39
The Continual Reachability Set and its Computation Using Maximal Reachability Techniques Shahab Kaynama * , Meeko Oishi , Ian M. Mitchell * , Guy A. Dumont * * University of British Columbia University of New Mexico www.ece.ubc.ca/kaynama CDC–ECC’11 1 / 18

The Continual Reachability Set and its Computation Using

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Continual Reachability Set and its Computation Using

The Continual Reachability Set and its ComputationUsing Maximal Reachability Techniques

Shahab Kaynama∗, Meeko Oishi†, Ian M. Mitchell∗, Guy A. Dumont∗

∗University of British Columbia†University of New Mexico

www.ece.ubc.ca/∼kaynama

CDC–ECC’11 1 / 18

Page 2: The Continual Reachability Set and its Computation Using

Motivation: Control of Anesthesia

• Control of depth of anesthesiaI [Simanski, et al. 07; Ionescu, et al. 08; Syafiie, et al. 09; Dumont, et al.

09; Oliveira, et al. 09; Mendonca, et al. 09]

• Goal: closed-loop drug delivery systemI Currently bolus-based open-loop system, 80+ patients via clinical trials

• Key element for obtaining regulatory certificate (FDA/HealthCanada) are guarantees of safety and performance

Infusion pump

Controller

CDC–ECC’11 2 / 18

Page 3: The Continual Reachability Set and its Computation Using

Motivation: Other Application Domains

• Fleet of environmental monitoring motes with limited power source• Must be dispersed using bounded input authority• Alert depletion of battery at least ta time units in advance• Objectives:

I Return to the base upon low-battery alertI Spend maximum possible time outsideI Roam over as large of an area outside of the base as possible

CDC–ECC’11 3 / 18

Page 4: The Continual Reachability Set and its Computation Using

Introduction

x = f(x, u), x(0) = x0

u(t) ∈ U (input constraint)

K ⊆ X (target set/state constraint)

• Reachability analysisI [Aubin, et al. 11; Kurzhanski and Varaiya 00; Tomlin, et al. 03;

Lygeros 04]

• Typically used to guarantee safetyI [Lygeros, et al. 98; Mitchell, et al. 05; Bayen, et al. 07]

• Safety constraints may be relaxed in favor of improved performanceI Continual reachability set to explore that option

CDC–ECC’11 4 / 18

Page 5: The Continual Reachability Set and its Computation Using

Outline

What is the Continual Reach Set?

Connection with Other Reachability Constructs

Properties and Implications

Approximation Techniques

Example: Control of Anesthesia

CDC–ECC’11 5 / 18

Page 6: The Continual Reachability Set and its Computation Using

The Continual Reach Set

Reachγ[0,τ ](K) :={x0 ∈ X | ∀t ∈ [0, τ ],

∃u(·) ∈ U[0,t], ξx0,0,u(·)(t) ∈ K}

• Set of states that can reach K at any time within the finite horizon

• For any desired time there exists at least one input policy that cansteer the system to the target

• Additional flexibility to a supervisory controller: a trade-off betweenthe desired time-to-reach the target and the input effort

CDC–ECC’11 6 / 18

Page 7: The Continual Reachability Set and its Computation Using

Backward Constructs and Their Connections

Target/Constraint Set

Reach♯[0,τ ](K)

Reach♭[0,τ ](K)

KReachγ[0,τ ](K)

V iab[0,τ ](K)

Inv[0,τ ](K)

CDC–ECC’11 7 / 18

Page 8: The Continual Reachability Set and its Computation Using

Backward Constructs and Their Connections

Maximal Reach Tube

Reach♯[0,τ ](K)

Reach♭[0,τ ](K)

KReachγ[0,τ ](K)

V iab[0,τ ](K)

Inv[0,τ ](K)

CDC–ECC’11 7 / 18

Page 9: The Continual Reachability Set and its Computation Using

Backward Constructs and Their Connections

Minimal Reach Tube

Reach♯[0,τ ](K)

Reach♭[0,τ ](K)

KReachγ[0,τ ](K)

V iab[0,τ ](K)

Inv[0,τ ](K)

CDC–ECC’11 7 / 18

Page 10: The Continual Reachability Set and its Computation Using

Backward Constructs and Their Connections

Viability Kernel

Reach♯[0,τ ](K)

Reach♭[0,τ ](K)

KReachγ[0,τ ](K)

V iab[0,τ ](K)

Inv[0,τ ](K)

CDC–ECC’11 7 / 18

Page 11: The Continual Reachability Set and its Computation Using

Backward Constructs and Their Connections

Invariance Kernel

Reach♯[0,τ ](K)

Reach♭[0,τ ](K)

KReachγ[0,τ ](K)

V iab[0,τ ](K)

Inv[0,τ ](K)

CDC–ECC’11 7 / 18

Page 12: The Continual Reachability Set and its Computation Using

Backward Constructs and Their Connections

Continual Reach Set

Reach♯[0,τ ](K)

Reach♭[0,τ ](K)

KReachγ[0,τ ](K)

V iab[0,τ ](K)

Inv[0,τ ](K)

CDC–ECC’11 7 / 18

Page 13: The Continual Reachability Set and its Computation Using

Backward Constructs and Their Connections (cont’d)

Reach[[0,τ ](Kc) = (V iab[0,τ ](K))c

Reach][0,τ ](Kc) = (Inv[0,τ ](K))c

Reach[[0,τ ](K) ⊇⋃

t∈[0,τ ]Reach[t(K)

Reach][0,τ ](K) =⋃

t∈[0,τ ]Reach]t(K)

Inv[0,τ ](K) =⋂

t∈[0,τ ]Reach[t(K)

Reachγ[0,τ ](K) =⋂

t∈[0,τ ]Reach]t(K)

[Lygeros 04]

[Mitchell 07; Girard, et al.

06; Le Guernic 10;

Kurzhanski and Varaiya 00;

Kurzhanskiy and Varaiya 07;

Stursberg and Krogh 03]

[This paper]

CDC–ECC’11 8 / 18

Page 14: The Continual Reachability Set and its Computation Using

Backward Constructs and Their Connections (cont’d)

Reach[[0,τ ](Kc) = (V iab[0,τ ](K))c

Reach][0,τ ](Kc) = (Inv[0,τ ](K))c

Reach[[0,τ ](K) ⊇⋃

t∈[0,τ ]Reach[t(K)

Reach][0,τ ](K) =⋃

t∈[0,τ ]Reach]t(K)

Inv[0,τ ](K) =⋂

t∈[0,τ ]Reach[t(K)

Reachγ[0,τ ](K) =⋂

t∈[0,τ ]Reach]t(K)

[Lygeros 04]

[Mitchell 07; Girard, et al.

06; Le Guernic 10;

Kurzhanski and Varaiya 00;

Kurzhanskiy and Varaiya 07;

Stursberg and Krogh 03]

[This paper]

CDC–ECC’11 8 / 18

Page 15: The Continual Reachability Set and its Computation Using

Backward Constructs and Their Connections (cont’d)

Reach[[0,τ ](Kc) = (V iab[0,τ ](K))c

Reach][0,τ ](Kc) = (Inv[0,τ ](K))c

Reach[[0,τ ](K) ⊇⋃

t∈[0,τ ]Reach[t(K)

Reach][0,τ ](K) =⋃

t∈[0,τ ]Reach]t(K)

Inv[0,τ ](K) =⋂

t∈[0,τ ]Reach[t(K)

Reachγ[0,τ ](K) =⋂

t∈[0,τ ]Reach]t(K)

[Lygeros 04]

[Mitchell 07; Girard, et al.

06; Le Guernic 10;

Kurzhanski and Varaiya 00;

Kurzhanskiy and Varaiya 07;

Stursberg and Krogh 03]

[This paper]

CDC–ECC’11 8 / 18

Page 16: The Continual Reachability Set and its Computation Using

Some Properties

• For every x0 ∈ Reachγ[0,τ ](K) and some t ∈ [0, τ ],

d(ξx0,0,u(·)(t),K) ≤ dH1

(Reach]

t−t(K),K)∀t ∈ [0, t]

for any u(·) ∈ U[0,t] such that ξx0,0,u(·)(t) ∈ K• States inside maximal reach tube but outside continual reach set can

only reach target at specific times

x1

x2

x3 K

Reach♯t=1(K)

Reach♯t=3(K)

Reach♯t=2(K)

CDC–ECC’11 9 / 18

Page 17: The Continual Reachability Set and its Computation Using

Implications

• What it means for performance

• More flexibility since viability control laws are a subset

• Performance + safety; a mixed scheme

Reachγ[0,τ ](V iab[0,τ ](K)) = V iab[0,τ ](K)

(the original viability control laws are still a subset)

x0

CDC–ECC’11 10 / 18

Page 18: The Continual Reachability Set and its Computation Using

Implications

• What it means for performance

• More flexibility since viability control laws are a subset

• Performance + safety; a mixed scheme

Reachγ[0,τ ](V iab[0,τ ](K)) = V iab[0,τ ](K)

