A computationally efficient approach for stochastic reachability set analysis

Amit Jain, Damién Gueho, Puneet Singla

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

The reachability set is defined as the collection of all states which can be traversed from arbitrary initial conditions due to the application of admissible control. Three different probabilistic approaches to compute the reachability sets for a class of discrete time nonlinear systems is discussed. The main idea of the probabilistic approach is to consider the bounded control variables as random variables and represent the reachability sets as the level sets of the state probability density function. In the first approach, the computation of the state density function due to variation in control input at each time is made tractable by computing the Mfold convolution of state density function at each time. To overcome the significant challenge of taking multi-dimension convolution of state density function, the second approach computes the probability density function using the Principle of Maximum Entropy (PME). The third approach utilizes the Conjugate Unscented Transform (CUT) method to curtail the combinatorial growth of samples. Finally, three numerical example problems are considered to show the efficacy and utility of the proposed ideas.

Original languageEnglish (US)
Title of host publicationAIAA Scitech 2020 Forum
PublisherAmerican Institute of Aeronautics and Astronautics Inc, AIAA
ISBN (Print)9781624105951
DOIs
StatePublished - 2020
EventAIAA Scitech Forum, 2020 - Orlando, United States
Duration: Jan 6 2020Jan 10 2020

Publication series

NameAIAA Scitech 2020 Forum
Volume1 PartF

Conference

ConferenceAIAA Scitech Forum, 2020
Country/TerritoryUnited States
CityOrlando
Period1/6/201/10/20

All Science Journal Classification (ASJC) codes

  • Aerospace Engineering

Fingerprint

Dive into the research topics of 'A computationally efficient approach for stochastic reachability set analysis'. Together they form a unique fingerprint.

Cite this