저작권법에따른이용자의권리는위의내용에의하여영향을받지않습니다.

Size: px
Start display at page:

Download "저작권법에따른이용자의권리는위의내용에의하여영향을받지않습니다."

Transcription

1 저작자표시 - 비영리 - 변경금지 2.0 대한민국 이용자는아래의조건을따르는경우에한하여자유롭게 이저작물을복제, 배포, 전송, 전시, 공연및방송할수있습니다. 다음과같은조건을따라야합니다 : 저작자표시. 귀하는원저작자를표시하여야합니다. 비영리. 귀하는이저작물을영리목적으로이용할수없습니다. 변경금지. 귀하는이저작물을개작, 변형또는가공할수없습니다. 귀하는, 이저작물의재이용이나배포의경우, 이저작물에적용된이용허락조건을명확하게나타내어야합니다. 저작권자로부터별도의허가를받으면이러한조건들은적용되지않습니다. 저작권법에따른이용자의권리는위의내용에의하여영향을받지않습니다. 이것은이용허락규약 Legal Code) 을이해하기쉽게요약한것입니다. Disclaimer

2 공학박사학위논문 Theory of Disturbance Observers: A New Perspective on Inverse Model-based Design 외란관측기이론 : 역동역학기반설계에대한새로운 관점 2018 년 2 월 서울대학교대학원 전기컴퓨터공학부 박경훈

3

4 ABSTRACT Theory of Disturbance Observers: A New Perspective on Inverse Model-based Design by Gyunghoon Park Department of Electrical and Computer Engineering College of Engineering Seoul National University February 2018 The problem of compensating model uncertainty and external disturbance in control systems is one of long-standing and critical issues in academia and industry. Among several promising solutions to the problem, the disturbance observer approach has gained a particular attraction in the literature, due to its structural simplicity and powerful ability. This dissertation presents new theoretical results on the inverse-model based disturbance observers, in order to overcome the limitation of the existing disturbance observer approaches and to address several problems which modern control systems have encountered. Specific subjects dealt with in the dissertation are listed as follows: i

5 The recovery of nominal performance is a key feature of the inverse modelbased disturbance observers. It is remarkable that this property is generically an approximation, mainly because structural information of disturbance is not explicitly employed in the disturbance observer design. Motivated by the internal model principle, in the first part of this dissertation we propose a new disturbance observer into which a generating model of disturbance is embedded. Unlike those in the existing works, the proposed disturbance observer achieves asymptotic rather than approximate) recovery of nominal performance in a sense of input-to-state stability. As a further research in this direction, we also find out that the asymptotic recovery of nominal performance is still possible even without exact knowledge on the frequencies of the sinusoidal disturbance, by realizing the internal model to be embedded in an adaptive fashion with a frequency identifier. Modern control systems have often experienced not only persistent disturbances and model uncertainty, but also sudden faults of systems and actuators. Even though various fault-tolerant control schemes have been proposed to tackle the problem, guaranteeing satisfactory tracking performance under faults has been not fully studied yet. As another contribution of the dissertation, we propose a disturbance observer-based fault-tolerant controller that guarantees a fault-free tracking performance for the entire period including the moment when an actuator fault occurs). By reminding that the disturbance observer approach is commonly applied to minimum phase systems, the underlying idea is to redefine a virtual input from the redundant control inputs such that the composite system from the virtual input to the output remains of minimum phase under any actuator faults. This work is in fact an extension of the disturbance observer for a larger class of systems that have more inputs than outputs, while the conventional disturbance observer scheme is mostly designed for square systems that is, systems that have the same numbers of inputs and outputs). While a physical plant is a continuous-time system, control schemes are usually implemented in discrete time. The mixture of continuous- and discreteii

6 time components introduces some distinctive characteristics of the sampleddata systems, which possibly incurs unexpected situations when a discretetime disturbance observer is employed for the sampled-data system. In the dissertation, a theoretical analysis of the discrete-time disturbance observer is newly provided in the sampled-data setting. In particular, by focusing on the limiting behavior of the overall system as the sampling period goes to zero, we obtain a necessary and sufficient condition for the robust stability under fast sampling. One important finding from our approach is that the discrete-time sampling zeros of the sampled-data model may hamper stability even regardless of model uncertainty) when these zeros are not carefully taken into account in the disturbance observer design. Based on the stability analysis, we also present systematic design guidelines of the discrete-time disturbance observer to satisfy the stability constraint under arbitrarily large but bounded) model uncertainty, and at the same time to embed a disturbance model if available) into the discrete-time disturbance observer structure. With increased interests in these days, the security of cyber-physical systems has been dealt with in the literature from a control-theoretical point of view. In the last part of this dissertation, we address the problem of constructing a robust stealthy attack that compromises uncertain cyber-physical systems having unstable zeros. It has been well known that the conventional zero-dynamics attack, a systematic stealthy attack to non-minimum phase systems, is easily detected as long as even small) model uncertainty exists. Different from the conventional approach, our key idea is to isolate the real zero-dynamics from the plant s input-output relation and to replace it with an auxiliary nominal zero-dynamics; as a result, this alternative attack does not require the exact model knowledge anymore. We show in this dissertation that all this can be realized by the disturbance observer, which now serves as an attack generator. This work explains the underlying principle of destabilizing phenomenon when the inverse model-based disturbance observer is applied to the non-minimum phase plants carelessly. iii

7 Keywords: disturbance observer, internal model principle, nominal performance recovery, robust control, sampled-data system, cyber-physical system Student Number: iv

8 격려와사랑으로응원해주신모든분들께 본논문을바칩니다. v

9

10 Contents ABSTRACT List of Tables List of Figures Notation and Symbols i xi xvi xvii 1 Introduction Research Background Overview of Researches on Disturbance Observers Motivating Questions on Inverse Model-based Designs Contributions and Outline of Dissertation Recovery of Nominal Performance in Asymptotic Sense: Part I - Embedding Internal Model into Disturbance Observer Problem Formulation Controller Design Motivating Idea from Frequency Domain Analysis Reduced-order Implementation of Disturbance Observer with Higher Order Numerator of Q-filter Design of Disturbance Observer with Internal Model Performance Analysis Coordinate Transformation to Singular Perturbation Form Lyapunov Analysis vii

11 2.4 Simulation: Mechanical Positioning Systems Recovery of Nominal Performance in Asymptotic Sense: Part II - An Extension with Adaptive Internal Model Problem Revisited: Mechanical System with Unknown Frequency of External Input Disturbance Observer-based Controller Design with Adaptive Internal Model Performance Analysis Representation to Multiple-time Scaled Singular Perturbation Form Convergence Analysis Industrial Application: Optical Disk Drive Simulation Results Experimental Results Guaranteeing Almost Fault-free Performance from Transient to Steady-state: Disturbance Observer-based Fault Tolerant Control Problem Formulation Design of Disturbance Observer-based Fault Tolerant Controller Static Gain of Control Allocation Law Representation to Byrnes-Isidori Normal Form Disturbance Observer-based Controller Performance Analysis Simulation: Fault Tolerant Control of Boeing Stability, Performance, and Designs of Discrete-time Disturbance Observers for Sampled-data Systems: A Fast Sampling Approach Motivating Example: Stability Issue of Disturbance Observers in Sampled-data Frameworks Basics on Sampled-data Systems Generic Representation of Discrete-time Disturbance Observer viii

12 5.4 Almost Necessary and Sufficient Condition for Robust Internal Stability under Fast Sampling Main Result Issue 1: Exact vs. Approximate Discretization of P n s) Issue 2: Importance of Q-filter Design Issue 3: Indirect vs. Direct Designs of Discrete-time Disturbance Observers Performance Analysis of Discrete-time Disturbance Observers in Frequency Domain Direct Design Methods for Discrete-time Disturbance Observers Design with Simplest Structure of Q-filter Design to Embed Disturbance Model Simulation Results: Two-mass-spring System Revisited Robust Zero-dynamics Attack on Uncertain Cyber-physical Systems: Malicious Use of Disturbance Observer Normal Form-based Interpretation of Zero-dynamics Attack System Description Performance of Zero-dynamics Attack Limitation of Zero-dynamics Attack against Model Uncertainty Robust Zero-dynamics Attack for Uncertain Cyber-Physical Systems Problem Revisited with Model Uncertainty Yet Another Attack Policy on Unstable Zero-dynamics: Ideal Strategy Design of Robust Zero-dynamics Attack: Practical Implementation of New Attack Policy via Disturbance Observer Proof of Main Result Simulation: Power Generating Systems Conclusion of Dissertation 191 ix

13 APPENDIX 195 A.1 Design Guidelines of a i for CT-DOBs A.1.1 Recursive Design Algorithm A.1.2 Bilinear Matrix Inequality-based Design A.2 Properties of δ in ) A.3 Derivation of Normal Form Representation 6.3.1) of Power Generating System BIBLIOGRAPHY 207 국문초록 223 x

14 List of Tables 3.1 Specifications of A/D and D/A converter Specifications of operational amplifier Discretization 5.3.2a) of P n s) in 5.3.1a) resulting from various methods; forward difference method FDM), backward difference method BDM), bilinear transformation BT), and matched pole zero method MPZ) xi

15 xii

16 List of Figures 1.1 General concept of DOB approach Basic configuration of inverse model-based DOB controlled systems: Ps), P n s), Cs), and Qs; τ) indicate the plant and its nominal model, baseline controller, and the Q-filter, respectively An equivalent block diagram of conventional DOB Equivalent representation ) of conventional DOB based on Byrnes-Isidori normal form of P n s) Closed-loop system with proposed DOB-based controller ), ), and ) Bode plots of the open-loop transfer functions with the proposed DOB blue solid), the linear DOB in [KC03] green dot-dashed), and the EHO in [FK08] red dashed) when all the saturation functions are inactive Nyquist plot of Z 2,2 s) with a i obtained from BMI formulation Differences between the actual output yt) and the nominal one y n t) when dt) = d m t) = 2 sinσ 1 t); the proposed DOB blue solid), the linear DOB in [KC03] green dot-dashed), and the EHO in [FK08] red dashed) Differences between the actual output yt) and the nominal one y n t) when dt) = d m t)+d u t) = 2 sinσ 1 t)+sin15t); the proposed DOB blue solid), the linear DOB in [KC03] green dot-dashed), and the EHO in [FK08] red dashed) xiii

17 2.8 Differences between the actual output yt) and the nominal one y n t) when dt) = d m t) + d u t) = 2 sinσ 1 t) + sin15t) and there is a measurement noise; the proposed DOB blue solid), the linear DOB in [KC03] green dot-dashed), and the EHO in [FK08] red dashed) Overall configuration of closed-loop system with proposed controller 3.2.1), 3.2.7), 3.2.8), and 3.2.9) Diagram of ODD systems for experiment Configuration of ODD control system Simulation results for the proposed add-on controller 3.2.1) and 3.2.8). a) Plant output y. b) Control input u. c) Frequency estimate ˆσ/2π) solid) and true value σ/2π) dashed) Open-loop transfer functions of the ODD controlled systems with the proposed add-on controller blue solid), the conventional DOB with τ = orange dashed), and the conventional DOB with τ = green dash-dotted) Simulation results for the conventional DOBs. a) τ = b) τ = Simulation results for the proposed add-on controller 3.2.1) and 3.2.8) with slowly varying frequency. a) Plant output y. b) Control input u. c) Frequency estimate ˆσ/2π) solid) and true value σ/2π) dashed) Experiment setup Experimental results for the proposed add-on controller 3.2.1) and 3.2.8). a) Plant output y. b) Control input u. c) Frequency estimate ˆσ/2π) solid) and true value σ/2π) dashed) Overall configuration of proposed DOB-based FTC consisting of input allocation law 4.2.1), baseline controller ), and DOB ) Visualization of proof of 4.3.1) when m flt = Simulation results when two lock-in-place faults take place xiv

18 4.4 Simulation results when two floating faults sequentially occur Two-mass-spring system Overall controlled system with DT-DOB blue dotted block): Q d z; ), P d nz; ), and C d z; ) stand for DT Q-filter 5.3.4), DT nominal model 5.3.2a), and DT controller 5.3.2b), respectively Simulation results with CT-DOB controlled system purple solid), DT-DOB controlled system black dotted), and CT nominal closedloop system green dashed) An equivalent block diagram of DT-DOB Simulation results for the proposed DT-DOB with simplest Q-filter Procedure 5.6.3): Sampled-data systems with baseline controller C d fw only black dash-dotted) and with the proposed DT-DOBbased controller P d n,fw, Cd fw, Qd simp,fw) blue solid), and CT nominal closed-loop system green dashed) Location of roots of Ψ d z; ) = 0 a) and b)) and roots of Ψ i s d ; ) = 0 c)) with P d n,fw, Cd fw, Qd simp,fw) : the brighter the color is, the smaller is; and black triangles represent direction of roots when gets smaller Bode plot of DT Q-filters Q d simp,fw blue solid), Qd ind,fast red dashed), and Q d ind,slow black dash-dotted) Simulation results for direct and indirect DT-DOB designs: CT- DOB controlled systems Figure 1.2, dash-dotted), DT-DOB controlled systems Figure 5.2, solid), and CT nominal closed-loop system green dashed) Sensitivity functions of DT-DOB controlled systems with DT Q- filters Q d simp,fw blue solid), Qd ind,fast red dashed), and Qd ind,slow black dash-dotted) Simulation results with different discretization methods for P n : DT-DOB controlled systems with P d n,fw, Cd fw, fw) Qd blue solid), P d n,bw, C d bw, ) Qd bw red dash-dotted), and P d n,bt, C d bt, ) Qd bw black dotted), and CT nominal closed-loop system green dashed) xv

19 5.11 Simulation results with various discretized baseline controller C d : DT-DOB controlled systems with P d n,fw, Cd fw, fw) Qd blue solid), P d n,fw, C d bw, ) Qd fw pink dashed), and P d n,fw, C d bt, ) Qd fw ivory dotted), and CT nominal closed-loop system green dashed) Simulation results for the proposed DT-DOB with simplest Q-filter Procedure 5.6.5): DT-DOB controlled systems with P d n,bw, Cd bw, ) Qd im red dash-dotted) and with P d n,bw, Cd bw, bw) Qd dark blue solid), and CT nominal closed-loop system green dashed) Overall configuration of cyber-physical system with malicious attacker Cyber-physical attack space [TSSJ15a] with model knowledge, disruption, and disclosure resources: The robust zero-dynamics attack is at entirely new location Configurations of two different attack scenarios: The zero-dynamics attack 6.1.4) requires the exact model knowledge, while the robust zero-dynamics attack 6.2.5) instead utilizes the disclosure resources i.e., u c and y) Configuration of a power generating system with a hydro turbine [Tan10] Simulation results with the conventional zero-dynamics attack ) when T h = 4 = T h,n black dashed), T h = 5 red dash-dotted), and T h = 6 blue solid) Simulation results with the proposed robust zero-dynamics attack 6.2.6) and ) when τ = 0.001, T h = 4 = T h,n black dashed), T h = 5 red dash-dotted), and T h = 6 blue solid) Simulation results with the robust zero-dynamics attack 6.2.6) and ) where T h = 6 and τ = green dash-dotted) and τ = blue solid) Frequency deviation f under the robust zero-dynamics attack 6.2.6) and ) with noisy measurement xvi

20 Symbols and Acronyms R C R n R m n Res) Ims) field of real numbers field of complex numbers Euclidean space of dimension n space of m n matrices with real entries real part of a complex number s imaginary part of a complex number s [m] := {1, 2,..., m} R >0 I n set of positive real numbers n n identity matrix 0 n n 1 column vector having all elements equal to 0 O m n m n matrix having all elements equal to 0 diaga 1,..., a k ) blockdiaga 1,..., A k ) diagonal matrix whose i-th diagonal is a i block diagonal matrix whose i-th block diagonal is A i 2 A power set of a set A λa) λa) [a; b] a the maximum eigenvalue of the matrix A R n n the minimum eigenvalue of the matrix A R n n := [a, b ] for two column vectors a and b := a a for a vector a R n xvii

21 A := λa A) for a matrix A R m n C i Lxt)) Fxt)) Zx[k]) dista, B) i-th times continuously differentiable Laplace transform of xt) Fourier transform of xt) Z-transform of x[k] := inf a A,b B a b for two sets A R n and B R n Ea, b) line segment in the complex plane connecting the points 1/a) + j0 and 1/b) + j0 for two real numbers a and b) Da, b) closed disk in the complex plane whose diameter is Ea, b) for two real numbers a and b) A boundary of a set A for all end of theorems, lemmas, propositions, assumptions, remarks, and so on end of proof A square matrix A is said to be Hurwitz matrix) if every eigenvalue λ of A has strictly negative real parts, i.e., Reλ) < 0. For any state variable xt), its initial condition will be denoted by x0). In order to messy notation, the time symbol t is omitted when there in no confusion. For two sets A R n and B R n and a positive real number ϵ, we use A ϵ B if A B and inf a A,b B { a b } > ϵ where A and B indicate the boundary of A and B, respectively, and A B if there exists ϵ > 0 such that A ϵ B. For simplicity, we often use I n, 0 n, and O m n without subscripts if their dimensions are obvious. xviii

22 Acronyms LTI SISO MISO DOB CT DT CT-DOB DT-DOB CPS Linear time-invariant Single-input single-output Multi-input single-output Disturbance observer Continuous-time Discrete-time Continuous-time disturbance observer Discrete-time disturbance observer Cyber-physical system xix

23

24 Chapter 1 Introduction 1.1 Research Background Overview of Researches on Disturbance Observers As Brockett says in his essay [Bro01], If there is no uncertainty in the system, the control or the environment, feedback control is largely unnecessary. The problem of compensating internal model uncertainty and external disturbance would be one of the central and long-standing issues in the control theory. Moreover, this is an ongoing challenge in our era where modern control systems become more complicated and thus introduce a variety of sources of uncertainty and disturbance. In this context, a tremendous amount of research efforts have been paid during the last several decades to resolve the problem of robust control design [PT14, Saf12, Kwa93], including H 2 /H controller [Kwa93, ZD96], sliding mode controller [SEFL14, Utk92], robust output regulator [SI00, Hua04], to name just a few. As a possible direction of research for ensuring the robustness of the control system, the disturbance observer DOB) scheme has gained a lot of interest in these days [LYCC14, SPJ + 16, CYGL15]. The underlying philosophy of the DOB approach is, as the name implies, to explicitly estimate the effect of the uncertain quantities using the measurement signals and the maybe imperfect) structural information on the plant. Compared with other existing solutions, this idea offers a quite intuitive way of disturbance attenuation; e.g., to simply subtract the estimate of uncertain quantities into the original control input Figure 1.1). 1

25 2 Chap. 1. Introduction Reference Baseline controller External disturbance Uncertain) Plant Disturbance observer Figure 1.1: General concept of DOB approach The inherent advantages have motivated researchers to develop several types of DOBs, a large part of which can be classified into the following three categories: Internal model-based design: Provided that the external disturbance is generated by a certain exogenous system, a natural method for its estimation from the viewpoint of the internal model principle [FW76]) would be to utilize the knowledge on the disturbance model into the DOB design. As a pioneering work in this direction, Johnson [Joh71, Joh76, Joh08] introduced a solution of the robust output regulation based on the estimation of the modeled disturbance, named disturbance accommodation control. The central idea of his work is to augment the disturbance model into the system model, upon which classical observer techniques can be employed with some modification). This in turn led to the invention of the unknown input disturbance observer [PVM90, SvD02], a variant of the traditional unknown input observer with disturbance model. More recently, Chen and his colleagues proposed yet another nonlinear DOB to deal with a class of nonlinear systems under a polynomial-in-time disturbance i.e., dt) = d 0 + d 1 t + + d k t k with constants d i ) [CBGO00, CYGL15, GC05, Che04, YLC12]. While the exact expression on the disturbance must be dependent of high-order time derivatives of the plant state, the authors in [CBGO00] employed an alternative

26 1.1. Research Background 3 observer for an auxiliary variable rather than the disturbance itself) whose dynamics is implementable only with state variables. This technique was initially proposed by assuming that the full state variables are available, and in turn an extension to the output feedback case was introduced in [Che04]. Another work on the internal model-based design can be found in [KRK10, KR13] where a reduced order DOB was constructed based on the frictional observer scheme. It is important to note that most of the previous works in this category were interested in the asymptotic estimation and compensation of the disturbance, at the cost of using the full structural information on both disturbance and plant models. Inverse model-based design: Without using exact model knowledge on the disturbance, an alternative way of estimating the disturbance is to compare the control input generated by a baseline controller) with its estimate, where the latter is obtained by passing the plant output through the inverse dynamics of a nominal plant model. Roughly speaking, the disparity can be interpreted as a quantitative expression of model uncertainty and disturbance, in the sense that the signal will be vanished as long as there is no uncertain factor in the environment. From this standpoint, we call this lumped signal as total disturbance). This is the main philosophy of the inverse model-based designs in the literature. A basic configuration of the inverse model-based DOB is depicted in Figure 1.2. It is seen in the figure that a low-pass filter Qs; τ) called Q-filter) is additionally attached in the DOB loop. This is mainly for the realization of the idea, and the Q-filter plays an essential role in the stability and performance of the closed-loop system. Since the first report on the inverse model-based DOB design in [NOM87], several theoretical results on the robust stability analysis and design guidelines have been presented for the last three decades. When it comes to the stability analysis, the small gain theorem has been widely used as a mathematical tool [WT04, YCC05, KC03, UH91]. Yet since the small gain theorem takes into account only the amplitude of the system response, it

27 4 Chap. 1. Introduction may provide a conservative consequence in a sense. In this context, alternative approaches have been performed in the literature. As an example, the authors of the works [SO12, GG01] employed the concept of the structured singular value in their analysis, by focusing mainly on the structural uncertainty of the plant. This allows to avoid a conservative design of the Q- filter. On the other hand, the equivalence between the DOB structure and the other control schemes, such as the unknown input disturbance observer and the adaptive observer, was exploited in [SvD02, BT99], by which the stability of the DOB structure is analyzed indirectly. In [CCY96], Choi et al. presented a H framework for the stability analysis of the DOB structure, based on the factorization approach. Moving away from the frequency domain analysis, Shim and Joo [SJ07] proposed a state space approach from the viewpoint of the singular perturbation theory. In particular, the work [SJ07] pointed out that enlarging the bandwidth of the Q-filter incurs the time separation of the overall closed-loop system so that the stability of the overall system is decomposed into that of the slow and fast subsystems. As a frequency domain counterpart of this approach, an almost necessary and sufficient condition for robust stability under large bandwidth of Q-filter was derived in [SJ09, JJS14]. On the other hand, it has been reported in [KPSJ16, SO13a] that the stability margin, a notion in the classical control theory, of the DOB controlled system is possibly increased as the bandwidth of the Q-filter gets larger. In addition to the stability analysis, several design procedures of the Q-filter have been proposed based on the H framework [SWY14], the Bode and Poison integral formulas [SO13b], and the internal model principle [YKIH97, CT12, JPBS16]. Moreover, a particular attention was paid to the selection of the nominal model [KT13, CCKH16]. State extension-based design: The works in this category follow the same philosophy of the inverse modelbased designs above; that is, to estimate the total disturbance instead of the disturbance itself) with no requirement on the disturbance model.

28 1.1. Research Background 5 Figure 1.2: Basic configuration of inverse model-based DOB controlled systems: Ps), P n s), Cs), and Qs; τ) indicate the plant and its nominal model, baseline controller, and the Q-filter, respectively. However, rather than utilizing the inverse model of the nominal plant in its structure, the strategy here is to extend the system dynamics by taking the time derivative of order larger than the relative degree of the plant as an auxiliary state variable. Then the problem of estimating the total disturbance can be recast to that of estimating the auxiliary state of the extended system dynamics, which can be solved by employing a high-gain observer in an approximate fashion). This idea was originated from Han s work [Han09] under the name of extended state observer, and then inspires Khalil and his colleague to develop the control via extended high-gain observer [FK08, LMK16] At the same time, another composite control law on basis of this idea, called active disturbance rejection controller, has been also widely employed in these days [XH15, Gao14]. Based on the theoretical results, the DOB-based control techniques have been widely employed in industrial problems. Some remarkable applications of the DOB schemes include but are not limited to): optical disk drives [YCC05, RDC04, OMI + 06, OSM96]), hard disk drives [Xie10, Ats10]), position and force control of mechanical systems [KC03, WT04, CLTT17, SO15, KKO07]), robot manipulators [OC99, CBGO00, BT99, MMT17]), motor drives [YCL + 17]), autopilot design [LY13]), and air-breathing hypersonic vehicles [ALWW16])

29 6 Chap. 1. Introduction Motivating Questions on Inverse Model-based Designs In this dissertation, we are mainly interested in developing the theory of the inverse model-based DOB designs. In particular, our ultimate goal is to answer the questions listed below, which motivate the work of this dissertation. The ability of compensating the total disturbance allows the DOBs to recover the nominal tracking performance. Yet at the same time, this recovery is approximate in general. If so, can we recover nominal performance asymptotically? Most of the previous works on the inverse model-based design focused only on the square systems i.e., the systems having the same number of inputs and outputs), while redundancy of the control input may exist in various control problems. In this situation, what benefits can we achieve by the DOB? As most of the modern control systems consist of physical plant and digital controller, the DOB scheme is often implemented in the DT domain with the help of sampler and zero-order holder. However, as reported in several experimental results, applying a discretization of a CT-DOB to the sampleddata system directly may not guarantee the stability of the closed-loop system in general. Then, what is a necessary and sufficient condition for robust stability of DT-DOB controlled system in the sampled-data framework? It has been investigated that the inverse model-based DOB under large bandwidth of the Q-filter must destabilize the closed-loop system when applied to non-minimum phase systems. In this case, is the recovery of nominal performance in the first bullet immediately broken so that the instability of the system can be captured directly from the measurement output)? 1.2 Contributions and Outline of Dissertation Chapter 2. Recovery of Nominal Performance in Asymptotic Sense: Part I - Embedding Internal Model into Disturbance Observer

30 1.2. Contributions and Outline of Dissertation 7 In this chapter, we address the problem of recovering the nominal performance in asymptotic sense for uncertain minimum phase systems, provided that a part of the external inputs are generated by an exogenous system. As a solution for the problem, this work presents a new design methodology for the inverse model-based DOB based on the singular perturbation theory and internal model principle. The contents of this chapter is based on [PSJ] and the main contributions of this work is listed as follows: We propose a reduced-order type DOB in the state space, into which the generating model of the external inputs is embedded. The proposed DOB structure generalizes those in the relevant works [BS14, JPBS16]. To the best of our knowledge, this is the first in the literature to handle the arbitrarily accurate recovery in transient period and the complete recovery in steady-state period at once. The asymptotic recovery of the nominal performance via the proposed DOB is analyzed by the Lyapunov analysis from the viewpoint of the singular perturbation theory. In particular, since the standard singular perturbation theory cannot capture the effect of the modeled inputs appropriately, we newly present a modified notion of the quasi-steady-state for the analysis. Systematic design guidelines for the DOB design that deals with bounded but) arbitrarily large model uncertainty is presented. To verify the validity of the proposed scheme, we perform the simulation for the mechanical positioning system. Chapter 3. Recovery of Nominal Performance in Asymptotic Sense: Part II - An Extension with Adaptive Internal Model As an extension of the result in the previous chapter, in this chapter we tackle the same problem for linear mechanical systems, under a relaxed assumption that the frequency of the sinusoidal inputs is not exactly known. The contents of this work are presented in [PK17] and the main contributions of this work is listed as follows:

31 8 Chap. 1. Introduction To deal with the uncertain frequency of the sinusoidal input, we propose a new inner-loop controller by combining the DOB in Chapter 2 with a frequency identifier. Noting that the use of the frequency identifier introduces one additional time scale separation in the overall system, we analyze the performance recovery by transforming the overall system into a multiple-time scaled singular perturbation form. The proposed DOB-based controller is applied to track-following problem of the optical disk drives. Both simulation and experimental results are presented. Chapter 4. Guaranteeing Almost Fault-free Performance from Transient to Steady-state: Disturbance Observer-based Fault Tolerant Control The main purpose of this chapter is to construct an output feedback fault tolerant controller that guarantees almost fault-free tracking performance for the entire time period by following the DOB approach. A standing assumption for the controller design is that the plant has redundant inputs and they are possibly under floating or lock-in-place faults. The contents of this chapter are contained in [PS]. The contribution of this chapter is as follows: This work covers the problem of ensuring the satisfactory transient performance at the moment of actuator faults, which is still an ongoing research topic in the field of the fault tolerant control. We propose a new inverse model-based DOB design method when the number of inputs is larger than that of outputs, while only few works have dealt with this situation explicitly [CT14]. Simulation for the fault tolerant control of Boeing 747 is performed. Chapter 5. Stability, Performance, and Design of Discrete-time Disturbance Observer for Sampled-data Systems: A Fast Sampling Approach

32 1.2. Contributions and Outline of Dissertation 9 In this chapter, we provide an analysis and design guidelines for the DT- DOB controlled sampled-data systems in the frequency domain. Particularly, an almost necessary and sufficient condition for robust internal stability of the DT-DOB closed-loop system is carried out, under a mild assumption that the sampling period is sufficiently small. It is briefly seen that the recovery of the nominal performance is still valid in the sampled-data framework. Some part of this chapter is based on [PJLS15, PS15]. The contribution of this work is: The result theoretically reveals that the sampling process indeed may hamper the stability of the overall system, while such an obstacle can be handled by constructing the DT-DOB appropriately. This work presents a generalized framework for the stability analysis, in the sense that linear systems with general order and a large class of discretized components are dealt with. Some rule-of-thumbs widely used in the DT-DOB designs are reinterpreted by the present analysis. Based on the analysis part, new design procedures for the DT-DOB with and without considering the disturbance model are proposed. Chapter 6. Robust Zero-dynamics Attack on Uncertain Cyber-physical Systems: Malicious Use of Disturbance Observer In this chapter, we address the problem of constructing a robustly stealthy attack policy on the side of malicious adversary) when a cyber-physical system CPS) is of non-minimum phase and is uncertain. While a traditional stealthy attack mimics the unstable zero dynamics of the plant and thus utilizes the full model knowledge, this work shows that another robust attack is enabled when the adversary employs the inverse model-based DOB as an attack generator. The main contents of this chapter are based on [PLS +, PSL + 16], and its contribution is listed as follows: We reveal that the recovery of the nominal performance in the conventional DOB is maintained for a while even if the plant is of non-minimum phase

33 10 Chap. 1. Introduction and thus the system is internally unstable), which allows the new attack to remain stealthy robustly. A remarkable observation is that fatal attacks on CPS are possible without exact system knowledge, particularly when the adversary employs robust control techniques.

34 Chapter 2 Recovery of Nominal Performance in Asymptotic Sense: Part I - Embedding Internal Model into Disturbance Observer Guaranteeing robust performance against model uncertainty and external disturbance is one of the long-standing issues on control systems. Nowadays, as of particular importance for precise control is the robust transient performance, the problem of recovering a pre-defined) nominal output trajectory for the entire time period is gaining considerable attentions in the literature. Several promising approaches to achieving this nominal performance recovery NPR), including extended high-gain observers [FK08, LMK16], disturbance observers DOB) [BS08, BS14], active disturbance rejection controllers [XH15], and L 1 adaptive controllers [CH08] have been concurrently developed just over a decade. It is interesting that all these approaches, even though they were invented independently, share a common methodology for the NPR. In the previous works, the effect of external inputs i.e., disturbances and references) and model uncertainty on the controlled system is represented as a lumped signal, so-called total disturbance, for whose estimation and compensation high-gain techniques are usually employed. Thus a standing assumption on the external inputs is only that they are bounded and slowly varying, whereas their structural information has not been explicitly used in the controller designs. This enables the resulting 11

35 12 Chap. 2. Disturbance Observer with Internal Model controllers applicable to a wide range of control systems that unmodeled disturbances dominantly enter, yet at the same time, as the internal model principle [FW76] interprets clearly, the NPR studied so far was restricted to an approximation; in other words, the real output may persistently remain around the nominal trajectory, but in the end it may not converge to. In this chapter, we present an extended notion of the NPR in an asymptotic sense from the perspective of the internal model principle [FW76]. In addition to keeping the distance of the actual and nominal outputs as close as desired as the traditional notion aimed at), this new NPR means that, as long as the disturbance and reference signals are generated by an exogenous system, the actual output asymptotically converges to the nominal trajectory. Moreover, it is also desired that the asymptotic NPR is maintained in an input-to-output stable sense in terms of additional unmodeled part of the external input. To the best of author s knowledge, this is the first time in the literature to extend the NPR in view of the internal model principle, which is one of the main contributions in this work. To tackle this problem, the DOB approach is adopted in the controller design. As is pointed out in [SJ07], the principle behind the robustness of the DOB is the compensating action of the total disturbance. This observation motivates the authors of [BS08, BS14] to employ the DOB with some refinements) as a tool for recovering nominal performance in an approximate fashion. On top of that, we develop a new DOB structure into which the internal model of the external inputs is embedded. Unlike other robust controllers that achieve the approximate NPR only, with the help of the internal model, the proposed DOB also perfectly estimates and compensates the modeled part of the total disturbance in the steadystate. This allows to carry out the asymptotic NPR from the new DOB scheme. The way of embedding the internal model into a DOB structure is inherently motivated by the recent researches [JPBS16, CT12], yet there are several significant contributions of this work beyond them. First, whereas only the disturbance model was taken into account in [JPBS16, CT12] for its rejection, we highlight that the reference model should be considered when it comes to the asymptotic NPR. Another improvement is that the order of the proposed DOB is reduced, since its construction is based on a reduced-order implementation of

36 2.1. Problem Formulation 13 the conventional DOB. In addition, a systematic design method for dealing with arbitrarily large but bounded) parametric uncertainty is provided in this work. Finally, the refined DOB structure in this paper makes the NPR guaranteed from the transient period, whereas this is often not the case for the linear DOBs in [JPBS16, CT12] because unavoidable initial peak of control input may exist as described in [BS08]). 2.1 Problem Formulation In this chapter, we consider a single-input single-output SISO) linear plant written in the Byrnes-Isidori normal form [Kha96, Chapter 13]: ż = Sz + GC ν x, 2.1.1a) ẋ = A ν x + B ν ψ z + ϕ x + gu + d) ), y = C ν x 2.1.1b) where z R n ν and x R ν are the states, u R is the input, y R is the output, d R is the external disturbance, and ν 1 and n ν are integers. For an integer i 1, the matrices A i, B i, and C i are defined as [ ] 0i 1 I i 1 A i := R i i, B i := 0 0 i 1 [ 0i 1 1 ] R i 1, C i := [ ] 1 0 i 1 R 1 i ) The scalar g and the matrices S, G, ψ, and ϕ are constants. The initial conditions z0) and x0) of the plant 2.1.1) belong in compact sets Z 0 R n ν and X 0 R ν, respectively. Remark It is well known that for any linear system, there always exists a suitable coordinate change with which the system is rewritten in the Byrnes- Isidori normal form as in 2.1.1). Throughout this chapter, we suppose that the plant 2.1.1) under consideration has possibly large but) bounded parametric uncertainty, as stated below. Assumption The components g, S, G, ψ, and ϕ in 2.1.1) are uncertain but bounded, and the bounds of the uncertain quantities are known. Specifically,

37 14 Chap. 2. Disturbance Observer with Internal Model there exist positive constants g and g such that 0 < g g g. Moreover, the internal dynamics 2.1.1a) of the plant is assumed to be stable. Assumption The plant 2.1.1) is of minimum phase that is, S in 2.1.1a) is Hurwitz). As a counterpart of the uncertain plant 2.1.1), the following nominal system without any uncertainty and disturbance is taken into account: ż n = S n z n + G n C ν x n, 2.1.3a) ẋ n = A ν x n + B ν ψ n z n + ϕ n x n + g n u n ), yn = C ν x n 2.1.3b) where z n R nn ν and x n R ν are the states, u n R is the control input, y n R is the output. It is noted that the dimension n n ν of the nominal model 2.1.3) is not necessarily the same as n of the actual one 2.1.1), so that structural uncertainty of the internal dynamics 2.1.1a), whose dimension is n ν, also can be considered. The parameters S n, G n, ψ n, ϕ n, and g n > 0 are some nominal counterparts of S, G, ψ, ϕ, and g, respectively. The nominal control input u n in 2.1.3) is supposed to be generated by an output feedback nominal controller ċ n = Ec n + F r y n ), u n = Jc n + Kr y n ) 2.1.4) designed a priori for the nominal system. Here c n R nc is the controller state with a nonnegative integer n c and thus 2.1.4) can be either static or dynamic), r R is a C 1 reference command for y n, and E, F, J, and K are constant matrices with appropriate dimensions. The controller 2.1.4) is supposed be designed such that the nominal closed-loop system 2.1.3) and 2.1.4) is internally stable, as well as its nominal) tracking performance is satisfactory. Assumption The system matrix of the nominal closed-loop system 2.1.3) and 2.1.4) S n G n C ν O A n := B ν ψn A ν + B ν ϕ n g n B ν KC ν g n B ν J 2.1.5) O F C ν E

38 2.1. Problem Formulation 15 is Hurwitz. Roughly speaking, we in this chapter are interested in recovering the tracking performance of the nominal closed-loop system 2.1.3) and 2.1.4), in the sense that the actual output yt) is forced to behave as the nominal one y n t). Since the two trajectories will be compared from the beginning of system operation, it is natural to assume that x n 0) = x0) X 0, or equivalently, y n t) and its time derivatives up to ν 1 are initiated by those of yt). On the other hand, we arbitrarily select some compact sets Zn 0 R nn ν and Cn 0 R nc and pick the remaining initial conditions z n 0) and c n 0) of the nominal closed-loop system in Zn 0 and Cn, 0 respectively. We further assume that the external inputs rt) and dt) in the plant 2.1.1) and the nominal closed-loop system 2.1.3) and 2.1.4) are bounded and partially generated by an internal model. Assumption The external inputs rt) and dt) are decomposed by rt) = r u t) + r m t), dt) = d u t) + d m t) 2.1.6) where a) r m t) and d m t) are biased sinusoidal signals r m t) = M rm,0 + d m t) = M dm,0 + n m i=1 n m i=1 M rm,i sin σ i t + φ rm,i ), M dm,i sin σ i t + φ dm,i ) 2.1.7a) 2.1.7b) where n m is the known nonnegative integer, the frequencies σ i > 0 of the sinusoids are known and distinct i.e., σ i σ j for i j), and the magnitudes M rm,i R and M dm,i R, and the phases φ rm,i [0, 2π) and φ dm,i [0, 2π) are uncertain but bounded with known bounds. b) The unmodeled parts r u t) and d u t) are of C 1 and bounded, whose time derivatives are also bounded.

39 16 Chap. 2. Disturbance Observer with Internal Model Under the assumption, it is clear that there exist some constants r 0 and d 0 such that [rt); ṙt)] r and [dt); dt)] d for all t 0. Now, we are ready to introduce the notions of the nominal performance recovery NPR). Definition For a given ϵ > 0, an output feedback controller ϱ = fϱ, y, r), u = hϱ, y, r) 2.1.8) is said to recover nominal performance within ϵ-bound if for each initial condition [z0); x0)] Z 0 X 0 of 2.1.1) and for each nominal output y n t) of 2.1.3) and 2.1.4) initiated at [z n 0); x0); c n 0)] Zn 0 X 0 Cn, 0 the output yt) of the closed-loop system 2.1.1) and 2.1.8) satisfies yt) y n t) ϵ, t ) where ϱ0) is a bounded function of [z n 0); c n 0)] Z 0 n C 0 n. Furthermore, if yt) y n t) k NPR,1 e h NPRt + k NPR,2 sup [r u ρ); ṙ u ρ); d u ρ); d u ρ)] 0 ρ t ), t ) additionally holds for some constants k NPR,i > 0 and h NPR > 0, then the output feedback controller 2.1.8) is said to recover nominal performance in an asymptotic sense within ϵ-bound. Notice that the nominal output trajectory y n t) considered in Definition is not uniquely determined, because there is no restriction on [z n 0); c n 0)] Z 0 n C 0 n. In fact, one can pick up any certain y n t) among several candidates, by selecting ϱ0) which is a function of [z n 0); c n 0)] Z 0 n C 0 n) suitably. Throughout this chapter, our attention will be paid to: Problem of Chapter 2. Given the plant 2.1.1), the nominal closed-loop system 2.1.3) and 2.1.4), and a threshold ϵ > 0, to construct an output feedback controller 2.1.8) that recovers nominal performance in an asymptotic sense within ϵ-bound in the sense of Definition under Assumptions

40 2.2. Controller Design 17 Remark We point out that most relevant works in literature were mainly interested in recovering the nominal performance just approximately similar to the former notion of Definition 2.1.1); that is to say, the two output trajectories yt) and y n t) may be close to each other but cannot converge to in the end. On the other hand, by relying on the structural information of the external inputs Assumption 2.1.4), the purpose of this chapter is to go beyond such an approximation and to recover nominal performance in asymptotic sense in Definition To interpret this new notion intuitively, for now assume that the external inputs rt) and dt) are fully modeled i.e., rt) = r m t) and dt) = d m t)). Then the additional requirement ) is simplified to lim yt) y nt) = 0; ) t or equivalently, the actual output yt) asymptotically converges to the ideal) nominal output y n t). This is why we put the term in an asymptotic sense in the definition.) In Definition 3.1.3, we generalized this concept in an input-tostate stability ISS) sense, with respect to the unmodeled inputs r u t) and d u t). 2.2 Controller Design As a solution to the problem of interest, we will construct the output feedback controller 2.1.8) based on the DOB approach. Motivated by the internal model principle [FW76], our key idea for the asymptotic recovery is to embed the generating model of [r m t); d m t)] into the DOB structure. To provide further insight into this embedding, in the following subsection we briefly look again at the conventional DOB in the frequency domain, with particular interest on the modeled external inputs.

