107 research outputs found
Computational neural learning formalisms for manipulator inverse kinematics
An efficient, adaptive neural learning paradigm for addressing the inverse kinematics of redundant manipulators is presented. The proposed methodology exploits the infinite local stability of terminal attractors - a new class of mathematical constructs which provide unique information processing capabilities to artificial neural systems. For robotic applications, synaptic elements of such networks can rapidly acquire the kinematic invariances embedded within the presented samples. Subsequently, joint-space configurations, required to follow arbitrary end-effector trajectories, can readily be computed. In a significant departure from prior neuromorphic learning algorithms, this methodology provides mechanisms for incorporating an in-training skew to handle kinematics and environmental constraints
Learned navigation in unknown terrains: A retraction method
The problem of learned navigation of a circular robot R, of radius delta (is greater than or equal to 0), through a terrain whose model is not a-priori known is considered. Two-dimensional finite-sized terrains populated by an unknown (but, finite) number of simple polygonal obstacles are also considered. The number and locations of the vertices of each obstacle are unknown to R. R is equipped with a sensor system that detects all vertices and edges that are visible from its present location. In this context two problems are covered. In the visit problem, the robot is required to visit a sequence of destination points, and in the terrain model acquisition problem, the robot is required to acquire the complete model of the terrain. An algorithmic framework is presented for solving these two problems using a retraction of the freespace onto the Voronoi diagram of the terrain. Algorithms are then presented to solve the visit problem and the terrain model acquisition problem
Optimal Distributed Fault-Tolerant Sensor Fusion: Fundamental Limits and Efficient Algorithms
Distributed estimation is a fundamental problem in signal processing which
finds applications in a variety of scenarios of interest including distributed
sensor networks, robotics, group decision problems, and monitoring and
surveillance applications. The problem considers a scenario where distributed
agents are given a set of measurements, and are tasked with estimating a target
variable. This work considers distributed estimation in the context of sensor
networks, where a subset of sensor measurements are faulty and the distributed
agents are agnostic to these faulty sensor measurements. The objective is to
minimize i) the mean square error in estimating the target variable at each
node (accuracy objective), and ii) the mean square distance between the
estimates at each pair of nodes (consensus objective). It is shown that there
is an inherent tradeoff between satisfying the former and latter objectives.
The tradeoff is explicitly characterized and the fundamental performance limits
are derived under specific statistical assumptions on the sensor output
statistics. Assuming a general stochastic model, the sensor fusion algorithm
optimizing this tradeoff is characterized through a computable optimization
problem. Finding the optimal sensor fusion algorithm is computationally
complex. To address this, a general class of low-complexity Brooks-Iyengar
Algorithms are introduced, and their performance, in terms of accuracy and
consensus objectives, is compared to that of optimal linear estimators through
case study simulations of various scenarios
Energy Efficient Estimation of Gaussian Sources Over Inhomogeneous Gaussian MAC Channels
It has been shown lately the optimality of uncoded transmission in estimating
Gaussian sources over homogeneous/symmetric Gaussian multiple access channels
(MAC) using multiple sensors. It remains, however, unclear whether it still
holds for any arbitrary networks and/or with high channel signal-to-noise ratio
(SNR) and high signal-to-measurement-noise ratio (SMNR). In this paper, we
first provide a joint source and channel coding approach in estimating Gaussian
sources over Gaussian MAC channels, as well as its sufficient and necessary
condition in restoring Gaussian sources with a prescribed distortion value. An
interesting relationship between our proposed joint approach with a more
straightforward separate source and channel coding scheme is then established.
