Intelligent Diagnosis and Prognosis of Industrial Networked Systems Automation and Control Engineering 1st Edition Chee Khiang Pang
Intelligent Diagnosis and Prognosis of Industrial Networked Systems Automation and Control Engineering 1st Edition Chee Khiang Pang
Intelligent Diagnosis and Prognosis of Industrial Networked Systems Automation and Control Engineering 1st Edition Chee Khiang Pang
com
https://ebookgate.com/product/intelligent-systems-modeling-
optimization-and-control-automation-and-control-engineering-1st-
edition-yung-c-shin/
https://ebookgate.com/product/product-engineering-tools-and-
methods-based-on-virtual-reality-intelligent-systems-control-and-
automation-science-and-engineering-1st-edition-doru-talaba/
https://ebookgate.com/product/optimal-control-of-singularly-
perturbed-linear-systems-and-applications-automation-and-control-
engineering-1st-edition-zoran-gajic/
https://ebookgate.com/product/sliding-mode-control-in-
engineering-automation-and-control-engineering-1st-edition-
wilfrid-perruquetti/
Handbook of Healthcare Delivery Systems Industrial and
Systems Engineering Series 1st Edition Yuehwern Yih
https://ebookgate.com/product/handbook-of-healthcare-delivery-
systems-industrial-and-systems-engineering-series-1st-edition-
yuehwern-yih/
https://ebookgate.com/product/intelligent-buildings-and-building-
automation-1st-edition-shengwei-wang/
https://ebookgate.com/product/industrial-automated-systems-
instrumentation-and-motion-control-terry-l-m-bartelt/
https://ebookgate.com/product/industrial-automation-and-control-
system-security-principles-protecting-the-critical-
infrastructure-second-edition-ronald-l-krutz/
https://ebookgate.com/product/the-industrial-electronics-
handbook-second-edition-intelligent-systems-bogdan-m-wilamowski/
Intelligent Diagnosis and
Prognosis of Industrial
Networked Systems
Series Editors
FRANK L. LEWIS, Ph.D., SHUZHI SAM GE, Ph.D.,
Fellow IEEE, Fellow IFAC Fellow IEEE
Professor Professor
Automation and Robotics Research Institute Interactive Digital Media Institute
The University of Texas at Arlington The National University of Singapore
Frank L. Lewis
University of Texas,
Arlington, TX, USA
This book contains information obtained from authentic and highly regarded sources. Reasonable
efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and
publishers have attempted to trace the copyright holders of all material reproduced in this publication
and apologize to copyright holders if permission to publish in this form has not been obtained. If any
copyright material has not been acknowledged please write and let us know so we may rectify in any
future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced,
transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or
hereafter invented, including photocopying, microfilming, and recording, or in any information stor-
age or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copy-
right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222
Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro-
vides licenses and registration for a variety of users. For organizations that have been granted a pho-
tocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are
used only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the CRC Press Web site at
http://www.crcpress.com
To Galina.
F. L. Lewis
Contents
Preface.......................................................................................................................xi
Nomenclature........................................................................................................... xv
List of Tables...........................................................................................................xxi
vii
viii Contents
Index ......................................................................................................................279
Preface
In an era of intensive competition when asset usage and plant operating efficiencies
must be maximized, unexpected downtime due to machinery failure has become more
costly and unacceptable than before. To cut operating costs and increase revenues, in-
dustries have an urgent need for prediction of fault progression and remaining lifespan
of industrial machines, processes, and systems. As such, predictive maintenance has
been actively pursued in the manufacturing industries in recent years where equip-
ment outages are forecasted, and maintenance is carried out only when necessary.
Prediction leads to improved management and hence effective usage of equipment,
and multifaceted guarantees are increasingly being given for industrial machines,
processes, products, and services, etc. To ensure successful condition-based mainte-
nance, it is necessary to detect, identify, and classify different kinds of failure modes
in the manufacturing processes as early as possible.
With the pushing need for increased longevity in machine lifetime and its early
process fault detection, intelligent diagnosis and prognosis have become an important
field of interest in engineering. For example, an engineer who mounts an acoustic
sensor onto a spindle motor would like to know when the ball bearings will be worn
out and need to be changed without having to halt the ongoing milling processes, which
decreases the industrial yield. Or a scientist working on sensor networks would like to
know which sensors are redundant during process monitoring and can be pruned off
to save operational and computational overheads. These realistic scenarios illustrate
the need for new or unified perspectives for challenges in system analysis and design
for engineering applications.
Currently, most works on Condition-Based Monitoring (CBM), Fault Detection
and Isolation (FDI), or even Structural Health Monitoring (SHM) consider solely the
integrity of independent modules, even when the complex integrated industrial pro-
cesses consist of several mutually interacting components interwoven together. Most
literature on diagnosis and prognosis is also mathematically involved, which makes it
hard for potential readers not working in this field to follow and appreciate the state-
of-art technologies. As such, a good intelligent diagnosis and prognosis architecture
should consider crosstalk to facilitate actions and decisions among the synergetic in-
tegration of composite systems simultaneously, while maintaining overall stability at
the same time. This “big-picture” approach will also limit the inherent intrinsic un-
certainties and variabilities within the interacting components, while suppressing any
possible extrinsic socio-techno intrusion and uncertainties from the human interface
layer.
Adding to the current literature available in this research arena, this book provides
an overview of linear systems theory and the corresponding matrix operations re-
quired for intelligent diagnosis and prognosis of industrial networked systems. With
the essential theoretical fundamentals covered, automated mathematical machineries
are developed and applied to targeted realistic engineering systems. Our results show
xi
xii Preface
the effectiveness of these tool sets for many time-triggered and event-triggered indus-
trial applications, which include forecasting machine tool wear in industrial cutting
machines, sensors and features reduction for industrial FDI, identification of critical
resonant modes in mechatronic systems for systems design of research and develop-
ment (R&D), probabilistic small signal stability in large-scale interconnected power
systems, discrete event command and control for military applications, etc., just to
name a few. It should be noted that these developed tool sets are highly portable, and
can be readily adopted and applied to many other engineering applications.
Outline
This book is intended primarily as a bridge between academics in universities, practic-
ing engineers in industries, and also scientists working in research institutes. The book
is carefully organized into chapters, each providing an introductory section tailored to
cover the essential background materials, followed by specific industrial applications
to realistic engineering systems and processes. To reach out to a wider audience, lin-
ear matrix operators and indices are used to formulate mathematical machineries and
provide formal decision software tools that can be readily appreciated and applied.
The book is carefully crafted into seven chapters with the following contents:
• Chapter 1: Introduction
Intelligent diagnosis and prognosis using model-based and non-model-based
methods in current existing literature are discussed. The various application
domains in realistic industrial networked systems are also introduced.
• Chapter 2: Vectors, Matrices, and Linear Systems
Fundamental concepts of linear algebra and linear systems are reviewed
along with eigenvalue and singular value decompositions. The usage of both
real and binary matrices for diagnosis and prognosis applications are also
discussed.
• Chapter 3: Modal Parametric Identification (MPI)
Proposes a Modal Parametric Identification (MPI) algorithm for fast iden-
tification of critical modal parameters in R&D of mechatronic systems. A
systems design approach with enhanced MPI is proposed for mechatronic
systems and verified with frequency responses of dual-stage actuators in
commercial hard disk drives (HDDs).
• Chapter 4: Dominant Feature Identification (DFI)
Proposes a Dominant Feature Identification (DFI) software framework for
advanced feature selection when using inferential sensing in online moni-
toring of industrial systems and processes. A mathematical tool set which
guarantees minimized least squares error in feature reduction and clustering
is developed. The proposed techniques are verified with experiments on tool
wear prediction in industrial high speed milling machines and fault detection
in a machine fault simulator.
• Chapter 5: Probabilistic Small-Signal Stability Assessment
Proposes analytical and numerical methods to obtain eigenvalue sensitivi-
ties with respect to non-deterministic system parameters and load models
Preface xiii
Learning Outcomes
The developed tools allow for higher level decision making and command in syner-
getic integration between several industrial processes and stages, thereby achieving
shorter time in failure and fault analysis in the entire industrial production life cy-
cle. This shortens production time while reducing failure through early identification
and detection of the key factors that can lead to potential faults. As such, engineers
and managers are empowered with the knowledge and know-how to make important
decisions and policies. They can also be used to educate fellow researchers and the
public about the advantages of various technologies.
Potential readers not working in the relevant fields can also appreciate the litera-
ture therein even without prior knowledge and exposure, and are still be able to apply
the tool sets proposed therein to address industrial problems arising from evolving
or even emerging behavior in networked systems or processes, e.g., sensor fusion,
pattern recognition, and reliability studies, etc. The mathematical machineries pro-
posed aim to analyze methodologies to make autonomous decisions that meet present
and uncertain future needs quantitatively, without compromising the ad-hoc “add-on”
flexibility of network-centered operations.
Many universities also have established programs and courses in this new field,
with cross-faculty and inter-discipline research going on in this arena as well. As such,
this book can also serve as a textbook for an intermediate to advanced module as part
of control engineering, systems reliability, diagnosis and prognosis, etc. We also hope
that the book is concise enough to be used for self-study, or as a recommended text,
for a single advanced undergraduate or postgraduate module on intelligent diagnosis
and prognosis, FDI, CBM, or SHM, etc.
xiv Preface
Acknowledgments
Last but not least, we would like to acknowledge our loved ones for their love, under-
standing, and encouragement throughout the entire course of preparing this research
book. This book was also made possible with the help of our colleagues, collaborators,
as well as students and members in our research teams. This work was supported in
part by Singapore MOE AcRF Tier 1 Grant R-263-000-564-133, NSF Grant ECCS-
0801330, ARO Grant W91NF-05-1-0314, AFOSR Grant FA9550-09-1-0278, and
Hong Kong Polytechnic University Grant #ZV3E.
xv
xvi Nomenclature
xvii
xviii List of Figures
4.7 Flowchart of the proposed DFI for choosing the number of principal com-
ponents via SVD, and clustering using the K-means algorithm to select the
dominant feature subset. ...............................................................................106
4.8 Plot of principal components vs. singular values. ........................................108
4.9 MRM using sixteen dominant features and the RLS algorithm. ..................109
4.10 MRM using random selected four features {fm, fod, sod, vf} and tool wear
comparison. ..................................................................................................110
4.11 Examples of MRMs using four dominant features, three principal compo-
nents, and the RLS algorithm. ......................................................................111
4.12 Examples of MRMs using four dominant features, three principal compo-
nents, and the RLS algorithm (zoomed).......................................................112
4.13 Piezotron Acoustic Emission Sensor used, 100 to 900 kHz.........................117
4.14 Experimental setup. ......................................................................................119
4.15 Unprocessed AE signal during cutting process. ...........................................119
4.16 Stages in evolution of tool wear....................................................................120
4.17 Plot of principal components vs. singular values. ........................................123
4.18 RLS using all sixteen force and AE features................................................124
4.19 ARMAX models using all sixteen force and AE features............................125
4.20 Examples of tool wear prediction using four dominant features and three
principal components....................................................................................126
4.21 Examples of prediction using four dominant features and three principal
components...................................................................................................131
4.22 Two-layer NN trained using backpropagation for industrial fault classifi-
cation after proposed ADFI and DDFI. ........................................................133
4.23 Machine fault simulator and the eight sensors. ............................................134
4.24 Zoomed-in view of the four vibration sensors Ax, Ay, A2x, A2y, with the
corresponding data cables attached. .............................................................136
4.25 Current clamp meters and Futek torque sensor. ...........................................137
4.26 Schematic of a typical ball bearing...............................................................138
4.27 Plot of principal components vs. singular values. ........................................142
5.1 Block diagram of IEEE Type 1 Exciter and AVR system. ...........................164
5.2 Block diagram of simplified exciter and AVR system..................................165
5.3 Simplified block diagram of speed governor system....................................166
5.4 New England test system..............................................................................174
5.5 Composite load model consisting of a ZIP load and an IM load. ................203
5.6 IM transient-state equivalent circuit. ............................................................204
5.7 Effect on the OS of the load modeled as a composite load with a certain
percentage of IM and ZIP loads. ..................................................................209
5.8 Least damped local mode movement with a change in the location of
composite load from Bus 3 to Bus 29. .........................................................210
5.9 Least damped inter-area mode movement with a change in the location of
composite load from Bus 3 to Bus 29. .........................................................211
5.10 Root loci of the local mode for the given operating condition for the dif-
ferent values of the IM load parameters. ......................................................214
List of Figures xix
5.11 Root loci of the inter-area mode for the given operating condition for the
different values of the IM load parameters...................................................215
5.12 S.D. of the motor loads with a variable number of IMs in the system. ........217
5.13 OS of the load with 16 and 17 motors in the system....................................218
5.14 OS of the load with 11 and 12 motors in the system at Bus 23 and Bus 24. 219
5.15 Overall sensitivity of the load with a different percentage of dynamic load
component. ...................................................................................................220
6.1 C2 rule–based discrete event control for distributed networked teams. .......227
6.2 Sample mission scenario from [240]. ...........................................................229
6.3 Simulation results of DEC sequencing mission tasks in the networked team
example.........................................................................................................246
6.4 Simulation results of DEC sequencing mission tasks with increased Mis-
sion 1 priority................................................................................................247
6.5 DEC virtual reality interface panoramic view of the configuration of the
mobile WSN during real-world experiments................................................248
6.6 Experimental results showing the task event trace of the WSN. ..................248
6.7 Simulated battlefield with networked military team using ambush attack
tactics. ...........................................................................................................250
6.8 DEC sequencing mission tasks in the Networked Team Example. Simula-
tion. ...............................................................................................................253
7.1 Relationship between Best Efficiency Point (BEP) and Mean Time Be-
tween Failure (MTBF)..................................................................................256
7.2 Power data collected in learning machine runs are used to form detection
buffers. ..........................................................................................................257
List of Tables
3.1 Identified Modal Parameters of PZT Active Suspension ............................... 78
3.2 Identified Modal Parameters of VCM ............................................................ 79
3.3 Identified Modal Parameters of Perturbed PZT Active Suspension ............... 81
3.4 Identified Modal Parameters of Perturbed VCM............................................ 82
xxi
xxii List of Tables
1
2
Besides Markovian methods, time series models are also used to forecast future
events based on known past events. Time series analyses are often divided into two
classes; namely frequency-domain methods and time-domain methods. The former
is based on frequency information from spectral analysis or wavelet analysis, while
time series analyses are based mainly on examination of autocorrelation and cross-
correlation information. Autocorrelation analysis examines serial dependence, and
spectral analysis examine cyclic behavior which might not be related to seasonality.
In the Box-Jenkins methodology (named after the statisticians George Box and
Gwilym Jenkins), AutoRegressive Moving Average (ARMA) models are used to find
the best fit of a time series to past values of this time series for forecasts. Models for
time series data can have many forms and represent different stochastic processes.
When modeling variations in the level of a process, three broad classes of practical
importance are the AR models, Integrated (I) models, and MA models. These three
classes depend linearly on previous data points. Combinations of these ideas produce
ARMA and AutoRegressive Integrated Moving Average (ARIMA) models. The Au-
toRegressive Fractionally Integrated Moving Average (ARFIMA) model generalizes
the former three. The ARMA model is used to successfully to monitor and forecast
past, present, and future conditions of the machine by various researches in automo-
tive and aeronautical fields. Power consumption of active suspension of automotive
system is predicted [14] using a novel pseudo-linear method for the estimation of
fractionally integrated ARMA. The authors in [15] used AR and ARMA models to
predict automobile body shop assembly process variation. The steam turbine rotor
failure forecasted by [16] using vibration signals and applying the ARMA model. The
condition based maintenance forecast for aerospace engine performance parameters
analyzed using the ARMA model [17]. A simple and fast soft-wired tool wear state at
every wear condition monitoring is developed using the ARMA model [18]. A method
to predict the future conditions of machines based on one-step-ahead prediction of
time-series forecasting techniques and regression trees is proposed in [19].
issues faced during complex decision making in a multi-attribute space. This is done
through use of linear matrix operators and indices to formulate mathematical ma-
chineries and provide formal decision software tools which can be readily appreciated
and used by engineers from industries as well as researchers from research institutes
and academia. The developed tools allow for higher level decision making and com-
mand in synergetic integration between several industrial processes and stages, for
shorter time in failure and fault analysis in the entire industrial production life cy-
cle. The enhanced automated systems level toolsets also address industrial problems
arising from evolving and emerging behavior in networked systems or processes, and
analyze methodologies to make autonomous decisions that meet present and uncer-
tain future needs quantitatively without compromising the ad hoc “ad-on” flexibility
of network-centered operations. This shortens production time while reducing failure
by early identification and detection of the key factors which lead to potential faults.
As such, engineers and managers are empowered with the knowledge and know-how
to make important decisions and policies, as well as educate fellow researchers and
public about the advantages of various technologies.
in a central repository for technical sharing. This immediately follows from the pro-
posed integrated systems design methodology in managing complex R&D processes
for high-performance mechatronic industries [35].
consideration in state-space form, where the key generation and control parameters are
coupled with the state transition matrix. In this chapter, we investigate power system
state matrix sensitivity characteristics with respect to system parameter uncertainties
with analytical and numerical approaches, and identify those parameters that have
great impact on system eigenvalues, therefore, the system stability properties [40]. A
key probabilistic power system analysis technique is the probabilistic power system
small signal stability assessment technique. With the many factors such as demand
uncertainty, market price elasticity, and unexpected system congestions, it is more
appropriate to have probabilistic power system stability assessment results rather
than a deterministic one, especially for the sake of risk management in a competitive
electricity market [41]. We present a framework of probabilistic power system small
signal stability assessment technique, fully supported with detailed probabilistic anal-
ysis and case studies. The results can be used as a valuable reference for utility power
system small signal stability assessment, probabilistically and reliably, and can be
used to help Regional Transmission Organizations (RTOs) and Independent System
Operators (ISOs) perform planning studies under the open access environment [42].
On the other hand, load modeling also plays an important role in power system dy-
namic stability assessment. One of the widely used methods in assessing load model
impact on system dynamic response is parametric sensitivity analysis. A composite
load model-based load sensitivity analysis framework is proposed. It enables compre-
hensive investigation into load modeling impacts on system stability considering the
dynamic interactions between load and system dynamics. The effect of the location
of individual as well as patches of composite loads in the vicinity on the sensitivity
of the oscillatory modes are also investigated. The impact of load composition on the
overall sensitivity of the load is also discussed [43].
ronment called the Discrete Event Control (DEC) Framework based on binary matri-
ces is provided. DEC has the ability to provide the logical connectivity among all team
participants including mission planners, field commanders, war-fighters, and robotic
platforms, etc. The proposed data management tools are developed and demonstrated
in a simulation and implementation study using a distributed Wireless Sensor Net-
work (WSN). A simulation example on a battlefield with networked Future Combat
System (FCS) teams deploying ambush attack tactics is also presented [45]. The re-
sults show that the tasks of multiple missions are correctly sequenced in real-time,
and that shared resources are suitably assigned to competing tasks under dynamically
changing conditions without conflicts and bottlenecks.
In this chapter, we review the parametric-based and non-parametric-based diagno-
sis and prognosis methods that exist in current literature. Some examples are given of
realistic engineering applications in industrial networked systems where intelligent
diagnosis and prognosis are also identified, and linear matrix operations are proposed
for fast closed-form analysis.
With these covered, we will introduce the essential theoretical fundamentals of
vectors, matrices, and linear systems in the following chapter. Advanced matrix oper-
ations like eigenvalue decomposition and Singular Value Decomposition (SVD) are
also presented, along with binary matrices, which are useful for modeling and control
of event-triggered systems.
Vectors, Matrices, and Linear
2 Systems
Linear algebra has a wide range of applications in various domains for diagnosis and
prognosis of engineering systems. In this chapter, we first review the fundamental con-
cepts of linear algebra, including domain, range, transformation, and null spaces, etc.
This is followed by the introduction of linear systems, which covers linearization of
non-linear systems. Finally, we investigate a special type of matrix called Boolean
matrices, and its usage in system modeling of graphs and Discrete Event Control
(DEC) of event-triggered discrete event systems.
2.1.1 VECTORS
A vector is an n-tuple of numbers arranged either in a column or row [46]. This
column or row arrangement hence gives a vector magnitude and direction.
For example,
⎡ ⎤
x1
⎢ x2 ⎥
⎢ ⎥
x = ⎢ . ⎥, (2.1)
⎣ .. ⎦
xn
where x is a column vector of length n, while
y = y1 y2 · · · ym (2.2)
is a row vector of length m. The elements in x and y can be real or complex depending
on application domain.
Norms are generally functions which map a vector onto a scalar. Using x in (2.1)
as an example, the Euclidean norm x2 of x is
9
10
Euclidean norms of two vectors is in essence the inverse of the physical proximity
between them, i.e., the greater the difference in Euclidean norms, the “farther” or
“disalike” the two vectors are.
Other interesting vector norms include the Taxicab norm or Manhattan norm
n
||x||1 = ∑ |xi |, (2.4)
i=1
x1 , x2 = x1 T x2
= x2 T x1
n
= ∑ x1,i x2,i
i=1
= ||x1 ||||x2 || cos θ , (2.6)
where θ is the angle between vectors x1 and x2 . The outer product of x1 and x2
is x1 , x2 , where
x1 , x2 = x1 x 2 T
= x2 x1 T . (2.7)
Note that the inner product produces a scalar, while the outer product produces a
matrix of size n × n.
Relating the concept of inner product back to norms, the norms ||x1 || and ||x2 ||
of x1 and x2 satisfy
c1 x1 + c2 x2 + · · · + ck xk , (2.11)
where c1 , c2 , · · · , ck are scalars. The vectors are said to be linearly dependent if there
exist k scalars c1 , c2 , · · · , ck being non-zero and satisfying
c1 x1 + c2 x2 + · · · + ck xk = 0, (2.12)
but excluding the trivial solution. As such, the vectors are linearly independent if
c1 x1 + c2 x2 + · · · + ck xk = 0 (2.13)
x = c 1 x1 + c 2 x2 + · · · + c k x n . (2.14)
These vectors are said to constitute a basis for the vector space V. The largest number
of linearly independent vectors in V is d, where d is the dimension of V or dim(V).
Note that although the choice of a basis is non-unique, d is fixed for a given vector
space V.
2.1.2 MATRICES
A matrix A is a rectangular array of numbers where
⎡ ⎤
a11 a12 · · · a1n
⎢ a21 a22 · · · a2n ⎥
⎢ ⎥
A=⎢ . .. .. ⎥, (2.15)
⎣ .. . a . ij
⎦
am1 am2 ··· amn
and A is said to be a m × n matrix of m rows and n columns. The entry or element of
the matrix in the ith row and jth column is ai j . As such, A can be seen as a rectangular
arrangement of mn-tuple numbers, or a concatenation of vectors of the same length.
A matrix with one column or one row is hence, a vector.
The 1-norm for A is
m
||A||1 = max
1≤ j≤n
∑ |ai j |, (2.16)
i=1
12
which is simply the maximum absolute column sum of the A. The ∞-norm of A is
defined as
n
||A||∞ = max
1≤i≤m
∑ |ai j |, (2.17)
j=1
where λmax () denotes the maximum eigenvalue of , and σmax () denotes the maxi-
mum singular value of . The superscript H is the Hermitian or conjugate transpose
operator.
Another interesting matrix norm is the Frobenius norm ||A||F of A where
||A||F = tr{AH A}
m n
= ∑ ∑ |ai j |2
i=1 j=1
min{m,n}
= ∑ σ 2,i (2.19)
i=1
where tr{} is the trace operation, or sum of diagonal elements of the square matrix.
σi are the singular values of A. More details on eigenvalues and singular values will
be provided in future sections.
Now given an m × n matrix A, the vector spaces spanned by the set of linearly
independent row vectors and column vectors of A are called the row space and column
space of A, respectively. The vector space consisting of all possible solutions of Ax= 0
is called the null space of A, kernel of A, or simply Ker(A). This is because if A is
viewed as a linear transformation, the null space of a matrix is precisely the set of
vectors that is mapped to the null vector.
The maximum number of linearly independent vectors of a matrix A (or the di-
mension of the row space of A) is called the row rank or simply the rank of A. Nullity
of a matrix A is defined as the dimension of the null space of A. For an m × n matrix A,
the following theorems hold [47].
Theorem 2.1
Theorem 2.2
The theorems are self-explanatory and the proofs are omitted here for brevity.
In linear algebra, linear transformations can be represented by matrices. If T is
a linear transformation mapping Rn → Rm where x ∈ Rn and y ∈ Rm are vectors,
then T :→ y = Ax for some m × n matrix A. Here, A is called the transformation
matrix.
The domain of a function is the set of “input” or argument values for which the
function is defined. In other words, the function provides a unique “output” or “value”
for each member of the domain [48]. As such, A can now be viewed as an operator
which manipulates x to produce y. In the same sense as matrix norm is discussed
above, we can define an operator norm or induced norm ||A|| of A as
||Ax||
||A|| = sup
x=0 ||x||
= sup ||Ax||. (2.20)
||x||=1
where r1 , r2 , · · · , rm denote the rows of the matrix A. It follows that x is in the null
space of A if and only if x is orthogonal (or perpendicular) to each of the row vectors
of A. This is because the inner product of two vectors is zero if they are orthogonal.
The row space of a matrix A is the span of the row vectors of A. Using a similar
reasoning as above, the null space of A is the orthogonal complement to the row
14
space. That is, a vector x lies in the null space of A if and only if it is perpendicular
to every vector in the row space of A.
The left null space of A ∈ Rm×n is the set of all vectors x ∈ Rm such that xT A = 0.
It is the same as the null space of the transpose of A, or AT . The left null space is the
orthogonal complement to the column space of A. This can be seen by writing the
product of the matrix AT and the vector x in terms of the inner product of vectors
⎡ ⎤
c1 x
⎢ c2 x ⎥
⎢ ⎥
AT x = ⎢ . ⎥ , (2.22)
⎣ .. ⎦
cn x
Let y1 (t) be the output produced by an input signal u1 (t) and y2 (t) be the output
produced by another input signal u2 (t). The system is said to be linear if when [50]
1. the input is α u1 (t), the corresponding output is α y1 (t), where α is scalar;
and
2. the input is u1 (t) + u2 (t), the corresponding output is y1 (t) + y2 (t).
Or equivalently, when the input is α u1 (t) + β u2 (t), the corresponding output
is α y1 (t) + β y2 (t). As such, a linear system is said to obey the Principle of Su-
perposition since it has such a property.
Vectors, Matrices, and Linear Systems 15
Putting all the states into a vector, the above system of equations can be rewritten
as
⎡ ⎤ ⎡ ⎤⎡ ⎤
ξ̇1 0 1 0 ··· 0 ξ1
⎢ ⎥ ⎢ .. ⎥⎢ ⎥
⎢ ξ̇2 ⎥ ⎢ 0 0 1 . 0 ⎥⎢ ξ2 ⎥
⎢ ⎥ ⎢ ⎥⎢ ⎥
⎢
..
. ⎥ = ⎢
⎢ .. ⎥⎢
⎥⎢
..
. ⎥
⎢ ⎥ ⎢ 0 0 0 . 0 ⎥⎣ ⎥
⎣ ξ̇n−1 ⎦ ⎣ ⎦ ξn−1 ⎦
0 0 ··· 0 1
ξ̇n −a0 −a1 −a2 ··· −an−1 ξn
⎡ ⎤
0
⎢ 0 ⎥
⎢ ⎥
⎢ ⎥
+ ⎢ ... ⎥ u(t). (2.26)
⎢ ⎥
⎣ 0 ⎦
b0
Now if the output of the dynamic system y(t) is one (or a linear combination) of
the state variables, e.g., ξ1 (t), we can write y(t) in the output equation as
⎡ ⎤
ξ1
⎢ ξ2 ⎥
⎢ ⎥
⎢ ⎥
y(t) = 1 0 · · · 0 0 ⎢ ... ⎥ . (2.27)
⎢ ⎥
⎣ ξn−1 ⎦
ξn
T
Defining x(t) = ξ1 ξ2 · · · ξn−1 ξn , we can rewrite the system model
in the form of state-space representation as
where
⎡ ⎤
0 1 0 ··· 0
⎢ .. ⎥
⎢ 0 0 1 . 0 ⎥
⎢ ⎥
A = ⎢
⎢ .. ⎥,
⎥
⎢ 0 0 0 . 0 ⎥
⎣ 0 0 ··· 0 1 ⎦
−a0 −a1 −a2 ··· −an−1
⎡ ⎤
0
⎢ 0 ⎥
⎢ ⎥
⎢ .. ⎥ ,
B = ⎢ . ⎥
⎢ ⎥
⎣ 0 ⎦
b0
C = 1 0 ··· 0 0 ,
D = 0. (2.29)
Now, x ∈ Rn is the state vector, y is output vector, and u is the input (or control)
vector. A ∈ Rn×n is the state matrix, B ∈ Rn is the input matrix, C ∈ R1×n is the output
matrix, and D = 0 is the feedthrough (or feedforward) matrix. In this example, we
have chosen a Single-Input-Single-Output (SISO) system for simplicity but without
loss of generality, and this framework can be readily applied to systems of higher
dimensions with multiple inputs and outputs.
The state equation can now be expressed as a transfer function in frequency domain
as [46]
Y (s)
= C(sI − A)−1 B + D, (2.30)
U(s)
where U(s) and Y (s) are the system’s input and output, respectively, and s is the
Laplace Transform operator.
For general Multi-Input-Multi-Output (MIMO) systems, (2.28) is written as
ẋ(t) = Ax(t) + Bu(t),
y(t) = Cx(t) + Du(t), (2.31)
where A ∈ Rn×n , B ∈ Rn×p , C ∈ Rq×n , and D ∈ Rq×p for a system with p inputs and q
outputs. In this general formulation, all matrices are allowed to be time-variant, i.e.,
their entries may vary with time. However for LTI systems, these matrices contain
constant real numbers.
Depending on the assumptions taken, the state-space model representation can
assume the following forms, and variable t can be continuous or discrete. In the
latter case, the time variable is usually indicated as sampled instant k. In general, the
following representations are typical and most encountered in literature and practice
• Continuous time-invariant
ẋ(t) = Ax(t) + Bu(t),
y(t) = Cx(t) + Du(t),
18
• Continuous time-variant
ẋ(t) = A(t)x(t) + B(t)u(t),
y(t) = C(t)x(t) + D(t)u(t),
• Discrete time-invariant
x(k + 1) = Ax(k) + Bu(k),
y(k) = Cx(k) + Du(k),
• Discrete time-variant
x(k + 1) = A(k)x(k) + B(k)u(k),
y(k) = C(k)x(k) + D(k)u(k)
and this series is said to be expanded about the point x = x0 , commonly referred to
as the operating point or equilibrium point. For functions that are relatively smooth,
the magnitudes of the terms in this series decrease as higher order derivatives are
introduced, and an approximation of a function can be achieved by selecting only
some lower order terms.
Using the above definition, we have
1
f (x) = f (x0 ) + f (x0 )(x − x0 ) + f (x0 )(x − x0 )2 + · · ·
2
≈ f (x0 )x + f (x0 ) − f (x0 )x0 , (2.33)
and a linear relation is obtained if we retain only the first two terms of expansion.
This approximation is referred to as the linearization of f (x), and it is important that
the region of operation be near x0 for the approximation to be valid.
In a MIMO setting, the function f depends on multiple variables and each function
in f can be expanded into a Taylor series and thus linearized separately. Alterna-
tively, one can use matrix-vector notation and the linearized version of the non-linear
function f is
∂ f(x) 1
T ∂ f(x)
2
f(x) = f(x0 ) + (x − x ) + (x − x ) (x − x0) + · · ·
∂ x x0
0 0
∂ x x0 2 2
∂ f(x)
≈ f(x0 ) + (x − x0), (2.34)
∂ x x0
Vectors, Matrices, and Linear Systems 19
and the linear relation is obtained if we retain the first two terms as usual. In this
expression, the first order derivative of f(x) is a derivative of an m × 1 vector with
respect to an n × 1 vector. This results in an m × n matrix commonly known as the
Jacobian, whose (i, j)th element is ∂∂ xfij .
Lemma 2.1
Together with the zero vector, the eigenvectors of A with the same eigenvalue form
a linear subspace of the vector space called an eigenspace. The set of all eigenvalues
is called the spectrum of A.
Lemma 2.2
det(A − λ I) = 0, (2.37)
1 0
A= . (2.38)
1 2
Vectors, Matrices, and Linear Systems 21
and the eigenvalues of A are thus λ = 1 and λ = 2. With these eigenvalues, we can
proceed to find the corresponding eigenvectors.
T
Consider the eigenvalue λ = 2 and let x = x1 x2 . Now, the characteristic
equation becomes
−1 0 x1
= 0. (2.40)
1 0 x2
−x1 = 0, (2.41)
x1 = 0, (2.42)
which implies that x1 = 0. We are free to choose any real number for x2 except zero. By
T
selecting x2 = 1, the corresponding eigenvector is 0 1 .
Similarly, consider the eigenvalue λ = 1, the characteristic equation is thus
0 0 x1
= 0. (2.43)
1 1 x2
x1 + x2 = 0. (2.44)
As per above, we are free to choose a any real number for x1 except zero. By selecting x1 =
T
1 and x2 = −x1 = −1, the corresponding eigenvector is 1 −1 .
It is obvious that the complexity of the eigenvalue problem increases rapidly with
increasing the degree of the polynomial or the dimension of the vector space. As the
dimension increases, no exact solutions exist and numerical methods are used to find
the eigenvalues and their corresponding eigenvectors.
Λ −1 M−1 .
A−1 = MΛ (2.46)
An = MΛΛM−1 MΛ
ΛM−1 × · · · × MΛ
ΛM−1
n
−1
= Λ M
MΛ n
, (2.48)
and the required calculations are greatly simplified with Λ n = diag λi . n
ΛMT ,
A = MΛ (2.49)
where the superscript T is the matrix transpose operator. The eigenvectors obtained
are real, mutually orthogonal, and provide a basis for Rn . Also, M is orthonor-
mal, i.e., MT = M−1 , and Λ is also real.
However, if A ∈ Cn×n is normal and has an orthogonal eigenvector basis, it can be
decomposed as
A = UΛ ΛUH , (2.50)
where the superscript H is the Hermitian operator and U is an unitary matrix. Fur-
thermore if A is Hermitian, Λ will be real. If A is unitary, Λ takes all its values on the
complex unit circle.
Vectors, Matrices, and Linear Systems 23
(A − λ I)mv = 0. (2.53)
In order to compute the generalized eigenvectors, there are currently several meth-
ods available. The two most widely-used algorithms are the bottom-up and top-down
approaches with different pros and cons [46]. In this chapter, we will introduce the
top-down algorithm to compute the generalized eigenvectors.
The index of a repeated eigenvalue λi is denoted ηi , where ηi is the smallest
integer η such that
η
rank(A − λi I) = n − mi , (2.54)
where n is the dimension of the space of (A − λi I), and mi is the algebraic multiplicity
of λi . The top-down algorithm is a procedure depicted by the following steps [52]:
(A − λiI)ηi x = 0, (2.55)
ηi −1
(A − λi I) x = 0. (2.56)
(A − λi I)v1j = v2j ,
(A − λi I)v2j = v3j ,
(A − λi I)v3j = v4j , (2.57)
..
.
until we get
(A − λiI)vηj i = 0, (2.58)
(A − λiI)ηi −1 x = 0, (2.59)
(A − λiI)ηi −2 x = 0, (2.60)
and repeating the procedure when necessary. This will produce chains of
lengths ηi − 1. Continue until all generalized eigenvectors have been found.
• Step 4: Repeat this procedure for other repeated eigenvalues.
Axη = λ xη ,
Axη −1 = λ xη −1 + xη ,
..
. (2.61)
Ax2 = λ x2 + x3 ,
Ax1 = λ x1 + x2 , (2.62)
Vectors, Matrices, and Linear Systems 25
⎡ ⎤
3 −1 1 1 0 0
⎢ 1 1 −1 −1 0 0 ⎥
⎢ ⎥
⎢ 0 0 2 0 1 1 ⎥
A=⎢
⎢
⎥,
⎥ (2.64)
⎢ 0 0 0 2 −1 −1 ⎥
⎣ 0 0 0 0 1 1 ⎦
0 0 0 0 1 1
|A − λ I| = (λ − 2)5 λ , (2.65)
which gives η2 = 3. This implies that there will be the chain of eigenvector of length
three. We proceed to find a solution to
(A − 2I)3 x = 0, (2.69)
(A − 2I)2 x = 0, (2.70)
Another random document with
no related content on Scribd:
úgyse érti meg soha. A katona, az katona. És mink tudunk bánni
vele. Szivünk joga.
(Némán emelkednek föl a liften. Többé nincs köztük szó a
dologról.)
SZEGÉNYSÉG.
XIV. JELENET.
Az asszony, az ur.
Az ur (belép a szinpadra): Hogyan? Ön itt?
Az asszony (kissé dideregve): Itt vagyok, mint láthatja.
Az ur: Ilyen korán kel?
Az asszony: A hotelben kivülről fűtik a kályhámat, s ma úgy
zörögtek vele, hogy félhétkor fölébredtem. Nem tudtam aztán már
elaludni. Hát gondoltam egyet és felöltöztem. Lejöttem élvezni ezt a
hűvös őszi reggeli hangulatot.
Az ur: Én mindig ilyenkor kelek.
Az asszony: (nem felel. Átnéz a tulsó partra).
Az ur: Oly ritkán esik meg, hogy egyedül találom.
Az asszony: Igen?
Az ur: Igen.
(Szünet.)
Az ur: Pedig özvegy asszonyt nem nagy művészet egyedül találni,
ha az ember ráadja magát.
Az asszony: Viszont nem nagy művészet özvegy asszonynak
egyedül maradnia, ha ráadja magát.
Az ur: Izé… menjek el?
Az asszony: Nem mondom. De tudja… hüvös van, sötét, borus nap
van… ilyenkor az emberek hüvösek, sötétek és borusak a gondolatai.
Az ur: Azt látom. De azt hiszem, ezen könnyű segíteni.
Az asszony: Hogyan?
Az ur: Az ember mond egy meleg és fényes szót. Egy szót, a mi
fűt. Aztán mindjárt meleg van és süt a nap.
Az asszony: Például.
Az ur: Például: szerelem.
(Szünet.)
Az asszony: Hogy érti ezt?
Az ur: Szeretem magát. Két éve szeretem, két éve titkolom úgy,
hogy minden szempillantásban érzi rajtam, hogy minden
tekintetemből kiragyog, hogy minden szavamból ordít.
Az asszony: És?
Az ur: És… ez az egész. Most egyedül vagyunk, most mondom.
Jól esik mondanom. Szeretem, szeretem, egy érett férfi komoly
szerelmével, mely nem szalmalángon melegedett, hanem lassú tűzön
pirult.
Az asszony: Ugy beszél, mint egy érzelmes szakács.
Az ur: Tréfál.
Az asszony: Hihetetlenül ostobák maguk, férfiak. Határtalan a
maguk ügyetlensége.
Az ur: Miért?
Az asszony (feléje fordul, mosolyogva): Nincs érzéke magának a
stilus iránt? Hány óra van most? Hét. Milyen nap van ma?
Szeptember huszonkilenczedike. Milyen az idő? Szép, derűs, meleg,
melankolikus őszi nap? Ördögöt. Minden csupa hüvösség, minden
nyirkos, dideregtető, hideg, szomorú. Valami nagy pinczehangulat ül
a lelkemen. Most keltem föl és még nem reggeliztem. Nem aludtam
ki magamat, rosszkedvű vagyok, a mosdóvizem kellemetlenűl hideg
volt, tehát bosszusan, álmosan, dideregve, éhgyomorra kapom ezt a
szerelmi vallomást. Szerencsétlen ember. Egy szerelmi vallomást, a
mely két év óta pirul lassú tűzön. Egy szerelmi vallomást, a mely
nem illik a meteorologiai viszonyokhoz. Egy vallomást, a melynek
valami selymes, szőnyeges, függönyös szoba mélyén kellene
elhangzania, mikor alkonyat van s pattog a tűz a kandallóban s mikor
én kissé pirultan, lágy kasmir-pongyolában heverek a kereveten,
mint ezt utálatos, régi és rossz írók már elcsépelték, de a mint az
életben mégis kellemes. Csöndben kellene ennek elhangzania, de
lágy, meleg csöndben. Ez a csönd itt hideg és kemény csönd. Érti?
Ezt viszont utálatos, új és rossz írók csépelték el, de ez is így van. A
mit ön most cselekedett, az stílszerűtlen, az rossz, az ügyetlen. Ön
kamatoztatta a tőkéjét két éven át, szépen hallgatott és most az
egészért, kamatos kamatokat is beleértve, valami rossz papirost vett.
Fucscs az ön tőkéjének. Ön egy pillanat alatt elrontott mindent.
Az ur: De…
Az asszony: És most ne szóljon, mert rettenetesen hasonlít ahhoz
az emberhez, a kinek a szél a Margithidról a Dunába viszi a kalapját
és a ki utánacsap, lenyul érte a vizbe. Egyike a világon a legnagyobb
és legszebb kunsztoknak: ilyenkor nem kapni a kalap után. Brutus
megölte az apját; az ókorban ez volt a példa arra, hogy valaki tudott
az érzelmein uralkodni. A jövő Brutusa az lesz, a ki nem kap a
kalapja után, ha a szél lerántja a fejéről. Apát ölni könnyű. Majd ha
egyetlen reflexmozgásuk felett tudnak uralkodni, akkor beszéljenek
lelki erőről és lélekjelenlétről, urak. Ne szóljon most. Ne dadogjon.
Ne kapkodjon. Ne tegye magát nevetségessé. Hallgasson.
(Szünet.)
Az ur: Tehát stilszerűtlen voltam.
Az asszony: A legnagyobb mértékben.
Az ur: Belátom.
Az asszony: Lássa, ezt szeretem. Legalább tanult valamit, aminek
nagy hasznát veheti, ha nők körül jár. Én még azt is bevallom
magának, hogy nem tudom: nem járt volna-e sikerrel a kisérlete, ha
olyankor tette volna, a mikor meglett volna rá a dispoziczió. Tanulja
meg, hogy az igazi asszony ezen az egy ponton fogható meg. Jókor
kell jönni. Most legalább elmegy a kedve néhány évre attól, hogy
szerelemről beszéljen egy éhes, fázós, rosszkedvű asszonynak
csunya időben, a szabadban, a mikor annak az asszonynak minden
inkább foglalkoztatja e pillanatban az elméjét, mint a szerelem, a
melytől oly távol van ez a helyzet, mint…
Az ur: Spórolja meg ezt a lesujtó hasonlatot. Köszönöm, hogy
megtanított valamire. Ugy érzem, hogy még hasznát fogom venni az
életben. Kezét csókolom.
(Kalapot emel és balra elmegy. A mely pillanatban balról eltünt,
jobbról belép a szinpadra az ifjú.)
XV. JELENET.
Az asszony, az ifju.
Az asszony (az ifjú nyakába borul): No végre, hogy itt vagy!
Az ifju: Te édes.
Az asszony: Csókolj meg… csókolj… Ezen a szép, szomorú őszi
reggelen jobban sovárgok az ajkad melege után, mint valaha. Ölelj
meg. Most jó, most édes, most boldogság. Soha, csak most.
(Összeölelkeznek.) (Függöny.)
GYUFAOLDAT.