and State Key Laboratory of Computer Science, Institute
of Software, Chinese Academy of Sciences, Beijing, China
11email: {rendj, wucy, wutr, xuebai}@ios.ac.cn 22institutetext: University of Chinese Academy of Sciences, Beijing, China 33institutetext: College of Computer Science and Technology, National
University of Defense Technology, Changsha, China
33email: liangzhen@nudt.edu.cn 44institutetext: Department of Electrical Engineering and Automation,
Aalto University, Espoo, Finland
44email: jianqiang.ding@aalto.fi
Inner-approximate Reachability Computation via Zonotopic Boundary Analysis
Abstract
Inner-approximate reachability analysis involves calculating subsets of reachable sets, known as inner-approximations. This analysis is crucial in the fields of dynamic systems analysis and control theory as it provides a reliable estimation of the set of states that a system can reach from given initial states at a specific time instant. In this paper, we study the inner-approximate reachability analysis problem based on the set-boundary reachability method for systems modelled by ordinary differential equations, in which the computed inner-approximations are represented with zonotopes. The set-boundary reachability method computes an inner-approximation by excluding states reached from the initial set’s boundary. The effectiveness of this method is highly dependent on the efficient extraction of the exact boundary of the initial set. To address this, we propose methods leveraging boundary and tiling matrices that can efficiently extract and refine the exact boundary of the initial set represented by zonotopes. Additionally, we enhance the exclusion strategy by contracting the outer-approximations in a flexible way, which allows for the computation of less conservative inner-approximations. To evaluate the proposed method, we compare it with state-of-the-art methods against a series of benchmarks. The numerical results demonstrate that our method is not only efficient but also accurate in computing inner-approximations.
Keywords:
Inner-approximations Reachability Analysis Set-boundary analysis Zonotopal tiling Nonlinear systems.1 Introduction
Reachability analysis involves the computation of reachable sets, which are sets of states achieved either through trajectories originating in a given initial set (i.e., forward reachable sets) or through the identification of initial states from which a system can reach a specified target set (i.e., backward reachable sets) [25]. This problem is fundamental and finds motivation in various applications such as formal verification, controller synthesis, and estimation of regions of attraction. As a result, it has garnered increasing attention from both industrial and academic communities, leading to the development of numerous theoretical results and computational approaches [2]. For many systems, exact reachability analysis is shown to be undecidable [15], particularly in the case of nonlinear systems. Hence, approximation methods are often employed. However, in order to use these approximations as a basis for formal reasoning about the system, it is crucial that they possess certain guarantees. Specifically, it is desirable for the computed approximation to either contain or be contained by the true reachable set, resulting in what are known as outer-approximations and inner-approximations.
This paper focuses on inner-approximate reachability analysis, which calculates an inner-approximation of the reachable set for systems described by ordinary differential equations (ODEs). The inner-approximate reachability analysis has various applications. For instance, it can be used to falsify a safety property by performing forward inner-approximate reachability analysis, which computes an inner-approximation of the forward reachable set [22]. If the computed inner-approximation includes states that violate the safety property, then the safety property is not satisfied. On the other hand, it can be used to find a set of initial states that satisfy a desired property by performing backward inner-approximate reachability analysis [21]. Recently, it has been applied to path-planning problems with collision avoidance [31]. Several methods have been proposed for the inner-approximate reachability analysis, such as Taylor models [8], intervals [13], and polynomial zonotopes [19].
In the computation of inner-approximations, the accumulation of computational errors, known as the wrapping effect [27], becomes pronounced with the propagation of the initial set. To overcome this, a common approach is to partition the initial set into smaller subsets, enabling independent computations on each subset. However, this widely used method often results in an excessively large number of subsets, causing burdensome computation. Consequently, in [35, 19], set-boundary reachability methods were developed based on a meticulous examination of the topological structure. These methods contract a pre-computed outer-approximation by excluding the reachable set from the boundary of the initial set, resulting in an inner-approximation. Compared to the partition of the entire initial set, set-boundary methods alleviate the computational burden and enhance the tightness of results by focusing on splitting only the boundary of the initial set. Hence, the precision of extracting and refining 111If and are partitions (or covers) of a set , then refines if for every , there is such that . the boundary of initial set significantly influences the non-conservativeness of inner-approximation aimed to compute. However, existing boundary operations have limitations that impact the precision and application of set-boundary reachability methods, either restricting the initial sets to be interval-formed [19] or utilizing interval sets to outer-approximate the set boundary [35], which leads to an overly conservative inner-approximation and hinders the application of set-boundary reachability methods.
On this concern, this paper proposes a novel set-boundary reachability method focusing on efficient extraction and refinement of the initial set’s boundary, along with flexible inner-approximation generations. We adopt zonotopes as the abstract representation of states due to their remarkable advantages: the facets of a zonotope remain zonotopes and can be split into non-overlapping subsets while preserving their zonotopic nature. Based on the symmetric property of zonotope’s boundary, we propose an algorithm which can efficiently extract all facets of zonotopes. To further refine the extracted boundary, a fundamental algorithm is developed to partition a zonotope into smaller, non-overlapping zonotopes, termed tiling algorithm. This algorithm leverages two innovative data structures, named as boundary and tiling matrices, providing a clear and efficient implementation of the partition procedure. Complexity analysis demonstrates the superior advantages of the tiling algorithm in computational complexity compared to the existing method [18]. Finally, we contract a pre-computed outer-approximation of reachable set to obtain an inner-approximation, which is achieved by excluding the outer-approximation of the reachable set from the refined boundary of the initial set. In contrast to proportionally shrinking the shape of computed outer-approximation utilized in existing method [35], we provide a more flexible strategy that allows an adaptive modification on the configuration of zonotopic outer-approximations, leading to more non-conservative inner-approximations.
The main contributions of this paper are as follows:
-
•
A Non-overlapping Zonotope Splitting Algorithm. We present a novel algorithm that efficiently splits a zonotope into non-overlapping subsets, while preserving their zonotopic properties. By utilizing boundary and tiling matrices, our algorithm offers a more straightforward implementation with improved computational complexity compared to existing methods.
-
•
An Adaptive Contraction Strategy. We put forward an adaptive contraction strategy for computing a zonotopic inner-approximation of the reachable set. This strategy, compared to existing methods, provides a more flexible approach for the contraction of the pre-computed outer-approximations, generating less conservative inner-approximations.
-
•
A Prototype Tool - BdryReach. We have developed a prototype tool named BdryReach to implement our proposed approach, which is available from https://github.com/ASAG-ISCAS/BdryReach. Numerous evaluations on various benchmarks demonstrate that BdryReach outperforms state-of-the-art tools in terms of efficiency and accuracy.
Related Work
1.0.1 Inner-approximation analysis
The methods for inner-approximation computation are generally categorized into two main groups: constraint solving methods and set-propagation methods. Constraint solving methods avoid the explicit computation of reachable sets, but have to address a set of quantified constraints, which are generally constructed via Lyapunov functions [7], occupation measures [20] and equations relaxation [34, 36]. However, solving these quantified constraints is usually computationally intensive (except the case of polynomial constraints for which there exists advanced tools such as semi-definite programming).
The set propagation method is an extension of traditional numerical methods for solving ODEs using set arithmetic rather than point arithmetic. While this method is simple and interesting, a major challenge is the propagation and accumulation of approximation errors over time. To ease this issue efficiently, various methods employing different representations have been developed. [29] presented a Taylor model backward flowpipe method that computes inner-approximations by representing them as the intersection of polynomial inequalities. However, this approach relied on a computationally expensive interval constraint propagation technique to ensure the validity of the representation. In [13], an approach is proposed to compute interval inner-approximations of the projection of the reachable set onto the coordinate axes for autonomous nonlinear systems. This method is later extended to systems with uncertain inputs in [14]. However, they cannot compute an inner-approximation of the entire reachable set, as studied in the present work. [35] proposed a set-boundary reachability method which propagates the initial set’s boundary to compute an polytopic inner-approximation of the reachable set. However, it used computationally expensive interval constraint satisfaction techniques to compute a set of intervals which outer-approximates the initial set’s boundary. Recently, inspired by the computational procedure in [35], [19] introduced a promising method based on polynomial zonotopes to compute inner-approximations of reachable sets for systems with an initial set in interval form. The method presented in this work is also inspired by the in [35]. However, we propose efficient and accurate algorithms for extracting and refining the boundary of the initial set represented by zonotopes and an adaptive strategy for contracting outer-approximations, facilitating the computation of non-conservative inner-approximations.
1.0.2 Splitting and tiling of zonotopes
To mitigate wrapping effect [27] and enhance computed results, it is a common way to split a zonotope into smaller zonotopes during computation. Despite zonotopes being special convex polytopes with centrally symmetric faces in all dimensions [38], traditional polytope splitting methods such as [5, 16] cannot be directly applied. The results obtained through these approaches are polytopes, not necessarily zonotopes. In the works [3, 33], they split a zonotope by bisecting it along one of its generators. However, the sub-zonotopes split by this way often have overlap parts, resulting in loss of precision and heavy computation burden. Hence, there is a pressing need for methods that split a zonotope into non-overlapping sub-zonotopes. The problem of zonotopal tiling, i.e., paving a zonotope by tiles (sub-zonotopes) without gaps and overlaps, is an important topic in combinatorics and topology [6, 38]. In the realm of zonotopal tiling, Bohne-Dress theorem [28] plays a crucial role by proving that a tiling of a zonotope can be uniquely represented by a collection of sign vectors or oriented matroid. Inspired by this theorem, [18] developed a tiling method by enumerating the vertices of the tiles as sign vectors of the so-called hyperplane arrangement [24] corresponding to a zonotope. However, in this paper we provide a novel and more accessible method for constructing a zonotopal tiling, which has better computational complexity.
2 Preliminaries
2.1 Notation
The notations and operations concerning space, vectors, matrices, and sets utilized in this paper are presented in Table 1, where the symbols and descriptions for operations on vectors, matrices, and sets are mainly illustrated with specific examples of a vector , a matrix , and a set .
Symbol | Description | Symbol | Description |
---|---|---|---|
-dimensional real space | space of real matrices | ||
non-negative integers in | inner product of and | ||
vectors, boldface lowercase | matrices, boldface uppercase | ||
vectors with all zero entries | vectors with all one entries | ||
-th row vector of | -th column vector of | ||
-th entry of | -th entry in -th row of | ||
number of rows of | number of columns of | ||
last row of | last column of | ||
delete -th row of | delete -th column of | ||
add to last row of | add to last column of | ||
rank of | norm of | ||
interior of set | boundary of set | ||
cardinality of set |
2.2 Problem Statement
This paper considers nonlinear systems which are modelled by ordinary differential equations of the following form:
(1) |
where and is a locally Lipschitz continuous function. Thus, given an initial state , there exists an unique solution to system (1), where is the maximal time interval on which is defined.
Given a set of initial states, the reachable set is defined as follows:
Definition 1 (Reachable Set)
Given system (1) and an initial set , the reachable set at time is
The exact reachable set is usually impossible to be computed, especially for nonlinear systems. Outer-approximations and inner-approximations are often computed for formal reasoning on the system.
Definition 2
Given an initial set and a time instant , an outer-approximation of the reachable set is a superset of the set , i.e.,
an inner-approximation of the reachable set is a subset of the set , i.e.,
In this paper, we focus on the computation of an inner-approximation represented by zonotopes. Zonotope is a special class of convex polytopes with the centrally symmetric nature. It can be viewed as a Minkowski sum of a finite set of line segments, known as G-representation, which is defined as the following.
Definition 3 (Zonotope)
A zonotope with generators is a set
denoted by , where is referred as center and as generators of zonotope. is called generator matrix.
For a zonotope in space , it is called -dimensional if . A -dimensional zonotope can be reduced into space without altering its shape. Furthermore, the facets of a -dimensional () zonotope are -dimensional zonotopes. If an -dimensional zonotope has independent generators, then it’s called parallelotope. Additionally, If there is a zonotope such that , is called a sub-zonotope of .
3 Methodology
In this section we introduce our set-boundary reachability method to compute inner-approximations of reachable sets. Firstly, the framework of our method is presented in Subsection 3.1. Then, we introduce the algorithm of extracting the exact boundary of a zonotope in Subsection 3.2, the tiling algorithm for boundary refinement in Subsection 3.3 and the strategy for computing an inner-approximation via contracting an outer-approximation in Subsection 3.4.
3.1 Inner-approximation Computation Framework
The framework of computing inner-approximations in this paper follows the one proposed in [35], but with minor modifications.
Given system (1) with an initial set , represented by a zonotope, and a time duration , where is the time step and is a non-negative integer, we compute a zonotopic inner-approximation of the reachable set for . The inner-approximation is computed based on ( with the following procedures:
-
1.
extract and refine the boundary of ;
-
2.
compute a zonotopic outer-approximation of reachable set , and an outer-approximation of reachable set . These outer-approximations can be computed using existing zonotope-based approaches such as [3].
-
3.
contract to obtain a zonotopic inner-approximation candidate by excluding the set , i.e., let .
-
4.
compute an outer-approximation of the reachable set of the time-inverted system with the single initial state , where is the center of the zonotope . If the computed outer-approximation is included in the set , then is an inner-approximation of the reachable set .

The overall computational workflow is visualized in Fig. 1. There are three computational procedures that affect the efficacy (i.e., accuracy and efficiency) of inner-approximation computation in the aforementioned framework: the extraction and refinement of the boundary , reachability analysis for computing outer-approximations , and contraction of to obtain an inner-approximation candidate . Since there are well-developed reachability algorithms in existing literature for computing outer-approximations such as [12, 3], we in the following focus on other two computational procedures. For the first one, as the outer-approximation computed would be excluded from , the accuracy of significantly affects the one of . Additionally, the accuracy of strongly correlates with the size of . To improve the accuracy of , two algorithms are proposed: one for extracting and the other for tiling the boundary of a zonotope (i.e., splitting the boundary into sub-zonotopes without overlaps). As for the third one, an adaptive strategy is developed to make the inner-approximation much tighter. This is achieved by contracting in a flexible way, deviating from the proportional reduction of the size of in the existing methods [35].
3.2 Extraction of Zonotopes’ Boundaries
In this subsection we introduce the algorithm for extracting the exact boundary of a zonotope. The concept of cross product of a matrix provided by [26] will be utilized herein, which is formulated below.
Definition 4 (Cross Product)
Given a matrix in which the column vectors are linearly independent. The cross product of is a vector of the following form:
where is the determinant of a matrix.
The cross product of can be viewed as the normal vector of the hyperplane spanned by linearly independent column vectors in .

The boundary extraction algorithm is established on the fact that a zonotope is centrally symmetric and each facet, which is a zonotope, has an congruent facet on the opposite side of the center (e.g., two dark blue facets in Fig. 2).
Given an -dimensional zonotope , where and , for each two symmetric facets, they lie in parallel hyperplanes and share the same generators. The two parallel hyperplanes are spanned by a part of generators of , which can form a submatrix of with rank . In boundary extraction algorithm, i.e., Alg. 1, we firstly enumerate all potential submatrices of which are able to span a hyperplane. For a certain hyperplane spanned by a submatrix , to confirm the center and generators of its corresponding facets, we compute its normal vector by the cross product operator , then the center of the two symmetric facets can be respectively determined by moving the center along the positive and negative directions of generators which are not perpendicular to , and the generator matrix of these corresponding facets can be represented by appending generators parallel to the hyperplane. The visible operations stated above are shown in Fig. 2.
Input: An -dimensional zonotope .
Output: The boundary of the zonotope , i.e., .
The computation of a zonotope’s boundary is summarized in Alg. 1. Its soundness, i.e., the set computed by Alg. 1 is equal to the boundary of the zonotope , is justified in Theorem 3.1, whose proof is available in Appendix A. In order to enhance the understanding of Alg. 1, we provide a simple example, Example 1 in Appendix B, to illustrate the computational process of Alg. 1.
Remark 1
In space , if a zonotope isn’t -dimensional, i.e., , then the boundary of this zonotope is itself.
Theorem 3.1 (Soundness of boundary extraction algorithm)
Given an -dimensional zonotope with generators, the set computed by Alg. 1 is equal to its boundary .
3.2.1 The complexity of boundary extraction algorithm
For an -dimensional zonotope , it has facets, where . The number of submatrices of is , and the computation of the rank of an matrix has the complexity (using QR decomposition), then the computation in Line 2 has the complexity . In “while” Loop (Line 3-22), it has iterations. For the operation on an matrix, its complexity is , where denote the complexity of computing a determinant of an square matrix. By LU-decomposition, is , however by Coppersmith–Winograd algorithm [11], it can reach . For each , checking the inner product between and remaining generators has loops, and the inner product has complexity . Thus, the complexity of Alg. 1 is .
3.3 Zonotopal Tiling and Boundary Refinement
This subsection introduces our tiling algorithm which can split a zonotope into sub-zonotopes without overlaps and then elaborates how this tiling algorithm is employed to refine the boundaries of zonotopes.
The boundary matrix, which is constructed according to Alg. 1, plays an important role in our tiling algorithm. Its entries are able to characterize the centers and generators for all facets of a zonotope.
Definition 5 (Boundary Matrix)
Given an -dimensional zonotope with facets, where and , its boundary matrix is a matrix whose each entry is 0,1,or -1, where
-
1.
implies that the -th generator is a generator of the -th facet (corresponding to Line 8 in Alg. 1);
-
2.
implies that in order to obtain the center of the -th facet, the MINUS operator is applied to the -th generator (corresponding to Line 10 and 12 in Alg. 1);
-
3.
implies that in order to obtain the center of the -th facet, the PLUS operator is applied to the -th generator (corresponding to Line 10 and 12 in Alg. 1).
From the boundary matrix of a zonotope, one can obtain all its facets. Appendix B provides an example (Example 2) to illustrate this claim.
Another matrix, tiling matrix, is constructed to store the outcomes of the tiling algorithm, i.e., all the non-overlapping sub-zonotopes whose union covers the original zonotope. Similar to the boundary matrix, a row of tiling matrix represents a sub-zonotope.
Definition 6 (Tiling Matrix)
Given an -dimensional zonotope , where and , its tiling matrix is a matrix satisfying the following conditions:
-
1.
its each entry is 0,1 or -1, which has the same meaning with the one in the boundary matrix;
-
2.
each row defines a sub-zonotope such that and for .
Our tiling algorithm is based an intuitive observation: for a zonotope, moving its one-sided facets towards to the opposite side along the direction of a generator results in a new zonotope with this generator removed, simultaneously, several sub-zonotopes are generated by adding this generator to all these facets. This process, which is visualized in Fig. 3, can be iteratively conducted, until a parallelotope remains. At this point, the tiling algorithm terminates, yielding a collection of tiles denoted as zonotopes that tile the original zonotope.

The tiling algorithm leverages operations on boundary matrix to implement the facets’ movement and sub-zonotopes generation aforementioned. The results of each step, namely the sub-zonotopes after one-step tiling, are recorded in the tiling matrix .
Given an -dimensional zonotope where , we require that the right-most submatrix of is full rank to ensure that the sub-zonotopes with one generator removed after one-step tiling remain -dimensional. For the specific -th column of boundary matrix , where , we process the following operations to its entries:
-
1.
if there exist ’s such that , we add these rows in the boundary matrix into the tiling matrix as new rows, but change their -th entry to in the tiling matrix . Meanwhile, the -th entries of these rows in the boundary matrix are modified into , i.e., ;
-
2.
if there exist ’s such that , we delete these rows from the boundary matrix .
After the -th iteration, the updated boundary matrix characterizes the boundary of a new zonotope. This new zonotope is derived by removing the first through the -th generators from the original zonotope . Simultaneously, the sub-zonotopes generated by adding the generator to the facets are incorporated into the tiling matrix . Finally, after iterations, there remains one parallelotope, whose generator matrix is the right-most submatrix of , we put this parallelotope into the tiling matrix and then output the result.
The above computational procedures are summarized in Alg. 2. Its soundness is justified by Theorem 3.2, whose proof is available in Appendix A. Moreover, Appendix B supplements an example (Example 3) to illustrate the main steps tiling a zonotope using Alg. 2.
Remark 2
For an -dimensional parallelotope, Alg. 2 only return itself since there is no generator to remove while keeping it -dimensional. However, one can use some simple methods to tile it such as parallelepiped grid.
Input: An -dimensional zonotope , the right-most submatrix of is full rank, i.e., .
Output: Tiling matrix .
Remark 3
The sub-zonotopes obtained by Alg. 2 aren’t necessarily parallelotopes. To make the results of tiling are exclusively paralletopes, one can recursive applying Alg. 2 on each sub-zonotope in tiling matrix until each sub-zonotope has generators. Additionally, Alg. 2 allows terminating at any iteration, and the result of each iteration can serve as a tiling of the original zonotope. This flexibility is valuable for controlling the number of partitioned sub-zonotopes. Therefore, our proposed tiling algorithm is particularly well-suited for the inner-approximation computation scenario outlined in this paper, it enables a balance between the computational burden and precision of evaluating by constraining the number of sub-zonotopes in the tiling.
Theorem 3.2 (Soundness of tiling algorithm)
3.3.1 The complexity of tiling algorithm
For an -dimensional zonotope , where , assume has facets. The calling of Alg. 1 is . The size of boundary matrix is , the two-layer “for” Loop (Line 3-15) has iterations less than , thus the calling of Alg. 1 is dominant in the complexity of tiling algorithm. Consequently, the complexity of Alg. 2 is .
3.3.2 Complexity comparison
Here we compare the complexity of tiling algorithm proposed in [18] with ours. For an -dimensional zonotope , assume has facets and vertexes. The main computation procure of algorithm in [18] is computing (a set of sign vectors of cells of the arrangement), which is equivalent to enumerate the sign vectors of all the vertexes of . The computation of , utilizing a reverse search algorithm [10], owns the complexity of (the number of sign vectors in is equal to ), where is the time to solve a linear programming (LP) with inequalities in variables. There are various algorithms for solving LPs including simplex algorithm, interior point method and their variants. The state-of-the-art algorithms for solving LPs take complexity around [9]. As for the complexity of our algorithm, we have clarified that dominant part in complexity is the procure extracting the boundary of a zonotope, which has the complexity . Additionally for zonotope , the number of its vertexes is usually much larger than the one of its facets , particularly in high dimension (for example, a hypercube in has vertexes and facets). According to the analysis above, we can conclude the complexity of our tiling algorithm is better than the one of algorithm () in [18].

3.3.3 Boundary refinement via tiling algorithm
Given an -dimensional zonotope , for one of its facet , we transform it into the space with transformation matrix , where is the submatrix of with rank , then the -dimensional transformed zonotope can be denoted as . Using tiling algorithm, can be split into some smaller sub-zonotopes . For each of -dimensional sub-zonotopes such as , an inverse transformation recovers it to the zonotope in the space , i.e., , where , . The main steps of boundary refinement are visualized in Fig. 4.
3.4 Contracting Computed Outer-approximation
In this subsection we present our contraction method, yielding the inner approximation candidate by contracting . In contrast to the approaches in [35], which contracts by reducing size proportionally, our contraction method offers a more flexible way. Specifically, the length of each generator of can be adjusted and some generators can be removed. The incorporation of this adaptive contraction method enhances the tightness of the computed inner-approximation.
By extracting and refining of boundary of , we get a collection of sub-zonotopes, i.e., , where . Then can be obtained by uniting all the out-approximations , i.e., .
Noticing that the shape of every outer-approximation is usually long and narrow (refer to Fig. 1), we choose the top independent generators by norm (such as Euclidean norm) to span a hyperplane, which can be seen as an -dimensional form approximating . Then we compute the cross product of this hyperplane as its normal vector to represent the attitude of , denoted by (i.e. , where contains top indenpent generators of by norm).
Initially, we set the inner-approximation candidate . Subsequently, we iteratively reduce the length of generators and adjust the position (by changing the center) of until the intersections between and all outer-approximations become empty sets. For each outer-approximation , we begin by shortening the length of generators that are most likely to yield collisions between and , which would prevent the unnecessary contraction of and make the result tighter. Heuristically, the generators with directions closest to , or in other words, those most likely to “perpendicular” to (precisely, perpendicular to hyperplane spanned by column vectors of ) should be given priority considerations. When encountering a generator that dose not need to be shortened, indicating that and have no overlapping parts, we turn to the next outer-approximation . The details of contraction method proposed is summarized below.
-
1.
Initialize inner-approximation candidate .
-
2.
For every boundary outer-approximations , carry out the following processing steps.
-
2a.
Sort the generators of according the angle with from small to large (i.e., from large to small).
- 2b.
-
2c.
If , then delete from generator matrix . Else, update the range of , where the operation means choosing the interval with maximum length and is a user-defined small positive number.
-
2d.
Update and .
-
2a.
Remark 4
The introducing of the user-defined small positive number is to ensure .
Remark 5
In practice, it is a common case that , thus the number of generators of inner-approximation candidate is usually less than ’s, which shows that this contraction method has the advantage for zonotope order reduction [37].
Appendix B provides an example (Example 4) to illustrate the procedure of the contraction method and why is necessary to sort the generators of according to the angle with .
3.4.1 Verification of inner-approximation candidate
According to Theorem 1 and 3 in [19], after obtaining inner-approximation candidate , it’s crucial to check whether the outer-approximation ( is the center of ) of the time-inverted system is within , which confirms the correctness of computed inner-approximation . Since both and are zonotopes, this verification reduces a zonotope containment problem. In our approach, we leverage a sufficient condition outlined in [30], which can be encoded into LP to perform the inclusion verification.
4 Experiments
In this section we demonstrate the performance of our approach on various benchmarks. Our implementation utilizes the floating point linear programming solver GLPK and C++ library Eigen. We adopt the approach outlined in [3] to compute outer-approximations appeared in our method. All experiments herein are run on Ubuntu 20.04.3 LTS in virtual machine with CPU 12th Gen Intel Core i9-12900K × 8 and RAM 15.6 GB.
To evaluate the precision of the computed inner-approximations, we use the minimum width ration similar to [19], which is defined as
(4) | ||||
with | ||||
where and are the inner-approximation and outer-approximation of the reachable set at step respectively. , and is the set consisting of axis-aligned unit-vectors. To ensure a fair comparison, the is chosen to be the interval enclosure of random points at the final time instant simulated via ode45 in MATLAB. Intuitively, the larger this ratio, the better the approximation.
Our approach is systematically compared with the state-of-the-art method presented in [19], which is publicly available in the reachability analysis toolbox CORA [1]. Benchmarks with system’s dimension from to are utilized to show the the comprehensive advantages of our approach. Their configurations including dimensions, initial sets and references are listed in Table 2.
Dim | Benchmark | Initial Set | Reference |
---|---|---|---|
2 | ElectroOsc | Example 3 in [35] | |
3 | Rossler | Example 3.4.3 in [8] | |
4 | Lotka-Volterra | Example 5.2.3 in [8] | |
6 | Tank6 | [3] | |
7 | BiologicalSystemI | Example 5.2.4 in [8] | |
9 | BiologicalSystemII | Example 5.2.4 in [8] | |
12 | Tank12 | [3] |
-
•
Note: for the parameters of Tank6 and Tank12, all are set to , and all are set to , , for Tank6 and for Tank12 ; for the centers of initial sets, , , , , , , .
4.1 Advantage in efficiency and precision
For each benchmark stated in Table 2, we compute the inner-approximations at the time instant using our approach and the one in CORA. Table 3 demonstrates the time cost and for tow methods. The advantages of our approach are evident from low dimensional scenario (-dimensional) to high dimensional scenario (-dimensional), showcasing improved efficiency and precision, particularly in higher dimensions. Taking the benchmark Tank12 as an instance, our approach achieves nearly improvement in precision while requiring only of the time compared to CORA. The visualization of the inner-approximations computed by our approach and CORA is illustrated in Fig. 7 provided in Appendix C, together with the outer-approximations computed by CORA in this figure for sake of convenient comparison.
Dim | Benchmark | T | Our Approach | CORA | ||
time (s) | time (s) | |||||
2 | ElectroOsc | 2.5 | 36.50 | 0.57 | ||
3 | Rossler | 1.5 | 0.76 | 36.63 | ||
4 | Lotka-Volterra | 1 | 335.06 | 0.34 | ||
6 | Tank6 | 80 | 201.05 | 0.63 | ||
7 | BiologicalSystemI | 0.2 | 125.73 | 0.90 | ||
9 | BiologicalSystemII | 0.2 | 188.25 | 0.88 | ||
12 | Tank12 | 60 | 1834.65 | 0.56 |
4.2 Advantage in long time horizons
Further, we extend the time horizon in Table 3 and compare the performance of inner-approximation computation between our approach and CORA. As evidenced by the results in Table 4, our approach demonstrates the reliable capability to compute inner-approximations in relatively longer time horizons compared to CORA. It shows that our approach can consistently compute all inner-approximations while maintaining benign efficiency and precision. In contrast, the approach in CORA fails to compute inner-approximations for all benchmarks. The visualization of the inner-approximations computed by our approach and CORA is illustrated in Fig. 8 provided in Appendix C.
Dim | Benchmark | T | Our Approach | CORA | ||
---|---|---|---|---|---|---|
time (s) | time (s) | |||||
2 | ElectroOsc | 3 | 73.76 | 0.90 | ||
3 | Rossler | 2.5 | 63.42 | 0.60 | ||
4 | Lotka-Volterra | 1.5 | 81.81 | 0.62 | ||
6 | Tank6 | 120 | 129.58 | 0.65 | ||
7 | BiologicalSystemI | 1.3 | 462.87 | 0.41 | ||
9 | BiologicalSystemII | 0.375 | 261.78 | 0.66 | ||
12 | Tank12 | 100 | 377.85 | 0.49 |
-
•
Note: the symbol “” means that in this experimental configuration CORA cannot compute inner-approximations.
4.3 Advantage in big initial sets
We also expand the initial sets as listed in Table 2 to highlight our advantage in computing inner-approximations from larger initial sets. For each benchmark, we set both a short and a long time instant to compute inner-approximations using our approach and CORA. As shown in Table 5, our approach can accomplish all the inner-approximation computations while maintaining high levels of efficiency and precision. In contrast, for the short time instant scenario, the performance of CORA is worse than ours in both computation time and accuracy, and CORA fails to compute inner-approximations at long time instant for all benchmarks. The visualization of the inner-approximations computed by our approach and CORA is illustrated in Fig. 9 and Fig. 10 provided in Appendix C.
Dim | Benchmark | Initial Set | T | Our Approach | CORA | ||
time (s) | time (s) | ||||||
2 | ElectroOsc | 1.5 | 24.32 | 0.43 | |||
2 | 11.29 | 0.84 | |||||
3 | Rossler | 1 | 36.54 | 0.53 | |||
1.5 | 24.01 | 0.58 | |||||
4 | Lotka-Volterra | 0.4 | 153.57 | 0.38 | |||
1 | 64.17 | 0.52 | |||||
6 | Tank6 | 80 | 463.28 | 0.13 | |||
100 | 80.91 | 0.53 | |||||
7 | BiologicalSystemI | 0.5 | 615.89 | 0.38 | |||
0.7 | 281.05 | 0.41 | |||||
9 | BiologicalSystemII | 0.26 | 1494.38 | 0.32 | |||
0.28 | 142.02 | 0.55 | |||||
12 | Tank12 | 40 | 1693.68 | 0.41 | |||
60 | 235.57 | 0.54 |
-
•
Note: the symbol “” means that in this experimental configuration CORA cannot compute inner-approximations. denotes the box .
5 Conclusion
In this paper we propose a novel approach to compute inner-approximations of reachable sets for nonlinear systems based on zonotopic boundary analysis. To enhance the efficiency and precision of the computed inner-approximations, we introduce three innovative and efficient methods, including the algorithm of extracting boundaries of zonotopes, the algorithm of tiling zonotopes for boundary refinement, and contraction strategy for obtaining inner-approximations from pre-computed outer-approximations. In comparison to the state-of-the-art methods for inner-approximation computation, our approach demonstrates superior performance in terms of efficiency and precision, particularly within high dimensional cases. Moreover, our proposed approach exhibits a remarkable capability to compute inner-approximations for scenarios with long time horizons and large initial sets, where the inner-approximations are usually failed to be computed by existing methods.
Acknowledgement
This work is funded by the CAS Pioneer Hundred Talents Program, Basic Research Program of Institute of Software, CAS (Grant No. ISCAS-JCMS-202302) and National Key R&D Program of China (Grant No. 2022YFA1005101).
References
- [1] Althoff, M.: An introduction to cora 2015. In: Proc. of the workshop on applied verification for continuous and hybrid systems. pp. 120–151 (2015)
- [2] Althoff, M., Frehse, G., Girard, A.: Set propagation techniques for reachability analysis. Annual Review of Control, Robotics, and Autonomous Systems 4, 369–395 (2021)
- [3] Althoff, M., Stursberg, O., Buss, M.: Reachability analysis of nonlinear systems with uncertain parameters using conservative linearization. In: 2008 47th IEEE Conference on Decision and Control. pp. 4042–4048. IEEE (2008)
- [4] Althoff, M., Stursberg, O., Buss, M.: Computing reachable sets of hybrid systems using a combination of zonotopes and polytopes. Nonlinear analysis: hybrid systems 4(2), 233–249 (2010)
- [5] Bajaj, C.L., Pascucci, V.: Splitting a complex of convex polytopes in any dimension. In: Proceedings of the twelfth annual symposium on Computational geometry. pp. 88–97 (1996)
- [6] Björner, A.: Oriented matroids. No. 46, Cambridge University Press (1999)
- [7] Branicky, M.S.: Multiple lyapunov functions and other analysis tools for switched and hybrid systems. IEEE Transactions on automatic control 43(4), 475–482 (1998)
- [8] Chen, X.: Reachability analysis of non-linear hybrid systems using taylor models. Ph.D. thesis, Fachgruppe Informatik, RWTH Aachen University (2015)
- [9] Cohen, M.B., Lee, Y.T., Song, Z.: Solving linear programs in the current matrix multiplication time. Journal of the ACM (JACM) 68(1), 1–39 (2021)
- [10] Ferrez, J.A., Fukuda, K., Liebling, T.M.: Solving the fixed rank convex quadratic maximization in binary variables by a parallel zonotope construction algorithm. European Journal of Operational Research 166(1), 35–50 (2005)
- [11] Fisikopoulos, V., Penaranda, L.: Faster geometric algorithms via dynamic determinant computation. Computational Geometry 54, 1–16 (2016)
- [12] Girard, A.: Reachability of uncertain linear systems using zonotopes. In: HSCC. vol. 3414, pp. 291–305. Springer (2005)
- [13] Goubault, E., Putot, S.: Forward inner-approximated reachability of non-linear continuous systems. In: Proceedings of the 20th international conference on hybrid systems: computation and control. pp. 1–10 (2017)
- [14] Goubault, E., Putot, S.: Inner and outer reachability for the verification of control systems. In: Proceedings of the 22nd ACM International Conference on Hybrid Systems: Computation and Control. pp. 11–22 (2019)
- [15] Henzinger, T.A., Kopke, P.W., Puri, A., Varaiya, P.: What’s decidable about hybrid automata? In: Proceedings of the twenty-seventh annual ACM symposium on Theory of computing. pp. 373–382 (1995)
- [16] Herrmann, S., Joswig, M.: Splitting polytopes. arXiv preprint arXiv:0805.0774 (2008)
- [17] Jaulin, L., Kieffer, M., Didrit, O., Walter, E.: Interval analysis. In: Applied interval analysis, pp. 11–43. Springer (2001)
- [18] Kabi, B.: Synthesizing invariants: a constraint programming approach based on zonotopic abstraction. Ph.D. thesis, Institut polytechnique de Paris (2020)
- [19] Kochdumper, N., Althoff, M.: Computing non-convex inner-approximations of reachable sets for nonlinear continuous systems. In: 2020 59th IEEE Conference on Decision and Control (CDC). pp. 2130–2137. IEEE (2020)
- [20] Korda, M., Henrion, D., Jones, C.N.: Inner approximations of the region of attraction for polynomial dynamical systems. IFAC Proceedings Volumes 46(23), 534–539 (2013)
- [21] Lakshmikantham, V., Leela, S., Martynyuk, A.A.: Practical stability of nonlinear systems. World Scientific (1990)
- [22] Li, J., Dureja, R., Pu, G., Rozier, K.Y., Vardi, M.Y.: Simplecar: An efficient bug-finding tool based on approximate reachability. In: Computer Aided Verification: 30th International Conference, CAV 2018, Held as Part of the Federated Logic Conference, FloC 2018, Oxford, UK, July 14-17, 2018, Proceedings, Part II 30. pp. 37–44. Springer (2018)
- [23] Massey, W.S.: A basic course in algebraic topology, vol. 127. Springer (2019)
- [24] McMullen, P.: On zonotopes. Transactions of the American Mathematical Society 159, 91–109 (1971)
- [25] Mitchell, I.M.: Comparing forward and backward reachability as tools for safety analysis. In: Hybrid Systems: Computation and Control: 10th International Workshop, HSCC 2007, Pisa, Italy, April 3-5, 2007. Proceedings 10. pp. 428–443. Springer (2007)
- [26] Mortari, D.: n-dimensional cross product and its application to the matrix eigenanalysis. Journal of Guidance, Control, and Dynamics 20(3), 509–515 (1997)
- [27] Neumaier, A.: The wrapping effect, ellipsoid arithmetic, stability and confidence regions. Springer (1993)
- [28] Richter-Gebert, J., Ziegler, G.M.: Zonotopal tilings and the bohne-dress theorem. Contemporary Mathematics 178, 211–211 (1994)
- [29] Rwth, X.C., Sankaranarayanan, S., Ábrahám, E.: Under-approximate flowpipes for non-linear continuous systems. In: 2014 Formal Methods in Computer-Aided Design (FMCAD). pp. 59–66. IEEE (2014)
- [30] Sadraddini, S., Tedrake, R.: Linear encodings for polytope containment problems. In: 2019 IEEE 58th Conference on Decision and Control (CDC). pp. 4367–4372. IEEE (2019)
- [31] Schoels, T., Palmieri, L., Arras, K.O., Diehl, M.: An nmpc approach using convex inner approximations for online motion planning with guaranteed collision avoidance. In: 2020 IEEE International Conference on Robotics and Automation (ICRA). pp. 3574–3580. IEEE (2020)
- [32] Shephard, G.C.: Combinatorial properties of associated zonotopes. Canadian Journal of Mathematics 26(2), 302–321 (1974)
- [33] Wan, J., Vehi, J., Luo, N.: A numerical approach to design control invariant sets for constrained nonlinear discrete-time systems with guaranteed optimality. Journal of Global Optimization 44, 395–407 (2009)
- [34] Xue, B., Fränzle, M., Zhan, N.: Inner-approximating reachable sets for polynomial systems with time-varying uncertainties. IEEE Transactions on Automatic Control 65(4), 1468–1483 (2019)
- [35] Xue, B., She, Z., Easwaran, A.: Under-approximating backward reachable sets by polytopes. In: International Conference on Computer Aided Verification. pp. 457–476. Springer (2016)
- [36] Xue, B., Zhan, N., Fränzle, M., Wang, J., Liu, W.: Reach-avoid verification based on convex optimization. IEEE Transactions on Automatic Control 69(1), 598–605 (2024)
- [37] Yang, X., Scott, J.K.: A comparison of zonotope order reduction techniques. Automatica 95, 378–384 (2018)
- [38] Ziegler, G.M.: Lectures on polytopes, vol. 152. Springer Science & Business Media (2012)
Appendix
A Proofs of Theorems in the Paper
The proof of Theorem 3.1:
Lemma 1 (Boundary of a parallelotope)
An -dimensional parallelotope has facets which can be characterized by following form,
where .
Proof
An -dimensional parallelotope is actually the codomain of the linear map , where . In fact, is a homeomorphism map for which it is a bijection and both the function and the inverse function are continuous. According Corollary 6.7 in [23], the function maps interior points onto interior points and boundary points onto boundary points. For the domain , it’s easy to obtain its boundary by fixing a certain dimension as or while maintaining other dimensions (e.g., and ). By mapping these facets of domain onto codomain, the boundary of the parallelotope can be expressed as following zonotopes.
where .
At this point, we give a proof of Theorem 3.1.
Proof
Firstly considering an -dimensional parallelotope , where , we add a new generator to its generator matrix, e.g. . This operation would form a new zonotope . For a certain facet of , the addition of may cause two cases (the two cases are also suitable for its symmetric facet ):
Case 1: . This means that adding won’t change the position of , instead, it would change the shape of by replacing generator matrix with .
Case 2: . This means that adding would change the position of and push it away from the center . if , it represents that is on the positive direction oriented by and negative direction otherwise. Taking the situation as an example, if (resp. ) , would translate along with (resp. ) to ensure being a new facet away from the center , the new facet of the new zonotope would be (resp. ).
Viewing zonotope is derived from parallelotope adding a generator , we execute the same progress as case 1 and 2 do (If isn’t full rank, then skip), we loop all the then all the facets of can be obtained.
Now we consider a general zonotope . Inspired by aforementioned progress, to obtain all the facets of , firstly we collect all the potential hyperplanes, then for each hyperplane, these generators which don’t lie in the hyperplane are chosen to make the hyperplane as far away from as possible, i.e. fix the direction of normal vector of the hyperplane as the positive direction, for each generator which isn’t parallel with the hyperplane, if its direction is same as the normal vector, then add it to , else subtract it form . Notice that for a hyperplane, there are two facets which are symmetrical to , to obtain another facet, one just have to do same progress by changing the positive operation to negative operation.
The proof of Theorem 3.2:
In the sequel, we would utilize the concept of Minkowski sum, i.e., for two sets , their Minkowski sum is defined as . For Minkowski sum of zonotopes, it has following properties:
-
1.
zonotopes are closed under Minkowski sum, let , then ;
-
2.
for all zonotopes , .
We would slightly abuse symbols if it doesn’t lead to ambiguity in the proof. For a zonotope and a generator , means that . Further, for a set containing zonotopes, . Next we begin our proof of theorem 3.2.
Proof
Since the symmetry of the facets of , its boundary matrix would have the form below,
where the numbers of in of are equal since the operations in Alg. 1, Line and . We denote the set of facets for which the -th entry of the rows is (resp. ) as (resp. ). The number of facets is same for and , meanwhile the symmetric facets of and share the same generator matrix. We set to be the number of facets in and let be the indicator set containing the generator indexes of a facet (e.g., for zonotope , is one of its facets, then ).
Next we use mathematical induction.
Base case: , the tiling of is itself.
Inductive step: suppose the conclusion is true for , then next we would prove it’s true for .
for the , it connects two sets of symmetry facets and , moving the facets in the set along the direction of generator with the length of would form a new zonotope and the moving trajectory would form a few zonotopes, i.e., . (The progress of one iteration of tiling can be visualized in Fig. 5.)
Firstly we would prove the zonotopes after one-step tiling don’t have overlaps.
-
1.
, is a zonotope with rank less than or equal to , i.e., .
, is a zonotope whose rank is less than or equal to , then is a zonotope whose rank is less than or equal to , thus .
-
2.
, .
Firstly, according to Alg. 1 and Theorem 3.1, it’s easy to get the boundary of , which is and . and is two facets of . For a facet , let and denote the center and generator matrix of respectively. Further, let represent the submatrix of ’s generator matrix containing independent column vectors. For the hyperplane determined by , it divides into two half-spaces and . Let be the half-space on the side pointed by the direction of and on the opposite side (see Fig. 5), since lies in and lies in , then and lies in and respectively (recall that a zonotope is a polytope which can be viewed as the intersection of half-spaces determined by its boundary [4]).

Secondly we would prove that the union of zonotopes after one-step tiling is the zonotope , i.e., .
Recalling that a volume of an -dimensional zonotope with generators is
which was discovered by [32], then
Recalling Algorithm 1 and Theorem 3.1, the matrix set is the collection all the combination of generators of except with rank , thus collects all the combination of generators of including with rank . In other words, if a combination of generators including can’t be found in or isn’t a submatrix of matrix in , then its rank must be less than , leading to zero determinant. Therefore, we have
thus
Besides, for all , , then .
After one-step tiling, the boundary matrix represents all the facets of , which has generators, thus according to the inductive principle, the conclusion holds.
B Illustrative Examples
Example 1
Consider a -dimensional zonotope with generators , where
We follow the computational procedures in Alg. 1 to obtain all the facets of the zonotope , i.e., , which is detailed below.
-
1.
Find all the submatrices of with rank , .
-
2.
; ; .
-
2a.
For , due to , then .
-
2b.
For , due to , then and .
-
2a.
-
3.
Now we have two facets and , put them into boundary set .
-
4.
Remove from since are the submatrices of , now .
-
5.
Repeat - until , finally all eight facets of zonotope is obtained.
Example 2
Example 3
For the rows whose the -th entry equaled with , delete them from boundary matrix , Then
For the rows whose the -th entry equaled with , add them to tiling matrix , change the value of the -th entry to in tiling matrix and and change the value of the -th entry to in boundary matrix . i.e.,
Add the last row of boundary matrix to tiling matrix and change the value of its -th entry () to in tiling matrix . At this point, we have
Obtain sub-zonotopes form each row of tiling matrix with the operations in Def. 5, i.e.,
The tiling of can be visualized in Fig. 3.
Example 4
Given and , we compute inner-approximation candidate using unsorted and sorted order respectively. In this example we set for better illustration, the smallest equal to LP numerical accurate is suggested in practice.
Unsorted case:
- 1.
- 2.
-
3.
Finally, we get inner-approximation candidate .
Sorted case:
-
1.
For , its top generator by norm is , we compute its cross product of approximating hyperplane .
-
2.
Sort according to from large to small, we get the new order of generators .
- 3.
- 4.
-
5.
Finally, we get inner-approximation candidate .
The results of sorted and unsorted cases are visualized in figure 6(b) and figure 6(c) respectively. In the unsorted case is reduced to a -dimensional zonotope while in the sorted case is -dimensional and more bigger.



C Supplemental Figures



























