2020
DOI: 10.1016/j.automatica.2020.109152
|View full text |Cite
|
Sign up to set email alerts
|

Regularized LTI system identification in the presence of outliers: A variational EM approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 19 publications
0
5
0
Order By: Relevance
“…Using ∫ 𝜒 𝜀 = 1, an isolated value u 𝜈 can thus be approximated by c 𝜈 𝛿 𝜈 = (T s u 𝜈 )𝛿 𝜈 , suggesting that, for a small sampling period T s (= 𝜀), only large input deviations can significantly affect the estimation process. This yields the impulsive model with (n, q) = (5, 2): (1) , y (1) , y (2) , y (3) ] 𝜃…”
Section: Numerical Simulationmentioning
confidence: 99%
See 1 more Smart Citation
“…Using ∫ 𝜒 𝜀 = 1, an isolated value u 𝜈 can thus be approximated by c 𝜈 𝛿 𝜈 = (T s u 𝜈 )𝛿 𝜈 , suggesting that, for a small sampling period T s (= 𝜀), only large input deviations can significantly affect the estimation process. This yields the impulsive model with (n, q) = (5, 2): (1) , y (1) , y (2) , y (3) ] 𝜃…”
Section: Numerical Simulationmentioning
confidence: 99%
“…In a linear discrete time (DT) setting, system identification in the presence of impulsive disturbances has been studied in References 1‐4. These approaches, based on nonsmooth optimization (e.g., l1$$ {l}_1 $$ norm minimization), are generally developed in a batch mode and the reader may consult the survey paper 5 for a complete and comprehensive description of these optimization techniques.…”
Section: Introductionmentioning
confidence: 99%
“…As shown in Fig 3, we denote z(t), h(t) and y(t) as the input, hidden state and output of the time step t, respectively. The behavior of this RNN layer can be described by (23) where W i , W h and W o represent the weight matrix of the input layer, hidden layer and output layer, respectively, and σ is the activation function. The Hessian should be Unfold Fig.…”
Section: Hessian Computationmentioning
confidence: 99%
“…A framework for identifying the governing interactions and transition logics of subsystems in cyber-physical systems was presented in [46] by using Bayesian inference and pre-defined basis functions. A variational expectation maximization approach to SYSID when the data includes outliers was developed in [23]. Two approaches to SYSID using Bayesian networks were proposed in [2].…”
Section: Introductionmentioning
confidence: 99%
“…A comprehensive survey on the kernel design for the LTI system can be found in the work of Chen. 22 The GPRbased identification method has been an effective practice for estimating the impulse response, and it has been applied to the estimation of Volterra series, 23 Hammerstein systems, 24 system with outliers, 25 and other nonlinear processes. 26 This study extends the GPR-based identification method to the identification of batch process.…”
Section: Introductionmentioning
confidence: 99%