On Disturbance Propagation in Leader–Follower Systems with Limited Leader Information Yingbo Zhao, Paolo Minero, and Vijay Gupta Department of Electrical Engineering, University of Notre Dame, Notre Dame, IN-46556, USA.

Abstract This paper studies the problem of disturbance propagation in a string of vehicles aiming to proceed along a given trajectory while keeping a constant distance between each vehicle and its successor. It is assumed that each vehicle can control its position based on the spacing error with respect to the preceding vehicle in the string, as well as on coded information transmitted by the lead vehicle. Using information–theoretic techniques, this paper establishes a lower bound to the integral of the sensitivity function of spacing errors with respect to a stochastic disturbance acting on the lead vehicle. The derived bound depends on the open-loop poles and zeros of the vehicles’ dynamics as well as on the (possibly non-linear) controller used at each vehicle. The lower bound is shown to be tight for a specific class of systems and controllers. Key words: Bode integral formula; Distributed control; Disturbance rejection; Information theory.

1

Introduction

There has recently been extensive interest in formation control problems, where the objective is to arrange a large number of autonomous agents in a predefined geometric structure while ensuring that the agents as a group achieve a predefined task [2, 11, 16, 18]. The simplest example is controlling a one dimensional string of vehicles that has to move along a given trajectory while keeping constant spacing between any two consecutive vehicles. This problem arises, for instance, in the design of automated highway systems [8, 9].

each vehicle is additionally given access to position information about the lead vehicle.

It is known that the control performance when strings of vehicles are being controlled in a distributed fashion depends on the amount of information available to each vehicle. In [18], it is shown that a predecessor–following control strategy, in which each vehicle has access to only its relative position with respect to the preceding vehicle, can cause error amplification along the string, eventually leading to string instability. This undesirable effect can be prevented under the predecessor–leader control strategy [20, 23, 29], wherein

In this paper, we consider the formation control problem of a string of vehicles under the assumption that each vehicle has access to (i) its spacing error relative to the preceding vehicle, and (ii) limited information about the string leader, which is communicated from the leader to the other vehicles over capacity-limited side communication channels (see Fig. 1). The classical predecessor–following control strategy is recovered in the special case where the side channels have capacity zero, since no information can then be transmitted from the leader to the followers through such channels. On the other hand, the predecessor–leader control strategy, in which the followers have perfect and instantaneous leader position information, can be recovered by assuming that the side channels have infinite capacity. Given this setup, we study the sensitivity of the spacing errors along the string with respect to a stochastic disturbance acting on the lead vehicle and how this sensitivity changes as a function of the capacities of the side channels.

⋆ Corresponding author V. Gupta. Research supported in part by the National Science Foundation under grants 1117728 and 0846631. Email addresses: [email protected] (Yingbo Zhao), [email protected] (Paolo Minero), [email protected] (Vijay Gupta).

To deal with the stochasticity of the disturbance process and the presence of communication channels, we follow the information-theoretic approach of Martins et al. [14]. One of the most appealing features of this informationtheoretic approach is that it permits the consideration of nonlinear controllers, unlike the traditional approach

Preprint submitted to Automatica

24 October 2013

distributed control problem. As the literature on networked control systems demonstrates, even centralized control when information available to the controller is transmitted across communication channels displays a rich and non-obvious behavior. Although there has been some recent work on stabilizability of distributed systems (e.g., [15, 27]), performance guarantees in distributed systems remain hard to obtain.

based on transfer functions which only applies to linear time invariant controllers. An additional advantage is that it allows us to directly relate the sensitivity to the Shannon capacities of the communication channels. The main contribution of this paper is a lower bound on the integral of the sensitivity function of the spacing error at each vehicle with respect to the stochastic disturbance acting on the lead vehicle (see Theorem 1). This bound holds for a class of nonlinear controllers that includes, in particular, all linear time invariant (LTI) controllers. A specific class of systems and controllers for which the lower bound is tight is provided (see Proposition 1). When there is only one vehicle in the string, our bound recovers the disturbance propagation result in [14]. Assuming instead that all side channels have zero capacity, our result recovers a previous bound derived in [30] under the predecessor–following control strategy. Unlike the bounds presented in [25, 26], our results do not assume specific plant dynamics.

The rest of the paper is organized as follows. The problem formulation is stated in Section 2. Section 3 is devoted to the main result of the paper, whose proof is provided in Section 4. Section 5 focuses on the case of linear controllers and provides some examples where the derived lower bound is tight. Section 6 concludes the paper. Throughout the paper, we denote random variables using boldface letters. For any k ≤ j we use the notation xjk = x(k), x(k + 1), . . . , x(j) to denote a finite segment of a sequence x(0), x(1), . . . and we omit the subscript k when it is equal to 0.

We remark that the performance metric used in this paper is complementary to the H∞ –type metric considered in [1, 16, 18], which characterizes the worst case performance in the sense of measuring the peak magnitude of the frequency response of the transfer function from the disturbance to the spacing error. The metric under consideration, instead, reflects the average disturbance rejection performance over all frequencies. Similarly to Bode’s integral formula for single-input single-output (SISO) systems, our metric shows that there is a fundamental limit on how the error sensitivity can be shaped in frequency.

2

Problem formulation

Consider a string of n+1 coupled SISO systems as shown in Fig. 1. The dynamics of the i-th plant, i = 0, . . . , n, is given by xi (k) =Ai xi (k − 1) + Bi ui (k − 1) yi (k) =Ci xi (k),

(1)

where xi (k) ∈ Rni is the system state, yi (k) ∈ R is the system output, ui (k) ∈ R is the control input, (Ai , Bi ) is controllable and (Ai , Ci ) is observable. The initial conditions xi (0)’s are assumed to be continuous random variables. Vehicle 0 (also called the leader or the lead vehicle) aims at tracking a reference command signal r(k), while the objective of vehicles 1, . . . , n (referred to as the followers) is to maintain a constant distance from their predecessor. Specifically, given a constant spacing δ, the i-th vehicle (i ≥ 1) regulates its output yi (k) to satisfy yi (k) − yi−1 (k) = δ at every time step k. We define the spacing errors between successive vehicles as

Next, we wish to mention a few additional related works in the literature. Barooah et al. [1] studied the problem of string stability when each vehicle has access to the spacing error with respect to the predecessor as well as the follower in the string, while [16] considered the case where each vehicle has access to the position of vehicles within a given communication range. Hao et al. [7] considered a general grid–like network structure and investigated the network stability as the number of nodes in the network grows as a function of the amount of information available to each node in the grid. Unlike any of these existing works, this paper considers the case where information is transmitted over finite capacity channels. We would also like to mention the work in [12] that considered the design of feedback gains to minimize in H2 sense the influence of the stochastic disturbance on the performance output for a vehicle string. However, the dynamics and controller structure were constrained to obtain a tractable problem. Performance limitations similar to Bode’s integral formula have been derived for more general control settings [3, 19], including multidimensional [6], nonlinear [13, 21, 28] and time-varying systems [10]. This work generalizes Bode’s formula to a specific

ei (k) = yi−1 (k) − yi (k) + δ,

i = 1, . . . , n.

(2)

We assume that every vehicle with index i ≥ 2 has access to the tracking error ei and, possibly, to information transmitted from the leader over a side communication channel. Formally, the side channel that carries information to the i-th vehicle consists of an input set Xˆi , an output set Yˆi , and a family of transition probability mass functions p(ˆ yi |ˆ xi ), one for each

2

E2

E3

C2 d

r e0

x0 K0

u0

y0 P0

δ e1

x1 K0

u1

δ e2

y1 P1

C3 x2

K2

u2

y2 P2

δ e3

x3 K3

u3

y3 P3

...

Fig. 1. A vehicle string system where a stochastic disturbance d affects the string leader. For every i, Pi and Ki denote the plant and controller, respectively, of the i-th vehicle in the string.

x ˆi ∈ Xˆi . We assume that the channel is memoryless [5] and has Shannon capacity equal to Ci [4].

Thus, vi can be interpreted as the input-output delay introduced by the i-th plant.

At time k, encoder Ei maps y0k into a symbol x ˆi (k) ∈ ˆ i which is transmitted to the i-th vehicle over the iX th communication channel. The controller of the i-th vehicle uses the spacing error eki and the channel output y ˆik to generate a control signal of the form

Suppose that the reference signal r(k) is perturbed by a stochastic disturbance process d, as depicted in Fig. 1, such that the error signal at the input of the leader’s controller at time k is given by e0 (k) = r(k) + d(k) − y0 (k).

 ui (k) = ui,k y ˆik , eki .

(6)

(3) Because of the coupling between consecutive vehicles, the disturbance acting on the leader propagates downstream and affects the state and hence the error signal, of all vehicles in the string.

Notice that the controller of the i-th vehicle is also the decoder for the communication channel across which the leader transmits information to the i-th vehicle. We assume that the control laws in (3) are such that the random processes describing the closed-loop dynamics have well defined continuous joint probability density functions and are asymptotically stationary processes. In addition, we make the following technical assumption.

The objective of this paper is to analyze the sensitivity of the spacing errors (2) and (6) with respect to the disturbance d. The definition for the sensitivity function is borrowed from [14]. Definition 1 A zero-mean stochastic process x is said to be asymptotically stationary if

Assumption 1 For every (ˆ yik , eik−1 ) ∈ R2k+1 , the nonk k−1 linear function ui,k (ˆ yi , ei , z) is a continuously differentiable function of the variable z ∈ R.

  Rx (τ ) , lim E x(k)xT (k + τ ) k→∞

As we will see later, Assumption 1 is needed to relate the differential entropies of the random variables at the input and output of each plant.

exists for every integer τ . The power spectral density Φx (ω) of x is defined as the discrete-time Fourier transform of Rx (τ ).

In the sequel, for every (ˆ yik , eik−1 ) ∈ R2k+1 we define u′i,k (ˆ yik , eki )

∂ , ui,k (ˆ yik , eik−1 , z) . ∂x z=ei (k)

The sensitivity function between two asymptotically stationary processes is defined as follows.

(4)

Definition 2 The sensitivity function Sx,y (ω) between two stationary stochastic processes x and y with power spectral densities Φx (ω) and Φy (ω), respectively, is defined as s Φy (ω) Sx,y (ω) , . (7) Φx (ω)

We denote by vi ≥ 1 the relative degree of the i-th plant, i.e., the smallest integer such that Di , Ci Avi i −1 Bi 6= 0,

(5)

and by ti the sum of the relative degrees up to plant i, i.e., ti , v0 + v1 + · · · + vi . By definition of relative degree, the control input ui (k) does not affect the outputs yi (k), . . . , yi (k + vi − 1).

We refer the reader to [14] for a discussion on the relationship between Sx,y (ω) and the classical sensitivity function.

3

In this framework, we follow an information–theoretic approach and compute a lower bound on 1 2π

Z

(1) Similar to the Bode integral formula for SISO systems, the right hand side (RHS) of (10) depends on the i-th plant’s unstable open-loop poles but is independent of the i-th controller Ui . Therefore, (10) characterizes a fundamental limitation that holds for all control laws that stabilize the i-th vehicle in the mean-square sense. (2) In the special case where i = 0 (centralized control case), Theorem 1 recovers the result in [13, Equation (26)]. Moreover, for i = 2, the RHS of (10) becomes

π

log Sd,ei (ω) dω

(8)

−π

by evaluating the differential entropy rates of the spacing errors in the closed-loop systems, under the following assumptions. Assumption 2 The disturbance d is a zero-mean widesense stationary Gaussian process with power spectral density Φd (ω).

