-
Parallel-Jaw Gripper and Grasp Co-Optimization for Sets of Planar Objects
Authors:
Rebecca H. Jiang,
Neel Doshi,
Ravi Gondhalekar,
Alberto Rodriguez
Abstract:
We propose a framework for optimizing a planar parallel-jaw gripper for use with multiple objects. While optimizing general-purpose grippers and contact locations for grasps are both well studied, co-optimizing grasps and the gripper geometry to execute them receives less attention. As such, our framework synthesizes grippers optimized to stably grasp sets of polygonal objects. Given a fixed numbe…
▽ More
We propose a framework for optimizing a planar parallel-jaw gripper for use with multiple objects. While optimizing general-purpose grippers and contact locations for grasps are both well studied, co-optimizing grasps and the gripper geometry to execute them receives less attention. As such, our framework synthesizes grippers optimized to stably grasp sets of polygonal objects. Given a fixed number of contacts and their assignments to object faces and gripper jaws, our framework optimizes contact locations along these faces, gripper pose for each grasp, and gripper shape. Our key insights are to pose shape and contact constraints in frames fixed to the gripper jaws, and to leverage the linearity of constraints in our grasp stability and gripper shape models via an augmented Lagrangian formulation. Together, these enable a tractable nonlinear program implementation. We apply our method to several examples. The first illustrative problem shows the discovery of a geometrically simple solution where possible. In another, space is constrained, forcing multiple objects to be contacted by the same features as each other. Finally a toolset-gras** example shows that our framework applies to complex, real-world objects. We provide a physical experiment of the toolset grasps.
△ Less
Submitted 27 October, 2023;
originally announced October 2023.
-
Object manipulation through contact configuration regulation: multiple and intermittent contacts
Authors:
Orion Taylor,
Neel Doshi,
Alberto Rodriguez
Abstract:
In this work, we build on our method for manipulating unknown objects via contact configuration regulation: the estimation and control of the location, geometry, and mode of all contacts between the robot, object, and environment. We further develop our estimator and controller to enable manipulation through more complex contact interactions, including intermittent contact between the robot/object…
▽ More
In this work, we build on our method for manipulating unknown objects via contact configuration regulation: the estimation and control of the location, geometry, and mode of all contacts between the robot, object, and environment. We further develop our estimator and controller to enable manipulation through more complex contact interactions, including intermittent contact between the robot/object, and multiple contacts between the object/environment. In addition, we support a larger set of contact geometries at each interface. This is accomplished through a factor graph based estimation framework that reasons about the complementary kinematic and wrench constraints of contact to predict the current contact configuration. We are aided by the incorporation of a limited amount of visual feedback; which when combined with the available F/T sensing and robot proprioception, allows us to differentiate contact modes that were previously indistinguishable. We implement this revamped framework on our manipulation platform, and demonstrate that it allows the robot to perform a wider set of manipulation tasks. This includes, using a wall as a support to re-orient an object, or regulating the contact geometry between the object and the ground. Finally, we conduct ablation studies to understand the contributions from visual and tactile feedback in our manipulation framework. Our code can be found at: https://github.com/mcubelab/pbal.
△ Less
Submitted 1 October, 2023;
originally announced October 2023.
-
LDA-2IoT : A Level Dependent Authentication using Two Factor for IoT Paradigm
Authors:
Chintan Patel,
Nishant Doshi
Abstract:
The widespread expansion of the IoT based services are changing peoples living habits. With the vast data generation and intelligent decision support system, an IoT is supporting many industries to improve their products and services. The major challenge for IoT developers is to design a secure data transmission system and a trustworthy inter device and user device communication system. The data s…
▽ More
The widespread expansion of the IoT based services are changing peoples living habits. With the vast data generation and intelligent decision support system, an IoT is supporting many industries to improve their products and services. The major challenge for IoT developers is to design a secure data transmission system and a trustworthy inter device and user device communication system. The data starts its journey from the sensing devices and reaches the user dashboard through a different medium. Authentication between two IoT devices provides a reliable and lightweight key generation system. In this paper, we put forward a novel authentication approach for the IoT paradigm. We postulate an ECC based two factor Level Dependent Authentication for Generic IoT (LDA 2IoT) in which users at a particular level in the hierarchy can access the sensors deployed at below or the equal level of the hierarchy. We impart the security analysis for the proposed LDA 2IoT based on the Dolev Yao channel and widely accepted random oracle based ROR model. We provide the implementation of the proposed scheme using the MQTT protocol. Finally, we set forth a performance analysis for the proposed LDA 2IoT system by comparing it with the other existing scheme.
△ Less
Submitted 6 July, 2022;
originally announced July 2022.
-
Manipulation of unknown objects via contact configuration regulation
Authors:
Neel Doshi,
Orion Taylor,
Alberto Rodriguez
Abstract:
We present an approach to robotic manipulation of unknown objects through regulation of the object's contact configuration: the location, geometry, and mode of all contacts between the object, robot, and environment. A contact configuration constrains the forces and motions that can be applied to the object; however, synthesizing these constraints generally requires knowledge of the object's pose…
▽ More
We present an approach to robotic manipulation of unknown objects through regulation of the object's contact configuration: the location, geometry, and mode of all contacts between the object, robot, and environment. A contact configuration constrains the forces and motions that can be applied to the object; however, synthesizing these constraints generally requires knowledge of the object's pose and geometry. We develop an object-agnostic approach for estimation and control that circumvents this need. Our framework directly estimates a set of wrench and motion constraints which it uses to regulate the contact configuration. We use this to reactively manipulate unknown planar objects in the gravity plane. A video describing our work can be found on our project page: http://mcube.mit.edu/research/contactConfig.html.
△ Less
Submitted 1 June, 2022; v1 submitted 2 March, 2022;
originally announced March 2022.
-
Strategizing University Rank Improvement using Interpretable Machine Learning and Data Visualization
Authors:
Nishi Doshi,
Samhitha Gundam,
Bhaskar Chaudhury
Abstract:
Annual ranking of higher educational institutions (HEIs) is a global phenomenon and have significant impact on higher education landscape. Most of the HEIs pay close attention to ranking results and look forward to improving their ranks. However, maintaining a good rank and ascending in the rankings is a difficult task because it requires considerable resources, efforts and performance improvement…
▽ More
Annual ranking of higher educational institutions (HEIs) is a global phenomenon and have significant impact on higher education landscape. Most of the HEIs pay close attention to ranking results and look forward to improving their ranks. However, maintaining a good rank and ascending in the rankings is a difficult task because it requires considerable resources, efforts and performance improvement plan. In this work, firstly, we show how exploratory data analysis (EDA) using correlation heatmaps and box plots can aid in understanding the broad trends in the ranking data. Subsequently, we present a novel idea of classifying the rankings data using Decision Tree (DT) based algorithms and retrieve decision paths for rank improvement using data visualization techniques. Using Laplace correction to the probability estimate, we quantify the amount of certainty attached with different decision paths obtained from interpretable DT models. The proposed methodology can aid Universities and HEIs to quantitatively assess the scope of improvement, adumbrate a fine-grained long-term action plan and prepare a suitable road-map.
△ Less
Submitted 14 December, 2021; v1 submitted 18 October, 2021;
originally announced October 2021.
-
Proposed DBMS for OTT platforms in line with new age requirements
Authors:
Khushi Shah,
Aryan Shah,
Charmi Shah,
Devansh Shah,
Mustafa Africawala,
Rushabh Shah,
Nishant Doshi
Abstract:
Database management has become an enormous tool for on-demand content distribution services, proffering required information and providing custom services to the user. Also plays a major role for the platforms to manage their data in such a way that data redundancy is minimized. This paper emphasizes improving the user experience for the platform by efficiently managing data. Kee** in mind all t…
▽ More
Database management has become an enormous tool for on-demand content distribution services, proffering required information and providing custom services to the user. Also plays a major role for the platforms to manage their data in such a way that data redundancy is minimized. This paper emphasizes improving the user experience for the platform by efficiently managing data. Kee** in mind all the new age requirements, especially after COVID-19 the sudden surge in subscription has led the stakeholders to try new things to lead the OTT market. Collection of shows being the root of the tree here, this paper improvises the currently existing branches via various tables and suggests some new features on how the data collected can be utilized for introducing new and much-required query results for the consumer.
△ Less
Submitted 2 June, 2021;
originally announced June 2021.
-
Residual Model Learning for Microrobot Control
Authors:
Joshua Gruenstein,
Tao Chen,
Neel Doshi,
Pulkit Agrawal
Abstract:
A majority of microrobots are constructed using compliant materials that are difficult to model analytically, limiting the utility of traditional model-based controllers. Challenges in data collection on microrobots and large errors between simulated models and real robots make current model-based learning and sim-to-real transfer methods difficult to apply. We propose a novel framework residual m…
▽ More
A majority of microrobots are constructed using compliant materials that are difficult to model analytically, limiting the utility of traditional model-based controllers. Challenges in data collection on microrobots and large errors between simulated models and real robots make current model-based learning and sim-to-real transfer methods difficult to apply. We propose a novel framework residual model learning (RML) that leverages approximate models to substantially reduce the sample complexity associated with learning an accurate robot model. We show that using RML, we can learn a model of the Harvard Ambulatory MicroRobot (HAMR) using just 12 seconds of passively collected interaction data. The learned model is accurate enough to be leveraged as "proxy-simulator" for learning walking and turning behaviors using model-free reinforcement learning algorithms. RML provides a general framework for learning from extremely small amounts of interaction data, and our experiments with HAMR clearly demonstrate that RML substantially outperforms existing techniques.
△ Less
Submitted 7 September, 2021; v1 submitted 1 April, 2021;
originally announced April 2021.
-
Image Aesthetics Assessment using Multi Channel Convolutional Neural Networks
Authors:
Nishi Doshi,
Gitam Shikhenawis,
Suman K Mitra
Abstract:
Image Aesthetics Assessment is one of the emerging domains in research. The domain deals with classification of images into categories depending on the basis of how pleasant they are for the users to watch. In this article, the focus is on categorizing the images in high quality and low quality image. Deep convolutional neural networks are used to classify the images. Instead of using just the raw…
▽ More
Image Aesthetics Assessment is one of the emerging domains in research. The domain deals with classification of images into categories depending on the basis of how pleasant they are for the users to watch. In this article, the focus is on categorizing the images in high quality and low quality image. Deep convolutional neural networks are used to classify the images. Instead of using just the raw image as input, different crops and saliency maps of the images are also used, as input to the proposed multi channel CNN architecture. The experiments reported on widely used AVA database show improvement in the aesthetic assessment performance over existing approaches.
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
Hybrid Differential Dynamic Programming for Planar Manipulation Primitives
Authors:
Neel Doshi,
Francois R. Hogan,
Alberto Rodriguez
Abstract:
We present a hybrid differential dynamic programming (DDP) algorithm for closed-loop execution of manipulation primitives with frictional contact switches. Planning and control of these primitives is challenging as they are hybrid, under-actuated, and stochastic. We address this by develo** hybrid DDP both to plan finite horizon trajectories with a few contact switches and to create linear stabi…
▽ More
We present a hybrid differential dynamic programming (DDP) algorithm for closed-loop execution of manipulation primitives with frictional contact switches. Planning and control of these primitives is challenging as they are hybrid, under-actuated, and stochastic. We address this by develo** hybrid DDP both to plan finite horizon trajectories with a few contact switches and to create linear stabilizing controllers. We evaluate the performance and computational cost of our framework in ablations studies for two primitives: planar pushing and planar pivoting. We find that generating pose-to-pose closed-loop trajectories from most configurations requires only a couple (one to two) hybrid switches and can be done in reasonable time (one to five seconds). We further demonstrate that our controller stabilizes these hybrid trajectories on a real pushing system. A video describing our work can be found at https://youtu.be/YGSe4cUfq6Q.
△ Less
Submitted 20 April, 2020; v1 submitted 31 October, 2019;
originally announced November 2019.
-
Contact-Implicit Optimization of Locomotion Trajectories for a Quadrupedal Microrobot
Authors:
Neel Doshi,
Kaushik Jayaram,
Benjamin Goldberg,
Zachary Manchester,
Robert J. Wood,
Scott Kuindersma
Abstract:
Planning locomotion trajectories for legged microrobots is challenging because of their complex morphology, high frequency passive dynamics, and discontinuous contact interactions with their environment. Consequently, such research is often driven by time-consuming experimental methods. As an alternative, we present a framework for systematically modeling, planning, and controlling legged microrob…
▽ More
Planning locomotion trajectories for legged microrobots is challenging because of their complex morphology, high frequency passive dynamics, and discontinuous contact interactions with their environment. Consequently, such research is often driven by time-consuming experimental methods. As an alternative, we present a framework for systematically modeling, planning, and controlling legged microrobots. We develop a three-dimensional dynamic model of a 1.5 gram quadrupedal microrobot with complexity (e.g., number of degrees of freedom) similar to larger-scale legged robots. We then adapt a recently developed variational contact-implicit trajectory optimization method to generate feasible whole-body locomotion plans for this microrobot, and we demonstrate that these plans can be tracked with simple joint-space controllers. We plan and execute periodic gaits at multiple stride frequencies and on various surfaces. These gaits achieve high per-cycle velocities, including a maximum of 10.87 mm/cycle, which is 15% faster than previously measured velocities for this microrobot. Furthermore, we plan and execute a vertical jump of 9.96 mm, which is 78% of the microrobot's center-of-mass height. To the best of our knowledge, this is the first end-to-end demonstration of planning and tracking whole-body dynamic locomotion on a millimeter-scale legged microrobot.
△ Less
Submitted 25 January, 2019;
originally announced January 2019.
-
Effective Locomotion at Multiple Stride Frequencies Using Proprioceptive Feedback on a Legged Microrobot
Authors:
Neel Doshi,
Kaushik Jayaram,
Samantha Castellanos,
Scott Kuindersma,
Robert J Wood
Abstract:
Limitations in actuation, sensing, and computation have forced small legged robots to rely on carefully tuned, mechanically mediated leg trajectories for effective locomotion. Recent advances in manufacturing, however, have enabled the development of small legged robots capable of operation at multiple stride frequencies using multi-degree-of-freedom leg trajectories. Proprioceptive sensing and co…
▽ More
Limitations in actuation, sensing, and computation have forced small legged robots to rely on carefully tuned, mechanically mediated leg trajectories for effective locomotion. Recent advances in manufacturing, however, have enabled the development of small legged robots capable of operation at multiple stride frequencies using multi-degree-of-freedom leg trajectories. Proprioceptive sensing and control is key to extending the capabilities of these robots to a broad range of operating conditions. In this work, we use concomitant sensing for piezoelectric actuation with a computationally efficient framework for estimation and control of leg trajectories on a quadrupedal microrobot. We demonstrate accurate position estimation (< 16% root-mean-square error) and control (16% root-mean-square tracking error) during locomotion across a wide range of stride frequencies (10-50 Hz). This capability enables the exploration of two bioinspired parametric leg trajectories designed to reduce leg slip and increase locomotion performance (e.g., speed, cost-of-transport, etc.). Using this approach, we demonstrate high performance locomotion at stride frequencies of (10-30 Hz) where the robot's natural dynamics result in poor open-loop locomotion. Furthermore, we validate the biological hypotheses that inspired the our trajectories and identify regions of highly dynamic locomotion, low cost-of-transport (3.33), and minimal leg slippage (< 10%).
△ Less
Submitted 3 June, 2019; v1 submitted 24 January, 2019;
originally announced January 2019.
-
Approximation for the Path Complexity of Binary Search Tree
Authors:
Nishant Doshi
Abstract:
The complexity of an algorithm is an important parameter to determine its effi-ciency. They are of different types viz. Time complexity, Space complexity, etc. However, none of them consider the execution path as a complexity measure. Ashok et al, firstly proposed the notion of the Path Complexity of a pro-gram/algorithm, which defined based on the number of execution paths as a function of the in…
▽ More
The complexity of an algorithm is an important parameter to determine its effi-ciency. They are of different types viz. Time complexity, Space complexity, etc. However, none of them consider the execution path as a complexity measure. Ashok et al, firstly proposed the notion of the Path Complexity of a pro-gram/algorithm, which defined based on the number of execution paths as a function of the input size. However, the notion of path complexity of the pro-gram, cannot apply to the object-oriented environment. Therefore, Anupam et al, has extended the notion of path complexity to the class as follows. The notion of the state of the class is defined based on structural representation (aka state) of the class. The class contains data members and data operations. It considers only those data operations that change the state of the class. The path complexity of the class is defined to be the number of valid input sequences, each of them con-taining valid data operations. Anupam et al, had applied this notion to the class Stack. However, the stack is basic and simple data structures. Therefore, in this research we have used a more complex class to understand the path complexity behavior in the object oriented environment. Binary Search Tree (BST) is one of the well known (and more complex too) data structure, which is useful in sorting, searching, Traffic Engineering and many more applications. We have analyzed the path complexity of the class BST based on the algorithms for insert and delete operations. Additionally, we have modified the delete operation to minimize the path complexity for the class BST.
△ Less
Submitted 18 April, 2014;
originally announced April 2014.
-
Quasielastic electron-deuteron scattering in the weak binding approximation
Authors:
J. J. Ethier,
N. Doshi,
S. Malace,
W. Melnitchouk
Abstract:
We perform a global analysis of all available electron-deuteron quasielastic scattering data using Q^2-dependent smearing functions that describe inclusive inelastic e-d scattering within the weak binding approximation. We study the dependence of the cross sections on the deuteron wave function and the off-shell extrapolation of the elastic electron-nucleon cross sections, which show particular se…
▽ More
We perform a global analysis of all available electron-deuteron quasielastic scattering data using Q^2-dependent smearing functions that describe inclusive inelastic e-d scattering within the weak binding approximation. We study the dependence of the cross sections on the deuteron wave function and the off-shell extrapolation of the elastic electron-nucleon cross sections, which show particular sensitivity at x >> 1. The excellent overall agreement with data over a large range of Q^2 and x suggests a limited need for effects beyond the impulse approximation, with the possible exception of the very high-x or very low-Q^2 regions, where short-distance effects or scattering from non-nucleonic constituents in the deuteron become more relevant.
△ Less
Submitted 17 February, 2014;
originally announced February 2014.
-
Floating nematic phase in colloidal platelet-sphere mixtures
Authors:
Daniel de las Heras,
Nisha Doshi,
Terence Cosgrove,
Jonathan Phipps,
David I. Gittins,
Jeroen S. van Duijneveldt,
Matthias Schmidt
Abstract:
The phase behaviour of colloidal dispersions is interesting for fundamental reasons and for technological applications such as photonic crystals and electronic paper. Sedimentation, which in everyday life is relevant from blood analysis to the shelf life of paint, is a means to determine phase boundaries by observing distinct layers in samples that are in sedimentation-diffusion equilibrium. Howev…
▽ More
The phase behaviour of colloidal dispersions is interesting for fundamental reasons and for technological applications such as photonic crystals and electronic paper. Sedimentation, which in everyday life is relevant from blood analysis to the shelf life of paint, is a means to determine phase boundaries by observing distinct layers in samples that are in sedimentation-diffusion equilibrium. However, disentangling the effects due to interparticle interactions, which generate the bulk phase diagram, from those due to gravity is a complex task. Here we show that a line in the space of chemical potentials $μ_i$, where $i$ labels the species, represents a sedimented sample and that each crossing of this sedimentation path with a binodal generates an interface under gravity. Complex phase stacks can result, such as the sandwich of a floating nematic layer between top and bottom isotropic phases that we observed in a mixture of silica spheres and gibbsite platelets.
△ Less
Submitted 13 November, 2012;
originally announced November 2012.
-
Constant Ciphertext Length in CP-ABE
Authors:
Nishant Doshi,
Devesh **wala
Abstract:
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the attributes in secret key. The existing methods that use reasonably computable decryption policies produce the ciphertext of size at least linearly varying with the number of attributes with addition…
▽ More
Ciphertext policy attribute based encryption (CP-ABE) is a technique in which user with secret key containing attributes, only able to decrypt the message if the attributes in the policy match with the attributes in secret key. The existing methods that use reasonably computable decryption policies produce the ciphertext of size at least linearly varying with the number of attributes with additional pairing operations during encryption and decryption. In this paper, we propose a scheme in which ciphertext remains constant in length, irrespective of the number of attributes. Our scheme works for a threshold case: the number of attributes in a policy must be a subset of attributes in a secret key. The security of propose scheme is based on Decisional Bilinear Diffie-Hellman (DBDH) problem.
△ Less
Submitted 25 September, 2012; v1 submitted 29 August, 2012;
originally announced August 2012.
-
Updating attribute in CP-ABE: A New Approach
Authors:
Nishant Doshi,
Devesh **wala
Abstract:
In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user's secret key and access policy is at-tached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the genuine user can decrypt the ciphertext. However, such scenario also necessitates periodic updating of the secret key with the changing attributes. According to our obs…
▽ More
In Ciphertext-Policy Attribute Based Encryption (CP-ABE), attributes are attached to the user's secret key and access policy is at-tached to the ciphertext. If attributes in the secret key of a user satisfy the policy then only the genuine user can decrypt the ciphertext. However, such scenario also necessitates periodic updating of the secret key with the changing attributes. According to our observations, the existing attempts at doing so are not efficient. In this paper, we propose a newer approach to add, update or delete the value of particular attribute effi-ciently without the knowledge of the other attributes.
△ Less
Submitted 25 September, 2012; v1 submitted 29 August, 2012;
originally announced August 2012.
-
A novel approach for e-payment using virtual password system
Authors:
Vishal Vadgama,
Bhavin Tanti,
Chirag Modi,
Nishant Doshi
Abstract:
In today's world of E-Commerce everything comes online like Music, E-Books, Shop** all most everything is online. If you are using some service or buying things online then you have to pay for that. For that you have to do Net Banking or you have to use Credit card which will do online payment for you. In today's environment when everything is online, the service you are using for E-Payment must…
▽ More
In today's world of E-Commerce everything comes online like Music, E-Books, Shop** all most everything is online. If you are using some service or buying things online then you have to pay for that. For that you have to do Net Banking or you have to use Credit card which will do online payment for you. In today's environment when everything is online, the service you are using for E-Payment must be secure and you must protect your banking information like debit card or credit card information from possible threat of hacking. There were lots way to threat like Key logger, Forgery Detection, Phishing, Shoulder surfing. Therefore, we reveal our actual information of Bank and Credit Card then there will be a chance to lose data and same credit card and hackers can use banking information for malicious purpose. In this paper we discuss available E-Payment protocols, examine its advantages and delimitation's and shows that there are steel needs to design a more secure E-Payment protocol. The suggested protocol is based on using hash function and using dynamic or virtual password, which protects your banking or credit card information from possible threat of hacking when doing online transactions.
△ Less
Submitted 19 August, 2012;
originally announced August 2012.
-
A secure email login system using virtual password
Authors:
Bhavin Tanti,
Nishant Doshi
Abstract:
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual password system. In virtual password system they have used linear randomized function to be secure against identity theft attacks, phishing attacks, keylogging attack and shoulder surfing system. In ICC 2010 Li's given a sec…
▽ More
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual password system. In virtual password system they have used linear randomized function to be secure against identity theft attacks, phishing attacks, keylogging attack and shoulder surfing system. In ICC 2010 Li's given a security attack on the Lei's work. This paper gives modification on Lei's work to prevent the Li's attack with reducing the server overhead. This paper also discussed the problems with current password recovery system and gives the better approach.
△ Less
Submitted 21 March, 2011; v1 submitted 28 September, 2010;
originally announced September 2010.