4 resultados para standard vector control scheme

em Digital Commons - Michigan Tech


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Electrical Power Assisted Steering system (EPAS) will likely be used on future automotive power steering systems. The sinusoidal brushless DC (BLDC) motor has been identified as one of the most suitable actuators for the EPAS application. Motor characteristic variations, which can be indicated by variations of the motor parameters such as the coil resistance and the torque constant, directly impart inaccuracies in the control scheme based on the nominal values of parameters and thus the whole system performance suffers. The motor controller must address the time-varying motor characteristics problem and maintain the performance in its long service life. In this dissertation, four adaptive control algorithms for brushless DC (BLDC) motors are explored. The first algorithm engages a simplified inverse dq-coordinate dynamics controller and solves for the parameter errors with the q-axis current (iq) feedback from several past sampling steps. The controller parameter values are updated by slow integration of the parameter errors. Improvement such as dynamic approximation, speed approximation and Gram-Schmidt orthonormalization are discussed for better estimation performance. The second algorithm is proposed to use both the d-axis current (id) and the q-axis current (iq) feedback for parameter estimation since id always accompanies iq. Stochastic conditions for unbiased estimation are shown through Monte Carlo simulations. Study of the first two adaptive algorithms indicates that the parameter estimation performance can be achieved by using more history data. The Extended Kalman Filter (EKF), a representative recursive estimation algorithm, is then investigated for the BLDC motor application. Simulation results validated the superior estimation performance with the EKF. However, the computation complexity and stability may be barriers for practical implementation of the EKF. The fourth algorithm is a model reference adaptive control (MRAC) that utilizes the desired motor characteristics as a reference model. Its stability is guaranteed by Lyapunov’s direct method. Simulation shows superior performance in terms of the convergence speed and current tracking. These algorithms are compared in closed loop simulation with an EPAS model and a motor speed control application. The MRAC is identified as the most promising candidate controller because of its combination of superior performance and low computational complexity. A BLDC motor controller developed with the dq-coordinate model cannot be implemented without several supplemental functions such as the coordinate transformation and a DC-to-AC current encoding scheme. A quasi-physical BLDC motor model is developed to study the practical implementation issues of the dq-coordinate control strategy, such as the initialization and rotor angle transducer resolution. This model can also be beneficial during first stage development in automotive BLDC motor applications.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis presents a load sharing method applied in a distributed micro grid system. The goal of this method is to balance the state-of-charge (SoC) of each parallel connected battery and make it possible to detect the average SoC of the system by measuring bus voltage for all connected modules. In this method the reference voltage for each battery converter is adjusted by adding a proportional SoC factor. Under such setting the battery with a higher SoC will output more power, whereas the one with lower SoC gives out less. Therefore the higher SoC battery will use its energy faster than the lower ones, and eventually the SoC and output power of each battery will converge. And because the reference voltage is related to SoC status, the information of the average SoC in this system could be shared for all modules by measuring bus voltage. The SoC balancing speed is related to the SoC droop factors. This SoC-based load sharing control system is analyzed in feasibility and stability. Simulations in MATLAB/Simulink are presented, which indicate that this control scheme could balance the battery SoCs as predicted. The observation of SoC sharing through bus voltage was validated in both software simulation and hardware experiments. It could be of use to non-communicated distributed power system in load shedding and power planning.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In this study, the use of magnesium as a Hall thruster propellant was evaluated. A xenon Hall thruster was modified such that magnesium propellant could be loaded into the anode and use waste heat from the thruster discharge to drive the propellant vaporization. A control scheme was developed, which allowed for precise control of the mass flow rate while still using plasma heating as the main mechanism for evaporation. The thruster anode, which also served as the propellant reservoir, was designed such that the open area was too low for sufficient vapor flow at normal operating temperatures (i.e. plasma heating alone). The remaining heat needed to achieve enough vapor flow to sustain thruster discharge came from a counter-wound resistive heater located behind the anode. The control system has the ability to arrest thermal runaway in a direct evaporation feed system and stabilize the discharge current during voltage-limited operation. A proportional-integral-derivative control algorithm was implemented to enable automated operation of the mass flow control system using the discharge current as the measured variable and the anode heater current as the controlled parameter. Steady-state operation at constant voltage with discharge current excursions less than 0.35 A was demonstrated for 70 min. Using this long-duration method, stable operation was achieved with heater powers as low as 6% of the total discharge power. Using the thermal mass flow control system the thruster operated stably enough and long enough that performance measurements could be obtained and compared to the performance of the thruster using xenon propellant. It was found that when operated with magnesium, the thruster has thrust ranging from 34 mN at 200 V to 39 mN at 300 V with 1.7 mg/s of propellant. It was found to have 27 mN of thrust at 300 V using 1.0 mg/s of propellant. The thrust-to-power ratio ranged from 24 mN/kW at 200 V to 18 mN/kW at 300 volts. The specific impulse was 2000 s at 200 V and upwards of 2700 s at 300 V. The anode efficiency was found to be ~23% using magnesium, which is substantially lower than the 40% anode efficiency of xenon at approximately equivalent molar flow rates. Measurements in the plasma plume of the thruster—operated using magnesium and xenon propellants—were obtained using a Faraday probe to measure off-axis current distribution, a retarding potential analyzer to measure ion energy, and a double Langmuir probe to measure plasma density, electron temperature, and plasma potential. Additionally, the off axis current distributions and ion energy distributions were compared to measurements made in krypton and bismuth plasmas obtained in previous studies of the same thruster. Comparisons showed that magnesium had the largest beam divergence of the four propellants while the others had similar divergence. The comparisons also showed that magnesium and krypton both had very low voltage utilization compared to xenon and bismuth. It is likely that the differences in plume structure are due to the atomic differences between the propellants; the ionization mean free path goes down with increasing atomic mass. Magnesium and krypton have long ionization mean free paths and therefore require physically larger thruster dimensions for efficient thruster operation and would benefit from magnetic shielding.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

