-
Time-Robust Path Planning with Piece-Wise Linear Trajectory for Signal Temporal Logic Specifications
Authors:
Nhan-Khanh Le,
Erfaun Noorani,
Sandra Hirche,
John Baras
Abstract:
Real-world scenarios are characterized by timing uncertainties, e.g., delays, and disturbances. Algorithms with temporal robustness are crucial in guaranteeing the successful execution of tasks and missions in such scenarios. We study time-robust path planning for synthesizing robots' trajectories that adhere to spatial-temporal specifications expressed in Signal Temporal Logic (STL). In contrast…
▽ More
Real-world scenarios are characterized by timing uncertainties, e.g., delays, and disturbances. Algorithms with temporal robustness are crucial in guaranteeing the successful execution of tasks and missions in such scenarios. We study time-robust path planning for synthesizing robots' trajectories that adhere to spatial-temporal specifications expressed in Signal Temporal Logic (STL). In contrast to prior approaches that rely on {discretize}d trajectories with fixed time steps, we leverage Piece-Wise Linear (PWL) signals for the synthesis. PWL signals represent a trajectory through a sequence of time-stamped waypoints. This allows us to encode the STL formula into a Mixed-Integer Linear Program (MILP) with fewer variables. This reduction is more pronounced for specifications with a long planning horizon. To that end, we define time-robustness for PWL signals. Subsequently, we propose quantitative semantics for PWL signals according to the recursive syntax of STL and prove their soundness. We then propose an encoding strategy to transform our semantics into a MILP. Our simulations showcase the soundness and the performance of our algorithm.
△ Less
Submitted 15 March, 2024;
originally announced March 2024.
-
Safe Collective Control under Noisy Inputs and Competing Constraints via Non-Smooth Barrier Functions
Authors:
Clinton Enwerem,
John S. Baras
Abstract:
We consider the problem of safely coordinating ensembles of identical autonomous agents to conduct complex missions with conflicting safety requirements and under noisy control inputs. Using non-smooth control barrier functions (CBFs) and stochastic model-predictive control as springboards, and by adopting an extrinsic approach where the ensemble is treated as a unified dynamic entity, we devise a…
▽ More
We consider the problem of safely coordinating ensembles of identical autonomous agents to conduct complex missions with conflicting safety requirements and under noisy control inputs. Using non-smooth control barrier functions (CBFs) and stochastic model-predictive control as springboards, and by adopting an extrinsic approach where the ensemble is treated as a unified dynamic entity, we devise a method to synthesize safety-aware control inputs for uncertain collectives. Drawing upon stochastic CBF theory and recent developments in Boolean CBF composition, our method proceeds by smoothing a Boolean-composed CBF and solving a stochastic optimization problem where each agent's forcing term is restricted to the affine subspace of control inputs certified by the combined CBF. For the smoothing step, we employ a polynomial approximation scheme, providing evidence for its advantage in generating more conservative yet sufficiently-filtered control inputs than the smoother but more aggressive equivalents produced from an approximation technique based on the log-sum-exp function. To further demonstrate the utility of the proposed method, we present an upper bound for the expected CBF approximation error, along with results from simulations of a single-integrator collective under velocity perturbations. Lastly, we compare these results with those obtained using a naive state-feedback controller lacking safety filters.
△ Less
Submitted 28 March, 2024; v1 submitted 6 November, 2023;
originally announced November 2023.
-
Risk-Sensitive Inhibitory Control for Safe Reinforcement Learning
Authors:
Armin Lederer,
Erfaun Noorani,
John S. Baras,
Sandra Hirche
Abstract:
Humans have the ability to deviate from their natural behavior when necessary, which is a cognitive process called response inhibition. Similar approaches have independently received increasing attention in recent years for ensuring the safety of control. Realized using control barrier functions or predictive safety filters, these approaches can effectively ensure the satisfaction of state constra…
▽ More
Humans have the ability to deviate from their natural behavior when necessary, which is a cognitive process called response inhibition. Similar approaches have independently received increasing attention in recent years for ensuring the safety of control. Realized using control barrier functions or predictive safety filters, these approaches can effectively ensure the satisfaction of state constraints through an online adaptation of nominal control laws, e.g., obtained through reinforcement learning. While the focus of these realizations of inhibitory control has been on risk-neutral formulations, human studies have shown a tight link between response inhibition and risk attitude. Inspired by this insight, we propose a flexible, risk-sensitive method for inhibitory control. Our method is based on a risk-aware condition for value functions, which guarantees the satisfaction of state constraints. We propose a method for learning these value functions using common techniques from reinforcement learning and derive sufficient conditions for its success. By enforcing the derived safety conditions online using the learned value function, risk-sensitive inhibitory control is effectively achieved. The effectiveness of the developed control scheme is demonstrated in simulations.
△ Less
Submitted 2 October, 2023;
originally announced October 2023.
-
RCMS: Risk-Aware Crash Mitigation System for Autonomous Vehicles
Authors:
Faizan M. Tariq,
David Isele,
John S. Baras,
Sangjae Bae
Abstract:
We propose a risk-aware crash mitigation system (RCMS), to augment any existing motion planner (MP), that enables an autonomous vehicle to perform evasive maneuvers in high-risk situations and minimize the severity of collision if a crash is inevitable. In order to facilitate a smooth transition between RCMS and MP, we develop a novel activation mechanism that combines instantaneous as well as pre…
▽ More
We propose a risk-aware crash mitigation system (RCMS), to augment any existing motion planner (MP), that enables an autonomous vehicle to perform evasive maneuvers in high-risk situations and minimize the severity of collision if a crash is inevitable. In order to facilitate a smooth transition between RCMS and MP, we develop a novel activation mechanism that combines instantaneous as well as predictive collision risk evaluation strategies in a unified hysteresis-band approach. For trajectory planning, we deploy a modular receding horizon optimization-based approach that minimizes a smooth situational risk profile, while adhering to the physical road limits as well as vehicular actuator limits. We demonstrate the performance of our approach in a simulation environment.
△ Less
Submitted 21 September, 2023;
originally announced September 2023.
-
Consensus-Based Leader-Follower Formation Tracking for Control-Affine Nonlinear Multiagent Systems
Authors:
Clinton Enwerem,
John S. Baras
Abstract:
In the typical multiagent formation tracking problem centered on consensus, the prevailing assumption in the literature is that the agents' nonlinear models can be approximated by integrator systems, by their feedback-linearized equivalents, or by dynamics composed of deterministic linear and nonlinear terms. The resulting approaches associated with such assumptions, however, are hardly applicable…
▽ More
In the typical multiagent formation tracking problem centered on consensus, the prevailing assumption in the literature is that the agents' nonlinear models can be approximated by integrator systems, by their feedback-linearized equivalents, or by dynamics composed of deterministic linear and nonlinear terms. The resulting approaches associated with such assumptions, however, are hardly applicable to general nonlinear systems. To this end, we present consensus-based control laws for multiagent formation tracking in finite-dimensional state space, with the agents represented by a more general class of dynamics: control-affine nonlinear systems. The agents also exchange information via a leader-follower communication topology modeled as an undirected and connected graph with a single leader node. By leveraging standard tools from algebraic graph theory and Lyapunov analysis, we first derive a locally asymptotically stabilizing formation tracking law. Next, to demonstrate the effectiveness of our approach, we present results from numerical simulations of an example in robotics. These results -- together with a comparison of the formation errors obtained with our approach and those realized via an optimization-based method -- further validate our theoretical propositions.
△ Less
Submitted 17 September, 2023;
originally announced September 2023.
-
PASA: A Priori Adaptive Splitting Algorithm for the Split Delivery Vehicle Routing Problem
Authors:
Nariman Torkzaban,
Anousheh Gholami,
John S. Baras,
Bruce Golden
Abstract:
The split delivery vehicle routing problem (SDVRP) is a relaxed variant of the capacitated vehicle routing problem (CVRP) where the restriction that each customer is visited precisely once is removed. Compared with CVRP, the SDVRP allows a reduction in the cost of the routes traveled by vehicles. The exact methods to solve the SDVRP are computationally expensive. Moreover, the complexity and diffi…
▽ More
The split delivery vehicle routing problem (SDVRP) is a relaxed variant of the capacitated vehicle routing problem (CVRP) where the restriction that each customer is visited precisely once is removed. Compared with CVRP, the SDVRP allows a reduction in the cost of the routes traveled by vehicles. The exact methods to solve the SDVRP are computationally expensive. Moreover, the complexity and difficult implementation of the state-of-the-art heuristic approaches hinder their application in real-life scenarios of the SDVRP. In this paper, we propose an easily understandable and effective approach to solve the SDVPR based on an a priori adaptive splitting algorithm (PASA). The idea of a priori split strategy was first introduced in Chen et al. (2017). In this approach, the demand of the customers is split into smaller values using a fixed splitting rule in advance. Consequently, the original SDVRP instance is converted to a CVRP instance which is solved using an existing CVRP solver. While the proposed a priori splitting rule in Chen et al. (2017) is fixed for all customers regardless of their demand and location, we suggest an adaptive splitting rule that takes into account the distance of the customers to the depot and their demand values. Our experiments show that PASA can generate solutions comparable to the state-of-the-art but much faster. Furthermore, our algorithm outperforms the fixed a priori splitting rule proposed by Chen et al. (2017).
△ Less
Submitted 31 August, 2023;
originally announced August 2023.
-
Blind Cyclic Prefix-based CFO Estimation in MIMO-OFDM Systems
Authors:
Nariman Torkzaban,
Amir Khojastepour,
John S. Baras
Abstract:
Low-complexity estimation and correction of carrier frequency offset (CFO) are essential in orthogonal frequency division multiplexing (OFDM). In this paper, we propose a low-overhead blind CFO estimation technique based on cyclic prefix (CP), in multi-input multi-output (MIMO)-OFDM systems. We propose to use antenna diversity for CFO estimation. Given that the RF chains for all antenna elements a…
▽ More
Low-complexity estimation and correction of carrier frequency offset (CFO) are essential in orthogonal frequency division multiplexing (OFDM). In this paper, we propose a low-overhead blind CFO estimation technique based on cyclic prefix (CP), in multi-input multi-output (MIMO)-OFDM systems. We propose to use antenna diversity for CFO estimation. Given that the RF chains for all antenna elements at a communication node share the same clock, the carrier frequency offset (CFO) between two points may be estimated by using the combination of the received signal at all antennas. We improve our method by combining the antenna diversity with time diversity by considering the CP for multiple OFDM symbols. We provide a closed-form expression for CFO estimation and present algorithms that can considerably improve the CFO estimation performance at the expense of a linear increase in computational complexity. We validate the effectiveness of our estimation scheme via extensive numerical analysis.
△ Less
Submitted 29 August, 2023;
originally announced August 2023.
-
Learning Agent Interactions from Density Evolution in 3D Regions With Obstacles
Authors:
Amoolya Tirumalai,
Christos N. Mavridis,
John S. Baras
Abstract:
In this work, we study the inverse problem of identifying complex flocking dynamics in a domain cluttered with obstacles. We get inspiration from animal flocks moving in complex ways with capabilities far beyond what current robots can do. Owing to the difficulty of observing and recovering the trajectories of the agents, we focus on the dynamics of their probability densities, which are governed…
▽ More
In this work, we study the inverse problem of identifying complex flocking dynamics in a domain cluttered with obstacles. We get inspiration from animal flocks moving in complex ways with capabilities far beyond what current robots can do. Owing to the difficulty of observing and recovering the trajectories of the agents, we focus on the dynamics of their probability densities, which are governed by partial differential equations (PDEs), namely compressible Euler equations subject to non-local forces. We formulate the inverse problem of learning interactions as a PDE-constrained optimization problem of minimizing the squared Hellinger distance between the histogram of the flock and the distribution associated to our PDEs. The numerical methods used to efficiently solve the PDE-constrained optimization problem are described. Realistic flocking data are simulated using the Boids model of flocking agents, which differs in nature from the reconstruction models used in our PDEs. Our analysis and simulated experiments show that the behavior of cohesive flocks can be recovered accurately with approximate PDE solutions.
△ Less
Submitted 18 May, 2023;
originally announced May 2023.
-
Mobile Network Slicing under Demand Uncertainty: A Stochastic Programming Approach
Authors:
Anousheh Gholami,
Nariman Torkzaban,
John S. Baras
Abstract:
Network slicing enables the deployment of multiple dedicated virtual sub-networks, i.e. slices on a shared physical infrastructure. Unlike traditional one-size-fits-all resource provisioning schemes, each network slice (NS) in 5G is tailored to the specific service requirements of a group of customers. An end-to-end (E2E) mobile NS orchestration requires the simultaneous provisioning of computing,…
▽ More
Network slicing enables the deployment of multiple dedicated virtual sub-networks, i.e. slices on a shared physical infrastructure. Unlike traditional one-size-fits-all resource provisioning schemes, each network slice (NS) in 5G is tailored to the specific service requirements of a group of customers. An end-to-end (E2E) mobile NS orchestration requires the simultaneous provisioning of computing, storage, and networking resources across the core network (CN) and the radio access network (RAN). Constant temporospatial changes in mobile user demand profiles further complicate the E2E NSs resource provisioning beyond the limits of the existing best-effort schemes that are only effective under accurate demand forecasts for all slices. This paper proposes a practical two-time-scale resource provisioning framework for E2E network slicing under demand uncertainty. At each macro-scale instance, we assume that only the spatial probability distribution of the NS demands is available. We formulate the NSs resource allocation problem as a stochastic mixed integer program (SMIP) with the objective of minimizing the total resource cost at the CN and the RAN. At each microscale instance, utilizing the exact slice demand profiles, a linear program is solved to jointly minimize the unsupported traffic and the resource cost at the RAN. We verify the effectiveness of our resource allocation scheme through numerical experiments.
△ Less
Submitted 27 April, 2023;
originally announced April 2023.
-
Resource Efficiency vs Performance Isolation Tradeoff in Network Slicing
Authors:
Panagiotis Nikolaidis,
Asim Zoulkarni,
John Baras
Abstract:
We consider the tradeoff between resource efficiency and performance isolation that emerges when multiplexing the resource demands of Network Slices (NSs). On the one hand, multiplexing allows the use of idle resources, which increases resource efficiency. On the other hand, the performance of each NS becomes susceptible to traffic surges in other NSs, which degrades performance isolation. The ana…
▽ More
We consider the tradeoff between resource efficiency and performance isolation that emerges when multiplexing the resource demands of Network Slices (NSs). On the one hand, multiplexing allows the use of idle resources, which increases resource efficiency. On the other hand, the performance of each NS becomes susceptible to traffic surges in other NSs, which degrades performance isolation. The analysis of this tradeoff enables network operators to determine the effect of performance isolation on the operating cost of each NS.
To study the tradeoff, we solve an optimization problem where we find the multiplexing policy that requires the least provisioned resources to honor the Service Level Agreements (SLAs) of all NSs. The SLA of each NS i states that its resource demand should be met for $P^H_i$ fraction of time, and for $P^L_i \leq P^H_i$ fraction of time, it should be met regardless of the demands of other NSs.
For resource demands that follow ergodic Markov chains, we show that the well-known Max-Weight scheduler is an optimal multiplexing policy. Since the Max-Weight scheduler does not require any knowledge of the statistics of the resource demands, we also propose its use in non-markovian settings. For resource demands obtained in the LTE module of ns-3, we show that the Max-Weight scheduler reduces the provisioned bandwidth by 36.2% when no performance isolation is required. Lastly, for these non-markovian resource demands, the Max-Weight scheduler maintains its optimality since it requires as much provisioned bandwidth as the best non-causal scheduler.
△ Less
Submitted 26 March, 2023;
originally announced March 2023.
-
SLAS: Speed and Lane Advisory System for Highway Navigation
Authors:
Faizan M. Tariq,
David Isele,
John S. Baras,
Sangjae Bae
Abstract:
This paper proposes a hierarchical autonomous vehicle navigation architecture, composed of a high-level speed and lane advisory system (SLAS) coupled with low-level trajectory generation and trajectory following modules. Specifically, we target a multi-lane highway driving scenario where an autonomous ego vehicle navigates in traffic. We propose a novel receding horizon mixed-integer optimization…
▽ More
This paper proposes a hierarchical autonomous vehicle navigation architecture, composed of a high-level speed and lane advisory system (SLAS) coupled with low-level trajectory generation and trajectory following modules. Specifically, we target a multi-lane highway driving scenario where an autonomous ego vehicle navigates in traffic. We propose a novel receding horizon mixed-integer optimization based method for SLAS with the objective to minimize travel time while accounting for passenger comfort. We further incorporate various modifications in the proposed approach to improve the overall computational efficiency and achieve real-time performance. We demonstrate the efficacy of the proposed approach in contrast to the existing methods, when applied in conjunction with state-of-the-art trajectory generation and trajectory following frameworks, in a CARLA simulation environment.
△ Less
Submitted 1 March, 2023;
originally announced March 2023.
