DYNAMIC MATRIX CONTROL OF 1 DOF ROTOR SYSTEM
Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): JAE-HEON PARK , OH-KYU KWON , YEONG-SANG PARK
Abstract: This paper presents DMC algorithm in order to apply to systems with relatively fast process. Firstly, C MEX Sfunction was used to create the QP solver based on C-code with optimal control algorithm. Secondly, a real-time application is considered using library blocks from Matlab/Simulink. Finally, DMC simulator and PI controller were used for the velocity control of 1 DOF rotor. Through this paper, the implementation of a real-time application was considered for using DMC algorithm by creating C MEX S-function to generate a single DMC block in Matlab/Simulink. Additionally, the proposing theory applied to the SISO system (1 DOF rotor) as a previous experiment for the possibility of controlling the TRMS (Twin Rotor MIMO System).
- Publication Date: 11-Oct-2015
- DOI: 10.15224/978-1-63248-064-4-30
- Views: 0
- Downloads: 0
THE METHODOLOGY FOR IMPLEMENTATION OF CLOUD COMPUTING IN THE ENTERPRISE AND UNIVERSITIES
Published In: 3RD INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, ELECTRONICS AND COMMUNICATION
Author(s): ZUZANA PRISCAKOVA , IVANA RABOVA
Abstract: This article analyzes the process of the implementation of cloud computing in a university environment. The goal of the implementation is to enhance the security of the data, that are handled via cloud. Two different implementation environments to increase the accuracy of the data are used – the enterprise and the university environment. The verification of the formalized methodics contains the architecture proposal, the infrastructure and implementation proposal, and testing of the virtualized technologies. The undertaken research had aim to identify the life cycle of the data, that are stored in the virtualized environment (where the observed constituents are the implementation environment requirements, the origin of the data, the data sensitivity, the integrity preservation and secrecy of the data, and the linking between the virtualized environment and hardware). As generalized methodics, there we can find the available algorithms, standards, and security protocols which are recomm
- Publication Date: 11-Oct-2015
- DOI: 10.15224/978-1-63248-064-4-31
- Views: 0
- Downloads: 0