نتایج جستجو برای: Machine-to-loop assignment

تعداد نتایج: 10699794  

Journal: :international journal of modeling, identification, simulation and control 0
sakineh bigom mirassadi department of mathematics of shahrood university of technology hojat ahsani tehrani shahrood university of technology

a method for solving the descriptor discrete-time linear system is focused. for easily, it is converted to a standard discrete-time linear system by the definition of a derivative state feedback. then partial eigenvalue assignment is used for obtaining state feedback and solving the standard system. in partial eigenvalue assignment, just a part of the open loop spectrum of the standard linear s...

A method for solving the descriptor discrete-time linear system is focused. For easily, it is converted to a standard discrete-time linear system by the definition of a derivative state feedback. Then partial eigenvalue assignment is used for obtaining state feedback and solving the standard system. In partial eigenvalue assignment, just a part of the open loop spectrum of the standard linear s...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی خواجه نصیرالدین طوسی - دانشکده برق و کامپیوتر 1391

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

Journal: :amirkabir international journal of modeling, identification, simulation & control 2014
h. a. tehrani

the problem of pole assignment, also known as an eigenvalue assignment, in linear discrete-time periodic systems in discs was solved by a novel method which employs elementary similarity operations. the former methods tried to assign the points inside the unit circle while preserving the stability of the discrete time periodic system. nevertheless, now we can obtain the location of eigenvalues ...

J. Soltani and F. Katiraei,

In this paper, using a personal computer (PC), the practical implementation of scalar and vector control methods on a three–phase rotor surface- type permanent magnet synchronous machine drive is discussed. Based on the machine dynamic equations and the above control strategies, two block diagrams are presented first for closed-loop speed controlling of the machine drive/system. Then, the desig...

J. Soltani and F. Katiraei,

In this paper, using a personal computer (PC), the practical implementation of scalar and vector control methods on a three–phase rotor surface- type permanent magnet synchronous machine drive is discussed. Based on the machine dynamic equations and the above control strategies, two block diagrams are presented first for closed-loop speed controlling of the machine drive/system. Then, the desig...

M. Yarahmadi, S. M. Karbassi,

In this paper, first a new algorithm for pole assignment of closed-loop multi-variable controllable systems in a prescribed region of the z-plane is presented. Then, robust state feedback controllers are designed by implementing a neural fuzzy system for the placement of closed-loop poles of a controllable system in a prescribed region in the left-hand side of z-plane. A new method based on the...

Reducing cost of material handling has been a big challenge for companies. Flexible manufacturing system employed automated guided vehicles (AGV) to maintain efficiency and flexibility. This paper presents a new non-linear mathematical programming model to group n machines into N loops, to make an efficient configuration for AGV system in Tandem layout. The model minimizes bot...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه علامه طباطبایی - دانشکده اقتصاد 1393

due to extraordinary large amount of information and daily sharp increasing claimant for ui benefits and because of serious constraint of financial barriers, the importance of handling fraud detection in order to discover, control and predict fraudulent claims is inevitable. we use the most appropriate data mining methodology, methods, techniques and tools to extract knowledge or insights from ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید