ترغب بنشر مسار تعليمي؟ اضغط هنا

On Input Design for Regularized LTI System Identification: Power-constrained Input

109   0   0.0 ( 0 )
 نشر من قبل Biqiang Mu
 تاريخ النشر 2017
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

Input design is an important issue for classical system identification methods but has not been investigated for the kernel-based regularization method (KRM) until very recently. In this paper, we consider in the time domain the input design problem of KRMs for LTI system identification. Different from the recent result, we adopt a Bayesian perspective and in particular make use of scalar measures (e.g., the $A$-optimality, $D$-optimality, and $E$-optimality) of the Bayesian mean square error matrix as the design criteria subject to power-constraint on the input. Instead to solve the optimization problem directly, we propose a two-step procedure. In the first step, by making suitable assumptions on the unknown input, we construct a quadratic map (transformation) of the input such that the transformed input design problems are convex, the number of optimization variables is independent of the number of input data, and their global minima can be found efficiently by applying well-developed convex optimization software packages. In the second step, we derive the expression of the optimal input based on the global minima found in the first step by solving the inverse image of the quadratic map. In addition, we derive analytic results for some special types of fixed kernels, which provide insights on the input design and also its dependence on the kernel structure.


قيم البحث

اقرأ أيضاً

We address the problem of state estimation, attack isolation, and control for discrete-time Linear Time Invariant (LTI) systems under (potentially unbounded) actuator false data injection attacks. Using a bank of Unknown Input Observers (UIOs), each observer leading to an exponentially stable estimation error in the attack-free case, we propose an estimator that provides exponential estimates of the system state and the attack signals when a sufficiently small number of actuators are attacked. We use these estimates to control the system and isolate actuator attacks. Simulations results are presented to illustrate the performance of the results.
This paper considers the identification of FIR systems, where information about the inputs and outputs of the system undergoes quantization into binary values before transmission to the estimator. In the case where the thresholds of the input and out put quantizers can be adapted, but the quantizers have no computation and storage capabilities, we propose identification schemes which are strongly consistent for Gaussian distributed inputs and noises. This is based on exploiting the correlations between the quantized input and output observations to derive nonlinear equations that the true system parameters must satisfy, and then estimating the parameters by solving these equations using stochastic approximation techniques. If, in addition, the input and output quantizers have computational and storage capabilities, strongly consistent identification schemes are proposed which can handle arbitrary input and noise distributions. In this case, some conditional expectation terms are computed at the quantizers, which can then be estimated based on binary data transmitted by the quantizers, subsequently allowing the parameters to be identified by solving a set of linear equations. The algorithms and their properties are illustrated in simulation examples.
In continuous-time system identification, the intersample behavior of the input signal is known to play a crucial role in the performance of estimation methods. One common input behavior assumption is that the spectrum of the input is band-limited. T he sinc interpolation property of these input signals yields equivalent discrete-time representations that are non-causal. This observation, often overlooked in the literature, is exploited in this work to study non-parametric frequency response estimators of linear continuous-time systems. We study the properties of non-causal least-square estimators for continuous-time system identification, and propose a kernel-based non-causal regularized least-squares approach for estimating the band-limited equivalent impulse response. The proposed methods are tested via extensive numerical simulations.
Consider the $n$-th integrator $dot x=J_nx+sigma(u)e_n$, where $xinmathbb{R}^n$, $uin mathbb{R}$, $J_n$ is the $n$-th Jordan block and $e_n=(0 cdots 0 1)^Tinmathbb{R}^n$. We provide easily implementable state feedback laws $u=k(x)$ which not only ren der the closed-loop system globally asymptotically stable but also are finite-gain $L_p$-stabilizing with arbitrarily small gain. These $L_p$-stabilizing state feedbacks are built from homogeneous feedbacks appearing in finite-time stabilization of linear systems. We also provide additional $L_infty$-stabilization results for the case of both internal and external disturbances of the $n$-th integrator, namely for the perturbed system $dot x=J_nx+e_nsigma (k(x)+d)+D$ where $dinmathbb{R}$ and $Dinmathbb{R}^n$.
The ability to control a complex network towards a desired behavior relies on our understanding of the complex nature of these social and technological networks. The existence of numerous control schemes in a network promotes us to wonder: what is th e underlying relationship of all possible input nodes? Here we introduce input graph, a simple geometry that reveals the complex relationship between all control schemes and input nodes. We prove that the node adjacent to an input node in the input graph will appear in another control scheme, and the connected nodes in input graph have the same type in control, which they are either all possible input nodes or not. Furthermore, we find that the giant components emerge in the input graphs of many real networks, which provides a clear topological explanation of bifurcation phenomenon emerging in dense networks and promotes us to design an efficient method to alter the node type in control. The findings provide an insight into control principles of complex networks and offer a general mechanism to design a suitable control scheme for different purposes.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا