The idea of this paper is to present feasibility study design of a complex substrate-integrated-waveguide (SIW) filter as well as the fabricated unit of the 6th order SIW filter for CubeSat Ka band transceiver application. The other equally important goal is to verify its wave-based digital model developed by an existing approach based on wave digital filter theory. That means to investigate the accuracy of developed digital models that one can implement to model a two-port structure and to simulate it using Simulink platform, as well as the effects of selected parameter values that affects digital models.
{"title":"Substrate-Integrated-Waveguide Filters: Design, Measurements and Wave-based Modeling Procedure","authors":"M. Nedelchev, B. Stošić, N. Dončov","doi":"10.1145/3459104.3459112","DOIUrl":"https://doi.org/10.1145/3459104.3459112","url":null,"abstract":"The idea of this paper is to present feasibility study design of a complex substrate-integrated-waveguide (SIW) filter as well as the fabricated unit of the 6th order SIW filter for CubeSat Ka band transceiver application. The other equally important goal is to verify its wave-based digital model developed by an existing approach based on wave digital filter theory. That means to investigate the accuracy of developed digital models that one can implement to model a two-port structure and to simulate it using Simulink platform, as well as the effects of selected parameter values that affects digital models.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132829627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the development of the economy and the improvement of living standards of people, electricity consumption around the world has increased dramatically. However, the load that contains many components with different characteristics is affected by many factors. How to classify and extract load characteristics and improve the accuracy of load forecasting has become a focus of attention. Based on this, this paper proposes using the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) to decompose the load and get multiple components of different time scales. The hidden characteristics of each components of load are analyzed with the four characteristic indicators. Then, the Pearson coefficient is used to analyze the multi-scale correlation between the load components and the temperature, and at the same time decompose the temperature to dig deep relationship between the load components and the temperature components. Finally, we use the Least Squares Support Vector Machine Optimized by Particle Swarm Optimization (PSO-LSSVM) to forecasting each component of the load, and select the decomposed temperature as part of the input data of the load forecasting model. The forecasting results verify the advantages of the proposed method in the aspects of load characteristic analysis and improvement of load forecasting accuracy.
{"title":"Variation Characteristics Analysis and Short-Term Forecasting of Load Based on CEEMDAN","authors":"Peng Zhang, Min Wang","doi":"10.1145/3459104.3459185","DOIUrl":"https://doi.org/10.1145/3459104.3459185","url":null,"abstract":"With the development of the economy and the improvement of living standards of people, electricity consumption around the world has increased dramatically. However, the load that contains many components with different characteristics is affected by many factors. How to classify and extract load characteristics and improve the accuracy of load forecasting has become a focus of attention. Based on this, this paper proposes using the Complete Ensemble Empirical Mode Decomposition with Adaptive Noise (CEEMDAN) to decompose the load and get multiple components of different time scales. The hidden characteristics of each components of load are analyzed with the four characteristic indicators. Then, the Pearson coefficient is used to analyze the multi-scale correlation between the load components and the temperature, and at the same time decompose the temperature to dig deep relationship between the load components and the temperature components. Finally, we use the Least Squares Support Vector Machine Optimized by Particle Swarm Optimization (PSO-LSSVM) to forecasting each component of the load, and select the decomposed temperature as part of the input data of the load forecasting model. The forecasting results verify the advantages of the proposed method in the aspects of load characteristic analysis and improvement of load forecasting accuracy.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116999496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seong-Jong Park, Jin Choi, Sunjun Hwang, Chang-Gun Lee
For developing automotive systems, it is important to validate the system performance at the design phase. For this, the simulation methodology is commonly used for the validation of the automotive systems. However, if there is a gap between real performance and simulation result, developers need to go through the process of redesigning and implementing the system which increases the developing cost. For this, we have a novel simuation approach that gurantees functional and temporal correctness while enjoying the freedom of job scheduling. However we cannot apply this approach directly to the ROS2 cyber system which has become popular by its open source community and supporting real-time features because of different task execution behaviors. Therefore, we propose an extended approach which defines new system model for the cyber system based on ROS2 framework to keep the functional and temporal correct simulation approach on the ROS2 cyber system.
