Robust and LPV control of MIMO systems Part 3: Robustness analysis
|
|
- Valerie Craig
- 7 years ago
- Views:
Transcription
1 Robust and LPV control of MIMO systems Part 3: Robustness analysis Olivier Sename GIPSA-Lab Tecnologico de Monterrey, July 2016 Olivier Sename (GIPSA-Lab) Robust and LPV control - part 3 Tecnologico de Monterrey, July / 28
2 O. Sename [GIPSA-lab] 2/28 1. Introduction 2. Representation of uncertainties 3. Definition of Robustness analysis 4. Robustness analysis: the unstructured case 5. Robustness analysis: the structured case 6. Robust control design
3 O. Sename [GIPSA-lab] 3/28 Introduction Introduction A control system is robust if it is insensitive to differences between the actual system and the model of the system which was used to design the controller How to take into account the difference between the actual system and the model? A solution: using a model set BUT : very large problem and not exact yet A method: these differences are referred as model uncertainty. The approach 1 determine the uncertainty set: mathematical representation 2 check Robust Stability 3 check Robust Performance Lots of forms can be derived according to both our knowledge of the physical mechanism that cause the uncertainties and our ability to represent these mechanisms in a way that facilitates convenient manipulation. Several origins : Approximate knowledge and variations of some parameters Measurement imperfections (due to sensor) At high frequencies, even the structure and the model order is unknown (100 Choice of simpler models for control synthesis Controller implementation Two classes: parametric uncertainties / neglected or unmodelled dynamics
4 O. Sename [GIPSA-lab] 4/28 Example 1: uncertainties Representation of uncertainties Let consider the example from (Sokestag & Postlewaite, 1996). G(s) = k 1 + τs e sh, 2 k, h, τ 3 Let us choose the nominal parameters as, k = h = τ = 2.5 and G the according nominal model. We can define the relative uncertainty, which is actually referred as a MULTIPLICATIVE UNCERTAINTY, as G(s) = G(s)(I + W m(s) (s)) with W m(s) = 3.5s+0.25 s+1 and 1
5 Magnitude (db) O. Sename [GIPSA-lab] 5/28 Representation of uncertainties Example 2: unmodelled dynamcis Let us consider the system: 1 G(s) = G(s) 1 + τs, τ τmax This can be modelled as: W m Bode Diagram G(s) = G 0 (s)(i + W m(s) (s)) with W m(s) = τmaxjω and 1 1+τ maxjω (Greal-Gnom)/Gnom This can be represented as Frequency (rad/s) with [ ] N11 (s) N N(s) = 12 (s) N 21 (s) N 22 (s) ( = 0 I G 0 W m(s) G 0 (s) )
6 Representation of uncertainties Example 3: parametric uncertainties Consider the first order system: G(s) = 1 s + a, a 0 b < a < a 0 + b Define now: Then it leads: a = a 0 + δ.b with δ < 1 1 s + a = 1 s + a 0 + δ.b = 1 (1 + δ.b ) 1 s + a 0 s + a 0 This can then be represented as a Multiplicative Inverse Uncertainty: with z = y = 1 (w bu s+a 0 ) O. Sename [GIPSA-lab] 6/28
7 O. Sename [GIPSA-lab] 7/28 Representation of uncertainties Example 3 (cont.) same example with state space formulation Let us first the transfer function G(s) = 1 s+a as { ẋ = ( a0 δ.b)x + w G : z = x (1) In order to use an LFT, let us define the uncertain input: u = δx, Then the previous system can be rewritten in the following LFR: where and y are given as: = [ δ ], y = (x) and N given by the state space representation: ẋ = a 0 x bu + w N : y = x z = x
8 O. Sename [GIPSA-lab] 8/28 Representation of uncertainties Example 4: parametric uncertainties in state space equations Let us consider the following uncertain system: ẋ 1 = ( 2 + δ 1 )x 1 + ( 3 + δ 2 )x 2 G : ẋ 2 = ( 1 + δ 3 )x 2 + u (3) y = x 1 In order to use an LFT, let us define the uncertain inputs: u 1 = δ 1 x 1, u 2 = δ 2 x 2, u 3 = δ 3 x 2 Then the previous system can be rewritten in the following LFR: where and y are given as: = δ δ 2 0, y = x 1 x δ 3 x 2 and N given by the state space representation: ẋ 1 = 2x 1 3x 2 + u 1 + u 2 N : ẋ 2 = x 2 + u + u 3 y = x 1
9 O. Sename [GIPSA-lab] 9/28 Representation of uncertainties Towards LFR (LFT) The previous computations are in fact the first step towards an unified representation of the uncertainties: the Linear Fractional Representation (LFR). Indeed the previous schemes can be rewritten in the following general representation as: Figure: N structure This LFR gives then the transfer matrix from w to z, and is referred to as the upper Linear Fractional Transformation (LFT) : F u(n, ) = N 22 + N 21 (I N 11 ) 1 N 12 This LFT exists and is well-posed if (I N 11 ) 1 is invertible
10 O. Sename [GIPSA-lab] 10/28 Representation of uncertainties LFT definition In this representation N is known and (s) collects all the uncertainties taken into account for the stability analysis of the uncertain closed-loop system. (s) shall have the following structure: (s) = diag { 1 (s),, q(s), δ 1 I r1,, δ ri rr, ɛ 1 I c1,, ɛ ci cc } with i (s) RH k i k i, δ i R and ɛ i C. Remark: (s) includes q full block transfer matrices, r real diagonal blocks referred to as repeated scalars (indeed each block includes a real parameter δ i repeated r i times), c complex scalars ɛ i repeated c i times. Constraints: The uncertainties must be normalized, i.e such that: 1, δ i 1, ɛ i 1
11 O. Sename [GIPSA-lab] 11/28 Representation of uncertainties Uncertainty types We have seen in the previous examples the two important classes of uncertainties, namely: UNSTRUCTURED UNCERTAINTIES: we ignore the structure of, considered as a full complex perturbation matrix, such that 1. We then look at the maximal admissible norm for, to get Robust Stability and Performance. This will give a global sufficient condition on the robustness of the control scheme. This may lead to conservative results since all uncertainties are collected into a single matrix ignoring the specific role of each uncertain parameter/block. STRUCTURED UNCERTAINTIES: we take into account the structure of, (always such that 1). The robust analysis will then be carried out for each uncertain parameter/block. This needs to introduce a new tool: the Structured Singular Value. We then can obtain more fine results but using more complex tools. The analysis is provided in what follows for both cases. In Matlabthis analysis is provided in the tools robuststab and robustperf.
