-
Network-Independent Incremental Passivity Conditions for Grid-Forming Inverter Control
Authors:
Jared Miller,
Maitraya Avadhut Desai,
Xiuqiang He,
Roy S. Smith,
Gabriela Hug
Abstract:
Grid-forming inverters control the power transfer between the AC and DC sides of an electrical grid while maintaining the frequency and voltage of the AC side. This paper focuses on ensuring large-signal stability of an electrical grid with inverter-interfaced renewable sources. We prove that the Hybrid-Angle Control (HAC) scheme for grid-forming inverters can exhibit incremental passivity propert…
▽ More
Grid-forming inverters control the power transfer between the AC and DC sides of an electrical grid while maintaining the frequency and voltage of the AC side. This paper focuses on ensuring large-signal stability of an electrical grid with inverter-interfaced renewable sources. We prove that the Hybrid-Angle Control (HAC) scheme for grid-forming inverters can exhibit incremental passivity properties between current and voltage at both the AC and DC ports. This incremental passivity can be certified through decentralized conditions. Inverters operating under HAC can, therefore, be connected to other passive elements (e.g. transmission lines) with an immediate guarantee of global transient stability regardless of the network topology or parameters. Passivity of Hybrid Angle Control is also preserved under small-signal (linearized) analyses, in contrast to conventional proportional droop laws that are passivity-short at low frequencies. Passivity and interconnected-stability properties are demonstrated through an example case study.
△ Less
Submitted 17 June, 2025;
originally announced June 2025.
-
Finding d-Cuts in Claw-free Graphs
Authors:
Jungho Ahn,
Tala Eagling-Vose,
Felicia Lucke,
Daniël Paulusma,
Siani Smith
Abstract:
The Matching Cut problem is to decide if the vertex set of a connected graph can be partitioned into two non-empty sets $B$ and $R$ such that the edges between $B$ and $R$ form a matching, that is, every vertex in $B$ has at most one neighbour in $R$, and vice versa. If for some integer $d\geq 1$, we allow every neighbour in $B$ to have at most $d$ neighbours in $R$, and vice versa, we obtain the…
▽ More
The Matching Cut problem is to decide if the vertex set of a connected graph can be partitioned into two non-empty sets $B$ and $R$ such that the edges between $B$ and $R$ form a matching, that is, every vertex in $B$ has at most one neighbour in $R$, and vice versa. If for some integer $d\geq 1$, we allow every neighbour in $B$ to have at most $d$ neighbours in $R$, and vice versa, we obtain the more general problem $d$-Cut. It is known that $d$-Cut is NP-complete for every $d\geq 1$. However, for claw-free graphs, it is only known that $d$-Cut is polynomial-time solvable for $d=1$ and NP-complete for $d\geq 3$. We resolve the missing case $d=2$ by proving NP-completeness. This follows from our more general study, in which we also bound the maximum degree. That is, we prove that for every $d\geq 2$, $d$-Cut, restricted to claw-free graphs of maximum degree $p$, is constant-time solvable if $p\leq 2d+1$ and NP-complete if $p\geq 2d+3$. Moreover, in the former case, we can find a $d$-cut in linear time. We also show how our positive results for claw-free graphs can be generalized to $S_{1^t,l}$-free graphs where $S_{1^t,l}$ is the graph obtained from a star on $t+2$ vertices by subdividing one of its edges exactly $l$ times.
△ Less
Submitted 23 May, 2025;
originally announced May 2025.
-
Tracking the topology of neural manifolds across populations
Authors:
Iris H. R. Yoon,
Gregory Henselman-Petrusek,
Yiyi Yu,
Robert Ghrist,
Spencer LaVere Smith,
Chad Giusti
Abstract:
Neural manifolds summarize the intrinsic structure of the information encoded by a population of neurons. Advances in experimental techniques have made simultaneous recordings from multiple brain regions increasingly commonplace, raising the possibility of studying how these manifolds relate across populations. However, when the manifolds are nonlinear and possibly code for multiple unknown variab…
▽ More
Neural manifolds summarize the intrinsic structure of the information encoded by a population of neurons. Advances in experimental techniques have made simultaneous recordings from multiple brain regions increasingly commonplace, raising the possibility of studying how these manifolds relate across populations. However, when the manifolds are nonlinear and possibly code for multiple unknown variables, it is challenging to extract robust and falsifiable information about their relationships. We introduce a framework, called the method of analogous cycles, for matching topological features of neural manifolds using only observed dissimilarity matrices within and between neural populations. We demonstrate via analysis of simulations and \emph{in vivo} experimental data that this method can be used to correctly identify multiple shared circular coordinate systems across both stimuli and inferred neural manifolds. Conversely, the method rejects matching features that are not intrinsic to one of the systems. Further, as this method is deterministic and does not rely on dimensionality reduction or optimization methods, it is amenable to direct mathematical investigation and interpretation in terms of the underlying neural activity. We thus propose the method of analogous cycles as a suitable foundation for a theory of cross-population analysis via neural manifolds.
△ Less
Submitted 26 March, 2025;
originally announced March 2025.
-
A forbidden subgraph study for cut problems on graphs permitting loops and multiedges
Authors:
Tala Eagling-Vose,
Barnaby Martin,
Daniel Paulusma,
Siani Smith
Abstract:
We take the recently-introduced C123-framework, for the study of (simple) graph problems restricted to inputs specified by the omission of some finite set of subgraphs, to more general graph problems possibly involving self-loops and multiedges. We study specifically the problems Partially Reflexive Stable Cut and Multigraph Matching Cut in this connection. When one forbids a single (simple) subgr…
▽ More
We take the recently-introduced C123-framework, for the study of (simple) graph problems restricted to inputs specified by the omission of some finite set of subgraphs, to more general graph problems possibly involving self-loops and multiedges. We study specifically the problems Partially Reflexive Stable Cut and Multigraph Matching Cut in this connection. When one forbids a single (simple) subgraph, these problems exhibit the same complexity behaviour as C123-problems, but on finite sets of forbidden subgraphs, the classification appears more complex. While Multigraph Matching Cut and Multigraph d-Cut are C123-problems, already Partially Reflexive Stable Cut fails to be. This is witnessed by forbidding as subgraphs both $C_3$ and $H_1$. Indeed, the difference of behaviour occurs only around pendant subdivisions of nets and pendant subdivisions of $H_1$. We examine this area in close detail.
△ Less
Submitted 11 February, 2025;
originally announced February 2025.
-
Makeenko-Migdal equations for 2D Yang-Mills: from lattice to continuum
Authors:
Hao Shen,
Scott A. Smith,
Rongchan Zhu
Abstract:
In this paper, we prove the convergence of the discrete Makeenko-Migdal equations for the Yang-Mills model on $(\varepsilon \mathbf{Z})^{2}$ to their continuum counterparts on the plane, in an appropriate sense. The key step in the proof is identifying the limits of the contributions from deformations as the area derivatives of the Wilson loop expectations.
In this paper, we prove the convergence of the discrete Makeenko-Migdal equations for the Yang-Mills model on $(\varepsilon \mathbf{Z})^{2}$ to their continuum counterparts on the plane, in an appropriate sense. The key step in the proof is identifying the limits of the contributions from deformations as the area derivatives of the Wilson loop expectations.
△ Less
Submitted 5 January, 2025; v1 submitted 19 December, 2024;
originally announced December 2024.
-
Schauder Estimates for Germs by Scaling
Authors:
Jonas Sauer,
Scott A. Smith
Abstract:
In this expository note, we show that the blow-up arguments of L. Simon adapt well to the corresponding Schauder theory of germs used in the study of singular SPDEs. We illustrate this through some representative examples. As in the classical PDE framework, the argument relies only on the scaling properties of the germ semi-norms and the Liouville principle for the operator.
In this expository note, we show that the blow-up arguments of L. Simon adapt well to the corresponding Schauder theory of germs used in the study of singular SPDEs. We illustrate this through some representative examples. As in the classical PDE framework, the argument relies only on the scaling properties of the germ semi-norms and the Liouville principle for the operator.
△ Less
Submitted 26 March, 2025; v1 submitted 2 December, 2024;
originally announced December 2024.
-
Distributed Dual Quaternion Extended Kalman Filtering for Spacecraft Pose Estimation
Authors:
Mathias Hudoba de Badyn,
Jonas Binz,
Andrea Iannelli,
Roy S. Smith
Abstract:
In this paper, a distributed dual-quaternion multiplicative extended Kalman filter for the estimation of poses and velocities of individual satellites in a fleet of spacecraft is analyzed. The proposed algorithm uses both absolute and relative pose measurements between neighbouring satellites in a network, allowing each individual satellite to estimate its own pose and that of its neighbours. By u…
▽ More
In this paper, a distributed dual-quaternion multiplicative extended Kalman filter for the estimation of poses and velocities of individual satellites in a fleet of spacecraft is analyzed. The proposed algorithm uses both absolute and relative pose measurements between neighbouring satellites in a network, allowing each individual satellite to estimate its own pose and that of its neighbours. By utilizing the distributed Kalman consensus filter, a novel sensor and state-estimate fusion procedure is proposed that allows each satellite to improve its own state estimate by sharing data with its neighbours over a communication link. A leader-follower approach, whereby only a subset of the satellites have access to an absolute pose measurement is also examined. In this case, followers rely solely on the information provided by their neighbours, as well as relative pose measurements to those neighbours. The algorithm is tested extensively via numerical simulations, and it is shown that the approach provides a substantial improvement in performance over the scenario in which the satellites do not cooperate. A case study of satellites swarming an asteroid is presented, and the performance in the leader-follower scenario is also analyzed.
