This disclosure relates to controlling dynamical systems with a bounded probability of failure and, more particularly, relates to systems and methods for implementing such control.
Controlling dynamical systems in uncertain environments is a fundamental and essential problem in several fields, ranging from robotics, to healthcare, to management, to science, to economics and to finance. Given a system with dynamics described, for example, by a controlled diffusion process, a stochastic optimal control problem is to find an optimal feedback policy to optimize an objective function. Risk management has always been an important part of stochastic optimal control problems to guarantee or optimize the likelihood of safety during the execution of control policies. For instance, in self-driving car applications, it is desirable that autonomous cars depart from origins to reach destinations with minimum energy and at the same time maintain bounded probability of collision. Ensuring such performance is critical before deploying autonomous cars in real life.
In one aspect, a computer-based method controls a dynamical system in an uncertain environment within a bounded probability of failure. The dynamical system has a state space and a control space. The method includes diffusing a risk constraint corresponding to the bounded probability of failure into a martingale that represents a level of risk tolerance associated with the dynamical system over time. The state space and the control space of the dynamical system are augmented with the martingale to create an augmented model with an augmented state space and an augmented control space. The method may include iteratively constructing one or more Markov Decision Processes (MDPs), with each iterative MDP represents an incrementally refined model of the dynamical system. The method further includes computing a first solution based on the augmented model or, if additional time was available, based on one of the MDP iterations.
Computer-based systems and non-transitory, computer-readable medium that stores instructions executable by a computer-based processor to perform implementations of this method are disclosed as well.
In some implementations, one or more of the following advantages are present.
Real-time, efficient, and highly effective control can be provided to a dynamical system operating in an uncertain environment to maintain a bounded probability of failure.
Other features and advantages will be apparent from the description and drawings, and from the claims.
Like reference characters may refer to like elements.
The dynamical system 102 can represent virtually any kind of system that can be represented with a state space and a control space that evolve over time. In general, a state space includes all (or a large number) of the possible states that the dynamical system 102 can experience and a control space includes all (or a large number) of the possible control variable values for controlling the dynamical system 102. In exemplary embodiments, the dynamical system 102 can represent an autonomous or semi-autonomous car (e.g., one with autonomous parking functionality). In that example, the state space might include all of the possible locations, speeds, accelerations, etc. of the car and the control space might include all of the possible control inputs (e.g., go faster, slow down, turn left, turn right, stop, etc.) for the car.
Other examples of dynamical systems include unmanned aerial vehicles, aircraft flight controllers, robotic motion planning and control systems, robotic manipulator control systems, steerable needles, robotic surgical systems, high frequency trading and algorithmic hedge fund platforms, or the like.
In general, the computer-based controller 104 is adapted to control the dynamical system 102. It can do so within a bounded probability of failure, even in the presence of disturbances that may arise, for example, as a result of operating in the uncertain environment. As discussed herein, the computer-based controller 104 accomplishes this, with the assistance of the computer-based processing system 106, in a high-speed, resource-efficient manner that is particularly well-suited to be applied in uncertain environments with disturbances that may require a rapid, yet sufficiently accurate response. Moreover, the computer-based controller 104 accomplishes this, with the assistance of the computer-based processing system 106 while maintaining the probability of failure of the dynamical system 102 within certain boundaries.
The concept of failure in the dynamical system 102 can be defined in a number of ways. According to one definition, a failure occurs in the dynamical system any time that the dynamical system enters some state that is deemed unacceptable (e.g., by a human observer). For example, in the robotics industry, a dynamical system (e.g., a semiautonomous car) may be considered to have failed if the semiautonomous car has collided with an obstacle (e.g., a street sign or a parked car). As another example, in the financial industry, a dynamical system (e.g., a financial portfolio) may be considered to have failed if the financial value of the financial portfolio has fallen below some minimally acceptable threshold. Bounding the probability of these kinds of failures generally helps to ensure safe and desirable operation of different types of dynamical system 102.
There are a number of possible disturbances that could arise, particularly in an uncertain environment that could, at least potentially, result in some kind of failure in a dynamical system. Some examples include: (i) an imperfect car engine that could disrupt the car's ability to operate precisely in accordance with a particular control input, (ii) a rough driving road that could disrupt a car's ability to operate precisely in accordance with a particular control input, or (iii) a volatile financial market condition that could disturb the ability of financial software to perform in accordance with its intended functionality. When facing these types of disturbances, the performance of a dynamical system can become quite random, potentially resulting in a failure. It is generally desirable to minimize this randomness and, if possible, bounding the probability of a failure in some way, that may be, for example, in accordance with specifications provided by a human system operator or the like. In a typical implementation, the computer-based controller 104, with assistance from the computer-based processing system 106, is adapted to control the dynamical system in a manner that will maintain the probability of failure for the dynamical system 102 within any such boundaries.
At a very high level, the computer-based controller 104 and computer-based processing system 106 provide control over the dynamical system 102 by constructing a model of the dynamical system 102 based on a variety of information about the dynamical system 102 itself, about a human operator's operating instructions for the dynamical system 102, about a risk constraint that represents a bounded probability of failure for the dynamical system 102, and/or about the environment within which the dynamical system 102 is operating. As described herein, the computer-based controller 104 and computer-based processing system 106 iteratively refine the system model based, among other things, on additional information provided to the computer-based controller 104 and computer-based processing system 106, as it becomes available. The computer-based controller 104 and computer-based processing system 106 periodically return control signals based on the latest iteration of the system model.
In general, the illustrated computer-based processing system 106 is configured to execute and/or facilitate one or more of the system functionalities described herein. More particularly, the illustrated computer-based processing system 106 is configured to perform the processing functionality described herein and return control signals, as appropriate, to the computer-based controller 104.
The illustrated computer-based processing system 106 has a processor 202, a storage device 204, a memory 206 having software 208 stored therein that, when executed by the processor, causes the processor to perform or facilitate one or more of the functionalities described herein, input and output (I/O) devices 210 (or peripherals), and a local bus, or local interface 212 allowing for communication within the controller 104. The local interface 212 can be, for example, one or more buses or other wired or wireless connections. The controller 104 may include other elements not specifically shown in the illustrated implementation. These can include, for example, controllers, buffers (caches), drivers, repeaters, receivers, etc. Furthermore, the local interface 212 can include address, control, and/or data connections to enable appropriate communications among the illustrated components.
The illustrated processor 202 is a hardware device for executing software, particularly that stored in the memory 206, and for performing processing in accordance with the software. The processor 202 can be any custom made or commercially available processor. It can be a single core or multi-core processor, a central processing unit (CPU), an auxiliary processor among several processors, a combination of discrete processors associated with the present controller 104, a semiconductor based microprocessor (in the form of a microchip or chip set), a macroprocessor, or generally any device for executing software instructions and/or processing data.
The illustrated memory 206 is a hardware device as well and can be virtually any type of computer-based memory. Examples include any one or combination of volatile memory elements (e.g., random access memory (RAM, such as DRAM, SRAM, SDRAM, etc.)) or nonvolatile memory elements (e.g., ROM, hard drive, tape, CDROM, etc.). Moreover, the memory 206 can incorporate electronic, magnetic, optical, and/or other types of storage media. The memory 206 can have a distributed architecture, where various components are situated remotely from one another, but can be accessed by the processor 202.
In general, the software 208 defines various aspects of the controller 104 functionality. The software 208 in the memory 206 may include one or more separate programs, each of which containing an ordered listing of executable instructions for implementing functionality associated with the controller 104, as described herein. The memory 206 may host an operating system (O/S) 520, which would generally control the execution of one or more programs within the controller 104 and provide scheduling, input-output control, file and data management, memory management, communication control, and related services.
The I/O devices 210 can include one or more of virtually any kind of computer-based input or output (I/O) devices. Examples of I/O devices include a keyboard, mouse, scanner, microphone, printer, display, etc. The I/O devices 210 may include one or more devices that communicate via both inputs and outputs, for instance a modulator/demodulator (modem; for accessing another device, system, or network), a radio frequency (RF) or other transceiver, a telephonic interface, a bridge, a router, or other device. In some implementations, certain human users having administrative privileges may access and perform administrative functions associated with the controller 104 through one or more of the I/O devices 210.
In general, when the controller 104 is in operation, the processor 202 executes the software 208 stored within the memory 206, communicates data to and from the memory 206, and generally controls operations of the controller 104 pursuant to the software 208 and the O/S.
According to the illustrated method, the computer-based processing system 106 receives data (at 302).
The data received can include any type of data that may help the computer-based processing system 106 perform its intended functionalities (e.g., providing control signals to the computer-based controller 104). In a typical implementation, the data that is received at step 302 is used by the computer-based controller 104 and the computer-based processing system 106, as described herein, to understand the dynamical system 102, its environment and the desired performance goals for operating within that environment. As described herein, the computer-based controller 104 and computer-based processing system 106 use this information to efficiently and effectively control the dynamical system 102.
Examples of the kind of data received (at step 302) include data describing the dynamical system itself, data describing the uncertain environment in which the dynamical system is operating, data describing a desired outcome for the dynamical system as specified by a human, data describing noise associated with the dynamical system, data associated with current conditions (e.g., location) of the dynamical system within its operating environment, data describing desired performance metrics (e.g., minimizing energy consumption, achieving shortest time to destination, etc.) for the dynamical system in moving toward the desired outcome, which may have been specified by a human, data regarding a bounded probability of failure for the dynamical system 102, etc.
In a typical implementation, the data regarding the bounded probability of failure that is received at step 302 essentially delimits the maximum acceptable likelihood that the dynamical system will experience some kind of failure.
In a typical implementation, some of the data received at step 302 will have been pre-programmed into the computer-based processing system 106 and stored in memory, for example, by the manufacturer or a system programmer, and some of the data received at step 302 (e.g., the data describing the desired outcome for the dynamical system) will have been entered by a human system operator in real time (i.e., as the dynamical system 102 is operating or is about to operate).
One type of data received (at step 302) is data regarding a bounded probability of failure for the dynamical system 102. According to the illustrated method, the computer-based processing system 106 diffuses (at 304) a risk constraint that corresponds to the bounded probability of failure associated with the dynamical system into a martingale that represents a level of risk tolerance associated with the dynamical system over time. In a typical implementation, the risk constraint would be either equal to or directly related to the data received at step 302 regarding the bounded probability of failure for the dynamical system 102. In general, a martingale is a sequence of random variables x1, x2, . . . , where the conditional expected value of xn+1 given x1, x2, . . . , xn, equals xn.
Next, according to the illustrated method, the computer-based processing system 106 augments (at step 306) the state space and the control space in a model of the dynamical system 102 with the martingale. This creates an augmented model for the dynamical system that has an augmented state space and an augmented control space. In essence, creating the augmented model transforms controlling the dynamical system from a risk-constrained problem into a stochastic target problem.
Then, the computer-based processing system 106 determines (at step 308) whether a control signal should be sent to the computer-based controller 104 immediately or not. There are a variety of ways that the computer-based processing system 106 can make this determination. For example, in some applications, the computer-based processing system 106 includes a timer and determines whether the computer-based controller 104 needs a control signal by referring to a passage of time (e.g., since a previous control signal was sent). In other applications, the computer-based controller 104 indicates to the computer-based processing system 106 when a control signal is needed. Other techniques for determining whether a control signal should be sent to the computer-based controller 104 immediately or not are possible.
If the computer-based processing system 106 determines (at step 308) that a control signal should be sent to the computer-based controller 104 immediately, then the computer-based processing system 106 (at step 310) returns a control signal based on the augmented model of the dynamical system. Returning the control signal (at step 310) at this point, would generally involve computing a solution based on the augmented model of the dynamical system 102. In a typical implementation, computing the solution utilizes a rapidly-exploring sampling technique and approximating Markov chains.
According to the illustrated process, the computer-based controller 104 then uses the control signal (at step 312) to control the dynamical system 102. Controlling the dynamical system 102 can include causing a change of some sort to occur in the dynamical system, typically, a change that will likely move the dynamical system toward a desired final state. If, for example, the dynamical system 102 is a semi-autonomous car and the desired final state is for the semi-autonomous car to be parked in a specific parking space, then controlling the dynamical system 102 may include causing the steering wheel of the semi-autonomous car to move in a specific manner to help the semi-autonomous car to advance into the parking space. As another example, if the dynamical system is a steerable needle and the desired final state is for the needle to be positioned at a particular location inside a human patient, then controlling the dynamical system 102 may include causing the steerable needle to advance through part of the patient toward the particular location.
After controlling the dynamical system (at step 312), in the illustrated process, the computer-based processor 106 considers (at step 314) whether the dynamical system 102 has reached the desired final state (e.g., is the semi-autonomous car parked in the parking space? is the steerable needle at the particular location inside the human patient?).
If the computer-based processor 106 determines (at step 312) that the dynamical system 102 has reached the desired final state, the computer-based processor 106 enters (at step 316) a standby state, essentially awaiting further instructions (e.g., from a human user) or input (e.g., about the dynamical system 102 or the environment that the dynamical system 102 is operating in) that requires some kind of further response.
If the computer-based processor 106 determines (at step 314) that the dynamical system 102 has not reached the desired final state, the computer-based processor returns to step 308 and again determines whether a control signal should be sent to the computer-based controller 104 immediately (i.e., without further delay by the computer-based processor 106) or not. If the computer-based processor determines (at step 308) that a control signal should be sent to the computer-based processor immediately, then the computer-based processor 106 once again returns (at step 312) a control signal to the computer-based controller 104 based on the augmented model of the dynamical system 102.
If the computer-based processor 106 determines (at step 308) that a control signal need not be sent to the computer-based controller 104 immediately, then the computer-based processor 106 proceeds to step 318 and iteratively constructs one or more Markov Decision Processes (MDPs). Each iterative MDP represents an incrementally refined model of the dynamical system, relative to the augmented model and any of the previously-constructed MDP iterations.
Constructing the MDP at each one of the iterations typically includes sampling from an augmented state space associated with the augmented model or a previously-constructed one of the MDP iterations and computing one or more boundary values based on the sampling.
This iterative construction of incrementally refined MDPs continues until the computer-based processing system determines (at step 308) that a control signal should be sent to the computer-based controller 104 without further delay from the computer-based processor 106.
If (or when) the computer-based processing system 106 determines (at step 308) that a control signal should be sent to the computer-based controller 104, the computer-based processor 106 (at step 310) returns a control signal to the computer-based controller 104 based on one of the iterative MDPs (typically, the latest one of the iterative MDPs). Returning the control signal (at step 310) at this point, would generally involve computing a solution based on one of the iterative MDPs (e.g., the latest one). In a typical implementation, computing the solution utilizes a rapidly-exploring sampling technique and approximating Markov chains.
According to the illustrated process, the computer-based controller 104 then uses the control signal (at step 312) to control the dynamical system 102.
The following sections provide a formal definition of certain problems that the systems and techniques described herein help address and how the systems and techniques described herein address those problems. Like the rest of the detailed description, what follows is intended to be instructive and illustrative only, but not in any way limiting. In a typical implementation, the computer-based processing system 106 would perform processing according to and/or based on what is described herein.
Here, we present an exemplary generic stochastic optimal control formulation with definitions and technical assumptions. We also provide an exemplary explanation as to how to formulate risk constraints.
Stochastic Dynamics:
Let dx, du, and dw be positive integers. Let S be a compact subset of d
Suppose that a stochastic process {w(t); t≥0} is a dw-dimensional Brownian motion on some probability space. We define {t; t≥0} as the augmented filtration generated by the Brownian motion w(⋅). Let a control process {u(t); t≥0} be a U-valued, measurable random process also defined on the same probability space such that the pair (u(⋅), w(⋅)) is admissible. Let the set of all such control processes be U. Let d
dx(t)=f(x(t),u(t))dt+F(x(t),u(t))dw(t),∀t≥0 (1)
where f:S×U→d
Cost-to-go Function and Risk Constraints:
We define the first exit time Tuz:U×S→[0, +∞] under a control process u(⋅)∈U starting from x(0)=z∈S as
Tuz=inf{t:x(0)=z,x(t)∉So, and Eq.1}
In other words, Tuz is the first time that the trajectory of the dynamical system given by Eq. 1 starting from x(0)=z hits the boundary ∂S of S. The random variable Tuz can take value ∞ if the trajectory x(•) never exits So.
