SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN : 2278-800X, www.ijerd.com
Volume 5, Issue 2 (December 2012), PP. 44-46

                 System Identification-Different Techniques
                                     Ramesh Kr1, Chitranjan Kr2, Ruchita3
                           1
                               National Institute of Technology Patna, 2PSCET Vaishali, 3RIET Jaipur


     Abstract:- Engineering applications require description of the dynamic behavior of the system. Though a no. of
     applications are known in the field of system identification, three techniques are considered for the identification
     of linear system. Different techniques are frequency chirp, coherence function and pseudoinverse. In chirp
     method, wideband excitation such as frequency chirp is used. Frequency response is obtained as the DFT of the
     output of the system for time-domain input. Inverse method uses SVD function to find pseudoinverse. Coherence
     function has been used to identify the system using MATLAB function tfestimate. The performances of the
     methods are demonstrated by means of experimental investigation.

     Keywords:- System Identification, SUT, Pseudoinverse, Coherence, Frequency chirp.

                                                   I.     INTRODUCTION
           System identification[1] is a powerful tool in engineering. Its various methods in the frequency and in the time
domain have extensively discussed in CISM courses [2]. It deals with the problem of identifying a model describing some
physical system by measuring the response of the system. This is done by designing the input signal, which is applied to the
system [3], whereas output is taken as impulse response of system. Input signal is used for excitation. In this paper
identification has been achieved by basic approaches as variable frequency signal (chirp), coherence function and pseudo
inverse.

                                      II.          SYSTEM IDENTIFICATION
           A suitable system is considered for the application at hand. Then a special input signal is designed such that the
system captures the behavior of the system to be modeled. Then an identification experiment is carried out in which Input
and output signals are measured. An identification method is selected to estimate the parameters that describe the system
from the collected input and output measurements. Finally, the validity of the obtained system is evaluated. An important
step in system identification is the determination of the type of system to be used. This decision is based on knowledge of the
system under consideration, and on the properties of the system. The methods are presented here below :-

A. Chirp method
           Dirac impulse can be used to excite the SUT and output will be impulse response function denoted as h(). The
Dirac impulse (‘delta function’) is not truly a function at all, but a ‘unit mass’ abstraction [4, p. 5]: The Dirac impulse (‘delta
function’) having infinite amplitude at the point at which its argument is zero, is infinitely narrow and has unity integral over
time. In the discrete-time case, we can attempt to approximate this function by an input that changes amplitude entirely
within one sampling period, i.e., by a Kronecker delta appropriately scaled in amplitude. In practice, however, this
approximation is unlikely ever to be entirely satisfactory. Hence, other wideband input excitations (e.g., band limited white
noise, frequency chirp) are sometimes used.
           To avoid such difficulties, assuming a causal system, the impulse response function of the SUT can be recovered
from the (sampled) output signal {y(n)} for a (sampled) input signal {x(n)} of any general form by the following recursive
equation, obtained directly from the convolution-sum:
                                                             n 1
                                                 y ( n)   h( k ) x ( n  k )
                                     h( n)                  k 1
                                                                                             (1)
                                                                x (0)
However, round-off errors accumulate with larger time indices, making this approach impractical for slowly decaying (i.e.,
infinite) impulse response functions.

B. Inverse fitering
          The transformed-domain approach determines the SUT impulse response function by inverse filtering the output
signal by the input signal as H(z) =Y(z)X-1(z). The inversion operation may lead to an unstable inverse filter with no unique
Realization. System Identification by inverse filtering requires computation of the (pseudo)inverse of X(z). If the system is
assumed casual, then the form of the (p+1)×(s+1) matrix is :




                                                               44
System Identification-Different Techniques

                                       x(0)    x(1)      x(2)   . .   x( s  1)        x( s )   
                                       0       x(0)      x(1)   . .   x( s  2)     x( s  1) 
                                                                                                
                                       .         .         .    . .       .              .      
                                                                                                
                                   X  .         .         .    . .       .              .      
                                       .         .         .    . .       .              .      
                                                                                                
                                       0         0        0     . .     x(0)      x( s  p  1) 
                                       0                                           x( s  p) 
                                                 0        0     . .      0                      
where the output sequence has s+1 samples and the impulse response is estimated at p+1 points with p = s.

