Search results for: identification friend or foe
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2918

Search results for: identification friend or foe

2918 Double Layer Security Model for Identification Friend or Foe

Authors: Buse T. Aydın, Enver Ozdemir

Abstract:

In this study, a double layer authentication scheme between the aircraft and the Air Traffic Control (ATC) tower is designed to prevent any unauthorized aircraft from introducing themselves as friends. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or foe according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as a friend. In this method, even if embedded key is captured by the enemy aircraft, without the information of the second layer, the enemy can easily be determined. Overall, in this work, we present a more reliable system by adding a physical layer in the authentication process.

Keywords: ADS-B, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 124
2917 Relations between Psychological Adjustment and Perceived Parental, Teacher and Best Friend Acceptance among Bangladeshi Adolescents

Authors: Tariqul Islam, Shaheen Mollah

Abstract:

The study's main objective is to assess the relationship between psychological adjustment and parental acceptance-rejection, teacher acceptance-rejection, and best friend acceptance-rejection among secondary school students. This study was conducted on a sample of 300 (6th through 10th-grade students) recruited from over ten schools in Dhaka. While the schools were selected purposively, the respondents within each school were selected conveniently. The collected data were analyzed using Pearson product-moment correlation, hierarchical regression, and simultaneous regression analysis. The results showed that psychological adjustment is positively correlated with paternal, maternal, teacher, and best friend acceptance. The paternal acceptance was significantly connected with maternal acceptance. The teacher and best friend acceptance are correlated substantially with paternal and maternal acceptance. The hierarchical multiple regressions indicated that maternal, paternal, teacher, and best friend acceptance-rejection contributed significantly to students' psychological adjustment. The results revealed substantial independent contributions of maternal, paternal, teacher, and best friend acceptance on the students' psychological adjustment. The simultaneous regression analysis indicates that the maternal and best friend acceptances (but not paternal acceptance) were significant predictors of psychological adjustments. It showed that 41.7% variability in psychological adjustment could be explained by paternal, maternal, and best friend acceptance. The findings of the present study are exciting. They may contribute to developing insight in parents and best friends for behaving properly with their offspring and friend, respectively, for better psychological adjustment.

Keywords: adjustment, parenting, rejection, acceptance

Procedia PDF Downloads 114
2916 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast

Authors: Buse T. Aydin, Enver Ozdemir

Abstract:

An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.

Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 145
2915 Place, Space and Asian/Hawaiian Identities in Gary Pak's My Friend Kammy and Ishmael Reed or Me

Authors: Jaroslav Kušnír

Abstract:

Hawaiian literature in English has been researched more intensively in the past decades, mostly in the context of Asian American literature. In his collection of stories Language of the Gecko's and Other Stories, Hawaiian author Gary Pak explores complex relationships between Asian, Native Hawaiian, and American characters living mostly in Hawaii. Through a depiction of these complex relationships, Pak also explores the interaction between different cultures in Hawaii as well as the formation of Asian/Hawaiian identity in the modern world. Based on a comparative approach and close analysis method, this paper will explore the role of place and its historical and cultural background in the formation of modern Asian/Hawaiian cultural identity as manifested in Pak's stories My Friend Kammy and Ishmael Reed or Me. At the same time, through the use of Bill Ashcroft´s concept of transnation, the author of this paper will analyze Pak's depiction of the formation of the cultural identity of characters from Gary Pak's stories My Friend Kammy and Ishmael Reed or Me, which are, in the author of this paper´s view, the characters close to the concept of Ashcroft's transnation which makes them different from traditional cosmopolitan or diasporic characters.

