-
Efficient Design and Implementation of Fast-Convolution-Based Variable-Bandwidth Filters
Authors:
Oksana Moryakova,
Håkan Johansson
Abstract:
This paper introduces an efficient design approach for a fast-convolution-based variable-bandwidth (VBW) filter. The proposed approach is based on a hybrid of frequency sampling and optimization (HFSO), that offers significant computational complexity reduction compared to existing solutions for a given performance. The paper provides a design procedure based on minimax optimization to obtain the…
▽ More
This paper introduces an efficient design approach for a fast-convolution-based variable-bandwidth (VBW) filter. The proposed approach is based on a hybrid of frequency sampling and optimization (HFSO), that offers significant computational complexity reduction compared to existing solutions for a given performance. The paper provides a design procedure based on minimax optimization to obtain the minimum complexity of the overall filter. A design example includes a comparison of the proposed design-based VBW filter and time-domain designed VBW filters implemented in the time domain and in the frequency domain. It is shown that not only the implementation complexity can be reduced but also the design complexity by excluding any computations when the bandwidth of the filter is adjusted. Moreover, memory requirements are also decreased compared to the existing frequency-domain implementations.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
Ensuring Safety at Intelligent Intersections: Temporal Logic Meets Reachability Analysis
Authors:
Kaj Munhoz Arfvidsson,
Frank J. Jiang,
Karl H. Johansson,
Jonas Mårtensson
Abstract:
In this work, we propose an approach for ensuring the safety of vehicles passing through an intelligent intersection. There are many proposals for the design of intelligent intersections that introduce central decision-makers to intersections for enhancing the efficiency and safety of the vehicles. To guarantee the safety of such designs, we develop a safety framework for intersections based on te…
▽ More
In this work, we propose an approach for ensuring the safety of vehicles passing through an intelligent intersection. There are many proposals for the design of intelligent intersections that introduce central decision-makers to intersections for enhancing the efficiency and safety of the vehicles. To guarantee the safety of such designs, we develop a safety framework for intersections based on temporal logic and reachability analysis. We start by specifying the required behavior for all the vehicles that need to pass through the intersection as linear temporal logic formula. Then, using temporal logic trees, we break down the linear temporal logic specification into a series of Hamilton-Jacobi reachability analyses in an automated fashion. By successfully constructing the temporal logic tree through reachability analysis, we verify the feasibility of the intersection specification. By taking this approach, we enable a safety framework that is able to automatically provide safety guarantees on new intersection behavior specifications. To evaluate our approach, we implement the framework on a simulated T-intersection, where we show that we can check and guarantee the safety of vehicles with potentially conflicting paths.
△ Less
Submitted 18 May, 2024;
originally announced May 2024.
-
Small-Scale Testbed for Evaluating C-V2X Applications on 5G Cellular Networks
Authors:
Kaj Munhoz Arfvidsson,
Kleio Fragkedaki,
Frank J. Jiang,
Vandana Narri,
Hans-Cristian Lindh,
Karl H. Johansson,
Jonas Mårtensson
Abstract:
In this work, we present a small-scale testbed for evaluating the real-life performance of cellular V2X (C-V2X) applications on 5G cellular networks. Despite the growing interest and rapid technology development for V2X applications, researchers still struggle to prototype V2X applications with real wireless networks, hardware, and software in the loop in a controlled environment. To help alleviat…
▽ More
In this work, we present a small-scale testbed for evaluating the real-life performance of cellular V2X (C-V2X) applications on 5G cellular networks. Despite the growing interest and rapid technology development for V2X applications, researchers still struggle to prototype V2X applications with real wireless networks, hardware, and software in the loop in a controlled environment. To help alleviate this challenge, we present a testbed designed to accelerate development and evaluation of C-V2X applications on 5G cellular networks. By including a small-scale vehicle platform into the testbed design, we significantly reduce the time and effort required to test new C-V2X applications on 5G cellular networks. With a focus around the integration of small-scale vehicle platforms, we detail the design decisions behind the full software and hardware setup of commonly needed intelligent transport system agents (e.g. sensors, servers, vehicles). Moreover, to showcase the testbed's capability to produce industrially-relevant, real world performance evaluations, we present an evaluation of a simple test case inspired from shared situational awareness. Finally, we discuss the upcoming use of the testbed for evaluating 5G cellular network-based shared situational awareness and other C-V2X applications.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
Guaranteed Completion of Complex Tasks via Temporal Logic Trees and Hamilton-Jacobi Reachability
Authors:
Frank J. Jiang,
Kaj Munhoz Arfvidsson,
Chong He,
Mo Chen,
Karl H. Johansson
Abstract:
In this paper, we present an approach for guaranteeing the completion of complex tasks with cyber-physical systems (CPS). Specifically, we leverage temporal logic trees constructed using Hamilton-Jacobi reachability analysis to (1) check for the existence of control policies that complete a specified task and (2) develop a computationally-efficient approach to synthesize the full set of control in…
▽ More
In this paper, we present an approach for guaranteeing the completion of complex tasks with cyber-physical systems (CPS). Specifically, we leverage temporal logic trees constructed using Hamilton-Jacobi reachability analysis to (1) check for the existence of control policies that complete a specified task and (2) develop a computationally-efficient approach to synthesize the full set of control inputs the CPS can implement in real-time to ensure the task is completed. We show that, by checking the approximation directions of each state set in the temporal logic tree, we can check if the temporal logic tree suffers from the "leaking corner issue," where the intersection of reachable sets yields an incorrect approximation. By ensuring a temporal logic tree has no leaking corners, we know the temporal logic tree correctly verifies the existence of control policies that satisfy the specified task. After confirming the existence of control policies, we show that we can leverage the value functions obtained through Hamilton-Jacobi reachability analysis to efficiently compute the set of control inputs the CPS can implement throughout the deployment time horizon to guarantee the completion of the specified task. Finally, we use a newly released Python toolbox to evaluate the presented approach on a simulated driving task.
△ Less
Submitted 12 April, 2024;
originally announced April 2024.
-
Achieving violation-free distributed optimization under coupling constraints
Authors:
Changxin Liu,
Xiao Tan,
Xuyang Wu,
Dimos V. Dimarogonas,
Karl H. Johansson
Abstract:
Constraint satisfaction is a critical component in a wide range of engineering applications, including but not limited to safe multi-agent control and economic dispatch in power systems. This study explores violation-free distributed optimization techniques for problems characterized by separable objective functions and coupling constraints. First, we incorporate auxiliary decision variables toget…
▽ More
Constraint satisfaction is a critical component in a wide range of engineering applications, including but not limited to safe multi-agent control and economic dispatch in power systems. This study explores violation-free distributed optimization techniques for problems characterized by separable objective functions and coupling constraints. First, we incorporate auxiliary decision variables together with a network-dependent linear map** to each coupling constraint. For the reformulated problem, we show that the projection of its feasible set onto the space of primal variables is identical to that of the original problem, which is the key to achieving all-time constraint satisfaction. Upon treating the reformulated problem as a min-min optimization problem with respect to auxiliary and primal variables, we demonstrate that the gradients in the outer minimization problem have a locally computable closed-form. Then, two violation-free distributed optimization algorithms are developed and their convergence under reasonable assumptions is analyzed. Finally, the proposed algorithm is applied to implement a control barrier function based controller in a distributed manner, and the results verify its effectiveness.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
A continuous-time violation-free multi-agent optimization algorithm and its applications to safe distributed control
Authors:
Xiao Tan,
Changxin Liu,
Karl H. Johansson,
Dimos V. Dimarogonas
Abstract:
In this work, we propose a continuous-time distributed optimization algorithm with guaranteed zero coupling constraint violation and apply it to safe distributed control in the presence of multiple control barrier functions (CBF). The optimization problem is defined over a network that collectively minimizes a separable cost function with coupled linear constraints. An equivalent optimization prob…
▽ More
In this work, we propose a continuous-time distributed optimization algorithm with guaranteed zero coupling constraint violation and apply it to safe distributed control in the presence of multiple control barrier functions (CBF). The optimization problem is defined over a network that collectively minimizes a separable cost function with coupled linear constraints. An equivalent optimization problem with auxiliary decision variables and a decoupling structure is proposed. A sensitivity analysis demonstrates that the subgradient information can be computed using local information. This then leads to a subgradient algorithm for updating the auxiliary variables. A case with sparse coupling constraints is further considered, and it is shown to have better memory and communication efficiency. For the specific case of a CBF-induced time-varying quadratic program (QP), an update law is proposed that achieves finite-time convergence. Numerical results involving a static resource allocation problem and a safe coordination problem for a multi-agent system demonstrate the efficiency and effectiveness of our proposed algorithms.
△ Less
Submitted 11 April, 2024;
originally announced April 2024.
-
Formal Verification of Linear Temporal Logic Specifications Using Hybrid Zonotope-Based Reachability Analysis
Authors:
Loizos Hadjiloizou,
Frank J. Jiang,
Amr Alanwar,
Karl H. Johansson
Abstract:
In this paper, we introduce a hybrid zonotope-based approach for formally verifying the behavior of autonomous systems operating under Linear Temporal Logic (LTL) specifications. In particular, we formally verify the LTL formula by constructing temporal logic trees (TLT)s via backward reachability analysis (BRA). In previous works, TLTs are predominantly constructed with either highly general and…
▽ More
In this paper, we introduce a hybrid zonotope-based approach for formally verifying the behavior of autonomous systems operating under Linear Temporal Logic (LTL) specifications. In particular, we formally verify the LTL formula by constructing temporal logic trees (TLT)s via backward reachability analysis (BRA). In previous works, TLTs are predominantly constructed with either highly general and computationally intensive level set-based BRA or simplistic and computationally efficient polytope-based BRA. In this work, we instead propose the construction of TLTs using hybrid zonotope-based BRA. By using hybrid zonotopes, we show that we are able to formally verify LTL specifications in a computationally efficient manner while still being able to represent complex geometries that are often present when deploying autonomous systems, such as non-convex, disjoint sets. Moreover, we evaluate our approach on a parking example, providing preliminary indications of how hybrid zonotopes facilitate computationally efficient formal verification of LTL specifications in environments that naturally lead to non-convex, disjoint geometries.
△ Less
Submitted 4 April, 2024;
originally announced April 2024.
-
Risk-averse Learning with Non-Stationary Distributions
Authors:
Siyi Wang,
Zifan Wang,
Xinlei Yi,
Michael M. Zavlanos,
Karl H. Johansson,
Sandra Hirche
Abstract:
Considering non-stationary environments in online optimization enables decision-maker to effectively adapt to changes and improve its performance over time. In such cases, it is favorable to adopt a strategy that minimizes the negative impact of change to avoid potentially risky situations. In this paper, we investigate risk-averse online optimization where the distribution of the random cost chan…
▽ More
Considering non-stationary environments in online optimization enables decision-maker to effectively adapt to changes and improve its performance over time. In such cases, it is favorable to adopt a strategy that minimizes the negative impact of change to avoid potentially risky situations. In this paper, we investigate risk-averse online optimization where the distribution of the random cost changes over time. We minimize risk-averse objective function using the Conditional Value at Risk (CVaR) as risk measure. Due to the difficulty in obtaining the exact CVaR gradient, we employ a zeroth-order optimization approach that queries the cost function values multiple times at each iteration and estimates the CVaR gradient using the sampled values. To facilitate the regret analysis, we use a variation metric based on Wasserstein distance to capture time-varying distributions. Given that the distribution variation is sub-linear in the total number of episodes, we show that our designed learning algorithm achieves sub-linear dynamic regret with high probability for both convex and strongly convex functions. Moreover, theoretical results suggest that increasing the number of samples leads to a reduction in the dynamic regret bounds until the sampling number reaches a specific limit. Finally, we provide numerical experiments of dynamic pricing in a parking lot to illustrate the efficacy of the designed algorithm.
△ Less
Submitted 3 April, 2024;
originally announced April 2024.
-
Reachability Analysis Using Constrained Polynomial Logical Zonotopes
Authors:
Ahmad Hafez,
Frank J. Jiang,
Karl H. Johansson,
Amr Alanwar
Abstract:
In this paper, we propose reachability analysis using constrained polynomial logical zonotopes. We perform reachability analysis to compute the set of states that could be reached. To do this, we utilize a recently introduced set representation called polynomial logical zonotopes for performing computationally efficient and exact reachability analysis on logical systems. Notably, polynomial logica…
▽ More
In this paper, we propose reachability analysis using constrained polynomial logical zonotopes. We perform reachability analysis to compute the set of states that could be reached. To do this, we utilize a recently introduced set representation called polynomial logical zonotopes for performing computationally efficient and exact reachability analysis on logical systems. Notably, polynomial logical zonotopes address the "curse of dimensionality" when analyzing the reachability of logical systems since the set representation can represent $2^h$ binary vectors using $h$ generators. After finishing the reachability analysis, the formal verification involves verifying whether the intersection of the calculated reachable set and the unsafe set is empty or not. Polynomial logical zonotopes lack closure under intersections, prompting the formulation of constrained polynomial logical zonotopes, which preserve the computational efficiency and exactness of polynomial logical zonotopes for reachability analysis while enabling exact intersections. Additionally, an extensive empirical study is presented to demonstrate and validate the advantages of constrained polynomial logical zonotopes.
△ Less
Submitted 19 June, 2024; v1 submitted 27 March, 2024;
originally announced March 2024.
-
Differentially Private Dual Gradient Tracking for Distributed Resource Allocation
Authors:
Wei Huo,
Xiaomeng Chen,
Lingying Huang,
Karl Henrik Johansson,
Ling Shi
Abstract:
This paper investigates privacy issues in distributed resource allocation over directed networks, where each agent holds a private cost function and optimizes its decision subject to a global coupling constraint through local interaction with other agents. Conventional methods for resource allocation over directed networks require all agents to transmit their original data to neighbors, which pose…
▽ More
This paper investigates privacy issues in distributed resource allocation over directed networks, where each agent holds a private cost function and optimizes its decision subject to a global coupling constraint through local interaction with other agents. Conventional methods for resource allocation over directed networks require all agents to transmit their original data to neighbors, which poses the risk of disclosing sensitive and private information. To address this issue, we propose an algorithm called differentially private dual gradient tracking (DP-DGT) for distributed resource allocation, which obfuscates the exchanged messages using independent Laplacian noise. Our algorithm ensures that the agents' decisions converge to a neighborhood of the optimal solution almost surely. Furthermore, without the assumption of bounded gradients, we prove that the cumulative differential privacy loss under the proposed algorithm is finite even when the number of iterations goes to infinity. To the best of our knowledge, we are the first to simultaneously achieve these two goals in distributed resource allocation problems over directed networks. Finally, numerical simulations on economic dispatch problems within the IEEE 14-bus system illustrate the effectiveness of our proposed algorithm.
△ Less
Submitted 27 March, 2024;
originally announced March 2024.
-
Motion Planning for Identification of Linear Classifiers
Authors:
Aneesh Raghavan,
Karl Henrik Johansson
Abstract:
A given region in 2-D Euclidean space is divided by a unknown linear classifier in to two sets each carrying a label. The objective of an agent with known dynamics traversing the region is to identify the true classifier while paying a control cost across its trajectory. We consider two scenarios: (i) the agent is able to measure the true label perfectly; (ii) the observed label is the true label…
▽ More
A given region in 2-D Euclidean space is divided by a unknown linear classifier in to two sets each carrying a label. The objective of an agent with known dynamics traversing the region is to identify the true classifier while paying a control cost across its trajectory. We consider two scenarios: (i) the agent is able to measure the true label perfectly; (ii) the observed label is the true label multiplied by noise. We present the following: (i) the classifier identification problem formulated as a control problem; (ii) geometric interpretation of the control problem resulting in one step modified control problems; (iii) control algorithms that result in data sets which are used to identify the true classifier with accuracy; (iv) convergence of estimated classifier to the true classifier when the observed label is not corrupted by noise; (iv) numerical example demonstrating the utility of the control algorithms.
△ Less
Submitted 22 March, 2024;
originally announced March 2024.
-
Inverse learning of black-box aggregator for robust Nash equilibrium
Authors:
Guanpu Chen,
Gehui Xu,
Fengxiang He,
Dacheng Tao,
Thomas Parisini,
Karl Henrik Johansson
Abstract:
In this note, we investigate the robustness of Nash equilibria (NE) in multi-player aggregative games with coupling constraints. There are many algorithms for computing an NE of an aggregative game given a known aggregator. When the coupling parameters are affected by uncertainty, robust NE need to be computed. We consider a scenario where players' weight in the aggregator is unknown, making the a…
▽ More
In this note, we investigate the robustness of Nash equilibria (NE) in multi-player aggregative games with coupling constraints. There are many algorithms for computing an NE of an aggregative game given a known aggregator. When the coupling parameters are affected by uncertainty, robust NE need to be computed. We consider a scenario where players' weight in the aggregator is unknown, making the aggregator kind of "a black box". We pursue a suitable learning approach to estimate the unknown aggregator by proposing an inverse variational inequality-based relationship. We then utilize the counterpart to reconstruct the game and obtain first-order conditions for robust NE in the worst case. Furthermore, we characterize the generalization property of the learning methodology via an upper bound on the violation probability. Simulation experiments show the effectiveness of the proposed inverse learning approach.
△ Less
Submitted 16 March, 2024;
originally announced March 2024.
-
Distributed Estimation by Two Agents with Different Feature Spaces
Authors:
Aneesh Raghavan,
Karl Henrik Johansson
Abstract:
We consider the problem of estimation of a function by a system consisting of two agents and a fusion center. The two agents collect data comprising of samples of an independent variable and the corresponding value of a dependent variable. The objective of the system is to collaboratively estimate the function without any exchange of data among the members of the system. To this end, we propose th…
▽ More
We consider the problem of estimation of a function by a system consisting of two agents and a fusion center. The two agents collect data comprising of samples of an independent variable and the corresponding value of a dependent variable. The objective of the system is to collaboratively estimate the function without any exchange of data among the members of the system. To this end, we propose the following framework. The agents are given a set of features using which they construct suitable function spaces to formulate and solve the estimation problems locally. The estimated functions are uploaded to a fusion space where an optimization problem is solved to fuse the estimates (also known as meta-learning) to obtain the system estimate of the map**. The fused function is then downloaded by the agents to gather knowledge about the other agents estimate of the function. With respect to the framework, we present the following: a systematic construction of fusion space given the features of the agents; the derivation of an uploading operator for the agents to upload their estimated functions to a fusion space; the derivation of a downloading operator for the fused function to be downloaded. Through an example on least squares regression, we illustrate the distributed estimation architecture that has been developed.
△ Less
Submitted 15 March, 2024; v1 submitted 12 March, 2024;
originally announced March 2024.
-
MaxCUCL: Max-Consensus with Deterministic Convergence in Networks with Unreliable Communication
Authors:
Apostolos I. Rikos,
Themistoklis Charalambous,
Karl H. Johansson
Abstract:
In this paper, we present a novel distributed algorithm (herein called MaxCUCL) designed to guarantee that max-consensus is reached in networks characterized by unreliable communication links (i.e., links suffering from packet drops). Our proposed algorithm is the first algorithm that achieves max-consensus in a deterministic manner (i.e., nodes always calculate the maximum of their states regardl…
▽ More
In this paper, we present a novel distributed algorithm (herein called MaxCUCL) designed to guarantee that max-consensus is reached in networks characterized by unreliable communication links (i.e., links suffering from packet drops). Our proposed algorithm is the first algorithm that achieves max-consensus in a deterministic manner (i.e., nodes always calculate the maximum of their states regardless of the nature of the probability distribution of the packet drops). Furthermore, it allows nodes to determine whether convergence has been achieved (enabling them to transition to subsequent tasks). The operation of MaxCUCL relies on the deployment of narrowband error-free feedback channels used for acknowledging whether a packet transmission between nodes was successful. We analyze the operation of our algorithm and show that it converges after a finite number of time steps. Finally, we demonstrate our algorithm's effectiveness and practical applicability by applying it to a sensor network deployed for environmental monitoring.
△ Less
Submitted 28 February, 2024;
originally announced February 2024.
-
Order Estimation of Linear-Phase FIR Filters for DAC Equalization in Multiple Nyquist Bands
Authors:
Deijany Rodriguez Linares,
Håkan Johansson,
Yinan Wang
Abstract:
This letter considers the design of linear-phase finite-length impulse response (FIR) filters for equalization of the frequency responses of digital-to-analog converters (DACs). The letter derives estimates for the filter orders required, as functions of the bandwidth and equalization accuracy, for four DAC pulses that are used in DACs in multiple Nyquist bands. The estimates are derived through a…
▽ More
This letter considers the design of linear-phase finite-length impulse response (FIR) filters for equalization of the frequency responses of digital-to-analog converters (DACs). The letter derives estimates for the filter orders required, as functions of the bandwidth and equalization accuracy, for four DAC pulses that are used in DACs in multiple Nyquist bands. The estimates are derived through a large set of minimax-optimal equalizers and the use of symbolic regression followed by minimax-optimal curve fitting for further enhancement. Design examples included demonstrate the accuracy of the proposed estimates. In addition, the letter discusses the appropriateness of the four types of linear-phase FIR filters, for the different equalizer cases, as well as the corresponding properties of the equalized systems.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
Survey of Distributed Algorithms for Resource Allocation over Multi-Agent Systems
Authors:
Mohammadreza Doostmohammadian,
Alireza Aghasi,
Mohammad Pirani,
Ehsan Nekouei,
Houman Zarrabi,
Reza Keypour,
Apostolos I. Rikos,
Karl H. Johansson
Abstract:
Resource allocation and scheduling in multi-agent systems present challenges due to complex interactions and decentralization. This survey paper provides a comprehensive analysis of distributed algorithms for addressing the distributed resource allocation (DRA) problem over multi-agent systems. It covers a significant area of research at the intersection of optimization, multi-agent systems, and d…
▽ More
Resource allocation and scheduling in multi-agent systems present challenges due to complex interactions and decentralization. This survey paper provides a comprehensive analysis of distributed algorithms for addressing the distributed resource allocation (DRA) problem over multi-agent systems. It covers a significant area of research at the intersection of optimization, multi-agent systems, and distributed consensus-based computing. The paper begins by presenting a mathematical formulation of the DRA problem, establishing a solid foundation for further exploration. Real-world applications of DRA in various domains are examined to underscore the importance of efficient resource allocation, and relevant distributed optimization formulations are presented. The survey then delves into existing solutions for DRA, encompassing linear, nonlinear, primal-based, and dual-formulation-based approaches. Furthermore, this paper evaluates the features and properties of DRA algorithms, addressing key aspects such as feasibility, convergence rate, and network reliability. The analysis of mathematical foundations, diverse applications, existing solutions, and algorithmic properties contributes to a broader comprehension of the challenges and potential solutions for this domain.
△ Less
Submitted 28 January, 2024;
originally announced January 2024.
-
Distributed Learning and Function Fusion in Reproducing Kernel Hilbert Space
Authors:
Aneesh Raghavan,
Karl Henrik Johansson
Abstract:
We consider the problem of function estimation by a multi-agent system comprising of two agents and a fusion center. Each agent receives data comprising of samples of an independent variable (input) and the corresponding values of the dependent variable (output). The data remains local and is not shared with other members in the system. The objective of the system is to collaboratively estimate th…
▽ More
We consider the problem of function estimation by a multi-agent system comprising of two agents and a fusion center. Each agent receives data comprising of samples of an independent variable (input) and the corresponding values of the dependent variable (output). The data remains local and is not shared with other members in the system. The objective of the system is to collaboratively estimate the function from the input to the output. To this end, we develop an iterative distributed algorithm for this function estimation problem. Each agent solves a local estimation problem in a Reproducing Kernel Hilbert Space (RKHS) and uploads the function to the fusion center. At the fusion center, the functions are fused by first estimating the data points that would have generated the uploaded functions and then subsequently solving a least squares estimation problem using the estimated data from both functions. The fused function is downloaded by the agents and is subsequently used for estimation at the next iteration along with incoming data. This procedure is executed sequentially and stopped when the difference between consecutively estimated functions becomes small enough. To analyze the algorithm, we define learning operators for the agents, fusion center and the system. We study the asymptotic properties of the norm of the learning operators and find sufficient conditions under which they converge to $1$. Given a sequence of data points, we define and prove the existence of the learning operator for the system. We prove that the porposed learning algorithm is consistent and demonstrate the same using an example. The paper has been submitted to L4DC 2024.
△ Less
Submitted 5 January, 2024;
originally announced January 2024.
-
Learning flow functions of spiking systems
Authors:
Miguel Aguiar,
Amritam Das,
Karl H. Johansson
Abstract:
We propose a framework for surrogate modelling of spiking systems. These systems are often described by stiff differential equations with high-amplitude oscillations and multi-timescale dynamics, making surrogate models an attractive tool for system design and simulation. We parameterise the flow function of a spiking system using a recurrent neural network architecture, allowing for a direct cont…
▽ More
We propose a framework for surrogate modelling of spiking systems. These systems are often described by stiff differential equations with high-amplitude oscillations and multi-timescale dynamics, making surrogate models an attractive tool for system design and simulation. We parameterise the flow function of a spiking system using a recurrent neural network architecture, allowing for a direct continuous-time representation of the state trajectories. The spiking nature of the signals makes for a data-heavy and computationally hard training process; thus, we describe two methods to mitigate these difficulties. We demonstrate our framework on two conductance-based models of biological neurons, showing that we are able to train surrogate models which accurately replicate the spiking behaviour.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Almost Exact Recovery in Gossip Opinion Dynamics over Stochastic Block Models
Authors:
Yu Xing,
Karl H. Johansson
Abstract:
We study community detection based on state observations from gossip opinion dynamics over stochastic block models (SBM). It is assumed that a network is generated from a two-community SBM where each agent has a community label and each edge exists with probability depending on its endpoints' labels. A gossip process then evolves over the sampled network. We propose two algorithms to detect the co…
▽ More
We study community detection based on state observations from gossip opinion dynamics over stochastic block models (SBM). It is assumed that a network is generated from a two-community SBM where each agent has a community label and each edge exists with probability depending on its endpoints' labels. A gossip process then evolves over the sampled network. We propose two algorithms to detect the communities out of a single trajectory of the process. It is shown that, when the influence of stubborn agents is small and the link probability within communities is large, an algorithm based on clustering transient agent states can achieve almost exact recovery of the communities. That is, the algorithm can recover all but a vanishing part of community labels with high probability. In contrast, when the influence of stubborn agents is large, another algorithm based on clustering time average of agent states can achieve almost exact recovery. Numerical experiments are given for illustration of the two algorithms and the theoretical results of the paper.
△ Less
Submitted 4 December, 2023;
originally announced December 2023.
-
Data-Driven Kalman Filter using Maximum Likelihood Optimization
Authors:
Peihu Duan,
Tao Liu,
Yu Xing,
Karl Henrik Johansson
Abstract:
This paper investigates the state estimation problem for unknown linear systems with process and measurement noise. A novel data-driven Kalman filter (DDKF) that combines model identification with state estimation is developed using pre-collected input-output data and uncertain initial state information of the unknown system. Specifically, the state estimation problem is first formulated as a non-…
▽ More
This paper investigates the state estimation problem for unknown linear systems with process and measurement noise. A novel data-driven Kalman filter (DDKF) that combines model identification with state estimation is developed using pre-collected input-output data and uncertain initial state information of the unknown system. Specifically, the state estimation problem is first formulated as a non-convex maximum likelihood (ML) optimization problem. Then, to reduce the computational complexity, the optimization problem is broken down into a series of sub-problems in a recursive manner. Based on the optimal solutions to the sub-problems, a closed-form DDKF is designed for the unknown system, which can estimate the state of a physically meaningful state-space realization, rather than these up to an unknown similarity transformation. The performance gap between the DDKF and the traditional Kalman filter with accurate system matrices is quantified through a sample complexity bound. In particular, when the number of the pre-collected trajectories tends to infinity, this gap converges to zero. Moreover, the DDKF is used to facilitate data-driven control design. A data-driven linear quadratic Gaussian controller is defined and its closed-loop performance is characterized. Finally, the effectiveness of the theoretical results is illustrated by numerical simulations.
△ Less
Submitted 29 November, 2023;
originally announced November 2023.
-
Distributed Charging Coordination of Electric Trucks with Limited Charging Resources
Authors:
Ting Bai,
Yuchao Li,
Karl Henrik Johansson,
Jonas Mårtensson
Abstract:
Electric trucks usually need to charge their batteries during long-range delivery missions, and the charging times are often nontrivial. As charging resources are limited, waiting times for some trucks can be prolonged at certain stations. To facilitate the efficient operation of electric trucks, we propose a distributed charging coordination framework. Within the scheme, the charging stations pro…
▽ More
Electric trucks usually need to charge their batteries during long-range delivery missions, and the charging times are often nontrivial. As charging resources are limited, waiting times for some trucks can be prolonged at certain stations. To facilitate the efficient operation of electric trucks, we propose a distributed charging coordination framework. Within the scheme, the charging stations provide waiting estimates to incoming trucks upon request and assign charging ports according to the first-come, first-served rule. Based on the updated information, the individual trucks compute where and how long to charge whenever approaching a charging station in order to complete their delivery missions timely and cost-effectively. We perform empirical studies for trucks traveling over the Swedish road network and compare our scheme with the one where charging plans are computed offline, assuming unlimited charging facilities. It is shown that the proposed scheme outperforms the offline approach at the expense of little communication overhead.
△ Less
Submitted 6 March, 2024; v1 submitted 12 November, 2023;
originally announced November 2023.
-
Hub-Based Platoon Formation: Optimal Release Policies and Approximate Solutions
Authors:
Alexander Johansson,
Ehsan Nekouei,
Xiaotong Sun,
Karl Henrik Johansson,
Jonas Mårtensson
Abstract:
This paper studies the optimal hub-based platoon formation at hubs along a highway under decentralized, distributed, and centralized policies. Hubs are locations along highways where trucks can wait for other trucks to form platoons. A coordinator at each hub decides the departure time of trucks, and the released trucks from the hub will form platoons. The problem is cast as an optimization proble…
▽ More
This paper studies the optimal hub-based platoon formation at hubs along a highway under decentralized, distributed, and centralized policies. Hubs are locations along highways where trucks can wait for other trucks to form platoons. A coordinator at each hub decides the departure time of trucks, and the released trucks from the hub will form platoons. The problem is cast as an optimization problem where the objective is to maximize the platooning reward. We first show that the optimal release policy in the decentralized case, where the hubs do not exchange information, is to release all trucks at the hub when the number of trucks exceeds a threshold computed by dynamic programming. We develop efficient approximate release policies for the dependent arrival case using this result. To study the value of information exchange among hubs on platoon formation, we next study the distributed and centralized platoon formation policies which require information exchange among hubs. To this end, we develop receding horizon solutions for the distributed and centralized platoon formation at hubs using the dynamic programming technique. Finally, we perform a simulation study over three hubs in northern Sweden. The profits of the decentralized policies are shown to be approximately 3.5% lower than the distributed policy and 8% lower than the centralized release policy. This observation suggests that decentralized policies are prominent solutions for hub-based platooning as they do not require information exchange among hubs and can achieve a similar performance compared with distributed and centralized policies.
△ Less
Submitted 11 November, 2023;
originally announced November 2023.
-
Optimal Privacy-Aware Dynamic Estimation
Authors:
Chuanghong Weng,
Ehsan Nekouei,
Karl H. Johansson
Abstract:
In this paper, we develop an information-theoretic framework for the optimal privacy-aware estimation of the states of a (linear or nonlinear) system. In our setup, a private process, modeled as a first-order Markov chain, derives the states of the system, and the state estimates are shared with an untrusted party who might attempt to infer the private process based on the state estimates. As the…
▽ More
In this paper, we develop an information-theoretic framework for the optimal privacy-aware estimation of the states of a (linear or nonlinear) system. In our setup, a private process, modeled as a first-order Markov chain, derives the states of the system, and the state estimates are shared with an untrusted party who might attempt to infer the private process based on the state estimates. As the privacy metric, we use the mutual information between the private process and the state estimates. We first show that the privacy-aware estimation is a closed-loop control problem wherein the estimator controls the belief of the adversary about the private process. We also derive the Bellman optimality principle for the optimal privacy-aware estimation problem, which is used to study the structural properties of the optimal estimator. We next develop a policy gradient algorithm, for computing an optimal estimation policy, based on a novel variational formulation of the mutual information. We finally study the performance of the optimal estimator in a building automation application.
△ Less
Submitted 10 November, 2023;
originally announced November 2023.
-
Social interactions for a sustainable lifestyle: The design of an experimental case study
Authors:
Angela Fontan,
Mahsa Farjadnia,
Joe Llewellyn,
Cecilia Katzeff,
Marco Molinari,
Vladimir Cvetkovic,
Karl Henrik Johansson
Abstract:
Every day we face numerous lifestyle decisions, some dictated by habits and some more conscious, which may or may not promote sustainable living. Aided by digital technology, sustainable behaviors can diffuse within social groups and inclusive communities. This paper outlines a longitudinal experimental study of social influence in behavioral changes toward sustainability, in the context of smart…
▽ More
Every day we face numerous lifestyle decisions, some dictated by habits and some more conscious, which may or may not promote sustainable living. Aided by digital technology, sustainable behaviors can diffuse within social groups and inclusive communities. This paper outlines a longitudinal experimental study of social influence in behavioral changes toward sustainability, in the context of smart residential homes. Participants are residing in the housing on campus referred to as KTH Live-In Lab, whose behaviors are observed w.r.t. key lifestyle choices, such as food, resources, mobility, consumption, and environmental citizenship. The focus is on the preparatory phase of the case study and the challenges and limitations encountered during its setup. In particular, this work proposes a definition of sustainability indicators for environmentally significant behaviors, and hypothesizes that, through digitalization of a household into a social network of interacting tenants, sustainable living can be promoted. Preliminary results confirm the feasibility of the proposed experimental methodology.
△ Less
Submitted 20 September, 2023;
originally announced September 2023.
-
Gain and Phase: Decentralized Stability Conditions for Power Electronics-Dominated Power Systems
Authors:
Linbin Huang,
Dan Wang,
Xiongfei Wang,
Huanhai Xin,
** Ju,
Karl H. Johansson,
Florian Dörfler
Abstract:
This paper proposes decentralized stability conditions for multi-converter systems based on the combination of the small gain theorem and the small phase theorem. Instead of directly computing the closed-loop dynamics, e.g., eigenvalues of the state-space matrix, or using the generalized Nyquist stability criterion, the proposed stability conditions are more scalable and computationally lighter, w…
▽ More
This paper proposes decentralized stability conditions for multi-converter systems based on the combination of the small gain theorem and the small phase theorem. Instead of directly computing the closed-loop dynamics, e.g., eigenvalues of the state-space matrix, or using the generalized Nyquist stability criterion, the proposed stability conditions are more scalable and computationally lighter, which aim at evaluating the closed-loop system stability by comparing the individual converter dynamics with the network dynamics in a decentralized and open-loop manner. Moreover, our approach can handle heterogeneous converters' dynamics and is suitable to analyze large-scale multi-converter power systems that contain grid-following (GFL), grid-forming (GFM) converters, and synchronous generators. Compared with other decentralized stability conditions, e.g., passivity-based stability conditions, the proposed conditions are significantly less conservative and can be generally satisfied in practice across the whole frequency range.
△ Less
Submitted 10 January, 2024; v1 submitted 14 September, 2023;
originally announced September 2023.
-
Secure Set-Based State Estimation for Linear Systems under Adversarial Attacks on Sensors
Authors:
M. Umar B. Niazi,
Michelle S. Chong,
Amr Alanwar,
Karl H. Johansson
Abstract:
Set-based state estimation plays a vital role in the safety verification of dynamical systems, which becomes significantly challenging when the system's sensors are susceptible to cyber-attacks. Existing methods often impose limitations on the attacker's capabilities, restricting the number of attacked sensors to be strictly less than half of the total number of sensors. This paper proposes a Secu…
▽ More
Set-based state estimation plays a vital role in the safety verification of dynamical systems, which becomes significantly challenging when the system's sensors are susceptible to cyber-attacks. Existing methods often impose limitations on the attacker's capabilities, restricting the number of attacked sensors to be strictly less than half of the total number of sensors. This paper proposes a Secure Set-Based State Estimation (S3E) algorithm that addresses this limitation. The S3E algorithm guarantees that the true system state is contained within the estimated set, provided the initialization set encompasses the true initial state and the system is redundantly observable from the set of uncompromised sensors. The algorithm gives the estimated set as a collection of constrained zonotopes, which can be employed as robust certificates for verifying whether the system adheres to safety constraints. Furthermore, we demonstrate that the estimated set remains unaffected by attack signals of sufficiently large and also establish sufficient conditions for attack detection, identification, and filtering. This compels the attacker to inject only stealthy signals of small magnitude to evade detection, thus preserving the accuracy of the estimated set. When a few number of sensors (less than half) can be compromised, we prove that the estimated set remains bounded by a contracting set that converges to a ball whose radius is solely determined by the noise magnitude and is independent of the attack signals. To address the computational complexity of the algorithm, we offer several strategies for complexity-performance trade-offs. The efficacy of the proposed algorithm is illustrated through its application to a three-story building model.
△ Less
Submitted 16 May, 2024; v1 submitted 10 September, 2023;
originally announced September 2023.
-
Distributed Optimization via Gradient Descent with Event-Triggered Zooming over Quantized Communication
Authors:
Apostolos I. Rikos,
Wei Jiang,
Themistoklis Charalambous,
Karl H. Johansson
Abstract:
In this paper, we study unconstrained distributed optimization strongly convex problems, in which the exchange of information in the network is captured by a directed graph topology over digital channels that have limited capacity (and hence information should be quantized). Distributed methods in which nodes use quantized communication yield a solution at the proximity of the optimal solution, he…
▽ More
In this paper, we study unconstrained distributed optimization strongly convex problems, in which the exchange of information in the network is captured by a directed graph topology over digital channels that have limited capacity (and hence information should be quantized). Distributed methods in which nodes use quantized communication yield a solution at the proximity of the optimal solution, hence reaching an error floor that depends on the quantization level used; the finer the quantization the lower the error floor. However, it is not possible to determine in advance the optimal quantization level that ensures specific performance guarantees (such as achieving an error floor below a predefined threshold). Choosing a very small quantization level that would guarantee the desired performance, requires {information} packets of very large size, which is not desirable (could increase the probability of packet losses, increase delays, etc) and often not feasible due to the limited capacity of the channels available. In order to obtain a communication-efficient distributed solution and a sufficiently close proximity to the optimal solution, we propose a quantized distributed optimization algorithm that converges in a finite number of steps and is able to adjust the quantization level accordingly. The proposed solution uses a finite-time distributed optimization protocol to find a solution to the problem for a given quantization level in a finite number of steps and keeps refining the quantization level until the difference in the solution between two successive solutions with different quantization levels is below a certain pre-specified threshold.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Asynchronous Distributed Optimization via ADMM with Efficient Communication
Authors:
Apostolos I. Rikos,
Wei Jiang,
Themistoklis Charalambous,
Karl H. Johansson
Abstract:
In this paper, we focus on an asynchronous distributed optimization problem. In our problem, each node is endowed with a convex local cost function, and is able to communicate with its neighbors over a directed communication network. Furthermore, we assume that the communication channels between nodes have limited bandwidth, and each node suffers from processing delays. We present a distributed al…
▽ More
In this paper, we focus on an asynchronous distributed optimization problem. In our problem, each node is endowed with a convex local cost function, and is able to communicate with its neighbors over a directed communication network. Furthermore, we assume that the communication channels between nodes have limited bandwidth, and each node suffers from processing delays. We present a distributed algorithm which combines the Alternating Direction Method of Multipliers (ADMM) strategy with a finite time quantized averaging algorithm. In our proposed algorithm, nodes exchange quantized valued messages and operate in an asynchronous fashion. More specifically, during every iteration of our algorithm each node (i) solves a local convex optimization problem (for the one of its primal variables), and (ii) utilizes a finite-time quantized averaging algorithm to obtain the value of the second primal variable (since the cost function for the second primal variable is not decomposable). We show that our algorithm converges to the optimal solution at a rate of $O(1/k)$ (where $k$ is the number of time steps) for the case where the local cost function of every node is convex and not-necessarily differentiable. Finally, we demonstrate the operational advantages of our algorithm against other algorithms from the literature.
△ Less
Submitted 8 September, 2023;
originally announced September 2023.
-
Robust Online Learning over Networks
Authors:
Nicola Bastianello,
Diego Deplano,
Mauro Franceschelli,
Karl H. Johansson
Abstract:
The recent deployment of multi-agent networks has enabled the distributed solution of learning problems, where agents cooperate to train a global model without sharing their local, private data. This work specifically targets some prevalent challenges inherent to distributed learning: (i) online training, i.e., the local data change over time; (ii) asynchronous agent computations; (iii) unreliable…
▽ More
The recent deployment of multi-agent networks has enabled the distributed solution of learning problems, where agents cooperate to train a global model without sharing their local, private data. This work specifically targets some prevalent challenges inherent to distributed learning: (i) online training, i.e., the local data change over time; (ii) asynchronous agent computations; (iii) unreliable and limited communications; and (iv) inexact local computations. To tackle these challenges, we apply the Distributed Operator Theoretical (DOT) version of the Alternating Direction Method of Multipliers (ADMM), which we call "DOT-ADMM". We prove that if the DOT-ADMM operator is metric subregular, then it converges with a linear rate for a large class of (not necessarily strongly) convex learning problems toward a bounded neighborhood of the optimal time-varying solution, and characterize how such neighborhood depends on (i)-(iv). We first derive an easy-to-verify condition for ensuring the metric subregularity of an operator, followed by tutorial examples on linear and logistic regression problems. We corroborate the theoretical analysis with numerical simulations comparing DOT-ADMM with other state-of-the-art algorithms, showing that only the proposed algorithm exhibits robustness to (i)-(iv).
△ Less
Submitted 17 May, 2024; v1 submitted 1 September, 2023;
originally announced September 2023.
-
Data-Driven Reachability Analysis of Pedestrians Using Behavior Modes
Authors:
August Söderlund,
Frank J. Jiang,
Vandana Narri,
Amr Alanwar,
Karl H. Johansson
Abstract:
In this paper, we present a data-driven approach for safely predicting the future state sets of pedestrians. Previous approaches to predicting the future state sets of pedestrians either do not provide safety guarantees or are overly conservative. Moreover, an additional challenge is the selection or identification of a model that sufficiently captures the motion of pedestrians. To address these i…
▽ More
In this paper, we present a data-driven approach for safely predicting the future state sets of pedestrians. Previous approaches to predicting the future state sets of pedestrians either do not provide safety guarantees or are overly conservative. Moreover, an additional challenge is the selection or identification of a model that sufficiently captures the motion of pedestrians. To address these issues, this paper introduces the idea of splitting previously collected, historical pedestrian trajectories into different behavior modes for performing data-driven reachability analysis. Through this proposed approach, we are able to use data-driven reachability analysis to capture the future state sets of pedestrians, while being less conservative and still maintaining safety guarantees. Furthermore, this approach is modular and can support different approaches for behavior splitting. To illustrate the efficacy of the approach, we implement our method with a basic behavior-splitting module and evaluate the implementation on an open-source data set of real pedestrian trajectories. In this evaluation, we find that the modal reachable sets are less conservative and more descriptive of the future state sets of the pedestrian.
△ Less
Submitted 21 August, 2023;
originally announced August 2023.
-
Least-Squares Design of Chromatic Dispersion Compensation FIR Filters Realized with Overlap-Save Processing
Authors:
Oscar Gustafsson,
Cheolyong Bae,
Hakan Johansson
Abstract:
A design method for chromatic dispersion compensation filters realized using overlap-save processing in the frequency domain is proposed. Based on the idea to use the values that are normally zero-padded, better results than using optimal time-domain design are obtained without any modification of the overlap-save processing complexity.
A design method for chromatic dispersion compensation filters realized using overlap-save processing in the frequency domain is proposed. Based on the idea to use the values that are normally zero-padded, better results than using optimal time-domain design are obtained without any modification of the overlap-save processing complexity.
△ Less
Submitted 20 June, 2023;
originally announced August 2023.
-
Large-Scale Multi-Fleet Platoon Coordination: A Dynamic Programming Approach
Authors:
Ting Bai,
Alexander Johansson,
Karl Henrik Johansson,
Jonas Mårtensson
Abstract:
Truck platooning is a promising technology that enables trucks to travel in formations with small inter-vehicle distances for improved aerodynamics and fuel economy. The real-world transportation system includes a vast number of trucks owned by different fleet owners, for example, carriers. To fully exploit the benefits of platooning, efficient dispatching strategies that facilitate the platoon fo…
▽ More
Truck platooning is a promising technology that enables trucks to travel in formations with small inter-vehicle distances for improved aerodynamics and fuel economy. The real-world transportation system includes a vast number of trucks owned by different fleet owners, for example, carriers. To fully exploit the benefits of platooning, efficient dispatching strategies that facilitate the platoon formations across fleets are required. This paper presents a distributed framework for addressing multi-fleet platoon coordination in large transportation networks, where each truck has a fixed route and aims to maximize its own fleet's platooning profit by scheduling its waiting times at hubs. The waiting time scheduling problem of individual trucks is formulated as a distributed optimal control problem with continuous decision space and a reward function that takes non-zero values only at discrete points. By suitably discretizing the decision and state spaces, we show that the problem can be solved exactly by dynamic programming, without loss of optimality. Finally, a realistic simulation study is conducted over the Swedish road network with $5,000$ trucks to evaluate the profit and efficiency of the approach. The simulation study shows that, compared to single-fleet platooning, multi-fleet platooning provided by our method achieves around $15$ times higher monetary profit and increases the CO$_2$ emission reductions from $0.4\%$ to $5.5\%$. In addition, it shows that the developed approach can be carried out in real-time and thus is suitable for platoon coordination in large transportation systems.
△ Less
Submitted 21 July, 2023;
originally announced July 2023.
-
What influences occupants' behavior in residential buildings: An experimental study on window operation in the KTH Live-In Lab
Authors:
Mahsa Farjadnia,
Angela Fontan,
Alessio Russo,
Karl Henrik Johansson,
Marco Molinari
Abstract:
Window-opening and window-closing behaviors play an important role in indoor environmental conditions and therefore have an impact on building energy efficiency. On the other hand, the same environmental conditions drive occupants to interact with windows. Understanding this mutual relationship of interaction between occupants and the residential building is thus crucial to improve energy efficien…
▽ More
Window-opening and window-closing behaviors play an important role in indoor environmental conditions and therefore have an impact on building energy efficiency. On the other hand, the same environmental conditions drive occupants to interact with windows. Understanding this mutual relationship of interaction between occupants and the residential building is thus crucial to improve energy efficiency without disregarding occupants' comfort. This paper investigates the influence of physical environmental variables (i.e., indoor and outside climate parameters) and categorical variables (i.e., time of the day) on occupants' behavior patterns related to window operation, utilizing a multivariate logistic regression analysis. The data considered in this study are collected during winter months, when the effect on the energy consumption of the window operation is the highest, at a Swedish residential building, the KTH Live-In Lab, accommodating four occupants in separate studio apartments. Although all the occupants seem to share a sensitivity to some common factors, such as air quality and time of the day, we can also observe individual variability with respect to the most significant drivers influencing window operation behaviors.
△ Less
Submitted 16 July, 2023;
originally announced July 2023.
-
Joint Learning of Network Topology and Opinion Dynamics Based on Bandit Algorithms
Authors:
Yu Xing,
Xudong Sun,
Karl H. Johansson
Abstract:
We study joint learning of network topology and a mixed opinion dynamics, in which agents may have different update rules. Such a model captures the diversity of real individual interactions. We propose a learning algorithm based on multi-armed bandit algorithms to address the problem. The goal of the algorithm is to find each agent's update rule from several candidate rules and to learn the under…
▽ More
We study joint learning of network topology and a mixed opinion dynamics, in which agents may have different update rules. Such a model captures the diversity of real individual interactions. We propose a learning algorithm based on multi-armed bandit algorithms to address the problem. The goal of the algorithm is to find each agent's update rule from several candidate rules and to learn the underlying network. At each iteration, the algorithm assumes that each agent has one of the updated rules and then modifies network estimates to reduce validation error. Numerical experiments show that the proposed algorithm improves initial estimates of the network and update rules, decreases prediction error, and performs better than other methods such as sparse linear regression and Gaussian process regression.
△ Less
Submitted 25 June, 2023;
originally announced June 2023.
-
Polynomial Logical Zonotopes: A Set Representation for Reachability Analysis of Logical Systems
Authors:
Amr Alanwar,
Frank J. Jiang,
Karl H. Johansson
Abstract:
In this paper, we introduce a set representation called polynomial logical zonotopes for performing exact and computationally efficient reachability analysis on logical systems. Polynomial logical zonotopes are a generalization of logical zonotopes, which are able to represent up to 2^n binary vectors using only n generators. Due to their construction, logical zonotopes are only able to support ex…
▽ More
In this paper, we introduce a set representation called polynomial logical zonotopes for performing exact and computationally efficient reachability analysis on logical systems. Polynomial logical zonotopes are a generalization of logical zonotopes, which are able to represent up to 2^n binary vectors using only n generators. Due to their construction, logical zonotopes are only able to support exact computations of some logical operations (XOR, NOT, XNOR), while other operations (AND, NAND, OR, NOR) result in over-approximations in the reduced space, i.e., generator space. In order to perform all fundamental logical operations exactly, we formulate a generalization of logical zonotopes that is constructed by dependent generators and exponent matrices. We prove that through this polynomial-like construction, we are able to perform all of the fundamental logical operations (XOR, NOT, XNOR, AND, NAND, OR, NOR) exactly in the generator space. While we are able to perform all of the logical operations exactly, this comes with a slight increase in computational complexity compared to logical zonotopes. We show that we can use polynomial logical zonotopes to perform exact reachability analysis while retaining a low computational complexity. To illustrate and showcase the computational benefits of polynomial logical zonotopes, we present the results of performing reachability analysis on two use cases: (1) safety verification of an intersection crossing protocol and (2) reachability analysis on a high-dimensional Boolean function. Moreover, to highlight the extensibility of logical zonotopes, we include an additional use case where we perform a computationally tractable exhaustive search for the key of a linear feedback shift register.
△ Less
Submitted 1 March, 2024; v1 submitted 21 June, 2023;
originally announced June 2023.
-
Differentially Private Set-Based Estimation Using Zonotopes
Authors:
Mohammed M. Dawoud,
Changxin Liu,
Amr Alanwar,
Karl H. Johansson
Abstract:
For large-scale cyber-physical systems, the collaboration of spatially distributed sensors is often needed to perform the state estimation process. Privacy concerns naturally arise from disclosing sensitive measurement signals to a cloud estimator that predicts the system state. To solve this issue, we propose a differentially private set-based estimation protocol that preserves the privacy of the…
▽ More
For large-scale cyber-physical systems, the collaboration of spatially distributed sensors is often needed to perform the state estimation process. Privacy concerns naturally arise from disclosing sensitive measurement signals to a cloud estimator that predicts the system state. To solve this issue, we propose a differentially private set-based estimation protocol that preserves the privacy of the measurement signals. Compared to existing research, our approach achieves less privacy loss and utility loss using a numerically optimized truncated noise distribution. The proposed estimator is perturbed by weaker noise than the analytical approaches in the literature to guarantee the same level of privacy, therefore improving the estimation utility. Numerical and comparison experiments with truncated Laplace noise are presented to support our approach. Zonotopes, a less conservative form of set representation, are used to represent estimation sets, giving set operations a computational advantage. The privacy-preserving noise anonymizes the centers of these estimated zonotopes, concealing the precise positions of the estimated zonotopes.
△ Less
Submitted 12 May, 2023;
originally announced May 2023.
-
Adaptive Sampling of Algal Blooms Using Autonomous Underwater Vehicle and Satellite Imagery: Experimental Validation in the Baltic Sea
Authors:
Joana Fonseca,
Sriharsha Bhat,
Matthew Lock,
Ivan Stenius,
Karl H. Johansson
Abstract:
This paper investigates using satellite data to improve adaptive sampling missions, particularly for front tracking scenarios such as with algal blooms. Our proposed solution to find and track algal bloom fronts uses an Autonomous Underwater Vehicle (AUV) equipped with a sensor that measures the concentration of chlorophyll a and satellite data. The proposed method learns the kernel parameters for…
▽ More
This paper investigates using satellite data to improve adaptive sampling missions, particularly for front tracking scenarios such as with algal blooms. Our proposed solution to find and track algal bloom fronts uses an Autonomous Underwater Vehicle (AUV) equipped with a sensor that measures the concentration of chlorophyll a and satellite data. The proposed method learns the kernel parameters for a Gaussian process model using satellite images of chlorophyll a from the previous days. Then, using the data collected by the AUV, it models chlorophyll a concentration online. We take the gradient of this model to obtain the direction of the algal bloom front and feed it to our control algorithm. The performance of this method is evaluated through realistic simulations for an algal bloom front in the Baltic sea, using the models of the AUV and the chlorophyll a sensor. We compare the performance of different estimation methods, from GP to curve interpolation using least squares. Sensitivity analysis is performed to evaluate the impact of sensor noise on the methods performance. We implement our method on an AUV and run experiments in the Stockholm archipelago in the summer of 2022.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
What is the Expected Transient Behavior of Opinion Evolution for Two Communities?
Authors:
Yu Xing,
Karl H. Johansson
Abstract:
We study the transient behavior of a gossip model, in which agents randomly interact pairwise over a weighted graph with two communities. Edges within each community have identical weights, different from the weights between communities. It is shown that, at the early stage of the opinion evolution, the expected agent states in the same community have identical sign, despite influence of stubborn…
▽ More
We study the transient behavior of a gossip model, in which agents randomly interact pairwise over a weighted graph with two communities. Edges within each community have identical weights, different from the weights between communities. It is shown that, at the early stage of the opinion evolution, the expected agent states in the same community have identical sign, despite influence of stubborn agents. Moreover, it is shown that the expected states of the agents in the same community concentrate around the initial average opinion of that community, if the weights within communities are larger than between. In contrast, if the edge weights between communities are larger, then the expected states of all agents concentrate around everyone's initial average opinion. Different from the traditional asymptotic analysis in the opinion dynamics literature, these results focus on the initial phase of opinion evolution and establish a correspondence between community structure and transient behavior of the gossip model. The results are illustrated by numerical examples.
△ Less
Submitted 24 April, 2023;
originally announced April 2023.
-
Distributed Nash Equilibrium Seeking with Stochastic Event-Triggered Mechanism
Authors:
Wei Huo,
Kam Fai Elvis Tsang,
Yamin Yan,
Karl Henrik Johansson,
Ling Shi
Abstract:
In this paper, we study the problem of consensus-based distributed Nash equilibrium (NE) seeking where a network of players, abstracted as a directed graph, aim to minimize their own local cost functions non-cooperatively. Considering the limited energy of players and constrained bandwidths, we propose a stochastic event-triggered algorithm by triggering each player with a probability depending on…
▽ More
In this paper, we study the problem of consensus-based distributed Nash equilibrium (NE) seeking where a network of players, abstracted as a directed graph, aim to minimize their own local cost functions non-cooperatively. Considering the limited energy of players and constrained bandwidths, we propose a stochastic event-triggered algorithm by triggering each player with a probability depending on certain events, which improves communication efficiency by avoiding continuous communication. We show that the distributed algorithm with the developed event-triggered communication scheme converges to the exact NE exponentially if the underlying communication graph is strongly connected. Moreover, we prove that our proposed event-triggered algorithm is free of Zeno behavior. Finally, numerical simulations for a spectrum access game are provided to illustrate the effectiveness of the proposed mechanism by comparing it with some existing event-triggered methods.
△ Less
Submitted 20 April, 2023;
originally announced April 2023.
-
Complexity reduction for resilient state estimation of uniformly observable nonlinear systems
Authors:
Junsoo Kim,
** Gyu Lee,
Henrik Sandberg,
Karl H. Johansson
Abstract:
A resilient state estimation scheme for uniformly observable nonlinear systems, based on a method for local identification of sensor attacks, is presented. The estimation problem is combinatorial in nature, and so many methods require substantial computational and storage resources as the number of sensors increases. To reduce the complexity, the proposed method performs the attack identification…
▽ More
A resilient state estimation scheme for uniformly observable nonlinear systems, based on a method for local identification of sensor attacks, is presented. The estimation problem is combinatorial in nature, and so many methods require substantial computational and storage resources as the number of sensors increases. To reduce the complexity, the proposed method performs the attack identification with local subsets of the measurements, not with the set of all measurements. A condition for nonlinear attack identification is introduced as a relaxed version of existing redundant observability condition. It is shown that an attack identification can be performed even when the state cannot be recovered from the measurements. As a result, although a portion of measurements are compromised, they can be locally identified and excluded from the state estimation, and thus the true state can be recovered. Simulation results demonstrate the effectiveness of the proposed scheme.
△ Less
Submitted 18 April, 2023;
originally announced April 2023.
-
Low-Complexity Memoryless Linearizer for Analog-to-Digital Interfaces
Authors:
Deijany Rodriguez Linares,
Håkan Johansson
Abstract:
This paper introduces a low-complexity memoryless linearizer for suppression of distortion in analog-to-digital interfaces. It is inspired by neural networks, but has a substantially lower complexity than the neural-network schemes that have appeared earlier in the literature in this context. The paper demonstrates that the proposed linearizer can outperform the conventional parallel memoryless Ha…
▽ More
This paper introduces a low-complexity memoryless linearizer for suppression of distortion in analog-to-digital interfaces. It is inspired by neural networks, but has a substantially lower complexity than the neural-network schemes that have appeared earlier in the literature in this context. The paper demonstrates that the proposed linearizer can outperform the conventional parallel memoryless Hammerstein linearizer even when the nonlinearities have been generated through a memoryless polynomial model. Further, a design procedure is proposed in which the linearizer parameters are obtained through matrix inversion. Thereby, the costly and time consuming numerical optimization that is traditionally used when training neural networks is eliminated. Moreover, the design and evaluation incorporate a large set of multi-tone signals covering the first Nyquist band. Simulations show signal-to-noise-and-distortion ratio (SNDR) improvements of some 25 dB for multi-tone signals that correspond to the quadrature parts of OFDM signals with QPSK modulation.
△ Less
Submitted 12 April, 2023;
originally announced April 2023.
-
A Low-Complexity Post-Weighting Predistorter in a mMIMO Transmitter Under Crosstalk
Authors:
Ganesh Prasad,
Håkan Johansson
Abstract:
The beam-oriented digital predistortion (BO-DPD) is not sufficient to linearize the output from a subarray of power amplifiers (PAs) in different directions except the desired direction. Therefore, subsequent to the BO-DPD operation, we perform a post-weighting (PW) processing to minimize the nonlinear radiations in the wide range of directions under crosstalk. Here, the optimized PW coefficients…
▽ More
The beam-oriented digital predistortion (BO-DPD) is not sufficient to linearize the output from a subarray of power amplifiers (PAs) in different directions except the desired direction. Therefore, subsequent to the BO-DPD operation, we perform a post-weighting (PW) processing to minimize the nonlinear radiations in the wide range of directions under crosstalk. Here, the optimized PW coefficients are multiplied by the polynomial terms of the BO-DPD, then, the resultant signals are distributed to the PAs to compensate the nonlinear radiations. In this work, first, we propose fully-featured post-weighting (FF-PW) scheme, then, we derive a low-complexity post-weighting (LC-PW) scheme.
△ Less
Submitted 30 August, 2023; v1 submitted 12 April, 2023;
originally announced April 2023.
-
Learning-based Rigid Tube Model Predictive Control
Authors:
Yulong Gao,
Shuhao Yan,
Jian Zhou,
Mark Cannon,
Alessandro Abate,
Karl H. Johansson
Abstract:
This paper is concerned with model predictive control (MPC) of discrete-time linear systems subject to bounded additive disturbance and mixed constraints on the state and input, whereas the true disturbance set is unknown. Unlike most existing work on robust MPC, we propose an algorithm incorporating online learning that builds on prior knowledge of the disturbance, i.e., a known but conservative…
▽ More
This paper is concerned with model predictive control (MPC) of discrete-time linear systems subject to bounded additive disturbance and mixed constraints on the state and input, whereas the true disturbance set is unknown. Unlike most existing work on robust MPC, we propose an algorithm incorporating online learning that builds on prior knowledge of the disturbance, i.e., a known but conservative disturbance set. We approximate the true disturbance set at each time step with a parameterised set, which is referred to as a quantified disturbance set, using disturbance realisations. A key novelty is that the parameterisation of these quantified disturbance sets enjoys desirable properties such that the quantified disturbance set and its corresponding rigid tube bounding disturbance propagation can be efficiently updated online. We provide statistical gaps between the true and quantified disturbance sets, based on which, probabilistic recursive feasibility of MPC optimisation problems is discussed. Numerical simulations are provided to demonstrate the effectiveness of our proposed algorithm and compare with conventional robust MPC algorithms.
△ Less
Submitted 21 May, 2024; v1 submitted 11 April, 2023;
originally announced April 2023.
-
Parameterization-Free Observer Design for Nonlinear Systems: Application to the State Estimation of Networked SIR Epidemics
Authors:
Muhammad Umar B. Niazi,
Karl H. Johansson
Abstract:
Traditional observer design methods rely on certain properties of the system's nonlinearity, such as Lipschitz continuity, one-sided Lipschitzness, a bounded Jacobian, or quadratic boundedness. These properties are described by parameterized inequalities. However, enforcing these inequalities globally can lead to very large parameters, resulting in overly conservative observer design criteria. The…
▽ More
Traditional observer design methods rely on certain properties of the system's nonlinearity, such as Lipschitz continuity, one-sided Lipschitzness, a bounded Jacobian, or quadratic boundedness. These properties are described by parameterized inequalities. However, enforcing these inequalities globally can lead to very large parameters, resulting in overly conservative observer design criteria. These criteria become infeasible for highly nonlinear applications, such as networked epidemic processes. In this paper, we present an observer design approach for estimating the state of nonlinear systems, without requiring any parameterization of the system's nonlinearities. The proposed observer design depends only on systems' matrices and applies to systems with any nonlinearity. We establish different design criteria for ensuring both asymptotic and exponential convergence of the estimation error to zero. To demonstrate the efficacy of our approach, we employ it for estimating the state of a networked SIR epidemic model. We show that, even in the presence of measurement noise, the observer can accurately estimate the epidemic state of each node in the network. To the best of our knowledge, the proposed observer is the first that is capable of estimating the state of networked SIR models.
△ Less
Submitted 7 April, 2023;
originally announced April 2023.
-
Distributed Optimization for Quadratic Cost Functions over Large-Scale Networks with Quantized Communication and Finite-Time Convergence
Authors:
Apostolos I. Rikos,
Andreas Grammenos,
Evangelia Kalyvianaki,
Christoforos N. Hadjicostis,
Themistoklis Charalambous,
Karl H. Johansson
Abstract:
We propose two distributed iterative algorithms that can be used to solve, in finite time, the distributed optimization problem over quadratic local cost functions in large-scale networks. The first algorithm exhibits synchronous operation whereas the second one exhibits asynchronous operation. Both algorithms share salient features. Specifically, the algorithms operate exclusively with quantized…
▽ More
We propose two distributed iterative algorithms that can be used to solve, in finite time, the distributed optimization problem over quadratic local cost functions in large-scale networks. The first algorithm exhibits synchronous operation whereas the second one exhibits asynchronous operation. Both algorithms share salient features. Specifically, the algorithms operate exclusively with quantized values, which means that the information stored, processed and exchanged between neighboring nodes is subject to deterministic uniform quantization. The algorithms rely on event-driven updates in order to reduce energy consumption, communication bandwidth, network congestion, and/or processor usage. Finally, once the algorithms converge, nodes distributively terminate their operation. We prove that our algorithms converge in a finite number of iterations to the exact optimal solution depending on the quantization level, and we present applications of our algorithms to (i) optimal task scheduling for data centers, and (ii) global model aggregation for distributed federated learning. We provide simulations of these applications to illustrate the operation, performance, and advantages of the proposed algorithms. Additionally, it is shown that our proposed algorithms compare favorably to algorithms in the current literature. Quantized communication and asynchronous updates increase the required time to completion, but finite-time operation is maintained.
△ Less
Submitted 2 April, 2023;
originally announced April 2023.
-
Universal approximation of flows of control systems by recurrent neural networks
Authors:
Miguel Aguiar,
Amritam Das,
Karl H. Johansson
Abstract:
We consider the problem of approximating flow functions of continuous-time dynamical systems with inputs. It is well-known that continuous-time recurrent neural networks are universal approximators of this type of system. In this paper, we prove that an architecture based on discrete-time recurrent neural networks universally approximates flows of continuous-time dynamical systems with inputs. The…
▽ More
We consider the problem of approximating flow functions of continuous-time dynamical systems with inputs. It is well-known that continuous-time recurrent neural networks are universal approximators of this type of system. In this paper, we prove that an architecture based on discrete-time recurrent neural networks universally approximates flows of continuous-time dynamical systems with inputs. The required assumptions are shown to hold for systems whose dynamics are well-behaved ordinary differential equations and with practically relevant classes of input signals. This enables the use of off-the-shelf solutions for learning such flow functions in continuous-time from sampled trajectory data.
△ Less
Submitted 19 September, 2023; v1 submitted 1 April, 2023;
originally announced April 2023.
-
Secure State Estimation with Asynchronous Measurements against Malicious Measurement-data and Time-stamp Manipulation
Authors:
Zishuo Li,
Anh Tung Nguyen,
André Teixeira,
Yilin Mo,
Karl H. Johansson
Abstract:
This paper proposes a secure state estimation scheme with non-periodic asynchronous measurements for linear continuous-time systems under false data attacks on the measurement transmit channel. After sampling the output of the system, a sensor transmits the measurement information in a triple composed of sensor index, time-stamp, and measurement value to the fusion center via vulnerable communicat…
▽ More
This paper proposes a secure state estimation scheme with non-periodic asynchronous measurements for linear continuous-time systems under false data attacks on the measurement transmit channel. After sampling the output of the system, a sensor transmits the measurement information in a triple composed of sensor index, time-stamp, and measurement value to the fusion center via vulnerable communication channels. The malicious attacker can corrupt a subset of the sensors through (i) manipulating the time-stamp and measurement value; (ii) blocking transmitted measurement triples; or (iii) injecting fake measurement triples. To deal with such attacks, we propose the design of local estimators based on observability space decomposition, where each local estimator updates the local state and sends it to the fusion center after sampling a measurement. Whenever there is a local update, the fusion center combines all the local states and generates a secure state estimate by adopting the median operator. We prove that local estimators of benign sensors are unbiased with stable covariance. Moreover, the fused central estimation error has bounded expectation and covariance against at most $p$ corrupted sensors as long as the system is $2p$-sparse observable. The efficacy of the proposed scheme is demonstrated through an application on a benchmark example of the IEEE 14-bus system.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
Learning Flow Functions from Data with Applications to Nonlinear Oscillators
Authors:
Miguel Aguiar,
Amritam Das,
Karl H. Johansson
Abstract:
We describe a recurrent neural network (RNN) based architecture to learn the flow function of a causal, time-invariant and continuous-time control system from trajectory data. By restricting the class of control inputs to piecewise constant functions, we show that learning the flow function is equivalent to learning the input-to-state map of a discrete-time dynamical system. This motivates the use…
▽ More
We describe a recurrent neural network (RNN) based architecture to learn the flow function of a causal, time-invariant and continuous-time control system from trajectory data. By restricting the class of control inputs to piecewise constant functions, we show that learning the flow function is equivalent to learning the input-to-state map of a discrete-time dynamical system. This motivates the use of an RNN together with encoder and decoder networks which map the state of the system to the hidden state of the RNN and back. We show that the proposed architecture is able to approximate the flow function by exploiting the system's causality and time-invariance. The output of the learned flow function model can be queried at any time instant. We experimentally validate the proposed method using models of the Van der Pol and FitzHugh Nagumo oscillators. In both cases, the results demonstrate that the architecture is able to closely reproduce the trajectories of these two systems. For the Van der Pol oscillator, we further show that the trained model generalises to the system's response with a prolonged prediction time horizon as well as control inputs outside the training distribution. For the FitzHugh-Nagumo oscillator, we show that the model accurately captures the input-dependent phenomena of excitability.
△ Less
Submitted 11 April, 2023; v1 submitted 29 March, 2023;
originally announced March 2023.
-
Efficient and Reconfigurable Optimal Planning in Large-Scale Systems Using Hierarchical Finite State Machines
Authors:
Elis Stefansson,
Karl H. Johansson
Abstract:
In this paper, we consider a planning problem for a large-scale system modelled as a hierarchical finite state machine (HFSM) and develop a control algorithm for computing optimal plans between any two states. The control algorithm consists of two steps: a preprocessing step computing optimal exit costs for each machine in the HFSM, with time complexity scaling linearly with the number of machines…
▽ More
In this paper, we consider a planning problem for a large-scale system modelled as a hierarchical finite state machine (HFSM) and develop a control algorithm for computing optimal plans between any two states. The control algorithm consists of two steps: a preprocessing step computing optimal exit costs for each machine in the HFSM, with time complexity scaling linearly with the number of machines, and a query step that rapidly computes optimal plans, truncating irrelevant parts of the HFSM using the optimal exit costs, with time complexity scaling near-linearly with the depth of the HFSM. The control algorithm is reconfigurable in the sense that a change in the HFSM is efficiently handled, updating only needed parts in the preprocessing step to account for the change, with time complexity linear in the depth of the HFSM. We validate our algorithm on a robotic application, comparing it with Dijkstra's algorithm and Contraction Hierarchies. Our algorithm outperforms both.
△ Less
Submitted 20 December, 2023; v1 submitted 29 March, 2023;
originally announced March 2023.
-
Rollout-Based Charging Strategy for Electric Trucks with Hours-of-Service Regulations (Extended Version)
Authors:
Ting Bai,
Yuchao Li,
Karl H. Johansson,
Jonas Mårtensson
Abstract:
Freight drivers of electric trucks need to design charging strategies for where and how long to recharge the truck in order to complete delivery missions on time. Moreover, the charging strategies should be aligned with drivers' driving and rest time regulations, known as hours-of-service (HoS) regulations. This letter studies the optimal charging problems of electric trucks with delivery deadline…
▽ More
Freight drivers of electric trucks need to design charging strategies for where and how long to recharge the truck in order to complete delivery missions on time. Moreover, the charging strategies should be aligned with drivers' driving and rest time regulations, known as hours-of-service (HoS) regulations. This letter studies the optimal charging problems of electric trucks with delivery deadlines under HoS constraints. We assume that a collection of charging and rest stations is given along a pre-planned route with known detours and that the problem data are deterministic. The goal is to minimize the total cost associated with the charging and rest decisions during the entire trip. This problem is formulated as a mixed integer program with bilinear constraints, resulting in a high computational load when applying exact solution approaches. To obtain real-time solutions, we develop a rollout-based approximate scheme, which scales linearly with the number of stations while offering solid performance guarantees. We perform simulation studies over the Swedish road network based on realistic truck data. The results show that our rollout-based approach provides near-optimal solutions to the problem in various conditions while cutting the computational time drastically.
△ Less
Submitted 28 January, 2024; v1 submitted 15 March, 2023;
originally announced March 2023.