-
Optimizing Sensor Network Design for Multiple Coverage
Authors:
Lukas Taus,
Yen-Hsi Richard Tsai
Abstract:
Sensor placement optimization methods have been studied extensively. They can be applied to a wide range of applications, including surveillance of known environments, optimal locations for 5G towers, and placement of missile defense systems. However, few works explore the robustness and efficiency of the resulting sensor network concerning sensor failure or adversarial attacks. This paper address…
▽ More
Sensor placement optimization methods have been studied extensively. They can be applied to a wide range of applications, including surveillance of known environments, optimal locations for 5G towers, and placement of missile defense systems. However, few works explore the robustness and efficiency of the resulting sensor network concerning sensor failure or adversarial attacks. This paper addresses this issue by optimizing for the least number of sensors to achieve multiple coverage of non-simply connected domains by a prescribed number of sensors. We introduce a new objective function for the greedy (next-best-view) algorithm to design efficient and robust sensor networks and derive theoretical bounds on the network's optimality. We further introduce a Deep Learning model to accelerate the algorithm for near real-time computations. The Deep Learning model requires the generation of training examples. Correspondingly, we show that understanding the geometric properties of the training data set provides important insights into the performance and training process of deep learning techniques. Finally, we demonstrate that a simple parallel version of the greedy approach using a simpler objective can be highly competitive.
△ Less
Submitted 20 May, 2024; v1 submitted 15 May, 2024;
originally announced May 2024.
-
Data-induced multiscale losses and efficient multirate gradient descent schemes
Authors:
Juncai He,
Liangchen Liu,
Yen-Hsi Richard Tsai
Abstract:
This paper investigates the impact of multiscale data on machine learning algorithms, particularly in the context of deep learning. A dataset is multiscale if its distribution shows large variations in scale across different directions. This paper reveals multiscale structures in the loss landscape, including its gradients and Hessians inherited from the data. Correspondingly, it introduces a nove…
▽ More
This paper investigates the impact of multiscale data on machine learning algorithms, particularly in the context of deep learning. A dataset is multiscale if its distribution shows large variations in scale across different directions. This paper reveals multiscale structures in the loss landscape, including its gradients and Hessians inherited from the data. Correspondingly, it introduces a novel gradient descent approach, drawing inspiration from multiscale algorithms used in scientific computing. This approach seeks to transcend empirical learning rate selection, offering a more systematic, data-informed strategy to enhance training efficiency, especially in the later stages.
△ Less
Submitted 6 February, 2024; v1 submitted 5 February, 2024;
originally announced February 2024.
-
Efficient and robust Sensor Placement in Complex Environments
Authors:
Lukas Taus,
Yen-Hsi Richard Tsai
Abstract:
We address the problem of efficient and unobstructed surveillance or communication in complex environments. On one hand, one wishes to use a minimal number of sensors to cover the environment. On the other hand, it is often important to consider solutions that are robust against sensor failure or adversarial attacks. This paper addresses these challenges of designing minimal sensor sets that achie…
▽ More
We address the problem of efficient and unobstructed surveillance or communication in complex environments. On one hand, one wishes to use a minimal number of sensors to cover the environment. On the other hand, it is often important to consider solutions that are robust against sensor failure or adversarial attacks. This paper addresses these challenges of designing minimal sensor sets that achieve multi-coverage constraints -- every point in the environment is covered by a prescribed number of sensors. We propose a greedy algorithm to achieve the objective. Further, we explore deep learning techniques to accelerate the evaluation of the objective function formulated in the greedy algorithm. The training of the neural network reveals that the geometric properties of the data significantly impact the network's performance, particularly at the end stage. By taking into account these properties, we discuss the differences in using greedy and $ε$-greedy algorithms to generate data and their impact on the robustness of the network.
△ Less
Submitted 15 September, 2023;
originally announced September 2023.
-
Visibility Optimization for Surveillance-Evasion Games
Authors:
Louis Ly,
Yen-Hsi Richard Tsai
Abstract:
We consider surveillance-evasion differential games, where a pursuer must try to constantly maintain visibility of a moving evader. The pursuer loses as soon as the evader becomes occluded. Optimal controls for game can be formulated as a Hamilton-Jacobi-Isaac equation. We use an upwind scheme to compute the feedback value function, corresponding to the end-game time of the differential game. Alth…
▽ More
We consider surveillance-evasion differential games, where a pursuer must try to constantly maintain visibility of a moving evader. The pursuer loses as soon as the evader becomes occluded. Optimal controls for game can be formulated as a Hamilton-Jacobi-Isaac equation. We use an upwind scheme to compute the feedback value function, corresponding to the end-game time of the differential game. Although the value function enables optimal controls, it is prohibitively expensive to compute, even for a single pursuer and single evader on a small grid. We consider a discrete variant of the surveillance-game. We propose two locally optimal strategies based on the static value function for the surveillance-evasion game with multiple pursuers and evaders. We show that Monte Carlo tree search and self-play reinforcement learning can train a deep neural network to generate reasonable strategies for on-line game play. Given enough computational resources and offline training time, the proposed model can continue to improve its policies and efficiently scale to higher resolutions.
△ Less
Submitted 26 March, 2022; v1 submitted 18 October, 2020;
originally announced October 2020.
-
Nearest Neighbor Sampling of Point Sets using Rays
Authors:
Liangchen Liu,
Louis Ly,
Colin Macdonald,
Yen-Hsi Richard Tsai
Abstract:
We propose a new framework for the sampling, compression, and analysis of distributions of point sets and other geometric objects embedded in Euclidean spaces. Our approach involves constructing a tensor called the RaySense sketch, which captures nearest neighbors from the underlying geometry of points along a set of rays. We explore various operations that can be performed on the RaySense sketch,…
▽ More
We propose a new framework for the sampling, compression, and analysis of distributions of point sets and other geometric objects embedded in Euclidean spaces. Our approach involves constructing a tensor called the RaySense sketch, which captures nearest neighbors from the underlying geometry of points along a set of rays. We explore various operations that can be performed on the RaySense sketch, leading to different properties and potential applications. Statistical information about the data set can be extracted from the sketch, independent of the ray set. Line integrals on point sets can be efficiently computed using the sketch. We also present several examples illustrating applications of the proposed strategy in practical scenarios.
△ Less
Submitted 13 September, 2023; v1 submitted 25 November, 2019;
originally announced November 2019.
-
Greedy Algorithms for Sparse Sensor Placement via Deep Learning
Authors:
Louis Ly,
Yen-Hsi Richard Tsai
Abstract:
We consider the exploration problem: an agent equipped with a depth sensor must map out a previously unknown environment using as few sensor measurements as possible. We propose an approach based on supervised learning of a greedy algorithm. We provide a bound on the optimality of the greedy algorithm using submodularity theory. Using a level set representation, we train a convolutional neural net…
▽ More
We consider the exploration problem: an agent equipped with a depth sensor must map out a previously unknown environment using as few sensor measurements as possible. We propose an approach based on supervised learning of a greedy algorithm. We provide a bound on the optimality of the greedy algorithm using submodularity theory. Using a level set representation, we train a convolutional neural network to determine vantage points that maximize visibility. We show that this method drastically reduces the on-line computational cost and determines a small set of vantage points that solve the problem. This enables us to efficiently produce highly-resolved and topologically accurate maps of complex 3D environments. Unlike traditional next-best-view and frontier-based strategies, the proposed method accounts for geometric priors while evaluating potential vantage points. While existing deep learning approaches focus on obstacle avoidance and local navigation, our method aims at finding near-optimal solutions to the more global exploration problem. We present realistic simulations on 2D and 3D urban environments.
△ Less
Submitted 26 March, 2022; v1 submitted 17 September, 2018;
originally announced September 2018.
-
Growth rate of crystal surfaces with several dislocation centers
Authors:
Takeshi Ohtsuka,
Yen-Hsi Richard Tsai,
Yoshikazu Giga
Abstract:
We study analytically and numerical the growth rate of a crystal surface growing by several screw dislocations. To describe several spiral steps we use the revised level set method for spirals by the authors (Journal of Scientific Computing 62, 831-874, 2015). We carefully compare our simulation results on the growth rates with predictions in a classical paper by Burton et al. (Philos Trans R Soc…
▽ More
We study analytically and numerical the growth rate of a crystal surface growing by several screw dislocations. To describe several spiral steps we use the revised level set method for spirals by the authors (Journal of Scientific Computing 62, 831-874, 2015). We carefully compare our simulation results on the growth rates with predictions in a classical paper by Burton et al. (Philos Trans R Soc Lond Ser A Math Phys Sci 243,299-358, 1951). Then, we propose improved estimates on the growth rate with several different configurations, which are in agreement with our numerical simulations. The influence of distribution of screw dislocations in a group on a line to the growth rate, and the growth rate by a group including different rotational orientations of spirals are also studied in this paper.
△ Less
Submitted 15 June, 2017; v1 submitted 28 December, 2016;
originally announced December 2016.
-
Fast Swee** Methods for Hyperbolic Systems of Conservation Laws at Steady State II
Authors:
Bjorn Engquist,
Brittany D. Froese,
Yen-Hsi Richard Tsai
Abstract:
The idea of using fast swee** methods for solving stationary systems of conservation laws has previously been proposed for efficiently computing solutions with sharp shocks. We further develop these methods to allow for a more challenging class of problems including problems with sonic points, shocks originating in the interior of the domain, rarefaction waves, and two-dimensional systems. We sh…
▽ More
The idea of using fast swee** methods for solving stationary systems of conservation laws has previously been proposed for efficiently computing solutions with sharp shocks. We further develop these methods to allow for a more challenging class of problems including problems with sonic points, shocks originating in the interior of the domain, rarefaction waves, and two-dimensional systems. We show that fast swee** methods can produce higher-order accuracy. Computational results validate the claims of accuracy, sharp shock curves, and optimal computational efficiency.
△ Less
Submitted 24 October, 2014; v1 submitted 31 March, 2014;
originally announced April 2014.
-
Fast Swee** Methods for Hyperbolic Systems of Conservation Laws at Steady State
Authors:
Bjorn Engquist,
Brittany D. Froese,
Yen-Hsi Richard Tsai
Abstract:
Fast swee** methods have become a useful tool for computing the solutions of static Hamilton-Jacobi equations. By adapting the main idea behind these methods, we describe a new approach for computing steady state solutions to systems of conservation laws. By exploiting the flow of information along characteristics, these fast swee** methods can compute solutions very efficiently. Furthermore,…
▽ More
Fast swee** methods have become a useful tool for computing the solutions of static Hamilton-Jacobi equations. By adapting the main idea behind these methods, we describe a new approach for computing steady state solutions to systems of conservation laws. By exploiting the flow of information along characteristics, these fast swee** methods can compute solutions very efficiently. Furthermore, the methods capture shocks sharply by directly imposing the Rankine-Hugoniot shock conditions. We present convergence analysis and numerics for several one- and two-dimensional examples to illustrate the use and advantages of this approach.
△ Less
Submitted 3 June, 2013;
originally announced June 2013.
-
Automated polyp detection in colon capsule endoscopy
Authors:
Alexander V. Mamonov,
Isabel N. Figueiredo,
Pedro N. Figueiredo,
Yen-Hsi Richard Tsai
Abstract:
Colorectal polyps are important precursors to colon cancer, a major health problem. Colon capsule endoscopy (CCE) is a safe and minimally invasive examination procedure, in which the images of the intestine are obtained via digital cameras on board of a small capsule ingested by a patient. The video sequence is then analyzed for the presence of polyps. We propose an algorithm that relieves the lab…
▽ More
Colorectal polyps are important precursors to colon cancer, a major health problem. Colon capsule endoscopy (CCE) is a safe and minimally invasive examination procedure, in which the images of the intestine are obtained via digital cameras on board of a small capsule ingested by a patient. The video sequence is then analyzed for the presence of polyps. We propose an algorithm that relieves the labor of a human operator analyzing the frames in the video sequence. The algorithm acts as a binary classifier, which labels the frame as either containing polyps or not, based on the geometrical analysis and the texture content of the frame. The geometrical analysis is based on a segmentation of an image with the help of a mid-pass filter. The features extracted by the segmentation procedure are classified according to an assumption that the polyps are characterized as protrusions that are mostly round in shape. Thus, we use a best fit ball radius as a decision parameter of a binary classifier. We present a statistical study of the performance of our approach on a data set containing over 18,900 frames from the endoscopic video sequences of five adult patients. The algorithm demonstrates a solid performance, achieving 47% sensitivity per frame and over 81% sensitivity per polyp at a specificity level of 90%. On average, with a video sequence length of 3747 frames, only 367 false positive frames need to be inspected by a human operator.
△ Less
Submitted 27 March, 2014; v1 submitted 8 May, 2013;
originally announced May 2013.
-
Point source identification in non-linear advection-diffusion-reaction systems
Authors:
Alexander V. Mamonov,
Yen-Hsi Richard Tsai
Abstract:
We consider a problem of identification of point sources in time dependent advection-diffusion systems with a non-linear reaction term. The linear counterpart of the problem in question can be reduced to solving a system of non-linear algebraic equations via the use of adjoint equations. We extend this approach by constructing an algorithm that solves the problem iteratively to account for the non…
▽ More
We consider a problem of identification of point sources in time dependent advection-diffusion systems with a non-linear reaction term. The linear counterpart of the problem in question can be reduced to solving a system of non-linear algebraic equations via the use of adjoint equations. We extend this approach by constructing an algorithm that solves the problem iteratively to account for the non-linearity of the reaction term. We study the question of improving the quality of source identification by adding more measurements adaptively using the solution obtained previously with a smaller number of measurements.
△ Less
Submitted 1 March, 2013; v1 submitted 10 February, 2012;
originally announced February 2012.