design of pid controller using genetic multiple attributed decision making for automatic voltage regulator system

Authors

meissam khatibi nia

ali akbar gharaveisi

abstract

controller design and optimization problems, with more than one objective, are referred as multiple objectives or multiple attributed problems. in this paper, a novel method is proposed for designing optimum pid controller that is called genetic multiple attributed decision making method (gmadm). this method is newer than the previous methods and in this paper some options are considered that have not been considered in previous paper for simplicity. the proposed pid controller is applied on the automatic voltage regulator (avr).an automatic voltage regulator system is the main part of a generator because this system keeps the output voltage in constant level. the simulation results of automatic voltage regulator system are compared with conventional multiobjective algorithm, known as multiobjective genetic algorithm (moga).the simulation results of automatic voltage regulator system show that gmadm method is better than moga and number of optimum solutions of the proposed method is greater than the other one.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Design of PID Controller for Teleopration System with Genetic Algorithm

This paper presents a novel teleoperation controller for a nonlinear master–slave robotic system with constant time delay in communication channel. The proposed controller enables the teleoperation system to compensate human and environmental disturbances, while achieving master and slave position coordination in both free motion and contact situation. The current work basically extends the pas...

full text

Design Of PID Controller In Automatic Voltage Regulator (AVR) System Using PSO Technique

In this paper, an evolutionary computing approach for determining the optimal values of the proportional-integral-derivative (PID) controller has been proposed. Proper tuning of such controllers is obviously a prime priority as any other alternative situation will require a high degree of industrial expertise. This paper demonstrated in detail how to employ the PSO method to search efficiently ...

full text

Tuning of PID controller for an automatic regulator voltage system using chaotic optimization approach

Despite the popularity, the tuning aspect of proportional–integral-derivative (PID) controllers is a challenge for researchers and plant operators. Various controllers tuning methodologies have been proposed in the literature such as auto-tuning, self-tuning, pattern recognition, artificial intelligence, and optimization methods. Chaotic optimization algorithms as an emergent method of global o...

full text

Optimum Design of PIλDμ Controller for an Automatic Voltage Regulator System Using Combinatorial Test Design

Combinatorial test design is a plan of test that aims to reduce the amount of test cases systematically by choosing a subset of the test cases based on the combination of input variables. The subset covers all possible combinations of a given strength and hence tries to match the effectiveness of the exhaustive set. This mechanism of reduction has been used successfully in software testing rese...

full text

PID controller for automatic voltage regulator using teaching–learning based optimization technique

The present work presents teaching–learning based optimization (TLBO) algorithm as an optimization technique in the area of tuning of the classical controller installed in automatic voltage regulator (AVR). The proposed TLBO algorithm is applied with an aim to find out the optimum value of proportional integral derivative (PID) controller gains with first order low pass filter installed in the ...

full text

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

My Resources

Save resource for easier access later


Journal title:
journal of advances in computer research

Publisher: sari branch, islamic azad university

ISSN 2345-606X

volume 4

issue 4 2013

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023