<?xml version="1.0"?>
<News hasArchived="false" page="182" pageCount="221" pageSize="10" timestamp="Thu, 23 Apr 2026 11:48:46 -0400" url="https://beta.my.umbc.edu/groups/ieee/posts.xml?page=182">
<NewsItem contentIssues="true" id="14431" important="false" status="posted" url="https://beta.my.umbc.edu/groups/ieee/posts/14431">
<Title>Learn about Grad Degrees in Cybersecurity</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/04/Cyber-banner.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/Cyber-banner.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p>Interested in breaking into the burgeoning field of Cybersecurity? Come to a Graduate Information Session on <strong>Wednesday, May 2</strong> in <strong>ITE 104 </strong>at <strong>Noon</strong> to learn about UMBC's Master's programs in Cybersecurity.</p>
    <p>Headed by program director <a href="http://www.umbc.edu/cyber/faculty.html#1" rel="nofollow external" class="bo">Richard Forno</a>, UMBC offers both a <a href="http://www.umbc.edu/cyber/programmaster.html" rel="nofollow external" class="bo">Master's in Professional Studies: Cybersecurity</a>, a ten-course master’s degree that incorporates courses in cybersecurity strategy, policy, and management with more technical, hands-on cybersecurity courses, and a <a href="http://www.umbc.edu/cyber/programcert.html" rel="nofollow external" class="bo">Graduate Certificate in Professional Studies: Cybersecurity Strategy &amp; Policy</a>, a four-course program that can be completed in a year.</p>
    <p>To RSVP for next Wednesday's session, click <a href="http://www.umbc.edu/rsvp/ContactReq.php" rel="nofollow external" class="bo">here</a>. In the meantime, take a look at the program <a href="http://www.umbc.edu/cyber/documents/cyber_brochure_final.pdf" rel="nofollow external" class="bo">brochure</a>, <a href="http://www.umbc.edu/cyber/documents/cyber_factsheet_final_7_5_11.pdf" rel="nofollow external" class="bo">fact-sheet</a>, and <a href="http://www.umbc.edu/cyber/index.html" rel="nofollow external" class="bo">website</a> for more information.</p></div>
]]>
</Body>
<Summary>Interested in breaking into the burgeoning field of Cybersecurity? Come to a Graduate Information Session on Wednesday, May 2 in ITE 104 at Noon to learn about UMBC's Master's programs in...</Summary>
<Website>http://www.csee.umbc.edu/2012/04/learn-about-grad-degrees-in-cybersecurity/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/14431/guest@my.umbc.edu/691c5bffe0cd9c122813bb871c69b623/api/pixel</TrackingUrl>
<Tag>events</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 24 Apr 2012 09:36:48 -0400</PostedAt>
<EditAt>Sat, 28 Apr 2012 19:36:48 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="14357" important="false" status="posted" url="https://beta.my.umbc.edu/groups/ieee/posts/14357">
<Title>MS defense: Distributed Model Consensus for Models of Locally Biased Measurements in Wireless Sensor Networks</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/04/wsn.jpg" rel="nofollow external" class="bo"><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/wsn.jpg" width="700" style="max-width: 100%; height: auto;"></a></p>
    <p><span>MS Thesis Defense</span></p>
    <p><strong><span>Distributed Model Consensus for Models of Locally<br>
    	Biased Measurements in Wireless Sensor Networks</span></strong></p>
    <p><span>Jacob Thompson</span></p>
    <p><span>4:00pm Wednesday, 25 April 2012, ITE 325B, UMBC</span></p>
    <p><a href="http://en.wikipedia.org/wiki/Wireless_sensor_network" rel="nofollow external" class="bo">Wireless sensor networks</a> (WSNs) consist of interconnected microsensors, each of which collects measurements from its local environment, which are often used in monitoring and control applications. These applications make inferences about the global and local states of the deployment environment. However, due to the limited communication and energy resources at the sensors, gathering all the raw data at a central fusion/control point is impractical.</p>
    <p>Hence, it is essential to have distributed learning and inference in WSNs, such as learning a consensus model from the locally learned models. Consensus is challenging due to the limited resources of the sensors and the inherent bias of the individual sensor models learned from their local sensing environments. Two leading approaches for this problem are the approach by Zheng et al which uses loopy <a href="http://en.wikipedia.org/wiki/Belief_propagation" rel="nofollow external" class="bo">belief propagation</a> on a certain graphical model based on the WSN topology and the local models, and the approach by Xiao et al which relies on <a href="http://en.wikipedia.org/wiki/Gossip_protocol" rel="nofollow external" class="bo">gossip</a> averaging of the parameters of the local models.</p>
