首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Methods to construct the ellipsoidal estimates of the reachability sets of a nonlinear dynamic system with scalar pulse control and uncertainty in the initial data were proposed. The considered pulse system was rearranged in the ordinary differential inclusion already without any pulse components by means of a special discontinuous time substitution. The results of the theory of ellipsoidal estimation and the theory of evolutionary equations of the multivalued states of dynamic systems under uncertainty and ellipsoidal phase constraints were used to estimate the reachability sets of the resulting nonlinear differential inclusion.  相似文献   

2.
Consideration was given to formation of the external estimates of the reachability sets of the nonlinear controlled systems in the form of the level sets of the functions satisfying the differential Hamilton-Jacobi inequalities. The trajectories of the nonlinear system are estimated by modifying the estimates of its linear part. The constructions proposed are based on comparing the systems of differential inequalities. Applications of the reachability sets of the multivariable controlled systems with nonlinear cross connections to the ellipsoidal estimates were examined.  相似文献   

3.
Stochastic hybrid system (SHS) models can be used to analyze and design complex embedded systems that operate in the presence of uncertainty and variability. Verification of reachability properties for such systems is a critical problem. Developing sound computational methods for verification is challenging because of the interaction between the discrete and the continuous stochastic dynamics. In this paper, we propose a probabilistic method for verification of SHSs based on discrete approximations focusing on reachability and safety problems. We show that reachability and safety can be characterized as a viscosity solution of a system of coupled Hamilton-Jacobi-Bellman equations. We present a numerical algorithm for computing the solution based on discrete approximations that are derived using finite-difference methods. An advantage of the method is that the solution converges to the one for the original system as the discretization becomes finer. We also prove that the algorithm is polynomial in the number of states of the discrete approximation. Finally, we illustrate the approach with two benchmarks: a navigation and a room heater example, which have been proposed for hybrid system verification.  相似文献   

4.
Antoine Girard 《Automatica》2012,48(5):947-953
In this paper, we consider the problem of controller design using approximately bisimilar abstractions with an emphasis on safety and reachability specifications. We propose abstraction-based approaches to controller synthesis for both types of specifications. We start by synthesizing a controller for an approximately bisimilar abstraction. Then, using a concretization procedure, we obtain a controller for our initial system that is proved “correct by design”. We provide guarantees of performance by giving estimates of the distance of the synthesized controller to the maximal (i.e., the most permissive) safety controller or to the time-optimal reachability controller. Finally, we use these techniques, combined with discrete approximately bisimilar abstractions of switched systems developed recently, for switching controller synthesis.  相似文献   

5.
Verification of reachability properties for probabilistic systems is usually based on variants of Markov processes. Current methods assume an exact model of the dynamic behavior and are not suitable for realistic systems that operate in the presence of uncertainty and variability. This research note extends existing methods for Bounded-parameter Markov Decision Processes (BMDPs) to solve the reachability problem. BMDPs are a generalization of MDPs that allows modeling uncertainty. Our results show that interval value iteration converges in the case of an undiscounted reward criterion that is required to formulate the problems of maximizing the probability of reaching a set of desirable states or minimizing the probability of reaching an unsafe set. Analysis of the computational complexity is also presented.  相似文献   

6.
Reachability analysis of constrained switched linear systems   总被引:1,自引:0,他引:1  
Zhendong Sun 《Automatica》2007,43(1):164-167
In this note, we investigate the reachability of switched linear systems with switching/input constraints. We prove that, under a mild assumption of the feasible switching signals, the reachability set is the reachable subspace of the unconstrained system. We also address the local reachability for switched linear systems with input constraints and present a complete criterion for a general class of switched linear systems.  相似文献   

7.
We consider an open problem on the stability of nonlinear nilpotent switched systems posed by Daniel Liberzon. Partial solutions to this problem were obtained as corollaries of global nice reachability results for nilpotent control systems. The global structure is crucial in establishing stability. We show that a nice reachability analysis may be reduced to the reachability analysis of a specific canonical system, the nilpotent Hall–Sussmann system. Furthermore, local nice reachability properties for this specific system imply global nice reachability for general nilpotent systems. We derive several new results revealing the elegant Lie-algebraic structure of the nilpotent Hall–Sussmann system.  相似文献   

