Resilient Submodular Maximization for Control and Sensing

Resilient Submodular Maximization for Control and Sensing
Title Resilient Submodular Maximization for Control and Sensing PDF eBook
Author Vasileios Tzoumas
Publisher
Pages 0
Release 2018
Genre
ISBN

Download Resilient Submodular Maximization for Control and Sensing Book in PDF, Epub and Kindle

Fundamental applications in control, sensing, and robotics, motivate the design of systems by selecting system elements, such as actuators or sensors, subject to constraints that require the elements not only to be a few in number, but also, to satisfy heterogeneity or interdependency constraints (called matroid constraints). For example, consider the scenarios: (1) (Control) Actuator placement: In a power grid, how should we place a few generators both to guarantee its stabilization with minimal control effort, and to satisfy interdependency constraints where the power grid must be controllable from the generators? (2) (Sensing) Sensor placement: In medical brain-wearable devices, how should we place a few sensors to ensure smoothing estimation capabilities? (3) (Robotics) Sensor scheduling: At a team of mobile robots, which few on-board sensors should we activate at each robot--subject to heterogeneity constraints on the number of sensors that each robot can activate at each time--so both to maximize the robots' battery life, and to ensure the robots' capability to complete a formation control task? In the first part of this thesis we motivate the above design problems, and propose the first algorithms to address them. In particular, although traditional approaches to matroid-constrained maximization have met great success in machine learning and facility location, they are unable to meet the aforementioned problem of actuator placement. In addition, although traditional approaches to sensor selection enable Kalman filtering capabilities, they do not enable smoothing or formation control capabilities, as required in the above problems of sensor placement and scheduling. Therefore, in the first part of the thesis we provide the first algorithms, and prove they achieve the following characteristics: provable approximation performance : the algorithms guarantee a solution close to the optimal; minimal running time: the algorithms terminate with the same running time as state-of-the-art algorithms for matroid-constrained maximization; adaptiveness: where applicable, at each time step the algorithms select system elements based on both the history of selections. We achieve the above ends by taking advantage of a submodular structure of in all aforementioned problems--submodularity is a diminishing property for set functions, parallel to convexity for continuous functions. But in failure-prone and adversarial environments, sensors and actuators can fail; sensors and actuators can get attacked. Thence, the traditional design paradigms over matroid-constraints become insufficient, and in contrast, resilient designs against attacks or failures become important. However, no approximation algorithms are known for their solution; relevantly, the problem of resilient maximization over matroid constraints is NP-hard. In the second part of this thesis we motivate the general problem of resilient maximization over matroid constraints, and propose the first algorithms to address it, to protect that way any design over matroid constraints, not only within the boundaries of control, sensing, and robotics, but also within machine learning, facility location, and matroid-constrained optimization in general. In particular, in the second part of this thesis we provide the first algorithms, and prove they achieve the following characteristics: resiliency: the algorithms are valid for any number of attacks or failures; adaptiveness: where applicable, at each time step the algorithms select system elements based on both the history of selections, and on the history of attacks or failures; provable approximation guarantees: the algorithms guarantee for any submodular or merely monotone function a solution close to the optimal; minimal running time: the algorithms terminate with the same running time as state-of-the-art algorithms for matroid-constrained maximization. We bound the performance of our algorithms by using notions of curvature for monotone (not necessarily submodular) set functions, which are established in the literature of submodular maximization.In the third and final part of this thesis we apply our tools for resilient maximization in robotics, and in particular, to the problem of active information gathering with mobile robots. This problem calls for the motion-design of a team of mobile robots so to enable the effective information gathering about a process of interest, to support, e.g., critical missions such as hazardous environmental monitoring, and search and rescue. Therefore, in the third part of this thesis we aim to protect such multi-robot information gathering tasks against attacks or failures that can result to the withdrawal of robots from the task. We conduct both numerical and hardware experiments in multi-robot multi-target tracking scenarios, and exemplify the benefits, as well as, the performance of our approach.

Submodularity in Dynamics and Control of Networked Systems

Submodularity in Dynamics and Control of Networked Systems
Title Submodularity in Dynamics and Control of Networked Systems PDF eBook
Author Andrew Clark
Publisher Springer
Pages 220
Release 2015-12-21
Genre Technology & Engineering
ISBN 3319269771

Download Submodularity in Dynamics and Control of Networked Systems Book in PDF, Epub and Kindle

This book presents a framework for the control of networked systems utilizing submodular optimization techniques. The main focus is on selecting input nodes for the control of networked systems, an inherently discrete optimization problem with applications in power system stability, social influence dynamics, and the control of vehicle formations. The first part of the book is devoted to background information on submodular functions, matroids, and submodular optimization, and presents algorithms for distributed submodular optimization that are scalable to large networked systems. In turn, the second part develops a unifying submodular optimization approach to controlling networked systems based on multiple performance and controllability criteria. Techniques are introduced for selecting input nodes to ensure smooth convergence, synchronization, and robustness to environmental and adversarial noise. Submodular optimization is the first unifying approach towards guaranteeing both performance and controllability with provable optimality bounds in static as well as time-varying networks. Throughout the text, the submodular framework is illustrated with the help of numerical examples and application-based case studies in biological, energy and vehicular systems. The book effectively combines two areas of growing interest, and will be especially useful for researchers in control theory, applied mathematics, networking or machine learning with experience in submodular optimization but who are less familiar with the problems and tools available for networked systems (or vice versa). It will also benefit graduate students, offering consistent terminology and notation that greatly reduces the initial effort associated with beginning a course of study in a new area.

IoT for Defense and National Security

IoT for Defense and National Security
Title IoT for Defense and National Security PDF eBook
Author Robert Douglass
Publisher John Wiley & Sons
Pages 532
Release 2023-01-04
Genre Political Science
ISBN 1119892201

Download IoT for Defense and National Security Book in PDF, Epub and Kindle

IoT for Defense and National Security Practical case-based guide illustrating the challenges and solutions of adopting IoT in both secure and hostile environments IoT for Defense and National Security covers topics on IoT security, architecture, robotics, sensing, policy, operations, and more, including the latest results from the premier IoT research initiative of the U.S. Defense Department, the Internet of Battle Things. The text also discusses challenges in converting defense industrial operations to IoT and summarizes policy recommendations for regulating government use of IoT in free societies. As a modern reference, this book covers multiple technologies in IoT including survivable tactical IoT using content-based routing, mobile ad-hoc networks, and electronically formed beams. Examples of IoT architectures include using KepServerEX for edge connectivity and AWS IoT Core and Amazon S3 for IoT data. To aid in reader comprehension, the text uses case studies illustrating the challenges and solutions for using robotic devices in defense applications, plus case studies on using IoT for a defense industrial base. Written by leading researchers and practitioners of IoT technology for defense and national security, IoT for Defense and National Security also includes information on: Changes in warfare driven by IoT weapons, logistics, and systems IoT resource allocation (monitoring existing resources and reallocating them in response to adversarial actions) Principles of AI-enabled processing for Internet of Battlefield Things, including machine learning and inference Vulnerabilities in tactical IoT communications, networks, servers and architectures, and strategies for securing them Adapting rapidly expanding commercial IoT to power IoT for defense For application engineers from defense-related companies as well as managers, policy makers, and academics, IoT for Defense and National Security is a one-of-a-kind resource, providing expansive coverage of an important yet sensitive topic that is often shielded from the public due to classified or restricted distributions.

Game Theory and Machine Learning for Cyber Security

Game Theory and Machine Learning for Cyber Security
Title Game Theory and Machine Learning for Cyber Security PDF eBook
Author Charles A. Kamhoua
Publisher John Wiley & Sons
Pages 546
Release 2021-09-08
Genre Technology & Engineering
ISBN 1119723949

Download Game Theory and Machine Learning for Cyber Security Book in PDF, Epub and Kindle