{"title":"ROS2 Extension of Functionally and Temporally Correct Real-Time Simulation of Cyber Systems for Automotive Systems","authors":"Seong-Jong Park, Jin Choi, Sunjun Hwang, Chang-Gun Lee","doi":"10.1145/3459104.3459137","DOIUrl":"https://doi.org/10.1145/3459104.3459137","url":null,"abstract":"For developing automotive systems, it is important to validate the system performance at the design phase. For this, the simulation methodology is commonly used for the validation of the automotive systems. However, if there is a gap between real performance and simulation result, developers need to go through the process of redesigning and implementing the system which increases the developing cost. For this, we have a novel simuation approach that gurantees functional and temporal correctness while enjoying the freedom of job scheduling. However we cannot apply this approach directly to the ROS2 cyber system which has become popular by its open source community and supporting real-time features because of different task execution behaviors. Therefore, we propose an extended approach which defines new system model for the cyber system based on ROS2 framework to keep the functional and temporal correct simulation approach on the ROS2 cyber system.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117139858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper is concerned with goodness of fit evaluation for virtual commissioning modelling purposes. Our goal is to propose a coefficient that could take into consideration several commonly used methods and expert knowledge referring to model quality evaluation. In this paper we try to find an answer to the question whether the model is good from the virtual commissioning point of view and if it can be used in virtual commissioning. The aim of virtual commissioning is to create a simulation model of a plant. It is very useful and crucial from the modern automation point of view (especially Industry 4.0) owing to the fact that potential changes and upgrades can be tested before they are implemented to an existing process. It is a formidable challenge to introduce a method which allows to unambiguously decide whether the model could be used in virtual commissioning. In order to evaluate the goodness of fit, commonly used performance indices are NRMSE (Normalized Root Mean Square Error) and ME (Maximum Error). In this work the unique way of combining NRMSE and ME with fuzzy logic has been introduced. For evaluating the goodness of fit of a model we propose a coefficient that is based on Takagi-Sugeno-Kang fuzzy-inference system. The suggested method is flexible and well-suited for all kind of models and processes because of taking into consideration all aspects of a process. What is more, it also gives an easy way of applying expert knowledge into it.
{"title":"Model Goodness of Fit for Virtual Commissioning Purposes Based on Fuzzy-inference System","authors":"Lukasz Glodek, Szymon Bysko, Witold Nocoń","doi":"10.1145/3459104.3459173","DOIUrl":"https://doi.org/10.1145/3459104.3459173","url":null,"abstract":"This paper is concerned with goodness of fit evaluation for virtual commissioning modelling purposes. Our goal is to propose a coefficient that could take into consideration several commonly used methods and expert knowledge referring to model quality evaluation. In this paper we try to find an answer to the question whether the model is good from the virtual commissioning point of view and if it can be used in virtual commissioning. The aim of virtual commissioning is to create a simulation model of a plant. It is very useful and crucial from the modern automation point of view (especially Industry 4.0) owing to the fact that potential changes and upgrades can be tested before they are implemented to an existing process. It is a formidable challenge to introduce a method which allows to unambiguously decide whether the model could be used in virtual commissioning. In order to evaluate the goodness of fit, commonly used performance indices are NRMSE (Normalized Root Mean Square Error) and ME (Maximum Error). In this work the unique way of combining NRMSE and ME with fuzzy logic has been introduced. For evaluating the goodness of fit of a model we propose a coefficient that is based on Takagi-Sugeno-Kang fuzzy-inference system. The suggested method is flexible and well-suited for all kind of models and processes because of taking into consideration all aspects of a process. What is more, it also gives an easy way of applying expert knowledge into it.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127079533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ruiqing Xiao, Yuefei Zhu, Anxiang Hu, Xiaoya Zhu, Shengli Liu
A major user need is the completion of security audits by locating vulnerability functions using vulnerability information published by firmware manufacturers. However, it is difficult to manually analyze the relatively large number of patch functions involved in firmware updates. A patch analysis method based on multi-firmware comparison is presented in this study. This method narrows the search for suspected patch functions for vulnerability based on the similarities and differences between different firmware series involved in the vulnerability. Suspected patch functions in multiple firmware programs are first located and filtered based on intervals. Finally, a prototype system is implemented. The filtering results for the prototype system are used to manually locate two one-day vulnerabilities. The experimental results demonstrate that the two methods proposed in this study, namely, patch function location in multiple firmware programs and interval-based patch function filtering, effectively narrow the search for suspected patch functions and reduce the difficulty of manual analysis.
