ongoing
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ongoing [2010/08/24 15:33] – bil | ongoing [2011/10/14 12:57] (current) – bil | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Ongoing projects ====== | ====== Ongoing projects ====== | ||
- | ====== Web-based digital system | + | ====== Web Crawlers Behaving Like Humans: Are We There Yet!? |
- | **Student**: | + | **Student**: |
- | **Supervisor**: | + | **Supervisor**: |
- | __Description__ | + | **Required Background**: CSE4480 prerequisites |
- | + | ||
- | Build a web-based digital signage system for Bethune College. Some of the technologies that you will be expected to learn/use include Javascript, JQuery, HTML, CSS, and ical/ | + | |
- | + | ||
- | ====== Tandem repeat detection using spectral methods ====== | + | |
- | + | ||
- | **Student**: | + | |
- | + | ||
- | **Supervisor**: | + | |
__Description__ | __Description__ | ||
- | DNA sequences | + | Distributed Denial |
- | + | of the most serious threats | |
- | Finding tandem repeats is an important problem in Computational Biology. The techniques that have been proposed for it fall into two classes – string matching algorithms and signal processing techniques. In this project, we will explore fast, accurate algorithms for detecting tandem repeats and evaluate the outputs | + | simplicity |
- | + | the quality | |
- | The student will implement the spectral algorithms used in [1] (one based on Fourier Transforms and one on autoregressive models). He will then make changes suggested by the supervisor, and evaluate the effect of the modifications. | + | An especially challenging form of DDoS attacks are the so-called |
- | Throughout the course, the student is required | + | Application-Layer DDoS attacks. Namely: |
- | + | ||
- | ====== Low-Cost Three-Dimensional Face Scanning System ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Requirements**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Low-cost three-dimensional face-scanning systems have a large range of potential applications in security | + | |
- | + | ||
- | The project will involve systems design and development of a specialized real-time 3D face scanner. | + | |
- | + | ||
- | For more information on the laboratory: [[http:// | + | |
- | + | ||
- | ====== Simulation | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Previous work by the supervisor resulted in a novel and highly accurate Virtual Reality tracking system that matches or exceeds the specifications of all competing systems. However, this system works only in 5 or 6-sided immersive display environment. | + | |
- | + | ||
- | This project is the first step towards an adaptation of the technology for more general environments. In particular we target normal rooms and immersive displays with less than 5 screens. The technical work involves adapting the simulation software for the previous device to simulate a new design, and iteratively optimizing that design based on the results obtained. | + | |
- | + | ||
- | + | ||
- | + | ||
- | ====== Programming Multi-Core GPUs with CUDA ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | CUDA stands for " | + | |
- | + | ||
- | The aim of this project is to get familiar with GPUs and to study how to program them. | + | |
- | + | ||
- | More details can be found at: [[http:// | + | |
- | (this link is only accessible from machines within the domain yorku.ca.) | + | |
+ | - In Application-Layer DDoS attacks, the attackers utilize a flood of legitimate-looking Layer-7 network sessions (i.e., sessions that are generally hard to detect and/or filter out by a firewall or an IDS system) | ||
+ | - Increasingly, | ||
+ | The goal of this project is to investigate the state of the art in | ||
+ | malicious web crawler design. In particular, the project will look | ||
+ | into the challenges of designing a smart-DDoS-crawler from the | ||
+ | attacker point of view - one of these challenges being the estimation | ||
+ | of web-page popularity assuming no a priori access to the web-logs | ||
+ | of the victim web-site. | ||
ongoing.1282664035.txt.gz · Last modified: by bil