09.07.2015 Views

Robust Optimization: Design in MEMS - University of California ...

Robust Optimization: Design in MEMS - University of California ...

Robust Optimization: Design in MEMS - University of California ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Robust</strong> <strong>Optimization</strong>:<strong>Design</strong> <strong>in</strong> <strong>MEMS</strong>byPeter Josef SedivecB.S. (<strong>University</strong> <strong>of</strong> <strong>California</strong>, Berkeley) 2000A report submitted <strong>in</strong> partial satisfaction <strong>of</strong> therequirements for the degree <strong>of</strong>Master <strong>of</strong> Science, Plan II<strong>in</strong>Mechanical Eng<strong>in</strong>eer<strong>in</strong>g<strong>in</strong> theGRADUATE DIVISION<strong>of</strong> theUNIVERSITY OF CALIFORNIA, BERKELEYCommittee <strong>in</strong> charge:Pr<strong>of</strong>essor Andrew Packard, ChairPr<strong>of</strong>essor George JohnsonPr<strong>of</strong>essor Panos PapadopoulosDecember 2002


1Abstract<strong>Robust</strong> <strong>Optimization</strong>:<strong>Design</strong> <strong>in</strong> <strong>MEMS</strong>byPeter Josef SedivecMaster <strong>of</strong> Science, Plan II <strong>in</strong> Mechanical Eng<strong>in</strong>eer<strong>in</strong>g<strong>University</strong> <strong>of</strong> <strong>California</strong>, BerkeleyPr<strong>of</strong>essor Andrew Packard, ChairThis report <strong>in</strong>troduces a robust design technique for micro-electro-mechanical systems(<strong>MEMS</strong>) subject to <strong>in</strong>herent geometric and material uncerta<strong>in</strong>ties. Althoughdesign has played an important role <strong>in</strong> <strong>MEMS</strong> development, little has been done toaccount for the uncerta<strong>in</strong>ties associated with <strong>MEMS</strong> fabrication. Current fabricationtechniques have poor dimensional tolerances and material properties at the microscaleare not well characterized. The robust design problem we pose is to m<strong>in</strong>imizethe expected variance between the actual and target system performance.After a few assumptions, the robust design problem can be written as a constra<strong>in</strong>edm<strong>in</strong>imization. We consider a subset <strong>of</strong> these problems and design an algorithm tom<strong>in</strong>imize rational polynomial functions subject to polynomial <strong>in</strong>equality constra<strong>in</strong>ts.In this report we give a detailed outl<strong>in</strong>e <strong>of</strong> the algorithm, verify its performance ontwo standard optimization test problems.F<strong>in</strong>ally, we conclude with two <strong>MEMS</strong> design problems that illustrate our robustdesign technique and optimization algorithm. These examples show that the robustdesigns nom<strong>in</strong>ally meet the target performance and are significantly less sensitive togeometric uncerta<strong>in</strong>ties than typical designs.


36 Conclusion 46Bibliography 48A Alkylation Constants 50


4List <strong>of</strong> Figures4.1 Inventory Control M<strong>in</strong>imization Results. . . . . . . . . . . . . . . . . 245.1 Diagram <strong>of</strong> Two DOF Resonator. . . . . . . . . . . . . . . . . . . . . 295.2 Feasible design space for 2 DOF resonator and target frequency. . . . 315.3 Sensitivity cost term, s(x, Σ), on the <strong>in</strong>variant set c 2 (x) = 0 for the 2DOF resonator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325.4 3D plot <strong>of</strong> total cost as a function <strong>of</strong> design variables. . . . . . . . . . 335.5 Several different paths taken to f<strong>in</strong>d the solution from different <strong>in</strong>itialconditions. The start<strong>in</strong>g po<strong>in</strong>ts are label with numbers on the plot. . 345.6 Diagram <strong>of</strong> Six Variable Crab-leg Resonator. . . . . . . . . . . . . . . 365.7 Four unique crab-leg resonator designs from Φ 1000 . . . . . . . . . . . . 395.8 Illustration depict<strong>in</strong>g under and overetch <strong>of</strong> a beam with an end-mass. 415.9 Illustration <strong>of</strong> the robust designs and two designs from Φ 1000 . . . . . . 425.10 Histogram <strong>of</strong> the sensitivity cost term, s(x, Σ U ), for the set Φ 1000 . . . 435.11 Distributions <strong>of</strong> crab-leg resonant frequencies subject to uncorrelateduncerta<strong>in</strong>ty. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445.12 Distributions <strong>of</strong> crab-leg resonant frequencies subject to correlated uncerta<strong>in</strong>ty.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45


5List <strong>of</strong> Tables3.1 Probabilities with which a search strategy is chosen. . . . . . . . . . . 184.1 Solutions with<strong>in</strong> a given tolerance <strong>of</strong> the published solution, f p . . . . 265.1 <strong>Design</strong> parameters for 2 DOF resonator. . . . . . . . . . . . . . . . . 315.2 <strong>Design</strong> constra<strong>in</strong>ts for crab-leg resonator. . . . . . . . . . . . . . . . . 375.3 <strong>Design</strong> parameters for crab-leg resonator. . . . . . . . . . . . . . . . . 37A.1 Constants c i for i = 1 . . . 44 for the Alkylation Process <strong>Design</strong> . . . . 50


6AcknowledgementsThis material is based upon work supported by the National Science Foundation(NSF) under Grant No. 0087038.


7Chapter 1IntroductionMicro-electro-mechanical systems (<strong>MEMS</strong>) is a new field that <strong>in</strong>tegrates mechanicalsystems and electronics through a silicon substrate us<strong>in</strong>g a micr<strong>of</strong>abrication technique[1]. This new field largely emerged after polycrystall<strong>in</strong>e silicon was discoveredto have excellent mechanical properties [2]. This realization prompted experimentation<strong>of</strong> many simple mechanical devices such as the double-folded flexure resonator[3]. The <strong>MEMS</strong> community was able to borrow substantially from the relativelymature IC <strong>in</strong>dustry and as a result grew quickly. The cutt<strong>in</strong>g edge <strong>of</strong> <strong>MEMS</strong> technologycurrently <strong>in</strong>corporates over 100 different materials and numerous fabricationprocesses. Some examples <strong>of</strong> current <strong>MEMS</strong> devices <strong>in</strong>cludes 3-axis accelerometers,micr<strong>of</strong>luidics, fold<strong>in</strong>g mirrors, biomedical needles, micromotors, optical switches andgyroscopes. A good overview on the field <strong>of</strong> <strong>MEMS</strong> can be found <strong>in</strong> [4].While uncerta<strong>in</strong>ty is <strong>in</strong>herent <strong>in</strong> all systems, it is particularly important <strong>in</strong> <strong>MEMS</strong>design for several reasons. First, there is the issue <strong>of</strong> scale. While most <strong>MEMS</strong> featuresare on the order <strong>of</strong> micrometers, typical geometric tolerances for most processes areon the order <strong>of</strong> tenths <strong>of</strong> microns [5]. With m<strong>in</strong>imum feature sizes <strong>of</strong> 2 microns, therelative uncerta<strong>in</strong>ty can reach 5% or more which is embarrass<strong>in</strong>g when compared withmacroscopic manufactur<strong>in</strong>g techniques.Second, the materials used <strong>in</strong> <strong>MEMS</strong> devices are poorly characterized. This islargely a result <strong>of</strong> the <strong>in</strong>fancy <strong>of</strong> the field and the number <strong>of</strong> new materials andprocesses be<strong>in</strong>g used. We are well aware that metals, plastics, and other material


8properties are largely dependent on how they are manufactured, similarly the properties<strong>of</strong> <strong>MEMS</strong> materials are dependent on how they are fabricated. With a number <strong>of</strong>developments occurr<strong>in</strong>g <strong>in</strong> the past 15 years, the characterization <strong>of</strong> mechanical, electrical,and thermal properties has barely scratched the surface for the overwhelm<strong>in</strong>gcomb<strong>in</strong>ations <strong>of</strong> materials and processes. Further complicat<strong>in</strong>g the characterizationprocess is the difficulty <strong>of</strong> mak<strong>in</strong>g measurements at the micrometer scale. For thesereasons, most micr<strong>of</strong>abrication materials have large uncerta<strong>in</strong>ties associated with theirproperties. For example, Sharpe and Jackson [6] characterized polycrystall<strong>in</strong>e silicon<strong>in</strong> the MUMPs R process and measured values <strong>of</strong> 162 ± 14 GPa for Young’s modulusand 1.56 ± 0.25 GPa for tensile strength, which are relative uncerta<strong>in</strong>ties <strong>of</strong> 9% and16%, respectively.F<strong>in</strong>ally, there are several other sources <strong>of</strong> uncerta<strong>in</strong>ty such as surface roughness,side-wall etch angle, and gra<strong>in</strong> size. These factors, however, are typically much morecomplicated and difficult to characterize than the aforementioned two.Uncerta<strong>in</strong>ty is clearly significant at the micro-scale, however it is <strong>of</strong>ten neglected<strong>in</strong> the <strong>MEMS</strong> design process. In order to design highly reliable systems that can befabricated with high yields, it will be necessary to account for the effects <strong>of</strong> uncerta<strong>in</strong>tyespecially with the current trends to make more complex and <strong>in</strong>tegrated systems. Inthis report we will address a strategy for robust design through optimization. Ourfocus will be on dimensional and material uncerta<strong>in</strong>ties.


