-
Quadrotor Morpho-Transition: Learning vs Model-Based Control Strategies
Authors:
Ioannis Mandralis,
Richard M. Murray,
Morteza Gharib
Abstract:
Quadrotor Morpho-Transition, or the act of transitioning from air to ground through mid-air transformation, involves complex aerodynamic interactions and a need to operate near actuator saturation, complicating controller design. In recent work, morpho-transition has been studied from a model-based control perspective, but these approaches remain limited due to unmodeled dynamics and the requireme…
▽ More
Quadrotor Morpho-Transition, or the act of transitioning from air to ground through mid-air transformation, involves complex aerodynamic interactions and a need to operate near actuator saturation, complicating controller design. In recent work, morpho-transition has been studied from a model-based control perspective, but these approaches remain limited due to unmodeled dynamics and the requirement for planning through contacts. Here, we train an end-to-end Reinforcement Learning (RL) controller to learn a morpho-transition policy and demonstrate successful transfer to hardware. We find that the RL control policy achieves agile landing, but only transfers to hardware if motor dynamics and observation delays are taken into account. On the other hand, a baseline MPC controller transfers out-of-the-box without knowledge of the actuator dynamics and delays, at the cost of reduced recovery from disturbances in the event of unknown actuator failures. Our work opens the way for more robust control of agile in-flight quadrotor maneuvers that require mid-air transformation.
△ Less
Submitted 16 June, 2025;
originally announced June 2025.
-
Jailbreak Detection in Clinical Training LLMs Using Feature-Based Predictive Models
Authors:
Tri Nguyen,
Lohith Srikanth Pentapalli,
Magnus Sieverding,
Laurah Turner,
Seth Overla,
Weibing Zheng,
Chris Zhou,
David Furniss,
Danielle Weber,
Michael Gharib,
Matt Kelleher,
Michael Shukis,
Cameron Pawlik,
Kelly Cohen
Abstract:
Jailbreaking in Large Language Models (LLMs) threatens their safe use in sensitive domains like education by allowing users to bypass ethical safeguards. This study focuses on detecting jailbreaks in 2-Sigma, a clinical education platform that simulates patient interactions using LLMs. We annotated over 2,300 prompts across 158 conversations using four linguistic variables shown to correlate stron…
▽ More
Jailbreaking in Large Language Models (LLMs) threatens their safe use in sensitive domains like education by allowing users to bypass ethical safeguards. This study focuses on detecting jailbreaks in 2-Sigma, a clinical education platform that simulates patient interactions using LLMs. We annotated over 2,300 prompts across 158 conversations using four linguistic variables shown to correlate strongly with jailbreak behavior. The extracted features were used to train several predictive models, including Decision Trees, Fuzzy Logic-based classifiers, Boosting methods, and Logistic Regression. Results show that feature-based predictive models consistently outperformed Prompt Engineering, with the Fuzzy Decision Tree achieving the best overall performance. Our findings demonstrate that linguistic-feature-based models are effective and explainable alternatives for jailbreak detection. We suggest future work explore hybrid frameworks that integrate prompt-based flexibility with rule-based robustness for real-time, spectrum-based jailbreak monitoring in educational LLMs.
△ Less
Submitted 21 April, 2025;
originally announced May 2025.
-
NMPC-based Unified Posture Manipulation and Thrust Vectoring for Fault Recovery
Authors:
Adarsh Salagame,
Shashwat Pandya,
Ioannis Mandralis,
Eric Sihite,
Alireza Ramezani,
Morteza Gharib
Abstract:
Multi-rotors face significant risks, as actuator failures at high altitudes can easily result in a crash and the robot's destruction. Therefore, rapid fault recovery in the event of an actuator failure is necessary for the fault-tolerant and safe operation of unmanned aerial robots. In this work, we present a fault recovery approach based on the unification of posture manipulation and thrust vecto…
▽ More
Multi-rotors face significant risks, as actuator failures at high altitudes can easily result in a crash and the robot's destruction. Therefore, rapid fault recovery in the event of an actuator failure is necessary for the fault-tolerant and safe operation of unmanned aerial robots. In this work, we present a fault recovery approach based on the unification of posture manipulation and thrust vectoring. The key contributions of this work are: 1) Derivation of two flight dynamics models (high-fidelity and reduced-order) that capture posture control and thrust vectoring. 2) Design of a controller based on Nonlinear Model Predictive Control (NMPC) and demonstration of fault recovery in simulation using a high-fidelity model of the Multi-Modal Mobility Morphobot (M4) in Simscape.
△ Less
Submitted 23 March, 2025;
originally announced March 2025.
-
ATMO: An Aerially Transforming Morphobot for Dynamic Ground-Aerial Transition
Authors:
Ioannis Mandralis,
Reza Nemovi,
Alireza Ramezani,
Richard M. Murray,
Morteza Gharib
Abstract:
Designing ground-aerial robots is challenging due to the increased actuation requirements which can lead to added weight and reduced locomotion efficiency. Morphobots mitigate this by combining actuators into multi-functional groups and leveraging ground transformation to achieve different locomotion modes. However, transforming on the ground requires dealing with the complexity of ground-vehicle…
▽ More
Designing ground-aerial robots is challenging due to the increased actuation requirements which can lead to added weight and reduced locomotion efficiency. Morphobots mitigate this by combining actuators into multi-functional groups and leveraging ground transformation to achieve different locomotion modes. However, transforming on the ground requires dealing with the complexity of ground-vehicle interactions during morphing, limiting applicability on rough terrain. Mid-air transformation offers a solution to this issue but demands operating near or beyond actuator limits while managing complex aerodynamic forces. We address this problem by introducing the Aerially Transforming Morphobot (ATMO), a robot which transforms near the ground achieving smooth transition between aerial and ground modes. To achieve this, we leverage the near ground aerodynamics, uncovered by experimental load cell testing, and stabilize the system using a model-predictive controller that adapts to ground proximity and body shape. The system is validated through numerous experimental demonstrations. We find that ATMO can land smoothly at body postures past its actuator saturation limits by virtue of the uncovered ground-effect.
△ Less
Submitted 1 March, 2025;
originally announced March 2025.
-
A Comparative Study of Machine Unlearning Techniques for Image and Text Classification Models
Authors:
Omar M. Safa,
Mahmoud M. Abdelaziz,
Mustafa Eltawy,
Mohamed Mamdouh,
Moamen Gharib,
Salaheldin Eltenihy,
Nagia M. Ghanem,
Mohamed M. Ismail
Abstract:
Machine Unlearning has emerged as a critical area in artificial intelligence, addressing the need to selectively remove learned data from machine learning models in response to data privacy regulations. This paper provides a comprehensive comparative analysis of six state-of-theart unlearning techniques applied to image and text classification tasks. We evaluate their performance, efficiency, and…
▽ More
Machine Unlearning has emerged as a critical area in artificial intelligence, addressing the need to selectively remove learned data from machine learning models in response to data privacy regulations. This paper provides a comprehensive comparative analysis of six state-of-theart unlearning techniques applied to image and text classification tasks. We evaluate their performance, efficiency, and compliance with regulatory requirements, highlighting their strengths and limitations in practical scenarios. By systematically analyzing these methods, we aim to provide insights into their applicability, challenges,and tradeoffs, fostering advancements in the field of ethical and adaptable machine learning.
△ Less
Submitted 27 December, 2024;
originally announced December 2024.
-
Self-supervised cost of transport estimation for multimodal path planning
Authors:
Vincent Gherold,
Ioannis Mandralis,
Eric Sihite,
Adarsh Salagame,
Alireza Ramezani,
Morteza Gharib
Abstract:
Autonomous robots operating in real environments are often faced with decisions on how best to navigate their surroundings. In this work, we address a particular instance of this problem: how can a robot autonomously decide on the energetically optimal path to follow given a high-level objective and information about the surroundings? To tackle this problem we developed a self-supervised learning…
▽ More
Autonomous robots operating in real environments are often faced with decisions on how best to navigate their surroundings. In this work, we address a particular instance of this problem: how can a robot autonomously decide on the energetically optimal path to follow given a high-level objective and information about the surroundings? To tackle this problem we developed a self-supervised learning method that allows the robot to estimate the cost of transport of its surroundings using only vision inputs. We apply our method to the multi-modal mobility morphobot (M4), a robot that can drive, fly, segway, and crawl through its environment. By deploying our system in the real world, we show that our method accurately assigns different cost of transports to various types of environments e.g. grass vs smooth road. We also highlight the low computational cost of our method, which is deployed on an Nvidia Jetson Orin Nano robotic compute unit. We believe that this work will allow multi-modal robotic platforms to unlock their full potential for navigation and exploration tasks.
△ Less
Submitted 8 December, 2024;
originally announced December 2024.
-
Enhanced Capture Point Control Using Thruster Dynamics and QP-Based Optimization for Harpy
Authors:
Shreyansh Pitroda,
Eric Sihite,
Taoran Liu,
Kaushik Venkatesh Krishnamurthy,
Chenghao Wang,
Adarsh Salagame,
Reza Nemovi,
Alireza Ramezani,
Morteza Gharib
Abstract:
Our work aims to make significant strides in understanding unexplored locomotion control paradigms based on the integration of posture manipulation and thrust vectoring. These techniques are commonly seen in nature, such as Chukar birds using their wings to run on a nearly vertical wall. In this work, we developed a capture-point-based controller integrated with a quadratic programming (QP) solver…
▽ More
Our work aims to make significant strides in understanding unexplored locomotion control paradigms based on the integration of posture manipulation and thrust vectoring. These techniques are commonly seen in nature, such as Chukar birds using their wings to run on a nearly vertical wall. In this work, we developed a capture-point-based controller integrated with a quadratic programming (QP) solver which is used to create a thruster-assisted dynamic bipedal walking controller for our state-of-the-art Harpy platform. Harpy is a bipedal robot capable of legged-aerial locomotion using its legs and thrusters attached to its main frame. While capture point control based on centroidal models for bipedal systems has been extensively studied, the use of these thrusters in determining the capture point for a bipedal robot has not been extensively explored. The addition of these external thrust forces can lead to interesting interpretations of locomotion, such as virtual buoyancy studied in aquatic-legged locomotion. In this work, we derive a thruster-assisted bipedal walking with the capture point controller and implement it in simulation to study its performance.
△ Less
Submitted 21 November, 2024;
originally announced November 2024.
-
Conjugate momentum based thruster force estimate in dynamic multimodal robot
Authors:
Shreyansh Pitroda,
Eric Sihite,
Taoran Liu,
Kaushik Venkatesh Krishnamurthy,
Chenghao Wang,
Adarsh Salagame,
Reza Nemovi,
Alireza Ramezani,
Morteza Gharib
Abstract:
In a multi-modal system which combines thruster and legged locomotion such our state-of-the-art Harpy platform to perform dynamic locomotion. Therefore, it is very important to have a proper estimate of Thruster force. Harpy is a bipedal robot capable of legged-aerial locomotion using its legs and thrusters attached to its main frame. we can characterize thruster force using a thrust stand but it…
▽ More
In a multi-modal system which combines thruster and legged locomotion such our state-of-the-art Harpy platform to perform dynamic locomotion. Therefore, it is very important to have a proper estimate of Thruster force. Harpy is a bipedal robot capable of legged-aerial locomotion using its legs and thrusters attached to its main frame. we can characterize thruster force using a thrust stand but it generally does not account for working conditions such as battery voltage. In this study, we present a momentum-based thruster force estimator. One of the key information required to estimate is terrain information. we show estimation results with and without terrain knowledge. In this work, we derive a conjugate momentum thruster force estimator and implement it on a numerical simulator that uses thruster force to perform thruster-assisted walking.
△ Less
Submitted 21 November, 2024;
originally announced November 2024.
-
Quadratic Programming Optimization for Bio-Inspired Thruster-Assisted Bipedal Locomotion on Inclined Slopes
Authors:
Shreyansh Pitroda,
Eric Sihite,
Kaushik Venkatesh Krishnamurthy,
Chenghao Wang,
Adarsh Salagame,
Reza Nemovi,
Alireza Ramezani,
Morteza Gharib
Abstract:
Our work aims to make significant strides in understanding unexplored locomotion control paradigms based on the integration of posture manipulation and thrust vectoring. These techniques are commonly seen in nature, such as Chukar birds using their wings to run on a nearly vertical wall. In this work, we show quadratic programming with contact constraints which is then given to the whole body cont…
▽ More
Our work aims to make significant strides in understanding unexplored locomotion control paradigms based on the integration of posture manipulation and thrust vectoring. These techniques are commonly seen in nature, such as Chukar birds using their wings to run on a nearly vertical wall. In this work, we show quadratic programming with contact constraints which is then given to the whole body controller to map on robot states to produce a thruster-assisted slope walking controller for our state-of-the-art Harpy platform. Harpy is a bipedal robot capable of legged-aerial locomotion using its legs and thrusters attached to its main frame. The optimization-based walking controller has been used for dynamic locomotion such as slope walking, but the addition of thrusters to perform inclined slope walking has not been extensively explored. In this work, we derive a thruster-assisted bipedal walking with the quadratic programming (QP) controller and implement it in simulation to study its performance.
△ Less
Submitted 19 November, 2024;
originally announced November 2024.
-
Enabling steep slope walking on Husky using reduced order modeling and quadratic programming
Authors:
Kaushik Venkatesh Krishnamurthy,
Eric Sihite,
Chenghao Wang,
Shreyansh Pitroda,
Adarsh Salagame,
Alireza Ramezani,
Morteza Gharib
Abstract:
Wing-assisted inclined running (WAIR) observed in some young birds, is an attractive maneuver that can be extended to legged aerial systems. This study proposes a control method using a modified Variable Length Inverted Pendulum (VLIP) by assuming a fixed zero moment point and thruster forces collocated at the center of mass of the pendulum. A QP MPC is used to find the optimal ground reaction for…
▽ More
Wing-assisted inclined running (WAIR) observed in some young birds, is an attractive maneuver that can be extended to legged aerial systems. This study proposes a control method using a modified Variable Length Inverted Pendulum (VLIP) by assuming a fixed zero moment point and thruster forces collocated at the center of mass of the pendulum. A QP MPC is used to find the optimal ground reaction forces and thruster forces to track a reference position and velocity trajectory. Simulation results of this VLIP model on a slope of 40 degrees is maintained and shows thruster forces that can be obtained through posture manipulation. The simulation also provides insight to how the combined efforts of the thrusters and the tractive forces from the legs make WAIR possible in thruster-assisted legged systems.
△ Less
Submitted 18 November, 2024;
originally announced November 2024.
-
Optimization free control and ground force estimation with momentum observer for a multimodal legged aerial robot
Authors:
Kaushik Venkatesh Krishnamurthy,
Chenghao Wang,
Shreyansh Pitroda,
Eric Sihite,
Alireza Ramezani,
Morteza Gharib
Abstract:
Legged-aerial multimodal robots can make the most of both legged and aerial systems. In this paper, we propose a control framework that bypasses heavy onboard computers by using an optimization-free Explicit Reference Governor that incorporates external thruster forces from an attitude controller. Ground reaction forces are maintained within friction cone constraints using costly optimization solv…
▽ More
Legged-aerial multimodal robots can make the most of both legged and aerial systems. In this paper, we propose a control framework that bypasses heavy onboard computers by using an optimization-free Explicit Reference Governor that incorporates external thruster forces from an attitude controller. Ground reaction forces are maintained within friction cone constraints using costly optimization solvers, but the ERG framework filters applied velocity references that ensure no slippage at the foot end. We also propose a Conjugate momentum observer, that is widely used in Disturbance Observation to estimate ground reaction forces and compare its efficacy against a constrained model in estimating ground reaction forces in a reduced-order simulation of Husky.
△ Less
Submitted 17 November, 2024;
originally announced November 2024.
-
Capture Point Control in Thruster-Assisted Bipedal Locomotion
Authors:
Shreyansh Pitroda,
Aditya Bondada,
Kaushik Venkatesh Krishnamurthy,
Adarsh Salagame,
Chenghao Wang,
Taoran Liu,
Bibek Gupta,
Eric Sihite,
Reza Nemovi,
Alireza Ramezani,
Morteza Gharib
Abstract:
Despite major advancements in control design that are robust to unplanned disturbances, bipedal robots are still susceptible to falling over and struggle to negotiate rough terrains. By utilizing thrusters in our bipedal robot, we can perform additional posture manipulation and expand the modes of locomotion to enhance the robot's stability and ability to negotiate rough and difficult-to-navigate…
▽ More
Despite major advancements in control design that are robust to unplanned disturbances, bipedal robots are still susceptible to falling over and struggle to negotiate rough terrains. By utilizing thrusters in our bipedal robot, we can perform additional posture manipulation and expand the modes of locomotion to enhance the robot's stability and ability to negotiate rough and difficult-to-navigate terrains. In this paper, we present our efforts in designing a controller based on capture point control for our thruster-assisted walking model named Harpy and explore its control design possibilities. While capture point control based on centroidal models for bipedal systems has been extensively studied, the incorporation of external forces that can influence the dynamics of linear inverted pendulum models, often used in capture point-based works, has not been explored before. The inclusion of these external forces can lead to interesting interpretations of locomotion, such as virtual buoyancy studied in aquatic-legged locomotion. This paper outlines the dynamical model of our robot, the capture point method we use to assist the upper body stabilization, and the simulation work done to show the controller's feasibility.
△ Less
Submitted 20 June, 2024;
originally announced June 2024.
-
Thruster-Assisted Incline Walking
Authors:
Kaushik Venkatesh Krishnamurthy,
Chenghao Wang,
Shreyansh Pitroda,
Adarsh Salagame,
Eric Sihite,
Reza Nemovi,
Alireza Ramezani,
Morteza Gharib
Abstract:
In this study, our aim is to evaluate the effectiveness of thruster-assisted steep slope walking for the Husky Carbon, a quadrupedal robot equipped with custom-designed actuators and plural electric ducted fans, through simulation prior to conducting experimental trials. Thruster-assisted steep slope walking draws inspiration from wing-assisted incline running (WAIR) observed in birds, and intrigu…
▽ More
In this study, our aim is to evaluate the effectiveness of thruster-assisted steep slope walking for the Husky Carbon, a quadrupedal robot equipped with custom-designed actuators and plural electric ducted fans, through simulation prior to conducting experimental trials. Thruster-assisted steep slope walking draws inspiration from wing-assisted incline running (WAIR) observed in birds, and intriguingly incorporates posture manipulation and thrust vectoring, a locomotion technique not previously explored in the animal kingdom. Our approach involves developing a reduced-order model of the Husky robot, followed by the application of an optimization-based controller utilizing collocation methods and dynamics interpolation to determine control actions. Through simulation testing, we demonstrate the feasibility of hardware implementation of our controller.
△ Less
Submitted 18 June, 2024;
originally announced June 2024.
-
Narrow-Path, Dynamic Walking Using Integrated Posture Manipulation and Thrust Vectoring
Authors:
Kaushik Venkatesh Krishnamurthy,
Chenghao Wang,
Shreyansh Pitroda,
Adarsh Salagame,
Eric Sihite,
Reza Nemovi,
Alireza Ramezani,
Morteza Gharib
Abstract:
This research concentrates on enhancing the navigational capabilities of Northeastern Universitys Husky, a multi-modal quadrupedal robot, that can integrate posture manipulation and thrust vectoring, to traverse through narrow pathways such as walking over pipes and slacklining. The Husky is outfitted with thrusters designed to stabilize its body during dynamic walking over these narrow paths. The…
▽ More
This research concentrates on enhancing the navigational capabilities of Northeastern Universitys Husky, a multi-modal quadrupedal robot, that can integrate posture manipulation and thrust vectoring, to traverse through narrow pathways such as walking over pipes and slacklining. The Husky is outfitted with thrusters designed to stabilize its body during dynamic walking over these narrow paths. The project involves modeling the robot using the HROM (Husky Reduced Order Model) and developing an optimal control framework. This framework is based on polynomial approximation of the HROM and a collocation approach to derive optimal thruster commands necessary for achieving dynamic walking on narrow paths. The effectiveness of the modeling and control design approach is validated through simulations conducted using Matlab.
△ Less
Submitted 9 May, 2024;
originally announced May 2024.
-
Bio-Inspired Compensatory Strategies for Damage to Flapping Robotic Propulsors
Authors:
Meredith L. Hooper,
Isabel Scherl,
Morteza Gharib
Abstract:
To maintain full autonomy, autonomous robotic systems must have the ability to self-repair. Self-repairing via compensatory mechanisms appears in nature: for example, some fish can lose even 76% of their propulsive surface without loss of thrust by altering stroke mechanics. However, direct transference of these alterations from an organism to a robotic flapping propulsor may not be optimal due to…
▽ More
To maintain full autonomy, autonomous robotic systems must have the ability to self-repair. Self-repairing via compensatory mechanisms appears in nature: for example, some fish can lose even 76% of their propulsive surface without loss of thrust by altering stroke mechanics. However, direct transference of these alterations from an organism to a robotic flapping propulsor may not be optimal due to irrelevant evolutionary pressures. We instead seek to determine what alterations to stroke mechanics are optimal for a damaged robotic system via artificial evolution. To determine whether natural and machine-learned optima differ, we employ a cyber-physical system using a Covariance Matrix Adaptation Evolutionary Strategy to seek the most efficient trajectory for a given force. We implement an online optimization with hardware-in-the-loop, performing experimental function evaluations with an actuated flexible flat plate. To recoup thrust production following partial amputation, the most efficient learned strategy was to increase amplitude, increase frequency, increase the amplitude of angle of attack, and phase shift the angle of attack by approximately 110 degrees. In fish, only an amplitude increase is reported by majority in the literature. To recoup side-force production, a more challenging optimization landscape is encountered. Nesting of optimal angle of attack traces is found in the resultant-based reference frame, but no clear trend in amplitude or frequency are exhibited -- in contrast to the increase in frequency reported in insect literature. These results suggest that how mechanical flapping propulsors most efficiently adjust to damage of a flapping propulsor may not align with natural swimmers and flyers.
△ Less
Submitted 1 February, 2024;
originally announced February 2024.
-
Dynamic modeling of wing-assisted inclined running with a morphing multi-modal robot
Authors:
Eric Sihite,
Alireza Ramezani,
Morteza Gharib
Abstract:
Robot designs can take many inspirations from nature, where there are many examples of highly resilient and fault-tolerant locomotion strategies to navigate complex terrains by using multi-functional appendages. For example, Chukar and Hoatzin birds can repurpose their wings for quadrupedal walking and wing-assisted incline running (WAIR) to climb steep surfaces. We took inspiration from nature an…
▽ More
Robot designs can take many inspirations from nature, where there are many examples of highly resilient and fault-tolerant locomotion strategies to navigate complex terrains by using multi-functional appendages. For example, Chukar and Hoatzin birds can repurpose their wings for quadrupedal walking and wing-assisted incline running (WAIR) to climb steep surfaces. We took inspiration from nature and designed a morphing robot with multi-functional thruster-wheel appendages that allows the robot to change its mode of locomotion by transforming into a rover, quad-rotor, mobile inverted pendulum (MIP), and other modes. In this work, we derive a dynamic model and formulate a nonlinear model predictive controller to perform WAIR to showcase the unique capabilities of our robot. We implemented the model and controller in a numerical simulation and experiments to show their feasibility and the capabilities of our transforming multi-modal robot.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
SCC5G: A PQC-based Architecture for Highly Secure Critical Communication over Cellular Network in Zero-Trust Environment
Authors:
Mohammed Gharib,
Fatemeh Afghah
Abstract:
5G made a significant jump in cellular network security by offering enhanced subscriber identity protection and a user-network mutual authentication implementation. However, it still does not fully follow the zero-trust (ZT) requirements, as users need to trust the network, 5G network is not necessarily authenticated in each communication instance, and there is no mutual authentication between end…
▽ More
5G made a significant jump in cellular network security by offering enhanced subscriber identity protection and a user-network mutual authentication implementation. However, it still does not fully follow the zero-trust (ZT) requirements, as users need to trust the network, 5G network is not necessarily authenticated in each communication instance, and there is no mutual authentication between end users. When critical communications need to use commercial networks, but the environment is ZT, specific security architecture is needed to provide security services that do not rely on any 5G network trusted authority. In this paper, we propose SCC5G Secure Critical-mission Communication over a 5G network in ZT setting. SCC5G is a post-quantum cryptography (PQC) security solution that loads an embedded hardware root of authentication (HRA), such as physically unclonable functions (PUF), into the users' devices, to achieve tamper-resistant and unclonability features for authentication and key agreement. We evaluate the performance of the proposed architecture through an exhaustive simulation of a 5G network in an ns-3 network simulator. Results verify the scalability and efficiency of SCC5G by showing that it poses only a few kilobytes of traffic overhead and adds only an order of $O(0.1)$ second of latency under the normal traffic load.
△ Less
Submitted 21 August, 2023;
originally announced August 2023.
-
Demonstrating Autonomous 3D Path Planning on a Novel Scalable UGV-UAV Morphing Robot
Authors:
Eric Sihite,
Filip Slezak,
Ioannis Mandralis,
Adarsh Salagame,
Milad Ramezani,
Arash Kalantari,
Alireza Ramezani,
Morteza Gharib
Abstract:
Some animals exhibit multi-modal locomotion capability to traverse a wide range of terrains and environments, such as amphibians that can swim and walk or birds that can fly and walk. This capability is extremely beneficial for expanding the animal's habitat range and they can choose the most energy efficient mode of locomotion in a given environment. The robotic biomimicry of this multi-modal loc…
▽ More
Some animals exhibit multi-modal locomotion capability to traverse a wide range of terrains and environments, such as amphibians that can swim and walk or birds that can fly and walk. This capability is extremely beneficial for expanding the animal's habitat range and they can choose the most energy efficient mode of locomotion in a given environment. The robotic biomimicry of this multi-modal locomotion capability can be very challenging but offer the same advantages. However, the expanded range of locomotion also increases the complexity of performing localization and path planning. In this work, we present our morphing multi-modal robot, which is capable of ground and aerial locomotion, and the implementation of readily available SLAM and path planning solutions to navigate a complex indoor environment.
△ Less
Submitted 31 July, 2023;
originally announced August 2023.
-
5G Wings: Investigating 5G-Connected Drones Performance in Non-Urban Areas
Authors:
Mohammed Gharib,
Bryce Hopkins,
Jackson Murrin,
Andre Koka,
Fatemeh Afghah
Abstract:
Unmanned aerial vehicles (UAVs) have become extremely popular for both military and civilian applications due to their ease of deployment, cost-effectiveness, high maneuverability, and availability. Both applications, however, need reliable communication for command and control (C2) and/or data transmission. Utilizing commercial cellular networks for drone communication can enable beyond visual li…
▽ More
Unmanned aerial vehicles (UAVs) have become extremely popular for both military and civilian applications due to their ease of deployment, cost-effectiveness, high maneuverability, and availability. Both applications, however, need reliable communication for command and control (C2) and/or data transmission. Utilizing commercial cellular networks for drone communication can enable beyond visual line of sight (BVLOS) operation, high data rate transmission, and secure communication. However, deployment of cellular-connected drones over commercial LTE/5G networks still presents various challenges such as sparse coverage outside urban areas, and interference caused to the network as the UAV is visible to many towers. Commercial 5G networks can offer various features for aerial user equipment (UE) far beyond what LTE could provide by taking advantage of mmWave, flexible numerology, slicing, and the capability of applying AI-based solutions. Limited experimental data is available to investigate the operation of aerial UEs over current, without any modification, commercial 5G networks, particularly in suburban and NON-URBAN areas. In this paper, we perform a comprehensive study of drone communications over the existing low-band and mid-band 5G networks in a suburban area for different velocities and elevations, comparing the performance against that of LTE. It is important to acknowledge that the network examined in this research is primarily designed and optimized to meet the requirements of terrestrial users, and may not adequately address the needs of aerial users. This paper not only reports the Key Performance Indicators (KPIs) compared among all combinations of the test cases but also provides recommendations for aerial users to enhance their communication quality by controlling their trajectory.
△ Less
Submitted 3 July, 2023;
originally announced July 2023.
-
Emotions in Requirements Engineering: A Systematic Mapping Study
Authors:
Tahira Iqbal,
Hina Anwar,
Syazwanie Filzah,
Mohammad Gharib,
Kerli Moose,
Kuldar Taveter
Abstract:
The purpose of requirements engineering (RE) is to make sure that the expectations and needs of the stakeholders of a software system are met. Emotional needs can be captured as emotional requirements that represent how the end user should feel when using the system. Differently from functional and quality (non-functional) requirements, emotional requirements have received relatively less attentio…
▽ More
The purpose of requirements engineering (RE) is to make sure that the expectations and needs of the stakeholders of a software system are met. Emotional needs can be captured as emotional requirements that represent how the end user should feel when using the system. Differently from functional and quality (non-functional) requirements, emotional requirements have received relatively less attention from the RE community. This study is motivated by the need to explore and map the literature on emotional requirements. The study applies the systematic mapping study technique for surveying and analyzing the available literature to identify the most relevant publications on emotional requirements. We identified 34 publications that address a wide spectrum of practices concerned with engineering emotional requirements. The identified publications were analyzed with respect to the application domains, instruments used for eliciting and artefacts used for representing emotional requirements, and the state of the practice in emotion-related requirements engineering. This analysis serves to identify research gaps and research directions in engineering emotional requirements. To the best of the knowledge by the authors, no other similar study has been conducted on emotional requirements.
△ Less
Submitted 25 May, 2023;
originally announced May 2023.
-
Forecasting subcritical cylinder wakes with Fourier Neural Operators
Authors:
Peter I Renn,
Cong Wang,
Sahin Lale,
Zongyi Li,
Anima Anandkumar,
Morteza Gharib
Abstract:
We apply Fourier neural operators (FNOs), a state-of-the-art operator learning technique, to forecast the temporal evolution of experimentally measured velocity fields. FNOs are a recently developed machine learning method capable of approximating solution operators to systems of partial differential equations through data alone. The learned FNO solution operator can be evaluated in milliseconds,…
▽ More
We apply Fourier neural operators (FNOs), a state-of-the-art operator learning technique, to forecast the temporal evolution of experimentally measured velocity fields. FNOs are a recently developed machine learning method capable of approximating solution operators to systems of partial differential equations through data alone. The learned FNO solution operator can be evaluated in milliseconds, potentially enabling faster-than-real-time modeling for predictive flow control in physical systems. Here we use FNOs to predict how physical fluid flows evolve in time, training with particle image velocimetry measurements depicting cylinder wakes in the subcritical vortex shedding regime. We train separate FNOs at Reynolds numbers ranging from Re = 240 to Re = 3060 and study how increasingly turbulent flow phenomena impact prediction accuracy. We focus here on a short prediction horizon of ten non-dimensionalized time-steps, as would be relevant for problems of predictive flow control. We find that FNOs are capable of accurately predicting the evolution of experimental velocity fields throughout the range of Reynolds numbers tested (L2 norm error < 0.1) despite being provided with limited and imperfect flow observations. Given these results, we conclude that this method holds significant potential for real-time predictive flow control of physical systems.
△ Less
Submitted 19 January, 2023;
originally announced January 2023.
-
Automated segmentation and morphological characterization of placental histology images based on a single labeled image
Authors:
Arash Rabbani,
Masoud Babaei,
Masoumeh Gharib
Abstract:
In this study, a novel method of data augmentation has been presented for the segmentation of placental histological images when the labeled data are scarce. This method generates new realizations of the placenta intervillous morphology while maintaining the general textures and orientations. As a result, a diversified artificial dataset of images is generated that can be used for training deep le…
▽ More
In this study, a novel method of data augmentation has been presented for the segmentation of placental histological images when the labeled data are scarce. This method generates new realizations of the placenta intervillous morphology while maintaining the general textures and orientations. As a result, a diversified artificial dataset of images is generated that can be used for training deep learning segmentation models. We have observed that on average the presented method of data augmentation led to a 42% decrease in the binary cross-entropy loss of the validation dataset compared to the common approach in the literature. Additionally, the morphology of the intervillous space is studied under the effect of the proposed image reconstruction technique, and the diversity of the artificially generated population is quantified. Due to the high resemblance of the generated images to the real ones, the applications of the proposed method may not be limited to placental histological images, and it is recommended that other types of tissues be investigated in future studies.
△ Less
Submitted 7 October, 2022;
originally announced October 2022.
-
Model Predictive Loitering and Trajectory Tracking of Suspended Payloads in Cable-Driven Balloons Using UGVs
Authors:
Julius Wanner,
Eric Sihite,
Alireza Ramezani,
Morteza Gharib
Abstract:
The feasibility of performing airborne and ground manipulation, perception, and reconnaissance using wheeled rovers, unmanned aerial vehicles, CubeSats, SmallSats and more have been evaluated before. Among all of these solutions, balloon-based systems possess merits that make them extremely attractive, e.g., a simple operation mechanism and endured operation time. However, there are many hurdles t…
▽ More
The feasibility of performing airborne and ground manipulation, perception, and reconnaissance using wheeled rovers, unmanned aerial vehicles, CubeSats, SmallSats and more have been evaluated before. Among all of these solutions, balloon-based systems possess merits that make them extremely attractive, e.g., a simple operation mechanism and endured operation time. However, there are many hurdles to overcome to achieve robust loitering performance in balloon-based applications. We attempt to identify design and control challenges, and propose a novel robotic platform that allows for the application of balloons in the reconnaissance and perception of Mars craters. This work briefly covers our suggested actuation and Model Predictive Control design framework for steering such balloon systems. We propose the coordinated servoing of multiple unmanned ground vehicles (UGVs) to regulate tension forces in a cable-driven balloon to which an underactuated hanging payload is attached.
△ Less
Submitted 7 June, 2022;
originally announced June 2022.
-
LB-OPAR: Load Balanced Optimized Predictive and Adaptive Routing for Cooperative UAV Networks
Authors:
Mohammed Gharib,
Fatemeh Afghah,
Elizabeth Serena Bentley
Abstract:
Cooperative ad-hoc UAV networks have been turning into the primary solution set for situations where establishing a communication infrastructure is not feasible. Search-and-rescue after a disaster and intelligence, surveillance, and reconnaissance (ISR) are two examples where the UAV nodes need to send their collected data cooperatively into a central decision maker unit. Recently proposed SDN-bas…
▽ More
Cooperative ad-hoc UAV networks have been turning into the primary solution set for situations where establishing a communication infrastructure is not feasible. Search-and-rescue after a disaster and intelligence, surveillance, and reconnaissance (ISR) are two examples where the UAV nodes need to send their collected data cooperatively into a central decision maker unit. Recently proposed SDN-based solutions show incredible performance in managing different aspects of such networks. Alas, the routing problem for the highly dynamic UAV networks has not been addressed adequately. An optimal, reliable, and adaptive routing algorithm compatible with the SDN design and highly dynamic nature of such networks is required to improve the network performance. This paper proposes a load-balanced optimized predictive and adaptive routing (LB-OPAR), an SDN-based routing solution for cooperative UAV networks. LB-OPAR is the extension of our recently published routing algorithm (OPAR) that balances the network load and optimizes the network performance in terms of throughput, success rate, and flow completion time (FCT). We analytically model the routing problem in highly dynamic UAV network and propose a lightweight algorithmic solution to find the optimal solution with $O(|E|^2)$ time complexity where $|E|$ is the total number of network links. We exhaustively evaluate the proposed algorithm's performance using ns-3 network simulator. Results show that LB-OPAR outperforms the benchmark algorithms by $20\%$ in FCT, by $30\%$ in flow success rate on average, and up to $400\%$ in throughput.
△ Less
Submitted 14 May, 2022;
originally announced May 2022.
-
Efficient Path Planning and Tracking for Multi-Modal Legged-Aerial Locomotion Using Integrated Probabilistic Road Maps (PRM) and Reference Governors (RG)
Authors:
Eric Sihite,
Benjamin Mottis,
Paul Ghanem,
Alireza Ramezani,
Morteza Gharib
Abstract:
There have been several successful implementations of bio-inspired legged robots that can trot, walk, and hop robustly even in the presence of significant unplanned disturbances. Despite all of these accomplishments, practical control and high-level decision-making algorithms in multi-modal legged systems are overlooked. In nature, animals such as birds impressively showcase multiple modes of mobi…
▽ More
There have been several successful implementations of bio-inspired legged robots that can trot, walk, and hop robustly even in the presence of significant unplanned disturbances. Despite all of these accomplishments, practical control and high-level decision-making algorithms in multi-modal legged systems are overlooked. In nature, animals such as birds impressively showcase multiple modes of mobility including legged and aerial locomotion. They are capable of performing robust locomotion over large walls, tight spaces, and can recover from unpredictable situations such as sudden gusts or slippery surfaces. Inspired by these animals' versatility and ability to combine legged and aerial mobility to negotiate their environment, our main goal is to design and control legged robots that integrate two completely different forms of locomotion, ground and aerial mobility, in a single platform. Our robot, the Husky Carbon, is being developed to integrate aerial and legged locomotion and to transform between legged and aerial mobility. This work utilizes a Reference Governor (RG) based on low-level control of Husky's dynamical model to maintain the efficiency of legged locomotion, uses Probabilistic Road Maps (PRM) and 3D A* algorithms to generate an optimal path based on the energetic cost of transport for legged and aerial mobility
△ Less
Submitted 12 May, 2022;
originally announced May 2022.
-
Mid-Air Helicopter Delivery at Mars Using a Jetpack
Authors:
Jeff Delaune,
Jacob Izraelevitz,
Samuel Sirlin,
David Sternberg,
Louis Giersch,
L. Phillipe Tosi,
Evgeniy Skliyanskiy,
Larry Young,
Michael Mischna,
Shannah Withrow-Maser,
Juergen Mueller,
Joshua Bowman,
Mark S Wallace,
Havard F. Grip,
Larry Matthies,
Wayne Johnson,
Matthew Keennon,
Benjamin Pipenberg,
Harsh Patel,
Christopher Lim,
Aaron Schutte,
Marcel Veismann,
Haley Cummings,
Sarah Conley,
Jonathan Bapst
, et al. (10 additional authors not shown)
Abstract:
Mid-Air Helicopter Delivery (MAHD) is a new Entry, Descent and Landing (EDL) architecture to enable in situ mobility for Mars science at lower cost than previous missions. It uses a jetpack to slow down a Mars Science Helicopter (MSH) after separation from the backshell, and reach aerodynamic conditions suitable for helicopter take-off in mid air. For given aeroshell dimensions, only MAHD's lander…
▽ More
Mid-Air Helicopter Delivery (MAHD) is a new Entry, Descent and Landing (EDL) architecture to enable in situ mobility for Mars science at lower cost than previous missions. It uses a jetpack to slow down a Mars Science Helicopter (MSH) after separation from the backshell, and reach aerodynamic conditions suitable for helicopter take-off in mid air. For given aeroshell dimensions, only MAHD's lander-free approach leaves enough room in the aeroshell to accommodate the largest rotor option for MSH. This drastically improves flight performance, notably allowing +150\% increased science payload mass. Compared to heritage EDL approaches, the simpler MAHD architecture is also likely to reduce cost, and enables access to more hazardous and higher-elevation terrains on Mars. This paper introduces a design for the MAHD system architecture and operations. We present a mechanical configuration that fits both MSH and the jetpack within the 2.65-m Mars heritage aeroshell, and a jetpack control architecture which fully leverages the available helicopter avionics. We discuss preliminary numerical models of the flow dynamics resulting from the interaction between the jets, the rotors and the side winds. We define a force-torque sensing architecture capable of handling the wind and trimming the rotors to prepare for safe take-off. Finally, we analyze the dynamic environment and closed-loop control simulation results to demonstrate the preliminary feasibility of MAHD.
△ Less
Submitted 7 March, 2022;
originally announced March 2022.
-
An Exhaustive Study of Using Commercial LTE Network for UAV Communication in Rural Areas
Authors:
Mohammed Gharib,
Shashidhar Nandadapu,
Fatemeh Afghah
Abstract:
Unmanned aerial vehicles (UAVs) have been increasingly used in a wide area of military and civilian applications such as data collection and monitoring. A reliable network for command and control, communication, and data transfer is crucial, not only for mission purposes but also for safety concerns. The already deployed cellular networks are appropriate candidates for UAV communication given the…
▽ More
Unmanned aerial vehicles (UAVs) have been increasingly used in a wide area of military and civilian applications such as data collection and monitoring. A reliable network for command and control, communication, and data transfer is crucial, not only for mission purposes but also for safety concerns. The already deployed cellular networks are appropriate candidates for UAV communication given the solid security and wide coverage of these networks. However, the reliability of such networks needs a comprehensive investigation. In this paper, we use the long-term evolution (LTE) network as the infrastructure for drone communication and data transfer, in a rural area. We study the communication characteristics of an LTE-connected drone during low-altitude flights, for different altitudes and UAV speeds. We show that, in such areas, the higher elevation benefits from a better signal quality and experiences a fewer number of handover processes. Higher speed flights also slightly degrade the communication performance.
△ Less
Submitted 8 May, 2021;
originally announced May 2021.
-
How UAVs' Highly Dynamic 3D Movement Improves Network Security?
Authors:
Mohammed Gharib,
Fatemeh Afghah
Abstract:
Cooperative ad hoc unmanned aerial vehicle (UAV) networks need essential security services to ensure their communication security. Cryptography, as the inseparable tool for providing security services, requires a robust key management system. Alas, the absence of infrastructure in cooperative networks leads to the infeasibility of providing conventional key management systems. Key pre-distribution…
▽ More
Cooperative ad hoc unmanned aerial vehicle (UAV) networks need essential security services to ensure their communication security. Cryptography, as the inseparable tool for providing security services, requires a robust key management system. Alas, the absence of infrastructure in cooperative networks leads to the infeasibility of providing conventional key management systems. Key pre-distribution schemes have shown promising performance in different cooperative networks due to their lightweight nature. However, intermediate decryption-encryption (DE) steps and the lack of key updates are the most concerning issues they suffer from. In this paper, we propose a simple and effective key management algorithm inspired by the idea of key pre-distribution, where it utilizes the highly dynamic UAV node movement in 3D space to provide the key update feature and optimizes the number of intermediate DE steps. Although it is a general model for any mobile ad hoc network, we have selected UAV network as an example domain to show the efficiency of the model given the high mobility. We define the communication density parameter to analytically show that using any highly dynamic random movement pattern leads our algorithm to work effectively. To show the proposed algorithm's effectiveness, we exhaustively analyze its security and performance in the UAV network using the ns-3 network simulator. Results validate our analytical findings and show how the highly dynamic UAV network movement helps our algorithm to provide the key update feature and to optimize the number of DE steps.
△ Less
Submitted 6 May, 2021;
originally announced May 2021.
-
OPAR: Optimized Predictive and Adaptive Routing for Cooperative UAV Networks
Authors:
Mohammed Gharib,
Fatemeh Afghah,
Elizabeth Bentley
Abstract:
Cooperative UAV networks are becoming increasingly popular in military and civilian applications. Alas, the typical ad-hoc routing protocols, which aim at finding the shortest path, lead to significant performance degradation because of the 3-dimension highly-dynamic nature of UAV networks and the uneven distribution of nodes across the network. This paper proposes OPAR, an optimized predictive an…
▽ More
Cooperative UAV networks are becoming increasingly popular in military and civilian applications. Alas, the typical ad-hoc routing protocols, which aim at finding the shortest path, lead to significant performance degradation because of the 3-dimension highly-dynamic nature of UAV networks and the uneven distribution of nodes across the network. This paper proposes OPAR, an optimized predictive and adaptive routing protocol, to face this challenging problem. We model the routing problem with linear programming (LP), where the goal is to maximize network performance, considering the path lifetime and path-length together. This model relies on a precise link lifetime prediction mechanism. We support the LP problem with a lightweight algorithm to find the optimized solution with a computation complexity of $O(|E|^2)$, where $|E|$ is the number of network links. We evaluate the OPAR performance and compare it with the well-known routing algorithms AODV, DSDV, and OLSR to cover a wide range of proactive and reactive protocols as well as distance vector and link-state techniques. We performed extensive simulations for different network densities and mobility patterns using the ns-3 simulator. Results show that OPAR prevents a high volume of routing traffic, increases the successful delivery by more than $30\%$, improves the throughput $25\%$ on average, and decreases the flow completion time by an average of $35\%$.
△ Less
Submitted 17 January, 2021;
originally announced January 2021.
-
Designing a Socio-Technical Business Process for Analyzing Information Quality Requirements: Experience Report
Authors:
Mohamad Gharib
Abstract:
Although many BPs involve critical activities that demand high-quality information for their successful enactment, most available BP approaches focus mainly on control-flow, and either ignore the Information Quality (IQ) perspective or consider it as a mere technical issue, instead of a social and organizational one. This leaves a BP subject to different types of social and organizational IQ vulne…
▽ More
Although many BPs involve critical activities that demand high-quality information for their successful enactment, most available BP approaches focus mainly on control-flow, and either ignore the Information Quality (IQ) perspective or consider it as a mere technical issue, instead of a social and organizational one. This leaves a BP subject to different types of social and organizational IQ vulnerabilities that may negatively impact, or even abort the BP enactment. To tackle this problem, a Socio-Technical BP (STBP), namely a Workflow-net with Actors (WFA-net) has been developed. WFA-net allows for capturing IQ requirements in their social and organizational context. This paper reports on the experience gained, findings and lessons learned while developing the WFA-net.
△ Less
Submitted 24 December, 2020;
originally announced December 2020.
-
Governance & Autonomy: Towards a Governance-based Analysis of Autonomy in Cyber-Physical Systems-of-Systems
Authors:
Mohamad Gharib,
Paolo Lollini,
Andrea Ceccarelli,
Andrea Bondavalli
Abstract:
One of the main challenges in integrating Cyber-Physical System-of-Systems (CPSoS) to function as a single unified system is the autonomy of its Cyber-Physical Systems (CPSs), which may lead to a lack of coordination among CPSs and results in various kinds of conflicts. We advocate that to efficiently integrate CPSs within the CPSoS, we may need to adjust the autonomy of some CPSs in a way that al…
▽ More
One of the main challenges in integrating Cyber-Physical System-of-Systems (CPSoS) to function as a single unified system is the autonomy of its Cyber-Physical Systems (CPSs), which may lead to a lack of coordination among CPSs and results in various kinds of conflicts. We advocate that to efficiently integrate CPSs within the CPSoS, we may need to adjust the autonomy of some CPSs in a way that allows them to coordinate their activities to avoid any potential conflict among one another. To achieve that, we need to incorporate the notion of governance within the design of CPSoS, which defines rules that can be used for clearly specifying who and how can adjust the autonomy of a CPS. In this paper, we try to tackle this problem by proposing a new conceptual model that can be used for performing a governance-based analysis of autonomy for CPSs within CPSoS. We illustrate the utility of the model with an example from the automotive domain.
△ Less
Submitted 29 October, 2020;
originally announced October 2020.
-
Motivations and Preliminary Design for Mid-Air Deployment of a Science Rotorcraft on Mars
Authors:
Jeff Delaune,
Jacob Izraelevitz,
Larry A. Young,
William Rapin,
Evgeniy Sklyanskiy,
Wayne Johnson,
Aaron Schutte,
Abigail Fraeman,
Valerie Scott,
Carl Leake,
Erik Ballesteros,
Shannah Withrow,
Raghav Bhagwat,
Haley Cummings,
Kim Aaron,
Marcel Veismann,
Skylar Wei,
Regina Lee,
Luis Pabon Madrid,
Morteza Gharib,
Joel Burdick
Abstract:
Mid-Air Deployment (MAD) of a rotorcraft during Entry, Descent and Landing (EDL) on Mars eliminates the need to carry a propulsion or airbag landing system. This reduces the total mass inside the aeroshell by more than 100 kg and simplifies the aeroshell architecture. MAD's lighter and simpler design is likely to bring the risk and cost associated with the mission down. Moreover, the lighter entry…
▽ More
Mid-Air Deployment (MAD) of a rotorcraft during Entry, Descent and Landing (EDL) on Mars eliminates the need to carry a propulsion or airbag landing system. This reduces the total mass inside the aeroshell by more than 100 kg and simplifies the aeroshell architecture. MAD's lighter and simpler design is likely to bring the risk and cost associated with the mission down. Moreover, the lighter entry mass enables landing in the Martian highlands, at elevations inaccessible to current EDL technologies. This paper proposes a novel MAD concept for a Mars helicopter. We suggest a minimum science payload package to perform relevant science in the highlands. A variant of the Ingenuity helicopter is proposed to provide increased deceleration during MAD, and enough lift to fly the science payload in the highlands. We show in simulation that the lighter aeroshell results in a lower terminal velocity (30 m/s) at the end of the parachute phase of the EDL, and at higher altitudes than other approaches. After discussing the aerodynamics, controls, guidance, and mechanical challenges associated with deploying at such speed, we propose a backshell architecture that addresses them to release the helicopter in the safest conditions. Finally, we implemented the helicopter model and aerodynamic descent perturbations in the JPL Dynamics and Real-Time Simulation (DARTS)framework. Preliminary performance evaluation indicates landing and helicopter operation scan be achieved up to 5 km MOLA (Mars Orbiter Laser Altimeter reference).
△ Less
Submitted 13 October, 2020;
originally announced October 2020.
-
CovidCTNet: An Open-Source Deep Learning Approach to Identify Covid-19 Using CT Image
Authors:
Tahereh Javaheri,
Morteza Homayounfar,
Zohreh Amoozgar,
Reza Reiazi,
Fatemeh Homayounieh,
Engy Abbas,
Azadeh Laali,
Amir Reza Radmard,
Mohammad Hadi Gharib,
Seyed Ali Javad Mousavi,
Omid Ghaemi,
Rosa Babaei,
Hadi Karimi Mobin,
Mehdi Hosseinzadeh,
Rana Jahanban-Esfahlan,
Khaled Seidi,
Mannudeep K. Kalra,
Guanglan Zhang,
L. T. Chitkushev,
Benjamin Haibe-Kains,
Reza Malekzadeh,
Reza Rawassizadeh
Abstract:
Coronavirus disease 2019 (Covid-19) is highly contagious with limited treatment options. Early and accurate diagnosis of Covid-19 is crucial in reducing the spread of the disease and its accompanied mortality. Currently, detection by reverse transcriptase polymerase chain reaction (RT-PCR) is the gold standard of outpatient and inpatient detection of Covid-19. RT-PCR is a rapid method, however, it…
▽ More
Coronavirus disease 2019 (Covid-19) is highly contagious with limited treatment options. Early and accurate diagnosis of Covid-19 is crucial in reducing the spread of the disease and its accompanied mortality. Currently, detection by reverse transcriptase polymerase chain reaction (RT-PCR) is the gold standard of outpatient and inpatient detection of Covid-19. RT-PCR is a rapid method, however, its accuracy in detection is only ~70-75%. Another approved strategy is computed tomography (CT) imaging. CT imaging has a much higher sensitivity of ~80-98%, but similar accuracy of 70%. To enhance the accuracy of CT imaging detection, we developed an open-source set of algorithms called CovidCTNet that successfully differentiates Covid-19 from community-acquired pneumonia (CAP) and other lung diseases. CovidCTNet increases the accuracy of CT imaging detection to 90% compared to radiologists (70%). The model is designed to work with heterogeneous and small sample sizes independent of the CT imaging hardware. In order to facilitate the detection of Covid-19 globally and assist radiologists and physicians in the screening process, we are releasing all algorithms and parametric details in an open-source format. Open-source sharing of our CovidCTNet enables developers to rapidly improve and optimize services, while preserving user privacy and data ownership.
△ Less
Submitted 15 May, 2020; v1 submitted 6 May, 2020;
originally announced May 2020.
-
KPsec: Secure End-to-End Communications for Multi-Hop Wireless Networks
Authors:
Mohammed Gharib,
Ali Owfi,
Soudeh Ghorbani
Abstract:
The security of cyber-physical systems, from self-driving cars to medical devices, depends on their underlying multi-hop wireless networks. Yet, the lack of trusted central infrastructures and limited nodes' resources make securing these networks challenging. Recent works on key pre-distribution schemes, where nodes communicate over encrypted overlay paths, provide an appealing solution because of…
▽ More
The security of cyber-physical systems, from self-driving cars to medical devices, depends on their underlying multi-hop wireless networks. Yet, the lack of trusted central infrastructures and limited nodes' resources make securing these networks challenging. Recent works on key pre-distribution schemes, where nodes communicate over encrypted overlay paths, provide an appealing solution because of their distributed, computationally light-weight nature. Alas, these schemes share a glaring security vulnerability: the two ends of every overlay link can decrypt---and potentially modify and alter---the message. Plus, the longer overlay paths impose traffic overhead and increase latency.
We present a novel routing mechanism, KPsec, to address these issues. KPsec deploys multiple disjoint paths and an initial key-exchange phase to secure end-to-end communications. After the initial key-exchange phase, traffic in KPsec follows the shortest paths and, in contrast to key pre-distribution schemes, intermediate nodes cannot decrypt it. We measure the security and performance of KPsec as well as three state-of-the-art key pre-distribution schemes using a real 10-node testbed and large-scale simulations. Our experiments show that, in addition to its security benefits, KPsec results in $5-15\%$ improvement in network throughput, up to $75\%$ reduction in latency, and an order of magnitude reduction in energy consumption.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
AutoIDS: Auto-encoder Based Method for Intrusion Detection System
Authors:
Mohammed Gharib,
Bahram Mohammadi,
Shadi Hejareh Dastgerdi,
Mohammad Sabokrou
Abstract:
Intrusion Detection System (IDS) is one of the most effective solutions for providing primary security services. IDSs are generally working based on attack signatures or by detecting anomalies. In this paper, we have presented AutoIDS, a novel yet efficient solution for IDS, based on a semi-supervised machine learning technique. AutoIDS can distinguish abnormal packet flows from normal ones by tak…
▽ More
Intrusion Detection System (IDS) is one of the most effective solutions for providing primary security services. IDSs are generally working based on attack signatures or by detecting anomalies. In this paper, we have presented AutoIDS, a novel yet efficient solution for IDS, based on a semi-supervised machine learning technique. AutoIDS can distinguish abnormal packet flows from normal ones by taking advantage of cascading two efficient detectors. These detectors are two encoder-decoder neural networks that are forced to provide a compressed and a sparse representation from the normal flows. In the test phase, failing these neural networks on providing compressed or sparse representation from an incoming packet flow, means such flow does not comply with the normal traffic and thus it is considered as an intrusion. For lowering the computational cost along with preserving the accuracy, a large number of flows are just processed by the first detector. In fact, the second detector is only used for difficult samples which the first detector is not confident about them. We have evaluated AutoIDS on the NSL-KDD benchmark as a widely-used and well-known dataset. The accuracy of AutoIDS is 90.17\% showing its superiority compared to the other state-of-the-art methods.
△ Less
Submitted 8 November, 2019;
originally announced November 2019.
-
VeriVANca: An Actor-Based Framework for Formal Verification of Warning Message Dissemination Schemes in VANETs
Authors:
Farnaz Yousefi,
Ehsan Khamespanah,
Mohammed Gharib,
Marjan Sirjani,
Ali Movaghar
Abstract:
One of the applications of vehicular ad-hoc networks is warning message dissemination among vehicles in dangerous situations to prevent more damage. The only communication mechanism for message dissemination is multi-hop broadcast; in which, forwarding a received message have to be regulated using a scheme regarding the selection of forwarding nodes. When analyzing these schemes, simulation-based…
▽ More
One of the applications of vehicular ad-hoc networks is warning message dissemination among vehicles in dangerous situations to prevent more damage. The only communication mechanism for message dissemination is multi-hop broadcast; in which, forwarding a received message have to be regulated using a scheme regarding the selection of forwarding nodes. When analyzing these schemes, simulation-based frameworks fail to provide guaranteed analysis results due to the high level of concurrency in this application. Therefore, there is a need to use model checking approaches for achieving reliable results. In this paper, we have developed a framework called VeriVANca, to provide model checking facilities for the analysis of warning message dissemination schemes in VANETs. To this end, an actor-based modeling language, Rebeca, is used which is equipped with a variety of model checking engines. To illustrate the applicability of VeriVANca, modeling and analysis of two warning message dissemination schemes are presented. Some scenarios for these schemes are presented to show that concurrent behaviors of the system components may cause uncertainty in both behavior and performance which may not be detected by simulation-based techniques. Furthermore, the scalability of VeriVANca is examined by analyzing a middle-sized model.
△ Less
Submitted 16 April, 2019;
originally announced May 2019.
-
A Core Ontology for Privacy Requirements Engineering
Authors:
Mohamad Gharib,
John Mylopoulos
Abstract:
Nowadays, most companies need to collect, store, and manage personal information in order to deliver their services. Accordingly, privacy has emerged as a key concern for these companies since they need to comply with privacy laws and regulations. To deal with them properly, such privacy concerns should be considered since the early phases of system design. Ontologies have proven to be a key facto…
▽ More
Nowadays, most companies need to collect, store, and manage personal information in order to deliver their services. Accordingly, privacy has emerged as a key concern for these companies since they need to comply with privacy laws and regulations. To deal with them properly, such privacy concerns should be considered since the early phases of system design. Ontologies have proven to be a key factor for elaborating high-quality requirements models. However, most existing work deals with privacy as a special case of security requirements, thereby missing essential traits of this family of requirements. In this paper, we introduce COPri, a Core Ontology for Privacy requirements engineering that adopts and extends our previous work on privacy requirements engineering ontology that has been mined through a systematic literature review. Additionally, we implement, validate and then evaluate our ontology.
△ Less
Submitted 30 November, 2018;
originally announced November 2018.
-
Throughput Analysis of IEEE 802.11 Multi-hop Wireless Networks with Routing Consideration: A General Framework
Authors:
Shahbaz Rezaei,
Mohammed Gharib,
Ali Movaghar
Abstract:
The end-to-end throughput of multi-hop communication in wireless ad hoc networks is affected by the conflict between forwarding nodes. It has been shown that sending more packets than maximum achievable end-to-end throughput not only fails to increase throughput, but also decreases throughput owing to high contention and collision. Accordingly, it is of crucial importance for a source node to know…
▽ More
The end-to-end throughput of multi-hop communication in wireless ad hoc networks is affected by the conflict between forwarding nodes. It has been shown that sending more packets than maximum achievable end-to-end throughput not only fails to increase throughput, but also decreases throughput owing to high contention and collision. Accordingly, it is of crucial importance for a source node to know the maximum end-to-end throughput. The end-to-end throughput depends on multiple factors, such as physical layer limitations, MAC protocol properties, routing policy and nodes distribution. There have been many studies on analytical modeling of end-to-end throughput but none of them has taken routing policy and nodes distribution as well as MAC layer altogether into account. In this paper, the end-to-end throughput with perfect MAC layer is obtained based on routing policy and nodes distribution in one and two dimensional networks. Then, imperfections of IEEE 802:11 protocol is added to the model to obtain precise value. An exhaustive simulation is also made to validate the proposed models using NS2 simulator. Results show that if the distribution to the next hop for a particular routing policy is known, our methodology can obtain the maximum end-to-end throughput precisely.
△ Less
Submitted 1 February, 2018;
originally announced February 2018.
-
Ontologies for Privacy Requirements Engineering: A Systematic Literature Review
Authors:
Mohamad Gharib,
Paolo Giorgini,
John Mylopoulos
Abstract:
Privacy has been frequently identified as a main concern for system developers while dealing with/managing personal information. Despite this, most existing work on privacy requirements deals with them as a special case of security requirements. Therefore, key aspects of privacy are, usually, overlooked. In this context, wrong design decisions might be made due to insufficient understanding of pri…
▽ More
Privacy has been frequently identified as a main concern for system developers while dealing with/managing personal information. Despite this, most existing work on privacy requirements deals with them as a special case of security requirements. Therefore, key aspects of privacy are, usually, overlooked. In this context, wrong design decisions might be made due to insufficient understanding of privacy concerns. In this paper, we address this problem with a systematic literature review whose main purpose is to identify the main concepts/relations for capturing privacy requirements. In addition, the identified concepts/relations are further analyzed to propose a novel privacy ontology to be used by software engineers when dealing with privacy requirements.
△ Less
Submitted 30 November, 2016;
originally announced November 2016.