The expected cost-to-go function under a control process u(•) is a mapping from S to defined as:
Ju(z)=0z[∫0T
where tz denotes the conditional expectation given x(t)=z, and g:S×U→, h:S→ are bounded measurable and continuous functions, called the cost rate function and the terminal cost function, respectively, and α∈[0, 1) is the discount rate. We further assume that g(x, u) is uniformly Holder continuous in x with exponent 2ρ∈(0, 1] for all u∈U.
Let Γ⊂∂S be a set of failure states, and η∈[0, 1] be a threshold for risk tolerance given as a parameter. We consider a risk constraint that is specified for an initial state x(0)=z under a control process u(•) as follows:
Prob0z(x(Tuz)∈Γ≤η),
Where Probtz denotes the conditional probability at time t given x(t)=z. That is, controls that drive the system from time 0 until the first exit time must be consistent with the choice of η and initial state z at time 0. Intuitively, the constraint enforces that starting from a given state z at time t=0, if we execute a control process u(•) for N times, when N is very large, there are at most Nη executions resulting in failure. Control processes u(•) that satisfy this constraint are called time-consistent. In what follows, we also use P0z as the short form of Prob0z.
Let be the extended real number set. The optimal cost-to-go function J*:S→ is defined as follows
Typically, a control process u*(•) is called optimal if Ju*(z)=J*(z;η). Moreover, typically, for any ϵ>0, a control process u(•) is called an ϵ-optimal policy if |Ju(z)−J*(z; η)|<ϵ.
Typically, we refer to a sampling-based algorithm as being probabilistically sound if the probability that a solution returned by the algorithm is feasible approaches one as the number of samples increases. We also typically refer to a sampling-based algorithm as asymptotically-optimal if the sequence of solutions returned from the algorithm converges to an optimal solution in probability as the number of samples approaches infinity. Solutions returned from algorithms with such properties typically are called probabilistically-sound and asymptotically-optimal.
In general, we consider the problem of computing the optimal cost-to-go function J* and an optimal control process u* if obtainable. The approach, outlined herein approximates the optimal cost-to-go function and an algorithm that is both probabilistically-sound and asymptotically-optimal.
We now present a martingale approach that essentially transforms the considered risk-constrained problem into an equivalent stochastic target problem. The following lemma to diffuse risk constraints can be a tool for our transformation. In what follows, both notations 1(x(T
A. Diffusing Risk Constraints
Lemma 1 From x(0)=z, a control process u(•) is generally feasible if and only if there exists a square-integrable (but possibly unbounded) process c(•)∈d
Proof:
Assuming that there exists c(•) and q(•) as above, due to the martingale property of q(•), we have:
Prob0z(x(Tuz)∈Γ=[1x(T
Thus, u(•) is feasible.
Now, let u(•) be a feasible control policy. Set η0=Prob0z(x(Tuz)∈Γ. We note that η0≤η. We define the martingale:
Since
We now set
{circumflex over (q)}(t)=
then {circumflex over (q)}(t) is a martingale with {circumflex over (q)}(0)=
Now, we define τ=inf{t∈[0, Tuz]|{circumflex over (q)}(t)≥1}, which is a stopping time. Thus,
q(t)={circumflex over (q)}(t)1t≤τ+1t>τ,
as a stopped process of the martingale {circumflex over (q)}(t) at τ, is a martingale with values in [0,1] a.s.
If τ<Tuz, we have
1x(T
and if τ=Tuz, we have
Hence, q(⋅) also satisfies that 1x(T
The control process c(•) exists due to the martingale representation theorem, which yields dq(t)=cT(t)dw(t). We however note that c(t) is unbounded.
B. Stochastic Target Problem
Using the above lemma, we augment the original system dynamics with the martingale q(t) into the following form:
where (u(⋅), c(⋅)) is the control process of the above dynamics. The initial value of the new state is (x(0), q(0))=(z, η). We will refer to the augmented state space S×[0, 1] as
In the following reformulated problem, optimal control processes are Markov controls. Thus, let us now focus on the set of Markov controls that depend only on the current state, i.e., (u(t), c(t)) is a function only of (x(t), q(t)), for all t≥0. A function φ:
Jφ(z,η)=[∫0T
We therefore essentially transform the risk-constrained problem in Eqs. 3-4 into a stochastic target problem as follows:
The constraint in the above formulation specifies the relationship of random variables at the terminal time as target. In this formulation, we solve for feedback control policies φ for all (z, η)∈
What follows is a discussion on an exemplary way to remove the constraint in Eq. 8 by constructing its boundary and computing the boundary values.
