<?xml version="1.0"?>
<News hasArchived="false" page="66" pageCount="206" pageSize="10" timestamp="Sun, 10 May 2026 23:11:32 -0400" url="https://dev.my.umbc.edu/groups/csee/posts.xml?mode=activity&amp;page=66">
  <NewsItem contentIssues="false" id="60131" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/60131">
  <Title>talk: Topic Modeling for Analyzing Document Collection, 11am Mon 3/16</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/Ogihara.jpg" alt="Ogihara" width="700" height="308" style="max-width: 100%; height: auto;"></h2>
    <h2>CHMPR Lecture Series</h2>
    <ul>
    <li>
    <h1>Topic Modeling for Analyzing Document Collection</h1>
    </li>
    </ul>
    <h2>Mitsunori Ogihara<br>
    Department of Computer Science, University of Miami</h2>
    <h2>11:00am Monday, 16 May 2016, ITE 325b, UMBC</h2>
    <p><a href="https://en.wikipedia.org/wiki/Topic_model" rel="nofollow external" class="bo">Topic modeling</a> (in particular, Latent Dirichlet Analysis) is a technique for analyzing a large collection of documents. In topic modeling we view each document as a frequency vector over a vocabulary and each topic as a static distribution over the vocabulary. Given a desired number, K, of document classes, a topic modeling algorithm attempts to estimate concurrently K static distributions and for each document how much each K class contributes. Mathematically, this is the problem of approximating the matrix generated by stacking the frequency vectors into the product of two non-negative matrices, where both the column dimension of the first matrix and the row dimension of the second matrix are equal to K. Topic modeling is gaining popularity recently, for analyzing large collections of documents.</p>
    <p>In this talk I will present some examples of applying topic modeling: (1) a small sentiment analysis of a small collection of short patient surveys, (2) exploratory content analysis of a large collection of letters, (3) document classification based upon topics and other linguistic features, and (4) exploratory analysis of a large collection of literally works. I will speak not only the exact topic modeling steps but also all the preprocessing steps for preparing the documents for topic modeling.</p>
    <p><a href="http://www.cs.miami.edu/home/ogihara/" rel="nofollow external" class="bo">Mitsunori Ogihara</a> is a Professor of Computer Science at the University of Miami, Coral Gables, Florida. There he directs the Data Mining Group in the Center for Computational Science, a university-wide organization for providing resources and consultation for large-scale computation. He has published three books and approximately 190 papers in conferences and journals. He is on the editorial board for Theory of Computing Systems and International Journal of Foundations of Computer Science. Ogihara received a Ph.D. in Information Sciences from Tokyo Institute of Technology in 1993 and was a tenure-track/tenured faculty member in the Department of Computer Science at the University of Rochester from 1994 to 2007.</p>
    </div>
]]>
  </Body>
  <Summary>CHMPR Lecture Series       Topic Modeling for Analyzing Document Collection       Mitsunori Ogihara  Department of Computer Science, University of Miami   11:00am Monday, 16 May 2016, ITE 325b,...</Summary>
  <Website>http://www.csee.umbc.edu/2016/05/talk-topic-modeling-for-analyzing-document-collection-11am-mon-316/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/60131/guest@my.umbc.edu/91fb0afc30b52a265bc7d9a766de7bd8/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>data-science</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 12 May 2016 17:26:43 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="59974" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/59974">
  <Title>talk: Human mental models and robots: Grasping and tele-presence, 11am 5/9</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h1><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/applepicker_csee.jpg" alt="apple picker" width="700" height="308" style="max-width: 100%; height: auto;"></h1>
    <h1>Human mental models and robots:<br>
    Grasping and tele-presence</h1>
    <h2>Dr. Cindy Grimm, Oregon State University</h2>
    <h2>11:00-12:00 Monday 9 May 2016, ITE 325b</h2>
    <p>In this talk I will cover two separate research efforts in robotics, both of which use human mental models to improve robotic functionality. Robots struggle to pick up and manipulate physical objects, yet humans do this with ease – but can’t tell you how they do it. In this research we focus on how to capture human data in such a way as to gain insight into how people structure the grasping task. Specifically, we look at the role of perceptual cues in evaluating grasps and mental classification models of grasps (i.e., all these grasps are the “same”). In the second half of the talk I will switch to discussing how human mental models of privacy, trust, and presence come in to play in remote tele-presence applications (“Skype-on-a-movable-stick”).</p>
    <p>Dr. <a href="http://web.engr.oregonstate.edu/~grimmc/" rel="nofollow external" class="bo">Cindy Grimm</a> is currently an associate professor at Oregon State University (since 2013) in the School of Mechanical, Industrial, and Manufacturing Engineering (application area robotics). Prior to that she was tenured faculty at Washington University in St. Louis in Computer Science (12 years). Her research areas range from 3D sketching to biological modeling to human-robot interaction. She approaches these problems with a combination of mathematical models and empirically-verified human-centered design (HCD). Mathematical models provide a sound, quantitative, rigorous, elegant basis for representing shape and function, and are a core part of the “language” of computation. Including a human in the loop is a key component of the application areas she works in; HCD provides the mechanism for addressing the fundamental problem of how to make mathematical computation “useful” for humans. She has worked with collaborators in fields ranging from psychology, mechanical and biological engineering, statistics, to art.</p>
    </div>
]]>
  </Body>
  <Summary>Human mental models and robots:  Grasping and tele-presence   Dr. Cindy Grimm, Oregon State University   11:00-12:00 Monday 9 May 2016, ITE 325b   In this talk I will cover two separate research...</Summary>
  <Website>http://www.csee.umbc.edu/2016/05/talk-human-mental-models-and-robots-grasping-and-tele-presence-11am-59/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/59974/guest@my.umbc.edu/458296f1894f82516822f9488eb130aa/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>robotics</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 06 May 2016 12:51:56 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="59970" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/59970">
    <Title>Innovations in Cybersecurity Education Workshop, Friday June 3, UMBC</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/icew15_blank-1.png" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <p>The third <a href="http://www.csee.umbc.edu/icew-2016/" rel="nofollow external" class="bo">Innovations in Cybersecurity Education Workshop</a> (ICEW) will be held from 9:00am to 5:00pm on Friday, June 3, 2016 on the UMBC campus.</p>
          <p>ICEW is a free regional workshop on cybersecurity education from high school through post-graduate. It is intended primarily for educators who are teaching cybersecurity at high schools, colleges, and community colleges. Anyone is welcome to attend, including teachers, students, administrators, researchers, and government officials. It will highlight master teachers and ongoing educational projects, including an effort at the US Naval Academy to teach cybersecurity to all midshipmen. The workshop will feature hands-on learning activities, including secure programming, cyber competition, and an educational game.</p>
          <p>Sessions will include:</p>
          <ul>
          <li>
          <strong>Secure coding through hands-on exercise:</strong> Blair Taylor and Siddharth Kaza (Towson University) will show how to carry out self-contained, lab-based modules designed to be injected into CS0-CS2 introductory computer science courses.</li>
          <li>
          <strong>Using a message board as a hands­-on learning tool for Cyber Security II:</strong> LCDR Chris W. Hoffmeister (US Naval Academy) will discuss how to solve security challenges involving a simple, configurable HTML message board.</li>
          <li>
          <strong>Hands-on vulnerability testing:</strong> Marcelle Lee (Anne Arundel Community College) and Steve Morrill (Loyola Blakefield) will demonstrate how to engage in a hands-on challenge and learning experience to help highlight the vulnerabilities in systems, with you in the driver’s seat. Participants of any skill level will learn strategies and techniques for determining if a system is vulnerable.</li>
          <li>
          <strong>Hands-on group threat brainstorming with Security Cards:</strong> Tamara Denning (University of Utah) will demonstrate teaching students how to think broadly and creatively about computer security threats using 42 Security Cards along four dimensions (suits): human impact, adversary’s motivation, adversary’s resources, and adversary’s methods.</li>
          </ul>
          <p>ICEW is free and open to the public — all are welcome to attend. This workshop will to be of interest to educators, school administrators, undergraduate and graduate students, and government officials. Lunch will be provided. There is ample parking.</p>
          <p>For more information and to register, see the <a href="http://www.csee.umbc.edu/icew-2016/" rel="nofollow external" class="bo">2016 ICEW Web</a> site.</p>
          </div>
      ]]>
    </Body>
    <Summary>The third Innovations in Cybersecurity Education Workshop (ICEW) will be held from 9:00am to 5:00pm on Friday, June 3, 2016 on the UMBC campus.   ICEW is a free regional workshop on cybersecurity...</Summary>
    <Website>http://www.csee.umbc.edu/2016/05/innovations-in-cybersecurity-education-workshop-friday-june-3-umbc/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/59970/guest@my.umbc.edu/ae265d84bb1ddf2a09c7fbc751036649/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>events</Tag>
    <Tag>icew</Tag>
    <Tag>news</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>2</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 06 May 2016 10:21:34 -0400</PostedAt>
    <EditAt>Sun, 29 May 2016 09:21:34 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="59963" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/59963">
  <Title>talk: Statistical Testing of Hash Bit Sequences, 11:15am Fri May 6, UMBC</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/hash.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h3>
    <h4>The UMBC Cyber Defense Lab presents</h4>
    <h2>Statistical Testing of Hash Bit Sequences</h2>
    <h2>Enis Golaszewski<br>
    CSEE, UMBC</h2>
    <h3>11:15am-12:30pm Friday, 6 May 2016, ITE 237</h3>
    <p>We tested bit sequences generated from the MD5 hash function using multinomial distribution and close-point spatial statistical tests for randomness. We found that bit sequences generated from truncated-round MD5 hash fail these tests for high- and low-density input choices.</p>
    <p>In 2000, the National Institute of Standards and Technology concluded a competition to select the Advanced Encryption Standard. One of the requirements for candidates was randomness of output bits. The techniques used to evaluate symmetric block cipher randomness have not been extensively applied to hash functions.</p>
    <p>In this study, we adapt a subset of the techniques used to analyze the randomness of AES candidate algorithms to study the randomness of the well-known MD5 hash function. Our approach uses high-density, lo- density, and chained-input methods to generate MD5 hashes. We concatenate these hash outputs and subjected them to multinomial distribution and close-point spatial tests. We iterated this approach over reduced-round versions of MD5. Our presentation includes specifications for the input methods, details on the statistical tests, and analysis of the statistical results.</p>
    <p>Through statistical testing of concatenated MD5 hashes, we derive results that demonstrate a link between the performance of the concatenated hash bit sequences in our statistical testing and the number of hash rounds applied to the high-density and low-density input methods. Randomness is a desirable property for cryptographic hash functions. We present a new approach that facilitates the analysis and interpretation of hash functions for statistical randomness.</p>
    <p>About the Speaker. Enis Golaszewski is a prospective PhD student in CS at UMBC, working with Dr. Alan T. Sherman. His research interests include the security of software-defined networks. He graduated from UMBC in CS in December 2015 and was a student in the fall 2015 INSuRE class. Email: &lt;Sorry, you need javascript to view this email address. &gt;</p>
    <p>Host: Alan T. Sherman, Sorry, you need javascript to view this email address. </p>
    </div>
]]>
  </Body>
  <Summary>The UMBC Cyber Defense Lab presents   Statistical Testing of Hash Bit Sequences   Enis Golaszewski  CSEE, UMBC   11:15am-12:30pm Friday, 6 May 2016, ITE 237   We tested bit sequences generated...</Summary>
  <Website>http://www.csee.umbc.edu/2016/05/20573/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/59963/guest@my.umbc.edu/fe105755ae51867d909cc45707e8ac6a/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 05 May 2016 22:12:30 -0400</PostedAt>
  <EditAt>Thu, 05 May 2016 22:12:30 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="59887" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/59887">
  <Title>UMBC students demonstrate smartphone applications, 12:30-2:30 Tue 5/10</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/mobile_class_csee.jpg" alt="mobile_class_csee" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <div>
    <img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/cordova.jpg" alt="cordova" width="150" height="188" style="max-width: 100%; height: auto;"><br>
    <img src="http://www.csee.umbc.edu/wp-content/uploads/2016/05/banerjee.jpeg" alt="7919_New Faculty 2009 Nilanjan Banerjee Computer Science and Computer Engineering" width="150" height="195" style="max-width: 100%; height: auto;">
    </div>
    <p>Student groups drawn from two UMBC classes will demonstrate <a href="http://www.csee.umbc.edu/wp-content/uploads/2016/05/DemonstrationSessionHrabowskiGrant.png" rel="nofollow external" class="bo">twelve mobile applications</a> they developed as projects from 12:30 to 2:30 on Tuesday, 10 May 2016 in the UC Ballroom. Pizza will be provided.</p>
    <p>The projects are a result of an innovative collaboration between a computer science class lead by Professor <a href="http://www.csee.umbc.edu/~nilanb/" rel="nofollow external" class="bo">Nilanjan Banerjee</a> (CMSC 678 <a href="http://www.csee.umbc.edu/~nilanb/teaching/628/" rel="nofollow external" class="bo">Mobile Computing</a>) and a visual arts class lead by Professor <a href="http://art.umbc.edu/varts/faculty/cordova.php" rel="nofollow external" class="bo">Viviana Chacon</a> (ART 434 <a href="http://catalog.umbc.edu/preview_hrabowskicourse_nopop.php?catoid=3&amp;coid=5480" rel="nofollow external" class="bo">Advanced Interface Design</a>).</p>
    <p>The two faculty were <a rel="nofollow external" class="bo">awarded</a> a grant from the fall 2015 round of the Hrabowski Fund for Innovation competition to develop and evaluate the collaboration between the two courses. The classes held regular joint sessions and each project group comprised students from both Engineering and Visual Arts.</p>
    <p>In ART 434 Prof. Cordova concentrated on the visual experience of the interface in mobile and desktop applications, while in CMSC 628 Prof.  Banerjee provided the tools necessary to design and implement mobile applications.  Specific mobile development topics such as user interface design and implementation, accessing and displaying sensor and location data, and mobile visual design were co-­‐taught by both instructors.  Teams comprising Engineering and Visual Arts students designed and built mobile applications for local clients in Baltimore and Washington DC area.</p>
    <p>A <a href="http://www.csee.umbc.edu/wp-content/uploads/2016/05/DemonstrationSessionHrabowskiGrant.png" rel="nofollow external" class="bo">poster</a> describing the event has brief descriptions of the twelve class projects.</p>
    </div>
]]>
  </Body>
  <Summary>Student groups drawn from two UMBC classes will demonstrate twelve mobile applications they developed as projects from 12:30 to 2:30 on Tuesday, 10 May 2016 in the UC Ballroom. Pizza will be...</Summary>
  <Website>http://www.csee.umbc.edu/2016/05/umbc-students-demonstrate-smartphone-applications-1230-230-tue-510/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/59887/guest@my.umbc.edu/60403a18ab2b56f9de53f5602411740f/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>events</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>teaching-innovation</Tag>
  <Tag>undergraduate</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>7</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 03 May 2016 12:37:27 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="59888" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/59888">
    <Title>NSF CyberCorps: Scholarship For Service, May 15 deadline</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/03/CYBERCORPS.jpg" alt="" style="max-width: 100%; height: auto;"></p>
