-
Software Engineering for Robotics: Future Research Directions; Report from the 2023 Workshop on Software Engineering for Robotics
Authors:
Claire Le Goues,
Sebastian Elbaum,
David Anthony,
Z. Berkay Celik,
Mauricio Castillo-Effen,
Nikolaus Correll,
Pooyan Jamshidi,
Morgan Quigley,
Trenton Tabor,
Qi Zhu
Abstract:
Robots are experiencing a revolution as they permeate many aspects of our daily lives, from performing house maintenance to infrastructure inspection, from efficiently warehousing goods to autonomous vehicles, and more. This technical progress and its impact are astounding. This revolution, however, is outstrip** the capabilities of existing software development processes, techniques, and tools,…
▽ More
Robots are experiencing a revolution as they permeate many aspects of our daily lives, from performing house maintenance to infrastructure inspection, from efficiently warehousing goods to autonomous vehicles, and more. This technical progress and its impact are astounding. This revolution, however, is outstrip** the capabilities of existing software development processes, techniques, and tools, which largely have remained unchanged for decades. These capabilities are ill-suited to handling the challenges unique to robotics software such as dealing with a wide diversity of domains, heterogeneous hardware, programmed and learned components, complex physical environments captured and modeled with uncertainty, emergent behaviors that include human interactions, and scalability demands that span across multiple dimensions.
Looking ahead to the need to develop software for robots that are ever more ubiquitous, autonomous, and reliant on complex adaptive components, hardware, and data, motivated an NSF-sponsored community workshop on the subject of Software Engineering for Robotics, held in Detroit, Michigan in October 2023. The goal of the workshop was to bring together thought leaders across robotics and software engineering to coalesce a community, and identify key problems in the area of SE for robotics that that community should aim to solve over the next 5 years. This report serves to summarize the motivation, activities, and findings of that workshop, in particular by articulating the challenges unique to robot software, and identifying a vision for fruitful near-term research directions to tackle them.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Large and Versatile Plasmonic Enhancement of Photoluminescence Using Colloidal Metallic Nanocubes
Authors:
Khaywah Mohammad,
Potdevin Audrey,
Rvert François,
Mahiou Rachid,
Ouerdane Youcef,
Désert Anthony,
Parola Stéphane,
Chadeyron Geneviève,
Centeno Emmanuel,
Smaali Rafik,
Moreau Antoine
Abstract:
Improving phosphor photoluminescence efficiency is a key parameter to boost the performances of many optical devices. In this work, colloidal silver nanocubes, homogeneously spread on a luminescent surface, have proved to help both injecting and extracting light in and out of the photoluminescent layer and hence contributed significantly to the enhancement of the fluorescence. This approach has be…
▽ More
Improving phosphor photoluminescence efficiency is a key parameter to boost the performances of many optical devices. In this work, colloidal silver nanocubes, homogeneously spread on a luminescent surface, have proved to help both injecting and extracting light in and out of the photoluminescent layer and hence contributed significantly to the enhancement of the fluorescence. This approach has been applied to two materials: the well-known Y$_3$Al$_5$O$_{12}$:Ce yellow phosphor and an optical quartz. The emission efficiency, for sol-gel derived YAG:Ce layers, has increased of 80\% in the presence of an optimal nanoparticle density -- whereas for quartz, a weakly fluorescent material, the photoluminescence signal can be enhanced by a 200-fold factor. A physical analysis based on simulations shows that the disorder is an important factor and that the surface density of Ag nanoparticles is a crucial parameter.
△ Less
Submitted 26 November, 2022;
originally announced November 2022.
-
Back to the Future: Efficient, Time-Consistent Solutions in Reach-Avoid Games
Authors:
Dennis R. Anthony,
Duy P. Nguyen,
David Fridovich-Keil,
Jaime F. Fisac
Abstract:
We study the class of reach-avoid dynamic games in which multiple agents interact noncooperatively, and each wishes to satisfy a distinct target criterion while avoiding a failure criterion. Reach-avoid games are commonly used to express safety-critical optimal control problems found in mobile robot motion planning. Here, we focus on finding time-consistent solutions, in which future motion plans…
▽ More
We study the class of reach-avoid dynamic games in which multiple agents interact noncooperatively, and each wishes to satisfy a distinct target criterion while avoiding a failure criterion. Reach-avoid games are commonly used to express safety-critical optimal control problems found in mobile robot motion planning. Here, we focus on finding time-consistent solutions, in which future motion plans remain optimal even when a robot diverges from the plan early on due to, e.g., intrinsic dynamic uncertainty or extrinsic environment disturbances. Our main contribution is a computationally-efficient algorithm for multi-agent reach-avoid games which renders time-consistent solutions for all players. We demonstrate our approach in two- and three-player simulated driving scenarios, in which our method provides safe control strategies for all agents.
△ Less
Submitted 2 March, 2022; v1 submitted 15 September, 2021;
originally announced September 2021.
-
Demo: iJam with Channel Randomization
Authors:
Jordan L. Melcher,
Yao Zheng,
Dylan Anthony,
Matthew Troglia,
Yanjun Pan,
Ming Li,
Thomas Yang,
Alvin Yang,
Samson Aggelopoulos
Abstract:
Physical-layer key generation methods utilize the variations of the communication channel to achieve a secure key agreement between two parties with no prior security association. Their secrecy rate (bit generation rate) depends heavily on the randomness of the channel, which may reduce significantly in a stable environment. Existing methods seek to improve the secrecy rate by injecting artificial…
▽ More
Physical-layer key generation methods utilize the variations of the communication channel to achieve a secure key agreement between two parties with no prior security association. Their secrecy rate (bit generation rate) depends heavily on the randomness of the channel, which may reduce significantly in a stable environment. Existing methods seek to improve the secrecy rate by injecting artificial noise into the channel. Unfortunately, noise injection cannot alter the underlying channel state, which depends on the multipath environment between the transmitter and receiver. Consequently, these methods are known to leak key bits toward multi-antenna eavesdroppers, which is capable of filtering the noise through the differential of multiple signal receptions. This work demonstrates an improved approach to reinforce physical-layer key generation schemes, e.g., channel randomization. The channel randomization approach leverages a reconfigurable antenna to rapidly change the channel state during transmission, and an angle-of-departure (AoD) based channel estimation algorithm to cancel the changing effects for the intended receiver. The combined result is a communication channel stable in the eyes of the intended receiver but randomly changing from the viewpoint of the eavesdropper. We augmented an existing physical-layer key generation protocol, iJam, with the proposed approach and developed a full-fledged remote instrumentation platform to demonstrate its performance. Our evaluations show that augmentation does not affect the bit error rate (BER) of the intended receiver during key establishment but reduces the eavesdropper's BER to the level of random guessing, regardless of the number of antennas it equips.
△ Less
Submitted 7 July, 2020;
originally announced July 2020.
-
Grand Challenges for Embedded Security Research in a Connected World
Authors:
Wayne Burleson,
Kevin Fu,
Denise Anthony,
Jorge Guajardo,
Carl Gunter,
Kyle Ingols,
Jean-Baptiste Jeannin,
Farinaz Koushanafar,
Carl Landwehr,
Susan Squires
Abstract:
Protecting embedded security is becoming an increasingly challenging research problem for embedded systems due to a number of emerging trends in hardware, software, networks, and applications. Without fundamental advances in, and an understanding of embedded security it will be difficult for future engineers to provide assurance for the Internet of Things (IoT) and Operational Technology (OT) in w…
▽ More
Protecting embedded security is becoming an increasingly challenging research problem for embedded systems due to a number of emerging trends in hardware, software, networks, and applications. Without fundamental advances in, and an understanding of embedded security it will be difficult for future engineers to provide assurance for the Internet of Things (IoT) and Operational Technology (OT) in wide ranging applications, from home automation and autonomous transportation to medical devices and factory floors. Common to such applications are cyberphysical risks and consequences stemming from a lack of embedded security. The Computing Community Consortium (CCC) held a one-day visioning workshop to explore these issues. The workshop focused on five major application areas of embedded systems, namely (1) medical/wearable devices, (2) autonomous systems (drones, vehicles, robots), (3) smart homes, (4) industry and supply chain, and (5) critical infrastructure. This report synthesizes the results of that workshop and develops a list of strategic goals for research and education over the next 5-10 years.
Embedded security in connected devices presents challenges that require a broad look at the overall systems design, including human and societal dimensions as well as technical. Particular issues related to embedded security are a subset of the overall security of the application areas, which must also balance other design criteria such as cost, power, reliability, usability and function. Recent trends are converging to make the security of embedded systems an increasingly important and difficult objective, requiring new trans-disciplinary approaches to solve problems on a 5-10 year horizon.
△ Less
Submitted 13 May, 2020;
originally announced May 2020.
-
Massive migration from the steppe is a source for Indo-European languages in Europe
Authors:
Wolfgang Haak,
Iosif Lazaridis,
Nick Patterson,
Nadin Rohland,
Swapan Mallick,
Bastien Llamas,
Guido Brandt,
Susanne Nordenfelt,
Eadaoin Harney,
Kristin Stewardson,
Qiaomei Fu,
Alissa Mittnik,
Eszter Bánffy,
Christos Economou,
Michael Francken,
Susanne Friederich,
Rafael Garrido Pena,
Fredrik Hallgren,
Valery Khartanovich,
Aleksandr Khokhlov,
Michael Kunst,
Pavel Kuznetsov,
Harald Meller,
Oleg Mochalov,
Vayacheslav Moiseyev
, et al. (14 additional authors not shown)
Abstract:
We generated genome-wide data from 69 Europeans who lived between 8,000-3,000 years ago by enriching ancient DNA libraries for a target set of almost four hundred thousand polymorphisms. Enrichment of these positions decreases the sequencing required for genome-wide ancient DNA analysis by a median of around 250-fold, allowing us to study an order of magnitude more individuals than previous studie…
▽ More
We generated genome-wide data from 69 Europeans who lived between 8,000-3,000 years ago by enriching ancient DNA libraries for a target set of almost four hundred thousand polymorphisms. Enrichment of these positions decreases the sequencing required for genome-wide ancient DNA analysis by a median of around 250-fold, allowing us to study an order of magnitude more individuals than previous studies and to obtain new insights about the past. We show that the populations of western and far eastern Europe followed opposite trajectories between 8,000-5,000 years ago. At the beginning of the Neolithic period in Europe, ~8,000-7,000 years ago, closely related groups of early farmers appeared in Germany, Hungary, and Spain, different from indigenous hunter-gatherers, whereas Russia was inhabited by a distinctive population of hunter-gatherers with high affinity to a ~24,000 year old Siberian6 . By ~6,000-5,000 years ago, a resurgence of hunter-gatherer ancestry had occurred throughout much of Europe, but in Russia, the Yamnaya steppe herders of this time were descended not only from the preceding eastern European hunter-gatherers, but from a population of Near Eastern ancestry. Western and Eastern Europe came into contact ~4,500 years ago, as the Late Neolithic Corded Ware people from Germany traced ~3/4 of their ancestry to the Yamnaya, documenting a massive migration into the heartland of Europe from its eastern periphery. This steppe ancestry persisted in all sampled central Europeans until at least ~3,000 years ago, and is ubiquitous in present-day Europeans. These results provide support for the theory of a steppe origin of at least some of the Indo-European languages of Europe.
△ Less
Submitted 10 February, 2015;
originally announced February 2015.
-
Temporal Pointing Variations of The Solar Dynamics Observatory's HMI and AIA Instruments on Sub-Weekly Time Scales
Authors:
N. Brice Orange,
Hakeem M. Oluseyi,
David L. Chesny,
Maulik Patel,
Patrick Champey,
Katie Hesterly,
Dylan Anthony,
Robert Treen
Abstract:
Achieving sub-arcsecond co-registration across varying time-lines of multi-wavelength and instrument images is not trivial, and requires accurate characterization of instrument pointing jitter. In this work we have investigated internal pointing errors, on daily and yearly time-scales, occurring across the \textit{Solar Dynamics Observatory}'s (SDO) {\it Atmospheric Imaging Assembly} (AIA) and { \…
▽ More
Achieving sub-arcsecond co-registration across varying time-lines of multi-wavelength and instrument images is not trivial, and requires accurate characterization of instrument pointing jitter. In this work we have investigated internal pointing errors, on daily and yearly time-scales, occurring across the \textit{Solar Dynamics Observatory}'s (SDO) {\it Atmospheric Imaging Assembly} (AIA) and { \it Helioseismic Magnetic Imager} (HMI). Using cross-correlation techniques on AIA 1700\,Å passband and HMI line-of-sight (LOS) magnetograms, from three years of observational image pairs at approximately three day intervals, internal pointing errors are quantified. Pointing variations of $\pm$\,0.26$\arcsec$ (jitter limited) and $\pm$\,0.50$\arcsec$ in the solar East-West ($x$) and North-South ($y$) directions, respectively, are measured. AIA observations of the Venus June 2012 transit are used to measure existing coalignment offsets in all passbands. We find AIA passband pointing variations are $< ΔX_{CO} >$\,$=$\, 1.10$\arcsec$\,$\pm$\,1.41$\arcsec$ and $< ΔY_{CO} >$\,$=$\, 1.25$\arcsec$\,$\pm$\,1.24$\arcsec$, when aligned to HMI's nominal image center, referred to herein as the CutOut technique (CO). Minimal long-term pointing variations found between limb and correlation derived pointings provide evidence that image center positions provided by the instrument teams achieve single pixel accuracy on time-scales below their characterization. However, daily AIA passband pointing variations of $\lesssim$\,1.18$\arcsec$ indicate autonomous sub-arcsecond co-registration is not yet fully achievable.
△ Less
Submitted 20 January, 2015;
originally announced January 2015.
-
Evidence for Multiple Chiral Doublet Bands in $^{133}$Ce
Authors:
A. D. Ayangeakaa,
U. Garg,
M. D. Anthony,
S. Frauendorf,
J. T. Matta,
B. K. Nayak,
D. Patel,
Q. B. Chen,
S. Q. Zhang,
P. W. Zhao,
B. Qi,
J. Meng,
R. V. F. Janssens,
M. P. Carpenter,
C. J. Chiara,
F. G. Kondev,
T. Lauritsen,
D. Seweryniak,
S. Zhu,
S. S. Ghugre,
R. Palit
Abstract:
Two distinct sets of chiral-partner bands have been identified in the nucleus $^{133}$Ce. They constitute a multiple chiral doublet (M$χ$D), a phenomenon predicted by relativistic mean field (RMF) calculations and observed experimentally here for the first time. The properties of these chiral bands are in good agreement with results of calculations based on a combination of the constrained triaxia…
▽ More
Two distinct sets of chiral-partner bands have been identified in the nucleus $^{133}$Ce. They constitute a multiple chiral doublet (M$χ$D), a phenomenon predicted by relativistic mean field (RMF) calculations and observed experimentally here for the first time. The properties of these chiral bands are in good agreement with results of calculations based on a combination of the constrained triaxial RMF theory and the particle-rotor model.
△ Less
Submitted 28 April, 2013; v1 submitted 2 February, 2013;
originally announced February 2013.
-
S17(0) Determined from the Coulomb Breakup of 83 MeV/nucleon 8B
Authors:
B. Davids,
D. W. Anthony,
T. Aumann,
Sam M. Austin,
T. Baumann,
D. Bazin,
R. R. C. Clement,
C. N. Davids,
H. Esbensen,
P. A. Lofy,
T. Nakamura,
B. M. Sherrill,
J. Yurkon
Abstract:
A kinematically complete measurement was made of the Coulomb dissociation of 8B nuclei on a Pb target at 83 MeV/nucleon. The cross section was measured at low relative energies in order to infer the astrophysical S factor for the 7Be(p,gamma)8B reaction. A first-order perturbation theory analysis of the reaction dynamics including E1, E2, and M1 transitions was employed to extract the E1 strengt…
▽ More
A kinematically complete measurement was made of the Coulomb dissociation of 8B nuclei on a Pb target at 83 MeV/nucleon. The cross section was measured at low relative energies in order to infer the astrophysical S factor for the 7Be(p,gamma)8B reaction. A first-order perturbation theory analysis of the reaction dynamics including E1, E2, and M1 transitions was employed to extract the E1 strength relevant to neutrino-producing reactions in the solar interior. By fitting the measured cross section from Erel = 130 keV to 400 keV, we find S17(0) = 17.8 (+1.4, -1.2) eV b.
△ Less
Submitted 24 January, 2001;
originally announced January 2001.
-
Measurement of E2 Transitions in the Coulomb Dissociation of 8B
Authors:
B. Davids,
D. W. Anthony,
Sam M. Austin,
D. Bazin,
B. Blank,
J. A. Caggiano,
M. Chartier,
H. Esbensen,
P. Hui,
C. F. Powell,
H. Scheit,
B. M. Sherrill,
M. Steiner,
P. Thirolf
Abstract:
In an effort to understand the implications of Coulomb dissociation experiments for the determination of the 7Be(p,gamma)8B reaction rate, longitudinal momentum distributions of 7Be fragments produced in the Coulomb dissociation of 44 and 81 MeV/nucleon 8B beams on a Pb target were measured. These distributions are characterized by asymmetries interpreted as the result of interference between E1…
▽ More
In an effort to understand the implications of Coulomb dissociation experiments for the determination of the 7Be(p,gamma)8B reaction rate, longitudinal momentum distributions of 7Be fragments produced in the Coulomb dissociation of 44 and 81 MeV/nucleon 8B beams on a Pb target were measured. These distributions are characterized by asymmetries interpreted as the result of interference between E1 and E2 transition amplitudes in the Coulomb breakup. At the lower beam energy, both the asymmetries and the measured cross sections are well reproduced by perturbation theory calculations, allowing a determination of the E2 strength.
△ Less
Submitted 26 March, 1998;
originally announced March 1998.