SlideShare a Scribd company logo
1 of 6
Download to read offline
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 2, Issue 12 (August 2012), PP. 01-06


       Comparison between ARMA and Sub-Space Identification
            Method for Modelling of Air Separation Unit
                P A Nageswara Rao1, P Mallikarjuna Rao2, B Rajesh Kumar3
                 1
                  Department of ECE, Vignan’s Institute of Information Technology, Visakhapatnam 530 046
                  2
                    Department of ECE, College of Engineering, Andhra University, Visakhapatnam 530 003
                              3
                                Department of EIE, GITAM University, Visakhapatnam 530 045



Abstract––In the present work two popular methods for modelling a system are compared using modelling of Air
Separation Unit (ASU). To Model any MIMO system in general both ARMA and Subspace Identification methods can
be used, and the optimum results can be achieved only after thorough investigation in the actual process of the system
and the methodology by which the modelling can be done so as to suit our requirements. A higher order system can be
modelled improving its overall stability, as well as a system with lower order can be modelled with less complexity.

Keywords––MIMO, ASU, System identification, ARMA, N4SID.

                                                 I.          INTRODUCTION
           In industries where large machinery is used, engineers have found it very difficult to analyse the problems
associated with the working of systems generally considering a MIMO system which are nonlinear in nature. Huge time
lags in the process and nonlinearity makes it difficult to analyse the system controllability as well as stability. Adapting a
new controlling technique is difficult and there is always an ambiguity that wether the system will work properly to the
demands or not. We have in general two efficient methods for modelling of ASU, ARMA modelling method and subspace
identification method. Both these methods have their own importance for achieving optimum results. In this work both
ARMA and Subspace Identification methods are discussed in brief and compared for designing of ASU.

                                                II.          METHODOLOGY
There is feasibility to model any non linear system with the knowledge of input output vectors and initial conditions.
Consider a system governed by the set of first order differential equation:

Where x(t) is an n x 1 state vector.
A is an n x n matrix.
u(t) is an r x 1 input vector. B is an n x r input matrix.

The fundamental assumption imposed on the system is that of system controllability; i.e. it is assumed that of system
controllability matrix

             2    n-1
ɣ = [B, AB, A B… A B]

has rank n. In addition, it is generally assumed in this short paper that the r columns B are linearly independent. For the
present purpose only the observability form will be discussed. Beginning with an assumed discrete space model. The
general approach for modelling leads to state variable approach. In state space analysis
                                                x(k-1) = Ax(k) + Bu(k), x(0)
                                                    y(k) = Cx(k) + Du(k)

The values of A, B, C & D are estimated using subspace method for identification of linear systems. This method [3]
performs a deterministic D-T system identification by calculating an observable form state space model




                                                                1
Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit

                                                    R0 = {A, B, C, D}
From a set of inputs and corresponding output data, certain restrictions are placed on the input signals to ensure that the
system excitation is “sufficiently rich”.

2.1 ARMA Approach
           The ARMAX model structure is based on auto Regressive moving averages method for relating the output
with previous, present and error inputs, the block diagram is shown in fig 4.1 where the values A,B,C & D are found by
repetitive iterations.




A more compact way to write the difference equation is




                                             Fig 2.1 Modelling using ARMA

2.2 Subspace Approach
System identification aims at constructing state space models from input-output data. The left hand side shows the subspace
identification approach: first the (Kalman filter) states are estimated directly from input-output data, and then the
system matrices can be obtained. The right hand side is the classical approach: first obtain the system matrices, and then
estimate the states.




                                         Fig 2.2: Subspace Identification Method

                                     III.      DISCUSSION ON RESULTS
         Using      both      ARMA and          Subspace identification methods modelling of nonlinear MIMO system is
achieved and results of modelling and stability are compared as follows.


                                                            2
Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit

      Table 3.1: Comparison between ARMA and Subspace Identification method for different cases of model orders
                           S.No     Model            Subspace         ARMA
                                    Order          Identification
                                  1           I              91.14          96.82
                                  2          II              95.81          96.82
                                  3          III             96.14          96.82
                                  4          IV              96.65          97.03
                                  5          V               96.65          96.98
                                  6          VI             96.70           97.05
                                  7          VII             96.64               97.09
                                  8   VIII                   96.65          97.09
                                  9          IX              96.65          97.08
                             10              X               96.65          97.08

         Kalman filter states can be obtained directly from input-output data using linear algebra tools (QR and singular
value decomposition) without knowing the mathematical model.




                          Fig 3.2(a): Poole-Zero plots for model obtained with Subspace method




                           Fig 3.2(b): Poole-Zero plots for model obtained withARMA method

          Comparing the stability of the modelled system then using ARMA method of modelling it is found that the
system is far stable compared to that of model modelled using Subspace identification method, as it is seen from Fig 3.2(a)
that the poles appear on the unit circle which resembles that the system is marginally stable.




                                                            3
Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit




                    Fig 3.1: Model approximation by comparing the identified model with original data.

          After modelling the output data of the original model is compared with the outputs of the simulated model and it
is found that the model obtained by subspace identification method gives 96.7 % approximation whereas the model
designed using     ARMA method provides 97.09 % approximation. Hence in terms of modelling a non liner MIMO
system ARMA method achieves optimum results compared to that of Subspace Identification method the results are
described in tabular form Table: 3.1.




   Fig 3.3(a): Comparison between original system and proposed model identified using Subspace identification method.

         The response of the system employing neural network predictive controller are compared for the two models
modelled with subspace identification method and ARMA respectively as shown in the fig 3.3 (a) and 3.3 (b) and it is
found that with ARMA method as it provides a stable system the controlling is achieved with optimum results whereas
for model using subspace identification method becomes unstable while achieving controllability. The outputs of the two
systems are compared in fig 3.4 (a) and 3.4 (b).




                                                            4
Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit




            Fig 3.3(b): Comparison between original system and proposed model identified using ARMA method.




               Fig 3.4 (a) Comparing Subspace identified method model and ARMA method model with input.




         Fig 3.4 (b) Comparing Subspace identified method model and ARMA method model with individual response.

                                             IV.       CONCLUSION
          In terms of modelling a non-liner MIMO system ARMA method achieves optimum results compared to that of
Subspace Identification method also it is found that with ARMA method as it provides a stable system the controlling is
achieved with optimum results whereas for model using subspace identification method becomes unstable while
achieving controllability. For more optimum results we have to consider a more complex NNPC and large amount of
training data for it. By observing the results we conclude that ARMA method can be used for optimum modelling of a
nonlinear MIMO System and its far stable reliable for controllability.

                                                   REFERENCES
  [1].     P.A. Nageswara Rao & P.M. Rao “Automation of Oxygen Compressor Control System” in IETE Journal of
           Education, Vol 47, No. 3, July – September 2006 pp 137-143 [2]. P.A.N. Rao, P.M. Rao, M.V. Suresh, B.R.
  [2].     Kumar, Instrumentation & process control of Air separation Unit, Proceedings of National Conference, DEVICE-
           2010, 13 & 14 Nov 2010, PP- 138 – 142, at ANITS, VSP
  [3].      “Pre-process Identification: An Aid for Neural Net Modelling” by H. F. VanLandingham and J. Y. Choi The
           Bradley Department of Electrical Engineering Virginia Polytechnic Institute and State University Blacksburg,
           Virginia 24061-0111 U.S.A.
  [4].     Kailath T. (1980), Linear Systems, Prentice- Hall, Inc., Englewood Cliffs, NJ.
  [5].     Peter Van Overschee Bart De Moor „subspace Identification for linear systems‟
  [6].     Antony Gautier (Lille) “Kalman-Type Recursions For Time-Varying Arma Models And Their Implication For
           Least Squares Procedure_”,Probability and Mathematical Statistics.