          <p>UMBC undergraduate and graduate students interested in cybersecurity can apply for an <a href="https://www.sfs.opm.gov/" rel="nofollow external" class="bo">Federal CyberCorps: Scholarship For Service</a> scholarship by 15 May 2016. This application deadline will be the last one under the current NSF grant, which ends August 2017.</p>
          <p>The Federal CyberCorps: Scholarship For Service program is designed to increase and strengthen the cadre of federal information assurance professionals that protect the government’s critical information infrastructure. This program provides scholarships that may fully fund the typical costs incurred by full-time students while attending a participating institution, including tuition and education and related fees. Participants also receive stipends of $22,500 for undergraduate students and $34,000 for graduate students.</p>
          <p>Applicants must be be full-time UMBC students within two years of graduation with a BS or MS degree; a student within three years of graduation with both the BS/MS degree; a student participating in a combined BS/MS degree program; or a research-based doctoral student within three years of graduation in an academic program focused on cybersecurity or information assurance. Recipients must also be US citizens or permanent residents; meet criteria for Federal employment; and be able to obtain a security clearance, if required.</p>
          <p>For more information and instructions on how to apply see the <a href="http://www.cisa.umbc.edu/" rel="nofollow external" class="bo">UMBC CISA</a> site (use old application form, and be sure to include the cover sheet).</p>
          </div>
      ]]>
    </Body>
    <Summary>UMBC undergraduate and graduate students interested in cybersecurity can apply for an Federal CyberCorps: Scholarship For Service scholarship by 15 May 2016. This application deadline will be the...</Summary>
    <Website>http://www.csee.umbc.edu/2016/04/nsf-cybercorps-scholarship-for-service-may-15-deadline/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/59888/guest@my.umbc.edu/ce66f650f9ee28ba90fc01b8e05b7f37/api/pixel</TrackingUrl>
    <Tag>cybersecurity</Tag>
    <Tag>graduate</Tag>
    <Tag>news</Tag>
    <Tag>sfs</Tag>
    <Tag>students</Tag>
    <Tag>undergraduate</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Fri, 29 Apr 2016 08:54:57 -0400</PostedAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="59723" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/59723">
  <Title>tutorial: Design, Analysis and Security of Automotive Networks, 2pm 4/29</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h2><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/04/CAN-bus.jpg" alt="" width="700" height="307" style="max-width: 100%; height: auto;"></h2>
    <h2>Design, Analysis and Security of Automotive Networks</h2>
    <h3>Sekar Kulandaivel<br>
    University of Maryland, Baltimore County</h3>
    <h3>2:00-3:30pm Friday, 29 April 2016, ITE 325b</h3>
    <p>As more electronic and wireless technologies permeate modern vehicles, understanding the design of an embedded automotive network becomes necessary to protect drivers from external agents with a malicious intent to disrupt onboard electronics. By analyzing the different types of automotive networks and current security issues that the industry faces, we will learn how intruders are able to access an automotive network, read data that streams from the connected nodes and inject potentially malicious messages. This presentation will cover the electrical design of automotive networks, the communication protocols between electronic control units, methods for analyzing network messages and a detailed overview of previous automotive attacks and current security issues.</p>
    <p>Sekar Kulandaivel is a Meyerhoff Scholar and Computer Engineering undergraduate student at UMBC. He currently works on designing an intrusion detection system for automotive networks with Dr. Nilanjan Banerjee of the UMBC Eclipse Cluster. Sekar has had previous internships at MIT Lincoln Laboratory, Northrop Grumman Corporation and Johns Hopkins University. He will attend Carnegie Mellon University in Fall 2016 to pursue a PhD in Electrical and Computer Engineering with a focus in electric vehicle security.</p>
    </div>
]]>
  </Body>
  <Summary>Design, Analysis and Security of Automotive Networks   Sekar Kulandaivel  University of Maryland, Baltimore County   2:00-3:30pm Friday, 29 April 2016, ITE 325b   As more electronic and wireless...</Summary>
