2019 Meeting
This schedule is preliminary; exact talk ordering may change. Invited talks will not change times.
- When:
- Friday, September 6, 8:45am–5:00pm
- Where:
- 422 Davis Center (Jost)
Format
- 15m
- 10m presentation + 5m Q/A
- 25m
- 20m presentation + 5m Q/A
Schedule
08:15–08:45am | Breakfast (bagels, cream cheese, yogurt, granola) |
08:45–09:00am | Dean Linda Schadler. Welcome. |
09:00–10:00am |
[Invited Talk]
Yong Yeol Ahn.
Is the network of neurons organized at the edge of modularity? Abstract
A human brain is a network of neurons; our society is a network
of people connected via social relationships. Do they share
anything else in common? What kinds of analogies can we make?
This talk will examine complex contagion dynamics and optimal
modularity phenomenon that occur in both systems. In
particular, we will discuss optimal modularity as a potential
organizing principle that shapes the structure of neural
networks.
|
10:00–10:20am | Break |
10:20–12:00am |
[25m]
Laurence Clarfeld.
Group-Testing Approaches to Sampling Cascading Failures in Power Systems. (adv. Maggie Eppstein) Abstract
Cascading failures in power systems represent a significant risk to electric
transmission systems and yet quantifying this risk remains challenging. One
such challenge is how to cope with the combinatorial search space of potential
triggering events (small sets of power system elements failing simultaneously)
which may result in a cascade. Here, we present a new, group-testing inspired
algorithm for efficiently sampling cascade-inducing events and compare it to
the current state-of-the-art, demonstrating our new approach is easier to
optimize and, under certain circumstances, can reduce the running time for
finding events which trigger cascades.
[25m] David Matthews. Word2vec to Behavior: Morphology Facilitates the Grounding of Language in Machines. (adv. Josh Bongard) Abstract
Enabling machines to respond appropriately to natural language commands could
greatly expand the number of people to whom they could be of service. Recently,
advances in neural network-trained word embeddings have empowered non-embodied
text-processing algorithms, and suggest they could be of similar utility for
embodied machines. Here we introduce a method that does so by training robots
to act similarly to semantically-similar word2vec encoded commands. We show
that this enables them to act appropriately, after training, to
previously-unheard commands. Finally, we show that inducing such an alignment
between motoric and linguistic similarities can be facilitated or hindered by
the mechanical structure of the robot. This points to future, large scale
methods that find and exploit relationships between action, language, and robot
structure.
[25m] Colin Van Oort. Memory Augmented Machine Learning for Improved Adaptability. (adv. Safwan Wshah) Abstract
Artificial Neural Networks, a core element of many modern machine
learning applications, are unable to adapt to changing
environmental conditions. Once trained on a specific set of
training data, which may not cover all of the situations that the
network may experience when deployed in the "real world", the brain
of traditional neural networks, the weights, are fixed and do not
change in response to new experiences. We utilize a variety of
memory mechanisms, such as recurrent connections, plasticity, and
external memory modules, in an effort to develop models that are
better able to adapt to changing conditions and learn from new
experiences, even after the initial training phase has been
completed.
[25m] Brendan Case. Hidden Geometry of Infestation in Chagas Disease Vectors: an Approach from Epidemiological Network Theory. (adv. Laurent Hébert-Dufresne, Lori Stevens) Abstract
Chagas disease is a neglected tropical disease in Central and South America
which is particularly prevalent in poor and rural communities. The main vector
of the disease in Guatemala, Triatoma Dimidiata, maintains a notable domestic
population in southern Guatemala, despite ongoing insecticide spraying
programs. This talk will present a new network model for understanding the
factors which contribute to domestic infestation. We demonstrate that the
model, which takes into account the socio-economic variables of individual
houses as well as the spatial relationship between houses, can predict patterns
of infestation better than taking into account either spatial or
social-economic variables alone.
|
12:00–01:00pm | Lunch |
01:00–02:05pm |
[15m]
Wyatt Wu.
Deep Learning for Model Parameter Verification in Power Systems. (adv. Safwan Wshah) Abstract
In power systems, accurate device modeling is the key factor to
grid reliability, availability, and resiliency. Many critical tasks
such as planning or even realtime operation decisions rely on
accurate modeling. In the US, all generators of 10 MVA or larger
are required to validate their models every five years. This
project aims to use advanced machine learning such as convolutional
neural network (CNN) to estimate the model parameters from power
system response data. The data recorded after system disturbances
proved to have valuable information to verify power system devices.
Existing methods use finite differential equations methods and
statistical optimization methods to estimate the model parameters
which suffer from being ill-posed and might result in more than one
solution. So far, we achieved promising results on simple systems
and the next steps are to work on more complicated scenarios to
prove that Deep Leaning based methods can be useful.
[25m] Ali Javed. Hydrological and Suspended Sediment Event Analysis using Multivariate Time Series. (adv. Byung Lee) Abstract
Hydrological storm events are main cause of the transport of river
water quality constituents such as turbidity, suspended sediments,
and nutrients, and thus analyzing those events helps to
characterize the dynamics and flux of such constituents. The
conventional approach to the storm event analysis has been drawing
event concentration-discharge (C-Q) variable plots and identifying
two-dimensional hysteresis loop patterns from the plots. While
effective and informative to some extent, this approach has
shortcoming in capturing the temporality of variables, as their
values are projected onto the C-Q plane and consequently a lot of
details in temporal variations of the C-Q relationship are
obscured. In this study, we address this issue by using a
temporality-aware approach, namely, multivariate time series
clustering. This clustering is applied to sequences of measurements
from multiple sensors, which in this study are river discharge and
suspended sediment concentration. This research utilizes
turbiditybased monitoring of suspended sediment from Mad River
watershed, located in the Lake Champlain Basin in the northeastern
United States. The resulting computational clusters were found to
have correlation to hysteresis loops and watershed sites and have
higher explanatory power than categorization through conventional
C-Q plots in terms of metrics characterizing astorm event.
[25m] Sam Kriegman. Xenobots. (adv. Josh Bongard) Abstract
In this talk, I’ll introduce the automated design and manufacture
of robots built entirely from pluripotent, Xenopus stem cells:
Xenobots
|
02:05–02:25pm | Break |
02:25–03:30pm |
[15m]
Krystal Maughan.
Personal Robotics Control Using MISL. (adv. David Darais, Joseph Near) Abstract
Robotics-human interaction is often challenging and dangerous in
Space. Creating a personalized robotics control language that is
gesture-based and user-specific allow aspects of accessibility in
robotics control systems not seen in aerospace today. In this talk,
I will discuss a gesture-based language called MISL that was
proposed for the NASA L'Space workshop in Summer 2019. The talk
will explore the advantages and disadvantages of such a system, as
it relates to controlling robots in space in the proximity of
humans.
[25m] Ryan Grindle. Generating Mathematical Functions with Neural Networks. (adv. James Bagrow, Josh Bongard) Abstract
Mathematics is a language. Many researchers are using neural
networks to generate, translate, and interpret language. My goal is
to use a neural network to generate a mathematical function that
explains a given dataset. In any language, the placement of a
single word depends greatly on the surrounding words. This fact is
not reflected in the way that many versions of genetic programming
– an algorithm that performs symbolic regression (function
generation) – evolve functions. In my work, I train a neural
network to label the nodes of a tree with a given shape. The tree
will represents a mathematical function. The network iteratively
labels each node in the tree by taking the existing node labels (if
any) and the location of the node to be labeled as input when
generating the next label. In this way, my method considers the
surrounding labels (or “words”) as each new label is generated. To
determine if this is a viable method to perform symbolic
regression, I will compare it with genetic programming.