12 O. Sename [GIPSA-lab] 12/28 Definition of Robustness analysis Robustness analysis: problem formulation Since the analysis will be carried you for a closed-loop system, N should be defined as the connection of the plant and the controller. Therefore, in the framework of the H control, the following extended General Control Configuration is considered: Figure: P K structure and N is such that N = F l (P, K)
13 O. Sename [GIPSA-lab] 13/28 Definition of Robustness analysis Robust analysis: problem definition In the global P K General Control Configuration, the transfer matrix from w to z (i.e the closed-loop uncertain system) is given by: z = F u(n, )w, with F u(n, ) = N 22 + N 21 (I N 11 ) 1 N 12. and the objectives are then formulated as follows: Nominal stability (NS): N is internally stable Nominal Performance (NP): N 22 < 1 and NS Robust stability (RS): F u(n, ) is stable, < 1 and NS Robust performance (RP): F u(n, ) < 1, < 1 and NS
14 O. Sename [GIPSA-lab] 14/28 Definition of Robustness analysis Towards Robust stability analysis Robust Stability= with a given controller K, we determine wether the system remains stable for all plants in the uncertainty set. According to the definition of the previous upper LFT, when N is stable, the instability may only come from (I N 11 ). Then it is equivalent to study the M structure, given as: Figure: M structure This leads to the definition of the Small Gain Theorem Theorem (Small Gain Theorem) Suppose M RH. Then the closed-loop system in Fig. 3 is well-posed and internally stable for all RH such that : δ(resp. < δ) if and only if M(s) < 1/δ(resp. M(s) 1)
15 O. Sename [GIPSA-lab] 15/28 Robustness analysis: the unstructured case Definition of the uncertainty types Figure: 6 uncertainty representations
16 O. Sename [GIPSA-lab] 16/28 Robustness analysis: the unstructured case Robust stability analysis: additive case Objective: applying the Small Gain Theorem to these unstructured uncertainty representations. Let us consider the following simple control scheme as: The objective is to obtain: Figure: Control scheme Additive case: G(s) = G(s) + W A (s) A (s). Computing the N form gives ( ) WA KS N(s) = y W A KS y S y T y Output Multiplicative uncertainties: G(s) = (I + W O (s) O (s))g(s). Then it leads ( ) WO T N(s) = y W O T y S y T y
17 O. Sename [GIPSA-lab] 17/28 General results Robustness analysis: the unstructured case Theorem (Small Gain Theorem) Consider the different uncertainty types, and assume that NS is achieved, i.e M RH for each type. Then the closed-loop system is robustly stable, i.e. internally stable for all k RH (for k =A, 0, I, io, ii) such that : Additive : W A KS y 1 Additive Inverse: W ia S y 1 Output Multiplicative: W O T y 1 Input Multiplicative: W I T u 1 Output Inverse Multiplicative: W io S y 1 Input Inverse Multiplicative: W ii S u 1 This gives some robustness templates for the sensitivity functions. However this may be conservative.
