projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
projects [2011/09/11 01:18] – dymond | projects [2014/08/26 12:54] – jarek | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | (Listed in order received.) | + | \\ |
+ | ====== DDoS Attack using Google-bots ====== | ||
- | ====== Building an autonomous motorboat ====== | + | **Supervisor**: |
- | **Supervisor**: Michael Jenkin | + | **Recommended Background**: CSE 3213 or CSE 3214, CSE 3482 |
- | **Required Background**: General CSE408x prerequisites | + | Not long ago, botnets - networks of compromised computers - were seen as |
+ | the most effective (if not the only) means of conducting Distributed Denial | ||
+ | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
+ | of application-layer over other types of DDoS attacks, the DDoS execution | ||
+ | landscape is becoming increasingly more diverse. An especially interesting | ||
+ | new trend is the execution of application-layer DDoS attacks by means of | ||
+ | skillfully manipulated Web-crawlers, | ||
+ | The goal of this project is to design, implement and test a real-world | ||
+ | framework consisting of the following: a) the attacker' | ||
+ | domain specially designed to attract Google-bots and then manipulate them | ||
+ | into generating attack traffic towards the target/ | ||
+ | victim' | ||
+ | component, the project will also look into the statistical/ | ||
+ | estimation of the framework' | ||
+ | to an actual (real-world) target/ | ||
- | **Recommended Background**: | ||
- | __Description__ | ||
- | An opportunity exists for a small number of students to build an autonomous motorboat using a RC motorboat as a base and integrating computation and control in the form of a Beagleboard. Students will participate in lectures and labs associated with CSE6324 (Part I). Interested students should attend the first lecture of CSE6324. See the departmental schedule for time and place. | ||
+ | \\ | ||
+ | ====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ||
- | ---- | + | **Supervisor**: James Elder |
- | : | + | |
- | ---- | + | |
- | ====== Athenians Data Project ====== | + | **Required Background**: |
+ | good math skills, knowledge of C and MATLAB programming languages | ||
- | **Supervisor**: Nick Cercone | + | One of the challenges in remote learning is to allow students to communicate effectively with the lecturer. |
+ | |||
+ | The goal of this project is to apply attentive sensing technology (www.elderlab.yorku.ca) to this problem. | ||
+ | |||
+ | In particular, working with a senior graduate student or postdoctoral fellow, the successful applicant will: | ||
+ | |||
+ | - Study the problem of detecting hand-raises in the preattentive sensor stream | ||
+ | - Implement algorithms for detecting hand-raises based upon this investigation | ||
+ | - Evaluate these algorithms in a real-classroom setting, using proprietary attentive sensing technology | ||
- | **Required Background**: | ||
- | **Recommended Background**: | + | ====== Attentive Sensing for Sport Video Recording Markets ====== |
- | __Description__ | + | **Supervisor**: James Elder |
- | The Athenians Project is a multi-year, ongoing project of compiling, computerizing and studying data about the persons of ancient Athens. | + | |
- | Possible project ideas for this term span from simpler ones such as | + | |
- | how to present data in the best possible way, add spatial characteristics to existing data, | + | |
- | add multimedia data, improve text searching, etc. to more complex ideas such as filling | + | |
- | missing parts for the " | + | |
- | words has been done in the past using expert knowledge. Those experts have establish | + | |
- | certain rules/ | + | |
- | when talking in IT terminology. Furthermore, | + | |
- | the database with some likelihood. Associating probabilities with hypotheses introduces | + | |
- | another opportunity for research projects. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Three-Dimensional Context from Linear Perspective for Video Surveillance Systems ====== | + | **Required Background**: |
- | **Supervisor**: | ||
- | |||
- | **Requirements**: | ||
- | |||
- | __Description__ | ||
- | |||
- | To provide visual surveillance over a large environment, | ||
- | |||
- | This problem can be addressed by automatically pre-mapping two-dimensional surveillance video data into three-dimensional coordinates. | ||
- | |||
- | Mapping surveillance video to three-dimensional coordinates requires construction of a virtual model of the three-dimensional scene. | ||
- | |||
- | This project will investigate a monocular method for inferring three-dimensional context for video surveillance. | ||
- | |||
- | Although the Manhattan world assumption provides powerful constraints, | ||
- | |||
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | ||
- | |||
- | For more information on the laboratory: [[http:// | ||
- | |||
- | ---- | ||
- | : | ||
- | ---- | ||
- | |||
- | ====== Estimating Pedestrian and Vehicle Flows from Surveillance Video ====== | ||
- | |||
- | **Supervisor**: | ||
- | |||
- | **Requirements**: | ||
- | |||
- | __Description__ | ||
- | |||
- | Facilities planning at both city (e.g., Toronto) and institutional (e.g., York University) scales requires accurate data on the flow of people and vehicles throughout the environment. | ||
- | |||
- | The density of permanent urban video surveillance camera installations has increased dramatically over the last several years. | ||
- | |||
- | This project will explore the use of computer vision algorithms for the automatic estimation of pedestrian and vehicle flows from video surveillance data. The ultimate goal is to provide planners with accurate, continuous, up-to-date information on facility usage to help guide planning. | ||
- | |||
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | ||
- | |||
- | For more information on the laboratory: [[http:// | ||
- | ---- | + | The goal of this project |
- | : | + | |
- | ---- | + | The general problem |
- | + | ||
- | ====== Tandem repeat detection using spectral methods ====== | + | The student will work with senior graduate students, postdoctoral fellows |
- | + | ||
- | **Supervisor**: | + | 1. Ground-truth available |
- | + | 2. Evaluate current attentive | |
- | **Required Background**: | + | 3. Modify these algorithms to improve performance |
- | + | ||
- | **Recommended Background**: | + | ------------ |
- | + | ||
- | __Description__ | + | |
- | DNA sequences of organisms have many repeated substrings. These are called repeats in Biology, and include | + | |
- | + | ||
- | Finding tandem repeats | + | |
- | + | ||
- | The student will implement existing spectral algorithms based on Fourier Transforms and on an autoregressive model. He will then make changes suggested by the supervisor, and evaluate the effect of the modifications. Throughout the course, the student is required to maintain a course Web site to report any progress and details about the project. | + | |
- | + | ||
- | + | ||
- | + | ||
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | + | ||
- | ====== Touch- and Gesture-based Text Entry With Automatic Error Correction ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | CSE3461 (or equivalent), CSE3311 (or equivalent), CSE4441 (or equivalent) | + | |
- | A student wishing | + | |
- | + | ||
- | + | ||
- | **Recommended Background**: | + | |
- | Possession of an Android touch-based phone or tablet would be an asset, but is not essential. | + | |
- | + | ||
- | __Description__ | + | |
- | This project involves extending a touch-based text entry method to include automatic error correction. | + | |
- | + | ||
- | + | ||
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Early Breast Cancer Detection based on MRI’s. ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | **Recommended background**: | + | |
- | + | ||
- | Project Description: | + | |
- | processing techniques for early detection of breast cancer using the available | + | |
- | modalities. In particular, we propose to develop time reversal beamforming imager, | + | |
- | based on our earlier work in time reversal signal processing, for detecting early stage | + | |
- | breast cancer tumours from MRI data. | + | |
- | Our preliminary work has illustrated the type of | + | |
- | results that are possible for breast cancer detection by applying time reversal signal | + | |
- | processing on MRI breast data. In this research, we propose to extend these results to | + | |
- | provide a quantitative understanding of the practical gains provided by time reversal | + | |
- | in MRI based breast cancer detection and its limitations. This will be accomplished | + | |
- | a local hospital, and running our algorithms on these datasets. The first step is | + | |
- | important to check the validity of our algorithms. The next step is to compare the | + | |
- | estimated locations of the tumours (as derived with our algorithms) to their precise | + | |
- | locations as identified by the pathologists. The second step will quantify the accuracy | + | |
- | of our estimation algorithms. | + | |
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Developing Fast Speech Recognition Engine using GPU ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | General prerequisites | + | |
- | + | ||
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Recently, Graphics Processing Units (GPU' | + | |
- | + | ||
- | During the recent years, there is an increasing demand in the job market for programmers who can use GPU's for general purpose computing tasks. This project will serve as a perfect vehicle for you to learn such a cutting-edge programming skill. | + | |
- | + | ||
- | References | + | |
- | + | ||
- | [1] Kisun You, Jike Chong, Youngmin Yi, Gonina, E., Hughes, C.J., Yen-Kuang Chen, Wonyong Sung, Keutzer, K., " | + | |
- | + | ||
- | [2] Jike Chong, Ekaterina Gonina, Youngmin Yi, Kurt Keutzer, "A Fully Data Parallel WFST-based Large Vocabulary Continuous Speech Recognition on a Graphics Processing Unit," Proc. of Interspeech 2009, Brigton, UK, 2009. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Solving Polynomials ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | General prerequisites plus course in Numerical Methods, and knowledge of programming, | + | |
- | + | ||
- | + | ||
- | __Description__ | + | |
- | + | ||
- | In this project you will compare several efficient methods for solving polynomials. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== MF7114 Assembler ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | **Required Background**: | + | \\ |
- | Some knowledge of microprocessor architecture and assembly programming | + | ====== Hunting for Bugs in Logging: applying JPF to log4j ====== |
- | __Description__ | + | **Supervisor: |
- | Every microprocessor | + | Description: |
+ | Java PathFinder (JPF) is a tool that can detect bugs in Java code. | ||
+ | The Java library Apache log4j allows developers | ||
+ | statements are output. | ||
+ | to detect bugs in log4j by means of JPF with very limited succes. | ||
- | Background Information: | + | Recently, |
- | manufactured | + | an extension |
- | implementation of an assembler possible. More information on | + | is to apply this extension to log4j. |
- | http://www.cse.yorku.ca/ | + | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. " |
- | ---- | + | **Required Background: |
- | : | + | \\ |
- | ---- | + | ------------ |
- | ====== | + | \\ |
+ | ======Hybrid 2D/3D User Interfaces for 3D Rotation | ||
- | **Supervisor**: Zbigniew Stachniak | + | **Supervisor:** Wolfgang Stuerzlinger |
- | **Required Background**: | + | **Required Background:** General 408X prerequisites, |
- | Some knowledge of microprocessor architecture and assembly programming | + | |
- | __Description__ | + | This project implements and evaluates a new method for 3D Rotation where the user uses both a 2D and 3D user interface to complete the task. The fundamental idea is to use the 3D interface for large-scale manipulation, |
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
+ | ====== Immersive Virtual Reality Kitchen Planner ====== | ||
- | Every microprocessor is supported by a variety of software tools, such as assemblers, | + | **Supervisor: |
- | Background | + | **Required |
- | manufactured in Canada (by Microsystems International Ltd, or MIL) and one of the earliest microprocessors ever produced. The microprocessor was used, among other applications as the CPU of the CPS-1 microcomputer. Although none of the CPS/1 computers | + | |
- | implementation of a debugger possible. More information on | + | |
- | http://www.cse.yorku.ca/ | + | This project implements a kitchen planner application for an immersive virtual reality system. The implementation will be based on Unity 4. |
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
+ | ======3D Interaction in Immersive Virtual Reality====== | ||
- | ---- | + | **Supervisor:** Wolfgang Stuerzlinger |
- | : | + | |
- | ---- | + | |
- | ======Web Crawlers Behaving Like Humans: Are We There Yet!? ====== | + | **Required Background:** General 408X prerequisites, |
- | **Supervisor**: | + | This project implements and tests various 3D Navigation and 3D Interaction methods in an immersive virtual reality system. The target is to enable the user to roam freely in a large environment while still being able to interact with the environment. The implementation will be based on Unity 4. |
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
- | **Required Background**: | ||
+ | ====== Mining Software Repositories Data====== | ||
- | __Description__ | + | **Supervisor: |
+ | **Required Background: | ||
- | Distributed Denial of Service | + | **Short Description: |
- | of the most serious threats to today' | + | |
- | simplicity of their execution | + | |
- | the quality at which Web-based services are offered to the end users. | + | |
- | An especially challenging form of DDoS attacks are the so-called | + | |
- | Application-Layer DDoS attacks. Namely: | + | |
- | 1) In Application-Layer DDoS attacks, the attackers utilize a flood | + | |
- | of legitimate-looking Layer-7 network sessions | + | |
- | are generally hard to detect | + | |
- | IDS system); | + | |
- | 2) Increasingly, these sessions comprise HTML requests generated by a | + | |
- | cleverly programmed crawler that executes a semi-random walk over the | + | |
- | web site links, thereby attempting to appear as a legitimate human | + | |
- | visitor. | + | |
- | The goal of this project is to investigate the state of the art in | + | \\ |
- | malicious web crawler design. In particular, the project will look | + | ------------------ |
- | into the challenges of designing a smart-DDoS-crawler from the | + | \\ |
- | attacker point of view - one of these challenges being the estimation | + | |
- | of web-page popularity assuming no a priori access to the web-logs | + | |
- | of the victim web-site. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== GFI Sandbox | + | |
- | **Supervisor**: | + | ======Reliably tracking horizontal eye movements====== |
- | **Required Background**: General prerequisites. | + | **Supervisor:** Wolfgang Stuerzlinger |
+ | **Required Background: | ||
- | __Description__ | + | **Description: |
- | GFI Sandbox is a sophisticated industry-leading tool for quick and | + | \\ |
- | safe analysis of malware behaviour. The goals of this project are: | + | ------------------ |
- | 1) familiarize yourself with the operation of GFI Sandbox; | + | \\ |
- | 2) using readily available GFI Sandbox Feeds (i.e., ThreatTrack Feeds), | + | |
- | build a database of malware designed specifically for execution of | + | |
- | DDoS-attacks | + | |
- | 3) examine the behaviour of the collected malware 'upon execution'; | + | |
- | 4) propose and build an environment | + | |
- | security tools - for longer term (beyond immediate execution) analysis | + | |
- | of the collected malware. | + | |
+ | ======Model-based Design and Development of Embedded Systems with Code Generation Tools====== | ||
- | ---- | + | **Supervisor:** Jia Xu |
- | : | + | |
- | ---- | + | |
- | Network analysis of EEG data: Understanding connections | + | **Required Background:** At least a B+ in Embedded Systems (CSE3215), MATLAB, C programming skills, solid experience in using a microcontroller |
+ | such as Arduino. | ||
- | ====== Network analysis of EEG data: Understanding connections in the brain ====== | + | **Project Description:** |
- | **Supervisor**: | + | Model-based design with code generation tools can be used for simulation, rapid prototyping, |
- | **Required Background**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Preferred**: | + | ======C2000 Concerto Microcontrollers====== |
+ | **Supervisor: | ||
- | __Description__ | + | **Required Background: |
- | Electroencephalogram | + | strong C programming skills, solid knowledge |
- | The tools that are used to analyze communication networks can also be used to analyze brain networks. In this interdisciplinary project, you will work with a collection of EEG data to identify correlated measurements, | + | **Description: |
+ | two cores on a single-chip | ||
+ | real-time control with faster/more loops and small sampling window; | ||
+ | and an ARM 32-bit Cortex-M3 host core for communications and general purpose. The selected student | ||
+ | C2000 Concerto family of microcontrollers through testing | ||
+ | that runs on C2000 Concerto Microcontrollers. | ||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
- | ---- | + | ======Real-Time Bidding Platform====== |
- | : | + | |
- | ---- | + | |
- | ====== An Open Source Structural Equation Modeling Path Diagram to Syntax Application ====== | + | **Supervisor: |
- | **Supervisor**: Jeff Edmonds | + | **Required Background:** At least a B+ in Operating System Fundamentals |
+ | (CSE3221), strong Ubuntu/ | ||
- | **Required Background**: JAVA | + | **Description: |
- | **Recommended Background**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | __Description__ | + | ======Circuit |
- | The software required is an application that allows researchers to define their hypothesized models visually | + | |
- | To date a promising functional application has been developed in JAVA by a Computer Science student as a 4080 project. | + | **Supervisor: |
- | This a cross-disciplinary | + | **Description: |
+ | **Required Background** A background in undergraduate-level electronics is very important. | ||
- | ---- | + | \\ |
- | : | + | ------------------ |
- | ---- | + | \\ |
+ | More project proposals may be added here in the first week of the winter term. | ||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | \\ |
projects.txt · Last modified: 2016/01/13 20:05 by stevenc