projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
projects [2011/09/11 01:18] – dymond | projects [2013/09/03 15:14] – pd | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | (Listed in order received.) | + | |
- | ====== | + | Current proposed Projects, Fall 2013 |
+ | \\ | ||
+ | ====== | ||
- | **Supervisor**: | + | **Supervisor**: |
- | **Required Background**: | + | **Required Background**: |
+ | good math skills, knowledge of C and MATLAB programming languages | ||
- | **Recommended Background**: | + | One of the challenges in remote learning is to allow students to communicate effectively with the lecturer. |
- | + | ||
- | __Description__ | + | The goal of this project |
- | An opportunity exists for a small number | + | |
- | + | In particular, working | |
- | + | ||
- | + | | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | + | ||
- | ====== Athenians Data Project ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | The Athenians Project is a multi-year, ongoing project | + | |
- | Possible | + | |
- | how to present data in the best possible way, add spatial characteristics to existing data, | + | |
- | add multimedia data, improve text searching, etc. to more complex ideas such as filling | + | |
- | missing parts for the " | + | |
- | words has been done in the past using expert knowledge. Those experts have establish | + | |
- | certain rules/ | + | |
- | when talking in IT terminology. Furthermore, | + | |
- | the database with some likelihood. Associating probabilities with hypotheses introduces | + | |
- | another opportunity for research projects. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | + | ||
- | ====== Three-Dimensional Context from Linear Perspective for Video Surveillance Systems ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Requirements**: | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | To provide visual surveillance over a large environment, many surveillance cameras are typically deployed at widely dispersed locations. | + | |
- | + | ||
- | This problem can be addressed by automatically pre-mapping two-dimensional surveillance video data into three-dimensional coordinates. | + | |
- | + | ||
- | Mapping surveillance video to three-dimensional coordinates requires construction of a virtual model of the three-dimensional scene. | + | |
- | + | ||
- | This project will investigate a monocular method for inferring three-dimensional context for video surveillance. | + | |
- | + | ||
- | Although the Manhattan world assumption provides powerful constraints, | + | |
- | + | ||
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | + | |
- | + | ||
- | For more information on the laboratory: [[http:// | + | |
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | + | ||
- | ====== Estimating Pedestrian and Vehicle Flows from Surveillance Video ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Requirements**: | + | |
- | + | ||
- | __Description__ | + | |
- | Facilities planning at both city (e.g., Toronto) and institutional (e.g., York University) scales requires accurate data on the flow of people and vehicles throughout the environment. | ||
- | The density of permanent urban video surveillance camera installations has increased dramatically over the last several years. | + | ====== Attentive Sensing |
- | This project will explore the use of computer vision algorithms for the automatic estimation of pedestrian and vehicle flows from video surveillance data. The ultimate goal is to provide planners with accurate, continuous, up-to-date information on facility usage to help guide planning. | + | **Supervisor**: |
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | + | **Required Background**: |
- | For more information on the laboratory: [[http:// | ||
- | ---- | + | The goal of this project is to modify York University’s patented attentive sensor technology to the sport video recording market. |
- | : | + | |
- | ---- | + | The general problem is to use attentive sensing technology (www.elderlab.yorku.ca) to visually detect and track multiple moving agents (e.g., skiers, riders, horses) and to select specific agents for active high-resolution smooth pursuit. |
+ | |||
+ | The student will work with senior graduate students, postdoctoral fellows and research scientists to help modify the attentive sensing technology to operate in these domains. | ||
+ | |||
+ | 1. | ||
+ | 2. | ||
+ | 3. | ||
+ | |||
+ | ------------ | ||
+ | |||
- | ====== | + | \\ |
+ | ======Hunting for Bugs in Logging: applying JPF to log4j====== | ||
- | **Supervisor**: Suprakash Datta | + | **Supervisor:** Franck van Breugel |
- | **Required Background**: The student should | + | Description: |
+ | Java PathFinder (JPF) is a tool that can detect bugs in Java code. | ||
+ | The Java library Apache log4j allows developers to control which log | ||
+ | statements are output. | ||
+ | to detect bugs in log4j by means of JPF with very limited succes. | ||
- | **Recommended Background**: | + | Recently, |
+ | an extension of JPF called jpf-nhandler. | ||
+ | is to apply this extension to log4j. | ||
- | __Description__ | + | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. " |
- | DNA sequences of organisms have many repeated substrings. These are called repeats in Biology, and include both exact as well as approximate repeats. Repeats are of two main types: interspersed repeats (which are spread across a genome) and tandem repeats, which occur next to each other. Tandem repeats play important roles in gene regulation and are also used as markers that have several important uses, including human identity testing. | + | |
- | Finding tandem repeats is an important problem in Computational Biology. The techniques that have been proposed for it fall into two classes: string matching algorithms and signal processing techniques. In this project, we will explore fast, accurate algorithms for detecting tandem repeats and evaluate the outputs of the algorithms studied | + | **Required Background:** General CSE408x prerequisites |
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | Additional current possible | ||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | \\ | ||
- | The student will implement existing spectral algorithms based on Fourier Transforms and on an autoregressive model. He will then make changes suggested by the supervisor, and evaluate the effect of the modifications. Throughout the course, the student is required to maintain a course Web site to report any progress and details about the project. | + | =====Previous Projects from Summer 2013===== |
- | + | ======Tracking | |
- | + | ||
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | + | ||
- | ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | CSE3461 (or equivalent), | + | |
- | A student wishing to do this project must be well versed | + | |
- | + | ||
- | + | ||
- | **Recommended Background**: | + | |
- | Possession of an Android touch-based phone or tablet would be an asset, but is not essential. | + | |
- | + | ||
- | __Description__ | + | |
- | This project involves extending a touch-based text entry method to include automatic error correction. | + | |
- | + | ||
- | + | ||
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Early Breast Cancer Detection based on MRI’s. | + | |
**Supervisor**: | **Supervisor**: | ||
- | **Required Background**: General CSE408x prerequisites | + | **Required Background: ** Computer Vision or Signal and Systems Course preferred; Matlab; Interest in Signal/ |
- | **Recommended background**: Signal | + | **Short Description: |
- | Project Description: | ||
- | processing techniques for early detection of breast cancer using the available | ||
- | modalities. In particular, we propose to develop time reversal beamforming imager, | ||
- | based on our earlier work in time reversal signal processing, for detecting early stage | ||
- | breast cancer tumours from MRI data. | ||
- | Our preliminary work has illustrated the type of | ||
- | results that are possible for breast cancer detection by applying time reversal signal | ||
- | processing on MRI breast data. In this research, we propose to extend these results to | ||
- | provide a quantitative understanding of the practical gains provided by time reversal | ||
- | in MRI based breast cancer detection and its limitations. This will be accomplished | ||
- | a local hospital, and running our algorithms on these datasets. The first step is | ||
- | important to check the validity of our algorithms. The next step is to compare the | ||
- | estimated locations of the tumours (as derived with our algorithms) to their precise | ||
- | locations as identified by the pathologists. The second step will quantify the accuracy | ||
- | of our estimation algorithms. | ||
- | ---- | ||
- | : | ||
- | ---- | ||
- | ====== Developing Fast Speech Recognition Engine using GPU ====== | ||
- | **Supervisor**: Hui Jang | + | [1] A. Mohammadi and A. Asif, Distributed Particle Filter Implementation with Intermittent/ |
- | **Required Background**: | + | [2] A. Mohammadi and A. Asif, Decentralized Sensor Selection based on the Distributed Posterior Cramer-Rao Lower Bound, in proceedings of IEEE International Conference on Information Fusion, Singapore, 2012. pp. 1668-1675. |
- | General prerequisites | + | |
+ | ====== 3D Drawing System with Leap Motion finger tracker ====== | ||
- | __Description__ | + | **Supervisor**: |
- | Recently, Graphics Processing Units (GPU' | + | **Required Background**: |
- | During the recent years, there is an increasing demand in the job market for programmers who can use GPU's for general purpose computing tasks. This project | + | The Leap Motion, leapmotion.com, is a new device that lets users control a computer with their fingers. This project |
- | References | + | ====== 3D Drawing System with 3Gear gesture tracker ====== |
- | [1] Kisun You, Jike Chong, Youngmin Yi, Gonina, E., Hughes, C.J., Yen-Kuang Chen, Wonyong Sung, Keutzer, K., " | + | **Supervisor**: Wolfgang Stuerzlinger |
- | [2] Jike Chong, Ekaterina Gonina, Youngmin Yi, Kurt Keutzer, "A Fully Data Parallel WFST-based Large Vocabulary Continuous Speech Recognition on a Graphics Processing Unit," Proc. of Interspeech 2009, Brigton, UK, 2009. | + | **Required Background**: |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Solving Polynomials ====== | + | |
- | **Supervisor**: | + | The 3Gear system, threegear.com, |
- | **Required Background**: | ||
- | General prerequisites plus course in Numerical Methods, and knowledge of programming, | ||
- | __Description__ | + | ====== Tilt Target Selection on Touchscreen Phones ====== |
- | In this project you will compare several efficient methods for solving polynomials. | + | **Supervisor**: Scott MacKenzie |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== MF7114 Assembler ====== | + | |
- | **Supervisor**: Zbigniew Stachniak | + | **Required Background**: General 4080 prerequisites, |
- | **Required Background**: | + | Touchscreen mobile devices commonly use a built-in accelerometer to sense movement or tilting actions |
- | Some knowledge | + | |
- | __Description__ | + | **Readings**: |
- | Every microprocessor is supported by a variety of software tools, such as assemblers, disassemblers, | ||
- | Background Information: | + | ====== Continuation |
- | manufactured in Canada (by Microsystems International Ltd, or MIL) and one of the earliest microprocessors ever produced. The microprocessor was used, among other applications as the CPU of the CPS-1 microcomputer. Although none of the CPS/1 computers (nor MF7114 software) have survived, technical information about the microprocessor and the CPS-1 has been preserved. This makes the design and | + | |
- | implementation of an assembler possible. More information on | + | |
- | http:// | + | **Supervisor**: Jeff Edmonds |
- | ---- | + | **Required Background**: General CSE408x prerequisites |
- | : | + | |
- | ---- | + | |
- | ====== MF7114 Debugger ====== | + | |
- | **Supervisor**: Zbigniew Stachniak | + | **Recommended Background**: Java software development |
- | **Required Background**: | + | Structural equation modeling (SEM) is a statistical technique that is becoming increasingly popular in the educational and behavioral sciences. SEM allows researchers to test the validity |
- | Some knowledge | + | |
- | __Description__ | + | The software required is an application that allows researchers to define their hypothesized models visually and will output the correct syntax for the analytical software of their choosing. |
- | Every microprocessor is supported | + | To date a promising functional application has been developed in JAVA by a Computer Science student |
- | Background Information: The MF7114 CPU was the first microprocessor designed and | + | More details {{:continuation_of_a_path_diagram_to_syntax_application.pdf|here}}. |
- | manufactured in Canada (by Microsystems International Ltd, or MIL) and one of the earliest microprocessors ever produced. The microprocessor was used, among other applications as the CPU of the CPS-1 microcomputer. Although none of the CPS/1 computers (nor MF7114 software) have survived, technical information about the microprocessor and the CPS-1 has been preserved. This makes the design and | + | |
- | implementation of a debugger possible. More information on | + | |
- | http:// | ||
- | ---- | ||
- | : | ||
- | ---- | ||
- | ======Web Crawlers Behaving Like Humans: Are We There Yet!? ====== | + | ====== |
- | **Supervisor**: | + | **Supervisor**: |
- | **Required Background**: | + | **Required Background**: |
+ | 3402 -- Functional & Logic Programming, | ||
+ | 3101 -- Design and Analysis of Algorithms, | ||
+ | 4302 -- Compilers and Interpreters. | ||
+ | **Description**: | ||
- | __Description__ | + | The components are various Unix executables and LISP programs that need to interact in complex ways. The components may be residing in different servers in different universities. Currently integration is performed manually, at the expense of usability. Thus, we aim at constructing a module that: (a) integrates involved components to deliver output in one call, (b) exports a unique web interface (preferably following WSDL/SOAP) to be easily accessed by custom front-end tools by anyone, anywhere, (c ) offers a simple front-end for human users. |
+ | Learning objectives: | ||
+ | * Understand the technologies and process involved in turning native code into a web-service (" | ||
+ | * Study a state-of-the-art AI planner and understand its workings. | ||
+ | * Exercise scripting skills. | ||
- | Distributed Denial of Service (DDoS) attacks are recognized as one | ||
- | of the most serious threats to today' | ||
- | simplicity of their execution and their ability to severely degrade | ||
- | the quality at which Web-based services are offered to the end users. | ||
- | An especially challenging form of DDoS attacks are the so-called | ||
- | Application-Layer DDoS attacks. Namely: | ||
- | 1) In Application-Layer DDoS attacks, the attackers utilize a flood | ||
- | of legitimate-looking Layer-7 network sessions (i.e., sessions that | ||
- | are generally hard to detect and/or filter out by a firewall or an | ||
- | IDS system); | ||
- | 2) Increasingly, | ||
- | cleverly programmed crawler that executes a semi-random walk over the | ||
- | web site links, thereby attempting to appear as a legitimate human | ||
- | visitor. | ||
- | The goal of this project is to investigate the state of the art in | + | ====== |
- | malicious web crawler design. In particular, the project will look | + | |
- | into the challenges of designing a smart-DDoS-crawler from the | + | |
- | attacker point of view - one of these challenges being the estimation | + | |
- | of web-page popularity assuming no a priori access to the web-logs | + | |
- | of the victim web-site. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== | + | |
- | **Supervisor**: | + | **Supervisor**: |
- | **Required Background**: General prerequisites. | + | **Description**: Registration is a fundamental step in image-based surgical |
+ | navigation. Several (seemingly) different approaches for predicting | ||
+ | distance errors in registration are known, but for some surgical | ||
+ | procedures, the angular error in registration is more important. | ||
+ | This project will validate an approach for predicting angular | ||
+ | error in registration; | ||
+ | simulated and actual registration data for testing purposes. | ||
+ | ====== Calibration of a Tracked Pointer ====== | ||
- | __Description__ | + | **Supervisor**: |
- | GFI Sandbox is a sophisticated industry-leading tool for quick and | + | **Description**: |
- | safe analysis | + | navigation systems. A typical pointer has a tracked target on one |
- | 1) familiarize yourself with the operation of GFI Sandbox; | + | end and a sharp or ball tip on the other end. Finding the location |
- | 2) using readily available GFI Sandbox Feeds (i.e., ThreatTrack Feeds), | + | of the tip relative to the target is a calibration problem. One |
- | build a database of malware designed specifically for execution | + | solution to the calibration problem involves pivoting the pointer |
- | DDoS-attacks - the so-called botnet malware; | + | about the tip while tracking the target; if the tip is kept |
- | 3) examine | + | stationary, then the target moves on the surface |
- | 4) propose and build an environment - comprising | + | Fitting |
- | security tools - for longer term (beyond immediate execution) analysis | + | location of the tip as the sphere center. Unfortunately, |
- | of the collected malware. | + | calibrated tip position obtained using such a spherical calibration |
+ | has high variance. This project will investigate how much variance | ||
+ | there is in the calibrated tip position, and methods | ||
+ | the variance | ||
- | ---- | + | ====== A privacy safeguard framework for sharing photos on Facebook ====== |
- | : | + | |
- | ---- | + | |
- | Network analysis of EEG data: Understanding connections in the brain | + | **Supervisor**: |
- | + | ||
- | ====== Network analysis of EEG data: Understanding connections in the brain ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Preferred**: | + | |
- | + | ||
- | + | ||
- | __Description__ | + | |
- | Electroencephalogram (EEG) data indicates electrical activity at particular locations in the brain. Using EEG data from multiple sensors, it is possible to find correlations among the measurements, | + | |
- | + | ||
- | The tools that are used to analyze communication networks can also be used to analyze brain networks. In this interdisciplinary project, you will work with a collection of EEG data to identify correlated measurements, | + | |
- | + | ||
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | + | ||
- | ====== An Open Source Structural Equation Modeling Path Diagram to Syntax Application ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended Background**: | + | |
- | + | ||
- | __Description__ | + | |
- | The software required is an application that allows researchers to define their hypothesized models visually and will output the correct syntax for the analytical software of their choosing. | + | |
- | + | ||
- | To date a promising functional application has been developed in JAVA by a Computer Science student as a 4080 project. | + | |
- | This a cross-disciplinary project with the Quantitative Methods division | + | **Description**: |
+ | One of the major privacy concerns | ||
+ | **Required prerequisite background**: | ||
- | ---- | + | **Desired prerequisite**: Knowledge of image processing, Facebook API, JavaScript Object Notation (JSON) |
- | : | + | |
- | ---- | + |
projects.txt · Last modified: 2016/01/13 20:05 by stevenc