Professional Documents
Culture Documents
An Overview of SI
An Overview of SI
Abstract
This paper provides an overview of the state of the art of subspace identification methods for both open-loop and closed-loop systems. Practical
considerations and future directions are given at the end of the paper.
2006 Elsevier Ltd. All rights reserved.
Keywords: Subspace identification; Closed-loop identification; Overview; State space models; Causal model; Practice
1. Introduction
Subspace identification methods (SIM) have enjoyed tremendous development in the last 15 years in both theory and practice.
SIMs offer an attractive alternative to input-output methods due
to simple and general parametrization for MIMO systems (there
is no linear input-output parametrization that is general enough
for all linear MIMO systems, see (Katayama, 2005)). Most SIMs
fall into the unifying theorem proposed by van Overschee and de
Moor (1995), among which are canonical variate analysis (CVA)
(Larimore, 1990), N4SID (van Overschee & de Moor, 1994),
subspace splitting (Jansson & Wahlberg, 1996), and MOESP
(Verhaegen & Dewilde, 1992). Based on the unifying theorem,
all these algorithms can be interpreted as a singular value decomposition of a weighted matrix. The statistical properties such
as consistency and efficiency have been investigated recently
(Bauer, 2003; Bauer & Ljung, 2002; Gustafsson, 2002; Jansson
& Wahlberg, 1998; Knudsen, 2001).
The closed-loop identification is of special interest for a large
number of engineering applications. For safety reasons or quality
restrictions, it is desirable that identification experiments are carried out under the closed-loop or partial closed-loop condition.
As pointed out by many researchers (Ljung, 1999; Soderstrom
& Stoica, 1989), the fundamental problem with closed-loop data
is the correlation between the unmeasurable noise and the input.
This is true for traditional closed-loop identification approaches
0098-1354/$ see front matter 2006 Elsevier Ltd. All rights reserved.
doi:10.1016/j.compchemeng.2006.05.045
1503
(1a)
yk = Cxk + Duk + vk
(1b)
C
D
D
CAK
f =
; Df =
.
..
..
f 1
D
CAK
0
0
...
0
0
...
0
CBK
f =
G
..
..
..
..
.
.
.
.
f 2
f 3
CAK BK CAK BK . . . CBK
(2)
(3a)
yk = Cxk + Duk + ek
(3b)
(4a)
yk = Cxk + Duk + ek
(4b)
(5)
where the overbar means that the matrix is composed of parameters of the predictor form.
The input and output are arranged in the following form:
yk
y
k+1
yf (k) =
(6a)
..
.
yk+f 1
zk
z
k+1
zf 1 (k) = .
..
zk+f 2
(6b)
(7)
where
p = BK
L
A K BK
zp (k) = zTk1
zTk2
...
p1
AK BK
...
zTkp
(8a)
(8b)
(9)
1504
p1
CBK
CAK BK . . .
CAK BK
p
CAK BK
CA2K BK . . .
CAK BK
fp f L
p =
H
..
..
..
.
.
...
.
f 1
CAK BK
CAK BK
...
f +p2
CAK
BK
(10)
2.2. Assumptions
can be built by collecting data for input and output variables and
forming the data matrices
i=1
i=1
= YXT (XXT )1
X = XT (XXT )
Y = Y Y = Y (I X ) = YX
where
1
X
= I X = I XT (XXT )
XX = XXT (XXT )
X=X
1
XX
= X(I XT (XXT )
X) = X X = 0
(14)
AiK qi
Defining
yk = C(qI AK )1 BK zk + Duk + ek
J = ||Y X||2F ,
= YXT (XXT )1 X
Y = X
E(ei eTj ) = Re ij
(13)
1
1
VU T = [ v(1), . . . , v(N) ]
N
N
0 as N
[ u(1),
...,
u(N) ]
we have
1
1
YU = V (I U T (UU T ) U) = V VU T (UU T ) U
1
1
1
T
T
VU
UU
U V as N
=V
N
N
Therefore,
Hf =
CB
..
.
D
..
.
...
..
.
0
..
.
CAf 2 B
CAf 3 B
CK
..
.
I
..
.
...
..
.
..
CAf 2 K
CAf 3 K
Gf =
The early developments of SIMs are applicable to openloop identification where the input data are assumed independent of past noise, which admits no feedback. These methods
include N4SID, MOESP and the CVA method without the preestimation step.
Based on the innovation form in (3), an extended state space
model can be formulated as
(16)
(18a)
(18b)
uk+1
uk+N1
uk
u
uk+2 . . .
uk+N
k+1
Uf =
(19a)
..
..
..
..
.
.
.
.
uk+f 1 uk+f uk+f +N2
Uf = [ uf (k) uf (k + 1)
...
uf (k + N 1) ]
(19b)
xk+1 , . . . , xk+N1 ]
(20)
p Zp + AK Xkp
Xk = L
(21)
Yf = f Xk + Hf Uf + Gf Ef
C
CA
(17)
f =
..
.
CAf 1
YU = (X + HU + V )U = XU + V
1
= YU XT (XU XT )
1505
(22)
as
N ,
(23)
1506
or
Ef Uf
= Ef (I
1
UfT (Uf UfT ) Uf )
= Ef
as
(24)
The above two relations (23) and (24) are very useful in openloop SIMs.
The open-loop SIMs do not involve a pre-estimation step.
Most of them involve only three major steps: projection or
regression, model reduction, and parameter estimation. We will
summarize each step in the following subsections.
In
the
above
1/2
(Zp Uf ZpT )
.
1/2
Wr = (Yf Uf YfT )
equation
Wc =
and Zp Uf .
3.1.1. N4SID
Open-loop SIMs such as the N4SID (Overschee & Moor,
1994) first eliminate Uf by post-multiplying Uf on (22),
Yf Uf = Hfp Zp Uf + Hf Uf Uf + Gf Ef Uf
= Hfp Zp Uf + Gf Ef
Then the noise term is removed by multiplying
result of (24),
(25)
ZpT
from the
(27)
1/2
p Zp = USV T Un Sn VnT
fp Zp =
H
fL
f = W11 Un Sn1/2 .
and
T
T 1
fp = Yf Uf
H
Zp (Zp Uf
Zp )
(26)
propose a few methods to exclude these extra terms. Specifically, they recommend a two-step procedure: (i) use a conventional (unconstrained) SIM to estimate the deterministic Markov
parameters CAi1 B; and (ii) form Hf with these Markov parameters to ensure that it is lower triangular and then estimate the
extended observability matrix. Qin and Ljung (2003a), Qin et al.
(2005) propose a causal subspace identification method (PARSIM) which remove these non-causal terms by performing f least
squares projections in parallel. To accomplish this we partition
the extended state space model row-wise as follows:
Yf 1
Y
f2
Yf =
.. ;
.
Yf 1
Y
f2
Yi
.. ;
.
Yff
i = 1, 2, . . . , f
(28)
Yfi
f 1
1/2
ZT )
W2 = (Zp Uf
p
...
CB
D]
(29b)
Gfi [ CAi2 K
...
CK
I]
(29c)
= f (ny + 1 : ny f, :)
Hfi [ CAi2 B
= f 1 A
Therefore,
= 2:f
A
f 1 f
The estimate of C is simply
= f (1 : ny , :).
C
p Zp + Hfi Ui + Gfi Ei
Yfi = fi L
4.2. Estimation of K
(30)
for i = 1, 2, . . ., f. Note that each of the above equations is guaranteed causal. Now we have the following parallel PARSIM
algorithm.
(34)
ff
We choose
f = W11 Un Sn1/2
2:f
(29a)
(33)
f2
f =
..
.
1507
1/2
and W1 f is chosen a Un Sn ,
W = S 1/2 V T
L
p 2
n
n
p
fi L
fi = Yfi
H
Zp
Ui
Therefore,
(31)
fi L
f 1L
p
f 2 Lp
. = f Lp
..
p
ff L
(32)
= S 1/2 V T W 1
L
p
n
n
2
p is the extended controllability matrix of the predicNote that L
and C
from f , we can extract
tor. Similar to the extraction of A
K and [ B
K K
].
A
Another approach to estimating K is to extract it from Gf (Qin
et al., 2005).
From (22) we have
Y f
Zp
Uf
= Gf E f
Zp
Uf
= G f Ef
(35)
1508
R11
Q1
Zp
(36)
Q2
Uf = R21 R22
Yf
R31 R32 R33
Q3
R33 Q3 = Gf Ef
or
Gf Ef = Gf Ef
where
(38)
...
CKF
..
.
F
..
.
...
..
.
CAf 2 KF
CAf 3 KF
(37)
ny f ny f
...
(46)
using ek = Fek where ek has an identity covariance matrix, and
defining
y k = F 1 [I C(qI AK )1 K]yk
(47a)
G(q) = F 1 C(qI AK )1
(47b)
D = F 1 D
(47c)
we obtain,
y k = G(q)BK uk + D uk + G(q)x0 k + ek
From Eqs. (37) and (38) and using the fact that Q3 is an orthonormal matrix, we choose
f = Q3
E
(39a)
f = R33
G
(39b)
Gf 1
(45)
yk = [I C(qI AK )1 K]yk
then
Gf
F
CKF
..
