MS defense: Distance Adaptation of Diffuse Reflectance and Subsurface Scattering

translucent_teapot

MS Defense
UMBC Computer Science and Electrical Engineering

Distance Adaptation of Diffuse Reflectance
and Subsurface Scattering

Elizabeth Baumel

1:30pm Friday, November 20, ITE 352, UMBC

Objects in the world around us are made of a myriad of materials, both metallic and non-metallic. Most non-metallic materials scatter light in varying amounts within their surfaces, giving softer, more saturated diffuse colors and softer-edged shadows. This effect, subsurface scattering, is important to make translucent objects look realistic. Non-metallic objects that are opaque also scatter light, just at a very small distance. These non-metallic materials may look somewhat translucent at very close viewing distances, but from farther away they exhibit a more opaque, but still soft diffuse appearance. To shade these objects realistically from all distances, a method is needed to model subsurface scattering effects at close ranges and to smoothly transition to a soft diffuse reflection at larger viewing distances. We present a method that takes advantage of graphics processor texture filtering hardware to linearly filter maps that encode diffuse reflection and translucency information and to interpolate between a close-range subsurface scattering effect and a long-range reflectance function.

Committee: Drs. Marc Olano (Advisor, Chair), Penny Rheingans, Jian Chen

Panel: Women and IT Leadership, 5:30pm Wed 11/18

UMBC Cyberscholars

UMBC’s Information Systems Security Association Chapter and Cyber Scholars & Affiliates Program will host a panel on Women and Leadership in IT followed by hors d’oeuvres and networking with the panelists and representatives from Northrop Grumman.  The event will take place from 5:00 to 6:30pm on Wednesday, 18 November 2015 in room 312 of the University Center at UMBC. Panelists include:

  • Deborah Bonanni: Former Chief of Staff of NSA & VP of Intelligent Decisions, Inc.
  • Diane Howard: VP of Cyber Operations of Northrop Grumman
  • Belinda Coleman: President/CEO the Coleman Group Inc.
  • Brenda Martineau : Organizational Leadership & Management Skill Community Director of NSA
  • Jennifer R. Walker : President/CEO Resolute Technologies, LLC

Everyone is welcome. See the event announcement  for more information and to optionally RSVP.

talk: Matuszek on Giving Successful Technical Presentations, 2pm 11/18

UMBC Professor CYnthia Matuszek

UMBC ACM Tech Talk

Giving Successful Technical Presentations
Prof. Cynthia Matuszek, UMBC

2:00pm Wednesday 18 November 2015, ITE325

Giving talks is one of the core tasks of a researcher. Technical presentations are how we accomplish some of our most important tasks: talks are the first step in getting other people excited about our work, getting suggestions and feedback, teaching, and applying for jobs and grants. Nonetheless, the art and science of giving a really good technical talk is one we are more likely to leave to chance than to deliberately train in. Not only does this mean we aren’t accomplishing everything we could with our presentations; we’re missing a chance to distinguish ourselves by improving a comparatively rare — but learnable — skill.

In this talk, I will describe the idea of the “culture of conveying information,” and give a number of specific suggestions for improving technical talks — including tools, rules of thumb, social conventions, and suggestions for making your talks engaging, informative, and memorable.

Cynthia Matuszek is an Assistant Professor at the University of Maryland, Baltimore County’s Computer Science and Electrical Engineering department where she heads the Interactive Robotics and Language lab. She completed her Ph.D. at the University of Washington in 2014, where she was a member of both the Robotics and State Estimation lab and the Language, Interaction, and Learning group. She is published in the areas of artificial intelligence, robotics, ubiquitous computing, and human-robot interaction. Her research interests include human-robot interaction, natural language processing, and machine learning.

MS Defense: Blind source separation for detection of abandoned objects

ENEE MS Thesis Defense

Blind source separation for detection of abandoned objects:
Exploiting different types of diversity

Suchita Bhinge

2:30pm Friday, 13 November 2015, ITE 325B

Due to the increase in security concerns, automated detection of abandoned objects has become an important application in video surveillance. Because of its increasing importance, a number of techniques have been proposed recently to automatically detect abandoned objects. The general procedure implemented for detection of abandoned objects includes background subtraction or foreground object extraction followed by post-processing steps in order to classify the foreground object as an abandoned or non-abandoned object. However, these techniques make use of a number of user-defined parameters such as track time, co-ordinates of the object/owner, the vicinity of the object, and properties of the object such as its shape, color, among others.

In this thesis, we present a new technique based on blind source separation (BSS) for detection of abandoned objects that does not keep track of the extracted objects or owners and does not require a dual background scheme for stationary object extraction. Order selection is an important step for our implementation of blind source separation based scheme since this step captures the signals with high energy and disregards signals that are not relevant to the detection of abandoned objects. In this thesis, we show that the performance of ICA improves when an algorithm that assumes a flexible source distribution along with multiple types of diversity, such as higher-order statistics and sample dependence is used for the estimation of the source components. ICA, however, can only model one dataset at a time, thus limiting its usage to monochrome frames. In order to address this issue, we also present another implementation of blind source separation called independent vector analysis (IVA), a recent extension of ICA to multiple data that takes the dependence across multiple datasets into account while retaining the model of independent components within each dataset. We show that the proposed blind source separation techniques performs successfully in complicated scenarios such as crowd, occlusion, and illumination changes.

Committee: Drs. Tulay Adali (chair), Joel Morris and Mohamed Younis

talk: Thad Starner, Extension of Self: Present & Future of Wearable Computing, Noon 11/16

Information Systems Department Distinguished Speaker

An Extension of Self: The Present
and Future of Wearable Computing

Professor Thad Starner
School of Interactive Computing
Georgia Institute of Technology

Noon Monday, 16 November 2015, ITE 459, UMBC

Google Glass captured the world’s imagination, perhaps more than any other head-up display. Yet, why would people want a wearable computer in their everyday lives? For over 20 years, Professor Thad Starner and his teams of researchers have been creating living laboratories to discover the most compelling reasons to integrate humans and computers. They have created “wearables” that augment human memory and the senses, focus attention, and assist communication. Is it possible that computers and wearable devices will transform humans for the better, enhancing key abilities and leaving more time and space for deeper connections? In this talk, Starner will discuss why wearables, more than any class of computing to date, have the potential to extend us beyond ourselves.

Thad Starner is a wearable computing pioneer; he has been wearing a head-up display based computer as part of his daily life since 1993 – perhaps the longest such experience known. Starner is a Professor in the School of Interactive Computing at the Georgia Institute of Technology and a Technical Lead on Google’s Glass. In 1990 he coined the term “augmented reality” to describe the types of interfaces he envisioned at the time. He is a founder of the annual ACM/IEEE International Symposium on Wearable Computers, now in its 19th year, and has produced over 450 papers and presentations on his work.

Starner is an inventor on over 80 United States patents awarded or in process. In addition to Google Glass, he has worked on a wireless glove that teaches the wearer to play piano melodies without active attention; a game for deaf children that helps them acquire language skills using sign language recognition; wearable computers that enable two-way communication experiments with wild dolphins; and wearable computers for working dogs to better communicate with their handlers.

PhD defense: Connectivity Restoration in Damaged Wireless Sensor Networks

PhD Dissertation Defense

Distributed Protocols for Connectivity Restoration
in Damaged Wireless Sensor Networks

Yatish Joshi

9:30 Monday, 23 November 2015, ITE 325b

Decreasing costs and increasing functionality of hardware devices have made Wireless Sensor Networks (WSNs) attractive for applications that serve in inhospitable environments like battlefields, planetary exploration or environmental monitoring. WSNs employed in these environments are expected to work autonomously and extend network lifespan for as long as possible while carrying out their designated tasks. The harsh environment exposes individual nodes to a high risk of failure and their failure can partition the network into disjoint segments. Therefore, a network must be able to self-heal and restore lost connectivity using available resources. The ad-hoc nature of deployment, harsh operating environment means that proactive strategies based on redundancy cannot be applied as the scope of the damage could be so large that redundant nodes could be lost as well. The lack of external resources like satellite coverage preclude the application of centralized recovery approaches since they require the entire network state to be available for recovery. Hence distributed approaches that employ reactive strategies are the most viable solutions for these networks.

In this dissertation, we tackle the problem of distributed connectivity restoration in a WSN that has been partitioned into multiple disjoint segments due to multi-node failures. We consider multiple variants of the problem based on the available resources, and present a set of novel recovery schemes that suit the capabilities and requirements of the WSN being repaired. The correctness and time-complexity of all proposed approaches are analyzed and their performance is validated through extensive experiments.

Committee: Drs. Mohamed Younis (Chair), Charles Nicholas, Chintan Patel, Kemal Akkaya (FIU), Waleed Youssef (IBM)

Professor Gymama Slaughter to speak at 2016 TEDxBaltimore

CSEE Professor Gymama Slaughter will talk about her research on Human Powered Biosensors as part at the 2016 TEDxBaltimore conference in January. The one-day conference will be held at Morgan State University on January 14, 2016 with the theme OUTLIERS: ideas that challenge traditional thinking. She will join about 15 other speakers each sharing an “idea worth spreading” with the expected 1,500 attendees.

Dr. Slaughter’s research focuses on the application of sensor-processor integration, bioelectronics design and theory, optimization methods for physical circuit design, biologically inspired computing (neural networks), and sensor interfacing and wireless networking and communications. You can find out more about the work that she and her students are doing by visiting her Biolectronics Laboratory website.

talk: John Kloetzli, DirectX 11 Software Tessellation, 11/13

beyond_earth

The UMBC CSEE Seminar Series Presents

DirectX 11 Software Tessellation

John Kloetzli, Firaxis Games

12noon-1pm, Friday, November 13, 2015 ITE 102

Graphics Processing Units (GPUs) have become increasingly important in general purpose high performance computing, both because of the enormous computing power of these highly parallel processors as well as the evolution of general purpose software APIs that provide a domain-independent software environment. Graphics applications are also being redesigned to take advantage of this general GPU access, both for design of new algorithms as well as optimization and specialization of existing ones. This talk will explore how having access to the general purpose compute API in DirectX 11 allows us to design a tessellation algorithm for a specific use case that has superior performance and quality to the fixed-function tessellation hardware.

John Kloetzli is a graphics programmer at Firaxis Games. He is an alumnus of UMBC, having received a BS in 2006 majoring in Computer Science with a minor in both Mathematics and Philosophy, and a MS in Computer Science in 2008. He has worked at Firaxis since 2006 and is part of the team that produces the popular Civilization game series.

Hosts: Professors Fow-Sen Choa () and Alan T. Sherman ()

talk: Banerjee, Wearable Sensors for Individuals with Mobility Impairments

The UMBC CSEE Seminar Series Presents

Wearable Sensors for Individuals
with Mobility Impairments

Nilanjan Banerjee
Associate Professor, CSEE Dept., UMBC

1-2pm Friday, 6 November 2015, ITE 325

More than 500,000 individuals in the US are hospitalized every year due to spinal cord injuries. The severity of the injury dictates the degree of mobility that an individual has. All mobility impaired individuals rely on assistive devices to perform their daily life activities. Present assistive devices, however, are cumbersome, expensive, and limited. To this end, in this talk I will present two minimally intrusive systems — InviZ and Tongue-n-Cheek that can be used for environmental control in individuals with limited mobility. InviZ is based on textile capacitive sensors built into clothing and is used for gesture recognition; Tongue-n-Cheek is a micro-radar based system for tongue gesture recognition. This is joint work with Ryan Robucci and Chintan Patel and students in the ECLIPSE cluster at UMBC (eclipse.umbc.edu)

Nilanjan Banerjee is an associate professor in the CSEE Dept. at UMBC. He is a 2011 NSF Career Awardee and received a Microsoft Research Software Engineering Innovations Award. His research interests are in embedded systems, mobile systems, and sensor design.

Hosts: Professors Fow-Sen Choa () and Alan T. Sherman ()

talk: Charles Nicholas, How colorful is your exploit kit?, 11/6

The UMBC Cyber Defense Lab presents

How colorful is your exploit kit?

Professor Charles Nicholas
Computer Science, CSEE Department, UMBC

11:15am-12:30pm Friday 6 November 2015, ITE 325b

Exploit kits have emerged as a significant form of malware in recent years. When a user visits an infected web site, code is executed that inspects the user’s computer for vulnerabilities, and then downloads malicious payloads based on that information. When a user visits an infected site, the so-called “landing page” can then begin its reconnaissance work. These landing pages, and in particular the embedded code, usually Javascript or a Java applet, can be captured and analyzed. Our hypothesis is that exploit kits can be characterized by their landing pages.

We have completed our effort to build a data set of malware domains and the landing pages they send. At this point we have almost seven gigabytes of pcap data, collected from about 4500 web sites, to analyze. The analysis began with informal inspection of pcap files. We parsed the pcap data into n-grams, and applied established numerical analysis techniques to produce some graphs. These graphs were the heart of our presentation at the July, 2014 Malware Technical Exchange Meeting.

Since then, we have succeeded in running the pcap data through the Suricata program, which separates the pcap data into individual HTML files. Some of these contain Javascript code, which we have parsed out into separate objects. These Javascript specimens were then subjected to the same visual cluster analysis that was used with the original pcap data.

Charles Nicholas is a Professor in the Department of Computer Science and Electrical Engineering at UMBC, where he has been on the faculty since 1988. He earned the B.S. degree from the University of Michigan – Flint in 1979, and the M.S. and Ph.D. degrees from The Ohio State University in 1982 and 1988, respectively. He has written more than one hundred scholarly papers, and has advised seven Ph.D. students and more than eighty M.S. students. He served as Chair of the CSEE Department from 2004 to 2010. In addition to his appointment at UMBC, Dr. Nicholas has held appointments at the National Institute of Standards and Technology, and the NASA Goddard Space Flight Center. He spent academic years 1996-97 and 2011-2012 on sabbatical at the National Security Agency. Dr. Nicholas’ research interests include document engineering, information retrieval, and malware analysis. His work has been funded by a number of agencies, including NASA, Maryland Industrial Partnerships, DARPA, AFOSR, and the Department of Defense. He has served five times as the General Chair of the ACM Conference on Information and Knowledge Management (CIKM), and serves on the SIGWEB Executive Committee. Dr. Nicholas is a member of the Board of Directors of UMBC Training Centers, and the Advisory Board of the UMBC Research Park.

Host: Alan T. Sherman,

1 20 21 22 23 24 58