△ Less
Submitted 28 November, 2024;
originally announced November 2024.
-
Data-Driven Structured Robust Control of Linear Systems
Authors:
Jared Miller,
Jaap Eising,
Florian Dörfler,
Roy S. Smith
Abstract:
Static structured control refers to the task of designing a state-feedback controller such that the control gain satisfies a subspace constraint. Structured control has applications in control of communication-inhibited dynamical systems, such as systems in networked environments. This work performs $H_2$-suboptimal regulation under a common structured state-feedback controller for a class of data…
▽ More
Static structured control refers to the task of designing a state-feedback controller such that the control gain satisfies a subspace constraint. Structured control has applications in control of communication-inhibited dynamical systems, such as systems in networked environments. This work performs $H_2$-suboptimal regulation under a common structured state-feedback controller for a class of data-consistent plants. The certification of $H_2$-performance is attained through a combination of standard $H_2$ LMIs, convex sufficient conditions for structured control, and a matrix S-lemma for set-membership. The resulting convex optimization problems are linear matrix inequalities whose size scales independently of the number of data samples collected. Data-driven structured $H_2$-regulation control is demonstrated on example systems.
△ Less
Submitted 18 November, 2024;
originally announced November 2024.
-
The Unified Transform Method: beyond circular or convex domains
Authors:
Jesse J. Hulse,
Loredana Lanzani,
Stefan G. Llewellyn Smith,
Elena Luca
Abstract:
A new transform-based approach is presented that can be used to solve mixed boundary value problems for Laplace's equation in non-convex and other planar domains, specifically the so-called Lipschitz domains. This work complements Crowdy (2015, CMFT, 15, 655--687), where new transform-based techniques were developed for boundary value problems for Laplace's equation in circular domains. The key in…
▽ More
A new transform-based approach is presented that can be used to solve mixed boundary value problems for Laplace's equation in non-convex and other planar domains, specifically the so-called Lipschitz domains. This work complements Crowdy (2015, CMFT, 15, 655--687), where new transform-based techniques were developed for boundary value problems for Laplace's equation in circular domains. The key ingredient of the present method is the exploitation of the properties of the Szegő kernel and its connection with the Cauchy kernel to obtain transform pairs for analytic functions in such domains. Several examples are solved in detail and are numerically implemented to illustrate the application of the new transform pairs.
△ Less
Submitted 11 April, 2025; v1 submitted 13 October, 2024;
originally announced October 2024.
-
Finding $d$-Cuts in Graphs of Bounded Diameter, Graphs of Bounded Radius and $H$-Free Graphs
Authors:
Felicia Lucke,
Ali Momeni,
Daniël Paulusma,
Siani Smith
Abstract:
The $d$-Cut problem is to decide if a graph has an edge cut such that each vertex has at most $d$ neighbours at the opposite side of the cut. If $d=1$, we obtain the intensively studied Matching Cut problem. The $d$-Cut problem has been studied as well, but a systematic study for special graph classes was lacking. We initiate such a study and consider classes of bounded diameter, bounded radius an…
▽ More
The $d$-Cut problem is to decide if a graph has an edge cut such that each vertex has at most $d$ neighbours at the opposite side of the cut. If $d=1$, we obtain the intensively studied Matching Cut problem. The $d$-Cut problem has been studied as well, but a systematic study for special graph classes was lacking. We initiate such a study and consider classes of bounded diameter, bounded radius and $H$-free graphs. We prove that for all $d\geq 2$, $d$-Cut is polynomial-time solvable for graphs of diameter $2$, $(P_3+P_4)$-free graphs and $P_5$-free graphs. These results extend known results for $d=1$. However, we also prove several NP-hardness results for $d$-Cut that contrast known polynomial-time results for $d=1$. Our results lead to full dichotomies for bounded diameter and bounded radius and to almost-complete dichotomies for $H$-free graphs.
△ Less
Submitted 29 May, 2025; v1 submitted 17 April, 2024;
originally announced April 2024.
-
Peak Time-Windowed Risk Estimation of Stochastic Processes
Authors:
Jared Miller,
Niklas Schmid,
Matteo Tacchi,
Didier Henrion,
Roy S. Smith
Abstract:
This paper develops a method to upper-bound extreme-values of time-windowed risks for stochastic processes. Examples of such risks include the maximum average or 90% quantile of the current along a transmission line in any 5-minute window. This work casts the time-windowed risk analysis problem as an infinite-dimensional linear program in occupation measures. In particular, we employ the coherent…
▽ More
This paper develops a method to upper-bound extreme-values of time-windowed risks for stochastic processes. Examples of such risks include the maximum average or 90% quantile of the current along a transmission line in any 5-minute window. This work casts the time-windowed risk analysis problem as an infinite-dimensional linear program in occupation measures. In particular, we employ the coherent risk measures of the mean and the expected shortfall (conditional value at risk) to define the maximal time-windowed risk along trajectories. The infinite-dimensional linear program must then be truncated into finite-dimensional optimization problems, such as by using the moment-sum of squares hierarchy of semidefinite programs. The infinite-dimensional linear program will have the same optimal value as the original nonconvex risk estimation task under compactness and regularity assumptions, and the sequence of semidefinite programs will converge to the true value under additional properties of algebraic characterization. The scheme is demonstrated for risk analysis of example stochastic processes.
△ Less
Submitted 11 April, 2024; v1 submitted 10 April, 2024;
originally announced April 2024.
-
Finite Sample Frequency Domain Identification
Authors:
Anastasios Tsiamis,
Mohamed Abdalmoaty,
Roy S. Smith,
John Lygeros
Abstract:
We study non-parametric frequency-domain system identification from a finite-sample perspective. We assume an open loop scenario where the excitation input is periodic and consider the Empirical Transfer Function Estimate (ETFE), where the goal is to estimate the frequency response at certain desired (evenly-spaced) frequencies, given input-output samples. We show that under sub-Gaussian colored n…
▽ More
We study non-parametric frequency-domain system identification from a finite-sample perspective. We assume an open loop scenario where the excitation input is periodic and consider the Empirical Transfer Function Estimate (ETFE), where the goal is to estimate the frequency response at certain desired (evenly-spaced) frequencies, given input-output samples. We show that under sub-Gaussian colored noise (in time-domain) and stability assumptions, the ETFE estimates are concentrated around the true values. The error rate is of the order of $\mathcal{O}((d_{\mathrm{u}}+\sqrt{d_{\mathrm{u}}d_{\mathrm{y}}})\sqrt{M/N_{\mathrm{tot}}})$, where $N_{\mathrm{tot}}$ is the total number of samples, $M$ is the number of desired frequencies, and $d_{\mathrm{u}},\,d_{\mathrm{y}}$ are the dimensions of the input and output signals respectively. This rate remains valid for general irrational transfer functions and does not require a finite order state-space representation. By tuning $M$, we obtain a $N_{\mathrm{tot}}^{-1/3}$ finite-sample rate for learning the frequency response over all frequencies in the $ \mathcal{H}_{\infty}$ norm. Our result draws upon an extension of the Hanson-Wright inequality to semi-infinite matrices. We study the finite-sample behavior of ETFE in simulations.
△ Less
Submitted 5 September, 2024; v1 submitted 1 April, 2024;
originally announced April 2024.
-
Frequency-Domain Identification of Discrete-Time Systems using Sum-of-Rational Optimization
Authors:
Mohamed Abdalmoaty,
Jared Miller,
Mingzhou Yin,
Roy S. Smith
Abstract:
We propose a computationally tractable method for the identification of stable canonical discrete-time rational transfer function models, using frequency domain data. The problem is formulated as a global non-convex optimization problem whose objective function is the sum of weighted squared residuals at each observed frequency datapoint. Stability is enforced using a polynomial matrix inequality…
▽ More
We propose a computationally tractable method for the identification of stable canonical discrete-time rational transfer function models, using frequency domain data. The problem is formulated as a global non-convex optimization problem whose objective function is the sum of weighted squared residuals at each observed frequency datapoint. Stability is enforced using a polynomial matrix inequality constraint. The problem is solved globally by a moment-sum-of-squares hierarchy of semidefinite programs through a framework for sum-of-rational-functions optimization. Convergence of the moment-sum-of-squares program is guaranteed as the bound on the degree of the sum-of-squares polynomials approaches infinity. The performance of the proposed method is demonstrated using numerical simulation examples.
△ Less
Submitted 25 December, 2023;
originally announced December 2023.
