Public Safety Coalition Projects
Enterprise Resiliency Experiments
Sports Evacuation Planning
Visual Analytics for Security Applications
Information and Gathering Distillation
Information Networks and Analysis
Information-Driven Modeling and Simulation
Information-Driven Decision Making
Rutgers, the State University of New Jersey
4th Floor, CoRE Bldg.
96 Frelinghuysen Road
Piscataway, NJ 08854-8018
500 Central Drive, 226
West Lafayette, IN 47907
Dr. David S. Ebert, Director, VACCINE
Dr. Fred S. Roberts, Director, CCICADA
At the Center for Visualization and Data Analytics (CVADA) researchers and educators develop faster ways for data to be collected, distilled, managed, visualized, understood, and shared before, during, and after a crisis. CVADA is creating a foundation in visual and data analytics to enable swiftly sifting through a tsunami of information, in diverse forms, to get early warning of potential threats.
Tweets by ccivisanalytics
CCICADA in the NEWS
To Thwart Hoax Distress Calls, the Coast Guard R&D Center Has Partnered with Carnegie Mellon Researchers
Law Enforcement Agencies Using Powerful New Software Tool to Catch Child Sex Traffickers
CCICADA Researchers Probe How to Protect Privacy Rights While Mining and Analyzing Big Data
Rutgers Team Is Applying their ‘Differentially Private Anomaly Detection’ Research to Three Data-Analysis Techniques
Missed a Flight Due to Long Security Lines? TSA Official Unveils ‘Intelligent’ Solution at CCICADA Research Retreat
Howard University Students Gain Valuable Research Experience, PhD Help and Post-Doctoral Fellowship with Help from CCICADA
more news . . .
The Arctic is a major area of emphasis for the U. S. Coast Guard (USCG) because of the rapidly changing climate and resulting impact on ice conditions and the stress on USCG areas of responsibility. Following on two visits to USCG District 17 (D17) offices in Juneau, Alaska, by CCICADA partners from Rensselaer Polytechnic Institute (RPI), CCICADA has reached agreement with D17 to undertake a project to formulate models designed to analyze and support decisions concerning current, anticipated, and proposed operations of the Coast Guard in the Arctic, specifically in the Bering Strait region. The Dynamic Modeling for Arctic Resource Allocation (DMARA) project has been developed in conjunction with USCG D17 leadership, and USCG D17 Operations and Logistics staff, consistent with D17 Arctic Shield 2013 priorities.
Three specific modeling questions related to USCG resource allocation were identified for further investigation under the DMARA Project: (1) deployment and resource allocation of communications technology for vessel tracking and monitoring in the Bering Straits; (2) dynamic models of the USCG supply chain in D17; and (3) logistics planning for oil spill response resources in the Arctic. Phase 1 of the project will focus primarily on question 3 - resource allocation modeling for oil spill response.
Resource allocation in the Arctic is a persistent and complex challenge that is at the center of many USCG missions, including navigational safety, oil spill response, search and rescue, and traffic management. The Arctic is an immense, seasonally-variable waterway with very little development along its shores. Access to the Chukchi and Beaufort Seas in the western Arctic Ocean occurs through the Bering Strait, a focus of growing interest as marine traffic increases in warmer and longer ice-free Arctic seasons. The Arctic is an environmentally harsh and sensitive area with little commercial, maritime or safety infrastructure, and great distances to access resources in the case of a maritime, personnel casualty or oil spill event.
In the Arctic, as elsewhere, logistics--the procurement, maintenance and transportation of materials, facilities and personnel—is dependent upon existing infrastructure. Lack of infrastructure makes logistics challenging and heightens the need for comprehensive and thoughtful resource allocation models. In the absence of shore-based infrastructure, long-range planning for refueling and replenishment are required. Distances between ports, coupled with the unpredictability of weather, sea states and environmental conditions, complicate access, deployment and supply of critical resources, as well as removal of waste and, in the case of oil spills, recovered product and waste. Public expectations for four-season response capability in the event of an incident also increase the need for thoughtful and flexible planning and robust resource allocation models.
Currently, USCG policy favors seasonal surges of technology, personnel and equipment, supported by industrial contracts for deployable resources, rather than shore-based, pre-positioned assets. Initially, the DMARA project will assess the tradeoffs and net benefits associated with different asset allocation strategies in the Arctic/Bering Strait for oil spill response, one of the USCG key Arctic missions. Other missions—search and rescue, navigational safety or traffic management, etc.—can be explored in follow-on efforts.
The DMARA project will provide the USCG with robust models that will permit examination of persistent resource allocation challenges, as well as examine strengths and vulnerabilities of existing and potential bilateral agreements for oil spill response. Included in this assessment will be an examination of the net benefits of development of deepwater port resources in various settings (Port Clarence, Kotzebue, Kodiak, etc.), and an examination of the importance of rail and/or road transportation infrastructure linking Nome, Kotzebue and Point Clarence, between 65N and 66N on the Seward Peninsula. The models will also consider tradeoffs and options associated with forward deployment, surge deployment and permanent deployment of needed resources for USCG Arctic oil spill response. Other USCG missions, such as navigational safety, search and rescue, or traffic management, can be investigated in subsequent projects.
