projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
projects [2011/09/07 01:16] – dymond | projects [2015/08/11 21:02] – jarek | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | (Listed in order received.) | + | \\ |
- | ====== Building an autonomous motorboat ====== | + | =====Data visualization in Skydive===== |
- | **Supervisor**: Michael Jenkin | + | **Supervisor: Jarek Gryz** |
- | **Required Background**: General CSE408x prerequisites | + | Skydive is a prototype system designed for database visualization using a concept of the so called |
+ | data pyramid. The system is composed of three modules (DB - Database Module, D2I - | ||
+ | Data-to-Image module, and VC - Visualizaton Client). Each is designed to use a different type | ||
+ | of computer memory. The DB module uses disk to store and manage the raw data, and materialized | ||
+ | data pyramids. The D2I module works with a small subset of the aggregated dataset, | ||
+ | and stores data in main memory (RAM). The VC module uses the graphic card’s capabilities to | ||
+ | perform more advanced operations – such as zooming, scaling, panning, and rotation – over the | ||
+ | graphical representation of the data. | ||
+ | Currently the system support three presentation models implemented within the Visualization | ||
+ | Component, namely: | ||
- | **Recommended Background**: | + | • a 2D heat-map; |
- | __Description__ | + | • a 2.5 D heat-map by 3D barchart; |
- | An opportunity exists for a small number of students to build an autonomous motorboat using a RC motorboat as a base and integrating computation and control in the form of a Beagleboard. Students will participate in lectures | + | |
+ | • a 2.5 D terrain (by mesh and UV-mapping). | ||
+ | The goal of the project is to implement two additional ways of data visualization as well as | ||
+ | extend some of existing ones, that is: | ||
- | ---- | + | 1. Implement and test functions for data pyramid-based visualization of time series. |
- | : | + | |
- | ---- | + | |
- | ====== Athenians Data Project ====== | + | 2. Implement functions for visualization based on cross-product of data pyramids. |
- | **Supervisor**: | + | 3. Add support for specular and normal maps for 2.5 D terrain presentation model. |
- | **Required Background**: General CSE408x prerequisites | + | Required Background: |
- | **Recommended Background**: | ||
- | __Description__ | + | \\ |
- | The Athenians Project is a multi-year, ongoing project | + | =====Genome-wide identification |
- | Possible project ideas for this term span from simpler ones such as | + | |
- | how to present data in the best possible way, add spatial characteristics to existing data, | + | |
- | add multimedia data, improve text searching, etc. to more complex ideas such as filling | + | |
- | missing parts for the " | + | |
- | words has been done in the past using expert knowledge. Those experts have establish | + | |
- | certain rules/ | + | |
- | when talking in IT terminology. Furthermore, | + | |
- | the database with some likelihood. Associating probabilities with hypotheses introduces | + | |
- | another opportunity for research projects. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Three-Dimensional Context from Linear Perspective for Video Surveillance Systems ====== | ||
- | **Supervisor**: James Elder | + | **Supervisor: Katalin Hudak** |
- | **Requirements**: | ||
- | __Description__ | + | The Hudak Lab in the Biology Department has an opening for a fourth-year Honours student to assist with a bioinformatics project. We study the pokeweed plant, Phytolacca americana, which displays broad-spectrum virus resistance. To evaluate pokeweed gene expression, we recently sequenced the plant’s mRNA and small RNA transcriptomes under jasmonic acid (JA) treatment. JA is a plant hormone that mediates defence against pathogens and insect herbivores. We are interested in learning how pokeweed gene expression is regulated by miRNAs during biotic stress. |
- | To provide visual surveillance over a large environment, | + | Working with the support |
- | This problem can be addressed by automatically pre-mapping two-dimensional surveillance video data into three-dimensional coordinates. | + | 1) Prediction of micro RNA (miRNA) targets on the basis of complementary sequence matches |
- | Mapping surveillance video to three-dimensional coordinates requires construction | + | 2) Correlation |
- | This project will investigate a monocular method for inferring three-dimensional context for video surveillance. | + | 3) Conducting pathway analysis |
- | Although the Manhattan world assumption provides powerful constraints, | + | 4) Construction |
+ | This work will contribute | ||
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | + | Requirements: |
- | For more information on the laboratory: [[http:// | + | 1) Pre-requisites as per EECS Calendar |
- | ---- | + | 2) Facility with script-writing/ |
- | : | + | |
- | ---- | + | |
- | ====== Estimating Pedestrian | + | 3) Preference for students with knowledge of statistics |
- | **Supervisor**: | + | 4) Able to begin in September 2015 |
- | **Requirements**: Good facility with applied mathematics | + | Learning outcomes: |
- | __Description__ | + | 1) Manipulate and analyze quantitative biological data |
