<?xml version="1.0"?>
<News hasArchived="false" page="117" pageCount="221" pageSize="10" timestamp="Wed, 13 May 2026 07:38:26 -0400" url="https://dev.my.umbc.edu/groups/ieee/posts.xml?mode=pawpularity&amp;page=117">
  <NewsItem contentIssues="true" id="44684" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/44684">
  <Title>talk: Morik on Data Analytics for Sustainability, 11am Thr 5/22, ITE456</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/JimW-Sustainability_76_9451877268.jpg" alt="wikipedia" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h3>Computer Science and Electrical Engineering<br>
    University of Maryland, Baltimore County</h3>
    <h1>Data Analytics for Sustainability</h1>
    <h2>Professor Katharina Morik<br>
    TU Dortmund University, Germany</h2>
    <h3>11:00am-12:30pm, Thursday 22 May 2014, ITE 456, UMBC</h3>
    <p>Sustainability has many facets and researchers from many disciplines are working on them. Particularly knowledge discovery always considered sustainability an important topic (e.g., special issue on data mining for sustainability in Data Mining and Knowledge Discovery Journal, March 2012).</p>
    <ul>
    <li>Environmental tasks include risk analysis concerning floods, earthquakes, fires, and other disasters as well as the ability to react to them in order to guarantee resilience. The climate is certainly of influence and the debate on climate change received quite some attention.</li>
    <li>Energy efficiency demands energy-aware algorithms, operating systems, green computing. System operations are to be adapted to a predicted user behavior such that the required processing is optimized with respect to minimal energy consumption.</li>
    <li>Engineering tasks in manufacturing, assembly, material processing, and waste removal or recycling offer opportunities to save resources to a large degree. Adding the prediction precision of learning algorithms to the general knowledge of the engineers allows for surprisingly large savings.</li>
    </ul>
    <p>Global reports on the millennium goals and open government data regarding sustainability are publicly available. For the investigation of influence factors, however, data analytics is necessary. Big data challenges the analysis to create data summaries. Moreover, the prediction of states is necessary in order to plan accordingly. In this talk, two case studies will be presented. Disaster management in case of a flood combines diverse sensor data streams for a better traffic administration. A novel spatiotemporal random field approach is used for smart routing based on traffic predictions. The other case study is in engineering and saves energy in the steel production based on the multivariate prediction of the processing end-point by the regression support vector machine.</p>
    <p>Further reading:</p>
    <ul>
    <li>Katharina Morik, Kanishka Bhaduri, Hillol Kargupta “Introduction to Data Mining for Sustainability”, Data Mining and Knowledge Discovery Journal, Vol. 24, No.2, pp. 311 – 324, 2012.</li>
    <li>Nico Piatkowski, Sangkyun Lee, Katharina Morik “Spatio-Temporal Random Fields: Compressible Representation and Distributed Estimation”, Machine Learning Journal Vol.93, No. 1, pp: 115-139, 2013.</li>
    <li>Jochen Streicher, Nico Piatkowski, Katharina Morik, Olaf Spinczyk “Open Smartphone Data for Mobility and Utilization Analysis in Ubiquitous Environments” In: Mining Ubiquitous and Social Environments (MUSE) workshop at ECML PKDD, 2013.</li>
    <li>Norbert Uebbe, Hans Jürgen Odenthal, Jochen Schlüter, Hendrik Blom, Katharina MorikA novel data-driven prediction model for BOF endpoint. In: The Iron and Steel Technology Conference and Exposition in Pittsburgh (AIST), 2013.</li>
    <li>Alexander Artikis, Matthias Weidlich, Francois Schnitzler, Ioannis Boutsis, Thomas Liebig, Nico Piatkowski, Christian Bockermann, Katharina Morik, Vana Kalogeraki, Avigdor Gal, Shie Mannor, Dimitrios Gunopulos, Dermot Kinane, “Heterogeneous Stream Processing and Crowdsourcing for Urban Traffic Management” Procs. 17th International Conference on Extending Database Technology, 2014.</li>
    </ul>
    <div><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/foto_morik_neu.jpeg" alt="" width="200" height="266" style="max-width: 100%; height: auto;"></div>
    <p><a href="http://www-ai.cs.uni-dortmund.de/PERSONAL/morik.html" rel="nofollow external" class="bo">Katharina Morik</a> is full professor for computer science at the TU Dortmund University, Germany. She earned her Ph.D. (1981) at the University of Hamburg and her habilitation (1988) at the TU Berlin. Starting with natural language processing, her interest moved to machine learning ranging from inductive logic programming to statistical learning, then to the analysis of very large data collections, high-dimensional data, and resource awareness.</p>
    <p>Her aim to share scientific results strongly supports open source developments. For instance, RapidMiner started out at her lab, which continues to contribute to it. She was one of those starting the IEEE International Conference on Data Mining together with Xindong Wu, and was chairing the program of this conference in 2004. She was the program chair of the European Conference on Machine Learning (ECML) in 1989 and one of the program chairs of ECML PKDD 2008. She is in the editorial boards of the international journals “Knowledge and Information Systems” and “Data Mining and Knowledge Discovery”. Since 2011 she is leading the collaborative research center SFB876 on resource-constrained data analysis, an interdisciplinary center comprising 12 projects, 19 professors, and about 50 Ph. D students or Postdocs.</p>
    <p>Host: Hillol Kargupta, Sorry, you need javascript to view this email address. </p>
    </div>
]]>
  </Body>
  <Summary>Computer Science and Electrical Engineering  University of Maryland, Baltimore County   Data Analytics for Sustainability   Professor Katharina Morik  TU Dortmund University, Germany...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/talk-morik-on-data-analytics-for-sustainability-11am-thr-522-ite456/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44684/guest@my.umbc.edu/5594e32f6dbe7a42cdd631cb6774c343/api/pixel</TrackingUrl>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 15 May 2014 09:25:48 -0400</PostedAt>
  <EditAt>Thu, 15 May 2014 09:25:48 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="44675" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/44675">
  <Title>PhD proposal: Das on  Privacy &amp; Security Management on Mobile Devices, 8am Fri 5/16</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/das.png" alt="das" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h3>PhD Dissertation Proposal</h3>
    <h2>Learning and Executing Energy Efficient, Context-Dependent<br>
    Rules for Privacy and Security Management on Mobile Devices</h2>
    <h2>Prajit Kumar Das</h2>
    <h3>8:00am Friday, 16 May 2014, ITE325b</h3>
    <p>There are ongoing security and privacy concerns around mobile platforms that are increasingly being used by citizens. For example a newly discovered security flaw in WhatsApp that allows hackers using a malicious app to read chat messages stored on the SD card. The Brightest Flashlight application was reported to have logged precise location and a unique user identifier, which have nothing to with its intended functionality. Current mobile platform privacy and security mechanisms are limited to an initial installation phase permission acquisition method. In addition to that, the permissions are of the all or none form. This means that either the users accept all the permissions requested by the mobile app or they cannot use the app in question. Even if permissions were not structured as such, typically, users do not understand the permissions being requested or are too eager to use the application to even care to read them. These issues are present in all major mobile operating systems. Given the penetration of mobile devices into our lives, a fine-grained context-dependent security and privacy control approach needs to be created.</p>
    <p>We propose a framework that will allow us to learn the privacy and security rules for a particular user, on their mobile devices. We do this by employing a simple user feedback mechanism. The rule learning framework consists of a “learning mode” where it observes and learns from user behavior and a “working mode” where it implements the learned rules to protect user privacy and provide security. The rules are represented to the user in plain English using an easily understandable construct. The rules are internally written in a logic based language and using Semantic Web technologies. The antecedents of the rules are context elements that are derived from an ontology using a query engine and an inference mechanism. The main contributions of our work include learning modifications to current rules and learning new rules to control the data flow between the various data providers on the user’s mobile device, including sensors and services and the consumer of such data. The privacy and security rule execution consumes significant energy due to the context detection. We create an energy model that allows us to make energy cost optimizations with regards to rule execution. We use a three-fold solution for achieving the said energy cost optimizations.</p>
    <p>Committee: Drs. Anupam Joshi (chair), Nilanjan Banerjee, Dipanjan Chakraborty (IBM), Tim Finin, Tim Oates, Arkady Zaslavsky (CSIRO)</p>
    </div>
]]>
  </Body>
  <Summary>PhD Dissertation Proposal   Learning and Executing Energy Efficient, Context-Dependent  Rules for Privacy and Security Management on Mobile Devices   Prajit Kumar Das   8:00am Friday, 16 May 2014,...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/phd-proposal-das-on-privacy-security-management-on-mobile-devices-8am-fri-516/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44675/guest@my.umbc.edu/0669d08ce16124c5d8716994e0eaad16/api/pixel</TrackingUrl>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 15 May 2014 00:28:11 -0400</PostedAt>
