53 research outputs found

    Resilient dynamic state estimation in the presence of false information injection attacks

    Get PDF
    The impact of false information injection is investigated for linear dynamic systems with multiple sensors. First, it is assumed that the system is unaware of the existence of false information and the adversary is trying to maximize the negative effect of the false information on Kalman filter\u27s estimation performance under a power constraint. The false information attack under different conditions is mathematically characterized. For the adversary, many closed-form results for the optimal attack strategies that maximize the Kalman filter\u27s estimation error are theoretically derived. It is shown that by choosing the optimal correlation coefficients among the false information and allocating power optimally among sensors, the adversary could significantly increase the Kalman filter\u27s estimation errors. In order to detect the false information injected by an adversary, we investigate the strategies for the Bayesian estimator to detect the false information and defend itself from such attacks. We assume that the adversary attacks the system with certain probability, and that he/she adopts the worst possible strategy that maximizes the mean squared error (MSE) if the attack is undetected. An optimal Bayesian detector is designed which minimizes the average system estimation error instead of minimizing the probability of detection error, as a conventional Bayesian detector typically does. The case that the adversary attacks the system continuously is also studied. In this case, sparse attack strategies in multi-sensor dynamic systems are investigated from the adversary\u27s point of view. It is assumed that the defender can perfectly detect and remove the sensors once they are corrupted by false information injected by an adversary. The adversary\u27s goal is to maximize the covariance matrix of the system state estimate by the end of attack period under the constraint that the adversary can only attack the system a few times over the sensor and over the time, which leads to an integer programming problem. In order to overcome the prohibitive complexity of the exhaustive search, polynomial-time algorithms, such as greedy search and dynamic programming, are proposed to find the suboptimal attack strategies. As for greedy search, it starts with an empty set, and one sensor is added at each iteration, whose elimination will lead to the maximum system estimation error. The process terminates when the cardinality of the active set reaches to the sparsity constraint. Greedy search based approaches such as sequential forward selection (SFS), sequential backward selection (SBS), and simplex improved sequential forward selection (SFS-SS) are discussed and corresponding attack strategies are provided. Dynamic programming is also used in obtaining the sub-optimal attack strategy. The validity of dynamic programming lies on a straightforward but important nature of dynamic state estimation systems: the credibility of the state estimate at current step is in accordance with that at previous step. The problem of false information attack on and the Kalman filter\u27s defense of state estimation in dynamic multi-sensor systems is also investigated from a game theoretic perspective. The relationship between the Kalman filter and the adversary can be regarded as a two-person zero-sum game. The condition under which both sides of the game will reach a Nash equilibrium is investigated

    Optimization of Safety Control System for Civil Infrastructure Construction Projects

    Get PDF
    Labor-intensive repetitive activities are common in civil construction projects. Construction workers are prone to developing musculoskeletal disorders-related injuries while performing such tasks. The government regulatory agency provides minimum safety requirement guidelines to the construction industry that might not be sufficient to prevent accidents and injuries in a construction site. Also, the regulations do not provide insight into what can be done beyond the mandatory requirements to maximize safety and underscore the level of safety that can be attained and sustained on a site. The research addresses the aforestated problem in three stages: (i) identification of theoretical maximum attainable level of safety, safety frontier, (ii) identification of underlying system inefficiencies and operational inefficiencies, and (iii) identification of achievable level of safety, sustainable safety. The research proposes a novel approach to identify the safety frontier by kinetic analysis of the human body while performing labor-intensive repetitive tasks. The task is a combination of different unique actions, which further involve several movements. For identifying a safe working procedure, each movement frame needs to be analyzed to compute the joint stress. Multiple instances of repetitive tasks can then be analyzed to identify unique actions exerting minimum stress on joints. The safety frontier is a combination of such unique actions. For this, the research proposes to track the skeletal positional data of workers performing different repetitive tasks. Unique actions involved in all tasks were identified for each movement frame. For this, several machine learning techniques were implemented. Moreover, the inverse dynamics principle was used to compute the stress induced by essential joints. In addition to the inverse dynamics principle, several machine learning algorithms were implemented to predict lower back moments. Then, the safety frontier was computed, combining the unique actions exerting minimum stress to the joints. Furthermore, the research conducted a questionnaire survey with construction experts to identify the factors affecting system inefficiencies that are not under the control of the project management team and operational inefficiencies that are under control. Then, the sustainable safety was computed by adding system inefficiencies to the safety frontier and removing operational inefficiencies from observed safety. The research validated the applicability of the proposed methodology in a real construction site. The application of random forest classifier, one-vs-rest classifier, and support vector machine approach were validated with high accuracy (\u3e95%). Similarly, random forest regressor, lasso regression, gradient boosting evaluation, stacking regression, and deep neural network were explored to predict the lower back moment. Random forest regressor and deep neural network predicted the lower back moment with an explained variance of 0.582 and 0.700, respectively. The computed safety frontier and sustainable safety can potentially facilitate the construction sector to improve safety strategies by providing a higher safety benchmark for monitoring, including the ability to monitor postural safety in real-time. Moreover, different industrial sectors such as manufacturing and agriculture can implement the similar approach to identify safe working postures for any labor-intensive repetitive task

