-
Machine learning approach to detect dynamical states from recurrence measures
Authors:
Dheeraja Thakur,
Athul Mohan,
G. Ambika,
Chandrakala Meena
Abstract:
We integrate machine learning approaches with nonlinear time series analysis, specifically utilizing recurrence measures to classify various dynamical states emerging from time series. We implement three machine learning algorithms Logistic Regression, Random Forest, and Support Vector Machine for this study. The input features are derived from the recurrence quantification of nonlinear time serie…
▽ More
We integrate machine learning approaches with nonlinear time series analysis, specifically utilizing recurrence measures to classify various dynamical states emerging from time series. We implement three machine learning algorithms Logistic Regression, Random Forest, and Support Vector Machine for this study. The input features are derived from the recurrence quantification of nonlinear time series and characteristic measures of the corresponding recurrence networks. For training and testing we generate synthetic data from standard nonlinear dynamical systems and evaluate the efficiency and performance of the machine learning algorithms in classifying time series into periodic, chaotic, hyper-chaotic, or noisy categories. Additionally, we explore the significance of input features in the classification scheme and find that the features quantifying the density of recurrence points are the most relevant. Furthermore, we illustrate how the trained algorithms can successfully predict the dynamical states of two variable stars, SX Her and AC Her from the data of their light curves.
△ Less
Submitted 20 March, 2024; v1 submitted 18 January, 2024;
originally announced January 2024.
-
Building AI and Human Capital for Road Safety
Authors:
Yug Dedhia,
Anjali Singh,
Vaibhav Singh Tomar,
Nimmi Rangaswamy,
Dev Singh Thakur
Abstract:
AI is about learning algorithms and huge amounts of data and are drivers of economic growth -- what does this mean for the field of development studies? Can we re-orient to twin AI studies and development theory and practice to generate how development challenges are identified and researched? To do this a good grasp is needed of AI internal mechanisms and outcomes in addressing development issues…
▽ More
AI is about learning algorithms and huge amounts of data and are drivers of economic growth -- what does this mean for the field of development studies? Can we re-orient to twin AI studies and development theory and practice to generate how development challenges are identified and researched? To do this a good grasp is needed of AI internal mechanisms and outcomes in addressing development issues -- this argument will be developed through a case study of the ADAS [Advanced Driver Assistance System] deployment in India. Over and above discussing the ADAS we bring an anthropological lens to understand the social context that surrounds the system. Focusing on bus drivers, we offer findings from a qualitative and ethnographic study of drivers in a collaborative effort to achieve road safety by deploying AI-driven technology and empowering stakeholders in the transport industry in India especially, bus drivers as critical actors in the city transport network.
△ Less
Submitted 15 December, 2023;
originally announced December 2023.
-
A Data-Driven Approach to Synthesizing Dynamics-Aware Trajectories for Underactuated Robotic Systems
Authors:
Anusha Srikanthan,
Fengjun Yang,
Igor Spasojevic,
Dinesh Thakur,
Vijay Kumar,
Nikolai Matni
Abstract:
We consider joint trajectory generation and tracking control for under-actuated robotic systems. A common solution is to use a layered control architecture, where the top layer uses a simplified model of system dynamics for trajectory generation, and the low layer ensures approximate tracking of this trajectory via feedback control. While such layered control architectures are standard and work we…
▽ More
We consider joint trajectory generation and tracking control for under-actuated robotic systems. A common solution is to use a layered control architecture, where the top layer uses a simplified model of system dynamics for trajectory generation, and the low layer ensures approximate tracking of this trajectory via feedback control. While such layered control architectures are standard and work well in practice, selecting the simplified model used for trajectory generation typically relies on engineering intuition and experience. In this paper, we propose an alternative data-driven approach to dynamics-aware trajectory generation. We show that a suitable augmented Lagrangian reformulation of a global nonlinear optimal control problem results in a layered decomposition of the overall problem into trajectory planning and feedback control layers. Crucially, the resulting trajectory optimization is dynamics-aware, in that, it is modified with a tracking penalty regularizer encoding the dynamic feasibility of the generated trajectory. We show that this tracking penalty regularizer can be learned from system rollouts for independently-designed low layer feedback control policies, and instantiate our framework in the context of a unicycle and a quadrotor control problem in simulation. Further, we show that our approach handles the sim-to-real gap through experiments on the quadrotor hardware platform without any additional training. For both the synthetic unicycle example and the quadrotor system, our framework shows significant improvements in both computation time and dynamic feasibility in simulation and hardware experiments.
△ Less
Submitted 25 July, 2023;
originally announced July 2023.
-
SEER: Safe Efficient Exploration for Aerial Robots using Learning to Predict Information Gain
Authors:
Yuezhan Tao,
Yuwei Wu,
Beiming Li,
Fernando Cladera,
Alex Zhou,
Dinesh Thakur,
Vijay Kumar
Abstract:
We address the problem of efficient 3-D exploration in indoor environments for micro aerial vehicles with limited sensing capabilities and payload/power constraints. We develop an indoor exploration framework that uses learning to predict the occupancy of unseen areas, extracts semantic features, samples viewpoints to predict information gains for different exploration goals, and plans informative…
▽ More
We address the problem of efficient 3-D exploration in indoor environments for micro aerial vehicles with limited sensing capabilities and payload/power constraints. We develop an indoor exploration framework that uses learning to predict the occupancy of unseen areas, extracts semantic features, samples viewpoints to predict information gains for different exploration goals, and plans informative trajectories to enable safe and smart exploration. Extensive experimentation in simulated and real-world environments shows the proposed approach outperforms the state-of-the-art exploration framework by 24% in terms of the total path length in a structured indoor environment and with a higher success rate during exploration.
△ Less
Submitted 13 August, 2023; v1 submitted 22 September, 2022;
originally announced September 2022.
-
Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems
Authors:
Seny Kamara,
Mallory Knodel,
Emma Llansó,
Greg Nojeim,
Lucy Qin,
Dhanaraj Thakur,
Caitlin Vogus
Abstract:
In this paper, we assess existing technical proposals for content moderation in End-to-End Encryption (E2EE) services. First, we explain the various tools in the content moderation toolbox, how they are used, and the different phases of the moderation cycle, including detection of unwanted content. We then lay out a definition of encryption and E2EE, which includes privacy and security guarantees…
▽ More
In this paper, we assess existing technical proposals for content moderation in End-to-End Encryption (E2EE) services. First, we explain the various tools in the content moderation toolbox, how they are used, and the different phases of the moderation cycle, including detection of unwanted content. We then lay out a definition of encryption and E2EE, which includes privacy and security guarantees for end-users, before assessing current technical proposals for the detection of unwanted content in E2EE services against those guarantees.
We find that technical approaches for user-reporting and meta-data analysis are the most likely to preserve privacy and security guarantees for end-users. Both provide effective tools that can detect significant amounts of different types of problematic content on E2EE services, including abusive and harassing messages, spam, mis- and disinformation, and CSAM, although more research is required to improve these tools and better measure their effectiveness. Conversely, we find that other techniques that purport to facilitate content detection in E2EE systems have the effect of undermining key security guarantees of E2EE systems.
△ Less
Submitted 9 February, 2022;
originally announced February 2022.
-
Do You See What I See? Capabilities and Limits of Automated Multimedia Content Analysis
Authors:
Carey Shenkman,
Dhanaraj Thakur,
Emma Llansó
Abstract:
The ever-increasing amount of user-generated content online has led, in recent years, to an expansion in research and investment in automated content analysis tools. Scrutiny of automated content analysis has accelerated during the COVID-19 pandemic, as social networking services have placed a greater reliance on these tools due to concerns about health risks to their moderation staff from in-pers…
▽ More
The ever-increasing amount of user-generated content online has led, in recent years, to an expansion in research and investment in automated content analysis tools. Scrutiny of automated content analysis has accelerated during the COVID-19 pandemic, as social networking services have placed a greater reliance on these tools due to concerns about health risks to their moderation staff from in-person work. At the same time, there are important policy debates around the world about how to improve content moderation while protecting free expression and privacy. In order to advance these debates, we need to understand the potential role of automated content analysis tools.
This paper explains the capabilities and limitations of tools for analyzing online multimedia content and highlights the potential risks of using these tools at scale without accounting for their limitations. It focuses on two main categories of tools: matching models and computer prediction models. Matching models include cryptographic and perceptual hashing, which compare user-generated content with existing and known content. Predictive models (including computer vision and computer audition) are machine learning techniques that aim to identify characteristics of new or previously unknown content.
△ Less
Submitted 15 December, 2021;
originally announced January 2022.
-
Design and Deployment of an Autonomous Unmanned Ground Vehicle for Urban Firefighting Scenarios
Authors:
Kshitij **dal,
Anthony Wang,
Dinesh Thakur,
Alex Zhou,
Vojtech Spurny,
Viktor Walter,
George Broughton,
Tomas Krajnik,
Martin Saska,
Giuseppe Loianno
Abstract:
Autonomous mobile robots have the potential to solve missions that are either too complex or dangerous to be accomplished by humans. In this paper, we address the design and autonomous deployment of a ground vehicle equipped with a robotic arm for urban firefighting scenarios. We describe the hardware design and algorithm approaches for autonomous navigation, planning, fire source identification a…
▽ More
Autonomous mobile robots have the potential to solve missions that are either too complex or dangerous to be accomplished by humans. In this paper, we address the design and autonomous deployment of a ground vehicle equipped with a robotic arm for urban firefighting scenarios. We describe the hardware design and algorithm approaches for autonomous navigation, planning, fire source identification and abatement in unstructured urban scenarios. The approach employs on-board sensors for autonomous navigation and thermal camera information for source identification. A custom electro{mechanical pump is responsible to eject water for fire abatement. The proposed approach is validated through several experiments, where we show the ability to identify and abate a sample heat source in a building. The whole system was developed and deployed during the Mohamed Bin Zayed International Robotics Challenge (MBZIRC) 2020, for Challenge No. 3 Fire Fighting Inside a High-Rise Building and during the Grand Challenge where our approach scored the highest number of points among all UGV solutions and was instrumental to win the first place.
△ Less
Submitted 7 July, 2021;
originally announced July 2021.
-
Mobile Manipulator for Autonomous Localization, Gras** and Precise Placement of Construction Material in a Semi-structured Environment
Authors:
Petr Stibinger,
George Broughton,
Filip Majer,
Zdenek Rozsypalek,
Anthony Wang,
Kshitij **dal,
Alex Zhou,
Dinesh Thakur,
Giuseppe Loianno,
Tomas Krajnik,
Martin Saska
Abstract:
Mobile manipulators have the potential to revolutionize modern agriculture, logistics and manufacturing. In this work, we present the design of a ground-based mobile manipulator for automated structure assembly. The proposed system is capable of autonomous localization, gras**, transportation and deployment of construction material in a semi-structured environment. Special effort was put into ma…
▽ More
Mobile manipulators have the potential to revolutionize modern agriculture, logistics and manufacturing. In this work, we present the design of a ground-based mobile manipulator for automated structure assembly. The proposed system is capable of autonomous localization, gras**, transportation and deployment of construction material in a semi-structured environment. Special effort was put into making the system invariant to lighting changes, and not reliant on external positioning systems. Therefore, the presented system is self-contained and capable of operating in outdoor and indoor conditions alike. Finally, we present means to extend the perceptive radius of the vehicle by using it in cooperation with an autonomous drone, which provides aerial reconnaissance. Performance of the proposed system has been evaluated in a series of experiments conducted in real-world conditions.
△ Less
Submitted 16 November, 2020;
originally announced November 2020.
-
PennSyn2Real: Training Object Recognition Models without Human Labeling
Authors:
Ty Nguyen,
Ian D. Miller,
Avi Cohen,
Dinesh Thakur,
Shashank Prasad,
Camillo J. Taylor,
Pratik Chaudrahi,
Vijay Kumar
Abstract:
Scalable training data generation is a critical problem in deep learning. We propose PennSyn2Real - a photo-realistic synthetic dataset consisting of more than 100,000 4K images of more than 20 types of micro aerial vehicles (MAVs). The dataset can be used to generate arbitrary numbers of training images for high-level computer vision tasks such as MAV detection and classification. Our data genera…
▽ More
Scalable training data generation is a critical problem in deep learning. We propose PennSyn2Real - a photo-realistic synthetic dataset consisting of more than 100,000 4K images of more than 20 types of micro aerial vehicles (MAVs). The dataset can be used to generate arbitrary numbers of training images for high-level computer vision tasks such as MAV detection and classification. Our data generation framework bootstraps chroma-keying, a mature cinematography technique with a motion tracking system, providing artifact-free and curated annotated images where object orientations and lighting are controlled. This framework is easy to set up and can be applied to a broad range of objects, reducing the gap between synthetic and real-world data. We show that synthetic data generated using this framework can be directly used to train CNN models for common object recognition tasks such as detection and segmentation. We demonstrate competitive performance in comparison with training using only real images. Furthermore, bootstrap** the generated synthetic data in few-shot learning can significantly improve the overall performance, reducing the number of required training data samples to achieve the desired accuracy.
△ Less
Submitted 16 October, 2020; v1 submitted 21 September, 2020;
originally announced September 2020.
-
Nuclear Environments Inspection with Micro Aerial Vehicles: Algorithms and Experiments
Authors:
Dinesh Thakur,
Giuseppe Loianno,
Wenxin Liu,
Vijay Kumar
Abstract:
In this work, we address the estimation, planning, control and map** problems to allow a small quadrotor to autonomously inspect the interior of hazardous damaged nuclear sites. These algorithms run onboard on a computationally limited CPU. We investigate the effect of varying illumination on the system performance. To the best of our knowledge, this is the first fully autonomous system of this…
▽ More
In this work, we address the estimation, planning, control and map** problems to allow a small quadrotor to autonomously inspect the interior of hazardous damaged nuclear sites. These algorithms run onboard on a computationally limited CPU. We investigate the effect of varying illumination on the system performance. To the best of our knowledge, this is the first fully autonomous system of this size and scale applied to inspect the interior of a full scale mock-up of a Primary Containment Vessel (PCV). The proposed solution opens up new ways to inspect nuclear reactors and to support nuclear decommissioning, which is well known to be a dangerous, long and tedious process. Experimental results with varying illumination conditions show the ability to navigate a full scale mock-up PCV pedestal and create a map of the environment, while concurrently avoiding obstacles.
△ Less
Submitted 14 March, 2019;
originally announced March 2019.
-
Resilient Active Information Gathering with Mobile Robots
Authors:
Brent Schlotfeldt,
Vasileios Tzoumas,
Dinesh Thakur,
George J. Pappas
Abstract:
Applications of safety, security, and rescue in robotics, such as multi-robot target tracking, involve the execution of information acquisition tasks by teams of mobile robots. However, in failure-prone or adversarial environments, robots get attacked, their communication channels get jammed, and their sensors may fail, resulting in the withdrawal of robots from the collective task, and consequent…
▽ More
Applications of safety, security, and rescue in robotics, such as multi-robot target tracking, involve the execution of information acquisition tasks by teams of mobile robots. However, in failure-prone or adversarial environments, robots get attacked, their communication channels get jammed, and their sensors may fail, resulting in the withdrawal of robots from the collective task, and consequently the inability of the remaining active robots to coordinate with each other. As a result, traditional design paradigms become insufficient and, in contrast, resilient designs against system-wide failures and attacks become important. In general, resilient design problems are hard, and even though they often involve objective functions that are monotone or submodular, scalable approximation algorithms for their solution have been hitherto unknown. In this paper, we provide the first algorithm, enabling the following capabilities: minimal communication, i.e., the algorithm is executed by the robots based only on minimal communication between them; system-wide resiliency, i.e., the algorithm is valid for any number of denial-of-service attacks and failures; and provable approximation performance, i.e., the algorithm ensures for all monotone (and not necessarily submodular) objective functions a solution that is finitely close to the optimal. We quantify our algorithm's approximation performance using a notion of curvature for monotone set functions. We support our theoretical analyses with simulated and real-world experiments, by considering an active information gathering scenario, namely, multi-robot target tracking.
△ Less
Submitted 2 September, 2018; v1 submitted 26 March, 2018;
originally announced March 2018.
-
The Multi Vehicle Stereo Event Camera Dataset: An Event Camera Dataset for 3D Perception
Authors:
Alex Zihao Zhu,
Dinesh Thakur,
Tolga Ozaslan,
Bernd Pfrommer,
Vijay Kumar,
Kostas Daniilidis
Abstract:
Event based cameras are a new passive sensing modality with a number of benefits over traditional cameras, including extremely low latency, asynchronous data acquisition, high dynamic range and very low power consumption. There has been a lot of recent interest and development in applying algorithms to use the events to perform a variety of 3D perception tasks, such as feature tracking, visual odo…
▽ More
Event based cameras are a new passive sensing modality with a number of benefits over traditional cameras, including extremely low latency, asynchronous data acquisition, high dynamic range and very low power consumption. There has been a lot of recent interest and development in applying algorithms to use the events to perform a variety of 3D perception tasks, such as feature tracking, visual odometry, and stereo depth estimation. However, there currently lacks the wealth of labeled data that exists for traditional cameras to be used for both testing and development. In this paper, we present a large dataset with a synchronized stereo pair event based camera system, carried on a handheld rig, flown by a hexacopter, driven on top of a car and mounted on a motorcycle, in a variety of different illumination levels and environments. From each camera, we provide the event stream, grayscale images and IMU readings. In addition, we utilize a combination of IMU, a rigidly mounted lidar system, indoor and outdoor motion capture and GPS to provide accurate pose and depth images for each camera at up to 100Hz. For comparison, we also provide synchronized grayscale images and IMU readings from a frame based stereo camera system.
△ Less
Submitted 19 February, 2018; v1 submitted 30 January, 2018;
originally announced January 2018.