10performance, f(x, 0), is equal to f(x).methods <strong>of</strong> deriv<strong>in</strong>g f(x, δ) from f(x).Later <strong>in</strong> this chapter we will show severalThe robust design problem that we aim to solve is to m<strong>in</strong>imize the expected value<strong>of</strong> the squared error between the actual and target performance. We can write thisasm<strong>in</strong>xE ( f(x, δ) − ¯f ) 2subject to g i (x) ≤ 0 (2.3)where ¯f is the target performance we would like the system to operate at, and theexpectation is taken over the random vector δ. We will assume that the uncerta<strong>in</strong>ty,δ, can be characterized as a random vector with the follow<strong>in</strong>g statisticsE(δ) = 0 r×1E(δδ T ) = Σ ∈ IR r×rwhere Σ is the covariance matrix and is positive semi-def<strong>in</strong>ite. If the uncerta<strong>in</strong>tiesare uncorrelated then Σ is diagonal, otherwise correlation exists when the <strong>of</strong>f-diagonalentries are non-zero.The problem posed <strong>in</strong> (2.3) is a difficult optimization to solve <strong>in</strong> the general. Tosimplify the problem we chose to approximate f(x, δ) with a first-order Taylor seriesexpansion <strong>in</strong> δ asf(x, δ) ≈ f(x, 0) + ∇ 2 f(x, 0)δ (2.4)where ∇ 2 f(x, 0) is the gradient <strong>of</strong> f(x, δ) with respect to δ. Us<strong>in</strong>g this approximationwe can expand the expression ( f(x, δ) − ¯f ) 2, from equation (2.3), <strong>in</strong>to( 2 (f(x, 0) − ¯f) + 2 f(x, 0) − ¯f) ∇2 f(x, 0)δ + ∇ 2 f(x, 0)δδ T ∇ T 2 f(x, 0) (2.5)Tak<strong>in</strong>g the expectation <strong>of</strong> equation (2.5) yields(f(x, 0) − ¯f)2+ 2(f(x, δ) − ¯f) ∇2 f(x, 0)E(δ) + ∇ 2 f(x, 0)E(δδ T )∇ T 2 f(x, 0) (2.6)By reduc<strong>in</strong>g equation (2.6), based on our assumptions about the mean and covariance<strong>of</strong> δ, we can writeE ( f(x, δ) − ¯f ) 2≈(f(x, 0) − ¯f)2+ ∇2 f(x, 0)Σ∇ T 2 f(x, 0) (2.7)


11Substitut<strong>in</strong>g the approximation <strong>in</strong> (2.7), back <strong>in</strong>to the orig<strong>in</strong>al design problem posed<strong>in</strong> (2.3) yields( (f(x, )2m<strong>in</strong> 0) − ¯f) + ∇2 f(x, 0)Σ∇ T 2 f(x, 0)xsubject to g i (x) ≤ 0 (2.8)S<strong>in</strong>ce f(x, δ) is a rational polynomial, the objective function we wish to m<strong>in</strong>imize<strong>in</strong> (2.8) is also a rational polynomial <strong>in</strong> x. F<strong>in</strong>ally, to non-dimensionalize the costfunction, we chose to divide through by ¯f 2 . We will refer to the follow<strong>in</strong>g expressionas our robust design problem( (f(x, 0) − ¯fm<strong>in</strong>x¯f) 2+ 1¯f 2(∇ 2 f(x, 0)Σ∇ T 2 f(x, 0)) ) subject to g i (x) ≤ 0 (2.9)Clearly, the expression we wish to m<strong>in</strong>imize has two dist<strong>in</strong>ct terms. For notationalconvenience, we will label the two terms asc 2 (x) :=s(x, Σ) := 1¯f 2( ) 2f(x,0)− ¯f¯f(∇2 f(x)Σ∇ T 2 f(x) ) (2.10)With the above def<strong>in</strong>itions the robust problem posed <strong>in</strong> (2.9) becomesm<strong>in</strong>xc 2 (x) + s(x, Σ) subject to g i (x) ≤ 0 (2.11)The first term, c 2 (x), penalizes deviation <strong>of</strong> the nom<strong>in</strong>al solution, f(x, 0), from thetarget, ¯f, while the second term, s(x, Σ), penalizes the sensitivity <strong>of</strong> the design withrespect to δ. The first term is non-negative and is zero when f(x, 0) = ¯f. The secondterm is also non-negative, because Σ is positive semi-def<strong>in</strong>ite. We therefore see thatthe objective, c 2 (x) + s(x, Σ), is lower-bounded by zero. S<strong>in</strong>ce the cost function isthe sum <strong>of</strong> two terms, there will typically be a trade-<strong>of</strong>f between f<strong>in</strong>d<strong>in</strong>g a designthat m<strong>in</strong>imizes the squared error <strong>of</strong> the nom<strong>in</strong>al design and one that reduces thesensitivity.2.2 Uncerta<strong>in</strong>ty ModelsAt the beg<strong>in</strong>n<strong>in</strong>g <strong>of</strong> this section we <strong>in</strong>troduced f(x) and f(x, δ) as the nom<strong>in</strong>al anduncerta<strong>in</strong> objective functions, respectively. We will now show that given an objective


12function f(x), there are several ways to <strong>in</strong>corporate uncerta<strong>in</strong>ty while ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>gthe rational polynomial structure. Two common uncerta<strong>in</strong>ty models for which thisholds true are additive and multiplicative models. <strong>Design</strong> variables subject to additiveuncerta<strong>in</strong>ty can be written as˜x i = x i + δ iwhere ˜x i is an uncerta<strong>in</strong> variable and δ i is the associated uncerta<strong>in</strong>ty with x i . Formultiplicative uncerta<strong>in</strong>ty the model is˜x i = (1 + δ i )x iAny polynomial function can be expressed as a sum <strong>of</strong> monomials, written as(T∑ n)∏h(x) = β tt=1i=1x α t,ii(2.12)where T is the number <strong>of</strong> monomials, β t is the coefficient for the t th monomial, α t,i isthe power <strong>of</strong> the x i <strong>in</strong> the t th monomial, and n is the dimension <strong>of</strong> x. S<strong>in</strong>ce h(x) is apolynomial, the matrix α conta<strong>in</strong>s elements from the set <strong>of</strong> non-negative <strong>in</strong>tegers.Let us assume that the first n a variables have additive uncerta<strong>in</strong>ty, the next n mvariables have multiplicative uncerta<strong>in</strong>ty, and the rema<strong>in</strong><strong>in</strong>g (n − n a − n m ) variableshave no uncerta<strong>in</strong>ty. Substitut<strong>in</strong>g the additive and multiplicative models given above<strong>in</strong>to the general polynomial h(x), we f<strong>in</strong>d thath(x, δ) =(T∑ ∏ naβ t (x i + δ i ) α t,it=1i=1n a+n∏ mi=n a+1(1 + δ i ) α t,ix α t,i<strong>in</strong>∏i=n a+n m+1Clearly, h(x, δ) is polynomial <strong>in</strong> x and δ, and therefore we see that by us<strong>in</strong>g an additiveand/or multiplicative uncerta<strong>in</strong>ty model does not change the polynomial structure <strong>of</strong>a function.In addition to uncerta<strong>in</strong>ty <strong>in</strong> design variables, it is common for it to appear <strong>in</strong>constants. For example, density, Young’s modulus, gravity, and aerodynamic coefficients,to name a few, all have associated uncerta<strong>in</strong>ties. Most uncerta<strong>in</strong> constants areexpressed as˜β t = β t + ɛ tx α t,ii)


13where ˜β t is the actual value, β t is the nom<strong>in</strong>al value, and ɛ t represents the error.Referr<strong>in</strong>g to our general polynomial h(x) from equation (2.12), let us assume the firstT u coefficients are uncerta<strong>in</strong>. We can therefore write(∑h(x, δ, ɛ) = T ∏ naβ t (x i + δ i ) α t,it=1∑+ Tut=1i=1(∏ naɛ t (x i + δ i ) α t,ii=1n a+n ∏ mi=n a+1n a+n m∏i=n a+1(1 + δ i ) α t,ix α t,i(1 + δ i ) α t,ix α t,ii<strong>in</strong>∏i=n a+n m+1n∏i=n a+n m+1The expression for h(x, δ, ɛ) is polynomial <strong>in</strong> x, δ, and ɛ. We can def<strong>in</strong>e δ h to be[δ h = δand the dimension <strong>of</strong> δ h is (n a + n m + T u ).ɛ] Tx α t,iix α t,iiIn this section we showed that givena polynomial, it is trivial to add uncerta<strong>in</strong>ty to the design variables and constantswhile ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g the polynomial structure. This allows us to consider problems <strong>of</strong>the form posed <strong>in</strong> (2.1), and then later add uncerta<strong>in</strong>ty to the objective and ma<strong>in</strong>ta<strong>in</strong>the rational polynomial structure presented <strong>in</strong> equation (2.2).))


14Chapter 3<strong>Optimization</strong> AlgorithmIn this section we present the details <strong>of</strong> an algorithm designed to m<strong>in</strong>imize rationalpolynomial functions subject to polynomial <strong>in</strong>equality constra<strong>in</strong>ts. A mathematicalformulation for this class <strong>of</strong> problems ism<strong>in</strong>xN(x)D(x)subject to g i (x) ≤ 0 (3.1)where x ∈ IR n , and N(x), D(x), and g i (x) are multi-variable polynomials. The underly<strong>in</strong>gpr<strong>in</strong>ciple for the algorithm is that the problem posed <strong>in</strong> (3.1) is trivial to solvewhen x is a scalar. We will show that the scalar problem can be computed efficientlyand exactly by exploit<strong>in</strong>g the polynomial structure <strong>of</strong> the objective function and constra<strong>in</strong>ts.In addition, we will expla<strong>in</strong> how the algorithm uses the scalar problem todo global l<strong>in</strong>e searches <strong>in</strong> IR n , and how the search directions are chosen.A brief outl<strong>in</strong>e <strong>of</strong> the algorithm follows:1. The algorithm is <strong>in</strong>itialized at a start<strong>in</strong>g po<strong>in</strong>t x 0 .2. A search direction, v k , is chosen.3. A s<strong>in</strong>gle variable l<strong>in</strong>e search is done along x(t) = x k−1 + tv km<strong>in</strong>tN(t)D(t) s.t. g i(t) ≤ 04. When a feasible m<strong>in</strong>imum, t ∗ , is found, x k = x k−1 + t ∗ v k , otherwise x k = x k−1 .


155. Steps 2-4 are repeated until a stopp<strong>in</strong>g criteria is met. The subscript k representsthe iteration, hence at the k th iteration x k represents the current m<strong>in</strong>imumand v k was the search direction.3.1 Choos<strong>in</strong>g a Start<strong>in</strong>g Po<strong>in</strong>tThe first step is to choose a start<strong>in</strong>g po<strong>in</strong>t, x 0 , to <strong>in</strong>itialize the search. Thealgorithm was designed to start from a feasible po<strong>in</strong>t. We consider f<strong>in</strong>d<strong>in</strong>g a feasiblepo<strong>in</strong>t, given a set <strong>of</strong> constra<strong>in</strong>ts, to be a separate problem, and thus have not addressedit. Once a start<strong>in</strong>g po<strong>in</strong>t has been chosen, the algorithm enters the ma<strong>in</strong> loop whereit repeatedly chooses a direction and does a l<strong>in</strong>e search.3.2 Select<strong>in</strong>g a Search DirectionEach time the algorithm does a l<strong>in</strong>e search, it must first chose a direction to search<strong>in</strong>. This choice is by far the biggest <strong>in</strong>fluence on how well the algorithm performs.Ideally the direction chosen would pass through the constra<strong>in</strong>ed global m<strong>in</strong>ima andthe algorithm would term<strong>in</strong>ate after only a s<strong>in</strong>gle l<strong>in</strong>e search. This however is wishfulth<strong>in</strong>k<strong>in</strong>g and hence an <strong>in</strong>terest<strong>in</strong>g problem arises, “how to best chose a direction?” Inthis section we will describe our approach for choos<strong>in</strong>g a direction, which comb<strong>in</strong>esseveral strategies.3.2.1 Coord<strong>in</strong>ate-wise StrategyThe first strategy is to choose a direction aligned with a s<strong>in</strong>gle design variable.This is the simplest strategy, and is accomplished by sett<strong>in</strong>g v to the zero vector andthen randomly choos<strong>in</strong>g a s<strong>in</strong>gle entry <strong>of</strong> v to be one. The result <strong>of</strong> this is a searchalong a s<strong>in</strong>gle design variable. We will refer to this strategy as the coord<strong>in</strong>ate-wisesearch.Search<strong>in</strong>g coord<strong>in</strong>ate-wise has several benefits. The most obvious benefit is thatsearch<strong>in</strong>g along a s<strong>in</strong>gle design variable allows that variable to be optimized, ceteris


16paribus. This can be very effective on variables that are <strong>in</strong>volved <strong>in</strong> a few constra<strong>in</strong>tsor less. When this is the case, these variables can usually be optimized <strong>in</strong>dependentlywithout violat<strong>in</strong>g a constra<strong>in</strong>t, whereas random or gradient based searches will likelyviolate a constra<strong>in</strong>t when other variables are heavily constra<strong>in</strong>ed. A second benefit <strong>of</strong>the coord<strong>in</strong>ate-wise search is that it is unaffected by poor scal<strong>in</strong>g among the designvariables. The last ma<strong>in</strong> benefit is that the transformation x = x k−1 + tv k is faster tocompute and the result<strong>in</strong>g l<strong>in</strong>e-search is generally easier to solve.3.2.2 Random StrategyThe second strategy is to chose a purely random direction. This is done by pick<strong>in</strong>gn random numbers that are uniformly distributed on the <strong>in</strong>terval [−1, 1], and scal<strong>in</strong>gthem accord<strong>in</strong>g to the relative size <strong>of</strong> the design variables. We will refer to this asthe random search.It is common for design variables to have different magnitudes and it is necessaryto account for this scal<strong>in</strong>g. Simply chang<strong>in</strong>g units can affect the scal<strong>in</strong>g <strong>of</strong> a problem.Poorly scaled optimization problems are usually very difficult to solve [7]. One methodfor deal<strong>in</strong>g with poorly scaled problems is to normalize the variables and recast theproblem <strong>in</strong>to an equivalent problem where all <strong>of</strong> the variables are <strong>in</strong> the unit cube. Wehave chosen to account for the relative scal<strong>in</strong>g <strong>of</strong> design variables through a diagonalmatrix, Ψ. The diagonal entries <strong>of</strong> Ψ represent the relative scale between designvariables. Currently Ψ needs to be set prior to runn<strong>in</strong>g the optimization, otherwisethe scal<strong>in</strong>g <strong>of</strong> the variables is assumed equal, Ψ = I. The search direction, v, for therandom strategy can then be written as v = Ψw, where w is a uniformly distributedrandom vector <strong>in</strong> IR n on the <strong>in</strong>terval [−1, 1].One <strong>of</strong> the biggest pitfalls <strong>of</strong> the random search is that it does very poorly onproblems with small feasible regions and numerous constra<strong>in</strong>ts. As the number <strong>of</strong>constra<strong>in</strong>ts <strong>in</strong>creases, the probability that the random strategy chooses a feasiblesearch direction typically decreases.


173.2.3 Constra<strong>in</strong>ed Random StrategyThe third strategy is a variation <strong>of</strong> the random search because it attempts tochoose a direction that does not violate active l<strong>in</strong>ear constra<strong>in</strong>ts. At first, this strategymight not seem beneficial for problems with only nonl<strong>in</strong>ear constra<strong>in</strong>ts; however,s<strong>in</strong>ce variable bounds <strong>of</strong> the form L ≤ x ≤ U are l<strong>in</strong>ear constra<strong>in</strong>ts, most problemsrealize some benefit. S<strong>in</strong>ce we are search<strong>in</strong>g along an aff<strong>in</strong>e function, specificallyx(t) = x k−1 + tv k , we can choose a random direction <strong>in</strong> the hyperplane tangent tothe active l<strong>in</strong>ear constra<strong>in</strong>ts. We will refer to this strategy as the constra<strong>in</strong>ed randomsearch.The implementation requires some basic l<strong>in</strong>ear algebra with which we assume thereader is familiar. First, the set active l<strong>in</strong>ear constra<strong>in</strong>ts, Γ, is def<strong>in</strong>ed to beΓ := {α j : g i (x k−1 ) = αj T x k−1 + c k , −ɛ ≤ g i (x k−1 ) ≤ 0} (3.2)where α j ∈ IR n are the coefficients for the j th active l<strong>in</strong>ear constra<strong>in</strong>t, c k is a constant,and ɛ is the tolerance used to determ<strong>in</strong>e if a constra<strong>in</strong>t is active. Assum<strong>in</strong>g there arel active l<strong>in</strong>ear constra<strong>in</strong>ts, the next step is to stack the coefficients, α k , <strong>in</strong> a matrixH asH := [α 1 α 2 . . . α l ] T (3.3)To choose a direction tangent to the active l<strong>in</strong>ear constra<strong>in</strong>ts, v needs to be chosensuch that it lies <strong>in</strong> the null-space <strong>of</strong> H, N (H), [8]. Such a choice implies that Hv = 0,and hence the l<strong>in</strong>e search will not violate any active l<strong>in</strong>ear constra<strong>in</strong>ts. In order toma<strong>in</strong>ta<strong>in</strong> the scal<strong>in</strong>g discussed above, v is chosen as described for the random searchstrategy and then projected onto the range <strong>of</strong> the N (H). The N (H) is found bydo<strong>in</strong>g a s<strong>in</strong>gular value decomposition <strong>of</strong> H. The f<strong>in</strong>al expression used to compute vcan be written asv = V V T Ψw (3.4)where V is a basis for the N (H) and w ∈ R n is a uniformly distributed random vector<strong>in</strong> the unit cube. When there are no active l<strong>in</strong>ear constra<strong>in</strong>ts, equation (3.4) reducesto v = Ψw. When the N (H) is the empty set, this implies that a tangent hyperplane


18to the active l<strong>in</strong>ear constra<strong>in</strong>ts does not exist. In this case, the algorithm defaults tous<strong>in</strong>g the random search strategy.3.2.4 Steepest-descent StrategyThe f<strong>in</strong>al strategy is a steepest-decent method. S<strong>in</strong>ce the gradient <strong>of</strong> the objectivefunction represents the direction <strong>of</strong> steepest ascent, search<strong>in</strong>g along the negative <strong>of</strong>this vector yields the direction <strong>of</strong> steepest-decent. The expression for v is then givenbyv k = ∇ N(x)∣D(x)∣x=x0We have <strong>in</strong>cluded this method because it is usually efficient at f<strong>in</strong>d<strong>in</strong>g local m<strong>in</strong>ima.More <strong>in</strong>formation on this technique can be found <strong>in</strong> [9].3.2.5 Search Strategies IntegrationF<strong>in</strong>ally, we will expla<strong>in</strong> how the strategies are <strong>in</strong>tegrated <strong>in</strong>to a s<strong>in</strong>gle method tochoose a direction. Each time the algorithm needs to generate a new direction, one <strong>of</strong>the strategies is selected randomly with a specified probability. Table (3.1) lists theprobabilities associated with each strategy. These probabilities were chosen becausethey performed best on a set <strong>of</strong> test problems.strategyprobabilitycoord<strong>in</strong>ate-wise 0.2random 0.3constra<strong>in</strong>ed random 0.3steepest-decent 0.2Table 3.1: Probabilities with which a search strategy is chosen.Once a direction, v, has been chosen, the objective function and constra<strong>in</strong>ts aretransformed from multi-variable polynomials to s<strong>in</strong>gle variable polynomials us<strong>in</strong>gx(t) = x k−1 + tv (3.5)


19where x k−1 was the current m<strong>in</strong>imum at the last iteration. The s<strong>in</strong>gle variable optimizationproblem ism<strong>in</strong>tN(t)D(t)s.t. g i (t) ≤ 0 (3.6)We will refer to this problem as a l<strong>in</strong>e search <strong>in</strong> IR n . This rational polynomial m<strong>in</strong>imization<strong>in</strong> one variable, subject to polynomial constra<strong>in</strong>ts is easy to solve <strong>in</strong> closedform.3.3 Exact L<strong>in</strong>e Search M<strong>in</strong>imizationThe solution to the problem posed <strong>in</strong> equation (3.6) is presented here. We beg<strong>in</strong>by def<strong>in</strong><strong>in</strong>g the set <strong>of</strong> feasible po<strong>in</strong>ts, Ω i , for each constra<strong>in</strong>t, g i (t), asΩ i := {t : g i (t) ≤ 0} (3.7)Comput<strong>in</strong>g Ω i is done by f<strong>in</strong>d<strong>in</strong>g the real roots <strong>of</strong> g i (t), and then check<strong>in</strong>g the <strong>in</strong>tervalsbetween the roots to identify where g i (t) is negative.Assum<strong>in</strong>g that the roots <strong>of</strong> g i (t) can be computed numerically, the real roots,{λ r1 , λ r2 , . . . , λ rp }, satisfy g i (λ rk ) = 0 for k = 1, ..., p. Once the real roots are identified,the set Ω i can be found by simply check<strong>in</strong>g the sign <strong>of</strong> g i (t) on either side <strong>of</strong> λ rkfor k = 1, ..., p. Double roots are easily handled because the algorithm computes thesgn(g i (t)) on both sides <strong>of</strong> λ rk . If no real roots exist, then the function g i (t) is eitherstrictly positive, <strong>in</strong> which case Ω i is the empty set, or strictly negative which impliesΩ i ∈ IR. In this case, evaluat<strong>in</strong>g g i (0) is sufficient to determ<strong>in</strong>e the sign <strong>of</strong> g i (t) for allt. Stor<strong>in</strong>g Ω i is can be done by ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g a list <strong>of</strong> numbered pairs that representthe <strong>in</strong>tervals <strong>of</strong> feasible regions.Once all <strong>of</strong> the feasible sets have been found, the next step is to f<strong>in</strong>d their <strong>in</strong>tersection.We will def<strong>in</strong>e the <strong>in</strong>tersection to beΩ := Ω 1 ∩ Ω 2 ∩ ... ∩ Ω p (3.8)Ω is the set <strong>of</strong> feasible po<strong>in</strong>ts for which all the constra<strong>in</strong>ts are satisfied. If Ω is theempty set, then the search has failed because no where along the l<strong>in</strong>e x = x k−1 + tv


20can all the constra<strong>in</strong>ts be satisfied. Otherwise, the constra<strong>in</strong>ed m<strong>in</strong>imum, t ∗ , mustsatisfy t ∗ ∈ Ω.Assum<strong>in</strong>g the objective function is cont<strong>in</strong>uous on the set Ω, it can be differentiatedto f<strong>in</strong>d local m<strong>in</strong>ima and maxima. If the objective function is not cont<strong>in</strong>uous on Ω,this implies that there exists a ˆt ∈ Ω such that D(ˆt) = 0. Clearly this implies thatthe m<strong>in</strong>imum is −∞ and hence the optimization problem was poorly posed. Sett<strong>in</strong>gthe first derivative <strong>of</strong> N(t)D(t)to zero yieldsN ′ (t)D(t) − D ′ (t)N(t) = 0 (3.9)The real roots <strong>of</strong> (3.9) correspond to the po<strong>in</strong>ts at which local m<strong>in</strong>ima and maxima<strong>of</strong> N(t)D(t)are achieved. The real roots that are not <strong>in</strong> the set Ω are discarded becausethey are <strong>in</strong>feasible. F<strong>in</strong>d<strong>in</strong>g the constra<strong>in</strong>ed m<strong>in</strong>imum requires evaluat<strong>in</strong>g N(t)D(t)feasible real roots <strong>of</strong> (3.9) and the endpo<strong>in</strong>ts that def<strong>in</strong>e the set Ω.at theIf the l<strong>in</strong>e search is successful, then the current optimal design vector, x k , iscalculatedx k = x k−1 + t ∗ v kOtherwise, when the l<strong>in</strong>e search fails the current m<strong>in</strong>imum persists for the next iteration,x k = x k−1 . This is the end <strong>of</strong> a s<strong>in</strong>gle iteration and the algorithm cont<strong>in</strong>uesuntil a stopp<strong>in</strong>g criteria is met.3.4 Stopp<strong>in</strong>g CriteriaWe have put little focus <strong>in</strong>to the stopp<strong>in</strong>g criteria <strong>of</strong> the algorithm and thus thethree conditions we implemented are trivial. The first is to limit the maximum number<strong>of</strong> iterations. This is common among optimization packages. The second conditioncompares the value <strong>of</strong> the objective function aga<strong>in</strong>st a user supplied m<strong>in</strong>imum. Whena m<strong>in</strong>imum is known, or when a lower-bound can be computed, this can be suppliedto the algorithm as a stopp<strong>in</strong>g criteria.The last condition is a maximum number <strong>of</strong> iterations that the algorithm shouldattempt without improv<strong>in</strong>g the cost. This can actually be viewed, and implemented,


21<strong>in</strong> two different ways. One is to keep track and limit the total number <strong>of</strong> unsuccessfulsearches. A second method would be to limit the number <strong>of</strong> sequential searches thatfail.3.5 Algorithm SummaryTo summarize, we were able to exploit the polynomial structure <strong>of</strong> the objectivefunction and constra<strong>in</strong>ts which allowed us to f<strong>in</strong>d the feasible regions and m<strong>in</strong>imizethe objective function easily for the scalar problem. For problems <strong>in</strong> IR n , we used anaff<strong>in</strong>e transformation to do global l<strong>in</strong>e searches. The heart <strong>of</strong> the algorithm lies <strong>in</strong> thechoos<strong>in</strong>g the search direction, which is done each iteration. Because <strong>of</strong> the randomness<strong>in</strong>volved <strong>in</strong> choos<strong>in</strong>g search directions, the algorithm is not determ<strong>in</strong>istic.


22Chapter 4<strong>Optimization</strong> ExamplesWe will present several example problems <strong>in</strong> this section to illustrate our rationalpolynomial algorithm presented <strong>in</strong> chapter 3. These are pure optimization examples<strong>in</strong> constra<strong>in</strong>ed global m<strong>in</strong>imization and do not directly relate to the robust designproblem posed <strong>in</strong> chapter 2.4.1 Inventory Control ProblemThe first example is an <strong>in</strong>ventory control problem taken from [10]. The problemhas three non-negative design variables and a s<strong>in</strong>gle constra<strong>in</strong>t. We will def<strong>in</strong>e thedesign vector to be x = [x 1 x 2 x 3 ] T .Objective Functionm<strong>in</strong>xf(x) = 5x2 1x 2 x 3 + 50, 000x 2 x 3 + 20x 1 x 2 2x 3 + 72, 000x 1 x 3 + 10x 1 x 2 x 2 3 + 144, 000x 1 x 2x 1 x 2 x 3Variable Boundsx 1 ≥ 0x 2 ≥ 0x 3 ≥ 0


23Constra<strong>in</strong>tsg(x) = 4x 2 x 3 + 32x 1 x 3 + 120x 1 x 2 − x 1 x 2 x 3 ≤ 0For this problem, it is rather easy to choose a feasible start<strong>in</strong>g po<strong>in</strong>t. Sett<strong>in</strong>gx 0 = [160 160 160] T will satisfy the constra<strong>in</strong>t and variable bounds. Choos<strong>in</strong>g thescal<strong>in</strong>g, Ψ, is less <strong>in</strong>tuitive. With no a priori knowledge <strong>of</strong> the design variables, weassumed a uniform scal<strong>in</strong>g by lett<strong>in</strong>g Ψ = I 3 . The maximum number <strong>of</strong> iterationswas set to 500.The solution found was[x ∗ = 108.73 85.15 204.29f(x ∗ ) = 6299.8g(x ∗ ) = 0This result closely agrees with the published result given <strong>in</strong> [11]. From the value <strong>of</strong>g(x ∗ ) it is clear that the constra<strong>in</strong>t is active at the solution. In fact, the constra<strong>in</strong>t wasactive dur<strong>in</strong>g 97% <strong>of</strong> the optimization. The solution was found after 297 iterationswhich took approximately 1 second on a P4 1.8Ghz L<strong>in</strong>ux workstation. Figure (4.1)conta<strong>in</strong>s two plots that illustrate results from this example.The plot on the left demonstrates two characteristics <strong>of</strong> our algorithm. First, thevalue <strong>of</strong> the objective function will always monotonically decrease. Second, decreas<strong>in</strong>gthe cost function is typically trivial <strong>in</strong>itially, but becomes <strong>in</strong>creas<strong>in</strong>gly difficult. Ofthe 297 iterations required, there were 31 successful l<strong>in</strong>e searches where the algorithmsucceed <strong>in</strong> f<strong>in</strong>d<strong>in</strong>g a better cost. Sixteen <strong>of</strong> the successful searches occurred <strong>in</strong> thefirst 50 iterations <strong>of</strong> the optimization.The plot on the right <strong>in</strong> figure (4.1) illustrates how the design variables changedthroughout the optimization. After the first 50 iterations, the constra<strong>in</strong>t was activeand the cost decreased by roughly 1/2%. The small change <strong>in</strong> the value <strong>of</strong> theobjective function after the <strong>in</strong>itial iterations, and from <strong>in</strong>spection <strong>of</strong> the problem,one can conclude that the m<strong>in</strong>imum should occur along the constra<strong>in</strong>t. Because theconstra<strong>in</strong>t is nonl<strong>in</strong>ear, the algorithm is not able to search along the constra<strong>in</strong>t. Thisis one ma<strong>in</strong> limitation <strong>of</strong> the algorithm.] T


2475007300220200t 1t2t 37100180Cost69006700<strong>Design</strong> Variables160140120650010063000 100 200 300Iteration800 100 200 300IterationFigure 4.1: Inventory Control M<strong>in</strong>imization Results.4.2 Alkylation Process <strong>Design</strong>The next optimization problem was taken from “Handbook <strong>of</strong> Test Problems <strong>in</strong>Local and Global <strong>Optimization</strong>.” This example is a chemical eng<strong>in</strong>eer<strong>in</strong>g designproblem <strong>of</strong> an alkylation unit. The objective is to improve the octane number <strong>of</strong>some olef<strong>in</strong> feed by react<strong>in</strong>g it with isobutane <strong>in</strong> the presence <strong>of</strong> acid [12].Objective Functionm<strong>in</strong>xc 1 x 1 + c 2 x 1 x 6 + c 3 x 3 + c 4 x 2 + c 5 − c 6 x 3 x 5 (4.1)Variable Bounds1500 ≤ x 1 ≤ 20001 ≤ x 2 ≤ 1203000 ≤ x 3 ≤ 350085 ≤ x 4 ≤ 9390 ≤ x 5 ≤ 953 ≤ x 6 ≤ 12145 ≤ x 7 ≤ 162


25Constra<strong>in</strong>tsc 7 x 2 6 + c 8 x −11 − c 9 x 6 ≤ 1c 10 x 1 x −13 + c 11 x 1 x −13 x 6 − c 12 x 1 x −13 x 2 6 ≤ 1c 13 x 2 6 + c 14 x 5 − c 15 x 4 − c 16 x 6 ≤ 1c 17 x −15 + c 18 x −15 x 6 + c 19 x 4 x −15 − c 20 x −15 x 2 6 ≤ 1c 21 x 7 + c 22 x 2 x −13 x −14 − c 23 x 2 x −13 ≤ 1c 24 x −17 + c 25 x 2 x −13 x −17 − c 26 x 2 x −13 x −14 x −17 ≤ 1c 27 x −15 + c 28 x −15 x 7 ≤ 1c 29 x 5 + c 30 x 7 ≤ 1c 31 x 3 − c 32 x 1 ≤ 1c 33 x 1 x −13 + c 34 x −13 ≤ 1c 35 x 2 x −13 x −14 − c 36 x 2 x −13 ≤ 1c 37 x 4 + c 38 x −12 x 3 x 4 ≤ 1c 39 x 1 x 6 + c 40 x 1 − c 41 x 3 ≤ 1c 42 x −11 x 3 + c 43 x −11 − c 44 x 6 ≤ 1The parameters c i , i = 1, . . . , 44 are listed <strong>in</strong> appendix A. This problem hasseven design variables, each with upper and lower bounds. In addition, there are twol<strong>in</strong>ear and 12 non-l<strong>in</strong>ear constra<strong>in</strong>ts. The constra<strong>in</strong>ts are not written explicitly <strong>in</strong> theform g i (x) ≤ 0, but through algebraic manipulations they can easily be converted.The variable bounds also need to be transformed <strong>in</strong>to the form g i (x) ≤ 0. Eachupper and lower bound becomes a s<strong>in</strong>gle l<strong>in</strong>ear constra<strong>in</strong>t. This effectively adds 14l<strong>in</strong>ear constra<strong>in</strong>ts, which br<strong>in</strong>gs the total number <strong>of</strong> constra<strong>in</strong>ts to 28. The objectivefunction is a rational polynomial with D(x) = 1.Choos<strong>in</strong>g a feasible start<strong>in</strong>g po<strong>in</strong>t for this problem is nontrivial. We used a simpleapproach to generate a set <strong>of</strong> 100 unique po<strong>in</strong>ts. This was done by choos<strong>in</strong>g randomvectors with<strong>in</strong> the variable bounds, and then check<strong>in</strong>g to see if the constra<strong>in</strong>ts weresatisfied. This approach took an average <strong>of</strong> 20,000 guesses to generate a s<strong>in</strong>gle feasiblestart<strong>in</strong>g po<strong>in</strong>t. This is an <strong>in</strong>dication that the problem has a small feasible design space.The next step was to set the scal<strong>in</strong>g. From look<strong>in</strong>g at the variable bounds, it isclear that there are several different length scales. With no a priori knowledge <strong>of</strong> the


26design variables, other than the bounds, the most obvious scal<strong>in</strong>g appeared to be{ }Ui − L i , i = jΨ ij =0 , otherwisewhere U i and L i are the upper and lower bound for x i , respectively. This scal<strong>in</strong>gis similar to normaliz<strong>in</strong>g the variables.This approach expects that the change <strong>in</strong>a variable, relative to the other variables, will be proportional to the size <strong>of</strong> it’sfeasible region. While this certa<strong>in</strong>ly does not have to be true, it is usually a goodapproximation. The last step was to set the maximum number <strong>of</strong> iterations. We ranthe optimization twice, on a set <strong>of</strong> 100 unique, feasible start<strong>in</strong>g po<strong>in</strong>ts. The first timethe maximum number <strong>of</strong> iterations was set to 1200, and the second time to 15,000.For the 100 <strong>in</strong>itial conditions the best solution found by our algorithm was[] Tx ∗ = 1697.95 53.73 3031.12 90.12 95 10.48 153.54f(x ∗ ) = 1226.76This solution almost exactly matches the result published <strong>in</strong> [12]. Computationally,1200 iterations took approximately 17 seconds on a P4 1.8Ghz L<strong>in</strong>ux workstation,while 15,000 iterations took just over 200 seconds. This is a difficult optimizationproblem and therefore our algorithm found a number <strong>of</strong> local m<strong>in</strong>ima.f−f pf p1200 iter 15000 iter0.01 9% 60%0.02 18% 73%0.05 36% 82%0.10 57% 92%Table 4.1: Solutions with<strong>in</strong> a given tolerance <strong>of</strong> the published solution, f p .Table (4.1) is a comparison <strong>of</strong> success rates between the 1200 and the 15,000iteration cases. Success was def<strong>in</strong>ed as a solution be<strong>in</strong>g with<strong>in</strong> one, two, five or tenpercent <strong>of</strong> the published solution, f p . Clearly, allow<strong>in</strong>g the algorithm to iterate longerimproved the success rates. From the table we see that after 15,000 iterations 60% <strong>of</strong>our solutions were with<strong>in</strong> 1% <strong>of</strong> the published result.


27Similar to most non-convex optimization packages, when our algorithm is startedfrom different <strong>in</strong>itial conditions, it is likely to end up at different solutions. In addition,our algorithm is not determ<strong>in</strong>istic because <strong>of</strong> the randomness used <strong>in</strong> choos<strong>in</strong>g asearch direction. This results <strong>in</strong> different solutions be<strong>in</strong>g found from the same <strong>in</strong>itialcondition, whereas determ<strong>in</strong>istic algorithms will always follow the same path to asolution.


28Chapter 5<strong>Robust</strong> <strong>Design</strong> Examples5.1 Two Degree <strong>of</strong> Freedom <strong>MEMS</strong> ResonatorThe first example we will consider is a simple resonator with two degrees <strong>of</strong> freedom.Our objective is to robustly design the resonant frequency <strong>of</strong> this structure.This is not a difficult problem to solve <strong>in</strong> closed form, but is a good example that wewill use to illustrate our robust design technique presented <strong>in</strong> chapter 2. Additionalmotivation for study<strong>in</strong>g this problem is that with only two design variables it is easyto visualize.The two degree <strong>of</strong> freedom (DOF) resonator, illustrated <strong>in</strong> figure (5.1), consists<strong>of</strong> a pro<strong>of</strong> mass attached by two parallel beams to a fixed anchor. To simplify theproblem we assume that the pro<strong>of</strong> mass has a fixed area A, and that the thickness <strong>of</strong>the entire device is t. The two design variables are the beam width, h, and length,L, as shown <strong>in</strong> figure (5.1). We will def<strong>in</strong>e the design vector to be x = [h L] T .The natural frequency, w n , <strong>of</strong> the simple resonator can be approximated as √ k/M,where k is the comb<strong>in</strong>ed stiffness <strong>of</strong> the two parallel beams and M is the mass <strong>of</strong> thepro<strong>of</strong> mass. The expressions for k and M arek = 2Eth3L 3M = ρAtwhere E is Elastic Modulus and ρ is the density <strong>of</strong> the material used to fabricate theresonator. We will assume additive uncerta<strong>in</strong>ty <strong>in</strong> the design variables, and therefore


29AhLFigure 5.1: Diagram <strong>of</strong> Two DOF Resonator.we def<strong>in</strong>e an uncerta<strong>in</strong> design vector to bewhere δ = [δ h˜x = x + δ (5.1)δ L ]. S<strong>in</strong>ce our algorithm is designed for rational polynomial functions,we choose the uncerta<strong>in</strong> objective function, f(x, δ), to be w 2 n. The expression for w 2 n,<strong>in</strong> terms <strong>of</strong> x and δ, is given byf(x, δ) = w 2 n =( ) ( )2E (h + δh ) 3ρA (L + δ L ) 3We will assume that the design is subject to the follow<strong>in</strong>g constra<strong>in</strong>ts(5.2)h m<strong>in</strong> ≤ h ≤ h max10h ≤ L ≤ L max(5.3)These constra<strong>in</strong>ts have been imposed for illustrative purposes, however they could bethe result <strong>of</strong> <strong>MEMS</strong> design rules, die size requirements, fabrication limitations or anumber <strong>of</strong> other design factors.Now that we have a rational polynomial objective function and a set <strong>of</strong> constra<strong>in</strong>ts,we can pose the robust design problem that we would like to solve. This is essentially)a restatement <strong>of</strong> equation (2.9)( (f(x, ) 2 0) − ¯fm<strong>in</strong>+ 1¯f (∇x ¯f2 2 f(x, 0)Σ∇ T 2 f(x, 0))s.t. g i (x) ≤ 0 (5.4)


30where ¯f is the w 2 design , Σ is the uncerta<strong>in</strong>ty covariance matrix, and g i(x) are theconstra<strong>in</strong>ts. The constra<strong>in</strong>ts given <strong>in</strong> (5.3) can be written <strong>in</strong> a vector g(x) as⎡ ⎤h m<strong>in</strong> − hh − h maxg(x) =⎢⎣ 10h − L ⎥⎦L − L max(5.5)For simplicity we will assume that only the beam width, h, is uncerta<strong>in</strong>. Thecovariance matrix Σ is thereforeΣ =[σ2h 00 0](5.6)where σ h is the standard deviation <strong>of</strong> the uncerta<strong>in</strong>ty <strong>in</strong> h. The gradient <strong>of</strong> f(x, δ)with respect to δ is given by[∇ 2 f(x, 0) =6Eh 2ρAL 3]− 6Eh3ρAL 4(5.7)For this example we choose a target resonant frequency <strong>of</strong> 20kHz, approximately125,000 rad/s. The relevant design parameters are listed <strong>in</strong> table (5.1). For notationalconvenience, we once aga<strong>in</strong> refer to the two terms that make up the cost function <strong>in</strong>equation (5.4) asc 2 (x) =s(x, Σ) = 1¯f 2( ) 2f(x,0)− ¯f¯f(∇f(x)Σ∇ T f(x) )The term c 2 (x) is a measure <strong>of</strong> the deviation <strong>of</strong> the nom<strong>in</strong>al design, f(x, 0), fromthe target, ¯f, while s(x, Σ) is a measure <strong>of</strong> the sensitivity at the nom<strong>in</strong>al design.M<strong>in</strong>imiz<strong>in</strong>g c 2 (x) is equivalent to reduc<strong>in</strong>g the spread between the nom<strong>in</strong>al and targetfrequency. By choos<strong>in</strong>g the design variables such that f(x, 0) = ¯f, the c 2 (x) cost canbe elim<strong>in</strong>ated.We will beg<strong>in</strong> the analysis <strong>of</strong> this problem by look<strong>in</strong>g at the feasible design space.Figure (5.2) illustrates the four l<strong>in</strong>ear constra<strong>in</strong>ts given <strong>in</strong> equation (5.5). The feasibleregion is <strong>in</strong>side the quadrilateral and is clearly convex. The dashed l<strong>in</strong>e <strong>in</strong> figure (5.2)represents the set <strong>of</strong> designs that have a resonant frequency <strong>of</strong> 20 kHz. Mathematically,we can say that it is the set {x | f(x, 0) = ¯f}, and therefore the associated


31<strong>Design</strong> Parameter - DescriptionValueA - area <strong>of</strong> the pro<strong>of</strong> mass 10, 000 µm 2t - thickness <strong>of</strong> pro<strong>of</strong> mass and beams 2.0 µmρ - density <strong>of</strong> silicon (2330 kg/m 3 ) 2.3 × 10 −12 gm/µm 3E - Elastic Modulus <strong>of</strong> silicon 1.6 × 10 8 gm/µms 2h m<strong>in</strong> - m<strong>in</strong>imum dimension 2.0 µmh max - maximum beam width 20.0 µmL max - maximum beam length 500 µmσ h - standard deviation <strong>of</strong> the uncerta<strong>in</strong>ty <strong>in</strong> h 0.2 µmTable 5.1: <strong>Design</strong> parameters for 2 DOF resonator.c 2 (x) cost term is zero along this l<strong>in</strong>e. All designs above and to the left <strong>of</strong> the dashedl<strong>in</strong>e have resonant frequencies less than 20 kHz while those that lie to the right andbelow have higher resonant frequencies.550500450400350L (µm)30025020015010050target frequencyconstra<strong>in</strong>ts00 5 10 15 20h (µm)Figure 5.2: Feasible design space for 2 DOF resonator and target frequency.S<strong>in</strong>ce the c 2 (x) term is <strong>in</strong>variant along the dashed l<strong>in</strong>e <strong>in</strong> figure (5.2), we canlook at just the s(x, Σ) term to f<strong>in</strong>d the best design for this set. Figure (5.3) is aplot <strong>of</strong> s(x, Σ) as a function <strong>of</strong> h along the l<strong>in</strong>e c 2 (x) = 0. Clearly the sensitivity <strong>of</strong>the nom<strong>in</strong>al solution decreases as h <strong>in</strong>creases. Intuitively this makes sense because<strong>in</strong>creas<strong>in</strong>g the nom<strong>in</strong>al dimension will make h less sensitive to uncerta<strong>in</strong>ty. The best


