kth.sePublications
System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
Link to record
Permanent link

Direct link
Publications (10 of 13) Show all publications
Ramirez, M., Selvaratnam, D. & Manzie, C. (2024). Kinodynamic Motion Planning via Branch-And-Cut over Probabilistic Roadmaps. IEEE Robotics and Automation Letters, 9(1), 247-254
Open this publication in new window or tab >>Kinodynamic Motion Planning via Branch-And-Cut over Probabilistic Roadmaps
2024 (English)In: IEEE Robotics and Automation Letters, E-ISSN 2377-3766, Vol. 9, no 1, p. 247-254Article in journal (Refereed) Published
Abstract [en]

This letter describes an extension of the classic Lazy Probabilistic Roadmaps algorithm (Lazy PRM), which results from pairing PRM and a novel Branch-And-Cut (BC) algorithm. Cuts are dynamically generated constraints that are imposed on minimum cost paths over the geometric graphs selected by PRM. Cuts eliminate paths that cannot be mapped into smooth plans that satisfy suitably defined geometric and differential constraints. We generate candidate smooth plans by fitting splines to vertices in a minimum-cost path. Plans are validated with a recently proposed algorithm that maps them into finite traces, without the need to choose a fixed discretization step. A trace records the exact sequence of constraint boundaries crossed by the plan, modulo arithmetic precision. We evaluate several planners using our methods over the recently proposed BARN benchmark, reporting evidence of the scalability of our approach.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
formal methods in robotics and automation, kinematics, Motion and path planning
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-340837 (URN)10.1109/LRA.2023.3330050 (DOI)001257126000024 ()2-s2.0-85177752547 (Scopus ID)
Note

QC 20231218

Available from: 2023-12-18 Created: 2023-12-18 Last updated: 2024-08-27Bibliographically approved
Hassan, K., Selvaratnam, D. & Sandberg, H. (2024). On Resilience Guarantees by Finite-Time Robust Control Barrier Functions With Application to Power Inverter Networks. IEEE Open Journal of Control Systems, 3, 497-513
Open this publication in new window or tab >>On Resilience Guarantees by Finite-Time Robust Control Barrier Functions With Application to Power Inverter Networks
2024 (English)In: IEEE Open Journal of Control Systems, E-ISSN 2694-085X, Vol. 3, p. 497-513Article in journal (Refereed) Published
Abstract [en]

In this study, a control theoretic description of resilience is provided to quantify the characteristics of a resilient system. The aim is to establish a paradigm for resilient control design based on tangible control objectives that yield desirable attributes for safety-critical systems. In that regard, durability and recoverability properties are identified as key components of the proposed resilience framework and, to offer a methodology to enforce these attributes, the notion of finite-time robust control barrier function (FR-CBF) is introduced. Furthermore, to offer a comprehensive treatment of the problem, resilient control design is investigated for both continuous and sampled-data systems. To that end, FR-CBF-based design conditions for both continuous and piece-wise constant zero-order hold (ZOH) control inputs are included. Moreover, to provide a concrete example of how the proposed framework could be adopted for safety-critical control applications, in this study we also investigate the voltage regulation problem for inverter-interfaced radial power distribution networks subject to adversarial injections. In that regard, sufficient conditions for both the continuous and sampled-data ZOH control are derived to guarantee finite-time recovery and safe operation of the distribution grid in accordance with the proposed resilience framework. Finally, the efficacy of the proposed results is advocated using a simulation study showing resilient grid performance in the presence of the 'worst-case' power injection attack, as reported in (Lindstr & ouml;m et al. 2021).

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Resilience, Voltage control, Control design, Trajectory, Control theory, Asymptotic stability, System dynamics, Sampled data systems, Robust control, Vectors, Cyber-Physical systems, radial distribution power grid, resilient control, safety-critical control, sampled-data control, voltage regulation
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-359484 (URN)10.1109/OJCSYS.2024.3487408 (DOI)001383037800001 ()2-s2.0-85208266653 (Scopus ID)
Note

QC 20250205

Available from: 2025-02-05 Created: 2025-02-05 Last updated: 2025-03-10Bibliographically approved
Selvaratnam, D., Das, A. & Sandberg, H. (2023). Electrical Fault Localisation Over a Distributed Parameter Transmission Line. In: 2023 62nd IEEE Conference on Decision and Control, CDC 2023: . Paper presented at 62nd IEEE Conference on Decision and Control, CDC 2023, Singapore, Singapore, Dec 13 2023 - Dec 15 2023 (pp. 7088-7093). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Electrical Fault Localisation Over a Distributed Parameter Transmission Line
2023 (English)In: 2023 62nd IEEE Conference on Decision and Control, CDC 2023, Institute of Electrical and Electronics Engineers (IEEE) , 2023, p. 7088-7093Conference paper, Published paper (Refereed)
Abstract [en]

Motivated by the need to localise faults along electrical power lines, this paper adopts a frequency-domain approach to parameter estimation for an infinite-dimensional linear dynamical system with one spatial variable. Since the time of the fault is unknown, and voltages and currents are measured at only one end of the line, distance information must be extracted from the post-fault transients. To properly account for high-frequency transient behaviour, the line dynamics is modelled directly by the Telegrapher's equation, rather than the more commonly used lumped-parameter approximations. First, the governing equations are non-dimensionalised to avoid ill-conditioning. A closed-form expression for the transfer function is then derived. Finally, nonlinear least-squares optimisation is employed to search for the fault location. Requirements on fault bandwidth, sensor bandwidth and simulation time-step are also presented. The result is a novel end-to-end algorithm for data generation and fault localisation, the effectiveness of which is demonstrated via simulation.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023
National Category
Energy Engineering
Identifiers
urn:nbn:se:kth:diva-343711 (URN)10.1109/CDC49753.2023.10383452 (DOI)001166433805128 ()2-s2.0-85184823148 (Scopus ID)
Conference
62nd IEEE Conference on Decision and Control, CDC 2023, Singapore, Singapore, Dec 13 2023 - Dec 15 2023
Note

Part of ISBN 9798350301243

QC 20240222

Available from: 2024-02-22 Created: 2024-02-22 Last updated: 2025-03-19Bibliographically approved
Selvaratnam, D., Farokhi, F., Shames, I. & Sandberg, H. (2023). Manipulating the Posterior Support of a Discrete Bayesian Estimator Under Full Sensor Control. In: : . Paper presented at 22nd IFAC World Congress, Yokohama, Japan, Jul 9 2023 - Jul 14 2023 (pp. 252-257). Elsevier B.V.
Open this publication in new window or tab >>Manipulating the Posterior Support of a Discrete Bayesian Estimator Under Full Sensor Control
2023 (English)Conference paper, Published paper (Refereed)
Abstract [en]

The asymptotic implausibility problem is introduced from the perspective of an adversary that seeks to drive the belief of a recursive Bayesian estimator away from a particular set of parameter values. It is assumed that the adversary controls all sensors informing the estimator, and can transmit false measurements stochastically according to a fixed distribution of its choice. First, we outline a method for verifying whether a given distribution solves the problem. We then consider the class of spoofing attacks, and show that the asymptotic implausibility problem has a solution if and only if it can be solved by a spoofing attack. Attention is restricted to finite parameter and observation spaces.

Place, publisher, year, edition, pages
Elsevier B.V., 2023
Keywords
Bayesian Estimation, Cyber-Physical Systems, Network Security, Network Systems, Resilient Control Systems, Signal Processing
National Category
Control Engineering
Identifiers
urn:nbn:se:kth:diva-343696 (URN)10.1016/j.ifacol.2023.10.1577 (DOI)2-s2.0-85184960090 (Scopus ID)
Conference
22nd IFAC World Congress, Yokohama, Japan, Jul 9 2023 - Jul 14 2023
Note

Part of ISBN 9781713872344

QC 20240222

Available from: 2024-02-22 Created: 2024-02-22 Last updated: 2024-02-22Bibliographically approved
Selvaratnam, D., Cantoni, M., Davoren, J. M. & Shames, I. (2022). MITL Verification Under Timing Uncertainty. In: Sergiy Bogomolov, David Parker (Ed.), FORMATS 2022: Formal Modeling and Analysis of Timed Systems. Paper presented at FORMATS'22 12-17 September 2022, Warsaw, Poland (pp. 136-152). Cham: Springer, 13465
Open this publication in new window or tab >>MITL Verification Under Timing Uncertainty
2022 (English)In: FORMATS 2022: Formal Modeling and Analysis of Timed Systems / [ed] Sergiy Bogomolov, David Parker, Cham: Springer, 2022, Vol. 13465, p. 136-152Conference paper, Published paper (Refereed)
Abstract [en]

A Metric Interval Temporal Logic (MITL) verification algorithm is presented. It verifies continuous-time signals without relying on high frequency sampling. Instead, it is assumed that collections of over- and under-approximating intervals are available for the times at which the individual atomic propositions hold true for a given signal. These are combined inductively to generate corresponding over- and under-approximations for the specified MITL formula. The gap between the over- and under-approximations reflects timing uncertainty with respect to the signal being verified, thereby providing a quantitative measure of the conservativeness of the algorithm. The verification is exact when the over-approximations for the atomic propositions coincide with the under-approximations. Numerical examples are provided to illustrate.

Place, publisher, year, edition, pages
Cham: Springer, 2022
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 13465
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-318617 (URN)10.1007/978-3-031-15839-1_8 (DOI)000876812600008 ()
Conference
FORMATS'22 12-17 September 2022, Warsaw, Poland
Note

QC 20220922

Part of proceedings: ISBN 978-3-031-15839-1

Available from: 2022-09-21 Created: 2022-09-21 Last updated: 2023-09-21Bibliographically approved
Selvaratnam, D., Cantoni, M., Davoren, J. & Shames, I. (2022). Sampling polynomial trajectories for LTL verification. Theoretical Computer Science, 897, 135-163
Open this publication in new window or tab >>Sampling polynomial trajectories for LTL verification
2022 (English)In: Theoretical Computer Science, ISSN 0304-3975, E-ISSN 1879-2294, Vol. 897, p. 135-163Article in journal (Refereed) Published
Abstract [en]

This paper concerns the verification of continuous-time polynomial spline trajectories against linear temporal logic specifications (LTL without 'next’). Each atomic proposition is assumed to represent a state space region described by a multivariate polynomial inequality. The proposed approach samples a trajectory strategically, to capture every one of its region transitions. This yields a discrete word called a trace, which is amenable to established formal methods for path checking. The original continuous-time trajectory is shown to satisfy the specification if and only if its trace does. General topological conditions on the sample points are derived that ensure a trace is recorded for arbitrary continuous paths, given arbitrary region descriptions. Using techniques from computer algebra, a trace generation algorithm is developed to satisfy these conditions when the path and region boundaries are defined by polynomials. The proposed PolyTrace algorithm has polynomial complexity in the number of atomic propositions, and is guaranteed to produce a trace of any polynomial path. Its performance is demonstrated via numerical examples and a case study from robotics.

Place, publisher, year, edition, pages
Elsevier, 2022
Keywords
MITL, Runtime verification, Dense-time, Continuous, Trace, Root isolation
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-318614 (URN)10.1016/j.tcs.2021.10.024 (DOI)000721184700007 ()2-s2.0-85118890712 (Scopus ID)
Note

QC 20220922

Available from: 2022-09-21 Created: 2022-09-21 Last updated: 2022-09-22Bibliographically approved
Shames, I., Selvaratnam, D. & Manton, J. H. (2020). Online Optimization Using Zeroth Order Oracles. IEEE Control Systems Letters, 4(1), 31-36
Open this publication in new window or tab >>Online Optimization Using Zeroth Order Oracles
2020 (English)In: IEEE Control Systems Letters, E-ISSN 2475-1456, Vol. 4, no 1, p. 31-36Article in journal (Refereed) Published
Abstract [en]

This letter considers the iterative numerical optimization of time-varying cost functions where no gradient information is available at each iteration. In this case, the proposed algorithm estimates a directional derivative by finite differences. The main contributions are the derivation of error bounds for such algorithms and proposal of optimal algorithm parameter values, e.g., step-sizes, for strongly convex cost functions. The algorithm is applied to tackle a source localization problem using a sensing agent where the source actively evades the agent. Numerical examples are provided to illustrate the theoretical results.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020
National Category
Control Engineering
Research subject
Applied and Computational Mathematics, Optimization and Systems Theory
Identifiers
urn:nbn:se:kth:diva-318618 (URN)10.1109/lcsys.2019.2921593 (DOI)000619281800006 ()2-s2.0-85067888745 (Scopus ID)
Note

QC 20220922

Available from: 2022-09-21 Created: 2022-09-21 Last updated: 2023-08-25Bibliographically approved
Selvaratnam, D. (2019). Efficient algorithms for autonomous agents facing uncertainty. (Doctoral dissertation). Melbourne: Minerva Access
Open this publication in new window or tab >>Efficient algorithms for autonomous agents facing uncertainty
2019 (English)Doctoral thesis, monograph (Other academic)
Place, publisher, year, edition, pages
Melbourne: Minerva Access, 2019
National Category
Control Engineering
Research subject
Applied and Computational Mathematics, Optimization and Systems Theory
Identifiers
urn:nbn:se:kth:diva-318625 (URN)
Public defence
, Melbourne
Supervisors
Note

QC 20220926

Available from: 2022-09-26 Created: 2022-09-22 Last updated: 2022-09-26Bibliographically approved
Selvaratnam, D., Shames, I., Manton, J. H. & Zamani, M. (2018). Numerical Optimisation of Time-Varying Strongly Convex Functions Subject to Time-Varying Constraints. In: 2018 IEEE Conference on Decision and Control (CDC): . Paper presented at 57th IEEE Conference on Decision and Control, CDC 2018, Miami, 17 December 2018, through 19 December 2018 (pp. 849-854). Institute of Electrical and Electronics Engineers (IEEE), Article ID 8619392.
Open this publication in new window or tab >>Numerical Optimisation of Time-Varying Strongly Convex Functions Subject to Time-Varying Constraints
2018 (English)In: 2018 IEEE Conference on Decision and Control (CDC), Institute of Electrical and Electronics Engineers (IEEE), 2018, p. 849-854, article id 8619392Conference paper, Published paper (Refereed)
Abstract [en]

This paper analyses the performance of projected gradient descent on optimisation problems with cost functions and constraints that vary in discrete time. Specifically, strongly convex cost functions with Lipschitz gradient, and a sequence of convex constraints are assumed. Error bounds and suboptimality bounds are derived for a variety of cases, which show convergence to a steady-state. Conditions on the constraint sequence are also presented for guaranteeing finite-time feasibility, and for bounding the distance between successive minimisers. Numerical examples are then presented to validate the analytical results.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2018
Series
Proceedings of the IEEE Conference on Decision and Control, ISSN 0743-1546 ; 2018-December
National Category
Control Engineering
Research subject
Applied and Computational Mathematics, Optimization and Systems Theory
Identifiers
urn:nbn:se:kth:diva-318619 (URN)10.1109/cdc.2018.8619392 (DOI)2-s2.0-85062165100 (Scopus ID)
Conference
57th IEEE Conference on Decision and Control, CDC 2018, Miami, 17 December 2018, through 19 December 2018
Note

QC 20220922

Part of proceedings: ISBN 978-1-5386-1395-5

Available from: 2022-09-21 Created: 2022-09-21 Last updated: 2022-09-22Bibliographically approved
Farokhi, F., Selvaratnam, D. & Shames, I. (2018). Security Analysis of Quantized Bayesian Estimators. In: The 23rd International Symposium on Mathematical Theory of Networks and Systems: . Paper presented at The 23rd International Symposium on Mathematical Theory of Networks and Systems.
Open this publication in new window or tab >>Security Analysis of Quantized Bayesian Estimators
2018 (English)In: The 23rd International Symposium on Mathematical Theory of Networks and Systems, 2018Conference paper, Oral presentation with published abstract (Refereed)
National Category
Signal Processing
Research subject
Information and Communication Technology
Identifiers
urn:nbn:se:kth:diva-318620 (URN)
Conference
The 23rd International Symposium on Mathematical Theory of Networks and Systems
Note

QC 20221003

Available from: 2022-09-22 Created: 2022-09-22 Last updated: 2022-10-03Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-3329-436X

Search in DiVA

Show all publications