Keywords: culture, cultural identity, Hawaiian identity, Hawaiian literature, place, transnation

Procedia PDF Downloads 39
2914 Analysis of Casting Call Process in Thai Film Industry

Authors: Panprae Bunyapukkna

Abstract:

The purpose of this research is to analyze the process that most of the Thai film industries commonly use in order to find the right cast to play the role. The result proved that most of the low-budget film productions find the cast by asking from the crew’s friends or friend of friend. Therefore, finding the cast in low-budget film productions normally has only few people shown up for the auditions and sometimes either none of them has acting knowledge or their appearances do not match the character. However, since most of the low-budget film productions do not have much ability to find members of the cast, thus some of them still will be selected. On the other hand, most of the high-budget film productions use modeling companies to find the cast for them. However, most of modeling agencies in Thailand seek and select their cast members from the cast’s appearances or talents rather than the knowledge of acting.

Keywords: casting for film, modeling business, acting, film, performing arts, film business

Procedia PDF Downloads 400
2913 Disability, Stigma and In-Group Identification: An Exploration across Different Disability Subgroups

Authors: Sharmila Rathee

Abstract:

Individuals with disability/ies often face negative attitudes, discrimination, exclusion, and inequality of treatment due to stigmatization and stigmatized treatment. While a significant number of studies in field of stigma suggest that group-identification has positive consequences for stigmatized individuals, ironically very miniscule empirical work in sight has attempted to investigate in-group identification as a coping measure against stigma, humiliation and related experiences among disability group. In view of death of empirical research on in-group identification among disability group, through present work, an attempt has been made to examine the experiences of stigma, humiliation, and in-group identification among disability group. Results of the study suggest that use of in-group identification as a coping strategy is not uniform across members of disability group and degree of in-group identification differs across different sub-groups of disability groups. Further, in-group identification among members of disability group depends on variables like degree and impact of disability, factors like onset of disability, nature, and visibility of disability, educational experiences and resources available to deal with disabling conditions.

Keywords: disability, stigma, in-group identification, social identity

Procedia PDF Downloads 284
2912 Forensic Challenges in Source Device Identification for Digital Videos

Authors: Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Suleman Khan

Abstract:

Video source device identification has become a problem of concern in numerous domains especially in multimedia security and digital investigation. This is because videos are now used as evidence in legal proceedings. Source device identification aim at identifying the source of digital devices using the content they produced. However, due to affordable processing tools and the influx in digital content generating devices, source device identification is still a major problem within the digital forensic community. In this paper, we discuss source device identification for digital videos by identifying techniques that were proposed in the literature for model or specific device identification. This is aimed at identifying salient open challenges for future research.

Keywords: video forgery, source camcorder, device identification, forgery detection

Procedia PDF Downloads 595
2911 Identification of Dynamic Friction Model for High-Precision Motion Control

Authors: Martin Goubej, Tomas Popule, Alois Krejci

Abstract:

This paper deals with experimental identification of mechanical systems with nonlinear friction characteristics. Dynamic LuGre friction model is adopted and a systematic approach to parameter identification of both linear and nonlinear subsystems is given. The identification procedure consists of three subsequent experiments which deal with the individual parts of plant dynamics. The proposed method is experimentally verified on an industrial-grade robotic manipulator. Model fidelity is compared with the results achieved with a static friction model.

Keywords: mechanical friction, LuGre model, friction identification, motion control

Procedia PDF Downloads 382
2910 Identification of Nonlinear Systems Structured by Hammerstein-Wiener Model

Authors: A. Brouri, F. Giri, A. Mkhida, A. Elkarkri, M. L. Chhibat

Abstract:

Standard Hammerstein-Wiener models consist of a linear subsystem sandwiched by two memoryless nonlinearities. Presently, the linear subsystem is allowed to be parametric or not, continuous- or discrete-time. The input and output nonlinearities are polynomial and may be noninvertible. A two-stage identification method is developed such the parameters of all nonlinear elements are estimated first using the Kozen-Landau polynomial decomposition algorithm. The obtained estimates are then based upon in the identification of the linear subsystem, making use of suitable pre-ad post-compensators.

