projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
projects [2013/04/19 20:07] – mb | projects [2015/08/11 20:40] – jarek | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | Currently offered Projects, Winter 2013 (updated January 9, 2013) | + | \\ |
- | (Listed in order received.) | + | |
- | ====== 3D Drawing System with Leap Motion finger tracker ====== | + | ===Genome-wide identification of plant micro RNAs=== |
- | **Supervisor**: | ||
- | **Required Background**: 3D computer graphics, C/C++ coding | + | Supervisor: Katalin Hudak |
+ | The Hudak Lab in the Biology Department has an opening for a fourth-year Honours student to assist with a bioinformatics project. We study the pokeweed plant, Phytolacca americana, which displays broad-spectrum virus resistance. To evaluate pokeweed gene expression, we recently sequenced the plant’s mRNA and small RNA transcriptomes under jasmonic acid (JA) treatment. JA is a plant hormone that mediates defence against pathogens and insect herbivores. We are interested in learning how pokeweed gene expression is regulated by miRNAs during biotic stress. | ||
- | The Leap Motion, leapmotion.com, | + | Working with the support of a PhD student, your project will involve: |
+ | 1) Prediction of micro RNA (miRNA) targets on the basis of complementary sequence matches | ||
+ | 2) Correlation of miRNA and mRNA expression changes to identify genes that are regulated by miRNAs | ||
+ | 3) Conducting pathway analysis to determine which biological processes are controlled by miRNAs | ||
+ | 4) Construction of a miRNA/ | ||
+ | This work will contribute to a scientific manuscript on miRNA-mediated gene regulation in pokeweed during response | ||
- | ====== 3D Drawing System | + | Requirements: |
+ | 1) Pre-requisites as per EECS Calendar | ||
+ | 2) Facility | ||
+ | 3) Preference for students with knowledge of statistics and familiarity with R programming | ||
+ | 4) Able to begin in September 2015 | ||
- | **Supervisor**: Wolfgang Stuerzlinger | + | Learning outcomes: |
+ | 1) Manipulate and analyze quantitative biological data | ||
+ | 2) Develop and test hypotheses by modifying existing software and writing new script | ||
+ | 3) Manage a CentOS computer server to store and facilitate ongoing research | ||
- | **Required Background**: | + | No knowledge of biology is required. |
+ | For more information, please see: | ||
+ | Hudak Lab website- http:// | ||
+ | RNA sequencing- http:// | ||
+ | miRNAs- http:// | ||
- | The 3Gear system, threegear.com, | ||
- | ====== Comparison of Finger Tracking systems ====== | ||
- | **Supervisor**: | ||
- | **Required Background**: | + | ===Dynamic Interface Detection and Control Project=== |
- | This project compares the Leap Motion and the 3Gear System against each other in a comparative Fitts' law study | + | **Supervisor: |
- | ====== Tilt Target Selection on Touchscreen Phones ====== | ||
- | **Supervisor**: | + | Contrary to most industries, fine chemical manufacturing is dominated by batch production methods. Increasing economic, environmental and safety pressures are motivating a turn towards continuous synthesis. Rather than making products in one big flask, continuous synthesis involves performing chemical reactions by flowing reagents through a tube. Working in this way provides more control over the reaction parameters leading to increases in product quality, and process efficiency and safety. The flow chemistry industry for fine chemical production is a relatively new but burgeoning field with a projected market capacity of billions of dollars by 2018. |
- | **Required Background**: | + | Extraction of the reaction mixture for purification |
- | Touchscreen mobile devices commonly use a built-in accelerometer to sense movement or tilting actions of the device. | + | A key step in the process takes place in a clear tube that is mounted vertically. The tube contains two fluids with a boundary between them. During |
- | **Readings**: | + | One way of solving this problem is to float a marker at the boundary between the two liquids and to monitor this boundary using a video camera. Although this approach solves the problem, it requires the introduction |
+ | Specific goals of the project include: | ||
+ | |||
+ | - Develop a computer vision system that can detect and monitor the interface between two miscible fluids of different density. | ||
+ | |||
+ | - Evaluate the performance of the system over a range of different (and typical) fluids | ||
+ | |||
+ | - Explore the use of different illuminant/ | ||
+ | |||
+ | The successful candidate(s) will have the experience of working with a diverse group of scientists and engineers toward the design and implementation of an automated liquid extraction device with applications across many industries. Upon successful prototyping, | ||
+ | |||
+ | For further information please contact, | ||
+ | |||
+ | Michael Jenkin (jenkin@cse.yorku.ca) or Michal Organ (organ@yorku.ca) | ||
+ | |||
+ | \\ | ||
+ | ====== DDoS Attack using Google-bots ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Recommended Background**: | ||
+ | |||
+ | Not long ago, botnets - networks of compromised computers - were seen as | ||
+ | the most effective (if not the only) means of conducting Distributed Denial | ||
+ | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
+ | of application-layer over other types of DDoS attacks, the DDoS execution | ||
+ | landscape is becoming increasingly more diverse. An especially interesting | ||
+ | new trend is the execution of application-layer DDoS attacks by means of | ||
+ | skillfully manipulated Web-crawlers, | ||
+ | The goal of this project is to design, implement and test a real-world | ||
+ | framework consisting of the following: a) the attacker' | ||
+ | domain specially designed to attract Google-bots and then manipulate them | ||
+ | into generating attack traffic towards the target/ | ||
+ | victim' | ||
+ | component, the project will also look into the statistical/ | ||
+ | estimation of the framework' | ||
+ | to an actual (real-world) target/ | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | \\ | ||
====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ||
Line 53: | Line 105: | ||
- Implement algorithms for detecting hand-raises based upon this investigation | - Implement algorithms for detecting hand-raises based upon this investigation | ||
- Evaluate these algorithms in a real-classroom setting, using proprietary attentive sensing technology | - Evaluate these algorithms in a real-classroom setting, using proprietary attentive sensing technology | ||
+ | |||
+ | |||
+ | ====== Attentive Sensing for Sport Video Recording Markets ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Required Background**: | ||
+ | |||
+ | |||
+ | The goal of this project is to modify York University’s patented attentive sensor technology to the sport video recording market. | ||
+ | |||
+ | The general problem is to use attentive sensing technology (www.elderlab.yorku.ca) to visually detect and track multiple moving agents (e.g., skiers, riders, horses) and to select specific agents for active high-resolution smooth pursuit. | ||
+ | |||
+ | The student will work with senior graduate students, postdoctoral fellows and research scientists to help modify the attentive sensing technology to operate in these domains. | ||
+ | |||
+ | 1. | ||
+ | 2. | ||
+ | 3. | ||
+ | |||
+ | ------------ | ||
- | ====== | + | \\ |
+ | ====== | ||
- | **Supervisor**: Jeff Edmonds | + | **Supervisor:** Franck van Breugel |
- | **Required Background**: General CSE408x prerequisites | + | Description: |
+ | Java PathFinder (JPF) is a tool that can detect bugs in Java code. | ||
+ | The Java library Apache log4j allows developers to control which log | ||
+ | statements are output. | ||
+ | to detect bugs in log4j by means of JPF with very limited succes. | ||
- | **Recommended Background**: | + | Recently, in collaboration with Shafiei (NASA) we have developed |
+ | an extension of JPF called jpf-nhandler. | ||
+ | is to apply this extension to log4j. | ||
- | Structural equation modeling (SEM) is a statistical technique that is becoming increasingly popular in the educational and behavioral sciences. SEM allows researchers to test the validity of hypothesized models involving complex relationships among multiple variables. Collected data is used to estimate the parameters of the equations and assessing the fit of the model. | + | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. " |
- | The software required is an application that allows researchers to define their hypothesized models visually and will output the correct syntax for the analytical software of their choosing. | + | **Required Background: |
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
- | To date a promising functional application has been developed in JAVA by a Computer Science student as a 4080 project. The existing software allows the user to draw a path diagram and outputs code for the R package sem. There are a number of improvements to be made (refinements and additions to graphical user interface) and then the application needs to be extended to output syntax appropriate for additional software applications (openMX, MPlus and EQS). Though this project may not begin at “the first stages” of the software lifecycle, this scenario is likely common in the software development market. In addition, the student will be working with a primary “client” who is far less technically advanced, which is also reflective of real-world situations. | ||
- | More details {{: | ||
- | ====== Numerical Methods ====== | ||
- | **Supervisor**: | + | ====== Mining Software Repositories Data====== |
- | **Required Background**: Good grade in a Numerical Methods course and good knowledge | + | **Supervisor:** Zhen Ming (Jack) Jiang (zmjiang at cse dot yorku dot ca) |
- | of Fortran, C or similar language. | + | |
- | **Description**: Write, debug and run several Fortran programs related to solving | + | **Required Background:** Good programming skills in Java; Good analytical and communication skills; Knowledge in AI and statistics; Interested in large scale software analysis |
- | polynomial equations, with a view to comparing different known methods. | + | |
- | ====== Enabling SaaS access | + | **Short Description: |
- | **Supervisor**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Required Background**: | ||
- | 3402 -- Functional & Logic Programming, | ||
- | 3101 -- Design and Analysis of Algorithms, | ||
- | 4302 -- Compilers and Interpreters. | ||
- | **Description**: | ||
- | The components are various Unix executables | + | ======Model-based Design |
- | Learning objectives: | + | **Supervisor: |
- | | + | |
- | | + | |
- | | + | |
+ | **Required Background: | ||
+ | such as Arduino. | ||
- | ====== Predicting Angular Error in Rigid Registration ====== | + | **Project Description: |
- | **Supervisor**: | + | Model-based design with code generation tools can be used for simulation, rapid prototyping, |
- | **Description**: | + | \\ |
- | navigation. Several (seemingly) different approaches for predicting | + | ------------------ |
- | distance errors in registration are known, but for some surgical | + | \\ |
- | procedures, the angular error in registration is more important. | + | |
- | This project will validate an approach for predicting angular | + | |
- | error in registration; | + | |
- | simulated and actual registration data for testing purposes. | + | |
- | ====== | + | ======C2000 Concerto Microcontrollers====== |
- | **Supervisor**: Burton Ma | + | **Supervisor:** Jia Xu |
- | **Description**: Tracked pointers are the most common tools used in surgical | + | **Required Background:** At least a B+ in Embedded Systems (CSE3215), |
- | navigation systems. A typical pointer has a tracked target on one | + | strong C programming skills, solid knowledge |
- | end and a sharp or ball tip on the other end. Finding the location | + | |
- | of the tip relative to the target is a calibration problem. One | + | |
- | solution to the calibration problem involves pivoting the pointer | + | |
- | about the tip while tracking the target; if the tip is kept | + | |
- | stationary, then the target moves on the surface of a sphere. | + | |
- | Fitting the tracking data to the surface of a sphere yields the | + | |
- | location of the tip as the sphere center. Unfortunately, the | + | |
- | calibrated tip position obtained using such a spherical calibration | + | |
- | has high variance. This project will investigate how much variance | + | |
- | there is in the calibrated tip position, and methods for reducing | + | |
- | the variance | + | |
+ | **Description: | ||
+ | two cores on a single-chip with on-chip low latency interprocessor communication between the two cores: a C28x 32-bit control core for | ||
+ | real-time control with faster/more loops and small sampling window; | ||
+ | and an ARM 32-bit Cortex-M3 host core for communications and general purpose. The selected student will evaluate the capabilities of the | ||
+ | C2000 Concerto family of microcontrollers through testing and investigating open source software for real-time control applications | ||
+ | that runs on C2000 Concerto Microcontrollers. | ||
- | ====== A privacy safeguard framework for sharing photos on Facebook ====== | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Supervisor**: | + | ======Real-Time Bidding Platform====== |
- | + | ||
+ | **Supervisor:** Jia Xu | ||
+ | |||
+ | **Required Background:** At least a B+ in Operating System Fundamentals | ||
+ | (CSE3221), strong Ubuntu/ | ||
+ | |||
+ | **Description: | ||
+ | |||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | |||
+ | ======Circuit and Board Design for a Pulsed Ground Penetrating Radar====== | ||
+ | |||
+ | **Supervisor: | ||
- | **Description**: | + | **Description:** The project requires |
- | One of the major privacy concerns in Online Social Networks is photo sharing. | + | |
- | **Required | + | **Required |
- | **Desired prerequisite**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
+ | More project proposals may be added here in the first week of the winter term. | ||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | \\ |
projects.txt · Last modified: 2016/01/13 20:05 by stevenc