    Temporal Signature Modeling and Analysis

    Get PDF
    A vast amount of digital satellite and aerial images are collected over time, which calls for techniques to extract useful high-level information, such as recognizable events. One part of this thesis proposes a framework for streaming analysis of the time series, which can recognize events without supervision and memorize them by building the temporal contexts. The memorized historical data is then used to predict the future and detect anomalies. A new incremental clustering method is proposed to recognize the event without training. A memorization method of double localization, including relative and absolute localization, is proposed to model the temporal context. Finally, the predictive model is built based on the method of memorization. The Edinburgh Pedestrian Dataset , which offers about 1000 observed trajectories of pedestrians detected in camera images each working day for several months, is used as an example to illustrate the framework. Although there is a large amount of image data captured, most of them are not available to the public. The other part of this thesis developed a method of generating spatial-spectral-temporal synthetic images by enhancing the capacity of a current tool called DIRISG (Digital Imaging and Remote Sensing Image Generation). Currently, DIRSIG can only model limited temporal signatures. In order to observe general temporal changes in a process within the scene, a process model, which links the observable signatures of interest temporally, should be developed and incorporated into DIRSIG. The sub process models could be categorized into two types. One is that the process model drives the property of each facet of the object changing over time, and the other one is to drive the geometry location of the object in the scene changing as a function of time. Two example process models are used to show how process models can be incorporated into DIRSIG

    Advanced Control and Estimation Concepts, and New Hardware Topologies for Future Mobility

    Get PDF
    According to the National Research Council, the use of embedded systems throughout society could well overtake previous milestones in the information revolution. Mechatronics is the synergistic combination of electronic, mechanical engineering, controls, software and systems engineering in the design of processes and products. Mechatronic systems put “intelligence” into physical systems. Embedded sensors/actuators/processors are integral parts of mechatronic systems. The implementation of mechatronic systems is consistently on the rise. However, manufacturers are working hard to reduce the implementation cost of these systems while trying avoid compromising product quality. One way of addressing these conflicting objectives is through new automatic control methods, virtual sensing/estimation, and new innovative hardware topologies

    MOTChallenge: A Benchmark for Single-Camera Multiple Target Tracking

    Full text link
    Standardized benchmarks have been crucial in pushing the performance of computer vision algorithms, especially since the advent of deep learning. Although leaderboards should not be over-claimed, they often provide the most objective measure of performance and are therefore important guides for research. We present MOTChallenge, a benchmark for single-camera Multiple Object Tracking (MOT) launched in late 2014, to collect existing and new data, and create a framework for the standardized evaluation of multiple object tracking methods. The benchmark is focused on multiple people tracking, since pedestrians are by far the most studied object in the tracking community, with applications ranging from robot navigation to self-driving cars. This paper collects the first three releases of the benchmark: (i) MOT15, along with numerous state-of-the-art results that were submitted in the last years, (ii) MOT16, which contains new challenging videos, and (iii) MOT17, that extends MOT16 sequences with more precise labels and evaluates tracking performance on three different object detectors. The second and third release not only offers a significant increase in the number of labeled boxes but also provide labels for multiple object classes beside pedestrians, as well as the level of visibility for every single object of interest. We finally provide a categorization of state-of-the-art trackers and a broad error analysis. This will help newcomers understand the related work and research trends in the MOT community, and hopefully shed some light on potential future research directions.Comment: Accepted at IJC

    Harnessing Big Data for Characterizing Driving Volatility in Instantaneous Driving Decisions – Implications for Intelligent Transportation Systems

    Get PDF
    This dissertation focuses on combining connected vehicles data, naturalistic driving sensor and telematics data, and traditional transportation data to prospect opportunities for engineering smart and proactive transportation systems.The key idea behind the dissertation is to understand (and where possible reduce) “driving volatility” in instantaneous driving decisions and increase driving and locational stability. As a new measure of micro driving behaviors, the concept of “driving volatility” captures the extent of variations in driving, especially hard accelerations/braking, jerky maneuvers, and frequent switching between different driving regimes. The key motivation behind analyzing driving volatility is to help predict what drivers will do in the short term. Consequently, this dissertation develops a “volatility matrix” which takes a systems approach to operationalizing driving volatility at different levels, trip-based volatility, location-based volatility, event-based volatility, and driver-based volatility. At the trip-level, the dynamics of driving regimes extracted from Basic Safety Messages transmitted between connected vehicles are analyzed at a microscopic level, and where the interactions between microscopic driving decisions and ecosystem of mapped local traffic states in close proximity surrounding the host vehicle are characterized. Another new idea relates to extending driving volatility to specific network locations, termed as “location-based volatility”. A new methodology is proposed for combining emerging connected vehicles data with traditional transportation data (crash, traffic, road geometrics data, etc.) to identify roadway locations where traffic crashes are waiting to happen. The idea of event-based and driver-based volatility introduces the notion that volatility in longitudinal and lateral directions prior to involvement in safety critical events (crashes/near-crashes) can be a leading indicator of proactive safety.Overall, by studying driving volatility from different lenses, the dissertation contributes to the scientific analysis of real-world connected vehicles data, and to generate actionable knowledge relevant to the design of smart and intelligent transportation systems. The concept of driving volatility matrix provides a systems framework for characterizing the health of three fundamental elements of a transportation system: health of driver, environment, and the vehicle. The implications of the findings and potential applications to proactive network level screening, customized driver assist and control systems, driving performance monitoring are discussed in detail

    Advances in Public Transport Platform for the Development of Sustainability Cities

    Get PDF
    Modern societies demand high and varied mobility, which in turn requires a complex transport system adapted to social needs that guarantees the movement of people and goods in an economically efficient and safe way, but all are subject to a new environmental rationality and the new logic of the paradigm of sustainability. From this perspective, an efficient and flexible transport system that provides intelligent and sustainable mobility patterns is essential to our economy and our quality of life. The current transport system poses growing and significant challenges for the environment, human health, and sustainability, while current mobility schemes have focused much more on the private vehicle that has conditioned both the lifestyles of citizens and cities, as well as urban and territorial sustainability. Transport has a very considerable weight in the framework of sustainable development due to environmental pressures, associated social and economic effects, and interrelations with other sectors. The continuous growth that this sector has experienced over the last few years and its foreseeable increase, even considering the change in trends due to the current situation of generalized crisis, make the challenge of sustainable transport a strategic priority at local, national, European, and global levels. This Special Issue will pay attention to all those research approaches focused on the relationship between evolution in the area of transport with a high incidence in the environment from the perspective of efficiency

