Northeastern University
College of Computer and Information Science

Contact Us

  • Contact Us

Search

  • Explore CCIS
    • About the College
      • Dean’s Message
    • Undergraduate Programs
      • Advising
      • Degree Programs
      • Minor in Computer Science
      • Minor in Information Science
      • Tutoring
      • Scholarships
      • Student Awards
    • Graduate Programs
      • Degree Programs
      • Current Students
    • Co-op
    • People and Organizations
      • Faculty
      • Administrative Staff
      • Student Organizations
    • Contact Us
    • Research
      • Research Groups
      • Centers and Institutes
    • Technical Help
  • Prospective Students
  • Current Students
  • Alumni
  • Employers
Layout Image
  • About the College
    • Dean’s Message
    • CCIS Videos
  • Undergraduate Programs
    • Advising
    • Degree Programs
    • Minor in Computer Science
    • Minor in Information Science
    • Scholarships
      • Bradley E. Bailey Scholarship
      • Darwin Scholarship
      • Jane K. Wenzinger Scholarship Fund
      • Department of Defense Information Assurance Scholarship Program
      • NSF Federal Cyber Service: Scholarship for Service
    • Student Awards and Research
    • Tutoring
  • Graduate Programs
    • Degree Programs
      • Ph.D. in Computer Science
        • Admission Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Electives Outside the College
        • Specimen Curriculum
        • Academic Review Process
      • Ph.D. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Time and Time Limitation
        • Transfer Credit
        • Specimen Curriculum
        • Program Faculty
        • Contact Us
      • Ph.D. in Personal Health Informatics
      • M.S. in Computer Science
        • Admissions Requirements
        • Academic Requirements
        • Academic Probation
        • Time and Time Limitation
        • Transfer Credit
        • Approved Courses
        • Specimen Academic Schedule
        • Reading and Project Courses
        • Master’s Thesis
        • Request More Information
      • M.S. in Information Assurance
        • Admissions Requirements
        • Academic Requirements
        • Specimen Academic Schedule
        • Financial Aid and Scholarships
        • Faculty
        • Request More Information- MSIA
      • M.S. in Health Informatics
        • Program Overview
        • Master’s Degree
        • Certificates
        • Course Descriptions
        • Testimonials
        • Faculty
        • Careers
        • Student Profiles
        • Apply
        • Request More Information- MSHI
      • ALIGN
    • Apply
    • Scholarships
    • FAQ
    • Current Students
      • Course Descriptions
      • Course Schedules
      • Graduate Guidebook
      • Commencement
      • Forms
      • Travel Support
      • Wiki
      • Jobs
      • New Student Page
        • MyNeu Account
        • Course Registration
        • Health Insurance Requirements
        • ISSI Orientation
        • CCIS Orientation
        • CCIS Email Account
        • Paying Your Bill
        • Husky ID Cards
        • Online Learning
        • Housing
        • Parking
        • Public Transportation
  • Research
    • Research Groups
      • Algorithms and Theory
      • Artificial Intelligence
      • Data
      • Educational Research
      • Formal Methods
      • Game Design
      • Network Science
      • Personal Health Informatics
      • Programming Languages
      • Security
      • Software Engineering
      • Systems
    • Centers and Institutes
  • Co-op
    • Information for Students
      • FAQ
      • Information for New Students
      • Information for Upperclass Students
      • Information for Graduate Students
      • Prospective
      • Forms
    • Information for Employers
    • Co-op Manual
      • Steps to Finding A Job
      • Taking a Course
      • Academic Standards
    • Research & Data
      • Assessment
    • Calendar
    • Surveys & Evaluations
      • Student Evaluation
      • Employer Evaluation
  • People and Organizations
    • Faculty
    • Administrative Staff
    • Student Organizations
  • News & Events
    • News Archive
    • Events
    • Distinguished Speakers Series

Archive for Uncategorized – Page 2

Researchers Transcend Boundaries for Science

By bironje
Tuesday, February 19th, 2013
86487812
The 179th annual meeting of the American Association for the Advancement of Science included several presentations from Northeastern researchers. Photo by Thinkstock.

To under­stand and over­come the com­plex­i­ties of cli­mate change, sci­en­tists, engi­neers, social sci­en­tists, and policy makers must tran­scend the bound­aries that have tra­di­tion­ally con­fined their work, according to North­eastern Uni­ver­sity pro­fessor Matthias Ruth. He deliv­ered the state­ment on Sunday at a sym­po­sium he hosted on urban adap­ta­tion to envi­ron­mental changes.

As Con­gress races to find a solu­tion to impending cuts to research and other funding, com­mu­ni­cating across dis­ci­plines and other tra­di­tional bound­aries was a recur­ring theme at the 179th annual meeting of the Amer­ican Asso­ci­a­tion for the Advance­ment of Sci­ence, where Ruth’s ses­sion was one of hun­dreds aimed at high­lighting the “Beauty and Ben­e­fits of Sci­ence” — the summit’s theme. An esti­mated 8,000 scholars from around the globe descended on Boston’s Hynes Con­ven­tion Center between Feb. 14–18 to share their work at the meeting, which is billed as the world’s largest sci­en­tific conference.