(the original viability control laws are still a subset)

x0

CDC–ECC’11 10 / 18

Page 19: The Continual Reachability Set and its Computation Using

Approximation

• Maximal reachability techniques that offer under-approximation

• Approximation via the ellipsoidal techniques for linear systems

Reachγ[0,τ ](K) ⊇ Reachγ[0,τ ](K↓ε) ⊇{

x ∈ X∣∣∣ supt∈[0,τ ]

min`τ∈V

⟨(x− x∗t ), (X−`,t)−1(x− x∗t )

⟩≤ 1}

• Implemented by Ellipsoidal Toolbox [Kurzhanskiy and Varaiya 06]

CDC–ECC’11 11 / 18

Page 20: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia

• Discrete-time Laguerre models (6D); patient’s response to rocuronium

• Target set: therapeutic bounds on output (pseudo-occupancy level),i.e. desired clinical effect

• Input constraint: actuator bounds (hard bounds on drug infusion rate)

CDC–ECC’11 12 / 18

Page 21: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia (cont’d)

Issues to take into account:

1 The target is in the output space as opposed to the state space

2 The output signal should track a reference

Reformulate the problem by:

1 Projecting the bounds onto the state space

2 Making the control action regulatory

CDC–ECC’11 13 / 18

Page 22: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia (cont’d)

-1.5 -1 -0.5 0 0.5 1-2

-1.5

-1

-0.5

0

0.5

1

1.5

2

z1

z 2

A projection of the continual reach set computed using Ellipsoidal Toolbox.(patient #80. 60min surgery.)

CDC–ECC’11 14 / 18

Page 23: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia (cont’d)

020

4060

80

-60-40

-200

20-5

0

5

10

15

tz1

z 2

Projection of the maximal reach tube computed for 80 time steps.

CDC–ECC’11 15 / 18

Page 24: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia (cont’d)

• A guarantee of performance; desired clinical effect can be reached atarbitrary times

• Minimize total administered drug, or achieve a desired depth ofanesthesia arbitrarily fast

• Optimal infusion rate to keep within the target clinical effect may notbe physiologically ideal (discontinuous/bang-bang)

• May choose to temporarily relax the state constraint in exchange for abetter-suited (less aggressive, mildly varying) infusion rate

• Physiologically more optimized to meet the operating conditions andpatient’s ability to handle drug (patient-oriented design)

CDC–ECC’11 16 / 18

Page 25: The Continual Reachability Set and its Computation Using

Conclusions and Future Work

• Continual reach set to guarantee performance

• Approximation based on available maximal reachability techniques

• Additional degree of freedom to a supervisory controller

• Facilitate a physiologically more relevant control of anesthesia

• Synthesizing continual reachability control laws

• Accounting for model uncertainty

• Implementation of a safety- + performance-based controller

CDC–ECC’11 17 / 18

Page 26: The Continual Reachability Set and its Computation Using

The Continual Reachability Set and its ComputationUsing Maximal Reachability Techniques

Shahab Kaynama, Meeko Oishi, Ian M. Mitchell, Guy A. Dumont

www.ece.ubc.ca/∼kaynama

CDC–ECC’11 18 / 18

Page 27: The Continual Reachability Set and its Computation Using

Backward Constructs

Maximal Reachability Set:

Reach]t(K) :={x0 ∈ X | ∃u(·) ∈ U[0,t], ξx0,0,u(·)(t) ∈ K

}Maximal Reachability Tube:

Reach][0,τ ](K) :={x0 ∈ X | ∃u(·) ∈ U[0,τ ], ∃t ∈ [0, τ ], ξx0,0,u(·)(t) ∈ K

}Minimal Reachability Set:

Reach[t(K) :={x0 ∈ X | ∀u(·) ∈ U[0,t], ξx0,0,u(·)(t) ∈ K

}Minimal Reachability Tube:

Reach[[0,τ ](K) :={x0 ∈ X | ∀u(·) ∈ U[0,τ ], ∃t ∈ [0, τ ], ξx0,0,u(·)(t) ∈ K

}CDC–ECC’11 1 / 10

Page 28: The Continual Reachability Set and its Computation Using

Backward Constructs (cont’d)

Invariance Kernel:

Inv[0,τ ](K) :={x0 ∈ X | ∀u(·) ∈ U[0,τ ], ∀t ∈ [0, τ ], ξx0,0,u(·)(t) ∈ K

}Viability Kernel:

V iab[0,τ ](K) :={x0 ∈ X | ∃u(·) ∈ U[0,τ ], ∀t ∈ [0, τ ], ξx0,0,u(·)(t) ∈ K

}Continual Reachability Set:

