Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Richard Colbaugh is active.

Publication


Featured researches published by Richard Colbaugh.


Journal of Robotic Systems | 1989

Obstacle avoidance for redundant robots using configuration control

Homayoun Seraji; Richard Colbaugh; Kristin Glass

A redundant robot control scheme is provided for avoiding obstacles in a workspace during motion of an end effector along a preselected trajectory by stopping motion of the critical point on the robot closest to the obstacle when the distance therebetween is reduced to a predetermined sphere of influence surrounding the obstacle. Algorithms are provided for conveniently determining the critical point and critical distance.


international conference on robotics and automation | 1993

Force tracking in impedance control

Homayoun Seraji; Richard Colbaugh

Two simple and computationally efficient schemes for force tracking using impedance control are presented. The schemes generate the reference position trajectory required to produce a desired contact force despite lack of knowledge of the environmental stiffness and location. The first scheme uses direct adaptive control to generate the reference position on-line as a function of the force tracking-error. The second scheme utilizes an indirect adaptive strategy in which the environmental parameters are estimated on-line, and the required reference position is computed based on these estimates. Simulation studies are presented for a 7-degrees-of-freedom (DOF) robotics research arm using full arm dynamics. It is shown that the adaptive schemes are able to compensate for uncertainties in both the environmental stiffness and location, so that the end-effector applies the desired contact force while exhibiting the specified impedance dynamics.<<ETX>>


The International Journal of Robotics Research | 1997

Adaptive regulation of manipulators using only position measurements

Richard Colbaugh; Kristin Glass; Ernest Barany

This article considers the motion-control problem for uncertain robot manipulators in the case where only joint-position mea surements are available, and proposes an adaptive controller as a solution to this problem. The proposed control strategy is general and computationally effrcient, requires very little infor mation regarding the manipulator model or the payload, and ensures that the position-regulation error possesses desirable convergence properties: semiglobal asymptotic convergence if no external disturbances are present, and semiglobal con vergence to an arbitrarily small neighborhood of zero in the presence of bounded disturbances. It is shown that the adaptive controller can be modified to provide accurate trajectory track ing control through the introduction of feedforrvard elements in the control law. The adaptive regulation and tracking schemes have been implemented in laboratory experiments with an IMI Zebra Zero manipulator. These experiments demonstrate that accurate and robust motion control can be achieved by using the proposed approach.


intelligence and security informatics | 2010

Estimating sentiment orientation in social media for intelligence monitoring and analysis

Richard Colbaugh; Kristin Glass

This paper presents a computational approach to inferring the sentiment orientation of “social media” content (e.g., blog posts) which focuses on the challenges associated with Web-based analysis. The proposed methodology formulates the task as one of text classification, models the data as a bipartite graph of documents and words, and uses this framework to develop a semi-supervised sentiment classifier that is well-suited for social media domains. In particular, the proposed algorithm is capable of combining prior knowledge regarding the sentiment orientation of a few documents and words with information present in unlabeled data, which is abundant online. We demonstrate the utility of the approach by showing it outperforms several standard methods for the task of inferring the sentiment of online movie reviews, and illustrate its potential for security informatics through a case study involving the estimation of Indonesian public sentiment regarding the July 2009 Jakarta hotel bombings.


intelligence and security informatics | 2011

Proactive defense for evolving cyber threats

Richard Colbaugh; Kristin Glass

There is significant interest to develop proactive approaches to cyber defense, in which future attack strategies are anticipated and these insights are incorporated into defense designs. This paper considers the problem of protecting computer networks against intrusions and other attacks, and leverages the coevolutionary relationship between attackers and defenders to derive two new methods for proactive network defense. The first method is a bipartite graph-based machine learning algorithm which enables information concerning previous attacks to be “transferred” for application against novel attacks, thereby substantially increasing the rate with which defense systems can successfully respond to new attacks. The second approach involves exploiting basic threat information (e.g., from cyber security analysts) to generate “synthetic” attack data for use in training defense systems, resulting in networks defenses that are effective against both current and (near) future attacks. The utility of the proposed methods is demonstrated by showing that they outperform standard techniques for the task of detecting malicious network activity in two publicly-available cyber datasets.


european intelligence and security informatics conference | 2011

Web Analytics for Security Informatics

Kristin Glass; Richard Colbaugh

An enormous volume of security-relevant information is present on the Web, for instance in the content produced each day by millions of bloggers worldwide, but discovering and making sense of these data is very challenging. This paper considers the problem of exploring and analyzing the Web to realize three fundamental objectives: 1.) security-relevant information is covery, 2.) target situational awareness, typically by making (near) real-time inferences concerning events and activities from available observations, and 3.) predictive analysis, to include providing early warning for crises and forming predictions regarding likely outcomes of emerging issues and contemplated interventions. The proposed approach involves collecting and integrating three types of Web data -- textual, relational, and temporal -- to perform assessments and generate insights that would be difficult or impossible to obtain using standard methods. We demonstrate the efficacy of the framework by summarizing a number of successful real-world deployments of the methodology.


intelligent robots and systems | 1993

Adaptive force-based impedance control

Homayoun Seraji; Richard Colbaugh

Presents two simple and computationally efficient schemes for force tracking using impedance control. The schemes generate the reference position trajectory required to produce a desired contact force despite lack of knowledge of the environmental stiffness and location. The first scheme uses direct adaptive control to generate the reference position online as a function of the force tracking-error. The second scheme utilizes an indirect adaptive strategy in which the environmental parameters are estimated online, and the required reference position is computed based on these estimates. Simulation studies are presented for a 7-DOF Robotics Research arm using full arm dynamics and demonstrate that the adaptive schemes are able to compensate for uncertainties in both the environmental stiffness and location, so that the end-effector applies the desired contact force while exhibiting the specified impedance dynamics.


systems, man and cybernetics | 2012

Predictability-oriented defense against adaptive adversaries

Richard Colbaugh; Kristin Glass

There are substantial potential benefits to considering predictability when designing defenses against adaptive adversaries, including increasing the ability of defense systems to predict new attacker behavior and reducing the capacity of adversaries to anticipate defensive actions. This paper adopts such a perspective, leveraging the coevolutionary relationship between attackers and defenders to derive methods for predicting and countering attacks and for limiting the extent to which adversaries can learn about defense strategies. The proposed approach combines game theory with machine learning to model adversary adaptation in the learners feature space, thereby producing classes of predictive and “moving target” defenses which are scientifically-grounded and applicable to problems of real-world scale and complexity. Case studies with large cyber security datasets demonstrate that the proposed algorithms outperform gold-standard techniques, offering effective and robust defense against evolving adversaries.


intelligence and security informatics | 2012

Predictive defense against evolving adversaries

Richard Colbaugh; Kristin Glass

Adaptive adversaries are a primary concern in several domains, including cyber defense, border security, counterterrorism, and fraud prevention, and consequently there is great interest in developing defenses that maintain their effectiveness in the presence of evolving adversary strategies and tactics. This paper leverages the coevolutionary relationship between attackers and defenders to derive two new approaches to predictive defense, in which future attack techniques are anticipated and these insights are incorporated into defense designs. The first method combines game theory with machine learning to model and predict future adversary actions in the learners “feature space”; these predictions form the basis for synthesizing robust defenses. The second approach to predictive defense involves extrapolating the evolution of defense configurations forward in time, in the space of defense parameterizations, as a way of generating defenses which work well against evolving threats. Case studies with a large cyber security dataset assembled for this investigation demonstrate that each method provides effective, scalable defense against current and future attacks, outperforming gold-standard techniques. Additionally, preliminary tests indicate that a simple variant of the proposed design methodology yields defenses which are difficult for adversaries to reverse-engineer.


intelligence and security informatics | 2010

Automatically identifying the sources of large Internet events

Kristin Glass; Richard Colbaugh; Max Planck

The Internet occasionally experiences large disruptions, arising from both natural and manmade disturbances, and it is of significant interest to develop methods for locating within the network the source of a given disruption (i.e., the network element(s) whose perturbation initiated the event). This paper presents a near real-time approach to realizing this logical localization objective. The proposed methodology consists of three steps: 1.) data acquisition/preprocessing, in which publicly available measurements of Internet activity are acquired, “cleaned”, and assembled into a format suitable for computational analysis, 2.) event characterization via tensor factorization-based time series analysis, and 3.) localization of the source of the disruption through graph theoretic analysis. This procedure provides a principled, automated approach to identifying the root causes of network disruptions at “whole-Internet” scale. The considerable potential of the proposed analytic method is illustrated through a computer simulation study and empirical analysis of a recent, large-scale Internet disruption.

Collaboration


Dive into the Richard Colbaugh's collaboration.

Top Co-Authors

Avatar

Kristin Glass

New Mexico Institute of Mining and Technology

View shared research outputs
Top Co-Authors

Avatar

Homayoun Seraji

California Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Max Planck

New Mexico Institute of Mining and Technology

View shared research outputs
Top Co-Authors

Avatar

Travis L. Bauer

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Curtis M. Johnson

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Dennis Engi

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

Isis Lyman

New Mexico Institute of Mining and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daniel Garcia

Sandia National Laboratories

View shared research outputs
Top Co-Authors

Avatar

David John Zage

Sandia National Laboratories

View shared research outputs
Researchain Logo
Decentralizing Knowledge