Throughout the con­fer­ence, North­eastern fac­ulty led pre­sen­ta­tions high­lighting their work to address real-​​world chal­lenges in areas ranging from health to tech­nology to sus­tain­ability. April Gu, a civil and envi­ron­mental engi­neering pro­fessor at North­eastern and one of three scholars pre­senting in Ruth’s ses­sion, noted that our cur­rent strate­gies for water resources man­age­ment may not stand the test of time. “Water quality reg­u­la­tion itself is not enough,” she said. “We need a gov­er­nance way beyond that.”

David Lazer, pro­fessor of polit­ical sci­ence and com­puter and infor­ma­tion sci­ence, hosted a ses­sion on Friday on the sci­ence of pol­i­tics, in which he and five other scholars from around the nation argued for a more rig­orous sci­en­tific approach to under­standing and working with gov­er­nance struc­tures. “The ques­tion is can we come up with an objec­tive sci­en­tific under­standing of polit­ical processes,” Lazer said.

“Astronomers do not have to worry that when they point that tele­scope to the heavens, that the stars are going to twinkle because you’re looking at them,” said Lazer, whose work focuses on using net­work sci­ence to under­stand the spread of polit­ical memes. “But when you look at social sys­tems that’s cer­tainly a challenge.”

The same chal­lenge was dis­cussed on Sat­urday in a ses­sion on pre­dicting human behavior, which was hosted by world-​​renowned net­work sci­en­tist Albert-​​László Barabási, Dis­tin­guished Pro­fessor of Physics with joint appoint­ments in biology and the Col­lege of Com­puter and Infor­ma­tion Sci­ence. In this ses­sion, Alessandro Vespig­nani, Stern­berg Family Dis­tin­guished Uni­ver­sity Pro­fessor of Physics, pre­sented new research using math­e­mat­ical mod­eling to map the spread of epi­demic diseases.

“As soon as you plug in some level of aware­ness of the dis­ease, you get the dis­ease spreading slower and there’s a little less impact on the pop­u­la­tion,” said Vespig­nani, who holds joint appoint­ments in the Col­lege of Sci­ence, the Col­lege of Com­puter and Infor­ma­tion Sci­ence, and the Bouvé Col­lege of Health Sci­ence. Nonethe­less, his work, which aims to inform dis­ease mit­i­ga­tion and con­tain­ment strate­gies, showed that travel restric­tions would need to limit human mobility around the planet by a stag­gering 99 per­cent to have any mean­ingful impact.

Throughout the con­fer­ence, it was evi­dent that Ruth’s com­ment about the com­plexity of cli­mate change could easily be extended to all of the major chal­lenges facing our planet today: Dis­ease man­age­ment, just like secure and sus­tain­able infra­struc­tures, requires a com­mit­ment to cross-​​pollination by our scholars and policy makers.

But none of this will be pos­sible without a cul­tural shift toward under­standing and appre­ci­ating the ben­e­fits of sci­ence. Christos Zahopoulos, an asso­ciate pro­fessor of engi­neering and exec­u­tive director of Northeastern’s Center for STEM Edu­ca­tion, spoke at the asso­ci­ated Inter­na­tional Teacher-​​Scientist Part­ner­ship Con­fer­ence, noting that his Retirees Enhancing Sci­ence Edu­ca­tion through Exper­i­ments and Demon­stra­tions, or RE-​​SEED pro­gram, has been inspiring the next gen­er­a­tion of sci­en­tists for more than two decades.

Categories : Uncategorized

Meet George Jetson, M.D.

By bironje
Tuesday, February 19th, 2013

The virtual doctor won’t see you just yet. But that day is getting closer.

Today’s health-care industry is making increasing use of Web-based virtual agents and avatars, or computerized assistants, not only to perform clerical duties but also to dispense medical information.

In Spain, an avatar named Osane for the past year has been helping visitors navigate the website of the Basque region’s public-health system. Osane, an animated character, mainly helps users with clerical matters such as changing their physician or booking an appointment.

But she also can give basic advice on healthy living and common illnesses. Type into the chat window that you think your son has varicella, for example, and Osane will respond with a brief description of the symptoms of chickenpox and offer to help book an appointment with a pediatrician.

But Osane knows her limits. Tell her only that your son has a fever, and the avatar will say she is not a doctor.

Osane runs on software from Anboto, a Spanish start-up with offices in Boston and Silicon Valley. Its technology is also used by a Spanish health insurer, IMQ, to help customers navigate its website.

[image]Step by step Avatars helping hospital patients with discharge instructions can slash readmission rates

“Health care is a very broad sector with many potential applications for virtual agents,” says Anboto Chief Executive Xabier Uribe-Etxebarria.

Most avatars in use in health care today handle administrative tasks and website navigation. The U.S. insurer Aetna Inc. introduced an avatar from Next IT Corp., of Spokane, Wash., on its website in 2010, partly to reduce the load on its call center.

Nevertheless, some experts believe the technology is ready to be used in a clinical context—though these applications are mainly at the research stage.

