StudentShare solutions
Triangle menu

Computer Control Systems - Assignment Example

Not dowloaded yet

Extract of sample
Computer Control Systems

The number of right-half plane roots of the characteristic equation (closed-loop poles) is given by the number of sign changes in the first column of the array. By inspection, there are no sign changes. There are no roots with positive real parts. Since the array was constructed without a 0 appearing anywhere in the first column, there are no roots on the jw axis.

The second system is slightly more complex, but the Routh array is formed in the same manner.

Note that the number of terms in each row decreases by 1 at each odd-powered row, and that the last element in each even-powered row is the constant coefficient from the characteristic equation. Since there are no sign changes, there are no roots in the right-half plane. There are no roots on the jw axis since there were no 0s in the first column.

The third system is the same as the second system except that the gain has been increased by a factor of 10. Note that several of the coefficients in the characteristic equation have changed. Also note that there is a negative coefficient in the polynomial. That guarantees that there is at least one unstable root. Since the constant coefficient is positive, there is an even number of unstable roots.

Examination of the first column of the array shows that there are 2 sign changes, from +761.7 to -355.5 and from -355.5 to +120. Therefore, there are 2 roots of the characteristic equation with positive real parts and 2 closed-loop poles in the right-half plane. The location of those roots is not available. ...
The number of right-half plane roots of the characteristic equation (closed-loop poles) is given by the number of sign changes in the first column of the array. By inspection, there are no sign changes. Therefore, there are no roots with positive real parts. Since the array was constructed without a 0 appearing anywhere in the first column, there are no roots on the jw axis.
The second system is slightly more complex, but the Routh array is formed in the same manner.
Note that the number of terms in each row decreases by 1 at each odd-powered row, and that the last element in each even-powered row is the constant coefficient from the characteristic equation. Since there are no sign changes, there are no roots in the right-half plane. There are no roots on the jw axis since there were no 0s in the first column.
The third system is the same as the second system except that the gain has been increased by a factor of 10. Note that several of the coefficients in the characteristic equation have changed. Also note that there is a negative coefficient in the polynomial. That guarantees that there is at least one unstable root. Since the constant coefficient is positive, there is an even number of unstable roots.

Examination of the first column of the array shows that there are 2 sign changes, from +761.7 to -355.5 and from -355.5 to +120. Therefore, there are 2 roots of the characteristic equation with positive real parts and 2 closed-loop poles in the right-half plane. The location of those roots is not available from the Routh array. Since there were no 0s in the first column, there are no poles on the jw axis.
The last system has its gain K left as a variable. We want to determine the upper and lower bounds on K ...Show more

Summary

The study "Computer Control Systems" is purposed to give answers on assignment for a module in control using Matlab and Simulink. It is stated that an important use of the Routh array is to determine upper and lower limits on the value of some parameter…
Author : fkassulke
Computer Control Systems essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the assignment on your topic
"Computer Control Systems"
with a personal 20% discount.
Grab the best paper

Related Essays

Managerial Control Systems
It is common for traditional accounting systems to group operating costs indiscriminately together as overhead, without classifying the cost according to its nature or purpose, e.g. so as to determine environmental impact or organizational unit accountability in the case of EMA.
8 pages (2000 words) Assignment
Computer Architecture
The reason for this is that almost every electronic computer that has ever been developed has been based on this architecture (Aspray, 1990). The von Neumann architecture is named after John von Neumann, a pioneering mathematician and scholar who first published a paper putting forth what was required from any electronic computer meant for general use.
4 pages (1000 words) Assignment
Wireless Computer Networking
The communication language used by computers when it is networked is called protocol. Networks often use multiple protocols based on the usage or purpose of networking is being used. Popular protocols include TCP/IP, the most common protocol found on the Internet and in home networks
5 pages (1250 words) Assignment
MANAGERIAL CONTROL SYSTEMS TAKE HOME EXAM
so as to determine environmental impact or organizational unit accountability in the case of EMA. The second phase is the identification of opportunities for revenues and costs that the
8 pages (2000 words) Assignment
Standard Operating Preocedure For Sales/Customer Services, Manufacturing And Quality Control Of Desktop Computer Systems
Geekco is a small manufacturer (30 employees) of desktop computer systems, specializing in building customer-configured systems to meet its budgets and needs. Geekco is striving to provide consistent quality control at hard-to-beat prices.
3 pages (750 words) Assignment
History of Crime and Computer Crime. Traditional Problems. Recognizing and Defining Computer Crimes/ Contemporary Crimes/ Categorizing Computer Crime
Primarily, cybercrime does utilize the computer as to commit various crimes not morally acceptable, such as child pornography, software piracy, fraud or copyright theft. Another type of
6 pages (1500 words) Assignment
Cracker Control
Wireless hotspots have two encryptions that include WEP and WPA. Crackers can use aircrack-ng or coWPAtty to crack WPA2-PSK passwords that recover wireless
1 pages (250 words) Assignment
Electro-Mechanical Control Systems Assignment
The problems associated with one engineer working in a bounded environment are like to be faced by other engineers working in another bounded environment. Thus, it is important to follow an
5 pages (1250 words) Assignment
Forum 6 - Chapters 11, 12
To effectively manage these roles, they have to use sophisticated technology to trace and track ships, as well as, the cargo. The technology systems improve the ports ability to monitor what leaves and enters the country. The effective use of
1 pages (250 words) Assignment
Computer Systems Architecture and Administration
In the paper the writer focuses upon the implementation of integrated time-driven scheduler. The lead requirement is that this scheduler must be supportive of numerous scheduling policies because there are no universal scheduling policies that fit all applications. As such, the scheduler crossing point should support the scheduling policies changing interface.
8 pages (2000 words) Assignment
Get a custom paper written
by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Rate this paper:
Thank you! Your comment has been sent and will be posted after moderation