-
Hear Me, See Me, Understand Me: Audio-Visual Autism Behavior Recognition
Authors:
Shijian Deng,
Erin E. Kosloski,
Siddhi Patel,
Zeke A. Barnett,
Yiyang Nan,
Alexander Kaplan,
Sisira Aarukapalli,
William T. Doan,
Matthew Wang,
Harsh Singh,
Pamela R. Rollins,
Yapeng Tian
Abstract:
In this article, we introduce a novel problem of audio-visual autism behavior recognition, which includes social behavior recognition, an essential aspect previously omitted in AI-assisted autism screening research. We define the task at hand as one that is audio-visual autism behavior recognition, which uses audio and visual cues, including any speech present in the audio, to recognize autism-rel…
▽ More
In this article, we introduce a novel problem of audio-visual autism behavior recognition, which includes social behavior recognition, an essential aspect previously omitted in AI-assisted autism screening research. We define the task at hand as one that is audio-visual autism behavior recognition, which uses audio and visual cues, including any speech present in the audio, to recognize autism-related behaviors. To facilitate this new research direction, we collected an audio-visual autism spectrum dataset (AV-ASD), currently the largest video dataset for autism screening using a behavioral approach. It covers an extensive range of autism-associated behaviors, including those related to social communication and interaction. To pave the way for further research on this new problem, we intensively explored leveraging foundation models and multimodal large language models across different modalities. Our experiments on the AV-ASD dataset demonstrate that integrating audio, visual, and speech modalities significantly enhances the performance in autism behavior recognition. Additionally, we explored the use of a post-hoc to ad-hoc pipeline in a multimodal large language model to investigate its potential to augment the model's explanatory capability during autism behavior recognition. We will release our dataset, code, and pre-trained models.
△ Less
Submitted 22 March, 2024;
originally announced June 2024.
-
RSCNet: Dynamic CSI Compression for Cloud-based WiFi Sensing
Authors:
Borna Barahimi,
Hakam Singh,
Hina Tabassum,
Omer Waqar,
Mohammad Omer
Abstract:
WiFi-enabled Internet-of-Things (IoT) devices are evolving from mere communication devices to sensing instruments, leveraging Channel State Information (CSI) extraction capabilities. Nevertheless, resource-constrained IoT devices and the intricacies of deep neural networks necessitate transmitting CSI to cloud servers for sensing. Although feasible, this leads to considerable communication overhea…
▽ More
WiFi-enabled Internet-of-Things (IoT) devices are evolving from mere communication devices to sensing instruments, leveraging Channel State Information (CSI) extraction capabilities. Nevertheless, resource-constrained IoT devices and the intricacies of deep neural networks necessitate transmitting CSI to cloud servers for sensing. Although feasible, this leads to considerable communication overhead. In this context, this paper develops a novel Real-time Sensing and Compression Network (RSCNet) which enables sensing with compressed CSI; thereby reducing the communication overheads. RSCNet facilitates optimization across CSI windows composed of a few CSI frames. Once transmitted to cloud servers, it employs Long Short-Term Memory (LSTM) units to harness data from prior windows, thus bolstering both the sensing accuracy and CSI reconstruction. RSCNet adeptly balances the trade-off between CSI compression and sensing precision, thus streamlining real-time cloud-based WiFi sensing with reduced communication costs. Numerical findings demonstrate the gains of RSCNet over the existing benchmarks like SenseFi, showcasing a sensing accuracy of 97.4% with minimal CSI reconstruction error. Numerical results also show a computational analysis of the proposed RSCNet as a function of the number of CSI frames.
△ Less
Submitted 20 May, 2024; v1 submitted 19 January, 2024;
originally announced February 2024.
-
A Diversity Analysis of Safety Metrics Comparing Vehicle Performance in the Lead-Vehicle Interaction Regime
Authors:
Harnarayan Singh,
Bowen Weng,
Sughosh J. Rao,
Devin Elsasser
Abstract:
Vehicle performance metrics analyze data sets consisting of subject vehicle's interactions with other road users in a nominal driving environment and provide certain performance measures as outputs. To the best of the authors' knowledge, the vehicle safety performance metrics research dates back to at least 1967. To date, there still does not exist a community-wide accepted metric or a set of metr…
▽ More
Vehicle performance metrics analyze data sets consisting of subject vehicle's interactions with other road users in a nominal driving environment and provide certain performance measures as outputs. To the best of the authors' knowledge, the vehicle safety performance metrics research dates back to at least 1967. To date, there still does not exist a community-wide accepted metric or a set of metrics for vehicle safety performance assessment and justification. This issue gets further amplified with the evolving interest in Advanced Driver Assistance Systems and Automated Driving Systems. In this paper, the authors seek to perform a unified study that facilitates an improved community-wide understanding of vehicle performance metrics using the lead-vehicle interaction operational design domain as a common means of performance comparison. In particular, the authors study the diversity (including constructive formulation discrepancies and empirical performance differences) among 33 base metrics with up to 51 metric variants (with different choices of hyper-parameters) in the existing literature, published between 1967 and 2022. Two data sets are adopted for the empirical performance diversity analysis, including vehicle trajectories from normal highway driving environment and relatively high-risk incidents with collisions and near-miss cases. The analysis further implies that (i) the conceptual acceptance of a safety metric proposal can be problematic if the assumptions, conditions, and types of outcome assurance are not justified properly, and (ii) the empirical performance justification of an acceptable metric can also be problematic as a dominant consensus is not observed among metrics empirically.