C. Characterization and Boundary Conditions
The domain of the stochastic target problem is:
D={(z,η)∈
By the definition of the risk-constrained problem, we can see that if (z, η)∈D then (z, η′)∈D for any η<η′≤1. Thus, for each z∈S, we define
γ(z)=inf{η∈[0,1]|(z,η)∈D}, (9)
as the infimum of risk tolerance at z. Therefore, we also have:
Thus, the boundary of D is
∂D=S×{1}∪{(z,γ(z))|z∈S}∪{(z,η)|z∈∂S,η∈[γ(z),1]}. (11)
For states in {(z, η)|z∈∂S, η∈[γ(z), 1]}, the system stops on ∂S and takes terminal values according to h(⋅). Now, let η=1, we notice that J* (z, 1) is optimal cost-to-go from z for the stochastic optimal problem without the risk constraint:
An optimal control process that solves the optimization problem is given by a Markov policy μ*(⋅, 1)∈Π. We now define the failure probability function γ:S→[0, 1] under such an optimal policy μ*(⋅, 1) as follows:
γ(z)=[1Γ(x(Tμ*,z))],∀z∈S,
where Tμ*,z is the first exit time when the system follows the control policy μ*(⋅, 1) from the initial state z. By the definitions of γ and γ, we can recognize that γ(z)≥γ(z) for all z∈S.
Since following the policy μ*(⋅, 1) from an initial state z yields a failure probability γ(z), we infer that:
J*(z,1)=J*(z,γ(z)).
From the definition of the risk-constrained problem, we also have:
0≤η<η′≤1J*(z,η)≥J*(z,η′).
Thus, for any γ(z)<η<1, we have:
J*(z,1)≤J*(z,η)≤J*(z,γ(z)).
Combing equations above, we have:
∀η∈[γ(z),1]J*(z,η)=J*(z,1).
As a consequence, when we start from an initial state z with a risk threshold η that is at least γ(z), it is optimal to execute an optimal control policy of the corresponding unconstrained problem from the initial state z.
It also follows that reducing the risk tolerance from 1.0 along the controlled process cannot reduce the optimal cost-to-go function evaluated at (x(t), q(t)=1.0). Thus, we infer that for augmented states (x(t), q(t)) where q(t)=1.0, the optimal martingale control c*(t) is 0.
Now, under all admissible policies φ, we cannot obtain a failure probability for an initial state z that are lower than γ(z). Thus, it is clear that J*(z, η)=+∞ for all 0≤η<γ(z). The following lemma characterizes the optimal martingale control c* (t) for augmented states (x(t), q(t)=γ(x(t))).
Lemma 2 Given the problem definition as in Eqs. 3-4, when q(t)=γ(x(t)) and u(t) is chosen, we have:
Proof:
Using the geometric dynamic programming principle we have the following result, for all stopping time τ≥t, when q(t)=γ(x(t)), a feasible control policy φ∈Ψ satisfies q(τ)≥γ(x(τ)) almost surely.
We assume that γ(x) is a smooth function. Take τ=t+, under a feasible control policy φ, we have q(t+)≥γ(x(t+)) a.s. for all t, and hence dq(t)≥dγ(x(t)) a.s. By It{circumflex over ( )}o lemma, we derive the following relationship:
For the above inequality to hold almost surely, the coefficient of dw(t) should be 0. This leads to Eq. 12.
In addition, if a control process that solves Eq. 10 is obtainable, say uγ, then we have J*(z, γ(z))=Juγ(z). We henceforth denote J*(z, γ (z)) as Jγ (z). We also emphasize that when (x(t), q(t)) is inside the interior Do of D, usual dynamic programming principle holds.
Here, we briefly overview an exemplary Markov chain approximation technique. We then present an exemplary extended iMDP algorithm that incrementally constructs the boundary conditions and computes solutions to our problem. In particular, we sample in the original state space S to compute J*(z, 1), γ(z), γ(z) as in Eq. 10 and Jγ(z). Concurrently, we also sample in the augmented state space
A. Markov Chain Approximation
An exemplary discrete-state Markov decision process (MDP) is a tuple M=(X, A, P, G, H) where X is a finite set of states, A is a set of actions that is possibly a continuous space, P(⋅|⋅, ⋅):X×X×A→≥0 is the transition probability function, G(⋅, ⋅):X×A→ is an immediate cost function, and H:X→ is a terminal cost function. From an initial state ξ0, under a sequence of controls {vi; i∈}, the induced trajectory {ξi; i∈} is generated by following the transition probability function P.
On the state space S, we want to approximate J*(z, 1), γ(z) and γ(z), and it is suffice to consider optimal Markov controls. The Markov chain approximation method approximates the continuous dynamics in Eq. 1 using a sequence of MDPs {Mn=(Sn, U, Pn, Gn, Hn)}η=0∞ and a sequence of holding times {Δtn}η=0∞ that are locally consistent. In particular, we construct G(z, v)=g(z, v)Δtn(z), Hn(z)=h(z) for each z∈Sn and v∈U. Also, limn→∞su∥Δξin∥2=0 where Ωn is the sample space of n, Δξin=ξi+1n−ξin, and
One of the main ideas of the Markov chain approximation approach for solving the original continuous problem is to solve a sequence of control problems defined on {n}n=0∞ as follows. A Markov or feedback policy μn is a function that maps each state z∈Sn to a control μn(z)∈U. The set of all such policies is Πn. We define tin=Σ0i−1Δtn(ξin) for i≥1 and t0n=0. Given a policy μn that approximates a Markov control process u(⋅) in Eq. 2, the corresponding cost-to-go due to μn on n is:
where P
The optimal cost-to-go function Jn*:S→ that approximates J*(z, 1) is denoted as
An optimal policy, denoted by μn*, satisfies Jn,μ
γn(z)=Pn[1Γ(ξI
where we denote μn* after the semicolon (as a parameter) to emphasize the dependence of the Markov chain on this control policy.
