2022
DOI: 10.24846/v31i2y202208
|View full text |Cite
|
Sign up to set email alerts
|

Real-Time Optimization for an AVR System Using Enhanced Harris Hawk and IIoT

Abstract: Recently, several research studies have used standard metaheuristic optimization algorithms rather than traditional algorithms and the Ziegler-Nichols (Z-N) method for tuning PID controller parameters. However, these studies have directly implemented these algorithms in order to configure the cascade control system one time. This paper presents a novel realtime monitoring and optimization architecture based on the Enhanced Harris Hawk Algorithm (EHHOA) and the Industrial Internet of Things (IIoT) for tuning th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 25 publications
(32 reference statements)
0
1
0
Order By: Relevance
“…Also, the rest of the parameters in table 2 change online such as the gear ratio parameter. Where ๐พ ๐‘ , ๐พ ๐‘– , ๐‘˜ ๐‘‘ are proportional, integral and differential gains respectively [16]. In this paper the COVID-19 optimization technique will be used to obtain the optimal values of PID controller parameters.…”
Section: System Modelingmentioning
confidence: 99%
“…Also, the rest of the parameters in table 2 change online such as the gear ratio parameter. Where ๐พ ๐‘ , ๐พ ๐‘– , ๐‘˜ ๐‘‘ are proportional, integral and differential gains respectively [16]. In this paper the COVID-19 optimization technique will be used to obtain the optimal values of PID controller parameters.…”
Section: System Modelingmentioning
confidence: 99%
“…Section 3 knowledge and background which consists of four parts as follows: part 1 explains types of Cyber Attacks such as Malware Phishing, Man in the middle of the attack, SQL injection, and DNS tunnelling; part 2 includes few instances of cyberattacks within 2022 as Theft of Crypto.com, Breach of data at the Red Cross, and Cash app data breach. part three discusses significance of Cybersecurity, while fourth part contains the types of Cyber Security such Cloud security, Mobile security, Security with Zero Trust, Network security, Application security, IoT [40,41], and End-point security.…”
Section: Introductionmentioning
confidence: 99%