41 18 Chap. 2. Disturbance Observer with Internal Model Motivating Idea from Frequency Domain Analysis We revisit the conventional DOB controlled system in Figure 1.2 where the Q-filter has the form of Qs; τ) = c lq τs) lq + + c 0 τs) nq + a nq 1τs) nq a 0 =: N qs; τ) D q s; τ) ) In the figure, the actual output ys) is represented with the external inputs ds) and rs) as where ys) = T yr s)rs) + T yd s)ds) 2.2.2) T yr s) := T yd s) := Ps)P n s)cs) Qs; τ) Ps) P n s) ) + P n s) 1 + Ps)Cs) ), Ps)P n s) 1 Qs; τ) ) Qs; τ) Ps) P n s) ) + P n s) 1 + Ps)Cs) ) a) 2.2.3b) In addition, we also write the nominal output y n s) as y n s) = P ns)cs) 1 + P n s)cs) rs) =: T ns)rs) ) Using these expressions, one can compute the difference between ys) and y n s) in the frequency domain as ys) y n s) = T yr s) T n s)) rs) + T yd s)ds) ) = Ps)P n s)cs) Qs; τ) Ps) P n s) ) + P n s) 1 + Ps)Cs) ) P ns)cs) 1 + P n s)cs) rs) Ps)P n s) 1 Qs; τ) ) + Qs; τ) Ps) P n s) ) + P n s) 1 + Ps)Cs) )ds) Ps) Pn s) ) Ps)P n s) 1 Qs; τ) ) = Qs; τ) Ps) Pn s) ) + P n s) 1 + Ps)Cs) )) 1 + P n s)cs) )rs) + Ps)P n s) 1 Qs; τ) ) Qs; τ) Ps) P n s) ) + P n s) 1 + Ps)Cs) )ds).

42 2.2. Controller Design 19 It is noted that all the effects of the external inputs ds) and rs) on the error ys) y n s) are filtered by 1 Qs; τ). Even though a typical conclusion with an arbitrary low-pass filter Qs; τ) is the approximation yjω) P njω)cjω) rjω) 2.2.5) 1 + P n jω)cjω) in the low frequency range where Qjω; τ) 1, one can go further by relying more on the internal model of the external inputs. For this, we assume for now that dt) = d m t) and rt) = r m t). Under the hypothesis, the Laplace transforms ds) and rs) of these signals turn out to be rs) = r m,0 s + nm i=1 r m,i s 2 + σ 2 i, ds) = d m,0 s + n m i=1 d m,i s 2 + σ 2 i 2.2.6) in which r m,i and d m,i are some uncertain constants. In turn, it readily follows from the final value theorem that, if the Q-filter Qs; τ) = N q s; τ)/d q s; τ) in 2.2.1) is properly designed to satisfy an additional constraint with a polynomial R q s; τ), D q s; τ) N q s; τ) = s n m i=1 s 2 + σ 2 i )R q s; τ) 2.2.7) lim yt) y nt)) = lim s ys) y n s) ) = ) t s 0 and thus, the nominal performance is not approximately but completely recovered in the steady state as long as the closed-loop system is stable). It is surprising that 2.2.8) with exponential rate of convergence by the linear system theory) is exactly the same as ) in Definition for the limited situation r u t) 0 and d u t) 0 as described in 2.1.2)) and moreover, all this can be done with a specific Q-filter satisfying 2.2.7). In the remainder of this subsection, we will extend this idea to the state space domain in order to deal with the transient behavior and unmodeled external inputs, keeping the constraint 2.2.7) on the Q-filter s coefficients in mind.

43 20 Chap. 2. Disturbance Observer with Internal Model Figure 2.1: An equivalent block diagram of conventional DOB Remark It should be noted that to derive the asymptotic behavior 2.2.8), the reference model as well as the disturbance model) should be taken into account in the constraint 2.2.7). Intuitively, this requirement is because the total disturbance to be compensated consists of not only the disturbance but also uncertain quantities where the latter may be multiplied by a reference signal. In the meanwhile, another way of interpreting this phenomenon might be to take a closer look at the equivalent block diagram of the linear DOB in Figure 2.1. In the figure, a hidden block 1/1 Qs; τ)) explicitly comes out, which is computed under the constraint 2.2.7) as follows: 1 1 Qs; τ) = D q s; τ) D q s; τ) N q s; τ) = 1 s n m i=1 s2 + σi 2) D qs; τ) R q s; τ). In this regard, it can be said that by the constraint 2.2.7), the internal model of the external modeled inputs r m t) and d m t) is embedded into the DOB structure in view of the input-to-output relation). Remark The first attempt to embed an internal model into the DOB structure was found in [YKIH97]. In [YKIH97, PJSB12], multiple integrators were taken into account as a disturbance model, under the philosophy that any analytic disturbance can be approximated by a polynomial-in-time signal i.e., d m t) = d 0 + d 1 t + + d k t k ). It has been seen that the resulting DOB with multiple integrators, called high-order DOB or type-k DOB), could present a

44 2.2. Controller Design 21 better disturbance rejection ability than the conventional DOB. More recently, the authors of [CT12, JPBS16] proposed linear DOB structures that contain the generating model of the sinusoidal disturbances in continuous- and discrete-time domains, respectively), whose goal is to eliminate the modeled disturbance exactly in the steady state. All these studies shared the common idea for embedding the disturbance model while the details are different) as described in the above paragraph, which partially motivates the work of this chapter Reduced-order Implementation of Disturbance Observer with Higher Order Numerator of Q-filter As an intermediate step for the DOB design, in this subsection we implement the conventional DOB in Figure 1.2 into the state space. In particular, while a traditional way is to realize the two components P 1 n s)qs; τ) and Qs; τ) in the figure directly as in [SJ07]), we here present another realization of the DOB by transforming the DOB into an equivalent structure. This alternative method allows to reduce the total order of the controller and to simplify its performance analysis, as clarified later. domain We begin with the typical expression of the DOB output ws) in the frequency and with the Q-filter ws) = Qs; τ)us) + P 1 n s)qs; τ)ys) 2.2.9) Qs; τ) = c lq τs) lq + + c 0 τs) ν+lq + a ν+lq 1τs) ν+lq a ) so that its relative degree n q l q is the same as that of the nominal model P n s). By transforming the Byrnes-Isidori normal form 2.1.4) of P n s) into the s-domain, one can rewrite the inverse dynamics P 1 n s)ys) of the nominal plant as follows: P 1 n s)ys) = 1 ) s ν ys) ψn z g ns) ϕ n [1; s;... ; s ν 1 ]ys) n ) = 1 g n ψ n z ns) + 1 g n s ν ϕ n,1 ϕ n,ν s ν 1) ys)

45 22 Chap. 2. Disturbance Observer with Internal Model Figure 2.2: Equivalent representation ) of conventional DOB based on Byrnes-Isidori normal form of P n s) where z ns) = si S n ) 1 G n ys) ) Applying ) into 2.2.9) then brings an equivalent representation of ws) ws) = Qs; τ) us) + 1 ) ψn z g ns) n + Qs; τ) s ν ϕ n,1 ϕ n,ν s ν 1) 1 g n ys) with ), whose configuration is shown in Figure ) Based on this finding, from now on we realize ) instead of 2.2.9) in the state space. Note that for the polynomial N q s; τ) s ν ϕ n,1 ϕ n,ν s ν 1), its coefficient of s i, k = 0,..., ν + l q, is computed by i ϕ n,j+1 c i j τ i j j=0 for simplicity, let ϕ n,ν+1 = 1, ϕ n,ν+2 = = ϕ n,ν+lq+1 = 0, and c lq+1 = =

46 2.2. Controller Design 23 c ν+lq = 0). From this fact, one can rewrite the transfer function Qs; τ) s ν ϕ n,1 ϕ n,ν s ν 1) in ), which is biproper and has the high-frequency gain as c lq /τ ν, as Qs; τ) s ν ϕ n,1 ϕ n,ν s ν 1) = c l q τ ν + N qs; τ) s ν ϕ n,1 ϕ n,ν s ν 1) c lq /τ ν )D q s; τ) D q s; τ) = c l q τ ν + b ν+lq 1τs) ν+lq b 0 τs) ν+lq + a ν+lq 1τs) ν+lq a 0 =: c l q τ ν + B qs; τ) D q s; τ) ) where the coefficients b i, i = 0,..., ν + l q 1, are given by b i := 1 τ i i ϕ n,j+1 c i j τ i j c lq τ i ν a i ) ) j=0 In short, another representation of ws) is given by ws) = 1 N q s; τ) us) + 1 ) ψn z D q s; τ) g ns) + B q s; τ) 1 ) ys) n g n + c l q 1 τ ν ys) ) g n Now, by implementing ) and the dual-input single-output system ) with respect to the inputs us) + 1/g n )ψ n z ns) and 1/g n )ys) in the state space particularly in the observable canonical form for the latter), we obtain a new state-space representation of the DOB as follows: ż n = S n z n + G n y, ṗ = A ν+lq Υ 1 ) ν+l q τ)αc ν+lq p Υ 1 ν+l q τ)γ u + 1 ψn z n g n w = C ν+lq p + c l q τ ν 1 g n y ) + Υ 1 ν+l q τ)β 1 g n y, a) b) c) where z n R nn ν and q R ν+lq are the states, u R and y R are the inputs,

47 24 Chap. 2. Disturbance Observer with Internal Model and w R is the output. For a positive integer i 1, Υ i τ) := diagτ,..., τ i ) R i i, ) and the vectors α R ν+lq, β R ν+lq, and γ R ν+lq are defined as α := a ν+lq 1 a ν+lq 2., β := b ν+lq 1 b ν+lq 2., γ := 0 ν 1 c ν+lq 1 a 0 b 0 c ) We emphasize that the total order of the state-space realization ) is now n + l q, which is less than that obtained from the conventional way in [SJ07]. Remark The work in this subsection in fact generalizes the previous result of [BS14], in the sense that the Q-filter ) here is allowed to have a higher order numerator i.e., l q 0). This additional freedom will play a crucial role in achieving both robust stability of the closed-loop system and the constraint 2.2.7) for embedding the internal model of [r m t); d m t)] at once Design of Disturbance Observer with Internal Model Based on the results of the previous subsection, we now construct the controller 2.1.8) of interest as the combination of the reduced-order DOB ), the baseline controller ċ = Ec + F r y), u BL = Jc + Kr y) ) having the same structure as the nominal controller 2.1.4), and the composite control law u = u BL s w w), ) while the saturation function s w : R R and the parameters a i, c i, and τ of the DOB will be determined throughout this subsection.

48 2.2. Controller Design 25 Firstly, we set the dimension l q of the numerator of Qs; τ) in ) as 2n m. Then choose the coefficients a i, i = 0,..., 2n m 1, of the denominator of Qs; τ) such that the transfer function s ν+2nm + a ν+2nm 1s ν+2nm a 2nm+1s 2nm+1 + g g n a 2nm s 2nm + + g g n a 0 s ν+2nm + a ν+2nm 1s ν+2nm a 2nm+1s 2nm+1 + g a 2nm s g 2nm + + g a 0 n g n ) is strictly positive real SPR) [Kha96, Chapter 6] where g and g are the bounds of the high-frequency gain g of the plant 2.1.1) in Assumption 2.1.1). As pointed out in the following theorem, finding the coefficients a i is always possible even for a general form of ). Theorem For given g g > 0 and g n > 0 and positive integers k and j, there exist a i, i = 0,..., k + j 1, such that the transfer function Z k,j s) := s k+j + a k+j 1 s k+j 1 + a j+1 s j+1 + g g n a j s j + + g g n a 0 s k+j + a k+j 1 s k+j 1 + a j+1 s j+1 + g g n a j s j + + g g n a ) is SPR. Notice that the transfer function ) in our case is nothing but Z k,j s) in ) with k = ν and j = 2n m. Two ways of deriving such a i are presented in Appendix A.1. First, as a concrete proof of the theorem, a recursive design guideline is provided in Appendix A.1.1. While the recursive method may be complicated and even bring a conservative value in some cases, we also introduce a bilinear matrix inequality BMI)-based design method in Appendix A.1.2 by recasting the problem in Theorem as an optimization problem. Next, for the selection of c i, define a bundle of Vandermonde matrices 1 τ 2 θ 1 ) 1 τ 2 θ 1 ) i W i θ; τ) :=... Rnm i+1) ) 1 τ 2 θ nm ) 1 τ 2 θ nm ) i

49 26 Chap. 2. Disturbance Observer with Internal Model where θ = [θ 1 ; ; θ nm ] := [σ 2 1 ; ; σ2 n m ]. It is noticed that W nm 1θ; τ) is a square matrix whose determinant is given by det W nm 1θ; τ) ) = τ 2 i jθ i θ j ), ) and thus it is invertible for any τ > 0 and distinct frequencies σ i of the sinusoids 2.1.7). With τ to be determined later in Theorem 2.2.3, the coefficients c i of the Q-filter ) are selected as c 1 c 3. c 2nm 1 c 2 c 4. c 2nm = W 1 n m 1 θ; τ)w n m ν+n ) θ; τ)α odd, = W 1 n m 1 θ; τ)w n m ν n ) θ; τ)α even, a) b) and c 0 = a 0 where if ν is even, then n := 0 and α odd := a 1 a 3. a ν+2nm 1 R ν+2nm)/2, α even := a 2 a 4. a ν+2nm 2 1 R ν+2nm)/2 ;

50 2.2. Controller Design 27 if ν is odd, then n := 1 and α odd := a 1 a 3. a ν+2nm 2 1 R ν+2nm+1)/2, α even := a 2 a 4. a ν+2nm 1 R ν+2nm 1)/2. Since each coefficient c i in ) is a function of τ and σ, we often use c i θ; τ) and γθ; τ) instead of c i and γ, respectively. It is important to note that the fundamental reason for the selection of c i is to put the internal model of [r m t); d m t)] into the DOB structure in the sense of 2.2.7) even regardless of the design parameters a i and τ > 0), as in the following lemma-. Lemma For any given a i, τ > 0, and σ i > 0, the coefficients c i θ; τ) selected as in ) satisfy the equality 2.2.7). Moreover, they have the form of c i θ; τ) = a i + τ 2 c i θ; τ), i = 0,..., 2n m, where each c i θ; τ) is a polynomial of τ. Proof. For the first item, it is enough to show that [ ] D q s; τ) N q s; τ) = 0 s=±jσ i for all i = 1,..., n m while D q 0; τ) N q 0; τ) = 0 because a 0 = c 0 ). On the other hand, the second item is trivial, because Wn W m 1 n m ν n ) = [ I nm diag τ 2 θ 1 ) nm,..., τ 2 θ nm ) nm) W 1 2 ν n ) For the detailed proof, the readers are referred to [JPBS16]. On the other hand, even though c i θ; τ) themselves may seem ill-defined when τ = 0 by its definition), the second item of the proposition shows lim τ 0 c i θ; τ) = a i which enables us to take c i θ; 0) = a i for the analysis to come. ].

51 28 Chap. 2. Disturbance Observer with Internal Model Notice that once a i, c i, and τ are given, the remaining coefficients b i = b i θ; τ) are automatically selected as in ). As the last step, the saturation function s w for the output w of the DOB in ) is designed below. For this purpose, we take into account the nominal closed-loop system 2.1.3) and 2.1.4) together with an auxiliary internal dynamics ż aux = Sz aux + Gy n = Sz aux + GC ν x n, ) which mimics the actual z-dynamics 2.1.1a) with the input replaced by the nominal output y n, and with the same initial condition z aux 0) = z0) Z 0. For this extended nominal closed-loop system, let the scalar signal d total,n := 1 ψ z aux + ϕ x n + g Jc n + Kr C ν x n ) + d ) g ψn z n ϕ n x n g n Jcn + Kr C ν x n ) )) ) be an additional output. It will be clarified shortly that d total,n in ) indicates a nominal counterpart of the total disturbance in the time domain, which will be captured by the proposed DOB.) Then the extended system with respect to the input [rt); dt)] and the output [y n t); d total,n t)] is bounded-input bounded-output BIBO) stable, because S is Hurwitz by Assumption 2.1.2), and the nominal closed-loop system 2.1.3) and 2.1.4) is internally stable by Assumption 2.1.3). It follows that the set of the partial output d total,n t) D total,n := { d total,n t) generated by 2.1.3), 2.1.4), and ) : z aux 0) Z 0, [z n 0); x n 0); c n 0)] Zn 0 X 0 Cn, ) [rt); ṙt)] r, [dt); dt)] } d, t 0 R is a bounded set. Finally, with a strictly larger compact set D total,n D total,n, we design s w in ) as a C 1 and bounded function such that s w w) = w, w D total,n and 0 d dw s w 1, w R )

52 2.3. Performance Analysis 29 Plant Figure 2.3: Closed-loop system with proposed DOB-based controller ), ), and ) In summary, with the design parameters determined above and sufficiently small τ > 0, the proposed controller in this chapter consists of the reducedorder) DOB ) with the internal model, the baseline controller ), and the composite control law ), as is seen in Figure 2.3. We close this section by introducing our main result on the asymptotic NPR in Definition 2.1.1, whose detailed proof is given in the next section. Theorem Suppose that Assumptions hold. Then for given ϵ > 0, there is τ > 0 such that the proposed DOB-based controller ), ), and ) recovers nominal performance in an asymptotic sense with ϵ-bound for all τ 0, τ). In particular, an initial condition [z n0); q0); c0)] of the controller corresponding to the nominal output trajectory y n t) with [z n 0); c n 0)] Zn 0 Cn 0 is given by [z n0); p0); c0)] = [z n 0); 0 ν ; c n 0)]. 2.3 Performance Analysis The proof of Theorem will be proceeded as follows. In Subsection 2.3.1, we first transform the entire DOB-controlled system 2.1.1), ), ), and ) into a singular perturbation form [KKO99, Kha96], especially taking into account the generating model of the modeled external input [r m t); d m t)].

53 30 Chap. 2. Disturbance Observer with Internal Model After that, to figure out transient and steady-state behaviors of the transformed system, Subsection presents Lyapunov analysis in the sense of the singular perturbation theory, from which the proof of the theorem is concluded. For convenience, hereinafter we often drop the terms θ) and θ; τ) in the variable and the subscript i in the matrix Υ i if trivial Coordinate Transformation to Singular Perturbation Form We first employ stacked state variables z n χ := x Rn+nc and χ n := c z n x n c n Rn+nc 2.3.1) of the actual closed-loop system 2.1.1), ), ), and ), and the nominal closed-loop system 2.1.3) and 2.1.4), respectively. The initial condition χ n 0) is set to χ0) as in the statement of Definition 2.1.1). To compute the time derivatives of the new variables, we express the x- dynamics 2.1.1b) using the nominal components in 2.1.3b) as follows: ẋ = A ν x + B ν ψ n z n + ϕ n x + g n u BL ) B ν g s w w) d total ) 2.3.2) where d total R is defined by d total := 1 g ψ z + ϕ x + g Jc + Kr C ν x) ) + gd ) 2.3.3) ψ n z n ϕ n x g n Jc + Kr Cν x) )). Then with A n given in Assumption and the new definitions 0 B n := g n B ν K, C n := F [0 C ν 0 ], E χ := 0 B ν g, 2.3.4) 0

54 2.3. Performance Analysis 31 it is easy to obtain that y = C n χ, χ = A n χ + B n r + E χ sw w) d total ), 2.3.5) and y n = C n χ n, χ n = A n χ n + B n r ) It is important to note that if the output of the DOB wt) satisfies wt) d total t) D total,n, 2.3.7) then the actual χ-dynamics 2.3.5) is the same as the nominal one 2.3.6) exactly and so, the NPR of our interest is completely achieved that is, yt) y n t)). From this viewpoint, we call d total in 2.3.3) as the total disturbance [SPJ + 16, Han09]. For further analysis, let us define a nonsingular matrix ϕ n,ν Φ n :=..... R ν ν ) ϕ n,3 ϕ n,4 1 0 ϕ n,2 ϕ n,3 ϕ n,ν 1 In addition, with the new symbols ϕ n := Γθ; τ) := ϕ n,ν. ϕ n,1 Rν, [ ] A ν 1 ν+l q Υ 1 γ Υ 1 γ R ν+lq) ν, 2.3.9a) 2.3.9b) the vector β = βθ; τ) in ) can be expressed in a simpler form β = Υ c ) l q τ ν Υ 1 α + A ν ν+l q Υ 1 γ ϕ n,ν A ν 1 ν+l q Υ 1 γ ϕ n,1 Υ 1 γ = c l q τ ν α + ΥAν ν+l q Υ 1 γ Υ ν+lq Γϕ n )

55 32 Chap. 2. Disturbance Observer with Internal Model We then obtain the following lemma, by which the p-dynamics b) can be viewed as a fast dynamics from the perspective of the singular perturbation theory. Lemma In the coordinate change η := 1 ) τ Υ 1 ν+l q τ) p + Γθ; τ)φ n x, ) g n where Φ n and Γθ; τ) are given in 2.3.8) and 2.3.9a), respectively, the p-dynamics b) is transformed into τ η = ) A ν+lq αc ν+lq η ) ) + 1 ggn γθ; τ)s w Cν+lq η ) + g γθ; τ)d total. g n Proof. Using the p-dynamics b), the control input ), and the x- dynamics 2.3.2), one can differentiate η in ) as η = 1 τ Υṗ + 1 τ ΥΓΦ 1 n ẋ g n = 1 [ τ Υ Aν+lq Υ 1 ) αc ν+lq p ) Υ 1 γ u BL s w w) + 1 ) ψn z n + Υ 1 β 1 ] C ν x g n g n + 1 [ τ ΥΓΦ 1 ) n A ν + B ν ϕ n x g n + g n B ν u BL + 1 ) ψn z ) ] n gb ν sw w) d total g n ) g γ ΥΓΦ n B ν s w w) g n ) = 1 τ Υ A ν+lq Υ 1 ) 1 αc ν+lq p + τ + 1 τ γ + ΥΓΦ nb ν ) u BL + 1 g n ψ n z n + 1 } 1 {Υ τ Υ 1 βc ν + ΓΦ n A ν + B ν ϕ n ) x + 1 g n τ ΥΓΦ g nb ν = 1 τ Υ A ν+lq Υ 1 αc ν+lq ) p + 1 τ d total. g ) n 1 ggn γs w w) )

56 2.3. Performance Analysis τ Υ {Υ 1 βc ν + ΓΦ n A ν + B ν ϕ n )} 1 g n x + 1 τ γ g g n d total where the last equality comes from ΥΓΦ n B ν ) = ΥΓB ν = γ ) From now on, we claim that the matrix in the bracket of the last law satisfies Υ 1 βc ν + ΓΦ n A ν + B ν ϕ n ) = A ν+lq Υ 1 αc ν+lq )ΓΦ n ) Indeed, by the expression of β in ), one has Υ 1 βc ν + ΓΦ n A ν + B ν ϕ n ) ) = c ) l q τ ν Υ 1 α + A ν ν+l q Υ 1 γ Γϕ n C ν + ΓΦ n A ν + B ν ϕ n ) = c l q τ ν Υ 1 αc ν + A ν ν+l q Υ 1 γc ν + Γ To proceed, we derive ϕ n C ν + Φ n A ν + B ν ϕ n ) ). ϕ n C ν + Φ n A ν + B ν ϕ n ) ϕ n,ν ϕ n,ν ϕ.. n,ν 0 0 = ϕ n, ϕ n,3 ϕ n,ν 1 ϕ n, ϕ n, ϕ n,ν = ϕ n,3 ϕ n,4 1 0 = A ν Φ n ) ϕ n,2 ϕ n,3 ϕ n,ν

57 34 Chap. 2. Disturbance Observer with Internal Model From ) and C ν = C ν Φ n, the last two terms in ) are computed by A ν ν+l q Υ 1 γc ν + Γ [ = A ν ν+l q Υ 1 γc ν + = A ν ν+l q Υ 1 γc ν Φ n + ) ϕ n C ν + Φ n A ν + B ν ϕ n ) A ν 1 ] A ν Φ n ν+l q Υ 1 γ Υ 1 γ [ 0 ν+lq A ν 1 ν+l q Υ 1 γ A ν+lq Υ 1 γ ] Φ n = A ν+lq ΓΦ n ) By applying ) and to ), the claim is proved. With the matrix equalities ) and C ν+lq Γ)Φ n = c l q τ ν C νφ n = c l q τ ν C ν ) p = τυ 1 η ΓΦ n 1 g n x, w = η 1 = C ν+lq η, ) it is easy to see that the time derivative of η in ) becomes η = 1 τ Υ A ν+lq Υ 1 ) 1 ) αc ν+lq p + ΓΦ n x g n 1 ggn ) + 1 γs w w) + 1 τ τ γ g d total g n = 1 τ Υ A ν+lq Υ 1 ) αc ν+lq τυ 1 η + 1 ) 1 ggn γs w C ν+lq η) + 1 τ τ γ g d total. g n Finally, substituting ) ΥA ν+lq Υ 1 = 1 τ A ν+l q, C ν+lq Υ 1 = 1 τ C ν+l q ) to ) concludes the proof of the lemma. We have observed that in the coordinate ) for the state p, the actual closed-loop system 2.1.1), ), ), and ) is represented as a standard singular perturbation form with respect to the perturbation parameter τ,

58 2.3. Performance Analysis 35 consisting of 2.1.1a), 2.3.5) and ). Following the convention of the singular perturbation theory [Kha96, KKO99], in what follows we call η as fast variable, while the remaining variables z, χ, d total, r, and d as slow variables. In order to analyze the nature of the fast variable η, we shall study the boundary layer of the singularly perturbed system 2.1.1a), 2.3.5) and ). For this purpose, assume for now that all the slow variables are frozen as their initial values that is, z = z0) Z 0, χ = χ n 0) Z 0 n X 0 C 0 n, ) z = z0) Z 0, χ = χ n 0) Z 0 n X 0 C 0 n and d total = d total,n 0) D total,n ), and compute a solution η = [η 1 ; ; η ν+l q ] of the degenerating equation 0 = ) ) A ν+lq αc ν+lq η + 1 ggn γθ; 0)s w Cν+lq η ) + g g n γθ; 0)d total, ) which is derived by putting τ = 0 into the fast dynamics ). In particular, the last row of ) is given by ) 0 = a 0 η1 + 1 ggn c 0 θ; 0)s w Cν+lq η ) + g c 0 θ; 0)d total ) g n ) ) = a 0 η ggn ) s w η g 1 + d total g n where a 0 = c 0 θ; 0) is used. We note that the right-hand side of the last row is a monotonically decreasing function of η 1, because for any a 0 > 0 and 0 < g g g, η 1 ) a 0 η ggn ) s w η g 1 + d total g n = a g ) ) sw g n η1 ) a 0 g g n < 0, η 1 R ) by the construction of s w. See ).) This yields that the solution η 1 of ) and thus η of the overall equation )) is uniquely determined.

59 36 Chap. 2. Disturbance Observer with Internal Model ) Moreover, using the fact that the frozen variable d total satisfies s w dtotal = d total D total,n, one can easily find out the explicit form of η as η = 1 a ν+µ 1. a µ+1 0 µ d total =: α d total ) In accordance with the singular perturbation theory [Kha96, KKO99], η ) is called the quasi-steady-state of the fast variable η. in We remark that if the fast variable ηt) lies on the boundary layer η = η from the beginning, then wt) = η 1 t) η 1t) = d total t) and therefore, the nominal performance is exactly recovered as aforementioned below 2.3.7).) Thus the singular perturbation theory [Kha96, KKO99] may say that, as long as the stability of the slow and fast subsystems is guaranteed and τ is chosen sufficiently small, the output yt) of the χ-dynamics 2.3.5) converges to and remains close to the nominal output y n t) of the χ n -dynamics 2.3.6). However, this interpretation is not yet sufficient for the asymptotic NPR. One of the obstacles we encounter is that the standard singular perturbation theory [Kha96, KKO99] leads to approximate consequences in general, which makes it vague whether or not yt) asymptotically converges to y n t) when [r u t); d u t)] 0. As a remedy to this issue, from now on we extend the quasi-steady-state η in ) in the sense that the effect of the modeled inputs r m t) and d m t) comes out explicitly. For this, we first revisit the auxiliary output d total,n t) of the extended nominal closed-loop system ) and 2.3.6). In accordance with the linear system theory, the steady-state response of d total,n t), denoted by d total,n t),

60 2.3. Performance Analysis 37 can be decomposed as d total,n t) = d total,nu t) + d total,nm t) ) where the partial steady-state response d total,nu t) and d total,nm t) correspond to the unmodeled input [r u t); d u t)] and the modeled one [r m t); d m t)], respectively. In particular, the latter must have the sinusoidal form n m d total,nm t) = M total,nm,0 + Mtotal,nm,i sinσ it + φ total,nm,i ) ) i=1 for some constants M total,nm,i and φ total,nm,,i [0, π). Now let υ mt, θ; τ) be the sufficiently smooth signal υ m = υ m,1. υ m,ν+l q := γθ; τ) γθ; 0) ) d total,nm τα d total,nm ) At last, an extension of the quasi-steady-state η is given by 0 υ m,1 ηext := η τυm,1 1) + υm,2. ν+lq 1 j=1 τ ν+lq 1 j υm,j ν+lq 1 j) 0 υm,1 = α t) d total τυm,1 1) + υm, ). ν+lq 1 j=1 τ ν+lq 1 j υm,j ν+lq 1 j) The extended quasi-steady-state η ext in ) is slightly shifted from the traditional one η t) in ), by an amount proportional to τ and [r m t); d m t)]; that is, if τ = 0 or there is no modeled input i.e., [r m t); d m t)] 0), then the

61 38 Chap. 2. Disturbance Observer with Internal Model additional term in ) disappears and thus η ext = η. With the notion of the extended quasi-steady-state, we are now ready to present an error dynamics to be used for the convergence analysis. Lemma In the coordinate changes z := z z aux, χ := x c z n z n x n c n, η ext := η ηext, ) in which η and ηext are defined in ) and ), the closed-loop system 2.1.1), ), ), and ) is transformed into z = S z + GC n χ, χ = A n χ + E χ Ω C ν+lq η ext, d total ), a) b) ỹ := C n χ, d total = d total,n t) + C total,1 z + C total,2 χ c) and ) τ η ext = A ν+lq αc ν+lq ) η ext + 1 ggn γθ; 0)Ω ) C ν+lq η ext, d total + δt, η ext,1, d total ; τ) ) where A n, C n, and E χ are given in 2.1.5) and 2.3.4), C total,1 := 1 g ψ, C total,2 := 1 g a) [ ] ψn ϕ ϕ n ) g g n )KC ν g g n )J, b) and Ω η ext,1, d total ) := s w w) d total ) = s w Cν+lq η ext,1 + d total dtotal, a) δt, η ext,1, d total ; τ) := 1 g ) γθ; ) τ) γθ; 0) Ω ηext,1, d total ) g n

62 2.3. Performance Analysis 39 + γθ; τ) γθ; 0) ) d total d total,nm t)) τα d total d total,nm t)) b) Proof. The slow error dynamics ) is easily obtained by subtracting the z aux, χ n )-dynamics ) and 2.3.6) from the z, χ)-dynamics 2.1.1a) and 2.3.6) and by noting that w = C ν+lq η = C ν+lq η ext + C ν+lq η ext = C ν+lq η ext + d total. In order to derive the fast error dynamics ), we first consider an intermediate error variable η := η η with the original quasi-steady-state η, which satisfies η ext,1 = η 1, i 1 η ext,i+1 = η i+1 + τ τ i 1 j υm,j i j) + υm,i, j=1 i = 1,..., ν + l q 1, a) b) by definition. It follows from the η-dynamics ) and a) that τ η = τ η τ η ) = ) A ν+lq αc ν+lq η + 1 g ) γθ; 0)ΩC ν+lq η, d total ) g n + 1 g ) γθ; ) τ) γθ; 0) ΩCν+lq η, d total ) g n + γθ; τ) γθ; 0) ) d total τα d total = A ν+lq αc ν+lq ) η + 1 g g n ) γθ; 0)ΩC ν+lq η, d total ) + υ mt, θ; τ) + δt, C ν+lq η, d total ; τ). Now, by differentiating η ext in ) and by applying ) and b) to

63 40 Chap. 2. Disturbance Observer with Internal Model the result, we have the η ext -dynamics as follows: ) τ η ext = A ν+lq αc ν+lq ) η ext + 1 ggn γθ; 0)Ω ) C ν+lq η ext, d total ν+l q + δt, C ν+lq η ext, d total ; τ) + B ν+lq j=1 τ ν+lq j υ m,j ν+lq j) ) The proof of the lemma is then completed by showing that the summation in ) is actually zero. Indeed, each component of υ mt) in ) is represented by for convenience, a ν+lq := 1) υm,jt, θ; τ) τa ν+lq+1 j d total,nm t), j = 1,..., ν 1, = c lq θ; τ) a lq )d total,nm t) τa l q+1d total,nm t), j = ν, c ν+lq jθ; τ) a ν+lq j)d total,nm t), j = ν + 1,..., ν + l q. Hence, with the differential operator s := d/dt, one has ν+l q τs) ν+lq j υm,jt, θ; τ) j=1 ν 1 = τs) ν+lq j a ) ν+lq+1 jτs) d total,nm t) j=1 + τs) lq c lq θ; τ) a lq ) a lq+1τs) ) d total,nm t) + ν+l q j=ν+1 τs) ν+lq j c ν+lq jθ; τ) a ν+lq j) d total,nm t) [ = a ν+lq τs) ν+lq a ν+lq 1τs) ν+lq 1 a 0 ] + c lq θ; τ)τs) lq + + c 0 θ; τ) d total,nm t) = [ D q s; τ) N q s; τ) ] d total,nm t) where N q s; τ) and D q s; τ) are the numerator and denominator of Qs; τ) in ). Since the coefficients c i θ; τ) are chosen such that 2.2.7) holds for any given a i and τ > 0 as in Proposition 2.2.2), the sinusoid d total,nm t) in )

64 2.3. Performance Analysis 41 whose frequencies are σ i ) satisfies ν+l q τs) ν+lq j υm,jt, θ; τ) = [ D q s; τ) N q s; τ) ] d total,nm t) j=1 = s n m i=1 which concludes the proof of the lemma. s 2 + σi 2 )R q s; τ)d total,nm t) = 0, We also remark some properties of the nonlinear functions Ω and δ in ), which will be useful in the following analysis. Lemma Suppose that the inclusion d total = d total,n + C total,1 z + C total,2 χ D total,n ) holds. Then the following statements are satisfied. a) Ω0, d total ) = 0 and Ω η ext,1, d total ) belongs to the sector [0, 1] with respect to the input η ext,1 : that is, 0 η ext,1 Ω η ext,1, d total ) ) b) For τ 0, 1), δ t, η ext,1, d total ; τ ) τk δ,1 z + τk δ,2 χ + τk δ,3 η ext + τk δ,4 sup [r u ρ); ṙ u ρ); d u ρ); d ) u ρ)] 0 ρ t + τk δ,5 e h δt where k δ,j, j = 1,..., 4, and h δ are positive constants independent of τ. Proof. The item a) is trivial, because of the construction of s w. For the item b),

65 42 Chap. 2. Disturbance Observer with Internal Model we rewrite the difference between d total and d total,nm as d total d total,nm = d total d total,n ) + d total,n d total,n ) + d total,n d total,nm ) = C total,1 z + C total,2 χ + d total,n d total,n ) + d total,nu ) in which the last equality results from ). It is noted that the second term d total,n t) d total,n t) implies the transient response of d total,nt) by definition, which vanishes exponentially as time goes on. On the other hand, for the partial steady-state response d total,nu t) corresponding to [r ut); d u t)], one can obtain an upper bound of [d total,nu t); d total,nu t)] that is proportional to sup 0 ρ t [r u ρ); ṙ u ρ); d u ρ); d u ρ)]. Consequently, the item b) is derived from the item a), the z, χ)-dynamics ), the equality ), and the fact that γθ; τ) γθ; 0) k γ τ for a τ-independent constant k γ > 0 and for all τ 0, 1) Lyapunov Analysis Based on the results of the previous subsection, the rest of this section is devoted to prove Theorem with the error dynamics ) and ). To this end, we now present a Lyapunov function candidate for the singularly perturbed system ) and ) as follows. For the slow subsystems a) and b) whose system matrices S and A n are Hurwitz, define V slow z, χ ) := z P z z + χ P χ χ ) where the matrices P z = P z > 0 and P χ = P χ > 0 are the solutions of the Lyapunov equations S P z + P z S = I, A n P χ + P χ A n = I ) To obtain a Lyapunov function for the fast subsystem ), let us consider the boundary-layer system of the singular perturbation form ) and ),

66 2.3. Performance Analysis 43 which is given by ) d dς η ext = A ν+lq αc ν+lq ) η ext + 1 ggn γθ; 0)Ω ) C ν+lq η ext, d total ) where ς := t/τ is a scaled time variable, and the slow variable d total in ) is assumed to be frozen as d total = d total 0) D total,n. We claim that the origin of the boundary-layer system ) is globally exponentially stable. Indeed, with the symbols u η := g/g n 1)Ω and y η := C ν+lq η ext, one can rewrite ) into the form of a Lur e-type system [Kha96] d dς η ext = A ν+lq αc ν+lq ) η ext + γθ; 0)u η, y η = C ν+lq η ext, a) ) g u η = 1 Ω y η, d total t) ) b) g n where t = ς/τ. Notice that for the linear subsystem a) from u η to y η ), its transfer function is given by C ν+lq si A ν+lq + αc ν+lq ) 1 γθ; 0) = a lq s lq + + a 1 s + a 0 s ν+lq + a ν+lq 1s ν+lq a 1 s + a 0. where the equalities c i 0) = a i 0), i = 0,..., n m are used. Then by the selection of a i, it follows that 1 + g/g n 1)C ν+lq si A ν+lq + αc ν+lq ) 1 γθ; 0) 1 + g/g n 1)C ν+lq si A ν+lq + αc ν+lq ) 1 γθ; 0) = Z ν,l q s) is SPR [Kha96]. In addition, the item a) of Lemma and Assumption imply that as long as d total is included in D total,n which is the case when the slow variables are frozen), the nonlinear function g/g n 1)Ω in b) belongs to the sector [g/g n 1, g/g n 1] with respect to the input y η. As a result, the circle criterion [Kha96, Theorem 7.1] concludes that the origin of the Lur e-type system ) and thus that of the boundary-layer system )) is globally

67 44 Chap. 2. Disturbance Observer with Internal Model exponentially stable; more precisely, there exists a quadratic Lyapunov function V fast η ext ) = η extp η η ext ) with a positive definite matrix P η = P η along with ) is given by > 0 such that the time derivative of V fast τ V ) Pη fast = A ν+lq αc ν+lq ) η ext + γθ; 0)u η η ext ) ) + η extp η A ν+lq αc ν+lq ) η ext + γθ; 0)u η η ext η ext. We note in advance that ) is still valid even if d total t) in ) is not frozen but slowly varying and satisfies ). Finally, integrating two partial candidates V slow and V fast into one, a Lyapunov function candidate for the overall system ) and ) is presented as follows: V z, χ, η ext ) := Vslow z, χ) + τv fast η ext ) = z P z z + χ P χ χ + τ η extp η η ext ) For simplicity, in what follows we will use V t) instead of V zt), χt), η ext t)) and V slow t) and V fast t) similarly). Before going on further, it should be pointed out that the Lyapunov level set V 0) may diverge as τ approaches zero, whereas V slow 0) = 0 by definition. To see this, we investigate the matrix Υτ)Γθ; τ) in ), which is computed by [ ] Υτ)Γθ; τ) = Υτ)A ν 1 ν+l q Υ 1 τ)γθ; τ) Υτ)Υ 1 τ)γθ; τ) [ ] 1 = Aν 1 τ ν 1 ν+l q γθ; τ) γθ; τ). Since i-th component c i θ; τ) of the vector γθ; τ) has the form of c i θ; τ) = a i +τ 2 c i θ; τ) by Proposition 2.2.2), each component of the matrix is a polynomial

68 2.3. Performance Analysis 45 of 1/τ whose order is possibly up to ν 1. This incur that η ext 0, θ; τ) = 1 τ Υτ)q0) + 1 τ Υτ)Γθ; τ)φ 1 n x0) η g ext0, σ; τ) n ν 1 = v η,j τ j ) j= ν+l q) with constant vectors v η,j R ν+lq, j = ν + l q ),..., ν, by which the claim is obtained. As an alternative way, we divide the entire time period into two subintervals. For this purpose, take 0 < ϵ < ϵ/2 such that [C ] total,1 C ϵ < dist D total,2 total,n, D ) total,n ) and then select sufficiently small T > 0 to be independent of τ and to satisfy V slow t) λ diag P z, P χ ))ϵ 2 4, 0 t T ) This selection is always possible, because a) the slow variables z and χ are initiated at the origin, and b) the saturation function s w w) in ) makes the velocity of z and χ bounded around the origin χ = 0 regardless of η ext and τ). It is obtained from ) and ) that for all 0 t T, zt) 2 + χt) 2 and therefore, 1 ) λ diag )) z t)p z zt) + χ t)p χ χt) ϵ 2 P z, P χ 4 yt) y n t) = C n χt) ϵ 2 < ϵ 2 and d total t) = d total,n t) + C total,1 zt) + C total,2 χt) D total,n a) b) From now on, we investigate two important natures of the closed-loop system ) and ) in the sense of Lyapunov, especially for the transient period 0 t < T and the steady-state period T t <. The first one is about the convergence of the fast variable η ext.