In addition, the min-failure probability γn on n that approximates γ(z) is defined as:
We note that the optimization programs in Eq. 13 and Eq. 14 may have two different optimal feedback control policies. Let vn∈Πn be a control policy on n that achieves γn, then the cost-to-go Jnγ due to vn approximates Jγ(z).
Similarly, in the augmented state space
A trajectory on n is denoted as {
The set of all such policies φn is Ψn.
Under a control policy φn, the cost-to-go on n that approximates Eq. 6 is defined as:
To solve the above optimization, we compute approximate boundary values for states on the boundary of D using the sequence of MDP {n}n=0∞ on S as discussed above. For states (z, η)∈
The extension of iMDP outlined below is designed to compute the sequence of optimal cost-to-go functions {Jn*}n=0∞, associated failure probability functions {γn}n=0∞, min-failure probability functions {γn}n=0∞, min-failure costs functions {Jnγ}n=0∞, and the sequence of anytime control policies {μn}n=0∞ and {κn}n=0∞ in an incremental procedure.
B. Extension of iMDP
Before presenting the details of the algorithm, we discuss a number of primitive procedures.
1) Sampling: The Sample(X) procedure sample states independently and uniformly in X.
2) Nearest Neighbors: Given ζ∈X⊂d
3) Time Intervals: Given a state ζ∈X and a number k∈, the procedure ComputeHoldingTime(ζ, k, d) returns a holding time computed as follows:
where χt>0 is a constant, and ζ, θ are constants in (0,1) and (0,1] respectively. The parameter ρ∈(0, 0.5] defines the Holder continuity of the cost rate function g(⋅, ⋅).
4) Transition Probabilities: We are given a state ζ∈X, a subset Y∈X, a control v in some control set V, a positive number τ describing a holding time, k is a nominal dynamics, K is a diffusion matrix. The procedure ComputeTranProb(ζ, v, τ, Y, k, K) returns (i) a finite set Znear⊂X of states such that the state ζ+k(ζ, v)τ belongs to the convex hull of Znear and ∥z′−z∥2=O(τ) for all ζ′≠ζ∈Znear, and (ii) a function P that maps Znear to a non-negative real numbers such that P(⋅) is a probability distribution over the support Znear. It is crucial to ensure that these transition probabilities result in a sequence of locally consistent chains that approximate k and K.
5) Backward Extension: Given T>0 and two states z, z′∈S, the procedure ExtBackwardsS(z, z′, T) returns a triple (x, v, τ) such that (i) {dot over (x)}(t)=f(x(t), u(t))dt and u(t)=v∈U for all t∈[0, τ], (ii) τ≤T, (iii) x(t)∈S for all t∈[0, τ], (iv) x(τ)=z, and (v) x(0) is close to z′. If no such trajectory exists, the procedure returns failure. We can solve for the triple (x, v, τ) by sampling several controls v and choose the control resulting in x(0) that is closest to z′. When (z, η), (z′, η′) are in
6) Sampling and Discovering Controls: For z∈S and Y⊆S, the procedure ConstructControlsS(k, z, Y, T) returns a set of k controls in U. We can uniformly sample k controls in U. Alternatively, for each state z′∈Nearest (z, Y, k), we solve for a control v∈U such that (i) {dot over (x)}(t)=f(x(t), u(t))dt and u(t)=v∈U for all t∈[0, T], (ii) x(t)∈S for all t∈[0, T], (iii) x(0)=z and x(T)=z′.
For (z, η)∈
The extended iMDP algorithm is presented in Algorithms 1-6 (
We associate with z∈Sn a cost value Jn(z, 1), a control vn(⋅, 1), a failure probability γn(z) due to μn(⋅, 1), a min-failure probability γn(z), a cost-to-go value Jnγ(z) induced by the obtained min-failure policy. Similarly, we associate with
As shown in Algorithm 1 (
We conduct K1,n rounds to refine the MDP sequence {n}n=0∞ using the procedure ConstructBoundary (Line 6). Thus, we can compute the cost function Jn and the associated failure probability function γn on Sn×{1}. In the same procedure, we compute the min-failure probability function γn as well as the min-failure cost function Jnγ on Sn. In other words, the algorithm effectively constructs approximate boundaries for D and approximate cost-to-go functions Jn on these boundaries over iterations. To compute cost values for the interior Do and D, we conduct K2,n rounds of the procedure ProcessInterior (Line 8) that similarly refines the MDP sequence {n}n=0∞ in the augmented state space. We can choose the values of K1,n and K2,n so that we perform a large number of iterations to obtain stable boundary values before processing the interior domain when n is small. In the following discussion, we will present in detail the implementations of one example of these procedures.
