-
Leveraging Superfluous Information in Contrastive Representation Learning
Authors:
Xuechu Yu
Abstract:
Contrastive representation learning, which aims to learnthe shared information between different views of unlabeled data by maximizing the mutual information between them, has shown its powerful competence in self-supervised learning for downstream tasks. However, recent works have demonstrated that more estimated mutual information does not guarantee better performance in different downstream tas…
▽ More
Contrastive representation learning, which aims to learnthe shared information between different views of unlabeled data by maximizing the mutual information between them, has shown its powerful competence in self-supervised learning for downstream tasks. However, recent works have demonstrated that more estimated mutual information does not guarantee better performance in different downstream tasks. Such works inspire us to conjecture that the learned representations not only maintain task-relevant information from unlabeled data but also carry task-irrelevant information which is superfluous for downstream tasks, thus leading to performance degeneration. In this paper we show that superfluous information does exist during the conventional contrastive learning framework, and further design a new objective, namely SuperInfo, to learn robust representations by a linear combination of both predictive and superfluous information. Besides, we notice that it is feasible to tune the coefficients of introduced losses to discard task-irrelevant information, while keeping partial non-shared task-relevant information according to our SuperInfo loss.We demonstrate that learning with our loss can often outperform the traditional contrastive learning approaches on image classification, object detection and instance segmentation tasks with significant improvements.
△ Less
Submitted 19 August, 2024;
originally announced August 2024.
-
Low Power and Temperature-Resilient Compute-In-Memory Based on Subthreshold-FeFET
Authors:
Yifei Zhou,
Xuchu Huang,
Jianyi Yang,
Kai Ni,
Hussam Amrouch,
Cheng Zhuo,
Xunzhao Yin
Abstract:
Compute-in-memory (CiM) is a promising solution for addressing the challenges of artificial intelligence (AI) and the Internet of Things (IoT) hardware such as 'memory wall' issue. Specifically, CiM employing nonvolatile memory (NVM) devices in a crossbar structure can efficiently accelerate multiply-accumulation (MAC) computation, a crucial operator in neural networks among various AI models. Low…
▽ More
Compute-in-memory (CiM) is a promising solution for addressing the challenges of artificial intelligence (AI) and the Internet of Things (IoT) hardware such as 'memory wall' issue. Specifically, CiM employing nonvolatile memory (NVM) devices in a crossbar structure can efficiently accelerate multiply-accumulation (MAC) computation, a crucial operator in neural networks among various AI models. Low power CiM designs are thus highly desired for further energy efficiency optimization on AI models. Ferroelectric FET (FeFET), an emerging device, is attractive for building ultra-low power CiM array due to CMOS compatibility, high ION/IOFF ratio, etc. Recent studies have explored FeFET based CiM designs that achieve low power consumption. Nevertheless, subthreshold-operated FeFETs, where the operating voltages are scaled down to the subthreshold region to reduce array power consumption, are particularly vulnerable to temperature drift, leading to accuracy degradation. To address this challenge, we propose a temperature-resilient 2T-1FeFET CiM design that performs MAC operations reliably at subthreahold region from 0 to 85 Celsius, while consuming ultra-low power. Benchmarked against the VGG neural network architecture running the CIFAR-10 dataset, the proposed 2T-1FeFET CiM design achieves 89.45% CIFAR-10 test accuracy. Compared to previous FeFET based CiM designs, it exhibits immunity to temperature drift at an 8-bit wordlength scale, and achieves better energy efficiency with 2866 TOPS/W.
△ Less
Submitted 10 January, 2024; v1 submitted 28 December, 2023;
originally announced December 2023.
-
A General Analytical Framework for the Resolution of Near-Field Beamforming
Authors:
Chenguang Rao,
Zhiguo Ding,
Octavia A. Dobre,
Xuchu Dai
Abstract:
The resolution is an important performance metric of near-field communication networks. In particular, the resolution of near field beamforming measures how effectively users can be distinguished in the distance-angle domain, which is one of the most significant features of near-field communications. In a comparison, conventional far-field beamforming can distinguish users in the angle domain only…
▽ More
The resolution is an important performance metric of near-field communication networks. In particular, the resolution of near field beamforming measures how effectively users can be distinguished in the distance-angle domain, which is one of the most significant features of near-field communications. In a comparison, conventional far-field beamforming can distinguish users in the angle domain only, which means that near-field communication yields the full utilization of user spatial resources to improve spectrum efficiency. In the literature of near-field communications, there have been a few studies on whether the resolution of near-field beamforming is perfect. However, each of the existing results suffers its own limitations, e.g., each is accurate for special cases only, and cannot precisely and comprehensively characterize the resolution. In this letter, a general analytical framework is developed to evaluate the resolution of near-field beamforming. Based on this derived expression, the impacts of parameters on the resolution are investigated, which can shed light on the design of the near-field communications, including the designs of beamforming and multiple access tequniques.
△ Less
Submitted 10 December, 2023;
originally announced December 2023.
-
Artificial Intelligence in Fetal Resting-State Functional MRI Brain Segmentation: A Comparative Analysis of 3D UNet, VNet, and HighRes-Net Models
Authors:
Farzan Vahedifard,
Xuchu Liu,
Mehmet Kocak,
H. Asher Ai,
Mark Supanich,
Christopher Sica.,
Kranthi K Marathu,
Seth Adler,
Maysam Orouskhani,
Sharon Byrd
Abstract:
Introduction: Fetal resting-state functional magnetic resonance imaging (rs-fMRI) is a rapidly evolving field that provides valuable insight into brain development before birth. Accurate segmentation of the fetal brain from the surrounding tissue in nonstationary 3D brain volumes poses a significant challenge in this domain. Current available tools have 0.15 accuracy. Aim: This study introduced a…
▽ More
Introduction: Fetal resting-state functional magnetic resonance imaging (rs-fMRI) is a rapidly evolving field that provides valuable insight into brain development before birth. Accurate segmentation of the fetal brain from the surrounding tissue in nonstationary 3D brain volumes poses a significant challenge in this domain. Current available tools have 0.15 accuracy. Aim: This study introduced a novel application of artificial intelligence (AI) for automated brain segmentation in fetal brain fMRI, magnetic resonance imaging (fMRI). Open datasets were employed to train AI models, assess their performance, and analyze their capabilities and limitations in addressing the specific challenges associated with fetal brain fMRI segmentation. Method: We utilized an open-source fetal functional MRI (fMRI) dataset consisting of 160 cases (reference: fetal-fMRI - OpenNeuro). An AI model for fMRI segmentation was developed using a 5-fold cross-validation methodology. Three AI models were employed: 3D UNet, VNet, and HighResNet. Optuna, an automated hyperparameter-tuning tool, was used to optimize these models. Results and Discussion: The Dice scores of the three AI models (VNet, UNet, and HighRes-net) were compared, including a comparison between manually tuned and automatically tuned models using Optuna. Our findings shed light on the performance of different AI models for fetal resting-state fMRI brain segmentation. Although the VNet model showed promise in this application, further investigation is required to fully explore the potential and limitations of each model, including the HighRes-net model. This study serves as a foundation for further extensive research into the applications of AI in fetal brain fMRI segmentation.
△ Less
Submitted 17 November, 2023;
originally announced November 2023.
-
Asymptotic Performance of the GSVD-Based MIMO-NOMA Communications with Rician Fading
Authors:
Chenguang Rao,
Zhiguo Ding,
Kanapathippillai Cumanan,
Xuchu Dai
Abstract:
In recent years, the multiple-input multiple-output (MIMO) non-orthogonal multiple-access (NOMA) systems have attracted a significant interest in the relevant research communities. As a potential precoding scheme, the generalized singular value decomposition (GSVD) can be adopted in MIMO-NOMA systems and has been proved to have high spectral efficiency. In this paper, the performance of the GSVD-b…
▽ More
In recent years, the multiple-input multiple-output (MIMO) non-orthogonal multiple-access (NOMA) systems have attracted a significant interest in the relevant research communities. As a potential precoding scheme, the generalized singular value decomposition (GSVD) can be adopted in MIMO-NOMA systems and has been proved to have high spectral efficiency. In this paper, the performance of the GSVD-based MIMO-NOMA communications with Rician fading is studied. In particular, the distribution characteristics of generalized singular values (GSVs) of channel matrices are analyzed. Two novel mathematical tools, the linearization trick and the deterministic equivalent method, which are based on operator-valued free probability theory, are exploited to derive the Cauchy transform of GSVs. An iterative process is proposed to obtain the numerical values of the Cauchy transform of GSVs, which can be exploited to derive the average data rates of the communication system. In addition, the special case when the channel is modeled as Rayleigh fading, i.e., the line-of-sight propagation is trivial, is analyzed. In this case, the closed-form expressions of average rates are derived from the proposed iterative process. Simulation results are provided to validate the derived analytical results.
△ Less
Submitted 18 September, 2023;
originally announced September 2023.
-
Stochastic Geometry Based Modeling and Analysis on Network NOMA in Downlink CoMP Systems
Authors:
Yanshi Sun,
Zhiguo Ding,
Xuchu Dai,
Momiao Zhou,
Zhizhong Ding
Abstract:
This paper investigates the performance of network non-orthogonal multiple access (N-NOMA) in a downlink coordinated multi-point (CoMP) system. In the considered N-NOMA scheme, multiple base stations (BSs) cooperatively serve a CoMP user, meanwhile, each BS serves additional NOMA users by occupying the same resource block allocated to the CoMP user. The locations of the BSs and users are modeled b…
▽ More
This paper investigates the performance of network non-orthogonal multiple access (N-NOMA) in a downlink coordinated multi-point (CoMP) system. In the considered N-NOMA scheme, multiple base stations (BSs) cooperatively serve a CoMP user, meanwhile, each BS serves additional NOMA users by occupying the same resource block allocated to the CoMP user. The locations of the BSs and users are modeled by stochastic geometric models and the interference from the whole network is considered. Through rigorous derivations, the outage probabilities achieved by the CoMP and NOMA users are obtained, respectively. Numerical results are provided to verify the accuracy of the analytical results and also demonstrate the superior performance of N-NOMA compared to orthogonal multiple access (OMA) based CoMP scheme.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Cross-lingual Alzheimer's Disease detection based on paralinguistic and pre-trained features
Authors:
Xuchu Chen,
Yu Pu,
Jinpeng Li,
Wei-Qiang Zhang
Abstract:
We present our submission to the ICASSP-SPGC-2023 ADReSS-M Challenge Task, which aims to investigate which acoustic features can be generalized and transferred across languages for Alzheimer's Disease (AD) prediction. The challenge consists of two tasks: one is to classify the speech of AD patients and healthy individuals, and the other is to infer Mini Mental State Examination (MMSE) score based…
▽ More
We present our submission to the ICASSP-SPGC-2023 ADReSS-M Challenge Task, which aims to investigate which acoustic features can be generalized and transferred across languages for Alzheimer's Disease (AD) prediction. The challenge consists of two tasks: one is to classify the speech of AD patients and healthy individuals, and the other is to infer Mini Mental State Examination (MMSE) score based on speech only. The difficulty is mainly embodied in the mismatch of the dataset, in which the training set is in English while the test set is in Greek. We extract paralinguistic features using openSmile toolkit and acoustic features using XLSR-53. In addition, we extract linguistic features after transcribing the speech into text. These features are used as indicators for AD detection in our method. Our method achieves an accuracy of 69.6% on the classification task and a root mean squared error (RMSE) of 4.788 on the regression task. The results show that our proposed method is expected to achieve automatic multilingual Alzheimer's Disease detection through spontaneous speech.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
Automatic Expert Selection for Multi-Scenario and Multi-Task Search
Authors:
Xinyu Zou,
Zhi Hu,
Yiming Zhao,
Xuchu Ding,
Zhongyi Liu,
Chenliang Li,
Aixin Sun
Abstract:
Multi-scenario learning (MSL) enables a service provider to cater for users' fine-grained demands by separating services for different user sectors, e.g., by user's geographical region. Under each scenario there is a need to optimize multiple task-specific targets e.g., click through rate and conversion rate, known as multi-task learning (MTL). Recent solutions for MSL and MTL are mostly based on…
▽ More
Multi-scenario learning (MSL) enables a service provider to cater for users' fine-grained demands by separating services for different user sectors, e.g., by user's geographical region. Under each scenario there is a need to optimize multiple task-specific targets e.g., click through rate and conversion rate, known as multi-task learning (MTL). Recent solutions for MSL and MTL are mostly based on the multi-gate mixture-of-experts (MMoE) architecture. MMoE structure is typically static and its design requires domain-specific knowledge, making it less effective in handling both MSL and MTL. In this paper, we propose a novel Automatic Expert Selection framework for Multi-scenario and Multi-task search, named AESM^{2}. AESM^{2} integrates both MSL and MTL into a unified framework with an automatic structure learning. Specifically, AESM^{2} stacks multi-task layers over multi-scenario layers. This hierarchical design enables us to flexibly establish intrinsic connections between different scenarios, and at the same time also supports high-level feature extraction for different tasks. At each multi-scenario/multi-task layer, a novel expert selection algorithm is proposed to automatically identify scenario-/task-specific and shared experts for each input. Experiments over two real-world large-scale datasets demonstrate the effectiveness of AESM^{2} over a battery of strong baselines. Online A/B test also shows substantial performance gain on multiple metrics. Currently, AESM^{2} has been deployed online for serving major traffic.
△ Less
Submitted 6 June, 2022; v1 submitted 27 May, 2022;
originally announced May 2022.