C. Coherence
For a linear system, the coherence function is given as

                                                              Sxy ( k )
                                  Cxy ( k ) 
                                                          Sxx ( k ) Syy ( k )                 (2)

          where Sxy (ωk) is the input-output cross-spectrum (i.e., the power spectrum of the cross-correlation between the
input and output functions), and Sxx (ωk) and Syy (ωk) are the power spectra of the autocorrelations of the input and output,
respectively. The function C2xy (ωk) can be interpreted as the fraction of the mean square value of y(n) that can be attributed
to the component of the input x(n) at frequency ωk . Usually, pseudorandom noise is used as an input x(n). The two
identification methods, direct and inverse, then estimate the system response as

             Sxy ( k )
 H 1( k ) 
             Sxx ( k )                                   (3)


             Syy ( k )
 H 2( k ) 
             Sxy ( k )
          where H1(  k ) tends to underestimate the true H(  k ) and H2(  k ) tends to overestimate it. Generally, H1(  k )
gives a good estimate of the system response near anti-resonances but H2(  k ) gives maximal error near anti-resonances.
Conversely, H2(  k ) gives a good estimate of the system response near resonances whereas H(  k ) gives maximal error
near resonances.

                                 III.          RESULTS AND DISCUSSION
         The identification of Chebyshev IIR,10th order with 20db ripple have been examined. Both finite and infinite
impulse responses can be identified too. Identification of IIR systems is generally more difficult than FIR systems.
Chebyshev filters are more difficult to identify because they have a sharper cutoff than Butterworth filters.

A. Chirp method
           Identification can be achieved using a wideband excitation such as frequency chirp (swept sinusoid). Frequency
response is obtained as the Discrete Fourier Transform of the output of the system for such a time-domain input. For low
pass filter responses, this method works well but a chirp signal has poor high frequency content and this affects the
identification. Below fig. shows the identification of the chebyshev high pass filter response by using the DFT and a chirp
signal.




                   Fig 1 : Frequency response of chebyshev high pass filter identified by the chirp method

 B. Inverse method
         The pseudoinverse is found by singular value decomposition using MATLAB function svd. The input excitation
for the SVD identification was a pseudorandom sequence of length 1000 samples (truncated to 512 points for subsequent
FFT processing to find the system function). SVD minimizes the squared error between the output sequence and the

                                                                 45
System Identification-Different Techniques

convolution of the input with the identified system response. Figure shows the comparison of the wavelet based method with
time-domain SVD for our example Chebyshev high-pass filter. The SVD used here reduces its rank based on discarding 1%
of the data variance (comparable to the added noise). However, this takes quite a long time to perform (several minutes with
a Sun Ultrasparc).




             Fig 2 : Frequency response of chebyshev high pass filter identified by the Inverse filtering method

 C. Coherence method
           Equation(2) has been used to identify the Chebyshev high-pass filter using MATLAB function tfestimate (transfer
function estimate) from the signal processing toolbox. The input excitation for the coherence identification was a
pseudorandom sequence of 10,000 samples (truncated to 512 points for subsequent FFT processing to find the system
function).




               Fig 3 : Frequency response of chebyshev high pass filter identified by the Coherence method

                                           IV.           CONCLUSION
            Frequency chirp has been used for excitation in chirp method, where as a pseudorandom sequence has been used
for input excitation in pseudoinverse and coherence approach. In fig.1 response is away from system response, in fig.2
response due to inverse filtering is near to system response and in fig.3 coherence approach shows random response. Hence,
it is clear that inverse filtering is more suitable for system identification. However, it takes quite a long time to perform.

                                                    REFERENCES
[1].      National Instruments corporation, when and how should I use system identification: A tutorial
[2].      Natke, H. G. Application of System Identification in Engineering, 196 figs. III, 583 pages.. Springer-Verlag Wien
          New York. Also CISM International Centre for Mechanical Sciences, volume 296.
[3].      Maplesoft, frequency domain system       identification, maple document, may 2008.
[4].      R.I. Damper, Introduction to Discrete-Time Signals and Systems, Chapman & Hall, London, 1995.
[5].      D. J. Ewins. Modal: Theory, Practice and applications . Engineering Dynamic Series. Research Studies
          press Ltd., Baldock, Hertfordshire, England, second edition, 2000.
[6].      D. J. Ewins and D. J. Inmam, editors. Structural Dynamics 2000: current direction and future
          detection.Engineering Dynamic Series. Research Studies press Ltd., Baldock, Hertfordshire, England, 2001
[7].      D.L. Donoho, De-noising by soft-thresholding, IEEE Trans. Inform. Theory 41 (3) (1995) 613–627.

Dr.Ramesh Kumar received the B.Sc (Engg.), Electrical, at B.C.E/NIT Patna,the M.Sc degree in Electrical Engg & Ph.D
from Patna University, Patna. He is now Associate Professor in Department of Electrical Engg.at NIT Patna.

Chitranjan Kumar obtained Bachelor of Engineering (B.E) degree in Electronics and Telecommunication engineering
from the D.K.T.E.S, Ichalkaranji, Shivaji University, Kolhapur, and M.Tech in Control System, Department of Electrical
Engineering at NIT Patna.

Ruchita, student of final year (Electronics and Communication Engg) B.Tech, Rajasthan Institute of Engg. and Technology
Jaipur.


                                                             46

More Related Content

What's hot

Digital Signal Processing[ECEG-3171]-Ch1_L04
Digital Signal Processing[ECEG-3171]-Ch1_L04Digital Signal Processing[ECEG-3171]-Ch1_L04
Digital Signal Processing[ECEG-3171]-Ch1_L04Rediet Moges
 
Applied Digital Signal Processing 1st Edition Manolakis Solutions Manual
Applied Digital Signal Processing 1st Edition Manolakis Solutions ManualApplied Digital Signal Processing 1st Edition Manolakis Solutions Manual
Applied Digital Signal Processing 1st Edition Manolakis Solutions Manualtowojixi
 
Digital Signal Processing[ECEG-3171]-Ch1_L03
Digital Signal Processing[ECEG-3171]-Ch1_L03Digital Signal Processing[ECEG-3171]-Ch1_L03
Digital Signal Processing[ECEG-3171]-Ch1_L03Rediet Moges
 
Digital Signal Processing[ECEG-3171]-Ch1_L05
Digital Signal Processing[ECEG-3171]-Ch1_L05Digital Signal Processing[ECEG-3171]-Ch1_L05
Digital Signal Processing[ECEG-3171]-Ch1_L05Rediet Moges
 
Signal Prosessing Lab Mannual
Signal Prosessing Lab Mannual Signal Prosessing Lab Mannual
Signal Prosessing Lab Mannual Jitendra Jangid
 
Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02Rediet Moges
 
EE443 - Communications 1 - Lab 1 - Loren Schwappach.pdf
EE443 - Communications 1 - Lab 1 - Loren Schwappach.pdf EE443 - Communications 1 - Lab 1 - Loren Schwappach.pdf
EE443 - Communications 1 - Lab 1 - Loren Schwappach.pdf Loren Schwappach
 
Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...
Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...
Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...Xin-She Yang
 
ESTIMATING NOISE PARAMETER & FILTERING (Digital Image Processing)
ESTIMATING NOISE PARAMETER & FILTERING (Digital Image Processing)ESTIMATING NOISE PARAMETER & FILTERING (Digital Image Processing)
ESTIMATING NOISE PARAMETER & FILTERING (Digital Image Processing)Shajun Nisha
 
