Performance Comparison Between Various Tuning Strategies: Ciancone, Cohen Coon & Ziegler- Nicholas Tuning Methods
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 5, Issue 1
Abstract
This paper, explains about the background study of the coupled tank and to model such tanks using Simulink blocks. It must explains, the coupled tanks are used to select the best tuning strategy for PID controller based on its performance and stability, and then the best tuning controller is obtained after comparing various tuning strategies like Ciancone, Cohen Coon & Ziegler- Nicholas tuning methods based on their performance in controlling the couple tanks. The couple tank is then designed on Simulink as well and three different tuning methods for PI & PID controller calculations are implemented. The controller which gives best performance corresponding their tuning parameters which is obtained from various tuning method, and then selected.
Authors and Affiliations
Ashok Kumar, Rajbir Morya, Dr. Munish Vashishath
Enhanced Tiny Encryption Algorithm with Embedding (ETEA)
As computer systems become more pervasive and complex, security is increasingly important. Secure Transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. Many se...
EFFICIENT TECHNIQUE FOR AUTOMATIC EXTRACTION AND IDENTIFICATION OF ELEVATION FROM A REFERENCE IMAGE
In Geographic information system (GIS) identification of elevation detail pertaining to a contour in a reference map or topological map plays an important role while creating digital elevation model or digital surface mo...
NETWORK INTRUSION DETECTION AND PREVENTION ATTACKS
Intrusion detection is an important technology in business sector as well as an active area of research. It is an important tool for information security. A Network Intrusion Detection System is used to monitor networks...
Trusted Cloud Platform for Cloud Infrastructure
Reliability and trust Models are used to enhance secure , reliable scheduling , load balancing and QoS in cloud and Distributed environment. Trust models that are being used in Distributed and Grid environment, does not...
CRYPTOGRAPHY
To prevent the dissemination of sensitive information from the database to unauthorized users or outside competitive or hostile agents, an organization must establish effective security policies. The art of protecting in...