-
An Autonomous Hybrid Drone-Rover Vehicle for Weed Removal and Spraying Applications in Agriculture
Authors:
J Krishna Kant,
Mahankali Sripaad,
Anand Bharadwaj,
Rajashekhar V S,
Suresh Sundaram
Abstract:
The usage of drones and rovers helps to overcome the limitations of traditional agriculture which has been predominantly human-intensive, for carrying out tasks such as removal of weeds and spraying of fertilizers and pesticides. Drones and rovers are hel** to realize precision agriculture and farmers with improved monitoring and surveying at affordable costs. Major benefits have come for vertic…
▽ More
The usage of drones and rovers helps to overcome the limitations of traditional agriculture which has been predominantly human-intensive, for carrying out tasks such as removal of weeds and spraying of fertilizers and pesticides. Drones and rovers are hel** to realize precision agriculture and farmers with improved monitoring and surveying at affordable costs. Major benefits have come for vertical farming and fields with irrigation canals. However, drones have a limitation of flight time due to payload constraints. Rovers have limitations in vertical farming and obstacles like canals in agricultural fields. To meet the different requirements of multiple terrains and vertical farming in agriculture, we propose an autonomous hybrid drone-rover vehicle that combines the advantages of both rovers and drones. The prototype is described along with experimental results regarding its ability to avoid obstacles, pluck weeds and spray pesticides.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
Non-Intrusive Driver Behavior Characterization From Road-Side Cameras
Authors:
Pavana Pradeep Kumar,
Krishna Kant,
Amitangshu Pal
Abstract:
In this paper, we demonstrate a proof of concept for characterizing vehicular behavior using only the roadside cameras of the ITS system. The essential advantage of this method is that it can be implemented in the roadside infrastructure transparently and inexpensively and can have a global view of each vehicle's behavior without any involvement of or awareness by the individual vehicles or driver…
▽ More
In this paper, we demonstrate a proof of concept for characterizing vehicular behavior using only the roadside cameras of the ITS system. The essential advantage of this method is that it can be implemented in the roadside infrastructure transparently and inexpensively and can have a global view of each vehicle's behavior without any involvement of or awareness by the individual vehicles or drivers. By using a setup that includes programmatically controlled robot cars (to simulate different types of vehicular behaviors) and an external video camera set up to capture and analyze the vehicular behavior, we show that the driver classification based on the external video analytics yields accuracies that are within 1-2\% of the accuracies of direct vehicle-based characterization. We also show that the residual errors primarily relate to gaps in correct object identification and tracking and thus can be further reduced with a more sophisticated setup. The characterization can be used to enhance both the safety and performance of the traffic flow, particularly in the mixed manual and automated vehicle scenarios that are expected to be common soon.
△ Less
Submitted 25 February, 2023;
originally announced February 2023.
-
Performance Health Index for Complex Cyber Infrastructures
Authors:
Sanjeev Sondur,
Krishna Kant
Abstract:
Most IT systems depend on a set of configuration variables (CVs), expressed as a name/value pair that collectively define the resource allocation for the system. While the ill-effects of misconfiguration or improper resource allocation are well-known, there is no effective a priori metric to quantify the impact of the configuration on the desired system attributes such as performance, availability…
▽ More
Most IT systems depend on a set of configuration variables (CVs), expressed as a name/value pair that collectively define the resource allocation for the system. While the ill-effects of misconfiguration or improper resource allocation are well-known, there is no effective a priori metric to quantify the impact of the configuration on the desired system attributes such as performance, availability, etc. In this paper, we propose a \textit{Configuration Health Index} (CHI) framework specifically attuned to the performance attribute to capture the influence of CVs on the performance aspects of the system. We show how CHI, which is defined as a configuration scoring system, can take advantage of the domain knowledge and the available (but rather limited) performance data to produce important insights into the configuration settings. We compare the CHI with both well-advertised segmented non-linear models and state-of-the-art data-driven models, and show that the CHI not only consistently provides better results but also avoids the dangers of pure data drive approach which may predict incorrect behavior or eliminate some essential configuration variables from consideration.
△ Less
Submitted 2 September, 2021;
originally announced September 2021.
-
Fort Formation by an Automaton
Authors:
Kartikey Kant,
Debasish Pattanayak,
Partha Sarathi Mandal
Abstract:
Building structures by low capability robots is a very recent research development. A robot (or a mobile agent) is designed as a deterministic finite automaton. The objective is to make a structure from a given distribution of materials (\textit{bricks}) in an infinite grid $Z\times Z$. The grid cells may contain a brick (\textit{full cells}) or it may be empty (\textit{empty cells}). The \textit{…
▽ More
Building structures by low capability robots is a very recent research development. A robot (or a mobile agent) is designed as a deterministic finite automaton. The objective is to make a structure from a given distribution of materials (\textit{bricks}) in an infinite grid $Z\times Z$. The grid cells may contain a brick (\textit{full cells}) or it may be empty (\textit{empty cells}). The \textit{field}, a sub-graph induced by the full cells, is initially connected. At a given point in time, a robot can carry at most one brick. The robot can move in four directions (north, east, south, and west) and starts from a \textit{full cell}. The \textit{Manhattan distance} between the farthest full cells is the \textit{span} of the field.
We consider the construction of a \textit{fort}, a structure with the minimum span and maximum covered area. On a square grid, a fort is a hollow rectangle with bricks on the perimeter. We show that the construction of such a fort can be done in $O(z^2)$ time -- with a matching lower bound $Ω(z^2)$ -- where $z$ is the number of bricks present in the environment.
△ Less
Submitted 30 November, 2020;
originally announced November 2020.
