-
A Practical Roadmap to Learning from Demonstration for Robotic Manipulators in Manufacturing
Authors:
Alireza Barekatain,
Hamed Habibi,
Holger Voos
Abstract:
This paper provides a structured and practical roadmap for practitioners to integrate Learning from Demonstration (LfD ) into manufacturing tasks, with a specific focus on industrial manipulators. Motivated by the paradigm shift from mass production to mass customization, it is crucial to have an easy-to-follow roadmap for practitioners with moderate expertise, to transform existing robotic proces…
▽ More
This paper provides a structured and practical roadmap for practitioners to integrate Learning from Demonstration (LfD ) into manufacturing tasks, with a specific focus on industrial manipulators. Motivated by the paradigm shift from mass production to mass customization, it is crucial to have an easy-to-follow roadmap for practitioners with moderate expertise, to transform existing robotic processes to customizable LfD-based solutions. To realize this transformation, we devise the key questions of "What to Demonstrate", "How to Demonstrate", "How to Learn", and "How to Refine". To follow through these questions, our comprehensive guide offers a questionnaire-style approach, highlighting key steps from problem definition to solution refinement. The paper equips both researchers and industry professionals with actionable insights to deploy LfD-based solutions effectively. By tailoring the refinement criteria to manufacturing settings, the paper addresses related challenges and strategies for enhancing LfD performance in manufacturing contexts.
△ Less
Submitted 11 June, 2024;
originally announced June 2024.
-
DFL-TORO: A One-Shot Demonstration Framework for Learning Time-Optimal Robotic Manufacturing Tasks
Authors:
Alireza Barekatain,
Hamed Habibi,
Holger Voos
Abstract:
This paper presents DFL-TORO, a novel Demonstration Framework for Learning Time-Optimal Robotic tasks via One-shot kinesthetic demonstration. It aims at optimizing the process of Learning from Demonstration (LfD), applied in the manufacturing sector. As the effectiveness of LfD is challenged by the quality and efficiency of human demonstrations, our approach offers a streamlined method to intuitiv…
▽ More
This paper presents DFL-TORO, a novel Demonstration Framework for Learning Time-Optimal Robotic tasks via One-shot kinesthetic demonstration. It aims at optimizing the process of Learning from Demonstration (LfD), applied in the manufacturing sector. As the effectiveness of LfD is challenged by the quality and efficiency of human demonstrations, our approach offers a streamlined method to intuitively capture task requirements from human teachers, by reducing the need for multiple demonstrations. Furthermore, we propose an optimization-based smoothing algorithm that ensures time-optimal and jerk-regulated demonstration trajectories, while also adhering to the robot's kinematic constraints. The result is a significant reduction in noise, thereby boosting the robot's operation efficiency. Evaluations using a Franka Emika Research 3 (FR3) robot for a variety of tasks further substantiate the efficacy of our framework, highlighting its potential to transform kinesthetic demonstrations in contemporary manufacturing environments.
△ Less
Submitted 29 March, 2024; v1 submitted 18 September, 2023;
originally announced September 2023.
-
Task-Oriented Communication Design at Scale
Authors:
Arsham Mostaani,
Thang X. Vu,
Hamed Habibi,
Symeon Chatzinotas,
Bjorn Ottersten
Abstract:
With countless promising applications in various domains such as IoT and industry 4.0, task-oriented communication design (TOCD) is getting accelerated attention from the research community. This paper presents a novel approach for designing scalable task-oriented quantization and communications in cooperative multi-agent systems (MAS). The proposed approach utilizes the TOCD framework and the val…
▽ More
With countless promising applications in various domains such as IoT and industry 4.0, task-oriented communication design (TOCD) is getting accelerated attention from the research community. This paper presents a novel approach for designing scalable task-oriented quantization and communications in cooperative multi-agent systems (MAS). The proposed approach utilizes the TOCD framework and the value of information (VoI) concept to enable efficient communication of quantized observations among agents while maximizing the average return performance of the MAS, a parameter that quantifies the MAS's task effectiveness. The computational complexity of learning the VoI, however, grows exponentially with the number of agents. Thus, we propose a three-step framework: i) learning the VoI (using reinforcement learning (RL)) for a two-agent system, ii) designing the quantization policy for an $N$-agent MAS using the learned VoI for a range of bit-budgets and, (iii) learning the agents' control policies using RL while following the designed quantization policies in the earlier step. We observe that one can reduce the computational cost of obtaining the value of information by exploiting insights gained from studying a similar two-agent system - instead of the original $N$-agent system. We then quantize agents' observations such that their more valuable observations are communicated more precisely. Our analytical results show the applicability of the proposed framework under a wide range of problems. Numerical results show striking improvements in reducing the computational complexity of obtaining VoI needed for the TOCD in a MAS problem without compromising the average return performance of the MAS.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Adaptive Super-Twisting Controller Design for Accurate Trajectory Tracking Performance of Unmanned Aerial Vehicles
Authors:
D. M. K. K. Venkateswara Rao,
Hamed Habibi,
Jose Luis Sanchez-Lopez,
Prathyush P. Menon,
Christopher Edwards,
Holger Voos
Abstract:
In this paper, an adaptive super-twisting controller is designed for an agile maneuvering quadrotor unmanned aerial vehicle to achieve accurate trajectory tracking in the presence of external disturbances. A cascaded control architecture is designed to determine the desired accelerations using the proposed controller and subsequently used to compute the desired orientation and angular rates. The f…
▽ More
In this paper, an adaptive super-twisting controller is designed for an agile maneuvering quadrotor unmanned aerial vehicle to achieve accurate trajectory tracking in the presence of external disturbances. A cascaded control architecture is designed to determine the desired accelerations using the proposed controller and subsequently used to compute the desired orientation and angular rates. The finite-time convergence of sliding functions and closed-loop system stability are analytically proven. Furthermore, the restrictive assumption on the maximum variation of the disturbance is relaxed by designing a gain adaptation law and low-pass filtering of the estimated equivalent control. The proper selection of design parameters is discussed in detail. Finally, the effectiveness of the proposed method is evaluated by high-fidelity software-in-the-loop simulations and validated by experimental studies.
△ Less
Submitted 14 September, 2023; v1 submitted 21 March, 2023;
originally announced March 2023.
-
On SORA for High-Risk UAV Operations under New EU Regulations: Perspectives for Automated Approach
Authors:
Hamed Habibi,
D. M. K. K. Venkateswara Rao,
Jose Luis Sanchez-Lopez,
Holger Voos
Abstract:
In this paper, we investigate requirements to prepare an application for Specific Operations Risk Assessment (SORA), regulated by European Union Aviation Safety Agency (EASA) to obtain flight authorization for Unmanned Aerial Vehicles (UAVs) operations and propose some perspectives to automate the approach based on our successful application. Preparation of SORA requires expert knowledge as it con…
▽ More
In this paper, we investigate requirements to prepare an application for Specific Operations Risk Assessment (SORA), regulated by European Union Aviation Safety Agency (EASA) to obtain flight authorization for Unmanned Aerial Vehicles (UAVs) operations and propose some perspectives to automate the approach based on our successful application. Preparation of SORA requires expert knowledge as it contains technicalities. Also, the whole process is an iterative and time-consuming one. It is even more challenging for higher-risk operations, such as those in urban environments, near airports, and multi- and customized models for research activities. SORA process limits the potential socio-economic impacts of innovative UAV capabilities. Therefore, in this paper, we present a SORA example, review the steps and highlight challenges. Accordingly, we propose an alternative workflow, considering the same steps, while addressing the challenges and pitfalls, to shorten the whole process. Furthermore, we present a comprehensive list of preliminary technical procedures, including the pre/during/post-flight checklists, design and installation appraisal, flight logbook, operational manual, training manual, and General Data Protection Regulation (GDPR), which are not explicitly instructed in SORA manual. Moreover, we propose the initial idea to create an automated SORA workflow to facilitate obtaining authorization, which is significantly helpful for operators, especially the scientific community, to conduct experimental operations.
△ Less
Submitted 3 March, 2023;
originally announced March 2023.
-
An Integrated Real-time UAV Trajectory Optimization with Potential Field Approach for Dynamic Collision Avoidance
Authors:
D. M. K. K. Venkateswara Rao,
Hamed Habibi,
Jose Luis Sanchez-Lopez,
Holger Voos
Abstract:
This paper presents an integrated approach that combines trajectory optimization and Artificial Potential Field (APF) method for real-time optimal Unmanned Aerial Vehicle (UAV) trajectory planning and dynamic collision avoidance. A minimum-time trajectory optimization problem is formulated with initial and final positions as boundary conditions and collision avoidance as constraints. It is transcr…
▽ More
This paper presents an integrated approach that combines trajectory optimization and Artificial Potential Field (APF) method for real-time optimal Unmanned Aerial Vehicle (UAV) trajectory planning and dynamic collision avoidance. A minimum-time trajectory optimization problem is formulated with initial and final positions as boundary conditions and collision avoidance as constraints. It is transcribed into a nonlinear programming problem using Chebyshev pseudospectral method. The state and control histories are approximated by using Lagrange polynomials and the collocation points are used to satisfy constraints. A novel sigmoid-type collision avoidance constraint is proposed to overcome the drawbacks of Lagrange polynomial approximation in pseudospectral methods that only guarantees inequality constraint satisfaction only at nodal points. Automatic differentiation of cost function and constraints is used to quickly determine their gradient and Jacobian, respectively. An APF method is used to update the optimal control inputs for guaranteeing collision avoidance. The trajectory optimization and APF method are implemented in a closed-loop fashion continuously, but in parallel at moderate and high frequencies, respectively. The initial guess for the optimization is provided based on the previous solution. The proposed approach is tested and validated through indoor experiments.
△ Less
Submitted 3 March, 2023;
originally announced March 2023.
-
UAV Path Planning Employing MPC- Reinforcement Learning Method Considering Collision Avoidance
Authors:
Mahya Ramezani,
Hamed Habibi,
Jose luis Sanchez Lopez,
Holger Voos
Abstract:
In this paper, we tackle the problem of Unmanned Aerial (UA V) path planning in complex and uncertain environments by designing a Model Predictive Control (MPC), based on a Long-Short-Term Memory (LSTM) network integrated into the Deep Deterministic Policy Gradient algorithm. In the proposed solution, LSTM-MPC operates as a deterministic policy within the DDPG network, and it leverages a predictin…
▽ More
In this paper, we tackle the problem of Unmanned Aerial (UA V) path planning in complex and uncertain environments by designing a Model Predictive Control (MPC), based on a Long-Short-Term Memory (LSTM) network integrated into the Deep Deterministic Policy Gradient algorithm. In the proposed solution, LSTM-MPC operates as a deterministic policy within the DDPG network, and it leverages a predicting pool to store predicted future states and actions for improved robustness and efficiency. The use of the predicting pool also enables the initialization of the critic network, leading to improved convergence speed and reduced failure rate compared to traditional reinforcement learning and deep reinforcement learning methods. The effectiveness of the proposed solution is evaluated by numerical simulations.
△ Less
Submitted 7 March, 2023; v1 submitted 21 February, 2023;
originally announced February 2023.
-
On f-Derangements and Decomposing Bipartite Graphs into Paths
Authors:
Michael Plantholt,
Hamidreza Habibi,
Benjamin Mussell
Abstract:
Let $f: \{1, ..., n\} \rightarrow \{1, ..., n\}$ be a function (not necessarily one-to-one). An $f-derangement$ is a permutation $ g:\{1,...,n\} \rightarrow \{1,...,n\}$ such that $g(i) \neq f(i)$ for each $ i = 1, ..., n$. When $f$ is itself a permutation, this is a standard derangement. We examine properties of f-derangements, and show that when we fix the maximum number of preimages for any ite…
▽ More
Let $f: \{1, ..., n\} \rightarrow \{1, ..., n\}$ be a function (not necessarily one-to-one). An $f-derangement$ is a permutation $ g:\{1,...,n\} \rightarrow \{1,...,n\}$ such that $g(i) \neq f(i)$ for each $ i = 1, ..., n$. When $f$ is itself a permutation, this is a standard derangement. We examine properties of f-derangements, and show that when we fix the maximum number of preimages for any item under $f$, the fraction of permutations that are f-derangements tends to $ 1/e$ for large $n$, regardless of the choice of $f$. We then use this result to analyze a heuristic method to decompose bipartite graphs into paths of length 5
△ Less
Submitted 7 January, 2022;
originally announced January 2022.
-
Ultra-Thin SiGe in the Source Modifies Performance of Thin-Film Tunneling FET
Authors:
Hamed Habibi,
Shoeib Babaee Touski
Abstract:
In this work, the source structure of an n-type thin-film tunneling FET is engineered to get better performance. An ultra-thin SiGe along with Si is used in the source of silicon-based TFET. Two structures are compared with conventional TFET, one, SiGe is located on the top of Si in the source and another one in reverse. Simulations approve these structures can reduce sub-threshold swing, OFF-curr…
▽ More
In this work, the source structure of an n-type thin-film tunneling FET is engineered to get better performance. An ultra-thin SiGe along with Si is used in the source of silicon-based TFET. Two structures are compared with conventional TFET, one, SiGe is located on the top of Si in the source and another one in reverse. Simulations approve these structures can reduce sub-threshold swing, OFF-current several times, and increase the ON-OFF ratio. Band diagram for conduction and valance bands are investigated and band to band tunneling (BTBT) generation rate is used to find better performance. We find current flows at Si in the source with the wider bandgap. Ge mole fraction of SiGe is varied and its effects on the performance of TFET are studied. The SiGe thickness for both structures is explored to obtain the best thickness for SiGe.
△ Less
Submitted 24 August, 2020; v1 submitted 19 August, 2020;
originally announced August 2020.
-
Decentralising power: how we are trying to keep CALLector ethical
Authors:
Cathy Chua,
Hanieh Habibi,
Manny Rayner,
Nikos Tsourakis
Abstract:
We present a brief overview of the CALLector project, and consider ethical questions arising from its overall goal of creating a social network to support creation and use of online CALL resources. We argue that these questions are best addressed in a decentralised, pluralistic open source architecture.
We present a brief overview of the CALLector project, and consider ethical questions arising from its overall goal of creating a social network to support creation and use of online CALL resources. We argue that these questions are best addressed in a decentralised, pluralistic open source architecture.
△ Less
Submitted 30 July, 2019;
originally announced August 2019.
-
Alexa as a CALL platform for children: Where do we start?
Authors:
Nikos Tsourakis,
Manny Rayner,
Hanieh Habibi,
Pierre-Emmanuel Gallais,
Cathy Chua,
Matt Butterweck
Abstract:
Amazon's Alexa is now widely available and shows interesting potential as a platform for hosting CALL games aimed at children. In this paper, we describe an initial informal experiment where we created some simple CALL games and made them available to a few child testers. We report the children's and parents' reactions. Our overall conclusion is that, although Alexa has many positive features, the…
▽ More
Amazon's Alexa is now widely available and shows interesting potential as a platform for hosting CALL games aimed at children. In this paper, we describe an initial informal experiment where we created some simple CALL games and made them available to a few child testers. We report the children's and parents' reactions. Our overall conclusion is that, although Alexa has many positive features, there are still fundamental platform issues in the current version that make it very difficult to build compelling CALL games for children. The games used will soon be freely available for download on the Alexa store.
△ Less
Submitted 30 July, 2019;
originally announced July 2019.
-
Emotion Recognition with Machine Learning Using EEG Signals
Authors:
Omid Bazgir,
Zeynab Mohammadi,
Seyed Amir Hassan Habibi
Abstract:
In this research, an emotion recognition system is developed based on valence/arousal model using electroencephalography (EEG) signals. EEG signals are decomposed into the gamma, beta, alpha and theta frequency bands using discrete wavelet transform (DWT), and spectral features are extracted from each frequency band. Principle component analysis (PCA) is applied to the extracted features by preser…
▽ More
In this research, an emotion recognition system is developed based on valence/arousal model using electroencephalography (EEG) signals. EEG signals are decomposed into the gamma, beta, alpha and theta frequency bands using discrete wavelet transform (DWT), and spectral features are extracted from each frequency band. Principle component analysis (PCA) is applied to the extracted features by preserving the same dimensionality, as a transform, to make the features mutually uncorrelated. Support vector machine (SVM), K-nearest neighbor (KNN) and artificial neural network (ANN) are used to classify emotional states. The cross-validated SVM with radial basis function (RBF) kernel using extracted features of 10 EEG channels, performs with 91.3% accuracy for arousal and 91.1% accuracy for valence, both in the beta frequency band. Our approach shows better performance compared to existing algorithms applied to the "DEAP" dataset.
△ Less
Submitted 1 June, 2019; v1 submitted 18 March, 2019;
originally announced March 2019.
-
Quantum Feedback Cooling of a Mechanical Oscillator Using Variational Measurements:Tweaking Heisenberg's Microscope
Authors:
Hojat Habibi,
Emil Zeuthen,
Majid Ghanaatshoar,
Klemens Hammerer
Abstract:
We revisit the problem of preparing a mechanical oscillator in the vicinity of its quantum-mechanical ground state by means of feedback cooling based on continuous optical detection of the oscillator position. In the parameter regime relevant to ground state cooling, the optical back-action and imprecision noise set the bottleneck of achievable cooling and must be carefully balanced. This can be a…
▽ More
We revisit the problem of preparing a mechanical oscillator in the vicinity of its quantum-mechanical ground state by means of feedback cooling based on continuous optical detection of the oscillator position. In the parameter regime relevant to ground state cooling, the optical back-action and imprecision noise set the bottleneck of achievable cooling and must be carefully balanced. This can be achieved by adapting the phase of the local oscillator in the homodyne detection realizing a so-called variational measurement. The trade-off between accurate position measurement and minimal disturbance can be understood in terms of Heisenberg's microscope and becomes particularly relevant when the measurement and feedback processes happen to be fast within the quantum coherence time of the system to be cooled. This corresponds to the regime of large quantum cooperativity $C_{\text{q}}\gtrsim1$, which was achieved in recent experiments on feedback cooling. Our method provides a simple path to further pushing the limits of current state-of-the-art experiments in quantum optomechanics.
△ Less
Submitted 3 June, 2016; v1 submitted 18 April, 2016;
originally announced April 2016.
-
Cryptanalysis of two mutual authentication protocols for low-cost RFID
Authors:
Mohammad Hassan Habibi,
Mahmoud Gardeshi,
Mahdi R. Alaghband
Abstract:
Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their secu…
▽ More
Radio Frequency Identification (RFID) is appearing as a favorite technology for automated identification, which can be widely applied to many applications such as e-passport, supply chain management and ticketing. However, researchers have found many security and privacy problems along RFID technology. In recent years, many researchers are interested in RFID authentication protocols and their security flaws. In this paper, we analyze two of the newest RFID authentication protocols which proposed by Fu et al. and Li et al. from several security viewpoints. We present different attacks such as desynchronization attack and privacy analysis over these protocols.
△ Less
Submitted 4 February, 2011;
originally announced February 2011.
-
Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard
Authors:
Mohammad Hassan Habibi,
Mahmud Gardeshi,
Mahdi R. Alaghband
Abstract:
Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we will show that the proposed protocol does not have proper security features. A powerful and practical attack is presented on this protocol whereby the whole securi…
▽ More
Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1 Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial attacks and also provides forward secrecy. In this paper we will show that the proposed protocol does not have proper security features. A powerful and practical attack is presented on this protocol whereby the whole security of the protocol is broken. Furthermore, Yeh et al. protocol does not assure the untraceabilitiy and backward untraceabilitiy aspects. Namely, all past and next transactions of a compromised tag will be traceable by an adversary.
△ Less
Submitted 4 February, 2011; v1 submitted 3 February, 2011;
originally announced February 2011.