User Tools

Site Tools


ongoing

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
ongoing [2011/05/30 17:17] bilongoing [2016/12/07 15:27] (current) roumani
Line 1: Line 1:
-====== Ongoing projects ======+====== Previous projects ====== 
 + 
 + 
 +====== Comparison of Finger Tracking systems ====== 
 + 
 +**Student**:   
 + 
 +**Supervisor**: Wolfgang Stuerzlinger 
 + 
 +**Required Background**: C/C++ coding 
 + 
 +__Description__ 
 +This project compares the Leap Motion and the 3Gear System against each other in a comparative Fitts' law study 
 + 
 + 
 +__Completed__ 
 +Winter, 2013
  
 ====== Imputation of missing values in microarray data ====== ====== Imputation of missing values in microarray data ======
Line 9: Line 25:
 __Description__ __Description__
  
-    Microarrays are a relatively new technology that have had tremendous impact +Microarrays are a relatively new technology that have had tremendous 
-    on many areas within biology and bioinformatics.  Microarray technology +impact on many areas within biology and bioinformatics.  Microarray 
-    enables researchers to study the behaviour of many genes and/or conditions +technology enables researchers to study the behaviour of many genes 
-    in a single experiment+and/or conditions in a single experiment.
- +
-    Due to technological limitations and experiment design issues, microarray +
-    data sets typically have several missing values.  It has been shown [3] that +
-    imputation of these values improves the accuracy of different processing +
-    tasks, including clustering, that are typically done on these data sets. +
-    Therefore, good imputation algorithms are required.+
  
-    In this projectwe will explore fast and accurate imputation algorithms for +Due to technological limitations and experiment design issues
-    microarray data.  The student will first read the papers assigned and write +microarray data sets typically have several missing values.  It has been 
-    a short summary of them.  Then, he will study the performance a few +shown that imputation of these values improves the accuracy of 
-    algorithms from the literature (many algorithms are already implemented but +different processing tasks, including clustering, that are typically 
-    1 - 2 may need to be implemented).  Finallyhe will work with the +done on these data sets.  Thereforegood imputation algorithms are 
-    supervisor on the design of better algorithms for the problem being +required.
-    studied.  He will use publicly available data sets to compare the +
-    performance (accuracy and speed) of the new algorithm(s) to the GMCImpute +
-    algorithm and several other existing ones.+
  
-    Throughout the course, the student is required to maintain course website +In this project, we will explore fast and accurate imputation algorithms 
-    to report any progress and details about the project.+for microarray data.  The student will first read the papers assigned 
 +and write a short summary of them.  Thenhe will study the performance 
 +few algorithms from the literature (many algorithms are already 
 +implemented but 1 - 2 may need to be implemented).  Finally, he will 
 +work with the supervisor on the design of better algorithms for the 
 +problem being studied.  He will use publicly available data sets to 
 +compare the performance (accuracy and speed) of the new algorithm(s) to 
 +the GMCImpute algorithm and several other existing ones.
  
 +Throughout the course, the student is required to maintain a course
 +website to report any progress and details about the project.
  
 ====== An Open Source Structural Equation Modeling Graph Drawing Application ====== ====== An Open Source Structural Equation Modeling Graph Drawing Application ======
Line 42: Line 58:
 __Description__ __Description__
  
-Structural equation modeling (SEM) is a statistical technique that is becoming increasingly popular in the sciences. SEM allows researchers to test the validity of hypothesized models involving complex relationships among multiple variables. These models can include latent variables, which are not measured directly but are constructs inferred by observed variables. Structural equation models can be represented visually by graphs (Figure 1 - attached) To generate figure 1 currently in R would require over 80 lines of code which has no reusability and has to be re written each time a new graph has to be developed or analyzed (R is a UNIX based command line only program, however it is a very powerful analytic research tool).+Structural equation modeling (SEM) is a statistical technique that is becoming increasingly popular in the sciences. SEM allows researchers to test the validity of hypothesized models involving complex relationships among multiple variables. These models can include latent variables, which are not measured directly but are constructs inferred by observed variables. Structural equation models can be represented visually by graphs. To generate such graphs currently in R would require over 80 lines of code which has no reusability and has to be re written each time a new graph has to be developed or analyzed (R is a UNIX based command line only program, however it is a very powerful analytic research tool).
  
 Collected data is used to estimate the parameters of the equations and assessing the fit of the model. There are several SEM software options available to researchers, however all have serious limitations (Windows only, Unix only, expensive licensing fees, text based or command line only, no GUI, etc). Collected data is used to estimate the parameters of the equations and assessing the fit of the model. There are several SEM software options available to researchers, however all have serious limitations (Windows only, Unix only, expensive licensing fees, text based or command line only, no GUI, etc).
Line 121: Line 137:
 http://www.cse.yorku.ca/museum/collections/MIL/MIL.htm http://www.cse.yorku.ca/museum/collections/MIL/MIL.htm
  
 +====== Quantum Cryptography ======
 +
 +**Student**:  Abdulaziz Busbate 
 +
 +**Supervisor**:  Hamzeh Roumani
 +
 +__Description__
 +
 +Quantum mechanics makes it impossible (not just infeasible) to passively eavesdrop on a communication channel. Quantum channels are thus ideal for secret key distribution, and a protocol named BB84-Cascade has been devised to manage the transmission and correct channel errors.
  
 +Determining the block size in this protocol is critical due to its exponential effect on information leaked to an eavesdropper. If the block size is too small, too much information is leaked, and if it is too large, not enough bits will be shared.
 + 
 +The purpose of this project is to simulate the protocol in a Java program and then run the simulation for a variety of error rates and block sizes while monitoring the leakage. This will allow us to determine the optimal block size for the BB84 Quantum Key Distribution Protocol.
ongoing.1306775831.txt.gz · Last modified: 2011/05/30 17:17 by bil

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki