2021
DOI: 10.22266/ijies2021.0630.33
|View full text |Cite
|
Sign up to set email alerts
|

Airborne Computer System Path-Tracking Based Multi-PID-PSO Controller Design

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…The RBF neural network feedforward algorithm is calculated according to Eq. ( 15) [14], which describes the discrete PID controller as follows:…”
Section: Control Strategy Designmentioning
confidence: 99%
See 2 more Smart Citations
“…The RBF neural network feedforward algorithm is calculated according to Eq. ( 15) [14], which describes the discrete PID controller as follows:…”
Section: Control Strategy Designmentioning
confidence: 99%
“…As every particle in the group symbolizes a point that moves across a (Dim)-dimensional search space, the positions of the particles indicate multiple potential sets of unknown parameters that need to be idealized. The rate at which the particle's location changes is determined by its velocity, while its fitness or quality measure is determined by its position inside the search space [14,20].…”
Section: Control Parameters Tuning Algorithmsmentioning
confidence: 99%
See 1 more Smart Citation
“…The speed and position update methods for the i th particle at the (𝑘 + 1 ) iteration are represented in Eqs. ( 4) and ( 5), respectively [26][27][28][29][30].…”
Section: Particle Swarm Optimization (Pso) Algorithmmentioning
confidence: 99%
“…Cooperation between security researchers, software providers, and the broader security community is essential for responsibly disclosing zero-day vulnerabilities. We discuss the difficulties and ethical issues that arise throughout this procedure, and we stress the importance of applying fixes quickly to protect against zero-day exploits [11].…”
Section: Introductionmentioning
confidence: 99%