-
Obstacle Avoidance of Autonomous Vehicles: An LPVMPC with Scheduling Trust Region
Authors:
Maryam Nezami,
Dimitrios S. Karachalios,
Georg Schildbach,
Hossam S. Abbas
Abstract:
Reference tracking and obstacle avoidance rank among the foremost challenging aspects of autonomous driving. This paper proposes control designs for solving reference tracking problems in autonomous driving tasks while considering static obstacles. We suggest a model predictive control (MPC) strategy that evades the computational burden of nonlinear nonconvex optimization methods after embedding t…
▽ More
Reference tracking and obstacle avoidance rank among the foremost challenging aspects of autonomous driving. This paper proposes control designs for solving reference tracking problems in autonomous driving tasks while considering static obstacles. We suggest a model predictive control (MPC) strategy that evades the computational burden of nonlinear nonconvex optimization methods after embedding the nonlinear model equivalently to a linear parameter-varying (LPV) formulation using the so-called scheduling parameter. This allows optimal and fast solutions of the underlying convex optimization scheme as a quadratic program (QP) at the expense of losing some performance due to the uncertainty of the future scheduling trajectory over the MPC horizon. Also, to ensure that the modeling error due to the application of the scheduling parameter predictions does not become significant, we propose the concept of scheduling trust region by enforcing further soft constraints on the states and inputs. A consequence of using the new constraints in the MPC is that we construct a region in which the scheduling parameter updates in two consecutive time instants are trusted for computing the system matrices, and therefore, the feasibility of the MPC optimization problem is retained. We test the method in different scenarios and compare the results to standard LPVMPC as well as nonlinear MPC (NMPC) schemes.
△ Less
Submitted 3 May, 2024;
originally announced May 2024.
-
Energy Efficiency Maximization in IRS-enabled Phase Cooperative PS-SWIPT based Self-sustainable IoT Network
Authors:
Haleema Sadia,
Ahmad Kamal Hassan,
Ziaul Haq Abbas,
Ghulam Abbas,
Thar Baker
Abstract:
Power splitting based simultaneous wireless information and power transfer (PS-SWIPT) appears to be a promising solution to support future self-sustainable Internet of Things (SS-IoT) networks. However, the performance of these networks is constrained by radio frequency signal strength and channel impairments. To address this challenge, intelligent reflecting surfaces (IRSs) are introduced in PS-S…
▽ More
Power splitting based simultaneous wireless information and power transfer (PS-SWIPT) appears to be a promising solution to support future self-sustainable Internet of Things (SS-IoT) networks. However, the performance of these networks is constrained by radio frequency signal strength and channel impairments. To address this challenge, intelligent reflecting surfaces (IRSs) are introduced in PS-SWIPT based SS-IoT networks to improve network efficiency by controlling signal reflections. In this article, an IRS-enabled phase cooperative framework is proposed to improve energy efficiency (EE) of the IoT network $({\mathtt {I}}^{net})$ using phase shifts of the user network $({\mathtt {U}^{net})}$, without constraining hardware resources at ${\mathtt {U}^{net}}$. We exploit transmit beamforming (BF) at access points (APs) and phase shifts optimization at the IRS end with phase effective cooperation between APs to enhance ${\mathtt {I}}^{net}$ EE performance. The maximization problem turns out to be NP-hard, so first, an alternating optimization (AO) is solved for the ${\mathtt {U}^{net}}$ using low computational complexity heuristic BF approaches, namely, transmit minimum-mean-square-error and zero-forcing BF, and phase optimization is performed using semidefinite relaxation (SDR) approach. To combat the computational complexity of AO, we also propose an alternative solution by exploiting heuristic BF schemes and an iterative algorithm, i.e., the element-wise block-coordinate descent method for phase shifts optimization. Next, EE maximization is solved for the ${\mathtt {I}^{net}}$ by optimizing the PS ratio and active BF vectors by exploiting optimal phase shifts of the ${\mathtt {U}}^{net}$. Simulation results confirm that employing IRS phase cooperation in PS-SWIPT based SS-IoT networks can significantly improve EE performance of ${\mathtt {I}^{net}}$ without constraining resources.
△ Less
Submitted 10 January, 2024;
originally announced January 2024.
-
A Linear Parameter-Varying Approach to Data Predictive Control
Authors:
Chris Verhoek,
Julian Berberich,
Sofie Haesaert,
Roland Tóth,
Hossam S. Abbas
Abstract:
By means of the linear parameter-varying (LPV) Fundamental Lemma, we derive novel data-driven predictive control (DPC) methods for LPV systems. In particular, we present output-feedback and state-feedback-based LPV-DPC methods with terminal ingredients, which guarantee exponential stability and recursive feasibility. We provide methods for the data-based computation of these terminal ingredients.…
▽ More
By means of the linear parameter-varying (LPV) Fundamental Lemma, we derive novel data-driven predictive control (DPC) methods for LPV systems. In particular, we present output-feedback and state-feedback-based LPV-DPC methods with terminal ingredients, which guarantee exponential stability and recursive feasibility. We provide methods for the data-based computation of these terminal ingredients. Furthermore, an in-depth analysis of the properties and implementation aspects of the LPV-DPC schemes is given, including alternative recursive formulations, application for nonlinear systems and handling noise-disturbed data. We demonstrate the performance of the proposed methods on a simulation example involving a nonlinear unbalanced disc system.
△ Less
Submitted 13 November, 2023;
originally announced November 2023.
-
Contextual Beamforming: Exploiting Location and AI for Enhanced Wireless Telecommunication Performance
Authors:
Jaspreet Kaur,
Satyam Bhatti,
Olaoluwa R Popoola,
Muhammad Ali Imran,
Rami Ghannam,
Qammer H Abbasi,
Hasan T Abbas
Abstract:
The pervasive nature of wireless telecommunication has made it the foundation for mainstream technologies like automation, smart vehicles, virtual reality, and unmanned aerial vehicles. As these technologies experience widespread adoption in our daily lives, ensuring the reliable performance of cellular networks in mobile scenarios has become a paramount challenge. Beamforming, an integral compone…
▽ More
The pervasive nature of wireless telecommunication has made it the foundation for mainstream technologies like automation, smart vehicles, virtual reality, and unmanned aerial vehicles. As these technologies experience widespread adoption in our daily lives, ensuring the reliable performance of cellular networks in mobile scenarios has become a paramount challenge. Beamforming, an integral component of modern mobile networks, enables spatial selectivity and improves network quality. However, many beamforming techniques are iterative, introducing unwanted latency to the system. In recent times, there has been a growing interest in leveraging mobile users' location information to expedite beamforming processes. This paper explores the concept of contextual beamforming, discussing its advantages, disadvantages and implications. Notably, the study presents an impressive 53% improvement in signal-to-noise ratio (SNR) by implementing the adaptive beamforming (MRT) algorithm compared to scenarios without beamforming. It further elucidates how MRT contributes to contextual beamforming. The importance of localization in implementing contextual beamforming is also examined. Additionally, the paper delves into the use of artificial intelligence schemes, including machine learning and deep learning, in implementing contextual beamforming techniques that leverage user location information. Based on the comprehensive review, the results suggest that the combination of MRT and Zero forcing (ZF) techniques, alongside deep neural networks (DNN) employing Bayesian Optimization (BO), represents the most promising approach for contextual beamforming. Furthermore, the study discusses the future potential of programmable switches, such as Tofino, in enabling location-aware beamforming.
△ Less
Submitted 2 July, 2023;
originally announced July 2023.
-
On the Design of Nonlinear MPC and LPVMPC for Obstacle Avoidance in Autonomous Driving
Authors:
Maryam Nezami,
Dimitrios S. Karachalios,
Georg Schildbach,
Hossam S. Abbas
Abstract:
In this study, we are concerned with autonomous driving missions when a static obstacle blocks a given reference trajectory. To provide a realistic control design, we employ a model predictive control (MPC) utilizing nonlinear state-space dynamic models of a car with linear tire forces, allowing for optimal path planning and tracking to overtake the obstacle. We provide solutions with two differen…
▽ More
In this study, we are concerned with autonomous driving missions when a static obstacle blocks a given reference trajectory. To provide a realistic control design, we employ a model predictive control (MPC) utilizing nonlinear state-space dynamic models of a car with linear tire forces, allowing for optimal path planning and tracking to overtake the obstacle. We provide solutions with two different methodologies. Firstly, we solve a nonlinear MPC (NMPC) problem with a nonlinear optimization framework, capable of considering the nonlinear constraints. Secondly, by introducing scheduling signals, we embed the nonlinear dynamics in a linear parameter varying (LPV) representation with adaptive linear constraints for realizing the nonlinear constraints associated with the obstacle. Consequently, an LPVMPC optimization problem can be solved efficiently as a quadratic programming (QP) that constitutes the main novelty of this work. We test the two methods for a challenging obstacle avoidance task and provide qualitative comparisons. The LPVMPC shows a significant reduction in terms of the computational burden at the expense of a slight loss of performance.
△ Less
Submitted 12 July, 2023;
originally announced July 2023.
-
Direct data-driven LPV control of nonlinear systems: An experimental result
Authors:
Chris Verhoek,
Hossam S. Abbas,
Roland Tóth
Abstract:
We demonstrate that direct data-driven control of nonlinear systems can be successfully accomplished via a behavioral approach that builds on a Linear Parameter-Varying (LPV) system concept. An LPV data-driven representation is used as a surrogate LPV form of the data-driven representation of the original nonlinear system. The LPV data-driven control design that builds on this representation form…
▽ More
We demonstrate that direct data-driven control of nonlinear systems can be successfully accomplished via a behavioral approach that builds on a Linear Parameter-Varying (LPV) system concept. An LPV data-driven representation is used as a surrogate LPV form of the data-driven representation of the original nonlinear system. The LPV data-driven control design that builds on this representation form uses only measurement data from the nonlinear system and a priori information on a scheduling map that can lead to an LPV embedding of the nonlinear system behavior. Efficiency of the proposed approach is demonstrated experimentally on a nonlinear unbalanced disc system showing for the first time in the literature that behavioral data-driven methods are capable to stabilize arbitrary forced equilibria of a real-world nonlinear system by the use of only 7 data points.
△ Less
Submitted 25 May, 2023; v1 submitted 30 November, 2022;
originally announced November 2022.
-
Direct Data-Driven State-Feedback Control of Linear Parameter-Varying Systems
Authors:
Chris Verhoek,
Roland Tóth,
Hossam S. Abbas
Abstract:
The framework of linear parameter-varying (LPV) systems has shown to be a powerful tool for the design of controllers for complex nonlinear systems using linear tools. In this work, we derive novel methods that allow to synthesize LPV state-feedback controllers directly from a single sequence of data and guarantee stability and performance of the closed-loop system, without knowing the model of th…
▽ More
The framework of linear parameter-varying (LPV) systems has shown to be a powerful tool for the design of controllers for complex nonlinear systems using linear tools. In this work, we derive novel methods that allow to synthesize LPV state-feedback controllers directly from a single sequence of data and guarantee stability and performance of the closed-loop system, without knowing the model of the plant. We show that if the measured open-loop data from the system satisfies a persistency of excitation condition, then the full open-loop and closed-loop input-scheduling-state behavior can be represented using only the data. With this representation, we formulate synthesis problems that yield controllers that guarantee stability and performance in terms of infinite horizon quadratic cost, generalized $\mathcal{H}_2$-norm and $\ell_2$-gain of the closed-loop system. The controllers are synthesized by solving an SDP with a finite set of LMI constraints. Additionally, we provide a synthesis method to handle noisy measurement data. Competitive performance of the proposed data-driven synthesis methods is demonstrated w.r.t. model-based synthesis that have complete knowledge of the true system model in multiple simulation studies, including a nonlinear unbalanced disc system.
△ Less
Submitted 24 May, 2024; v1 submitted 30 November, 2022;
originally announced November 2022.
-
Safe Reinforcement Learning using Data-Driven Predictive Control
Authors:
Mahmoud Selim,
Amr Alanwar,
M. Watheq El-Kharashi,
Hazem M. Abbas,
Karl H. Johansson
Abstract:
Reinforcement learning (RL) algorithms can achieve state-of-the-art performance in decision-making and continuous control tasks. However, applying RL algorithms on safety-critical systems still needs to be well justified due to the exploration nature of many RL algorithms, especially when the model of the robot and the environment are unknown. To address this challenge, we propose a data-driven sa…
▽ More
Reinforcement learning (RL) algorithms can achieve state-of-the-art performance in decision-making and continuous control tasks. However, applying RL algorithms on safety-critical systems still needs to be well justified due to the exploration nature of many RL algorithms, especially when the model of the robot and the environment are unknown. To address this challenge, we propose a data-driven safety layer that acts as a filter for unsafe actions. The safety layer uses a data-driven predictive controller to enforce safety guarantees for RL policies during training and after deployment. The RL agent proposes an action that is verified by computing the data-driven reachability analysis. If there is an intersection between the reachable set of the robot using the proposed action, we call the data-driven predictive controller to find the closest safe action to the proposed unsafe action. The safety layer penalizes the RL agent if the proposed action is unsafe and replaces it with the closest safe one. In the simulation, we show that our method outperforms state-of-the-art safe RL methods on the robotics navigation problem for a Turtlebot 3 in Gazebo and a quadrotor in Unreal Engine 4 (UE4).
△ Less
Submitted 20 November, 2022;
originally announced November 2022.
-
A real-time GP based MPC for quadcopters with unknown disturbances
Authors:
Niklas Schmid,
Jonas Gruner,
Hossam S. Abbas,
Philipp Rostalski
Abstract:
Gaussian Process (GP) regressions have proven to be a valuable tool to predict disturbances and model mismatches and incorporate this information into a Model Predictive Control (MPC) prediction. Unfortunately, the computational complexity of inference and learning on classical GPs scales cubically, which is intractable for real-time applications. Thus GPs are commonly trained offline, which is no…
▽ More
Gaussian Process (GP) regressions have proven to be a valuable tool to predict disturbances and model mismatches and incorporate this information into a Model Predictive Control (MPC) prediction. Unfortunately, the computational complexity of inference and learning on classical GPs scales cubically, which is intractable for real-time applications. Thus GPs are commonly trained offline, which is not suited for learning disturbances as their dynamics may vary with time. Recently, state-space formulation of GPs has been introduced, allowing inference and learning with linear computational complexity. This paper presents a framework that enables online learning of disturbance dynamics on quadcopters, which can be executed within milliseconds using a state-space formulation of GPs. The obtained disturbance predictions are combined with MPC leading to a significant performance increase in simulations with jMAVSim. The computational burden is evaluated on a Raspberry Pi 4 B to prove the real-time applicability.
△ Less
Submitted 14 October, 2022;
originally announced October 2022.
-
Robust tube-based LPV-MPC for autonomous lane kee**
Authors:
Maryam Nezami,
Hossam Seddik Abbas,
Ngoc Thinh Nguyen,
Georg Schildbach
Abstract:
This paper proposes a control architecture for autonomous lane kee** by a vehicle. In this paper, the vehicle dynamics consist of two parts: lateral and longitudinal dynamics. Therefore, the control architecture comprises two subsequent controllers. A longitudinal model predictive control (MPC) makes the vehicle track the desired longitudinal speeds that are assumed to be generated by a speed pl…
▽ More
This paper proposes a control architecture for autonomous lane kee** by a vehicle. In this paper, the vehicle dynamics consist of two parts: lateral and longitudinal dynamics. Therefore, the control architecture comprises two subsequent controllers. A longitudinal model predictive control (MPC) makes the vehicle track the desired longitudinal speeds that are assumed to be generated by a speed planner. The longitudinal speeds are then passed to a lateral MPC for lane kee**. Due to the dependence of the lateral dynamics on the longitudinal speed, they are represented in a linear parameter-varying (LPV) form, where its scheduling parameter is the longitudinal speed of the vehicle. In order to deal with the imprecise information of the future longitudinal speed (the scheduling parameter), a bound of uncertainty is considered around the nominal trajectory of the future longitudinal velocities. Then, a tube-based LPV- MPC is adopted to control the lateral dynamics for attaining the lane kee** goal. In the end, the effectiveness of the proposed methods is illustrated by carrying out simulation tests.
△ Less
Submitted 6 October, 2022;
originally announced October 2022.
-
A Safe Control Architecture Based on Robust Model Predictive Control for Autonomous Driving
Authors:
Maryam Nezami,
Ngoc Thinh Nguyen,
Georg Männel,
Hossam Seddik Abbas,
Georg Schildbach
Abstract:
This paper proposes a Robust Safe Control Architecture (RSCA) for safe-decision making. The system to be controlled is a vehicle in the presence of bounded disturbances. The RSCA consists of two parts: a Supervisor MPC and a Controller MPC. Both the Supervisor and the Controller are tube MPCs (TMPCs). The Supervisor MPC provides a safety certificate for an operating controller and a backup control…
▽ More
This paper proposes a Robust Safe Control Architecture (RSCA) for safe-decision making. The system to be controlled is a vehicle in the presence of bounded disturbances. The RSCA consists of two parts: a Supervisor MPC and a Controller MPC. Both the Supervisor and the Controller are tube MPCs (TMPCs). The Supervisor MPC provides a safety certificate for an operating controller and a backup control input in every step. After an unsafe action by the operating controller is predicted, the Controller MPC takes over the system. In this paper, a method for the computation of a terminal set is proposed, which is robust against changes in road curvature and forces the vehicle to reach a safe reference. Moreover, two important proofs are provided in this paper. First, it is shown that the backup control input is safe to be applied to the system to lead the vehicle to a safe state. Next, the recursive feasibility of the RSCA is proven. By simulating some obstacle avoidance scenarios, the effectiveness of the proposed RSCA is confirmed.
△ Less
Submitted 20 June, 2022;
originally announced June 2022.
-
A Learning- and Scenario-based MPC Design for Nonlinear Systems in LPV Framework with Safety and Stability Guarantees
Authors:
Yajie Bao,
Hossam S. Abbas,
Javad Mohammadpour Velni
Abstract:
This paper presents a learning- and scenario-based model predictive control (MPC) design approach for systems modeled in linear parameter-varying (LPV) framework. Using input-output data collected from the system, a state-space LPV model with uncertainty quantification is first learned through the variational Bayesian inference Neural Network (BNN) approach. The learned probabilistic model is assu…
▽ More
This paper presents a learning- and scenario-based model predictive control (MPC) design approach for systems modeled in linear parameter-varying (LPV) framework. Using input-output data collected from the system, a state-space LPV model with uncertainty quantification is first learned through the variational Bayesian inference Neural Network (BNN) approach. The learned probabilistic model is assumed to contain the true dynamics of the system with a high probability and used to generate scenarios which ensure safety for a scenario-based MPC. Moreover, to guarantee stability and enhance performance of the closed-loop system, a parameter-dependent terminal cost and controller, as well as a terminal robust positive invariant set are designed. Numerical examples will be used to demonstrate that the proposed control design approach can ensure safety and achieve desired control performance.
△ Less
Submitted 6 May, 2023; v1 submitted 6 June, 2022;
originally announced June 2022.
-
Automatic Classification of Alzheimer's Disease using brain MRI data and deep Convolutional Neural Networks
Authors:
Zahraa Sh. Aaraji,
Hawraa H. Abbas
Abstract:
Alzheimer's disease (AD) is one of the most common public health issues the world is facing today. This disease has a high prevalence primarily in the elderly accompanying memory loss and cognitive decline. AD detection is a challenging task which many authors have developed numerous computerized automatic diagnosis systems utilizing neuroimaging and other clinical data. MRI scans provide high-int…
▽ More
Alzheimer's disease (AD) is one of the most common public health issues the world is facing today. This disease has a high prevalence primarily in the elderly accompanying memory loss and cognitive decline. AD detection is a challenging task which many authors have developed numerous computerized automatic diagnosis systems utilizing neuroimaging and other clinical data. MRI scans provide high-intensity visible features, making these scans the most widely used brain imaging technique. In recent years deep learning has achieved leading success in medical image analysis. But a relatively little investigation has been done to apply deep learning techniques for the brain MRI classification. This paper explores the construction of several deep learning architectures evaluated on brain MRI images and segmented images. The idea behind segmented images investigates the influence of image segmentation step on deep learning classification. The image processing presented a pipeline consisting of pre-processing to enhance the MRI scans and post-processing consisting of a segmentation method for segmenting the brain tissues. The results show that the processed images achieved a better accuracy in the binary classification of AD vs. CN (Cognitively Normal) across four different architectures. ResNet architecture resulted in the highest prediction accuracy amongst the other architectures (90.83% for the original brain images and 93.50% for the processed images).
△ Less
Submitted 31 March, 2022;
originally announced April 2022.
-
A Safe Control Architecture Based on a Model Predictive Control Supervisor for Autonomous Driving
Authors:
Maryam Nezami,
Georg Maennel,
Hossam Seddik Abbas,
Georg Schildbach
Abstract:
This paper presents a novel, safe control architecture (SCA) for controlling an important class of systems: safety-critical systems. Ensuring the safety of control decisions has always been a challenge in automatic control. The proposed SCA aims to address this challenge by using a Model Predictive Controller (MPC) that acts as a supervisor for the operating controller, in the sense that the MPC c…
▽ More
This paper presents a novel, safe control architecture (SCA) for controlling an important class of systems: safety-critical systems. Ensuring the safety of control decisions has always been a challenge in automatic control. The proposed SCA aims to address this challenge by using a Model Predictive Controller (MPC) that acts as a supervisor for the operating controller, in the sense that the MPC constantly checks the safety of the control inputs generated by the operating controller and intervenes if the control input is predicted to lead to a hazardous situation in the foreseeable future invariably. Then an appropriate backup scheme can be activated, e.g., a degraded control mechanism, the transfer of the system to a safe state, or a warning signal issued to a human supervisor. For a proof of concept, the proposed SCA is applied to an autonomous driving scenario, where it is illustrated and compared in different obstacle avoidance scenarios. A major challenge of the SCA lies in the mismatch between the MPC prediction model and the real system, for which possible remedies are explored.
△ Less
Submitted 31 January, 2022;
originally announced January 2022.
-
Data-Driven Predictive Control for Linear Parameter-Varying Systems
Authors:
Chris Verhoek,
Hossam S. Abbas,
Roland Tóth,
Sofie Haesaert
Abstract:
Based on the extension of the behavioral theory and the Fundamental Lemma for Linear Parameter-Varying (LPV) systems, this paper introduces a Data-driven Predictive Control (DPC) scheme capable to ensure reference tracking and satisfaction of Input-Output (IO) constraints for an unknown system under the conditions that (i) the system can be represented in an LPV form and (ii) an informative data-s…
▽ More
Based on the extension of the behavioral theory and the Fundamental Lemma for Linear Parameter-Varying (LPV) systems, this paper introduces a Data-driven Predictive Control (DPC) scheme capable to ensure reference tracking and satisfaction of Input-Output (IO) constraints for an unknown system under the conditions that (i) the system can be represented in an LPV form and (ii) an informative data-set containing measured IO and scheduling trajectories of the system is available. It is shown that if the data set satisfies a persistence of excitation condition, then a data-driven LPV predictor of future trajectories of the system can be constructed from the IO data set and online measured data. The approach represents the first step towards a DPC solution for nonlinear and time-varying systems due to the potential of the LPV framework to represent them. Two illustrative examples, including reference tracking control of a nonlinear system, are provided to demonstrate that the data-based LPV-DPC scheme, achieves similar performance as LPV model-based predictive control.
△ Less
Submitted 24 January, 2022; v1 submitted 30 March, 2021;
originally announced March 2021.
-
LPV Modeling of Nonlinear Systems: A Multi-Path Feedback Linearization Approach
Authors:
Hossam S. Abbas,
Roland Tóth,
Mihály Petreczky,
Nader Meskin,
Javad Mohammadpour Velni,
Patrick J. W. Koelewijn
Abstract:
This paper introduces a systematic approach to synthesize linear parameter-varying (LPV) representations of nonlinear (NL) systems which are described by input affine state-space (SS) representations. The conversion approach results in LPV-SS representations in the observable canonical form. Based on the relative degree concept, first the SS description of a given NL representation is transformed…
▽ More
This paper introduces a systematic approach to synthesize linear parameter-varying (LPV) representations of nonlinear (NL) systems which are described by input affine state-space (SS) representations. The conversion approach results in LPV-SS representations in the observable canonical form. Based on the relative degree concept, first the SS description of a given NL representation is transformed to a normal form. In the SISO case, all nonlinearities of the original system are embedded into one NL function, which is factorized, based on a proposed algorithm, to construct an LPV representation of the original NL system. The overall procedure yields an LPV model in which the scheduling variable depends on the inputs and outputs of the system and their derivatives, achieving a practically applicable transformation of the model in case of low order derivatives. In addition, if the states of the NL model can be measured or estimated, then a modified procedure is proposed to provide LPV models scheduled by these states. Examples are included to demonstrate both approaches.
△ Less
Submitted 26 March, 2021;
originally announced March 2021.
-
Learning-'N-Flying: A Learning-based, Decentralized Mission Aware UAS Collision Avoidance Scheme
Authors:
Alëna Rodionova,
Yash Vardhan Pant,
Connor Kurtz,
Kuk Jang,
Houssam Abbas,
Rahul Mangharam
Abstract:
Urban Air Mobility, the scenario where hundreds of manned and Unmanned Aircraft System (UAS) carry out a wide variety of missions (e.g. moving humans and goods within the city), is gaining acceptance as a transportation solution of the future. One of the key requirements for this to happen is safely managing the air traffic in these urban airspaces. Due to the expected density of the airspace, thi…
▽ More
Urban Air Mobility, the scenario where hundreds of manned and Unmanned Aircraft System (UAS) carry out a wide variety of missions (e.g. moving humans and goods within the city), is gaining acceptance as a transportation solution of the future. One of the key requirements for this to happen is safely managing the air traffic in these urban airspaces. Due to the expected density of the airspace, this requires fast autonomous solutions that can be deployed online. We propose Learning-'N-Flying (LNF) a multi-UAS Collision Avoidance (CA) framework. It is decentralized, works on-the-fly and allows autonomous UAS managed by different operators to safely carry out complex missions, represented using Signal Temporal Logic, in a shared airspace. We initially formulate the problem of predictive collision avoidance for two UAS as a mixed-integer linear program, and show that it is intractable to solve online. Instead, we first develop Learning-to-Fly (L2F) by combining: a) learning-based decision-making, and b) decentralized convex optimization-based control. LNF extends L2F to cases where there are more than two UAS on a collision path. Through extensive simulations, we show that our method can run online (computation time in the order of milliseconds), and under certain assumptions has failure rates of less than 1% in the worst-case, improving to near 0% in more relaxed operations. We show the applicability of our scheme to a wide variety of settings through multiple case studies.
△ Less
Submitted 25 January, 2021;
originally announced January 2021.
-
Logical Signal Processing: a Fourier Analysis of Temporal Logic
Authors:
Niraj Basnet,
Houssam Abbas
Abstract:
What is the frequency content of temporal logic formulas? That is, when we monitor a signal against a formula, which frequency bands of the signal are relevant to the logic and should be preserved, and which can be safely discarded? This question is relevant whenever signals are filtered or compressed before being monitored, which is almost always the case for analog signals. To answer this questi…
▽ More
What is the frequency content of temporal logic formulas? That is, when we monitor a signal against a formula, which frequency bands of the signal are relevant to the logic and should be preserved, and which can be safely discarded? This question is relevant whenever signals are filtered or compressed before being monitored, which is almost always the case for analog signals. To answer this question, we focus on monitors that measure the robustness of a signal relative to a specification in Signal Temporal Logic. We prove that robustness monitors can be modeled using Volterra series. We then study the Fourier transforms of these Volterra representations, and provide a method to derive the Fourier transforms of entire formulas. We also make explicit the measurement process in temporal logic and re-define it on the basis of distributions to make it compatible with measurements in signal processing. Experiments illustrate these results. Beyond compression, this work enables the integration of temporal logic monitoring into common signal processing toolchains as just another signal processing operation, and enables a common formalism to study both logical and non-logical operations in the frequency domain, which we refer to as Logical Signal Processing.
△ Less
Submitted 17 September, 2020;
originally announced September 2020.
-
A Deontic Logic Analysis of Autonomous Systems' Safety
Authors:
Colin Shea-Blymyer,
Houssam Abbas
Abstract:
We consider the pressing question of how to model, verify, and ensure that autonomous systems meet certain \textit{obligations} (like the obligation to respect traffic laws), and refrain from impermissible behavior (like recklessly changing lanes). Temporal logics are heavily used in autonomous system design; however, as we illustrate here, temporal (alethic) logics alone are inappropriate for rea…
▽ More
We consider the pressing question of how to model, verify, and ensure that autonomous systems meet certain \textit{obligations} (like the obligation to respect traffic laws), and refrain from impermissible behavior (like recklessly changing lanes). Temporal logics are heavily used in autonomous system design; however, as we illustrate here, temporal (alethic) logics alone are inappropriate for reasoning about obligations of autonomous systems. This paper proposes the use of Dominance Act Utilitarianism (DAU), a deontic logic of agency, to encode and reason about obligations of autonomous systems. We use DAU to analyze Intel's Responsibility-Sensitive Safety (RSS) proposal as a real-world case study. We demonstrate that DAU can express well-posed RSS rules, formally derive undesirable consequences of these rules, illustrate how DAU could help design systems that have specific obligations, and how to model-check DAU obligations.
△ Less
Submitted 1 September, 2020;
originally announced September 2020.
-
FairFly: A Fair Motion Planner for Fleets of Autonomous UAVs in Urban Airspace
Authors:
Connor Kurtz,
Houssam Abbas
Abstract:
We present a solution to the problem of fairly planning a fleet of Unmanned Aerial Vehicles (UAVs) that have different missions and operators, such that no one operator unfairly gets to finish its missions early at the expense of others - unless this was explicitly negotiated. When hundreds of UAVs share an urban airspace, the relevant authorities should allocate corridors to them such that they c…
▽ More
We present a solution to the problem of fairly planning a fleet of Unmanned Aerial Vehicles (UAVs) that have different missions and operators, such that no one operator unfairly gets to finish its missions early at the expense of others - unless this was explicitly negotiated. When hundreds of UAVs share an urban airspace, the relevant authorities should allocate corridors to them such that they complete their missions, but no one vehicle is accidentally given an exceptionally fast path at the expense of another, which is thus forced to wait and waste energy. Our solution, FairFly, addresses the fair planning question for general autonomous systems, including UAV fleets, subject to complex missions typical of urban applications. FairFly formalizes each mission in temporal logic. An offline search finds the fairest paths that satisfy the missions and can be flown by the UAVs, leading to lighter online control load. It allows explicit negotiation between UAVs to enable imbalanced path durations if desired. We present three fairness notions, including one that reduces energy consumption. We validate our results in simulation, and demonstrate a lighter computational load and less UAV energy consumption as a result of flying fair trajectories.
△ Less
Submitted 21 August, 2020;
originally announced August 2020.
-
A Transfer Learning End-to-End ArabicText-To-Speech (TTS) Deep Architecture
Authors:
Fady Fahmy,
Mahmoud Khalil,
Hazem Abbas
Abstract:
Speech synthesis is the artificial production of human speech. A typical text-to-speech system converts a language text into a waveform. There exist many English TTS systems that produce mature, natural, and human-like speech synthesizers. In contrast, other languages, including Arabic, have not been considered until recently. Existing Arabic speech synthesis solutions are slow, of low quality, an…
▽ More
Speech synthesis is the artificial production of human speech. A typical text-to-speech system converts a language text into a waveform. There exist many English TTS systems that produce mature, natural, and human-like speech synthesizers. In contrast, other languages, including Arabic, have not been considered until recently. Existing Arabic speech synthesis solutions are slow, of low quality, and the naturalness of synthesized speech is inferior to the English synthesizers. They also lack essential speech key factors such as intonation, stress, and rhythm. Different works were proposed to solve those issues, including the use of concatenative methods such as unit selection or parametric methods. However, they required a lot of laborious work and domain expertise. Another reason for such poor performance of Arabic speech synthesizers is the lack of speech corpora, unlike English that has many publicly available corpora and audiobooks. This work describes how to generate high quality, natural, and human-like Arabic speech using an end-to-end neural deep network architecture. This work uses just $\langle$ text, audio $\rangle$ pairs with a relatively small amount of recorded audio samples with a total of 2.41 hours. It illustrates how to use English character embedding despite using diacritic Arabic characters as input and how to preprocess these audio samples to achieve the best results.
△ Less
Submitted 22 July, 2020;
originally announced July 2020.
-
Securing the Insecure: A First-Line-of-Defense for Nanoscale Communication Systems Operating in THz Band
Authors:
Waqas Aman,
M. Mahboob Ur Rahman,
Hassan T. Abbas,
Muhammad Arslan Khalid,
Muhammad A. Imran,
Akram Alomainy,
Qammer H. Abbasi
Abstract:
Nanoscale communication systems operating in Ter-ahertz (THz) band are anticipated to revolutionise the healthcaresystems of the future. Global wireless data traffic is undergoinga rapid growth. However, wireless systems, due to their broad-casting nature, are vulnerable to malicious security breaches. Inaddition, advances in quantum computing poses a risk to existingcrypto-based information secur…
▽ More
Nanoscale communication systems operating in Ter-ahertz (THz) band are anticipated to revolutionise the healthcaresystems of the future. Global wireless data traffic is undergoinga rapid growth. However, wireless systems, due to their broad-casting nature, are vulnerable to malicious security breaches. Inaddition, advances in quantum computing poses a risk to existingcrypto-based information security. It is of the utmost importanceto make the THz systems resilient to potential active and passiveattacks which may lead to devastating consequences, especiallywhen handling sensitive patient data in healthcare systems. Newstrategies are needed to analyse these malicious attacks and topropose viable countermeasures. In this manuscript, we presenta new authentication mechanism for nanoscale communicationsystems operating in THz band at the physical layer. We assessedan impersonation attack on a THz system. We propose usingpath loss as a fingerprint to conduct authentication via two-stephypothesis testing for a transmission device. We used hiddenMarkov Model (HMM) viterbi algorithm to enhance the outputof hypothesis testing. We also conducted transmitter identificationusing maximum likelihood and Gaussian mixture model (GMM)expectation maximization algorithms. Our simulations showedthat the error probabilities are a decreasing functions of SNR. At 10 dB with 0.2 false alarm, the detection probability was almostone. We further observed that HMM out-performs hypothesistesting at low SNR regime (10% increase in accuracy is recordedat SNR =5 dB) whereas the GMM is useful when groundtruths are noisy. Our work addresses major security gaps facedby communication system either through malicious breachesor quantum computing, enabling new applications of nanoscalesystems for Industry 4.0.
△ Less
Submitted 14 July, 2020;
originally announced July 2020.
-
Learning-to-Fly: Learning-based Collision Avoidance for Scalable Urban Air Mobility
Authors:
Alëna Rodionova,
Yash Vardhan Pant,
Kuk Jang,
Houssam Abbas,
Rahul Mangharam
Abstract:
With increasing urban population, there is global interest in Urban Air Mobility (UAM), where hundreds of autonomous Unmanned Aircraft Systems (UAS) execute missions in the airspace above cities. Unlike traditional human-in-the-loop air traffic management, UAM requires decentralized autonomous approaches that scale for an order of magnitude higher aircraft densities and are applicable to urban set…
▽ More
With increasing urban population, there is global interest in Urban Air Mobility (UAM), where hundreds of autonomous Unmanned Aircraft Systems (UAS) execute missions in the airspace above cities. Unlike traditional human-in-the-loop air traffic management, UAM requires decentralized autonomous approaches that scale for an order of magnitude higher aircraft densities and are applicable to urban settings. We present Learning-to-Fly (L2F), a decentralized on-demand airborne collision avoidance framework for multiple UAS that allows them to independently plan and safely execute missions with spatial, temporal and reactive objectives expressed using Signal Temporal Logic. We formulate the problem of predictively avoiding collisions between two UAS without violating mission objectives as a Mixed Integer Linear Program (MILP).This however is intractable to solve online. Instead, we develop L2F, a two-stage collision avoidance method that consists of: 1) a learning-based decision-making scheme and 2) a distributed, linear programming-based UAS control algorithm. Through extensive simulations, we show the real-time applicability of our method which is $\approx\!6000\times$ faster than the MILP approach and can resolve $100\%$ of collisions when there is ample room to maneuver, and shows graceful degradation in performance otherwise. We also compare L2F to two other methods and demonstrate an implementation on quad-rotor robots.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
Synthesizing Stealthy Reprogramming Attacks on Cardiac Devices
Authors:
Nicola Paoletti,
Zhihao Jiang,
Md Ariful Islam,
Houssam Abbas,
Rahul Mangharam,
Shan Lin,
Zachary Gruber,
Scott A. Smolka
Abstract:
An Implantable Cardioverter Defibrillator (ICD) is a medical device used for the detection of potentially fatal cardiac arrhythmia and their treatment through the delivery of electrical shocks intended to restore normal heart rhythm. An ICD reprogramming attack seeks to alter the device's parameters to induce unnecessary shocks and, even more egregious, prevent required therapy. In this paper, we…
▽ More
An Implantable Cardioverter Defibrillator (ICD) is a medical device used for the detection of potentially fatal cardiac arrhythmia and their treatment through the delivery of electrical shocks intended to restore normal heart rhythm. An ICD reprogramming attack seeks to alter the device's parameters to induce unnecessary shocks and, even more egregious, prevent required therapy. In this paper, we present a formal approach for the synthesis of ICD reprogramming attacks that are both effective, i.e., lead to fundamental changes in the required therapy, and stealthy, i.e., involve minimal changes to the nominal ICD parameters. We focus on the discrimination algorithm underlying Boston Scientific devices (one of the principal ICD manufacturers) and formulate the synthesis problem as one of multi-objective optimization. Our solution technique is based on an Optimization Modulo Theories encoding of the problem and allows us to derive device parameters that are optimal with respect to the effectiveness-stealthiness tradeoff (i.e., lie along the corresponding Pareto front). To the best of our knowledge, our work is the first to derive systematic ICD reprogramming attacks designed to maximize therapy disruption while minimizing detection. To evaluate our technique, we employ an extensive dataset of synthetic EGMs (cardiac signals), each generated with a prescribed arrhythmia, allowing us to synthesize attacks tailored to the victim's cardiac condition. Our approach readily generalizes to unseen signals, representing the unknown EGM of the victim patient.
△ Less
Submitted 9 October, 2018;
originally announced October 2018.
-
Model Checking Implantable Cardioverter Defibrillators
Authors:
Houssam Abbas,
Kuk ** Jang,
Zhihao Jiang,
Rahul Mangharam
Abstract:
Ventricular Fibrillation is a disorganized electrical excitation of the heart that results in inadequate blood flow to the body. It usually ends in death within seconds. The most common way to treat the symptoms of fibrillation is to implant a medical device, known as an Implantable Cardioverter Defibrillator (ICD), in the patient's body. Model-based verification can supply rigorous proofs of safe…
▽ More
Ventricular Fibrillation is a disorganized electrical excitation of the heart that results in inadequate blood flow to the body. It usually ends in death within seconds. The most common way to treat the symptoms of fibrillation is to implant a medical device, known as an Implantable Cardioverter Defibrillator (ICD), in the patient's body. Model-based verification can supply rigorous proofs of safety and efficacy. In this paper, we build a hybrid system model of the human heart+ICD closed loop, and show it to be a STORMED system, a class of o-minimal hybrid systems that admit finite bisimulations. In general, it may not be possible to compute the bisimulation. We show that approximate reachability can yield a finite simulation for STORMED systems, which improves on the existing verification procedure. In the process, we show that certain compositions respect the STORMED property. Thus it is possible to model check important formal properties of ICDs in a closed loop with the heart, such as delayed therapy, missed therapy, or inappropriately administered therapy. The results of this paper are theoretical and motivate the creation of concrete model checking procedures for STORMED systems.
△ Less
Submitted 26 December, 2015;
originally announced December 2015.
-
Towards composition of conformant systems
Authors:
Houssam Abbas,
Georgios Fainekos
Abstract:
Motivated by the Model-Based Design process for Cyber-Physical Systems, we consider issues in conformance testing of systems. Conformance is a quantitative notion of similarity between the output trajectories of systems, which considers both temporal and spatial aspects of the outputs. Previous work developed algorithms for computing the conformance degree between two systems, and demonstrated how…
▽ More
Motivated by the Model-Based Design process for Cyber-Physical Systems, we consider issues in conformance testing of systems. Conformance is a quantitative notion of similarity between the output trajectories of systems, which considers both temporal and spatial aspects of the outputs. Previous work developed algorithms for computing the conformance degree between two systems, and demonstrated how formal verification results for one system can be re-used for a system that is conformant to it. In this paper, we study the relation between conformance and a generalized approximate simulation relation for the class of Open Metric Transition Systems (OMTS). This allows us to prove a small-gain theorem for OMTS, which gives sufficient conditions under which the feedback interconnection of systems respects the conformance relation, thus allowing the building of more complex systems from conformant components.
△ Less
Submitted 18 November, 2015; v1 submitted 17 November, 2015;
originally announced November 2015.
-
Adaptive Agent-Based SCADA System
Authors:
Hosny Abbas,
Samir Shaheen,
Mohammed Amin
Abstract:
Modern supervisory control and data acquisition (SCADA) systems comprise variety of industrial equipment such as physical control processes, logical control systems, communication networks, computers, and communication protocols. They are concerned with control and supervision of production control processes. Modern SCADA networks contain highly distributed information, control, and location. More…
▽ More
Modern supervisory control and data acquisition (SCADA) systems comprise variety of industrial equipment such as physical control processes, logical control systems, communication networks, computers, and communication protocols. They are concerned with control and supervision of production control processes. Modern SCADA networks contain highly distributed information, control, and location. Moreover, they contain large number of heterogeneous components situated in highly changing and uncertain environments. As a result, engineering modern SCADA is a challenging issue and conventional engineering approaches are no longer suitable for them because of their increasing complexity and highly distribution. In this research, Multi-Agent Systems (MAS) are used to enable building adaptive agent-based SCADA system by modeling system components as agents in the micro level and as organizations or societies of agents in the macro level. A prototype has been implemented and evaluated within a simulation environment for demonstrating the adaptive behavior of the system-to-be, which results in continuous improvement of system performance.
△ Less
Submitted 28 September, 2015;
originally announced September 2015.
-
Simple, Flexible, and Interoperable SCADA System Based on Agent Technology
Authors:
Hosny A. Abbas,
Samir I. Shaheen,
Mohammed H. Amin
Abstract:
SCADA (Supervisory Control and Data Acquisition) is concerned with gathering process information from industrial control processes found in utilities such as power grids, water networks, transportation, manufacturing, etc., to provide the human operators with the required real-time access to industrial processes to be monitored and controlled either locally (on-site)or remotely (i.e., through Inte…
▽ More
SCADA (Supervisory Control and Data Acquisition) is concerned with gathering process information from industrial control processes found in utilities such as power grids, water networks, transportation, manufacturing, etc., to provide the human operators with the required real-time access to industrial processes to be monitored and controlled either locally (on-site)or remotely (i.e., through Internet). Conventional solutions such as custom SCADA packages, custom communication protocols, and centralized architectures are no longer appropriate for engineering this type of systems because of their highly distribution and their uncertain continuously changing working environments. Multi-agent systems (MAS) appeared as a new architectural style for engineering complex and highly dynamic applications such as SCADA systems. In this paper, we propose an approach for simply develo** flexible and interoperable SCADA systems based on the integration of MAS and OPC process protocol. The proposed SCADA system has the following advantages: 1) simple (easier to be implemented); 2) flexible (able to adapt to its environment dynamic changes); and 3) interoperable (relative to the underlying control systems, which belongs to diverse of vendors). The applicability of the proposed approach is demonstrated by a real case study example carried out in a paper mill.
