Kartik Ariyur - Academia.edu (original) (raw)
Uploads
Papers by Kartik Ariyur
Journal of Propulsion and Power, 2003
Journal of Aerospace Information Systems, 2013
Smart Structures and Materials 1998: Mathematics and Control in Smart Structures, 1998
23rd AIAA Applied Aerodynamics Conference, 2005
Infotech@Aerospace 2011, 2011
Infotech@Aerospace 2011, 2011
Journal of Propulsion and Power, 2003
AIAA Guidance, Navigation, and Control Conference, 2009
AIAA Guidance, Navigation, and Control Conference, 2009
2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012
ABSTRACT We develop a framework for quantifying the security of physical facilities-airports, gov... more ABSTRACT We develop a framework for quantifying the security of physical facilities-airports, government or industrial - and for evaluating their performance. We abstract the contest between the attackers and the defense as a game with two sides: N-levels of security on one side and M coordinated attackers on the other. The different security systems in place, such as walk-in metal detectors or X-ray machines, or even human personnel are described by their detection rates and false alarm rates for objects inspected by them. We assume that the M attackers share all of their knowledge through perfect communication. Under these conditions we derive the optimal strategies for both the security system and the criminals for static detection thresholds of the security devices; under conditions of randomization of the detection thresholds; and for certain kinds of feedback when an attacker is caught. Our results show that current security levels can be maintained at significantly lower personnel costs (up to 50%) or equivalently, the potential for attaining much higher throughput (up to 200%) without any changes to hardware, and with little change to personnel training.
We develop a method for the model reference adaptive control (MRAC) of first order systems via ex... more We develop a method for the model reference adaptive control (MRAC) of first order systems via extremum seeking. We show, in special cases in which there exists a partial knowledge of parameter values, proofs of global and exponential convergence of both the tracking and parameter tracking errors. We then extend the proposed method from first order systems to linear systems
ASME 2009 Dynamic Systems and Control Conference, Volume 1, 2009
This paper addresses the problem of Quality of Service (QoS) provisioning and adaptation in a wir... more This paper addresses the problem of Quality of Service (QoS) provisioning and adaptation in a wireless ad hoc network, which is very challenging due to the interference and contention-based nature of the network. The paper develops a clean analytic per-formance model characterizing a multi-hop CSMA/CA network that can be practically used for QoS provisioning. Using the analytic model developed, we propose a QoS adaptation frame-work which tunes parameters at the time of new unicast flow admission into the network. Preliminary numerical evaluations and simulation performance results demonstrate the potential throughput gain by our adaptation scheme.
Ariyur/Extremum Seeking, 2003
2015 American Control Conference (ACC), 2015
Journal of Propulsion and Power, 2003
Journal of Aerospace Information Systems, 2013
Smart Structures and Materials 1998: Mathematics and Control in Smart Structures, 1998
23rd AIAA Applied Aerodynamics Conference, 2005
Infotech@Aerospace 2011, 2011
Infotech@Aerospace 2011, 2011
Journal of Propulsion and Power, 2003
AIAA Guidance, Navigation, and Control Conference, 2009
AIAA Guidance, Navigation, and Control Conference, 2009
2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012
ABSTRACT We develop a framework for quantifying the security of physical facilities-airports, gov... more ABSTRACT We develop a framework for quantifying the security of physical facilities-airports, government or industrial - and for evaluating their performance. We abstract the contest between the attackers and the defense as a game with two sides: N-levels of security on one side and M coordinated attackers on the other. The different security systems in place, such as walk-in metal detectors or X-ray machines, or even human personnel are described by their detection rates and false alarm rates for objects inspected by them. We assume that the M attackers share all of their knowledge through perfect communication. Under these conditions we derive the optimal strategies for both the security system and the criminals for static detection thresholds of the security devices; under conditions of randomization of the detection thresholds; and for certain kinds of feedback when an attacker is caught. Our results show that current security levels can be maintained at significantly lower personnel costs (up to 50%) or equivalently, the potential for attaining much higher throughput (up to 200%) without any changes to hardware, and with little change to personnel training.
We develop a method for the model reference adaptive control (MRAC) of first order systems via ex... more We develop a method for the model reference adaptive control (MRAC) of first order systems via extremum seeking. We show, in special cases in which there exists a partial knowledge of parameter values, proofs of global and exponential convergence of both the tracking and parameter tracking errors. We then extend the proposed method from first order systems to linear systems
ASME 2009 Dynamic Systems and Control Conference, Volume 1, 2009
This paper addresses the problem of Quality of Service (QoS) provisioning and adaptation in a wir... more This paper addresses the problem of Quality of Service (QoS) provisioning and adaptation in a wireless ad hoc network, which is very challenging due to the interference and contention-based nature of the network. The paper develops a clean analytic per-formance model characterizing a multi-hop CSMA/CA network that can be practically used for QoS provisioning. Using the analytic model developed, we propose a QoS adaptation frame-work which tunes parameters at the time of new unicast flow admission into the network. Preliminary numerical evaluations and simulation performance results demonstrate the potential throughput gain by our adaptation scheme.
Ariyur/Extremum Seeking, 2003
2015 American Control Conference (ACC), 2015