.
Iny
f 1
F
KF
(40)
(49a)
=B
K + KD
(49b)
CAf 2 KF
KF and F can be estimated as
F
Iny
0
=
Gf 1
0 f 1
KF
(48)
z (k)
x k L
p p
From (3) we obtain
Finally,
)F 1
= (KF
K
(42)
[C
N
] = arg min
D
yk [ C
k=1
and
e = F F T
R
= yk [ C
(43)
4.3. Determination of B, D
Qin et al. (2005) give an optimal approach to estimate B
and D and the initial state using A, C, K and F for the general
innovation form. Since the initial state is estimated this step does
not introduce a bias for finite p.
From the innovation form of the system we have:
xk+1 = AK xk + BK uk + Kyk
(44)
[A
]
D
x k
2
x k
D]
e k
uk
u k
N
K ] = arg min
xk [ A
k=1
2
x k
K ] uk
e k
For more detail see (Ljung & McKelvey, 1996; Overschee &
Moor, 1994), and (Chiuso & Picci, 2005).
As one can see from the above illustration, two major paths
for open-loop SIMs are to use the estimates of f or xk to further
1509
(50)
where
i2 K
G
fi = [ CA
...
CK ].
(51)
(52)
1510
fi = [ CAi2 BK
G
K
zi1 (k) = [ zTk
CAi3
K BK
zTk+1
...
...
CBK ],
T
zTk+i2 ] ,
for
(53)
(54)
The controller is
F (q) =
1511
1512
1513
Peternell, K., Scherrer, W., & Deistler, M. (1996). Statistical analysis of novel
subspace identification methods. Signal Processing, 52, 161177.
Phan, M., Horta, L. G., Juang, J. -N., & Longman, R. W. (1992). Improvement
of observer/kalman filter identification (OKID) by residual whitening, In
AIAA Guidance, Navigation and Control Conference, Hilton Head, South
Carolina.
Qin, S. J., & Ljung, L. (2003a) Parallel QR implementation of subspace identification with parsimonious models, In IFAC Symposium on System Identication.
Qin, S. J., & Ljung, L. (2003b). Closed-loop subspace identification with innovation estimation. In Proceedings of the 13th IFAC SYSID Symposium (pp.
887892).
Qin, S. J., Lin, W., & Ljung, L. (2005), A novel subspace identification approach
with enforced causal models, Automatica, 41, 20432053.
Qin, S. J., & Ljung, L. (2006). On the role of future horizon in closed-loop
subspace identication. Accepted by the 14th IFAC Symposium on System
Identification.
Shi, R. (2001). Subspace identication methods for dynamic process modeling,
Ph.D. dissertation, MacMaster University.
Shi, R., & MacGregor, J. F. (2001). A framework for subspace identification
methods. In Proceeding of ACC (pp. 36783683).
Soderstrom, T., & Stoica, P. (1989). System identication. London: PrenticeHall.
van Overschee, P., & de Moor, B. (1994). N4SID: Subspace algorithms for the
identification of combined deterministic-stochastic systems. Automatica, 30,
7593.
van Overschee, P. & de Moor, B. (1997). Closed-loop subspace system identification. In Proceedings of the 36th Conference on Decision and Control,
1997. pp. 18481853.
Verhaegen, M. (1993). Application of a subspace model identification technique to identify LTI systems operating on closed-loop. Automatica, 29,
10271040.
Verhaegen, M. (1994). Identification of the deterministic part of MIMO state
space models given in innovations form from input-output data. Automatica,
30(1), 6174.
Verhaegen, M., & Dewilde, P. (1992). Subspace model identification, part i: The
output-error state-space model identification class of algorithms. International Journal of Control, 56, 11871210.
Wang, J., & Qin, S. J. (2002). A new subspace identification approach based on
principal component analysis. Journal of Process Control, 12, 841855.
Zhao, H., & Harmse, M. (2006). Subspace identication in industrial APC
application-a review of recent process and industrial experience. Accepted
by the 14th IFAC Symposium on System Identification, 2006.
Zhu, Y. (1998). Multivariable process identification for mpc: the asymptotic
method and its applications. Journal of Process Control, 8, 101115.
Zhu, Y., & Van Den Bosch, P. P. J. (2000). Optimal closed-loop identification
test design for internal model control. Automatica, 36, 12371241.