-
Learning Multiparametric Biomarkers for Assessing MR-Guided Focused Ultrasound Treatment of Malignant Tumors
Authors:
Blake E. Zimmerman,
Sara Johnson,
Henrik Odéen,
Jill Shea,
Markus D. Foote,
Nicole Winkler,
Sarang C. Joshi,
Allison Payne
Abstract:
Noninvasive MR-guided focused ultrasound (MRgFUS) treatments are promising alternatives to the surgical removal of malignant tumors. A significant challenge is assessing the viability of treated tissue during and immediately after MRgFUS procedures. Current clinical assessment uses the nonperfused volume (NPV) biomarker immediately after treatment from contrast-enhanced MRI. The NPV has variable a…
▽ More
Noninvasive MR-guided focused ultrasound (MRgFUS) treatments are promising alternatives to the surgical removal of malignant tumors. A significant challenge is assessing the viability of treated tissue during and immediately after MRgFUS procedures. Current clinical assessment uses the nonperfused volume (NPV) biomarker immediately after treatment from contrast-enhanced MRI. The NPV has variable accuracy, and the use of contrast agent prevents continuing MRgFUS treatment if tumor coverage is inadequate. This work presents a novel, noncontrast, learned multiparametric MR biomarker that can be used during treatment for intratreatment assessment, validated in a VX2 rabbit tumor model. A deep convolutional neural network was trained on noncontrast multiparametric MR images using the NPV biomarker from follow-up MR imaging (3-5 days after MRgFUS treatment) as the accurate label of nonviable tissue. A novel volume-conserving registration algorithm yielded a voxel-wise correlation between treatment and follow-up NPV, providing a rigorous validation of the biomarker. The learned noncontrast multiparametric MR biomarker predicted the follow-up NPV with an average DICE coefficient of 0.71, substantially outperforming the current clinical standard (DICE coefficient = 0.53). Noncontrast multiparametric MR imaging integrated with a deep convolutional neural network provides a more accurate prediction of MRgFUS treatment outcome than current contrast-based techniques.
△ Less
Submitted 29 September, 2020; v1 submitted 23 October, 2019;
originally announced October 2019.
-
Decentralized Rendezvous of Nonholonomic Robots with Sensing and Connectivity Constraints
Authors:
Zhen Kan,
Justin Klotz,
Eduardo L. Pasiliao Jr,
John M. Shea,
Warren E. Dixon
Abstract:
A group of wheeled robots with nonholonomic constraints is considered to rendezvous at a common specified setpoint with a desired orientation while maintaining network connectivity and ensuring collision avoidance within the robots. Given communication and sensing constraints for each robot, only a subset of the robots are aware or informed of the global destination, and the remaining robots must…
▽ More
A group of wheeled robots with nonholonomic constraints is considered to rendezvous at a common specified setpoint with a desired orientation while maintaining network connectivity and ensuring collision avoidance within the robots. Given communication and sensing constraints for each robot, only a subset of the robots are aware or informed of the global destination, and the remaining robots must move within the network connectivity constraint so that the informed robots can guide the group to the goal. The mobile robots are also required to avoid collisions with each other outside a neighborhood of the common rendezvous point. To achieve the rendezvous control objective, decentralized time-varying controllers are developed based on a navigation function framework to steer the robots to perform rendezvous while preserving network connectivity and ensuring collision avoidance. Only local sensing feedback, which includes position feedback from immediate neighbors and absolute orientation measurement, is used to navigate the robots and enables radio silence during navigation. Simulation results demonstrate the performance of the developed approach.
△ Less
Submitted 23 February, 2014;
originally announced February 2014.
-
Optimizing Network Topology to Reduce Aggregate Traffic in Systems of Mobile Robots
Authors:
Leenhapat Navaravong,
John M. Shea,
Eduardo L. Pasiliao Jr,
Gregory L. Barnette,
Warren E. Dixon
Abstract:
Systems of networked mobile robots, such as unmanned aerial or ground vehicles, will play important roles in future military and commercial applications. The communications for such systems will typically be over wireless links and may require that the robots form an ad hoc network and communicate on a peer-to-peer basis. In this paper, we consider the problem of optimizing the network topol…
▽ More
Systems of networked mobile robots, such as unmanned aerial or ground vehicles, will play important roles in future military and commercial applications. The communications for such systems will typically be over wireless links and may require that the robots form an ad hoc network and communicate on a peer-to-peer basis. In this paper, we consider the problem of optimizing the network topology to minimize the total traffic in a network required to support a given set of data flows under constraints on the amount of movement possible at each mobile robot. In this paper, we consider a subclass of this problem in which the initial and final topologies are trees, and the movement restrictions are given in terms of the number of edges in the graph that must be traversed. We develop algorithms to optimize the network topology while maintaining network connectivity during the topology reconfiguration process. Our topology reconfiguration algorithm uses the concept of prefix labelling and routing to move nodes through the network while maintaining network connectivity. We develop two algorithms to determine the final network topology: an optimal, but computationally complex algorithm, and a greedy suboptimal algorithm that has much lower complexity. We present simulation results to compare the performance of these algorithm.
△ Less
Submitted 30 August, 2011;
originally announced August 2011.
-
LDPC Code Design for the BPSK-constrained Gaussian Wiretap Channel
Authors:
Chan Wong Wong,
Tan F. Wong,
John M. Shea
Abstract:
A coding scheme based on irregular low-density parity-check (LDPC) codes is proposed to send secret messages from a source over the Gaussian wiretap channel to a destination in the presence of a wiretapper, with the restriction that the source can send only binary phase-shift keyed (BPSK) symbols. The secrecy performance of the proposed coding scheme is measured by the secret message rate through…
▽ More
A coding scheme based on irregular low-density parity-check (LDPC) codes is proposed to send secret messages from a source over the Gaussian wiretap channel to a destination in the presence of a wiretapper, with the restriction that the source can send only binary phase-shift keyed (BPSK) symbols. The secrecy performance of the proposed coding scheme is measured by the secret message rate through the wiretap channel as well as the equivocation rate about the message at the wiretapper. A code search procedure is suggested to obtain irregular LDPC codes that achieve good secrecy performance in such context.
△ Less
Submitted 20 March, 2011;
originally announced March 2011.
-
Secret Sharing LDPC Codes for the BPSK-constrained Gaussian Wiretap Channel
Authors:
Chan Wong Wong,
Tan F. Wong,
John M. Shea
Abstract:
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian channel. Two constraints are imposed on the source-to-destination channel; namely, the source can transmit only binary phase shift keyed (BPSK) symb…
▽ More
The problem of secret sharing over the Gaussian wiretap channel is considered. A source and a destination intend to share secret information over a Gaussian channel in the presence of a wiretapper who observes the transmission through another Gaussian channel. Two constraints are imposed on the source-to-destination channel; namely, the source can transmit only binary phase shift keyed (BPSK) symbols, and symbol-by-symbol hard-decision quantization is applied to the received symbols of the destination. An error-free public channel is also available for the source and destination to exchange messages in order to help the secret sharing process. The wiretapper can perfectly observe all messages in the public channel. It is shown that a secret sharing scheme that employs a random ensemble of regular low density parity check (LDPC) codes can achieve the key capacity of the BPSK-constrained Gaussian wiretap channel asymptotically with increasing block length. To accommodate practical constraints of finite block length and limited decoding complexity, fixed irregular LDPC codes are also designed to replace the regular LDPC code ensemble in the proposed secret sharing scheme.
△ Less
Submitted 20 January, 2011; v1 submitted 15 September, 2010;
originally announced September 2010.
-
Secret Sharing over Fast-Fading MIMO Wiretap Channels
Authors:
Tan F. Wong,
Matthieu Bloch,
John M. Shea
Abstract:
Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of a wiretapper who also makes channel observations that are different from but correlated to those made by the destination. An interactive authenticated unrestricted public channel is also available for use by the sour…
▽ More
Secret sharing over the fast-fading MIMO wiretap channel is considered. A source and a destination try to share secret information over a fast-fading MIMO channel in the presence of a wiretapper who also makes channel observations that are different from but correlated to those made by the destination. An interactive authenticated unrestricted public channel is also available for use by the source and destination in the secret sharing process. This falls under the "channel-type model with wiretapper" considered by Ahlswede and Csiszar. A minor extension of their result (to continuous channel alphabets) is employed to evaluate the key capacity of the fast-fading MIMO wiretap channel. The effects of spatial dimensionality provided by the use of multiple antennas at the source, destination, and wiretapper are then investigated.
△ Less
Submitted 11 September, 2009; v1 submitted 14 December, 2008;
originally announced December 2008.
-
Flow-optimized Cooperative Transmission for the Relay Channel
Authors:
Tan F. Wong,
Tat M. Lok,
John M. Shea
Abstract:
This paper describes an approach for half-duplex cooperative transmission in a classical three-node relay channel. Assuming availability of channel state information at nodes, the approach makes use of this information to optimize distinct flows through the direct link from the source to the destination and the path via the relay, respectively. It is shown that such a design can effectively harn…
▽ More
This paper describes an approach for half-duplex cooperative transmission in a classical three-node relay channel. Assuming availability of channel state information at nodes, the approach makes use of this information to optimize distinct flows through the direct link from the source to the destination and the path via the relay, respectively. It is shown that such a design can effectively harness diversity advantage of the relay channel in both high-rate and low-rate scenarios. When the rate requirement is low, the proposed design gives a second-order outage diversity performance approaching that of full-duplex relaying. When the rate requirement becomes asymptotically large, the design still gives a close-to-second-order outage diversity performance. The design also achieves the best diversity-multiplexing tradeoff possible for the relay channel. With optimal long-term power control over the fading relay channel, the proposed design achieves a delay-limited rate performance that is only 3.0dB (5.4dB) worse than the capacity performance of the additive white Gaussian channel in low- (high-) rate scenarios.
△ Less
Submitted 13 September, 2007; v1 submitted 3 January, 2007;
originally announced January 2007.