△ Less
Submitted 26 June, 2023;
originally announced June 2023.
-
GiPH: Generalizable Placement Learning for Adaptive Heterogeneous Computing
Authors:
Yi Hu,
Chaoran Zhang,
Edward Andert,
Harshul Singh,
Aviral Shrivastava,
James Laudon,
Yanqi Zhou,
Bob Iannucci,
Carlee Joe-Wong
Abstract:
Careful placement of a computational application within a target device cluster is critical for achieving low application completion time. The problem is challenging due to its NP-hardness and combinatorial nature. In recent years, learning-based approaches have been proposed to learn a placement policy that can be applied to unseen applications, motivated by the problem of placing a neural networ…
▽ More
Careful placement of a computational application within a target device cluster is critical for achieving low application completion time. The problem is challenging due to its NP-hardness and combinatorial nature. In recent years, learning-based approaches have been proposed to learn a placement policy that can be applied to unseen applications, motivated by the problem of placing a neural network across cloud servers. These approaches, however, generally assume the device cluster is fixed, which is not the case in mobile or edge computing settings, where heterogeneous devices move in and out of range for a particular application. We propose a new learning approach called GiPH, which learns policies that generalize to dynamic device clusters via 1) a novel graph representation gpNet that efficiently encodes the information needed for choosing a good placement, and 2) a scalable graph neural network (GNN) that learns a summary of the gpNet information. GiPH turns the placement problem into that of finding a sequence of placement improvements, learning a policy for selecting this sequence that scales to problems of arbitrary size. We evaluate GiPH with a wide range of task graphs and device clusters and show that our learned policy rapidly find good placements for new problem instances. GiPH finds placements with up to 30.5% lower completion times, searching up to 3X faster than other search-based placement policies.
△ Less
Submitted 23 May, 2023;
originally announced May 2023.
-
Inverse Unscented Kalman Filter
Authors:
Himali Singh,
Kumar Vijay Mishra,
Arpan Chattopadhyay
Abstract:
Rapid advances in designing cognitive and counter-adversarial systems have motivated the development of inverse Bayesian filters. In this setting, a cognitive 'adversary' tracks its target of interest via a stochastic framework such as a Kalman filter (KF). The target or 'defender' then employs another inverse stochastic filter to infer the forward filter estimates of the defender computed by the…
▽ More
Rapid advances in designing cognitive and counter-adversarial systems have motivated the development of inverse Bayesian filters. In this setting, a cognitive 'adversary' tracks its target of interest via a stochastic framework such as a Kalman filter (KF). The target or 'defender' then employs another inverse stochastic filter to infer the forward filter estimates of the defender computed by the adversary. For linear systems, the inverse Kalman filter (I-KF) has been recently shown to be effective in these counter-adversarial applications. In the paper, contrary to prior works, we focus on non-linear system dynamics and formulate the inverse unscented KF (I-UKF) to estimate the defender's state based on the unscented transform, or equivalently, statistical linearization technique. We then generalize this framework to unknown systems by proposing reproducing kernel Hilbert space-based UKF (RKHS-UKF) to learn the system dynamics and estimate the state based on its observations. Our theoretical analyses to guarantee the stochastic stability of I-UKF and RKHS-UKF in the mean-squared sense show that, provided the forward filters are stable, the inverse filters are also stable under mild system-level conditions. We show that, despite being a suboptimal filter, our proposed I-UKF is a conservative estimator, i.e., I-UKF's estimated error covariance upper-bounds its true value. Our numerical experiments for several different applications demonstrate the estimation performance of the proposed filters using recursive Cramér-Rao lower bound and non-credibility index (NCI).
△ Less
Submitted 1 May, 2024; v1 submitted 4 April, 2023;
originally announced April 2023.
-
Inverse Cubature and Quadrature Kalman filters
Authors:
Himali Singh,
Kumar Vijay Mishra,
Arpan Chattopadhyay
Abstract:
Recent research in inverse cognition with cognitive radar has led to the development of inverse stochastic filters that are employed by the target to infer the information the cognitive radar may have learned. Prior works addressed this inverse cognition problem by proposing inverse Kalman filter (I-KF) and inverse extended KF (I-EKF), respectively, for linear and non-linear Gaussian state-space m…
▽ More
Recent research in inverse cognition with cognitive radar has led to the development of inverse stochastic filters that are employed by the target to infer the information the cognitive radar may have learned. Prior works addressed this inverse cognition problem by proposing inverse Kalman filter (I-KF) and inverse extended KF (I-EKF), respectively, for linear and non-linear Gaussian state-space models. However, in practice, many counter-adversarial settings involve highly non-linear system models, wherein EKF's linearization often fails. In this paper, we consider the efficient numerical integration techniques to address such non-linearities and, to this end, develop inverse cubature KF (I-CKF), inverse quadrature KF (I-QKF), and inverse cubature-quadrature KF (I-CQKF). For the unknown system model case, we develop reproducing kernel Hilbert space (RKHS)-based CKF. We derive the stochastic stability conditions for the proposed filters in the exponential-mean-squared-boundedness sense and prove the filters' consistency. Numerical experiments demonstrate the estimation accuracy of our I-CKF, I-QKF, and I-CQKF with the recursive Cramér-Rao lower bound as a benchmark.
△ Less
Submitted 19 April, 2024; v1 submitted 17 March, 2023;
originally announced March 2023.
-
Multi-target Range and Angle detection for MIMO-FMCW radar with limited antennas
Authors:
Himali Singh,
Arpan Chattopadhyay
Abstract:
Multiple-input multiple-output (MIMO) radar has several advantages with respect to the traditional radar array systems in terms of performance and flexibility. However, in order to achieve high angular resolution, a MIMO radar requires a large number of transmit and receive antennas, which increases hardware design and computational complexities. Although spatial compressive sensing (CS) has been…
▽ More
Multiple-input multiple-output (MIMO) radar has several advantages with respect to the traditional radar array systems in terms of performance and flexibility. However, in order to achieve high angular resolution, a MIMO radar requires a large number of transmit and receive antennas, which increases hardware design and computational complexities. Although spatial compressive sensing (CS) has been recently considered for a pulsed-waveform MIMO radar with sparse random arrays, such methods for the frequency-modulated continuous wave (FMCW) radar remain largely unexplored. In this context, we propose a novel multi-target localization algorithm in the range-angle domain for a MIMO FMCW radar with a sparse array of randomly placed transmit and receive elements. In particular, we first obtain the targets' range-delays using a discrete Fourier transform (DFT)-based focusing operation. The target angles are then recovered at each detected range using CS-based techniques exploiting the sparsity of the target scene. Our simulation results demonstrate the effectiveness of the proposed algorithm over the classical methods in detecting multiple targets with a sparse array.
△ Less
Submitted 28 February, 2023;
originally announced February 2023.
-
Counter-Adversarial Learning with Inverse Unscented Kalman Filter
Authors:
Himali Singh,
Kumar Vijay Mishra,
Arpan Chattopadhyay
Abstract:
In counter-adversarial systems, to infer the strategy of an intelligent adversarial agent, the defender agent needs to cognitively sense the information that the adversary has gathered about the latter. Prior works on the problem employ linear Gaussian state-space models and solve this inverse cognition problem by designing inverse stochastic filters. However, in practice, counter-adversarial syst…
▽ More
In counter-adversarial systems, to infer the strategy of an intelligent adversarial agent, the defender agent needs to cognitively sense the information that the adversary has gathered about the latter. Prior works on the problem employ linear Gaussian state-space models and solve this inverse cognition problem by designing inverse stochastic filters. However, in practice, counter-adversarial systems are generally highly nonlinear. In this paper, we address this scenario by formulating inverse cognition as a nonlinear Gaussian state-space model, wherein the adversary employs an unscented Kalman filter (UKF) to estimate the defender's state with reduced linearization errors. To estimate the adversary's estimate of the defender, we propose and develop an inverse UKF (IUKF) system. We then derive theoretical guarantees for the stochastic stability of IUKF in the mean-squared boundedness sense. Numerical experiments for multiple practical applications show that the estimation error of IUKF converges and closely follows the recursive Cramér-Rao lower bound.
△ Less
Submitted 24 March, 2023; v1 submitted 1 October, 2022;
originally announced October 2022.
