Explore chapters and articles related to this topic
Implementation and Deployment of 5G-Drone Setups
Published in Arun Solanki, Sandhya Tarar, Simar Preet Singh, Akash Tayal, The Internet Of Drones, 2023
Jagjit Singh Dhatterwal, Kuldeep Singh Kaswan, Amit Pandey
MEDs create two forms of connections to GCS: firstly, the remote piloting and telemetry, identification, and navigation command structure links (TR 36.777). Although remote piloting can involve a video transmission to provide the pilot with almost a sensation, tele command and telemetry links fall under one single non-payload contact umbrella. As many regulators do not allow fully self-contained Drones and robotics may operate only semi automatically underneath the control of drone operators (due to operational consequences), there are vital ties to command and control [10]. An application connection providing information, for example, sensor data, video, audio, and images is the second type of link formed with a GCS. Notice that mainly payload communication capabilities are required for the application. Application info, on the other hand, is less important in certain situations than command and control [13].
Other system design tools
Published in William L. Chapman, A. Terry Bahill, A. Wayne Wymore, Engineering Modeling and Design, 2018
William L. Chapman, A. Terry Bahill, A. Wayne Wymore
Reusability is a subset of flexibility. The best examples come from computer software. In the early 1970s, various computer users running the Unix operating system wrote hundreds of small stand-alone programs like the following: tr transliterates a file, sort merges input files together, uniq compares adjacent lines in a file, comm reads two input files and marks lines that are common to both, and deroff removes all formatting commands from a text file. Each of these programs was written for a specific purpose, but they can be reused for something different. The following line produces an index for a book:
Special Features of SimPowerSystems Models
Published in Viktor M. Perelmuter, Electrotechnical Systems, 2020
If to select the option of Powergui FFT Analysis, and in the right fields of the opening window to choose Structure: ScopeData2, input 2, Start time 0.1, Number of Cycles 4, Max Frequency 1000Hz, the curve of the current Itr appears in the left area on top of the window; on execution of the command Display, the Fourier plot appears in the left below. THD =17.09% for the first and for the third transformers and THD =16.1% for the second and for the fourth ones. If to select the input 1 instead of the input 2, after command Display THD=0.83% is found. The 11 th and the 13th harmonics of the small amplitudes are seen on the Fourier plot, which must be absent theoretically. It happens because the currents in the primary transformer windings have some different shapes. Nevertheless, employment of the transformers in zigzag configuration give an opportunity to receive nearly perfect currents in the common load and in the supply without using of the filters and smoothing reactors.
An improved NSGA-II based control allocation optimisation for aircraft longitudinal automatic landing system
Published in International Journal of Control, 2019
Qi Bian, Brett Nener, Xinmin Wang
During the landing process, not only J1 and J2 should be optimised, but also the state variables of the aircraft must be confined within their reasonable limits and the dynamic performance of the ALS should be guaranteed. Thus, the multi-objective control allocation optimisation problem with constraints is formulated as follows: where S is the non-dominated solution set consisting of a group of optimal control gains K. xi and Xi represent the deviation of ith state variable around the equilibrium point and its maximum limit, respectively. δELE and δENG represent maximum control authority of δele and δeng, respectively. tri and TRi represent the rise time of ith command channel and its upper limit, respectively. poi and POi represent the percentage overshoot of ith command channel and its upper limit, respectively. ssei and SSEi represent the steady state error of ith command channel and its tolerance, respectively. The cost function J3 of constraints is used to scale the system beyond the constraints. where J3i (i = 1, 2..., 5) represent the cost functions of errors beyond the five constrains defined in Equation (10) and ωi (i = 1, 2..., 5) represent their corresponding weighting factors. xerr(i) (i = 1, 2..., 7) represent the ith state variable error beyond Xi. δerr(ele) and δerr(eng) represent the control input error beyond δELE and δENG, respectively. J33, J34 and J35 represent the cost functions of steady state error, percentage overshoot and rise time of the four command signals αc, , γc and qc beyond their limits TR, PO and SSE, respectively.