{"id":438,"date":"2020-01-07T04:30:20","date_gmt":"2020-01-07T04:30:20","guid":{"rendered":"http:\/\/colloquium.cdm.depaul.edu\/?page_id=438"},"modified":"2020-03-09T23:35:28","modified_gmt":"2020-03-09T23:35:28","slug":"winter-2020-schedule","status":"publish","type":"page","link":"https:\/\/colloquium.cdm.depaul.edu\/index.php\/winter-2020-schedule\/","title":{"rendered":"Winter 2020 Schedule"},"content":{"rendered":"\n<p>Jan 10 2020<\/p>\n\n\n\n<p><strong>Title:<\/strong> Path planning for Continuum arms<br><br><strong>Speaker\/s:<\/strong> Brandon Meng &amp; Jiahao Deng<br><br><strong>Abstract:<\/strong> Continuum robotic arms replicate the functions of biological appendages like elephant trunks. The compliance inherent to these devices renders them human-friendly and more adaptable to their surroundings at the same time complicates smooth and reliable path planning. In this talk, we discuss two approaches for continuum arm path planning that is both reliable and generates smooth trajectories for environments with and without obstacles. The first approach uses Machine-Learning for path planning that greatly improved the speed and stability of the generated path. The second approach uses an anticipatory path planning scheme implemented through temporal graphs to accommodates moving obstacles in a dynamic environment. <br><br><strong>Bio:<\/strong> Jiahao Deng is a doctoral candidate in Computer Science at DePaul CDM. He finished his Bachelor&#8217;s degree in Information Systems at the University of Iowa and a Master\u2019s degree in Computer Science at DePaul University. His areas of interests include Robotics, Motion Planning, Artificial Intelligence and Machine Learning. He is currently working at the Robotics and Medical Engineering (RoME) lab at DePaul University.&nbsp; <br><br> Brandon Meng is a doctoral candidate and GAANN fellow at DePaul University. After receiving his Bachelor&#8217;s and Masters degree in Computer Science from DePaul, he now studies continuum arms in the RoME Lab. <\/p>\n\n\n\n<p><strong>Jan 17 2020<\/strong><\/p>\n\n\n\n<p><strong>Title:<\/strong> Meet Malexa, Alexa&#8217;s Malicious Twin: Ambient Tactical Deception Attacks on Intelligent Voice Assistants<br><br><strong>Speaker\/s:<\/strong> Filipo Sharevski<br><br><strong>Abstract:<\/strong> Malexa is an intelligent voice assistant with a simple and seemingly legitimate third-party skill that delivers news briefings to users. The twist, however, is that Malexa covertly rewords these briefings to introduce misperception about the reported events intentionally. This covert rewording is what we call an Ambient Tactical Deception (ATD) attack. It differs from squatting or invocation hijacking attacks in that it is focused on manipulating the \u201ccontent\u201d instead of the \u201cinvocation logic.\u201d Malexa dynamically manipulates news briefings to make a government response sound more accidental or lenient than the original news delivered by Amazon Alexa. A study with 220 participants was conducted to assess Malexa\u2019s effect on inducing misperceptions and covert manipulation of reality. We found that users who interacted with Malexa perceived that the government was less friendly to working people and more in favor of big businesses, regardless of their political ideology or frequency of interaction. These findings express the potential of Malexa becoming a covert \u201cinfluencer\u201d aiming to disrupt the current political climate, particularly the build-up to the 2020 presidential elections in the United States. <br><br><strong>Bio:<\/strong> Filipo Sharevski is a cybersecurity researcher and tactician who constructs and manipulates reality as it unfolds across the cyber-physical spaces and within power structures, particularly focused on social engineering, reality interventions, resistances, and low-intensity cyberwarfare. His academic work has been published internationally, including a book on cellular network forensics, cybersecurity curriculum under the Cybersecurity National Action Plan (CNAP), and academic articles in renewed cybersecurity journals and conferences. His research areas include; Ambient Tactical Deception; malicious user experience design; secure design, divergence and deception in human communication and interaction; psychological operations; cyberwarfare; behavioral security in cellular and cyber-physical systems. Dr. Sharevski holds a Ph.D. in Interdisciplinary Cybersecurity from Purdue University, West Lafayette. He is currently an Assistant Professor in the College of Computing and Digital Media at DePaul University, where he co-founded and co-directs the Divergent Design Lab. He also leads the 5G De-Mobile Lab focused on behavioral security and forensics research in future cellular networks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"http:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2019\/09\/Filipo.jpg\" alt=\"\" class=\"wp-image-401\" srcset=\"https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2019\/09\/Filipo.jpg 200w, https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2019\/09\/Filipo-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 85vw, 200px\" \/><\/figure>\n\n\n\n<p><strong><s>======================================================<\/s><\/strong><\/p>\n\n\n\n<p>Jan 24 2020<br><br><strong>Title:<\/strong> Accurate and efficient methods for reduced-complexity modeling in fluid mechanics<br><br><strong>Abstract:<\/strong> This talk will explore several developments that improve upon the efficiency, accuracy, and theoretical understanding of methods for decomposition and reduced-order modeling of systems in fluid mechanics. &nbsp;The increasing size and complexity of problems that are now tractable for researchers to study heightens the need to develop methods capable of extracting pertinent information and accurate reduced-order models from large systems and datasets. I will start by talking about how such data-driven algorithms can be adversely affected by noisy data, and will discuss methods by which their robustness to noise can be improved. Next, I will focus on identifying optimal energy-amplification mechanisms within fluids systems from the decomposition of physics-based operators. &nbsp;In particular, I will show how the numerical computations typically required for such analysis can be sped up through the use of randomized algorithms, or eliminated entirely through the use of appropriately-chosen analytic approximations. &nbsp;The utility of the methods described in this talk will be demonstrated across a number of examples in fluid mechanics and aerodynamics.<br><br><strong>Bio:<\/strong> Scott Dawson is an assistant professor in the Mechanical, Materials, and Aerospace Engineering Department at the Illinois Institute of Technology. Prior to this, he was a postdoctoral scholar at the California Institute of Technology, and he completed his Ph.D. in Mechanical and Aerospace Engineering at Princeton University. His research interests include modeling, optimization, and control in fluid mechanics, with a particular focus on turbulent shear flows, unsteady aerodynamic systems, and data-driven modeling approaches.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/01\/scott_dawson_320x355.jpg\" alt=\"\" class=\"wp-image-446\" width=\"240\" height=\"266\" srcset=\"https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/01\/scott_dawson_320x355.jpg 320w, https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/01\/scott_dawson_320x355-270x300.jpg 270w\" sizes=\"auto, (max-width: 240px) 85vw, 240px\" \/><\/figure>\n\n\n\n<p> <strong><s>======================================================<\/s><\/strong> <\/p>\n\n\n\n<p>Jan 31 2020<br><strong>Title:<\/strong> <strong><span style=\"text-decoration: underline;\">Tactical Approach to Global Virtual Software Teams Challenges <\/span><\/strong><br><br><strong>Abstract:<\/strong> Organizations adopt different types of software development teams. Some of the common team structures used in companies include co-located teams, virtual software teams, global teams, and global virtual software teams (GVST). This research focuses primarily on global virtual software teams. There are several benefits and challenges to GVST. In 2011, the global virtual software team research project was launched at CDM. Each team was designed to have two software developers from DePaul University (Chicago), and the remaining team members are from global locations. The global sites for this research project include the following countries \u2013 Brazil, Finland, Poland, Ghana, Germany, South Africa and Mexico. Since 2016, agile-scrum has been the primary development approach used for this study. The global virtual teams are required to follow the scrum process, activities and ceremonies. Each virtual global team from 2011 to 2018 experienced similar challenges namely time zone, distance, cultural, and language differences. Data were collected through observation in an action research setting. This talk will discuss some of the key findings from this experimental study. We will then present our tactical solutions to global virtual team challenges beyond collaborative tools. <br><br><strong>Bio:<\/strong> Yele Adelakun is an Associate professor of Information Systems and the Executive Director of the Innovation Development Lab (iDLab) at DePaul University, College of Computing and Digital Media (CDM). His research focuses on Global Virtual Software Teams, IT Outsourcing, ERP systems implementation, Information Systems Quality, IT Evaluation and Emotional Intelligence among IT Leaders. He has conducted studies in both medium and large multinational companies in Europe, Africa, and the US. He has chaired several academic and industry focus conferences. He started the study abroad program in the school CDM in 2004 and was the study abroad program director on Global IT study to Brazil, Argentina, Ghana, and South Africa from 2004-2012. Yele is also very involved with the industry. He is one of the co-Chair of the Chicago Chapter of the International Association of Outsourcing Professionals (IAOP).  He has lead several executives\u2019 presentations and talks. He has published over a hundred articles in conferences, books, and journals. He holds an M.S. in Information Processing Science from University of Oulu, Oulu, Finland and Ph.D. in Information Systems from the University of Turku, Turku, Finland<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/01\/Yele.jpg\" alt=\"\" class=\"wp-image-449\" width=\"239\" height=\"279\" srcset=\"https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/01\/Yele.jpg 478w, https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/01\/Yele-257x300.jpg 257w\" sizes=\"auto, (max-width: 239px) 85vw, 239px\" \/><\/figure>\n\n\n\n<p> <strong><s>======================================================<\/s><\/strong> <\/p>\n\n\n\n<p>Feb 7 2020 <br><strong>Title: Going Big: A Large-Scale Study on What Big Data Developers Ask<\/strong><\/p>\n\n\n\n<p><strong>Abstract:<\/strong> Software developers are increasingly required to write big data code. However, they find big data software development challenging. To help these developers it is necessary to understand big data topics that they are interested in and the difficulty of finding answers for questions in these topics. In this talk, we discuss our large-scale study on Stackoverflow to understand the interest and difficulties of big data developers, study the correlation between popularity and difficulty of big data topics, discuss the implications of our findings for practice, research, and education of big data software development, and investigate the coincidence of our findings with the findings of previous works.<br><br><strong>Bio:<\/strong> Dr. Bagherzadeh is a tenure-track assistant professor of Computer Science at Oakland University in Michigan. Before moving to Oakland University, he completed his Ph.D. at Iowa State University in 2016 under the supervision of Dr. Hridesh Rajan.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/02\/Bagher.jpg\" alt=\"\" class=\"wp-image-454\" width=\"284\" height=\"281\" srcset=\"https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/02\/Bagher.jpg 378w, https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/02\/Bagher-300x298.jpg 300w\" sizes=\"auto, (max-width: 284px) 85vw, 284px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Feb 14 2020<br><br><strong>Speaker:<\/strong> Umer Huzaifa<br><br><strong>Title: <span style=\"text-decoration: underline;\"> Walk this Way: Robots Walking with Styles<\/span><\/strong><br><br><strong>Abstract:<\/strong> In future, when the robots will surround us, there will be a need for the robots to communicate with us as effectively as we humans do with each other through various means\u2013among all, through movement. As humans, when we walk around, our movement profile can be indicative of our inner state of mind, our emotions and affinity towards others. To make the robots more acceptable to people, they should be able to non-verbally communicate with humans as well. For this goal, this talk discusses a recipe for designing verified walking styles in two-legged robots using tools from trajectory optimization. The generated gaits are then verified for specific labels through user studies with lay human viewers. Overall this work is a step in the direction of making robots execute context-aware movement&nbsp;behaviors.<br><br><strong>Bio:<\/strong> Umer Huzaifa is a Visiting Assistant Professor in the Department of Electrical and Computer Engineering at Rose-Hulman Institute of Technology.&nbsp;His research interests are in making machines more expressive by generating variable behaviors in articulated robots, leveraging embodied movement analysis and practice in this pursuit. He completed his M.S. in mechanical engineering from UIUC and B.S. in electrical engineering from National University of Sciences and Technology (NUST) in 2016 and 2012, respectively. He was a finalist for the Best Poster Award at the 6th IEEE RAS\/EMBS International Conference on Biomedical Robotics and Biomechatronics (BioRob 2016). He is also a recipient of the Mavis Future Faculty Fellowship (MF3) and Graduate Teaching Fellowship at UIUC.&nbsp;&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"data:image\/jpeg;base64,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\" alt=\"\"\/><\/figure>\n\n\n\n<p><strong><span style=\"text-decoration: underline;\">Feb 21 2020<\/span><\/strong><br><br><strong>Title: Digitization in Humanitarian Supply Chains: A Rough Review of Research Needs<\/strong><br><br><strong> Abstract: <\/strong>Digitization or Industry 4.0 is currently the center of attention within commercial supply chains. The humanitarian sector, however, follows the commercial sector from far behind in terms of data management and computing capabilities, infrastructure and system architecture. There is tremendous room for new research from the fields of  OR\/AI\/IT\/CS in humanitarian supply chains. We will review what has been done so far and identify research gaps, needs and trends in this context.  <br><br><strong>Bio:<\/strong> Nezih Altay is a Professor in the Department of Management &amp;  Entrepreneurship at the Driehaus College of Business. He holds a Ph.D. in  Operations Management from Texas A&amp;M University. Altay\u2019s research specializes in humanitarian supply chains, disruption management, and socially responsible operations. He is the first recipient of the American  Logistics Aid Network&#8217;s Academic Contributions Award.  He has published over 30 papers and co-edited two books: Service Parts Management: Demand  Forecasting and Inventory Control (2011) and Advances in Managing  Humanitarian Operations (2016) both published by Springer. He currently serves as the Co-Editor-in-Chief of the Journal of Humanitarian  Logistics &amp; Supply Chain Management, and Senior Editor of Production and Operations Management. Altay is also the current President of the  Humanitarian Operations and Crisis Management group within the  Production and Operations Management Society. At DePaul, Dr. Altay serves as the faculty director of the M.S. in Supply Chain Management program. Altay just has been awarded a Fulbright Scholarship to visit  Finland in 2021 to conduct research on aid logistics within conflict zones at the HumLog Institute.  <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/las.depaul.edu\/academics\/refugee-and-forced-migration-studies\/faculty\/PublishingImages\/altay-nezih.jpg\" alt=\"\" width=\"191\" height=\"225\"\/><\/figure>\n\n\n\n<p>Feb 28 2020<br><br><\/p>\n\n\n\n<p><strong>Title:\nCan Peers Reduce Employees\u2019 Violation of Information Security Policies? <\/strong><\/p>\n\n\n\n<p><strong>Abstract: <\/strong>Peer monitoring refers to when peers, voluntarily, noticing and responding to others\u2019 violations of organizational information security policies (ISP). This study explores how peer monitoring reduces employee ISP violations (or facilitates their compliance). Drawing upon theories in management, we propose that, peer monitoring discourages one to violate the ISP. Moreover, trust plays an important role. Not only does it facilitate peer monitoring, but also it moderates the effect of peer monitoring on employee ISP violations. Otherwise, collective responsibility leads to peer monitoring as well. The proposed research model is validated using data gathered via two waves of survey two weeks apart with 254 employees in the United States. We measured the dependent variable, one\u2019s intention to violate the ISP, with four scenarios in the second wave, while all other constructs in the first wave. The results suggest that peer monitoring decreases one\u2019s intention to violate the ISP. Furthermore, both collective responsibility and trust contribute to peer monitoring. Finally, trust amplifies the effect of peer monitoring on employee intention to violate the ISP. We discuss the