-
Design Challenges of Multi-UAV Systems in Cyber-Physical Applications: A Comprehensive Survey, and Future Directions
Authors:
Reza Shakeri,
Mohammed Ali Al-Garadi,
Ahmed Badawy,
Amr Mohamed,
Tamer Khattab,
Abdulla Al-Ali,
Khaled A. Harras,
Mohsen Guizani
Abstract:
Unmanned Aerial Vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs are a modern generation of systems with synergic cooperation between computational and physical potentials that can interact with humans through several new mechanisms. The main advantages of using U…
▽ More
Unmanned Aerial Vehicles (UAVs) have recently rapidly grown to facilitate a wide range of innovative applications that can fundamentally change the way cyber-physical systems (CPSs) are designed. CPSs are a modern generation of systems with synergic cooperation between computational and physical potentials that can interact with humans through several new mechanisms. The main advantages of using UAVs in CPS application is their exceptional features, including their mobility, dynamism, effortless deployment, adaptive altitude, agility, adjustability, and effective appraisal of real-world functions anytime and anywhere. Furthermore, from the technology perspective, UAVs are predicted to be a vital element of the development of advanced CPSs. Therefore, in this survey, we aim to pinpoint the most fundamental and important design challenges of multi-UAV systems for CPS applications. We highlight key and versatile aspects that span the coverage and tracking of targets and infrastructure objects, energy-efficient navigation, and image analysis using machine learning for fine-grained CPS applications. Key prototypes and testbeds are also investigated to show how these practical technologies can facilitate CPS applications. We present and propose state-of-the-art algorithms to address design challenges with both quantitative and qualitative methods and map these challenges with important CPS applications to draw insightful conclusions on the challenges of each application. Finally, we summarize potential new directions and ideas that could shape future research in these areas.
△ Less
Submitted 23 October, 2018;
originally announced October 2018.
-
Inferring Room Semantics Using Acoustic Monitoring
Authors:
Muhammad A. Shah,
Bhiksha Raj,
Khaled A. Harras
Abstract:
Having knowledge of the environmental context of the user i.e. the knowledge of the users' indoor location and the semantics of their environment, can facilitate the development of many of location-aware applications. In this paper, we propose an acoustic monitoring technique that infers semantic knowledge about an indoor space \emph{over time,} using audio recordings from it. Our technique uses t…
▽ More
Having knowledge of the environmental context of the user i.e. the knowledge of the users' indoor location and the semantics of their environment, can facilitate the development of many of location-aware applications. In this paper, we propose an acoustic monitoring technique that infers semantic knowledge about an indoor space \emph{over time,} using audio recordings from it. Our technique uses the impulse response of these spaces as well as the ambient sounds produced in them in order to determine a semantic label for them. As we process more recordings, we update our \emph{confidence} in the assigned label. We evaluate our technique on a dataset of single-speaker human speech recordings obtained in different types of rooms at three university buildings. In our evaluation, the confidence\emph{ }for the true label generally outstripped the confidence for all other labels and in some cases converged to 100\% with less than 30 samples.
△ Less
Submitted 24 October, 2017;
originally announced October 2017.
-
On Realistic Target Coverage by Autonomous Drones
Authors:
Ahmed Saeed,
Ahmed Abdelkader,
Mouhyemen Khan,
Azin Neishaboori,
Khaled A. Harras,
Amr Mohamed
Abstract:
Low-cost mini-drones with advanced sensing and maneuverability enable a new class of intelligent sensing systems. To achieve the full potential of such drones, it is necessary to develop new enhanced formulations of both common and emerging sensing scenarios. Namely, several fundamental challenges in visual sensing remain unsolved including: 1) Fitting sizable targets in camera frames; 2) Effectiv…
▽ More
Low-cost mini-drones with advanced sensing and maneuverability enable a new class of intelligent sensing systems. To achieve the full potential of such drones, it is necessary to develop new enhanced formulations of both common and emerging sensing scenarios. Namely, several fundamental challenges in visual sensing remain unsolved including: 1) Fitting sizable targets in camera frames; 2) Effective viewpoints matching target poses; 3) Occlusion by elements in the environment, including other targets. In this paper, we introduce Argus: an autonomous system that utilizes drones to incrementally collect target information through a two-tier architecture. To tackle the stated challenges, Argus employs a novel geometric model that captures both target shapes and coverage constraints. Recognizing drones as the scarcest resource, Argus aims to minimize the number of drones required to cover a set of targets. We prove this problem is NP-hard, and even hard to approximate, before deriving a best-possible approximation algorithm along with a competitive sampling heuristic which runs up to 100x faster according to large-scale simulations. To test Argus in action, we demonstrate and analyze its performance on a prototype implementation. Finally, we present a number of extensions to accommodate more application requirements and highlight some open problems.
