Talk: Passive House; what is it and how does it work?

Passive House; what is it and how does it work?

Brian Uher, ECORE Living

4:00pm Wednesday 20 July 2011
MD Clean Energy Technology Incubator, UMBC South Campus

Brian Uher will discuss the engineering and design principles behind Passive House – a rigorous building performance standard that ECORE Living is deploying in the Mid-Atlantic region.

The term passive house (Passivhaus in German) refers to the rigorous, voluntary, Passivhaus standard for energy efficiency in a building. It results in very low (<80%) energy requirements for space heating or cooling. Any building can be constructed to the standard. Passive design is not an attachment or supplement to architectural design, but a design process that is integrated with architectural design. Although it is mostly applied to new buildings, it has also been used for retrofits. As of August 2010, there were approximately 25,000 such certified structures of all types in Europe, while in the United States there were only 13. ECORE Living is in negotiations with several developers in the DC and Baltimore areas for initial implementation in this region.

Brian Uher is a co-founder of ECORE Living, LLC, a subsidiary of ECORE Ventures. He has developed methods for incorporating return-on-investment with standard energy modeling and auditing techniques to quantify and extend the value of intelligently applied sustainable building techniques, including market projections and capital project analyses. Brian has spoken widely to the real estate and development communities with a focus on a market-based approach to selling green and high performance building. He is currently working on several deep retrofit projects and is developing Passive House optimization strategies for East Coast row houses that will be deployed at scale in 2011 and 2012.

Brian is a LEED accredited professional, HERS/RESNET certified, BPI analyst and envelope professional and taught the Green Remodeling course for the Washington DC chapter of National Association of the Remodeling Industry. He is also a certified Passive House Consultant (residential and commercial standards), the most rigorous performance standard available today. He holds a masters degree from the University of Pennsylvania School of Engineering and the Wharton School of Management, holds a master's of science degree in molecular biology from the University of Pennsylvania and a bachelor's degree in biology from the University of Chicago.


View Maryland Clean Energy Technology Incubator in a larger map


Talk: Metabolic Profile in Personalized Medicine, Dr. Eddy Karnieli, 6/22

Metabolic Profile in Personalized Medicine

Eddy Karnieli, MD
Director, Institute of Endocrinology, Diabetes and Metabolism
RAMBAM Health Care Campus
Haifa 31096, ISRAEL

2:00pm Wednesday, 22 june 2011, ITE 325b, UMBC

Personalized Medicine is revolutionizing the medical world. Understanding and integrating genetic and molecular information with traditional clinical knowledge is the hallmark of this transformation. Currently, much of the medical practice is based on standards of care derived from the epidemiologic studies of large cohorts. These studies do not take into account the individual's genetic, proteomic, and metabolic characteristics. Hence, the gap continues to grow between knowledge accumulated from basic scientific and clinical research, newly discovered molecular mechanisms and therapeutic guidelines, and their implementation at the patient’s bedside. Diabetes is the most common metabolic disease, and its complications have a significant economic impact on the health system. Prediction of diabetes in asymptomatic patients as well as its harsh complications in patients already diagnosed is becoming a necessity, with the considerable increase in the cost of the treatment. Thus, in the current presentation I will review some of the clinical, molecular, metabolic and genetic biomarkers that should be integrated in a future bio-informatic platform and decision support system to be used at the point of care and discuss the challenges we face in applying this vision of personalized medicine in diabetes into reality. Metabolic Profile in Personalized Medicine.

Professor Eddy Karnieli is a graduate of the Rappaport Faculty of Medicine at the Technion– Israel Institute of Technology in Haifa. He obtained clinical training in Internal Medicine and Endocrinology at the Rambam Medical Center and did his Post-Doctoral Fellowship in Diabetes, Obesity and Endocrinology at the National Institutes of Health in Bethesda, Maryland. He was a visiting scholar at the University of California at San Diego and at the National Institutes of Health. He is currently the Director of the Institute of Endocrinology, Diabetes and Metabolism at the Rambam Medical Center. Professor Karnieli's main research interests are the molecular mechanisms for regulating cellular glucose uptake and transporters and their implications in diabetes, obesity and insulin resistance; Gene therapy modalities to trans-differentiate human cells toward beta-cells as a potential cure for type 1 diabetes; Medical informatics, telemedicine and personalized medicine. He has published about 70 peer reviewed papers and reviews.Professor Karnieli serves on the editorial board of several scientific journals and review boards. Professor Karnieli is a retired Colonel from the Israel Defense Forces Medical Corps and is a former Deputy Director of the Rambam Medical Center.

Host: Professor Yelena Yesha

MS defense: Image Classification and Automated Extraction of Collocated Actin/Myosin Regions

MS Thesis Defense

Image Classification and Automated Extraction
of Collocated Actin/Myosin Regions

Ronil S. Mokashi

10:00am Friday, 17 June 2011, ITE 325b

This study illuminates the aspects of cell migration, which is central to many biological processes. To understand cell migration we examine the relationship between local cytoskeletal features and local morphology. We demonstrate this relationship on cells stained for Actin and Myosin We connect the actin/myosin collocalizated structural organization to movements such as membrane protrusions. Membrane protrusions are good indicators of cell migration. Cells can sense the mechanical stiffness or the chemical identity of the surfaces they attach to. We show that these surfaces impact cytoskeletal structure. We develop a classifier to correlate the contextual features extracted from actin/myosin collocalized structure to different cell surfaces.

We also describe a new distance based metric to measure the strength of collocated multi-channel two dimensional data for user selected regions. We provide tools, implemented as plugins for the popular ImageJ toolkit, that are available for download by the general public. These tools allow biologists to specify and score regions of interest by drawing a polygon on their image with a point and click interface. Furthermore, we provide an algorithm that automatically identifies, annotates, and scores an interesting donut shaped region commonly occurring in vascular smooth muscle cells on extra cellular matrix such as dry collagen, wet collagen, fibronectin and monolayer collagen.


  • Dr. Yaacov Yesha (Chair)
  • Dr. Yelena Yesha
  • Dr. Michael Grasso

PhD defense: Wenjia Li on Securing Mobile Ad Hoc Networks

Ph.D. Dissertation Defense

A Security Framework to Cope With
Node Misbehaviors in Mobile Ad Hoc Networks

Wenjia Li

11:00am Tuesday, 14 June 2011, ITE 325b

A Mobile Ad-hoc NETwork (MANET) has no fixed infrastructure, and is generally composed of a dynamic set of cooperative peers. These peers share their wireless transmission power with other peers so that indirect communication can be possible between nodes that are not in the radio range of each other . The nature of MANETs, such as node mobility, unreliable transmission medium and restricted battery power, makes them extremely vulnerable to a variety of node misbehaviors. Wireless links, for instance, are generally prone to both passive eavesdropping and active intrusion. Another security concern in ad hoc networks is caused by the cooperative nature of the nodes. Attacks from external adversaries may disturb communications, but the external intruder generally cannot directly participate in the cooperative activities among the nodes because they do not possess the proper secure credentials, such as shared keys. However, compromised nodes, which are taken over by an adversary, are capable of presenting the proper secure credentials, and consequently can interfere with almost all of the network operations, including route discovery, key management and distribution, and packet forwarding. Hence, it is essential to cope with node misbehaviors so as to secure mobile ad hoc networks.

In this dissertation, we address the question of how to ensure that a MANET will properly operate despite the presence of various node misbehaviors by building a holistic framework that can cope with various node misbehaviors in an intelligent and adaptive manner. The main purpose of this framework is to provide a platform so that the components that identify and respond to misbehaviors can better cooperate with each other and quickly adapt to the changes of network context. Therefore, policies are utilized in our framework in order to make those components correctly function in different network contexts. Besides the policy component, there are three other components, which fulfill the tasks of misbehavior detection, trust management, and context awareness, respectively. To validate and evaluate our proposed framework, we implement our framework based on a simulator.

The specific contributions of this dissertation are: (i) Develop a framework to combine the functionalities of surveillance and detection of misbehavior, trust management, context awareness, and policy management to provide a high-level solution to cope with various misbehaviors in MANETs in an intelligent and adaptive manner; (ii) Utilize the outlier detection technique as well as the Support Vector Machine (SVM) algorithm to detect node misbehaviors, and both techniques do not require a pre-defined fix threshold for misbehavior detection; (iii) Trust is modeled in a vector instead of a single scalar so that it can reflect the trustworthiness of a node in a more accurate manner; (iv) Sense and record various contextual information, such as network status (channel busy/idle, etc.), node status (transmission buffer full/empty, battery full/low, etc.) and environmental factors (altitude, velocity, temperature, weather condition, etc.), so that we can distinguish truly malicious behaviors from faulty behaviors and also more accurately evaluate nodes' trust; (v) Specify and enforce policies in the proposed framework, which makes the framework promptly adapt to the rapidly changing network context.


  • Dr. Anupam Joshi (Chair)
  • Dr. Tim Finin
  • Dr. Yelena Yesha
  • Dr. Yun Peng
  • Dr. Lalana Kagal (MIT CSAIL)

MS defense: Akshaya Iyengar, Estimating Temporal Boundaries for Twitter Events

MS Thesis Defense

Estimating Temporal Boundaries For Events Using Social Media Data

Akshaya Iyengar

10:00am Wednesday, 15 June 2011, ITE 325b

Social media websites like Twitter, Flickr and YouTube generate a high volume of user generated content as a major event occurs. Our goal is to automatically determine as accurately as possible when an event starts and when it ends by analyzing the content of social media data. Estimating these temporal boundaries segments the event-related data into three major phases: the buildup to the event, the event itself, and the post-event effects and repercussions.

We describe a technique that estimates the temporal boundaries of anticipated events and helps to monitor changes as events unfold. In our approach we train a multiclass support vector machine (SVM) to classify event data into the aforementioned phases. We then discuss an algorithm for choosing the two class boundaries, such that the total error is minimized. We apply our technique to six events – Hurricane Igor (2010), Superbowl XLV (2011), three games from ICC Cricket World Cup 2011 and the Royal Wedding (2011). We train individual classifies for each of these events. Finally we train a general classifier and compare its performance with the individual classifiers.

The contributions of this research are presenting a set of features for detecting temporal boundaries of events, determining a reasonable value of tradeoff parameter for multiclass SVMs, evaluating the effect of smoothing SVM predictions using sliding window of different sizes and presenting the results of our approach on real event data gathered from Twitter. Our approach can potentially be used to detect the presence and scope of significant sub-events occurring during the course of an event. When applied to natural disasters and man-made disturbances, the derived data can help organizations involved in mediation efforts to track and analyze evolving events.

MS Defense: Face Recognition for Mass Disaster Victims

MS Thesis Defense

Face Recognition using Gabor Jets for Images of Mass Disaster Victims

Kavita Dabke

11:00am Friday, 10 June 2011, ITE 325B

Mass disasters such as earthquakes, tsunamis, floods, landslides, blizzards and other natural calamities affect a large number of people in a short time duration. After such emergencies occur, people affected need medical aid and are admitted into hospitals. In such conditions, it becomes difficult to locate one's family members and friends. Hospitals and medical centers take triage pictures of people getting admitted for their records. The content of these images could be very disturbing for some people to see. Such pictures cannot be posted on notification walls or internet websites for people to identify their missing family members or friends. This thesis addresses this problem by developing methods for searching triage image databases using query images provided by friends or family of missing people. The dataset for this thesis consists of mug shot images of people affected by calamity. These are also called the triage images. The test dataset consist of clean or regular mug shot images of people.

To automate the process of locating missing people, our thesis has a goal of developing a face recognition system based on Gabor Jets to match a clean image to the existing triage images. Here, a clean image means a mug shot image of a person where all features such as eyebrows, eyes, nose, lips, skin, ears, etc. are seen. The system aims at pulling up the exact match from the triage dataset into the top N matches filtered out based on a similarity measure. Face recognition has been studied for clean images, where all features are visible. We have developed a system to work on the domain of triage images by experimenting with existing Gabor Jets-based similarity measures and modifying the algorithm to best fit our needs.

PhD proposal: Improving traffic flow forecasts for road networks with data assimilation

Ph.D. Dissertation Proposal

Improving traffic flow forecasts for road networks
with data assimilation

Shiming Yang

3:00pm Wednesday, 8 June 2011, ITE 325b

Macroscopic models for traffic flow in networks of roads are widely used in analyzing traffic phenomena and for the management and planning of transportation road systems. These models have various simplifying assumptions in order to be tractable. Moreover, we often have only partial and inaccurate knowledge of the model parameters. Consequently, there are modeling errors to be dealt with.

An approach to mitigate our partial knowledge and modeling uncertainties, is to collect measurements of the real traffic system and use computational methods to assimilate them with the model in order to derive more accurate forecasts of the state of the system.

In this proposal, we propose to design, develop, and analyze methods for assimilating measurements from road networks to improve the accuracy of short-term forecasting of traffic flow in road networks. The proposed methods will overcome challenges due to the non-linearity of traffic flow behavior, high dimensionality of the modeled state space, and anisotropic non-Gaussian modeling and measurement error processes.