-
Minimizing Robot Digging Times to Retrieve Bins in Robotic-Based Compact Storage and Retrieval Systems
Authors:
Anni Yue,
Stephen L. Smith
Abstract:
Robotic-based compact storage and retrieval systems provide high-density storage in distribution center and warehouse applications. In the system, items are stored in bins, and the bins are organized inside a three-dimensional grid. Robots move on top of the grid to retrieve and deliver bins. To retrieve a bin, a robot removes all bins above one by one with its gripper, called bin digging. The clo…
▽ More
Robotic-based compact storage and retrieval systems provide high-density storage in distribution center and warehouse applications. In the system, items are stored in bins, and the bins are organized inside a three-dimensional grid. Robots move on top of the grid to retrieve and deliver bins. To retrieve a bin, a robot removes all bins above one by one with its gripper, called bin digging. The closer the target bin is to the top of the grid, the less digging is required to retrieve the bin. In this paper, we propose a policy to optimally arrange the bins in the grid while processing bin requests so that the most frequently accessed bins remain near the top of the grid. This improves the performance of the system and makes it responsive to changes in bin demand. Our solution approach identifies the optimal bin arrangement in the storage facility, initiates a transition to this optimal set-up, and subsequently ensures the ongoing maintenance of this arrangement for optimal performance. We perform extensive simulations on a custom-built discrete event model of the system. Our simulation results show that under the proposed policy more than half of the bins requested are located on top of the grid, reducing bin digging compared to existing policies. Compared to existing approaches, the proposed policy reduces the retrieval time of the requested bins by over 30% and the number of bin requests that exceed certain time thresholds by nearly 50%.
△ Less
Submitted 8 December, 2023;
originally announced December 2023.
-
A transform pair for bounded convex planar domains
Authors:
Jesse Hulse,
Loredana Lanzani,
Stefan Llewellyn Smith,
Elena Luca
Abstract:
A new transform pair which can be used to solve mixed boundary value problems for Laplace's equation and the complex Helmholtz equation in bounded convex planar domains is presented. This work is an extension of Crowdy (2015, CMFT, 15, 655--687) where new transform techniques were developed for boundary value problems for Laplace's equation in circular domains. The key ingredient of the method is…
▽ More
A new transform pair which can be used to solve mixed boundary value problems for Laplace's equation and the complex Helmholtz equation in bounded convex planar domains is presented. This work is an extension of Crowdy (2015, CMFT, 15, 655--687) where new transform techniques were developed for boundary value problems for Laplace's equation in circular domains. The key ingredient of the method is the analysis of the so called global relation which provides a coupling of integral transforms of the given boundary data and of the unknown boundary values. Three problems which involve mixed boundary conditions are solved in detail, as well as numerically implemented, to illustrate how to apply the new approach.
△ Less
Submitted 1 December, 2023;
originally announced December 2023.
-
Closed-Loop Identification of Stabilized Models Using Dual Input-Output Parameterization
Authors:
Ran Chen,
Amber Srivastava,
Mingzhou Yin,
Roy S. Smith
Abstract:
This paper introduces a dual input-output parameterization (dual IOP) for the identification of linear time-invariant systems from closed-loop data. It draws inspiration from the recent input-output parameterization developed to synthesize a stabilizing controller. The controller is parameterized in terms of closed-loop transfer functions, from the external disturbances to the input and output of…
▽ More
This paper introduces a dual input-output parameterization (dual IOP) for the identification of linear time-invariant systems from closed-loop data. It draws inspiration from the recent input-output parameterization developed to synthesize a stabilizing controller. The controller is parameterized in terms of closed-loop transfer functions, from the external disturbances to the input and output of the system, constrained to lie in a given subspace. Analogously, the dual IOP method parameterizes the unknown plant with analogous closed-loop transfer functions, also referred to as dual parameters. In this case, these closed-loop transfer functions are constrained to lie in an affine subspace guaranteeing that the identified plant is \emph{stabilized} by the known controller. Compared with existing closed-loop identification techniques guaranteeing closed-loop stability, such as the dual Youla parameterization, the dual IOP neither requires a doubly-coprime factorization of the controller nor a nominal plant that is stabilized by the controller. The dual IOP does not depend on the order and the state-space realization of the controller either, as in the dual system-level parameterization. Simulation shows that the dual IOP outperforms the existing benchmark methods.
△ Less
Submitted 15 November, 2023;
originally announced November 2023.
-
Peak Estimation of Rational Systems using Convex Optimization
Authors:
Jared Miller,
Roy S. Smith
Abstract:
This paper presents algorithms that upper-bound the peak value of a state function along trajectories of a continuous-time system with rational dynamics. The finite-dimensional but nonconvex peak estimation problem is cast as a convex infinite-dimensional linear program in occupation measures. This infinite-dimensional program is then truncated into finite-dimensions using the moment-Sum-of-Square…
▽ More
This paper presents algorithms that upper-bound the peak value of a state function along trajectories of a continuous-time system with rational dynamics. The finite-dimensional but nonconvex peak estimation problem is cast as a convex infinite-dimensional linear program in occupation measures. This infinite-dimensional program is then truncated into finite-dimensions using the moment-Sum-of-Squares (SOS) hierarchy of semidefinite programs. Prior work on treating rational dynamics using the moment-SOS approach involves clearing dynamics to common denominators or adding lifting variables to handle reciprocal terms under new equality constraints. Our solution method uses a sum-of-rational method based on absolute continuity of measures. The Moment-SOS truncations of our program possess lower computational complexity and (empirically demonstrated) higher accuracy of upper bounds on example systems as compared to prior approaches.
△ Less
Submitted 25 March, 2024; v1 submitted 14 November, 2023;
originally announced November 2023.
-
Cutting Feedback in Misspecified Copula Models
Authors:
Michael Stanley Smith,
Weichang Yu,
David J. Nott,
David Frazier
Abstract:
In copula models the marginal distributions and copula function are specified separately. We treat these as two modules in a modular Bayesian inference framework, and propose conducting modified Bayesian inference by "cutting feedback". Cutting feedback limits the influence of potentially misspecified modules in posterior inference. We consider two types of cuts. The first limits the influence of…
▽ More
In copula models the marginal distributions and copula function are specified separately. We treat these as two modules in a modular Bayesian inference framework, and propose conducting modified Bayesian inference by "cutting feedback". Cutting feedback limits the influence of potentially misspecified modules in posterior inference. We consider two types of cuts. The first limits the influence of a misspecified copula on inference for the marginals, which is a Bayesian analogue of the popular Inference for Margins (IFM) estimator. The second limits the influence of misspecified marginals on inference for the copula parameters by using a pseudo likelihood of the ranks to define the cut model. We establish that if only one of the modules is misspecified, then the appropriate cut posterior gives accurate uncertainty quantification asymptotically for the parameters in the other module. Computation of the cut posteriors is difficult, and new variational inference methods to do so are proposed. The efficacy of the new methodology is demonstrated using both simulated data and a substantive multivariate time series application from macroeconomic forecasting. In the latter, cutting feedback from misspecified marginals to a 1096 dimension copula improves posterior inference and predictive accuracy greatly, compared to conventional Bayesian inference.
△ Less
Submitted 27 June, 2024; v1 submitted 5 October, 2023;
originally announced October 2023.
-
An introduction to the local-to-global behaviour of groups acting on trees and the theory of local action diagrams
Authors:
Colin D. Reid,
Simon M. Smith
Abstract:
The primary tool for analysing groups acting on trees is Bass--Serre Theory. It is comprised of two parts: a decomposition result, in which an action is decomposed via a graph of groups, and a construction result, in which graphs of groups are used to build examples of groups acting on trees. The usefulness of the latter for constructing new examples of `large' (e.g. nondiscrete) groups acting on…
▽ More
The primary tool for analysing groups acting on trees is Bass--Serre Theory. It is comprised of two parts: a decomposition result, in which an action is decomposed via a graph of groups, and a construction result, in which graphs of groups are used to build examples of groups acting on trees. The usefulness of the latter for constructing new examples of `large' (e.g. nondiscrete) groups acting on trees is severely limited. There is a pressing need for new examples of such groups as they play an important role in the theory of locally compact groups. An alternative `local-to-global' approach to the study of groups acting on trees has recently emerged, inspired by a paper of Marc Burger and Shahar Mozes, based on groups that are `universal' with respect to some specified `local' action. In recent work, the authors of this survey article have developed a general theory of universal groups of local actions, that behaves, in many respects, like Bass--Serre Theory. We call this the theory of local action diagrams. The theory is powerful enough to completely describe all closed groups of automorphisms of trees that enjoy Tits' Independence Property (P).
This article is an introductory survey of the local-to-global behaviour of groups acting on trees and the theory of local action diagrams. The article contains many ideas for future research projects.
△ Less
Submitted 10 September, 2023;
originally announced September 2023.