18 O. Sename [GIPSA-lab] 18/28 Robustness analysis: the unstructured case Illustration on the SISO case Here Robust Stability is analyzed through the Nyquist plot. For illustration, let us consider the case of Multiplicative uncertainties (Input and Output case are identical for SISO systems), i.e Then the loop transfer function is given as: G = G(I + W m m) L = GK = GK(I + W m m) = L + W ml m; According to the Nyquist theorem, RS is achieved the the closed-loop system is stable for any L should not encircle, i.e L should not encircle -1 for all uncertainties. According to the figure, a sufficient condition is then: W ml < 1 + L, ω WmL 1+L < 1, ω W mt < 1 ω
19 O. Sename [GIPSA-lab] 19/28 Robustness analysis: the unstructured case A first insight in Robust Performance Objective: applying the Small Gain Theorem to these unstructured uncertainty representations. Let us consider the following simple control scheme as: Case of Output Multiplicative uncertainties: G(s) = (I + W O (s) O (s))g(s). Computing the N form gives N(s) = = y [ N11 (s) ] N 12 (s) N 21 (s) N 22 (s) W es y W es ( WO T y W O T y ) Figure: Control scheme We wish to get: The objectives are then formulated as follows: NS: N is internally stable NP: W es y < 1 and NS RS: W O T y < 1 and NS RP: F u(n, ) < 1, < 1, Sufficient condition: NS and σ(w O T y) + σ(w es y) < 1, ω
20 Robustness analysis: the unstructured case Illustration on the SISO case Here Robust Performance is analyzed through the Nyquist plot. For illustration, let us consider the case of Multiplicative uncertainties (Input and Output case are identical for SISO systems), i.e Then the loop transfer function is given as: G = G(I + W m m) L = GK = GK(I + W m m) = L + W ml m; First NP is achieved when: W es < 1 ω, W e < 1 + L, ω. Therefore RP is achieved if W e S < 1, S, ω W e < 1 + L, L, ω Since 1 + L 1 + L W ml m, a sufficient condition is actually: W e + W ml < 1 + L, ω W es + W mt < 1, ω O. Sename [GIPSA-lab] 20/28
21 O. Sename [GIPSA-lab] 21/28 The structured case Robustness analysis: the structured case = {diag{ 1,, q, δ 1 I r1,, δ ri rr, ɛ 1 I c1,, ɛ ci cc } C k k } (5) with i C k i k i, δ i R, ɛ i C, where i (s), i = 1,..., q, represent full block complex uncertainties, δ i (s), i = 1,..., r, real parametric uncertainties, and ɛ i (s), i = 1,..., c, complex parametric uncertainties. Taking into account the uncertainties leads to the following General Control Configuration, (s) ω v r P (s) z r e v K(s) y Figure: General control configuration with uncertainties where.
22 O. Sename [GIPSA-lab] 22/28 Robustness analysis: the structured case The structured singular value To handle parametric uncertainties, we need to introduce µ, the structured singular value, defined as: Definition (µ) For M C n n, the structure singular value is defined as: µ (M) := 1 min{σ( ) :, det(i M) 0} In other words, it allows to find the smallest structured which makes det(i M ) = 0. Theorem (The structured Small Gain Theorem) Let M(s) be a MIMO LTI stable system and (s) a LTI uncertain stable matrix, (i.e. RH ). The system in Fig. 3 is stable for all (s) in (5) if and only if: ω R µ (M(jω)) 1, with M(s) := N zv(s) More generally both following statements are equivalent For µ R, N(s) and (s) belong to RH, and ω R, µ (M(jω)) µ the system represented in figure 3 is stable for any uncertainty (s) of the form (5) such that :
23 O. Sename [GIPSA-lab] 23/28 Robustness analysis: the structured case Build the whole control scheme
24 O. Sename [GIPSA-lab] 24/28 Robustness analysis: the structured case Introduction of a fictive block Usually only real parametric uncertainties (given in r) are considered for RS analysis. RP analysis also needs a fictive full block complex uncertainty, as below, (s) f r ω v r N(s) z r e Figure: N [ N11 (s) N where N(s) = 12 (s) N 21 (s) N 22 (s) ], and the closed-loop transfer matrix is: T ew(s) = N 22 (s) + N 21 (s) (s)(i N 11 (s)) 1 N 12 (s) (6)
25 O. Sename [GIPSA-lab] 25/28 Robust analysis theorem Robustness analysis: the structured case For RS, we shall determine how large (in the sense of H ) can be without destabilizing the feedback system. From (6), the feedback system becomes unstable if det(i N 11 (s) = 0 for some s C, R(s) 0. The result is then the following. Theorem ([?]) Assume that the nominal system N ew and the perturbations are stable. Then the feedback system is stable for all allowed perturbations such that (s) < 1/β if and only if ω R, µ (N 11 (jω)) β. Assuming nominal stability, RS and RP analysis for structured uncertainties are therefore such that: NP σ(n 22 ) = µ f (N 22 ) 1, ω RS µ r (N 11 ) < 1, ω RP µ (N) < 1, ω, = [ ] f 0 0 r Finally, let us remark that the structured singular value cannot be explicitly determined, so that the method consists in calculating an upper bound and a lower bound, as closed as possible to µ.
26 O. Sename [GIPSA-lab] 26/28 Robustness analysis: the structured case Summary The steps to be followed in the RS/RP analysis for structured uncertainties are then: Definition of the real uncertainties r and of the weighting functions Evaluation of µ(n 22 ) f, µ(n 11 ) r and µ(n) Computation of the admissible intervals for each parameter Remark: The Robust Performance analysis is quite conservative and requires a tight definition of the weighting functions that do represent the performance objectives to be satisfied by the uncertain closed-loop system. Therefore it is necessary to distinguish the weighting functions used for the nominal design from the ones used for RP analysis.