                                                           5
Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit

Authors
                    P.A.Nageswara Rao holds BE in ECE Department from Andhra University (AU) and ME in Electronic
                    Instrumentation (EI) from AU. He has Eleven years of teaching experience, presently working at
                    Vignan‟s Institute of Information Technology, Visakhapatnam, as Associate Professor in Department of
                    ECE. He is pursuing Ph.D. from AU. He has Four Papers in various National/International
                    Journals/Conferences to his credit.




                    Mallikarjuna Rao Prudhivi is a Professor, Department of Electronics & Communication Engineering,
                    presently working in Department of Electronics and Communication Engineering, Andhra University,
                    Visakhapatnam. He obtained Ph.D. in 1998, ME in 1986 and BE in 1982. He has 60 research
                    Publications in various International/National journals, Conferences and Proceedings in his credit. He
                    has received the best Ph.D. Thesis Award (Gold Medal from the Honorable Governor of Andhra
                    Pradesh) during the year 1999.



                     B Rajesh Kumar received his B Tech degree in 1999 and M Tech degree in 2004 from the Department
                     of Instrument Technology, Andhra University, Visakhapatnam, India. Currently, he is working as a
                     research scholar in Andhra University, Visakhapatnam, India. He is currently working in GITAM
                     University, Visakhapatnam, India. He is coordinator for the Instrument Society of India, ISOI Student
                     Chapter, GITAM University. During his ten years of experience he has occupied different positions in
                     academia and administration. His research interest is in MEMS and microsystems. He has also worked
                     with MATLAB for different image processing applications. He is also interested in developing new
teaching methodologies in the classroom. Some of his education related papers are published in international journals and
have been selected in some of the national and international conferences. Some of his research papers are also published in
various international journals.




                                                            6

More Related Content

Viewers also liked

Climate change risk analysis as a basis for a national climate change adaptat...
Climate change risk analysis as a basis for a national climate change adaptat...Climate change risk analysis as a basis for a national climate change adaptat...
Climate change risk analysis as a basis for a national climate change adaptat...Global Risk Forum GRFDavos
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Social vulnerability to natural hazards in China
Social vulnerability to natural hazards in ChinaSocial vulnerability to natural hazards in China
Social vulnerability to natural hazards in ChinaGlobal Risk Forum GRFDavos
 
Success and rest don't sleep together.
Success and rest don't sleep together.Success and rest don't sleep together.
Success and rest don't sleep together.Rhea Myers
 
When the winners lose their swagger ,you know something has evened the playin...
When the winners lose their swagger ,you know something has evened the playin...When the winners lose their swagger ,you know something has evened the playin...
When the winners lose their swagger ,you know something has evened the playin...Rhea Myers
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Scores.schoenberg pianopierrot
Scores.schoenberg pianopierrotScores.schoenberg pianopierrot
Scores.schoenberg pianopierrotrebakim
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Coffee should be black as Hell, strong as death, and sweet as love.
Coffee should be black as Hell, strong as death, and sweet as love.Coffee should be black as Hell, strong as death, and sweet as love.
Coffee should be black as Hell, strong as death, and sweet as love.Rhea Myers
 
Harmonization of seismic hazard assessment: the SHARE example
Harmonization of seismic hazard assessment: the SHARE exampleHarmonization of seismic hazard assessment: the SHARE example
Harmonization of seismic hazard assessment: the SHARE exampleGlobal Risk Forum GRFDavos
 
GT IBR 2012 - focus on Ireland
GT IBR 2012 - focus on IrelandGT IBR 2012 - focus on Ireland
GT IBR 2012 - focus on IrelandGrant Thornton
 
Haiti, two years later: What has happened to the injured? Factors affecting s...
Haiti, two years later: What has happened to the injured? Factors affecting s...Haiti, two years later: What has happened to the injured? Factors affecting s...
Haiti, two years later: What has happened to the injured? Factors affecting s...Global Risk Forum GRFDavos
 

Viewers also liked (18)

Lompatan kuadran
Lompatan kuadranLompatan kuadran
Lompatan kuadran
 
Weather aware, climate prepared.
Weather aware, climate prepared.Weather aware, climate prepared.
Weather aware, climate prepared.
 
