oldprojects
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
oldprojects [2012/03/15 20:14] – created dymond | oldprojects [2012/03/15 20:15] (current) – dymond | ||
---|---|---|---|
Line 1: | Line 1: | ||
Winter 2012 Project Listings | Winter 2012 Project Listings | ||
+ | ===== Previously offered Projects, Winter 2012 ===== | ||
+ | |||
+ | Updated: | ||
+ | |||
+ | Projects will be added to this page until the beginning of the winter term. | ||
+ | |||
+ | If you have an idea for a project that is not listed here, you are welcome to contact faculty members to find out if they are willing to supervise it. (If you are not sure who to approach as a potential supervisor for a particular project you have in mind, ask the course coordinator, | ||
+ | |||
+ | Most of the projects listed here are intended for CSE4080. | ||
+ | |||
+ | |||
+ | |||
+ | ==== Developing Fast Speech Recognition Engine using GPU ==== | ||
+ | |||
+ | Supervisor: Hui Jang | ||
+ | |||
+ | Required Background: General prerequisites | ||
+ | |||
+ | Description: | ||
+ | Recently, Graphics Processing Units (GPU' | ||
+ | |||
+ | During the recent years, there is an increasing demand in the job market for programmers who can use GPU's for general purpose computing tasks. This project will serve as a perfect vehicle for you to learn such a cutting-edge programming skill. | ||
+ | |||
+ | References | ||
+ | |||
+ | [1] Kisun You, Jike Chong, Youngmin Yi, Gonina, E., Hughes, C.J., Yen-Kuang Chen, Wonyong Sung, Keutzer, K., “Parallel Scalibility in Speech Recognition: | ||
+ | |||
+ | [2] Jike Chong, Ekaterina Gonina, Youngmin Yi, Kurt Keutzer, “A Fully Data Parallel WFST-based Large Vocabulary Continuous Speech Recognition on a Graphics Processing Unit,” Proc. of Interspeech 2009, Brigton, UK, 2009. | ||
+ | |||
+ | ==== YUsend Thermal Vacuum (TVAC) Test Manager ==== | ||
+ | |||
+ | Supervisor: Rob Allison (co-supervised with Hugh Chesser, Space Engineering) | ||
+ | |||
+ | Required Background: General CSE408x prerequisites, | ||
+ | |||
+ | Description: | ||
+ | |||
+ | Specific tasks include: 1. Writing temperature acquisition card (OMEGA Engineering CIO-DAS-Temp) drivers for LabView - should be written in Visual C++ or similar and compiled into SubVI format. 2. Write LabView VI's (“Virtual Instrument”) to perform (a) Test set-up activities - checkout of sensor and lamps, assigning neumonics to temperature sensors, setting of alarm conditions for sensors and lamps (b) Acquire and monitor temperature data and control lamp voltage during test, raise operator alarms for temperature or IR lamp anomalous conditions as required © Store temperature and control data for subsequent analysis and reporting. 3. (Optional) Interface the Test Manager with an orbital simulation tool which would be used to compute IR lamp inputs based on a simulation of the nanosatellite' | ||
+ | |||
+ | ==== Three-Dimensional Context from Linear Perspective for Video Surveillance Systems ==== | ||
+ | |||
+ | Supervisor: James Elder | ||
+ | |||
+ | Requirements: | ||
+ | |||
+ | Description: | ||
+ | To provide visual surveillance over a large environment, | ||
+ | |||
+ | This problem can be addressed by automatically pre-mapping two-dimensional surveillance video data into three-dimensional coordinates. Rendering the data directly in three dimensions can potentially lighten the cognitive load of security personnel and make human activities more immediately interpretable. | ||
+ | |||
+ | Mapping surveillance video to three-dimensional coordinates requires construction of a virtual model of the three-dimensional scene. Such a model could be obtained by survey (e.g., using LIDAR), but the cost and time required for each site would severely limit deployment. Wide-baseline uncalibrated stereo methods are developing and have potential utility, but require careful sensor placement, and the difficulty of the correspondence problem limits reliability. | ||
+ | |||
+ | This project will investigate a monocular method for inferring three-dimensional context for video surveillance. The method will make use of the fact that most urban scenes obey the so-called “Manhattan-world” assumption, viz., a large proportion of the major surfaces in the scene are rectangles aligned with a three-dimensional Cartesian grid (Coughlan & Yuille, 2003). This regularity provides strong linear perspective cues that can potentially be used to automatically infer three-dimensional models of the major surfaces in the scene (up to a scale factor). These models can then be used to construct a virtual environment in which to render models of human activities in the scene. | ||
+ | |||
+ | Although the Manhattan world assumption provides powerful constraints, | ||
+ | |||
+ | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. The student will develop skills in using MATLAB, a very useful mathematical programming environment, | ||
+ | |||
+ | For more information on the laboratory: [[http:// | ||
+ | |||
+ | ==== Estimating Pedestrian and Vehicle Flows from Surveillance Video ==== | ||
+ | |||
+ | Supervisor: James Elder | ||
+ | |||
+ | Requirements: | ||
+ | |||
+ | Description: | ||
+ | Facilities planning at both city (e.g., Toronto) and institutional (e.g., York University) scales requires accurate data on the flow of people and vehicles throughout the environment. Acquiring these data can require the costly deployment of specialized equipment and people, and this effort must be renewed at regular intervals for the data to be relevant. | ||
+ | |||
+ | The density of permanent urban video surveillance camera installations has increased dramatically over the last several years. These systems provide a potential source of low-cost data from which flows can be estimated for planning purposes. | ||
+ | |||
+ | This project will explore the use of computer vision algorithms for the automatic estimation of pedestrian and vehicle flows from video surveillance data. The ultimate goal is to provide planners with accurate, continuous, up-to-date information on facility usage to help guide planning. | ||
+ | |||
+ | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. The student will develop skills in using MATLAB, a very useful mathematical programming environment, | ||
+ | |||
+ | For more information on the laboratory: [[http:// | ||
+ | |||
+ | ==== An Open Source Structural Equation Modelling Path Diagram to Syntax Application ==== | ||
+ | |||
+ | Supervisor: | ||
+ | |||
+ | Required Skills: | ||
+ | Java and GUI development will be required. | ||
+ | |||
+ | Description: | ||
+ | |||
+ | ==== Network analysis of EEG data: Understanding connections in the brain ==== | ||
+ | |||
+ | Supervisor: Andrew Eckford | ||
+ | |||
+ | Required Background: CSE 3213 (Computer Networks), CSE 3451 (Signals and Systems), and MATH 2030 (Elementary Probability); | ||
+ | |||
+ | Preferred: At least a B in all of the above courses | ||
+ | |||
+ | Description: | ||
+ | Electroencephalogram (EEG) data indicates electrical activity at particular locations in the brain. Using EEG data from multiple sensors, it is possible to find correlations among the measurements, | ||
+ | |||
+ | The tools that are used to analyze communication networks can also be used to analyze brain networks. In this interdisciplinary project, you will work with a collection of EEG data to identify correlated measurements, | ||
+ | |||
+ | ==== Data structures for Estonian ==== | ||
+ | |||
+ | Supervisor: | ||
+ | |||
+ | Background: | ||
+ | interest in languages; having learned a second (human) language | ||
+ | is helpful because you will be more familiar with grammatical | ||
+ | concepts. | ||
+ | |||
+ | Description: | ||
+ | This project will explore some aspect of machine-aided translation | ||
+ | for Estonian. | ||
+ | probably do not know Estonian and I only know it at a basic level. | ||
+ | The idea is to see if programmers can build a system without too | ||
+ | much expert knowledge of the language (but with extensive help from grammar | ||
+ | books and occasional queries to native speakers). | ||
+ | Estonian is a Uralic language with many interesting | ||
+ | [[http:// | ||
+ | |||
+ | For example, the Estonian noun for " | ||
+ | forms (vesi, vee, vett, vees, vette, veest, veeta, veed, ...) depending | ||
+ | on the role of the word within the sentence. | ||
+ | The dictionary entry for this word is alphabetized under its first form (vesi), and may or may not give a couple of other basic forms (vee, vett). | ||
+ | Thus, if you see the word veest, you would have to know that it is a form of vesi before being able to look it up in a typical dictionary. | ||
+ | |||
+ | The exact topic to be studied for the project will depend on student' | ||
+ | * Given a dictionary entry for a word (e.g. vesi, vee, vett), compute other forms (e.g. veest) by applying rules or using statistical methods of machine learning. | ||
+ | * Design a data structure to represent the meaning of a sentence in a way that would be useful for generating an Estonian sentence with that meaning (or, conversely, extracting the meaning from an Estonian sentence). | ||
+ | * Pick some limited subdomain of the language (e.g. phrases involving time: "in two days", " | ||
+ | * Survey existing work on Estonian computational linguistics, | ||
+ | |||
+ | ==== MF7114 Assembler ==== | ||
+ | |||
+ | Supervisor: Zbigniew Stachniak | ||
+ | |||
+ | Required Background: Some knowledge of microprocessor architecture and assembly programming | ||
+ | |||
+ | Description: | ||
+ | Every microprocessor is supported by a variety of software tools, such as assemblers, disassemblers, | ||
+ | |||
+ | Background Information: | ||
+ | |||
+ | [[http:// | ||
+ | |||
+ | ==== MF7114 Debugger ==== | ||
+ | |||
+ | Supervisor: Zbigniew Stachniak | ||
+ | |||
+ | Required Background: Some knowledge of microprocessor architecture and assembly programming | ||
+ | |||
+ | Description: | ||
+ | Every microprocessor is supported by a variety of software tools, such as assemblers, | ||
+ | |||
+ | Background Information: | ||
+ | |||
+ | [[http:// | ||
+ | |||
+ | ==== Athenians Data Project ==== | ||
+ | |||
+ | Supervisor: Nick Cercone | ||
+ | |||
+ | Required Background: General CSE408x prerequisites | ||
+ | |||
+ | Recommended Background: Data Mining | ||
+ | |||
+ | Description: | ||
+ | |||
+ | ==== Early Breast Cancer Detection based on MRI’s ==== | ||
+ | |||
+ | Supervisor: Amir Asif | ||
+ | |||
+ | Required Background: General CSE408x prerequisites | ||
+ | |||
+ | Recommended background: Signal processing, i.e. CSE3451 | ||
+ | |||
+ | Description: | ||
+ | |||
+ | ==== Touch- and Gesture-based Text Entry With Automatic Error Correction ==== | ||
+ | |||
+ | Supervisor: Scott Mackenzie | ||
+ | |||
+ | Required Background: CSE3461 (or equivalent), | ||
+ | |||
+ | Recommended Background: Possession of an Android touch-based phone or tablet would be an asset, but is not essential. | ||
+ | |||
+ | Description: | ||
+ | |||
+ | ==== Tandem repeat detection using spectral methods ==== | ||
+ | |||
+ | Supervisor: Suprakash Datta | ||
+ | |||
+ | Required Background: The student should have completed undergraduate courses in Algorithms and Signals and Systems. | ||
+ | |||
+ | Recommended Background: Some background in Statistics is desirable but not essential. | ||
+ | |||
+ | Description: | ||
+ | |||
+ | Finding tandem repeats is an important problem in Computational Biology. The techniques that have been proposed for it fall into two classes: string matching algorithms and signal processing techniques. In this project, we will explore fast, accurate algorithms for detecting tandem repeats and evaluate the outputs of the algorithms studied by comparing their outputs with those of available packages, including [[http:// | ||
+ | |||
+ | ==== 4480 Project: Localizing nodes and tracking targets in wireless ad hoc networks securely ==== | ||
+ | |||
+ | Supervisor: Suprakash Datta | ||
+ | |||
+ | Required Background: CSE4480 prerequisites | ||
+ | |||
+ | Description: | ||
+ | A key infrastructural problem in wireless networks is localization (or the determination of geographical locations) of nodes. A related problem is the tracking of mobile targets as they move through the radio ranges of the wireless nodes. | ||
+ | |||
+ | If security is not a concern, then any of numerous existing algorithms can be implemented to get reasonably accurate location estimates of nodes or targets. These algorithms typically involve nodes sharing locations and assume that there are no malicious nodes and no privacy issues in sharing locations. However, localization or target tracking in the presence of malicious nodes or nodes that do not wish to disclose their locations is much more difficult. | ||
+ | |||
+ | This project will look at current research on localization algorithms. The student will read papers to learn about existing work and then implement a few algorithms to compare their performance. Then, with assistance from the supervisor, (s)he will attempt to propose improvements and/or combinations of ideas from the papers in a Java/ | ||
+ | |||
+ | Expected learning outcomes: Apart from familiarity with the current literature, the project will provide the student an introduction to scientific research and analysis of experimental data. | ||
+ | |||
+ | Skills required: Proficiency with one of Java, C, C++, MatLab; interest in developing algorithms for distributed systems; interest in experimental approaches to problems. | ||
+ | |||
+ | References: | ||
+ | |||
+ | 1. Multiple target localisation in sensor networks with location privacy, Matthew Roughan, Jon Arnold· Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks (ESAS' | ||
+ | |||
+ | 2. Defending Wireless Sensor Networks against Adversarial Localization, | ||
+ | |||
+ | The student will implement existing spectral algorithms based on Fourier Transforms and on an autoregressive model. He will then make changes suggested by the supervisor, and evaluate the effect of the modifications. Throughout the course, the student is required to maintain a course Web site to report any progress and details about the project. | ||
+ | |||
+ | ==== 4480 Project: GFI Sandbox Analysis of Malware for DDoS ==== | ||
+ | |||
+ | Supervisor: Natalija Vlajic | ||
+ | |||
+ | Required Background: General prerequisites. | ||
+ | |||
+ | Description: | ||
+ | GFI Sandbox is a sophisticated industry-leading tool for quick and safe analysis of malware behaviour. The goals of this project are: 1) familiarize yourself with the operation of GFI Sandbox; 2) using readily available GFI Sandbox Feeds (i.e., ThreatTrack Feeds), build a database of malware designed specifically for execution of DDoS-attacks - the so-called botnet malware; 3) examine the behaviour of the collected malware 'upon execution'; |
oldprojects.1331842458.txt.gz · Last modified: 2012/03/15 20:14 by dymond