Skip to main content

Showing 1–15 of 15 results for author: Habibi, H

.
  1. arXiv:2406.07678  [pdf, other

    cs.RO

    A Practical Roadmap to Learning from Demonstration for Robotic Manipulators in Manufacturing

    Authors: Alireza Barekatain, Hamed Habibi, Holger Voos

    Abstract: This paper provides a structured and practical roadmap for practitioners to integrate Learning from Demonstration (LfD ) into manufacturing tasks, with a specific focus on industrial manipulators. Motivated by the paradigm shift from mass production to mass customization, it is crucial to have an easy-to-follow roadmap for practitioners with moderate expertise, to transform existing robotic proces… ▽ More

    Submitted 11 June, 2024; originally announced June 2024.

    Comments: 26 pages, 6 figures

  2. arXiv:2309.09802  [pdf, other

    cs.RO

    DFL-TORO: A One-Shot Demonstration Framework for Learning Time-Optimal Robotic Manufacturing Tasks

    Authors: Alireza Barekatain, Hamed Habibi, Holger Voos

    Abstract: This paper presents DFL-TORO, a novel Demonstration Framework for Learning Time-Optimal Robotic tasks via One-shot kinesthetic demonstration. It aims at optimizing the process of Learning from Demonstration (LfD), applied in the manufacturing sector. As the effectiveness of LfD is challenged by the quality and efficiency of human demonstrations, our approach offers a streamlined method to intuitiv… ▽ More

    Submitted 29 March, 2024; v1 submitted 18 September, 2023; originally announced September 2023.

    Comments: 7 pages, 7 figures

  3. arXiv:2305.08481  [pdf, other

    cs.IT cs.LG cs.MA

    Task-Oriented Communication Design at Scale

    Authors: Arsham Mostaani, Thang X. Vu, Hamed Habibi, Symeon Chatzinotas, Bjorn Ottersten

    Abstract: With countless promising applications in various domains such as IoT and industry 4.0, task-oriented communication design (TOCD) is getting accelerated attention from the research community. This paper presents a novel approach for designing scalable task-oriented quantization and communications in cooperative multi-agent systems (MAS). The proposed approach utilizes the TOCD framework and the val… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

  4. arXiv:2303.11770   

    eess.SY math.DS

    Adaptive Super-Twisting Controller Design for Accurate Trajectory Tracking Performance of Unmanned Aerial Vehicles

    Authors: D. M. K. K. Venkateswara Rao, Hamed Habibi, Jose Luis Sanchez-Lopez, Prathyush P. Menon, Christopher Edwards, Holger Voos

    Abstract: In this paper, an adaptive super-twisting controller is designed for an agile maneuvering quadrotor unmanned aerial vehicle to achieve accurate trajectory tracking in the presence of external disturbances. A cascaded control architecture is designed to determine the desired accelerations using the proposed controller and subsequently used to compute the desired orientation and angular rates. The f… ▽ More

    Submitted 14 September, 2023; v1 submitted 21 March, 2023; originally announced March 2023.

    Comments: We are working on a new version of this paper and revising some technical parts. We will replace the new version as soon as it is carefully revised

  5. arXiv:2303.02053  [pdf, ps, other

    eess.SY

    On SORA for High-Risk UAV Operations under New EU Regulations: Perspectives for Automated Approach

    Authors: Hamed Habibi, D. M. K. K. Venkateswara Rao, Jose Luis Sanchez-Lopez, Holger Voos

    Abstract: In this paper, we investigate requirements to prepare an application for Specific Operations Risk Assessment (SORA), regulated by European Union Aviation Safety Agency (EASA) to obtain flight authorization for Unmanned Aerial Vehicles (UAVs) operations and propose some perspectives to automate the approach based on our successful application. Preparation of SORA requires expert knowledge as it con… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  6. arXiv:2303.02043  [pdf, other

    cs.RO eess.SY

    An Integrated Real-time UAV Trajectory Optimization with Potential Field Approach for Dynamic Collision Avoidance

    Authors: D. M. K. K. Venkateswara Rao, Hamed Habibi, Jose Luis Sanchez-Lopez, Holger Voos

    Abstract: This paper presents an integrated approach that combines trajectory optimization and Artificial Potential Field (APF) method for real-time optimal Unmanned Aerial Vehicle (UAV) trajectory planning and dynamic collision avoidance. A minimum-time trajectory optimization problem is formulated with initial and final positions as boundary conditions and collision avoidance as constraints. It is transcr… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  7. arXiv:2302.10669  [pdf

    cs.LG cs.AI cs.RO

    UAV Path Planning Employing MPC- Reinforcement Learning Method Considering Collision Avoidance

    Authors: Mahya Ramezani, Hamed Habibi, Jose luis Sanchez Lopez, Holger Voos

    Abstract: In this paper, we tackle the problem of Unmanned Aerial (UA V) path planning in complex and uncertain environments by designing a Model Predictive Control (MPC), based on a Long-Short-Term Memory (LSTM) network integrated into the Deep Deterministic Policy Gradient algorithm. In the proposed solution, LSTM-MPC operates as a deterministic policy within the DDPG network, and it leverages a predictin… ▽ More

    Submitted 7 March, 2023; v1 submitted 21 February, 2023; originally announced February 2023.

  8. arXiv:2201.02332  [pdf, ps, other

    math.CO

    On f-Derangements and Decomposing Bipartite Graphs into Paths

    Authors: Michael Plantholt, Hamidreza Habibi, Benjamin Mussell

    Abstract: Let $f: \{1, ..., n\} \rightarrow \{1, ..., n\}$ be a function (not necessarily one-to-one). An $f-derangement$ is a permutation $ g:\{1,...,n\} \rightarrow \{1,...,n\}$ such that $g(i) \neq f(i)$ for each $ i = 1, ..., n$. When $f$ is itself a permutation, this is a standard derangement. We examine properties of f-derangements, and show that when we fix the maximum number of preimages for any ite… ▽ More

    Submitted 7 January, 2022; originally announced January 2022.

  9. arXiv:2008.08271  [pdf, ps, other

    cond-mat.mes-hall cond-mat.mtrl-sci

    Ultra-Thin SiGe in the Source Modifies Performance of Thin-Film Tunneling FET

    Authors: Hamed Habibi, Shoeib Babaee Touski

    Abstract: In this work, the source structure of an n-type thin-film tunneling FET is engineered to get better performance. An ultra-thin SiGe along with Si is used in the source of silicon-based TFET. Two structures are compared with conventional TFET, one, SiGe is located on the top of Si in the source and another one in reverse. Simulations approve these structures can reduce sub-threshold swing, OFF-curr… ▽ More

    Submitted 24 August, 2020; v1 submitted 19 August, 2020; originally announced August 2020.

  10. arXiv:1908.06877  [pdf, other

    cs.HC cs.CY

    Decentralising power: how we are trying to keep CALLector ethical

    Authors: Cathy Chua, Hanieh Habibi, Manny Rayner, Nikos Tsourakis

    Abstract: We present a brief overview of the CALLector project, and consider ethical questions arising from its overall goal of creating a social network to support creation and use of online CALL resources. We argue that these questions are best addressed in a decentralised, pluralistic open source architecture.

    Submitted 30 July, 2019; originally announced August 2019.

    Comments: 6 pages; based on talk presented at enetCollect WG3 & WG5 Meeting, Leiden, Holland, 2018

    Journal ref: CEUR Workshop proceedings vol 2390 http://ceur-ws.org/Vol-2390/ 2019

  11. arXiv:1907.13214  [pdf, other

    cs.HC

    Alexa as a CALL platform for children: Where do we start?

    Authors: Nikos Tsourakis, Manny Rayner, Hanieh Habibi, Pierre-Emmanuel Gallais, Cathy Chua, Matt Butterweck

    Abstract: Amazon's Alexa is now widely available and shows interesting potential as a platform for hosting CALL games aimed at children. In this paper, we describe an initial informal experiment where we created some simple CALL games and made them available to a few child testers. We report the children's and parents' reactions. Our overall conclusion is that, although Alexa has many positive features, the… ▽ More

    Submitted 30 July, 2019; originally announced July 2019.

    Comments: 4 pages. Based on talk given at enetCollect WG3 & WG5 Meeting, Leiden, Holland, 2018

    Journal ref: CEUR Workshop Proceedings Vol-2390 2019

  12. arXiv:1903.07272  [pdf

    cs.LG cs.HC stat.ML

    Emotion Recognition with Machine Learning Using EEG Signals

    Authors: Omid Bazgir, Zeynab Mohammadi, Seyed Amir Hassan Habibi

    Abstract: In this research, an emotion recognition system is developed based on valence/arousal model using electroencephalography (EEG) signals. EEG signals are decomposed into the gamma, beta, alpha and theta frequency bands using discrete wavelet transform (DWT), and spectral features are extracted from each frequency band. Principle component analysis (PCA) is applied to the extracted features by preser… ▽ More

    Submitted 1 June, 2019; v1 submitted 18 March, 2019; originally announced March 2019.

    Journal ref: 2018 25th National and 3rd International Iranian Conference on Biomedical Engineering (ICBME)(pp. 1-5). IEEE

  13. arXiv:1604.05097  [pdf, other

    quant-ph cond-mat.mes-hall

    Quantum Feedback Cooling of a Mechanical Oscillator Using Variational Measurements:Tweaking Heisenberg's Microscope

    Authors: Hojat Habibi, Emil Zeuthen, Majid Ghanaatshoar, Klemens Hammerer

    Abstract: We revisit the problem of preparing a mechanical oscillator in the vicinity of its quantum-mechanical ground state by means of feedback cooling based on continuous optical detection of the oscillator position. In the parameter regime relevant to ground state cooling, the optical back-action and imprecision noise set the bottleneck of achievable cooling and must be carefully balanced. This can be a… ▽ More

    Submitted 3 June, 2016; v1 submitted 18 April, 2016; originally announced April 2016.

    Comments: Article submitted to the special issue on Nano-optomechanics edited by I. Wilson-Rae and J. Sanckey in Journal of Optics

    Journal ref: J. Opt. 18 084004 (2016)

  14. Cryptanalysis of two mutual authentication protocols for low-cost RFID

    Authors: Mohammad Hassan Habibi, Mahmoud Gardeshi, Mahdi R. Alaghband

    Abstract: Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their secu… ▽ More

    Submitted 4 February, 2011; originally announced February 2011.

    Comments: 17 pages, 2 figures, 1 table, International Journal of Distributed and Parallel systems

    MSC Class: 68-02

    Journal ref: International Journal of Distributed and Parallel systems, Volume 2, Number 1, pp. 103-114. 2011

  15. Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard

    Authors: Mohammad Hassan Habibi, Mahmud Gardeshi, Mahdi R. Alaghband

    Abstract: Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we will show that the proposed protocol does not have proper security features. A powerful and practical attack is presented on this protocol whereby the whole securi… ▽ More

    Submitted 4 February, 2011; v1 submitted 3 February, 2011; originally announced February 2011.

    Comments: 13 page, International Journal of Ubicomp

    MSC Class: 68-02

    Journal ref: International Journal of Ubicomp, Volume 2, Number 1,pp. 1-13, 2011