27 O. Sename [GIPSA-lab] 27/28 Robust design Outline 1. Introduction 2. Representation of uncertainties 3. Definition of Robustness analysis 4. Robustness analysis: the unstructured case 5. Robustness analysis: the structured case 6. Robust control design
28 O. Sename [GIPSA-lab] 28/28 Robust design Brief overview In order to design a robust control, i.e. a controller for which the synthesis actually accounts for uncertainties, some of the methods are: Unstructured uncertainties: Consider an uncertainty weight (unstructured form), and include the Small Gain Condition through a new controlled output. For example, robustness face to Ouptut Multiplicative Uncertainties can be considered into the design procedure adding the controlled output e y = W O y, which, when tracking performance is expected, leads to the condition W O T y 1. Structured uncertainties: the design of a robust controller in the presence of such uncertainties is the µ synthesis. It is handled through an interactive procedure, referred to as the DK iteration. This procedure is much more involved than a "simple" H control design and often leads to an increase of the order of the controller (which is already the sum of the order of the plant and of the weighting functions). Use other mathematical representation of parametric uncertainties, [?], as for instance the polytopic model. In that case the set of uncertain parameters is assumed to be a polytope (i.e. a convex) set. The stability issue in that framework is referred to as the Quadratic stability i.e find a single Lyapunov function for the uncertainty set. While in the general case this is an unbounded problem, in the polytopic case (or in the affine case), the stability is to be analyzed only at the vertices of the polytope, which is a finite dimensional problem. This approach can then be applied to find a single controller, valid over the potyopic set. Note that this approach gives rise to the LPV design for polytopic systems, as described next.
Design Methods for Control Systems
Design Methods for Control Systems Okko H. Bosgra Delft University of Technology Delft, The Netherlands Huibert Kwakernaak Emeritus Professor University of Twente Enschede, The Netherlands Gjerrit Meinsma
More informationG(s) = Y (s)/u(s) In this representation, the output is always the Transfer function times the input. Y (s) = G(s)U(s).
Transfer Functions The transfer function of a linear system is the ratio of the Laplace Transform of the output to the Laplace Transform of the input, i.e., Y (s)/u(s). Denoting this ratio by G(s), i.e.,
More informationLecture 7: Finding Lyapunov Functions 1
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.243j (Fall 2003): DYNAMICS OF NONLINEAR SYSTEMS by A. Megretski Lecture 7: Finding Lyapunov Functions 1
More information19 LINEAR QUADRATIC REGULATOR
19 LINEAR QUADRATIC REGULATOR 19.1 Introduction The simple form of loopshaping in scalar systems does not extend directly to multivariable (MIMO) plants, which are characterized by transfer matrices instead
More informationChapter 9: Controller design
Chapter 9. Controller Design 9.1. Introduction 9.2. Effect of negative feedback on the network transfer functions 9.2.1. Feedback reduces the transfer function from disturbances to the output 9.2.2. Feedback
More informationController Design in Frequency Domain
ECSE 4440 Control System Engineering Fall 2001 Project 3 Controller Design in Frequency Domain TA 1. Abstract 2. Introduction 3. Controller design in Frequency domain 4. Experiment 5. Colclusion 1. Abstract
More informationLinear Programming in Matrix Form
Linear Programming in Matrix Form Appendix B We first introduce matrix concepts in linear programming by developing a variation of the simplex method called the revised simplex method. This algorithm,
More informationLoop Analysis. Chapter 7. 7.1 Introduction
Chapter 7 Loop Analysis Quotation Authors, citation. This chapter describes how stability and robustness can be determined by investigating how sinusoidal signals propagate around the feedback loop. The
More informationUnderstanding Poles and Zeros
MASSACHUSETTS INSTITUTE OF TECHNOLOGY DEPARTMENT OF MECHANICAL ENGINEERING 2.14 Analysis and Design of Feedback Control Systems Understanding Poles and Zeros 1 System Poles and Zeros The transfer function
More informationA linear algebraic method for pricing temporary life annuities
A linear algebraic method for pricing temporary life annuities P. Date (joint work with R. Mamon, L. Jalen and I.C. Wang) Department of Mathematical Sciences, Brunel University, London Outline Introduction
More informationNonlinear Iterative Partial Least Squares Method
Numerical Methods for Determining Principal Component Analysis Abstract Factors Béchu, S., Richard-Plouet, M., Fernandez, V., Walton, J., and Fairley, N. (2016) Developments in numerical treatments for
More informationLecture 13 Linear quadratic Lyapunov theory
EE363 Winter 28-9 Lecture 13 Linear quadratic Lyapunov theory the Lyapunov equation Lyapunov stability conditions the Lyapunov operator and integral evaluating quadratic integrals analysis of ARE discrete-time
More informationPeople have thought about, and defined, probability in different ways. important to note the consequences of the definition:
PROBABILITY AND LIKELIHOOD, A BRIEF INTRODUCTION IN SUPPORT OF A COURSE ON MOLECULAR EVOLUTION (BIOL 3046) Probability The subject of PROBABILITY is a branch of mathematics dedicated to building models
More informationMixedÀ¾ нOptimization Problem via Lagrange Multiplier Theory
MixedÀ¾ нOptimization Problem via Lagrange Multiplier Theory Jun WuÝ, Sheng ChenÞand Jian ChuÝ ÝNational Laboratory of Industrial Control Technology Institute of Advanced Process Control Zhejiang University,
