A note on fuzzy PI-type controllers with resetting action

被引:16
作者
Mudi, RK
Pal, NR
机构
[1] Univ Jadavpur, Dept Instrumentat Engn, Kolkata 700091, W Bengal, India
[2] Indian Stat Inst, E&CSU, Kolkata 700035, W Bengal, India
关键词
fuzzy controller; self-tuning; resetting action; error analysis;
D O I
10.1016/S0165-0114(99)00143-8
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this note we analyze the effect of the resetting operation in the fuzzy PI controller proposed by Lee (IEEE Trans. Fuzzy Systems 1(4) (1993) 298-301). We justify that the resetting operation can result in a steady-state error for different systems thereby destroying one of the important characteristics of PI-type controllers. We also exhibited through simulations with several second-order linear as well as non-linear systems with and without integration that the resetting operation makes the fuzzy PI controller behave more like a fuzzy PD controller, although for some systems the resetting operation can improve the transient response significantly. (C) 2001 Elsevier Science B.V. All rights reserved.
引用
收藏
页码:149 / 159
页数:11
相关论文
共 23 条
[1]  
[Anonymous], P IEEE INT C FUZZ SY
[2]   FUZZY CONTROLLER-DESIGN BY USING NEURAL-NETWORK TECHNIQUES [J].
CHEN, CL ;
CHEN, WC .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 1994, 2 (03) :235-244
[3]  
DIRANKOV D, 1993, INTRO FUZZY CONTROL
[4]  
Harris C.J., 1993, INTELLIGENT CONTROL
[5]  
HAYASHI S, 1991, P INT FUZZ SYST ASS, P41
[6]   FUZZY SELF-TUNING OF PID CONTROLLERS [J].
HE, SZ ;
TAN, SH ;
XU, FL ;
WANG, PZ .
FUZZY SETS AND SYSTEMS, 1993, 56 (01) :37-46
[7]   SIMULTANEOUS DESIGN OF MEMBERSHIP FUNCTIONS AND RULE SETS FOR FUZZY CONTROLLERS USING GENETIC ALGORITHMS [J].
HOMAIFAR, A ;
MCCORMICK, E .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 1995, 3 (02) :129-139
[8]  
JUNG C, 1996, P 4 INT C SOFT IIZUK, V1, P363
[9]  
Karr C. L., 1993, IEEE Transactions on Fuzzy Systems, V1, P46, DOI 10.1109/TFUZZ.1993.390283
[10]   FUZZY-LOGIC IN CONTROL-SYSTEMS - FUZZY-LOGIC CONTROLLER .1. [J].
LEE, CC .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1990, 20 (02) :404-418