Timothy Bickmore, an associate professor at Boston’s Northeastern University, used avatars in research aimed at helping hospital patients understand their discharge information. Many don’t, and so run a greater risk of being readmitted. Mr. Bickmore says his three-year trial at a Boston hospital reduced readmissions by 30%.

Craig Mundie, Microsoft Corp.’s chief research and strategy officer, last year demonstrated the use of avatars and Microsoft’s Xbox Kinect technology to facilitate group therapy sessions—the theory being that patients will feel less intimidated by an avatar than by a human group leader.

Cisco Systems Inc. has also demonstrated an avatar, named Patty, that counsels hospital patients. Patty gives the patients information on their treatment and allows them to ask questions they might be too embarrassed to ask a nurse or physician.

Northeastern’s Mr. Bickmore says avatars have an attribute that health-care professionals often lack—patience.

“Many people prefer avatars to nurses for counseling because they do not feel rushed and can ask questions,” he says

As new roles are explored for avatars in health care, experts say the key is to ensure the avatar recognizes its own boundaries and doesn’t overstep them.

“You have to be particularly careful,” Mr. Bickmore says, “with anything that involves human judgment or requires common-sense reasoning about the world.”

Article originally appeared in The Wall Street Journal

Categories : Uncategorized

Complex Systems Made Simple

By bironje
Friday, February 15th, 2013

cover-expansion_620-590x631Just as the name implies, com­plex sys­tems are dif­fi­cult to tease apart. An organism’s genome, a bio­chem­ical reac­tion, or even a social net­work all con­tain many inter­de­pen­dent components—and changing any one of them can have per­va­sive effects on all the others. In the case of a very large system, like the human genome, which con­tains 20,000 inter­con­nected genes, it’s impos­sible to mon­itor the whole system at once.

But that may not matter any­more. In a paper pub­lished in the pres­ti­gious mul­ti­dis­ci­pli­nary journal Pro­ceed­ings of the National Academy of Sci­ence, North­eastern net­work sci­en­tists have devel­oped an algo­rithm capable of iden­ti­fying the subset of components—or nodes—that are nec­es­sary to reveal a com­plex system’s overall nature.

The approach takes advan­tage of the inter­de­pen­dent nature of com­plexity to devise a method for observing sys­tems that are oth­er­wise beyond quan­ti­ta­tive scrutiny.

“Con­nect­ed­ness is the essence of com­plex sys­tems,” said Albert-​​László Barabási, one of the paper’s authors and a Dis­tin­guished Pro­fessor of Physics with joint appoint­ments in biology and the Col­lege of Com­puter and Infor­ma­tion Sci­ence. “Thanks to the links between com­po­nents, infor­ma­tion is dis­trib­uted throughout a net­work. Hence I do not need to mon­itor everyone to have a full sense of what the system does.”

Barabási’s col­lab­o­ra­tors com­prise Jean-​​Jacques Slo­tine of M.I.T. and Yang-​​Yu Liu, lead author and research asso­ciate pro­fessor in Northeastern’s Center for Com­plex Net­work Research, for which Barabási is the founding director.

Using their novel approach, the researchers first iden­tify all the math­e­mat­ical equa­tions that describe the system’s dynamics. For example, in a bio­chem­ical reac­tion system, sev­eral smaller reac­tions between periph­er­ally related mol­e­cules may col­lec­tively account for the final product. By looking at how the vari­ables are affected by each of the reac­tions, the researchers can then draw a graph­ical map of the system. The nodes that form the foun­da­tion of the map reveal them­selves as indis­pen­sible to under­standing any other part of the whole.

“What sur­prised me,” said Liu, “was that the nec­es­sary nodes are also suf­fi­cient in most cases.” That is, the indis­pen­sible nodes can tell the whole story without drawing on any of the other components.

The meta­bolic system of any organism is a col­lec­tion of hun­dreds of mol­e­cules involved in thou­sands of bio­chem­ical reac­tions. The new method, which com­bines exper­tise from con­trol theory, graph theory, and net­work sci­ence, reduces large com­plex sys­tems like this to a set of essen­tial “sensor nodes.”

In the case of metab­o­lism, the researchers’ algo­rithm could sim­plify the process of iden­ti­fying bio­markers, which are mol­e­cules in the blood that tell clin­i­cians whether an indi­vidual is healthy or sick. “Most of the cur­rent bio­markers were selected almost by chance,” said Barabási. “Chemists and doc­tors found that they happen to work. Observ­ability offers a rational way to choose bio­markers, if we know the system we need to monitor.”

Categories : Uncategorized

Northeastern Researchers on the Boeing Battery Failures

By bironje
Friday, February 15th, 2013

Photo via Thinkstock.By now you’ve probably heard of the Boeing 787 Dreamliners and the problems they had in their first weeks in the air. Basically, the Dreamliner is an extremely fuel-efficient airliner. It was the first to use composite materials to reduce weight and the first to use “large format” lithium-ion batteries.

Due to fuel leaks and spontaneous fires in the batteries that exceeded the normal growing pains of any new, complex system, the entire fleet was grounded in mid January. Today, Chicago Tribune reports that the Federal Aviation Administration has permitted Boeing to perform a single “ferry flight” to relocate one of their planes so they can continue investigations. There is still no conclusion about the cause of the failures and FAA and National Transportation Safety Board officials don’t expect one for at least a couple months.

