2022
DOI: 10.3390/pr10030524
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Modeling of a Nonlinear Two-Wheeled Robot Using Data-Driven Approach

Abstract: A system identification of a two-wheeled robot (TWR) using a data-driven approach from its fundamental nonlinear kinematics is investigated. The fundamental model of the TWR is implemented in a Simulink environment and tested at various input/output operating conditions. The testing outcome of TWR’s fundamental dynamics generated 12 datasets. These datasets are used for system identification using simple autoregressive exogenous (ARX) and non-linear auto-regressive exogenous (NLARX) models. Initially the ARX s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…In such a scenario, to keep track of faults and maintenance of all appliances or IoT devices in day care is added overhead. So, the health of smart devices in smart day care is as important as other vitals, which can be ensured by pro-fault detection [41,42].…”
Section: Proposed Approachmentioning
confidence: 99%
“…In such a scenario, to keep track of faults and maintenance of all appliances or IoT devices in day care is added overhead. So, the health of smart devices in smart day care is as important as other vitals, which can be ensured by pro-fault detection [41,42].…”
Section: Proposed Approachmentioning
confidence: 99%
“…Framing and Making with QKD. Intended quantum key distribution/dissemination (QKD) necessitates transmission network links like a quantum-based channel and a regular public data channel [10,11]. e source and recipient together entail arbitrary originators from the C-bilinear cyclic group and a bunch of primitive and polarized qubits.…”
Section: Keymentioning
confidence: 99%
“…Many chaotic enciphered practices have been discussed in the existing literature as means of ensuring the privacy of users' information and validation progression [11]. In this procedure of chaotic encipherment, an elementary constraint of bivouac maps and charts is unified with a private key in directive to yield chaotic order with the assistance of frontward reiteration [12,13].…”
Section: Introductionmentioning
confidence: 99%
“…The following is a control system design using an algorithm with good stability analysis. Designing an adaptive fuzzy SMC is firstly written the switching function of the SMC as (7).…”
Section: Design Of Afsmc Algorithmmentioning
confidence: 99%
“…The control system algorithm is generally divided into three functions: line tracking control, balance and velocity control, and steering control [7]. The traditional SMC control algorithm is very popular to be applied to line tracking control because of its ability to reject disturbance control [8].…”
Section: Introductionmentioning
confidence: 99%