-
Constraint Selection in Optimization-Based Controllers
Authors:
Haejoon Lee,
Panagiotis Rousseas,
Dimitra Panagou
Abstract:
Human-machine collaboration often involves constrained optimization problems for decision-making processes. However, when the machine is a dynamical system with a continuously evolving state, infeasibility due to multiple conflicting constraints can lead to dangerous outcomes. In this work, we propose a heuristic-based method that resolves infeasibility at every time step by selectively disregardi…
▽ More
Human-machine collaboration often involves constrained optimization problems for decision-making processes. However, when the machine is a dynamical system with a continuously evolving state, infeasibility due to multiple conflicting constraints can lead to dangerous outcomes. In this work, we propose a heuristic-based method that resolves infeasibility at every time step by selectively disregarding a subset of soft constraints based on the past values of the Lagrange multipliers. Compared to existing approaches, our method requires the solution of a smaller optimization problem to determine feasibility, resulting in significantly faster computation. Through a series of simulations, we demonstrate that our algorithm achieves performance comparable to state-of-the-art methods while offering improved computational efficiency.
△ Less
Submitted 6 May, 2025;
originally announced May 2025.
-
Certifiably-Correct Mapping for Safe Navigation Despite Odometry Drift
Authors:
Devansh R. Agrawal,
Taekyung Kim,
Rajiv Govindjee,
Trushant Adeshara,
Jiangbo Yu,
Anurekha Ravikumar,
Dimitra Panagou
Abstract:
Accurate perception, state estimation and mapping are essential for safe robotic navigation as planners and controllers rely on these components for safety-critical decisions. However, existing mapping approaches often assume perfect pose estimates, an unrealistic assumption that can lead to incorrect obstacle maps and therefore collisions. This paper introduces a framework for certifiably-correct…
▽ More
Accurate perception, state estimation and mapping are essential for safe robotic navigation as planners and controllers rely on these components for safety-critical decisions. However, existing mapping approaches often assume perfect pose estimates, an unrealistic assumption that can lead to incorrect obstacle maps and therefore collisions. This paper introduces a framework for certifiably-correct mapping that ensures that the obstacle map correctly classifies obstacle-free regions despite the odometry drift in vision-based localization systems (VIO}/SLAM). By deflating the safe region based on the incremental odometry error at each timestep, we ensure that the map remains accurate and reliable locally around the robot, even as the overall odometry error with respect to the inertial frame grows unbounded.
Our contributions include two approaches to modify popular obstacle mapping paradigms, (I) Safe Flight Corridors, and (II) Signed Distance Fields. We formally prove the correctness of both methods, and describe how they integrate with existing planning and control modules. Simulations using the Replica dataset highlight the efficacy of our methods compared to state-of-the-art techniques. Real-world experiments with a robotic rover show that, while baseline methods result in collisions with previously mapped obstacles, the proposed framework enables the rover to safely stop before potential collisions.
△ Less
Submitted 25 April, 2025;
originally announced April 2025.
-
Enabling Safety for Aerial Robots: Planning and Control Architectures
Authors:
Kaleb Ben Naveed,
Devansh R. Agrawal,
Daniel M. Cherenson,
Haejoon Lee,
Alia Gilbert,
Hardik Parwana,
Vishnu S. Chipade,
William Bentz,
Dimitra Panagou
Abstract:
Ensuring safe autonomy is crucial for deploying aerial robots in real-world applications. However, safety is a multifaceted challenge that must be addressed from multiple perspectives, including navigation in dynamic environments, operation under resource constraints, and robustness against adversarial attacks and uncertainties. In this paper, we present the authors' recent work that tackles some…
▽ More
Ensuring safe autonomy is crucial for deploying aerial robots in real-world applications. However, safety is a multifaceted challenge that must be addressed from multiple perspectives, including navigation in dynamic environments, operation under resource constraints, and robustness against adversarial attacks and uncertainties. In this paper, we present the authors' recent work that tackles some of these challenges and highlights key aspects that must be considered to enhance the safety and performance of autonomous aerial systems. All presented approaches are validated through hardware experiments.
△ Less
Submitted 11 April, 2025;
originally announced April 2025.
-
Distributed Resilience-Aware Control in Multi-Robot Networks
Authors:
Haejoon Lee,
Dimitra Panagou
Abstract:
Ensuring resilient consensus in multi-robot systems with misbehaving agents remains a challenge, as many existing network resilience properties are inherently combinatorial and globally defined. While previous works have proposed control laws to enhance or preserve resilience in multi-robot networks, they often assume a fixed topology with known resilience properties, or require global state knowl…
▽ More
Ensuring resilient consensus in multi-robot systems with misbehaving agents remains a challenge, as many existing network resilience properties are inherently combinatorial and globally defined. While previous works have proposed control laws to enhance or preserve resilience in multi-robot networks, they often assume a fixed topology with known resilience properties, or require global state knowledge. These assumptions may be impractical in physically-constrained environments, where safety and resilience requirements are conflicting, or when misbehaving agents corrupt the shared information. In this work, we propose a distributed control law that enables each robot to guarantee resilient consensus and safety during its navigation without fixed topologies using only locally available information. To this end, we establish a new sufficient condition for resilient consensus in time-varying networks based on the degree of non-misbehaving or normal agents. Using this condition, we design a Control Barrier Function (CBF)-based controller that guarantees resilient consensus and collision avoidance without requiring estimates of global state and/or control actions of all other robots. Finally, we validate our method through simulations.
△ Less
Submitted 10 April, 2025; v1 submitted 3 April, 2025;
originally announced April 2025.
-
How to Adapt Control Barrier Functions? A Learning-Based Approach with Applications to a VTOL Quadplane
Authors:
Taekyung Kim,
Randal W. Beard,
Dimitra Panagou
Abstract:
In this paper, we present a novel theoretical framework for online adaptation of Control Barrier Function (CBF) parameters, i.e., of the class K functions included in the CBF condition, under input constraints. We introduce the concept of locally validated CBF parameters, which are adapted online to guarantee finite-horizon safety, based on conditions derived from Nagumo's theorem and tangent cone…
▽ More
In this paper, we present a novel theoretical framework for online adaptation of Control Barrier Function (CBF) parameters, i.e., of the class K functions included in the CBF condition, under input constraints. We introduce the concept of locally validated CBF parameters, which are adapted online to guarantee finite-horizon safety, based on conditions derived from Nagumo's theorem and tangent cone analysis. To identify these parameters online, we integrate a learning-based approach with an uncertainty-aware verification process that account for both epistemic and aleatoric uncertainties inherent in neural network predictions. Our method is demonstrated on a VTOL quadplane model during challenging transition and landing maneuvers, showcasing enhanced performance while maintaining safety.
△ Less
Submitted 3 April, 2025;
originally announced April 2025.
-
Autonomy Architectures for Safe Planning in Unknown Environments Under Budget Constraints
Authors:
Daniel M. Cherenson,
Devansh R. Agrawal,
Dimitra Panagou
Abstract:
Mission planning can often be formulated as a constrained control problem under multiple path constraints (i.e., safety constraints) and budget constraints (i.e., resource expenditure constraints). In a priori unknown environments, verifying that an offline solution will satisfy the constraints for all time can be difficult, if not impossible. Our contributions are as follows: 1) We propose an onl…
▽ More
Mission planning can often be formulated as a constrained control problem under multiple path constraints (i.e., safety constraints) and budget constraints (i.e., resource expenditure constraints). In a priori unknown environments, verifying that an offline solution will satisfy the constraints for all time can be difficult, if not impossible. Our contributions are as follows: 1) We propose an online method, building on our previous work "gatekeeper", to guarantee safety and satisfy budget constraints of the system trajectory at all times throughout a mission. 2) Next, we prove that our algorithm is recursively feasible and correct. 3) Finally, instead of using a heuristically designed backup controller, we propose a sampling-based method to construct backup trajectories that both minimize resource expenditure and reach budget renewal sets, in which path constraints are satisfied and the constrained resources are renewed. We demonstrate our approach in simulation with a fixed-wing UAV in a GNSS-denied environment with a budget constraint on localization error that can be renewed at visual landmarks.
△ Less
Submitted 3 April, 2025;
originally announced April 2025.
