64
MEETING Minds Undergraduate Research Symposium OF THE

Meeting of the Minds, 2013

Embed Size (px)

DESCRIPTION

Meeting of the minds is an annual symposium at Carnegie Mellon University that givesstudents an opportunity to present their research and project work to a wide audienceof faculty, fellow students, family members, industry representatives and the largercommunity. Students use posters, videos and other visual aides to present their workin a manner that can be easily understood by both experts and non experts.Through this experience, students learn how to brindege the gap between conductingresearch and presenting it to a wider audience. A review committee consistingof industry experts and faculty members from other universities will review thepresentations and choose the best projects and posters. Awards and certificates arepresented to the winners.

Citation preview

Page 1: Meeting of the Minds, 2013

M E E T I N G

MindsU n d e r g r a d u a t eR e s e a rc h S y m p o s i u m

OFTHE

Page 2: Meeting of the Minds, 2013
Page 3: Meeting of the Minds, 2013

Meeting of the minds is an annual symposium at Carnegie Mellon University that gives

students an opportunity to present their research and project work to a wide audience

of faculty, fellow students, family members, industry representatives and the larger

community. Students use posters, videos and other visual aides to present their work

in a manner that can be easily understood by both experts and non experts.

Through this experience, students learn how to brindege the gap between conducting

research and presenting it to a wider audience. A review committee consisting

of industry experts and faculty members from other universities will review the

presentations and choose the best projects and posters. Awards and certificates are

presented to the winners.

Page 4: Meeting of the Minds, 2013
Page 5: Meeting of the Minds, 2013

Table of Contents

POSTER # TITLE

PAGE

Biological Science Posters Q1 Adherence of Pathogenic Fungi From the Qatari Clinical Setting 1

Q2 BiofilmFormationofPathogenicFungiIsolatedatHamadHospital 3

Q3 CharacterizingtheMorphologyofPathogenicFungiIsoloatedintheQatariHospitalSetting 5

Q4 DetectionofGeneticallyModifiedOrganismsinFoodProducts 7

Business Administration Posters Q5 InvestigationofLegal&RegulatoryObstaclestoBecominganEntrepreneurinQatar 9

Q6 Home-BasedBusiness:AGrowingPhenomenon 11

Computer Science Posters Q7 AnAuthorizationModelfortheWebProgrammingLanguageQwel 13

Q8 ArabicAccentedFacialExpressionsfora3DAgent 15

Q9 CMUQOfficialAndroidApp 17

Q10 InteractionAnalysisofMulti-lingualRobotReceptionist 19

Q11 IwantmyMommy 21

Q12 SemioticCircles:AnInclusiveMethodologyforHumanComputerInteractionDesign 23

Q13 Multi-RobotCoordination 25

Q14 TowardsComputationalOffloadinginMobileClouds 27

Q15 PyExoPlanets:AComputedApplicationforDetectingExoplanets’Transits

onStars’LightCurves 29

Q16 UnsupervisedWordSegmentationandStatisticalMachineTranslation 31

Information Systems Posters Q17 WhatAffectsStudents’Acceptance&UseofTechnology? 33

Q18 SoftwareDevelopmentProjectElectronicResolution 35

Q19 Privacyande-commerceintheArabCulture 37

Q20 TheEffectoftypeofDisplayonConjointStudies 39

General Education Posters Q21 ArabSpringNewspaperCoverage 41

Q22 LettheGradesFlow! 43

Post-Graduate Posters QG1 DecentralizedExecutionofMultisetRewritingRulesofEnsembles 45

QG2 ClusterLoc:ExploitingShortRangeWirelessTechnologiesforEnergyEfficientLocalization 47

QG3 CharacterizationofMapReduceApplicationsonPrivateandPublicCloudPlatforms 49

QG4 TheQALBProject:BuildingResourcesandSystemsfortheAutomaticCorrectionofArabicText51

QG5 Type-BasedProductivityofStreamDefinitions 53

Page 6: Meeting of the Minds, 2013
Page 7: Meeting of the Minds, 2013

Tuesday,April30,2013,4:00pm-6:00pmCARNEGIEMELLONUNIvERSITy,EDUCATIONCITy

Page 8: Meeting of the Minds, 2013

Adherence of Pathogenic Fungi from the Qatari Clinical Setting

AuthorMei ElGindi (BS 2013)

Faculty AdvisorJonathan Finkel, Ph.D.

CategoryBiological Sciences

AbstractFungalinfectionsarebecomingamajorsourceofsecondaryinfectionsintheclinicalsetting,fordiabeticsand

forimmunecompromisedindividuals.Themajorityofinfectionsarethoughttobetheconsequenceofthe

fungi’sabilitytoformamicrocommunityofcellsactinginconcertasabiofilm,whichcanformonthesurface

ofmedicallyimplanteddevices.Thebiofilmissurroundedbyanextracellularmatrixresultinginresistance

toantifungaldrugs.Each funguspresents itself inadifferent form inside thehost.From themorphology

of thespecies, to thesymptomsthat theycause,every fungus isdistinct.Therefore, it iscritical tostudy

thesefungianddeterminethecharacteristicstheypresent.Thiswillhelpbetteridentifythespecificfungus

infectingthepatientandwillallowforafasterandmoreprecisetreatment.Thefirststepofbiofilmformation

isadherenceof yeastcells toa surface.Tobetterunderstand thedifferencesbetweenvariousstrainsof

pathogenicfungi,weexaminedtheadherenceofpatientstrainsobtainedfromHamadMedicalCorporation.

ThesefungiincludeCandida spp., Trichosporon spp., and Geotrichum spp.Theadherenceofthedifferent

specieswasdeterminedusinganestablishedadherenceassaythatmeasuresthespecificadherencewithin

asinglespecies.Thisdifferenceinadherencewasalsousedtodetectanydifferencesinadherencedueto

thesiteofinfection.

1

Page 9: Meeting of the Minds, 2013

Adherence of Pathogenic Fungi from the Qatari Clinical Setting Mei ElGindi and Jonathan S. Finkel Ph.D.

Department of Biological Sciences, Carnegie Mellon University Qatar

Abstract

Fungal infections are becoming a major source of secondary infections in the clinical setting, for diabetics and for immune compromised individuals. The majority of infections are thought to be the consequence of the fungi’s ability to form a microcommunity of cells acting in concert as a biofilms, which can form on the surface of medically implanted devices. The biofilm is surrounded by an extracellular matrix resulting in resistance to antifungal drugs. Each fungus presents itself in a different form inside the host. From the morphology of the species, to the symptoms that they cause, every fungus is distinct. Therefore, it is critical to study these fungi and determine the characteristics they present. This will help better identify the specific fungus infecting the patient and will allow for a faster and more precise treatment. The first step of biofilm formation is adherence of yeast cells to a surface. To better understand the differences between various strains of pathogenic fungi, we examined the adherence of patient strains obtained from Hamad Medical Corporation. These fungi include Candida spp., Trichosporon spp., and Geotrichum spp. The adherence of the different species was determined using an established adherence assay that measures the specific adherence within a single species. This difference in adherence was also used to detect any differences in adherence due to the site of infection.

Steps of Biofilm Development In the first step, yeast form cells adhere to the substrate. Following this, the cells divide and multiply. In the third step, the biofilm enlarges with an increased number of yeast cells, hyphal cells, and extracellular matrix that envelops the biofilm. Finally, the yeast cells are dispersed to further colonize the surrounding environment or host.

After 30 Minutes

Fluxion 200 Bioflux Machine

² Contains an embedded micron-scale fluidic channel

² Allows for control of the flow across the channel

² Adhesion can be visualized and studied

http://www.fluxionbio.com/

Methods ² Overnight  cultures  grown  in  YPD  (rich  growth  media)  are  diluted  to  OD600  =  0.2 ² The cell are added to the well at a flow rate of 3 dyn/cm3

² Cells are allowed to adhere under flow for 30 minutes ² Four images are taken in each well ² These images are analyzed and the number of adhered cells are counted

and compared to a wild type laboratory strain

Acknowledgments We would like to thank the members of the lab for their assistance – Dr. Annette Vincent, Dr. Kenneth Hovis, Ridin Balakrishnan, Raji Katibe. This project was generously funded by Carnegie Mellon University Qatar and Qatar Foundation

0  

0.2  

0.4  

0.6  

0.8  

1  

1.2  

CA   CD   CT   TA   TD   CP  

Adherence of Different Wild Type Clinical Strains

CA = Candida albicans CD = Candida dubliniensis CT = Candida tropicalis TA = Trichosporon asahii TD = Trichosporon dohaense CP = Candida parapsilosis

0  

0.5  

1  

1.5  

2  

2.5  

 CAS  

CAp1   CAp2   CAp3   CAp4   CAp5   CAp6   CAp7   CAp8   CAp9   CAp10  

Adherence of Different Candida albicans Patient Strains

CAS = Candida albicans wild type Strain CAp = Candida albicans Patient Strain

0  

0.2  

0.4  

0.6  

0.8  

1  

1.2  

1.4  

1.6  

 CDS  

CDp1   CDp2   CDp3   CDp4   CDp5   CDp6   CDp7   CDp8   CDp9   CDp10   CDp11   CDp12   CDp13  

Adherence of different Candida dubliniensis Patient Strains

CDS = Candida dubliniensis wild type Strain CDp = Candida dubliniensis Patient Strain  

Conclusions ² Adherence corresponds to approximate occurrence in the clinical settings ² Qatar patient strains were isolated from the lungs of Cystic Fibrosis patients, with C.

dubliniensis being the most prevalently identified fungi ² The Cystic Fibrosis fungal species showed varying degrees of adherence, indicating

that this ability may not be required for fungal lung pathogenicity

Page 10: Meeting of the Minds, 2013

Biofilm Formation of Pathogenic Fungi Isolated at Hamad Hospital

AuthorRaji Katibe (BS 2013)

Faculty AdvisorJonathan Finkel, Ph.D.

CategoryBiological Sciences

Abstract:Infectionbypathogenicfungihasa30%mortalityrateintheUnitedStatesalone.Furthermore,fungalinfec-

tionscost theU.S.healthcaresystemaround2.6billiondollarsannually. InQatar,continuousambulatory

peritonealdialysisfungalinfectionsoccurinupto16%ofallpatients.Theformationofbiofilmsoncatheter,

artificialjointsandartificialheartvalvesisacauseofsystemicinfectioninthepatients.Moreover,theresult

ofthebiofilmformationmaybefatalinfections.Manypathogenicyeasthavetheabilitytoformbiofilm,where

theyformcoloniesandattachtoorganicandnon-organicsurfaces.Theresearchdescribedbelowfocused

onbiofilmformationofthreepathogenicfungispecies:Trichosporonspp.,Candidaspp.,andGeotrichum

spp.isolatedfrompatientsatHamadMedicalCenter(HMC).Biofilmformationusuallyoccursinfoursteps.

First, intheadhesionstep,yeastcellsadheretoasurface,then,intheinitiationstep,theyeastcellsstart

proliferatingandswitchmorphologytoelongatedfilamentscalledhyphae.Inthethirdstep,yeastandhyphal

cellsproliferateandextracellularmatrixisformed.Finally,inthedispersalstep,yeastcellsaredispersedfrom

thebiofilmtofurtherinfectotherareasofthebody.Biofilmformationwasassayedbyallowingfungitoform

biofilminconditionssimilartothehumanbody.Webeganbyisolatingthespeciesthathavetheabilitytoform

biofilmsfromHamadHospital.Then,westudiedthebiofilmsbycomparingthebiofilmsformedbydifferent

species.Wealsocomparedthebiofilmformedbythesamespeciesindifferentlocationsofinfection.

3

Page 11: Meeting of the Minds, 2013

Abstract  

Conclusions  

Biofilm Formation of Pathogenic Fungi isolated at Hamad Hospital

  Infec'on   by   pathogenic   fungi   has   a   30%  mortality   rate   in   the  United   States   alone.  Furthermore,   fungal   infec'ons   cost   the   US   healthcare   around   2.6   billion   dollars  annually.   In  Qatar,  pa'ents  suffering   from  con'nuous  ambulatory  peritoneal  dialysis  fungal   infec'ons   occurs   in   up   to   16%   of   all   pa'ents.   The   forma'on   of   biofilms   on  catheter,  ar'ficial   joints  and  ar'ficial  heart  valves   is  a   cause  of   systemic   infec'on   in  the   pa'ents.  Moreover,   the   result   of   the   biofilm   forma'on  may   be   fatal   infec'ons.  Many  pathogenic  yeast  have  the  ability  to  form  biofilms  that  they  use  to  form  colonies  and  aIach  to  organic  and  non-­‐organic  surfaces.  The  research  described  below  focused  on   biofilm   forma'on   of   three   pathogenic   fungi   species:   Trichosporon   spp.,   Candida  spp.,   and  Geotrichum  spp.     isolated   from  pa'ents  at  Hamad  Medical  Center   (HMC).  Biofilm   forma'on  usually  occurs   in   four   steps.   First   in   the  adhesion   step,   yeast   cells  adhere   to   a   surface.   Next   in   the   ini'a'on   step,   the   yeast   starts   prolifera'ng   and  switch  morphology  to  elongated  filaments  called  hyphae.  In  the  third  step,  yeast  and  hyphal   cells   proliferate   and   extracellular   matrix   is   formed.   Finally,   in   the   dispersal  step,   yeast   cells   are   dispersed   from   the   biofilm   to   further   infect   other   areas   of   the  host.  Biofilm  forma'on  was  assayed  by  allowing   fungi   to   form  biofilms   in  condi'ons  similar   to   the   human   body.  We   began   by   observing   for   biofilm   forma'on   in   fungal    species   collected   from   Hamad   Medical   Center.   Then,   we   studied   the   biofilms   by  comparing   the   biofilms   formed   by   different   species.  We   also   compared   the   biofilm  formed  by  the  same  species  in  different  loca'ons  of  infec'on.    

The  Steps  of  Biofilm  Development  

Dr  Jonathan  Finkel  “Adherence  and  biofilm  forma'on  of  pathogenic  fungi  from  the  Qatari  clinical  seZng”  

Methods  The   different   fungal   species   were   incubated   in   wells   containing   silicon   squares.   The  samples   were   then   incubated   at   37oC   to   allow   the   cells   to   adhere   to   the   silicon  squares.   A^er   90   minutes   the   squares   were   washed   with   1X   PBS   and   incubated   in  RPMI   for   48   hours   to   allow   the   biofilm   forma'on.   RPMI   is   a   media   that   allows   for  biofilm   forma'on   in   many   fungal   species.   The   biofilms   formed   on   the   squares   are  analyzed  and  compared  to  the  different  fungal  species.  The  weight,  height  and  shape  of  the  biofilms  will  be  studied  and  compared  to  the  different  species.  The  biofilms  will  be   studied  under  a   scanning  electron  microscope  and  a   confocal  microscope   so   that  the  structure  and  architecture  of  the  biofilm  can  be  observed.    

Result  

Geotrichum spp.

Adherence Initiation Maturation Dispersal

Adherence Initiation

Extracellular Matrix

Yeast form cells hyphae

Maturation Dispersal

Raji  Ka'be,  and  Jonathan  S.  Finkel  Ph.D.  Department  of  Biological  Sciences  Carnegie  Mellon  University,  Qatar  

1. Add RPMI 2. Add Fungal Cells

Incubate 37oC

90 minutes

1.  Wash  PBS    2.  RPMI  48  hrs    

•  Only  6  out  of  our  9  fungal  samples  were  able  to  form  biofilms  •  C.   glabrata,   C.   parapsilosis  and  C.   tropicalis   failed   to   form  biofilms,  

contrary  to  reports  in  the  literature  •  RPMI  did  not  create  the  biofilms  we  were  hoping  to  see,  the  biofilms  

were  grainy  and  not  uniform  in  some  of  the  samples.  This  will  require  that   we   aIempt   to   observe   biofilms   in   other   condi'ons   such   as  M199,  YPD,  and  Spider  media  

•  Candida  albicans   forms  the   largest  biofilm  of  the  species  examined,  as  expected  

Nega've  Control  

Candida  krusei  

Candida  tropicalis  

Trichosporon  mucoides   Trichosporon  asahii    

Candida  albicans  

Candida  parapsilosis  Candida  glabrata  

Trichosporon  dohaense  

Candida  dubliniensis  

Acknowledgements  I  thank  Dr.  Jonathan  S.  Finkel,  Dr.  AnneIe  Vincent,  Dr.  Kenneth  Hovis,  Maria  Navaro,  Ridin  Balakrishnan,  Mei  ElGindi  for  their  assistance.  I  would  also  like  to   thank   Carnegie   Mellon   University   Qatar   and   Qatar   Founda'on   for   their  generous  funding.    

Adherence Initiation

Trichosporon spp.

arthroconidia

Maturation Dispersal Dispersal

Candida albicans

Future  DirecAons  •  The  weight   and  height  of   the  biofilms   formed  will   be  examined    using  confocal  microscopy    

•  The   structure   and   architecture   of   the   biofilm   will   be   studied  under   a   scanning   electron   microscope,   which   will   provided  detailed  structural  images  

•  Pa'ent   isolates   will   be   compared   to   the   wild   type   laboratory  strains  for  differences  within  species  

•  Pa'ent   isolates   from  Qatar   will   also   be   used   to   determine   any  differences  that  may  occur  within  species  obtained  from  different  sites  of  infec'on  

Page 12: Meeting of the Minds, 2013

Characterizing the Morphology of Pathogenic Fungi Isolated in the Qatari Hospital Setting

AuthorRidin Balakrishnan (BS 2013)

Faculty AdvisorJonathan Finkel, Ph.D.

CategoryBiological Sciences

Abstract:Fungiareopportunisticpathogensthathavetheabilitytocausevarioussuperficialandsystemicinfections.Theirabilitytochangemorphologyisstrategicforvirulenceandbiofilmformation.ThefungalspeciesCandida albicansistheprimarycauseofinvasivefungalinfectionsfromyeasts.Nevertheless,agrowingnumberofnewinfectionsfromnon-albicansCandidaspeciesareincreasinglybeingrecognizedasamajorsourceofinfection,especially inhospitals.Ourstudy focusesonTrichosporon spp., Candida spp. and Geotrichum spp. isolated from patients at the Qatari Hospital, HamadMedical Center. Fungal infections from thesespecieshavebeenontherisesincetheintroductionoftheC.albicans-specificantifungalcaspofungin.Theseinfectionsaremuchmoreprevalentindiabeticsandimmunocompromisedpatients.Inadditiontoincreasingmortalityrates,theseinfectionsalsoresultinincreasedhealthcarecostsandreduceproductivity.Moreover,fungalinfectionscanbecausedbyfungithatnaturallyoccurinthesoilwhichcaneasilygetairborneduringconstructionprojects.GiventhehighprevalenceofdiabeticsinQatarandthecurrentconstructionboom,thestudyoftheseopportunisticfungiinthecontextofQatar’smedicalenvironmentisoftheutmostimportance.Thegoalofthisresearchendeavorwastodetermineandcharacterizethemorphologyofvariouspathogenicfungi isolated in theclinical setting.Specifically,westudied threeareasofdifferences inmorphology: (1) the different species of fungi with regard to pathogenicity, (2) comparison due to the different sites of infection, (3) pathogenic fungi from the same species, but different patients at the Hamad Medical Center.Differenceswerecomparedwith thestock ‘wild-type’ strainsandbetween thedifferent samplesusingphasecontrastmicroscopy.

5

Page 13: Meeting of the Minds, 2013

 C.  albicans      C.  dubliniensis      C.  krusei      C.  tropicalis        C.  parapsilosis      C.  glabrata      T.  mucoides      T.  asahii      T.  dohaense      G.  candidum      G.  capitatum                                    

Abstract  Fungi  are  opportunis.c  pathogens  that  have  the  ability   to  cause  various  superficial  and  systemic   infec.ons.  

Their  ability  to  change  morphology  is  strategic  for  virulence  and  biofilm  forma.on.  The  fungal  species  Candida  

albicans   is   the  primary   cause  of   invasive   fungal   infec.ons   from  yeasts.  Nevertheless,   a   growing  number  of  

new   infec.ons   from   non-­‐albicans   Candida   species   are   increasingly   being   recognized   as   a   major   source   of  

infec.on,  especially   in  hospitals.  Our  study  focuses  on  Trichosporon  spp.,  Candida  spp.  and  Geotrichum  spp.  

isolated   from  pa.ents   at   the  Qatari   Hospital,   Hamad  Medical   Center.   Fungal   infec.ons   from   these   species  

have   been   on   the   rise   since   the   introduc.on   of   the   C.   albicans   specific   an.fungal   caspofungin.   These  

infec.ons  are  much  more  prevalent  in  diabe.cs  and  immunocompromised  pa.ents.  In  addi.on  to  increasing  

mortality  rates,  these  infec.ons  also  result  in  increased  healthcare  costs  and  reduce  produc.vity.  Moreover,  

fungal   infec.ons  can  be  caused  by  fungi  that  naturally  occur  in  the  soil  which  can  easily  get  airborne  during  

construc.on  projects.  Given  the  high  prevalence  of  diabe.cs  in  Qatar  and  the  current  construc.on  boom,  the  

study  of  these  opportunis.c  fungi  in  the  context  of  Qatar’s  medical  environment  is  of  the  utmost  importance.  

The  goal  of  this  research  endeavor  was  to  determine  and  characterize  the  morphology  of  various  pathogenic  

fungi   isolated   in  the  clinical  seJng.  Specifically,  we  studied  differences   in  morphology  based  on  the  various  

species  of  fungi  with  regard  to  pathogenicity.    We  used  pa.ent  strains  commonly  employed  in  the  laboratory  

seJng  as  wild   type  strains.  The  comparisons  were  made   to   iden.fy  any  possible  morphological  differences  

between  strains  and  as  the  basis  for  possible  morphological  architectural  variances  within  biofilms  formed  by  

the  respec.ve  strains.  

 

     

Conclusions    Majority  of   the   fungi  appear   to  have  at   least   two   forms  of  morphologies  (yeast  form  &  filamentous)  as  expected.    The  last  three    fungi  all  had  liQle  to   no   yeast   form   cells.   This   may   be   one   of   the   reasons   that   they   are  observed  less  frequently  in  hospital  seJngs.  The  results  of  this  experiment  have   shown   us     what   to   expect   when   we   look   at   different   pathogenic  forms  in  the  future.  Lastly,  it  has  also  given  us  an  idea  of  what  kind  of  cells  biofilms  will  be  composed  of,  in  the  clinical  seJng.  

Acknowledgments  We  thank  the  members  of  the  lab  for  their  assistance  –Ms.  Maria  Navaro,  Dr.  AnneQe  Vincent,  Dr.  Kenneth  Hovis,  Mei  ElGindi,  Raji  Ka.be.  This  project  was  funded  by  Carnegie  Mellon  University  Qatar  and  Qatar  Founda.on  and  we  thank  them  for  their  generosity.  

Characterizing  the  Morphology  of  Pathogenic  Fungi  Isolated  in  the  Qatari  Hospital  SeAng  

 Ridin  Balakrishnan    Department  of  Biological  Sciences,    Carnegie  Mellon  University-­‐Qatar  

Jonathan  Finkel,  Ph.D.  

Fungal  Species   37oC  32oC  

Methods:                -­‐  Various  Yeast    strains  grown    at    24oC/37oC  for  3-­‐4  hours.  -­‐  YPD  used  to  grow    at  24oC.  -­‐  RPMI/M199  used  to  grow  at  37oC.  -­‐      Thorough  shaking.  -­‐  10  ul  observed  using  phase  contrast  microscopy.  -­‐  Various  morphologies  analyzed.        

3hrs  incuba.on    +  shaking   10  ul  

Phase  Contrast  Microscopy  

Background:                                  Yeast  Form                                                        Pseudohyphal                                                  Hyphal                                              Arthroconidial                                                                                                                  

                               Filamentous    •  The  ability  to  filament  is  essen.al  for  infec.on  by  pathogenic  fungi.  •  The  yeast  form  cells  are  thought  to  be  the  commensal  form  and  used  in  biofilms  to  further  propagate  in  a  host  before  becoming  virulent.  

•  The  fungi  contain  mechanisms  to  switch  between  these  different  forms.      

         

Different  morphologies  of  Yeast  

Page 14: Meeting of the Minds, 2013

Detection of Genetically Modified Organisms in Food Products

AuthorsHiba Al-Ashtal (BS 2013) Hadya Elshakh (BS 2013) Mohammad Younes (BS 2013)

Faculty AdvisorsAnnette Vincent, Ph.D.

CategoryBiological Sciences

Abstract:Geneticallymodifiedorganisms(GMOs),havetheirgeneticmakeupmodifiedtoconferaspecifictraitthat

allowsforanadvantageingrowth.Todate,geneticallymodifiedcorn,soyandcanolaarewidelyavailablein

themarket.AlthoughGMOsarenotgrowninQatar,itisunknownwhetherornotimportedingredientsused

inthemanufactureofvariousfoodproductscontainGMOs.Thepurposeofthisprojectwastodeterminethe

presenceofcornandsoybeaninvariousfoodproducts.ThiswasdoneusingbothDNAandproteinbased

analysis. SingleandmultiplexPCRwereconducted forDNAanalysis, todetect thepresenceofvarious

transgenicmodificationsthatarecommonincornandsoybeans.Themostcommonpromoterandtermina-

tor,Camv35SandNOSrespectivelywere targeted for thesoybean.Furthermore, themostcommonly in-

sertedgenes,namelypatandCP4 EPSPS,werealsotargetedforthesoy.Forthecornthe invertase,pat,bar

andcry9BgenesweretargetedduringPCR,aswellastheCamv35Spromoter.However,thePCRshowed

noapparentindicationofGMOsinanyofthefoodproducts.Fortheprotein-basedanalysis,anELISAwas

usedtodetectthePATand CP4 EPSPSenzymeproductsofthepatandCP4 EPSPStransgenesinGMOs.

AsanELISAisahighlysensitivedetectionmethod,theCP4 EPSPSwasdetectedinallfoodproductsindicat-

ingthepresenceofGMcornandsoybeanintermsoftheCP4 EPSPStransgene.However,thePATenzyme

wasnotdetectedsuggestingthatthepatgenewasnotusedinconstructingtheGMcornandsoyinthe

foodproducts.TheresultsoftheexperimentsuggestthatthefoodproductscontainGMOs,specificallythe

CP4 EPSPStransgenewasusedinproducingGMcornandsoybean.Furtheranalysisneedstobedoneto

confirmtheresults.

7

Page 15: Meeting of the Minds, 2013

Detection of Genetically Modified Organisms in Food Products

Hadya Elshakh Hiba Al-Ashtal Mohammad Younes Annette Vincent, Ph.D [email protected] [email protected] [email protected] [email protected]

Introduction

• GMOs are organism’s whose genetic makeup is altered to confer a desirable trait. Currently, most GMOs are crops that contain growth advantages such as herbicide resistance.

• A cassette with a promoter, transgene, and terminator is inserted into the host genome’s DNA by various methods.

• Soy and corn are the main crops that are genetically modified. Although Qatar does not grow GM crops, it is unknown whether imported ingredients contain GMOs

[1] James, D., Schmidt, A., Wall, E., Green, M., Masri, S. 2003. “Reliable Detection and Identification of Genetically Modified Maize, Soybean, and Canola by Multiplex PCR Analysis”. Journal of Agricultural and Food chemistry. 51: 5829-5838.

http://www.agmrc.org/commodities__products/vegetables/sweet-corn/http://www.hiddensoy.com/soy-health-risks.php

Purpose

• Producing GMOs has been an active area of research since the 1990s.

• Researches have been searching for new methods and advantageous transgenes to make GMOs and enhance crop yield.

• The downfall of GMOs is that a certain modification or spontaneous mutation may produce allergens or other unknown consequences.

• Hence, consumer food products containing GMOs must be labeled. Labeling requires the ability to detect genetic modifications.

• In this study, GM soy and corn were attempted to be detected in food products

http://www.21food.com/products/soya-beans-and-soya-bean-oil-419294.html http://en.wikipedia.org/wiki/Kit_Kat http://www.americansweets.co.uk/quaker-yellow-corn-meal-mix-can-be-used-for-nigellas-spoonbread-680g-625-p.asp

http://www.21food.com/products/corn-curls-processing-line-84301.html Methods • There are two approaches to detect the

presence of GMOs. First, DNA analysis can be conducted to detect the inserted transgene. Second, protein based methods can be used since usually transgenes will encode for a protein

• The Polymerase chain reaction (PCR) is used to amplify a specific DNA sequence such that it can be detected. Multiplex PCR was used as it targets multiple genes for screening within a single reaction.

1. Soy PCR targets: CamV35S promoter, Nos terminator, Lec1, pat, cp4 EPSPS

2. Corn PCR targets: CamV35S promoter, Nos terminator, invertase, bar, cry9b, pat, cp4 EPSPS

• An Enzyme-Linked Immunosorbent Assay (ELISA) was used to detect proteins of interest. PAT and CP4 EPSPS are commonly grown soy crops as they confer resistance to LibertyLink® and Roundup Ready® herbicides respectively.The PAT and CP4 EPSPS enzymes were targeted via a sandwich ELISA.

http://xnet.rrc.mb.ca/davidb/other_nucleic_roles.htm

http://www.leinco.com/sandwich_elisa

Results

• Multiplex PCR was inconclusive, likely due to non optimal conditions such as low DNA concentrations

• Roundup Ready soy grown locally but notlabeled • Could’ve been PAT in KitKat, cornmeal, and crispy curls

chips but it was too processed • Imported ingredients may not be tested for GMOs

Conclusion

Figure 1: Multiplex PCR Gel Electrophoresis Results for Soy and Corn Food Products.

Table 1: ELISA Results for PAT and CP4 EPSPS in Soy and Corn Food Products.

Page 16: Meeting of the Minds, 2013

Investigation of Legal and Regulatory Obstacles to Becoming an Entrepreneur in Qatar

AuthorsChaudry, Anas (BA 2013) Shahid, Raheem (BA 2014)

AdvisorGeorge White, Ph.D.

CategoryBusiness Administration

AbstractTheposterwilldemonstratewhatwehavelearntthroughourresearchonlegalandregulatoryobstaclestobecominganentrepreneur inQatar. Itcontains informationrelatedtowhatwegatheredfromoursurveys,interviewandliteratureresearch.Itisasummaryofwhatwehaveconcludedfromtheresearchandsomebackgroundonthetopic.

Qatar isaprosperousandgrowingnation;andhas recentlybecome the richesteconomy in theworld intermsofGDPpercapita.Ithasopportunitiesforinvestorsandentrepreneurs.However,thereisaconstrainton non-Qatari entrepreneurswhowant to open a newbusiness presented by theQatari ownership law.Thiscouldrestricttheiraspirationsandmanyideascouldbeleftthereinthevoid.Thisresearchexaminedhowtheownershiplawmaydiscouragenon-Qatariownershipandcouldhindereconomicgrowth.Primaryandsecondaryresearchwillbeusedtoanswerthisquestion.Primaryresearchincludedfieldsurveysandsecondaryresearchincludedanevaluationoftheliterature.

Analyzing the graduating class, their aspirations to become entrepreneurs, to become leaders and thechallengestheyfacedandotherstoriesrelatedtostartupsinQatar,wecameupwiththistopic.Furthermore,Qatarvision2030triestoempoweritscitizens,sowewantedtoseewhatlawsexisttoincreaseentrepreneurshipinQatar.TherearemisconceptionsrelatedtoentrepreneurshiplawsoperatinginQatar,whichwewantedtochangeamongstthesociety.Moreover,thisstepwasnecessarybecausealthoughtheinformationisthere,

nocompactsourcecontainingsuchknowledgeispresent,whichcouldbeusefulforaspiringentrepreneurs.

9

Page 17: Meeting of the Minds, 2013

Investigation of Legal and Regulatory Obstacles to Becoming an Entrepreneur in Qatar

How does the ownership law discourages ownership and hinder economic growth in Qatar?

Introduction:

• Qatar is an oil & natural gas based economy •Second highest GDP per capita •Qatar 2030 vision: Business oriented & knowledge based economy •People prefer jobs over entrepreneurship

Problems: •Under ownership Law 13 of 2000, an expat can only own 49% of the business •Amendments to the Law in 2010 allowed 100% ownership in all sectors except banking, insurance and real estate •There is an apparent miscommunication of this law •There are several that an expat is required to go through before completing the process •Therefore, fully owned business becomes difficult for an expatriate

Findings: •25% of the expats did not pursue the business because of the law •70% Qataris did not like the idea of the ownership law •90% expats resented the law

Anas Chaudry Raheem Shahid Advisor: George White

0 1 2 3 4 5 6 7 8 9

Yes No Don't care

Would it be good for the Qatari economy if the government eliminated ownership law?

Methodology

Primary Research

Questionnaires 20 Surveys Entrepreneurs

One-on-one Interviews

12 Interviews of Qatari & Non Qatari

Entrepreneurs

Literature Review

Internet Articles

Government Data

Age Group

• 18 – 40 years

Gender

• Male • Female

Nationalities

• Qataris • Non Qataris

(Including other Arabs)

Research Results: •Incentives are misaligned with entrepreneurship •Mutual agreement of profit sharing •Maturity of the business ecosystem is not present •Helps to retain knowledge in the country •Encourages the expatriates to follow Qatar 2030 vision

Conclusion: •Qatar has taken initiative to become a knowledge based economy with the establishment of Qatar 2030 vision •People face regulatory problems pertaining to entrepreneurship •It will take time for the incentives and the environment to align for the benefit for the entrepreneurs.

Expats 71%

Qataris 16%

Arabs 13%

Population Breakdown

Page 18: Meeting of the Minds, 2013

Home-Based Business: A Growing Phenomenon

AuthorsAbdulrahman Al-Muftah (BA 2013)Maryam Al-Subaie (BA 2013)Maryam Al-Thani (BA 2013)

Faculty AdvisorsGeorge White, Ph.D.

CategoryBusiness Administration

AbstractDuringthelastfiveyearstherehasbeenanupsurgeinthenumberofhome-basedbusinessesinQatar.Thisresearch investigatesthereasonsbehindthesuddensurge inhomebusinesses, thesupport theyreceivefromorganizationssuchasBedaya,SocialDevelopmentCenterandRodaCenter,aswellasthefutureofhome-basedbusinessesinQatar.

Manyyoungentrepreneurs in thecountryhavenoticedanabsence in themarket forbusinesses thatselldesserts (cupcakesmorespecifically), fashionaccessoriesandabayas.Creatingahome-basedbusinesswasonewayof seizing thisopportunityandmeeting themarketdemand,atminimal start-upcostsandreducedrisk.

Interviewswereconductedwith threecenters thatprovidecareerandentrepreneurshipguidanceaswellassevenhome-basedbusinessesthathavebeenoperatingforat leastayear.TheresearchshowedthatBedaya,SocialDevelopmentandRodaCentersplayedpredominantrolesintheriseofpopularityinthistypeofbusiness.Theadvancements insocialmediahavealsomadeitveryeasyforaspiringentrepreneurstoreachouttocustomersatrelativelylowcosts.

Thegrowthofhome-basedbusinessesinQatarisanundocumentedphenomenon.Thestudyincreasestheawarenessofhome-basedbusinessinthecountryandisaresearchplatformforfurtherinvestigationinthefield.

11

Page 19: Meeting of the Minds, 2013

The aim of this study is to investigate the suc-cess and growth of home based businesses in Qatar. The phenomenon of home businesses in Qatar is a result of a lack of desert shops and abaya shops in the region. At the time when these home based business owners started creating cupcakes there were very few or even no cup-cake stores in Qatar whereas cupcakes are very popular in the UK and the USA. Many residents in Qatar were fascinated by the cupcakes sold abroad and these cupcake owners realized the incredibly high potential for cupcake stores in Qatar The cupcake and desert home businesses in Qatar are very successfu The same methodol-ogy applies to abaya designers, there are two to three main abaya stores in Qatar that are sold in the malls in Qatar and they are Al-Motahajiba, Hanayeen and My Fair Lady. However, these styles in the eyes of many con-sumers lack creativity and originality and are pro-

BedayaWhen approached by entrepreneurs and home-businesses, Bedaya usually follows a 5 steps process.

step 1Innovate

step 2Design

step 3Promote

step 4Fund

step 5Launch

Social Development Center

The Social Development Center launched a program,“Badr wa int Gadr” which was estab-lished in 2000 in order to help and provide full entrepreneurial support to entrepreneurs in Qatar. The primary objectives of the “Badr wa int Gadr” program are to increase the success rate of entrepreneurial projects and to develop the entrepreneurship environment in Qatar. of their family in terms of business experience and knowledge.

RoudhaAlmost %60 of home businesses in Qatar, are started up by women; a statistic Roudha and Carnegie Mellon could not ignore. This center would become the first of its kind to not only help out struggling home businesses, but also most importantly legalize them.

36% 40% 42% 46% 50% 46%

1972 1977 1982 1987 1992 1997

26%

Roudha’s main focus, are home busi-nesses in Qatar. Having said this, the rise in female students in Qatar outnumbers the number of male students. This, has resulted in more businesses opened up by women, as this clever illustration depicts below:

2. Home-Based Businesses: Case Studies from DohaRemeya: photography studio

Barriers/ Challenges

Budget41%

Other20%

Business Knoweledge20%

Government17%

Family2%

28% 39% 38% 38%

Home-Based Business: A Growing Phenomenon Faculty Advisor: George White, Ph.D.

Introduction

Research1. Entrepreneurship & Career Guidance Centres:

Kharaweesh: handmade accessories

Terzi Designs: abayas

Frosting Qatar: bakery

Aishaz Collection: abayas

In conclusion, there are two problems that home business owners and potential home business owners face. The first problem involves the reluctance of some Qatari women to present in front of, or, interact with men. The second problem that these home business owners face is that they are not aware of the importance of legalizing their business.

Results & Conclusions

Maryam Al-Subaie | Maryam Al-Thani | Abdulrahman Al-Muftah

Page 20: Meeting of the Minds, 2013

An Authorization Model for the Web Programming Language Qwel

AuthorLulwa Ahmed El-Matbouly (CS 2013)

Faculty AdvisorThierry Sans, Ph.D.

CategoryComputer Science

AbstractWiththefastgrowthofwebtechnology,itisbecomingeasierfordeveloperstodesignanddeploycomplex

webapplications.However,securingsuchwebapplicationsisbecominganincreasinglycomplextaskasthis

technologyprovideslimitedsupport.Oneofthemainchallengesistobeabletorestrictaccesstospecific

userswiththerightprivileges.Forexample,auniversitymightwanttorestrictaccesstointernalwebservices

tostudentscurrentlyenrolled in itsprogram.Writingsuchasecurewebapplication iscomplex,because

developersare required to reasonaboutdistributedcomputationand towritecodeusingheterogeneous

languages,oftennotoriginallydesignedwithdistributedcomputinginmind,norbuilt-insecurityfeatures.

Qwelisanexperimentalprograminglanguageforthewebthataimsatprovidingdeveloperswithanexpressive

languagethatissimpleandeasytouseforthepurposeofbuildingwebserviceswithembeddedsecurity

constraints.

ThegoalofthisresearchistoextendQwelwithbuilt-insecurityfeaturestoallowdeveloperstodefineaccess

controlpoliciesandissuecredentialstousers.Atfirst,wedesignedanaccesscontrollogictoreasonabout

distributedaccesscontrol.Lateron,basedonthislogic,wewereabletoextendthesyntaxandsemanticsof

Qwelwithnewsecurityfeatures.Usingthisextension,aprogrammerisabletograntcredentialstousersand

expresssecuritypolicies.Thesepoliciesarecheckeddynamicallyand,onlywhentheyaresatisfied,access

to the requestedservice isgranted. Asa result,weshowedhowthisextensioncanbeused toexpress

commonscenariosaswellasmoresophisticatedonesthatarebeyondcurrenttechnology.

13

Page 21: Meeting of the Minds, 2013

An Authorization Model For The Web Programming Language Qwel Lulwa Ahmed El-Matbouly [email protected]

Thierry Sans (Advisor) [email protected]

let univCred = call [email protected] with <“Alice”,”pass4alice”> <simReport,plagCred> = call [email protected] with <“Once upon a time ...”,univCred> univPlagCred = univCred + plagCredin call [email protected] with <simReport,univPlagCred>end

let simReport = call [email protected] with “Once upon a time ...” in call [email protected] with simReportend

[email protected]

publish doc:string = let report = <doc, calculateSimilarity(doc)>in reportend

[email protected]

publish s as <doc,report> = store(s)

Sends the document to noplagiarism.com and obtains the similarity report in return

Calculates the similarity report and returns it with the original document

Stores the original document and its similarity report

Forwards the document and its similarity report to the submission.org

[email protected]

publish caller doc:string =let report = <doc, calculateSimilarity(doc)> plagCred = cred(issuer(report))in <report,plagCred>endprotect univ.edu says student(caller)

[email protected]

publish caller s as <report,cred> = store(s)protect univ.edu says student(caller) and noplagiarism.com says issuer(report)

Sends the login and password to univ.edu and obtains a student credential in return

Creates a credential vouching that plagiarism.org is the issuer of the report

The policy ensures that univ.edu issued the credential saying that the caller (Alice here) is a student

Concatenates the univ.edu credential with the noplagiarism.com credential

The policy ensures that:1) univ.edu issued the credential saying that the caller (Alice here) is a studentand 2) noplagiarism.com issued the credential saying ensuring its authenticity

[email protected]

publish caller p as <login,pwd> = if check(login,pwd) then cred(student(caller)) else raise AccessDeniedException

Creates a credential vouching that the caller (Alice here) is a student at univ.edu

Plagiarism0

1

2

1

2

Using this Qwel extension, a programmer is able to grant credentials to users and express security policies. These policies are checked dynamically and only when they are satisfied, access to the requested service is granted. As a result, we showed how this extension can be used to express common scenarios as well as more sophisticated ones that are beyond current technology.

Plagiarism

Problem Securing web applications is a complex task

With the fast growth of web technology, it is becoming easier for developers to design and deploy complex web applications. However, securing such web applications is becoming an increasing complex task as this technology provides limited support. One of the main challenge is to be able to restrict access to specific users with the right privileges.

Qwel is an experimental programing language for the web that aims at providing developers with an expressive language, yet simple and easy to use for the purpose of building web services with embedded security constraints. The goal of this research is to extend Qwel with built-in security features to allow to developers to define access control policies and issue credentials to users.

Solution Designing a better programming language for building secure web application

First, we designed an access control logic to reason about distributed access control to be able to

·express credentials as properties issued by trusted authorities e.g. the similarity report comes from noplagiarism.com

·express security policies as sets of conditions that must be true based on issued credentials e.g. only a student from univ.edu can obtain a similarity report

Second, based on this logic, we were ale to extended the syntax and semantics of Qwel with new security constructs.

Methodology Extending Qwel with new features to express credentials and access control policies

Conclusion A web language with primitives for access control

Page 22: Meeting of the Minds, 2013

Arabic Accented Facial Expressions for a 3D Agent

AuthorAmna AlZeyara (CS 2014)

Faculty AdvisorsMajd F. Sakr, Ph.D.Micheline Ziadeh

CategoryComputer Science

AbstractIn this studyweattempt to identify anddevelop a suitable set of facial expressions for a 3Dagent that

hasArabicfacialfeatures.WealsoevaluatehowArabsandnon-ArabsrecognizeArabicfacialexpressions

implementedona3Dagent.

Asshowninpreviousresearch,a3Dagent’semotionsenhancetheinteractionbetweentheagentandhumans.

Theexpressionsdisplayedalongwiththeemotionshouldmatchhumanbehavior,aspeopleapplytheirsocial

rulesonthe3Dagents.Expressions,asinlanguage,exhibitculture-specificaccentswhenexpressingcertain

emotions.Hence,expressionsshouldrelatetoaspecificculture,otherwise,misunderstandingsmightoccur

when interpreting facial expressions. Furthermore, people expect a 3D agent’s behavior to alignwith its

features.Therefore,a3DagentwithArabicfeaturesmustdisplayArabicaccentedfacialexpressions.

In thiswork,we implement sixArabic facial expressionson the3DagentbasedonArabichuman facial

expression.AdatabaseofArabicaccentedfacialexpressionsdoesnotexist.Toovercomethis,weacquire

expressionsbytakingvideosofArabfemalesnarratingstoriesthatinvokedifferentemotions.Weextractthe

expressionsfromthevideosandimplementthemonthe3DagentusingtheFacialActionCodingSystem.We

thenrunasurveytoevaluateArabs’andnon-Arabs’recognitionofthefacialexpressions.

Ourresultsshowthattherecognitionofpositiveexpressions(happinessandsurprise)ishighanddifferslightly

betweenArabsandnon-Arabs.As fornegativeexpressions (anger,disgust,andsadness) the recognition

is lowandalsodiffersslightlybetweenArabsandnon-Arabs,except fordisappointment,which isbetter

recognizedbyArabs.Theseresultsrevealthatpositiveexpressions,whenimplementedona3Dagent,are

easilyrecognized.Further,wefindthatdisappointmentisaculturallydependentexpressionforArabs.

15

Page 23: Meeting of the Minds, 2013

Collec&on  1)  Select  6  emo,ons:  anger,  disgust,  surprise,  happiness,  sadness  and  disappointment.    2)  Iden,fy  the  Arabic  accent  in  each  expression  that  displays  the  emo,on  by  recording  the  expressions  of  Arab  female  students  

Amna  AlZeyara  [email protected]  

Advisors:  Dr.  Majd  Sakr  [email protected]  

Problem  statement  

Mo&va&on  

Approach  

Results  

•  Facilitate   the   interac,on  between  humans  and  a  3D  agent  by  focusing  on  the  development  of  the  3D  agent’s  facial  expressions  

•  Evaluate   Arabs   and   non-­‐Arabs   recogni,on   of  Arabic  expressions  implemented  on  a  3D  agent  

Overall  Goal  

Improve  the  interac,on  between  humans  and  a  cross-­‐cultural  3D  agent  

A  3D  agent  must  display  emo,ons  to  be  believable    

Humans  expect  agents  

to  show  human-­‐like  behavior  

The  3D  agent  features  induces  opinions  about  it  

A  3D  agent  with  Arabic  

facial  feature  must  display  Arabic  facial  expressions  

Arabs  and  non-­‐Arabs  recogni,on  of  an  emo,on  is  shown  below.  For  each  pair,  Arab’s  percentage  is  shown  on  the  top.    

Conclusion  

The  experiment  We  asked  par,cipants  about:  age,  gender,  origin  and  countries  they  lived  at.  Then  we  asked  them  to  choose  the  most  appropriate  expression  for  each  emo,on  by  using  the  following  matrix:    

•  Arabs  and  non-­‐Arabs  beRer  recognize  Arabic  posi,ve  facial  expressions  that  are  implemented  on  a  3D  agent.  

•  Although  sadness  and  disappointment  are  claimed  to  send  the  same  signal,  Arabs  were  beRer  able  to  dis,nguish  between  the  two  expressions.      

•  Disappointment,  when  implemented  on  3D  agent,  is  more  culturally  dependent  than  other  expressions.  

Recognized as

    Sadness Disgust Anger Disappointment Surprise Happiness

Inte

nded

em

otio

n

Sadness 9% 9% 49% 33% 0% 0%

8% 10% 42% 39% 0% 0%

Disgust 51% 35% 7% 7% 0% 0%

31% 31% 15% 23% 0% 0%

Anger 2% 42% 35% 2% 19% 0%

1% 51% 35% 1% 11% 0%

Disappointment 33% 7% 5% 56% 0% 0%

59% 4% 0% 35% 1% 0%

Surprise 2% 5% 2% 0% 74% 16%

0% 3% 3% 0% 79% 15%

Happiness 2% 2% 2% 2% 7% 84%

0% 1% 4% 1% 8% 85%

Mecheline  Ziadee  [email protected]  

Implementa&on  and  Verifica&on  1)  Implement  the  expressions  using  the  Facial  Ac,on  Coding  System  2)Verify  the  implementa,on  of  the  expre-­‐ssions  using  a  small  scale  experiment  

Evalua&on  of  recogni&on  1)  Evaluate  the  recogni,on  of  the  expressions  by  Arabs  and  non-­‐Arabs  using  a  large  scale  experiment  

Page 24: Meeting of the Minds, 2013

CMUQ Official Android App

AuthorsAli Elgazar (CS 2015)Danah Abdullah (CS 2015)

Faculty AdvisorsMark Stehlik

CategoryComputerScience

AbstractTheposterservestopromotetheCarnegieMellonUniversityinQatar(CMUQ)AndroidApplication,which

iscurrentlyunderproductionandhasanexisting functionaldemo.Though theposterdoesnotdetail all

thefunctionsoftheapplication,animageofthephonewiththeapplicationrunningwillillustrateageneral

conceptofitscapabilities.

TheresearchtopicinvolvesthedevelopmentofthefirsteverCMUQofficialandroidapplication,whichserves

asadatabaseofinformationregardingcurrentnewsandeventstakingplaceatCMUQ.Theapplicationwill

bemadeavailableonthemarketforstudents.

Theinspirationfortheappcamefromapersonalexperience.Oneoftheauthorswasinspiredtodevelop

theapplicationduringwinterbreak,whenhemissedaneventthathehadlearnedabouttoolate.AtCMU-Q,

studentsareoftenbombardedwithsomanyevents that itbecomestedioustokeeptrackofallof them.

Theappisdesignedtoremedythesituation.Theapplicationneededtobequicklyandeasilyaccessible,so

designingitforPCwasruledoutinordertoavoidthehassleoflogginginwheneverauserneededtocheck

forupcomingevents.Thebestsolutionwouldbetohavetheapplicationwiththeuseratalltimes.Forthat

reason,wedecidedtodeveloptheapplicationforandroid,usingeclipseandaSamsungS3phoneduring

theresearchandtestingprocess.

Thisresearchprojectisofgreatimportanceforthelocalcommunity.

17

Page 25: Meeting of the Minds, 2013
Page 26: Meeting of the Minds, 2013

Interaction Analysis of a Multi-Lingual Robot Receptionist

AuthorsNaassih Gopee (CS 2016)Lamana Mulaffer (CS 2015)John Naguib (CS 2016)Micheline Ziadee

Faculty AdvisorMajd F. Sakr, Ph.D.

CategoryComputer Science

Abstract: In thisworkwe analyze human interactionswithHala, a bi-lingual robot receptionist, in order to identifyvariationsacrossArabicandEnglishinteractions.Thelargerscopeofthisworkistostudytheinfluenceofsocio-culturalnormsonhuman-robot interactionswithinamulticultural,yetprimarilyethnicArab,setting.Ouranalysiswillhelpimpactfuturedesigndecisionstobetteradapttherobottointeractinthosespecificlanguages.Inpreviousworkwehaveidentifiedseveralvariationsinuserinteractionswiththerobot.Specifi-callyandforEnglishinteractions,wehaveobservedthatnativeArabicspeakersconverse25%longerthannon-ArabicspeakersandtheytendtothanktherobotlessthannativeEnglishspeakers.

HalahasbeendeployedatCarnegieMellonUniversityinQatar’sreceptionsinceOctober2009.Halautilizesarule-basedmatchingsysteminordertorespondtouserqueries.Thenumberandspectrumofrulesdic-tatesHala’sabilitytoproviderelevantanswerstoawidevarietyofqueries.ThemajorityofHala’srules(96%)wereinEnglishuntilDecember2012.Afterthatpoint,wedevelopedsymmetriccontentbetweenEnglishandArabicrules.AllinteractionswithHala,whetherinEnglishorArabic,arelogged.Inordertoidentifyifvaria-tionsexistweanalyzethelogs.AscriptisdevelopedtowritethelogsintoaMySQLdatabaseandthelogdataisthereaftercleansedtoremovespuriousinteractions.Statisticalanalysisisperformedonthedatainordertoidentifyvariationsofinteractionsacrossdifferentlanguages.

Accordingtoouranalysis,85%oftheinteractionsareinEnglish,3%inArabicand12%aremixed(ArabicandEnglish)interactions.Theaveragedurationofaninteractionacrosslanguagesisunder2minutesandincludesanaverageof4.73queries.However,EnglishinteractionscontaintwiceasmanyqueriesasArabiconesandmixedinteractionscontainmorethantwiceasmanyqueriesasEnglishinteractions.AfterequalizingHala’sEnglishandArabicknowledge-base,weobserveanincreaseinmixedinteractionsby6.5%.AsfortheArabicinteractions,theaveragedurationis8%longerandtheaveragenumberofqueriesisupby25%.Theseresultsindicatesignificantvariationsinhuman-robotinteractionsacrossdifferentlanguages.Increas-ingtheArabiccontenthasimpactedtheArabicinteractions.Inourfuturework,weattempttofurtherstudythesecrosslanguagevariationsinmulti-lingualhuman-robotinteraction.

19

Page 27: Meeting of the Minds, 2013
Page 28: Meeting of the Minds, 2013

I Want my Mommy

AuthorsFahim Dalvi (CS 2014)Syed Moosavi (CS 2014)

Faculty AdvisorSaquib Razak, Ph.D.

CategoryComputer Science

Abstract“IwantmyMommy”isaresearchprojectthatlooksatusingwirelesstechnologiessuchasBluetoothtosolve

theproblemofcrowdcontrolbylimitingthenumberoflostpeopleincrowds.Theconceptofthesolutionis

basedonthefactthatincrowdedareas,peoplewanttostaywiththeirgroups.Inordertomakesurethat

peoplestaywiththeirgroupsorhaveinformationaboutthelocationoftheirgroupmembers,wedevelopthe

algorithmthatallowsadevicetoautomaticallydetectone’sgroupmembersandthenprovidethelocationof

thesegroupmembersincasethatpersonislost.

Inthisresearchproject,wewouldliketofindouthoweffectiveouralgorithmisinfindinggroupswithinalarge

crowdandhowhelpfulthedeviceisinhelpinglostpeople.Forthisresearchproject,wewouldliketosimulate

thesituationofacrowdedareaandgivedevicestoanumberofstudentsthatwouldwanttoparticipatein

theresearchstudy.Afterprovidingthestudentswiththedevices,wewillcheckafterafewdaysifthedevices

haveselectedthecorrectgroupmembers.Wewouldthenseeifadevicewouldbeabletoprovidetheloca-

tionofthegroupmemberswhenthedeviceisnotinproximitywithotherdevices.

21

Page 29: Meeting of the Minds, 2013

I want my Mommy

Abstract

Fahim Dalvi [email protected] [email protected] [email protected]

Saquib Razak Syed Hashim Moosavi

Experiment

• Android phones are being used by 20 students of CMUQ for Wireless research and their wireless data is continuously being collected for analysis

• Both the location (with respect to the access points) and the proximity of an individual to his/her neighbors helps in the classif ication of groups

• The experiment wil l be performed with a larger group of students after preliminary results to simulate a crowded area

• Identify an individual’s “neighbors” based on the proximity in the crowded area and the time of contact by using Bluetooth

• Use the Wi-Fi of the individual’s wireless device (Android phone in our experiment) to get the latest location of the individual and periodically send it to the server

• Find the best way to categorize people into groups by using the information from the wireless device and provide them with the way of reaching out to them when lost

Using Wireless Research to limit the number of lost people

Problem

Solution

“I want my Mommy ” is a research project that aims to use wireless technologies such as Bluetooth and Wi-Fi to quickly locate people in a large crowd, subsequently reducing the number of lost people. In several crowded areas such as Makkah and Disneyland, people getting separated(specially children and elderly) from their famil ies is a huge problem. This is currently handled manually by making announcements or giving people tags with information written on them. Unfortunately, these solutions do not work in highly crowded areas, both because of the number of people entering the location, and because of the size of these places. We plan to devise an algorithm using commonly existing wireless technologies to reduce the number of lost people by categorizing the crowd into groups without any barrier-to-entry.

• Crowded places generally have a lot of people entering the premises

• Identifying groups at this point is t ime consuming, and is a barrier to entry

• People spend most of their t ime with their respective groups

• The time spent with the group initial ly is not used for the classif ication of an individual’s “neighbors”

• A lost person is unable to locate his/her group in the large crowd due to lack of infrastructure

• Manual announcements/ non-electronic tagging is used that is not very effective

Page 30: Meeting of the Minds, 2013

Semiotic Circles: An Inclusive Methodology for Human Computer Interaction Design

AuthorKenrick Fernandes (CS 2014)

Faculty AdvisorAndreas Karatsolis, Ph.D

CategoryComputer Science

AbstractWiththeproliferationofincreasinglypowerfulandportablecomputingdevicesthroughoutourlives,the

qualityofourexperienceusingthesedevicesbecomesevermoreimportant.Users’interactionsmustbe

supported,notcontrolled,bythesedevices.Inthefieldofhuman-computerinteraction(HCI),theuseof

human-centeredresearchmethodsisessentialforamoreinclusiveuserexperience.Ourproject’sobjective

wastodesignamethodologywhichwouldhelpusobtainparticipants’perspectivesregardinganeduca-

tionalsymposium.Helpingtheseideassurfaceenabledustoworktowardsthecreationofawebpresence

tosupportthesymposium.

Thehybridmethodologywedesignedisbasedonexistingpaperprototypingandthink-aloudprotocolswith

theadditionofanofflinetaggingsystem.Thiscombinationoftools,alongwiththetaggingsystem,sup-

portedourcreationofcompositevisualizationstorepresentasynthesisofviewpoints.Weintendtousethe

knowledgegainedfromtheprocesstodesignawebpresencethatwillfacilitateandsupportinteractions

betweenpeople.

Inthispostersession,wepresenttheHCImethodologywecreatedandtheprotocolsweusedtomove

fromabstractconceptstoconcretetangibles.Wealsoinviteyoutotagthefinalcompositemodelandex-

periencetheoutcomesofthisproject.

23

Page 31: Meeting of the Minds, 2013

Semiotic circleS An incluSive methodology For humAn computer interAction deSign

RefeRences1. Carroll, J. M. (2003). HCI models, theories, and frameworks toward a multidisciplinary science. San Francisco, Calif.: Morgan Kaufmann.2. Simon Sinek: How great leaders inspire action | Video on TED.com. (n.d.). TED: Ideas worth spreading. Retrieved April 14, 2013, from http://www.ted.com/talks/simon_sinek_how_great_leaders_inspire_action.html

STEP 1 - ThE DESign

STEP 2 - ThE SESSion

STEP 3 - ThE SynThESiS

Andreas KaratsolisEnglish [email protected]

Advances in technology have penetrated all aspects of our lives. Consequently, our interactions with devices and other users become more significant and demand meaningful design approaches. In the last few years, several methodologies for hci design have been proposed[1], which attempt to capture information from multi-layered user hierarchies. We have designed an inclusive methodology which acknowledges all participant perspectives and facilitates interaction between stakeholders.

our ChallEngE

Using well-established methodologies such as the Think-Aloud protocol, Paper Prototyping and Object Labeling, we developed a hybrid methodology called Semiotic Circles. This methodology allows for capturing of a participant’s thoughts, which we combine with a visualization exercise and tagging system to promote freedom of expression. This way we are enacting a genuinely inclusive model, as all the concepts and relationships between them are represented as participants have identified them.

our inSPiraTion

Six printed and cut out tokens can be pasted on the visualization sheet. They are used to tag topics and relationships already put down on paper. They represent other Generalist Questions as well as specifying tags for the the web presence and a speech bubble.

Multiple sheets are then synthesized with the tagging tokens as focal points, to generate a 3D model of the aggregate opinions of the group. Tokens are essentially stacked in towers to add an extra dimension.

We designed an instrument on a large A0 sized sheet containing concentric circles representing three of the Generalist Questions: Why, How and What ?

Participants are briefed about the Think-Aloud protocol and the purpose of the sheet and the tokens. They are then free to place tokens and create connections. The sequence of actions is drawn on the left

one such synthesized model is below - play with it and tag your topics

Kenrick FernandesCS [email protected]

faculty advisoRstudent

Page 32: Meeting of the Minds, 2013

Multi-Robot Coordination

AuthorSidra Alam (CS 2013)

Faculty AdvosorSaquib Razak, Ph.D.

CategoryComputer Science

AbstractInthecontextofcomplexmulti-robotsystems,consensus-basedtaskallocationalgorithmsarebeing

researchedextensivelybecauseoftheirrobustnessinhandlingthegrowingnumberofrobotsinateam[1].

Multi-robotsystemsarebeingstudiedanddevelopedinthecontextofdisasterstrickenareas.Insuchcriti-

calscenarios,coordinationandcommunicationduringtaskallocationbecomevitalfactorstooptimallyuse

alltheavailableresources.Inthisreport,wehavestudiedandimplementedtheconsensus-basedauction

algorithm(CBAA)[2],inparallelwithtaskexecution,asproposedbyDaset al.in[1].Furthermore,weaimto

proposeanalgorithmtomaintainconnectivityinthisconsensus-basedalgorithm.

25

Page 33: Meeting of the Minds, 2013

In the context of complex multi-robot systems, consensus based task allocation algorithms are being researched on extensively because of their robustness in handling the growing number of robots in a team [1]. Multi-robot systems are being studied and developed in the context of disaster stricken areas. In such critical scenarios, coordination and communication during task allocation become vital factors to optimally use all the available resources. In this report, we have studied and implemented the consensus-based auction algorithm (CBAA) [2], in parallel with task execution, as proposed by Das et al. in [1]. Furthermore, we aim to propose an algorithm to maintain connectivity in this consensus-based algorithm.

Multi-Robot Coordination algorithms can be emulated on real mobile

systems to deliver the coordination functionality in the event of task delegation.

Consider the rescue scenario, where doctors have to attend to patients after a disaster. The doctors play the role of robots in such a

scenario and use a mobile device in order to communicate and coordinate task delegation. Time is of the essence and any redundant

task allocation could cost a person’s life

We are working on the Consensus Based Allocation Algorithm (CBAA) which uses a decentralized approach to delegate the tasks amongst the

robots. Agents place bids on tasks with values based on their own Situational Awareness. The highest bid wins the assignment.

The testing for this algorithm assumes connectivity at all times which could result in redundant task allocations if implemented on a real system which has a range of communication and hence is prone to

network dis-connectivity. In our approach we take in to consideration, network dis-connectivity during task allocation and assign a very high

cost to bids which result in dis-connectivity.

We have simulated CBAA in java and have tested it

on scenarios with and without range of network communication. We have compared the results to

measure performance and to evaluate scenarios where the algorithms produce lower performance.

Abstract Experiments

Why Do We Care?

Results

Current Algorithm, Problem &

Our Strategy

References

[1] G. P. Das, Member, IEEE, T. M. McGinnity, Senior Member, IEEE, S. A. Coleman, and L. Behera, Senior Member,

IEEE (2011) A Fast Distributed Auction and Consensus Process Using Parallel Task Allocation and Execution

[2] H.-L. Choi, L. Brunet, and J. P. How. Consensus-based decentralized auctions for robust task allocation. IEEE Trans.

on Robotics, 25 (4):912 – 926, 2009.

Currently, we are implementing and testing CBAA in the context of network connectivity, in simulation. Next, we would be implementing our proposed protocol to compare it against the existing one. Real-systems: The main aim of this research is to emulate this modified CBAA on a real mobile system and evaluate it.

Future Work

Page 34: Meeting of the Minds, 2013

Towards Computational Offloading in Mobile Clouds

AuthorAfnan Fahim (CS 2013)

Faculty AdvisorKhaled Harras, Ph.D.

CategoryComputer Science

AbstractItiscommonpracticeformobiledevicestooffloadcomputationallyheavytaskstoacloud,whichhasgreater

computationalresources.However,thistypeofoffloadinghasbeenexpensiveduetohighenergycostsand

highlatency,whichexistsbetweenthecloudandtheoffloadingmobiledevice.Asananswertothisproblem,

“Cloudlets”wereproposed:smallercloudsplacedclosertousersthatwouldmakemobiletaskoffloading

lessexpensiveintermsofenergywasteandtimeconsumption.Theideaofreducingcommunicationcosts

byexecutingclosertotheoffloaderdevicewasthenextendedtointroducemobilecloudcomputing-where

theideaistooffloadtaskstonearbydevices-betheymobileorstationary-soastoreducecommunication

costsandlatency.

Inthiswork,ourfirstcontributionistomotivatethegainincomputationtimeandenergyconsumedthatcan

bemadebyoffloadingtonearbydevices.Wedothisbyemulatingnetworkconditionsthatexistfordifferent

communication technologiesprovidedbymodernmobiledevices.Asopposed toemulatedexperiments,

currentlyitisachallengetocarryoutrealexperimentsonmobiledevicessincenoapplicationsexistthatcan

distributedifferentamountsofdataandcomputationtonearbydevicesusingdifferentcommunicationtech-

nologies.Thus,asasecondcontribution,wealsopresentanAPIthatallowscreationandoffloadingoftasks

byamobiledevicetoanetworkofnearbydevices.Anotherchallengeinmobilecloudcomputingistodecide

whichdevicetooffloadataskto.Asathirdcontribution,ourworkalsopresentsalgorithmstoleveragesocial

contextwhenmakingoffloadingdecisionstonearbydevices.

27

Page 35: Meeting of the Minds, 2013

I. MOTIVATION

III. MAKING THE CASE FOR MDC OFFLOADING

IV. THE MDC EXPERIMENTAL PLATFORM

V. CONCLUSIONS & ONGOING WORK

References1. C. Shi, V. Lakafosis, M. H. Ammar, and E. W. Zegura, “Serendipity:enabling remote computing among intermittently connected mobile devices,” in MobiHoc, 2012, pp. 145–1542. B.-G. Chun, S. Ihm, P. Maniatis, M. Naik, and A. Patti, “Clonecloud: elastic execution between mobile device and cloud,” in Proceedings of the conference on Computer systems, ser. EuroSys ’11. New York, NY, : ACM, 20113. E. Cuervo, A. Balasubramanian, D. ki Cho, A. Wolman, S. Saroiu, R. Chandra, and P. Bahl, “Maui: making smartphones last longer with code offload,” in MobiSys’10, 20104. Mahadev Satyanarayanan, Paramvir Bahl, Ramón Caceres, and Nigel Davies. 2009. The Case for VM-Based Cloudlets in Mobile Computing. IEEE Pervasive Computing 8, 4 (October 2009), 5. Qatar’s ICT Landscape 2013: Households and Individuals – ICT Qatar Annual Report - http://www.ictqatar.qa/sites/default/files/documents/Qatar%20ICT%20Landscape_EN.pdf6. Microsoft Tag Mobile Usage Survey - http://www.digitalbuzzblog.com/2011-mobile-statistics-stats-facts-marketing-infographic/

Java App

RTT

Computation

Java App

Data ComputationB/W PLR

FreeBSD

IP Firewalls

Ubuntu

Java Sockets

Client Server

Traffic Shaper

FreeBSD

II. OFFLOADING OPTIONS

• Mobile usage is overtaking laptop/desktop usage [6]

• Average Household in Qatar owns 3mobile phones and a tablet [5]

• New applications require a lot of computation and data processing:• Face Recognition• Video Games

• Offloading mobile computation and data is a trend that has just begun

• This offloading impacts application latency and consumes energy

• Task: Combination of Data (MB) and Computation (MFLOP)• Computation: Carried out as floating point matrix operations.• Data: Text of known size in MB.• Metrics: Offloader Energy & Total Time to Complete Task

Emulation setup for testing energy and time tradeoffs when offloading

Energy Circuitry Energy Results MDC App

MDC Experimental Results • For compute intensive tasks we have shown energy and time gain using MDC

• We can now test different offloading strategies using the MDC API

• Identifying when and who to offload computational tasks using social context and contact history

• Addressing intermittent connectivity in MDC devices

Apps that offload custom tasks do not exist. We thus created an API with these features:

Towards Computational Offloading in Mobile Device Clouds

Afnan Fahim, Abderrahmen Mtibaa and Khaled A. HarrasCarnegie Mellon University Qatar

• MDC can save both energy and time depending on task complexity and data

• WiFi based offloading - 2x and 3x faster than Bluetooth and 3G• Bluetooth 4 - 80% less energy compared to WiFi

• PreOffloader:Define Tasks as [Data, Computation]

• LocalExecutor: Execute tasks on the local device

• BluetoothOffloader:Offload tasks in parallel using Bluetooth

• WiFiDirectOffloader:Similar to Bluetooth offloader

• RemoteOffloader: Offload tasks to remote devices using WiFi

0

20

40

60

80

100

120

0 5 10 20

Tim

e (s

)

Data (MB)

Data vs Time - 30 MFLOP

Total Time

Computation Time

Local Computation

0

20

40

60

80

100

120

140

0 5 10 20

Tim

e (s

)

Data (MB)

Data vs Time - 60 MFLOP

Total Time

Computation Time

Local Computation

0

10

20

30

40

50

60

70

80

0 5 10 20

Ener

gy (J

)

Data (MB)

Data vs Energy - 30 MFLOP

Total Energy

Computation Energy

Local Computation

0

10

20

30

40

50

60

70

80

90

100

0 5 10 20

Ener

gy (J

)

Data (MB)

Data vs Energy - 60 MFLOP

Total Energy

Computation Energy

Local Computation

Page 36: Meeting of the Minds, 2013

PyExoplanets: A Computed Application for Detecting Exoplanet Transits on Stars’ Light Curves

AuthorsNoora J. Al-Muftah (CS 2016)

Faculty AdvisorSaquib Razak, Ph.D.

CategoryComputer Science

AbstractOnewayofdetectingextrasolarsystemplanets(planetsthatorbitstarsoutsideoursolarsystem)isbythetransitmethod.Inthismethod,astronomersusethelightcurves(plotofthebrightnessofastaroveraperiodoftime).Ifadecreaseinthebrightnessofthestarisnoticedinthelightcurve,thenitcanbefurtherdeducedifitiscausedbyanobject(planet)thatblocksthestar’semittedlightbypassinginfrontofit.ProjectslikeNASA’sKeplermissionproduces thousandsofstars’ lightcurvessearching forexoplanets.One resultingproblemisthatitisdifficultandtimeconsumingtoanalyzealloftheselightcurvesonebyone.

Formyproject, Ihavedevelopedanastronomicaldataanalysisapplication thatcanshorten theprocessoffindingtransitsbyapplyinganimageanalysismethodonthegraphofthelightcurve.Inmyapplication,PyExoplanets, Iselected lightcurvedata fromtheKeplermissionFITSfiles forplanetary-candidatestarsobservedintheQ3quarterset.MyapplicationwasdevelopedusingPython,thePythonImageLibraryforanalyzingthelightcurveimage,PyFITSforreadingFITSfiles,Matplotlibforplottingthestar’sdata,andvisualPythonforproducingsimple3Danimationofthestarandtheexoplanet.Myprojectisaninitialstepincreatingacompletecomputerapplicationthatcanpotentiallyassistastronomersintheprocessoffindingexoplanets.

29

Page 37: Meeting of the Minds, 2013

PyExoplanets    Computed  Application  for  Detecting  Exoplanets’  Transits  on  Stars’  Light  Curves  

 Noora  J.  Al-­‐Mu-ah          nmu%[email protected]  

             

Advisor:  Saquib  Razak,  Ph.D.  

Problem  and  Motivation  •     Current  projects  such  as  NASA’s  Kepler  mission  [1]  

 produce  thousands  of  stars’  light  curves  searching    for  extrasolar  planets  

•     DetecDng  Exoplanet  transits  on  large  light  curve  data    set  takes  Dme  and  effort    

•     An  applicaDon  is  needed  to  assist  in  this  process    by    detecDng  possible  planet  transits  and  hence    illuminaDng  the  number  of  false  planetary  candidates  

   [1]  hJp://kepler.nasa.gov/  

 

Solution  Transit  DetecBon  Method:  •     Created  an  Image  Analysis  method  that  detects  

 Exoplanet  transits  on  light  curves  and  outlines    the  region  

•       Algorithm  analyzes  the  data  trends  and  outlines    any  possible  transits  on  the  graph  of  the  light    curve  

Data  source:  Kepler  Q3  quarter  set  hJp://archive.stsci.edu/pub/kepler/lightcurves/    

PyExoplanets  Application  features  I.  Analyzes  individual  Kepler  planetary  candidates  II.  Plots  staDsDcs  for  a  set  of  Kepler  planetary  

candidates  III.      Animates  a  3D  visualizaDon  of  star  and  

Exoplanet      

Main  interface  of  Application  

Animation  interface  

Computer  Science  

Future  work    •     Improve  the  Image  Analysis    method  to    increase        

 accuracy  and  reduce  false    detecDons  

•       Develop  the  applicaDon  to  be  able  to  handle  all    types  of  light  curves’  plots  

•                 Enhance  runDme  for  the  detecDon  process  

Page 38: Meeting of the Minds, 2013

Unsupervised Word Segmentation and Statistical Machine Translation

AuthorHanan Alshikhabobakr (CS 2013)

Faculty AdvisorKemal Oflazer, Ph.D.

CategoryComputer Science

AbstractTranslationishighlydependentonhowmuchweknowaboutthetext,sothemoreaccurateanalysistheword

giventoatranslator,thebetterthetranslationresultweget.Onewayofanalyzingawordistosegmentthe

wordintogrammaticallymeaningfullinguisticsegments(Suchas“playing”segmentedinto“play+ing”).This

researchlooksatArabicwordsegmentationthatisindependentofhumansupervision,sowearemeasuring

the precision of UnsupervisedWord Segmenters. We then measure how much the UnsupervisedWord

Segmenterimprovestranslation.

ThisresearchutilizedtheserversallocatedfortheNaturalLanguageProcessinggroupatCMUQ,wherethey

storethestateoftheartsystemsofNLP,whichrequirearelativelyhugeamountofdiskspacetorunthem.

Thisresearchwillcontributetothedevelopmentofintelligentmachinetranslation,especiallytotheArabic-

to-Englishtranslation.

31

Page 39: Meeting of the Minds, 2013
Page 40: Meeting of the Minds, 2013

What Affects Students’ Acceptance and Use of Technology?A test of UTAUT in the context of a higher-education institution in Qatar

AuthorFatema Akbar (IS & BA 2013)

Faculty AdvisorDaniel C. Phelps, MLIS, Ph.D., CISA

CategoryInformation Systems

AbstractTechnology is increasingly being integrated in classrooms to facilitate and enhance students’ learning.However,thesuccessofnewtechnologyintroductionscannotbeachievedifthestudentsdonotacceptandusethetechnology.Thisresearchprojectexaminedthefactorsinfluencingstudents’acceptanceanduseoftechnologyinahigher-educationinstitutioninQatarbytestingtheUnifiedTheoryofAcceptanceandUseofTechnology(UTAUT)(venkateshet.al,2003).

UTAUTisoneofthemostprominenttheoreticalmodelsoftechnologyadoption.Itsynthesizeseightprevioususer acceptance andmotivationmodels and suggests that four core constructs are direct determinantsof technology acceptance and use: Performance Expectancy, Effort Expectancy, Social Influence, andFacilitatingConditions.Thetheoryalsosuggeststhattheeffectofthesefourconstructsismoderatedbyage,gender,experienceandvoluntarinessofuse.

AmongthestudiescitingUTAUT,veryfewimplementthefullmodelandexamineallofitsconstructs.ThisstudyusesthecompleteUTAUTasamodeltoexaminethefactorsthatinfluencestudents’acceptanceanduseoftechnologyinaneworganizationalandculturalcontextthatUTAUThasnotbeenpreviouslytestedin.Thisstudycanproviderecommendationstohelppreparetherightenvironmentandtrainingbeforeanewtechnologyisintroducedforstudents.Additionally,thisresearchaddstostudiesabouttheapplicabilityofUTAUTinaneducationalenvironmentbyextendingthediversityofthestudiedsample.

33

Page 41: Meeting of the Minds, 2013

WHAT AFFECTS STUDENTS’ACCEPTANCE & USE OF TECHNOLOGY?

Fatema AkbarIS & BA [email protected]

A test of UTAUT in the context of a higher-education institution in Qatar

INTRODUCTION METHOD

UTAT is a prominent theory providing a technology acceptance and use model that synthesizes eight previous technology adoption and motivation models. This study uses the complete UTAUT as a model to examine the factors that influence students’ acceptance and use of technology in a new organizational and cultural context that UTAUT has not been previously tested in.

Students’ acceptance and use of technologies introduced in their academic environments is an important factor in determining the success of these technologies.

UTAUT was tested by conducting a panel study collecting data from students in classes where new technologies were introduced. The students filled online surveys about their thoughts and feelings towards the technology three times throughout the semester to measure how their perceptions change with increased experience.

WHAT?

Unified Theory of Acceptance &

Use of Technology (UTAUT)

WHERE?

Higher Education Institution in

Qatar

WHY?

To examine factors influencing

students’ tech acceptance

MODEL HYPOTHESES & RESULTS

As shown in the graph above, some hypotheses of the UTAUT model were supported, while others were not. The differences in results between this study and what the UTAUT model suggests can be attributed to the different cultural and organizational contexts this study tests UTAUT in.

The study found that performance expectancy, facilitating conditions and attitude towards using technology are significant determinants of technology acceptance. Additionally, acceptance of technology and facilitating conditions are significant determinants of the actual use of technology.

Other constructs and moderators had a significant influence on technology acceptance only in one point of the semester. For example, computer self-efficacy was significant only in the beginning of the semester when students had no experience with the technology.

Future research should focus on adding education context-specific constructs to the UTAUT model and study further relationships between the constructs and technology acceptance. This will help prepare the right environment and training for students before introducing new technologies to improve technology acceptance.

OStudent

Reactions

T1: 1 week

XIntroduction/

Training

OStudent

Reactions/Usage

Measurement

T3: 8 weeks

OStudent

Reactions/Usage

Measurement

T2: 4 weeks

XSystem

Use

XSystem

Use

CONCLUSION

Supported Partially supportedNot supportedNew findings

Performance Expectancy

Effort Expectancy

Social Influence

Facilitating Conditions

Use Behavior(Actual Use)

Behavioral Intention

(Acceptance)

Gender Age Experience Voluntariness

Attitude towards using technology

Page 42: Meeting of the Minds, 2013

Software Development Project Electronic Resolution

AuthorsTasneem Jahan (IS 2013)Reham Al Tamime (IS 2013)

Faculty AdvisorMaher Hakim, Ph.D.

