Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Electrical & Electronics Expert

1) A closed loop servo is represented by differential equation, where c is displacement of output shaft, r is the displacement of the input shaft and e= r-c. Find out undamped natural frequency, damping ratio and percentage maximum overshoot for unit step input.

2) For unity feedback control system the open loop transfer function G(S) = 10(S+2)/ S2(S+1). Determine

(a) Position, velocity and acceleration error constants.

(b) The steady state error when input is R(S) where R(S) =3/S –2/S2+1/3S3

3) Open loop transfer function of servo system with unity feedback system is G(S) = 10/S(0.1S+1). Estimate static error constants of system. Get the steady state error of system when subjected to the input given by polynomial r(t) = a0+a1t +a2/2t2.

4) Plot Bode diagram for following transfer function and get the gain and phase cross over frequencies: G(S) = 10/ S(1+0.4S)(1+0.1S)

5) Open loop transfer function of unity feedback system is G(S) = 1/S(1+S)(1+2S). Draw the Polar plot and find out the Gain margin and Phase margin.

6) Draw the Bode plot and therefore determine Gain cross over frequency, Phase cross over frequency, Gain margin and Phase margin. G(S) = 0.75(1+0.2S)/ S(1+0.5S) (1+0.1S).

7) Draw the Bode plot and therefore determine Gain cross over frequency, Phase cross over frequency, Gain margin and Phase margin. G(S)=10(S+3)/S(S+2)(S2+4S+100).

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M911026

Have any Question? 


Related Questions in Electrical & Electronics

For the euler beam element shown in the figure derive the

For the Euler beam element shown in the figure, derive the interpolation functions, N I (ξ), stiffness matrix, k, and nodal force vector, f. Assume that the uniformly distributed load is  f (x) = f. Note that the referen ...

Tasks1learn how to use opendss2open and execute the epri

Tasks 1. Learn how to use OpenDSS 2. Open and execute the EPRI Test Circuit 24 model 3. Develop base case data sets of bus voltages and power flows 4. Provide analysis of the base case model: a. Feeder voltage profiles b ...

1 assume alice needs to send an e-mail to bob explain how

1. Assume Alice needs to send an e-mail to Bob. Explain how the confidentiality of the e-mail is achieved using S/MIME. 2. When we talk about authentication in SSL, do we mean message authentication or entity authenticat ...

Let xt be a signal whose fourier transform xomega is

Let x(t) be a signal whose Fourier transform X(ω) is nonzero only over 3 ≤ |ω| ≤ 9. Further, only frequencies 5 ≤ |ω| ≤ 7 contain useful information (the other frequencies can be considered to contain noise or different ...

1 how do you find the approximate value of the surface

1. How do you find the approximate value of the surface integral over a given surface? 2. How do you find the exact value of the surface integral? 3. Provide physical interpretations for the closed surface integrals of a ...

In rsa given p 107 q 113 e 13 and d 3653 encrypt the

In RSA, given p = 107, q = 113, e = 13, and d = 3653, encrypt the message "THIS IS TOUGH" using 00 to 26 (A: 00 and space: 26) as the encoding scheme. Decrypt the ciphertext to find the original message.

1 explain the term internal inductance2 what is meant by

1. Explain the term internal inductance. 2. What is meant by the quasistatic extension of the static field in a physical structure? 3. Outline the steps involved in the electroquasistatic field analysis of a parallel pla ...

Assignment questiondesign automatic fan speed controller

Assignment Question Design automatic fan speed controller based on the temperature variation in room using a microcontroller. Abstract: The electronic Circuit used to control the speed of fan based on temperature variati ...

Assume we have a very simple message digest our unrealistic

Assume we have a very simple message digest. Our unrealistic message digest is just one number between 0 and 25. The digest is initially set to 0. The cryptographic hash function adds the current value of the digest to t ...

1 explain why private-public keys cannot be used in

1. Explain why private-public keys cannot be used in creating a MAC. 2. The nonce in Figure 31.22 is to prevent a replay of the third message. Eve cannot replay the third message and pretend that it is a new request from ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro