<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Methods of the Objects Identification and Recognition Research in the Networks with the IoT Concept Support</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Olha Shevchenko</string-name>
          <email>olia.shevchenko@ukr.net</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Bondarchuk</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Olha Polonevych</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Zhurakovskyi</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Korshun</string-name>
          <email>n.korshun@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Bo Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute</institution>
          ,”
          <addr-line>37 Peremohy ave., Kyiv, 03056</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>State University of Telecommunications</institution>
          ,
          <addr-line>7 Solomianska str., Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>277</fpage>
      <lpage>282</lpage>
      <abstract>
        <p>An emergence of intelligent devices, a large number of sensors, the issue of their identification and interaction becomes relevant in the era of information technologies development. A control object, a structural diagram of an identification system, an algorithm for the correlation method of identification have been considered in the article, and a general idea of managing the process of recognizing an information network object has been given.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Identification</kwd>
        <kwd>recognition</kwd>
        <kwd>Internet of things</kwd>
        <kwd>correlation method of identification</kwd>
        <kwd>networks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
    </sec>
    <sec id="sec-2">
      <title>2. Problem Identification</title>
      <p>Consider a control object described by the equations
 = 
 = 
+ 
+  ,
+</p>
      <p>;
∞
0
∞
0
∞
0
∞
0

 ( ) = ∫ ℎ( )</p>
      <p>
        ( −  ) .

 ( ) =   (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) ( −  ),
we write
      </p>
      <sec id="sec-2-1">
        <title>Let the input signal  ( ) is the white noise. It means that</title>
        <p>where r1ff is a known number characterizing the intensity of the “white noise.”
where the matrix A and the n-dimensional vectors  ,  ,  ′ are unknown; f(t) and x(t) are the external
disturbance and noise, which are immeasurable random functions with zero mathematical expectation.</p>
        <p>Depending on the identification method, additional restrictions will be imposed on external
disturbances and interferences (their white noise, limited dispersion, etc.).</p>
        <p>
          Since the object (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) is excited by a random external action, the estimate of the vector of its
unknown parameters will be a random variable. This value should have the properties of unbiasedness,
consistency, efficiency, and sufficiency.
listed properties.
        </p>
        <p>
          The purpose of object identification (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ), (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) is to determine estimates of its parameters that have the
The essence of the correlation method. Consider an object described by the equations
 = 
+ 
;  =
        </p>
        <p>+  .</p>
      </sec>
      <sec id="sec-2-2">
        <title>The solution of these equations for zero initial conditions has the form</title>
        <p>= 
+</p>
        <p>
          ;
where ℎ( −  ) is an impulse transient function, which is determined by the correlation method.
Equation (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ) can be written at  0 = −∞ as a convolution integral
 ( ) = ∫ ℎ( ) ( −  )
+  ( ).
        </p>
        <p>
          We multiply (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) by  ( −  ), then we obtain
 ( ) =  ( ) ( −  ) = ∫
ℎ( ) ( −  ) ( −  )
+  ( ) ( −  ).
        </p>
        <p>Assuming further  { ( )} =  { ( )} = 0 and applying the mathematical expectation operation,
 { ( ) ( −  )} = ∫ ℎ( ) { ( −  ) ( −  )}
+  { ( ) ( −  )}.</p>
        <p>
          (
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
        </p>
        <p>
          If external influence  ( ) and hindrance  ( ) are independent, then  { ( ) ( −  )} = 0. In
addition, denoting the correlation function  { ( −  ) ( −  )} =   ( −  ), and the
crosscorrelation function  { ( ) ( −  )} =   ( ), we write (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ) in the form of the Wiener-Hopf equation
(
          <xref ref-type="bibr" rid="ref1">1</xref>
          )
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
(
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(7)
(8)
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Substituting (8) into (7), we obtain</title>
        <p>
          ( ) =   (
          <xref ref-type="bibr" rid="ref1">1</xref>
          )ℎ( ).
        </p>
        <p>Thus, if the external influence is a random process of the white noise type, uncorrelated with the
measurement noise, then the cross-correlation function of the input and output signals is directly
proportional to the impulse transient function. The block diagram of the identification system is shown
in Ошибка! Источник ссылки не найден..</p>
        <p>( )=  ( )
ℎ( )=ℎ( )
}</p>
        <p>≤  ≤ ( + 1) ( = ̅0̅,̅̅̅).
 ( ) =  ∑ =0   [( −  ) ℎ( ) ( = ̅0̅,̅̅̅).</p>
        <p>(0) = [  (0)ℎ(0) +   (− )ℎ( ) + ⋯ +   (−
)ℎ(
)] ;

 ( ) = [  ( )ℎ(0) +   (0)ℎ( ) + ⋯ +   (−( − 1) )ℎ(
)] ;</p>
      </sec>
      <sec id="sec-2-4">
        <title>Then equation (7) takes the form</title>
        <p>For  = 0, equation (12) is written as</p>
        <p>For  = 1
random process with the ergodic property, is defined as
 ( ) = lim</p>
        <p>1→∞  11 ∫0 1  ( −  ) ( ) .</p>
        <p>Returning to the general case, we note that equation (7) is an integral equation for the unknown
function ℎ( ). The numerical solution of this equation forms the basis of the correlation identification
method.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Algorithm of the Correlation Identification Method</title>
      <sec id="sec-3-1">
        <title>Thus, we will assume that</title>
        <p>Passing to the solution of equation (7), we replace the upper limit in the integral by a finite number
 1. This means that the impulse transient function will be determined on the interval [0,  1], and for
 &gt;  1ℎ( ) = 0. This assumption is quite acceptable for asymptotically stable objects. In addition, we
will determine the value of the function  ( ) for discrete instants of time that differ from one another
by the value T, therefore, we divide the interval [0,  1) into 
=  1/ intervals.</p>
        <p>(9)
(10)
(11)
(12)
etc.</p>
        <p>Let us introduce vectors
and matrix
  (2 ) = [  (2 )ℎ(0) +   ( )ℎ( ) + ⋯ +   (−( − 2) )ℎ(
)]
  ′ = ‖  (0)  ( ) …   (
)‖; ℎ′ = ‖ℎ(0), ℎ( ) … ℎ(
)‖
 = ‖‖  ( )


 (0)
⋮
  (− ), … ,   (−</p>
        <p>)
  (0), … ,   [−( − 1) ]
⋮</p>
        <p>‖‖.
  (
)</p>
        <p>[( − 1) ], … ,   (0)
  ( ) =   (− ) ( = ̅0̅,̅̅̅).</p>
        <p>Note that the matrix R is symmetric, since the correlation function is even, therefore</p>
      </sec>
      <sec id="sec-3-2">
        <title>Taking into account the adopted designations, equation (12) takes the form</title>
        <p>ℎ.</p>
        <p>Whence the required vector is
ℎ =  −1
  .


  ( ) = 1  =−01  ( ) [( +  ) ] ( = ̅0̅,̅̅̅),
∑
  ( ) = 1  =−01  ( ) [( +  ) ] ( = ̅0̅,̅̅̅).
∑</p>
        <sec id="sec-3-2-1">
          <title>Let us now determine the vector</title>
          <p>and the matrix  from the experimental data. In this connection,
we write on the basis of (10) an approximate expression</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>Similarly,</title>
        <p>Thus, the algorithm for identifying the impulse transient function is reduced to calculating the
correlation and cross-correlation functions by formulas (16), (15), and then solving equation (14).</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. General Idea of Recognition Process Control Algorithm</title>
      <p>The considered concepts and definitions make it possible to construct an algorithm for the
recognition process in the form of a rule of the sequential search for solutions, which ensures the
development of an optimal plan for conducting experiments. The meaning of such an algorithm is that,
based on the prehistory of experimentation, as well as on the basis of information obtained as a result
of previous experiments, it determines the optimal plan for further experiments, all subsequent stages
of the object with the help of these means should be identified.</p>
      <p>The general record of the algorithm providing sequential planning of experiments can be represented
as
algorithm  2, … ,   ;  0,  2, . . ,</p>
      <p>absent.
 = { 0;  1,  1(  1);  2(  1
),  
2(  1
,   2); … ;   (  1, … ,    −1),  
 (  1, … ,    ), … }, (7.10)
In the algorithm  0 means that the final decision that an object belongs to the   class is made

without experiments. In this case, all operations indicated in the algorithm  1, … ,   ;  1, . . ,   are
absent. If the algorithm  0 is absent, then the first stage experiments are assigned  1. If, on the basis of
the characteristics of the object, determined from the information of the experiments of the first stage,
a final decision is made about its belonging to any class  1(  1), then all operations indicated in the</p>
      <p>The presence of a member in the algorithm   (  1, … ,    −1) means that, based on the study of the
features of the recognized object, obtained as a result outcome experiments   1, … ,    −1
.</p>
      <sec id="sec-4-1">
        <title>If the algorithm contains a term</title>
        <p>(  1, … ,    ), then this means that after receiving the outcomes
  1, … ,    experiments  1, … ,   , conducted according to the rule  , the final decision is made about
the belonging of the recognized object to the   class and no further experiments are carried out. The
procedure for planning experiments in accordance with the algorithm (17) is schematically shown in
Ошибка! Источник ссылки не найден..</p>
        <p>It follows from the consideration of the scheme that the algorithm works as follows. Let the object
 enter the recognition system. It was found that making a final decision without conducting
experiments  0 inappropriate and to determine its sign it was decided to conduct the experiment  1. Let
us assume that the possible outcomes of the experiment are  1 −  ′ 1
and  ′′1. These outcomes are
experiment  2( ′ 1) will be  ′ 2 or  ′′2′, then the final decisions should be made   2( ′ 1,  ′ 2) or
  2( ′ 1,  ′′2),  ,  ,  = 1, … ,  , and if the outcome is  ′′2, then it is necessary to conduct an experiment
 3( ′ 1,  ′′2). Outcomes of this experiment  ′ 3 and  ′′3 are analyzed again, and a plan for the further
development of experiments is developed.</p>
        <p>The algorithm works like a feedback system. Indeed, every time. the experimental results are used
to adjust the plan for subsequent experiments.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A. G.</given-names>
            <surname>Alexandrov</surname>
          </string-name>
          ,
          <article-title>Optimal and adaptive systems: Textbook for universities</article-title>
          ,
          <year>1989</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Medrish</surname>
          </string-name>
          , et al.,
          <source>Digital identification of objects</source>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A. L.</given-names>
            <surname>Gorelik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. A.</given-names>
            <surname>Skripkin</surname>
          </string-name>
          ,
          <article-title>Recognition methods: A textbook for universities</article-title>
          ,
          <year>1977</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>V. S.</given-names>
            <surname>Mikhalevich</surname>
          </string-name>
          ,
          <article-title>Sequential optimization algorithms and their application</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>I.</given-names>
            <surname>Kuzminykh</surname>
          </string-name>
          , et al.,
          <article-title>Investigation of the IoT Device Lifetime with Secure Data Transmission, Internet of Things, Smart Spaces, and Next Generation Networks and Systems (</article-title>
          <year>2019</year>
          )
          <fpage>16</fpage>
          -
          <lpage>27</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -30859-
          <issue>9</issue>
          _
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V. N.</given-names>
            <surname>Fomin</surname>
          </string-name>
          ,
          <source>Recurrent Estimation and Adaptive Filtering</source>
          ,
          <year>1984</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>