CategoryInformation Systems

AbstractTheModelUnitedNations,THIMUNQatar,organizesconferencesforhighschoolstudentswheretheydis-

cussanddebatespecificissuesbysubmittingtheirproposalsindocumentformat.Theorganizationusesa

documentmanagementtool,whichisknownasaResolutionManagementSystemtoorganizeandmanage

thedocumentsandresolutionssubmittedbythestudents.Thesystemisacriticalfactorforthesuccessof

theconferences,therefore,wehavedesignedabettersystemthatminimizestheerrorsthathaveoccurred

inthepastandthusmaximizestheconvenienceinusingsuchasystem.

Ourresearchfocusedonfindingproblemsinthecurrenttool,byconductinginterviewsandfocusgroups,

aswellasbyobservingusers.Theresultscontributedinbuildinganewsystem(Eresolution)byourteam

thataddressesallthecurrentissues.

Ourvisionwastodevelopasystemthatisefficient;fulfillsthefunctionsofresolutionsubmissionand

management;savesconferencememberstime,energyandeffort;isrichinfunctions;isuserfriendlyand

aestheticallyappealing;andisavailabletouseforaminimumamountofcharge.Theposterwillgivea

summaryoftheprocessstartingfromresearch,design,implementation,testinganddeliveringtoTHIMUN

Qatar.

35

Page 43: Meeting of the Minds, 2013

Current System Problems: • Very Hard to Use • Lack Supportive Functionalities• Not Visually Pleasing• Confusing and Not User Friendly

Needs & Improvement:Since the RMS is a critical success factor for the MUN conferences, the client was not satisfied about the overall system. Our team got asked to come up with better solution that maximizes the convenience of using such system and solves the current problems.

Software Development Project Electronic Resolution

Reham Al Tamime: [email protected] Jahan: [email protected]

Faculty Advisor: Maher Hakim | Information Systems

Project Overview Client:THIMUN QATARModel United Nations (MUN)

Problems Research & Data Collection: • Observations • Test Aloud Protocols • Interviews • Focus Groups

Current RMS:

SolutionE-Resolution:

System Success Attributes: User Friendly • Clear Fonts & Icons • Indicative Arrows for Steps • Interactive Help Page

System Success Attributes: Extra Features Added • Enter Votes • Admin Dashboard & Guest Page • Search Features • More Account Settings

System Success Attributes: Availability Security Aesthetic Values Added

Testing

Resolution Management System (RMS): A system that is used currently by THIMUN Qatar in order to create conferences, committees, and assign users to these conferences and committees depending on the role that they play in the conference. The system also supports differentfunctionalities such as uploading a resolution document, editing it and determining its result after conference’s debate.

Results: • 100% of sample agree that system is simple and flexible • 80% confirm that the system is very functional and helpful • 90% recognize the easiness of system use and navigation

Implementation Tools: Backend: SQLight | PostgreSQLFrontEnd:HTML | CSS | JavaScript | Bootstrap Connecting Front & Backend: Ruby on Rails

Deployment: Heroku | Amazon S3

Page 44: Meeting of the Minds, 2013

Privacy and e-commerce in the Arab Culture

AuthorMarwa Al-Fakhri (IS 2013)

Faculty AdvisorsDaniel Phelps, Ph.D. John Gasper, Ph.D.

CategoryInformation Systems and Social Sciences

AbstractThe trend of online shopping is catching on in the Arab world. This research investigates the effect ofinformation availability regarding privacy on Arab consumers’ decisionmaking whenmaking purchasingattitudes.WehypothesizethattheArabculturewill influencethedecisionmakingofArabconsumers;themoreculturallysensitivetheitempurchasedis,themoreconsumersarewillingtopayforonlineprivacywhenpresentedwithinformationabouthowprivatetheshoppingwebsitesare.Resultssupportthishypothesis,participantsexhibitedwillingnesstopayforprivacymoreonaveragewhentheywerepurchasingcigarettesthanwhentheywerepurchasingbatteries.ThefindingsofthisresearchwillgiveusabetterinsightintoArabconsumers’decisionmakingandwillbetterinformthedesignofonlinetoolsthatbetterserveconsumers’needs.

37

Page 45: Meeting of the Minds, 2013
Page 46: Meeting of the Minds, 2013

The Effect of type of Display on Conjoint Studies

AuthorsEl Houssain El Marabti (BA 2013) Marwa Al-Fakhri (IS 2013)

Faculty AdvisorPeter Stüttgen, Ph.D.

CategoryBusiness Administration

AbstractConjointanalysisisoneofthemostwidelyusedtoolsinmarketingresearchtoestimateconsumers’prefer-

ences.Thisresearchinvestigatestheaffectoftwofactors(displaytypeandeaseofdataacquisition)onthe

estimatedpreferencesinconjointanalysis.Wehypothesizethatthetypeofdisplaydoesnotaffecttherela-

tiveestimatedpreferences,butaffectsthescaleoftheestimatedparameters,assupportedbytheliterature.

Also,wehypothesizethatattributesthataremoreeasilyacquiredwillbeestimatedasbeingmoreimportant.

Usinga2x2design,wemanipulatedisplaytypebyrepresentingthechoicesetsinlistformatandinpicto-

rialformatandmanipulatetheeaseofdataacquisitionbythenumberofalternativesinachoiceset(3vs.15

alternatives).Analysisoftheresultssupportsbothhypotheses.Thefindingsofthisresearchareimportantfor

implementationofconjointanalysisstudiesinthebusinessworld.

39

Page 47: Meeting of the Minds, 2013

Options Evaluation Choices

Type of Display

Ease of info Acquisition

number of options Data

acquired

Hypotheses

Research questionDoes the presentation style and type of display of the different levels of attributes affect the outcome of conjoint studies and ease of info acquisition?

The effect of type of display onconjoint studies

Estimated relative importances

List of fifteenpictures different

than the other display methods

The graph above showsthe different distributionsof all the choices displaymethods, and shows how

different the 15 pictures listis from the others.

Literature review(LOUVIERE et al. 1987): Parks study; text vs images. Results suggest no statistical difference. (JANSEN et al. 2009): Housing study; visual vs verbal. Results show directional difference but it was ruled out due to coincidental details. (ORZECHOWSKI et al. 2005): Housing study; text vs multimedia. Results suggest no difference in relative importanceof attributes but a different scale.

Methodology

115 subjects participated in the experiment. They were randomly assigned to one of the three conditions; 3 options text, 3 options images, and 15 options text. Participants wererecruited in Education City and were compensated with 36 QR.

Data Collection - Summer 2012

AnalysisMultinomial Logit model estimated in Bayesian fashion using MCMC as implemented in the Bayesian package in R.

64 participants were recruited in Education City and were compensated with 50 QR. They were shown pictures of the options and their eye movements were tracked to see how many options they looked at before they make their finale choice.

Data Collection - Fall 2011

Estimated relative importances of the three attributes in decision making:

List of three choices

List of fifteen choices

Type of display will affect Ease of Info Acquisition. It will not affect the relativepreferences but will affect the scale.

Attributes that are easily acquired becomemore important.

List of three pictures

List of fifteen pictures

Hypothesis 1

Hypothesis 2

Researchers: El Houssain El Marabti & Marwa Al-Fakhri

Brand, 26%

Flavor, 59%

Price, 15%

Brand, 27%

Flavor, 38%

Price, 35%

Advisor: Peter Stuttgen

Page 48: Meeting of the Minds, 2013

Arab Spring Newspaper Coverage: A Comparative Analysis

AuthorsJiyda Mint Moussa (CS 2014) Sophie Qingjia Jiang (NU-Q 2016)

Faculty AdvisorDavid Emmanuel Gray, Ph.D.

CategoryGeneral Education

Abstract:TheArabSpringhasbroughtalotofinternationalattentiontodemocratizationintheArabworld.Consider-ing thatmassmediaoften is theprimarysourceof informationconcerningconflictsand revolutions, it isimportanttoexaminewhattypeofmediacoveragehasbeenaffordedtoeventsinMiddleEasternandNorthAfricannations.Inparticular,weproposeexaminingandcomparingthecoveragebyQatariEnglishnewspa-persagainstthatofnewspapersoutsideQatar.Didthesedifferentnewspapersfocusoncoveringthesamecountriesandevents?Dotheyimmediatelyrespondtoalltheimportanteventsastheyhappen?WasthereadifferenceinhowtheyfocusedonQatar’s involvement inprovidingmilitaryandfinancial assistancetocertaingroupsinvolvedintheseuprisings?ThisstudyexaminesthesimilarityanddifferencesinthenewscoverageoftheArabSpringbycomparingthereportingoftheNewyorkTimesandGuardianwiththatofQa-tar’sGulfTimesandPeninsula.WeexploredifferencesincoverageamongthesefourpublicationsintermsofsignificantArabSpringeventsandQatar’sinvolvement.

ThedatasetusedinthisstudyconsistsofarticlespublishedbetweenDecember1,2010andDecember25,2012andretrievedfromonlinearchivesoftherespectivenewspapers.Themajorityofthedatawasgath-eredviaanautomatedprocess,forwhichwedesignedacomputerprogramtoscrollthrougheachnewspa-per’sarchiveandextractthearticles.Startingwithamanuallyselectedcollectionofarticlesfromdifferentsources,wethencreatedasecondcomputerprogramto identifywhetheranygivenarticle is likely tobe“ArabSpring”related.Usingthesetwoprograms,weexaminedthefournewspapers’coverageoftheArabSpringbycomparingthenumberofarticleseachnewspaperpublisheddaily inthemonitoredtimeframe.WealsoextractedthemostvitalArabSpringeventsfromitstimelineandcontrastthecoveragefromthosefournewspapers.Finally,weanalyzedtheirextentsofcoverageonQatar’sinvolvementinSyria,especiallycontrastingthedistinctionbetweenQatar’slocalnewspapersandinternationalones.

AbreakdownofthenumberofarticlespublisheddailybyeachnewspapershowsthatintensityofArabSpringcoveragevariedoverfourconsecutivetimeperiods.Italsoshowsthatthefocusandcoveragevariedforeachnewspaperacrossthesedifferentphases.Forinstance,intheinitialphase,theNewyorkTimestooktheleadwiththemostpublishedarticleswhiletheGuardianandPeninsulafollowed.However,thePeninsulatooktheleadintheremainingphaseswiththehighestaveragenumberofarticlesperday.FortheGulfTimes,thenumberofarticleswastheleastthroughoutandneverattainedanypeak.Moreimportantly,inthefirsttwophasesweobservedthatthenon-QatarinewspapersandthePeninsulapeakatrelativelythesameintensity.However,inthelasttwophasesofthereporting,whichmostlyrelatetotheSyriancrisis,thePeninsulabreaksawayfromtheothertwonewssourcesandtheamountofcoverageradicallyincreases.ThislasttrendmayreflectQatar’spoliticalinterestinthiscrisis,atopicforfurtherexploration.

41

Page 49: Meeting of the Minds, 2013

Egyp

tLi

bya

Alg

eria

Tuni

sia

Mor

occo

Mau

ritan

ia

Om

an

Yem

en

Saud

i

Jord

an

Syria

Leba

non

Pale

stin

e

Bahr

ain

Kuw

ait

U.A

.E.

Qat

ar

Suda

n

May

- O

ct 2

012

S

yria

n M

assa

cres

< 10

00 a

rtic

les

1000

to 2

000

artic

les

2000

to 4

000

artic

les

> 40

00 a

rtic

les

NU

MBE

R O

F A

RTIC

LES

PUBL

ISH

ED A

BOU

T EA

CH C

OU

NTR

Y

NU

MBE

R O

F A

RAB

SPRI

NG

ART

ICLE

S PE

R D

AY

2010

12/0

120

110

8/1

420

110

1/2

720

1111

/23

2012

02

/06

2012

10/3

0

050

25

2012

12/2

220

1012

/01

2011

03/

01

2011

09

/01

2011

11/0

120

1210

/01

070 3520 10

2012

12/2

2

Lib

ya

Syri

a

Ara

b S

pri

ng

up

risi

ng

s ac

ross

Mid

dle

Eas

tern

an

d N

ort

h A

fric

an n

atio

ns

hav

e at

trac

ted

su

bst

anti

al m

edia

att

enti

on

wo

rld

wid

e. I

n t

his

stu

dy,

w

e ex

plo

re w

het

her

th

ere

is a

ny

no

tab

le v

aria

tio

n c

on

cern

ing

ho

w d

i�er

ent

new

spap

ers

resp

on

d t

o t

he

maj

or

even

ts o

f th

ese

up

risi

ng

s.

Gul

f T

imes

wer

e o

nly

will

ing

to

p

rovi

de

us

wit

h p

rin

ted

co

pie

s o

f th

eir

arti

cles

, bu

t th

en t

hey

wer

e al

way

s u

nav

aila

ble

for

us

to c

olle

ct t

hem

fro

m

thei

r o

�ce

s. M

ean

wh

ile, P

enin

sula

did

giv

e u

s d

igit

al c

op

ies

of

arti

cles

th

ey t

hem

selv

es

con

sid

ered

Ara

b S

pri

ng

rel

ated

bu

t th

en t

hey

d

eclin

ed t

o r

esp

on

d w

hen

ask

ed fo

r m

ore

. In

res

po

nse

, w

e w

rote

a n

ew c

om

pu

ter

pro

gra

m t

o c

olle

ct a

ll th

eir

arti

cles

in

dig

ital

form

at f

rom

th

eir

resp

ecti

ve w

ebsi

tes.

Peni

nsul

a: 3

4,02

7 a

rtic

les

do

wn

load

ed

Gul

f-Tim

es: 8

3,87

7 a

rtic

les

do

wn

load

ed

No

tab

leD

i�cu

ltie

s

We

focu

sed

on

art

icle

s p

ub

lish

ed b

y fo

ur

new

spap

ers,

New

Yor

k T

imes

, Gua

rdia

n, P

enin

sula

, an

d

Gul

f T

imes

ab

ou

t A

rab

Sp

rin

g e

ven

ts. W

e d

esig

ned

on

e co

mp

ute

r p

rog

ram

to

ext

ract

art

icle

s fr

om

th

e

web

site

s o

f th

ese

new

spap

ers

and

a s

eco

nd

pro

gra

m

to a

nal

yze

the

con

ten

t o

f th

ese

arti

cles

to

det

erm

ine

wh

ich

wer

e re

late

d t

o t

he

Ara

b S

pri

ng

. We

use

d t

hes

e

resu

lts

to c

on

tras

t th

e co

vera

ge

by

the

fou

r

new

spap

ers.

Met

ho

do

log

y

In t

erm

s o

f th

e to

tal n

um

ber

of

arti

cles

pu

blis

hed

by

fou

r n

ewsp

aper

s, S

yria

is t

he

mo

st in

ten

sely

cove

red

co

un

try,

follo

wed

by

Tu

nis

ia a

nd

Eg

ypt.

Pen

insu

la h

as t

he

mo

st c

ove

rag

e, w

her

e it

take

s th

e le

ad in

12

co

un

trie

s re

late

d t

o t

he

Ara

b

Spri

ng

.

New

Yor

k T

imes

to

ok

a le

ad in

itia

lly in

Jan

uar

y, 2

011

, wh

en p

rote

sts

beg

an in

Eg

ypt

and

Syri

a, fo

llow

ed b

y G

uard

ian

and

Pen

insu

la.

