• Title/Summary/Keyword: identification problem

Search Result 1,319, Processing Time 0.05 seconds

Manipulator Joint Friction Identification using Genetic Algorithm and its Experimental Verification (유전 알고리듬을 이용한 매니퓰레이터 조인트의 마찰력 규명 및 실험적 검증)

  • Kim, Gyeong-Ho;Park, Yun-Sik
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.6 s.177
    • /
    • pp.1633-1642
    • /
    • 2000
  • Like many other mechanical dynamic systems, flexible manipulator systems experience stiction or sticking friction, which may cause input-dependent instabilities. Manipulator performance can be enha nced by identifying friction but it is hard and expensive to measure friction by direct and precise sensing of contact displacements and forces. This study addresses the problem of identifying flexible manipulator joint friction. A dynamic model of a two-link flexible manipulator based upon finite element and Lagrange's method is constructed. The dynamic model includes the effects of joint compliances and actuator dynamics. Friction is also incorporated in the dynamic model to account for stick-slip at the joints. Next, the friction parameters are to be determined. The identification problem is posed as an optimization problem to be solved using nonlinear programming methods. A genetic algorithm is used to increase the convergence rate and the chances of finding the global optimum. The identified friction parameters are experimentally verified and it is expected that the identification technique is applicable to a system parameter identification problem associated with a wide class of nonlinear systems.

IMPERSONATION ATTACK ON THE STRONG IDENTIFICATION BASED ON A HARD-ON-AVERAGE PROBLEM

  • Koo, Bon-Wook;Kwon, Dae-Sung;Lee, Joo-Young;Song, Jung-Hwan
    • Bulletin of the Korean Mathematical Society
    • /
    • v.47 no.1
    • /
    • pp.63-71
    • /
    • 2010
  • In this paper, we analyze a zero-knowledge identification scheme presented in [1], which is based on an average-case hard problem, called distributional matrix representability problem. On the contrary to the soundness property claimed in [1], we show that a simple impersonation attack is feasible.

On the Wave Source Identification of an Wave Maker Problem

  • JANG TAEK-SOO
    • Journal of Ocean Engineering and Technology
    • /
    • v.17 no.5 s.54
    • /
    • pp.19-24
    • /
    • 2003
  • The question of wave source identification in a wave maker problem is the primary objective of the this paper. With the observed wave elevation, the existence of the wave maker velocity is discussed with the help of the mathematical theory of inverse problems. Utilizing the property of the Strum-Liouville system and compactness, the uniqueness and the ill-posedness(in the sense of stability) for the identification are proved.

A novel WOA-based structural damage identification using weighted modal data and flexibility assurance criterion

  • Chen, Zexiang;Yu, Ling
    • Structural Engineering and Mechanics
    • /
    • v.75 no.4
    • /
    • pp.445-454
    • /
    • 2020
  • Structural damage identification (SDI) is a crucial step in structural health monitoring. However, some of the existing SDI methods cannot provide enough identification accuracy and efficiency in practice. A novel whale optimization algorithm (WOA) based method is proposed for SDI by weighting modal data and flexibility assurance criterion in this study. At first, the SDI problem is mathematically converted into a constrained optimization problem. Unlike traditional objective function defined using frequencies and mode shapes, a new objective function on the SDI problem is formulated by weighting both modal data and flexibility assurance criterion. Then, the WOA method, due to its good performance of fast convergence and global searching ability, is adopted to provide an accurate solution to the SDI problem, different predator mechanisms are formulated and their probability thresholds are selected. Finally, the performance of the proposed method is assessed by numerical simulations on a simply-supported beam and a 31-bar truss structures. For the given multiple structural damage conditions under environmental noises, the WOA-based SDI method can effectively locate structural damages and accurately estimate severities of damages. Compared with other optimization methods, such as particle swarm optimization and dragonfly algorithm, the proposed WOA-based method outperforms in accuracy and efficiency, which can provide a more effective and potential tool for the SDI problem.

Investigation of modal identification and modal identifiability of a cable-stayed bridge with Bayesian framework

  • Kuok, Sin-Chi;Yuen, Ka-Veng
    • Smart Structures and Systems
    • /
    • v.17 no.3
    • /
    • pp.445-470
    • /
    • 2016
  • In this study, the Bayesian probabilistic framework is investigated for modal identification and modal identifiability based on the field measurements provided in the structural health monitoring benchmark problem of an instrumented cable-stayed bridge named Ting Kau Bridge (TKB). The comprehensive structural health monitoring system on the cable-stayed TKB has been operated for more than ten years and it is recognized as one of the best test-beds with readily available field measurements. The benchmark problem of the cable-stayed bridge is established to stimulate investigations on modal identifiability and the present paper addresses this benchmark problem from the Bayesian prospective. In contrast to deterministic approaches, an appealing feature of the Bayesian approach is that not only the optimal values of the modal parameters can be obtained but also the associated estimation uncertainty can be quantified in the form of probability distribution. The uncertainty quantification provides necessary information to evaluate the reliability of parametric identification results as well as modal identifiability. Herein, the Bayesian spectral density approach is conducted for output-only modal identification and the Bayesian model class selection approach is used to evaluate the significance of different modes in modal identification. Detailed analysis on the modal identification and modal identifiability based on the measurements of the bridge will be presented. Moreover, the advantages and potentials of Bayesian probabilistic framework on structural health monitoring will be discussed.

One Pass Identification processing Password-based

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.4
    • /
    • pp.166-169
    • /
    • 2006
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. In this paper, we present a new identification scheme: OPI(One Pass Identification). The security of OPI is based on the square root problem, and OPI is secure: against the well known attacks including pre-play attack, off-line dictionary attack and server comprise. A number of pass of OPI is one, and OPI processes the password and does not need the key. We think that OPI is excellent for the consuming time to verify the prover.

Problems of alternative means of Inhabitants Registration Identification Number on Internet and their Countermeasures (인터넷상의 주민등록번호 대체수단의 문제점들과 해결방법)

  • Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.45-53
    • /
    • 2008
  • As internet is wide spread, the number of internet service provider is increased. Internet service providers gather the personnel information with inhabitants registration identification number for the user management and the adult authentication. The personnel information is spreaded thorough the Internet by the system hacking, mismanagement and malicious resale. And the personnel information is used for spam email, phishing scams, etc. by malicious others. So the Ministry of Information and Communication Republic of Korea developments I-PIN system of the personnel identification. But, I-PIN has some problem the guideline for it and the method of 5 I-PIN services. In this paper, we analyze the problem about the guideline for I-PIN and the method of 5 I-PIN services. And we propose the countermeasure about the problem.

Viscoplasticity model stochastic parameter identification: Multi-scale approach and Bayesian inference

  • Nguyen, Cong-Uy;Hoang, Truong-Vinh;Hadzalic, Emina;Dobrilla, Simona;Matthies, Hermann G.;Ibrahimbegovic, Adnan
    • Coupled systems mechanics
    • /
    • v.11 no.5
    • /
    • pp.411-438
    • /
    • 2022
  • In this paper, we present the parameter identification for inelastic and multi-scale problems. First, the theoretical background of several fundamental methods used in the upscaling process is reviewed. Several key definitions including random field, Bayesian theorem, Polynomial chaos expansion (PCE), and Gauss-Markov-Kalman filter are briefly summarized. An illustrative example is given to assimilate fracture energy in a simple inelastic problem with linear hardening and softening phases. Second, the parameter identification using the Gauss-Markov-Kalman filter is employed for a multi-scale problem to identify bulk and shear moduli and other material properties in a macro-scale with the data from a micro-scale as quantities of interest (QoI). The problem can also be viewed as upscaling homogenization.

Genetic Algorithm for Identification of Time Delay Systems from Step Responses

  • Shin, Gang-Wook;Song, Young-Joo;Lee, Tae-Bong;Choi, Hong-Kyoo
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.1
    • /
    • pp.79-85
    • /
    • 2007
  • In this paper, a real-coded genetic algorithm is proposed for identification of time delay systems from step responses. FOPDT(First-Order Plus Dead-Time) and SOPDT(Second-Order Plus Dead-Time) systems, which are the most useful processes in this field, but are difficult for system identification because of a long dead-time problem and a model mismatch problem. Genetic algorithms have been successfully applied to a variety of complex optimization problems where other techniques have often failed. Thus, the modified crossover operator of a real-code genetic algorithm is proposed to effectively search the system parameters. The proposed method, using a real-coding genetic algorithm, shows better performance characteristics when compared to the usual area-based identification method and the directed identification method that uses step responses.

Identification of the air separation unit using subspace-based method

  • Lee, donghoon;sangchul Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.52.4-52
    • /
    • 2002
  • $\textbullet$ Introduction $\textbullet$ Wiener system identification problem $\textbullet$ Identification method $\textbullet$ Simulation $\textbullet$ Conclusions $\textbullet$ References

  • PDF