Next Article in Journal
Classification of the Microstructural Elements of the Vegetal Tissue of the Pumpkin (Cucurbita pepo L.) Using Convolutional Neural Networks
Next Article in Special Issue
State Estimation of Over-Sensored Systems Applied to a Low-Cost Robotic Manipulator
Previous Article in Journal
A Study of EEG Feature Complexity in Epileptic Seizure Prediction
Previous Article in Special Issue
Deliberative and Conceptual Inference in Service Robots
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Efficient Detection of Robot Kidnapping in Range Finder-Based Indoor Localization Using Quasi-Standardized 2D Dynamic Time Warping

1
Centre for Artificial Intelligence and Robotics, Universiti Teknologi Malaysia, Jalan Sultan Yahya Petra, Kuala Lumpur 54100, Malaysia
2
Department of Electrical Engineering, Faculty of Engineering, President University, Bekasi 17550, Indonesia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2021, 11(4), 1580; https://doi.org/10.3390/app11041580
Submission received: 15 December 2020 / Revised: 11 January 2021 / Accepted: 20 January 2021 / Published: 9 February 2021
(This article belongs to the Collection Advances in Automation and Robotics)

Abstract

:

Featured Application

In this work, an augmented online approach is used to effectively detect a kidnapping event within range-finder-based indoor localization.

Abstract

This paper proposes an augmented online approach to detect kidnapping events within range-finder-based indoor localization. The method is specifically designed for an Internet of Things (IoT)-Aided Robotics Platform that enables the system to detect kidnapping across all time instances of an indoor mobile robotic operation with high accuracy and maintain a high accuracy in the face of relocalization failures. The approach is based on similarity degree of geometry shape of the environment obtained from range scan data between two consecutive time instances. The proposed approach named Quasi-Standardized Two-Dimensional Dynamic Time Warping (QS-2DDTW) is based on the Multidimensional Dynamic Time Warping (MD-DTW) with homogeneity variance test imbued in it. A series of simulations are preformed against maximum current weight, measurement entropy, and the four metrics in metric based detector. The result shows that the proposed method yields high performance in terms of its ability to distinguish kidnapping condition from normal condition and that it has low dependency towards relocalization process, thus ensures the accuracy of detection is not disturbed by relocalization.

1. Introduction

Research trends within technological innovation are leading to the appearance of the Internet of Things (IoT)-aided robotics application. An IoT-aided robotic comprising an IoT device connected to a mobile platform plays a major role in tomorrow’s society, continuing to help persons in accomplishing many duties, spanning from precision farming to industrial warehouses, from wildlife monitoring to infrastructure or asset management. Within the robot localization itself, there is a taxonomy of problems to be solved based on how one looks at the problem [1]. One such category is based on type of the initial knowledge that a robot may possess initially and/or at run-time. There are three problems in this category; position tracking, global localization [2,3], and kidnapped problem [4,5]. Position tracking is a problem to localize a mobile robot based on the information from the environment and previous knowledge of the pose. Global localization is similar to pose tracking, however there is no previous pose knowledge available as discussed in [6] and [7]. Kidnapped Robot Problem (KRP) is more difficult than the two. This problem is defined as a condition when the robot is being transported somewhere in the map while doing localization or pose tracking, without knowing where the destination is and without even realizing it has been moved.
KRP rarely happens in real life, however the ability to solve KRP is usually considered as a measure of good localization technique. Another importance of KRP study is the concern on robot’s safety. An undetected and/or unsolved KRP leads to incorrect map and incorrect pose estimate, thus may hinder the robot from performing its task. A more dangerous problem is when the robot wanders around an undefined/incomplete map while believing that it is still performing localization well. This condition is dangerous when there is a potential hazard in the undefined/incomplete map. The kidnapping event may happen at any time during indoor robot’s exploration [8]. Therefore, an accurate online kidnapping detector is preferable in this case, such that there is immediate and reliable information that the robot is kidnapped at any points in time. This type of detector will allow precautionary action to be taken right after kidnapping, and determine whether a global localization process is required.
This paper proposes an augmented online approach for a mobile robot to effectively detect the kidnapping event in range-finder-based indoor localization, based on shape similarity of environment scans between two consecutive time instances. The shape similarity measure used in the approach is a variant of Two-Dimensional Dynamic Time Warping. The rest of the paper is organized as follows. In Section 2, a literature review on existing detection methods is presented. Section 3 lays the groundwork and details of the proposed detection method while the details of benchmarks are presented in Section 4. Section 5 discusses the results of proposed online detection approach and lastly Section 6 concludes the paper.

2. Related Works for Kidnapping Problem in Localization

Thrun et al. in their work of Augmented Monte Carlo Localization [3] solves KRP by injecting random new hypotheses (called particles) of a robot’s pose at every time step. By this procedure, the robot can relocalize after kidnapping without detecting the event. This offline approach however is not preferable since one needs to wait until the end of a robot’s exploration to obtain kidnapping information. The other problem with this approach is that it is inefficient because the relocalization process is executed at every time step even when it is unnecessary, i.e., no kidnapping event occurred at that particular time step.
In order to achieve better KRP solution, numerous online detection methods of kidnapping events have been proposed. Zhang et al. in [9] detect kidnapping by using the maximum weight of current set particles (pose hypotheses) in Monte Carlo Localization. A similar parameter is proposed by Choi et al. in [5], which uses the entropy of the particles’ weight instead of the maximum weight. These two approaches solved the online inabilities of Augmented Monte Carlo Localization; however, the accuracy of detection is still not of concern.
Metric-based detection by Campbell et al. [4] address the accuracy of detection more specifically. The approach is based on a new technique of deterministic localization based on scan matching introduced in [10], called Normal Distribution Transform (NDT). Their four detection metrics are based on the error between two scans aligned by the localization (NDT in their work), likelihood of a scan lies on the NDT plane of the reference scan, uncertainty of the least known pose degree of freedom, and the error between NDT-transformed and odometry transformed point clouds. It has not been proven, however, that the method maintains high accuracy to detect kidnapping events across all time instances of a mobile robot’s exploration time. This paper proposed a new approach to detect kidnapping events accurately across all time instances of a robot’s exploration. The underlying idea is that one can determine when it is being kidnapped by measuring the similarity of the environment seen between two consecutive time instances. Given a small natural movement at each time instance, a significant change in environment can be an indication that it is being moved unnaturally, such as slipping or being taken and ‘woken up’ somewhere else. Based on this idea, the problem is thus reduced to shape similarity between the environment scans at two consecutive time instances. A high similarity score indicates the natural movement, and vice versa. An augmented variant of 2-D Dynamic Time Warping is used as a similarity measure.
Indoor mobile robotics with an onboard computational capacity and a better payload can easily incorporate a light two-dimensional (2D) laser rangefinder, which will be considered as an additional sensor that will greatly improve the results of the localization and mapping system under certain environment conditions. Previous studies on 2D indoor localization focus towards the laser SLAM and visual SLAM fusion to provide robust localization [11]. Hess et al. also report the use of portable laser range finders for generating and visualizing floor plans in real-time [12]. Recently, a new sensor fusion method for visual SLAM was proposed through integration of a monocular camera and a 1D-laser range finder where it overcomes the limited depth range problem associated with SLAM for RGBD cameras [13]. Several approaches of online kidnapping detection have been proposed over the years [4,5,6]. In this paper, we investigate their detection performance across all kidnapping points in feature-less corridor map within a Gazebo environment such as the problem addressed in [4] and [9]. It can be defined as a good detector with these criteria:
(1)
The detector should be an online detector [4], such that it may reduce the possibility that the drone wanders around into a possible hazardous point in the map after kidnapping, because an immediate preventive action might be taken if the kidnapping information is obtained immediately after the kidnapping event.
(2)
The detector should be able to differentiate normal condition from kidnapping condition as well as possible, i.e., there is a wide gap in the detector’s output when the robot is in normal condition compared to when it is being kidnapped. This criterion should apply to a wide range of kidnapping points (time instances at which kidnapping events might occur). The wide time range application of a detector is important because a kidnapping may occur anytime during a robot’s exploration.

3. Quasi-Standardized 2-D Dynamic Time Warping

In this section, our proposed approach to detect kidnapping event in feature-less map is presented. The underlying idea is that one can realize a kidnapping event happening when there is a significant change in the perceived environment. In feature-less map, the only information a robot can obtain is the distance to the walls within the range of the sensor. A point cloud can be constructed from the distance measured by each sensor beam [14]. The problem of kidnapping detection can thus be simplified to measuring the similarity between two geometric shapes formed by the point clouds. This paper proposes a novel variant of Multidimensional Dynamic Time Warping (MDDTW) for a two-dimensional case called Quasi-Standardized 2-D Dynamic Time Warping (QS-2DDTW). Before presenting the details of the proposed method, an understanding on a few key aspects of the method are necessary, namely the standard Dynamic Time Warping, Multidimensional Dynamic Time Warping, and the measure of variance similarity.

3.1. Dynamic Time Warping

Dynamic Time Warping (DTW) is a popular temporal sequence alignment method [15], with applications ranging in speech recognition [16,17], human motion animation [18], human activity recognition [19], and time series classification [20]. One key ability of DTW which distinguished it from other alignment method lies in its ability to nonlinearly align two sequences, such that two similar signals will have small distance even though one of the signals is distorted or ‘warped’ in time, for example, by shifting it a few steps ahead [21]. A comparison of alignment result between Euclidean distance, which measures distance between i-th point in one signal to the i-th point in another signal, and DTW can be seen in Figure 1.
It can be clearly seen from the figure that alignment using DTW provides a better measure of similarity since it aligns similar features together (peak vs. peak, trough vs. trough). Similarity measures using DTW is suitable for shape similarity approach in our detection method. This is because the reading of each sensor is not maintained between two consecutive time steps, however, the general shape of the point cloud, i.e., the ‘shape’ of the environment is more or less maintained provided that the robot moves along a sufficiently small distance between any two consecutive time steps [14].
Given 𝒫 and Q , two sequences of real-valued univariate time series of length 𝒫 and   Q , that is 𝒫 = ( p 1 ,   p 2 ,   ,   p 𝒫 ) and   Q = ( q 1 ,   q 2 ,   ,   q Q ) . Let D ( 𝒫 , Q ) 𝒫 × Q represent the pairwise distance matrix between 𝒫 and Q such that D ( 𝒫 , Q ) i , j = | p i q j | . The alignment problem is to find the sequences of indices 𝒫   and Q of the same length ( max ( 𝒫 , Q ) ) which match index 𝒫 ( i ) in 𝒫 and Q ( i ) in Q that minimizes the cost   C = i = 1 l D ( 𝒫 , Q ) 𝒫 ( i ) , Q ( i )   .
REMARK 1: The choice of path to minimize C   should fulfill three constraints. The first one is Monotonicity constraint, which states that the path will never return on itself. Both matching indices will either stay the same or increase; they never decrease. The second one is Continuity constraint, which means the path should only advance one step at a time, that is, both indices increase at most by one every step. The last constraint is Boundary constraint which restricts the path to start from bottom left corner (initial time index of the sequence) to the top right corner (final time index of the sequence) [22].

