Convex Optimization for Trajectory Generation Arxiv:2106.09125V1 [Math.OC] 16 Jun 2021

Total Page:16

File Type:pdf, Size:1020Kb

Convex Optimization for Trajectory Generation Arxiv:2106.09125V1 [Math.OC] 16 Jun 2021 Preprint Convex Optimization for Trajectory Generation A Tutorial On Generating Dynamically Feasible Trajectories Reliably And Efficiently Danylo Malyuta a,? , Taylor P. Reynolds a, Michael Szmuk a, Thomas Lew b, Riccardo Bonalli b, Marco Pavone b, and Behc¸et Ac¸ıkmes¸e a a William E. Boeing Department of Aeronautics and Astronautics, University of Washington, Seattle, WA 98195, USA b Department of Aeronautics and Astronautics, Stanford University, Stanford, CA 94305, USA Reliable and efficient trajectory generation methods are a fundamental need for autonomous dynamical systems of tomorrow. The goal of this article is to provide a comprehensive tutorial of three major con- vex optimization-based trajectory generation methods: lossless convexification (LCvx), and two sequential convex programming algorithms known as SCvx and GuSTO. In this article, trajectory generation is the computation of a dynamically feasible state and control signal that satisfies a set of constraints while opti- mizing key mission objectives. The trajectory generation problem is almost always nonconvex, which typ- ically means that it is not readily amenable to efficient and reliable solution onboard an autonomous ve- hicle. The three algorithms that we discuss use problem reformulation and a systematic algorithmic strat- egy to nonetheless solve nonconvex trajectory generation tasks through the use of a convex optimizer. The theoretical guarantees and computational speed offered by convex optimization have made the algo- rithms popular in both research and industry circles. To date, the list of applications include rocket land- ing, spacecraft hypersonic reentry, spacecraft rendezvous and docking, aerial motion planning for fixed- wing and quadrotor vehicles, robot motion planning, and more. Among these applications are high-profile rocket flights conducted by organizations like NASA, Masten Space Systems, SpaceX, and Blue Origin. This article aims to give the reader the tools and understanding necessary to work with each algorithm, and to know what each method can and cannot do. A publicly available source code repository supports the numerical examples provided at the end of this article. By the end of the article, the reader should be ready to use each method, to extend them, and to contribute to their many exciting modern applications. utonomous vehicles and robots promise many ual vehicles must be endowed with their own high qual- exciting new applications that will transform ity decision making capability. Failure to generate a safe our society. For example, autonomous aerial trajectory can result in losing the vehicle, the payload, vehicles (AAVs) operating in urban envi- and even human life. Reliable methods for trajectory ronments could deliver commercial goods, generation are a fundamental need if we are to maintain Aemergency medical supplies, monitor traffic, and provide public trust and the high safety standard that we have threat alerts for national security [1]. At the same come to expect from autonomous or automatic systems time, these applications present significant engineering [5]. challenges for performance, trustworthiness, and safety. Computational resource requirements are the second For instance, AAVs can be a catastrophic safety hazard major consideration for onboard trajectory generation. arXiv:2106.09125v1 [math.OC] 16 Jun 2021 should they lose control or situational awareness over a Historically, this has been the driving factor for much populated area. Space missions, self-driving cars, and of practical algorithm development [6,7]. Although applications of autonomous underwater vehicles (AUVs) the modern consumer desktop is an incredibly powerful share similar concerns. machine, industrial central processing units (CPUs) can Generating a trajectory autonomously onboard the ve- still be relatively modest [8]. This is especially true hicle is not only desirable for many of these applications for spaceflight, where the harsh radiation environment but also indeed a necessity when considering the deploy- of outer space prevents the rapid adoption of new ment of autonomous systems either in remote areas with computing technologies. For example, NASA's flagship little to no communication, or at scale in a dynamic and Mars rover \Perseverance" landed in 2021 using a uncertain world. For example, it is not possible to re- BAE RAD750 PowerPC flight computer, which is a motely control a spacecraft during a Mars landing sce- 20 year-old technology [9, 10]. When we factor in the nario [2,3,4], nor is it practical to coordinate the motion energy requirements of powerful CPUs and the fact that of tens of thousands of delivery drones from a centralized trajectory generation is a small part of all the tasks location [1]. In these and many other scenarios, individ- that an autonomous vehicle must perform, it becomes ? Corresponding author. clear that modern trajectory generation is still confined E-mail address: [email protected] to a small computational footprint. Consequently, real- 1 Preprint time onboard trajectory generation algorithms must be The cost (1a) encodes the mission goal, the system computationally efficient. dynamics are modeled by the differential equation con- We define trajectory generation to be the computation straint (1b), the state and control specifications are en- of a multi-dimensional temporal state and control signal forced through (1c), and the boundary conditions are that satisfies a set of specifications, while optimizing key fixed by (1d). Note that Problem1 makes a distinction mission objectives. This article is concerned exclusively between a control vector u(t), which is a temporal signal, with dynamically feasible trajectories, which are those and a so-called parameter vector p, which is a static vari- that respect the equations of motion of the vehicle under able that encodes other decision variables like temporal consideration. Although it is commonplace to track dy- scaling. namically infeasible trajectories using feedback control, In most cases, the solution of such an infinite-dimen- at the end of the day a system can only evolve along sional optimization problem is neither available in closed dynamically feasible paths, whether those are computed form nor is it computationally tractable to numerically upfront during trajectory generation or are the result compute (especially in real-time). Instead, different so- of feedback tracking. Performing dynamically feasible lution methods have been proposed that typically share trajectory generation carries two important advantages. the following three main components: First, it provides a method to systematically satisfy con- straints (i.e., specifications) that are hard, if not impos- Formulation: specification of how the functions J and f, and the sets , 0, and f are expressed mathe- sible, to meet through feedback control. This includes, C X X for example, translation-attitude coupled sensor pointing matically; constraints. Secondly, dynamically feasible trajectories Discretization: approximation of the infinite-dimen- leave much less tracking error for feedback controllers to sional state and control signal by a finite-dimensional \clean up", which usually means that tracking perfor- set of basis functions; mance can be vastly improved. These two advantages shall become more apparent throughout the article. Numerical optimization: iterative computation of an Numerical optimization provides a systematic mathe- optimal solution of the discretized problem. matical framework to specify mission objectives as costs or rewards to be optimized, and to enforce state and Choosing the most suitable combination of these three control specifications as well as the equations of motion components is truly a mathematical art form that is via constraints. As a result, we can express trajectory highly problem dependent, and not an established plug- generation problems as optimal control problems, which and-play process like least-squares regression [26]. No are infinite-dimensional optimization problems over func- single recipe or method is the best, and methods that tion spaces [11, 12]. Since the early 1960s, optimal con- work well for some problems can fare much worse for trol theory has proven to be extremely powerful [6, 13]. others. Trajectory algorithm design is replete with prob- Early developments were driven by aerospace applica- lem dependent tradeoffs in performance, optimality, and tions, where every gram of mass matters and trajectories robustness, among others. Still, optimization literature are typically sought to minimize fuel or some other mass- (to which this article belongs) attempts to provide some reducing metric (such as aerodynamic load and thereby formal guidance and intuition about the process. For structural mass). This led to work on trajectory algo- the rest of this article, we will be interested in meth- rithms for climbing aircraft, ascending and landing rock- ods that solve the exact form of Problem1, subject ets, and spacecraft orbit transfer, to name just a few only to the initial approximation made by discretizing [14, 15, 16, 17, 18, 19]. Following these early applica- the continuous-time dynamics. tions, trajectory optimization problems have now been Many excellent references discuss the discretization formulated in many practical areas, including aerial, un- component [13, 27, 28]. Once the problem is discretized, derwater, and space vehicles, as well as for chemical pro- we can employ numerical optimization methods to obtain cesses [20, 21, 22], building
Recommended publications
  • RAD750 at Our Website: Click HERE RAD750• Board
    Full-service, independent repair center -~ ARTISAN® with experienced engineers and technicians on staff. TECHNOLOGY GROUP ~I We buy your excess, underutilized, and idle equipment along with credit for buybacks and trade-ins. Custom engineering Your definitive source so your equipment works exactly as you specify. for quality pre-owned • Critical and expedited services • Leasing / Rentals/ Demos equipment. • In stock/ Ready-to-ship • !TAR-certified secure asset solutions Expert team I Trust guarantee I 100% satisfaction Artisan Technology Group (217) 352-9330 | [email protected] | artisantg.com All trademarks, brand names, and brands appearing herein are the property o f their respective owners. Find the BAE Systems RAD750 at our website: Click HERE RAD750 Board Hardware Specification Document Number 234A524 Release Date August 1, 2000 Copyright by BAE SYSTEMS All Rights Reserved Document Number: 234A524 RAD750 CompactPCI Hardware Specification Notices Before using this information and the product it supports, be sure to read the general information on the back cover of this book. Trademarks The following are trademarks of International Business Machines Corporation in the United States, or other countries, or both: IBM IBM Logo PowerPC PowerPC 750 The following are trademarks of BAE SYSTEMS in the United States, or other countries, or both: RAD750 The following are registered trademarks of PCI Industrial Computer Manufacturing Group in the United States, or other countries, or both: PICMG CompactPCI Other company, product, and service names may be trademarks or service marks of others. Preliminary Edition (Version 4.0, 8/1/2000) This unpublished document is the preliminary edition of RAD750 3U CompactPCI board Hardware Specification.
    [Show full text]
  • Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware
    Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware Yanyan Shen Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy School of Computer Science and Engineering Faculty of Engineering March 2019 Thesis/Dissertation Sheet Surname/Family Name : Shen Given Name/s : Yanyan Abbreviation for degree as give in the University calendar : PhD Faculty : Faculty of Engineering School : School of Computer Science and Engineering Microkernel Mechanisms for Improving the Trustworthiness of Commodity Thesis Title : Hardware Abstract 350 words maximum: (PLEASE TYPE) The thesis presents microkernel-based software-implemented mechanisms for improving the trustworthiness of computer systems based on commercial off-the-shelf (COTS) hardware that can malfunction when the hardware is impacted by transient hardware faults. The hardware anomalies, if undetected, can cause data corruptions, system crashes, and security vulnerabilities, significantly undermining system dependability. Specifically, we adopt the single event upset (SEU) fault model and address transient CPU or memory faults. We take advantage of the functional correctness and isolation guarantee provided by the formally verified seL4 microkernel and hardware redundancy provided by multicore processors, design the redundant co-execution (RCoE) architecture that replicates a whole software system (including the microkernel) onto different CPU cores, and implement two variants, loosely-coupled redundant co-execution (LC-RCoE) and closely-coupled redundant co-execution (CC-RCoE), for the ARM and x86 architectures. RCoE treats each replica of the software system as a state machine and ensures that the replicas start from the same initial state, observe consistent inputs, perform equivalent state transitions, and thus produce consistent outputs during error-free executions.
    [Show full text]
  • Reinforcement Learning and Optimal Control
    Reinforcement Learning and Optimal Control by Dimitri P. Bertsekas Massachusetts Institute of Technology WWW site for book information and orders http://www.athenasc.com Athena Scientific, Belmont, Massachusetts Athena Scientific Post Office Box 805 Nashua, NH 03060 U.S.A. Email: [email protected] WWW: http://www.athenasc.com Cover photography: Dimitri Bertsekas c 2019 Dimitri P. Bertsekas All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. Publisher’s Cataloging-in-Publication Data Bertsekas, Dimitri P. Reinforcement Learning and Optimal Control Includes Bibliography and Index 1. Mathematical Optimization. 2. Dynamic Programming. I. Title. QA402.5.B4652019 519.703 00-91281 ISBN-10: 1-886529-39-6, ISBN-13: 978-1-886529-39-7 ABOUT THE AUTHOR Dimitri Bertsekas studied Mechanical and Electrical Engineering at the National Technical University of Athens, Greece, and obtained his Ph.D. in system science from the Massachusetts Institute of Technology. He has held faculty positions with the Engineering-Economic Systems Department, Stanford University, and the Electrical Engineering Department of the Uni- versity of Illinois, Urbana. Since 1979 he has been teaching at the Electrical Engineering and Computer Science Department of the Massachusetts In- stitute of Technology (M.I.T.), where he is currently McAfee Professor of Engineering. Starting in August 2019, he will also be Fulton Professor of Computational Decision Making at the Arizona State University, Tempe, AZ. Professor Bertsekas’ teaching and research have spanned several fields, including deterministic optimization, dynamic programming and stochas- tic control, large-scale and distributed computation, and data communi- cation networks.
    [Show full text]
  • Optimal Engine Selection and Trajectory Optimization Using Genetic Algorithms for Conceptual Design Optimization of Reusable Space Launch Vehicles
    Optimal Engine Selection and Trajectory Optimization using Genetic Algorithms for Conceptual Design Optimization of Reusable Space Launch Vehicles Steven Cory Wyatt Steele Thesis submitted to the Faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements of the degree of Master of Science in Mechanical Engineering Walter F. O’Brien, Chair Michael von Spakovsky Eugene Cliff February 19, 2015 Blacksburg, Virginia Keywords: Trajectory Optimization, Engine Selection, Reusable Launch Vehicle (RLV), Two Stage to Orbit (TSTO) Optimal Engine Selection and Trajectory Optimization using Genetic Algorithms for Conceptual Design Optimization of Reusable Space Launch Vehicles Steven Cory Wyatt Steele Abstract Proper engine selection for Reusable Launch Vehicles (RLVs) is a key factor in the design of low cost reusable launch systems for routine access to space. RLVs typically use combinations of different types of engines used in sequence over the duration of the flight. Also, in order to properly choose which engines are best for an RLV design concept and mission, the optimal trajectory that maximizes or minimizes the mission objective must be found for that engine configuration. Typically this is done by the designer iteratively choosing engine combinations based on his/her judgment and running each individual combination through a full trajectory optimization to find out how well the engine configuration performed on board the desired RLV design. This thesis presents a new method to reliably predict the optimal engine configuration and optimal trajectory for a fixed design of a conceptual RLV in an automated manner. This method is accomplished using the original code Steele-Flight.
    [Show full text]
  • Simulation and Application of GPOPS for Trajectory Optimization and Mission Planning Tool Danielle E
    Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 3-10-2010 Simulation and Application of GPOPS for Trajectory Optimization and Mission Planning Tool Danielle E. Yaple Follow this and additional works at: https://scholar.afit.edu/etd Part of the Systems Engineering and Multidisciplinary Design Optimization Commons Recommended Citation Yaple, Danielle E., "Simulation and Application of GPOPS for Trajectory Optimization and Mission Planning Tool" (2010). Theses and Dissertations. 2060. https://scholar.afit.edu/etd/2060 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. SIMULATION AND APPLICATION OF GPOPS FOR A TRAJECTORY OPTIMIZATION AND MISSION PLANNING TOOL THESIS Danielle E. Yaple, 2nd Lieutenant, USAF AFIT/GAE/ENY/10-M29 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED The views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department of Defense, or the United States Government. This material is declared a work of the U.S. Government and is not subject to copyright protection in the United States. AFIT/GAE/ENY/10-M29 SIMULATION AND APPLICATION OF GPOPS FOR A TRAJECTORY OPTIMIZATION AND MISSION PLANNING TOOL THESIS Presented to the Faculty Department of Aeronautics and Astronautics Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Science in Aeronautical Engineering Danielle E.
    [Show full text]
  • Sampling and Inference in Complex Networks Jithin Kazhuthuveettil Sreedharan
    Sampling and inference in complex networks Jithin Kazhuthuveettil Sreedharan To cite this version: Jithin Kazhuthuveettil Sreedharan. Sampling and inference in complex networks. Other [cs.OH]. Université Côte d’Azur, 2016. English. NNT : 2016AZUR4121. tel-01485852 HAL Id: tel-01485852 https://tel.archives-ouvertes.fr/tel-01485852 Submitted on 9 Mar 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. École doctorale STIC Sciences et Technologies de l’Information et de la Communication Unité de recherche: INRIA (équipe Maestro) Thèse de doctorat Présentée en vue de l’obtention du grade de Docteur en Sciences de l’UNIVERSITE COTE D’AZUR Mention : Informatique par Jithin Kazhuthuveettil Sreedharan Sampling and Inference in Complex Networks (Échantillonnage et Inférence dans Réseaux Complexes) Dirigé par Konstantin Avrachenkov Soutenue le 2 décembre 2016 Devant le jury composé de: Konstantin Avrachenkov - Inria, France Directeur Nelly Litvak - University of Twente, The Netherlands Rapporteur Don Towsley - University of Massachusetts, USA Rapporteur Philippe Jacquet - Nokia Bell Labs, France Examinateur Alain Jean-Marie - Inria, France Président Abstract The recent emergence of large evolving networks, mainly due to the rise of Online Social Networks (OSNs), brought out the difficulty to gather a complete picture of a network and it opened up the development of new distributed techniques.