The first phase of the DMARA project will develop a model that allows decision-makers to assess the tradeoffs between pre-event resource expenditures and post-event response results, including time to an appropriate response and impacts of an incident. The portion of the model considering post-event response will incorporate constraints on the transport of resources from their initial locations to a spill site or appropriate staging area. The modeling approach will be flexible enough to consider response capabilities for multiple distinct geographical regions (e.g., Bering Strait, North Slope Borough, Northwest Borough, Chukchi Sea, Beaufort Sea, etc.) and can incorporate regional priorities. The model can examine resource allocation and budget expenditures over a long planning horizon (5-10 years) and thus can assess various levels of investment into long-term infrastructure capabilities, permanent pre-positioned resources, and seasonal resource surges.
Following development of the initial project, the goal of a follow-on long-term study is to develop models that provide the USCG with robust plans for other missions in the face of dynamic uncertainties. The proposed models can focus both on near-term (e.g., as drilling in the Arctic scales up) and long-term (e.g., the ‘steady-state’ of Arctic drilling operations) response capabilities of the USCG. The models can consider not only where to locate response equipment, resources, and bases but when to locate these response resources. The timing of this location becomes important in both planning robustly for the uncertainties in the environment and in how Arctic operations will scale up over the near-term.
VACCINE in the NEWS
In efforts to prioritize and efficiently manage the repair of boats and stations damaged by Superstorm Sandy, the U.S. Coast Guard has accredited a system called Coast Guard Search and Rescue Visual Analytics (cgSARVA) developed in collaboration with Purdue University.
The Coast Guard accredited the system on April 22, 2013, at its headquarters in Washington, D.C.
The cgSARVA tool was created by researchers at the Purdue-led center Visual Analytics for Command, Control and Interoperability Environments, or VACCINE, a U.S. Department of Homeland Security Center of Excellence.
"The accreditation is the first time anything produced by a DHS Center of Excellence has been verified and validated for use by the Coast Guard," says David Ebert, VACCINE director and Silicon Valley Professor of Electrical and Computer Engineering. "The cgSARVA tool can help DHS agencies and law enforcement agencies across the country."
The tool has enabled an interactive visualization, analysis and assessment of search-and-rescue missions completed by each Coast Guard station in hurricane stricken parts of New York and New Jersey.
"The cgSARVA tool is especially helpful in guiding operations and resource decisions by carefully analyzing data in a way that ensures the best return on investment," says Vice Adm. Rob Parker, Coast Guard Atlantic Area commander. "This project serves as a great example of positive partnerships that are being forged between the Coast Guard, the DHS Center of Excellence, and academia."
Purdue initially designed the computer-based visualization to help Coast Guard analysts assess adjustments to boat stations and capabilities on the Great Lakes. It was later used in the Mid-Atlantic region to reallocate resources for Hurricane Irene in 2011 and last year in the aftermath of Superstorm Sandy, which severely damaged 14 Coast Guard stations in the region. The Coast Guard is using the tool to prioritize rebuilding of damaged stations and to help determine which stations should and shouldn't be rebuilt.
"The system can look at what happens if you were not able to immediately rebuild a given station with a certain search-and-rescue caseload," Ebert says. "How long would it take other stations to respond if this station were not here? And if this station were not here, how many cases would have to be handled simultaneously by nearby stations? So it doesn't take all the input and give a final answer, but it provides criteria of the workload and the benefit and what happens if a station closes."
Following Superstorm Sandy, Coast Guard analysts were charged with prioritizing the rebuilding of damaged small-boat stations to determine the order in which stations were to be repaired.
"The cgSARVA model formulation proved to be tremendously insightful for the Coast Guard as it began to prioritize the repair of its stations," says Commander Kevin Hanson, analysis team leader. "Even upon receiving full funding for all damages, the Coast Guard is unable to execute all repairs at the same time and the outputs from cgSARVA have been instrumental in assisting senior leadership in prioritizing work."
Using cgSARVA, the Coast Guard was able to quickly and easily determine how resources might be reallocated in New Jersey, allowing the Coast Guard to operate with increased efficiency.
"A remarkable amount of intellectual rigor has brought us to this point," says Rear Admiral Dean Lee, Deputy for Operations Policy and Capability. "Our analysis team here at headquarters saw tremendous potential in the initial version of cgSARVA and had the organizational vision to expand its capabilities for inclusion in their strategic modeling efforts. Our partnering with Purdue University and the Research and Development Center has yielded insight into our coastal operations that we have never achieved before."
Three Purdue graduate students have been involved in the cgSARVA project, which is ongoing, with researchers continuing to add new capabilities.
The computer-based modeling tool runs on an ordinary computer or laptop.
Purdue Rolls Out Visual Analytics Law Enforcement Toolkit
U.S. University Develops New Sofware Toolkit for Law Enforcement Agencies
New Tool from Purdue Keeps Police Officers Ahead of the Curve
Economics of Security and Randomization (Office of SAFETY Act Implementation)
CCICADA’s research team will concentrate their research in the following three focus areas; (A) economic benefits and costs of security at stadiums, (B) randomization designs, and (C) practical implementation of simple randomization for patron screening. This research will explore the anticipated economic benefits and costs of implementing best practices security strategies at stadium venues that host primarily professional sports and at times entertainment events (such as concerts, monster truck and/or appearances of major world figures), and will assess the anticipated effectiveness of randomizing certain aspects of security such as screening processes (for patrons and vehicles), location and schedule for deployment of security guards and law enforcement, security camera use, and updates of employee background checks.
Large Venue Security
This work builds on the modeling tools we have developed for stadium security in earlier years. CCICADA will continue its experiments with performance of walk through metal detectors in real stadium situations.
CCICADA is also enhancing its crowd management tools, including 2-D and 3-D simulations, in collaboration with various partners. These partners provide a test-bed for trying out our models. Our models consider both pedestrian movements and vehicle movements and provide guidance as to people and vehicle movement during emergency situations as well as during “normal” operations or operations that depart from the normal due to construction or repairs or emergency situations.
We will explore the relevance of our crowd management tools to other venues, including malls, convention centers, theaters, casinos, etc.
Cyber Security: Information Sharing and Metrics
Computer networks control some of the most important critical infrastructure in the world. This includes power systems, water supply systems, air traffic control, building control systems, and transportation systems. This infrastructure is vulnerable to failures of computer systems, accidental disruptions, or deliberate cyber attacks, and the concern about such attacks has been widely discussed. CCICADA plans to continue its work on cyber security in two directions: information sharing to enhance cyber security and metrics to measure cyber readiness. We take our motivation from work we have done on maritime cyber security and expect to continue that work with an emphasis on topics that generalize to other sectors such as the energy and financial sector.
Arctic Resource Allocation and Data Problems
Understanding the rapidly changing conditions in the Arctic presents major challenges in homeland security, dealing with preparation for disasters such as oil spills to finding the best way to monitor changing ice conditions. The project on Dynamic Modeling of Arctic Resource Allocation (DMARA) has concentrated on oil spill response.
Resource allocation in the Arctic is a persistent and complex challenge that is at the center of many USCG missions, including navigational safety, oil spill response, search and rescue, and traffic management. The Alaskan Arctic, comprised of the Chukchi and Beaufort seas, is an immense, seasonally variable, environmentally sensitive area with very little development along its shores. In the Arctic, there is currently very little commercial, maritime, or safety infrastructure and great distances to access resources in the event of a maritime, personnel casualty, or oil spill incident. This lack of infrastructure makes logistics – the procurement, maintenance, and transportation of materials, facilities, and personnel – challenging and heightens the need for comprehensive and thoughtful resource allocation models. In the absence of shore-based infrastructure, long-range planning for refueling and replenishment are required. Distances between ports coupled with the unpredictability of weather, sea states and environmental conditions complicate access, deployment and supply of critical resources as well as removal of waste and, in the case of oil spills, recovered product and waste. Public expectations for four-season response capability in the event of an incident increase the need for thoughtful planning and robust resource allocation models.
Dynamic network modeling approaches are needed for the Alaskan Arctic because of dynamic budgets, varying personnel and logistical deployments, large-scale supply chains, unique transportation constraints, and highly variable environmental conditions. The models we have been developing should help assess (a) tradeoffs between competing constraints, (b) alternatives and priorities for infrastructure investment, build up, deployment and retirement, (c) costs and impacts of environmental constraints on supply chain, investment and planning alternatives, and (d) needs and requirements for communications, information technology, vessel tracking and monitoring, and integrated technology suites in support of Arctic activities.
Social Media for Decision Support
In the past seven years researchers at CCICADA have pioneered research related to extracting and tracking events from unstructured texts from a wide range of genres and domains. Our work on social media has evolved into a 4-way collaboration among a group of CCICADA partners. The pieces include RPI’s information extraction system, UIUC’s tools to analyze trustworthiness of social media reports, CMU’s event detection and evolution characterizations, and Rutgers’ use of machine learning and combinatorial optimization tools to characterize requests for emergency assistance and allocate resources based on those requests. We have worked to understand how the social media tools developed by the various partners can be applied to risky situations and are concluding a project aimed at tying together all of our social media work and completing the development of approaches into one common scenario we have been employing in our research, namely the events surrounding Hurricane Sandy from approach to recovery. Using data from the Twitter firehose, we will be illustrating how our various tools apply to things like: The immediate informational needs for first responders; event annotations with event triggers (dates/times/locations); evolution of responses such as fear and panic and planning with categories of people and location emphasized; requests for aid at different times clustered by type of aid and location.
