projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
projects [2010/12/09 18:11] – bil | projects [2011/04/27 15:31] (current) – bil | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Available projects ====== | ====== Available projects ====== | ||
+ | < | ||
The following projects are presented in alphabetical order on the supervisor' | The following projects are presented in alphabetical order on the supervisor' | ||
- | ====== Simulation for Forest Fire Detection ====== | + | --></ |
- | **Supervisor**: | + | ====== Localizing nodes and tracking targets in wireless ad hoc networks securely ====== |
- | **Required Background**: General CSE408x prerequisites | + | **Supervisor**: Suprakash Datta |
- | **Recommended | + | **Required |
__Description__ | __Description__ | ||
- | Detection of forest fires is a challenging activity that requires considerable training. The objective | + | A key infrastructural problem in wireless networks |
+ | determination | ||
+ | tracking of mobile targets as they move through the radio ranges | ||
+ | wireless nodes. | ||
+ | If security is not a concern, then any of numerous existing algorithms can be | ||
+ | implemented to get reasonably accurate location estimates of nodes or targets. | ||
+ | These algorithms typically involve nodes sharing locations and assume that | ||
+ | there are no malicious nodes and no privacy issues in sharing locations. | ||
+ | However, localization or target tracking in the presence of malicious nodes | ||
+ | or nodes that do not wish to disclose their locations is much more difficult. | ||
- | ====== Study of self-motion perception | + | This project will look at current research on localization algorithms. The |
+ | student will read papers to learn about existing work and then implement | ||
+ | a few algorithms to compare their performance. Then, with assistance from the | ||
+ | supervisor, (s)he will attempt to propose improvements and/or combinations | ||
+ | ideas from the papers | ||
- | **Supervisor**: Rob Allison | + | Expected learning outcomes: Apart from familiarity with the current literature, |
+ | the project will provide the student an introduction to scientific research | ||
+ | and analysis of experimental data. | ||
- | **Required Background**: | + | Skills |
- | + | developing algorithms | |
- | **Recommended Background**: | + | approaches |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | This is a computer graphics project to present visual motion stimuli to an observer. The software will experimentally control scene content, collect user responses and control the camera trajectory to simulate the desired self-motion profile. | + | |
- | + | ||
- | + | ||
- | ====== Stereoscopic cinema calculator ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Directors of three-dimensional movies sometimes use ' | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | ====== Three-Dimensional Context from Linear Perspective for Video Surveillance Systems ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Requirements**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | To provide visual surveillance over a large environment, | + | |
- | + | ||
- | This problem can be addressed by automatically pre-mapping two-dimensional surveillance video data into three-dimensional coordinates. | + | |
- | + | ||
- | Mapping surveillance video to three-dimensional coordinates requires construction of a virtual model of the three-dimensional scene. | + | |
- | + | ||
- | This project will investigate a monocular method for inferring three-dimensional context for video surveillance. | + | |
- | + | ||
- | Although the Manhattan world assumption provides powerful constraints, | + | |
- | + | ||
- | The student will work closely | + | |
- | + | ||
- | For more information on the laboratory: [[http:// | + | |
- | + | ||
- | + | ||
- | + | ||
- | ====== Estimating Pedestrian and Vehicle Flows from Surveillance Video ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Requirements**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Facilities planning at both city (e.g., Toronto) and institutional (e.g., York University) scales requires accurate data on the flow of people and vehicles throughout the environment. | + | |
- | + | ||
- | The density of permanent urban video surveillance camera installations has increased dramatically over the last several years. | + | |
- | + | ||
- | This project will explore the use of computer vision algorithms for the automatic estimation of pedestrian and vehicle flows from video surveillance data. The ultimate goal is to provide planners with accurate, continuous, up-to-date information on facility usage to help guide planning. | + | |
- | + | ||
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | + | |
- | + | ||
- | For more information on the laboratory: [[http:// | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | ====== Computer pointing devices and the speed-accuracy tradeoff ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | Please click [[http:// | + | |
- | + | ||
- | + | ||
- | ====== One key text entry ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | Please click [[http:// | + | |
- | + | ||
- | + | ||
- | ====== The Algorithmics Animation Workshop ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | The URL for Algorithmics Animation Workshop (AAW) is [[http:// | + | |
- | + | ||
- | ====== Automated Reasoning System for Quantified Propositional Logic ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Quantified Propositional Logics (QPL) plays an important role in a number of computer science disciplines from the theoretical computer science to knowledge representation and verification. There are also a number of open problems concerning this logic, and formulated more than 70 years ago, that can be finally solved (or at least approached) using automated reasoning techniques. The first step in such investigations has to be the design and implementation of a theorem prover, or automated reasoning system, for QPL. Such a system should, in principle, be able to determine whether or not a given formula of QPL is a theorem (or a tautology) in this logic. | + | |
- | + | ||
- | The theorem prover for QPL is to be designed, implemented, | + | |
- | + | ||
- | Background: Various variants of QPL have been formally formulated for the first time in the 1920s by a number of logicians and mathematicians. In modern computer science, QPL plays a significant role in theoretical computer science (proof complexity, satisfiability) as well as in verification and AI. | + | |
- | + | ||
- | + | ||
- | ====== NABU Network Emulator ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | + | ||
- | Have you ever considered writing your own emulator of an interesting system? | + | |
- | There has been a substantial activity in building software emulators of historically significant computers, game consoles, and, recently, smart communication devices. As a result, there is at least one emulator | + | |
- | + | ||
- | Background : The NABU Network was designed and implemented by a Canadian company NABU Manufacturing between 1981 and 1983. The underlying idea behind the network was to link home personal computers to cable television networks which would supply a continuous, high speed stream of computer programs and information (at the rate of 6.5 Mbits per second) to almost an unlimited number of users. Cable television was a uniquely ideal technology for NABU to deliver software and data to home computers because of its high bandwidth and networking capabilities. | + | |
- | After the official launch on Ottawa Cablevision in October of 1983, the NABU Network was introduced by Ottawa' | + | |
- | + | ||
- | ====== CPS/1 Emulator ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | There has been a substantial activity | + | |
- | + | ||
- | BACKGROUND: The CPS/1 computer was designed and built by a Canadian company Microsystems International Ltd between 1972 and 73. The computer was built around the first Canadian microprocessor--the MF7114--one of world' | + | |
- | + | ||
- | ====== Robotic tangible user interface | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | + | ||
- | Tangible user interfaces provide the user with object that they can touch and use as input devices. One example is the use of (tracked) toy houses to perform a city planning task on a large surface. This project implements a new form of tracking/ | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | ====== Different " | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Many graphics programs implement snapping | + | |
+ | References: | ||
+ | 1. Multiple target localisation in sensor networks with location privacy, | ||
+ | Matthew Roughan, Jon Arnold· Proceedings of the 4th European conference on | ||
+ | Security and privacy in ad-hoc and sensor networks (ESAS' | ||
+ | 2007 | ||
+ | 2. Defending Wireless Sensor Networks against Adversarial Localization, | ||
+ | Neelanjana Dutta, Abhinav Saxena, Sriram Chellappan, Proceedings of the 2010 | ||
+ | Eleventh International Conference on Mobile Data Management (MDM '10). | ||
projects.1291918315.txt.gz · Last modified: 2010/12/09 18:11 by bil