theoretical contributions and practical implications. <\/p>\n\n\n\n<p><strong>&nbsp;Bio: <\/strong>Adel Yazdanmehr is an Assistant Professor of Information Systems at Baruch College, The City University of New York. He received his PhD in Management Information Systems from The University of Texas at Arlington, MS in Business Analytics from the University of Texas at Dallas, MBA from Mazandaran University of Science and Technology, and BS in Software Engineering from the University of Isfahan. His current research interests are mainly in the behavioral aspect of information assurance and Identity theft. His work has appeared in Information Systems Journal, Decision Support Systems journa<strong>l <\/strong>as well as International Conference on Information Systems, and Dewald Roode Workshop on Information Systems Security Research (IFIP). <\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/02\/Adel.jpg\" alt=\"\" class=\"wp-image-464\" width=\"230\" height=\"234\" srcset=\"https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/02\/Adel.jpg 483w, https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/02\/Adel-295x300.jpg 295w\" sizes=\"auto, (max-width: 230px) 85vw, 230px\" \/><\/figure>\n\n\n\n<p>Mar 6 2020<br>===========================================<\/p>\n\n\n\n<p><strong>Title: Factors Affecting the Adoption of an Electronic Word of Mouth Message: A Meta-Analytic Structural Equation Modeling Study<\/strong><\/p>\n\n\n\n<p><strong>Abstract:<\/strong> Electronic word of mouth (eWoM) messages \nare increasingly consequential for consumers\u2019 decisions regarding \nproducts\/services. This has led to a large body of scholarly research on\n factors affecting eWoM message adoption. Adoption of an eWoM message \nrefers to accepting the information and recommendations contained in an \neWoM message, which consequently influence consumers\u2019 cognitive and \nbehavioral tendencies toward pertinent products\/services. \nNotwithstanding the contributions of prior eWoM studies, we observe \ninconsistent findings across these studies that make a consensus \ndifficult to reach. Lack of consistency is also evident among eWoM \nservice providers in the selection and presentation order of the \npertinent factors on their sites. To address this gap, we draw on the \nheuristic-systematic model in a meta-analytic structural equation \nmodeling study to test a nomological eWoM adoption model that assesses \nthe factors affecting the adoption of an eWoM message. Our meta-analysis\n of 87 eWoM studies, comprising 105,318 observations, sheds light on \neight factors toward eWoM message adoption. Our findings unravel the \nmultitude of ways in which these factors can influence eWoM message \nadoption and show the relative importance of these factors based on \ntheir total effects on eWoM message adoption. This enables the eWoM \nservice providers to enhance the inconsistencies in the selection and \npresentation order of important factors toward eWoM message adoption on \ntheir sites.<\/p>\n\n\n\n<p><strong>Bio:<\/strong>\n HAMED QAHRI-SAREMI is an Assistant Professor of Information Systems at \nDePaul University in Chicago, IL. He holds a Ph.D. in business \nadministration with a concentration on information systems from the \nDeGroote School of Business, McMaster University. His research interests\n lie at the intersection of social and technological systems, including \nthe positive and negative impacts of information systems and \ncomputer-mediated communications. His research papers have appeared in \nvarious journals, such as Journal of Management Information Systems, \nJournal of Strategic Information Systems, Information &amp; Management, \nNew Media &amp; Society, Internet Research, Computers &amp; Education, \nExpert Systems with Applications, Journal of Organizational Computing \nand Electronic Commerce, and European Financial Review, and are \npresented in various IS and management conferences. He has served in \nvarious capacities as an associate editor, a track chair, a reviewer for\n different journals and conferences in information systems.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/d2l.depaul.edu\/content\/enforced\/727896-CSC_500_501_1045\/PastedImage_2ychbigv8p8zauyx2pwm4h1k6ry7wyy400178983835.jpg?_&amp;d2lSessionVal=xnne3uqzqerZ5ql0cEzv5hkBS\" alt=\"Image result for hamed qahri saremi\"\/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Mar 13 2020<br><br><strong><span style=\"text-decoration: underline;\"> Title: Abstracting Database Memory to Describe Runtime Operations <\/span><\/strong><br><br><strong>Abstract:<\/strong> The contents of RAM in an operating system can expose significant  amounts of data at runtime. Extensive amount of work in digital  forensics and storage analysis focused on identifying and reconstructing  RAM contents; multiple encryption schemes that protect data in RAM have  been proposed and evaluated. However, despite the fact that database  management systems (DBMS) store much of the sensitive data in  organizations, there have been no studies that consider these questions  in the context of DBMS-managed RAM. Encryption research has considered  disk-level or client-side\u00a0 encryption in a DBMS. However, all major  relational DBMSes including IBM DB2, Microsoft SQL Server, Oracle,  MySQL, PostgreSQL, and SQLite, support at least one built-in encryption  mechanism.\u00a0 In this talk, we first present a  general overview of\u00a0 memory architecture across all major relational  databases. We define the common RAM areas and data flow during DBMS  operation and use our definitions to\u00a0 empirically identify and quantify  these areas. We describe different types of query access and the amount  of data these operations load into RAM. Finally, we present an overview  of built-in DBMS encryption mechanism types, including their relative  advantages and disadvantages. Our experimental evaluation demonstrates  that encrypted data is\u00a0 as vulnerable in RAM as the unencrypted data.<br><br><strong>Bio:<\/strong> Dr. Alexander Rasin is an Associate Professor in the College of Computing and Digital Media (CDM) at DePaul University. He received his Ph.D. and M.Sc. in Computer Science from Brown University, Providence. He is a co-Director of Data Systems and Optimization Lab at CDM and his primary research interest is in cybersecurity problems of preventing data tampering and exfiltration, establishing standards for database forensic analysis, and developing fine-grained access control polices. Dr. Rasin\u2019s other research projects focus on building and tuning the performance of domain-specific data management systems \u2014 including biomedical data integration, user-defined predicate query optimization, and physical database design and indexing. Several of his research projects are supported by NSF and NIST.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/03\/Rasin-Headshot2-689x1024.jpg\" alt=\"\" class=\"wp-image-467\" width=\"162\" height=\"240\" srcset=\"https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/03\/Rasin-Headshot2-689x1024.jpg 689w, https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/03\/Rasin-Headshot2-202x300.jpg 202w, https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/03\/Rasin-Headshot2-768x1142.jpg 768w, https:\/\/colloquium.cdm.depaul.edu\/wp-content\/uploads\/2020\/03\/Rasin-Headshot2.jpg 1029w\" sizes=\"auto, (max-width: 162px) 85vw, 162px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jan 10 2020 Title: Path planning for Continuum arms Speaker\/s: Brandon Meng &amp; Jiahao Deng Abstract: Continuum robotic arms replicate the functions of biological appendages like elephant trunks. The compliance inherent to these devices renders them human-friendly and more adaptable to their surroundings at the same time complicates smooth and reliable path planning. In this &hellip; <a href=\"https:\/\/colloquium.cdm.depaul.edu\/index.php\/winter-2020-schedule\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Winter 2020 Schedule&#8221;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-438","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/colloquium.cdm.depaul.edu\/index.php\/wp-json\/wp\/v2\/pages\/438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/colloquium.cdm.depaul.edu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/colloquium.cdm.depaul.edu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/colloquium.cdm.depaul.edu\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/colloquium.cdm.depaul.edu\/index.php\/wp-json\/wp\/v2\/comments?post=438"}],"version-history":[{"count":15,"href":"https:\/\/colloquium.cdm.depaul.edu\/index.php\/wp-json\/wp\/v2\/pages\/438\/revisions"}],"predecessor-version":[{"id":472,"href":"https:\/\/colloquium.cdm.depaul.edu\/index.php\/wp-json\/wp\/v2\/pages\/438\/revisions\/472"}],"wp:attachment":[{"href":"https:\/\/colloquium.cdm.depaul.edu\/index.php\/wp-json\/wp\/v2\/media?parent=438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}