نتایج جستجو برای: A new robust control method Output feedback

تعداد نتایج: 14246411  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تحصیلات تکمیلی صنعتی کرمان - پژوهشکده برق و کامپیوتر 1390

a phase-locked loop (pll) based frequency synthesizer is an important circuit that is used in many applications, especially in communication systems such as ethernet receivers, disk drive read/write channels, digital mobile receivers, high-speed memory interfaces, system clock recovery and wireless communication system. other than requiring good signal purity such as low phase noise and low spu...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده مهندسی 1389

abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...

Journal: :journal of electrical and computer engineering innovations 0
hamed chenarani department of electrical and electronic engineering, shiraz university of technology, shiraz, iran. tahereh binazadeh department of electrical and electronic engineering, shiraz university of technology, shiraz, iran.

this paper presents some analyses about the robust practical stability of a class of nonlinear affine systems in the presence of non-vanishing perturbations based on the passivity concept. the given analyses confirm the robust passivity property of the perturbed nonlinear systems in a certain region. moreover, robust control laws are designed to guarantee the practical stability of the perturbe...

A new approach for pole placement of nonlinear systems using state feedback and fuzzy system is proposed. We use a new online fuzzy training method to identify and to obtain a fuzzy model for the unknown nonlinear system using only the system input and output. Then, we linearized this identified model at each sampling time to have an approximate linear time varying system. In order to stabilize...

Journal: :journal of ai and data mining 2016
a. karami-mollaee

a new approach for pole placement of nonlinear systems using state feedback and fuzzy system is proposed. we use a new online fuzzy training method to identify and to obtain a fuzzy model for the unknown nonlinear system using only the system input and output. then, we linearized this identified model at each sampling time to have an approximate linear time varying system. in order to stabilize...

ژورنال: کنترل 2019

This paper studies the design of a robust output feedback controller subject to actuator saturation. For this purpose, a robust high-gain sliding mode observer is used to estimate the state variables. Moreover, the combination of Composite Nonlinear Feedback (CNF) and Integral Sliding Mode (ISM) controllers are used for robust output tracking. This controller consists of two parts, the CNF part...

M. Dehghani, M. Karrari, S.K.Y. Nikravesh,

This paper suggests a method for designing PSS to damp multi-machine power system oscillations.  The method is based on robust control theory. First, the conventional method for designing robust controller in LMI framework is illustrated. Then, the suggested method is given, in which, a PID output feedback controller is tuned using the LMI approach. Mostly, the classical methods are used t...

پایان نامه :0 1374

the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اصفهان 1389

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه بیرجند 1388

a significant problem in multicarrier communication systems is the necessity to reduce the value of papr (peak-to-average power ratio) of transmitting signal. in this thesis we study the effect of the system parameters such as coding and modulation types on papr and ultimate ber in a mc-cdma system. in this study we consider fading channel as well as the nonlinearity of transmitter’s amplifier ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید