This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Adaptation for Validation of a Consolidated Control Barrier Function based Control Synthesis

Mitchell Black1    Dimitra Panagou2 The authors would like to acknowledge the support of the National Science Foundation award number 1931982.1Dept. of Aerospace Engineering, Univ. of Michigan, 1320 Beal Ave, Ann Arbor, MI 48109, USA; mblackjr@umich.edu.2Dept. of Robotics and Dept. of Aerospace Engineering, Univ. of Michigan, Ann Arbor, MI 48109, USA; dpanagou@umich.edu.
Abstract

We develop a novel adaptation-based technique for safe control design in the presence of multiple control barrier function (CBF) constraints. Specifically, we introduce an approach for synthesizing any number of candidate CBFs into one consolidated CBF candidate, and propose a parameter adaptation law for the weights of its constituents such that the controllable dynamics of the consolidated CBF are non-vanishing. We then prove that the use of our adaptation law serves to certify the consolidated CBF candidate as valid for a class of nonlinear, control-affine, multi-agent systems, which permits its use in a quadratic program based control law. We highlight the success of our approach in simulation on a multi-robot goal-reaching problem in a crowded warehouse environment, and further demonstrate its efficacy experimentally in the laboratory via AION ground rovers operating amongst other vehicles behaving both aggressively and conservatively.

I Introduction

Since the arrival of control barrier functions (CBFs) to the field of safety-critical systems [1], much attention has been devoted to the development of their viability for safe control design [2, 3, 4]. As a set-theoretic approach founded on the notion of forward invariance, CBFs encode safety in that they ensure that any state beginning in a safe set remains so for all future time. In the context of control design, CBF conditions are often used as constraints in quadratic program (QP) based control laws, either as safety filters [5] or in conjunction with stability constraints (e.g. control Lyapunov functions) [6]. Their utility has been successfully demonstrated for a variety of safety-critical applications, including mobile robots [7, 8], unmanned aerial vehicles (UAVs) [9, 10], and autonomous driving [11, 12]. But while it is now well-established that CBFs for controlled dynamical systems serve as certificates of safety, the verification of candidate CBFs as valid is in general a challenging problem.

Though for a single CBF there exist guarantees of validity under certain conditions for systems with either unbounded [2] or bounded control authority [13, 14], these results do not generally extend to control systems seeking to satisfy multiple candidate CBF constraints. Recent approaches to control design in the presence of multiple CBF constraints have mainly circumvented this challenge by considering only one such constraint at a given time instance, either by assumption [15] or construction in a non-smooth manner [16, 17]. In contrast, the authors of [18] and [19] each propose smoothly synthesizing one candidate CBF for the joint satisfaction of multiple constraints, but make no attempt to validate their candidate function. The problem of safe control design under a multitude of constraints is especially relevant in practical applications involving autonomous mobile robots, where the main challenge is in the robot completing its nominal objective while satisfying constraints related to collision avoidance with respect to obstacles both static and dynamic.

Refer to caption
Figure 1: Parameter adaptation for our C-CBF leads to a gain-dependent (and time-varying) controlled-invariant set C(k)S=i=1cSiC(k)\subset S=\bigcap_{i=1}^{c}S_{i}. C(k)C(k) is shown here with a dotted white boundary for gains k0k_{0} at time t0t_{0} and k1k_{1} at t1t_{1}.

It is with this problem in mind that we propose a consolidated CBF (C-CBF) based approach to control design for multi-agent systems in the presence of both non-communicative and non-responsive (though non-adversarial) agents. Constructed by smoothly synthesizing any arbitrary number of candidate CBFs into one, our C-CBF defines a new super-level set that can under-approximate the intersection of its constituent sets arbitrarily closely (see Figure 1). We further propose a parameter adaptation law for the weighting of the constituent functions, and prove that its use renders our C-CBF valid and the super-level set controlled invariant for the class of nonlinear, control-affine, multi-agent systems under consideration. And while various works have utilized parameter adaptation in the context of control for safety-critical systems, usually in an attempt to either learn [20, 21] or compensate for [22] unknown parameters in the system dynamics, our proposed adaptation law is the first to our knowledge to be used for the simultaneous verified satisfaction of multiple CBF constraints. To show the effectiveness of our proposed control formulation, we study a decentralized multi-robot goal-reaching problem in a crowded warehouse environment amongst non-responsive agents. As a practical demonstration, we tested our controller experimentally on a collection of ground rovers in the laboratory setting and found that it succeeded in safely driving the rovers to their goal locations amongst non-responsive agents behaving both aggressively and conservatively.

The paper is organized as follows. Section II introduces some preliminaries, including set invariance, optimization based control, and our first problem statement. In Section III, we introduce the form of our C-CBF and propose a parameter adaptation law for rendering it valid. Sections IV and V contain the results of our simulated and experimental case studies respectively, and in Section VI we conclude with final remarks and directions for future work.

II Mathematical Preliminaries

We use the following notation throughout the paper. \mathbb{R} denotes the set of real numbers. The set of integers between ii and jj (inclusive) is [i..j][i..j]. \|\cdot\| represents the Euclidean norm. A function α:\alpha:\operatorname{\mathbb{R}}\rightarrow\operatorname{\mathbb{R}} is said to belong to class 𝒦\mathcal{K}_{\infty} if α(0)=0\alpha(0)=0 and α\alpha is increasing on the interval (,)(-\infty,\infty), A function ϕ:×\phi:\operatorname{\mathbb{R}}\times\operatorname{\mathbb{R}}\rightarrow\operatorname{\mathbb{R}} is said to belong to class \mathcal{L}\mathcal{L} if for each fixed rr (resp. ss), the function ϕ(r,s)\phi(r,s) is decreasing with respect to ss (resp. rr) and is such that ϕ(r,s)0\phi(r,s)\rightarrow 0 for ss\rightarrow\infty (resp. rr\rightarrow\infty). The Lie derivative of a function V:nV:\mathbb{R}^{n}\rightarrow\mathbb{R} along a vector field f:nnf:\mathbb{R}^{n}\rightarrow\mathbb{R}^{n} at a point xnx\in\mathbb{R}^{n} is denoted LfV(x)Vxf(x)L_{f}V(x)\triangleq\frac{\partial V}{\partial x}f(x).

In this paper we consider a multi-agent system, each of whose AA constituent agents may be modelled by the following class of nonlinear, control-affine dynamical systems:

𝒙˙i=fi(𝒙i(t))+gi(𝒙i(t))𝒖i(t),𝒙i(0)=𝒙i0\dot{\bm{x}}_{i}=f_{i}(\bm{x}_{i}(t))+g_{i}(\bm{x}_{i}(t))\bm{u}_{i}(t),\quad\bm{x}_{i}(0)=\bm{x}_{i0} (1)

where 𝒙in\bm{x}_{i}\in\operatorname{\mathbb{R}}^{n} and 𝒖i𝒰im\bm{u}_{i}\in\mathcal{U}_{i}\subseteq\operatorname{\mathbb{R}}^{m} are the state and control input vectors for the ith agent, with 𝒰i\mathcal{U}_{i} the input constraint set, and where fi:nnf_{i}:\operatorname{\mathbb{R}}^{n}\rightarrow\operatorname{\mathbb{R}}^{n} and gi:n×mng_{i}:\operatorname{\mathbb{R}}^{n\times m}\rightarrow\operatorname{\mathbb{R}}^{n} are known, locally Lipschitz, and not necessarily homogeneous i𝒜=[1..A]\forall i\in\mathcal{A}=[1..A]. We denote the concatenated state vector as 𝒙=[𝒙1,,𝒙A]TN\bm{x}=[\bm{x}_{1},\ldots,\bm{x}_{A}]^{T}\in\operatorname{\mathbb{R}}^{N}, the concatenated control input vector as 𝒖=[𝒖1,,𝒖A]T𝒰M\bm{u}=[\bm{u}_{1},\ldots,\bm{u}_{A}]^{T}\in\mathcal{U}\subseteq\operatorname{\mathbb{R}}^{M}, and as such express the full system dynamics as

𝒙˙=F(𝒙(t))+G(𝒙(t))𝒖(t),𝒙(0)=𝒙0,\dot{\bm{x}}=F(\bm{x}(t))+G(\bm{x}(t))\bm{u}(t),\quad\bm{x}(0)=\bm{x}_{0}, (2)

where F=[f1,,fA]T:NNF=[f_{1},\ldots,f_{A}]^{T}:\operatorname{\mathbb{R}}^{N}\rightarrow\operatorname{\mathbb{R}}^{N} and G=diag([g1,,gA]):M×NNG=\textrm{diag}([g_{1},\ldots,g_{A}]):\operatorname{\mathbb{R}}^{M\times N}\rightarrow\operatorname{\mathbb{R}}^{N}. We assume that a (possibly empty) subset of the agents are communicative, denoted j𝒜c=[1..Ac]j\in\mathcal{A}_{c}=[1..A_{c}], in the sense that they share information (e.g. states, control objectives, etc.) with one another, and that the remaining agents are non-communicative, denoted k𝒜n=[(Ac+1)..A]k\in\mathcal{A}_{n}=[(A_{c}+1)..A], in that they do not share information, where Ac0A_{c}\geq 0 and An=AAc0A_{n}=A-A_{c}\geq 0 are the number of communicative and non-communicative agents respectively. We further assume that all agents are non-adversarial in that they do not seek to damage or otherwise deceive others, though there may be non-communicative agents which are non-responsive (l𝒜n,n𝒜nl\in\mathcal{A}_{n,n}\subseteq\mathcal{A}_{n}) in that they do not actively avoid unsafe situations.

II-A Safety and Forward Invariance

Consider a set of safe states SS defined implicitly by a continuously differentiable function h:Nh:\operatorname{\mathbb{R}}^{N}\rightarrow\operatorname{\mathbb{R}}, as follows:

S={𝒙N|h(𝒙)0},S=\{\bm{x}\in\operatorname{\mathbb{R}}^{N}\;|\;h(\bm{x})\geq 0\}, (3)

where the boundary and interior of SS are denoted as S={𝒙N|h(𝒙)=0}\partial S=\{\bm{x}\in\operatorname{\mathbb{R}}^{N}\;|\;h(\bm{x})=0\} and int(S)={𝒙N|h(𝒙)>0}\textrm{int}(S)=\{\bm{x}\in\operatorname{\mathbb{R}}^{N}\;|\;h(\bm{x})>0\} respectively. In many works (e.g. [23, 24]), the set SS defined by (3) is referred to as safe if it is forward-invariant, i.e. if 𝒙(0)S𝒙(t)S\bm{x}(0)\in S\implies\bm{x}(t)\in S, t0\forall t\geq 0. Nagumo’s Theorem provides a necessary and sufficient condition for rendering the set SS forward-invariant for the system (2).

Lemma 1 (Nagumo’s Theorem[25]).

Suppose that there exists 𝐮(t)𝒰\bm{u}(t)\in\mathcal{U} such that (2) admits a globally unique solution for each 𝐱0S\bm{x}_{0}\in S. Then, the set SS is forward-invariant for the controlled system (2) if and only if

LFh(𝒙)+LGh(𝒙)𝒖0,𝒙S.L_{F}h(\bm{x})+L_{G}h(\bm{x})\bm{u}\geq 0,\;\forall\bm{x}\in\partial S. (4)

One way to render a set SS forward-invariant is to use CBFs in the control design.

Definition 1.

[2, Definition 5] Given a set SNS\subset\operatorname{\mathbb{R}}^{N} defined by (3) for a continuously differentiable function h:Nh:\operatorname{\mathbb{R}}^{N}\rightarrow\operatorname{\mathbb{R}}, the function hh is a control barrier function (CBF) defined on a set DSD\supseteq S if there exists a Lipschitz continuous class 𝒦\mathcal{K}_{\infty} function α:\alpha:\operatorname{\mathbb{R}}\rightarrow\operatorname{\mathbb{R}} such that, for all 𝐱D\bm{x}\in D,

sup𝒖𝒰[LFh(𝒙)+LGh(𝒙)𝒖]α(h(𝒙)).\sup_{\bm{u}\in\mathcal{U}}\left[L_{F}h(\bm{x})+L_{G}h(\bm{x})\bm{u}\right]\geq-\alpha(h(\bm{x})). (5)

In this paper, we assume that h𝒙\frac{\partial h}{\partial\bm{x}} is Lipschitz continuous so that LFh(𝒙)L_{F}h(\bm{x}) and LGh(𝒙)L_{G}h(\bm{x}) are likewise. In other works (e.g. [26]), the function hh responsible for defining SS is a CBF if there exists a class 𝒦\mathcal{K}_{\infty} function α\alpha satisfying

LGh(𝒙)=𝟎1×MLFh(𝒙)+α(h(𝒙))>0.L_{G}h(\bm{x})=\mathbf{0}_{1\times M}\implies L_{F}h(\bm{x})+\alpha(h(\bm{x}))>0. (6)

We note, however, that with unbounded control authority (i.e. 𝒰=M\mathcal{U}=\operatorname{\mathbb{R}}^{M}) a sufficient condition for the existence of some α𝒦\alpha\in\mathcal{K}_{\infty} satisfying (5), and thus for hh to be a CBF, is LGh(𝒙)𝟎1×ML_{G}h(\bm{x})\neq\mathbf{0}_{1\times M}, 𝒙S\forall\bm{x}\in S, though this does not generally hold for a system with multiple CBF constraints.

II-B Control Design using CBFs

Decentralized controllers, in which agents compute inputs based on local information, have found empirical success as a control strategy for multi-agent systems of the form (2) [27, 28]. The following is an example of one such controller for an agent i𝒜i\in\mathcal{A} with safety constraints encoded via c>1c>1 candidate CBFs:

𝒖i=argmin𝒖i𝒰i\displaystyle\bm{u}_{i}^{*}=\operatorname*{arg\,min}_{\bm{u}_{i}\in\mathcal{U}_{i}} 12𝒖i𝒖i02\displaystyle\frac{1}{2}\|\bm{u}_{i}-\bm{u}_{i}^{0}\|^{2} (7a)
s.t. s[1..c]\displaystyle\forall s\in[1..c]
as,i+𝒃s,i𝒖i\displaystyle a_{s,i}+\bm{b}_{s,i}\bm{u}_{i} 0,\displaystyle\geq 0, (7b)

where (7a) seeks to produce a control solution 𝒖i\bm{u}_{i}^{*} that deviates minimally from some nominal input 𝒖i0\bm{u}_{i}^{0}, and (7b) encodes cc safety constraints of the form (5) via candidate CBFs hsh_{s}, where as,i=Lfihs+αs(hs)a_{s,i}=L_{f_{i}}h_{s}+\alpha_{s}(h_{s}) and 𝒃s,i=Lgihs\bm{b}_{s,i}=L_{g_{i}}h_{s}. Notably, for many classes of systems (7) is neither guaranteed to be feasible nor to preserve safety between agents [8]. When some subset of agents are able to communicate with one another, i.e. agents j𝒜cj\in\mathcal{A}_{c} share information, their control inputs 𝒖𝒜c=[𝒖1,,𝒖Ac]T\bm{u}_{\mathcal{A}_{c}}=[\bm{u}_{1},\ldots,\bm{u}_{A_{c}}]^{T} may be computed in a centralized fashion as follows:

𝒖𝒜c=argmin𝒖𝒜c𝒰𝒜c\displaystyle\bm{u}_{\mathcal{A}_{c}}^{*}=\operatorname*{arg\,min}_{\bm{u}_{\mathcal{A}_{c}}\in\mathcal{U}_{\mathcal{A}_{c}}} 12𝒖𝒜c𝒖𝒜c02\displaystyle\frac{1}{2}\|\bm{u}_{\mathcal{A}_{c}}-\bm{u}_{\mathcal{A}_{c}}^{0}\|^{2} (8a)
s.t.j,k\displaystyle\textrm{s.t.}\quad\forall j,k 𝒜c,kj\displaystyle\in\mathcal{A}_{c},\;k\neq j
as,j+𝒃s,j𝒖j\displaystyle a_{s,j}+\bm{b}_{s,j}\bm{u}_{j} 0,s[1..cI],\displaystyle\geq 0,\;\forall s\in[1..c_{I}], (8b)
as,jk+𝒃s,j𝒖j+𝒃s,k𝒖k\displaystyle a_{s,jk}+\bm{b}_{s,j}\bm{u}_{j}+\bm{b}_{s,k}\bm{u}_{k} 0,s[cI+1..c]\displaystyle\geq 0,\;\forall s\in[c_{I}+1..c] (8c)

where 𝒖𝒜c0=[𝒖10,,𝒖Ac0]T\bm{u}_{\mathcal{A}_{c}}^{0}=[\bm{u}_{1}^{0},\ldots,\bm{u}_{A_{c}}^{0}]^{T} is the nominal input vector shared amongst communicative agents, 𝒰𝒜c=j=1Ac𝒰j\mathcal{U}_{\mathcal{A}_{c}}=\bigoplus_{j=1}^{A_{c}}\mathcal{U}_{j} is the Minkowski sum of their input constraint sets, (8b) denotes the cI0c_{I}\geq 0 individual CBF constraints for agent jj (e.g. speed), and (8c) represents combinations of safety constraints between agents (e.g. collision avoidance), where as,jk=Lfjhs+Lfkhs+αs(hs)a_{s,jk}=L_{f_{j}}h_{s}+L_{f_{k}}h_{s}+\alpha_{s}(h_{s}), 𝒃s,j=Lgjhs\bm{b}_{s,j}=L_{g_{j}}h_{s}, and 𝒃s,k=Lgkhs\bm{b}_{s,k}=L_{g_{k}}h_{s}. When all agents are communicative, (8) is guaranteed to be safe provided that it is feasible.

A challenge when it comes to both (7) and (8) is in satisfying all of the safety constraints simultaneously, especially when it comes to the design of αs\alpha_{s}. In some recent works, authors have proposed setting αs(hs)=pshs\alpha_{s}(h_{s})=p_{s}h_{s} and including the parameters psp_{s} as decision variables in the QP [29] (and thus an additional term s=1c12qsps2\sum_{s=1}^{c}\frac{1}{2}q_{s}p_{s}^{2} for qs>0q_{s}>0 in the objective function), but the performance of these approaches are still heavily dependent on the gains qsq_{s}. Other techniques have avoided the issue of multiple candidate CBFs by assuming that only one constraint is in need of satisfaction at once [15] or by synthesizing a single non-smooth candidate CBF [16, 17], both of which may lead to undesirable chattering behavior or the loss of existence and uniqueness of solutions. We seek to address this open problem, and require the following assumption to do so.

Assumption 1.

The intersection of the safe sets SsS_{s} for all s[1..c]s\in[1..c] is non-empty, i.e. S=s=1cSsS=\bigcap_{s=1}^{c}S_{s}\neq\emptyset.

Problem 1.

Given that Assumption 1 holds for a collection of c>1c>1 candidate control barrier functions hsh_{s} corresponding to safe sets SsS_{s}, design a consolidated control barrier function candidate H:N×+cH:\operatorname{\mathbb{R}}^{N}\times\operatorname{\mathbb{R}}_{+}^{c}\rightarrow\operatorname{\mathbb{R}} with constituent gains 𝐤=[k1,,kc]T+c\bm{k}=[k_{1},\ldots,k_{c}]^{T}\in\operatorname{\mathbb{R}}_{+}^{c} for the zero super-level set C(𝐤)={𝐱N|H(𝐱,𝐤)0}C(\bm{k})=\{\bm{x}\in\operatorname{\mathbb{R}}^{N}\;|\;H(\bm{x},\bm{k})\geq 0\} such that C(𝐤)SC(\bm{k})\subseteq S for all 𝐤\bm{k} satisfying 0<ks<0<k_{s}<\infty, s[1..c]\forall s\in[1..c].

III Consolidated CBF based Control

In this section, we first introduce our proposed solution to Problem 1, a consolidated control barrier function (C-CBF) candidate that smoothly synthesizes multiple candidate CBFs into one, and then design a parameter adaptation law which renders the candidate C-CBF valid for safe control design.

III-A Consolidated CBFs

Let the vector of c>1c>1 candidate CBFs evaluated at a given state 𝒙\bm{x} be denoted 𝒉(𝒙)=[h1(𝒙)hc(𝒙)]Tc\bm{h}(\bm{x})=[h_{1}(\bm{x})\;\ldots\;h_{c}(\bm{x})]^{T}\in\operatorname{\mathbb{R}}^{c}, and define a gain vector as 𝒌=[k1kc]Tc\bm{k}=[k_{1}\;\ldots\;k_{c}]^{T}\in\operatorname{\mathbb{R}}^{c}, where 0<ks<0<k_{s}<\infty for all s[1..c]s\in[1..c]. Our C-CBF candidate H:N×+cH:\operatorname{\mathbb{R}}^{N}\times\operatorname{\mathbb{R}}_{+}^{c}\rightarrow\operatorname{\mathbb{R}} is the following:

H(𝒙,𝒌)=1s=1cϕ(hs(𝒙),ks),H(\bm{x},\bm{k})=1-\sum_{s=1}^{c}\phi\Big{(}h_{s}(\bm{x}),k_{s}\Big{)}, (9)

where ϕ:0×0+\phi:\operatorname{\mathbb{R}}_{\geq 0}\times\operatorname{\mathbb{R}}_{\geq 0}\rightarrow\operatorname{\mathbb{R}}_{+} belongs to class \mathcal{L}\mathcal{L}, is continuously differentiable, and satisfies ϕ(hs,0)=ϕ(0,ks)=ϕ(0,0)=1\phi(h_{s},0)=\phi(0,k_{s})=\phi(0,0)=1. For example, the decaying exponential function, i.e. ϕ(hs,ks)=ehsks\phi(h_{s},k_{s})=e^{-h_{s}k_{s}}, satisfies these requirements over the domain 0×0\operatorname{\mathbb{R}}_{\geq 0}\times\operatorname{\mathbb{R}}_{\geq 0}. With ϕ\phi possessing these properties, it follows then that the new zero super level-set C(𝒌)={𝒙N|H(𝒙,𝒌)0}C(\bm{k})=\{\bm{x}\in\operatorname{\mathbb{R}}^{N}\;|\;H(\bm{x},\bm{k})\geq 0\} is a subset of SS (i.e. C(𝒌SC(\bm{k}\subset S), where the level of closeness of C(𝒌)C(\bm{k}) to SS depends on the choices of gains 𝒌\bm{k}. This may be confirmed by observing that if any hs(𝒙)=0h_{s}(\bm{x})=0 then H(𝒙)11j=1,jscϕ(hj(𝒙),kj)<0H(\bm{x})\leq 1-1-\sum_{j=1,j\neq s}^{c}\phi(h_{j}(\bm{x}),k_{j})<0, and thus for H(𝒙)0H(\bm{x})\geq 0 it must hold that hs(𝒙)>0h_{s}(\bm{x})>0, for all s[1..c]s\in[1..c].

As such, HH defined by (9) is a solution to Problem 1, i.e. HH is a C-CBF candidate. This implies via Lemma 1 that if HH is valid over the set C(𝒌)C(\bm{k}), then C(𝒌)C(\bm{k}) is controlled invariant and thus the trajectories of (2) remain safe with respect to each constituent safe set SsS_{s}, s[1..c]\forall s\in[1..c]. By Definition 1, for a static gain vector (i.e. 𝒌˙=𝟎c×1\dot{\bm{k}}=\mathbf{0}_{c\times 1}) the function HH is a CBF on the set SS if there exists αH𝒦\alpha_{H}\in\mathcal{K}_{\infty} such that the following condition holds for all 𝒙SC(𝒌)\bm{x}\in S\supset C(\bm{k}):

LFH(𝒙,𝒌)+LGH(𝒙,𝒌)𝒖αH(H(𝒙,𝒌)),L_{F}H(\bm{x},\bm{k})+L_{G}H(\bm{x},\bm{k})\bm{u}\geq-\alpha_{H}(H(\bm{x},\bm{k})), (10)

where from (9) it follows that

LFH(𝒙)\displaystyle L_{F}H(\bm{x}) =s=1cϕhsLFhc(𝒙),\displaystyle=-\sum_{s=1}^{c}\frac{\partial\phi}{\partial h_{s}}L_{F}h_{c}(\bm{x}), (11)
LGH(𝒙)\displaystyle L_{G}H(\bm{x}) =s=1cϕhsLGhc(𝒙).\displaystyle=-\sum_{s=1}^{c}\frac{\partial\phi}{\partial h_{s}}L_{G}h_{c}(\bm{x}). (12)

Again taking ϕ(hs,ks)=ehsks\phi(h_{s},k_{s})=e^{-h_{s}k_{s}} as an example, we obtain that ϕhs=ksehsks\frac{\partial\phi}{\partial h_{s}}=-k_{s}e^{-h_{s}k_{s}}, in which case it is evident that the role of the gain vector 𝒌\bm{k} is to weight the constituent candidate CBFs hsh_{s} and their derivative terms LFhsL_{F}h_{s} and LGhsL_{G}h_{s} in the CBF condition (10). Thus, a higher value ksk_{s} indicates a weaker weight in the CBF dynamics, as the exponential decay overpowers the linear growth. Due to the combinatorial nature of these gains, for an arbitrary 𝒌\bm{k} there may exist some 𝒙C(𝒌)\bm{x}\in C(\bm{k}) such that LGH(𝒙)=𝟎1×ML_{G}H(\bm{x})=\mathbf{0}_{1\times M}, which may violate (6) and lead to the state exiting C(𝒌)C(\bm{k}) (and potentially SS as a result). Using online adaptation of 𝒌\bm{k}, however, it may be possible to achieve LGH(𝒙)𝟎1×ML_{G}H(\bm{x})\neq\mathbf{0}_{1\times M} for all t0t\geq 0, which motivates the following problem.

Problem 2.

Given a C-CBF candidate H:N×+cH:\operatorname{\mathbb{R}}^{N}\times\operatorname{\mathbb{R}}_{+}^{c}\rightarrow\operatorname{\mathbb{R}} defined by (9) and associated with the set C(𝐤)C(\bm{k}), design an adaptation law 𝐤˙=κ(𝐱,𝐤)\dot{\bm{k}}=\kappa(\bm{x},\bm{k}) such that LGH𝟎1×ML_{G}H\neq\mathbf{0}_{1\times M} for all t0t\geq 0.

III-B Adaptation for Control Synthesis

Before proceeding with our main result, we require the following assumption.

Assumption 2.

The matrix of controlled candidate CBF dynamics 𝐋gc×M\bm{L}_{g}\in\operatorname{\mathbb{R}}^{c\times M} is not all zero, i.e.

𝑳g=[Lgh1Lghc]𝟎c×M.\bm{L}_{g}=\begin{bmatrix}L_{g}h_{1}\\ \vdots\\ L_{g}h_{c}\end{bmatrix}\neq\mathbf{0}_{c\times M}. (13)

We now present our main result, an adaptation law that solves Problem 2 and thus renders HH a valid CBF for the set C(𝒌(t))C(\bm{k}(t)), for all t0t\geq 0.

Theorem 1.

Suppose that there exist c>1c>1 candidate CBFs hs:Nh_{s}:\operatorname{\mathbb{R}}^{N}\rightarrow\operatorname{\mathbb{R}} defining sets Ss={𝐱N|hs(𝐱)0}S_{s}=\{\bm{x}\in\operatorname{\mathbb{R}}^{N}\;|\;h_{s}(\bm{x})\geq 0\}, s[1..c]\forall s\in[1..c], and that it is known that 𝒰=M\mathcal{U}=\operatorname{\mathbb{R}}^{M}. If 𝐤(0)\bm{k}(0) is such that LGH𝟎1×ML_{G}H\neq\mathbf{0}_{1\times M} at t=0t=0, then, under the ensuing adaptation law,

κ(𝒙,𝒌)=argmin𝝁c12(𝝁𝝁0)T𝑷\displaystyle\kappa(\bm{x},\bm{k})=\operatorname*{arg\,min}_{\bm{\mu}\in\operatorname{\mathbb{R}}^{c}}\;\frac{1}{2}(\bm{\mu}-\bm{\mu}_{0})^{T}\bm{P} (𝝁𝝁0)\displaystyle(\bm{\mu}-\bm{\mu}_{0}) (14a)
s.t.\displaystyle\mathrm{s.t.}\quad\quad\quad
𝝁+αk(𝒌𝒌min)\displaystyle\bm{\mu}+\alpha_{k}(\bm{k}-\bm{k}_{min}) 0,\displaystyle\geq 0, (14b)
𝒑T𝑸𝒑˙+𝒑T𝑸˙𝒑+αp(hp)\displaystyle\bm{p}^{T}\bm{Q}\dot{\bm{p}}+\bm{p}^{T}\dot{\bm{Q}}\bm{p}+\alpha_{p}(h_{p}) 0,\displaystyle\geq 0, (14c)

the controlled CBF dynamics LGH𝟎1×ML_{G}H\neq\mathbf{0}_{1\times M} for all t0t\geq 0, and thus the function HH defined by (9) is a valid CBF for the set C(𝐤(t))={𝐱N|H(𝐱,𝐤)0}C(\bm{k}(t))=\{\bm{x}\in\operatorname{\mathbb{R}}^{N}\;|\;H(\bm{x},\bm{k})\geq 0\}, for all t0t\geq 0, where 𝐏c×c\bm{P}\in\operatorname{\mathbb{R}}^{c\times c} is a positive-definite gain matrix, αk,αp𝒦\alpha_{k},\alpha_{p}\in\mathcal{K}_{\infty}, 𝛍0\bm{\mu}_{0} is the nominal 𝐤˙\dot{\bm{k}}, 𝐤min=[k1,min,,kc,min]T\bm{k}_{min}=[k_{1,min},\ldots,k_{c,min}]^{T} is the vector of minimum allowable values ks,min>0k_{s,min}>0, and

𝒑\displaystyle\bm{p} =[ϕh1ϕhc]T,\displaystyle=\left[\frac{\partial\phi}{\partial h_{1}}\;\ldots\;\frac{\partial\phi}{\partial h_{c}}\right]^{T}, (15)
𝑸\displaystyle\bm{Q} =𝑰(𝑵𝑵T)T𝑵𝑵T(𝑵𝑵T)T𝑵𝑵T\displaystyle=\bm{I}-(\bm{N}\bm{N}^{T})^{T}-\bm{N}\bm{N}^{T}-(\bm{N}\bm{N}^{T})^{T}\bm{N}\bm{N}^{T} (16)

with hp=12𝐩T𝐐𝐩εh_{p}=\frac{1}{2}\bm{p}^{T}\bm{Q}\bm{p}-\varepsilon, ε>0\varepsilon>0, and

𝑵=[𝒏1𝒏r],\bm{N}=[\bm{n}_{1}\;\ldots\;\bm{n}_{r}], (17)

such that {𝐧1,,𝐧r}\{\bm{n}_{1},\ldots,\bm{n}_{r}\} constitutes a basis for the null space of 𝐋gT\bm{L}_{g}^{T}, i.e. 𝒩(𝐋gT)=span{𝐧1,,𝐧r}\mathcal{N}(\bm{L}_{g}^{T})=\mathrm{span}\{\bm{n}_{1},\ldots,\bm{n}_{r}\}, where 𝐋g\bm{L}_{g} is given by (13).

Proof.

First, given (9), we have that

H˙\displaystyle\dot{H} =s=1c(ϕhsh˙s+ϕksk˙c)\displaystyle=-\sum_{s=1}^{c}\left(\frac{\partial\phi}{\partial h_{s}}\dot{h}_{s}+\frac{\partial\phi}{\partial k_{s}}\dot{k}_{c}\right)
=𝒑T𝒉˙+𝒒T𝒌˙\displaystyle=\bm{p}^{T}\dot{\bm{h}}+\bm{q}^{T}\dot{\bm{k}}
=𝒑T(𝑳f+𝑳g𝒖)+𝒒T𝒌˙\displaystyle=\bm{p}^{T}(\bm{L}_{f}+\bm{L}_{g}\bm{u})+\bm{q}^{T}\dot{\bm{k}}

where 𝒑\bm{p} is given by (15), 𝑳g\bm{L}_{g} by (13), 𝑳f=[LFh1LFhc]T\bm{L}_{f}=[L_{F}h_{1}\;\ldots\;L_{F}h_{c}]^{T}, and 𝒒=[ϕk1ϕkc]T\bm{q}=[\frac{\partial\phi}{\partial k_{1}}\;\ldots\;\frac{\partial\phi}{\partial k_{c}}]^{T}. As such, LFH=𝒑T𝑳f+𝒒T𝒌˙L_{F}H=\bm{p}^{T}\bm{L}_{f}+\bm{q}^{T}\dot{\bm{k}} and LGH=𝒑T𝑳gL_{G}H=\bm{p}^{T}\bm{L}_{g}. With 𝒰=M\mathcal{U}=\operatorname{\mathbb{R}}^{M}, it follows that as long as LGH𝟎1×ML_{G}H\neq\mathbf{0}_{1\times M} it is possible to choose 𝒖\bm{u} such that H˙(𝒙,𝒖)αH(H)\dot{H}(\bm{x},\bm{u})\geq-\alpha_{H}(H). We will now show that with 𝒌˙=κ(𝒙,𝒌)\dot{\bm{k}}=\kappa(\bm{x},\bm{k}) given by (14) it holds that LGH𝟎1×ML_{G}H\neq\mathbf{0}_{1\times M} and thus HH is a CBF for C(𝒌(t))C(\bm{k}(t)), for all t0t\geq 0.

Since LGH=𝒑T𝑳gL_{G}H=\bm{p}^{T}\bm{L}_{g}, the problem of showing that LGH𝟎1×ML_{G}H\neq\mathbf{0}_{1\times M} is equivalent to proving that 𝒑𝒩(𝑳gT)=span{𝒏1,,𝒏r}\bm{p}\notin\mathcal{N}(\bm{L}_{g}^{T})=\mathrm{span}\{\bm{n}_{1},\ldots,\bm{n}_{r}\}. Since the vector 𝒑\bm{p} can be expressed as a sum of vectors perpendicular to and parallel to 𝒩(𝑳gT)\mathcal{N}(\bm{L}_{g}^{T}) (respectively 𝒑\bm{p}^{\perp} and 𝒑\bm{p}^{\parallel}), it follows that 𝒑𝒩(𝑳gT)\bm{p}\notin\mathcal{N}(\bm{L}_{g}^{T}) as long as 𝒑>0\|\bm{p}^{\perp}\|>0, where 𝒑=(𝑰𝑵𝑵T)𝒑\bm{p}^{\perp}=\left(\bm{I}-\bm{N}\bm{N}^{T}\right)\bm{p} by vector projection, and 𝑵\bm{N} is given by (17). Thus, a sufficient condition for 𝒑𝒩(𝑳gT)\bm{p}\notin\mathcal{N}(\bm{L}_{g}^{T}) is that

12(𝑰𝑵𝑵T)𝒑2=12𝒑T𝑸𝒑>ε\frac{1}{2}\|(\bm{I}-\bm{N}\bm{N}^{T})\bm{p}\|^{2}=\frac{1}{2}\bm{p}^{T}\bm{Q}\bm{p}>\varepsilon (18)

for some ε>0\varepsilon>0, where 𝑸\bm{Q} is given by (16). Then, by defining a function hp=12𝒑T𝑸𝒑εh_{p}=\frac{1}{2}\bm{p}^{T}\bm{Q}\bm{p}-\varepsilon, it follows from (5) that when (18) is true at t=0t=0, it is true t0\forall t\geq 0 as long as (14c) holds.

Therefore, gains 𝒌\bm{k} adapted according to the law (14) are guaranteed to result in LGH𝟎1×ML_{G}H\neq\mathbf{0}_{1\times M}. Thus, HH is a CBF for the set C(𝒌(t))C(\bm{k}(t)), for all t0t\geq 0. This completes the proof. ∎

Remark 1.

With 𝐐\bm{Q} depending on basis vectors spanning 𝒩(𝐋gT)\mathcal{N}(\bm{L}_{g}^{T}), it is not immediately obvious under what conditions 𝐐˙\dot{\bm{Q}} is continuous (or even well-defined). Prior results show that if the rank of 𝒩(𝐋gT)\mathcal{N}(\bm{L}_{g}^{T}) is constant then 𝐐˙\dot{\bm{Q}} varies continuously 𝐱Bϵ(𝐱)\forall\bm{x}\in B_{\epsilon}(\bm{x}) [30], but analytical derivations of 𝐐˙\dot{\bm{Q}} are not available to the best of our knowledge. In practice, we observe that the rank of 𝒩(𝐋gT)\mathcal{N}(\bm{L}_{g}^{T}) is indeed constant, and we approximate 𝐐˙\dot{\bm{Q}} numerically using finite-difference methods.

With HH consolidating the many constituent constraints into one CBF condition, we can then replace the centralized CBF-QP controller (8) with the following:

𝒖𝒜c\displaystyle\bm{u}_{\mathcal{A}_{c}}^{*} =argmin𝒖𝒜c𝒰𝒜c12𝒖𝒜c𝒖𝒜c02\displaystyle=\operatorname*{arg\,min}_{\bm{u}_{\mathcal{A}_{c}}\in\mathcal{U}_{\mathcal{A}_{c}}}\frac{1}{2}\|\bm{u}_{\mathcal{A}_{c}}-\bm{u}_{\mathcal{A}_{c}}^{0}\|^{2} (19a)
s.t.
a\displaystyle a +𝒃𝒖𝒜c0,\displaystyle+\bm{b}\bm{u}_{\mathcal{A}_{c}}\geq 0, (19b)

where a=LFH+αH(H)a=L_{F}H+\alpha_{H}(H) and 𝒃=LGH[i𝒜c]\bm{b}=L_{G}H_{[i\in\mathcal{A}_{c}]}. If all agents are communicative, i.e. 𝒜c=𝒜\mathcal{A}_{c}=\mathcal{A}, then since HH is a CBF for the set C(𝒌(t))SC(\bm{k}(t))\subset S, for all t0t\geq 0, the system trajectories are guaranteed to stay within C(𝒌(t))SC(\bm{k}(t))\subset S and thus remain safe. In the presence of non-communicative agents, we replace the decentralized CBF-QP controller (7) with

𝒖i\displaystyle\bm{u}_{i}^{*} =argmin𝒖i𝒰i12𝒖i𝒖i02\displaystyle=\operatorname*{arg\,min}_{\bm{u}_{i}\in\mathcal{U}_{i}}\frac{1}{2}\|\bm{u}_{i}-\bm{u}_{i}^{0}\|^{2} (20a)
s.t.
a\displaystyle a +𝒃i𝒖id,\displaystyle+\bm{b}_{i}\bm{u}_{i}\geq d, (20b)

where 𝒃i=LGH[mi:m(i+1)]\bm{b}_{i}=L_{G}H_{[mi:m(i+1)]}, i.e. the portion of the dynamics of HH that agent ii controls, and d=erHmax𝒖𝒰j=1,jiALGH[jm:j(m+1)]ujd=e^{-rH}\max_{\bm{u}\in\mathcal{U}}\sum_{j=1,j\neq i}^{A}L_{G}H_{[jm:j(m+1)]}u_{j}, where r>0r>0. While for the case of unbounded control authority dd is similarly unbounded, in practice it is reasonable to assume that agents have limited control authority and thus to use (20) assuming some bounded 𝒰\mathcal{U}.

IV Multi-Robot Numerical Study

In this section, we demonstrate our C-CBF controller on a decentralized multi-robot goal-reaching problem.

Consider a collection of 3 non-communicative, but responsive robots (i𝒜n𝒜n,ni\in\mathcal{A}_{n}\setminus\mathcal{A}_{n,n}) in a warehouse environment seeking to traverse a narrow corridor intersected by a passageway occupied with 6 non-responsive agents (j𝒜n,nj\in\mathcal{A}_{n,n}). The non-responsive agents may be e.g. humans walking or some other dynamic obstacles. Let \mathcal{F} be an inertial frame with a point s0s_{0} denoting its origin, and assume that each robot may be modeled according to a dynamic extension of the kinematic bicycle model described by [31, Ch. 2], provided here for completeness:

x˙i\displaystyle\dot{x}_{i} =vi(cosψisinψitanβi)\displaystyle=v_{i}\left(\cos{\psi_{i}}-\sin{\psi_{i}}\tan{\beta_{i}}\right) (21a)
y˙i\displaystyle\dot{y}_{i} =vi(sinψi+cosψitanβi)\displaystyle=v_{i}\left(\sin{\psi_{i}}+\cos{\psi_{i}}\tan{\beta_{i}}\right) (21b)
ψ˙i\displaystyle\dot{\psi}_{i} =vilrtanβi\displaystyle=\frac{v_{i}}{l_{r}}\tan{\beta_{i}} (21c)
β˙i\displaystyle\dot{\beta}_{i} =ωi\displaystyle=\omega_{i} (21d)
v˙i\displaystyle\dot{v}_{i} =ai,\displaystyle=a_{i}, (21e)

where xix_{i} and yiy_{i} denote the position (in m) of the center of gravity (c.g.) of the ith robot with respect to s0s_{0}, ψi\psi_{i} is the orientation (in rad) of its body-fixed frame, i\mathcal{B}_{i}, with respect to \mathcal{F}, βi\beta_{i} is the slip angle111βi\beta_{i} is related to the steering angle δi\delta_{i} via tanβi=lrlr+lftanδi\tan{\beta_{i}}=\frac{l_{r}}{l_{r}+l_{f}}\tan{\delta_{i}}, where lf+lrl_{f}+l_{r} is the wheelbase with lfl_{f} (resp. lrl_{r}) the distance from the c.g. to the center of the front (resp. rear) wheel. (in rad) of the c.g. of the vehicle relative to i\mathcal{B}_{i} (assume |βi|<π2|\beta_{i}|<\frac{\pi}{2}), and viv_{i} is the velocity of the rear wheel with respect to \mathcal{F}. The state of robot ii is denoted 𝒛i=[xiyiψiβivi]T\bm{z}_{i}=[x_{i}\;y_{i}\;\psi_{i}\;\beta_{i}\;v_{i}]^{T}, and its control input is 𝒖i=[aiωi]T\bm{u}_{i}=[a_{i}\;\omega_{i}]^{T}, where aia_{i} is the acceleration of the rear wheel (in m/s2), and ωi\omega_{i} is the angular velocity (in rad/s) of βi\beta_{i}.

The challenges of this scenario relate to preserving safety despite multiple non-communicative and non-responsive agents present in a constrained environment. A robot is safe if it 1) obeys the speed restriction, 2) remains inside the corridor area, and 3) avoids collisions with all other robots. Speed is addressed with the following candidate CBF:

hv(𝒛i)\displaystyle h_{v}(\bm{z}_{i}) =sMvi,\displaystyle=s_{M}-v_{i}, (22)

where sM>0s_{M}>0, while for corridor safety and collision avoidance we used forms of the relaxed future-focused CBF introduced in [11] for roadway intersections, namely

hc(𝒛i)=(mL(xi+x˙i)+bL(yi+y˙i))(mR(xi+x˙i)+bR(yi+y˙i))\displaystyle\begin{split}h_{c}(\bm{z}_{i})&=(m_{L}(x_{i}+\dot{x}_{i})+b_{L}-(y_{i}+\dot{y}_{i}))\cdot\\ &\quad\;(m_{R}(x_{i}+\dot{x}_{i})+b_{R}-(y_{i}+\dot{y}_{i}))\end{split} (23)
hr(𝒛i,𝒛j)=D(𝒛i,𝒛j,t+τ^)2+ϵD(𝒛i,𝒛j,t)2(1+ϵ)(2R)2,\displaystyle\begin{split}h_{r}(\bm{z}_{i},\bm{z}_{j})&=D(\bm{z}_{i},\bm{z}_{j},t+\hat{\tau})^{2}\\ &\quad+\epsilon D(\bm{z}_{i},\bm{z}_{j},t)^{2}-(1+\epsilon)(2R)^{2},\end{split} (24)

where (23) prevents collisions with the corridor walls (defined as lines in the xyxy-plane via mL,bL,mR,bRm_{L},b_{L},m_{R},b_{R}\in\operatorname{\mathbb{R}}), and (24) prevents inter-robot collisions and is defined i𝒜n𝒜n,n\forall i\in\mathcal{A}_{n}\setminus\mathcal{A}_{n,n}, j𝒜n\forall j\in\mathcal{A}_{n}, where ϵ>0\epsilon>0, D(𝒛i,𝒛j,ta)D(\bm{z}_{i},\bm{z}_{j},t_{a}) is the Euclidean distance between agents ii and jj at arbitrary time tat_{a}, and τ^\hat{\tau} denotes the time in the interval [0,T][0,T] at which the minimum inter-agent distance will occur under constant velocity future trajectories. For a more detailed discussion on future-focused CBFs, see [11]. As such, (22), (23), and (24) define the sets

Sv,i\displaystyle S_{v,i} ={𝒛in|hv(𝒛i)0},\displaystyle=\{\bm{z}_{i}\in\operatorname{\mathbb{R}}^{n}\;|\;h_{v}(\bm{z}_{i})\geq 0\},
Sc,i\displaystyle S_{c,i} ={𝒛in|hc(𝒛i)0},\displaystyle=\{\bm{z}_{i}\in\operatorname{\mathbb{R}}^{n}\;|\;h_{c}(\bm{z}_{i})\geq 0\},
Sr,i\displaystyle S_{r,i} =j=1,jiA{𝒛N|hr(𝒛i,𝒛j)0},\displaystyle=\bigcap\limits_{j=1,j\neq i}^{A}\{\bm{z}\in\operatorname{\mathbb{R}}^{N}\;|\;h_{r}(\bm{z}_{i},\bm{z}_{j})\geq 0\},

the intersection of which constitutes the safe set for agents ii, i.e. Si(t)=Sv,iSc,iSr,iS_{i}(t)=S_{v,i}\cap S_{c,i}\cap S_{r,i}.

We control robots i𝒜n𝒜n,ni\in\mathcal{A}_{n}\setminus\mathcal{A}_{n,n} using a C-CBF based decentralized controller of the form (20) with constituent functions hch_{c}, hsh_{s}, hrh_{r}, an LQR based nominal control input (see [11, Appendix 1]), and initial gains 𝒌(0)=𝟏10×1\bm{k}(0)=\mathbf{1}_{10\times 1}. The non-responsive agents used a similar LQR controller to move through the passageway in pairs of two, with the first two pairs passing through the intersection without stopping and the last pair stopping at the intersection before proceeding.

As shown in Figure 2, the non-communicative robots traverse both the narrow corridor and the busy intersection to reach their goal locations safely. The trajectories of the gains 𝒌\bm{k} for each warehouse robot are shown in Figure 3, while their control inputs are depicted in Figure 4. The CBF time histories for the constituent and consolidated functions are highlighted in Figures 5 and 6 respectively, and show that the C-CBF controllers maintained safety at all times.

Refer to caption
Figure 2: XY paths for the warehouse robots (blue) and non-responsive agents (red) in the warehouse control problem.
Refer to caption
Figure 3: Gains 𝒌\bm{k} for the C-CBF controllers in the warehouse study. Robot 1 denoted with solid lines, dotted for robot 2, dash-dots for robot 3. AgentA and AgentB denote the other two non-communicative robots from the perspective of one (e.g. AgentA=Agent1 and AgentB=Agent3 for robot 2).
Refer to caption
Figure 4: Warehouse robot controls: accel. (aa) and slip angle rate (ω\omega).
Refer to caption
Figure 5: Evolution of warehouse robot constituent CBF candidates, hsh_{s} s[1..c]\forall s\in[1..c], synthesized to construct C-CBF.
Refer to caption
Figure 6: Evolution of C-CBF HH for warehouse robots 1, 2, and 3.

V Experimental Case Study

For experimental validation of our approach, we used an AION R1 UGV ground rover as an ego vehicle in the laboratory setting and required it to reach a goal location in the presence of two non-responsive rovers: one static and one dynamic. We modeled the rovers as bicycles using (21), and sent angular rate ωi\omega_{i} and velocity viv_{i} (numerically integrated based on the controller’s acceleration output) commands to the rovers’ on-board PID controllers. The ego rover used our proposed C-CBF (20) with constituent candidate CBFs (22) (with sM=1s_{M}=1 m/s) and the rff-CBF defined in (24) for collision avoidance. The nominal input to the C-CBF controller was the LQR law from the warehouse robot example, as was the controller used by the dynamic non-responsive rover. A Vicon motion capture system was used for position feedback, and the state estimation was performed by extended Kalman filter via the on-board PX4.

Refer to caption
Figure 7: A rover avoids a static and dynamic rover using our proposed C-CBF controller en route to a target in the laboratory setting.

For the setup, the static rover was placed directly between the ego rover and its goal, while the dynamic rover was stationary until suddenly moving across the ego’s path as it approached its target. As highlighted in Figure 7, the ego rover first headed away from the static rover and then decelerated and swerved to avoid a collision with the second rover before correcting course and reaching its goal. Videos and code for both this experiment and the simulation in Section IV is available on Github222Link to Github repo: github.com/6lackmitchell/CCBF-Control.

VI Conclusion

In this paper, we addressed the problem of safe control under multiple state constraints via a C-CBF based control design. To ensure that the synthesized C-CBF is valid, we introduced a parameter adaptation law on the weights of the C-CBF constituent functions and proved that the resulting controller is safe. We then demonstrated the success of our approach on a multi-robot control problem in a crowded warehouse environment, and further validated our work on a ground rover experiment in the lab.

In the future, we plan to explore conditions under which the C-CBF approach may preserve guarantees in the presence of input constraints, including whether alternative adaptation laws for the weights assist in guarantees of liveness in addition to safety.

References

  • [1] P. Wieland and F. Allgöwer, “Constructive safety using control barrier functions,” IFAC Proceedings Vols., vol. 40, no. 12, pp. 462–467, 2007.
  • [2] A. D. Ames, X. Xu, J. W. Grizzle, and P. Tabuada, “Control barrier function based quadratic programs for safety critical systems,” IEEE Trans. on Automatic Control, vol. 62, no. 8, pp. 3861–3876, 2017.
  • [3] W. Xiao and C. Belta, “Control barrier functions for systems with high relative degree,” in IEEE 58th Conference on Decision and Control (CDC), 2019, pp. 474–479.
  • [4] W. S. Cortez, D. Oetomo, C. Manzie, and P. Choong, “Control barrier functions for mechanical systems: Theory and application to robotic grasping,” in IEEE Trans. on Control Systems Tech., 2019, pp. 1–16.
  • [5] Y. Chen, H. Peng, and J. Grizzle, “Obstacle avoidance for low-speed autonomous vehicles with barrier function,” IEEE Transactions on Control Systems Technology, vol. 26, no. 1, pp. 194–206, 2018.
  • [6] K. Garg and D. Panagou, “Robust control barrier and control lyapunov functions with fixed-time convergence guarantees,” in 2021 American Control Conference (ACC), 2021, pp. 2292–2297.
  • [7] Y. Chen, A. Singletary, and A. D. Ames, “Guaranteed obstacle avoidance for multi-robot operations with limited actuation: A control barrier function approach,” IEEE Control Systems Letters, vol. 5, no. 1, pp. 127–132, 2021.
  • [8] M. Jankovic and M. Santillo, “Collision avoidance and liveness of multi-agent systems with cbf-based controllers,” in 2021 60th IEEE Conference on Decision and Control (CDC), 2021, pp. 6822–6828.
  • [9] B. Xu and K. Sreenath, “Safe teleoperation of dynamic uavs through control barrier functions,” in 2018 IEEE International Conference on Robotics and Automation (ICRA), 2018, pp. 7848–7855.
  • [10] M. Khan, M. Zafar, and A. Chatterjee, “Barrier functions in cascaded controller: Safe quadrotor control,” in 2020 American Control Conference (ACC), 2020, pp. 1737–1742.
  • [11] M. Black, M. Jankovic, A. Sharma, and D. Panagou, “Intersection crossing with future-focused control barrier functions,” arXiv preprint arXiv:2204.00127, 2022.
  • [12] S. Yaghoubi, G. Fainekos, T. Yamaguchi, D. Prokhorov, and B. Hoxha, “Risk-bounded control with kalman filtering and stochastic barrier functions,” in 2021 60th IEEE Conference on Decision and Control (CDC), 2021, pp. 5213–5219.
  • [13] J. Breeden and D. Panagou, “High relative degree control barrier functions under input constraints,” in 2021 60th IEEE Conference on Decision and Control (CDC), 2021, pp. 6119–6124.
  • [14] W. Xiao, C. Belta, and C. G. Cassandras, “Adaptive control barrier functions,” IEEE Transactions on Automatic Control, vol. 67, no. 5, pp. 2267–2281, 2022.
  • [15] W. S. Cortez, X. Tan, and D. V. Dimarogonas, “A robust, multiple control barrier function framework for input constrained systems,” IEEE Control Systems Letters, vol. 6, pp. 1742–1747, 2022.
  • [16] P. Glotfelter, J. Cortes, and M. Egerstedt, “Nonsmooth barrier functions with applications to multi-robot systems,” IEEE Control Systems Letters, vol. 1, pp. 310–315, 10 2017.
  • [17] Y. Huang and Y. Chen, “Switched Control Barrier Function With Applications to Vehicle Safety Control,” ser. Dynamic Systems and Control Conference, vol. 1, 10 2020.
  • [18] L. Lindemann and D. V. Dimarogonas, “Control barrier functions for signal temporal logic tasks,” IEEE Control Systems Letters, vol. 3, no. 1, pp. 96–101, 2019.
  • [19] M. Machida and M. Ichien, “Consensus-based control barrier function for swarm,” in 2021 IEEE International Conference on Robotics and Automation (ICRA), 2021, pp. 8623–8628.
  • [20] M. Black, E. Arabi, and D. Panagou, “Fixed-time parameter adaptation for safe control synthesis,” arXiv preprint arXiv:2204.10453, 2022.
  • [21] B. T. Lopez, J.-J. E. Slotine, and J. P. How, “Robust adaptive control barrier functions: An adaptive and data-driven approach to safety,” IEEE Control Systems Letters, vol. 5, no. 3, pp. 1031–1036, 2021.
  • [22] A. J. Taylor and A. D. Ames, “Adaptive safety with control barrier functions,” in 2020 American Control Conference (ACC), 2020, pp. 1399–1405.
  • [23] T. Gurriet, A. Singletary, J. Reher, L. Ciarletta, E. Feron, and A. Ames, “Towards a framework for realizable safety critical control through active set invariance,” in 9th ACM/IEEE International Conference on Cyber-Physical Systems (ICCPS), 2018, pp. 98–106.
  • [24] S. Kolathaya and A. D. Ames, “Input-to-state safety with control barrier functions,” IEEE Control Systems Letters, vol. 3, no. 1, pp. 108–113, 2019.
  • [25] F. Blanchini, “Set invariance in control,” Automatica, vol. 35, no. 11, pp. 1747–1767, 1999.
  • [26] M. Jankovic, M. Santillo, and Y. Wang, “Multi-agent systems with cbf-based controllers – collision avoidance and liveness from instability,” arXiv preprint arXiv:2207.04915, 2022.
  • [27] U. Borrmann, L. Wang, A. D. Ames, and M. Egerstedt, “Control barrier certificates for safe swarm behavior,” IFAC-PapersOnLine, vol. 48, no. 27, pp. 68–73, 2015.
  • [28] L. Wang, A. D. Ames, and M. Egerstedt, “Safety barrier certificates for collisions-free multirobot systems,” vol. 33, no. 3. IEEE, 2017, pp. 661–674.
  • [29] H. Parwana and D. Panagou, “Trust-based rate-tunable control barrier functions for non-cooperative multi-agent systems,” arXiv preprint arXiv:2204.04555, 2022.
  • [30] T. F. Coleman and D. C. Sorensen, “A note on the computation of an orthonormal basis for the null space of a matrix,” Mathematical Programming, vol. 29, pp. 234–242, 6 1984.
  • [31] R. Rajamani, Vehicle Dynamics and Control. Springer US, 2012.