• 沒有找到結果。

Structured doubling algorithms for weakly stabilizing Hermitian solutions of algebraic Riccati equations

N/A
N/A
Protected

Academic year: 2022

Share "Structured doubling algorithms for weakly stabilizing Hermitian solutions of algebraic Riccati equations"

Copied!
38
0
0

加載中.... (立即查看全文)

全文

(1)

Structured doubling algorithms for weakly stabilizing Hermitian solutions of algebraic

Riccati equations

Tsung-Ming Huang

a,1

, Wen-Wei Lin

b,

aDepartment of Mathematics, National Taiwan Normal University, Taipei 11677, Taiwan.

bDepartment of Mathematics, National Tsing Hua University, Hsinchu 30043, Taiwan.

Abstract

In this paper, we propose structured doubling algorithms for the computation of the weakly stabilizing Hermitian solutions of the continuous- and discrete-time alge- braic Riccati equations, respectively. Assume that the partial multiplicities of purely imaginary and unimodular eigenvalues (if any) of the associated Hamiltonian and symplectic pencil, respectively, are all even and the C/DARE and the dual C/DARE have weakly stabilizing Hermitian solutions with property (P). Under these assump- tions, we prove that if these structured doubling algorithms do not break down, then they converge to the desired Hermitian solutions globally and linearly. Numerical experiments show that the structured doubling algorithms perform efficiently and reliably.

Key words: algebraic Riccati equation, Hermitian solution, structured doubling algorithm, purely imaginary eigenvalue, unimodular eigenvalue, global and linear convergence

∗ Corresponding author.

Email addresses: min@math.ntnu.edu.tw (Tsung-Ming Huang), wwlin@math.nthu.edu.tw (Wen-Wei Lin).

1 This work is partially supported by the National Science Council and the National Center for Theoretical Sciences of Taiwan.

(2)

1 Introduction

In this paper, we investigate the structured doubling algorithms for the com- putation of the weakly stabilizing Hermitian solution X to

(I) the continuous-time algebraic Riccati equation (CARE):

−XGX + AHX + XA + H = 0, (1.1)

or

(II) the discrete-time algebraic Riccati equation (DARE):

X = AHX(I + GX)−1A + H, (1.2)

where A, G, H ∈ Cn×n with G = GH, H = HH and I ≡ In is the identity matrix of order n.

Equations (1.1) and (1.2) arise frequently in the pursuit of the “weakly” stabi- lizing controllers of continuous- and discrete-time H-optimal control systems, respectively (13; 15; 17; 25). In addition, several applications in Wiener fil- tering theory (47), network synthesis (3) and Moser-Veselov equations (9; 40) also involve the Hermitian solution of CAREs.

We consider the 2n × 2n Hamiltonian matrix H associated with the CARE:

H =

A −G

−H −AH

(1.3)

which satisfies

HJ = −JHH, J =

0 I

−I 0

; (1.4)

and consider the 2n×2n symplectic pair (M, L) (or symplectic pencil M−λL) associated with the DARE:

M =

A 0

−H I

, L =

I G 0 AH

(1.5)

which satisfies

(3)

MJMH = LJLH. (1.6) The special symplectic pair (M, L) of the form in (1.5) is referred to as a standard symplectic form (SSF).

Note that (30; 42) λ ∈ σ(H) if and only if −¯λ ∈ σ(H), and λ ∈ σ(M, L) if and only if 1/¯λ ∈ σ(M, L). Here σ(H) and σ(M, L) denote the spectrums of H and (M, L), respectively. It is well-known that (e.g., (30; 32; 42)) the CARE (1.1) has a weakly stabilizing Hermitian solution X if and only if

A −G

−H −AH

I X

=

I X

Φ, Φ ∈ Cn×n, (1.7)

where σ(Φ) ⊆ R (the closed left half plane); the DARE (1.2) has a weakly stabilizing Hermitian solution X if and only if

A 0

−H I

I X

=

I G 0 AH

I X

Φ, Φ ∈ Cn×n, (1.8)

where σ(Φ) ⊆ °1 (the closed unit disk) and (I + GX) is invertible. The particular invariant subspaces spanned by hI, XTiT in (1.7) and (1.8) are usually referred to as stable Lagrangian subspaces.

Definition 1.1 A subspace U ⊆ C2n with dimension n is called an H-stable Lagrangian subspace, if U satisfies that (i) HU ⊆ U, (ii) U is isotropic; i.e., xHJy = 0, for all x, y ∈ U; and (iii) Re(λ(H|U)) ≤ 0. Here λ(H|U) denotes an eigenvalue of H restricted to U.

Definition 1.2 A subspace V ⊆ C2n with dimension n is called an (M, L)- stable Lagrangian subspace, if (i) V is invariant under (M, L); i.e., there is a subspace W such that MV, LV ⊆ W (44, pp. 303–305); (ii) V is isotropic and (iii) |λ((M, L)|V)| ≤ 1. Here λ((M, L)|V) denotes an eigenvalue of (M, L) restricted to V.

Unfortunately, an H-stable Lagrangian subspace and an (M, L)-stable La- grangian subspace do not always exist, when some purely imaginary eigen- values of H and some unimodular eigenvalues of (M, L) have odd partial multiplicities, respectively. Counterexamples can be found in (41). To guar- antee the existence of the H- and (M, L)-stable Lagrangian subspaces and the weakly stabilizing Hermitian solutions of CAREs and DAREs, we assume that H in (1.3) and (M, L) in (1.5), respectively, satisfy the conditions:

(4)

(A1) The partial multiplicities (the sizes of Jordan blocks) of H associated with the purely imaginary eigenvalues (if any) are all even.

(A2) The partial multiplicities of (M, L) associated with the unimodular eigen- values (if any) are all even.

Under these assumptions, equivalence statements for the existence of weakly stabilizing Hermitian solutions of CAREs and DAREs have first been given by (18; 29) and (28), respectively. In order to enhance the uniqueness of the weakly stabilizing Hermitian solution in some sense, we, further, give the fol- lowing definitions.

Definition 1.3 Assume that (A1) holds. The CARE (1.1) is said to have a weakly stabilizing Hermitian solution with property (P), if the matrix Φ in (1.7) (i.e., Φ ≡ A − GX) satisfies that σ(Φ) ⊆ R and each purely imaginary eigenvalue has a half of the partial multiplicity of H corresponding to the same eigenvalue. (For example, H has a purely imaginary eigenvalue with partial multiplicity (2, 4, 6) i.e., the jordan blocks are of size 2, 4 and 6, respectively, then Φ has the same eigenvalue with the partial multiplicity (1, 2, 3).)

Definition 1.4 Assume that (A2) holds. The DARE (1.2) is said to have a weakly stabilizing Hermitian solution with property (P), if the matrix Φ in (1.8) (i.e., Φ ≡ (I + GX)−1A) satisfies that σ(Φ) ⊆ °1 and each unimodular eigenvalue has a half of the partial multiplicity of (M, L) corresponding to the same eigenvalue.

For the continuous-time case, a well-known backward stable algorithm care (30) computes a stabilizing Hermitian solution X for the CARE by applying the QR algorithm with reordering (43) to H. Unfortunately, the QR algo- rithm preserves neither the Hamiltonian structure nor the associated split- ting of eigenvalues. When H in (1.3) has no purely imaginary eigenvalues, a strongly stable method has been proposed by (10) for computing the Hamil- tonian Schur form of H, and therefore, the H-stable Lagrangian subspace.

Efficient structured doubling algorithms (incorporating an appropriate Cay- ley transform) (11; 27) and the matrix sign function methods (5; 8; 14; 16) have been developed to compute the unique positive semidefinite solution of CARE (1.1). When H in (1.3) satisfies Assumption (A1), an eigenvector de- flation technique proposed by (13) guarantees that the eigenvalues appear with the correct pairing. This is certainly an advantage over the QR algo- rithm, but the method ignores most of the structure of the problem during computation. A structured algorithm proposed by (1) only using symplectic orthogonal transformations, computes the H-stable Lagrangian subspace. But there are numerical difficulties in the convergence of the deflation steps when purely imaginary eigenvalues occur (38, p. 143). To avoid the numerical dif- ficulties mentioned above, another stable and structured algorithm has been developed in (33), preprocessing to deflate all purely imaginary eigenvalues.

(5)

When H satisfies Assumption (A1) with partial multiplicities equal to two, an efficient Newton’s method has been developed in (21) for solving the CAREs with global and linear convergence.

For the discrete-time case, a well-known backward stable algorithm dare (37; 42; 48) computes a stabilizing Hermitian solution X for DAREs by apply- ing the QZ algorithm with reordering to (M, L). Unfortunately, this algorithm does not take into account the symplectic structure of (M, L). Non-structure- preserving iterative processes spoil the symplectic structure, causing the al- gorithms to fail or lose accuracy in adverse circumstances. When (M, L) in (1.5) has no unimodular eigenvalues, an efficient doubling algorithm was firstly derived in (2) based on an acceleration scheme of the fixed point iteration for (1.2). Using different approaches, quadratic convergence of doubling algo- rithms has been shown in (26; 35). On the other hand, based on the viewpoint of the inverse-free iteration (4; 36), a matrix disk function method (MDFM) (6; 7) and a structure-preserving doubling algorithm (SDA) (12; 24) have been developed for solving DAREs. The symplectic structure in the MDFM and the SSF form in the SDA are preserved at each iterative step. However, the symplectic structure in the MDFM is preserved only in exact arithmetic.

When (M, L) in (1.5) satisfies Assumption (A2), a structured algorithm has been developed in (33), preprocessing to deflate all unimodular eigenvalues by the determining the isotropic Jordan subbasis using the S + S−1-transform of M − λL (31). When (M, L) satisfies Assumption (A2) with partial multiplic- ities two, an efficient Newton-type method has been proposed by (20) to solve the DAREs with global and linear convergence.

As mentioned above, the MDFM and SDA have been proposed for solving DARE (1.2) with M − λL possessing no unimodular eigenvalues. To solve CARE (1.1) with H with no purely imaginary eigenvalues, the Hamiltonian matrix H is converted to a symplectic pencilM−λc L in SSF by an appropriateb Cayley transform and then the MDFM or the SDA algorithm can be applied.

The main purpose of this paper is to apply the MDFM or SDA to solve CAREs and DAREs, where the associated H in (1.3) and M − λL in (1.5) satisfy Assumption (A1) and (A2), respectively. Under these assumptions, we prove the globally linear convergence of the MDFM and SDA.

This paper is organized as follows. In Sections 2 and 3, we describe struc- tured doubling algorithms, the D-MDFM/D-SDA and C-MDFM/C-SDA, for solving DAREs and CAREs, respectively. In Section 4, we prove that under Assumption (A1) and (A2) structured doubling algorithms converge globally and linearly to the weakly stabilizing Hermitian solutions with property (P) of DAREs and CAREs, respectively. In Section 5, we test several numerical examples for illustrating the convergence behavior of the MDFM, SDA and Newton-type methods. Concluding remarks are given in Section 6.

(6)

Throughout this paper, we denote AH = ¯AT the conjugate transpose of A ∈ Cn×n, ı =

−1, I ≡ In and 0 ≡ 0n (the identity and zero matrices of order n, respectively). The vector ej the jth column of In, k · k a matrix norm, and σ(A) and ρ(A) the spectrum and the spectral radius of A, respectively. R and °1, respectively, denote the closed left half plane and the closed unit disk.

2 Structured doubling algorithms for DAREs

The matrix disk function method (MDFM) in (6; 7) is developed to solve DARE (1.2) by using a swapping technique built on the QR factorization. We refer to this step as a QR-swap.

For a given symplectic pair (M, L), the QR-swap computes the QR-factorization of [LT, −MT]T from

Q

L

−M

Q11 Q12 M L

L

−M

=

R 0

, (2.1)

where Q ∈ C4n×4n is unitary and R ∈ C2n×2n is upper triangular. Let

L := Lb L, M := Mc M. (2.2)

It is easily seen that (M,c L) is symplectic. From (2.1)–(2.2), (b M,c L) satisfiesb the doubling property:

Mx = Mc Mx = λMLx = λLMx = λ2LLx = λ2Lx,b (2.3)

assuming that Mx = λLx.

Algorithm 2.1 (D-MDFM for DAREs)

(7)

Input: A, G, H; τ (a small tolerance);

Output: a weakly stabilizing Hermitian solution X to DARE.

Initialize: R ← 02n, M ←

A 0

−H I

, L ←

I G 0 AH

;

Repeat: Compute the QR-factorization:

Q11 Q12 M L

L

−M

=

Rc

0

;

If kR − Rk ≤ τ kc Rk, Then solve the least squares problem for X:c

−M(:, 1 : n) = M(:, n + 1 : 2n)X;

Stop Else

Set L ← LL, M ← MM, R ←R;c Go To Repeat

End If

The sequence {(Mk, Lk)} generated by Algorithm 2.1 satisfies the recursive formula

Mk+1= M∗,kMk, Lk+1 = L∗,kLk, (2.4) where

Q11,k Q12,k M∗,k L∗,k

Lk

−Mk

=

Rck

0

is the QR-factorization.

On the other hand, the SDA in (12) is developed to solve DARE (1.2) under conditions of stabilizability and detectability, by using a structured LU fac- torization instead of the QR factorization in (2.1). We refer to this step as a SLU-swap. As derived in (12), for (M, L) in SSF (1.5), we construct

M =

A(I + GH)−1 0

−AH(I + HG)−1H I

, L =

I AG(I + HG)−1 0 AH(I + HG)−1

(2.5)

(8)

and consequently deduce that

ML = LM. (2.6)

With L ≡ Lb L andL ≡ Mb M, and apply the Sherman-Morrison-Woodbury formula, we obtain

L =b

I Gb 0 AbH

, M =c

A 0b

−H Ic

, (2.7)

where

A = A(I + GH)b −1A, (2.8a)

G = G + AG(I + HG)b −1AH, (2.8b)

H = H + Ac H(I + HG)−1HA. (2.8c)

Equations in (2.7) show that the newly derived matrix pair (M,c L) is againb in SSF form. From (2.6)–(2.7), (M,c L) also satisfies the doubling propertyb Mx = λc 2Lx.b

Remark 2.1

(i) Equations in (2.8) have exactly the same form as the doubling algo- rithm (which has been first proposed and investigated in Anderson (2) and Kimura (26)). However, the original doubling algorithm was derived as an acceleration scheme for the fixed-point iteration from (1.2). Instead of producing the sequence {Xk}, the doubling algorithm produces {X2k}.

Furthermore, the convergence of the doubling algorithm was proven when A is nonsingular (2), and for (A, G, H) which is reachable and detectable, or stabilizable and observable (26). A stronger convergent result of the SDA algorithm under weaker conditions (stabilizability and detectability) can be found in (12; 35).

(ii) The matrix (I + GH) in (2.8) can possibly be singular in some step of SDA, thus A,b G andb H in (2.8) do not exist and the SDA may breakc down. In our numerical experiments in Section 6, this happens only in the limiting case.

Algorithm 2.2 (D-SDA for DAREs)

(9)

Input: A, G, H; τ (a small tolerance);

Output: a weakly stabilizing Hermitian solution X to DARE.

Repeat W ← I + GH;

If W is singular, then break down.

Solve W V1 = A, V2W = A for V1 and V2; Set G ← G + V2GAH,

H ← H + Ac HHV1, A ← AV1

If kH − Hk ≤ τ kc Hk, then X ←c H, Stop.c Set H ←H;c

Goto Repeat

Remark 2.2 The linear systems W V1 = A, V2W = A for V1 and V2 in Algorithm2.2 can be solved by the LU factorization of W or the GSVD (gen- eralized singular value decomposition) of (W, A) and (WH, AH), respectively.

For the latter case, let

T1W Ua= C1, T1AVa= S1,

T2WHUb = C2, T2AHVb = S2

be the GSVD of (W, A) and (WH, AH), respectively, where Ua, Va, Ub, Vb are unitary, T1, T2 are nonsingular, C1, S1, C2, S2 are positive diagonal (19, p.466).

Then V1 and V2 can be solved by V1 = UaC1−1S1VaH, V2 = VbS2C2−1UbH. A detailed error analysis of D-SDA will be given in Appendix.

The sequence {(Ak, Gk, Hk)} generated by Algorithm 2.2 satisfies the following recursive formula

Ak+1= Ak(I + GkHk)−1Ak, (2.9a)

Gk+1= Gk+ AkGk(I + HkGk)−1AHk, (2.9b) Hk+1= Hk+ AHkHk(I + GkHk)−1Ak. (2.9c)

(10)

3 Structured doubling algorithm for CAREs

To solve CARE (1.1), a structured doubling algorithm was first proposed by Kimura (27) using a Cayley transformation. With an appropriate parameter γ > 0, the Hamiltonian matrix H in (1.3) can be transformed to a symplectic pair (M, L) ≡ (H + γI, H − γI) (38; 39), and then simplifies to a symplectic pair (M0, L0) in the SSF form. Here

M0 =

A0 0

−H0 I

, L0 =

I G0 0 AH0

, (3.1)

with

A0= I + 2γ(Aγ+ GA−Hγ H)−1, (3.2a)

G0= 2γA−1r G(AHγ + HA−1γ G)−1, (3.2b) H0= 2γ(AHγ + HA−1γ G)−1HA−1γ , (3.2c) and Aγ ≡ A − γI. The DARE associated with the symplectic pair (M0, L0) is

X = AH0 X(I + G0X)−1A0+ H0

on which Algorithm 2.1 or 2.2 can then be applied. For details on how a suitable γ is chosen for the Cayley transformation, see (11).

Algorithm 3.1 (C-MDFM/C-SDA for CAREs) Input: A, G, H; τ (a small tolerance);

Output: a stabilizing Hermitian solution X to CARE.

(I) Find an appropriate value γ > 0 so that Aγ and

Aγ+ GA−Hγ H are well-conditioned (see (11) for details).

(II) Initialize A0 ← I + 2γ(Aγ+ GA−Hγ H)−1, G0 ← 2γA−1r G(AHγ + HA−1γ G)−1, H0 ← 2γ(AHγ + HA−1γ G)−1HA−1γ ;

(III) Call Algorithm 2.1 (D-MDFM) or 2.2 (D-SDA).

(11)

4 Convergence of structured doubling algorithms

Let

M =

A 0

−H I

, L =

I G 0 AH

, (4.1)

where G = GH and H = HH. In the light of Definition 1.4, we assume that the matrix pair (M, L) is regular (i.e., det(M − λL) 6≡ 0) and satisfies Assumption (A2). In this section, we shall show that under these assumptions Algorithm 2.1 or 2.2 converges to a weakly stabilizing Hermitian solution with property (P) for DARE (1.2). A similar proof can be applied to the convergence of Algorithm 3.1 to a weakly stabilizing Hermitian solution with property (P) for the CARE when H satisfies Assumption (A1).

Denote the Jordan block of size p corresponding to a unimodular eigenvalue ω ≡ eıθ by

Jω,p =

ω 1 0 · · · 0 0 ω 1 . .. ...

... ... ... ... 0 ... . .. ... 1 0 · · · 0 ω

p×p

. (4.2)

We now quote or prove some useful lemmas. For example, the Jordan block Jω,p to the power of 2k can be explicitly evaluated.

Lemma 4.1 (19, pp. 557) Let Jω,p be given by (4.2). Then

Jω,p2k =

γ1,k γ2,k · · · γp,k 0 γ1,k . .. ...

... ... ... γ2,k 0 · · · 0 γ1,k

, (4.3a)

where

(12)

γi,k = 1 (i − 1)!

di−1 dxi−1x2k

¯¯

¯¯

¯x=ω

= 2k(2k− 1) · · · (2k− i + 2)

(i − 1)! ω2k−i+1, (4.3b) for i = 1, . . . , p.

With p = 2m, let

Γk,m=

γm+1,k γm+2,k · · · γ2m−1,k γ2m,k γm,k . .. ... γ2m−1,k

... . .. ... ... ...

γ3,k . .. ... γm+2,k γ2,k γ3,k · · · γm,k γm+1,k

m×m

(4.4)

≡ Jω,2m2k (1 : m, m + 1 : 2m),

in which γi,k are defined in (4.3b), for i = 2, . . . , 2m.

To show that Γk,m is invertible, we first prove the following lemma.

Lemma 4.2 Let 2 ≤ r ≤ m and

Fr(m) =

f11 f12 · · · f1r f21 f22 · · · f2r ... ... ...

fr1 fr2 · · · frr

∈ Rr×r (4.5)

where

fij =

1, if j = 1,

Qi+j−2

ν=i (m + r − ν), if 2 ≤ j ≤ r, for i = 1, 2, . . . , r. Then

|det(Fr(m))| =

Yr

ν=1

(ν − 1)!. (4.6)

Proof. Since

(13)

det(F2(m)) =

¯¯

¯¯

¯¯

¯

1 m + 1

1 m

¯¯

¯¯

¯¯

¯

= −1,

(4.6) is true for r = 2. Suppose that

|det(Fr−1(m))| =

r−1Y

ν=1

(ν − 1)!.

Eliminating the first to (r − 1)th entries in the first column of Fr(m) by elementary row operations, we obtain

Ir−2 0 0 0 1 −1 0 0 1

· · ·

1 −1 0 0 1 0 0 0 Ir−2

Fr(m)

=

0 Fbr−1(m)

1 m, m(m − 1), · · · , m(m − 1) · · · (m − r + 2)

,

where Fbr−1(m) ≡ [fbij] ∈ R(r−1)×(r−1) with

fbij =

1, if j = 1,

jQi+j−2ν=i [m + (r − 1) − ν], if 2 ≤ j ≤ r − 1, for i = 1, 2, . . . , r − 1. Using the factorization

Fbr−1(m) = Fr−1(m)diag {1, 2, · · · , r − 1} , we have

|det(Fr(m))| = (r − 1)! |det(Fr−1(m))| =

Yr

ν=1

(ν − 1)!.

The proof is completed by mathematical induction.

Definition 4.1 Given ` ∈ Z. An m × m Toeplitz matrix T = [tpq]mp,q=1 can be written in the form

T = [ti]2m+`−2i=`

(14)

with ti = tpq, where i = (m − 1) − (p − q) + ` and p, q = 1, . . . , m.

Since |ω| = 1, we assume w.l.o.g. that ω = 1 in the following discussion for convenience.

Lemma 4.3 The Toeplitz matrix Γk,m in (4.4) is nonsingular for sufficiently large k and satisfies

−1k,mJω2kk = O(2−k), kJω2kΓ−1k,mJω2kk = O(2−k), (4.7) where Jω ≡ Jω,m is defined in (4.2).

Proof. The Toeplitz matrix T =hi!1i2m−1

i=1 can be factorized by

T = diag

( 1

(2m − 1)!, · · · , 1 m!

)

Fm(m)Π, (4.8)

where Π = [en, · · · , e1] and Fm(m) is given by (4.5) with r = m. From Lemma 4.2, T is nonsingular. We write Γk,m of (4.4) in the form

Γk,m= 2kD1T D˜ 2, (4.9)

where D1 = diag³2(m−1)k, · · · , 2k, 1´, D2 = diag³1, 2k, · · · , 2(m−1)k´ and ˜T = T + O(2−k). Similarly, Jω2k = D2−1J˜1D2 = D1J˜2D−11 , where ˜J1 = I + O(2−k) and ˜J2 = I + O(2−k). With these formulae, (4.7) obviously holds.

For the unimodular eigenvalues ωj = eıθj of (M, L) with an even partial multiplicity p = 2mj, we have

Jωj,2mj =

Jωj,mj Γ1,mj 0mj Jωj,mj

, Γ1,mj = emjeT1, (4.10)

for j = 1, . . . , r. From the symplectic Kronecker’s Theorem for (M, L) (see (32)), there exist a symplectic matrixZ (i.e.,b ZbHJZ = J) and a nonsingularb Q such thatb

(15)

QMb Z =b

Js⊕ J1 0`Γb1 0n I`⊕ J1−H

, (4.11a)

QLb Z =b

I`⊕ Iµ 0n 0n JsH ⊕ Iµ

, (4.11b)

where Js ∈ C`×` consists of asymptotically stable Jordan blocks (i.e., ρ(Js) <

1),

J1= Jω1,m1 ⊕ · · · ⊕ Jωr,mr, (4.12) Γb1b1,m1 ⊕ · · · ⊕Γb1,mr

with Γb1,mj = emjeTmj(j = 1, . . . , r), ` = n − (m1 + · · · + mr) ≡ n − µ and ⊕ denotes the direct sum of matrices.

Based on the standard Weierstrass form and the special eigen-structure shown in (4.11), there exists a suitable nonsingular Wj ∈ Cmj×mj, for j = 1, . . . , r, such that

Imj 0 0 Wj−1

Jωj,mj Γb1,mj 0 Jω−Hj,mj

Imj 0 0 Wj

=

Jωj,mj Γ1,mj 0 Jωj,mj

. (4.13)

Let

Z =Z(Ib n+`⊕ W1 ⊕ · · · ⊕ Wr), Q = (In+`⊕ W1−1⊕ · · · ⊕ Wr−1)Q. (4.14)b Then from (4.13)–(4.14), the equations (4.11a) and (4.11b), respectively, be- come

QMZ =

Js⊕ J1 0`⊕ Γ1

0n I`⊕ J1

≡ JM, (4.15a)

QLZ =

In 0n

0n JsH ⊕ Iµ

≡ JL, (4.15b)

where Γ1 ≡ Γ1,m1⊕ · · · ⊕ Γ1,mr with Γ1,mj being given in (4.10). Since JM and JL in (4.15) commute with each other and from (4.15), one can derive

MZJL= Q−1JLJM = LZJM. (4.16)

From (4.11) and (4.14), it follows that span{Z(:, 1 : n)} forms the unique

(16)

stable Lagrangian subspace of (M, L) corresponding to Js⊕ J1. On the other hand, if we interchange the roles of M and L in (4.15) and consider the symplectic pair (L, M), there are nonsingular matrices P and Y such that

PLY = ¯JM, PMY = ¯JL. (4.17)

Similar arguments also produce

LY ¯JL= MY ¯JM, (4.18)

where span{Y(:, 1 : n)} forms the unique stable Lagrangian subspace of (L, M) corresponding to ¯Js⊕ ¯J1.

Let {(Mk, Lk)}k=0be the sequence of symplectic pairs generated by Algorithm 2.1 (see (2.4)), or {(Mk, Lk)}k=0 be the sequence of symplectic pairs in SSF form with

Mk=

Ak 0

−Hk I

, Lk=

I Gk 0 AHk

(4.19)

generated by Algorithm 2.2 (see (2.9)). With M0 = M, L0 = L, from (4.16) as well as (2.1)–(2.2) or (2.6)–(2.7), it follows that

M1ZJL2= MM0ZJL2 = ML0ZJMJL = LM0ZJLJM (4.20)

= LL0ZJM2 = L1ZJM2 . By induction, we have

MkZJL2k = LkZJM2k. (4.21)

By the result of Lemma 4.1 with p = 2mj and the definitions of Γk,m, JM and JL in (4.4), (4.15a) and (4.15b), (4.21) can be rewritten as

MkZ

In 0n 0n (JsH)2k ⊕ Iµ

= LkZ

Js2k⊕ J12k 0`⊕ Γk 0n I`⊕ J12k

, (4.22)

where

Γk ≡ Γk,m1 ⊕ · · · ⊕ Γk,mr (4.23)

(17)

with Γk,mj being defined as in (4.4), for j = 1, . . . , r. Similarly, from (4.18) it also holds

LkY ¯JL2k = MkY ¯JM2k. (4.24)

Lemma 4.4 Let J1 and Γk be defined in (4.12) and (4.23), respectively. Then Γk is invertible and satisfies

−1k J12kk = O(2−k), kJ12kΓ−1k J12kk = O(2−k). (4.25)

Proof. By Lemma 4.3.

We now partition Z and Y in (4.16) and (4.18):

Z =

Z1 Z3 Z2 Z4

, Y =

Y1 Y3 Y2 Y4

, (4.26)

where Zi, Yi ∈ Cn×n, for i = 1, 2, 3, 4.

Theorem 4.1 Let (M, L) be given in (1.5) satisfying (A2). Suppose the cor- responding DARE (1.2) has a weakly stabilizing Hermitian solution X with property (P). Then, the sequence {(Mk, Lk)} (see (2.4)) generated by Algo- rithm 2.1 satisfies

kMk(:, 1 : n) + Mk(:, n + 1 : 2n)Xk (4.27)

≤ O³ρ(Js)2k´+ O³2−k´→ 0, as k → ∞.

Proof. By the assumption it holds that (M, L) has a unique stable Lagrangian subspace of the form span³[I, XT]T´ satisfying (1.8), where Φ is similar to Js⊕ J1 as in (4.11). From (4.16) and (4.26), we have [I, XT]T and [Z1T, Z2T]T spanning the same Lagrangian subspace corresponding to Js⊕ J1. So, Z1 is invertible and X = Z2Z1−1.

To show (4.27), we partition Mk, Lk conformally with (4.26) into

Mk=

Mk,1 Mk,3 Mk,2 Mk,4

, Lk=

Lk,1 Lk,3 Lk,2 Lk,4

. (4.28)

Substituting (4.26) and (4.28) into (4.22), we have

(18)

Mk,1Z1+ Mk,3Z2= Lk,1Z1³Js2k ⊕ J12k´+ Lk,3Z2³Js2k ⊕ J12k´, (4.29a) (Mk,1Z3+ Mk,3Z4)³(JsH)2k ⊕ Iµ´= Lk,1hZ1(0`⊕ Γk) + Z3³I`⊕ J12k´i

+ Lk,3

hZ2(0`⊕ Γk) + Z4

³I`⊕ J12k´i,(4.29b) Mk,2Z1+ Mk,4Z2= Lk,2Z1³Js2k ⊕ J12k´+ Lk,4Z2³Js2k ⊕ J12k´,

(4.29c) (Mk,2Z3+ Mk,4Z4)³(JsH)2k ⊕ Iµ´= Lk,2hZ1(0`⊕ Γk) + Z3³I`⊕ J12k´i

+ Lk,4hZ2(0`⊕ Γk) + Z4³I`⊕ J12k´i.(4.29d) Postmultiplying (4.29b) by ³0`⊕ Γ−1k J12k´Z1−1 to eliminate Lk,1Z1³0`⊕ J12k´ and Lk,3Z2³0`⊕ J12k´in (4.29a), we get

Mk,1+ Mk,3X = (Mk,1Z3+ Mk,3Z4)³0`⊕ Γ−1k J12k´Z1−1 (4.30)

− (Lk,1Z3+ Lk,3Z4)³0`⊕ J12kΓ−1k J12k´Z1−1 + (Lk,1Z1+ Lk,3Z2)³Js2k ⊕ 0µ´Z1−1. Similarly, from (4.29c) and (4.29d), we obtain

Mk,2+ Mk,4X = (Mk,2Z3+ Mk,4Z4)³0`⊕ Γ−1k J12k´Z1−1 (4.31)

− (Lk,2Z3+ Lk,4Z4)³0`⊕ J12kΓ−1k J12k´Z1−1 + (Lk,2Z1+ Lk,4Z2)³Js2k ⊕ 0µ´Z1−1.

By Algorithm 2.1 or 2.4, we deduce that Lk = L∗,k−1Lk−1, Mk= M∗,k−1Mk−1 with kL∗,k−1k ≤ 1 and kM∗,k−1k ≤ 1 for all k. So we have kLkk ≤ kL0k, kMkk ≤ kM0k and therefore kMk,ik and kLk,ik are bounded, for i = 1, . . . , 4.

From (4.30)–(4.31) and Lemma 4.4, assertion (4.27) follows.

Theorem 4.2 Let (M, L) be given in (1.5) satisfying (A2). Suppose the cor- responding DARE (1.2) and the dual DARE

Y = AY (I + HY )−1AH + G (4.32)

have weakly stabilizing Hermitian solutions X and Y with property (P), re- spectivly. If the sequence {(Ak, Gk, Hk)} generated by Algorithm 2.2 (see (2.9)) is well-defined, then

(i) kAkk ≤ O(2−k) → 0, as k → ∞,

(ii) kX − Hkk ≤ O³ρ(Js)2k´+ O(2−k) → 0, as k → ∞,

參考文獻

相關文件

A factorization method for reconstructing an impenetrable obstacle in a homogeneous medium (Helmholtz equation) using the spectral data of the far-field operator was developed

A factorization method for reconstructing an impenetrable obstacle in a homogeneous medium (Helmholtz equation) using the spectral data of the far-eld operator was developed

11[] If a and b are fixed numbers, find parametric equations for the curve that consists of all possible positions of the point P in the figure, using the angle (J as the

You are given the wavelength and total energy of a light pulse and asked to find the number of photons it

&#34;Extensions to the k-Means Algorithm for Clustering Large Data Sets with Categorical Values,&#34; Data Mining and Knowledge Discovery, Vol. “Density-Based Clustering in

Wang, Solving pseudomonotone variational inequalities and pseudocon- vex optimization problems using the projection neural network, IEEE Transactions on Neural Networks 17

Define instead the imaginary.. potential, magnetic field, lattice…) Dirac-BdG Hamiltonian:. with small, and matrix

incapable to extract any quantities from QCD, nor to tackle the most interesting physics, namely, the spontaneously chiral symmetry breaking and the color confinement.. 