  <Website>http://www.csee.umbc.edu/2016/04/tutorial-design-analysis-and-security-of-automotive-networks-2pm-429/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/59723/guest@my.umbc.edu/3ebfa9715706199e10a97506bbec1fd5/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>computer-science</Tag>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 27 Apr 2016 14:42:55 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="59697" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/59697">
  <Title>3D Capturing the Future at UMBC</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><a href="http://www.csee.umbc.edu/wp-content/uploads/2016/04/IMG_1243.jpg" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/04/IMG_1243-1024x768.jpg" alt="3D Capture Studio Cameras" width="700" height="525" style="max-width: 100%; height: auto;"></a></p>
    <p><span>Nestled in the back of room 109 of the Information Technology and Engineering building, Dan Bailey, head of the <a href="http://www.irc.umbc.edu/" rel="nofollow external" class="bo">Image Researching Center</a> (IRC) is being captured. He sits in the center of the room, in a open metal rig with cameras that are surrounding him. IRC staff walk around him, fine tuning each of the camera settings as they make their final preparations.</span></p>
    <p>The lights turn off, and within a second a bright flash illuminates the room. The lights turn back on, and a staff member exclaims “got it” as another successful 3D capture has been performed at the IRC. In the next few hours a powerful computer will start to build a 3D scan of Dan Bailey.</p>
    <blockquote>
    <h3>“Being able to capture a 3D model is just a priceless ability,”</h3>
    </blockquote>
    <p><span>Outside of the room sits Dr. Marc Olano, a professor of Computer Science &amp; Electrical Engineering, who helps run the studio. Olano and Bailey worked with <a href="http://www.dirdim.com/" rel="nofollow external" class="bo">Direct Dimensions Inc</a>, a company based in Owings Mills, Maryland, and funded the space through a $180,000 <a href="http://nsf.gov/awardsearch/showAward?AWD_ID=1428204" rel="nofollow external" class="bo">grant</a> from the National Science Foundation.</span></p>
    <p><span>Olano told Stephen Babcock,</span><a href="http://technical.ly/baltimore/2015/12/14/3d-scanning-room-recently-delivered-umbc/" rel="nofollow external" class="bo"><span> a reporter at Technical.ly Baltimore</span></a><span> that “Being able to capture a 3D model is just a priceless ability,” and “That flash is the first step.”</span></p>
    <div>
    <a href="http://www.csee.umbc.edu/wp-content/uploads/2016/04/IMG_1244.jpg" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/04/IMG_1244-1024x768.jpg" alt="Dr. Olano outside of capture studio" width="700" height="525" style="max-width: 100%; height: auto;"></a><p>Dr. Marc Olano outside the capture room. Here, he can view the 3D models and manipulate them.</p>
    </div>
    <p><span>The system is smart enough to ignore all the cameras around the person or object and instead finds unique points of features to focus on. In addition, there are projectors that help capture something that doesn’t have enough detail to focus on by projecting more detail onto a person or object so the person can find it. </span></p>
    <p>Between captures, there are a couple of tools that are used to help calibrate the space. One tool is a pole that is used to help position the cameras using tape on the pole that gives reference points for the center and edge of the frame for the cameras.</p>
    <p><span>For capturing, there is a calibration dummy made out of cardboard construction tubes with a lot of different clothing patterns. This is essential in making it easier to build a 3D model of the dummy, as the reconstruction process can find the shape of the object and camera positions simultaneously, but if the part of the object or person you are scanning is too featureless, it can have trouble solving for both of those at once</span></p>
    <p><span>After the image is captured, the computer starts building a 3D model out of 90 images. Zooming in on the image, you can actually see each individual polygon that makes up the image.</span></p>
    <div>
    <a href="http://www.csee.umbc.edu/wp-content/uploads/2016/04/Screen-Shot-2016-03-29-at-12.29.52-PM.png" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/04/Screen-Shot-2016-03-29-at-12.29.52-PM-300x190.png" alt="3D Scans" width="700" height="444" style="max-width: 100%; height: auto;"></a><p>3D scans of Marc Olano and Dan Bailey done in the capture studio.</p>
    </div>
    <blockquote>
    <h3><strong>“This [studio] serves as not only the intersection of art and computer science, but other disciplines as well.”</strong></h3>
    </blockquote>
    <p><span>Olano believes that this 3D capture studio can go beyond computer science. “This [studio] serves as not only the intersection of art and computer science, but other disciplines as well.” When scanning in a person, it is possible to make that person into an animation model for use in video games. </span></p>
    <p><span>Museums could ask to scan in historical objects so that one could rotate and inspect the object at any angle they want. People who have had amputations could get scanned and have something custom built for them. The possibilities for this space are immense and will continue to grow over time. </span></p>
    <p><span>The 3D capture studio is still limited to only a few projects at a time but Olano hopes to open it up to more departments soon. You can view some of the scans the studio has done online </span><a href="http://photogrammetry.irc.umbc.edu" rel="nofollow external" class="bo"><span>here</span></a><span>. </span></p>
    </div>
]]>
  </Body>
  <Summary>Nestled in the back of room 109 of the Information Technology and Engineering building, Dan Bailey, head of the Image Researching Center (IRC) is being captured. He sits in the center of the room,...</Summary>
  <Website>http://www.csee.umbc.edu/2016/04/3d-capturing-the-future-at-umbc/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/59697/guest@my.umbc.edu/99ea18721c868dc772a346e9c122057b/api/pixel</TrackingUrl>
  <Tag>computer-engineering</Tag>
  <Tag>news</Tag>
  <Tag>other</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 26 Apr 2016 14:30:52 -0400</PostedAt>
  <EditAt>Tue, 26 Apr 2016 14:30:52 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="59660" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/59660">
  <Title>talk: Medical Epistemology: A Gerontologist&#8217;s Perspective, 3pm Wed 4/27</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/04/medicalbigdata.png" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></h3>
    <h3>CHMPR Seminar</h3>
    <h1>Medical Epistemology: A Gerontologist’s Perspective</h1>
    <h3>Dr. John D. Sorkin, M.D., Ph.D.<br>
    University of Maryland School of Medicine</h3>
    <h3>3:00pm Wednesday, 27 April 2016, ITE 325b</h3>
    <p>The randomized clinical trial is the gold standard method by which we test a hypothesis positing an association between an exposure and outcome. Unfortunately many hypotheses are not grist for a clinical trial. It would, for example not be ethically permissible to randomize people to smoking vs. non-smoking if we wanted to study the hypothesis that smoking is associated with increased incidence of lung cancer. Similarly it would not be ethical to randomize pregnant women to being infected or not infected with Zika virus to determine if maternal Zika infection is associated with microcephaly. Clinical trials are also not helpful in determining the relation between a putative exposure and a rare disease such as Pick’s disease (a rare type of frontotemporal dementia) as the number of subjects who would need to be studied is prohibitively large.</p>
    <p>The movement over the last decade away from paper-based charts to the electronic medical record (EMR) and advances in the speed of computers allow us to process large volumes of data in near real-time, and herald the advent of clinical studies based on “big data”. The availability of big data requires us to rethink how we can establish an association between cause and effect because the big data we obtain from the EMR are not collected from randomized clinical trials, and as noted above a clinical trial cannot be used to study many diseases. Further making inferences based on the EMR can be difficult because data gleamed from the electronic medical record can be confounded by changes brought about by the aging process which include primary aging (i.e., the aging process itself), secondary aging (i.e., changes brought about by changes in lifestyle as we get older) and tertiary aging (i.e., disease). Fortunately epidemiologists have designed and used study designs other than the clinical trials for years to gain insight into the relation between exposure and disease. The aim of my talk is to review five study designs, cross-sectional, time-series and longitudinal, case-control and cohort study designs, that can be used to identify change, quantify the rate at which changes occurs with aging, and to separate biological aging from the effects of life style and disease. In addition to presenting the five study designs, I will review the strengths and weaknesses of the five study designs. It is my hope that thinking about five study designs will help you design analyses that make use of big data to examine questions relevant to public health and treatment of disease.</p>
