-
A Simple Robot Selection Criteria After Path Planning Using Wavefront Algorithm
Authors:
Rajashekhar V S,
Dhaya C,
Dinakar Raj C K,
Dharshan P,
Mukesh Kumar S,
Harish B,
Ajith R,
Kamaleshwaran K
Abstract:
In this work we present a technique to select the best robot for accomplishing a task assuming that the map of the environment is known in advance. To do so, capabilities of the robots are listed and the environments where they can be used are mapped. There are five robots that included for doing the tasks. They are the robotic lizard, half-humanoid, robotic snake, biped and quadruped. Each of the…
▽ More
In this work we present a technique to select the best robot for accomplishing a task assuming that the map of the environment is known in advance. To do so, capabilities of the robots are listed and the environments where they can be used are mapped. There are five robots that included for doing the tasks. They are the robotic lizard, half-humanoid, robotic snake, biped and quadruped. Each of these robots are capable of performing certain activities and also they have their own limitations. The process of considering the robot performances and acting based on their limitations is the focus of this work. The wavefront algorithm is used to find the nature of terrain. Based on the terrain a suitable robot is selected from the list of five robots by the wavefront algorithm. Using this robot the mission is accomplished.
△ Less
Submitted 30 July, 2023;
originally announced July 2023.
-
Permutation Decision Trees
Authors:
Harikrishnan N B,
Arham Jain,
Nithin Nagaraj
Abstract:
Decision Tree is a well understood Machine Learning model that is based on minimizing impurities in the internal nodes. The most common impurity measures are Shannon entropy and Gini impurity. These impurity measures are insensitive to the order of training data and hence the final tree obtained is invariant to any permutation of the data. This is a limitation in terms of modeling when there are t…
▽ More
Decision Tree is a well understood Machine Learning model that is based on minimizing impurities in the internal nodes. The most common impurity measures are Shannon entropy and Gini impurity. These impurity measures are insensitive to the order of training data and hence the final tree obtained is invariant to any permutation of the data. This is a limitation in terms of modeling when there are temporal order dependencies between data instances. In this research, we propose the adoption of Effort-To-Compress (ETC) - a complexity measure, for the first time, as an alternative impurity measure. Unlike Shannon entropy and Gini impurity, structural impurity based on ETC is able to capture order dependencies in the data, thus obtaining potentially different decision trees for different permutations of the same data instances, a concept we term as Permutation Decision Trees (PDT). We then introduce the notion of Permutation Bagging achieved using permutation decision trees without the need for random feature selection and sub-sampling. We conduct a performance comparison between Permutation Decision Trees and classical decision trees across various real-world datasets, including Appendicitis, Breast Cancer Wisconsin, Diabetes Pima Indian, Ionosphere, Iris, Sonar, and Wine. Our findings reveal that PDT demonstrates comparable performance to classical decision trees across most datasets. Remarkably, in certain instances, PDT even slightly surpasses the performance of classical decision trees. In comparing Permutation Bagging with Random Forest, we attain comparable performance to Random Forest models consisting of 50 to 1000 trees, using merely 21 trees. This highlights the efficiency and effectiveness of Permutation Bagging in achieving comparable performance outcomes with significantly fewer trees.
△ Less
Submitted 31 May, 2024; v1 submitted 5 June, 2023;
originally announced June 2023.
-
Enhanced Vehicle Re-identification for ITS: A Feature Fusion approach using Deep Learning
Authors:
Ashutosh Holla B,
Manohara Pai M. M,
Ujjwal Verma,
Radhika M. Pai
Abstract:
In recent years, the development of robust Intelligent transportation systems (ITS) is tackled across the globe to provide better traffic efficiency by reducing frequent traffic problems. As an application of ITS, vehicle re-identification has gained ample interest in the domain of computer vision and robotics. Convolutional neural network (CNN) based methods are developed to perform vehicle re-id…
▽ More
In recent years, the development of robust Intelligent transportation systems (ITS) is tackled across the globe to provide better traffic efficiency by reducing frequent traffic problems. As an application of ITS, vehicle re-identification has gained ample interest in the domain of computer vision and robotics. Convolutional neural network (CNN) based methods are developed to perform vehicle re-identification to address key challenges such as occlusion, illumination change, scale, etc. The advancement of transformers in computer vision has opened an opportunity to explore the re-identification process further to enhance performance. In this paper, a framework is developed to perform the re-identification of vehicles across CCTV cameras. To perform re-identification, the proposed framework fuses the vehicle representation learned using a CNN and a transformer model. The framework is tested on a dataset that contains 81 unique vehicle identities observed across 20 CCTV cameras. From the experiments, the fused vehicle re-identification framework yields an mAP of 61.73% which is significantly better when compared with the standalone CNN or transformer model.
△ Less
Submitted 13 August, 2022;
originally announced August 2022.
-
Neurochaos Feature Transformation and Classification for Imbalanced Learning
Authors:
Deeksha Sethi,
Nithin Nagaraj,
Harikrishnan N B
Abstract:
Learning from limited and imbalanced data is a challenging problem in the Artificial Intelligence community. Real-time scenarios demand decision-making from rare events wherein the data are typically imbalanced. These situations commonly arise in medical applications, cybersecurity, catastrophic predictions etc. This motivates the development of learning algorithms capable of learning from imbalan…
▽ More
Learning from limited and imbalanced data is a challenging problem in the Artificial Intelligence community. Real-time scenarios demand decision-making from rare events wherein the data are typically imbalanced. These situations commonly arise in medical applications, cybersecurity, catastrophic predictions etc. This motivates the development of learning algorithms capable of learning from imbalanced data. Human brain effortlessly learns from imbalanced data. Inspired by the chaotic neuronal firing in the human brain, a novel learning algorithm namely Neurochaos Learning (NL) was recently proposed. NL is categorized in three blocks: Feature Transformation, Neurochaos Feature Extraction (CFX), and Classification. In this work, the efficacy of neurochaos feature transformation and extraction for classification in imbalanced learning is studied. We propose a unique combination of neurochaos based feature transformation and extraction with traditional ML algorithms. The explored datasets in this study revolve around medical diagnosis, banknote fraud detection, environmental applications and spoken-digit classification. In this study, experiments are performed in both high and low training sample regime. In the former, five out of nine datasets have shown a performance boost in terms of macro F1-score after using CFX features. The highest performance boost obtained is 25.97% for Statlog (Heart) dataset using CFX+Decision Tree. In the low training sample regime (from just one to nine training samples per class), the highest performance boost of 144.38% is obtained for Haberman's Survival dataset using CFX+Random Forest. NL offers enormous flexibility of combining CFX with any ML classifier to boost its performance, especially for learning tasks with limited and imbalanced data.
△ Less
Submitted 16 May, 2022; v1 submitted 20 April, 2022;
originally announced May 2022.
-
Cause-Effect Preservation and Classification using Neurochaos Learning
Authors:
Harikrishnan N B,
Aditi Kathpalia,
Nithin Nagaraj
Abstract:
Discovering cause-effect from observational data is an important but challenging problem in science and engineering. In this work, a recently proposed brain inspired learning algorithm namely-\emph{Neurochaos Learning} (NL) is used for the classification of cause-effect from simulated data. The data instances used are generated from coupled AR processes, coupled 1D chaotic skew tent maps, coupled…
▽ More
Discovering cause-effect from observational data is an important but challenging problem in science and engineering. In this work, a recently proposed brain inspired learning algorithm namely-\emph{Neurochaos Learning} (NL) is used for the classification of cause-effect from simulated data. The data instances used are generated from coupled AR processes, coupled 1D chaotic skew tent maps, coupled 1D chaotic logistic maps and a real-world prey-predator system. The proposed method consistently outperforms a five layer Deep Neural Network architecture for coupling coefficient values ranging from $0.1$ to $0.7$. Further, we investigate the preservation of causality in the feature extracted space of NL using Granger Causality (GC) for coupled AR processes and and Compression-Complexity Causality (CCC) for coupled chaotic systems and real-world prey-predator dataset. This ability of NL to preserve causality under a chaotic transformation and successfully classify cause and effect time series (including a transfer learning scenario) is highly desirable in causal machine learning applications.
