Greedy Synthesis of Event- and Self-Triggered Controls
with Control Lyapunov-Barrier Function
Abstract
This paper addresses the co-design problem of control inputs and execution decisions for event- and self-triggered controls subject to constraints given by the control Lyapunov function and control barrier function. The proposed approach computes the control input in a way that allows for longer inter-execution intervals, which distinguishes it from many existing event- and self-triggered controllers or control Lyapunov-barrier function controllers. The proposed approach guarantees lower bounds on the minimum inter-execution times. The effectiveness of the proposed approach is demonstrated and compared with existing approaches using a numerical example.
I INTRODUCTION
Control Barrier Function (CBF) [1] is a function used to design control inputs to satisfy safety requirements. As the use of automatic control increases in safety-critical systems, CBF is attracting much attention recently. Applications of CBF can be found such as in robotics [2] and adaptive cruise control [3]. Furthermore, CBF has been combined with signal temporal logic [4], model predictive control [5] and extended to assuring risk-sensitive safety [6], making it more versatile for a wider range of applications. On the other hand, Control Lyapunov Function (CLF) [7, 8], an extension of the Lyapunov function, has been widely used to design stabilizing controllers for many different problems (see e.g., [9, 10, 11, 12]). After an integration of CLF and CBF was proposed in [13, 14], it has been shown that CLF and CBF can be combined to form a quadratic program (QP) for computing control inputs that ensure safety while aiming at stability in [15, 16]. Since then, the CLF-CBF QP approach has been used to solve various problems, such as autonomous surface vehicles [17] and safe stabilization [18].
With the increasing prevalence of networked control systems, where the communication bandwidth is shared with other tasks or batteries are used in the system elements, it has become crucial to design systems that use communication bandwidth and energy efficiently. Event- and self-triggered control approaches are effective solutions to minimize unnecessary communication and energy consumption for such systems [19, 20, 21].
Several approaches have been proposed for safety-critical systems using event- or self-triggered strategies. An event-triggered control based on input-to-state safe barrier functions by using a state feedback control law was proposed in [22]. The approach is to bound the difference between the current state and the state used to compute the control input, i.e., the state at the previous execution time instance, to guarantee that the value of the barrier function monotonically decreases. More recently, [23] proposed an approach of event-triggered control for multi-agent systems with unknown dynamics. It synthesizes an event-triggered control with an adaptive affine dynamics that are updated based on the error states to estimate the real system state. A combination of self-triggered control and CLF-CBF QP was proposed in [24]; however, it does not seem to guarantee the existence of the control input. Moreover, it possibly results in continuous control updates if the optimal control input is achieved at the boundary of the QP.
The main contribution of this paper is to introduce approaches to co-designing control inputs and execution time instances for event- and self- triggered controls, with the aim of meeting the constraints given by the control Lyapunov function and control barrier function while reducing the number of executions. This is achieved by computing the control input so as to obtain long inter-execution intervals in a greedy manner. The approach is different from many existing event- and self-triggered controllers that rely on constant feedback laws [20] or control Lyapunov-barrier function controllers that account for only the cost of control inputs. It is also shown that the proposed approach does not exhibit Zeno behavior and that the optimization parameters appear in a lower bound on the minimum inter-execution time.
The rest of the paper is organized as follows. After introducing the notation, system model, and basics of control Lyapunov-barrier function in Section II, Section III presents the proposed event-triggered control approach. Section IV discusses the extension to the self-triggered control approach. The performances of those proposed controllers are illustrated and compared with existing controllers in Section V, which is followed by conclusions in Section VI.
II PRELIMINARIES
II-A Notation
The sets of real numbers, real vectors of length , and real matrices of size are denoted by , , and , respectively. The sets of nonnegative numbers and nonnegative integers are denoted by and , respectively.
denotes the Lie derivative of along the vector field , i.e. .
A continuous function is said to belong to class if it is strictly increasing and . A continuous function is said to belong to class if it belongs to class and as .
II-B System Model
This paper deals with a nonlinear affine system in the form of
(1) |
where and denote the state and the control input of the system, respectively, and is a safe set that is defined later. It is assumed that is bounded, and the functions and are Lipschitz.
II-C Control Lyapunov Function
Definition II.1 (Control Lyapunov Function)
A positive definite function is called a Control Lyapunov Function (CLF) if it satisfies
(2) |
where is a class function.
II-D Control Barrier Function
Let define the safe set as the superlevel set of a continuously differentiable function
(3) |
Definition II.2 (Control Barrier Function)
A function is called a Control Barrier Function (CBF) if it satisfies
(4) |
for all , where is a class function.
The existence of a CLF guarantees that the control system is safe [15].
II-E CLF-CBF-Based QP
Motivated by the results on CLF and CBF, it is of interest to obtain a controller that satisfies
(5) | |||
(6) |
so that it is a safe stabilizing controller.
To design such a controller, a CLF-CBF QP was constructed in [26, 15]:
(7) |
where
(8) |
a positive definite matrix and are weights and is a relaxation variable that ensures the solvability of the QP. If is forced to be nonpositive, then the existence of a feasible controller will guarantee the monotonic decrease of the Lyapunov function.
III EVENT-TRIGGERED CONTROL
This section proposes a greedy event-triggered control with the control Lyapunov-barrier function for the system (1).
III-A Event-triggered controller structure
The primary idea behind event-triggered control is to update the control input only when necessary to achieve a specified performance condition, thereby reducing the frequency of updates. In line with the standard structure of an event-triggered controller, we consider the control inputs that are maintained constant between successive event times, i.e.,
(9) |
where is the control input computed at time , which is the time instance when the control input is re-computed and the actuator signals are updated. The time instance is determined by
(10) |
III-B Greedy control update
Here, we introduce a greedy approach for computing the control input at trigger time . To implement it into an event-triggered control, we are interested in a control law that maximizes the inter-execution time. For this purpose, we seek the control input that brings the state away from the boundaries of the constraints (5), (6). This is achieved by maximizing the slack variables and in the new constraints:
(11) |
where and are defined in (8).
Based on the constraints (11), we propose to modify the CLF-CBF QP in (7) as follows:
(12) |
where a positive semidefinite matrix and are weights, and are slack variables, and is a constant (design parameter) that forces the states to be away from the boundary. This is still QP and the solvability of the QP is still ensured as long as is not constrained. Let .
Typically, a small norm control input is desired to minimize the control effort while large and are desired to maximize the inter-execution time. Hence, a possible choice for and is
(13) |
where is positive definite, and .
III-C Trigger conditions
For the states to remain in the safe region, the safety constraint (6) should be always satisfied. However, the satisfaction of the stability constraint (5) cannot be guaranteed together with the satisfaction of (6) in general. This is the same for the proposed controller. Yet, we do our best to minimize the time in which (5) is violated.
Define
(15) | ||||
(16) |
where
(17) | ||||
(18) |
Note that the time derivative of the Lyapunov function is , thus is desired for the stability, while is desired for the safety.
The first case is that, if the time-derivative of the Lyapunov function is sufficiently negative at the time of update , then the next update time is when either the safety constraint (5) is satisfied with equality or the time-derivative of Lyapunov function becomes zero. This guarantees the satisfaction of both safety and stability between and .
The second case is that, if the time-derivative of the Lyapunov function is close to zero or positive at the time of update , then we compromise the controller design only focusing on the safety constraint. The next update time is when the safety constraint (5) is satisfied with equality or small time passes, whichever occurs first. This limits the duration of time during which the stability constraint is violated to with the same control input.
III-D Lower bound on minimum inter-execution time
This subsection shows that the events cannot be triggered an infinite number of times in any finite time period with the proposed controller, i.e., the proposed controller is Zeno-free under mild conditions.
Define the inter-execution time
(21) |
It is of interest to show the existence of a lower bound such that for all .
Assumption III.1
We assume the followings hold on :
-
•
is bounded above, and
-
•
There exists a Lipschitz constant for
-
•
There exists a Lipschitz constant for
If the problem is considered in a finite time horizon, the first assumption is sufficient.
Theorem III.2
Proof:
First, we consider if , then how long it takes to achieve
(22) |
for the first time after . Let this time instance be and the corresponding state be .
For this, we first show that
(23) |
Clearly,
(24) |
and
(25) |
Together, it follows that
(26) |
Next, we show that the time difference is lower bound away from zero. By the fundamental theorem of calculus, we have
(27) |
Because is bounded above, there exists such that , then it follows that
(28) |
Thus, at least the time interval of takes to achieve (22).
Similarly, we consider how long it takes to achieve
(29) |
for the first time after . Let this time instance and the corresponding state .
Using the fact that , we can show that
(30) |
and then
(31) |
In summary, the inter-execution time is lower bounded by , which is strictly positive. This completes the proof. ∎
Here, we see the parameter in (12) can be used as a parameter to tune the inter-execution time.
III-E Special cases
III-E1 Feasibility is guaranteed
Suppose that the feasibility of the constraints (5) and (6) is guaranteed for all with some margins, i.e., there exist such that for all , there exists an control input that depends on that satisfies
(32) |
Then, we may consider not only forcing the relaxation variable to be 0 in (7), but securing certain distances from the boundaries of the constraints. This allows us to add a constraint in (12) and the resulting QP is:
(33) |
where are constants, a positive semidefinite matrix , and are the weights. In this case, the trigger condition (19)-(20) can be combined and modified as:
(34) |
to guarantee both stability and safety.
III-E2 Control input is not penalized
In addition that the feasibility is guaranteed, if the control input is not penalized as in other event-triggered controls, then, the problem simplifies to solving a linear program:
(35) |
where, again, are constants, using some weights .
IV Self-triggered control
This section develops a greedy self-triggered control based on the results in Section III.
IV-A Self-triggered controller structure
As in Section III, let be the triggering time instance. Self-triggered control computes the control input as well as the next time instance at execution time . Similar to the event-triggered control (9), the control input remains constant in between and . Unlike the event-triggered condition, however, no sampling or computation is required between and .
As for the event-triggered control, the controller implements the control input in (14) by solving (12).
The next execution time is computed based on the measured state at :
(36) |
where the map determines the triggering time as a function of the state at the time . Thus, the inter-execution time is given by , i.e., .
In the following, we present approaches to how to design the map .
IV-B Computing the next execution time instance
In Section III, the trigger condition (19)-(20) is designed to satisfy the safety constraint (6) and minimize the violation of the stability constraint (5). Here, again, we design the map that satisfies the safety constraint (6) all the time, while allowing the violation of the stability constraint:
(37) |
Ideally, we would like to find that achieves an equality in (37). However, it is difficult in general for nonlinear systems, thus, we aim at finding a lower bound by revising the approach in Section III-D.
Again, we assume that Assumption III.1 is satisfied. Then, we may use the following map:
Proof:
Here, again note that after solving (12), it is guaranteed that
(40) |
For the first case of , we show
(41) |
satisfies (37). By the fundamental theorem of calculus, the equation (41) implies that for ,
(42) |
On the other hand,
(43) |
Hence, it follows that
(44) |
The second case is clear from the above discussions. Together, it completes the proof. ∎
The difference between this map and the lower bound in the event-triggered control is only the upper bound on the norm of . Although a uniform may be used to design a constant , such a law will shorten the inter-execution time because is likely to be much larger than . However, one difficulty of implementing this approach is actually in the computation of in (47) where appears in both sides of the equation. To compute exact , it is required to compute the evolution of (1) starting at by gradually increasing the time duration. In the actual implementation, this might not be a big problem because implementation is done digitally, which we discuss next.
IV-C Digital implementation
Similarly to [20], we now consider the following discrete-time versions of and based on a sampling time , which are defined by
(45) |
Let and be design parameters and let , .
Then, by choosing , the map can be simplified as
(46) |
where
(47) |
This satisfies
(48) |
and .
With a smaller choice of , the stability constraint is more strictly forced, i.e., while the stability constraint is violated, the control input is updated every sampling time. Such a choice of may result in an increase in the number of execution. Of course, it is possible to use different values for and with a slight modification.
We may simply choose and a sufficiently large . However, the value of enforces the robustness of the implementation and limits the computational complexity [20].
V NUMERICAL EXAMPLE
This section demonstrates the effectiveness of the proposed approach using an example of a double integrator.
Let , where is the position and is the velocity. The dynamics of a double integrator is given as follows:
(49) |
The control Lyapunov and control barrier functions are selected as
(50) |
Moreover, the an functions are chosen to be identity maps and the parameters , , , and are selected. The weights for QP in (12) are selected as
(51) |
Here, the performances of the following five controllers are compared for the duration of time 15, starting at .
- •
- •
- •
-
•
CLF-CBF QP: CLF-CBF QP controller in [16] with ,
-
•
SF: a standard state-feedback controller with the controller gain , which corresponds to the case of weight for the states is and weight for the control input is , thus in the algebraic Riccati equation. No constraints are considered.





Figure 1 shows the phase portraits for the five controllers. It is observed that the trajectory with SF goes into the unsafe region, which motivates us to use the barrier function to remain in the safe region. Also, the trajectories of Greedy and CLF-CBF-QP are close to each other, but the state of CLF-CBF-QP is further from the origin at the end of the simulation compared with the other four methods. Moreover, both trajectories of Greedy ET and Greedy SF take longer paths compared with other methods.
Figure 2 shows the control input trajectories. It can be seen that Greedy ET and Greedy ST do not require frequent control updates. In fact, the numbers of control updates for Greedy ET and Greedy ST were 24 and 26, respectively. With Greedy ST, a smaller sampling time forces the derivative of the Lyapunov function to be negative more strictly thus tends to increase the update frequency.
Figure 3 shows the Lyapunov function values. Both Greedy ET and Greedy ST admit increases of the Lyapunov function values for certain periods. However, those trajectories approach zero quickly, while CLF-CBF-QP is still away from zero at the end of the simulation. Note that the original CLF-CBF-QP controller also allows increases of the Lyapunov function values to guarantee the feasibility of the optimization problem [16].
Figure 4 shows the trajectories of values used for triggers. Because Greedy ET and Greedy ST compromised the stability constraints for the sake of reducing the update frequencies, Figure 4 indicates the values of go above zero sometimes. On the other hand, the safety constraints are always satisfied by all the controllers except for the SF that ignored the existence of unsafe region Figure 4. In Figure 4, we also observe that the trajectory of CLF-CBF-QP stays near zero around time 2. Thus, we cannot implement an event-triggered strategy with CLF-CBF-QP because the trigger condition is violated or close to violate already at the time of the update.
VI CONCLUSIONS
In this paper, we have presented a set of greedy approaches for synthesizing event-triggered and self-triggered controls with the control Lyapunov-Barrier function. Our proposed approach computes each control input to maximize the distance from the safety boundary, which is a departure from existing approaches to the control Lyapunov-Barrier function. By doing so, our approach ensures a positive lower bound on the minimum inter-execution time, while also maintaining the safety of the control system and reducing the frequency of control input updates and/or samplings. This is particularly beneficial in the context of networked control systems, where safety is of paramount concern. The effectiveness of our proposed approach has been illustrated through a numerical example, which highlights its potential for real-world implementation.
References
- [1] P. Wieland and F. Allgöwer, “Constructive safety using control barrier functions,” IFAC Proceedings Volumes, vol. 40, no. 12, pp. 462–467, 2007.
- [2] A. Agrawal and K. Sreenath, “Discrete control barrier functions for safety-critical control of discrete systems with application to bipedal robot navigation,” Robotics: Science and Systems, 2017.
- [3] A. D. Ames, J. W. Grizzle, and P. Tabuada, “Control barrier function based quadratic programs with application to adaptive cruise control,” in Proc. of IEEE Conference on Decision and Control, 2014, pp. 6271–6278.
- [4] L. Lindemann and D. V. Dimarogonas, “Control barrier functions for signal temporal logic tasks,” IEEE Control Systems Letters, vol. 3, no. 1, pp. 96–101, 2019.
- [5] J. Zeng, B. Zhang, and K. Sreenath, “Safety-critical model predictive control with discrete-time control barrier function,” in Proc. of American Control Conference, 2021, pp. 3882–3889.
- [6] A. Singletary, M. Ahmadi, and A. D. Ames, “Safe control for nonlinear systems with stochastic uncertainty via risk control barrier functions,” IEEE Control Systems Letters, vol. 7, pp. 349–354, 2023.
- [7] P. Khargonekar and M. Rotea, “Stabilization of uncertain systems with norm bounded uncertainty using control lyapunov functions,” in Proc. of IEEE Conference on Decision and Control, 1988, pp. 503–507.
- [8] H. K. Khalil, Nonlinear systems. Upper Saddle River, NJ”: Prentice-Hall, 2002.
- [9] M. Krstić and P. V. Kokotović, “Control lyapunov functions for adaptive nonlinear stabilization,” Systems & Control Letters, vol. 26, no. 1, pp. 17–23, 1995.
- [10] R. Freeman and J. Primbs, “Control lyapunov functions: new ideas from an old source,” in Proc. of IEEE Conference on Decision and Control, vol. 4, 1996, pp. 3926–3931.
- [11] J. A. Primbs, V. Nevistić, and J. C. Doyle, “Nonlinear optimal control: A control lyapunov function and receding horizon perspective,” Asian Journal of Control, vol. 1, no. 1, pp. 14–24, 1999.
- [12] P. Ogren, M. Egerstedt, and X. Hu, “A control lyapunov function approach to multi-agent coordination,” in Proc. of IEEE Conference on Decision and Control, vol. 2, 2001, pp. 1150–1155 vol.2.
- [13] M. Z. Romdlony and B. Jayawardhana, “Uniting control lyapunov and control barrier functions,” in Proc. of IEEE Conference on Decision and Control, 2014, pp. 2293–2298.
- [14] ——, “Stabilization with guaranteed safety using control lyapunov–barrier function,” Automatica, vol. 66, pp. 39–47, 2016.
- [15] A. D. Ames, X. Xu, J. W. Grizzle, and P. Tabuada, “Control barrier function based quadratic programs for safety critical systems,” IEEE Transactions on Automatic Control, vol. 62, no. 8, pp. 3861–3876, 2017.
- [16] A. D. Ames, S. Coogan, M. Egerstedt, G. Notomista, K. Sreenath, and P. Tabuada, “Control barrier functions: Theory and applications,” in Proc. of European Control Conference, 2019, pp. 3420–3431.
- [17] E. A. Basso, E. H. Thyri, K. Y. Pettersen, M. Breivik, and R. Skjetne, “Safety-critical control of autonomous surface vehicles in the presence of ocean currents,” in Proc. of IEEE Conference on Control Technology and Applications, 2020, pp. 396–403.
- [18] P. Mestres and J. Cortés, “Optimization-based safe stabilizing feedback with guaranteed region of attraction,” IEEE Control Systems Letters, vol. 7, pp. 367–372, 2023.
- [19] R. Postoyan, P. Tabuada, D. Nešić, and A. Anta, “Event-triggered and self-triggered stabilization of distributed networked control systems,” in Proc. of IEEE Conference on Decision and Control and European Control Conference, 2011, pp. 2565–2570.
- [20] W. Heemels, K. Johansson, and P. Tabuada, “An introduction to event-triggered and self-triggered control,” in Proc. of IEEE Conference on Decision and Control, 2012, pp. 3270–3285.
- [21] M. Mazo and P. Tabuada, “On event-triggered and self-triggered control over sensor/actuator networks,” in Proc. of IEEE Conference on Decision and Control, 2008, pp. 435–440.
- [22] A. J. Taylor, P. Ong, J. Cortés, and A. D. Ames, “Safety-critical event triggered control via input-to-state safe barrier functions,” IEEE Control Systems Letters, vol. 5, no. 3, pp. 749–754, 2021.
- [23] W. Xiao, C. Belta, and C. G. Cassandras, “Event-triggered control for safety-critical systems with unknown dynamics,” IEEE Transactions on Automatic Control, pp. 1–16, 2022.
- [24] G. Yang, C. Belta, and R. Tron, “Self-triggered control for safety critical systems using control barrier functions,” in Proc. of American Control Conference, 2019, pp. 4454–4459.
- [25] A. D. Ames, K. Galloway, K. Sreenath, and J. W. Grizzle, “Rapidly exponentially stabilizing control lyapunov functions and hybrid zero dynamics,” IEEE Transactions on Automatic Control, vol. 59, no. 4, pp. 876–891, 2014.
- [26] A. D. Ames and M. Powell, Towards the Unification of Locomotion and Manipulation through Control Lyapunov Functions and Quadratic Programs. Heidelberg: Springer International Publishing, 2013, pp. 219–240.