△ Less
Submitted 15 August, 2015;
originally announced September 2015.
-
On the Adoption of Multi-Agent Systems for the Development of Industrial Control Networks
Authors:
Hosny A. Abbas,
Samir I. Shaheen,
Mohammed H. Amin
Abstract:
Multi-Agent Systems (MAS) are adopted and tested with many complex and critical industrial applications, which are required to be adaptive, scalable, context-aware, and include real-time constraints. Industrial Control Networks (ICN) are examples of these applications. An ICN is considered a system that contains a variety of interconnected industrial equipments, such as physical control processes,…
▽ More
Multi-Agent Systems (MAS) are adopted and tested with many complex and critical industrial applications, which are required to be adaptive, scalable, context-aware, and include real-time constraints. Industrial Control Networks (ICN) are examples of these applications. An ICN is considered a system that contains a variety of interconnected industrial equipments, such as physical control processes, control systems, computers, and communication networks. It is built to supervise and control industrial processes. This paper presents a development case study on building a multi-layered agent-based ICN in which agents cooperate to provide an effective supervision and control of a set of control processes, basically controlled by a set of legacy control systems with limited computing capabilities. The proposed ICN is designed to add an intelligent layer on top of legacy control systems to compensate their limited capabilities using a cost-effective agent-based approach, and also to provide global synchronization and safety plans. It is tested and evaluated within a simulation environment. The main conclusion of this research is that agents and MAS can provide an effective, flexible, and cost-effective solution to handle the emerged limitations of legacy control systems if they are properly integrated with these systems.
△ Less
Submitted 17 June, 2015;
originally announced June 2015.
-
Efficient Web-Based SCADA System
Authors:
Hosny A. Abbas
Abstract:
Computer-based supervisory control and data acquisition (SCADA) systems have evolved over the past four decades, from standalone, compartmentalized operations into networked architectures that communicate across large distances. There is an emerging trend comprising SCADA and conventional IT units toward consolidating some overlap** activities. This trend is motivated by cost savings achieved by…
▽ More
Computer-based supervisory control and data acquisition (SCADA) systems have evolved over the past four decades, from standalone, compartmentalized operations into networked architectures that communicate across large distances. There is an emerging trend comprising SCADA and conventional IT units toward consolidating some overlap** activities. This trend is motivated by cost savings achieved by consolidating disparate platforms, networks, software, and maintenance tools. For reasons of efficiency, maintenance, economics, data acquisition, control platforms have migrated from isolated in-plant networks using proprietary hardware and software to PC-based systems using standard software, network protocols, and the Internet. In this thesis, we present an approach for web-based SCADA systems that adapt to the behavior of the target application. In addition, we take into account the real time constraints that imposed by the nature of the problem. We show that our approach is more efficient than other approaches in terms of consuming as little as possible of the available resources (computational power and network bandwidth).
△ Less
Submitted 23 January, 2015;
originally announced January 2015.
-
Conformance Testing as Falsification for Cyber-Physical Systems
Authors:
Houssam Abbas,
Bardh Hoxha,
Georgios Fainekos,
Jyotirmoy V. Deshmukh,
James Kapinski,
Koichi Ueda
Abstract:
In Model-Based Design of Cyber-Physical Systems (CPS), it is often desirable to develop several models of varying fidelity. Models of different fidelity levels can enable mathematical analysis of the model, control synthesis, faster simulation etc. Furthermore, when (automatically or manually) transitioning from a model to its implementation on an actual computational platform, then again two diff…
▽ More
In Model-Based Design of Cyber-Physical Systems (CPS), it is often desirable to develop several models of varying fidelity. Models of different fidelity levels can enable mathematical analysis of the model, control synthesis, faster simulation etc. Furthermore, when (automatically or manually) transitioning from a model to its implementation on an actual computational platform, then again two different versions of the same system are being developed. In all previous cases, it is necessary to define a rigorous notion of conformance between different models and between models and their implementations. This paper argues that conformance should be a measure of distance between systems. Albeit a range of theoretical distance notions exists, a way to compute such distances for industrial size systems and models has not been proposed yet. This paper addresses exactly this problem. A universal notion of conformance as closeness between systems is rigorously defined, and evidence is presented that this implies a number of other application-dependent conformance notions. An algorithm for detecting that two systems are not conformant is then proposed, which uses existing proven tools. A method is also proposed to measure the degree of conformance between two systems. The results are demonstrated on a range of models.
△ Less
Submitted 31 May, 2014; v1 submitted 21 January, 2014;
originally announced January 2014.
-
Linear Hybrid System Falsification With Descent
Authors:
Houssam Abbas,
Georgios Fainekos
Abstract:
In this paper, we address the problem of local search for the falsification of hybrid automata with affine dynamics. Namely, if we are given a sequence of locations and a maximum simulation time, we return the trajectory that comes the closest to the unsafe set. In order to solve this problem, we formulate it as a differentiable optimization problem which we solve using Sequential Quadratic Progra…
▽ More
In this paper, we address the problem of local search for the falsification of hybrid automata with affine dynamics. Namely, if we are given a sequence of locations and a maximum simulation time, we return the trajectory that comes the closest to the unsafe set. In order to solve this problem, we formulate it as a differentiable optimization problem which we solve using Sequential Quadratic Programming. The purpose of develo** such a local search method is to combine it with high level stochastic optimization algorithms in order to falsify hybrid systems with complex discrete dynamics and high dimensional continuous spaces. Experimental results indicate that indeed the local search procedure improves upon the results of pure stochastic optimization algorithms.
△ Less
Submitted 17 July, 2011; v1 submitted 9 May, 2011;
originally announced May 2011.