Compositional Safety Analysis using Barrier Certificates

Size: px
Start display at page:

Download "Compositional Safety Analysis using Barrier Certificates"

Transcription

1 Compositional Safety Analysis using Barrier Certificates Department of Electronic Systems Aalborg University Denmark November 29, 2011

2 Objective: To verify that a continuous dynamical system is safe. Definition We say that a system Γ = (f, X, X 0, X u, D) is safe if there are no unsafe trajectories.

3 Objective: To verify that a continuous dynamical system is safe. Definition We say that a system Γ = (f, X, X 0, X u, D) is safe if there are no unsafe trajectories. X 0 X u

4 Objective: To verify that a continuous dynamical system is safe. Definition We say that a system Γ = (f, X, X 0, X u, D) is safe if there are no unsafe trajectories. X 0 X u

5 Objective: To verify that a continuous dynamical system is safe. Definition We say that a system Γ = (f, X, X 0, X u, D) is safe if there are no unsafe trajectories. X 0 X u

6 Objective: To verify that a continuous dynamical system is safe. Definition We say that a system Γ = (f, X, X 0, X u, D) is safe if there are no unsafe trajectories. X X 0 X u

7 Example: Ensure that the rotor speed stays within some specified bounds. ω r t

8 Example: Ensure that the rotor speed stays within some specified bounds. ω r t For the wind turbine the wind is a unknown but bounded disturbance. v w Wind Turbine Model ω r

9 Example: Ensure that the rotor speed stays within some specified bounds. ω r t For the wind turbine the wind is a unknown but bounded disturbance. ṽ w v w Wind Turbine Model ω r

10 Proposition (Strict barrier certificate) Let Γ = (f, X, X 0, X u, D) be given. If there exists a differentiable function B : R n R satisfying B(x) 0 x X 0, B(x) > 0 x X u, and B x (x)f (x, d) < 0 (x, d) X b D, where X b {x X B(x) = 0}. Then the system Γ is safe. (1a) (1b) (1c) X 0 B(x) 0 X X b X u B(x) > 0

11 Proposition (Strict barrier certificate) Let Γ = (f, X, X 0, X u, D) be given. If there exists a differentiable function B : R n R satisfying B(x) 0 x X 0, B(x) > 0 x X u, and B x (x)f (x, d) < 0 (x, d) X b D, where X b {x X B(x) = 0}. Then the system Γ is safe. (1a) (1b) (1c) X 0 B(x) 0 X X b X u B(x) > 0

12 Corollary (Weak barrier certificate) Let Γ = (f, X, X 0, X u, D) be given. If there exists a differentiable function B : R n R satisfying Then the system Γ is safe. B(x) 0 x X 0, B(x) > 0 x X u, and B (x)f (x, d) 0 (x, d) X D. x (2c) (2a) (2b) X 0 B(x) 0 X X u B(x) > 0

13 Suppose the following inequalities are satisfied (to be understood coordinatewise): X {x R n g X (x) 0}, X 0 {x R n g X0 (x) 0}, X u {x R n g Xu (x) 0}, D {d R m g D (d) 0}, (3a) (3b) (3c) (3d) where g X, g X0, g Xu, g D are polynomial maps

14 A polynomial p P n,d is called sum of squares (SOS) if p = k pi 2 (4) i=1 for some polynomials p i P n with i = 1,..., k.

15 A polynomial p P n,d is called sum of squares (SOS) if p = k pi 2 (4) i=1 for some polynomials p i P n with i = 1,..., k. Let α i,j P n,d and w j R. An SOS programming problem is minimize (c 1,...,c k ) R k k w j c j (5) j=1 subject to (6) J α i,0 + α i,j c j is SOS i = 1,..., l. (7) j=1

16 Weak barrier certificate can be solved directly, via the following SOS programming problem. Corollary Let the system Γ = (f, X, X 0, X u, D) and polynomials g be given, and let ɛ 1 > 0. If there exist B P n, λ X0 (Pn S ) k X 0, λ Xu (Pn S ) k Xu, λ X (Pn+m) S k X, and λ D (Pn+m) S k D such that B λ T X 0 g X0, B ɛ 1 λ T X u g Xu, and B x f λt X g X λ T Dg D are sum of squares. Then the system Γ is safe. (8a) (8b) (8c)

17 w 1 d 2 Σ 1 Σ 2 d 1 w 2 w 3 w 4 Σ 3 d 3 Aim: Solve independent optimization problems for each subsystem. Combine the results of the subproblems in a master problem to prove the safety of the interconnected system.

18 w 1 d 2 Σ 1 Σ 2 d 1 w 2 w 3 w 4 Σ 3 d 3 Aim: Solve independent optimization problems for each subsystem. Combine the results of the subproblems in a master problem to prove the safety of the interconnected system. Outlook: It is possible to decouple some optimization problems via dual decomposition. Problem: The subsystems are coupled by signals w i : R 0 R q i.

19 Corollary Let Γ = ({f i }, {X i }, {X 0,i }, {X u,i }, {D i }) be given. If there exist differentiable functions B i : R n i R for i = 1,..., I such that B i (x i ) 0 x i X 0,i, (9a) i B i (x i ) > 0 x i X u,i, i Then the system Γ is safe. i B i x i (x i )f i (x i, d i, w in,i ) < 0 w in,i W in,i, x i X b,i, d i D i. (9b) (9c)

20 Proposition Let Γ = ({f i }, {X i }, {X 0,i }, {X u,i }, {D i }) be given. If there exist differentiable functions B i : R n i R and functions γ 0,i : R n i R, γ u,i : R n i R, and γ w,i : R q i + m i R for i = 1,..., I such that B i (x i ) + γ 0,i 0 x i X 0,i, B i (x i ) γ u,i > 0 x i X u,i, B i (x i )f i (x i, d i, w in,i ) < γ w,i (w in,i, h i (x i )) x i for all w in,i W in,i, x i X b,i, d i D i, (10a) (10b) and for all w in,i W in,i, x i X i γ 0,i 0, γ u,i 0, i i i γ w,i (w in,i, h i (x i )) 0. Then the system Γ is safe.

21 minimize f (x, y) = f 1 (x 1, y) + f 2 (x 2, y) subject to x 1 C 1, x 2 C 2, h 1 (x 1, y) + h 2 (x 2, y) 0. (11)

22 minimize f (x, y) = f 1 (x 1, y) + f 2 (x 2, y) subject to x 1 C 1, x 2 C 2, h 1 (x 1, y) + h 2 (x 2, y) 0. (11) Replace y with either y 1 or y 2 and add the constraint y 1 = y 2 minimize f (x, y) = f 1 (x 1, y 1 ) + f 2 (x 2, y 2 ) subject to x 1 C 1, x 2 C 2, y 1 = y 2, h 1 (x 1, y 1 ) + h 2 (x 2, y 2 ) 0.

23 minimize f (x, y) = f 1 (x 1, y) + f 2 (x 2, y) subject to x 1 C 1, x 2 C 2, h 1 (x 1, y) + h 2 (x 2, y) 0. (11) Replace y with either y 1 or y 2 and add the constraint y 1 = y 2 minimize f (x, y) = f 1 (x 1, y 1 ) + f 2 (x 2, y 2 ) subject to x 1 C 1, x 2 C 2, y 1 = y 2, h 1 (x 1, y 1 ) + h 2 (x 2, y 2 ) 0. Notice that f 1 and f 2 have no shared variables. The Lagrangian becomes L(x 1, y 1, x 2, y 2, λ 1, λ 2 ) = f 1 (x 1, y 1 ) + f 2 (x 2, y 2 ) + λ T 1 (y 1 y 2 ) + λ 2 (h 1 (x 1, y 1 ) + h 2 (x 2, y 2 )). (12)

24 Lagrangian: L(x 1, y 1, x 2, y 2, λ 1, λ 2 ) = f 1 (x 1, y 1 ) + f 2 (x 2, y 2 ) + λ T 1 (y 1 y 2 ) + λ 2 (h 1 (x 1, y 1 ) + h 2 (x 2, y 2 )). (13)

25 Lagrangian: L(x 1, y 1, x 2, y 2, λ 1, λ 2 ) = f 1 (x 1, y 1 ) + f 2 (x 2, y 2 ) + λ T 1 (y 1 y 2 ) The dual function becomes where ( ϕ 1 (λ) = inf x 1,y 1 + λ 2 (h 1 (x 1, y 1 ) + h 2 (x 2, y 2 )). (13) ϕ(λ 1, λ 2 ) = ϕ 1 (λ 1, λ 2 ) + ϕ 2 (λ 1, λ 2 ), (14) ) f 1 (x 1, y 1 ) + λ T 1 y 1 + λ 2 h 1 (x 1, y 1 ) ) ( ϕ 2 (λ) = inf f 2 (x 2, y 2 ) λ T x 2,y 1 y 2 + λ 2 h 2 (x 2, y 2 ) 2 ϕ 1 and ϕ 2 can be solved independently., (15a). (15b)

26 Lagrangian: L(x 1, y 1, x 2, y 2, λ 1, λ 2 ) = f 1 (x 1, y 1 ) + f 2 (x 2, y 2 ) + λ T 1 (y 1 y 2 ) The dual function becomes where ( ϕ 1 (λ) = inf x 1,y 1 + λ 2 (h 1 (x 1, y 1 ) + h 2 (x 2, y 2 )). (13) ϕ(λ 1, λ 2 ) = ϕ 1 (λ 1, λ 2 ) + ϕ 2 (λ 1, λ 2 ), (14) ) f 1 (x 1, y 1 ) + λ T 1 y 1 + λ 2 h 1 (x 1, y 1 ) ) ( ϕ 2 (λ) = inf f 2 (x 2, y 2 ) λ T x 2,y 1 y 2 + λ 2 h 2 (x 2, y 2 ) 2 ϕ 1 and ϕ 2 can be solved independently. The dual problem is, (15a). (15b) maximize ϕ 1 (λ 1, λ 2 ) + ϕ 2 (λ 1, λ 2 ), (16)

27 Algorithm 1 Initialization: Let k = 0, define the step size α k, and choose some λ (0) 1, λ(0) 2, ɛ > 0. 2 Solve subproblems: Solve ϕ 1 (λ) to find x (k) 1 and ȳ (k) 1, solve ϕ 2 (λ) to find x (k) 2 and ȳ (k) 2. 3 Update dual variables: λ (k+1) 1 := λ (k) 1 α k (ȳ (k) 2 ȳ (k) 1 ), λ (k+1) 2 := λ (k) 2 + α k (h 1 ( x (k) 1, ȳ (k) 1 ) + h 2 ( x (k) 2, ȳ (k) 2 )), k := k + 1. If λ (k+1) 1 λ (k) 1 > ɛ, then go to step 2. Otherwise, terminate the algorithm.

28 v w β v t Aerodynamics Tower T r F t T g Drive train ω r shaft is decele to sway too m accepted by th this does not h are modeled as explanation. [ vr ω r,f ] = [ [ ] [ vr cvr v = r + (v w v t ) ω r,f ] [ ] Figure 3: Wind turbine modeled Tr as an interconnection of three subsystems., h c ωr,f ω r,f + ω 1 =, r F t [ ] [ 1 ] vt = M t (F t B t v t k t x t ) ẋ t The function to be maximized is ϕ(λ) = i ϕi(λ), which has a gradient g(λ (k) ) =, h 2 = v t v t i gi(λ(k) ). The vector of multipliers is updated according to (43), and is 1 ω ( r J r (T r k r θ B r (ω r 1 λ (k+1) = λ (k) α kg T N g ω g )) λ (k)). (51) θ = ω r 1 N g ω g ( ), h 3 = ω r, ω 1 g J g N g (k r θ + B r (ω r 1 N g ω g )) T g 1 It is seen that if i γ1,i 0 is violated, then λ(k+1) 1 > λ (k) 1, as the first element of g(λ (k) ) is negative. This puts a larger penalty on the violation of the constraint through the dual variable λ 1. T r = ( c 11 + c 12 ω r,f + c 13 v r + c 14 ω 2 r,f + c 15v 2 r + c 16 ω r,f v r ) v 3 r 5. EXAMPLE [ vt [ p1 h 1 = ẋ t ] = p 2 [ 1 M h 2 = v t ω r θ = ω g where F t = (c 21 + c 22 ω r,f + c 23 v r + c 24 v 2 r + c 25 ω r,f v r )v 2 r + c 26 + c 27 ω 2 r,f h 3 = ω r 1 J p 1 = ( c 1 +c p 2 = (c 2 + c

29 Objective: Show that an emergency shutdown of the wind turbine does not cause the tower to deflect too much and does not make the drive train twist too much.

30 Objective: Show that an emergency shutdown of the wind turbine does not cause the tower to deflect too much and does not make the drive train twist too much. We prove via the compositional weak barrier certificate method that the polynomial B(x) = ω 2 r θ ω2 r θ ω 2 r ω r ω g ω 2 g ω g θ θ v 2 t x t 0.256v 2 t v t x 2 t 2.15v t x t v t 0.755x 2 t x t v 2 r v r ω r,f 0.107v r ω 2 r,f ω r,f is nonpositive on the initial set and positive on the unsafe set. Hence, the system is safe.

Safe Operation and Emergency Shutdown of Wind Turbines

Safe Operation and Emergency Shutdown of Wind Turbines Safe Operation and Emergency Shutdown of Wind Turbines Andreas Søndergaard Pedersen Christian Sigge Steiniche Intelligent Autonomous Systems, Master Thesis May 212 Department of Electronic Systems Aalborg

More information

Lagrange duality. The Lagrangian. We consider an optimization program of the form

Lagrange duality. The Lagrangian. We consider an optimization program of the form Lagrange duality Another way to arrive at the KKT conditions, and one which gives us some insight on solving constrained optimization problems, is through the Lagrange dual. The dual is a maximization

More information

Adaptive Control of Variable-Speed Variable-Pitch Wind Turbines Using RBF Neural Network

Adaptive Control of Variable-Speed Variable-Pitch Wind Turbines Using RBF Neural Network Schulich School of Engineering Department of Mechanical and Manufacturing Engineering Adaptive Control of Variable-Speed Variable-Pitch Wind Turbines Using RBF Neural Network By: Hamidreza Jafarnejadsani,

More information

3.10 Lagrangian relaxation

3.10 Lagrangian relaxation 3.10 Lagrangian relaxation Consider a generic ILP problem min {c t x : Ax b, Dx d, x Z n } with integer coefficients. Suppose Dx d are the complicating constraints. Often the linear relaxation and the

More information

Lecture 24 November 27

Lecture 24 November 27 EE 381V: Large Scale Optimization Fall 01 Lecture 4 November 7 Lecturer: Caramanis & Sanghavi Scribe: Jahshan Bhatti and Ken Pesyna 4.1 Mirror Descent Earlier, we motivated mirror descent as a way to improve

More information

Lecture 18: Optimization Programming

Lecture 18: Optimization Programming Fall, 2016 Outline Unconstrained Optimization 1 Unconstrained Optimization 2 Equality-constrained Optimization Inequality-constrained Optimization Mixture-constrained Optimization 3 Quadratic Programming

More information

4. Algebra and Duality

4. Algebra and Duality 4-1 Algebra and Duality P. Parrilo and S. Lall, CDC 2003 2003.12.07.01 4. Algebra and Duality Example: non-convex polynomial optimization Weak duality and duality gap The dual is not intrinsic The cone

More information

Primal/Dual Decomposition Methods

Primal/Dual Decomposition Methods Primal/Dual Decomposition Methods Daniel P. Palomar Hong Kong University of Science and Technology (HKUST) ELEC5470 - Convex Optimization Fall 2018-19, HKUST, Hong Kong Outline of Lecture Subgradients

More information

Constrained Optimization and Distributed Computation Based Car-Following Control of A Connected and Autonomous Vehicle Platoon

Constrained Optimization and Distributed Computation Based Car-Following Control of A Connected and Autonomous Vehicle Platoon Constrained Optimization and Distributed Computation Based Car-Following Control of A Connected and Autonomous Vehicle Platoon Siyuan Gong a, Jinglai Shen b, Lili Du a ldu3@iit.edu a: Illinois Institute

More information

14. Duality. ˆ Upper and lower bounds. ˆ General duality. ˆ Constraint qualifications. ˆ Counterexample. ˆ Complementary slackness.

14. Duality. ˆ Upper and lower bounds. ˆ General duality. ˆ Constraint qualifications. ˆ Counterexample. ˆ Complementary slackness. CS/ECE/ISyE 524 Introduction to Optimization Spring 2016 17 14. Duality ˆ Upper and lower bounds ˆ General duality ˆ Constraint qualifications ˆ Counterexample ˆ Complementary slackness ˆ Examples ˆ Sensitivity

More information

Agenda. 1 Duality for LP. 2 Theorem of alternatives. 3 Conic Duality. 4 Dual cones. 5 Geometric view of cone programs. 6 Conic duality theorem

Agenda. 1 Duality for LP. 2 Theorem of alternatives. 3 Conic Duality. 4 Dual cones. 5 Geometric view of cone programs. 6 Conic duality theorem Agenda 1 Duality for LP 2 Theorem of alternatives 3 Conic Duality 4 Dual cones 5 Geometric view of cone programs 6 Conic duality theorem 7 Examples Lower bounds on LPs By eliminating variables (if needed)

More information

5.6 Penalty method and augmented Lagrangian method

5.6 Penalty method and augmented Lagrangian method 5.6 Penalty method and augmented Lagrangian method Consider a generic NLP problem min f (x) s.t. c i (x) 0 i I c i (x) = 0 i E (1) x R n where f and the c i s are of class C 1 or C 2, and I and E are the