Keywords: nonlinear system identification, Hammerstein-Wiener systems, frequency identification, polynomial decomposition

Procedia PDF Downloads 475
2909 Children’s Concept of Forgiveness

Authors: Lida Landicho, Analiza R. Adarlo, Janine Mae V. Corpuz, Joan C. Villanueva

Abstract:

Testing the idea that the process of forgiveness is intrinsically different across diverse relationships, this study examined whether forgiveness can already be facilitated by children ages 4-6. Two different intervention sessions which consists of 40 children (half heard stories about unfair blame and half heard stories about a double standard (between subjects variable) was completed. Investigators performed experimental analyses to examine the role of forgiveness in social and familial context. Results indicated that forgiveness can already be facilitated by children. Children see scenarios on double standard to be more unfair than normal scenarios (Scenario 2 (double standard) (M=7.54) Scenario 1 (unfair blame) (M=4.50), Scenario 4 (double standard) (M=7.) Scenario 3 (getting blamed for something the friend did) (M=6.80)p <.05.The findings confirmed that children were generally willing to grant forgiveness to a mother even though she was unfair, but less so to a friend. Correlations between sex, age and forgiveness were analyzed. Significant relationships was found on scenarios presented and caring task scores (rxy= -.314).Their tendency to forgive was related to dispositional and situational factors.

Keywords: forgiveness, situational and dispositional factors, familial context, social context

Procedia PDF Downloads 391
2908 Structural Damage Detection Using Sensors Optimally Located

Authors: Carlos Alberto Riveros, Edwin Fabián García, Javier Enrique Rivero

Abstract:

The measured data obtained from sensors in continuous monitoring of civil structures are mainly used for modal identification and damage detection. Therefore when modal identification analysis is carried out the quality in the identification of the modes will highly influence the damage detection results. It is also widely recognized that the usefulness of the measured data used for modal identification and damage detection is significantly influenced by the number and locations of sensors. The objective of this study is the numerical implementation of two widely known optimum sensor placement methods in beam-like structures

Keywords: optimum sensor placement, structural damage detection, modal identification, beam-like structures.

Procedia PDF Downloads 400
2907 Self-Tuning Robot Control Based on Subspace Identification

Authors: Mathias Marquardt, Peter Dünow, Sandra Baßler

Abstract:

The paper describes the use of subspace based identification methods for auto tuning of a state space control system. The plant is an unstable but self balancing transport robot. Because of the unstable character of the process it has to be identified from closed loop input-output data. Based on the identified model a state space controller combined with an observer is calculated. The subspace identification algorithm and the controller design procedure is combined to a auto tuning method. The capability of the approach was verified in a simulation experiments under different process conditions.

Keywords: auto tuning, balanced robot, closed loop identification, subspace identification

Procedia PDF Downloads 327
2906 Distributed Perceptually Important Point Identification for Time Series Data Mining

Authors: Tak-Chung Fu, Ying-Kit Hung, Fu-Lai Chung

Abstract:

In the field of time series data mining, the concept of the Perceptually Important Point (PIP) identification process is first introduced in 2001. This process originally works for financial time series pattern matching and it is then found suitable for time series dimensionality reduction and representation. Its strength is on preserving the overall shape of the time series by identifying the salient points in it. With the rise of Big Data, time series data contributes a major proportion, especially on the data which generates by sensors in the Internet of Things (IoT) environment. According to the nature of PIP identification and the successful cases, it is worth to further explore the opportunity to apply PIP in time series ‘Big Data’. However, the performance of PIP identification is always considered as the limitation when dealing with ‘Big’ time series data. In this paper, two distributed versions of PIP identification based on the Specialized Binary (SB) Tree are proposed. The proposed approaches solve the bottleneck when running the PIP identification process in a standalone computer. Improvement in term of speed is obtained by the distributed versions.