3.2. Multidimensional Dynamic Time Warping

Holt et al. introduced a variant of Dynamic Time Warping to work with multidimensional time series in [19]. Let 𝒫 and Q be two real-value sequences of time series with dimension K and length 𝒫 and Q , respectively. The algorithm of MD-DTW is summarized in Algorithm 1.
Algorithm 1 MD-DTW algorithm
1. MD-DTW Algorithm
2. Normalize each dimension of P   and Q   separately to zero mean and unit variance
3. Construct distance matrix D ( P , Q ) R L P × L Q according to
4. D ( P , Q ) i , j = k = 1 K | p i , k q j , k |
5. Find the minimum cost path using the regular DTW under the constraints stated in Remark 1 on this distance matrix

3.3. Single and Two-Dimensional Dynamic Time Warping

The problem of detection at hand can technically be approached using 1-D DTW or 2-D DTW depending on how environment reading is represented. Let D t = { d 1 t , d 2 t , , d S t } represent the set of distance reading of S sensor beams at time t. For 1-D approach, direct use of D   as the signals to aligned can be applied, i.e., 𝒫 =   D t 1 and   Q =   D t . For 2-D approach, the signals consist of 2-D point clouds 𝒫 = [ 𝒫 x 𝒫 y ] and Q = [ Q x Q y ] extracted from D t 1 and D t , respectively, by the following function
𝒫 = [ D t 1 cos ( φ ) D t 1 sin ( φ ) ] ,   Q = [ D t cos ( φ ) D t sin ( φ ) ]
where φ is the angle of each sensor beam s   which corresponds to   d s t   with respect to a robot’s local coordinate frame. In this section, we investigate the performance of the two approaches in solving kidnapping detection. Let define the detection parameter value of an arbitrary kidnapping detector method ( can be particles weight, similarity degree, measurement entropy, etc., depending on the detector). For each detector, the detector performance evaluator of each trial is expressed as
( ) = { 1 ( max 2 t t k 1 ( ) / t k ) ,     t   i s   H P T F 1 ( t k / min 2 t t k 1 ( ) ) ,   t   i s   L P T F
where t is the time interval of the robot’s operation and 2 t k T is the kidnapping points, i.e., the time instance at which kidnapping event occurred with kidnapping destination. LPTF is a short form of Low Pass Threshold Function, which we define as a threshold function in which the function holds true when the value is lower than the specified threshold. Similarly, we define HPTF (High Pass Threshold Function) as a threshold function in which the function holds true when the value is higher than the specified threshold. This performance evaluator is intended to measure the ability of to distinguish between the kidnapping condition and the normal condition around the kidnapping points, based on how far the value at t = t_k from the value at any other prior points. Negative value of ( ) implies that there is another value(s) of { 2 t t _ k 1 }   higher (for HPTF) or lower (for LPTF) than t _ k   itself, indicating a misdetection for kidnapping at t = t_k.
In order to obtain the performance index of 1D-DTW and 2D-DTW, a 20 trials performance test is executed and the complete algorithm for the performance test is shown in Algorithm 2 below.
Algorithm 2 Performance test algorithm
1.   Performance Test Algorithm
2. For all 2 t _ k 100 , do
3.  Let the robot run normally. At t = t _ k the robot is kidnapped to a certain place and after that it continues to run normally until t = 100
4.  See if the robot can detect that it has been kidnapped at t = t by measuring ( )
5. Add ( )   to a vector of size [20 × 1] η
6. Repeat this 20 times and measure the performance index η ¯   by averaging η
Therefore, mean of performance index is defined as
η ¯ = 1 N n = 1 N   η n , 2 t _ k T
Summary of the test result is depicted in Figure 2 and it is obviously apparent that raw (unstandardized) 2-D DTW performs better than unstandardized 1-D DTW. The drop at around t = 30 is caused by similarity in sensor reading between the location of the robot before and after kidnapping destination (around t = 30 the robot is at a point in the map which gives similar rangefinder reading as the kidnapping destination reading). As can be seen in Figure 2, the 2-D versions perform better at distinguishing in this very similar sensor reading. Moreover, a few misdetections happen towards the end even for 2-D DTW. This can be mitigated by introducing the standardization as in the algorithm in Algorithm 1; however, it generally reduces the performance compared to the unstandardized version.
Another tool is thus required to ensure high performance while reducing the number of misdetections.

3.4. Variance Homogeneity Test

Variance homogeneity test is a test to verify whether the k samples have equal variances [23,24]. In other words, it is used to test the null hypothesis that the k samples are drawn from the same distribution. Based on the assumption of the distribution the samples came from, the test can be divided into two types; normal distribution-based test and non-normal distribution-based test:
Bartlett Test is one popular test of variance homogeneity [25]. It has high sensitivity towards the non-normality, thus, it works best if the distribution the sample came from is the normal distribution. The test statistic is defined as
V = ( N k ) ln s p 2 i = 1 k ( N i 1 ) ln s i 2 1 + ( 1 ( 3 ( k 1 ) ) ) ( ( i = 1 k 1 ( N i 1 ) ) 1 ( N k ) )
where s i 2 is the variance of the ith group, N is the sample size of the ith group, k is the number of groups, and s p 2 is the pooled variance, defined as
s p 2 = i = 1 k ( N i 1 ) s i 2 ( N k )
Levene Test [26] is a homogeneity test with lower sensitivity towards non-normality, thus it works better than the Bartlett Test if the samples are drawn from non-normal distribution. The test statistic, V is defined as follows
V = ( N k ) i = 1 k N i ( Z ¯ i . Z ¯ . . ) 2 ( k 1 ) i = 1 k j = 1 N i ( Z i j Z ¯ i . ) 2
where Z ¯ i .   is the group means of Z i j and Z ¯ . . is the overall mean of Z i j . Z i j can be represented in a variety of different definitions, however, the one that is known as more robust than the other is called the Brown–Forsythe test which defines Z i j   in terms of the median, that is
Z i j = | Y i j Y ¯ i . |
where Y ¯ i .   is the median of ith subgroup.
Variance homogeneity tests accept the null hypothesis that all k samples are drawn from the distributions with the same variance if
V < F α , k 1 , N k
where F α , k 1 , N k is the upper critical value of F-distribution with k 1 and N k degrees of freedom at significance level α .

3.5. Quasi-Standardized Two-Dimensional Dynamic Time Warping

In this paper, we introduce a new variant of Dynamic Time Warping for two-dimensional time series called Quasi-Standardized Two-Dimensional Dynamic Time Warping (QS-2DDTW) as similarity measure of environment scan between two consecutive time steps, which acts as a kidnapping detector. Let 𝒫 and Q define two point clouds extracted based on the reading of environment by range finder sensor at two time instances t − 1 and t, respectively. The complete algorithm QS-2DDTW is shown in Algorithm 3.
Algorithm 3 QS-2DDTW algorithm
1. QS-2DDTW Algorithm
2. Decompose each dimension of 𝒫 = [ 𝒫 x 𝒫 y ]   and Q = [ Q x   Q y ]  
3. Perform variance homogeneity test (dedicated test to be employed depends on normality of the noise) on both dimensions
V x = V ( 𝒫 x   , Q x )
V y = V ( 𝒫 y   , Q y )
4. if V x < α and V y < α and V x > 1 and V y > 1
5. 𝒫 = [ 𝒫 x 𝒫 ¯ x σ 𝒫 x 𝒫 y 𝒫 ¯ y σ 𝒫 y ]
6. Q = [ Q x Q ¯ x σ Q x Q y Q ¯ y σ Q y ]
7. End if
8. Construct distance matrix D ( 𝒫 , Q ) 𝒫 × Q according to
D ( 𝒫 , Q ) i , j = k = 1 2 | p i , k q j , k |
9. Find the minimum cost path using the regular DTW under the constraints stated in Remark 1 on this distance matrix.
The introduction of variance homogeneity test in line 3 has a purpose to selectively decide when to do standardization and when not to do it. This selection is an attempt to improve DTW detector’s ability to distinguish between normal and kidnapping condition, i.e., increasing their performance index. Please note that the choice of V depends on the estimated normality of measurement noise. In order to verify the improvement, the same performance test as in Algorithm 2 is performed. The result of the test is shown in Figure 3.
The result of unstandardized and standardized versions is also shown for comparison purposes. It is clear from the figure that introducing selection of standardization improves the performance of both 1-D DTW and 2-D DTW as indicated by the absence of negative values while maintaining the high performance level of the unstandardized version. Among these two approaches, however, QS-2DDTW still outperforms QS-1DDTW.

4. Comparative Analysis with the Existing Online Detection Approaches

In this section, basic understanding of three existing online detectors is briefly presented.

4.1. Maximum Current Weight

The detector is proposed in [9] by Zhang et al. The detector works under the Monte Carlo Localization (MCL) [27], which uses samples of possible poses to approximate a robot’s pose belief. These samples (called particles in MCL terminology) are weighted based on how close the environment reading given by each sample is to the reading of the robot, i.e., the higher the weight the better the sample in representing the robot’s true pose. At each time step, the maximum weight of the current set of particles is calculated. A kidnapping event is determined by comparing this value against a threshold. Mathematically, it can be written as
K i d n a p p e d t = { 1 ω t m a x < γ 0 O t h e r w i s e

4.2. Measurement Entropy

Choi et al. in [5] also define a kidnapping detector under Monte Carlo Localization in a topological map with recognizable objects/landmarks at each node. In their work, a metric called measurement entropy, is defined as follows
H t ( p ) = x t [ y ] p ( 𝓈 t , o t , z t | x t [ y ] , m ) log p ( 𝓈 t , o t , z t | x t [ y ] , m )
where 𝓈 t , o t , z t are the distance context to objects at time t, objects seen by the robot at time t, and the features extracted from the objects at time t, respectively. x t [ y ] is the state of particle y at time t and m defines the map.
It can be seen that the term inside the summand in Equation (2) is in fact the weight of particle y and thus the equation can be described as the sum of a particle’s weight entropy, that is
H t ( p ) = x t [ y ] ω t [ y ] l o g ω t [ y ]
Kidnapping detection is based on the rise of this measurement entropy, which can be written as
K i d n a p p e d t = { 1 H t ( p ) π 0 O t h e r w i s e
where π is some constant as a threshold to distinguish kidnapping from normal condition.

4.3. Metric-Based Detector

Recently, Campbell et al. in [4] defined a set of four metrics to detect a kidnapping event. Their work is mainly derived under a deterministic scan matching-based localization called Normal Distribution Transform (NDT) introduced by Biber and Strasser in [10]. Then, Magnusson et al. extended NDT in three-dimensional space [28] and [29].
Given two sequential point clouds extracted from environment scan 𝒫 and Q , matrix T Q 𝒫 estimated by NDT, which transforms coordinate frame Q into coordinate frame of 𝒫 ,   and the same transformation estimated by the odometry U Q 𝒫 ,   the four metrics are defined as follow:
  • Mean squared error between the two NDT-aligned point clouds, which is written as
    Q e ( 𝒫 , Q , T Q 𝒫 ) = 1 n i = 1 n p i q i 2
    where n is the number of overlapping points, p i is a point in   𝒫 ,   and q i   the nearest-neighbor point of p i .
  • The likelihood that the transformed point cloud Q   lies on the surface of NDT of 𝒫 , that is
    Q s ( 𝒫 , Q , T Q 𝒫 ) = 1 n i = 1 n p ˇ ( T Q 𝒫 , b i )
    where n is the number of points of b i in Q .  
  • Standard deviation from the least known pose degree of freedom, calculated from maximum eigenvalue λ of NDT optimization function.
    Q h ( 𝒫 , Q , T Q 𝒫 ) = m a x i = 1 : v λ i
    where v is degree of freedom of a robot’s pose.
  • Mean squared error of point clouds Q transformed by   T Q 𝒫 and U Q 𝒫 ,  
    Q h ( Q , T Q 𝒫 , U Q 𝒫 ) = 1 n i = 1 n q i r i 2

5. Results and Discussion

In this section, a series of simulations that include laser measurements from the Turtlebot3 platform is performed to validate our proposed online detection approach. A unit of TurtleBot3 (see in Figure 4) consisting of a two-wheeled platform where its weight and size are 1.8 kg and 281 × 306 × 141 mm, respectively, is selected.
The mobile robot runs with a use single-board computer with the latest version of Ubuntu Linux (16.04.2 LTS) and Robot Operating System (ROS) Kinetic. The development of ROS packages is still ongoing where in [30], researchers proposed a ROS wrapper of Real Time Appearance Based Mapping with the help of a low cost camera and the Microsoft Kinect XBOX 360 mounted on Turtlebot to improvise the indoor navigation. Moreover, Adaptive Monte Carlo Localization was used for localizing the Turtlebot model in the map. Recent work by Ladosz et al. proposed a ROS framework for development and testing of autonomous control functions. The flexibility and power of ROS was combined with the Robotic Systems toolbox from MATLAB/Simulink, Linux embedded systems and a commercially available autopilot. Thus, it results in a low cost, simple, highly flexible, and reconfigurable system [31].
A 360°LiDAR_node ROS package can be added easily to read and transmit the laser measurements to the remote processor. The use of LiDAR sensor Turtlebot3 can be accessed and commanded from ROS using the mavros package. This TurtleBot model also has a Raspberry Pi Camera and multiple sensors, including gyroscopic, magnetometer, and accelerometer. Note that the system model platform which is running on Gazebo environment is very close to the actual experimental [32], and the multimodal components in the simulated environment can reflect the characteristics of the actual components in a more comprehensive way.
It was compared with three benchmarks, namely Maximum Current Weight (MCW), Measurement Entropy (ME), and Metric-based Detector against QS-2DDTW with the same test as in Algorithm 2. Two types of test were performed which were “Test with re-localization” and “Test without re-localization”. The purpose of this test division was to see how dependent the accuracy of   was to the relocalization process which was started at t = t _ k + 1 . For this purpose, the evaluator in (2) was evaluated for all time instances 2 t T instead of 2 t t _ k 1 . White Gaussian noise with variance 0.1 was employed in the measurement model in each simulation. Since the Gaussian noise model was used, Bartlett test for the variance test was employed for the proposed method. The kidnapping scenario is depicted in Figure 5. This kidnapping scenario can be explained more explicitly, compactified from Algorithm 2, as below:
For all 2 t _ k 100 , perform the following procedure:
  • Let the robot run normally. At t = t _ k the robot is kidnapped to a place indicated in Figure 5 and after that it continues to run normally until t = 100 (at t = t _ k + 1 the robot can be relocalized or not, depending on the type of test)
  • See if the robot can detect that it has been kidnapped at t = t _ k .
  • Repeat this 100 times and measure the performance index.

5.1. Performance Evaluation against MCW and ME

For these MCL-based detectors, the simulation was run using 2000 particles. No re-localization process was implemented and the localization was performed in feature-less corridor map as shown in Figure 5. The performance of the two detectors against our proposed method without and with relocalization is depicted in Figure 6 and Figure 7, respectively.
It is shown clearly on Figure 6 where the black pixels indicate η 0 that under no relocalization policy, MCW and ME perform very poorly. The huge improvement of these two methods when the test is changed to employ relocalization (as shown in Figure 7) indicates that the two methods depend very heavily on the success of the relocalization process. The relatively high dependency is caused by the fact that when relocalization fails (or for the extreme case, none is implemented) the weight of particles exhibit similar low values as in the kidnapping case, inducing detections when no kidnapping event occurs. On the other hand, QS-2DDTW is independent towards the localization process, thus it can maintain a high performance in both tests (with and without relocalization).

