projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
projects [2013/08/23 02:03] – pd | projects [2015/08/11 15:24] – jarek | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Proposed Projects | + | ====== Proposed Projects |
+ | \\ | ||
+ | |||
+ | ===Dynamic Interface Detection and Control Project=== | ||
+ | |||
+ | **Supervisor: | ||
+ | |||
+ | |||
+ | Contrary to most industries, fine chemical manufacturing is dominated by batch production methods. Increasing economic, environmental and safety pressures are motivating a turn towards continuous synthesis. Rather than making products in one big flask, continuous synthesis involves performing chemical reactions by flowing reagents through a tube. Working in this way provides more control over the reaction parameters leading to increases in product quality, and process efficiency and safety. The flow chemistry industry for fine chemical production is a relatively new but burgeoning field with a projected market capacity of billions of dollars by 2018. | ||
+ | |||
+ | Extraction of the reaction mixture for purification and/or further processing is an important step in chemical manufacturing. This is a relatively straightforward operation in batch production, but offers several challenges for flowing processes. In order to facilitate continuous liquid extraction we require a sophisticated control system. This project involves designing, constructing and evaluating a pertinent practical problem in the field. | ||
+ | |||
+ | A key step in the process takes place in a clear tube that is mounted vertically. The tube contains two fluids with a boundary between them. During the process material flows into and out of the tube from the top and the bottom. Chemical reactions take place within this tube and It is essential that the position of the boundary be monitored as its position in the tube is used to control the flow of materials into the tube. | ||
+ | |||
+ | One way of solving this problem is to float a marker at the boundary between the two liquids and to monitor this boundary using a video camera. Although this approach solves the problem, it requires the introduction of a specific float within the tube. Can we build a system that monitors the boundary without resorting to the use of an artificial float? | ||
+ | |||
+ | Specific goals of the project include: | ||
+ | |||
+ | - Develop a computer vision system that can detect and monitor the interface between two miscible fluids of different density. | ||
+ | |||
+ | - Evaluate the performance of the system over a range of different (and typical) fluids | ||
+ | |||
+ | - Explore the use of different illuminant/ | ||
+ | |||
+ | The successful candidate(s) will have the experience of working with a diverse group of scientists and engineers toward the design and implementation of an automated liquid extraction device with applications across many industries. Upon successful prototyping, | ||
+ | |||
+ | For further information please contact, | ||
+ | |||
+ | Michael Jenkin (jenkin@cse.yorku.ca) or Michal Organ (organ@yorku.ca) | ||
+ | |||
+ | \\ | ||
+ | ====== DDoS Attack using Google-bots ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Recommended Background**: | ||
+ | |||
+ | Not long ago, botnets - networks of compromised computers - were seen as | ||
+ | the most effective (if not the only) means of conducting Distributed Denial | ||
+ | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
+ | of application-layer over other types of DDoS attacks, the DDoS execution | ||
+ | landscape is becoming increasingly more diverse. An especially interesting | ||
+ | new trend is the execution of application-layer DDoS attacks by means of | ||
+ | skillfully manipulated Web-crawlers, | ||
+ | The goal of this project is to design, implement and test a real-world | ||
+ | framework consisting of the following: a) the attacker' | ||
+ | domain specially designed to attract Google-bots and then manipulate them | ||
+ | into generating attack traffic towards the target/ | ||
+ | victim' | ||
+ | component, the project will also look into the statistical/ | ||
+ | estimation of the framework' | ||
+ | to an actual (real-world) target/ | ||
+ | |||
+ | |||
- | Current proposed Projects, Fall 2013 | ||
\\ | \\ | ||
====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ||
Line 38: | Line 91: | ||
3. | 3. | ||
+ | ------------ | ||
+ | |||
\\ | \\ | ||
- | \\ | + | ====== Hunting for Bugs in Logging: applying JPF to log4j ====== |
- | ------------------ | + | |
- | \\ | + | |
- | Additional current possible | + | |
- | \\ | + | |
- | ------------------ | + | |
- | \\ | + | |
- | \\ | + | |
- | =====Previous Projects from Summer 2013===== | + | |
- | ======Tracking and Activity Recognition Through Consensus in Distributed Camera Networks====== | + | **Supervisor: |
- | **Supervisor**: Amir Asif | + | Description: |
+ | Java PathFinder (JPF) is a tool that can detect bugs in Java code. | ||
+ | The Java library Apache log4j allows developers to control which log | ||
+ | statements are output. | ||
+ | to detect bugs in log4j by means of JPF with very limited succes. | ||
- | **Required Background: ** Computer Vision or Signal and Systems Course preferred; Matlab; Interest | + | Recently, |
+ | an extension of JPF called jpf-nhandler. | ||
+ | is to apply this extension to log4j. | ||
- | **Short Description: | + | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. " |
+ | **Required Background: | ||
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
- | [1] A. Mohammadi and A. Asif, Distributed Particle Filter Implementation with Intermittent/ | + | ====== Immersive Virtual Reality Kitchen Planner ====== |
- | [2] A. Mohammadi and A. Asif, Decentralized Sensor Selection based on the Distributed Posterior Cramer-Rao Lower Bound, in proceedings of IEEE International Conference on Information Fusion, Singapore, 2012. pp. 1668-1675. | + | **Supervisor: |
- | ====== | + | **Required Background: |
- | **Supervisor**: | + | This project implements a kitchen planner application for an immersive virtual reality system. The implementation will be based on Unity 4. |
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
+ | ======3D Interaction in Immersive Virtual Reality====== | ||
- | **Required Background**: 3D computer graphics, C/C++ coding | + | **Supervisor:** Wolfgang Stuerzlinger |
- | The Leap Motion, leapmotion.com, | + | **Required Background: |
- | ====== | + | This project implements and tests various |
+ | \\ | ||
+ | ------------ | ||
+ | \\ | ||
- | **Supervisor**: | ||
- | **Required Background**: | + | ====== Mining Software Repositories Data====== |
- | The 3Gear system, threegear.com, | + | **Supervisor: |
+ | **Required Background: | ||
+ | **Short Description: | ||
- | ====== Tilt Target Selection on Touchscreen Phones ====== | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Supervisor**: | + | ======Reliably tracking horizontal eye movements====== |
- | **Required Background**: General 4080 prerequisites, | + | **Supervisor:** Wolfgang Stuerzlinger |
- | Touchscreen mobile devices commonly use a built-in accelerometer to sense movement or tilting actions of the device. Tilt is commonly used the change the orientation of the display between portrait and landscape. | + | **Required Background: |
- | **Readings**: MacKenzie, I. S., & Teather, R. J. (2012). FittsTilt: The application of Fitts’ law to tilt-based interaction. Proceedings | + | **Description: |
+ | \\ | ||
+ | ------------------ | ||
+ | \\ | ||
- | ====== | + | ======Model-based Design and Development |
- | **Supervisor**: Jeff Edmonds | + | **Supervisor:** Jia Xu |
- | **Required Background**: General CSE408x prerequisites | + | **Required Background:** At least a B+ in Embedded Systems (CSE3215), MATLAB, C programming skills, solid experience in using a microcontroller |
+ | such as Arduino. | ||
- | **Recommended Background**: Java software development | + | **Project Description: |
- | Structural equation modeling (SEM) is a statistical technique that is becoming increasingly popular | + | Model-based design with code generation tools can be used for simulation, rapid prototyping, |
- | The software required is an application that allows researchers to define their hypothesized models visually and will output the correct syntax for the analytical software of their choosing. | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | To date a promising functional application has been developed in JAVA by a Computer Science student as a 4080 project. The existing software allows the user to draw a path diagram and outputs code for the R package sem. There are a number of improvements to be made (refinements and additions to graphical user interface) and then the application needs to be extended to output syntax appropriate for additional software applications (openMX, MPlus and EQS). Though this project may not begin at “the first stages” of the software lifecycle, this scenario is likely common in the software development market. In addition, the student will be working with a primary “client” who is far less technically advanced, which is also reflective of real-world situations. | + | ======C2000 Concerto Microcontrollers====== |
- | More details {{:continuation_of_a_path_diagram_to_syntax_application.pdf|here}}. | + | **Supervisor:** Jia Xu |
+ | **Required Background: | ||
+ | strong C programming skills, solid knowledge of microcontrollers | ||
+ | **Description: | ||
+ | two cores on a single-chip with on-chip low latency interprocessor communication between the two cores: a C28x 32-bit control core for | ||
+ | real-time control with faster/more loops and small sampling window; | ||
+ | and an ARM 32-bit Cortex-M3 host core for communications and general purpose. The selected student will evaluate the capabilities of the | ||
+ | C2000 Concerto family of microcontrollers through testing and investigating open source software for real-time control applications | ||
+ | that runs on C2000 Concerto Microcontrollers. | ||
- | ====== Enabling SaaS access to an experimental AI planner ====== | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Supervisor**: | + | ======Real-Time Bidding Platform====== |
- | **Required Background**: Good knowledge of Unix tools / Python, Perl or Awk. Comfort with algorithms and programming. Essential: 2031 -- Software Tools. Desired: | + | **Supervisor:** Jia Xu |
- | 3402 -- Functional & Logic Programming, | + | |
- | 3101 -- Design and Analysis of Algorithms, | + | |
- | 4302 -- Compilers and Interpreters. | + | |
- | **Description**: This project involves enriching and integrating | + | **Required Background:** At least a B+ in Operating System Fundamentals |
+ | (CSE3221), strong Ubuntu/ | ||
- | The components are various Unix executables | + | **Description: |
- | Learning objectives: | + | \\ |
- | * Understand the technologies and process involved in turning native code into a web-service (" | + | ------------------ |
- | * Study a state-of-the-art AI planner and understand its workings. | + | \\ |
- | * Exercise scripting skills. | + | |
+ | ======Circuit and Board Design for a Pulsed Ground Penetrating Radar====== | ||
- | ====== Predicting Angular Error in Rigid Registration ====== | + | **Supervisor: |
- | **Supervisor**: Burton Ma | + | **Description: |
- | **Description**: Registration is a fundamental step in image-based surgical | + | **Required Background** A background |
- | navigation. Several (seemingly) different approaches for predicting | + | |
- | distance errors in registration are known, but for some surgical | + | |
- | procedures, the angular error in registration is more important. | + | |
- | This project | + | |
- | error in registration; | + | |
- | simulated and actual registration data for testing purposes. | + | |
- | ====== Calibration of a Tracked Pointer ====== | + | \\ |
- | + | ------------------ | |
- | **Supervisor**: | + | \\ |
- | + | More project | |
- | **Description**: | + | \\ |
- | navigation systems. A typical pointer has a tracked target on one | + | ------------------ |
- | end and a sharp or ball tip on the other end. Finding the location | + | \\ |
- | of the tip relative to the target is a calibration problem. One | + | \\ |
- | solution to the calibration problem involves pivoting the pointer | + | |
- | about the tip while tracking the target; if the tip is kept | + | |
- | stationary, then the target moves on the surface of a sphere. | + | |
- | Fitting the tracking data to the surface of a sphere yields the | + | |
- | location of the tip as the sphere center. Unfortunately, | + | |
- | calibrated tip position obtained using such a spherical calibration | + | |
- | has high variance. This project | + | |
- | there is in the calibrated tip position, and methods for reducing | + | |
- | the variance | + | |
- | + | ||
- | + | ||
- | ====== A privacy safeguard framework for sharing photos on Facebook ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | + | ||
- | **Description**: | + | |
- | One of the major privacy concerns in Online Social Networks is photo sharing. | + | |
- | + | ||
- | **Required prerequisite background**: | + | |
- | + | ||
- | **Desired prerequisite**: | + |
projects.txt · Last modified: 2016/01/13 20:05 by stevenc