Kartik Ariyur - Academia.edu (original) (raw)

Uploads

Papers by Kartik Ariyur

Research paper thumbnail of Tailored Fuel Injection for Pulsed Detonation Engines via Feedback Control

Journal of Propulsion and Power, 2003

Research paper thumbnail of Tracking a moving object from a camera on a moving platform

Research paper thumbnail of Enabling Operational Autonomy for Unmanned Aerial Vehicles with Scalability

Journal of Aerospace Information Systems, 2013

Research paper thumbnail of <title>Active control of blade vortex interaction noise on a helicopter blade element</title>

Smart Structures and Materials 1998: Mathematics and Control in Smart Structures, 1998

Research paper thumbnail of Prediction of Dynamic Ground Effect Through Modified Lifting Line Theory

23rd AIAA Applied Aerodynamics Conference, 2005

Research paper thumbnail of Method and system for performing distributed outer loop power control in wireless communication networks

Research paper thumbnail of METHOD FOR COLLISION AVOIDANCE OF UNMANNED AERIAL VEHICLE WITH OTHER AIRCRAFT

Research paper thumbnail of Method and device for three-dimensional path planning to avoid obstacles using multiple planes

Research paper thumbnail of Laplacian Path Planning: Implementation and Generalizations

Infotech@Aerospace 2011, 2011

Research paper thumbnail of Scalable Autonomy for UAVs

Infotech@Aerospace 2011, 2011

Research paper thumbnail of Tailored Fuel Injection for Pulsed Detonation Engines via Feedback Control

Journal of Propulsion and Power, 2003

Research paper thumbnail of Region of Attraction with Performance Bounds

AIAA Guidance, Navigation, and Control Conference, 2009

Research paper thumbnail of Extremum Seeking for Model Reference Adaptive Control

AIAA Guidance, Navigation, and Control Conference, 2009

Research paper thumbnail of Quantifying the security of physical facilities: A game theoretic framework

2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012

ABSTRACT We develop a framework for quantifying the security of physical facilities-airports, gov... more ABSTRACT We develop a framework for quantifying the security of physical facilities-airports, government or industrial - and for evaluating their performance. We abstract the contest between the attackers and the defense as a game with two sides: N-levels of security on one side and M coordinated attackers on the other. The different security systems in place, such as walk-in metal detectors or X-ray machines, or even human personnel are described by their detection rates and false alarm rates for objects inspected by them. We assume that the M attackers share all of their knowledge through perfect communication. Under these conditions we derive the optimal strategies for both the security system and the criminals for static detection thresholds of the security devices; under conditions of randomization of the detection thresholds; and for certain kinds of feedback when an attacker is caught. Our results show that current security levels can be maintained at significantly lower personnel costs (up to 50%) or equivalently, the potential for attaining much higher throughput (up to 200%) without any changes to hardware, and with little change to personnel training.

Research paper thumbnail of On the extremum seeking of model reference adaptive control in higher-dimensional systems

We develop a method for the model reference adaptive control (MRAC) of first order systems via ex... more We develop a method for the model reference adaptive control (MRAC) of first order systems via extremum seeking. We show, in special cases in which there exists a partial knowledge of parameter values, proofs of global and exponential convergence of both the tracking and parameter tracking errors. We then extend the proposed method from first order systems to linear systems

Research paper thumbnail of TRENDING SYSTEM AND METHOD USING WINDOW FILTERING

Research paper thumbnail of Real Time Energy Management: Cutting the Carbon Footprint and Energy Costs via Hedging, Local Sources and Active Control

ASME 2009 Dynamic Systems and Control Conference, Volume 1, 2009

Research paper thumbnail of Analytic Framework and QoS Adaptive Mechanisms for Achieving Transport Capacity Bounds in Multi-hop Statically Routed IEEE 802.11 b Networks

This paper addresses the problem of Quality of Service (QoS) provisioning and adaptation in a wir... more This paper addresses the problem of Quality of Service (QoS) provisioning and adaptation in a wireless ad hoc network, which is very challenging due to the interference and contention-based nature of the network. The paper develops a clean analytic per-formance model characterizing a multi-hop CSMA/CA network that can be practically used for QoS provisioning. Using the analytic model developed, we propose a QoS adaptation frame-work which tunes parameters at the time of new unicast flow admission into the network. Preliminary numerical evaluations and simulation performance results demonstrate the potential throughput gain by our adaptation scheme.

