INTRODUCTION
1
When running the system continuously in cycles of wait for events, run, stop and
wake-up. Embedded devices can be found in a wide array of products including
aircraft and military systems, biomedical systems, cars, communications,
computer I/O devices, electronic instrumentation, home electronics, industrial
equipment, office machines, personal devices, robots, and smart toys.
Embedded devices can be found everywhere. Embedded systems designers often
face challenging design goals. Embedded systems must be reliable. Many
embedded devices cant crash, and may not be able to reboot. Software cant be
updated in many embedded devices. Many devices have critical performance &
power design constraints. Real-time constraints occur in many applications and
many devices have limited memory and processing power. Some devices may
need to run on battery power for long periods of time. In addition, consumer
devices typically have a fast time to market on new products and are very cost
competitive.
Most new devices have complex software that needs support for multitasking,
synchronization of tasks, support for a wide range of I/O devices, scheduling and
buffering of I.O operations, memory management, support for graphics displays,
file systems, networking, security, and power management.
An operating system can provide all of these features to aid application
developers. Application programmers are more productive since they can work at
a higher level of abstraction by using these features provided by the operating
system.
A recently released cell phone design contained over five million lines of code.
Few, if any projects, will have the time and funding needed to develop all
of this code entirely on their own. In cases such as this, it makes economic sense
to use an existing operating system. The development time and costs saved more
than pays for the licensing.
An embedded system is a computer system with a dedicated function within a
larger mechanical or electrical system, often with real-time computing constraints
2
.It is embedded as part of a complete device often including hardware and
mechanical parts. By contrast, a general-purpose computer, such as a personal
computer (PC), is designed to be flexible and to meet a wide range of end-user
needs. Embedded systems control many devices in common use today
1.1.2 History
One of the very first recognizably modern embedded systems was the Apollo
Guidance Computer, developed by Charles Stark Draper at the MIT
Instrumentation Laboratory. At the project's inception, the Apollo guidance
3
computerwasconsideredtheriskiestitemintheApolloprojectasitemployed the then
newly developed monolithic integrated circuits to reduce the size and weight. At
the project's inception, the Apollo guidance computer was considered.
Embedded systems range from no user interface at all, in systems dedicated only
to one task, to complex graphical user interfaces that resemble modern computer
desktop operating systems. Simple embedded devices use buttons, LEDs, graphic
or character LCDs (for example popularHD44780LCD)with a simple menu
system.
More sophisticated devices which use a graphical screen with touch sensing or
screen-edge buttons provide flexibility while minimizing space used: the meaning
of the buttons can change with the screen, and selection involves the natural
behavior of pointing at what's desired. Hand held systems often have a screen
with a "joystick button" for appointing device.
4
1.2 MICROCONTROLLER
While some embedded systems are very sophisticated, many have minimal
requirements for memory and program length, with no operating system, and low
software complexity. Typical input and output devices
includeswitches, relays, solenoids,LEDs, small or custom liquid-crystal displays,
radio frequency devices, and sensors for data such as temperature, humidity, light
level etc. Embedded systems usually have no keyboard, screen, disks, printers, or
other recognizable I/O devices of apersonal computer , and may lack human
interaction devices of any kind.
System-on-Chip)
eZ8 8-bitbasedfamilyofmicrocontrollers
CortexM4F),32-bitTriCoreand,32-bitAurix TricoreBitmicrocontrollers[10]
MIPS
7
1.3.1 Device Overview
The AVR is a modified Harvard architecture machine where program and data are
stored in separate physical memory systems that appear in different Address
spaces, but having the ability to read data items from program memory
usingspecialinstruction
8
detecting and isolating a faulty sensor even in the case when multiple
e ective in dealing with abrupt sensor failures, this method is not able
sensors, it has become less and less feasible and cost e ective to
9
three or more sensors usually being necessary to identify the faulty
sensor. It has been shown that these methods are relatively easy to
fail and show similar symptoms because they are operated in the
readings and the values estimated from the nominal model. The
underlying physics.
10
As illustrated in Figure 1.1, this proposed methodology aims to identify
system.