- | Facilities planning at both city (e.g., Toronto) and institutional (e.g., York University) scales requires accurate data on the flow of people and vehicles throughout the environment. | + | 2) Develop |
- | The density of permanent urban video surveillance camera installations has increased dramatically over the last several years. | + | 3) Manage |
- | This project will explore the use of computer vision algorithms for the automatic estimation of pedestrian and vehicle flows from video surveillance data. The ultimate goal is to provide planners with accurate, continuous, up-to-date information on facility usage to help guide planning. | + | No knowledge |
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. The student will develop skills in using MATLAB, a very useful mathematical programming environment, | + | For more information, please see: |
+ | Hudak Lab website- http:// | ||
- | For more information on the laboratory: [[http://www.elderlab.yorku.ca]] | + | RNA sequencing- |
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Tandem repeat detection using spectral methods ====== | + | miRNAs- http:// |
- | **Supervisor**: | + | \\ |
+ | =====Dynamic Interface Detection and Control Project===== | ||
- | **Required Background**: The student should have completed undergraduate courses in Algorithms and Signals and Systems. | + | **Supervisor: Michael Jenkin** |
- | **Recommended Background**: | ||
- | __Description__ | + | Contrary to most industries, fine chemical manufacturing is dominated by batch production methods. Increasing economic, environmental |
- | DNA sequences of organisms have many repeated substrings. These are called repeats in Biology, and include both exact as well as approximate repeats. Repeats | + | |
- | Finding tandem repeats | + | Extraction of the reaction mixture for purification and/or further processing |
- | The student will implement existing spectral algorithms based on Fourier Transforms and on an autoregressive model. He will then make changes suggested by the supervisor, | + | A key step in the process takes place in a clear tube that is mounted vertically. |
+ | One way of solving this problem is to float a marker at the boundary between the two liquids and to monitor this boundary using a video camera. Although this approach solves the problem, it requires the introduction of a specific float within the tube. Can we build a system that monitors the boundary without resorting to the use of an artificial float? | ||
+ | Specific goals of the project include: | ||
+ | - Develop a computer vision system that can detect and monitor the interface between two miscible fluids of different density. | ||
- | ---- | + | - Evaluate the performance of the system over a range of different (and typical) fluids |
- | : | + | |
- | ---- | + | |
- | ====== Touch- and Gesture-based Text Entry With Automatic Error Correction ====== | + | - Explore the use of different illuminant/ |
- | **Supervisor**: | + | The successful candidate(s) will have the experience of working with a diverse group of scientists and engineers toward the design and implementation of an automated liquid extraction device with applications across many industries. Upon successful prototyping, |
- | **Required Background**: | + | For further information please contact, |
- | CSE3461 (or equivalent), CSE3311 (or equivalent), | + | |
- | A student wishing to do this project must be well versed in Java, Eclipse, and developing java code for the Android operating system. | + | |
+ | Michael Jenkin (jenkin@cse.yorku.ca) or Michal Organ (organ@yorku.ca) | ||
- | **Recommended Background**: | + | \\ |
- | Possession of an Android touch-based phone or tablet would be an asset, but is not essential. | + | ====== DDoS Attack using Google-bots ====== |
- | __Description__ | + | **Supervisor**: |
- | This project involves extending a touch-based text entry method to include automatic error correction. | + | |
+ | **Recommended Background**: | ||
+ | Not long ago, botnets - networks of compromised computers - were seen as | ||
+ | the most effective (if not the only) means of conducting Distributed Denial | ||
+ | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
+ | of application-layer over other types of DDoS attacks, the DDoS execution | ||
+ | landscape is becoming increasingly more diverse. An especially interesting | ||
+ | new trend is the execution of application-layer DDoS attacks by means of | ||
+ | skillfully manipulated Web-crawlers, | ||
+ | The goal of this project is to design, implement and test a real-world | ||
+ | framework consisting of the following: a) the attacker' | ||
+ | domain specially designed to attract Google-bots and then manipulate them | ||
+ | into generating attack traffic towards the target/ | ||
+ | victim' | ||
+ | component, the project will also look into the statistical/ | ||
+ | estimation of the framework' | ||
+ | to an actual (real-world) target/ | ||
- | ---- | ||
- | : | ||
- | ---- | ||
- | ====== Early Breast Cancer Detection based on MRI’s. ====== | ||
- | **Supervisor**: | ||
- | **Required Background**: | ||
- | **Recommended background**: | + | \\ |
+ | ====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ||
- | Project Description: This research will develop advanced computer-aided, | + | **Supervisor**: James Elder |
- | processing techniques for early detection of breast cancer using the available | + | |
- | modalities. In particular, we propose to develop time reversal beamforming imager, | + | |
- | based on our earlier work in time reversal signal processing, for detecting early stage | + | |
- | breast cancer tumours from MRI data. | + | |
- | Our preliminary work has illustrated the type of | + | |
- | results that are possible for breast cancer detection by applying time reversal signal | + | |
- | processing on MRI breast data. In this research, we propose to extend these results to | + | |
- | provide a quantitative understanding of the practical gains provided by time reversal | + | |
- | in MRI based breast cancer detection and its limitations. This will be accomplished | + | |
- | a local hospital, and running our algorithms on these datasets. The first step is | + | |
- | important to check the validity of our algorithms. The next step is to compare the | + | |
- | estimated locations of the tumours (as derived with our algorithms) to their precise | + | |
- | locations as identified by the pathologists. The second step will quantify the accuracy | + | |
- | of our estimation algorithms. | + | |
- | ---- | + | **Required Background**: General CSE408x prerequisites, |
- | : | + | good math skills, knowledge of C and MATLAB programming languages |
- | ---- | + | |
- | ====== Developing Fast Speech Recognition Engine using GPU ====== | + | |
- | **Supervisor**: Hui Jang | + | One of the challenges in remote learning is to allow students to communicate effectively with the lecturer. |
+ | |||
+ | The goal of this project is to apply attentive sensing technology (www.elderlab.yorku.ca) to this problem. | ||
+ | |||
+ | In particular, working with a senior graduate student or postdoctoral fellow, the successful applicant will: | ||
+ | |||
+ | - Study the problem of detecting hand-raises in the preattentive sensor stream | ||
+ | - Implement algorithms for detecting hand-raises based upon this investigation | ||
+ | - Evaluate these algorithms in a real-classroom setting, using proprietary attentive sensing technology | ||
- | **Required Background**: | ||
- | General prerequisites | ||
+ | ====== Attentive Sensing for Sport Video Recording Markets ====== | ||
- | __Description__ | + | **Supervisor**: |
+ | |||
+ | **Required Background**: | ||
+ | |||
+ | |||
+ | The goal of this project is to modify York University’s patented attentive sensor technology to the sport video recording market. | ||
+ | |||
+ | The general problem is to use attentive sensing technology (www.elderlab.yorku.ca) to visually detect and track multiple moving agents (e.g., skiers, riders, horses) and to select specific agents for active high-resolution smooth pursuit. | ||
+ | |||
+ | The student will work with senior graduate students, postdoctoral fellows and research scientists to help modify the attentive sensing technology to operate in these domains. | ||
+ | |||
+ | 1. | ||
+ | 2. | ||
+ | 3. | ||
+ | |||
+ | ------------ | ||
+ | |||
- | Recently, Graphics Processing Units (GPU' | + | \\ |
+ | ====== Hunting | ||
- | During the recent years, there is an increasing demand in the job market for programmers who can use GPU's for general purpose computing tasks. This project will serve as a perfect vehicle for you to learn such a cutting-edge programming skill. | + | **Supervisor: |
- | References | + | Description: |
+ | Java PathFinder (JPF) is a tool that can detect bugs in Java code. | ||
+ | The Java library Apache log4j allows developers to control which log | ||
+ | statements are output. | ||
+ | to detect bugs in log4j by means of JPF with very limited succes. | ||
- | [1] Kisun You, Jike Chong, Youngmin Yi, Gonina, E., Hughes, C.J., Yen-Kuang Chen, Wonyong Sung, Keutzer, K., " | + | Recently, in collaboration with Shafiei (NASA) we have developed |
+ | an extension of JPF called jpf-nhandler. The aim of this project | ||
+ | is to apply this extension to log4j. | ||
- | [2] Jike Chong, Ekaterina Gonina, Youngmin Yi, Kurt Keutzer, "A Fully Data Parallel WFST-based Large Vocabulary Continuous Speech Recognition on a Graphics Processing Unit," | + | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Solving Polynomials ====== | + | |
- | **Supervisor**: Mike McNamee | + | **Required Background:** General CSE408x prerequisites |
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
- | **Required Background**: | ||
- | General prerequisites plus course in Numerical Methods, and knowledge of programming, | ||
- | __Description__ | ||
- | In this project you will compare several efficient methods for solving polynomials. | ||
- | ---- | ||
- | : | ||
- | ---- | ||
- | ====== MF7114 Assembler ====== | ||
- | **Supervisor**: | ||
- | **Required Background**: | + | ====== Mining Software Repositories Data====== |
- | Some knowledge of microprocessor architecture and assembly programming | + | |
- | __Description__ | + | **Supervisor: |
- | Every microprocessor is supported by a variety of software tools, such as assemblers, disassemblers, | + | **Required Background: |
- | Background Information: The MF7114 CPU was the first microprocessor designed and | + | **Short Description:** Software engineering data (e.g., source code repositories |
- | manufactured in Canada | + | |
- | implementation of an assembler possible. More information on | + | |
- | http:// | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | ---- | ||
- | : | ||
- | ---- | ||
- | ====== MF7114 Debugger ====== | ||
- | **Supervisor**: | ||
- | **Required Background**: | + | ======Model-based Design |
- | Some knowledge of microprocessor architecture | + | |
- | __Description__ | + | **Supervisor: |
- | Every microprocessor is supported by a variety of software tools, such as assemblers,disassemblers, and debuggers to allow the development and testing of application programs destined for that microprocessor. The purpose of an MF7114 debugger is to debug programs written | + | **Required Background: |
+ | such as Arduino. | ||
- | Background Information: The MF7114 CPU was the first microprocessor designed and | + | **Project Description:** |
- | manufactured in Canada (by Microsystems International Ltd, or MIL) and one of the earliest microprocessors ever produced. The microprocessor was used, among other applications as the CPU of the CPS-1 microcomputer. Although none of the CPS/1 computers (nor MF7114 software) have survived, technical information about the microprocessor and the CPS-1 has been preserved. This makes the design and | + | |
- | implementation of a debugger possible. More information on | + | |
- | http://www.cse.yorku.ca/ | + | Model-based design with code generation tools can be used for simulation, rapid prototyping, |
- | ---- | + | \\ |
- | : | + | ------------------ |
- | ---- | + | \\ |
- | ======Web Crawlers Behaving Like Humans: Are We There Yet!? ====== | + | ======C2000 Concerto Microcontrollers====== |
- | **Supervisor**: Natalija Vlajic | + | **Supervisor:** Jia Xu |
- | **Required Background**: General prerequisites | + | **Required Background:** At least a B+ in Embedded Systems (CSE3215), |
+ | strong C programming skills, solid knowledge of microcontrollers | ||
+ | **Description: | ||
+ | two cores on a single-chip with on-chip low latency interprocessor communication between the two cores: a C28x 32-bit control core for | ||
+ | real-time control with faster/more loops and small sampling window; | ||
+ | and an ARM 32-bit Cortex-M3 host core for communications and general purpose. The selected student will evaluate the capabilities of the | ||
+ | C2000 Concerto family of microcontrollers through testing and investigating open source software for real-time control applications | ||
+ | that runs on C2000 Concerto Microcontrollers. | ||
- | __Description__ | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
+ | ======Real-Time Bidding Platform====== | ||
- | Distributed Denial of Service (DDoS) attacks are recognized as one | + | **Supervisor:** Jia Xu |
- | of the most serious threats to today' | + | |
- | simplicity of their execution and their ability to severely degrade | + | |
- | the quality at which Web-based services are offered to the end users. | + | |
- | An especially challenging form of DDoS attacks are the so-called | + | |
- | Application-Layer DDoS attacks. Namely: | + | |
- | 1) In Application-Layer DDoS attacks, the attackers utilize a flood | + | |
- | of legitimate-looking Layer-7 network sessions (i.e., sessions that | + | |
- | are generally hard to detect and/or filter out by a firewall or an | + | |
- | IDS system); | + | |
- | 2) Increasingly, | + | |
- | cleverly programmed crawler that executes a semi-random walk over the | + | |
- | web site links, thereby attempting to appear as a legitimate human | + | |
- | visitor. | + | |
- | The goal of this project is to investigate the state of the art in | + | **Required Background: |
- | malicious web crawler design. In particular, the project will look | + | (CSE3221), strong Ubuntu/ |
- | into the challenges of designing a smart-DDoS-crawler from the | + | |
- | attacker point of view - one of these challenges being the estimation | + | |
- | of web-page popularity assuming no a priori access to the web-logs | + | |
- | of the victim web-site. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== GFI Sandbox | + | |
- | **Supervisor**: Natalija Vlajic | + | **Description: |
- | **Required Background**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
+ | ======Circuit and Board Design for a Pulsed Ground Penetrating Radar====== | ||
- | __Description__ | + | **Supervisor: |
- | GFI Sandbox is a sophisticated industry-leading tool for quick and | + | **Description: |
- | safe analysis | + | |
- | 1) familiarize yourself with the operation of GFI Sandbox; | + | |
- | 2) using readily available GFI Sandbox Feeds (i.e., ThreatTrack Feeds), | + | |
- | build a database | + | |
- | DDoS-attacks | + | |
- | 3) examine the behaviour | + | |
- | 4) propose | + | |
- | security tools - for longer term (beyond immediate execution) | + | |
- | of the collected malware. | + | |
+ | **Required Background** A background in undergraduate-level electronics is very important. | ||
- | ---- | + | \\ |
- | : | + | ------------------ |
- | ---- | + | \\ |
+ | More project proposals may be added here in the first week of the winter term. | ||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | \\ |
projects.txt · Last modified: 2016/01/13 20:05 by stevenc