Professional Documents
Culture Documents
Sampled-Data Reachability Analysis Using Sensitivity and Mixed-Monotonicity
Sampled-Data Reachability Analysis Using Sensitivity and Mixed-Monotonicity
Abstract— This paper over-approximates the reachable sets [7], the proposed approach uses the sensitivity matrices (par-
of a continuous-time uncertain system using the sensitivity of tial derivatives of the system trajectories with respect to the
its trajectories with respect to initial conditions and uncertain initial state or uncertain parameters). Such an approach was
parameters. We first prove the equivalence between an existing
over-approximation result based on the sign-stability of the introduced in [18] for the case of systems whose sensitivity
sensitivity matrices and a discrete-time approach relying on matrix is sign-stable over the set of initial states.
a mixed-monotonicity property. We then present a new over- This paper presents three main contributions. 1) In Sec-
approximation result which scales at worst linearly with the tion III, we prove the equivalence between the sign-stable
state dimension and is applicable to any continuous-time system sensitivity approach in [18] for continuous-time systems
with bounded sensitivity. Finally, we provide a simulation-
based approach to estimate these bounds through sampling and and the one based on mixed-monotonicity for discrete-
falsification. The results are illustrated with numerical examples time systems in [7]. 2) We next propose in Section IV a
on traffic networks and satellite orbits. generalized sensitivity-based reachability analysis applicable
to any continuous-time system whose sensitivity matrices
I. I NTRODUCTION are bounded. This generalization is motivated by the one
introduced in [19] for continuous-time mixed-monotone sys-
Reachability analysis deals with the problem of computing tems. 3) Since the proposed approach is based on the system
the set of all possible successors of a system given its sets of trajectories and sensitivity, which are unknown for most
initial conditions and admissible disturbance and uncertainty continuous-time systems, we lastly present a simulation-
values (see e.g. [4], [15]). Since exact computation of the based method to estimate the sensitivity bounds using sam-
reachable set is rarely possible, we instead evaluate an over- pling and falsification in Section V. Section VI then illus-
approximation to guarantee that the obtained set contains all trates these results through an example of traffic flow on a
possible successors of the system. Various methods and rep- road network and an example of a satellite orbit.
resentations exist for these over-approximations, including
ellipsoids [13], polytopes [5], zonotopes [2], level-sets [14] II. P ROBLEM FORMULATION
and unions of intervals [10]. Their main focus is on obtain- Let R be the set of reals and I ⊆ 2R the set of closed
ing over-approximations as close as possible to the actual real intervals, i.e., for all X ∈ I, there exist x, x ∈ R such
reachable set, which can then be used for safety verification that X = [x, x] = {x ∈ R | x ≤ x ≤ x} ⊆ R. I n and I n×q
to ensure that a bad set is never crossed (see e.g. [9]). then represent the sets of interval vectors in Rn and interval
Alternatively, methods using a single interval such as [16] matrices in Rn×q , respectively.
focus less on the quality of the over-approximations and more We consider a continuous-time, time-varying system
on the simplicity of implementation, including features such ẋ = f (t, x, p), (1)
as low memory usage (only two states) and low complexity
n q
of the reachability analysis (at best constant for monotone with state x ∈ R , uncertain parameter p ∈ R and
systems [3], at worst linear in the state dimension [18]). continuously differentiable vector field f : R × Rn × Rq →
These properties are particularly important in the context of Rn . We denote as Φ(t; t0 , x0 , p) ∈ Rn the state reached
abstraction-based control synthesis (see, e.g., [7]) where a by (1) at time t ≥ t0 from initial state x0 with parameter
large number of over-approximations have to be computed, p. The variable p can also represent control or disturbance
stored and intersected with other intervals. parameters that remain constant over the considered time
This paper focuses on the computation of interval over- interval [t0 , t]. Given sets X0 ⊆ Rn and P ⊆ Rq of initial
approximations of reachable sets for a continuous-time states and parameters, respectively, the reachable set of (1)
uncertain system. As opposed to monotonicity-based ap- at time t ≥ t0 is denoted as
proaches relying on the sign of the Jacobian matrices [16], R(t; t0 , X0 , P ) = {Φ(t; t0 , x0 , p) | x0 ∈ X0 , p ∈ P }. (2)
ṡx (t; t0 , x0 , p) = Dfx |Φ sx (t; t0 , x0 , p), (8) Assumption 12. Given an invariant set X ⊆ Rn of (1), there
exist interval matrices A ∈ I n×n and B ∈ I n×q such that
where Dfx |Φ = Dfx (t, Φ(t; t0 , x0 , p), p) denotes the Jaco- for all t ∈ [t0 , +∞), x ∈ X, p ∈ P , we have Dfx (t, x, p) ∈ A
bian Dfx (t, x, p) = ∂f (t,x,p)
∂x evaluated along the trajectory and Dfp (t, x, p) ∈ B.
Φ(t; t0 , x0 , p). System (8) is initialized with the identity
We can then rewrite (8) and (9) as the set-valued systems
matrix sx (t0 ; t0 , x0 , p) = In ∈ Rn×n [8]. A similar time-
varying affine system can be found for the sensitivity sp : ṡx (t) ∈ Asx (t), sx (t0 ) = In , (10)
p p p
p
ṡ (t; t0 , x0 , p) = Dfx |Φ sp (t; t0 , x0 , p) + Dfp |Φ , (9) ṡ (t) ∈ As (t) + B, s (t0 ) = 0n×q . (11)
where Dfp |Φ is the evaluation of Dfp (t, x, p) = ∂f (t,x,p) The solution of these systems at time T is over-approximated
∂p
along the trajectory Φ(t; t0 , x0 , p) and (9) is initialized with using interval arithmetics and a truncated Taylor series of the
the zero matrix sp (t0 ; t0 , x0 , p) = 0n×q ∈ Rn×q [12]. interval matrix exponential eA(T −t0 ) ∈ I n×n , detailed in [1].
For a given time T ≥ t0 , we first compute the sensitivity Lemma 13 ([1]). Under Assumption 12, there exist functions
matrices sx (T ; t0 , x0 , p) and sp (T ; t0 , x0 , p) through the m : [0, +∞) → N and E : [0, +∞) → I n×n defined in [1]
numerical integration of the systems (8) and (9) for at least such that for all T ≥ t0 , we have
one pair (x0 , p) ∈ X0 ×P to obtain initial sensitivity bounds
m(T −t0 )
denoted as [sx , sx ] ∈ I n×n and [sp , sp ] ∈ I n×q . More X (A(T − t0 ))i
than one pair (x0 , p) can be obtained through either random sx (T ) ∈ + E(T − t0 ),
i=0
i!
sampling or a gridded discretization of X0 × P .
m(T −t0 )
The second step aims to falsify these bounds [11] through X (A(T − t0 ))i
an optimization problem, i.e. to find x0 ∈ X0 and p ∈ P such sp (T ) ∈ + E(T − t0 ) (T − t0 )B.
(i + 1)!
that either sx (T ; t0 , x0 , p) ∈
/ [sx , sx ] or sp (T ; t0 , x0 , p) ∈/ i=0
p p
[s , s ]. Focusing on the sensitivity with respect to the initial Remark 14. Unlike the sampling-based method in Section V-
state, we want to solve the following optimization problem A, Lemma 13 provides guaranteed over-approximations for
sxij − sxij the sensitivities but risks being overly conservative since
!!
x x∗
min min − sij (T ; t0 , x0 , p) − sij
, interval arithmetics cannot provide exact set computation
x0 ∈X0 i,j 2
p∈P when more than two interval matrices are multiplied [10].
where for each pair (i, j) we consider a negative absolute Remark 15. The minimal Taylor order m(T − t0 ) for
value function centered on sx∗ ij and translated such that the Lemma 13 to hold is a linearly increasing function of the
global cost function is negative if and only if there exist time step T −t0 [1]. This approach might thus be practically
i, j ∈ {1, . . . , n} such that sxij (T ; t0 , x0 , p) ∈
/ [sxij , sxij ]. If the infeasible when the desired time step T − t0 is too large.
obtained local minimum is negative and the corresponding
arguments are denoted as x∗0 ∈ X0 and p∗ ∈ P , the sensitiv- VI. N UMERICAL EXAMPLES
ity bounds are updated as: sx ← min(sx , sx (T ; t0 , x∗0 , p∗ )), All computations are run with Matlab on a laptop with a
sx ← max(sx , sx (T ; t0 , x∗0 , p∗ )), using elementwise min 1.7GHz CPU and 4GB of RAM.
and max operators. This process is repeated with the new
bounds until a positive minimum is obtained. A similar A. Traffic network
approach is applied to [sp , sp ]. Consider the 3-link traffic network describing a diverge
Remark 11. While this approach is likely to result in an junction (the vehicles in link 1 divide evenly among the
accurate approximation of the actual sensitivity bounds, it outgoing links 2 and 3) inspired by [6]:
is not guaranteed to over-approximate the set of all possible
p − g(x)
sensitivity values over X0 ×P since the falsification relies on 1
ẋ = g(x)/2 − min(c, vx2 ) , (12)
an optimization problem only able to provide local minima. T
g(x)/2 − min(c, vx3 )
B. Interval arithmetics where g(x) = min(c, vx1 , 2w(x̄ − x2 ), 2w(x̄ − x3 )), x ∈ R3
An alternative approach recommended in [18] is based on is the vehicle density on the three links, p ∈ P = [40, 60] is
the use of interval arithmetics to solve an affine time-varying the constant but uncertain vehicle inflow to link 1, T = 30
100
seconds and c = 40, v = 0.5, x̄ = 320, w = 1/6 are known
parameters of the network detailed in [6]. 80
x3
60
[40, 60], we consider a set X0 ⊆ I 3 of initial conditions
such that X0 = [150, 200] × [250, 320] × [50, 100], meaning 40
0
networks. arXiv preprint arXiv:1803.00367.
[7] S. Coogan and M. Arcak. Efficient finite abstraction of mixed mono-
-500
tone systems. In Proceedings of the 18th International Conference on
Hybrid Systems: Computation and Control, pages 58–67. ACM, 2015.
[8] A. Donzé and O. Maler. Systematic simulation using sensitivity
-1000 analysis. In International Workshop on Hybrid Systems: Computation
6690 6700 6710 6720 6730 6740 6750 6760 6770 6780 6790
and Control, pages 174–189. Springer, 2007.
x1 cos(x3 ) [km]
[9] G. Frehse. Phaver: Algorithmic verification of hybrid systems past
hytech. In International workshop on hybrid systems: computation
Fig. 2. Reachable set (black) of (15) and its over-approximation and control, pages 258–273. Springer, 2005.
R̄(T ; 0, X0 , P ) (blue) projected in the polar plane (x1 , x3 ). [10] L. Jaulin. Applied interval analysis: with examples in parameter and
state estimation, robust control and robotics, volume 1. Springer
Science & Business Media, 2001.
VII. C ONCLUSION [11] J. Kapinski, J. V. Deshmukh, X. Jin, H. Ito, and K. Butts. Simulation-
based approaches for verification of embedded control systems: an
This paper provides a new reachability analysis method overview of traditional and advanced modeling, testing, and verifica-
based on the sensitivity matrices of a continuous-time system tion techniques. IEEE Control Systems, 36(6):45–64, 2016.
and applicable to the wide class of systems whose sensitivity [12] H. K. Khalil. Nonlinear systems. Pearson, third edition, 2001.
[13] A. A. Kurzhanskiy and P. Varaiya. Ellipsoidal techniques for reacha-
matrices at a given time are bounded over the sets of bility analysis of discrete-time linear systems. IEEE Transactions on
uncertain parameters and initial conditions. This assumption Automatic Control, 52(1):26–38, 2007.
is very mild since it is naturally satisfied by any system with [14] I. Mitchell and C. J. Tomlin. Level set methods for computation in
hybrid systems. In Hybrid Systems: Computation and Control, pages
a sufficiently smooth trajectory function. The computation 310–323. Springer, 2000.
of an interval over-approximation of the reachable set using [15] S. V. Rakovic, E. C. Kerrigan, D. Q. Mayne, and J. Lygeros. Reach-
this approach has favorable scalability, since its complexity ability analysis of discrete-time systems with disturbances. IEEE
Transactions on Automatic Control, 51(4):546–561, 2006.
is at worst linear in the state dimension. [16] N. Ramdani, N. Meslem, and Y. Candau. A hybrid bounding
Since the system trajectories or sensitivity matrices are method for computing an over-approximation for the reachable set of
rarely known explicitly, the main challenge of this method uncertain nonlinear systems. IEEE Transactions on Automatic Control,
54(10):2352–2364, 2009.
lies in obtaining bounds on the sensitivity. Two such ap- [17] W. T. Thomson. Introduction to space dynamics. Dover Publications
proaches are considered in this paper. The first approach Inc., Mineola, NY, USA, 1986.
relies on interval arithmetics and provides guaranteed sen- [18] B. Xue, M. Fränzle, and P. N. Mosaad. Just scratching the surface:
Partial exploration of initial values in reach-set computation. In 56th
sitivity bounds but can rarely be applied in practice, as the IEEE Conference on Decision and Control, pages 1769–1775, 2017.
bounds are often overly conservative and the computation is [19] L. Yang and N. Ozay. A note on some sufficient conditions for mixed
infeasible for larger time steps. The second approach is based monotone systems. Technical Report 2027.42/136122, 2017.