-
Approximate Dynamic Programming for a Mean-field Game of Traffic Flow: Existence and Uniqueness
Authors:
Amoolya Tirumalai,
John S. Baras
Abstract:
Highway vehicular traffic is an inherently multi-agent problem. Traffic jams can appear and disappear mysteriously. We develop a method for traffic flow control that is applied at the vehicular level via mean-field games. We begin this work with a microscopic model of vehicles subject to control input, disturbances, noise, and a speed limit. We formulate a discounted-cost infinite-horizon robust m…
▽ More
Highway vehicular traffic is an inherently multi-agent problem. Traffic jams can appear and disappear mysteriously. We develop a method for traffic flow control that is applied at the vehicular level via mean-field games. We begin this work with a microscopic model of vehicles subject to control input, disturbances, noise, and a speed limit. We formulate a discounted-cost infinite-horizon robust mean-field game on the vehicles, and obtain the associated dynamic programming (DP) PDE system. We then perform approximate dynamic programming (ADP) using these equations to obtain a sub-optimal control for the traffic density adaptively. The sub-optimal controls are subject to an ODE-PDE system. We show that the ADP ODE-PDE system has a unique weak solution in a suitable Hilbert space using semigroup and successive approximation methods. We additionally give a numerical simulation, and interpret the results.
△ Less
Submitted 4 June, 2023; v1 submitted 10 February, 2023;
originally announced February 2023.
-
Capacitated Beam Placement for Multi-beam Non-Geostationary Satellite Systems
Authors:
Nariman Torkzaban,
Asim Zoulkarni,
Anousheh Gholami,
John S. Baras
Abstract:
Non-geostationary (NGSO) satellite communications systems have attracted a lot of attention both from industry and academia, over the past several years. Beam placement is among the major resource allocation problems in multi-beam NGSO systems. In this paper, we formulate the beam placement problem as a Euclidean disk cover optimization model. We aim at minimizing the number of placed beams while…
▽ More
Non-geostationary (NGSO) satellite communications systems have attracted a lot of attention both from industry and academia, over the past several years. Beam placement is among the major resource allocation problems in multi-beam NGSO systems. In this paper, we formulate the beam placement problem as a Euclidean disk cover optimization model. We aim at minimizing the number of placed beams while satisfying the total downlink traffic demand of targeted ground terminals without exceeding the capacity of the placed beams. We present a low-complexity deterministic annealing (DA)-based algorithm to solve the NP-hard optimization model for near-optimal solutions. We further propose an extended variant of the previous model to ensure the traffic assigned to the beams is balanced. We verify the effectiveness of our proposed methods by means of numerical experiments and show that our scheme is superior to the state-of-the-art methods in that it covers the ground users by fewer number of beams on average.
△ Less
Submitted 18 January, 2023;
originally announced January 2023.
-
Distributed Optimal Formation Control for an Uncertain Multiagent System in the Plane
Authors:
Clinton Enwerem,
John Baras,
Danilo Romero
Abstract:
In this paper, we present a distributed optimal multiagent control scheme for quadrotor formation tracking under localization errors. Our control architecture is based on a leader-follower approach, where a single leader quadrotor tracks a desired trajectory while the followers maintain their relative positions in a triangular formation. We begin by modeling the quadrotors as particles in the YZ-p…
▽ More
In this paper, we present a distributed optimal multiagent control scheme for quadrotor formation tracking under localization errors. Our control architecture is based on a leader-follower approach, where a single leader quadrotor tracks a desired trajectory while the followers maintain their relative positions in a triangular formation. We begin by modeling the quadrotors as particles in the YZ-plane evolving under dynamics with uncertain state information. Next, by formulating the formation tracking task as an optimization problem -- with a constraint-augmented Lagrangian subject to dynamic constraints -- we solve for the control law that leads to an optimal solution in the control and trajectory error cost-minimizing sense. Results from numerical simulations show that for the planar quadrotor model considered -- with uncertainty in sensor measurements modeled as Gaussian noise -- the resulting optimal control is able to drive each agent to achieve the desired global objective: leader trajectory tracking with formation maintenance. Finally, we evaluate the performance of the control law using the tracking and formation errors of the multiagent system.
△ Less
Submitted 28 January, 2023; v1 submitted 14 January, 2023;
originally announced January 2023.
-
Risk-Sensitive Reinforcement Learning with Exponential Criteria
Authors:
Erfaun Noorani,
Christos Mavridis,
John Baras
Abstract:
While reinforcement learning has shown experimental success in a number of applications, it is known to be sensitive to noise and perturbations in the parameters of the system, leading to high variance in the total reward amongst different episodes in slightly different environments. To introduce robustness, as well as sample efficiency, risk-sensitive reinforcement learning methods are being thor…
▽ More
While reinforcement learning has shown experimental success in a number of applications, it is known to be sensitive to noise and perturbations in the parameters of the system, leading to high variance in the total reward amongst different episodes in slightly different environments. To introduce robustness, as well as sample efficiency, risk-sensitive reinforcement learning methods are being thoroughly studied. In this work, we provide a definition of robust reinforcement learning policies and formulate a risk-sensitive reinforcement learning problem to approximate them, by solving an optimization problem with respect to a modified objective based on exponential criteria. In particular, we study a model-free risk-sensitive variation of the widely-used Monte Carlo Policy Gradient algorithm and introduce a novel risk-sensitive online Actor-Critic algorithm based on solving a multiplicative Bellman equation using stochastic approximation updates. Analytical results suggest that the use of exponential criteria generalizes commonly used ad-hoc regularization approaches, improves sample efficiency, and introduces robustness with respect to perturbations in the model parameters and the environment. The implementation, performance, and robustness properties of the proposed methods are evaluated in simulated experiments.
△ Less
Submitted 19 December, 2023; v1 submitted 17 December, 2022;
originally announced December 2022.
-
Multi-Resolution Online Deterministic Annealing: A Hierarchical and Progressive Learning Architecture
Authors:
Christos Mavridis,
John Baras
Abstract:
Hierarchical learning algorithms that gradually approximate a solution to a data-driven optimization problem are essential to decision-making systems, especially under limitations on time and computational resources. In this study, we introduce a general-purpose hierarchical learning architecture that is based on the progressive partitioning of a possibly multi-resolution data space. The optimal p…
▽ More
Hierarchical learning algorithms that gradually approximate a solution to a data-driven optimization problem are essential to decision-making systems, especially under limitations on time and computational resources. In this study, we introduce a general-purpose hierarchical learning architecture that is based on the progressive partitioning of a possibly multi-resolution data space. The optimal partition is gradually approximated by solving a sequence of optimization sub-problems that yield a sequence of partitions with increasing number of subsets. We show that the solution of each optimization problem can be estimated online using gradient-free stochastic approximation updates. As a consequence, a function approximation problem can be defined within each subset of the partition and solved using the theory of two-timescale stochastic approximation algorithms. This simulates an annealing process and defines a robust and interpretable heuristic method to gradually increase the complexity of the learning architecture in a task-agnostic manner, giving emphasis to regions of the data space that are considered more important according to a predefined criterion. Finally, by imposing a tree structure in the progression of the partitions, we provide a means to incorporate potential multi-resolution structure of the data space into this approach, significantly reducing its complexity, while introducing hierarchical variable-rate feature extraction properties similar to certain classes of deep learning architectures. Asymptotic convergence analysis and experimental results are provided for supervised and unsupervised learning problems.
△ Less
Submitted 21 March, 2023; v1 submitted 15 December, 2022;
originally announced December 2022.
-
Annealing Optimization for Progressive Learning with Stochastic Approximation
Authors:
Christos Mavridis,
John Baras
Abstract:
In this work, we introduce a learning model designed to meet the needs of applications in which computational resources are limited, and robustness and interpretability are prioritized. Learning problems can be formulated as constrained stochastic optimization problems, with the constraints originating mainly from model assumptions that define a trade-off between complexity and performance. This t…
▽ More
In this work, we introduce a learning model designed to meet the needs of applications in which computational resources are limited, and robustness and interpretability are prioritized. Learning problems can be formulated as constrained stochastic optimization problems, with the constraints originating mainly from model assumptions that define a trade-off between complexity and performance. This trade-off is closely related to over-fitting, generalization capacity, and robustness to noise and adversarial attacks, and depends on both the structure and complexity of the model, as well as the properties of the optimization methods used. We develop an online prototype-based learning algorithm based on annealing optimization that is formulated as an online gradient-free stochastic approximation algorithm. The learning model can be viewed as an interpretable and progressively growing competitive-learning neural network model to be used for supervised, unsupervised, and reinforcement learning. The annealing nature of the algorithm contributes to minimal hyper-parameter tuning requirements, poor local minima prevention, and robustness with respect to the initial conditions. At the same time, it provides online control over the performance-complexity trade-off by progressively increasing the complexity of the learning model as needed, through an intuitive bifurcation phenomenon. Finally, the use of stochastic approximation enables the study of the convergence of the learning algorithm through mathematical tools from dynamical systems and control, and allows for its integration with reinforcement learning algorithms, constructing an adaptive state-action aggregation scheme.
△ Less
Submitted 25 December, 2022; v1 submitted 6 September, 2022;
originally announced September 2022.
-
Actuator Scheduling for Linear Systems: A Convex Relaxation Approach
Authors:
Junjie Jiao,
Dipankar Maity,
John S. Baras,
Sandra Hirche
Abstract:
In this letter, we investigate the problem of actuator scheduling for networked control systems. Given a stochastic linear system with a number of actuators, we consider the case that one actuator is activated at each time. This problem is combinatorial in nature and NP hard to solve. We propose a convex relaxation to the actuator scheduling problem, and use its solution as a reference to design a…
▽ More
In this letter, we investigate the problem of actuator scheduling for networked control systems. Given a stochastic linear system with a number of actuators, we consider the case that one actuator is activated at each time. This problem is combinatorial in nature and NP hard to solve. We propose a convex relaxation to the actuator scheduling problem, and use its solution as a reference to design an algorithm for solving the original scheduling problem. Using dynamic programming arguments, we provide a suboptimality bound of our proposed algorithm. Furthermore, we show that our framework can be extended to incorporate multiple actuators scheduling at each time and actuation costs. A simulation example is provided, which shows that our proposed method outperforms a random selection approach and a greedy selection approach.
△ Less
Submitted 20 May, 2022; v1 submitted 4 March, 2022;
originally announced March 2022.
-
Multi-user Beam Alignment in Presence of Multi-path
Authors:
Nariman Torkzaban,
Mohammad A.,
Khojastepour,
John S. Baras
Abstract:
To overcome the high path-loss and the intense shadowing in millimeter-wave (mmWave) communications, effective beamforming schemes are required which incorporate narrow beams with high beamforming gains. The mmWave channel consists of a few spatial clusters each associated with an angle of departure (AoD). The narrow beams must be aligned with the channel AoDs to increase the beamforming gain. Thi…
▽ More
To overcome the high path-loss and the intense shadowing in millimeter-wave (mmWave) communications, effective beamforming schemes are required which incorporate narrow beams with high beamforming gains. The mmWave channel consists of a few spatial clusters each associated with an angle of departure (AoD). The narrow beams must be aligned with the channel AoDs to increase the beamforming gain. This is achieved through a procedure called beam alignment (BA). Most of the BA schemes in the literature consider channels with a single dominant path while in practice the channel has a few resolvable paths with different AoDs, hence, such BA schemes may not work correctly in the presence of multi-path or at the least do not exploit such multipath to achieve diversity or increase robustness.
In this paper, we propose an efficient BA scheme in presence of multi-path. The proposed BA scheme transmits probing packets using a set of scanning beams and receives feedback for all the scanning beams at the end of the probing phase from each user. We formulate the BA scheme as minimizing the expected value of the average transmission beamwidth under different policies. The policy is defined as a function from the set of received feedback to the set of transmission beams (TB). In order to maximize the number of possible feedback sequences, we prove that the set of scanning beams (SB) has a special form, namely, Tulip Design. Consequently, we rewrite the minimization problem with a set of linear constraints and a reduced number of variables which is solved by using an efficient greedy algorithm.
△ Less
Submitted 13 February, 2022;
originally announced February 2022.
-
Codebook Design for Composite Beamforming in Next-generation mmWave Systems
Authors:
Nariman Torkzaban,
Mohamamd A.,
Khojastepour,
John S. Baras
Abstract:
In pursuance of the unused spectrum in higher frequencies, millimeter wave (mmWave) bands have a pivotal role. However, the high path-loss and poor scattering associated with mmWave communications highlight the necessity of employing effective beamforming techniques. In order to efficiently search for the beam to serve a user and to jointly serve multiple users it is often required to use a compos…
▽ More
In pursuance of the unused spectrum in higher frequencies, millimeter wave (mmWave) bands have a pivotal role. However, the high path-loss and poor scattering associated with mmWave communications highlight the necessity of employing effective beamforming techniques. In order to efficiently search for the beam to serve a user and to jointly serve multiple users it is often required to use a composite beam which consists of multiple disjoint lobes. A composite beam covers multiple desired angular coverage intervals (ACIs) and ideally has maximum and uniform gain (smoothness) within each desired ACI, negligible gain (leakage) outside the desired ACIs, and sharp edges. We propose an algorithm for designing such ideal composite codebook by providing an analytical closed-form solution with low computational complexity. There is a fundamental trade-off between the gain, leakage and smoothness of the beams. Our design allows to achieve different values in such trade-off based on changing the design parameters. We highlight the shortcomings of the uniform linear arrays (ULAs) in building arbitrary composite beams. Consequently, we use a recently introduced twin-ULA (TULA) antenna structure to effectively resolve these inefficiencies. Numerical results are used to validate the theoretical findings.
△ Less
Submitted 7 February, 2022;
originally announced February 2022.
-
Learning Swarm Interaction Dynamics from Density Evolution
Authors:
Christos Mavridis,
Amoolya Tirumalai,
John Baras
Abstract:
We consider the problem of understanding the coordinated movements of biological or artificial swarms. In this regard, we propose a learning scheme to estimate the coordination laws of the interacting agents from observations of the swarm's density over time. We describe the dynamics of the swarm based on pairwise interactions according to a Cucker-Smale flocking model, and express the swarm's den…
▽ More
We consider the problem of understanding the coordinated movements of biological or artificial swarms. In this regard, we propose a learning scheme to estimate the coordination laws of the interacting agents from observations of the swarm's density over time. We describe the dynamics of the swarm based on pairwise interactions according to a Cucker-Smale flocking model, and express the swarm's density evolution as the solution to a system of mean-field hydrodynamic equations. We propose a new family of parametric functions to model the pairwise interactions, which allows for the mean-field macroscopic system of integro-differential equations to be efficiently solved as an augmented system of PDEs. Finally, we incorporate the augmented system in an iterative optimization scheme to learn the dynamics of the interacting agents from observations of the swarm's density evolution over time. The results of this work can offer an alternative approach to study how animal flocks coordinate, create new control schemes for large networked systems, and serve as a central part of defense mechanisms against adversarial drone attacks.
△ Less
Submitted 5 December, 2021;
originally announced December 2021.
-
Towards the One Learning Algorithm Hypothesis: A System-theoretic Approach
Authors:
Christos Mavridis,
John Baras
Abstract:
The existence of a universal learning architecture in human cognition is a widely spread conjecture supported by experimental findings from neuroscience. While no low-level implementation can be specified yet, an abstract outline of human perception and learning is believed to entail three basic properties: (a) hierarchical attention and processing, (b) memory-based knowledge representation, and (…
▽ More
The existence of a universal learning architecture in human cognition is a widely spread conjecture supported by experimental findings from neuroscience. While no low-level implementation can be specified yet, an abstract outline of human perception and learning is believed to entail three basic properties: (a) hierarchical attention and processing, (b) memory-based knowledge representation, and (c) progressive learning and knowledge compaction. We approach the design of such a learning architecture from a system-theoretic viewpoint, develo** a closed-loop system with three main components: (i) a multi-resolution analysis pre-processor, (ii) a group-invariant feature extractor, and (iii) a progressive knowledge-based learning module. Multi-resolution feedback loops are used for learning, i.e., for adapting the system parameters to online observations. To design (i) and (ii), we build upon the established theory of wavelet-based multi-resolution analysis and the properties of group convolution operators. Regarding (iii), we introduce a novel learning algorithm that constructs progressively growing knowledge representations in multiple resolutions. The proposed algorithm is an extension of the Online Deterministic Annealing (ODA) algorithm based on annealing optimization, solved using gradient-free stochastic approximation. ODA has inherent robustness and regularization properties and provides a means to progressively increase the complexity of the learning model i.e. the number of the neurons, as needed, through an intuitive bifurcation phenomenon. The proposed multi-resolution approach is hierarchical, progressive, knowledge-based, and interpretable. We illustrate the properties of the proposed architecture in the context of the state-of-the-art learning algorithms and deep learning methods.
△ Less
Submitted 4 December, 2021;
originally announced December 2021.
-
A Robust Mean-field Game of Boltzmann-Vlasov-like Traffic Flow
Authors:
Amoolya Tirumalai,
John S. Baras
Abstract:
Historically, traffic modelling approaches have taken either a particle-like (microscopic) approach, or a gas-like (meso- or macroscopic) approach. Until recently with the introduction of mean-field games to the controls community, there has not been a rigorous framework to facilitate passage between controls for the microscopic models and the macroscopic models. We begin this work with a particle…
▽ More
Historically, traffic modelling approaches have taken either a particle-like (microscopic) approach, or a gas-like (meso- or macroscopic) approach. Until recently with the introduction of mean-field games to the controls community, there has not been a rigorous framework to facilitate passage between controls for the microscopic models and the macroscopic models. We begin this work with a particle-based model of autonomous vehicles subject to drag and unknown disturbances, noise, and a speed limit in addition to the control.
We formulate a robust stochastic differential game on the particles. We pass formally to the infinite-particle limit to obtain a robust mean-field game PDE system. We solve the mean-field game PDE system numerically and discuss the results. In particular, we obtain an optimal control which increases the bulk velocity of the traffic flow while reducing congestion.
△ Less
Submitted 14 November, 2021; v1 submitted 11 November, 2021;
originally announced November 2021.
-
Sensor Scheduling for Linear Systems: A Covariance Tracking Approach
Authors:
Dipankar Maity,
David Hartman,
John S. Baras
Abstract:
We consider the classical sensor scheduling problem for linear systems where only one sensor is activated at each time. We show that the sensor scheduling problem has a close relation to the sensor design problem and the solution of a sensor schedule problem can be extracted from an equivalent sensor design problem. We propose a convex relaxation to the sensor design problem and a reference covari…
▽ More
We consider the classical sensor scheduling problem for linear systems where only one sensor is activated at each time. We show that the sensor scheduling problem has a close relation to the sensor design problem and the solution of a sensor schedule problem can be extracted from an equivalent sensor design problem. We propose a convex relaxation to the sensor design problem and a reference covariance trajectory is obtained from solving the relaxed sensor design problem. Afterwards, a covariance tracking algorithm is designed to obtain an approximate solution to the sensor scheduling problem using the reference covariance trajectory obtained from the sensor design problem. While the sensor scheduling problem is NP-hard, the proposed framework circumvents this computational complexity by decomposing this problem into a convex sensor design problem and a covariance tracking problem. We provide theoretical justification and a sub-optimality bound for the proposed method using dynamic programming. The proposed method is validated over several experiments portraying the efficacy of the framework.
△ Less
Submitted 17 October, 2021;
originally announced October 2021.
-
On the Importance of Trust in Next-Generation Networked CPS Systems: An AI Perspective
Authors:
Anousheh Gholami,
Nariman Torkzaban,
John S. Baras
Abstract:
With the increasing scale, complexity, and heterogeneity of the next generation networked systems, seamless control, management, and security of such systems becomes increasingly challenging. Many diverse applications have driven interest in networked systems, including large-scale distributed learning, multi-agent optimization, 5G service provisioning, and network slicing, etc. In this paper, we…
▽ More
With the increasing scale, complexity, and heterogeneity of the next generation networked systems, seamless control, management, and security of such systems becomes increasingly challenging. Many diverse applications have driven interest in networked systems, including large-scale distributed learning, multi-agent optimization, 5G service provisioning, and network slicing, etc. In this paper, we propose trust as a measure to evaluate the status of network agents and improve the decision-making process. We interpret trust as a relation among entities that participate in various protocols. Trust relations are based on evidence created by the interactions of entities within a protocol and may be a composite of multiple metrics such as availability, reliability, resilience, etc. depending on application context. We first elaborate on the importance of trust as a metric and then present a mathematical framework for trust computation and aggregation within a network. Then we show in practice, how trust can be integrated into network decision-making processes by presenting two examples. In the first example, we show how utilizing the trust evidence can improve the performance and the security of Federated Learning. Second, we show how a 5G network resource provisioning framework can be improved when augmented with a trust-aware decision-making scheme. We verify the validity of our trust-based approach through simulations. Finally, we explain the challenges associated with aggregating the trust evidence and briefly explain our ideas to tackle them.
△ Less
Submitted 15 April, 2021;
originally announced April 2021.
-
Value of information in networked control systems subject to delay
Authors:
Siyi Wang,
Qingchen Liu,
Precious Ugo Abara,
John S. Baras,
Sandra Hirche
Abstract:
In this paper, we study the trade-off between the transmission cost and the control performance of the multi-loop networked control system subject to network-induced delay. Within the linear-quadratic-Gaussian (LQG) framework, the joint design of control policy and networking strategy is decomposed into separation optimization problems. Based on the trade-off analysis, a scalable, delay-dependent…
▽ More
In this paper, we study the trade-off between the transmission cost and the control performance of the multi-loop networked control system subject to network-induced delay. Within the linear-quadratic-Gaussian (LQG) framework, the joint design of control policy and networking strategy is decomposed into separation optimization problems. Based on the trade-off analysis, a scalable, delay-dependent Value-of-Information (VoI) based scheduling policy is constructed to quantify the value of transmitting the data packet, and enables the decision-makers embedded in subsystems to determine the transmission policy. The proposed scalable VoI inherits the task criticality of the previous VoI metric meanwhile is sensitive to the system parameters such as information freshness and network delays. The VoI-based scheduling policy is proved to outperform the periodical triggering policy and existing Age-of-Information (AoI) based policy for network control system under transmission delay. The effectiveness of the constructed VoI with arbitrary network delay is validated through numerical simulations.
△ Less
Submitted 29 December, 2021; v1 submitted 7 April, 2021;
originally announced April 2021.
-
Joint Satellite Gateway Deployment & Controller Placement in Software-Defined 5G-Satellite Integrated Networks
Authors:
Nariman Torkzaban,
John S. Baras
Abstract:
Several challenging optimization problems arise while considering the deployment of the space-air-ground integrated networks (SAGINs), among which the optimal satellite gateway deployment problem is of significant importance. Moreover, with the increasing interest in the software-defined integration of 5G networks and satellites, the existence of an effective scheme for optimal placement of SDN co…
▽ More
Several challenging optimization problems arise while considering the deployment of the space-air-ground integrated networks (SAGINs), among which the optimal satellite gateway deployment problem is of significant importance. Moreover, with the increasing interest in the software-defined integration of 5G networks and satellites, the existence of an effective scheme for optimal placement of SDN controllers is essential. In this paper, we discuss the interrelation between the two problems above and propose suitable methods to solve them under various network design criteria. We first provide a MILP model for solving the joint problem, and then motivate the decomposition of the model into two disjoint MILPs. We then show that the resulting problems can be modeled as the optimization of submodular set functions and can be solved efficiently with provable optimality gaps.
△ Less
Submitted 19 March, 2021; v1 submitted 15 March, 2021;
originally announced March 2021.
-
Semi-linear Poisson-mediated Flocking in a Cucker-Smale Model
Authors:
Christos N. Mavridis,
Amoolya Tirumalai,
John S. Baras,
Ion Matei
Abstract:
We propose a family of compactly supported parametric interaction functions in the general Cucker-Smale flocking dynamics such that the mean-field macroscopic system of mass and momentum balance equations with non-local dam** terms can be converted from a system of partial integro-differential equations to an augmented system of partial differential equations in a compact set. We treat the inter…
▽ More
We propose a family of compactly supported parametric interaction functions in the general Cucker-Smale flocking dynamics such that the mean-field macroscopic system of mass and momentum balance equations with non-local dam** terms can be converted from a system of partial integro-differential equations to an augmented system of partial differential equations in a compact set. We treat the interaction functions as Green's functions for an operator corresponding to a semi-linear Poisson equation and compute the density and momentum in a translating reference frame, i.e. one that is taken in reference to the flock's centroid. This allows us to consider the dynamics in a fixed, flock-centered compact set without loss of generality. We approach the computation of the non-local dam** using the standard finite difference treatment of the chosen differential operator, resulting in a tridiagonal system which can be solved quickly.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
Event-triggered Feedback Control for Signal Temporal Logic Tasks
Authors:
Lars Lindemann,
Dipankar Maity,
John S. Baras,
Dimos V. Dimarogonas
Abstract:
A framework for the event-triggered control synthesis under signal temporal logic (STL) tasks is proposed. In our previous work, a continuous-time feedback control law was designed, using the prescribed performance control technique, to satisfy STL tasks. We replace this continuous-time feedback control law by an event-triggered controller. The event-triggering mechanism is based on a maximum trig…
▽ More
A framework for the event-triggered control synthesis under signal temporal logic (STL) tasks is proposed. In our previous work, a continuous-time feedback control law was designed, using the prescribed performance control technique, to satisfy STL tasks. We replace this continuous-time feedback control law by an event-triggered controller. The event-triggering mechanism is based on a maximum triggering interval and on a norm bound on the difference between the value of the current state and the value of the state at the last triggering instance. Simulations of a multi-agent system quantitatively show the efficacy of using an event-triggered controller to reduce communication and computation efforts.
△ Less
Submitted 25 November, 2020;
originally announced November 2020.