69 46 Chap. 2. Disturbance Observer with Internal Model Lemma Suppose that Assumption is satisfied. 0 < τ 1 < 1 such that for τ 0, τ 1 ), Then there exists V fast T ) k η,1 τ 2ν e hη/τ)t + τk η, ) where k η,1, k η,2, and h η are τ-independent positive constants. Proof. Note that the hypothesis of Lemma and therefore )) naturally holds during the transient period t [0, T ]. Thus for all 0 t T, the time derivative of V fast along with the fast subsystem ) and with τ 0, 1) is computed as τ V fast η ext η ext + 2 η extp η δ t, C ν+lq η ext, d total ; τ ) η ext η ext [ + τ η ext 2P η k δ,1 z + k δ,2 χ + k δ,3 η ext + k δ,4 sup [r u ρ); ṙ u ρ); d u ρ); d ) ] u ρ)] + k δ,5 e h δt ) 1 + τk δ,3 η ext η ext 0 ρ t + τk δ,1 z z + τk δ,2 χ χ + τk δ,4 + τk δ,5 e 2h δt sup 0 ρ t [r u ρ); ṙ u ρ); d u ρ); d u ρ)] ) 2 where k δ,i, i = 1,..., 5, are some positive constants. In particular, with τ taken as τ τ 1 := min{1, 1/2k δ,3 )}, the last inequality turns out to be V fast h η τ V fast + k δ,1 λp χ ) z P z z + k δ,2 λp χ ) χ P χ χ + k δ,4 sup 0 ρ t 0 ρ t [r u ρ); ṙ u ρ); d u ρ); d u ρ)] ) 2 + k δ,5 e 2h δt h η τ V fast + k δ,12 V slow + k δ,4 sup [r u ρ); ṙ u ρ); d u ρ); d ) 2 u ρ)] + k δ,5 e 2h δt )

70 2.3. Performance Analysis 47 where h η := 1/ 2λP η ) ) and k δ,12 := max{k δ,1 /λp χ), k δ,2 /λp χ)}. Now, applying the comparison lemma [Kha96] to ), we obtain V fast T ) e hη/τ)t V fast 0) + + k δ,4 e hη/τ)t V fast 0) + e hη/τ)t V fast 0) + τk δ T e hη/τ)t ω) 0 sup 0 ρ ω [e hη/τ)t T { k δ,12 V slowω) [r u ρ); ṙ u ρ); d u ρ); d u ρ)] 0 ) e hη/τ)ω dω k δ,12 λ diag P z, P χ ))ϵ 2 ) 2 + k δ,5 e 2h δω 4 + k δ,4 r2 + d 2 ) + k δ, ) } dω ) ] where k δ > 0 is a constant. The lemma then follows from the fact that V fast 0) = η ext0)p η η ext 0) is a polynomial of 1/τ due to ). Since the right-hand side of 2.3.4) gets decreased as τ becomes smaller, Lemma implies that the fast variable ηt) with small τ quickly approaches near the extended quasi-steady-state ηt) = ηextt, θ; τ) as close as desired, with little effect on the slow error variables z and χ for the transient period 0 t < T. More specifically, one can select 0 < τ 1 < τ 1 such that for all τ 0, τ 1 ). V T ) = V slow T ) + τv fast T ) ) λ diag ))ϵ 2 P z, P χ 4 + τ k ) η,1 τ 2ν e hη/τ)t + τk η,2 λ diag P z, P χ ))ϵ 2 2 Next, the following lemma describes that, as long as the total disturbance d total t) remains in the compact set D total,n for the steady-state period, the overall system is stable in the ISS sense with respect to the partial inputs r u and d u.

71 48 Chap. 2. Disturbance Observer with Internal Model Lemma Suppose that Assumptions and the inclusion ) hold. Then there exists 0 < τ 2 < 1 satisfying that for τ 0, τ 2 ), V t) e hvt T ) V T ) + τk v,1 ) + τk v,2 sup [r u ρ); ṙ u ρ); d u ρ); d ) 2 u ρ)], t T 0 ρ t where k v,1, k v,2, and h v are positive constants independent on τ ) Proof. The lemma can be easily proved by differentiating the Lyapunov function V in ) and applying the comparison lemma [Kha96] to the resulting V in a similar way of Lemma To complete the proof of the theorem, we now claim that when τ is selected sufficiently small, the requirement ) on d total is automatically satisfied for t 0. Indeed, with τ 3 := λ diag P z, P χ )) ϵ 2 /2k v,1 + k v,2 r 2 + d 2 )), the above two inequalities ) and ) yield that for all τ min{τ 1, τ 2, τ 3 }, V slow t) V t) e hvt T ) λ diag P z, P χ ))ϵ 2 + τk v,1 + τk v,2 λ diag P z, P χ )) ϵ 2 sup 0 ρ t 2 [r u ρ); ṙ u ρ); d u ρ); d u ρ)] ) ) as long as ) is satisfied. The claim is then easily proved by contradiction, using the statement ) and the fact that d total t) belongs to the desired set D total,n at least during the transient t [0, T ]. In summary, we have shown that with τ τ := min{τ 1, τ 2, τ 3 }, both ) and 2.2.8) are satisfied at once, which proves Theorem To gain more insight on the proposed DOB scheme, we further note that when the external input is fully modeled i.e., rt) = r m t) and dt) = d m t)), the DOB s output wt) can play a role as an asymptotic estimate of the total disturbance d total t). Corollary Suppose that Assumptions hold and [r u t); d u t)]

72 Phase deg) Magnitude db) 2.4. Simulation: Mechanical Positioning Systems Proposed DOB Linear DOB EHO Frequency rad/s) Figure 2.4: Bode plots of the open-loop transfer functions with the proposed DOB blue solid), the linear DOB in [KC03] green dot-dashed), and the EHO in [FK08] red dashed) when all the saturation functions are inactive 0. Then for τ 0, τ) with τ > 0 in Theorem 2.2.3, lim [z auxt); χt)] [z n t); χ n t)] = 0, t lim wt) d total t) = 0. t 2.4 Simulation: Mechanical Positioning Systems In this section, simulation results are presented to clarify the validity of the proposed controller ), ), and ). In particular, we deal with the same problem in [KC03] in which a mechanical plant Ps) = 1 Js 2 + Bs m/v)

73 Imaginary Axis 50 Chap. 2. Disturbance Observer with Internal Model 4 Nyquist Diagram Real Axis Figure 2.5: Nyquist plot of Z 2,2 s) with a i obtained from BMI formulation with the uncertain parameters J [0.2, 0.6] V/m/s 2 ) and B [0, 0.15] V/m/s) is taken into account. This plant is simply represented as a normal form 2.1.1) with ϕ = [0; B/J)], g = 1/J, and no zero dynamics 2.1.1a). The input gain g belongs to a bounded set [g, g] with g = 5/3 m/s 2 )/V and g = 5 m/s 2 )/V. The state xt) is initiated at x 1 0) [ 0.01, 0.01] m and x 2 0) = 0 m/s. It is assumed that the disturbance dt) is bounded as dt) 5 V and has the form of dt) = d u t) + d m t) with a modeled part d m t) = M dm,0 + M dm,1 sinσ 1 t + φ dm,1 ) whose frequency σ 1 is 30 rad/s. Let us consider a nominal system P n s) = 1 J n s 2 + B n s m/v) with the nominal values J n = 0.6 V/m/s 2 ) and B n = 0 V/m/s), which is expressed in the state space as follows: ẋ n = A 2 x n + B 2 ϕ n x n + g n ū), y n = C 2 x n 2.4.1) where ϕ n = [0; 0] and g n = 1/J n = 5/3 m/s 2 )/V. To stabilize the nominal plant

74 2.4. Simulation: Mechanical Positioning Systems Time s) a) Difference between yt) and y nt) m) 2 # Time s) b) Enlargement m) Figure 2.6: Differences between the actual output yt) and the nominal one y n t) when dt) = d m t) = 2 sinσ 1 t); the proposed DOB blue solid), the linear DOB in [KC03] green dot-dashed), and the EHO in [FK08] red dashed) 2.4.1) and to regulate its output y n to the set-point rt) = r m t) = m within 0.3 s for all x n,1 0) [ 0.01, 0.01] m and x n,2 0) = 0 m/s, a proportionalderivative PD) controller is designed as ū = K prop y n r) K deriv ẏ n ṙ) 2.4.2) where K deriv = 15 and K prop = 150. From now on, we construct three different robust controllers for comparison. One is the H -based DOB introduced in [KC03], which has the conventional structure and consists of two 6th order Q-filters 1. The main purpose of this DOB is to suppress the disturbances that are dominant around the target frequency σ 1. 1 The Q-filter used in its design is given by Q H s) = b 3s b 0)/a 6s a 0) with b 3,..., b 0) = , , , ) and a 6,..., a 0) = 0.6, , , , , , ).

75 52 Chap. 2. Disturbance Observer with Internal Model Another controller under consideration is the extended high-gain observer EHO), which is known as a robust control scheme that guarantees the approximate) NPR i.e., the former notion in Definition 2.1.1). Following the design procedure in [FK08], we construct an EHO for the nominal closed-loop system 2.4.1) and 2.4.2) as follows: [ṗeho ẇ eho ] [ ] [ ] A2 + B 2 ϕ n B 2 peho = 0 0 w eho [ ] B2 g n + u Υ τ eho)α eho C 2 p eho y r)), 1 ] ) u = m eho sat w eho ϕ n p eho [K ) m eho g prop K deriv p eho 2.4.3) n where p eho R 2 and w eho R are the states, satθ) := min1, maxθ, 1)) stands for a conventional saturation function, and Υ 3 τ) = diagτ, τ 2, τ 3 ) R 3 3. The design parameters are selected as α eho = [3; 3; 1] and m eho = In addition, we choose τ eho = so that the control gain of the EHO is similar to that of the linear DOB at the target frequency σ 1. Such criterion on τ eho could require relatively large control bandwidth, because the EHO is designed without taking any internal model into account. Now, let us construct the proposed DOB-based controller to achieve the asymptotic NPR in Definition To avoid the derivative of the output, we rewrite the existing nominal closed-loop system 2.4.1) and 2.4.2) as ẋ n = A 2 + B 2 ϕ n g n [K prop K deriv ])) x n + B 2 g n u n, u n = K prop r 2.4.4) with which there is no use of the output s derivative in the control input u n. The system 2.4.4) now plays a role as 2.1.3) in the controller design. By repeated simulations, we compute the bounds for the nominal state x n t) for all initial conditions x n 0) [ 0.01, 0.01] {0}, and find out x n t) [ 0.01, ] [ , ], t 0.

76 2.4. Simulation: Mechanical Positioning Systems Time s) a) Difference between yt) and y nt) m) 2 0 # Time s) b) Enlargement m) Figure 2.7: Differences between the actual output yt) and the nominal one y n t) when dt) = d m t) + d u t) = 2 sinσ 1 t) + sin15t); the proposed DOB blue solid), the linear DOB in [KC03] green dotdashed), and the EHO in [FK08] red dashed) This implies d total,n t) = 1 g ϕ ϕ n )x n t) + 1 g ) n u n t) + dt) g D total,n [ , ], t 0 for all possible variations of B, J, and d. Using the bound of d total,n, we design the saturation function s w w) whose saturation level is set as D total,n := [ 4, 17] strictly larger than D total,n ). For the construction of a i, we solve the BMI problem A.1.15b) via PENLAB. This results in α = [0.8032; ; ; ] with which Z 2,2 s) is SPR. We choose the coefficients b i and c i as in ) and ), respectively, where the design parameter τ to be used is determined as τ = so that two DOBs have similar control bandwidths. For simulation, set J = 0.2 V/m/s 2 ), B = 0.1 V/m/s), and x0) = [0.01; 0].

77 54 Chap. 2. Disturbance Observer with Internal Model Time s) a) Difference between yt) and y nt) 2 0 # Time s) b) Enlargement Figure 2.8: Differences between the actual output yt) and the nominal one y n t) when dt) = d m t)+d u t) = 2 sinσ 1 t)+sin15t) and there is a measurement noise; the proposed DOB blue solid), the linear DOB in [KC03] green dot-dashed), and the EHO in [FK08] red dashed) The simulation results for various external signals are depicted in Figures 2.6 and 2.7. It can be observed in Figure 2.6 that both the proposed DOB and the EHO guarantee acceptable transient performance, whereas the output trajectory generated by the linear DOB experiences large initial peak. Beyond the transient behavior, the proposed DOB also eliminates the effect of the modeled input [r m t); d m t)] on the NPR completely, and therefore, the output yt) asymptotically converges to the nominal one y n t). Notice that this is not the case for the EHO for which no structural information on [r m t); d m t)] is used. Moreover, all these advantages of the proposed controller are preserved even if additional unmodeled disturbance d u t) = sin15t) V enters the plant, as shown in Figure 2.7. Figure 2.8 depicts the case when there exists a measurement noise which is uniformly distributed and whose maximum magnitude is m. Notice that the EHO loses its tracking performance, since its control bandwidth is too large

78 2.4. Simulation: Mechanical Positioning Systems 55 to withstand the high-frequency noise. The performance of the linear DOB is also degraded compared to the noiseless case, because of employing the PD controller directly. The effect of the noisy measurement, however, is relaxed when the proposed DOB is used.

79

80 Chapter 3 Recovery of Nominal Performance in Asymptotic Sense: Part II - An Extension with Adaptive Internal Model We have observed in the previous chapter that by embedding the internal model into the inverse model-based) DOB structure, the nominal tracking performance can be recovered in the asymptotic sense of Definition 2.1.1). In this design philosophy, the exact knowledge on the generating model is of necessity. A question arising here is: can we still recover the nominal performance asymptotically, even if the generating model of the external input is not exactly known? The main objective of this chapter is to address the problem for the secondorder) uncertain mechanical systems. For the purpose, we extend the controller design of Chapter 2 with a frequency identifier attached in the DOB loop. This new component plays a role for estimating the unknown frequency of the total disturbance in the steady-state period. Implemented with the frequency estimate, the parameters of the internal model in the DOB structure are updated in an adaptive fashion. The adaptive internal model embedded into the overall controller allows to estimate and compensate the total disturbance asymptotically, even without exact information on the frequency of the external input. We note in advance that as the price to pay for the extension, in this work we restrict our interest to the cases when a single sinusoidal input enters the system. 57

81 58 Chap. 3. Disturbance Observer with Adaptive Internal Model As an industrial application of the proposed controller, this paper deals with the track-following problem of optical disk drive ODD) systems [Kim05, OMI + 06, Lu09, KSJ14]. For the ODD control systems, it is of utter importance to enforce its pick-up to follow desired track on the disk with little oscillation or perturbation. In the track-following problem, a challenging issue is to suppress the effect of disk eccentricity on the pick-up. This issue can be recast as a regulation problem in the presence of a sinusoidal disturbance as well as model uncertainty), whose frequency varies track by track in a constant linear velocity CLV) or zoned CLV operating mode. To achieve high-precision tracking performance against these uncertainties, we propose a robust track-following control scheme by combining the proposed add-on controller with a pre-installed lead-lag compensator. Simulation and experimental results show that with the proposed control scheme, the track error signal of the ODD is regulated to zero with suitable transient response. 3.1 Problem Revisited: Mechanical System with Unknown Frequency of External Input To begin, we focus our attention to the SISO linear mechanical system Mÿ + Cẏ + Ky = u + d 3.1.1) where the generalized position or angle) y R is the output, u R is the input, d R is the disturbance that is of C 1. Suppose that the parameters M, C, and K are uncertain, as in the following assumption. Assumption The mass M > 0, the damping coefficient C 0, and the spring coefficient K 0 are uncertain but bounded with known bounds; i.e., M [M, M], C [C, C], and K [K, K]. With the state x := [y, ẏ] R 2, the mechanical system 3.1.1) is represented in the state space as ẋ = A 2 x + B 2 ϕ x + gu + d) ), y = C 2 x 3.1.2)

82 3.1. Problem Revisited 59 where x R 2 is the state, A i, B i, and C i are given in 2.1.2), g := 1/M > 0, and ϕ = [ϕ 1 ; ϕ 2 ] := [ K/M; C/M]. Note that the plant of interest 3.1.2) is thus the very plant 2.1.1) in the Byrnes-Isidori normal form with no zero dynamics and ν = n p = 2, and satisfies Assumption under Assumption Suppose that the initial conditions x0) of the plant belong in a compact set X 0 R 2. In addition, the following mechanical system with no uncertain quantity will play the role as a nominal model of 3.1.2): M n ÿ n + C n ẏ n + K n y n = u n 3.1.3) or equivalently, ẋ n = A 2 x n + B 2 ϕ n x n + g n u n ), yn = C 2 x n 3.1.4) where x n := [y n ; ẏ n ] R 2, u n R and y n R are the state, input, and output of the nominal system, respectively, g n := 1/M n > 0, and ϕ n = [ϕ n,1 ; ϕ n,2 ] := [ K n /M n ; C n /M n ]. It is assumed that the nominal plant 3.1.4) is governed by an output feedback controller ċ n = Ec n + F r y n ), u n = Jc n + K r y n ) ) Here c n R nc is the controller state, and r R is the reference signal for y n. The dimension n c of the controller is allowed to be zero, with which 3.1.5) represents a static controller. Similar to the previous chapter, we assume that x n 0) X 0 and c n 0) Cn 0 with a bounded set Cn. 0 Assumption The nominal closed-loop system 3.1.4) and 3.1.5) is internally stable; that is, the matrix A n := [ ] Aν + B ν ϕ n g n B ν KC ν g n B ν J F C ν E 3.1.6) is Hurwitz. The following assumption indicates that the external inputs rt) and dt) are modeled as sinusoidal signals with an uncertain frequency.

83 60 Chap. 3. Disturbance Observer with Adaptive Internal Model Assumption The reference rt) and the disturbance dt) have the form of the sinusoids rt) = r m t) = M rm,0, dt) = d m t) = M dm,0 + M dm,1 sin σt + φ dm,1 ) 3.1.7a) 3.1.7b) where M rm,0, M dm,0, M dm,1 > 0, φ dm,1, and σ > 0 are possibly uncertain but bounded with known bounds. In particular, 0 < σ σ σ, dt) d, and rt) r for some constants d 0, r 0, σ > 0, and σ > 0. Moreover, [rt); dt)] is not identically zero. Now, with the notion of NPR in asymptotic sense in Definition 2.1.1, the problem considered in this chapter can be stated as follows. Problem of Chapter 3. Given the plant 3.1.2), the nominal closed-loop system 3.1.4) and 3.1.5), and a threshold ϵ > 0, to construct an output feedback controller 2.1.8) that recovers nominal performance in an asymptotic sense within ϵ-bound in the sense of Definition under Assumptions Disturbance Observer-based Controller Design with Adaptive Internal Model A solution to the problem is presented throughout this section. The underlying idea for the controller design here is basically consistent with that in the previous chapter. However, the components of the DOB should be redesigned carefully, because the generating model of the external modeled) inputs now cannot be utilized directly. As an additional key component, we employ the following frequency identifier to adjust the frequency of the sinusoidal signal in an adaptive fashion: ˆθ = κξ C 3 u C 3 Ŵ ), Ŵ = A 3 Ŵ + Ψ u ˆθ + Lu C3 Ŵ ) + Ξ ˆθ, Ξ = A 3 LC 3 )Ξ + Ψ u 3.2.1a) 3.2.1b) 3.2.1c)

84 3.2. Controller Design with Adaptive Internal Model 61 where ˆθ R, Ŵ R 3, and Ξ R 3 are the states, u R is the input of the frequency identifier which is the same as the control input in 3.1.2)), L R 3 1 is chosen such that A 3 LC 3 is Hurwitz, Ψ u := [0; u; 0] R 3, and κ > 0 is a small design parameter to be chosen later. We note in advance that ˆθ will serve as an estimate of the unknown value θ = σ 2. In this regard, we select the initial condition ˆθ0) in the bounded set [σ 2 ; σ 2 ] R, while Ŵ 0) and Ξ0) are simply set as Ŵ 0) = 0 and Ξ0) = 0. Remark The structure of the frequency identifier 3.2.1) is inspired by the adaptive observer presented in [BZ03, KSJ14]. It has been well-studied that if the input ut) of 3.2.1) is exactly generated by an exogenous model 0 Ẇ u = A 3 σ 2 C 3 W u, u = C 3 W u. 0 or equivalently, ut) is a biased sinusoidal function whose frequency is σ), then the estimate ˆθ in 3.2.1) will converge to the true value θ := σ 2 as time goes on. However, this is not true as long as ut) is the control input generated by a feedback controller. Alternatively, we will estimate the steady-state response of ut) rather than ut) itself), which could be sinusoidal by the properties of linear systems. For this slow estimation in the steady-state period, the ˆθ-dynamics 3.2.1a) is realized with a low gain κ as above. From now on, we construct a DOB-based controller with the estimate ˆθ of the true value θ, mainly by following the design method in Chapter 2 but with some modification). Firstly, we define α := a 3 a 2 a 1 a 0 b 3 ˆθ; τ) 0 b 2 ˆθ; τ) c 2 ˆθ; τ), βˆθ; τ) :=, γˆθ; τ) := b 1 ˆθ; τ) c 1 ˆθ; τ) b 0 ˆθ; τ) c 0 ˆθ; τ) whose components are determined below while the parameter τ will be chosen shortly). Using the design procedure in Appendix A.1, we select a i, i = 0,..., 3,

85 62 Chap. 3. Disturbance Observer with Adaptive Internal Model such that the transfer function Z 2,2 s) = s4 + a 3 s 3 + g/g n )a 2 s 2 + g/g n )a 1 s + g/g n )a 0 s 4 + a 3 s 3 + g/g n )a 2 s 2 + g/g n )a 1 s + g/g n )a ) is SPR. With such a i, take c i ˆθ; τ), i = 0,..., 2, as follows: c 0 ˆθ; τ) := a 0, c 1 ˆθ; τ) := W 0 ˆθ; τ) 1 W 1 ˆθ; τ) c 2 ˆθ; τ) := W 0 ˆθ; τ) 1 W 1 ˆθ; τ) [ a1 a 3 [ a2 1 ] ] 3.2.3a) = a 1 τ 2 a 3 ˆθ, 3.2.3b) = a 2 τ 2 ˆθ 3.2.3c) where W i are the Vandermonde matrices with n m = 1, defined in ). Similarly, we also choose b i ˆθ; τ), i = 0,..., 3, in the same way of ) as b 3 ˆθ; τ) := c 2ˆθ; τ) τ 2 a 3 + c 1ˆθ; τ) τ 2 c 2ˆθ; τ) ϕ n,2, τ 3.2.4a) b 2 ˆθ; τ) := c 2ˆθ; τ) τ 2 a 2 + c 0ˆθ; τ) τ 2 c 1ˆθ; τ) ϕ n,2 c 2 ˆθ; τ)ϕ n,1, τ 3.2.4b) b 1 ˆθ; τ) := c 2ˆθ; τ) τ 2 a 1 c 0ˆθ; τ) ϕ n,2 c 1 ˆθ; τ)ϕ n,1, τ 3.2.4c) b 0 ˆθ; τ) := c 2ˆθ; τ) τ 2 a 0 c 0 ˆθ; τ)ϕ n, d) Next, to obtain a saturation function s w for the DOB output, we consider a nominal counterpart of the total disturbance d total,n := 1 g ϕ ϕ n )x n + g g n ) Jc n + Kr y n ) ) ) + gd 3.2.5) which is the same as )). Since it follows from Assumption that the nominal closed-loop system 3.1.4) and 3.1.5) is internally stable and the initial condition [x n 0); c n 0)] is located in a bounded region X 0 C 0 n, it is clear that the set D total,n := { d total,n t) in 3.2.5) : 3.2.6)

86 3.2. Controller Design with Adaptive Internal Model 63 Plant Frequency identifier Disturbance observer w/ internal model) Figure 3.1: Overall configuration of closed-loop system with proposed controller 3.2.1), 3.2.7), 3.2.8), and 3.2.9) [x n t); c n t)] generated by 3.1.4) and 3.1.5), [x n 0); c n 0)] X 0 Cn, 0 [rt); ṙt)] r, [dt); dt)] } d, t 0 R of all possible d total,n t) is bounded. Let D total,n be a compact set strictly larger than D total,n that is, D total,n D total,n ). Then, we construct a saturation function s w : R R that is bounded, of C 1, and satisfies ) for the compact set D total,n in 3.2.6). Finally, we propose the overall controller as the frequency identifier 3.2.1), the baseline controller ċ = Ec + F r y), u BL = Jc + Kr y), 3.2.7) the reduced-order) DOB implemented with ˆθ ṗ = A 4 Υ 1 4 τ)αc 4) p Υ 1 τ)γˆθ; τ)u + Υ 1 τ)βˆθ; τ) 1 g n y, 3.2.8a) w = C 4 p + c 2ˆθ; τ) τ 2 1 g n y 3.2.8b) where the square matrix Υ 4 τ) is given in )), and the composite control

87 64 Chap. 3. Disturbance Observer with Adaptive Internal Model law u = u BL s w w) ) Here c R nc and p R 4 are the states of the baseline controller and the DOB, respectively. The initial condition c0) is set as in the compact set Cn, 0 while p0) can be any bounded value. Without loss of generality, let p0) = 0. The overview of the entire controlled system is given in Figure Performance Analysis We present our main result first, while its detailed proof will be given throughout the following two subsections. Theorem Suppose that Assumptions are satisfied. Then for given ϵ > 0, there exist κ > 0 and τ = τκ) > 0 such that the output feedback controller 3.2.1), 3.2.7), 3.2.8), and 3.2.9) with κ 0, κ) and τ 0, τκ)) recovers the nominal performance in an asymptotic sense with ϵ-bound Representation to Multiple-time Scaled Singular Perturbation Form The first step to prove the theorem is to represent the closed-loop system 3.1.2), 3.2.1), 3.2.7), 3.2.8), and 3.2.9) into a singular perturbation form. As an intermediate task, the following lemma is presented. Lemma In the coordinate change η = 1 ) τ Υτ) 1 p + Γˆθ; τ)φ n x g n where c 2 ˆθ; τ)/τ 2 0 [ ] c 1 ˆθ; τ)/τ 3 c 2 ˆθ; τ)/τ Γˆθ; τ) :=, Φ n :=, c 0 /τ 4 c 1 ˆθ; τ)/τ 3 ϕ n,2 1 0 c 0 /τ 4

88 3.3. Performance Analysis 65 the p-dynamics 3.2.8a) is converted into where ) τ η = A 4 αc 4 ) η + 1 ggn γˆθ; τ) s C 4 η) 3.3.1) d total := 1 g = 1 g + g g n γˆθ; τ)d total + Υτ) Γˆθ; τ)φ n 1 g n x ) ϕ ϕ n )x + g g n )u BL + gd ϕ ϕ n )x + g g n ) Jc + Kr C 2 x) ) ) + gd ) Proof. The proof of the lemma is similar to that of Lemma in the previous chapter, and therefore we skip the details here. Next, for ease of analysis, we will shift the equilibrium of the transformed system in Lemma to the origin. Let us define stacked variables [ ] x χ := R 2+nc, χ n := c [ xn c n ] R 2+nc 3.3.3) and denote the steady-state response of χ n as χ n. It is easily obtained from the linear system theory that the steady-state responses of d total and u n have the form of [ ] [ ] r r d total,n := C totalχ n + D total, u n := C un χ n + D un, 3.3.4) d d respectively, where C total := 1 [ ] [ ϕ g ϕ n ) g g n )KC ν g g n )J, C un := KC 2 D total := 1 [ ] [ ] g g g n )K g, D un := K 0 ] J

89 66 Chap. 3. Disturbance Observer with Adaptive Internal Model and both are sinusoids with the frequency σ. Their linear combination u := u n d total,n, 3.3.5) thus can be expressed as the output of an auxiliary) exogenous system 0 Ẇ = A 3 σ 2 C 3 W = A 3W + Ψ u θ, u = C 3 W 3.3.6) 0 written in the observable canonical form. In addition, using the notion of the extended quasi-steady-state variable η in the previous chapter, let us define 0 υ m,1 ηext := α d total τs)υm,1 + υ m,2 τs) 2 υ m,1 + τs)υ m,2 + υ m,3 τs) 3 υ m,1 + τs) 2 υ m,2 + τs)υ m,3 + υ m,4 in which s := d/dt, α := [1; a 3 ; 0; 0], and υ mt, θ; τ) := γθ; τ) γθ; 0) ) d total,n t) τα d total,n t). We then obtain the following result, in which the overall system is expressed as a multiple-time scaled singular perturbation form, with small design parameters κ and τ. Lemma In the coordinate θ := ˆθ θ, χ := χ χ n, χ n := χ n χ n, 3.3.7a) W := Ŵ W Ξ θ, η ext := η η ext, 3.3.7b) the closed-loop system 3.1.2), 3.2.1), 3.2.7), 3.2.8), and 3.2.9), and the nominal closed-loop system 3.1.4) and 3.1.5) are transformed into

90 3.3. Performance Analysis 67 slow subsystem 1 θ ) = Ξ C3 C 3 Ξ θ + Ξ M θ,1 χ + M θ,2 χ n + M θ,3 W + Eθ Ω κ 3.3.8) intermediate subsystem χ = A n χ + E χ Ω, χ n = A n χ n, 3.3.9a) W = A 3 LC 3 ) W + M W,1 χ + M W,2 χ n + E W Ω, 3.3.9b) fast subsystem ) τ η ext = A 4 αc 4 ) η ext + 1 ggn γθ; 0)Ω + δ ) where M θ,i, i = 1, 2, 3, M W,j, j = 1, 2, E θ, and E W are some constant matrices with appropriate dimensions) independent of τ and κ, Ξ is the solution of 3.2.1c), Ω ) ) ) t, χ, η ext,1 := sw η ext,1 + C total χ + d total,n t) C total χ + d total,n t), ) and δ is a continuous function of the time t 0, the state variables [ θ; χ; χ n ; W ; η ext ], and the parameter τ 0 satisfying that δ t, 0; τ ) = 0 and δ t, θ, χ, χ n, W, η ext ; 0 ) = ) for all t 0. Proof. In the proof, we will derive the slow, intermediate, and fast dynamics in the lemma sequentially. First, let us differentiate θ in 3.3.9) along with the ˆθdynamics 3.2.1a) as follows: θ = ˆθ θ = κξ C 3 C 3 Ŵ + κξ C 3 u θ = κξ C3 ) C 3 Ξ θ + W + W + κξ C3 u ) = κξ C3 C 3 Ξ θ + κξ C3 C 3 W + C 3 u u ) )

91 68 Chap. 3. Disturbance Observer with Adaptive Internal Model in which u = C 3 W in 3.3.6) is used. It is further noted that [ ] r d total = C total χ + D total = C total χ + d total,n = C total χ + C total χ n + d total,n d, [ ] r u BL = C un χ + D un = C un χ + u n = C un χ + C un χ n + u n. d On the other hand, one has s w w) = s w C 4 p + c ) 2 1 τ 2 C 2 x g n = s w C 4 η) = s w C4 η ext + d total ) = sw C4 η + C total χ + d total,n t) ) ) By the definition of Ω, the term u u in ) is computed by u u = u BL s w w) u n d ) total,n = u BL u n) dtotal d ) ) total,n sw w) d total = C un C total ) χ + Cun C total ) χn Ω η ext,1, d total ) ) Putting ) into ), one can obtain the θ-dynamics as 3.3.8), with the matrices M θ,3 := C 3 C 3, M θ,1 = M θ,2 := C 3 C un C total ), and E θ := C 3. It is easy to compute the χ- and χ n -dynamics in 3.3.9). To carry out the W -dynamics, we first derive the time derivative of Ŵ W as Ŵ Ẇ = A 3 Ŵ + Ψ u ˆθ + Lu C3 Ŵ ) + Ξ ˆθ ) ) A 3 W + Ψ u θ = A 3 Ŵ W ) + Lu C 3 Ŵ ) + Ξ ˆθ + Ψu ˆθ θ) + Lu u ) Ψ u Ψ u )θ = A 3 LC 3 )Ŵ W ) + Ξ θ + Ψu θ + L Ψθ )u u ). In the computation, we use the equalities Ψ u Ψ u )θ = Ψ u u )θ = Ψ θ u u ).) Using the result, one has W = Ŵ Ẇ Ξ θ Ξ θ )

92 3.3. Performance Analysis 69 = A 3 LC 3 )Ŵ W ) + Ξ θ + Ψu θ + L Ψθ )u u ) Ξ θ Ξ θ = A 3 LC 3 )Ŵ W ) + Ψ u θ + L Ψ θ )u u ) A 3 LC 3 )Ξ + Ψ u ) θ = A 3 LC 3 )Ŵ W Ξ θ) + L Ψ θ )u u ) = A 3 LC 3 ) W + L Ψ θ )u u ) ) Applying ) to ), we finally have the W -dynamics as W = A 3 LC 3 ) W ) + L Ψ θ ) C un C total ) χ + C un C total ) χ n Ω = A 3 LC 3 ) χ + M W,1 χ + M W,2 χ n + E W Ω where M W,1 = M W,2 := L Ψ θ )C un C total ) and E W := L Ψ θ ). Next, we differentiate τ η ext along with the η-dynamics 3.3.1) in Lemma as follows: τ η ext = τ η τ η ext = A 4 αc 4 )η + + Υτ) Γ 1 ˆθΦ ˆθ n 1 ggn ) γˆθ; τ) sc 4 η) + g g n γˆθ; τ)d total g n x τ η ext = A 4 αc 4 ) η + η ext) + + Υτ) Γ 1 ˆθΦ ˆθ n x τ η ext g n ) = A 4 αc 4 ) η ext + 1 ggn = A 4 αc 4 ) η ext + 1 ggn ) γˆθ; τ) sc 4 η) + g g n γˆθ; τ)c 4 η ext ) γθ; 0) sc 4 η + C 4 ηext) C 4 ηext + δ 1 ggn ) γθ; 0)Ω + δ ) where δ is defined by δ := A 4 αc 4 )ηext + 1 g ) ) γˆθ; τ) γθ; 0) sc 4 η) + γθ; 0)C 4 ηext g n + g ) γˆθ; τ) γθ; 0) C 4 ηext + Υτ) Γ 1 ˆθΦ g n ˆθ n x τ η g ext ) n It is shown in Appendix A.2 that δ in ) satisfies the desired properties,

93 70 Chap. 3. Disturbance Observer with Adaptive Internal Model which completes the proof of the lemma Convergence Analysis Since the transformed system 3.3.8), 3.3.9), and ) in Lemma is not a standard singular perturbation form, the analysis in the previous chapter is not suitable anymore. Instead, we here will separate the system into two groups for the stability analysis; the slow and intermediate subsystems 3.3.8) and 3.3.9) as a slower part, while the fast subsystem ) as a faster part. Under this grouping, the slower part of the three-time scaled system can be viewed as a standard two-time scaled) singular perturbation form with respect to the perturbation parameter κ, to which the standard singular perturbation theory is now applicable. Once κ is determined first, then one can conclude the stability of the overall system by employing the singular perturbation theory once again, in terms of another perturbation parameter τ. One additional issue that has to be dealt with is the initial peaking of the fast variable η ext, as discussed in the previous chapter. We readily observe that the initial value η ext 0) = 1 τ Υτ)p0) + 1 τ Υτ)Γˆθ0); τ)φ n 1 g n x0) η ext0, θ; τ), ) has the form of a polynomial of 1/τ due to the structure of Υτ)Γˆθ; τ). Thus the set of the initial condition η ext 0), denoted by E 0 τ) possibly dependent of τ, of course), gets larger as τ goes to zero. To tackle the second issue, let us divide the entire time period into two parts; the transient period 0 t < T and the steady-state period t T as in the previous chapter) where T will be selected below. It is first noted that χt) and χ n t) are assumed to be initiated at the same point in the statement of Definition 2.1.1, by which the initial condition of the slow and intermediate variables [ θt); χt); χ n t); W t)] belongs to a compact set { I 0 [ θ0); χ0); χn 0); W 0) ] } : χ0) = 0. Let P χ = P χ > 0 be the solution of the Lyapunov equation A n P χ + P χ A n = I,

94 3.3. Performance Analysis 71 and also let 0 < ϵ < ϵ/2 be a constant satisfying that C total ϵ < dist D total,n, D total,n. ) ) We take a larger compact set I 0 satisfying I 0 I 0 with the distance larger than λp χ )/λp χ ))ϵ. Then with the help of the saturation function s w again, one can select a small time instant T > 0 independent of τ) such that [ θt); χt); χn t); W t) ] I 0, 0 t T ) In parallel with Lemma in the previous chapter, the following lemma indicates that the fast variable η ext t) converges around its quasi-steady-state η ext = 0 with small τ for the transient period. Lemma Suppose that Assumption is satisfied. 0 < τ 1 < 1 such that for τ 0, τ 1 ), Then there exists η ext T ) k η,1 τ 2 e hη/τ)t + τk η, ) where k η,1, k η,2, and h η are τ-independent positive constants. Proof. The lemma is readily derived in the same way of Lemma Keeping the observations on the transient behavior in mind, the remainder of this subsection is organized to analyze the overall system for the remaining time period t T. To this end, by applying τ = 0 to the η ext -dynamics ) and by rewriting the result in the scaled time ς := t T )/τ with the slower variable χ being fixed, we obtain the boundary-layer system of the overall system) as follows: ) d dς η ext = A 4 αc 4 ) η ext + 1 ggn γθ; 0)Ω ) 0, χ, η ext, ) the initial condition of ) is assumed to belong in E 0. By repeating the proof of Lemma along with ), one obtains the following corollary.