5.2. Performance Evaluation against Metric-Based Detector

In this section, there are four metrics to be tested, namely Qe, Qs, Qh, and Qo. Similar to our proposed approach, these metrics are local, i.e., it depends only on two consecutive time instances by comparing the scans obtained by the sensor as given in (5) to (8). The performance of these metrics against QS-2DDTW without and with relocalization are shown in Figure 8 and Figure 9, respectively.
From the presented results in Figure 8 and Figure 9, the small changes in metrics-based detectors between the first test (without relocalization) and second test (with relocalization) indicate a low dependency towards relocalization, thus the detection accuracy is very less likely affected by the success rate in the relocalization process.
Among the five detectors, however, QS-2DDTW once again outperforms others in terms of accuracy for kidnapping across all time instances. It can successfully distinguish normal conditions around kidnapping points from the kidnapping event at the kidnapping points itself better than other methods used as benchmarks. A low dependency towards relocalization also ensures that the accuracy is maintained no matter how successfully the relocalization can be achieved.
Different experiments were set up to evaluate the effectiveness as well as demonstrate the performance of proposed QS-2DDTW in real static and featureless indoor environments as shown in Figure 10. The map of the environment treated as a ground truth with several room dividers and walkway exists in this environment. In Figure 10a, the robot is performing a 2D area mapping while Figure 10b shows the map generated in ROS visualization (RViz) from those indoor environments. An experimental analysis was then performed in several kidnapping and nonkidnapping situations under Metric-Based Detector and the proposed QS-2DDTW. The classical statistical analysis was carried out to examine the difference in the distribution of variables between the presence and absence of kidnapping. Nominal variables (kidnapping time, distance between the start and the end points of the kidnapping event and robot orientation) were independently important between presence and absence of kidnapping. Using the independent predictors, we used LR technique with a stepwise variable selection and receiver operating characteristics (ROC) curve to visualize the probability of presence of kidnapping. Note that the ROC curve is based on the true positive rate that represents a fraction of the detected kidnapping out of the total number of actual kidnapping events as well as the false positive rate that is the fraction of the incorrectly detected nonkidnapping out of the total number of actual nonkidnapping events.
In the initial experiment, we evaluated the detection method under a nonkidnapping situation where there is some possibility of false alarm. A case study of a nonkidnapping situation with Gmapping in this environment as shown in Figure 11 also helps to ensure the smoothness of robot navigation (collision free) as well as validate the recorded coordinates (its starting and ending points).
The second experimental case study involves a robot kidnapping situation as shown in Figure 12. From the mapping result created by Gmapping, Figure 12 depicts the starting and ending locations of the kidnapping event. First the mobile robot runs normally where it moves from the start point (blue point) along the green trajectory until t = t _ k at which kidnapping begins. At random time t = t _ k the mobile robot is kidnapped, and it is observed whether the proposed QS-2DDTW is able to detect the robot kidnapping at t = t _ k . This process will be repeated few times under variation of independent predictors before analyzing the performance of the detection algorithm based on LR technique and ROC.
.
A ROC of the true positive rate (TPR) and false positive rate (FPR) for obtained data of classification technique are shown in Figure 13. As it can be seen from Figure 13 that the proposed QS-2DDTW performed better than the Metric-Based Detector technique in predicting the kidnapping. LR is useful for situations in which it can predict the presence or absence of a characteristic or outcome (in this case is the kidnapping event) based on a set of predictor variables.
Another experimental case study for robot kidnapping is shown in Figure 14. The map shown in Figure 14 is the same as the map described previously, the differences are the trajectory of the robot and type of relocalization process. The mobile robot initially moves along the green trajectory from the start point. When it reaches the kidnapping point at t = t _ k , the robot is jammed in that place until it performs the relocalization process. Then it continues along the green trajectory until the desired location. This process will be repeated few times before the performance of the detection algorithm is analyzed based on LR technique and ROC.
Figure 15 shows a ROC of kidnapping scenario with relocalization process. In the experiment with QS-2DDTW, the kidnapping was successfully detected in which the proposed method successfully distinguished normal conditions around kidnapping points from the kidnapping event at the kidnapping points with low dependency of relocalization process. However, the detection performance of QS-2DDTW in the experimental case study is clearly not the same as in the simulation as nonuniform Gaussian noise distribution cannot be guaranteed to follow the Gaussian distribution in a real environment, resulting in low accuracy of SLAM and the proposed algorithm.

6. Conclusions

An efficient method for a mobile robot to detect a kidnapping problem in range-finder-based indoor localization called Quasi Standardized 2-D Dynamic Time Warping or QS-2DDTW was presented in this paper. The proposed method specifically for mobile indoor operation is based on the similarity degree between the two-dimensional geometry of the environment extracted from range sensor scan between two consecutive time instances. A high similarity degree indicates natural movement while the low similarity degree means there is a drastic change in the environment, which may be caused by a kidnapping event. The simulation result against MCW, ME, and the four metrics in the metric-based detector shows a high independence towards the localization process that ensures the accuracy would not drop even without the relocalization process. The performance of the proposed method, which is indicated by the ability to distinguish conditions at the kidnapping point and all other time instances around it, outperforms all of the benchmarks. In the future, this work can be extended adding more parameters related to the actual data obtained from multimodal sensors as well as evaluating other kidnapping scenarios. Moreover, it is important to improve the robustness in the kidnapping detections by taking into account the sensor fusion in a system model and the construction of the semiphysical mobile platform operated under variation of the kidnapping event within range-finder-based indoor localization.

Author Contributions

Z.H.I.: Conceptualization; Methodology; Validation; Investigation; Visualization; Supervision; Data Curation; Writing—original draft; Writing—Reviewing and Editing. I.B.: Formal analysis; Methodology; Validation; Investigation; Visualization; Data Curation; Writing—original draft; Writing—Reviewing and Editing. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the Ministry of Higher Education Malaysia and Universiti Teknologi Malaysia under Grant no. FRGS/1/2020/TK02/UTM/02/2, R.K130000.7843.5F348 and R.K130000.7643.4C355.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

Thanks to UTM for providing their available software and robotic platform.

Conflicts of Interest

The authors declare no competing interests.