-
Joint Mobility-Aware UAV Placement and Routing in Multi-Hop UAV Relaying Systems
Authors:
Anousheh Gholami,
Nariman Torkzaban,
John S. Baras,
Chrysa Papagianni
Abstract:
Unmanned Aerial Vehicles (UAVs) have been extensively utilized to provide wireless connectivity in rural and under-developed areas, enhance network capacity and provide support for peaks or unexpected surges in user demand, mainly due to their fast deployment, cost-efficiency and superior communication performance resulting from Line of Sight (LoS)-dominated wireless channels. In order to exploit…
▽ More
Unmanned Aerial Vehicles (UAVs) have been extensively utilized to provide wireless connectivity in rural and under-developed areas, enhance network capacity and provide support for peaks or unexpected surges in user demand, mainly due to their fast deployment, cost-efficiency and superior communication performance resulting from Line of Sight (LoS)-dominated wireless channels. In order to exploit the benefits of UAVs as base stations or relays in a mobile network, a major challenge is to determine the optimal UAV placement and relocation strategy with respect to the mobility and traffic patterns of the ground network nodes. Moreover, considering that the UAVs form a multi-hop aerial network, capacity and connectivity constraints have significant impacts on the end-to-end network performance. To this end, we formulate the joint UAV placement and routing problem as a Mixed Integer Linear Program (MILP) and propose an approximation that leads to a LP rounding algorithm and achieves a balance between time-complexity and optimality.
△ Less
Submitted 30 September, 2020;
originally announced September 2020.
-
Trust-Aware Service Function Chain Embedding: A Path-Based Approach
Authors:
Nariman Torkzaban,
John S. Baras
Abstract:
With the emergence of network function virtualization (NFV), and software-defined networking (SDN), the realization and implementation of service function chains (SFCs) have become much easier. An SFC is an ordered set of interconnected virtual network functions (VNFs). NFV allows for decoupling the network functions from proprietary hardware realizing a software-based implementation of VNFs on co…
▽ More
With the emergence of network function virtualization (NFV), and software-defined networking (SDN), the realization and implementation of service function chains (SFCs) have become much easier. An SFC is an ordered set of interconnected virtual network functions (VNFs). NFV allows for decoupling the network functions from proprietary hardware realizing a software-based implementation of VNFs on commodity hardware and SDN decouples the network control from its forwarding logic allowing for a more flexible and programmable traffic routing among the VNFs. The SFC embedding problem (i.e. placement of SFCs on a shared substrate and establishing the corresponding traffic routes between the VNFs), has been extensively studied in the literature. In this paper, we extend a previous work on trust-aware service chain embedding with generalizing the role of trust by incorporating the trustworthiness of the service network links and substrate network paths into the SFC embedding decision process. We first introduce and formulate the path-based trust-aware service chain embedding problem as a mixed integer-linear program (MILP), and then provide an approximate model-based on selecting k-shortest candidate substrate paths for hosting each virtual link, to reduce the complexity of the model. We validate the performance of our methods through simulations and conduct a discussion on evaluating the methods and some operation trade-offs.
△ Less
Submitted 5 October, 2020; v1 submitted 15 September, 2020;
originally announced September 2020.
-
Delay-sensitive Joint Optimal Control and Resource Management in Multi-loop Networked Control Systems
Authors:
Mohammad H. Mamduhi,
Dipankar Maity,
Sandra Hirche,
John S. Baras,
Karl H. Johansson
Abstract:
In the operation of networked control systems, where multiple processes share a resource-limited and time-varying cost-sensitive network, communication delay is inevitable and primarily influenced by, first, the control systems deploying intermittent sensor sampling to reduce the communication cost by restricting non-urgent transmissions, and second, the network performing resource management to m…
▽ More
In the operation of networked control systems, where multiple processes share a resource-limited and time-varying cost-sensitive network, communication delay is inevitable and primarily influenced by, first, the control systems deploying intermittent sensor sampling to reduce the communication cost by restricting non-urgent transmissions, and second, the network performing resource management to minimize excessive traffic and eventually data loss. In a heterogeneous scenario, where control systems may tolerate only specific levels of sensor-to-controller latency, delay sensitivities need to be considered in the design of control and network policies to achieve the desired performance guarantees. We propose a cross-layer optimal co-design of control, sampling and resource management policies for an NCS consisting of multiple stochastic linear time-invariant systems which close their sensor-to-controller loops over a shared network. Aligned with advanced communication technology, we assume that the network offers a range of latency-varying transmission services for given prices. Local samplers decide either to pay higher cost to access a low-latency channel, or to delay sending a state sample at a reduced price. A resource manager residing in the network data-link layer arbitrates channel access and re-allocates resources if link capacities are exceeded. The performance of the local closed-loop systems is measured by a combination of linear-quadratic Gaussian cost and a suitable communication cost, and the overall objective is to minimize a defined social cost by all three policy makers. We derive optimal control, sampling and resource allocation policies under different cross-layer awareness models, including constant and time-varying parameters, and show that higher awareness generally leads to performance enhancement at the expense of higher computational complexity.
△ Less
Submitted 15 July, 2020;
originally announced July 2020.
-
Collaborative Beamforming Under Localization Errors: A Discrete Optimization Approach
Authors:
Erfaun Noorani,
Yagiz Savas,
Alec Koppel,
John Baras,
Ufuk Topcu,
Brian M. Sadler
Abstract:
We consider a network of agents that locate themselves in an environment through sensor measurements and aim to transmit a message signal to a base station via collaborative beamforming. The agents' sensor measurements result in localization errors, which degrade the quality of service at the base station due to unknown phase offsets that arise in the agents' communication channels. Assuming that…
▽ More
We consider a network of agents that locate themselves in an environment through sensor measurements and aim to transmit a message signal to a base station via collaborative beamforming. The agents' sensor measurements result in localization errors, which degrade the quality of service at the base station due to unknown phase offsets that arise in the agents' communication channels. Assuming that each agent's localization error follows a Gaussian distribution, we study the problem of forming a reliable communication link between the agents and the base station despite the localization errors. In particular, we formulate a discrete optimization problem to choose only a subset of agents to transmit the message signal so that the variance of the signal-to-noise ratio (SNR) received by the base station is minimized while the expected SNR exceeds a desired threshold. When the variances of the localization errors are below a certain threshold characterized in terms of the carrier frequency, we show that greedy algorithms can be used to globally minimize the variance of the received SNR. On the other hand, when some agents have localization errors with large variances, we show that the variance of the received SNR can be locally minimized by exploiting the supermodularity of the mean and variance of the received SNR. In numerical simulations, we demonstrate that the proposed algorithms have the potential to synthesize beamformers orders of magnitude faster than convex optimization-based approaches while achieving comparable performances using less number of agents.
△ Less
Submitted 17 March, 2021; v1 submitted 27 March, 2020;
originally announced March 2020.
-
Order Effects of Measurements in Multi-Agent Hypothesis Testing
Authors:
Aneesh Raghavan,
John S. Baras
Abstract:
In multi-agent systems, agents observe data, and use them to make inferences and take actions. As a result sensing and control naturally interfere, more so from a real-time perspective. A natural consequence is that in multi-agent systems there are propositions based on the set of observed events that might not be simultaneously verifiable, which leads to the need for probability structures that a…
▽ More
In multi-agent systems, agents observe data, and use them to make inferences and take actions. As a result sensing and control naturally interfere, more so from a real-time perspective. A natural consequence is that in multi-agent systems there are propositions based on the set of observed events that might not be simultaneously verifiable, which leads to the need for probability structures that allow such \textit{incompatible events}. We revisit the structure of events in a multi-agent system and we introduce the necessary new models that incorporate such incompatible events in the formalism. These models are essential for building non-commutative probability models, which are different than the classical models based on the Kolmogorov construction. From this perspective, we revisit the concepts of \textit{event-state-operation structure} and the needed \textit{relationship of incompatibility} from the literature and use them as a tool to study the needed new algebraic structure of the set of events. We present an example from multi-agent hypothesis testing where the set of events does not form a Boolean algebra, but forms an ortholattice. A possible construction of a `noncommutative probability space', accounting for \textit{incompatible events} is discussed. We formulate and solve the binary hypothesis testing problem in the noncommutative probability space. We illustrate the occurrence of `order effects' in the multi-agent hypothesis testing problem by computing the minimum probability of error that can be achieved with different orders of measurements.
△ Less
Submitted 11 November, 2020; v1 submitted 25 March, 2020;
originally announced March 2020.
