projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
projects [2011/09/14 18:19] – dymond | projects [2015/08/11 20:43] – jarek | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | (Listed in order received.) | + | \\ |
- | ====== Building an autonomous motorboat ====== | + | ===Genome-wide identification of plant micro RNAs=== |
- | **Supervisor**: | ||
- | **Required Background**: General CSE408x prerequisites | + | **Supervisor: Katalin Hudak** |
- | **Recommended Background**: | ||
- | __Description__ | + | The Hudak Lab in the Biology Department has an opening |
- | An opportunity exists | + | |
+ | Working with the support of a PhD student, your project will involve: | ||
+ | 1) Prediction of micro RNA (miRNA) targets on the basis of complementary sequence matches | ||
- | ---- | + | 2) Correlation of miRNA and mRNA expression changes to identify genes that are regulated by miRNAs |
- | : | + | |
- | ---- | + | |
- | ====== Athenians Data Project ====== | + | 3) Conducting pathway analysis to determine which biological processes are controlled by miRNAs |
- | **Supervisor**: | + | 4) Construction of a miRNA/ |
+ | This work will contribute to a scientific manuscript on miRNA-mediated gene regulation in pokeweed during response to JA. | ||
- | **Required Background**: General CSE408x prerequisites | + | Requirements: |
- | **Recommended Background**: | + | 1) Pre-requisites as per EECS Calendar |
- | __Description__ | + | 2) Facility with script-writing/modification (in Perl or Python) |
- | The Athenians Project is a multi-year, ongoing project of compiling, computerizing and studying data about the persons of ancient Athens. | + | |
- | Possible project ideas for this term span from simpler ones such as | + | |
- | how to present data in the best possible way, add spatial characteristics to existing data, | + | |
- | add multimedia data, improve text searching, etc. to more complex ideas such as filling | + | |
- | missing parts for the " | + | |
- | words has been done in the past using expert knowledge. Those experts have establish | + | |
- | certain rules/guidelines that may be possible to extrapolate | + | |
- | when talking in IT terminology. Furthermore, | + | |
- | the database with some likelihood. Associating probabilities with hypotheses introduces | + | |
- | another opportunity for research projects. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Three-Dimensional Context from Linear Perspective | + | 3) Preference |
- | **Supervisor**: | + | 4) Able to begin in September 2015 |
- | **Requirements**: Good facility with applied mathematics | + | Learning outcomes: |
- | __Description__ | + | 1) Manipulate and analyze quantitative biological data |
- | To provide visual surveillance over a large environment, | + | 2) Develop |
- | This problem can be addressed by automatically pre-mapping two-dimensional surveillance video data into three-dimensional coordinates. | + | 3) Manage a CentOS computer server to store and facilitate ongoing research |
- | Mapping surveillance video to three-dimensional coordinates requires construction | + | No knowledge |
- | This project will investigate a monocular method for inferring three-dimensional context for video surveillance. | + | For more information, please see: |
+ | Hudak Lab website- http:// | ||
- | Although the Manhattan world assumption provides powerful constraints, | + | RNA sequencing- http://www.illumina.com/ |
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. The student will develop skills in using MATLAB, a very useful mathematical programming environment, | + | miRNAs- http://en.wikipedia.org/ |
- | For more information on the laboratory: [[http:// | + | \\ |
- | ---- | ||
- | : | ||
- | ---- | ||
- | ====== Estimating Pedestrian | + | ===Dynamic Interface Detection |
- | **Supervisor**: James Elder | + | **Supervisor: Michael Jenkin** |
- | **Requirements**: | ||
- | __Description__ | + | Contrary to most industries, fine chemical manufacturing is dominated by batch production methods. Increasing economic, environmental and safety pressures are motivating a turn towards continuous synthesis. Rather than making products in one big flask, continuous synthesis involves performing chemical reactions by flowing reagents through a tube. Working in this way provides more control over the reaction parameters leading to increases in product quality, and process efficiency and safety. The flow chemistry industry for fine chemical production is a relatively new but burgeoning field with a projected market capacity of billions of dollars by 2018. |
- | Facilities planning at both city (e.g., Toronto) | + | Extraction of the reaction mixture for purification |
- | The density of permanent urban video surveillance camera installations has increased dramatically over the last several years. These systems provide | + | A key step in the process takes place in a clear tube that is mounted vertically. The tube contains two fluids with a boundary between them. During the process material flows into and out of the tube from the top and the bottom. Chemical reactions take place within this tube and It is essential that the position of the boundary |
- | This project will explore the use of computer vision algorithms for the automatic estimation of pedestrian | + | One way of solving this problem is to float a marker at the boundary between the two liquids |
- | The student will work closely with graduate students and postdoctoral fellows at York University, as well as researchers at other institutions involved in the project. The student will develop skills in using MATLAB, a very useful mathematical programming environment, | + | Specific goals of the project |
- | For more information on the laboratory: [[http:// | + | - Develop a computer vision system that can detect and monitor |
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Tandem repeat detection using spectral methods ====== | + | - Evaluate the performance of the system over a range of different (and typical) fluids |
- | **Supervisor**: | + | - Explore the use of different illuminant/ |
- | **Required Background**: | + | The successful candidate(s) will have the experience of working with a diverse group of scientists and engineers toward the design and implementation of an automated liquid extraction device with applications across many industries. Upon successful prototyping, |
- | **Recommended Background**: | + | For further information please contact, |
- | __Description__ | + | Michael Jenkin (jenkin@cse.yorku.ca) or Michal Organ (organ@yorku.ca) |
- | DNA sequences of organisms have many repeated substrings. These are called repeats in Biology, and include both exact as well as approximate repeats. Repeats are of two main types: interspersed repeats (which are spread across a genome) and tandem repeats, which occur next to each other. Tandem repeats play important roles in gene regulation and are also used as markers that have several important uses, including human identity testing. | + | |
- | Finding tandem repeats is an important problem in Computational Biology. The techniques that have been proposed for it fall into two classes: string matching algorithms and signal processing techniques. In this project, we will explore fast, accurate algorithms for detecting tandem repeats and evaluate the outputs of the algorithms studied by comparing their outputs with those of available packages, including mreps (http:// | + | \\ |
+ | ====== DDoS Attack using Google-bots ====== | ||
- | The student will implement existing spectral algorithms based on Fourier Transforms and on an autoregressive model. He will then make changes suggested by the supervisor, and evaluate the effect of the modifications. Throughout the course, the student is required to maintain a course Web site to report any progress and details about the project. | + | **Supervisor**: |
+ | **Recommended Background**: | ||
+ | Not long ago, botnets - networks of compromised computers - were seen as | ||
+ | the most effective (if not the only) means of conducting Distributed Denial | ||
+ | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
+ | of application-layer over other types of DDoS attacks, the DDoS execution | ||
+ | landscape is becoming increasingly more diverse. An especially interesting | ||
+ | new trend is the execution of application-layer DDoS attacks by means of | ||
+ | skillfully manipulated Web-crawlers, | ||
+ | The goal of this project is to design, implement and test a real-world | ||
+ | framework consisting of the following: a) the attacker' | ||
+ | domain specially designed to attract Google-bots and then manipulate them | ||
+ | into generating attack traffic towards the target/ | ||
+ | victim' | ||
+ | component, the project will also look into the statistical/ | ||
+ | estimation of the framework' | ||
+ | to an actual (real-world) target/ | ||
- | ---- | ||
- | : | ||
- | ---- | ||
- | ====== Touch- and Gesture-based Text Entry With Automatic Error Correction ====== | ||
- | **Supervisor**: | + | \\ |
+ | ====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ||
- | **Required Background**: | + | **Supervisor**: James Elder |