-
Complexity Framework for Forbidden Subgraphs IV: The Steiner Forest Problem
Authors:
Hans L. Bodlaender,
Matthew Johnson,
Barnaby Martin,
Jelle J. Oostveen,
Sukanya Pandey,
Daniel Paulusma,
Siani Smith,
Erik Jan van Leeuwen
Abstract:
We study Steiner Forest on $H$-subgraph-free graphs, that is, graphs that do not contain some fixed graph $H$ as a (not necessarily induced) subgraph. We are motivated by a recent framework that completely characterizes the complexity of many problems on $H$-subgraph-free graphs. However, in contrast to e.g. the related Steiner Tree problem, Steiner Forest falls outside this framework. Hence, the…
▽ More
We study Steiner Forest on $H$-subgraph-free graphs, that is, graphs that do not contain some fixed graph $H$ as a (not necessarily induced) subgraph. We are motivated by a recent framework that completely characterizes the complexity of many problems on $H$-subgraph-free graphs. However, in contrast to e.g. the related Steiner Tree problem, Steiner Forest falls outside this framework. Hence, the complexity of Steiner Forest on $H$-subgraph-free graphs remained tantalizingly open. In this paper, we make significant progress towards determining the complexity of Steiner Forest on $H$-subgraph-free graphs. Our main results are four novel polynomial-time algorithms for different excluded graphs $H$ that are central to further understand its complexity. Along the way, we study the complexity of Steiner Forest for graphs with a small $c$-deletion set, that is, a small set $S$ of vertices such that each component of $G-S$ has size at most $c$. Using this parameter, we give two noteworthy algorithms that we later employ as subroutines. First, we prove Steiner Forest is FPT parameterized by $|S|$ when $c=1$ (i.e. the vertex cover number). Second, we prove Steiner Forest is polynomial-time solvable for graphs with a 2-deletion set of size at most 2. The latter result is tight, as the problem is NP-complete for graphs with a 3-deletion set of size 2.
△ Less
Submitted 15 October, 2023; v1 submitted 2 May, 2023;
originally announced May 2023.
-
Complexity Framework for Forbidden Subgraphs III: When Problems are Tractable on Subcubic Graphs
Authors:
Matthew Johnson,
Barnaby Martin,
Sukanya Pandey,
Daniël Paulusma,
Siani Smith,
Erik Jan van Leeuwen
Abstract:
For any finite set $\mathcal{H} = \{H_1,\ldots,H_p\}$ of graphs, a graph is $\mathcal{H}$-subgraph-free if it does not contain any of $H_1,\ldots,H_p$ as a subgraph. In recent work, meta-classifications have been studied: these show that if graph problems satisfy certain prescribed conditions, their complexity is determined on classes of $\mathcal{H}$-subgraph-free graphs. We continue this work an…
▽ More
For any finite set $\mathcal{H} = \{H_1,\ldots,H_p\}$ of graphs, a graph is $\mathcal{H}$-subgraph-free if it does not contain any of $H_1,\ldots,H_p$ as a subgraph. In recent work, meta-classifications have been studied: these show that if graph problems satisfy certain prescribed conditions, their complexity is determined on classes of $\mathcal{H}$-subgraph-free graphs. We continue this work and focus on problems that have polynomial-time solutions on classes that have bounded treewidth or maximum degree at most~$3$ and examine their complexity on $H$-subgraph-free graph classes where $H$ is a connected graph. With this approach, we obtain comprehensive classifications for (Independent) Feedback Vertex Set, Connected Vertex Cover, Colouring and Matching Cut. This resolves a number of open problems.
We highlight that, to establish that Independent Feedback Vertex Set belongs to this collection of problems, we first show that it can be solved in polynomial time on graphs of maximum degree $3$. We demonstrate that, with the exception of the complete graph on four vertices, each graph in this class has a minimum size feedback vertex set that is also an independent set.
△ Less
Submitted 1 May, 2023;
originally announced May 2023.
-
A Unified Approach to Optimally Solving Sensor Scheduling and Sensor Selection Problems in Kalman Filtering
Authors:
Shamak Dutta,
Nils Wilde,
Stephen L. Smith
Abstract:
We consider a general form of the sensor scheduling problem for state estimation of linear dynamical systems, which involves selecting sensors that minimize the trace of the Kalman filter error covariance (weighted by a positive semidefinite matrix) subject to polyhedral constraints on the selected sensors. This general form captures several well-studied problems including sensor placement, sensor…
▽ More
We consider a general form of the sensor scheduling problem for state estimation of linear dynamical systems, which involves selecting sensors that minimize the trace of the Kalman filter error covariance (weighted by a positive semidefinite matrix) subject to polyhedral constraints on the selected sensors. This general form captures several well-studied problems including sensor placement, sensor scheduling with budget constraints, and Linear Quadratic Gaussian (LQG) control and sensing co-design. We present a mixed integer optimization approach that is derived by exploiting the optimality of the Kalman filter. While existing work has focused on approximate methods to specific problem variants, our work provides a unified approach to computing optimal solutions to the general version of sensor scheduling. In simulation, we show this approach finds optimal solutions for systems with 30 to 50 states in seconds.
△ Less
Submitted 11 December, 2023; v1 submitted 5 April, 2023;
originally announced April 2023.
-
A Dual System-Level Parameterization for Identification from Closed-Loop Data
Authors:
Amber Srivastava,
Mingzhou Yin,
Andrea Iannelli,
Roy S. Smith
Abstract:
This work presents a dual system-level parameterization (D-SLP) method for closed-loop system identification. The recent system-level synthesis framework parameterizes all stabilizing controllers via linear constraints on closed-loop response functions, known as system-level parameters. It was demonstrated that several structural, locality, and communication constraints on the controller can be po…
▽ More
This work presents a dual system-level parameterization (D-SLP) method for closed-loop system identification. The recent system-level synthesis framework parameterizes all stabilizing controllers via linear constraints on closed-loop response functions, known as system-level parameters. It was demonstrated that several structural, locality, and communication constraints on the controller can be posed as convex constraints on these system-level parameters. In the current work, the identification problem is treated as a {\em dual} of the system-level synthesis problem. The plant model is identified from the dual system-level parameters associated to the plant. In comparison to existing closed-loop identification approaches (such as the dual-Youla parameterization), the D-SLP framework neither requires the knowledge of a nominal plant that is stabilized by the known controller, nor depends upon the choice of factorization of the nominal plant and the stabilizing controller. Numerical simulations demonstrate the efficacy of the proposed D-SLP method in terms of identification errors, compared to existing closed-loop identification techniques.
△ Less
Submitted 5 April, 2023;
originally announced April 2023.
-
Quantitative Measurement of Cyber Resilience: Modeling and Experimentation
Authors:
Michael J. Weisman,
Alexander Kott,
Jason E. Ellis,
Brian J. Murphy,
Travis W. Parker,
Sidney Smith,
Joachim Vandekerckhove
Abstract:
Cyber resilience is the ability of a system to resist and recover from a cyber attack, thereby restoring the system's functionality. Effective design and development of a cyber resilient system requires experimental methods and tools for quantitative measuring of cyber resilience. This paper describes an experimental method and test bed for obtaining resilience-relevant data as a system (in our ca…
▽ More
Cyber resilience is the ability of a system to resist and recover from a cyber attack, thereby restoring the system's functionality. Effective design and development of a cyber resilient system requires experimental methods and tools for quantitative measuring of cyber resilience. This paper describes an experimental method and test bed for obtaining resilience-relevant data as a system (in our case -- a truck) traverses its route, in repeatable, systematic experiments. We model a truck equipped with an autonomous cyber-defense system and which also includes inherent physical resilience features. When attacked by malware, this ensemble of cyber-physical features (i.e., "bonware") strives to resist and recover from the performance degradation caused by the malware's attack. We propose parsimonious mathematical models to aid in quantifying systems' resilience to cyber attacks. Using the models, we identify quantitative characteristics obtainable from experimental data, and show that these characteristics can serve as useful quantitative measures of cyber resilience.
△ Less
Submitted 29 December, 2024; v1 submitted 28 March, 2023;
originally announced March 2023.