-
On the Application of Quasi-Degradation to Network NOMA in Downlink CoMP Systems
Authors:
Yanshi Sun,
Zhiguo Ding,
Xuchu Dai,
Momiao Zhou,
Zhizhong Ding
Abstract:
The application of network non-orthogonal multiple access (N-NOMA) technique to coordinated multi-point (CoMP) systems has attracted significant attention due to its superior capability to improve connectivity and maintain reliable transmission for CoMP users simultaneously. Based on the concept of quasi-degraded channel for N-NOMA, this paper studies the precoding design for downlink N-NOMA scena…
▽ More
The application of network non-orthogonal multiple access (N-NOMA) technique to coordinated multi-point (CoMP) systems has attracted significant attention due to its superior capability to improve connectivity and maintain reliable transmission for CoMP users simultaneously. Based on the concept of quasi-degraded channel for N-NOMA, this paper studies the precoding design for downlink N-NOMA scenarios with two base stations (BSs) equipped with multiple antennas. In specific, under quasi-degraded channels, simple linear precoding based N-NOMA can achieve the same minimal total transmission power as theoretically optimal but complicated dirty paper coding (DPC) scheme, when the users' target rates and minimal transmission power of each BS are given. In this paper, the channel quasi-degradation (QD) condition is first rigorously derived for the scenario with single CoMP user and two NOMA users. The closed-form optimal precoders for N-NOMA under quasi-degraded channels are also provided. Then, based on QD condition, a novel hybrid N-NOMA (H-N-NOMA) scheme is proposed, which is a mixture of N-NOMA and conventional zero-forcing beamforming (ZFBF) scheme. Further, for the scenarios with more users, a low-complexity QD based user pairing (QDUP) algorithm is proposed. Numerical results are presented to reveal the impact factors of QD channels, and also demonstrate the superior performance of the proposed H-N-NOMA/QDUP scheme. It is shown that the proposed H-N-NOMA/QDUP scheme can effectively exploit the benefit of multi user diversity.
△ Less
Submitted 5 May, 2022; v1 submitted 28 February, 2022;
originally announced February 2022.
-
Projector-Guided Non-Holonomic Mobile 3D Printing
Authors:
Xuchu Xu,
Ziteng Wang,
Chen Feng
Abstract:
Fused deposition modeling (FDM) using mobile robots instead of the gantry-based 3D printer enables additive manufacturing at a larger scale with higher speed. This introduces challenges including accurate localization, control of the printhead, and design of a stable mobile manipulator with low vibrations and proper degrees of freedom. We proposed and developed a low-cost non-holonomic mobile 3D p…
▽ More
Fused deposition modeling (FDM) using mobile robots instead of the gantry-based 3D printer enables additive manufacturing at a larger scale with higher speed. This introduces challenges including accurate localization, control of the printhead, and design of a stable mobile manipulator with low vibrations and proper degrees of freedom. We proposed and developed a low-cost non-holonomic mobile 3D printing system guided by a projector via learning-based visual servo-ing. It requires almost no manual calibration of the system parameters. Using a regular top-down projector without any expensive external localization device for pose feedback, this system enabled mobile robots to accurately follow pre-designed millimeter-level printing trajectories with speed control. We evaluate the system in terms of its trajectory accuracy and printing quality compared with original 3D designs. We further demonstrated the potential of this system using two such mobile robots to collaboratively print a 3D object with dimensions of 80cm x 30cm size, which exceeds the limitation of common desktop FDM 3D printers.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
Deep Weakly Supervised Positioning
Authors:
Ruoyu Wang,
Xuchu Xu,
Li Ding,
Yang Huang,
Chen Feng
Abstract:
PoseNet can map a photo to the position where it is taken, which is appealing in robotics. However, training PoseNet requires full supervision, where ground truth positions are non-trivial to obtain. Can we train PoseNet without knowing the ground truth positions for each observation? We show that this is possible via constraint-based weak-supervision, leading to the proposed framework: DeepGPS. P…
▽ More
PoseNet can map a photo to the position where it is taken, which is appealing in robotics. However, training PoseNet requires full supervision, where ground truth positions are non-trivial to obtain. Can we train PoseNet without knowing the ground truth positions for each observation? We show that this is possible via constraint-based weak-supervision, leading to the proposed framework: DeepGPS. Particularly, using wheel-encoder-estimated distances traveled by a robot along random straight line segments as constraints between PoseNet outputs, DeepGPS can achieve a relative positioning error of less than 2%. Moreover, training DeepGPS can be done as auto-calibration with almost no human attendance, which is more attractive than its competing methods that typically require careful and expert-level manual calibration. We conduct various experiments on simulated and real datasets to demonstrate the general applicability, effectiveness, and accuracy of DeepGPS, and perform a comprehensive analysis of its robustness. Our code is available at https://ai4ce.github.io/DeepGPS/.
△ Less
Submitted 10 April, 2021;
originally announced April 2021.
-
On the Outage Performance of Network NOMA (N-NOMA) Modeled by Poisson Line Cox Point Process
Authors:
Yanshi Sun,
Zhiguo Ding,
Xuchu Dai
Abstract:
To improve the system throughput, this paper proposes a network non-orthogonal multiple access (N-NOMA) technique for the uplink coordinated multi-point transmission (CoMP). In the considered scenario, multiple base stations collaborate with each other to serve a single user, referred to as the CoMP user, which is the same as for conventional CoMP. However, unlike conventional CoMP, each base stat…
▽ More
To improve the system throughput, this paper proposes a network non-orthogonal multiple access (N-NOMA) technique for the uplink coordinated multi-point transmission (CoMP). In the considered scenario, multiple base stations collaborate with each other to serve a single user, referred to as the CoMP user, which is the same as for conventional CoMP. However, unlike conventional CoMP, each base station in N-NOMA opportunistically serves an extra user, referred to as the NOMA user, while serving the CoMP user at the same bandwidth. The CoMP user is typically located far from the base stations, whereas users close to the base stations are scheduled as NOMA users. Hence, the channel conditions of the two kind of users are very distinctive, which facilitates the implementation of NOMA. Compared to the conventional orthogonal multiple access based CoMP scheme, where multiple base stations serve a single CoMP user only, the proposed N-NOMA scheme can support larger connectivity by serving the extra NOMA users, and improve the spectral efficiency by avoiding the CoMP user solely occupying the spectrum. A stochastic geometry approach is applied to model the considered N-NOMA scenario as a Poisson cluster process, based on which closed-form analytical expressions for outage probabilities and ergodic rates are obtained. Numerical results are presented to show the accuracy of the analytical results and also demonstrate the superior performance of the proposed N-NOMA scheme.
△ Less
Submitted 13 November, 2019; v1 submitted 11 November, 2019;
originally announced November 2019.