More informationEE 402 RECITATION #13 REPORT
MIDDLE EAST TECHNICAL UNIVERSITY EE 402 RECITATION #13 REPORT LEAD-LAG COMPENSATOR DESIGN F. Kağan İPEK Utku KIRAN Ç. Berkan Şahin 5/16/2013 Contents INTRODUCTION... 3 MODELLING... 3 OBTAINING PTF of OPEN
More informationDecember 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B. KITCHENS
December 4, 2013 MATH 171 BASIC LINEAR ALGEBRA B KITCHENS The equation 1 Lines in two-dimensional space (1) 2x y = 3 describes a line in two-dimensional space The coefficients of x and y in the equation
More informationLinear Programming. March 14, 2014
Linear Programming March 1, 01 Parts of this introduction to linear programming were adapted from Chapter 9 of Introduction to Algorithms, Second Edition, by Cormen, Leiserson, Rivest and Stein [1]. 1
More informationExample 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum. asin. k, a, and b. We study stability of the origin x
Lecture 4. LaSalle s Invariance Principle We begin with a motivating eample. Eample 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum Dynamics of a pendulum with friction can be written
More informationLecture 5: Singular Value Decomposition SVD (1)
EEM3L1: Numerical and Analytical Techniques Lecture 5: Singular Value Decomposition SVD (1) EE3L1, slide 1, Version 4: 25-Sep-02 Motivation for SVD (1) SVD = Singular Value Decomposition Consider the system
More informationIntroduction to General and Generalized Linear Models
Introduction to General and Generalized Linear Models General Linear Models - part I Henrik Madsen Poul Thyregod Informatics and Mathematical Modelling Technical University of Denmark DK-2800 Kgs. Lyngby
More informationLinköping University Electronic Press
Linköping University Electronic Press Report Well-posed boundary conditions for the shallow water equations Sarmad Ghader and Jan Nordström Series: LiTH-MAT-R, 0348-960, No. 4 Available at: Linköping University
More information(Quasi-)Newton methods
(Quasi-)Newton methods 1 Introduction 1.1 Newton method Newton method is a method to find the zeros of a differentiable non-linear function g, x such that g(x) = 0, where g : R n R n. Given a starting
More information7 Gaussian Elimination and LU Factorization
7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method
More informationControl System Definition
Control System Definition A control system consist of subsytems and processes (or plants) assembled for the purpose of controlling the outputs of the process. For example, a furnace produces heat as a
More informationNetwork Traffic Modelling
University of York Dissertation submitted for the MSc in Mathematics with Modern Applications, Department of Mathematics, University of York, UK. August 009 Network Traffic Modelling Author: David Slade
More informationLinear Programming. Widget Factory Example. Linear Programming: Standard Form. Widget Factory Example: Continued.
Linear Programming Widget Factory Example Learning Goals. Introduce Linear Programming Problems. Widget Example, Graphical Solution. Basic Theory:, Vertices, Existence of Solutions. Equivalent formulations.
More informationInner Product Spaces
Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and
More informationPositive Feedback and Oscillators
Physics 3330 Experiment #6 Fall 1999 Positive Feedback and Oscillators Purpose In this experiment we will study how spontaneous oscillations may be caused by positive feedback. You will construct an active
More information8.2. Solution by Inverse Matrix Method. Introduction. Prerequisites. Learning Outcomes
Solution by Inverse Matrix Method 8.2 Introduction The power of matrix algebra is seen in the representation of a system of simultaneous linear equations as a matrix equation. Matrix algebra allows us
More informationPYTHAGOREAN TRIPLES KEITH CONRAD
PYTHAGOREAN TRIPLES KEITH CONRAD 1. Introduction A Pythagorean triple is a triple of positive integers (a, b, c) where a + b = c. Examples include (3, 4, 5), (5, 1, 13), and (8, 15, 17). Below is an ancient
More informationTemperature Control Loop Analyzer (TeCLA) Software
Temperature Control Loop Analyzer (TeCLA) Software F. Burzagli - S. De Palo - G. Santangelo (Alenia Spazio) Fburzagl@to.alespazio.it Foreword A typical feature of an active loop thermal system is to guarantee
More informationContinued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
More informationContent. Professur für Steuerung, Regelung und Systemdynamik. Lecture: Vehicle Dynamics Tutor: T. Wey Date: 01.01.08, 20:11:52
1 Content Overview 1. Basics on Signal Analysis 2. System Theory 3. Vehicle Dynamics Modeling 4. Active Chassis Control Systems 5. Signals & Systems 6. Statistical System Analysis 7. Filtering 8. Modeling,
More informationΣ _. Feedback Amplifiers: One and Two Pole cases. Negative Feedback:
Feedback Amplifiers: One and Two Pole cases Negative Feedback: Σ _ a f There must be 180 o phase shift somewhere in the loop. This is often provided by an inverting amplifier or by use of a differential
More informationMATLAB Control System Toolbox Root Locus Design GUI
MATLAB Control System Toolbox Root Locus Design GUI MATLAB Control System Toolbox contains two Root Locus design GUI, sisotool and rltool. These are two interactive design tools for the analysis and design
More informationTHE PROBLEM OF finding localized energy solutions
600 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 45, NO. 3, MARCH 1997 Sparse Signal Reconstruction from Limited Data Using FOCUSS: A Re-weighted Minimum Norm Algorithm Irina F. Gorodnitsky, Member, IEEE,
More informationAlgebra 2 Chapter 1 Vocabulary. identity - A statement that equates two equivalent expressions.
