design of pid controller using genetic multiple attributed decision making for automatic voltage regulator system

نویسندگان

meissam khatibi nia

ali akbar gharaveisi

چکیده

controller design and optimization problems, with more than one objective, are referred as multiple objectives or multiple attributed problems. in this paper, a novel method is proposed for designing optimum pid controller that is called genetic multiple attributed decision making method (gmadm). this method is newer than the previous methods and in this paper some options are considered that have not been considered in previous paper for simplicity. the proposed pid controller is applied on the automatic voltage regulator (avr).an automatic voltage regulator system is the main part of a generator because this system keeps the output voltage in constant level. the simulation results of automatic voltage regulator system are compared with conventional multiobjective algorithm, known as multiobjective genetic algorithm (moga).the simulation results of automatic voltage regulator system show that gmadm method is better than moga and number of optimum solutions of the proposed method is greater than the other one.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Design of PID Controller for Teleopration System with Genetic Algorithm

This paper presents a novel teleoperation controller for a nonlinear master–slave robotic system with constant time delay in communication channel. The proposed controller enables the teleoperation system to compensate human and environmental disturbances, while achieving master and slave position coordination in both free motion and contact situation. The current work basically extends the pas...

متن کامل

Design Of PID Controller In Automatic Voltage Regulator (AVR) System Using PSO Technique

In this paper, an evolutionary computing approach for determining the optimal values of the proportional-integral-derivative (PID) controller has been proposed. Proper tuning of such controllers is obviously a prime priority as any other alternative situation will require a high degree of industrial expertise. This paper demonstrated in detail how to employ the PSO method to search efficiently ...

متن کامل

Tuning of PID controller for an automatic regulator voltage system using chaotic optimization approach

Despite the popularity, the tuning aspect of proportional–integral-derivative (PID) controllers is a challenge for researchers and plant operators. Various controllers tuning methodologies have been proposed in the literature such as auto-tuning, self-tuning, pattern recognition, artificial intelligence, and optimization methods. Chaotic optimization algorithms as an emergent method of global o...

متن کامل

Optimum Design of PIλDμ Controller for an Automatic Voltage Regulator System Using Combinatorial Test Design

Combinatorial test design is a plan of test that aims to reduce the amount of test cases systematically by choosing a subset of the test cases based on the combination of input variables. The subset covers all possible combinations of a given strength and hence tries to match the effectiveness of the exhaustive set. This mechanism of reduction has been used successfully in software testing rese...

متن کامل

PID controller for automatic voltage regulator using teaching–learning based optimization technique

The present work presents teaching–learning based optimization (TLBO) algorithm as an optimization technique in the area of tuning of the classical controller installed in automatic voltage regulator (AVR). The proposed TLBO algorithm is applied with an aim to find out the optimum value of proportional integral derivative (PID) controller gains with first order low pass filter installed in the ...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
journal of advances in computer research

ناشر: sari branch, islamic azad university

ISSN 2345-606X

دوره 4

شماره 4 2013

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023