- | CSE3461 (or equivalent), | + | |
- | A student wishing to do this project must be well versed in Java, Eclipse, and developing java code for the Android operating system. | + | |
+ | **Required Background**: | ||
+ | good math skills, knowledge of C and MATLAB programming languages | ||
- | **Recommended Background**: | + | One of the challenges in remote learning is to allow students to communicate effectively with the lecturer. |
- | Possession | + | |
+ | The goal of this project is to apply attentive sensing technology (www.elderlab.yorku.ca) to this problem. | ||
+ | |||
+ | In particular, working with a senior graduate student or postdoctoral fellow, the successful applicant will: | ||
+ | |||
+ | - Study the problem | ||
+ | - Implement algorithms for detecting hand-raises | ||
+ | - Evaluate these algorithms in a real-classroom setting, using proprietary attentive sensing technology | ||
- | __Description__ | ||
- | This project involves extending a touch-based text entry method to include automatic error correction. | ||
+ | ====== Attentive Sensing for Sport Video Recording Markets ====== | ||
+ | **Supervisor**: | ||
- | ---- | + | **Required Background**: Good programming skills; Good math skills; Knowledge of C and MATLAB programming languages |
- | : | + | |
- | ---- | + | |
- | ====== Early Breast Cancer Detection based on MRI’s. ====== | + | |
- | **Supervisor**: | + | |
- | + | The goal of this project is to modify York University’s patented attentive sensor technology | |
- | **Required Background**: | + | |
- | + | The general problem | |
- | **Recommended background**: | + | |
- | + | The student | |
- | Project Description: | + | |
- | processing techniques for early detection | + | 1. Ground-truth available datasets |
- | modalities. In particular, we propose to develop time reversal beamforming imager, | + | 2. Evaluate current attentive algorithms |
- | based on our earlier work in time reversal signal processing, for detecting early stage | + | 3. Modify these algorithms to improve performance on these datasets |
- | breast cancer tumours from MRI data. | + | |
- | Our preliminary work has illustrated the type of | + | ------------ |
- | results that are possible for breast cancer detection by applying time reversal signal | + | |
- | processing on MRI breast data. In this research, we propose | + | |
- | provide a quantitative understanding of the practical gains provided by time reversal | + | |
- | in MRI based breast cancer detection and its limitations. This will be accomplished | + | |
- | a local hospital, and running our algorithms on these datasets. The first step is | + | |
- | important to check the validity of our algorithms. | + | |
- | estimated locations of the tumours | + | |
- | locations as identified by the pathologists. The second step will quantify the accuracy | + | |
- | of our estimation algorithms. | + | |
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Developing Fast Speech Recognition Engine using GPU ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | General prerequisites | + | |
- | + | ||
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Recently, Graphics Processing Units (GPU's) have been widely used as an extremely fast computing vehicle for a variety of real-world applications. Many software programs have been developed for GPU' | + | |
- | + | ||
- | During the recent years, there is an increasing demand in the job market | + | |
- | + | ||
- | References | + | |
- | + | ||
- | [1] Kisun You, Jike Chong, Youngmin Yi, Gonina, E., Hughes, C.J., Yen-Kuang Chen, Wonyong Sung, Keutzer, K., " | + | |
- | + | ||
- | [2] Jike Chong, Ekaterina Gonina, Youngmin Yi, Kurt Keutzer, "A Fully Data Parallel WFST-based Large Vocabulary Continuous Speech Recognition on a Graphics Processing Unit," Proc. of Interspeech 2009, Brigton, UK, 2009. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== Solving Polynomials ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | General prerequisites plus course in Numerical Methods, and knowledge of programming, | + | |
- | + | ||
- | + | ||
- | __Description__ | + | |
- | + | ||
- | In this project you will compare several efficient methods for solving polynomials. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== MF7114 Assembler ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | Some knowledge of microprocessor architecture and assembly programming | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Every microprocessor is supported by a variety of software tools, such as assemblers, disassemblers, and debuggers | + | |
- | + | ||
- | Background Information: | + | |
- | manufactured in Canada (by Microsystems International Ltd, or MIL) and one of the earliest microprocessors ever produced. The microprocessor was used, among other applications as the CPU of the CPS-1 microcomputer. Although none of the CPS/1 computers (nor MF7114 software) have survived, technical information about the microprocessor and the CPS-1 has been preserved. This makes the design and | + | |
- | implementation of an assembler possible. More information | + | |
- | + | ||
- | http://www.cse.yorku.ca/ | + | |
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== MF7114 Debugger ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | Some knowledge of microprocessor architecture and assembly programming | + | |
- | + | ||
- | __Description__ | + | |
- | + | ||
- | Every microprocessor is supported by a variety of software tools, such as assemblers, | + | |
- | + | ||
- | Background Information: | + | |
- | manufactured in Canada (by Microsystems International Ltd, or MIL) and one of the earliest microprocessors ever produced. The microprocessor was used, among other applications as the CPU of the CPS-1 microcomputer. Although none of the CPS/1 computers (nor MF7114 software) have survived, technical information about the microprocessor and the CPS-1 has been preserved. This makes the design and | + | |
- | implementation of a debugger possible. More information on | + | |
- | + | ||
- | http:// | + | |
- | + | ||
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | + | ||
- | ======Web Crawlers Behaving Like Humans: Are We There Yet!? ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Required Background**: | + | |
- | + | ||
- | + | ||
- | __Description__ | + | |
+ | \\ | ||
+ | ====== Hunting for Bugs in Logging: applying JPF to log4j ====== | ||
- | Distributed Denial of Service (DDoS) attacks are recognized as one | + | **Supervisor:** Franck van Breugel |
- | of the most serious threats to today' | + | |
- | simplicity of their execution and their ability to severely degrade | + | |
- | the quality at which Web-based services are offered to the end users. | + | |
- | An especially challenging form of DDoS attacks are the so-called | + | |
- | Application-Layer DDoS attacks. Namely: | + | |
- | 1) In Application-Layer DDoS attacks, the attackers utilize a flood | + | |
- | of legitimate-looking Layer-7 network sessions (i.e., sessions that | + | |
- | are generally hard to detect and/or filter out by a firewall or an | + | |
- | IDS system); | + | |
- | 2) Increasingly, | + | |
- | cleverly programmed crawler that executes a semi-random walk over the | + | |
- | web site links, thereby attempting to appear as a legitimate human | + | |
- | visitor. | + | |
- | The goal of this project | + | Description: |
- | malicious web crawler design. In particular, the project will look | + | Java PathFinder (JPF) is a tool that can detect bugs in Java code. |
- | into the challenges of designing a smart-DDoS-crawler from the | + | The Java library Apache log4j allows developers to control which log |
- | attacker point of view - one of these challenges being the estimation | + | statements are output. In the past, Dickey et al. [1] have attempted |
- | of web-page popularity assuming no a priori access | + | to detect bugs in log4j by means of JPF with very limited succes. |
- | of the victim web-site. | + | |
- | ---- | + | |
- | : | + | |
- | ---- | + | |
- | ====== GFI Sandbox | + | |
- | **Supervisor**: | + | Recently, in collaboration with Shafiei (NASA) we have developed |
+ | an extension of JPF called jpf-nhandler. | ||
+ | is to apply this extension to log4j. | ||
- | **Required Background**: | + | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. " |
+ | **Required Background: | ||
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
- | __Description__ | ||
- | GFI Sandbox is a sophisticated industry-leading tool for quick and | ||
- | safe analysis of malware behaviour. The goals of this project are: | ||
- | 1) familiarize yourself with the operation of GFI Sandbox; | ||
- | 2) using readily available GFI Sandbox Feeds (i.e., ThreatTrack Feeds), | ||
- | build a database of malware designed specifically for execution of | ||
- | DDoS-attacks - the so-called botnet malware; | ||
- | 3) examine the behaviour of the collected malware 'upon execution'; | ||
- | 4) propose and build an environment - comprising the standard freeware | ||
- | security tools - for longer term (beyond immediate execution) analysis | ||
- | of the collected malware. | ||
- | ---- | ||
- | : | ||
- | ---- | ||
- | Network analysis of EEG data: Understanding connections in the brain | ||
- | ====== | + | ====== |
- | **Supervisor**: Andrew Eckford | + | **Supervisor:** Zhen Ming (Jack) Jiang (zmjiang at cse dot yorku dot ca) |
- | **Required Background**: CSE 3213 (Computer Networks), CSE 3451 (Signals | + | **Required Background:** Good programming skills in Java; Good analytical |
- | **Preferred**: At least a B in all of the above courses | + | **Short Description: |
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
- | __Description__ | ||
- | Electroencephalogram (EEG) data indicates electrical activity at particular locations in the brain. Using EEG data from multiple sensors, it is possible to find correlations among the measurements, | ||
- | The tools that are used to analyze communication networks can also be used to analyze brain networks. In this interdisciplinary project, you will work with a collection of EEG data to identify correlated measurements, | ||
+ | ======Model-based Design and Development of Embedded Systems with Code Generation Tools====== | ||
- | ---- | + | **Supervisor:** Jia Xu |
- | : | + | |
- | ---- | + | |
- | ====== An Open Source Structural Equation Modeling Path Diagram to Syntax Application ====== | + | **Required Background: |
+ | such as Arduino. | ||
- | **Supervisor**: Jeff Edmonds | + | **Project Description: |
- | **Required Background**: | + | Model-based design with code generation tools can be used for simulation, rapid prototyping, |
- | **Recommended Background**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | __Description__ | + | ======C2000 Concerto Microcontrollers====== |
- | The software required is an application that allows researchers to define their hypothesized models visually and will output the correct syntax for the analytical software of their choosing. | + | |
- | To date a promising functional application has been developed in JAVA by a Computer Science student as a 4080 project. | + | **Supervisor: |
- | This a cross-disciplinary project with the Quantitative Methods division of the Department of Psychology. As such, the student will be working with individuals with expertise | + | **Required Background: |
+ | strong C programming skills, solid knowledge | ||
+ | **Description: | ||
+ | two cores on a single-chip with on-chip low latency interprocessor communication between the two cores: a C28x 32-bit control core for | ||
+ | real-time control with faster/more loops and small sampling window; | ||
+ | and an ARM 32-bit Cortex-M3 host core for communications and general purpose. The selected student will evaluate the capabilities of the | ||
+ | C2000 Concerto family of microcontrollers through testing and investigating open source software for real-time control applications | ||
+ | that runs on C2000 Concerto Microcontrollers. | ||
- | ---- | + | \\ |
- | : | + | ------------------ |
- | ---- | + | \\ |
- | ====== | + | ======Real-Time Bidding Platform====== |
- | **Supervisor**: Rob Allison (co-supervised with Hugh Chesser, Space Engineering) | + | **Supervisor:** Jia Xu |
- | **Required Background**: General CSE408x prerequisites, familiarity with C++ and Windows software tools | + | **Required Background:** At least a B+ in Operating System Fundamentals |
+ | (CSE3221), strong Ubuntu/ | ||
+ | **Description: | ||
- | __Description__ | + | \\ |
- | The YUsend (York University Space Engineering Nanosatellite Demonstration) Lab has procured a Windows XP-based industrial computer and temperature acquisition card (as well as other hardware) for performing TVAC testing of nanosatellites in the CSIL Lab (PSE 003). A "TVAC Test Manager" | + | ------------------ |
+ | \\ | ||
- | Specific tasks include: | + | ======Circuit |
- | 1. Writing temperature acquisition card (OMEGA Engineering CIO-DAS-Temp) drivers for LabView - should be written in Visual C++ or similar | + | |
- | 2. Write LabView VI's (" | + | |
- | 3. (Optional) Interface the Test Manager with an orbital simulation tool which would be used to compute IR lamp inputs based on a simulation of the nanosatellite' | + | |
+ | **Supervisor: | ||
+ | **Description: | ||
- | ---- | + | **Required Background** A background in undergraduate-level electronics is very important. |
- | : | + | |
- | ---- | + | |
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | More project proposals may be added here in the first week of the winter term. | ||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | \\ |
projects.txt · Last modified: 2016/01/13 20:05 by stevenc