-
Inverse Extended Kalman Filter -- Part II: Highly Non-Linear and Uncertain Systems
Authors:
Himali Singh,
Arpan Chattopadhyay,
Kumar Vijay Mishra
Abstract:
Counter-adversarial system design problems have lately motivated the development of inverse Bayesian filters. For example, inverse Kalman filter (I-KF) has been recently formulated to estimate the adversary's Kalman-filter-tracked estimates and hence, predict the adversary's future steps. The purpose of this paper and the companion paper (Part I) is to address the inverse filtering problem in non-…
▽ More
Counter-adversarial system design problems have lately motivated the development of inverse Bayesian filters. For example, inverse Kalman filter (I-KF) has been recently formulated to estimate the adversary's Kalman-filter-tracked estimates and hence, predict the adversary's future steps. The purpose of this paper and the companion paper (Part I) is to address the inverse filtering problem in non-linear systems by proposing an inverse extended Kalman filter (I-EKF). The companion paper proposed the theory of I-EKF (with and without unknown inputs) and I-KF (with unknown inputs). In this paper, we develop this theory for highly non-linear models, which employ second-order, Gaussian sum, and dithered forward EKFs. In particular, we derive theoretical stability guarantees for the inverse second-order EKF using the bounded non-linearity approach. To address the limitation of the standard I-EKFs that the system model and forward filter are perfectly known to the defender, we propose reproducing kernel Hilbert space-based EKF to learn the unknown system dynamics based on its observations, which can be employed as an inverse filter to infer the adversary's estimate. Numerical experiments demonstrate the state estimation performance of the proposed filters using recursive Cramér-Rao lower bound as a benchmark.
△ Less
Submitted 10 August, 2023; v1 submitted 13 August, 2022;
originally announced August 2022.
-
Prediction of COVID-19 using chest X-ray images
Authors:
Narayana Darapaneni,
Suma Maram,
Harpreet Singh,
Syed Subhani,
Mandeep Kour,
Sathish Nagam,
Anwesh Reddy Paduri
Abstract:
COVID-19, also known as Novel Coronavirus Disease, is a highly contagious disease that first surfaced in China in late 2019. SARS-CoV-2 is a coronavirus that belongs to the vast family of coronaviruses that causes this disease. The sickness originally appeared in Wuhan, China in December 2019 and quickly spread to over 213 nations, becoming a global pandemic. Fever, dry cough, and tiredness are th…
▽ More
COVID-19, also known as Novel Coronavirus Disease, is a highly contagious disease that first surfaced in China in late 2019. SARS-CoV-2 is a coronavirus that belongs to the vast family of coronaviruses that causes this disease. The sickness originally appeared in Wuhan, China in December 2019 and quickly spread to over 213 nations, becoming a global pandemic. Fever, dry cough, and tiredness are the most typical COVID-19 symptoms. Aches, pains, and difficulty breathing are some of the other symptoms that patients may face. The majority of these symptoms are indicators of respiratory infections and lung abnormalities, which radiologists can identify. Chest x-rays of COVID-19 patients seem similar, with patchy and hazy lungs rather than clear and healthy lungs. On x-rays, however, pneumonia and other chronic lung disorders can resemble COVID-19. Trained radiologists must be able to distinguish between COVID-19 and an illness that is less contagious. Our AI algorithm seeks to give doctors a quantitative estimate of the risk of deterioration. So that patients at high risk of deterioration can be triaged and treated efficiently. The method could be particularly useful in pandemic hotspots when screening upon admission is important for allocating limited resources like hospital beds.
△ Less
Submitted 8 April, 2022;
originally announced April 2022.
-
Inverse Extended Kalman Filter -- Part I: Fundamentals
Authors:
Himali Singh,
Arpan Chattopadhyay,
Kumar Vijay Mishra
Abstract:
Recent advances in counter-adversarial systems have garnered significant research attention to inverse filtering from a Bayesian perspective. For example, interest in estimating the adversary's Kalman filter tracked estimate with the purpose of predicting the adversary's future steps has led to recent formulations of inverse Kalman filter (I-KF). In this context of inverse filtering, we address th…
▽ More
Recent advances in counter-adversarial systems have garnered significant research attention to inverse filtering from a Bayesian perspective. For example, interest in estimating the adversary's Kalman filter tracked estimate with the purpose of predicting the adversary's future steps has led to recent formulations of inverse Kalman filter (I-KF). In this context of inverse filtering, we address the key challenges of non-linear process dynamics and unknown input to the forward filter by proposing an inverse extended Kalman filter (I-EKF). The purpose of this paper and the companion paper (Part II) is to develop the theory of I-EKF in detail. In this paper, we assume perfect system model information and derive I-EKF with and without an unknown input when both forward and inverse state-space models are non-linear. In the process, I-KF-with-unknown-input is also obtained. We then provide theoretical stability guarantees using both bounded non-linearity and unknown matrix approaches and prove the I-EKF's consistency. Numerical experiments validate our methods for various proposed inverse filters using the recursive Cramér-Rao lower bound as a benchmark. In the companion paper (Part II), we further generalize these formulations to highly non-linear models and propose reproducing kernel Hilbert space-based EKF to handle incomplete system model information.
△ Less
Submitted 14 August, 2023; v1 submitted 5 January, 2022;
originally announced January 2022.
-
Emergent behavior and neural dynamics in artificial agents tracking turbulent plumes
Authors:
Satpreet Harcharan Singh,
Floris van Breugel,
Rajesh P. N. Rao,
Bingni Wen Brunton
Abstract:
Tracking a turbulent plume to locate its source is a complex control problem because it requires multi-sensory integration and must be robust to intermittent odors, changing wind direction, and variable plume statistics. This task is routinely performed by flying insects, often over long distances, in pursuit of food or mates. Several aspects of this remarkable behavior have been studied in detail…
▽ More
Tracking a turbulent plume to locate its source is a complex control problem because it requires multi-sensory integration and must be robust to intermittent odors, changing wind direction, and variable plume statistics. This task is routinely performed by flying insects, often over long distances, in pursuit of food or mates. Several aspects of this remarkable behavior have been studied in detail in many experimental studies. Here, we take a complementary in silico approach, using artificial agents trained with reinforcement learning to develop an integrated understanding of the behaviors and neural computations that support plume tracking. Specifically, we use deep reinforcement learning (DRL) to train recurrent neural network (RNN) agents to locate the source of simulated turbulent plumes. Interestingly, the agents' emergent behaviors resemble those of flying insects, and the RNNs learn to represent task-relevant variables, such as head direction and time since last odor encounter. Our analyses suggest an intriguing experimentally testable hypothesis for tracking plumes in changing wind direction -- that agents follow local plume shape rather than the current wind direction. While reflexive short-memory behaviors are sufficient for tracking plumes in constant wind, longer timescales of memory are essential for tracking plumes that switch direction. At the level of neural dynamics, the RNNs' population activity is low-dimensional and organized into distinct dynamical structures, with some correspondence to behavioral modules. Our in silico approach provides key intuitions for turbulent plume tracking strategies and motivates future targeted experimental and theoretical developments.
△ Less
Submitted 17 December, 2021; v1 submitted 25 September, 2021;
originally announced September 2021.
-
Tchebichef Transform Domain-based Deep Learning Architecture for Image Super-resolution
Authors:
Ahlad Kumar,
Harsh Vardhan Singh
Abstract:
The recent outbreak of COVID-19 has motivated researchers to contribute in the area of medical imaging using artificial intelligence and deep learning. Super-resolution (SR), in the past few years, has produced remarkable results using deep learning methods. The ability of deep learning methods to learn the non-linear map** from low-resolution (LR) images to their corresponding high-resolution (…
▽ More
The recent outbreak of COVID-19 has motivated researchers to contribute in the area of medical imaging using artificial intelligence and deep learning. Super-resolution (SR), in the past few years, has produced remarkable results using deep learning methods. The ability of deep learning methods to learn the non-linear map** from low-resolution (LR) images to their corresponding high-resolution (HR) images leads to compelling results for SR in diverse areas of research. In this paper, we propose a deep learning based image super-resolution architecture in Tchebichef transform domain. This is achieved by integrating a transform layer into the proposed architecture through a customized Tchebichef convolutional layer ($TCL$). The role of TCL is to convert the LR image from the spatial domain to the orthogonal transform domain using Tchebichef basis functions. The inversion of the aforementioned transformation is achieved using another layer known as the Inverse Tchebichef convolutional Layer (ITCL), which converts back the LR images from the transform domain to the spatial domain. It has been observed that using the Tchebichef transform domain for the task of SR takes the advantage of high and low-frequency representation of images that makes the task of super-resolution simplified. We, further, introduce transfer learning approach to enhance the quality of Covid based medical images. It is shown that our architecture enhances the quality of X-ray and CT images of COVID-19, providing a better image quality that helps in clinical diagnosis. Experimental results obtained using the proposed Tchebichef transform domain super-resolution (TTDSR) architecture provides competitive results when compared with most of the deep learning methods employed using a fewer number of trainable parameters.
△ Less
Submitted 22 February, 2021; v1 submitted 21 February, 2021;
originally announced February 2021.
-
Rapid Classification of Glaucomatous Fundus Images
Authors:
Hardit Singh,
Simarjeet Saini,
Vasudevan Lakshminarayanan
Abstract:
We propose a new method for training convolutional neural networks which integrates reinforcement learning along with supervised learning and use ti for transfer learning for classification of glaucoma from colored fundus images. The training method uses hill climbing techniques via two different climber types, viz "random movment" and "random detection" integrated with supervised learning model t…
▽ More
We propose a new method for training convolutional neural networks which integrates reinforcement learning along with supervised learning and use ti for transfer learning for classification of glaucoma from colored fundus images. The training method uses hill climbing techniques via two different climber types, viz "random movment" and "random detection" integrated with supervised learning model though stochastic gradient descent with momentum (SGDM) model. The model was trained and tested using the Drishti GS and RIM-ONE-r2 datasets having glaucomatous and normal fundus images. The performance metrics for prediction was tested by transfer learning on five CNN architectures, namely GoogLenet, DesnseNet-201, NASNet, VGG-19 and Inception-resnet-v2. A fivefold classification was used for evaluating the perfroamnace and high sensitivities while high maintaining high accuracies were achieved. Of the models tested, the denseNet-201 architecture performed the best in terms of sensitivity and area under the curve (AUC). This method of training allows transfer learning on small datasets and can be applied for tele-ophthalmology applications including training with local datasets.