    <p>We focus on multivariate linear regression models, such as Bayesian, Ridge, and Lasso regression models. We analyze and extend the loopy Gaussian belief propagation (GaBP) approach to model consensus, and compare its performance to the gossip averaging approach. We experimentally find that GaBP tends to converge much faster than gossip averaging, but to a less accurate estimated consensus model (especially in the presence of multiple cycles in its corresponding graphical model). We also find that gossip averaging along paths in the WSN, tends to provide much faster convergence to more accurate estimated consensus models as compared to GaBP.</p>
    <p>Committee: Professors Kostas Kalpakis (chair), Tim Oates and Yun Peng</p></div>
]]>
</Body>
<Summary>MS Thesis Defense   Distributed Model Consensus for Models of Locally   Biased Measurements in Wireless Sensor Networks   Jacob Thompson   4:00pm Wednesday, 25 April 2012, ITE 325B, UMBC...</Summary>
<Website>http://www.csee.umbc.edu/2012/04/ms-defense-distributed-model-consensus-for-models-of-locally-biased-measurements-in-wireless-sensor-networks/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/14357/guest@my.umbc.edu/b49884a4df67ec8555195bf290cd5aa0/api/pixel</TrackingUrl>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 23 Apr 2012 17:49:08 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="14313" important="false" status="posted" url="https://beta.my.umbc.edu/groups/ieee/posts/14313">
<Title>CSEE Students Take Part in 34th Annual Graduate Research Conference</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/04/GRC-Conference-Photoedited.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/GRC-Conference-Photoedited-1024x240.jpg" style="max-width: 100%; height: auto;"></a><em><span>photo courtesy <a href="http://www.umbc.edu/gsa">www.umbc.edu/gsa</a></span></em></p>
    <p>More than two-dozen <a href="http://www.csee.umbc.edu" rel="nofollow external" class="bo">Computer Science and Electrical Engineering</a> graduate students are slated to present at the <a href="http://www.umbc.edu/gsa/" rel="nofollow external" class="bo">Graduate Student Association</a>'s annual <a href="https://sites.google.com/site/umbcgrc12/home" rel="nofollow external" class="bo">Graduate Research Conference (GRC)</a>. The GRC will be held this <strong>Friday, April 27 </strong>and features a keynote presentation from <strong>Dr. Michael I. Nishimura, </strong>a UMBC alumnus who now works at Loyola University Chicago as a professor in the Department of Surgery, the Associate Director of the Oncology institute, the Associate Director of the Cancer Center Translations Research, and as Program Director of Immunologic Therapeutics.</p>
    <p>This year, the CSEE presence at the GRC is even stronger than it was <a href="http://www.csee.umbc.edu/2011/04/csee-students-at-the-graduate-research-conference/" rel="nofollow external" class="bo">last year,</a> when three CSEE students were awarded for outstanding presentations. The honorees were Varish Mulwad who received an award for an outstanding oral presentation on his dissertation research entitled "Generating Knowledge from Tables," Kavita Krishnaswamy who received an award for an outstanding oral presentation on her thesis research entitled "Path planning a roboticarm efficiently," and Akshya Iyengar who received an award for an outstanding poster presentation for her thesis research entitled "Estimating Temporal Boundaries of Events using Social Media Data".</p>
    <p>Take a look at the list below, which includes the 27 CSEE graduate students who will present at the GRC this year.</p>
    <p>Check out some <a href="http://www.flickr.com/photos/ebiquity/sets/72157626489668029/with/5672115031/" rel="nofollow external" class="bo">photos</a> from last year's conference.</p>
    <p>Click here for a <a href="http://www.csee.umbc.edu/wp-content/uploads/2012/04/34th-GRC-Computer-Science.pdf" rel="nofollow external" class="bo">printable list</a> of CSEE presenters.</p>
    <p> </p>
    <p><strong><u>Oral Presentations</u></strong><br>
    	<strong>Location: Sondheim 203</strong></p>
    <p><strong>“Noise Reduction in AIRS Infared Earth Observing Radiance Grids using the Obscov Algorithm” </strong><br>
    	David Chapman, Milton Halem, Phuong Nguyen, and Jeff Avery<br>
    	Time: 9:00 a.m.</p>
    <p><strong>“Heart Disease Prediction Model: A Data Mining Approach”</strong><br>
    	Soma Das<br>
    	Time: 9:15 a.m.</p>
    <p><strong>“Measuring the Pulse Duration of Ultrafast Lasers”</strong><br>
    	Jared Dixon<br>
    	Time: 9:30 a.m.</p>
    <p><strong>“Using Deceptive Packets to Increase Base-Station Anonymity in Wireless Sensor Network”</strong><br>
    	Yousef Ebrahimi and Mohamed Younis<br>
    	Time: 9:45 a.m.</p>
    <p><strong>“SmartRate: A Rating Interpretation Mechanism for Agents in Smart Grid Markets”</strong><br>
    	Yasaman Haghpanah<br>
    	Time: 10:00 a.m.</p>
    <p><strong>“Visualizing Changes to Directory Structure to Support Digital Forensics”</strong><br>
    	Timothy Leschke<br>
    	Time: 10:15 a.m.</p>
    <p><strong>“Extracting Semantic Linked Data from Tables”</strong><br>
    	Varish Mulwad<br>
    	Time: 10:30 a.m.</p>
    <p><strong>“Automatic Identification of Prescription Drugs Using Shape, Imprint, and Color”</strong><br>
    	Adrian Rosebrock<br>
    	Time: 11:00 a.m.</p>
    <p><strong>“An Optical Sensor for a Ceramic Water Filtration System for the Detection of <em>E.Coli </em>Using a Microfluidic Chip”</strong><br>
    	Serina Woods<br>
    	Time: 11:15 a.m.</p>
    <p> </p>
    <p><strong><u>Poster Presentations </u></strong><br>
    	<strong>Location: Albin O. Kuhn Library: 7<sup>th</sup> Floor</strong></p>
    <p><strong>“Witness-based Saboteur Detection in Multi-agent Systems”</strong><br>
    	Petr Babkin<br>
    	Time: 11:00 a.m.</p>
    <p><strong>“Entity Linking and Disambiguation for Smartphone Platforms” </strong><br>
    	Anurag Korde<br>
    	Time: 11:00 a.m.</p>
    <p><strong>“Third-order Quadratically Converging, Quasi-Newton Optimization”</strong><br>
    	Rory Mulvaney<br>
    	Time: 11:00 a.m.</p>
    <p><strong>“Supervised Learning Techniques for Predicting Risk of Breast Cancer using Genetic Information” </strong><br>
    	Aniket Bochare<br>
    	Time: 11:12 a.m.</p>
    <p><strong>“Prostate Cancer Prognosis using Genomic Data”</strong><br>
    	Rohit Kugaonkar<br>
    	Time: 11:12 a.m.</p>
    <p><strong>“Using Supervised Techniques for Classification of Conventional Data Items”</strong><br>
    	Nikhil Puranik<br>
    	Time: 11:12 a.m.</p>
    <p><strong>“Surface Emitting Quantum Cascade Laser Array” </strong><br>
    	Xing Chen, Liwei Cheng, Dingkai Guo, and Fow-Sen Choa<br>
    	Time: 11:24 a.m.</p>
    <p><strong>“Learning Sensitive to Multiple Sources of Costs”</strong><br>
    	Zachary Kurtz<br>
    	Time: 11:24 a.m.</p>
    <p><strong>“Exploring Hidden Markov Model for Semantic Activity Prediction” </strong><br>
    	Amey Sane<br>
    	Time: 11: 24 a.m.</p>
    <p><strong>“Calculating Representatives of Geographic Sites across the World” </strong><br>
    	Ashwinkumar Ganesan<br>
    	Time: 11:36 a.m.</p>
    <p><strong>“Older Adults Interactions with a Touch Table Top Display Space”</strong><br>
    	Galina Madjaroff<br>
    	Time: 11:36 a.m.</p>
    <p><strong>“Rendering of Smoke and Fire in a 3D Volume with Multiple Scattering”</strong><br>
    	Taekyu Shin<br>
    	Time: 11:36 a.m.</p>
    <p><strong>“Chronic Disease Prediction: An Experimental Analysis Using the K-nearest Neighbor Algorithm”</strong><br>
    	Matthew Gately<br>
    	Time: 11:48 a.m.</p>
    <p><strong>“Situation Aware Intrusion Detection Model” </strong><br>
    	Sumit S. More<br>
    	Time: 11:48 a.m.</p>
    <p><strong>“Unsupervised Coreference Resolution for FOAF Instances” </strong><br>
    	Jennifer Sleeman<br>
    	Time: 11:48 a.m.</p>
    <p><strong>“Towards an Intuitive Query System for DBpedia”</strong><br>
    	Lushan Han<br>
    	Time: 12:00 p.m.</p>
    <p><strong>“Link Prediction Using Frequent Subgraphs”</strong><br>
    	Maksym Morawski<br>
    	Time: 12:00 p.m.</p>
    <p><strong>“Modeling Motheye Antireflective Structures for Increased Coupling through As2S3 Optical Fibers”</strong><br>
    	Robert J. Weiblen<br>
    	Time: 12:00 p.m.</p>
    <p> </p></div>
]]>
</Body>
<Summary>photo courtesy www.umbc.edu/gsa   More than two-dozen Computer Science and Electrical Engineering graduate students are slated to present at the Graduate Student Association's annual Graduate...</Summary>
<Website>http://www.csee.umbc.edu/2012/04/csee-students-take-part-in-34th-annual-graduate-research-conference/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/14313/guest@my.umbc.edu/61be701cc406a1d1fe9535fd6e1b0fa7/api/pixel</TrackingUrl>
<Tag>alumni</Tag>
<Tag>events</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 23 Apr 2012 11:28:29 -0400</PostedAt>
<EditAt>Tue, 24 Apr 2012 06:28:29 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="14290" important="false" status="posted" url="https://beta.my.umbc.edu/groups/ieee/posts/14290">
<Title>URCAD: Analyzing Social Media Data</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/04/urcad-crowd23.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/urcad-crowd23.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p><span><strong><span>Analyzing Social Media Data</span></strong></span><br>
    	<strong>Morgan Madeira</strong><br>
    	<span>Junior, Computer Science</span></p>