  <EditAt>Wed, 14 May 2014 00:28:11 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="true" id="44516" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/44516">
  <Title>PhD proposal: Yatish Joshi on connectivity restoration in wireless sensor networks</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2011/07/sensornet.jpg" alt="" style="max-width: 100%; height: auto;"></p>
    <h3>PhD Proposal</h3>
    <h2>Distributed protocols for connectivity restoration<br>
    in damaged wireless sensor networks</h2>
    <h2>Yatish K. Joshi</h2>
    <h3>1:00pm Monday, 12 May 2014, ITE325b, UMBC</h3>
    <p>Decreasing costs and increasing functionality of embedded computation and communication devices have made <a href="http://en.wikipedia.org/wiki/Wireless_sensor_network" rel="nofollow external" class="bo">Wireless Sensor Networks</a> (WSNs) attractive for applications that serve in inhospitable environments like battlefields, planetary exploration or environmental monitoring. WSNs employed in these environments are expected to work autonomously and extend network lifespan for as long as possible while carrying out their designated tasks. The harsh environment exposes the individual nodes to q high risk of failure, which can potentially partition the network into disjoint segments. Therefore, a network must be able to self-heal and restore lost connectivity using available resources. The ad-hoc nature of deployment, harsh operating environment and lack of resources makes distributed approaches the most suitable choice for recovery.</p>
    <p>Most solution strategies for tolerating the failure of multiple collocated nodes are based on centralized approaches that pursue the placement of additional relays to form a connected inter-segment topology. While they are the ideal solution for dealing with simultaneous multi-node failures, they need to utilize the entire network state to determine where and how recovery should occur. In addition to the scalability concern of these approaches, controlled placement of stationary relays in remote and inhospitable deployment area may not be logistically feasible due to resource unavailability and would not be responsive due to the delay in transporting the resources to the area. Space exploration is an example of those WSN applications in which placement of stationary relays is not practical.</p>
    <p>In this proposal, we tackle the problem of connectivity restoration in a partitioned WSN in a distributed manner. We consider multiple variants of the problem based on the available resources and present novel recovery schemes that suit the capabilities and count of existing nodes.</p>
    <p>Committee: Drs. Mohamed Younis (Chair), Dr. Charles Nicholas, Dr. Chintan Patel, Dr. Kemal Akkaya (SIU-Carbondale)Dr. Waleed Youssef (IBM)</p>
    </div>
]]>
  </Body>
  <Summary>PhD Proposal   Distributed protocols for connectivity restoration  in damaged wireless sensor networks   Yatish K. Joshi   1:00pm Monday, 12 May 2014, ITE325b, UMBC   Decreasing costs and...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/16920/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44516/guest@my.umbc.edu/507c48b92adeb93d4f814c24ae9b5bb3/api/pixel</TrackingUrl>
  <Tag>defense</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Fri, 09 May 2014 10:34:04 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="44413" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/44413">
    <Title>Mobile computing &amp; smart home automation demos, 12:30-2:00 Mon 5/12, ITE</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/demo700.png" alt="demo700" width="700" height="308" style="max-width: 100%; height: auto;"></p>
          <h2>Demos: Introduction to mobile computing and<br>
          systems for smart home automation</h2>
          <h3>12:30-2:00 Monday, 12 May 2014, 3rd floor corridor, ITE Building</h3>
          <p>The students in Professor Banerjee’s <a href="http://www.csee.umbc.edu/~nilanb/teaching/628/" rel="nofollow external" class="bo">Introduction to Mobile Computing</a> and <em>Systems for Smart Home Automation</em> classes will showcase their cutting edge projects and application that use mobile phones, tablets, cloud services, and smarthome sensors.</p>
          <p>Come and enjoy the demonstrations that range from cool smartphone games to smartphone-based educational tools to smartphone-controlled robots to location-based mobile phone services to voice and mind controlled home appliances.</p>
          <p>The demonstrations will take place from 12:30 to 2:00pm on Monday, May 12 in the central corridor of the third floor of the ITE building at UMBC.</p>
          <p>For more information, contact Dr. <a href="http://www.csee.umbc.edu/~nilanb/" rel="nofollow external" class="bo">Nilanjan Banerjee</a> (Sorry, you need javascript to view this email address. )</p>
          </div>
      ]]>
    </Body>
    <Summary>Demos: Introduction to mobile computing and  systems for smart home automation   12:30-2:00 Monday, 12 May 2014, 3rd floor corridor, ITE Building   The students in Professor Banerjee’s...</Summary>