△ Less
Submitted 8 February, 2021;
originally announced February 2021.
-
A Drone-based Networked System and Methods for Combating Coronavirus Disease (COVID-19) Pandemic
Authors:
Adarsh Kumar,
Kriti Sharma,
Harvinder Singh,
Sagar Gupta Naugriya,
Sukhpal Singh Gill,
Rajkumar Buyya
Abstract:
Coronavirus disease (COVID-19) is an infectious disease caused by a newly discovered coronavirus. It is similar to influenza viruses and raises concerns through alarming levels of spread and severity resulting in an ongoing pandemic worldwide. Within eight months (by August 2020), it infected 24.0 million persons worldwide and over 824 thousand have died. Drones or Unmanned Aerial Vehicles (UAVs)…
▽ More
Coronavirus disease (COVID-19) is an infectious disease caused by a newly discovered coronavirus. It is similar to influenza viruses and raises concerns through alarming levels of spread and severity resulting in an ongoing pandemic worldwide. Within eight months (by August 2020), it infected 24.0 million persons worldwide and over 824 thousand have died. Drones or Unmanned Aerial Vehicles (UAVs) are very helpful in handling the COVID-19 pandemic. This work investigates the drone-based systems, COVID-19 pandemic situations, and proposes an architecture for handling pandemic situations in different scenarios using real-time and simulation-based scenarios. The proposed architecture uses wearable sensors to record the observations in Body Area Networks (BANs) in a push-pull data fetching mechanism. The proposed architecture is found to be useful in remote and highly congested pandemic areas where either the wireless or Internet connectivity is a major issue or chances of COVID-19 spreading are high. It collects and stores the substantial amount of data in a stipulated period and helps to take appropriate action as and when required. In real-time drone-based healthcare system implementation for COVID-19 operations, it is observed that a large area can be covered for sanitization, thermal image collection, and patient identification within a short period (2 KMs within 10 minutes approx.) through aerial route. In the simulation, the same statistics are observed with an addition of collision-resistant strategies working successfully for indoor and outdoor healthcare operations. Further, open challenges are identified and promising research directions are highlighted.
△ Less
Submitted 31 August, 2020; v1 submitted 12 June, 2020;
originally announced June 2020.
-
Dynamic Channel Selection in UAVs through Constellations in the Sky
Authors:
Guillem Reus Muns,
Mithun Diddi,
Hanumant Singh,
Kaushik R. Chowdhury
Abstract:
Wireless communication between an unmanned aerial vehicle (UAV) and the ground base station (BS) is susceptible to adversarial jamming. In such situations, it is important for the UAV to indicate a new channel to the BS. This paper describes a method of creating spatial codes that map the chosen channel to the motion and location of the UAVs in space, wherein the latter physically traverses the sp…
▽ More
Wireless communication between an unmanned aerial vehicle (UAV) and the ground base station (BS) is susceptible to adversarial jamming. In such situations, it is important for the UAV to indicate a new channel to the BS. This paper describes a method of creating spatial codes that map the chosen channel to the motion and location of the UAVs in space, wherein the latter physically traverses the space from a given so called "constellation point'' to another. These points create patterns in the sky, analogous to modulation constellations in classical wireless communications, and are detected at the BS through a millimeter-wave (mmWave) radar sensor. A constellation point represents a distinct n-bit field mapped to a specific channel, allowing simultaneous frequency switching at both ends without any RF transmissions. The main contributions of this paper are: (i) We conduct experimental studies to demonstrate how such constellations may be formed using COTS UAVs and mmWave sensors, given realistic sensing errors and hovering vibrations, (ii) We develop a theoretical framework that maps a desired constellation design to error and band switching time, considering again practical UAV movement limitations, and (iii) We experimentally demonstrate jamming resilient communications and validate system goodput for links formed by UAV-mounted software defined radios.
△ Less
Submitted 11 February, 2020;
originally announced February 2020.
