Publications
Influence estimation on social media networks using causal inference
Summary
Summary
Estimating influence on social media networks is an important practical and theoretical problem, especially because this new medium is widely exploited as a platform for disinformation and propaganda. This paper introduces a novel approach to influence estimation on social media networks and applies it to the real-world problem of characterizing...
Multi-layered interactive energy space modeling for near-optimal electrification of terrestrial, shipboard and aircraft systems
Summary
Summary
In this paper, we introduce a basic multi-layered modeling framework for posing the problem of safe, robust and efficient design and control that may lend itself to ripping potential benefits from electrification. The proposed framework establishes dynamic relations between physical concepts such as stored energy, useful work, and wasted energy...
Hybrid mixed-membership blockmodel for inference on realistic network interactions
Summary
Summary
This work proposes novel hybrid mixed-membership blockmodels (HMMB) that integrate three canonical network models to capture the characteristics of real-world interactions: community structure with mixed-membership, power-law-distributed node degrees, and sparsity. This hybrid model provides the capacity needed for realism, enabling control and inference on individual attributes of interest such as...
Machine learning for medical ultrasound: status, methods, and future opportunities
Summary
Summary
Ultrasound (US) imaging is the most commonly performed cross-sectional diagnostic imaging modality in the practice of medicine. It is low-cost, non-ionizing, portable, and capable of real-time image acquisition and display. US is a rapidly evolving technology with significant challenges and opportunities. Challenges include high inter- and intra-operator variability and limited...
Trust and performance in human-AI systems for multi-domain command and control
Summary
Summary
Command and Control is one of the core tenants of joint military operations, however, the nature of modern security threats, the democratization of technology globally, and the speed and scope of information flows are stressing traditional operational paradigms, necessitating a fundamental shift to better concurrently integrate and operate across multiple...
XLab: early indications & warning from open source data with application to biological threat
Summary
Summary
XLab is an early warning system that addresses a broad range of national security threats using a flexible, rapidly reconfigurable architecture. XLab enables intelligence analysts to visualize, explore, and query a knowledge base constructed from multiple data sources, guided by subject matter expertise codified in threat model graphs. This paper...
Potential impacts of climate warming and increased summer heat stress on the electric grid: a case study for a large power transformer (LPT) in the Northeast United States
Summary
Summary
Large power transformers (LPTs) are critical yet vulnerable components of the power grid. More frequent and intense heat waves or high temperatures can degrade their operational lifetime and increase the risk of premature failure. Without adequate preparedness, a widespread situation could ultimately lead to prolonged grid disruption and incur excessive...
Cloud computing in tactical environments
Summary
Summary
Ground personnel at the tactical edge often lack data and analytics that would increase their effectiveness. To address this problem, this work investigates methods to deploy cloud computing capabilities in tactical environments. Our approach is to identify representative applications and to design a system that spans the software/hardware stack to...
Lessons learned from hardware-in-the-loop testing of microgrid control systems
Summary
Summary
A key ingredient for the successful completion of any complex microgrid project is real-time controller hardware-in-the-loop (C-HIL) testing. C-HIL testing allows engineers to test the system and its controls before it is deployed in the field. C-HIL testing also allows for the simulation of test scenarios that are too risky...
Super-resolution community detection for layer-aggregated multilayer networks
Summary
Summary
Applied network science often involves preprocessing network data before applying a network-analysis method, and there is typically a theoretical disconnect between these steps. For example, it is common to aggregate time-varying network data into windows prior to analysis, and the trade-offs of this preprocessing are not well understood. Focusing on...