Research Interests

  • Multimodal foundation models for agricultural monitoring and yield forecasting

    Develop transformer-based vision–geospatial models by fusing satellite, UAV, and hyperspectral imagery with environmental data using self-supervised pretraining and domain adaptation to enable robust crop classification, stress detection, and yield estimation under severe distribution shifts.

  • Deep learning for perception and scene understanding in robotics

    Develop efficient perception pipelines by combining object detection, semantic segmentation, and 6D pose estimation for reliable operation in cluttered, dynamic, and outdoor environments.

  • Reinforcement learning and motion planning for mobile robots

    Design learning-augmented planners that enable safe, sample-efficient navigation and obstacle avoidance in partially known or dynamic environments

Publications

A ROS-based Voice Controlled Robotic Arm for Automatic Segregation of Medical Waste Using YOLOv3

ICCCR 2022 International Conference on Computer, Control and Robotics 2022

pub 4 img

The outbreak of the Covid-19 pandemic has resulted in a surge in the generation of medical waste. Due to the transmissible nature of the Virus and the lack of effort at proper disposal, the safety of the front-line health workers, as well as the disposer, is at risk. Hence, to mitigate the spread of infectious diseases, a system is proposed that uses a robotic arm for segregating medical waste automatically. The robotic arm is operable through voice commands, and the segregating operation could function in automatic and manual mode. The system uses the YOLOv3 (You Only Look Once) algorithm to detect and classify the medical waste and then uses the Robot Operating System (ROS) platform to pick up and drop the waste object into color-coded bins. For this research, the medical waste has been categorized into 4 types, and for each type, a color-coded bin has been used for segregation. Our system has achieved 94% training accuracy for the YOLOv3 model on a custom dataset, whereas the system's overall accuracy in automated mode was 82.1%, derived after 30 trials. In the case of manual mode, an average accuracy of 82.5% has been achieved for the same number of trials.

Autonomous Intruder Detection Using a ROS-Based Multi-Robot System Equipped with 2D-LiDAR Sensors

SSRR 2020 IEEE International Symposium on Safety, Security, and Rescue Robotics 2020

pub 3 img

The application of autonomous mobile robots in robotic security platforms is becoming a promising field of innovation due to their adaptive capability of responding to potential disturbances perceived through a wide range of sensors. Researchers have proposed systems that either focus on utilizing a single mobile robot or a system of cooperative multiple robots. However, very few of the proposed works, particularly in the field of multi-robot systems, are completely dependent on LiDAR sensors for achieving various tasks. This is essential when other sensors on a robot fail to provide peak performance in particular conditions, such as a camera operating in the absence of light. This paper proposes a multi-robot system that is developed using ROS (Robot Operating System) for intruder detection in a single-range-sensor-per-robot scenario with centralized processing of detections from all robots by our central bot MIDNet (Multiple Intruder Detection Network). This work is aimed at providing an autonomous multi-robot security solution for a warehouse in the absence of human personnel.

Dual-Order Resource Allocation in 5G H-CRAN Using Matching Theory and Ant Colony Optimization Algorithm

IECON 2020 46th Annual Conference of the IEEE Industrial Electronics Society 2020

5G resource allocation

The problem of resource allocation in a Heterogeneous Cloud Radio Access Network (H-CRAN) through user association is a combinatorial optimization problem, which is addressed in this paper. The process of resource allocation is divided into two orders- namely, Primary Order Resource Allocation and Secondary Order Resource Allocation. The association process is initiated at first by using Matching Theory based on the user's Quality of Service (QoS) and the available bandwidth of the best serving base station (BS). The varying QoS demands of the users are met using Ant Colony Optimization (ACO) on the remaining channels, which improves the average data rate and throughput of the users. Hence, the proposed algorithm combines both the cooperative game approach and the constructive greedy approach to enhance the performance metrics of the users. Results of simulations are compared with traditional resource allocation strategies to demonstrate the performance of the proposed algorithm for average data rates, access rates, and throughput.

A Real-Time Controlled Closed Loop IoT Based Home Surveillance System for Android using Firebase

ICCAR 2020 6th International Conference on Control, Automation and Robotics 2020

IoT based Security

With the increasing application of the Internet of Things (IoT) devices in home automation, the prospect for home security has become even more integral. While there have been many notable developments in the field of smart home security systems for the past decade, the possibilities to develop and employ a multitude of features for an IoT based security system keep growing. Our proposed design introduces a cheap IoT based home security system that enables the user to have complete control over the system remotely as well as get live video feedback over the internet by using our custom- designed android application. The android application utilizes a real-time database (Firebase) for interpreting the sensor data. The android application also provides other features such as – password management, activation or deactivation of the system and alert option. The security system combines a motion sensor and a camera module for intruder detection and alerts the user instantly through an online alert notification. For evidence purposes, snapshots of the intruder can be taken during live video monitoring from the android application. Additionally, a GSM module is used to send an SMS alert about the intruder over the cellular network.