△ Less
Submitted 28 January, 2022;
originally announced January 2022.
-
Secure and Safety Mobile Network System for Visually Impaired People
Authors:
Shyama Kumari Arunachalam,
Roopa V,
Meena H B,
Vijayalakshmi,
T Malavika
Abstract:
The proposed system aims to be a techno-friend of visually impaired people to assist them in orientation and mobility both indoor and outdoor. Moving through an unknown environment becomes a real challenge for most of them, although they rely on their other senses. An age old mechanism used for assistance for the blind people is a white cane commonly known as walking cane a simple and purely mecha…
▽ More
The proposed system aims to be a techno-friend of visually impaired people to assist them in orientation and mobility both indoor and outdoor. Moving through an unknown environment becomes a real challenge for most of them, although they rely on their other senses. An age old mechanism used for assistance for the blind people is a white cane commonly known as walking cane a simple and purely mechanical device to detect the ground, uneven surfaces, holes and steps using simple Tactile-force feedback.
△ Less
Submitted 1 December, 2021;
originally announced December 2021.
-
Autonomous UAV for Building Monitoring, Detection and Localisation of Faults
Authors:
Suhas Thalanki,
T Vijay Prashant,
Harshith Kumar M B,
Shayak Bhadraray,
Aravind S,
Srikrishna BR,
Sameer Dhole
Abstract:
Collapsing of structural buildings has been sighted commonly and the presence of potential faults has proved to be damaging to the buildings, resulting in accidents. It is essential to continuously monitor any building for faults where human access is restricted. With UAVs (Unmanned Aerial Vehicles) emerging in the field of computer vision, monitoring any building and detecting such faults is seen…
▽ More
Collapsing of structural buildings has been sighted commonly and the presence of potential faults has proved to be damaging to the buildings, resulting in accidents. It is essential to continuously monitor any building for faults where human access is restricted. With UAVs (Unmanned Aerial Vehicles) emerging in the field of computer vision, monitoring any building and detecting such faults is seen as a possibility. This paper puts forth a novel approach where an automated UAV traverses around the target building, detects any potential faults in the building, and localizes the faults. With the dimensions of the building provided, a path around the building is generated. The images captured by the onboard camera of the UAV are passed through a neural network system to confirm the presence of faults. Once a fault is detected, the UAV maneuvers itself to the corresponding position where the crack is detected. The simulation is done with ROS(Robot Operating System) using the AirSim environment which initializes ROS Wrappers and provides an integrated interface of ROS and AirSim to work with, The UAV is simulated in the same.
△ Less
Submitted 13 November, 2021;
originally announced November 2021.
-
Gait Recovery System for Parkinson's Disease using Machine Learning on Embedded Platforms
Authors:
Gokul H.,
Prithvi Suresh,
Hari Vignesh B,
Pravin Kumaar R,
Vineeth Vijayaraghavan
Abstract:
Freezing of Gait (FoG) is a common gait deficit among patients diagnosed with Parkinson's Disease (PD). In order to help these patients recover from FoG episodes, Rhythmic Auditory Stimulation (RAS) is needed. The authors propose a ubiquitous embedded system that detects FOG events with a Machine Learning (ML) subsystem from accelerometer signals . By making inferences on-device, we avoid issues p…
▽ More
Freezing of Gait (FoG) is a common gait deficit among patients diagnosed with Parkinson's Disease (PD). In order to help these patients recover from FoG episodes, Rhythmic Auditory Stimulation (RAS) is needed. The authors propose a ubiquitous embedded system that detects FOG events with a Machine Learning (ML) subsystem from accelerometer signals . By making inferences on-device, we avoid issues prevalent in cloud-based systems such as latency and network connection dependency. The resource-efficient classifier used, reduces the model size requirements by approximately 400 times compared to the best performing standard ML systems, with a trade-off of a mere 1.3% in best classification accuracy. The aforementioned trade-off facilitates deployability in a wide range of embedded devices including microcontroller based systems. The research also explores the optimization procedure to deploy the model on an ATMega2560 microcontroller with a minimum system latency of 44.5 ms. The smallest model size of the proposed resource efficient ML model was 1.4 KB with an average recall score of 93.58%.
