5,344 research outputs found
Approximately bisimilar symbolic models for nonlinear control systems
Control systems are usually modeled by differential equations describing how
physical phenomena can be influenced by certain control parameters or inputs.
Although these models are very powerful when dealing with physical phenomena,
they are less suitable to describe software and hardware interfacing the
physical world. For this reason there is a growing interest in describing
control systems through symbolic models that are abstract descriptions of the
continuous dynamics, where each "symbol" corresponds to an "aggregate" of
states in the continuous model. Since these symbolic models are of the same
nature of the models used in computer science to describe software and
hardware, they provide a unified language to study problems of control in which
software and hardware interact with the physical world. Furthermore the use of
symbolic models enables one to leverage techniques from supervisory control and
algorithms from game theory for controller synthesis purposes. In this paper we
show that every incrementally globally asymptotically stable nonlinear control
system is approximately equivalent (bisimilar) to a symbolic model. The
approximation error is a design parameter in the construction of the symbolic
model and can be rendered as small as desired. Furthermore if the state space
of the control system is bounded the obtained symbolic model is finite. For
digital control systems, and under the stronger assumption of incremental
input-to-state stability, symbolic models can be constructed through a suitable
quantization of the inputs.Comment: Corrected typo
Model checking embedded system designs
We survey the basic principles behind the application of model checking to controller verification and synthesis. A promising development is the area of guided model checking, in which the state space search strategy of the model checking algorithm can be influenced to visit more interesting sets of states first. In particular, we discuss how model checking can be combined with heuristic cost functions to guide search strategies. Finally, we list a number of current research developments, especially in the area of reachability analysis for optimal control and related issues
Compositional abstraction and safety synthesis using overlapping symbolic models
In this paper, we develop a compositional approach to abstraction and safety
synthesis for a general class of discrete time nonlinear systems. Our approach
makes it possible to define a symbolic abstraction by composing a set of
symbolic subsystems that are overlapping in the sense that they can share some
common state variables. We develop compositional safety synthesis techniques
using such overlapping symbolic subsystems. Comparisons, in terms of
conservativeness and of computational complexity, between abstractions and
controllers obtained from different system decompositions are provided.
Numerical experiments show that the proposed approach for symbolic control
synthesis enables a significant complexity reduction with respect to the
centralized approach, while reducing the conservatism with respect to
compositional approaches using non-overlapping subsystems
Checking and Enforcing Security through Opacity in Healthcare Applications
The Internet of Things (IoT) is a paradigm that can tremendously
revolutionize health care thus benefiting both hospitals, doctors and patients.
In this context, protecting the IoT in health care against interference,
including service attacks and malwares, is challenging. Opacity is a
confidentiality property capturing a system's ability to keep a subset of its
behavior hidden from passive observers. In this work, we seek to introduce an
IoT-based heart attack detection system, that could be life-saving for patients
without risking their need for privacy through the verification and enforcement
of opacity. Our main contributions are the use of a tool to verify opacity in
three of its forms, so as to detect privacy leaks in our system. Furthermore,
we develop an efficient, Symbolic Observation Graph (SOG)-based algorithm for
enforcing opacity
Computing Weakest Strategies for Safety Games of Imperfect Information
CEDAR (Counter Example Driven Antichain Refinement) is a new symbolic algorithm for computing weakest strategies for safety games of imperfect information. The algorithm computes a fixed point over the lattice of contravariant antichains. Here contravariant antichains are antichains over pairs consisting of an information set and an allow set representing the associated move. We demonstrate how the richer structure of contravariant antichains for representing antitone functions, as opposed to standard antichains for representing sets of downward closed sets, allows CEDAR to apply a significantly less complex controllable predecessor step than previous algorithms
Symbolic Computation of Nonblocking Control Function for Timed Discrete Event Systems
In this paper, we symbolically compute a minimally restrictive nonblocking supervisor for timed discrete event systems, in the supervisory control theory context. The method is based on Timed Extended Finite Automata, which is an augmentation of extended finite automata (EFAs) by incorporating discrete time into the model. EFAs are ordinary automaton extended with discrete variables, guard expressions and action functions. To tackle large problems all computations are based on binary decision diagrams (BDDs). The main feature of this approach is that the BDD-based fixed-point computations is not based on “tick” models that have been commonly used in this area, leading to better performance in many cases. As a case study, we effectively computed the minimally restrictive nonblocking supervisor for a well-known production cell
- …