    [Show full text]
  • IBM Systems Group
    IBM STG Deep Computing IBM Systems Group Deep Computing with IBM Systems Barry Bolding, Ph.D. IBM Deep Computing SciComp 2005 Confidential | Systems Group 2004 © 2004 IBM Corporation IBM Systems and Technology Group Deep Computing Components High Performance Computing Leadership Research and Innovation Systems Expertise – pSeries – xSeries – Storage – Networking Innovative Systems © 2004 IBM Corporation IBM Systems and Technology Group Deep Computing Focus Government Research Labs – Energy and Defense Weather/Environmental – Weather Forecasting Centers – Climate Modeling Higher Education/Research Universities Life Sciences – Pharma, BioTech, Chemical Aero/Auto Petroleum Business Intelligence, Digital Media, Financial Services, On Demand HPC © 2004 IBM Corporation IBM STG Deep Computing Deep Computing Teams and Organization Confidential | Systems Group 2004 © 2004 IBM Corporation IBM Systems and Technology Group Deep Computing Technical Team Kent Winchell Technical Team Deep Computing Barry Bolding Jeff Zais Technical Manager Technical Manager Public Sector Industrial Sector Farid Parpia John Bauer Martin Feyereisen Doug Petesch HPC Applications HPC Storage Auto/Aero Auto/Aero Life Sciences Government, HPC Business Intelligence “Suga” Sugavanam Wei Chen Charles Grassl Guangye Li EDA Government HPC Applications Auto/Aero Asia Pacific HPC HIgher Ed. BlueGene/L Stephen Behling Ray Paden Si MacAlester Harry Young Higher Ed GPFS CFD HPC Storage Digitial Media Digital Media Joseph Skovira James Abeles Scott Denham Janet Shiu Schedulers
    [Show full text]
  • Computer Architectures an Overview
    Computer Architectures An Overview PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 25 Feb 2012 22:35:32 UTC Contents Articles Microarchitecture 1 x86 7 PowerPC 23 IBM POWER 33 MIPS architecture 39 SPARC 57 ARM architecture 65 DEC Alpha 80 AlphaStation 92 AlphaServer 95 Very long instruction word 103 Instruction-level parallelism 107 Explicitly parallel instruction computing 108 References Article Sources and Contributors 111 Image Sources, Licenses and Contributors 113 Article Licenses License 114 Microarchitecture 1 Microarchitecture In computer engineering, microarchitecture (sometimes abbreviated to µarch or uarch), also called computer organization, is the way a given instruction set architecture (ISA) is implemented on a processor. A given ISA may be implemented with different microarchitectures.[1] Implementations might vary due to different goals of a given design or due to shifts in technology.[2] Computer architecture is the combination of microarchitecture and instruction set design. Relation to instruction set architecture The ISA is roughly the same as the programming model of a processor as seen by an assembly language programmer or compiler writer. The ISA includes the execution model, processor registers, address and data formats among other things. The Intel Core microarchitecture microarchitecture includes the constituent parts of the processor and how these interconnect and interoperate to implement the ISA. The microarchitecture of a machine is usually represented as (more or less detailed) diagrams that describe the interconnections of the various microarchitectural elements of the machine, which may be everything from single gates and registers, to complete arithmetic logic units (ALU)s and even larger elements.
    [Show full text]
  • Madeleine Udell's Thesis
    GENERALIZED LOW RANK MODELS A DISSERTATION SUBMITTED TO THE INSTITUTE FOR COMPUTATIONAL AND MATHEMATICAL ENGINEERING AND THE COMMITTEE ON GRADUATE STUDIES OF STANFORD UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Madeleine Udell May 2015 c Copyright by Madeleine Udell 2015 All Rights Reserved ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. (Professor Stephen Boyd) Principal Adviser I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. (Professor Ben Van Roy) I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality as a dissertation for the degree of Doctor of Philosophy. (Professor Lester Mackey) Approved for the Stanford University Committee on Graduate Studies iii Abstract Principal components analysis (PCA) is a well-known technique for approximating a tabular data set by a low rank matrix. This dissertation extends the idea of PCA to handle arbitrary data sets consisting of numerical, Boolean, categorical, ordinal, and other data types. This framework encompasses many well known techniques in data analysis, such as nonnegative matrix factorization, matrix completion, sparse and robust PCA, k-means, k-SVD, and maximum margin matrix factorization. The method handles heterogeneous data sets, and leads to coherent schemes for compress- ing, denoising, and imputing missing entries across all data types simultaneously.
    [Show full text]
  • Nash Q-Learning for General-Sum Stochastic Games
    Journal of Machine Learning Research 4 (2003) 1039-1069 Submitted 11/01; Revised 10/02; Published 11/03 Nash Q-Learning for General-Sum Stochastic Games Junling Hu [email protected] Talkai Research 843 Roble Ave., 2 Menlo Park, CA 94025, USA Michael P. Wellman [email protected] Artificial Intelligence Laboratory University of Michigan Ann Arbor, MI 48109-2110, USA Editor: Craig Boutilier Abstract We extend Q-learning to a noncooperative multiagent context, using the framework of general- sum stochastic games. A learning agent maintains Q-functions over joint actions, and performs updates based on assuming Nash equilibrium behavior over the current Q-values. This learning protocol provably converges given certain restrictions on the stage games (defined by Q-values) that arise during learning. Experiments with a pair of two-player grid games suggest that such restric- tions on the game structure are not necessarily required. Stage games encountered during learning in both grid environments violate the conditions. However, learning consistently converges in the first grid game, which has a unique equilibrium Q-function, but sometimes fails to converge in the second, which has three different equilibrium Q-functions. In a comparison of offline learn- ing performance in both games, we find agents are more likely to reach a joint optimal path with Nash Q-learning than with a single-agent Q-learning method. When at least one agent adopts Nash Q-learning, the performance of both agents is better than using single-agent Q-learning. We have also implemented an online version of Nash Q-learning that balances exploration with exploitation, yielding improved performance.
    [Show full text]
  • Proquest Dissertations
    ROBUST MODEL PREDICTIVE CONTROL FOR PROCESS CONTROL AND SUPPLY CHAIN OPTIMIZATION By XIANG LI, B.Eng., M.Eng. A Thesis Submitted to the School of Graduate Studies in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy McMaster University © Copyright by Xiang Li, September 2009 Library and Archives Bibliotheque et 1*1 Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington OttawaONK1A0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-64703-5 Our file Notre reference ISBN: 978-0-494-64703-5 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library and permettant a la Bibliotheque et Archives Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Nnternet, preter, telecommunication or on the Internet, distribuer et vendre des theses partout dans le loan, distribute and sell theses monde, a des fins commerciales ou autres, sur worldwide, for commercial or non­ support microforme, papier, electronique et/ou commercial purposes, in microform, autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in this et des droits moraux qui protege cette these. Ni thesis. Neither the thesis nor la these ni des extraits substantiels de celle-ci substantial extracts from it may be ne doivent etre imprimes ou autrement printed or otherwise reproduced reproduits sans son autorisation.
    [Show full text]
  • LIDS – a BRIEF HISTORY Alan S
    LIDS – A BRIEF HISTORY Alan S. Willsky The Laboratory for Information and Decision Systems (LIDS) is MIT’s oldest laboratory and has evolved in scope and changed its name several times during its long and rich history. For a more detailed account of its early years, see From Servo Loops to Fiber Nets, a document produced in 1990 by then-co-directors Sanjoy K. Mitter and Robert G. Gallager as part LIDS’ 50th anniversary celebration. The 1940s into the 1950s The Servomechanism Laboratory was established in 1940 by Professor Gordon Brown, one year before the United States entered World War II. At that time, the concepts of feedback control and servomechanisms were being codified and recognized as important disciplines, and the need for advances – initially driven by military challenges and later by industrial automation – were substantial. Indeed, the first electrical engineering department courses in servomechanisms were created only in 1939 and were codified in the classic 1948 textbook Principles of Servomechanisms by Gordon Brown and Donald Campbell. Wartime applications such as servo controls for the pointing of guns pushed the application and the foundational methodology and theory of servomechanisms and control. On the theoretical/methodological side, this push led to the 1957 text Analytical Design of Linear Feedback Controls, by George Newton, Leonard Gould, and James Kaiser, which combined Norbert Wiener’s theory of estimation of time series and the principles of servomechanisms to create new approaches to control design and the understanding of fundamental limits of performance. On the applications side, military and industrial post-war challenges led to major programs and contributions by researchers in the Lab.
    [Show full text]