projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
projects [2010/05/03 19:30] – bil | projects [2011/10/14 12:56] (current) – bil | ||
---|---|---|---|
Line 3: | Line 3: | ||
The following projects are presented in alphabetical order on the supervisor' | The following projects are presented in alphabetical order on the supervisor' | ||
- | ====== | + | ====== |
- | **Supervisor**: | + | **Supervisor**: |
- | **Required Background**: | + | **Required Background**: |
- | + | ||
- | **Recommended Background**: | + | |
__Description__ | __Description__ | ||
- | Detection of forest fires is a challenging activity that requires considerable training. The objective | + | A key infrastructural problem in wireless networks |
+ | determination | ||
+ | tracking of mobile targets as they move through the radio ranges | ||
+ | wireless nodes. | ||
+ | If security is not a concern, then any of numerous existing algorithms can be | ||
+ | implemented to get reasonably accurate location estimates of nodes or targets. | ||
+ | These algorithms typically involve nodes sharing locations and assume that | ||
+ | there are no malicious nodes and no privacy issues in sharing locations. | ||
+ | However, localization or target tracking in the presence of malicious nodes | ||
+ | or nodes that do not wish to disclose their locations is much more difficult. | ||
- | ====== Study of self-motion perception | + | This project will look at current research on localization algorithms. The |
+ | student will read papers to learn about existing work and then implement | ||
+ | a few algorithms to compare their performance. Then, with assistance from the | ||
+ | supervisor, (s)he will attempt to propose improvements and/or combinations | ||
+ | ideas from the papers | ||
- | **Supervisor**: Rob Allison | + | Expected learning outcomes: Apart from familiarity with the current literature, |
+ | the project will provide the student an introduction to scientific research | ||
+ | and analysis of experimental data. | ||
- | **Required Background**: General CSE408x prerequisites | + | Skills required: Proficiency with one of Java, C, C++, MatLab; interest in |
+ | developing algorithms for distributed systems; interest in experimental | ||
+ | approaches to problems. | ||
- | **Recommended Background**: CSE3431 or CSE4471 or equivalent | + | References: |
- | __Description__ | + | 1. Multiple target localisation in sensor networks with location privacy, |
+ | Matthew Roughan, Jon Arnold· Proceedings of the 4th European conference on | ||
+ | Security and privacy in ad-hoc and sensor networks (ESAS' | ||
+ | 2007 | ||
- | This is a computer graphics project to present visual motion stimuli to an observer. The software will experimentally control scene content, collect user responses and control the camera trajectory to simulate | + | 2. Defending Wireless Sensor Networks against Adversarial Localization, |
+ | Neelanjana Dutta, Abhinav Saxena, Sriram Chellappan, Proceedings of the 2010 | ||
+ | Eleventh International Conference on Mobile Data Management (MDM '10). | ||
- | ====== Stereoscopic cinema calculator ====== | ||
- | **Supervisor**: | + | ====== GFI Sandbox |
- | **Required Background**: General CSE408x prerequisites | + | **Supervisor**: Natalija Vlajic |
- | **Recommended | + | **Required |
__Description__ | __Description__ | ||
- | Directors of three-dimensional movies sometimes use ' | + | GFI Sandbox |
- | + | safe analysis | |
- | + | ||
- | ====== Web-based digital signage ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Digital signs are increasingly used in many modern buildings to direct people to appropriate rooms for meetings, services, etc. Unfortunately, | + | |
- | + | ||
- | One way to do this is to utilize what administrative staff are really good at: dealing with calendars. By assigning calendars to individual rooms/ | + | |
- | + | ||
- | More specifically, | + | |
- | + | ||
- | + | ||
- | ====== Three-Dimensional Context from Linear Perspective for Video Surveillance Systems ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Requirements**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | To provide visual surveillance over a large environment, | + | |
- | + | ||
- | This problem can be addressed by automatically pre-mapping two-dimensional surveillance video data into three-dimensional coordinates. | + | |
- | + | ||
- | Mapping surveillance video to three-dimensional coordinates requires construction of a virtual model of the three-dimensional scene. | + | |
- | + | ||
- | This project will investigate a monocular method for inferring three-dimensional context for video surveillance. | + | |
- | + | ||
- | Although the Manhattan world assumption provides powerful constraints, | + | |
- | + | ||
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | + | |
- | + | ||
- | For more information on the laboratory: [[http:// | + | |
- | + | ||
- | + | ||
- | + | ||
- | ====== Estimating Pedestrian and Vehicle Flows from Surveillance Video ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Requirements**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Facilities planning at both city (e.g., Toronto) and institutional (e.g., York University) scales requires accurate data on the flow of people and vehicles throughout the environment. | + | |
- | + | ||
- | The density of permanent urban video surveillance camera installations has increased dramatically over the last several years. | + | |
- | + | ||
- | This project will explore the use of computer vision algorithms for the automatic estimation of pedestrian and vehicle flows from video surveillance data. The ultimate goal is to provide planners with accurate, continuous, up-to-date information on facility usage to help guide planning. | + | |
- | + | ||
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | + | |
- | + | ||
- | For more information on the laboratory: [[http:// | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | ====== Estimating Registration Error ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | A fundamental step in computer-assisted surgery is registration where the anatomy of the patient is matched to an image or model of the anatomy. For some types of orthopaedic procedures, registration is performed by digitizing the locations of points on the surface of a bone and matching the point locations to the surface of a model of the bone. Here, a surgeon uses a pointer that is tracked using an optical tracking system to measure registration point locations on a patient. A registration algorithm is used to compute the transformation that best matches the points to a model of the anatomy. | + | |
- | + | ||
- | + | ||
- | Virtual navigational information (such as where to drill or cut the bone) can be provided to the surgeon after the registration transformation has been established. Here, a surgeon is using a tracked surgical drill to drill a hole along a pre-operatively defined path. Notice that the surgeon looks at the virtual navigational information instead of the patient when performing this task. | + | |
- | + | ||
- | + | ||
- | Computer-assisted surgical navigation depends on having an accurate registration. If the estimated registration is inaccurate then the navigational information will also be inaccurate, which may lead to errors in the surgical procedure. It is of great interest to know the accuracy of the estimated registration. | + | |
- | + | ||
- | Further details on the project can be found [[http:// | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | ====== Computer pointing devices and the speed-accuracy tradeoff ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | Please click [[http:// | + | |
- | + | ||
- | + | ||
- | ====== One key text entry ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | Please click [[http:// | + | |
- | + | ||
- | + | ||
- | ====== The Algorithmics Animation Workshop ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | The URL for Algorithmics Animation Workshop (AAW) is [[http:// | + | |
- | + | ||
- | + | ||
- | + | ||
- | ====== Robotic tangible user interface | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | + | ||
- | Tangible user interfaces provide the user with object that they can touch and use as input devices. One example is the use of (tracked) toy houses to perform a city planning task on a large surface. This project implements a new form of tracking/ | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | ====== Different " | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Many graphics programs implement snapping to facilitate drawing. Snapping ensures that end-points | + | |
- | + | ||
- | + | ||
- | + | ||
- | ====== Simulation of a 6dof virtual reality tracker ====== | + | |
- | + | ||
- | **Supervisor**: Wolfgang Stuerzlinger | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Previous work by the supervisor resulted in a novel and highly accurate Virtual Reality tracking system that matches or exceeds the specifications of all competing systems. However, this system works only in 5 or 6-sided immersive display environment. | + | |
- | + | ||
- | This project is the first step towards an adaptation of the technology for more general environments. In particular we target normal rooms and immersive displays with less than 5 screens. The technical work involves adapting the simulation software for the previous device to simulate a new design, and iteratively optimizing that design based on the results obtained. | + | |
+ | - familiarize yourself with the operation of GFI Sandbox; | ||
+ | - using readily available GFI Sandbox Feeds (i.e., ThreatTrack Feeds), build a database of malware designed specifically for execution of DDoS-attacks - the so-called botnet malware; | ||
+ | - examine the behaviour of the collected malware 'upon execution'; | ||
+ | - propose and build an environment - comprising the standard freeware security tools - for longer term (beyond immediate execution) analysis of the collected malware. |
projects.1272915017.txt.gz · Last modified: 2010/05/03 19:30 by bil