File system security is fundamental to the security of UNIX and Linux systems since in these systems almost everything is in the form of a file. To protect the system files and other sensitive user files from unauthorized accesses, certain security schemes are chosen and used by different organizations in their computer systems. A file system security model provides a formal description of a protection system. Each security model is associated with specified security policies which focus on one or more of the security principles: confidentiality, integrity and availability. The security policy is not only about “who” can access an object, but also about “how” a subject can access an object. To enforce the security policies, each access request is checked against the specified policies to decide whether it is allowed or rejected. The current protection schemes in UNIX/Linux systems focus on the access control. Besides the basic access control scheme of the system itself, which includes permission bits, setuid and seteuid mechanism and the root, there are other protection models, such as Capabilities, Domain Type Enforcement (DTE) and Role-Based Access Control (RBAC), supported and used in certain organizations. These models protect the confidentiality of the data directly. The integrity of the data is protected indirectly by only allowing trusted users to operate on the objects. The access control decisions of these models depend on either the identity of the user or the attributes of the process the user can execute, and the attributes of the objects. Adoption of these sophisticated models has been slow; this is likely due to the enormous complexity of specifying controls over a large file system and the need for system administrators to learn a new paradigm for file protection. We propose a new security model: file system firewall. It is an adoption of the familiar network firewall protection model, used to control the data that flows between networked computers, toward file system protection. This model can support decisions of access control based on any system generated attributes about the access requests, e.g., time of day. The access control decisions are not on one entity, such as the account in traditional discretionary access control or the domain name in DTE. In file system firewall, the access decisions are made upon situations on multiple entities. A situation is programmable with predicates on the attributes of subject, object and the system. File system firewall specifies the appropriate actions on these situations. We implemented the prototype of file system firewall on SUSE Linux. Preliminary results of performance tests on the prototype indicate that the runtime overhead is acceptable. We compared file system firewall with TE in SELinux to show that firewall model can accommodate many other access control models. Finally, we show the ease of use of firewall model. When firewall system is restricted to specified part of the system, all the other resources are not affected. This enables a relatively smooth adoption. This fact and that it is a familiar model to system administrators will facilitate adoption and correct use. The user study we conducted on traditional UNIX access control, SELinux and file system firewall confirmed that. The beginner users found it easier to use and faster to learn then traditional UNIX access control scheme and SELinux.