A Fast Hadamard Transform for Signals with Sub-linear Sparsity
A Fast Hadamard Transform for Signals with Sub-linear SparsityA Fast Hadamard Transform for Signals with Sub-linear Sparsity
A Fast Hadamard Transform for Signals with Sub-linear SparsityRobin Scheibler
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecturewtyru1989
 
Decimation and Interpolation
Decimation and InterpolationDecimation and Interpolation
Decimation and InterpolationFernando Ojeda
 
signal homework
signal homeworksignal homework
signal homeworksokok22867
 
Dsp U Lec04 Discrete Time Signals & Systems
Dsp U   Lec04 Discrete Time Signals & SystemsDsp U   Lec04 Discrete Time Signals & Systems
Dsp U Lec04 Discrete Time Signals & Systemstaha25
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemwtyru1989
 
Estimation of the score vector and observed information matrix in intractable...
Estimation of the score vector and observed information matrix in intractable...Estimation of the score vector and observed information matrix in intractable...
Estimation of the score vector and observed information matrix in intractable...Pierre Jacob
 
Signal Processing Introduction using Fourier Transforms
Signal Processing Introduction using Fourier TransformsSignal Processing Introduction using Fourier Transforms
Signal Processing Introduction using Fourier TransformsArvind Devaraj
 
Digital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysisDigital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysisChandrashekhar Padole
 

What's hot (20)

Digital Signal Processing[ECEG-3171]-Ch1_L04
Digital Signal Processing[ECEG-3171]-Ch1_L04Digital Signal Processing[ECEG-3171]-Ch1_L04
Digital Signal Processing[ECEG-3171]-Ch1_L04
 
Applied Digital Signal Processing 1st Edition Manolakis Solutions Manual
Applied Digital Signal Processing 1st Edition Manolakis Solutions ManualApplied Digital Signal Processing 1st Edition Manolakis Solutions Manual
Applied Digital Signal Processing 1st Edition Manolakis Solutions Manual
 
Digital Signal Processing[ECEG-3171]-Ch1_L03
Digital Signal Processing[ECEG-3171]-Ch1_L03Digital Signal Processing[ECEG-3171]-Ch1_L03
Digital Signal Processing[ECEG-3171]-Ch1_L03
 
Digital Signal Processing[ECEG-3171]-Ch1_L05
Digital Signal Processing[ECEG-3171]-Ch1_L05Digital Signal Processing[ECEG-3171]-Ch1_L05
Digital Signal Processing[ECEG-3171]-Ch1_L05
 
Signal Prosessing Lab Mannual
Signal Prosessing Lab Mannual Signal Prosessing Lab Mannual
Signal Prosessing Lab Mannual
 
Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02Digital Signal Processing[ECEG-3171]-Ch1_L02
Digital Signal Processing[ECEG-3171]-Ch1_L02
 
EE443 - Communications 1 - Lab 1 - Loren Schwappach.pdf
EE443 - Communications 1 - Lab 1 - Loren Schwappach.pdf EE443 - Communications 1 - Lab 1 - Loren Schwappach.pdf
EE443 - Communications 1 - Lab 1 - Loren Schwappach.pdf
 
Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...
Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...
Nature-Inspired Metaheuristic Algorithms for Optimization and Computational I...
 
ESTIMATING NOISE PARAMETER & FILTERING (Digital Image Processing)
ESTIMATING NOISE PARAMETER & FILTERING (Digital Image Processing)ESTIMATING NOISE PARAMETER & FILTERING (Digital Image Processing)
ESTIMATING NOISE PARAMETER & FILTERING (Digital Image Processing)
 
A Fast Hadamard Transform for Signals with Sub-linear Sparsity
A Fast Hadamard Transform for Signals with Sub-linear SparsityA Fast Hadamard Transform for Signals with Sub-linear Sparsity
A Fast Hadamard Transform for Signals with Sub-linear Sparsity
 