-
Smoother Position-Drift Compensation for Time Domain Passivity Approach based Teleoperation
Authors:
Andre Coelho,
Harsimran Singh,
Tin Muskardin,
Ribin Balachandran,
Konstantin Kondak
Abstract:
Despite being one of the most robust methods in bilateral teleoperation, Time Domain Passivity Approach (TDPA) presents the drawback of accumulating position drift between master and slave devices. The lack of position synchronization poses an obstacle to the performance of teleoperation and may prevent the successful accomplishment of such tasks. Several techniques have been developed in order to…
▽ More
Despite being one of the most robust methods in bilateral teleoperation, Time Domain Passivity Approach (TDPA) presents the drawback of accumulating position drift between master and slave devices. The lack of position synchronization poses an obstacle to the performance of teleoperation and may prevent the successful accomplishment of such tasks. Several techniques have been developed in order to solve the position-drift problem in TDPA-based teleoperation. However, they either present poor transparency by over-conservatively constraining force feedback or add high impulse-like force signals that can be harmful to the hardware and to the human operator. We propose a new approach to compensate position drift in TDPA-based teleoperation in a smoother way, which keeps the forces within the normal range of the teleoperation task while preserving the level of transparency and the robust stability of energy-based TDPA. We also add a way of tuning the compensator to behave in accordance with the task being performed, whether it requires faster or smoother compensation. The feasibility and performance of the method were experimentally validated. Good position tracking and regular-amplitude forces are demonstrated with up to 500 ms round-trip constant and variable delays for hard-wall contacts.
△ Less
Submitted 6 February, 2020;
originally announced February 2020.
-
Whole-Body Bilateral Teleoperation of a Redundant Aerial Manipulator
Authors:
Andre Coelho,
Harsimran Singh,
Konstantin Kondak,
Christian Ott
Abstract:
Attaching a robotic manipulator to a flying base allows for significant improvements in the reachability and versatility of manipulation tasks. In order to explore such systems while taking advantage of human capabilities in terms of perception and cognition, bilateral teleoperation arises as a reasonable solution. However, since most telemanipulation tasks require visual feedback in addition to t…
▽ More
Attaching a robotic manipulator to a flying base allows for significant improvements in the reachability and versatility of manipulation tasks. In order to explore such systems while taking advantage of human capabilities in terms of perception and cognition, bilateral teleoperation arises as a reasonable solution. However, since most telemanipulation tasks require visual feedback in addition to the haptic one, real-time (task-dependent) positioning of a video camera, which is usually attached to the flying base, becomes an additional objective to be fulfilled. Since the flying base is part of the kinematic structure of the robot, if proper care is not taken, moving the video camera could undesirably disturb the end-effector motion. For that reason, the necessity of controlling the base position in the null space of the manipulation task arises. In order to provide the operator with meaningful information about the limits of the allowed motions in the null space, this paper presents a novel haptic concept called Null-Space Wall. In addition, a framework to allow stable bilateral teleoperation of both tasks is presented. Numerical simulation data confirm that the proposed framework is able to keep the system passive while allowing the operator to perform time-delayed telemanipulation and command the base to a task-dependent optimal pose.
△ Less
Submitted 11 February, 2020; v1 submitted 29 January, 2020;
originally announced January 2020.
-
Investigating naturalistic hand movements by behavior mining in long-term video and neural recordings
Authors:
Satpreet H. Singh,
Steven M. Peterson,
Rajesh P. N. Rao,
Bingni W. Brunton
Abstract:
Recent technological advances in brain recording and artificial intelligence are propelling a new paradigm in neuroscience beyond the traditional controlled experiment. Rather than focusing on cued, repeated trials, naturalistic neuroscience studies neural processes underlying spontaneous behaviors performed in unconstrained settings. However, analyzing such unstructured data lacking a priori expe…
▽ More
Recent technological advances in brain recording and artificial intelligence are propelling a new paradigm in neuroscience beyond the traditional controlled experiment. Rather than focusing on cued, repeated trials, naturalistic neuroscience studies neural processes underlying spontaneous behaviors performed in unconstrained settings. However, analyzing such unstructured data lacking a priori experimental design remains a significant challenge, especially when the data is multi-modal and long-term. Here we describe an automated approach for analyzing simultaneously recorded long-term, naturalistic electrocorticography (ECoG) and naturalistic behavior video data. We take a behavior-first approach to analyzing the long-term recordings. Using a combination of computer vision, discrete latent-variable modeling, and string pattern-matching on the behavioral video data, we find and annotate spontaneous human upper-limb movement events. We show results from our approach applied to data collected for 12 human subjects over 7--9 days for each subject. Our pipeline discovers and annotates over 40,000 instances of naturalistic human upper-limb movement events in the behavioral videos. Analysis of the simultaneously recorded brain data reveals neural signatures of movement that corroborate prior findings from traditional controlled experiments. We also prototype a decoder for a movement initiation detection task to demonstrate the efficacy of our pipeline as a source of training data for brain-computer interfacing applications. Our work addresses the unique data analysis challenges in studying naturalistic human behaviors, and contributes methods that may generalize to other neural recording modalities beyond ECoG. We publicly release our curated dataset, providing a resource to study naturalistic neural and behavioral variability at a scale not previously available.