References

  1. Thrun, S.; Fox, D.; Burgard, W. Probabilistic Robotics; MIT Press: Cambridge, MA, USA, 2005. [Google Scholar]
  2. Kwok, C.; Fox, D.; Meila, M. Adaptive real-time particle filters for robot localization. In Proceedings of the IEEE International Conference on Robotics and Automation, Taipei, Taiwan, 14–19 September 2003; pp. 2836–2841. [Google Scholar]
  3. Thrun, S.; Fox, D.; Burgard, D.W.; Dellaert, F. Robust Monte Carlo localization for mobile robots. Artif. Intell. 2001, 128, 99–141. [Google Scholar] [CrossRef] [Green Version]
  4. Campbell, D.; Whitty, M. Metric-based detection of robot kidnapping. In Proceedings of the European Conference on Mobile Robots, Barcelona, Spain, 25–27 September 2013. [Google Scholar]
  5. Yi, C.; Choi, B.-U. Detection and recovery for kidnapped-robot problem using measurement entropy. In Grid and Distributed Computing; Springer: Berlin/Heidelberg, Germany, 2011; Volume 261, pp. 293–299. [Google Scholar]
  6. Roumeliotis, S.I.; Bekey, G.A. Bayesian estimation and Kalman filtering: A unified framework for mobile robot localization. In Proceedings of the International Conference on Robotics and Automation, San Francisco, CA, USA, 24–28 April 2000. [Google Scholar]
  7. Andreasson, H.; Treptow, A.; Duckett, T. Localization for mobile robots using panoramic vision, local features and particle filter. In Proceedings of the International Conference on Robotics and Automation, Barcelona, Spain, 18–22 April 2005. [Google Scholar]
  8. Bukhori, Z.; Ismail, H.; Namerikawa, T. Detection strategy for kidnapped robot problem in landmark-based map Monte Carlo localization. In Proceedings of the International Symposium on Robotics and Intelligent Sensors, Langkawi, Malaysia, 18–20 October 2015. [Google Scholar]
  9. Zhang, L.; Zapata, R.; Lépinay, P. Self-adaptive Monte Carlo localization for mobile robots using range finders. Robotica 2012, 30, 229–244. [Google Scholar] [CrossRef] [Green Version]
  10. Biber, P.; Strasser, W. The normal distributions transform: A new approach to laser scan matching. In Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Tokyo, Japan, 3–7 November 2013. [Google Scholar]
  11. Chan, S.; Wu, P.; Fu, L. Robust 2D Indoor Localization Through Laser SLAM and Visual SLAM Fusion. In Proceedings of the 2018 IEEE International Conference on Systems, Man, and Cybernetics, Miyazaki, Japan, 7–10 October 2018; pp. 1263–1268. [Google Scholar]
  12. Hess, W.; Kohler, D.; Rapp, H.; Andor, D. Real-time loop closure in 2D LIDAR SLAM. In Proceedings of the 2016 IEEE International Conference on Robotics and Automation, Stockholm, Sweden, 16–21 May 2016; pp. 1271–1278. [Google Scholar]
  13. Zhang, Z.; Zhao, R.; Liu, E.; Yan, K.; Ma, Y. Scale Estimation and Correction of the Monocular Simultaneous Localization and Mapping (SLAM) Based on Fusion of 1D Laser Range Finder and Vision Data. Sensors 2018, 18, 1948. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Lu, F.; Milios, E. Robot pose estimation in unknown environments by matching 2D range scans. J. Intell. Robot. Syst. 1997, 18, 249–275. [Google Scholar] [CrossRef]
  15. Kulkarni, K.; Evangelidis, G.; Cech, J.; Horaud, R. Continuous action recognition based on sequence alignment. Int. J. Comput. Vis. 2015, 112, 90–114. [Google Scholar] [CrossRef]
  16. Sakoe, H.; Chiba, S. Dynamic programming algorithm optimization for spoken word recognition. IEEE Trans. Acoust. Speech Signal Process. 1978, 26, 43–49. [Google Scholar] [CrossRef] [Green Version]
  17. Rabiner, L.; Juang, B.H. Fundamentals of Speech Recognition; Prentice-Hall International: Upper Saddle River, NJ, USA, 1993. [Google Scholar]
  18. Hsu, E.; Pulli, K.; Popović, J. Style translation for human motion. ACM Trans. Graph. 2005, 24, 1082–1089. [Google Scholar] [CrossRef]
  19. Holt, G.A.T.; Reinders, M.J.T.; Hendriks, E.A. Multi-dimensional dynamic time warping for gesture recognition. In Proceedings of the 13th Annual Conference of the Advanced School for Computing and Imaging, Holland, The Netherlands, 13–15 June 2007. [Google Scholar]
  20. Chen, Y.; Keogh, E.; Hu, B.; Begum, N.; Bagnall, A.; Mueen, A.; Batista, G. The UCR Time Series Classification Archive. Available online: http://www.cs.ucr.edu/~eamonn/time_series_data/ (accessed on 15 July 2015).
  21. Sankoff, D.; Kruskal, J. The symmetric time-warping problem: From continuous to discrete. In Time Warps, String Edits, and Macromolecules: The Theory and Practice of Sequence Comparison; Addison Wesley Publishing Company: Boston, MA, USA, 1983; pp. 125–161. [Google Scholar]
  22. Keogh, E.; Ratanamahatana, C.A. Exact indexing of dynamic time warping. Knowl. Inf. Syst. 2005, 7, 358–386. [Google Scholar] [CrossRef]
  23. Brown, M.B.; Forsythe, A.B. Robust tests for equality of variances. J. Am. Stat. Assoc. 1974, 69, 364–367. [Google Scholar] [CrossRef]
  24. O’Brien, R.G. Robust techniques for testing heterogeneity of variance effects in factorial designs. Psychometrika 1978, 43, 327–342. [Google Scholar] [CrossRef]
  25. Bartlett, M.S. Properties of sufficiency and statistical tests. Proceedings of the Royal Society of London. Ser. A Math. Phys. Sci. 1937, 160, 268–282. [Google Scholar]
  26. Levene, H. Robust Tests for Equality of Variances. In Contributions to Probability and Statistics: Essays in Honor of Harold Hotelling; Stanford University Press: Palo Alto, CA, USA, 1960; pp. 278–292. [Google Scholar]
  27. Thrun, S.; Fox, D.; Burgard, W. Monte Carlo localization with mixture proposal distribution. In Proceedings of the AAAI/IAAI, Austin, TX, USA, 30 July 2000. [Google Scholar]
  28. Magnusson, M.; Lilienthal, A.; Duckett, T. Scan registration for autonomous mining vehicles using 3D-NDT. J. Field Robot. 2007, 24, 803–827. [Google Scholar] [CrossRef] [Green Version]