△ Less
Submitted 13 April, 2020;
originally announced April 2020.
-
A Novel Chaos Theory Inspired Neuronal Architecture
Authors:
Harikrishnan N B,
Nithin Nagaraj
Abstract:
The practical success of widely used machine learning (ML) and deep learning (DL) algorithms in Artificial Intelligence (AI) community owes to availability of large datasets for training and huge computational resources. Despite the enormous practical success of AI, these algorithms are only loosely inspired from the biological brain and do not mimic any of the fundamental properties of neurons in…
▽ More
The practical success of widely used machine learning (ML) and deep learning (DL) algorithms in Artificial Intelligence (AI) community owes to availability of large datasets for training and huge computational resources. Despite the enormous practical success of AI, these algorithms are only loosely inspired from the biological brain and do not mimic any of the fundamental properties of neurons in the brain, one such property being the chaotic firing of biological neurons. This motivates us to develop a novel neuronal architecture where the individual neurons are intrinsically chaotic in nature. By making use of the topological transitivity property of chaos, our neuronal network is able to perform classification tasks with very less number of training samples. For the MNIST dataset, with as low as $0.1 \%$ of the total training data, our method outperforms ML and matches DL in classification accuracy for up to $7$ training samples/class. For the Iris dataset, our accuracy is comparable with ML algorithms, and even with just two training samples/class, we report an accuracy as high as $95.8 \%$. This work highlights the effectiveness of chaos and its properties for learning and paves the way for chaos-inspired neuronal architectures by closely mimicking the chaotic nature of neurons in the brain.
△ Less
Submitted 19 May, 2019;
originally announced May 2019.
-
Deep Learning for Digital Text Analytics: Sentiment Analysis
Authors:
Reshma U,
Barathi Ganesh H B,
Mandar Kale,
Prachi Mankame,
Gouri Kulkarni
Abstract:
In today's scenario, imagining a world without negativity is something very unrealistic, as bad NEWS spreads more virally than good ones. Though it seems impractical in real life, this could be implemented by building a system using Machine Learning and Natural Language Processing techniques in identifying the news datum with negative shade and filter them by taking only the news with positive sha…
▽ More
In today's scenario, imagining a world without negativity is something very unrealistic, as bad NEWS spreads more virally than good ones. Though it seems impractical in real life, this could be implemented by building a system using Machine Learning and Natural Language Processing techniques in identifying the news datum with negative shade and filter them by taking only the news with positive shade (good news) to the end user. In this work, around two lakhs datum have been trained and tested using a combination of rule-based and data driven approaches. VADER along with a filtration method has been used as an annotating tool followed by statistical Machine Learning approach that have used Document Term Matrix (representation) and Support Vector Machine (classification). Deep Learning algorithms then came into picture to make this system reliable (Doc2Vec) which finally ended up with Convolutional Neural Network(CNN) that yielded better results than the other experimented modules. It showed up a training accuracy of 96%, while a test accuracy of (internal and external news datum) above 85% was obtained.
△ Less
Submitted 10 April, 2018;
originally announced April 2018.