1 X l=0

Assumption 3 The initial conditions x0 (0), . . . , xn (0) (denoted as xn0 (0)) form a Markov sequence of continuous random variables with finite differential entropy independent of the disturbance d.

(9)

4

The main result of this brief paper is the following.

π

log Sd,ei (ω)dω ≥

−π

X

log |λ| − Ci + X

log |β| − Cl

log |Dl |

β∈Zl

+

,

1 k→∞ k

Ul , lim

j=0

π

−π

(12) (13) (14)

Here (12) follows from the definition of sensitivity function (7), (13) and (14) follow from Assumption 2, and equality in (14) holds if and only if ei is a Gaussian process with power spectral density Φe .

(10)

where Pi and Zi denote the set of unstable open-loop poles and zeros of the i-th system, respectively, Dl is defined in (5), and k−1 X

Z

log Sd,ei (ω)dω Z π  1 log Φei (ω) − log Φd (ω) dω = 4π −π Z π 1 ¯ = log Φei (ω)dω − h(d) 4π −π ¯ i ) − h(d). ¯ ≥ h(e

l=0

λ∈Pi

+ Ul +

i−1 X

log |λ| − C2 ,

λ∈P2

Proof of Theorem 1

1 2π

Theorem 1 Let Assumptions 1-4 hold. Then, for every i = 0, . . . , n, Z

X

To prove Theorem 1 we proceed in three steps. First, we lower bound the integral of the log sensitivity function (8) by the difference of the differential entropy ¯ ¯ i ) of the disturbance and error rates h(d) and h(e processes as follows

Main result

1 2π

β∈Zl

log |β|) +

for some f (k, ·) : R2k+1 → R and some real scalar constant Fl , then (11) simplifies to Ul = log |Fl |. Such a choice is satisfied, for instance, if the controller is linear and time-invariant.

Assumption 4 The controllers have been designed to ensure that all the closed-loop systems are mean-square   stable, i.e., supk E xTi (k) xi (k) < ∞, for all i = 0, . . . , n. 3

X

which is a generalization of [14, Theorem 4.5] to the string case. (3) In the special case where the control laws in (3) are chosen as  ul (k) = f k, y ˆlk , elk−1 + Fl el (k),

A consequence of Assumption 3 is that the conditional differential entropy h(xi (0)|ˆ yi ) is finite because y ˆi is a function of x0 (0) and d. Since I (ˆ yi ; xi (0)) = h(xi (0))− h(xi (0)|ˆ yi ), it follows that  ¯ yi ; xi (0)) , lim 1 I y I(ˆ ˆik−1 ; xi (0) = 0. k→∞ k

(log |Dl | + Ul +

The second step is to bound the differential entropy rate ¯h(ei ).

 E log |u′l,j (ejl )| ylj−1 , xl (0), y ˆl+1 .

Lemma 1 Let y−1 , d and y ˆ0 , y ˆ1 , 0. Then, for every i = 0, . . . , n,

(11)

¯ i ) = ¯h(yi−1 |ˆ ¯ i; y ¯ i ; xi (0)|ˆ h(e yi ) + I(e ˆi ) + I(e yi ). (15)

A few remarks about the result are in order.

4

In summary, combining (14) with the above three lemmas we obtain Z π 1 log Sd,ei (ω)dω 2π −π ¯ i ) − ¯h(d) ≥ h(e ¯ i−1 |ˆ ¯ ¯ i; y ¯ i ; xi (0)|ˆ = h(y yi ) + I(e ˆi ) + I(e yi ) − h(d) i−1 X ¯ yi ; yi−1 |xi−1 (0)) + I(e ¯ i ; xi (0)|ˆ ≥ (ηl − Cl )+ − I(ˆ yi )

PROOF. See Appendix A.

For the first term at the RHS of (15), we establish the following. Lemma 2 For every i = 1, . . . , n, ¯ i−1 |ˆ h(y yi ) ≥

i−1 X

¯ ¯ yi ; yi−1 |xi−1 (0)) + h(d), (ηl − Cl )+ − I(ˆ

l=0 i−1 (a) X

l=0



(16)

¯ l ; xl (0)|ˆ where ηl , log |Dl | + Ul + I(y yl+1 ).

(log |Dl | + Ul +

l=0

+

X

¯ yi ; x log |λ| − Cl )+ − I(ˆ ˆi )

X

log |λ| − Cl )+ − Ci

λ∈Zi

X

log |λ|

λ∈Pi i−1 (b) X

PROOF. See Appendix B.



(log |Dl | + Ul +

l=0

+

λ∈Zi

X

log |λ|,

Lemma 2 states that the conditional differential entropy rate of yi−1 given y ˆi is at least as large as a scaled version of the differential entropy rate of the disturbance, where the scaling factor depends on the loop gains of the i-th follower’s predecessors.

which completes the proof. Here (a) follows from the data processing inequality and (b) holds by the definition of the channel capacity.

The last step is completed by the following lemma.

5

Lemma 3 Let yn+1 , 0. For every i = 0, . . . , n,

5.1

¯ i ; xi (0)|ˆ I(e yi ) ≥

X

λ∈Pi

X

Linear controllers and scalar systems

log |λ|,

(17)

Consider the special case of n + 1 scalar systems with dynamics given by

log |λ|.

(18)

xi (k + 1) = ai xi (k) + ui (k), yi (k) = xi (k),

λ∈Pi

¯ i ; xi (0)|ˆ I(y yi+1 ) ≥

Some special cases

λ∈Zi

(19)

for some |ai | > 1, i = 0, . . . , n. Suppose that there is no inter-vehicular communication and the initial conditions x0 (0), . . . , xn (0) are jointly Gaussian random variables independent of the disturbance process. Finally, suppose that the i-th control map is given by

PROOF. See Appendix C.

It should be remarked that the inequalities in Lemma 3 coincide with the ones derived in [14, 17] in the special case of a single feedback loop where d is independent of the plant’s initial condition. Therefore, in this case Lemma 3 provides a generalization of the results in [14, 17] to the case of a string where vehicles’ initial conditions are correlated.

    ui (k) = ak+1 E xi (0) eik−1 − E xi (0) eki , i

(20)

  with E xi (0) e−1 , 0. The control in (20) is chosen so i that the state xi (k) satisfies a−k i xi (k) = xi (0) −

Lemma 3 is reminiscent of the data rate theorem [24] for stabilization of unstable plants over a communication constrained feedback channel, which states that the information rate that needs to be supported by the feedback channel to ensure that the closed-loop system is stable must be large enough as measured by the unstable modes of the system.

k−1 X

−(j+1)

ai

ui (j)

j=0

  = xi (0) − E xi (0) eik−1

(21)

as can be seen by telescoping the series in the first equality. By the linearity of the Minimum Mean Square Error (MMSE) estimator and the orthogonality

5

principle, it then follows that xi (k) is a Gaussian random variable independent of eik−1 . In this case, the lower bound in Theorem 1 is attained with equality, as shown next.

• The i-th vehicle has open–loop transfer function Pi with relative degree vi . The i-th controller consists of a channel decoder Qi and a stabilizing control Ki acting on y ˆi and ei , respectively, whose outputs are added and fed to the plant (see Fig. 2). We denote by

Proposition 1 For every i ≥ 0, in the Gaussian scalar systems (19) with control laws given by (20) it holds that 1 2π

Z

π

log Sd,ei (ω)dω = log |ai | +

−π

i−1 X

Li , Ul .

the sensitivity function and complementary sensitivity function, respectively, associated with the plant/controller pair (Pi , Ki ).

l=0

PROOF. First, observe that (14) is tight because (eki , ui (k)) are jointly Gaussian random variables for all k. Then, by setting y ˆi = 0 and Dl = 1 in Lemma 1 and Lemma 2, it follows that 1 2π

Z =

1 Pi Ki and Ti , 1 + Pi Ki 1 + Pi Ki

y ˆi Qi yi

ei Ki

Pi

π

log Sd,ei (ω)dω −π i−1 X

Fig. 2. Block diagram for vehicle i (Qi present only if i ≥ 2).

¯ l ; xl (0))) + I(e ¯ i ; xi (0)). (Ul + I(y

• The i-th channel, i ≥ 2, is an additive white Gaussian noise (AWGN) channel with capacity

(22)

l=0

Ci = Next, observe that (21) and the properties of differential entropy yield

Thus, y ˆi (k) = x ˆi (k) +ˆ zi (k), where ˆ zi (k) is a standard Gaussian random variable independent of x ˆi (k), and x ˆi is subject to the average power constraint σi2 . • The i-th channel encoder, i ≥ 2, has transfer function

 k−1

h(xi (0)|eik−1 ) = h xi (0) − E(xi (0)|eik−1 )|ei  = h xi (0) − E(xi (0)|eik−1 )  = h a−k i xi (k)  = h xi (k) − k log |ai |

Ei = e−jωv0 T0−1 σi .

(25)

Notice that in the time domain (25) yields x ˆi (k) = σi d(k − v0 ). This means that the disturbance d is transmitted uncoded from the leader to the followers. • The i-th channel decoder i, i ≥ 2, has transfer function

and thus

 ¯ i ; xi (0)) = lim 1 h(xi (0)) − h(xi (0)|ek−1 ) I(e i k→∞ k = log |ai |, (23)

Qi = Pi−1 ejωv0 Ri

because the plant is by assumption second moment stable. Following similar steps, it can be easily verified that ¯ l ; xl (0)) = 0, I(y (24) so the claim follows by combining (22)– (24). 5.2

 1 log 1 + σi2 . 2

where Ri =

2 σi−1 +Ti−1 2 σi−1 +1

...

σi , +1

σi2

σ22 +T2 T T σ22 +1 1 0

denotes the

chain of operators applied to d as the disturbance propagates downstream up to the i-th follower. In other words, decoder i computes the MMSE estimate E(d(k − v0 )|ˆ yi (k)) and then filters it through Pi−1 ejωv0 Ri to cancel out the effect of d(k − v0 ) on the i-th plant.

Side information across AWGN channels

Next, we consider a setup in which the classical transfer function approach leads to closed-form expressions for the sensitivity functions, that can be compared to the corresponding lower bounds given in Theorem 1. Throughout this section, we make the following assumptions:

Under these assumptions, the power spectral densities of the spacing errors can be derived explicitly. At the second follower we have Φe2 (ω) = (1 + σ22 )−1 |L2 T1 T0 |2 and thus (26) Sd,e2 (ω) = 2−C2 |L2 T1 T0 |. Then, by applying the classical Bode’s integral formula and the integral formula for the complementary

• d is a white Gaussian process, i.e., Φd = 1.

6

5

C2 = 1

4

C3 = 0

2

3

C2 = 4

C3 = 2 0

C2 = 7

1

−2

C3 = 5 −4

−1

Lower bound in Theorem 1

−6

0

2

4

6

8

−3

10

0

2

4

C3

6

8

10

C2

(a) Integral of log sensitivity function vs C3

(b) Integral of log sensitivity function vs C2

Fig. 3. Comparison between the lower bound in Theorem 1 and (28) in the case of a three-node string systems where the leader communicates to followers 2 and 3 over power constrained AWGN channels of capacities C2 and C3 , respectively.

+ 2−2C2 (1 − 2−2C2 )(1 − 2−2C3 )|L2 |2 .

sensitivity function of linear time-invariant systems [22], we obtain 1 2π

Z

π

log Sd,e2 (ω)dω =

−π

1 X

log |Dl | +

l=0

X

Notice that Ω(ω) depends on C3 as well as on L2 , T2 , and C2 .

log |β|

Fig. 3 (a) and (b) compare (28) with the lower bound in (10) for different values of C2 and C3 in the special case where

β∈Zl



+ Ul +

X

log |λ| − C2 .

λ∈P2

(27) Pi (z) =

By comparing (10) with (27) we conclude that in this case the lower bound in Theorem 1 is tight. Observe from (26) that the sensitivity Sd,e2 (ω) decreases exponentially with the capacity C2 equally at all frequencies. Accordingly, the integral of the log sensitivity function reduces linearly as C2 increases and thus approaches −∞ as C2 → ∞. In this case, follower 2 can perfectly predict the disturbance d.

+

X

λ∈P3

1 log |λ| + 4π

log Ω(ω)dω,

2(z + 0.52) z + 0.2

(1) It is not possible to arbitrarily reduce the integral of the log sensitivity function at follower 3 by increasing the capacity C3 while keeping C2 constant, or by increasing the capacity C2 while keeping C3 constant. (2) The bound (10) is tight for follower 3 in the special case where C2 = 0 and is asymptotically tight in the limit as C2 → ∞. 6

Conclusion

In this brief paper, we studied the problem of disturbance propagation in a one-dimensional string assuming a predecessor and leader following information flow structure. The leader information is transmitted to the other vehicles across finite capacity channels. Using information–theoretic techniques we derived a lower bound on the integral of the log sensitivity function of tracking error for every vehicle with respect to a stochastic disturbance acting on the string leader. A specific class of systems and controllers

β∈Zl π

Z

Ki (z) =

for all i ≥ 0. The following conclusions can be made from Fig. 3:

The relationship between the integral of the log sensitivity function and the channel capacity is more involved for i > 2 than (27). For i = 3, for instance, it can be verified that Z π 1 log Sd,e3 (ω)dω 2π −π 2 X X  = log |Dl | + Ul + log |β| l=0

1 , z−2

(28)

−π

where Ω(ω) = 2−2(C2 +C3 ) (|T2 |2 − 1) + 2−2C3

7

for which the lower bound is tight was provided. Numerical evaluations were provided to validate the insights provided by the theoretical result. The result can be interpreted as the extension of the Bode integral formula to a particular distributed control problem.

[14] N.C. Martins, M.A. Dahleh, and J.C. Doyle. Fundamental limitations of disturbance attenuation in the presence of side information. IEEE Transactions on Automatic Control, 52(1):56–66, 2007. [15] A.S Matveev and A.V Savkin. Multirate stabilization of linear multiple sensor systems via limited capacity communication channels. SIAM journal on control and optimization, 44(2):584–617, 2005.

This work can be extended in two main directions. In vehicle string control, we can consider other information structures, specifically the ones in which follower information is made available. In distributed control, future work can include an extension of the presented result to multiple-input multiple-output systems.

[16] R. H. Middleton and J. H. Braslavsky. String instability in classes of linear time invariant formation control with limited communication range. IEEE Transactions on Automatic Control, 55(7):1519–1530, 2010. [17] K. Okano, S. Hara, and H. Ishii. Characterization of a complementary sensitivity property in feedback control: An information theoretic approach. Automatica, 45(2):504–509, 2009.

References [1] P. Barooah and J.P. Hespanha. Error amplification and disturbance propagation in vehicle strings with decentralized linear control. In 44th IEEE Conference on Decision and Control and 2005 European Control Conference, pages 4964– 4969, 2005.

[18] P. Seiler, A. Pant, and K. Hedrick. Disturbance propagation in vehicle strings. IEEE Transactions on Automatic Control, 49(10):1835–1842, 2004. [19] M.M. Seron, J.H. Braslavsky, and G.C. Goodwin. Fundamental Limitations in Filtering and Control. SpringerVerlag, London, U.K., 1997.

[2] P. Barooah, P.G. Mehta, and J.P. Hespanha. Mistuningbased control design to improve closed-loop stability margin of vehicular platoons. IEEE Transactions on Automatic Control, 54(9):2100–2113, 2009.

[20] S. Sheikholeslam and C.A. Desoer. Longitudinal control of a platoon of vehicles. In American Control Conference, pages 291–296, 1990.

[3] J.H. Braslavsky, R.H. Middleton, and J.S. Freudenberg. Feedback stabilization over signal-to-noise ratio constrained channels. IEEE Transactions on Automatic Control, 52(8):1391–1403, 2007.

[21] Y. Sun and P. G. Mehta. Bode-like fundamental performance limitations in control of nonlinear systems. IEEE Transactions on Automatic Control, 55(6):1390–1405, 2010.

[4] T.M. Cover and J.A. Thomas. Elements of Information Theory, 2nd Edition. Wiley, New York, 2006. [5] A. El Gamal and Y.-H. Kim. Network Information Theory. Cambridge University Press, 2011.

[22] H. Sung and S. Hara. Properties of complementary sensitivity function in SISO digital control systems. International Journal of Control, 50(4):1283–1295, 1989.

[6] J.S. Freudenberg and D.P. Looze. Frequency Domain Properties of Scalar and Multivariable Feedback Systems. Springer-Verlag, Berlin, Germany, 1988.

[23] D. Swaroop. String Stability Of Interconnected Systems: An Application To Platooning In Automated Highway Systems. PhD thesis, Univ. California, Berkeley, CA, 1994.

[7] H. Hao, P. Barooah, and P.G. Mehta. Stability margin scaling laws for distributed formation control as a function of network structure. IEEE Transactions on Automatic Control, 56(4):923–929, 2011.

[24] S. Tatikonda and S. Mitter. Control under communication constraints. IEEE Transactions on Automatic Control, 49(7):1056–1068, 2004.

[8] J.K. Hedrick, M. Tomizuka, and P. Varaiya. Control issues in automated highway systems. IEEE Control Systems Magazine, 14(6):21–32, 1994.

[25] B. Yu, J.S. Freudenberg, and R.B. Gillespie. String instability analysis of heterogeneous coupled oscillator systems. In American Control Conference, pages 6638–6643, 2012.

[9] R. Horowitz and P. Varaiya. Control design of an automated highway system. Proceedings of the IEEE, 88(7):913–925, 2000.

[26] B. Yu, J.S. Freudenberg, R.B. Gillespie, and R.H. Middleton. String instability in coupled harmonic oscillator systems. In 50th IEEE Conference on Decision and Control and European Control Conference, pages 6224–6229, 2011.

[10] P.A. Iglesias. Logarithmic integrals and system dynamics: An analogue of bode’s sensitivity integral for continuous-time, time-varying systems. Linear algebra and its applications, 343-344:451–471, 2002.

[27] S. Yuksel and T. Basar. Communication constraints for decentralized stabilizability with time-invariant policies. IEEE Transactions on Automatic Control, 52(6):1060–1066, 2007.

[11] M.E. Khatir and E.J. Davison. Decentralized control of a large platoon of vehicles using non-identical controllers. In Proceedings of the American Control Conference, volume 3, pages 2769–2776, 2004.

[28] G. Zang and P.A. Iglesias. Nonlinear extension of bode’s integral based on an information-theoretic interpretation. Systems & control letters, 50(1):11–19, 2003.

[12] F. Lin, M. Fardad, and M.R. Jovanovic. Optimal control of vehicular formations with nearest neighbor interactions. IEEE Transactions on Automatic Control, 57(9):2203–2218, 2012.

[29] Y. Zhao, P. Minero, and V. Gupta. Disturbance propagation in strings of vehicles with limited leader information. In IEEE 51st Annual Conference on Decision and Control, pages 757– 762, 2012.

[13] N.C. Martins and M.A. Dahleh. Feedback control in the presence of noisy channels: Bode-like fundamental limitations of performance. IEEE Transactions on Automatic Control, 53(7):1604–1615, 2008.

[30] Y. Zhao, P. Minero, and V. Gupta. On disturbance propagation in vehicle platoon control systems. In American Control Conference, pages 6041–6046, 2012.

8

A

0 −1 ej−v = rj−v0 −1 + dj−v0 −1 − y0j−v0 −1 , and because 0 the 0-th plant is observable and thus x0 (0) is a function of (y0n0 −1 , dn0 −v0 −1 ). Step (b) follows from fact that

Proof of Lemma 1

It holds for i = 0, . . . , n and all j ∈ N that j−1 j−1 h(yi−1 (j)|yi−1 ,y ˆi ) − I(yi−1 (j); xi (0)|yi−1 ,y ˆi )

e0 (j − v0 ) = r(j − v0 ) + d(j − v0 ) − y0 (j − v0 )

j−1 = h(yi−1 (j)|yi−1 ,y ˆi , xi (0))

and that y0j−1 → dj−v0 −1 → d(j − v0 ) form a Markov chain.

(a)

j−1 = h(yi−1 (j)|yi−1 ,y ˆi , xi (0), yij )

(b)

= h(ei (j)|ej−1 ,y ˆi , xi (0), yij ) i

(c)

By summing both sides of (B.1) over j, dividing by k, and taking the limit as k → ∞, it is obvious that (16) holds for i = 1. Assume now that (16) holds up to index i. Then,

= h(ei (j)|ej−1 ,y ˆi , xi (0)) i

= h(ei (j)|ej−1 ) − I(ei (j); y ˆi |ej−1 ) i i − I(ei (j); xi (0)|ej−1 ,y ˆi ), i

(A.1)

where (a) follows because yij is a function of j−1 (yi−1 ,y ˆi , xi (0)), (b) follows from the fact that ei (j) = yi−1 (j) − yi (j) − δ, and (c) follows because yij is a function of (ej−1 ,y ˆi , xi (0)). i

h(yi (j)|yij−1 , y ˆi+1 ) − I(yi (j); xi (0)|yij−1 , y ˆi+1 ) = h(yi (j)|yij−1 , xi (0), y ˆi+1 ) = h(yi (j)|yij−1 , xi (0), y ˆi ) + I(ˆ yi ; yi (j)|yij−1 , xi (0)) − I(ˆ yi+1 ; yi (j)|yij−1 , xi (0)) = h(yi−1 (j − vi )|yij−1 , xi (0), y ˆi ) + log |Di | + γi (j − vi )

Moreover, lim

k→∞

1 k

k−1 X

+ I(ˆ yi ; yi (j)|yij−1 , xi (0)) − I(ˆ yi+1 ; yi (j)|yij−1 , xi (0)) j−1 I(yi−1 (j); xi (0)|yi−1 ,y ˆi )

(a)

j−vi −1 ,y ˆi ) = h(yi−1 (j − vi )|yi−1 + log |Di | + γi (j − vi )

j=0

1 k−1 [I(yi−1 ,y ˆi ; xi (0)) − I(ˆ yi ; xi (0))] k (b) 1 ≤ lim I(dk−1 , xi−1 (0); xi (0)) = 0, (A.2) k→∞ k (a)

= lim

j−vi −1 + I(yi−1 (j − vi ); xi (0)|yi−1 ,y ˆi )

k→∞

+ I(ˆ yi ; yi (j)|yij−1 , xi (0)) − I(ˆ yi+1 ; yi (j)|yij−1 , xi (0)) (B.2)

where (a) holds by the chain rule of mutual information, (b) holds because of the data processing inequality and (9), and the last equality follows from Assumption 3. This further implies that the LHS equals 0 because of the positivity of mutual information.

where (a) holds because the mapping between j−vi −1 yi−1 ↔ yij−1 is bijective given (xi (0), y ˆi ). By summing both sides of (B.2) over j, dividing by k, and taking the limit as k → ∞, it is obtained by using (A.2) that

By summing both sides of (A.1) over j from 0 to k − 1, dividing by k, and taking the limit as k → ∞, making use of (A.2), the proof is complete. B

¯ i |ˆ ¯ i−1 |ˆ ¯ yi ; yi |xi (0)) h(y yi+1 ) = h(y yi ) + ηi + I(ˆ ¯ yi+1 ; yi |xi (0)) − I(ˆ i−1 (a) X ¯ yi ; yi−1 |xi−1 (0)) + ηi = (ηl − Cl )+ − I(ˆ

Proof of Lemma 2

We proceed by induction in i. For i = 1 and all j ∈ N,

l=0

¯ yi ; yi |xi (0)) − I(ˆ ¯ yi+1 ; yi |xi (0)) + I(ˆ

ˆ1 ) ˆ1 ) − I(y0 (j); x0 (0)|y0j−1 , y h(y0 (j)|y0j−1 , y

(B.3)

= h(y0 (j)|y0j−1 , x0 (0), y ˆ1 ) (a)

0 )|y0j−1 , dj−v0 −1 ) = h(D0 u0,j−v0 (ej−v 0

= log |D0 | + γ0 (j − v0 ) + h(e0 (j −

where (a) follows by using the induction hypothesis for index i − 1.

v0 )|y0j−1 , dj−v0 −1 )

(b)

= log |D0 | + γ0 (j − v0 ) + h(d(j − v0 )|dj−v0 −1 ). (B.1)

Next, it is obvious that ¯ yi ; yi |xi (0)) − I(ˆ ¯ yi ; yi−1 |xi−1 (0)) ηi + I(ˆ ¯ ≥ ηi − I(ˆ yi ; y0 ) ≥ ηi − Ci . (B.4)

Here step (a) holds because y0 (j) is equal to 0 D0 u0,j−v0 (ej−v ) plus a function of x0 (0) and 0

9

Furthermore, ¯ yi ; yi |xi (0)) − I(ˆ ¯ yi ; yi−1 |xi−1 (0)) ηi + I(ˆ ¯ ¯ i |xi (0), y = ηi + h(yi |xi (0)) − h(y ˆi ) ¯ ¯ − h(yi−1 |xi−1 (0)) + h(yi−1 |xi−1 (0), y ˆi ) ¯ i |xi (0)) − h(y ¯ i−1 |xi (0), y ¯ i ; xi (0)|ˆ = I(y yi+1 ) + h(y ˆi ) ¯ ¯ − h(yi−1 |xi−1 (0)) + h(yi−1 |xi−1 (0), y ˆi ) ¯ ¯ ¯ ≥ I(yi ; xi (0)) + h(yi |xi (0)) − h(yi−1 |xi (0), y ˆi ) ¯ i−1 |xi−1 (0)) + h(y ¯ i−1 |ˆ − h(y yi ) − I(yi−1 ; xi−1 (0)|ˆ yi ) ¯ ¯ ≥ h(yi ) − h(yi−1 ) ≥ 0. (B.5) By (B.4) and (B.5) it follows that ¯ yi ; yi |xi (0)) − I(ˆ ¯ yi ; yi−1 |xi−1 (0)) ≥ (ηi − Ci )+ . ηi + I(ˆ Substituting the above inequality into (B.3), we obtain that (16) holds for index i+1, which completes the proof. C

Proof of Lemma 3

C.1 Proof of (17) By the chain rule of mutual information, I(eik−1 ; xi (0)|ˆ yi ) = I((eik−1 , y ˆi ); xi (0)) − I(ˆ yi ; xi (0)) (a)

≥ I(uik−1 ; xi (0)) − I(ˆ yi ; xi (0))

where (a) follows from the data processing inequality. Therefore, I(eik−1 ; xi (0)|ˆ yi ) ¯ i ; xi (0)|ˆ I(e yi ) = lim k→∞ k ¯ i ; xi (0)) − I(ˆ ¯ yi ; xi (0)) ≥ I(u (b) X ≥ log |λ| λ∈Pi

where (b) follows from [14, Lemma 4.1] and (9). C.2 Proof of (18) By the chain rule of mutual information, k−1 k−1 I(yi−1 ; xi−1 (0)|ˆ yi ) = I((yi−1 ,y ˆi ); xi−1 (0)) − I(ˆ yi ; xi (0)) k−1 ≥ I(yi−1 ; xi−1 (0)) − I(ˆ yi ; xi (0))

Therefore, k−1 I(yi−1 ; xi−1 (0)|ˆ yi ) ¯ i−1 ; xi−1 (0)|ˆ I(y yi ) = lim k→∞ k ¯ i−1 ; xi−1 (0)) − I(ˆ ¯ yi ; xi (0)) ≥ I(y X (a) log |λ| ≥ λ∈Zi−1

where (a) follows from [17, Proposition 12] and (9).

10

On Disturbance Propagation in Leader–Follower Systems with Limited ...

Oct 24, 2013 - in the design of automated highway systems [8,9]. It is known that the ... Email addresses: [email protected] (Yingbo Zhao), [email protected] ...

185KB Sizes 0 Downloads 66 Views

Recommend Documents

Limited evidence of interactive disturbance and nutrient effects on the ...
Numerous theories have been developed ... competitive and adaptive capacities of the existing ..... Primer Software Version 5.0) based on multi-species data.

Disturbance regime and disturbance interactions in a
western North America, quantitative data describing ... located in the White River National Forest in north- ... aerial photographs and plotted on enlarged USGS.

SHORTWA'U'E RADIO PROPAGATION CORRELATION WITH ...
over the North Atlantic for a fire-year period, and the reiatioc position of the planets in the solar system, discloses some oerp interesting cor- relations. As a result ...

On the determinants of calcium wave propagation distance in ...
Mar 10, 2011 - junctions, long-distance regenerative signalling is ... provide a role much more than support in the brain, ..... This calls for additional factors.

Bounds on Information Propagation Delay in ...
MAC contention, and introduce a random dynamic multi-digraph to model its connectivity. We first provide analytical results about the degree distribution of the ...

Parallel Evidence Propagation on Multicore Processors - USC
Key words: Exact inference, Multicore, Junction tree, Scheduling. 1 Introduction. A full joint probability .... The critical path (CP) of a junction tree is defined as the longest weighted path fin the junction tree. Give a ... Lemma 1: Suppose that

On Pilot Design for Interference Limited OFDM Systems
Centre of Excellence in Wireless Technology, India [email protected], [email protected], (padmanabhan,kkuchi,klutto)@cewit.org.in. Bhaskar ...

Uncertainty Propagation with Monotonicity Preserving ...
Center for Mathematics and Computer Science (CWI), .... terms, where pj(x) is the local polynomial degree of wj(x, ξ) in Ξj. The coefficients cj,i(x) are determined.

Effects of disturbance on the reproductive potential of ...
took place in December 1993 and data in the present study pertains to ... using a line-intercept method. ..... ous effect for seedlings being often light interception.

effects of disturbance area on fouling communities from ...
In marine fouling communities, free space is one of the key limiting resources for settlement of new .... (estimated using the software ImageJ, N.I.H., USA) to ... resulting data on species diversity (Shannon index, H', ..... Recovery from small.

Efficient and Accurate Label Propagation on ... - Semantic Scholar
... for which we are building a recommendation list) has a limited capacity for labels (e.g., ...... and specificity by including individual URLs, for those sites that have enough ... in popularity; in social networks, new users join, new friendships

Effects of natural propagation environments on wireless ...
spur of the moment to send information to a base station, or to raise an alarm. .... diagrams provide a nice aid for visualizing coverage area. Herein, each sensor ...

Parallel Evidence Propagation on Multicore Processors
A full joint probability distribution for any real-world system can be used for ..... Jaakkola, T.S., Jordan, M.I.: Variational probabilistic inference and the QMR-DT ...

A Disturbance Rejection Supervisor in Multiple-Model Based Control
and Shahrokhi, 2000; Karimi and Landau, 2000; Boling et. al., 2007). In most of articles, MMST is assumed robust if each model- controller pair is individually ...

Belief propagation and loop series on planar graphs
Dec 1, 2011 - of optimization in computer science, related to operations research, algorithm ..... (B) Use the Pfaffian formula of Kasteleyn [4,10,11] to reduce zs to a ...... [27] Kadanoff L P and Ceva H, Determination of an operator algebra for ...

Effect of Different Body Postures on Sound Wave Propagation ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3, .... For the investigation, the recording was carried out with eight subjects, four ...

Parallel Evidence Propagation on Multicore Processors - University of ...
convert a network to a cycle-free hypergraph called a junction tree. We illus- trate a junction tree converted from the Bayesian network (Figure 1 (a)) in. Figure 1 (b), where all ..... obtained on a IBM P655 mul- tiprocessor system, where each proce

Parallel Evidence Propagation on Multicore Processors
desks, pattern recognition, credit assessment, data mining and genetics [2][3][4]. .... Some other methods, such as [5], exhibit limited performance for mul- ... This method reduces communication between processors by duplicating some cliques ...

Efficient and Accurate Label Propagation on ... - Semantic Scholar
connections (i.e., more than 10 million rows and more than 4 ... approach on a co-author network, as seen originally seen in. 2003 and then ..... and specificity by including individual URLs, for those sites ..... First consider the use of social.

Effect of Different Body Postures on Sound Wave Propagation ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3, Issue 6, June 2015, Pg.1-7. Shumila Yaqoob, IJRIT-1. International Journal of ...

Self-adaptive Evidence Propagation on Manycore ...
network to a cycle-free hypergraph called a junction tree. ..... Comparison with baseline scheduling methods using junction trees of various .... [Online]. Available: citeseer.ist.psu.edu/segal01rich.html. [5] D. Pennock, “Logarithmic time parallel

The Back-Propagation Learning Algorithm on the Meiko ...
the Meiko CS-2: Two Mapping Schemes. Antonio d' Acierno1 and .... is veri ed, there are not data to be communicated and the load is perfectly balanced. Finally ...

abrupt change detection in automatic disturbance ...
155. 9.6.3. Citrix®. ...... client computing etc) for the ASP implementation are discussed in details. We also discuss the utilisation of the ..... to create the software package for the automatic disturbance recognition and analy- sis. 2.6 Overview

pdf-1499\physical-security-and-military-role-in-civil-disturbance ...
... one of the apps below to open or edit this item. pdf-1499\physical-security-and-military-role-in-civil-disturbance-operations-by-department-of-defense.pdf.