MS defense: Social Media Data Analytics Applied to Hurricane Sandy, Han Dong, 7/29

sandyTweets

MS Defense
Computer Science and Electrical Engineering

Social Media Data Analytics Applied to Hurricane Sandy

Han Dong

12:30-2:30 Monday, 29 July 2013, ITE 325b

Social media websites are an integral part of many people’s lives in delivering news and other emergency information. This is especially true during natural disasters. Furthermore, the role of social media websites is becoming more important due to the cost of recent natural disasters. These online platforms are usually the first to deliver emergency news to a wide variety of people due to the significantly large number of users registered. During disasters, extracting useful information from this pool of social media data can be useful in understanding the sentiment of the public; this information can then be used to improve decision making. In this work, I am presenting a system that automates the process of collecting and analyzing social media data from Twitter. I also explore a variety of visualizations that can be generated by the system in order to understand the public sentiment. I demonstrate an example of utilizing this system on the Hurricane Sandy disaster from October 26, 2012 to October 30, 2012. Finally, a statistical analysis is performed to explore the causality correlation between an approaching hurricane and the sentiment of the public.

As a result of the large amount of data collected by this system; scalable machine learning algorithms are needed for analysis. Boosting is a popular and powerful ensemble method in the area of supervised machine learning algorithms due to its theoretical convergence guarantees, simple implementation and ability to use different learning algorithms to produce a classifier with high accuracy. A novel parallel implementation of the multiclass version of Boosting (AdaBoost.MH) is proposed and our experimental results show that the parallel implementation achieves classification error percentages similar to serial implementation with fewer execution iterations. By distributing the tasks, the number of Boosting iterations decreased linearly at least up to 16 computational threads.

Committee: Professors Milton Halem (chair), Yelena Yesha, John Dorband and Shujia Zhou

MS Defense: Sentiment Analysis on Tweets and their Relationship with Stock Market Trends, J. Sharma, 7/29

Computer Science and Electrical Engineering
MS Thesis Defense

Sentiment Analysis on Tweets and their
Relationship with Stock Market Trends

Jay Sharma

10:00 AM – 12:00 PM Monday, July 29, 2013, ITE 325

We investigate whether sentiment derived from micro-blogging site Twitter can be used to identify important events (product launch, quarter results etc.) and help to infer the future movement of the stock. We used the volume and key performance index of Apple Company’s financial tweets to identify important events and infer the future movement. We present the results of machine learning algorithms (Naïve Bayes, Maximum Entropy, and SVM) for classifying the sentiment of Apple Company’s financial tweets. Statistical analysis using Granger causality test showed that we were able to infer the movement of Apple Company’s stock close price in advance.

Committee: Professors Yelena Yesha (chair), Shujia Zhou, and Tim Finin

 

MS Defense: A. Korde, Radar Compressive Sensing for Noisy Signals, 7/24

MS Defense
Computer Science and Electrical Engineering

Detection Performance and Computational Complexity of
Radar Compressive Sensing for Noisy Signals

Asmita Korde

2:00-4:00 Wednesday, 24 July 2013, ITE 325

In recent years, compressive sensing has received a lot of attention due to its ability to reducethe sampling bandwidth, yet reproduce a good reconstructed signal back. Compressivesensing is a new theory of sampling which allows the reconstruction of a sparse signal bysampling at a much lower rate than the Nyquist rate. This concept can be applied to severalimaging and detection techniques. In this thesis, we explore the use of compressive sensing for radar applications. By using this technique in radar, the use of matched filter can be eliminated and high rate sampling can be replaced with low rate sampling. We analyze compressive sensing in the context of radar by applying varying factors such as noise and different measurement matrices. Different reconstruction algorithms are compared by generating ROC curves to determine their detection performance, which in turn are also compared against a traditional radar system. Computational complexity and MATLAB run time are also measured for the different algorithms. We also propose an algorithm called simplified OMP, which works well in noisy environments and has a very low computational complexity.

Committee: Professors Tinoosh Mohsenin (Chair), Joel Morris, Tulay Adali, and Mohamed Younis

MS defense: Multicast Routing with Byzantine Robustness, D. Mukherjee, 2:30 7/23

network cables

Computer Science and Electrical Engineering
MS Thesis Defense

Multicast Routing with Byzantine Robustness

Debdatta Mukherjee

2:30-4:30 Tuesday, july 23, 2013, ITE 346

Network problems arise when nodes behave in arbitrary ways such as sending malformed messages, sending incorrect messages or not forwarding messages at all to other nodes in the network. These faults are called Byzantine failures. In a real network, these faults can be a result of hardware failure, cyber-attacks or network congestion. Due to the serious problems these faults can cause, it becomes important to make the network robust against them, so that the network continues to operate properly or degrades in an acceptable way in the presence of such faults. In this thesis, we propose methods that include multiple node disjoint path calculations and robust flooding to find byzantine-free multicast trees. By finding such trees, we can guarantee the delivery of the messages from a source to a particular multicast group.

Committee: Professors Deepinder Sidhu (chair), Kostas Kalpakis and Sergei Nirenburg

MS defense: linked data for cybersecurity, Arnav Joshi, 9am 7/22

MS Defense
Computer Science and Electrical Engineering

Linked Data for Cybersecurity Vulnerability Descriptions

Arnav Joshi

9:00-11:00 Monday, 22 July 2013, 325b ITE

The Web is typically our first source of information about new software vulnerabilities, exploits and cyber-attacks. Information is found in semi-structured vulnerability databases as well as in text from security bulletins, news reports, cybersecurity blogs and Internet chat rooms. It can be useful to cybersecurity systems if there is a way to recognize and extract relevant information and represent it as easily shared and integrated semantic data. We describe such an automatic framework that generates and publishes a RDF linked data representation of cybersecurity concepts and vulnerability descriptions extracted from the National Vulnerability Database and other text sources. Entities, relations and concepts are represented using custom ontologies for the cybersecurity domain and also mapped to objects in the DBpedia knowledge base, producing a rich resource of machine-understandable linked data. The resulting cybersecurity linked data collection can be used for many purposes, including automating early vulnerability identification, mitigation and prevention efforts.

Committee: Professors Tim Finin (chair), Anupam Joshi and Tim Oates

UMBC Prof. Helen Burgess recognized for first truly digital dissertation in U.S.

UMBC Professor Helen J. Burgess was recognized has for creating "the first truly digital dissertation in the United States" by the Networked Digital Library of Theses and Dissertations. Dr. Burgess is an Associate Professor of English in the Communication and Technology track and specializes in digital humanities.

Her 2003 doctoral dissertation, Highways of the mind: the haunting of the superhighway from the World's Fair to the World Wide Web, was completed at West Virginia University.

In addition to the recognition, Dr. Burgess received an Innovative ETD Award from NDLTD for her work.

“In Helen J. Burgess’ doctoral dissertation ‘Highways of the mind: the haunting of the superhighway from the World's Fair to the World Wide Web’ she produced the first truly digital dissertation in the United States which took full advantage of a Web-based format — incorporating an HTML and multimedia environment. Her dissertation consists of well-organized Web pages, persistence index links, photographs as well as video and audio clips linked throughout the document. This allows the reader to completely immerse into the digital environment and provide immediately accessible examples indicated in textual format. As a true testament to time and durability, Burgess’ ETD is still as functional today as the day it was posted online a decade ago. The bundle of dissertation files contain the Web page version as well as a "linear" book format version in PDF format, along with copies of all multimedia objects preserved in their original format, for preservation purposes.”

 

UMBC & SAIC Announce 2013 Maryland Cyber Challenge

MCLEAN, Va., July 8, 2013 /PRNewswire/ — Science Applications International Corporation (SAIC) (NYSE: SAI),  Maryland's Department of Business and Economic Development (DBED), and the University of Maryland, Baltimore County (UMBC) announced the third annual 2013 statewide cyber competition, the Maryland Cyber Challenge™, will be held October 8 through October 9 at the Baltimore Convention Center in Baltimore, Maryland.  Registration is now open for aspiring cyber warriors from around the nation to compete at the Maryland event, located in the growing epicenter for the cybersecurity industry.

The Maryland Cyber Challenge™ is designed to attract more students and young professionals to pursue careers in cybersecurity and is held in conjunction with the CyberMaryland2013 Conference and Cyber Hall of Fame. It is the premier statewide cyber competition showcasing today's students and tomorrow's technologists with three levels of competition: high school, college and professional. Teams will have the opportunity to develop and improve their cybersecurity skills in a real-world environment. Founders of the event include SAIC, UMBC, DBED, the National Cyber Security Alliance (NCSA), and the Tech Council of Maryland (TCM).

Orientation sessions for teams in each of three divisions — high school, collegiate and industry and government professionals — will be held at UMBC in July and August. Two qualifying rounds will be conducted online using SAIC's Cyber Network Exercise System (CyberNEXS™), a scalable training, exercise and certification system that has successfully sharpened the cybersecurity skills of more than 15,000 students and professionals globally.  CyberNEXS™ is expected to be a part of planned solutions company Leidos, Inc., following SAIC's planned separation into two independent, publicly traded companies, subject to board of directors approval, as announced Aug. 30, 2012.

The final rounds of the challenge will be held at the conference as part of Maryland's activities to recognize the 10th anniversary of National Cyber Security Awareness Month. High school teams will compete in a cyber-defense challenge, while collegiate and professional teams will go head-to-head in a "capture the flag" scenario. Winners of each division will be announced on October 9 during the CyberMaryland Conference.

The CyberMaryland Conference is a two day event designed to showcase industry innovations, create a platform for discussing cyber policy, recognize cyber pioneers and groom the next generation of IT experts.  The goal of the event is to further demonstrate why Maryland is considered the nation's epicenter for information security excellence. In 2012, the Conference attracted over 800 cyber leaders and professionals from across the country. This included federal, state and local government agency leaders, educators, private industry CTOs, CISOs, analysts and technologists, cyber security entrepreneurs and investors. Conference registration will open in the coming weeks. For more information, go to https://www.fbcinc.com/e/cybermdconference/.   

More details about the event will be announced in the coming weeks ahead.

Quick Facts:

  • Started in 2011 as the Maryland Cyber Challenge and Conference
  • Open to competitors nationwide
  • Three divisions include high school, college and professional
  • Team size: 3-6
  • Powered by the SAIC CyberNEXS competition engine
  • Technical focus: vulnerability mitigation, computer forensics, cyber defense and capture the flag
  • Approximately 700 competitors across 115 teams in the past two years
  • More than $160K in awards distributed over the past two years by the National Security Agency and SAIC

Key Dates:

  • Orientation sessions and practice rounds will begin in July 2013
  • Qualification Round 1 for all divisions is tentatively September 21, 2013
  • Qualification Round 2 is tentatively September 26
  • Cram sessions for final teams will be held the week of September 30, 2013
  • Finals are in person October 8-9, 2013 at the Baltimore Convention Center
  • Winners and awards will be announced at the completion of finals

Supporting Quotes:

State of Maryland
"In Maryland, we are committed to advancing cyber innovation and growing our Innovation Economy," said Governor O'Malley. "The Maryland Cyber Challenge showcases the work of our State's highly-skilled and talented students and professionals whose work helps to establish Maryland as the nation's epicenter for cybersecurity." 

UMBC
"The Maryland Cyber Challenge enables us to support the robust cyber industry in our State and to excite young Marylanders about defending our nation's cyber systems," said Freeman A. Hrabowski. "We are delighted to again have strong partners in cultivating new talent and promoting this crucial industry."

SAIC
"The growing cybersecurity field is becoming a standard specialty within STEM education. Future cyber experts can become better skilled to help protect our nation's critical information infrastructure," said Lou Von Thaer, SAIC senior vice president and sector president.  "By bringing together great minds to take on challenges, whether policy or technical, we contribute directly to protect national security, advance education and grow careers."

National Cyber Security Alliance
"As 21st Century innovation continues to be affected by cyber issues, careers in cybersecurity are more important than ever before," said Michael Kaiser, executive director of the National Cyber Security Alliance. "We're thrilled to see activities like the Maryland Cyber Challenge that develop and intrigue young minds to consider the profession and look forward to an inspiring event where we hope many participants walk-away with a strong desire to pursue the field."

Follow the Maryland Cyber Challenge:

LinkedIn:  www.linkedin.com/pub/maryland-cyber-challenge-and-competition/33/207/a11
Facebook: https://www.facebook.com/MarylandCyberChallenge 
YouTube:http://www.youtube.com/watch?v=K4kXNfa64xI 
Twitter: @MarylandCyber 
Website: www.marylandcyberchallenge.com

 

 

CYBR student places 3rd in Microsoft Cybersecurity Essay Contest

First-year Cybersecurity MPS student Andrew Shiffer placed third in Microsoft's "Cybersecurity 2020" student essay contest.  The contest allows Microsoft to solicit original research about cybersecurity policy challenges from university students at any stage in their educational careers.  Andrew's paper is entitled "A Cybersecurity Triumvirate: Policies, Outcomes, and Emerging Trends."

Andrew will receive $2,000 prize (which he is applying toward his studies at UMBC) and the opportunity for his work to be published by Microsoft at a later date. According to a follow-up note from Microsoft, it appears that Andrew is the only American finalist — the first and second place students both came from Canadian universities.

Well done, Andrew!

 

Two UMBC students selected as CODE2040 Fellows

Two UMBC students were among the 18 fellows selected by Code 2040 for a unique fellowship program that places high performing Black and Latino/a software engineering students in internships with top technology companies and startups in the San Francisco Bay area and supports them with mentorship, leadership training, and network development.

perryPerry Ogwuche, a rising senior majoring in computer science and mathematics, will spend the summer working at Redbeacon, a startup in Foster City, CA that connects qualified home-service professionals with exclusive job requests from homeowners. Perry is a member of the Phi Mu Epsilon National Mathematics Honorary Society, and has served as a Resident Assistant, Student Government Association member and as a math tutor to student athletes.

randiRandi Williams, a rising sophomore majoring in computer engineering, will spend her summer as an intern at Jawbone, a San Francisco company known for its noise eliminating Bluetooth headsets and portable speakers. Randi is a Meyerhoff scholar and Center for Women In Technology (CWIT) affiliate and coach in UMBC's Math Gym.

CODE2040 is a non-profit organization that aims to close the achievement, wealth, and skills gaps for Blacks and Latinos in the United States by creating access, awareness, and opportunities in technology and engineering. Its summer fellowship program brings high performing Black and Latino undergraduate and graduate coders and software engineering students to Silicon Valley for a comprehensive summer internship program that includes a paid internship with a top startup, mentoring, a speaker series, company visits, interactive workshops, executive coaching, and more. The program began last year with five students and has expanded to 18 this summer.

Students who are interested in the program can get more information on it and find out how to apply for the 2014 CODE 2040 fellows program at their web site.

Talk: Personalized Medicine — the future is already here, 6/20

CSEE Colloquium

Personalized Medicine – the future is already here

Professor Eddy Karnieli, MD

Director, Institute of Endocrinology, Diabetes and Metabolism
Rambam Health Care Campus, Israel
Director, Galil Center for Medical Informatics, Telemedicine
and Personalized Medicine
Technion, Israel

2:30pm June 20, 2013, ITE 325b, UMBC

Professor Eddy Karnieli will talk about applications of personalized medicine in healthcare. Personalized medicine allows us to determine an individual's unique genetic and molecular characteristics and use this to better diagnose and treat diseases and reduce possible adverse reactions. Personalized medicine can also be used to predict an individual's susceptibility to diseases, enabling steps to help avoid or reduce the extent to which an individual will experience a disease.

Professor Eddy Karnieli is a graduate of the Rappaport Faculty of Medicine at the Technion– Israel Institute of Technology in Haifa. He obtained clinical training in Internal Medicine and Endocrinology at the Rambam Medical Center and did his Post-Doctoral Fellowship in Diabetes, Obesity and Endocrinology at the National Institutes of Health in Bethesda, Maryland.
He was a visiting scholar at the University of California at San Diego and at the National Institutes of Health.
Recently, he was a visiting professor at MSSM in New York.

He is currently the Director of the Institute of Endocrinology, Diabetes and Metabolism at the Rambam Medical Center and the Director of Galil Center for Medical informatics, Telemedicine and personalized Medicine at the Faculty of Medicine – Technion. Professor Karnieli's main research interests are the molecular mechanisms for regulating cellular glucose uptake and transporters and their implications in diabetes and obesity; Medical informatics, telemedicine and personalized medicine. He is also the current President of the Israel Endocrine Society.

He has published over 70 peer reviewed papers and reviews. Professor Karnieli serves on the editorial board of several scientific journals and review boards.
Professor Karnieli is a retired Colonel from the Israel Defense Forces Medical Corps.

1 79 80 81 82 83 142