Keywords: distributed computing, performance analysis, Perceptually Important Point identification, time series data mining

Procedia PDF Downloads 392
2905 Genetic Algorithms for Parameter Identification of DC Motor ARMAX Model and Optimal Control

Authors: A. Mansouri, F. Krim

Abstract:

This paper presents two techniques for DC motor parameters identification. We propose a numerical method using the adaptive extensive recursive least squares (AERLS) algorithm for real time parameters estimation. This algorithm, based on minimization of quadratic criterion, is realized in simulation for parameters identification of DC motor autoregressive moving average with extra inputs (ARMAX). As advanced technique, we use genetic algorithms (GA) identification with biased estimation for high dynamic performance speed regulation. DC motors are extensively used in variable speed drives, for robot and solar panel trajectory control. GA effectiveness is derived through comparison of the two approaches.

Keywords: ARMAX model, DC motor, AERLS, GA, optimization, parameter identification, PID speed regulation

Procedia PDF Downloads 348
2904 Effects of Handheld Video Games on Interpersonal Relationships: A Two-Wave Panel Study on Elementary School Students

Authors: Kanae Suzuki

Abstract:

Handheld video games are popular communication tools among Japanese elementary school students today. This study aims to examine the effects of the use of handheld video games on interpersonal relationships of the students in real and virtual worlds. A two-wave panel survey was conducted for students of ten elementary schools at an interval of approximately six months. The survey questionnaire included questions about the average amount of time spent playing a handheld video game during the past one month, the frequency of communication with players during game play, and the interpersonal relationships, such as the number of real and virtual friends the students have. A multiple regression model was constructed for 324 students to examine causal relationships. The results indicated that the more frequently the students communicated with other players while playing games, the number of the real friends tended to increase. In contrast, no significant effect of the total time spent playing games was found on interpersonal relationships. The findings suggested that communication during game play is an important factor for improving interpersonal relationships of this age group.

Keywords: communication, real friend, social adjustment, virtual friend

Procedia PDF Downloads 466
2903 Machine Learning Based Gender Identification of Authors of Entry Programs

Authors: Go Woon Kwak, Siyoung Jun, Soyun Maeng, Haeyoung Lee

Abstract:

Entry is an education platform used in South Korea, created to help students learn to program, in which they can learn to code while playing. Using the online version of the entry, teachers can easily assign programming homework to the student and the students can make programs simply by linking programming blocks. However, the programs may be made by others, so that the authors of the programs should be identified. In this paper, as the first step toward author identification of entry programs, we present an artificial neural network based classification approach to identify genders of authors of a program written in an entry. A neural network has been trained from labeled training data that we have collected. Our result in progress, although preliminary, shows that the proposed approach could be feasible to be applied to the online version of entry for gender identification of authors. As future work, we will first use a machine learning technique for age identification of entry programs, which would be the second step toward the author identification.

Keywords: artificial intelligence, author identification, deep neural network, gender identification, machine learning

Procedia PDF Downloads 290
2902 Methodology for the Integration of Object Identification Processes in Handling and Logistic Systems

Authors: L. Kiefer, C. Richter, G. Reinhart

Abstract:

The uprising complexity in production systems due to an increasing amount of variants up to customer innovated products leads to requirements that hierarchical control systems are not able to fulfil. Therefore, factory planners can install autonomous manufacturing systems. The fundamental requirement for an autonomous control is the identification of objects within production systems. In this approach an attribute-based identification is focused for avoiding dose-dependent identification costs. Instead of using an identification mark (ID) like a radio frequency identification (RFID)-Tag, an object type is directly identified by its attributes. To facilitate that it’s recommended to include the identification and the corresponding sensors within handling processes, which connect all manufacturing processes and therefore ensure a high identification rate and reduce blind spots. The presented methodology reduces the individual effort to integrate identification processes in handling systems. First, suitable object attributes and sensor systems for object identification in a production environment are defined. By categorising these sensor systems as well as handling systems, it is possible to match them universal within a compatibility matrix. Based on that compatibility further requirements like identification time are analysed, which decide whether the combination of handling and sensor system is well suited for parallel handling and identification within an autonomous control. By analysing a list of more than thousand possible attributes, first investigations have shown, that five main characteristics (weight, form, colour, amount, and position of subattributes as drillings) are sufficient for an integrable identification. This knowledge limits the variety of identification systems and leads to a manageable complexity within the selection process. Besides the procedure, several tools, as an example a sensor pool are presented. These tools include the generated specific expert knowledge and simplify the selection. The primary tool is a pool of preconfigured identification processes depending on the chosen combination of sensor and handling device. By following the defined procedure and using the created tools, even laypeople out of other scientific fields can choose an appropriate combination of handling devices and sensors which enable parallel handling and identification.

Keywords: agent systems, autonomous control, handling systems, identification

Procedia PDF Downloads 150
2901 Frequency Identification of Wiener-Hammerstein Systems

Authors: Brouri Adil, Giri Fouad

Abstract:

The problem of identifying Wiener-Hammerstein systems is addressed in the presence of two linear subsystems of structure totally unknown. Presently, the nonlinear element is allowed to be noninvertible. The system identification problem is dealt by developing a two-stage frequency identification method such a set of points of the nonlinearity are estimated first. Then, the frequency gains of the two linear subsystems are determined at a number of frequencies. The method involves Fourier series decomposition and only requires periodic excitation signals. All involved estimators are shown to be consistent.

Keywords: Wiener-Hammerstein systems, Fourier series expansions, frequency identification, automation science

Procedia PDF Downloads 500
2900 Friend or Foe: Decoding the Legal Challenges Posed by Artificial Intellegence in the Era of Intellectual Property

Authors: Latika Choudhary

Abstract:

“The potential benefits of Artificial Intelligence are huge, So are the dangers.” - Dave Water. Artificial intelligence is one of the facet of Information technology domain which despite several attempts does not have a clear definition or ambit. However it can be understood as technology to solve problems via automated decisions and predictions. Artificial intelligence is essentially an algorithm based technology which analyses the large amounts of data and then solves problems by detecting useful patterns. Owing to its automated feature it will not be wrong to say that humans & AI have more utility than humans alone or computers alone.1 For many decades AI experienced enthusiasm as well as setbacks, yet it has today become part and parcel of our everyday life, making it convenient or at times problematic. AI and related technology encompass Intellectual Property in multiple ways, the most important being AI technology for management of Intellectual Property, IP for protecting AI and IP as a hindrance to the transparency of AI systems. Thus the relationship between the two is of reciprocity as IP influences AI and vice versa. While AI is a recent concept, the IP laws for protection or even dealing with its challenges are relatively older, raising the need for revision to keep up with the pace of technological advancements. This paper will analyze the relationship between AI and IP to determine how beneficial or conflictual the same is, address how the old concepts of IP are being stretched to its maximum limits so as to accommodate the unwanted consequences of the Artificial Intelligence and propose ways to mitigate the situation so that AI becomes the friend it is and not turn into a potential foe it appears to be.

Keywords: intellectual property rights, information technology, algorithm, artificial intelligence

Procedia PDF Downloads 58
2899 The Effect of Measurement Distribution on System Identification and Detection of Behavior of Nonlinearities of Data

Authors: Mohammad Javad Mollakazemi, Farhad Asadi, Aref Ghafouri

Abstract:

In this paper, we considered and applied parametric modeling for some experimental data of dynamical system. In this study, we investigated the different distribution of output measurement from some dynamical systems. Also, with variance processing in experimental data we obtained the region of nonlinearity in experimental data and then identification of output section is applied in different situation and data distribution. Finally, the effect of the spanning the measurement such as variance to identification and limitation of this approach is explained.

