Design of Fuzzy Controller For Bilateral Telemanipulator
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
The objective of a telerobotic system is to connect humans and robots in order to reproduce operator action at a distance. The telerobotic system consists of a ‘master’ robot, operated by a human arm, and a kinematically identical ‘slave’ robot, located at a remote site. When the operator moves the handler of the ‘master’ back and forth, the remote ‘slave’ mimics the motion in a constrained or unconstrained environment. When a robot is operated remotely by use of a teleoperator, it is desirable to communicate contact force information from the Slave to the master, in order to kinematically couple the operator to the environment and increase the sense of telepresence. A control scheme is derived for a ‘master-slave’ telerobotic dynamic system with haptic behaviour. The paper discusses about the design of a Position Force Architecture in which the master receives a force command from the slave and the slave receives a position reference from the master. The Position-Force Architecture is designed and implemented using a PID controller. As the dynamics of the human operator and the environment varies, auto tuning of the PID controller has to be performed. In order to overcome the auto tuning problem a FUZZY LOGIC CONTROLLER has been developed and implemented for position control.
Authors and Affiliations
Ch. V. Rajkumar, Srihari dattabhimaraju. P, Naresh. Mallireddy
Privacy Preserving Web Search Techniques : A Survey Study
A large amount of personal information is available on the web about any individual. S uch information could be used to make vital decisions about them. S o it is important to protect the privacy of individuals when...
Content Accumulating and Development beyond Elastic and Inelastic Traffic in Wireless Networks
Caching and multicasting at base stations are two promising ways to deal with bolster monstrous substance conveyance over remote systems. Be that as it may, existing planning outlines don't make full utilization of t...
Security Enhancement in Mobile Ad hoc Networks using Non-zero Non-cooperative Game Theory
Mobile Ad hoc Network (MANET) is a multi hop infrastructure less wireless networks which offers unrestricted mobility. As wireless ad-hoc networks lack a centralized infrastructure, they are exposed to a lot of attac...
High Performance of Fault Detection And Correction Technique Using Difference Set Codes For Memory Applications
The advanced combination technologies made it possible for accessing any device so fast that within a portion of seconds the job can be performed. Now days fast memories exists everywhere during accessing if any erro...
A Glance At Malicious Attacks In Web
Web usage is one of the great important to all users in this era. For each and every need internet or web is made use of. Users make use of the area as a medium for searching information, performing business transacti...