projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
projects [2011/09/11 01:18] – dymond | projects [2015/08/26 21:59] – jarek | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | (Listed in order received.) | + | \\ |
+ | ======Clustering High-Dimensional Data Sets====== | ||
- | ====== Building an autonomous motorboat ====== | + | **Supervisor: |
- | **Supervisor**: | + | Clustering is a basic technique for analyzing data sets. Clustering is the process of grouping data points in a way that points within a group are |
+ | more similar to each other than points in other clusters. Many clustering algorithms have been developed over the years. However no single algorithm works well for all data sets. Further, most clustering algorithms have running times of the order of n^2 or n^3, so that they are not feasible for data sets with hundreds of thousands of points. In this project we will design good clustering algorithms for large real data sets. In particular we are interested in | ||
+ | Biological data sets. | ||
- | **Required Background**: General CSE408x prerequisites | + | Our data sets will include those obtained from Flow Cytometry data. Flow Cytometry is a common technique in many areas of Biology, particularly Immunology. Typical usage involves testing a blood sample for 25 attributes on a per-cell basis, and thus typical data sets are arrays of 500,000 points in a 25 dimensional space. The aim is to identify clusters that correspond to a biologist' |
- | **Recommended Background**: | + | No Biology knowledge is required. The student should be a strong programmer. Knowledge of C/C++ is desirable but not essential. The work involves reading and understanding existing algorithms and working with the supervisor to design and implement improved algorithms and to measure the performance of the proposed algorithm(s). |
- | __Description__ | + | For more information, |
- | An opportunity exists for a small number of students | + | |
+ | Required Background: General CSE408x prerequisites | ||
- | ---- | + | \\ |
- | : | + | |
- | ---- | + | |
- | ====== Athenians Data Project ====== | ||
- | **Supervisor**: | + | ======Metaheuristic-based Optimization techniques====== |
- | **Required Background**: General CSE408x prerequisites | + | **Supervisor:** Suprakash Datta |
- | **Recommended Background**: | + | Optimization is a crucial step in many computational problems. For computational problems that seem (or are known to be) intractable, |
- | __Description__ | + | The student should be a strong programmer. A good grasp of algorithms |
- | The Athenians Project is a multi-year, ongoing project | + | |
- | Possible project ideas for this term span from simpler ones such as | + | |
- | how to present data in the best possible way, add spatial characteristics | + | |
- | add multimedia data, improve text searching, etc. to more complex ideas such as filling | + | |
- | missing parts for the " | + | |
- | words has been done in the past using expert knowledge. Those experts have establish | + | |
- | certain rules/ | + | |
- | when talking in IT terminology. Furthermore, | + | |
- | the database with some likelihood. Associating probabilities with hypotheses introduces | + | |
- | another opportunity for research projects. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Three-Dimensional Context from Linear Perspective for Video Surveillance Systems ====== | + | For more information, |
- | **Supervisor**: James Elder | + | Required Background: General CSE408x prerequisites |
- | **Requirements**: | + | \\ |
- | __Description__ | + | ======Data visualization in Skydive====== |
- | To provide visual surveillance over a large environment, | + | **Supervisor: |
- | This problem can be addressed by automatically pre-mapping two-dimensional surveillance video data into three-dimensional coordinates. | + | Skydive is a prototype system designed for database visualization using a concept of the so called |
+ | data pyramid. The system is composed of three modules (DB - Database Module, D2I - | ||
+ | Data-to-Image module, and VC - Visualizaton Client). Each is designed to use a different type | ||
+ | of computer memory. The DB module uses disk to store and manage | ||
+ | data pyramids. The D2I module works with a small subset | ||
+ | and stores data in main memory (RAM). The VC module uses the graphic card’s capabilities to | ||
+ | perform | ||
+ | graphical representation of the data. | ||
+ | Currently the system support three presentation models implemented within the Visualization | ||
+ | Component, namely: | ||
- | Mapping surveillance video to three-dimensional coordinates requires construction of a virtual model of the three-dimensional scene. | + | • a 2D heat-map; |
- | This project will investigate | + | • a 2.5 D heat-map by 3D barchart; and |
- | Although the Manhattan world assumption provides powerful constraints, | + | • a 2.5 D terrain (by mesh and UV-mapping). |
- | The student will work closely with graduate students and postdoctoral fellows at York University, | + | The goal of the project is to implement two additional ways of data visualization |
+ | extend some of existing ones, that is: | ||
- | For more information on the laboratory: [[http:// | + | 1. Implement and test functions for data pyramid-based visualization of time series. |
- | ---- | + | 2. Implement functions for visualization based on cross-product of data pyramids. |
- | : | + | |
- | ---- | + | |
- | ====== Estimating Pedestrian | + | 3. Add support for specular |
- | **Supervisor**: James Elder | + | Required Background: CSE 3421, Java programming course, (C programming course a plus) |
- | **Requirements**: | ||
- | __Description__ | + | \\ |
- | Facilities planning at both city (e.g., Toronto) and institutional (e.g., York University) scales requires accurate data on the flow of people and vehicles throughout the environment. | + | ======Genome-wide identification |
- | The density of permanent urban video surveillance camera installations has increased dramatically over the last several years. | ||
- | This project will explore the use of computer vision algorithms for the automatic estimation of pedestrian and vehicle flows from video surveillance data. The ultimate goal is to provide planners with accurate, continuous, up-to-date information on facility usage to help guide planning. | + | **Supervisor: |
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. | ||
- | For more information on the laboratory: [[http:// | + | The Hudak Lab in the Biology Department has an opening for a fourth-year Honours student to assist with a bioinformatics project. We study the pokeweed plant, Phytolacca americana, which displays broad-spectrum virus resistance. To evaluate pokeweed gene expression, we recently sequenced the plant’s mRNA and small RNA transcriptomes under jasmonic acid (JA) treatment. JA is a plant hormone that mediates defence against pathogens and insect herbivores. We are interested in learning how pokeweed gene expression is regulated by miRNAs during biotic stress. |
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Tandem repeat detection using spectral methods ====== | + | Working with the support of a PhD student, your project will involve: |
- | **Supervisor**: | + | 1) Prediction of micro RNA (miRNA) targets on the basis of complementary sequence matches |
- | **Required Background**: | + | 2) Correlation of miRNA and mRNA expression changes to identify genes that are regulated by miRNAs |
- | **Recommended Background**: | + | 3) Conducting pathway analysis to determine which biological processes are controlled by miRNAs |
- | __Description__ | + | 4) Construction |
- | DNA sequences | + | This work will contribute to a scientific manuscript on miRNA-mediated |
- | Finding tandem repeats is an important problem in Computational Biology. The techniques that have been proposed for it fall into two classes: string matching algorithms and signal processing techniques. In this project, we will explore fast, accurate algorithms for detecting tandem repeats and evaluate the outputs of the algorithms studied by comparing their outputs with those of available packages, including mreps (http:// | + | Requirements: |
- | The student will implement existing spectral algorithms based on Fourier Transforms and on an autoregressive model. He will then make changes suggested by the supervisor, and evaluate the effect of the modifications. Throughout the course, the student is required to maintain a course Web site to report any progress and details about the project. | + | 1) Pre-requisites as per EECS Calendar |
+ | 2) Facility with script-writing/ | ||
+ | 3) Preference for students with knowledge of statistics and familiarity with R programming | ||
+ | 4) Able to begin in September 2015 | ||
- | ---- | + | Learning outcomes: |
- | : | + | |
- | ---- | + | |
- | ====== Touch- | + | 1) Manipulate |
- | **Supervisor**: | + | 2) Develop and test hypotheses by modifying existing software and writing new script |
- | **Required Background**: | + | 3) Manage a CentOS computer server |
- | CSE3461 (or equivalent), CSE3311 (or equivalent), | + | |
- | A student wishing | + | |
+ | No knowledge of biology is required. | ||
- | **Recommended Background**: | + | For more information, |
- | Possession of an Android touch-based phone or tablet would be an asset, but is not essential. | + | Hudak Lab website- http:// |
- | __Description__ | + | RNA sequencing- http://www.illumina.com/ |
- | This project involves extending a touch-based text entry method to include automatic error correction. The method, as is, uses Graffiti strokes entered via a finger on a touch-based Android tablet. | + | |
+ | miRNAs- http:// | ||
+ | \\ | ||
- | ---- | + | ======Dynamic Interface |
- | : | + | |
- | ---- | + | |
- | ====== | + | |
- | **Supervisor**: Amir Asif | + | **Supervisor:** Michael Jenkin |
- | **Required Background**: | ||
- | **Recommended background**: | + | Contrary to most industries, fine chemical manufacturing is dominated by batch production methods. Increasing economic, environmental and safety pressures are motivating a turn towards continuous synthesis. Rather than making products in one big flask, continuous synthesis involves performing chemical reactions by flowing reagents through a tube. Working in this way provides more control over the reaction parameters leading to increases in product quality, and process efficiency and safety. The flow chemistry industry for fine chemical production is a relatively new but burgeoning field with a projected market capacity of billions of dollars by 2018. |
- | Project Description: | + | Extraction |
- | processing techniques for early detection | + | |
- | modalities. In particular, we propose to develop time reversal beamforming imager, | + | |
- | based on our earlier work in time reversal signal processing, for detecting early stage | + | |
- | breast cancer tumours from MRI data. | + | |
- | Our preliminary work has illustrated the type of | + | |
- | results that are possible for breast cancer detection by applying time reversal signal | + | |
- | processing on MRI breast data. In this research, | + | |
- | provide | + | |
- | in MRI based breast cancer detection and its limitations. This will be accomplished | + | |
- | a local hospital, and running our algorithms on these datasets. The first step is | + | |
- | important to check the validity of our algorithms. The next step is to compare the | + | |
- | estimated locations of the tumours (as derived with our algorithms) to their precise | + | |
- | locations as identified by the pathologists. The second step will quantify the accuracy | + | |
- | of our estimation algorithms. | + | |
- | ---- | + | A key step in the process takes place in a clear tube that is mounted vertically. The tube contains two fluids with a boundary between them. During the process material flows into and out of the tube from the top and the bottom. Chemical reactions take place within this tube and It is essential that the position of the boundary be monitored as its position in the tube is used to control the flow of materials into the tube. |
- | : | + | |
- | ---- | + | |
- | ====== Developing Fast Speech Recognition Engine using GPU ====== | + | |
- | **Supervisor**: | + | One way of solving this problem is to float a marker at the boundary between the two liquids and to monitor this boundary using a video camera. Although this approach solves the problem, it requires the introduction of a specific float within the tube. Can we build a system that monitors the boundary without resorting to the use of an artificial float? |
- | **Required Background**: | + | Specific goals of the project include: |
- | General prerequisites | + | |
+ | - Develop a computer vision system that can detect and monitor the interface between two miscible fluids of different density. | ||
- | __Description__ | + | - Evaluate the performance of the system over a range of different (and typical) fluids |
- | Recently, Graphics Processing Units (GPU' | + | - Explore |
- | During | + | The successful candidate(s) will have the experience of working with a diverse group of scientists and engineers toward the design and implementation of an automated liquid extraction device with applications across many industries. Upon successful prototyping, |
- | References | + | For further information please contact, |
- | [1] Kisun You, Jike Chong, Youngmin Yi, Gonina, E., Hughes, C.J., Yen-Kuang Chen, Wonyong Sung, Keutzer, K., " | + | Michael Jenkin (jenkin@cse.yorku.ca) or Michal Organ (organ@yorku.ca) |
- | [2] Jike Chong, Ekaterina Gonina, Youngmin Yi, Kurt Keutzer, "A Fully Data Parallel WFST-based Large Vocabulary Continuous Speech Recognition on a Graphics Processing Unit," Proc. of Interspeech 2009, Brigton, UK, 2009. | + | \\ |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Solving Polynomials ====== | + | |
- | **Supervisor**: | + | ===== DDoS Attack using Google-bots ===== |
- | **Required Background**: | + | **Supervisor: Ntalija Vlajic** |
- | General prerequisites plus course in Numerical Methods, and knowledge of programming, | + | |
+ | **Recommended Background**: | ||
- | __Description__ | + | Not long ago, botnets - networks of compromised computers - were seen as |
+ | the most effective (if not the only) means of conducting Distributed Denial | ||
+ | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
+ | of application-layer over other types of DDoS attacks, the DDoS execution | ||
+ | landscape is becoming increasingly more diverse. An especially interesting | ||
+ | new trend is the execution of application-layer DDoS attacks by means of | ||
+ | skillfully manipulated Web-crawlers, | ||
+ | The goal of this project is to design, implement and test a real-world | ||
+ | framework consisting of the following: a) the attacker' | ||
+ | domain specially designed to attract Google-bots and then manipulate them | ||
+ | into generating attack traffic towards the target/ | ||
+ | victim' | ||
+ | component, the project will also look into the statistical/ | ||
+ | estimation of the framework' | ||
+ | to an actual (real-world) target/ | ||
- | In this project you will compare several efficient methods for solving polynomials. | ||
- | ---- | ||
- | : | ||
- | ---- | ||
- | ====== MF7114 Assembler ====== | ||
- | **Supervisor**: | ||
- | **Required Background**: | ||
- | Some knowledge of microprocessor architecture and assembly programming | ||
- | __Description__ | + | \\ |
- | Every microprocessor is supported by a variety of software tools, such as assemblers, disassemblers, | + | ====== Attentive Sensing |
- | Background Information: The MF7114 CPU was the first microprocessor designed and | + | **Supervisor**: James Elder |
- | manufactured in Canada (by Microsystems International Ltd, or MIL) and one of the earliest microprocessors ever produced. The microprocessor was used, among other applications as the CPU of the CPS-1 microcomputer. Although none of the CPS/1 computers (nor MF7114 software) have survived, technical information about the microprocessor and the CPS-1 has been preserved. This makes the design and | + | |
- | implementation of an assembler possible. More information on | + | |
- | http:// | + | **Required Background**: General CSE408x prerequisites, |
+ | good math skills, knowledge of C and MATLAB programming languages | ||
- | ---- | + | One of the challenges in remote learning is to allow students to communicate effectively with the lecturer. |
- | : | + | |
- | ---- | + | The goal of this project is to apply attentive sensing technology (www.elderlab.yorku.ca) to this problem. |
- | ====== | + | |
+ | In particular, working with a senior graduate student or postdoctoral fellow, the successful applicant will: | ||
+ | |||
+ | | ||
+ | | ||
+ | - Evaluate these algorithms in a real-classroom setting, using proprietary attentive sensing technology | ||
+ | |||
+ | |||
+ | ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Required Background**: | ||
+ | |||
+ | |||
+ | The goal of this project is to modify York University’s patented attentive sensor technology to the sport video recording market. | ||
+ | |||
+ | The general problem is to use attentive sensing technology (www.elderlab.yorku.ca) to visually detect and track multiple moving agents (e.g., skiers, riders, horses) and to select specific agents for active high-resolution smooth pursuit. | ||
+ | |||
+ | The student will work with senior graduate students, postdoctoral fellows and research scientists to help modify the attentive sensing technology to operate in these domains. | ||
+ | |||
+ | 1. | ||
+ | 2. | ||
+ | 3. | ||
+ | |||
+ | ------------ | ||
+ | |||
- | **Supervisor**: | + | \\ |
+ | ====== JPF in a Jar ====== | ||
- | **Required Background**: | + | **Supervisor:** Franck van Breugel |
- | Some knowledge of microprocessor architecture and assembly programming | + | |
- | __Description__ | + | Description: |
+ | JPF, which is short for Java PathFinder, is an open source | ||
+ | tool that has been developed at NASA's Ames Research Center. | ||
+ | The aim of JPF is to find bugs in Java code. Instead of | ||
+ | using testing to find those bugs, JPF uses model checking. | ||
+ | The facts that JPF is downloaded hundreds of times per month | ||
+ | and that some of the key papers on JPF have been cited more | ||
+ | than a thousand times reflect the popularity of JPF. In | ||
+ | fact it is the most popular model checker for Java. | ||
- | Every microprocessor is supported | + | A study done by Cambridge University in 2014 found that the |
+ | global cost of debugging code has risen to $312 billion annually. | ||
+ | Furthermore, | ||
+ | programming time with finding and fixing bugs. As a consequence, | ||
+ | advocating the use tools, such as JPF, may have significant impact. | ||
- | Background Information: | + | Installing JPF is far from trivial. |
- | manufactured | + | implemented |
- | implementation of a debugger possible. More information on | + | feasible to encapsulate JPF in a Java archive |
+ | This would make it significantly simplifying | ||
+ | process of JPF and, therefore, make the tool more easily | ||
+ | accessible to its potential users. | ||
- | http://www.cse.yorku.ca/ | + | The aim of this project is to attempt to put JPF in a jar. |
+ | Since JPF relies on a number of configuration files, so-called | ||
+ | Java properties files, incorporating these properly into the | ||
+ | jar is one of the challenges. | ||
+ | another challenge. Since JPF changes almost on a daily basis, | ||
+ | our modifications to JPF should ideally be limited to only a | ||
+ | few classes, yet another challenge. | ||
- | ---- | + | In this project you may collaborate with graduate students |
- | : | + | of the DisCoVeri group (discoveri.eecs.yorku.ca) and |
- | ---- | + | computer scientists of NASA. For more information, |
+ | free to send email to franck@cse.yorku.ca. | ||
- | ======Web Crawlers Behaving Like Humans: Are We There Yet!? ====== | + | **Required Background:** General CSE408x prerequisites |
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
- | **Supervisor**: | ||
- | **Required Background**: | ||
- | __Description__ | ||
- | Distributed Denial of Service (DDoS) attacks are recognized as one | + | ====== Mining Software Repositories Data====== |
- | of the most serious threats to today' | + | |
- | simplicity of their execution and their ability to severely degrade | + | |
- | the quality at which Web-based services are offered to the end users. | + | |
- | An especially challenging form of DDoS attacks are the so-called | + | |
- | Application-Layer DDoS attacks. Namely: | + | |
- | 1) In Application-Layer DDoS attacks, the attackers utilize a flood | + | |
- | of legitimate-looking Layer-7 network sessions (i.e., sessions that | + | |
- | are generally hard to detect and/or filter out by a firewall or an | + | |
- | IDS system); | + | |
- | 2) Increasingly, | + | |
- | cleverly programmed crawler that executes a semi-random walk over the | + | |
- | web site links, thereby attempting to appear as a legitimate human | + | |
- | visitor. | + | |
- | The goal of this project is to investigate the state of the art in | + | **Supervisor:** Zhen Ming (Jack) Jiang (zmjiang at cse dot yorku dot ca) |
- | malicious web crawler design. In particular, the project will look | + | |
- | into the challenges of designing a smart-DDoS-crawler from the | + | |
- | attacker point of view - one of these challenges being the estimation | + | |
- | of web-page popularity assuming no a priori access to the web-logs | + | |
- | of the victim web-site. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== GFI Sandbox | + | |
- | **Supervisor**: Natalija Vlajic | + | **Required Background:** Good programming skills in Java; Good analytical and communication skills; Knowledge in AI and statistics; Interested in large scale software analysis |
- | **Required Background**: General prerequisites. | + | **Short Description: |
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
- | __Description__ | ||
- | GFI Sandbox is a sophisticated industry-leading tool for quick and | ||
- | safe analysis of malware behaviour. The goals of this project are: | ||
- | 1) familiarize yourself with the operation of GFI Sandbox; | ||
- | 2) using readily available GFI Sandbox Feeds (i.e., ThreatTrack Feeds), | ||
- | build a database of malware designed specifically for execution of | ||
- | DDoS-attacks - the so-called botnet malware; | ||
- | 3) examine the behaviour of the collected malware 'upon execution'; | ||
- | 4) propose and build an environment - comprising the standard freeware | ||
- | security tools - for longer term (beyond immediate execution) analysis | ||
- | of the collected malware. | ||
+ | ======Model-based Design and Development of Embedded Systems with Code Generation Tools====== | ||
- | ---- | + | **Supervisor:** Jia Xu |
- | : | + | |
- | ---- | + | |
- | Network analysis of EEG data: Understanding connections | + | **Required Background:** At least a B+ in Embedded Systems (CSE3215), MATLAB, C programming skills, solid experience in using a microcontroller |
+ | such as Arduino. | ||
- | ====== Network analysis of EEG data: Understanding connections in the brain ====== | + | **Project Description:** |
- | **Supervisor**: | + | Model-based design with code generation tools can be used for simulation, rapid prototyping, |
- | **Required Background**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Preferred**: | + | ======C2000 Concerto Microcontrollers====== |
+ | **Supervisor: | ||
- | __Description__ | + | **Required Background: |
- | Electroencephalogram | + | strong C programming skills, solid knowledge |
- | The tools that are used to analyze communication networks can also be used to analyze brain networks. In this interdisciplinary project, you will work with a collection of EEG data to identify correlated measurements, | + | **Description: |
+ | two cores on a single-chip | ||
+ | real-time control with faster/more loops and small sampling window; | ||
+ | and an ARM 32-bit Cortex-M3 host core for communications and general purpose. The selected student | ||
+ | C2000 Concerto family of microcontrollers through testing | ||
+ | that runs on C2000 Concerto Microcontrollers. | ||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
- | ---- | + | ======Real-Time Bidding Platform====== |
- | : | + | |
- | ---- | + | |
- | ====== An Open Source Structural Equation Modeling Path Diagram to Syntax Application ====== | + | **Supervisor: |
- | **Supervisor**: Jeff Edmonds | + | **Required Background:** At least a B+ in Operating System Fundamentals |
+ | (CSE3221), strong Ubuntu/ | ||
- | **Required Background**: JAVA | + | **Description: |
- | **Recommended Background**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | __Description__ | + | ======Circuit |
- | The software required is an application that allows researchers to define their hypothesized models visually | + | |
- | To date a promising functional application has been developed in JAVA by a Computer Science student as a 4080 project. | + | **Supervisor: |
- | This a cross-disciplinary | + | **Description: |
+ | **Required Background** A background in undergraduate-level electronics is very important. | ||
- | ---- | + | \\ |
- | : | + | ------------------ |
- | ---- | + | \\ |
+ | More project proposals may be added here in the first week of the winter term. | ||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | \\ |
projects.txt · Last modified: 2016/01/13 20:05 by stevenc