32design along the l<strong>in</strong>e c 2 (x) = 0 is x = [5.3µm 500µm] T , which is along the constra<strong>in</strong>tL ≤ L max . This design however is not optimal with respect to the robust designproblem posed <strong>in</strong> (5.4).0.10.090.080.07S(x,Σ)0.060.050.040.030.020.012 2.5 3 3.5 4 4.5 5 5.5h (µm)Figure 5.3: Sensitivity cost term, s(x, Σ), on the <strong>in</strong>variant set c 2 (x) = 0 for the 2DOF resonator.Figure (5.4) is a 3-D plot <strong>of</strong> log 10 (c 2 (x) + s(x, Σ)) as a function <strong>of</strong> the designvariables. The valley seen <strong>in</strong> the 3-D plot roughly corresponds to the dashed l<strong>in</strong>e <strong>in</strong>figure (5.2). This valley is a result <strong>of</strong> the c 2 (x) term be<strong>in</strong>g nearly zero where f(x, 0)is close to ¯f. By writ<strong>in</strong>g out s(x, Σ)s(x, Σ) =( ) 2 ( )6Eδh h4ρA ¯f L 6it is obvious that s(x, Σ) <strong>in</strong>creases with <strong>in</strong>creas<strong>in</strong>g h or decreas<strong>in</strong>g L. As a result <strong>of</strong>this, the valley occurs slightly to the left and above the dashed l<strong>in</strong>e <strong>in</strong> figure (5.2). Inaddition, the cost associated with the s(x, Σ) term dom<strong>in</strong>ates when h is large and Lis small, which can be seen <strong>in</strong> figure (5.4).Visually, from look<strong>in</strong>g at figure (5.4), it is easy to see that a unique m<strong>in</strong>imizerexists for this constra<strong>in</strong>ed optimization problem. The m<strong>in</strong>imum is located along theL ≤ L max constra<strong>in</strong>t at x = [5.20µm 500µm] T . The associated cost is 1.316 × 10 −2and the resonant frequency is 19.9kHz. The reason the resonant frequency <strong>of</strong> our


3332log 10(c 2 (x) + S(x,Σ))10−1−2500450400350L (µm)300250200234h (µm)56Figure 5.4: 3D plot <strong>of</strong> total cost as a function <strong>of</strong> design variables.optimal design is 1/2% below the target is because <strong>of</strong> the cost trade-<strong>of</strong>f between thec 2 (x) and s(x, Σ). The m<strong>in</strong>imum s(x, Σ) cost found <strong>in</strong> figure (5.3) is 1.323 × 10 −2 ,which is larger than the comb<strong>in</strong>ed cost, c 2 (x) + s(x, Σ), <strong>of</strong> our optimal solution.Figure (5.5) illustrates how our optimization algorithm converged on the solutionfrom six different <strong>in</strong>itial conditions. The start<strong>in</strong>g po<strong>in</strong>ts for each path are label onthe plot with a unique number that corresponds to the legend. Some <strong>of</strong> the solutionswere found after only a few iterations while others chatter down the valley tak<strong>in</strong>ga couple hundred iterations. In figure (5.5) all <strong>of</strong> the paths converge to the correctglobal solution <strong>in</strong>dicated on the plot. The average number <strong>of</strong> iterations to f<strong>in</strong>d asolution, based on 2000 runs from different feasible random <strong>in</strong>itial conditions, wasapproximately 100.In this section we illustrated the robust design <strong>of</strong> a two DOF resonator. Weconsidered only uncerta<strong>in</strong>ty <strong>in</strong> the beam width and as expected, <strong>in</strong>creas<strong>in</strong>g h reducedthe sensitivity cost term s(x, Σ). The result was a solution where L was driven toit’s maximum value and h was selected such that the nom<strong>in</strong>al resonant frequency was


34550500450(5)global solutionPath 1Path 2Path 3Path 4Path 5Path 6400350L (µm)300250200150(2)100(1)50(3)00 5 10 15 20h (µm)(6)(4)Figure 5.5: Several different paths taken to f<strong>in</strong>d the solution from different <strong>in</strong>itialconditions. The start<strong>in</strong>g po<strong>in</strong>ts are label with numbers on the plot.close to the target.


355.2 Crab-Leg ResonatorThe second example that we will discuss is a six variable crab-leg resonator. Thisproblem was orig<strong>in</strong>ally taken from [13] and has been modified and extended. Thegoal is identical to that for the problem presented <strong>in</strong> section 5.1. We would like torobustly design the resonant frequency <strong>in</strong> the presence <strong>of</strong> geometric process variations.The design for the two DOF resonator was rather <strong>in</strong>tuitive, however this problem issufficiently complex that numerical optimization is necessary to f<strong>in</strong>d a robust design.There is significant freedom <strong>in</strong> how the design variables can be chosen and we willshow that the optimized solution is superior to the average design.The crab-leg resonator is shown <strong>in</strong> figure (5.6). The structure exhibits four-foldsymmetry and thus there are six design variables <strong>of</strong> <strong>in</strong>terest. The design variables h mand b m are the height and width <strong>of</strong> the pro<strong>of</strong> mass, respectively. The legs that supportthe pro<strong>of</strong> mass are anchored to the substrate. The design variables for the four legsare h 1 , h 2 , L 1 and L 2 . We are assum<strong>in</strong>g that this resonator will be fabricated us<strong>in</strong>ga surface micro-mach<strong>in</strong><strong>in</strong>g technology and therefore the entire structure will have afixed thickness t. The variables X and Y represent the maximum dimensions <strong>of</strong> theoverall structure. F<strong>in</strong>ally, we will def<strong>in</strong>e k x and k y to be the stiffness <strong>of</strong> the structure<strong>in</strong> the x and y-direction, respectively.We will use the same approximation for natural frequency as <strong>in</strong> the preced<strong>in</strong>gsection, assum<strong>in</strong>g that w n = √ k x /M. Our goal is to design the resonant frequency <strong>in</strong>the x-direction, and thus k x is the stiffness <strong>of</strong> <strong>in</strong>terest. We will also neglect the mass<strong>of</strong> the four legs and therefore the expression for M isM = ρh m b m twhere ρ is the density. The expressions for k x and k y are slightly more complex butare given byk x = 16Etk y = 16Et( ) 3 ( )h 1 h 31 L 2 +h 3 2 L 1L 1 4h 3 1 L 2+h 3 2 L 1( ) 3 ( )h 2 h 31 L 2 +h 3 2 L 1L 2 h 3 1 L 2+4h 3 2 L 1where E is the Young’s Modulus <strong>of</strong> the material. The expressions for k x and k y werederived based on the several assumptions. The derivations can be found <strong>in</strong> [13]. It


36Figure 5.6: Diagram <strong>of</strong> Six Variable Crab-leg Resonator.follows that the expression for w 2 n is given byw 2 n = 16Eh3 1(h 3 1L 2 + h 3 2L 1 )ρh m b m L 3 1(4h 3 1L 2 + h 3 2L 1 )(5.8)Similar to the two DOF example, the expression for wn2 is a rational polynomial<strong>in</strong> the design variables, however here the numerator is seventh order and the denom<strong>in</strong>atoris n<strong>in</strong>th order. We will def<strong>in</strong>e the design vector for this problem to bex = [L 1 L 2 h 1 h 2 h m b m ] T .Now that we have def<strong>in</strong>ed the variables and expressed natural frequency <strong>of</strong> thecrab-leg as a rational polynomial, we will expla<strong>in</strong> the 10 constra<strong>in</strong>ts imposed on thedesign. These constra<strong>in</strong>ts are given <strong>in</strong> table (5.2).The first four constra<strong>in</strong>ts were imposed because <strong>MEMS</strong> processes, such as MUMPs R ,typically have design rules that specify m<strong>in</strong>imum l<strong>in</strong>e and space requirements [14].The fifth and sixth constra<strong>in</strong>ts ensure that the legs can be modelled as th<strong>in</strong>-beams.The next two are requirements imposed by the designer on the overall size <strong>of</strong> thestructure. The n<strong>in</strong>th constra<strong>in</strong>t is <strong>in</strong> place to separate the two resonant frequencies.We would like the parasital y-direction resonant frequency to be much greater thanthat <strong>in</strong> the x-direction to reduce motion <strong>in</strong> the y-direction. The last constra<strong>in</strong>t is to


37# Constra<strong>in</strong>t # Constra<strong>in</strong>t1. h 1 ≥ h m<strong>in</strong> 6. L 2 ≥ 10h 22. h 2 ≥ h m<strong>in</strong> 7. X ≥ 2L 2 + 2h 1 + b m3. b m ≥ h m<strong>in</strong> 8. Y ≥ 2L 1 + h m4. h m ≥ 2h 2 + h m<strong>in</strong> 9. k y ≥ αk x5. L 1 ≥ 10h 1 10. β max ≥ βTable 5.2: <strong>Design</strong> constra<strong>in</strong>ts for crab-leg resonator.enforce that the stress, β, at the jo<strong>in</strong>t (where the two beams jo<strong>in</strong> to form a leg) doesnot exceed a maximum. The nonl<strong>in</strong>ear expression for β is given byβ =12Eh 3 1h 3 2L 1 Dh 2 2L 2 1(4h 3 1L 2 + h 3 2L 1 )where D is the maximum allowable deflection <strong>of</strong> the structure <strong>in</strong> the x-direction.Once aga<strong>in</strong>, through simple algebraic manipulation the constra<strong>in</strong>ts can be written aspolynomials <strong>in</strong> the form g i (x) ≤ 0. Table (5.3) conta<strong>in</strong>s the values <strong>of</strong> constants usedfor this example. All <strong>of</strong> the design parameters were chosen to be realistic.<strong>Design</strong> Parameter - DescriptionValuet - thickness <strong>of</strong> pro<strong>of</strong> mass and beams 2.0 µmρ - density <strong>of</strong> silicon (2330 kg/m 3 ) 2.3 × 10 −12 gm/µm 3E - Elastic Modulus <strong>of</strong> silicon (160 GPa) 1.6 × 10 8 gm/µms 2h m<strong>in</strong> - m<strong>in</strong>imum dimension 2.0 µmD - maximum deflection <strong>in</strong> the x-direction 2.0 µmβ max - maximum allowable stress (1.6 GPa) 1.6 × 10 6 gm/µms 2X - maximum size <strong>of</strong> structure <strong>in</strong> the x-direction 600µmY - maximum size <strong>of</strong> structure <strong>in</strong> the y-direction 600µmα - m<strong>in</strong>imum stiffness ratio k y /k x 16Table 5.3: <strong>Design</strong> parameters for crab-leg resonator.5.2.1 Determ<strong>in</strong><strong>in</strong>g the set <strong>of</strong> feasible resonant frequenciesCurrently we have a rational polynomial that describes the resonant frequency <strong>of</strong>the crab-leg and a set <strong>of</strong> constra<strong>in</strong>ts. There is no notion <strong>of</strong> uncerta<strong>in</strong>ty yet, but the