△ Less
Submitted 19 June, 2020; v1 submitted 22 January, 2020;
originally announced January 2020.
-
Multi-DoF Time Domain Passivity Approach Based Drift Compensation for Telemanipulation
Authors:
Andre Coelho,
Christian Ott,
Harsimran Singh,
Fernando Lizarralde,
Konstantin Kondak
Abstract:
When, in addition to stability, position synchronization is also desired in bilateral teleoperation, Time Domain Passivity Approach (TDPA) alone might not be able to fulfill the desired objective. This is due to an undesired effect caused by admittance type passivity controllers, namely position drift. Previous works focused on develo** TDPA-based drift compensation methods to solve this issue.…
▽ More
When, in addition to stability, position synchronization is also desired in bilateral teleoperation, Time Domain Passivity Approach (TDPA) alone might not be able to fulfill the desired objective. This is due to an undesired effect caused by admittance type passivity controllers, namely position drift. Previous works focused on develo** TDPA-based drift compensation methods to solve this issue. It was shown that, in addition to reducing drift, one of the proposed methods was able to keep the force signals within their normal range, guaranteeing the safety of the task. However, no multi-DoF treatment of those approaches has been addressed. In that scope, this paper focuses on providing an extension of previous TDPA-based approaches to multi-DoF Cartesian-space teleoperation. An analysis of the convergence properties of the presented method is also provided. In addition, its applicability to multi-DoF devices is shown through hardware experiments and numerical simulation with round-trip time delays up to 700 ms.
△ Less
Submitted 10 October, 2019; v1 submitted 4 September, 2019;
originally announced September 2019.
-
Sitara: Spectrum Measurement Goes Mobile Through Crowd-sourcing
Authors:
Phillip Smith,
Anh Luong,
Shamik Sarkar,
Harsimran Singh,
Neal Patwari,
Sneha Kasera,
Kurt Derr,
Samuel Ramirez
Abstract:
Software-defined radios (SDRs) are often used in the experimental evaluation of next-generation wireless technologies. While crowd-sourced spectrum monitoring is an important component of future spectrum-agile technologies, there is no clear way to test it in the real world, i.e., with hundreds of users each with an SDR in their pocket participating in RF experiments controlled by, and data upload…
▽ More
Software-defined radios (SDRs) are often used in the experimental evaluation of next-generation wireless technologies. While crowd-sourced spectrum monitoring is an important component of future spectrum-agile technologies, there is no clear way to test it in the real world, i.e., with hundreds of users each with an SDR in their pocket participating in RF experiments controlled by, and data uploaded to, the cloud. Current fully functional SDRs are bulky, with components connected via wires, and last at most hours on a single battery charge. To address the needs of such experiments, we design and develop a compact, portable, untethered, and inexpensive SDR we call Sitara. Our SDR interfaces with a mobile device over Bluetooth 5 and can function standalone or as a client to a central command and control server. The Sitara offers true portability: it operates up to one week on battery power, requires no external wired connections and occupies a footprint smaller than a credit card. It transmits and receives common waveforms, uploads IQ samples or processed receiver data through a mobile device to a server for remote processing and performs spectrum sensing functions. Multiple Sitaras form a distributed system capable of conducting experiments in wireless networking and communication in addition to RF monitoring and sensing activities. In this paper, we describe our design, evaluate our solution, present experimental results from multi-sensor deployments and discuss the value of this system in future experimentation.
△ Less
Submitted 30 May, 2019;
originally announced May 2019.
-
Evaluating Low-Power Wireless Cyber-Physical Systems
Authors:
Dominik Baumann,
Fabian Mager,
Harsoveet Singh,
Marco Zimmerling,
Sebastian Trimpe
Abstract:
Simulation tools and testbeds have been proposed to assess the performance of control designs and wireless protocols in isolation. A cyber-physical system (CPS), however, integrates control with network elements, which must be evaluated together under real-world conditions to assess control performance, stability, and associated costs. We present an approach to evaluate CPS relying on embedded dev…
▽ More
Simulation tools and testbeds have been proposed to assess the performance of control designs and wireless protocols in isolation. A cyber-physical system (CPS), however, integrates control with network elements, which must be evaluated together under real-world conditions to assess control performance, stability, and associated costs. We present an approach to evaluate CPS relying on embedded devices and low-power wireless technology. Using one or multiple inverted pendulums as physical system, our approach supports a spectrum of realistic CPS scenarios that impose different requirements onto the control and networking elements. Moreover, our approach allows one to flexibly combine simulated and real pendulums, promoting adoption, scalability, repeatability, and integration with existing wireless testbed infrastructures. A case study demonstrates implementation, execution, and measurements using the proposed evaluation approach.
△ Less
Submitted 25 April, 2018;
originally announced April 2018.