{"@context":"http://iiif.io/api/presentation/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/manifest.json","@type":"sc:Manifest","label":"Optimal Safe Planning and Control for Collective Autonomous Systems","metadata":[{"label":"dc.description.sponsorship","value":"This work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree"},{"label":"dc.format","value":"Monograph"},{"label":"dc.format.medium","value":"Electronic Resource"},{"label":"dc.identifier.uri","value":"http://hdl.handle.net/11401/78214"},{"label":"dc.language.iso","value":"en_US"},{"label":"dcterms.abstract","value":"Collective Autonomous Systems (CAS) is a class of systems constituted by multiple autonomous agents that cooperate on completing mission goals while satisfying certain safety constraints. We present Optimal Safe Planning and Control (OSPaC), a framework for optimal planning and control that features the use of a uniform cost function for formulating mission goals and safety constraints. We first introduce ARES, an algorithm for generating optimal plans that take a system to a goal state having a desired cost. ARES chooses the prediction horizon dynamically based on the progress toward the cost goal. Based on ARES, we also present Adaptive-Horizon MPC (AMPC), a new and effective formulation of model predictive control. We assess the effectiveness of ARES and AMPC using the case study of V-formation the goal of which is to bring a flock of birds (UAVs) from a random initial state to a state exhibiting a V-formation, with collision freedom as the safety constraint. Our experiments show that ARES and AMPC succeed with high probability. Inspired by the emerging problem of CPS security, we also introduce controller-attacker games, a two-player stochastic game where the two players, a controller and an attacker, have antagonistic objectives. In V-formation games, a particular form of controller-attacker games, the attacker attempts to prevent the controller from maneuvering a flock into a V-formation. Our experiments show that an AMPC controller adapts to the severity of attacks by choosing the prediction horizon suitably, and our results show that an intelligent attacker can significantly outperforms its naive counterpart. We also present DAMPC, a distributed adaptive-neighborhood AMPC algorithm. In DAMPC, agents run AMPC with local information to find actions for all their neighbors. A communication round is performed by local message exchange to reach agreement on a global solution. DAMPC dynamically adjusts the neighborhood size based on the current state-cost. This improves efficiency without compromising convergence. Finally, we present the integration of planning and control, where ARES generates optimal plans offline and AMPC follows the plans online. The integration improves the performance of AMPC with a computationally cheaper cost function and optimization algorithm, while still benefiting from its robustness to environment disturbances."},{"label":"dcterms.available","value":"2018-03-22T22:39:19Z"},{"label":"dcterms.contributor","value":"Smolka, Scott A."},{"label":"dcterms.creator","value":"Yang, Junxing"},{"label":"dcterms.dateAccepted","value":"2018-03-22T22:39:19Z"},{"label":"dcterms.dateSubmitted","value":"2018-03-22T22:39:19Z"},{"label":"dcterms.description","value":"Department of Computer Science."},{"label":"dcterms.extent","value":"95 pg."},{"label":"dcterms.format","value":"Application/PDF"},{"label":"dcterms.identifier","value":"http://hdl.handle.net/11401/78214"},{"label":"dcterms.issued","value":"2017-08-01"},{"label":"dcterms.language","value":"en_US"},{"label":"dcterms.provenance","value":"Made available in DSpace on 2018-03-22T22:39:19Z (GMT). No. of bitstreams: 1\nYang_grad.sunysb_0771E_13456.pdf: 1733640 bytes, checksum: 173b8bd869a667870dc288b349020d75 (MD5)\n Previous issue date: 2017-08-01"},{"label":"dcterms.subject","value":"Computer science"},{"label":"dcterms.title","value":"Optimal Safe Planning and Control for Collective Autonomous Systems"},{"label":"dcterms.type","value":"Dissertation"},{"label":"dc.type","value":"Dissertation"}],"description":"This manifest was generated dynamically","viewingDirection":"left-to-right","sequences":[{"@type":"sc:Sequence","canvases":[{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json","@type":"sc:Canvas","label":"Page 1","height":1650,"width":1275,"images":[{"@type":"oa:Annotation","motivation":"sc:painting","resource":{"@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/17%2F14%2F30%2F17143091212525607623337113391566245183/full/full/0/default.jpg","@type":"dctypes:Image","format":"image/jpeg","height":1650,"width":1275,"service":{"@context":"http://iiif.io/api/image/2/context.json","@id":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/17%2F14%2F30%2F17143091212525607623337113391566245183","profile":"http://iiif.io/api/image/2/level2.json"}},"on":"https://repo.library.stonybrook.edu/cantaloupe/iiif/2/canvas/page-1.json"}]}]}]}