-
Feasibility Evaluation of Quadratic Programs for Constrained Control
Authors:
Panagiotis Rousseas,
Dimitra Panagou
Abstract:
This paper presents a computationally-efficient method for evaluating the feasibility of Quadratic Programs (QPs) for online constrained control. Based on the duality principle, we first show that the feasibility of a QP can be determined by the solution of a properly-defined Linear Program (LP). Our analysis yields a LP that can be solved more efficiently compared to the original QP problem, and…
▽ More
This paper presents a computationally-efficient method for evaluating the feasibility of Quadratic Programs (QPs) for online constrained control. Based on the duality principle, we first show that the feasibility of a QP can be determined by the solution of a properly-defined Linear Program (LP). Our analysis yields a LP that can be solved more efficiently compared to the original QP problem, and more importantly, is simpler in form and can be solved more efficiently compared to existing methods that assess feasibility via LPs. The computational efficiency of the proposed method compared to existing methods for feasibility evaluation is demonstrated in comparative case studies as well as a feasible-constraint selection problem, indicating its promise for online feasibility evaluation of optimization-based controllers.
△ Less
Submitted 31 March, 2025; v1 submitted 17 February, 2025;
originally announced February 2025.
-
Recursive Least Squares with Fading Regularization for Finite-Time Convergence without Persistent Excitation
Authors:
Brian Lai,
Dimitra Panagou,
Dennis S. Bernstein
Abstract:
This paper extends recursive least squares (RLS) to include time-varying regularization. This extension provides flexibility for updating the least squares regularization term in real time. Existing results with constant regularization imply that the parameter-estimation error dynamics of RLS are globally attractive to zero if and only the regressor is weakly persistently exciting. This work shows…
▽ More
This paper extends recursive least squares (RLS) to include time-varying regularization. This extension provides flexibility for updating the least squares regularization term in real time. Existing results with constant regularization imply that the parameter-estimation error dynamics of RLS are globally attractive to zero if and only the regressor is weakly persistently exciting. This work shows that, by extending classical RLS to include a time-varying (fading) regularization term that converges to zero, the parameter-estimation error dynamics are globally attractive to zero without weakly persistent excitation. Moreover, if the fading regularization term converges to zero in finite time, then the parameter estimation error also converges to zero in finite time. Finally, we propose rank-1 fading regularization (R1FR) RLS, a time-varying regularization algorithm with fading regularization that converges to zero, and which runs in the same computational complexity as classical RLS. Numerical examples are presented to validate theoretical guarantees and to show how R1FR-RLS can protect against over-regularization.
△ Less
Submitted 8 January, 2025;
originally announced January 2025.
-
Defense Strategies for Autonomous Multi-agent Systems: Ensuring Safety and Resilience Under Exponentially Unbounded FDI Attacks
Authors:
Yichao Wang,
Mohamadamin Rajabinezhad,
Dimitra Panagou,
Shan Zuo
Abstract:
False data injection attacks pose a significant threat to autonomous multi-agent systems (MASs). Existing attack-resilient control strategies generally have strict assumptions on the attack signals and overlook safety constraints, such as collision avoidance. In practical applications, leader agents equipped with advanced sensors or weaponry span a safe region to guide heterogeneous follower agent…
▽ More
False data injection attacks pose a significant threat to autonomous multi-agent systems (MASs). Existing attack-resilient control strategies generally have strict assumptions on the attack signals and overlook safety constraints, such as collision avoidance. In practical applications, leader agents equipped with advanced sensors or weaponry span a safe region to guide heterogeneous follower agents, ensuring coordinated operations while addressing collision avoidance to prevent financial losses and mission failures. This letter addresses these gaps by introducing and solving the safety-aware and attack-resilient (SAAR) control problem under exponentially unbounded false data injection (EU-FDI) attacks. Specifically, a novel attack-resilient observer layer (OL) is first designed to defend against EU-FDI attacks on the OL. Then, an attack-resilient compensational signal is designed to mitigate the adverse effects caused by the EU-FDI attack on control input layer (CIL). Finally, a SAAR controller is designed by solving a quadratic programming (QP) problem integrating control barrier function (CBF) certified collision-free safety constraints. Rigorous Lyapunov-based stability analysis certifies the SAAR controller's effectiveness in ensuring both safety and resilience. This study also pioneers a three-dimensional (3D) simulation of the SAAR containment control problem for heterogeneous MASs, demonstrating its applicability in realistic multi-agent scenarios.
△ Less
Submitted 4 May, 2025; v1 submitted 1 January, 2025;
originally announced January 2025.
-
Control Strategies for Pursuit-Evasion Under Occlusion Using Visibility and Safety Barrier Functions
Authors:
Minnan Zhou,
Mustafa Shaikh,
Vatsalya Chaubey,
Patrick Haggerty,
Shumon Koga,
Dimitra Panagou,
Nikolay Atanasov
Abstract:
This paper develops a control strategy for pursuit-evasion problems in environments with occlusions. We address the challenge of a mobile pursuer keeping a mobile evader within its field of view (FoV) despite line-of-sight obstructions. The signed distance function (SDF) of the FoV is used to formulate visibility as a control barrier function (CBF) constraint on the pursuer's control inputs. Simil…
▽ More
This paper develops a control strategy for pursuit-evasion problems in environments with occlusions. We address the challenge of a mobile pursuer keeping a mobile evader within its field of view (FoV) despite line-of-sight obstructions. The signed distance function (SDF) of the FoV is used to formulate visibility as a control barrier function (CBF) constraint on the pursuer's control inputs. Similarly, obstacle avoidance is formulated as a CBF constraint based on the SDF of the obstacle set. While the visibility and safety CBFs are Lipschitz continuous, they are not differentiable everywhere, necessitating the use of generalized gradients. To achieve non-myopic pursuit, we generate reference control trajectories leading to evader visibility using a sampling-based kinodynamic planner. The pursuer then tracks this reference via convex optimization under the CBF constraints. We validate our approach in CARLA simulations and real-world robot experiments, demonstrating successful visibility maintenance using only onboard sensing, even under severe occlusions and dynamic evader movements.
△ Less
Submitted 23 March, 2025; v1 submitted 2 November, 2024;
originally announced November 2024.
-
Construction of the Sparsest Maximally r-Robust Graphs
Authors:
Haejoon Lee,
Dimitra Panagou
Abstract:
In recent years, the notion of r-robustness for the communication graph of the network has been introduced to address the challenge of achieving consensus in the presence of misbehaving agents. Higher r-robustness typically implies higher tolerance to malicious information towards achieving resilient consensus, but it also implies more edges for the communication graph. This in turn conflicts with…
▽ More
In recent years, the notion of r-robustness for the communication graph of the network has been introduced to address the challenge of achieving consensus in the presence of misbehaving agents. Higher r-robustness typically implies higher tolerance to malicious information towards achieving resilient consensus, but it also implies more edges for the communication graph. This in turn conflicts with the need to minimize communication due to limited resources in real-world applications (e.g., multi-robot networks). In this paper, our contributions are twofold. (a) We provide the necessary subgraph structures and tight lower bounds on the number of edges required for graphs with a given number of nodes to achieve maximum robustness. (b) We then use the results of (a) to introduce two classes of graphs that maintain maximum robustness with the least number of edges. Our work is validated through a series of simulations.
△ Less
Submitted 10 April, 2025; v1 submitted 28 September, 2024;
originally announced September 2024.
-
Maintaining Strong r-Robustness in Reconfigurable Multi-Robot Networks using Control Barrier Functions
Authors:
Haejoon Lee,
Dimitra Panagou
Abstract:
In leader-follower consensus, strong r-robustness of the communication graph provides a sufficient condition for followers to achieve consensus in the presence of misbehaving agents. Previous studies have assumed that robots can form and/or switch between predetermined network topologies with known robustness properties. However, robots with distance-based communication models may not be able to a…
▽ More
In leader-follower consensus, strong r-robustness of the communication graph provides a sufficient condition for followers to achieve consensus in the presence of misbehaving agents. Previous studies have assumed that robots can form and/or switch between predetermined network topologies with known robustness properties. However, robots with distance-based communication models may not be able to achieve these topologies while moving through spatially constrained environments, such as narrow corridors, to complete their objectives. This paper introduces a Control Barrier Function (CBF) that ensures robots maintain strong r-robustness of their communication graph above a certain threshold without maintaining any fixed topologies. Our CBF directly addresses robustness, allowing robots to have flexible reconfigurable network structure while navigating to achieve their objectives. The efficacy of our method is tested through various simulation and hardware experiments.
△ Less
Submitted 10 April, 2025; v1 submitted 22 September, 2024;
originally announced September 2024.
