have also been
carried out to handle these higher order processes by performing optimization
with various integral performance indices. The paper highlights on the
practical control system implementation issues like flexibility of online
autotuning, reduced control signal and actuator size, capability of measurement
noise filtration, load disturbance suppression, robustness against parameter
uncertainties etc. in light of the above tuning methodologies.Comment: 27 pages, 10 figure
Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems
Voice Processing Systems (VPSes), now widely deployed, have been made
significantly more accurate through the application of recent advances in
machine learning. However, adversarial machine learning has similarly advanced
and has been used to demonstrate that VPSes are vulnerable to the injection of
hidden commands - audio obscured by noise that is correctly recognized by a VPS
but not by human beings. Such attacks, though, are often highly dependent on
white-box knowledge of a specific machine learning model and limited to
specific microphones and speakers, making their use across different acoustic
hardware platforms (and thus their practicality) limited. In this paper, we
break these dependencies and make hidden command attacks more practical through
model-agnostic (blackbox) attacks, which exploit knowledge of the signal
processing algorithms commonly used by VPSes to generate the data fed into
machine learning systems. Specifically, we exploit the fact that multiple
source audio samples have similar feature vectors when transformed by acoustic
feature extraction algorithms (e.g., FFTs). We develop four classes of
perturbations that create unintelligible audio and test them against 12 machine
learning models, including 7 proprietary models (e.g., Google Speech API, Bing
Speech API, IBM Speech API, Azure Speaker API, etc), and demonstrate successful
attacks against all targets. Moreover, we successfully use our maliciously
generated audio samples in multiple hardware configurations, demonstrating
effectiveness across both models and real systems. In so doing, we demonstrate
that domain-specific knowledge of audio signal processing represents a
practical means of generating successful hidden voice command attacks
- …