-
Deep Learning for Visual Recognition of Environmental Enteropathy and Celiac Disease
Authors:
Aman Shrivastava,
Karan Kant,
Saurav Sengupta,
Sung-Jun Kang,
Marium Khan,
Asad Ali,
Sean R. Moore,
Beatrice C. Amadi,
Paul Kelly,
Donald E. Brown,
Sana Syed
Abstract:
Physicians use biopsies to distinguish between different but histologically similar enteropathies. The range of syndromes and pathologies that could cause different gastrointestinal conditions makes this a difficult problem. Recently, deep learning has been used successfully in hel** diagnose cancerous tissues in histopathological images. These successes motivated the research presented in this…
▽ More
Physicians use biopsies to distinguish between different but histologically similar enteropathies. The range of syndromes and pathologies that could cause different gastrointestinal conditions makes this a difficult problem. Recently, deep learning has been used successfully in hel** diagnose cancerous tissues in histopathological images. These successes motivated the research presented in this paper, which describes a deep learning approach that distinguishes between Celiac Disease (CD) and Environmental Enteropathy (EE) and normal tissue from digitized duodenal biopsies. Experimental results show accuracies of over 90% for this approach. We also look into interpreting the neural network model using Gradient-weighted Class Activation Map**s and filter activations on input images to understand the visual explanations for the decisions made by the model.
△ Less
Submitted 8 August, 2019;
originally announced August 2019.
-
IoTC2: A Formal Method Approach for Detecting Conflicts in Large Scale IoT Systems
Authors:
Abdullah Al Farooq,
Ehab Al-Shaer,
Thomas Moyer,
Krishna Kant
Abstract:
Internet of Things (IoT) has become a common paradigm for different domains such as health care, transportation infrastructure, smart home, smart shop**, and e-commerce. With its interoperable functionality, it is now possible to connect all domains of IoT together for providing competent services to the users. Because numerous IoT devices can connect and communicate at the same time, there can…
▽ More
Internet of Things (IoT) has become a common paradigm for different domains such as health care, transportation infrastructure, smart home, smart shop**, and e-commerce. With its interoperable functionality, it is now possible to connect all domains of IoT together for providing competent services to the users. Because numerous IoT devices can connect and communicate at the same time, there can be events that trigger conflicting actions to an actuator or an environmental feature. However, there have been very few research efforts made to detect conflicting situation in IoT system using formal method. This paper provides a formal method approach, IoT Confict Checker (IoTC2), to ensure safety of controller and actuators' behavior with respect to conflicts. Any policy violation results in detection of the conflicts. We defined the safety policies for controller, actions, and triggering events and implemented the those with Prolog to prove the logical completeness and soundness. In addition to that, we have implemented the detection policies in Matlab Simulink Environment with its built-in Model Verification blocks. We created smart home environment in Simulink and showed how the conflicts affect actions and corresponding features. We have also experimented the scalability, efficiency, and accuracy of our method in the simulated environment.
△ Less
Submitted 10 December, 2018;
originally announced December 2018.
-
BT-GPSR: An Integrated Trust Model for Secure Geographic Routing in Wireless Sensor Networks
Authors:
Raghu Vamsi. P,
Payal Khurana Batra,
Krishna Kant
Abstract:
Geographic routing offers guaranteed packet deliv- ery in a dense network. In this routing, packets are forwarded to a node which is nearer to the destination with an extensive use of location information. However, research studies in Mobile Adhoc Networks (MANETs) and Wireless Sensor Networks (WSNs) have shown that packet delivery percentage can degrade substantially when malicious nodes are foun…
▽ More
Geographic routing offers guaranteed packet deliv- ery in a dense network. In this routing, packets are forwarded to a node which is nearer to the destination with an extensive use of location information. However, research studies in Mobile Adhoc Networks (MANETs) and Wireless Sensor Networks (WSNs) have shown that packet delivery percentage can degrade substantially when malicious nodes are found in the network. Conventional cryptography techniques can be adopted in order to deal with ma- licious nodes, but they cannot mitigate outsider attacks. In recent years, a societal pattern called trust is used as a tool to mitigate security attacks. Numerous researchers have proposed security solutions by adopting trust in routing algorithms. However, each solution has its own strength and weakness. In this paper, an integrated approach by using reputation and weight based trust systems backed by Greedy Perimeter Stateless Routing (BT-GPSR) is presented. The proposed approach outperforms the conventional reputation and weight based methods. The effectiveness of the proposed BT-GPSR is validated through simulation.
△ Less
Submitted 23 July, 2014; v1 submitted 12 June, 2014;
originally announced June 2014.
-
Systematic Design of Trust Management Systems for Wireless Sensor Networks: A Review
Authors:
Raghu Vamsi. P,
Krishna Kant
Abstract:
Conventional cryptography methods alone are not adequate for secure routing in Wireless Sensor Networks (WSNs). These networks are more vulnerable to security attacks due to their diverse applications, lack of supervision and limitations in view of resource, processing and storage. To mitigate these problems, trust is widely used as a tool to provide better security by aiding routing protocols. In…
▽ More
Conventional cryptography methods alone are not adequate for secure routing in Wireless Sensor Networks (WSNs). These networks are more vulnerable to security attacks due to their diverse applications, lack of supervision and limitations in view of resource, processing and storage. To mitigate these problems, trust is widely used as a tool to provide better security by aiding routing protocols. In recent years, numerous researchers have proposed wide variety of solutions based on trust. However, all these solutions carry their own design. In this paper, we attempt to present steps for a systematic design of trust management systems for WSNs. In addition, we address the techniques followed by scholars in implementing trust frameworks. Furthermore, we provide discussion on state-of-the-art research in designing trust systems with summary and comparisons.
△ Less
Submitted 23 July, 2014; v1 submitted 12 June, 2014;
originally announced June 2014.