29,095 research outputs found
Indirect approach to continuous time system identification of food extruder
A three-stage approach to system identification in the
continuous time is presented which is appropriate for
day-to-day application by plant engineers in the process
industry. The three stages are: data acquisition using
relay feedback; non-parametric identification of the
system step response; and parametric model fitting of
the identified step response. The method is evaluated on
a pilot-scale food-cooking extruder
Identification of Frequency Ranges for Subharmonic Oscillations in a Relay Feedback System
This paper examines the behaviour of a single loop relay feedback system (RFS) which is driven by an external signal. It is well known that such a RFS exhibits a variety of oscillation patterns including forced and subharmonic oscillations (SO). This paper focuses on the conditions for SO. It will be shown that for an external signal with a fixed amplitude, it is possible for SO with different orders to occur simply by changing the frequency of the external signal. Similarly, for an external signal with a fixed frequency, it is possible for SO with different orders to occur when the amplitude of the external signal is varied. The conditions under which these different scenarios will occur are explored. An analysis of these conditions identifies the frequency ranges where certain orders of SO are possible for a given amplitude of the external signal. The effects of the initial conditions on the SO are illustrated and discussed. Simulation studies are presented to illustrate the result
First order plus frequency dependent delay modeling : new perspective or mathematical curiosity?
The first-order-plus-dead-time model (FOPDT) is a popular simplified representation of higher order dynamics. However, a well known drawback is the rapid decrease of the frequency response accuracy with increasing process order. This especially applies to the higher frequency range. Literature offers solutions by extending this three parameter model with more parameters. Here, a fractional dead time is proposed. As such, a Frequency-Dependent Delay (FDD) is introduced, which offers a better approximation. As the fractional-order term introduces nonlinear coupling between the phase and the magnitude of the process, the fitting of the function becomes an iterative process, so a constrained multi-objective optimization is needed. This novel model, first-order-plus-frequency-dependent-delay or FOPFDD is fitted on a real electrical ladder network of resistors and capacitors of four and eight parts. The classic model, which is clearly a special case of the new model, is outperformed in the entire bandwidth
Adaptive tracking notch filter system Patent
Adaptive notch filter, using modulation techniques for reversed phase noise signa
Analysis of an On-Line Stability Monitoring Approach for DC Microgrid Power Converters
An online approach to evaluate and monitor the stability margins of dc microgrid power converters is presented in this paper. The discussed online stability monitoring technique is based on the Middlebrook's loop-gain measurement technique, adapted to the digitally controlled power converters. In this approach, a perturbation is injected into a specific digital control loop of the converter and after measuring the loop gain, its crossover frequency and phase margin are continuously evaluated and monitored. The complete analytical derivation of the model, as well as detailed design aspects, are reported. In addition, the presence of multiple power converters connected to the same dc bus, all having the stability monitoring unit, is also investigated. An experimental microgrid prototype is implemented and considered to validate the theoretical analysis and simulation results, and to evaluate the effectiveness of the digital implementation of the technique for different control loops. The obtained results confirm the expected performance of the stability monitoring tool in steady-state and transient operating conditions. The proposed method can be extended to generic control loops in power converters operating in dc microgrids
PID control system analysis, design, and technology
Designing and tuning a proportional-integral-derivative
(PID) controller appears to be conceptually intuitive, but can
be hard in practice, if multiple (and often conflicting) objectives
such as short transient and high stability are to be achieved.
Usually, initial designs obtained by all means need to be adjusted
repeatedly through computer simulations until the closed-loop
system performs or compromises as desired. This stimulates
the development of "intelligent" tools that can assist engineers
to achieve the best overall PID control for the entire operating
envelope. This development has further led to the incorporation
of some advanced tuning algorithms into PID hardware modules.
Corresponding to these developments, this paper presents a
modern overview of functionalities and tuning methods in patents,
software packages and commercial hardware modules. It is seen
that many PID variants have been developed in order to improve
transient performance, but standardising and modularising PID
control are desired, although challenging. The inclusion of system
identification and "intelligent" techniques in software based PID
systems helps automate the entire design and tuning process to
a useful degree. This should also assist future development of
"plug-and-play" PID controllers that are widely applicable and
can be set up easily and operate optimally for enhanced productivity,
improved quality and reduced maintenance requirements
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
- âŠ