-
Once upon a time step: A closed-loop approach to robust MPC design
Authors:
Anilkumar Parsi,
Marcell Bartos,
Amber Srivastava,
Sebastien Gros,
Roy S. Smith
Abstract:
A novel perspective on the design of robust model predictive control (MPC) methods is presented, whereby closed-loop constraint satisfaction is ensured using recursive feasibility of the MPC optimization. Necessary and sufficient conditions are derived for recursive feasibility, based on the effects of model perturbations and disturbances occurring at one time step. Using these conditions and Fark…
▽ More
A novel perspective on the design of robust model predictive control (MPC) methods is presented, whereby closed-loop constraint satisfaction is ensured using recursive feasibility of the MPC optimization. Necessary and sufficient conditions are derived for recursive feasibility, based on the effects of model perturbations and disturbances occurring at one time step. Using these conditions and Farkas' lemma, sufficient conditions suitable for design are formulated. The proposed method is called a closed-loop design, as only the existence of feasible inputs at the next time step is enforced by design. This is in contrast to most existing formulations, which compute control policies that are feasible under the worst-case realizations of all model perturbations and exogenous disturbances in the MPC prediction horizon. The proposed method has an online computational complexity similar to nominal MPC methods while preserving guarantees of constraint satisfaction, recursive feasibility and stability. Numerical simulations demonstrate the efficacy of our proposed approach.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
Diagonally Square Root Integrable Kernels in System Identification
Authors:
Mohammad Khosravi,
Roy S. Smith
Abstract:
In recent years, the reproducing kernel Hilbert space (RKHS) theory has played a crucial role in linear system identification. The core of a RKHS is the associated kernel characterizing its properties. Accordingly, this work studies the class of diagonally square root integrable (DSRI) kernels. We demonstrate that various well-known stable kernels introduced in system identification belong to this…
▽ More
In recent years, the reproducing kernel Hilbert space (RKHS) theory has played a crucial role in linear system identification. The core of a RKHS is the associated kernel characterizing its properties. Accordingly, this work studies the class of diagonally square root integrable (DSRI) kernels. We demonstrate that various well-known stable kernels introduced in system identification belong to this category. Moreover, it is shown that any DSRI kernel is also stable and integrable. We look into certain topological features of the RKHSs associated with DSRI kernels, particularly the continuity of linear operators defined on the respective RKHSs. For the stability of a Gaussian process centered at a stable impulse response, we show that the necessary and sufficient condition is the diagonally square root integrability of the corresponding kernel. Furthermore, we elaborate on this result by providing proper interpretations.
△ Less
Submitted 24 February, 2023;
originally announced February 2023.
-
Extending Grundy domination to $k$-Grundy domination
Authors:
Rebekah Herrman,
Stephen G. Z. Smith
Abstract:
The Grundy domination number of a graph $G = (V,E)$ is the length of the longest sequence of unique vertices $S = (v_1, \ldots, v_k)$ satisfying $N[v_i] \setminus \cup_{j=1}^{i-1}N[v_j] \neq \emptyset$ for each $i \in [k]$. Recently, a generalization of this concept called $k$-Grundy domination was introduced. In $k$-Grundy domination, a vertex $v$ can be included in $S$ if it has a neighbor $u$ s…
▽ More
The Grundy domination number of a graph $G = (V,E)$ is the length of the longest sequence of unique vertices $S = (v_1, \ldots, v_k)$ satisfying $N[v_i] \setminus \cup_{j=1}^{i-1}N[v_j] \neq \emptyset$ for each $i \in [k]$. Recently, a generalization of this concept called $k$-Grundy domination was introduced. In $k$-Grundy domination, a vertex $v$ can be included in $S$ if it has a neighbor $u$ such that $u$ appears in the closed neighborhood of fewer than $k$ vertices of $S$. In this paper, we determine the $k$-Grundy domination number for some families of graphs, find degree-based bounds for the $k$-$L$-Grundy domination number, and define a relationship between the $k$-$Z$-Grundy domination number and the $k$-forcing number of a graph.
△ Less
Submitted 19 December, 2022;
originally announced December 2022.
-
A Proof of the Grundy domination strong product conjecture
Authors:
Rebekah Herrman,
Stephen G. Z. Smith
Abstract:
The Grundy domination number of a simple graph $G = (V,E)$ is the length of the longest sequence of unique vertices $S = (v_1, \ldots, v_k)$, $v_i \in V$, that satisfies the property $N[v_i] \setminus \cup_{j=1}^{i-1}N[v_j] \neq \emptyset$ for each $i \in [k]$. Here, $N(v) = \{u : uv \in E\}$ and $N[v] = N(v) \cup \{v\}$. In this note, we prove a recent conjecture about the Grundy domination numbe…
▽ More
The Grundy domination number of a simple graph $G = (V,E)$ is the length of the longest sequence of unique vertices $S = (v_1, \ldots, v_k)$, $v_i \in V$, that satisfies the property $N[v_i] \setminus \cup_{j=1}^{i-1}N[v_j] \neq \emptyset$ for each $i \in [k]$. Here, $N(v) = \{u : uv \in E\}$ and $N[v] = N(v) \cup \{v\}$. In this note, we prove a recent conjecture about the Grundy domination number of the strong product of two graphs. We then discuss how this result relates to the zero forcing number of the strong product of graphs.
△ Less
Submitted 12 January, 2023; v1 submitted 8 December, 2022;
originally announced December 2022.
-
Dual adaptive MPC using an exact set-membership reformulation
Authors:
Anilkumar Parsi,
Diyou Liu,
Andrea Iannelli,
Roy S. Smith
Abstract:
Adaptive model predictive control (MPC) methods using set-membership identification to reduce parameter uncertainty are considered in this work. Strong duality is used to reformulate the set-membership equations exactly within the MPC optimization. A predicted worst-case cost is then used to enable performance-oriented exploration. The proposed approach guarantees robust constraint satisfaction an…
▽ More
Adaptive model predictive control (MPC) methods using set-membership identification to reduce parameter uncertainty are considered in this work. Strong duality is used to reformulate the set-membership equations exactly within the MPC optimization. A predicted worst-case cost is then used to enable performance-oriented exploration. The proposed approach guarantees robust constraint satisfaction and recursive feasibility. It is shown that method can be implemented using homothetic tube and flexible tube parameterizations of state tubes, and a simulation study demonstrates performance improvement over state-of-the-art controllers.
△ Less
Submitted 29 November, 2022;
originally announced November 2022.
-
Complexity Framework for Forbidden Subgraphs II: Edge Subdivision and the "H"-graphs
Authors:
Vadim Lozin,
Barnaby Martin,
Sukanya Pandey,
Daniel Paulusma,
Mark Siggers,
Siani Smith,
Erik Jan van Leeuwen
Abstract:
For a fixed set ${\cal H}$ of graphs, a graph $G$ is ${\cal H}$-subgraph-free if $G$ does not contain any $H \in {\cal H}$ as a (not necessarily induced) subgraph. A recently proposed framework gives a complete classification on ${\cal H}$-subgraph-free graphs (for finite sets ${\cal H}$) for problems that are solvable in polynomial time on graph classes of bounded treewidth, NP-complete on subcub…
▽ More
For a fixed set ${\cal H}$ of graphs, a graph $G$ is ${\cal H}$-subgraph-free if $G$ does not contain any $H \in {\cal H}$ as a (not necessarily induced) subgraph. A recently proposed framework gives a complete classification on ${\cal H}$-subgraph-free graphs (for finite sets ${\cal H}$) for problems that are solvable in polynomial time on graph classes of bounded treewidth, NP-complete on subcubic graphs, and whose NP-hardness is preserved under edge subdivision. While a lot of problems satisfy these conditions, there are also many problems that do not satisfy all three conditions and for which the complexity in ${\cal H}$-subgraph-free graphs is unknown. We study problems for which only the first two conditions of the framework hold (they are solvable in polynomial time on classes of bounded treewidth and NP-complete on subcubic graphs, but NP-hardness is not preserved under edge subdivision). In particular, we make inroads into the classification of the complexity of four such problems: Hamilton Cycle, $k$-Induced Disjoint Paths, $C_5$-Colouring and Star $3$-Colouring. Although we do not complete the classifications, we show that the boundary between polynomial time and NP-complete differs among our problems and also from problems that do satisfy all three conditions of the framework, in particular when we forbid certain subdivisions of the ``H''-graph (the graph that looks like the letter ``H''). Hence, we exhibit a rich complexity landscape among problems for ${\cal H}$-subgraph-free graph classes.
△ Less
Submitted 4 May, 2024; v1 submitted 25 November, 2022;
originally announced November 2022.
-
Complexity Framework For Forbidden Subgraphs I: The Framework
Authors:
Matthew Johnson,
Barnaby Martin,
Jelle J. Oostveen,
Sukanya Pandey,
Daniël Paulusma,
Siani Smith,
Erik Jan van Leeuwen
Abstract:
For any particular class of graphs, algorithms for computational problems restricted to the class often rely on structural properties that depend on the specific problem at hand. This begs the question if a large set of such results can be explained by some common problem conditions. We propose such conditions for $HH$-subgraph-free graphs. For a set of graphs $HH$, a graph $G$ is $HH$-subgraph-fr…
▽ More
For any particular class of graphs, algorithms for computational problems restricted to the class often rely on structural properties that depend on the specific problem at hand. This begs the question if a large set of such results can be explained by some common problem conditions. We propose such conditions for $HH$-subgraph-free graphs. For a set of graphs $HH$, a graph $G$ is $HH$-subgraph-free if $G$ does not contain any of graph from $H$ as a subgraph. Our conditions are easy to state. A graph problem must be efficiently solvable on graphs of bounded treewidth, computationally hard on subcubic graphs, and computational hardness must be preserved under edge subdivision of subcubic graphs. Our meta-classification says that if a graph problem satisfies all three conditions, then for every finite set $HH$, it is ``efficiently solvable'' on $HH$-subgraph-free graphs if $HH$ contains a disjoint union of one or more paths and subdivided claws, and is ``computationally hard'' otherwise. We illustrate the broad applicability of our meta-classification by obtaining a dichotomy between polynomial-time solvability and NP-completeness for many well-known partitioning, covering and packing problems, network design problems and width parameter problems. For other problems, we obtain a dichotomy between almost-linear-time solvability and having no subquadratic-time algorithm (conditioned on some hardness hypotheses). The proposed framework thus gives a simple pathway to determine the complexity of graph problems on $HH$-subgraph-free graphs. This is confirmed even more by the fact that along the way, we uncover and resolve several open questions from the literature.
△ Less
Submitted 20 July, 2023; v1 submitted 23 November, 2022;
originally announced November 2022.
-
The symplectic leaves for the elliptic Poisson bracket on projective space defined by Feigin-Odesskii and Polishchuk
Authors:
Alexandru Chirvasitu,
Ryo Kanda,
S. Paul Smith
Abstract:
This paper determines the symplectic leaves for a remarkable Poisson structure on $\mathbb{C}\mathbb{P}^{n-1}$ discovered by Feigin and Odesskii, and, independently, by Polishchuk. The Poisson bracket is determined by a holomorphic line bundle of degree $n \ge 3$ on a compact Riemann surface of genus one or, equivalently, by an elliptic normal curve $E\subseteq\mathbb{C}\mathbb{P}^{n-1}$. The symp…
▽ More
This paper determines the symplectic leaves for a remarkable Poisson structure on $\mathbb{C}\mathbb{P}^{n-1}$ discovered by Feigin and Odesskii, and, independently, by Polishchuk. The Poisson bracket is determined by a holomorphic line bundle of degree $n \ge 3$ on a compact Riemann surface of genus one or, equivalently, by an elliptic normal curve $E\subseteq\mathbb{C}\mathbb{P}^{n-1}$. The symplectic leaves are described in terms of higher secant varieties to $E$.
△ Less
Submitted 11 December, 2023; v1 submitted 24 October, 2022;
originally announced October 2022.
-
Online Feedback Equilibrium Seeking
Authors:
Giuseppe Belgioioso,
Dominic Liao-McPherson,
Mathias Hudoba de Badyn,
Saverio Bolognani,
Roy S. Smith,
John Lygeros,
Florian Dörfler
Abstract:
This paper proposes a unifying design framework for dynamic feedback controllers that track solution trajectories of time-varying generalized equations, such as local minimizers of nonlinear programs or competitive equilibria (e.g., Nash) of non-cooperative games. Inspired by the feedback optimization paradigm, the core idea of the proposed approach is to re-purpose classic iterative algorithms fo…
▽ More
This paper proposes a unifying design framework for dynamic feedback controllers that track solution trajectories of time-varying generalized equations, such as local minimizers of nonlinear programs or competitive equilibria (e.g., Nash) of non-cooperative games. Inspired by the feedback optimization paradigm, the core idea of the proposed approach is to re-purpose classic iterative algorithms for solving generalized equations (e.g., Josephy--Newton, forward-backward splitting) as dynamic feedback controllers by integrating online measurements of the continuous-time nonlinear plant. Sufficient conditions for closed-loop stability and robustness of the algorithm-plant cyber-physical interconnection are derived in a sampled-data setting by combining and tailoring results from (monotone) operator, fixed-point, and nonlinear systems theory. Numerical simulations on smart building automation and competitive supply-chain management are presented to support the theoretical findings.
△ Less
Submitted 14 February, 2024; v1 submitted 21 October, 2022;
originally announced October 2022.
-
The structuring effect of a Gottlieb element on the Sullivan minimal model of a space
Authors:
Gregory Lupton,
Samuel Bruce Smith
Abstract:
We show a Gottlieb element in the rational homotopy of a simply connected space $X$ implies a structural result for the Sullivan minimal model, with different results depending on parity. In the even-degree case, we prove a rational Gottlieb element is a terminal homotopy element. This fact allows us to complete an argument of Dupont to prove an even-degree Gottlieb element gives a free factor in…
▽ More
We show a Gottlieb element in the rational homotopy of a simply connected space $X$ implies a structural result for the Sullivan minimal model, with different results depending on parity. In the even-degree case, we prove a rational Gottlieb element is a terminal homotopy element. This fact allows us to complete an argument of Dupont to prove an even-degree Gottlieb element gives a free factor in the rational cohomology of a formal space of finite type. We apply the odd-degree result to affirm a special case of the $2N$-conjecture on Gottlieb elements of a finite complex. We combine our results to make a contribution to the realization problem for the classifying space $B\mathrm{aut}_1(X)$. We prove a simply connected space $X$ satisfying $B\mathrm{aut}_1(X_{\mathbb{Q}}) \simeq S_{\mathbb{Q}}^{2n}$ must have infinite-dimensional rational homotopy and vanishing rational Gottlieb elements above degree $2n-1$ for $n= 1, 2, 3.$
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
Some results on Quillen's Conjecture via equivalent-poset techniques
Authors:
Kevin I. Piterman,
Stephen D. Smith
Abstract:
We extend the Main Theorem of Aschbacher and Smith on Quillen's Conjecture from $p>5$ to the remaining odd primes $p = 3,5$. In the process, we develop further combinatorial and homotopical methods for studying the poset of nontrivial elementary abelian $p$-subgroups of a finite group. The techniques lead to a number of further results on the Conjecture, often reducing dependence on the CFSG; in p…
▽ More
We extend the Main Theorem of Aschbacher and Smith on Quillen's Conjecture from $p>5$ to the remaining odd primes $p = 3,5$. In the process, we develop further combinatorial and homotopical methods for studying the poset of nontrivial elementary abelian $p$-subgroups of a finite group. The techniques lead to a number of further results on the Conjecture, often reducing dependence on the CFSG; in particular, we also provide some partial results toward the case of $p=2$.
△ Less
Submitted 27 April, 2022;
originally announced April 2022.
-
The Existence and Uniqueness of Solutions for Kernel-Based System Identification
Authors:
Mohammad Khosravi,
Roy S. Smith
Abstract:
The notion of reproducing kernel Hilbert space (RKHS) has emerged in system identification during the past decade. In the resulting framework, the impulse response estimation problem is formulated as a regularized optimization defined on an infinite-dimensional RKHS consisting of stable impulse responses. The consequent estimation problem is well-defined under the central assumption that the convo…
▽ More
The notion of reproducing kernel Hilbert space (RKHS) has emerged in system identification during the past decade. In the resulting framework, the impulse response estimation problem is formulated as a regularized optimization defined on an infinite-dimensional RKHS consisting of stable impulse responses. The consequent estimation problem is well-defined under the central assumption that the convolution operators restricted to the RKHS are continuous linear functionals. Moreover, according to this assumption, the representer theorem hold, and therefore, the impulse response can be estimated by solving a finite-dimensional program. Thus, the continuity feature plays a significant role in kernel-based system identification. This paper shows that this central assumption is guaranteed to be satisfied in considerably general situations, namely when the kernel is an integrable function and the input signal is bounded. Furthermore, the strong convexity of the optimization problem and the continuity property of the convolution operators imply that the kernel-based system identification admits a unique solution. Consequently, it follows that kernel-based system identification is a well-defined approach.
△ Less
Submitted 17 April, 2022;
originally announced April 2022.
-
Computationally efficient robust MPC using optimized constraint tightening
Authors:
Anilkumar Parsi,
Panagiotis Anagnostaras,
Andrea Iannelli,
Roy S. Smith
Abstract:
A robust model predictive control (MPC) method is presented for linear, time-invariant systems affected by bounded additive disturbances. The main contribution is the offline design of a disturbance-affine feedback gain whereby the resulting constraint tightening is minimized. This is achieved by formulating the constraint tightening problem as a convex optimization problem with the feedback term…
▽ More
A robust model predictive control (MPC) method is presented for linear, time-invariant systems affected by bounded additive disturbances. The main contribution is the offline design of a disturbance-affine feedback gain whereby the resulting constraint tightening is minimized. This is achieved by formulating the constraint tightening problem as a convex optimization problem with the feedback term as a variable. The resulting MPC controller has the computational complexity of nominal MPC, and guarantees recursive feasibility, stability and constraint satisfaction. The advantages of the proposed approach compared to existing robust MPC methods are demonstrated using numerical examples.
△ Less
Submitted 15 November, 2022; v1 submitted 5 April, 2022;
originally announced April 2022.
-
Scalable tube model predictive control of uncertain linear systems using ellipsoidal sets
Authors:
Anilkumar Parsi,
Andrea Iannelli,
Roy S. Smith
Abstract:
This work proposes a novel robust model predictive control (MPC) algorithm for linear systems affected by dynamic model uncertainty and exogenous disturbances. The uncertainty is modeled using a linear fractional perturbation structure with a time-varying perturbation matrix, enabling the algorithm to be applied to a large model class. The MPC controller constructs a state tube as a sequence of pa…
▽ More
This work proposes a novel robust model predictive control (MPC) algorithm for linear systems affected by dynamic model uncertainty and exogenous disturbances. The uncertainty is modeled using a linear fractional perturbation structure with a time-varying perturbation matrix, enabling the algorithm to be applied to a large model class. The MPC controller constructs a state tube as a sequence of parameterized ellipsoidal sets to bound the state trajectories of the system. The proposed approach results in a semidefinite program to be solved online, whose size scales linearly with the order of the system. The design of the state tube is formulated as an offline optimization problem, which offers flexibility to impose desirable features such as robust invariance on the terminal set. This contrasts with most existing tube MPC strategies using polytopic sets in the state tube, which are difficult to design and whose complexity grows combinatorially with the system order. The algorithm guarantees constraint satisfaction, recursive feasibility, and stability of the closed loop. The advantages of the algorithm are demonstrated using two simulation studies.
