-
Near-Optimal Sensor Scheduling for Batch State Estimation: Complexity, Algorithms, and Limits
Authors:
Vasileios Tzoumas,
Ali Jadbabaie,
George J. Pappas
Abstract:
In this paper, we focus on batch state estimation for linear systems. This problem is important in applications such as environmental field estimation, robotic navigation, and target tracking. Its difficulty lies on that limited operational resources among the sensors, e.g., shared communication bandwidth or battery power, constrain the number of sensors that can be active at each measurement step…
▽ More
In this paper, we focus on batch state estimation for linear systems. This problem is important in applications such as environmental field estimation, robotic navigation, and target tracking. Its difficulty lies on that limited operational resources among the sensors, e.g., shared communication bandwidth or battery power, constrain the number of sensors that can be active at each measurement step. As a result, sensor scheduling algorithms must be employed. Notwithstanding, current sensor scheduling algorithms for batch state estimation scale poorly with the system size and the time horizon. In addition, current sensor scheduling algorithms for Kalman filtering, although they scale better, provide no performance guarantees or approximation bounds for the minimization of the batch state estimation error. In this paper, one of our main contributions is to provide an algorithm that enjoys both the estimation accuracy of the batch state scheduling algorithms and the low time complexity of the Kalman filtering scheduling algorithms. In particular: 1) our algorithm is near-optimal: it achieves a solution up to a multiplicative factor 1/2 from the optimal solution, and this factor is close to the best approximation factor 1/e one can achieve in polynomial time for this problem; 2) our algorithm has (polynomial) time complexity that is not only lower than that of the current algorithms for batch state estimation; it is also lower than, or similar to, that of the current algorithms for Kalman filtering. We achieve these results by proving two properties for our batch state estimation error metric, which quantifies the square error of the minimum variance linear estimator of the batch state vector: a) it is supermodular in the choice of the sensors; b) it has a sparsity pattern (it involves matrices that are block tri-diagonal) that facilitates its evaluation at each sensor set.
△ Less
Submitted 26 September, 2016; v1 submitted 26 August, 2016;
originally announced August 2016.
-
Coding Schemes for Securing Cyber-Physical Systems Against Stealthy Data Injection Attacks
Authors:
Fei Miao,
Quanyan Zhu,
Miroslav Pajic,
George J. Pappas
Abstract:
This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors and actuators that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while…
▽ More
This paper considers a method of coding the sensor outputs in order to detect stealthy false data injection attacks. An intelligent attacker can design a sequence of data injection to sensors and actuators that pass the state estimator and statistical fault detector, based on knowledge of the system parameters. To stay undetected, the injected data should increase the state estimation errors while keep the estimation residues small. We employ a coding matrix to change the original sensor outputs to increase the estimation residues under intelligent data injection attacks. This is a low cost method compared with encryption schemes over all sensor measurements in communication networks. We show the conditions of a feasible coding matrix under the assumption that the attacker does not have knowledge of the exact coding matrix. An algorithm is developed to compute a feasible coding matrix, and, we show that in general, multiple feasible coding matrices exist. To defend against attackers who estimates the coding matrix via sensor and actuator measurements, time-varying coding matrices are designed according to the detection requirements. A heuristic algorithm to decide the time length of updating a coding matrix is then proposed.
△ Less
Submitted 29 May, 2016;
originally announced May 2016.
-
Random Access Design for Wireless Control Systems
Authors:
Konstantinos Gatsis,
Alejandro Ribeiro,
George J. Pappas
Abstract:
Interferences arising between wireless sensor-actuator systems communicating over shared wireless channels adversely affect closed loop control performance. To mitigate this problem we design appropriate channel access policies for wireless control systems subject to channel fading. The design is posed as an optimization problem where the total transmit power of the sensors is minimized while desi…
▽ More
Interferences arising between wireless sensor-actuator systems communicating over shared wireless channels adversely affect closed loop control performance. To mitigate this problem we design appropriate channel access policies for wireless control systems subject to channel fading. The design is posed as an optimization problem where the total transmit power of the sensors is minimized while desired control performance is guaranteed for each involved control loop. Control performance is abstracted as a desired expected decrease rate of a given Lyapunov function for each loop. We prove that the optimal channel access policies are decoupled and, intuitively, each sensor balances the gains from transmitting to its actuator with the negative interference effect on all other control loops. Moreover the optimal policies are of a threshold nature, that is, a sensor transmits only under favorable local fading conditions. Finally, we show that the optimal policies can be computed by a distributed iterative procedure which does not require coordination between the sensors.
△ Less
Submitted 2 May, 2016;
originally announced May 2016.
-
Self-Triggered Time-Varying Convex Optimization
Authors:
Mahyar Fazlyab,
Cameron Nowzari,
George J. Pappas,
Alejandro Ribeiro,
Victor M. Preciado
Abstract:
In this paper, we propose a self-triggered algorithm to solve a class of convex optimization problems with time-varying objective functions. It is known that the trajectory of the optimal solution can be asymptotically tracked by a continuous-time state update law. Unfortunately, implementing this requires continuous evaluation of the gradient and the inverse Hessian of the objective function whic…
▽ More
In this paper, we propose a self-triggered algorithm to solve a class of convex optimization problems with time-varying objective functions. It is known that the trajectory of the optimal solution can be asymptotically tracked by a continuous-time state update law. Unfortunately, implementing this requires continuous evaluation of the gradient and the inverse Hessian of the objective function which is not amenable to digital implementation. Alternatively, we draw inspiration from self-triggered control to propose a strategy that autonomously adapts the times at which it makes computations about the objective function, yielding a piece-wise affine state update law. The algorithm does so by predicting the temporal evolution of the gradient using known upper bounds on higher order derivatives of the objective function. Our proposed method guarantees convergence to arbitrarily small neighborhood of the optimal trajectory in finite time and without incurring Zeno behavior. We illustrate our framework with numerical simulations.
△ Less
Submitted 28 March, 2016;
originally announced March 2016.
-
Data-Driven Robust Taxi Dispatch under Demand Uncertainties
Authors:
Fei Miao,
Shuo Han,
Shan Lin,
Qian Wang,
John Stankovic,
Abdeltawab Hendawi,
Desheng Zhang,
Tian He,
George J. Pappas
Abstract:
In modern taxi networks, large amounts of taxi occupancy status and location data are collected from networked in-vehicle sensors in real-time. They provide knowledge of system models on passenger demand and mobility patterns for efficient taxi dispatch and coordination strategies. Such approaches face new challenges: how to deal with uncertainties of predicted customer demand while fulfilling the…
▽ More
In modern taxi networks, large amounts of taxi occupancy status and location data are collected from networked in-vehicle sensors in real-time. They provide knowledge of system models on passenger demand and mobility patterns for efficient taxi dispatch and coordination strategies. Such approaches face new challenges: how to deal with uncertainties of predicted customer demand while fulfilling the system's performance requirements, including minimizing taxis' total idle mileage and maintaining service fairness across the whole city; how to formulate a computationally tractable problem. To address this problem, we develop a data-driven robust taxi dispatch framework to consider spatial-temporally correlated demand uncertainties. The robust vehicle dispatch problem we formulate is concave in the uncertain demand and convex in the decision variables. Uncertainty sets of random demand vectors are constructed from data based on theories in hypothesis testing, and provide a desired probabilistic guarantee level for the performance of robust taxi dispatch solutions. We prove equivalent computationally tractable forms of the robust dispatch problem using the minimax theorem and strong duality. Evaluations on four years of taxi trip data for New York City show that by selecting a probabilistic guarantee level at 75%, the average demand-supply ratio error is reduced by 31.7%, and the average total idle driving distance is reduced by 10.13% or about 20 million miles annually, compared with non-robust dispatch solutions.