Sensor
Subsystem 1 Set 1
Sensor
Interconnected
Subsystem 2 Set 2
Subsystems
Sensor
Subsystem N Set N
Monitored Sensor
System Network
11
Detect and identify incipiensensor f
12
1.5 Thesis Outline.
In Chapter II, the state-of-the-art techniques for fault detection and isolation and
information from the measurement system for the detection and isolation of a
faulty sensor instead of deploying multiple sensors for the same measured
based expert systems, and data-driven methods. The research and application
challenges in the reviewed topic are also identi ed, and associated future research
assumption that the dynamics of the monitored system as well as the associated
algorithm is used to track the changes of the time constants and gains of the sensor
and the monitored system, simultaneously. Without the use of redundant sensors,
this method utilizes the fact that the sensor readings depict dynamic characteristics
of the sensors as well as the monitored system. To evaluate its performance, this
wear, which decreases performance reliability and increases the potential for fail-
1996], computer networks [Dasgupta and Gonzalez, 2002; Harmer et al., 2002],
automotive [Crossman et al., 2003; Murphey et al., 2003] and aircraft engines
CHAPTER 2
LITERATURE SURVEY
2.1 Sensor fault detection for the roll dynamic model of a generic delta-
wing aircraft
Abstract:
This paper proposes a fault detection algorithm for the roll dynamic model
of a generic delta-wing aircraft. It is assumed that the system model has some
noise/uncertainties and the measured roll angle and roll rate used by the control
law are faulty/under attack. The proposed fault detection algorithm employs a fault
detection estimator and adaptive thresholds to detect the occurrence of a fault in
the sensor measurements. Simulation results are presented to show the
performance of the proposed algorithm.
Abstract:
2.3 A sensor fault detection and isolation strategy by using a Dendritic Cell
Algorithm
Abstract:
In this paper, an online sensor fault detection and isolation (FDI) scheme is
proposed based on an emerging Artificial Immune System (AIS) algorithm, namely
Dendritic Cell Algorithm (DCA). Our proposed methodology is utilized in a
distributed manner in order to perform sensor FDI in complex systems. The
proposed methodology is then applied to a wind turbine benchmark model in order
to demonstrate its capabilities.
2.4 Stator current sensor fault detection and isolation for vector controlled
induction motor drive
Abstract:
The paper deals with the fault tolerant Direct Field Oriented Control (DFOC) of an
induction motor drive. Influence of the stator current sensor faults to the properties
of the DFOC drive system is presented. To the current sensor fault detection the
simple algorithmic/logical mechanism, based on the measured currents is used.
After the fault detection, drive topology is changed. For the calculation of the
stator current components (in the stationary reference frame) other algebraic
relations based on the signals from the active sensors are used. Drive is tested in
simulation and in the laboratory set-up with 1.1kW machine under faulted and
post-fault conditions, in wide speed reference changes. All tests were performed on
the ds1202 card.
2.5 Use of Extended Kalman Filter in position sensor fault detection for
stepper motors
Abstract:
Stepper motors are often used as actuators in harsh environments such as nuclear
power plants or particle accelerators due to their high reliability and relatively
precise open loop positioning. Their significant disadvantage, however, is their
jerky motion profile, caused by the stepping action and introducing vibrations to
the actuated system. These vibrations can reduce the lifetime of the mechanics
when compared to the smooth motion profile that can be achieved using closed-
loop position control. In order to have the reliability of open-loop control, but the
smoother motion of closed-loop control, real-time position sensor fault detection
can allow sensors to be used in normal operation and, if a fault is detected, switch
to open-loop. In this paper, sensor fault detection for stepper motors using the
Extended Kalman Filter is studied. A novel method to detect a sensor fault is
proposed and compared to a standard one.\
Abstract:
This paper describes the use of magnetic sensors in fault monitoring of a
conventional planter that does not have embedded technology. An alternative
solution for small and medium farmers in the fault detection that are common and
that generate negative impacts on production. The control algorithm allows the
parameterization and configuration of embedded system for different types of
equipment. A case study was conducted in rural property, with the installation of
the control system in a planter. Results show that the fault detection was
satisfactory with the sound alerts generated at all failure scenarios.
2.7 Fundamentals of wireless communications
Abstract:
Radio Frequency (RF) communications are an important smart grid enabler for
functions such as volt/VAR control, recloser control, feeder restorations and
isolation, fault detections and sensor alerting in other industrial markets such as
cement, mining, and transportation. This paper will give a basic tutorial on the
types of radio frequency communications and the benefits and liabilities of each.