The gaussian minimum entropy conjecture
The gaussian minimum entropy conjectureThe gaussian minimum entropy conjecture
The gaussian minimum entropy conjecture
 
Decimation and Interpolation
Decimation and InterpolationDecimation and Interpolation
Decimation and Interpolation
 
signal homework
signal homeworksignal homework
signal homework
 
Dsp U Lec04 Discrete Time Signals & Systems
Dsp U   Lec04 Discrete Time Signals & SystemsDsp U   Lec04 Discrete Time Signals & Systems
Dsp U Lec04 Discrete Time Signals & Systems
 
Entropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problemEntropic characteristics of quantum channels and the additivity problem
Entropic characteristics of quantum channels and the additivity problem
 
Lti system
Lti systemLti system
Lti system
 
Estimation of the score vector and observed information matrix in intractable...
Estimation of the score vector and observed information matrix in intractable...Estimation of the score vector and observed information matrix in intractable...
Estimation of the score vector and observed information matrix in intractable...
 
Signal Processing Introduction using Fourier Transforms
Signal Processing Introduction using Fourier TransformsSignal Processing Introduction using Fourier Transforms
Signal Processing Introduction using Fourier Transforms
 
Jere Koskela slides
Jere Koskela slidesJere Koskela slides
Jere Koskela slides
 
Digital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysisDigital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysis
 

Similar to Welcome to International Journal of Engineering Research and Development (IJERD)

EC8553 Discrete time signal processing
EC8553 Discrete time signal processing EC8553 Discrete time signal processing
EC8553 Discrete time signal processing ssuser2797e4
 
Generating Chebychev Chaotic Sequence
Generating Chebychev Chaotic SequenceGenerating Chebychev Chaotic Sequence
Generating Chebychev Chaotic SequenceCheng-An Yang
 
Adaptive Noise Cancellation using Multirate Techniques
Adaptive Noise Cancellation using Multirate TechniquesAdaptive Noise Cancellation using Multirate Techniques
Adaptive Noise Cancellation using Multirate TechniquesIJERD Editor
 
DSP_FOEHU - MATLAB 01 - Discrete Time Signals and Systems
DSP_FOEHU - MATLAB 01 - Discrete Time Signals and SystemsDSP_FOEHU - MATLAB 01 - Discrete Time Signals and Systems
DSP_FOEHU - MATLAB 01 - Discrete Time Signals and SystemsAmr E. Mohamed
 
Dsp U Lec06 The Z Transform And Its Application
Dsp U   Lec06 The Z Transform And Its ApplicationDsp U   Lec06 The Z Transform And Its Application
Dsp U Lec06 The Z Transform And Its Applicationtaha25
 
Lecture 3 (ADSP).pptx
Lecture 3 (ADSP).pptxLecture 3 (ADSP).pptx
Lecture 3 (ADSP).pptxHarisMasood20
 
Chapter10. Realization of Digital Filter.pptx
Chapter10. Realization of Digital Filter.pptxChapter10. Realization of Digital Filter.pptx
Chapter10. Realization of Digital Filter.pptxRajGopalMishra4
 
DIGITAL SIGNAL PROCESSING.pptx
DIGITAL SIGNAL PROCESSING.pptxDIGITAL SIGNAL PROCESSING.pptx
DIGITAL SIGNAL PROCESSING.pptxnishantsourav
 
بررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارش
بررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارشبررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارش
بررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارشپروژه مارکت
 
MVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsMVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsElvis DOHMATOB
 
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)Ravikiran A
 
Chaotic system and its Application in Cryptography
Chaotic system and its Application in  CryptographyChaotic system and its Application in  Cryptography
Chaotic system and its Application in CryptographyMuhammad Hamid
 

Similar to Welcome to International Journal of Engineering Research and Development (IJERD) (20)

df_lesson_01.ppt
df_lesson_01.pptdf_lesson_01.ppt
df_lesson_01.ppt
 
Dsp manual
Dsp manualDsp manual
Dsp manual
 
Introduction to Adaptive filters
Introduction to Adaptive filtersIntroduction to Adaptive filters
Introduction to Adaptive filters
 
EC8553 Discrete time signal processing
EC8553 Discrete time signal processing EC8553 Discrete time signal processing
EC8553 Discrete time signal processing
 
Dsp 2marks
Dsp 2marksDsp 2marks
Dsp 2marks
 
Generating Chebychev Chaotic Sequence
Generating Chebychev Chaotic SequenceGenerating Chebychev Chaotic Sequence
Generating Chebychev Chaotic Sequence
 
3.pdf
3.pdf3.pdf
3.pdf
 
Lecture 3 sapienza 2017
Lecture 3 sapienza 2017Lecture 3 sapienza 2017
Lecture 3 sapienza 2017
 
Adaptive Noise Cancellation using Multirate Techniques
Adaptive Noise Cancellation using Multirate TechniquesAdaptive Noise Cancellation using Multirate Techniques
Adaptive Noise Cancellation using Multirate Techniques
 
DSP_FOEHU - MATLAB 01 - Discrete Time Signals and Systems
DSP_FOEHU - MATLAB 01 - Discrete Time Signals and SystemsDSP_FOEHU - MATLAB 01 - Discrete Time Signals and Systems
DSP_FOEHU - MATLAB 01 - Discrete Time Signals and Systems
 
Dsp U Lec06 The Z Transform And Its Application
Dsp U   Lec06 The Z Transform And Its ApplicationDsp U   Lec06 The Z Transform And Its Application
Dsp U Lec06 The Z Transform And Its Application
 
residue
residueresidue
residue
 
Lecture 3 (ADSP).pptx
Lecture 3 (ADSP).pptxLecture 3 (ADSP).pptx
Lecture 3 (ADSP).pptx
 
Chapter10. Realization of Digital Filter.pptx
Chapter10. Realization of Digital Filter.pptxChapter10. Realization of Digital Filter.pptx
Chapter10. Realization of Digital Filter.pptx
 
DIGITAL SIGNAL PROCESSING.pptx
DIGITAL SIGNAL PROCESSING.pptxDIGITAL SIGNAL PROCESSING.pptx
DIGITAL SIGNAL PROCESSING.pptx
 
Deconvolution
DeconvolutionDeconvolution
Deconvolution
 
بررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارش
بررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارشبررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارش
بررسی دو روش شناسایی سیستم های متغیر با زمان به همراه شبیه سازی و گزارش
 
MVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priorsMVPA with SpaceNet: sparse structured priors
MVPA with SpaceNet: sparse structured priors
 
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)
DSP Lab Manual (10ECL57) - VTU Syllabus (KSSEM)
 
Chaotic system and its Application in Cryptography
Chaotic system and its Application in  CryptographyChaotic system and its Application in  Cryptography
Chaotic system and its Application in Cryptography
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Welcome to International Journal of Engineering Research and Development (IJERD)

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN : 2278-800X, www.ijerd.com Volume 5, Issue 2 (December 2012), PP. 44-46 System Identification-Different Techniques Ramesh Kr1, Chitranjan Kr2, Ruchita3 1 National Institute of Technology Patna, 2PSCET Vaishali, 3RIET Jaipur Abstract:- Engineering applications require description of the dynamic behavior of the system. Though a no. of applications are known in the field of system identification, three techniques are considered for the identification of linear system. Different techniques are frequency chirp, coherence function and pseudoinverse. In chirp method, wideband excitation such as frequency chirp is used. Frequency response is obtained as the DFT of the output of the system for time-domain input. Inverse method uses SVD function to find pseudoinverse. Coherence function has been used to identify the system using MATLAB function tfestimate. The performances of the methods are demonstrated by means of experimental investigation. Keywords:- System Identification, SUT, Pseudoinverse, Coherence, Frequency chirp. I. INTRODUCTION System identification[1] is a powerful tool in engineering. Its various methods in the frequency and in the time domain have extensively discussed in CISM courses [2]. It deals with the problem of identifying a model describing some physical system by measuring the response of the system. This is done by designing the input signal, which is applied to the system [3], whereas output is taken as impulse response of system. Input signal is used for excitation. In this paper identification has been achieved by basic approaches as variable frequency signal (chirp), coherence function and pseudo inverse. II. SYSTEM IDENTIFICATION A suitable system is considered for the application at hand. Then a special input signal is designed such that the system captures the behavior of the system to be modeled. Then an identification experiment is carried out in which Input and output signals are measured. An identification method is selected to estimate the parameters that describe the system from the collected input and output measurements. Finally, the validity of the obtained system is evaluated. An important step in system identification is the determination of the type of system to be used. This decision is based on knowledge of the system under consideration, and on the properties of the system. The methods are presented here below :- A. Chirp method Dirac impulse can be used to excite the SUT and output will be impulse response function denoted as h(). The Dirac impulse (‘delta function’) is not truly a function at all, but a ‘unit mass’ abstraction [4, p. 5]: The Dirac impulse (‘delta function’) having infinite amplitude at the point at which its argument is zero, is infinitely narrow and has unity integral over time. In the discrete-time case, we can attempt to approximate this function by an input that changes amplitude entirely within one sampling period, i.e., by a Kronecker delta appropriately scaled in amplitude. In practice, however, this approximation is unlikely ever to be entirely satisfactory. Hence, other wideband input excitations (e.g., band limited white noise, frequency chirp) are sometimes used. To avoid such difficulties, assuming a causal system, the impulse response function of the SUT can be recovered from the (sampled) output signal {y(n)} for a (sampled) input signal {x(n)} of any general form by the following recursive equation, obtained directly from the convolution-sum: n 1 y ( n)   h( k ) x ( n  k ) h( n)  k 1 (1) x (0) However, round-off errors accumulate with larger time indices, making this approach impractical for slowly decaying (i.e., infinite) impulse response functions. B. Inverse fitering The transformed-domain approach determines the SUT impulse response function by inverse filtering the output signal by the input signal as H(z) =Y(z)X-1(z). The inversion operation may lead to an unstable inverse filter with no unique Realization. System Identification by inverse filtering requires computation of the (pseudo)inverse of X(z). If the system is assumed casual, then the form of the (p+1)×(s+1) matrix is : 44
  • 2. System Identification-Different Techniques  x(0) x(1) x(2) . . x( s  1) x( s )   0 x(0) x(1) . . x( s  2) x( s  1)     . . . . . . .    X  . . . . . . .   . . . . . . .     0 0 0 . . x(0) x( s  p  1)   0 x( s  p)   0 0 . . 0  where the output sequence has s+1 samples and the impulse response is estimated at p+1 points with p = s. C. Coherence For a linear system, the coherence function is given as Sxy ( k ) Cxy ( k )  Sxx ( k ) Syy ( k ) (2) where Sxy (ωk) is the input-output cross-spectrum (i.e., the power spectrum of the cross-correlation between the input and output functions), and Sxx (ωk) and Syy (ωk) are the power spectra of the autocorrelations of the input and output, respectively. The function C2xy (ωk) can be interpreted as the fraction of the mean square value of y(n) that can be attributed to the component of the input x(n) at frequency ωk . Usually, pseudorandom noise is used as an input x(n). The two identification methods, direct and inverse, then estimate the system response as Sxy ( k ) H 1( k )  Sxx ( k ) (3) Syy ( k ) H 2( k )  Sxy ( k ) where H1(  k ) tends to underestimate the true H(  k ) and H2(  k ) tends to overestimate it. Generally, H1(  k ) gives a good estimate of the system response near anti-resonances but H2(  k ) gives maximal error near anti-resonances. Conversely, H2(  k ) gives a good estimate of the system response near resonances whereas H(  k ) gives maximal error near resonances. III. RESULTS AND DISCUSSION The identification of Chebyshev IIR,10th order with 20db ripple have been examined. Both finite and infinite impulse responses can be identified too. Identification of IIR systems is generally more difficult than FIR systems. Chebyshev filters are more difficult to identify because they have a sharper cutoff than Butterworth filters. A. Chirp method Identification can be achieved using a wideband excitation such as frequency chirp (swept sinusoid). Frequency response is obtained as the Discrete Fourier Transform of the output of the system for such a time-domain input. For low pass filter responses, this method works well but a chirp signal has poor high frequency content and this affects the identification. Below fig. shows the identification of the chebyshev high pass filter response by using the DFT and a chirp signal. Fig 1 : Frequency response of chebyshev high pass filter identified by the chirp method B. Inverse method The pseudoinverse is found by singular value decomposition using MATLAB function svd. The input excitation for the SVD identification was a pseudorandom sequence of length 1000 samples (truncated to 512 points for subsequent FFT processing to find the system function). SVD minimizes the squared error between the output sequence and the 45
  • 3. System Identification-Different Techniques convolution of the input with the identified system response. Figure shows the comparison of the wavelet based method with time-domain SVD for our example Chebyshev high-pass filter. The SVD used here reduces its rank based on discarding 1% of the data variance (comparable to the added noise). However, this takes quite a long time to perform (several minutes with a Sun Ultrasparc). Fig 2 : Frequency response of chebyshev high pass filter identified by the Inverse filtering method C. Coherence method Equation(2) has been used to identify the Chebyshev high-pass filter using MATLAB function tfestimate (transfer function estimate) from the signal processing toolbox. The input excitation for the coherence identification was a pseudorandom sequence of 10,000 samples (truncated to 512 points for subsequent FFT processing to find the system function). Fig 3 : Frequency response of chebyshev high pass filter identified by the Coherence method IV. CONCLUSION Frequency chirp has been used for excitation in chirp method, where as a pseudorandom sequence has been used for input excitation in pseudoinverse and coherence approach. In fig.1 response is away from system response, in fig.2 response due to inverse filtering is near to system response and in fig.3 coherence approach shows random response. Hence, it is clear that inverse filtering is more suitable for system identification. However, it takes quite a long time to perform. REFERENCES [1]. National Instruments corporation, when and how should I use system identification: A tutorial [2]. Natke, H. G. Application of System Identification in Engineering, 196 figs. III, 583 pages.. Springer-Verlag Wien New York. Also CISM International Centre for Mechanical Sciences, volume 296. [3]. Maplesoft, frequency domain system identification, maple document, may 2008. [4]. R.I. Damper, Introduction to Discrete-Time Signals and Systems, Chapman & Hall, London, 1995. [5]. D. J. Ewins. Modal: Theory, Practice and applications . Engineering Dynamic Series. Research Studies press Ltd., Baldock, Hertfordshire, England, second edition, 2000. [6]. D. J. Ewins and D. J. Inmam, editors. Structural Dynamics 2000: current direction and future detection.Engineering Dynamic Series. Research Studies press Ltd., Baldock, Hertfordshire, England, 2001 [7]. D.L. Donoho, De-noising by soft-thresholding, IEEE Trans. Inform. Theory 41 (3) (1995) 613–627. Dr.Ramesh Kumar received the B.Sc (Engg.), Electrical, at B.C.E/NIT Patna,the M.Sc degree in Electrical Engg & Ph.D from Patna University, Patna. He is now Associate Professor in Department of Electrical Engg.at NIT Patna. Chitranjan Kumar obtained Bachelor of Engineering (B.E) degree in Electronics and Telecommunication engineering from the D.K.T.E.S, Ichalkaranji, Shivaji University, Kolhapur, and M.Tech in Control System, Department of Electrical Engineering at NIT Patna. Ruchita, student of final year (Electronics and Communication Engg) B.Tech, Rajasthan Institute of Engg. and Technology Jaipur. 46