I wanted to better understand the problem so I asked Northeastern researchers K.M. Abraham and Peter Manolios for the takes on it all. Abraham is a research professor in the Northeastern University Center for Renewable Energy Technologies with 30 years of experience in the world of lithium batteries. He was quoted in two recent Wired articles about Boeing’s troubles, here and here. Manolios is an associate professor of computer and information science who has worked with Boeing and NASA for nearly a decade. The Dreamliner team commissioned Manolios to build an algorithm (dubbed CoBaSa) that can automatically integrate the various safety systems onboard the plane.

Abraham explained that lithium-ion batteries are such a hot topic (pun not intended) because they can store up to ten times more energy  than traditional batteries. This is what makes them so energy efficient but it is also precisely why they carry potential safety hazards. It’s the difference between taking a match to a couple grains of gunpowder or a hand grenade full of the stuff.

Now imagine the gunpowder is in the same vessel as a lit match, and a polymer membrane about half the thickness of a human hair is the only thing separating the two. This is akin to the situation in a lithium-ion battery, where the membrane separates two chemical reagents that are highly reactive with one another. Any failures in the system could allow the two chemicals to come into contact (internally short circuit), which would mean certain death for the battery…and a big explosion.

Lithium-ion batteries are pervasive these days. They’re in our cell phones and our computers. They’re the sole power storage devices in all electric vehicles like the Nissan Leaf and Tesla Roadster. All told, Abraham said there are more than 10 billion lithium-ion batteries out there, powering our digital world one chemical reaction at a time. But that’s no reason to get into a tizzy, as my mom would say. The batteries in these devices have gone through extensive optimization steps over the years. The chance of a fire in any of them is about one in 10 million.

According to the press, the Dreamliner batteries were also manufactured according to accepted specifications. It could be, Abraham speculated, that the specifications relevant in the small-format batteries in our cell phones and electric cars simply aren’t  enough at the larger scale.

The real problem may also have stemmed from how the batteries were used, said Manolios. “What seems to have happened is that there was a very large demand placed on the batteries and while they were charging they caught on fire,” he explained, pointing to a Time Magazine article on the topic.

While Manolios’ CoBaSa algorithm wasn’t designed to detect battery failures or fuel leaks, it’s possible that it could be used to prevent the former, he said. “We used my algorithm to synthesize software architectures, which involved figuring out which cabinets to place avionics code on, subject to a very large number of declarative constraints,” he said.

“It seems likely that we could use CoBaSa to express constraints saying that the power demands to the battery do not exceed a particular limit.” CoBaSa could then synthesize a system that doesn’t demand more power than the battery can provide, he explained.

Abraham is taking another approach, working on entirely new systems. He invented a battery called lithium-air, which uses oxygen from the atmosphere as the [cathode] and is significantly less hazardous than those described above. “It’s still in the early stages,” he said, “but there’s a worldwide effort in making it a practical battery.”

Ultimately, we’ll have to wait for the results of Boeing’s field tests to know exactly what happened. But I think it’s important we not put this down in the record books as a fundamental flaw in lithium battery technology. There are loads of researchers in the world, and several at Northeastern, all figuring out ways to make safe energy-efficiency a tangible goal.

 

Categories : Uncategorized

Data Mining in a Complex World

By bironje
Tuesday, January 29th, 2013

 

Yizhou Sun

Gold mining requires a cer­tain amount of patience: For example, you would have to sift through about 300 tons of earth and rock to come up with enough of the pre­cious metal to make a single wed­ding ring. Data mining is sim­ilar. Every day, ter­abytes of data accu­mu­late in the tech­nology that society has come to rely on. But turning that chaotic mess of zeros and ones into mean­ingful knowl­edge can be a com­plex math­e­mat­ical challenge.

Typ­i­cally, researchers try to sim­plify this chal­lenge by lim­iting the scope of their ques­tions. But Yizhou Sun, a newly appointed assis­tant pro­fessor in the Col­lege of Com­puter and Infor­ma­tion Sci­ence, believes that making useful pre­dic­tions and infer­ences with new data requires us to account for its complexity.

“My phi­los­ophy is that in the real world, objects are con­nected together but those objects belong to dif­ferent types,” she said, pointing to humans, build­ings, and dig­ital devices as exam­ples “Even with humans we can still iden­tify dif­ferent groups.”

Instead of looking at two-dimensional rela­tion­ships in an iso­lated system, her approach brings together a series of com­plex algo­rithms that simul­ta­ne­ously address objects from mul­tiple domains and their inter­ac­tions in a much bigger, real-world envi­ron­ment. She has used the method to probe social net­works like Flickr and Twitter for sim­i­lar­i­ties and patterns.

As a grad­uate stu­dent at the Uni­ver­sity of Illi­nois at Urbana-Champaign, Sun took on the task of mining the Dig­ital Bib­li­og­raphy & Library Project’s dataset of com­puter sci­ence pub­li­ca­tions. Her hope was to unearth some inter­esting and unex­pected pat­terns, which she did.

