projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
projects [2013/04/19 20:07] – mb | projects [2015/08/11 21:01] – jarek | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | Currently offered Projects, Winter 2013 (updated January 9, 2013) | + | \\ |
- | (Listed in order received.) | + | |
- | ====== 3D Drawing System with Leap Motion finger tracker ====== | + | =====Data visualization in Skydive===== |
- | **Supervisor**: Wolfgang Stuerzlinger | + | **Supervisor: Jarek Gryz** |
- | **Required Background**: | + | Skydive is a prototype system designed for database visualization using a concept of the so called |
+ | data pyramid. The system is composed of three modules (DB - Database Module, D2I - | ||
+ | Data-to-Image module, and VC - Visualizaton Client). Each is designed to use a different type | ||
+ | of computer | ||
+ | data pyramids. The D2I module works with a small subset of the aggregated dataset, | ||
+ | and stores data in main memory (RAM). The VC module uses the graphic card’s capabilities to | ||
+ | perform more advanced operations – such as zooming, scaling, panning, and rotation – over the | ||
+ | graphical representation of the data. | ||
+ | Currently the system support three presentation models implemented within the Visualization | ||
+ | Component, namely: | ||
- | The Leap Motion, leapmotion.com, | + | • a 2D heat-map; |
- | ====== | + | • a 2.5 D heat-map by 3D barchart; and |
- | **Supervisor**: | + | • a 2.5 D terrain (by mesh and UV-mapping). |
- | **Required Background**: | + | The goal of the project is to implement two additional ways of data visualization as well as |
+ | extend some of existing ones, that is: | ||
- | The 3Gear system, threegear.com, lets users control a computer with their hands and fingers. This project creates a new 3D drawing system that enables users to quickly generate and modify 3D solids. | + | 1. Implement |
- | ====== Comparison | + | 2. Implement functions for visualization based on cross-product |
- | **Supervisor**: | + | 3. Add support for specular and normal maps for 2.5 D terrain presentation model. |
- | **Required Background**: C/C++ coding | + | Required Background: |
- | This project compares the Leap Motion and the 3Gear System against each other in a comparative Fitts' law study | ||
- | ====== Tilt Target Selection on Touchscreen Phones ====== | + | \\ |
+ | =====Genome-wide identification of plant micro RNAs===== | ||
- | **Supervisor**: | ||
- | **Required Background**: General 4080 prerequisites, | + | **Supervisor: Katalin Hudak** |
- | Touchscreen mobile devices commonly use a built-in accelerometer to sense movement or tilting actions of the device. | ||
- | **Readings**: | + | The Hudak Lab in the Biology Department has an opening for a fourth-year Honours student to assist with a bioinformatics project. We study the pokeweed plant, Phytolacca americana, which displays broad-spectrum virus resistance. To evaluate pokeweed gene expression, we recently sequenced the plant’s mRNA and small RNA transcriptomes under jasmonic acid (JA) treatment. JA is a plant hormone that mediates defence against pathogens and insect herbivores. We are interested in learning how pokeweed gene expression is regulated by miRNAs during biotic stress. |
+ | Working with the support of a PhD student, your project will involve: | ||
+ | |||
+ | 1) Prediction of micro RNA (miRNA) targets on the basis of complementary sequence matches | ||
+ | |||
+ | 2) Correlation of miRNA and mRNA expression changes to identify genes that are regulated by miRNAs | ||
+ | |||
+ | 3) Conducting pathway analysis to determine which biological processes are controlled by miRNAs | ||
+ | |||
+ | 4) Construction of a miRNA/ | ||
+ | This work will contribute to a scientific manuscript on miRNA-mediated gene regulation in pokeweed during response to JA. | ||
+ | |||
+ | Requirements: | ||
+ | |||
+ | 1) Pre-requisites as per EECS Calendar | ||
+ | |||
+ | 2) Facility with script-writing/ | ||
+ | |||
+ | 3) Preference for students with knowledge of statistics and familiarity with R programming | ||
+ | |||
+ | 4) Able to begin in September 2015 | ||
+ | |||
+ | Learning outcomes: | ||
+ | |||
+ | 1) Manipulate and analyze quantitative biological data | ||
+ | |||
+ | 2) Develop and test hypotheses by modifying existing software and writing new script | ||
+ | |||
+ | 3) Manage a CentOS computer server to store and facilitate ongoing research | ||
+ | |||
+ | No knowledge of biology is required. | ||
+ | |||
+ | For more information, | ||
+ | Hudak Lab website- http:// | ||
+ | |||
+ | RNA sequencing- http:// | ||
+ | |||
+ | miRNAs- http:// | ||
+ | |||
+ | \\ | ||
+ | ===Dynamic Interface Detection and Control Project=== | ||
+ | |||
+ | **Supervisor: | ||
+ | |||
+ | |||
+ | Contrary to most industries, fine chemical manufacturing is dominated by batch production methods. Increasing economic, environmental and safety pressures are motivating a turn towards continuous synthesis. Rather than making products in one big flask, continuous synthesis involves performing chemical reactions by flowing reagents through a tube. Working in this way provides more control over the reaction parameters leading to increases in product quality, and process efficiency and safety. The flow chemistry industry for fine chemical production is a relatively new but burgeoning field with a projected market capacity of billions of dollars by 2018. | ||
+ | |||
+ | Extraction of the reaction mixture for purification and/or further processing is an important step in chemical manufacturing. This is a relatively straightforward operation in batch production, but offers several challenges for flowing processes. In order to facilitate continuous liquid extraction we require a sophisticated control system. This project involves designing, constructing and evaluating a pertinent practical problem in the field. | ||
+ | |||
+ | A key step in the process takes place in a clear tube that is mounted vertically. The tube contains two fluids with a boundary between them. During the process material flows into and out of the tube from the top and the bottom. Chemical reactions take place within this tube and It is essential that the position of the boundary be monitored as its position in the tube is used to control the flow of materials into the tube. | ||
+ | |||
+ | One way of solving this problem is to float a marker at the boundary between the two liquids and to monitor this boundary using a video camera. Although this approach solves the problem, it requires the introduction of a specific float within the tube. Can we build a system that monitors the boundary without resorting to the use of an artificial float? | ||
+ | |||
+ | Specific goals of the project include: | ||
+ | |||
+ | - Develop a computer vision system that can detect and monitor the interface between two miscible fluids of different density. | ||
+ | |||
+ | - Evaluate the performance of the system over a range of different (and typical) fluids | ||
+ | |||
+ | - Explore the use of different illuminant/ | ||
+ | |||
+ | The successful candidate(s) will have the experience of working with a diverse group of scientists and engineers toward the design and implementation of an automated liquid extraction device with applications across many industries. Upon successful prototyping, | ||
+ | |||
+ | For further information please contact, | ||
+ | |||
+ | Michael Jenkin (jenkin@cse.yorku.ca) or Michal Organ (organ@yorku.ca) | ||
+ | |||
+ | \\ | ||
+ | ====== DDoS Attack using Google-bots ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Recommended Background**: | ||
+ | |||
+ | Not long ago, botnets - networks of compromised computers - were seen as | ||
+ | the most effective (if not the only) means of conducting Distributed Denial | ||
+ | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
+ | of application-layer over other types of DDoS attacks, the DDoS execution | ||
+ | landscape is becoming increasingly more diverse. An especially interesting | ||
+ | new trend is the execution of application-layer DDoS attacks by means of | ||
+ | skillfully manipulated Web-crawlers, | ||
+ | The goal of this project is to design, implement and test a real-world | ||
+ | framework consisting of the following: a) the attacker' | ||
+ | domain specially designed to attract Google-bots and then manipulate them | ||
+ | into generating attack traffic towards the target/ | ||
+ | victim' | ||
+ | component, the project will also look into the statistical/ | ||
+ | estimation of the framework' | ||
+ | to an actual (real-world) target/ | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | \\ | ||
====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ||
Line 53: | Line 153: | ||
- Implement algorithms for detecting hand-raises based upon this investigation | - Implement algorithms for detecting hand-raises based upon this investigation | ||
- Evaluate these algorithms in a real-classroom setting, using proprietary attentive sensing technology | - Evaluate these algorithms in a real-classroom setting, using proprietary attentive sensing technology | ||
+ | |||
+ | |||
+ | ====== Attentive Sensing for Sport Video Recording Markets ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Required Background**: | ||
+ | |||
+ | |||
+ | The goal of this project is to modify York University’s patented attentive sensor technology to the sport video recording market. | ||
+ | |||
+ | The general problem is to use attentive sensing technology (www.elderlab.yorku.ca) to visually detect and track multiple moving agents (e.g., skiers, riders, horses) and to select specific agents for active high-resolution smooth pursuit. | ||
+ | |||
+ | The student will work with senior graduate students, postdoctoral fellows and research scientists to help modify the attentive sensing technology to operate in these domains. | ||
+ | |||
+ | 1. | ||
+ | 2. | ||
+ | 3. | ||
+ | |||
+ | ------------ | ||
- | ====== | + | \\ |
+ | ====== | ||
- | **Supervisor**: Jeff Edmonds | + | **Supervisor:** Franck van Breugel |
- | **Required Background**: General CSE408x prerequisites | + | Description: |
+ | Java PathFinder (JPF) is a tool that can detect bugs in Java code. | ||
+ | The Java library Apache log4j allows developers to control which log | ||
+ | statements are output. | ||
+ | to detect bugs in log4j by means of JPF with very limited succes. | ||
- | **Recommended Background**: | + | Recently, in collaboration with Shafiei (NASA) we have developed |
+ | an extension of JPF called jpf-nhandler. | ||
+ | is to apply this extension to log4j. | ||
- | Structural equation modeling (SEM) is a statistical technique that is becoming increasingly popular in the educational and behavioral sciences. SEM allows researchers to test the validity of hypothesized models involving complex relationships among multiple variables. Collected data is used to estimate the parameters of the equations and assessing the fit of the model. | + | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. " |
- | The software required is an application that allows researchers to define their hypothesized models visually and will output the correct syntax for the analytical software of their choosing. | + | **Required Background: |
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
- | To date a promising functional application has been developed in JAVA by a Computer Science student as a 4080 project. The existing software allows the user to draw a path diagram and outputs code for the R package sem. There are a number of improvements to be made (refinements and additions to graphical user interface) and then the application needs to be extended to output syntax appropriate for additional software applications (openMX, MPlus and EQS). Though this project may not begin at “the first stages” of the software lifecycle, this scenario is likely common in the software development market. In addition, the student will be working with a primary “client” who is far less technically advanced, which is also reflective of real-world situations. | ||
- | More details {{: | ||
- | ====== Numerical Methods ====== | ||
- | **Supervisor**: | + | ====== Mining Software Repositories Data====== |
- | **Required Background**: Good grade in a Numerical Methods course and good knowledge | + | **Supervisor:** Zhen Ming (Jack) Jiang (zmjiang at cse dot yorku dot ca) |
- | of Fortran, C or similar language. | + | |
- | **Description**: Write, debug and run several Fortran programs related to solving | + | **Required Background:** Good programming skills in Java; Good analytical and communication skills; Knowledge in AI and statistics; Interested in large scale software analysis |
- | polynomial equations, with a view to comparing different known methods. | + | |
- | ====== Enabling SaaS access | + | **Short Description: |
- | **Supervisor**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Required Background**: | ||
- | 3402 -- Functional & Logic Programming, | ||
- | 3101 -- Design and Analysis of Algorithms, | ||
- | 4302 -- Compilers and Interpreters. | ||
- | **Description**: | ||
- | The components are various Unix executables | + | ======Model-based Design |
- | Learning objectives: | + | **Supervisor: |
- | | + | |
- | | + | |
- | | + | |
+ | **Required Background: | ||
+ | such as Arduino. | ||
- | ====== Predicting Angular Error in Rigid Registration ====== | + | **Project Description: |
- | **Supervisor**: | + | Model-based design with code generation tools can be used for simulation, rapid prototyping, |
- | **Description**: | + | \\ |
- | navigation. Several (seemingly) different approaches for predicting | + | ------------------ |
- | distance errors in registration are known, but for some surgical | + | \\ |
- | procedures, the angular error in registration is more important. | + | |
- | This project will validate an approach for predicting angular | + | |
- | error in registration; | + | |
- | simulated and actual registration data for testing purposes. | + | |
- | ====== | + | ======C2000 Concerto Microcontrollers====== |
- | **Supervisor**: Burton Ma | + | **Supervisor:** Jia Xu |
- | **Description**: Tracked pointers are the most common tools used in surgical | + | **Required Background:** At least a B+ in Embedded Systems (CSE3215), |
- | navigation systems. A typical pointer has a tracked target on one | + | strong C programming skills, solid knowledge |
- | end and a sharp or ball tip on the other end. Finding the location | + | |
- | of the tip relative to the target is a calibration problem. One | + | |
- | solution to the calibration problem involves pivoting the pointer | + | |
- | about the tip while tracking the target; if the tip is kept | + | |
- | stationary, then the target moves on the surface of a sphere. | + | |
- | Fitting the tracking data to the surface of a sphere yields the | + | |
- | location of the tip as the sphere center. Unfortunately, the | + | |
- | calibrated tip position obtained using such a spherical calibration | + | |
- | has high variance. This project will investigate how much variance | + | |
- | there is in the calibrated tip position, and methods for reducing | + | |
- | the variance | + | |
+ | **Description: | ||
+ | two cores on a single-chip with on-chip low latency interprocessor communication between the two cores: a C28x 32-bit control core for | ||
+ | real-time control with faster/more loops and small sampling window; | ||
+ | and an ARM 32-bit Cortex-M3 host core for communications and general purpose. The selected student will evaluate the capabilities of the | ||
+ | C2000 Concerto family of microcontrollers through testing and investigating open source software for real-time control applications | ||
+ | that runs on C2000 Concerto Microcontrollers. | ||
- | ====== A privacy safeguard framework for sharing photos on Facebook ====== | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Supervisor**: | + | ======Real-Time Bidding Platform====== |
- | + | ||
+ | **Supervisor:** Jia Xu | ||
+ | |||
+ | **Required Background:** At least a B+ in Operating System Fundamentals | ||
+ | (CSE3221), strong Ubuntu/ | ||
+ | |||
+ | **Description: | ||
+ | |||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | |||
+ | ======Circuit and Board Design for a Pulsed Ground Penetrating Radar====== | ||
+ | |||
+ | **Supervisor: | ||
- | **Description**: | + | **Description:** The project requires |
- | One of the major privacy concerns in Online Social Networks is photo sharing. | + | |
- | **Required | + | **Required |
- | **Desired prerequisite**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
+ | More project proposals may be added here in the first week of the winter term. | ||
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
+ | \\ |
projects.txt · Last modified: 2016/01/13 20:05 by stevenc