Climate change risk analysis as a basis for a national climate change adaptat...
Climate change risk analysis as a basis for a national climate change adaptat...Climate change risk analysis as a basis for a national climate change adaptat...
Climate change risk analysis as a basis for a national climate change adaptat...
 
Science 1
Science 1Science 1
Science 1
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Social vulnerability to natural hazards in China
Social vulnerability to natural hazards in ChinaSocial vulnerability to natural hazards in China
Social vulnerability to natural hazards in China
 
Success and rest don't sleep together.
Success and rest don't sleep together.Success and rest don't sleep together.
Success and rest don't sleep together.
 
When the winners lose their swagger ,you know something has evened the playin...
When the winners lose their swagger ,you know something has evened the playin...When the winners lose their swagger ,you know something has evened the playin...
When the winners lose their swagger ,you know something has evened the playin...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
F02054253
F02054253F02054253
F02054253
 
Scores.schoenberg pianopierrot
Scores.schoenberg pianopierrotScores.schoenberg pianopierrot
Scores.schoenberg pianopierrot
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Coffee should be black as Hell, strong as death, and sweet as love.
Coffee should be black as Hell, strong as death, and sweet as love.Coffee should be black as Hell, strong as death, and sweet as love.
Coffee should be black as Hell, strong as death, and sweet as love.
 
Harmonization of seismic hazard assessment: the SHARE example
Harmonization of seismic hazard assessment: the SHARE exampleHarmonization of seismic hazard assessment: the SHARE example
Harmonization of seismic hazard assessment: the SHARE example
 
GT IBR 2012 - focus on Ireland
GT IBR 2012 - focus on IrelandGT IBR 2012 - focus on Ireland
GT IBR 2012 - focus on Ireland
 
Haiti, two years later: What has happened to the injured? Factors affecting s...
Haiti, two years later: What has happened to the injured? Factors affecting s...Haiti, two years later: What has happened to the injured? Factors affecting s...
Haiti, two years later: What has happened to the injured? Factors affecting s...
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development

AMS SoC Formal Verification based on Hybrid Scheme
AMS SoC Formal Verification based on Hybrid SchemeAMS SoC Formal Verification based on Hybrid Scheme
AMS SoC Formal Verification based on Hybrid SchemeDr. Amarjeet Singh
 
Multivariable Parametric Modeling of a Greenhouse by Minimizing the Quadratic...
Multivariable Parametric Modeling of a Greenhouse by Minimizing the Quadratic...Multivariable Parametric Modeling of a Greenhouse by Minimizing the Quadratic...
Multivariable Parametric Modeling of a Greenhouse by Minimizing the Quadratic...TELKOMNIKA JOURNAL
 
Hardware Implementation of Low Cost Inertial Navigation System Using Mems Ine...
Hardware Implementation of Low Cost Inertial Navigation System Using Mems Ine...Hardware Implementation of Low Cost Inertial Navigation System Using Mems Ine...
Hardware Implementation of Low Cost Inertial Navigation System Using Mems Ine...IOSR Journals
 
Development of an adaptive and a switched beam
Development of an adaptive and a switched beamDevelopment of an adaptive and a switched beam
Development of an adaptive and a switched beammarwaeng
 
REVIEW ON MODELS FOR GENERALIZED PREDICTIVE CONTROLLER
REVIEW ON MODELS FOR GENERALIZED PREDICTIVE CONTROLLERREVIEW ON MODELS FOR GENERALIZED PREDICTIVE CONTROLLER
REVIEW ON MODELS FOR GENERALIZED PREDICTIVE CONTROLLERcscpconf
 
Iisrt dali martin (ec)
Iisrt dali martin (ec)Iisrt dali martin (ec)
Iisrt dali martin (ec)IISRT
 
Ijmer 41023842
Ijmer 41023842Ijmer 41023842
Ijmer 41023842IJMER
 
Detection of DC Voltage Fault in SRM Drives Using K-Means Clustering and Cla...
Detection of DC Voltage Fault in SRM Drives Using K-Means  Clustering and Cla...Detection of DC Voltage Fault in SRM Drives Using K-Means  Clustering and Cla...
Detection of DC Voltage Fault in SRM Drives Using K-Means Clustering and Cla...IJMER
 
System Identification in GSM/EDGE Receivers Using a Multi-Model Approach
System Identification in GSM/EDGE Receivers Using a Multi-Model ApproachSystem Identification in GSM/EDGE Receivers Using a Multi-Model Approach
System Identification in GSM/EDGE Receivers Using a Multi-Model ApproachIDES Editor
 
Surface generation from point cloud.pdf
Surface generation from point cloud.pdfSurface generation from point cloud.pdf
Surface generation from point cloud.pdfssuserd3982b1
 
CMAC Neural Networks
CMAC Neural NetworksCMAC Neural Networks
CMAC Neural NetworksIJMREMJournal
 
Aristotle boyd martin-peci_poster_2017
Aristotle boyd martin-peci_poster_2017Aristotle boyd martin-peci_poster_2017
Aristotle boyd martin-peci_poster_2017Aristotle Boyd-Martin
 
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Filip Krikava
 
A Fault Detection and Classification Method for SC Transmission Line Using Ph...
A Fault Detection and Classification Method for SC Transmission Line Using Ph...A Fault Detection and Classification Method for SC Transmission Line Using Ph...
A Fault Detection and Classification Method for SC Transmission Line Using Ph...paperpublications3
 
S12_P1_Aiyer_Arun
S12_P1_Aiyer_ArunS12_P1_Aiyer_Arun
S12_P1_Aiyer_ArunArun Aiyer
 

Similar to IJERD (www.ijerd.com) International Journal of Engineering Research and Development (20)

AMS SoC Formal Verification based on Hybrid Scheme
AMS SoC Formal Verification based on Hybrid SchemeAMS SoC Formal Verification based on Hybrid Scheme
AMS SoC Formal Verification based on Hybrid Scheme
 
Multivariable Parametric Modeling of a Greenhouse by Minimizing the Quadratic...
Multivariable Parametric Modeling of a Greenhouse by Minimizing the Quadratic...Multivariable Parametric Modeling of a Greenhouse by Minimizing the Quadratic...
Multivariable Parametric Modeling of a Greenhouse by Minimizing the Quadratic...
 
Hardware Implementation of Low Cost Inertial Navigation System Using Mems Ine...
Hardware Implementation of Low Cost Inertial Navigation System Using Mems Ine...Hardware Implementation of Low Cost Inertial Navigation System Using Mems Ine...
Hardware Implementation of Low Cost Inertial Navigation System Using Mems Ine...
 
Development of an adaptive and a switched beam
Development of an adaptive and a switched beamDevelopment of an adaptive and a switched beam
Development of an adaptive and a switched beam
 
REVIEW ON MODELS FOR GENERALIZED PREDICTIVE CONTROLLER
REVIEW ON MODELS FOR GENERALIZED PREDICTIVE CONTROLLERREVIEW ON MODELS FOR GENERALIZED PREDICTIVE CONTROLLER
REVIEW ON MODELS FOR GENERALIZED PREDICTIVE CONTROLLER
 
Iisrt dali martin (ec)
Iisrt dali martin (ec)Iisrt dali martin (ec)
Iisrt dali martin (ec)
 
Ijmer 41023842
Ijmer 41023842Ijmer 41023842
Ijmer 41023842
 
Detection of DC Voltage Fault in SRM Drives Using K-Means Clustering and Cla...
Detection of DC Voltage Fault in SRM Drives Using K-Means  Clustering and Cla...Detection of DC Voltage Fault in SRM Drives Using K-Means  Clustering and Cla...
Detection of DC Voltage Fault in SRM Drives Using K-Means Clustering and Cla...
 
System Identification in GSM/EDGE Receivers Using a Multi-Model Approach
System Identification in GSM/EDGE Receivers Using a Multi-Model ApproachSystem Identification in GSM/EDGE Receivers Using a Multi-Model Approach
System Identification in GSM/EDGE Receivers Using a Multi-Model Approach
 
Surface generation from point cloud.pdf
Surface generation from point cloud.pdfSurface generation from point cloud.pdf
Surface generation from point cloud.pdf
 
06466595
0646659506466595
06466595
 
CMAC Neural Networks
CMAC Neural NetworksCMAC Neural Networks
CMAC Neural Networks
 
Jp2416601666
Jp2416601666Jp2416601666
Jp2416601666
 
Aristotle boyd martin-peci_poster_2017
Aristotle boyd martin-peci_poster_2017Aristotle boyd martin-peci_poster_2017
Aristotle boyd martin-peci_poster_2017
 
K25047051
K25047051K25047051
K25047051
 
K25047051
K25047051K25047051
K25047051
 
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
Integrating Adaptation Mechanisms Using Control Theory Centric Architecture M...
 
A Fault Detection and Classification Method for SC Transmission Line Using Ph...
A Fault Detection and Classification Method for SC Transmission Line Using Ph...A Fault Detection and Classification Method for SC Transmission Line Using Ph...
A Fault Detection and Classification Method for SC Transmission Line Using Ph...
 
TUPPC055_Final
TUPPC055_FinalTUPPC055_Final
TUPPC055_Final
 
S12_P1_Aiyer_Arun
S12_P1_Aiyer_ArunS12_P1_Aiyer_Arun
S12_P1_Aiyer_Arun
 

More from IJERD Editor

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEIJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignIJERD Editor
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationIJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string valueIJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingIJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart GridIJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
 

More from IJERD Editor (20)

A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksA Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
 
MEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACEMEMS MICROPHONE INTERFACE
MEMS MICROPHONE INTERFACE
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...Influence of tensile behaviour of slab on the structural Behaviour of shear c...
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’Gold prospecting using Remote Sensing ‘A case study of Sudan’
Gold prospecting using Remote Sensing ‘A case study of Sudan’
 
Reducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding DesignReducing Corrosion Rate by Welding Design
Reducing Corrosion Rate by Welding Design
 
Router 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and VerificationRouter 1X3 – RTL Design and Verification
Router 1X3 – RTL Design and Verification
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRMitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
 
Study on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive ManufacturingStudy on the Fused Deposition Modelling In Additive Manufacturing
Study on the Fused Deposition Modelling In Additive Manufacturing
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraGesture Gaming on the World Wide Web Using an Ordinary Web Camera
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
 
Moon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF DxingMoon-bounce: A Boon for VHF Dxing
Moon-bounce: A Boon for VHF Dxing
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
 
Importance of Measurements in Smart Grid
Importance of Measurements in Smart GridImportance of Measurements in Smart Grid
Importance of Measurements in Smart Grid
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powderStudy of Macro level Properties of SCC using GGBS and Lime stone powder
Study of Macro level Properties of SCC using GGBS and Lime stone powder
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

IJERD (www.ijerd.com) International Journal of Engineering Research and Development

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 2, Issue 12 (August 2012), PP. 01-06 Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit P A Nageswara Rao1, P Mallikarjuna Rao2, B Rajesh Kumar3 1 Department of ECE, Vignan’s Institute of Information Technology, Visakhapatnam 530 046 2 Department of ECE, College of Engineering, Andhra University, Visakhapatnam 530 003 3 Department of EIE, GITAM University, Visakhapatnam 530 045 Abstract––In the present work two popular methods for modelling a system are compared using modelling of Air Separation Unit (ASU). To Model any MIMO system in general both ARMA and Subspace Identification methods can be used, and the optimum results can be achieved only after thorough investigation in the actual process of the system and the methodology by which the modelling can be done so as to suit our requirements. A higher order system can be modelled improving its overall stability, as well as a system with lower order can be modelled with less complexity. Keywords––MIMO, ASU, System identification, ARMA, N4SID. I. INTRODUCTION In industries where large machinery is used, engineers have found it very difficult to analyse the problems associated with the working of systems generally considering a MIMO system which are nonlinear in nature. Huge time lags in the process and nonlinearity makes it difficult to analyse the system controllability as well as stability. Adapting a new controlling technique is difficult and there is always an ambiguity that wether the system will work properly to the demands or not. We have in general two efficient methods for modelling of ASU, ARMA modelling method and subspace identification method. Both these methods have their own importance for achieving optimum results. In this work both ARMA and Subspace Identification methods are discussed in brief and compared for designing of ASU. II. METHODOLOGY There is feasibility to model any non linear system with the knowledge of input output vectors and initial conditions. Consider a system governed by the set of first order differential equation: Where x(t) is an n x 1 state vector. A is an n x n matrix. u(t) is an r x 1 input vector. B is an n x r input matrix. The fundamental assumption imposed on the system is that of system controllability; i.e. it is assumed that of system controllability matrix 2 n-1 ɣ = [B, AB, A B… A B] has rank n. In addition, it is generally assumed in this short paper that the r columns B are linearly independent. For the present purpose only the observability form will be discussed. Beginning with an assumed discrete space model. The general approach for modelling leads to state variable approach. In state space analysis x(k-1) = Ax(k) + Bu(k), x(0) y(k) = Cx(k) + Du(k) The values of A, B, C & D are estimated using subspace method for identification of linear systems. This method [3] performs a deterministic D-T system identification by calculating an observable form state space model 1
  • 2. Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit R0 = {A, B, C, D} From a set of inputs and corresponding output data, certain restrictions are placed on the input signals to ensure that the system excitation is “sufficiently rich”. 2.1 ARMA Approach The ARMAX model structure is based on auto Regressive moving averages method for relating the output with previous, present and error inputs, the block diagram is shown in fig 4.1 where the values A,B,C & D are found by repetitive iterations. A more compact way to write the difference equation is Fig 2.1 Modelling using ARMA 2.2 Subspace Approach System identification aims at constructing state space models from input-output data. The left hand side shows the subspace identification approach: first the (Kalman filter) states are estimated directly from input-output data, and then the system matrices can be obtained. The right hand side is the classical approach: first obtain the system matrices, and then estimate the states. Fig 2.2: Subspace Identification Method III. DISCUSSION ON RESULTS Using both ARMA and Subspace identification methods modelling of nonlinear MIMO system is achieved and results of modelling and stability are compared as follows. 2
  • 3. Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit Table 3.1: Comparison between ARMA and Subspace Identification method for different cases of model orders S.No Model Subspace ARMA Order Identification 1 I 91.14 96.82 2 II 95.81 96.82 3 III 96.14 96.82 4 IV 96.65 97.03 5 V 96.65 96.98 6 VI 96.70 97.05 7 VII 96.64 97.09 8 VIII 96.65 97.09 9 IX 96.65 97.08 10 X 96.65 97.08 Kalman filter states can be obtained directly from input-output data using linear algebra tools (QR and singular value decomposition) without knowing the mathematical model. Fig 3.2(a): Poole-Zero plots for model obtained with Subspace method Fig 3.2(b): Poole-Zero plots for model obtained withARMA method Comparing the stability of the modelled system then using ARMA method of modelling it is found that the system is far stable compared to that of model modelled using Subspace identification method, as it is seen from Fig 3.2(a) that the poles appear on the unit circle which resembles that the system is marginally stable. 3
