ICIEMS 2015

International Conference on Information Engineering, Management and Security 2015

 


ICIEMS 2015 Kokula Krishna Hari K
Publication Meta Value
Short Title ICIEMS 2015
Publisher ASDF, India
ISBN 13 978-81-929742-7-9
ISBN 10 81-929742-7-8
Language English
Type Hard Bound - Printed Book
Copyrights ICIEMS Organizers / DCRC, London, UK
Editor-in-Chief Kokula Krishna Hari K
Conference Dates 13 - 14, August 2015
Venue Country IITM-RP, Chennai, India
Submitted Papers 410
Acceptance Rate 4.11%
Website www.iciems.in

Paper 047


Some Tuning Methods of PID Controller For Different Processes

Some Tuning Methods of PID Controller For Different Processes

R G Rakshasmare1, G A Kamble2, R H Chile3

1M.tech, S.G.G.S Institute of Engineering and Technology, Vishnupuri, Nanded - 431606, India., 2M.tech, College Of Engineering, Autonomous institute Pune, India, 3Professor, is with S.G.G.S Institute of Engineering and Technology, Vishnupuri, Nanded-431606, India

Abstract

Proportional, Integral and Derivative (PID) con-trollers are the most widely used controller in the chemical process industries because of their simplicity, robustness and successful practical application. Many tuning methods have been proposed for PID controllers such as Ziegler-Nichols, Tyreus-Luyben, Cohen-Coon, IMC, IMC based PID, FuzzyPID. Our purpose in this study is comparison of these tuning methods for single input single output (SISO) systems using computer simulation. Comparative analysis of performance evaluation of different controller are performed. Such as percentage of overshoot, settling time, rise time has been used as the criterion for comparison. These tuning methods have been implemented for first, second and third order systems with dead time and for two cases of set point tracking and load rejection response has considered.

Author's Profile

R G Rakshasmare : Profile

G A Kamble : Profile

R H Chile : Profile

Cite this Article as Follows

R G Rakshasmare, G A Kamble, R H Chile. "Some Tuning Methods of PID Controller For Different Processes." International Conference on Information Engineering, Management and Security (2015): 282-288. Print.