The project involves creating a vision based system to perform multi-camera 3D tracking of persons in an indoor environment. The implementation of this system will be using Open Vision Library (a standard library for image processing that is designed with hardware acceleration in mind) and it will be running on one or multiple processor hardware platform developed by LightHaus. LightHaus Logic is a Vancouver-based company that develops compact high-performance systems for advanced video analytics and embedded computer applications.
In order to produce ever more powerful computer chips designers have begun to produce CPUs with duplicated infrastructure and machines with multiple CPUs. This allows these devices to perform actual simultaneous calculation. The most recent generation of video game consoles are built with this manner of technology, thus adding a new dimension of complexity to the design of the underlying system. Taking a traditional computational task and dividing it for parallel execution is not trivial.
The objective of this project is to contribute a quantitative framework for analyzing potential inefficiencies of current practices at Bell Canada in the early stages of telecommunication service provisioning, particularly pre-sales and network request sub-processes. Models of these processes incorporating randomness are to be estimated from past data and utilized as a basis for efficiency improvement using both simulation and analytical optimization tools.
Sleep monitoring plays an essential role in the diagnosis of sleep disturbances. While the polysomnogram represents the gold standard, it has the disadvantage of assessing the patient’s sleep in an unfamiliar environment, usually a sleep clinic. This proposal targets the development of new computer vision-based methods for home-based sleep monitoring in partnership with Vigil Health Solutions, a company providing healthcare services and products internationally.
Optical imaging and the underlying image analysis has seen tremendous progress in recent years. Although it is now possible to perform multi-modal acquisition, the analysis frameworks for multi-modal data remain elusive. For example, the different scales and resolutions at which the images are taken require the use of mathematical techniques to deform, analyze and co-register images in a coherent framework. In parallel, J. Patera and his research group have, over the last few years, developed new Lie Algebra-based techniques to process images and perform continuous operations on them.
In their various versions (XP, 2003, Vista, Longhorn), Windows operating systems offer different cryptographic security technologies for data such as Encrypted File System and BitLocker. The capabilities of these tools depend on the presence of hardware modules for example, the Trusted Platform Module. The aim of this project is to complete a comprehensive study of the usage made of these technologies so that step-by-step tutorials can be prepared to guide users of these technological tools as per requirements.
Enquisite Software provides analytical services to corporate clients through the “mining” of data detailing how the clients’ customers interact with the clients’ Internet points-of-presence. To facilitate this work, Enquisite collects a continuous stream of client interaction data, which is stored in an Enquisite-held repository, over which Enquisite clients perform on-demand queries for business actionable knowledge.
Matching potential employees to employment opportunities is a challenging task, which has significant commercial value. Employment agencies, departments in companies concerned with human resources and small company owners frequently have to read, or process, numerous resumes before identifying a short list of candidates. Working with Talent Technology, a developer of recruitment and hiring software and component technology, the intern will develop solutions in several areas of automated resume processing.
Enquisite Software provides analytical services to corporate clients through the “mining” of data detailing how client customers interact with the clients’ Internet-point of presence. To facilitate this work, Enquisite actively collects a continuous stream of client interaction data which is stored in its repository, on which Enquisite clients perform on-demand queries for business actionable knowledge.
The goal of this project is to develop a new set of procedures and tools for testing the security of running software systems using a technique based on the concept of monitor. Monitors are systems which observe and analyze the behavior of a second system. The monitor will be designed as an external system that uses software “hooks” in the existing system to insert and extract information. This framework will allow the checking of assertions and the reporting of exceptions.