{"title":"A Patch Analysis Method Based on Multi-firmware Comparison","authors":"Ruiqing Xiao, Yuefei Zhu, Anxiang Hu, Xiaoya Zhu, Shengli Liu","doi":"10.1145/3459104.3459122","DOIUrl":"https://doi.org/10.1145/3459104.3459122","url":null,"abstract":"A major user need is the completion of security audits by locating vulnerability functions using vulnerability information published by firmware manufacturers. However, it is difficult to manually analyze the relatively large number of patch functions involved in firmware updates. A patch analysis method based on multi-firmware comparison is presented in this study. This method narrows the search for suspected patch functions for vulnerability based on the similarities and differences between different firmware series involved in the vulnerability. Suspected patch functions in multiple firmware programs are first located and filtered based on intervals. Finally, a prototype system is implemented. The filtering results for the prototype system are used to manually locate two one-day vulnerabilities. The experimental results demonstrate that the two methods proposed in this study, namely, patch function location in multiple firmware programs and interval-based patch function filtering, effectively narrow the search for suspected patch functions and reduce the difficulty of manual analysis.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Biswas, M. Haid, Ishak Boyaci, Indrashis Nath, Bharat Hegde, Oliver Janssen, Oliver Kohl, Andreas Minarski
Sentiment analysis also called Opinion Mining has been one of the most ancient topics in Natural Language Processing (NLP). NLP which is a subfield of AI enables machines to read, understand, interpret and manipulate human languages. The netizens often express their sentiments through tweets, reviews and ratings. Therefore, it's becoming increasingly popular to analyse these sentiments for commercial applications such as market analysis, product reviews, customer services and many more. This analysis can either be lexicon-based or machine learning-based. Lexicon-based techniques use dictionaries of words, which is then used to calculate a score for the polarity. Machine learning-based classifiers use a dataset to train a model which is used to find the sentiment of a sentence or a paragraph. ML-based approaches are more robust compared to the lexicon-based approach. The main contribution of this paper is to demonstrate the performance of various Machine Learning and Deep Learning models in Sentiment Analysis. In this paper, various models viz. Multinomial Naive Bayes(MNB), Support Vector Machine(SVM), Hidden Markov Model(HMM), Long Short Term Memory(LSTM) and Bidirectional Encoder Representations from Transformers(BERT), are trained through supervised learning, and then they are benchmarked through a qualitative analysis of accuracy, effectiveness and speed to provide an extensive overview of the various algorithms used in the field. The performance comparison of the various models presents an in-depth understanding of the different techniques within the framework of a comprehensive evaluation and discussion.
{"title":"Sentiment Analysis Using AI: A Comparative Study Comparative Study of 5 Different Algorithms and Benchmarking Them with A Qualitative Analysis of Training time, Prediction time, and Accuracy","authors":"J. Biswas, M. Haid, Ishak Boyaci, Indrashis Nath, Bharat Hegde, Oliver Janssen, Oliver Kohl, Andreas Minarski","doi":"10.1145/3459104.3459165","DOIUrl":"https://doi.org/10.1145/3459104.3459165","url":null,"abstract":"Sentiment analysis also called Opinion Mining has been one of the most ancient topics in Natural Language Processing (NLP). NLP which is a subfield of AI enables machines to read, understand, interpret and manipulate human languages. The netizens often express their sentiments through tweets, reviews and ratings. Therefore, it's becoming increasingly popular to analyse these sentiments for commercial applications such as market analysis, product reviews, customer services and many more. This analysis can either be lexicon-based or machine learning-based. Lexicon-based techniques use dictionaries of words, which is then used to calculate a score for the polarity. Machine learning-based classifiers use a dataset to train a model which is used to find the sentiment of a sentence or a paragraph. ML-based approaches are more robust compared to the lexicon-based approach. The main contribution of this paper is to demonstrate the performance of various Machine Learning and Deep Learning models in Sentiment Analysis. In this paper, various models viz. Multinomial Naive Bayes(MNB), Support Vector Machine(SVM), Hidden Markov Model(HMM), Long Short Term Memory(LSTM) and Bidirectional Encoder Representations from Transformers(BERT), are trained through supervised learning, and then they are benchmarked through a qualitative analysis of accuracy, effectiveness and speed to provide an extensive overview of the various algorithms used in the field. The performance comparison of the various models presents an in-depth understanding of the different techniques within the framework of a comprehensive evaluation and discussion.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130792040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sudoku is a puzzle which can be solved by putting digits in a two-dimensional grid/matrix so that no row, column or sub-grid contains any digit more than once. Many methods as well as their hybrids are available to solve Sudoku puzzles. However, these methods face some shortcomings such as not being able to solve puzzles of different difficulty levels and being time-consuming. This is because of overlooking some constraints, leading to violations of Sudoku rules, and/or executing fruitless steps as well as missing potential opportunities to find a solution faster. In this paper, we propose an improved hybrid of backtracking algorithm and pencil and paper method to overcome the limitations of the existing methods. Experimental results show that the proposed method is more effective as well as efficient in solving puzzles of different difficulty levels than the other available methods.
{"title":"An Improved Hybrid Method Combining Backtracking with Pencil and Paper for Solving Sudoku Puzzles","authors":"Adiba Afif Suha Binta Wadud, M. Abdullah-Al-Wadud","doi":"10.1145/3459104.3459176","DOIUrl":"https://doi.org/10.1145/3459104.3459176","url":null,"abstract":"Sudoku is a puzzle which can be solved by putting digits in a two-dimensional grid/matrix so that no row, column or sub-grid contains any digit more than once. Many methods as well as their hybrids are available to solve Sudoku puzzles. However, these methods face some shortcomings such as not being able to solve puzzles of different difficulty levels and being time-consuming. This is because of overlooking some constraints, leading to violations of Sudoku rules, and/or executing fruitless steps as well as missing potential opportunities to find a solution faster. In this paper, we propose an improved hybrid of backtracking algorithm and pencil and paper method to overcome the limitations of the existing methods. Experimental results show that the proposed method is more effective as well as efficient in solving puzzles of different difficulty levels than the other available methods.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"179 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131908958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the huge expansion of social media networks, they become an important part of users’ daily life everywhere, where users have large amount of data stored in these networks. these networks provide users with the tools and settings to control their privacy and security. Even though these settings give the users control over how to manage access to their data, they remain according to the specifications of the network providers rather than the user himself/herself. Role-based Access Control (RBAC) is a method used widely in managing user authorizations and restrictions in computer systems. In this paper we suggest an RBAC system called Grant, that provides fine-grained access control to user data. This system is also pluggable and can be used with any existing system or social network. Grant system gives the end user the full control to manage access to their data and create customs roles based on their needs. The system has a user interface to enable users to define roles and permissions over their resources inside social media networks. We show that our system Grant, can be used to create custom RBAC policies easily, and it can be used with other systems.