She found that a researcher’s social con­nect­ed­ness was the most impor­tant factor for deter­mining whom he would col­lab­o­rate with in the future. She also found, thank­fully, that social con­nec­tions did not figure very highly in a researcher’s citations.

But per­haps most impor­tant, Sun found that her ques­tions were always more com­pli­cated than she had expected. For instance, auto­mat­i­cally iden­ti­fying the most highly ranked authors in the DBLP dataset might require exam­ining the ranking of the con­fer­ences they attended. But that requires auto­mat­i­cally iden­ti­fying con­fer­ence ranking, which depends on the ranking of the authors in attendance.

The problem was that the data in ques­tion make up a com­plex, het­ero­ge­neous net­work wherein each piece affects every other. If Sun wanted to trust the prod­ucts of her algo­rithm, she was going to have to under­stand the net­work it acted upon.

Sun made it her life’s work to under­stand and then design strate­gies for exam­ining het­ero­ge­neous net­works. Last year, she pub­lished the sem­inal book on the matter, Mining Het­ero­ge­neous Infor­ma­tion Net­works: Prin­ci­ples and Method­olo­gies.

The impli­ca­tions for Sun’s work are vast. In order to take advan­tage of the ter­abytes of data now describing our world, we must under­stand the com­plex net­works of which they are a part. “In the real world, there are so many dif­ferent types of objects that interact with each other,” said Sun. “The real world system can be viewed as gigantic het­ero­ge­neous infor­ma­tion network.”

Categories : Uncategorized

Sinister Code-Breakers, Beware

By bironje
Wednesday, January 23rd, 2013
Vladimir Torchilin

In the early– to mid-20th cen­tury, gov­ern­ments com­monly used cryp­tog­raphy to encrypt top-secret mes­sages or mil­i­tary com­mu­ni­ca­tions. But now that the com­puter and Internet age has evolved to a point where smart­phones and tablets are readily avail­able at our fin­ger­tips, its use has become much more wide­spread to meet the chal­lenges of the 21st cen­tury, according to Daniel Wichs, a newly appointed assis­tant pro­fessor in the Col­lege of Com­puter and Infor­ma­tion Sci­ence.

“Cryp­tog­raphy is being used every day, but people prob­ably don’t even notice it,” Wichs said. “Whether you’re using Gmail or log­ging on to a site from your mobile phone, cryp­tog­raphy is there making sure others aren’t able to see the data you’re sending and receiving.”

His interest in the field of cryp­tog­raphy blos­somed as an under­grad­uate studying math­e­matics and com­puter sci­ence at Stan­ford Uni­ver­sity. The sub­ject, he said, allowed him to apply com­plex math­e­matics with seem­ingly scant prac­tical appli­ca­tions to solve real-world com­puter sci­ence prob­lems related to security.

Wichs earned his doc­torate from New York Uni­ver­sity in 2011 and later served as a Josef Raviv Memo­rial Post­doc­toral Fellow at IBM before arriving at North­eastern this fall.

Wichs has noticed major changes in the field within the last few years. The mas­sive expan­sion of cryp­tog­raphy work, for example, means researchers have to be much more focused on how out­side forces, like hackers or for­eign gov­ern­ments, try to break through encrypted sys­tems or exploit unknown weaknesses.

In par­tic­ular, his work focuses in part on what are called “side-channel attacks,” in which third par­ties try to learn about an encrypted system by mea­suring infor­ma­tion like how long a com­puter process takes or how much elec­tricity is used by a given calculation.

“You can learn a lot of infor­ma­tion just from these seemingly-meaningless details, so cryp­tog­raphy sys­tems are starting to take them into account too by securing not just the data but also the com­puting system itself,” Wichs said.

He noted that he is fas­ci­nated with cryp­tog­raphy because it merges theory and prac­tical appli­ca­tions in ways that are seldom found in many fields of research.

“It’s a really cool set of prob­lems you’re facing,” he said. “How do you make sure data—which is a key part of nearly every com­po­nent of our lives today—is secured?”

But per­haps the most impor­tant thing about cryp­tog­raphy research, Wichs said, is that the more time pro­fes­sionals spend working to pro­tect crit­ical data and sys­tems, the less time the public should spend wor­rying about per­sonal infor­ma­tion breaches.

“If cryp­tog­ra­phers do their job, you don’t have to think about it all that much,” Wichs said. “It’s our goal to make sure these crit­ical stan­dards and pro­to­cols are in place.”

Categories : Uncategorized

Validation for Flu Prediction

By bironje
Monday, January 7th, 2013
Alex Vespignani

In 2009, the H1N1 virus slipped into the blood­streams of more than 40 mil­lion people around the world. In just four months, it killed more than 14,000 indi­vid­uals as it trav­eled from Mexico to India on its most favored vehicle: humans. As trav­elers moved about the planet via air­planes and cars, the pathogen fol­lowed, cre­ating an epi­demic the likes of which had not been seen since the 1970s.

