-
ROAMER: Robust Offroad Autonomy using Multimodal State Estimation with Radar Velocity Integration
Authors:
Morten Nissov,
Shehryar Khattak,
Jeffrey A. Edlund,
Curtis Padgett,
Kostas Alexis,
Patrick Spieler
Abstract:
Reliable offroad autonomy requires low-latency, high-accuracy state estimates of pose as well as velocity, which remain viable throughout environments with sub-optimal operating conditions for the utilized perception modalities. As state estimation remains a single point of failure system in the majority of aspiring autonomous systems, failing to address the environmental degradation the perceptio…
▽ More
Reliable offroad autonomy requires low-latency, high-accuracy state estimates of pose as well as velocity, which remain viable throughout environments with sub-optimal operating conditions for the utilized perception modalities. As state estimation remains a single point of failure system in the majority of aspiring autonomous systems, failing to address the environmental degradation the perception sensors could potentially experience given the operating conditions, can be a mission-critical shortcoming. In this work, a method for integration of radar velocity information in a LiDAR-inertial odometry solution is proposed, enabling consistent estimation performance even with degraded LiDAR-inertial odometry. The proposed method utilizes the direct velocity-measuring capabilities of an Frequency Modulated Continuous Wave (FMCW) radar sensor to enhance the LiDAR-inertial smoother solution onboard the vehicle through integration of the forward velocity measurement into the graph-based smoother. This leads to increased robustness in the overall estimation solution, even in the absence of LiDAR data. This method was validated by hardware experiments conducted onboard an all-terrain vehicle traveling at high speed, ~12 m/s, in demanding offroad environments.
△ Less
Submitted 30 January, 2024;
originally announced January 2024.
-
ACHORD: Communication-Aware Multi-Robot Coordination with Intermittent Connectivity
Authors:
Maira Saboia,
Lillian Clark,
Vivek Thangavelu,
Jeffrey A. Edlund,
Kyohei Otsu,
Gustavo J. Correa,
Vivek Shankar Varadharajan,
Angel Santamaria-Navarro,
Thomas Touma,
Amanda Bouman,
Hovhannes Melikyan,
Torkom Pailevanian,
Sung-Kyun Kim,
Avak Archanian,
Tiago Stegun Vaquero,
Giovanni Beltrame,
Nils Napp,
Gustavo Pessin,
Ali-akbar Agha-mohammadi
Abstract:
Communication is an important capability for multi-robot exploration because (1) inter-robot communication (comms) improves coverage efficiency and (2) robot-to-base comms improves situational awareness. Exploring comms-restricted (e.g., subterranean) environments requires a multi-robot system to tolerate and anticipate intermittent connectivity, and to carefully consider comms requirements, other…
▽ More
Communication is an important capability for multi-robot exploration because (1) inter-robot communication (comms) improves coverage efficiency and (2) robot-to-base comms improves situational awareness. Exploring comms-restricted (e.g., subterranean) environments requires a multi-robot system to tolerate and anticipate intermittent connectivity, and to carefully consider comms requirements, otherwise mission-critical data may be lost. In this paper, we describe and analyze ACHORD (Autonomous & Collaborative High-Bandwidth Operations with Radio Droppables), a multi-layer networking solution which tightly co-designs the network architecture and high-level decision-making for improved comms. ACHORD provides bandwidth prioritization and timely and reliable data transfer despite intermittent connectivity. Furthermore, it exposes low-layer networking metrics to the application layer to enable robots to autonomously monitor, map, and extend the network via droppable radios, as well as restore connectivity to improve collaborative exploration. We evaluate our solution with respect to the comms performance in several challenging underground environments including the DARPA SubT Finals competition environment. Our findings support the use of data stratification and flow control to improve bandwidth-usage.
△ Less
Submitted 5 June, 2022;
originally announced June 2022.
-
PropEM-L: Radio Propagation Environment Modeling and Learning for Communication-Aware Multi-Robot Exploration
Authors:
Lillian Clark,
Jeffrey A. Edlund,
Marc Sanchez Net,
Tiago Stegun Vaquero,
Ali-akbar Agha-mohammadi
Abstract:
Multi-robot exploration of complex, unknown environments benefits from the collaboration and cooperation offered by inter-robot communication. Accurate radio signal strength prediction enables communication-aware exploration. Models which ignore the effect of the environment on signal propagation or rely on a priori maps suffer in unknown, communication-restricted (e.g. subterranean) environments.…
▽ More
Multi-robot exploration of complex, unknown environments benefits from the collaboration and cooperation offered by inter-robot communication. Accurate radio signal strength prediction enables communication-aware exploration. Models which ignore the effect of the environment on signal propagation or rely on a priori maps suffer in unknown, communication-restricted (e.g. subterranean) environments. In this work, we present Propagation Environment Modeling and Learning (PropEM-L), a framework which leverages real-time sensor-derived 3D geometric representations of an environment to extract information about line of sight between radios and attenuating walls/obstacles in order to accurately predict received signal strength (RSS). Our data-driven approach combines the strengths of well-known models of signal propagation phenomena (e.g. shadowing, reflection, diffraction) and machine learning, and can adapt online to new environments. We demonstrate the performance of PropEM-L on a six-robot team in a communication-restricted environment with subway-like, mine-like, and cave-like characteristics, constructed for the 2021 DARPA Subterranean Challenge. Our findings indicate that PropEM-L can improve signal strength prediction accuracy by up to 44% over a log-distance path loss model.
△ Less
Submitted 2 May, 2022;
originally announced May 2022.
-
Markov Brains: A Technical Introduction
Authors:
Arend Hintze,
Jeffrey A. Edlund,
Randal S. Olson,
David B. Knoester,
Jory Schossau,
Larissa Albantakis,
Ali Tehrani-Saleh,
Peter Kvam,
Leigh Sheneman,
Heather Goldsby,
Clifford Bohm,
Christoph Adami
Abstract:
Markov Brains are a class of evolvable artificial neural networks (ANN). They differ from conventional ANNs in many aspects, but the key difference is that instead of a layered architecture, with each node performing the same function, Markov Brains are networks built from individual computational components. These computational components interact with each other, receive inputs from sensors, and…
▽ More
Markov Brains are a class of evolvable artificial neural networks (ANN). They differ from conventional ANNs in many aspects, but the key difference is that instead of a layered architecture, with each node performing the same function, Markov Brains are networks built from individual computational components. These computational components interact with each other, receive inputs from sensors, and control motor outputs. The function of the computational components, their connections to each other, as well as connections to sensors and motors are all subject to evolutionary optimization. Here we describe in detail how a Markov Brain works, what techniques can be used to study them, and how they can be evolved.
△ Less
Submitted 16 September, 2017;
originally announced September 2017.
-
Design and implementation of the advanced cloud privacy threat modeling
Authors:
Ali Gholami,
Anna-Sara Lind,
Jane Reichel,
Jan-Eric Litton,
Ake Edlund,
Erwin Laure
Abstract:
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system . This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) methodo…
▽ More
Privacy-preservation for sensitive data has become a challenging issue in cloud computing. Threat modeling as a part of requirements engineering in secure software development provides a structured approach for identifying attacks and proposing countermeasures against the exploitation of vulnerabilities in a system . This paper describes an extension of Cloud Privacy Threat Modeling (CPTM) methodology for privacy threat modeling in relation to processing sensitive data in cloud computing environments. It describes the modeling methodology that involved applying Method Engineering to specify characteristics of a cloud privacy threat modeling methodology, different steps in the proposed methodology and corresponding products. In addition, a case study has been implemented as a proof of concept to demonstrate the usability of the proposed methodology. We believe that the extended methodology facilitates the application of a privacy-preserving cloud software development approach from requirements engineering to design.
△ Less
Submitted 3 April, 2016;
originally announced April 2016.
-
The White Dwarf -- White Dwarf galactic background in the LISA data
Authors:
Jeffrey A. Edlund,
Massimo Tinto,
Andrzej Krolak,
Gijs Nelemans
Abstract:
LISA (Laser Interferometer Space Antenna) is a proposed space mission, which will use coherent laser beams exchanged between three remote spacecraft to detect and study low-frequency cosmic gravitational radiation. In the low-part of its frequency band, the LISA strain sensitivity will be dominated by the incoherent superposition of hundreds of millions of gravitational wave signals radiated by…
▽ More
LISA (Laser Interferometer Space Antenna) is a proposed space mission, which will use coherent laser beams exchanged between three remote spacecraft to detect and study low-frequency cosmic gravitational radiation. In the low-part of its frequency band, the LISA strain sensitivity will be dominated by the incoherent superposition of hundreds of millions of gravitational wave signals radiated by inspiraling white-dwarf binaries present in our own galaxy. In order to estimate the magnitude of the LISA response to this background, we have simulated a synthesized population that recently appeared in the literature. We find the amplitude of the galactic white-dwarf binary background in the LISA data to be modulated in time, reaching a minimum equal to about twice that of the LISA noise for a period of about two months around the time when the Sun-LISA direction is roughly oriented towards the Autumn equinox. Since the galactic white-dwarfs background will be observed by LISA not as a stationary but rather as a cyclostationary random process with a period of one year, we summarize the theory of cyclostationary random processes, present the corresponding generalized spectral method needed to characterize such process, and make a comparison between our analytic results and those obtained by applying our method to the simulated data. We find that, by measuring the generalized spectral components of the white-dwarf background, LISA will be able to infer properties of the distribution of the white-dwarfs binary systems present in our Galaxy.
△ Less
Submitted 22 April, 2005;
originally announced April 2005.
-
Simulation of the White Dwarf -- White Dwarf galactic background in the LISA data
Authors:
Jeffrey A. Edlund,
Massimo Tinto,
Andrzej Królak,
Gijs Nelemans
Abstract:
LISA (Laser Interferometer Space Antenna) is a proposed space mission, which will use coherent laser beams exchanged between three remote spacecraft to detect and study low-frequency cosmic gravitational radiation. In the low-part of its frequency band, the LISA strain sensitivity will be dominated by the incoherent superposition of hundreds of millions of gravitational wave signals radiated by…
▽ More
LISA (Laser Interferometer Space Antenna) is a proposed space mission, which will use coherent laser beams exchanged between three remote spacecraft to detect and study low-frequency cosmic gravitational radiation. In the low-part of its frequency band, the LISA strain sensitivity will be dominated by the incoherent superposition of hundreds of millions of gravitational wave signals radiated by inspiraling white-dwarf binaries present in our own galaxy. In order to estimate the magnitude of the LISA response to this background, we have simulated a synthesized population that recently appeared in the literature. We find the amplitude of the galactic white-dwarf binary background in the LISA data to be modulated in time, reaching a minimum equal to about twice that of the LISA noise for a period of about two months around the time when the Sun-LISA direction is roughly oriented towards the Autumn equinox. Since the galactic white-dwarfs background will be observed by LISA not as a stationary but rather as a cyclostationary random process with a period of one year, we summarize the theory of cyclostationary random processes and present the corresponding generalized spectral method needed to characterize such process. We find that, by measuring the generalized spectral components of the white-dwarf background, LISA will be able to infer properties of the distribution of the white-dwarfs binary systems present in our Galaxy.
△ Less
Submitted 7 April, 2005;
originally announced April 2005.