We then formulate constrained power minimization problems and transform them to
relaxed convex geometric programming problems, whose numerical results exhibit
that either separate or uncoded scheme becomes dominant over a linear topology
network. In addition, we prove that the optimal decoding order to minimize the
total transmission powers for both source and channel coding parts is solely
subject to the ranking of MAC channel qualities, and has nothing to do with the
ranking of measurement qualities. Finally, asymptotic results for homogeneous
networks are obtained which not only confirm the existing optimality of the
uncoded approach, but also show that the asymptotic SNR exponents of these
three approaches are all the same. Moreover, the proposed joint approach share
the same asymptotic ratio with respect to high SNR and high SMNR as the uncoded
scheme
Network connectivity under node failure
We examine a non-cooperative model of network formation where players may stop functioning. We identify conditions under which Nash and efficient networks will remain connected after the loss of kk nodes by introducing the notion of kk-Node Super Connectivity
DRSIG: Domain and Range Specific Index Generation for encrypted Cloud data
One of the most fundamental services of cloud computing is Cloud storage service. Huge amount of sensitive data is stored in the cloud for easy remote access and to reduce the cost of storage. The confidential data is encrypt before uploading to the cloud server in order to maintain privacy and security. All conventional searchable symmetric encryption(SSE) schemes enable the users to search on the entire index file. In this paper, we propose the Domain and Range Specific Index Generation(DRSIG) scheme that minimizes the Index Generation time. This scheme adopts collection sort technique to split the index file into D Domains and R Ranges. The Domain is based on the length of the keyword; the Range splits within the domain based on the first letter of the keyword. A mathematical model is used to encrypt the indexed keyword that eliminates the information leakage. The time complexity of the index generation is O(NT × 3) where NT - Number of rows in index document and 3 is Number of columns in index document. Experiments have been conducted on real world dataset to validate proposed DRSIG scheme. It is observed that DRSIG scheme is efficient and provide more secure data than Ranked Searchable Symmetric Encryption(RSSE) Scheme
Increasing Access for Economically Disadvantaged Students: The NSF/CSEM & S-STEM Programs at Louisiana State University
Increasing college degree attainment for students from disadvantaged backgrounds is a prominent component of numerous state and federal legislation focused on higher education. In 1999, the National Science Foundation (NSF) instituted the Computer Science, Engineering, and Mathematics Scholarships (CSEMS) program; this initiative was designed to provide greater access and support to academically talented students from economically disadvantaged backgrounds. Originally intended to provide financial support to lower income students, this NSF program also advocated that additional professional development and advising would be strategies to increase undergraduate persistence to graduation. This innovative program for economically disadvantaged students was extended in 2004 to include students from other disciplines including the physical and life sciences as well as the technology fields, and the new name of the program was Scholarships for Science, Technology, Engineering and Mathematics (S-STEM). The implementation of these two programs in Louisiana State University (LSU) has shown significant and measurable success since 2000, making LSU a Model University in providing support to economically disadvantaged students within the STEM disciplines. The achievement of these programs is evidenced by the graduation rates of its participants. This report provides details on the educational model employed through the CSEMS/S-STEM projects at LSU and provides a path to success for increasing student retention rates in STEM disciplines. While the LSU\u27s experience is presented as a case study, the potential relevance of this innovative mentoring program in conjunction with the financial support system is discussed in detail. © 2011 The Author(s)
Functionally important segments in proteins dissected using Gene Ontology and geometric clustering of peptide fragments
A geometric clustering algorithm has been developed to dissect protein fragments based on their relevance to function
Fusion of threshold rules for target detection in wireless sensor networks
We consider a network of sensors distributed in a target area providing environmental measurements that are subject to normally distributed, independent additive noise. Each sensor node applies a threshold rule to the measurements to decide the presence of a target; the distance to the target together with the threshold value determines its hit and false alarm probabilities or rates using a signal attenuation model. We propose a centralized threshold-OR fusion rule for combining the individual sensor node decisions. Under the statistical independence of sensor measurements, we derive fusion threshold bounds using Chebyshev’s inequality based on individual hit and false alarm probabilities but without requiring a priori knowledge of the underlying probability distributions. We derive conditions to ensure that the fused method achieves a higher hit rate and lower false alarm rate compared to the weighted averages of individual sensor parameters. The simulations using Monte Carlo method illustrate significant detection performance improvements of the proposed fusion approach
- …