Table Of ContentInformation Sciences
Shape and Color Features for Object Recognition Search
This technique can be used in Internet image searching, intelligent video, and security and
surveillance applications.
NASA’s Jet Propulsion Laboratory, Pasadena, California
A bio-inspired shape feature of an ob-
ject of interest emulates the integration
of the saccadic eye movement and hori-
zontal layer in vertebrate retina for ob- Feature Adaptive
Detection Feature
ject recognition search where a single t
object can be used one at a time. The
Image t+Δt
optimal computational model for shape- t t+Δt
extraction-based principal component
analysis (PCA) was also developed to re- Feature
duce processing time and enable the t Extraction
real-time adaptive system capability. A
color feature of the object is employed
Object t+Δt
as color segmentation to empower the identification/Region
shape feature recognition to solve the of interest
object recognition in the heterogeneous
environment where a single technique
Color Detection
— shape or color — may expose its diffi-
t
culties. To enable the effective system,
an adaptive architecture and autono-
mous mechanism were developed to rec- t+Δt
t t
ognize and adapt the shape and color Image t
feature of the moving object. Adaptive Color Adaptive Color
The bio-inspired object recognition
based on bio-inspired shape and color
can be effective to recognize a person of
interest in the heterogeneous environ-
ment where the single technique ex- The Color and Shape Feature Feedback Adaptivearchitecture.
posed its difficulties to perform effective
recognition. Moreover, this work also Laboratory. For more information, contact Mail Stop 202-233
demonstrates the mechanism and archi- [email protected]. 4800 Oak Grove Drive
tecture of the autonomous adaptive sys- In accordance with Public Law 96-517, the Pasadena, CA 91109-8099
tem to enable the realistic system for the contractor has elected to retain title to this in- E-mail: [email protected]
practical use in the future. vention. Inquiries concerning rights for its com- Refer to NPO-47065, volume and number
This work was done by Tuan A. Duong mercial use should be addressed to: of this NASA Tech Briefs issue, and the
and Vu A. Duong of Caltech, and Allen R. Innovative Technology Assets Management page number.
Stubberud of UCI for NASA’s Jet Propulsion JPL
Explanation Capabilities for Behavior-Based Robot Control
This mathematical framework can be applied to search and rescue or remote exploration
robotic systems.
NASA’s Jet Propulsion Laboratory, Pasadena, California
A recent study that evaluated issues as- and so introduced errors into the com- remotely located autonomous vehicles
sociated with remote interaction with an mand logic of the vehicle. As the vehicles didn’t coincide with the “mental models”
autonomous vehicle within the frame- became more autonomous through the of human operators.
work of grounding found that missing activation of additional capabilities, more One of the conclusions of the study
contextual information led to uncertainty errors were made. This is an inefficient was that there should be a way for the
in the interpretation of collected data, use of the platform, since the behavior of autonomous vehicles to describe what
NASA Tech Briefs, January 2012 33
The explanation system is broken up
into three subsystems that address the
Inertial
principal developments needed:
Stereo Images Navigation
System A B 1. An inference mechanism for the map-
Example: ping of observed behaviors into the
Head-on Approach cost-calculus: The observation equiva-
lence of behaviors on a single auto-
nomous agent and between two or
more agents is done through bi-simu-
Relative Separation Hazard Path lation relations. An example of the in-
Bearing Distance Present Delta
ference mechanism at work in a Rules-
of-the-Road behavior is shown in the
figure.
Pass Maintain Avoid Stay on
to Port Lateral Hazard Transit 2. A learning mechanism for the cost-ex-
Separation pression generation for observed be-
haviors outside of the cost-calculus
tactical behavior base: Reinforcem ent
Behavior Arbitration learning of observed behavior pat-
1188
terns is used for the common ground-
ing of behaviors sequences that were
Set Set
not previously observed, or that are
Rudder Throttle
-55 in the command dictionary of the au-
tonomous agent.
Perception
Behavior Input 3. Explanation capabilities for the sys-
tem: A dynamic decision tree decom-
Perception Engine Behavior Network position of the observed behaviors is
used to generate a set of rules for ex-
Parallel Composition Operator
USV (A): Maintain separation || Pass to port ||Avoid Hazards || Stay on transit planation. An adaptive level of detail is
UNK (B): Maintain separation || Pass to port || ε || ε automatically built into this process in
that all of the sensory information that
led to a behavior is available, and can
An example of the Inference Mechanismin a Rules-of-the-Road behavior shows two boats approach-
ing each other head-on. The left side shows the sensory inputs that are needed by the behaviors that be conveyed to the operator if the
are competing with each other to control the actuators. The right side shows the behavior network human/machine interface (HMI)
with four behaviors fed into the Arbitration module to produce the settings for the rudder (heading)
has a detail level of request capability.
and throttle (speed) of the vehicle. Mapping of the behavior network to an equivalent cost-calculus
expression is shown at the bottom. This work was done by Terrance L.
Huntsberger of Caltech for NASA’s Jet
action they choose and why. Robotic this is to map the behavior base of the Propulsion Laboratory. Further information is
agents with enough self-awareness to dy- robot into a formal mathematical frame- contained in a TSP (see page 1).
namically adjust the information con- work called a cost-calculus. A cost-calcu- The software used in this innovation is
veyed back to the Operations Center lus uses composition operators to build available for commercial licensing. Please con-
based on a detail level component analy- up sequences of behaviors that can then tact Daniel Broderick of the California Institute
sis of requests could provide this descrip- be compared to what is observed using of Technology at [email protected]. Refer to
tion capability. One way to accomplish well-known inference mechanisms. NPO-46864.
A DNA-Inspired Encryption Methodology for Secure,
Mobile Ad Hoc Networks
An encryption mechanism uses the principles of DNA replication and steganography.
Goddard Space Flight Center, Greenbelt, Maryland
Users are pushing for greater physical ingress/egress of nodes on an unsched- achieves high degrees of diffusion and
mobility with their network and Internet uled basis. Because the networks by their confusion, and resistance to cryptanaly-
access. Mobile ad hoc networks very nature are mobile and self-organiz- sis. A proprietary encryption mechanism
(MANET) can provide an efficient mo- ing, use of a Public Key Infras tructure was developed that uses the principles of
bile network architecture, but security is (PKI), X.509 certificates, RSA, and DNA replication and steganography
a key concern. The figure summarizes nonce exc hanges becomes problematic (hidden word cryptography) for confi-
differences in the state of network secu- if the ideal of MANET is to be achieved. dentiality and authentication. The foun-
rity for MANET and fixed networks. Molecular biology models such as DNA dation of the approach includes organi-
MANETs require the ability to distin- evolution can provide a basis for a pro- zation of coded words and messages
guish trusted peers, and tolerate the prietary security architecture that using base pairs organized into genes,
34 NASA Tech Briefs, January 2012