Chapter 1 Vocabulary identity - A statement that equates two equivalent expressions. verbal model- A word equation that represents a real-life problem. algebraic expression - An expression with variables.
More informationStochastic Inventory Control
Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the
More informationLinear-Quadratic Optimal Controller 10.3 Optimal Linear Control Systems
Linear-Quadratic Optimal Controller 10.3 Optimal Linear Control Systems In Chapters 8 and 9 of this book we have designed dynamic controllers such that the closed-loop systems display the desired transient
More informationOPRE 6201 : 2. Simplex Method
OPRE 6201 : 2. Simplex Method 1 The Graphical Method: An Example Consider the following linear program: Max 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2
More informationECE 3510 Final given: Spring 11
ECE 50 Final given: Spring This part of the exam is Closed book, Closed notes, No Calculator.. ( pts) For each of the time-domain signals shown, draw the poles of the signal's Laplace transform on the
More informationThe Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method
The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method Robert M. Freund February, 004 004 Massachusetts Institute of Technology. 1 1 The Algorithm The problem
More informationEpipolar Geometry. Readings: See Sections 10.1 and 15.6 of Forsyth and Ponce. Right Image. Left Image. e(p ) Epipolar Lines. e(q ) q R.
Epipolar Geometry We consider two perspective images of a scene as taken from a stereo pair of cameras (or equivalently, assume the scene is rigid and imaged with a single camera from two different locations).
More informationc 2006 Society for Industrial and Applied Mathematics
SIAM J. CONTROL OPTIM. Vol. 45, No. 1, pp. 273 297 c 2006 Society for Industrial and Applied Mathematics EXPONENTIAL STABILIZATION OF WELL-POSED SYSTEMS BY COLOCATED FEEDBACK RUTH F. CURTAIN AND GEORGE
More information(Refer Slide Time: 01:11-01:27)
Digital Signal Processing Prof. S. C. Dutta Roy Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 6 Digital systems (contd.); inverse systems, stability, FIR and IIR,
More informationMathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
More informationLecture 2: Homogeneous Coordinates, Lines and Conics
Lecture 2: Homogeneous Coordinates, Lines and Conics 1 Homogeneous Coordinates In Lecture 1 we derived the camera equations λx = P X, (1) where x = (x 1, x 2, 1), X = (X 1, X 2, X 3, 1) and P is a 3 4
More informationLinear Programming Notes V Problem Transformations
Linear Programming Notes V Problem Transformations 1 Introduction Any linear programming problem can be rewritten in either of two standard forms. In the first form, the objective is to maximize, the material
More informationCyber-Security Analysis of State Estimators in Power Systems
Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute
More informationA Direct Numerical Method for Observability Analysis
IEEE TRANSACTIONS ON POWER SYSTEMS, VOL 15, NO 2, MAY 2000 625 A Direct Numerical Method for Observability Analysis Bei Gou and Ali Abur, Senior Member, IEEE Abstract This paper presents an algebraic method
More informationAn interval linear programming contractor
An interval linear programming contractor Introduction Milan Hladík Abstract. We consider linear programming with interval data. One of the most challenging problems in this topic is to determine or tight
More information4.1 Learning algorithms for neural networks
4 Perceptron Learning 4.1 Learning algorithms for neural networks In the two preceding chapters we discussed two closely related models, McCulloch Pitts units and perceptrons, but the question of how to
More informationCHAPTER 1 Splines and B-splines an Introduction
CHAPTER 1 Splines and B-splines an Introduction In this first chapter, we consider the following fundamental problem: Given a set of points in the plane, determine a smooth curve that approximates the
More information3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology Handout 6 18.433: Combinatorial Optimization February 20th, 2009 Michel X. Goemans 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the
More informationGoodness of fit assessment of item response theory models
Goodness of fit assessment of item response theory models Alberto Maydeu Olivares University of Barcelona Madrid November 1, 014 Outline Introduction Overall goodness of fit testing Two examples Assessing
More informationLOOP TRANSFER RECOVERY FOR SAMPLED-DATA SYSTEMS 1
LOOP TRANSFER RECOVERY FOR SAMPLED-DATA SYSTEMS 1 Henrik Niemann Jakob Stoustrup Mike Lind Rank Bahram Shafai Dept. of Automation, Technical University of Denmark, Building 326, DK-2800 Lyngby, Denmark
More informationOptimal proportional reinsurance and dividend pay-out for insurance companies with switching reserves
Optimal proportional reinsurance and dividend pay-out for insurance companies with switching reserves Abstract: This paper presents a model for an insurance company that controls its risk and dividend
More informationFrequency Response of Filters
School of Engineering Department of Electrical and Computer Engineering 332:224 Principles of Electrical Engineering II Laboratory Experiment 2 Frequency Response of Filters 1 Introduction Objectives To
More informationClassification of Cartan matrices
Chapter 7 Classification of Cartan matrices In this chapter we describe a classification of generalised Cartan matrices This classification can be compared as the rough classification of varieties in terms
More informationReliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
More informationLecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
More informationα = u v. In other words, Orthogonal Projection
Orthogonal Projection Given any nonzero vector v, it is possible to decompose an arbitrary vector u into a component that points in the direction of v and one that points in a direction orthogonal to v
More informationInteger Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions
Grade 7 Mathematics, Quarter 1, Unit 1.1 Integer Operations Overview Number of Instructional Days: 15 (1 day = 45 minutes) Content to Be Learned Describe situations in which opposites combine to make zero.
