-
GAMEOPT+: Improving Fuel Efficiency in Unregulated Heterogeneous Traffic Intersections via Optimal Multi-agent Cooperative Control
Authors:
Nilesh Suriyarachchi,
Rohan Chandra,
Arya Anantula,
John S. Baras,
Dinesh Manocha
Abstract:
Better fuel efficiency leads to better financial security as well as a cleaner environment. We propose a novel approach for improving fuel efficiency in unstructured and unregulated traffic environments. Existing intelligent transportation solutions for improving fuel efficiency, however, apply only to traffic intersections with sparse traffic or traffic where drivers obey the regulations, or both…
▽ More
Better fuel efficiency leads to better financial security as well as a cleaner environment. We propose a novel approach for improving fuel efficiency in unstructured and unregulated traffic environments. Existing intelligent transportation solutions for improving fuel efficiency, however, apply only to traffic intersections with sparse traffic or traffic where drivers obey the regulations, or both. We propose GameOpt+, a novel hybrid approach for cooperative intersection control in dynamic, multi-lane, unsignalized intersections. GameOpt+ is a hybrid solution that combines an auction mechanism and an optimization-based trajectory planner. It generates a priority entrance sequence for each agent and computes velocity controls in real-time, taking less than 10 milliseconds even in high-density traffic with over 10,000 vehicles per hour. Compared to fully optimization-based methods, it operates 100 times faster while ensuring fairness, safety, and efficiency. Tested on the SUMO simulator, our algorithm improves throughput by at least 25%, reduces the time to reach the goal by at least 70%, and decreases fuel consumption by 50% compared to auction-based and signaled approaches using traffic lights and stop signs. GameOpt+ is also unaffected by unbalanced traffic inflows, whereas some of the other baselines encountered a decrease in performance in unbalanced traffic inflow environments.
△ Less
Submitted 26 May, 2024;
originally announced May 2024.
-
Networked Control with Hybrid Automatic Repeat Request Protocols
Authors:
Touraj Soleymani,
John S. Baras,
Deniz Gündüz
Abstract:
We study feedback control of a dynamical process over a lossy channel equipped with a hybrid automatic repeat request protocol that connects a sensor to an actuator. The dynamical process is modeled by a Gauss-Markov process, and the lossy channel by a packet-erasure channel with ideal feedback. We suppose that data is communicated in the format of packets with negligible quantization error. In su…
▽ More
We study feedback control of a dynamical process over a lossy channel equipped with a hybrid automatic repeat request protocol that connects a sensor to an actuator. The dynamical process is modeled by a Gauss-Markov process, and the lossy channel by a packet-erasure channel with ideal feedback. We suppose that data is communicated in the format of packets with negligible quantization error. In such a networked control system, whenever a packet loss occurs, there exists a tradeoff between transmitting new sensory information with a lower success probability and retransmitting previously failed sensory information with a higher success probability. In essence, an inherent tradeoff between freshness and reliability. To address this tradeoff, we consider a linear-quadratic-regulator performance index, which penalizes state deviations and control efforts over a finite horizon, and jointly design optimal policies for an encoder and a decoder, which are collocated with the sensor and the actuator, respectively. Our emphasis here lies specifically on designing switching and control policies, rather than error-correcting codes. We derive the structural properties of the optimal encoding and decoding policies. We show that the former is a threshold switching policy and the latter is a certainty-equivalent control policy. In addition, we specify the iterative equations that the encoder and the decoder need to solve in order to implement the optimal policies.
△ Less
Submitted 12 May, 2024;
originally announced May 2024.
-
Robust Resource Sharing in Network Slicing via Hypothesis Testing
Authors:
Panagiotis Nikolaidis,
John Baras
Abstract:
In network slicing, the network operator needs to satisfy the service level agreements of multiple slices at the same time and on the same physical infrastructure. To do so with reduced provisioned resources, the operator may consider resource sharing mechanisms. However, each slice then becomes susceptible to traffic surges in other slices which degrades performance isolation. To maintain both hi…
▽ More
In network slicing, the network operator needs to satisfy the service level agreements of multiple slices at the same time and on the same physical infrastructure. To do so with reduced provisioned resources, the operator may consider resource sharing mechanisms. However, each slice then becomes susceptible to traffic surges in other slices which degrades performance isolation. To maintain both high efficiency and high isolation, we propose the introduction of hypothesis testing in resource sharing. Our approach comprises two phases. In the trial phase, the operator obtains a stochastic model for each slice that describes its normal behavior, provisions resources and then signs the service level agreements. In the regular phase, whenever there is resource contention, hypothesis testing is conducted to check which slices follow their normal behavior. Slices that fail the test are excluded from resource sharing to protect the well-behaved ones. We test our approach on a mobile traffic dataset. Results show that our approach fortifies the service level agreements against unexpected traffic patterns and achieves high efficiency via resource sharing. Overall, our approach provides an appealing tradeoff between efficiency and isolation.
△ Less
Submitted 28 April, 2024;
originally announced April 2024.
-
Consistency of Value of Information: Effects of Packet Loss and Time Delay in Networked Control Systems Tasks
Authors:
Touraj Soleymani,
John S. Baras,
Siyi Wang,
Sandra Hirche,
Karl H. Johansson
Abstract:
In this chapter, we study the consistency of the value of information$\unicode{x2014}$a semantic metric that claims to determine the right piece of information in networked control systems tasks$\unicode{x2014}$in a lossy and delayed communication regime. Our analysis begins with a focus on state estimation, and subsequently extends to feedback control. To that end, we make a causal tradeoff betwe…
▽ More
In this chapter, we study the consistency of the value of information$\unicode{x2014}$a semantic metric that claims to determine the right piece of information in networked control systems tasks$\unicode{x2014}$in a lossy and delayed communication regime. Our analysis begins with a focus on state estimation, and subsequently extends to feedback control. To that end, we make a causal tradeoff between the packet rate and the mean square error. Associated with this tradeoff, we demonstrate the existence of an optimal policy profile, comprising a symmetric threshold scheduling policy based on the value of information for the encoder and a non-Gaussian linear estimation policy for the decoder. Our structural results assert that the scheduling policy is expressible in terms of $3d-1$ variables related to the source and the channel, where $d$ is the time delay, and that the estimation policy incorporates no residual related to signaling. We then construct an optimal control policy by exploiting the separation principle.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Foundations of Value of Information: A Semantic Metric for Networked Control Systems Tasks
Authors:
Touraj Soleymani,
John S. Baras,
Sandra Hirche,
Karl H. Johansson
Abstract:
In this chapter, we present our recent invention, i.e., the notion of the value of information$\unicode{x2014}$a semantic metric that is fundamental for networked control systems tasks. We begin our analysis by formulating a causal tradeoff between the packet rate and the regulation cost, with an encoder and a decoder as two distributed decision makers, and show that the valuation of information i…
▽ More
In this chapter, we present our recent invention, i.e., the notion of the value of information$\unicode{x2014}$a semantic metric that is fundamental for networked control systems tasks. We begin our analysis by formulating a causal tradeoff between the packet rate and the regulation cost, with an encoder and a decoder as two distributed decision makers, and show that the valuation of information is conceivable and quantifiable grounded on this tradeoff. More precisely, we characterize an equilibrium, and quantify the value of information there as the variation in a value function with respect to a piece of sensory measurement that can be communicated from the encoder to the decoder at each time. We prove that, in feedback control of a dynamical process over a noiseless channel, the value of information is a function of the discrepancy between the state estimates at the encoder and the decoder, and that a data packet containing a sensory measurement at each time should be exchanged only if the value of information at that time is nonnegative. Finally, we prove that the characterized equilibrium is in fact globally optimal.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Relation between Value and Age of Information in Feedback Control
Authors:
Touraj Soleymani,
John S. Baras,
Karl H. Johansson
Abstract:
In this chapter, we investigate the value of information as a more comprehensive instrument than the age of information for optimally sha** the information flow in a networked control system. In particular, we quantify the value of information based on the variation in a value function, and discuss the structural properties of this metric. Through our analysis, we establish the mathematical rela…
▽ More
In this chapter, we investigate the value of information as a more comprehensive instrument than the age of information for optimally sha** the information flow in a networked control system. In particular, we quantify the value of information based on the variation in a value function, and discuss the structural properties of this metric. Through our analysis, we establish the mathematical relation between the value of information and the age of information. We prove that the value of information is in general a function of an estimation discrepancy that depends on the age of information and the primitive variables. In addition, we prove that there exists a condition under which the value of information becomes completely expressible in terms of the age of information. Nonetheless, we show that this condition is not achievable without a degradation in the performance of the system.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Towards Efficient Risk-Sensitive Policy Gradient: An Iteration Complexity Analysis
Authors:
Rui Liu,
Erfaun Noorani,
Pratap Tokekar,
John S. Baras
Abstract:
Reinforcement Learning (RL) has shown exceptional performance across various applications, enabling autonomous agents to learn optimal policies through interaction with their environments. However, traditional RL frameworks often face challenges in terms of iteration complexity and robustness. Risk-sensitive RL, which balances expected return and risk, has been explored for its potential to yield…
▽ More
Reinforcement Learning (RL) has shown exceptional performance across various applications, enabling autonomous agents to learn optimal policies through interaction with their environments. However, traditional RL frameworks often face challenges in terms of iteration complexity and robustness. Risk-sensitive RL, which balances expected return and risk, has been explored for its potential to yield probabilistically robust policies, yet its iteration complexity analysis remains underexplored. In this study, we conduct a thorough iteration complexity analysis for the risk-sensitive policy gradient method, focusing on the REINFORCE algorithm and employing the exponential utility function. We obtain an iteration complexity of $\mathcal{O}(ε^{-2})$ to reach an $ε$-approximate first-order stationary point (FOSP). We investigate whether risk-sensitive algorithms can achieve better iteration complexity compared to their risk-neutral counterparts. Our theoretical analysis demonstrates that risk-sensitive REINFORCE can have a reduced number of iterations required for convergence. This leads to improved iteration complexity, as employing the exponential utility does not entail additional computation per iteration. We characterize the conditions under which risk-sensitive algorithms can achieve better iteration complexity. Our simulation results also validate that risk-averse cases can converge and stabilize more quickly after approximately half of the episodes compared to their risk-neutral counterparts.
△ Less
Submitted 13 March, 2024;
originally announced March 2024.
-
Data-driven Bandwidth Adaptation for Radio Access Network Slices
Authors:
Panagiotis Nikolaidis,
Asim Zoulkarni,
John Baras
Abstract:
The need to satisfy the QoS requirements of multiple network slices deployed at the same base station poses a major challenge to network operators. The problem becomes even harder when the desired QoS involves packet delays. In that case, network utility maximization is not directly applicable since the utilities of the slices are unknown. As a result, most related works learn online the utilities…
▽ More
The need to satisfy the QoS requirements of multiple network slices deployed at the same base station poses a major challenge to network operators. The problem becomes even harder when the desired QoS involves packet delays. In that case, network utility maximization is not directly applicable since the utilities of the slices are unknown. As a result, most related works learn online the utilities of all slices and how to split the resources among them. Unfortunately, this approach does not scale well for many slices. Instead, it is needed to perform learning separately for each slice. To this end, we develop a bandwidth demand estimator; a network function that periodically receives as input the traffic of the slice and outputs the amount of bandwidth that its MAC scheduler needs to deliver the desired QoS. We develop the bandwidth demand estimator for QoS involving packet delay metrics based on a model-based reinforcement learning algorithm. We implement the algorithm on a cellular testbed and conduct experiments with time-varying traffic loads. Results show that the algorithm delivers the desired QoS but with significantly less bandwidth than non-adaptive approaches and other baseline online learning algorithms.
△ Less
Submitted 28 April, 2024; v1 submitted 28 November, 2023;
originally announced November 2023.
-
Cooperative Bidirectional Mixed-Traffic Overtaking
Authors:
Faizan M. Tariq,
Nilesh Suriyarachchi,
Christos Mavridis,
John S. Baras
Abstract:
Safe overtaking, especially in a bidirectional mixed-traffic setting, remains a key challenge for Connected Autonomous Vehicles (CAVs). The presence of human-driven vehicles (HDVs), behavior unpredictability, and blind spots resulting from sensor occlusion make this a challenging control problem. To overcome these difficulties, we propose a cooperative communication-based approach that utilizes th…
▽ More
Safe overtaking, especially in a bidirectional mixed-traffic setting, remains a key challenge for Connected Autonomous Vehicles (CAVs). The presence of human-driven vehicles (HDVs), behavior unpredictability, and blind spots resulting from sensor occlusion make this a challenging control problem. To overcome these difficulties, we propose a cooperative communication-based approach that utilizes the information shared between CAVs to reduce the effects of sensor occlusion while benefiting from the local velocity prediction based on past tracking data. Our control framework aims to perform overtaking maneuvers with the objective of maximizing velocity while prioritizing safety and passenger comfort. Our method is also capable of reactively adjusting its plan to dynamic changes in the environment. The performance of the proposed approach is verified using realistic traffic simulations.
△ Less
Submitted 14 November, 2023;
originally announced November 2023.
-
Safe Collective Control under Noisy Inputs and Competing Constraints via Non-Smooth Barrier Functions
Authors:
Clinton Enwerem,
John S. Baras
Abstract:
We consider the problem of safely coordinating ensembles of identical autonomous agents to conduct complex missions with conflicting safety requirements and under noisy control inputs. Using non-smooth control barrier functions (CBFs) and stochastic model-predictive control as springboards, and by adopting an extrinsic approach where the ensemble is treated as a unified dynamic entity, we devise a…
▽ More
We consider the problem of safely coordinating ensembles of identical autonomous agents to conduct complex missions with conflicting safety requirements and under noisy control inputs. Using non-smooth control barrier functions (CBFs) and stochastic model-predictive control as springboards, and by adopting an extrinsic approach where the ensemble is treated as a unified dynamic entity, we devise a method to synthesize safety-aware control inputs for uncertain collectives. Drawing upon stochastic CBF theory and recent developments in Boolean CBF composition, our method proceeds by smoothing a Boolean-composed CBF and solving a stochastic optimization problem where each agent's forcing term is restricted to the affine subspace of control inputs certified by the combined CBF. For the smoothing step, we employ a polynomial approximation scheme, providing evidence for its advantage in generating more conservative yet sufficiently-filtered control inputs than the smoother but more aggressive equivalents produced from an approximation technique based on the log-sum-exp function. To further demonstrate the utility of the proposed method, we present an upper bound for the expected CBF approximation error, along with results from simulations of a single-integrator collective under velocity perturbations. Lastly, we compare these results with those obtained using a naive state-feedback controller lacking safety filters.
△ Less
Submitted 28 March, 2024; v1 submitted 6 November, 2023;
originally announced November 2023.
-
RCMS: Risk-Aware Crash Mitigation System for Autonomous Vehicles
Authors:
Faizan M. Tariq,
David Isele,
John S. Baras,
Sangjae Bae
Abstract:
We propose a risk-aware crash mitigation system (RCMS), to augment any existing motion planner (MP), that enables an autonomous vehicle to perform evasive maneuvers in high-risk situations and minimize the severity of collision if a crash is inevitable. In order to facilitate a smooth transition between RCMS and MP, we develop a novel activation mechanism that combines instantaneous as well as pre…
▽ More
We propose a risk-aware crash mitigation system (RCMS), to augment any existing motion planner (MP), that enables an autonomous vehicle to perform evasive maneuvers in high-risk situations and minimize the severity of collision if a crash is inevitable. In order to facilitate a smooth transition between RCMS and MP, we develop a novel activation mechanism that combines instantaneous as well as predictive collision risk evaluation strategies in a unified hysteresis-band approach. For trajectory planning, we deploy a modular receding horizon optimization-based approach that minimizes a smooth situational risk profile, while adhering to the physical road limits as well as vehicular actuator limits. We demonstrate the performance of our approach in a simulation environment.
△ Less
Submitted 21 September, 2023;
originally announced September 2023.
-
Enabling Cooperative Hybrid Beamforming in TDD-based Distributed MIMO Systems
Authors:
Nariman Torkzaban,
Amir Khojastepour,
John S. Baras
Abstract:
Distributed massive MIMO networks are envisioned to realize cooperative multi-point transmission in next-generation wireless systems. For efficient cooperative hybrid beamforming, the cluster of access points (APs) needs to obtain precise estimates of the uplink channel to perform reliable downlink precoding. However, due to the radio frequency (RF) impairments between the transceivers at the two…
▽ More
Distributed massive MIMO networks are envisioned to realize cooperative multi-point transmission in next-generation wireless systems. For efficient cooperative hybrid beamforming, the cluster of access points (APs) needs to obtain precise estimates of the uplink channel to perform reliable downlink precoding. However, due to the radio frequency (RF) impairments between the transceivers at the two en-points of the wireless channel, full channel reciprocity does not hold which results in performance degradation in the cooperative hybrid beamforming (CHBF) unless a suitable reciprocity calibration mechanism is in place. We propose a two-step approach to calibrate any two hybrid nodes in the distributed MIMO system. We then present and utilize the novel concept of reciprocal tandem to propose a low-complexity approach for jointly calibrating the cluster of APs and estimating the downlink channel. Finally, we validate our calibration technique's effectiveness through numerical simulation.
△ Less
Submitted 29 August, 2023;
originally announced August 2023.
