projects
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
projects [2013/09/03 15:11] – pd | projects [2015/08/11 15:25] – jarek | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== Proposed Projects | + | ====== Proposed Projects |
+ | \\ | ||
+ | |||
+ | ===Dynamic Interface Detection and Control Project=== | ||
+ | |||
+ | **Supervisor: | ||
+ | |||
+ | |||
+ | Contrary to most industries, fine chemical manufacturing is dominated by batch production methods. Increasing economic, environmental and safety pressures are motivating a turn towards continuous synthesis. Rather than making products in one big flask, continuous synthesis involves performing chemical reactions by flowing reagents through a tube. Working in this way provides more control over the reaction parameters leading to increases in product quality, and process efficiency and safety. The flow chemistry industry for fine chemical production is a relatively new but burgeoning field with a projected market capacity of billions of dollars by 2018. | ||
+ | |||
+ | Extraction of the reaction mixture for purification and/or further processing is an important step in chemical manufacturing. This is a relatively straightforward operation in batch production, but offers several challenges for flowing processes. In order to facilitate continuous liquid extraction we require a sophisticated control system. This project involves designing, constructing and evaluating a pertinent practical problem in the field. | ||
+ | |||
+ | A key step in the process takes place in a clear tube that is mounted vertically. The tube contains two fluids with a boundary between them. During the process material flows into and out of the tube from the top and the bottom. Chemical reactions take place within this tube and It is essential that the position of the boundary be monitored as its position in the tube is used to control the flow of materials into the tube. | ||
+ | |||
+ | One way of solving this problem is to float a marker at the boundary between the two liquids and to monitor this boundary using a video camera. Although this approach solves the problem, it requires the introduction of a specific float within the tube. Can we build a system that monitors the boundary without resorting to the use of an artificial float? | ||
+ | |||
+ | Specific goals of the project include: | ||
+ | |||
+ | - Develop a computer vision system that can detect and monitor the interface between two miscible fluids of different density. | ||
+ | |||
+ | - Evaluate the performance of the system over a range of different (and typical) fluids | ||
+ | |||
+ | - Explore the use of different illuminant/ | ||
+ | |||
+ | The successful candidate(s) will have the experience of working with a diverse group of scientists and engineers toward the design and implementation of an automated liquid extraction device with applications across many industries. Upon successful prototyping, | ||
+ | |||
+ | For further information please contact, | ||
+ | |||
+ | Michael Jenkin (jenkin@cse.yorku.ca) or Michal Organ (organ@yorku.ca) | ||
+ | |||
+ | \\ | ||
+ | ====== DDoS Attack using Google-bots ====== | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Recommended Background**: | ||
+ | |||
+ | Not long ago, botnets - networks of compromised computers - were seen as | ||
+ | the most effective (if not the only) means of conducting Distributed Denial | ||
+ | of Service (DDoS) attacks. However, with the growing popularity and prevalence | ||
+ | of application-layer over other types of DDoS attacks, the DDoS execution | ||
+ | landscape is becoming increasingly more diverse. An especially interesting | ||
+ | new trend is the execution of application-layer DDoS attacks by means of | ||
+ | skillfully manipulated Web-crawlers, | ||
+ | The goal of this project is to design, implement and test a real-world | ||
+ | framework consisting of the following: a) the attacker' | ||
+ | domain specially designed to attract Google-bots and then manipulate them | ||
+ | into generating attack traffic towards the target/ | ||
+ | victim' | ||
+ | component, the project will also look into the statistical/ | ||
+ | estimation of the framework' | ||
+ | to an actual (real-world) target/ | ||
+ | |||
+ | |||
- | Current proposed Projects, Fall 2013 | ||
\\ | \\ | ||
====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ====== Attentive Sensing for Better Two-Way Communication in Remote Learning Environments ====== | ||
Line 41: | Line 94: | ||
- | =====Hunting for Bugs in Logging: applying JPF to log4j===== | + | \\ |
+ | ====== Hunting for Bugs in Logging: applying JPF to log4j ====== | ||
**Supervisor: | **Supervisor: | ||
Line 55: | Line 109: | ||
is to apply this extension to log4j. | is to apply this extension to log4j. | ||
- | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, | + | [1] David A. Dickey, B. Sinem Dorter, J. Michael German, Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. |
- | Benjamin D. Madore, Mark W. Piper, Gabriel L. Zenarosa. | + | |
- | Evaluating Java PathFinder on Log4J. | + | |
**Required Background: | **Required Background: | ||
\\ | \\ | ||
- | \\ | + | ------------ |
- | ------------------ | + | |
- | \\ | + | |
- | Additional current possible | + | |
- | \\ | + | |
- | ------------------ | + | |
- | \\ | + | |
\\ | \\ | ||
- | =====Previous Projects from Summer 2013===== | ||
- | ======Tracking and Activity Recognition Through Consensus in Distributed Camera Networks====== | ||
- | **Supervisor**: | ||
- | **Required Background: ** Computer Vision or Signal and Systems Course preferred; Matlab; Interest in Signal/ | ||
- | **Short Description: | ||
+ | ====== Mining Software Repositories Data====== | ||
+ | **Supervisor: | ||
- | [1] A. Mohammadi and A. Asif, Distributed Particle Filter Implementation with Intermittent/ | + | **Required Background:** Good programming skills in Java; Good analytical and communication skills; Knowledge in AI and statistics; Interested in large scale software analysis |
- | [2] A. Mohammadi and A. Asif, Decentralized Sensor Selection based on the Distributed Posterior Cramer-Rao Lower Bound, in proceedings of IEEE International Conference on Information Fusion, Singapore, 2012. pp. 1668-1675. | + | **Short Description: |
- | ====== 3D Drawing System with Leap Motion finger tracker ====== | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Supervisor**: | + | ======Reliably tracking horizontal eye movements====== |
- | **Required Background**: 3D computer graphics, C/C++ coding | + | **Supervisor:** Wolfgang Stuerzlinger |
- | The Leap Motion, leapmotion.com, is a new device that lets users control a computer with their fingers. This project creates a new 3D drawing system that enables users to quickly generate 3D solids. | + | **Required Background: |
- | ====== 3D Drawing System | + | **Description: |
- | **Supervisor**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Required Background**: | + | ======Model-based Design and Development of Embedded Systems with Code Generation Tools====== |
- | The 3Gear system, threegear.com, | + | **Supervisor: |
+ | **Required Background: | ||
+ | such as Arduino. | ||
+ | **Project Description: | ||
- | ====== Tilt Target Selection | + | Model-based design with code generation tools can be used for simulation, rapid prototyping, |
- | **Supervisor**: | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Required Background**: | + | ======C2000 Concerto Microcontrollers====== |
- | Touchscreen mobile devices commonly use a built-in accelerometer to sense movement or tilting actions of the device. | + | **Supervisor: |
- | **Readings**: MacKenzie, I. S., & Teather, R. J. (2012). FittsTilt: The application | + | **Required Background:** At least a B+ in Embedded Systems (CSE3215), |
+ | strong C programming skills, solid knowledge | ||
+ | **Description: | ||
+ | two cores on a single-chip with on-chip low latency interprocessor communication between the two cores: a C28x 32-bit control core for | ||
+ | real-time control with faster/more loops and small sampling window; | ||
+ | and an ARM 32-bit Cortex-M3 host core for communications and general purpose. The selected student will evaluate the capabilities of the | ||
+ | C2000 Concerto family of microcontrollers through testing and investigating open source software for real-time control applications | ||
+ | that runs on C2000 Concerto Microcontrollers. | ||
- | ====== Continuation of a Path Diagram to Syntax Application ====== | + | \\ |
+ | ------------------ | ||
+ | \\ | ||
- | **Supervisor**: | + | ======Real-Time Bidding Platform====== |
- | **Required Background**: General CSE408x prerequisites | + | **Supervisor:** Jia Xu |
- | **Recommended | + | **Required |
+ | (CSE3221), strong Ubuntu/ | ||
- | Structural equation modeling | + | **Description: |
- | The software required is an application that allows researchers to define their hypothesized models visually and will output the correct syntax for the analytical software of their choosing. | + | \\ |
- | + | ------------------ | |
- | To date a promising functional application has been developed in JAVA by a Computer Science student as a 4080 project. The existing software allows the user to draw a path diagram and outputs code for the R package sem. There are a number of improvements to be made (refinements and additions to graphical user interface) and then the application needs to be extended to output syntax appropriate for additional software applications (openMX, MPlus and EQS). Though this project may not begin at “the first stages” of the software lifecycle, this scenario is likely common in the software development market. In addition, the student will be working with a primary “client” who is far less technically advanced, which is also reflective of real-world situations. | + | \\ |
- | + | ||
- | More details {{: | + | |
- | + | ||
- | + | ||
- | + | ||
- | ====== Enabling SaaS access to an experimental AI planner ====== | + | |
- | **Supervisor**: | + | ======Circuit and Board Design for a Pulsed Ground Penetrating Radar====== |
- | **Required Background**: Good knowledge of Unix tools / Python, Perl or Awk. Comfort with algorithms and programming. Essential: 2031 -- Software Tools. Desired: | + | **Supervisor:**Sebastian Magierowski |
- | 3402 -- Functional & Logic Programming, | + | |
- | 3101 -- Design and Analysis of Algorithms, | + | |
- | 4302 -- Compilers and Interpreters. | + | |
- | **Description**: This project | + | **Description:** The project |
- | The components are various Unix executables and LISP programs that need to interact | + | **Required Background** A background |
- | Learning objectives: | + | \\ |
- | * Understand the technologies and process involved in turning native code into a web-service (" | + | ------------------ |
- | * Study a state-of-the-art AI planner and understand its workings. | + | \\ |
- | * Exercise scripting skills. | + | More project |
- | + | \\ | |
- | + | ------------------ | |
- | ====== Predicting Angular Error in Rigid Registration ====== | + | \\ |
- | + | \\ | |
- | **Supervisor**: | + | |
- | + | ||
- | **Description**: | + | |
- | navigation. Several (seemingly) different approaches for predicting | + | |
- | distance errors in registration are known, but for some surgical | + | |
- | procedures, the angular error in registration is more important. | + | |
- | This project | + | |
- | error in registration; | + | |
- | simulated and actual registration data for testing purposes. | + | |
- | + | ||
- | ====== Calibration of a Tracked Pointer ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | **Description**: | + | |
- | navigation systems. A typical pointer has a tracked target on one | + | |
- | end and a sharp or ball tip on the other end. Finding the location | + | |
- | of the tip relative to the target is a calibration problem. One | + | |
- | solution to the calibration problem involves pivoting the pointer | + | |
- | about the tip while tracking the target; if the tip is kept | + | |
- | stationary, then the target moves on the surface of a sphere. | + | |
- | Fitting the tracking data to the surface of a sphere yields the | + | |
- | location of the tip as the sphere center. Unfortunately, | + | |
- | calibrated tip position obtained using such a spherical calibration | + | |
- | has high variance. This project will investigate how much variance | + | |
- | there is in the calibrated tip position, and methods for reducing | + | |
- | the variance of the calibrated tip position. | + | |
- | + | ||
- | + | ||
- | ====== A privacy safeguard framework for sharing photos on Facebook ====== | + | |
- | + | ||
- | **Supervisor**: | + | |
- | + | ||
- | + | ||
- | **Description**: | + | |
- | One of the major privacy concerns in Online Social Networks is photo sharing. | + | |
- | + | ||
- | **Required prerequisite background**: | + | |
- | + | ||
- | **Desired prerequisite**: | + |
projects.txt · Last modified: 2016/01/13 20:05 by stevenc