95 72 Chap. 3. Disturbance Observer with Adaptive Internal Model Corollary The origin of the boundary-layer system ) is exponentially stable with the region of attraction containing E 0. To discuss on the stability of the remaining part, we compute the reduced system of the overall system) which is the slower part 3.3.8) and 3.3.9) of the overall system on the boundary layer η ext = 0) as follows to avoid confusion on the terminology, we use in the superscript to indicate that the variable is for the reduced system): 1 θ = Ξ C3 C 3 Ξ θ κ + Ξ M θ,3 W + M θ,1 χ + M θ,2 χ n + E θ Ω ), a) and χ = A n χ + E χ Ω, χ n = A n χ n, b) c) W = A 3 LC 3 ) W + M W,1 χ + M W,2 χ n + E W Ω d) where Ω t, χ ) := s w Ctotal χ + d total,n ) Ctotal χ + d total,n ) and Ξ = A 3 LC 3 )Ξ u + C un C total ) χ + C un C total ) χ n Ω ) e) Then we are now ready to derive the stability of the reduced system. Lemma Suppose that Assumptions are satisfied. Then there exists κ > 0 such that for κ 0, κ), a) the partial state trajectory χ t) of the reduced system ) initiated in I 0 satisfies χ t) < ϵ 2, t T ; )

96 3.3. Performance Analysis 73 b) the origin of the reduced system ) is exponentially stable with the region of attraction containing I 0. Proof. To prove the item a), we take a look at the χ -dynamics χ = A n χ + E χ Ω ) = A n χ + E χ s w Ctotal χ + d total,n t) ) C total χ + d total,n t) )) where the initial condition χt ) satisfies χt ) < ϵ. For the analysis, let us employ a Lyapunov function candidate V χ χ ) := χ ) P χ χ ) where P χ is the solution of the Lyapunov equation A n P χ + P χ A n = I. We now claim that the set V := { χ : V χ χ ) < λp χ ) ϵ 2 } 4 is positive invariant. The claim is proved by contradiction. Suppose that there exists a finite time T T such that V χ χ T ) ) > λp χ )ϵ 2 /4). Then by the continuity of the solution, one can always find T T < T such that the solution χt) encounters the boundary of V; that is, V χ χ T )) = λp χ )ϵ 2 /4). On the other hand, it is clear that as long as χ t) is located in V, χ t) < ϵ /2 and thus C total χ t) + d total,n t) D total,n. This leads to ) ) Ω t, χ t)) = s w C total χ t) + d total,n t) C total χ t) + d total,n t) = 0 for T t T. Thus for that time period, we have ) V χ χ t)) = A n χ t) ) Pχ χ t) ) + χ t) ) Pχ An χ t) ) < 0, which yields that V χ χ T )) < V χ χ T )) λp χ )ϵ 2 /4). This contradicts V χ χ T )) = λp χ )ϵ 2 /4), which completes the proof of the claim, and thus that of Item a) since χ T ) V. For the proof of the second item, we notice that the equalities ) are satisfied for all t T by the discussions so far). Thus the reduced system

97 74 Chap. 3. Disturbance Observer with Adaptive Internal Model a) d) of the overall system) can be rewritten by the standard singular perturbation form with a new scaled time ς := κt) slow subsystem of the reduced system of the overall system) d dς θ = Ξ C 3 C 3 Ξ θ + Ξ M θ,1 χ + M θ,2 χ n + M θ,3 W ), ) fast subsystem of the reduced system of the overall system) κ d dς χ = A n χ, κ d dς χ n = A n χ n, κ d dς W = A 3 LC 3 ) W + M W,1 χ + M W,2 χ n a) b) c) It is obvious that the origin of the fast subsystem ) is globally exponentially stable. In accordance with the singular perturbation theory [Kha96, Theorem 11.4], it is enough for Item b) to show that the origin of the following reduced dynamics is exponentially stable, which is computed by putting the quasi-steadystate of the reduced system of the overall system) [ θ ; χ ; χ n; W ] = 0 into ): 1 θ = Ξ C3 C 3 Ξ θ κ ) where Ξ t) is the solution of κ d 0 dς Ξ = A 3 LC 3 )Ξ + 1 u t) 0 and t = ς/κ. Note that the Ξ -dynamics is input-to-state stable ISS) and its input u t) = u nt) d total,n t) is a bounded sinusoidal signal of the frequency σ > 0. This yields that C 3 Ξ t) is persistently exciting [IS96, Thm ]; that

98 3.3. Performance Analysis 75 is, there exist positive constants h Ξ, h Ξ, and Ξ such that 0 < h Ξ t+ Ξ t Ξ ρ)c 3 C 3 Ξ ρ)dρ h Ξ, which implies that the origin of the θ -dynamics ) is exponentially stable. In summary, by the singular perturbation theory [Kha96, Thm. 11.4], there exists κ > 0 such that the origin of ) is exponentially stable for all κ 0, κ). We have observed so far in Corollary and Lemma that the origin of both the boundary-layer system ) and the reduced system ) with fixed κ 0, κ)) are exponentially stable. Thus the following lemma follows from the singular perturbation theory [Kha96, Thm. 11.4] with respect to the perturbation parameter τ. Lemma For given ϵ > 0 and κ 0, κ) with κ in Lemma 3.3.6, there exists 0 < τ = τκ) < τ 1 such that for τ 0, τκ)), the singularly perturbed system 3.3.8), 3.3.9), and ), initiated at [ θt ); χt ); χt ); W T )] I 0 and η ext T ) E 0, satisfies the following statements. a) the origin of the system is exponentially stable with the region of attraction containing I 0 E 0 ; b) the partial state trajectory χt) satisfies χt) χ t) < ϵ 2, t T ) where χ t) is the solution of ) initiated at χ T ) = χt ). The first item of Lemma naturally implies that C n χt) = yt) y n t) exponentially converges to zero as time goes on or equivalently, ) in Definition holds with [r u t); d u t)] 0). On the other hand, combining ) with Item a) of Lemma 3.3.6, one has χt) χt) χ t) + χ t) < ϵ 2 + ϵ 2 = ϵ, t T.

99 76 Chap. 3. Disturbance Observer with Adaptive Internal Model Optical Disk Drive Optical spot disk Spindle motor Detector unit Fine actuator Drive unit Coarse actuator Pick-up Pre-installed) Baseline controller Signal sum board D/A converter Proposed add-on controller DSP TMS320C6713) A/D converter LPF LPF Figure 3.2: Diagram of ODD systems for experiment Note that χt) is smaller than ϵ/2 for the transient period 0 t T. These facts conclude the proof of the theorem. 3.4 Industrial Application: Optical Disk Drive In this section, we apply the proposed controller to an optical disk drive ODD) system. As shown in [Kim05], track following problem for ODD such as CD-ROM or DVD-ROM is to control the position of pick-up more precisely, optical spot) so that it follows the desired track of disk media which is usually deviated from the concentric circles due to the disk eccentricity. The position of the pick-up is controlled by two cooperative actuators; a fine actuator and a coarse actuator, which are briefly depicted in Figure 3.2. While the coarse actuator moves slowly across the entire disk radius, the fine actuator has faster response for a small displacement. For instance, the optical spot of CD-ROM must follow the track within 0.1 µm while the displacement error caused by the disk eccentricity amounts to more than 280 µm in the worst case. The fine actuator should take care of relatively large disturbances, because the disturbance, whose frequency is synchronized with the disk rotation, is too fast to be caught up by

100 3.4. Industrial Application: Optical Disk Drive 77 Baseline controller Fine actuator Eccentric disturbance Sensor gain Tracking error a) Track-following servo system of the ODD systems b) Equivalent block diagram of a) Proposed add-on controller c) Servo system with the proposed add-on controller Figure 3.3: Configuration of ODD control system the coarse actuator. For this reason, the fine actuator plays a central role for track following. In what follows, we consider the fine actuator only. The closed-loop system of the track-following servo system for the ODD systems is illustrated in Figure 3.3-a). Here P fine s) is a fine actuator, Cs) is a pre-installed) baseline controller, and g sens is a sensor gain that converts the position displacement into voltage. Since the fine actuator P fine s) is a linear time-invariant system, we can consider that it is equivalent to the block diagram b) of Figure 3.3. In particular, the fine actuator is modeled by a mass-springdamper system i.e., a second order system having full relative degree) and then

101 78 Chap. 3. Disturbance Observer with Adaptive Internal Model its transfer function with the sensor gain Ps) := P fine s) g sens can be described as follows: Ps) = N 0 s 2 + D 1 s + D 0 g sens V/V) ) where D 1, D 0, and N 0 are real numbers. Comparing 3.4.1) with 3.1.1), we have M = 1 N 0 g sens, C = D 1 N 0 g sens, K = D 0 N 0 g sens. In Figure 3.3, the disturbance caused by the disk eccentricity can be regarded as a sinusoidal signal with unknown magnitude and phase, which can be represented by dt) = M dm,1 sin σt + φ dm,1 ) where M dm,1 and φ dm,1 are some constants, and σ is the frequency that depends on the rotation speed of the disk. Also, the reference rt) in Assumption 3 is set as zero in the usual ODD control systems Simulation Results Now, we carry out a computer simulation in order to illustrate the effectiveness of the proposed controller. From [KSJ14], we first consider the nominal parameters of M, C, and K as follows: M n = g sens, C n = g sens, K n = g sens 3.4.2) where the sensor gain g sens is V/m. As the baseline controller 3.1.5) that stabilizes P n s) with the parameters 3.4.2), we assume that the following lead-lag compensator has already been designed: Cs) = s s s s In order to show the robustness of the proposed controller, it is also assumed that the parameters of the actual plant 3.4.1) are perturbed by ±50 % compared to

102 3.4. Industrial Application: Optical Disk Drive 79 y V) u V) 0.04 a) b) c) Time s) ˆσ/2π) Hz) Figure 3.4: Simulation results for the proposed add-on controller 3.2.1) and 3.2.8). a) Plant output y. b) Control input u. c) Frequency estimate ˆσ/2π) solid) and true value σ/2π) dashed). its nominal values 3.4.2); for the simulation, D 1 and D 0 are set as 3/2 times their nominal values, while N 0 as 1/2 times its counterpart. For simulation purposes, we assume that the disk rotation frequency σ is fixed as 2π 68 rad/s, while its estimate ˆσ defined by the square root of ˆθ ) is initiated at 2π 60 rad/s. Based on the nominal values 3.4.2), the design parameters of the proposed controller are chosen as τ = 0.005, α = [4; 6; 4; 1], κ = , and L = [ ; ; 1.644] It is also supposed that the output w of the proposed add-on controller is injected into the control loop at 0.3 s that is, ut) = u BL t) for 0 t < 0.3 and ut) = u BL t) s w wt)) for 0.3 t 0.6). 1 The simulation results using MATLAB/Simulink are shown in Figure 3.4. It is clear that the frequency estimate ˆσ approaches the true value σ after 0.15 s and the plant output y tracking error) converges to zero after 0.35 s. This implies that the DOB-based controller eliminates the sinusoidal disturbance 1 This is only for comparison between tracking performances with and without the add-on controller and is not necessary for the proper operation of the add-on controller as theoretically proved in Theorem and seen in Figure 3.7).

103 80 Chap. 3. Disturbance Observer with Adaptive Internal Model 150 Magnitude db) Phase deg) Frequency Hz) Figure 3.5: Open-loop transfer functions of the ODD controlled systems with the proposed add-on controller blue solid), the conventional DOB with τ = orange dashed), and the conventional DOB with τ = green dash-dotted). perfectly in the steady-state. We note that the same conclusion cannot be made by the conventional DOB. For comparison, let us construct a conventional DOB instead of the proposed controller in Figure 3.3-c). From the philosophy of the high-order DOB or type-k DOB ) [CYC + 03, PJSB12, YKIH97], a linear DOB is designed with the inverse model P 1 n s) of the nominal plant P n s) = 1/M n s 2 + C n s + K n ) and the 4th-order Q-filter Q type 2 s; τ ) = 6τ s) 2 + 4τ s) + 1 τ s) 4 + 4τ s) 3 + 6τ s) 2 + 4τ s) + 1 where τ > 0 determines the cutoff frequency of Q type 2 s; τ ) i.e., the smaller τ is, the larger the cutoff frequency is). Here, τ is selected within the range τ so that the control bandwidth is similar to that of the proposed controller with τ = See Figure 3.5 for the corresponding open-loop transfer functions.) Now, we repeat the same simulation in Figure 3.4 with the conventional)

104 3.4. Industrial Application: Optical Disk Drive 81 y V) y V) a) b) Time s) Figure 3.6: Simulation results for the conventional DOBs. a) τ = b) τ = Parameter Value Unit Sample rate 88.2 khz Resolution 16 Bits Input range ±2.5 V Table 3.1: Specifications of A/D and D/A converter. type-2 DOB above. The result can be seen in Figure 3.6. In the figure, the type-2 DOB seems to suppress the disturbance effectively as long as the bandwidth of Q type 2 s; τ ) is sufficiently large; however, the effect of the disturbance cannot be completely eliminated in all cases. The same conclusion on the performance of the DOBs can be reached from the sensitivity function analysis with Figure 3.5. Remark As well-known in the literature, in Figure 3.5, it is not possible to derive the exact open-loop transfer function when the nonlinear controller 3.2.8) is used. Nonetheless, one can compute its approximation by assuming that a) the estimate ˆθ in 3.2.8) is fixed as its target value θ and b) the saturation function s w in 3.2.8) is inactive; so, the p-dynamics 3.2.8) turns out to be linear. It should be noted that these assumptions are naturally satisfied in the steady-state period, as shown in Theorem Although our theoretical result was derived in terms of constant frequency

105 82 Chap. 3. Disturbance Observer with Adaptive Internal Model y V) u V) 0.04 a) b) c) Time s) ˆσ/2π) Hz) Figure 3.7: Simulation results for the proposed add-on controller 3.2.1) and 3.2.8) with slowly varying frequency. a) Plant output y. b) Control input u. c) Frequency estimate ˆσ/2π) solid) and true value σ/2π) dashed). σ, we perform additional simulation for the case when the frequency σ is slowly varying. Figure 3.7 depicts the simulation result where the proposed DOB-based controller begins to operate at t = 0 s i.e., ut) = u BL t) s w wt)) for t 0) and the actual frequency σt) moves from 2π 68 rad/s to 2π 60 rad/s during 0.3 t 0.7. It is shown that the estimate ˆσ catches up the time-varying σ, and consequently the output y is rarely perturbed due to the proposed DOB-based controller Experimental Results The inner-loop part of the proposed DOB-based controller is implemented using DSP TMS320C6713 manufactured by Texas Instruments Incorporated) with analog to digital A/D) and digital to analog D/A) converter, which is depicted in Figure 3.2. The features of A/D and D/A converter are given in Table 3.1. In Figure 3.2, the low pass filter LPF) is placed in front of A/D converter

106 3.4. Industrial Application: Optical Disk Drive 83 Figure 3.8: Experiment setup. Parameter Value Unit Operation voltage ±15 V Slew rate 3000 V/µs Unit gain bandwidth 100 MHz Common mode rejection ratio CMRR) 110 db Table 3.2: Specifications of operational amplifier. because the measured tracking error signal contains high-frequency noise. The filter is passive RC resistor capacitor) type, and its cut-off frequency is about Hz. A picture of the actual experiment setup is shown in Figure 3.8. We perform an experiment where the proposed add-on controller is applied as in the computer simulation of Figure 3.4. The experiment results in Figure 3.9 show the convergence of σ toward the actual frequency 2π 68 rad/s and the regulation of the plant output y, as expected in the simulation part. The reason why the tracking error y is not cancelled out perfectly might result from the added LPF to reduce the measurement noise at high frequency), the residual measurement noise, and the quantization error of the A/D converter.) Remark As a matter of fact, several operational amplifiers Op Amp, LM6172 manufactured by Texas Instruments Incorporated) are used in voltage

107 84 Chap. 3. Disturbance Observer with Adaptive Internal Model y V) u V) b) ˆσ/2π) Hz) c) a) Time s) Figure 3.9: Experimental results for the proposed add-on controller 3.2.1) and 3.2.8). a) Plant output y. b) Control input u. c) Frequency estimate ˆσ/2π) solid) and true value σ/2π) dashed). follower called unity gain buffer) in front of LPF and the signal sum board. Also, the LPF is implemented as a passive RC type, as aforementioned. These components may introduce signal delay and distortion in the measurement signals and the control input. For this reason, unlike the simulation results at 0.3 s, the output y in the experiment results gradually decreases over about 0.05 s. The features of the Op Amp are given in Table 3.2.

108 Chapter 4 Guaranteeing Almost Fault-free Performance from Transient to Steady-state: Disturbance Observer-based Fault Tolerant Control In response to the growing need for assessing high-level objectives, modern control systems usually have complicated structures. For instance, in the framework of CPS, a variant of CT and DT components are integrated and collaborate with each other, for the purpose of overcoming the limitations of traditional control systems [Lee08]. Unfortunately, the increased complexity often puts these systems into a dangerous situation resulting from faults and failures on the system components or some malicious cyber-attacks injected through data networks. These undesirable events not only degrade the overall performance of the system but also destabilize the closed-loop system, which may threaten the safety of mankind as reported by several catastrophic accidents [BFN + 14, Gor09]. It is in this context that a tremendous research effort has been devoted to develop fault tolerant control FTC) schemes in the last two decades see the survey papers [ZJ08, YJ15] and the references therein). Two major approaches for the FTC designs have emerged in literature: passive and active FTC approaches. The first strategy is to employ a fixed controller during system operation without any detection and isolation of faults, while the other one is to reconfigure the controller structure via estimated information on the faults. Over the active FTC, the passive FTC has advantages that the design is simpler and faster response 85

109 86 Chap. 4. Disturbance Observer-based Fault Tolerant Control may be ensured, at the cost of requiring knowledge on the faults in the design stage. On the other hand, the active FTC schemes are able to handle even unanticipated faults outside an expected boundary by adjusting sudden changes of the system characteristics automatically, yet at the same time additional delays may take place because of the use of fault detection/isolation algorithms. See [ZJ08, YJ15] and the references therein.) While numerous researches in both directions have been performed in literature, the problem of guaranteeing a transient tracking performance at the moment of actuator faults still has not been fully dealt with yet. The management of the transient behavior may be of particular importance to critical control systems such as power grids [LLC + 17] and aircrafts, whose transient malfunctions possibly result in considerable loss of efficiency and discomfort of mankind. To the best of the authors knowledge, only a few studies have addressed the problem [CM15, BSP14]. In [CM15], an active FTC scheme was proposed by combining an adaptive sliding mode control with a backstepping control. While this approach preserves a satisfactory post-fault transient response as much as desired, it inherently leads to high computational complexity and requires the exact information on the high-frequency gain matrix of the plant, which restricts the class of model uncertainty dealt with. On the other hand, the authors of [BSP14] introduced an adaptive-type FTC for the transient response control of spacecraft. Main drawbacks of this scheme are that full state information is explicitly used in the controller design and the transient response cannot be shaped arbitrarily. In this chapter, we present an output feedback FTC scheme that recovers an almost) fault-free nominal tracking performance during the entire time period, for a class of multi-input single-output MISO) linear systems under actuator faults, parametric uncertainty, and external disturbances. Our central idea is to directly estimate a lumped signal representing all the effect of actuator faults, model uncertainty, and external disturbance at once and compensate it on-line, rather than try to detect the fault itself as in the traditional active FTC approaches which possibly introduce an additional delay). To implement the idea, in this work a passive FTC is constructed by following the DOB approach. It should be noted that when it comes to our problem, the inverse model-based

110 4.1. Problem Formulation 87 DOB designs in the literature are not applicable directly. This is because a) most of the works dealt only with square systems, and b) the DOB in [BS08, BS09] requires the minimum phaseness of the plant, which may be lost when an actuator fault happens. For this reason, a fixed control allocation CA) law comes into the picture in our FTC design [JF13]. In particular, provided that the MISO plant is of minimum phase in an input-wise sense, we propose a design guideline for the CA law, with which the plant with a virtual scalar input) remains of minimum phase robustly against any patterns of actuator faults and parametric uncertainties. With the aid of the CA law, we propose a new inverse model-based DOB design for the augmented SISO system in order to quickly compensate all admissible abrupt changes of system caused by the actuator faults. It will be proved via the singular perturbation theory [Hop66, KKO99] that the proposed DOB-based FTC, consisting of the DOB and the CA law, resolves the problem of interest. A few additional remarks on the proposed FTC are: a) our result is semiglobal so that any large but bounded) parametric uncertainty and actuator faults can be handled; and b) without utilizing structural knowledge on the disturbance, the performance recovery of the DOB-based FTC is approximate; however, the approximation error can be made small arbitrarily. 4.1 Problem Formulation We consider a MISO linear plant ẋ = Ax + Bu + d), y = Cx 4.1.1) where x R n is the state, y R is the output, d = [d 1 ;... ; d m ] R m is the disturbance, u = [u 1 ;... ; u m ] R m is the actuator input, and A R n n, B =: [B 1,..., B m ] R n m, and C R 1 n are unknown matrices satisfying that A, B) is controllable and C, A) is observable. The disturbance dt) is of C 2, and dt) and its time derivative are bounded with known bounds. It is assumed that the initial condition x0) belongs to a bounded set. Throughout this paper, we pay our attention to a particular class of MISO

111 88 Chap. 4. Disturbance Observer-based Fault Tolerant Control systems 4.1.1) that are of minimum phase in an input-wise sense, stated as follows. Assumption Each SISO subsystem CsI A) 1 B i, i = 1,..., m, of 4.1.1) satisfies the following conditions: a) The system has the relative degree ν 1 uniformly on i = 1,..., m; more precisely, CA j B i = 0 for all j = 0,..., ν 2, and CA ν 1 B i 0 with known sign; b) The numerator of its transfer function, denoted by N i s), is included in the set of Hurwitz polynomials N i := { } N i s) = N i,n ν s n ν +N i,n ν 1 s n ν 1 + +N i,0 : N i,j [N i,j, N i,j ] where N i,j and N i,j are known constants. Without loss of generality, let CA ν 1 B > 0 for all i = 1,..., m. The first item of Assumption admits a coordinate change [ ] x := ζ [ Tx T ζ ] 4.1.2) x 4.1.3) for the state x such that T x := [C; CA; ; CA ν 1 ] R ν n and [T x ; T ζ ] R n n is nonsingular. In the coordinate, the plant 4.1.1) of our interest is newly represented as the form ẋ = A ν x + B ν ϕ x + ψ z + g u + d) ), y = C ν x, 4.1.4a) ζ = Sζ + Gx + H u + d), 4.1.4b) Here, for an integer i 1, the matrices A i, B i, and C i are defined as [ ] 0i 1 I i 1 A i := R i i, B i := 0 0 i 1 [ 0i 1 1 ] R i 1, C i := [ ] 1 0 i 1 R 1 i,

112 4.1. Problem Formulation 89 while the matrices ϕ R ν, ψ R n ν, g := [g 1,..., g m ] R 1 m, S R n ν) n ν), G R n ν) ν, and H =: [H 1,..., H m ] R n ν) m are uncertain by definition. It is easy to see that g i = CA ν 1 B i > 0, and 0 < g i g i g i with positive constants g i and g i. Under the assumptions, one can also see that x0) X 0 and ζ0) S 0 for some compact sets X 0 R ν and S 0 R n ν. Keeping the equivalence of 4.1.1) and 4.1.4) in mind, in what follows we mainly regard 4.1.4) as the plant to be controlled. We suppose that in addition to the model uncertainty and the external disturbance, at most m 1 actuator faults may take place during the operation. For its detailed description, let us define T i > 0, i = 1,..., m, as the time instant when the i-th actuator is under fault. To prevent the controllability of 4.1.4) from losing, it is natural to assume that there exists at least one i [m] satisfying that T i =. Then µt) := {i : t < T i } 2 [m] \ { } 4.1.5) stands for the set of indices, of which the actuators operates normally at the moment t. On the other hand, for given µ 2 [m] \ { } the indicator matrix Λ µ R m m is defined as a diagonal matrix Λ µ = diagλ µ,1,..., Λ µ,m ) where Λ µ,i = 1 if i µ and Λ µ,i = 0 otherwise. With these symbols, the following assumption on the actuator failure is made. Assumption The actuator input ut) of the plant 4.1.4) is the form of ut) = Λ µt) u con t) + I Λ µt) ) u flt 4.1.6) where µt) is defined as 4.1.5), u con =: [u con,1,, u con,m ] R m is the input signal generated by a controller, and u flt =: [u flt,1,..., u flt,m ] R m is an unknown constant vector contained in an arbitrarily large but) bounded set. Moreover, there exists a dwell time dwell > 0 such that the failure moments T i in 4.1.5) satisfy min i,j [m] T i T j ) dwell. Remark The class of actuator faults considered in Assumption include the lock-in-place or stuck) fault i.e., u flt,i = u it i )) and the floating fault i.e., u flt,i = u i for an unknown u i ).

113 90 Chap. 4. Disturbance Observer-based Fault Tolerant Control The main purpose of this chapter is to force the considered plant 4.1.4) to behave as a fault-free nominal model, in view of the output trajectory. Since the worst scenario we may encounter in the sense of actuator failure) is that only one healthy actuator is left, it would be reasonable to consider the following SISO system as a nominal model of 4.1.4): ẋ n = A ν x n + B ν ϕ n x n + ψ n ζ n + g n v n ), yn = C ν x n, 4.1.7a) ζ n = S n ζ n + G n x n + H n v n 4.1.7b) where x n R ν and ζ n R n ν are the nominal states, v n R is the nominal scalar) input, and y n R is the nominal output. The matrices ϕ n, ψ n, G n, S n, M n, and H n are nominal components, and the initial conditions x n 0) and ζ n 0) are located in X 0 above and a compact subset Sn 0 of R n ν, respectively. For some technical reason, let Sn 0 be larger than a bounded set {H n /g n )Bν x n 0) : x n 0) X 0 }.) It is supposed that without any uncertain factor, a static or dynamic) output feedback controller ċ n = Ec n + F r y n ), v n = Jc n + Kr y n ) 4.1.8) is constructed a priori for the nominal model 4.1.7), in which c n R nc is the controller state initiated in a compact set Cn, 0 r R is the reference signal for y n such that rt) is C 2, and rt) and ṙt) are bounded, and E, F, J, and K are some matrices. We assume that the controller 4.1.8) stabilizes the nominal closed-loop system 4.1.7) and 4.1.8) and ensures a satisfactory tracking performance. Now, we are ready to state the problem under consideration. Problem of Chapter 4: Provided that Assumptions and hold and a threshold ϵ > 0 is given, to construct an output feedback fault tolerant controller FTC) ϱ = f ftc ϱ, y, r), u con = h ftc ϱ, y, r) 4.1.9) such that a) the state [xt); ζt)] of the closed-loop system 4.1.4), 4.1.6), and

114 4.2. Controller Design ) is bounded during the system operation, and b) its output yt) satisfies yt) y n t) < ϵ, t 0, ) where y n t) is an output trajectory of the nominal closed-loop system 4.1.7) and 4.1.8) with x0) = x n 0) X 0 or equivalently, [y n 0),..., y ν 1) n 0)] = [y0),..., y ν 1) 0)] ) and some [ζ n 0); c n 0)] S 0 n C 0 n. The second item in the problem statement, which is our primary concern, means that the FTC 4.1.9) recovers a pre-defined fault-free tracking performance of the nominal closed-loop system 4.1.7) and 4.1.8) in approximate but arbitrarily accurate sense. More importantly, this recovery is desired to be achieved for transient as well steady-state) periods including the failure moments, t = T i. 4.2 Design of Disturbance Observer-based Fault Tolerant Controller In this section, we propose an output feedback FTC 4.1.9) that solves the problem of this chapter, based on the DOB approach. It should be noted that the usual DOB designs in the literature are not directly applicable to our problem. This is because, the previous works mostly took into account square systems i.e., systems having the same number of inputs and outputs) with the number of inputs known, whereas the plant 4.1.4) and 4.1.6) considered here has an uncertain number of redundant inputs in which such uncertainty follows from possible actuator faults) As a simple way to avoid this difficulty, we here employ an auxiliary scalar input v R and allocate it into the control input u con t) of 4.1.4) as u con t) = κvt) 4.2.1) where κ = [κ 1 ; ; κ m ] R m 1 is a constant vector. The underlying rationale behind the fixed CA law 4.2.1) is that the plant 4.1.4) and 4.1.6) augmented

115 92 Chap. 4. Disturbance Observer-based Fault Tolerant Control with 4.2.1), computed by ẋ = A ν x + B ν ϕ x + ψ ζ + gλ µ κv + g1 Λ µ )u flt + gd ), y = C ν x, 4.2.2a) ζ = Sζ + Gx + HΛ µ κv + H1 Λ µ )u flt + Hd, 4.2.2b) now can be viewed as a SISO system with respect to the auxiliary input v; more importantly, this property is invariant on the pattern of the actuator faults. Another advantage of 4.2.1) is that the design parameter κ explicitly appears in the new input matrix [gλ µ κ; HΛ µ κ] of the SISO system 4.2.2), which brings an opportunity to handle the system zeros of 4.2.2). This is of utter importance to us, since the DOB design basically follows the philosophy of high-gain technique [BS08, BS09] where the controlled plant is necessarily of minimum phase. In the next subsection, we will show that this requirement can always be obtained even in the presence of model uncertainty and actuator faults) by selecting κ appropriately Static Gain of Control Allocation Law We start by introducing a natural definition of the minimum phaseness for the system 4.2.2). Definition The system 4.2.2) with the switching signal µt) in 4.1.5) is said to be of µ-invariant minimum phase if it is of minimum phase for any constant µ 2 [m] \ { }. The following lemma then provides a simple necessary and sufficient condition for the µ-invariant minimum phaseness. Lemma All the systems 4.1.4) satisfying Assumption are of µ- invariant minimum phase if and only if, for the set { } K µ := κ in i s) : N i s) N i in 4.1.2), 4.2.3) i µ every polynomials in µ 2 [m] \{ } K µ are Hurwitz.

116 4.2. Controller Design 93 Proof. The lemma can be easily proved by showing that for the transfer function of 4.1.4) with a constant set µ 2 [m] \ { }, its numerator is the same as i µ κ in i s). Motivated by the result of Lemma 4.2.1, the main goal of this subsection is to design the static gain κ in 4.2.1) that makes every elements of 2 [m] \{ } K µ in Lemma Hurwitz. In the following, such κ will be selected in an iterative way. For this, let us consider the equality K 2 [k+1] µ = K {k+1} \{ } µ 2 [k] \{ } K µ ) ) K µ 2 [k] µ {k+1} \{ } 4.2.4) for k = 0,..., m 1, which presents a recursive decomposition of 2 [k+1] \{ } K µ. We here note that the set µ 2 [k] \{ } K µ in the recursive relation 4.2.4) is welldefined only with partial components κ 1,..., κ k of κ. It is also pointed out that for any polynomial N i s) N i, its leading coefficient N i,n ν is the same as the i-th component g i > 0 of the high-frequency gain matrix g of 4.1.4). We now claim that if κ i > 0, i = 1,..., k with k m 2), are chosen such that the polynomials in µ 2 [k] \{ } K µ are all Hurwitz, then there exists κ k+1 > 0 with which the polynomials in µ 2 [k+1] \{ } K µ are also Hurwitz. Under the hypothesis and Item b) of Assumption 4.1.1, the first two sets in the right hand-side of 4.2.4) naturally consist only of stable polynomials, regardless of the vaule of κ k+1. On the other hand, for each µ 2 [k] \ { } an element of K µ {k+1} is the form of K µ {k+1} s) := κ k+1 N k+1 s) + i µ κ in i s) ) Notice that because κ i N i,n ν > 0 for all i = 1,..., k and the latter polynomial i µ κ in i s) in 4.2.5) is Hurwitz by definition, all the coefficients of K µ {k+1} s) above must be positive. It is then obtained from the Kharitonov s theorem [BCK95] that for given µ 2 [k] \ { } and κ k+1 > 0, all the uncertain polynomials K µ {k+1} s) in K µ {k+1} are Hurwitz if and only if the following four ex-

117 94 Chap. 4. Disturbance Observer-based Fault Tolerant Control treme polynomials are Hurwitz: K µ {k+1},j s) := κ k+1n k+1,j s) + i µ κ in i,js), j = a, b, c, d 4.2.6) where for i = 1,..., m, N i,as) 4.2.7a) := N i,n ν s n ν + N i,n ν 1 s n ν 1 + N i,n ν 2 s n ν 2 + N i,n ν 3 s n ν 3 +, N i,b s) 4.2.7b) := N i,n ν s n ν + N i,n ν 1 s n ν 1 + N i,n ν 2 s n ν 2 + N i,n ν 3 s n ν 3 +, N i,cs) 4.2.7c) := N i,n ν s n ν + N i,n ν 1 s n ν 1 + N i,n ν 2 s n ν 2 + N i,n ν 3 s n ν 3 +, N i,d s) 4.2.7d) := N i,n ν s n ν + N i,n ν 1 s n ν 1 + N i,n ν 2 s n ν 2 + N i,n ν 3 s n ν 3 +. We emphasize that N i,j s) in 4.2.7) are the very extreme polynomials of N is) of the set N i in 4.1.2), all of which are thus Hurwitz by the Kharitonov s theorem and Item b) of Assumption It then follows from the root locus technique that for each j {a,..., d}, there exists sufficiently large κ µ {k+1},j > 0 such that K µ {k+1},j s) in 4.2.6) is Hurwitz for all κ k+1 > κ µ {k+1},j > 0. At last, take κ k+1 sufficiently large to satisfy κ k+1 > { max µ 2 [k+1] \{ } max j={a,b,c,d} { κµ {k+1},j } } 4.2.8) so that all the uncertain polynomials of µ 2 [k+1] \{ } K µ {k+1} and thus those of µ 2 [k+1] \{ } K µ in the left hand-side of 4.2.4)) are Hurwitz. By repeating this routine up to m 1 steps, we propose a design guideline for the static gain κ. Procedure Static gain κ of control allocation law) STEP 0 Take κ 1 > 0 arbitrarily so that all the polynomials of 2 [1] \{ } K µ = K {1} ) are Hurwitz.

118 4.2. Controller Design 95 STEP k k = 1,..., m 1) For each µ 2 [k+1] \ { } and each j {a,..., d}, select κ µ {k+1},j > 0 such that with κ i derived by the previous steps, the extreme polynomials K µ {k+1},j s) in 4.2.6) are Hurwitz for all κ k+1 > κ µ {k+1},j > 0. Choose κ k+1 to satisfy 4.2.8). STEP m With κ i selected in the above steps, take κ = [κ 1 ; ; κ m ]. Theorem Under Assumption 4.1.1, the SISO system 4.2.2) with κ computed by Procedure is of µ-invariant minimum-phase. Proof. The proof is trivial and thus it is omitted Representation to Byrnes-Isidori Normal Form As a prerequisite for the DOB design, in this subsection we represent the augmented system 4.2.2) and the nominal model 4.1.7) into a Byrnes-Isidori normal form [Kha96, Chapter 11]. For the former dynamics, we first introduce a variable z µ := ζ 1 gλ µ κ HΛ µκb ν x = ζ 1 gλ µ κ HΛ µκx ν R n ν ) It is noted that with κ i > 0, 0 < min i {1,...,m} {g i κ i} gλ µ κ = i µ g iκ i m i=1 g iκ i ) directly hold for all constant sets µ 2 [m] \ { }. This implies that 4.2.9) is welldefined for any µt) in 4.1.5). The following lemma then says that for a time period within which no fault occurs, the composite variable x, z µ ) can serve as a new coordinate that represents 4.2.2) into a Byrnes-Isidori normal form. Lemma Let T and T be positive constants such that µt) in 4.1.5) is fixed for T t < T. Then during that period, the SISO system 4.2.2) is represented in the coordinate change x, z µ ) with 4.2.9) as ẋ = A ν x + B ν ϕ µ x + ψ µ z µ + g µ v + d x,µ ), y = Cν x, a)

119 96 Chap. 4. Disturbance Observer-based Fault Tolerant Control ż µ = S µ z µ + G µ x + d z,µ b) where ϕ µ := ϕ + HΛ µκ gλ µ κ ψ Bν, ψµ := ψ, g µ := gλ µ κ, S µ := S HΛ µκ gλ µ κ ψ, G µ := G HΛ µκ gλ µ κ ϕ + H µ := HΛ µ κ S HΛ µκ gλ µ κ ψ ) HΛµ κ gλ µ κ B ν, and d x,µ := G1 Λ µ )u flt + Gd, d z,µ := H1 Λ µ ) HΛ ) µκ gλ µ κ g1 Λ µ) u flt + H HΛ ) µκ gλ µ κ g d. Proof. The lemma is easily proved by differentiating z µt) t) = z µ t) along with the x, ζ)-dynamics 4.2.2), and we skip the details. Note that all the matrices and the external signals in the x, z µ )-dynamics are uncertain but bounded with known bounds, as those in the original dynamics 4.2.2) do. From this fact, one can find out some bounds for the uncertain parameters, uniformly on µ 2 [k] \ { }; in particular, let D x R and D z R be compact sets such that d x,µt) t) D x, and d z,µt) t) D z for all t 0 and all admissible µt) in 4.1.5). On the other hand, we also observe that the set of the initial conditions z µ0) 0) = z {1,...,m} 0) is bounded by { z µ0) 0) = ζ0) Hκ } gκ B ν x0) : ζ0) S 0, x0) X 0 Z 0 for a µ-independent compact subset Z 0 of R n ν. A similar result can be derived for the nominal model 4.1.7). considering a coordinate [x n ; z n ] where Indeed, in z n := ζ n 1 g n H n B ν x n = ζ n 1 g n H n x n,ν, )

120 4.2. Controller Design 97 one can readily express the nominal model 4.1.7) as the form ẋ n = A ν x n + B ν ϕ n x n + ψ n z n + g n v n ), y n = C ν x n, a) ż n = S n z n + G n x n b) where ϕ n := ϕ n + 1 g n H n ψ n B ν, ψ n := ψ n, g n = g n, S n := S n H n g n ψ n, G n := G n H n g n ϕ n + S H n g n ψ n ) Hn g n B ν. Similar to Z 0, we denote the set of possible initial conditions z n 0) for all ζ n 0) S 0 n and x n 0) X 0 as Z 0 n. We note in advance that the bounds for the plant ) and the nominal model ) will be utilized for the DOB design in the following subsection Disturbance Observer-based Controller In this subsection, we complete the design of the FTC 4.1.9) by constructing a DOB-based controller for the augmented SISO system 4.2.2). As in other relevant works, the DOB-based controller to be proposed here consists of two parts; baseline controller and DOB. Among them, the former part is designed by duplicating the existing structure 4.1.8) with y n replaced by y as ċ = Ec + F r y), v BL = Jc + Kr y) ) where c R nc is the state of ) initiated in C 0 n. Hence, the remainder of this subsection is devoted to construct the DOB. As the first task for the DOB design, we choose a i, i = 0,..., ν 1, such that the transfer function s ν + a ν 1 s ν a 1 s + g/g n )a 0 s ν + a ν 1 s ν a 1 s + g/g n )a )

121 98 Chap. 4. Disturbance Observer-based Fault Tolerant Control is SPR [Kha96, Chapter 6] where { } { } m g := min g n, min {g i {1,...,m} i κ i} > 0 and g := max g n, g i κ i i= ) via the proposed design guidelines in Appendix A.1. Next, based on the normal form expressions ) and ), we compute some compact sets in which the nominal state [x n t); z n t); c n t)] and the partial actual state z µt) t) are expected to remain during system operation. For the former variable, it is noted in advance that the nominal closed-loop system 4.1.8) and ) will play a role as a stable and time-invariant) reference model for the switched system 4.1.9) and ), which experiences at most m 1 switches in the dynamics. To take into account the effect of switching dynamics, bounded sets for the nominal states xt), z n t), and c n t) are derived in a recursive way as follows for initialization, let X 0 0 := X 0, Zn, 0 0 := Z0 n, and C 0 0 := C0 n): Procedure Bounds of nominal states x n, z n, and c n ) STEP j j = 0,..., m 1) Select bounded sets X j R ν, Z n, j R n ν, and C n, j R nc such that the solution [x n t); z n t); c n t)] of 4.1.8) and ) initiated in X 0 j Z0 n, j C0 n, j belongs to X j Z n, j C n, j for all admissible reference signal r. Then take large compact sets X j, Z n, j, and C n, j to satisfy X j Z n, j C n, j ϵ/m X j Z n, j C n, j ) Set X j+1 0 := X j, Zn, j+1 0 := Z n, j, and Cn, j+1 0 := C n, j. STEP m Take X := X m 1, X := X m 1, Z n := Z n, m 1, Z := Z n, m 1, C n := C n, m 1, and C n := C n, m 1. We note in advance that all the trajectories [x n t); z n t); c n t)] of the nominal closed-loop system in the analysis to come will belong to the bounded region X Z n C n. On the other hand, the slightly larger set X Z n C n will be used

122 4.2. Controller Design 99 as a bound for the actual counterpart [xt); z nt); ct)] in the presence of up to m 1 actuator faults) of the nominal state, in which z n will be presented shortly in c). From now on, we derive a bound for the partial state z µ of the actual plant ). The way of computing its bound is basically similar to that for the nominal state above, whereas the main difference comes from the fact that z µ may jump at every failure moments. To take a look at the jumping behavior, we remark that the vector field of the x, ζ)-dynamics 4.1.4) is piecewise continuous on t, by which the solution [xt); ζt)] is continuous on t [Kha96, Chapter 3]. From the continuity of ζt), it follows that at each switching time t = T {T 1,..., T m }, z µt) t) jumps from lim t T z µt) t) to z µt ) T ) = ζt ) HΛ µt )κ gλ µt ) κ B ν xt ) = lim t T z µt) t) + lim t T HΛ µt) κ gλ µt) κ B ν xt) HΛ µt )κ gλ µt ) κ B ν xt ). On the other hand, by the property of the Byrnes-Isidori normal form, the system 4.2.2) is of µ-invariant minimum phase if and only if the matrix S µ in ) is Hurwitz for all µ 2 [m] \ { }. Therefore with κ obtained by the proposed guideline and the external inputs x and d x,µ being bounded, the solution z µ t) of b) must belong to a bounded region during the time period between the sequential failure moments. Summing up these findings, we compute a bound of z µ as follows let Z 0 0 = Z0 for initialization): Procedure Bound of actual state z µ ) STEP j j = 0,..., m 1): Take a compact set Z j R n ν such that { Z j z µ t) of b) initiated in Z j 0 : ) } x X, d z,µ D z, µ 2 [m] \ { }. Choose a bounded set Z 0 j+1 Rn ν satisfying that Z 0 j+1 { z + 1 g µ H µ B ν x 1 g µ H µ B ν x :

123 100 Chap. 4. Disturbance Observer-based Fault Tolerant Control } z Z j, x X, µ 2 [m] \ { }. STEP m Take Z := Z m 1. a set To proceed, with the sets obtained via Procedures and 4.2.6, we define D total := { d total,µ := 1 ϕ µ x + ψ µ z µ + g µ Jc + Kr Cν x) ) + g µ d x,µ g µ ϕ n x ψn z n g n Jc + Kr Cν x) )) : ) } z µ Z, [x; z n; c] X Z n C n, d x,µ D x, µ 2 [m] \ { }. and take a larger compact set D total D total. Using the compact sets W and X, we now design two saturation functions s w : R R and s x : R ν R ν that are of C 1, bounded, and satisfy s w w) = w, w D total, and 0 d dw s w 1, w R, a) s x q) = q, q X, and 0 d dq s x 1, q R ν b) Integrating the components above into one, we propose a DOB as follows: ṗ = A ν Υ 1 ) a 0 ν τ)αc ν p + τ ν B νv, q = A ν B ν α Υ ν τ) 1) q + a 0 τ ν B νy, ż n = S n z n ) + G n s x q, w = C ν p + 1 ) q ν ϕ n q ψn z n g n = C ν p + 1 α Υ ν τ) 1 q + a ) 0 g n τ ν y ϕ n q ψn z n a) b) c) d)

124 4.2. Controller Design 101 Baseline controller Disturbance Actuator fault Uncertain plant Control allocation law Disturbance observer Figure 4.1: Overall configuration of proposed DOB-based FTC consisting of input allocation law 4.2.1), baseline controller ), and DOB ) where τ > 0 is a small design parameter that will be taken in Theorem 4.3.1, α := a 0. Rν, α := a ν 1. Rν, a ν 1 a 0 Υ ν τ) := diagτ, τ 2,..., τ ν ) R ν ν, and Υ ν τ) := diagτ ν, τ ν 1,..., τ) R ν ν. The initial conditions p0) and q0) are taken arbitrarily to be contained in a compact set Fpq 0 R 2ν. On the other hand, for z n0) we take a slightly smaller set Z 0 n Zn 0 than Zn 0 such that a nonempty and bounded set satisfies z n0) 1 g n H n B ν x n 0) S 0 n ) for all z n0) Z 0 n and x n 0) X 0. Such nonempty Z 0 n always exists by the definition of Sn.) 0 With the set, choose z n0) Z 0 n. Remark It can be readily seen that with s w and s x being inactive, the proposed DOB ) becomes simplified into the conventional structure presented in literature, whose Q-filter has the form of a low-pass filter Qs; τ) = a 0 /τs) ν + a ν 1 τs) ν a 1 τs) + a 0 ).