-
Learning to Refine Input Constrained Control Barrier Functions via Uncertainty-Aware Online Parameter Adaptation
Authors:
Taekyung Kim,
Robin Inho Kee,
Dimitra Panagou
Abstract:
Control Barrier Functions (CBFs) have become powerful tools for ensuring safety in nonlinear systems. However, finding valid CBFs that guarantee persistent safety and feasibility remains an open challenge, especially in systems with input constraints. Traditional approaches often rely on manually tuning the parameters of the class K functions of the CBF conditions a priori. The performance of CBF-…
▽ More
Control Barrier Functions (CBFs) have become powerful tools for ensuring safety in nonlinear systems. However, finding valid CBFs that guarantee persistent safety and feasibility remains an open challenge, especially in systems with input constraints. Traditional approaches often rely on manually tuning the parameters of the class K functions of the CBF conditions a priori. The performance of CBF-based controllers is highly sensitive to these fixed parameters, potentially leading to overly conservative behavior or safety violations. To overcome these issues, this paper introduces a learning-based optimal control framework for online adaptation of Input Constrained CBF (ICCBF) parameters in discrete-time nonlinear systems. Our method employs a probabilistic ensemble neural network to predict the performance and risk metrics, as defined in this work, for candidate parameters, accounting for both epistemic and aleatoric uncertainties. We propose a two-step verification process using Jensen-Renyi Divergence and distributionally-robust Conditional Value at Risk to identify valid parameters. This enables dynamic refinement of ICCBF parameters based on current state and nearby environments, optimizing performance while ensuring safety within the verified parameter set. Experimental results demonstrate that our method outperforms both fixed-parameter and existing adaptive methods in robot navigation scenarios across safety and performance metrics.
△ Less
Submitted 4 March, 2025; v1 submitted 22 September, 2024;
originally announced September 2024.
-
Safety-Critical Control with Offline-Online Neural Network Inference
Authors:
Junhui Zhang,
Sze Zheng Yong,
Dimitra Panagou
Abstract:
This paper presents a safety-critical control framework for an ego agent moving among other agents. The approach infers the dynamics of the other agents, and incorporates the inferred quantities into the design of control barrier function (CBF)-based controllers for the ego agent. The inference method combines offline and online learning with radial basis function neural networks (RBFNNs). The RBF…
▽ More
This paper presents a safety-critical control framework for an ego agent moving among other agents. The approach infers the dynamics of the other agents, and incorporates the inferred quantities into the design of control barrier function (CBF)-based controllers for the ego agent. The inference method combines offline and online learning with radial basis function neural networks (RBFNNs). The RBFNNs are initially trained offline using collected datasets. To enhance the generalization of the RBFNNs, the weights are then updated online with new observations, without requiring persistent excitation conditions in order to enhance the applicability of the method. Additionally, we employ adaptive conformal prediction to quantify the estimation error of the RBFNNs for the other agents' dynamics, generating prediction sets to cover the true value with high probability. Finally, we formulate a CBF-based controller for the ego agent to guarantee safety with the desired confidence level by accounting for the prediction sets of other agents' dynamics in the sampled-data CBF conditions. Simulation results are provided to demonstrate the effectiveness of the proposed method.
△ Less
Submitted 1 August, 2024;
originally announced August 2024.
-
Visibility-Aware RRT* for Safety-Critical Navigation of Perception-Limited Robots in Unknown Environments
Authors:
Taekyung Kim,
Dimitra Panagou
Abstract:
Safe autonomous navigation in unknown environments remains a critical challenge for robots with limited sensing capabilities. While safety-critical control techniques, such as Control Barrier Functions (CBFs), have been proposed to ensure safety, their effectiveness relies on the assumption that the robot has complete knowledge of its surroundings. In reality, robots often operate with restricted…
▽ More
Safe autonomous navigation in unknown environments remains a critical challenge for robots with limited sensing capabilities. While safety-critical control techniques, such as Control Barrier Functions (CBFs), have been proposed to ensure safety, their effectiveness relies on the assumption that the robot has complete knowledge of its surroundings. In reality, robots often operate with restricted field-of-view and finite sensing range, which can lead to collisions with unknown obstacles if the planner is agnostic to these limitations. To address this issue, we introduce the Visibility-Aware RRT* algorithm that combines sampling-based planning with CBFs to generate safe and efficient global reference paths in partially unknown environments. The algorithm incorporates a collision avoidance CBF and a novel visibility CBF, which guarantees that the robot remains within locally collision-free regions, enabling timely detection and avoidance of unknown obstacles. We conduct extensive experiments interfacing the path planners with two different safety-critical controllers, wherein our method outperforms all other compared baselines across both safety and efficiency aspects.
△ Less
Submitted 17 March, 2025; v1 submitted 11 June, 2024;
originally announced June 2024.
-
Risk-Aware Fixed-Time Stabilization of Stochastic Systems under Measurement Uncertainty
Authors:
Mitchell Black,
Georgios Fainekos,
Bardh Hoxha,
Dimitra Panagou
Abstract:
This paper addresses the problem of risk-aware fixed-time stabilization of a class of uncertain, output-feedback nonlinear systems modeled via stochastic differential equations. First, novel classes of certificate functions, namely risk-aware fixed-time- and risk-aware path-integral-control Lyapunov functions, are introduced. Then, it is shown how the use of either for control design certifies tha…
▽ More
This paper addresses the problem of risk-aware fixed-time stabilization of a class of uncertain, output-feedback nonlinear systems modeled via stochastic differential equations. First, novel classes of certificate functions, namely risk-aware fixed-time- and risk-aware path-integral-control Lyapunov functions, are introduced. Then, it is shown how the use of either for control design certifies that a system is both stable in probability and probabilistically fixed-time convergent (for a given probability) to a goal set. That is, the system trajectories probabilistically reach the set within a finite time, independent of the initial condition, despite the additional presence of measurement noise. These methods represent an improvement over the state-of-the-art in stochastic fixed-time stabilization, which presently offers bounds on the settling-time function in expectation only. The theoretical results are verified by an empirical study on an illustrative, stochastic, nonlinear system and the proposed controllers are evaluated against an existing method. Finally, the methods are demonstrated via a simulated fixed-wing aerial robot on a reach-avoid scenario to highlight their ability to certify the probability that a system safely reaches its goal.
△ Less
Submitted 29 March, 2024;
originally announced March 2024.
-
A Constructive Method for Designing Safe Multirate Controllers for Differentially-Flat Systems
Authors:
Devansh R. Agrawal,
Hardik Parwana,
Ryan K. Cosner,
Ugo Rosolia,
Aaron D. Ames,
Dimitra Panagou
Abstract:
We present a multi-rate control architecture that leverages fundamental properties of differential flatness to synthesize controllers for safety-critical nonlinear dynamical systems. We propose a two-layer architecture, where the high-level generates reference trajectories using a linear Model Predictive Controller, and the low-level tracks this reference using a feedback controller. The novelty l…
▽ More
We present a multi-rate control architecture that leverages fundamental properties of differential flatness to synthesize controllers for safety-critical nonlinear dynamical systems. We propose a two-layer architecture, where the high-level generates reference trajectories using a linear Model Predictive Controller, and the low-level tracks this reference using a feedback controller. The novelty lies in how we couple these layers, to achieve formal guarantees on recursive feasibility of the MPC problem, and safety of the nonlinear system. Furthermore, using differential flatness, we provide a constructive means to synthesize the multi-rate controller, thereby removing the need to search for suitable Lyapunov or barrier functions, or to approximately linearize/discretize nonlinear dynamics. We show the synthesized controller is a convex optimization problem, making it amenable to real-time implementations. The method is demonstrated experimentally on a ground rover and a quadruped robotic system.
△ Less
Submitted 26 March, 2024;
originally announced March 2024.
-
Multi-Agent Clarity-Aware Dynamic Coverage with Gaussian Processes
Authors:
Devansh R. Agrawal,
Dimitra Panagou
Abstract:
This paper presents two algorithms for multi-agent dynamic coverage in spatiotemporal environments, where the coverage algorithms are informed by the method of data assimilation. In particular, we show that by explicitly modeling the environment using a Gaussian Process (GP) model, and considering the sensing capabilities and the dynamics of a team of robots, we can design an estimation algorithm…
▽ More
This paper presents two algorithms for multi-agent dynamic coverage in spatiotemporal environments, where the coverage algorithms are informed by the method of data assimilation. In particular, we show that by explicitly modeling the environment using a Gaussian Process (GP) model, and considering the sensing capabilities and the dynamics of a team of robots, we can design an estimation algorithm and multi-agent coverage controller that explores and estimates the state of the spatiotemporal environment. The uncertainty of the estimate is quantified using clarity, an information-theoretic metric, where higher clarity corresponds to lower uncertainty. By exploiting the relationship between GPs and Stochastic Differential Equations (SDEs) we quantify the increase in clarity of the estimated state at any position due to a measurement taken from any other position. We use this relationship to design two new coverage controllers, both of which scale well with the number of agents exploring the domain, assuming the robots can share the map of the clarity over the spatial domain via communication. We demonstrate the algorithms through a realistic simulation of a team of robots collecting wind data over a region in Austria.
△ Less
Submitted 9 September, 2024; v1 submitted 26 March, 2024;
originally announced March 2024.
-
Robust Safety-Critical Control for Systems with Sporadic Measurements and Dwell Time Constraints
Authors:
Joseph Breeden,
Luca Zaccarian,
Dimitra Panagou
Abstract:
This paper presents extensions of control barrier function (CBF) theory to systems with disturbances wherein a controller only receives measurements infrequently and operates open-loop between measurements, while still satisfying state constraints. The paper considers both impulsive and continuous actuators, and models the actuators, measurements, disturbances, and timing constraints as a hybrid d…
▽ More
This paper presents extensions of control barrier function (CBF) theory to systems with disturbances wherein a controller only receives measurements infrequently and operates open-loop between measurements, while still satisfying state constraints. The paper considers both impulsive and continuous actuators, and models the actuators, measurements, disturbances, and timing constraints as a hybrid dynamical system. We then design an open-loop observer that bounds the worst-case uncertainty between measurements. We develop definitions of CBFs for both actuation cases, and corresponding conditions on the control input to guarantee satisfaction of the state constraints. We apply these conditions to simulations of a satellite rendezvous in an elliptical orbit and autonomous orbit stationkeeping.
△ Less
Submitted 4 June, 2024; v1 submitted 6 March, 2024;
originally announced March 2024.
-
Online and Certifiably Correct Visual Odometry and Mapping
Authors:
Devansh R Agrawal,
Rajiv Govindjee,
Jiangbo Yu,
Anurekha Ravikumar,
Dimitra Panagou
Abstract:
This paper proposes two new algorithms for certified perception in safety-critical robotic applications. The first is a Certified Visual Odometry algorithm, which uses a RGBD camera with bounded sensor noise to construct a visual odometry estimate with provable error bounds. The second is a Certified Mapping algorithm which, using the same RGBD images, constructs a Signed Distance Field of the obs…
▽ More
This paper proposes two new algorithms for certified perception in safety-critical robotic applications. The first is a Certified Visual Odometry algorithm, which uses a RGBD camera with bounded sensor noise to construct a visual odometry estimate with provable error bounds. The second is a Certified Mapping algorithm which, using the same RGBD images, constructs a Signed Distance Field of the obstacle environment, always safely underestimating the distance to the nearest obstacle. This is required to avoid errors due to VO drift. The algorithms are demonstrated in hardware experiments, where we demonstrate both running online at 30FPS. The methods are also compared to state-of-the-art techniques for odometry and mapping.
△ Less
Submitted 7 February, 2024;
originally announced February 2024.
-
Advances in the Theory of Control Barrier Functions: Addressing Practical Challenges in Safe Control Synthesis for Autonomous and Robotic Systems
Authors:
Kunal Garg,
James Usevitch,
Joseph Breeden,
Mitchell Black,
Devansh Agrawal,
Hardik Parwana,
Dimitra Panagou
Abstract:
This tutorial paper presents recent work of the authors that extends the theory of Control Barrier Functions (CBFs) to address practical challenges in the synthesis of safe controllers for autonomous systems and robots. We present novel CBFs and methods that handle safety constraints (i) with time and input constraints under disturbances, (ii) with high-relative degree under disturbances and input…
▽ More
This tutorial paper presents recent work of the authors that extends the theory of Control Barrier Functions (CBFs) to address practical challenges in the synthesis of safe controllers for autonomous systems and robots. We present novel CBFs and methods that handle safety constraints (i) with time and input constraints under disturbances, (ii) with high-relative degree under disturbances and input constraints, and (iii) that are affected by adversarial inputs and sampled-data effects. We then present novel CBFs and adaptation methods that prevent loss of validity of the CBF, as well as methods to tune the parameters of the CBF online to reduce conservatism in the system response. We also address the pointwise-only optimal character of CBF-induced control inputs by introducing a CBF formulation that accounts for future trajectories, as well as implementation challenges such as how to preserve safety when using output feedback control and zero-order-hold control. Finally we consider how to synthesize non-smooth CBFs when discontinuous inputs and multiple constraints are present.
△ Less
Submitted 27 December, 2023;
originally announced December 2023.
-
Aerial Swarm Defense using Interception and Herding Strategies
Authors:
Vishnu S. Chipade,
Dimitra Panagou
Abstract:
This paper presents a multi-mode solution to the problem of defending a circular protected area (target) from a wide range of attacks by swarms of risk-taking and/or risk-averse attacking agents (attackers). The proposed multi-mode solution combines two defense strategies, namely: 1) an interception strategy for a team of defenders to intercept multiple risk-taking attackers while ensuring that th…
▽ More
This paper presents a multi-mode solution to the problem of defending a circular protected area (target) from a wide range of attacks by swarms of risk-taking and/or risk-averse attacking agents (attackers). The proposed multi-mode solution combines two defense strategies, namely: 1) an interception strategy for a team of defenders to intercept multiple risk-taking attackers while ensuring that the defenders do not collide with each other, 2) a herding strategy to herd a swarm of risk-averse attackers to a safe area. In particular, we develop mixed integer programs (MIPs) and geometry-inspired heuristics to distribute and assign and/or reassign the defenders to interception and herding tasks under different spatiotemporal behaviors by the attackers such as splitting into smaller swarms to evade defenders easily or high-speed maneuvers by some risk-taking attackers to maximize damage to the protected area. We provide theoretical as well as numerical comparisons of the computational costs of these MIPs and the heuristics, and demonstrate the overall approach in simulations.
△ Less
Submitted 4 June, 2023;
originally announced June 2023.
-
Consolidated Control Barrier Functions: Synthesis and Online Verification via Adaptation under Input Constraints
Authors:
Mitchell Black,
Dimitra Panagou
Abstract:
In this paper, we develop a novel adaptation-based approach to constrained control design under multiple state and input constraints. Specifically, we introduce a method for synthesizing any number of time-varying candidate control barrier functions (CBF) into one consolidated CBF (C-CBF) candidate, and propose a predictor-corrector optimization-based adaptation law for the weights of the constitu…
▽ More
In this paper, we develop a novel adaptation-based approach to constrained control design under multiple state and input constraints. Specifically, we introduce a method for synthesizing any number of time-varying candidate control barrier functions (CBF) into one consolidated CBF (C-CBF) candidate, and propose a predictor-corrector optimization-based adaptation law for the weights of the constituent constraint functions that certifies the C-CBF as valid for a class of nonlinear, control-affine systems. We prove this result by showing that the adapted weights are guaranteed to confer sufficient control authority to meet the new, adaptive C-CBF condition in perpetuity despite input constraints, which thereby permits its use in a quadratic program based control law. We then illustrate the performance of our controller on an academic example, and further highlight that it is successful even for constraint functions with higher or mixed relative-degree by simulating a reach-avoid problem for bicycle robots, which we use to demonstrate how our approach out-performs two baseline approaches.
△ Less
Submitted 4 April, 2023;
originally announced April 2023.
-
Safety Under Uncertainty: Tight Bounds with Risk-Aware Control Barrier Functions
Authors:
Mitchell Black,
Georgios Fainekos,
Bardh Hoxha,
Danil Prokhorov,
Dimitra Panagou
Abstract:
We propose a novel class of risk-aware control barrier functions (RA-CBFs) for the control of stochastic safety-critical systems. Leveraging a result from the stochastic level-crossing literature, we deviate from the martingale theory that is currently used in stochastic CBF techniques and prove that a RA-CBF based control synthesis confers a tighter upper bound on the probability of the system be…
▽ More
We propose a novel class of risk-aware control barrier functions (RA-CBFs) for the control of stochastic safety-critical systems. Leveraging a result from the stochastic level-crossing literature, we deviate from the martingale theory that is currently used in stochastic CBF techniques and prove that a RA-CBF based control synthesis confers a tighter upper bound on the probability of the system becoming unsafe within a finite time interval than existing approaches. We highlight the advantages of our proposed approach over the state-of-the-art via a comparative study on an mobile-robot example, and further demonstrate its viability on an autonomous vehicle highway merging problem in dense traffic.
△ Less
Submitted 3 April, 2023;
originally announced April 2023.
-
Safety-Critical Control for Systems with Impulsive Actuators and Dwell Time Constraints
Authors:
Joseph Breeden,
Dimitra Panagou
Abstract:
This paper presents extensions of control barrier function (CBF) and control Lyapunov function (CLF) theory to systems wherein all actuators cause impulsive changes to the state trajectory, and can only be used again after a minimum dwell time has elapsed. These rules define a hybrid system, wherein the controller must at each control cycle choose whether to remain on the current state flow or to…
▽ More
This paper presents extensions of control barrier function (CBF) and control Lyapunov function (CLF) theory to systems wherein all actuators cause impulsive changes to the state trajectory, and can only be used again after a minimum dwell time has elapsed. These rules define a hybrid system, wherein the controller must at each control cycle choose whether to remain on the current state flow or to jump to a new trajectory. We first derive a sufficient condition to render a specified set forward invariant using extensions of CBF theory. We then derive related conditions to ensure asymptotic stability in such systems, and apply both conditions online in an optimization-based control law with aperiodic impulses. We simulate both results on a spacecraft docking problem with multiple obstacles.
△ Less
Submitted 8 June, 2023; v1 submitted 17 March, 2023;
originally announced March 2023.
-
Safe Control Design for Unknown Nonlinear Systems with Koopman-based Fixed-Time Identification
Authors:
Mitchell Black,
Dimitra Panagou
Abstract:
We consider the problem of safe control design for a class of nonlinear, control-affine systems subject to an unknown, additive, nonlinear disturbance. Leveraging recent advancements in the application of Koopman operator theory to the field of system identification and control, we introduce a novel fixed-time identification scheme for the infinitesimal generator of the infinite-dimensional, but n…
▽ More
We consider the problem of safe control design for a class of nonlinear, control-affine systems subject to an unknown, additive, nonlinear disturbance. Leveraging recent advancements in the application of Koopman operator theory to the field of system identification and control, we introduce a novel fixed-time identification scheme for the infinitesimal generator of the infinite-dimensional, but notably linear, Koopman dynamical system analogous to the nonlinear system of interest. That is, we derive a parameter adaptation law that allows us to recover the unknown, residual nonlinear dynamics in the system within a finite-time independent of an initial estimate. We then use properties of fixed-time stability to derive an error bound on the residual vector field estimation error as an explicit function of time, which allows us to synthesize a provably safe controller using control barrier function based methods. We conduct a quadrotor-inspired case study in support of our proposed method, in which we show that safe trajectory tracking is achieved despite unknown, nonlinear dynamics.
△ Less
Submitted 1 December, 2022;
originally announced December 2022.
-
Safe and Robust Observer-Controller Synthesis using Control Barrier Functions
Authors:
Devansh R. Agrawal,
Dimitra Panagou
Abstract:
This paper addresses the synthesis of safety-critical controllers using estimate feedback. We propose an observer-controller interconnection to ensure that the nonlinear system remains safe despite bounded disturbances on the system dynamics and measurements that correspond to partial state information. The co-design of observers and controllers is critical, since even in undisturbed cases, observ…
▽ More
This paper addresses the synthesis of safety-critical controllers using estimate feedback. We propose an observer-controller interconnection to ensure that the nonlinear system remains safe despite bounded disturbances on the system dynamics and measurements that correspond to partial state information. The co-design of observers and controllers is critical, since even in undisturbed cases, observers and controllers designed independently may not render the system safe. We propose two approaches to synthesize observer-controller interconnections. The first approach utilizes Input-to-State Stable observers, and the second uses Bounded Error observers. Using these stability and boundedness properties of the observation error, we construct novel Control Barrier Functions that impose inequality constraints on the control inputs which, when satisfied, certifies safety. We propose quadratic program-based controllers to satisfy these constraints, and prove Lipschitz continuity of the derived controllers. Simulations and experiments on a quadrotor demonstrate the efficacy of the proposed methods.
△ Less
Submitted 25 November, 2022;
originally announced November 2022.
-
gatekeeper: Online Safety Verification and Control for Nonlinear Systems in Dynamic Environments
Authors:
Devansh R Agrawal,
Ruichang Chen,
Dimitra Panagou
Abstract:
This paper presents the gatekeeper algorithm, a real-time and computationally-lightweight method that ensures that trajectories of a nonlinear system satisfy safety constraints despite sensing limitations. gatekeeper integrates with existing path planners and feedback controllers by introducing an additional verification step to ensure that proposed trajectories can be executed safely, despite non…
▽ More
This paper presents the gatekeeper algorithm, a real-time and computationally-lightweight method that ensures that trajectories of a nonlinear system satisfy safety constraints despite sensing limitations. gatekeeper integrates with existing path planners and feedback controllers by introducing an additional verification step to ensure that proposed trajectories can be executed safely, despite nonlinear dynamics subject to bounded disturbances, input constraints and partial knowledge of the environment. Our key contribution is that (A) we propose an algorithm to recursively construct safe trajectories by numerically forward propagating the system over a (short) finite horizon, and (B) we prove that tracking such a trajectory ensures the system remains safe for all future time, i.e., beyond the finite horizon. We demonstrate the method in a simulation of a dynamic firefighting mission, and in physical experiments of a quadrotor navigating in an obstacle environment that is sensed online. We also provide comparisons against the state-of-the-art techniques for similar problems.
△ Less
Submitted 14 August, 2024; v1 submitted 25 November, 2022;
originally announced November 2022.
-
Compositions of Multiple Control Barrier Functions Under Input Constraints
Authors:
Joseph Breeden,
Dimitra Panagou
Abstract:
This paper presents a methodology for ensuring that the composition of multiple Control Barrier Functions (CBFs) always leads to feasible conditions on the control input, even in the presence of input constraints. In the case of a system subject to a single constraint function, there exist many methods to generate a CBF that ensures constraint satisfaction. However, when there are multiple constra…
▽ More
This paper presents a methodology for ensuring that the composition of multiple Control Barrier Functions (CBFs) always leads to feasible conditions on the control input, even in the presence of input constraints. In the case of a system subject to a single constraint function, there exist many methods to generate a CBF that ensures constraint satisfaction. However, when there are multiple constraint functions, the problem of finding and tuning one or more CBFs becomes more challenging, especially in the presence of input constraints. This paper addresses this challenge by providing tools to 1) decouple the design of multiple CBFs, so that a CBF can be designed for each constraint function independently of other constraints, and 2) ensure that the set composed from all the CBFs together is a viability domain. Thus, a quadratic program subject to all the CBFs simultaneously is always feasible. The utility of this methodology is then demonstrated in simulation for a nonlinear orientation control system.
△ Less
Submitted 22 March, 2023; v1 submitted 3 October, 2022;
originally announced October 2022.
-
FORESEE: Prediction with Expansion-Compression Unscented Transform for Online Policy Optimization
Authors:
Hardik Parwana,
Dimitra Panagou
Abstract:
Propagating state distributions through a generic, uncertain nonlinear dynamical model is known to be intractable and usually begets numerical or analytical approximations. We introduce a method for state prediction, called the Expansion-Compression Unscented Transform, and use it to solve a class of online policy optimization problems. Our proposed algorithm propagates a finite number of sigma po…
▽ More
Propagating state distributions through a generic, uncertain nonlinear dynamical model is known to be intractable and usually begets numerical or analytical approximations. We introduce a method for state prediction, called the Expansion-Compression Unscented Transform, and use it to solve a class of online policy optimization problems. Our proposed algorithm propagates a finite number of sigma points through a state-dependent distribution, which dictates an increase in the number of sigma points at each time step to represent the resulting distribution; this is what we call the expansion operation. To keep the algorithm scalable, we augment the expansion operation with a compression operation based on moment matching, thereby keeping the number of sigma points constant across predictions over multiple time steps. Its performance is empirically shown to be comparable to Monte Carlo but at a much lower computational cost. Under state and control input constraints, the state prediction is subsequently used in tandem with a proposed variant of constrained gradient-descent for online update of policy parameters in a receding horizon fashion. The framework is implemented as a differentiable computational graph for policy training. We showcase our framework for a quadrotor stabilization task as part of a benchmark comparison in safe-control-gym and for optimizing the parameters of a Control Barrier Function based controller in a leader-follower problem.
△ Less
Submitted 31 January, 2024; v1 submitted 26 September, 2022;
originally announced September 2022.
-
Adaptation for Validation of a Consolidated Control Barrier Function based Control Synthesis
Authors:
Mitchell Black,
Dimitra Panagou
Abstract:
We develop a novel adaptation-based technique for safe control design in the presence of multiple control barrier function (CBF) constraints. Specifically, we introduce an approach for synthesizing any number of candidate CBFs into one consolidated CBF candidate, and propose a parameter adaptation law for the weights of its constituents such that the controllable dynamics of the consolidated CBF a…
▽ More
We develop a novel adaptation-based technique for safe control design in the presence of multiple control barrier function (CBF) constraints. Specifically, we introduce an approach for synthesizing any number of candidate CBFs into one consolidated CBF candidate, and propose a parameter adaptation law for the weights of its constituents such that the controllable dynamics of the consolidated CBF are non-vanishing. We then prove that the use of our adaptation law serves to certify the consolidated CBF candidate as valid for a class of nonlinear, control-affine, multi-agent systems, which permits its use in a quadratic program based control law. We highlight the success of our approach in simulation on a multi-robot goal-reaching problem in a crowded warehouse environment, and further demonstrate its efficacy experimentally in the laboratory via AION ground rovers operating amongst other vehicles behaving both aggressively and conservatively.
△ Less
Submitted 16 September, 2022;
originally announced September 2022.
-
Adversary Detection and Resilient Control for Multi-Agent Systems
Authors:
Aquib Mustafa,
Dimitra Panagou
Abstract:
This paper presents an adversary detection mechanism and a resilient control framework for multi-agent systems under spatiotemporal constraints. Safety in multi-agent systems is typically addressed under the assumption that all agents collaborate to ensure the forward invariance of a desired safe set. This work analyzes agent behaviors based on certain behavior metrics, and designs a proactive adv…
▽ More
This paper presents an adversary detection mechanism and a resilient control framework for multi-agent systems under spatiotemporal constraints. Safety in multi-agent systems is typically addressed under the assumption that all agents collaborate to ensure the forward invariance of a desired safe set. This work analyzes agent behaviors based on certain behavior metrics, and designs a proactive adversary detection mechanism based on the notion of the critical region for the system operation. In particular, the presented detection mechanism not only identifies adversarial agents, but also ensures all-time safety for intact agents. Then, based on the analysis and detection results, a resilient QP-based controller is presented to ensure safety and liveness constraints for intact agents. Simulation results validate the efficacy of the presented theoretical contributions.
△ Less
Submitted 20 July, 2022;
originally announced July 2022.
-
Fixed-Time Parameter Adaptation for Safe Control Synthesis
Authors:
Mitchell Black,
Ehsan Arabi,
Dimitra Panagou
Abstract:
This paper introduces a parameter adaptation-based control law for a class of nonlinear, control-affine, safety-critical systems subject to additive, parameter-affine model uncertainty. It is shown that the uncertainty is learned in fixed-time, i.e., within a finite time independent of the initial parameter estimates, without requiring persistence of excitation or rank conditions on the associated…
▽ More
This paper introduces a parameter adaptation-based control law for a class of nonlinear, control-affine, safety-critical systems subject to additive, parameter-affine model uncertainty. It is shown that the uncertainty is learned in fixed-time, i.e., within a finite time independent of the initial parameter estimates, without requiring persistence of excitation or rank conditions on the associated regressor matrix. A monotonically decreasing bound on the error of the estimated uncertainty is derived and used in the proposed control barrier function-based control law for guaranteed safety of the system trajectories. It is then proven that the parameter adaptation law is robust to bounded measurement noise and non-parametric perturbations to the system in that the estimated uncertainty still converges to a known neighborhood of the true uncertainty in fixed-time. The advantages of the approach are highlighted in a comparative numerical study, and the method is validated on a quadrotor trajectory-tracking problem subject to safety requirements and an unknown wind field.
△ Less
Submitted 1 August, 2023; v1 submitted 21 April, 2022;
originally announced April 2022.
-
Predictive Control Barrier Functions for Online Safety Critical Control
Authors:
Joseph Breeden,
Dimitra Panagou
Abstract:
This paper presents a methodology for constructing Control Barrier Functions (CBFs) that proactively consider the future safety of a system along a nominal trajectory, and effect corrective action before the trajectory leaves a designated safe set. Specifically, this paper presents a systematic approach for propagating a nominal trajectory on a receding horizon, and then encoding the future safety…
▽ More
This paper presents a methodology for constructing Control Barrier Functions (CBFs) that proactively consider the future safety of a system along a nominal trajectory, and effect corrective action before the trajectory leaves a designated safe set. Specifically, this paper presents a systematic approach for propagating a nominal trajectory on a receding horizon, and then encoding the future safety of this trajectory into a CBF. If the propagated trajectory is unsafe, then a controller satisfying the CBF condition will modify the nominal trajectory before the trajectory becomes unsafe. Compared to existing CBF techniques, this strategy is proactive rather than reactive and thus potentially results in smaller modifications to the nominal trajectory. The proposed strategy is shown to be provably safe, and then is demonstrated in simulated scenarios where it would otherwise be difficult to construct a traditional CBF. In simulation, the predictive CBF results in less modification to the nominal trajectory and smaller control inputs than a traditional CBF, and faster computations than a nonlinear model predictive control approach.
△ Less
Submitted 30 August, 2022; v1 submitted 1 April, 2022;
originally announced April 2022.
-
Future-Focused Control Barrier Functions for Autonomous Vehicle Control
Authors:
Mitchell Black,
Mrdjan Jankovic,
Abhishek Sharma,
Dimitra Panagou
Abstract:
In this paper, we introduce a class of future-focused control barrier functions (ff-CBF) aimed at improving traditionally myopic CBF based control design and study their efficacy in the context of an unsignaled four-way intersection crossing problem for collections of both communicating and non-communicating autonomous vehicles. Our novel ff-CBF encodes that vehicles take control actions that avoi…
▽ More
In this paper, we introduce a class of future-focused control barrier functions (ff-CBF) aimed at improving traditionally myopic CBF based control design and study their efficacy in the context of an unsignaled four-way intersection crossing problem for collections of both communicating and non-communicating autonomous vehicles. Our novel ff-CBF encodes that vehicles take control actions that avoid collisions predicted under a zero-acceleration policy over an arbitrarily long future time interval. In this sense the ff-CBF defines a virtual barrier, a loosening of which we propose in the form of a relaxed future-focused CBF (rff-CBF) that allows a relaxation of the virtual ff-CBF barrier far from the physical barrier between vehicles. We study the performance of ff-CBF and rff-CBF based controllers on communicating vehicles via a series of simulated trials of the intersection scenario, and in particular highlight how the rff-CBF based controller empirically outperforms a benchmark controller from the literature by improving intersection throughput while preserving safety and feasibility. Finally, we demonstrate our proposed ff-CBF control law on an intersection scenario in the laboratory environment with a collection of 5 non-communicating AION ground rovers.
△ Less
Submitted 3 October, 2022; v1 submitted 31 March, 2022;
originally announced April 2022.
-
IDCAIS: Inter-Defender Collision-Aware Interception Strategy against Multiple Attackers
Authors:
Vishnu S. Chipade,
Dimitra Panagou
Abstract:
In the prior literature on multi-agent area defense games, the assignments of the defenders to the attackers are done based on a cost metric associated only with the interception of the attackers. In contrast to that, this paper presents an Inter-Defender Collision-Aware Interception Strategy (IDCAIS) for defenders to intercept attackers in order to defend a protected area, such that the defender-…
▽ More
In the prior literature on multi-agent area defense games, the assignments of the defenders to the attackers are done based on a cost metric associated only with the interception of the attackers. In contrast to that, this paper presents an Inter-Defender Collision-Aware Interception Strategy (IDCAIS) for defenders to intercept attackers in order to defend a protected area, such that the defender-to-attacker assignment protocol not only takes into account an interception-related cost but also takes into account any possible future collisions among the defenders on their optimal interception trajectories. In particular, in this paper, the defenders are assigned to intercept attackers using a mixed-integer quadratic program (MIQP) that: 1) minimizes the sum of times taken by defenders to capture the attackers under time-optimal control, as well as 2) helps eliminate or delay possible future collisions among the defenders on the optimal trajectories. To prevent inevitable collisions on optimal trajectories or collisions arising due to time-sub-optimal behavior by the attackers, a minimally augmented control using exponential control barrier function (ECBF) is also provided. Simulations show the efficacy of the approach.
△ Less
Submitted 14 August, 2022; v1 submitted 22 December, 2021;
originally announced December 2021.
-
Guaranteed Safe Spacecraft Docking with Control Barrier Functions
Authors:
Joseph Breeden,
Dimitra Panagou
Abstract:
This paper presents a strategy for control of a spacecraft docking with a non-maneuvering target in the presence of safety constraints and bounded disturbances. The presence of disturbances prevents convergence to a unique docking state, so in our formulation, docking is defined as occurring within a set constructed using prescribed tolerances. Safety is ensured via application of Robust Control B…
▽ More
This paper presents a strategy for control of a spacecraft docking with a non-maneuvering target in the presence of safety constraints and bounded disturbances. The presence of disturbances prevents convergence to a unique docking state, so in our formulation, docking is defined as occurring within a set constructed using prescribed tolerances. Safety is ensured via application of Robust Control Barrier Functions to render a designated safe set forward invariant for any allowable disturbance. However, this safety strategy necessarily presumes a worst-case disturbance, and thus restricts trajectories to a subset of the safe set when a worst-case disturbance is not present. The presented controller accounts for this restriction, and guarantees that the spacecraft both remains safe and achieves docking in finite time for any allowable disturbance. The controller is then validated in simulation for a spacecraft landing on an asteroid, and two spacecraft docking in low Earth orbit.
△ Less
Submitted 22 December, 2021; v1 submitted 14 September, 2021;
originally announced September 2021.
-
Robust Control Barrier Functions under High Relative Degree and Input Constraints for Satellite Trajectories
Authors:
Joseph Breeden,
Dimitra Panagou
Abstract:
This paper presents methodologies for constructing Control Barrier Functions (CBFs) for nonlinear, control-affine systems, in the presence of input constraints and bounded disturbances. More specifically, given a constraint function with high-relative-degree with respect to the system dynamics, the paper considers three methodologies, two for relative-degree 2 and one for higher relative-degrees,…
▽ More
This paper presents methodologies for constructing Control Barrier Functions (CBFs) for nonlinear, control-affine systems, in the presence of input constraints and bounded disturbances. More specifically, given a constraint function with high-relative-degree with respect to the system dynamics, the paper considers three methodologies, two for relative-degree 2 and one for higher relative-degrees, for creating CBFs whose zero sublevel sets are subsets of the constraint function's zero sublevel set. Three special forms of Robust CBFs (RCBFs) are developed as functions of the input constraints, system dynamics, and disturbance bounds, such that the resultant RCBF condition on the control input is always feasible for states in the RCBF zero sublevel set. The RCBF condition is then enforced in a switched fashion, which allows the system to operate safely without enforcing the RCBF condition when far from the safe set boundary and allows tuning of how closely trajectories approach the safe set boundary. The proposed methods are verified in simulations demonstrating the developed RCBFs in an asteroid flyby scenario for a satellite with low-thrust actuators, and in asteroid proximity operations for a satellite with high-thrust actuators.
△ Less
Submitted 8 June, 2023; v1 submitted 8 July, 2021;
originally announced July 2021.
-
High Relative Degree Control Barrier Functions Under Input Constraints
Authors:
Joseph Breeden,
Dimitra Panagou
Abstract:
This paper presents methodologies for ensuring forward invariance of sublevel sets of constraint functions with high-relative-degree with respect to the system dynamics and in the presence of input constraints. We show that such constraint functions can be converted into special Zeroing Control Barrier Functions (ZCBFs), which, by construction, generate sufficient conditions for rendering the stat…
▽ More
This paper presents methodologies for ensuring forward invariance of sublevel sets of constraint functions with high-relative-degree with respect to the system dynamics and in the presence of input constraints. We show that such constraint functions can be converted into special Zeroing Control Barrier Functions (ZCBFs), which, by construction, generate sufficient conditions for rendering the state always inside a sublevel set of the constraint function in the presence of input constraints. We present a general form for one such ZCBF, as well as a special case applicable to a specific class of systems. We conclude with a comparison of system trajectories under the two ZCBFs developed and prior literature, and a case study for an asteroid observation problem using quadratic-program based controllers to enforce the ZCBF condition.
△ Less
Submitted 30 September, 2021; v1 submitted 18 June, 2021;
originally announced June 2021.
-
Safe Control Synthesis via Input Constrained Control Barrier Functions
Authors:
Devansh Agrawal,
Dimitra Panagou
Abstract:
This paper introduces the notion of an Input Constrained Control Barrier Function (ICCBF), as a method to synthesize safety-critical controllers for non-linear control affine systems with input constraints. The method identifies a subset of the safe set of states, and constructs a controller to render the subset forward invariant. The feedback controller is represented as the solution to a quadrat…
▽ More
This paper introduces the notion of an Input Constrained Control Barrier Function (ICCBF), as a method to synthesize safety-critical controllers for non-linear control affine systems with input constraints. The method identifies a subset of the safe set of states, and constructs a controller to render the subset forward invariant. The feedback controller is represented as the solution to a quadratic program, which can be solved efficiently for real-time implementation. Furthermore, we show that ICCBFs are a generalization of Higher Order Control Barrier Functions, and thus are applicable to systems of non-uniform relative degree. Simulation results are presented for the adaptive cruise control problem, and a spacecraft rendezvous problem.
△ Less
Submitted 4 April, 2021;
originally announced April 2021.
-
Multi-rate Control Design under Input Constraints via Fixed-Time Barrier Functions
Authors:
Kunal Garg,
Ryan K. Cosner,
Ugo Rosolia,
Aaron D. Ames,
Dimitra Panagou
Abstract:
In this paper, we introduce the notion of periodic safety, which requires that the system trajectories periodically visit a subset of a forward-invariant safe set, and utilize it in a multi-rate framework where a high-level planner generates a reference trajectory that is tracked by a low-level controller under input constraints. We introduce the notion of fixed-time barrier functions which is lev…
▽ More
In this paper, we introduce the notion of periodic safety, which requires that the system trajectories periodically visit a subset of a forward-invariant safe set, and utilize it in a multi-rate framework where a high-level planner generates a reference trajectory that is tracked by a low-level controller under input constraints. We introduce the notion of fixed-time barrier functions which is leveraged by the proposed low-level controller in a quadratic programming framework. Then, we design a model predictive control policy for high-level planning with a bound on the rate of change for the reference trajectory to guarantee that periodic safety is achieved. We demonstrate the effectiveness of the proposed strategy on a simulation example, where the proposed fixed-time stabilizing low-level controller shows successful satisfaction of control objectives, whereas an exponentially stabilizing low-level controller fails.
△ Less
Submitted 5 March, 2021;
originally announced March 2021.
-
Control Barrier Functions in Sampled-Data Systems
Authors:
Joseph Breeden,
Kunal Garg,
Dimitra Panagou
Abstract:
This paper presents conditions for ensuring forward invariance of safe sets under sampled-data system dynamics with piecewise-constant controllers and fixed time-steps. First, we introduce two different metrics to compare the conservativeness of sufficient conditions on forward invariance under piecewise-constant controllers. Then, we propose three approaches for guaranteeing forward invariance, t…
▽ More
This paper presents conditions for ensuring forward invariance of safe sets under sampled-data system dynamics with piecewise-constant controllers and fixed time-steps. First, we introduce two different metrics to compare the conservativeness of sufficient conditions on forward invariance under piecewise-constant controllers. Then, we propose three approaches for guaranteeing forward invariance, two motivated by continuous-time barrier functions, and one motivated by discrete-time barrier functions. All proposed conditions are control affine, and thus can be incorporated into quadratic programs for control synthesis. We show that the proposed conditions are less conservative than those in earlier studies, and show via simulation how this enables the use of barrier functions that are impossible to implement with the desired time-step using existing methods.
△ Less
Submitted 16 June, 2021; v1 submitted 5 March, 2021;
originally announced March 2021.
-
A Fixed-Time Stable Adaptation Law for Safety-Critical Control under Parametric Uncertainty
Authors:
Mitchell Black,
Ehsan Arabi,
Dimitra Panagou
Abstract:
We present a novel technique for solving the problem of safe control for a general class of nonlinear, control-affine systems subject to parametric model uncertainty. Invoking Lyapunov analysis and the notion of fixed-time stability (FxTS), we introduce a parameter adaptation law which guarantees convergence of the estimates of unknown parameters in the system dynamics to their true values within…
▽ More
We present a novel technique for solving the problem of safe control for a general class of nonlinear, control-affine systems subject to parametric model uncertainty. Invoking Lyapunov analysis and the notion of fixed-time stability (FxTS), we introduce a parameter adaptation law which guarantees convergence of the estimates of unknown parameters in the system dynamics to their true values within a fixed-time independent of the initial parameter estimation error. We then synthesize the adaptation law with a robust, adaptive control barrier function (RaCBF) based quadratic program to compute safe control inputs despite the considered model uncertainty. To corroborate our results, we undertake a comparative case study on the efficacy of this result versus other recent approaches in the literature to safe control under uncertainty, and close by highlighting the value of our method in the context of an automobile overtake scenario.
△ Less
Submitted 24 November, 2020;
originally announced November 2020.
-
Adaptive Active-Passive Networked Multiagent Systems
Authors:
Ehsan Arabi,
Dimitra Panagou,
Tansel Yucelen
Abstract:
Active-passive multiagent systems consist of agents subject to inputs (active agents) and agents with no inputs (passive agents), where active and passive agent roles are considered to be interchangeable in order to capture a wide array of applications. A challenge in the control of active-passive multiagent systems is the presence of information exchange uncertainties that can yield to undesirabl…
▽ More
Active-passive multiagent systems consist of agents subject to inputs (active agents) and agents with no inputs (passive agents), where active and passive agent roles are considered to be interchangeable in order to capture a wide array of applications. A challenge in the control of active-passive multiagent systems is the presence of information exchange uncertainties that can yield to undesirable closed-loop system performance. Motivated by this standpoint, this paper proposes an adaptive control algorithm for this class of multiagent systems to suppress the negative effects of information exchange uncertainties. Specifically, by estimating these uncertainties, the proposed adaptive control architecture has the ability to recover the active-passive multiagent system performance in a distributed manner. As a result, the agents converge to a user-adjustable neighborhood of the average of the applied inputs to the active agents. The efficacy of the proposed control architecture is also validated from a human-robot collaboration perspective, where a human is visiting several task locations, and the multiagent system identifies these locations and moves toward them as a coverage control problem.