Research paper thumbnail of Multiparameter Extremum Seeking

Ariyur/Extremum Seeking, 2003

Research paper thumbnail of Behavioral modeling and optimal control of a vehicle mechanical drive system

2015 American Control Conference (ACC), 2015

Research paper thumbnail of Tailored Fuel Injection for Pulsed Detonation Engines via Feedback Control

Journal of Propulsion and Power, 2003

Research paper thumbnail of Tracking a moving object from a camera on a moving platform

Research paper thumbnail of Enabling Operational Autonomy for Unmanned Aerial Vehicles with Scalability

Journal of Aerospace Information Systems, 2013

Research paper thumbnail of <title>Active control of blade vortex interaction noise on a helicopter blade element</title>

Smart Structures and Materials 1998: Mathematics and Control in Smart Structures, 1998

Research paper thumbnail of Prediction of Dynamic Ground Effect Through Modified Lifting Line Theory

23rd AIAA Applied Aerodynamics Conference, 2005

Research paper thumbnail of Method and system for performing distributed outer loop power control in wireless communication networks

Research paper thumbnail of METHOD FOR COLLISION AVOIDANCE OF UNMANNED AERIAL VEHICLE WITH OTHER AIRCRAFT

Research paper thumbnail of Method and device for three-dimensional path planning to avoid obstacles using multiple planes

Research paper thumbnail of Laplacian Path Planning: Implementation and Generalizations

Infotech@Aerospace 2011, 2011

Research paper thumbnail of Scalable Autonomy for UAVs

Infotech@Aerospace 2011, 2011

Research paper thumbnail of Tailored Fuel Injection for Pulsed Detonation Engines via Feedback Control

Journal of Propulsion and Power, 2003

Research paper thumbnail of Region of Attraction with Performance Bounds

AIAA Guidance, Navigation, and Control Conference, 2009

Research paper thumbnail of Extremum Seeking for Model Reference Adaptive Control

AIAA Guidance, Navigation, and Control Conference, 2009

Research paper thumbnail of Quantifying the security of physical facilities: A game theoretic framework

2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012

ABSTRACT We develop a framework for quantifying the security of physical facilities-airports, gov... more ABSTRACT We develop a framework for quantifying the security of physical facilities-airports, government or industrial - and for evaluating their performance. We abstract the contest between the attackers and the defense as a game with two sides: N-levels of security on one side and M coordinated attackers on the other. The different security systems in place, such as walk-in metal detectors or X-ray machines, or even human personnel are described by their detection rates and false alarm rates for objects inspected by them. We assume that the M attackers share all of their knowledge through perfect communication. Under these conditions we derive the optimal strategies for both the security system and the criminals for static detection thresholds of the security devices; under conditions of randomization of the detection thresholds; and for certain kinds of feedback when an attacker is caught. Our results show that current security levels can be maintained at significantly lower personnel costs (up to 50%) or equivalently, the potential for attaining much higher throughput (up to 200%) without any changes to hardware, and with little change to personnel training.

Research paper thumbnail of On the extremum seeking of model reference adaptive control in higher-dimensional systems

We develop a method for the model reference adaptive control (MRAC) of first order systems via ex... more We develop a method for the model reference adaptive control (MRAC) of first order systems via extremum seeking. We show, in special cases in which there exists a partial knowledge of parameter values, proofs of global and exponential convergence of both the tracking and parameter tracking errors. We then extend the proposed method from first order systems to linear systems

Research paper thumbnail of TRENDING SYSTEM AND METHOD USING WINDOW FILTERING

Research paper thumbnail of Real Time Energy Management: Cutting the Carbon Footprint and Energy Costs via Hedging, Local Sources and Active Control

ASME 2009 Dynamic Systems and Control Conference, Volume 1, 2009

Research paper thumbnail of Analytic Framework and QoS Adaptive Mechanisms for Achieving Transport Capacity Bounds in Multi-hop Statically Routed IEEE 802.11 b Networks

This paper addresses the problem of Quality of Service (QoS) provisioning and adaptation in a wir... more This paper addresses the problem of Quality of Service (QoS) provisioning and adaptation in a wireless ad hoc network, which is very challenging due to the interference and contention-based nature of the network. The paper develops a clean analytic per-formance model characterizing a multi-hop CSMA/CA network that can be practically used for QoS provisioning. Using the analytic model developed, we propose a QoS adaptation frame-work which tunes parameters at the time of new unicast flow admission into the network. Preliminary numerical evaluations and simulation performance results demonstrate the potential throughput gain by our adaptation scheme.

Research paper thumbnail of Multiparameter Extremum Seeking

Ariyur/Extremum Seeking, 2003

Research paper thumbnail of Behavioral modeling and optimal control of a vehicle mechanical drive system

2015 American Control Conference (ACC), 2015

Log In