skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Kreidl, O Patrick"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Abstract—In many scenarios for informative path planning done by ground robots or drones, certain types of information are significantly more valuable than others. For example, in the precision agriculture context, detecting plant disease outbreaks can prevent costly crop losses. Quite often, there is a limit on the exploration budget, which does not allow for a detailed investigation of every location. In this paper, we propose Learned Adaptive Inspection Paths (LAIP), a methodology to learn policies that handle such scenarios by combining uniform sampling with close inspection of areas where high-value information is likely to be found. LAIP combines Q-learning in an offline reinforcement learning setting, careful engineering of the state representation and reward system, and a training regime inspired by the teacher-student curriculum learning model. We found that a policy learned with LAIP outperforms traditional approaches in low-budget scenarios. 
    more » « less
    Free, publicly-accessible full text available December 10, 2025
  2. Free, publicly-accessible full text available December 9, 2025
  3. We optimize the overall energy consumption of a Narrowband Internet of Things (NB-IoT) application created using a hybrid blockchain framework. We accomplish this by engineering the underlying hash function (SHA-256) that is used in different procedures (Unique ID generation, Device Join, and Device Transaction) of the blockchain-based NB-IoT system. In order to reduce the complexity of hash verification, IoT devices in the NB-IoT application are built to save the hashes of their authorized transactions as a linear hash chain rather than the entire Merkle tree. Furthermore, base station memory is dynamically partitioned to improve memory usage efficiency and scalability. Compared with the state-of-the-art approach, our approach considerably reduces the total energy consumption of the state-of-the-art application. 
    more » « less
    Free, publicly-accessible full text available January 1, 2026
  4. In this work, we propose a blockchain-based solution for securing robot-to-robot communication for a task with a high socioeconomic impact—information gathering. The objective of the robots is to gather maximal information about an unknown ambient phenomenon such as soil humidity distribution in a field. More specifically, we use the proof-of-work (PoW) consensus protocol for the robots to securely coordinate while rejecting tampered data injected by a malicious entity. As the blockchain-based PoW protocol has a large energy footprint, we next employ an algorithmically-engineered energy-efficient version of PoW. Results show that our proposed energy-efficient PoW-based protocol can reduce energy consumption by 14% while easily scaling up to 10 robots. 
    more » « less