Reachγ[0,τ ](K) :={x0 ∈ X | ∀t ∈ [0, τ ], ∃u(·) ∈ U[0,t], ξx0,0,u(·)(t) ∈ K

}

CDC–ECC’11 2 / 10

Page 29: The Continual Reachability Set and its Computation Using

Approximation via the Ellipsoidal Techniques

Reachγ[0,τ ](K) ⊇ Reachγ[0,τ ](K↓ε)

=⋂

t∈[0,τ ]

(⋃`τ∈L

E(x∗(t), X−` (t)))

Reachγ[0,τ ](K) ⊇ Reachγ[0,τ ](K↓ε)

⊇⋂

t∈[0,τ ]

(⋃`τ∈V

E(x∗(t), X−` (t)))

Reachγ[0,τ ](K) ⊇ Reachγ[0,τ ](K↓ε) ⊇{

x ∈ X∣∣∣ supt∈[0,τ ]

min`τ∈V

⟨(x− x∗t ), (X−`,t)−1(x− x∗t )

⟩≤ 1}

CDC–ECC’11 3 / 10

Page 30: The Continual Reachability Set and its Computation Using

Approximation via the Ellipsoidal Techniques

Reachγ[0,τ ](K) ⊇ Reachγ[0,τ ](K↓ε)

=⋂

t∈[0,τ ]

(⋃`τ∈L

E(x∗(t), X−` (t)))

Reachγ[0,τ ](K) ⊇ Reachγ[0,τ ](K↓ε)

⊇⋂

t∈[0,τ ]

(⋃`τ∈V

E(x∗(t), X−` (t)))

Reachγ[0,τ ](K) ⊇ Reachγ[0,τ ](K↓ε) ⊇{

x ∈ X∣∣∣ supt∈[0,τ ]

min`τ∈V

⟨(x− x∗t ), (X−`,t)−1(x− x∗t )

⟩≤ 1}

CDC–ECC’11 3 / 10

Page 31: The Continual Reachability Set and its Computation Using

Approximation via the Ellipsoidal Techniques

Reachγ[0,τ ](K) ⊇ Reachγ[0,τ ](K↓ε)

=⋂

t∈[0,τ ]

(⋃`τ∈L

E(x∗(t), X−` (t)))

Reachγ[0,τ ](K) ⊇ Reachγ[0,τ ](K↓ε)

⊇⋂

t∈[0,τ ]

(⋃`τ∈V

E(x∗(t), X−` (t)))

Reachγ[0,τ ](K) ⊇ Reachγ[0,τ ](K↓ε) ⊇{

x ∈ X∣∣∣ supt∈[0,τ ]

min`τ∈V

⟨(x− x∗t ), (X−`,t)−1(x− x∗t )

⟩≤ 1}

CDC–ECC’11 3 / 10

Page 32: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia

x(t+ 1) = Ax(t) +Bu(t), y(t) = Cx(t), t ∈ Z+

K0 := [0.1, 1]

U0 := [0, 0.8]

CDC–ECC’11 4 / 10

Page 33: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia (cont’d)

Reformulate the problem by:

1 Projecting the bounds onto the state space

2 Making the control action regulatory

CDC–ECC’11 5 / 10

Page 34: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia (cont’d)

Reformulate the problem by:

1 Projecting the bounds onto the state space

2 Making the control action regulatory

CDC–ECC’11 5 / 10

Page 35: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia (cont’d)

[C

05×1 I5

]x1x2...x6

=:

w1

w2...w6

,

1 0 · · · 0 −10 1

. . . 0...

. . .. . .

. . ....

.... . . 1 0

0 · · · · · · 0 1

yw2...w6

y∗

=

y − y∗w2...w6

y∗

=:

z1z2...z6z7

.

CDC–ECC’11 6 / 10

Page 36: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia (cont’d)

Reformulate the problem by:

1 Projecting the bounds onto the state space

2 Making the control action regulatory

CDC–ECC’11 7 / 10

Page 37: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia (cont’d)

[xssuss

]=

[A− I BC 0

]−1 [0y∗

]

CDC–ECC’11 8 / 10

Page 38: The Continual Reachability Set and its Computation Using

Example: Control of Anesthesia (cont’d)

z(t+ 1) = Az(t) + Bu(t), y(t) = Cz(t), t ∈ Z+

K := (K0 − y∗)× R6

U := U0 − uss

CDC–ECC’11 9 / 10

Page 39: The Continual Reachability Set and its Computation Using

Other Application Domains (revisited)

• Fleet of environmental monitoring motes with limited power source

• Must be dispersed using bounded input authority

• Alert depletion of battery at least ta time units in advance

• Objectives:I Return to the base upon low-battery alertI Spend maximum possible time outsideI Roam over as large of an area outside of the base as possible

• Solution: Reachγ[ta,τ ](K)

CDC–ECC’11 10 / 10