  • Dr. Kostas Kalpakis (chair)
  • Dr. Milton Halem
  • Dr. Yaacov Yesha
  • Dr. James Smith

MS defense: Gas Detection and Concentration Estimation via Mid-IR-based Gas Detection System Analysis Model

MSEE Thesis Defense

On Gas Detection and Concentration Estimation via
Mid-IR-based Gas Detection System Analysis Model

Yi Xin

2pm Monday, 6 June 2011, ITE 325

Due to recent development in laser technology and infrared spectroscopy, Laser-based spectroscopy (LAS) has been used in a wide range of research and application fields. A particular application of interest is mid-IR laser-based gas detection systems for health and environment assessment. The NSF-ERC Mid-Infrared Technologies for Health and Environment (MIRTHE) project has engineers and researchers from different areas. As a participant in MIRTHE, we study the performance analysis and improvement possibilities of the integrated sensing system.

Herein, we have improved the previously-developed statistical analysis model, and then used our statistical analysis model for a generic mid-IR pulsed-laser gas detection system to predict trace gas detection and concentration estimation performance, and their sensitivity to system parameters. Based on PNNL (Pacific Northwest National Laboratory) data and the Beer-Lambert law, we defined three main spectral peaks of a trace gas for detecting a target gas and evaluate 3-peak joint detection performance in terms of P_D vs. P_FA. For concentration estimation we used the relationship between gas transmittance (beta), molar absorptivity (epsilon), concentration (c), the sample-mean measurement (x_N) from the photo-detector, and number of samples (N) as the basis. Using the standard confidence interval method, we evaluated estimation reliability, and then analyzed estimation errors.

Simulated gas-detection and concentration-estimation results are presented for 17 trace gases at 1ppm and 1ppb concentrations.


  • Dr. Joel M. Morris (chair)
  • Dr. Chuck LaBerge
  • Dr. Gymama Slaughter

PhD Proposal: Generating Linked Data by inferring the semantics of tables

Ph.D. Preliminary Examination

Generating Linked Data by inferring the semantics of tables

Varish Mulwad

9:30am Wednesday 25 May, 2011, ITE 325b

A vast amount of information is encoded in tables on the web, spreadsheets and databases. Considerable work has been focused on exploiting unstructured free text; however techniques that are effective for documents and free text do not work well with tables. In this research we present techniques to generate high quality linked data from tables by jointly inferring the semantics of column headers, table cell values (e.g., strings and numbers), relations between columns, augmented with background knowledge from open data sources such as the Linked Open Data cloud. We represent a table's meaning by mapping columns to classes from an appropriate ontology, linking cell values to literal constants or entities in the linked data cloud (existing or new) and discovering or and identifying relations between columns. The interpreted meaning is represented as linked RDF assertions. An initial evaluation of our preliminary baseline system demonstrate the feasibility of tackling the problem. Based on this work and its evaluation, we are further developing our framework grounded in the theory of graphical models and probabilistic reasoning.

Committee members:

  • Dr. Tim Finin (chair)
  • Dr. Anupam Joshi
  • Dr. Tim Oates
  • Dr. Yun Peng
  • Dr. L V Subramaniam (IBM Research India)
  • Dr. Indrajit Bhattacharya (Indian Institute of Science)

Context-Aware Middleware for Activity Recognition, MS defense, Radhika Dharurkar, 10:30am 5/19

MS Thesis Defense

Context-Aware Middleware for Activity Recognition

Radhika Dharurkar

10:30am Thursday, 19 May 2011, ITE 325B

Smartphones and other mobile devices have a simple notion of context largely restricted to temporal and spatial coordinates. Service providers and enterprise administrators can deploy systems incorporating activity and relations context to enhance the user experience, but this raises considerable collaboration, trust and privacy issues between different service providers. Our work is an initial step toward enabling devices themselves to represent, acquire and use a richer notion of context that includes functional and social aspects such as co-located social organizations, nearby devices and people, typical and inferred activities, and the roles people fill in them.

We describe a system that learns to recognize richer contexts using sensor data from a person's Android phone along with annotations on her calendar and general background knowledge. Geo-social locations include the concepts of 'home' and 'school' and can be extended to others like 'work' or 'a restaurant'.

Our framework combines data from the phone's sensors (GPS, WI-FI, Bluetooth, acceleration, proximity, etc.) with data mined from applications (e.g., calendar) to produce features that can be used in a machine learning system. Training data from several university students and staff was collected using a system that periodically prompted the user for her true geo-social location and activity. The resulting classifier models were used to predict the individual user's context from new sensor data. The data from a set of users was combined to create a generic model.

We report on an evaluation of the individual and generic models in the university setting for predicting context. Finally, we discuss how our extended context notion can be applied to many interesting applications for smart phone users.


  • Dr. Tim Finin (chair)
  • Dr. Anupam Joshi
  • Dr. Yelena Yesha
  • Dr. Laura Zavala

1 52 53 54 55 56 58