△ Less
Submitted 5 September, 2018; v1 submitted 11 February, 2017;
originally announced February 2017.
-
MagBoard: Magnetic-based Ubiquitous Homomorphic Off-the-shelf Keyboard
Authors:
Heba Abdelnasser,
Moustafa Youssef,
Khaled A. Harras
Abstract:
One of the main methods for interacting with mobile devices today is the error-prone and inflexible touch-screen keyboard. This paper proposes MagBoard: a homomorphic ubiquitous keyboard for mobile devices. MagBoard allows application developers and users to design and print different custom keyboards for the same applications to fit different user's needs. The core idea is to leverage the triaxia…
▽ More
One of the main methods for interacting with mobile devices today is the error-prone and inflexible touch-screen keyboard. This paper proposes MagBoard: a homomorphic ubiquitous keyboard for mobile devices. MagBoard allows application developers and users to design and print different custom keyboards for the same applications to fit different user's needs. The core idea is to leverage the triaxial magnetometer embedded in standard mobile phones to accurately localize the location of a magnet on a virtual grid superimposed on the printed keyboard. This is achieved through a once in a lifetime fingerprint. MagBoard also provides a number of modules that allow it to cope with background magnetic noise, heterogeneous devices, different magnet shapes, sizes, and strengths, as well as changes in magnet polarity. Our implementation of MagBoard on Android phones with extensive evaluation in different scenarios demonstrates that it can achieve a key detection accuracy of more than 91% for keys as small as 2cm*2cm, reaching 100% for 4cm*4cm keys. This accuracy is robust with different phones and magnets, highlighting MagBoard promise as a homomorphic ubiquitous keyboard for mobile devices.
△ Less
Submitted 1 May, 2016;
originally announced May 2016.
-
UbiBreathe: A Ubiquitous non-Invasive WiFi-based Breathing Estimator
Authors:
Heba Abdelnasser,
Khaled A. Harras,
Moustafa Youssef
Abstract:
Monitoring breathing rates and patterns helps in the diagnosis and potential avoidance of various health problems. Current solutions for respiratory monitoring, however, are usually invasive and/or limited to medical facilities. In this paper, we propose a novel respiratory monitoring system, UbiBreathe, based on ubiquitous off-the-shelf WiFi-enabled devices. Our experiments show that the received…
▽ More
Monitoring breathing rates and patterns helps in the diagnosis and potential avoidance of various health problems. Current solutions for respiratory monitoring, however, are usually invasive and/or limited to medical facilities. In this paper, we propose a novel respiratory monitoring system, UbiBreathe, based on ubiquitous off-the-shelf WiFi-enabled devices. Our experiments show that the received signal strength (RSS) at a WiFi-enabled device held on a person's chest is affected by the breathing process. This effect extends to scenarios when the person is situated on the line-of-sight (LOS) between the access point and the device, even without holding it. UbiBreathe leverages these changes in the WiFi RSS patterns to enable ubiquitous non-invasive respiratory rate estimation, as well as apnea detection.
We propose the full architecture and design for UbiBreathe, incorporating various modules that help reliably extract the hidden breathing signal from a noisy WiFi RSS. The system handles various challenges such as noise elimination, interfering humans, sudden user movements, as well as detecting abnormal breathing situations. Our implementation of UbiBreathe using off-the-shelf devices in a wide range of environmental conditions shows that it can estimate different breathing rates with less than 1 breaths per minute (bpm) error. In addition, UbiBreathe can detect apnea with more than 96% accuracy in both the device-on-chest and hands-free scenarios. This highlights its suitability for a new class of anywhere respiratory monitoring.
△ Less
Submitted 10 May, 2015;
originally announced May 2015.
-
WiGest: A Ubiquitous WiFi-based Gesture Recognition System
Authors:
Heba Abdelnasser,
Moustafa Youssef,
Khaled A. Harras
Abstract:
We present WiGest: a system that leverages changes in WiFi signal strength to sense in-air hand gestures around the user's mobile device. Compared to related work, WiGest is unique in using standard WiFi equipment, with no modi-fications, and no training for gesture recognition. The system identifies different signal change primitives, from which we construct mutually independent gesture families.…
▽ More
We present WiGest: a system that leverages changes in WiFi signal strength to sense in-air hand gestures around the user's mobile device. Compared to related work, WiGest is unique in using standard WiFi equipment, with no modi-fications, and no training for gesture recognition. The system identifies different signal change primitives, from which we construct mutually independent gesture families. These families can be mapped to distinguishable application actions. We address various challenges including cleaning the noisy signals, gesture type and attributes detection, reducing false positives due to interfering humans, and adapting to changing signal polarity. We implement a proof-of-concept prototype using off-the-shelf laptops and extensively evaluate the system in both an office environment and a typical apartment with standard WiFi access points. Our results show that WiGest detects the basic primitives with an accuracy of 87.5% using a single AP only, including through-the-wall non-line-of-sight scenarios. This accuracy in-creases to 96% using three overheard APs. In addition, when evaluating the system using a multi-media player application, we achieve a classification accuracy of 96%. This accuracy is robust to the presence of other interfering humans, highlighting WiGest's ability to enable future ubiquitous hands-free gesture-based interaction with mobile devices.
△ Less
Submitted 18 May, 2015; v1 submitted 18 January, 2015;
originally announced January 2015.
-
OSCAR: A Collaborative Bandwidth Aggregation System
Authors:
Karim Habak,
Khaled A. Harras,
Moustafa Youssef
Abstract:
The exponential increase in mobile data demand, coupled with growing user expectation to be connected in all places at all times, have introduced novel challenges for researchers to address. Fortunately, the wide spread deployment of various network technologies and the increased adoption of multi-interface enabled devices have enabled researchers to develop solutions for those challenges. Such so…
▽ More
The exponential increase in mobile data demand, coupled with growing user expectation to be connected in all places at all times, have introduced novel challenges for researchers to address. Fortunately, the wide spread deployment of various network technologies and the increased adoption of multi-interface enabled devices have enabled researchers to develop solutions for those challenges. Such solutions aim to exploit available interfaces on such devices in both solitary and collaborative forms. These solutions, however, have faced a steep deployment barrier.
In this paper, we present OSCAR, a multi-objective, incentive-based, collaborative, and deployable bandwidth aggregation system. We present the OSCAR architecture that does not introduce any intermediate hardware nor require changes to current applications or legacy servers. The OSCAR architecture is designed to automatically estimate the system's context, dynamically schedule various connections and/or packets to different interfaces, be backwards compatible with the current Internet architecture, and provide the user with incentives for collaboration. We also formulate the OSCAR scheduler as a multi-objective, multi-modal scheduler that maximizes system throughput while minimizing energy consumption or financial cost. We evaluate OSCAR via implementation on Linux, as well as via simulation, and compare our results to the current optimal achievable throughput, cost, and energy consumption. Our evaluation shows that, in the throughput maximization mode, we provide up to 150% enhancement in throughput compared to current operating systems, without any changes to legacy servers. Moreover, this performance gain further increases with the availability of connection resume-supporting, or OSCAR-enabled servers, reaching the maximum achievable upper-bound throughput.
△ Less
Submitted 6 January, 2014;
originally announced January 2014.
-
Bandwidth Aggregation Techniques in Heterogeneous Multi-homed Devices: A Survey
Authors:
Karim Habak,
Khaled A. Harras,
Moustafa Youssef
Abstract:
The widespread deployment of various networking technologies, coupled with the exponential increase in end- user data demand, have led to the proliferation of multi-homed, or multi-interface enabled, devices. These trends drove researchers to investigate a wide spectrum of solutions, at different layers of the protocol stack, that utilize available interfaces in such devices by aggregating their b…
▽ More
The widespread deployment of various networking technologies, coupled with the exponential increase in end- user data demand, have led to the proliferation of multi-homed, or multi-interface enabled, devices. These trends drove researchers to investigate a wide spectrum of solutions, at different layers of the protocol stack, that utilize available interfaces in such devices by aggregating their bandwidth. In this survey paper, we provide an overview and examine the evolution of bandwidth aggregation solutions over time. We begin by describing the bandwidth aggregation problem. We investigate the common features of proposed bandwidth aggregation systems and break them down into two major categories: layer-dependent and layer-independent features. Afterwards, we discuss the evolution trends in the literature and discuss some open challenges requiring further research. We end the survey with a brief presentation of related work in tangential research areas.
△ Less
Submitted 25 November, 2015; v1 submitted 2 September, 2013;
originally announced September 2013.
-
Unconventional TV Detection using Mobile Devices
Authors:
Mohamed Ibrahim,
Ahmed Saeed,
Moustafa Youssef,
Khaled A. Harras
Abstract:
Recent studies show that the TV viewing experience is changing giving the rise of trends like "multi-screen viewing" and "connected viewers". These trends describe TV viewers that use mobile devices (e.g. tablets and smart phones) while watching TV. In this paper, we exploit the context information available from the ubiquitous mobile devices to detect the presence of TVs and track the media being…
▽ More
Recent studies show that the TV viewing experience is changing giving the rise of trends like "multi-screen viewing" and "connected viewers". These trends describe TV viewers that use mobile devices (e.g. tablets and smart phones) while watching TV. In this paper, we exploit the context information available from the ubiquitous mobile devices to detect the presence of TVs and track the media being viewed. Our approach leverages the array of sensors available in modern mobile devices, e.g. cameras and microphones, to detect the location of TV sets, their state (ON or OFF), and the channels they are currently tuned to. We present the feasibility of the proposed sensing technique using our implementation on Android phones with different realistic scenarios. Our results show that in a controlled environment a detection accuracy of 0.978 F-measure could be achieved.