GAME THEORY AND MACHINE LEARNING FOR CYBER SECURITY Move beyond the foundations of machine learning and game theory in cyber security to the latest research in this cutting-edge field In Game Theory and Machine Learning for Cyber Security, a team of expert security researchers delivers a collection of central research contributions from both machine learning and game theory applicable to cybersecurity. The distinguished editors have included resources that address open research questions in game theory and machine learning applied to cyber security systems and examine the strengths and limitations of current game theoretic models for cyber security. Readers will explore the vulnerabilities of traditional machine learning algorithms and how they can be mitigated in an adversarial machine learning approach. The book offers a comprehensive suite of solutions to a broad range of technical issues in applying game theory and machine learning to solve cyber security challenges. Beginning with an introduction to foundational concepts in game theory, machine learning, cyber security, and cyber deception, the editors provide readers with resources that discuss the latest in hypergames, behavioral game theory, adversarial machine learning, generative adversarial networks, and multi-agent reinforcement learning. Readers will also enjoy: A thorough introduction to game theory for cyber deception, including scalable algorithms for identifying stealthy attackers in a game theoretic framework, honeypot allocation over attack graphs, and behavioral games for cyber deception An exploration of game theory for cyber security, including actionable game-theoretic adversarial intervention detection against advanced persistent threats Practical discussions of adversarial machine learning for cyber security, including adversarial machine learning in 5G security and machine learning-driven fault injection in cyber-physical systems In-depth examinations of generative models for cyber security Perfect for researchers, students, and experts in the fields of computer science and engineering, Game Theory and Machine Learning for Cyber Security is also an indispensable resource for industry professionals, military personnel, researchers, faculty, and students with an interest in cyber security.

Industrial Wireless Sensor Networks

Industrial Wireless Sensor Networks
Title Industrial Wireless Sensor Networks PDF eBook
Author R Budampati
Publisher Woodhead Publishing
Pages 0
Release 2015-10-21
Genre Technology & Engineering
ISBN 9781782422303

Download Industrial Wireless Sensor Networks Book in PDF, Epub and Kindle

Industrial Wireless Sensor Networks: Monitoring, Control and Automation explores the explosive growth that has occurred in the use of wireless sensor networks in a variety of applications during the last few years. As wireless technology can reduce costs, increase productivity, and ease maintenance, the book looks at the progress in standardization efforts regarding reliability, security, performance, power consumption, and integration. Early sections of the book discuss issues such as media access control (MAC), antenna design and site survey, energy harvesting, and explosion-proof design. Subsequent sections present WSN standards, including ISA100, ZigBeeT, WifiT, WirelessHARTT and 6loWPAN, and the applications of WSNs in the oil and gas, chemical, food, and nuclear power industries.

Managing and Mining Sensor Data

Managing and Mining Sensor Data
Title Managing and Mining Sensor Data PDF eBook
Author Charu C. Aggarwal
Publisher Springer Science & Business Media
Pages 547
Release 2013-01-15
Genre Computers
ISBN 1461463092

Download Managing and Mining Sensor Data Book in PDF, Epub and Kindle

Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets. The human-centric aspect of sensor data has created tremendous opportunities in integrating social aspects of sensor data collection into the mining process. Managing and Mining Sensor Data is a contributed volume by prominent leaders in this field, targeting advanced-level students in computer science as a secondary text book or reference. Practitioners and researchers working in this field will also find this book useful.

Learning with Submodular Functions

Learning with Submodular Functions
Title Learning with Submodular Functions PDF eBook
Author Francis Bach
Publisher
Pages 228
Release 2013
Genre Convex functions
ISBN 9781601987570

Download Learning with Submodular Functions Book in PDF, Epub and Kindle

Submodular functions are relevant to machine learning for at least two reasons: (1) some problems may be expressed directly as the optimization of submodular functions and (2) the Lovász extension of submodular functions provides a useful set of regularization functions for supervised and unsupervised learning. In this monograph, we present the theory of submodular functions from a convex analysis perspective, presenting tight links between certain polyhedra, combinatorial optimization and convex optimization problems. In particular, we show how submodular function minimization is equivalent to solving a wide variety of convex optimization problems. This allows the derivation of new efficient algorithms for approximate and exact submodular function minimization with theoretical guarantees and good practical performance. By listing many examples of submodular functions, we review various applications to machine learning, such as clustering, experimental design, sensor placement, graphical model structure learning or subset selection, as well as a family of structured sparsity-inducing norms that can be derived and used from submodular functions.