38problem is well-def<strong>in</strong>ed. Before a designer tackles the robust problem, a good firstquestion to address is “what range <strong>of</strong> performance can be achieved subject to theconstra<strong>in</strong>ts?” For this example, we would like to f<strong>in</strong>d lower and upper bounds on theachievable resonant frequencies.F<strong>in</strong>d<strong>in</strong>g the lower-bound requires m<strong>in</strong>imiz<strong>in</strong>g w 2 n subject to the constra<strong>in</strong>ts. Conversely,the upper-bound can be found by maximiz<strong>in</strong>g w 2 n. Maximiz<strong>in</strong>g the resonantfrequency however is equivalent to m<strong>in</strong>imiz<strong>in</strong>g 1 , or −ww n. 2 Solv<strong>in</strong>g for the two boundsn2requires m<strong>in</strong>imiz<strong>in</strong>g a rational polynomial subject to polynomial constra<strong>in</strong>ts; whichis precisely the type <strong>of</strong> problem we designed our optimization algorithm for.The lower, w m<strong>in</strong> , and upper, w max , bound were found to be 13 kHz and 11.8MHz, respectively. Computationally, the calculations typically took less than 1500iterations, or 12 seconds, to compute on a P4 1.8Ghz L<strong>in</strong>ux workstation.If thetarget resonant frequency is outside <strong>of</strong> the feasible range, then either the design orconstra<strong>in</strong>ts need to be modified.5.2.2 Choos<strong>in</strong>g a target frequencyWith an understand<strong>in</strong>g <strong>of</strong> the system’s achievable performance, given the designand constra<strong>in</strong>ts, we chose a target resonant frequency, w target , <strong>of</strong> 200 kHz. Beforetackl<strong>in</strong>g the robust problem, we would like to f<strong>in</strong>d the set <strong>of</strong> designs that have aresonant frequency <strong>of</strong> w target when there is no uncerta<strong>in</strong>ty. There are two importantreasons which motivate us to explore this set. First, <strong>in</strong> study<strong>in</strong>g this set we hopeto demonstrate that there is considerable freedom <strong>in</strong> how the design variables arechosen. Secondly, by f<strong>in</strong>d<strong>in</strong>g a set <strong>of</strong> designs that achieve the desired performanceunder nom<strong>in</strong>al conditions (δ = 0), we will have a set for which we can compare therobust design. We will refer to this set as ΦΦ = {x : wn 2 = wtarget, 2 g i (x) ≤ 0 for i = 1, ... , m} (5.9)Tak<strong>in</strong>g w target to be 200 kHz, the set Φ conta<strong>in</strong>s an <strong>in</strong>f<strong>in</strong>ite number <strong>of</strong> designs. Whileequation (5.9) is easily written, f<strong>in</strong>d<strong>in</strong>g the set Φ is an impractical task. Instead,we chose to f<strong>in</strong>d a subset, which we will refer to as Φ 1000 , that conta<strong>in</strong>s 1000 uniquedesigns.


39We were able to f<strong>in</strong>d Φ 1000 by m<strong>in</strong>imiz<strong>in</strong>g the squared error between w 2 n and w 2 targetfrom different <strong>in</strong>itial conditions. This can be written as the follow<strong>in</strong>g optimizationm<strong>in</strong>x( )w2n − wtarget2 2s.t. gi (x) ≤ 0 (5.10)This problem is equivalent to m<strong>in</strong>imiz<strong>in</strong>g the c 2 (x) term <strong>in</strong> the robust design problem<strong>of</strong> equation (2.9). The optimization problem posed <strong>in</strong> (5.10) is rational polynomialwith polynomial constra<strong>in</strong>ts, and thus we were able to use our optimization algorithmto f<strong>in</strong>d unique designs. Figure (5.7) illustrates four <strong>of</strong> the more extreme designs fromΦ 1000 . Each <strong>of</strong> these structures has a resonant frequency <strong>of</strong> 200 kHz and satisfiesthe constra<strong>in</strong>ts. They demonstrate that there is significant freedom <strong>in</strong> how the designvariables are chosen. The question we will now ask is “which design is the most robustto geometric uncerta<strong>in</strong>ties, and how can we f<strong>in</strong>d that design?”600600500500400400y (µm)300y (µm)30020020010010000 200 400 600x (µm)00 200 400 600x (µm)600600500500400400y (µm)300y (µm)30020020010010000 200 400 600x (µm)00 200 400 600x (µm)Figure 5.7: Four unique crab-leg resonator designs from Φ 1000 .


405.2.3 <strong>Robust</strong> <strong>Design</strong>We will use the method developed <strong>in</strong> chapter 2 to f<strong>in</strong>d a robust design, and answerthe question posed <strong>in</strong> the preced<strong>in</strong>g section. All that is necessary is to assume a modelfor the uncerta<strong>in</strong>ty and write an expression for squared natural frequency as a function<strong>of</strong> the design variables and uncerta<strong>in</strong>ty. This is easily done by modell<strong>in</strong>g the geometricprocess variations with the follow<strong>in</strong>g additive uncerta<strong>in</strong>ty model˜x = x + δwhere ˜x is the uncerta<strong>in</strong> (actual) design vector and δ = [δ L1 δ L2 δ h1 δ h2 δ hm δ bm ] T .Substitut<strong>in</strong>g the uncerta<strong>in</strong> design variables <strong>in</strong>to the expression for w 2 n, equation (5.8),allows us to write(˜h3 1 ˜L2 + ˜h 3 2 ˜L 1)f(x, δ) = ˜w n 2 = 16E˜h 3 1(ρ˜h m˜bm ˜L3 1 4˜h3 1 ˜L2 + ˜h 3 ˜L) (5.11)2 1where f(x, δ) is a rational polynomial <strong>in</strong> x and δ. We will restate the robust optimizationproblem that was formulated <strong>in</strong> chapter 2 for simplicity( (f(x, 0) − ¯fm<strong>in</strong>x¯f) 2+ 1¯f 2(∇ 2 f(x, 0)Σ∇ T 2 f(x, 0)) ) s.t. g i (x) ≤ 0 (5.12)The target performance, ¯f, is simply w 2 target. We will label the cost function <strong>in</strong> (5.12)as F (x, Σ).We rem<strong>in</strong>d the reader that the covariance matrix, Σ, represents thecorrelation between the uncerta<strong>in</strong>ty <strong>in</strong> the design variables. We will study the robustdesign problem us<strong>in</strong>g two different models for Σ.The first model assumes that there is no correlation. In this case, Σ is diagonalwith the entries represent<strong>in</strong>g the variance <strong>of</strong> each term <strong>in</strong> δ. S<strong>in</strong>ce we are consider<strong>in</strong>ggeometric process variations, we will assume that the standard deviation <strong>of</strong> each term<strong>in</strong> δ is equal. We will def<strong>in</strong>e the uncorrelated covariance matrix, Σ U , asΣ U = σ 2 I 6 (5.13)where σ is the standard deviation <strong>of</strong> the geometric dimensional uncerta<strong>in</strong>ty.second model we will consider is the case when the structure is etched uniformly.The


41Figure (5.8) illustrates the two uniform etch scenarios on a beam with an end mass.The vector ξ = [−1 −1 1 1 1 1] T represents a uniform etch for the crab-leg structure.If we take λ to be a gaussian random variable, with standard deviation σ, then we canwrite the correlated uncerta<strong>in</strong>ty vector as δ = λξ. When λ is positive, this correspondsto the design, x + λξ, hav<strong>in</strong>g been underetched, and conversely, negative λ <strong>in</strong>dicatesthe structure was overetched. We can therefore write the correlated covariance matrix,Σ C , asΣ C = σ 2 ξξ T (5.14)We will proceed by look<strong>in</strong>g at the results for these two uncerta<strong>in</strong>ty models.Figure 5.8: Illustration depict<strong>in</strong>g under and overetch <strong>of</strong> a beam with an end-mass.Uncorrelated ResultsUs<strong>in</strong>g our rational polynomial optimization algorithm to solve the problem posed<strong>in</strong> (5.12), we found the follow<strong>in</strong>g robust design for the uncorrelated uncerta<strong>in</strong>ty casex ∗ U = 241.68 20.56 14.49 2.03 87.84 442.71[w n = 199.960 kHzF (x ∗ U , Σ U) = 4.2362 × 10 −4] Tc 2 (x ∗ U ) = 1.6 × 10−7s(x ∗ U , Σ U) = 4.2346 × 10[−4∇ x F (x ∗ U , Σ U) = − .057 .025 4.780 .408 .056 .011]× 10 −5The robust design, x ∗ U , for the uncorrelated uncerta<strong>in</strong>ty case is shown <strong>in</strong> figure (5.9).The functions c 2 (x) and s(x, Σ) were def<strong>in</strong>ed <strong>in</strong> equation (2.10). Clearly, the nom<strong>in</strong>al(δ = 0) resonant frequency, w n , <strong>of</strong> this design almost nails the target. This is also


42evident by not<strong>in</strong>g that the c 2 (x) term is small. From look<strong>in</strong>g at the breakdown <strong>of</strong> thecost function F (x ∗ U , Σ U), we see that the sensitivity, s(x ∗ U , Σ U), is the dom<strong>in</strong>ant term.600<strong>Robust</strong> Uncorrelated <strong>Design</strong>600<strong>Robust</strong> Correlated <strong>Design</strong>500500400400y (µm)300y (µm)30020020010010000 200 400 600x (µm)00 200 400 600x (µm)600500400y (µm)300Average <strong>Design</strong> from Φ 10000 200 400 600600500400Worst <strong>Design</strong> from Φ 1000y (µm)30020020010010000 200 400 600x (µm)0x (µm)Figure 5.9: Illustration <strong>of</strong> the robust designs and two designs from Φ 1000 .None <strong>of</strong> the constra<strong>in</strong>ts are active at the robust design x ∗ U . This would imply thatthe solution is a local m<strong>in</strong>ima, and hence the gradient should be zero. Referr<strong>in</strong>g tothe solution we see that the gradient, ∇ x F (x ∗ U , Σ U), is essentially zero. The reasonthe gradient is not identically zero is because <strong>of</strong> the numerical precision with whichthe m<strong>in</strong>imum can be calculated.The most obvious approach to evaluate the robust design is to compare it aga<strong>in</strong>stdesigns that nom<strong>in</strong>ally meet the target frequency. To do this, let us evaluate the costfunction, F (x, Σ), for the set Φ 1000 . S<strong>in</strong>ce each design <strong>in</strong> the set Φ 1000 has a nom<strong>in</strong>alresonant frequency equal to the target frequency, the term c 2 (x) is zero and thus thecost function reduces to s(x, Σ).Figure (5.10) is a histogram <strong>of</strong> the cost s(x, Σ) for all <strong>of</strong> the designs <strong>in</strong> Φ 1000 .The m<strong>in</strong>imum cost is 6.28 × 10 −4 , which is approximately 50% larger than the robustdesign. The average cost is 8.7 × 10 −3 and the worst-case cost from the set Φ 1000was 2.27 × 10 −2 . Both the average and worst designs from Φ 1000 are illustrated <strong>in</strong>


