This paper presents a modeling and a controller design for a hybrid wind turbine generator with a battery storage system and a dumpload. The proposed control scheme is based on the robust tracking controller. In the s...
详细信息
ISBN:
(纸本)9783902823243
This paper presents a modeling and a controller design for a hybrid wind turbine generator with a battery storage system and a dumpload. The proposed control scheme is based on the robust tracking controller. In the simulation study, the proposed robust tracking controller (RTC) is compared with the conventional proportional-integral (PI) controller. Simulation results show that the RTC is more effective than the PI controller against disturbances caused by wind speed and load variation. Thus, better quality of the hybrid wind power system is achieved.
In this paper two methods for the reconfiguration of multivariable decentralized controllers are evaluated for their feasibility in real life applications. As real-life case the air control system of a waste-to-energy...
详细信息
In this paper two methods for the reconfiguration of multivariable decentralized controllers are evaluated for their feasibility in real life applications. As real-life case the air control system of a waste-to-energy plant in the pulp and paper industry is used. The first method is based on the factorization of the closed loop sensitivity transfer matrix and the second on degeneration factors of the closed loop system. The two candidate methods are evaluated by comparing their results with the results obtained from established interaction measures. Thereafter the reconfiguration of the control system is performed and subsequently re-assessed. The results show that both methods can be used to derive reasonable indications on how controllers can be reconfigured to achieve better performance of the closed loop system. It is also estimated that the performance of the air control system can be improved by 3% when a feed forward link is introduced in the current control structure.
This paper studies the aging amount of damnification and the cost of rejuvenation, in order to effectively reduce the average downtime costs of systems at the time of software aging existence, to increase the availabi...
详细信息
Artificial bee colony (ABC) is an optimization algorithm inspired on the intelligent behavior of honey bee swarms. It is suitable to be applied when mathematical techniques are impractical or provide suboptimal soluti...
详细信息
Cloud Computing is not a revolution;it's an evolution of computerscience and technology emerging by leaps and bounds, in order to merge all computerscience tools and technologies. Cloud Computing technology is h...
详细信息
Cloud Computing is not a revolution;it's an evolution of computerscience and technology emerging by leaps and bounds, in order to merge all computerscience tools and technologies. Cloud Computing technology is hottest to do research and explore new horizons of next generations of computerscience. There are number of cloud services providers(Amazon EC2), Rackspace Cloud, Terremark and Google Compute Engine) but still enterprises and common users have a number of concerns over cloud service providers. Still there is lot of weakness, challenges and issues are barrier for cloud service providers in order to provide cloud services according to SLA(Service Level agreement). Especially, service provisioning according to SLAs is core objective of each cloud service provider with maximum performance as per SLA. We have identified those challenges issues, as well as proposed new methodology as "SLA(Service Level Agreement) Driven Orchestration Based New Methodology for Cloud Computing Services". Currently, cloud service providers are using "orchestrations" fully or partially to automate service provisioning but we are trying to integrate and drive orchestration flows from SLAs. It would be new approach to provision cloud service and deliver cloud service as per SLA, satisfying Qo S standards.
One of the main concerns in underground working tunnels is ensuring the safety of the workers and their equipment. Being aware of the real-time position of personnel in such harsh environment is challenging and requir...
详细信息
One of the main concerns in underground working tunnels is ensuring the safety of the workers and their equipment. Being aware of the real-time position of personnel in such harsh environment is challenging and requires a sophisticated localization system. With traditional Received Signal Strength (RSS) failing to accurately estimate the distance between nodes due to multipath effect in such long and narrow space, Radio Frequency Time-of-Flight (RF-TOF) is proved to be an alternative method for more accurate distance estimation. To reduce the communication cost, a distributed localization scheme is proposed, where a simple Newton Iteration location estimation algorithm is embedded in the blind node. Linear least square estimation is used as the initial value to accelerate the convergence of the iteration. Experimental results show the effectiveness of the proposed scheme.
Usually when modeling a real process the effects of nonlinearities must be taken into account. A road traffic sector is one such process. Considering it from a macroscopic point of view, the sector is modeled both as ...
详细信息
Usually when modeling a real process the effects of nonlinearities must be taken into account. A road traffic sector is one such process. Considering it from a macroscopic point of view, the sector is modeled both as a nonlinear and as a linearized process. An 110 model is proposed and a RST control algorithm is used to ensure the imposed performances for the closed loop system. The robustness of the system is obtained by determining the modulus margin and based upon it the admissible nonlinearities are analyzed in order to determine the limits between which the system maintains its stability.
The cable-driven mechanism is usually used in robotic systems for the efficient transmission of forces or torques from actuators to the end-effector. However, the control design is challenging for these systems due to...
详细信息
This paper provides a necessary and sufficient condition for the compositional verification of a continuous system with additively separable barrier functions. The compositional safety verification enables the verific...
详细信息
ISBN:
(纸本)9781467320658
This paper provides a necessary and sufficient condition for the compositional verification of a continuous system with additively separable barrier functions. The compositional safety verification enables the verification of an inter-connection of subsystems. The idea behind the compositional analysis is to allow the verification of systems with a high dimension, by the verification of multiple lower dimensional subproblems. In the compositional safety analysis, a particular structure is imposed on the barrier certificate, restricting the applicability of the method. We show an example of a system that cannot be verified using the compositional method, but can be verified using a centralized method. This example highlights how not to decompose systems, and should be used to guide the decomposition of a system into appropriate subsystems. Finally, we provide a second condition for the compositional safety analysis that enables the verification of the counterexample, by imposing a less restrictive structure of the barrier function. This shows that the counterexample can be solved with a compositional method, but at an increased computational complexity.
暂无评论