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationA Robust Optimization Approach to Supply Chain Management
A Robust Optimization Approach to Supply Chain Management Dimitris Bertsimas and Aurélie Thiele Massachusetts Institute of Technology, Cambridge MA 0139, dbertsim@mit.edu, aurelie@mit.edu Abstract. We
More informationSensitivity Analysis 3.1 AN EXAMPLE FOR ANALYSIS
Sensitivity Analysis 3 We have already been introduced to sensitivity analysis in Chapter via the geometry of a simple example. We saw that the values of the decision variables and those of the slack and
More informationElasticity Theory Basics
G22.3033-002: Topics in Computer Graphics: Lecture #7 Geometric Modeling New York University Elasticity Theory Basics Lecture #7: 20 October 2003 Lecturer: Denis Zorin Scribe: Adrian Secord, Yotam Gingold
More informationCHAPTER 8 FACTOR EXTRACTION BY MATRIX FACTORING TECHNIQUES. From Exploratory Factor Analysis Ledyard R Tucker and Robert C.
CHAPTER 8 FACTOR EXTRACTION BY MATRIX FACTORING TECHNIQUES From Exploratory Factor Analysis Ledyard R Tucker and Robert C MacCallum 1997 180 CHAPTER 8 FACTOR EXTRACTION BY MATRIX FACTORING TECHNIQUES In
More informationFeedback Autonomic Provisioning for guaranteeing performance (and reliability. - application to Big Data Systems
Feedback Autonomic Provisioning for guaranteeing performance (and reliability) - application to Big Data Systems Bogdan Robu bogdan.robu@gipsa-lab.fr HIPEAC - HPES Workshop Amsterdam 19-21.01.2015 Context
More information2.161 Signal Processing: Continuous and Discrete Fall 2008
MT OpenCourseWare http://ocw.mit.edu.6 Signal Processing: Continuous and Discrete Fall 00 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. MASSACHUSETTS
More information1 Review of Least Squares Solutions to Overdetermined Systems
cs4: introduction to numerical analysis /9/0 Lecture 7: Rectangular Systems and Numerical Integration Instructor: Professor Amos Ron Scribes: Mark Cowlishaw, Nathanael Fillmore Review of Least Squares
More informationThe Image Deblurring Problem
page 1 Chapter 1 The Image Deblurring Problem You cannot depend on your eyes when your imagination is out of focus. Mark Twain When we use a camera, we want the recorded image to be a faithful representation
More informationLyapunov Stability Analysis of Energy Constraint for Intelligent Home Energy Management System
JAIST Reposi https://dspace.j Title Lyapunov stability analysis for intelligent home energy of energ manageme Author(s)Umer, Saher; Tan, Yasuo; Lim, Azman Citation IEICE Technical Report on Ubiquitous
More informationBlack-box Performance Models for Virtualized Web. Danilo Ardagna, Mara Tanelli, Marco Lovera, Li Zhang ardagna@elet.polimi.it
Black-box Performance Models for Virtualized Web Service Applications Danilo Ardagna, Mara Tanelli, Marco Lovera, Li Zhang ardagna@elet.polimi.it Reference scenario 2 Virtualization, proposed in early
More informationFeedback Control Theory
Feedback Control Theory John Doyle, Bruce Francis, Allen Tannenbaum c Macmillan Publishing Co., 1990 Contents Preface iii 1 Introduction 1 1.1 Issues in Control System Design.............................
More informationRobust output feedbackstabilization via risk-sensitive control
Automatica 38 22) 945 955 www.elsevier.com/locate/automatica Robust output feedbackstabilization via risk-sensitive control Valery A. Ugrinovskii, Ian R. Petersen School of Electrical Engineering, Australian
More informationFUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
More informationSolving Linear Systems, Continued and The Inverse of a Matrix
, Continued and The of a Matrix Calculus III Summer 2013, Session II Monday, July 15, 2013 Agenda 1. The rank of a matrix 2. The inverse of a square matrix Gaussian Gaussian solves a linear system by reducing
More information8 Square matrices continued: Determinants
8 Square matrices continued: Determinants 8. Introduction Determinants give us important information about square matrices, and, as we ll soon see, are essential for the computation of eigenvalues. You
More informationReal-Time Systems Versus Cyber-Physical Systems: Where is the Difference?
