On the Study, Design, and Evaluation of Exploration Strategies for Autonomous Mobile Robots

Friday, April 10, 2015 - 02:50 pm
Swearingen 2A05
COLLOQUIUM Department of Computer Science and Engineering University of South Carolina Alberto Quattrini Li Department of Computer Science, Electrical Engineering, and Bioengineering Politecnico di Milano Date: April 10, 2015 Time: 1450-1605 (2:50-4:05pm) Place: Swearingen 2A05 Abstract Exploration of initially unknown environments through the deployment of multirobot systems is an effective technique for many real-life applications, including map building and search and rescue. One of the most important and challenging aspects that could significantly impact system autonomy and performance is the decision about where to go next (exploration strategy) and about which robot goes where (coordination method) given current knowledge of the environment. In this talk, I will present some results that contribute to the study, the design, and the evaluation of some aspects of such a decision-making process. In the first part, I will show a method for studying the optimal behavior obtainable by an exploring robot with limited and discrete visibility in a given environment represented as a grid. Further, I will present a worst- and average-case analysis of some exploration strategies used in practice on a graph-based environment. In the second part, I will present a multirobot exploration system based on semantic information, which contributes to improve the online exploration performance. In the third part, I will discuss how to improve the experimental assessment of multirobot exploration systems, specifically by calculating the competitive ratio of some online exploration strategies and by systematically assessing some important factors affecting the exploration process, through repeatable experiments. The long-term endeavor is to contribute to make robots more efficient and autonomous, by shifting from the "how to go there?" to the "where to go?" paradigm. Alberto Quattrini Li received a M.Sc. in Computer Science and Engineering (2011) and a Ph.D. in Computer Science and Engineering (2015) from the Politecnico di Milano (Italy), working with Professor Francesco Amigoni. In 2014 he was a visiting scholar in the Robotic Sensor Networks Lab (led by Professor Volkan Isler) of the Department of Computer Science and Engineering at the University of Minnesota. His research belongs to the areas of Artificial Intelligence, Multi-Agent Systems, and Robotics, and mainly focuses on the design and analysis of decision-making techniques in robotics exploration.

Security and Privacy Analysis of Modern Home Automation Systems

Monday, April 6, 2015 - 09:00 am
Swearingen, 3A00 (Dean’s Conference Room)
THESIS DEFENSE Department of Computer Science and Engineering, University of South Carolina Candidate: Aniqua Z. Baset Advisor: Dr. Wenyuan Xu Date: Monday, April 6, 2015 Time: 9:00am Place: Swearingen, 3A00 (Dean’s Conference Room) Abstract Modern Home Automation (HA) systems handle all aspects of daily home living. Security breaches in these systems, therefore, can affect the homeowners in various ways, ranging from creating harassments to causing physical harm. As HA systems become a common feature of modern households, the robustness of these systems against external attack demand a thorough study. In this work, we explore the vulnerabilities of the state-of-the-art HA systems and, study their potential effect on the privacy and security of the homeowners. We investigated the Control4 and SmartThings HA systems as typical representatives of the HA systems available in the market. The devices in these systems communicate wirelessly using the ZigBee protocol, a prominent wireless technology in the HA field. Therefore, our study and findings can be extended to a wide range of HAs in the market. We discovered several vulnerabilities in the systems that allowed us to execute eavesdropping, spoofing and DoS attacks. We observed that it is possible to infer the types, location and activities of the devices in the home exploiting the uncovered vulnerabilities, which may lead to tracking homeowners’ activities and routine. We were also able to control home devices by injecting spoofed messages. In the end, we discussed some defense strategies that can mitigate the security and privacy risks of the HA systems we studied as well as the HA systems in general.

Analysis of Genome Rearrangements and Reconstruction of Ancestral Genomes

Thursday, April 2, 2015 - 03:00 pm
Swearingen, 3A00 (Dean’s Conference Room
DISSERTATION DEFENSE Department of Computer Science and Engineering, University of South Carolina Candidate: Shuai Jiang Advisor: Dr. Jijun Tang Date: Thursday, April 2, 2015 Time: 3:00pm Place: Swearingen, 3A00 (Dean’s Conference Room) Abstract Genome rearrangements are evolutionary events that shuffle genomic material. Since large-scale rearrangements happen rarely and have dramatic effect on the genomes, the evolutionary history between two genomes usually corresponds to a shortest rearrangement scenario (minimal number of rearrangements) between them. However, there may exist multiple shortest rearrangement scenarios between two genomes, making it difficult to find the true history. Furthermore, there also exist "complex" rearrangement operations such as transpositions (that cut off a segment of a chromosome and insert it into some other place in the genome), whose effect on the shortest rearrangement scenario is still unclear. There exist several rearrangement models that simplify the rearrangement analysis, such as multi-break (also known as k-breaks, k=2,3) and Double-Cut-and-Join, none of which is biologically adequate for analysis of transpositions among other types of genome rearrangements. In the first part of this dissertation, we employ the multi-break rearrangement model to study the shortest rearrangement scenarios between two genomes. We show the appearance of transpositions in the shortest 2-break scenarios and derive the upper and lower bounds of their proportion in such scenarios. The results imply that transpositions may exist in large proportion in shortest 2-break scenarios. Then we prove that the introduction of a relative large weight to transpositions cannot achieve its purpose of bounding the proportion of transpositions in shortest 3-break scenarios. The ability of finding a shortest rearrangement scenario can be used for reconstruction of ancestral genomes from the given genomes, so that the total numbers of rearrangements between ancestral genomes and given genomes is minimal. This problem is known to be NP-complete even in the "simplest" case of three genome, called the genome median problem. Currently, there exist several tools for reconstruction of ancestral genomes, such as Multiple Genome Rearrangements and Ancestors (MGRA). Most of them are limited to genomes on the same set of genes with each gene present in a single copy in every genome. This limitation makes these tools inapplicable for many important biological datasets or degrades the resolution of ancestral reconstructions in others. Furthermore even if the given genomes are linear (i.e., consist only of linear chromosomes), the ancestral genomes reconstructed by existing tools may contain circular chromosomes, which is biologically inadequate. In the second part of this dissertation, we present a next-generation tool MGRA2 that extends MGRA functionality to support gene insertions and deletions, making it applicable for more complex genomic datasets. We also propose an algorithm that uses the existing solution for ancestral genome reconstruction problem to obtain linear ancestral genomes in some optimal way.

March Code-a-thon

Friday, March 27, 2015 - 10:00 pm
It's that time again! Our friends at Hackerrank are helping us with another Code-a-thon, and I want you to be there! I will be posting more specifics as I find them, but here is the setup: 3 tiers: Beginner (145) Intermediate (146) Expert (240+) Each tier has it's own set of questions and prizes. Not sure what time we will be starting yet, but it will be overnight (3/27 - 3/28) The more people we get the more likely we are to be able to do this again! Invite your friends and come out! More Information at event page.

Brand Positioning Maps & Analysis using Consumer Reviews & Advertisement Analysis

Tuesday, March 24, 2015 - 02:00 pm
Swearingen (3A75)
THESIS DEFENSE Department of Computer Science and Engineering, University of South Carolina Candidate: Surya Bhatt Advisor: Dr. Csilla Farkas Date: Tuesday, March 24, 2015 Time: 2:00pm Place: Swearingen (3A75) Abstract There’s a significant increase in online consumer forums. When customers set out to buy a product they have a preconceived idea about it. They mostly form the idea/expectation from print, audio/video advertisements, online reviews and word of mouth. There have been previous researches on how user generated content can be used to determine the market structure insights [Meeyoung Cha et. al. 2007]. The audio analysis is divided into two parts. One is linguistic research which focuses on the language and content of the input. The second one is paralinguistic which focuses on how words are spoken (prosodic effects). Our research focuses on comparing Brand positioning maps based on consumer reviews with and without linguistic audio analysis of advertisements and reviews. Our goal is to show that this hybrid approach helps us analyze the effectiveness of advertising on brand positioning maps. This approach shall also help us in making association graphs for a brand using words of perception/opinion flowing with that brand/product. Which may in turn assist companies in improving the focus of their advertisements in order to persuade the required set of crowd and drive the public perception.