Pages 10 (2510 words)
Download 0
The Routh array is a tabular procedure for determining how many roots of a polynomial are in the right-half of the s-plane. We can also determine if there are any roots on the jw axis and their locations. An important use of the Routh array is to determine upper and lower limits on the value of some parameter, such as gain, so that all roots of the closed-loop characteristic equation are in the left-half plane.


This is the polynomial that the Routh array uses.
The number of right-half plane roots of the characteristic equation (closed-loop poles) is given by the number of sign changes in the first column of the array. By inspection, there are no sign changes. Therefore, there are no roots with positive real parts. Since the array was constructed without a 0 appearing anywhere in the first column, there are no roots on the jw axis.
Note that the number of terms in each row decreases by 1 at each odd-powered row, and that the last element in each even-powered row is the constant coefficient from the characteristic equation. Since there are no sign changes, there are no roots in the right-half plane. There are no roots on the jw axis since there were no 0s in the first column.
The third system is the same as the second system except that the gain has been increased by a factor of 10. Note that several of the coefficients in the characteristic equation have changed. Also note that there is a negative coefficient in the polynomial. That guarantees that there is at least one unstable root. Since the constant coefficient is positive, there is an even number of unstable roots.
Examination of the first column of the array shows that there are ...
Download paper
Not exactly what you need?

Related papers

Automatic Control and Systems Engineering
A block is a negligible component that can state the behaviors represent in a process model. An algorithm is urbanized to detect blocks beginning a process meaning network and transform it into a hierarchical hierarchy model. The behaviors in every block type are modeled by means of ACTA formalism. This provides a hypothetical foundation from which ECA rules are recognized. The future ECA…
Computer Numerical Control
End to end designs of the components have been highly developed and the computers have been widely used in their processes and this have included such things as computer language being widely incorporated within the systems that use computer numerical control (Krull, 40).…
This is the polynomial that the Routh array uses.…
Levels of Computer Control
There are various levels at which a computer system can exercise control, each of which will be discussed herein and compared to the specifics in the case at hand. The purpose of this paper is to either agree or disagree that the level of computer control implemented in the Therac-25 system was appropriate to the maximum efficient operation of the device. Our concern here is the level in this…
: Internal Control - Accounting Information Systems
Fraud is intentionally made while error is not intentionally made. Examples of fraud is theft of company assets such as cash and inventories and presentation of a financial statement that shows net income that is higher than what the real net income should be. An error occurs when the accounting clerk records payments for a $20,000 building repair as remainders and maintenance expense instead of…
Computer Systems Fundamentals
released their RSA algorithm into the public domain, in advance of the US patent (#4,405,829) expiring on the 20th Sept. of the same year. Following the relaxation of the US government restrictions earlier in the year (Jan. 14) this removed one of the last barriers to the world-wide distribution of much software based on cryptographic systems. It should be noted that the IDEA algorithm is still…
Computer systems
But due to the fact that interface of most computer systems has limited range of expressions, users has no opportunities to interact with them as with real people.…