125 102 Chap. 4. Disturbance Observer-based Fault Tolerant Control Summarizing the discussions so far, we construct the FTC 4.1.9) as the combination of the fixed CA law 4.2.1), the baseline controller ), the DOB ), and the composite control law v = v BL s w w) ) The configuration of the overall system controlled by the proposed FTC is given in Figure Performance Analysis This subsection is organized to show that the proposed DOB-based FTC 4.2.1), ), ), and ) with small τ solves the problem of interest, especially in the sense of the following theorem. Theorem Suppose that Assumptions and hold. Then for given ϵ > 0, there exists τ > 0 such that for all τ 0, τ), the solution of the closed-loop system 4.1.4), 4.1.6), 4.2.1), ), and ), initiated at [x0); ζ0); z n0); c0); p0); q0)] X 0 S 0 Z 0 n C 0 Fpq, 0 satisfies the following statements: a) [xt); ζt)] X S n for all t 0; b) [xt); z nt); ct)] [x nt); z nt); c nt)] < ϵ, t ) where [x nt); z nt); c nt)] is the trajectory [x n t); z n t); c n t)] of the nominal closed-loop system 4.1.7) and 4.1.8), initiated at [x n 0); z n 0); c n 0)] = [x0); z n0); c0)] X 0 Z 0 n C 0 n. We point out that in the coordinate [x; ζ n; c] with ζ n := z n +H n /g n )B ν x n 0), the inequality 4.3.1) in Theorem is rewritten by [xt); ζ nt); ct)] [x nt); ζ nt); c nt)] < ϵ

126 4.3. Performance Analysis 103 where ζ nt) := z nt) + H n /g n )B ν x nt) initiated at ζ n0) = z n0) + 1 g n H n B ν x n0) = z n0) + 1 g n H n B ν x0) S 0 n. The theorem will be proved in the following steps. First, with a coordinate transformation for p and q, we represent the overall system together with the Byrnes-Isidori normal form ) and )) into the standard singular perturbation form Lemma 4.3.2). In particular, it will be seen that on the boundary layer in view of the singular perturbation theory, the x, z n, c)-dynamics, a part of the slow subsystem, behaves as the nominal closed-loop system i.e., the x n, z n, c n )-dynamics ) and 4.1.8)) for any patterns of actuator failure. Since the discontinuity on z µ makes the singular perturbation theory inapplicable for the entire time period, we alternatively apply the Tickonov s theorem [Hop66] to each subinterval of time between two sequential moments of failure Lemma 4.3.3). By doing so, we will see that the actual state [xt); z nt); ct)] could remain close to a nominal trajectory [x n t); z n t); c n t)] at least for a while, even though the latter is not necessarily the same as [x nt); znt); c nt)]. Nonetheless, the difference between these nominal trajectories is negligible due to stability of the nominal closed-loop system, which concludes Theorem We begin the proof by representing the overall system into a singular perturbation form [Kha96, KKO99]. Lemma Let T > 0 and T > 0 be such that µt) in 4.1.5) is constant for T t < T. Then with the coordinate changes 4.2.9) and ξ := Υ ν τ) 1 Πτ)q x ), η := 1 τ Υ ντ)p + a 0 g n Υ ν τ) 1 Πτ)q x ) = 1 τ Υ ντ)p + a 0 g n ξ 4.3.2a) 4.3.2b) where a 0 a 1 τ a ν 1 τ ν 1 Πτ) := 1. 0 a.. 0. a R ν ν, 4.3.3) a1 τ 0 a 0

127 104 Chap. 4. Disturbance Observer-based Fault Tolerant Control the closed-loop system 4.1.4), 4.1.6), 4.2.1), ), ), and ) is transformed into a standard singular perturbation form for T t < T, with respect to the perturbation parameter τ: slow subsystems: the augmented plant ) and ż n = S n z n + G n s x Πτ) 1 x + Υ ν τ)ξ) ) 4.3.4a) fast subsystems: τ ξ = A ν αc ν )ξ B ν ϕ µ x + ψ µ z µ + g µ v + d x,µ ), 4.3.5a) τ η = A ν αc ν )η + a 0 B ν 1 g ) µ v 1gn ) ϕ ) µ x + ψ µ z µ + d x,µ g n 4.3.5b) where v = Jc + Kr C ν x) 4.3.6) s w C ν η 1 ϕ n Πτ) 1 x + Υ ν τ)ξ) + ψn z g n) ). n Proof. It is easy to derive the slow subsystems 4.3.4) from Lemma and q = Πτ) 1 x + Υ ν τ)ξ), while the remaining part of the proof is devoted to compute the fast subsystems 4.3.5). By definition, we have and thus, q ν = a 0 τ ν q 1 a 1 τ ν 1 q 2 a ν 1 τ q ν + a 0 τ ν x 1 = a 0 ξ ) p 1 1 g n q ν = C ν 1/τ)Υ ν τ)p + a 0 g n C ν ξ = C ν η. Then the time derivative of ξ i is computed by: for i = 1,..., ν 1, ξ i = 1 1 a0 τ ν+1 i q i + τa 1 q i τ ν i 1 a ν i 1 q ν 1 + τ ν i ) ) a ν i q ν ẋi a 0

128 4.3. Performance Analysis 105 = 1 τ + 1 τ 1 τ ν i a ν i a 0 ) ) 1 a 0 q i+1 + τa 1 q a i+1) τ ν i+1) a ν i+1) q ν ) x i+1 0 q ν = 1 τ ξ i+1 a ν i τ ξ ) while for i = ν, ξ ν = 1 τ q ν ẋ ν ) = 1 τ a 0ξ 1 1 τ ϕ µ x + ψ µ z µ + g µ v + d x,µ ) ) This gives 4.3.5a) and 4.3.6). On the other hand, to obtain the η-dynamics 4.3.5b) we define an intermediate variable ˆη := 1/τ)Υ ν τ)p, with which η := ˆη + a 0 /g n )ξ. Using the p-dynamics a), one has τ ˆη Aν = Υ ν τ)ṗ = Υ ν τ) Υ 1 ) ν τ)αc ν τυν τ) 1ˆη + a ) 0 τ ν B νv = A ν αc ν )ˆη + a 0 B ν v ) Now, differentiating η = ˆη + a 0 /g n )ξ with the ˆη-dynamics ) and the ξ- dynamics 4.3.5a) leads to τ η = ) A ν αc ν )ˆη + a 0 B ν v + a 0 g n A ν αc ν )ξ B ν ϕ µ x + ψ µ z µ + g µ v + d x,µ ) ). This directly implies 4.3.5b) and concludes the proof. To figure out the quasi-steady-state behavior of the singularly perturbed system 4.3.4) 4.3.5), it is for now assumed that the slow variables µ, x, z n, c, z µ, d x,µ, and d z,µ are frozen as µ 2 [m] \ { }, [x; z n; c] X Z n C n, z µ Z, d x,µ D x, d z,µ D z ) Under the hypothesis, we now compute a possibly µ-dependent) solution ξ µ =: [ξ µ,1 ; ; ξ µ,ν] and η µ =: [η µ,1 ; ; η µ,ν] of the following degenerating equation which is obtained by putting τ = 0 and [ξ; η] = [ξ µ; η µ] into the fast dynamics

129 106 Chap. 4. Disturbance Observer-based Fault Tolerant Control 4.3.5)): 0 = a ν i ξµ,1 + ξµ,i+1, i = 1,..., ν 1, a) [ 0 = a 0 ξµ,1 ϕ µ x + ψµ z µ + g µ Jc + Kr Cν x) ) + g µ d x,µ g µ s w η µ,1 1 ) ] ϕ n x + ψn z g n) n and 0 = a ν i ηµ,1 + ηµ,i+1, i = 1,..., ν 1, b) [ 0 = a 0 ηµ,1 + a 0 1 g ) µ Jc + Kr Cν x) ) g n 1 g ) µ s w ηµ,1 1 ) ϕ n x + ψn z g n g n) 1 ] ϕ µ x + ψµ z µ + d x,µ ) n g n where Π0) = I and Υ ν 0) = 0 are used). It can be seen that the degenerating equation ) admits a solution ξµ,1 = 1 ϕ n x + ψn z n + g n Jc + Kr Cν x) )), a) a 0 ) ηµ,1 gn = 1 Jc + Kr C ν x) + 1 ) ϕ n x + ψn z g µ g n) n 1 g µ ϕ µ x + ψ µ z µ + g µ d x,µ ), b) ξ µ,i = 0 and η µ,i = 0, i = 2,..., ν c) It should be emphasized that ) is in fact the unique solution of ), because the right hand-side of the last row of b) is a strictly decreasing function of ηµ,1 by the property of s w. In the computation of the solution, one may verify that with the slow variables frozen as in )), the input of s w η µ,1 1 g n ϕ n x + ψ n z n) = d total,µ ) belongs to D total in ) so that the saturation function is inactive. It readily follows that on the boundary layer [ξ; η] = [ξ µ; η µ] and with τ = 0, the singularly perturbed system 4.3.4) 4.3.5) becomes reduced into the z µ -

130 4.3. Performance Analysis 107 dynamics b) and ẋ = A ν x + B ν ϕ n x + ψ n z n + g n Jc + Kr C ν x)) ), ż n = S n z n + G n x, ċ = Ec + F r C ν x) a) b) c) It should be emphasize that a) c) is decoupled from the remaining z µ -dynamics, having exactly the same dynamics as the µ-independent) stable nominal closed-loop system 4.1.8) and ). Thus in the singular perturbation theoretic point of view, one may expect that the two trajectories [xt); z nt); ct)] and [x n t); z n t); c n t)] might be close to each other with small perturbation parameter τ. This is indeed the case for the subintervals of time between two sequential moments of failure, as in the following lemma. Lemma Suppose that Assumptions and hold. Let P = P > 0 be the solution of the Lyapunov equation P A n + A n P = I where A n is the system matrix of the nominal closed-loop system 4.1.8) and ). Then for given constant set µ 2 [m] \ { } and ϵ > 0, there exists τ µ > 0 such that if µt) = µ for a time period T t < T satisfying T T > dwell ; [xt ); z nt ); ct )] X 0 j Z0 n, j C0 n, j, and z µ T ) Z0 j {0,..., m 1}; for some j [pt ); qt )] F pq where F pq R 2ν is a bounded set independent of τ, then the state trajectory of the closed-loop system 4.1.4), 4.1.6), 4.2.1), ), ), and ) satisfies the following statements for all τ 0, τ µ ): a) for all T t < T, the partial state [xt); z nt); ct)] belongs to X j Z n, j C n, j and satisfies [xt); z nt); ct)] [x n t); z n t); c n t)] < ϵ λp ) m λp ) ) where [x n t); z n t); c n t)] is the solution of the nominal closed-loop system 4.1.8) and ) initiated at [x n T ); z n T ); c n T )] = [xt ); z nt ); ct )];

131 108 Chap. 4. Disturbance Observer-based Fault Tolerant Control b) z µ t) remains in Z j for all T t < T ; c) there exists a τ-independent bounded set F pq such that [pt ); qt )] F pq. Proof. We here briefly sketch the proof especially for Item a)), while the detailed proof is similar to that of the theorems in the previous chapters. Roughly speaking, the lemma will be proved by applying the Tichonov s theorem [Hop66] to the singularly perturbed form 4.3.4) 4.3.5). It is clear that the reduced subsystem ) is stable, because the internal dynamics ) of the actual plant is stable by the selection of κ. We now investigate the stability of the fast subsystem 4.3.5), which is a requirement of the Tichonov s theorem [Hop66]. To this end, we define the error variables ξ µ := ξ ξ µ and η µ := η η µ ) where ξ µ and η µ are given in )). By differentiating ) with respect to a scaled time ς := t/τ and put τ = 0 to the resulting equations so that the slow variables are frozen in the time scale ς), one obtains the boundary-layer system as follows: d dς ξ µ = A ν αc ν ) ξ µ + B ν g µ d dς η µ = A ν αc ν ) η µ a 0 B ν u η, y η := C ν η µ, where d total,µ u η = gµ g n 1 ) s w yη + d total,µ ) dtotal,µ, a) ) s w y η + d total,µ ) d total,µ ) b) is defined in ) and the origin is an equilibrium point of ). We now claim that the origin of the boundary-layer system ) is globally exponentially stable. Indeed, the transfer function of the linear subsystem from u η to y η ) in b) is given by Ls) := a 0 /s ν + a ν 1 s ν a 0 ), while the nonlinearity g µ /g n 1 ) s w y η + d total,µ ) d total,µ ) in uη belongs to the sector [g/g n 1, g/g n 1]. Therefore, from the the circle criterion [Kha96,

132 4.3. Performance Analysis 109 Theorem 7.1] and the fact that 1 + g/g n 1)Ls) 1 + g/g n 1)Ls) = sν + a ν 1 s ν a 1 s + g/g n )a 0 s ν + a ν 1 s ν a 1 s + g/g n )a ) is SPR, it is derived that the origin of the η µ -dynamics b) is globally exponentially stable. On the other hand, with the coefficients a i of the strictly positive real transfer function ) and with g/g n 1 g/g n, we have that the characteristic polynomial s ν +a ν 1 s ν 1 + +a 1 s+a 0 of the matrix A ν αc ν is Hurwitz. This concludes the claim. For the remainder of the proof, it is noted that the initial value [ξt ); ηt )] of the fast variables may diverge as τ goes to zero. Nonetheless, one can deal with this peaking phenomenon in a similar way in the previous chapters; that is, by dividing the entire time period T t T into the transient period T t < T + and the steady-state period T + t T, with a small constant 0 < < dwell /2. We omit the details. To proceed, take τ in the statement of Theorem as 0 < τ < min {τ µ }. µ 2 [m] \{ } In addition, denote the number of the actuator faults that occurs during system operation as m flt m 1. Then the moments T i of actuator faults, i = 1,..., m, can be rearranged in chronological order by T j {T 1,..., T m }, j = 1,..., m, to satisfy T 0 := 0 < T 1 < T 2 < < T mflt < T mflt +1 = = T m 1 = T m =. As the last step of the proof, we show that with τ < τ, the distance between [xt); z nt); ct)] and [x nt); z nt); c nt)] is smaller than ϵ for each period T j t < T j+1. For this, by repeating Lemma iteratively up to j = m flt, we obtain that for T j t < T j+1 [xt); z nt); ct)] [x n, j t); z n, j t); c n, j t)] < ϵ λp ) m λp ) ϵ m ) where [x n, j t); z n, j t); c n, j t)] stands for the trajectory [x n t); z n t); c n t)] of

133 110 Chap. 4. Disturbance Observer-based Fault Tolerant Control the nominal closed-loop system 4.1.8) and ) with the initial condition [x n, j T j ); z n, j T j ); c n, j T j )] = [xt j ); z nt j ); ct j )] so that the solution is well-defined for the truncated time period T j t < ). With a bundle of the nominal trajectories, we define the error variables x n, j z n, j := x n, j z n, j x n, j 1 z n, j ) c n, j c n, j c n, j 1 for j = 1,..., m flt, whose time derivative is computed by d dt x n, j z n, j c n, j = A n x n, j z n, j c n, j, T j t < T j ) Since [x n, j T j ); z n, j T j ); c n, j T j )] = [xt j ); z nt j ); ct j )] by definition, one has x n, j T j ) x n, j T j ) x n, j 1 T j ) z n, j T j ) = z n, j T j ) z n, j 1 T j ) c n, j T j ) c n, j T j ) c n, j 1 T j ) xt j ) x n, j 1 T j ) = z nt j ) z n, j 1 T j ) < ϵ λp ) m λp ) ct j ) c n, j 1 T j ) where the last inequality follows from ) in the previous step j 1. Now, we differentiate the Lyapunov function candidate V n, j := x n, j z n, j P x n, j z n, j c n, j c n, j along with the j-th error dynamics ), by which it is obtained that V n, j = [ x n, j ; z n, j ; c n, j ] 2 1/λP ))V n, j. Thus, the comparison lemma [Kha96,

134 4.3. Performance Analysis 111 Solutions Sets Figure 4.2: Visualization of proof of 4.3.1) when m flt = 2 Lemma 3.4] implies that x n, j t) z n, j t) λp ) λp ) c n, j t) e t/2λp )) for all T j t < T j+1 and j = 1,..., m flt. x n, j T j ) z n, j T j ) < ϵ m c n, j T j ) Finally, it results from Young s inequality, [x n, 0 t); z n, 0 t); c n, 0 t)] = [x nt); z nt); c nt)], and ) that xt) x z nt) nt) xt) x n, j t) znt) z nt) ct) c z n, j t) + j nt) ct) c n, j t) < ϵ m + j ϵ m < ϵ k=1 x n, k t) z n, k t) c n, k t) for all T j t < T j+1, j = 0,..., m flt m 1. This completes the proof of the theorem. An illustrative example for 5.1.1) is depicted in Figure 4.2.

135 112 Chap. 4. Disturbance Observer-based Fault Tolerant Control 4.4 Simulation: Fault Tolerant Control of Boeing 747 As an example, we take into account the 4-th order linearized lateral model of the Boeing 747 presented in [GY11, TCJ02]. In particular, with the unknown parameters w x,i [0.7, 1.3] and w u,i [0.97, 1.03] that represents parametric uncertainty on the dimensional derivative of rolling moment, the system considered here is represented as 4.1.4) where y = x R is the yaw rate rad/s), ζ 1 is the side-slip angle rad), ζ 2 is the roll rate rad/s), ζ 3 is the roll angle rad), u = u 1, u 2, u 3 ) R 3 is the the control input rad) that expresses the three rudder servos, and the matrices are defined as ϕ = 0.115w x,1, ψ = [ 0.598w x,2, w x,3, 0 ], g = [ w u,1, 0.5w u,2, 0.3w u,3 ], and S, M, and H are known matrices with suitable dimensions. Without loss of generality, we here multiply 1 into the original input matrix in [TCJ02] so that g i > 0 holds.) We assume that x0) [ 0.04, 0.04], ζ0) [ 0.004, 0.004] [ 0.02, 0.02] [ 0.015, 0.015], dwell 10 s, d i t) 0.005, d i t) 0.025, and u flt,i 0.1. The problem under consideration is to ensure the output yt) to track the reference signal rt) = 0.02 sin0.2t) rad/s in the presence of both model uncertainty and actuator failures. To address the problem, the proposed DOB-based FTC is constructed as follows. First, we take a nominal model 4.1.7) as the system with S n = S, M n = M, N n = N 3, G n = G 3, ϕ n = ϕ, and ψ n = ψ where the uncertain parameters are set as w x = w u = 0. To achieve a satisfactory nominal tracking performance, the nominal controller 4.1.8) is designed as a proportional-integral PI) controller with E = 0, F = 1, J = K int := 17, K = K prop := 3.4, and c n 0) = 0. Next, by the proposed design algorithm in Subsection 4.2.1, we set the gain κ of the input allocation law 4.2.1) as κ = [1/3; 1/3; 1/3]. After that, the DOB-based controller ) and ) is built up with a 0 = 1, τ = 0.04, c0) = 0, p0) = q0) = 0, z n0) = [0, 0, 0] and the saturation functions s w and s x obtained by D total := [ 0.51, 0.51] and X = [ 0.041, 0.041]. For comparison, we perform the simulations with two types of controllers; one is the proposed DOB-based FTC, while the other is the PI controller with the input allocation law 4.2.1) i.e., the FTC without the DOB part). In the

136 4.4. Simulation: Fault Tolerant Control of Boeing following simulations, a stochastic measurement noise under uniform distribution enters the system whose maximum magnitude is 10 4 rad/s, while the input disturbances are set as d 1 t) = sin1.05t), d 2 t) = sin2.1t), and d 3 t) = sin4.5t). For the simulation, the uncertain parameters w x,i and w u,i are taken as 0.7 and 0.97, respectively. Figure 4.3 depicts the simulation result when two lock-in-place actuator faults take place as: u flt,3 = u 3T 3 ) for T 3 = 50 s and u flt,2 = u 2T 2 ) for T 2 = 100 s. It is shown that unlike the PI control-based FTC, our proposed FTC almost recovers the fault-free tracking performance for entire time period, while all the state variables remain bounded. A similar result can be found in Figure 4.4, in which the actuator faults have the floating form of u flt,2 = 0.06 for T 2 = 50 s and u flt,3 = 0.06 for T 3 = 100 s, and additional output disturbance d y t) = sin4t) rad/s affects the system.

137 114 Chap. 4. Disturbance Observer-based Fault Tolerant Control a) Output rad/s): actual output yt) with black dashdotted) and without DOB red solid), and nominal output y nt) green dashed) b) Tracking error rad/s): actual error rt) yt) with black dash-dotted) and without DOB red solid), and nominal error rt) y nt) green dashed) c) Control input rad): u 1t) darkest), u 3t) intermediate), u 2t) brightest) d) Partial state ζ: ζ 1t) rad/s yellow solid), ζ 2t) rad blue dash-dotted), ζ 3t) rad/s brown dashed) Figure 4.3: Simulation results when two lock-in-place faults take place

138 4.4. Simulation: Fault Tolerant Control of Boeing a) Output rad/s): actual output yt) with black dashdotted) and without DOB red solid), and nominal output y nt) green dashed) b) Tracking error rad/s): actual error rt) yt) with black dash-dotted) and without DOB red solid), and nominal error rt) y nt) green dashed) c) Control input rad): u 1t) darkest), u 2t) intermediate), u 3t) brightest) d) Partial state ζ: ζ 1t) rad/s yellow solid), ζ 2t) rad blue dash-dotted), ζ 3t) rad/s brown dashed) Figure 4.4: Simulation results when two floating faults sequentially occur

139

140 Chapter 5 Stability, Performance, and Designs of Discrete-time Disturbance Observers for Sampled-data Systems: A Fast Sampling Approach Although the physical plants, for which the DOB scheme is applied, are mostly CT systems, the DOB-based controller is typically implemented in a digital device with a sampler and a holder usually zero-order holder ZOH)). The implementation issue has encouraged a series of substantial researches on the design of a DT-DOB, which are categorized mainly in two directions. The first one is just to transform a pre-designed CT-DOB into its discrete-time counterpart via various discretization methods [KC03, YCC03, TLT00]. The second one is, on the other hand, to construct a DT-DOB directly for a discretized plant model like in [WTS00, KK99], where the discretization takes into account inherent properties of sampled-data systems. Despite the increased attention paid to the DT-DOB so far, however, it seems that there is still some gap to the full understanding about robust stability under plant uncertainties as well as effective compensation of external disturbances). Indeed, most of the existing results on robust stability employed the small-gain theorem, so that only a sufficient condition for stability is obtained. This makes it difficult to handle large uncertainties, and there lacks a design procedure for Q-filters. More recently, a new approach was proposed in [LJS12], which is based on the CT result of [SJ09] that does not rely on the small-gain theorem. In the work 117

141 118 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems of [LJS12], the real CT plant is approximately discretized for the analysis, under the presumption that fast sampling will make the approximation error negligible in practice. However, as we shall see in this chapter, it is not true in general especially for systems having relative degree greater than two) and the sampleddata controlled system may become unstable when the sampling proceeds fast. In this chapter, motivated by those works [LJS12, SJ09], we present an almost necessary and sufficient condition for robust stability of DT-DOB-controlled systems under fast sampling. Here it is almost since some degenerate cases still remain inconclusive.) Since the analysis is based on the exact discretization of the plant and the DOB will be designed directly in the DT domain), our result is not an approximation anymore. Development of the stability condition begins by recalling the fact that fast sampling process may generate unstable sampling zeros" [HYA93, ÅHS84, YG14], in particular for the systems having relative degree greater than two. In this work, we will reveal a strong connection between these extra zeros and the stability of the DT-DOB controlled system, which cannot be observed from the CT-DOB analysis or from any approximations. More importantly, the result of this work presents a generalized framework for robust stability analysis, in the sense that it is available a) in whichever way the DT-DOB is designed, and b) no matter how the CT plant has arbitrarily large model uncertainty. For the former, we generalize the DT-DOB structure by using a generic form of the discretization methods. This generalization allows us to deal with a large class of the DT-DOB designs, and also to emphasize the importance of the discretized nominal model in the guaranteeing stability of the overall system. For example, it will be seen that if the nominal model in the DOB structure is exactly discretized in the sense of zero-order holding operation), the proposed stability condition incurs that the closed-loop system cannot be stable with high relative degree of the CT plants, regardless of the Q-filter and model uncertainties. Based on the stability result, this work also provides new systematic design procedures for the DT-DOB. A primary goal is to meet the robust stability condition always under arbitrarily large but bounded) plant uncertainties and under unstable sampling zeros. One of the main ingredients to establish the proposed

142 5.1. Motivating Example 119 Figure 5.1: Two-mass-spring system robust stability condition is to approximately discretize the nominal plant model while the real plant model is exactly discretized for analysis) not to block the effect of the sampling zeros on the DOB loop. Then the sampling zeros appear in the proposed stability condition together with the coefficients of the Q-filter, and they possibly do not cause much trouble as long as the Q-filter is suitably designed. Moreover, inspired by the CT-DOB designs in Chapter 2, we propose an advanced design guideline to embed the disturbance model into the DT-DOB structure. 5.1 Motivating Example: Stability Issue of Disturbance Observers in Sampled-data Frameworks As an illustrative example that motivates the work of this chapter, we take a look at the benchmark problem [WB92] with the CT two-mass-spring system depicted in Figure 5.1. The plant under consideration is modeled by a 4th-order system as Ps) = K M 1 M 2 s 4 + KM 1 + M 2 )s ) where M 1 and M 2 are masses of the carts, and K is the spring coefficient. is assumed that the parameters have bounded uncertainty as M i [0.5, 2], and K [0.8, 1.2]. The particular interest here is to investigate how the sampling process affects the stability of the DOB controlled systems. To see this, we will build up two types of the DOB-based controllers for comparison. It The first one is a typical

143 120 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems ZOH Sampler Figure 5.2: Overall controlled system with DT-DOB blue dotted block): Q d z; ), P d nz; ), and C d z; ) stand for DT Q-filter 5.3.4), DT nominal model 5.3.2a), and DT controller 5.3.2b), respectively. CT-DOB-based controller implemented in the CT domain) in Figure 1.2, whose components are given as follows: the CT nominal model P n s) = K n M n,1 M n,2 s 4 + K n M n,1 + M n,2 )s ) with the nominal parameters K n = 1 and M 1 = M 2 = 1; the CT baseline controller Cs) = s s s s presented in [BHLO06]) which stabilizes the CT nominal closed-loop system; and the CT Q-filter Qs; τ) = 1 τs) 4 + 4τs) 3 + 6τs) 2 + 4τs) ) whose coefficients are selected simply as binomial ones, while τ = On the other hand, the second one is a DT-DOB-based controller that is implemented in the sampled-data framework as in Figure 5.2, with

144 5.1. Motivating Example a) Output y b) Enlargement Figure 5.3: Simulation results with CT-DOB controlled system purple solid), DT-DOB controlled system black dotted), and CT nominal closed-loop system green dashed) sampler where > 0 stands for the sampling period): y d [k] = yk ); 5.1.4) zero-order holder ZOH): ut) = u d [k], k t < k + 1) ; 5.1.5) and the sampled reference r d [k] := rk ). In this example, the DT nominal model P d nz; ) and the DT baseline controller C d z; ) are obtained by discretizing the CT counterparts via the forward difference method; i.e., P d n,fw z; ) = P n z 1 ), C d n,fw z; ) = C n z 1 ) ) In addition, we here employ the following all-pass filter which is a prototypical

145 122 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems low-pass filter in a sense) as the DT Q-filter Q d z; ); Q d z; ) = Q d all z; ) = 1 z ) We note that Q d all z; ) above also can be regarded as a discretization result of 5.1.3) by the forward difference method. For the simulation, we set Ps) = P n s) i.e., there is no model uncertainty), the input disturbance dt) = sin0.5t), the reference rt) = 1, and = 0.015s. The simulation results are depicted in Figure 5.3. The result is somewhat surprising, since it tells that the stability of the DT-DOB controlled system is not directly concluded by that of the relevant CT-DOB controlled system and even violated only by the sampling process e.g., without any model uncertainty). The observation highlights the importance of further analysis on the DT-DOB controlled systems in the sampled-data framework, which is the main concern of this chapter. 5.2 Basics on Sampled-data Systems As a prerequisite for the discussions to come, we briefly remind the natures of the sampled-data systems first. Consider a CT plant written in the state space ẋ = Ax + Bu + d), y = Cx 5.2.1) where x R n is the state, u R is the control input, y R is the output, d R is the disturbance, and A R n n, B R n 1, and C R 1 n are constant matrices. With the Laplace transforms us) = Lut)), ys) = Lyt)), and ds) = Ldt)) of the CT signals, another expression of 5.2.1) is given by ys) = Ps)us) + ds)) 5.2.2)

146 5.2. Basics on Sampled-data Systems 123 where Ps) = CsI A) 1 B. For ease of explanation, we particularly rewrite Ps) as, without loss of generality, Ps) = g n ν i=1 s z i) n i=1 s p =: Ns) i) Ds) 5.2.3) where ν is the relative degree of Ps), and z i, p i, and g > 0 are the zeros, poles, and the high-frequency gain of Ps), respectively. Without loss of generality, the polynomials Ns) and Ds) are assumed to be coprime. In this setting, the sampled-data system consisting of the CT plant 5.2.1), the sampler 5.1.4), and the ZOH 5.1.5) can be represented in time domain as follows throughout this chapter, we will use the superscript d to indicate that a parameter or a variable is associated with the DT domain): x d [k + 1] = A d x d [k] + B d u d [k] + d d [k], y d [k] = C d x d [k] 5.2.4) where x d [k] := xk ), u d [k] := uk ), y d [k] = yk ) as in 5.1.4)), and d d [k] := k+1) k and the matrices A d, B d, and C d are given by A d ) := e A, B d ) := e Ak+1) ρ) Bdρ)dρ R n, 5.2.5) 0 e Aρ Bdρ, C d := C ) Similar to 5.2.2), with the definitions u d z) := Z{u d [k]}, y d z) := Z{y d [k]}, and d d z) := Z{d d [k]}, one can represent the sampled-data system 5.2.4) in the frequency domain y d z) = P d z; )u d z) + W d z; )d d z) 5.2.7) where P d z; ) := C d zi A d ) ) 1 B d ) ) 1 e s = Z Ps) =: Nd z; ) s D d z; ), 5.2.8a)

147 124 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems W d z; ) := C d zi A d ) ) 1 =: 1 D d z; ) [N dw,1 z; ) Ndw,n z; ) ] 5.2.8b) with some polynomials N d z; ), Nw,i d z; ), and Dd z; ) of z. From now on, we focus on the DT transfer function P d z; ) in 5.2.8a) from u d z) to y d z). Since P d z; ) exactly represents the input-to-output relation of the sampled-data system with the ZOH, it is often called ZOH equivalent model of Ps). As a well-known consequence of the sampling process, the following lemma highlights that the sampled-data model P d z; ) has ν 1 extra DT zeros for almost every > 0, compared with its CT counterpart Ps). Lemma [ÅHS84, YG14] For given CT plant Ps) in 5.2.3), there exists a measure-zero set T P R >0 such that the ZOH equivalent model P d z; ) in 5.2.8a) has relative degree 1 for all R >0 \ T P : more precisely, for all R >0 \ T P, P d z; ) is of the form Pz; ) = Nd z; ) D d z; ) = n ν gm d z; ) n i=1 i=1 z p d i ) z z d i ) 5.2.9) where z d i : R >0 \ T P C and p d i : R >0 \ T P C are functions of, and M d z; ) is a polynomial of z with order ν 1. Moreover, as 0 +, where p d i ) 1 for i = 1,, n, z d i ) 1 for i = 1,, n ν, M d z; ) E ν 1 z)/ν! =: M z) E ν 1 z) := E ν 1,ν 1 z ν 1 + E ν 1,ν 2 z ν E ν 1, ) is the Euler-Frobenius polynomial of order ν 1, with the coefficients E ν 1,j := ) ν j l=1 1)ν j l l ν ν+1 ν j l for j = 0,..., ν 1.

148 5.3. Generic Representation of Discrete-time Disturbance Observer 125 We further note that z d i ) can be approximated by ez i with a suitable rearrangement of z i ) with sufficiently small. In this regard, we call z d i ) as the intrinsic zeros, while the remaining ones i.e., the roots of M d z; ) = 0) as the sampling zeros. The above lemma points out that unlike the intrinsic zeros, the limiting behavior of the sampling zeros is solely determined by the Euler- Frobenius polynomial E ν 1 z). Some important properties of the polynomial are summarized below. Proposition [YG14]) The Euler-Frobenius polynomial E ν 1 z) in ) satisfies the following statements: a) E ν 1,0 = E ν 1,ν 1 = 1 and E ν 1,i = E ν 1,ν i for all i = 0,..., ν 1; b) E ν 1 1) = ν!; c) For ν 3, there exists at least one root of E ν 1 z) = 0 outside the unit circle; d) All the roots of E ν 1 z) = 0 are single and negative real. A remarkable lesson from Lemma and Proposition is that with high relative degree ν of Ps) that is, ν 3), the sampled-data model P d z; ) is inherently of non-minimum phase in the DT domain) under fast sampling. We will show shortly that this nature incurs a significant difference between the stability results of the CT- and DT-DOB schemes in the end. 5.3 Generic Representation of Discrete-time Disturbance Observer We now turn our attention to the DT-DOB-based controller in Figure 5.2. On top of the basic configuration in Figure 5.2, several ways to construct the DT- DOB-based controller have been introduced in the literature, along with specific design methods for Q d z; ), P d nz; ), and C d z; ). Rather than specifying the

149 126 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems structure, in this chapter we are interested in taking various types of DT-DOBbased controllers into account in the stability analysis. For this purpose, we here present a generic representation of the DT-DOB-based control scheme. Let us begin with the DT nominal model P d nz; ) and the DT outer-loop controller C d z; ). A common way to obtain them is to discretize a CT nominal model P n s) = g n nn ν i=1 s z n,i) i=1 s p n,i) nn of Ps) and a CT baseline controller =: N ns) D n s) 5.3.1a) nc ν c Cs) = g c i=1 s z c,i ) nc i=1 s p c,i) =: N cs) D c s), 5.3.1b) respectively, where g n > 0 and g c 0 are the high-frequency gains, z n,i and z c,i are the CT zeros, p n,i and p c,i are the CT poles. It is assumed that Cs) is designed to stabilize the CT nominal model P n s). Here, it should be noted that even for fixed CT transfer functions P n s) and Cs), their discretized transfer functions P d nz; ) and C d z; ) may not be unique, because many discretization methods are enabled in general. Keeping this in mind, the following assumption is made to represent the discretization results P d nz; ) and C d z; ) in explicit forms uniformly in the discretization methods. Assumption The DT transfer functions P d nz; ) and C d z; ) in Figure 5.2 have the form P d nz; ) = Nd nz; ) D d nz; ) := C d z; ) = Nd cz; ) D d cz; ) =: n n ν gn )M d d nz; ) n n i=1 i=1 z p d n,i ) n c ν c gc d )M d cz; ) n c i=1 i=1 z p d c,i ) z z d n,i ) z z d c,i ), 5.3.2a) 5.3.2b) for all R >0 \ T nc, in which T nc is a measure zero subset of R >0 satisfying

150 5.3. Generic Representation of Discrete-time Disturbance Observer 127 FDM BDM BT MPZ 1 z ) n,i 2 n i=1 g d n g n g n n ν i=1 1 z n,i) n i=1 1 p n,i) n ν i=1 g n n i=1 M d n 1 z ν z + 1) ν 1 p n,i 2 z d n,i 1 + z n,i z n,i z n,i 1 z n,i 2 p d n,i 1 + p n,i p n,i p n,i 1 p n,i 2 ) g n n ν i=1 e pn,i 1 p n,i e zn,i 1 z n,i z + 1) ν 2 ν 2 ν e zn,i e pn,i Table 5.1: Discretization 5.3.2a) of P n s) in 5.3.1a) resulting from various methods; forward difference method FDM), backward difference method BDM), bilinear transformation BT), and matched pole zero method MPZ). inft nc ) > 0, and M d nz; ) and M d cz; ) are polynomials of z with order 0 n mn ν n and 0 n mc ν c, respectively. The real numbers gn d and gc d, and the complex numbers z d n,i, zd c,i, pd n,i, and pd c,i are functions of that are well-defined for all R >0 \ T nc. Moreover, as 0 +, gn ) d g n, gc d ) g c, 5.3.3a) M d nz; ) M nz), M d cz; ) M cz), 5.3.3b) z d n,i ) 1 z d c,i z n,i, z c,i, 5.3.3c) p d n,i ) 1 p d c,i p n,i, p c,i 5.3.3d) where M nz) and M cz) are polynomials of order n mn and n mc satisfying M n1) = 1 and M c1) = 1, respectively. As a matter of fact, Assumption is satisfied with many widely-used discretization methods. Possible candidates include but are not limited to) the forward s = z 1)/ ) and backward s = z 1)/ z)) difference methods,

151 128 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems the bilinear transformation s = 2z 1))/ z + 1))), and the matched pole zero method [FPW98], all of which are associated with T nc =. The results of these mentioned methods are summarized in Table 5.1. On the other hand, similar to most of the previous works, we set the DT Q- filter Q d z; ) as a stable low-pass filter. Particularly, in order to gain additional design freedom, it is allowed that the coefficients of Q d z; ) possibly depend on the sampling period ; in other words, Q d z; ) = c d l q )z 1) lq + + c d 0 ) z 1) nq + a d n q 1 )z 1)nq a d 0 ) =: Nd qz; ) D d qz; ) 5.3.4) where c d i ) R and ad i ) R are functions of satisfying that cd i ) c i and a d i ) a i as 0+, c d 0 ) = ad 0 ) for all R >0, and c 0 = a 0 0. The second condition is requested for the low-pass filtering property of the Q-filter.) The relative degree n q l q of Q d z; ) is chosen as n q l q max{ν n mn, 1} so that the block P d nz; ) 1 Q d z; ) in Figure 5.2 is implementable and Q d z; ) itself is strictly proper. We conclude this section by noting that the DT-DOB-based controller of our interest has the structure depicted in Figure 5.3 and consists of the inverse of the DT nominal model 5.3.2a), the DT baseline controller 5.3.2b), and the DT Q-filter 5.3.4). Remark Another widely-employed realization of the DT-DOB scheme is depicted in Figure 5.4 [CT12]. In the figure, a n d -step delay function z n d and a re-defined nominal model P d nz; ) := z n dp d nz; ) are used so that the inverse P d nz; ) 1 can stand alone). Even though the two DT-DOB structures in Figures 5.2 and 5.4 seem different from each other, they are in fact equivalent in the input-to-output sense, by simply taking the Q-filter in the latter structure to satisfy Q d z; ) = z n d Qd z; ). In this regard, throughout this paper we will focus on the DT-DOB structure in Figure 5.2.

152 5.4. Stability Analysis 129 ZOH Sampler Figure 5.4: An equivalent block diagram of DT-DOB 5.4 Almost Necessary and Sufficient Condition for Robust Internal Stability under Fast Sampling Main Result As the main result of this chapter, we now derive a robust stability condition for the DT-DOB controlled system in Figure 5.2. We assume that the CT plant Ps) has bounded parametric uncertainty. Assumption The CT plant Ps) in 5.2.3) is contained in the set of uncertain systems P := { Ps) = N n νs n ν } + + N 0 s n + D n 1 s n 1 : N i [N + D i, N i ], D i [D i, D i ] ) where N i, N i, D i, and D i are known constants. We now take a look at the transfer function matrix from [r d z); d d z)] to [e d z); u d z); y d z)], which is computed by hereinafter, we often omit the term

153 130 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems z; ) in DT transfer functions and polynomials when it is obvious.) 1 Q d P d P d n) + P d n1 + P d C d ) Q d P d P d n) + P d n W d P d n1 Q d ) P d nc d W d P d nc d + Q d ). P d P d nc d W d P d n1 Q d ) 5.4.2) The DT-DOB controlled system is said to be internally stable if all of the transfer functions in 5.4.2) are Schur stable. The closed-loop system is said to be robustly internally stable if the system is internally stable for all Ps) P in Assumption It is clear that the closed-loop system is robustly internally stable if and only if the characteristic polynomial Ψ d := D d D d c + N d N d c) N d n D d q + N d qd d c N d D d n N d nd d) 5.4.3) of 5.4.2) is Schur for all Ps) P. Note that by definition, for almost every the degree deg Ψ d z; ) ) of the characteristic polynomial is fixed as n+n c +n n + n q ν. The main idea of our stability analysis is to investigate the limiting behavior of the characteristic polynomial Ψ d z; ) which is dependent of the sampling period ) as approaches zero. The following technical lemma will play a crucial role in the analysis. Lemma Let X d z) and Y d z; T ) be polynomials of the complex variable z where lim T 0 Y d z; T ) = 0. Assume that degx d z)) = n and degy d z; T )) = l 0, and let x i, i = 1,..., n, be the roots of Xd z) = 0. Then n roots of X d z) + Y d z; T ) = 0, say x d i T ), i = 1,..., n, satisfy lim T 0 x d i T ) = x i even if X d z) + Y d z; T ) = 0 may have more than n roots for T > 0). Proof. This lemma is a natural extension of [SJ09, Lemma 1] and can be proved by the Rouche s theorem [Fla83]. We omit the detailed derivation of the lemma. In the following analysis, we will utilize the explicit form 5.2.9) of P d z; ) given in Lemma instead of the exact expression 5.2.8a), by relying on the sufficiently small. This idea might be clear as long as Ps) is fixed. Yet since

154 5.4. Stability Analysis 131 a bundle of the uncertain CT plants in Assumption should be considered concurrently, it may be still questionable whether or not one small sampling period admits 5.2.9) for all Ps) P. Fortunately, this is not a hurdle in a sense, as described in the following lemma. Lemma Suppose that Assumption holds. Then for the sets T P in Lemma associated with Ps) P, ) P := inf T Ps) > ) Ps) P Proof. By the definition of the relative degree of a DT transfer function, P d z; T ) has the relative degree larger than 1 for some T > 0 if and only if the DT step response ystep[k] d of P d z; T ) is zero at k = 1, or equivalently, the CT step response y step t) is zero at t = T where the latter equivalence comes from the fact that holding DT step input via the ZOH generates the CT step input.) Therefore, T Ps) is the same as the set of these zero-crossing instants t = T of the CT step response. From the calculus of variation, the zero-crossing instant T must satisfy y step T ) = 0 where y step t) := C t 0 e At ρ) Bdρ ) It is obtained from [Kha96, Theorem 3.4] that the solution y step t) in 5.4.5) is continuous on the variation of A, B, C), and T also does. This concludes the proof. It is obvious that deg Ψ d z; ) ) = n + n c + n n + n q ν is satisfied for all 0, P ). As an intermediate step, the following lemma shows the limiting behavior of the roots of Ψ d z; ) = 0 in the conventional z-domain. Lemma Let n := n ν) + n n + n c and Ψ d fast z) := M nz) D qz) N qz) ) + g g n M z)n qz) 5.4.6) where N qz) := lim 0 + N d qz; ) and D qz) := lim 0 + D d qz; ). Then as

155 132 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems 0 +, n roots of Ψ d z; ) = 0 approach 1 + j0, while the remaining degψ d ) n) roots converge to those of Ψ d fast z) = 0. Proof. For ease of explanation, we define two polynomials Ψ d 1 := D d D d c + N d N d c) N d n and Ψ d 2 := N d D d n N d nd d) D d c, from which Ψ d z; ) in 5.4.3) is decomposed by Ψ d z; ) = Ψ d 1 z; )Dd qz; ) + Ψ d 2 z; )Nd qz; ). By multiplying n to these components, one can obtain that for R >0 \ T P T nc ) where T P := Ps) P T Ps) for simplicity), n Ψ d 1z; ) = n D d ) nc D d c) n ν N d n) + ν+νc n ν N d ) nc νc N d c) n ν N d n) n ) nc n ν ) = z p d i z p d c,i g d n M d ) n z z d n,i i=1 n Ψ d 2z; ) i=1 i=1 n ν + ν+νc gm d z z d i )gc d M d c i=1 n c ν c i=1 z z d c,i ) g d n M d n = n ν N d ) n D d n) nc D d c) n ν N d n) n D d ) nc D d c) n ν n n c = gm d z; ) z z d i ) z p d n,i) z p d c,i) i=1 g d nm d n n ν i=1 i=1 i=1 ) n ) nc ) z z d n,i z p d i z p d c,i. i=1 i=1 n ν i=1 z z d n,i ), It is noted that as goes to zero, all the complex numbers z d i ), pd i ), z d n,i ), pd n,i ), zd c,i ), and pd c,i ) converge to 1 + j0 by Assumption and Lemma 5.2.1). Thus one has lim 0 + n Ψ d 1z; ) = g n M nz)z 1) n, lim 0 n Ψ d 2z; ) = gm z) g n M nz) ) z 1) n. +

156 5.4. Stability Analysis 133 With these limits, we now have lim 0 n Ψ d z; ) + lim 0 n Ψ d 1z; )D d qz; ) + n Ψ d 2z; )N d qz; ) + = g n z 1) n M nz)d qz) N qz)) + g ) M z)n g qz) n = g n z 1) n Ψ d fast z) 5.4.7) where the degree of Ψ d fast z) is given by degψd ) n. Noting that the roots of n Ψ d z; ) = 0 are the same as those of Ψ d z; ) = 0 for any > 0, the proof is concluded from Lemma with X d z) = g n z 1) n Ψ d fast z) and Y d z; ) = n Ψ d z; ) g n z 1) n Ψ d fast z). For convenience, we denote the roots of Ψ d z; ) = 0 as x d i ), and rearrange them to satisfy lim 0 + x d i ) = 1 + j0 for all i = 1,..., n without loss of generality. From the viewpoint of the DT singular perturbation theory, the first n roots are called slow modes of the DT-DOB controlled system, while the remaining ones as fast modes. Notice that Lemma demonstrates the limiting behavior of the fast modes only, whereas the stability of the slow modes for the limiting case) is not clear yet. For further discussion, we present the following lemma on the slow modes. Lemma Suppose that Assumption holds. Then for all i = 1,..., n, s d i ) := xd i ) 1)/ converges to the roots s = s i of the polynomial Ψ slow s) := Ns) D n s)d c s) + N n s)n c s) ) = ) Proof. For the proof, we employ a complex variable s d := z ) which associates with the incremental operator [YG14]. With this symbol, the

157 134 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems characteristic polynomial Ψ d z; ) of our interest is rewritten in s d -domain as Ψ i s d ; ) := Ψ d 1 + s d ; ) ) Then the lemma is proved by showing that as 0 +, the roots of Ψ i s d ; ) = 0, given by s d i ), approach s i for i = 1,..., n. After some computation, one can readily obtain that Ψ i = D i D i c + N i N i c)n i nd i q + N i qd i cn i D i n N i nd i ). where each component is given by N i s d ; ) := N d 1 + s d ; ), D i s d ; ) := D d 1 + s d ; ), N i ns d ; ) := N d n1 + s d ; ) = g d n )M d n1 + s d ; ) D i ns d ; ) := D d n1 + s d ; ) = N i cs d ; ) := N d c1 + s d ; ) n ν i=1 n i=1 = g d c )M d c1 + s d ; ) s d zd n,i ) 1 ), s d pd n,i ) 1 ), n c ν c n c D i cs d ; ) := D d c1 + s d ; ) = i=1 s d zd c,i ) 1 ), s d pd c,i ) 1 ), N i qs d ; ) := N d q1 + s d ; ) = c d l q ) s d ) lq + + c d 0 ), i=1 D i qs d ; ) := D d q1 + s d ; ) = s d ) nq + a d n q 1 ) s d ) nq a d 0 ). Under Assumption 5.3.1, it follows that as 0 +, N i ns d ; ) N n s d ), D i ns d ; ) D n s d ), N i cs d ; ) N c s d ), D i cs d ; ) D c s d ), while N i qs d ; ) c 0 = a 0, and Di qs d ; ) a 0 by definition. On the other

158 5.4. Stability Analysis 135 hand, the DT sampled-data model represented in the incremental form converges to the corresponding CT plant under fast sampling [YG14, Lemma 5.11]: that is, as 0 +, N i s d ; ) Ns d ) and D i s d ; ) Ds d ). Putting all the limits together, we have lim 0 Ψi s d ; ) = DD c + NN c )N n a a 0D c ND n N n D) = a 0NDD c + NN c ) = a 0Ψ slow s d ). The remainder of the proof can be derived in a similar way of Lemma 5.4.3, with the help of Lemma Now, we are ready to present our main result on the robust stability. Theorem Suppose that Assumptions and hold. Then there exists > 0 such that for almost every 0, ), the DT-DOB controlled system is robustly internally stable if the following conditions hold: a) Cs) internally stabilizes P n s) that is, N n s)n c s) + D n s)d c s) is Hurwitz); b) Ps) P is of minimum phase; c) The polynomial Ψ d fast z) in 5.4.6) is Schur for Ps) P. Moreover, the converse is also true except marginal cases i.e., there is > 0 such that for any 0, ), the closed-loop system is not robustly internally stable if some roots of N n s)n c s) + D n s)d c s) = 0 or some zeros of Ps) have positive real part, or some roots of Ψ d fast z) are outside the unit circle). Proof. Without loss of generality, let n s 0 be the number of the stable roots s = s i of Ψ slow s) = 0, and rearrange s i and the corresponding s d i ) such that s i, i = 1,..., n s, are in the open left-half plane in s d -domain), while s i, i = n s + 1,..., n, are in the open right-half plane. From now on, we claim that there exists s > 0 such that for 0, s ), x d i ) = 1+ sd i ), i = 1,..., n s, are located inside the unit circle in z-domain). Indeed, since all the s i are not on the imaginary axis, one can choose ϵd > 0 such

159 136 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems that for i = 1,..., n, each ball Bs i, ϵd ) a) includes no root of Ψ slow s) = 0 except s = s i itself and b) does not intersect with the imaginary axis in s-domain). In addition, by the limiting behavior of s d i ) = xd i ) 1)/ in Lemma 5.4.4, there exists s,1 > 0 such that for 0, s,1 ), all the s d i ), i = 1,..., n s, remain in Bs i, ϵd ). We also select sufficiently large numbers h 1,i and h 2,i, i = 1,..., n s, such that h 1,i > Res i ) + ϵ d ) 2 + Ims i ) + ϵ d ) 2 > 0 and h 2,i > Res i ) ϵ d > 0. Using these terms, we finally take { 2h2,1 s < min,, 2h } 2,n s, s,1. h 1,1 h 1,ns Then for 0, s ) and for i = 1,..., n s, one has Res d i )) < Res i ) + ϵ d < h 2,i, Res d i )) 2 + Ims d i )) 2 < Res i ) + ϵ d ) 2 + Ims i ) + ϵ d ) 2 < h 1,i, 2h 2,i > h 1,i. and therefore, each 1 + s d i ) satisfies x d ) 2 = 1 + s d i ) 2 = 1 + Res d i )) ) 2 + Ims d i )) ) 2 = Res d i )) + 2 Res d i )) Ims d i )) 2 < 1 2 h 2,i + 2 h 1,i = 1 2h 2,i h 1,i ) < 1. This indicates that all x d i ) is inside the unit circle for all 0, s), which completes the proof of the claim. On the other hand, it is obvious that for 0, s ) and i = n s + 1,..., n, Re1 + s d i )) > 1 + Res i ) ϵd > 1 so that x d i ) are located outside the unit circle. We have shown that the n s roots z = x d i ) = 1 + sd i ) of Ψd z; ) = 0 remain inside or outside, respectively) the unit circle for all 0, s ) as the corresponding s i lies on the open left half-plane or open right-half plane, respectively). At last, combining this observation with Lemmas and 5.4.3,

160 5.4. Stability Analysis 137 one can conclude the proof of the theorem. Remark The stability condition described in Theorem is less conservative than those in previous works in the following two senses. First, while many earlier studies provided sufficient conditions for stability only based on the small gain theorem), Theorem presents an almost necessary and sufficient stability condition under fast sampling. Furthermore, due to the generalized DOB structure in Section 5.3, a larger class of DT-DOB design methods can be taken into account by Theorem Issue 1: Exact vs. Approximate Discretization of P n s) Similar to the CT-DOB cases, the discretization P d nz; ) of P n s) will be employed as a nominal model of the actual system P d z; ) in the DT-DOB designs. Noting that mismatch between the actual and nominal models, P d z; ) and P d nz; ), usually yields model uncertainty to be compensated by the DOB, a possible candidate for P d nz; ) might be the ZOH equivalent model of P n s); that is, ) 1 e P d nz; ) = P d s n,zohz; ) = Z P n s) s ) so that Ps) = P n s) implies P d z; ) = P d nz; )). However, our stability result shows that this exact discretization of P n s) may not be enabled as long as the CT plant Ps) has high relative degree even if there is no uncertainty on the CT plant). Corollary Suppose that Ps) satisfies Assumption and ν 3, and P d nz; ) = P d n,zoh z; ) as in ). Then there exists > 0 such that the DT-DOB controlled system is not internally stable for any Ps) P and for all 0, ). Proof. The corollary directly follows from Theorem with Ψ d fast z) = E ν 1z) D ν! qz) N qz) + g ) N g qz) n

161 138 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems and the fact that E ν 1 z) is not Schur for all ν 3 by Proposition 5.2.2). In short, in the DT-DOB design for high-order CT plants with ν 3, the way of discretizing P n s) must be approximate for instance, the discretization methods in Table 5.1). We will come back to this point in Section 5.6 where design guidelines for the DT-DOB are presented Issue 2: Importance of Q-filter Design In the theory of CT-DOB, it has been reported that as long as the CT plant Ps) is of minimum phase and has no model uncertainty, the CT-DOB controlled system in Figure 1.2) is inherently stable with any stable Q-filter [CYC + 03]. Therefore, it might make sense in some ideal cases to select the Q-filter as a typical CT low-pass filter Qs; τ) = Q bin s; τ) = a bin,0 τs) nq + a bin,nq 1τs) nq a bin,0 where l ν, the coefficients a bin,i are binomial that is, a bin,i = n q ) i, i = 0,..., n q ), and τ > 0 is chosen arbitrarily to cover a frequency range of disturbances. When it comes to the DT-DOBs used for the sampled-data systems, however, this is not the case anymore. Such a naive selection of the DT Q-filter can violate the stability of the DT-DOB controlled system, even without any plant uncertainty. To clarify this point, we set a prototypical stable low-pass filter Q d z; ) = Q d bin z) = 1, ) nq z which is an all-pass filter in DT domain, as the DT Q-filter for a while. Then with widely-used discretization methods for P n s), we obtain the following negative results. Proposition Suppose that Assumption holds and Q d z; ) has the form of ). Then there exists > 0 such that the DT-DOB controlled system is not internally stable for all 0, ) and for all Ps) P, if

162 5.4. Stability Analysis 139 a) ν 3 and P d nz; ) is obtained by discretizing P n s) via the forward difference method, or b) ν 2 and P d nz; ) is obtained by discretizing P n s) via the bilinear transformation or the matched pole zero method). Proof. The proposition is proved by showing that Ψ d fast z) in Theorem is not Schur for all g/g n 0, ). We here provide the proof of the second case i.e., Item b)) only, while the remaining case can be derived in a similar way. Notice that the degree of M n z; ) = M nz) is ν and thus P d nz; ) under consideration is biproper. From this, the degree n q of the Q-filter can be arbitrarily set as n q 1. The Q-filter and the nominal model in the considered situation result in Ψ d fast z) = M nz)z nq 1) + g g n M z) = 1 2 ν [ z + 1) ν z nq 1) + ke ν 1,ν 1 z ν ke ν 1,0 ] where E ν 1,i are the coefficients of the Euler-Frobenius polynomial E ν 1 z) and k := 2 ν g/g n )1/ν!) > 0. Now, by applying the Jury s stability test [PN07] to the first two and the last two coefficients of the polynomial in the bracket with E ν 1,0 = 1, it follows that Ψ d fast z) above is Schur only if the following two inequalities hold simultaneously: k 1 < 1 and a) k 1) 2 ν 1)k 1) 1 ν) + ke ν 1,1 ) if n q = 1, 1 > νk 1) ν + ke ν 1,1 ) if n q b) Notice that E ν 1,1 = 2 ν ν 1 and k 1) 2 1 = k 1) 2 +1 for all k satisfying k 1 < 1. Therefore, the inequalities in ) can be rewritten by 0 < k < 2 and k 2 2 ν k if n q = 1, + 2k > ) 2 ν 1)k if n q 2.

163 140 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems It is straightforward that under the constraint 0 < k < 2, the inequality ) is violated in both two cases for all ν 2, which completes the proof. It is noted that Proposition provides a theoretical analysis of the phenomenon shown in the motivating example. Obviously, as highlighted by Theorem 5.4.5, the disparity between the stability results of the CT-DOBs and DT-DOBs mainly follows from the sampling zeros which is an inherent characteristic of the sampled-data systems. Remark Putting the emphasis on the structure of the prototypical Q- filter, the finding in Proposition also can be interpreted by a rule-of-thumb that a high-gain and high-bandwidth control scheme may fail when it is applied to a nonminimum-phase system. Indeed, as in the CT-DOB cases, the DT-DOB structure in Figure also includes a hidden component 1/1 Q d e jω ; )) implicitly, which has an infinite gain at the low-frequency range. Unfortunately, at least one zero of P d z; ) with ν 3 must lie outside the unit circle with fast sampling by Proposition 5.2.2). Thus according to the rule-of-thumb, with the all-pass filter Q d bin z) = 1/zν which ensures Q d bin ejω ) 1 in a wide frequency range, the high-gain property of the DOB will be problematic for the nonminimum-phase system Issue 3: Indirect vs. Direct Designs of Discrete-time Disturbance Observers The finding in the previous subsection enlightens that a naive discretization of a CT-DOB may destabilize the closed-loop system in the sampled-data setting. A relevant question is: is the indirect design of the DT-DOB by discretizing a well-designed CT-DOB) fundamentally insufficient to guarantee the overall stability for the sampled-data system? To answer the question, we discretize a CT Q-filter Qs; τ) = c lq τs) lq + + c 0 τs) nq + a nq 1τs) nq a )

164 5.5. Performance Analysis in Frequency Domain 141 by using the forward difference method as follows: Q d z; ) = Q d ind z; ) = c lq rz 1) ) lq + + c 0 rz 1) ) nq + a nq 1 rz 1) ) nq a ) where r := τ/ denotes the ratio between τ and. Then the following proposition points out that the stability condition of the associated DT-DOB with )) can be simplified into that of the CT-DOB with the original Q-filter )) in [SJ09], as long as the sampling process runs much faster than the CT-DOB. Proposition Suppose that Assumption hold and the coefficients a i and c i of the CT Q-filter ) are selected such that Ψ fast,ct s) = D q s; 1) N q s; 1) + g g n N q s; 1) ) is Hurwitz. Then there exists r > 0 such that for all r > r, the polynomial Ψ d fast z) in 5.4.6) corresponding to the DT Q-filter ) is Schur. Proof. The proposition is derived by applying Lemma to Ψ d fast z) with T in the lemma set as 1/r. Proposition inspires us to design the DT-DOB in an alternative or indirect) way; i.e., discretizing a CT-DOB without handling the stability constraints in Theorem directly. Nonetheless, direct design methods possibly have several advantages over such an indirect method, such as a relaxation of the bandwidth constraint of the Q-filter. We will discuss more on this topic in the simulation part. 5.5 Performance Analysis of Discrete-time Disturbance Observers in Frequency Domain In this section, we briefly look at the performance of the DT-DOB-based controller in the frequency domain. In parallel with the analysis for the CT-

165 142 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems DOBs, a particular interest here is to observe that the DT-DOB recovers the nominal performance under fast sampling. To see this, we remind the definition of the scaled DT Fourier transform of a DT signal. Definition [FG12] For a sequence x d [k] and the sampling period > 0, the scaled DT Fourier transform of x d [k] is given by F x d [k]) := x d [k]e jω k ) k= With the scaled DT Fourier transform u d ejω ) := F u d [k]) of u d [k], the Fourier transform yjω) of the CT plant s output yt) can be represented by [YG14, FG12] yjω) = 1 Pjω)H 0jω; )u d e jω ) + Pjω)djω) 5.5.2) where Ps) = CsI A) 1 B and H 0 s; ) = 1 e s )/s. In turn, one can write the scaled DT Fourier transform y d ejω ) := F y d [k]) of y d [k] in the folded form: y d e jω ) = = k= k= y jω + j 2πk ) 1 P + P jω + j 2πk jω + j 2πk )H 0 jω + j 2πk ; ) u d e jω ) ) d jω + j 2πk = P d e jω ; )u d e jω ) + d d fold jω; ) ) ) ) where d d fold jω; ) := k= P jω + j 2πk ) d jω + j 2πk ) 5.5.4) represents the influence of the CT disturbance dt) on the DT output y d [k] under

166 5.5. Performance Analysis in Frequency Domain 143 the folding or aliasing ) effect. On the other hand, in the DT-DOB-based control structure Figure 5.2), the scaled) DT Fourier transform u d ejω ) has the form of u d e jω ) = u d e jω ) = = 1 P d P d n1 Q d ) nc d r d Q d + P d nc d )y d)) ) P d nc d r d Q d + P d nc d )y d 5.5.5) 1 P d n1 Q d ) in which r d ejω ) := F u d [k]). Substituting 5.5.3) into 5.5.5), one has u d e jω ) = T d ure jω ; )r d e jω ) + T d ud,fold ejω ; )d d fold jω; ) 5.5.6) where T d ur := P d nc d Q d P d P d n) + P d n1 + P d C d ), T d ud,fold := Q d + P d nc d Q d P d P d n) + P d n1 + P d C d ) a) 5.5.7b) In short, putting the result into each 5.5.2) and 5.5.3), we obtain the at-sample response y e d jω ) = T d yre jω ; )r d e jω ) + T d yd ejω ; )d d fold jω; ) 5.5.8) where T d yrz; ) := P d T d ur = T d yd,fold z; ) := Pd T d ud,fold + 1 = P d P d nc d Q d P d P d n) + P d n1 + P d C d ), P d n1 Q d ) Q d P d P d n) + P d n1 + P d C d ) a) 5.5.9b) the inter-sample response y d jω) = 1 Pjω)H 0jω; )T d ure jω ; )r d e jω ) ) + 1 Pjω)H 0jω; )T d ud,fold ejω ; )d d fold jω; ) + Pjω)djω).

167 144 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems For further analysis, we assume for now that the Fourier transforms djω) and rjω) of the CT external inputs dt) and rt) are dominant in a low-frequency range ω [0, ω]: that is, djω) = 0 and rjω) = 0 for all ω > ω. Under the hypothesis, it follows that if is taken to satisfy 0 < < 2π)/ω, then for all 0 ω π/ ) i.e., the frequency range below the Nyquist frequency), r d e jω ) = d d fold jω; ) = k= k= r jω + j 2πk ) = rjω) a) P jω + j 2πk ) d jω + j 2πk ) = Pjω)djω) b) In addition, we also suppose that is sufficiently small such that Q d e jω ; ) ) for all ω [0, ω]. Then for that low-frequency range, the at-sample response of the output yt) is approximated by y d e jω ) Pd nc d 1 + P d nc d ejω ; )r d e jω ) ) This indicates that under fast sampling, the performance of the nominal closedloop system is recovered at sampled outputs by the DT-DOB-based controller. Moreover, similar conclusion can be obtained for the inter-sample response. To see this, we further assume that in the frequency range ω [0, ω], P d ne jω ; ) P n jω), C d e jω ; ) Cjω), a) P d e jω 1 ; ) = P jω + j 2πk )H 0 jω + j 2πk ) ; k= 1 Pjω)H 0jω; ) Pjω) b) where all the approximations are possibly achieved by taking a small ). Then

168 5.5. Performance Analysis in Frequency Domain 145 it is easy to derive from ) and ) that yjω) in the low-frequency range ω [0, ω]. P nc jω)rjω) ) 1 + P n C It is also important to note that, as long as the CT disturbance dt) is fully modeled as sum of biased sinusoidal signals as in 2.1.7b)) dt) = d m t) = M dm,0 + n m i=1 M dm,i sin σ i t + φ dm,i ), ) its perfect rather than approximate) rejection in the at-sample response would be possible in a sense. Indeed, the Fourier transform djω) of the sinusoidal function ) has a non-zero value only at ω = 0 or ω = ±σ i, i = 1,..., n m, and its folded version d d fold jω; ) in ) also does below the Nyquist frequency with sufficiently small < P ). Therefore, if the DT Q-filter Qd z; ) in 5.3.4) is properly designed such that Q d e ±jσ i ; ) = 1 + j0, i = 1,..., n m, ) while Q d 1; ) = 1 + j0 naturally holds because a 0 = c 0 ), then we obtain that T d yd ejω ; )d d fold jω; ) = ) below the Nyquist frequency. In other words, the effect of the modeled disturbance on the at-sample response y d in 5.5.8) is completely eliminated in the frequency domain. We point out that another expression of ) is D d qz; ) N d qz; ) = z 1) n m i=1 ) z 2 2 cosσ i )z + 1 R d qz; ) ) with a polynomial R d qz; ) of z, which can be regarded as a DT counterpart of 2.2.7).

169 146 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems 5.6 Direct Design Methods for Discrete-time Disturbance Observers The stability analysis in Section 5.4 reveals an explicit constraint on the DT- DOB design i.e., Item c) of Theorem 5.4.5), and this requirement is not automatically satisfied in general. As aforementioned, this is mainly because Ψ d fast z) to be Schur is influenced by the sampling zeros of P d z; ), the discretization method for P n s), and the uncertain parameter g in a complicated form. Obviously, all these factors should be taken into account carefully in the DT-DOB design. In this regard, in this section we present systematic design procedures of the DT-DOB, provided that the plant 5.2.3) is uncertain in the sense of Assumption In particular, our design guidelines are of two types dependent of whether the generating model of dt) is explicitly used, both of which satisfies Item c) of Theorem under the assumption. To derive the design procedures, the following technical lemmas are required. Lemma Let h d z) be a Schur polynomial and let g d z) be a polynomial whose roots have the real part smaller than 1. Then there exists k 1 > 0 such that h d z)z 1) + kg d z) is Schur for all k 0, k 1 ). Lemma Suppose that the Nyquist plot of a transfer function L d z) = p d z) z 1) k q d z) 5.6.1) does not cut the line Eg/g n, g/g n ) where k is a positive integer, p d z) is a polynomial satisfying p d 1) > 0, and q d z) is a Hurwitz polynomial. Then there exists k 2 > 0 such that the Nyquist plot of p d z) z 1) k q d z) + k 1 z 1) k+1 q d z) 5.6.2)

170 5.6. Design Methods 147 does not cut the line Eg/g n, g/g n ) for all k 0, k 2 ). The proofs of these lemmas are largely similar to Lemmas A.1.1 and A.1.2 in Appendix A.1, and thus we omit the details Design with Simplest Structure of Q-filter We set the DT Q-filter Q d z; ) as the simplest form of the DT low-pass filter a simp,0 Q d z; ) = Q d simpz) := z 1) nq + a simp,n z q 1 1)nq a simp,0 =: Nd q,simp z) D d q,simp z) 5.6.3) where the constants a simp,i, i = 0,..., n q 1, are design parameters, and n q max{ν n mn, 1} so that P 1 n z; )Q d z; ) is implementable). On the other hand, the CT nominal model P n s) is discretized such that the associated limiting polynomial M nz) in Assumption is Schur e.g., the forward and backward difference methods among the methods listed in Table 5.1). With the DT Q-filter Q d z; ) = Q d simp z), Ψd fast z) in 5.4.6) turns out to be Ψ d fast,simp z) := M nz) z 1) nq + a simp,n q 1z 1) nq a ) simp,0 + g g n M z)a simp,0. We now show that for any given bound [g, g] of g, there exist a simp,i, i = 0,..., n q 1, satisfying that both Ψ d fast,simp z) and Dd q,simp z) above are Schur for all g [g, g] where the latter polynomial is needed to be Schur because of the stability of Q d z; )). Firstly, take a simp,1,..., a simp,n q 1 to make the polynomial z 1)nq 1 + a simp,n z q 1 1)nq a simp,1 is Schur. Then both h d az) := M nz) z 1) nq 1 + a simp,n q 1z 1) nq a ) simp,1 h d b z) := z 1)nq 1 + a simp,n q 1z 1) nq a simp, a) 5.6.4b) are Schur. On the other hand, it is obtained from Item c) of Proposition that all the roots of M z) =: g d az) have the real part smaller than 1. Then by

171 148 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems Lemma 5.6.1, one can choose k simp > 0 such that h d az)z 1) + kgaz) d and h d b z)z 1) + k 5.6.5) are Schur for all k 0, k simp ). Now select a simp,0 0, min{1, g n /g}k simp ), from which k simp > a simp,0 and k simp > g/g n )a simp,0 g/g n)a simp,0 > 0 for all g [g, g]. It is concluded that Ψ d fast,simp z) and Dd q,simp z) are Schur for all g [g, g]. We summarize the discussions so far as follows: Procedure Design of DT-DOB-based controller with simplest structure of Q-filter) STEP 0 Select a CT nominal model P n s) and a CT baseline controller Cs) such that the CT nominal closed-loop system is stable and the nominal tracking performance is satisfactory. Discretize the components to satisfy Assumption and to make M nz) Schur. Choose a simp,1,..., a simp,n q 1 such that h d az) and h d b z) in 5.6.4) are Schur. STEP 1 Take k simp > 0 satisfying that the two polynomials in 5.6.5) with gaz) d = M z)) are Schur for all k 0, k simp ) and select a simp,0 ) 0, min{1, gn /g}k simp. STEP 2 Construct the DT-DOB-based controller as in Figure 5.2 with the DT nominal model P d nz; ) and the DT baseline controller C d z; ) obtained in Step 0, and with the Q-filter Q d z; ) = Q d simp z) in 5.6.3) whose coefficients a simp,i are determined by Steps 0 and 1. Theorem Suppose that Assumption holds. Then the DT-DOB controller obtained by Procedure satisfies Item c) of Theorem Design to Embed Disturbance Model As aforementioned, we here are interested in constructing a DT-DOB that satisfies both Item c) of Theorem and the equality ) at once. For

172 5.6. Design Methods 149 ease of construction, we take the DT nominal model P d nz; ) by discretizing P n s) via the backward difference method; that is, P d nz; ) = P d n,bw z; ) := P n ) z ) z Since P d n,bw z; ) is biproper, it is allowed to employ the following DT Q-filter that has the relative degree as 1: c d Q d z; ) = Q d im,n imz; ) := )z q 1 1)nq c d im,0 ) z 1) nq + a d im,n )z q 1 1)nq a d im,0 ) =: Nd q,im z; ) D d q,im z; ) 5.6.7) where the degree n q is set as n q = 2n m + 1. Now, with the constants a im,i ) = a im,i to be designed shortly, we select the coefficients c im,i ) of the numerator of the Q-filter as follows: c im,i ) = a im,i c im,i ), i = 0,..., 2n m, 5.6.8) where c im,i are the coefficients of the polynomial z 1) 2nm+1 + c im,2nm )z 1) 2nm + + c im,0 ) n m ) = z 1) z 2 2 cosσ i )z + 1 = z 1) i=1 n m i=1 ) z 1) cosσ i ))z 1) cosσ i )) 5.6.9) By definition, it follows that the desired equality ) is satisfied. Note that all c i ) converge to zero as approaches 0, because the right-hand side of the equality becomes z 1) 2nm+1 when = 0. The remaining design freedom, lying in the selection of a im,i, will be used to

173 150 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems make Ψ d fast z) and Dd q,im z; ) Schur. Notice that Ψd fast z) is now computed as Ψ d fast,im z) = zν z 1) nq + g ) M z) a im,n g n q 1z 1) nq a im, ) in which M nz) = z ν is used. It is obtained from the bounded phase lemma [BCK95, Lemma 2.1] that Ψ d fast,im z) is Schur for all uncertain parameters g [g, g] if and only if a) the polynomial is Schur for at least one g among [g, g], and b) for the transfer function L d imz) := ) M z) a im,n z q 1 1)nq a im,0 z ν, ) z 1) nq the Nyquist plot of Z d imz) = 1 + g/g n)l d im z) 1 + g/g n )L d im z) ) does not cut the negative real axis in the complex plane. In particular, the latter condition is equivalent to: b ) the Nyquist plot of L d im z) does not touch the line Eg/g n, g/g n ). To construct the coefficients in a recursive fashion, we define p d im,iz) := M z) a im,n q 1z 1) i 1 + a im,n q 2z 1) i a ) im,n q i and also h d a,iz) := z 1) i z ν + g g n p d im,iz), L d im,iz) := pd im,i z) z 1) i z ν, and h d b,i z) := z 1)i + a im,n q 1z 1) i 1 + a im,n q 2z 1) i a im,n q i for i = 1,..., n q. It is noted that h d a,n q z) = Ψ d fast,im z), hd b,n q z) = D d q,im z; ), and L d im,n q z) = L d im z) by definition. We also observe that the following recursive

174 5.6. Design Methods 151 relations are satisfied: h d a,i+1z) = z 1)h d a,iz) + g g n M z)a im,n q i+1), a) h d b,i+1 z) = z 1)hd b,i z) + a im,n, b) q i+1) L d im,i+1z) = L d im,iz) + a 1 im,n q i+1) z 1) i+1 z ν c) for all i = 1,..., n q 1). Now, by applying Lemmas and recursively up to n q steps, we obtain the following design guideline. Procedure Design of DT-DOB-based controller to embed disturbance model) STEP 0 STEP j STEP n q Select a CT nominal model P n s) and a CT baseline controller Cs) such that the CT nominal closed-loop system is stable and the nominal tracking performance is satisfactory. Discretize the components to satisfy Assumption 5.3.1, especially using the backward difference method for P n s) as in 5.6.6). Choose a im,n q 1 sufficiently small such that h d a,1 z) and hd b,1 z) are Schur and the Nyquist plot of Ld im,1 z) does not cut the line Eg/g n, g/g n ). j = 1,..., n q 1) Take k 1,nq j+1) > 0 satisfying that the polynomials h d a,j+1 z) and hd b,j+1 z) in a) and b) are Schur for all a im,n 0, k q j+1) 1,n q j+1)) by Lemma 5.6.1). Select k 2,nq j+1) > 0 satisfying that the Nyquist plot of L d im,j+1 z) does not cut the line Eg/g n, g/g n ) for all a im,n 0, k q j+1) 2,n q j+1)) by Lemma 5.6.2). Finally, choose 0 < a im,n q j+1) < min{k 1,n q j+1), k 2,nq j+1)} Construct the DT-DOB-based controller with the DT nominal model P d nz; ) and the DT baseline controller C d z; ) obtained in Step 0, and with the Q-filter Q d z; ) = Q d im z; ) in 5.6.7) where the coefficients have the form 5.6.8)

175 152 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems a) CT outputs y and y n b) Contraction Figure 5.5: Simulation results for the proposed DT-DOB with simplest Q- filter Procedure 5.6.3): Sampled-data systems with baseline controller C d fw only black dash-dotted) and with the proposed DT- DOB-based controller P d n,fw, Cd fw, simp,fw) Qd blue solid), and CT nominal closed-loop system green dashed) Theorem Suppose that Assumption holds. Then the DT-DOBbased controller obtained by Procedure satisfies Item c) of Theorem and the equality ). 5.7 Simulation Results: Two-mass-spring System Revisited In this section, we revisit the example in Section 5.1 to verify the validity of our stability analysis and design procedures. For a fair comparison with the simulation results in Section 5.1, we set the DT nominal model P d nz; ) and C d z; ) as 5.1.6). In addition, by following Procedure 5.6.3, select the DT Q-filter Q d z; ) as Q d simp,fw z; ) = 0.24 z 4 z )

176 Imaginary part 5.7. Simulation Results: Two-mass-spring System Revisited 153 a) Roots of Ψ d z; ) = 0 blue) under variation of and of Ψ d fastz) = 0 red) in z- domain) b) Roots of Ψ d z; ) = 0 blue) under variation of and of Ψ d fastz) = 0 red) in z- domain, enlargement) Real part c) Roots of Ψ i s d ; ) = 0 blue) under variation of and of Ψ slow s d ) = 0 green) in s d -domain) Figure 5.6: Location of roots of Ψ d z; ) = 0 a) and b)) and roots of Ψ i s d ; ) = 0 c)) with P d n,fw, Cd fw, Qd simp,fw) : the brighter the color is, the smaller is; and black triangles represent direction of roots when gets smaller. so that Ψ d fast z) is Schur for all uncertain parameters. The simulation results with K = 2, and M 1 = M 2 = 1 are given in Figure 5.5. For simplicity, for now we often represent a DT-DOB-based controller as the triplet P d n, C d, Q d), and CT-DOBbased controller similarly as P n, C, Q ).) It is seen in the figure that the baseline controller C d fw z; ) alone is insufficient to attenuate the disturbance, while the DT-DOB with the proposed Q-filter Q d simp,fw z; ) recovers the nominal tracking performance in the presence of external disturbance and model uncertainty. To discuss further on the limiting behavior of the DT-DOB controlled system with P d n,fw, Cd fw, Qd simp,fw), we draw the location of the roots of Ψ d z; ) = 0

177 154 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems Magnitude db) Phase deg) Frequency rad/sec) Figure 5.7: Bode plot of DT Q-filters Q d simp,fw blue solid), Qd ind,fast red dashed), and Q d ind,slow black dash-dotted) under variation of [0.0001, 0.3] in Figure 5.6. As seen in the proof of Theorem 5.4.5, as 0 +, 4 roots of Ψ d z; ) = 0 approach those of Ψ d fast z; ) = 0 Figure 5.6-a)), while the other 6 roots converge to the point 1, 0) remaining inside the unit circle. Especially, each of the latter roots approaches 1+ s i where s = s i are the roots of Ψ slow s) = 0 Figure 5.6-b)), which is seen more clearly in s d -domain Figure 5.6-c)). In what follows, we set M 1 = 0.8, M 2 = 0.8, and K = 2 for the simulation purpose. We now draw a comparison between the direct and indirect DOB designs, studied in Subsection For this purpose, consider a CT Q-filter Q ind s; τ) = with a i set as [a 3, a 2, a 1, a 0 ] = [2, 2, 1, 0.3]. a 0 τs) 4 + a 3 τs) 3 + a 2 τs) 2 + a 1 τs) + a ) From the selection, Ψ fast,ct s) in ) is Hurwitz for all M i [0.8, 1.2] and K [0.5, 2]; this implies that the CT-DOB controlled system in Figure 1.2 is robustly stable with sufficiently small τ > 0 [SJ09]. By discretizing the CT Q-filters 5.7.2) with τ = 0.05 and τ = 0.025

178 5.7. Simulation Results: Two-mass-spring System Revisited a) Output yt) of CT-DOB controlled system with Pn, C, Q ind s; 0.05) ) orange) and DT-DOB controlled system with P d n,fw, C d fw, Q d ind,slow) black) and with P d n,fw, C d fw, Q d simp,fw) blue) b) Output yt) of CT-DOB controlled system with Pn, C, Q ind s; 0.025) ) red) and DT-DOB controlled system with P d n,fw, C d fw, Q d ind,fast) bright red) Figure 5.8: Simulation results for direct and indirect DT-DOB designs: CT- DOB controlled systems Figure 1.2, dash-dotted), DT-DOB controlled systems Figure 5.2, solid), and CT nominal closed-loop system green dashed) via the forward difference method, we obtain the following two DT Q-filters in an indirect way) Q d ind,fast z; ) = Q ind ) ) z 1 z 1 ; 0.025, Q d ind,slow z; ) = Q ind ; We remind that the smaller τ is, the larger the bandwidth of Q ind s; τ) and thus that of its discretization) is Figure 5.7). Figure 5.8 shows the simulation results in time domain with the DT Q-filters Q d simp,fw, Qd ind,fast, and Qd ind,slow where the latter two ones are obtained by the indirected design method). In the figure, one can observe that too large bandwidth of the CT-DOB even though it is stable in the CT domain). One can obtain the same conclusion by the frequency domain analysis with Figure 5.9.

179 156 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems Magnitude db) Frequency rad/sec) Figure 5.9: Sensitivity functions of DT-DOB controlled systems with DT Q- filters Q d simp,fw blue solid), Qd ind,fast red dashed), and Qd ind,slow black dash-dotted) The following two simulations are made to show the relation between stability and the discretization methods of P d n and C d. In particular, for the former we introduce additional two DT nominal models P d n,bw z; ) = P n ) z 1 2, P d n,bt z z; ) = P n ) z 1 z + 1 each of which is the consequence of the backward difference method and the bilinear transformation). After that, by applying Procedure again to P d n,bw z; ), one can obtain a first-order) DT Q-filter Q d simp,bw z; ) = 0.15 z 1) so that the DT-DOB with P d n,bw z; ) and Qd simp,bw z; ) satisfies Item c) of Theorem 5.4.5). We point out that unlike the backward difference method case, P d n,bt z; ) cannot allow any first-order DT Q-filter to make Ψd fast z) Schur even if there is no uncertainty on the CT plant). The simulation results for the DT- DOB-based controllers with different P d nz; ) are provided in Figure By comparing the results of P d n,bw, Cd bw, Qd bw) and P d n,bt, C d bt, Qd bw), it can be concluded that the way of discretizing the nominal model P n s) is also important

180 5.7. Simulation Results: Two-mass-spring System Revisited a) Output yt) b) Enlargement Figure 5.10: Simulation results with different discretization methods for P n : DT-DOB controlled systems with P d n,fw, Cd fw, fw) Qd blue solid), P d n,bw, C d bw, ) Qd bw red dash-dotted), and P d n,bt, C d bt, bw) Qd black dotted), and CT nominal closed-loop system green dashed) for the robust stabilization. However, this is not the case for the DT baseline controller C d, as seen in Figure 5.11 where the three discretization results C d fw, are dealt with. ) z 1 2 C d bw z; ) := C, C d bt z z; ) := C ) z 1 z + 1 Now assume that the frequency σ = 0.5 of the CT sinusoidal disturbance is available in the DT-DOB design. Then by following Procedure we can construct another type of DT-DOB-based controller, as P d n,bw, Cd bw, Qd im) with the 3rd-order Q-filter Q d imz; ) 5.7.3) = a im,2 21 cosσ )) ) z 1) 2 + a im,1 21 cosσ ))) z 1) + a im,0 z 1) 3 + a im,2 z 1)2 + a im,1 z 1) + a im,0

181 158 Chap. 5. Discrete-time Disturbance Observers for Sampled-data Systems Figure 5.11: Simulation results with various discretized baseline controller C d : DT-DOB controlled systems with P d n,fw, Cd fw, fw) Qd blue solid), P d n,fw, C d bw, ) Qd fw pink dashed), and P d n,fw, C d bt, fw) Qd ivory dotted), and CT nominal closed-loop system green dashed) and the coefficients [a im,2 ; a im,1 ; a im,0 ] = [0.12; 0.01; ]. It is remarked that with the coefficients of Q d im z; ) above, the Nyquist plots of the transfer functions L d im,i z), i = 1, 2, do not cut the line Eg/g n, g/g n ) as desired in Procedure 5.6.5). We perform the time-domain simulation with the DT-DOB-based controller as in Figure 5.12, which shows that the DT-DOB derived by Procedure completely eliminates the sinusoidal disturbance in the steady state period.

182 5.7. Simulation Results: Two-mass-spring System Revisited a) Output yt) b) Enlargement Figure 5.12: Simulation results for the proposed DT-DOB with simplest Q-filter Procedure 5.6.5): DT-DOB controlled systems with P d n,bw, C d bw, ) Qd im red dash-dotted) and with P d n,bw, C d bw, bw) Qd dark blue solid), and CT nominal closed-loop system green dashed)

183

184 Chapter 6 Robust Zero-dynamics Attack on Uncertain Cyber-physical Systems: Malicious Use of Disturbance Observer Modern control systems often have complex structures integrating physical plants and digital devices, which are linked through communication networks. These CPS offer great opportunities to achieve high cost efficiency and productivity over traditional control systems [Lee08, LBK15]. Yet at the same time, CPS are vulnerable to malicious attackers, as nowadays the data networks are easier to access by anonymous users. Serious cyber threats to CPS already have taken place in recent years, such as the attacks on the U.S. electric grid [Gor09] and the Stuxnet malware [Rid12]. In this context, it is not surprising that security of the CPS has attracted widespread attention with emerging resilient control and secure estimation schemes [FTD14, TSSJ15b, PDB13, TSSJ15a, SNP + 17, LSE15]. See Figure 6.1 where an overall configuration of the cyber-physical system is shown.) With the increased interest, a variety of cyber attack scenarios have been studied from a control-theoretic perspective; e.g., denial-of-service DoS) attack, replay attack [MS09], zero-dynamics attack [PDB13, TSSJ15b, TSSJ12], bias injection attack [TSSJ15b], optimal linear attack [GSJS17], switching location attack [LWLW17], multi-rate sampling attack [KPSE16], to name just a few. Among various purposes of these attacks, stealthiness is of utter importance to most adversaries: i.e., when an attack signal enters CPS, its impact should not be detected by any anomaly detector. In view of the adversary, one approach 161

185 162 Chap. 6. Malicious Use of Disturbancce Observer Model knowledge Physical plant Attacker Disclosure Disruption Data network Controller Figure 6.1: Overall configuration of cyber-physical system with malicious attacker for achieving stealthiness is to employ structural information of the plant in the attack design. For instance, zero-dynamics attack is known as a model-based attack strategy that remains stealthy [PDB13, TSSJ15b, TSSJ12]. In this attack scenario, the adversary duplicates exactly the real unstable zero-dynamics of non-minimum phase plants. As a result, the attack signal conceals itself in the so-called output-nulling space, even if a large amount of false data are injected into the plant [TSSJ15b, TSSJ12]. Model-based attacks may easily lose their stealthiness when the model knowledge is not perfect. Indeed, even small mismatch between the real and estimated models leaves the zero-dynamics attack detectable [TSSJ12]. This fundamental limitation of model-based attacks has led to recent developments of attack prevention strategies, such as structural modification schemes [TSSJ12, HZ16]. Furthermore, exact model knowledge is not obtainable in many industrial problems, which is another hurdle to the attacker. If so, are CPS be safe from these lethal stealthy attacks thanks to model uncertainty? Interestingly, we will show in this chapter that it may not be the case when the attacker employs the DOB technique in their attack designs. Specifically, we address the problem of constructing a robust zero-dynamics attack that is

186 6.1. Normal Form-based Interpretation of Zero-dynamics Attack 163 stealthy for uncertain non-minimum phase plants. Moving away from the traditional methods to construct the stealthy attack, our key idea is a) to eliminate the effect of model uncertainty and the real zero-dynamics from the inputoutput relation in the plant s dynamics, and b) to build up an auxiliary nominal zero-dynamics which replaces the role of the real counterpart. Then the actual zero-dynamics is left alone while being unstable, and thus its state trajectory will diverge without being detected in a sense. Actually, all these features can be achieved by applying a high gain-based DOB to non-minimum phase systems, which allows the adversary to use the DOB as an attack generator maliciously. Since the proposed attack policy is oriented from a feedback control scheme, it is of necessity to utilize the control input and the plant s output information in the attack design. This is in fact the price to pay for robustness on the model uncertainty. In other words, in view of the cyber-physical attack space in Figure 6.2, the proposed robust zero-dynamics attack requires more disclosure resources [TSSJ15a] 1. It is also worth mentioning that the robust zero-dynamics attack is at entirely new location in the cyber-physical attack space. 6.1 Normal Form-based Interpretation of Zero-dynamics Attack Zero-dynamics attack is a systematic methodology to compromise a class of CPS whose physical plants are of non-minimum phase [FTD14, TSSJ12, TSSJ15b]. The basic concept of the attack is that the attack generator produces a signal based on the unstable zero-dynamics of the physical plant and injects its diverging output into the actuator channel. This consequently leads to two important 1 Consider a linear system under actuator and sensor attacks, a u and a y, ẋ = Ax + Bu c + a u), y = Cx + a y. Then the resources used in the attack design can be classified into the following three items: model knowledge indicates the knowledge on the triplet A, B, C) of the plant. disclosure resource means the availability of the signals xt), u ct), and yt). disruption resource stands for the ability to inject the attack signals a ut) and a yt). A more detailed explanation on the classification can be found in [TSSJ15a].

187 164 Chap. 6. Malicious Use of Disturbancce Observer Model knowledge Zero-dynamics Multi-rate sampling Bias-injection Denial-of-Service Covert Eavesdropping Robust zero-dynamics Switching location Replay Optimal linear Disclosure Disruption Figure 6.2: Cyber-physical attack space [TSSJ15a] with model knowledge, disruption, and disclosure resources: The robust zero-dynamics attack is at entirely new location. features: a) the actual zero-dynamics) state diverges as time elapses, and b) the plant s state remains close to the output-nulling space so that the corresponding output is almost zero. By the latter property, the zero-dynamics attack has been known as a stealthy attack. In this section, we re-interpret the conventional zero-dynamics attack first. In particular, while the geometric control theory [TSSJ15b] usually has been employed as a tool for the analysis in the literature, we here present another way to analyze the attack, based on the Byrnes-Isidori normal form [Kha96, Chapter 13]. This new approach will allow us to gain further insight on the attack, especially on its fundamental limitation against model uncertainty System Description Consider a linear SISO plant under an actuator attack, denoted by at), especially represented in the Byrnes-Isidori normal form ż = Sz + Gy, 6.1.1a)

188 6.1. Normal Form-based Interpretation of Zero-dynamics Attack 165 ẋ = A ν x + B ν ψ z + ϕ x + gu c + a) ), y = C ν x 6.1.1b) where z R l and x R n l are the states with the relative degree ν := n l 1, y R is the output, u R is the control input, and a R is the attack signal that enters the actuator channel. For an integer i 1, the matrices A i, B i, and C i are given by [ ] 0i 1 I i 1 A i :=, B i := 0 0 i 1 [ 0i 1 1 ], C i := [ ] 1 0 i 1. The matrices S, G, ψ and ϕ, and the scalar g are with suitable dimensions. Without loss of generality, it is supposed that 6.1.1) is controllable and observable, and the high-frequency gain g is positive. For now, it is assumed that at least one of the eigenvalues of S lies in the open right half-plane so that the plant 6.1.1) is of non-minimum phase). Then without loss of generality, the z-dynamics 6.1.1a) can be rewritten by applying a suitable coordinate change for z) as ] [ ] [ ] [żu Su 0 zu = + ż s 0 S s z s [ Gu G s ] y 6.1.2) where S u R lu lu and S s R ls ls are square matrices with l u 1 and l s := l l u, such that all the eigenvalues of S u and S s are located in the open right half-plane and the closed left half-plane, respectively. The matrices G u and G s are constant and satisfy G = [G u ; G s ]. The control input u c in 6.1.1) is supposed to be generated by an output feedback controller ċ = Ec + Lr y), u c = Jc + Kr y) ) Here c R nc is the controller state, and r R is the reference signal, which is bounded and sufficiently smooth with bounded time derivatives, and E, L, J, and K are some constant matrices. We assume that without the attack i.e., at) 0), the closed-loop system 6.1.1) and 6.1.3) is stable.

189 166 Chap. 6. Malicious Use of Disturbancce Observer As introduced in the previous works [TSSJ15b, TSSJ12], the zero-dynamics attack is usually constructed by duplicating the zero-dynamics of the plant 6.1.1). In particular, with the help of the normal form representation, one can express the attack as ż a = Sz a, a za = 1 g ψ z a 6.1.4) where z a =: [zu; a zs a ] R lu+ls is the attacker s state. In what follows, the superscript a is used to indicate signals generated by the adversary.) To activate the unstable mode of the z a -dynamics 6.1.4), the initial condition zut a 0 ) of the unstable part is selected as a nonzero vector. Hereinafter, we denote the moment when the attack at) enters the system as t = t 0.) Performance of Zero-dynamics Attack We start the analysis of the attack 6.1.4) with a new variable χ := [x; c] R ν+nc. 2 Then the actual stable closed-loop system 6.1.1) and 6.1.3) can be rewritten in a more compact form ż = Sz + GCχ, 6.1.5a) ) χ = Aχ + B 1 r + B 2 ga + ψ z, y = Cχ 6.1.5b) where the matrices A, B, and C are given by [ Aν + B ν ϕ ) ] gkc ν gbν J A :=, LC ν E 6.1.6a) [ ] [ ] gbν K Bν B 1 :=, B 2 :=, C := [C ν L ] 0. nc 6.1.6b) 0 nc For comparison, by putting at) 0 into 6.1.5) we obtain an auxiliary) attackfree closed-loop system ż o = Sz o + GCχ o, 6.1.7a) 2 To take a closer look at the behavior of the nominal zero-dynamics state z a n to be presented shortly), the stacked variable χ is defined in a reduced form [x; c] rather than a larger one [z a n; x; c] as in the previous chapters).

190 6.1. Normal Form-based Interpretation of Zero-dynamics Attack 167 χ o = Aχ o + B 1 r + B 2 ψ z o, y o = Cχ o 6.1.7b) where χ o =: [x o ; c o ] is the attack-free counterpart of χ. Now, the nature of the zero-dynamics attack 6.1.4) is introduced in the following proposition. Proposition The solution [z a t); zt); χt)] of the closed-loop system 6.1.5) under the attack a = a za in 6.1.4), initiated in R l R l R ν+nc, satisfies the following statements: a) For any z a t 0 ) R l such that zut a 0 ) 0, z u t) as t ; 6.1.8) b) For the solution [z o t); χ o t)] of the attack-free system 6.1.7) initiated at [z o t 0 ); χ o t 0 )] = [zt 0 ); χt 0 )], χt) χ o t) k za e hzat t 0) z a t 0 ), t t 0 where k za > 0 and h za > 0 are constant. Proposition explicitly points out that the zero-dynamics attack 6.1.4) is capable of damaging the internal state z u t) of the plant. We also note that just a small non-zero initial condition zut a 0 ) of the attack generator 6.1.4) will do the job, while maintaining stealthiness in the sense that yt) y o t) = Cχt) Cχ o t) < ϵ, t t ) with a given threshold ϵ > 0. Proof. Let us define an error variable z := z z a. It is trivial that ga+ψ z = ψ z. It then follows that the closed-loop system 6.1.5) is transformed into z = ż ż a = Sz z a ) + GCχ = S z + GCχ, a)

191 168 Chap. 6. Malicious Use of Disturbancce Observer χ = Aχ + B 1 r + B 2 ψ z b) which has exactly the same stable) dynamics as the attack-free one 6.1.7). Thus for some positive constants k za and h za, [ zt); χt)] [zo t); χ o t)] k za e hzat t 0) [ zt0 ); χt 0 )] [z o t 0 ); χ o t 0 )] = k za e hzat t 0) z a t 0 ) where the last equality results from zt 0 ) = z o t 0 ) and χt 0 ) = χ o t 0 ). This directly implies the item b). On the other hand, the attacker s state z a t) generated by 6.1.4) with nonzero zut a 0 ) must diverge as time goes on. It means that zt) = z a t) + zt) also diverges, because the state zt) of the stable system ) remains bounded. This completes the proof. Remark From the analysis, it is clear that the lower-order dynamics żu a = S u zu a and a za = 1/g)ψu zu a where ψ u is a suitable partition of ψ) is enough to realize the zero-dynamics attack Limitation of Zero-dynamics Attack against Model Uncertainty It is important to note that exact model knowledge on the plant 6.1.1) is of necessity in the design of the zero-dynamics attack 6.1.4). However, such a requirement is quite unrealistic. This is because in most industrial systems, it is not always possible for the attacker nor for the defender) to obtain the exact plant model. In other words, it is natural to assume that the physical plant 6.1.1) has model uncertainty. Assumption The parameters S, G, ψ, ϕ, and g of the plant 6.1.1) are uncertain, while the uncertain quantities are bounded and their bounds are known to the attacker. 3 In particular, 0 < g g g for some constants g and g. 3 The attacker need not know exact bounds of uncertainties. Overestimate would work.

192 6.2. Robust Zero-dynamics Attack for Uncertain Cyber-Physical Systems 169 We assume that the controller 6.1.3) is appropriately designed to robustly stabilize the uncertain plant satisfying Assumption From now on, we take a glance at the situation when the attacker tries to design a zero-dynamics attack, in the presence of the model uncertainty in Assumption Since the ideal structure 6.1.4) is not available at this stage, a possible alternative would be ż a = S n z a, a za = 1 g n ψ n z a ) where S n, ψ n, and g n > 0 are selected as some nominal counterparts of S, ψ, and g, respectively. Then, the attack signal a za t) is exponentially diverging with rate determined by the unstable modes of S n. If these modes are different from the zeros of 6.1.5) i.e., the eigenvalues of S), then the output yt) should diverge with the same exponential rate as those modes. In fact, even arbitrarily small differences will lead to a diverging output with fixed rate. From the discussion so far, it may seem that CPS are safe from those stealthy attacks because model uncertainty exists in practice. Unfortunately, we find in the next section that there is another type of stealthy attack which is robust against model uncertainty. 6.2 Robust Zero-dynamics Attack for Uncertain Cyber- Physical Systems Problem Revisited with Model Uncertainty In what follows, we consider the closed-loop system 6.1.1) and 6.1.3) or equivalently, 6.1.5)) where the plant 6.1.1) of interest has parametric uncertainty as in Assumption Also, we suppose that the initial conditions zt 0 ) and χt 0 ) of the closed-loop system 6.1.5) belong to some compact sets Z 0 R l and X 0 C 0 R ν+nc, respectively.

193 170 Chap. 6. Malicious Use of Disturbancce Observer The following attack-free) nominal plant of 6.1.1) is taken into account: ż n = S n z n + G n y n, ẋ n = A ν x n + B ν ψ n z n + ϕ n x n + g n u n ), y n = C ν x n 6.2.1) where z n R l and x n R ν are the nominal states, y n R is the nominal output, and u n R is the nominal input, which is generated by the existing control law 6.1.3) as ċ n = Ec n + Lr y n ), u n = Jc n + Kr y n ) 6.2.2) where c n represents the nominal state of the controller. The parameters S n, G n, ψ n, ϕ n, and g n > 0 are nominal counterparts of the actual uncertain) S, G, ψ, ϕ, and g > 0, respectively, and these are the attacker s selection. The nominal model 6.2.1) is of course different from the real plant 6.1.1), but it is assumed that the parameters of 6.2.1) are within the uncertainty bounds of Assumption 6.1.1, so that both 6.1.1) and 6.2.1) have the same relative degree and the same sign of high-frequency gains g and g n. It will be seen that the plant 6.1.1) behaves like the nominal model 6.2.1) by the initiation of the proposed attack. In this context, it may be better for stealthiness if the nominal model 6.2.1) coincides with a design model used for designing the controller 6.1.3) which, however, requires that the design model is leaked to the attacker a priori ). For brevity, we often express the nominal closed-loop system 6.2.1) and 6.2.2) with χ n := [x n ; c n ] as ż n = S n z n + G n Cχ n, 6.2.3a) χ n = A n χ n + B n,1 r + B n,2 ψ n z n, y n = Cχ n 6.2.3b) where A n, B n,1, and B n,2 are the same as A, B 1, and B 2 defined in 6.1.6), with S, G, ψ, ϕ, and g being replaced by their nominal counterparts. We note in advance that similar to 6.1.7), the nominal closed-loop system 6.2.3) or equivalently 6.2.1) and 6.2.2)) will play the role of a reference system in the attack design. For this, the nominal closed-loop system 6.2.3) is supposed

194 6.2. Robust Zero-dynamics Attack for Uncertain Cyber-Physical Systems 171 to be stable; i.e., the matrix [ ] Sn G n C B n,2 ψ n A n 6.2.4) is Hurwitz. Now, motivated by Proposition 6.1.1, we formulate the problem of our interest with respect to the uncertain plant. Problem of Chapter 6: For given z u > 0 and ϵ > 0, to construct a robust attack generator ϱ a = fϱ a, u c, y), a = hϱ a, u c, y) 6.2.5) that achieves the following properties simultaneously for all admissible model uncertainties in Assumption 6.1.1: a) z u t) becomes eventually larger than z u > 0 within a finite time t = t fin t 0 ; b) yt) y n t) is smaller than the threshold ϵ > 0 until the attack succeeds i.e., for all t 0 t t fin ). The items in Problem Statement can be interpreted as some refinements of those in Proposition On one hand, item a) indicates the capability of the attack 6.2.5) to damage the plant s internal state zt). Here, z u is one of the attacker s design specifications. On the other hand, a new notion of stealthiness is introduced in item b). Indeed, the actual output yt) under attack is compared with the output y n t) of the nominal system 6.2.3), rather than with y o t) of the attack-free) uncertain system 6.1.5) as in Proposition At first glance, it may seem that item b) easily fails if the model uncertainty is large. However, this is often not the case even for large model uncertainty, as long as the existing controller 6.1.3) is robust against the parametric uncertainties of Assumption In fact, when a tracking or regulating problem is robustly) solved by 6.1.3) for both actual and nominal systems with no attack), their outputs y n t) and y o t) reach the same reference rt) in the end. It means that

195 172 Chap. 6. Malicious Use of Disturbancce Observer Zero-dynamics attack Physical plant Data network Controller a) Conventional zero-dynamics attack 6.1.4) Robust zero-dynamics attack Physical plant Data network Controller b) Robust zero-dynamics attack 6.2.5) Figure 6.3: Configurations of two different attack scenarios: The zerodynamics attack 6.1.4) requires the exact model knowledge, while the robust zero-dynamics attack 6.2.5) instead utilizes the disclosure resources i.e., u c and y). y n t) y o t) during the steady-state operation of the system when the attack is usually initiated. In summary, we claim in this paper that the new stealthiness is also valid if the uncertainty is not large or if the attack 6.2.5) enters the system in the steady state. We further remark that, different from traditional zero-dynamics attack 6.1.4), the attack generator 6.2.5) explicitly makes use of the signals u c and y. This is in fact the price to pay for the robustness against model uncertainty; i.e., instead of using less model knowledge, the attacker relies more on the input and output information of the plant to adjust to uncertain environment on-line. In short, more disclosure resources are needed as follows. Assumption The plant output yt) and the control input ut) are avail-

196 6.2. Robust Zero-dynamics Attack for Uncertain Cyber-Physical Systems 173 able to attackers. In addition, for a technical reason, we restrict our attention on the nonminimum phase systems with hyperbolic zero-dynamics. Assumption At least one of the eigenvalues of S lies in the open right half-plane, and none of the eigenvalues are located on the imaginary axis of the complex plane. To distinguish 6.2.5) from the non-robust) zero-dynamics attack 6.1.4), we call 6.2.5) a robust zero-dynamics attack. Overall configurations of these attack scenarios are depicted in Figure Yet Another Attack Policy on Unstable Zero-dynamics: Ideal Strategy As an intermediate step, in this subsection we provide a new attack strategy on the non-minimum phase plant 6.1.1). It is noted in advance that the method to be provided here is not realizable yet, but we will shortly make it feasible in the next subsection. The first task is, using the information of the output y, to duplicate the nominal z n -dynamics 6.2.6) as the form ż a n = S n z a n + G n y 6.2.6) where z a nt 0 ) is chosen in Z 0. With the auxiliary state z a n and the nominal components ψ n, ϕ n, and g n, one can rewrite the time derivative of x ν in 6.1.1b) as ẋ ν = ψ z + ϕ x + gu c + a) 6.2.7a) = ψ n z a n + ϕ n x + g n u + ga a ) 6.2.7b) where a R is defined as a := 1 g ψ z + ψ n z a n + ϕ n ϕ )x + g n g)u c ) )

197 174 Chap. 6. Malicious Use of Disturbancce Observer Then the actual closed-loop system 6.1.5) i.e., 6.1.1) 6.1.3)) with the auxiliary dynamics 6.2.6) can be equivalently represented using 6.2.8) by ż = Sz + GCχ same as 6.1.2)), 6.2.9a) żn a = S n zn a + G n Cχ, 6.2.9b) ) χ = A n χ + B n,1 r + B n,2 ga a ) + ψn zn a, y = Cχ c) For now, we suppose that a is available to the attacker, from which the attack signal a is constructed as at) = a t), t t ) It should be emphasized that under the attack a = a, the zn, a χ)-dynamics 6.2.9b) 6.2.9c) is exactly the same as the nominal closed-loop system 6.2.3) where the auxiliary zn-dynamics a disguises as the plant s internal dynamics. At the same time, the attack a = a in ) leaves the real unstable) z-dynamics 6.2.9a) decoupled from 6.2.9b) 6.2.9c) so that the real internal state zt) possibly diverges. The discussion so far is summarized in the following proposition. Proposition The solution [zt); znt); a χt)] of the closed-loop system 6.1.5) under the attack 6.2.6), 6.2.8), and ), initiated in Z 0 Z 0 X 0 C 0, satisfies the following statements: a) For almost every [zt 0 ); znt a 0 ); χt 0 )], z u t) as t ; ) b) For the solution [z n t); χ n t)] of the nominal system 6.2.3) initiated at [z n t 0 ); χ n t 0 )] = [znt a 0 ); χt 0 )], [ ] [ ] z a n t) zn t) =, t t 0. χt) χ n t) Moreover, [z s t); z a nt); χt)] Z s Z n X C for all t t 0 where Z s R ls, Z n R l, X R ν, C R nc are some compact sets.

198 6.2. Robust Zero-dynamics Attack for Uncertain Cyber-Physical Systems 175 Proof. The item b) is trivial and omitted. From b), the last statement also follows straightforwardly since rt) is uniformly bounded. Now, for a), let us define some matrices S s 0 G s C P s := 0 S n G n C, R s := 0 B n,2 ψn A n Q s,1 := 0 ls 0 l B n,1, Q s,2 := 0 ls 0 l gb n,2 [ ] 0 l s 0 l C, ) Notice that P s is Hurwitz. By this, one obtains the unique solution T R lu ls+l+ν+m) of the Sylvester equation TP s S u T + G u R s = ) With these symbols and the coordination transformations z s χ s := zn and χ u := z u + Tχ s, ) χ we newly represent the overall system 6.2.9) as ż u = S u z u + G u R s χ s ) χ s = P s χ s + Q s,1 r + Q s,2 a a ) ) Differentiating χ u along with these two dynamics gives χ u = ż u + T χ s = S u z u + G u R s χ s ) + T P s χ s + Q s,1 r + Q s,2 a a )) = S u χ u + TQ s,1 r + TQ s,2 a a ) )

199 176 Chap. 6. Malicious Use of Disturbancce Observer It is then clear that under at) a t), the above χ u - and χ s -dynamics become χ s = P s χ s + Q s,1 r, and χ u = S u χ u + TQ s,1 r, ) respectively, so that both are decoupled from each other. Among them, the χ u - dynamics is anti-stable i.e., S u is anti-hurwitz) and the external signal rt) is bounded. Then, almost all trajectories χ u t) diverge as time goes on: more precisely, the divergence of χ u t) occurs for all admissible initial condition χ u t 0 ) except only one point χ u t 0 ) = e Suρ t0) TQ s,1 rρ)dρ =: χ u, ) t 0 which is well-defined because S u is Hurwitz). This exceptional initial condition generates the bounded solution of ) χ ut) = t e Suρ t) TQ s,1 rρ)dρ, t t ) The readers are referred to [HMS96, JD99] for more details on the bounded solution χ ut) for anti-stable system.) Once χ u t) diverges as time goes on, z u t) = χ u t) Tχ s t) also does because χ s t) is bounded. Finally, one can summarize the above arguments that ) holds if [zt 0 ); z a nt 0 ); χt 0 )] Z 0 Z 0 X 0 C 0) \ L 0 za with the set { [zt0 L 0 za := ); znt a 0 ); χt 0 ) ] : z u t 0 ) + T [ z s t 0 ); znt a 0 ); χt 0 ) ] } = χ u,0, which concludes the proof. Remark Item a) of Proposition highlights that unlike the conventional attack 6.1.4), the present one ) might fail to damage the internal state z u t) for the specific initial conditions [zt 0 ); znt a 0 ); χt 0 )] L 0 za, defined in the proof above. Worse yet, it is rarely possible to compute L 0 za a priori, since χ u,0 is determined by the future information of the external input rt) so χ ut) is non-causal ). Nonetheless, this may not be a big problem to the adversary. Indeed, the Lebesgue measure of L 0 za is zero, which means that this unwanted

200 6.2. Robust Zero-dynamics Attack for Uncertain Cyber-Physical Systems 177 scenario hardly occurs. Remark The effect of the attack 6.2.8) at time t 0 is to replace the uncertain parameters and the state z in 6.2.7a) with the nominal ones and the state zn a as in 6.2.7b). As a result, it is like replacing the zero-dynamics 6.2.9a) with 6.2.9b) at time t 0. In order to make this abrupt change as invisible as possible from the output response, it would be better to have znt a 0 ) zt 0 ). This is possible in some situations: a) the overall system is already in the steady state i.e., yt) rt)) before the attack is injected so that the value of z is easily guessed at least approximately); or b) the model uncertainty is not too large to run a state observer before the initiation of the attack using the information of y and u. If the attacker is not able to set znt a 0 ) close to zt 0 ), then a control action of 6.1.3) may cause a transient from t = t 0. More discussion can be found in Section 6.3 with some simulations. Even though the new attack policy ) seems to resolve the considered problem directly as in Proposition 6.2.1), there is still a huge gap between ) and the desired attack generator 6.2.5). This is because a used in ) is composed of uncertain parameters and unmeasured states and thus it is not obtainable in general. Yet, surprisingly, we observe that the considered situation is analogous to one in robust control theory. Indeed, a t) represents the discrepancy between the actual and nominal plants, which has been known in the literature under the name of total disturbance [SPJ + 16, Han09]. From this viewpoint, the problem of our interest can be converted into how to design a robust controller that estimates and compensates the lumped disturbance a. Motivated by this, in the next subsection we will construct a DOB [SPJ + 16, BS08] as the robust attack generator 6.2.5). We note in advance that the disturbance observer to be presented will estimate and compensate the lumped disturbance a t) quickly, from which the ideal attack policy ) will be recovered in a practical sense.

201 178 Chap. 6. Malicious Use of Disturbancce Observer Design of Robust Zero-dynamics Attack: Practical Implementation of New Attack Policy via Disturbance Observer For the design of the attack generator 6.2.5), we first compute some bounds ϵ for the state variables of the overall system. Take compact sets Z n Zn, X ϵ X, and C ϵ C where Z n, X, and C are presented in Proposition 6.2.1, and ϵ is given in the problem of interest. We also choose a compact set Z s Z s such that the state trajectory z s t) of 6.1.1a) belongs to Z s for all initial condition zt 0 ) Z 0 and for all χt) X. In addition, select a positive constant z u to be larger than the attack specification z u in the problem formulation. It will be shown shortly that the state variable remains bounded as z u t) z u and [ z s t); z a nt); χt) ] Z s Z n X C ) until the attack 6.2.5) succeeds in the sense of item a) in the problem formulation). With these bounds, we consider the set A := { a in 6.2.8) : [ zu ; z s ; z a n; χ ] is bounded as )} which contains all possible values of a of 6.2.8) with respect to the model uncertainty, the bounded) state variables, and the values of rt). The set A is clearly bounded under the assumptions. Since computing the exact A can be a difficult task, we instead choose any compact set A strictly larger than A, which is enough for the design of the attack generator. On top of that, some components to be used in the DOB design are introduced below. First, let us choose a saturation function s a : R R that is C 1 and bounded, and satisfies 4 s a â) = â, â A and 0 s a â) 1, â R ) â Also, for a positive integer i, define a diagonal matrix Υ i τ) := diagτ, τ 2,..., τ i ) 4 In other words, s a is any smooth bounded function whose slope is limited by one and which is identity on Â.

202 6.2. Robust Zero-dynamics Attack for Uncertain Cyber-Physical Systems 179 R i i which is invertible for any positive constant τ. Here, τ is a design parameter to be determined in Theorem ) Next, by using the design guidelines in Appendix A.1, choose a i, i = 0,..., ν 1, such that the transfer function Z ν,0 s) = sν + a ν 1 s ν a 1 s + g/g n )a 0 s ν + a ν 1 s ν a 1 s + g/g n )a ) is SPR where g and g are the bounds of g in Assumption Finally, by following the design methodology of [BS14] or that of Chapter 2 with l q = 0), we propose the robust zero-dynamics attack 6.2.5) as the z a n- dynamics 6.2.6) and ṗ a = A ν Υ 1 ) ν αc ν p a + a 0 τ ν B ν u c + a rza + 1 ) ψn zn a g n + a 0 τ ν 1 g n ϕn + Υ 1 a rza = s a C ν p a a 0 τ ν 1 g n y ν α ) y, a) ) b) where p a R ν and z a n R l are the states of the attack generator, ϕ n := [ϕ n,ν ; ; ϕ n,1 ] R ν and α := [a ν 1 ; ; a 0 ] R ν. It is noted that the output a rza R will serve as an estimate of a. We take p a t 0 ) in a compact set F 0 p R ν while z a nt 0 ) belongs to Z 0. While F 0 p R ν can be any compact set, for example, F 0 p = {0} would work, it is preferred to have z a nt 0 ) zt 0 ) as discussed in Remark ) The following theorem describes our main result that the proposed attack 6.2.6) and ) recovers the attack performance of the ideal attack policy ) in a practical sense, while being robustly stealthy against model uncertainty. Theorem Suppose that Assumptions hold. Then for given z u > 0 and ϵ > 0, there exists τ > 0 such that the solution [zt); znt); a χt); p a t)] of the closed-loop system 6.1.5) under the robust zero-dynamics attack a = a rza in 6.2.6) and ) with τ 0, τ), initiated in Z 0 Z 0 X 0 Fp 0, satisfies the following statements:

203 180 Chap. 6. Malicious Use of Disturbancce Observer a) For almost every [zt 0 ); z a nt 0 ); χt 0 ); p a t 0 )], there exists t fin t 0 such that z u t fin ) > z u ; ) b) For the solution [z n t); χ n t)] of the nominal system 6.2.3) initiated at [z n t 0 ); χ n t 0 )] = [znt a 0 ); χt 0 )], [ ] [ ] z a n t) zn t) χt) < ϵ ) for t 0 t t fin. χ n Proof of Main Result The rest of this section is devoted to the proof of Theorem To this end, we represent the attacked closed-loop system into the singular perturbation form [Kha96]. Lemma With the coordinate changes ) and η 1 = p a 1 a 0 τ ν 1 g n y a, η i = τ i 1 p a 1 i 1) a 0 τ ν 1 g n y i 1) a) ), i = 2,..., ν, b) the overall system 6.1.5), 6.2.6), ), and a = a rza is transformed into the standard singular perturbation form: ), ), and τ η = A ν B ν α ) η + a 0 B ν g gn g n ) [ ] ȧ ã τ 0 ν ) where α := [a 0 ; ; a ν 1 ] R ν and ã := a rza + a = s a Cν η + a ) + a )

204 6.2. Robust Zero-dynamics Attack for Uncertain Cyber-Physical Systems 181 The proof of Lemma is largely similar to that of Lemma 2.3.2, and thus we skip the detailed proof. With τ regarded as a perturbation parameter, from now on we call η the fast variable, while the other states the slow variables. The following lemma indicates that as long as the slow variables remain in the region of interest, the fast variable η approaches the boundary layer η = 0 during transient period. Lemma Suppose that [zt); znt); a χt)] is bounded as in ) for t t 0. Then ηt) satisfies ηt) k η e hηt t 0)/τ) ηt 0 ) + κ η τ), t t 0, ) for some positive constants k η and h η, and a class-k function κ η : R R. Proof. The lemma can be derived in a similar way of Lemma For further analysis, we define an error variable z a n := z a n z n, χ := χ χ n ) on the slow variables, whose time derivative is given from 6.2.3) and 6.2.9)) by [ ] z n a = χ [ ] ] [ ] Sn G n C [ z a n 0 ã ) B n,2 ψn A n χ B n,2 g We remark that ) is a stable linear system with an additional external signal ãt). In particular, one has a Lyapunov function V s z a n, χ) := [ z a n; χ] P s [ z a n; χ] where P s = P s > 0 satisfies [ ] Sn G n C P s + B n,2 ψn A n [ ] Sn G n C P s = I. B n,2 ψ n A n By differentiating V s along with ), we readily have V s < h s V s + k s ã )

205 182 Chap. 6. Malicious Use of Disturbancce Observer where h s and k s are some positive constants. We note that the initial value of V s is zero, because the nominal trajectory [z n t); χ n t)] of interest is initiated at the same point as the real one [znt); a χt)]. In addition, due to the saturation function s a, ã has a bounded value at t = t 0 independent of η. From these facts, one can select t tr > t 0 sufficiently small such that V s z a n t), χt) ) < ϵ2 2 λp s), t 0 t t tr ) Then the inclusions in ) are satisfied for t 0 t t tr. Notice that the inequality ) in Theorem naturally holds during the transient period t 0 t t tr. Keeping this in mind, in what follows we focus on the reduced time period t t tr. Firstly, we claim that if the slow variables are bounded as in ) for t t tr, then the fast variable ηt) with small τ remains around the boundary layer η = 0 for that time period. Indeed, it follows from ) that ηt 0 ) has the form of a polynomial of 1/τ whose coefficients are determined by the initial conditions of the state variables. In particular, with τ 0, 1) we have ηt 0 ) ν j=0 v η,j/τ j where positive constants v η,j, j = 0,..., ν, are independent of τ. Lemma implies that ηt) k η e hηttr t 0)/τ) ν j=0 v η,j τ j + κ η τ) =: κ η τ), t t tr ) where κ : R >0 R >0 is continuous on τ and satisfies κτ) 0 as τ 0 because t tr t 0 > 0). This concludes the claim. For further analysis, we particularly choose 0 < τ 1 < 1 such that for all 0 < τ < τ 1, the function κ η τ) satisfies { κ η τ) min ϵ η, h } s ϵ 2 λp s ) k s where ϵ η > 0 is a small constant such that ) a A and η < ϵ η s a a + C ν η ) = a + C ν η. Note that such ϵ η always exists, since the saturation level set A of s a is selected

206 6.2. Robust Zero-dynamics Attack for Uncertain Cyber-Physical Systems 183 strictly larger than A. Next, we argue that for each 0 < τ < τ 1, the inequality ) holds and thus a t) belongs to A) until z u t) z u is violated. To see this, it should be noted that if ) holds for t t tr, then it follows from ), ), and ) that V s < h s Vs ϵ 2 λp s ) ). This implies that the set V := { [ z n; a χ] : V s z n, a χ) ϵ 2 λp s ) } is positively invariant. The proof of the argument is complete by noting that the error variable [ z nt); a χt)] is located inside V at t = t tr, and that ] [ ] [ z a n z a χ < ϵ n = χ [ zn χ n ] ] [ z a + n Z n X C. χ At last, we complete the proof of the theorem by showing that with sufficiently small τ, there exists a finite time t = t fin such that the partial state z u t) satisfies ) for almost every [zt 0 ); znt a 0 ); χt 0 ); p a t 0 )] in Z 0 Z 0 X 0 C Fp 0. It is obvious from the arguments so far that as long as z u t) z u and 0 < τ < τ 1, the saturation function s a is inactive for t t tr. Then one has ã = C ν η and ȧ = E a,1 η + E a,2 [χ u ; χ s ] + E a,3 [r; ṙ] for some constant matrices E a,i, i = 1, 2, 3. It follows that the overall transformed) system ), ), and ) turns out to be linear ; in particular, τ η = [ ] [ ] A ν B ν α χu ṙ g + τe a,1 ) η + τea,2 + τe a,3 r χ s ) where α g := α + g g n g n a 0 C ν = [ g/g n ) a0 ; a 1 ; ; a ν 1 ] R ν.

