Browse Definitions :
Definition

proportional control

Contributor(s): Matthew Haughn

Proportional control is a control system technology based on a response in proportion to the difference between what is set as a desired process variable (or set point) and the current value of the variable.

Proportional control is used where maintaining a process variable to a tighter tolerance and timely responsiveness are required. Control systems in many industrial settings as well as some smart devices use proportional control.

Proportional control involves fine-grained control through a feedback mechanism. In comparison to the on-off control (also known as bang-bang control) of a traditional bi-metallic strip-switched domestic thermostat, devices that use proportional control are more complex. The variable response is linearly proportional to the differential between a process variable and the desired optimum set point. This means that the response of the controller and the mechanism for affecting the variable make a greater response for a greater differential and a smaller change for a smaller differential.

The variability of the response to the process variable means tighter tolerances can be maintained. When automating dangerous machinery, handling of sensitive materials and chemical processes, proportional control makes processes and production safer and more reliable.

Adaptive cruise control is an example of proportional control. Throttle input is adjusted variably to react to both decreasing slopes and increasing momentum. As well, throttle is adjusted variably to the proximity of other vehicles in front of the controlled car. A separate proportional control system acts on the brakes gradually if nearing a followed vehicle too closely or dramatically in the case of emergency collision avoidance.

This was last updated in December 2017

Continue Reading About proportional control

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

SearchSecurity

  • cybersecurity

    Cybersecurity is the protection of internet-connected systems, including hardware, software and data, from cyberattacks.

  • asymmetric cryptography (public key cryptography)

    Asymmetric cryptography, also called public key cryptography, uses a pair of numerical keys that are mathematically related to ...

  • digital signature

    A digital signature is a mathematical technique used to validate the authenticity and integrity of a message, software or digital...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

  • hard disk drive (HDD)

    A computer hard disk drive (HDD) is a non-volatile memory hardware device that controls the positioning, reading and writing of ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • network-attached storage (NAS)

    Network-attached storage (NAS) is dedicated file storage that enables multiple users and heterogeneous client devices to retrieve...

Close