Soft computing applications in dynamic model identification of polymer extrusion process

被引:26
|
作者
Tan, LP [1 ]
Lotfi, A [1 ]
Lai, E [1 ]
Hull, B [1 ]
机构
[1] Nottingham Trent Univ, Sch Comp & Technol, Nottingham NG1 4BU, England
关键词
dynamic modelling; soft computing; GA-fuzzy algorithm; steepest decent error back-propagation; semi-physical modelling; distributed parameter system; adaptive; polymer extrusion;
D O I
10.1016/j.asoc.2003.10.004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes the applications of soft computing to deal with the constraints in conventional modelling techniques of the dynamic extrusion process. The proposed technique increases the efficiency in utilising the available information during the model identification. The resultant model can be classified as a 'grey-box model' or has been termed as a 'semi-physical model' in the context. The extrusion process contains a number of parameters that are sensitive to the operating environment. Fuzzy rule-based system (FRBS) is introduced into the analytical model of extrusion by means of sub-models to approximate those operational-sensitive parameters. In drawing an optimal structure for each sub-model, a hybrid algorithm of genetic algorithm with fuzzy system ( GA-fuzzy) has been implemented. The sub-models obtained show advantages such as linguistic interpretability, simpler rule-base and less membership functions (MFs). The developed model is adaptive with its learning ability through the steepest decent error back-propagation algorithm. This ability might help to minimise the deviation of the model prediction when the operational-sensitive parameters adapt to the changing operating environment in the real situation. The model is first evaluated through simulations on the consistency of model prediction with the theoretical analysis. Then, the usefulness of adaptive sub-models during the operation is further explored in existence of prediction error. (C) 2004 Elsevier B.V. All rights reserved.
引用
收藏
页码:345 / 355
页数:11
相关论文
共 50 条
  • [21] Fusion of soft computing and hard computing in industrial applications: An overview
    Ovaska, SJ
    VanLandingham, HF
    Kamiya, A
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2002, 32 (02): : 72 - 79
  • [22] Soft computing approach to nonlinear system identification
    Kawaji, S
    Chen, Y
    IECON 2000: 26TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, VOLS 1-4: 21ST CENTURY TECHNOLOGIES AND INDUSTRIAL OPPORTUNITIES, 2000, : 1803 - 1808
  • [23] Soft computing technologies in nuclear engineering applications
    Uhrig, RE
    Tsoukalas, LH
    PROGRESS IN NUCLEAR ENERGY, 1999, 34 (01) : 13 - 75
  • [24] An Approach of Soft Computing Applications in Clinical Neurology
    Simic, Dragan
    Simic, Svetlana
    Tanackov, Ilija
    HYBRID ARTIFICIAL INTELLIGENT SYSTEMS, PART II, 2011, 6679 : 429 - +
  • [25] TOWARDS THEORETICAL FOUNDATIONS OF SOFT COMPUTING APPLICATIONS
    NGUYEN, HT
    KREINOVICH, V
    INTERNATIONAL JOURNAL OF UNCERTAINTY FUZZINESS AND KNOWLEDGE-BASED SYSTEMS, 1995, 3 (03) : 341 - 373
  • [26] Applications of soft computing – some personal reflections
    E. P. Klement
    Soft Computing, 1998, 2 (1) : 16 - 17
  • [27] Soft computing and intelligent systems: techniques and applications
    Thampi, Sabu M.
    El-Alfy, El-Sayed M.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 36 (03) : 1939 - 1944
  • [28] Low-cost process monitoring for polymer extrusion
    Deng, Jing
    Li, Kang
    Harkin-Jones, Eileen
    Price, Mark
    Fei, Minrui
    Kelly, Adrian
    Vera-Sorroche, Javier
    Coates, Phil
    Brown, Elaine
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2014, 36 (03) : 382 - 390
  • [29] Internet-enabled soft computing holarchies for e-health applications - Soft computing enhancing the Internet and the Internet enhancing soft computing
    Ulieru, M
    ENHANCING THE POWER OF THE INTERNET, 2004, 139 : 131 - 165
  • [30] A Soft Computing Model to Counter Terrorism
    Marappan, Karthikeyan
    Nallaperumal, Krishnan
    Kannan, K. Senthamarai
    Bensujin, B.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2008, 8 (05): : 141 - 147