43figure (5.9). Clearly the average and worst designs differ significantly from the robustsolutions. Compar<strong>in</strong>g the costs associated with the designs <strong>in</strong> Φ 1000 aga<strong>in</strong>st our robustsolution is useful <strong>in</strong> verify<strong>in</strong>g that the optimization was successful, but less helpful <strong>in</strong>understand<strong>in</strong>g how the robustness improved.12010080# <strong>of</strong> occurences60402000 0.005 0.01 0.015 0.02 0.025s(x, Σ)Figure 5.10: Histogram <strong>of</strong> the sensitivity cost term, s(x, Σ U ), for the set Φ 1000 .To demonstrate the robustness <strong>of</strong> our solution we ran a monte carlo simulationto model an uncerta<strong>in</strong> <strong>MEMS</strong> fabrication process. To represent the variation <strong>in</strong> theprocess we generated 400,000 gaussian random vectors with a standard deviation,σ, <strong>of</strong> 0.1 µm. We then calculated the natural frequencies <strong>of</strong> the robust design andthe average and worst design from Φ 1000 subject to these variations. The results aredisplayed <strong>in</strong> figure (5.11). The distribution for the robust design has a much tighterspread than both the average and worst-case designs from Φ 1000 . This is an excellent<strong>in</strong>dication that the optimized design is much less <strong>in</strong>sensitive to geometric uncerta<strong>in</strong>ties<strong>in</strong> the design variables.


44<strong>Robust</strong> Uncorrelated <strong>Design</strong>Average <strong>Design</strong> from Φ 1000Worst <strong>Design</strong> from Φ 1000Target Resonant Frequency140 160 180 200 220 240 260Frequency (kHz)Figure 5.11: Distributions <strong>of</strong> crab-leg resonant frequencies subject to uncorrelateduncerta<strong>in</strong>ty.Correlated Uncerta<strong>in</strong>tyThe robust design for the correlated uncerta<strong>in</strong>ty model, equation (5.14), is givenx ∗ C =here265.64 22.84 14.09 2.00 68.71 392.60[w n = 199.950 kHzF (x ∗ C , Σ C) = 5.700 × 10 −4] Tc 2 (x ∗ C ) = 3.0 × 10−7s(x ∗ C , Σ C) = 5.697 × 10[−4∇ x F (x ∗ C , Σ C) = −.003 −.066 −.902 1.34 .002 −.001]× 10 −4Constra<strong>in</strong>ts 2, 8, and 9 from table (5.2) are active at the solution. Aside from thefact that there are active constra<strong>in</strong>ts, the ma<strong>in</strong> difference between the uncorrelatedand correlated designs are <strong>in</strong> the variables L 1 , h m , and b m . The size <strong>of</strong> the pro<strong>of</strong> massfor the correlated design is about 70% <strong>of</strong> the size for the uncorrelated design and thelegs are slightly longer. Figure (5.9) illustrates the robust design x ∗ C , and figure (5.12)shows a distribution <strong>of</strong> resonant frequencies when this design is subjected to correlated


45uncerta<strong>in</strong>ty. Although the correlated and uncorrelated designs are physically similarand have similar distributions, they are each optimal for the uncerta<strong>in</strong>ty model forwhich they were designed.<strong>Robust</strong> Correlated <strong>Design</strong>Average <strong>Design</strong> from Φ 1000Worst <strong>Design</strong> from Φ 1000Target Resonant Frequency140 160 180 200 220 240 260Frequency (kHz)Figure 5.12:uncerta<strong>in</strong>ty.Distributions <strong>of</strong> crab-leg resonant frequencies subject to correlatedIn this chapter we presented the robust design <strong>of</strong> a six variable crab-leg resonator.We showed how it was possible to determ<strong>in</strong>e lower and upper bounds on the resonantfrequency given the design and constra<strong>in</strong>ts. We then chose a target frequency <strong>of</strong> 200kHz, and used our optimization to f<strong>in</strong>d a set <strong>of</strong> 1000 designs that at nom<strong>in</strong>al have aresonant frequency equal to the target. Two uncerta<strong>in</strong>ty models, an uncorrelated andcorrelated, were developed and used <strong>in</strong> solv<strong>in</strong>g the robust problem. We then comparedthe cost, F (x, Σ), between our robust designs and the designs <strong>in</strong> Φ 1000 . F<strong>in</strong>ally, weillustrated frequency distributions, generated from a monte carlo simulation <strong>of</strong> processvariation, which showed that our robust designs were less sensitive to uncerta<strong>in</strong>ty.


46Chapter 6ConclusionIn this report we presented a robust design technique for <strong>MEMS</strong> systems. Theproblem posed was to m<strong>in</strong>imize the expected variance between actual and targetperformance <strong>in</strong> the presence <strong>of</strong> uncerta<strong>in</strong>ty. The two key assumptions were: (1)the mean and covariance <strong>of</strong> the uncerta<strong>in</strong>ty was known, and (2) the use <strong>of</strong> a firstorderTaylor series expansion to approximate the actual performance. With theseassumptions, the robust design problem was reduced to a constra<strong>in</strong>ed m<strong>in</strong>imization.We focused on solv<strong>in</strong>g a subset <strong>of</strong> constra<strong>in</strong>ed m<strong>in</strong>imization problems, and gavea detailed outl<strong>in</strong>e <strong>of</strong> an algorithm to m<strong>in</strong>imize rational polynomial functions subjectto polynomial <strong>in</strong>equality constra<strong>in</strong>ts. The algorithm uses l<strong>in</strong>e searches by choos<strong>in</strong>ga direction and then through a l<strong>in</strong>ear transformation converts the optimization <strong>in</strong>toa scalar problem dur<strong>in</strong>g each iteration. It was shown that the scalar problem wastrivial to solve by exploit<strong>in</strong>g the polynomial structure <strong>of</strong> the objective function andconstra<strong>in</strong>ts. The algorithm was demonstrated on two optimization problems and wasshown to be successful.F<strong>in</strong>ally, we applied the robust design technique and used the optimization to designtwo <strong>MEMS</strong> resonant structures. The first example was a simple two-beam resonatorthat was easy to visualize. The second example was a more realistic design problem<strong>of</strong> a crab-leg resonator with six design variables and 10 constra<strong>in</strong>ts. We designedthis structure to have a resonant frequency <strong>of</strong> 200 kHz and considered two modelsfor uncerta<strong>in</strong>ty, correlated and uncorrelated. Both designs were optimal for their


47respective uncerta<strong>in</strong>ty models and were shown to be far more robust to uncerta<strong>in</strong>tywhen compared with 1000 random designs which met the constra<strong>in</strong>ts and nailed thetarget frequency.


48Bibliography[1] What is <strong>MEMS</strong> Technology? <strong>MEMS</strong>net. November 27, 2002.[2] Petersen, Kurt E. “Silicon as a Mechanical Material.” Proceed<strong>in</strong>gs <strong>of</strong> theIEEE vol. 70 no. 5 (May 1982): pp. 420-457.[3] Tang, W.C. PhD Thesis, <strong>University</strong> <strong>of</strong> <strong>California</strong>, Berkeley, CA (1990).[4] Maluf, Nadim. An Introduction to Microelectromechanical Systems Eng<strong>in</strong>eer<strong>in</strong>g.Boston: Artech House, 2000.[5] Pister, Kris. Introduction to <strong>MEMS</strong> <strong>Design</strong> and Fabrication. EECS 245Reader <strong>University</strong> <strong>of</strong> <strong>California</strong>, Berkeley, CA (Fall 2001). pp. 9-45.[6] Sharpe, W. N., K.T. Turner, and R.L. Edwards. “Tensile Test<strong>in</strong>g <strong>of</strong> Polysilicon.”Experimental Mechanics vol. 39 no. 3 (September 1999): pp. 162-170.[7] Nocedal, Jorge, and Stephen J. Wright. Numerical <strong>Optimization</strong>. New York:Spr<strong>in</strong>ger-Verlag, 1999.[8] Strang, Gilbert. L<strong>in</strong>ear Algebra and its Applications. Orlando: HarcourtBrace Jovanovich College Publishers, 1988.[9] Rao, S<strong>in</strong>giresu S. Eng<strong>in</strong>eer<strong>in</strong>g <strong>Optimization</strong>. New York: John Wiley & Sons,Inc., 1996.


49[10] Kochenberger, G.A., R.E.D. Woolsey, and B.A. McCarl. “On the Solution<strong>of</strong> Geometric Programs via Separable Programm<strong>in</strong>g.” Operation ResearchQuarterly vol. 24 no. 2 (June 1973): pp. 285-294.[11] Rijckaert, M.J. and X.M Martens. “Comparision <strong>of</strong> Generalized GeometricProgramm<strong>in</strong>g Algorithms.” Jornal <strong>of</strong> <strong>Optimization</strong> Theory and Applicationsvol. 26 no. 2 (October 1978), pp. 205-242.[12] Floudas, Christodoulos A., et al. Handbook <strong>of</strong> Test Problems <strong>in</strong> Local andGlobal <strong>Optimization</strong> Boston: Kluwer Academic Publishers, 1999.[13] Pisano, Albert P. ME219 Lecture Notes, <strong>University</strong> <strong>of</strong> <strong>California</strong>, Berkeley,CA (Spr<strong>in</strong>g 2001).[14] Koester, David, et al. PolyMUMPs <strong>Design</strong> Handbook. revision 8 2002. ResearchTriangle Park, NC: Cronos Integrated Microsystems.


50Appendix AAlkylation Constantsi c i i c i i c i i c i1 1.715 12 .0066033 23 .25125634e2 34 .8196722 0.035 13 .66173269e-3 24 .16118996e3 35 245003 4.0565 14 .17239878e-1 25 5000 36 2504 10 15 .56595559e-2 26 .48951e6 37 .10204082e-15 3000 16 .19120592e-1 27 .44333333e2 38 .12244898e-46 0.063 17 .5685075e2 28 .33 39 .00006257 .59553571e-2 18 1.08702 29 .022556 40 .00006258 .88392857 19 .32175 30 .007595 41 .000076259 .1175625 20 .03762 31 .00061 42 1.2210 1.1088 21 .006198 32 .0005 43 111 .1303533 22 .24623121e4 33 .819672 44 1Table A.1: Constants c i for i = 1 . . . 44 for the Alkylation Process <strong>Design</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!