△ Less
Submitted 16 May, 2013;
originally announced June 2013.
-
Towards Dynamic Real-Time Geo-location Databases for TV White Spaces
Authors:
Ahmed Saeed,
Mohamed Ibrahim,
Moustafa Youssef,
Khaled A. Harras
Abstract:
Recent FCC regulations on TV white spaces allow geo-location databases to be the sole source of spectrum information for White Space Devices (WSDs). Geo-location databases protect TV band incumbents by kee** track of TV transmitters and their protected service areas based on their location, transmission parameters and sophisticated propagation models. In this article, we argue that kee** track…
▽ More
Recent FCC regulations on TV white spaces allow geo-location databases to be the sole source of spectrum information for White Space Devices (WSDs). Geo-location databases protect TV band incumbents by kee** track of TV transmitters and their protected service areas based on their location, transmission parameters and sophisticated propagation models. In this article, we argue that kee** track of both TV transmitters and TV receivers (i.e. TV sets) can achieve significant improvement in the availability of white spaces. We first identify wasted spectrum opportunities, both temporal and spatial, due to the current approach of white spaces detection. We then propose DynaWhite, a cloud-based architecture that orchestrates the detection and dissemination of highly-dynamic, real-time, and fine-grained TV white space information. DynaWhite introduces the next generation of geo-location databases by combining traditional sensing techniques with a novel unconventional sensing approach based on the detection of the passive TV receivers using standard cell phones. We present a quantitative evaluation of the potential gains in white space availability for large scale deployments of DynaWhite. We finally identify challenges that need to be addressed in the research community in order to exploit this potential for leveraging dynamic real-time fine-grained TV white spaces.
△ Less
Submitted 16 March, 2013;
originally announced March 2013.
-
DBAS: A Deployable Bandwidth Aggregation System
Authors:
Karim Habak,
Moustafa Youssef,
Khaled A. Harras
Abstract:
The explosive increase in data demand coupled with the rapid deployment of various wireless access technologies have led to the increase of number of multi-homed or multi-interface enabled devices. Fully exploiting these interfaces has motivated researchers to propose numerous solutions that aggregate their available bandwidths to increase overall throughput and satisfy the end-user's growing data…
▽ More
The explosive increase in data demand coupled with the rapid deployment of various wireless access technologies have led to the increase of number of multi-homed or multi-interface enabled devices. Fully exploiting these interfaces has motivated researchers to propose numerous solutions that aggregate their available bandwidths to increase overall throughput and satisfy the end-user's growing data demand. These solutions, however, have faced a steep deployment barrier that we attempt to overcome in this paper. We propose a Deployable Bandwidth Aggregation System (DBAS) for multi-interface enabled devices. Our system does not introduce any intermediate hardware, modify current operating systems, modify socket implementations, nor require changes to current applications or legacy servers. The DBAS architecture is designed to automatically estimate the characteristics of applications and dynamically schedule various connections or packets to different interfaces. Since our main focus is deployability, we fully implement DBAS on the Windows operating system and evaluate various modes of operation. Our implementation and simulation results show that DBAS achieves throughput gains up to 193% compared to current operating systems, while operating as an out-of-the-box standard Windows executable, highlighting its deployability and ease of use.
△ Less
Submitted 13 January, 2012;
originally announced January 2012.
-
How do Wireless Chains Behave? The Impact of MAC Interactions
Authors:
Saquib Razak,
Vinay Kolar,
Nael B. Abu-Ghazaleh,
Khaled A. Harras
Abstract:
In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in MHWNs whose behavior must be understood to enable building effective protocols. The behavior of chains is determined by a number of complex and interdependent processes that arise as the sources of different chain hops…
▽ More
In a Multi-hop Wireless Networks (MHWN), packets are routed between source and destination using a chain of intermediate nodes; chains are a fundamental communication structure in MHWNs whose behavior must be understood to enable building effective protocols. The behavior of chains is determined by a number of complex and interdependent processes that arise as the sources of different chain hops compete to transmit their packets on the shared medium. In this paper, we show that MAC level interactions play the primary role in determining the behavior of chains. We evaluate the types of chains that occur based on the MAC interactions between different links using realistic propagation and packet forwarding models. We discover that the presence of destructive interactions, due to different forms of hidden terminals, does not impact the throughput of an isolated chain significantly. However, due to the increased number of retransmissions required, the amount of bandwidth consumed is significantly higher in chains exhibiting destructive interactions, substantially influencing the overall network performance. These results are validated by testbed experiments. We finally study how different types of chains interfere with each other and discover that well behaved chains in terms of self-interference are more resilient to interference from other chains.
△ Less
Submitted 5 March, 2009;
originally announced March 2009.