[25m] Jacob Wunder. Mechanized Proofs of Data Privacy for Programming Languages. (adv. David Darais, Joseph Near) Abstract
Data privacy is a growing concern for every individual, businesses,
government and organization. The state of the art in balancing
useful data analysis with user privacy is a family of techniques
which enforce a quantitative notion of data anonymization called
differential privacy. In this project we will leverage Duet—a
domain specific programming language for writing differentially
private programs to perform arbitrary data analysis tasks. Our aim
is to construct a proof of correctness for both the design and the
implementation of Duet's analysis for data privacy. Our approach is
to use the Agda proof assistant to embed (1) the operational
semantics of Duet programs, (2) the specification for Duet typing
judgments, and (3) the algorithm for type-based static analysis. We
will connect the analysis (3) to the meaning of programs (1) in two
phases: by establishing the soundness of type judgments (2) w.r.t.
the semantics of programs (1), and then by demonstrating the
soundness of the analysis algorithm (3) w.r.t. the specification
for typing (2).
|
03:30–03:50pm | Break |
03:50–05:00pm |
[Invited Talk]
Yong Yeol Ahn.
The 11 most annoying comments (of all time) from your advisor. Abstract
I tend to make the same set of comments to the student
collaborators. Although some of these comments can be annoying,
they highlight major differences between a student’s and a
professor’s perspective. In this talk, I will go through some of
the most common comments that I routinely make and explain where
they come from. I hope this talk can share some insights into the
‘professor’s perspective’.
[15m] Joshua Childs. Integrating In-Vehicle and Handheld RFID Readers for Developing a Transportation Asset Management in Rural and Urban Environments. (adv. Byung Lee, Tian Xia) Abstract
This presentation presents a novel approach for a transportation
signage (asset) management system employing radio-frequency
identification (RFID) technology. Taking advantage of the remote
sensing feature of RFID, the system operations can be mobile and
remote, consequently improving the efficiency significantly.
Additionally, user-friendly control software (C#/.net) and a
database (MSSQL/AZURE SQL) have been developed as part of the
system. In the current prototype, the former comprises an
in-vehicle RFID reader software (called the “UVM Reader Assistant”)
and a handheld RFID reader/writer software. The in-vehicle reader
can read from signs and can read tags at various heights and
angles. The two types of readers are connected through separate
software that display relevant tag and asset data on the screen and
connect them to a remote shared database, which is synchronized
with their own local copies whenever connectivity is established.
The developed system can serve different scenarios of RFID
tag-based signage management efficiently and is resilient to
intermittent and unexpected interruptions to database connectivity
common in rural as well as urban environments. This research not
only focused on developing a system, but also focused on
investigating the effects of antenna placement, tag orientation,
and tag type on received signal strengths measured by an RFID
reader.
[25m] Dan Willson. Traffic Sign Detection and Geospatial Localization. (adv. Safwan Wshah) Abstract
Our research leverages novel deep learning techniques to construct
an automated system which detects, classifies, and determines the
GPS location of road signs using images captured from a road
vehicle. Our baseline system uses the state-of-the-art detector
RetinaNet, which we have heavily modified to perform GPS
localization in addition to object classification. To convert signs
detected by RetinaNet into a geospatial road sign mapping, we build
a tracker which pairs detections belonging to the same sign into
tracklets, such that each tracklet represents a single sign. Our
tracker uses a neural network trained to compute a distance metric
which represents the similarity between pairs detections. Using the
Hungarian algorithm, we merge detections with large levels of
similarity, to the condense detections into tracklets. Our results
show RetinaNet achieves impressive results when classifying and
estimating the GPS location of road signs, particularly considering
no depth information is provided to the network. The distance
metric network and Hungarian Algorithm show promising initial
results for sign tracking. Lastly, our work introduces a
large-scale dataset to serve as one of the very few benchmarks for
US. traffic signs recognition (TSR), and the first to feature
object-related GPS information.
|