• No results found

One concept that has been dened in that context is robustly convergent identication al- gorithms(tuned or untuned), see (Helmicki et al., 1991)

N/A
N/A
Protected

Academic year: 2021

Share "One concept that has been dened in that context is robustly convergent identication al- gorithms(tuned or untuned), see (Helmicki et al., 1991)"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

(1)

Identiability Implies Robust Identiability

Lennart Ljung, Torkel Glad and Torbjorn Andersson

email: ljung@isy.liu.se torkel@isy.liu.se toand@isy.liu.se

Department of Electrical Engineering Linkoping University

S-581 83 Linkoping, Sweden Keywords: identication, bounded disturbances, ro-

bustly convergent, global identiability, robust global identiability.

1 Identication and robustly convergent algorithms

There has been a recent interest in identication from a deterministic perspective, likeH1- techniques (Helmicki et al., 1991), (Helmicki et al., 1992), (Gu and Khar- gonekar, 1992), L1 - techniques (M akil a, 1991), (Chen et al., 1992) etc. One concept that has been dened in that context is robustly convergent identication al- gorithms(tuned or untuned), see (Helmicki et al., 1991).

The concept aims at capturing the following property:

Suppose a true system G0 2 G generates exact input- output data

Z0N=fy0(t) u(t) t= 1::: Ng (1) Here G is a set of systems. Suppose also that the data are subjected to errorsv(t):

y(t) =y0(t) +v(t) (2) ZN=fy(t) u(t) t= 1::: Ng (3) LetAbe an identication algorithm, i.e a mapping from ZN to a space of models:

G^N=A(ZN) (4) This algorithm is then said to be robustly convergent (Helmicki et al., 1991) if

lim!0Nlim

!1

jjG^N;G0jj= 0 (5)

jv(t)j 8t (6) for allG02G. The algorithm is \untuned" if it does not use knowledge of eitherG or.

In (5)jjjjdenotes a suitable norm, for linear systems, it is typically chosen as theH1 - norm (sup!jG^t(ei!); G0(ei!)j).

Now traditional identication theory has paid substan- tial attraction to (5). In, e.g. (Ljung and Yuan, 1985)

(Thm 3.3), (5) is established to hold (with probability 1) without the limit , provided (6) is replaced by an assumption thatfv(t)gis a stochastic process with a co- variance function that decays suciently fast. In (Ljung and Yuan, 1985) a least squares algorithm based on a FIR model is used, and similar results are obtained for ARX - models in (Ljung and Wahlberg, 1992).

Khargonekar and Akcay have established (6) and (5) for ARX - models, see (Akcay, 1992). We shall in the next section show how this can be proved within a \classical identication framework".

Another and major part of this contribution is however that the linear regression (ARX or FIR case) also sets the pattern for a very general \robust identiability" problem in the spirit of (6) and (5). We could formulate this as follows: Let M be a certain model structure, i.e. a smoothly parametrized set of models

M=fM()j2DMg (7) Let a system  = M(0) generate exact data Z0N and let it be disturbance corrupted as in (1), (2) and (3).

We would then say that Mis globally identiable at 0 if there exists an inputu(t), such that the value 0 can uniquely (globally) be recovered from the identication in Z0N. We could say that it is robustly globally identiable if there exists an identication algorithmJ and aN such

that ^N =J(ZN) (8)

and lim

!0

j^N;0j= 0 (9) More precise denitions will be given in section 3.

A conceptually interesting result is that

Global identiability ) Robust global identiability In section 4 it is described how (10) can be established.(10)

2 The least squares algorithm is globally convergent

It is here proved for both the continuous- and discrete case simultaneously that the least squares algorithm is

(2)

robustly convergent for ARX-models. Let the letter  denote either the dierential operatorp= ddt or the shift operatorq (qy(t) =y(t+ 1)). Consider the ARX-model

A()y(t) =B()u(t) (11) where

A() =n+a1n;1++an

B() =b1n;1++bn (12) Let

'(t) = ;n;1y(t) ;n;2y(t)::: ;y(t)

n;1u(t)::: u(t)]T

= a1 a2::: an b1::: bn]T: The model (11) can then be written

ny(t) =T'(t) (13) The least squares solution to (11)-(13) can be written

^N=

"

N1

N

X

k=1'(k)'T(k)

#

;1

| {z }

R;1N

N1

N

X

k=1'(k)ny(k) provided the inverseR;1N exists. The conditions onfu(t)g such that RN is uniformly positive denite are called persistence of excitation (p.e.)(Astr om and Wittenmark, 1989), (Ljung, 1987).

Let u~(t) = 1A()u(t) (14) so that

y(t) =B()~u(t) We then have

'(t) =

2

6

6

6

6

6

6

6

6

6

6

6

6

4

0 ;b1 ;b2   ;bn 0  0 0 0 ;b1   ;bn;1 ;bn  0 ... ... ...

0 0 ;b1 ;b2  ;bn

1 a1 a2   an 0  0 0 1 a1   an;1 an  0

0 0... 1 a1  an

3

7

7

7

7

7

7

7

7

7

7

7

7

5

| {z }

A



2

6

6

6

6

6

6

6

6

6

6

6

6

4

2n;1u~(t)

2n;2u~(t) ......

......

u~(t)

3

7

7

7

7

7

7

7

7

7

7

7

7

5

Let '~(t) = 2n;1u~(t)::: u~(t)]T so '(t) =A'~(t)

The Sylvester matrix A is non-singular if A() and B() have no common factors. Hence

RN1I if R~N = 1N

N

X

t;1'~(t)~'T(t)2I (15) The condition (15) is known as ~u(t) is p.e. of order 2n (sometimes the denition is applied to the limit asN !

1, but we should here let it hold uniformly inN N0 - which is the same for large enoughN0). In view of (14) u~(t) is p.e. of order 2nif u(t) is, provided A() has no zeros on the unit circle (no zeros on the imaginary axis).

There are many ways to generate sequencesfu(t)gthat are p.e. as required (Astr om and Wittenmark, 1989), (Ljung, 1987). Now suppose that we have a disturbance

A()y(t) =B()u(t) +v(t)

wherejv(t)j<  0 <1. in the discrete case and in additionjv(j)(t)j< cj 0cj<1for the continuous case. Let

y(t) =yu(t) +yv(t) where

A()yu(t) =B()u(t) A()yv(t) =v(t)

IfA() has no roots on the unit circle (no roots on the imaginary axis) we have

jyv(t)j3maxjv(t)j3 (16) Let '(t) ='u(t) +'v(t)

where

'u(t) = ;n;1yu(t);yu(t)n;1u(t)u(t)]T 'v(t) = ;n;1yv(t);yv(t)00]T

Then RN =RuN +RvN

with obvious notation, and for (15) and (16) we have that RN1I

for small enough. Now, with

~N= ^N;0 we have

~N=R;1N N1

N

X

t=1'(t)v(t)

(3)

and

jj~Njj 1

1maxfj'(t)jgC

We conclude that the least squares algorithm is ro- bustly convergent for ARX-models providedA() has no roots on the unit circle (no roots on the imaginary axis), A() andB() have no common roots andu(t) is p.e. of order 2n. If there are less parameters thanninB() the p.e. condition on u(t) can be weakened. Suppose that B(q) =b1qn;1+:::+bmqn;m(B(p) =b1pm+:::+bm) then it can be shown, analogously, thatu(t) has to be p.e.

of ordern+m. The continuous case and the discrete case have to be treated separately here.

3 Problem statement

In section 1 some denitions for discrete time systems have been stated. The denitions will now be carried over to the continuous time case. Let M be a model struc- ture (continuous or discrete time) which is a smoothly parametrized set of models

M=fM()j2DMg (17) Let a system  = M(0) generate exact input-output data

Z0=fy0(t) u(t) t= 1 ::: N or t2ab]g (18) where t = 1::: N for the discrete time case and t 2

ab] for the continuous time case. Let the disturbance corrupted data be written

Z=fyv(t) u(t) t= 1 ::: N or t2ab]g (19) Hereyv(t) depends on the disturbancev(t) withjv(t)j

 8 t 0   < 1 in the discrete case and in the continuous casev(t) also has to be band limitedjv(i)(t)j<

ci 0ci <1.

Denition 3.1 A model structureMis said to be glob- ally identiable atwith respect toDMif there exists an input signalusuch that the output signal !y( u)6= and

y!( u) y!( u) 2DM)= (20)

2

Denition 3.2 A model structureMis robustly glob- ally identiable if there exists an identication algorithm

J and aZ such that

^=J(Z) (21)

and lim

!0

j^;0j= 0 (22)

2

The model structure considered here are all those sys- tems that can be described in the following form

x_ =f(xu)

y=h(xu) (23)

with the statesx2Rn, outputy2Rm, inputu2Rkand parameters2Rd. The functions f andhare assumed to be polynomial in the variablesxuand .

The disturbed system is considered to be z_=fv(zuv)

yv=hv(zuv) (24) with z 2 Rn yv 2 Rm u 2 Rk and  2Rd. The dis- turbancev2Rl is bounded above and band limited, i.e.

jvi(j)j < cj 0cj <1 j = 01:::n+d+ 1 i = 1:::l. It is assumed that the signalsuv 2Cn+d+1ab], whereCnab] denotes the space ofntimes continuously dierentiable functions with t 2 ab]. The functions fv and hv are polynomials in the variables z u v  such that fv(zu0) = f(zu) and hv(zu0) = h(zu).

Given initial statesx(a) of the system (23) there exists a solution to (23) in some intervalt2ab] (Birkho and Rota, 1969), (Arnold, 1987).

Theorem 3.1 If a solution exists to the system (23) with t2ab] then the solution for the system (24) also exists witht2ab] if is suciently small

Proof. The proof is done by using similar methods as for continuation of solutions in (Birkho and Rota, 1969)

2The parameter spaceDM for this model structure is here assumed to be equal to Rd. However it may be a smaller set if the physics is taken into account. Finally, a dierential polynomialF(uu:::y_ y:::_ ) will here be denotedF(uyp) wherep= ddt.

4 Global identiability implies robust global identiability

It is shown in (Glad and Ljung, 1990a), (Glad and Ljung, 1990b) that a system (23) is globally identiable if and only if there can be found dierential equations in the form #i(uyp) +i$i(uyp) = 0 (25) where i = 1::: d by dierentiating, adding, scaling and multiplying the equations in (23). An algorithm for

nding these polynomials is given in (Glad and Ljung, 1990a), (Glad and Ljung, 1990b). It can be shown by using the result in (Glad, 1988) that there are no higher derivatives thann+din the polynomials #i(uyp) and

(4)

$i(uyp). Replacingy withyv of the disturbed system (24) yields

#i(uyvp)+i$i(uyvp)+%i(uyvvzp) = 0 (26) where %i(uyvvzp) is a polynomial in the parameter

 and the variables uyv v and their derivatives. The expression for %i() is given in the proof of theorem 4.1 below.

The identication algorithm can now be dened.

Denition 4.1 Let the identication algorithmJ be

^i =;

Rb

a#i(uyvp)$i(uyvp)dt

Rb

a$2i(uyvp)dt (27)

2

Here it is assumed that Rab$2idt 6= 0, i.e., the signal u is p.e. (Glad and Ljung, 1990a), (Glad and Ljung, 1990b). Using equation (25) in (27) gives that ^ = in the undisturbed case (23).

Theorem 4.1 Assume the model (23) to be globally identiable, as in (Glad and Ljung, 1990a), (Glad and Ljung, 1990b). Let the initial conditionx(a) and the con- troluonab] be chosen such that (23) has a solution on

ab] and that the excitation conditions giving global iden- tiability, (25), (see (Glad and Ljung, 1990a), (Glad and Ljung, 1990b)) are satised. Then (22) is satised, i.e.

the model is robustly globally identiable.

Lemma 4.1

#i(uyvp) +i$i(uyvp) + %i(uyvvzp) = 0 where%i() satises

j%i(uyvvzp)jC for suciently small

Proof: Since the right hand sides of equation (23) and (24) are polynomials in the variables ux respectively uvzanduv2Cn+d+1the solutionsx(t) andz(t) are n+dtimes continuously dierentiable functions (Arnold, 1987). It also follows that z(t) and its n+d deriva- tives converges uniformly to x(t) and the corresponding derivatives (Birkho and Rota, 1969). The output sig- nals yv y and their derivatives up to order n+d can now be obtained from (23) and (24). Furthermorey(vj)(t) converges uniformly to y(j)(t) j = 0:::n+d. This follows from the fact that fvhv are polynomial in the variableszuv and converges tofh, jvi(j)j< cj and uv2 Cn+d+1. Polynomials in yv(t) and its derivatives will also converge uniformly to the corresponding poly- nomials iny(t) and its derivatives.

Introduce the notion

2

6

6

6

6

6

6

6

6

4

A1(uxp) ...An(uxp) An+1(uyx) ...An+m(uyx)

3

7

7

7

7

7

7

7

7

5

=

2

6

6

6

6

6

6

6

6

4

x_1;f1(xu) ..._

xn;fn(xu) y1;h1(xu) ...ym;hm(xu)

3

7

7

7

7

7

7

7

7

5

: (28)

for the system (23). The polynomials (25) can then be expressed as

#i(uyp) +i$i(uyp) =

X

ij Qij(uyxp)A(ij)(uyx) (29) where the sum is nite andQij are some polynomials in the parameterand the variablesuyxand their deriva- tives. Similarly introduce the notionAvi(uyzp) for the system (24). Changing y and x to yv and z in the expression (29) gives

#i(uyvp) +i$i(uyvp) =

X

ij Qij(uyvzp)A(ij)(uyvz) =

X

ij Qij(uyvzp)A(vij)(uyvzv)+

| {z }

=0

X

ij Qij(uyvzp) A(ij)(uyvz);A(vij)(uyvzv)

| {z }

; i(uyvvzp)

which can be compared with (26). Now (30)

j%i(uyvvzp)j

X

ij

jQij(uyvzp)j

cij0jjvjj+cij1jjv_jj+:::+cijn+djjv(n+d)jj C for some constants 0cijk <1 2

Proof of Theorem 4.1

If the system (23) is globally identiable then there are expressions of the form (26). The identication algorithm

J gives

^i=;

Rb

a#i(uyvp)$i(uyvp)dt

Rb

a $2i(uyvp)dt =

i+

Rb

a %i(uyvvzp)$i(uyvp)dt

Rb

a$2i(uyvp)dt (31)

(5)

We will show that

Rb

a %i(uyvvzp)$i(uyvp)dt

Rb

a$2i(uyvp)dt !0 !0 (32) It follows from Lemma 4.1 that

%i(uyvvzp)!0 !0

uniformly. Using the result in the rst part of the proof of Lemma 4.1 it can be shown that

$i(uyvp)!$i(uyp) !0

#i(uyvp)!#i(uyp) !0 uniformly. Uniform convergence also implies that

Z b

a $2i(uyvp)!

Z b

a $2i(uyp) !0

Z b

a #i(uyvp)%i(uyvvzp)!0 !0 Since $2i(uyvp) is continuous and converges uni- formly to $2i(uyp) and Rab$2i(uyp) 6= 0 then

Rb

a $2i(uyvp)6= 0 ifsuciently small.

Consequently (32) holds so that ^!0 !0 2

5 Conclusions

We have studied a class of systems which can be written in state space form _x =f(ux) y=h(ux) where f and hare polynomials inu x and. We have shown that if such a state space system is globally identiable its disturbed counterpart is robustly globally identiable.

We also remark that similar techniques can be used to establish the result for nonlinear discrete time state space systems.

6 Acknowledgement

This work has been supported by the Swedish Research Council for Engineering Sciences (TFR).

References

Akcay, H. (1992). Robust linear system identication in H1. PhD thesis, University of Michigan.

Arnold, V. I. (1987). Ordinary Dierential Equations.

The MIT Press, Cambridge, Massachusettes.

Astr om, K. J. and Wittenmark, B. (1989). Adaptive Con- trol. Addison Wesley Publishing Company.

Birkho, G. and Rota, G.-C. (1969). Ordinary Dif- ferential Equations. Blaisdell Publishing Company, Waltham, Massachusetts.

Chen, J., Nett, C. N., and Fan, M. K. H. (1992). Op- timal non-parametric system identication from arbi- trary corrupt nite time series: A control-oriented ap- proach. In Proc. ACC.

Glad, S. (1988). Nonlinear state space and input out- put descriptions using dierential polynomials. Tech- nical report, Technical Report LiTH-ISY-I-0964, De- partment of Electrical Engineering, Link oping Univer- sity, S-581 83 Link oping, Sweden.

Glad, S. and Ljung, L. (1990a). Model structure iden- tiability and persistence of excitation. In Proc. of the 29th IEEE Conference on Decision and Control, Honolulu, Hawaii, pages 5.7{5.12.

Glad, S. and Ljung, L. (1990b). Parametrization of nonlinear model structures as linear regressions. In Preprints of 11th IFAC World Congress, Tallin, Esto- nia, pages 67{71.

Gu, G. and Khargonekar, P. (1992). A class of algorithms for identication inH1. Automatica, 28:299{312.

Helmicki, A. J., Jacobson, C. A., and Nett, C. N. (1991).

\Control Oriented System Identication: A Worst- Case/Deterministic Approach inH1". IEEE Trans- actions on Automatic Control, AC-36:1163{1176.

Helmicki, A. J., Jacobson, C. A., and Nett, C. N. (1992).

\Worst-Case/Deterministic Identication in H1:The Continuous Time Case". IEEE Transactions on Au- tomatic Control, AC-37:604{609.

Ljung, L. (1987). System Identication: Theory for the User. Prentice-Hall, Englewood Clis, NJ.

Ljung, L. and Wahlberg, B. (1992). Asymptotic proper- ties of the least-squares method for estimating transfer functions and disturbance spectra. Adv. Appl. Prob., 24:412{440.

Ljung, L. and Yuan, Z. D. (1985). \ Asymptotic proper- ties of black-box identication of transfer functions".

IEEE Trans. Automat. Contr., AC-30:514{530.

M akil a, P. M. (1991). \Robust Identication and Ga- lois Sequences". International Journal of Control, 54:1189{1200.

References

Related documents

In this thesis we investigated the Internet and social media usage for the truck drivers and owners in Bulgaria, Romania, Turkey and Ukraine, with a special focus on

• UnCover, the article access and delivery database allows users of the online catalog to search the contents of 10,000 journal titles, and find citations for over a

You suspect that the icosaeder is not fair - not uniform probability for the different outcomes in a roll - and therefore want to investigate the probability p of having 9 come up in

Detta pekar på att det finns stora möjligheter för banker att använda sig av big data och att det med rätt verktyg skulle kunna generera fördelar.. Detta arbete är således en

Accordingly, this paper aims to investigate how three companies operating in the food industry; Max Hamburgare, Innocent and Saltå Kvarn, work with CSR and how this work has

O1: Design and test research goals, data collection, and analysis methods for the large-scale field study.. O2: Collaborate with researchers specializing in qualitative data

40 Kriminalvårdsstyrelsen (2002), Riktlinjer för samarbete med ideella sektorn... länge föreningen funnits på orten, hur stor befolkningen är och mycket beror också på

The teachers at School 1 as well as School 2 all share the opinion that the advantages with the teacher choosing the literature is that they can see to that the students get books