207 184 Chap. 6. Malicious Use of Disturbancce Observer For further analysis, let us consider the non-symmetric algebraic Riccati equation [ Qs,2 0 ] + L [ ] A ν B ν α ) Su 0 g + τe a,1 τ L τle a,2 L = ) 0 P s Here, since the matrix A ν B ν α g is Hurwitz, it follows from [KKO99, Subsection 2.2] that there exists 0 < τ τ 1 such that for fixed τ 0, τ), the solution L = Lτ) of ) is uniquely determined and its norm is bounded. Using this, we now take τ 0, τ) and define a coordinate change [ ] ˆχu := ˆχ s [ χu χ s ] + τl η Then with L =: [L u ; L s ] R lu ν R ls+n+m) ν, it is easy to see that for t t tr, [ ] [ ] [ ] ˆχu Su 0 ˆχu = + ˆχ s 0 P s ˆχ s [ TQs,1 Q s,1 ] [ ] [ ] τlu E 3 r r ) τl s E 3 ṙ Observe that the above ˆχ u -dynamics is an anti-stable linear system with the bounded external signal r. Thus similar to the case of Proposition 6.2.1, one has z u t) = ˆχ u t) Tχ s t) τl u ηt) diverges as time goes on, as long as ˆχ u t tr ) =: ˆχ u,tr. e Suv t) t tr [ ]) rv) TQ s,1 rv) + τl u E 3 dv ṙv) To find out the exceptional case at the initial time t = t 0 rather than at t = t tr ), let us consider the backward solution of the ˆχ u -dynamics in ). If the solution is initiated at ˆχ u t tr ) = ˆχ u,tr, the corresponding value ˆχ u t 0 ), denoted by ˆχ u,0, is uniquely determined. Using this, we can summarize that z ut) must diverge if [zt 0 ); znt a 0 ); χt 0 ); p a t 0 )] is not located in a Lebesgue measure zero set L 0 rza on which ˆχ u t 0 ) = ˆχ u,0 holds.

208 6.3. Simulation: Power Generating Systems 185 Droop characteristic Governor Hydro-turbine Load & machine Figure 6.4: Configuration of a power generating system with a hydro turbine [Tan10] 6.3 Simulation: Power Generating Systems We consider the scenario when a malicious attack enters a power generating system with a hydro turbine [Kun94], [Tan10], as depicted in Figure 6.4. A statespace representation of the plant is given by ẋ 1 = 1/T lm )x 1 + K lm /T lm )x 2 2x 3 ), ẋ 2 = 2/T h )x 2 + 6/T h )x 3, ẋ 3 = 1/T g )x 3 + 1/T g ) u + a 1/R)x 1 ), 6.3.1a) 6.3.1b) 6.3.1c) where u is the input, y = x 1 is the output, and x := [x 1 ; x 2 ; x 3 ] := [ f; P + 2 X; X] is the state consisting of the frequency deviation f Hz), the change in generator output P p.u.), and the change in governor valve position X p.u.). The constants T lm, T h, and T g indicate time constants of load and machine, hydro turbine, and governor, respectively, and R Hz/p.u.) is the speed regulation due to the governor action. The detailed parameters of the plants are given by K lm = 1, T lm = 6, T g = 0.2, and R = 0.05, while T h [4, 6] is uncertain [Tan10]. To robustly regulate the output of the uncertain plant, the control input u is generated by a band-limited) PID-type controller Ks) = s s )/0.01s 2 + s).

ANALYSIS AND SYNTHESIS OF DISTURBANCE OBSERVER AS AN ADD-ON ROBUST CONTROLLER

ANALYSIS AND SYNTHESIS OF DISTURBANCE OBSERVER AS AN ADD-ON ROBUST CONTROLLER ANALYSIS AND SYNTHESIS OF DISTURBANCE OBSERVER AS AN ADD-ON ROBUST CONTROLLER Hyungbo Shim (School of Electrical Engineering, Seoul National University, Korea) in collaboration with Juhoon Back, Nam Hoon

More information

CHAPTER 5 ROBUSTNESS ANALYSIS OF THE CONTROLLER

CHAPTER 5 ROBUSTNESS ANALYSIS OF THE CONTROLLER 114 CHAPTER 5 ROBUSTNESS ANALYSIS OF THE CONTROLLER 5.1 INTRODUCTION Robust control is a branch of control theory that explicitly deals with uncertainty in its approach to controller design. It also refers

More information

저작권법에따른이용자의권리는위의내용에의하여영향을받지않습니다.

저작권법에따른이용자의권리는위의내용에의하여영향을받지않습니다. 저작자표시 - 비영리 - 변경금지 2.0 대한민국 이용자는아래의조건을따르는경우에한하여자유롭게 이저작물을복제, 배포, 전송, 전시, 공연및방송할수있습니다. 다음과같은조건을따라야합니다 : 저작자표시. 귀하는원저작자를표시하여야합니다. 비영리. 귀하는이저작물을영리목적으로이용할수없습니다. 변경금지. 귀하는이저작물을개작, 변형또는가공할수없습니다. 귀하는, 이저작물의재이용이나배포의경우,

More information

저작권법에따른이용자의권리는위의내용에의하여영향을받지않습니다.

저작권법에따른이용자의권리는위의내용에의하여영향을받지않습니다. 저작자표시 - 비영리 - 변경금지 2.0 대한민국 이용자는아래의조건을따르는경우에한하여자유롭게 이저작물을복제, 배포, 전송, 전시, 공연및방송할수있습니다. 다음과같은조건을따라야합니다 : 저작자표시. 귀하는원저작자를표시하여야합니다. 비영리. 귀하는이저작물을영리목적으로이용할수없습니다. 변경금지. 귀하는이저작물을개작, 변형또는가공할수없습니다. 귀하는, 이저작물의재이용이나배포의경우,

More information

Chapter 7 Interconnected Systems and Feedback: Well-Posedness, Stability, and Performance 7. Introduction Feedback control is a powerful approach to o

Chapter 7 Interconnected Systems and Feedback: Well-Posedness, Stability, and Performance 7. Introduction Feedback control is a powerful approach to o Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A. Dahleh George Verghese Department of Electrical Engineering and Computer Science Massachuasetts Institute of Technology c Chapter 7 Interconnected

More information

DISTURBANCE OBSERVER BASED CONTROL: CONCEPTS, METHODS AND CHALLENGES

DISTURBANCE OBSERVER BASED CONTROL: CONCEPTS, METHODS AND CHALLENGES DISTURBANCE OBSERVER BASED CONTROL: CONCEPTS, METHODS AND CHALLENGES Wen-Hua Chen Professor in Autonomous Vehicles Department of Aeronautical and Automotive Engineering Loughborough University 1 Outline

More information

1 An Overview and Brief History of Feedback Control 1. 2 Dynamic Models 23. Contents. Preface. xiii

1 An Overview and Brief History of Feedback Control 1. 2 Dynamic Models 23. Contents. Preface. xiii Contents 1 An Overview and Brief History of Feedback Control 1 A Perspective on Feedback Control 1 Chapter Overview 2 1.1 A Simple Feedback System 3 1.2 A First Analysis of Feedback 6 1.3 Feedback System

More information

Control Systems I. Lecture 2: Modeling. Suggested Readings: Åström & Murray Ch. 2-3, Guzzella Ch Emilio Frazzoli

Control Systems I. Lecture 2: Modeling. Suggested Readings: Åström & Murray Ch. 2-3, Guzzella Ch Emilio Frazzoli Control Systems I Lecture 2: Modeling Suggested Readings: Åström & Murray Ch. 2-3, Guzzella Ch. 2-3 Emilio Frazzoli Institute for Dynamic Systems and Control D-MAVT ETH Zürich September 29, 2017 E. Frazzoli

More information

Control Systems I. Lecture 7: Feedback and the Root Locus method. Readings: Jacopo Tani. Institute for Dynamic Systems and Control D-MAVT ETH Zürich

Control Systems I. Lecture 7: Feedback and the Root Locus method. Readings: Jacopo Tani. Institute for Dynamic Systems and Control D-MAVT ETH Zürich Control Systems I Lecture 7: Feedback and the Root Locus method Readings: Jacopo Tani Institute for Dynamic Systems and Control D-MAVT ETH Zürich November 2, 2018 J. Tani, E. Frazzoli (ETH) Lecture 7:

More information

Fall 線性系統 Linear Systems. Chapter 08 State Feedback & State Estimators (SISO) Feng-Li Lian. NTU-EE Sep07 Jan08

Fall 線性系統 Linear Systems. Chapter 08 State Feedback & State Estimators (SISO) Feng-Li Lian. NTU-EE Sep07 Jan08 Fall 2007 線性系統 Linear Systems Chapter 08 State Feedback & State Estimators (SISO) Feng-Li Lian NTU-EE Sep07 Jan08 Materials used in these lecture notes are adopted from Linear System Theory & Design, 3rd.

More information

EML5311 Lyapunov Stability & Robust Control Design

EML5311 Lyapunov Stability & Robust Control Design EML5311 Lyapunov Stability & Robust Control Design 1 Lyapunov Stability criterion In Robust control design of nonlinear uncertain systems, stability theory plays an important role in engineering systems.

More information

Exam. 135 minutes, 15 minutes reading time

Exam. 135 minutes, 15 minutes reading time Exam August 6, 208 Control Systems II (5-0590-00) Dr. Jacopo Tani Exam Exam Duration: 35 minutes, 5 minutes reading time Number of Problems: 35 Number of Points: 47 Permitted aids: 0 pages (5 sheets) A4.

More information

Design of Nonlinear Control Systems with the Highest Derivative in Feedback

Design of Nonlinear Control Systems with the Highest Derivative in Feedback SERIES ON STAB1UTY, VIBRATION AND CONTROL OF SYSTEMS SeriesA Volume 16 Founder & Editor: Ardeshir Guran Co-Editors: M. Cloud & W. B. Zimmerman Design of Nonlinear Control Systems with the Highest Derivative

More information

Robust Semiglobal Nonlinear Output Regulation The case of systems in triangular form

Robust Semiglobal Nonlinear Output Regulation The case of systems in triangular form Robust Semiglobal Nonlinear Output Regulation The case of systems in triangular form Andrea Serrani Department of Electrical and Computer Engineering Collaborative Center for Control Sciences The Ohio

More information

Chapter Robust Performance and Introduction to the Structured Singular Value Function Introduction As discussed in Lecture 0, a process is better desc

Chapter Robust Performance and Introduction to the Structured Singular Value Function Introduction As discussed in Lecture 0, a process is better desc Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A Dahleh George Verghese Department of Electrical Engineering and Computer Science Massachuasetts Institute of Technology c Chapter Robust

More information

Linear State Feedback Controller Design

Linear State Feedback Controller Design Assignment For EE5101 - Linear Systems Sem I AY2010/2011 Linear State Feedback Controller Design Phang Swee King A0033585A Email: king@nus.edu.sg NGS/ECE Dept. Faculty of Engineering National University

More information

Übersetzungshilfe / Translation aid (English) To be returned at the end of the exam!

Übersetzungshilfe / Translation aid (English) To be returned at the end of the exam! Prüfung Regelungstechnik I (Control Systems I) Prof. Dr. Lino Guzzella 3.. 24 Übersetzungshilfe / Translation aid (English) To be returned at the end of the exam! Do not mark up this translation aid -

More information

Introduction. 1.1 Historical Overview. Chapter 1

Introduction. 1.1 Historical Overview. Chapter 1 Chapter 1 Introduction 1.1 Historical Overview Research in adaptive control was motivated by the design of autopilots for highly agile aircraft that need to operate at a wide range of speeds and altitudes,

More information

OPTIMAL CONTROL AND ESTIMATION

OPTIMAL CONTROL AND ESTIMATION OPTIMAL CONTROL AND ESTIMATION Robert F. Stengel Department of Mechanical and Aerospace Engineering Princeton University, Princeton, New Jersey DOVER PUBLICATIONS, INC. New York CONTENTS 1. INTRODUCTION

More information

Robust Stabilization of Non-Minimum Phase Nonlinear Systems Using Extended High Gain Observers

Robust Stabilization of Non-Minimum Phase Nonlinear Systems Using Extended High Gain Observers 28 American Control Conference Westin Seattle Hotel, Seattle, Washington, USA June 11-13, 28 WeC15.1 Robust Stabilization of Non-Minimum Phase Nonlinear Systems Using Extended High Gain Observers Shahid

More information

Overview of the Seminar Topic

Overview of the Seminar Topic Overview of the Seminar Topic Simo Särkkä Laboratory of Computational Engineering Helsinki University of Technology September 17, 2007 Contents 1 What is Control Theory? 2 History

More information

Zeros and zero dynamics

Zeros and zero dynamics CHAPTER 4 Zeros and zero dynamics 41 Zero dynamics for SISO systems Consider a linear system defined by a strictly proper scalar transfer function that does not have any common zero and pole: g(s) =α p(s)

More information

Internal Model Control of A Class of Continuous Linear Underactuated Systems

Internal Model Control of A Class of Continuous Linear Underactuated Systems Internal Model Control of A Class of Continuous Linear Underactuated Systems Asma Mezzi Tunis El Manar University, Automatic Control Research Laboratory, LA.R.A, National Engineering School of Tunis (ENIT),

More information

Multi-Robotic Systems

Multi-Robotic Systems CHAPTER 9 Multi-Robotic Systems The topic of multi-robotic systems is quite popular now. It is believed that such systems can have the following benefits: Improved performance ( winning by numbers ) Distributed

More information

Autonomous Helicopter Landing A Nonlinear Output Regulation Perspective

Autonomous Helicopter Landing A Nonlinear Output Regulation Perspective Autonomous Helicopter Landing A Nonlinear Output Regulation Perspective Andrea Serrani Department of Electrical and Computer Engineering Collaborative Center for Control Sciences The Ohio State University

More information

Control Systems Design

Control Systems Design ELEC4410 Control Systems Design Lecture 3, Part 2: Introduction to Affine Parametrisation School of Electrical Engineering and Computer Science Lecture 3, Part 2: Affine Parametrisation p. 1/29 Outline

More information

Control Systems I. Lecture 2: Modeling and Linearization. Suggested Readings: Åström & Murray Ch Jacopo Tani

Control Systems I. Lecture 2: Modeling and Linearization. Suggested Readings: Åström & Murray Ch Jacopo Tani Control Systems I Lecture 2: Modeling and Linearization Suggested Readings: Åström & Murray Ch. 2-3 Jacopo Tani Institute for Dynamic Systems and Control D-MAVT ETH Zürich September 28, 2018 J. Tani, E.

More information

Chapter 2 Review of Linear and Nonlinear Controller Designs

Chapter 2 Review of Linear and Nonlinear Controller Designs Chapter 2 Review of Linear and Nonlinear Controller Designs This Chapter reviews several flight controller designs for unmanned rotorcraft. 1 Flight control systems have been proposed and tested on a wide

More information

CDS 101/110a: Lecture 8-1 Frequency Domain Design

CDS 101/110a: Lecture 8-1 Frequency Domain Design CDS 11/11a: Lecture 8-1 Frequency Domain Design Richard M. Murray 17 November 28 Goals: Describe canonical control design problem and standard performance measures Show how to use loop shaping to achieve

More information

Event-Triggered Decentralized Dynamic Output Feedback Control for LTI Systems

Event-Triggered Decentralized Dynamic Output Feedback Control for LTI Systems Event-Triggered Decentralized Dynamic Output Feedback Control for LTI Systems Pavankumar Tallapragada Nikhil Chopra Department of Mechanical Engineering, University of Maryland, College Park, 2742 MD,

More information

CONTROL * ~ SYSTEMS ENGINEERING

CONTROL * ~ SYSTEMS ENGINEERING CONTROL * ~ SYSTEMS ENGINEERING H Fourth Edition NormanS. Nise California State Polytechnic University, Pomona JOHN WILEY& SONS, INC. Contents 1. Introduction 1 1.1 Introduction, 2 1.2 A History of Control

More information

저작권법에따른이용자의권리는위의내용에의하여영향을받지않습니다.

저작권법에따른이용자의권리는위의내용에의하여영향을받지않습니다. 저작자표시 - 비영리 - 변경금지 2.0 대한민국 이용자는아래의조건을따르는경우에한하여자유롭게 이저작물을복제, 배포, 전송, 전시, 공연및방송할수있습니다. 다음과같은조건을따라야합니다 : 저작자표시. 귀하는원저작자를표시하여야합니다. 비영리. 귀하는이저작물을영리목적으로이용할수없습니다. 변경금지. 귀하는이저작물을개작, 변형또는가공할수없습니다. 귀하는, 이저작물의재이용이나배포의경우,

More information

Feedback Control of Linear SISO systems. Process Dynamics and Control

Feedback Control of Linear SISO systems. Process Dynamics and Control Feedback Control of Linear SISO systems Process Dynamics and Control 1 Open-Loop Process The study of dynamics was limited to open-loop systems Observe process behavior as a result of specific input signals

More information

Global stabilization of feedforward systems with exponentially unstable Jacobian linearization

Global stabilization of feedforward systems with exponentially unstable Jacobian linearization Global stabilization of feedforward systems with exponentially unstable Jacobian linearization F Grognard, R Sepulchre, G Bastin Center for Systems Engineering and Applied Mechanics Université catholique

More information

Disturbance Attenuation for a Class of Nonlinear Systems by Output Feedback

Disturbance Attenuation for a Class of Nonlinear Systems by Output Feedback Disturbance Attenuation for a Class of Nonlinear Systems by Output Feedback Wei in Chunjiang Qian and Xianqing Huang Submitted to Systems & Control etters /5/ Abstract This paper studies the problem of

More information

DERIVATIVE FREE OUTPUT FEEDBACK ADAPTIVE CONTROL

DERIVATIVE FREE OUTPUT FEEDBACK ADAPTIVE CONTROL DERIVATIVE FREE OUTPUT FEEDBACK ADAPTIVE CONTROL Tansel YUCELEN, * Kilsoo KIM, and Anthony J. CALISE Georgia Institute of Technology, Yucelen Atlanta, * GA 30332, USA * tansel@gatech.edu AIAA Guidance,

More information

Chapter 9 Robust Stability in SISO Systems 9. Introduction There are many reasons to use feedback control. As we have seen earlier, with the help of a

Chapter 9 Robust Stability in SISO Systems 9. Introduction There are many reasons to use feedback control. As we have seen earlier, with the help of a Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A. Dahleh George Verghese Department of Electrical Engineering and Computer Science Massachuasetts Institute of Technology c Chapter 9 Robust

More information

Introduction. Performance and Robustness (Chapter 1) Advanced Control Systems Spring / 31

Introduction. Performance and Robustness (Chapter 1) Advanced Control Systems Spring / 31 Introduction Classical Control Robust Control u(t) y(t) G u(t) G + y(t) G : nominal model G = G + : plant uncertainty Uncertainty sources : Structured : parametric uncertainty, multimodel uncertainty Unstructured

More information

Prüfung Regelungstechnik I (Control Systems I) Übersetzungshilfe / Translation aid (English) To be returned at the end of the exam!

Prüfung Regelungstechnik I (Control Systems I) Übersetzungshilfe / Translation aid (English) To be returned at the end of the exam! Prüfung Regelungstechnik I (Control Systems I) Prof. Dr. Lino Guzzella 29. 8. 2 Übersetzungshilfe / Translation aid (English) To be returned at the end of the exam! Do not mark up this translation aid

More information

Modeling and Control Overview

Modeling and Control Overview Modeling and Control Overview D R. T A R E K A. T U T U N J I A D V A N C E D C O N T R O L S Y S T E M S M E C H A T R O N I C S E N G I N E E R I N G D E P A R T M E N T P H I L A D E L P H I A U N I

More information

Chapter Stability Robustness Introduction Last chapter showed how the Nyquist stability criterion provides conditions for the stability robustness of

Chapter Stability Robustness Introduction Last chapter showed how the Nyquist stability criterion provides conditions for the stability robustness of Lectures on Dynamic Systems and Control Mohammed Dahleh Munther A Dahleh George Verghese Department of Electrical Engineering and Computer Science Massachuasetts Institute of Technology c Chapter Stability

More information

Uncertainty and Robustness for SISO Systems

Uncertainty and Robustness for SISO Systems Uncertainty and Robustness for SISO Systems ELEC 571L Robust Multivariable Control prepared by: Greg Stewart Outline Nature of uncertainty (models and signals). Physical sources of model uncertainty. Mathematical

More information

Laplace Transform Analysis of Signals and Systems

Laplace Transform Analysis of Signals and Systems Laplace Transform Analysis of Signals and Systems Transfer Functions Transfer functions of CT systems can be found from analysis of Differential Equations Block Diagrams Circuit Diagrams 5/10/04 M. J.

More information

Least Squares Based Self-Tuning Control Systems: Supplementary Notes

Least Squares Based Self-Tuning Control Systems: Supplementary Notes Least Squares Based Self-Tuning Control Systems: Supplementary Notes S. Garatti Dip. di Elettronica ed Informazione Politecnico di Milano, piazza L. da Vinci 32, 2133, Milan, Italy. Email: simone.garatti@polimi.it

More information

Exam. 135 minutes + 15 minutes reading time

Exam. 135 minutes + 15 minutes reading time Exam January 23, 27 Control Systems I (5-59-L) Prof. Emilio Frazzoli Exam Exam Duration: 35 minutes + 5 minutes reading time Number of Problems: 45 Number of Points: 53 Permitted aids: Important: 4 pages

More information

Nonlinear System Analysis

Nonlinear System Analysis Nonlinear System Analysis Lyapunov Based Approach Lecture 4 Module 1 Dr. Laxmidhar Behera Department of Electrical Engineering, Indian Institute of Technology, Kanpur. January 4, 2003 Intelligent Control

More information

QSR-Dissipativity and Passivity Analysis of Event-Triggered Networked Control Cyber-Physical Systems

QSR-Dissipativity and Passivity Analysis of Event-Triggered Networked Control Cyber-Physical Systems QSR-Dissipativity and Passivity Analysis of Event-Triggered Networked Control Cyber-Physical Systems arxiv:1607.00553v1 [math.oc] 2 Jul 2016 Technical Report of the ISIS Group at the University of Notre

More information

Robust Internal Model Control for Impulse Elimination of Singular Systems

Robust Internal Model Control for Impulse Elimination of Singular Systems International Journal of Control Science and Engineering ; (): -7 DOI:.59/j.control.. Robust Internal Model Control for Impulse Elimination of Singular Systems M. M. Share Pasandand *, H. D. Taghirad Department

More information

Lecture 12. Upcoming labs: Final Exam on 12/21/2015 (Monday)10:30-12:30

Lecture 12. Upcoming labs: Final Exam on 12/21/2015 (Monday)10:30-12:30 289 Upcoming labs: Lecture 12 Lab 20: Internal model control (finish up) Lab 22: Force or Torque control experiments [Integrative] (2-3 sessions) Final Exam on 12/21/2015 (Monday)10:30-12:30 Today: Recap

More information

(Continued on next page)

(Continued on next page) (Continued on next page) 18.2 Roots of Stability Nyquist Criterion 87 e(s) 1 S(s) = =, r(s) 1 + P (s)c(s) where P (s) represents the plant transfer function, and C(s) the compensator. The closedloop characteristic

More information

Robust Output Feedback Stabilization of a Class of Nonminimum Phase Nonlinear Systems

Robust Output Feedback Stabilization of a Class of Nonminimum Phase Nonlinear Systems Proceedings of the 26 American Control Conference Minneapolis, Minnesota, USA, June 14-16, 26 FrB3.2 Robust Output Feedback Stabilization of a Class of Nonminimum Phase Nonlinear Systems Bo Xie and Bin

More information

AUTOMATIC CONTROL. Andrea M. Zanchettin, PhD Spring Semester, Introduction to Automatic Control & Linear systems (time domain)

AUTOMATIC CONTROL. Andrea M. Zanchettin, PhD Spring Semester, Introduction to Automatic Control & Linear systems (time domain) 1 AUTOMATIC CONTROL Andrea M. Zanchettin, PhD Spring Semester, 2018 Introduction to Automatic Control & Linear systems (time domain) 2 What is automatic control? From Wikipedia Control theory is an interdisciplinary

More information

ME 132, Dynamic Systems and Feedback. Class Notes. Spring Instructor: Prof. A Packard

ME 132, Dynamic Systems and Feedback. Class Notes. Spring Instructor: Prof. A Packard ME 132, Dynamic Systems and Feedback Class Notes by Andrew Packard, Kameshwar Poolla & Roberto Horowitz Spring 2005 Instructor: Prof. A Packard Department of Mechanical Engineering University of California

More information

Design Methods for Control Systems

Design Methods for Control Systems Design Methods for Control Systems Maarten Steinbuch TU/e Gjerrit Meinsma UT Dutch Institute of Systems and Control Winter term 2002-2003 Schedule November 25 MSt December 2 MSt Homework # 1 December 9

More information

The Rationale for Second Level Adaptation

The Rationale for Second Level Adaptation The Rationale for Second Level Adaptation Kumpati S. Narendra, Yu Wang and Wei Chen Center for Systems Science, Yale University arxiv:1510.04989v1 [cs.sy] 16 Oct 2015 Abstract Recently, a new approach

More information

1030 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 56, NO. 5, MAY 2011

1030 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 56, NO. 5, MAY 2011 1030 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 56, NO 5, MAY 2011 L L 2 Low-Gain Feedback: Their Properties, Characterizations Applications in Constrained Control Bin Zhou, Member, IEEE, Zongli Lin,

More information

Control of industrial robots. Centralized control

Control of industrial robots. Centralized control Control of industrial robots Centralized control Prof. Paolo Rocco (paolo.rocco@polimi.it) Politecnico di Milano ipartimento di Elettronica, Informazione e Bioingegneria Introduction Centralized control

More information

Every real system has uncertainties, which include system parametric uncertainties, unmodeled dynamics

Every real system has uncertainties, which include system parametric uncertainties, unmodeled dynamics Sensitivity Analysis of Disturbance Accommodating Control with Kalman Filter Estimation Jemin George and John L. Crassidis University at Buffalo, State University of New York, Amherst, NY, 14-44 The design

More information

High-Gain Observers in Nonlinear Feedback Control. Lecture # 3 Regulation

High-Gain Observers in Nonlinear Feedback Control. Lecture # 3 Regulation High-Gain Observers in Nonlinear Feedback Control Lecture # 3 Regulation High-Gain ObserversinNonlinear Feedback ControlLecture # 3Regulation p. 1/5 Internal Model Principle d r Servo- Stabilizing u y

More information

Chapter 13 Digital Control

Chapter 13 Digital Control Chapter 13 Digital Control Chapter 12 was concerned with building models for systems acting under digital control. We next turn to the question of control itself. Topics to be covered include: why one

More information

Chap 4. State-Space Solutions and

Chap 4. State-Space Solutions and Chap 4. State-Space Solutions and Realizations Outlines 1. Introduction 2. Solution of LTI State Equation 3. Equivalent State Equations 4. Realizations 5. Solution of Linear Time-Varying (LTV) Equations

More information

Decentralized Stabilization of Heterogeneous Linear Multi-Agent Systems

Decentralized Stabilization of Heterogeneous Linear Multi-Agent Systems 1 Decentralized Stabilization of Heterogeneous Linear Multi-Agent Systems Mauro Franceschelli, Andrea Gasparri, Alessandro Giua, and Giovanni Ulivi Abstract In this paper the formation stabilization problem

More information

Controls Problems for Qualifying Exam - Spring 2014

Controls Problems for Qualifying Exam - Spring 2014 Controls Problems for Qualifying Exam - Spring 2014 Problem 1 Consider the system block diagram given in Figure 1. Find the overall transfer function T(s) = C(s)/R(s). Note that this transfer function

More information

Dr Ian R. Manchester

Dr Ian R. Manchester Week Content Notes 1 Introduction 2 Frequency Domain Modelling 3 Transient Performance and the s-plane 4 Block Diagrams 5 Feedback System Characteristics Assign 1 Due 6 Root Locus 7 Root Locus 2 Assign

More information

Modeling and Analysis of Dynamic Systems

Modeling and Analysis of Dynamic Systems Modeling and Analysis of Dynamic Systems Dr. Guillaume Ducard Fall 2017 Institute for Dynamic Systems and Control ETH Zurich, Switzerland G. Ducard c 1 / 57 Outline 1 Lecture 13: Linear System - Stability

More information

Output Adaptive Model Reference Control of Linear Continuous State-Delay Plant

Output Adaptive Model Reference Control of Linear Continuous State-Delay Plant Output Adaptive Model Reference Control of Linear Continuous State-Delay Plant Boris M. Mirkin and Per-Olof Gutman Faculty of Agricultural Engineering Technion Israel Institute of Technology Haifa 3, Israel

More information

Simultaneous State and Fault Estimation for Descriptor Systems using an Augmented PD Observer

Simultaneous State and Fault Estimation for Descriptor Systems using an Augmented PD Observer Preprints of the 19th World Congress The International Federation of Automatic Control Simultaneous State and Fault Estimation for Descriptor Systems using an Augmented PD Observer Fengming Shi*, Ron J.

More information

Global Practical Output Regulation of a Class of Nonlinear Systems by Output Feedback

Global Practical Output Regulation of a Class of Nonlinear Systems by Output Feedback Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference 2005 Seville, Spain, December 2-5, 2005 ThB09.4 Global Practical Output Regulation of a Class of Nonlinear

More information

Output Regulation of Uncertain Nonlinear Systems with Nonlinear Exosystems

Output Regulation of Uncertain Nonlinear Systems with Nonlinear Exosystems Output Regulation of Uncertain Nonlinear Systems with Nonlinear Exosystems Zhengtao Ding Manchester School of Engineering, University of Manchester Oxford Road, Manchester M3 9PL, United Kingdom zhengtaoding@manacuk

More information

Control System Design

Control System Design ELEC4410 Control System Design Lecture 19: Feedback from Estimated States and Discrete-Time Control Design Julio H. Braslavsky julio@ee.newcastle.edu.au School of Electrical Engineering and Computer Science

More information

Nonlinear Observers. Jaime A. Moreno. Eléctrica y Computación Instituto de Ingeniería Universidad Nacional Autónoma de México

Nonlinear Observers. Jaime A. Moreno. Eléctrica y Computación Instituto de Ingeniería Universidad Nacional Autónoma de México Nonlinear Observers Jaime A. Moreno JMorenoP@ii.unam.mx Eléctrica y Computación Instituto de Ingeniería Universidad Nacional Autónoma de México XVI Congreso Latinoamericano de Control Automático October

More information

Contents. PART I METHODS AND CONCEPTS 2. Transfer Function Approach Frequency Domain Representations... 42

Contents. PART I METHODS AND CONCEPTS 2. Transfer Function Approach Frequency Domain Representations... 42 Contents Preface.............................................. xiii 1. Introduction......................................... 1 1.1 Continuous and Discrete Control Systems................. 4 1.2 Open-Loop

More information

Automatic Control 2. Loop shaping. Prof. Alberto Bemporad. University of Trento. Academic year

Automatic Control 2. Loop shaping. Prof. Alberto Bemporad. University of Trento. Academic year Automatic Control 2 Loop shaping Prof. Alberto Bemporad University of Trento Academic year 21-211 Prof. Alberto Bemporad (University of Trento) Automatic Control 2 Academic year 21-211 1 / 39 Feedback

More information

Analysis and Synthesis of Single-Input Single-Output Control Systems

Analysis and Synthesis of Single-Input Single-Output Control Systems Lino Guzzella Analysis and Synthesis of Single-Input Single-Output Control Systems l+kja» \Uja>)W2(ja»\ um Contents 1 Definitions and Problem Formulations 1 1.1 Introduction 1 1.2 Definitions 1 1.2.1 Systems

More information

Lecture 1: Feedback Control Loop

Lecture 1: Feedback Control Loop Lecture : Feedback Control Loop Loop Transfer function The standard feedback control system structure is depicted in Figure. This represend(t) n(t) r(t) e(t) u(t) v(t) η(t) y(t) F (s) C(s) P (s) Figure

More information

State Regulator. Advanced Control. design of controllers using pole placement and LQ design rules

State Regulator. Advanced Control. design of controllers using pole placement and LQ design rules Advanced Control State Regulator Scope design of controllers using pole placement and LQ design rules Keywords pole placement, optimal control, LQ regulator, weighting matrixes Prerequisites Contact state

More information

Control System Design

Control System Design ELEC ENG 4CL4: Control System Design Notes for Lecture #36 Dr. Ian C. Bruce Room: CRL-229 Phone ext.: 26984 Email: ibruce@mail.ece.mcmaster.ca Friday, April 4, 2003 3. Cascade Control Next we turn to an

More information

L 1 Adaptive Output Feedback Controller to Systems of Unknown

L 1 Adaptive Output Feedback Controller to Systems of Unknown Proceedings of the 27 American Control Conference Marriott Marquis Hotel at Times Square New York City, USA, July 11-13, 27 WeB1.1 L 1 Adaptive Output Feedback Controller to Systems of Unknown Dimension

More information

Control Systems. Root Locus & Pole Assignment. L. Lanari

Control Systems. Root Locus & Pole Assignment. L. Lanari Control Systems Root Locus & Pole Assignment L. Lanari Outline root-locus definition main rules for hand plotting root locus as a design tool other use of the root locus pole assignment Lanari: CS - Root

More information

4.0 Update Algorithms For Linear Closed-Loop Systems

4.0 Update Algorithms For Linear Closed-Loop Systems 4. Update Algorithms For Linear Closed-Loop Systems A controller design methodology has been developed that combines an adaptive finite impulse response (FIR) filter with feedback. FIR filters are used

More information

AS A POPULAR approach for compensating external

AS A POPULAR approach for compensating external IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, VOL. 16, NO. 1, JANUARY 2008 137 A Novel Robust Nonlinear Motion Controller With Disturbance Observer Zi-Jiang Yang, Hiroshi Tsubakihara, Shunshoku Kanae,

More information

Control of Electromechanical Systems

Control of Electromechanical Systems Control of Electromechanical Systems November 3, 27 Exercise Consider the feedback control scheme of the motor speed ω in Fig., where the torque actuation includes a time constant τ A =. s and a disturbance

More information

Control of Mobile Robots

Control of Mobile Robots Control of Mobile Robots Regulation and trajectory tracking Prof. Luca Bascetta (luca.bascetta@polimi.it) Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria Organization and

More information

BIBO STABILITY AND ASYMPTOTIC STABILITY

BIBO STABILITY AND ASYMPTOTIC STABILITY BIBO STABILITY AND ASYMPTOTIC STABILITY FRANCESCO NORI Abstract. In this report with discuss the concepts of bounded-input boundedoutput stability (BIBO) and of Lyapunov stability. Examples are given to

More information

CONTROL SYSTEMS ENGINEERING Sixth Edition International Student Version

CONTROL SYSTEMS ENGINEERING Sixth Edition International Student Version CONTROL SYSTEMS ENGINEERING Sixth Edition International Student Version Norman S. Nise California State Polytechnic University, Pomona John Wiley fir Sons, Inc. Contents PREFACE, vii 1. INTRODUCTION, 1

More information

Observer-based sampled-data controller of linear system for the wave energy converter

Observer-based sampled-data controller of linear system for the wave energy converter International Journal of Fuzzy Logic and Intelligent Systems, vol. 11, no. 4, December 211, pp. 275-279 http://dx.doi.org/1.5391/ijfis.211.11.4.275 Observer-based sampled-data controller of linear system

More information

Aircraft Stability & Control

Aircraft Stability & Control Aircraft Stability & Control Textbook Automatic control of Aircraft and missiles 2 nd Edition by John H Blakelock References Aircraft Dynamics and Automatic Control - McRuler & Ashkenas Aerodynamics, Aeronautics

More information

Variable-gain output feedback control

Variable-gain output feedback control 7. Variable-gain output feedback control 7.1. Introduction PUC-Rio - Certificação Digital Nº 611865/CA In designing control laws, the usual first step is to describe the plant at a given operating point

More information

ECE317 : Feedback and Control

ECE317 : Feedback and Control ECE317 : Feedback and Control Lecture : Routh-Hurwitz stability criterion Examples Dr. Richard Tymerski Dept. of Electrical and Computer Engineering Portland State University 1 Course roadmap Modeling

More information

Dr Ian R. Manchester Dr Ian R. Manchester AMME 3500 : Root Locus

Dr Ian R. Manchester Dr Ian R. Manchester AMME 3500 : Root Locus Week Content Notes 1 Introduction 2 Frequency Domain Modelling 3 Transient Performance and the s-plane 4 Block Diagrams 5 Feedback System Characteristics Assign 1 Due 6 Root Locus 7 Root Locus 2 Assign

More information

ADAPTIVE control of uncertain time-varying plants is a

ADAPTIVE control of uncertain time-varying plants is a IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 56, NO. 1, JANUARY 2011 27 Supervisory Control of Uncertain Linear Time-Varying Systems Linh Vu, Member, IEEE, Daniel Liberzon, Senior Member, IEEE Abstract

More information

Lyapunov Stability Theory

Lyapunov Stability Theory Lyapunov Stability Theory Peter Al Hokayem and Eduardo Gallestey March 16, 2015 1 Introduction In this lecture we consider the stability of equilibrium points of autonomous nonlinear systems, both in continuous

More information

Small Gain Theorems on Input-to-Output Stability

Small Gain Theorems on Input-to-Output Stability Small Gain Theorems on Input-to-Output Stability Zhong-Ping Jiang Yuan Wang. Dept. of Electrical & Computer Engineering Polytechnic University Brooklyn, NY 11201, U.S.A. zjiang@control.poly.edu Dept. of

More information

Stability of Feedback Control Systems: Absolute and Relative

Stability of Feedback Control Systems: Absolute and Relative Stability of Feedback Control Systems: Absolute and Relative Dr. Kevin Craig Greenheck Chair in Engineering Design & Professor of Mechanical Engineering Marquette University Stability: Absolute and Relative

More information

Robust discrete time control

Robust discrete time control Robust discrete time control I.D. Landau Emeritus Research Director at C.N.R. Laboratoire d utomatique de Grenoble, INPG/CNR, France pril 2004, Valencia I.D. Landau course on robust discrete time control,

More information

Feedback Control of Dynamic Systems

Feedback Control of Dynamic Systems THIRD EDITION Feedback Control of Dynamic Systems Gene F. Franklin Stanford University J. David Powell Stanford University Abbas Emami-Naeini Integrated Systems, Inc. TT Addison-Wesley Publishing Company

More information

NOWADAYS, many control applications have some control

NOWADAYS, many control applications have some control 1650 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 49, NO 10, OCTOBER 2004 Input Output Stability Properties of Networked Control Systems D Nešić, Senior Member, IEEE, A R Teel, Fellow, IEEE Abstract Results

More information

2006 Fall. G(s) y = Cx + Du

2006 Fall. G(s) y = Cx + Du 1 Class Handout: Chapter 7 Frequency Domain Analysis of Feedback Systems 2006 Fall Frequency domain analysis of a dynamic system is very useful because it provides much physical insight, has graphical

More information

Theory in Model Predictive Control :" Constraint Satisfaction and Stability!

Theory in Model Predictive Control : Constraint Satisfaction and Stability! Theory in Model Predictive Control :" Constraint Satisfaction and Stability Colin Jones, Melanie Zeilinger Automatic Control Laboratory, EPFL Example: Cessna Citation Aircraft Linearized continuous-time

More information

MEM 355 Performance Enhancement of Dynamical Systems

MEM 355 Performance Enhancement of Dynamical Systems MEM 355 Performance Enhancement of Dynamical Systems Frequency Domain Design Intro Harry G. Kwatny Department of Mechanical Engineering & Mechanics Drexel University /5/27 Outline Closed Loop Transfer

More information