Real-Time Systems Versus Cyber-Physical Systems: Where is the Difference? Samarjit Chakraborty www.rcs.ei.tum.de TU Munich, Germany Joint work with Dip Goswami*, Reinhard Schneider #, Alejandro Masrur
More informationChapter 1. Vector autoregressions. 1.1 VARs and the identi cation problem
Chapter Vector autoregressions We begin by taking a look at the data of macroeconomics. A way to summarize the dynamics of macroeconomic data is to make use of vector autoregressions. VAR models have become
More informationLab 7: Operational Amplifiers Part I
Lab 7: Operational Amplifiers Part I Objectives The objective of this lab is to study operational amplifier (op amp) and its applications. We will be simulating and building some basic op amp circuits,
More informationChapter 7. Lyapunov Exponents. 7.1 Maps
Chapter 7 Lyapunov Exponents Lyapunov exponents tell us the rate of divergence of nearby trajectories a key component of chaotic dynamics. For one dimensional maps the exponent is simply the average
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationVector Spaces; the Space R n
Vector Spaces; the Space R n Vector Spaces A vector space (over the real numbers) is a set V of mathematical entities, called vectors, U, V, W, etc, in which an addition operation + is defined and in which
More informationThis article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
More informationSchool of Engineering Department of Electrical and Computer Engineering
1 School of Engineering Department of Electrical and Computer Engineering 332:223 Principles of Electrical Engineering I Laboratory Experiment #4 Title: Operational Amplifiers 1 Introduction Objectives
More informationAn Introduction to Applied Mathematics: An Iterative Process
An Introduction to Applied Mathematics: An Iterative Process Applied mathematics seeks to make predictions about some topic such as weather prediction, future value of an investment, the speed of a falling
More informationSistemas com saturação no controle - VII. VII. Discussões e extensões
1 Sistemas com saturação no controle VII. Discussões e extensões Sophie Tarbouriech LAAS - CNRS, Toulouse, France Colaboradores principais : J.-M. Gomes da Silva Jr (UFRGS), G. Garcia (LAAS-CNRS), I. Queinnec
More informationQuestion 2: How do you solve a matrix equation using the matrix inverse?
Question : How do you solve a matrix equation using the matrix inverse? In the previous question, we wrote systems of equations as a matrix equation AX B. In this format, the matrix A contains the coefficients
More informationChapter 11 Current Programmed Control
Chapter 11 Current Programmed Control Buck converter v g i s Q 1 D 1 L i L C v R The peak transistor current replaces the duty cycle as the converter control input. Measure switch current R f i s Clock
More informationComputational Optical Imaging - Optique Numerique. -- Deconvolution --
Computational Optical Imaging - Optique Numerique -- Deconvolution -- Winter 2014 Ivo Ihrke Deconvolution Ivo Ihrke Outline Deconvolution Theory example 1D deconvolution Fourier method Algebraic method
More informationFrancesco Sorrentino Department of Mechanical Engineering
Master stability function approaches to analyze stability of the synchronous evolution for hypernetworks and of synchronized clusters for networks with symmetries Francesco Sorrentino Department of Mechanical
More informationHow To Understand And Solve A Linear Programming Problem
At the end of the lesson, you should be able to: Chapter 2: Systems of Linear Equations and Matrices: 2.1: Solutions of Linear Systems by the Echelon Method Define linear systems, unique solution, inconsistent,
More information2.1 The Present Value of an Annuity
2.1 The Present Value of an Annuity One example of a fixed annuity is an agreement to pay someone a fixed amount x for N periods (commonly months or years), e.g. a fixed pension It is assumed that the
More informationTransistor amplifiers: Biasing and Small Signal Model
Transistor amplifiers: iasing and Small Signal Model Transistor amplifiers utilizing JT or FT are similar in design and analysis. Accordingly we will discuss JT amplifiers thoroughly. Then, similar FT
More informationLinear Algebraic Equations, SVD, and the Pseudo-Inverse
Linear Algebraic Equations, SVD, and the Pseudo-Inverse Philip N. Sabes October, 21 1 A Little Background 1.1 Singular values and matrix inversion For non-smmetric matrices, the eigenvalues and singular
More informationLean Six Sigma Analyze Phase Introduction. TECH 50800 QUALITY and PRODUCTIVITY in INDUSTRY and TECHNOLOGY
TECH 50800 QUALITY and PRODUCTIVITY in INDUSTRY and TECHNOLOGY Before we begin: Turn on the sound on your computer. There is audio to accompany this presentation. Audio will accompany most of the online
More informationNumerical methods for American options
Lecture 9 Numerical methods for American options Lecture Notes by Andrzej Palczewski Computational Finance p. 1 American options The holder of an American option has the right to exercise it at any moment
More informationUsing the Theory of Reals in. Analyzing Continuous and Hybrid Systems
Using the Theory of Reals in Analyzing Continuous and Hybrid Systems Ashish Tiwari Computer Science Laboratory (CSL) SRI International (SRI) Menlo Park, CA 94025 Email: ashish.tiwari@sri.com Ashish Tiwari
More information