8.
We present robust optimization techniques for dynamic systems which are affected by time-varying uncertainties. After reviewing existing techniques from the field of reachability analysis and ellipsoidal calculus, we discuss how to over-estimate the influence of uncertainty in nonlinear dynamic systems. The corresponding strategies lead to a framework which can be used to solve min–max optimal control problems in a conservative approximation. The technique is illustrated by applying it to a robust optimal control problem for a nonlinear jacketed tubular reactor. Inside this reactor a highly nonlinear and exothermic chemical reaction takes place which is uncertain due to fouling at the reactor wall. We regard safety constraints on the temperature which must be satisfied for all possible scenarios.  相似文献   

9.
An approach to cyclic protocol validation   总被引:1,自引:0,他引:1  
In this paper, the notion of fair reachability is generalized to cyclic protocols with more than two processes, where all the processes in a protocol are connected via a unidirectional ring and each process might contain internal transitions and can be non-deterministic. We identify ‘indefiniteness’ as a new type of logical error due to reachable internal transition cycles. By properly incorporating internal transitions into the formulation, we show that, with a few modifications, all the previous results established for cyclic protocols without non-deterministic and internal transitions still hold in the augmented model. Furthermore, by combining fair progress and maximal progress during state exploration, we prove that the following three problems are all decidable for Q, the class of cyclic protocols with finite fair reachable state spaces: (1) global state reachability; (2) abstract state reachability; and (3) execution cycle reachability. In the course of the investigation, we also show that detection of k-indefiniteness and k-livelock are decidable for Q.  相似文献   

10.

Neural state classification (NSC) is a recently proposed method for runtime predictive monitoring of hybrid automata (HA) using deep neural networks (DNNs). NSC trains a DNN as an approximate reachability predictor that labels an HA state x as positive if an unsafe state is reachable from x within a given time bound, and labels x as negative otherwise. NSC predictors have very high accuracy, yet are prone to prediction errors that can negatively impact reliability. To overcome this limitation, we present neural predictive monitoring (NPM), a technique that complements NSC predictions with estimates of the predictive uncertainty. These measures yield principled criteria for the rejection of predictions likely to be incorrect, without knowing the true reachability values. We also present an active learning method that significantly reduces the NSC predictor’s error rate and the percentage of rejected predictions. We develop two versions of NPM based, respectively, on the use of frequentist and Bayesian techniques to learn the predictor and the rejection rule. Both versions are highly efficient, with computation times on the order of milliseconds, and effective, managing in our experimental evaluation to successfully reject almost all incorrect predictions. In our experiments on a benchmark suite of six hybrid systems, we found that the frequentist approach consistently outperforms the Bayesian one. We also observed that the Bayesian approach is less practical, requiring a careful and problem-specific choice of hyperparameters.

  相似文献   

11.
动态环境下,动作执行的不确定性会因外部因素存在变动,因此将导致不确定系统中的状态可达关系可能发生改变.为解答这一问题,论文对信息传递法中状态之间可达关系的更新方式进行改进,提出一种新的状态可达关系的维护算法.该算法将变更的状态之间可达关系与原可达矩阵对比,利用邻接矩阵中对应可达信息对变更后状态的可达信息进行修改,然后通...  相似文献   

12.
We consider products of matrix exponentials under the assumption that the matrices span a nilpotent Lie algebra. In 1995, Gurvits conjectured that nilpotency implies that these products are, in some sense, simple. More precisely, there exists a uniform bound l such that any product can be represented as a product of no more than I matrix exponentials. This conjecture has important applications in the analysis of linear switched systems, as it is closely related to the problem of reachability using a uniformly bounded number of switches. It is also closely related to the concept of nice reachability for bilinear control systems. The conjecture is trivially true for the case of first-order nilpotency. Gurvits proved the conjecture for the case of second-order nilpotency using the Baker-Campbell-Hausdorff formula. We show that the conjecture is false for the third-order nilpotent case using an explicit counterexample. Yet, the underlying philosophy behind Gurvits' conjecture is valid in the case of third-order nilpotency. Namely, such systems do satisfy the following nice reachability property: any point in the reachable set can be reached using a piecewise constant control with no more than four switches. We show that even this form of finite reachability is no longer true for the case of fifth-order nilpotency.  相似文献   

13.
Asynchronous systems consist of a set of transitions which are non-deterministically chosen and executed. We present a theory of guiding symbolic reachability in such systems by scheduling clusters of transitions. A theory of reachability expressions which specify the schedules is presented. This theory allows proving equivalence of different schedules which may have radically different performance in BDD-based search. We present experimental evidence to show that optimized reachability expressions give rise to significant performance advantages. The profiling is carried out in the NuSMV framework using examples from discrete timed automata and circuits with delays. A variant tool called NuSMVDP has been developed for interpreting reachability expressions to carry out the experiments.  相似文献   

14.
15.
16.
We present a method for selecting test sequences for concurrent programs from labeled transitions systems (LTS). A common approach to selecting test sequences from a set of LTSs is to derive a global LTS, called the reachability graph, and then force deterministic program executions according to paths selected from the graph. However, using a reachability graph for test path selection introduces a state explosion problem. To overcome this problem, a reduced graph can be generated using incremental reachability analysis, which consists of repeatedly generating a reachability graph for a subset of LTSs, reducing this graph, and using the reduced graph in place of the original LTSs. Unfortunately, existing incremental reachability analysis techniques generate reduced graphs with insufficient information for deterministic testing. We present an incremental approach to testing concurrent programs. Incremental testing consists of incremental reachability analysis for test path selection and deterministic testing for test execution. We define a new type of reachability graph for incremental analysis, called an annotated labeled transition system (ALTS). An ALTS is an LTS annotated with information necessary for deterministic testing. We propose practical coverage criteria for selecting tests paths from an ALTS and present an ALTS reduction algorithm. The results of several case studies are reported  相似文献   

17.
Reachability analysis of real-time systems using time Petri nets   总被引:13,自引:0,他引:13  
Time Petri nets (TPNs) are a popular Petri net model for specification and verification of real-time systems. A fundamental and most widely applied method for analyzing Petri nets is reachability analysis. The existing technique for reachability analysis of TPNs, however, is not suitable for timing property verification because one cannot derive end-to-end delay in task execution, an important issue for time-critical systems, from the reachability tree constructed using the technique. In this paper, we present a new reachability based analysis technique for TPNs for timing property analysis and verification that effectively addresses the problem. Our technique is based on a concept called clock-stamped state class (CS-class). With the reachability tree generated based on CS-classes, we can directly compute the end-to-end time delay in task execution. Moreover, a CS-class can be uniquely mapped to a traditional state class based on which the conventional reachability tree is constructed. Therefore, our CS-class-based analysis technique is more general than the existing technique. We show how to apply this technique to timing property verification of the TPN model of a command and control (C2) system.  相似文献   

18.
We show how the tree-automata techniques proposed by Lugiez and Schnoebelen apply to the reachability analysis of RPPS systems. Using these techniques requires that we express the states of RPPS systems in a tailor-made process rewrite system where reachability is a relation recognizable by finite tree-automata.  相似文献   

19.
This paper deals with the reachability and controllability of periodic discrete-time systems. First, we supply two necessary and sufficient complete reachability conditions, which apply to reversible and non-reversible systems, respectively. Then, a necessary and sufficient complete controllability condition is provided. This condition, as well as the complete reachability criteria, is given in terms of the reachability gramian matrix. Equivalent modal criteria for reachability and controllability are established in the second part of the paper.  相似文献   

20.
This paper aims at a better understanding of reachability and observability properties of heterogeneous networks of linear systems. It extends prior work by Hara et al. (SICE J Control Meas Syst Integr 2:299–306, 2009), who characterized reachability for homogeneous networks of identical linear SISO systems. Our approach is based on extending the classical notion of strict system equivalence to networks of linear systems. We survey and extend known characterizations for reachability and observability for arbitrary interconnected linear MIMO systems. Both static and dynamic interconnection laws are considered, and various applications to classes of homogeneous and heterogeneous networks are derived.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号