Fin

ally

, Gua

rdia

n h

ad a

sp

ecia

l in

tere

st in

cove

rin

g L

ibya

, no

t o

nly

bec

ause

it p

ub

lish

ed t

he

mo

st n

um

ber

of

arti

cles

in L

ibya

, bu

t al

so

bec

ause

it t

oo

k a

no

tab

le le

ad w

ith

rep

ort

ing

on

the

bat

tle

of T

rip

oli

in A

ug

ust

, 20

11.

Res

ult

s

Jan,

14t

h 20

11B

en A

li t

oppl

edJa

n, 2

5th

2011

Mas

s pr

otes

t in

Eg

ypt

Jan,

26t

h 20

11

Prot

est

bega

n in

Syr

iaO

ct, 2

3th

2011

Tu

nis

ian

s vo

teN

ov, 2

3th

2011

Sal

eh r

esig

nsJu

n, 2

nd 2

011

Life

sen

tenc

e fo

r M

ub

arak

Aug

, 20t

h 20

11Ba

ttle

of

Tri

po

li

Ara

b S

pri

ng

New

spa

per

Co

vera

ge

Jiyd

a M

int

Mo

uss

aC

arn

egie

Mel

lon

Un

iver

sity

jiyd

a@cm

u.e

du

Qin

gji

a J

ian

gN

ort

hw

este

rn U

niv

ersi

tyq

ing

jiajia

ng

2016

@u

.no

rth

wes

tern

.ed

uFa

culty

Adv

isor

: D

avid

Em

ma

nu

el G

ray,

Ph

.D.

Page 50: Meeting of the Minds, 2013

Let the Grades Flow!

AuthorsSyed T. Haider (BA 2014)Aveed A. Sheikh (BA 2014)

Faculty AdvisorDavid Emmanuel Gray, Ph.D.

CategoryGeneral Education

AbstractCsikszentmihalyireferstoflow,or“optimalexperience,”asastateofcompleteimmersioninmeaningfulactivity.Apersoninflowischaracterizedbyfeelingsofenjoymentorsatisfactionintheongoingprocessofthatactivity.Csikszentmihalyi’stheoryentailsthatanindividualisconsideredinflowwhentheactivity’sperceiveddifficultybalanceswiththatperson’sperceivedskills.Inordertodeterminetheimplicationsofthistheoryonstudents,weexploredtheflowphenomenoninsideaclassroomenvironment.Thisinvolvedfocusingonaparticularcoursefortheentiretyofthesemester,andgauginghowstudentskillandchal-lengescomparedanditsimplicationsontheiracademicperformanceintheclass.Themainquestionweendeavortoanswer:Arestudentsinflowbetteracademicperformersascomparedtothestudentswhoarenotinflow?

Thesamplesforthisresearchwerestudentsenrolledinthecourse“IntroductiontoLogicalReasoning”,of-feredjointlybyCarnegieMellonUniversityinQatarandNorthwesternUniversityinQatar.Aftereveryclasslecture,quiz,workshop,andexam,studentswereaskedtofilloutaone-pagesurvey.Eachsurveyresponsewasthenassignedtooneofthefollowingfourgroups:

1. Apatheticstudentsshowedalowerthanaveragescoreonchallengeandskills,2. Anxiousstudentsshowedahigherthanaveragescoreonchallengeandlowerthanaveragescoreon

skill,3. Boredstudentsshowedahigherthanaveragescorelevelonskill,andalowerthanaveragescorelevel

onchallenge,and4. Flowstudentsshowedhigherthanaveragescoreonbothchallengeandskills.

Anendofsemestersurveyalsohadstudentscomparetheircurrentabilitiesinlogictowhattheystartedwith.

Theresultsindicatedadifferenceinthegradesandperceivedlearningamongstthefourgroups.Anxiousstudentsreportedthehighestperceivedlearningdistanceamongthefourgroupsofstudents.Moreover,anxiousstudentsshowedapositivecorrelationwithrespecttoperceivedlearningdistances,whereastheotherthreegroupsshowedanegativecorrelation,withboredstudentsreportingthehighest.Theresearchfindingsevensuggestthatstudentengagementlevelintermsofbeingapathetic,bored,andanxiousorinflowaffectstheirclassperformance,withthebestperformancebeingobservedfromstudentswhoareinflow.Eventhoughsomestudentsshowedsignsofbeingapathetic,stilltheyseemedtoenjoythematerial.Similarly,apatheticstudentsshowedmoreinterestascomparedtoanxiousstudents.Weconcludethathavingastructuredclassroomenvironmentthatinitiatesflowcanhelpstudentsperformthebestinclass;astheyareengagedintheexperience,whichleadstoabetterunderstandingofthematerialandhighergrades.

43

Page 51: Meeting of the Minds, 2013

1 - Flow Csikszentmihalyi refers to flow, or “optimal experience”, as a state of complete immersion in meaningful activity. According to this theory, an individual is considered in flow when the activity’s perceived difficulty balances with that person’s perceived skills.

4 - Approach After every class lecture, quiz, workshop, and exam, CMU-Q & NU-Q students enrolled in the course “Introduction to Logical Reasoning” were asked to fill out a one-page survey. Each survey response was then assigned to the four groups after calculating the relative z - scores – Flow, Anxious, Apathetic, or Boredom.

Let the Grades Flow! Aveed Sheikh [email protected] Faculty Advisor: David Emmanuel Gray, Ph.D

Syed Tanveer Haider [email protected]

2 - Assumptions In this research study, we are analyzing whether students in flow perform better in class as reflected through their grades and whether these students show a greater learning distance than anxious, apathetic or bored students.

3 - Hypothesis We predict that students, on average, perform better at academics when they are in flow.

5 - Results 0.00 - 0.99: R; 1.00 - 1.99: D; 2.00 - 2.99: C; 3.00 - 3.99: B; 4.00 - 4.99: A

Anxiety Flow

Apathy Boredom

Correlation Coefficient Flow Anxiety Boredom Apathy

Learning Distance -0.016 0.33 -0.31 -0.085

Challenge

Skill

6 - Conclusions Bored students report the highest average grades followed by students who experience flow. The lowest grades were reported by the anxious students. Bored students and those in flow performed the best within all learning channels. Finally, only anxious students showed a positive correlation with perceived learning distances.

7 - Further Work In the future, we hope to extend this research into analyzing similar results in other courses offered at CMU-Q, NU-Q or other universities. The results from the research study also suggest that we need to build a platform that can track and provide immediate feedback to the course instructor on how students are performing in a particular course. Such a platform will help him/her better design the course and structure the classroom in a manner that initiates flow in students, whereby enhanc-ing their learning experience and overall performance.

* A larger mean count represents more engagement. (Mean count ranges from 0-4)

8 - References Csikszentmihalyi, M. Flow: The Psychology of Optimal Experience. New York: Harper and Row.

Page 52: Meeting of the Minds, 2013

Decentralized Execution of Multiset Rewriting Rules for Ensembles

AuthorEdmund Lam, Ph.D.

Faculty AdvisorIliano Cervesato, Ph.D.

CategoryPostgraduate

AbstractParallelanddistributedprogrammingiswidelyknowntobeanotoriouslydifficultendeavorandthesearchfor

moreeffectiveparallelanddistributedprogrammingmethodologiesrageson.Inthispresentation,weexplore

exploitingtheconcurrentanddeclarativenatureofmultisetrewritingasahigh-levelprogrammingmodelto

expresscomplexsynchronizationbehaviorsamonganasynchronous“soup”ofabstractcomputationunits

thatwecallanensemble.

Specifically, we introduce CHR^e, a concurrent committed-choice rule-based language based on core

principlesofconstraintmultiset rewriting.Wehighlight the technicalchallenges involved indevelopingan

effectivedecentralizedexecutionofCHR^e,andbrieflyhighlightouroperationalsemanticsofCHR^ethat

guarantees completeness of distributed multiset rewritings while computing rule matches incrementally.

Whilethisproject isatatheoreticalandprototypingphase,wediscussthefutureworksthatwilltakeour

worktothedomainofappliedresearchanddevelopment.

45

Page 53: Meeting of the Minds, 2013

Decentralized Execution of Multiset Rewriting Rules for EnsemblesEdmund S. L. Lam and Iliano Cervesato Carnegie Mellon University, Qatar

1. Challenges of Parallel and Distributed Programming

� A notoriously laborious and difficult endeavor� Wide range of technical difficulties (e.g. deadlock, atomicity, fault-tolerance).� Traditional computational problems (e.g. correctness, completeness, termination).� While ensuring scalability and performance effectiveness.

� Open research problem:� Distributed programming frameworks (e.g. Map reduce [DG08], Graph Lab

[LGK+10], Pregel [MAB+10], Mizan [KKAJ10])� Distributed programming languages (e.g. Erlang [AV90], X10 [SSvP07], NetLog

[GW10], Meld [CARG+12])� High-level programming abstractions (e.g. Join Patterns [TR11], Parallel CHR

[LS11])� We seek an approach that is declarative, based on logical foundations,

expressive and concise.� Motivated by chemical reaction equations:

6CO2 + 6H2O → C6H12O6 + 6O2

2. Introducing Rule-Based Multiset Rewriting

� Constraint Handling Rules (CHR) [Fru98]� Rule-based constraint logic programming language.� Based on multiset rewriting over first order predicate terms, called CHR constraints.� Concurrent, committed choice and declarative.

� CHR programs consist of a set of CHR rules of the following form:r : P \ S ⇐⇒ G | B

� Informally means: If we have P and S such that G is satisfiable, replace S with B.� Example: Greatest common divisor (GCD)

base : gcd(0) ⇐⇒ truereduce : gcd(N) \ gcd(M) ⇐⇒ 0 < N ∧ N ≤ M | gcd(M-N)

�gcd(9), gcd(6), gcd(3)� reduce : gcd(6)\gcd(9) ⇐⇒ 0 < 6 ∧ 6 ≤ 9 | gcd(3)� �gcd(3), gcd(6), gcd(3)� reduce : gcd(3)\gcd(6) ⇐⇒ 0 < 3 ∧ 6 ≤ 9 | gcd(3)� �gcd(3), gcd(3), gcd(3)� reduce : gcd(3)\gcd(3) ⇐⇒ 0 < 3 ∧ 6 ≤ 9 | gcd(0)� �gcd(0), gcd(3), gcd(3)� base : gcd(0) ⇐⇒ true

� �gcd(3), gcd(3)� reduce : gcd(3)\gcd(3) ⇐⇒ 0 < 3 ∧ 6 ≤ 9 | gcd(0)� �gcd(0), gcd(3)� base : gcd(0) ⇐⇒ true

� �gcd(3)�

3. CHRe, Distributed Multiset Rewriting for Ensembles

� Elements are distributed across distinct locations (k1, k2, etc..), eachpossessing its own multiset of elements.

�edge(k2, 1), ..�@k1 ←→ �edge(k1, 2), edge(k3, 8), ..�@k2

↖ ↓�edge(k1, 10)�@k3

� Rewrite rules explicitly reference the relative location of constraints:base rule : [X]edge(Y ,D)\. ⇐⇒ [X]path(Y ,D).elim rule : [X]path(Y ,D1)\[X]path(Y ,D2) ⇐⇒ D1 < D2 | true.trans rule : [X]edge(Y ,D), [Y]path(Z ,D′) ⇐⇒ X!=Z | [X]path(Z ,D + D′).

[l]c specifies that matching c is located at l .� Rewrite rules can specify “local” rewriting:

�edge(k2, 1), path(k2, 1), path(k2, 10)�@k1 ...

� �edge(k2, 1), path(k2, 1)�@k1 ... [k1]path(k2, 1)\[k1]path(k2, 10) ⇐⇒ 1 < 10 | true.

� Rewrite rules can specify link-restricted rewriting:�edge(k2, 1), ..�@k1 ←→ �path(k3, 8), edge(k1, 2), edge(k3, 8), ..�@k2

↖ ↓�edge(k1, 10)�@k3

��edge(k2, 1), path(k3, 9), ..�@k1 ←→ �path(k3, 8), edge(k1, 2), edge(k3, 8), ..�@k2

↖ ↓�edge(k1, 10)�@k3

[k1]edge(k2, 1), [k2]path(k3, 8) ⇐⇒ k1!=k3 | [k1]path(k3, 9)

4. Example: Parallel Mergesort

Parallel mergesort: Assumes tightly coupled ensembles (multicore,shared memory, etc..)[X]unsorted([I]) ⇐⇒ [X]sorted([I]).[X]unsorted(Xs) ⇐⇒ len(Xs) > 2 | exists Y . exists Z . let (Ys, Zs) = split(Xs).

[Y]parent(X), [Y]unsorted(Ys), [Z]parent(X), [Z]unsorted(Zs).[X]sorted(Xs), [X]parent(Y ) ⇐⇒ [Y]unmerged(Xs).[X]unmerged(Xs1), [X]unmerged(Xs2) ⇐⇒ [X]sorted(merge(Xs1,Xs2))

� New locations “dynamically” created to solve sub-problems.� completed sub-problems are transmitted to the “parent” location.

5. Example: Distributed Hyper-Quicksort

Distributed Hyper-Quicksort: Assumes loosely coupled ensembles(network, message passing interface, etc..)

- - “Local” sorting algorithm Parallel merge sort rules...

- - Distributed Hyper quicksort rules[X]sorted(Xs), [X]leader()\[X]leaderLinks(G) ⇐⇒ len(G) > 1 |

let LG,GG=split(G). [X]leaderLinks(LG),[head(GG)]leader(), [head(GG)]leaderLinks(GG),{[Y]median(Xs[len(Xs)/2]) | Y in G}{[Y]partnerLink(Z) | Y , Z in zip(LG,GG)}

[X]median(M), [X]sorted(Xs) ⇐⇒ let Ls,Gs=partition(Xs,M).[X]leqM(Ls), [X]grM(Gs)[X]partnerLink(Y ), [X]grM(Xs), [Y]leqM(Ys) ⇐⇒ [X]leqM(Ys), [Y]grM(Xs)[X]leqM(Ls1), [X]leqM(Ls2) ⇐⇒ [X]sorted(merge(Ls1, Ls2))[X]grM(Gs1), [X]grM(Gs2) ⇐⇒ [X]sorted(merge(Gs1,Gs2))

� Data (unsorted numbers) initially distributed across 2n locations.� In termination (quiescence), 2n locations are in total order.

6. Main Challenges

� Effective execution of multiset rewriting in decentralized context:� Incremental matching� Termination on quiescence� Interrupt (event) driven matching

� Execution of link-restricted rewrite rules is non-trivial:[X]partnerLink(Y ), [X]grM(Xs), [Y]leqM(Ys) ⇐⇒ [X]leqM(Ys), [Y]grM(Xs)� Requires that locations X and Y rewrites respective multisets atomicity .� In general (n locations involved), its essentially n-consensus problem.

� Designing effective mappings from locations to computation resources� Initialization: How are “locations” distributed across actual distributed system?� Load-balancing: How are dynamically created “locations” distributed?

� Designing the Language:� What are the minimal core language features?� What extended language features do we need?� What kind of type safety guarantees can we provide?

� Existing woes and challenges of distributed programming:� Fault tolerance and recovery.� Serializability of distributed execution.

7. Current Contributions and Results

� Developed an operational semantics for 0-link restricted rewriting� Based on CHR refined operational semantics [DSdlBH04].� Decentralized, Incremental, interrupt driven execution.� Proven soundness and completeness (exhaustiveness) of rewriting

� Formalized encoding of n-link restricted rewriting into 0-link restrictedrewriting� Based on 2 Phase commit n-consensus protocol [ML85].� Optimized encoding for 1-link restricted rewriting� General encoding for n-link restricted rewriting

� Prototype implementation� Implemented in Python, decentralized execution via OpenMPI bindings and thread

scheduling via multi-threading libraries.� CHR based optimization of multiset matching (e.g. optimal join ordering, indexing

for non-linear patterns, early guard scheduling)� Basic resource mapping: Initial locations mapped to OpenMPI nodes, dynamically

created locations mapped to threaded computation at source of creation.