    <Website>http://www.csee.umbc.edu/2014/05/mobile-computing-smart-home-automation-demos-1230-200-mon-512-ite/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44413/guest@my.umbc.edu/063ca7437e7972ca550d84f8451eba5f/api/pixel</TrackingUrl>
    <Tag>computer-engineering</Tag>
    <Tag>computer-science</Tag>
    <Tag>events</Tag>
    <Tag>news</Tag>
    <Tag>students</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>0</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Wed, 07 May 2014 09:35:16 -0400</PostedAt>
    <EditAt>Wed, 07 May 2014 09:35:16 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="true" id="44373" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/44373">
  <Title>MS defense: Bansal on Recoloring Web Pages for CVD</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/05/Screen-Shot-2014-05-06-at-12.31.20-PM.png" alt="" width="700" height="322" style="max-width: 100%; height: auto;"></p>
    <h3>MS Thesis Defense</h3>
    <h2>Recoloring Web Pages For Color Vision Deficiency Users</h2>
    <h2>Vikas Bansal</h2>
    <h3>11:00am Thursday, May 8, 2014, ITE346, UMBC</h3>
    <p>Color vision begins with the activation cone cells. When one of the cone cells dysfunction, <a href="http://en.wikipedia.org/wiki/Color_blindness" rel="nofollow external" class="bo">color vision deficiency</a> (CVD) ensues. Due to CVD, users become unable to differentiate as many colors a normal person can. Lack of this ability results in less rich web experience, incomprehension of basic information and thus frustration. Solutions such as carefully choosing colors while designing or recolor web pages for CVD users exist. We first present the improvement in the time complexity of an existing tool SPRWeb to recolor web pages. After that we present our tool which explores the foreground-background relationship between colors in a web page. Using this relationship we propose an algorithm which preserves naturalness, pair-differentiability and subjectivity. In the last part, we add an additional step in to algorithm to ensure that the contrast in the parsed color pairs meets the required W3C guidelines. In evaluation, we found that our algorithm does significantly better in preserving pair-differentiability and produces lower total cost solutions than SPRWeb. Quantitative experimentation of modified algorithm shows that contrast ratio in each replacement pair is more than 4.5 as required for readability.</p>
    <p>Committee: Drs. Lina Zhou (co-chair), Tim Finin (ch-chair), Yelena Yesha, Dongsong Zhang</p>
    </div>
]]>
  </Body>
  <Summary>MS Thesis Defense   Recoloring Web Pages For Color Vision Deficiency Users   Vikas Bansal   11:00am Thursday, May 8, 2014, ITE346, UMBC   Color vision begins with the activation cone cells. When...</Summary>
  <Website>http://www.csee.umbc.edu/2014/05/ms-defense-bansal-on-recoloring-web-pages-for-cvd/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/44373/guest@my.umbc.edu/617ab398f3b2de30b3dac5e61da9cd79/api/pixel</TrackingUrl>
  <Tag>computer-science</Tag>
  <Tag>defense</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Tue, 06 May 2014 12:40:17 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="false" id="43973" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43973">
  <Title>talk: Ron Ross (NIST) on Cybersecurity, 6pm Wed 4/30</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h3><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/04/dhs_govtpanel.jpg" alt="dhs_govtpanel" width="700" height="275" style="max-width: 100%; height: auto;"></h3>
    <h3>UMBC Information Systems Security Association Seminar</h3>
    <h2>Framework for Improving Critical<br>
    Infrastructure in Cybersecurity</h2>
    <h2>Dr. Ron Ross, NIST</h2>
    <h3>6:00-8:00pm Wednesday, 30 April 20014<br>
    Meyerhoff 030 Building Lecture Hall 2</h3>
    <p><a href="http://my.umbc.edu/groups/issa/events/23052" rel="nofollow external" class="bo">RSVP<br>
    </a>Schedule:<br>
    6:00-6:30pm Introductions to UMBC ISSA, Networking &amp; Pizza<br>
    6:30-7:30pm Cyber Security Lecture From Dr. Ron Ross<br>
    7:30-8:00pm Networking</p>
    <p>Host: Monique Jeffrey, UMBC ISSA President, Sorry, you need javascript to view this email address. </p>
    <p><a href="http://www.nist.gov/itl/csd/upload/ron_ross_bio.pdf" rel="nofollow external" class="bo">Ron Ross</a> is a Fellow at the National Institute of Standards and Technology (NIST). His current areas of specialization include information security and risk management. Dr. Ross leads the Federal Information Security Management Act (FISMA) Implementation Project, which includes the development of security standards and guidelines for the federal government, contractors, and the United States critical information infrastructure.</p>
    <p>A graduate of the United States Military Academy at West Point, Dr. Ross served in a variety of leadership and technical positions during his over twenty-year career in the United States Army. While assigned to the National Security Agency, he received the Scientific Achievement Award for his work on an inter-agency national security project and was awarded the Defense Superior Service Medal upon his departure from the agency. Dr. Ross is a three-time recipient of the Federal 100 award for his leadership and technical contributions to critical information security projects affecting the federal government and is a recipient of the Department of Commerce Gold and Silver Medal Awards.</p>
    <p>Dr. Ross has been inducted into the Information Systems Security Association (ISSA) Hall of Fame and given its highest honor of ISSA Distinguished Fellow. Dr. Ross has also received several private sector cyber security awards and recognition including the Vanguard ChairmanÕs Award, the Symantec Cyber 7 Award, InformationWeek’s Government CIO 50 Award, Best of GTRA Award, and the ISACA National Capital Area Conyers Award. During his military career, Dr. Ross served as a White House aide and as a senior technical advisor to the Department of the Army. Dr. Ross is a graduate of the Defense Systems Management College and holds Masters and Ph.D. degrees in Computer Science from the U.S. Naval Postgraduate School specializing in artificial intelligence and robotics.</p>
    </div>
]]>
  </Body>
  <Summary>UMBC Information Systems Security Association Seminar   Framework for Improving Critical  Infrastructure in Cybersecurity   Dr. Ron Ross, NIST   6:00-8:00pm Wednesday, 30 April 20014  Meyerhoff...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/talk-ron-ross-nist-on-cybersecurity-6pm-web/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43973/guest@my.umbc.edu/f5aaf3ffb7a5cdf8100ce141a97fe73e/api/pixel</TrackingUrl>
  <Tag>cybersecurity</Tag>
  <Tag>news</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>2</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Mon, 28 Apr 2014 23:46:57 -0400</PostedAt>
  <EditAt>Mon, 28 Apr 2014 23:46:57 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="43932" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43932">
  <Title>talk: White House Climate Data Initiative, 3pm Tue 4/29</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/04/GISS_temperature_2000-09_lrg.png" alt="wikipedia" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    
    <h3>Center for Hybrid Multicore Productivity Research<br>
    Distinguished Computational Science Lecture Series</h3>
    <h2>The White House Climate Data Initiative</h2>
    <h2>Eric Letvin<br>
    Director, Disaster and Failure Studies<br>
    National Security Council</h2>
    <h3>3:00pm Tuesday, 29 April 2014, ITE 456, UMBC</h3>
    <p>Delivering on the commitment in the President’s Climate Action Plan, the White House recently launched the Climate Data Initiative — a broad effort to leverage the Federal Government’s extensive, freely- available climate-relevant data resources to advance awareness of and preparedness for climate change impacts. This effort will help give communities across America the information and tools they need to plan for current and future climate impacts. Data from NOAA, NASA, the U.S. Geological Survey, the Department of Defense, and other Federal agencies was recently launched on climate.data.gov. Data and innovation challenges issued by public, private, nonprofit, and other organizations can help catalyze new, data-driven solutions that help communities understand and build resilience to climate change. NOAA and NASA recently announced an innovation challenge calling on researchers and developers to create data-driven simulations to help plan for the future and to educate the public about the vulnerability of their own communities to sea level rise and flood events.</p>
    <p>Mr. Eric Letvin PE, Esq, is the Director of Hazard Mitigation and Risk Reduction Policy within the National Security Council in the Executive Office of the President. He coordinates the development and effective delivery of mitigation capabilities identified in the National Preparedness Goal, such as threat and hazard identification, risk and disaster resilience assessment, planning, and long-term vulnerability reduction.</p>
    <p>When at NIST, Mr. Letvin is the Disaster and Failure Studies Program Director within NIST’s Engineering Laboratory. Mr. Letvin provides national coordination for conducting field data collection studies. He is also responsible for creating and maintaining a repository related to hazard events (earthquakes, hurricanes, tornadoes, windstorms, community-scale fires in the wildland-urban interface, structural fires, storm surge, flood, tsunami) and human-made hazards (accidental, criminal, or terrorist), the performance of the built environment during hazard events, associated emergency response and evacuation procedures.</p>
    <p>Before coming to NIST, Mr. Letvin was Leader of Infrastructure Research and Resiliency in the Homeland Security Group of URS. He has participated in numerous post-disaster studies including the bombing of the Murrah Building in Oklahoma City, and Hurricanes Opal, Ike and Katrina. He has assessed over 200 buildings for risk from terrorist threats and natural disasters.</p>