More information

Distributed Optimization: Analysis and Synthesis via Circuits

Distributed Optimization: Analysis and Synthesis via Circuits Distributed Optimization: Analysis and Synthesis via Circuits Stephen Boyd Prof. S. Boyd, EE364b, Stanford University Outline canonical form for distributed convex optimization circuit intepretation primal

More information

Numerical Optimization

Numerical Optimization Constrained Optimization - Algorithms Computer Science and Automation Indian Institute of Science Bangalore 560 012, India. NPTEL Course on Consider the problem: Barrier and Penalty Methods x X where X

More information

Maximum likelihood estimation

Maximum likelihood estimation Maximum likelihood estimation Guillaume Obozinski Ecole des Ponts - ParisTech Master MVA Maximum likelihood estimation 1/26 Outline 1 Statistical concepts 2 A short review of convex analysis and optimization

More information

Congestion Management in a Smart Grid via Shadow Prices

Congestion Management in a Smart Grid via Shadow Prices Congestion Management in a Smart Grid via Shadow Prices Benjamin Biegel, Palle Andersen, Jakob Stoustrup, Jan Bendtsen Systems of Systems October 23, 2012 1 This presentation use of distributed Receding

More information

Convex Optimization and SVM

Convex Optimization and SVM Convex Optimization and SVM Problem 0. Cf lecture notes pages 12 to 18. Problem 1. (i) A slab is an intersection of two half spaces, hence convex. (ii) A wedge is an intersection of two half spaces, hence

More information

CS-E4830 Kernel Methods in Machine Learning

CS-E4830 Kernel Methods in Machine Learning CS-E4830 Kernel Methods in Machine Learning Lecture 3: Convex optimization and duality Juho Rousu 27. September, 2017 Juho Rousu 27. September, 2017 1 / 45 Convex optimization Convex optimisation This

More information

Sequential Convex Programming

Sequential Convex Programming Sequential Convex Programming sequential convex programming alternating convex optimization convex-concave procedure Prof. S. Boyd, EE364b, Stanford University Methods for nonconvex optimization problems

More information

Motivation. Lecture 2 Topics from Optimization and Duality. network utility maximization (NUM) problem:

Motivation. Lecture 2 Topics from Optimization and Duality. network utility maximization (NUM) problem: CDS270 Maryam Fazel Lecture 2 Topics from Optimization and Duality Motivation network utility maximization (NUM) problem: consider a network with S sources (users), each sending one flow at rate x s, through

More information

Extreme Abridgment of Boyd and Vandenberghe s Convex Optimization

Extreme Abridgment of Boyd and Vandenberghe s Convex Optimization Extreme Abridgment of Boyd and Vandenberghe s Convex Optimization Compiled by David Rosenberg Abstract Boyd and Vandenberghe s Convex Optimization book is very well-written and a pleasure to read. The

More information

12. Interior-point methods

12. Interior-point methods 12. Interior-point methods Convex Optimization Boyd & Vandenberghe inequality constrained minimization logarithmic barrier function and central path barrier method feasibility and phase I methods complexity

More information

Outline. Relaxation. Outline DMP204 SCHEDULING, TIMETABLING AND ROUTING. 1. Lagrangian Relaxation. Lecture 12 Single Machine Models, Column Generation

Outline. Relaxation. Outline DMP204 SCHEDULING, TIMETABLING AND ROUTING. 1. Lagrangian Relaxation. Lecture 12 Single Machine Models, Column Generation Outline DMP204 SCHEDULING, TIMETABLING AND ROUTING 1. Lagrangian Relaxation Lecture 12 Single Machine Models, Column Generation 2. Dantzig-Wolfe Decomposition Dantzig-Wolfe Decomposition Delayed Column

More information

Algorithms for constrained local optimization

Algorithms for constrained local optimization Algorithms for constrained local optimization Fabio Schoen 2008 http://gol.dsi.unifi.it/users/schoen Algorithms for constrained local optimization p. Feasible direction methods Algorithms for constrained

More information

Constrained Optimization and Lagrangian Duality

Constrained Optimization and Lagrangian Duality CIS 520: Machine Learning Oct 02, 2017 Constrained Optimization and Lagrangian Duality Lecturer: Shivani Agarwal Disclaimer: These notes are designed to be a supplement to the lecture. They may or may

More information

Lecture Notes: Introduction to IDF and ATC

Lecture Notes: Introduction to IDF and ATC Lecture Notes: Introduction to IDF and ATC James T. Allison April 5, 2006 This lecture is an introductory tutorial on the mechanics of implementing two methods for optimal system design: the individual

More information

Introduction to Mathematical Programming IE406. Lecture 10. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 10. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 10 Dr. Ted Ralphs IE406 Lecture 10 1 Reading for This Lecture Bertsimas 4.1-4.3 IE406 Lecture 10 2 Duality Theory: Motivation Consider the following

More information

Algorithms for Nonsmooth Optimization

Algorithms for Nonsmooth Optimization Algorithms for Nonsmooth Optimization Frank E. Curtis, Lehigh University presented at Center for Optimization and Statistical Learning, Northwestern University 2 March 2018 Algorithms for Nonsmooth Optimization

More information

5. Duality. Lagrangian

5. Duality. Lagrangian 5. Duality Convex Optimization Boyd & Vandenberghe Lagrange dual problem weak and strong duality geometric interpretation optimality conditions perturbation and sensitivity analysis examples generalized

More information

Solving large Semidefinite Programs - Part 1 and 2

Solving large Semidefinite Programs - Part 1 and 2 Solving large Semidefinite Programs - Part 1 and 2 Franz Rendl http://www.math.uni-klu.ac.at Alpen-Adria-Universität Klagenfurt Austria F. Rendl, Singapore workshop 2006 p.1/34 Overview Limits of Interior

More information

10 Numerical methods for constrained problems

10 Numerical methods for constrained problems 10 Numerical methods for constrained problems min s.t. f(x) h(x) = 0 (l), g(x) 0 (m), x X The algorithms can be roughly divided the following way: ˆ primal methods: find descent direction keeping inside

More information

Lecture Note 18: Duality

Lecture Note 18: Duality MATH 5330: Computational Methods of Linear Algebra 1 The Dual Problems Lecture Note 18: Duality Xianyi Zeng Department of Mathematical Sciences, UTEP The concept duality, just like accuracy and stability,

More information

Optimal Control. Lecture 3. Optimal Control of Discrete Time Dynamical Systems. John T. Wen. January 22, 2004

Optimal Control. Lecture 3. Optimal Control of Discrete Time Dynamical Systems. John T. Wen. January 22, 2004 Optimal Control Lecture 3 Optimal Control of Discrete Time Dynamical Systems John T. Wen January, 004 Outline optimization of a general multi-stage discrete time dynamical systems special case: discrete

More information

Introduction to System Partitioning and Coordination

Introduction to System Partitioning and Coordination Introduction to System Partitioning and Coordination James T. Allison ME 555 April 4, 2005 University of Michigan Department of Mechanical Engineering Your Subsystem Optimization Problems are Complete

More information

Paul Schrimpf. October 17, UBC Economics 526. Constrained optimization. Paul Schrimpf. First order conditions. Second order conditions

Paul Schrimpf. October 17, UBC Economics 526. Constrained optimization. Paul Schrimpf. First order conditions. Second order conditions UBC Economics 526 October 17, 2012 .1.2.3.4 Section 1 . max f (x) s.t. h(x) = c f : R n R, h : R n R m Draw picture of n = 2 and m = 1 At optimum, constraint tangent to level curve of function Rewrite

More information

HW1 solutions. 1. α Ef(x) β, where Ef(x) is the expected value of f(x), i.e., Ef(x) = n. i=1 p if(a i ). (The function f : R R is given.

HW1 solutions. 1. α Ef(x) β, where Ef(x) is the expected value of f(x), i.e., Ef(x) = n. i=1 p if(a i ). (The function f : R R is given. HW1 solutions Exercise 1 (Some sets of probability distributions.) Let x be a real-valued random variable with Prob(x = a i ) = p i, i = 1,..., n, where a 1 < a 2 < < a n. Of course p R n lies in the standard

More information

Quasi-Newton methods for minimization

Quasi-Newton methods for minimization Quasi-Newton methods for minimization Lectures for PHD course on Numerical optimization Enrico Bertolazzi DIMS Universitá di Trento November 21 December 14, 2011 Quasi-Newton methods for minimization 1

More information

Algorithms for Constrained Optimization

Algorithms for Constrained Optimization 1 / 42 Algorithms for Constrained Optimization ME598/494 Lecture Max Yi Ren Department of Mechanical Engineering, Arizona State University April 19, 2015 2 / 42 Outline 1. Convergence 2. Sequential quadratic

More information

Lecture 6 Verification of Hybrid Systems

Lecture 6 Verification of Hybrid Systems Lecture 6 Verification of Hybrid Systems Ufuk Topcu Nok Wongpiromsarn Richard M. Murray AFRL, 25 April 2012 Outline: A hybrid system model Finite-state abstractions and use of model checking Deductive

More information

Distributed and Real-time Predictive Control

Distributed and Real-time Predictive Control Distributed and Real-time Predictive Control Melanie Zeilinger Christian Conte (ETH) Alexander Domahidi (ETH) Ye Pu (EPFL) Colin Jones (EPFL) Challenges in modern control systems Power system: - Frequency

More information

Optimization-based Modeling and Analysis Techniques for Safety-Critical Software Verification

Optimization-based Modeling and Analysis Techniques for Safety-Critical Software Verification Optimization-based Modeling and Analysis Techniques for Safety-Critical Software Verification Mardavij Roozbehani Eric Feron Laboratory for Information and Decision Systems Department of Aeronautics and

More information

Lagrange Relaxation: Introduction and Applications

Lagrange Relaxation: Introduction and Applications 1 / 23 Lagrange Relaxation: Introduction and Applications Operations Research Anthony Papavasiliou 2 / 23 Contents 1 Context 2 Applications Application in Stochastic Programming Unit Commitment 3 / 23

More information

Deterministic Dynamic Programming

Deterministic Dynamic Programming Deterministic Dynamic Programming 1 Value Function Consider the following optimal control problem in Mayer s form: V (t 0, x 0 ) = inf u U J(t 1, x(t 1 )) (1) subject to ẋ(t) = f(t, x(t), u(t)), x(t 0

More information

Safety Verification of Hybrid Systems Using Barrier Certificates

Safety Verification of Hybrid Systems Using Barrier Certificates Safety Verification of Hybrid Systems Using Barrier Certificates Stephen Prajna 1 and Ali Jadbabaie 2 1 Control and Dynamical Systems, California Institute of Technology, Pasadena, CA 91125 - USA, prajna@cds.caltech.edu

More information

Applications of Linear Programming

Applications of Linear Programming Applications of Linear Programming lecturer: András London University of Szeged Institute of Informatics Department of Computational Optimization Lecture 9 Non-linear programming In case of LP, the goal

More information

Input to state Stability

Input to state Stability Input to state Stability Mini course, Universität Stuttgart, November 2004 Lars Grüne, Mathematisches Institut, Universität Bayreuth Part IV: Applications ISS Consider with solutions ϕ(t, x, w) ẋ(t) =

More information

Lecture 8 Receding Horizon Temporal Logic Planning & Finite-State Abstraction

Lecture 8 Receding Horizon Temporal Logic Planning & Finite-State Abstraction Lecture 8 Receding Horizon Temporal Logic Planning & Finite-State Abstraction Ufuk Topcu Nok Wongpiromsarn Richard M. Murray AFRL, 26 April 2012 Contents of the lecture: Intro: Incorporating continuous

More information

Primal-dual Subgradient Method for Convex Problems with Functional Constraints

Primal-dual Subgradient Method for Convex Problems with Functional Constraints Primal-dual Subgradient Method for Convex Problems with Functional Constraints Yurii Nesterov, CORE/INMA (UCL) Workshop on embedded optimization EMBOPT2014 September 9, 2014 (Lucca) Yu. Nesterov Primal-dual

More information

minimize x subject to (x 2)(x 4) u,

minimize x subject to (x 2)(x 4) u, Math 6366/6367: Optimization and Variational Methods Sample Preliminary Exam Questions 1. Suppose that f : [, L] R is a C 2 -function with f () on (, L) and that you have explicit formulae for

More information

Support Vector Machines

Support Vector Machines Support Vector Machines Sridhar Mahadevan mahadeva@cs.umass.edu University of Massachusetts Sridhar Mahadevan: CMPSCI 689 p. 1/32 Margin Classifiers margin b = 0 Sridhar Mahadevan: CMPSCI 689 p.

More information

Some Inexact Hybrid Proximal Augmented Lagrangian Algorithms

Some Inexact Hybrid Proximal Augmented Lagrangian Algorithms Some Inexact Hybrid Proximal Augmented Lagrangian Algorithms Carlos Humes Jr. a, Benar F. Svaiter b, Paulo J. S. Silva a, a Dept. of Computer Science, University of São Paulo, Brazil Email: {humes,rsilva}@ime.usp.br

More information

Determination of the actual ice mass on wind turbine blades Measurements and methods for avoiding excessive icing loads and threads

Determination of the actual ice mass on wind turbine blades Measurements and methods for avoiding excessive icing loads and threads Determination of the actual ice mass on wind turbine blades Measurements and methods for avoiding excessive icing loads and threads Dr. Daniel Brenner Head of Monitoring Bosch Rexroth Monitoring Systems

More information

1 Lyapunov theory of stability

1 Lyapunov theory of stability M.Kawski, APM 581 Diff Equns Intro to Lyapunov theory. November 15, 29 1 1 Lyapunov theory of stability Introduction. Lyapunov s second (or direct) method provides tools for studying (asymptotic) stability

More information

Distributed MAP probability estimation of dynamic systems with wireless sensor networks

Distributed MAP probability estimation of dynamic systems with wireless sensor networks Distributed MAP probability estimation of dynamic systems with wireless sensor networks Felicia Jakubiec, Alejandro Ribeiro Dept. of Electrical and Systems Engineering University of Pennsylvania https://fling.seas.upenn.edu/~life/wiki/

More information

Convex Optimization M2

Convex Optimization M2 Convex Optimization M2 Lecture 3 A. d Aspremont. Convex Optimization M2. 1/49 Duality A. d Aspremont. Convex Optimization M2. 2/49 DMs DM par email: dm.daspremont@gmail.com A. d Aspremont. Convex Optimization

More information

Lagrange Relaxation and Duality

Lagrange Relaxation and Duality Lagrange Relaxation and Duality As we have already known, constrained optimization problems are harder to solve than unconstrained problems. By relaxation we can solve a more difficult problem by a simpler

More information

2.3 Linear Programming

2.3 Linear Programming 2.3 Linear Programming Linear Programming (LP) is the term used to define a wide range of optimization problems in which the objective function is linear in the unknown variables and the constraints are

More information

Robust Controller Design for Speed Control of an Indirect Field Oriented Induction Machine Drive

Robust Controller Design for Speed Control of an Indirect Field Oriented Induction Machine Drive Leonardo Electronic Journal of Practices and Technologies ISSN 1583-1078 Issue 6, January-June 2005 p. 1-16 Robust Controller Design for Speed Control of an Indirect Field Oriented Induction Machine Drive

More information

ICS-E4030 Kernel Methods in Machine Learning

ICS-E4030 Kernel Methods in Machine Learning ICS-E4030 Kernel Methods in Machine Learning Lecture 3: Convex optimization and duality Juho Rousu 28. September, 2016 Juho Rousu 28. September, 2016 1 / 38 Convex optimization Convex optimisation This

More information

UTILITY OPTIMIZATION IN A FINITE SCENARIO SETTING

UTILITY OPTIMIZATION IN A FINITE SCENARIO SETTING UTILITY OPTIMIZATION IN A FINITE SCENARIO SETTING J. TEICHMANN Abstract. We introduce the main concepts of duality theory for utility optimization in a setting of finitely many economic scenarios. 1. Utility

More information

Infinite-dimensional nonlinear predictive controller design for open-channel hydraulic systems

Infinite-dimensional nonlinear predictive controller design for open-channel hydraulic systems Infinite-dimensional nonlinear predictive controller design for open-channel hydraulic systems D. Georges, Control Systems Dept - Gipsa-lab, Grenoble INP Workshop on Irrigation Channels and Related Problems,

More information

Penalty and Barrier Methods General classical constrained minimization problem minimize f(x) subject to g(x) 0 h(x) =0 Penalty methods are motivated by the desire to use unconstrained optimization techniques

More information

More on Lagrange multipliers

More on Lagrange multipliers More on Lagrange multipliers CE 377K April 21, 2015 REVIEW The standard form for a nonlinear optimization problem is min x f (x) s.t. g 1 (x) 0. g l (x) 0 h 1 (x) = 0. h m (x) = 0 The objective function

More information

Dynamic logic for Hybrid systems

Dynamic logic for Hybrid systems Differential Dynamic Logic for Verifying Parametric Hybrid Systems by Andre Platzer presented by Hallstein Asheim Hansen 15th April 2008 Hallstein Asheim Hansen Slide 1 An example of a hybrid system: Thermostat

More information

Quiz Discussion. IE417: Nonlinear Programming: Lecture 12. Motivation. Why do we care? Jeff Linderoth. 16th March 2006

Quiz Discussion. IE417: Nonlinear Programming: Lecture 12. Motivation. Why do we care? Jeff Linderoth. 16th March 2006 Quiz Discussion IE417: Nonlinear Programming: Lecture 12 Jeff Linderoth Department of Industrial and Systems Engineering Lehigh University 16th March 2006 Motivation Why do we care? We are interested in

More information

Convex Optimization and Modeling

Convex Optimization and Modeling Convex Optimization and Modeling Duality Theory and Optimality Conditions 5th lecture, 12.05.2010 Jun.-Prof. Matthias Hein Program of today/next lecture Lagrangian and duality: the Lagrangian the dual

More information

RLT-POS: Reformulation-Linearization Technique (RLT)-based Optimization Software for Polynomial Programming Problems

RLT-POS: Reformulation-Linearization Technique (RLT)-based Optimization Software for Polynomial Programming Problems RLT-POS: Reformulation-Linearization Technique (RLT)-based Optimization Software for Polynomial Programming Problems E. Dalkiran 1 H.D. Sherali 2 1 The Department of Industrial and Systems Engineering,

More information

Autonomous Helicopter Landing A Nonlinear Output Regulation Perspective

Autonomous Helicopter Landing A Nonlinear Output Regulation Perspective Autonomous Helicopter Landing A Nonlinear Output Regulation Perspective Andrea Serrani Department of Electrical and Computer Engineering Collaborative Center for Control Sciences The Ohio State University

More information

Pacific Journal of Optimization (Vol. 2, No. 3, September 2006) ABSTRACT

Pacific Journal of Optimization (Vol. 2, No. 3, September 2006) ABSTRACT Pacific Journal of Optimization Vol., No. 3, September 006) PRIMAL ERROR BOUNDS BASED ON THE AUGMENTED LAGRANGIAN AND LAGRANGIAN RELAXATION ALGORITHMS A. F. Izmailov and M. V. Solodov ABSTRACT For a given

More information

Tutorial on Convex Optimization: Part II

Tutorial on Convex Optimization: Part II Tutorial on Convex Optimization: Part II Dr. Khaled Ardah Communications Research Laboratory TU Ilmenau Dec. 18, 2018 Outline Convex Optimization Review Lagrangian Duality Applications Optimal Power Allocation

More information

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b,

ECE Optimization for wireless networks Final. minimize f o (x) s.t. Ax = b, ECE 788 - Optimization for wireless networks Final Please provide clear and complete answers. PART I: Questions - Q.. Discuss an iterative algorithm that converges to the solution of the problem minimize

More information

Stability of Primal-Dual Gradient Dynamics and Applications to Network Optimization

Stability of Primal-Dual Gradient Dynamics and Applications to Network Optimization Stability of Primal-Dual Gradient Dynamics and Applications to Network Optimization Diego Feijer Fernando Paganini Department of Electrical Engineering, Universidad ORT Cuareim 1451, 11.100 Montevideo,

More information

Wind Turbine Control

Wind Turbine Control Wind Turbine Control W. E. Leithead University of Strathclyde, Glasgow Supergen Student Workshop 1 Outline 1. Introduction 2. Control Basics 3. General Control Objectives 4. Constant Speed Pitch Regulated

More information

Statistical Machine Learning from Data

Statistical Machine Learning from Data Samy Bengio Statistical Machine Learning from Data 1 Statistical Machine Learning from Data Support Vector Machines Samy Bengio IDIAP Research Institute, Martigny, Switzerland, and Ecole Polytechnique

More information

Penalty and Barrier Methods. So we again build on our unconstrained algorithms, but in a different way.

Penalty and Barrier Methods. So we again build on our unconstrained algorithms, but in a different way. AMSC 607 / CMSC 878o Advanced Numerical Optimization Fall 2008 UNIT 3: Constrained Optimization PART 3: Penalty and Barrier Methods Dianne P. O Leary c 2008 Reference: N&S Chapter 16 Penalty and Barrier

More information

Decentralized Formation Control including Collision Avoidance

Decentralized Formation Control including Collision Avoidance Decentralized Formation Control including Collision Avoidance Nopthawat Kitudomrat Fujita Lab Dept. of Mechanical and Control Engineering Tokyo Institute of Technology FL07-16-1 Seminar 01/10/2007 1 /

More information

Lagrangian Duality Theory

Lagrangian Duality Theory Lagrangian Duality Theory Yinyu Ye Department of Management Science and Engineering Stanford University Stanford, CA 94305, U.S.A. http://www.stanford.edu/ yyye Chapter 14.1-4 1 Recall Primal and Dual

More information

Lagrangian Duality and Convex Optimization

Lagrangian Duality and Convex Optimization Lagrangian Duality and Convex Optimization David Rosenberg New York University February 11, 2015 David Rosenberg (New York University) DS-GA 1003 February 11, 2015 1 / 24 Introduction Why Convex Optimization?

More information

Scientific Computing: An Introductory Survey

Scientific Computing: An Introductory Survey Scientific Computing: An Introductory Survey Chapter 6 Optimization Prof. Michael T. Heath Department of Computer Science University of Illinois at Urbana-Champaign Copyright c 2002. Reproduction permitted

More information

Scientific Computing: An Introductory Survey

Scientific Computing: An Introductory Survey Scientific Computing: An Introductory Survey Chapter 6 Optimization Prof. Michael T. Heath Department of Computer Science University of Illinois at Urbana-Champaign Copyright c 2002. Reproduction permitted

More information

UC Berkeley Department of Electrical Engineering and Computer Science. EECS 227A Nonlinear and Convex Optimization. Solutions 5 Fall 2009

UC Berkeley Department of Electrical Engineering and Computer Science. EECS 227A Nonlinear and Convex Optimization. Solutions 5 Fall 2009 UC Berkeley Department of Electrical Engineering and Computer Science EECS 227A Nonlinear and Convex Optimization Solutions 5 Fall 2009 Reading: Boyd and Vandenberghe, Chapter 5 Solution 5.1 Note that

More information

Scalable BETI for Variational Inequalities

Scalable BETI for Variational Inequalities Scalable BETI for Variational Inequalities Jiří Bouchala, Zdeněk Dostál and Marie Sadowská Department of Applied Mathematics, Faculty of Electrical Engineering and Computer Science, VŠB-Technical University

