Elsevier

Automatica

Volume 102, April 2019, Pages 1-9
Automatica

Brief paper
Distributed model predictive control—Recursive feasibility under inexact dual optimization

https://doi.org/10.1016/j.automatica.2018.12.037Get rights and content

Abstract

We propose a novel model predictive control (MPC) formulation, that ensures recursive feasibility, stability and performance under inexact dual optimization. Dual optimization algorithms offer a scalable solution and can thus be applied to large distributed systems. Due to constraints on communication or limited computational power, most real-time applications of MPC have to deal with inexact minimization. We propose a modified optimization problem inspired by robust MPC which offers theoretical guarantees despite inexact dual minimization. The approach is not tied to any particular optimization algorithm, but assumes that the feasible optimization problem can be solved with a bounded suboptimality and constraint violation. In combination with a distributed dual gradient method, we obtain a priori upper bounds on the number of required online iterations. The design and practicality of this method are demonstrated with a benchmark numerical example.

Keywords

Predictive control
Control of constrained systems
Large scale systems
Distributed dual optimization

1. Introduction

Model predictive control (MPC) is a well-established control method, that can be used to control complex dynamical systems and guarantee constraint satisfaction (Rawlings & Mayne, 2009). One of the main limitations to control a system with MPC comes from computational issues, since in each time step an optimization problem has to be solved. In order to apply MPC to large-scale systems, we have to consider distributed approaches, which fall in the domain of distributed MPC (DMPC) (Maestre et al., 2014, Müller and Allgöwer, 2017). If we want to facilitate DMPC applications to fast (physically) interconnected networks, we typically need scalable distributed optimization algorithms with bounds on the number of required iterations.
Dual optimization algorithms such as the alternating direction method of multipliers (ADMM), dual gradient methods and proximal decomposition have been studied to solve DMPC optimization problems online (Kögel and Findeisen, 2012, Necoara and Nedelcu, 2015, Necoara and Suykens, 2008). While these algorithms enable a fully distributed implementation and asymptotically converge to the optimal central solution, real-time requirements lead to early termination and an inexact solution. Contrary to primal decomposition methods (Stewart, Venkat, Rawlings, Wright, & Pannocchia, 2010), these inexact solutions based on dual optimization do not necessarily satisfy the posed constraints (dynamic, state and input constraints) in the MPC optimization problem. This necessitates additional modifications to ensure recursive feasibility and stability of the resulting MPC scheme.

Related work

In Giselsson and Rantzer (2014) DMPC without terminal constraints is investigated and a sufficient stopping condition for the distributed iteration based on a candidate solution is presented. For this approach no prior bound on the number of required iterations can be given.
In Kögel and Findeisen (2014) a primal optimization algorithm with constraint violations in the dynamic equality constraints is investigated. Recursive feasibility is ensured with an appropriate state and input constraint tightening.
In Necoara, Ferranti, and Keviczky (2015) and Rubagotti, Patrinos, and Bemporad (2014) constraint violations in the inequality constraints due to inexact dual optimization are addressed with an appropriate (constant or adaptive) constraint tightening. Constraint violations in the posed dynamic equality constraints are avoided by using a condensed formulation (Necoara et al., 2015) or projecting the intermediate solution to the set of dynamically feasible trajectories (Rubagotti et al., 2014). Both approaches are, however, unsuited for distributed large-scale systems.
In Ferranti and Keviczky (2015) constraint violations in inequality constraints and dynamic equality constraints are considered by using an appropriate constraint tightening. Recursive feasibility is ensured by choosing the tolerance and thus the constraint tightening adaptively. As a consequence, the number of iterations can vary and global communication is required to enable this adaptation. In Doan, Keviczky, and Schutter (2011) a similar constraint tightening is used for a distributed hierarchical MPC scheme.

Contribution

We propose a new framework to ensure recursive feasibility of inexact DMPC resulting from finite dual iterations. This consists of a constant constraint tightening and a stabilizing controller, motivated by robust MPC (Chisci, Rossiter, & Zappa, 2001). To avoid an overly conservative constraint tightening, we propose a modified optimization problem and employ a different candidate solution, that explicitly takes the inexactness into account. This presents a general procedure which is applicable to different MPC setups. By combining this framework with a dual distributed gradient algorithm, we obtain an a priori upper bound for the number of dual iterations to ensure recursive feasibility. Compared to Ferranti and Keviczky (2015), Giselsson and Rantzer (2014) and Necoara et al. (2015), no adaptive constraint tightening is required. Furthermore, compared to Doan et al. (2011), Ferranti and Keviczky (2015), Kögel and Findeisen (2014) and Rubagotti et al. (2014), no centralized operations are necessary, thus allowing a fully distributed implementation for large-scale systems.

Outline

The remainder of this paper is structured as follows: Section 2 presents the nominal distributed MPC formulation and explains the problem inherent in inexact dual optimization. Section 3 presents the modified formulation, derives closed-loop properties under inexact minimization and presents a corresponding distributed dual iteration scheme. Section 4 illustrates the practicality and simplicity of the proposed framework with a numerical example. Section 5 concludes the paper.
In the extended version (Köhler, Müller, & Allgöwer, 2018a), these results are generalized to MPC without terminal ingredients, unreachable setpoints, multi-step MPC and the distributed offline computation of the terminal ingredients is detailed.

2. Distributed model predictive control

Notation

The real numbers are R, the positive real numbers are R>0={rR|r>0} and the natural numbers are N. Given vectors aiRni, we abbreviate the column vector [a1,,an]=(a1,,an). The quadratic norm with respect to a positive definite matrix Q=Q is denoted by xQ2=xQx and the minimal and the maximal eigenvalue of Q are denoted by λmin(Q) and λmax(Q), respectively. For a polytopic constraint Ayb, we define an ϵ-feasible solution as any vector y that satisfies Ayb+ϵ1, with ϵR>0 and the vector of ones 1=[1,,1]. We call a vector ϵ-strictly feasible if it satisfies Aybϵ1. The Minkowski sum of two sets S,TRn is denoted by ST={x|sS,tT:x=s+t}.A distributed system is represented as a graph G=(N,E) with nodes N and edges E. Each node iN corresponds to a subsystem with local state xiRni and local input uiRmi. The neighborhood of a subsystem i is given by Ni={j|(i,j)E}{i}, with xNiRnNi, nNi=jNinj.

2.1. Problem setup

The distributed linear discrete-time system is given by (1)xi(t+1)=ANixNi(t)+Biui(t),iN,with polytopic state and input constraints of the form (2)xNiXNi={xNi|HNixNihNi},(3)uiUi={ui|Liuili}, where hNiR>0pi and liR>0qi. We consider the general case, where the control input is given by (4)ui(t)=KNixNi(t)+vi(t),where K is some existing distributed controller and v is the input calculated using distributed MPC. If no such feedback is known, we can always set K=0. However, including this feedback can reduce the conservatism and mitigate the deteriorating effects of suboptimality on closed-loop stability. The overall system is given by (5)x(t+1)=Ax(t)+Bu(t)=(A+BK)AKx(t)+Bv(t),with the polytopic constraints X={x|xNiXNiiN}={x|Hxh}Rn,U=U1×U|N|={u|Lul}Rm, where lR>0q and hR>0p. We consider a structured quadratic stage cost (x,v)=xQ2+vR2, with block diagonal positive definite matrices Q and R. We consider an MPC framework including a terminal cost and terminal set. To this end, we make the following assumption.

Assumption 1

There exists a terminal cost Vf(x)=iNxiPi2=xP2 with a block diagonal matrix P, a distributed terminal controller ui=Kf,NixNi, and a distributed compact polytopic set Xf={x|Fxf}, such that the following conditions hold for each xfXf (6a)Vf((A+BKf)xf)Vf(x)(xf,(KfK)xf),(6b)xfX,uf=KfxfU,(6c)(A+BKf)xfXf.

Remark 2

In Conte, Jones, Morari, and Zeilinger (2016) distributed linear matrix inequalities (LMIs) are presented that can be used to compute a distributed terminal cost and an ellipsoidal terminal set Xf. Ellipsoidal terminal constraints lead to a (distributed) quadratically constrained quadratic program (QCQP), which makes the online optimization more complex. Methods to obtain a distributed polytopic terminal set Xf are for example given in Kögel and Findeisen (2012) and Trodden (2016). The offline computation of the distributed terminal ingredients is discussed in more detail in the extended version (Köhler et al., 2018a A.1). The proposed framework can also be used without such terminal ingredients, which is discussed in Köhler et al. (2018a, A.2, A.3).
The open-loop cost of a state sequence x(|t)Rn×N+1 and an input sequence v(|t)Rm×N with the prediction horizon NN is defined as JN(x(|t),v(|t))k=0N1(x(k|t),v(k|t))+Vf(x(N|t)). The standard MPC optimization problem is given by (7)VN(x(t))=minv(|t),x(|t)JN(x(|t),v(|t))s.t. x(k+1|t)=AKx(k|t)+Bv(k|t),x(0|t)=x(t),x(N|t)Xf,x(k|t)X,u(k|t)=v(k|t)+Kx(k|t)U. The solution to this optimization problem is the value function VN and optimal state and input trajectories (x(|t),v(|t)) that satisfy the dynamic equality constraint and the state and input constraints. Problem (7) is a distributed quadratic program, the solution of which is discussed in Sections 2.23.5.
For the closed-loop operation the first step of the optimal input v(|t) is applied to the system (5), resulting in the following closed-loop system dynamics: (8)x(t+1)=AKx(t)+v(0|t)=x(1|t).The following theorem is a standard result in MPC and establishes the desired properties.

Theorem 3

Rawlings & Mayne, 2009

Let Assumption 1 hold and assume that Problem (7) is feasible att=0. Then Problem (7) is recursively feasible and the origin x=0 is asymptotically stable for the resulting closed-loop system (8).

2.2. Distributed (dual) optimization

In the following, we motivate why we consider inexact dual optimization and explain why it necessitates modifications to Problem (7). Most theoretical results for MPC (such as Theorem 3) assume that the optimal solution to (7) is obtained in real time, which is rarely achievable in practice.
If primal optimization methods are used, Theorem 3 remains valid with inexact optimization assuming a suitable initialization (Scokaert et al., 1999, Stewart et al., 2010). However, an application of primal optimization methods to large-scale distributed systems suffers from various difficulties, including initialization and scalability.
Thus, we consider dual optimization algorithms (Kögel and Findeisen, 2012, Necoara and Nedelcu, 2015, Necoara and Suykens, 2008), which only require neighbor-to-neighbor communication and can be implemented in a fully distributed manner. The main drawback of dual optimization is that the constraints (dynamic, state and input) are not necessarily satisfied after finite iterations. This necessitates additional modifications to enable theoretical guarantees after finite iterations, compare (Ferranti and Keviczky, 2015, Rubagotti et al., 2014). In the following, we provide a novel MPC formulation which is suitable for distributed computation and explicitly takes the inexact dynamics of approximate solutions into account.

3. Inexact distributed MPC

In the following, we consider bounds on the accuracy ϵ, interpret them as disturbances and use tools from robust MPC (Chisci et al., 2001) to compensate the effects of inexact minimization. The proposed modifications are inspired by Ferranti and Keviczky (2015) and directly take the inexactness of the solver into account. By making use of an inexact candidate solution, we obtain a formulation that requires no adaptation and thus no global communication.

3.1. Inexact MPC and constraint tightening

Define an accuracy for the dynamic, state, input and terminal constraints and strict feasibility ϵz,ϵx,ϵu,ϵf,ϵλR>0, given by the user. Consider relaxation parameters (9)ϵz,kϵλ+(N1k)(ϵλ+ϵz),k=0,,N1,and the sets Wk={wRn|wϵz,k+ϵz}. We tighten the constraints using the k-step support function (Conte, Zeilinger, Morari, & Jones, 2013), which for some aRn and kN is defined as (10)σW(a,k)=supwW0kay(k),s.t. y(l+1)=AKy(l)+w(l),y(0)=0. The tightened state and input constraints are given by X¯k={x|Hxh¯k},U¯k={u|Lul¯k},with (11)h¯j,k=hjσW(Hj,k)ϵxk(ϵx+ϵλ),(12)l¯j,k=ljσW(KLj,k)ϵuk(ϵu+ϵλ). Here, h¯j,k denotes the jth component of h¯k, hj the jth component of h and Hj the jth row of H, jp. The evaluation of the k-step support function amounts to solving a distributed linear program (LP) offline. The resulting tightened constraints preserve the distributed structure and can equally be represented with the local polytopic sets X¯Ni,k,U¯i,k.

Assumption 4

Consider the terminal cost and controller from Assumption 1. There exists a compact tightened terminal set X¯f={x|Fxf¯}, such that the following conditions hold (13a)X¯f,ϵk=0N1AKN1kWkXf,(13b)X¯f,ϵAKN1W0{x|Hxh¯N11pϵλ},(13c)Kf(X¯f,ϵAKN1W0){u|Lul¯N11qϵλ},(13d)(A+BKf)X¯f,ϵAKN1W0X¯f,λ,X¯f,ϵ{x|Fxf¯+1rϵf},X¯f,λ{x|Fxf¯1rϵλ}.
The sets X¯f,ϵ,X¯f,λ are needed to study strict recursive feasibility (ϵλ) under inexact minimization (ϵf). A sufficient condition for (13b) is X¯f,ϵX¯N. In case Kf=K, KfX¯f,ϵU¯N is a sufficient condition for (13c). Condition (13d) requires contractivity of the terminal set, despite the additive disturbance w0.
If the terminal set in Assumption 1 is contractive, Assumption 4 can be satisfied with the following design procedure: for a fixed accuracy ϵ and prediction horizon N, compute the tightened constraints (11). Then scale the terminal set Xf such that conditions (13a)(13c) are satisfied. Finally, verify that condition (13d) is satisfied. If this is not the case, decrease ϵ and start over. In Köhler et al. (2018a), we show that the proposed framework can also be used without constructing a terminal set.
With this, we define the modified optimization problem (14a)minv(|t),z(|t)JN(z(|t),v(|t))(14b)s.t. AKz(k|t)+Bv(k|t)z(k+1|t)ϵz,k,(14c)z(k|t)X¯k,v(k|t)+Kz(k|t)U¯k,k=0,,N1,(14d)z(N|t)X¯f,(14e)z(0|t)=x(t). Compared to the original optimization Problem (7), the state and input constraints are tightened and the dynamic equality constraints are relaxed to inequality constraints. We do not try to find a solution that exactly satisfies the dynamic constraints, but only consider a relaxed dynamic constraint with the parameter ϵz,k. This relaxation will allow us to construct a feasible candidate solution which again does not exactly satisfy the dynamic constraints. This is the key insight and novelty in order to prove recursive feasibility and stability under inexact minimization. The resulting Problem (14) is a distributed quadratic program with linear inequality constraints.
To study recursive feasibility of (14) under the inexact DMPC we introduce the notion of ϵ-feasible solutions.

Definition 5

An ϵ-feasible solution to (14) is any pair (zϵ(|t),vϵ(|t)), that satisfies (15)AKzϵ(k|t)+Bvϵ(k|t)zϵ(k+1|t)ϵz,k+ϵz,Hzϵ(k|t)h¯k+1pϵx,L(vϵ(k|t)+Kzϵ(k|t))l¯k+1qϵu,Fzϵ(N|t)f¯+1rϵf,zϵ(0|t)=x(t).
This formulation allows a constraint violation for the posed constraints (14b)(14d) by ϵz,ϵx,ϵu, and ϵf, respectively. A corresponding algorithm to ensure an ϵ-feasible solution with finite iterations is presented in Section 3.5.

3.2. Feasible consolidated trajectory

In order to characterize the feasibility of on an ϵ-feasible solution, we consider the consolidated1 trajectory (Ferranti & Keviczky, 2015).

Proposition 6

Let Assumption 1, Assumption 4 hold. Given anϵ-feasible solution (15)zϵ(|t),vϵ(|t) at timet, the consolidated state and input trajectories x¯ϵ(|t),u¯ϵ(|t) x¯ϵ(k+1|t)AKx¯ϵ(k|t)+Bvϵ(k|t),x¯ϵ(0|t)x(t),(16)u¯ϵ(k|t)Kx¯ϵ(k|t)+vϵ(k|t), satisfy x¯ϵ(k|t)X,u¯ϵ(k|t)=vϵ(k|t)+Kx¯ϵ(k|t)U,x¯ϵ(N|t)Xf.

Proof

The inexact relaxed dynamic constraint (15) can be equivalently written as a dynamic equality constraint with an additive disturbance (17)zϵ(k+1|t)=AKzϵ(k|t)+Bvϵ(k|t)+wk,wkWk.The consolidated trajectory (16) satisfies (18)x¯ϵ(k|t){zϵ(k|t)}l=0k1AKkl1Wl(9){zϵ(k|t)}l=0k1AKlW0,which implies Hjx¯ϵ(k|t)(10)Hjzϵ(k|t)+σW(Hj,k)Def. 5h¯j,k+ϵx+σW(Hj,k)(11)hj,Lju¯ϵ(k|t)(10)Lj(vϵ(k|t)+Kzϵ(k|t))+σW(KLj,k)Def. 5l¯j,k+ϵu+σW(KLj,k)(12)lj. Terminal constraint satisfaction follows by condition (13a) in combination with the characterization (18) for k=N.  □
Proposition 6 shows that the consolidated trajectory based on the inexact optimization has all the desirable properties of the standard optimal solution x(|t),u(|t) to Problem (7). The closed-loop system resulting from an inexact DMPC is given by (19)u(t)=Kx(t)+vϵ(0|t)=u¯ϵ(0|t),x(t+1)=AKx(t)+vϵ(0|t)=x¯ϵ(1|t). Thus, Proposition 6 implies that the closed loop based on an ϵ-feasible solution satisfies the state and input constraints.

Remark 7

In order to show feasibility of the consolidated trajectory, the constraint tightening (11), (12) could be formulated without the term k(ϵx+ϵλ) and the support function could be defined based on the smaller set W0××Wk, compare (Ferranti & Keviczky, 2015). The more restrictive constraint tightening will be crucial in order to establish recursive feasibility of Problem (14) for the closed-loop system (19) based on an ϵ-feasible solution. The issue of using a more conservative constraint tightening to establish recursive feasibility is also addressed in Kögel and Findeisen (2014) and Rubagotti et al. (2014).

3.3. Recursive feasibility under inexact minimization

The following Theorem is the main contribution of this paper. It establishes recursive feasibility of Problem (14) under the inexact MPC control law with a suitable candidate solution.

Theorem 8

Let Assumption 1, Assumption 4 hold. Given anϵ-feasible solution (15) zϵ(|t),vϵ(|t) at time t, the candidate sequence (20)ṽ(k|t+1)=vϵ(k+1|t),k=0,,N2,ṽ(N1|t+1)=(KfK)z̃(N1|t+1),z̃(0|t+1)=x(t+1)=zϵ(1|t)+w0,w0W0,z̃(k|t+1)=zϵ(k+1|t)+AKkw0,k=0,,N1,z̃(N|t+1)=(A+BKf)z̃(N1|t+1), is an ϵλ-strictly feasible solution to the optimization Problem (14) at timet+1. Problem (14) is recursively feasible for the closed-loop system (19).

Proof

The proof is composed of three parts. First, we show strict satisfaction of the relaxed dynamic constraints. Then we show strict satisfaction of the tightened state and input constraints. Finally, we show strict satisfaction of the terminal constraint and thus establish recursive feasibility.
Part I: Show that the candidate sequence z̃(|t+1),ṽ(|t+1) in (20) strictly satisfies the relaxed dynamic constraint (14b): The candidate input ṽ(|t+1) (20) is constructed by shifting the previous input sequence vϵ(|t) by one time step and appending the terminal controller Kf. The state sequence zϵ(|t) is shifted with an additional error term w0 propagated through the system dynamics to ensure satisfaction of the initial state constraint (14e). Substituting (17) in z̃(|t+1) yields z̃(k|t+1)=zϵ(k+1|t)+AKkw0=AKzϵ(k|t)+Bvϵ(k|t)+AKkw0+wk=AKz̃(k1|t+1)+Bṽ(k1|t+1)+wk, for k=1,,N1, with wkϵz,k+ϵz=ϵz,k1ϵλ. Similarly, the last dynamic constraint (k=N) is satisfied with equality, which implies that all relaxed dynamic constraints are strictly satisfied with ϵz,N1=ϵλ.
Part II: Show that the candidate sequence (20) strictly satisfies the state and input constraints (14c): Due to the definition of the support function2 and linear superposition we have σW(Hj,k+1)σW(Hj,k)+HjAKkw0,w0W0,which implies h¯j,k+1+HjAKkw0h¯j,k(ϵx+ϵλ).The candidate sequence satisfies Hjz̃(k|t+1)=Hjzϵ(k+1|t)+HjAKkw0h¯j,k+1+HjAKkw0+ϵxh¯j,kϵλ,k=0,,N2. and hence the state constraints are strictly satisfied. For the input constraints the same argument holds with Lj(ṽ(k|t+1)+Kz̃(k|t+1))=Lj(vϵ(k+1|t)+Kzϵ(k+1|t)+KAKkw0)l¯j,k+1+ϵu+LjKAKkw0l¯j,kϵλ,k=0,,N2. Given zϵ(N|t)X¯f,ϵ, conditions (13b) and (13c) imply strict satisfaction of the state and input constraints at k=N1.
Part III: Show that the terminal state of the candidate sequence (20) strictly satisfies the terminal constraint (14d): Condition (13d) ensures z̃(N|t+1)=(A+BKf)z̃(N1|t+1)=(A+BKf)(zϵ(N|t)+AKN1w0)(A+BKf)(X¯f,ϵAKN1W0)X¯f,λX¯f.
This theorem ensures recursive feasibility under inexact dual optimization with bounded constraint violation. The candidate solution z̃ with the corresponding tightened (and shifted) constraint set X¯k is sketched in Fig. 1. The tightened constraint set X¯k is constructed, such that ϵ-feasibility of zϵ(|t) implies ϵλ-strict feasibility of z̃(|t+1) w.r.t. the shifted constraint set X¯k, despite the error w0.

3.4. Closed-loop stability

To study stability properties of the closed-loop system, we use the following definition regarding the suboptimality of the inexact solution.
  1. Download: Download high-res image (124KB)
  2. Download: Download full-size image

Fig. 1. Illustration of the strictly feasible candidate sequence z̃(|t+1) in relation to the previous solution zϵ(|t), the error in the first dynamic constraint w0 and the (shifted) tightened constraints X¯k over the prediction horizon.

Definition 9

Given an ϵ-feasible solution (Definition 5), the suboptimality η w.r.t. the optimal solution is defined as (21)JN(x¯ϵ(|t),vϵ(|t))VN(x(t))+η.The inexact optimal solution is given by (22)VN,ϵ(x(t))minz(|t),v(|t)JN(z(|t),v(|t))s.t. z(|t),v(|t) satisfy (15). The suboptimality ηϵ with respect to this inexact optimal solution is given by (23)JN(zϵ(|t),vϵ(|t))VN,ϵ(x(t))+ηϵ.Solutions satisfying (15), (21), (23) are called (ϵ,η,ηϵ)-approximate solutions.
Corresponding bounds on the suboptimality for inexact dual optimization will be established in Proposition 12. The following proposition shows that the proposed inexact DMPC approximately preserves the stability properties of nominal MPC based on exact optimization.

Proposition 10

Let Assumption 1, Assumption 4 hold. Given an(ϵ,η,ηϵ)-approximate solutionzϵ(|t),vϵ(|t) (Definition 9) at time t, the candidate sequence z̃(|t+1),ṽ(|t+1) in Theorem 8 implies (24)VN(x(t+1))VN(x(t))(x(t),v(t))+η.Hence the origin x=0 is practically asymptotically stable (Grüne & Pannek, 2017 Def. 2.15) for the closed-loop system (19) based on(ϵ,η,ηϵ)-approximate solutions at each time t. Given a sufficiently small ϵ,ηϵ, the additional bound (25)VN,ϵ(x(t+1))VN,ϵ(x(t))(x(t),v(t))+ηϵ+β1holds with β1 according to (26).

Proof

Part I: Consolidated cost VN: The candidate input sequence ṽ(|t+1) from Theorem 8 with the corresponding consolidated state trajectory x¯(|t+1) is a feasible solution to (7) (Proposition 6). Using suboptimality η according to Definition 9, this implies VN(x(t+1))JN(x¯(|t+1),v(|t+1))(6a)JN(x¯ϵ(|t),vϵ(|t))(x(t),v(t))(21)VN(x(t))+η(x(t),v(t)). Practical asymptotic stability follows from standard Lyapunov arguments.
Part II: Inexact optimal cost VN,ϵ: There exist constants α̲,α¯, such that zϵX¯f implies Vf(zϵ)α¯, and Vf(zϵ)α̲ implies zϵX¯f. In the following we consider a bound VN,ϵ(x(t))V¯ϵηϵ, with some V¯ϵα̲+ηϵ, which is recursively established in the end. This bound in combination with the suboptimality implies JN(zϵ(|t),vϵ(|t))V¯ϵ. The stage cost and terminal cost of the candidate solution satisfy (z̃(k|t+1),ṽ(k|t+1))(zϵ(k+1|t),vϵ(k+1|t))AKkw0Q2+2V¯ϵAKkw0Q,k=0,,N1,Vf(z̃(N1|t))Vf(zϵ(N1|t))AKN1w0P2+2α¯AKN1w0P. The cost of the candidate trajectory satisfies JN(z̃(|t+1),ṽ(|t+1))JN(zϵ(|t),vϵ(|t))(6a)(x(t),v(t))+Vf(z̃(N1|t+1))Vf(zϵ(N|t))+k=0N2(z̃(k|t+1),vϵ(k+1|t))(zϵ(k+1|t),vϵ(k+1|t))(x(t),v(t))+β1, with (26)β1k=0N2AKkw0Q2+2V¯ϵAKkw0Q+AKN1w0P2+2α¯AKN1w0P2. Using feasibility based on Theorem 8 and suboptimality ηϵ according to Definition 9, this implies VN,ϵ(x(t+1))JN(z̃(|t+1),ṽ(|t+1))JN(zϵ(|t),vϵ(|t))(x(t),v(t))+β1(23)VN,ϵ(x(t))+ηϵ+β1(x(t),v(t)). The upper bound V¯ϵ is valid recursively, if ϵ,ηϵ are sufficiently small, such that the following inequality holds V¯ϵηϵα̲λmax(PQ)(β1+ηϵ), compare (Köhler, Müller, & Allgöwer, 2018b Lemma 7, Thm. 8).  □
Theorem 8 in combination with Proposition 10 ensures recursive feasibility and practical asymptotic stability under inexact dual optimization with bounded constraint violation and suboptimality. Both inequalities (24)(25) are each independently sufficient for practical asymptotic stability with the corresponding value functions VN,VN,ϵ as practical Lyapunov functions. The stability analysis based on VN,ϵ tends to be less conservative (compare Proposition 12) and is only possible since we explicitly refrain from adapting the accuracy ϵ online, contrary to Ferranti and Keviczky (2015), Giselsson and Rantzer (2014) and Necoara et al. (2015). This is why we also prove the technically more difficult, but potentially less conservative, bounds on the inexact valuefunction (25).

Remark 11

Due to the inexact dynamic constraint (14b), the input vϵ=0 is the optimal solution to Problem (14) if x(t) is small enough. This property is another reason why the additional feedback in (4) can be advantageous.

3.5. Dual distributed optimization

In the following, we describe how to obtain an approximate solution to Problem (14) with finite dual distributed iterations. Problem (14) can be formulated3 as miny12iNyiQ¯i2s.t. jNiCijyjci,iN,yi=(vi(0|t),zi(1|t),,vi(N1|t),zi(N|t)),cRnc. The local dual gradient is Lipschitz with Ldi=[Cji]jNi2λmin(Q¯i). We consider the distributed dual gradient algorithm (Necoara & Nedelcu, 2015), with the local step size Wμ,i=jNiLdj.
  1. Download: Download high-res image (64KB)
  2. Download: Download full-size image
Here []+ denotes the projection on the nonnegative orthant. This is an iterative synchronous algorithm, which consists of small-scale multiplications and requires only local communication. The following proposition summarizes the theoretical properties of this algorithm based on (Necoara & Nedelcu, 2015 Thm. 4.2–4.4) and strict feasibility (Ferranti & Keviczky, 2015 Thm. 1).

Proposition 12

Suppose there exists an ϵλ-strictly feasible solution ỹ to Problem (14) and consider the initialization4 μ0=0. For allpp¯,yp is an(ϵ,η,ηϵ)-approximate solution (Definitions 5, 9) with (27a)p¯=2+logd[ϵλϵ̲Wμ1V¯ϵ],d<1,(27b)ηϵ=ncV¯ϵϵ¯ϵλ+12ϵ̲2Wμ1,(27c)η=ncV¯ϵϵ¯Nϵλ+12ϵ̲2Wμ1, ϵ¯N=max{ϵ¯,ϵz,0,h¯j,Nhj,l¯j,Nlj},ϵ̲=min{ϵz,ϵx,ϵu,ϵf},ϵ¯=max{ϵz,ϵx,ϵu,ϵf},V¯ϵ=ỹQ¯2.

Proof

Part I: Given the ϵλ-strictly feasible solution ỹ, the following upper bound holds for the optimal dual variable μ (compare Ferranti & Keviczky, 2015, Lemma 1) μỹQ¯2yQ¯2ϵλỹQ¯2ϵλV¯ϵϵλ.Based on (Necoara & Nedelcu, 2015 Thm. 4.2) the constraint violation satisfies [Cypc]+dp2V¯ϵϵλWμ,with the fixed constant d<1 according to Necoara and Nedelcu (2015, Thm. 3.2, Thm. 4.2). Correspondingly, for pp¯, yp is an ϵ-feasible solution, with p¯ according to (27a).
Part II: Analogous to Ferranti and Keviczky (2015, Thm. 1), we can derive the following bound based on the dual variables and the relaxation VN,ϵ(x(t))JN(z(|t),v(|t))+ncV¯ϵϵ¯ϵλ,where z,v is the optimal solution to (14). By combining this result with the relative suboptimality ηy of yp (Necoara & Nedelcu, 2015 Thm. 4.4), we can establish the following bound ηϵμ1ϵ¯+ηyncV¯ϵϵ¯ϵλ+ηy,ηy12(dp¯1V¯ϵϵλ)2Wμ12ϵ̲2Wμ1. The same derivations hold for η, using the maximal size of the constraint tightening ϵ¯N instead of ϵ¯. □

Remark 13

Given a user specified accuracy ϵ, this proposition gives an a priori upper bound on the number of iterations p¯ for a given sublevel set of VN,ϵ. In combination with Theorem 8 and Proposition 10, this property holds recursively under the approximate DMPC. In closed-loop operation the value of V¯N,ϵ decreases (Proposition 10) and thus the number of necessary iterations p¯ based on (27a) decreases. Using a larger tolerance ϵ leads to fewer iterations p and a larger suboptimality η,ηϵ. The bound for ηϵ is (typically) significantly smaller than η, which is crucial for the stability analysis (Proposition 10). Instead of choosing a desired accuracy ϵ, a user can also specify an upper bound on the number of iterations p¯ and choose a sufficiently small accuracy ϵ using (27a). There exists a variety of distributed dual algorithms for which similar complexity bounds can be obtained. If an alternating minimization algorithm such as Kögel and Findeisen (2012) and Ferranti and Keviczky (2015) is used, the relationship between the inexactness of the optimization ϵ and the resulting inexactness in the dynamic constraint changes, see Ferranti and Keviczky (2015) and Köhler, Müller, Li, and Allgöwer (2017).
The initialization and closed-loop operation of the MPC scheme is summarized in the following two algorithms.
  1. Download: Download high-res image (63KB)
  2. Download: Download full-size image
  1. Download: Download high-res image (61KB)
  2. Download: Download full-size image
Instead of using the (possibly conservative) a priori bound p¯, a stopping condition ensuring an ϵ-feasible solution (Definition 5) can be used, which can be efficiently and distributedly checked online, compare Section 4. All the necessary offline and online computations can be accomplished in a fully distributed and scalable fashion.

3.6. Comments

By combining Theorem 8 and Proposition 10, Proposition 12, we can ensure recursive feasibility and practical asymptotic stability with finite distributed dual iterations. While parts of the proof might be technical, the application of the proposed method is straightforward. The bounds on the suboptimality ηϵ,η and the resulting closed-loop stability guarantees (Propositions 10, 12) tend to be conservative and should rather be interpreted as a conceptual result of how the inexact minimization affects stability.
We prove the theoretical properties of the proposed framework within the standard MPC setup including a terminal cost and a polytopic terminal set. In various applications and setups, different variations of MPC can be advantageous (such as MPC without terminal ingredients or economic MPC). The extended version (Köhler et al., 2018a) shows in detail under which conditions similar results can be derived for these different setups.
The following remark discusses similarities of the proposed framework to existing schemes and highlights the novelty based on the inexact candidate solution.

Remark 14

In Rubagotti et al. (2014) violations in the inequality constraints (state and input constraints ϵx,ϵu) are considered. The corresponding constraint tightening can be viewed as a special case (ϵz=0) of the proposed method.
In Kögel and Findeisen (2014) a constraint tightening is proposed to ensure recursive feasibility of the consolidated trajectory despite inexact dynamic constraints. The a priori complexity bounds (Proposition 12) do not hold for this formulation due to the usage of equality constraints and lack of strict feasibility.
In Giselsson and Rantzer (2014) the stopping condition is based on an explicit candidate solution for the next time step, which needs to be computed online. This requires additional online computations and bounds on the number of iterations cannot be given (in contrast to ϵ-feasibility as used in Ferranti and Keviczky, 2015, Necoara et al., 2015, Rubagotti et al., 2014).
In Ferranti and Keviczky (2015) and Necoara et al. (2015) the constraints are tightened, such that the consolidated trajectory is (strictly) feasible (Proposition 6). Recursive feasibility is ensured be adapting the accuracy ϵ and constraint tightening online. This adaptation requires global communication, is complex, and it is a priori unclear whether the number of online iterations increases or decreases in closed-loop operation. One of the main benefits of the proposed framework is that such an adaptation is not needed (although incorporating an optional adaptation, if possible, could be beneficial).
To the best of our knowledge, the proposed result is the first MPC result based on a dynamic inexact candidate solution. As discussed above, the use of such an inexact candidate solution is possible through relaxing the dynamic constraint (14b) and is the key ingredient for establishing recursive feasibility with a fixed constraint tightening, allowing for a fully distributed implementation of the proposed scheme with finite dual iterations.

4. Numerical example

In the following, we show the practicality of the proposed approach with the example5 of a chain of masses (Conte et al., 2016). We consider M=20 subsystems with randomly sampled mass m[0.5,1.5], spring constant k[1.5,4.5], damping constant d[1.5,4.5] and use an Euler discretization with h=0.1 s. The cost is Q=I, R=I and the constraints are ui10, |[1,0]xi|10, |[0,1]xi|1, xixj3,jNi. The resulting system has 40 states, 20 inputs, and coupled dynamics and constraints.

Offline computation

In the following we detail the offline computations. We consider no additional feedback, i.e., K=0. We choose a prediction horizon of N=4 and the tolerance is chosen as ϵ=2.5103=ϵz=ϵx=ϵu=ϵλ=ϵf. The constraints are tightened with the k-step support function (11)(12). We compute a distributed terminal cost P that satisfies (6a) with distributed LMIs as in Conte et al. (2016). For the terminal set, we consider decoupled local terminal sets X¯f=X¯f,1×X¯f,M, with symmetric local sets X¯f,i={xi|Gxiqi,Gxiqi},G=10110111.The vectors qi are determined using the method in Trodden (2016), such that the set X¯f,ϵ is (robust) positively invariant for the dynamics A+BKf, by solving a (distributed) LP. This terminal set is scaled, such that the conditions (13c), (13b) are satisfied. Finally, we verify that this terminal set satisfies condition (13d) and thus Assumptions 14 are satisfied. The overall offline computations are accomplished in 60 s with an Intel Core i7.

Simulations — stability and dual initialization

In the following, the online optimization (Alg. 1) is stopped once an ϵ-feasible solution (Definition 5) is obtained. We explore the effect of the initialization μ0 (Alg. 3) on the number of dual iterations p. Simple initialization strategies are μ0=0, using the previous dual variables μ0=μp, or shifting μp similar to the shifted candidate solution z̃ in Theorem 8 (and appending zero at the end). We consider an initial condition with random positions and zero velocity. The inexact cost JN(zϵ,vϵ) and number of dual iterations p for the resulting closed loop can be seen in Fig. 2.
As expected, the predicted cost JN decreases and the origin is (practically) asymptotically stable (Proposition 10). Clearly, using the previous solution μp can significantly reduce the number of online iterations. Since the cost JN with different initialization μ0 only varies marginally, a suitable initialization simply reduces the number of online iterations.
  1. Download: Download high-res image (189KB)
  2. Download: Download full-size image

Fig. 2. Closed-loop Inexact DMPC: Inexact cost JN(zϵ,vϵ) (left) and number of iterations p (right) with different initialization μ0 vs. time t.

In the following, we quantitatively explore the effect of the tolerance ϵ and the number of subsystems M on the closed-loop computational demand. We consider the initialization based on the shifted vector μp. In Fig. 3 we can see the number of online iterations p in each time step for different numbers of subsystems M{5,10,15,20} and tolerances ϵ{2.5103,103,104}. If we increase the number of subsystems M, the number of dual iterations tends to increase slightly (due to the increased cost V¯ϵ, compare Proposition 12). In contrast, if we chose a smaller tolerance ϵ the number of dual iterations increases significantly. Thus, by choosing a larger tolerance ϵ, we can consider significantly more subsystems M without increasing the number of online dual iterations p.
To summarize: Compared to a nominal DMPC, the design procedure only requires the additional computation of the tightened constraints for the chosen tolerance ϵ. With the proposed modifications, the closed loop satisfies the constraints and the effect of inexact minimization on closed-loop stability is negligible. Thus, we can significantly reduce the online computational demand by allowing for a non-vanishing tolerance ϵ without any major downside. The main limitation to consider more subsystems M and a larger tolerance ϵ is the construction of the polytopic terminal set X¯f and the robust positive invariance condition (13d).
  1. Download: Download high-res image (312KB)
  2. Download: Download full-size image

Fig. 3. Quantitative impact of tolerance ϵ and number of subsystems M on number of iterations p.

5. Conclusion

We have proposed a new formulation for DMPC based oninexact dual optimization. The online optimization can beaccomplished in a fully distributed manner using standard dual distributed optimization methods and only has to obtain an approximate solution. We have established recursive feasibility, constraint satisfaction and practical stability of the closed loop based on such an approximate solution. This is possible through the usage of a reformulated optimization problem and a novel candidate solution, which both explicitly consider the inexactness of the optimization. This modified formulation enables practical applications of MPC to large-scale systems with fast dynamics, for which the underlying MPC optimization problem cannot be solved inreal time.

Acknowledgments

Preliminary results of this paper have been derived during a stay of the first author in Na Li’s research group in SEAS Harvard.

References

Cited by (22)

  • Analysis and design of model predictive control frameworks for dynamic operation—An overview

    2024, Annual Reviews in Control
    Citation Excerpt :

    MPC formulations without terminal ingredients (Section 6) are simple to apply for large scale systems due to the absence of any offline designs. For example, Giselsson and Rantzer (2014) and Köhler et al. (2019a, App. A) derive closed-loop guarantees for regulation and economic performance despite inexact distributed optimization. In the following, we mention existing results that combine the nominal results in Sections 3–6 with a robust MPC formulation.

  • Robust-to-Early Termination Model Predictive Control

    2023, IEEE Transactions on Automatic Control
  • Stochastic Distributed Predictive Tracking Control under Inexact Minimization

    2021, IEEE Transactions on Control of Network Systems
View all citing articles on Scopus
Johannes Köhler received his Master degree in Engineering Cybernetics from the University of Stuttgart, Germany, in 2017. During his studies, he spent 3 months at Harvard University in Na Li’s research lab. He has since been a doctoral student at the Institute for Systems Theory and Automatic Control under the supervision of Prof. Frank Allgöwer and a member of the Graduate School Soft Tissue Robotics at the University of Stuttgart. His research interests are in the area of model predictive control.
Matthias A. Müller received a Diploma degree in Engineering Cybernetics from the University of Stuttgart, Germany, and an M.S. in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign, US, both in 2009. In 2014, he obtained a Ph.D. in Mechanical Engineering, also from the University of Stuttgart, Germany, for which he received the 2015 European Ph.D. award on control for complex and heterogeneous systems. He is currently working as a senior lecturer (Akademischer Oberrat) at the Institute for Systems Theory and Automatic Control at the University of Stuttgart, Germany. His research interests include nonlinear control and estimation, model predictive control, distributed control and switched systems, with application in different fields including biomedical engineering.
Frank Allgöwer studied Engineering Cybernetics and Applied Mathematics in Stuttgart and at the University of California, Los Angeles (UCLA), respectively, and received his Ph.D. degree from the University of Stuttgart in Germany. Since 1999 he is the Director of the Institute for Systems Theory and Automatic Control and professor at the University of Stuttgart. His research interests include networked control, cooperative control, predictive control, and nonlinear control with application to a wide range of fields including systems biology. For the years 2017–2020 Frank serves as President of the International Federation of Automatic Control (IFAC) and since 2012 as Vice President of the German Research Foundation DFG.
The authors thank the German Research Foundation (DFG) for support of this work within grant AL 316/11-1 and within the Research Training Group Soft Tissue Robotics (GRK 2198/1). The material in this paper was not presented at any conference. This paper was recommended for publication in revised form by Associate Editor Giancarlo Ferrari-Trecate under the direction of Editor Ian R. Petersen.
1
The feasibility recovery scheme described in Kögel and Findeisen (2014) to obtain a (dynamically) feasible solution is comparable to the definition of the consolidated trajectory.
2
This would not hold, if we would use W0××Wk1 for the definition of the k-step support function, compare Remark 7.
3
The minimization can be further decoupled along the time axis with the variables yi,k=[vi(k|t),zi(k|t)], compare (Ferranti & Keviczky, 2015).
4
The following properties remain valid if the initialization μ0 satisfies μ0μWμW.
5
To improve the numerical conditioning, we set ũ=10u.
View Abstract