projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
projects [2011/04/18 20:29] – bil | projects [2011/10/14 12:56] (current) – bil | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Available projects ====== | ====== Available projects ====== | ||
- | |||
- | <!-- | ||
The following projects are presented in alphabetical order on the supervisor' | The following projects are presented in alphabetical order on the supervisor' | ||
- | ====== | + | ====== |
- | **Supervisor**: | + | **Supervisor**: |
- | **Required Background**: | + | **Required Background**: |
- | + | ||
- | **Recommended Background**: | + | |
__Description__ | __Description__ | ||
- | Detection of forest fires is a challenging activity that requires considerable training. The objective | + | A key infrastructural problem in wireless networks |
+ | determination | ||
+ | tracking of mobile targets as they move through the radio ranges | ||
+ | wireless nodes. | ||
+ | If security is not a concern, then any of numerous existing algorithms can be | ||
+ | implemented to get reasonably accurate location estimates of nodes or targets. | ||
+ | These algorithms typically involve nodes sharing locations and assume that | ||
+ | there are no malicious nodes and no privacy issues in sharing locations. | ||
+ | However, localization or target tracking in the presence of malicious nodes | ||
+ | or nodes that do not wish to disclose their locations is much more difficult. | ||
- | ====== Study of self-motion perception | + | This project will look at current research on localization algorithms. The |
+ | student will read papers to learn about existing work and then implement | ||
+ | a few algorithms to compare their performance. Then, with assistance from the | ||
+ | supervisor, (s)he will attempt to propose improvements and/or combinations | ||
+ | ideas from the papers | ||
- | **Supervisor**: Rob Allison | + | Expected learning outcomes: Apart from familiarity with the current literature, |
+ | the project will provide the student an introduction to scientific research | ||
+ | and analysis of experimental data. | ||
- | **Required Background**: General CSE408x prerequisites | + | Skills required: Proficiency with one of Java, C, C++, MatLab; interest in |
+ | developing algorithms for distributed systems; interest in experimental | ||
+ | approaches to problems. | ||
- | **Recommended Background**: CSE3431 or CSE4471 or equivalent | + | References: |
- | __Description__ | + | 1. Multiple target localisation in sensor networks with location privacy, |
+ | Matthew Roughan, Jon Arnold· Proceedings of the 4th European conference on | ||
+ | Security and privacy in ad-hoc and sensor networks (ESAS' | ||
+ | 2007 | ||
- | This is a computer graphics project to present visual motion stimuli to an observer. The software will experimentally control scene content, collect user responses and control the camera trajectory to simulate | + | 2. Defending Wireless Sensor Networks against Adversarial Localization, |
+ | Neelanjana Dutta, Abhinav Saxena, Sriram Chellappan, Proceedings of the 2010 | ||
+ | Eleventh International Conference on Mobile Data Management (MDM '10). | ||
- | ====== Stereoscopic cinema calculator ====== | ||
- | **Supervisor**: | + | ====== GFI Sandbox |
- | **Required Background**: General CSE408x prerequisites | + | **Supervisor**: Natalija Vlajic |
- | **Recommended | + | **Required |
__Description__ | __Description__ | ||
- | Directors of three-dimensional movies sometimes use ' | + | GFI Sandbox |
- | + | safe analysis | |
- | + | ||
- | + | ||
- | + | ||
- | ====== Three-Dimensional Context from Linear Perspective for Video Surveillance Systems ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Requirements**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | To provide visual surveillance over a large environment, | + | |
- | + | ||
- | This problem can be addressed by automatically pre-mapping two-dimensional surveillance video data into three-dimensional coordinates. | + | |
- | + | ||
- | Mapping surveillance video to three-dimensional coordinates requires construction of a virtual model of the three-dimensional scene. | + | |
- | + | ||
- | This project will investigate a monocular method for inferring three-dimensional context for video surveillance. | + | |
- | + | ||
- | Although the Manhattan world assumption provides powerful constraints, | + | |
- | + | ||
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | + | |
- | + | ||
- | For more information on the laboratory: [[http:// | + | |
- | + | ||
- | + | ||
- | + | ||
- | ====== Estimating Pedestrian and Vehicle Flows from Surveillance Video ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Requirements**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Facilities planning at both city (e.g., Toronto) and institutional (e.g., York University) scales requires accurate data on the flow of people and vehicles throughout the environment. | + | |
- | + | ||
- | The density of permanent urban video surveillance camera installations has increased dramatically over the last several years. | + | |
- | + | ||
- | This project will explore the use of computer vision algorithms for the automatic estimation of pedestrian and vehicle flows from video surveillance data. The ultimate goal is to provide planners with accurate, continuous, up-to-date information on facility usage to help guide planning. | + | |
- | + | ||
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | + | |
- | + | ||
- | For more information on the laboratory: [[http:// | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | ====== Computer pointing devices and the speed-accuracy tradeoff ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | Please click [[http:// | + | |
- | + | ||
- | + | ||
- | ====== One key text entry ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | Please click [[http:// | + | |
- | + | ||
- | + | ||
- | ====== The Algorithmics Animation Workshop ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | The URL for Algorithmics Animation Workshop (AAW) is [[http:// | + | |
- | + | ||
- | + | ||
- | ====== Selenium/ | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | The Selenium IDE is an integrated development environment | + | |
- | + | ||
- | Tests can be translated to Java (JUnit), C#, Python etc. It can be extended to [[http:// | + | |
- | + | ||
- | The goal of this project is (1) to translate Selenium tests into tests that can be run under Eiffel (e.g. via ESpec or AutoTest), and (2) to provide a complete Eiffel web application creation template (with embedded database such as sqlite) for creating and testing web applications. | + | |
- | + | ||
- | ====== Automated Reasoning System for Quantified Propositional Logic ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Quantified Propositional Logics (QPL) plays an important role in a number of computer science disciplines from the theoretical computer science to knowledge representation and verification. There are also a number of open problems concerning this logic, and formulated more than 70 years ago, that can be finally solved (or at least approached) using automated reasoning techniques. The first step in such investigations has to be the design and implementation | + | |
- | + | ||
- | The theorem prover for QPL is to be designed, implemented, | + | |
- | + | ||
- | Background: Various variants of QPL have been formally formulated for the first time in the 1920s by a number of logicians and mathematicians. In modern computer science, QPL plays a significant role in theoretical computer science (proof complexity, satisfiability) as well as in verification and AI. | + | |
- | + | ||
- | + | ||
- | ====== NABU Network Emulator ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | + | ||
- | Have you ever considered writing your own emulator of an interesting system? | + | |
- | There has been a substantial activity in building software emulators of historically significant computers, game consoles, and, recently, smart communication devices. As a result, there is at least one emulator of almost every significant system. This activity contributes, | + | |
- | + | ||
- | Background : The NABU Network was designed and implemented by a Canadian company NABU Manufacturing between 1981 and 1983. The underlying idea behind the network was to link home personal computers to cable television networks which would supply a continuous, high speed stream of computer programs and information (at the rate of 6.5 Mbits per second) to almost an unlimited number of users. Cable television was a uniquely ideal technology for NABU to deliver software and data to home computers because of its high bandwidth and networking capabilities. | + | |
- | After the official launch on Ottawa Cablevision in October of 1983, the NABU Network was introduced by Ottawa' | + | |
- | + | ||
- | ====== CPS/1 Emulator ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | There has been a substantial activity in building software emulators of historically significant computers, game consoles, and, recently, smart communication devices. As a result, there is at least one emulator of almost every significant system. This activity contributes, | + | |
- | + | ||
- | BACKGROUND: The CPS/1 computer was designed and built by a Canadian company Microsystems International Ltd between 1972 and 73. The computer was built around the first Canadian microprocessor--the MF7114--one of world' | + | |
- | + | ||
- | ====== Robotic tangible user interface for large tabletops ====== | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | + | ||
- | Tangible user interfaces provide the user with object that they can touch and use as input devices. One example is the use of (tracked) toy houses to perform a city planning task on a large surface. This project implements a new form of tracking/ | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | ====== Better Layout Mechanisms for User Interfaces Toolkits ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | The layout mechanisms for many GUI toolkits | + | |
- | + | ||
- | + | ||
- | ====== Predicting Visibility Obstructions for a 6DOF Tracker ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Previous work of the supervisor generated a novel and highly accurate Virtual Reality tracking system based on (eye-safe) laser diodes. The speed and accuracy of this system matches or exceeds the specification of all competing commercial systems. However, this system works only in 5 or 6-sided immersive display environment. | + | |
- | Recent work has adapted the system to track successfully with as little as one large display wall and has also characterized the accuracy more comprehensively. | + | |
- | The next step is to generalize the system to work in normal rooms, which may have lamps, shelves, etc. Here, visibility obstructions play a significant role and predicting these obstructions can be used to increase the tracking accuracy. This project will simulate a new method for visibility obstruction prediction to detect how big an increase in accuracy can be expected. | + | |
- | + | ||
- | + | ||
- | + | ||
- | ====== Extensions to a 3D Modeling System ====== | + | |
- | + | ||
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | [[http:// | + | |
- | Each of the following two items can be considered a separate project: | + | |
- | + | ||
- | * Integration of an existing implementation of a 3D sliding technique, which greatly facilitates 3D object movement. | + | |
- | * The ability to draw new " | + | |
- | + | ||
- | --> | + | |
+ | - familiarize yourself with the operation of GFI Sandbox; | ||
+ | - using readily available GFI Sandbox Feeds (i.e., ThreatTrack Feeds), build a database of malware designed specifically for execution of DDoS-attacks - the so-called botnet malware; | ||
+ | - examine the behaviour of the collected malware 'upon execution'; | ||
+ | - propose and build an environment - comprising the standard freeware security tools - for longer term (beyond immediate execution) analysis of the collected malware. |
projects.1303158598.txt.gz · Last modified: 2011/04/18 20:29 by bil