More information

(x k ) sequence in F, lim x k = x x F. If F : R n R is a function, level sets and sublevel sets of F are any sets of the form (respectively);

(x k ) sequence in F, lim x k = x x F. If F : R n R is a function, level sets and sublevel sets of F are any sets of the form (respectively); STABILITY OF EQUILIBRIA AND LIAPUNOV FUNCTIONS. By topological properties in general we mean qualitative geometric properties (of subsets of R n or of functions in R n ), that is, those that don t depend

More information

subject to (x 2)(x 4) u,

subject to (x 2)(x 4) u, Exercises Basic definitions 5.1 A simple example. Consider the optimization problem with variable x R. minimize x 2 + 1 subject to (x 2)(x 4) 0, (a) Analysis of primal problem. Give the feasible set, the

More information

the EL equation for the x coordinate is easily seen to be (exercise)

the EL equation for the x coordinate is easily seen to be (exercise) Physics 6010, Fall 2016 Relevant Sections in Text: 1.3 1.6 Examples After all this formalism it is a good idea to spend some time developing a number of illustrative examples. These examples represent

More information

Cyber-Attacks in the Automatic Generation Control

Cyber-Attacks in the Automatic Generation Control Cyber-Attacks in the Automatic Generation Control Maria Vrakopoulou, Peyman Mohajerin Esfahani, Kostas Margellos, John Lygeros and Göran Andersson Abstract Power systems are traditionally monitored and

More information

Outline. Scientific Computing: An Introductory Survey. Optimization. Optimization Problems. Examples: Optimization Problems

Outline. Scientific Computing: An Introductory Survey. Optimization. Optimization Problems. Examples: Optimization Problems Outline Scientific Computing: An Introductory Survey Chapter 6 Optimization 1 Prof. Michael. Heath Department of Computer Science University of Illinois at Urbana-Champaign Copyright c 2002. Reproduction

More information

Computational Optimization. Augmented Lagrangian NW 17.3

Computational Optimization. Augmented Lagrangian NW 17.3 Computational Optimization Augmented Lagrangian NW 17.3 Upcoming Schedule No class April 18 Friday, April 25, in class presentations. Projects due unless you present April 25 (free extension until Monday

More information

Convex Optimization. Newton s method. ENSAE: Optimisation 1/44

Convex Optimization. Newton s method. ENSAE: Optimisation 1/44 Convex Optimization Newton s method ENSAE: Optimisation 1/44 Unconstrained minimization minimize f(x) f convex, twice continuously differentiable (hence dom f open) we assume optimal value p = inf x f(x)

More information

EE/AA 578, Univ of Washington, Fall Duality

EE/AA 578, Univ of Washington, Fall Duality 7. Duality EE/AA 578, Univ of Washington, Fall 2016 Lagrange dual problem weak and strong duality geometric interpretation optimality conditions perturbation and sensitivity analysis examples generalized

More information

Convex Optimization and Support Vector Machine

Convex Optimization and Support Vector Machine Convex Optimization and Support Vector Machine Problem 0. Consider a two-class classification problem. The training data is L n = {(x 1, t 1 ),..., (x n, t n )}, where each t i { 1, 1} and x i R p. We

More information

EE364a Review Session 5

EE364a Review Session 5 EE364a Review Session 5 EE364a Review announcements: homeworks 1 and 2 graded homework 4 solutions (check solution to additional problem 1) scpd phone-in office hours: tuesdays 6-7pm (650-723-1156) 1 Complementary

More information

Linear classifiers selecting hyperplane maximizing separation margin between classes (large margin classifiers)

Linear classifiers selecting hyperplane maximizing separation margin between classes (large margin classifiers) Support vector machines In a nutshell Linear classifiers selecting hyperplane maximizing separation margin between classes (large margin classifiers) Solution only depends on a small subset of training

More information

1 Computing with constraints

1 Computing with constraints Notes for 2017-04-26 1 Computing with constraints Recall that our basic problem is minimize φ(x) s.t. x Ω where the feasible set Ω is defined by equality and inequality conditions Ω = {x R n : c i (x)

More information

Lecture 9 Sequential unconstrained minimization

Lecture 9 Sequential unconstrained minimization S. Boyd EE364 Lecture 9 Sequential unconstrained minimization brief history of SUMT & IP methods logarithmic barrier function central path UMT & SUMT complexity analysis feasibility phase generalized inequalities

More information

Part 3: Trust-region methods for unconstrained optimization. Nick Gould (RAL)

Part 3: Trust-region methods for unconstrained optimization. Nick Gould (RAL) Part 3: Trust-region methods for unconstrained optimization Nick Gould (RAL) minimize x IR n f(x) MSc course on nonlinear optimization UNCONSTRAINED MINIMIZATION minimize x IR n f(x) where the objective

More information

Input: System of inequalities or equalities over the reals R. Output: Value for variables that minimizes cost function

Input: System of inequalities or equalities over the reals R. Output: Value for variables that minimizes cost function Linear programming Input: System of inequalities or equalities over the reals R A linear cost function Output: Value for variables that minimizes cost function Example: Minimize 6x+4y Subject to 3x + 2y

More information

Decoupling Coupled Constraints Through Utility Design

Decoupling Coupled Constraints Through Utility Design 1 Decoupling Coupled Constraints Through Utility Design Na Li and Jason R. Marden Abstract The central goal in multiagent systems is to design local control laws for the individual agents to ensure that

More information

Support Vector Machine

Support Vector Machine Andrea Passerini passerini@disi.unitn.it Machine Learning Support vector machines In a nutshell Linear classifiers selecting hyperplane maximizing separation margin between classes (large margin classifiers)

More information

9. Dual decomposition and dual algorithms

9. Dual decomposition and dual algorithms EE 546, Univ of Washington, Spring 2016 9. Dual decomposition and dual algorithms dual gradient ascent example: network rate control dual decomposition and the proximal gradient method examples with simple

More information