-
Control Theoretic Approach to Fine-Tuning and Transfer Learning
Authors:
Erkan Bayram,
Shenyu Liu,
Mohamed-Ali Belabbas,
Tamer Başar
Abstract:
Given a training set in the form of a paired $(\mathcal{X},\mathcal{Y})$, we say that the control system $\dot x = f(x,u)$ has learned the paired set via the control $u^*$ if the system steers each point of $\mathcal{X}$ to its corresponding target in $\mathcal{Y}$. If the training set is expanded, most existing methods for finding a new control $u^*$ require starting from scratch, resulting in a…
▽ More
Given a training set in the form of a paired $(\mathcal{X},\mathcal{Y})$, we say that the control system $\dot x = f(x,u)$ has learned the paired set via the control $u^*$ if the system steers each point of $\mathcal{X}$ to its corresponding target in $\mathcal{Y}$. If the training set is expanded, most existing methods for finding a new control $u^*$ require starting from scratch, resulting in a quadratic increase in complexity with the number of points. To overcome this limitation, we introduce the concept of $\textit{ tuning without forgetting}$. We develop $\textit{an iterative algorithm}$ to tune the control $u^*$ when the training set expands, whereby points already in the paired set are still matched, and new training samples are learned. At each update of our method, the control $u^*$ is projected onto the kernel of the end-point map** generated by the controlled dynamics at the learned samples. It ensures kee** the end-points for the previously learned samples constant while iteratively learning additional samples.
△ Less
Submitted 19 May, 2024; v1 submitted 16 April, 2024;
originally announced April 2024.
-
Age of $(k,n)$-Threshold Signature Scheme on a Gossip Network
Authors:
Erkan Bayram,
Melih Bastopcu,
Mohamed-Ali Belabbas,
Tamer Başar
Abstract:
We consider information update systems on a gossip network, which consists of a single source and $n$ receiver nodes. The source encrypts the information into $n$ distinct keys with version stamps, sending a unique key to each node. For decryption in a $(k, n)$-Threshold Signature Scheme, each receiver node requires at least $k+1$ different keys with the same version, shared over peer-to-peer conn…
▽ More
We consider information update systems on a gossip network, which consists of a single source and $n$ receiver nodes. The source encrypts the information into $n$ distinct keys with version stamps, sending a unique key to each node. For decryption in a $(k, n)$-Threshold Signature Scheme, each receiver node requires at least $k+1$ different keys with the same version, shared over peer-to-peer connections. We consider two different schemes: a memory scheme (in which the nodes keep the source's current and previous encrypted messages) and a memoryless scheme (in which the nodes are allowed to only keep the source's current message). We measure the ''timeliness'' of information updates by using the version age of information. Our work focuses on determining closed-form expressions for the time average age of information in a heterogeneous random graph. Our work not only allows to verify the expected outcome that a memory scheme results in a lower average age compared to a memoryless scheme, but also provides the quantitative difference between the two. In our numerical results, we quantify the value of memory and demonstrate that the advantages of memory diminish with infrequent source updates, frequent gossip** between nodes, or a decrease in $k$ for a fixed number of nodes.
△ Less
Submitted 18 February, 2024;
originally announced February 2024.
-
Vector-Valued Gossip over $w$-Holonomic Networks
Authors:
Erkan Bayram,
Mohamed-Ali Belabbas,
Tamer Başar
Abstract:
We study the weighted average consensus problem for a gossip network of agents with vector-valued states. For a given matrix-weighted graph, the gossip process is described by a sequence of pairs of adjacent agents communicating and updating their states based on the edge matrix weight. Our key contribution is providing conditions for the convergence of this non-homogeneous Markov process as well…
▽ More
We study the weighted average consensus problem for a gossip network of agents with vector-valued states. For a given matrix-weighted graph, the gossip process is described by a sequence of pairs of adjacent agents communicating and updating their states based on the edge matrix weight. Our key contribution is providing conditions for the convergence of this non-homogeneous Markov process as well as the characterization of its limit set. To this end, we introduce the notion of "$w$-holonomy" of a set of stochastic matrices, which enables the characterization of sequences of gossi** pairs resulting in reaching a desired consensus in a decentralized manner. Stated otherwise, our result characterizes the limiting behavior of infinite products of (non-commuting, possibly with absorbing states) stochastic matrices.
△ Less
Submitted 7 November, 2023;
originally announced November 2023.