{"title":"User as a Super Admin: Giving the End-Users Full Control to Manage Access to Their Data in Social Media Networks","authors":"M. Awad, Raneen Al-karaki, Doaa Idais","doi":"10.1145/3459104.3459204","DOIUrl":"https://doi.org/10.1145/3459104.3459204","url":null,"abstract":"With the huge expansion of social media networks, they become an important part of users’ daily life everywhere, where users have large amount of data stored in these networks. these networks provide users with the tools and settings to control their privacy and security. Even though these settings give the users control over how to manage access to their data, they remain according to the specifications of the network providers rather than the user himself/herself. Role-based Access Control (RBAC) is a method used widely in managing user authorizations and restrictions in computer systems. In this paper we suggest an RBAC system called Grant, that provides fine-grained access control to user data. This system is also pluggable and can be used with any existing system or social network. Grant system gives the end user the full control to manage access to their data and create customs roles based on their needs. The system has a user interface to enable users to define roles and permissions over their resources inside social media networks. We show that our system Grant, can be used to create custom RBAC policies easily, and it can be used with other systems.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133812889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Emotion, as a crucial special ability of human beings, plays an important role in the cognitive process. With the development of biology and psychology, more and more attention has been paid to computer science by adding emotion into Agent. At present, most researches on the formation of human tissue groups are based on rational behaviour, which is not very good to consider the influence of affective factors on individual. Incorporating affective factors into cognitive behavioural modelling can significantly improve the authenticity and adaptability of cognitive behavioural models. Based on the related knowledge of computer science and psychology, this paper proposes a technical model of emotional Agent based on emotion and behaviour. From the perspective of interaction between emotion and behaviour, this paper constructs a basic framework of emotional Agent model and further analyses the application of emotional Agent.
{"title":"Construction of Agent Model Based on Emotional Interaction","authors":"Yongbin Zhu, Wenshan Li, Tao Li, Hui Zhao","doi":"10.1145/3459104.3459162","DOIUrl":"https://doi.org/10.1145/3459104.3459162","url":null,"abstract":"Emotion, as a crucial special ability of human beings, plays an important role in the cognitive process. With the development of biology and psychology, more and more attention has been paid to computer science by adding emotion into Agent. At present, most researches on the formation of human tissue groups are based on rational behaviour, which is not very good to consider the influence of affective factors on individual. Incorporating affective factors into cognitive behavioural modelling can significantly improve the authenticity and adaptability of cognitive behavioural models. Based on the related knowledge of computer science and psychology, this paper proposes a technical model of emotional Agent based on emotion and behaviour. From the perspective of interaction between emotion and behaviour, this paper constructs a basic framework of emotional Agent model and further analyses the application of emotional Agent.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134273312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper addresses the problem of locating a moving rigid body in three dimensional space using the range and range rate measurements between the on-the-body sensors and the unknown-position anchors outside the body. A novel method in obtaining algebraic solutions of the rotation matrix, the position vector, the angular velocity and the translational velocity is developed. The constrained Cramér-Rao lower bound (CRLB) for the rigid body localization problem is deduced to evaluate the performance of the proposed method. Simulation results show that the proposed method can reach the CRLB performance at low and moderate noise levels.
{"title":"3D Moving Rigid Body Localization in the Presence of Anchor Position Errors","authors":"Lin Zha, Daqing Chen, Guangyu Yang","doi":"10.1145/3459104.3459111","DOIUrl":"https://doi.org/10.1145/3459104.3459111","url":null,"abstract":"This paper addresses the problem of locating a moving rigid body in three dimensional space using the range and range rate measurements between the on-the-body sensors and the unknown-position anchors outside the body. A novel method in obtaining algebraic solutions of the rotation matrix, the position vector, the angular velocity and the translational velocity is developed. The constrained Cramér-Rao lower bound (CRLB) for the rigid body localization problem is deduced to evaluate the performance of the proposed method. Simulation results show that the proposed method can reach the CRLB performance at low and moderate noise levels.","PeriodicalId":142284,"journal":{"name":"2021 International Symposium on Electrical, Electronics and Information Engineering","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114593351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}