Bruin Innovation & Technology - Volume 1, Spring 2011

Page 1

B I T

VOLUME 1

|

SPRING 2011

|

B R U I N I N N O VAT I O N & T E C H N O LO GY


SPONSORS Vijay Dhir Dean, Henry Samueli School of Engineering & Applied Science

ENGINEERING GRADUATE STUDENTS ASSOCIATION Asad Madni President, Engineering Alumni Association

SPECIAL THANKS

Frank Chang Chair, Electrical Engineering Department

Jiun-Shyan (JS) Chen Chair, Civil & Environmental Engineering Department Karl Holmes Management Services Officer, Civil & Environmental Engineering Department Richard Korf Vice Chair, Computer Science Department

Adrienne Lavine Chair, Mechanical & Aerospace Engineering Department

Janet Lin Administrative Assistant, Electrical Engineering Department

FIRST PITCH The Technocrat. Our world is becoming more dependent on the impact that their

innovations have on new and emerging technologies. Yet a great paradox has emerged: the

more dependent our world has become on the technocrat’s innovations, the more mysterious the technocrat has become to the masses. Part of that is the inherent complexity of

their creations. Part of that is also the complexity with which they convey how their crea-

tions were actualized. The Bruin campus is a microcosm of this world. Herein lay the need for Bruin Innovation & Technology Magazine.

How do Bruin engineers and technologists think, and what is their workflow? What

are their specific research projects that will have a significant impact on new and emerg-

ing technologies? How can a “non-expert” be able to interact, assist, and collaborate with these technocrats on specific projects, initiatives, and ventures? BIT Magazine serves to

answer all of these questions for each customized member of the Bruin Family. BIT is for you, whether you are in another field, employed at UCLA, considering applying, involved as an alumnus, or looking to invest in new, developing ideas.

BIT personifies the “True Bruin” values and, more specifically, epitomizes the mis-

Harold Monbouquette Chair, Chemical & Biomolecular Engineering Department

sionary pillars of our great university: Access, Affordability, and Opportunity. BIT serves to

STAFF

comprehensible, and jargon-less manner. BIT has no subscription cost, is available online,

Jens Palsberg Chair, Computer Science Department Managing Editors Jamal Madni Neil Tilley

Graphic & Layout Designer Michelle Tu Contributing Writers Jong Hoon Ahnn Navid Amini Rahul Basava Jeff Chang Fang Gong Derek Kulinski Chenni Qian Tanuj Thapliyal Sarah Warren Wenyao Xu Zhenkai Zhu

provide access to the technological developments happening on our campus in a simple,

and is free to any reader. Finally, BIT is a specific mechanism providing opportunity for a student-centric entrepreneurial culture and cross-disciplinary collaboration.

We look forward to BIT being embedded in Bruin culture for many years to come. Let the dialogue begin.

Sincerely,

Photography Director Peyman Nazarian Special Advisor Stacey Meeker

HTTP://ENGINEER.UCLA.EDU JMADNI@UCLA.EDU TILLEYNS@CS.UCLA.EDU

Jamal A. Madni

Neil Tilley

MS Electrical Engineering, MS Biomedical Engineering Co-Founder & Managing Editor BIT Magazine

MS Computer Science Co-Founder & Managing Editor BIT Magazine


CONTENTS 04

A Brain-Computer Interface to Help the Elderly Reduce the Risk of Falling

BY WENYAO XU AND FANG GONG

10

The Dean’s Corner

WITH VIJAY DHIR

14

Designing Applications Using Named Data Networking

22

Entrepreneurial Opportunities from the Other Side of Campus

BY JEFF CHANG

24

A Wireless Home Automation System for Childhood Obesity Prevention

BY NAVID AMINI

34

TEC: A Training Ground That Brings the Universe to our University

BY TANUJ THAPLIYAL

36

Innovative Design Method Creates New Varieties of Rotary Engines

BY SARAH WARREN

48

The Social Network is Everywhere in Engineering—What to Read? With Whom to Work? Where to Publish?

BY JONG HOON AHNN

56

BY RAHUL RAO BASAVA, DEREK KULINSKI, CHENNI QIAN, AND ZHENKAI ZHU

Well...

Bruin Innovation & Technology (ISSN [TBA]), Volume 1, Spring 2011, is published two times a year at the University of California, Los Angeles, UCLA Henry Samueli School of Engineering and Applied Science, 7256 Boelter Hall, Box 951600, Los Angeles, California, 90095-1600. Annual subscription $10.00 domestic, $15.00 foreign air mail; single copies $5.00. Send subscriptions to UCLA Engineering, Office of External Affairs, 7256 Boelter Hall, Los Angeles, CA 90095. Third class postage paid at Los Angeles, CA. All rights reserved. No part of BIT may be printed without specific permission. Some parts of this publication are available electronically at http://www.engineer.ucla.edu/visitor-links/current-students/bit-magazine. As a publication of UCLA HSSEAS, BIT carries authorized advertisements about offerings of the school. The school assumes no responsibility for opinions of contributors on other subjects. © 2011, University of California, Los Angeles. Published by UCLA Engineering and the Engineering Alumni Association. Telephone 310-206-0678. Editorial control is retained by the editorial staff of BIT.

Advertising in BIT does not indicate an endorsement by UCLA HSSEAS.


A BRAIN-COMPUTER INTERFACE TO HELP THE ELDERLY REDUCE THE RISK OF FALLING Wenyao Xu, Computer Science, and Fang Gong, Electrical Engineering

MANY ELDER PEOPLE OVER 65 ARE AT HIGH RISK OF FALLING BECAUSE OF THEIR GENERAL FRAILTY AND MULTIPLE PATHOLOGIES. Falls are reported by one third of all people

these assistive devices also introduces a negative

death. Recently, the number of elderly people with a

ple who suffer from cognitive disability because of

65 and older and have become a leading cause of

fall-induced injury has increased dramatically. The corresponding health costs for fall-related medical

treatments such as fractures, open wounds, and

head traumas has risen from $20 billion in 2006

to $23 billion in 2010. As such, injuries due to falls also account for large health care costs and have

become one of the most significant concerns in geriatry. Therefore, a smart and low-cost solution of fall prevention for the elderly is urgently sought.

The most promising approach for fall preven-

tion is a wearable assistive system which can detect

tations are being overcome with the advancement of sensing technology, especially with emerging,

wearable sensors. The novel sensing technology can dramatically reduce the footprint of traditional

sensors and thereby integrate them into plastic, paper, and even fabric materials. With wireless communication and computing technology, these wearable assistive systems can be used by individuals comfortably and non-invasively.

Moreover, recent studies empirically prove

that many mental and physiological signals such as

for health care support with such wearable assis-

covered surprisingly that brain waves, or brain sig-

tive devices in their daily lives. However, the use of VOLUME 1 / SPRING 2011

age or due to other causes. Fortunately, these limi-

and forecast the risk of falling, given the fact that over 4 million individuals in the United States pay

4

influence of an additional cognitive burden for peo-

brain waves are also related to falls. They have disnals, can offer a better solution for forecasting falls


in terms of promptness and accuracy. As shown

in Figure 1, there is a significant anomaly in EEG signals about 3 seconds prior to the fall [1]. Therefore, it is possible to assess “fall risk” and activate

fall prevention measures through pre-warning patterns from EEG signals.

Three UCLA graduate students, Wenyao Xu,

Fang Gong, and Ju-Yueh Lee, led by Professor Majid Sarrafzadeh from the Wireless Health Institute and Professor Lei He from the Electrical Engineering Department, have invented a low-cost, lightweight,

wearable device to record the brain waves (socalled “brain computer interface” or BCI) and further interpret them for fall-prevention purposes.

THEREFORE, IT IS POSSIBLE TO ASSESS “FALL RISK” AND ACTIVATE FALL PREVENTION MEASURES THROUGH PRE-WARNING PATTERNS FROM EEG SIGNALS. have been built to capture brain waves and interpret them to meaningful thoughts.

In more recent decades, scientists have tried

OVERVIEW OF BRAIN COMPUTER

various methods to decode these mysterious brain

in 1912 through the use of Electroencephalograms,

parts: a signal acquisition module and a data min-

INTERFACE SYSTEM

Brain waves were first scientifically observed

or EEGs, as a kind of bioelectric potential related to the thoughts of a human. In the 1970s, scientists at UCLA began their research on a brain computer interface (BCI). This project received a grant from

the National Science Foundation (NSF) and DARPA. Through this grant program, several BCI systems

signals. This is known to be a complicated and expensive task. Traditional BCI systems include two

ing module. Conventional scalp BCI systems are

cumbersome and uncomfortable. Dozens of elec-

trodes corresponding to different channels need to be deployed on the scalp with a conductive gel

or paste. Moreover, the scalp area needs to be prepared ahead of time to remove dead skin cells, all of

FIGURE 1 BRAIN SIGNAL, INCLUDING: ORIGINAL OUTPUT MEASUREMENTS IN A FALL OCCURRENCE (TOP), EVOLUTION OF MEAN VALUES (MIDDLE), TIME-FREQUENCY PLOT SHOWING THE POWER CHANGES DURING A TRANSITIONTO-FALL STAGE (COLORED). (COURTESY S. SLOBOUNOV [1])

BRUIN INNOVATION & TECHNOLOGY

5


plications for this device.

The smart headset can be worn on the head

but does not restrict a user’s activity because it uses wireless communication. After a user puts a

headset on, it acquires the user’s brain waves via

a sensor on the forehead, passing the captured signals to a data analysis module where the brain

waves can be deciphered for the detection of meaningful signals.

Most importantly, the headset is very light-

weight, weighing in at a mere ten grams. Additionally, it is affordable, costing about $19. By contrast,

a conventional BCI system costs thousands of dol-

lars and weighs hundreds of kilograms. Therefore, the new BCI device, properly marketed, will be

FIGURE 2

more accessible and affordable to more people.

ENGAGED WEARABLE BCI SYSTEM

which is obtrusive and inapplicable for daily use in fall prevention. Furthermore, for the sake of signal

integrity, sampling rates of conventional scalp BCI

systems can be up to 20 kHz in research applications, and the recorded EEG signal data can be as

large as 1 gigabyte per day. As such, it is highly challenging to process an EEG data stream for fall prevention in real-time applications, and efficient signal processing algorithms are critical. Additionally, conventional BCI systems are obtrusive and not

suitable for daily use, especially considering their unaffordability for most people.

two parts, a client end and a server end. The client end goes with the user for bio-signal sensing, computing, and transmitting. The server end is for min-

ing the received data. Figure 3 shows the stackedlayer architecture of client and server, where Figure 3(a) is the structure of the client, and Figure 3(b) is the structure of the server.

Client The client part consists of four layers: the

sensing layer, actuating layer, middleware layer,

ers have developed a new, wearable BCI system

layers are at the bottom level to interact with us-

(also called a “smart headset”) as shown in Figure 2 that addresses the risks associated with falling.

This new system looks like a normal Bluetooth headset, but it can detect human brain waves and function as well as a traditional BCI system.

Professor Majid Sarrafzadeh believes that the

new BCI system is easy to use and will not require a complicated interface that would affect a user’s normal daily life. Moreover its low cost can make it

accessible to more people, thus yielding many apVOLUME 1 / SPRING 2011

In general, the new BCI system is comprised of

Fortunately, there has been good progress in

EEG signal acquisition methods. At UCLA, research-

6

SYSTEM FRAMEWORK

and communication layer. Sensing and actuating

MOREOVER, ITS LOW COST CAN MAKE IT ACCESSIBLE TO MORE PEOPLE, THUS YIELDING MANY APPLICATIONS FOR THIS DEVICE.


COMMUNICATION LAYER MIDDLEWARE LAYER ACTUATING LAYER

COMMUNICATION LAYER

SENSING LAYER

SIGNAL PROCESSING LAYER

FIGURE 3 (A) CLIENT STRUCTURE (B) SERVER STRUCTURE

CLIENT

SERVER

ers directly. Some sensors are included in the sens-

and who serves as the architect designer, “We inte-

With the sensed data, middleware implemented

system-on-chips technology, the headset acquires

ing layer to acquire miscellaneous user bio-signals.

on a microcontroller will perform preliminary processing such as signal filtering, sorting, com-

pression, and lightweight data analysis for feature extraction. Some of the expected results are urgent

WE INTEGRATED BCI INTO A BLUETOOTH HEADSET. LEVERAGING THE SYSTEMON-CHIPS TECHNOLOGY, THE HEADSET ACQUIRES THE BRAIN WAVE VIA A SIMPLE BUT EFFECTIVE WAY. to report, and they are sent to the actuating layer

to notify users of a risk of falling. Otherwise, the

grated BCI into a Bluetooth headset. Leveraging the the brain wave via a simple but effective way. It is

complementary to existing assistive technologies in terms of mental control.”

Server For the server part, there are two layers. The

first layer is the communication layer for receiving

data from the client device, and the second layer

is the signal processing layer. A data mining algorithm is implemented in the signal processing layer

to analyze the user’s risk of falling. After the calculation, the server end will send feedback to the client side for actuating.

It is important to note that the data mining

procedure on the server is time-consuming, and

the response time is critical for fall prevention. To mitigate this problem, researchers have invented an innovative method for data processing and have

developed an efficient signal processing algorithm

based on a recently established theory of Compressed Sensing (CS) [2][3].

“Decoding the brain wave is a difficult job and

data will be sent through the communication layer

very time-consuming. Perceptible delay can dra-

common solution for the communication layer is

control system. To handle this problem, we came

to the server end for further data mining. The most through Zigbee, Bluetooth, or WiFi, the choice of which depends highly on the specific applications.

Commented Wenyao Xu, a third-year Ph.D.

student in UCLA’s Computer Science department

matically degrade the performance of our brain up with some novel algorithms to decode the brain

waves for real-time control purposes,” said Fang

Gong, who is a third-year Ph.D. student in UCLA’s Electrical Engineering department and serves as

BRUIN INNOVATION & TECHNOLOGY

7


the software designer for this project. “These more efficient algorithms maximize computing resources, a chief reason why the unit can be so tiny.”

PROTOTYPE

Figure 4(a) illustrates the acquisition system,

called Smart Headset. There are two main parts: an ADC module (analog-to-digital converter) and a

data processing module. The ADC used in the sys-

tem is a kind of adaptive sampling module from Neurosky Inc [4]. This ADC has a low-sampling

noise, high accuracy, and configurable data rate. The other part is a data processing module. The key

chip on the module is an ultra low-power micro-

IN ORDER TO PROVE EMPIRICALLY THE FEASIBILITY OF THE DESIGN FRAMEWORK, THE GRADUATE RESEARCHERS AT UCLA CONDUCTED A PILOT STUDY WITH VOLUNTEERS TO TEST THE SYSTEM. FIGURE 4 (A) PROTOTYPE CIRCUIT (B) PACKAGED SMART HEADSET

controller, MSP430 from Texas Instruments (TI). The proposed computer science-based algorithm is hosted on this module for compressed data analy-

sis. Additionally, Figure 4(b) shows that the whole packaged system is very tiny when compared to the

size of a quarter (shown), yet the signal accuracy is as accurate as those from a conventional scalp BCI system. Figure 5 shows the researchers involved in

the project, analyzing the recorded brain signals in their laboratory.

Currently, in order to prove empirically the

8

VOLUME 1 / SPRING 2011


FIGURE 5 RESEARCHERS ANALYZING DATA

feasibility of the design framework, the graduate

researchers at UCLA conducted a pilot study to test the system using volunteers. The preliminary pilot

experiments show that a CS-based signal process-

REFERENCES

[1] Slobounov S, Cao C, Jaiswal N, Newell KM, “Neural basis of postural instability identified by VTC and EEG”, Exp Brain Res. 2009 Oct;199(1):1–16.

ing strategy could not only preserve the fidelity of

[2] D. Donoho. “Compressed sensing”. IEEE Transactions on Bio-

raw data. In addition, a paper about the BCI sys-

[3] E. Candes, J. Romberg, and T. Tao. “Stable signal recovery from

for publication [5]. Aside from fall prevention, it is

tions on Pure and Applied Mathematics, 59:1207–1223,

the data but also dramatically reduce the size of the

tem has been accepted by HCMDSS/MDPnP 2011 possible to consider a number of other potential

healthcare related applications that can be enhanced by this BCI system, including for example brain-control for the impaired and disabled.

medical Engineering, 52:1289–1306, April 2006.

incomplete and inaccurate measurements”. CommunicaAugust 2006.

[4] Neurosky Inc. http://www.neurosky.com/

[5] Wenyao Xu, Fang Gong, Lei He, Majid Sarrafzadeh, “Wearable Assistive System Design for Fall Prevention”, HCMDSS/ MDPnP 2011, Chicago, US (accepted for publication).

For further reading: http://bit.ly/kDPm8B (published in HCMDSS workshop 2011)

FANG08@EE.UCLA.EDU WENYAO@CS.UCLA.EDU

BRUIN INNOVATION & TECHNOLOGY

9


10

VOLUME 1 / SPRING 2011


THE DEAN’S CORNER BIT CO-FOUNDERS JAMAL MADNI AND NEIL TILLEY SAT DOWN WITH DR. VIJAY DHIR, DEAN OF THE UCLA HENRY SAMUELI SCHOOL OF ENGINEERING & APPLIED SCIENCE (HSSEAS), WHO CONVEYED A PICTURE OF THE WORKFLOW, RELEVANCE, AND IMPACT OF ENGINEERING RESEARCH AT UCLA, AS WELL AS TO DESCRIBE TODAY’S TYPICAL ENGINEER. BIT: Let’s begin with graduate life. In-between go-

On the other hand, faculty is focused in an in-

ing to classes and having papers to publish, what

dividual discipline or area of expertise. They are

Alone? How many projects are done simultaneous-

what are the “show-stopper” problems in that par-

do engineers do, and how do they work? In groups?

ly? What is the workflow from concept to completion?

Dean Dhir: Most students are taking classes and

working with faculty members in labs by keeping current of the latest published papers as well as

seeking to find out the truly innovative problems,

ticular discipline. They cultivate ideas by writing proposals for federal grants, and if their ideas and

the packaging are superior, then they get funding, in the hopes of taking a project to high social and financial payoffs.

carrying out research to compose their own papers.

BIT: What do engineers do that isn’t so obvious, yet

testing it to get data, then analyzing the data, and

nical reader? What sorts of things involve engineer-

Research involves building an experimental setup,

finally deducting conclusions that advance their

knowledge in a particular area. The above would summarize the activities of the average engineering graduate student. A small, exceptional group of

relevant, important, and interesting for a non-teching from the standpoint of health, entertainment,

scholarship, intellectual development, and social responsibility?

students go beyond that level with more initiative

Dean Dhir: Engineers are problem solvers, crea-

topic, out of curiosity, and to advance knowledge

and concepts and steer those efforts in the direc-

and pursue research unrelated to their graduate within a field. Some of these exceptional students

also find applications that are more entrepreneurial, in that they go one step more and commercialize the idea. In large measure, it depends on the individual.

tors, and master builders. They create new ideas tion of fabricating a device based on those ideas, testing it, troubleshooting it, and adjusting it incrementally toward a novel innovation.

Furthermore, engineers must pay attention to

the consequences on the public of a gadget or de-

BRUIN INNOVATION & TECHNOLOGY

11


vice of their design. Foremost this speaks of safety.

engineers should go through a formal education—

there is the issue of microwaves from the antenna

perhaps 1% of the people are the exception, and

For example, take the discussion of cell phones: in the phone and their effect on the brain. While not entirely known, there are efforts exploring

whether they pose a tangible, albeit minimal, risk on people. Engineers develop new technologies and systems to the benefit of mankind and derive

a financial reward for these services. At the same time they have a social and ethical responsibility

ples, having an fundamental feel for it already. But

on the whole, good engineering is not limited to the naturally gifted; rather it is much more fundamental than people think, because it is learnable.

GOOD ENGINEERING IS NOT

ple who have made compromises in areas of safety;

LIMITED TO THE NATURALLY

these have come to haunt them. We’ve got to be very careful at all times as to the consequences.

From an entertainment standpoint, we can

think of electronic arts: computer-aided design, movie effects, sports arena jumbo screens, video

games—both standalone and within a smart phone,

GIFTED; RATHER IT IS MUCH MORE FUNDAMENTAL THAN PEOPLE THINK, BECAUSE

for example. These are all part of everyday lives,

IT IS LEARNABLE.

BIT: What makes engineers different people, and

BIT: Most of the great engineering pioneers in

a movie about, such as The Social Network? If there

a revolutionary idea in their garage. What ought

yet the underpinnings lie in computer science.

what makes them people you might want to write

is a category called “engineer cool,” what comprises that?

Dean Dhir: I think “engineer cool” is comprised of people who go to an engineering school, acquire

an education in engineering principles, and then

recent memory dropped out of school to invent the school of engineering at UCLA offer (socially,

economically, politically, institutionally) to change

this paradigm and foster a fertile, attractive environment benefiting the growth of the student and school alike?

use these principles to invent something that helps

Dean Dhir: It’s the same thing you can find in ath-

nomical way than they are used to doing. You get so

Magic Johnson—relatively speaking, there are only

the public do something faster and in a more ecomuch information on a cell phone now, for example,

that you can raise your productivity and have more informed discussions.

Are engineers wired in a unique way? No, I

don’t think so. Engineering’s impact tends to be

more diffuse and generally affects many people, more than the work of a medical specialist treating

a specific patient, for example. Broadly speaking, VOLUME 1 / SPRING 2011

they may not need much formal training in princi-

to be safe—a principle covered in the engineering ethics classes offered in our school. There are peo-

12

this applies to 99% of the people in engineering;

letics—like Kareem Abdul-Jabbar, Bill Walton, or a few superstars—the outliers, if you will. However,

the majority of people, whether they are athletes or engineers, need to have a good education so they can thrive later in life. For example, the athletes

who aren’t capable of superstardom by skipping college right away and directly going to the pros, they cultivate their athletic skills in college for four years in order to make a decent enough living in the


pros after that. So I don’t think institutionally there needs to be a fundamental change in the paradigm.

However, from a cultural and educational

standpoint, we’ve got to provide our engineering

it, and then this will provide hands-on experience

during the summers, for groups of three to four in order to stir their creative thinking.

students the fertile settings that give an outlet to

BIT: How can our engineering school outreach to

tered within the school. At the student level, for ex-

related problems?

their ideas. If they have ideas, they should be fosample, there is the Technical Entrepreneurs Com-

the rest of the university to have a hand in campus-

munity (TEC), and the organization’s members are

Dean Dhir: It’s a very good question. I’ve been say-

about how to market their technology; but at the

part of: Why don’t we utilize the resources we have

creating an environment where students can learn

same time the university needs to create environ-

ments for students to bring their ideas from their basic research and grow it where it becomes of interest to venture capitalists. The Institute for Technology Advancement (ITA) helps with the matu-

ration process of specific technologies developed in-house at UCLA, where venture capitalists will take an interest to acquire this technology.

Also, we have been trying to raise funds for a

new Creativity Center, slated to be in place by the

end of this summer. The first function would be to let young kids, including our students, build something unique, with their hands. But it is their own imagination they are exercising. It could be junior

high and high school kids who come in summer. We

ing this very thing on the campus committees I’m

in the school? Faculty can be the consultants. At

the moment, we hire from outside, which is so ironic. For example, some of our faculty are the foremost authorities in the field of cyber-security, and

yet, we hire “outside” experts to deal with cybersecurity issues. Students can definitely help in the

area of Information Technology. But this mentality

is not institutionalized. I don’t know the reasons why. I think it should be done, but where possible, we should advertise we have the resources and they should be used.

BIT: Why would I want to hire an engineer for a non-engineering job?

provide them with hardware, software, and techni-

Dean Dhir: Engineers are very good at analyzing.

them loose and have their imagination run wild. If

where the solution may not be unique, but they

cal support, in the form of mentors, and then let

it doesn’t work, they troubleshoot it, fix it, test it, and try again.

It will cost about $1.5 million; we have raised

about half that at this time. It will be down on the interior courtyard level of Boelter Hall, and we

hope to have the rest of the funds available by the

end of summer. To operate and administer the

center, we will look to hire someone part-time and staff graduate students as mentors. This is on the

They know how to solve an open-ended problem come up with an optimal solution. Engineers get training with ill-defined problems and find very

creative, elegant, and efficient solutions to these “asymmetric” problems. This type of thinking is

needed in many functions and industries. But, broadly speaking, this isn’t trained in very many other fields of study. http://bit.ly/mvEBIU

http://bit.ly/kezzdQ

cutting edge of creating an infrastructure for student imagination, and UCLA is the first engineering school in the nation to provide a facility of this type.

During the academic year, student clubs can access

ENGRDEAN@EA.UCLA.EDU

BRUIN INNOVATION & TECHNOLOGY

13


DESIGNING APPLICATIONS USING NAMED DATA NETWORKING Rahul Rao Basava, Derek Kulinski, Chenni Qian, and Zhenkai Zhu, Computer Science

YOUR FRIEND ACROSS THE ROOM IMs YOU TO WATCH THE NEW YOUTUBE VIDEO THAT WENT VIRAL AN HOUR AGO. You start watching the video. Behind the

scenes, the current Internet creates a link to one

number addresses to identify physical computers

video on this link. This happens with every single

(route) data from one place to another. The vision

of the YouTube servers, and the server streams the

person who watches the same video around the globe, leading to a content distribution problem that is solved today using a patchwork of Content Distribution Networks.

Now suppose the router in your local area

network knew you were asking for the same video your friend had requested a few minutes ago and returned you a cached copy of the video it delivered

to your friend. Wouldn’t that be better? If we im-

of NDN however is a new direction, to give names to the data itself that applications and users care

about instead of addressing the machine where they can be found. This allows applications simply

to ask the network for the data they want instead of specifying where to find the data. It is the network’s

job to locate and deliver data to the requesting application.

So how does NDN work? Applications send an

Interest packet, which carries the name of the de-

tribution problem. This is but one of the major fea-

WidgetA.mpg as shown in Figure 1). The router that

tures of a new Internet architecture called Named Data Networking, or NDN, being developed here at

UCLA in association with PARC (a Xerox company) and other partner institutions including the Univer-

sity of Arizona, UC Irvine, UC San Diego, Colorado State University, the University of Illinois Urbana-

Champaign, the University of Memphis, Washington University, and Yale University. VOLUME 1 / SPRING 2011

at which the data can be found, in order to move

plement this router intelligence on a global scale,

it forms an elegant way of solving the content dis-

14

Today’s Internet uses IP addresses, which are

sired content (a name such as /parc.com/videos/ receives the Interest packet remembers the interface from which the request comes in, and forwards

the packet to other nodes (a node is a data source or a router on the path to the data source) by look-

ing up the name in its Forwarding Information Base (FIB). Once the Interest reaches a node that has the

requested data, a Data packet is sent back that carries both the name and content of the data, togeth-


er with a digital signature by the creator of the data.

by the Interest packets at each step along the route.

across the network (the breadcrumb is an entry in

are received, the router forwards only the first In-

The Interest packet leaves a breadcrumb trail

the Pending Interest Table, or PIT, of a router) for the Data packet to retrace the path to the applica-

THE INTEREST PACKET LEAVES A BREADCRUMB FOR THE DATA PACKET TO RETRACE THE PATH TO THE APPLICATION THAT REQUESTED IT.

When multiple Interests requesting the same data

terest packet towards the data source. When the Data packet returns along the path from the source,

the router sends out copies of the packet in all di-

rections from which Interest packets had arrived

earlier. Then the router clears the corresponding PIT entry and caches the data in its Content Store to satisfy future requests for the same data.

Three driver applications are being developed

at UCLA to drive and test the prototype implementation of the NDN architecture. These applications leverage built-in features such as efficient content

distribution and packet authentication. Each of these projects represents a broad area of application design, and each is expected to yield further insight into the requirements of the new architecture.

At the same time they demonstrate performance tion that requested it. Neither Interest nor Data

packets carry IP addresses; Interest packets are routed towards data producers based on the names carried in the Interest packets, and Data packets are returned based on the state information set up

and functional advantages of NDN in key areas and

show how NDN’s embedding of application names in the routing system promotes efficient authoring

of sophisticated distributed applications with reduced complexity. An introduction to each of these applications follows.

FIGURE 1 NAMED DATA NETWORKING - OVERVIEW

BRUIN INNOVATION & TECHNOLOGY

15


LIGHTING APPLICATION PROJECT

tion of control system commands.

facilities such as lighting, touch-activated displays,

used to illuminate or create lighting in an envi-

Buildings of the future are likely to be con-

structed with digitally controlled and networked

the project. Fixtures are lighting facilities that are

sound systems, and video recording. The current

ronment. They can be a single luminary unit or a

Internet architecture makes it cumbersome to build applications for such systems with heterogeneous components, especially in the area of addressing schemes and security.

The Lighting Application project aims at cre-

ating a control system using NDN that will deal

with physical lights and building facilities. NDN’s intrinsic support for naming data, broadcast, caching, and fine-grained authentication provide obvious advantages in this setting. Exploration of this

area expands on UCLA’s experience building in-

key management; and distribution for authentica-

VOLUME 1 / SPRING 2011

sending and receiving Interest and Data packets from Building Services. From the perspective of

the network, the interfaces and their associated fixtures are indistinguishable. The fixtures used in our test project are Philips ColorBlast 12 LED wall-

washing lights connected to Gumstix - Overo Air COM interfaces.

As shown in the diagram, Building Services

is responsible for assigning the names for fixtures,

tributed, synchronized state management; effective

16

mediary between fixtures and the NDN network,

performances. The project will create an applicaa discovery mechanism for embedded devices; dis-

PROJECT – OVERVIEW

lighting strings. Lighting Interfaces are an inter-

are applications that constitute the building con-

tion library to support naming of various devices;

FIGURE 2

lighting device that has multiple light units such as

teractive spaces of the kinds found in museums, physical simulation spaces, theme parks, and live

LIGHTING APPLICATION

Figure 2 shows the various components of

trol systems. The Configuration Manager Service

maintaining cryptographic certificates and access control lists (ACLs) for other services in the network. Lighting interfaces request this service for names using an Interest packet. The name is


returned as data. Subsequently the service sends

Interest packets to the interfaces for a periodic ‘heartbeat’ message, for checking connectivity and status.

The Architecture Lighting Service is respon-

sible for everyday building lighting control. This service sends control commands as Interest pack-

ets to the Interfaces (for example, UCLA/boel-

PERSONAL DATA CLOUD PROJECT

In a world filled with mobile devices where

activity monitoring sportswear (like the Nike+iPod system*) is becoming more and more common,

personal data is also becoming ever more accessi-

ble. Data collected by applications on such devices include your location, time of events in your day-to-

ter/3551/lights/fixture/*/rgb-8bit-hex/FAF87F,

day life, pictures (geo-tagged and time stamped),

as shown in Figure 3). Here the Interest packet is

ing (ranging from eating habits to daily memos).

used as a signed command, while the returning

and other information that the individual is recordThe Personal Data Cloud (PDC) project aims

data packet carries a simple signed acknowledge-

to build a secure data ecosystem that can be con-

carries the RBG (red-blue-green) color settings for

many entities such as mobile phones and sensing

ment of reception of the command. The command the fixture. This service may be extended to provide

real-time status of the lighting infrastructure. The Fire Life Safety Service includes features like fire

prevention and emergency evacuation. This service has highest priority, and its commands override all

other service commands. Environment Monitoring Service allows building administrators to view fixture status and compute statistics regarding energy consumption of the building.

trolled by a single user. The PDC is composed of devices, cloud-based secure repositories, and personal computers. The concept is illustrated in Figure 4. Creating the PDC will require the implementation of a distributed database on NDN with direct

name-based access of individual records, providing

a widely applicable test case for validating NDNbased systems like data discovery, content distribution, and diverse models for trusted communication among mobile users, PDCs, and applications.

FIGURE 3 COMMAND FLOW IN ARCHITECTURE LIGHTING SERVICE

* see article on page 24

BRUIN INNOVATION & TECHNOLOGY

17


FIGURE 4 PERSONAL DATA CLOUD PROJECT - OVERVIEW

The major features of the PDC are disruption-toler-

is called a Receiver. An entity can be both a Publish-

internal communication between nodes of the

of many such streams.

ant uploads from sensors to the secure data store; PDC; and filtered, often anonymous data sharing

tion system developed in the Center for Embedded

envisions all entities (mobile devices included) as

collect and analyze data from active/triggered user

data repositories with varying capacities for storage and processing.

A new protocol called the Stream Protocol has

been defined for communication between entities

in a PDC. A stream is an abstraction of a sequential set of data sent from one entity to another. The

Stream Protocol is designed to work over the NDN and in practice replaces the Hypertext Transfer Protocol Secure (HTTPS) modules of the applica-

Network Sensing (CENS). It uses mobile phones to

experience samples and passive logging of onboard environmental sensors, for example the GPS locator

and accelerometer. The system includes an application that runs on Android-based mobile phones, server software that manages deployments and

acts as a central repository for data, and a dash-

board front-end for participants and researchers alike to visualize incoming data in real time.

AndWellness will be the first framework to run

tions on the current Internet (HTTPS being the

over the PDC architecture. The mobile application

any secure communication, for example, purchas-

dependent entity capable of publishing informa-

most common protocol on the Internet used for ing goods online). Figure 5 shows a high-level comparison between the module structure of Stream Protocol and HTTPS. An entity that sends data is called a Publisher and the entity receiving the data VOLUME 1 / SPRING 2011

AndWellness is one such personal data collec-

with authorized third-party applications providing personal services to the individual. The PDC design

18

er and a Receiver. Every Publisher can be the source

component has been modified to behave as an intion to the user’s data cloud. The data receiver is

a cloud-based, secure repository that is considered as a test destination for the data streams published

by the mobile application. While the mobile appli-


cation does not have the functionality to receive

data and does not have filtering components, the cloud-based repository will have both capabilities.

AUDIO CONFERENCING PROJECT

Current audio conferencing tools rely on a

centralized system to discover ongoing conferences, the speakers participating in each conference

and transmission of voice data from individual speakers. The Audio Conference Tool (ACT) project

explores multi-host real-time media streaming applications designed over NDN. ACT takes a named-

based approach, and the resulting design is completely distributed and robust against component

failures. ACT supports both conference data authentication and participant control. The packets

generated by ACT are digitally signed using the

built-in security primitive in NDN, which guaran-

tees data integrity and provenance. An encryptionbased access control scheme is employed in the private conference mode where a session key is used

to encrypt all data traffic of the conference and is only distributed to legitimate users. ACT will test the effectiveness of NDN in the context of time syn-

namespace, which is a dedicated set of names con-

of control / media streams, routing scalability, and

conference discovery is completed, the speakers of

chronization, quality-of-service selection, security trust model.

Figure 6 shows an overview of the ACT design.

A separate module handles conference discovery—

both scheduled and ongoing—and facilitates the

figured on the routers for network broadcast. Once

for speaker information sent by listeners.

The Interest packets for voice data streams

the flexibility to extend ACT with other features

setup and speaker management; thus broadcast

who initiates a conference creates data that describes the various aspects of the conference, such

as estimated start time, duration, media type, purpose, etc. Conference discovery requires propagation of Interest packets from participants in a given

conference for conference information across the network. This is achieved by choosing the names

for conference information data from a broadcast

HTTPS AND STREAMS

pants in a conference should answer the Interests need to be generated at frequencies orders of mag-

such as video, whiteboard, and text message. A user

COMPARISON BETWEEN

each ongoing conference are discovered. Partici-

task of joining a conference. The decoupling of conference discovery from voice media delivery gives

FIGURE 5

nitude higher than those needed for conference is not used for voice streaming. ACT uses speaker-

specific names for voice data, and this task is del-

egated to the Voice Data Distribution module. Voice data is fetched by sending Interests directly to each participant speaker in a conference. Pipelining of Interests and flow balance are enforced to mitigate

the effects caused by the delay of round trips and loss of packets, thus smoothing out the sound of the voice transmission.

BRUIN INNOVATION & TECHNOLOGY

19


EXPLORATION OF THIS AREA EXPANDS ON UCLA’S EXPERIENCE BUILDING INTERACTIVE SPACES OF THE KINDS FOUND IN MUSEUMS, PHYSICAL SIMULATION SPACES, THEME PARKS, AND LIVE PERFORMANCES.

20

VOLUME 1 / SPRING 2011


FIGURE 6 CONFERENCING PROJECT - OVERVIEW

Media data processing and user interface de-

rience Sampling. John Hicks, Nithya Ramanathan, Donnie

decoupled from networking specifics. To focus our

borah Estrin. Wireless Health ’10. http://openmhealth.org/

sign are necessary components of ACT but largely

effort on NDN-specific design issues, ACT adopted a client-server based open-source audio application

package. It embeds the modules for speaker discovery and voice data distribution in the original

Kim, Mohamad Monibi, Joshua Selsky, Mark Hansen, Dewp-content/uploads/wireless-health.pdf.

Many thanks to Jeff Burke, Lixia Zhang, Deborah Estrin, and Alessandro Marianantoni at UCLA and to the researchers of UCLA partner institutions for their support.

server code, leaving the client intact. This modified server runs on the same machine as the client and

communicates with the client using the standard IP

protocol stack. At the same time it communicates

with other participants (who may be using the modified server) over NDN.

ZHENKAI@UCLA.EDU BRAHULRAO@UCLA.EDU

REFERENCES

[1] Named Data Networking (NDN) Project. www.named-data.net.

[2] Named Data Networking (NDN) Project. PARC Technical Re-

port NDN-0001. L. Zhang, D. Estrin, J. Burke, V. Jacobson, J. D. Thornton, D. K. Smetters, et al. http://www.named-data. net/ndn-proj.pdf.

[3] AndWellness: An Open Mobile System for Activity and Expe-

TAKEDA@TAKEDA.TK CHENNI@UCLA.EDU

BRUIN INNOVATION & TECHNOLOGY

21


22

VOLUME 1 / SPRING 2011


ENTREPRENEURIAL OPPORTUNITIES FROM THE OTHER SIDE OF CAMPUS Jeff Chang, UCLA Anderson School of Management

WHAT IF YOU WANT TO BE IN A CREATIVE ROOM THAT SPAWNS MORE IDEAS AND INSPIRES YOU? WHAT IF YOU WANT A CAREER AS A VENTURE CAPITALIST? WHAT IF YOU HAVE AN IDEA AND WANT TO KNOW WHAT TO DO NEXT? Odds are, there is something in North Campus for you. Enroll in TIP (Technology & Innovation Partners) TIP is a yearlong course for accelerating research commercialization. It brings together students from vari-

TIP http://bit.ly/lScAWQ

ous UCLA graduate schools. TIP classes are taught by strong professors and guest speakers under the leadership of Al Osborne, Jr., Senior Associate Dean and founder of the Price Center for Entrepreneurial Studies. Become part of the UCLA Entrepreneur Association The Anderson EA organizes nearly 150 events per year. Many of those events are open to all UCLA students. A few examples are the following:

Entrepreneur Association http://bit.ly/lbjspT

• eLabs – where students pitch their ideas and get feedback and support from the audience. • Knapp Prep events get you ready to put together a business plan.

• eWeek – a week of seminars and keynotes with successful entrepreneurs.

• The EA Conference in mid-May – an entire day of panels, speakers, the fast-pitch competition, and opportunities to make contacts at breakfast, lunch, and happy hour.

Knapp http://bit.ly/ieDMVN

You can also compete in a business plan competition any time of year. As a UCLA grad student, you are

encouraged to contact any of a hundred Anderson students through the site www.KnappComp.com if you have an idea and need to put together a team. A feature on the site is a list of all one hundred worldwide, openformat business plan competitions for the upcoming year – So stay tuned!

BRUIN INNOVATION & TECHNOLOGY

23


A WIRELESS HOME AUTOMATION SYSTEM FOR CHILDHOOD OBESITY PREVENTION Navid Amini, Computer Science

PEOPLE ARE BECOMING MORE CONCERNED WITH THE PROBLEM OF CHILDHOOD OBESITY, WHEN EXCESS BODY FAT NEGATIVELY AFFECTS A CHILD’S HEALTH.

Childhood obesity is recognized as a seri-

tioned facts, it is widely recommended that one

lence of obesity in children (Troiano 1995). In the

five times a week (Sallis 1994, Pate 1998, Corbin

ous public health concern due to the rising prevaUnited States, direct measurements of body mass

and height obtained by the National Health and Nutrition Examination Survey indicate that about

15% of 6–19 year olds are classified as overweight

(Ogden 2002). As the children spend a significant

amount of their time at home, a sedentary lifestyle accounts for the leading cause of childhood obes-

ity (Walker 1998). Many children fail to exercise because they spend time doing stationary activities such as playing video games or watching TV. Certain reports provide evidence that television viewing is a reason for increased body fatness and that

reducing television viewing is a promising strategy for preventing childhood obesity (Andersen 1998, Robinson 1998).

On the other hand, exercise would help chil-

dren control their weight. It also helps to reduce the risk of some illnesses such as high blood pressure, heart disease, sleep problems, and other similar disorders (Freedman 1993). Based on the men24

VOLUME 1 / SPRING 2011

should moderately exercise for at least 30 minutes 1994). Furthermore, it is reported that standards for recommended pedometer-determined steps per day for 6–12 year olds are 12,000 for girls and

15,000 for boys (Tudor-Locke 2004). This highlights the importance of physical activity for children. Accordingly, many control units have been

implemented in games and appliances by parents in an effort to encourage children to perform physical exercise. Using these units, parents can limit the

time that their children can spend playing computer or TV games by manually controlling the corresponding appliances using the GUI provided by

these units (Thompson 2006, Coshott 2007). However, the units are not capable of preventing children from watching another channel or playing another game that is not equipped with the parental control option.

In this paper, the system proposed can miti-

gate the previously mentioned problems by controlling power outlets instead of controlling certain


TV channels or particular games. It has been sev-

to act as an intelligent agent (Cook 2003). In the

such homes, RF (radio frequency) signals from spe-

light, humidity, temperature, smoke, gas, motion,

eral years since the introduction of smart homes. In

cial controllers are exploited to activate or deacti-

vate power outlets. In some cases, the controller is

able to regulate the intensity of room light as well. A number of research projects have been carried

out based on these or similar controllers to build

MavHome system, a sensor network including

infrared, and switches is developed to keep track of the home environment. Based on the data collected

from the sensor network, a server makes a decision

smart homes (Cook 2003, Jiang 2000, Cole 2002).

THE PROPOSED SYSTEM

used in this project in order to acquire complete

CONTROLS POWER OUTLETS

a wireless sensor is utilized that can calculate the

INSTEAD OF CONTROLLING

Likewise, a certain type of RF power controller is control over the home’s power outlets. In addition,

travelled distance and average pace for a walk (or a run) so as to monitor the daily activity level of

children. The recorded data can later be uploaded to any computer via the USB interface. The goal of

the proposed system is to make a virtual connection between power outlets and a wireless activity

CERTAIN TV CHANNELS OR PARTICULAR GAMES.

monitor sensor. This way, the children could be en-

for resource management and executes the decision

time of home entertainment (e.g., watching TV).

Kit) with which the appliances in the home are

couraged to do more exercise in exchange for more

The more exercise children perform, the more time

they secure to do stationary activities. The pro-

posed system, called No Pain No Game, is intended to prevent childhood obesity disease and thus improve childhood fitness levels.

The remainder of the paper is organized as

follows. Section 2 provides a brief overview of related work in the context of home automation and

childhood obesity prevention. Preliminary notions

followed by the structure of the No Pain No Game system are covered in Section 3. The important features of the system are summarized in Section 4. Fi-

nally, Section 5 concludes this study and highlights future research directions.

RELATED WORK

There are several research projects based

on home automation systems. As an example,

MavHome smart home architecture developed at

the University of Texas at Arlington allows a home

through the smart actuators (e.g., X10 ActiveHome equipped. Generally, the MavHome aims at maximizing the inhabitant’s comfort and productivity

and minimizing costs. For elderly and disabled people, the system can provide a fine health care and a

higher level of security. As another example, to help

people with disabilities, Jiang et al. has designed a voice-activated environmental control system which consists of a universal remote control with

X10 home automation capability, a Motorola 6811 microprocessor, and an off-the-shelf voice recognition circuit (Jiang 2000).

In the context of activity monitoring, in a

number of projects X10 components are integrated into a toolkit which is intended to monitor the daily

activity of an individual (Cole 2002). In addition to the home automation systems, certain appliances

are developed to encourage children to exercise. For example, an interrupter system can be added to

an existing connection between a game console and

its controller (Coshott, 2007). The interrupter sysBRUIN INNOVATION & TECHNOLOGY

25


FIGURE 1 A TYPICAL CONFIGURATION FOR X10 CONTROLLED APPLIANCES.

tem is used selectively to enable and interrupt the

version of the system exploits Nike + iPod Sport Kit

and the game console, dependent on the detected

uses X10-based devices in the shape of controlla-

modified connection between the game controller operation of the exercise machine. Accordingly, the

parents can arrange it in such a way to block normal playing on the game console unless the child performs an adequate amount of exercise on the exercise machine.

In (Annavaram 2008), a wireless body area

network is developed for wearable monitoring ap-

control over different entertainment appliances.

Microsoft Access databases are utilized to store the relevant exercise data. The software that connects

these three parts is written in Visual Basic and C Sharp and runs on a Windows platform.

X10 Standards

of heterogeneous sensors (e.g., heart-rate sensor

standard for communication among electronic de-

ognize, predict, and reason automatically about

power line wiring for signaling and control, where

and accelerometer sensor), and the goal is to rec-

human physical activity and behavior states by the evaluation of multimodal sensing and interpretation.

THE PROPOSED SYSTEM

No Pain No Game is a home automation sys-

tem that encourages children’s daily exercise by rewarding them with more home entertainment

time. In other words, the time children spend doing stationary activities should be proportional to the time they spend doing physical exercise. Aside from

X10 is an international and open industry

vices used for home automation. It primarily uses the signals involve brief radio frequency bursts

representing digital information. A wireless radio

protocol is also defined, where the data packets are very similar to those used for power line wires. The operating frequency of the wireless protocol is 433 MHz and 310 MHz in the European systems

and U.S. systems, respectively. It should be noted that the wireless protocol allows the operation of keypad remote controllers on top of the underlying wired X10 modules.

X10 is popular in the home environment, with

the interface software, the system is composed of

millions of units in use worldwide and new compo-

records, a controller that commands the power

typical configuration for an X10 network.

three parts: a sport kit that monitors the exercise

outlets, and a database that stores the health statistics and exercise records of children. The current VOLUME 1 / SPRING 2011

ble power outlet modules in order to acquire full

plications, and the intended use of the system is to

avoid pediatric obesity. The network is composed

26

as a means to monitor the physical exercise. It also

nents inexpensively available. Figure 1 illustrates a

By using The ActiveHome Pro Scripting In-

terface provided by X10, one can create software,


THE SENSOR FITS INSIDE SPECIAL NIKE SHOES AND A WIRELESS RECEIVER IS CONNECTED TO AN IPOD.

with XML format. The proposed system will upload

those files to the server and extract the useful data

from the files. Therefore, the data can be analyzed

to decide how much entertainment time the child has earned.

The Proposed No Pain No Game System In the proposed system, a server is main-

tained by parents while children will use remote web pages, and other tools that use the USB In-

terface to control and interact with X10 modules,

controls sending matching signals to trigger the

appliances. A child must register his or her sports

sensors, and remote controls (The ActiveHome Pro

SDK from X10). The address of each module is set by the dials located on it. Accordingly, one can command the interface to turn on the intended module

by providing a valid address corresponding to the module. Upon receiving a command (e.g., from a remote control), the interface reports the action of

receiving the command which enables the user to

benefit from certain options. For the sake of more reliability, each packet is sequentially sent twice to make sure the receivers understand it even in the presence of power line noise.

Nike + iPod Sport Kit The Nike + iPod Sport Kit (Figure 2) consists

of a wireless sensor and a small wireless receiver

that plugs into an iPod. The sensor is a piezoelectric accelerometer pedometer that fits inside special Nike shoes and a wireless receiver that is con-

nected to an iPod. Each sensor has its unique serial

number that is used as an identification number for each child in the proposed system. The personal training application on the iPod can provide information on distance and speed while a user is listening to music. By considering the number of steps taken and the elapsed time, users (children) can

schedule their desired workout in the form a speci-

FIGURE 2 APPLE NIKE + IPOD SPORT KIT.

kit on the server, given that every sensor has a particular identification number. The proposed sys-

tem simultaneously analyzes the current exercise records when children update the database with new exercise records merely by plugging their iPod into the client computer. This means that the server

automatically calculates the total time budget that

a child is allowed to use his/her intended appliances (e.g., TV). A formula is applied to derive the time budget based on the calories burned by the child:

Calories =

METs × 3.5 × w ×T 200

fied distance or a certain time period that can fit a

where MET (Metabolic Equivalent of Task) is a

formance. The exercise records are stored in files

exercise is (Dr Gily’s Health Portal), w is the child’s

plan based on their goals and their previous per-

(1)

physiological concept that shows how intense the

BRUIN INNOVATION & TECHNOLOGY

27


The total time budget for each child is stored

IN THE PROPOSED SYSTEM,

in a database by Microsoft Access. The time budget

A SERVER IS MAINTAINED BY

to activate an appliance. Moreover, after the time

PARENTS WHILE CHILDREN WILL USE REMOTE CONTROLS SENDING MATCHING SIGNALS TO TRIGGER THE APPLIANCES.

gets verified and consumed every time a child tries budget is depleted, the server will automatically

power off the related appliance (e.g., TV). A child

has to perform more exercise and then plug in his/ her iPod into the client computer in order to in-

crease the time budget again. Figure 3 illustrates the structure of the No Pain No Game system.

The implementation of the system is con-

structed with two ends, the client and the server

(Figure 3). On one end, the program on client comweight in kilograms, and T represents the total duration of exercise (e.g., running or walking) in minutes.

MET expresses the energy cost of physical ac-

tivities as multiplies of the Resting Metabolic Rate (RMR) and is defined as the ratio of metabolic rate

(and therefore, the rate of energy consumption) during a certain physical activity to one’s metabolic

rate at rest (quiet sitting), set by convention to 3.5 .

ml O2 kg

-1

.

.

min or equivalently 1 kcal kg -1

-1

.

hr . By -1

convention 1 MET is considered the resting metabolic rate obtained during quiet sitting. MET values

of physical activities range from 0.9 (sleeping) to 18 (running at 17.5 km/h). It should be noted that

After validation, the files will be sent to the server unless they are expired. On the other end, the server will increase the corresponding time budget by an appropriate formula based on children’s

BMI and exercise records. The server also verifies whether the sensor identification number of the

record is valid, and it makes sure that the record

is not outdated. Meanwhile, if one wants to register more children (through Account Management) or verify the status of all children, the server can update or retrieve the data as required (see system block diagram illustrated in Figure 4).

Moreover, the server handles the events when

the Power Control Module (ActiveHome Automa-

bolic Equivalent 2009).

controls. Each received signal will be mapped to

After the burned calories are derived, a ba-

sic requirement for this value is enforced. If the

amount of burned calories is less than a certain quantity (called the basic requirement), no time budget will be granted. However, if it exceeds the

basic requirement, the basic amount of time will be

given, plus extra time depending on the bonus rate and the overhead. The required amount of calories, the amounts of the basic time budget and extra

time can all be adjusted by the Account Management Interface. VOLUME 1 / SPRING 2011

XML readers supported by the .NET Framework.

the MET value for watching television is 1 and for walking at a speed of 3.2 km/h is about 2 (Meta-

28

puters will parse iPod exercise records by creating

tion System interface) receives signals from remote

a particular child and the module he/she has requested. Therefore, the server can retrieve the corresponding data and determine if it should send a command (sendrf in this case) to the automation

system in order to trigger the requested module.

In addition, for each appliance, there is a timer in the server to update and monitor the available

time budget and, correspondingly, to turn off the appliance when the time budget has exhausted. A detailed block diagram of the server is depicted in Figure 5.


FIGURE 3 STRUCTURE AND APPLICATIONS OF NO PAIN NO GAME.

SYSTEM FEATURES

tivity level of their children and the status of the

ferent children by evaluating their identification

and observe the progress of their child’s fitness

Since each child has his/her own iPod + Nike

Sport Kit, the system can distinguish between difnumbers. Furthermore, the system takes into ac-

count the date of exercise records to avoid copies of previous exercise records from being taken into consideration. This validation process prevents

children from cheating to some extent. For example, a child will not gain any extra time budget by

plugging in the iPod twice with the same exercise record.

As can be seen in Figure 6, a user-friendly GUI

on client computers is provided for children to use

so that they can easily learn how to update the ex-

ercise records without any difficulty. Furthermore, the system allows children to watch TV or use other entertainment appliances only if they have performed an adequate amount of exercise throughout

the day. This gives the children a sense of achieve-

ment while the parents need not worry about their kids being too inactive. Additionally, parents can

record the time and let the system monitor the ac-

entertainment appliances. They can view earlier

data (e.g., how many calories have been burned) level. Figure 7 shows an example table containing

a child’s recent exercise data. This exercise table is accessible from the server.

DISCUSSIONS AND FUTURE WORK

In the proposed system’s current form, after

performing exercise, a child connects the iPod to

the client computer. This will update a database on

the server, and eventually a new schedule for the related appliances will be sent from the server to the ActiveHome Automation System. However, it is more desirable to operate the system in real time, where the updating process is done automatically

and wirelessly. This can be done by using a Blue-

tooth adapter connected to the iPod. This way, there is no need for the child to connect the iPod to the computer in order to extend his/her time budget.

Apart from Nike + iPod Sport Kit, other types

of sport kits can be added to the system in future to

BRUIN INNOVATION & TECHNOLOGY

29


FIGURE 4 SYSTEM BLOCK DIAGRAM

FIGURE 5 DETAILED BLOCK DIAGRAM OF THE SERVER.

30

VOLUME 1 / SPRING 2011


provide the children with more options to perform physical exercise. Also it should be noted that the

server side and client side of the system (Figure 3) can run on two networked computers, or they can run on a single machine.

A new method of gaming can be designed in

order to make players benefit from doing physi-

cal exercise in the real world. This can be achieved by extending the system to a server maintained by game companies. Similar to the design for the

Home Automation System, the system now rewards children who have performed a sufficient amount of exercise with the profit in the game. For example,

a child’s character in the game becomes stronger and thus is able to carry better weapons. It is anticipated that this idea gives encouraging incentives for children in exchange for performing physical exercise.

No Pain No Game can also cooperate with

a children’s health organization to advocate for-

mulating an exercise plan, encouraging children by a competitive display record on the organiza-

tion’s website. A child can upload his/her exercise progress and get ranked, accordingly. Further, the

exercise data collected from children can be a useful resource for related research institutes. People

tomation systems. In this system, called No Pain No

FIGURE 6 (TOP)

the trend of health data progresses during the ex-

time in order to be able to activate any entertain-

NO PAIN NO GAME.

in health-related organizations can analyze how ercise.

CONCLUSIONS

Childhood obesity has been a public concern

as people expend money and resources in order to maintain their children’s physical fitness and overall health. As such, it is necessary to build an

application that continually encourages children to perform physical exercise. Several parental control

Game, children have to perform exercise for enough

ment appliance. The activity level of children is

monitored using a Nike + iPod Sport Kit, which is

AN EXAMPLE TABLE OF THE EXERCISE DATA.

cation can calculate calories and other related data from the records. A database is utilized to store the

exercise records and the time budget for every registered child.

No Pain No Game lowers the risk of being

system technology ever improving and with the

how to extend their entertainment time. Children

proposed system is built on the idea of home au-

FIGURE 7 (BOTTOM)

steps taken and time elapsed. Therefore, the appli-

cheated by means of its validation process. Also,

number of related research projects growing, the

OF THE CLIENT GUI IN

becoming more popular. It records the number of

units have been designed, but few of them can effectively impact children. With home automation

A TYPICAL SCREENSHOT

its user-friendly GUI easily allows children to learn

can obtain a sense of achievement, while parents

can let the system automatically monitor the acBRUIN INNOVATION & TECHNOLOGY

31


NO PAIN NO GAME CAN ALSO COOPERATE WITH CHILDREN HEALTH ORGANIZATIONS TO ADVOCATE FORMULATING AN EXERCISE PLAN… A CHILD CAN UPLOAD HIS/HER EXERCISE PROGRESS AND GET RANKED ACCORDINGLY.

32

VOLUME 1 / SPRING 2011


tivity level of their children and the status of the

Agricultural Research 2006 March.

appliances. It is believed that a complete No Pain

[11] Coshott, R.J., 2007. Encouraging exercise whilst playing elec-

pervise their children’s exercise and entertainment

[12] Tudor-Locke, C., Pangrazi, R.P., Corbin, C.B., Rutherford, W.J.,

No Game product would enable the parents to suinexpensively and in a completely unobtrusive fashion.

REFERENCES

[1] Troiano, R.P., Flegal, K.M., Kuczmarski, R.S., 1995. Overweight

prevalence and trends for children and adolescents. Arch Pediatr Adolesc Med 1995;149:1085– 91.

[2] Ogden, C.L., Flegal, K.M., Carroll, M.D., Johnson, C.L., 2002. Prev-

tronic games. USPTO Application number: 20090098979.

Vincent, S.D., Raustorp, A., et al, 2004. BMI-referenced standards

for

recommended

pedometer-determined

steps/day in children. Preventive Medicine, 2004.

[13] Cook, D.J., Youngblood, M., Heierman, E., Gopalratnam, K., Rao, S., Litvin, A., Khawaja, F., 2003. MavHome: An agentbased smart home, in: Proceedings of the IEEE International

Conference on Pervasive Computing and Communications, 2003, pp. 521–524.

alence and trends in overweight among US children and

[14] Jiang, H., Han, Z., Scuccess, P., Robidoux, S., Sun, Y., 2000.

[3] Walker, A.R.P., Walker, B.F., 1998. Rises in schoolchildren’s an-

with disabilities. Proc. of the IEEE 26th Annual Northeast

adolescents, 1999 – 2000. JAMA 2002;288(14):1728– 32.

thropometry: what do they signify in developed and developing populations? J R Soc Health 1998;118(3):159– 66.

[4] Andersen, R.E., Crespo, C.J., Bartlett, S.J., Cheskin, L.J., Pratt, M., 1998. Relationship of physical activity and television

Voice-activated environmental control system for persons Bioengineering Conference, 2000, pp. 167–169.

[15] Cole, A., Tran, B., 2002. Home automation to promote inde-

pendent living in elderly populations. Presented at Proceedings of the 2002 IEEE Engineering in Medicine and Biology

watching with body weight and level of fatness among chil-

24th Annual Conference and the 2002 Fall Meeting of the

Examination Survey. JAMA 1998;279:938–42.

2002, Houston, TX, United States, 2002.

dren: results from the Third National Health and Nutrition

Biomedical Engineering Society (BMES / EMBS), Oct 23–26

[5] Robinson, T.N., 1998. Does television cause childhood obesity?

[16] The ActiveHome Pro SDK from X10, http://www.x10.com/

[6] Freedman, D.S., Dietz, W.H., Srinavisian, S.R., Berenson, G.S.,

[17] Dr. Gily’s Health Portal, http://www.drgily.com/exercise-cal-

tors among children and adolescents: the Bogalusa heart

[18] Annavaram, M., Medvidovic, N., Mitra, U., Narayanan, S., Spru-

[7] Sallis, J.F., Patrick, K., 1994. Physical activity guidelines for

Thatte, G., 2008. Multimodal sensing for pediatric obesity

JAMA 1998; 279: 959–60.

1993. The relation of overweight to cardiovascular risk facstudy. Pediatrics 1999; 103: 1175–1182.

adolescents: consensus statement. Pediatr Exerc Sci 1994; 6: 302 –314.

[8] Pate, R., Trost, S., Williams, C., 1998. Critique of existing guidelines for physical activity in young people. in Biddle, S., Sallis, J., Cavill, N. (Eds), Young and Active? Young People and

Health-Enhancing Physical Activity-Evidence and Implications, Health Education Authority, London, pp. 162–76.

activehomepro/sdk/

orie-counter.php

ijt-Metz, D., Sukhatme, G., Meng, Z., Qiu, S., Kumar, R., and

applications. In UrbanSense08 Workshop at SenSys Raleigh, NC, USA, November 2008.

[19] Metabolic Equivalent of Task (MET) from Wikipedia, http:// en.wikipedia.org/wiki/Metabolic_equivalent

For further reading: http://bit.ly/kLTVD3

[9] Corbin, C.B., Pangrazi, R.P., Welk, G.J., 1994. Toward understanding of appropriate physical activity levels for youth.

President’s Council of Physical Activity and Sport. Phys Act Fit Res Digest 1994;1(8):1– 8. [10] Thompson, D.I., Cullen, K., Baranowski, T., 2006. Using Computer Games and Other Media To Decrease Child Obesity.

AMINI@CS.UCLA.EDU

BRUIN INNOVATION & TECHNOLOGY

33


TEC: A TRAINING GROUND THAT BRINGS THE UNIVERSE TO OUR UNIVERSITY Tanuj Thapliyal, Electrical Engineering

LIFE AT COLLEGE LETS YOU LEARN ABOUT ONE WORLD. LIFE AFTER EARNING YOUR DEGREE REQUIRES AN ENORMOUS READJUSTMENT. IS THERE A WAY TO BRIDGE THE TRANSITION BETWEEN THE TWO? At UCLA, the Technical Entrepreneurial Community

The organization takes part in several entrepre-

aim. TEC actively fosters a culture of entrepreneur-

ITA Program

(TEC) is a group operating since 2005 with just that ship at UCLA—answering the question, “What will

I innovate or do with what I have learned?” TEC

Participants work with the Institute for

from any background or direction. Its activities

their startup ideas.

believes that a business entrepreneur can come

help create environments where successful alumni

share with Bruins to discuss, educate, network, and start companies.

How would you like to find out if you should start a business with your degree?

Because TEC is open to all UCLA students, faculty,

alumni, and staff and is free of charge, its events

help connect the dots for people in all disciplines,

whether undergraduates, graduates, or post-docs. TEC currently offers eight programs for the UCLA community. Every year since its inception, the number of programs and attendees has grown.

34

VOLUME 1 / SPRING 2011

neurial programs and services as follows:

Technology Advancement to help develop Technology Assessment Group

Participants learn the process to evaluate early-stage technology for commercial

feasibility through a seminar series, report writing, and delivering a presenta-

tion on a UCLA patent. Participants who complete the program obtain a signed certificate from the Dean of the Engineering school and from the Vice Provost.

Tech Coast Angels Mentorship (TCA)

Startups receive guidance from angel investors.

Cross-Campus Entrepreneurship Mixer A mixer is arranged where engineering


students can network with business school students. 93 students attended the inaugural mixer in February.

Dinner with an Entrepreneur

Participants have a private dinner with a successful alumnus.

In-House Legal Counsel Participants obtain free legal counsel on

WORKING IN COLLABORATION WITH OTHER MEMBERS OF TEC WILL DEFINITELY FOSTER ONE’S OWN DEVELOPMENT OF NET-

intellectual property.

WORKING, COMMUNICATION,

Successful entrepreneurs, investors, and

AND LEADERSHIP SKILLS—

Seminars

lawyers speak on a variety of issues.

TCA Screening Sessions

Participants are a “fly on the wall” as they hear entrepreneurs pitch business plans to investors.

TEC is entirely student-run and set up to incorporate new programs with people’s interests. Students

ALL IMPERATIVE WHEN BRUINS COMPLETE THEIR TRAINING AT UCLA AND BEGIN THEIR TRANSITION INTO INDUSTRY.

who have ideas for entrepreneurship activities that

are not currently offered are encouraged to become a part of TEC and submit a proposal. Working in

collaboration with other members of TEC will definitely foster one’s own development of networking,

communication, and leadership skills—all impera-

tive when Bruins complete their training at UCLA and begin their transition into industry.

HTTP://WWW.TECBRUINS.ORG INFO@TECBRUINS.ORG

BRUIN INNOVATION & TECHNOLOGY

35


FIGURE 1 MAZDA’S CROSS-SECTIONAL ROTARY ENGINE DISPLAYED AT THE MAZDA RACEWAY IN MONTEREY, CA.

