Performance Comparison Between Various Tuning Strategies: Ciancone, Cohen Coon & Ziegler- Nicholas Tuning Methods
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 1
Abstract
This paper, explains about the background study of the coupled tank and to model such tanks using Simulink blocks. It must explains, the coupled tanks are used to select the best tuning strategy for PID controller based on its performance and stability, and then the best tuning controller is obtained after comparing various tuning strategies like Ciancone, Cohen Coon & Ziegler- Nicholas tuning methods based on their performance in controlling the couple tanks. The couple tank is then designed on Simulink as well and three different tuning methods for PI & PID controller calculations are implemented. The controller which gives best performance corresponding their tuning parameters which is obtained from various tuning method, and then selected.
Authors and Affiliations
Ashok Kumar, Rajbir Morya, Dr. Munish Vashishath
POWER EFFICIENT TASK SCHEDULING MECHANISM IN CLOUD ENVIRONMENT: A REVIEW
Cloud Computing is being used widely all over the world by many IT companies as it provides various benefits to the users like cost saving and ease of use. However, with the growing demands of users for computing service...
Reducing the Impurity of Object-Oriented DatabaseThrough Gini Index
In the current scenario, the size of database is increasing due to audio and video files. In the database, irregularities occur due to duplication of data at many places, therefore, it needs reconstruction of database si...
IMPLEMENTATION OF MOBILE VIRTUAL LABORATORY: CONTRIBUTORY FACTORS IN A DEVELOPING COUNTRY
The growing availability of mobile devices across developing countries and coupled with increase awareness of mobile learning as well as the use of mobile devices for laboratory practical warrant the exploration of its w...
Detecting the Sybil Attack in Wireless Sensor Network :Survey
Mobility is frequently a problem for providing security services in ad hoc networks. In this paper, we render that mobility can alsobe used to enhance security. Specifically, we render that nodes which are in  passive...
A Survey on Cloud Computing and Its Benefits
Cloud computing is Internet based development and use of computer technology. It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet. Users ne...