△ Less
Submitted 9 June, 2022; v1 submitted 5 April, 2022;
originally announced April 2022.
-
An Improved Greedy Algorithm for Subset Selection in Linear Estimation
Authors:
Shamak Dutta,
Nils Wilde,
Stephen L. Smith
Abstract:
In this paper, we consider a subset selection problem in a spatial field where we seek to find a set of k locations whose observations provide the best estimate of the field value at a finite set of prediction locations. The measurements can be taken at any location in the continuous field, and the covariance between the field values at different points is given by the widely used squared exponent…
▽ More
In this paper, we consider a subset selection problem in a spatial field where we seek to find a set of k locations whose observations provide the best estimate of the field value at a finite set of prediction locations. The measurements can be taken at any location in the continuous field, and the covariance between the field values at different points is given by the widely used squared exponential covariance function. One approach for observation selection is to perform a grid discretization of the space and obtain an approximate solution using the greedy algorithm. The solution quality improves with a finer grid resolution but at the cost of increased computation. We propose a method to reduce the computational complexity, or conversely to increase solution quality, of the greedy algorithm by considering a search space consisting only of prediction locations and centroids of cliques formed by the prediction locations. We demonstrate the effectiveness of our proposed approach in simulation, both in terms of solution quality and runtime.
△ Less
Submitted 30 March, 2022;
originally announced March 2022.
-
Few Induced Disjoint Paths for $H$-Free Graphs
Authors:
Barnaby Martin,
Daniël Paulusma,
Siani Smith,
Erik Jan van Leeuwen
Abstract:
Paths $P^1,\ldots,P^k$ in a graph $G=(V,E)$ are mutually induced if any two distinct $P^i$ and $P^j$ have neither common vertices nor adjacent vertices. For a fixed integer $k$, the $k$-Induced Disjoint Paths problem is to decide if a graph $G$ with $k$ pairs of specified vertices $(s_i,t_i)$ contains $k$ mutually induced paths $P^i$ such that each $P^i$ starts from $s_i$ and ends at $t_i$. Wherea…
▽ More
Paths $P^1,\ldots,P^k$ in a graph $G=(V,E)$ are mutually induced if any two distinct $P^i$ and $P^j$ have neither common vertices nor adjacent vertices. For a fixed integer $k$, the $k$-Induced Disjoint Paths problem is to decide if a graph $G$ with $k$ pairs of specified vertices $(s_i,t_i)$ contains $k$ mutually induced paths $P^i$ such that each $P^i$ starts from $s_i$ and ends at $t_i$. Whereas the non-induced version is well-known to be polynomial-time solvable for every fixed integer $k$, a classical result from the literature states that even $2$-Induced Disjoint Paths is NP-complete. We prove new complexity results for $k$-Induced Disjoint Paths if the input is restricted to $H$-free graphs, that is, graphs without a fixed graph $H$ as an induced subgraph. We compare our results with a complexity dichotomy for Induced Disjoint Paths, the variant where $k$ is part of the input.
△ Less
Submitted 13 June, 2022; v1 submitted 7 March, 2022;
originally announced March 2022.
-
Induced Disjoint Paths and Connected Subgraphs for $H$-Free Graphs
Authors:
Barnaby Martin,
Daniël Paulusma,
Siani Smith,
Erik Jan van Leeuwen
Abstract:
Paths $P_1,\ldots, P_k$ in a graph $G=(V,E)$ are mutually induced if any two distinct $P_i$ and $P_j$ have neither common vertices nor adjacent vertices. The Induced Disjoint Paths problem is to decide if a graph $G$ with $k$ pairs of specified vertices $(s_i,t_i)$ contains $k$ mutually induced paths $P_i$ such that each $P_i$ starts from $s_i$ and ends at $t_i$. This is a classical graph problem…
▽ More
Paths $P_1,\ldots, P_k$ in a graph $G=(V,E)$ are mutually induced if any two distinct $P_i$ and $P_j$ have neither common vertices nor adjacent vertices. The Induced Disjoint Paths problem is to decide if a graph $G$ with $k$ pairs of specified vertices $(s_i,t_i)$ contains $k$ mutually induced paths $P_i$ such that each $P_i$ starts from $s_i$ and ends at $t_i$. This is a classical graph problem that is NP-complete even for $k=2$. We introduce a natural generalization, Induced Disjoint Connected Subgraphs: instead of connecting pairs of terminals, we must connect sets of terminals. We give almost-complete dichotomies of the computational complexity of both problems for H-free graphs, that is, graphs that do not contain some fixed graph H as an induced subgraph. Finally, we give a complete classification of the complexity of the second problem if the number k of terminal sets is fixed, that is, not part of the input.
△ Less
Submitted 17 July, 2022; v1 submitted 23 February, 2022;
originally announced February 2022.
-
An explicit dual control approach for constrained reference tracking of uncertain linear systems
Authors:
Anilkumar Parsi,
Andrea Iannelli,
Roy S. Smith
Abstract:
A finite horizon optimal tracking problem is considered for linear dynamical systems subject to parametric uncertainties in the state-space matrices and exogenous disturbances. A suboptimal solution is proposed using a model predictive control (MPC) based explicit dual control approach which enables active uncertainty learning. A novel algorithm for the design of robustly invariant online terminal…
▽ More
A finite horizon optimal tracking problem is considered for linear dynamical systems subject to parametric uncertainties in the state-space matrices and exogenous disturbances. A suboptimal solution is proposed using a model predictive control (MPC) based explicit dual control approach which enables active uncertainty learning. A novel algorithm for the design of robustly invariant online terminal sets and terminal controllers is presented. Set membership identification is used to update the parameter uncertainty online. A predicted worst-case cost is used in the MPC optimization problem to model the dual effect of the control input. The cost-to-go is estimated using contractivity of the proposed terminal set and the remaining time horizon, so that the optimizer can estimate future benefits of exploration. The proposed dual control algorithm ensures robust constraint satisfaction and recursive feasibility, and navigates the exploration-exploitation trade-off using a robust performance metric.
△ Less
Submitted 4 February, 2022;
originally announced February 2022.
-
A new derivation of the finite $N$ master loop equation for lattice Yang-Mills
Authors:
Hao Shen,
Scott A. Smith,
Rongchan Zhu
Abstract:
We give a new derivation of the finite $N$ master loop equation for lattice Yang-Mills theory with structure group $SO(N)$, $U(N)$ or $SU(N)$. The $SO(N)$ case was initially proved by Chatterjee in \cite{Cha}, and $SU(N)$ was analyzed in a follow-up work by Jafarov \cite{Jafar}. Our approach is based on the Langevin dynamic, an SDE on the manifold of configurations, and yields a simple proof via I…
▽ More
We give a new derivation of the finite $N$ master loop equation for lattice Yang-Mills theory with structure group $SO(N)$, $U(N)$ or $SU(N)$. The $SO(N)$ case was initially proved by Chatterjee in \cite{Cha}, and $SU(N)$ was analyzed in a follow-up work by Jafarov \cite{Jafar}. Our approach is based on the Langevin dynamic, an SDE on the manifold of configurations, and yields a simple proof via Itô's formula.
△ Less
Submitted 5 February, 2024; v1 submitted 2 February, 2022;
originally announced February 2022.
-
Submodular Maximization with Limited Function Access
Authors:
Andrew Downie,
Bahman Gharesifard,
Stephen L. Smith
Abstract:
We consider a class of submodular maximization problems in which decision-makers have limited access to the objective function. We explore scenarios where the decision-maker can observe only pairwise information, i.e., can evaluate the objective function on sets of size two. We begin with a negative result that no algorithm using only $k$-wise information can guarantee performance better than…
▽ More
We consider a class of submodular maximization problems in which decision-makers have limited access to the objective function. We explore scenarios where the decision-maker can observe only pairwise information, i.e., can evaluate the objective function on sets of size two. We begin with a negative result that no algorithm using only $k$-wise information can guarantee performance better than $k/n$. We present two algorithms that utilize only pairwise information about the function and characterize their performance relative to the optimal, which depends on the curvature of the submodular function. Additionally, if the submodular function possess a property called supermodularity of conditioning, then we can provide a method to bound the performance based purely on pairwise information. The proposed algorithms offer significant computational speedups over a traditional greedy strategy. A by-product of our study is the introduction of two new notions of curvature, the $k$-Marginal Curvature and the $k$-Cardinality Curvature. Finally, we present experiments highlighting the performance of our proposed algorithms in terms of approximation and time complexity.
△ Less
Submitted 7 February, 2022; v1 submitted 3 January, 2022;
originally announced January 2022.
-
Topological Entropy of Surface Braids and Maximally Efficient Mixing
Authors:
Spencer A. Smith,
Sierra Dunn
Abstract:
The deep connections between braids and dynamics by way of the Nielsen-Thurston classification theorem have led to a wide range of practical applications. Braids have been used to detect coherent structures and mixing regions in oceanic flows, drive the design of industrial mixing machines, contextualize the evolution of taffy pullers, and characterize the chaotic motion of topological defects in…
▽ More
The deep connections between braids and dynamics by way of the Nielsen-Thurston classification theorem have led to a wide range of practical applications. Braids have been used to detect coherent structures and mixing regions in oceanic flows, drive the design of industrial mixing machines, contextualize the evolution of taffy pullers, and characterize the chaotic motion of topological defects in active nematics. Mixing plays a central role in each of these examples, and the braids naturally associated with each system come equipped with a useful measure of mixing efficiency, the topological entropy per operation (TEPO). This motivates the following questions. What is the maximum mixing efficiency for braids, and what braids realize this? The answer depends on how we define braids. For the standard Artin presentation, well-known braids with mixing efficiencies related to the golden and silver ratios have been proven to be maximal. However, it is fruitful to consider surface braids, a natural generalization of braids, with presentations constructed from Artin-like braid generators on embedded graphs. In this work, we introduce an efficient and elegant algorithm for finding the topological entropy and TEPO of surface braids on any pairing of orientable surface and planar embeddable graph. Of the myriad possible graphs and surfaces, graphs that can be embedded in $\mathbb{R}^2$ as a lattice are a simple, highly symmetric choice, and the braids that result more naturally model the motion of points on the plane. We extensively search for a maximum mixing efficiency braid on planar lattice graphs and examine a novel candidate braid, which we conjecture to have this maximal property.
△ Less
Submitted 10 December, 2021;
originally announced December 2021.
-
Phase transitions, logarithmic Sobolev inequalities, and uniform-in-time propagation of chaos for weakly interacting diffusions
Authors:
Matías G. Delgadino,
Rishabh S. Gvalani,
Grigorios A. Pavliotis,
Scott A. Smith
Abstract:
In this article, we study the mean field limit of weakly interacting diffusions for confining and interaction potentials that are not necessarily convex. We explore the relationship between the large $N$ limit of the constant in the logarithmic Sobolev inequality (LSI) for the $N$-particle system and the presence or absence of phase transitions for the mean field limit. The non-degeneracy of the L…
▽ More
In this article, we study the mean field limit of weakly interacting diffusions for confining and interaction potentials that are not necessarily convex. We explore the relationship between the large $N$ limit of the constant in the logarithmic Sobolev inequality (LSI) for the $N$-particle system and the presence or absence of phase transitions for the mean field limit. The non-degeneracy of the LSI constant is shown to have far reaching consequences, especially in the context of uniform-in-time propagation of chaos and the behaviour of equilibrium fluctuations. Our results extend previous results related to unbounded spin systems and recent results on propagation of chaos using novel coupling methods. As incidentals, we provide concise and, to our knowledge, new proofs of a generalised form of Talagrand's inequality and of quantitative propagation of chaos by employing techniques from the theory of gradient flows, specifically the Riemannian calculus on the space of probability measures.
△ Less
Submitted 12 December, 2021;
originally announced December 2021.
-
Colouring Generalized Claw-Free Graphs and Graphs of Large Girth: Bounding the Diameter
Authors:
Barnaby Martin,
Daniel Paulusma,
Siani Smith
Abstract:
For a fixed integer, the $k$-Colouring problem is to decide if the vertices of a graph can be coloured with at most $k$ colours for an integer $k$, such that no two adjacent vertices are coloured alike. A graph $G$ is $H$-free if $G$ does not contain $H$ as an induced subgraph. It is known that for all $k\geq 3$, the $k$-Colouring problem is NP-complete for $H$-free graphs if $H$ contains an induc…
▽ More
For a fixed integer, the $k$-Colouring problem is to decide if the vertices of a graph can be coloured with at most $k$ colours for an integer $k$, such that no two adjacent vertices are coloured alike. A graph $G$ is $H$-free if $G$ does not contain $H$ as an induced subgraph. It is known that for all $k\geq 3$, the $k$-Colouring problem is NP-complete for $H$-free graphs if $H$ contains an induced claw or cycle. The case where $H$ contains a cycle follows from the known result that the problem is NP-complete even for graphs of arbitrarily large fixed girth. We examine to what extent the situation may change if in addition the input graph has bounded diameter.
△ Less
Submitted 23 November, 2021;
originally announced November 2021.
-
Kernel-Based Identification with Frequency Domain Side-Information
Authors:
Mohammad Khosravi,
Roy S. Smith
Abstract:
In this paper, we discuss the problem of system identification when frequency domain side information is available on the system. Initially, we consider the case where the prior knowledge is provided as being the $\Hcal_{\infty}$-norm of the system bounded by a given scalar. This framework provides the opportunity of considering various forms of side information such as the dissipativity of the sy…
▽ More
In this paper, we discuss the problem of system identification when frequency domain side information is available on the system. Initially, we consider the case where the prior knowledge is provided as being the $\Hcal_{\infty}$-norm of the system bounded by a given scalar. This framework provides the opportunity of considering various forms of side information such as the dissipativity of the system as well as other forms of frequency domain prior knowledge. We propose a nonparametric identification method for estimating the impulse response of the system under the given side information. The estimation problem is formulated as an optimization in a reproducing kernel Hilbert space (RKHS) endowed with a stable kernel. The corresponding objective function consists of a term for minimizing the fitting error, and a regularization term defined based on the norm of the impulse response in the employed RKHS. To guarantee the desired frequency domain features defined based on the prior knowledge, suitable constraints are imposed on the estimation problem. The resulting optimization has an infinite-dimensional feasible set with an infinite number of constraints. We show that this problem is a well-defined convex program with a unique solution. We propose a heuristic that tightly approximates this unique solution. The proposed approach is equivalent to solving a finite-dimensional convex quadratically constrained quadratic program. The efficiency of the discussed method is verified by several numerical examples.
△ Less
Submitted 5 November, 2022; v1 submitted 31 October, 2021;
originally announced November 2021.
-
Kernel-based Impulse Response Identification with Side-Information on Steady-State Gain
Authors:
Mohammad Khosravi,
Roy S. Smith
Abstract:
In this paper, we consider the problem of system identification when side-information is available on the steady-state (or DC) gain of the system. We formulate a general nonparametric identification method as an infinite-dimensional constrained convex program over the reproducing kernel Hilbert space (RKHS) of stable impulse responses. The objective function of this optimization problem is the emp…
▽ More
In this paper, we consider the problem of system identification when side-information is available on the steady-state (or DC) gain of the system. We formulate a general nonparametric identification method as an infinite-dimensional constrained convex program over the reproducing kernel Hilbert space (RKHS) of stable impulse responses. The objective function of this optimization problem is the empirical loss regularized with the norm of RKHS, and the constraint is considered for enforcing the integration of the steady-state gain side-information. The proposed formulation addresses both the discrete-time and continuous-time cases. We show that this program has a unique solution obtained by solving an equivalent finite-dimensional convex optimization. This solution has a closed-form when the empirical loss and regularization functions are quadratic and exact side-information is considered. We perform extensive numerical comparisons to verify the efficiency of the proposed identification methodology.
△ Less
Submitted 5 November, 2022; v1 submitted 31 October, 2021;
originally announced November 2021.
-
Regularized Identification with Internal Positivity Side-Information
Authors:
Mohammad Khosravi,
Roy S. Smith
Abstract:
In this paper, we present an impulse response identification scheme that incorporates the internal positivity side-information of the system. The realization theory of positive systems establishes specific criteria for the existence of a positive realization for a given transfer function. These transfer function criteria are translated to a set of suitable conditions on the shape and structure of…
▽ More
In this paper, we present an impulse response identification scheme that incorporates the internal positivity side-information of the system. The realization theory of positive systems establishes specific criteria for the existence of a positive realization for a given transfer function. These transfer function criteria are translated to a set of suitable conditions on the shape and structure of the impulse responses of positive systems. Utilizing these conditions, the impulse response estimation problem is formulated as a constrained optimization in a reproducing kernel Hilbert space equipped with a stable kernel, and suitable constraints are imposed to encode the internal positivity side-information. The optimization problem is infinite-dimensional with an infinite number of constraints. An equivalent finite-dimensional convex optimization in the form of a convex quadratic program is derived. The resulting equivalent reformulation makes the proposed approach suitable for numerical simulation and practical implementation. A Monte Carlo numerical experiment evaluates the impact of incorporating the internal positivity side-information in the proposed identification scheme. The effectiveness of the proposed method is demonstrated using data from a heating system experiment.
△ Less
Submitted 31 October, 2021;
originally announced November 2021.