36

VOLUME 1 / SPRING 2011


INNOVATIVE DESIGN METHOD CREATES NEW VARIETIES OF ROTARY ENGINES Sarah Warren, Mechanical & Aerospace Engineering

THE ONLY ROTARY ENGINE DESIGN THAT HAS ENJOYED ANY MEASURE OF POPULARITY AND SUCCESS IS ATTRIBUTED TO ENGINEER FELIX WANKEL AND THE GERMAN AUTOMOTIVE COMPANY NSU. After seeing their first working prototype,

scape with the advent of the Iranian revolution and

ers recognized the potential of such a small, light-

tively new engine had been under limited develop-

Americans Glenn Curtiss and the Wright brothweight, and powerful engine; they immediately

bought the North American rights and built their own. Incredibly, the Wankel-type rotary engine

was about half the size, half the weight, half the manufacturing cost, and had fewer than half the

moving parts, for the same horsepower as the wellestablished piston engine. Because of the intrinsic

rotational motion, the rotary is a quieter engine, is

the subsequent 1979 crude oil shortage. The relament for about ten years and had not yet achieved the fuel efficiency that it commands today; it was not even competitive with its centenarian rival, the

piston engine. This single deficiency nearly erased the Wankel from automotive history. Now the only

manufacturer building a production rotary engine is Mazda, for their RX-8 sports coupe.

Even today Wankel’s rotary engine does not

more compact, and has less vibration while being

have the fuel efficiency of a comparable piston en-

motive company in the world was anticipating the

stead reserving it for performance purposes. Mazda

higher revving. By 1975, nearly every major autoeclipse of the reciprocating piston engine and either held a license, or was in negotiations, to build Wankel’s rotary engine [1].

Fifty years have passed since the debut of the

Wankel engine. NSU was eventually absorbed by Volkswagen then coalesced into Audi, and the Wankel disappeared from the auto manufacturing land-

gine, inhibiting any economical applications and instunned the world in 1991 by winning the 24 Hours of Le Mans with their rotary race car, prompting an

immediate rule change to make rotary engines ineligible against piston engines due to their inherent

and insurmountable advantage. Even so, the lightweight powerhouse has proved itself repeatedly in

racing competition since then. The Wankel’s lower BRUIN INNOVATION & TECHNOLOGY

37


fuel efficiency may be attributed to a few inherent features, including the combustion chamber

and the apex seals. But optimizing the combustion chamber and engine sealing—in fact, changing any part of a Wankel engine profile—is not so easy.

One other remarkable and unique character-

istic of the rotary engine is its fuel versatility. The engine design itself is inherently octane-flexible

and easily adaptable to alternative fuels. Mazda has demonstrated this with gasoline and hydrogen hybrid vehicles, designing a duel-fuel rotary engine that can alternate between the two fuels at the flip

of a switch. It is conceivable that the rotary engine,

with improvements, could reduce fossil-fuel dependency while allowing the defense industry, rac-

ing industry, and vehicle enthusiasts to indulge in performance.

The scope of this research project includes

applying a relatively new method of conjugate pair

generation in order to design optimal rotary engine alternatives to the Wankel. This method is called

the deviation-function (DF) method and was originally developed by Yang, Tong, and Lin and applied to lobe pumps [9].

ALL PRODUCTION ROTARY ENGINES TODAY ARE OF WANKEL’S ORIGINAL DESIGN PROPORTIONS, WHETHER THE APPLICATION IS A SPORTS CAR, COMPRESSOR, MODEL AIRPLANE, OR OUTBOARD MOTOR.

WANKEL’S ROTARY ENGINE

The photograph in Figure 1 shows a cross-sec-

tion of Mazda’s Wankel engine. The triangular rotor rotates eccentrically inside the oval-shaped engine housing. The engine’s crankshaft is at the center of the housing and rotates three times for every full

revolution of the rotor. During its orbit, the rotor is

always and only in contact with the housing at the three apexes, never contacting the housing along

its flanks. This creates three chambers between the rotor flanks and the housing, effectively sealed and

thus thermodynamically isolated from each other. The chambers are constantly changing shape as the rotor turns, allowing the four strokes of the Otto

cycle to occur sequentially for each chamber and

simultaneously on all sides of the rotor, similar to a multi-piston internal combustion engine. The intake and exhaust breathing is through ports in the

housing, eliminating the need for valves and a valve train. This is one reason why the rotary engine has

so many fewer parts than the reciprocating engine. Thus the rotor and housing are analogous to a pis-

ton and cylinder, but one clear advantage of the Wankel is the frequency of the power stroke. For a one-cylinder 4-stroke engine, the power stroke occurs once for two rotations of the crankshaft. For a

one-rotor Wankel engine, the power stroke occurs on every rotation of the crankshaft, utilizing its displacement twice as frequently.

Although not always credited by name, all pro-

duction rotary engines today are of Wankel’s origi-

nal design proportions, whether the application is a sports car, compressor, model airplane, or out-

board motor. Since no other rotary engine design

has ever been in production, the name Wankel is often thought to be synonymous with a rotary and

reciprocating combustion engine. In fact, the Wankel engine has specific proportions for the 3-lobed rotor and its conjugate housing profile. All design

variations are engendered by tweaking a single ratio of rotor radius R to eccentricity e, called the K factor, or trochoid constant.

38

VOLUME 1 / SPRING 2011


The housing of a Wankel engine is very spe-

choid is defined for a potential engine housing, the

FIGURE 2

choidal curve. An epitrochoid is a type of trochoid

family is the eccentricity. Thus, eccentricity is one

(B) CHANGING ECCENTRICITY

cifically defined by generating a particular epitrocurve, and a trochoid is generated by the path of a

single point within a circle that rolls along the pe-

riphery of another (base) circle. The base circle is stationary, the rolling circle is called the generating circle, and the point that draws the path is called

the generating point. The two circles are related in size because one must have a radius that is a

whole number multiple of the other. To create an epitrochoid curve, the generating circle rolls on the

outside of the base circle, illustrated in Figure 2(a). For the housing of a Wankel engine, the generating

difference between the other curves in the same

profiles, the other being rotor radius R. Rotor radius is the distance between the center of the ro-

tor and its apex, as indicated in Figure 3(b). The profile of the 3-lobed rotor is found by rolling the 2-lobed epitrochoid around the rotor’s eccentric

center. Examining all incremental positions of the epitrochoid during its orbit at the same time reveals two 3-lobed envelopes of the overall motion,

ECCENTRICITY IS ONE

is large, the generating circle is small, and the gen-

OF THE CHARACTERISTICS

erating point is identified by its radius, eccentricity

e, and is marked along its epitrochoidal path. The generating circle rolls without slipping on the base

circle, and all of its points describe trochoids, ex-

cept the center whose path is a circle. A family of

epitrochoid curves is defined by choosing different

(A) EPITROCHOID

of the characteristics used to design Wankel engine

circle of radius r2 is equal to half of the base circle

radius r1. In Figure 2(a), the stationary base circle

EPITROCHOID GEOMETRY.

USED TO DESIGN WANKEL ENGINE PROFILES; THE OTHER BEING ROTOR RADIUS.

points (excluding the circumference) on the generating circle as shown in Figure 2(b). Once an epitro-

BRUIN INNOVATION & TECHNOLOGY

39


FIGURE 3 WANKEL ENGINE GEOMETRY. (A) INNER AND OUTER ENVELOPES (B) HOUSING AND ROTOR PROFILES

http://bit.ly/lFkRRP

shown in Figure 3(a). The silhouettes of the various positions of the engine housing profile while rolling around describe the conjugate inner envelope

and the conjugate outer envelope. A rotary engine’s 3-lobed rotor is the engine housing’s conjugate inner envelope, correctly positioned together in Fig-

ure 3(b). The ratio of rotor radius R to eccentricity

e (the K factor) determines the engine compression ratio, the relative volumetric displacement, and the

maximum leaning angle. There is a unique K factor for all Wankel engine designs, so by deciding on a

single design criterion, such as maximum leaning

angle, the design of the engine profile is completed. This method of designing a trochoidal mechanism

may recall the child’s toy Spirograph, and indeed part of the success of Wankel’s design can be attrib-

uted to the easily understood geometry. However, this simplistic methodology belies the profound

and powerful relations of trochoids and their conjugate envelopes [5] [8]. 40

VOLUME 1 / SPRING 2011


The main design considerations for the pro-

lation or incidence, refers to the angle of contact that

sions), relative volumetric displacement, theoreti-

orbits. The maximum leaning angle indicates how

files of a Wankel engine are size (physical dimencal compression ratio, and maximum leaning angle.

The size of the profiles relative to the pitch circles and the eccentricity are both manifest in the gear

set that positions the rotor relative to the housing. The annular gear (for positioning, not power transfer) is placed inside the rotor, and the eccentricity of the designed profiles is sustained in the rotor’s

THE VARIETY OF ROTARY ENGINE DESIGNS NOW AVAILABLE FOR OPTIMIZATION IS EXPECTED TO GENERATE INTEREST AMONG DESIGN ENGINEERS AND MANUFACTURERS.

the apex seals have with the housing as the rotor

well each chamber can be sealed from its neighbors and thus serves as a sealing index. Manufacturers of the Wankel engine have achieved optimal sealing

FIGURE 4 PITCH PAIR EXAMPLES. (A) TWO GEARS WITH THEIR PITCH CURVES (B) NONCIRCULAR EXTERNAL PITCH CURVES [7]

http://bit.ly/mBRETN

by using housings with fatter “waistlines.” This type

of chamber has lower maximum leaning angles, utilizing smaller swaths of contact on their apex seals.

A higher maximum leaning angle, characteristic of

housings with high eccentricity (a sharply defined waistline), means that the apex seals are in working

contact closer to their edges, which is detrimental to sealing and will wear the seals out sooner [3].

DEVIATION-FUNCTION METHOD

Introducing a new method to rotary engine

design demands adhering to certain industry standards so that results of this project can be easily, fairly, and convincingly compared to the Wankel engine. In accordance with this objective, the same design and performance criteria of displacement,

compression ratio, leaning angle, and efficiency are and will be calculated for DF-designed profiles. The variety of rotary engine designs now available

for optimization is expected to generate interest eccentric shaft. Theoretical compression ratio and

maximum leaning angle are indicators of horsepower and efficiency, and both are limited by practicality. The leaning angle, also called angle of oscil-

among design engineers and manufacturers. Ide-

ally, the complete development of the DF algorithm as it applies to the rotary engine will appeal as an

accessible methodology for achieving previously inaccessible results.

BRUIN INNOVATION & TECHNOLOGY

41


The possibilities of the DF method are wide-

ranging but cannot be described without first appreciating conjugate pairs. Two rigid bodies that are in contact along their profiles and have relative

motion, such as rolling or sliding, are called conjugate pairs. Two gears in mesh are an example of a

FIGURE 5 EXAMPLES OF CIRCULAR AND NON-CIRCULAR INTERNAL PITCH CURVES.

conjugate pair that have combined rolling and slid-

1. Design the conjugate pitch pair.

2. Design a generated pair based on the pitch pair.

The pitch pair has pure rolling contact and

defines the relative motion of the meshing con-

and when the centrodes each have respective fixed

the pitch pair, the geometry of the pitch profile

ing contact, then the profiles are called centrodes, files, or pitch curves. In general, the relative motion

of a conjugate pair is specified by its correspond-

ing pitch pair. Figure 4(a) shows two gears in mesh (the conjugate pair) and the corresponding pitch circles (the pitch pair) [6].

THE INEFFICIENCY OF THE DESIGN PROCESS IMPEDES THE INVENTION OF NEW GEARS, ROTORS, AND OTHER CONJUGATE MECHANISMS.

VOLUME 1 / SPRING 2011

two steps:

ing contact. When a conjugate pair is in pure rollrotation centers, they are referred to as pitch pro-

42

The design of conjugate pairs involves

jugate pair. In generating the conjugate pair from is altered such that the required task can be performed; for example, a pitch circle is transformed

to the toothed body of a gear. The generated conjugate pair in mesh has sliding contact, so the relative

motion is not pure rolling, but the speed ratio between them is the same as for the parent pitch pair.

The collective drawbacks to all current methods for conjugate pair generation are

1. Limitation in the types of pitch pairs they can be applied to.

2. Use of noncircular pitch curves requiring solutions by high-order nonlinear equations.

3. Lack of geometrically intuitive design of profiles of the generated pairs.

4. Inability to assign analytical properties to the designed conjugate profiles.


Because of these limitations, the design of

In practice, pitch curves are almost always a

conjugate pairs is a blind trial-and-error process.

pair of perfect circles, or circular solid objects, such

sign and analyze resulting profiles. The inefficiency

conventional conjugate pair generating methods,

This makes it difficult to improve conjugate pair deof the design process impedes the invention of new gears, rotors, and other conjugate mechanisms.

as cones or cylinders. Because of the limitations of only numerical methods are used to generate non-

circular pitch curves. The only known application in

The deviation-function (DF) method was de-

industry for noncircular pitch curves is noncircular

FIGURE 6

pitch pairs, circular or noncircular, it enables geo-

combined with poor understanding of their prop-

CIRCULAR PITCH CURVES.

veloped to address these problems; it works for all

metrically intuitive designing of profiles, and analytical properties can be assigned to the generated conjugate pairs [6].

THE INNOVATION, POTENTIAL, AND MAIN OBJECTIVE OF THE WORK DESCRIBED HERE IS IN THE DEVELOPMENT OF HOW THE DF METHOD

gears. The large amount of computation required, erties and how to design them, has limited their use. The most frequent application has been for a

ENGINE PROFILES WITH THEIR

http://bit.ly/lVESVB

pair of identical elliptical gears [2]. Their potential

has been acknowledged, however, because of their

successful application in quick-return mechanisms, speed matching on assembly lines, and stop-and-

dwell motion. Noncircular gears have been used to improve the functionality and simplicity of mechanisms, but their diversity has so far been limited

to ellipses [4]. Figure 4(b) shows a pair of external

noncircular (and nonelliptical) pitch curves that were designed for use with the DF method as it applies to lobe pumps [7].

Internal pitch curves, like those in Figure 5,

AND NON-CIRCULAR PITCH

are the type that apply to the rotary engine. The in-

CURVES CAN OPTIMIZE

described here is in the development of how the DF

ROTARY ENGINE DESIGN.

CONVENTIONAL WANKEL

novation, potential, and main objective of the work

method and noncircular pitch curves can optimize rotary engine design. The DF method can be used with pitch circles to design conventional Wankel

BRUIN INNOVATION & TECHNOLOGY

43


engine profiles, and examples of these results are

range of design solutions that are inaccessible by

tors.

number of possibilities, compounded by the variety

shown in Figure 6, along with their calculated K facFIGURE 7 (BELOW) DF-DESIGNED ROTARY ENGINE PROFILES USING THE SAME NONCIRCULAR PITCH.

http://bit.ly/mwzl8w

In practice, noncircular internal pitch curves

are even more unusual than noncircular external

pitch curves. The acknowledged success of noncircular gears in certain applications suggests that

mechanisms using internal pitch pairs may also be improved by noncircular pitch curves. The deviation-function method is a new solution to an inhib-

iting problem for noncircular internal pitch curves; up until the DF method was developed there was

FIGURE 8 (ABOVE) DF-DESIGNED ROTARY ENGINE PROFILES USING DIFFERENT NON-CIRCULAR PITCHES.

http://bit.ly/kmZxA8

no systematic way of designing, and therefore utilizing, noncircular internal pitch curves.

a selection method to find the best solution is nec-

essary for practicality. The algorithms for applying the DF method to circular and noncircular pitch rotary engine design have been developed; all that

remains for the practical application of these equa-

tions is relating them and their parameters to the standard design criteria for Wankel engines. One of

the ultimate goals of this research is to develop a

DF-based selection method for the rotary engine.

Figure 7 shows some of the possible rotary

engine profiles resulting from a single pair of non-

evitably contains parameters that are adjustable

functions. The noncircular pitch pair is drawn in

choosing a so-called deviation function, which inusing the DF method to design for particular mechanical properties. Even considering one type of deviation function, say sinusoidal or quadratic

polynomial, the possible combinations of parameters are literally endless, encompassing a broad VOLUME 1 / SPRING 2011

of monotonically increasing continuous functions,

The DF method involves first and foremost

for rendering different profiles. This is the crux of

44

conventional design methods. Because of the sheer

circular pitch curves, using different deviation thin lines, and the rotary engine housing and triangular rotor are drawn in heavy lines. Only a single

parameter in the deviation function is changed to generate the different profiles. Each deviation function may have four or more parameters that can

be manipulated to achieve different results. Figure


8 shows examples of using different noncircular

made Wankel’s simplicity ironclad. The plot in

pitch curves in Figure 8 were generated using the

a Wankel engine on a single line. As mentioned pre-

pitch curves with the same deviation function. The same function, but increasing the noncircularity from left to right.

To demonstrate possible design improve-

ments over the conventional Wankel engine solution, the relative volumetric displacement, maximum compression ratio, and maximum leaning

angle are calculated for a range of noncircular pitch rotary engines.

Figure 9 shows the three main design criteria for viously, by selecting any of the three criteria specifi-

cally, or by selecting the K factor, the design of the engine profile is completed. In the conventional design process the relative displacement and theoretical compression ratio are limited by a range within

which the maximum leaning angle is minimized. The reason for this is that the maximum leaning angle is probably the most important criterion since it

serves as a sealing index and has the largest impact

FIGURE 9 ROTARY ENGINE DESIGN CRITERIA CHART.

WANKEL AND DF-DESIGNED

on engine efficiency and longevity. Additionally, the

was undoubtedly ingenious, but unforgiving and

the two-dimensional profile has been determined.

ROTARY ENGINE COMPARISON

Felix Wankel’s original rotary engine design

limited in terms of modification and experimen-

tation. The complexity and calculations required to manipulate and design other conjugate profiles

relative displacement and theoretical compression ratio can be adjusted by the width of the rotor after The scattered dots in Figure 9 represent de-

viation-function-designed noncircular-pitch rotary engine profile results. Only three of eight deviation-

BRUIN INNOVATION & TECHNOLOGY

45


THE ROTARY ENGINES POTENTIAL HAS NOT BEEN REALIZED WITH ALTERNATIVE FUELS; AND POSSIBLY ITS PERFORMANCE COULD BE IMPROVED FOR GASOLINE AND DIESEL-POWERED APPLICATIONS.

46

VOLUME 1 / SPRING 2011


function parameters were manipulated to generate

cessible and utilized in a familiar and practical way.

and switch angle. Switch angle represents the con-

not yet been realized for use with alternative fuels;

this plot: pitch curve noncircularity, eccentricity, jugating range of the rotor and the housing and thus

affects the maximum leaning angle. Besides the DF design results that are clinging to the conventional

Wankel engine line, clusters appear as certain fami-

lies of profiles emerge with similar results. This suggests that a more exhaustive survey and smaller

increments of manipulation will produce distinct blobs of heretofore inaccessible rotary engine solutions. Dramatic changes to the engine profile are

More than likely, the rotary engine’s potential has and possibly its performance could be improved for

gasoline and diesel-powered applications. Exploring the alternatives now available by using the DF

method and noncircular pitch curves makes optimization and innovation possible.

REFERENCES

[1] Cole, David E. “The Wankel Engine.” Scientific American Volume 227 No. 2 (August 1972) 14–23.

not necessary, however, to improve the maximum

[2] Dooner, D. B. and A. A. Seireg. The Kinematics of Gearing. John

the conventional Wankel engine design line, but

[3] Hege, John B. The Wankel Rotary Engine. Jefferson, NC: McFar-

placement and compression ratio can be changed

[4] Litvin, Faydor L., Alfonso Fuentes-Aznar, Ignacio Gonzalez-Pe-

leaning angle. Many DF design results fall close to

not directly on it. So a Wankel engine of certain disslightly but improved significantly by selecting a DF-designed rotary engine with a lower maximum

Wiley & Sons, Inc., 1995, 56–63. land & Company, Inc., 2001.

rez, and Kenichi Hayasaka. Noncircular Gears: Design and Generation. Cambridge University Press, 2009.

leaning angle.

[5] Norbye, Jan. The Wankel Engine. Philadelphia; Chilton Book

CONCLUSIONS AND FUTURE WORK

[6] Tong, Shih-Hsi. New Conjugate Design Pair - Theory and Appli-

The ultimate goal of this research is to develop

a method of selection in which the DF parameters can be manipulated to control performance criteria. All results so far have been obtained computationally, so the next immediate step is to fully real-

Company, 1971.

cation. Ph.D. thesis. University of California - Los Angeles, 1998.

[7] Tong, Shih-Hsi, and Daniel C. H. Yang. “Generation of Identical

Noncircular Pitch Curves.” Transactions of the ASME Journal of Mechanical Design 120 (1998) 337–341.

ize the equations governing the noncircular-pitch

[8] Yamamoto, Kenichi. Rotary Engine. Toyo Kogyo Co., Ltd., 1981.

resulting characteristics. Specifically applying the

tion Based Pitch Curve Modification for Conjugate Pair

engine housing and rotor profiles, as well as the DF algorithm to rotary engine design requires computational geometry, especially envelope theory,

to define the housing and rotor profile equations. After all profile equations have been established in

terms of DF parameters, the relationships between

[9] Yang, Daniel C. H., Shih-Hsi Tong, and J. Lin. “Deviation-FuncDesign.” Transactions of the ASME Journal of Mechanical Design 121 (1999) 579–586.

To see animated demos: http://bit.ly/j3OUTK

the rotor geometry and the design criteria can be determined. Performance indices to evaluate an

engine’s power efficiency and volumetric efficiency will be defined so that the influence of pitch curve

noncircularity, and all other design parameters, is clear. Then the new DF method of design can be ac-

SARAHWARREN@UCLA.EDU

BRUIN INNOVATION & TECHNOLOGY

47


THE SOCIAL NETWORK IS EVERYWHERE IN ENGINEERING WHAT TO READ? WITH WHOM TO WORK? WHERE TO PUBLISH? Jong Hoon Ahnn, Computer Science

SCIENTIFIC TECHNIQUES FOR ORGANIZING AND CONDUCTING ENGINEERING RESEARCH

48

VOLUME VOLUME 11 // SPRING SPRING2011 2011


In recent years, the growth of social networks

among data—a kind of meta-database linking their

FIGURE 1

spread. As no surprise, such a network is composed

tant as content contained in the World Wide Web

WHO HAS 308 PUBLICATIONS,

within engineering research has become wide-

of more than databases, relationships, and merely the linking lots of information together. Research-

ers and scientists for example are commonly tied by one or several specific types of interdepend-

ency, such as friendship, employment, mentorship,

discipleship, similarity of beliefs, and recognized

publishing relationships—has grown more imporhas grown. I have been fascinated with this type

of problem since 2009 and have developed some

AUTHORS. THE CLOSER AN EDGE LINKING A PEER TO SOMEONE, THE MORE CITATIONS OF THE

above as my model.

AT STANFORD, HAS CITED DAVID E.

ploying the world of academic citations mentioned

It was an interesting problem in the begin-

that track academic published papers with authors:

technique people could use to help them locate the

sors and other authors. Sifting out these patterns

20,978 CITATIONS, AND 283 CO-

PERSON’S WORK FROM THE PEER..

ning: my advisor in Computer Science Miodrag

Who has been published and is related to profes-

DAVID E. CULLER AT UC BERKELEY

harvesting techniques over the last two years, em-

knowledge or prestige. From the relationships in these networks, there have even arisen databases

A CITATION NETWORK FOR

FOR EXAMPLE, THE CLOSEST COAUTHOR, PHILIP ALEXANDER LEVIS CULLER 351 TIMES IN THE YEARS 1985–2010.

Potkonjak asked me one day, “Can you imagine a

most productive, creative, and prolific new discov-

eries in a blogosphere of contributions?” To answer BRUIN INNOVATION & TECHNOLOGY

49


that, a data set with which to model and test this

ing publication databases, the scientific objective

world revolves around academic papers—learning

scribing what guides the actions of highly success-

seemed already at hand: as a graduate student, my

others’ work and contributing my own. It’s a sizable population.

According to Microsoft Academic Search,

there are 10,869 researchers with at least twenty

citations in highly respected publications. Taking as an example the social network of David E. Culler at

UC Berkeley, it is interesting to note he has worked with 308 collaborators and garnered 20,978 cita-

is to develop statistically sound techniques for de-

ful contributors to engineering research, whom we define for the purposes of this article as ones who author the most cited papers. It is evident such

techniques for establishing relationships (a “Who’s

who” of activity) can be applied to any number of other kinds of data sets: sports, foreign languages, the spread of epidemics, patents, and many others.

What we crafted over the two years has the

tions, as shown in Figure 1. The number of cita-

following characteristics. At the core of our ap-

is tempting to think that co-authoring papers with

number of citations for a paper starting at the mo-

tions is drastically different for different authors. It

most-cited authors or the most prolific authors would be helpful for one’s own citation records.

Furthermore, there is a question whether it is better to publish at highly specialized, smaller conferences dedicated to an emerging topic or to target

the most prestigious and established venues. In

ONE OF OUR OBJECTIVES WAS TO EXTRACT A CAUSAL RELATIONSHIP BETWEEN EACH PREDICTION PARAMETER AND THE NUMBER OF CITATIONS.

proach is analysis and prediction of the expected

ment of its publication. Essentially, for the purpose of our analysis we assume that the goal of a re-

searcher is to publish highly cited papers. Of course that is not an altogether correct assumption; how-

ever we postulate that there is a strong correlation between the number of citations and the actual

impact of the paper. We also assume a strong correlation between the authors of highly cited papers

and their impact. One additional line of reasoning is that one can benefit from reading papers that will

be highly cited following their publication. There-

fore, our goal is to predict the number of citations a given paper will receive over a specified period

of time, as well as the likelihood that it will receive that number of citations, by only using data that is

available at the time of publishing. This information includes several citation indices, the average

number of citations for papers at a given database, summary, each researcher must make a number of

wrestle with questions and technical challenges.

