Skip to main content

Showing 1–8 of 8 results for author: Fakoorian, S

.
  1. arXiv:2208.01329  [pdf, other

    cs.RO cs.CV

    Self-Supervised Traversability Prediction by Learning to Reconstruct Safe Terrain

    Authors: Robin Schmid, Deegan Atha, Frederik Schöller, Sharmita Dey, Seyed Fakoorian, Kyohei Otsu, Barry Ridge, Marko Bjelonic, Lorenz Wellhausen, Marco Hutter, Ali-akbar Agha-mohammadi

    Abstract: Navigating off-road with a fast autonomous vehicle depends on a robust perception system that differentiates traversable from non-traversable terrain. Typically, this depends on a semantic understanding which is based on supervised learning from images annotated by a human expert. This requires a significant investment in human time, assumes correct expert classification, and small details can lea… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

  2. arXiv:2103.15354  [pdf, other

    cs.RO

    Towards Robust State Estimation by Boosting the Maximum Correntropy Criterion Kalman Filter with Adaptive Behaviors

    Authors: Seyed Fakoorian, Angel Santamaria-Navarro, Brett T. Lopez, Dan Simon, Ali-akbar Agha-mohammadi

    Abstract: This work proposes a resilient and adaptive state estimation framework for robots operating in perceptually-degraded environments. The approach, called Adaptive Maximum Correntropy Criterion Kalman Filtering (AMCCKF), is inherently robust to corrupted measurements, such as those containing jumps or general non-Gaussian noise, and is able to modify filter parameters online to improve performance. T… ▽ More

    Submitted 29 March, 2021; originally announced March 2021.

  3. arXiv:2103.11470  [pdf, other

    cs.RO cs.AI

    NeBula: Quest for Robotic Autonomy in Challenging Environments; TEAM CoSTAR at the DARPA Subterranean Challenge

    Authors: Ali Agha, Kyohei Otsu, Benjamin Morrell, David D. Fan, Rohan Thakker, Angel Santamaria-Navarro, Sung-Kyun Kim, Amanda Bouman, Xianmei Lei, Jeffrey Edlund, Muhammad Fadhil Ginting, Kamak Ebadi, Matthew Anderson, Torkom Pailevanian, Edward Terry, Michael Wolf, Andrea Tagliabue, Tiago Stegun Vaquero, Matteo Palieri, Scott Tepsuporn, Yun Chang, Arash Kalantari, Fernando Chavez, Brett Lopez, Nobuhiro Funabiki , et al. (47 additional authors not shown)

    Abstract: This paper presents and discusses algorithms, hardware, and software architecture developed by the TEAM CoSTAR (Collaborative SubTerranean Autonomous Robots), competing in the DARPA Subterranean Challenge. Specifically, it presents the techniques utilized within the Tunnel (2019) and Urban (2020) competitions, where CoSTAR achieved 2nd and 1st place, respectively. We also discuss CoSTAR's demonstr… ▽ More

    Submitted 18 October, 2021; v1 submitted 21 March, 2021; originally announced March 2021.

    Comments: For team website, see https://costar.jpl.nasa.gov/. Accepted for publication in the Journal of Field Robotics, 2021

  4. arXiv:2005.13101  [pdf, other

    eess.SY

    State Estimation-Based Robust Optimal Control of Influenza Epidemics in an Interactive Human Society

    Authors: Vahid Azimi, Mojtaba Sharifi, Seyed Fakoorian, Thang Tien Nguyen, Van Van Huynh

    Abstract: This paper presents a state estimation-based robust optimal control strategy for influenza epidemics in an interactive human society in the presence of modeling uncertainties. Interactive society is influenced by the random entrance of individuals from other human societies whose effects can be modeled as a non-Gaussian noise. Since only the number of exposed and infected humans can be measured, s… ▽ More

    Submitted 11 November, 2020; v1 submitted 26 May, 2020; originally announced May 2020.

  5. Full Rank Solutions for the MIMO Gaussian Wiretap Channel with an Average Power Constraint

    Authors: S. Ali A. Fakoorian, A. Lee Swindlehurst

    Abstract: This paper considers a multiple-input multiple-output (MIMO) Gaussian wiretap channel model, where there exists a transmitter, a legitimate receiver and an eavesdropper, each equipped with multiple antennas. In this paper, we first revisit the rank property of the optimal input covariance matrix that achieves the secrecy capacity of the multiple antenna MIMO Gaussian wiretap channel under the aver… ▽ More

    Submitted 17 October, 2012; originally announced October 2012.

  6. Solutions for the MIMO Gaussian Wiretap Channel with a Cooperative Jammer

    Authors: S. Ali. A. Fakoorian, A. Lee Swindlehurst

    Abstract: We study the Gaussian MIMO wiretap channel with a transmitter, a legitimate receiver, an eavesdropper and an external helper, each equipped with multiple antennas. The transmitter sends confidential messages to its intended receiver, while the helper transmits jamming signals independent of the source message to confuse the eavesdropper. The jamming signal is assumed to be treated as noise at both… ▽ More

    Submitted 23 January, 2011; originally announced January 2011.

  7. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey

    Authors: Amitav Mukherjee, S. A. A. Fakoorian, **g Huang, A. Lee Swindlehurst

    Abstract: This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical-layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secr… ▽ More

    Submitted 20 January, 2014; v1 submitted 16 November, 2010; originally announced November 2010.

    Comments: 23 pages, 10 figures, 303 refs. arXiv admin note: text overlap with arXiv:1303.1609 by other authors. IEEE Communications Surveys and Tutorials, 2014

  8. arXiv:1006.1890  [pdf, ps, other

    cs.IT

    Optimal Power Allocation for GSVD-Based Beamforming in the MIMO Wiretap Channel

    Authors: S. Ali. A. Fakoorian, A. Lee Swindlehurst

    Abstract: This paper considers a multiple-input multiple-output (MIMO) Gaussian wiretap channel model, where there exists a transmitter, a legitimate receiver and an eavesdropper, each equipped with multiple antennas. Perfect secrecy is achieved when the transmitter and the legitimate receiver can communicate at some positive rate, while ensuring that the eavesdropper gets zero bits of information. In this… ▽ More

    Submitted 9 June, 2010; originally announced June 2010.