Research Experiences for Undergraduates
The CCICADA REU program offers a one-on-one research project experience to undergraduates under the mentorship and guidance of CCICADA researchers. The program leverages a large REU program with almost 50 participants that has been run by the DIMACS Center at Rutgers since the early 1990s. The REU program crosses two CCICADA fiscal years, starting in June and ending in August. CCICADA will team with our MSI partner institutions to include their students in the overall REU program, support a competitively-chosen student from other institutions, and introduce the other REU student participants to homeland security applications. Mentors come from CCICADA and all are volunteers and are not compensated for their work. Student research topics are aligned with CCICADA’s research themes. Students present their work at national meetings during the year, and many have won awards for their work. Through a homeland security emphasis, CCICADA introduces all of the almost-50 program participants to the mathematics and computer science aspects of homeland security, thus greatly leveraging a very modest investment. Each year, our REU students also contribute to the research effort at CCICADA.
A Data Integration Framework for Enhancing Emergency Response Situation Reports with Multi-Agency, Multi-Partner Multimedia Data; Public Safety Coalition Projects
Analytical Visualization of the Port Arthur, TX Economic Impact Study
Analyzing High-dimensional Multivariate Network Links with Integrated Anomaly Detection, Highlighting and Exploration
Bristle Maps - A Multivariate Abstraction Technique for Geovisualization
cgSARVA - Coast Guard Search and Rescue Visual Analytics
Chicago LTE Project
COAST - Coastal Operations and Analysis Suite of Tools
Coast Guard PROTECT Visualization
Collegiate Cybersecurity Defense Competitive System (CCDC)
(Crowdsourcing) Combining Crowdsourcing technology with machine learning to do visual analytics on big qualitative data (video datasets).
Cybersecurity Visual Analytics
Design & Development of the Artifact Genome Project (AGP)
Disposable Cell Phone Analysis
Distributed Rendering for Web-Enabling the Stadium Evacuation Planning Tool
Explore Impact of Visualization on Predictive Analysis
Financial Fraud Visual Analytics
Foreign Animal and Zoonotic Disease Visual Analytics
GARI - Gang Graffiti Image Recognition and Interpretation
GeoJunction: Collaborative Visual-Computational Information Foraging and Contextualization to Support Situation Awareness
(GeoViz & CrimeViz) Situational Surveillance & In-field Criminal Investigative Analytics
GeoTxt.org - A Web Service to Geo-Locate Places in Microblog Posts and Other Textual Information Sources
HS-STEM Career Development Program
iLEAPS - iLaw Enforcement Apps Assistance Program for Students
Impacts on Visualization Literacy on Performance of Visual Analytics
Introducing Sustainable Visual Analytics into Command Center Environments
Jigsaw - Visual Analytics for Investigative Analysis on Document Collections
Justice Institute of British Columbia and VACCINE Collaborative Workshops
MADIS - A Data Integration Framework for Enhancing Emergency Response Situation Reports with Multi-Agency, Multi-Partner Multimedia Data
Measuring & Visualizing Information Trustworthiness Using Visual Analytics
MERGE - Mobile Emergency Response Guide
Mobile Application Communication
Mobile 3D Routing, Emergency Evacuation, and In-Field Criminal Investigative Analytics
Multimedia, Social Media, Text, and Emergency Response Analytics
Multimedia Visual Analytics for Investigative Analysis
Officer Performance Visualization System
ORAM - Operational Risk Assessment Module Visualization
Physical Extraction & Reconstruction of Evidence from Mobile Phones Using JTAG Test Ports
Remote Airborne Sensing Technology for Emergency Responders (RASTER)
(Rosetta Phone) Mobile Imaging, Rosetta Phone, and Light-Weight Visual Analytics for In-Field Analytics
Safety in View: A Public Safety Visual Analytics Tool Based on CCTV Camera Angles of View
SensePlace 2 - Collaborative Visual-Computational Information Foraging and Contextualization to Support Situation Awareness
SMART- Social Media Analytics and Reporting Toolkit - Real time Twitter Analysis
Social Media and Healthcare Analytics for Identification of Emerging Health Threats
Symbol Store - Supporting Map Symbol Interoperability
Tech Contract 7 Support for the Cybersecurity Research & Development Program
The Uncertainty of Identity
TRIP - Travel Response Investigative Profiler
User Adoption Learning Tool (Ulearning)
VALET - Visual Analytics Law Enforcement Toolkit
VASA - Visual Analytics for Security Applications
Video Surveillance Visual Analytics
Visual Analytics Decision Support Environment for Epidemic Modeling and Response Evaluation
Visual Analytics Environment for Public Health Surveillance
Visual Analytics for the DHS Centers of Excellence
Visual Analytics of Microblog Data for Public Response Behavioral Analysis in Disaster Events
B. Li, J. P. M?noz, X. Rong, J. Xiao, Y. Tian, and A. Arditi, ISANA: Wearable Context-Aware Indoor Assistive Navigation with Obstacle Avoidance for the Blind, Fourth International Workshop on Assistive Computer Vision and Robotics (ACVR) in conjunction with ECCV 2016.
C. Zhang and Y. Tian, Automatic Video Captioning via Multi-channel Sequential Encoding, Fourth International Workshop on Assistive Computer Vision and Robotics (ACVR) in conjunction with ECCV 2016. Dataset of this paper
C. Zhang and Y. Tian, Automatic Video Description Generation via LSTM with Joint Two-stream Encoding, the 23rd International Conference on Pattern Recognition (ICPR), 2016.
C. Zhang and Y. Tian, BCA: Bi-symmetric Component Analysis for Temporal Symmetry in Human Actions, IEEE International Conference on Multimedia and Expo (ICME), 2016.
C. Zhang, Y. Tian, and M. Huenerfauth, Multi-Modality American Sign Language Recognition, IEEE International Conference on Image Processing (ICIP), 2016.
J. P. Munoz, B. Li, X. Rong, J. Xiao, Y. Tian, and A. Arditi, Demo: Assisting Visually Impaired People Navigate Indoors, the 25th International Joint Conference on Artificial Intelligence (IJCAI), 2016.
L. Du, H. Lang, Y. Tian, C. Tan, J. Wu, and H Ling, Covert Video Classification by Codebook Growing Pattern, IEEE International Workshop on Moving Cameras Meet Video Surveillance: from Body Cameras to Drones (MCMVS) in conjunction with CVPR 2016.
Liu, Z., Zhang C. and Tian, Y (accepted 2016). 3D-based Deep Convolutional Neural Network for Action Recognition with Depth Sequences, Image and Vision Computing.
R. Munoz, X. Rong, and Y. Tian, Depth-aware Indoor Staircase Detection and Recognition for the Visually Impaired, The 3rd IEEE International Workshop on Mobile Multimedia Computing (MMC 2016) in conjunction with ICME 2016.
Tang, H. (July 2016). The 1ST Quarterly Report of SRT Follow-On Project, Scientific Assessment and Workforce Development of ORAU.
X. Rong and Y. Tian, Adaptive Shrinkage Cascades for Blind Image Deconvolution, IEEE International Conference on Digital Signal Processing (DSP), 2016.
X. Rong, B. Li, J. P. M?no, J. Xiao, A. Arditi and Y. Tian, Guided Text Spotting for Assistive Blind Navigation in Unfamiliar Indoor Environments, 12th International Symposium on Visual Computing (ISVC), 2016.
X. Rong, C. Yi, and Y. Tian, Recognizing Text-based Traffic Guide Panels with Cascaded Localization Network, ECCV2016 workshop on Computer Vision for Road Scene Understanding and Autonomous Driving (CVRSUAD) in conjunction with ECCV 2016.
Xian, Y., Rong, X, Yang, X. and Tian, Y. (accepted 2016). Evaluation of Low-Level Features for Real-World Surveillance Event Detection, IEEE Transactions on Circuits and Systems for Video Technology.
Y. Xian and Y. Tian, Single Image Super-Resolution via Internal Gradient Similarity, Journal of Visual Communication and Image Representation, pp. 91-102, Vol. 35, Feb. 2016.
Y. Xian and Y. Tian. Resolution Enhancement in Single Depth Map and Aligned Image. IEEE Winter Conference on Applications of Computer Vision (WACV), 2016.
Y. Xian, X. Rong, X. Yang, and Y. Tian, Evaluation of Low-Level Features for Real-World Surveillance Event Detection, IEEE Transactions on Circuits and Systems for Video Technology, Accepted, 2016.
Y. Ye and Y. Tian, Embedding Sequential Information into Spatiotemporal Features for Action Recognition, IEEE CVPR2016 workshop RoF: Robust Features for Computer Vision 2016.
Y. Ye, X. Rong, X. Yang, and Y. Tian, Region Trajectories for Video Semantic Concept Detection, ACM International Conference on Multimedia Retrieval (ICMR), 2016.
Yang and Y. Tian, Super Normal Vector for Human Activity Recognition with Depth Cameras, IEEE Transactions on Pattern Analysis and Machine Intelligence, Accepted, 2016.
Yang, X and Tian, Y. (accepted 2016). Super Normal Vector for Human Activity Recognition with Depth Cameras, IEEE Transactions on Pattern Analysis and Machine Intelligence.
Ye Y. and Tian, Y. (2016). Embedding Sequential Information into Spatiotemporal Features for Action Recognition, IEEE CVPR2016 workshop RoF: Robust Features for Computer Vision 2016.
Z. Liu, C. Zhang and Y. Tian, 3D-based Deep Convolutional Neural Network for Action Recognition with Depth Sequences, Image and Vision Computing, Vol. 55, Part 2, pp. 93-100, November 2016. doi:10.1016/j.imavis.2016.04.004
Z. Zhu, W. L. Khoo, C. Santistevan, Y. Gosser, E. Molina, H. Tang, T. Ro and Y. Tian. EFRI-REM at CCNY: Research Experience and Mentoring in Multimodal and Alternative Perception for Visually Impaired People. In IEEE 6th Integrated STEM Education Conference (ISEC '16), 2016.
Lehman, F.J. and Singh, R. (2016). Estimation of Children’s Physical Characteristics from their Voices. Interspeech
Singh, R. (2016). Mereological Algebras as Mechanisms for Reasoning about Sound. IEEE International Conference on Machine Learning for Signal Processing,
Singh, R., Baker, J., Pennant, L. and Morency, L. (2016). Voice-based Grading of Psychiatric Disorders. (Under Revision)
Singh, R., Gencaga, D, and Raj, B. (March 2016). Formant Manipulations in Voice Disguise by Mimicry (best paper award). 4th International Workshop on Biometrics and Forensics (IWBF), Cyprus.
Singh, R., Gencaga, D, and Raj, B. (May 2016). Forensic Anthropometry from Voice: An Articulatory-Phonetic Approach. 39th International Convention on Information and Communication Technology, Electronics and Microelectronics: Special Session on Biometrics, Forensics and De-Identification, Opatija, Croatia.
Singh, R., Keshet, J. and Hovy, E. (May 2016). Profiling Hoax Callers. IEEE International Symposium on Technologies for Homeland Security, Boston.
Singh, R., Keshet, J., Gencaga, D. and Raj, B. (March 2016). The Relationship of Voice Onset Time and Voice Offset Time to Physical Age. IEEE International Conference on Acoustics Speech and Signal Processing (ICASSP), Shanghai.
Singh, R., Raj, B. and Baker, J. (March 2016). Short-Term Analysis for Estimating Physical Parameters of Speakers. 4th International Workshop on Biometrics and Forensics (IWBF), Cyprus.
Dembele, B. & Yakubu, A. A. (2016). Controlling Imported Malaria Cases in Mathematical Biosciences and Engineering, USA.
Doumbia, M. & Yakubu, A. A. (2016 accepted). Malaria Incidence and Anopheles Mosquito Density in Irrigated and Adjacent Non-Irrigated Villages of Niono in Mali , DCDS-B, 2016
Farkas, J., Courley, S., Liu, R. & Yakubu, A. A. (2016 - resubmitted). Modelling Wolbachia Infection in a Sex Structured Mosquito Population Carrying West Nile Virus, Journal of Mathematical Biology.
Saad-Roy, C. M., van den Driessche, P. & Yakubu, A. A. (Submitted, 2016). A Mathematical Model of Anthrax Transmission in Animal Populations. Bulletin of Mathematical Biology.
Siewe, N., Yakubu, A. A., Satoskar, A. & Friedman, A. (2016 - resubmitted). Granuloma Formation in Leishmaniasis: A Mathematical Model. Re-Submitted, Journal of Theoretical Biology.
Siewe, N., Yakubu, A. A., Satoskar, A. & Friedman, A. (2016). Immune Response to Infection by Leishmania: A Mathematical Model. Mathematical Biosciences, 276, 28-28-43.
Ziyadi, N. & Yakubu, A. A. (2016). Local and Global Sensitivity Analysis in a Discrete-Time SEIS Epidemic Model. Advances in Dynamical Systems and Applications, 11(1), 15-15-33.
Damoah, R. (31 May-1 June, 2016). Aerosol Robotic Network: Preliminary Results from All Nations University Station Applications. 5th Annual International Conference on Space Science and Satellite Technology Koforidua, Ghana.
Damoah, R. (May 31 -1 June, 2016). Satellite and Model Analysis: Applications to Air Quality, Food Safety and Human Health, 5th Annual International Conference on Space Science and Satellite Technology Applications, Koforidua, Ghana.
Nkwanta, A. & Barber, J. (2016). Book Chapter in Social Media and Networking: Concepts, Methodologies, Tools, and Applications (4 volumes) Information Resources Management Association (USA).
Prah, B. (August 2016 - abstract accepted). Analysis of Climate Conditions and Outbreak of Mosquitoes in Kenya from 2014-2015. NASA Internships Poster Section 2016, NASA Goddard, Greenbelt
Garrett, R. A. (June 2016). Dynamic Modeling of Arctic Resource Allocation for Oil Spill Response, Masters, Rensselaer Polytechnic Institute.
Garrett, R. A., Sharkey, T. C., Grabowski, M. and Wallace, W. A. (2016). Dynamic Resource Allocation to Support Oil Spill Response Planning for Energy Exploration in the Arctic, European Journal of Operational Research, to appear.