△ Less
Submitted 20 October, 2017; v1 submitted 20 March, 2016;
originally announced March 2016.
-
Taxi Dispatch with Real-Time Sensing Data in Metropolitan Areas: A Receding Horizon Control Approach
Authors:
Fei Miao,
Shuo Han,
Shan Lin,
John A. Stankovic,
Hua Huang,
Desheng Zhang,
Sirajum Munir,
Tian He,
George J. Pappas
Abstract:
Traditional taxi systems in metropolitan areas often suffer from inefficiencies due to uncoordinated actions as system capacity and customer demand change. With the pervasive deployment of networked sensors in modern vehicles, large amounts of information regarding customer demand and system status can be collected in real time. This information provides opportunities to perform various types of c…
▽ More
Traditional taxi systems in metropolitan areas often suffer from inefficiencies due to uncoordinated actions as system capacity and customer demand change. With the pervasive deployment of networked sensors in modern vehicles, large amounts of information regarding customer demand and system status can be collected in real time. This information provides opportunities to perform various types of control and coordination for large-scale intelligent transportation systems. In this paper, we present a receding horizon control (RHC) framework to dispatch taxis, which incorporates highly spatiotemporally correlated demand/supply models and real-time GPS location and occupancy information. The objectives include matching spatiotemporal ratio between demand and supply for service quality with minimum current and anticipated future taxi idle driving distance. Extensive trace-driven analysis with a data set containing taxi operational records in San Francisco shows that our solution reduces the average total idle distance by 52%, and reduces the supply demand ratio error across the city during one experimental time slot by 45%. Moreover, our RHC framework is compatible with a wide variety of predictive models and optimization problem formulations. This compatibility property allows us to solve robust optimization problems with corresponding demand uncertainty models that provide disruptive event information.
△ Less
Submitted 14 March, 2016;
originally announced March 2016.
-
Myopic Policy Bounds for Information Acquisition POMDPs
Authors:
Mikko Lauri,
Nikolay Atanasov,
George J. Pappas,
Risto Ritala
Abstract:
This paper addresses the problem of optimal control of robotic sensing systems aimed at autonomous information gathering in scenarios such as environmental monitoring, search and rescue, and surveillance and reconnaissance. The information gathering problem is formulated as a partially observable Markov decision process (POMDP) with a reward function that captures uncertainty reduction. Unlike the…
▽ More
This paper addresses the problem of optimal control of robotic sensing systems aimed at autonomous information gathering in scenarios such as environmental monitoring, search and rescue, and surveillance and reconnaissance. The information gathering problem is formulated as a partially observable Markov decision process (POMDP) with a reward function that captures uncertainty reduction. Unlike the classical POMDP formulation, the resulting reward structure is nonlinear in the belief state and the traditional approaches do not apply directly. Instead of develo** a new approximation algorithm, we show that if attention is restricted to a class of problems with certain structural properties, one can derive (often tight) upper and lower bounds on the optimal policy via an efficient myopic computation. These policy bounds can be applied in conjunction with an online branch-and-bound algorithm to accelerate the computation of the optimal policy. We obtain informative lower and upper policy bounds with low computational effort in a target tracking domain. The performance of branch-and-bounding is demonstrated and compared with exact value iteration.
△ Less
Submitted 27 January, 2016;
originally announced January 2016.
-
Self-triggered Pursuit of a Single Evader with Uncertain Information
Authors:
Saad A. Aleem,
Cameron Nowzari,
George J. Pappas
Abstract:
This paper studies a pursuit-evasion problem involving a single pursuer and a single evader, where we are interested in develo** a pursuit strategy that doesn't require continuous, or even periodic, information about the position of the evader. We propose a self-triggered control strategy that allows the pursuer to sample the evader's position autonomously, while satisfying desired performance m…
▽ More
This paper studies a pursuit-evasion problem involving a single pursuer and a single evader, where we are interested in develo** a pursuit strategy that doesn't require continuous, or even periodic, information about the position of the evader. We propose a self-triggered control strategy that allows the pursuer to sample the evader's position autonomously, while satisfying desired performance metric of evader capture. The work in this paper builds on the previously proposed self-triggered pursuit strategy which guarantees capture of the evader in finite time with a finite number of evader samples. However, this algorithm relied on the unrealistic assumption that the evader's exact position was available to the pursuer. Instead, we extend our previous framework to develop an algorithm which allows for uncertainties in sampling the information about the evader, and derive tolerable upper-bounds on the error such that the pursuer can guarantee capture of the evader. In addition, we outline the advantages of retaining the evader's history in improving the current estimate of the true location of the evader that can be used to capture the evader with even less samples. Our approach is in sharp contrast to the existing works in literature and our results ensure capture without sacrificing any performance in terms of guaranteed time-to-capture, as compared to classic algorithms that assume continuous availability of information.
△ Less
Submitted 19 January, 2016; v1 submitted 18 December, 2015;
originally announced December 2015.
-
Optimal resource allocation for competitive spreading processes on bilayer networks
Authors:
Nicholas J. Watkins,
Cameron Nowzari,
Victor M. Preciado,
George J. Pappas
Abstract:
This paper studies the SI1SI2S spreading model of two competing behaviors over a bilayer network. We address the problem of determining resource allocation strategies which design a spreading network so as to ensure the extinction of a selected process. Our discussion begins by extending the SI1SI2S model to edge-dependent infection and node-dependent recovery parameters with generalized graph top…
▽ More
This paper studies the SI1SI2S spreading model of two competing behaviors over a bilayer network. We address the problem of determining resource allocation strategies which design a spreading network so as to ensure the extinction of a selected process. Our discussion begins by extending the SI1SI2S model to edge-dependent infection and node-dependent recovery parameters with generalized graph topologies, which builds upon prior work that studies the homogeneous case. We then find conditions under which the mean-field approximation of a chosen epidemic process stabilizes to extinction exponentially quickly. Leveraging this result, we formulate and solve an optimal resource allocation problem in which we minimize the expenditure necessary to force a chosen epidemic process to become extinct as quickly as possible. In the case that the budget is not sufficient to ensure extinction of the desired process, we instead minimize a useful heuristic. We explore the efficacy of our methods by comparing simulations of the stochastic process to the mean-field model, and find that the mean-field methods developed work well for the optimal cost networks designed, but suffer from inaccuracy in other situations.
△ Less
Submitted 16 December, 2015;
originally announced December 2015.
-
Accurately Predicting Functional Connectivity from Diffusion Imaging
Authors:
Cassiano O. Becker,
Sergio Pequito,
George J. Pappas,
Michael B. Miller,
Scott T. Grafton,
Danielle S. Bassett,
Victor M. Preciado
Abstract:
Understanding the relationship between the dynamics of neural processes and the anatomical substrate of the brain is a central question in neuroscience. On the one hand, modern neuroimaging technologies, such as diffusion tensor imaging, can be used to construct structural graphs representing the architecture of white matter streamlines linking cortical and subcortical structures. On the other han…
▽ More
Understanding the relationship between the dynamics of neural processes and the anatomical substrate of the brain is a central question in neuroscience. On the one hand, modern neuroimaging technologies, such as diffusion tensor imaging, can be used to construct structural graphs representing the architecture of white matter streamlines linking cortical and subcortical structures. On the other hand, temporal patterns of neural activity can be used to construct functional graphs representing temporal correlations between brain regions. Although some studies provide evidence that whole-brain functional connectivity is shaped by the underlying anatomy, the observed relationship between function and structure is weak, and the rules by which anatomy constrains brain dynamics remain elusive. In this article, we introduce a methodology to predict with high accuracy the functional connectivity of a subject at rest from his or her structural graph. Using our methodology, we are able to systematically unveil the role of structural paths in the formation of functional correlations. Furthermore, in our empirical evaluations, we observe that the eigen-modes of the predicted functional connectivity are aligned with activity patterns associated with different cognitive systems. Our work offers the potential to infer properties of brain dynamics in clinical or developmental populations with low tolerance for functional neuroimaging.
△ Less
Submitted 20 April, 2016; v1 submitted 8 December, 2015;
originally announced December 2015.
-
Analysis and Design of Actuation-Sensing-Communication Interconnection Structures towards Secured/Resilient Closed-loop Systems
Authors:
Sergio Pequito,
Farshad Khorrami,
Prashanth Krishnamurthy,
George J. Pappas
Abstract:
This paper considers the analysis and design of resilient/robust decentralized control systems. Specifically, we aim to assess how the pairing of sensors and actuators lead to architectures that are resilient to attacks/hacks for industrial control systems and other complex cyber-physical systems. We consider inherent structural properties such as internal fixed modes of a dynamical system dependi…
▽ More
This paper considers the analysis and design of resilient/robust decentralized control systems. Specifically, we aim to assess how the pairing of sensors and actuators lead to architectures that are resilient to attacks/hacks for industrial control systems and other complex cyber-physical systems. We consider inherent structural properties such as internal fixed modes of a dynamical system depending on actuation, sensing, and interconnection/communication structure for linear discrete time-invariant dynamical systems. We introduce the notion of resilient fixed-modes free system that ensures the non-existence of fixed modes when the actuation-sensing-communication structure is compromised due to attacks by a malicious agent on actuators, sensors, or communication components and natural failures. Also, we provide a graph-theoretical characterization for the resilient structurally fixed modes that enables to capture the non-existence of resilient fixed modes for almost all possible systems' realizations. Additionally, we address the minimum actuation-sensing-communication co-design ensuring the non-existence of resiliently structurally fixed modes, which we show to be NP-hard. Notwithstanding, we identify conditions that are often satisfied in engineering settings and under which the co-design problem is solvable in polynomial-time complexity. Furthermore, we leverage the structural insights and properties to provide a convex optimization method to design the gain for a parametrized system and satisfying the sparsity of a given information pattern. Thus, exploring the interplay between structural and non-structural systems to ensure their resilience. Finally, the efficacy of the proposed approach is demonstrated on a power grid example.
△ Less
Submitted 22 February, 2017; v1 submitted 9 November, 2015;
originally announced November 2015.
-
Optimal Temporal Logic Planning in Probabilistic Semantic Maps
Authors:
Jie Fu,
Nikolay Atanasov,
Ufuk Topcu,
George J. Pappas
Abstract:
This paper considers robot motion planning under temporal logic constraints in probabilistic maps obtained by semantic simultaneous localization and map** (SLAM). The uncertainty in a map distribution presents a great challenge for obtaining correctness guarantees with respect to the linear temporal logic (LTL) specification. We show that the problem can be formulated as an optimal control probl…
▽ More
This paper considers robot motion planning under temporal logic constraints in probabilistic maps obtained by semantic simultaneous localization and map** (SLAM). The uncertainty in a map distribution presents a great challenge for obtaining correctness guarantees with respect to the linear temporal logic (LTL) specification. We show that the problem can be formulated as an optimal control problem in which both the semantic map and the logic formula evaluation are stochastic. Our first contribution is to reduce the stochastic control problem for a subclass of LTL to a deterministic shortest path problem by introducing a confidence parameter $delta$. A robot trajectory obtained from the deterministic problem is guaranteed to have minimum cost and to satisfy the logic specification in the true environment with probability $delta$. Our second contribution is to design an admissible heuristic function that guides the planning in the deterministic problem towards satisfying the temporal logic specification. This allows us to obtain an optimal and very efficient solution using the A* algorithm. The performance and correctness of our approach are demonstrated in a simulated semantic environment using a differential-drive robot.
△ Less
Submitted 21 October, 2015;
originally announced October 2015.
-
Sensor Placement for Optimal Kalman Filtering: Fundamental Limits, Submodularity, and Algorithms
Authors:
Vasileios Tzoumas,
Ali Jadbabaie,
George J. Pappas
Abstract:
In this paper, we focus on sensor placement in linear dynamic estimation, where the objective is to place a small number of sensors in a system of interdependent states so to design an estimator with a desired estimation performance. In particular, we consider a linear time-variant system that is corrupted with process and measurement noise, and study how the selection of its sensors affects the e…
▽ More
In this paper, we focus on sensor placement in linear dynamic estimation, where the objective is to place a small number of sensors in a system of interdependent states so to design an estimator with a desired estimation performance. In particular, we consider a linear time-variant system that is corrupted with process and measurement noise, and study how the selection of its sensors affects the estimation error of the corresponding Kalman filter over a finite observation interval. Our contributions are threefold: First, we prove that the minimum mean square error of the Kalman filter decreases only linearly as the number of sensors increases. That is, adding extra sensors so to reduce this estimation error is ineffective, a fundamental design limit. Similarly, we prove that the number of sensors grows linearly with the system's size for fixed minimum mean square error and number of output measurements over an observation interval; this is another fundamental limit, especially for systems where the system's size is large. Second, we prove that the logdet of the error covariance of the Kalman filter, which captures the volume of the corresponding confidence ellipsoid, with respect to the system's initial condition and process noise is a supermodular and non-increasing set function in the choice of the sensor set. Therefore, it exhibits the diminishing returns property. Third, we provide efficient approximation algorithms that select a small number sensors so to optimize the Kalman filter with respect to this estimation error ---the worst-case performance guarantees of these algorithms are provided as well. Finally, we illustrate the efficiency of our algorithms using the problem of surface-based monitoring of CO2 sequestration sites studied in Weimer et al. (2008).
△ Less
Submitted 14 May, 2020; v1 submitted 27 September, 2015;
originally announced September 2015.
-
A general class of spreading processes with non-Markovian dynamics
Authors:
Cameron Nowzari,
Masaki Ogura,
Victor M. Preciado,
George J. Pappas
Abstract:
In this paper we propose a general class of models for spreading processes we call the $SI^*V^*$ model. Unlike many works that consider a fixed number of compartmental states, we allow an arbitrary number of states on arbitrary graphs with heterogeneous parameters for all nodes and edges. As a result, this generalizes an extremely large number of models studied in the literature including the MSEI…
▽ More
In this paper we propose a general class of models for spreading processes we call the $SI^*V^*$ model. Unlike many works that consider a fixed number of compartmental states, we allow an arbitrary number of states on arbitrary graphs with heterogeneous parameters for all nodes and edges. As a result, this generalizes an extremely large number of models studied in the literature including the MSEIV, MSEIR, MSEIS, SEIV, SEIR, SEIS, SIV, SIRS, SIR, and SIS models. Furthermore, we show how the $SI^*V^*$ model allows us to model non-Poisson spreading processes letting us capture much more complicated dynamics than existing works such as information spreading through social networks or the delayed incubation period of a disease like Ebola. This is in contrast to the overwhelming majority of works in the literature that only consider spreading processes that can be captured by a Markov process. After develo** the stochastic model, we analyze its deterministic mean-field approximation and provide conditions for when the disease-free equilibrium is stable. Simulations illustrate our results.
△ Less
Submitted 13 September, 2015;
originally announced September 2015.
-
Static Output Feedback: On Essential Feasible Information Patterns
Authors:
J. Frederico Carvalho,
Sergio Pequito,
A. Pedro Aguiar,
Soummya Kar,
George J. Pappas
Abstract:
In this paper, for linear time-invariant plants, where a collection of possible inputs and outputs are known a priori, we address the problem of determining the communication between outputs and inputs, i.e., information patterns, such that desired control objectives of the closed-loop system (for instance, stabilizability) through static output feedback may be ensured.
We address this problem i…
▽ More
In this paper, for linear time-invariant plants, where a collection of possible inputs and outputs are known a priori, we address the problem of determining the communication between outputs and inputs, i.e., information patterns, such that desired control objectives of the closed-loop system (for instance, stabilizability) through static output feedback may be ensured.
We address this problem in the structural system theoretic context. To this end, given a specified structural pattern (locations of zeros/non-zeros) of the plant matrices, we introduce the concept of essential information patterns, i.e., communication patterns between outputs and inputs that satisfy the following conditions: (i) ensure arbitrary spectrum assignment of the closed-loop system, using static output feedback constrained to the information pattern, for almost all possible plant instances with the specified structural pattern; and (ii) any communication failure precludes the resulting information pattern from attaining the pole placement objective in (i).
Subsequently, we study the problem of determining essential information patterns. First, we provide several necessary and sufficient conditions to verify whether a specified information pattern is essential or not. Further, we show that such conditions can be verified by resorting to algorithms with polynomial complexity (in the dimensions of the state, input and output). Although such verification can be performed efficiently, it is shown that the problem of determining essential information patterns is in general NP-hard. The main results of the paper are illustrated through examples.
△ Less
Submitted 8 September, 2015;
originally announced September 2015.
-
Minimum Number of Probes for Brain Dynamics Observability
Authors:
Sergio Pequito,
Paul Bogdan,
George J. Pappas
Abstract:
In this paper, we address the problem of placing sensor probes in the brain such that the system dynamics' are generically observable. The system dynamics whose states can encode for instance the fire-rating of the neurons or their ensemble following a neural-topological (structural) approach, and the sensors are assumed to be dedicated, i.e., can only measure a state at each time. Even though the…
▽ More
In this paper, we address the problem of placing sensor probes in the brain such that the system dynamics' are generically observable. The system dynamics whose states can encode for instance the fire-rating of the neurons or their ensemble following a neural-topological (structural) approach, and the sensors are assumed to be dedicated, i.e., can only measure a state at each time. Even though the mathematical description of brain dynamics is (yet) to be discovered, we build on its observed fractal characteristics and assume that the model of the brain activity satisfies fractional-order dynamics.
Although the sensor placement explored in this paper is particularly considering the observability of brain dynamics, the proposed methodology applies to any fractional-order linear system. Thus, the main contribution of this paper is to show how to place the minimum number of dedicated sensors, i.e., sensors measuring only a state variable, to ensure generic observability in discrete-time fractional-order systems for a specified finite interval of time. Finally, an illustrative example of the main results is provided using electroencephalogram (EEG) data.
△ Less
Submitted 27 August, 2015;
originally announced August 2015.
-
Structural Minimum Controllability Problem for Linear Continuous-Time Switching Systems
Authors:
Sergio Pequito,
George J. Pappas
Abstract:
This paper addresses a structural design problem in control systems, and explicitly takes into consideration the possible application to large-scale systems. More precisely, we aim to determine and characterize the minimum number of manipulated state variables ensuring structural controllability of switched linear continuous-time systems. Towards this goal, we provide a new necessary and sufficien…
▽ More
This paper addresses a structural design problem in control systems, and explicitly takes into consideration the possible application to large-scale systems. More precisely, we aim to determine and characterize the minimum number of manipulated state variables ensuring structural controllability of switched linear continuous-time systems. Towards this goal, we provide a new necessary and sufficient condition that leverages both graph-theoretic and algebraic properties required to ensure feasibility of the solutions. With this new condition, we show that a solution can be determined by an efficient procedure, i.e., polynomial in the number of state variables. In addition, we also discuss the switching signal properties that ensure structural controllability and the computational complexity of determining these sequences. In particular, we show that determining the minimum number of modes that a switching signal requires to ensure structural controllability is NP-hard.
△ Less
Submitted 10 June, 2016; v1 submitted 26 July, 2015;
originally announced July 2015.
-
Deterministic Bounding Systems for Stochastic Compartmental Spreading Processes
Authors:
Nicholas J. Watkins,
Cameron Nowzari,
Victor M. Preciado,
George J. Pappas
Abstract:
This paper studies a novel approach for approximating the behavior of compartmental spreading processes. In contrast to prior work, the methods developed describe a dynamics which bound the exact moment dynamics, without explicitly requiring a priori knowledge of non-negative (or non-positive) covariance between pairs of system variables. Moreover, we provide systems which provide both upper- and…
▽ More
This paper studies a novel approach for approximating the behavior of compartmental spreading processes. In contrast to prior work, the methods developed describe a dynamics which bound the exact moment dynamics, without explicitly requiring a priori knowledge of non-negative (or non-positive) covariance between pairs of system variables. Moreover, we provide systems which provide both upper- and lower- bounds on the process moments. We then show that when system variables are shown to be non-negatively (or non-positively) correlated for all time in the system's evolution, we may leverage the knowledge to create better approximating systems. We then apply the technique to several previously studied compartmental spreading processes, and compare the bounding systems' performance to the standard approximations studied in prior literature.
△ Less
Submitted 18 July, 2015;
originally announced July 2015.
-
Analysis and Control of Epidemics: A survey of spreading processes on complex networks
Authors:
Cameron Nowzari,
Victor M. Preciado,
George J. Pappas
Abstract:
This article reviews and presents various solved and open problems in the development, analysis, and control of epidemic models. We are interested in presenting a relatively concise report for new engineers looking to enter the field of spreading processes on complex networks.
This article reviews and presents various solved and open problems in the development, analysis, and control of epidemic models. We are interested in presenting a relatively concise report for new engineers looking to enter the field of spreading processes on complex networks.
△ Less
Submitted 25 August, 2015; v1 submitted 4 May, 2015;
originally announced May 2015.
-
Gradual Release of Sensitive Data under Differential Privacy
Authors:
Fragkiskos Koufogiannis,
Shuo Han,
George J. Pappas
Abstract:
We introduce the problem of releasing sensitive data under differential privacy when the privacy level is subject to change over time. Existing work assumes that privacy level is determined by the system designer as a fixed value before sensitive data is released. For certain applications, however, users may wish to relax the privacy level for subsequent releases of the same data after either a re…
▽ More
We introduce the problem of releasing sensitive data under differential privacy when the privacy level is subject to change over time. Existing work assumes that privacy level is determined by the system designer as a fixed value before sensitive data is released. For certain applications, however, users may wish to relax the privacy level for subsequent releases of the same data after either a re-evaluation of the privacy concerns or the need for better accuracy. Specifically, given a database containing sensitive data, we assume that a response $y_1$ that preserves $ε_{1}$-differential privacy has already been published. Then, the privacy level is relaxed to $ε_2$, with $ε_2 > ε_1$, and we wish to publish a more accurate response $y_2$ while the joint response $(y_1, y_2)$ preserves $ε_2$-differential privacy. How much accuracy is lost in the scenario of gradually releasing two responses $y_1$ and $y_2$ compared to the scenario of releasing a single response that is $ε_{2}$-differentially private? Our results show that there exists a composite mechanism that achieves \textit{no loss} in accuracy. We consider the case in which the private data lies within $\mathbb{R}^{n}$ with an adjacency relation induced by the $\ell_{1}$-norm, and we focus on mechanisms that approximate identity queries. We show that the same accuracy can be achieved in the case of gradual release through a mechanism whose outputs can be described by a \textit{lazy Markov stochastic process}. This stochastic process has a closed form expression and can be efficiently sampled. Our results are applicable beyond identity queries. To this end, we demonstrate that our results can be applied in several cases, including Google's RAPPOR project, trading of sensitive data, and controlled transmission of private data in a social network.
△ Less
Submitted 1 April, 2015;
originally announced April 2015.
-
Optimality of the Laplace Mechanism in Differential Privacy
Authors:
Fragkiskos Koufogiannis,
Shuo Han,
George J. Pappas
Abstract:
In the highly interconnected realm of Internet of Things, exchange of sensitive information raises severe privacy concerns. The Laplace mechanism -- adding Laplace-distributed artificial noise to sensitive data -- is one of the widely used methods of providing privacy guarantees within the framework of differential privacy. In this work, we present Lipschitz privacy, a slightly tighter version of…
▽ More
In the highly interconnected realm of Internet of Things, exchange of sensitive information raises severe privacy concerns. The Laplace mechanism -- adding Laplace-distributed artificial noise to sensitive data -- is one of the widely used methods of providing privacy guarantees within the framework of differential privacy. In this work, we present Lipschitz privacy, a slightly tighter version of differential privacy. We prove that the Laplace mechanism is optimal in the sense that it minimizes the mean-squared error for identity queries which provide privacy with respect to the $\ell_{1}$-norm. In addition to the $\ell_{1}$-norm which respects individuals' participation, we focus on the use of the $\ell_{2}$-norm which provides privacy of high-dimensional data. A variation of the Laplace mechanism is proven to have the optimal mean-squared error from the identity query. Finally, the optimal mechanism for the scenario in which individuals submit their high-dimensional sensitive data is derived.
△ Less
Submitted 7 April, 2015; v1 submitted 31 March, 2015;
originally announced April 2015.
-
Minimal Reachability Problems
Authors:
Vasileios Tzoumas,
Ali Jadbabaie,
George J. Pappas
Abstract:
In this paper, we address a collection of state space reachability problems, for linear time-invariant systems, using a minimal number of actuators. In particular, we design a zero-one diagonal input matrix B, with a minimal number of non-zero entries, so that a specified state vector is reachable from a given initial state. Moreover, we design a B so that a system can be steered either into a giv…
▽ More
In this paper, we address a collection of state space reachability problems, for linear time-invariant systems, using a minimal number of actuators. In particular, we design a zero-one diagonal input matrix B, with a minimal number of non-zero entries, so that a specified state vector is reachable from a given initial state. Moreover, we design a B so that a system can be steered either into a given subspace, or sufficiently close to a desired state. This work extends the recent results of Olshevsky and Pequito, where a zero-one diagonal or column matrix B is constructed so that the involved system is controllable. Specifically, we prove that the first two of our aforementioned problems are NP-hard; these results hold for a zero-one column matrix B as well. Then, we provide efficient polynomial time algorithms for their general solution, along with their worst case approximation guarantees. Finally, we illustrate their performance over large random networks.
△ Less
Submitted 15 August, 2017; v1 submitted 24 March, 2015;
originally announced March 2015.
-
Minimal Actuator Placement with Optimal Control Constraints
Authors:
Vasileios Tzoumas,
Mohammad Amin Rahimian,
George J. Pappas,
Ali Jadbabaie
Abstract:
We introduce the problem of minimal actuator placement in a linear control system so that a bound on the minimum control effort for a given state transfer is satisfied while controllability is ensured. We first show that this is an NP-hard problem following the recent work of Olshevsky. Next, we prove that this problem has a supermodular structure. Afterwards, we provide an efficient algorithm tha…
▽ More
We introduce the problem of minimal actuator placement in a linear control system so that a bound on the minimum control effort for a given state transfer is satisfied while controllability is ensured. We first show that this is an NP-hard problem following the recent work of Olshevsky. Next, we prove that this problem has a supermodular structure. Afterwards, we provide an efficient algorithm that approximates up to a multiplicative factor of O(logn), where n is the size of the multi-agent network, any optimal actuator set that meets the specified energy criterion. Moreover, we show that this is the best approximation factor one can achieve in polynomial-time for the worst case. Finally, we test this algorithm over large Erdos-Renyi random networks to further demonstrate its efficiency.
△ Less
Submitted 16 March, 2015;
originally announced March 2015.
-
Value of forecasts in planning under uncertainty: Extended version
Authors:
Konstantinos Gatsis,
Ufuk Topcu,
George J. Pappas
Abstract:
In environments with increasing uncertainty, such as smart grid applications based on renewable energy, planning can benefit from incorporating forecasts about the uncertainty and from systematically evaluating the utility of the forecast information. We consider these issues in a planning framework in which forecasts are interpreted as constraints on the possible probability distributions that th…
▽ More
In environments with increasing uncertainty, such as smart grid applications based on renewable energy, planning can benefit from incorporating forecasts about the uncertainty and from systematically evaluating the utility of the forecast information. We consider these issues in a planning framework in which forecasts are interpreted as constraints on the possible probability distributions that the uncertain quantity of interest may have. The planning goal is to robustly maximize the expected value of a given utility function, integrated with respect to the worst-case distribution consistent with the forecasts. Under mild technical assumptions we show that the problem can be reformulated into convex optimization. We exploit this reformulation to evaluate how informative the forecasts are in determining the optimal planning decision, as well as to guide how forecasts can be appropriately refined to obtain higher utility values. A numerical example of wind energy trading in electricity markets illustrates our results.
△ Less
Submitted 13 March, 2015;
originally announced March 2015.
-
Minimum Cost Constrained Input-Output and Control Configuration Co-Design Problem: A Structural Systems Approach
Authors:
Sergio Pequito,
Soummya Kar,
George J. Pappas
Abstract:
In this paper, we study the minimal cost constrained input-output (I/O) and control configuration co-design problem. Given a linear time-invariant plant, where a collection of possible inputs and outputs is known a priori, we aim to determine the collection of inputs, outputs and communication among them incurring in the minimum cost, such that desired control performance, measured in terms of arb…
▽ More
In this paper, we study the minimal cost constrained input-output (I/O) and control configuration co-design problem. Given a linear time-invariant plant, where a collection of possible inputs and outputs is known a priori, we aim to determine the collection of inputs, outputs and communication among them incurring in the minimum cost, such that desired control performance, measured in terms of arbitrary pole-placement capability of the closed-loop system, is ensured. We show that this problem is NP-hard in general (in the size of the state space). However, the subclass of problems, in which the dynamic matrix is irreducible, is shown to be polynomially solvable and the corresponding algorithm is presented. In addition, under the same assumption, the same algorithm can be used to solve the minimal cost constrained I/O selection problem, and the minimal cost control configuration selection problem, individually. In order to illustrate the main results of this paper, some simulations are also provided.
△ Less
Submitted 15 March, 2015; v1 submitted 9 March, 2015;
originally announced March 2015.
-
Distributed Resource Allocation for Epidemic control
Authors:
Chinwendu Enyioha,
Ali Jadbabaie,
Victor Preciado,
George J. Pappas
Abstract:
We present a distributed resource allocation strategy to control an epidemic outbreak in a networked population based on a Distributed Alternating Direction Method of Multipliers (D-ADMM) algorithm. We consider a linearized Susceptible- Infected-Susceptible (SIS) epidemic spreading model in which agents in the network are able to allocate vaccination resources (for prevention) and antidotes (for t…
▽ More
We present a distributed resource allocation strategy to control an epidemic outbreak in a networked population based on a Distributed Alternating Direction Method of Multipliers (D-ADMM) algorithm. We consider a linearized Susceptible- Infected-Susceptible (SIS) epidemic spreading model in which agents in the network are able to allocate vaccination resources (for prevention) and antidotes (for treatment) in the presence of a contagion. We express our epidemic control condition as a spectral constraint involving the Perron-Frobenius eigenvalue, and formulate the resource allocation problem as a Geometric Program (GP). Next, we separate the network-wide optimization problem into subproblems optimally solved by each agent in a fully distributed way. We conclude the paper by illustrating performance of our solution framework with numerical simulations.
△ Less
Submitted 7 January, 2015;
originally announced January 2015.
-
Data-Driven Allocation of Vaccines for Controlling Epidemic Outbreaks
Authors:
Shuo Han,
Victor M. Preciado,
Cameron Nowzari,
George J. Pappas
Abstract:
We propose a mathematical framework, based on conic geometric programming, to control a susceptible-infected-susceptible viral spreading process taking place in a directed contact network with unknown contact rates. We assume that we have access to time series data describing the evolution of the spreading process observed by a collection of sensor nodes over a finite time interval. We propose a d…
▽ More
We propose a mathematical framework, based on conic geometric programming, to control a susceptible-infected-susceptible viral spreading process taking place in a directed contact network with unknown contact rates. We assume that we have access to time series data describing the evolution of the spreading process observed by a collection of sensor nodes over a finite time interval. We propose a data-driven robust convex optimization framework to find the optimal allocation of protection resources (e.g., vaccines and/or antidotes) to eradicate the viral spread at the fastest possible rate. In contrast to current network identification heuristics, in which a single network is identified to explain the observed data, we use available data to define an uncertainty set containing all networks that are coherent with empirical observations. Our characterization of this uncertainty set of networks is tractable in the context of conic geometric programming, recently proposed by Chandrasekaran and Shah, which allows us to efficiently find the optimal allocation of resources to control the worst-case spread that can take place in the uncertainty set of networks. We illustrate our approach in a transportation network from which we collect partial data about the dynamics of a hypothetical epidemic outbreak over a finite period of time.
△ Less
Submitted 5 December, 2014;
originally announced December 2014.
-
Differentially Private Distributed Constrained Optimization
Authors:
Shuo Han,
Ufuk Topcu,
George J. Pappas
Abstract:
Many resource allocation problems can be formulated as an optimization problem whose constraints contain sensitive information about participating users. This paper concerns solving this kind of optimization problem in a distributed manner while protecting the privacy of user information. Without privacy considerations, existing distributed algorithms normally consist in a central entity computing…
▽ More
Many resource allocation problems can be formulated as an optimization problem whose constraints contain sensitive information about participating users. This paper concerns solving this kind of optimization problem in a distributed manner while protecting the privacy of user information. Without privacy considerations, existing distributed algorithms normally consist in a central entity computing and broadcasting certain public coordination signals to participating users. However, the coordination signals often depend on user information, so that an adversary who has access to the coordination signals can potentially decode information on individual users and put user privacy at risk. We present a distributed optimization algorithm that preserves differential privacy, which is a strong notion that guarantees user privacy regardless of any auxiliary information an adversary may have. The algorithm achieves privacy by perturbing the public signals with additive noise, whose magnitude is determined by the sensitivity of the projection operation onto user-specified constraints. By viewing the differentially private algorithm as an implementation of stochastic gradient descent, we are able to derive a bound for the suboptimality of the algorithm. We illustrate the implementation of our algorithm via a case study of electric vehicle charging. Specifically, we derive the sensitivity and present numerical simulations for the algorithm. Through numerical simulations, we are able to investigate various aspects of the algorithm when being used in practice, including the choice of step size, number of iterations, and the trade-off between privacy level and suboptimality.
△ Less
Submitted 14 November, 2014;
originally announced November 2014.
-
Controllability and Fraction of Leaders in Infinite Network
Authors:
Chinwendu Enyioha,
Mohammad Amin Rahimian,
George J. Pappas,
Ali Jadbabaie
Abstract:
In this paper, we study controllability of a network of linear single-integrator agents when the network size goes to infinity. We first investigate the effect of increasing size by injecting an input at every node and requiring that network controllability Gramian remain well-conditioned with the increasing dimension. We provide theoretical justification to the intuition that high degree nodes po…
▽ More
In this paper, we study controllability of a network of linear single-integrator agents when the network size goes to infinity. We first investigate the effect of increasing size by injecting an input at every node and requiring that network controllability Gramian remain well-conditioned with the increasing dimension. We provide theoretical justification to the intuition that high degree nodes pose a challenge to network controllability. In particular, the controllability Gramian for the networks with bounded maximum degrees is shown to remain well-conditioned even as the network size goes to infinity. In the canonical cases of star, chain and ring networks, we also provide closed-form expressions which bound the condition number of the controllability Gramian in terms of the network size. We next consider the effect of the choice and number of leader nodes by actuating only a subset of nodes and considering the least eigenvalue of the Gramian as the network size increases. Accordingly, while a directed star topology can never be made controllable for all sizes by injecting an input just at a fraction $f<1$ of nodes; for path or cycle networks, the designer can actuate a non-zero fraction of nodes and spread them throughout the network in such way that the least eigenvalue of the Gramians remain bounded away from zero with the increasing size. The results offer interesting insights on the challenges of control in large networks and with high-degree nodes.
△ Less
Submitted 6 October, 2014;
originally announced October 2014.
-
Minimal Actuator Placement with Bounds on Control Effort
Authors:
V. Tzoumas,
M. A. Rahimian,
G. J. Pappas,
A. Jadbabaie
Abstract:
We address the problem of minimal actuator placement in linear systems so that the volume of the set of states reachable with one unit or less of input energy is lower bounded by a desired value. First, following the recent work of Olshevsky, we prove that this is NP-hard. Then, we provide an efficient algorithm which, for a given range of problem parameters, approximates up to a multiplicative fa…
▽ More
We address the problem of minimal actuator placement in linear systems so that the volume of the set of states reachable with one unit or less of input energy is lower bounded by a desired value. First, following the recent work of Olshevsky, we prove that this is NP-hard. Then, we provide an efficient algorithm which, for a given range of problem parameters, approximates up to a multiplicative factor of O(logn), n being the network size, any optimal actuator set that meets the same energy criteria; this is the best approximation factor one can achieve in polynomial time, in the worst case. Moreover, the algorithm uses a perturbed version of the involved control energy metric, which we prove to be supermodular. Next, we focus on the related problem of cardinality-constrained actuator placement for minimum control effort, where the optimal actuator set is selected to maximize the volume of the set of states reachable with one unit or less of input energy. While this is also an NP-hard problem, we use our proposed algorithm to efficiently approximate its solutions as well.
△ Less
Submitted 29 December, 2016; v1 submitted 10 September, 2014;
originally announced September 2014.
-
Joint Estimation and Localization in Sensor Networks
Authors:
Nikolay A. Atanasov,
Roberto Tron,
Victor M. Preciado,
George J. Pappas
Abstract:
This paper addresses the problem of collaborative tracking of dynamic targets in wireless sensor networks. A novel distributed linear estimator, which is a version of a distributed Kalman filter, is derived. We prove that the filter is mean square consistent in the case of static target estimation. When large sensor networks are deployed, it is common that the sensors do not have good knowledge of…
▽ More
This paper addresses the problem of collaborative tracking of dynamic targets in wireless sensor networks. A novel distributed linear estimator, which is a version of a distributed Kalman filter, is derived. We prove that the filter is mean square consistent in the case of static target estimation. When large sensor networks are deployed, it is common that the sensors do not have good knowledge of their locations, which affects the target estimation procedure. Unlike most existing approaches for target tracking, we investigate the performance of our filter when the sensor poses need to be estimated by an auxiliary localization procedure. The sensors are localized via a distributed Jacobi algorithm from noisy relative measurements. We prove strong convergence guarantees for the localization method and in turn for the joint localization and target estimation approach. The performance of our algorithms is demonstrated in simulation on environmental monitoring and target tracking tasks.
△ Less
Submitted 14 April, 2014;
originally announced April 2014.
-
Active Deformable Part Models
Authors:
Menglong Zhu,
Nikolay Atanasov,
George J. Pappas,
Kostas Daniilidis
Abstract:
This paper presents an active approach for part-based object detection, which optimizes the order of part filter evaluations and the time at which to stop and make a prediction. Statistics, describing the part responses, are learned from training data and are used to formalize the part scheduling problem as an offline optimization. Dynamic programming is applied to obtain a policy, which balances…
▽ More
This paper presents an active approach for part-based object detection, which optimizes the order of part filter evaluations and the time at which to stop and make a prediction. Statistics, describing the part responses, are learned from training data and are used to formalize the part scheduling problem as an offline optimization. Dynamic programming is applied to obtain a policy, which balances the number of part evaluations with the classification accuracy. During inference, the policy is used as a look-up table to choose the part order and the stop** time based on the observed filter responses. The method is faster than cascade detection with deformable part models (which does not optimize the part order) with negligible loss in accuracy when evaluated on the PASCAL VOC 2007 and 2010 datasets.
△ Less
Submitted 2 April, 2014; v1 submitted 1 April, 2014;
originally announced April 2014.
-
Differentially Private Convex Optimization with Piecewise Affine Objectives
Authors:
Shuo Han,
Ufuk Topcu,
George J. Pappas
Abstract:
Differential privacy is a recently proposed notion of privacy that provides strong privacy guarantees without any assumptions on the adversary. The paper studies the problem of computing a differentially private solution to convex optimization problems whose objective function is piecewise affine. Such problem is motivated by applications in which the affine functions that define the objective fun…
▽ More
Differential privacy is a recently proposed notion of privacy that provides strong privacy guarantees without any assumptions on the adversary. The paper studies the problem of computing a differentially private solution to convex optimization problems whose objective function is piecewise affine. Such problem is motivated by applications in which the affine functions that define the objective function contain sensitive user information. We propose several privacy preserving mechanisms and provide analysis on the trade-offs between optimality and the level of privacy for these mechanisms. Numerical experiments are also presented to evaluate their performance in practice.
△ Less
Submitted 24 March, 2014;
originally announced March 2014.
-
Distributed Algorithms for Stochastic Source Seeking with Mobile Robot Networks: Technical Report
Authors:
Nikolay A. Atanasov,
Jerome Le Ny,
George J. Pappas
Abstract:
Autonomous robot networks are an effective tool for monitoring large-scale environmental fields. This paper proposes distributed control strategies for localizing the source of a noisy signal, which could represent a physical quantity of interest such as magnetic force, heat, radio signal, or chemical concentration. We develop algorithms specific to two scenarios: one in which the sensors have a p…
▽ More
Autonomous robot networks are an effective tool for monitoring large-scale environmental fields. This paper proposes distributed control strategies for localizing the source of a noisy signal, which could represent a physical quantity of interest such as magnetic force, heat, radio signal, or chemical concentration. We develop algorithms specific to two scenarios: one in which the sensors have a precise model of the signal formation process and one in which a signal model is not available. In the model-free scenario, a team of sensors is used to follow a stochastic gradient of the signal field. Our approach is distributed, robust to deformations in the group geometry, does not necessitate global localization, and is guaranteed to lead the sensors to a neighborhood of a local maximum of the field. In the model-based scenario, the sensors follow the stochastic gradient of the mutual information between their expected measurements and the location of the source in a distributed manner. The performance is demonstrated in simulation using a robot sensor network to localize the source of a wireless radio signal.
△ Less
Submitted 10 April, 2014; v1 submitted 31 January, 2014;
originally announced February 2014.
-
Nonmyopic View Planning for Active Object Detection
Authors:
Nikolay Atanasov,
Bharath Sankaran,
Jerome Le Ny,
George J. Pappas,
Kostas Daniilidis
Abstract:
One of the central problems in computer vision is the detection of semantically important objects and the estimation of their pose. Most of the work in object detection has been based on single image processing and its performance is limited by occlusions and ambiguity in appearance and geometry. This paper proposes an active approach to object detection by controlling the point of view of a mobil…
▽ More
One of the central problems in computer vision is the detection of semantically important objects and the estimation of their pose. Most of the work in object detection has been based on single image processing and its performance is limited by occlusions and ambiguity in appearance and geometry. This paper proposes an active approach to object detection by controlling the point of view of a mobile depth camera. When an initial static detection phase identifies an object of interest, several hypotheses are made about its class and orientation. The sensor then plans a sequence of views, which balances the amount of energy used to move with the chance of identifying the correct hypothesis. We formulate an active hypothesis testing problem, which includes sensor mobility, and solve it using a point-based approximate POMDP algorithm. The validity of our approach is verified through simulation and real-world experiments with the PR2 robot. The results suggest that our approach outperforms the widely-used greedy view point selection and provides a significant improvement over static object detection.
△ Less
Submitted 20 September, 2013;
originally announced September 2013.
-
Information Acquisition with Sensing Robots: Algorithms and Error Bounds
Authors:
Nikolay Atanasov,
Jerome Le Ny,
Kostas Daniilidis,
George J. Pappas
Abstract:
Utilizing the capabilities of configurable sensing systems requires addressing difficult information gathering problems. Near-optimal approaches exist for sensing systems without internal states. However, when it comes to optimizing the trajectories of mobile sensors the solutions are often greedy and rarely provide performance guarantees. Notably, under linear Gaussian assumptions, the problem be…
▽ More
Utilizing the capabilities of configurable sensing systems requires addressing difficult information gathering problems. Near-optimal approaches exist for sensing systems without internal states. However, when it comes to optimizing the trajectories of mobile sensors the solutions are often greedy and rarely provide performance guarantees. Notably, under linear Gaussian assumptions, the problem becomes deterministic and can be solved off-line. Approaches based on submodularity have been applied by ignoring the sensor dynamics and greedily selecting informative locations in the environment. This paper presents a non-greedy algorithm with suboptimality guarantees, which does not rely on submodularity and takes the sensor dynamics into account. Our method performs provably better than the widely used greedy one. Coupled with linearization and model predictive control, it can be used to generate adaptive policies for mobile sensors with non-linear sensing models. Applications in gas concentration map** and target tracking are presented.
△ Less
Submitted 20 September, 2013;
originally announced September 2013.
-
Differentially Private Kalman Filtering
Authors:
Jerome Le Ny,
George J. Pappas
Abstract:
This paper studies the H2 (Kalman) filtering problem in the situation where a signal estimate must be constructed based on inputs from individual participants, whose data must remain private. This problem arises in emerging applications such as smart grids or intelligent transportation systems, where users continuously send data to third-party aggregators performing global monitoring or control ta…
▽ More
This paper studies the H2 (Kalman) filtering problem in the situation where a signal estimate must be constructed based on inputs from individual participants, whose data must remain private. This problem arises in emerging applications such as smart grids or intelligent transportation systems, where users continuously send data to third-party aggregators performing global monitoring or control tasks, and require guarantees that this data cannot be used to infer additional personal information. To provide strong formal privacy guarantees against adversaries with arbitrary side information, we rely on the notion of differential privacy introduced relatively recently in the database literature. This notion is extended to dynamic systems with many participants contributing independent input signals, and mechanisms are then proposed to solve the H2 filtering problem with a differential privacy constraint. A method for mitigating the impact of the privacy-inducing mechanism on the estimation performance is described, which relies on controlling the Hinfinity norm of the filter. Finally, we discuss an application to a privacy-preserving traffic monitoring system.
△ Less
Submitted 19 July, 2012;
originally announced July 2012.
-
Differentially Private Filtering
Authors:
Jerome Le Ny,
George J. Pappas
Abstract:
Emerging systems such as smart grids or intelligent transportation systems often require end-user applications to continuously send information to external data aggregators performing monitoring or control tasks. This can result in an undesirable loss of privacy for the users in exchange of the benefits provided by the application. Motivated by this trend, this paper introduces privacy concerns in…
▽ More
Emerging systems such as smart grids or intelligent transportation systems often require end-user applications to continuously send information to external data aggregators performing monitoring or control tasks. This can result in an undesirable loss of privacy for the users in exchange of the benefits provided by the application. Motivated by this trend, this paper introduces privacy concerns in a system theoretic context, and addresses the problem of releasing filtered signals that respect the privacy of the user data streams. Our approach relies on a formal notion of privacy from the database literature, called differential privacy, which provides strong privacy guarantees against adversaries with arbitrary side information. Methods are developed to approximate a given filter by a differentially private version, so that the distortion introduced by the privacy mechanism is minimized. Two specific scenarios are considered. First, the notion of differential privacy is extended to dynamic systems with many participants contributing independent input signals. Kalman filtering is also discussed in this context, when a released output signal must preserve differential privacy for the measured signals or state trajectories of the individual participants. Second, differentially private mechanisms are described to approximate stable filters when participants contribute to a single event stream, extending previous work on differential privacy under continual observation.
△ Less
Submitted 10 September, 2012; v1 submitted 18 July, 2012;
originally announced July 2012.
-
Adaptive Algorithms for Coverage Control and Space Partitioning in Mobile Robotic Networks
Authors:
Jerome Le Ny,
George J. Pappas
Abstract:
This paper considers deployment problems where a mobile robotic network must optimize its configuration in a distributed way in order to minimize a steady-state cost function that depends on the spatial distribution of certain probabilistic events of interest. Moreover, it is assumed that the event location distribution is a priori unknown, and can only be progressively inferred from the observati…
▽ More
This paper considers deployment problems where a mobile robotic network must optimize its configuration in a distributed way in order to minimize a steady-state cost function that depends on the spatial distribution of certain probabilistic events of interest. Moreover, it is assumed that the event location distribution is a priori unknown, and can only be progressively inferred from the observation of the actual event occurrences. Three classes of problems are discussed in detail: coverage control problems, spatial partitioning problems, and dynamic vehicle routing problems. In each case, distributed stochastic gradient algorithms optimizing the performance objective are presented. The stochastic gradient view simplifies and generalizes previously proposed solutions, and is applicable to new complex scenarios, such as adaptive coverage involving heterogeneous agents. Remarkably, these algorithms often take the form of simple distributed rules that could be implemented on resource-limited platforms.
△ Less
Submitted 16 August, 2012; v1 submitted 2 November, 2010;
originally announced November 2010.
-
Distributed Control of the Laplacian Spectral Moments of a Network
Authors:
Victor M. Preciado,
Michael M. Zavlanos,
Ali Jadbabaie,
George J. Pappas
Abstract:
It is well-known that the eigenvalue spectrum of the Laplacian matrix of a network contains valuable information about the network structure and the behavior of many dynamical processes run on it. In this paper, we propose a fully decentralized algorithm that iteratively modifies the structure of a network of agents in order to control the moments of the Laplacian eigenvalue spectrum. Although t…
▽ More
It is well-known that the eigenvalue spectrum of the Laplacian matrix of a network contains valuable information about the network structure and the behavior of many dynamical processes run on it. In this paper, we propose a fully decentralized algorithm that iteratively modifies the structure of a network of agents in order to control the moments of the Laplacian eigenvalue spectrum. Although the individual agents have knowledge of their local network structure only (i.e., myopic information), they are collectively able to aggregate this local information and decide on what links are most beneficial to be added or removed at each time step. Our approach relies on gossip algorithms to distributively compute the spectral moments of the Laplacian matrix, as well as ensure network connectivity in the presence of link deletions. We illustrate our approach in nontrivial computer simulations and show that a good final approximation of the spectral moments of the target Laplacian matrix is achieved for many cases of interest.
△ Less
Submitted 22 January, 2010;
originally announced January 2010.
-
Approximate reduction of dynamical systems
Authors:
Paulo Tabuada,
Aaron D. Ames,
Agung Julius,
George J. Pappas
Abstract:
The reduction of dynamical systems has a rich history, with many important applications related to stability, control and verification. Reduction of nonlinear systems is typically performed in an exact manner - as is the case with mechanical systems with symmetry--which, unfortunately, limits the type of systems to which it can be applied. The goal of this paper is to consider a more general for…
▽ More
The reduction of dynamical systems has a rich history, with many important applications related to stability, control and verification. Reduction of nonlinear systems is typically performed in an exact manner - as is the case with mechanical systems with symmetry--which, unfortunately, limits the type of systems to which it can be applied. The goal of this paper is to consider a more general form of reduction, termed approximate reduction, in order to extend the class of systems that can be reduced. Using notions related to incremental stability, we give conditions on when a dynamical system can be projected to a lower dimensional space while providing hard bounds on the induced errors, i.e., when it is behaviorally similar to a dynamical system on a lower dimensional space. These concepts are illustrated on a series of examples.
△ Less
Submitted 25 July, 2007;
originally announced July 2007.