Electrohydraulic control of thrust hydraulic system for shield tunneling machine

  • Beidou Zhu
  • , Guofang Gong
  • , Hu Shi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

A thrust hydraulic system of shield tunneling machine with pressure and flow control is introduced. The electrohydraulic control model is presented. Based on conventional PID control, corresponding experimental analyses are carried out on the simulator test rig. Considering the uncertain and variable loads during shield tunneling, simulation study on fuzzy control of the thrust parameters is realized by applying fuzzy-PID compound control and fuzzy adaptive PID control strategies. Dynamic simulations are finished in AMESim and MATLAB/Simulink softwares. The simulation results show that the control with fuzzy logic algorithm can improve the performances of the thrust system evidently compared with pure PID control, and the fuzzy adaptive PID control system can achieve better performances.

Original languageEnglish
Title of host publicationIntelligent Robotics and Applications - Second International Conference, ICIRA 2009, Proceedings
Pages482-492
Number of pages11
DOIs
StatePublished - 2009
Externally publishedYes
Event2nd International Conference on Intelligent Robotics and Applications, ICIRA 2009 - Singapore, Singapore
Duration: 16 Dec 200918 Dec 2009

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5928 LNAI
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference2nd International Conference on Intelligent Robotics and Applications, ICIRA 2009
Country/TerritorySingapore
CitySingapore
Period16/12/0918/12/09

Keywords

  • Fuzzy
  • PID
  • Pressure and flow control
  • Shield tunneling machine
  • Thrust hydraulic system

Fingerprint

Dive into the research topics of 'Electrohydraulic control of thrust hydraulic system for shield tunneling machine'. Together they form a unique fingerprint.

Cite this