Specific topics to be explored will be licensed versus unlicensed frequencies,
distance between remote devices and base stations, and communication
architectures. Radio technology is often referred in numerical ranges or
frequencies. The decision on which frequency to employ in a network depends on a
few key variables. Prior to deciding which frequency for a network, the application
for the radio use will assist with dictation of which frequency range to utilize.
Applications such as recloser control and volt/Var control may require a radio
device that can provide a high bandwidth/fast speed solution. Other SCADA
applications such as sensor monitoring may only require small bandwidth and for
data delivery to be at a much slower speed. Besides SCADA applications, wireless
communications is now required in other industries such as cement and mining.
Another variable when deciding on a radio network is the distance from the main
hosts to end remote devices such as RTUs or PLCs in the SCADA environment
and sensors and devices for monitoring kiln states in the cement industry. Lower
end frequencies (100MHz-900MHz) provide further coverage and greater distance
from base stations/Access Points to remote end devices, whereas higher
frequencies (2.4GHz-5.8GHz) provide shorter distance coverage, but higher
bandwidth and relay data back to SCADA hosts much faster.
2.8 Development of a new modeling circuit for the Remote Terminal Unit
(RTU) with GSM communication
Abstract:
This paper introduces the design and development of Intelligent Remote Terminal
Unit (RTU) which is to be applied as an automation technique for operating and
controlling the low voltage (LV) downstream of 415/240V to enhance reliability of
power for the consumers. The design proposed based on Global System for Mobile
(GSM) communication and this paper also presents an efficient design for
distribution automation system and its implementation in remote/automatic
monitoring and controlling of the relays (circuit breaker) by means of GSM Short
Message Service (SMS) services, automatic decision making and continuous
monitoring of distribution system components in real time [1]. The systems has
been equipped with microcontroller as a main component which act as an RTU
programmed using Microcontroller PRO compiler software. The RTU provides
monitoring fault operation, controlling functions and data collection for analysis.
RTU will initiate the transaction with the digital and output modules. The master of
this system is RTU and the slaves are digital and output modules. RTU plays an
important role in detecting fault and assigned to serve message immediately in the
control room. This system involves the detection of fault connected to the
microcontroller (PIC18F77A) and GSM modem. When the fault occurs, the sensor
will send the signals to the PIC16F77A. The PIC is programmed to process the
data and send the signals to the GSM modem.
Abstract:
Wireless Sensor Networks run critical applications and need to be protected against
malicious attacks and faults. In this paper we propose Adaptive Trust Management
Protocol, a protocol that adjusts trust and reputation based on node behavior. The
protocol includes three phases: the Learning phase, in which experience is
computed based on these alerts received from TinyAFD, the Exchanging phase, in
which experience associations are exchanged between neighbor nodes, and the
Updating phase, in which trust and reputation are updated based on experience.
ATMP has been implemented on top of TinyOS and has been tested using TOSSIM
in several attack scenarios to evaluate the evolution of experience, trust and
reputation.
2.10 Automatic real-time fault detection for industrial assets using meta
sensors
Abstract:
Large-scale industrial plants require physical sensors to continuously measure
quantities such as temperatures or pressures. A large number of sensors is required
to accurately describe the operating state of the plant, which unfortunately makes it
very difficult for them to be effectively monitored by human operators. In this
work we present a method to construct so-called meta sensors, virtual sensors that
compress the information from several sensors in an optimal manner.
CHAPTER-3
PROPOSED SYSTEM
These approaches have been widely used in safety-critical systems for their
simplicity and robustness. Among the various analytical redundancy approaches,
a model-based method re- quires an accurate mathematical model of the target
dynamic system that can be described using parity relations, Luenberger observers
and Kalman lters, and pa-rameter estimators.
As a result, abundant data can be collected for the purpose of system control
and diagnosis. This has not only encouraged the development of various data-
driven methods including the multivariate statistical methods, Bayesian belief
networks, and artificial neural networks, but also enabled their wide industrial
applications.
As illustrated in Figure 2.4, a knowledge-based expert system is generally com-
posed of a user interface, a knowledge base, an inference engine and an
interpretation element. The knowledge base stores the historical data as well as the
accumulated rules, facts and expert experiences, based on which the useful
analytical or heuristic information is derived via the inference engine. Through the
user interface, an expert can not only provide the domain knowledge as inputs but
also supervise the fault identification and isolation process.