Keywords: Gaussian process, nonlinearity distribution, particle filter, system identification

Procedia PDF Downloads 479
2898 Evaluation of the Patient Identification Process in Healthcare Facilities in a Brazilian City Area

Authors: Carmen Silvia Gabriel, Maria de Fátima Paiva Brito, Mariane de Paula Candido, Vanessa Barato Oliveira

Abstract:

Patient identification is a necessary practice to ensure patient safety in any healthcare environment, including emergency care units, test laboratories, home care and clinics. The present study aimed to provide evidence that can effectively contribute to practices concerning patient identification. Its objective was to investigate patient identification in basic healthcare units through patient safety standards. To do so, a descriptive and non-experimental research outline study was carried out to inquire how patient identification takes place in a particular situation. All technical manager nurses from the chosen healthcare facilities were included in the sample for the study. Data was collected in September of 2014 after approval from the Committee of Ethics. All researched institutions fit the same profile: they’re public facilities for general care with observation beds. None of them has a wristband identification protocol or policy. Only one institution mentioned using some kind of visual identification; namely, body tags separated by colors according to the type of care, but it still does not apply the recommended tags by the Brazilian Ministry of Health. This study allowed the authors to acknowledge how important the commitment from the whole healthcare team in the patient identification process is and also acknowledge how necessary it is to implement institutional policies that may aid the healthcare units in this area to promote a quality and safe patient care.

Keywords: patient safety, identification, nursing, emergency care units

Procedia PDF Downloads 374
2897 Use of Digital Forensics for Sex Determination by Nasal Index

Authors: Ashwini Kumar, Vinod Nayak, Shankar M. Bakkannavar

Abstract:

The identification of humans is important in forensic investigations not only in living but also in dead, especially in cases of mass disorders. The procedure followed in dead known as post-mortem identification is a challenging task for the forensic pathologist. However, it is mandatory in terms of the law to fulfill the social norms. Many times, due to mutilation of body parts, the normal methods of identification using skeletal remains cannot be used in the process of identification. In such cases, the intact components of the skeletal remains or bony parts play an important role in identification. In these situations, digital forensics can come to our rescue. The authors hereby made a study for determination of sex based on nasal index by using (Big Bore 16 Slice) Multidetector Computed Tomography 2D Scans. The results are represented as a poster.

Keywords: sex determination, multidetector computed tomography, nasal index, digital forensic

Procedia PDF Downloads 365
2896 Rethinking the Role of Umeya Shokichi in the 1911 Revolution: Focusing on His Ties with Sun Yatsen in Hong Kong

Authors: Wai-Ming Ng

Abstract:

Nowadays Umeya Shokichi has been commonly regarded as the symbol of Sino-Japanese friendship and a close friend of Sun Yatsen. The images of Umeya have been largely built on contemporary political needs rather than historical sources. Based on Japanese and Chinese primary sources, this paper will challenge existing views of Umeya Shokichi in regard to his role in the 1911 Revolution and his relationship with Sun Yatsen. The study of Umeya Shokichi is handicapped by the accessibility and creditability of primary sources. Records of Umeya are largely kept in his family collection. Scholars are relatively difficult to get access to these materials. In addition, Umeya’s records can hardly be cross-checked as he is seldom mentioned in the writings of Sun Yatsen, Miyazaki Toten, James Cantlie and others. Heretofore, studies about Umeya are few and most are not critical enough to provide a balanced historical account of Umeya. This article will reexamine the role of Umeya Shokichi in the 1911 Revolution by highlighting his relationship with Sun Yatsen in Hong Kong from 1886 to 1911. It demonstrates that the role of Umeya in the 1911 Revolution and his relationship with Sun Yatsen are exaggerated by Chinese and Japanese officials as well as Umeya’s family members. The fact is that Sun did not play a direct role in the 1911 Revolution, not to mention his sponsors. To Sun, Umeya was perhaps merely one of his many sponsors rather than an intimate friend. This study will be a thought-provoking and iconoclast piece of scholarship based on critical reading of primary sources.