    <p>Mr. Letvin holds a bachelor’s and master’s degree in environmental engineering from Syracuse University and received his Juris Doctor from the University of Maryland. He has taught many courses on risk assessments and protection of infrastructure for FEMA/DHS and made related presentations throughout the world over the last ten years.</p>
    </div>
]]>
  </Body>
  <Summary>Center for Hybrid Multicore Productivity Research  Distinguished Computational Science Lecture Series   The White House Climate Data Initiative   Eric Letvin  Director, Disaster and Failure...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/talk-white-house-climate-data-initiative-3pm-tue-429/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43932/guest@my.umbc.edu/eb512b27fffdff5375203bc4dcef166b/api/pixel</TrackingUrl>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Tag>talks</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>4</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Sat, 26 Apr 2014 07:57:55 -0400</PostedAt>
</NewsItem>
  <NewsItem contentIssues="true" id="43911" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43911">
    <Title>Graduate Cybersecurity Internships at NCCoE</Title>
    <Body>
      <![CDATA[
          <div class="html-content">
          <p><img src="http://www.csee.umbc.edu/~rforno/usg-umbc-header2.png" alt="" style="max-width: 100%; height: auto;"></p>
          <p>The NIST <a href="http://csrc.nist.gov/nccoe/" rel="nofollow external" class="bo">National Cybersecurity Center for Excellence</a> (NCCoE) is seeking full- and part-time paid interns from UMBC graduate students studying <a href="http://www.umbc.edu/shadygrove/cyber/" rel="nofollow external" class="bo">cybersecurity</a> at the Universities at Shady Grove (USG).  The program is part of NCCoE’s ongoing efforts to build and sustain academic partnerships in the Montgomery County region.</p>
          <p>The NCCoE internship will identify and immerse students in practical cybersecurity experiences at the NCCoE in Rockville, MD. NCCoE’s Cybersecurity Graduate Researchers will work in a state-of-the-art facility with expert cybersecurity practitioners from government and academia, along with engineers from some of the largest and most influential IT and cybersecurity companies in the world, including  Intel, Microsoft, Symantec, HP, Cisco, Splunk, Palo Alto Networks, and Hytrust.</p>
          <p>During their internships, NCCoE’s Graduate Cybersecurity Researchers may assist NCCoE staff and contractors in areas such as:</p>
          <blockquote>
          <p>the design and building of cybersecurity reference designs to demonstrate platform capabilities that address one or more challenges identified by industry. </p>
          <p>mentoring undergraduate cybersecurity researchers and helping build teams to work on research projects.  </p>
          <p>working with NCCoE industry partners and collaborators to identify relevant commercially available technologies that can serve as a component of these reference designs.  </p>
          <p>supporting the NCCoE lab infrastructure, including the provisioning of hardware, creation and management of both virtual and physical equipment, and the installation and configuration of cybersecurity tools and components.</p>
          </blockquote>
          <p>These NCCoE internships are open to UMBC cybersecurity students enrolled at the USG campus who are US citizens.  The deadline for Summer 2014 consideration is Monday, May 5, however internships are available during the 2014-15 academic year as well.</p>
          <p>For more information and/or to apply, please contact the USG Career &amp; Internship Services Center at 301-738-6338 or Sorry, you need javascript to view this email address. </p>
          </div>
      ]]>
    </Body>
    <Summary>The NIST National Cybersecurity Center for Excellence (NCCoE) is seeking full- and part-time paid interns from UMBC graduate students studying cybersecurity at the Universities at Shady Grove...</Summary>
    <Website>http://www.csee.umbc.edu/2014/04/graduate-cybersecurity-internships-at-nccoe/</Website>
    <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43911/guest@my.umbc.edu/721a0b8ed443dd844f616689f5cc0850/api/pixel</TrackingUrl>
    <Tag>computer-science</Tag>
    <Tag>csee</Tag>
    <Tag>cybersecurity</Tag>
    <Tag>news</Tag>
    <Group token="csee">Computer Science and Electrical Engineering</Group>
    <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
    <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
    <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
    <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
    <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
    <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
    <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
    <Sponsor>Computer Science and Electrical Engineering</Sponsor>