-
Geometric Heat Flow Method for Legged Locomotion Planning
Authors:
Yinai Fan,
Shenyu Liu,
Mohamed-Ali Belabbas
Abstract:
We propose in this paper a motion planning method for legged robot locomotion based on Geometric Heat Flow framework. The motion planning task is challenging due to the hybrid nature of dynamics and contact constraints. We encode the hybrid dynamics and constraints into Riemannian inner product, and this inner product is defined so that short curves correspond to admissible motions for the system.…
▽ More
We propose in this paper a motion planning method for legged robot locomotion based on Geometric Heat Flow framework. The motion planning task is challenging due to the hybrid nature of dynamics and contact constraints. We encode the hybrid dynamics and constraints into Riemannian inner product, and this inner product is defined so that short curves correspond to admissible motions for the system. We rely on the affine geometric heat flow to deform an arbitrary path connecting the desired initial and final states to this admissible motion. The method is able to automatically find the trajectory of robot's center of mass, feet contact positions and forces on uneven terrain.
△ Less
Submitted 19 January, 2021;
originally announced January 2021.
-
Vision-Based Shape Reconstruction of Soft Continuum Arms Using a Geometric Strain Parametrization
Authors:
Ali AlBeladi,
Girish Krishnan,
Mohamed-Ali Belabbas,
Seth Hutchinson
Abstract:
Interest in soft continuum arms has increased as their inherent material elasticity enables safe and adaptive interactions with the environment. However to achieve full autonomy in these arms, accurate three-dimensional shape sensing is needed. Vision-based solutions have been found to be effective in estimating the shape of soft continuum arms. In this paper, a vision-based shape estimator that u…
▽ More
Interest in soft continuum arms has increased as their inherent material elasticity enables safe and adaptive interactions with the environment. However to achieve full autonomy in these arms, accurate three-dimensional shape sensing is needed. Vision-based solutions have been found to be effective in estimating the shape of soft continuum arms. In this paper, a vision-based shape estimator that utilizes a geometric strain based representation for the soft continuum arm's shape, is proposed. This representation reduces the dimension of the curved shape to a finite set of strain basis functions, thereby allowing for efficient optimization for the shape that best fits the observed image. Experimental results demonstrate the effectiveness of the proposed approach in estimating the end effector with accuracy less than the soft arm's radius. Multiple basis functions are also analyzed and compared for the specific soft continuum arm in use.
△ Less
Submitted 18 November, 2020;
originally announced November 2020.
-
On Integer Balancing of Digraphs
Authors:
Mohamed-Ali Belabbas,
Xudong Chen
Abstract:
A weighted digraph is balanced if the sums of the weights of the incoming and of the outgoing edges are equal at each vertex. We show that if these sums are integers, then the edge weights can be integers as well.
A weighted digraph is balanced if the sums of the weights of the incoming and of the outgoing edges are equal at each vertex. We show that if these sums are integers, then the edge weights can be integers as well.
△ Less
Submitted 18 November, 2020; v1 submitted 16 November, 2020;
originally announced November 2020.
-
On implicit regularization: Morse functions and applications to matrix factorization
Authors:
Mohamed Ali Belabbas
Abstract:
In this paper, we revisit implicit regularization from the ground up using notions from dynamical systems and invariant subspaces of Morse functions. The key contributions are a new criterion for implicit regularization---a leading contender to explain the generalization power of deep models such as neural networks---and a general blueprint to study it. We apply these techniques to settle a conjec…
▽ More
In this paper, we revisit implicit regularization from the ground up using notions from dynamical systems and invariant subspaces of Morse functions. The key contributions are a new criterion for implicit regularization---a leading contender to explain the generalization power of deep models such as neural networks---and a general blueprint to study it. We apply these techniques to settle a conjecture on implicit regularization in matrix factorization.
△ Less
Submitted 31 January, 2020; v1 submitted 13 January, 2020;
originally announced January 2020.
-
A Homotopy Method for Motion Planning
Authors:
Shenyu Liu,
Mohamed Ali Belabbas
Abstract:
We propose a novel method for motion planning and illustrate its implementation on several canonical examples. The core novel idea underlying the method is to define a metric for which a path of minimal length is an admissible path, that is path that respects the various constraints imposed by the environment and the physics of the system on its dynamics. To be more precise, our method takes as in…
▽ More
We propose a novel method for motion planning and illustrate its implementation on several canonical examples. The core novel idea underlying the method is to define a metric for which a path of minimal length is an admissible path, that is path that respects the various constraints imposed by the environment and the physics of the system on its dynamics. To be more precise, our method takes as input a control system with holonomic and non-holonomic constraints, an initial and final point in configuration space, a description of obstacles to avoid, and an initial trajectory for the system, called a sketch. This initial trajectory does not need to meet the constraints, except for the obstacle avoidance constraints. The constraints are then encoded in an inner product, which is used to deform (via a homotopy) the initial sketch into an admissible trajectory from which controls realizing the transfer can be obtained. We illustrate the method on various examples, including vehicle motion with obstacles and a two-link manipulator problem.
△ Less
Submitted 28 January, 2019;
originally announced January 2019.
-
Distributed Evaluation and Convergence of Self-Appraisals in Social Networks
Authors:
Xudong Chen,
Ji Liu,
M. -A. Belabbas,
Zhi Xu,
Tamer Basar
Abstract:
We consider in this paper a networked system of opinion dynamics in continuous time, where the agents are able to evaluate their self-appraisals in a distributed way. In the model we formulate, the underlying network topology is described by a rooted digraph. For each ordered pair of agents $(i,j)$, we assign a function of self-appraisal to agent $i$, which measures the level of importance of agen…
▽ More
We consider in this paper a networked system of opinion dynamics in continuous time, where the agents are able to evaluate their self-appraisals in a distributed way. In the model we formulate, the underlying network topology is described by a rooted digraph. For each ordered pair of agents $(i,j)$, we assign a function of self-appraisal to agent $i$, which measures the level of importance of agent $i$ to agent $j$. Thus, by communicating only with her neighbors, each agent is able to calculate the difference between her level of importance to others and others' level of importance to her. The dynamical system of self-appraisals is then designed to drive these differences to zero. We show that for almost all initial conditions, the trajectory generated by this dynamical system asymptotically converges to an equilibrium point which is exponentially stable.
△ Less
Submitted 27 October, 2015; v1 submitted 27 March, 2015;
originally announced March 2015.
-
Undirected Rigid Formations are Problematic
Authors:
Shaoshuai Mou,
A. Stephen Morse,
Mohamed Ali Belabbas,
Zhiyong Sun,
Brian D. O. Anderson
Abstract:
By an undirected rigid formation of mobile autonomous agents is meant a formation based on graph rigidity in which each pair of "neighboring" agents is responsible for maintaining a prescribed target distance between them. In a recent paper a systematic method was proposed for devising gradient control laws for asymptotically stabilizing a large class of rigid, undirected formations in two dimensi…
▽ More
By an undirected rigid formation of mobile autonomous agents is meant a formation based on graph rigidity in which each pair of "neighboring" agents is responsible for maintaining a prescribed target distance between them. In a recent paper a systematic method was proposed for devising gradient control laws for asymptotically stabilizing a large class of rigid, undirected formations in two dimensional space assuming all agents are described by kinematic point models. The aim of this paper is to explain what happens to such formations if neighboring agents have slightly different understandings of what the desired distance between them is supposed to be or equivalently if neighboring agents have differing estimates of what the actual distance between them is. In either case, what one would expect would be a gradual distortion of the formation from its target shape as discrepancies in desired or sensed distances increase. While this is observed for the gradient laws in question, something else quite unexpected happens at the same time. It is shown that for any rigidity-based, undirected formation of this type which is comprised of three or more agents, that if some neighboring agents have slightly different understandings of what the desired distances between them are suppose to be, then almost for certain, the trajectory of the resulting distorted but rigid formation will converge exponentially fast to a closed circular orbit in two-dimensional space which is traversed periodically at a constant angular speed.
△ Less
Submitted 2 March, 2015;
originally announced March 2015.
-
Decentralized Formation Control Part II: Algebraic aspects of information flow and singularities
Authors:
M. -A. Belabbas
Abstract:
Given an ensemble of autonomous agents and a task to achieve cooperatively, how much do the agents need to know about the state of the ensemble and about the task in order to achieve it? We introduce new methods to understand these aspects of decentralized control. Precisely, we introduce a framework to capture what agents with partial information can achieve by cooperating and illustrate its use…
▽ More
Given an ensemble of autonomous agents and a task to achieve cooperatively, how much do the agents need to know about the state of the ensemble and about the task in order to achieve it? We introduce new methods to understand these aspects of decentralized control. Precisely, we introduce a framework to capture what agents with partial information can achieve by cooperating and illustrate its use by deriving results about global stabilization of directed formations. This framework underscores the need to differentiate the knowledge an agent has about the task to accomplish from the knowledge an agent has about the current state of the system. The control of directed formations has proven to be more difficult than initially thought, as is exemplified by the lack of global result for formations with n \geq 4 agents. We established in part I that the space of planar formations has a non-trivial global topology. We propose here an extension of the notion of global stability which, because it acknowledges this non-trivial topology, can be applied to the study of formation control. We then develop a framework that reduces the question of whether feedback with partial information can stabilize the system to whether two sets of functions intersect. We apply this framework to the study of a directed formation with n = 4 agents and show that the agents do not have enough information to implement locally stabilizing feedback laws. Additionally, we show that feedback laws that respect the information flow cannot stabilize a target configuration without stabilizing other, unwanted configurations.
△ Less
Submitted 14 January, 2011; v1 submitted 12 January, 2011;
originally announced January 2011.
-
Decentralized Formation Control Part I: Geometric Aspects
Authors:
M. -A. Belabbas
Abstract:
In this paper, we develop new methods for the analysis of decentralized control systems and we apply them to formation control problems. The basic set-up consists of a system with multiple agents corresponding to the nodes of a graph whose edges encode the information that is available to the agents. We address the question of whether the information flow defined by the graph is sufficient for the…
▽ More
In this paper, we develop new methods for the analysis of decentralized control systems and we apply them to formation control problems. The basic set-up consists of a system with multiple agents corresponding to the nodes of a graph whose edges encode the information that is available to the agents. We address the question of whether the information flow defined by the graph is sufficient for the agents to accomplish a given task. Formation control is concerned with problems in which agents are required to stabilize at a given distance from other agents. In this context, the graph of a formation encodes both the information flow and the distance constraints, by fixing the lengths of the edges. A formation is said to be rigid if it cannot be continuously deformed with the distance constraints satisfied; a formation is minimally rigid if no distance constraint can be omitted without the formation losing its rigidity. Hence, the graph underlying minimally rigid formation provides just enough constraints to yield a rigid formation. An open question we will settle is whether the information flow afforded by a minimally rigid graph is sufficient to insure global stability. We show that the answer is negative in the case of directed information flow. In this first part, we establish basic properties of formation control in the plane. Formations and the associated control problems are defined modulo rigid transformations. This fact has strong implications on the geometry of the space of formations and on the feedback laws, since they need to respect this invariance. We study both aspects here. We show that the space of frameworks of n agents is CP(n-2) x (0,\infty). We then illustrate how the non-trivial topology of this space relates to the parametrization of the formation by inter-agent distances.
△ Less
Submitted 14 January, 2011; v1 submitted 12 January, 2011;
originally announced January 2011.
-
On landmark selection and sampling in high-dimensional data analysis
Authors:
Mohamed-Ali Belabbas,
Patrick J. Wolfe
Abstract:
In recent years, the spectral analysis of appropriately defined kernel matrices has emerged as a principled way to extract the low-dimensional structure often prevalent in high-dimensional data. Here we provide an introduction to spectral methods for linear and nonlinear dimension reduction, emphasizing ways to overcome the computational limitations currently faced by practitioners with massive…
▽ More
In recent years, the spectral analysis of appropriately defined kernel matrices has emerged as a principled way to extract the low-dimensional structure often prevalent in high-dimensional data. Here we provide an introduction to spectral methods for linear and nonlinear dimension reduction, emphasizing ways to overcome the computational limitations currently faced by practitioners with massive datasets. In particular, a data subsampling or landmark selection process is often employed to construct a kernel based on partial information, followed by an approximate spectral analysis termed the Nystrom extension. We provide a quantitative framework to analyse this procedure, and use it to demonstrate algorithmic performance bounds on a range of practical approaches designed to optimize the landmark selection process. We compare the practical implications of these bounds by way of real-world examples drawn from the field of computer vision, whereby low-dimensional manifold structure is shown to emerge from high-dimensional video data streams.
△ Less
Submitted 24 June, 2009;
originally announced June 2009.
-
On sparse representations of linear operators and the approximation of matrix products
Authors:
Mohamed-Ali Belabbas,
Patrick J. Wolfe
Abstract:
Thus far, sparse representations have been exploited largely in the context of robustly estimating functions in a noisy environment from a few measurements. In this context, the existence of a basis in which the signal class under consideration is sparse is used to decrease the number of necessary measurements while controlling the approximation error. In this paper, we instead focus on applicat…
▽ More
Thus far, sparse representations have been exploited largely in the context of robustly estimating functions in a noisy environment from a few measurements. In this context, the existence of a basis in which the signal class under consideration is sparse is used to decrease the number of necessary measurements while controlling the approximation error. In this paper, we instead focus on applications in numerical analysis, by way of sparse representations of linear operators with the objective of minimizing the number of operations needed to perform basic operations (here, multiplication) on these operators. We represent a linear operator by a sum of rank-one operators, and show how a sparse representation that guarantees a low approximation error for the product can be obtained from analyzing an induced quadratic form. This construction in turn yields new algorithms for computing approximate matrix products.
△ Less
Submitted 26 June, 2009; v1 submitted 30 July, 2007;
originally announced July 2007.