  29. Magnusson, M. The Three-Dimensional Normal-Distribution Transform—An Efficient Representation for Registration, Surface Analysis, and Loop Detection. Ph.D. Thesis, Orebro University, Orebro, Sweden, 2009. [Google Scholar]
  30. Mishra, R.; Javed, A. ROS based service robot platform. In Proceedings of the 2018 4th International Conference on Control, Automation and Robotics (ICCAR), Auckland, New Zealand, 20–23 April 2018; pp. 55–59. [Google Scholar]
  31. Ladosz, P.; Coombes, M.; Smith, J.; Hutchinson, M. A Generic ROS Based System for Rapid Development and Testing of Algorithms for Autonomous Ground and Aerial Vehicles. In Robot Operating System (ROS), Studies in Computational Intelligence; Koubaa, A., Ed.; Springer: Berlin, Germany, 2018; Volume 778. [Google Scholar]
  32. Linder, T.; Arras, K.O. People Detection, Tracking and Visualization Using ROS on a Mobile Service Robot. In Robot Operating System (ROS), Studies in Computational Intelligence; Koubaa, A., Ed.; Springer: Berlin, Germany, 2016; Volume 625. [Google Scholar]
Figure 1. Alignment between two signals differs in phase. (a) is the result of Euclidean distance alignment, while (b) shows the resulting DTW.
Figure 1. Alignment between two signals differs in phase. (a) is the result of Euclidean distance alignment, while (b) shows the resulting DTW.
Applsci 11 01580 g001
Figure 2. Comparison of performance between 1-D DTW and 2-D DTW. The top plot shows the comparison between the unstandardized versions of the two, while the bottom one shows the comparison between the standardized versions of them.
Figure 2. Comparison of performance between 1-D DTW and 2-D DTW. The top plot shows the comparison between the unstandardized versions of the two, while the bottom one shows the comparison between the standardized versions of them.
Applsci 11 01580 g002
Figure 3. Comparison of performance between unstandardized 1-D DTW and unstandardized 2-D DTW (Top), standardized 1D-DTW and standardized 2-D DTW (Middle), and QS1DTW and QS2DTW (Bottom).
Figure 3. Comparison of performance between unstandardized 1-D DTW and unstandardized 2-D DTW (Top), standardized 1D-DTW and standardized 2-D DTW (Middle), and QS1DTW and QS2DTW (Bottom).
Applsci 11 01580 g003
Figure 4. TurtleBot3 Waffle platform (left) and its navigation through an indoor area (right).
Figure 4. TurtleBot3 Waffle platform (left) and its navigation through an indoor area (right).
Applsci 11 01580 g004
Figure 5. A corridor map used in the Gazebo (a) and the instance of a kidnapping event (b).
Figure 5. A corridor map used in the Gazebo (a) and the instance of a kidnapping event (b).
Applsci 11 01580 g005
Figure 6. Performance results of MCW (top), ME (middle), and proposed QS-2DDTW (bottom) without relocalization. Black pixels indicate η 0 .
Figure 6. Performance results of MCW (top), ME (middle), and proposed QS-2DDTW (bottom) without relocalization. Black pixels indicate η 0 .
Applsci 11 01580 g006
Figure 7. Performance result of MCW (top), ME (middle), and proposed QS-2DDTW (bottom) with relocalization. Black pixels indicate η 0 .
Figure 7. Performance result of MCW (top), ME (middle), and proposed QS-2DDTW (bottom) with relocalization. Black pixels indicate η 0 .
Applsci 11 01580 g007
Figure 8. Performance result of metric-based detectors against QS-2DDTW (bottom) without relocalization. Black pixels indicate η 0 .
Figure 8. Performance result of metric-based detectors against QS-2DDTW (bottom) without relocalization. Black pixels indicate η 0 .
Applsci 11 01580 g008
Figure 9. Performance result of metric-based detectors against QS-2DDTW (bottom) with relocalization. Black pixels indicate η 0 .
Figure 9. Performance result of metric-based detectors against QS-2DDTW (bottom) with relocalization. Black pixels indicate η 0 .
Applsci 11 01580 g009
Figure 10. The mapping process and result of experimental testbed. (a) Mapping process using Turtlebot, (b) mapping result.
Figure 10. The mapping process and result of experimental testbed. (a) Mapping process using Turtlebot, (b) mapping result.
Applsci 11 01580 g010
Figure 11. Experimental case study of mapping result of a nonkidnapping situation.
Figure 11. Experimental case study of mapping result of a nonkidnapping situation.
Applsci 11 01580 g011
Figure 12. Case study of the kidnapping scenario at t = t _ k .
Figure 12. Case study of the kidnapping scenario at t = t _ k .
Applsci 11 01580 g012
Figure 13. Case study of the kidnapping scenario at t = t _ k .
Figure 13. Case study of the kidnapping scenario at t = t _ k .
Applsci 11 01580 g013
Figure 14. Case study of the kidnapping scenario with relocalization process.
Figure 14. Case study of the kidnapping scenario with relocalization process.
Applsci 11 01580 g014
Figure 15. Case study of the kidnapping scenario with relocalization process.
Figure 15. Case study of the kidnapping scenario with relocalization process.
Applsci 11 01580 g015
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ismail, Z.H.; Bukhori, I. Efficient Detection of Robot Kidnapping in Range Finder-Based Indoor Localization Using Quasi-Standardized 2D Dynamic Time Warping. Appl. Sci. 2021, 11, 1580. https://doi.org/10.3390/app11041580

AMA Style

Ismail ZH, Bukhori I. Efficient Detection of Robot Kidnapping in Range Finder-Based Indoor Localization Using Quasi-Standardized 2D Dynamic Time Warping. Applied Sciences. 2021; 11(4):1580. https://doi.org/10.3390/app11041580

Chicago/Turabian Style

Ismail, Zool H., and Iksan Bukhori. 2021. "Efficient Detection of Robot Kidnapping in Range Finder-Based Indoor Localization Using Quasi-Standardized 2D Dynamic Time Warping" Applied Sciences 11, no. 4: 1580. https://doi.org/10.3390/app11041580

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop