Shape Shifters Lily Anne Y. Welty Tamai; Ingrid Dineen-Wimberly; Paul Spickard
01/2020
eBook
Shape Shifters presents a wide-ranging array of essays that examine peoples of mixed racial identity. Moving beyond the static "either/or" categories of racial identification found within typical ...insular conversations about mixed-race peoples,Shape Shifters explores these mixed-race identities as fluid, ambiguous, contingent, multiple, and malleable. This volume expands our understandings of how individuals and ethnic groups identify themselves within their own sociohistorical contexts. The essays in Shape Shifters explore different historical eras and reach across the globe, from the Roman and Chinese borderlands of classical antiquity to medieval Eurasian shape shifters, the Native peoples of the missions of Spanish California, and racial shape shifting among African Americans in the post-civil rights era. At different times in their lives or over generations in their families, racial shape shifters have moved from one social context to another. And as new social contexts were imposed on them, identities have even changed from one group to another. This is not racial, ethnic, or religious imposture. It is simply the way that people's lives unfold in fluid sociohistorical circumstances. With contributions by Ryan Abrecht, George J. Sánchez, Laura Moore, and Margaret Hunter, among others, Shape Shifters explores the forces of migration, borderlands, trade, warfare, occupation, colonial imposition, and the creation and dissolution of states and empires to highlight the historically contingent basis of identification among mixed-race peoples across time and space.
Radio-Frequency Identification (RFID) is an emerging technology which has been widely applied in various scenarios, such as tracking, object monitoring, and social networks, etc. Cloning attacks can ...severely disturb the RFID systems, such as missed detection for the missing tags. Although there are some techniques with physical architecture design or complicated encryption and cryptography proposed to prevent the tags from being cloned, it is difficult to definitely avoid the cloning attack. Therefore, cloning attack detection and identification are critical for the RFID systems. Prior works rely on that each clone tag will reply to the reader when its corresponding genuine tag is queried. In this article, we consider a more general attack model, in which each clone tag replies to the reader's query with a predefined probability, i.e., attack probability . We concentrate on identifying the tags being attacked with the probability no less than a threshold <inline-formula> <tex-math notation="LaTeX">P_{t} </tex-math></inline-formula> with the required identification reliability <inline-formula> <tex-math notation="LaTeX">\alpha </tex-math></inline-formula>. We first propose a basic protocol to Identify the Probabilistic Cloning Attacks with required identification reliability for the large-scale RFID systems called IPCA. Then we propose two enhanced protocols called MS-IPCA and S-IPCA respectively to improve the identification efficiency. We theoretically analyze the parameters of the proposed IPCA, MS-IPCA and S-IPCA protocols to maximize the identification efficiency. Finally we conduct extensive simulations to validate the effectiveness of the proposed protocols.
This article reviews and investigates several basic recursive parameter identification methods for a general stochastic system with colored noise (i.e., output-error autoregressive moving average ...system or Box–Jenkins system). These recursive identification methods are derived by means of the hierarchical identification principle and the filtering identification idea, including a filtered auxiliary-model hierarchical generalized extended stochastic gradient algorithm, a filtered auxiliary-model hierarchical multi-innovation generalized extended stochastic gradient algorithm, a filtered auxiliary-model hierarchical recursive generalized extended gradient algorithm, a filtered auxiliary-model hierarchical multi-innovation recursive generalized extended gradient algorithm, a filtered auxiliary-model hierarchical generalized extended least squares algorithm, and a filtered auxiliary-model hierarchical multi-innovation generalized extended least squares algorithm by using the auxiliary-model identification idea. The presented filtered auxiliary-model hierarchical generalized extended identification algorithms can be extended to other linear and nonlinear systems with colored noises.
For three decades, model predictive control (MPC) has been the flagship advanced control method in the chemical process industries. However, most implementations still use heuristic methods for ...designing MPC estimators, especially for offset-free MPC implementations. In this paper, we present a recently developed maximum likelihood-based method for the identification of linear augmented disturbance models for use in offset-free MPC. This method provides noise covariances that are used to derive Kalman filters and moving horizon estimators, forgoing the need for manual design and tuning of the estimator. The method is extended to handle closed-loop plant data. The proposed identification method and estimator design are evaluated in industrial-scale, real-world case study of a process at Eastman Chemical’s Kingsport plant. Using this identified model, we reduced the mean stage cost by 38% compared to the performance of the existing, hand-tuned MPC model.
•Maximum likelihood identification of disturbance models for offset-free linear MPC.•Method used to identify model from real-world, closed-loop chemical plant data.•Identified model used to design a replacement MPC for the chemical plant.•Tracking performance is improved by 38% over the old, hand-tuned MPC design.
This paper proposes and formalizes a comprehensive experimental approach for the identification of the magnetic model of synchronous electrical machines of all kinds. The identification procedure is ...based on controlling the current of the machine under test while this is driven at constant speed by another regenerative electric drive. Compensation of stator resistance and inverter voltage drops, iron loss, and operating temperature issues are all taken into account. A road map for implementation is given, on different types of hardware setups. Experimental results are presented, referring to two test motors of small size, and references of larger motors identified with the same technique are given from the literature.
Nowadays, long-term monitoring systems rely on the efficient implementation of automated methodologies to extract the modal parameters of buildings and bridges to assess their structural integrity. ...However, modal parameter estimation, usually, requires a certain level of user interaction, mainly when parametric system identification methods are used. Such procedures generally depend on the selection of a set of parameters, defined according to heuristic criteria, and kept constant during long monitoring campaigns. The main objective of this paper is to prove the necessity of abandoning identification approaches based on a single set of parameters for long-term monitoring campaigns and to propose a semi-automated modal identification tool, where the user-defined parameters vary within an established range of values, that can be set independently of the user’s expertise. The proposed method is validated with an application in the operational modal analysis of a historic civic tower, and its excellent results demonstrate the importance of considering multiple sets of parameters, mainly when dealing with complex structures and challenging monitoring conditions.
Woody plants and cacti are vital staple foods for cattle, deer, and other wildlife in drought-prone South Texas. Ranchers, hunters, and land managers who need to identify these plants relied on A ...Field Guide to Common South Texas Shrubs (published by Texas Parks & Wildlife Press and distributed by UT Press), which is no longer in print. Responding to ongoing demand for the book, Richard B. Taylor has completely updated and expanded it with seven new species, new photographs, and a quick plant identification key. Common Woody Plants and Cacti of South Texas is an easy-to-use plant identification field guide to fifty species that comprise an estimated 90 percent of the region’s woody canopy cover north of the Rio Grande Valley. The species accounts include photographs, descriptions, values to livestock and wildlife, and nutritional information. The book also provides historical perspectives and information on brush management techniques and strategies, as well as habitat appraisal. All of these resources will enable readers to analyze stocking rates for deer and cattle, evaluate a prospective hunting lease, or buy property.
Fans’ psychological connection to teams has long been of interest to sport management scholars. The connection has been explored using the team identification construct, which is derived from ...theories of group identity conceived well before sport-specific management inquiry emerged. In this study a multidimensional team identification scale is developed and tested. The three dimensions include two which reflect the personal aspect of group identification (cognition, affect) and one that reflects the social aspect (evaluation). The results of confirmatory factor analysis provide support for cognitive, affective and evaluative dimensions which is consistent with previous literature. Structural modeling results provide evidence supporting the relationships between team identification and behavioral intention variables. The scale is more parsimonious than its predecessors and therefore represents a step forward for measuring the construct. Significant relationships between the construct and several outcomes should generate interest from industry partners.
Traditional anti-collision protocols for RFID tags identification assume that the tags and reader are stationary, i.e., no tag is coming in or leaving during tags identification. If not, the reader ...cannot ensure that the tags are all identified. However, in the mobile RFID system, the reader or tags or all of them are moving continuously, and the tags dynamically enter and leave the reading area. Therefore, traditional protocols are not suitable for the mobile RFID system. This letter presents a dynamic anti-collision protocol, called dynamic collision tree protocol, to be used in the mobile RFID identification system to identify RFID tags that dynamically move into and leave the reading area.