ongoing
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ongoing [2011/05/30 17:18] – bil | ongoing [2017/04/24 20:50] (current) – dymond | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
+ | |||
+ | ======Distributed leader election for simple robots====== | ||
+ | **Supervisors**: | ||
+ | |||
+ | **Project**: | ||
+ | Utilizing the concept of an infection algorithm — a process much like the spread of a disease in which agents infect each other with | ||
+ | information — it is possible to develop a probabilistic approach to this kind of leader election problem. Solutions to this type of problem finds wide application in distributed computing, and in particular distributed computing of autonomous agents and sensors which must compute information about control structures with limited information about the presence/ | ||
+ | |||
+ | To make this project more specific, and given the limited time available for an undergraduate student project, this project will explore certain properties of leader election algorithms, both with real and simulated | ||
+ | If time permits, the project will also study possible | ||
+ | |||
+ | **Required skills**: knowledge of Java or Python. Interest in algorithms for a distributed collection of simple robot agents. Completion of 3rd year courses in computer science or computer engineering. | ||
+ | |||
+ | |||
+ | ======Asynchronicity in infection algorithms====== | ||
+ | |||
+ | **Supervisors**: | ||
+ | |||
+ | **Project**: | ||
+ | |||
+ | Infection algorithms are a class of algorithms within which individual agents exchange information via infection. That is, the algorithm proceeds by the various agents transmitting (infecting) each other with information. Under an assumption of synchronization — that is, a model in which no two agents can infect each other at precisely the same time — it is possible to derive models of expected time until all agents have been infected. But how does this algorithm adapt when agents can actually infect each other simultaneously? | ||
+ | |||
+ | **Required skills**: knowledge of Java or Python. Interest in algorithms for a distributed collection of simple robot agents. Completion of 3rd year courses in computer science or computer engineering. | ||
+ | |||
+ | \\ | ||
+ | ======Simultaneous localization and mapping (SLAM) aided by a single unique directional landmark====== | ||
+ | |||
+ | **Supervisors**: | ||
+ | |||
+ | **Project**: | ||
+ | |||
+ | SLAM algorithms have been developed for a large number of different environments, | ||
+ | |||
+ | **Required skills**: knowledge of Java or Python. Interest in algorithms for robots. Completion of 3rd year courses in computer science or computer engineering. | ||
+ | |||
+ | ====== Comparison of Finger Tracking systems ====== | ||
+ | |||
+ | **Student**: | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | **Required Background**: | ||
+ | |||
+ | __Description__ | ||
+ | This project compares the Leap Motion and the 3Gear System against each other in a comparative Fitts' law study | ||
+ | |||
+ | |||
+ | __Completed__ | ||
+ | Winter, 2013 | ||
====== Imputation of missing values in microarray data ====== | ====== Imputation of missing values in microarray data ====== | ||
Line 42: | Line 91: | ||
__Description__ | __Description__ | ||
- | Structural equation modeling (SEM) is a statistical technique that is becoming increasingly popular in the sciences. SEM allows researchers to test the validity of hypothesized models involving complex relationships among multiple variables. These models can include latent variables, which are not measured directly but are constructs inferred by observed variables. Structural equation models can be represented visually by graphs | + | Structural equation modeling (SEM) is a statistical technique that is becoming increasingly popular in the sciences. SEM allows researchers to test the validity of hypothesized models involving complex relationships among multiple variables. These models can include latent variables, which are not measured directly but are constructs inferred by observed variables. Structural equation models can be represented visually by graphs. To generate |
Collected data is used to estimate the parameters of the equations and assessing the fit of the model. There are several SEM software options available to researchers, | Collected data is used to estimate the parameters of the equations and assessing the fit of the model. There are several SEM software options available to researchers, | ||
Line 121: | Line 170: | ||
http:// | http:// | ||
+ | ====== Quantum Cryptography ====== | ||
+ | |||
+ | **Student**: | ||
+ | |||
+ | **Supervisor**: | ||
+ | |||
+ | __Description__ | ||
+ | |||
+ | Quantum mechanics makes it impossible (not just infeasible) to passively eavesdrop on a communication channel. Quantum channels are thus ideal for secret key distribution, | ||
+ | Determining the block size in this protocol is critical due to its exponential effect on information leaked to an eavesdropper. If the block size is too small, too much information is leaked, and if it is too large, not enough bits will be shared. | ||
+ | |||
+ | The purpose of this project is to simulate the protocol in a Java program and then run the simulation for a variety of error rates and block sizes while monitoring the leakage. This will allow us to determine the optimal block size for the BB84 Quantum Key Distribution Protocol. |
ongoing.1306775922.txt.gz · Last modified: 2011/05/30 17:18 by bil