-
Finsler Multi-Dimensional Scaling: Manifold Learning for Asymmetric Dimensionality Reduction and Embedding
Authors:
Thomas Dagès,
Simon Weber,
Ya-Wei Eileen Lin,
Ronen Talmon,
Daniel Cremers,
Michael Lindenbaum,
Alfred M. Bruckstein,
Ron Kimmel
Abstract:
Dimensionality reduction is a fundamental task that aims to simplify complex data by reducing its feature dimensionality while preserving essential patterns, with core applications in data analysis and visualisation. To preserve the underlying data structure, multi-dimensional scaling (MDS) methods focus on preserving pairwise dissimilarities, such as distances. They optimise the embedding to have…
▽ More
Dimensionality reduction is a fundamental task that aims to simplify complex data by reducing its feature dimensionality while preserving essential patterns, with core applications in data analysis and visualisation. To preserve the underlying data structure, multi-dimensional scaling (MDS) methods focus on preserving pairwise dissimilarities, such as distances. They optimise the embedding to have pairwise distances as close as possible to the data dissimilarities. However, the current standard is limited to embedding data in Riemannian manifolds. Motivated by the lack of asymmetry in the Riemannian metric of the embedding space, this paper extends the MDS problem to a natural asymmetric generalisation of Riemannian manifolds called Finsler manifolds. Inspired by Euclidean space, we define a canonical Finsler space for embedding asymmetric data. Due to its simplicity with respect to geodesics, data representation in this space is both intuitive and simple to analyse. We demonstrate that our generalisation benefits from the same theoretical convergence guarantees. We reveal the effectiveness of our Finsler embedding across various types of non-symmetric data, highlighting its value in applications such as data visualisation, dimensionality reduction, directed graph embedding, and link prediction.
△ Less
Submitted 29 March, 2025; v1 submitted 23 March, 2025;
originally announced March 2025.
-
Metric Convolutions: A Unifying Theory to Adaptive Convolutions
Authors:
Thomas Dagès,
Michael Lindenbaum,
Alfred M. Bruckstein
Abstract:
Standard convolutions are prevalent in image processing and deep learning, but their fixed kernel design limits adaptability. Several deformation strategies of the reference kernel grid have been proposed. Yet, they lack a unified theoretical framework. By returning to a metric perspective for images, now seen as two-dimensional manifolds equipped with notions of local and geodesic distances, eith…
▽ More
Standard convolutions are prevalent in image processing and deep learning, but their fixed kernel design limits adaptability. Several deformation strategies of the reference kernel grid have been proposed. Yet, they lack a unified theoretical framework. By returning to a metric perspective for images, now seen as two-dimensional manifolds equipped with notions of local and geodesic distances, either symmetric (Riemannian metrics) or not (Finsler metrics), we provide a unifying principle: the kernel positions are samples of unit balls of implicit metrics. With this new perspective, we also propose metric convolutions, a novel approach that samples unit balls from explicit signal-dependent metrics, providing interpretable operators with geometric regularisation. This framework, compatible with gradient-based optimisation, can directly replace existing convolutions applied to either input images or deep features of neural networks. Metric convolutions typically require fewer parameters and provide better generalisation. Our approach shows competitive performance in standard denoising and classification tasks.
△ Less
Submitted 8 June, 2024;
originally announced June 2024.
-
Distributed and Decentralized Control and Task Allocation for Flexible Swarms
Authors:
Yigal Koifman,
Ariel Barel,
Alfred M. Bruckstein
Abstract:
This paper introduces a novel bio-mimetic approach for distributed control of robotic swarms, inspired by the collective behaviors of swarms in nature such as schools of fish and flocks of birds. The agents are assumed to have limited sensory perception, lack memory, be Identical, anonymous, and operate without interagent explicit communication. Despite these limitations, we demonstrate that colla…
▽ More
This paper introduces a novel bio-mimetic approach for distributed control of robotic swarms, inspired by the collective behaviors of swarms in nature such as schools of fish and flocks of birds. The agents are assumed to have limited sensory perception, lack memory, be Identical, anonymous, and operate without interagent explicit communication. Despite these limitations, we demonstrate that collaborative exploration and task allocation can be executed by applying simple local rules of interactions between the agents. A comprehensive model comprised of agent, formation, and swarm layers is proposed in this paper, where each layer performs a specific function in shaping the swarm's collective behavior, thereby contributing to the emergence of the anticipated behaviors. We consider four principles combined in the design of the distributed control process: Cohesiveness, Flexibility, Attraction-Repulsion, and Peristaltic Motion. We design the control algorithms as reactive behaviour that enables the swarm to maintain connectivity, adapt to dynamic environments, spread out and cover a region with a size determined by the number of agents, and respond to various local task requirements. We explore some simple broadcast control-based steering methods, that result in inducing "anonymous ad-hoc leaders" among the agents, capable of guiding the swarm towards yet unexplored regions with further tasks. Our analysis is complemented by simulations, validating the efficacy of our algorithms. The experiments with various scenarios showcase the swarm`s capability to self-organize and perform tasks effectively under the proposed framework. The possible implementations include domains that necessitate emergent coordination and control in multi-agent systems, without the need for advanced individual abilities or direct communication.
△ Less
Submitted 22 May, 2024;
originally announced May 2024.
-
Time, Travel, and Energy in the Uniform Dispersion Problem
Authors:
Michael Amir,
Alfred M. Bruckstein
Abstract:
We investigate the algorithmic problem of uniformly dispersing a swarm of robots in an unknown, gridlike environment. In this setting, our goal is to study the relationships between performance metrics and robot capabilities. We introduce a formal model comparing dispersion algorithms based on makespan, traveled distance, energy consumption, sensing, communication, and memory. Using this framework…
▽ More
We investigate the algorithmic problem of uniformly dispersing a swarm of robots in an unknown, gridlike environment. In this setting, our goal is to study the relationships between performance metrics and robot capabilities. We introduce a formal model comparing dispersion algorithms based on makespan, traveled distance, energy consumption, sensing, communication, and memory. Using this framework, we classify uniform dispersion algorithms according to their capability requirements and performance. We prove that while makespan and travel can be minimized in all environments, energy cannot, if the swarm's sensing range is bounded. In contrast, we show that energy can be minimized by ``ant-like'' robots in synchronous settings and asymptotically minimized in asynchronous settings, provided the environment is topologically simply connected, by using our ``Find-Corner Depth-First Search'' (FCDFS) algorithm. Our theoretical and experimental results show that FCDFS significantly outperforms known algorithms. Our findings reveal key limitations in designing swarm robotics systems for unknown environments, emphasizing the role of topology in energy-efficient dispersion.
△ Less
Submitted 3 June, 2025; v1 submitted 30 April, 2024;
originally announced April 2024.
-
Patrolling Grids with a Bit of Memory
Authors:
Michael Amir,
Dmitry Rabinovich,
Alfred M. Bruckstein
Abstract:
This work addresses the challenge of patrolling regular grid graphs of any dimension using a single mobile agent with minimal memory and limited sensing range. We show that it is impossible to patrol some grid graphs with $0$ bits of memory, regardless of sensing range, and give an exact characterization of those grid graphs that can be patrolled with $0$ bits of memory and sensing range $V$. On t…
▽ More
This work addresses the challenge of patrolling regular grid graphs of any dimension using a single mobile agent with minimal memory and limited sensing range. We show that it is impossible to patrol some grid graphs with $0$ bits of memory, regardless of sensing range, and give an exact characterization of those grid graphs that can be patrolled with $0$ bits of memory and sensing range $V$. On the other hand, we show that an algorithm exists using $1$ bit of memory and $V=1$ that patrols any $d$-dimensional grid graph. This result is surprising given that the agent must be able to move in $2d$ distinct directions to patrol, while $1$ bit of memory allows specifying only two directions per sensory input. Our $1$-bit patrolling algorithm handles this by carefully exploiting a small state-space to access all the needed directions while avoiding getting stuck. Overall, our results give concrete evidence that extremely little memory is needed for patrolling highly regular environments like grid graphs compared to arbitrary graphs. The techniques we use, such as partitioning the environment into sensing regions and exploiting distinct coordinates resulting from higher-dimensionality, may be applicable to analyzing the space complexity of patrolling in other types of regular environments as well.
△ Less
Submitted 11 May, 2024; v1 submitted 18 July, 2023;
originally announced July 2023.
-
Exploration of unknown indoor regions by a swarm of energy-constrained drones
Authors:
Ori Rappel,
Joseph Z. Ben-Asher,
Alfred M. Bruckstein
Abstract:
Several distributed algorithms are presented for the exploration of unknown indoor regions by a swarm of flying, energy constrained agents. The agents, which are identical, autonomous, anonymous and oblivious, uniformly cover the region and thus explore it using predefined action rules based on locally sensed information and the energy level of the agents. While flying drones have many advantages…
▽ More
Several distributed algorithms are presented for the exploration of unknown indoor regions by a swarm of flying, energy constrained agents. The agents, which are identical, autonomous, anonymous and oblivious, uniformly cover the region and thus explore it using predefined action rules based on locally sensed information and the energy level of the agents. While flying drones have many advantages in search and rescue scenarios, their main drawback is a high power consumption during flight combined with limited, on-board energy. Furthermore, in these scenarios agent size is severely limited and consequently so are the total weight and capabilities of the agents. The region is modeled as a connected sub-set of a regular grid composed of square cells that the agents enter, over time, via entry points. Some of the agents may settle in unoccupied cells as the exploration progresses. Settled agents conserve energy and become virtual pheromones for the exploration and coverage process, beacons that subsequently aid the remaining, and still exploring, mobile agents. The termination of the coverage process is based on a backward propagating information diffusion scheme. Various algorithmical alternatives are discussed and upper bounds derived and compared to experimental results. Finally, an optimal entry rate that minimizes the total energy consumption is derived for the case of a linear regions.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Spiral Sweeping Search for Smart Evaders
Authors:
Roee M. Francos,
Alfred M. Bruckstein
Abstract:
Consider a given planar circular region, in which there is an unknown number of smart mobile evaders. We wish to detect evaders using a line formation of sweeping agents whose total sensing length is predetermined. We propose procedures for designing spiral sweeping protocols that ensure the successful completion of the task, thus deriving conditions on the sweeping speed of the linear formation a…
▽ More
Consider a given planar circular region, in which there is an unknown number of smart mobile evaders. We wish to detect evaders using a line formation of sweeping agents whose total sensing length is predetermined. We propose procedures for designing spiral sweeping protocols that ensure the successful completion of the task, thus deriving conditions on the sweeping speed of the linear formation and its path. Successful completion of the task implies that evaders with a given limit on their speed cannot escape the sweeping agents. A simpler task for the sweeping formation is the confinement of evaders to a desired region, such as their original domain. The feasibility of completing these tasks depends on geometric and dynamic constraints that impose a lower bound on the speed that the sweeping agents must have. This critical speed is derived to ensure the satisfaction of the confinement task. Increasing the speed above the lower bound enables the sweepers to complete the search task as well. We develop two spiral line formation search processes for smart evaders, that address current limitations in search against smart evaders. Additionally, we present a quantitative and qualitative comparison analysis between the total search time of circular line formation sweep processes and spiral line formation processes. We evaluate the different strategies by using two metrics, total search time and the minimal critical speed required for a successful search.
△ Less
Submitted 14 May, 2023;
originally announced May 2023.
-
Guaranteed Evader Detection in Multi-Agent Search Tasks using Pincer Trajectories
Authors:
Roee M. Francos,
Alfred M. Bruckstein
Abstract:
Assume that inside an initial planar area there are smart mobile evaders attempting to avoid detection by a team of sweeping searching agents. All sweepers detect evaders with fan-shaped sensors, modeling the field of view of real cameras. Detection of all evaders is guaranteed with cooperative sweeping strategies, by setting requirements on sweepers' speed, and by carefully designing their trajec…
▽ More
Assume that inside an initial planar area there are smart mobile evaders attempting to avoid detection by a team of sweeping searching agents. All sweepers detect evaders with fan-shaped sensors, modeling the field of view of real cameras. Detection of all evaders is guaranteed with cooperative sweeping strategies, by setting requirements on sweepers' speed, and by carefully designing their trajectories. Assume the smart evaders have an upper limit on their speed which is a-priori known to the sweeping team. An easier task for the team of sweepers is to confine evaders to the domain in which they are initially located. The sweepers accomplish the confinement task if they move sufficiently fast and detect evaders by applying an appropriate search strategy. Any given search strategy results in a minimal sweeper's speed in order to be able to detect all evaders. The minimal speed guarantees the ability of the sweeping team to confine evaders to their original domain, and if the sweepers move faster they are able to detect all evaders that are present in the region. We present results on the total search time for a novel pincer-movement based search protocol that utilizes complementary trajectories along with adaptive sensor geometries for any even number of pursuers.
△ Less
Submitted 30 April, 2023;
originally announced May 2023.
-
A model is worth tens of thousands of examples
Authors:
Thomas Dagès,
Laurent D. Cohen,
Alfred M. Bruckstein
Abstract:
Traditional signal processing methods relying on mathematical data generation models have been cast aside in favour of deep neural networks, which require vast amounts of data. Since the theoretical sample complexity is nearly impossible to evaluate, these amounts of examples are usually estimated with crude rules of thumb. However, these rules only suggest when the networks should work, but do no…
▽ More
Traditional signal processing methods relying on mathematical data generation models have been cast aside in favour of deep neural networks, which require vast amounts of data. Since the theoretical sample complexity is nearly impossible to evaluate, these amounts of examples are usually estimated with crude rules of thumb. However, these rules only suggest when the networks should work, but do not relate to the traditional methods. In particular, an interesting question is: how much data is required for neural networks to be on par or outperform, if possible, the traditional model-based methods? In this work, we empirically investigate this question in two simple examples, where the data is generated according to precisely defined mathematical models, and where well-understood optimal or state-of-the-art mathematical data-agnostic solutions are known. A first problem is deconvolving one-dimensional Gaussian signals and a second one is estimating a circle's radius and location in random grayscale images of disks. By training various networks, either naive custom designed or well-established ones, with various amounts of training data, we find that networks require tens of thousands of examples in comparison to the traditional methods, whether the networks are trained from scratch or even with transfer-learning or finetuning.
△ Less
Submitted 19 March, 2023;
originally announced March 2023.
-
From Compass and Ruler to Convolution and Nonlinearity: On the Surprising Difficulty of Understanding a Simple CNN Solving a Simple Geometric Estimation Task
Authors:
Thomas Dagès,
Michael Lindenbaum,
Alfred M. Bruckstein
Abstract:
Neural networks are omnipresent, but remain poorly understood. Their increasing complexity and use in critical systems raises the important challenge to full interpretability. We propose to address a simple well-posed learning problem: estimating the radius of a centred pulse in a one-dimensional signal or of a centred disk in two-dimensional images using a simple convolutional neural network. Sur…
▽ More
Neural networks are omnipresent, but remain poorly understood. Their increasing complexity and use in critical systems raises the important challenge to full interpretability. We propose to address a simple well-posed learning problem: estimating the radius of a centred pulse in a one-dimensional signal or of a centred disk in two-dimensional images using a simple convolutional neural network. Surprisingly, understanding what trained networks have learned is difficult and, to some extent, counter-intuitive. However, an in-depth theoretical analysis in the one-dimensional case allows us to comprehend constraints due to the chosen architecture, the role of each filter and of the nonlinear activation function, and every single value taken by the weights of the model. Two fundamental concepts of neural networks arise: the importance of invariance and of the shape of the nonlinear activation functions.
△ Less
Submitted 12 March, 2023;
originally announced March 2023.
-
Defense Against Smart Invaders with Swarms of Sweeping Agents
Authors:
Roee M. Francos,
Alfred M. Bruckstein
Abstract:
The goal of this research is to devise guaranteed defense policies that allow to protect a given region from the entrance of smart mobile invaders by detecting them using a team of defending agents equipped with identical line sensors. By designing cooperative defense strategies that ensure all invaders are detected, conditions on the defenders' speed are derived. Successful accomplishment of the…
▽ More
The goal of this research is to devise guaranteed defense policies that allow to protect a given region from the entrance of smart mobile invaders by detecting them using a team of defending agents equipped with identical line sensors. By designing cooperative defense strategies that ensure all invaders are detected, conditions on the defenders' speed are derived. Successful accomplishment of the defense task implies invaders with a known limit on their speed cannot slip past the defenders and enter the guarded region undetected. The desired outcome of the defense protocols is to defend the area and additionally to expand it as much as possible. Expansion becomes possible if the defenders' speed exceeds a critical speed that is necessary to only defend the initial region. We present results on the total search time, critical speeds and maximal expansion possible for two types of novel pincer-movement defense processes, circular and spiral, for any even number of defenders. The proposed spiral process allows to detect invaders at nearly the lowest theoretically optimal speed, and if this speed is exceeded, it also allows to expand the protected region almost to the maximal area.
△ Less
Submitted 1 December, 2023; v1 submitted 28 October, 2022;
originally announced October 2022.
-
Multi-Agent Distributed and Decentralized Geometric Task Allocation
Authors:
Michael Amir,
Yigal Koifman,
Yakov Bloch,
Ariel Barel,
Alfred M. Bruckstein
Abstract:
We consider the general problem of geometric task allocation, wherein a large, decentralised swarm of simple mobile agents must detect the locations of tasks in the plane and position themselves nearby. The tasks are represented by an a priori unknown demand profile $Φ(x,y)$ that determines how many agents are needed in each location. The agents are autonomous, oblivious and indistinguishable, and…
▽ More
We consider the general problem of geometric task allocation, wherein a large, decentralised swarm of simple mobile agents must detect the locations of tasks in the plane and position themselves nearby. The tasks are represented by an a priori unknown demand profile $Φ(x,y)$ that determines how many agents are needed in each location. The agents are autonomous, oblivious and indistinguishable, and have finite sensing range. They must configure themselves according to $Φ$ using only local information about $Φ$ and about the positions of nearby agents. All agents act according to the same local sensing-based rule of motion, and cannot explicitly communicate nor share information.
We propose an optimization-based approach to the problem which results in attraction-repulsion dynamics. Repulsion encourages agents to spread out and explore the region so as to find the tasks, and attraction causes them to accumulate at task locations. We derive this approach via gradient descent over an appropriate ``error'' functional, and test it extensively through numerical simulations.
The figures in this work are snapshots of simulations that can be viewed online at https://youtu.be/kyUiGYSaaoQ.
△ Less
Submitted 14 October, 2022; v1 submitted 11 October, 2022;
originally announced October 2022.
-
Stigmergy-based, Dual-Layer Coverage of Unknown Indoor Regions
Authors:
Ori Rappel,
Michael Amir,
Alfred M. Bruckstein
Abstract:
We present algorithms for uniformly covering an unknown indoor region with a swarm of simple, anonymous and autonomous mobile agents. The exploration of such regions is made difficult by the lack of a common global reference frame, severe degradation of radio-frequency communication, and numerous ground obstacles. We propose addressing these challenges by using airborne agents, such as Micro Air V…
▽ More
We present algorithms for uniformly covering an unknown indoor region with a swarm of simple, anonymous and autonomous mobile agents. The exploration of such regions is made difficult by the lack of a common global reference frame, severe degradation of radio-frequency communication, and numerous ground obstacles. We propose addressing these challenges by using airborne agents, such as Micro Air Vehicles, in dual capacity, both as mobile explorers and (once they land) as beacons that help other agents navigate the region.
The algorithms we propose are designed for a swarm of simple, identical, ant-like agents with local sensing capabilities. The agents enter the region, which is discretized as a graph, over time from one or more entry points and are tasked with occupying all of its vertices. Unlike many works in this area, we consider the requirement of informing an outside operator with limited information that the coverage mission is complete. Even with this additional requirement we show, both through simulations and mathematical proofs, that the dual role concept results in linear-time termination, while also besting many well-known algorithms in the literature in terms of energy use.
△ Less
Submitted 22 February, 2023; v1 submitted 18 September, 2022;
originally announced September 2022.
-
Exploration and Coverage with Swarms of Settling Agents
Authors:
Ori Rappel,
Joseph Ben-Asher,
Alfred Bruckstein
Abstract:
We consider several algorithms for exploring and filling an unknown, connected region, by simple, airborne agents. The agents are assumed to be identical, autonomous, anonymous and to have a finite amount of memory. The region is modeled as a connected sub-set of a regular grid composed of square cells. The algorithms described herein are suited for Micro Air Vehicles (MAV) since these air vehicle…
▽ More
We consider several algorithms for exploring and filling an unknown, connected region, by simple, airborne agents. The agents are assumed to be identical, autonomous, anonymous and to have a finite amount of memory. The region is modeled as a connected sub-set of a regular grid composed of square cells. The algorithms described herein are suited for Micro Air Vehicles (MAV) since these air vehicles enable unobstructed views of the ground below and can move freely in space at various heights. The agents explore the region by applying various action-rules based on locally acquired information Some of them may settle in unoccupied cells as the exploration progresses. Settled agents become virtual pheromones for the exploration and coverage process, beacons that subsequently aid the remaining, and still exploring, mobile agents. We introduce a backward propagating information diffusion process as a way to implement a deterministic indicator of process termination and guide the mobile agents. For the proposed algorithms, complete covering of the graph in finite time is guaranteed when the size of the region is fixed. Bounds on the coverage times are also derived. Extensive simulation results exhibit good agreement with the theoretical predictions.
△ Less
Submitted 20 September, 2022; v1 submitted 12 September, 2022;
originally announced September 2022.
-
Emerging cooperation on the road by myopic local interactions
Authors:
Dmitry Rabinovich,
Alfred M. Bruckstein
Abstract:
We study a combinatorial problem inspired by the following scenario: fully autonomous vehicles drive on a multi-lane ($m \geq 2$) road. Each vehicle heads to its own destination and is allowed to exit the road only through a single designated off-ramp lane. However, an individual vehicle has a severely limited memory and sensing capabilities, and, moreover, does not communicate with its peers. In…
▽ More
We study a combinatorial problem inspired by the following scenario: fully autonomous vehicles drive on a multi-lane ($m \geq 2$) road. Each vehicle heads to its own destination and is allowed to exit the road only through a single designated off-ramp lane. However, an individual vehicle has a severely limited memory and sensing capabilities, and, moreover, does not communicate with its peers. In this work we present a distributed algorithm that, nonetheless, allows vehicles to get to the desired lane without collisions and in timely manner.
△ Less
Submitted 3 September, 2022; v1 submitted 7 August, 2022;
originally announced August 2022.
-
Optimal Physical Sorting of Mobile Agents
Authors:
Dmitry Rabinovich,
Michael Amir,
Alfred M. Bruckstein
Abstract:
Given a collection of red and blue mobile agents located on two grid rows, we seek to move all the blue agents to the far left side and all the red agents to the far right side, thus \textit{physically sorting} them according to color. The agents all start on the bottom row. They move simultaneously at discrete time steps and must not collide. Our goal is to design a centralized algorithm that con…
▽ More
Given a collection of red and blue mobile agents located on two grid rows, we seek to move all the blue agents to the far left side and all the red agents to the far right side, thus \textit{physically sorting} them according to color. The agents all start on the bottom row. They move simultaneously at discrete time steps and must not collide. Our goal is to design a centralized algorithm that controls the agents so as to sort them in the least number of time steps.
We derive an \textbf{exact} lower bound on the amount of time any algorithm requires to sort a given initial configuration of agents. We find an instance optimal algorithm that provably matches this lower bound, attaining the best possible sorting time for any initial configuration. Surprisingly, we find that whenever the leftmost agent is red and the rightmost agent is blue, a straightforward decentralized and local sensing-based algorithm is at most $1$ time step slower than the centralized instance-optimal algorithm.
△ Less
Submitted 6 September, 2022; v1 submitted 11 November, 2021;
originally announced November 2021.
-
A Bound on the Edge-Flipping Distance between Triangulations (Revisiting the Proof)
Authors:
Thomas Dagès,
Alfred M. Bruckstein
Abstract:
We revisit here a fundamental result on planar triangulations, namely that the flip distance between two triangulations is upper-bounded by the number of proper intersections between their straight-segment edges. We provide a complete and detailed proof of this result in a slightly generalised setting using a case-based analysis that fills several gaps left by previous proofs of the result.
We revisit here a fundamental result on planar triangulations, namely that the flip distance between two triangulations is upper-bounded by the number of proper intersections between their straight-segment edges. We provide a complete and detailed proof of this result in a slightly generalised setting using a case-based analysis that fills several gaps left by previous proofs of the result.
△ Less
Submitted 28 June, 2021;
originally announced June 2021.
-
Pincer-Based vs. Same-Direction Strategies of Search for Smart Evaders by Swarms of Agents
Authors:
Roee M. Francos,
Alfred M. Bruckstein
Abstract:
Suppose in a given planar region, there are smart mobile evaders and we want to detect them using sweeping agents. We assume that the agents have line sensors of equal length. We propose procedures for designing cooperative sweeping processes that ensure successful completion of the task, thereby deriving conditions on the sweeping speed of the agents and their paths. Successful completion of the…
▽ More
Suppose in a given planar region, there are smart mobile evaders and we want to detect them using sweeping agents. We assume that the agents have line sensors of equal length. We propose procedures for designing cooperative sweeping processes that ensure successful completion of the task, thereby deriving conditions on the sweeping speed of the agents and their paths. Successful completion of the task means that evaders with a known limit on their speed cannot escape the sweeping agents. A simpler task for the sweeping swarm is the confinement of the evaders to their initial domain. The feasibility of completing these tasks depends on geometric and dynamic constraints that impose a lower bound on the speed the sweeping agent must have. This critical speed is derived to ensure the satisfaction of the confinement task. Increasing the speed above the lower bound enables the agents to complete the search task as well. We present a quantitative and qualitative comparison analysis between the total search time of same-direction sweep processes and pincer-movement search strategies. We evaluate the different strategies by using two metrics, total search time and the minimal critical speed required for a successful search. We compare two types of pincer-movement search processes, circular and spiral, with their same-direction counterparts, for any even number of sweeping agents. We prove that pincer based strategies provide superior results in all practical scenarios and that the spiral pincer sweep process allows detection of all evaders while sweeping at nearly theoretically optimal speeds.
△ Less
Submitted 15 May, 2022; v1 submitted 14 April, 2021;
originally announced April 2021.
-
Doubly Stochastic Pairwise Interactions for Agreement and Alignment
Authors:
Thomas Dagès,
Alfred M. Bruckstein
Abstract:
Random pairwise encounters often occur in large populations, or groups of mobile agents, and various types of local interactions that happen at encounters account for emergent global phenomena. In particular, in the fields of swarm robotics, sociobiology, and social dynamics, several types of local pairwise interactions were proposed and analysed leading to spatial gathering or clustering and agre…
▽ More
Random pairwise encounters often occur in large populations, or groups of mobile agents, and various types of local interactions that happen at encounters account for emergent global phenomena. In particular, in the fields of swarm robotics, sociobiology, and social dynamics, several types of local pairwise interactions were proposed and analysed leading to spatial gathering or clustering and agreement in teams of robotic agents coordinated motion, in animal herds, or in human societies. We here propose a very simple stochastic interaction at encounters that leads to agreement or geometric alignment in swarms of simple agents, and analyse the process of converging to consensus. Consider a group of agents whose "states" evolve in time by pairwise interactions: the state of an agent is either a real value (a randomly initialised position within an interval) or a vector that is either unconstrained (e.g. the location of the agent in the plane) or constrained to have unit length (e.g. the direction of the agent's motion). The interactions are doubly stochastic, in the sense that, at discrete time steps, pairs of agents are randomly selected and their new states are independently and uniformly set at random in (local) domains or intervals defined by the states of the interacting pair. We show that such processes lead, in finite expected time (measured by the number of interactions that occurred) to agreement in case of unconstrained states and alignment when the states are unit vectors.
