File Download
 
Links for fulltext
(May Require Subscription)
 
Supplementary

Article: Passivity enforcement for descriptor systems via matrix pencil perturbation
  • Basic View
  • Metadata View
  • XML View
TitlePassivity enforcement for descriptor systems via matrix pencil perturbation
 
AuthorsWang, Y3
Zhang, Z1
Koh, CK4
Shi, G2
Pang, GKH1
Wong, N1
 
KeywordsDescriptor System
Immittance Representation
Passivity Enforcement
Regular System
Scattering Representation
Symmetric Systems
 
Issue Date2012
 
PublisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=43
 
CitationIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2012, v. 31 n. 4, p. 532-545 [How to Cite?]
DOI: http://dx.doi.org/10.1109/TCAD.2011.2174638
 
AbstractPassivity is an important property of circuits and systems to guarantee stable global simulation. Nonetheless, nonpassive models may result from passive underlying structures due to numerical or measurement error/inaccuracy. A postprocessing passivity enforcement algorithm is therefore desirable to perturb the model to be passive under a controlled error. However, previous literature only reports such passivity enforcement algorithms for pole-residue models and regular systems (RSs). In this paper, passivity enforcement algorithms for descriptor systems (DSs, a superset of RSs) with possibly singular direct term (specifically, D+D T or I-DD T) are proposed. The proposed algorithms cover all kinds of state-space models (RSs or DSs, with direct terms being singular or nonsingular, in the immittance or scattering representation) and thus have a much wider application scope than existing algorithms. The passivity enforcement is reduced to two standard optimization problems that can be solved efficiently. The objective functions in both optimization problems are the error functions, hence perturbed models with adequate accuracy can be obtained. Numerical examples then verify the efficiency and robustness of the proposed algorithms. © 2012 IEEE.
 
ISSN0278-0070
2013 Impact Factor: 1.203
2013 SCImago Journal Rankings: 0.770
 
DOIhttp://dx.doi.org/10.1109/TCAD.2011.2174638
 
ISI Accession Number IDWOS:000302177200007
Funding AgencyGrant Number
Hong Kong Research Grants Council718509E
Funding Information:

Manuscript received March 7, 2011; revised August 22, 2011; accepted October 18, 2011. Date of current version March 21, 2012. This work was supported in part by the Hong Kong Research Grants Council, under the General Research Fund 718509E. This paper was recommended by Associate Editor J. R. Phillips.

 
ReferencesReferences in Scopus
 
DC FieldValue
dc.contributor.authorWang, Y
 
dc.contributor.authorZhang, Z
 
dc.contributor.authorKoh, CK
 
dc.contributor.authorShi, G
 
dc.contributor.authorPang, GKH
 
dc.contributor.authorWong, N
 
dc.date.accessioned2012-08-08T08:35:08Z
 
dc.date.available2012-08-08T08:35:08Z
 
dc.date.issued2012
 
dc.description.abstractPassivity is an important property of circuits and systems to guarantee stable global simulation. Nonetheless, nonpassive models may result from passive underlying structures due to numerical or measurement error/inaccuracy. A postprocessing passivity enforcement algorithm is therefore desirable to perturb the model to be passive under a controlled error. However, previous literature only reports such passivity enforcement algorithms for pole-residue models and regular systems (RSs). In this paper, passivity enforcement algorithms for descriptor systems (DSs, a superset of RSs) with possibly singular direct term (specifically, D+D T or I-DD T) are proposed. The proposed algorithms cover all kinds of state-space models (RSs or DSs, with direct terms being singular or nonsingular, in the immittance or scattering representation) and thus have a much wider application scope than existing algorithms. The passivity enforcement is reduced to two standard optimization problems that can be solved efficiently. The objective functions in both optimization problems are the error functions, hence perturbed models with adequate accuracy can be obtained. Numerical examples then verify the efficiency and robustness of the proposed algorithms. © 2012 IEEE.
 
dc.description.naturepublished_or_final_version
 
dc.identifier.citationIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2012, v. 31 n. 4, p. 532-545 [How to Cite?]
DOI: http://dx.doi.org/10.1109/TCAD.2011.2174638
 
dc.identifier.doihttp://dx.doi.org/10.1109/TCAD.2011.2174638
 
dc.identifier.epage545
 
dc.identifier.hkuros209037
 
dc.identifier.hkuros210678
 
dc.identifier.isiWOS:000302177200007
Funding AgencyGrant Number
Hong Kong Research Grants Council718509E
Funding Information:

Manuscript received March 7, 2011; revised August 22, 2011; accepted October 18, 2011. Date of current version March 21, 2012. This work was supported in part by the Hong Kong Research Grants Council, under the General Research Fund 718509E. This paper was recommended by Associate Editor J. R. Phillips.

 
dc.identifier.issn0278-0070
2013 Impact Factor: 1.203
2013 SCImago Journal Rankings: 0.770
 
dc.identifier.issue4
 
dc.identifier.scopuseid_2-s2.0-84859077286
 
dc.identifier.spage532
 
dc.identifier.urihttp://hdl.handle.net/10722/155743
 
dc.identifier.volume31
 
dc.languageeng
 
dc.publisherIEEE. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=43
 
dc.publisher.placeUnited States
 
dc.relation.ispartofIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
 
dc.relation.referencesReferences in Scopus
 
dc.rightsIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. Copyright © IEEE
 
dc.rights©2012 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.
 
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License
 
dc.subjectDescriptor System
 
dc.subjectImmittance Representation
 
dc.subjectPassivity Enforcement
 
dc.subjectRegular System
 
dc.subjectScattering Representation
 
dc.subjectSymmetric Systems
 
dc.titlePassivity enforcement for descriptor systems via matrix pencil perturbation
 
dc.typeArticle
 
<?xml encoding="utf-8" version="1.0"?>
<item><contributor.author>Wang, Y</contributor.author>
<contributor.author>Zhang, Z</contributor.author>
<contributor.author>Koh, CK</contributor.author>
<contributor.author>Shi, G</contributor.author>
<contributor.author>Pang, GKH</contributor.author>
<contributor.author>Wong, N</contributor.author>
<date.accessioned>2012-08-08T08:35:08Z</date.accessioned>
<date.available>2012-08-08T08:35:08Z</date.available>
<date.issued>2012</date.issued>
<identifier.citation>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2012, v. 31 n. 4, p. 532-545</identifier.citation>
<identifier.issn>0278-0070</identifier.issn>
<identifier.uri>http://hdl.handle.net/10722/155743</identifier.uri>
<description.abstract>Passivity is an important property of circuits and systems to guarantee stable global simulation. Nonetheless, nonpassive models may result from passive underlying structures due to numerical or measurement error/inaccuracy. A postprocessing passivity enforcement algorithm is therefore desirable to perturb the model to be passive under a controlled error. However, previous literature only reports such passivity enforcement algorithms for pole-residue models and regular systems (RSs). In this paper, passivity enforcement algorithms for descriptor systems (DSs, a superset of RSs) with possibly singular direct term (specifically, D+D T or I-DD T) are proposed. The proposed algorithms cover all kinds of state-space models (RSs or DSs, with direct terms being singular or nonsingular, in the immittance or scattering representation) and thus have a much wider application scope than existing algorithms. The passivity enforcement is reduced to two standard optimization problems that can be solved efficiently. The objective functions in both optimization problems are the error functions, hence perturbed models with adequate accuracy can be obtained. Numerical examples then verify the efficiency and robustness of the proposed algorithms. &#169; 2012 IEEE.</description.abstract>
<language>eng</language>
<publisher>IEEE. The Journal&apos;s web site is located at http://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=43</publisher>
<relation.ispartof>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems</relation.ispartof>
<rights>IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. Copyright &#169; IEEE</rights>
<rights>&#169;2012 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.</rights>
<rights>Creative Commons: Attribution 3.0 Hong Kong License</rights>
<subject>Descriptor System</subject>
<subject>Immittance Representation</subject>
<subject>Passivity Enforcement</subject>
<subject>Regular System</subject>
<subject>Scattering Representation</subject>
<subject>Symmetric Systems</subject>
<title>Passivity enforcement for descriptor systems via matrix pencil perturbation</title>
<type>Article</type>
<description.nature>published_or_final_version</description.nature>
<identifier.doi>10.1109/TCAD.2011.2174638</identifier.doi>
<identifier.scopus>eid_2-s2.0-84859077286</identifier.scopus>
<identifier.hkuros>209037</identifier.hkuros>
<identifier.hkuros>210678</identifier.hkuros>
<relation.references>http://www.scopus.com/mlt/select.url?eid=2-s2.0-84859077286&amp;selection=ref&amp;src=s&amp;origin=recordpage</relation.references>
<identifier.volume>31</identifier.volume>
<identifier.issue>4</identifier.issue>
<identifier.spage>532</identifier.spage>
<identifier.epage>545</identifier.epage>
<identifier.isi>WOS:000302177200007</identifier.isi>
<publisher.place>United States</publisher.place>
<bitstream.url>http://hub.hku.hk/bitstream/10722/155743/1/Content.pdf</bitstream.url>
</item>
Author Affiliations
  1. The University of Hong Kong
  2. Shanghai Jiaotong University
  3. Carnegie Mellon University
  4. Purdue University