Keywords: Umeya Shokichi, Sun Yatsen, 1911 Revolution, Sino-Japanese friendship

Procedia PDF Downloads 169
2895 System Identification and Quantitative Feedback Theory Design of a Lathe Spindle

Authors: M. Khairudin

Abstract:

This paper investigates the system identification and design quantitative feedback theory (QFT) for the robust control of a lathe spindle. The dynamic of the lathe spindle is uncertain and time variation due to the deepness variation on cutting process. System identification was used to obtain the dynamics model of the lathe spindle. In this work, real time system identification is used to construct a linear model of the system from the nonlinear system. These linear models and its uncertainty bound can then be used for controller synthesis. The real time nonlinear system identification process to obtain a set of linear models of the lathe spindle that represents the operating ranges of the dynamic system. With a selected input signal, the data of output and response is acquired and nonlinear system identification is performed using Matlab to obtain a linear model of the system. Practical design steps are presented in which the QFT-based conditions are formulated to obtain a compensator and pre-filter to control the lathe spindle. The performances of the proposed controller are evaluated in terms of velocity responses of the the lathe machine spindle in corporating deepness on cutting process.

Keywords: lathe spindle, QFT, robust control, system identification

Procedia PDF Downloads 512
2894 Identification of Shocks from Unconventional Monetary Policy Measures

Authors: Margarita Grushanina

Abstract:

After several prominent central banks including European Central Bank (ECB), Federal Reserve System (Fed), Bank of Japan and Bank of England employed unconventional monetary policies in the aftermath of the financial crisis of 2008-2009 the problem of identification of the effects from such policies became of great interest. One of the main difficulties in identification of shocks from unconventional monetary policy measures in structural VAR analysis is that they often are anticipated, which leads to a non-fundamental MA representation of the VAR model. Moreover, the unconventional monetary policy actions may indirectly transmit to markets information about the future stance of the interest rate, which raises a question of the plausibility of the assumption of orthogonality between shocks from unconventional and conventional policy measures. This paper offers a method of identification that takes into account the abovementioned issues. The author uses factor-augmented VARs to increase the information set and identification through heteroskedasticity of error terms and rank restrictions on the errors’ second moments’ matrix to deal with the cross-correlation of the structural shocks.

Keywords: factor-augmented VARs, identification through heteroskedasticity, monetary policy, structural VARs

Procedia PDF Downloads 322
2893 UEMSD Risk Identification: Case Study

Authors: K. Sekulová, M. Šimon

Abstract:

The article demonstrates on a case study how it is possible to identify MSD risk. It is based on a dissertation risk identification model of occupational diseases formation in relation to the work activity that determines what risk can endanger workers who are exposed to the specific risk factors. It is evaluated based on statistical calculations. These risk factors are main cause of upper-extremities musculoskeletal disorders.

Keywords: case study, upper-extremity musculoskeletal disorders, ergonomics, risk identification

Procedia PDF Downloads 465
2892 An Improved Parameter Identification Method for Three Phase Induction Motor

Authors: Liang Zhao, Chong-quan Zhong

Abstract:

In order to improve the control performance of vector inverter, an improved parameter identification solution for induction motor is proposed in this paper. Dc or AC voltage is applied to the induction motor using the SVPWM through the inverter. Then stator resistance, stator leakage inductance, rotor resistance, rotor leakage inductance and mutual inductance are obtained according to the signal response. The discrete Fourier transform (DFT) is used to deal with the noise and harmonic. The impact on parameter identification caused by delays in the inverter switch tube, tube voltage drop and dead-time is avoided by effective compensation measures. Finally, the parameter identification experiment is conducted based on the vector inverter which using TMS320F2808 DSP as the core processor and results show that the strategy is verified.