    <PawCount>1</PawCount>
    <CommentCount>0</CommentCount>
    <CommentsAllowed>true</CommentsAllowed>
    <PostedAt>Thu, 24 Apr 2014 21:34:34 -0400</PostedAt>
    <EditAt>Thu, 24 Apr 2014 21:34:34 -0400</EditAt>
  </NewsItem>
  <NewsItem contentIssues="false" id="43888" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43888">
  <Title>ACTIVE Center Open House, 4-5 Mon 4/28, ENGR 231</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <p><img src="http://www.csee.umbc.edu/wp-content/uploads/2014/04/SmallGroup4.jpg" alt="SmallGroup4" width="700" height="308" style="max-width: 100%; height: auto;"></p>
    <h1>ACTIVE Center Open House</h1>
    <h3>4:00-5:00pm Monday, 28 April 2014 in ENGR 231</h3>
    <p>The <a href="http://active.umbc.edu/" rel="nofollow external" class="bo">ACTIVE Center</a> (Engineering 231) is a new classroom that was created by the CSEE Department with support from the <a href="http://innovationfund.umbc.edu/" rel="nofollow external" class="bo">Hrabowski Fund for Innovation</a>, BAE Systems, and Northrup Grumman. The ACTIVE Center is designed to facilitate active student learning and laptop-based laboratory activities, and features movable furniture and whiteboards, a smart projector, and flat-panel displays around the room. We are also developing and documenting a “virtual environment” for the classroom, by creating “design patterns” for how computing technology can be used in this type of space to facilitate student learning.</p>
    <p>The classroom came online in February 2014, and four pilot courses are currently being offered in the space. On Monday, April 28, we will hold an open house and presentation in the ACTIVE Center to show the campus community how an intentionally designed classroom space can increase student engagement and improve learning outcomes. The open house will include a presentation by Dr. <a href="http://www.csee.umbc.edu/people/faculty/marie-desjardins/" rel="nofollow external" class="bo">Marie desJardins</a>, a Hrabowski Academic Innovation Fellow and lead PI for the ACTIVE Center project, and a Q&amp;A session with instructors and students who are currently teaching and learning in the ACTIVE Center. We will share best practices for developing and using similar teaching spaces, and will present the current policy for requesting to use the space for future classes.</p>
    <p>Please note that no food or drink (other than covered containers of water) are permitted in the ACTIVE Center, but light refreshments will be provided in the hallway following the presentation.</p>
    <p>Capacity is limited, so please <a href="http://my.umbc.edu/groups/cs-ed/events/24038" rel="nofollow external" class="bo">RSVP</a>. For more information, contact Marie desJardins (Sorry, you need javascript to view this email address. ).</p>
    </div>
]]>
  </Body>
  <Summary>ACTIVE Center Open House   4:00-5:00pm Monday, 28 April 2014 in ENGR 231   The ACTIVE Center (Engineering 231) is a new classroom that was created by the CSEE Department with support from the...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/active-center-open-house-4-5-mon-428-engr-231/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43888/guest@my.umbc.edu/4e95ed3ca073826446ee582c8ee40b30/api/pixel</TrackingUrl>
  <Tag>active</Tag>
  <Tag>news</Tag>
  <Tag>teaching-innovation</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>1</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Thu, 24 Apr 2014 00:34:56 -0400</PostedAt>
  <EditAt>Thu, 24 Apr 2014 00:34:56 -0400</EditAt>
</NewsItem>
  <NewsItem contentIssues="false" id="43889" important="false" status="posted" url="https://dev.my.umbc.edu/groups/ieee/posts/43889">
  <Title>Defense: Feature Extraction and Fusion for Supervised and Semi-supervised Classification: Application to fMRI and LTM Data</Title>
  <Body>
    <![CDATA[
    <div class="html-content">
    <h3><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/09/difmri.png" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2012/09/difmri.png" alt="difmri" width="700" height="308" style="max-width: 100%; height: auto;"></a></h3>
    <h3>Dissertation Defense</h3>
    <h2>Feature Extraction and Fusion for Supervised and Semi-supervised<br>
    Classification: Application to fMRI and LTM Data</h2>
    <h2>Wei Du</h2>
    <h3>2:00pm Thursday, 24 April 2014, ITE 325B</h3>
    <p>Extracting powerful features from high dimensional noisy data promises to significantly improve the effectiveness of further analysis, especially of classification. Since there is no single feature selection and extraction method or classifier that works best on all given problems, developing effective and efficient feature selection and extraction methods and classifiers for specific applications has became one of the most active areas in the machine learning field. The aim of this dissertation is to develop novel data-driven methods for extracting and selecting the most distinguishing features for performing classification using functional magnetic resonance imaging (fMRI) and laser tread mapping (LTM) tire data.</p>