The need for building such an author citation

have very few citations. Therefore, to take that into

database has become apparent: our practical objective is to address some of the essential productivity questions for persons in engineering, including

such questions as What papers to read? Where to publish? and With whom to collaborate? In analyzVOLUME 1 / SPRING 2011

In developing this analysis method, we had to

important decisions that impact not just her count of citations, but also the quality of her research.

50

and the citation data for co-authors.

We found first of all that the vast majority of papers account, any accurate prediction algorithm for the majority of papers must predict that a given paper

will have very few citations. The resolution be-

tween well performing algorithms is blurred due to

the distribution of citations followed by the power


FIGURE 2 BLOCK DIAGRAM OF OUR CITATION PREDICTION FRAMEWORK.

law. We addressed this problem by employing clas-

each prediction parameter and the number of cita-

was how to select a correct classification algorithm.

more important than the actual prediction of the

sification instead of prediction. Another challenge

There exists already a huge number of widely used

classification procedures; it is tempting to add to

tions. A firm grasp of this knowledge may in fact be number of citations for a given paper.

Put all together, we generated prediction re-

that collection and develop yet another classifi-

sults based on a generic framework that we de-

into an area of diminishing returns. Our analysis

with publication network data sets as inputs, and

cation technique. However, it is evident that goes showed that different classification algorithms best perform on different data sets. Therefore, we decided to look for better predictions elsewhere, i.e.

in identifying best predictors. Of course, identification of essential predictors was critical to our work.

Our procedure for finding accurate prediction pa-

rameters followed two dimensions. The first was looking for predictors that are accurate by themselves. The second was to identify principal components, i.e. predictors that predict well when they

are used simultaneously in combinations. Finally (and maybe most significantly), one of our objectives was to extract a causal relationship between

veloped. We call this framework CiteCast. It is fed it terminates when the prediction accuracy cannot

be improved. During the process, it selects one ma-

chine learning (ML) algorithm and its parameters to obtain the best prediction results as outputs. In our case, for a given paper, the goal was to predict citation counts one year following publication. We used only information available at publication time

(zero citation history) as predictive features for an

individual data set, extracted from the feature ex-

traction scheme. We solved this citation prediction problem as a multi-classification problem using a set of thresholds, where thresholds can be obtained from the distribution of citation counts in the data

BRUIN INNOVATION & TECHNOLOGY

51


set; a training set was a set of pre-classified sam-

self contributing a paper and sharing the progress

a feature sample. The training set was augmented

Now, where things stand today on this work is

ples. Each sample as a paper instance consisted of

with a class vector which represents the class to

that no matter what data sets are used, we can au-

with multi-classes, we obtained citation prediction

the data set. The framework builds a classifier with

which each sample belonged. Using a classifier results as to which class the predicted citations belonged. Importantly, we defined prediction accura-

cy to be the number of correctly classified instances divided by the total number of instances.

For the features, we employed three terms: h-

index, g-index, and e-index, which are closely related in that h-index is a basis of g-index and e-index.

The g-index is defined as the highest number g of papers that together have received g or more ci2

tations. From this definition it is already clear that

g = h”. In contrast to the h-index, the g-index gives more weight to highly cited papers. The e-index on the other hand tries to represent excess citations that the h-index ignores.

To create this data shifting technique, we

made progress only after clearly understanding

these relationships. The key technique that we found was to select features based on a linear correlation coefficient (CC) c, while a regression coefficient is heavily utilized in the literature for feature

selection. The reason is that a CC-based approach

from the distribution of citations, selects then one

ML algorithm to predict future citations, identifies the top n features by one of the ranking algorithms, and finally tunes parameters of the ML algorithm to

obtain the best results at the end. The framework

depicted in Figure 2 runs until it obtains a best-performing ML algorithm with proper parameter settings. Although we used features with correlation

coefficients less than 0.5, a combination of the top n features performs well with 82.5% of accuracy in

tenth year predictions. We also applied it to the data

set from the database field, thus generating 83.5% prediction accuracy in the same setting. Interestingly, the e-index turns out to be a very important

factor in the database field, while the h-index plays an important role in different data sets.

As an interesting application to our methods,

we applied it to the prediction problem of an au-

be an individual feature. The higher |c| we get, the

A FRAMEWORK THAT IS FED

predicting target.

WITH PUBLICATION NETWORK

c( fi , f j ) =

n

n∑ fi f j − ( ∑ fi ) ( ∑ f j )

(∑ f ) − (∑ f ) n (∑ f ) − (∑ f ) 2

2

i

i

2 j

DATA SETS AS INPUTS, AND IT 2

j

When we had gotten about halfway along, I

mentioned at one point to Potkonjak, “Isn’t this exciting?” and he gave me a knowing look. Further work began yielding accurate results to the point

that research about published papers warranted itVOLUME 1 / SPRING 2011

multi-classes using a set of thresholds determined

WE DEVELOPED CITECAST,

more correlation between a selected feature and a

52

tomatically extract a set of predictive features from

is shown to be less sensitive to the year of predic-

tion in our experiments. Let us denote fi and fj to

(1)

we had made.

TERMINATES WHEN PREDICTION ACCURACY CANNOT BE IMPROVED.


thor’s future ranking, based on the same data set

concerns what to measure and, more importantly,

FIGURE 3

graph presents an equally interesting relationship

tative metrics used.

LEY WHO HAS 308 PUBLICATIONS

used in the citation prediction problem. A co-author

between authors. The implication illustrated in Fig-

how to evaluate the predictive nature of the quanti-

For this reason, predicting the future rank

ure 3 is that, for an edge connected more closely

of individual authors is important because it can

connected person has co-authored with the target.

quality of research outcomes in advance. Faster

to a targeted person, the more publications the

For instance, David E. Culler has had 308 publica-

tions in total as of 2010, and among them twentythree papers are with his collaborator Eric Brewer at UC Berkeley. Such a relationship from the graph has garnered a great deal of attention in academia,

because quantifying the quality of an individual’s

DAVID E. CULLER AT UC BERKEAND 283 CO-AUTHORS.

provide a powerful new method for assessing the

identification of promising individuals can draw attention in the early stages of one’s career and provide potential benefits on promotion, tenure, and

new funding opportunities. We introduce RankCast based on the same framework used in CiteCast.

A typical approach to author rank is to cal-

research outcomes is important to evaluate his per-

culate and rank it via the number of citations for

ture directions. The problem to solve in more detail

factor can be derived by the number of citations di-

formance and make choices about supporting fu-

A CO-AUTHOR NETWORK FOR

each author. A widely accepted measure, the impact

BRUIN INNOVATION & TECHNOLOGY

53


PREDICTING THE FUTURE RANK OF INDIVIDUAL AUTHORS IS IMPORTANT BECAUSE IT CAN PROVIDE A POWERFUL NEW METHOD FOR ASSESSING THE QUALITY OF RESEARCH OUTCOMES IN ADVANCE.

54

VOLUME 1 / SPRING 2011


vided by the number of publications for a given period of time. By contrast, we define an author rank in three different ways using the h-index, g-index,

or e-index, respectively. Now, we can define a no-

REFERENCES

[1] D. Feitelson, and U. Yovel, “Predictive ranking of computer scientists using CiteSeer data,” Journal of Documentation, vol. 60(1), pp. 44–61, 2004.

tion of author ranking as an author rank which can

[2] M. E. J. Newman, “Power laws, Pareto distributions and Zipf’s

We found that the best feature for the author

[3] J. E. Hirsch, “Does the h-index have predictive power?,” PNAS,

achieve over 80 percent prediction accuracy. This

[4] L. Egghe, “Theory and practice of the g-index,” Scientometrics,

one point in time are more likely to be important

[5] C-T Zhang, “The e-Index, Complementing the h-Index for Ex-

features obtained from authors’ social networks do

[6] L. D. Fu, and C. F. Aliferis, “Using content-based and bibliomet-

In summary, techniques for predicting future

counts in the biomedical literature,” Scientometrics, vol.

be calculated by one of the bibliometric measures.

ranking prediction is the h-index, which can help implies that authors who have a higher h-index at

in the future. The results additionally show that not help much in predicting author ranking.

citations have had a fundamental difficulty ever

since Price introduced the first quantitative studies in citation networks in 1965. Many researchers

have studied patterns of citation in scientific pub-

law,” Contemporary Physics, vol. 46, pp. 323–351, 2005. vol. 104(49), pp. 19193–19198, 2007. vol. 69(1), pp. 131–152, 2006.

cess Citations,” PLoS ONE, vol. 4(5), 2009.

ric features for machine learning models to predict citation 85(1), pp. 257–270, 2010.

[7] M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and

I. H. Witten, “The WEKA Data Mining Software: An Update; SIGKDD Explorations,” vol. 11(1), pp. 10–18, 2009.

lications. Fu and Aliferis studied three prediction

[8] C. Lokker, and K. A. McKibbon, “Prediction of citation counts

omedical publications within a horizon of ten years

three weeks of publication: Retrospective cohort study,”

models in their state-of-the-art work. They used bibased only on predictive information available at

for clinical articles at two years using data available within BMJ, 2008.

the time of publication. Their work is different from

[9] N. L. Geller, J. S. de Cani, and R. E. Davis, “Life time-citation

ture citations with bibliometric features based on

Journal of the American Society for Information Science,

our CiteCast in that our approach is to predict fucorrelation coefficients which are more reliable in

rates: a mathematical model to compare scientists’ work,” vol. 32(1), pp. 3–15, 1981.

prediction than are regression coefficients used by

[10] R. Van Noorden, “The Trials of New Carbon,” Nature , vol. 469,

is its generic applicability to data sets. As an exam-

[11] Microsoft Academic Search. http://academic.research.micro-

Fu and Aliferis. The clear benefit of our framework

ple given above, we successfully applied it to an author-ranking prediction problem. Although the

approach in FutureRank is similar to our RankCast in that it utilizes the co-authorship network and

the time of article publication to predict future cita-

pp. 14–16, 2011. soft.com.

For further reading: http://bit.ly/jDa7Te (accepted for publication in the International Conference on Microelectronic Systems Education (MSE), June, 2011)

tions, RankCast has clear benefits in terms of pre-

diction performance as well as in the method itself. Likewise, no matter what data sets are used as in-

puts and what prediction algorithms are used, the framework can be easily applied to different types of problems generating high prediction accuracy.

JHAHNN@CS.UCLA.EDU

BRUIN INNOVATION & TECHNOLOGY

55


WELL...

What the customer described.

How manufacturing installed it.

What got budgeted.

What marketing

What the

engineer designed.

What got

advertised.

documented.

What the customer was

What the customer

COURTESY OF TUMBLR: http://tumblr.com/xjgsp2v2

What the customer finally received.

56

VOLUME 1 / SPRING 2011

billed for.

actually wanted.


Here at the UCLA Henry Samueli School of Engineering and Applied Sci-

ence, we are committed to providing a world-class education to our remarkable students, so that they may one day become productive engineers and leaders

capable of addressing society’s most pressing needs and continue our tradition of engineering excellence.

At the same time, our distinguished UCLA Engineering faculty are lead-

ing efforts to realize innovative and potentially paradigm-shifting concepts that

will address some of the grand challenges of the 21st century. These include research in areas that could transform people’s lives including renewable energy

and energy efficiency; clean water; personalized healthcare; wireless networking, sustainability and cyber security, just to name a few.

Together, the school’s exceptional faculty, students, and alumni have

helped place UCLA Engineering amongst the best engineering schools in the country.

Recent rankings by the National Research Council of graduate engineer-

ing programs placed three UCLA Engineering programs in the top 10, and seven

in the top 20. This indicates the excellence in breadth and depth throughout the school and in our seven academic departments.

In addition, our Ph.D. production per faculty member continues to be

amongst the very highest in the nation with 164 doctorate degrees awarded in

2010. We continue to enroll some of the brightest undergraduates in the country, receiving more than 11,400 applications for the fall 2011 freshman class. The average weighted GPA of those admitted were 4.36, and their average SAT score was 2142 out of 2400.

Of course, these numbers are just general indicators of the contribu-

tions of many individuals and their accomplishments. This inaugural issue of

the student-produced Bruin Innovation & Technology magazine spotlights just a few of our talented UCLA Engineering students and their work. I hope readers, especially those throughout the UCLA community, will come away with a sense of shared pride in the work these engineering students are doing, and be inspired by them as well.

One final note, congratulations to all those associated with this new mag-

azine for their foresight and perseverance in bringing it to fruition. I wish this new publication great success and look forward to it becoming a tradition at UCLA Engineering.

Sincerely,

Vijay K. Dhir Dean

BRUIN INNOVATION & TECHNOLOGY

57


65 Years of Driving Innovation


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.