    <p><a href="http://medschool.umaryland.edu/facultyresearchprofile/viewprofile.aspx?id=3426" rel="nofollow external" class="bo">Dr. John Sorkin</a> is a professor at the University of Maryland School of Medicine. His research examines the changes that occur with aging in carbohydrate and lipid metabolism, obesity, and body fat distribution. He is interested in measuring the changes and determining the relation of the changes to the development of diabetes, cardiovascular disease, death, morbidity, and mortality. These interests have lead him to try to identify the phenotypes associated with longevity and the genetics of longevity in collaboration with Drs. Shuldiner and Mitchell. Dr. Sorkin is Chief of Biostatistics and Informatics for the Division of Gerontology and is PI of the Statistics Core for the University of Maryland Claude D. Pepper Older Americans Independence Center and Baltimore VA Geriatrics Research, Education and Clinical Center.</p>
    </div>
]]>
  </Body>
  <Summary>CHMPR Seminar   Medical Epistemology: A Gerontologist’s Perspective   Dr. John D. Sorkin, M.D., Ph.D.  University of Maryland School of Medicine   3:00pm Wednesday, 27 April 2016, ITE 325b   The...</Summary>
  <Website>http://www.csee.umbc.edu/2016/04/big_data_medicine_sorkin/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/59660/guest@my.umbc.edu/4ce4f24cac9eb1b562252d915b758e89/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>data-science</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 25 Apr 2016 14:59:37 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="59616" important="false" status="posted" url="https://dev.my.umbc.edu/groups/csee/posts/59616">
  <Title>Blindfold Chess Spectacular at UMBC, 9-6 Sun 4/24</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2016/04/chess_csee.jpg" alt="" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <p>This Sunday as part of Quadmania, the UMBC Chess Program will present a <a href="http://chess.umbc.edu/files/2016/03/Blindfold_Chess_v3.pdf" rel="nofollow external" class="bo">Blindfold Chess Spectacular</a>. UMBC alum International Grandmaster Timur Gareyev will:</p>
    <ul>
    <li>9am – simultaneously play ten challengers while blindfolded</li>
    <li>1pm – explain how he does it</li>
    <li>2-6pm – play a knockout match against UMBC’s top three players where<br>
    everyone will be blindfolded.</li>
    </ul>
    <p>The event is free and open to the public.</p>
    <p>Gareyev is preparing to break the world record this fall in Prague by playing and defeating 50 challengers while he is blindfolded (the world record is 46).</p>
    <p>UMBC students AbhilashPuranik (CSEE) and Nathanial Wong will play and help with the chess technology. Using four DGT boards, we will display four games and broadcast them live to the Internet (via the website chess24). In the DGT technology, each piece has an RFID chip broadcasting its identify. Antennas under each row and column receive the signals. Software interpolates the positions, generates a graphical display, and expresses the move in standard PGN notation.</p>
    <p>Pieter Heesters, a 6th grader who won a scholarship to UMBC by winning the 2016 Maryland Scholastic Chess Championship, will also play.</p>
    </div>
]]>
  </Body>
  <Summary>This Sunday as part of Quadmania, the UMBC Chess Program will present a Blindfold Chess Spectacular. UMBC alum International Grandmaster Timur Gareyev will:     9am – simultaneously play ten...</Summary>
  <Website>http://www.csee.umbc.edu/2016/04/blindfold-chess-spectacular-at-umbc-9-6-sun-424/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/59616/guest@my.umbc.edu/2fddda280891f4c99a8e5dba13a1d748/api/pixel</TrackingUrl>
  <Tag>events</Tag>
  <Tag>news</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 23 Apr 2016 23:03:14 -0400</PostedAt>
</NewsItem>
</News>