-
Blind Cyclic Prefix-based CFO Estimation in MIMO-OFDM Systems
Authors:
Nariman Torkzaban,
Amir Khojastepour,
John S. Baras
Abstract:
Low-complexity estimation and correction of carrier frequency offset (CFO) are essential in orthogonal frequency division multiplexing (OFDM). In this paper, we propose a low-overhead blind CFO estimation technique based on cyclic prefix (CP), in multi-input multi-output (MIMO)-OFDM systems. We propose to use antenna diversity for CFO estimation. Given that the RF chains for all antenna elements a…
▽ More
Low-complexity estimation and correction of carrier frequency offset (CFO) are essential in orthogonal frequency division multiplexing (OFDM). In this paper, we propose a low-overhead blind CFO estimation technique based on cyclic prefix (CP), in multi-input multi-output (MIMO)-OFDM systems. We propose to use antenna diversity for CFO estimation. Given that the RF chains for all antenna elements at a communication node share the same clock, the carrier frequency offset (CFO) between two points may be estimated by using the combination of the received signal at all antennas. We improve our method by combining the antenna diversity with time diversity by considering the CP for multiple OFDM symbols. We provide a closed-form expression for CFO estimation and present algorithms that can considerably improve the CFO estimation performance at the expense of a linear increase in computational complexity. We validate the effectiveness of our estimation scheme via extensive numerical analysis.
△ Less
Submitted 29 August, 2023;
originally announced August 2023.
-
Resource Efficiency vs Performance Isolation Tradeoff in Network Slicing
Authors:
Panagiotis Nikolaidis,
Asim Zoulkarni,
John Baras
Abstract:
We consider the tradeoff between resource efficiency and performance isolation that emerges when multiplexing the resource demands of Network Slices (NSs). On the one hand, multiplexing allows the use of idle resources, which increases resource efficiency. On the other hand, the performance of each NS becomes susceptible to traffic surges in other NSs, which degrades performance isolation. The ana…
▽ More
We consider the tradeoff between resource efficiency and performance isolation that emerges when multiplexing the resource demands of Network Slices (NSs). On the one hand, multiplexing allows the use of idle resources, which increases resource efficiency. On the other hand, the performance of each NS becomes susceptible to traffic surges in other NSs, which degrades performance isolation. The analysis of this tradeoff enables network operators to determine the effect of performance isolation on the operating cost of each NS.
To study the tradeoff, we solve an optimization problem where we find the multiplexing policy that requires the least provisioned resources to honor the Service Level Agreements (SLAs) of all NSs. The SLA of each NS i states that its resource demand should be met for $P^H_i$ fraction of time, and for $P^L_i \leq P^H_i$ fraction of time, it should be met regardless of the demands of other NSs.
For resource demands that follow ergodic Markov chains, we show that the well-known Max-Weight scheduler is an optimal multiplexing policy. Since the Max-Weight scheduler does not require any knowledge of the statistics of the resource demands, we also propose its use in non-markovian settings. For resource demands obtained in the LTE module of ns-3, we show that the Max-Weight scheduler reduces the provisioned bandwidth by 36.2% when no performance isolation is required. Lastly, for these non-markovian resource demands, the Max-Weight scheduler maintains its optimality since it requires as much provisioned bandwidth as the best non-causal scheduler.
△ Less
Submitted 26 March, 2023;
originally announced March 2023.
-
SLAS: Speed and Lane Advisory System for Highway Navigation
Authors:
Faizan M. Tariq,
David Isele,
John S. Baras,
Sangjae Bae
Abstract:
This paper proposes a hierarchical autonomous vehicle navigation architecture, composed of a high-level speed and lane advisory system (SLAS) coupled with low-level trajectory generation and trajectory following modules. Specifically, we target a multi-lane highway driving scenario where an autonomous ego vehicle navigates in traffic. We propose a novel receding horizon mixed-integer optimization…
▽ More
This paper proposes a hierarchical autonomous vehicle navigation architecture, composed of a high-level speed and lane advisory system (SLAS) coupled with low-level trajectory generation and trajectory following modules. Specifically, we target a multi-lane highway driving scenario where an autonomous ego vehicle navigates in traffic. We propose a novel receding horizon mixed-integer optimization based method for SLAS with the objective to minimize travel time while accounting for passenger comfort. We further incorporate various modifications in the proposed approach to improve the overall computational efficiency and achieve real-time performance. We demonstrate the efficacy of the proposed approach in contrast to the existing methods, when applied in conjunction with state-of-the-art trajectory generation and trajectory following frameworks, in a CARLA simulation environment.
△ Less
Submitted 1 March, 2023;
originally announced March 2023.
-
Distributed Optimal Formation Control for an Uncertain Multiagent System in the Plane
Authors:
Clinton Enwerem,
John Baras,
Danilo Romero
Abstract:
In this paper, we present a distributed optimal multiagent control scheme for quadrotor formation tracking under localization errors. Our control architecture is based on a leader-follower approach, where a single leader quadrotor tracks a desired trajectory while the followers maintain their relative positions in a triangular formation. We begin by modeling the quadrotors as particles in the YZ-p…
▽ More
In this paper, we present a distributed optimal multiagent control scheme for quadrotor formation tracking under localization errors. Our control architecture is based on a leader-follower approach, where a single leader quadrotor tracks a desired trajectory while the followers maintain their relative positions in a triangular formation. We begin by modeling the quadrotors as particles in the YZ-plane evolving under dynamics with uncertain state information. Next, by formulating the formation tracking task as an optimization problem -- with a constraint-augmented Lagrangian subject to dynamic constraints -- we solve for the control law that leads to an optimal solution in the control and trajectory error cost-minimizing sense. Results from numerical simulations show that for the planar quadrotor model considered -- with uncertainty in sensor measurements modeled as Gaussian noise -- the resulting optimal control is able to drive each agent to achieve the desired global objective: leader trajectory tracking with formation maintenance. Finally, we evaluate the performance of the control law using the tracking and formation errors of the multiagent system.
△ Less
Submitted 28 January, 2023; v1 submitted 14 January, 2023;
originally announced January 2023.
-
Risk-Sensitive Reinforcement Learning with Exponential Criteria
Authors:
Erfaun Noorani,
Christos Mavridis,
John Baras
Abstract:
While reinforcement learning has shown experimental success in a number of applications, it is known to be sensitive to noise and perturbations in the parameters of the system, leading to high variance in the total reward amongst different episodes in slightly different environments. To introduce robustness, as well as sample efficiency, risk-sensitive reinforcement learning methods are being thor…
▽ More
While reinforcement learning has shown experimental success in a number of applications, it is known to be sensitive to noise and perturbations in the parameters of the system, leading to high variance in the total reward amongst different episodes in slightly different environments. To introduce robustness, as well as sample efficiency, risk-sensitive reinforcement learning methods are being thoroughly studied. In this work, we provide a definition of robust reinforcement learning policies and formulate a risk-sensitive reinforcement learning problem to approximate them, by solving an optimization problem with respect to a modified objective based on exponential criteria. In particular, we study a model-free risk-sensitive variation of the widely-used Monte Carlo Policy Gradient algorithm and introduce a novel risk-sensitive online Actor-Critic algorithm based on solving a multiplicative Bellman equation using stochastic approximation updates. Analytical results suggest that the use of exponential criteria generalizes commonly used ad-hoc regularization approaches, improves sample efficiency, and introduces robustness with respect to perturbations in the model parameters and the environment. The implementation, performance, and robustness properties of the proposed methods are evaluated in simulated experiments.
△ Less
Submitted 19 December, 2023; v1 submitted 17 December, 2022;
originally announced December 2022.
-
Multi-Resolution Online Deterministic Annealing: A Hierarchical and Progressive Learning Architecture
Authors:
Christos Mavridis,
John Baras
Abstract:
Hierarchical learning algorithms that gradually approximate a solution to a data-driven optimization problem are essential to decision-making systems, especially under limitations on time and computational resources. In this study, we introduce a general-purpose hierarchical learning architecture that is based on the progressive partitioning of a possibly multi-resolution data space. The optimal p…
▽ More
Hierarchical learning algorithms that gradually approximate a solution to a data-driven optimization problem are essential to decision-making systems, especially under limitations on time and computational resources. In this study, we introduce a general-purpose hierarchical learning architecture that is based on the progressive partitioning of a possibly multi-resolution data space. The optimal partition is gradually approximated by solving a sequence of optimization sub-problems that yield a sequence of partitions with increasing number of subsets. We show that the solution of each optimization problem can be estimated online using gradient-free stochastic approximation updates. As a consequence, a function approximation problem can be defined within each subset of the partition and solved using the theory of two-timescale stochastic approximation algorithms. This simulates an annealing process and defines a robust and interpretable heuristic method to gradually increase the complexity of the learning architecture in a task-agnostic manner, giving emphasis to regions of the data space that are considered more important according to a predefined criterion. Finally, by imposing a tree structure in the progression of the partitions, we provide a means to incorporate potential multi-resolution structure of the data space into this approach, significantly reducing its complexity, while introducing hierarchical variable-rate feature extraction properties similar to certain classes of deep learning architectures. Asymptotic convergence analysis and experimental results are provided for supervised and unsupervised learning problems.
△ Less
Submitted 21 March, 2023; v1 submitted 15 December, 2022;
originally announced December 2022.
-
Annealing Optimization for Progressive Learning with Stochastic Approximation
Authors:
Christos Mavridis,
John Baras
Abstract:
In this work, we introduce a learning model designed to meet the needs of applications in which computational resources are limited, and robustness and interpretability are prioritized. Learning problems can be formulated as constrained stochastic optimization problems, with the constraints originating mainly from model assumptions that define a trade-off between complexity and performance. This t…
▽ More
In this work, we introduce a learning model designed to meet the needs of applications in which computational resources are limited, and robustness and interpretability are prioritized. Learning problems can be formulated as constrained stochastic optimization problems, with the constraints originating mainly from model assumptions that define a trade-off between complexity and performance. This trade-off is closely related to over-fitting, generalization capacity, and robustness to noise and adversarial attacks, and depends on both the structure and complexity of the model, as well as the properties of the optimization methods used. We develop an online prototype-based learning algorithm based on annealing optimization that is formulated as an online gradient-free stochastic approximation algorithm. The learning model can be viewed as an interpretable and progressively growing competitive-learning neural network model to be used for supervised, unsupervised, and reinforcement learning. The annealing nature of the algorithm contributes to minimal hyper-parameter tuning requirements, poor local minima prevention, and robustness with respect to the initial conditions. At the same time, it provides online control over the performance-complexity trade-off by progressively increasing the complexity of the learning model as needed, through an intuitive bifurcation phenomenon. Finally, the use of stochastic approximation enables the study of the convergence of the learning algorithm through mathematical tools from dynamical systems and control, and allows for its integration with reinforcement learning algorithms, constructing an adaptive state-action aggregation scheme.
△ Less
Submitted 25 December, 2022; v1 submitted 6 September, 2022;
originally announced September 2022.
-
GAMEOPT: Optimal Real-time Multi-Agent Planning and Control for Dynamic Intersections
Authors:
Nilesh Suriyarachchi,
Rohan Chandra,
John S. Baras,
Dinesh Manocha
Abstract:
We propose GameOpt: a novel hybrid approach to cooperative intersection control for dynamic, multi-lane, unsignalized intersections. Safely navigating these complex and accident prone intersections requires simultaneous trajectory planning and negotiation among drivers. GameOpt is a hybrid formulation that first uses an auction mechanism to generate a priority entrance sequence for every agent, fo…
▽ More
We propose GameOpt: a novel hybrid approach to cooperative intersection control for dynamic, multi-lane, unsignalized intersections. Safely navigating these complex and accident prone intersections requires simultaneous trajectory planning and negotiation among drivers. GameOpt is a hybrid formulation that first uses an auction mechanism to generate a priority entrance sequence for every agent, followed by an optimization-based trajectory planner that computes velocity controls that satisfy the priority sequence. This coupling operates at real-time speeds of less than 10 milliseconds in high density traffic of more than 10,000 vehicles/hr, 100 times faster than other fully optimization-based methods, while providing guarantees in terms of fairness, safety, and efficiency. Tested on the SUMO simulator, our algorithm improves throughput by at least 25%, time taken to reach the goal by 75%, and fuel consumption by 33% compared to auction-based approaches and signaled approaches using traffic-lights and stop signs.
△ Less
Submitted 18 March, 2022; v1 submitted 23 February, 2022;
originally announced February 2022.
-
Multi-user Beam Alignment in Presence of Multi-path
Authors:
Nariman Torkzaban,
Mohammad A.,
Khojastepour,
John S. Baras
Abstract:
To overcome the high path-loss and the intense shadowing in millimeter-wave (mmWave) communications, effective beamforming schemes are required which incorporate narrow beams with high beamforming gains. The mmWave channel consists of a few spatial clusters each associated with an angle of departure (AoD). The narrow beams must be aligned with the channel AoDs to increase the beamforming gain. Thi…
▽ More
To overcome the high path-loss and the intense shadowing in millimeter-wave (mmWave) communications, effective beamforming schemes are required which incorporate narrow beams with high beamforming gains. The mmWave channel consists of a few spatial clusters each associated with an angle of departure (AoD). The narrow beams must be aligned with the channel AoDs to increase the beamforming gain. This is achieved through a procedure called beam alignment (BA). Most of the BA schemes in the literature consider channels with a single dominant path while in practice the channel has a few resolvable paths with different AoDs, hence, such BA schemes may not work correctly in the presence of multi-path or at the least do not exploit such multipath to achieve diversity or increase robustness.
In this paper, we propose an efficient BA scheme in presence of multi-path. The proposed BA scheme transmits probing packets using a set of scanning beams and receives feedback for all the scanning beams at the end of the probing phase from each user. We formulate the BA scheme as minimizing the expected value of the average transmission beamwidth under different policies. The policy is defined as a function from the set of received feedback to the set of transmission beams (TB). In order to maximize the number of possible feedback sequences, we prove that the set of scanning beams (SB) has a special form, namely, Tulip Design. Consequently, we rewrite the minimization problem with a set of linear constraints and a reduced number of variables which is solved by using an efficient greedy algorithm.
△ Less
Submitted 13 February, 2022;
originally announced February 2022.
-
Codebook Design for Composite Beamforming in Next-generation mmWave Systems
Authors:
Nariman Torkzaban,
Mohamamd A.,
Khojastepour,
John S. Baras
Abstract:
In pursuance of the unused spectrum in higher frequencies, millimeter wave (mmWave) bands have a pivotal role. However, the high path-loss and poor scattering associated with mmWave communications highlight the necessity of employing effective beamforming techniques. In order to efficiently search for the beam to serve a user and to jointly serve multiple users it is often required to use a compos…
▽ More
In pursuance of the unused spectrum in higher frequencies, millimeter wave (mmWave) bands have a pivotal role. However, the high path-loss and poor scattering associated with mmWave communications highlight the necessity of employing effective beamforming techniques. In order to efficiently search for the beam to serve a user and to jointly serve multiple users it is often required to use a composite beam which consists of multiple disjoint lobes. A composite beam covers multiple desired angular coverage intervals (ACIs) and ideally has maximum and uniform gain (smoothness) within each desired ACI, negligible gain (leakage) outside the desired ACIs, and sharp edges. We propose an algorithm for designing such ideal composite codebook by providing an analytical closed-form solution with low computational complexity. There is a fundamental trade-off between the gain, leakage and smoothness of the beams. Our design allows to achieve different values in such trade-off based on changing the design parameters. We highlight the shortcomings of the uniform linear arrays (ULAs) in building arbitrary composite beams. Consequently, we use a recently introduced twin-ULA (TULA) antenna structure to effectively resolve these inefficiencies. Numerical results are used to validate the theoretical findings.
△ Less
Submitted 7 February, 2022;
originally announced February 2022.
-
Learning Swarm Interaction Dynamics from Density Evolution
Authors:
Christos Mavridis,
Amoolya Tirumalai,
John Baras
Abstract:
We consider the problem of understanding the coordinated movements of biological or artificial swarms. In this regard, we propose a learning scheme to estimate the coordination laws of the interacting agents from observations of the swarm's density over time. We describe the dynamics of the swarm based on pairwise interactions according to a Cucker-Smale flocking model, and express the swarm's den…
▽ More
We consider the problem of understanding the coordinated movements of biological or artificial swarms. In this regard, we propose a learning scheme to estimate the coordination laws of the interacting agents from observations of the swarm's density over time. We describe the dynamics of the swarm based on pairwise interactions according to a Cucker-Smale flocking model, and express the swarm's density evolution as the solution to a system of mean-field hydrodynamic equations. We propose a new family of parametric functions to model the pairwise interactions, which allows for the mean-field macroscopic system of integro-differential equations to be efficiently solved as an augmented system of PDEs. Finally, we incorporate the augmented system in an iterative optimization scheme to learn the dynamics of the interacting agents from observations of the swarm's density evolution over time. The results of this work can offer an alternative approach to study how animal flocks coordinate, create new control schemes for large networked systems, and serve as a central part of defense mechanisms against adversarial drone attacks.
△ Less
Submitted 5 December, 2021;
originally announced December 2021.
-
Towards the One Learning Algorithm Hypothesis: A System-theoretic Approach
Authors:
Christos Mavridis,
John Baras
Abstract:
The existence of a universal learning architecture in human cognition is a widely spread conjecture supported by experimental findings from neuroscience. While no low-level implementation can be specified yet, an abstract outline of human perception and learning is believed to entail three basic properties: (a) hierarchical attention and processing, (b) memory-based knowledge representation, and (…
▽ More
The existence of a universal learning architecture in human cognition is a widely spread conjecture supported by experimental findings from neuroscience. While no low-level implementation can be specified yet, an abstract outline of human perception and learning is believed to entail three basic properties: (a) hierarchical attention and processing, (b) memory-based knowledge representation, and (c) progressive learning and knowledge compaction. We approach the design of such a learning architecture from a system-theoretic viewpoint, develo** a closed-loop system with three main components: (i) a multi-resolution analysis pre-processor, (ii) a group-invariant feature extractor, and (iii) a progressive knowledge-based learning module. Multi-resolution feedback loops are used for learning, i.e., for adapting the system parameters to online observations. To design (i) and (ii), we build upon the established theory of wavelet-based multi-resolution analysis and the properties of group convolution operators. Regarding (iii), we introduce a novel learning algorithm that constructs progressively growing knowledge representations in multiple resolutions. The proposed algorithm is an extension of the Online Deterministic Annealing (ODA) algorithm based on annealing optimization, solved using gradient-free stochastic approximation. ODA has inherent robustness and regularization properties and provides a means to progressively increase the complexity of the learning model i.e. the number of the neurons, as needed, through an intuitive bifurcation phenomenon. The proposed multi-resolution approach is hierarchical, progressive, knowledge-based, and interpretable. We illustrate the properties of the proposed architecture in the context of the state-of-the-art learning algorithms and deep learning methods.
△ Less
Submitted 4 December, 2021;
originally announced December 2021.
-
Controller Placement in SDN-enabled 5G Satellite-Terrestrial Networks
Authors:
Nariman Torkzaban,
John S. Baras
Abstract:
SDN-enabled Integrated satellite-terrestrial networks (ISTNs), can provide several advantages including global seamless coverage, high reliability, low latency, etc. and can be a key enabler towards next generation networks. To deal with the complexity of the control and management of the integrated network, leveraging the concept of software-defined networking (SDN) will be helpful. In this regar…
▽ More
SDN-enabled Integrated satellite-terrestrial networks (ISTNs), can provide several advantages including global seamless coverage, high reliability, low latency, etc. and can be a key enabler towards next generation networks. To deal with the complexity of the control and management of the integrated network, leveraging the concept of software-defined networking (SDN) will be helpful. In this regard, the SDN controller placement problem in SDN-enabled ISTNs becomes of paramount importance. In this paper, we formulate an optimization problem for the SDN controller placement with the objective of minimizing the average failure probability of SDN control paths to ensure the SDN switches receive the instructions in the most reliable fashion. Simultaneously, we aim at deploying the SDN controllers close to the satellite gateways to ensure the connection between the two layers occurs with the lowest latency. We first model the problem as a mixed integer linear program (MILP). To reduce the time complexity of the MILP model, we use submodular optimization techniques to generate near-optimal solutions in a time-efficient manner. Finally, we verify the effectiveness of our approach by means of simulation, showing that the approximation method results in a reasonable optimality gap with respect to the exact MILP solution.
△ Less
Submitted 20 August, 2021;
originally announced August 2021.
-
On the Importance of Trust in Next-Generation Networked CPS Systems: An AI Perspective
Authors:
Anousheh Gholami,
Nariman Torkzaban,
John S. Baras
Abstract:
With the increasing scale, complexity, and heterogeneity of the next generation networked systems, seamless control, management, and security of such systems becomes increasingly challenging. Many diverse applications have driven interest in networked systems, including large-scale distributed learning, multi-agent optimization, 5G service provisioning, and network slicing, etc. In this paper, we…
▽ More
With the increasing scale, complexity, and heterogeneity of the next generation networked systems, seamless control, management, and security of such systems becomes increasingly challenging. Many diverse applications have driven interest in networked systems, including large-scale distributed learning, multi-agent optimization, 5G service provisioning, and network slicing, etc. In this paper, we propose trust as a measure to evaluate the status of network agents and improve the decision-making process. We interpret trust as a relation among entities that participate in various protocols. Trust relations are based on evidence created by the interactions of entities within a protocol and may be a composite of multiple metrics such as availability, reliability, resilience, etc. depending on application context. We first elaborate on the importance of trust as a metric and then present a mathematical framework for trust computation and aggregation within a network. Then we show in practice, how trust can be integrated into network decision-making processes by presenting two examples. In the first example, we show how utilizing the trust evidence can improve the performance and the security of Federated Learning. Second, we show how a 5G network resource provisioning framework can be improved when augmented with a trust-aware decision-making scheme. We verify the validity of our trust-based approach through simulations. Finally, we explain the challenges associated with aggregating the trust evidence and briefly explain our ideas to tackle them.
△ Less
Submitted 15 April, 2021;
originally announced April 2021.
-
Joint Satellite Gateway Deployment & Controller Placement in Software-Defined 5G-Satellite Integrated Networks
Authors:
Nariman Torkzaban,
John S. Baras
Abstract:
Several challenging optimization problems arise while considering the deployment of the space-air-ground integrated networks (SAGINs), among which the optimal satellite gateway deployment problem is of significant importance. Moreover, with the increasing interest in the software-defined integration of 5G networks and satellites, the existence of an effective scheme for optimal placement of SDN co…
▽ More
Several challenging optimization problems arise while considering the deployment of the space-air-ground integrated networks (SAGINs), among which the optimal satellite gateway deployment problem is of significant importance. Moreover, with the increasing interest in the software-defined integration of 5G networks and satellites, the existence of an effective scheme for optimal placement of SDN controllers is essential. In this paper, we discuss the interrelation between the two problems above and propose suitable methods to solve them under various network design criteria. We first provide a MILP model for solving the joint problem, and then motivate the decomposition of the model into two disjoint MILPs. We then show that the resulting problems can be modeled as the optimization of submodular set functions and can be solved efficiently with provable optimality gaps.
△ Less
Submitted 19 March, 2021; v1 submitted 15 March, 2021;
originally announced March 2021.
-
Semi-linear Poisson-mediated Flocking in a Cucker-Smale Model
Authors:
Christos N. Mavridis,
Amoolya Tirumalai,
John S. Baras,
Ion Matei
Abstract:
We propose a family of compactly supported parametric interaction functions in the general Cucker-Smale flocking dynamics such that the mean-field macroscopic system of mass and momentum balance equations with non-local dam** terms can be converted from a system of partial integro-differential equations to an augmented system of partial differential equations in a compact set. We treat the inter…
▽ More
We propose a family of compactly supported parametric interaction functions in the general Cucker-Smale flocking dynamics such that the mean-field macroscopic system of mass and momentum balance equations with non-local dam** terms can be converted from a system of partial integro-differential equations to an augmented system of partial differential equations in a compact set. We treat the interaction functions as Green's functions for an operator corresponding to a semi-linear Poisson equation and compute the density and momentum in a translating reference frame, i.e. one that is taken in reference to the flock's centroid. This allows us to consider the dynamics in a fixed, flock-centered compact set without loss of generality. We approach the computation of the non-local dam** using the standard finite difference treatment of the chosen differential operator, resulting in a tridiagonal system which can be solved quickly.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
Online Deterministic Annealing for Classification and Clustering
Authors:
Christos Mavridis,
John Baras
Abstract:
Inherent in virtually every iterative machine learning algorithm is the problem of hyper-parameter tuning, which includes three major design parameters: (a) the complexity of the model, e.g., the number of neurons in a neural network, (b) the initial conditions, which heavily affect the behavior of the algorithm, and (c) the dissimilarity measure used to quantify its performance. We introduce an o…
▽ More
Inherent in virtually every iterative machine learning algorithm is the problem of hyper-parameter tuning, which includes three major design parameters: (a) the complexity of the model, e.g., the number of neurons in a neural network, (b) the initial conditions, which heavily affect the behavior of the algorithm, and (c) the dissimilarity measure used to quantify its performance. We introduce an online prototype-based learning algorithm that can be viewed as a progressively growing competitive-learning neural network architecture for classification and clustering. The learning rule of the proposed approach is formulated as an online gradient-free stochastic approximation algorithm that solves a sequence of appropriately defined optimization problems, simulating an annealing process. The annealing nature of the algorithm contributes to avoiding poor local minima, offers robustness with respect to the initial conditions, and provides a means to progressively increase the complexity of the learning model, through an intuitive bifurcation phenomenon. The proposed approach is interpretable, requires minimal hyper-parameter tuning, and allows online control over the performance-complexity trade-off. Finally, we show that Bregman divergences appear naturally as a family of dissimilarity measures that play a central role in both the performance and the computational complexity of the learning algorithm.
△ Less
Submitted 10 January, 2022; v1 submitted 10 February, 2021;
originally announced February 2021.
-
Joint Mobility-Aware UAV Placement and Routing in Multi-Hop UAV Relaying Systems
Authors:
Anousheh Gholami,
Nariman Torkzaban,
John S. Baras,
Chrysa Papagianni
Abstract:
Unmanned Aerial Vehicles (UAVs) have been extensively utilized to provide wireless connectivity in rural and under-developed areas, enhance network capacity and provide support for peaks or unexpected surges in user demand, mainly due to their fast deployment, cost-efficiency and superior communication performance resulting from Line of Sight (LoS)-dominated wireless channels. In order to exploit…
▽ More
Unmanned Aerial Vehicles (UAVs) have been extensively utilized to provide wireless connectivity in rural and under-developed areas, enhance network capacity and provide support for peaks or unexpected surges in user demand, mainly due to their fast deployment, cost-efficiency and superior communication performance resulting from Line of Sight (LoS)-dominated wireless channels. In order to exploit the benefits of UAVs as base stations or relays in a mobile network, a major challenge is to determine the optimal UAV placement and relocation strategy with respect to the mobility and traffic patterns of the ground network nodes. Moreover, considering that the UAVs form a multi-hop aerial network, capacity and connectivity constraints have significant impacts on the end-to-end network performance. To this end, we formulate the joint UAV placement and routing problem as a Mixed Integer Linear Program (MILP) and propose an approximation that leads to a LP rounding algorithm and achieves a balance between time-complexity and optimality.
△ Less
Submitted 30 September, 2020;
originally announced September 2020.
-
Trust-Aware Service Function Chain Embedding: A Path-Based Approach
Authors:
Nariman Torkzaban,
John S. Baras
Abstract:
With the emergence of network function virtualization (NFV), and software-defined networking (SDN), the realization and implementation of service function chains (SFCs) have become much easier. An SFC is an ordered set of interconnected virtual network functions (VNFs). NFV allows for decoupling the network functions from proprietary hardware realizing a software-based implementation of VNFs on co…
▽ More
With the emergence of network function virtualization (NFV), and software-defined networking (SDN), the realization and implementation of service function chains (SFCs) have become much easier. An SFC is an ordered set of interconnected virtual network functions (VNFs). NFV allows for decoupling the network functions from proprietary hardware realizing a software-based implementation of VNFs on commodity hardware and SDN decouples the network control from its forwarding logic allowing for a more flexible and programmable traffic routing among the VNFs. The SFC embedding problem (i.e. placement of SFCs on a shared substrate and establishing the corresponding traffic routes between the VNFs), has been extensively studied in the literature. In this paper, we extend a previous work on trust-aware service chain embedding with generalizing the role of trust by incorporating the trustworthiness of the service network links and substrate network paths into the SFC embedding decision process. We first introduce and formulate the path-based trust-aware service chain embedding problem as a mixed integer-linear program (MILP), and then provide an approximate model-based on selecting k-shortest candidate substrate paths for hosting each virtual link, to reduce the complexity of the model. We validate the performance of our methods through simulations and conduct a discussion on evaluating the methods and some operation trade-offs.
△ Less
Submitted 5 October, 2020; v1 submitted 15 September, 2020;
originally announced September 2020.
-
Collaborative Beamforming Under Localization Errors: A Discrete Optimization Approach
Authors:
Erfaun Noorani,
Yagiz Savas,
Alec Koppel,
John Baras,
Ufuk Topcu,
Brian M. Sadler
Abstract:
We consider a network of agents that locate themselves in an environment through sensor measurements and aim to transmit a message signal to a base station via collaborative beamforming. The agents' sensor measurements result in localization errors, which degrade the quality of service at the base station due to unknown phase offsets that arise in the agents' communication channels. Assuming that…
▽ More
We consider a network of agents that locate themselves in an environment through sensor measurements and aim to transmit a message signal to a base station via collaborative beamforming. The agents' sensor measurements result in localization errors, which degrade the quality of service at the base station due to unknown phase offsets that arise in the agents' communication channels. Assuming that each agent's localization error follows a Gaussian distribution, we study the problem of forming a reliable communication link between the agents and the base station despite the localization errors. In particular, we formulate a discrete optimization problem to choose only a subset of agents to transmit the message signal so that the variance of the signal-to-noise ratio (SNR) received by the base station is minimized while the expected SNR exceeds a desired threshold. When the variances of the localization errors are below a certain threshold characterized in terms of the carrier frequency, we show that greedy algorithms can be used to globally minimize the variance of the received SNR. On the other hand, when some agents have localization errors with large variances, we show that the variance of the received SNR can be locally minimized by exploiting the supermodularity of the mean and variance of the received SNR. In numerical simulations, we demonstrate that the proposed algorithms have the potential to synthesize beamformers orders of magnitude faster than convex optimization-based approaches while achieving comparable performances using less number of agents.
△ Less
Submitted 17 March, 2021; v1 submitted 27 March, 2020;
originally announced March 2020.
-
Order Effects of Measurements in Multi-Agent Hypothesis Testing
Authors:
Aneesh Raghavan,
John S. Baras
Abstract:
In multi-agent systems, agents observe data, and use them to make inferences and take actions. As a result sensing and control naturally interfere, more so from a real-time perspective. A natural consequence is that in multi-agent systems there are propositions based on the set of observed events that might not be simultaneously verifiable, which leads to the need for probability structures that a…
▽ More
In multi-agent systems, agents observe data, and use them to make inferences and take actions. As a result sensing and control naturally interfere, more so from a real-time perspective. A natural consequence is that in multi-agent systems there are propositions based on the set of observed events that might not be simultaneously verifiable, which leads to the need for probability structures that allow such \textit{incompatible events}. We revisit the structure of events in a multi-agent system and we introduce the necessary new models that incorporate such incompatible events in the formalism. These models are essential for building non-commutative probability models, which are different than the classical models based on the Kolmogorov construction. From this perspective, we revisit the concepts of \textit{event-state-operation structure} and the needed \textit{relationship of incompatibility} from the literature and use them as a tool to study the needed new algebraic structure of the set of events. We present an example from multi-agent hypothesis testing where the set of events does not form a Boolean algebra, but forms an ortholattice. A possible construction of a `noncommutative probability space', accounting for \textit{incompatible events} is discussed. We formulate and solve the binary hypothesis testing problem in the noncommutative probability space. We illustrate the occurrence of `order effects' in the multi-agent hypothesis testing problem by computing the minimum probability of error that can be achieved with different orders of measurements.
△ Less
Submitted 11 November, 2020; v1 submitted 25 March, 2020;
originally announced March 2020.
-
Interpretable machine learning models: a physics-based view
Authors:
Ion Matei,
Johan de Kleer,
Christoforos Somarakis,
Rahul Rai,
John S. Baras
Abstract:
To understand changes in physical systems and facilitate decisions, explaining how model predictions are made is crucial. We use model-based interpretability, where models of physical systems are constructed by composing basic constructs that explain locally how energy is exchanged and transformed. We use the port Hamiltonian (p-H) formalism to describe the basic constructs that contain physically…
▽ More
To understand changes in physical systems and facilitate decisions, explaining how model predictions are made is crucial. We use model-based interpretability, where models of physical systems are constructed by composing basic constructs that explain locally how energy is exchanged and transformed. We use the port Hamiltonian (p-H) formalism to describe the basic constructs that contain physically interpretable processes commonly found in the behavior of physical systems. We describe how we can build models out of the p-H constructs and how we can train them. In addition we show how we can impose physical properties such as dissipativity that ensure numerical stability of the training process. We give examples on how to build and train models for describing the behavior of two physical systems: the inverted pendulum and swarm dynamics.
△ Less
Submitted 22 March, 2020;
originally announced March 2020.
-
Joint Satellite Gateway Placement and Routing for Integrated Satellite-Terrestrial Networks
Authors:
Nariman Torkzaban,
Anousheh Gholami,
Chrysa Papagianni,
John S. Baras
Abstract:
With the increasing attention to the integrated satellite-terrestrial networks (ISTNs), the satellite gateway placement problem becomes of paramount importance. The resulting network performance may vary depending on the different design strategies. In this paper, a joint satellite gateway placement and routing strategy for the terrestrial network is proposed to minimize the overall cost of gatewa…
▽ More
With the increasing attention to the integrated satellite-terrestrial networks (ISTNs), the satellite gateway placement problem becomes of paramount importance. The resulting network performance may vary depending on the different design strategies. In this paper, a joint satellite gateway placement and routing strategy for the terrestrial network is proposed to minimize the overall cost of gateway deployment and traffic routing, while adhering to the average delay requirement for traffic demands. Although traffic routing and gateway placement can be solved independently, the dependence between the routing decisions for different demands makes it more realistic to solve an aggregated model instead. We develop a mixed-integer linear program (MILP) formulation for the problem. We relax the integrality constraints to achieve a linear program (LP) which reduces time-complexity at the expense of a sub-optimal solution. We further propose a variant of the proposed model to balance the load between the selected gateways.
△ Less
Submitted 5 October, 2020; v1 submitted 7 February, 2020;
originally announced February 2020.
-
Fast, Composable Rescue Mission Planning for UAVs using Metric Temporal Logic
Authors:
Usman A. Fiaz,
John S. Baras
Abstract:
We present a hybrid compositional approach for real-time mission planning for multi-rotor unmanned aerial vehicles (UAVs) in a time critical search and rescue scenario. Starting with a known environment, we specify the mission using Metric Temporal Logic (MTL) and use a hybrid dynamical model to capture the various modes of UAV operation. We then divide the mission into several sub-tasks by exploi…
▽ More
We present a hybrid compositional approach for real-time mission planning for multi-rotor unmanned aerial vehicles (UAVs) in a time critical search and rescue scenario. Starting with a known environment, we specify the mission using Metric Temporal Logic (MTL) and use a hybrid dynamical model to capture the various modes of UAV operation. We then divide the mission into several sub-tasks by exploiting the invariant nature of safety and timing constraints along the way, and the different modes (i.e., dynamics) of the UAV. For each sub-task, we translate the MTL specifications into linear constraints and solve the associated optimal control problem for desired path, using a Mixed Integer Linear Program (MILP) solver. The complete path for the mission is constructed recursively by composing the individual optimal sub-paths. We show by simulations that the resulting suboptimal trajectories satisfy the mission specifications, and the proposed approach leads to significant reduction in computational complexity of the problem, making it possible to implement in real-time. Our proposed method ensures the safety of UAVs at all times and guarantees finite time mission completion. It is also shown that our approach scales up nicely for a large number of UAVs.
△ Less
Submitted 28 September, 2020; v1 submitted 17 December, 2019;
originally announced December 2019.
-
Drone-Assisted Communications for Remote Areas and Disaster Relief
Authors:
Anousheh Gholami,
Usman A. Fiaz,
John S. Baras
Abstract:
We explore an end-to-end (including access and backhaul links) UAV-assisted wireless communication system, considering both uplink and downlink traffics, with the goal of supporting demand of the Ground Users (GUs) using the minimum number of UAVs. Moreover, in order to extend the operational (flight) time of UAVs, we exploit an energy-aware routing scheme. Our intention is to design and analyze t…
▽ More
We explore an end-to-end (including access and backhaul links) UAV-assisted wireless communication system, considering both uplink and downlink traffics, with the goal of supporting demand of the Ground Users (GUs) using the minimum number of UAVs. Moreover, in order to extend the operational (flight) time of UAVs, we exploit an energy-aware routing scheme. Our intention is to design and analyze the access and backhaul connectivity of a drone-assisted communication network for remote and crowded areas and disaster relief, while minimizing the resources required i.e., the number of UAVs.
△ Less
Submitted 4 September, 2019;
originally announced September 2019.
-
A Hybrid Compositional Approach to Optimal Mission Planning for Multi-rotor UAVs using Metric Temporal Logic
Authors:
Usman A. Fiaz,
John S. Baras
Abstract:
This paper investigates a hybrid compositional approach to optimal mission planning for multi-rotor Unmanned Aerial Vehicles (UAVs). We consider a time critical search and rescue scenario with two quadrotors in a constrained environment. Metric Temporal Logic (MTL) is used to formally describe the task specifications. In order to capture the various modes of UAV operation, we utilize a hybrid mode…
▽ More
This paper investigates a hybrid compositional approach to optimal mission planning for multi-rotor Unmanned Aerial Vehicles (UAVs). We consider a time critical search and rescue scenario with two quadrotors in a constrained environment. Metric Temporal Logic (MTL) is used to formally describe the task specifications. In order to capture the various modes of UAV operation, we utilize a hybrid model for the system with linearized dynamics around different operating points. We divide the mission into several sub-tasks by exploiting the invariant nature of various task specifications i.e., the mutual independence of safety and timing constraints along the way, and the different modes (i,e., dynamics) of the robot. For each sub-task, we translate the MTL formulae into linear constraints, and solve the associated optimal control problem for desired path using a Mixed Integer Linear Program (MILP) solver. The complete path is constructed by the composition of individual optimal sub-paths. We show that the resulting trajectory satisfies the task specifications, and the proposed approach leads to significant reduction in computational complexity of the problem, making it possible to implement in real-time.
△ Less
Submitted 19 September, 2019; v1 submitted 8 April, 2019;
originally announced April 2019.
-
Value of Information in Feedback Control: Quantification
Authors:
Touraj Soleymani,
John S. Baras,
Sandra Hirche
Abstract:
Although transmission of a data packet containing sensory information in a networked control system improves the quality of regulation, it has indeed a price from the communication perspective. It is, therefore, rational that such a data packet be transmitted only if it is valuable in the sense of a cost-benefit analysis. Yet, the fact is that little is known so far about this valuation of informa…
▽ More
Although transmission of a data packet containing sensory information in a networked control system improves the quality of regulation, it has indeed a price from the communication perspective. It is, therefore, rational that such a data packet be transmitted only if it is valuable in the sense of a cost-benefit analysis. Yet, the fact is that little is known so far about this valuation of information and its connection with traditional event-triggered communication. In the present article, we study this intrinsic property of networked control systems by formulating a rate-regulation tradeoff between the packet rate and the regulation cost with an event trigger and a controller as two distributed decision makers, and show that the valuation of information is conceivable and quantifiable grounded on this tradeoff. In particular, we characterize an equilibrium in the rate-regulation tradeoff, and quantify the value of information $\text{VoI}_k$ there as the variation in a so-called value function with respect to a piece of sensory information that can be communicated to the controller at each time $k$. We prove that, for a multi-dimensional Gauss-Markov process, $\text{VoI}_k$ is a symmetric function of the discrepancy between the state estimates at the event trigger and the controller, and that a data packet containing sensory information at time $k$ should be transmitted to the controller only if $\text{VoI}_k$ is nonnegative. Moreover, we discuss that $\text{VoI}_k$ can be computed with arbitrary accuracy, and that it can be approximated by a closed-form quadratic function with a performance guarantee.
△ Less
Submitted 2 May, 2022; v1 submitted 18 December, 2018;
originally announced December 2018.
-
Stochastic Control with Stale Information--Part I: Fully Observable Systems
Authors:
Touraj Soleymani,
John S. Baras,
Karl H. Johansson
Abstract:
In this study, we adopt age of information as a measure of the staleness of information, and take initial steps towards analyzing the control performance of stochastic systems with stale information. Our goals are to cast light on a fundamental limit on the information staleness that is required for a certain level of the control performance and to specify the corresponding stalest information pat…
▽ More
In this study, we adopt age of information as a measure of the staleness of information, and take initial steps towards analyzing the control performance of stochastic systems with stale information. Our goals are to cast light on a fundamental limit on the information staleness that is required for a certain level of the control performance and to specify the corresponding stalest information pattern. In the asymptotic regime, such a limit asserts a critical information staleness that is required for stabilization. We achieve these goals by formulating the problem as a stochastic optimization problem and characterizing the associated optimal solutions. These solutions are in fact a control policy, which specifies the control inputs of the plant, and a queuing policy, which specifies the staleness of information at the controller.
△ Less
Submitted 25 October, 2018;
originally announced October 2018.
-
Event-Triggered Controller Synthesis for Dynamical Systems with Temporal Logic Constraints
Authors:
Dipankar Maity,
John S. Baras
Abstract:
In this work, we propose an event-triggered con- trol framework for dynamical systems with temporal logical constraints. Event-triggered control methodologies have proven to be very efficient in reducing sensing, communication and computation costs. When a continuous feedback control is re- placed with an event-triggered strategy, the corresponding state trajectories also differ. In a system with…
▽ More
In this work, we propose an event-triggered con- trol framework for dynamical systems with temporal logical constraints. Event-triggered control methodologies have proven to be very efficient in reducing sensing, communication and computation costs. When a continuous feedback control is re- placed with an event-triggered strategy, the corresponding state trajectories also differ. In a system with logical constraints, such small deviation in the trajectory might lead to unsatisfiability of the logical constraints. In this work, we develop an approach where we ensure that the event-triggered state trajectory is confined within an tube of the ideal trajectory associated with the continuous state feedback. At the same time, we will ensure satisfiability of the logical constraints as well. Furthermore, we show that the proposed method works for delayed systems as long as the delay is bounded by a certain quantity.
△ Less
Submitted 26 February, 2018;
originally announced February 2018.
-
Linear Quadratic Games with Costly Measurements
Authors:
Dipankar Maity,
Achilleas Anastasopoulos,
John S. Baras
Abstract:
In this work we consider a stochastic linear quadratic two-player game. The state measurements are observed through a switched noiseless communication link. Each player incurs a finite cost every time the link is established to get measurements. Along with the usual control action, each player is equipped with a switching action to control the communication link. The measurements help to improve t…
▽ More
In this work we consider a stochastic linear quadratic two-player game. The state measurements are observed through a switched noiseless communication link. Each player incurs a finite cost every time the link is established to get measurements. Along with the usual control action, each player is equipped with a switching action to control the communication link. The measurements help to improve the estimate and hence reduce the quadratic cost but at the same time the cost is increased due to switching. We study the subgame perfect equilibrium control and switching strategies for the players. We show that the problem can be solved in a two-step process by solving two dynamic programming problems. The first step corresponds to solving a dynamic programming for the control strategy and the second step solves another dynamic programming for the switching strategy
△ Less
Submitted 20 September, 2017;
originally announced September 2017.
-
Dynamics over Signed Networks
Authors:
Guodong Shi,
Claudio Altafini,
John S. Baras
Abstract:
A signed network is a network with each link associated with a positive or negative sign. Models for nodes interacting over such signed networks, where two different types of interactions take place along the positive and negative links, respectively, arise from various biological, social, political, and economic systems. As modifications to the conventional DeGroot dynamics for positive links, tw…
▽ More
A signed network is a network with each link associated with a positive or negative sign. Models for nodes interacting over such signed networks, where two different types of interactions take place along the positive and negative links, respectively, arise from various biological, social, political, and economic systems. As modifications to the conventional DeGroot dynamics for positive links, two basic types of negative interactions along negative links, namely the opposing rule and the repelling rule, have been proposed and studied in the literature. This paper reviews a few fundamental convergence results for such dynamics over deterministic or random signed networks under a unified algebraic-graphical method. We show that a systematic tool of studying node state evolution over signed networks can be obtained utilizing generalized Perron-Frobenius theory, graph theory, and elementary algebraic recursions.
△ Less
Submitted 13 November, 2018; v1 submitted 11 June, 2017;
originally announced June 2017.
-
Fast Task-Specific Target Detection via Graph Based Constraints Representation and Checking
Authors:
Went Luan,
Yezhou Yang,
Cornelia Fermuller,
John S. Baras
Abstract:
In this work, we present a fast target detection framework for real-world robotics applications. Considering that an intelligent agent attends to a task-specific object target during execution, our goal is to detect the object efficiently. We propose the concept of early recognition, which influences the candidate proposal process to achieve fast and reliable detection performance. To check the ta…
▽ More
In this work, we present a fast target detection framework for real-world robotics applications. Considering that an intelligent agent attends to a task-specific object target during execution, our goal is to detect the object efficiently. We propose the concept of early recognition, which influences the candidate proposal process to achieve fast and reliable detection performance. To check the target constraints efficiently, we put forward a novel policy to generate a sub-optimal checking order, and prove that it has bounded time cost compared to the optimal checking sequence, which is not achievable in polynomial time. Experiments on two different scenarios: 1) rigid object and 2) non-rigid body part detection validate our pipeline. To show that our method is widely applicable, we further present a human-robot interaction system based on our non-rigid body part detection.
△ Less
Submitted 22 November, 2016; v1 submitted 14 November, 2016;
originally announced November 2016.
-
Co-active Learning to Adapt Humanoid Movement for Manipulation
Authors:
Ren Mao,
John S. Baras,
Yezhou Yang,
Cornelia Fermuller
Abstract:
In this paper we address the problem of robot movement adaptation under various environmental constraints interactively. Motion primitives are generally adopted to generate target motion from demonstrations. However, their generalization capability is weak while facing novel environments. Additionally, traditional motion generation methods do not consider the versatile constraints from various use…
▽ More
In this paper we address the problem of robot movement adaptation under various environmental constraints interactively. Motion primitives are generally adopted to generate target motion from demonstrations. However, their generalization capability is weak while facing novel environments. Additionally, traditional motion generation methods do not consider the versatile constraints from various users, tasks, and environments. In this work, we propose a co-active learning framework for learning to adapt robot end-effector's movement for manipulation tasks. It is designed to adapt the original imitation trajectories, which are learned from demonstrations, to novel situations with various constraints. The framework also considers user's feedback towards the adapted trajectories, and it learns to adapt movement through human-in-the-loop interactions. The implemented system generalizes trained motion primitives to various situations with different constraints considering user preferences. Experiments on a humanoid platform validate the effectiveness of our approach.
△ Less
Submitted 12 September, 2016;
originally announced September 2016.
-
Reliable Attribute-Based Object Recognition Using High Predictive Value Classifiers
Authors:
Wentao Luan,
Yezhou Yang,
Cornelia Fermuller,
John Baras
Abstract:
We consider the problem of object recognition in 3D using an ensemble of attribute-based classifiers. We propose two new concepts to improve classification in practical situations, and show their implementation in an approach implemented for recognition from point-cloud data. First, the viewing conditions can have a strong influence on classification performance. We study the impact of the distanc…
▽ More
We consider the problem of object recognition in 3D using an ensemble of attribute-based classifiers. We propose two new concepts to improve classification in practical situations, and show their implementation in an approach implemented for recognition from point-cloud data. First, the viewing conditions can have a strong influence on classification performance. We study the impact of the distance between the camera and the object and propose an approach to fuse multiple attribute classifiers, which incorporates distance into the decision making. Second, lack of representative training samples often makes it difficult to learn the optimal threshold value for best positive and negative detection rate. We address this issue, by setting in our attribute classifiers instead of just one threshold value, two threshold values to distinguish a positive, a negative and an uncertainty class, and we prove the theoretical correctness of this approach. Empirical studies demonstrate the effectiveness and feasibility of the proposed concepts.
△ Less
Submitted 23 October, 2016; v1 submitted 12 September, 2016;
originally announced September 2016.
-
Multi-Metric Energy Efficient Routing in Mobile Ad-Hoc Networks
Authors:
Evripidis Paraskevas,
Kyriakos Manousakis,
Subir Das,
John S. Baras
Abstract:
Increasing network lifetime by reducing energy consumption across the network is one of the major concerns while designing routing protocols for Mobile Ad-Hoc Networks. In this paper, we investigate the main reasons that lead to energy depletion and we introduce appropriate routing metrics in the routing decision scheme to mitigate their effect and increase the network lifetime. For our routing sc…
▽ More
Increasing network lifetime by reducing energy consumption across the network is one of the major concerns while designing routing protocols for Mobile Ad-Hoc Networks. In this paper, we investigate the main reasons that lead to energy depletion and we introduce appropriate routing metrics in the routing decision scheme to mitigate their effect and increase the network lifetime. For our routing scheme, we take into consideration multiple layer parameters, such as MAC queue utilization, node degree and residual energy. We integrate our multi-metric routing scheme into OLSR, a standard MANET proactive routing protocol. We evaluate via simulations in NS3 the protocol modifications under a range of different static and mobile scenarios. The main observations are that in static and low mobility scenarios our modified routing protocol leads to a significant increase (5\%-20\%) in network lifetime compared to standard OLSR and slightly better performance in terms of Packet Delivery Ratio (PDR).
△ Less
Submitted 30 March, 2016;
originally announced March 2016.
-
Trust-Aware Network Utility Optimization in Multihop Wireless Networks with Delay Constraints
Authors:
Evripidis Paraskevas,
Tao Jiang,
John S. Baras
Abstract:
Many resource allocation problems can be formulated as a constrained maximization of a utility function. Network Utility Maximization (NUM) applies optimization techniques to achieve decomposition by duality or the primal-dual method. Several important problems, for example joint source rate control, routing, and scheduling design, can be optimized by using this framework. In this work, we introdu…
▽ More
Many resource allocation problems can be formulated as a constrained maximization of a utility function. Network Utility Maximization (NUM) applies optimization techniques to achieve decomposition by duality or the primal-dual method. Several important problems, for example joint source rate control, routing, and scheduling design, can be optimized by using this framework. In this work, we introduce an important network security concept, "trust", into the NUM formulation and we integrate nodes' trust values in the optimization framework. These trust values are based on the interaction history between network entities and community based monitoring. Our objective is to avoid routing packets though paths with large percentage of malicious nodes. We also add end-to-end delay constraints for each of the traffic flows. The delay constraints are introduced to capture the quality of service (QoS) requirements imposed to each traffic flow.
△ Less
Submitted 9 May, 2016; v1 submitted 30 March, 2016;
originally announced March 2016.
-
Timed Automata Approach for Motion Planning Using Metric Interval Temporal Logic
Authors:
Yuchen Zhou,
Dipankar Maity,
John S. Baras
Abstract:
In this paper, we consider the robot motion (or task) planning problem under some given time bounded high level specifications. We use metric interval temporal logic (MITL), a member of the temporal logic family, to represent the task specification and then we provide a constructive way to generate a timed automaton and methods to look for accepting runs on the automaton to find a feasible motion…
▽ More
In this paper, we consider the robot motion (or task) planning problem under some given time bounded high level specifications. We use metric interval temporal logic (MITL), a member of the temporal logic family, to represent the task specification and then we provide a constructive way to generate a timed automaton and methods to look for accepting runs on the automaton to find a feasible motion (or path) sequence for the robot to complete the task.
△ Less
Submitted 28 March, 2016; v1 submitted 27 March, 2016;
originally announced March 2016.
-
Hardware Software Co-design for Automotive CPS using Architecture Analysis and Design Language
Authors:
Yuchen Zhou,
John Baras,
Shige Wang
Abstract:
Modern cyber-physical systems (CPS) have a close inter-dependence between software and physical components. Automotive embedded systems are typical CPS, as physical chips, sensors and actuators are physical components and software embedded within are the cyber components. The current stage of embedded systems is highly complex in architecture design for both software and hardware. It is common in…
▽ More
Modern cyber-physical systems (CPS) have a close inter-dependence between software and physical components. Automotive embedded systems are typical CPS, as physical chips, sensors and actuators are physical components and software embedded within are the cyber components. The current stage of embedded systems is highly complex in architecture design for both software and hardware. It is common in industrial practice that high level control algorithm development and low level code implementation on hardware platforms are developed separately with limited shared information. However, software code and hardware architecture become closely related with the increasing complexity. Correlated requirements and dependencies between hardware and software are emerging problems of industrial practice. We demonstrate in this paper a method to link model based system design with real-time simulations and analysis of the architecture model. This allows hardware software co-design and thus early selection of hardware architecture.
△ Less
Submitted 16 March, 2016;
originally announced March 2016.