Korolov, R., Peabody, J., Lavoie, A., Das, S., Magdon-Ismail, M. and Wallace, W. (2016). Predicting Charitable Donations Using Social Media, Social Network Analysis and Mining, 6(1), 1-10.
Nguyen, H. & Sharkey, T. C. (2016). A Computational Approach to Determine Damage in Infrastructure Networks from Outage Reports. Optimization Letters, 1-18.
Baron, J.D. and Kahn, J. (2016). Tuza’s Conjecture is Asymptotically Tight for Dense Graphs, Combinatorics, Probability & Computing 25(5): 645-667.
DiRenzo II, J., Drumhiller, N. & Roberts, F.S. (in preparation). Maritime Cyber Security. PSO/Westphalia Press.
Dobson A. and Bekris, K. E. (2015). Planning Representations and Algorithms for Prehensile Multi-Arm Manipulation, Proceedings of the IEEE/RSJ International Conference on Intelligent Robots and Systems, Hamburg, Germany, pp. 6381-6386.
Egan, D., Hering, D., Kantor, P., Nelson, C & Roberts, F.S. (2016) Information Sharing for Maritime Cyber Risk Management, in Direnzo, J. II, Drumhiller, N., Roberts, F.S. (eds.) Maritime Cyber Security, PSO/Westphalia Press, to appear.
Garcia-Quismondo, M. & Fefferman, N., A Machine Learning Framework for Integrative Clustering (in review).
Garcia-Quismondo, M., Lofgren, E. & Fefferman, N., How Will Global Climate Change Impact Seasonality in Childhood Gastrointestinal Infections in the Developed World? (in preparation).
Garcia-Quismondo, M., Mayberry, A., Lofgren, E. & Fefferman, N., Modeling the Effect of Climate Change in the Epidemiological Dynamics of Rotavirus in Children (in review).
Ghassemi, M., Sarwate, A.D. and Wright, R.N. (2016 – to appear). Differentially Private Online Active Learning with Applications to Anomaly Detection, in Proceedings of the 9th ACM Workshop on Artificial Intelligence and Security.
Krontiris, A., Bekris, K. & Kapadia, M. (2016). Acumen: Activity-Centric Crowd Authoring Using Influence Maps. In 29th International Conference on Computer Animation and Social Agents (CASA) Geneva, Switzerland.
Biswal, B., Shetty, S. & Rogers, T. (accepted). Enhanced Learning Classifier to Locate Data in Cloud Datacenters. International Journal of Metaheuristics.
Mcneil, P., Shetty, S., Guntu, D. & Barve, G. (May 2016). SCREDENT: Scalable Real-Time Anomalies Detection and Notification of Targeted Malware in Mobile Devices, 7th International Conference on Ambient Systems, Networks and Technologies (ANT-2016)- International Workshop on Mobile Cloud Computing Systems, Management, and Security.
Mukkavilli, S. K., Shetty, S. & Hong, L. (2016). Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers, Journal of Information Security.
Oyedare, T., Sharah, A. A. & Shetty, S. (May 2016). Reputation-Based Coalition Game to Prevent Smart Insider Jamming Attacks, in MANETs 14th International Conference on Wired & Wireless Internet Communications (WWIC 2016).
Tweneboah, O. (2016). Challenges in Identifying Integer Sequences (Browsing the OEIS), CCICADA REU Report.
Ward, A. (2016). Climatology and Cluster Analysis: Self Organizing Maps(SOMs), CCICADA REU Report.
Cetin, O., Jhaveri, M., Ganan, C., van Eeten, M. & and Moore, T. (to appear). Understanding the Role of Sender Reputation in Abuse Reporting and Cleanup. Journal of Cybersecurity
Jhaveri, M., Cetin, O., Ganan, C., Moore, T. & van Eeten, M. (in submission). Abuse Reporting and the Fight Against Cybercrime.
Bhuyan, J., Mohapatra, S. & Narang, H. (under review). Deployment of a Secured Cluster-Based Information Retrieval System in the Cloud, International Journal of Network Security & Its Applications.
Iqbal, A. & Wu, F. (Feb 2016). Energy-Accuracy Trade-Off in Wireless Sensor Network Localization. International Journal of Handheld Computing Research (IJHCR), 6(4), 1.
Narang, H., Wu, F. & Ogunniyan, A. (June 2016). Numerical Solutions of Heat and Mass Transfer with the First Kind Boundary and Initial Conditions in Hollow Capillary Porous Cylinder Using Programmable Graphics Hardware. 2016 International Journal of Advanced Computer Science and Applications (IJACSA), 7(6).
Wu, F., Clarke, D., Jiang, J., Baba, A. & Buford, S. (May 2016). The Digital Age of Campus Maps on Mobile Devices, Journal of Computer and Communications, 4(7).
Wu, F., Clarke, D., Jiang, J., Turner, A., Baba A. & Buford, S. (May 2016). Efficiency in Motion: The New Era of E-Tickets. International Journal of Advanced Computer Science and Applications (IJACSA), Volume 7(6). pp. pp. 124-128
Peng, H., Song, Y. & Roth, D. (2016). Event Detection and Co-Reference with Minimal Supervision, EMNLP.
Upadhyay, S., Christodoulopoulos, C. & Roth, D. (2016). Making The News - Identifying Noteworthy Events in News Articles, NAACL Workshop on Events.
Upadhyay, S., Gupta, N., Christodoulopoulos, C. & Roth, D. (2016). Revisiting Evaluation for Cross Document Event Co-Reference, COLING.
Maasberg, M., Ko, M. & Beebe, N. L. (January 5-8, 2016). Exploring a Systematic Approach to Malware Threat Assessment, The 49th Annual Hawaii International Conference on System Sciences (HICSS, Kauai, Hawaii.
Williams, T., Betak, J. & Findley, B. (2016). Text Mining Analysis of Railroad Accident Reports. 2016 Joint Rail Conference
Roberts, F.S. (2016), Meaningful and meaningless statements using metrics for the border condition, Proceedings of 2016 IEEE International Symposium on Technologies for Homeland Security, IEEE, in press (winner of Best Paper award).
Ghemri, L., Yuan, S. (2016) .Teaching Security in Mobile Environments. Proceedings of 2016 International Conference in Frontiers in Education: Computer Science and Computer Engineering. Las Vegas, NV, July 25-28, 2016.
Ghemri, L., Wright, R.N. (2016). Accountability in Social Networks. In Data Analytics for Security—Novel Research for Issues in Homeland Security. Ed Hovy (editor). In Advanced Science and Technologies for Security Applications. Springer (to appear 2017)
Year 7 Publication List
Florida International University
Purdue University – Ed Delp
Purdue University – Ebert
University of North Carolina at Charlotte
Year 6 Publication List
Florida International University
Not funded by, but derived from GeoTxt research: MacEachren, A.M. 2014: Place Reference in Text as a Radial Category: A Challenge to Spatial Search, Retrieval, and Geographical. Position paper for the 2014 Specialist Meeting — Spatial Search, Santa Barbara, CA: UCSB Center for Spatial Studies. Page 48-51
Purdue - Delp
Guizhen Wang (Graduate Student)
Calvin Yau (Graduate Student)
Jiawei Zhang (Graduate Student)
Jieqiong Zhao (Graduate Student)
Jeff Avery (HS-STEM Student)
Scott Carr (HS-STEM Student)
Kelly Cole (HS-STEM Student)
Whitney Haung (HS-STEM Student)
Oyindamola Olutwatimi (HS-STEM Student)
Rachel Sitarz (HS-STEM Student)
|Charlie File (DHS Fellow)|
|Chintan Dalal (DHS Fellow)|
|Jacob Baron (DHS Fellow)|
|Andrew Dobson (DHS Fellow)|
|Kyle J Leonard (University of Nebraska)|
|Katie L. McKeon (DHS Fellow)|
|University of Illinois at Urban-Champaign|
|Carnegie Mellon University|
|Rensselaer Polytechnic Institute|
|Richard Garrett (DHS Fellow)|
|Aaron Rowen (DHS Fellow)|
|Morgan State University|
|Texas Southern University|
|Otis K Tweneboah|
|City University of New York (MSI Summer Program)|
|Tennessee State (MSI Summer Program)|
|Justin Blake Bowers|
|Colorado State University|
|University of Tulsa|
|Beom Jun Kim|
Smart Transportation Hub
Beacon based localization app
Stadium Security Simulation
BAM II boat sharing
MINES-SAR (MISLE INconsistency & Error Screening for SAR)
PABT Unity Visualization
WAT (web archival tool)
Rutgers, the State University of New Jersey (CCICADA Lead)
University of Illinois at Urbana-Champaign
University of Southern California - Information Sciences Institute
Carnegie Mellon University
Rensselaer Polytechnic Institute
University of Massachusetts-Lowell
City College of New York
Morgan State University
Texas Southern University
Applied Communication Sciences
Regal Decision Systems
Alcatel-Lucent Bell Labs
AT & T Labs- Research
Gari Training Video
Volume 26: February 2017
Volume 25: December 2016
Volume 24: August 2016
Volume 23: January 2015
Volume 22: December 2014
Volume 21: October 2014
Volume 20: September 2014
Volume 19: August 2014
Volume 18: July 2014
Volume 17: June 2014
Volume 16: May 2014
Volume 15: April 2014
Volume 14: March 2014
Volume 13: February 2014
Volume 12: January 2014
Volume 11: December 2013
Volume 10: November 2013
Volume 9: October 2013
Volume 8: September 2013
Volume 7: August 2013
Volume 6: July 2013
Volume 5: June 2013
Volume 4: May 2013
Volume 3: April 2013
Volume 2: March 2013
Volume 1: February 2013