  • 4. Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit Fig 3.1: Model approximation by comparing the identified model with original data. After modelling the output data of the original model is compared with the outputs of the simulated model and it is found that the model obtained by subspace identification method gives 96.7 % approximation whereas the model designed using ARMA method provides 97.09 % approximation. Hence in terms of modelling a non liner MIMO system ARMA method achieves optimum results compared to that of Subspace Identification method the results are described in tabular form Table: 3.1. Fig 3.3(a): Comparison between original system and proposed model identified using Subspace identification method. The response of the system employing neural network predictive controller are compared for the two models modelled with subspace identification method and ARMA respectively as shown in the fig 3.3 (a) and 3.3 (b) and it is found that with ARMA method as it provides a stable system the controlling is achieved with optimum results whereas for model using subspace identification method becomes unstable while achieving controllability. The outputs of the two systems are compared in fig 3.4 (a) and 3.4 (b). 4
  • 5. Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit Fig 3.3(b): Comparison between original system and proposed model identified using ARMA method. Fig 3.4 (a) Comparing Subspace identified method model and ARMA method model with input. Fig 3.4 (b) Comparing Subspace identified method model and ARMA method model with individual response. IV. CONCLUSION In terms of modelling a non-liner MIMO system ARMA method achieves optimum results compared to that of Subspace Identification method also it is found that with ARMA method as it provides a stable system the controlling is achieved with optimum results whereas for model using subspace identification method becomes unstable while achieving controllability. For more optimum results we have to consider a more complex NNPC and large amount of training data for it. By observing the results we conclude that ARMA method can be used for optimum modelling of a nonlinear MIMO System and its far stable reliable for controllability. REFERENCES [1]. P.A. Nageswara Rao & P.M. Rao “Automation of Oxygen Compressor Control System” in IETE Journal of Education, Vol 47, No. 3, July – September 2006 pp 137-143 [2]. P.A.N. Rao, P.M. Rao, M.V. Suresh, B.R. [2]. Kumar, Instrumentation & process control of Air separation Unit, Proceedings of National Conference, DEVICE- 2010, 13 & 14 Nov 2010, PP- 138 – 142, at ANITS, VSP [3]. “Pre-process Identification: An Aid for Neural Net Modelling” by H. F. VanLandingham and J. Y. Choi The Bradley Department of Electrical Engineering Virginia Polytechnic Institute and State University Blacksburg, Virginia 24061-0111 U.S.A. [4]. Kailath T. (1980), Linear Systems, Prentice- Hall, Inc., Englewood Cliffs, NJ. [5]. Peter Van Overschee Bart De Moor „subspace Identification for linear systems‟ [6]. Antony Gautier (Lille) “Kalman-Type Recursions For Time-Varying Arma Models And Their Implication For Least Squares Procedure_”,Probability and Mathematical Statistics. 5
  • 6. Comparison between ARMA and Sub-Space Identification Method for Modelling of Air Separation Unit Authors P.A.Nageswara Rao holds BE in ECE Department from Andhra University (AU) and ME in Electronic Instrumentation (EI) from AU. He has Eleven years of teaching experience, presently working at Vignan‟s Institute of Information Technology, Visakhapatnam, as Associate Professor in Department of ECE. He is pursuing Ph.D. from AU. He has Four Papers in various National/International Journals/Conferences to his credit. Mallikarjuna Rao Prudhivi is a Professor, Department of Electronics & Communication Engineering, presently working in Department of Electronics and Communication Engineering, Andhra University, Visakhapatnam. He obtained Ph.D. in 1998, ME in 1986 and BE in 1982. He has 60 research Publications in various International/National journals, Conferences and Proceedings in his credit. He has received the best Ph.D. Thesis Award (Gold Medal from the Honorable Governor of Andhra Pradesh) during the year 1999. B Rajesh Kumar received his B Tech degree in 1999 and M Tech degree in 2004 from the Department of Instrument Technology, Andhra University, Visakhapatnam, India. Currently, he is working as a research scholar in Andhra University, Visakhapatnam, India. He is currently working in GITAM University, Visakhapatnam, India. He is coordinator for the Instrument Society of India, ISOI Student Chapter, GITAM University. During his ten years of experience he has occupied different positions in academia and administration. His research interest is in MEMS and microsystems. He has also worked with MATLAB for different image processing applications. He is also interested in developing new teaching methodologies in the classroom. Some of his education related papers are published in international journals and have been selected in some of the national and international conferences. Some of his research papers are also published in various international journals. 6