CSEE Research Review Friday May 6

MS student WIll Murnane presents his work on named entity recognition in Twitter at the 2010 CSEE Research Review

The CSEE department will hold its annual research review this Friday from 9:30am to 4:00pm at the UMBC Technology Center at South Campus. Faculty, research staff and students from all of the department's programs present and discuss their latest research results. The Research Review is open to the public and is a good way for prospective collaborators and students to find out about the research our department is doing and meet and network with current faculty and students. There is ample free parking and refrehsments and lunch are provided. Directions: Take Gun Road off Rolling Road (Rt. 166) or take the UMBC “Satellite” Shuttle to South Campus.

Playing to Program helps teach programming concepts

A group of CSEE students from the Maple lab is developing Playing to Program (PtP) as an intelligent tutoring system to teach programming concepts. PtP uses the open source RUR-PLE visual programming environment for Python and automatically selects and loads problems from a catalogue which the student then attempts to solve. The student's work is analyzed for correctness and the results used to update a model of her understanding of programming concepts and ability to solve complex problems. That model is then used to select the next problem to present, resulting in an adaptive learning process.

The PtP project involves both undergraduate and graduate students and is led by Professor Marie desJardins. You can get more information on PtP and download the prototype code at the PtP Google code site. CSEE undergraduate students Amy Ciavolino, Eliana Feasley, and Robert Deloatch will present the work this Friday morning at the CSEE Research Review based on a recent paper accepted at the Second Symposium on Educational Advances in Artificial Intelligence. Graduate student David Walser also recently completed a MS thesis on Problem Selection of Program Tracing Tasks in an Intelligent Tutoring System and Visual Programming Environment which will be available later in May.

CSEE students at the Graduate Research Conference

Twenty CSEE graduate students had oral or poster presentations at the 2011 GRC and CSEE alumnus Dr. Ralph Semmel gave a the keynote address. We have some photographs from the event.

Three of our graduates students were also honored by receiving awards for making outstanding presentations.

  • Varish Mulwad received an award for an outstanding oral presentation on his dissertation research on "Generating Knowledge from Tables".


    Vast amounts of information are available in structured forms like spreadsheets, database relations, and tables found in documents and on the Web. We describe a framework for automatically understanding and interpreting information encoded in tables and generating knowledge from it. To accurately interpret a table, our framework maps every column header to class (or property wherever appropriate) from appropriate ontologies, link the data values to existing entities from a knowledge base (or map them as values of a property wherever appropriate) and identify and discover relations between various columns. Of the many domains where this work will be useful, we explore the application of this in two important domains — the medical research domain and the open government data. We also present preliminary results evaluating our framework against tables obtained from Google Squared, Wikipedia and a Google dataset.

  • Kavita Krishnaswamy received an award for an outstanding oral presentation on her thesis research on "Path planning a roboticarm efficiently".


    Individuals with physical disabilities need assistance because of their lack of physical strength. In order to provide a solution, we propose to build an assistive robot to provide physical assistance services for individuals with disabilities in real-time through the Internet. For an assistive robotic arm with a collaborative mode of control, given the initial arm configuration we will attempt to increase the speed of response times for the user requesting physical assistance by calculating the paths of reach to the possible target goals before the time of command. The specific aims of our research project are to a) determine the trajectory path of a human arm to perform tasks; b) identify the paths of frequent use; and c) analyze ways to improve path planning performance. In the first stage, we will investigate the most frequently requested tasks of physical assistance in cases where a robotic arm will be preferred over a personal assistant. For example, if the target task is eating, we may calculate the percentage of volunteering participants picking up a fork, returning the fork, reaching for a cup, and returning the cup. In this study, we utilize the TUM kitchen data set from the Technische Universität München for motion tracking data analysis. With the collected information, we will compute the statistics of the motions to identify paths of frequent use and design the architecture with caching. We anticipate an increase in performance and time will be saved for the computation of path planning. We will begin implementing and testing the new strategies for the proposed architecture.

  • Akshya Iyengar received an award for an outstanding poster presentation for her thesis research on "Estimating Temporal Boundaries of Events using Social Media Data".


    Social media websites like Twitter, Flickr and YouTube generate a high volume of user generated content as a major event occurs. Our goal is to automatically determine as accurately as possible when the event starts and when it ends by analyzing the volume and content of social media data. We describe a technique that estimates the temporal boundaries of anticipated events like wildfires and hurricanes and helps to monitor changes as events unfold. Estimating these temporal boundaries segments the event"related data into three major phases: the buildup to the event, the event itself, and the post"event effects and repercussions. The technique can also detect the presence and scope of significant sub"events occurring during the course of an event. For events that transpire over time and space, such as the dispersal of an oil spill, a hurricane or a spreading wildfire, we can analyze how event progressed, traveled geographically and major sub"events that occurred within the event. When applied to natural disasters and man-made disturbances, the derived data can help organizations involved in mediation efforts to track and analyze evolving events.

Bmore video on the UMBC Games, Animation and Interactive Media programs

Bmore has a short video report on the UMBC GAIM programs that features CSEE Professor Marc Olano, VART Professor Neal McDonald and several GAIM students.

“The video game industry may not be Maryland’s equivalent of film in Los Angeles or country music in Nashville, but it is a force. Companies such as Zynga, Firaxis, Big Huge Games, and Day 1 Studios are all based here and are responsible for some of the industry’s most interesting titles. We’re also lucky to have a robust gaming program at UMBC, where students on the creative and technical ends of the game creation process learn side-by-side how to conceptualize and create the games of tomorrow.”

Just in time for the 2011 UMBC Digital Entertainment Conference.

PhD student Yasaman Haghpanah scores a DC hat trick

CSEE Ph.D. student Yasaman Haghpanah achieved a Doctoral Consortium hat trick by being invited to participate in upcoming doctoral consortium events at the top three conferences in her research area: IJCAI, AAMAS, and AAAI. Doctoral Consortia have become common in computer science research communities and provide an opportunity for a group of Ph.D. students to discuss and explore their research interests and career objectives with a panel of established, senior researchers in their research area.  Students must apply to participate in a doctoral consortium and the selection process is usually quite competitive. Her dissertation research is developing and evaluating a trust model for supply chain management systems using multi-agent systems techniques. Yasaman is a member of the Maple Laboratory, directed by Professor Marie desJardins.

Yasaman also had a paper accepted to the 2011 Workshop on Agent Mediated Electronic Commerce which is collocated with AAMAS in Taipei. On top of all that, as part of the AAMAS Doctoral Consortium, she will also be spending two months in Rotterdam on an extended stay at Wolf Ketter's Learning Agents Research Group at the Erasmus Research Institute of Management, Erasmus Universiteit Rotterdam.

MS defense: Detection of Unsafe Action in Laparoscopic Cholecystectomy Video

MS defense

Detection of Unsafe Action in Laparoscopic Cholecystectomy Video

Ashwini Lahane

10:00am Thursday, 28 April 2011, ITE 346

Wellness and healthcare are central to the lives of all people. Information technology has already contributed in significant ways towards enhancement of healthcare delivery and to improving the quality of life. And it will continue to do so with the development of “smarter” technologies and environments. Recent years have seen context awareness as one of the most important aspects in the emerging pervasive computing paradigm. We focus our work on situation awareness; a more holistic variant of context awareness where situations are regarded as logically aggregated contexts. We demonstrate an application of situation aware computing in healthcare. We primarily focus on laparoscopic cholecystectomy, a complex yet commonly performed surgical procedure. The outcome of the surgery is influenced greatly by the training, skill, and judgment of the surgeon. Many surgical simulators have been developed to meet the training and practice needs of the surgeons. However few systems provide feedback during the actual surgery. We present a method to detect a situation, that shows possibility of injury to an artery by analyzing the laparoscopic cholecystectomy surgical video. The system can be used to provide feedback to the operating surgeon in case of a possible risk. We have also built a prototype to demonstrate the use of our system in telemedicine, in the form of a web service.

Thesis Committee:

  • Dr. Yelena Yesha (chair)
  • Dr. Anupam Joshi
  • Dr. Milton Halem
  • Dr. Michael Grasso


Complex-valued Adaptive Signal Processing: Applications in Medical Imaging

EE Graduate Seminar

Complex-valued Adaptive Signal Processing:
Applications in Medical Imaging

Prof. Tulay Adali
Machine Learning for Signal Processing Laboratory

1-2pm Friday, 29 April 2011, ITE 237

Complex-valued signals arise frequently in applications as diverse as communications, radar, geophysics, optics, and biomedicine, as most practical modulation formats are of complex type and applications such as radar and magnetic resonance imaging lead to data that are inherently complex valued. The complex domain, however, presents unique challenges for signal processing, in particular for adaptive nonlinear processing, and as a result, until recently, most algorithms derived for the complex domain have taken engineering shortcuts limiting their usefulness. The most common one among those has been assuming the circularity of the signal, thus ignoring the information conveyed by the phase. Similarly when taking gradients in the complex domain, a "split" approach that performs optimization separately with respect to the real and imaginary variables has been the dominant practice.

There have been important advances in the area within the last decade that clearly demonstrate that noncircularity is an intrinsic characteristic of many signals of practical interest, and when taken into account, the methods developed for their processing may provide significant performance gains. Similarly, it has been shown that using Wirtinger calculus, all calculations can be carried out in a manner similar to real-valued calculus while keeping all the computations in the complex domain.

In this talk, after a brief introduction to optimization using Wirtinger calculus and statistics in the complex domain, and then I will give examples from some of the recent work conducted at the MLSP-Lab.

BEL@UMBC is UMBC's New Bioelectronics Laboratory

Professor Gymama Slaughter joined the department as an Assistant Professor in 2010 and established the Bioelectronics Laboratory as a group doing research on Bioelectronics and optimization methods for physical circuit design, low-voltage and biologically inspired computing, sensor-processor integration, and wireless networking and communications. Its current research projects focus on developing sense-and-respond systems for blood metabolites and vital signs as well as volatile organic compounds/gas detection in trauma patients and crowded areas.

Dr. Slaughter has a broad background that makes her uniquely qualified to work in Bioelectronics. She received three degrees from Virginia Commonwealth University: a BS in Chemistry, a MS in Chemical Engineering and a Ph.D in Computer Engineering. Before joining UMBC in August 2010, she was Director of the Center for Biosystems and Engineering and professor of Computer Engineering at Virginia State University.

Visit the new BEL@UMBC Web site to find out more about this new and exciting research group at UMBC.


MS defense: Boosting Base Station Anonymity in Wireless Sensor Networks

MS Defense

Exploiting Architectural Techniques for Boosting
Base Station Anonymity in Wireless Sensor Networks

Zhong Ren

2:00pm Thursday, 28 April 2011, ITE 346

Wireless Sensor Networks (WSNs) can be deployed to serve mission-critical applications in hostile environments such as battlefield and territorial borders. In these setups, the WSN may be subject to attacks in order to disrupt the network operation. The most effective way for an adversary to do so is by targeting the Base-Station (BS), where the sensor data are collected in the field. By identifying and locating the BS, the adversary can launch attacks to damage or disrupt the operation of the BS. Therefore, maintaining the BS anonymity is of utmost importance in WSNs.

In this thesis we propose three novel approaches to boost the anonymity of the BS nodes to protect them from potential threats. We first explore the deployment of more BS nodes. We compare the BS anonymity of one versus multiple stationary BS under different network topologies. Our results show that having more base-stations can boost both the average and max anonymity of BS nodes. We further provide guidelines on a cost versus anonymity trade-off to determine the most suitable BS count for a network. Second we exploit the mobility of base-stations and explore the effect of relocating some of the existing BS nodes to the lowest anonymity regions. Our results show that having one mobile BS can dramatically boost the anonymity of the network and moving multiple BS does not provide much value. Finally, we propose to pursue dynamic sensor to cluster re-association to confuse the adversary. This can be employed when base-stations cannot safely move.

Committee members:

  • Mohamed Younis (Chair)
  • Yun Peng
  • Charles Nicholas

CSEE students presenting at the 2011 Graduate Research Conference

Congratulations to the record number of CSEE graduate students who will make oral or poster presentations at the 2011 UMBC Graduate Research Conference on Friday April 29th. The presentations will take place in two sessions, one 9:00 to 10:50 and another 11:00 to 12:50. Poster sessions will be on the seventh floor of the library and oral presentations in UC 312. See the GRC site for a program booklet with abstracts and the session schedules.

Oral presentations:

  • Yousef Ebrahimi, Increasing Transmission Power for Higher Base-station Anonymity in Wireless Sensor Network
  • Zamon Granger, Stabilizing Air Pressure in a Hermetic Environment with Embedded Technology
  • Congchong Liu, Optimizing MapReduce Programming Model through Adaptive Load Balance
  • Kavita Krishnaswamy, Path planning a robotic arm efficiently
  • Varish Mulwad, Generating knowledge from tables
  • Darshana Dalvi, Genome-based Clinical Decision Support System
  • Ashwini Lahane, Detection of unsafe actions in laparoscopic cholecystectomy surgical videos
  • Karuna Pande Joshi, Lifecycle of virtualized services on the cloud
  • Jon Ward, ICF: A Physical Layer Metric for Measuring Anonymity in Wireless Sensor Networks
  • Theoplis E. Stewart Sr., Smart Grid: What are some underlying implications to overlaying digital technology onto the electric power grids?

Poster presentations:

  • Sai Ma, Tom Eichele and Nicolle M. Correa, Hierarchical and graphical analysis of fMRI network connectivity in healthy and schizophrenic groups.
  • Shiming Yang , Near Real"time Data Assimilation for the HYSPLIT Aerosol Dispersion Model.
  • Yu Wang , A Framework for GPU 3D Model Reconstruction using Structure-from-Motion
  • Akshaya Iyengar, Estimating Temporal Boundaries of Events using Social Media Data
  • Brice Cannon, Paveen Apiratikul and John Hryniewicz, Characterization of semiconductor optical waveguides
  • Brian White Jr., The Mobile Memory
  • Xing Chen, Standoff photoacoustic chemical detection using quantum cascade lasers
  • Yi Xin, On Gas Detection and Concentration Estimation via Mid-IR-based Gas Detection System Analysis Model
  • Robert J. Weiblen, Calculation of the expected bandwidth for a mid-infrared supercontinuum source based on As2S3 chalcogenide photonic crystal fibers
  • Pramod Jagtap, Privacy Preservation in Context Aware Geo-social Networking Applications
1 118 119 120 121 122 129