-
eBear: An Expressive Bear-Like Robot
Authors:
Xiao Zhang,
Ali Mollahosseini,
Amir H. Kargar B.,
Evan Boucher,
Richard M. Voyles,
Rodney Nielsen,
Mohammd H. Mahoor
Abstract:
This paper presents an anthropomorphic robotic bear for the exploration of human-robot interaction including verbal and non-verbal communications. This robot is implemented with a hybrid face composed of a mechanical faceplate with 10 DOFs and an LCD-display-equipped mouth. The facial emotions of the bear are designed based on the description of the Facial Action Coding System as well as some anim…
▽ More
This paper presents an anthropomorphic robotic bear for the exploration of human-robot interaction including verbal and non-verbal communications. This robot is implemented with a hybrid face composed of a mechanical faceplate with 10 DOFs and an LCD-display-equipped mouth. The facial emotions of the bear are designed based on the description of the Facial Action Coding System as well as some animal-like gestures described by Darwin. The mouth movements are realized by synthesizing emotions with speech. User acceptance investigations have been conducted to evaluate the likability of these facial behaviors exhibited by the eBear. Multiple Kernel Learning is proposed to fuse different features for recognizing user's facial expressions. Our experimental results show that the developed Bear-Like robot can perceive basic facial expressions and provide emotive conveyance towards human beings.
△ Less
Submitted 20 November, 2015;
originally announced November 2015.
-
Automatic Measurement of Physical Mobility in Get-Up-and-Go Test Using Kinect Sensor
Authors:
Amir H. Kargar B.,
Ali Mollahosseini,
Taylor Struemph,
Wilson Pace,
Rodney D. Nielsen,
Mohammad H. Mahoor
Abstract:
Get-Up-and-Go Test is commonly used for assessing the physical mobility of the elderly by physicians. This paper presents a method for automatic analysis and classification of human gait in the Get-Up-and-Go Test using a Microsoft Kinect sensor. Two types of features are automatically extracted from the human skeleton data provided by the Kinect sensor. The first type of feature is related to the…
▽ More
Get-Up-and-Go Test is commonly used for assessing the physical mobility of the elderly by physicians. This paper presents a method for automatic analysis and classification of human gait in the Get-Up-and-Go Test using a Microsoft Kinect sensor. Two types of features are automatically extracted from the human skeleton data provided by the Kinect sensor. The first type of feature is related to the human gait (e.g., number of steps, step duration, and turning duration); whereas the other one describes the anatomical configuration (e.g., knee angles, leg angle, and distance between elbows). These features characterize the degree of human physical mobility. State-of-the-art machine learning algorithms (i.e. Bag of Words and Support Vector Machines) are used to classify the severity of gaits in 12 subjects with ages ranging between 65 and 90 enrolled in a pilot study. Our experimental results show that these features can discriminate between patients who have a high risk for falling and patients with a lower fall risk.
△ Less
Submitted 11 November, 2015;
originally announced November 2015.
-
Cluster Based Cost Efficient Intrusion Detection System For Manet
Authors:
Saravanan Kumarasamy,
Hemalatha B,
Hashini P
Abstract:
Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are anom…
▽ More
Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are anomaly detection and signature based detection model. The anomaly detection model uses the historical transactions with attack labels. The signature database is used in the signature based IDS schemes.
The mobile ad-hoc networks are infrastructure less environment. The intrusion detection applications are placed in a set of nodes under the mobile ad-hoc network environment. The nodes are grouped into clusters. The leader nodes are assigned for the clusters. The leader node is assigned for the intrusion detection process. Leader nodes are used to initiate the intrusion detection process. Resource sharing and lifetime management factors are considered in the leader election process. The system optimizes the leader election and intrusion detection process.
The system is designed to handle leader election and intrusion detection process. The clustering scheme is optimized with coverage and traffic level. Cost and resource utilization is controlled under the clusters. Node mobility is managed by the system.
△ Less
Submitted 6 November, 2013;
originally announced November 2013.