△ Less
Submitted 5 October, 2020;
originally announced October 2020.
-
Approximate Time-Optimal Trajectories for Damped Double Integrator in 2D Obstacle Environments under Bounded Inputs
Authors:
Vishnu S. Chipade,
Dimitra Panagou
Abstract:
This article provides extensions to existing path-velocity decomposition based time optimal trajectory planning algorithm \cite{kant1986toward} to scenarios in which agents move in 2D obstacle environment under double integrator dynamics with drag term (damped double integrator). Particularly, we extend the idea of a tangent graph \cite{liu1992path} to $\calC^1$-Tangent graph to find continuously…
▽ More
This article provides extensions to existing path-velocity decomposition based time optimal trajectory planning algorithm \cite{kant1986toward} to scenarios in which agents move in 2D obstacle environment under double integrator dynamics with drag term (damped double integrator). Particularly, we extend the idea of a tangent graph \cite{liu1992path} to $\calC^1$-Tangent graph to find continuously differentiable ($\calC^1$) shortest path between any two points. $\calC^1$-Tangent graph has a continuously differentiable ($\calC^1$) path between any two nodes. We also provide analytical expressions for a near time-optimal velocity profile for an agent moving on these shortest paths under the damped double integrator with bounded acceleration.
△ Less
Submitted 13 July, 2020; v1 submitted 10 July, 2020;
originally announced July 2020.
-
Multi-Swarm Herding: Protecting against Adversarial Swarms
Authors:
Vishnu S. Chipade,
Dimitra Panagou
Abstract:
This paper studies a defense approach against one or more swarms of adversarial agents. In our earlier work, we employ a closed formation (`StringNet') of defending agents (defenders) around a swarm of adversarial agents (attackers) to confine their motion within given bounds, and guide them to a safe area. The control design relies on the assumption that the adversarial agents remain close enough…
▽ More
This paper studies a defense approach against one or more swarms of adversarial agents. In our earlier work, we employ a closed formation (`StringNet') of defending agents (defenders) around a swarm of adversarial agents (attackers) to confine their motion within given bounds, and guide them to a safe area. The control design relies on the assumption that the adversarial agents remain close enough to each other, i.e., within a prescribed connectivity region. To handle situations when the attackers no longer stay within such a connectivity region, but rather split into smaller swarms (clusters) to maximize the chance or impact of attack, this paper proposes an approach to learn the attacking sub-swarms and reassign defenders towards the attackers. We use a `Density-based Spatial Clustering of Application with Noise (DBSCAN)' algorithm to identify the spatially distributed swarms of the attackers. Then, the defenders are assigned to each identified swarm of attackers by solving a constrained generalized assignment problem. Simulations are provided to demonstrate the effectiveness of the approach.
△ Less
Submitted 8 July, 2020;
originally announced July 2020.
-
Herding an Adversarial Swarm in Three-dimensional Spaces
Authors:
Weifan Zhang,
Vishnu S. Chipade,
Dimitra Panagou
Abstract:
This paper presents a defense approach to safeguard a protected area against an attack by a swarm of adversarial agents in three-dimensional (3D) space. We extend our 2D `StringNet Herding' approach, in which a closed formation of string-barriers is established around the adversarial swarm to confine their motion and herd them to a safe area, to 3D spaces by introducing 3D-StringNet. 3D-StringNet…
▽ More
This paper presents a defense approach to safeguard a protected area against an attack by a swarm of adversarial agents in three-dimensional (3D) space. We extend our 2D `StringNet Herding' approach, in which a closed formation of string-barriers is established around the adversarial swarm to confine their motion and herd them to a safe area, to 3D spaces by introducing 3D-StringNet. 3D-StringNet is a closed 3D formation of triangular net-like barriers. We provide a systematic approach to generate three types of 3D formations that are used in the 3D herding process and modifications to the finite-time convergent control laws developed in \cite{chipade2020swarmherding} that are required for a 3D environment. Furthermore, for given initial positions of the defenders, we provide conditions on the initial positions of the attackers for which the defenders are guaranteed to gather as a specified formation at a position on the shortest path of the attackers to the protected area before attackers reach there.
△ Less
Submitted 7 April, 2021; v1 submitted 8 July, 2020;
originally announced July 2020.
-
Characterization of Domain of Fixed-time Stability under Control Input Constraints
Authors:
Kunal Garg,
Dimitra Panagou
Abstract:
In this paper, we study the effect of control input constraints on the domain of attraction of an FxTS equilibrium point. We first present a new result on FxTS, where we allow a positive term in the time derivative of the Lyapunov function. We provide analytical expressions for the domain of attraction and the settling time to the equilibrium in terms of the coefficients of the positive and negati…
▽ More
In this paper, we study the effect of control input constraints on the domain of attraction of an FxTS equilibrium point. We first present a new result on FxTS, where we allow a positive term in the time derivative of the Lyapunov function. We provide analytical expressions for the domain of attraction and the settling time to the equilibrium in terms of the coefficients of the positive and negative terms that appear in the time derivative of the Lyapunov function. We show that this result serves as a robustness characterization of FxTS equilibria in the presence of an additive, vanishing disturbances. We use the new FxTS result in formulating a provably feasible quadratic program (QP) that computes control inputs that drive the trajectories of a class of nonlinear, control-affine systems to a goal set, in the presence of control input constraints.
△ Less
Submitted 12 April, 2021; v1 submitted 2 April, 2020;
originally announced April 2020.
-
A Quadratic Program based Control Synthesis under Spatiotemporal Constraints and Non-vanishing Disturbances
Authors:
Mitchell Black,
Kunal Garg,
Dimitra Panagou
Abstract:
In this paper, we study the effect of non-vanishing disturbances on the stability of fixed-time stable (FxTS) systems. We present a new result on FxTS, which allows a positive term in the time derivative of the Lyapunov function with the aim to model bounded, non-vanishing disturbances in the system dynamics. We characterize the neighborhood to which the system trajectories converge, as well the t…
▽ More
In this paper, we study the effect of non-vanishing disturbances on the stability of fixed-time stable (FxTS) systems. We present a new result on FxTS, which allows a positive term in the time derivative of the Lyapunov function with the aim to model bounded, non-vanishing disturbances in the system dynamics. We characterize the neighborhood to which the system trajectories converge, as well the time of convergence to this neighborhood, in terms of the positive and negative terms that appear in the time derivative of the Lyapunov function. Then, we use the new FxTS result and formulate a quadratic program (QP) that yields control inputs which drive the trajectories of a class of nonlinear, control-affine systems to a goal set in the presence of control input constraints and non-vanishing, bounded disturbances in the system dynamics. We consider an overtaking problem on a highway as a case study, and discuss how to setup the QP for the considered problem, and how to make a decision on when to start the overtake maneuver, in the presence of sensing errors.
△ Less
Submitted 7 October, 2020; v1 submitted 2 April, 2020;
originally announced April 2020.
-
Robust Control Barrier and Control Lyapunov Functions with Fixed-Time Convergence Guarantees
Authors:
Kunal Garg,
Dimitra Panagou
Abstract:
This paper studies control synthesis for a general class of nonlinear, control-affine dynamical systems under additive disturbances and state-estimation errors. We enforce forward invariance of static and dynamic safe sets and convergence to a given goal set within a user-defined time in the presence of input constraints. We use robust variants of control barrier functions (CBF) and fixed-time con…
▽ More
This paper studies control synthesis for a general class of nonlinear, control-affine dynamical systems under additive disturbances and state-estimation errors. We enforce forward invariance of static and dynamic safe sets and convergence to a given goal set within a user-defined time in the presence of input constraints. We use robust variants of control barrier functions (CBF) and fixed-time control Lyapunov functions (FxT-CLF) to incorporate a class of additive disturbances in the system dynamics, and state-estimation errors. To solve the underlying constrained control problem, we formulate a quadratic program and use the proposed robust CBF-FxT-CLF conditions to compute the control input. We showcase the efficacy of the proposed method on a numerical case study involving multiple underactuated marine vehicles.
△ Less
Submitted 13 April, 2021; v1 submitted 2 April, 2020;
originally announced April 2020.