Keywords: vector inverter, parameter identification, SVPWM; DFT, dead-time compensation

Procedia PDF Downloads 429
2891 Modeling of a UAV Longitudinal Dynamics through System Identification Technique

Authors: Asadullah I. Qazi, Mansoor Ahsan, Zahir Ashraf, Uzair Ahmad

Abstract:

System identification of an Unmanned Aerial Vehicle (UAV), to acquire its mathematical model, is a significant step in the process of aircraft flight automation. The need for reliable mathematical model is an established requirement for autopilot design, flight simulator development, aircraft performance appraisal, analysis of aircraft modifications, preflight testing of prototype aircraft and investigation of fatigue life and stress distribution etc.  This research is aimed at system identification of a fixed wing UAV by means of specifically designed flight experiment. The purposely designed flight maneuvers were performed on the UAV and aircraft states were recorded during these flights. Acquired data were preprocessed for noise filtering and bias removal followed by parameter estimation of longitudinal dynamics transfer functions using MATLAB system identification toolbox. Black box identification based transfer function models, in response to elevator and throttle inputs, were estimated using least square error   technique. The identification results show a high confidence level and goodness of fit between the estimated model and actual aircraft response.

Keywords: fixed wing UAV, system identification, black box modeling, longitudinal dynamics, least square error

Procedia PDF Downloads 290
2890 Morphological and Biological Identification of Fusarium Species Associated with Ear Rot Disease of Maize in Indonesia and Malaysia

Authors: Darnetty Baharuddin Salleh

Abstract:

Fusarium ear rot disease is one of the most important diseases of maize and not only causes significant losses but also produced harmful mycotoxins to animals and humans. A total of 141 strains of Fusarium species were isolated from maize plants showing typical ear rot symptoms in Indonesia, and Malaysia by using the semi-selective medium (peptone pentachloronitrobenzene agar, PPA). These strains were identified morphologically. For strains in Gibberella fujikuroi species complex (Gfsc), the identification was continued by using biological identification. Three species of Fusarium were morphologically identified as Fusarium in Gibberella species complex (105 strains, 74.5%), F. verticillioides (78 strains), F. proliferatum (24 strains) and F. subglutinans (3 strains) and five species from other section (36 strains, 25.5%), F. graminearum (14 strains), F. oxysporum (8 strains), F. solani ( 1 strain), and F. semitectum (13 strains). Out of 105 Fusarium species in Gfsc, 63 strains were identified as MAT-1, 25 strains as MAT-2 and 17 strains could not be identified and in crosses with nine standard testers, three mating populations of Fusarium were identified as MP-A, G. moniliformis (68 strains, 64.76%), MP-D, G. intermedia (21 strains, 20%) and MP-E, G. subglutinans (3 strains, 2.9%), and 13 strains (12.38%) could not be identified. All trains biologically identified as MP-A, MP-D, and MP-E, were identified morphologically as F. verticillioides, F. proliferatum, and F. subglutinans, respectively. Thus, the results of this study indicated that identification based on biological identification were consistent with those of morphological identification. This is the first report on the presence of MP-A, MP-D, and MP-E on ear rot-infected maize in Indonesia; MP-A and MP-E in Malaysia.

Keywords: Fusarium, MAT-1, MAT-2, MP-A, MP-D, MP-E

Procedia PDF Downloads 282
2889 The Impact of the Cross Race Effect on Eyewitness Identification

Authors: Leah Wilck

Abstract:

Eyewitness identification is arguably one of the most utilized practices within our legal system; however, exoneration cases indicate that this practice may lead to accuracy and conviction errors. The purpose of this study was to examine the effects of the cross-race effect, the phenomena in which people are able to more easily and accurately identify faces from within their racial category, on the accuracy of eyewitness identification. Participants watched three separate videos of a perpetrator trying to steal a bicycle. In each video, the perpetrator was of a different race and gender. Participants watched a video where the perpetrator was a Black male, a White male, and a White female. Following the completion of watching each video, participants were asked to recall everything they could about the perpetrator they witnessed. The initial results of the study did not find the expected cross-race effect impacted the eyewitness identification accuracy. These surprising results are discussed in terms of cross-race bias and recognition theory as well as applied implications.

Keywords: cross race effect, eyewitness identification, own-race bias, racial profiling

Procedia PDF Downloads 129