2019
DOI: 10.1504/ijmic.2019.096792
|View full text |Cite
|
Sign up to set email alerts
|

Self-adaptative multi-kernel algorithm for switched linear systems identification

Abstract: This paper deals with the problem of switched linear system identification. This is one of the most difficult problems since it involves both the estimation of the linear sub-models and the switching instants. In fact, we propose an identification approach based on self-adaptation multi-kernel clustering algorithm to estimate simultaneously the linear sub-models and the switching signal. The estimation of the sub-models consists of decomposing the regression vector into several blocks and assigning a kernel fu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…Estimation switching time “off line”: In this part, we applied the approach proposed in Sellami and Abderrahim 47,48 to estimate the discrete dynamics of the system. Figure 7 describes the evolution of the discrete state and the table below summarizes the detected switching instants (Table 3).…”
Section: Simulation Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Estimation switching time “off line”: In this part, we applied the approach proposed in Sellami and Abderrahim 47,48 to estimate the discrete dynamics of the system. Figure 7 describes the evolution of the discrete state and the table below summarizes the detected switching instants (Table 3).…”
Section: Simulation Resultsmentioning
confidence: 99%
“… J j ( k ) can be chosen by various methods, since there is not a specific model which models the dynamics of the discrete state of the linear system. In Sellami and Abderrahim 47,48 J j ( k ) is the function of the square error between the output of the system y ( k ) and the first component of j eme center y j * …”
Section: Switching Time Estimation “Off-line”mentioning
confidence: 99%
See 1 more Smart Citation
“…Promising and effective outcomes in solving complicated challenges, for instance, automatic system diagnostics and identification [ 22 ], fault detection in wireless system [ 23 , 24 ], cyber threat detection [ 25 ], and specific security problems in other fields have been generated using ML tools throughout the past decade [ 26 , 27 ]. To detect intrusions, ML approaches can be highly effective.…”
Section: Introductionmentioning
confidence: 99%
“…Over the last decade, Artificial Intelligence (AI) tools have produced interesting and effective results when solving complex problems that resemble ours, such as automatic system diagnostics and identification [11], fault detection in wireless sensor networks [12], [13], [14], [15], [16], and certain security problems in other fields. Thus, ML techniques, as the most interesting approach in the field of AI, can be very effective for the detection of intrusions.…”
Section: Introductionmentioning
confidence: 99%