At the time, Alessandro Vespig­nani was at the Uni­ver­sity of Indiana, where he began tracking the dis­ease with as much atten­tion as the Cen­ters for Dis­ease Con­trol. Vespignani—now the Stern­berg Family Dis­tin­guished Uni­ver­sity Pro­fessor of physics, com­puter sci­ence, and health sci­ences at North­eastern University—and his research team built a com­pu­ta­tional model called GLEAM, or Global Epi­demic and Mobility Model, which they used to pre­dict the out­breaks as they sur­faced around the globe.

In the last three years, the team has been tire­lessly working to val­i­date its pre­dic­tions. To that end, its recently pub­lished article in the journal BMC Med­i­cine offers defin­i­tive proof of a strong agree­ment between the pre­dic­tions and the real-life sur­veil­lance data col­lected in 2009.

“Although we knew the pre­dic­tion of the model were in pretty good agree­ment in sev­eral places of the world,” said Vespig­nani, “here we pro­duce a very exten­sive val­i­da­tion on more than 45 countries.”

To model dis­ease spreading, GLEAM inte­grates three data “layers.” The first uses a pop­u­la­tion data­base, which was devel­oped by a team at Columbia Uni­ver­sity and pro­vides a high-resolution pop­u­la­tion den­sity map of the entire planet. The second uses local com­muting flows and air­line trans­porta­tion data­bases to esti­mate human mobility within and between coun­tries, respec­tively. Finally, an epi­demic layer accounts for the behavior of the dis­ease itself, including infor­ma­tion such has incu­ba­tion and trans­mis­sion times.

Oper­ating from within the prover­bial eye of the storm in 2009, the team used the model to fore­cast the week of the epidemic’s peak in 48 coun­tries in the Northern Hemi­sphere. In 42 of these coun­tries, the fore­casts were directly on target; in the other five, the team’s pre­dic­tions were off by only one to two weeks.

Nor­mally, flu season peaks months after H1N1 did, making even the two-week vari­a­tion a con­sid­er­ably good result. “This is the first large-scale val­i­da­tion of a com­pu­ta­tional model that pulled out pre­dic­tions in real time,” said Vespig­nani. “It shows that com­pu­ta­tional models have acquired the matu­rity to pro­vide useful infor­ma­tion and at the same time points out the way on how to improve and develop better models and tools.”

Categories : Uncategorized

Northeastern Algorithm Speeds Assembly of Jet’s Safety Systems

By bironje
Thursday, January 3rd, 2013
Pete Manolios

Asso­ciate pro­fessor Pete Mano­lios and grad­uate stu­dent Vasilis Papavasileiou of the Col­lege of Com­puter and Infor­ma­tion Sci­ence have designed a constraint-based algo­rithm capable of assem­bling the safety-critical sys­tems in the Boeing 787 Dream­liner jet air­plane in less than 10 minutes.

The project—backed by a five-year, $1.5 mil­lion grant from the National Aero­nau­tics and Space Admin­is­tra­tion and a three-year, $478,000 con­tract from The Boeing Company—dovetails with Northeastern’s focus on use-inspired research that solves global chal­lenges in health, secu­rity, and sustainability.

The beauty of the algo­rithm lies in its ability to rapidly solve dif­fi­cult real-time com­mu­ni­ca­tion prob­lems arising from the inter­ac­tion of safety-critical com­po­nents, such as black boxes, nav­i­ga­tion sen­sors, collision-detection algo­rithms, and con­trol systems.

“Our system is quicker and more cost-effective, but it also opens up a whole new realm of pos­si­bil­i­ties in terms of building optimal and effi­cient sys­tems that prop­erly uti­lize resources,” Mano­lios explained. “One major problem with building a system man­u­ally is that you cannot deeply ana­lyze it to foresee the long-term con­se­quences of your decisions.”

Mano­lios show­cased the algo­rithm in Utah at the 23rd Inter­na­tional Con­fer­ence on Com­puter Aided Ver­i­fi­ca­tion. Auto industry rep­re­sen­ta­tives at the con­fer­ence expressed interest in using the math­e­mat­ical tools to solve com­mu­ni­ca­tion prob­lems within cars, whose nav­i­ga­tion and con­trol sys­tems mirror those of airplanes.

The long-term goal of the project, Mano­lios noted, is to com­mer­cialize the algo­rithm for use in the pro­duc­tion of smart grids, secure net­works, and other land, sea, and air vehicles.

“This can be used in every industry where you need to assemble some­thing,” said John Chilenski, an asso­ciate tech­nical fellow for Boeing Com­mer­cial Air­planes. “We’ve also used it for solving wiring allo­ca­tion prob­lems in the Dream­liner but I could even see it being used in nuclear chem­istry to design new materials.”

Categories : Uncategorized

Technology at the Dinner Table

By bironje
Wednesday, January 2nd, 2013

Andrea Grimes Parker

Andrea Parker, a newly appointed assis­tant pro­fessor of per­sonal health infor­matics and human-computer inter­ac­tion, believes in the power of using tech­nology to pro­mote health and well­ness among low-income minority populations.

“Tech­no­log­ical inno­va­tions in health have the ability to facil­i­tate col­lec­tive mobi­liza­tion and sup­port behavior change in a great number of people,” she explained.