-
A User-Centric Cooperative Scheme for UAV Assisted Wireless Networks in Malfunction Areas
Authors:
Yanshi Sun,
Zhiguo Ding,
Xuchu Dai
Abstract:
A promising application of unmanned aerial vehicles (UAVs) to the future communication networks is to address emergency communications. This paper considers such a scenario where a UAV is employed to a malfunction area (modeled as a circular disc) in which all ground base stations (BSs) break down. The ground BSs outside the malfunction area are modelled as a homogeneous Poisson point process (HPP…
▽ More
A promising application of unmanned aerial vehicles (UAVs) to the future communication networks is to address emergency communications. This paper considers such a scenario where a UAV is employed to a malfunction area (modeled as a circular disc) in which all ground base stations (BSs) break down. The ground BSs outside the malfunction area are modelled as a homogeneous Poisson point process (HPPP). Particularly, a user-centric cooperative scheme is proposed to serve the UEs in the malfunction area. According to the user equipment's (UE's) connections to the UAV and the nearest ground BS, the malfunction area is divided into three regions, namely the UAV region, the cooperation region and the nearest ground BS region, in which the UEs are served by the UAV only, both the UAV and the nearest ground BS, and the nearest ground BS, respectively. The region size of each type can be adjusted by a cooperation parameter $δ$. Through rigorous derivations, an expression for the coverage probability achieved by the UE in the malfunction area is obtained. In order to provide a fair comparison, the normalized spectral efficiency (NSE) which is defined by taking both system throughput and the number of serving BSs into consideration, is used as a criterion for the performance evaluation. Numerical results are presented to verify the accuracy of the analytical results and also to demonstrate the superior performance of the proposed scheme.
△ Less
Submitted 19 January, 2019;
originally announced February 2019.
-
Asymptotic Performance Analysis of GSVD-NOMA Systems with a Large-Scale Antenna Array
Authors:
Zhuo Chen,
Zhiguo Ding,
Xuchu Dai,
Robert Schober
Abstract:
This paper considers a multiple-input multiple-output (MIMO) downlink communication scenario with one base station and two users, where each user is equipped with m antennas and the base station is equipped with n antennas. To efficiently exploit the spectrum resources, we propose a transmission protocol which combines generalized singular value decomposition (GSVD) and non-orthogonal multiple acc…
▽ More
This paper considers a multiple-input multiple-output (MIMO) downlink communication scenario with one base station and two users, where each user is equipped with m antennas and the base station is equipped with n antennas. To efficiently exploit the spectrum resources, we propose a transmission protocol which combines generalized singular value decomposition (GSVD) and non-orthogonal multiple access (NOMA). The average data rates achieved by the two users are adopted as performance metrics for evaluation of the proposed GSVD-NOMA scheme. In particular, we first characterize the limiting distribution of the squared generalized singular values of the two users' channel matrices for the asymptotic case where the numbers of transmit and receive antennas approach infinity. Then, we calculate the normalized average individual rates of the users in the considered asymptotic regime. Furthermore, we extend the proposed GSVD-NOMA scheme to the MIMO downlink communication scenario with more than two users by using a hybrid multiple access (MA) approach, where the base station first divides the users into different groups, then the proposed GSVD-NOMA scheme is implemented within each group, and different groups are allocated with orthogonal bandwidth resources. Finally, numerical results are provided to validate the effectiveness of the proposed GSVD-NOMA protocol, and the accuracy of the developed analytical results.
△ Less
Submitted 23 May, 2018;
originally announced May 2018.
-
On the Performance of Network NOMA in Uplink CoMP Systems: A Stochastic Geometry Approach
Authors:
Yanshi Sun,
Zhiguo Ding,
Xuchu Dai,
Octavia A. Dobre
Abstract:
To improve the system throughput, this paper proposes a network non-orthogonal multiple access (N-NOMA) technique for the uplink coordinated multi-point transmission (CoMP). In the considered scenario, multiple base stations collaborate with each other to serve a single user, referred to as the CoMP user, which is the same as for conventional CoMP. However, unlike conventional CoMP, each base stat…
▽ More
To improve the system throughput, this paper proposes a network non-orthogonal multiple access (N-NOMA) technique for the uplink coordinated multi-point transmission (CoMP). In the considered scenario, multiple base stations collaborate with each other to serve a single user, referred to as the CoMP user, which is the same as for conventional CoMP. However, unlike conventional CoMP, each base station in N-NOMA opportunistically serves an extra user, referred to as the NOMA user, while serving the CoMP user at the same bandwidth. The CoMP user is typically located at the cell-edge, whereas users close to the base stations are scheduled as NOMA users. Hence, the channel conditions of the two kind of users are very distinctive, which facilitates the implementation of NOMA. Compared to the conventional orthogonal multiple access based CoMP scheme, where multiple base stations serve a single CoMP user only, the proposed N-NOMA scheme can support larger connectivity by serving the extra NOMA users, and improve the spectral efficiency by avoiding the CoMP user solely occupying the spectrum. A stochastic geometry approach is applied to model the considered N-NOMA scenario as a Poisson cluster process, based on which closed-form analytical expressions for outage probabilities and ergodic rates are obtained. Numerical results are presented to show the accuracy of the analytical results and also demonstrate the superior performance of the proposed N-NOMA scheme.
△ Less
Submitted 22 September, 2018; v1 submitted 28 February, 2018;
originally announced March 2018.
-
A Novel Network NOMA Scheme for Downlink Coordinated Three-Point Systems
Authors:
Yanshi Sun,
Zhiguo Ding,
Xuchu Dai,
George K. Karagiannidis
Abstract:
In this paper, we propose a network non-orthogonal multiple access (N-NOMA) technique for the downlink coordinated multipoint (CoMP) communication scenario of a cellular network, with randomly deployed users. In the considered N-NOMA scheme, superposition coding (SC) is employed to serve cell-edge users as well as users close to base stations (BSs) simultaneously, and distributed analog beamformin…
▽ More
In this paper, we propose a network non-orthogonal multiple access (N-NOMA) technique for the downlink coordinated multipoint (CoMP) communication scenario of a cellular network, with randomly deployed users. In the considered N-NOMA scheme, superposition coding (SC) is employed to serve cell-edge users as well as users close to base stations (BSs) simultaneously, and distributed analog beamforming by the BSs to meet the cell-edge user's quality of service (QoS) requirements. The combination of SC and distributed analog beamforming significantly complicates the expressions for the signal-to-interference-plus-noise ratio (SINR) at the reveiver, which makes the performance analysis particularly challenging. However, by using rational approximations, insightful analytical results are obtained in order to characterize the outage performance of the considered N-NOMA scheme. Computer simulation results are provided to show the superior performance of the proposed scheme as well as to demonstrate the accuracy of the analytical results.
△ Less
Submitted 13 December, 2017; v1 submitted 22 August, 2017;
originally announced August 2017.
-
RenderMap: Exploiting the Link Between Perception and Rendering for Dense Mapping
Authors:
Julian Ryde,
Xuchu,
Ding
Abstract:
We introduce an approach for the real-time (2Hz) creation of a dense map and alignment of a moving robotic agent within that map by rendering using a Graphics Processing Unit (GPU). This is done by recasting the scan alignment part of the dense mapping process as a rendering task. Alignment errors are computed from rendering the scene, comparing with range data from the sensors, and minimized by a…
▽ More
We introduce an approach for the real-time (2Hz) creation of a dense map and alignment of a moving robotic agent within that map by rendering using a Graphics Processing Unit (GPU). This is done by recasting the scan alignment part of the dense mapping process as a rendering task. Alignment errors are computed from rendering the scene, comparing with range data from the sensors, and minimized by an optimizer. The proposed approach takes advantage of the advances in rendering techniques for computer graphics and GPU hardware to accelerate the algorithm. Moreover, it allows one to exploit information not used in classic dense mapping algorithms such as Iterative Closest Point (ICP) by rendering interfaces between the free space, occupied space and the unknown. The proposed approach leverages directly the rendering capabilities of the GPU, in contrast to other GPU-based approaches that deploy the GPU as a general purpose parallel computation platform.
We argue that the proposed concept is a general consequence of treating perception problems as inverse problems of rendering. Many perception problems can be recast into a form where much of the computation is replaced by render operations. This is not only efficient since rendering is fast, but also simpler to implement and will naturally benefit from future advancements in GPU speed and rendering techniques. Furthermore, this general concept can go beyond addressing perception problems and can be used for other problem domains such as path planning.
△ Less
Submitted 20 February, 2017;
originally announced February 2017.
-
Physical Layer Security Jamming: Theoretical Limits and Practical Designs in Wireless Networks
Authors:
Kanapathippillai Cumanan,
Hong Xing,
Peng Xu,
Gan Zheng,
Xuchu Dai,
Arumugam Nallanathan,
Zhiguo Ding,
George K. Karagiannidis
Abstract:
Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. In this approach, jamming plays a key role by generating noise signals to confuse the potential eavesdropp…
▽ More
Physical layer security has been recently recognized as a promising new design paradigm to provide security in wireless networks. In addition to the existing conventional cryptographic methods, physical layer security exploits the dynamics of fading channels to enhance secured wireless links. In this approach, jamming plays a key role by generating noise signals to confuse the potential eavesdroppers, and significantly improves quality and reliability of secure communications between legitimate terminals. This article presents theoretical limits and practical designs of jamming approaches for physical layer security. In particular, the theoretical limits explore the achievable secrecy rates of user cooperation based jamming whilst the centralized, and game theoretic based precoding techniques are reviewed for practical implementations. In addition, the emerging wireless energy harvesting techniques are exploited to harvest the required energy to transmit jamming signals. Future directions of these approaches, and the associated research challenges are also briefly outlined.
△ Less
Submitted 20 January, 2017;
originally announced January 2017.
-
A Mathematical Proof of the Superiority of NOMA Compared to Conventional OMA
Authors:
Zhiyong Chen,
Zhiguo Ding,
Xuchu Dai,
Rui Zhang
Abstract:
While existing works about non-orthogonal multiple access (NOMA) have indicated that NOMA can yield a significant performance gain over orthogonal multiple access (OMA) with fixed resource allocation, it is not clear whether such a performance gain will diminish when optimal resource (Time/Frequency/Power) allocation is carried out. In this paper, the performance comparison between NOMA and conven…
▽ More
While existing works about non-orthogonal multiple access (NOMA) have indicated that NOMA can yield a significant performance gain over orthogonal multiple access (OMA) with fixed resource allocation, it is not clear whether such a performance gain will diminish when optimal resource (Time/Frequency/Power) allocation is carried out. In this paper, the performance comparison between NOMA and conventional OMA systems is investigated, from an optimization point of view. Firstly, by using the idea of power splitting, a closed-form expression for the optimum sum rate of NOMA systems is derived. Then, with rigorous mathematical proofs, we reveal the fact that NOMA can always outperform conventional OMA systems, even if both are equipped with the optimal resource allocation policies. Finally, computer simulations are conducted to validate the accuracy of the analytical results.
△ Less
Submitted 4 December, 2016;
originally announced December 2016.
-
On the Outage Performance of Non-Orthogonal Multiple Access with One-Bit Feedback
Authors:
Peng Xu,
Yi Yuan,
Zhiguo Ding,
Xuchu Dai,
Robert Schober
Abstract:
In this paper, the outage performance of downlink non-orthogonal multiple access (NOMA) is investigated for the case where each user feeds back only one bit of its channel state information (CSI) to the base station. Conventionally, opportunistic one-bit feedback has been used in fading broadcast channels to select only one user for transmission. In contrast, the considered NOMA scheme adopts supe…
▽ More
In this paper, the outage performance of downlink non-orthogonal multiple access (NOMA) is investigated for the case where each user feeds back only one bit of its channel state information (CSI) to the base station. Conventionally, opportunistic one-bit feedback has been used in fading broadcast channels to select only one user for transmission. In contrast, the considered NOMA scheme adopts superposition coding to serve all users simultaneously in order to improve user fairness. A closed-form expression for the common outage probability (COP) is derived, along with the optimal diversity gains under two types of power constraints. Particularly, it is demonstrated that the diversity gain under a long-term power constraint is twice as large as that under a short-term power constraint. Furthermore, we study dynamic power allocation optimization for minimizing the COP, based on one-bit CSI feedback. This problem is challenging since the objective function is non-convex; however, under the short-term power constraint, we demonstrate that the original problem can be transformed into a set of convex problems. Under the long-term power constraint, an asymptotically optimal solution is obtained for high signal-to-noise ratio.
△ Less
Submitted 17 May, 2016;
originally announced May 2016.
-
A bi-criteria path planning algorithm for robotics applications
Authors:
Zachary Clawson,
Xuchu Ding,
Brendan Englot,
Thomas A. Frewen,
William M. Sisson,
Alexander Vladimirsky
Abstract:
Realistic path planning applications often require optimizing with respect to several criteria simultaneously. Here we introduce an efficient algorithm for bi-criteria path planning on graphs. Our approach is based on augmenting the state space to keep track of the "budget" remaining to satisfy the constraints on secondary cost. The resulting augmented graph is acyclic and the primary cost can be…
▽ More
Realistic path planning applications often require optimizing with respect to several criteria simultaneously. Here we introduce an efficient algorithm for bi-criteria path planning on graphs. Our approach is based on augmenting the state space to keep track of the "budget" remaining to satisfy the constraints on secondary cost. The resulting augmented graph is acyclic and the primary cost can be then minimized by a simple upward sweep through budget levels. The efficiency and accuracy of our algorithm is tested on Probabilistic Roadmap graphs to minimize the distance of travel subject to a constraint on the overall threat exposure of the robot. We also present the results from field experiments illustrating the use of this approach on realistic robotic systems.
△ Less
Submitted 8 January, 2017; v1 submitted 3 November, 2015;
originally announced November 2015.
-
NOMA: An Information Theoretic Perspective
Authors:
Peng Xu,
Zhiguo Ding,
Xuchu Dai,
H. Vincent Poor
Abstract:
In this letter, the performance of non-orthogonal multiple access (NOMA) is investigated from an information theoretic perspective. The relationships among the capacity region of broadcast channels and two rate regions achieved by NOMA and time-division multiple access (TDMA) are illustrated first. Then, the performance of NOMA is evaluated by considering TDMA as the benchmark, where both the sum…
▽ More
In this letter, the performance of non-orthogonal multiple access (NOMA) is investigated from an information theoretic perspective. The relationships among the capacity region of broadcast channels and two rate regions achieved by NOMA and time-division multiple access (TDMA) are illustrated first. Then, the performance of NOMA is evaluated by considering TDMA as the benchmark, where both the sum rate and the individual user rates are used as the criteria. In a wireless downlink scenario with user pairing, the developed analytical results show that NOMA can outperform TDMA not only for the sum rate but also for each user's individual rate, particularly when the difference between the users' channels is large.
△ Less
Submitted 12 May, 2015; v1 submitted 29 April, 2015;
originally announced April 2015.
-
The Private Key Capacity of a Cooperative Pairwise-Independent Network
Authors:
Peng Xu,
Zhiguo Ding,
Xuchu Dai
Abstract:
This paper studies the private key generation of a cooperative pairwise-independent network (PIN) with M+2 terminals (Alice, Bob and M relays), M >= 2. In this PIN, the correlated sources observed by every pair of terminals are independent of those sources observed by any other pair of terminal. All the terminals can communicate with each other over a public channel which is also observed by Eve n…
▽ More
This paper studies the private key generation of a cooperative pairwise-independent network (PIN) with M+2 terminals (Alice, Bob and M relays), M >= 2. In this PIN, the correlated sources observed by every pair of terminals are independent of those sources observed by any other pair of terminal. All the terminals can communicate with each other over a public channel which is also observed by Eve noiselessly. The objective is to generate a private key between Alice and Bob under the help of the M relays; such a private key needs to be protected not only from Eve but also from individual relays simultaneously. The private key capacity of this PIN model is established, whose lower bound is obtained by proposing a novel random binning (RB) based key generation algorithm, and the upper bound is obtained based on the construction of M enhanced source models. The two bounds are shown to be exactly the same. Then, we consider a cooperative wireless network and use the estimates of fading channels to generate private keys. It has been shown that the proposed RB-based algorithm can achieve a multiplexing gain M-1, an improvement in comparison with the existing XOR- based algorithm whose achievable multiplexing gain is about [M]/2.
△ Less
Submitted 13 April, 2015;
originally announced April 2015.
-
Application of Analog Network Coding to MIMO Two-Way Relay Channel in Cellular Systems
Authors:
Ming Gan,
Zhiguo Ding,
Xuchu Dai
Abstract:
An efficient analog network coding transmission protocol is proposed in this letter for a MIMO two way cellular network. Block signal alignment is first proposed to null the inter-user interference for multi-antenna users, which makes the dimensions of aligned space larger compared with the existing signal alignment. Two algorithms are developed to jointly design the precoding matrices at the rela…
▽ More
An efficient analog network coding transmission protocol is proposed in this letter for a MIMO two way cellular network. Block signal alignment is first proposed to null the inter-user interference for multi-antenna users, which makes the dimensions of aligned space larger compared with the existing signal alignment. Two algorithms are developed to jointly design the precoding matrices at the relay and BS for outage optimization. Especially, the last algorithm is designed to maximize the effective channel gain to the effective noise gain ratio. The performance of this transmission protocol is also verified by simulations.
△ Less
Submitted 16 August, 2013;
originally announced August 2013.
-
Distributed Ranging and Localization for Wireless Networks via Compressed Sensing
Authors:
Ming Gan,
Dongning Guo,
Xuchu Dai
Abstract:
Location-based services in a wireless network require nodes to know their locations accurately. Conventional solutions rely on contention-based medium access, where only one node can successfully transmit at any time in any neighborhood. In this paper, a novel, complete, distributed ranging and localization solution is proposed, which let all nodes in the network broadcast their location estimates…
▽ More
Location-based services in a wireless network require nodes to know their locations accurately. Conventional solutions rely on contention-based medium access, where only one node can successfully transmit at any time in any neighborhood. In this paper, a novel, complete, distributed ranging and localization solution is proposed, which let all nodes in the network broadcast their location estimates and measure distances to all neighbors simultaneously. An on-off signaling is designed to overcome the physical half-duplex constraint. In each iteration, all nodes transmit simultaneously, each broadcasting codewords describing the current location estimate. From the superposed signals from all neighbors, each node decodes their neighbors' locations and also estimates their distances using the signal strengths. The node then broadcasts its improved location estimates in the subsequent iteration. Simulations demonstrate accurate localization throughout a large network over a few thousand symbol intervals, suggesting much higher efficiency than conventional schemes based on ALOHA or CSMA.
△ Less
Submitted 9 September, 2013; v1 submitted 16 August, 2013;
originally announced August 2013.
-
Finite Bisimulations for Switched Linear Systems
Authors:
Ebru Aydin Gol,
Xuchu Ding,
Mircea Lazar,
Calin Belta
Abstract:
In this paper, we consider the problem of constructing a finite bisimulation quotient for a discrete-time switched linear system in a bounded subset of its state space. Given a set of observations over polytopic subsets of the state space and a switched linear system with stable subsystems, the proposed algorithm generates the bisimulation quotient in a finite number of steps with the aid of suble…
▽ More
In this paper, we consider the problem of constructing a finite bisimulation quotient for a discrete-time switched linear system in a bounded subset of its state space. Given a set of observations over polytopic subsets of the state space and a switched linear system with stable subsystems, the proposed algorithm generates the bisimulation quotient in a finite number of steps with the aid of sublevel sets of a polyhedral Lyapunov function. Starting from a sublevel set that includes the origin in its interior, the proposed algorithm iteratively constructs the bisimulation quotient for any larger sublevel set. The bisimulation quotient can then be further used for synthesis of the switching law and system verification with respect to specifications given as syntactically co-safe Linear Temporal Logic formulas over the observed polytopic subsets.
△ Less
Submitted 27 August, 2012;
originally announced August 2012.
-
On the Application of Noisy Network Coding to the Relay-Eavesdropper Channel
Authors:
Peng Xu,
Zhiguo Ding,
and Xuchu Dai,
Kin Leung
Abstract:
In this paper, we consider the design of a new secrecy transmission scheme for a four-node relay-eavesdropper channel. The key idea of the proposed scheme is to combine noisy network coding with the interference assisted strategy for wiretap channel with a helping interferer. A new achievable secrecy rate is characterized for both discrete memoryless and Gaussian channels. Such a new rate can be v…
▽ More
In this paper, we consider the design of a new secrecy transmission scheme for a four-node relay-eavesdropper channel. The key idea of the proposed scheme is to combine noisy network coding with the interference assisted strategy for wiretap channel with a helping interferer. A new achievable secrecy rate is characterized for both discrete memoryless and Gaussian channels. Such a new rate can be viewed as a general framework, where the existing interference assisted schemes such as noisy-forwarding and cooperative jamming approaches can be shown as special cases of the proposed scheme. In addition, under some channel condition where the existing schemes can only achieve zero secrecy rate, the proposed secrecy scheme can still offer significant performance gains.
△ Less
Submitted 26 March, 2012;
originally announced March 2012.
-
Temporal Logic Motion Control using Actor-Critic Methods
Authors:
Xu Chu Ding,
Jing Wang,
Morteza Lahijanian,
Ioannis Ch. Paschalidis,
Calin A. Belta
Abstract:
In this paper, we consider the problem of deploying a robot from a specification given as a temporal logic statement about some properties satisfied by the regions of a large, partitioned environment. We assume that the robot has noisy sensors and actuators and model its motion through the regions of the environment as a Markov Decision Process (MDP). The robot control problem becomes finding the…
▽ More
In this paper, we consider the problem of deploying a robot from a specification given as a temporal logic statement about some properties satisfied by the regions of a large, partitioned environment. We assume that the robot has noisy sensors and actuators and model its motion through the regions of the environment as a Markov Decision Process (MDP). The robot control problem becomes finding the control policy maximizing the probability of satisfying the temporal logic task on the MDP. For a large environment, obtaining transition probabilities for each state-action pair, as well as solving the necessary optimization problem for the optimal policy are usually not computationally feasible. To address these issues, we propose an approximate dynamic programming framework based on a least-square temporal difference learning method of the actor-critic type. This framework operates on sample paths of the robot and optimizes a randomized control policy with respect to a small set of parameters. The transition probabilities are obtained only when needed. Hardware-in-the-loop simulations confirm that convergence of the parameters translates to an approximately optimal policy.
△ Less
Submitted 23 February, 2012; v1 submitted 9 February, 2012;
originally announced February 2012.
-
Robust Multi-Robot Optimal Path Planning with Temporal Logic Constraints
Authors:
Alphan Ulusoy,
Stephen L. Smith,
Xu Chu Ding,
Calin Belta
Abstract:
In this paper we present a method for automatically planning robust optimal paths for a group of robots that satisfy a common high level mission specification. Each robot's motion in the environment is modeled as a weighted transition system, and the mission is given as a Linear Temporal Logic (LTL) formula over a set of propositions satisfied by the regions of the environment. In addition, an opt…
▽ More
In this paper we present a method for automatically planning robust optimal paths for a group of robots that satisfy a common high level mission specification. Each robot's motion in the environment is modeled as a weighted transition system, and the mission is given as a Linear Temporal Logic (LTL) formula over a set of propositions satisfied by the regions of the environment. In addition, an optimizing proposition must repeatedly be satisfied. The goal is to minimize the maximum time between satisfying instances of the optimizing proposition while ensuring that the LTL formula is satisfied even with uncertainty in the robots' traveling times. We characterize a class of LTL formulas that are robust to robot timing errors, for which we generate optimal paths if no timing errors are present, and we present bounds on the deviation from the optimal values in the presence of errors. We implement and experimentally evaluate our method considering a persistent monitoring task in a road network environment.
△ Less
Submitted 10 July, 2012; v1 submitted 6 February, 2012;
originally announced February 2012.
-
Synthesis of Distributed Control and Communication Schemes from Global LTL Specifications
Authors:
Yushan Chen,
Xu Chu Ding,
Calin Belta
Abstract:
We introduce a technique for synthesis of control and communication strategies for a team of agents from a global task specification given as a Linear Temporal Logic (LTL) formula over a set of properties that can be satisfied by the agents. We consider a purely discrete scenario, in which the dynamics of each agent is modeled as a finite transition system. The proposed computational framework con…
▽ More
We introduce a technique for synthesis of control and communication strategies for a team of agents from a global task specification given as a Linear Temporal Logic (LTL) formula over a set of properties that can be satisfied by the agents. We consider a purely discrete scenario, in which the dynamics of each agent is modeled as a finite transition system. The proposed computational framework consists of two main steps. First, we extend results from concurrency theory to check whether the specification is distributable among the agents. Second, we generate individual control and communication strategies by using ideas from LTL model checking. We apply the method to automatically deploy a team of miniature cars in our Robotic Urban-Like Environment.
△ Less
Submitted 6 September, 2011;
originally announced September 2011.
-
Least Squares Temporal Difference Actor-Critic Methods with Applications to Robot Motion Control
Authors:
Reza Moazzez Estanjini,
Xu Chu Ding,
Morteza Lahijanian,
Jing Wang,
Calin A. Belta,
Ioannis Ch. Paschalidis
Abstract:
We consider the problem of finding a control policy for a Markov Decision Process (MDP) to maximize the probability of reaching some states while avoiding some other states. This problem is motivated by applications in robotics, where such problems naturally arise when probabilistic models of robot motion are required to satisfy temporal logic task specifications. We transform this problem into a…
▽ More
We consider the problem of finding a control policy for a Markov Decision Process (MDP) to maximize the probability of reaching some states while avoiding some other states. This problem is motivated by applications in robotics, where such problems naturally arise when probabilistic models of robot motion are required to satisfy temporal logic task specifications. We transform this problem into a Stochastic Shortest Path (SSP) problem and develop a new approximate dynamic programming algorithm to solve it. This algorithm is of the actor-critic type and uses a least-square temporal difference learning method. It operates on sample paths of the system and optimizes the policy within a pre-specified class parameterized by a parsimonious set of parameters. We show its convergence to a policy corresponding to a stationary point in the parameters' space. Simulation results confirm the effectiveness of the proposed solution.
△ Less
Submitted 30 August, 2011; v1 submitted 23 August, 2011;
originally announced August 2011.
-
Multi-robot Deployment From LTL Specifications with Reduced Communication
Authors:
Marius Kloetzer,
Xu Chu Ding,
Calin Belta
Abstract:
In this paper, we develop a computational framework for fully automatic deployment of a team of unicycles from a global specification given as an LTL formula over some regions of interest. Our hierarchical approach consists of four steps: (i) the construction of finite abstractions for the motions of each robot, (ii) the parallel composition of the abstractions, (iii) the generation of a satisfyin…
▽ More
In this paper, we develop a computational framework for fully automatic deployment of a team of unicycles from a global specification given as an LTL formula over some regions of interest. Our hierarchical approach consists of four steps: (i) the construction of finite abstractions for the motions of each robot, (ii) the parallel composition of the abstractions, (iii) the generation of a satisfying motion of the team; (iv) mapping this motion to individual robot control and communication strategies. The main result of the paper is an algorithm to reduce the amount of inter-robot communication during the fourth step of the procedure.
△ Less
Submitted 16 August, 2011;
originally announced August 2011.
-
An Optimal Control Approach for the Persistent Monitoring Problem
Authors:
Christos G. Cassandras,
Xu Chu Ding,
Xuchao Lin
Abstract:
We propose an optimal control framework for persistent monitoring problems where the objective is to control the movement of mobile agents to minimize an uncertainty metric in a given mission space. For a single agent in a one-dimensional space, we show that the optimal solution is obtained in terms of a sequence of switching locations, thus reducing it to a parametric optimization problem. Using…
▽ More
We propose an optimal control framework for persistent monitoring problems where the objective is to control the movement of mobile agents to minimize an uncertainty metric in a given mission space. For a single agent in a one-dimensional space, we show that the optimal solution is obtained in terms of a sequence of switching locations, thus reducing it to a parametric optimization problem. Using Infinitesimal Perturbation Analysis (IPA) we obtain a complete solution through a gradient-based algorithm. We also discuss a receding horizon controller which is capable of obtaining a near-optimal solution on-the-fly. We illustrate our approach with numerical examples.
△ Less
Submitted 5 October, 2011; v1 submitted 16 August, 2011;
originally announced August 2011.
-
Optimal Multi-Robot Path Planning with Temporal Logic Constraints
Authors:
Alphan Ulusoy,
Stephen L. Smith,
Xu Chu Ding,
Calin Belta,
Daniela Rus
Abstract:
In this paper we present a method for automatically planning optimal paths for a group of robots that satisfy a common high level mission specification. Each robot's motion in the environment is modeled as a weighted transition system. The mission is given as a Linear Temporal Logic formula. In addition, an optimizing proposition must repeatedly be satisfied. The goal is to minimize the maximum ti…
▽ More
In this paper we present a method for automatically planning optimal paths for a group of robots that satisfy a common high level mission specification. Each robot's motion in the environment is modeled as a weighted transition system. The mission is given as a Linear Temporal Logic formula. In addition, an optimizing proposition must repeatedly be satisfied. The goal is to minimize the maximum time between satisfying instances of the optimizing proposition. Our method is guaranteed to compute an optimal set of robot paths. We utilize a timed automaton representation in order to capture the relative position of the robots in the environment. We then obtain a bisimulation of this timed automaton as a finite transition system that captures the joint behavior of the robots and apply our earlier algorithm for the single robot case to optimize the group motion. We present a simulation of a persistent monitoring task in a road network environment.
△ Less
Submitted 30 June, 2011;
originally announced July 2011.
-
LTL Control in Uncertain Environments with Probabilistic Satisfaction Guarantees
Authors:
Xu Chu Ding,
Stephen L. Smith,
Calin Belta,
Daniela Rus
Abstract:
We present a method to generate a robot control strategy that maximizes the probability to accomplish a task. The task is given as a Linear Temporal Logic (LTL) formula over a set of properties that can be satisfied at the regions of a partitioned environment. We assume that the probabilities with which the properties are satisfied at the regions are known, and the robot can determine the truth va…
▽ More
We present a method to generate a robot control strategy that maximizes the probability to accomplish a task. The task is given as a Linear Temporal Logic (LTL) formula over a set of properties that can be satisfied at the regions of a partitioned environment. We assume that the probabilities with which the properties are satisfied at the regions are known, and the robot can determine the truth value of a proposition only at the current region. Motivated by several results on partitioned-based abstractions, we assume that the motion is performed on a graph. To account for noisy sensors and actuators, we assume that a control action enables several transitions with known probabilities. We show that this problem can be reduced to the problem of generating a control policy for a Markov Decision Process (MDP) such that the probability of satisfying an LTL formula over its states is maximized. We provide a complete solution for the latter problem that builds on existing results from probabilistic model checking. We include an illustrative case study.
△ Less
Submitted 7 April, 2011; v1 submitted 6 April, 2011;
originally announced April 2011.
-
MDP Optimal Control under Temporal Logic Constraints
Authors:
Xu Chu Ding,
Stephen L. Smith,
Calin Belta,
Daniela Rus
Abstract:
In this paper, we develop a method to automatically generate a control policy for a dynamical system modeled as a Markov Decision Process (MDP). The control specification is given as a Linear Temporal Logic (LTL) formula over a set of propositions defined on the states of the MDP. We synthesize a control policy such that the MDP satisfies the given specification almost surely, if such a policy exi…
▽ More
In this paper, we develop a method to automatically generate a control policy for a dynamical system modeled as a Markov Decision Process (MDP). The control specification is given as a Linear Temporal Logic (LTL) formula over a set of propositions defined on the states of the MDP. We synthesize a control policy such that the MDP satisfies the given specification almost surely, if such a policy exists. In addition, we designate an "optimizing proposition" to be repeatedly satisfied, and we formulate a novel optimization criterion in terms of minimizing the expected cost in between satisfactions of this proposition. We propose a sufficient condition for a policy to be optimal, and develop a dynamic programming algorithm that synthesizes a policy that is optimal under some conditions, and sub-optimal otherwise. This problem is motivated by robotic applications requiring persistent tasks, such as environmental monitoring or data gathering, to be performed.
△ Less
Submitted 23 March, 2011; v1 submitted 22 March, 2011;
originally announced March 2011.
-
Probabilistically Safe Vehicle Control in a Hostile Environment
Authors:
Igor Cizelj,
Xu Chu Ding,
Morteza Lahijanian,
Alessandro Pinto,
Calin Belta
Abstract:
In this paper we present an approach to control a vehicle in a hostile environment with static obstacles and moving adversaries. The vehicle is required to satisfy a mission objective expressed as a temporal logic specification over a set of properties satisfied at regions of a partitioned environment. We model the movements of adversaries in between regions of the environment as Poisson processes…
▽ More
In this paper we present an approach to control a vehicle in a hostile environment with static obstacles and moving adversaries. The vehicle is required to satisfy a mission objective expressed as a temporal logic specification over a set of properties satisfied at regions of a partitioned environment. We model the movements of adversaries in between regions of the environment as Poisson processes. Furthermore, we assume that the time it takes for the vehicle to traverse in between two facets of each region is exponentially distributed, and we obtain the rate of this exponential distribution from a simulator of the environment. We capture the motion of the vehicle and the vehicle updates of adversaries distributions as a Markov Decision Process. Using tools in Probabilistic Computational Tree Logic, we find a control strategy for the vehicle that maximizes the probability of accomplishing the mission objective. We demonstrate our approach with illustrative case studies.
△ Less
Submitted 24 March, 2011; v1 submitted 21 March, 2011;
originally announced March 2011.