-
Cooperative Hypothesis Testing by Two Observers with Asymmetric Information
Authors:
Aneesh Raghavan,
John S. Baras
Abstract:
In this paper, we consider the binary hypothesis testing problem with two observers. There are two possible states of nature (or hypotheses). Observations are collected by two observers. The observations are statistically related to the true state of nature. Given the observations, the objective of both observers is to find out what is the true state of nature. We present four different approaches…
▽ More
In this paper, we consider the binary hypothesis testing problem with two observers. There are two possible states of nature (or hypotheses). Observations are collected by two observers. The observations are statistically related to the true state of nature. Given the observations, the objective of both observers is to find out what is the true state of nature. We present four different approaches to address the problem. In the first (centralized) approach, the observations collected by both observers are sent to a central coordinator where hypothesis testing is performed. In the second approach, each observer performs hypothesis testing based on locally collected observations. Then they exchange binary information to arrive at a consensus. In the third approach, each observer constructs an aggregated probability space based on the observations collected by it and the decision it receives from the alternate observer and performs hypothesis testing in the new probability space. In this approach also they exchange binary information to arrive at consensus. In the fourth approach, if observations collected by the observers are independent conditioned on the hypothesis we show the construction of the aggregated sample space can be skipped. In this case, the observers exchange real-valued information to achieve consensus. Given the same fixed number of samples, n, n sufficiently large, for the centralized (first) and decentralized (second) approaches, it has been shown that if the observations collected by the observers are independent conditioned on the hypothesis, then the minimum probability that the two observers agree and are wrong in the decentralized approach is upper bounded by the minimum probability of error achieved in the centralized approach.
△ Less
Submitted 25 March, 2020;
originally announced March 2020.
-
Fast, Composable Rescue Mission Planning for UAVs using Metric Temporal Logic
Authors:
Usman A. Fiaz,
John S. Baras
Abstract:
We present a hybrid compositional approach for real-time mission planning for multi-rotor unmanned aerial vehicles (UAVs) in a time critical search and rescue scenario. Starting with a known environment, we specify the mission using Metric Temporal Logic (MTL) and use a hybrid dynamical model to capture the various modes of UAV operation. We then divide the mission into several sub-tasks by exploi…
▽ More
We present a hybrid compositional approach for real-time mission planning for multi-rotor unmanned aerial vehicles (UAVs) in a time critical search and rescue scenario. Starting with a known environment, we specify the mission using Metric Temporal Logic (MTL) and use a hybrid dynamical model to capture the various modes of UAV operation. We then divide the mission into several sub-tasks by exploiting the invariant nature of safety and timing constraints along the way, and the different modes (i.e., dynamics) of the UAV. For each sub-task, we translate the MTL specifications into linear constraints and solve the associated optimal control problem for desired path, using a Mixed Integer Linear Program (MILP) solver. The complete path for the mission is constructed recursively by composing the individual optimal sub-paths. We show by simulations that the resulting suboptimal trajectories satisfy the mission specifications, and the proposed approach leads to significant reduction in computational complexity of the problem, making it possible to implement in real-time. Our proposed method ensures the safety of UAVs at all times and guarantees finite time mission completion. It is also shown that our approach scales up nicely for a large number of UAVs.
△ Less
Submitted 28 September, 2020; v1 submitted 17 December, 2019;
originally announced December 2019.
-
Event-triggered Add-on Safety for Connected and Automated Vehicles Using Road-side Network Infrastructure
Authors:
Mohammad H. Mamduhi,
Ehsan Hashemi,
John S. Baras,
Karl H. Johansson
Abstract:
This paper proposes an event-triggered add-on safety mechanism to adjust the control parameters for timely braking in a networked vehicular system while maintaining maneuverability. Passenger vehicle maneuverability is significantly affected by the combined-slip friction effect, in which larger longitudinal tire slips result in considerable drop in lateral tire forces. This is of higher importance…
▽ More
This paper proposes an event-triggered add-on safety mechanism to adjust the control parameters for timely braking in a networked vehicular system while maintaining maneuverability. Passenger vehicle maneuverability is significantly affected by the combined-slip friction effect, in which larger longitudinal tire slips result in considerable drop in lateral tire forces. This is of higher importance when unexpected dangerous situations occur on the road and immediate actions, such as braking, need to be taken to avoid collision. Harsh braking can lead to high-slip and loss of maneuverability, hence, timely braking is essential to reduce high-slip scenarios. In addition to the vehicles own active safety systems, the proposed event-triggered add-on safety is activated upon being informed about dangers by the road-side infrastructure. The aim is to incorporate the add-on safety feature to adjust the automatic control parameters for smooth and timely braking such that a collision is avoided while vehicle's maneuverability is maintained. We study two different wireless technologies for communication between the infrastructure and the vehicles, the Long-Term Evolution (LTE) and the fifth generation (5G) schemes. The framework is validated through high-fidelity software simulations and the advantages of including the add-on feature to augment the safety margins for each communication technology is evaluated.
△ Less
Submitted 21 November, 2019;
originally announced November 2019.
-
Drone-Assisted Communications for Remote Areas and Disaster Relief
Authors:
Anousheh Gholami,
Usman A. Fiaz,
John S. Baras
Abstract:
We explore an end-to-end (including access and backhaul links) UAV-assisted wireless communication system, considering both uplink and downlink traffics, with the goal of supporting demand of the Ground Users (GUs) using the minimum number of UAVs. Moreover, in order to extend the operational (flight) time of UAVs, we exploit an energy-aware routing scheme. Our intention is to design and analyze t…
▽ More
We explore an end-to-end (including access and backhaul links) UAV-assisted wireless communication system, considering both uplink and downlink traffics, with the goal of supporting demand of the Ground Users (GUs) using the minimum number of UAVs. Moreover, in order to extend the operational (flight) time of UAVs, we exploit an energy-aware routing scheme. Our intention is to design and analyze the access and backhaul connectivity of a drone-assisted communication network for remote and crowded areas and disaster relief, while minimizing the resources required i.e., the number of UAVs.
△ Less
Submitted 4 September, 2019;
originally announced September 2019.
-
A Hybrid Compositional Approach to Optimal Mission Planning for Multi-rotor UAVs using Metric Temporal Logic
Authors:
Usman A. Fiaz,
John S. Baras
Abstract:
This paper investigates a hybrid compositional approach to optimal mission planning for multi-rotor Unmanned Aerial Vehicles (UAVs). We consider a time critical search and rescue scenario with two quadrotors in a constrained environment. Metric Temporal Logic (MTL) is used to formally describe the task specifications. In order to capture the various modes of UAV operation, we utilize a hybrid mode…
▽ More
This paper investigates a hybrid compositional approach to optimal mission planning for multi-rotor Unmanned Aerial Vehicles (UAVs). We consider a time critical search and rescue scenario with two quadrotors in a constrained environment. Metric Temporal Logic (MTL) is used to formally describe the task specifications. In order to capture the various modes of UAV operation, we utilize a hybrid model for the system with linearized dynamics around different operating points. We divide the mission into several sub-tasks by exploiting the invariant nature of various task specifications i.e., the mutual independence of safety and timing constraints along the way, and the different modes (i,e., dynamics) of the robot. For each sub-task, we translate the MTL formulae into linear constraints, and solve the associated optimal control problem for desired path using a Mixed Integer Linear Program (MILP) solver. The complete path is constructed by the composition of individual optimal sub-paths. We show that the resulting trajectory satisfies the task specifications, and the proposed approach leads to significant reduction in computational complexity of the problem, making it possible to implement in real-time.
△ Less
Submitted 19 September, 2019; v1 submitted 8 April, 2019;
originally announced April 2019.
-
Linear Quadratic Games with Costly Measurements
Authors:
Dipankar Maity,
Achilleas Anastasopoulos,
John S. Baras
Abstract:
In this work we consider a stochastic linear quadratic two-player game. The state measurements are observed through a switched noiseless communication link. Each player incurs a finite cost every time the link is established to get measurements. Along with the usual control action, each player is equipped with a switching action to control the communication link. The measurements help to improve t…
▽ More
In this work we consider a stochastic linear quadratic two-player game. The state measurements are observed through a switched noiseless communication link. Each player incurs a finite cost every time the link is established to get measurements. Along with the usual control action, each player is equipped with a switching action to control the communication link. The measurements help to improve the estimate and hence reduce the quadratic cost but at the same time the cost is increased due to switching. We study the subgame perfect equilibrium control and switching strategies for the players. We show that the problem can be solved in a two-step process by solving two dynamic programming problems. The first step corresponds to solving a dynamic programming for the control strategy and the second step solves another dynamic programming for the switching strategy
△ Less
Submitted 20 September, 2017;
originally announced September 2017.
-
Co-active Learning to Adapt Humanoid Movement for Manipulation
Authors:
Ren Mao,
John S. Baras,
Yezhou Yang,
Cornelia Fermuller
Abstract:
In this paper we address the problem of robot movement adaptation under various environmental constraints interactively. Motion primitives are generally adopted to generate target motion from demonstrations. However, their generalization capability is weak while facing novel environments. Additionally, traditional motion generation methods do not consider the versatile constraints from various use…
▽ More
In this paper we address the problem of robot movement adaptation under various environmental constraints interactively. Motion primitives are generally adopted to generate target motion from demonstrations. However, their generalization capability is weak while facing novel environments. Additionally, traditional motion generation methods do not consider the versatile constraints from various users, tasks, and environments. In this work, we propose a co-active learning framework for learning to adapt robot end-effector's movement for manipulation tasks. It is designed to adapt the original imitation trajectories, which are learned from demonstrations, to novel situations with various constraints. The framework also considers user's feedback towards the adapted trajectories, and it learns to adapt movement through human-in-the-loop interactions. The implemented system generalizes trained motion primitives to various situations with different constraints considering user preferences. Experiments on a humanoid platform validate the effectiveness of our approach.
△ Less
Submitted 12 September, 2016;
originally announced September 2016.
-
Timed Automata Approach for Motion Planning Using Metric Interval Temporal Logic
Authors:
Yuchen Zhou,
Dipankar Maity,
John S. Baras
Abstract:
In this paper, we consider the robot motion (or task) planning problem under some given time bounded high level specifications. We use metric interval temporal logic (MITL), a member of the temporal logic family, to represent the task specification and then we provide a constructive way to generate a timed automaton and methods to look for accepting runs on the automaton to find a feasible motion…
▽ More
In this paper, we consider the robot motion (or task) planning problem under some given time bounded high level specifications. We use metric interval temporal logic (MITL), a member of the temporal logic family, to represent the task specification and then we provide a constructive way to generate a timed automaton and methods to look for accepting runs on the automaton to find a feasible motion (or path) sequence for the robot to complete the task.
△ Less
Submitted 28 March, 2016; v1 submitted 27 March, 2016;
originally announced March 2016.
-
Reachable Set Approach to Collision Avoidance for UAVs
Authors:
Yuchen Zhou,
John S. Baras
Abstract:
In this paper, we propose a reachable set based collision avoidance algorithm for unmanned aerial vehicles (UAVs). UAVs have been deployed for agriculture research and management, surveillance and sensor coverage for threat detection and disaster search and rescue operations. It is essential for the aircraft to have on-board collision avoidance capability to guarantee safety. Instead of the tradit…
▽ More
In this paper, we propose a reachable set based collision avoidance algorithm for unmanned aerial vehicles (UAVs). UAVs have been deployed for agriculture research and management, surveillance and sensor coverage for threat detection and disaster search and rescue operations. It is essential for the aircraft to have on-board collision avoidance capability to guarantee safety. Instead of the traditional approach of collision avoidance between trajectories, we propose a collision avoidance scheme based on reachable sets and tubes. We then formulate the problem as a convex optimization problem seeking suitable control constraint sets for participating aircraft. We have applied the approach on a case study of two quadrotors and two fix-wing aircraft collision avoidance scenario.
△ Less
Submitted 26 September, 2016; v1 submitted 3 December, 2015;
originally announced December 2015.
-
Optimal Mission Planner with Timed Temporal Logic Constraints
Authors:
Yuchen Zhou,
Dipankar Maity,
John S. Baras
Abstract:
In this paper, we present an optimization based method for path planning of a mobile robot subject to time bounded temporal constraints, in a dynamic environment. Temporal logic (TL) can address very complex task specification such as safety, coverage, motion sequencing etc. We use metric temporal logic (MTL) to encode the task specifications with timing constraints. We then translate the MTL form…
▽ More
In this paper, we present an optimization based method for path planning of a mobile robot subject to time bounded temporal constraints, in a dynamic environment. Temporal logic (TL) can address very complex task specification such as safety, coverage, motion sequencing etc. We use metric temporal logic (MTL) to encode the task specifications with timing constraints. We then translate the MTL formulae into mixed integer linear constraints and solve the associated optimization problem using a mixed integer linear program solver. This approach is different from the automata based methods which generate a finite abstraction of the environment and dynamics, and use an automata theoretic approach to formally generate a path that satisfies the TL. We have applied our approach on several case studies in complex dynamical environments subjected to timed temporal specifications.
△ Less
Submitted 5 October, 2015;
originally announced October 2015.
-
Emergent Behaviors over Signed Random Dynamical Networks: State-Flip** Model
Authors:
Guodong Shi,
Alexandre Proutiere,
Mikael Johansson,
John S. Baras,
Karl H. Johansson
Abstract:
Recent studies from social, biological, and engineering network systems have drawn attention to the dynamics over signed networks, where each link is associated with a positive/negative sign indicating trustful/mistrustful, activator/inhibitor, or secure/malicious interactions. We study asymptotic dynamical patterns that emerge among a set of nodes that interact in a dynamically evolving signed ra…
▽ More
Recent studies from social, biological, and engineering network systems have drawn attention to the dynamics over signed networks, where each link is associated with a positive/negative sign indicating trustful/mistrustful, activator/inhibitor, or secure/malicious interactions. We study asymptotic dynamical patterns that emerge among a set of nodes that interact in a dynamically evolving signed random network. Node interactions take place at random on a sequence of deterministic signed graphs. Each node receives positive or negative recommendations from its neighbors depending on the sign of the interaction arcs, and updates its state accordingly. Recommendations along a positive arc follow the standard consensus update. As in the work by Altafini, negative recommendations use an update where the sign of the neighbor state is flipped. Nodes may weight positive and negative recommendations differently, and random processes are introduced to model the time-varying attention that nodes pay to these recommendations. Conditions for almost sure convergence and divergence of the node states are established. We show that under this so-called state-flip** model, all links contribute to a consensus of the absolute values of the nodes, even under switching sign patterns and dynamically changing environment. A no-survivor property is established, indicating that every node state diverges almost surely if the maximum network state diverges.
△ Less
Submitted 1 November, 2014;
originally announced November 2014.
-
Selfish Response to Epidemic Propagation
Authors:
George Theodorakopoulos,
Jean-Yves Le Boudec,
John S. Baras
Abstract:
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the trade-off between their perceived risk of being infected and the cost of being protected. The network members can make decisions repeatedly, based on information that they receive about the changing infection level in the…
▽ More
An epidemic spreading in a network calls for a decision on the part of the network members: They should decide whether to protect themselves or not. Their decision depends on the trade-off between their perceived risk of being infected and the cost of being protected. The network members can make decisions repeatedly, based on information that they receive about the changing infection level in the network.
We study the equilibrium states reached by a network whose members increase (resp. decrease) their security deployment when learning that the network infection is widespread (resp. limited). Our main finding is that the equilibrium level of infection increases as the learning rate of the members increases. We confirm this result in three scenarios for the behavior of the members: strictly rational cost minimizers, not strictly rational, and strictly rational but split into two response classes. In the first two cases, we completely characterize the stability and the domains of attraction of the equilibrium points, even though the first case leads to a differential inclusion. We validate our conclusions with simulations on human mobility traces.
△ Less
Submitted 4 October, 2010;
originally announced October 2010.
-
Adaptive sampling for linear state estimation
Authors:
Maben Rabi,
George V. Moustakides,
John S. Baras
Abstract:
When a sensor has continuous measurements but sends limited messages over a data network to a supervisor which estimates the state, the available packet rate fixes the achievable quality of state estimation. When such rate limits turn stringent, the sensor's messaging policy should be designed anew. What are the good causal messaging policies ? What should message packets contain ? What is the low…
▽ More
When a sensor has continuous measurements but sends limited messages over a data network to a supervisor which estimates the state, the available packet rate fixes the achievable quality of state estimation. When such rate limits turn stringent, the sensor's messaging policy should be designed anew. What are the good causal messaging policies ? What should message packets contain ? What is the lowest possible distortion in a causal estimate at the supervisor ? Is Delta sampling better than periodic sampling ? We answer these questions under an idealized model of the network and the assumption of perfect measurements at the sensor. For a scalar, linear diffusion process, we study the problem of choosing the causal sampling times that will give the lowest aggregate squared error distortion. We stick to finite-horizons and impose a hard upper bound on the number of allowed samples. We cast the design as a problem of choosing an optimal sequence of stop** times. We reduce this to a nested sequence of problems each asking for a single optimal stop** time. Under an unproven but natural assumption about the least-square estimate at the supervisor, each of these single stop** problems are of standard form. The optimal stop** times are random times when the estimation error exceeds designed envelopes. For the case where the state is a Brownian motion, we give analytically: the shape of the optimal sampling envelopes, the shape of the envelopes under optimal Delta sampling, and their performances. Surprisingly, we find that Delta sampling performs badly. Hence, when the rate constraint is a hard limit on the number of samples over a finite horizon, we should should not use Delta sampling.
△ Less
Submitted 20 July, 2011; v1 submitted 28 April, 2009;
originally announced April 2009.