    Television broadcast from space systems: Technology, costs

    Get PDF
    Broadcast satellite systems are described. The technologies which are unique to both high power broadcast satellites and small TV receive-only earth terminals are also described. A cost assessment of both space and earth segments is included and appendices present both a computer model for satellite cost and the pertinent reported experience with the Japanese BSE

    Systematic Approaches for Telemedicine and Data Coordination for COVID-19 in Baja California, Mexico

    Get PDF
    Conference proceedings info: ICICT 2023: 2023 The 6th International Conference on Information and Computer Technologies Raleigh, HI, United States, March 24-26, 2023 Pages 529-542We provide a model for systematic implementation of telemedicine within a large evaluation center for COVID-19 in the area of Baja California, Mexico. Our model is based on human-centric design factors and cross disciplinary collaborations for scalable data-driven enablement of smartphone, cellular, and video Teleconsul-tation technologies to link hospitals, clinics, and emergency medical services for point-of-care assessments of COVID testing, and for subsequent treatment and quar-antine decisions. A multidisciplinary team was rapidly created, in cooperation with different institutions, including: the Autonomous University of Baja California, the Ministry of Health, the Command, Communication and Computer Control Center of the Ministry of the State of Baja California (C4), Colleges of Medicine, and the College of Psychologists. Our objective is to provide information to the public and to evaluate COVID-19 in real time and to track, regional, municipal, and state-wide data in real time that informs supply chains and resource allocation with the anticipation of a surge in COVID-19 cases. RESUMEN Proporcionamos un modelo para la implementación sistemática de la telemedicina dentro de un gran centro de evaluación de COVID-19 en el área de Baja California, México. Nuestro modelo se basa en factores de diseño centrados en el ser humano y colaboraciones interdisciplinarias para la habilitación escalable basada en datos de tecnologías de teleconsulta de teléfonos inteligentes, celulares y video para vincular hospitales, clínicas y servicios médicos de emergencia para evaluaciones de COVID en el punto de atención. pruebas, y para el tratamiento posterior y decisiones de cuarentena. Rápidamente se creó un equipo multidisciplinario, en cooperación con diferentes instituciones, entre ellas: la Universidad Autónoma de Baja California, la Secretaría de Salud, el Centro de Comando, Comunicaciones y Control Informático. de la Secretaría del Estado de Baja California (C4), Facultades de Medicina y Colegio de Psicólogos. Nuestro objetivo es proporcionar información al público y evaluar COVID-19 en tiempo real y rastrear datos regionales, municipales y estatales en tiempo real que informan las cadenas de suministro y la asignación de recursos con la anticipación de un aumento de COVID-19. 19 casos.ICICT 2023: 2023 The 6th International Conference on Information and Computer Technologieshttps://doi.org/10.1007/978-981-99-3236-

    Expanding the Horizons of Manufacturing: Towards Wide Integration, Smart Systems and Tools

    Get PDF
    This research topic aims at enterprise-wide modeling and optimization (EWMO) through the development and application of integrated modeling, simulation and optimization methodologies, and computer-aided tools for reliable and sustainable improvement opportunities within the entire manufacturing network (raw materials, production plants, distribution, retailers, and customers) and its components. This integrated approach incorporates information from the local primary control and supervisory modules into the scheduling/planning formulation. That makes it possible to dynamically react to incidents that occur in the network components at the appropriate decision-making level, requiring fewer resources, emitting less waste, and allowing for better responsiveness in changing market requirements and operational variations, reducing cost, waste, energy consumption and environmental impact, and increasing the benefits. More recently, the exploitation of new technology integration, such as through semantic models in formal knowledge models, allows for the capture and utilization of domain knowledge, human knowledge, and expert knowledge toward comprehensive intelligent management. Otherwise, the development of advanced technologies and tools, such as cyber-physical systems, the Internet of Things, the Industrial Internet of Things, Artificial Intelligence, Big Data, Cloud Computing, Blockchain, etc., have captured the attention of manufacturing enterprises toward intelligent manufacturing systems
    corecore