In Algorithm 2 (
We then perform Ln≥1 updating rounds in each iteration (Lines 8-11). In particular, we construct the update-set Zupdate consisting of Kn=Θ(|Sn|θ) states and ze where |Kn|<|Sn|. For each of state z in Zupdate, the procedure UpdateS as shown in Algorithm 4 (
The details of the implementation are as follows. A set of Un controls is constructed using the procedure ConstructControlsS where |Un|=Θ(log(|Sn|)) at Line 2. For each v∈Un, we construct the support Znear and compute the transition probability Pn(⋅|z, v) consistently over Znear from the procedure ComputeTranProb (Line 4). The cost values for the state z and controls in Un are computed at Lines 5. We finally choose the best control in Un that yields the smallest updated cost value (Line 7). Correspondingly, we improve the min-failure probability yn and its induced min-failure cost value Jnγ in Lines 8-11
Similarly, in Algorithm 3 (
where the control set Ūn is constructed by the procedure ConstructControlsSM, and the transition probability
c. Feedback Control
At the nth iteration, given a state x∈S and a martingale component q, to find a policy control (v, c), we perform a Bellman update based on the approximated cost-to-go Jn for the augmented state (x, q). During the holding time Δtn, the original system takes the control v and evolves in the original state space S while we simulate the dynamics of the martingale component under the martingale control c. After this holding time period, the augmented system has a new state (x′, q′), and we repeat the above process.
Using the characteristics presented in Section C, we infer that when a certain condition meets, the system can start following a deterministic control policy. More precisely, we recall that for all η∈[γ(z), 1], we have J*(z, η)=J*(z, 1). Thus, starting from any augmented state (z, η) where η>γ(z), we can solve the problem as if the failure probability were 1.0 and use optimal control policies of the unconstrained problem from the state z.
Algorithm 6 (
D. Complexity
The time complexity per iteration of the implementation in Algorithms 1-6 is O(|
Now, we present main results on the performance of the extended iMDP algorithm with brief explanation.
We first review the following key results of the approximating Markov chain method when no additional risk constraints are considered. Local consistency implies the convergence of continuous-time interpolations of the trajectories of the controlled Markov chain to the trajectories of the stochastic dynamical system described by Eq. 1. That is, we are able to compute J*(⋅, 1) in an incremental manner without directly computing J*(⋅, 1). As a consequence, it follows that γn converges to γ uniformly in probability. Using the same proof, we conclude that γn(⋅) and Jnγ(⋅) converges uniformly to and γ(⋅) and J*(⋅, γ) in probability respectively. Therefore, we have incrementally constructed the boundary values on ∂D of the equivalent stochastic target problem presented in Eqs. (5-8)-(5-9). These results are established based on the approximation of the dynamics in Eq. (3.1) using the MDP sequence {n})n=0∞.
Similarly, the uniform convergence of Jn(⋅, ⋅) to J*(⋅, ⋅) in probability on the interior of D is followed from the approximation of the dynamics in Eq. (5.6) using the MDP sequence {n}n=0∞. In the following theorem, we formally summarize the key convergence results of the extended iMDP algorithm.
Theorem 3 Let n and n be two MDPs with discrete states constructed in S and
In the following experiments, we used a computer with a 2.0-GHz Intel Core 2 Duo T6400 processor and 4 GB of RAM. We controlled a system with stochastic single integrator dynamics to a goal region with free ending time in a cluttered environment. The standard deviation of noise in each direction is 0.5. The system stops when it collides with obstacles or reach the goal region. The cost function is the weighted sum of total energy spent to reach the goal G, which is measured as the integral of square of control magnitude, and terminal cost, which is −1000 for the goal region G and 10 for the obstacle region Γ, with discount factor α=0.9. The maximum velocity of the system is one. At the beginning, the system starts from (6.5, −3). The system can go through narrow corridors or go around the obstacles to reach the goal region. In this setting, failure is defined as collisions with obstacles, and thus we use failure probability and collision probability interchangeably.
We first show how the extended iMDP algorithm constructs the sequence of approximating MDP's on S over iterations in
The sequence of approximating MDPs on S provides boundary values for the stochastic target problem as shown in
We now show how the extended iMDP algorithm constructs the sequence of approximating MDPs on the augmented state space
We then examine how the algorithm computes the value functions for the interior Do of the reformulated stochastic target problem in comparison with the value function of the unconstrained problem in
In
Similarly, in
As we can see, the lower the threshold is, the higher the average cost is as we expect. When η=0.01 the average cost is −19.42 and when η=1.0, the average cost is −125.20.
More importantly, the simulated collision probabilities follow very closely the values of η chosen at time 0. In
We also examine a hypothetical system with the 2-dimensional single-integrator dynamics:
The cost function is the weighted sum of total energy spent to reach the goal G, which is measured as the integral of square of control magnitude, and terminal cost, which is 1000 for the goal region and 10 for the obstacle region with a discount factor α=0.9.
The system operates in a bounded operating area as shown in
A number of embodiments of the invention have been described. Nevertheless, it will be understood that various modifications may be made without departing from the spirit and scope of the invention.
For example, the model(s) describing the dynamics of a system can be substantially enriched to capture new aspects that may affect the behaviors of the system. For example, a jump process is a stochastic process that describes abrupt changes due to shocks during operation. This is one of many new noise models can be added (as additive terms) into the model(s). In some implementations, algorithms to control systems described by these extended models can be built on the basics of iMDP.
In this regard, the controlled diffusion model describing the dynamics referred to herein can be enriched in several ways. For example, noise can be driven by not only Brownian processes but also jump processes, which are stochastic processes that describe abrupt changes due to shocks during operation. In this case, the dynamics can be modeled as:
x(t)x(0)+∫0tf(x(τ),u(τ))dτ+∫0TF(x(τ),u(τ)dw(τ)+J(t),
where the term J(t) produces the jumps. To characterize the jump term, we generally would like to specify the probability that a jump occurs in any small time interval and the distribution of any resulting jumps as the function of the past history process. Between jumps, the term J(t) is constant.
The iMDP algorithm can be further extended to control systems with dynamics that are described by Eq. 1. The local consistency conditions now include the approximation for jump intensities during holding times.
Additionally, the subject matter disclosed herein can be implemented in digital electronic circuitry, or in computer-based software, firmware, or hardware, including the structures disclosed in this specification and/or their structural equivalents, and/or in combinations thereof. In some embodiments, the subject matter disclosed herein can be implemented in one or more computer programs, that is, one or more modules of computer program instructions, encoded on computer storage medium for execution by, or to control the operation of, one or more data processing apparatuses (e.g., processors).
Alternatively, or additionally, the program instructions can be encoded on an artificially-generated propagated signal, for example, a machine-generated electrical, optical, or electromagnetic signal that is generated to encode information for transmission to suitable receiver apparatus for execution by a data processing apparatus. A computer storage medium can be, or can be included within, a computer-readable storage device, a computer-readable storage substrate, a random or serial access memory array or device, or a combination thereof. While a computer storage medium should not be considered to include a propagated signal, a computer storage medium may be a source or destination of computer program instructions encoded in an artificially-generated propagated signal. The computer storage medium can also be, or be included in, one or more separate physical components or media, for example, multiple CDs, computer disks, and/or other storage devices.
The operations described in this specification can be implemented as operations performed by a data processing apparatus (e.g., a processor) on data stored on one or more computer-readable storage devices or received from other sources. The term “data processing apparatus” encompasses all kinds of apparatus, devices, and machines for processing data, including by way of example a programmable processor, a computer, a system on a chip, or multiple ones, or combinations, of the foregoing The apparatus can include special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit). The apparatus can also include, in addition to hardware, code that creates an execution environment for the computer program in question, for example, code that constitutes processor firmware, a protocol stack, a database management system, an operating system, a cross-platform runtime environment, a virtual machine, or a combination of one or more of them. The apparatus and execution environment can realize various different computing model infrastructures, such as web services, distributed computing and grid computing infrastructures.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any inventions or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In certain circumstances, multitasking and parallel processing may be advantageous. Moreover, the separation of various system components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Other implementations are within the scope of the claims
This application is a continuation of, and claims the benefit of priority to, co-pending U.S. patent application Ser. No. 14/275,933, entitled Controlling Dynamical Systems with Bounded Probability of Failure, which was filed on May 13, 2014, and which claimed the benefit of priority to U.S. Provisional Application No. 61/822,627, which was filed May 13, 2013, and which was entitled A Real-Time Method for Controlling Dynamical Systems with Bounded Probability of Failure. The disclosures of all prior applications are incorporated herein by reference in their entireties.
This invention was made with government support under Contract No. W911NF-11-1-0046 awarded by the Army Research Office and under Grant No. CNS-1016213 awarded by the National Science Foundation. The Government has certain rights in the invention.
Number | Name | Date | Kind |
---|---|---|---|
7865089 | Andreoli | Jan 2011 | B2 |
8346694 | Dugan | Jan 2013 | B2 |
8832497 | Bluvband | Sep 2014 | B2 |
8938405 | Pinhanez | Jan 2015 | B2 |
9058568 | Hosking | Jun 2015 | B2 |
9059817 | Huang | Jun 2015 | B2 |
9122253 | Block | Sep 2015 | B2 |
9158303 | Mazzaro | Oct 2015 | B2 |
20070094187 | Anderson | Apr 2007 | A1 |
20090094618 | Huntsman | Apr 2009 | A1 |
20100138096 | Hung | Jun 2010 | A1 |
20110172976 | Budiman | Jul 2011 | A1 |
Number | Date | Country |
---|---|---|
1 426 840 | Dec 2008 | EP |
WO2013086186 | Jun 2013 | WO |
Entry |
---|
Dugan, et al: “Combining Software Quality Analysis with Dynamic Event/Fault Trees for High Assurance Systems Engineering”, 2007 IEEE pp. 245-255. |
Dehlinger, et al. “Analyzing Dynamic Fault Trees Derived from Model-Based System Architectures”, 2008, pp. 365-374. |
Huynh et al: “A Martingale Approach and Time-Constraint Sampling-based Algorithms for Risk Management in Stochastic Optimal Control”, 2014 IEEE, pp. 1858-1865. |
Yang et al, “Automatic Generation of Markov Models in Safety Instrumented Systems with Non-Identical Channels”, 2010 IEEE, pp. 287-290. |
Bruno Bouchard; Marcel Nutz; “Weak Dynamic Programming for Generalized State Constraints”; SIAM Journal on Control and Optimization, vol. 50. No. 6, pp. 3344-3373, 2012; Oct. 19, 2012. |
Harold J. Kushner, et al; Numerical Methods for Stochastic Control Problems in Continuous Time, Second Edition; Chapters 4-6, Springer New York 2000. |
Sertac Karaman; Emilio Frazzoli: “Sampling-based Algorithms for Optimal Motion Planning”; The International Journal of Robotics Research Jun. 2011 vol. 30 No. 7 846-894. |
Number | Date | Country | |
---|---|---|---|
20180032039 A1 | Feb 2018 | US |
Number | Date | Country | |
---|---|---|---|
61822627 | May 2013 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14275933 | May 2014 | US |
Child | 15660146 | US |