3.2 OVERALL BLOCK DIAGRAM
3.3 WORKING
Despite these existing research e orts, the detection, isolation, and compensation
of the instrument faults in a dynamic system remain a challenging problem. In the
application of the automotive engine, for instance, the demands for higher fuel
efficiency and reduced emissions has driven the development of advanced
powertrain technologies such as the turbocharger and the dual-cam variable valve-
train. The introduction of additional components into the conventional engine
enables the exploitation of advanced combustion strategies, which also raises the
need for additional sensing elements such as the ethanol sensor in ex-fuel vehicles
for the development of dedicated controls. In the meantime, the use of additional
sensors also introduces system complexity, and thus raises challenges in diagnosis.
Due to the cost constraints in most applications, the use of a hardware redundancy
approach is limited. Moreover, despite accumulated system knowledge, the
additional components and sensing elements introduce uncertainties into the
system. Thus, significant e orts are required to augment the existing model-based
diagnostic system or knowledge-based expert system.
The goal of the proposed research is to explore methods that can accomplish
quantitative assessment of sensor performance in a sensor network and
compensation of the effects of its degradation on system control and diagnosis.
Without the use of duplicate sensing hardware, the method aims to utilize the
embedded analytical redundancies for the detection and isolation of faulty sensors,
even in the presence of failures in the monitored system. With a quantitative
assessment of the performance of each sensor within the network, the
measurements of a faulty sensor can be re-constructed and its effects on the
controller as well as other measured variables can be compensated, thus
improving the reliability of the target system.
Identify the underlying analytical redundancies in the target system using sensor
measurements and control signals observed during regular operations rather than
using special inputs Isolate the intertwined dynamics of the sensor(s) and the
monitored system, Eliminate the influences of a fault in one sensor on other
sensors Isolate of the effects of a fault in the sensor network and one in the
monitored system on the collected measurements.
CHAPTER 4
OVERVIEW OF PROJECT
(ii) The dynamics of the sensor is much faster than that of the monitored
system. This assumption is not very restrictive because the dynamics of
the sensor should be at least 5-10 times faster than that of the
monitored system so that the dynamics of the monitored system can be
captured.
(iii) The process disturbances wp(t) and measurement noise wn(t) are wide-
sense stationary processes.
It should also be noted that the process disturbances w p(t) and the measurement
noise wn(t) are assumed to enter the target system at different locations. The
process disturbances wp(t) enters the system between the monitored plant and the
sensor, while the measurement noise wn(t) enters after the sensor. This assumption
is critical for the isolation of the gain factors in the monitored plant and sensor,
which is described in more details in the remainder of this section.
Process Measurement
Disturbances wp(t) Noise wn(t)
+ + Sensor + +
Monitored
Signal
uc(t) Signal ym(t)
Since the compound system in Figure 3.1 is linear and causal, the measured signals
ym can be described in terms of the available input signals u c and the unknown
process disturbances wp and measurement noise wn in the following relation.
We implement our project in real time demo using the basic hardware
components. The basic components includes microcontroller embedded with some
modules
Device overview
The AVR is a modified Harvard architecture machine where program and data
restored in separate physical memory systems that appear in different address
spaces, but having the ability to read data items from program memory using
special instructions.
PIR sensors are more complicated than many of the other sensors explained in
these tutorials (like photocells, FSRs and tilt switches) because there are multiple
variables that affect the sensors input and output. To begin explaining how a basic
sensor works, we'll use this rather nice diagram
The PIR sensor itself has two slots in it, each slot is made of a special material that
is sensitive to IR. The lens used here is not really doing much and so we see that
the two slots can 'see' out past some distance (basically the sensitivity of the
sensor). When the sensor is idle, both slots detect the same amount of IR, the
ambient amount radiated from the room or walls or outdoors. When a warm body
like a human or animal passes by, it first intercepts one half of the PIR sensor,
which causes a positive differential change between the two halves. When the
warm body leaves the sensing area, the reverse happens, whereby the sensor
generates a negative differential change. These change pulses are what is detected.
LCD (Liquid Crystal Display) screen is an electronic display module and find a
wide range of applications. A 16x2 LCD display is very basic module and is very
commonly used in various devices and circuits. These modules are preferred
over seven segments and other multi segment LEDs. The reasons being: LCDs are
economical; easily programmable; have no limitation of displaying special &
even custom characters (unlike in seven segments), animations and so on.
A 16x2 LCD means it can display 16 characters per line and there are 2 such lines.
In this LCD each character is displayed in 5x7 pixel matrix. This LCD has two
registers, namely, Command and Data.
The command register stores the command instructions given to the LCD. A
command is an instruction given to LCD to do a predefined task like initializing it,
clearing its screen, setting the cursor position, controlling display etc. The data
register stores the data to be displayed on the LCD. The data is the ASCII value of
the character to be displayed on the LCD. Click to learn more about internal
structure of a LCD.
GSM/GPRS MODEM
GSM/GPRS MODEM is a class of wireless MODEM devices that are designed for
communication of a computer with the GSM and GPRS network. It requires a SIM
(Subscriber Identity Module) card just like mobile phones to activate
communication with the network. Also they have IMEI (International Mobile
Equipment Identity) number similar to mobile phones for their identification. A
GSM/GPRS MODEM can perform the following operations:
Pin Description:
Pin
Pin name Description Alternate Function
No.
31 GND GROUND
The high-performance Atmel AVR ALU operates in direct connection with all the
32 general purpose working registers. Within a single clock cycle, arithmetic
operations between general purpose registers or between a register and an
immediate are executed. The ALU operations are divided into three main
categories arithmetic, logical, and bit-functions. Some implementations of the
architecture also provide a powerful multiplier supporting both signed/unsigned
STATUS REGISTER:
The Status Register contains information about the result of the most recently
executed arithmetic instruction. This information can be used for altering program
flow in order to perform conditional operations. Note that the Status Register is
updated after all ALU operations. This will in many cases remove the need for
using the dedicated compare instructions, resulting in faster and more compact
code.
The Status Register is not automatically stored when entering an interrupt routine
and restored when returning from an interrupt. This must be handled by software.
The Global Interrupt Enable bit must be set for the interrupts to be enabled. The
individual interrupt enable control is then performed in separate control registers.
If the Global Interrupt Enable Register is cleared, none of the interrupts are
enabled independent of the individual interrupt enable settings. The I-bit is cleared
by hardware after an interrupt has occurred, and is set by
the RETI instruction to enable subsequent interrupts. The I-bit can also be set and
cleared by the application with the SEI and CLI instructions.
The Bit Copy instructions BLD (Bit Load) and BST (Bit Store) use the T-bit as
source or destination for the operated bit. A bit from a register in the Register File
can be copied into T by the BST instruction, and a bit in T can be copied into a bit
in a register in the Register File by the BLD instruction.
The S-bit is always an exclusive or between the Negative Flag N and the Twos
Complement Overflow Flag V.
The Register File is optimized for the AVR Enhanced RISC instruction set. In order
to achieve the required performance and flexibility, the following input/output
schemes are supported by the Register File:
STACK POINTER:
The Stack is mainly used for storing temporary data, for storing local variables and
for storing return addresses after interrupts and subroutine calls. The Stack Pointer
Register always points to the top of the Stack. Note that the Stack is implemented
as growing from higher memory locations to lower memory locations. This implies
that a Stack PUSH command decreases the Stack Pointer.
The Stack Pointer points to the data SRAM Stack area where the Subroutine and
Interrupt Stacks are located. This Stack space in the data SRAM must be defined
by the program before any subroutine calls are executed or interrupts are enabled.
The Stack Pointer must be set to point above 0x60. The Stack Pointer is
decremented by one when data is pushed onto the Stack with the PUSH
instruction, and it is decremented by two when the return address is pushed onto
the Stack with subroutine call or interrupt. The Stack Pointer is incremented by one
when data is popped from the Stack with the POP instruction, and it is
incremented by two when address is popped from the Stack with return from
subroutine RET or return from interrupt RETI.
The AVR Stack Pointer is implemented as two 8-bit registers in the I/O space. The
number of bits actually used is implementation dependent. Note that the data space
in some implementations of the AVR architecture is so small that only SPL is
needed. In this case, the SPH Register will not be present.
This section describes the different memories in the Atmel AVR ATmega8. The
AVR architecture has two main memory spaces, the Data memory and the Program
Memory space. In addition, the ATmega8 features an EEPROM Memory for data
storage. All three memory spaces are linear and regular.