    <p>FMRI data have the potential to characterize and classify various brain disorders including schizophrenia. However, the high dimensionality and unknown nature of fMRI data present numerous challenges to accurate analysis and interpretation. Independent component analysis (ICA), as a data-driven method, has proven very useful for fMRI analysis in extracting spatial components as multivariate features used in classification, and more recently, for the analysis of fMRI data in its native complex-valued form. In this dissertation, we first present a novel framework to extract powerful features from components estimated by ICA, allowing us to remove the redundancy and retain the most discriminative activation patterns from multivariate ICA features. We apply the proposed three-phase feature extraction framework to two real-valued fMRI data sets, and achieve high classification rates in discriminating healthy controls from patients with schizophrenia. Second, due to the iterative nature of ICA algorithms, typically independent components (ICs) are not estimated consistently during different ICA runs, and hence it is not clear which result to use further. We present a statistical framework that utilizes an objective criterion to select the best of multiple ICA runs such that the multivariate ICA features from the best run can be used for further analysis and inference. Using the proposed framework, we study the performance of a novel complex ICA algorithm for fMRI analysis, entropy rate bound minimization, which takes all three types of diversity into account, including non-Gaussianity, sample dependence and noncircularity that are present in the complex-valued fMRI data. We show that CERBM leads to significant improvement in ICs that provide higher classification accuracy, and thus is a promising ICA algorithm for the analysis of complex-valued fMRI data.</p>
    <p>Classification using LTM data is another problem we address where we first study the use of highly multivariate solutions such as ICA and then note the advantages using lower-level features for classification. In this case, an important problem is the selection of best set of features for the best classification performance. Additionally, there are a large amount of unlabeled tire data that are easy to collect but only a few of them can be easily labeled by expert. In this dissertation, we propose a novel mutual information (MI) based approach to achieve feature splits for co-training, a practical and powerful data-driven method in semi-supervised learning. Inspired by the idea of dependent component analysis, the proposed MI-based approach presents feature splits that are maximally independent between- or within- subsets, and thus selects and fuses features more effectively than other feature split methods. Experimental results on both simulated study and LTM tire data indicate that co-training with MI-based feature splits yields significantly higher accuracy than supervised classification.</p>
    <p>Committee: Profs. Tulay Adali (Chair), Joel Morris, Janet Rutledge, Charles E. Laberge, Vince D. Calhoun (University of New Mexico and the Mind Research Network), and Dr. Matthew Anderson (Northrop Grumman Corp.)</p>
    </div>
]]>
  </Body>
  <Summary>Dissertation Defense   Feature Extraction and Fusion for Supervised and Semi-supervised  Classification: Application to fMRI and LTM Data   Wei Du   2:00pm Thursday, 24 April 2014, ITE 325B...</Summary>
  <Website>http://www.csee.umbc.edu/2014/04/defense-feature-extraction-and-fusion-for-supervised-and-semi-supervised-classification-application-to-fmri-and-ltm-data/</Website>
  <TrackingUrl>https://dev.my.umbc.edu/api/v0/pixel/news/43889/guest@my.umbc.edu/bd7e3827cbf460e70bd82781aac32c15/api/pixel</TrackingUrl>
  <Tag>defense</Tag>
  <Tag>electrical-engineering</Tag>
  <Tag>graduate</Tag>
  <Tag>news</Tag>
  <Tag>research</Tag>
  <Group token="csee">Computer Science and Electrical Engineering</Group>
  <GroupUrl>https://dev.my.umbc.edu/groups/csee</GroupUrl>
  <AvatarUrl>https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="original">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxlarge">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="xlarge">https://assets4-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
  <AvatarUrl size="large">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
  <AvatarUrl size="medium">https://assets1-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
  <AvatarUrl size="small">https://assets2-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
  <AvatarUrl size="xsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
  <AvatarUrl size="xxsmall">https://assets3-dev.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
  <Sponsor>Computer Science and Electrical Engineering</Sponsor>
  <PawCount>0</PawCount>
  <CommentCount>0</CommentCount>
  <CommentsAllowed>true</CommentsAllowed>
  <PostedAt>Wed, 23 Apr 2014 23:50:08 -0400</PostedAt>
</NewsItem>
</News>
