scispace - formally typeset
Search or ask a question

Showing papers in "arXiv: Systems and Control in 2020"


Posted Content
TL;DR: A compositional framework for the construction of control barrier functions for networks of continuous-time stochastic hybrid systems enforcing complex logic specifications expressed by finite-state automata based on a notion of so-called pseudo-barrier functions computed for subsystems.
Abstract: In this paper, we propose a compositional framework for the construction of control barrier functions for networks of continuous-time stochastic hybrid systems enforcing complex logic specifications expressed by finite-state automata. The proposed scheme is based on a notion of so-called pseudo-barrier functions computed for subsystems, by employing which one can synthesize hybrid controllers for interconnected systems enforcing complex specifications over a finite-time horizon. Particularly, we first leverage sufficient small-gain type conditions to compositionally construct control barrier functions for interconnected systems based on the corresponding pseudo-barrier functions computed for subsystems. Then, using the constructed control barrier functions, we provide probabilistic guarantees on the satisfaction of given complex specifications in a bounded time horizon. In this respect, we decompose the given complex specification to simpler reachability tasks based on automata representing the complements of original finite-state automata. We then provide systematic approaches to solve those simpler reachability tasks by computing corresponding pseudo-barrier functions. Two different systematic techniques are provided based on (i) the sum-of-squares (SOS) optimization program and (ii) counter-example guided inductive synthesis (CEGIS) to search for pseudo-barrier functions of subsystems while synthesizing local controllers. We demonstrate the effectiveness of our proposed results by applying them to two large-scale physical case studies including a temperature regulation in a circular network of 1000 rooms and a fully-interconnected Kuramoto network of 100 nonlinear oscillators.

17 citations


Posted Content
TL;DR: A Pontryagin maximum principle is derived for discrete-time optimal control problems on matrix Lie groups that includes point-wise state and control action constraints, and encompasses a large class of control problems that arise in various field of engineering and the applied sciences.
Abstract: This article considers a discrete-time robust optimal control problem on matrix Lie groups. The underlying system is assumed to be perturbed by exogenous unmeasured bounded disturbances, and the control problem is posed as a min-max optimal control wherein the disturbance is the adversary and tries to maximise a cost that the control tries to minimise. Assuming the existence of a saddle point in the problem, we present a version of the Pontryagin maximum principle (PMP) that encapsulates first-order necessary conditions that the optimal control and disturbance trajectories must satisfy. This PMP features a saddle point condition on the Hamiltonian and a set of backward difference equations for the adjoint dynamics. We also present a special case of our result on Euclidean spaces. We conclude with applying the PMP to robust version of single axis rotation of a rigid body.

16 citations


Book ChapterDOI
TL;DR: This chapter provides a comprehensive introduction to the LWE-based cryptosystem with examples and shows how this limitation can be overcome for dynamic feedback controllers that guarantee stability of the closed-loop system when the system matrix of the controller consists of integers.
Abstract: The cryptosystem based on the Learning-with-Errors (LWE) problem is considered as a post-quantum cryptosystem, because it is not based on the factoring problem with large primes which is believed to be easily solved by a quantum computer. Moreover, the LWE-based cryptosystem allows fully homomorphic arithmetics so that two encrypted variables can be added and multiplied without decrypting them. This chapter provides a comprehensive introduction to the LWE-based cryptosystem with examples. A key to the security of the LWE-based cryptosystem is the injection of random errors in the ciphertexts, which however hinders unlimited recursive operation of homomorphic arithmetics on ciphertexts due to the growth of the error. We show how this limitation can be overcome for dynamic feedback controllers that guarantee stability of the closed-loop system when the system matrix of the controller consists of integers. Finally, we illustrate through MATLAB codes how the LWE-based cryptosystem can be customized to build a secure feedback control system. This chapter is written for the control engineers who do not have background on cryptosystems.

16 citations


Posted Content
TL;DR: A secure observer-based distributed controller such that a group of vehicles can achieve accurate state estimates and formation control even if the measurements of a subset of vehicle sensors are compromised by a malicious attacker is proposed.
Abstract: We study how to design a secure observer-based distributed controller such that a group of vehicles can achieve accurate state estimates and formation control even if the measurements of a subset of vehicle sensors are compromised by a malicious attacker. We propose an architecture consisting of a resilient observer, an attack detector, and an observer-based distributed controller. The distributed detector is able to update three sets of vehicle sensors: the ones surely under attack, surely attack-free, and suspected to be under attack. The adaptive observer saturates the measurement innovation through a preset static or time-varying threshold, such that the potentially compromised measurements have limited influence on the estimation. Essential properties of the proposed architecture include: 1) The detector is fault-free, and the attacked and attack-free vehicle sensors can be identified in finite time; 2) The observer guarantees both real-time error bounds and asymptotic error bounds, with tighter bounds when more attacked or attack-free vehicle sensors are identified by the detector; 3) The distributed controller ensures closed-loop stability. The effectiveness of the proposed methods is evaluated through simulations by an application to vehicle platooning.

10 citations


Book ChapterDOI
TL;DR: This chapter proposes a control theoretic approach to regulate the number of prosumers in a prosumer community, where each prosumer has a cost function that is coupled through its time-averaged production and consumption of the resource.
Abstract: In many sharing economy scenarios, agents both produce as well as consume a resource; we call them prosumers. A community of prosumers agrees to sell excess resource to another community in a prosumer market. In this chapter, we propose a control theoretic approach to regulate the number of prosumers in a prosumer community, where each prosumer has a cost function that is coupled through its time-averaged production and consumption of the resource. Furthermore, each prosumer runs its distributed algorithm and takes only binary decisions in a probabilistic way, whether to produce one unit of the resource or not and to consume one unit of the resource or not. In the proposed approach, prosumers do not explicitly exchange information with each other due to privacy reasons, but little exchange of information is required for feedback signals, broadcast by a central agency. In the proposed approach, prosumers achieve the optimal values asymptotically. Furthermore, the proposed approach is suitable to implement in an IoT context with minimal demands on infrastructure. We describe two use cases; community-based car sharing and collaborative energy storage for prosumer markets. We also present simulation results to check the efficacy of the algorithms.

8 citations


Posted Content
TL;DR: The exponential stability property of a class of mechanical systems represented in the port-Hamiltonian framework is proved and a Lyapunov candidate function different from the Hamiltonian of the system is proposed.
Abstract: In this paper, we prove the exponential stability property of a class of mechanical systems represented in the port-Hamiltonian framework. To this end, we propose a Lyapunov candidate function different from the Hamiltonian of the system. Moreover, we study how the proposed analysis can be used to determine the exponential stability and the rate of convergence of some (nonlinear)-mechanical systems stabilized by two passivity-based control techniques, namely, PID passivity-based control and interconnection and damping assignment. We implement the former control approach to stabilize a three degrees-of-freedom robotic arm at the desired equilibrium point to illustrate the mentioned analysis.

6 citations


Book ChapterDOI
TL;DR: This chapter considers a class of nonlinear cooperative protocols, which consist of multiple agents that are coupled together via an undirected state-dependent graph and develops a representation of the system solution by decomposing the nonlinear system utilizing ideas from the Koopman operator theory and its spectral analysis.
Abstract: Spectral decomposition of dynamical systems is a popular methodology to investigate the fundamental qualitative and quantitative properties of these systems and their solutions. In this chapter, we consider a class of nonlinear cooperative protocols, which consist of multiple agents that are coupled together via an undirected state-dependent graph. We develop a representation of the system solution by decomposing the nonlinear system utilizing ideas from the Koopman operator theory and its spectral analysis. We use recent results on the extensions of the well-known Hartman theorem for hyperbolic systems to establish a connection between the original nonlinear dynamics and the linearized dynamics in terms of Koopman spectral properties. The expected value of the output energy of the nonlinear protocol, which is related to the notions of coherence and robustness in dynamical networks, is evaluated and characterized in terms of Koopman eigenvalues, eigenfunctions, and modes. Spectral representation of the performance measure enables us to develop algorithmic methods to assess the performance of this class of nonlinear dynamical networks as a function of their graph topology. Finally, we propose a scalable computational method for approximation of the components of the Koopman mode decomposition, which is necessary to evaluate the systemic performance measure of the nonlinear dynamic network.

3 citations


Posted Content
TL;DR: This work presents a decision-theoretic framework based on partially observable Markov decision processes (POMDPs) that relies on assigning a classification belief (a probability distribution) to the attributes of interest and presents two different algorithms to compute such strategies.
Abstract: In this work, we study the problem of actively classifying the attributes of dynamical systems characterized as a finite set of Markov decision process (MDP) models. We are interested in finding strategies that actively interact with the dynamical system and observe its reactions so that the attribute of interest is classified efficiently with high confidence. We present a decision-theoretic framework based on partially observable Markov decision processes (POMDPs). The proposed framework relies on assigning a classification belief (a probability distribution) to the attributes of interest. Given an initial belief, confidence level over which a classification decision can be made, a cost bound, safe belief sets, and a finite time horizon, we compute POMDP strategies leading to classification decisions. We present two different algorithms to compute such strategies. The first algorithm computes the optimal strategy exactly by value iteration. To overcome the computational complexity of computing the exact solutions, we propose a second algorithm is based on adaptive sampling to approximate the optimal probability of reaching a classification decision. We illustrate the proposed methodology using examples from medical diagnosis and privacy-preserving advertising.

Posted Content
TL;DR: Results for a 9-bus test case show that the controllers associated with the resulting RCIs maintain safe operation when the system is subjected to worst-case (adversarial) fluctuations in net demand.
Abstract: We propose a novel consensus-based approach for set-theoretic frequency control in power systems. A robust controlled-invariant set (RCI) for the system is generated by composing RCIs for each bus in the network. The process of generating these sets uses a consensus-based approach in order to facilitate discovery of mutually compatible subsystem RCIs when each bus seeks to maximize the size of its own RCI while treating the effects of coupling as an unknown-but-bounded disturbance. The consensus routine, which demonstrates linear convergence, is embedded into a backwards reachability analysis of initial safe sets. Results for a 9-bus test case show that the controllers associated with the resulting RCIs maintain safe operation when the system is subjected to worst-case (adversarial) fluctuations in net demand.

Posted Content
TL;DR: Results for a 9-bus test case show that simple model predictive controllers associated with the resulting RCIs maintain safe operation when the system is subjected to worst case (adversarial) fluctuations in net demand, where conventional controllers are shown to fail.
Abstract: Set-theoretic control is a useful technique for dealing with the uncertainty introduced into power systems by renewable energy resources. Although set operations are computationally expensive in large systems, distributed approaches serve as a remedy. In this paper, we propose a novel consensus-based approach for set-theoretic frequency control in power systems. A robust controlled-invariant set (RCI) for the system is generated by composing RCIs for each bus in the network. The process of generating these sets uses a consensus-based approach in order to facilitate discovery of mutually compatible subsystem RCIs. Each bus seeks to maximize the size of its own RCI while treating the effects of coupling as an unknown-but-bounded disturbance. The consensus routine, which demonstrates linear convergence, is embedded into a backwards reachability analysis of initial safe sets. Results for a 9-bus test case show that simple model predictive controllers associated with the resulting RCIs maintain safe operation when the system is subjected to worst case (adversarial) fluctuations in net demand, where conventional controllers are shown to fail.