Parker’s exten­sive body of research bears this out: in 2009, for example, she designed a mobile game called OrderUp! in which a dozen low-income African-Americans in a south­west Atlanta com­mu­nity assumed the role of a server in a neigh­bor­hood restau­rant. The goal of the game, Parker said, was for par­tic­i­pants to serve their vir­tual cus­tomers as quickly and health­fully as possible.

In a paper on the health impact of playing mobile games, Parker revealed that OrderUP! shifted user per­cep­tion of what con­sti­tutes a healthy meal. The fun and easy-to-play game, she wrote, “helped par­tic­i­pants learn more about eating healthfully.”

Users, she added, “started to reassess their own behav­iors and began to see how they could make and eat healthier foods themselves.”

For another research project, Parker designed an appli­ca­tion that allowed some 40 mem­bers of the south­west Atlanta com­mu­nity to share text mes­sages doc­u­menting their eating habits. The mes­sages, she said, were visu­al­ized on a large touch screen dis­play appli­ca­tion installed in a local YMCA.

At the end of an exten­sive three-month study, Parker found that par­tic­i­pants had come to think of them­selves as com­mu­nity health advo­cates. “These kinds of tech­nolo­gies are not just helping people change their own habits, but they are also devel­oping par­tic­i­pants’ iden­ti­ties as advo­cates for change,” she explained. “It’s exciting to think about the influ­ence these people could have on their social networks.”

Prior to joining the North­eastern fac­ulty, Parker served as a post­doc­toral fellow in the Everyday Com­puting Lab at the Georgia Insti­tute of Tech­nology. She earned her doc­torate in human-centered com­puting from Georgia Tech in 2011 and her bachelor’s degree in com­puter sci­ence from North­eastern in 2005

“I feel like I’m coming home,” Parker said. “It’s def­i­nitely an honor and a priv­i­lege to be a pro­fessor where I began my aca­d­emic career.”

Parker will hold joint appoint­ments in the Bouvé Col­lege of Health Sci­ences and the Col­lege of Com­puter and Infor­ma­tion Sci­ence. She hopes to uti­lize her inter­dis­ci­pli­nary exper­tise, she said, to tackle urban health research projects in Boston’s Rox­bury and Jamaica Plain neighborhoods.

“I have a real pas­sion for helping the under­served and under­standing why these pop­u­la­tions dis­pro­por­tion­ately expe­ri­ence dis­ease,” Parker explained, noting her interest in col­lab­o­rating on long-term field studies with Elmer Freeman, director of urban health pro­grams in Bouvé.

By bringing the world of com­puter sci­ence to life through fun and engaging class­room lec­turers, on the other hand, Parker hopes to expose stu­dents to the vast pos­si­bil­i­ties of an ever-expanding field of research.

“I want to help stu­dents under­stand how to design sys­tems that can mesh with people’s values and con­nect with them on an emo­tional level,” she said.

Categories : Uncategorized

Serious Games People Play

By bironje
Wednesday, December 19th, 2012

It’s game on at Northeastern’s new Playable Innovative Technologies (PLAIT, “Play It”) Lab. Combining expertise in art, design, computer and social sciences, engineering, and business from every college in the university, PLAIT represents a building movement in video-game design—one that will change the way we learn, train, and educate.

And it’s a field that has the attention of Washington. Last year, Secretary of Education Arne Duncan launched the “Digital Promise Initiative,” a national center created by Congress to advance technologies that transform teaching and learning. In addition, the White House tapped Constance Steinkuehler Squire, noted game-design expert, to become senior policy analyst in the White House Office of Science and Technology Policy.

Approximately 55 percent of the population plays video games, Squire says, and partnerships between academia and industry are crucial in developing games that will change the face of education.

To that end, Northeastern’s Magy Seif El-Nasr, an associate professor with dual appointments in the College of Arts, Media, and Design and the College of Computer and Information Science, was invited to the White House in July to consult at the Academic Consortium on Games for Impact. She was one of only 20 academic experts nationwide invited to do so.

Experts from industry, the National Science Foundation, National Institutes of Health, and the MacArthur and other foundations discussed strategies for building interdisciplinary collaboration in the serious-game industry.

“We need more people who design entertainment games professionally to get into this market,” says Seif El-Nasr, “and we need to partner academics with funding agencies so that we can push the frontier of academic research in serious games.”

With the establishment of the PLAIT Lab, eight combined game-design and interactive-media undergraduate degree programs, and a masters and doctorate in development, the university promises to play a leading role in bridging those arenas and advancing the field.

Why Gaming?

The idea that games can teach is not a new concept. Chess and the Chinese board game Go, for instance, have been used to practice conflict strategy and tactics for thousands of years.

Today’s digital descendants have already shown promise in crisis management, improving healthcare outcomes, and military training. They’ve also been used to harness the power of crowdsourcing to solve intricate scientific problems. Northeastern’s faculty experts believe games can do even more to address national challenges in health, education, and security.

Games Making an Impact

Take Seif El-Nasr’s research and game-design efforts, which will soon bear fruit. She has partnered with Vancouver-based IgnitePlay to fight obesity using real-time behavior tracking. She is collaborating with Bardia Aghabeigi, a PhD student in the College of Computer and Information Science, and with Mariya Shiyko, assistant professor of counseling and applied educational psychology, and Carmen Sceppa, associate professor of health science, both from Bouvé College of Health Sciences.

“It’s a platform to understand nutrition and adopt healthier behavior through exercise by using games as a motivation tactic for behavior change,” Seif El-Nasr says.

Anyone can play this online social-media game, but it’s targeted to women 30 to 50 years old. Users will track food and exercise and compare their progress against friends’. Users will also be able to set goals, or “quests,” for themselves, such as walking 10 minutes every day for the next 10 days, and get rewards for achieving such quests.

In addition to helping attack the national obesity problem, Seif El-Nasr is eager to evaluate the user data that will be generated to assess how and if the research tactics have the intended impact.

She also directs the Games User Experience and Research Lab at Northeastern, which consists of multidisciplinary research teams of graduate and undergraduate students developing new interaction techniques, or game mechanics, for healthcare and education games. In addition, they research and analyze data from game-user interactions to help create games with greater impact.

“For example, if we can understand users’ behaviors and feelings with a game like the IgnitePlay one, then we can increase the value of the game on health outcomes,” she says. “‘Remission’ is one such example, which has helped young people understand their cancer and increase their adherence to treatment meds in some cases.”

Casper Harteveld, who joined Northeastern this fall from the Delft University of Technology (The Netherlands) as assistant professor of art and design in the College of Arts, Media, and Design, integrates theories from organization science, psychology, and gaming into his research. He has collaborated with Dutch governing bodies responsible for levee maintenance on a game called Levee Patroller. He describes the crisis-management game as an example of “sense gaming”—games that let users prepare for disasters or situations that don’t occur often.

In his game, players deal with disastrous levee failures in The Netherlands, which occur only once every 100 years or so. Players have to make sense of the failures by first finding them and then reporting their observations, assessing and diagnosing the situation, and taking action if necessary.

“This type of serious game confronts players with certain phenomena and offers the tools to help them make sense of these phenomena,” he says. “With ‘Levee Patroller,’ it’s about failures; with another game, it might be training doctors to deal with rare diseases or unusual medical complications.”

The Right Mix

It’s not enough, though, to create a cool-looking game. Users must want to play while they’re learning a new skill or changing a behavior, and that’s what’s driving game-user research, analytics, and advances in the serious-games model. It’s also why programmers, engineers, and artists are only part of the design picture, and why it must also include experts in various subject domains. It takes an interdisciplinary village to create an effective video game.

Toward that goal, Harteveld uses a three-pillar model that he calls triadic game design. A game needs subject-matter experts to provide valid criteria (reality); storytellers or teachers to provide strategies and purpose (meaning); and programmers and artists to create an immersive, fun, engaging world (play).

Gillian Smith, assistant professor in the College of Arts, Media, and Design with a joint appointment in the College of Computer and Information Science, joined Northeastern from the University of California, Santa Cruz because of that very collaborative culture. “In game design, you need artists to be able to communicate with engineers, and engineers to be able to communicate with designers,” she says. “In the case of games for impact, we need to communicate with experts in health and education. Northeastern has that diversity of expertise.”

Seif El-Nasr, an international authority on digital-game research, embodies the multiple-discipline ethos. She earned graduate and undergraduate degrees in computer science, worked as a graphic designer, and took psychology courses to understand emotions. For other ways of expressing behavior, she took years of acting to be able to incorporate theater techniques in building better systems. She is currently working with Matthew Gray, assistant professor in the theater department, and with Derek Isaacowitz, associate psychology professor in the College of Science, to develop methodologies to evaluate emotion modulation and attention for use in game design.

In January, Northeastern will add even more firepower to its game-design movement. Two renowned international research experts will join the team as associate professors in the College of Arts, Media, and Design: Alessandro Canossa, who will focus on game design, psychology of play, and game-user research, and Anders Drachen, with expertise in game analytics and game-user research.

The PLAIT Lab gives Northeastern impressive momentum in this emerging field. “In the next several years, as a result of our interdisciplinary collaboration, we’ll be seeing innovative games addressing a variety of domains come out of the lab, as well as an improved understanding of how people learn through games and the technologies that make it easier to create games and interpret data coming from them,” says Smith.

Northeastern has built-in advantages that give the university an edge, says Harteveld: the culture of collaborative, interdisciplinary research, the graduate-campus system that’s expanding industry connections, and experiential learning, which gets students deeply involved in game design.

Above all is the need for innovative, relevant, and rigorous research, which is a principal mission of the PLAIT Lab.

“Serious-game design, once it matures a little more, could have a pervasive effect, transforming educational research and bringing new insights into how we learn. And because of our momentum, Northeastern can become a world player,” says Harteveld.

Categories : Uncategorized
« Previous Page
Next Page »
Northeastern University
  • My NEU
  • Find Faculty & Staff
  • Find A – Z
  • Emergency Information
  • Search

360 Huntington Ave. Boston, Massachusetts 02115 • 1 (617) 373-2000

© 2013 Northeastern University

  • twitter
  • facebook
  • youtube