    <p>Social media has increasingly become an outlet for expression for a large part of our society. Literature suggests that analyzing data from these sites can lead to improvements in areas such as health-care and search-ad targeting. Users of these sites often associate with many other users described as “friends,” even if they do not have a strong connection, or what would be described as friendship in daily life. It is valuable to determine the strength of relationships between users and to identify communities within social networks. These communities represent people with similar characteristics, which are used by applications to solve many real-world problems. For instance, it is useful to identify groups that are interested in a specific movie genre. Information about these groups can be used to target movie advertisements towards the people most interested in that genre. These types of problems have similar characteristics to identifying close friends. We have created a system to collect and analyze the data about user characteristics, while being respectful of privacy concerns. The system is composed of a front end Facebook application and a back end machine-learning based tool. The front end component gathers data about a user and their friends. The back end uses the collected data and machine-learning techniques to determine relationships between users.</p>
    <p>To learn more about the project, check out an <a href="http://www.csee.umbc.edu/2012/04/morgan-madeira-analyzing-social-media-data/" rel="nofollow external" class="bo">interview</a> with Morgan.</p>
    <p><img alt="" style="max-width: 100%; height: auto;"></p>
    <p><span>Catch Morgan's poster presentation at URCAD this <strong>Wednesday, April 25</strong> in the <strong>University Center Ballroom</strong> from <strong>10:00 a.m. to 12:30 p.m. </strong></span></p></div>
]]>
</Body>
<Summary>Analyzing Social Media Data   Morgan Madeira   Junior, Computer Science   Social media has increasingly become an outlet for expression for a large part of our society. Literature suggests that...</Summary>
<Website>http://www.csee.umbc.edu/2012/04/urcad-analyzing-social-media-data/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/14290/guest@my.umbc.edu/17f5124cac089fc48be8391a5b1c1942/api/pixel</TrackingUrl>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 23 Apr 2012 08:37:49 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="14291" important="false" status="posted" url="https://beta.my.umbc.edu/groups/ieee/posts/14291">
<Title>URCAD: Multiclass Datasets, Their Predictions, and Their Visualization</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/04/urcad-crowd22.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/urcad-crowd22.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p><strong><span>Multiclass Datasets, Their Predictions, and Their Visualization</span></strong><br>
    	<span><strong>Wallace Brown and Alexander Morrow</strong></span><span> with Kevin Winner</span><br>
    	<span>Senior, Computer Science<br>
    	Sophomore, Computer Science</span></p>
    <p>Many datasets contain a wealth of information. For example, a person may be described by their race, age, gender, income, marital status, nationality, level of education, etc. By analyzing this data, we can form educated and accurate predictions about individuals. We can, for instance, determine that a person with a particular race, age, nationality, and income is likely to be a college undergraduate. Our goal is to develop ways to visualize these predictions and the uncertainty associated with the predictions. Displaying data in a scatterplot is a standard means of describing two-dimensional information. However, displaying high-dimensional data (i.e., data that includes many attributes, such as age, race, and income) is significantly more challenging.  We present a means of visualizing high-dimensional data sets and the predictive models derived from the data, using existing dimension reduction techniques and novel glyph-based displays.</p>
    <p>To learn more about the project, check out an <a href="http://www.csee.umbc.edu/2012/04/wallace-brown-and-alexander-morrow/" rel="nofollow external" class="bo">interview</a> with Wallace and Alexander.</p>
    <p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/04/Wallace-edited1-e1333380071878.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/Wallace-edited1-e1333380071878-150x150.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/04/Morrow2-e1333380017807.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/Morrow2-e1333380017807-150x150.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p> </p>
    <p> </p>
    <p> </p>
    <p> </p>
    <p> </p>
    <p> </p>
    <p><span>Catch Wallace and Alexander's presentation at URCAD this <strong>Wednesday, April 25</strong> in the <strong>University Center 312</strong> from <strong>1:15 to 1:30 p.m. </strong></span></p></div>
]]>
</Body>
<Summary>Multiclass Datasets, Their Predictions, and Their Visualization   Wallace Brown and Alexander Morrow with Kevin Winner   Senior, Computer Science   Sophomore, Computer Science   Many datasets...</Summary>
<Website>http://www.csee.umbc.edu/2012/04/urcad-multiclass-datasets-their-predictions-and-their-visualization/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/14291/guest@my.umbc.edu/597b313b850b38d0667feb420069878d/api/pixel</TrackingUrl>
<Tag>events</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>3</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 23 Apr 2012 08:32:54 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="14217" important="false" status="posted" url="https://beta.my.umbc.edu/groups/ieee/posts/14217">
<Title>MS Defense: Shamit Patel on a Working Theory of the Learning Rule for Dendritic Integration</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/neurons.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span>MS Thesis Defense</span></p>
    <p><strong><span>Towards Implementation of a Pattern Recognition System based on<br>
    	a Working Theory of the Learning Rule for Dendritic Integration</span></strong></p>
    <p><span>Shamit Patel</span></p>
    <p><span>4:00pm Monday 23 April 2012, ITE 346, UMBC</span></p>
    <p>My goal is to develop a working theory of the learning rule for dendritic integration, and to then implement a pattern recognition system based on that learning algorithm so that the algorithm can be evaluated for its generalization ability. In this regard, this thesis presents an implementation of Jeff Hawkins and Dileep George's Hierarchical Temporal Memory (HTM) pattern recognition system that's based on an existing theory of the learning rule for dendritic integration – spike-timing-dependent synaptic plasticity (STDP). The integration of this learning rule is the novel contribution of this thesis. I found that the STDP HTM system achieved much higher probabilistic classification accuracy and better generalization ability than the non-STDP HTM system. Probabilistic classification accuracy is a way of measuring classification accuracy in which a testing pattern is classified correctly if its label appears in the group of labels output by the top-level node of the HTM network.</p>
    <p>Committee: Professors Tim Oates (Chair), Yun Peng and Tim Finin</p></div>
]]>
</Body>
<Summary>MS Thesis Defense   Towards Implementation of a Pattern Recognition System based on   a Working Theory of the Learning Rule for Dendritic Integration   Shamit Patel   4:00pm Monday 23 April 2012,...</Summary>
<Website>http://www.csee.umbc.edu/2012/04/shamit-patel-dendritic-integration-pattern-recognition-machine-learning/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/14217/guest@my.umbc.edu/05ba953355971455f0b5d71ed6cb4a6a/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Sun, 22 Apr 2012 11:39:41 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="14049" important="false" status="posted" url="https://beta.my.umbc.edu/groups/ieee/posts/14049">
<Title>PhD defense: DiffServ Assured Forwarded and Robust Header Compression: Performance Analysis</Title>
<Body>
<![CDATA[
    <div class="html-content"><p> </p>
    <p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/1069524880-lgl-2d.png" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span>Ph.D. Dissertation Defense</span></p>
    <p><strong><span>DiffServ Assured Forwarded and Robust<br>
    	Header Compression: Performance Analysis</span></strong></p>
    <p><span>Houcheng Lee</span></p>
    <p><span>12:30pm Monday, 23 April 2012, ITE 201b</span></p>
    <p>Performance analysis of network architecture and protocols can be done by using modeling and simulation or using emulation techniques. Modeling and simulation can be used to obtain qualitative results about a network protocol through building models of protocols under drastic abstractions. One major concern of the modeling approach is the fidelity of the results from a model simulation.</p>
    <p>This dissertation presents detailed performance analyses of two major Internet standards using emulation techniques. The standards investigated are <a href="http://en.wikipedia.org/wiki/Differentiated_Services" rel="nofollow external" class="bo">Differentiated Services</a> (DiffServ) architecture and <a href="http://en.wikipedia.org/wiki/Robust_Header_Compression" rel="nofollow external" class="bo">Robust Compression</a> (ROHC) standard.</p>
    <p>The DiffServ architecture was proposed to support quality of services (QoS) implementation in TCP/IP networks. In the first part of dissertation, a new and scalable approach to performance analysis of DiffServ architecture, based on fluid flow modeling approximation to TCP/UDP based traffic flows, is used to emulate millions of competing TCP and UDP flows across networks of various sizes, complexities and link speeds. The emulation involved real-world network constraints, including traffic prioritizations, limited buffers in routers, link congestion, active queue management (AQM) and packet drop policies on congested links. The results provided first quantitative understanding of the interactions of traffic with different drop precedencies in AF1 class traffic in a congested network.</p>
    <p>The Robust Header Compression (ROHC) is proposed to implement efficient IP header compression on bandwidth constrained links in TCP/IP networks. In the second part of dissertation, an emulation tool, called CORE, developed at NRL is used to analyze the performance of ROHC. ROHC compresses packet headers at a sender side, and decompresses them at the receiver side to increase efficiency of a communication link. The results provided quantitative understanding of compression gains from using ROHC standard for compressing IPv4/UDP and IPv6/UDP traffic on links.</p>
    <p>Committee:</p>
    <ul>
    <li>Dr. Deepinder Sidhu</li>
    <li>Dr. Yelena Yesha</li>
    <li>Dr. Konstantinos Kalpakis</li>
    <li>Dr. Ted M. Foster</li>
    <li>Dr. Edward Zieglar</li>
    </ul></div>
]]>
</Body>
<Summary>       Ph.D. Dissertation Defense   DiffServ Assured Forwarded and Robust   Header Compression: Performance Analysis   Houcheng Lee   12:30pm Monday, 23 April 2012, ITE 201b   Performance analysis...</Summary>
<Website>http://www.csee.umbc.edu/2012/04/phd-defense-diffserv-assured-forwarded-and-robust-header-compression-performance-analysis/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/14049/guest@my.umbc.edu/8f5c5de540d5a96633cc1a92aee77364/api/pixel</TrackingUrl>
<Tag>computer-science</Tag>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 19 Apr 2012 23:18:52 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="14027" important="false" status="posted" url="https://beta.my.umbc.edu/groups/ieee/posts/14027">
<Title>Chat with Graphics Engineer Joshua Barczak</Title>
<Tagline>Find out what it's like to work in the game industry</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/04/Barczak-Urcad-Flyer-Final--791x1024.jpg" rel="nofollow external" class="bo"><img src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/Barczak-Urcad-Flyer-Final-small-.jpg" style="max-width: 100%; height: auto;"></a><br></div>
]]>
</Body>
<Summary></Summary>
<Website>http://www.csee.umbc.edu/2012/04/chat-with-graphics-engineer-joshua-barczak/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/14027/guest@my.umbc.edu/109d3e2a46e4a1de005864d4bca52071/api/pixel</TrackingUrl>
<Tag>home-page</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 19 Apr 2012 15:56:07 -0400</PostedAt>
<EditAt>Thu, 19 Apr 2012 17:31:05 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="13995" important="false" status="posted" url="https://beta.my.umbc.edu/groups/ieee/posts/13995">
<Title>CSEE Students Secure Undergraduate Research Awards (URA)</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><a href="http://www.csee.umbc.edu/wp-content/uploads/2012/04/urcadbrochures2.jpg" rel="nofollow external" class="bo"><img alt="" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/urcadbrochures2.jpg" style="max-width: 100%; height: auto;"></a></p>
    <p>Congratulations to our Computer Science and Electrical Engineering undergraduate students who have recently been selected as <a href="http://www.umbc.edu/undergrad_ed/research/URA/" rel="nofollow external" class="bo">Undergraduate Research Award (URA)</a>Scholars. The URA provides undergraduates with up to $1,500 to fund their original research projects. The work is done in conjunction with a faculty mentor, and is then presented at UMBC's <a href="http://www.umbc.edu/undergrad_ed/research/URCAD/URCAD2012.html" rel="nofollow external" class="bo"> Undergraduate Research and Creative Achievement Day (URCAD)</a> in April. This year, these students and their faculty advisors will be recognized at URCAD on <strong>Wednesday, April 25</strong> at noon in the University Center, Room 312.</p>
    <hr>
    <p> </p>
    <p><span><strong>David Eisen</strong></span><br>
    	Computer Engineering, Senior<br>
    	Faculty Advisor: Fow-Sen Choa</p>
    <p>David’s research focuses on the study of cultured neuron inhibition and excitation via optical stimuli from mid-IR (MIR) quantum cascade lasers (QCL).</p>
    <p><em>“It was very exciting news to hear my URA proposal was accepted. This is my first research experience and proposal, so I believe this award will give me the confidence to pursue other opportunities in the future. The URA will give me a hands-on learning experience in the field of photonics research by working alongside Professor Choa as well as graduate students. Not only does this look good on a resume, but it gives me a chance to really get a taste for what real world challenges and rewards await after graduation.”</em></p>
    <hr>
    <p> </p>
    <p><span><strong>Julian Field</strong></span><br>
    	Computer Engineering, Junior<br>
    	Faculty Advisor: Tinoosh Mohsenin</p>
    <p>Julian will be doing research in UMBC's <a href="http://eehpc.csee.umbc.edu/" rel="nofollow external" class="bo">Energy Efficient and High Performance Computing Lab</a>. His task will be the development and mapping of a many-core processor for the purpose of performing ultrasound imaging applications. Many cores on the processor will improve performance and reduce the running time of the processes. The processor will be designed using the Verilog hardware description language (HDL) and will be implemented by programming the design into a Field-Programmable Gate Array (FPGA). Using an FPGA not only reduces the cost of the design, but it also speeds up implementation.</p>
    <p><em>"I felt very honored to receive the award, and I believe that it is going to help me in several ways. It allows me to get paid for doing research in a field that fascinates me and in which I hope to work in the future. Besides the obvious financial benefit, the award adds weight to my research when I list it on my resume, and this should be of great value when I apply to graduate school and for Computer Engineering jobs and internships in the future."</em></p>
    <hr>
    <p> </p>
    <p><span><strong>Thomas A Hervey</strong></span><br>
    	Information Systems/ Geography, Sophomore<br>
    	<span><strong>Aneep Bindra</strong></span><br>
    	Computer Science, Sophomore<br>
    	<span><strong>Zachary Hullihen</strong></span><br>
    	Computer Science, Junior<br>
    	Faculty Advisor: Marc Olano </p>
    <p><strong>"Lights, Camera, Motion, Action: The Dance Application of Microsoft's Kinect and Intelligent Stage Lighting."</strong></p>
    <p><em>"Receiving this award has given me a stronger incentive to work my hardest and apply myself beyond [the] academic realm. This award will be beneficial because it will provide necessary funds for unusual but necessary research tools. I look forward to strengthening my presentation skills at URCAD next year as well as refining my organizational skills through planned documentation and procedures during the actual experimentation. The award overall certainly creates a sense of confidence within the research community. I find it likely that students that are not active in research will hear about the award and benefits through their friends' experiences, and current URA scholars will continue research through new projects." -Thomas A. Hervey</em></p>
    <hr>
    <p> </p>
    <p><span><strong>Alex Morrow </strong></span><br>
    	Computer Science, Sophomore<br>
    	Faculty Advisor: Marie desJardins</p>
    <p><strong>"Quantitative Evaluation of Dimension Reduction for Visualization and Analysis."</strong></p>
    <p>Alex’s research branches off of his current research on visualization and analysis techniques to facilitate user understanding of the uncertainty associated with statistical models that have been learned from data. Alex will analyze and evaluate dimension reduction methods. Using a set of quantitative metrics compiled by his research advisors Dr. Marie desJardins and Dr. Penny Rheingans, Alex will compare the performance of several dimension reduction techniques in a number of different application domains.</p>
    <hr>
    <p> </p>
    <p><span><strong>Adam Page</strong></span><br>
    	Computer Engineering / Math<br>
    	Faculty Advisor: Dr. Tinoosh Mohsenin</p>
    <p>Adam’s research involves designing an energy efficient and high performance error correction Low Density Parity Check Decoder circuit for IEEE 802.11ad standard, the next generation of Wireless Local Arena Network (WLAN). The design will include an efficient architecture for the decoder using Verilog coding and VLSI implementation.</p>
    <p><em>“I am both honored and excited to receive this award. I know the URA will give me the opportunity to apply knowledge I have gained from all of my courses into a real world application.”</em></p>
    <hr>
    <p> </p>
    <p><em>Don’t forget to meet our URA scholars at URCAD next <strong>Wednesday, April 25 </strong></em>at noon in the University Center, Room 312.</p></div>
]]>
</Body>
<Summary>Congratulations to our Computer Science and Electrical Engineering undergraduate students who have recently been selected as Undergraduate Research Award (URA)Scholars. The URA provides...</Summary>
<Website>http://www.csee.umbc.edu/2012/04/csee-students-secure-undergraduate-research-awards-ura/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/13995/guest@my.umbc.edu/905687b090bcdb1fef2f59e1e5ab7f1e/api/pixel</TrackingUrl>
<Tag>news</Tag>
<Tag>other</Tag>
<Tag>research</Tag>
<Tag>students</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>7</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 19 Apr 2012 10:09:52 -0400</PostedAt>
</NewsItem>

<NewsItem contentIssues="true" id="13996" important="false" status="posted" url="https://beta.my.umbc.edu/groups/ieee/posts/13996">
<Title>MS defense: Heart Disease Prediction: A Data Mining Approach</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><img alt="" height="308" src="http://www.csee.umbc.edu/wp-content/uploads/2012/04/snp.jpg" width="700" style="max-width: 100%; height: auto;"></p>
    <p><span>Masters Thesis Defense</span></p>
    <p><span>Heart Disease Prediction: A Data Mining Approach</span></p>
    <p><span>Soma Das</span></p>
    <p><span>2:00pm Monday, 23 April 2012, ITE 201B</span></p>
    <p>Data mining is a field of computer science that combines statistical analysis and machine learning to detect hard-to-discern patterns from large amounts of data. It employs different algorithms to learn different patterns from training or experience and apply it to classify, predict or identify patterns. The healthcare environment is very information rich. There is a wealth of clinical data available within the healthcare systems. Also due to recent advancement of genomic research vast amount of genetic data are also available. Effective analysis tools are needed to discover hidden relationships and trends in these data. These tools are necessary to correctly diagnose people at risk of disease based on the derived knowledge from the data.</p>
    <p>We used data mining techniques to evaluate the interaction between traditional risk factors and gene variants such as <a href="http://en.wikipedia.org/wiki/Single-nucleotide_polymorphism" rel="nofollow external" class="bo">Single Nucleotide Polymorphisms </a>(SNPs) towards Coronary Heart Disease (CHD) susceptibility in a prospective study of older population aged 65 and older. In our thesis we asked two questions whether we can predict CHD at birth or adding genetic information to traditional risk factors predict CHD better than traditional risk factors alone.We also analyzed two popular machine learning algorithms to determine the most efficient method on medical datasets mining. The evaluation is based on a set of performance metrics. We also applied a clustering method to identify different subgroups present in the selected datasets.</p>
    <p>We chose eight traditional risk factors of CHD and 23 SNPs that had previously been reported to be associated with CHD. We then tested the association of these SNPs with CHD in cardiovascular Health Study (CHS). Based on previous studies, we pre specified a risk allele for each of 23 SNPs. We assigned coding values for homozygote, heterozygote, and the no risk homozygote SNPs and then combined these with traditional risk factors for each individual before feeding it to machine learning algorithms. We evaluated different classification algorithms using 10 fold cross validation test.</p>
    <p>Receiver Operating Characteristic Curves (ROC) were plotted separately based on traditional risk factors alone and traditional risk factors plus SNPs. The increase in the Area Under Curve (AUC) was statistically significant for Whites and suggestive of improved CHD prediction for African American. We also found out that using only SNPs predicts CHD a little bit better than random guessing for only whites. The results gained from analysis suggest Naïve Bayes to be the best classifier for the given domain.</p>
    <p>This study demonstrates the concept of using multiple SNPs as independent risk factors and indicates that it can improve prediction of incident CHD. Adding SNPs to traditional risk factors did not improve the prediction model dramatically as we expected but it was statistically significant.</p>
    <p>Committee:</p>
    <ul>
    <li>Dr. Michael Grasso (co-chair)</li>
    <li>Dr. Anupam Joshi</li>
    <li>Dr. Yelena Yesha</li>
    </ul>
    <p> </p></div>
]]>
</Body>
<Summary>Masters Thesis Defense   Heart Disease Prediction: A Data Mining Approach   Soma Das   2:00pm Monday, 23 April 2012, ITE 201B   Data mining is a field of computer science that combines statistical...</Summary>
<Website>http://www.csee.umbc.edu/2012/04/ms-defense-heart-disease-prediction-a-data-mining-approach/</Website>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/13996/guest@my.umbc.edu/0e3f11efb1128bb1935237c75a3d8e0a/api/pixel</TrackingUrl>
<Tag>graduate</Tag>
<Tag>news</Tag>
<Tag>research</Tag>
<Tag>talks</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>1</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Thu, 19 Apr 2012 10:02:22 -0400</PostedAt>
</NewsItem>

</News>
