7 research outputs found

    PEDS: Passivity enforcement for descriptor systems via Hamiltonian- symplectic matrix pencil perturbation

    Get PDF
    Passivity is a crucial property of macromodels to guarantee stable global (interconnected) simulation. However, weakly nonpassive models may be generated for passive circuits and systems in various contexts, such as data fitting, model order reduction (MOR) and electromagnetic (EM) macromodeling. Therefore, a post-processing passivity enforcement algorithm is desired. Most existing algorithms are designed to handle poleresidue models. The few algorithms for state space models only handle regular systems (RSs) with a nonsingular D+D T term. To the authors' best knowledge, no algorithm has been proposed to enforce passivity for more general descriptor systems (DSs) and state space models with singular D + D T terms. In this paper, a new post-processing passivity enforcement algorithm based on perturbation of Hamiltonian-symplectic matrix pencil, PEDS, is proposed. PEDS, for the first time, can enforce passivity for DSs. It can also handle all kinds of state space models (both RSs and DSs) with singular D + D T terms. Moreover, a criterion to control the error of perturbation is devised, with which the optimal passive models with the best accuracy can be obtained. Numerical examples then verify that PEDS is efficient, robust and relatively cheap for passivity enforcement of DSs with mild passivity violations. ©2010 IEEE.published_or_final_versionThe IEEE/ACM International Conference on Computer-Aided Design (ICCAD 2010), San Jose, CA., 7-11 November 2010. In Proceedings of ICCAD, 2010, p. 800-80

    A Perturbation Scheme for Passivity Verification and Enforcement of Parameterized Macromodels

    Get PDF
    This paper presents an algorithm for checking and enforcing passivity of behavioral reduced-order macromodels of LTI systems, whose frequency-domain (scattering) responses depend on external parameters. Such models, which are typically extracted from sampled input-output responses obtained from numerical solution of first-principle physical models, usually expressed as Partial Differential Equations, prove extremely useful in design flows, since they allow optimization, what-if or sensitivity analyses, and design centering. Starting from an implicit parameterization of both poles and residues of the model, as resulting from well-known model identification schemes based on the Generalized Sanathanan-Koerner iteration, we construct a parameter-dependent Skew-Hamiltonian/Hamiltonian matrix pencil. The iterative extraction of purely imaginary eigenvalues ot fhe pencil, combined with an adaptive sampling scheme in the parameter space, is able to identify all regions in the frequency-parameter plane where local passivity violations occur. Then, a singular value perturbation scheme is setup to iteratively correct the model coefficients, until all local passivity violations are eliminated. The final result is a corrected model, which is uniformly passive throughout the parameter range. Several numerical examples denomstrate the effectiveness of the proposed approach.Comment: Submitted to the IEEE Transactions on Components, Packaging and Manufacturing Technology on 13-Apr-201

    Passivity enforcement for descriptor systems via matrix pencil perturbation

    Get PDF
    Passivity is an important property of circuits and systems to guarantee stable global simulation. Nonetheless, nonpassive models may result from passive underlying structures due to numerical or measurement error/inaccuracy. A postprocessing passivity enforcement algorithm is therefore desirable to perturb the model to be passive under a controlled error. However, previous literature only reports such passivity enforcement algorithms for pole-residue models and regular systems (RSs). In this paper, passivity enforcement algorithms for descriptor systems (DSs, a superset of RSs) with possibly singular direct term (specifically, D+D T or I-DD T) are proposed. The proposed algorithms cover all kinds of state-space models (RSs or DSs, with direct terms being singular or nonsingular, in the immittance or scattering representation) and thus have a much wider application scope than existing algorithms. The passivity enforcement is reduced to two standard optimization problems that can be solved efficiently. The objective functions in both optimization problems are the error functions, hence perturbed models with adequate accuracy can be obtained. Numerical examples then verify the efficiency and robustness of the proposed algorithms. © 2012 IEEE.published_or_final_versio

    5 Post-processing methods for passivity enforcement

    Get PDF
    Many physical systems are passive (or dissipative): they are unable to generate energy on their own, but they can store energy in some form while exchanging power with the surrounding environment. This chapter describes the most prominent approaches for ensuring that Reduced Order Models are passive, so that their math- ematical representation satisfies an appropriate dissipativity condition. The main focus is on Linear and Time-Invariant (LTI) systems in state-space form. Different conditions for testing passivity of a given LTI model are discussed, including Linear Matrix Inequalities (LMIs), Frequency-Domain Inequalities, and spectral conditions on associated Hamiltonian matrices. Then we describe common approaches for perturbing a given non-passive system to enforce its passivity. Various examples from electronic applications are used to demonstrate both theory and algorithm performance

    System- and Data-Driven Methods and Algorithms

    Get PDF
    An increasing complexity of models used to predict real-world systems leads to the need for algorithms to replace complex models with far simpler ones, while preserving the accuracy of the predictions. This two-volume handbook covers methods as well as applications. This first volume focuses on real-time control theory, data assimilation, real-time visualization, high-dimensional state spaces and interaction of different reduction techniques
    corecore