The lower 1120 Data memory locations address the Register File, the I/O Memory,
and the internal data SRAM. The first 96 locations address the Register File and
I/O Memory, and the next 1024 locations address the internal data SRAM. The five
different addressing modes for the Data memory cover: Direct, Indirect with
Displacement, Indirect, Indirect with Pre-decrement, and Indirect with Post-
increment. In the Register File, registers R26 to R31 feature the indirect addressing
pointer registers. The direct addressing reaches the entire data space. The Indirect
with Displacement mode reaches 63 address locations from the base address given
by the Y-register or Z-register.
When using register indirect addressing modes with automatic pre-decrement and
post-increment, the address registers X, Y and Z are decremented or incremented.
The 32 general purpose working registers, 64 I/O Registers, and the 1024 bytes of
internal data SRAM in the ATmega8 are all accessible through all these addressing
modes.
The EEPROM Access Registers are accessible in the I/O space. A self-timing
function, however, lets the user software detect when the next byte can be written.
If the user code contains instructions that write the EEPROM, some precautions
must be taken. In heavily filtered power supplies, VCC is likely to rise or fall
slowly on Power-up/down. This causes the device for some period of time to run at
a voltage lower than specified as minimum for the clock frequency used. In order
to prevent unintentional EEPROM writes, a specific write procedure must be
followed. When the EEPROM is read, the CPU is halted for four clock cycles
before the next instruction is executed. When the EEPROM is written, the CPU is
halted for two clock cycles before the next Instruction is executed.
CHAPTER 5
OVERVIEW OF SOFTWARE
The user can execute the program, single step through the code either by
tracing into or stepping over functions, step out of functions, place the cursor on a
statement and execute until that statement is reached, stop the execution, and reset
the execution target. In addition, the user can have an unlimited number of code
breakpoints, and every breakpoint can be defined as enabled or disabled. The
breakpoints are remembered between sessions. The source window gives
information about the control flow of the program. In addition, AVR studio offers a
number of other windows which enables the user to have full control of the status
of every element in the execution target. The available windows are:
Proteus is a powerful management tool, which can help your company to monitor
and analyze the usage of your telephones hence allowing you to have more control
of your telecommunications services.
5.2.1 Embedded C
Embedded C use most of the syntax and semantics of standard C, e.g., main()
function, variable definition, data type declaration, conditional statements( if,
switch, case), loops (while, for), functions, arrays and strings, structures and union,
bit operations, macros, unions, etc. Embedded C is used for microcontroller based
applications applicable in Embedded Systems. Embedded C has to use with the
limited resources (RAM, ROM, I/Os) on an embedded processor unlike that of
desktop systems like PC where we need not bother about memory. Embedded C
requires compilers to create files to be downloaded to the microcontrollers where it
needs to run. Embedded C uses most of the syntax and functions of standard C, eg,
main(), variable definition, data type declaration, conditional statements( if, switch,
case), loops (while, for), functions, arrays and strings, bit operations etc..
5.2.2ADVANTAGES:
CHAPTER 6
CONCLUSION
System Dynamics Identification and Analysis The method presented in Chapter III
is able to identify the dynamics in a single-input-single-output dynamic sys-tem.
Based on the assumption that the dynamics of the sensor is much faster than that
of the monitored system, the proposed approach identifies the dynamics and the
associated gain factors of the sensor and the monitored system. As a result, the
method can detect and quantify sensor performance degradation in the compound
system without the use of redundant sensing equipment. It is able to distinguish
sensor and plant degradation in an environment where either the plant, or the
sensor monitoring that plant could undergo degradation in their dynamic
properties. In addition, the method accomplishes identification of sensor and plant
dynamics using inputs observed during normal system operations, rather than
using special inputs. Consequently, such a method is capable of assessing the
sensor health condition as the system operates. Furthermore, this method is able to
improve the accuracy of collected information despite the presence of sensor
degradation by directly compensating for the adverse effects of the degradation in
its measurements.
System Input Selection for Nonlinear System Identification In order to deal with
the increasing complexity in a multiple-input-multiple-output dynamic system, a
method is proposed in Chapter IV to identify the most correlated input variables
and the associated dynamic dependence with the output variable in a nonlinear
sys-tem. Without requiring a thorough understanding of the target system, the
proposed method establishes a general approach that can be applied to various
nonlinear system identification algorithms.
REFERENCES
[4] H. Salzmann and B. Froehlich, The two-user seating buck: Enabling face-to-
face discussions of novel car interface concepts, in Virtual Reality Conference,
2008. VR 08. IEEE, March 2008, pp. 7582.