Heuristic-based method for conflict discovery of shared control between humans and autonomous systems - A driving automation case study

2021 ◽  
pp. 103867
Author(s):  
F. Vanderhaegen
Author(s):  
Guilherme Eduardo Leite ◽  
Norian Marranghello ◽  
Aledir Silveira Pereira

Author(s):  
Eder Escobar ◽  
Richard Abramonte ◽  
Antenor Aliaga ◽  
Flabio Gutierrez

In this work, the AutonomousSystems4D package is presented, which allows the qualitative analysis of non-linear differential equation systems in four dimensions, as well as drawing the phase surfaces by immersing R4 in R3. The package is programmed in the computational tool Octave. As a case study applied to the new Lorenz 4D System, sensitivity was found in the initial conditions, Lyapunov exponents, Kaplan Yorke dimension, a stable and unstable critical point, limit cycle, Hopf bifurcation, and hyperattractors. The package could be adapted to perform qualitative analysis and visualize phase surfaces to autonomous systems, e.g. Sprott 4D, Rossler 4D, etc. The package can be applied to problems such as: design, analysis, implementation of electronic circuits; to message encryption.


2021 ◽  
Vol 20 (5s) ◽  
pp. 1-26
Author(s):  
Radoslav Ivanov ◽  
Kishor Jothimurugan ◽  
Steve Hsu ◽  
Shaan Vaidya ◽  
Rajeev Alur ◽  
...  

Recent advances in deep learning have enabled data-driven controller design for autonomous systems. However, verifying safety of such controllers, which are often hard-to-analyze neural networks, remains a challenge. Inspired by compositional strategies for program verification, we propose a framework for compositional learning and verification of neural network controllers. Our approach is to decompose the task (e.g., car navigation) into a sequence of subtasks (e.g., segments of the track), each corresponding to a different mode of the system (e.g., go straight or turn). Then, we learn a separate controller for each mode, and verify correctness by proving that (i) each controller is correct within its mode, and (ii) transitions between modes are correct. This compositional strategy not only improves scalability of both learning and verification, but also enables our approach to verify correctness for arbitrary compositions of the subtasks. To handle partial observability (e.g., LiDAR), we additionally learn and verify a mode predictor that predicts which controller to use. Finally, our framework also incorporates an algorithm that, given a set of controllers, automatically synthesizes the pre- and postconditions required by our verification procedure. We validate our approach in a case study on a simulation model of the F1/10 autonomous car, a system that poses challenges for existing verification tools due to both its reliance on LiDAR observations, as well as the need to prove safety for complex track geometries. We leverage our framework to learn and verify a controller that safely completes any track consisting of an arbitrary sequence of five kinds of track segments.


2015 ◽  
Vol 2015 (2) ◽  
pp. 171-187 ◽  
Author(s):  
Joshua Juen ◽  
Aaron Johnson ◽  
Anupam Das ◽  
Nikita Borisov ◽  
Matthew Caesar

Abstract The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems (ASes) and Internet exchanges (IXes), which can observe different overlay hops belonging to the same circuit. We evaluate whether network path prediction techniques provide an accurate picture of the threat from such adversaries, and whether they can be used to avoid this threat. We perform a measurement study by collecting 17.2 million traceroutes from Tor relays to destinations around the Internet. We compare the collected traceroute paths to predicted paths using state-of-the-art path inference techniques. We find that traceroutes present a very different picture, with the set of ASes seen in the traceroute path differing from the predicted path 80% of the time. We also consider the impact that prediction errors have on Tor security. Using a simulator to choose paths over a week, our traceroutes indicate a user has nearly a 100% chance of at least one compromise in a week with 11% of total paths containing an AS compromise and less than 1% containing an IX compromise when using default Tor selection. We find modifying the path selection to choose paths predicted to be safe lowers total paths with an AS compromise to 0.14% but still presents a 5–11% chance of at least one compromise in a week while making 5% of paths fail, with 96% of failures due to false positives in path inferences. Our results demonstrate more measurement and better path prediction is necessary to mitigate the risk of AS and IX adversaries to Tor.


2016 ◽  
Vol 13 (6) ◽  
pp. 172988141668270 ◽  
Author(s):  
Marco Ramacciotti ◽  
Mario Milazzo ◽  
Fabio Leoni ◽  
Stefano Roccella ◽  
Cesare Stefanini

Human management of robots in many specific industrial activities has long been imperative, due to the elevated levels of complexity involved, which can only be overcome through long and wasteful preprogrammed activities. The shared control approach is one of the most emergent procedures that can compensate and optimally couple human smartness with the high precision and productivity characteristic to mechatronic systems. To explore and to exploit this approach in the industrial field, an innovative shared control algorithm was elaborated, designed and validated in a specific case study.


2021 ◽  
Author(s):  
Risto Holopainen

Dynamic systems have found their use in sound synthesis as well as score synthesis. These levels can be integrated in monolithic autonomous systems in a novel approach to algorithmic composition that shares certain aesthetic motivations with some work with autonomous music systems, such as the search for emergence. We discuss various strategies for achieving variation on multiple time-scales by using slow-fast, hybrid dynamic systems, and statistical feedback. The ideas are illustrated with a case study.


Author(s):  
Christoph A Thieme ◽  
Børge Rokseth ◽  
Ingrid B Utne

Autonomous systems, including airborne, land-based, marine, and underwater vehicles, are increasingly present in the world. One important aspect of autonomy is the capability to process information and to make independent decisions for achieving a mission goal. Information on the level of risk related to the operation may improve the decision-making process of autonomous systems. This article describes the integration of risk analysis methods with the control system of autonomous and highly automated systems that are evaluated during operation. Four main areas of implementation are identified; (i) risk models used to directly make decisions, (ii) use of the output of risk models as input to decision-making and optimization algorithms, (iii) the output of risk models may be used as a constraint in or modifying constraints of algorithms, and (iv) the output of risk models may be used to inform representations or maps of the environment to be used in path planning. A case study on a dynamic positioning controller of an offshore supply vessel exemplifies the concepts described in this article. In addition, it demonstrates how risk model output may be used within a hybrid controller.


Sign in / Sign up

Export Citation Format

Share Document