Implementation of Computer Vision algorithms on embedded platforms

Embedded systems are small low-power computing units designed for specific applications, often with real-time constraints. These systems can be found in cell-phones, portable video games, automobiles, home appliances, digital cameras where they perform specific tasks. The objective of this research is to participate to the development of the embedded software algorithms and tools that will facilitate the embedding of new software solutions to the Synopsys embedded vision system.

Multi-Mode Linear Wireless Sensor Networks: Design, Implementation and Evaluation

In this project, we will design a set of communication protocols dedicated for linear wireless sensor networks, which have promising applications in the real world for environment and infrastructure monitoring. The protocols will be implemented and evaluated by using the multimode, enhanced wireless senor nodes developed in the host academic supervisor's lab.

"Formalisation d’arguments de sécurité

S’inscrivant dans la continuité du premier stage, ce projet vise à unifier les langages de description de structures argumentatives GSN et TCL et à adapter la théorie de Dempster-Shafer au langage unifié. Cette théorie est la plus adéquate pour intégrer à une structure argumentative les évaluations de ses noeuds. Notre objectif est d’arriver à déterminer de bonnes règles servant à propager avec précision les évaluations des noeuds enfants vers le noeud racine.

Social Media Audience Analytics Tool

Social media websites (e.g. Facebook, Twitter, etc.) are widely used by the general public and also by businesses to promote their product and services. Due to the nature of these websites, marketed content by businesses does not always reach their desired target. This can be improved by providing useful information to the businesses, such as the times their audience is using social media or their most active users. This information is not readily available, but can be derived by analyzing the available data on social media websites.

A Risk-Based Continuous Authentication Engine Using a Probabilistic Model around Behavioral Biometrics

Traditional static authentication systems have a fundamental deficiency; it assumes the presence of the validated user through the length of the session. Continuous authentication algorithms periodically validate the identity of a user during the entire session. It relies on information that can be automatically extracted from the user such as biometrics and behavior patterns. A probabilistic approach can naturally model the noise and latent variables present in the data. The probabilistic output of such models is a confidence value.

Detecting Trends in Conversations using Natural Language Processing and Visualization

At WorkSafeBC, an overwhelming amount of data is being produced, particularly in conversation logs between people who have an active claim with WorkSafeBC and various practitioners with whom they have regular contact (usually over the phone). These records are transcribed into text and the information is far beyond what any analyst could possibly read and understand without the help of analysis and visualization tools.

Understanding Statistics through Physically Manipulating Data

The rise of Big Data, social networking, and mobile interactions coupled with an accelerating increase in the amount of structured and unstructured information enabled by cloud based technologies is forcing organizations to focus on information that is most relevant, value-generating, and risk-related. Problems arise when we make decisions based on good enough metrics (e.g. means) instead of proper statistical methods (e.g. T-tests, ANOVA). The issue is that everyday business workers need to understand statistics in a cloud centered world.

Energy Disaggregation over Large-Scale Appliances

Energy Disaggregation is to find the energy consumption of individual appliances from only a single measure of household electricity consumption. Accurate energy disaggregation helps identify major energy guzzlers in the house and motivates users to take proper actions for energy saving. To pursue aneasy-to-use and scalable solution to energy disaggregation for contemporary large-scale appliances, we have proposed a solution of semi-intrusive appliance load monitoring (SfALM).

Quality engineering method for certified open source software based on product line practice

The goal of the project is to help the industrial partner with evaluating, customizing and adopting advanced software engineering and quality assurance methods based on the notion of software product line (SPL) engineering practices. The software system considered in this project is an electronic medical record (EMR) system that is used in hundreds of clinics in Canada (OSCAR). EMRs are safety-critical as well as security-sensitive. Therefore, it is important to establish systematic and mature quality assurance practices.

" Sports injury preventionfor all *Renewal, previous title ""Development of an online and customizable corporate challenge and integrated workplace wellness tracking and self-monitoring platform""" estimates the risk levels of preventable injuries associated with training program, training response, recovery and health status by continuously more than 20 evidence-based overtraining and injury markers and risk factors. Each marker is statistically analyzed on an individual basis and results are presented in a simple and meaningful way, along with actionable ‘how to fix’ advices that can be used by coaches and parents to reduce the risk. This new product will benefit to the company Fitstats Technologies Inc.