8. Future Works

� Finalizing language design and high performance implementation� C, C++ or Haskell(GHC) as source language� Improving high-level feature encodings� Explore implementation via Pregel [MAB+10] or Mizan [KKAJ10].

� Improve language design� Aggregates, linear comprehensions, Datalog style retraction� Extending core language� New features via encoding in core language

� Dealing with unreliable communications and faulty computationresources� Fault tolerance backends and fault recovery interfaces� Improved n-link restriction encodings (via 3 Phase commit [KD95] or Paxos

Algorithm [Lam98])

∗ Funded by the Qatar National Research Fund as project NPRP 09-667-1-100(Effective Programming for Large Distributed Ensembles)

http://www.qatar.cmu.edu/˜sllam/ [email protected]

Page 54: Meeting of the Minds, 2013

ClusterLoc: Exploiting Short Range Wireless Technologies for Energy Efficient Localization

AuthorMohammed Tarek Abdellatif

Faculty AdvisorKhaled Harras, Ph.D.

CategoryPostgraduate

AbstractWith the ubiquity of WiFi-enabled smartphones, and large-scale access point deployment, WiFi-based

localization isoneof themostpromising indoor localizationsystems.ExistingWiFi localizationsolutions,

however, exhibit high power demand due to the periodic updates required, which raises the barrier for

deploymentsincebattery life isacrucial resource. In thisposter,weproposeacluster-based localization

algorithm, integrate it with our GreenLoc architecture, and evaluate its performance via simulation and

prototypeimplementation.

Wedesignand implementaproximity-basedclusteringalgorithm(CLoc)asarepresentativestrategythat

weintegratewithGreenLoc.CLocuseslowenergywirelesstechnologies,suchasBluetooth,todetectand

clusterindividualsmovingtogether.Itthenassignsagrouprepresentativetoactasadesignatedcluster-head

(CH)thatwouldbeconstantlytracked.Thelocationofothergroupmembersistheninferredsolongasthey

remainwithinproximityofthecorrespondingcluster-head.CLocdynamicallyhandlesthemergerorsplitting

ofclustersasaresultofmobility.

WeimplementaprototypeofGreenLocandtestitsoperationoverdifferentAndroiddevices.Wealsoevaluate

theimpactofourarchitecturebystudyingtheperformanceofourproposedCLocstrategyinourprototypeas

wellasviatheQualNetsimulatortoobtainmorescalableresults.Ourinitialresultsshowthatwecanachieve

upto60%energyreductionwitharelativelysmalldegradationinlocalizationaccuracyaveraging2meters.

Thisaccuracyreductionisnon-impactfulgiventhetypicalapplicationsexpectedtoleverageoursystem.

47

Page 55: Meeting of the Minds, 2013

I. LOCALIZATION APPLICATIONS

Exploiting Short Range Wireless Technologies For Energy Efficient Localization

M.Tarek Abdellatif, Abderrahmen Mtibaa, and Khaled A. HarrasCarnegie Mellon University Qatar

II. MOTIVATION

III. SYSTEM ARCHITECTURE

IV. SIMULATION SETUP IV. SIMULATION RESULTS

Ran

dom

way

poi

ntG

roup

mob

ility

VII. CONCLUDION & FUTURE WORK

References

The Cloc clustering algorithmThe GreenLoc architecture

Indoor LocalizationVarious technologiesApplications:

• School campus• Guided tours of museums• Social networking• Hospitals Different energy saving strategies [2]

Outdoor LocalizationDominated by GPSApplications:

• Navigation & Tracking of assets• Social networking• Calling a cab• Emergency road side assistance

The impact of the mobility model and clustering range on localizationerror and average power consumption [4]

The impact of mobility on Ploc, Cloc,and MCLoc

The impact of various joining and splittingconfidences on ALE and APC

We implement a prototype of GreenLoc [5] thatcomprises of three parts: (i) a generic localization server Ploc(ii) the GreenLoc architecture implementing CLoc and (iii)GreenLoc mobile client.

We test CLoc using 5 android devices; Samsung GalaxySI, Samsung Galaxy SII, and 3 Google Nexus One phones, allrunning the Android OS 2.3.

Normalized APC from CLoc when compared with PLoc.

• We achieve 60% reduction in localizationenergy per node with 28% accuracydegradation averaging 2 meters.

• Indoor Localization Architecture• We introduced a novel way to track

representative nodes using clustering.• Prototype implementation.• Large-scale testing.• Utilizing social data to improve clustering.• Power consumption fairness across

nodes.

Time = 0 mins

Time = 20 mins

Parameters Table

Metrics Table

VI. PROTOTYPE IMPLEMENTATION

Equations for ADE and APC

Scenario Outline

[1] Qualnet 5.0. http://www.scalable-networks.com.[2] Chuang wen You, Yi-Chao Chen, Ji-Rung Chiang, P. Huang, Hao hua Chu, and Seng-Yong Lau. Sensor-enhanced mobility prediction for energy-efficient localization. In SECON, 2006. [3] Moustafa Youssef and Ashok Agrawala. The Horus WLAN Location Determination System. In ACM Journal of Wireless Networks (WINET), 14:3 June 2007. [4] R. Friedman, A. Kogan, and Y. Krivolapov. On power and throughput tradeoffs of wifi and bluetooth in smartphones. In INFOCOM, 2011. [5] M. Abdellatif, A. Mtibaa, K . Harras, and M. Youssef. GreenLoc: An Energy Efficient Architecture for WiFi-based Indoor Localization on Mobile Phones. In ICC, 2013.

Simulation results using the Qualnet network simulator [1]

Page 56: Meeting of the Minds, 2013

Performance and Cost Analysis of MapReduce Applications on Public Clouds

AuthorFan Zhang, Ph.D.

Faculty AdvisorMajd Sakr, Ph.D.

CategoryPostgraduate

Abstract:TheMapReduceprogrammingmodelisawidelyacceptedsolutiontoaddresstherapidgrowthofbig-data

processingdemands.variousMapReduceapplicationswithaverylargevolumeofinputdatacanrunonan

elasticcomputecloudcomposedofmanydistributedcomputinginstances.Apubliccloudprovider,suchas

AmazonEC2,offersaspectrumofcloudresourceswithvaryingcosts.Clouduserstypicallyrenttheseelas-

ticcloudresourcesasvirtualmachines(vMs)inapay-as-you-gomodeltohaveaccesstolargescalecloud

resources.However,differentapplicationsscaledifferentlybasedontheirtype,behaviorandeffectiveuseof

resourcesavailable.

In thiswork,weattempt tocharacterizehowMapReduceperformance isaffectedby increasedcompute

resources foravarietyofapplication types.Since resourcesonpubliccloudsare rented,wecarryouta

performancecostanalysisinordertoassesstheefficiencyofasuiteofMapReduceapplicationsatutilizing

arangeofcomputeresources.Theseapplicationsspanacrossdata-andcompute-intensivebenchmarks.

Throughempiricalevidence,weobserveawidevariationinspeedup(5.2Xto36.7X)

andcost(3.6Xto9.7X),acrosstheapplicationswhentheclustersizeisincreasedto64

vMs.Map-intensiveapplications,suchasTermvectorandGrep,showahigherspeedupasweincreasethe

numberofvMswithoutasignificantincreaseincost.However,reduce-intensiveapplicationssuchasSort

exhibitlimitedspeedupandhencecostalotmoresincemoreresourcesareutilizedforalongerperiod.Given

thiswidevariation,wemeasuretheefficiencyofapplicationstoutilizecomputeresourcesasthenumberof

vMsisscaledfrom1to64.WeobserveanegativeslopeinefficiencyasthenumberofvMsisincreased

acrossallapplications.At64vMs,theapplicationefficiencyrangeisfrom57%downto8%.Someapplica-

tions,suchasSort,exhibita

steepnegativeslopeinefficiencywhenthenumberofvMsisincreasedfrom2to4.WordCountmaintainsa

highefficiencyat4vMsbutexhibitsasteepnegativeslopewhenincreasingthevMsto8onwards.Grepon

theotherhandexhibitsaslightbutsteadynegativeslopefrom2to64vMs.Theefficiencyofanapplication

canguidecloudusersinchoosingappropriatecomputingresourcesbasedoncomputeresourcebudgets

anddeadlines.

49

Page 57: Meeting of the Minds, 2013

Fan Zhang School of Computer Science, Carnegie Mellon University in Qatar

{fanzhan1, msakr}@qatar.cmu.edu

Majd Sakr

Characterization of MapReduce Applications on Private and Public Cloud Platforms

Hadoop MapReduce Framework MapReduce Application Types

Characterization on a Public Cloud Platform

Future Work 1. Build a compute cluster with varied bandwidth to further verify the network-

demanding characteristics of Reduce-intensive applications.2. Develop a viable performance model, which takes into account the Map- and

Reduce-intensive phases, and incorporates the impact on performance and cost.3. Employ a larger cluster on both private and public cloud platforms to evaluate more

diverse benchmark applications across a variety of input data sets.

Characterization on a Private Cloud Platform

Conclusion 1. Performance of Map-intensive applications is highly dependent on the capacity of the

compute resources provisioned. Increasing the number of Map tasks will lead toimproved performance if sufficient resources exist to enable concurrency.

2. Performance of Reduce-intensive applications is highly dependent on the capacity ofthe network substrate to shuffle intermediate data in the Reduce phase.

3. A wide variation is observed in speedup and cost across applications whenprovisioning larger clusters – 4X speedup at 10X cost to 36X speedup at 5X cost. Weattribute this variation to the efficiency of applications to utilize cloud resources.

Public Cloud Platform

Performance

Cost

Cost Performance

Scalability Efficiency

Private Cloud Platform vCPU Memory Timeline Analysis

Map Reduce Input Data

Map Reduce

Shuffled Data

Output Data

Input Data

Map-intensive Application: WordCount

Reduce-intensive Application: Sort

Shuffled Data

Output Data

Local I/O Network Network

Local I/O Network Network

Page 58: Meeting of the Minds, 2013

The QALB Project: Building Resources and Systems for the Automatic Correction of Arabic Text

AuthorsWajdi Zaghouani, Ph.D.

Faculty AdvisorBehrang Mohit, Ph.D.

CategoryPostgraduate

AbstractWepresentourefforts inbuildingQALB,TheQatarArabicLanguageBankofedits.Thefirstgoalof this

projectistocreatealargecorpus(approximately2millionwords)ofhuman-correctedArabictextproduced

bynativespeakers,non-nativespeakers,andmachines.Theannotatedcorpuswillprovidetrainingdatafor

futurestatisticalArabicerrorscorrectiontools.

InordertobuildtheQALBcorpus,wecreatedcomprehensiveArabicerrorsannotationguidelinestobeused

bytheteamofannotatorsandvolunteersparticipatinginthisproject.Furthermore,wecreatedaweb-based

annotationtoolandanannotationworkflowmanagement interfacetobeusedduringthisproject.Wewill

demonstratethecurrentannotationframeworkandtheoutcomeofthepilotannotationphaseoftheproject.

OncetheQALBcorpusisready,weplantobuildanautomaticArabicerrorscorrectionframework.

ThisprojectissupportedbyNPRPgrant4-1058-1-168fromQatarNationalResearchFund(QNRF).

51

Page 59: Meeting of the Minds, 2013

The QALB Project:

1. Problem StatementHow can we fix automatically the errors found in Arabic text ? How can we improve the English-Arabic machine translation output ?

2. Solution Build resources and systems for the automatic correction of various Arabic text.

Wajdi Zaghouani [email protected] [email protected] [email protected] [email protected]

Behrang Mohit Ossama Obeid

5. QALB ANNOTATION Guidelines Requirement : comprehensive and coherent annotation guidelines which cover: Spelling Errors Punctuation Errors Lexical Errors Morphology Errors Syntactic Errors Dialectal Usage Correction

6. Annotation Tool Intuitive interfaces for:

• Correcting errors.• Move, merge, split, insert words• Managing annotation workflow.

Automate simple corrections.

Building Resources and Systems forthe Automatic Correction of Arabic Text

4. QALB Corpus Machine Translation output. Native speaker errors (eg. dialectal words). Non-native speaker errors. Student essays

7. Ongoing Progress

Acknowledgement This research was supported by Qatar NationalResearch Fund (QNRF), NPRP grant 4-1058-1-168

Kemal Oflazer

3. The QALB (Qatar Arabic Language Bank ) ProjectThe project is composed of two components: Corpus of Arabic error corrections. Automatic correction tool for Arabic.

Annotation Automatic Correction Tool

Contributing to a research effort on improving Arabic digital content.

Requirement: high school level Arabic knowledge.

8. Summer job opportunity

Figure 3: The QALB annotation screen. Figure 4: The QALB annotation pipeline.

Figure 5: Split word correction example.

Figure 6: Word correction functions.

Page 60: Meeting of the Minds, 2013

Type-Based Productivity of Stream Definitions

AuthorJorge Luis Sacchini, Ph.D.

CategoryPostgraduate

AbstractInfinitedatastructuresareusedfordefiningnon-terminatingprocessessuchaswebservers,operatingsys-

tems,ornetworkprotocols.Aprimeex-ampleofaninfinitedatastructureisastream,whichrepresentsan

infinitesequenceofelements.

Adesirablepropertyofastreamdefinitionisproductivity.Astreamdefinitionisproductiveifcomputingany

ofitselementstakesafiniteamountoftime.Inotherwords,productivedefinitionscannotgetstuck.

Proofassistantsand theoremproversenforceproductivityofstreamdefinitions inorder toensure logical

consistency.However,theyusuallyrelyonsyntacticmethodsthatarerelativelyrestrictiveanddifficulttouse.

Inthisworkweproposeatype-basedmethodforensuringproductivityofstreamdefinitions,whichismore

expressiveandintuitivethanthesyntactic-basedmethodsnormallyused.Furthermore,type-basedmeth-

odsarecompositional,whicheasesthetaskofdevelopinglargespecifications.Weextendedtheunderlying

theoryof theCoqproofassistantwitha type-basedproductivitycheckerandshowed that theapproach

preservessoundness(i.e.logicalconsistency).

53

Page 61: Meeting of the Minds, 2013

•••

•server :: Requests → Answersserver(ClientReq : reqs) = ServerAns : server reqs

•server :: Requests → Answersserver(ClientReq : reqs) = server reqs

•server :: Requests → Answersserver(CReq : reqs) = if (overloaded)

then server reqselse SrvAns : server reqs

� ��

� ��

Page 62: Meeting of the Minds, 2013

Formorethanacentury,CarnegieMellonUniversityhasbeeninspiring

innovationsthatchangetheworld.Consistentlytopranked,Carnegie

Mellonhasmorethan12,000students,90,000alumniand5,000faculty

andstaffglobally.

In2004,QatarFoundation invitedCarnegieMellon to joinEducation

City,agroundbreakingcenter forscholarshipandresearch.Students

frommorethan40differentcountriesenrollatourworld-classfacilities

inEducationCity.

Carnegie Mellon Qatar offers undergraduate programs in biological

sciences, business administration, computational biology, computer

scienceandinformationsystems.CarnegieMellonisfirmlycommitted

to Qatar’s National vision 2030 by developing people, society, the

economyandtheenvironment.

Learnmoreatwww.qatar.cmu.edu

Page 63: Meeting of the Minds, 2013
Page 64: Meeting of the Minds, 2013

P. O . B o x 2 4 8 6 6 | E d u c a t i o n C i t y, D o h a , Q a t a r | P h : + 9 7 4 4 4 5 4 8 4 0 0 | F a x : + 9 7 4 4 4 5 4 8 4 1 0 | w w w. q a t a r. c m u . e d u