△ Less
Submitted 15 March, 2021; v1 submitted 26 December, 2020;
originally announced December 2020.
-
A Discrete Model of Collective Marching on Rings
Authors:
Michael Amir,
Noa Agmon,
Alfred M. Bruckstein
Abstract:
We study the collective motion of autonomous mobile agents on a ringlike environment. The agents' dynamics is inspired by known laboratory experiments on the dynamics of locust swarms. In these experiments, locusts placed at arbitrary locations and initial orientations on a ring-shaped arena are observed to eventually all march in the same direction. In this work we ask whether, and how fast, a si…
▽ More
We study the collective motion of autonomous mobile agents on a ringlike environment. The agents' dynamics is inspired by known laboratory experiments on the dynamics of locust swarms. In these experiments, locusts placed at arbitrary locations and initial orientations on a ring-shaped arena are observed to eventually all march in the same direction. In this work we ask whether, and how fast, a similar phenomenon occurs in a stochastic swarm of simple agents whose goal is to maintain the same direction of motion for as long as possible. The agents are randomly initiated as marching either clockwise or counterclockwise on a wide ring-shaped region, which we model as $k$ "narrow" concentric tracks on a cylinder. Collisions cause agents to change their direction of motion. To avoid this, agents may decide to switch tracks so as to merge with platoons of agents marching in their direction.
We prove that such agents must eventually converge to a local consensus about their direction of motion, meaning that all agents on each narrow track must eventually march in the same direction. We give asymptotic bounds for the expected amount of time it takes for such convergence or "stabilization" to occur, which depends on the number of agents, the length of the tracks, and the number of tracks. We show that when agents also have a small probability of "erratic", random track-jumping behaviour, a global consensus on the direction of motion across all tracks will eventually be reached. Finally, we verify our theoretical findings in numerical simulations.
△ Less
Submitted 30 May, 2022; v1 submitted 9 December, 2020;
originally announced December 2020.
-
Broadcast Guidance of Agents in Deviated Linear Cyclic Pursuit
Authors:
Ilana Segall,
Alfred M. Bruckstein
Abstract:
In this report we show the emergent behavior of a group of agents, ordered from 1 to n, performing deviated, linear, cyclic pursuit, in the presence of a broadcast guidance control. Each agent senses the relative position of its target, i.e. agent i senses the relative position of agent i+1. The broadcast control, a velocity signal, is detected by a random set of agents in the group. We assume the…
▽ More
In this report we show the emergent behavior of a group of agents, ordered from 1 to n, performing deviated, linear, cyclic pursuit, in the presence of a broadcast guidance control. Each agent senses the relative position of its target, i.e. agent i senses the relative position of agent i+1. The broadcast control, a velocity signal, is detected by a random set of agents in the group. We assume the agents to be modeled as single integrators. We show that the emergent behavior of the group is determined by the deviation angle and by the set of agents detecting the guidance control.
△ Less
Submitted 1 November, 2020;
originally announced November 2020.
-
Guidance of Agents in Cyclic Pursuit
Authors:
Ilana Segall,
Alfred Bruckstein
Abstract:
This report studies the emergent behavior of systems of agents performing cyclic pursuit controlled by an external broadcast signal detected by a random set of the agents. Two types of cyclic pursuit are analyzed: 1)linear cyclic pursuit, where each agent senses the relative position of its target or leading agent 2)non-linear cyclic pursuit, where the agents can sense only bearing to their leadin…
▽ More
This report studies the emergent behavior of systems of agents performing cyclic pursuit controlled by an external broadcast signal detected by a random set of the agents. Two types of cyclic pursuit are analyzed: 1)linear cyclic pursuit, where each agent senses the relative position of its target or leading agent 2)non-linear cyclic pursuit, where the agents can sense only bearing to their leading agent and colliding agents merge and continue on the path of the pursued agent (a so-called "bugs" model). Cyclic pursuit is, in both cases, a gathering algorithm, which has been previously analyzed. The novelty of our work is the derivation of emergent behaviours, in both linear and non-linear cyclic pursuit, in the presence of an exogenous broadcast control detected by a random subset of agents. We show that the emergent behavior of the swarm depends on the type of cyclic pursuit. In the linear case, the agents asymptotically align in the desired direction and move with a common speed which is a proportional to the ratio of the number of agents detecting the broadcast control to the total number of agents in the swarm, for any magnitude of input (velocity) signal. In the non-linear case, the agents gather and move with a shared velocity, which equals the input velocity signal, independently of the number of agents detecting the broadcast signal.
△ Less
Submitted 2 July, 2020;
originally announced July 2020.
-
Search for Smart Evaders with Swarms of Sweeping Agents
Authors:
Roee M. Francos,
Alfred M. Bruckstein
Abstract:
Suppose that in a given planar circular region, there are some smart mobile evaders and we would like to find them using sweeping agents. We assume that each agent has a line sensor of length 2r. We propose procedures for designing cooperative sweeping processes that ensure the successful completion of the task, thereby deriving conditions on the sweeping velocity of the agents and their paths. Su…
▽ More
Suppose that in a given planar circular region, there are some smart mobile evaders and we would like to find them using sweeping agents. We assume that each agent has a line sensor of length 2r. We propose procedures for designing cooperative sweeping processes that ensure the successful completion of the task, thereby deriving conditions on the sweeping velocity of the agents and their paths. Successful completion of the task means that evaders with a given limit on their velocity cannot escape the sweeping agents. A simpler task for the sweeping swarm is the confinement of the evaders to their initial domain. The feasibility of completing these tasks depends on geometric and dynamic constraints that impose a lower bound on the velocity that the sweeper swarm must have. This critical velocity is derived to ensure the satisfaction of the confinement task. Increasing the velocity above the lower bound enables the agents to complete the search task as well. We present results on the total search time as a function of the sweeping velocity of the swarm's agents given the initial conditions on the size of the search region and the maximal velocity of the evaders.
△ Less
Submitted 3 May, 2020;
originally announced May 2020.
-
Patch-Based Holographic Image Sensing
Authors:
Alfred Marcel Bruckstein,
Martianus Frederic Ezerman,
Adamas Aqsa Fahreza,
San Ling
Abstract:
Holographic representations of data enable distributed storage with progressive refinement when the stored packets of data are made available in any arbitrary order. In this paper, we propose and test patch-based transform coding holographic sensing of image data. Our proposal is optimized for progressive recovery under random order of retrieval of the stored data. The coding of the image patches…
▽ More
Holographic representations of data enable distributed storage with progressive refinement when the stored packets of data are made available in any arbitrary order. In this paper, we propose and test patch-based transform coding holographic sensing of image data. Our proposal is optimized for progressive recovery under random order of retrieval of the stored data. The coding of the image patches relies on the design of distributed projections ensuring best image recovery, in terms of the $\ell_2$ norm, at each retrieval stage. The performance depends only on the number of data packets that has been retrieved thus far. Several possible options to enhance the quality of the recovery while changing the size and number of data packets are discussed and tested. This leads us to examine several interesting bit-allocation and rate-distortion trade offs, highlighted for a set of natural images with ensemble estimated statistical properties.
△ Less
Submitted 19 December, 2020; v1 submitted 9 February, 2020;
originally announced February 2020.
-
Seeing Things in Random-Dot Videos
Authors:
Thomas Dagès,
Michael Lindenbaum,
Alfred M. Bruckstein
Abstract:
Humans possess an intricate and powerful visual system in order to perceive and understand the environing world. Human perception can effortlessly detect and correctly group features in visual data and can even interpret random-dot videos induced by imaging natural dynamic scenes with highly noisy sensors such as ultrasound imaging. Remarkably, this happens even if perception completely fails when…
▽ More
Humans possess an intricate and powerful visual system in order to perceive and understand the environing world. Human perception can effortlessly detect and correctly group features in visual data and can even interpret random-dot videos induced by imaging natural dynamic scenes with highly noisy sensors such as ultrasound imaging. Remarkably, this happens even if perception completely fails when the same information is presented frame by frame rather than in a video sequence. We study this property of surprising dynamic perception with the first goal of proposing a new detection and spatio-temporal grouping algorithm for such signals when, per frame, the information on objects is both random and sparse and embedded in random noise. The algorithm is based on the succession of temporal integration and spatial statistical tests of unlikeliness, the a contrario framework. The algorithm not only manages to handle such signals but the striking similarity in its performance to the perception by human observers, as witnessed by a series of psychophysical experiments on image and video data, leads us to see in it a simple computational Gestalt model of human perception with only two parameters: the time integration and the visual angle for candidate shapes to be detected.
△ Less
Submitted 29 January, 2020; v1 submitted 28 July, 2019;
originally announced July 2019.
-
Fast Uniform Dispersion of a Crash-prone Swarm
Authors:
Michael Amir,
Alfred M. Bruckstein
Abstract:
We consider the problem of completely covering an unknown discrete environment with a swarm of asynchronous, frequently-crashing autonomous mobile robots. We represent the environment by a discrete graph, and task the robots with occupying every vertex and with constructing an implicit distributed spanning tree of the graph. The robotic agents activate independently at random exponential waiting t…
▽ More
We consider the problem of completely covering an unknown discrete environment with a swarm of asynchronous, frequently-crashing autonomous mobile robots. We represent the environment by a discrete graph, and task the robots with occupying every vertex and with constructing an implicit distributed spanning tree of the graph. The robotic agents activate independently at random exponential waiting times of mean $1$ and enter the graph environment over time from a source location. They grow the environment's coverage by 'settling' at empty locations and aiding other robots' navigation from these locations. The robots are identical and make decisions driven by the same simple and local rule of behaviour. The local rule is based only on the presence of neighbouring robots, and on whether a settled robot points to the current location. Whenever a robot moves, it may crash and disappear from the environment. Each vertex in the environment has limited physical space, so robots frequently obstruct each other.
Our goal is to show that even under conditions of asynchronicity, frequent crashing, and limited physical space, the simple mobile robots complete their mission in linear time asymptotically almost surely, and time to completion degrades gracefully with the frequency of the crashes. Our model and analysis are based on the well-studied "totally asymmetric simple exclusion process" in statistical mechanics.
△ Less
Submitted 3 June, 2020; v1 submitted 1 July, 2019;
originally announced July 2019.
-
Search for Smart Evaders with Sweeping Agents
Authors:
Roee M. Francos,
Alfred M. Bruckstein
Abstract:
Suppose that in a given planar circular region, there are some smart mobile evaders and we would like to find them using sweeping agents. We assume that the sweeping agents are in a line formation whose total length is 2r. We propose procedures for designing a sweeping process that ensures the successful completion of the task, thereby deriving conditions on the sweeping velocity of the linear for…
▽ More
Suppose that in a given planar circular region, there are some smart mobile evaders and we would like to find them using sweeping agents. We assume that the sweeping agents are in a line formation whose total length is 2r. We propose procedures for designing a sweeping process that ensures the successful completion of the task, thereby deriving conditions on the sweeping velocity of the linear formation and its path. Successful completion of the task means that evaders with a given limit on their velocity cannot escape the sweeping agents. A simpler task for the sweeping formation is the confinement of the evaders to their initial domain. The feasibility of completing these tasks depends on geometric and dynamic constraints that impose a lower bound on the velocity that the sweeper line formation must have. This critical velocity is derived to ensure the satisfaction of the confinement task. Increasing the velocity above the lower bound enables the agents to complete the search task as well. We present results on the total search time as a function of the sweeping velocity of the formation given the initial conditions on the size of the search region and the maximal velocity of the evaders.
△ Less
Submitted 10 February, 2020; v1 submitted 10 May, 2019;
originally announced May 2019.
-
Local Interactions for Cohesive Flexible Swarms
Authors:
Rotem Manor,
Ariel Barel,
Alfred M. Bruckstein
Abstract:
Distributed gathering algorithms aim to achieve complete visibility graphs via a "never lose a neighbour" policy. We suggest a method to maintain connected graph topologies, while reducing the number of effective edges in the graph to order n. This allows to achieve different goals and swarming behaviours: the system remains connected but flexible, hence can maneuver in environments that are reple…
▽ More
Distributed gathering algorithms aim to achieve complete visibility graphs via a "never lose a neighbour" policy. We suggest a method to maintain connected graph topologies, while reducing the number of effective edges in the graph to order n. This allows to achieve different goals and swarming behaviours: the system remains connected but flexible, hence can maneuver in environments that are replete with obstacles and narrow passages, etc.
△ Less
Submitted 21 March, 2019;
originally announced March 2019.
-
Minimizing Travel in the Uniform Dispersal Problem for Robotic Sensors
Authors:
Michael Amir,
Alfred M. Bruckstein
Abstract:
The limited energy capacity of individual robotic agents in a swarm often limits the possible cooperative tasks they can perform. In this work, we investigate the problem of covering an unknown connected grid environment (e.g. a maze or connected corridors) with a robotic swarm so as to minimize the maximal number of steps that each member of the swarm makes and their activity time before their wo…
▽ More
The limited energy capacity of individual robotic agents in a swarm often limits the possible cooperative tasks they can perform. In this work, we investigate the problem of covering an unknown connected grid environment (e.g. a maze or connected corridors) with a robotic swarm so as to minimize the maximal number of steps that each member of the swarm makes and their activity time before their work is finished, thereby minimizing the energy requirements. The robots are autonomous, anonymous and identical, with local sensors and finite memory, and possess no communication capabilities. They are assumed to disperse over time from a fixed location, and to move synchronously. The robots are tasked with occupying every cell of the environment, while avoiding collisions.
In the literature such topics are known as \textit{uniform dispersal problems}. The goal of minimizing the number of steps traveled by the robots has previously been studied in this context. Our contribution is a local robotic strategy for simply connected grid environments that, by exploiting their topology, achieves optimal makespan (the amount of time it takes to cover the environment) and minimizes the maximal number of steps taken by the individual robots before their deactivation. The robots succeed in discovering optimal paths to their eventual destinations, and finish the covering process in $2V-1$ time steps, where $V$ is the number of cells in the environment.
△ Less
Submitted 7 March, 2019;
originally announced March 2019.
-
COME TOGETHER: Multi-Agent Geometric Consensus (Gathering, Rendezvous, Clustering, Aggregation)
Authors:
Ariel Barel,
Rotem Manor,
Alfred M. Bruckstein
Abstract:
This report surveys results on distributed systems comprising mobile agents that are identical and anonymous, oblivious and interact solely by adjusting their motion according to the relative location of their neighbours. The agents are assumed capable of sensing the presence of other agents within a given sensing range and able to implement rules of motion based on full or partial information on…
▽ More
This report surveys results on distributed systems comprising mobile agents that are identical and anonymous, oblivious and interact solely by adjusting their motion according to the relative location of their neighbours. The agents are assumed capable of sensing the presence of other agents within a given sensing range and able to implement rules of motion based on full or partial information on the geometric constellation of their neighbouring agents. Eight different problems that cover assumptions of finite vs infinite sensing range, direction and distance vs direction only sensing and discrete vs continuous motion, are analyzed in the context of geometric consensus, clustering or gathering tasks.
△ Less
Submitted 4 February, 2019;
originally announced February 2019.
-
On Steering Swarms
Authors:
Ariel Barel,
Rotem Manor,
Alfred M. Bruckstein
Abstract:
The main contribution of this paper is a novel method allowing an external observer/controller to steer and guide swarms of identical and indistinguishable agents, in spite of the agents' lack of information on absolute location and orientation. Importantly, this is done via simple global broadcast signals, based on the observed average swarm location, with no need to send control signals to any s…
▽ More
The main contribution of this paper is a novel method allowing an external observer/controller to steer and guide swarms of identical and indistinguishable agents, in spite of the agents' lack of information on absolute location and orientation. Importantly, this is done via simple global broadcast signals, based on the observed average swarm location, with no need to send control signals to any specific agent in the swarm.
△ Less
Submitted 1 February, 2019;
originally announced February 2019.
-
Probabilistic Gathering Of Agents With Simple Sensors
Authors:
Ariel Barel,
Thomas Dagès,
Rotem Manor,
Alfred M. Bruckstein
Abstract:
Gathering is a fundamental task for multi-agent systems and the problem has been studied under various assumptions on the sensing capabilities of mobile agents. This paper addresses the problem for a group of agents that are identical and indistinguishable, oblivious, and lack the capacity of direct communication. At the beginning of unit-time intervals, the agents select random headings in the pl…
▽ More
Gathering is a fundamental task for multi-agent systems and the problem has been studied under various assumptions on the sensing capabilities of mobile agents. This paper addresses the problem for a group of agents that are identical and indistinguishable, oblivious, and lack the capacity of direct communication. At the beginning of unit-time intervals, the agents select random headings in the plane and then detect the presence of other agents behind them. Then they move forward only if no agents are detected in their sensing "back half-plane". Two types of motion are considered: when no peers are detected behind them, either the agents perform unit jumps forward, or they start to move with unit speed while continuously sensing their back half-plane, and stop whenever another agent appears there. For the first type of motion extensive empirical evidence suggests that with high probability clustering occurs in finite expected time to a small region with diameter of about the size of the unit jump, while for continuous sensing and motion we can prove gathering in finite expected time if a "blind-zone" is assumed in their sensing half-plane. Relationships between the number of agents or the size of the blind-zone and convergence time are empirically studied and compared to a theoretical upper-bound dependent on these factors.
△ Less
Submitted 13 April, 2020; v1 submitted 1 February, 2019;
originally announced February 2019.
-
Benefiting from Duplicates of Compressed Data: Shift-Based Holographic Compression of Images
Authors:
Yehuda Dar,
Alfred M. Bruckstein
Abstract:
Storage systems often rely on multiple copies of the same compressed data, enabling recovery in case of binary data errors, of course, at the expense of a higher storage cost. In this paper we show that a wiser method of duplication entails great potential benefits for data types tolerating approximate representations, like images and videos. We propose a method to produce a set of distinct compre…
▽ More
Storage systems often rely on multiple copies of the same compressed data, enabling recovery in case of binary data errors, of course, at the expense of a higher storage cost. In this paper we show that a wiser method of duplication entails great potential benefits for data types tolerating approximate representations, like images and videos. We propose a method to produce a set of distinct compressed representations for a given signal, such that any subset of them allows reconstruction of the signal at a quality depending only on the number of compressed representations utilized. Essentially, we implement the holographic representation idea, where all the representations are equally important in refining the reconstruction. Here we propose to exploit the shift sensitivity of common compression processes and generate holographic representations via compression of various shifts of the signal. Two implementations for the idea, based on standard compression methods, are presented: the first is a simple, optimization-free design. The second approach originates in a challenging rate-distortion optimization, mitigated by the alternating direction method of multipliers (ADMM), leading to a process of repeatedly applying standard compression techniques. Evaluation of the approach, in conjunction with the JPEG2000 image compression standard, shows the effectiveness of the optimization in providing compressed holographic representations that, by means of an elementary reconstruction process, enable impressive gains of several dBs in PSNR over exact duplications.
△ Less
Submitted 7 February, 2019; v1 submitted 30 January, 2019;
originally announced January 2019.
-
Erratic Extremism causes Dynamic Consensus (a new model for one-dimensional opinion dynamics)
Authors:
Dmitry Rabinovich,
Alfred M. Bruckstein
Abstract:
A society of agents, with ideological positions, or "opinions" measured by real values ranging from $-\infty$ (the "far left") to $+\infty$ (the "far right"), is considered. At fixed (unit) time intervals agents repeatedly reconsider and change their opinions if and only if they find themselves at the extremes of the range of ideological positions held by members of the society. Extremist agents a…
▽ More
A society of agents, with ideological positions, or "opinions" measured by real values ranging from $-\infty$ (the "far left") to $+\infty$ (the "far right"), is considered. At fixed (unit) time intervals agents repeatedly reconsider and change their opinions if and only if they find themselves at the extremes of the range of ideological positions held by members of the society. Extremist agents are erratic: they become either more radical, and move away from the positions of other agents, with probability $\varepsilon$, or more moderate, and move towards the positions held by peers, with probability $(1 - \varepsilon)$. The change in the opinion of the extremists is one unit on the real line. We prove that the agent positions cluster in time, with all non-extremist agents located within a unit interval. However, the consensus opinion is dynamic. Due to the extremists' erratic behavior the clustered opinion set performs a "sluggish" random walk on the entire range of possible ideological positions (the real line). The inertia of the group, the reluctance of the society's agents to change their consensus opinion, increases with the size of the group. The extremists perform biased random walk excursions to the right and left and, in time, their actions succeed to move the society of agents in random directions. The "far left" agent effectively pushes the group consensus toward the right, while the "far right" agent counter-balances the push and causes the consensus to move toward the left.
We believe that this model, and some of its variations, has the potential to explain the real world swings in societal ideologies that we see around us.
△ Less
Submitted 5 June, 2019; v1 submitted 17 September, 2018;
originally announced September 2018.
-
Holographic Sensing
Authors:
Alfred Marcel Bruckstein,
Martianus Frederic Ezerman,
Adamas Aqsa Fahreza,
San Ling
Abstract:
Holographic representations of data encode information in packets of equal importance that enable progressive recovery. The quality of recovered data improves as more and more packets become available. This progressive recovery of the information is independent of the order in which packets become available. Such representations are ideally suited for distributed storage and for the transmission o…
▽ More
Holographic representations of data encode information in packets of equal importance that enable progressive recovery. The quality of recovered data improves as more and more packets become available. This progressive recovery of the information is independent of the order in which packets become available. Such representations are ideally suited for distributed storage and for the transmission of data packets over networks with unpredictable delays and or erasures.
Several methods for holographic representations of signals and images have been proposed over the years and multiple description information theory also deals with such representations. Surprisingly, however, these methods had not been considered in the classical framework of optimal least-squares estimation theory, until very recently. We develop a least-squares approach to the design of holographic representation for stochastic data vectors, relying on the framework widely used in modeling signals and images.
△ Less
Submitted 28 July, 2018;
originally announced July 2018.
-
Compression for Multiple Reconstructions
Authors:
Yehuda Dar,
Michael Elad,
Alfred M. Bruckstein
Abstract:
In this work we propose a method for optimizing the lossy compression for a network of diverse reconstruction systems. We focus on adapting a standard image compression method to a set of candidate displays, presenting the decompressed signals to viewers. Each display is modeled as a linear operator applied after decompression, and its probability to serve a network user. We formulate a complicate…
▽ More
In this work we propose a method for optimizing the lossy compression for a network of diverse reconstruction systems. We focus on adapting a standard image compression method to a set of candidate displays, presenting the decompressed signals to viewers. Each display is modeled as a linear operator applied after decompression, and its probability to serve a network user. We formulate a complicated operational rate-distortion optimization trading-off the network's expected mean-squared reconstruction error and the compression bit-cost. Using the alternating direction method of multipliers (ADMM) we develop an iterative procedure where the network structure is separated from the compression method, enabling the reliance on standard compression techniques. We present experimental results showing our method to be the best approach for adjusting high bit-rate image compression (using the state-of-the-art HEVC standard) to a set of displays modeled as blur degradations.
△ Less
Submitted 12 February, 2018;
originally announced February 2018.
-
System-Aware Compression
Authors:
Yehuda Dar,
Michael Elad,
Alfred M. Bruckstein
Abstract:
Many information systems employ lossy compression as a crucial intermediate stage among other processing components. While the important distortion is defined by the system's input and output signals, the compression usually ignores the system structure, therefore, leading to an overall sub-optimal rate-distortion performance. In this paper we propose a compression methodology for an operational r…
▽ More
Many information systems employ lossy compression as a crucial intermediate stage among other processing components. While the important distortion is defined by the system's input and output signals, the compression usually ignores the system structure, therefore, leading to an overall sub-optimal rate-distortion performance. In this paper we propose a compression methodology for an operational rate-distortion optimization considering a known system layout, modeled using linear operators and noise. Using the alternating direction method of multipliers (ADMM) technique, we show that the design of the new globally-optimized compression reduces to a standard compression of a "system adjusted" signal. Essentially, the proposed framework leverages standard compression techniques to address practical settings of the noisy source coding problem. We further explain the main ideas of our method by theoretically studying the case of a cyclo-stationary Gaussian signal. We present experimental results for coding of one-dimensional signals and for video compression using the HEVC standard, showing significant gains by the adjustment to an acquisition-rendering system.
△ Less
Submitted 11 May, 2018; v1 submitted 15 January, 2018;
originally announced January 2018.
-
Optimized Pre-Compensating Compression
Authors:
Yehuda Dar,
Michael Elad,
Alfred M. Bruckstein
Abstract:
In imaging systems, following acquisition, an image/video is transmitted or stored and eventually presented to human observers using different and often imperfect display devices. While the resulting quality of the output image may severely be affected by the display, this degradation is usually ignored in the preceding compression. In this paper we model the sub-optimality of the display device a…
▽ More
In imaging systems, following acquisition, an image/video is transmitted or stored and eventually presented to human observers using different and often imperfect display devices. While the resulting quality of the output image may severely be affected by the display, this degradation is usually ignored in the preceding compression. In this paper we model the sub-optimality of the display device as a known degradation operator applied on the decompressed image/video. We assume the use of a standard compression path, and augment it with a suitable pre-processing procedure, providing a compressed signal intended to compensate the degradation without any post-filtering. Our approach originates from an intricate rate-distortion problem, optimizing the modifications to the input image/video for reaching best end-to-end performance. We address this seemingly computationally intractable problem using the alternating direction method of multipliers (ADMM) approach, leading to a procedure in which a standard compression technique is iteratively applied. We demonstrate the proposed method for adjusting HEVC image/video compression to compensate post-decompression visual effects due to a common type of displays. Particularly, we use our method to reduce motion-blur perceived while viewing video on LCD devices. The experiments establish our method as a leading approach for preprocessing high bit-rate compression to counterbalance a post-decompression degradation.
△ Less
Submitted 3 June, 2018; v1 submitted 21 November, 2017;
originally announced November 2017.
-
Restoration by Compression
Authors:
Yehuda Dar,
Michael Elad,
Alfred M. Bruckstein
Abstract:
In this paper we study the topic of signal restoration using complexity regularization, quantifying the compression bit-cost of the signal estimate. While complexity-regularized restoration is an established concept, solid practical methods were suggested only for the Gaussian denoising task, leaving more complicated restoration problems without a generally constructive approach. Here we present p…
▽ More
In this paper we study the topic of signal restoration using complexity regularization, quantifying the compression bit-cost of the signal estimate. While complexity-regularized restoration is an established concept, solid practical methods were suggested only for the Gaussian denoising task, leaving more complicated restoration problems without a generally constructive approach. Here we present practical methods for complexity-regularized restoration of signals, accommodating degradations caused by a known linear operator of an arbitrary form. Our iterative procedure, obtained using the alternating direction method of multipliers (ADMM) approach, addresses the restoration task as a sequence of simpler problems involving L2-regularized estimations and rate-distortion optimizations (considering the squared-error criterion). Further, we replace the rate-distortion optimizations with an arbitrary standardized compression technique and thereby restore the signal by leveraging underlying models designed for compression. Additionally, we propose a shift-invariant complexity regularizer, measuring the bit-cost of all the shifted forms of the estimate, extending our method to use averaging of decompressed outputs gathered from compression of shifted signals. On the theoretical side, we present an analysis of complexity-regularized restoration of a cyclo-stationary Gaussian signal from deterioration by a linear shift-invariant operator and an additive white Gaussian noise. The theory shows that optimal complexity-regularized restoration relies on an elementary restoration filter and compression spreading reconstruction quality unevenly based on the energy distribution of the degradation filter. Nicely, these ideas are realized also in the proposed practical methods. The presented experiments show good results for image deblurring and inpainting using the JPEG2000 and HEVC compression standards.
△ Less
Submitted 23 July, 2018; v1 submitted 14 November, 2017;
originally announced November 2017.
-
Probabilistic Pursuits on Graphs
Authors:
Michael Amir,
Alfred M. Bruckstein
Abstract:
We consider discrete dynamical systems of "ant-like" agents engaged in a sequence of pursuits on a graph environment. The agents emerge one by one at equal time intervals from a source vertex $s$ and pursue each other by greedily attempting to close the distance to their immediate predecessor, the agent that emerged just before them from $s$, until they arrive at the destination point $t$. Such pu…
▽ More
We consider discrete dynamical systems of "ant-like" agents engaged in a sequence of pursuits on a graph environment. The agents emerge one by one at equal time intervals from a source vertex $s$ and pursue each other by greedily attempting to close the distance to their immediate predecessor, the agent that emerged just before them from $s$, until they arrive at the destination point $t$. Such pursuits have been investigated before in the continuous setting and in discrete time when the underlying environment is a regular grid. In both these settings the agents' walks provably converge to a shortest path from $s$ to $t$. Furthermore, assuming a certain natural probability distribution over the move choices of the agents on the grid (in case there are multiple shortest paths between an agent and its predecessor), the walks converge to the uniform distribution over all shortest paths from $s$ to $t$.
We study the evolution of agent walks over a general finite graph environment $G$. Our model is a natural generalization of the pursuit rule proposed for the case of the grid. The main results are as follows. We show that "convergence" to the shortest paths in the sense of previous work extends to all pseudo-modular graphs (i.e. graphs in which every three pairwise intersecting disks have a nonempty intersection), and also to environments obtained by taking graph products, generalizing previous results in two different ways. We show that convergence to the shortest paths is also obtained by chordal graphs, and discuss some further positive and negative results for planar graphs. In the most general case, convergence to the shortest paths is not guaranteed, and the agents may get stuck on sets of recurrent, non-optimal walks from $s$ to $t$. However, we show that the limiting distributions of the agents' walks will always be uniform distributions over some set of walks of equal length.
△ Less
Submitted 31 January, 2019; v1 submitted 23 October, 2017;
originally announced October 2017.
-
Optimal Dynamic Coverage Infrastructure for Large-Scale Fleets of Reconnaissance UAVs
Authors:
Yaniv Altshuler,
Alex Pentland,
Shlomo Bekhor,
Yoram Shiftan,
Alfred Bruckstein
Abstract:
Current state of the art in the field of UAV activation relies solely on human operators for the design and adaptation of the drones' flying routes. Furthermore, this is being done today on an individual level (one vehicle per operators), with some exceptions of a handful of new systems, that are comprised of a small number of self-organizing swarms, manually guided by a human operator.
Drones-b…
▽ More
Current state of the art in the field of UAV activation relies solely on human operators for the design and adaptation of the drones' flying routes. Furthermore, this is being done today on an individual level (one vehicle per operators), with some exceptions of a handful of new systems, that are comprised of a small number of self-organizing swarms, manually guided by a human operator.
Drones-based monitoring is of great importance in variety of civilian domains, such as road safety, homeland security, and even environmental control. In its military aspect, efficiently detecting evading targets by a fleet of unmanned drones has an ever increasing impact on the ability of modern armies to engage in warfare. The latter is true both traditional symmetric conflicts among armies as well as asymmetric ones. Be it a speeding driver, a polluting trailer or a covert convoy, the basic challenge remains the same -- how can its detection probability be maximized using as little number of drones as possible.
In this work we propose a novel approach for the optimization of large scale swarms of reconnaissance drones -- capable of producing on-demand optimal coverage strategies for any given search scenario. Given an estimation cost of the threat's potential damages, as well as types of monitoring drones available and their comparative performance, our proposed method generates an analytically provable strategy, stating the optimal number and types of drones to be deployed, in order to cost-efficiently monitor a pre-defined region for targets maneuvering using a given roads networks.
We demonstrate our model using a unique dataset of the Israeli transportation network, on which different deployment schemes for drones deployment are evaluated.
△ Less
Submitted 17 November, 2016;
originally announced November 2016.
-
On High-Resolution Adaptive Sampling of Deterministic Signals
Authors:
Yehuda Dar,
Alfred M. Bruckstein
Abstract:
In this work we study the topic of high-resolution adaptive sampling of a given deterministic signal and establish a connection with classic approaches to high-rate quantization. Specifically, we formulate solutions for the task of optimal high-resolution sampling, counterparts of well-known results for high-rate quantization. Our results reveal that the optimal high-resolution sampling structure…
▽ More
In this work we study the topic of high-resolution adaptive sampling of a given deterministic signal and establish a connection with classic approaches to high-rate quantization. Specifically, we formulate solutions for the task of optimal high-resolution sampling, counterparts of well-known results for high-rate quantization. Our results reveal that the optimal high-resolution sampling structure is determined by the density of the signal-gradient energy, just as the probability-density-function defines the optimal high-rate quantization form. This paper has three main contributions: the first is establishing a fundamental paradigm bridging the topics of sampling and quantization. The second is a theoretical analysis of nonuniform sampling relevant to the emerging field of high-resolution signal processing. The third is a new practical approach to nonuniform sampling of one-dimensional signals that enables reconstruction based only on the sampling time-points and the signal extrema locations and values. Experiments for signal sampling and coding showed that our method outperforms an optimized tree-structured sampling technique.
△ Less
Submitted 19 April, 2018; v1 submitted 6 November, 2016;
originally announced November 2016.
-
AntPaP: Patrolling and Fair Partitioning of Graphs by A(ge)nts Leaving Pheromone Traces
Authors:
Gidi Elazar,
Alfred M. Bruckstein
Abstract:
A team of identical and oblivious ant-like agents - a(ge)nts - leaving pheromone traces, are programmed to jointly patrol an area modeled as a graph. They perform this task using simple local interactions, while also achieving the important byproduct of partitioning the graph into roughly equal-sized disjoint sub-graphs. Each a(ge)nt begins to operate at an arbitrary initial location, and througho…
▽ More
A team of identical and oblivious ant-like agents - a(ge)nts - leaving pheromone traces, are programmed to jointly patrol an area modeled as a graph. They perform this task using simple local interactions, while also achieving the important byproduct of partitioning the graph into roughly equal-sized disjoint sub-graphs. Each a(ge)nt begins to operate at an arbitrary initial location, and throughout its work does not acquire any information on either the shape or size of the graph, or the number or whereabouts of other a(ge)nts. Graph partitioning occurs spontaneously, as each of the a(ge)nts patrols and expands its own pheromone-marked sub-graph, or region. This graph partitioning algorithm is inspired by molecules hitting the borders of air filled elastic balloons: an a(ge)nt that hits a border edge from the interior of its region more frequently than an external a(ge)nt hits the same edge from an adjacent vertex in the neighboring region, may conquer that adjacent vertex, expanding its region at the expense of the neighbor. Since the rule of patrolling a region ensures that each vertex is visited with a frequency inversely proportional to the size of the region, in terms of vertex count, a smaller region will effectively exert higher "pressure" at its borders, and conquer adjacent vertices from a larger region, thereby increasing the smaller region and shrinking the larger. The algorithm, therefore, tends to equalize the sizes of the regions patrolled, resembling a set of perfectly elastic physical balloons, confined to a closed volume and filled with an equal amount of air. The pheromone based local interactions of agents eventually cause the system to evolve into a partition that is close to balanced rather quickly, and if the graph and the number of a(ge)nts remain unchanged, it is guaranteed that the system settles into a stable and balanced partition.
△ Less
Submitted 16 August, 2016;
originally announced August 2016.
-
Stochastic Broadcast Control of Multi-Agent Swarms
Authors:
Ilana Segall,
Alfred Bruckstein
Abstract:
We present a model for controlling swarms of mobile agents via broadcast control, assumed to be detected by a random set of agents in the swarm. The agents that detect the control signal become ad-hoc leaders of the swarm. The agents are assumed to be velocity controlled, identical, anonymous, memory-less units with limited capabilities of sensing their neighborhood. Each agent is programmed to be…
▽ More
We present a model for controlling swarms of mobile agents via broadcast control, assumed to be detected by a random set of agents in the swarm. The agents that detect the control signal become ad-hoc leaders of the swarm. The agents are assumed to be velocity controlled, identical, anonymous, memory-less units with limited capabilities of sensing their neighborhood. Each agent is programmed to behave according to a linear local gathering process, based on the relative position of all its neighbors. The detected exogenous control, which is a desired velocity vector, is added by the leaders to the local gathering control. The graph induced by the agents adjacency is referred to as the visibility graph. We show that for piece-wise constant system parameters and a connected visibility graph, the swarm asymptotically aligns in each time-interval on a line in the direction of the exogenous control signal, and all the agents move with identical speed. These results hold for two models of pairwise influence in the gathering process, uniform and scaled. The impact of the influence model is mostly evident when the visibility graph is incomplete. These results are conditioned by the preservation of the connectedness of the visibility graph. In the second part of the report we analyze sufficient conditions for preserving the connectedness of the visibility graph. We show that if the visibility graph is complete then certain bounds on the control signal suffice to preserve the completeness of the graph. However, when the graph is incomplete, general conditions, independent of the leaders topology, could not be found.
△ Less
Submitted 17 July, 2016;
originally announced July 2016.
-
Real-Time Depth Refinement for Specular Objects
Authors:
Roy Or - El,
Rom Hershkovitz,
Aaron Wetzler,
Guy Rosman,
Alfred M. Bruckstein,
Ron Kimmel
Abstract:
The introduction of consumer RGB-D scanners set off a major boost in 3D computer vision research. Yet, the precision of existing depth scanners is not accurate enough to recover fine details of a scanned object. While modern shading based depth refinement methods have been proven to work well with Lambertian objects, they break down in the presence of specularities. We present a novel shape from s…
▽ More
The introduction of consumer RGB-D scanners set off a major boost in 3D computer vision research. Yet, the precision of existing depth scanners is not accurate enough to recover fine details of a scanned object. While modern shading based depth refinement methods have been proven to work well with Lambertian objects, they break down in the presence of specularities. We present a novel shape from shading framework that addresses this issue and enhances both diffuse and specular objects' depth profiles. We take advantage of the built-in monochromatic IR projector and IR images of the RGB-D scanners and present a lighting model that accounts for the specular regions in the input image. Using this model, we reconstruct the depth map in real-time. Both quantitative tests and visual evaluations prove that the proposed method produces state of the art depth reconstruction results.
△ Less
Submitted 30 March, 2016; v1 submitted 28 November, 2015;
originally announced November 2015.
-
Continuous Time Gathering of Agents with Limited Visibility and Bearing-Only Sensing
Authors:
Levi-Itzhak Bellaiche,
Alfred Bruckstein
Abstract:
A group of mobile agents, identical, anonymous, and oblivious (memoryless), having the capability to sense only the relative direction (bearing) to neighborhing agents within a finite visibility range, are shown to gather to a meeting point in finite time by applying a very simple rule of motion. The agents' rule of motion is : set your velocity vector to be the sum of the two unit vectors in R^2…
▽ More
A group of mobile agents, identical, anonymous, and oblivious (memoryless), having the capability to sense only the relative direction (bearing) to neighborhing agents within a finite visibility range, are shown to gather to a meeting point in finite time by applying a very simple rule of motion. The agents' rule of motion is : set your velocity vector to be the sum of the two unit vectors in R^2 pointing to your "extremal" neighbours determining the smallest visibility disc sector in which all your visible neighbors reside, provided it spans an angle smaller than pi, otherwise, since you are "surrounded" by visible neighbors, simply stay put (set your velocity to 0). Of course, the initial constellation of agents must have a visibility graph that is connected, and provided this we prove that the agents gather to a common meeting point in finite time, while the distances between agents that initially see each other monotically decreases. We will also prove a geometrical result, a tight lower bound on the sum of cosines of the interior angles of a convex polygon, that we will use to prove the gathering of our dynamical system.
△ Less
Submitted 30 October, 2015;
originally announced October 2015.
-
Postprocessing of Compressed Images via Sequential Denoising
Authors:
Yehuda Dar,
Alfred M. Bruckstein,
Michael Elad,
Raja Giryes
Abstract:
In this work we propose a novel postprocessing technique for compression-artifact reduction. Our approach is based on posing this task as an inverse problem, with a regularization that leverages on existing state-of-the-art image denoising algorithms. We rely on the recently proposed Plug-and-Play Prior framework, suggesting the solution of general inverse problems via Alternating Direction Method…
▽ More
In this work we propose a novel postprocessing technique for compression-artifact reduction. Our approach is based on posing this task as an inverse problem, with a regularization that leverages on existing state-of-the-art image denoising algorithms. We rely on the recently proposed Plug-and-Play Prior framework, suggesting the solution of general inverse problems via Alternating Direction Method of Multipliers (ADMM), leading to a sequence of Gaussian denoising steps. A key feature in our scheme is a linearization of the compression-decompression process, so as to get a formulation that can be optimized. In addition, we supply a thorough analysis of this linear approximation for several basic compression procedures. The proposed method is suitable for diverse compression techniques that rely on transform coding. Specifically, we demonstrate impressive gains in image quality for several leading compression methods - JPEG, JPEG2000, and HEVC.
△ Less
Submitted 18 March, 2016; v1 submitted 30 October, 2015;
originally announced October 2015.
-
Depth Perception in Autostereograms: 1/f-Noise is Best
Authors:
Yael Yankelevsky,
Ishai Shvartz,
Tamar Avraham,
Alfred M. Bruckstein
Abstract:
An autostereogram is a single image that encodes depth information that pops out when looking at it. The trick is achieved by replicating a vertical strip that sets a basic two-dimensional pattern with disparity shifts that encode a three-dimensional scene. It is of interest to explore the dependency between the ease of perceiving depth in autostereograms and the choice of the basic pattern used f…
▽ More
An autostereogram is a single image that encodes depth information that pops out when looking at it. The trick is achieved by replicating a vertical strip that sets a basic two-dimensional pattern with disparity shifts that encode a three-dimensional scene. It is of interest to explore the dependency between the ease of perceiving depth in autostereograms and the choice of the basic pattern used for generating them. In this work we confirm a theory proposed by Bruckstein et al. to explain the process of autostereographic depth perception, providing a measure for the ease of "locking into" the depth profile, based on the spectral properties of the basic pattern used. We report the results of three sets of psychophysical experiments using autostereograms generated from two-dimensional random noise patterns having power spectra of the form $1/f^β$. The experiments were designed to test the ability of human subjects to identify smooth, low resolution surfaces, as well as detail, in the form of higher resolution objects in the depth profile, and to determine limits in identifying small objects as a function of their size. In accordance with the theory, we discover a significant advantage of the $1/f$ noise pattern (pink noise) for fast depth lock-in and fine detail detection, showing that such patterns are optimal choices for autostereogram design. Validating the theoretical model predictions strengthens its underlying assumptions, and contributes to a better understanding of the visual system's binocular disparity mechanisms.
△ Less
Submitted 16 June, 2015;
originally announced June 2015.
-
Sparsity Based Methods for Overparameterized Variational Problems
Authors:
Raja Giryes,
Michael Elad,
Alfred M. Bruckstein
Abstract:
Two complementary approaches have been extensively used in signal and image processing leading to novel results, the sparse representation methodology and the variational strategy. Recently, a new sparsity based model has been proposed, the cosparse analysis framework, which may potentially help in bridging sparse approximation based methods to the traditional total-variation minimization. Based o…
▽ More
Two complementary approaches have been extensively used in signal and image processing leading to novel results, the sparse representation methodology and the variational strategy. Recently, a new sparsity based model has been proposed, the cosparse analysis framework, which may potentially help in bridging sparse approximation based methods to the traditional total-variation minimization. Based on this, we introduce a sparsity based framework for solving overparameterized variational problems. The latter has been used to improve the estimation of optical flow and also for general denoising of signals and images. However, the recovery of the space varying parameters involved was not adequately addressed by traditional variational methods. We first demonstrate the efficiency of the new framework for one dimensional signals in recovering a piecewise linear and polynomial function. Then, we illustrate how the new technique can be used for denoising and segmentation of images.
△ Less
Submitted 14 August, 2015; v1 submitted 20 May, 2014;
originally announced May 2014.
-
Improving Low Bit-Rate Video Coding using Spatio-Temporal Down-Scaling
Authors:
Yehuda Dar,
Alfred M. Bruckstein
Abstract:
Good quality video coding for low bit-rate applications is important for transmission over narrow-bandwidth channels and for storage with limited memory capacity. In this work, we develop a previous analysis for image compression at low bit-rates to adapt it to video signals. Improving compression using down-scaling in the spatial and temporal dimensions is examined. We show, both theoretically an…
▽ More
Good quality video coding for low bit-rate applications is important for transmission over narrow-bandwidth channels and for storage with limited memory capacity. In this work, we develop a previous analysis for image compression at low bit-rates to adapt it to video signals. Improving compression using down-scaling in the spatial and temporal dimensions is examined. We show, both theoretically and experimentally, that at low bit-rates, we benefit from applying spatio-temporal scaling. The proposed method includes down-scaling before the compression and a corresponding up-scaling afterwards, while the codec itself is left unmodified. We propose analytic models for low bit-rate compression and spatio-temporal scaling operations. Specifically, we use theoretic models of motion-compensated prediction of available and absent frames as in coding and frame-rate up-conversion (FRUC) applications, respectively. The proposed models are designed for multi-resolution analysis. In addition, we formulate a bit-allocation procedure and propose a method for estimating good down-scaling factors of a given video based on its second-order statistics and the given bit-budget. We validate our model with experimental results of H.264 compression.
△ Less
Submitted 24 April, 2015; v1 submitted 15 April, 2014;
originally announced April 2014.