|Aaron O'Hagan||Virtual Reality Classroom to gamify education.||Yukun Lai||Jing Wu||1718-CM3203|
|My intent with this project would be to create a classroom simulation in the Unity engine. It would be primarily for use with virtual reality systems, allowing for students to become immersed in their education as well as providing teaching methods that are more fun and engaging. For example, the program could allow for virtual travel to historic sites or an active volcano, physics simulations and virtual chemistry experiments and even simple conversations with chatbots for language learning.
|Adedamola Agbonyin||Web interface for FlexiTerm||Irena Spasic||Jing Wu||1718-CM3203|
|Terms are words and phrases we use to refer to domain-specific concepts. FlexiTerm is a method for recognition of multi-word terms. We have developed FlexiTerm as an open-source software tool for automatic term recognition. The basic information about FlexiTerm together with its Java code is available via its web site: http://users.cs.cf.ac.uk/I.Spasic/flexiterm/. We are now looking to develop a web-based user interface to allow users to process their text with FlexiTerm using their web browser....[more]|
|Alfie Edwards||Training Pairs of Communicating Machine Learning Agents to Complete Cooperative Tasks Requiring Information Exchange||Richard Booth||Frank C Langbein||1718-CM3203|
|A machine learning system can optimise a black box to approximate some function. Can this black box be extended further to cover multiple machine learning agents and the way they exchange information? In this project, I explore the idea of connecting multiple machine learning agents using a general communication channel, and training them as if they were a single system. I do this by adapting the machine learning techniques of Q-Learning, NeuroEvolution of Augmenting Toplogies, and Cooperative C...[more]|
|Amy Yeo||MyHealthOnline: Integrated Digital Patient-Centred Health and Care System||Alia I Abdelmoty||Irena Spasic||1718-CM3203|
|This project will investigate how digital technologies can provide ways of delivering improved and personalised health and social care to patients, whilst also improving their access to information. A recent report on digital health and social care strategy for Wales identified the need for patients, carers and healthcare professionals to be able to make use of accurate information, safely, wherever and whenever it is needed.
The project will evaluate an existing online application called myhe...[more]|
|Angelos Charitidis||Automated Essay Marking with Machine Learning and Artificial Neural Networks||Frank C Langbein||Jing Wu||1718-CM3203|
|The aim of this paper is to investigate the application of Machine Learning in Automated Essay Marking. After a thorough background of Machine Learning, Artificial and Convolutional Neural Networks and fundamental word-to-vector representations, six of the main approaches of an Automated Essay Marking system using Convolutional Neural Networks are presented. The approaches differ about the word-to-vector representation, the essay representation and the network structure they are using. The appro...[more]|
|Ashley Harris||Building the BBC Music Website||Alia I Abdelmoty||Jing Wu||1718-CM3203|
|This project will develop an application that simulates how to automatically query the web for data that can be used to build a website such as BBC Music.
The project will use the BBC ontologies and linked data such as MusicBrainz and Dbpedia and develop a program that queries these resources and presents the results on an automatically generated web page.
|Bernice Thomas||Game with a purpose||Irena Spasic||Ian M Cooper||1718-CM3203|
|A game with a purpose (GWAP) is a human-based computation game developed to address the problem of creating difficult metadata (https://en.wikipedia.org/wiki/ESP_game). The idea behind the game is to use the computational power of humans to perform a task that computers cannot (originally, image recognition) by packaging the task as a game.
Rules of the game
Once logged in, a user is automatically matched with a random partner. The partners do not know each other's identity and they cannot com...[more]|
|Danielle Johnson||An application to help carers and patient families communicate||Liam Turner||Padraig Corcoran||1718-CM3203|
|In the UK, average life expectancy is continuing to rise. With this rise comes an increase in health problems for the elderly, placing more demand on our struggling health service. One of the main pain points for the health service is the limited availability of hospital beds. This often results in patients being prematurely released from hospital and professional home care being put in place.
Typically, one patient will have multiple carers assigned to their care and they will visit frequentl...[more]|
|Fadi Zoghbi||Evaluating the feasibility of Blockchain applications||George Theodorakopoulos||Philipp Reinecke||1718-CM3203|
|Blockchain is the technology that underpins Bitcoin, but there are many more applications for Blockchain, with potentially large business and societal impact. However, there is considerable hype around Blockchain.
The aim of this project is to clarify what type of applications can realistically benefit from a Blockchain implementation. Can blockchain be applied to smaller, more specific tasks? What are the characteristics of tasks that would benefit from Blockchain? Are their any existing succe...[more]|
|Freddie Saunders||The integration of the Annual Module Review process between the School of Computer Science and Informatics and the School of Mathematics||Alun D Preece||David W Walker||1718-CM3203|
|This aim of the project is to analyse the Annual Module Review (AMR) process, in attempt to explore how it can be integrated and executed once between the School of Computer Science & Informatics and the School of Mathematics in a collaborative fashion.
In order to successfully explore the feasibility of process integration, the project will begin by learning, understanding and codifying the AMR process in the School of Computer Science and Informatics, followed by the AMR process in t...[more]|
|Gaganpreet Singh||IoT Devices Data representation through Dashboard with Access Privileges||Omer F Rana||Frank C Langbein||1617Place-CMT400|
|Discuss with supervisor and then update here.[more]|
|Georgi Pramatarov||IoT device for home monitoring||Philipp Reinecke||Jing Wu||1718-CM3203|
|The aim of this project is to create a modular smart IoT device for home monitoring using a Raspberry pi. The project will try to achieve this by using cheaper hardware, in order to make the device more affordable. Most cheap commercial IoT home monitoring devices tie the user with a contract and monthly payments for the duration of that contract. Some companies might even request their devices back after the end of the contract. In addition, most modular home monitoring devices provide the user...[more]|
|Harrison Taylor||Reverse Engineering Audio Synthesiser Sounds||Dave Marshall||Yukun Lai||1718-CM3203|
|The basic idea is given a set of sample recordings of a sound can you determine the appropriate parameters of a given synthesiser to best approximate the set of sounds.
This could be achieved by applying advance machine learning and, specifically, optimisation techniques.
The synthesiser (and all it's available parameters) would need to under computer control so this would ideally suit software based synthesisers but some midi enable hardware device could be used (if available).
In fact is VS...[more]|
|Hasna Al Jufaili||Adversarial Reasoning in Machine Learning for Natural Language Processing: the case of spam emails||Federico Cerutti||Philipp Reinecke||1718-CM3203|
|In security-sensitive applications, the success of machine learning depends on a thorough vetting of their resistance to adversarial data. In one pertinent, well-motivated attack scenario, an adversary may attempt to evade a deployed system at test time by carefully manipulating attack samples.
* Project Goals
1. Reviewing the Adversarial Machine Learning library https://github.com/vu-aml/adlib and gathering understanding of the Scikit-learn library for machine learning http://scikit-learn.org/...[more]|
|Ian Cox||High Value Target Acquisition and Pursuit Using an Inexpensive Drone||Federico Cerutti||David W Walker||1718-CMT400|
Parrot AR.Drone is a remote controlled flying quadcopter helicopter designed to be controlled by mobile applications and it comes with an official SDK and several python re-implementations, notably http://www.playsheep.de/drone/ .
However, when several drones are used for a specific purpose, it is necessary to supervise them from a single environment. See for instance the usage of a fleet of drones for light shows at https://www.youtube.com/watch?v=T-uy4Sq1YDo .
The main goal of...[more]|
|Ioana Surdu-Bob||Crowdsourced prediction of Cardiff bus delays (IOS)||Martin Caminada||Natasha Edwards||1718-CM3203|
|Delays are one of the main disadvantages when using public transport. However, where applications (like Google Traffic) are available to keep track of delays for motorists, relatively little help is available for public transport users, especially for predicting the likelihood of any major delays.
To illustrate why the problem matters, suppose one is taking a local bus service to connect to another mode of transport (say, to the railway station, coach station or airport). If the bus is late, on...[more]|
|Jacob Berg||Strategic Reasoning with Artificial Intelligence||Federico Cerutti||Matthew J W Morgan||1718-CM3203|
Humans are incredible problem solvers. With experience, we typically get more efficient, and effective, at the problem-solving process. However, strategic experience is not easily gained meaning other mechanisms are required to build up strategic experience for strategic success.
As far back as 3000 B.C.E., the game of Wei Hai employed coloured stones to represent opposing forces. The game of chess similarly evolved out of military war games and references are found as early as 500 ...[more]|
|Jake Williamson||Preventing sensitive data being sent without encryption||Eirini S Anthi||George Theodorakopoulos||1718-CM3203|
|Creating a mobile application that will analyse outgoing traffic and alert the user if sensitive data is being shared without encryption.[more]|
|Jamie Knowles||Simulating the Effects of Releasing Malware into the Internet of Things||Eirini S Anthi||George Theodorakopoulos||1718-CM3203|
|The emergence of the Internet of Things has caused a variety of issues in the world of cyber security. Many device manufacturers are distributing insecure devices to customers and many customers are unaware of how to keep their devices secure. This has allowed the Internet of Things to become a goldmine for hackers.
To further assist in raising awareness of the insecurities of the Internet of Things this project involves the development of software that simulates malware propagation on real dev...[more]|
|Jamie Williamson||Paint me a picture: Performing Style Transfer on a mobile device||Yukun Lai||Paul L Rosin||1718-CM3203|
|Non photorealistic rendering produces more attractive images, often mimicking artistic work. For artistic effect these aim to extract salient features and structures (e.g. regions, lines) and enhance/re-render them in various ways, whilst suppressing other less salient detail. The results can be used not only for personalising consumer photographs, but also for scientific illustration. The aim of the project is to develop non photorealistic rendering algorithms on mobile devices (phones and tabl...[more]|
|John Olegario||dynamic generation of public transport information for tourists (CS part)||Martin Caminada||Federico Cerutti||1718-CM3203|
|One of the main issues that independent tourists face when travelling in for instance South East Asia is how to obtain reliable public transport information. Whereas the Western world has online travel planners like Traveline Cymru (Wales), 9292OV (the Netherlands) or Mobiliteits Zentral (Luxembourg) these tend to be absent in countries like Malaysia and the Philippines. In quite some cases, timetables of different transport operators do exit but are simply not published online, and only announc...[more]|
|Jonathan Jones||Creating a data tracking application, utilising blockchain technology||George Theodorakopoulos||Angelika Kimmig||1718-CM3203|
|The General Data Protection Act (GDPA) will come into force from the 25th May 2018. A key requirement of the act, states that organisations collecting data from EU citizens, must ensure that personal data will be erased upon request. How are EU citizens expected to know which organisations store information about them. I propose creating an application that tracks data transactions via a blockchain.[more]|
|Joshua Denton||How IoT Devices can be used in Rented Accommodation to Collect Meaningful Data||Omer F Rana||Hantao Liu||1718-CM3203|
|This project looks at implementing a wireless sensor network within rented accommodation to investigate whether it can benefit both the housing association and the tenants of the building. It gives an overview of wireless sensor networks and their associated technologies before going into detail about the Libelium Waspmote and how this can be programmed and used with Zigbee to act as sensor nodes connecting to a Libelium Meshlium gateway. This report found that a Libelium wireless sensor network...[more]|
|Karol Krajcir||Fitness app||Wendy K Ivins||Chris B Jones||1718-CM3203|
|We live in a fast paced society where people are full of stress and anxiety and struggle to find some time for themselves and their health. The lack of movement and activity combined with bad eating habits result in obesity and health conditions. There are several reasons for this and one of them is lack of motivation. When people don't see results or have no one to support them, they tend to give up.
The main purpose of my app is to improve the quality of people's lives by making use of smartp...[more]|
|Lauren Gomer||Critical Success Factors in B2C E-Commerce Strategy for SMEs||Natasha Edwards||Richard Booth||1718-CM3203|
|These days, it is hard to find a company that does not have at least some e-commerce capability - in some form to another. However, e-commerce strategy adopted and implemented by large companies might not be relevant to SMEs. The aim of this project is to identify and analyse Critical Success Factors (CSFs) an SME needs to be aware when adopting, initiating and maintaining their e-commerce strategy.
The scope of the project can be developed further, based on the student's interests, e.g. exa...[more]|
|Liam Hiley||Can we detect expert and novice anaesthetists by how they watch video?||Dave Marshall||Richard Booth||1718-CM3203|
|Normal eye activity consists of rapid movements to quickly scan an image (saccades), with slower movements focusing on loci of interest (fixation). Previous studies indicate that tracking spontaneous eye movements, via a commercial eye tracker, enables discrimination between novice and expert by how quickly subjects quickly focus their gaze and attention on key events.
I propose that a model can be implemented based on this hypothesis as.[more]|
|Mariza Celliers||A Pocket-Sized Clinic||Alia I Abdelmoty||Matthew J W Morgan||1718-CM3203|
|Patients with chronic medical conditions, such as diabetes, can benefit from recording daily updates of their condition and their general state of health.
If these records are communicated in an appropriate format to their health care professional, then they can get medical attention when they need it.
If any symptoms deviate from a normal level, this will alert both the patient and the health-care professional to arrange a consultation.
This project will design and develop an app that can be u...[more]|
|Mark Clements||Improving Research Grant Costing in the School of Computer Science and Informatics||Stuart M Allen||Xianfang Sun||1718-CM3203|
|Whenever research funding is required a back-and-forth exchange between the Research Administrator, Principal Investigator and School Manager occurs before a finalised Cost and Pricing Form is ready to be sent as part of the application for funding. This step slows the funding process and is the target of this project, with the aim of removing the time-sink of multiple messages being communicated by implementing an Excel Tool to simplify the costing required for the CAP Form. The usage of the To...[more]|
|Michael Lawson||Solid State Drive Forensics||Michael Daley||Kirill Sidorov||1718-CM3203|
|When imaging SSD's they often spend a long time on the system powered up, has the potential to end up with unallocated clusters being zero'ed out.
This project will look into who or what is controlling this and what can be done to minimise the loss of data when acquiring this image.
Real world trials on different chipsets and or come up with a best practice for capturing data or even the likelihood of the MD5 changing whilst power applied to it.
This project is an oppoutunity to collaborate wi...[more]|
|Mohammadreza Farhaditoumaj||Virtual Reality App||Yukun Lai||Jing Wu||1617Place-CMT400|
|With the availability of low-cost virtual reality solutions, including mobile phone based approaches, virtual reality (VR) has become much more accessible to users. The aim of the project is to develop a virtual reality app that provides immersive user experience for navigating in the virtual 3D world. The project can be based on e.g. Google VR SDK.[more]|
|Nathan Greenslade||A personal diary app||Alia I Abdelmoty||Xianfang Sun||1718-CM3203|
|A lot of people may be interested in a simple way of keeping a diary of events in their day.
You will build an app that will automatically track and record the location of the user and allow him to record events related to the places he visits during the day.
You can make use of an existing application that automatically collects location information on an Android platform.
|Oliver Schwertfeger||Conversational Explanations for Deep Learning Systems||Alun D Preece||Xianfang Sun||1718-CM3203|
|The project aims to build an Alexa-based conversational interface to allow users to seek explanations from a deep learning based system in the domain of crime and security.[more]|
|Plamen Yankov||Internet of Things Framework for Last Mile Logistics||Natasha Edwards||George Theodorakopoulos||1718-CM3203|
|Development of technology often disrupts business' traditional ways of operating, and forces businesses to adapt their strategy and tactics. The main aim of this project is to create a generalized Internet of Things framework for logistics companies dealing with Last Mile Delivery. The created framework should aim to help logistics companies that want to start using Internet of Things in their Last Mile Delivery operations by guiding the users though the processes that should be done in order t...[more]|
|Rachel Keyte||Can IoT devices be identified through their device fingerprint?||George Theodorakopoulos||Xianfang Sun||1718-CM3203|
|Internet of Things (IoT) devices are becoming increasingly common and so are the security risks that come with them. The aim of this project is to investigate
a) Whether fingerprints for certain IoT devices be identified through passive monitoring of the network traffic?
b) In an IoT environment, can the types of devices present be determined using the device type fingerprint discovered in part a?[more]|
|Richard Gardner||Understanding the performance of the tangle, a solution to the blockchain problem||Philipp Reinecke||Frank C Langbein||1718-CMT400|
|Decentralised payment systems based on blockchain - such as Bitcoin face the inevitable problem of scalability, limited by their block size and interval. A new cryptocurrency known as IOTA uses a novel data structure to distribute its ledger - the tangle. A tangle is a directed acyclic graph, where transactions are added one at a time and seemingly unaﬀected by the same problems as Bitcoin. This project assesses how well and to what extent a data structure such as the tangle can address the pr...[more]|
|Ryan Morris||The Road to Driverless Vehicles||David W Walker||Wendy K Ivins||1718-CM3203|
|In this project you will investigate the technical problems that must be overcome to enable the widespread adoption of driverless vehicles on our roads, together with any social or psychological issues that may be a barrier to their use. You should consider the issue of the adoption of driverless vehicles from the perspectives of potential users, technology companies interested in developing driverless technologies, established car manufacturers (such as Ford), and global insurance companies. Fo...[more]|
|Said Al-Maskari||Enterprise Architecture Approach: The Way Forward||Wendy K Ivins||Natasha Edwards||1718-CMT400|
|Aligning IT Strategy & Capabilities with the Organisation???s Objectives:
Building an IT strategy is a critical mission for any organisation or business. It should consider how the technology and organisation???s strategies are totally aligned to meet different levels in the hierarchy within an organization and with the appropriate level of details. The aim of this project is to look into the details of an IT strategy from the following aspects:
- Is the organisation doing the right thing ...[more]|
|Samuil Velichkov||Fog and Edge Computing||Omer F Rana||Bailin Deng||1718-CM3203|
|The aim of this project is to understand and investigate the emerging area of Fog and Edge Computing. The student is expected to gain: (i) an understanding of this area; (ii) develop (in collaboration with the supervisor) a simulation of a potential environment using the iFogSim simulator from the University of Melbourne (Australia). The project requires software design and development skills in the Java programming language. Students are also expected to investigate issues around security and p...[more]|
|Sebastian Gwilym Neale||A machine learning framework for modelling and optimising patient flow through a hospital setting||Angelika Kimmig||David W Walker||1516PT-CMT400|
|This project proposes a machine learning framework for modelling and optimising
patient flow which can be generalised to most hospital settings at any level of
pathway granularity. It is intended that this framework provides a basis for future
modelling and optimisation in healthcare settings, providing methods which enable
organisations to undertake better capacity and demand planning in a world where
healthcare providers need to do more activity to cope with increasing demands, and
|Stephen James Craine||Pathfinding and Decision Making for AI in Games||Frank C Langbein||Jing Wu||1718-CMT400|
| This project aims to investigate different algorithms for path finding and different methods for decision making for artificial intelligence in games. The software has been developed using the Unity engine and using the C# programming language. The aim is to create an intelligent AI that moves around a map efficiently and reacts appropriately to player actions. Different algorithms for path finding are compared in research, implementation and testing. Two methods for decision making will be dis...[more]|
|Tao Wang||Artistic Rendering of RGB-D Images||Yukun Lai||Bailin Deng||1718-CMT400|
|Artistic rendering techniques are computational methods that generate images mimicking styles of artists. Such techniques form a central set of features for photo processing software such as Adobe Photoshop, in the form of a rich set of filters. Traditional artistic rendering usually takes an image as input and generates a stylised image. However, since images lose 3D spatial information, artistic rendering techniques can easily make mistakes in interpreting image content, e.g. losing essential ...[more]|
|Teodor Nikolov||Procedural Terrain Generation Engine||Frank C Langbein||Bailin Deng||1718-CM3203|
|In this project I will build a software plug-in written in C# for Unity Engine. My software would deal with generating 3D procedural landscapes in the form of mesh data, which will be rendered by Unity's rendering engine. The "Engine" part of my project involves the generation of landscapes with different forms and features based on how the parameters of the engine are set. Maybe the terrain could be mountainous, or maybe it would be flatter and smoother.For the project, I will aim to implement ...[more]|
|Thomas Sweetman||Measuring 3D Mesh Saliency using an Eye Tracker||Yukun Lai||Paul L Rosin||1718-CM3203|
|In recent years 3D data has become popular as low-cost devices such as Kinect have emerged. There are many applications of 3D data, such as gaming, cinematography special effects, 3D printing, etc. When these models are manipulated (eg downsized, stretched, morphed, etc) then important (ie salient) features should be preserved as best as possible.
This project will develop a method for measuring the salience of parts of the 3D mesh data. Experiments will be carried out with an eye tracker to pr...[more]|
|Thomas Tallis||Generating Text-Based Adventure Games||Richard Booth||David W Walker||1718-CM3203|
|This project involves implementing algorithms that would allow a user to give minimal input (e.g. a setting, whether they would like combat, complexity/size of adventure, etc.) to a program. And the output of that program would be a runnable and playable text-based adventure game saved to a file/multiple files.
I intend to use python3 for the implementation.[more]|
|Thomas Wynne-Owen||Content Management System for a Real-Time e-Commerce Marketplace||Natasha Edwards||Xianfang Sun||1718-CM3203|
|The aim of this project is to create an application that provides consumers with the ability to buy and sell products between one another in a real-time marketplace similar in style to the stock market. The system allows users to place bids and asking prices on products to buy or sell products. The solution has been implemented as a web application.
|Tori Maddock||A Curious and Cooperative Multi-Agent Pursuit System using Reinforcement Learning||Frank C Langbein||Kirill Sidorov||1718-CMT400|
|The goal of this project was to utilise deep reinforcement learning and the relatively new machine-learning concept of curiosity in a multi-agent pursuit scenario. Multiple hunter agents utilise raycasts to collect observations from their environment, which takes the form of a randomly generated maze. I train these agents using Proximal Policy Optimization in a neural network. The aim of these hunters is to cooperate in order to catch a fleeing target as quickly and as efficiently as possible. I...[more]|
|Vidhi Patel||Smart contracts with Blockchain (multiple projects)||George Theodorakopoulos||Philipp Reinecke||1718-CM3203|
|Blockchain is the technology that underpins Bitcoin, but there are many more applications for Blockchain, with potentially large business and societal impact. One of the recently proposed applications is smart contracts https://en.wikipedia.org/wiki/Smart_contract.
The aim of this project is to implement a smart contract prototype. To undertake this project, you will need to understand the basics of cryptography and to have programming experience.
|Wei Zeng||[Renishaw] Maze Solving Algorithms with Varying Complexity||Bailin Deng||Xianfang Sun||1617Place-CMT400|
|At Renishaw there is the need to do path planning of multi axis tools in complex environments, akin to solving a really hard maze. A full solution requires many different technologies, such as collision detection, configuration validation, move validation, path generation, path optimisation, motion simulation etc..
The aim of this project is to investigate aspects of this field, and demonstrate this by producing a working prototype, where an environment is created and paths generated to safely...[more]|
|Wiliam Thomas||Football Transfer Rumours on Twitter: Who and What Should we Believe?||Richard Booth||Federico Cerutti||1718-CM3203|
|The main objectives of this project are:
1. To generate a data-set of tweets concerning football transfer rumours on Twitter and extract from it a bunch of claims of the form "user U claims player P will join team T".
2. To implement some existing algorithms to determine, at any point in time, a belief value on each statement of the form "player P will join team T" as well as a reliability value for each user making a claim.[more]|
|Zhuo Cui||Love Cardiff Android Application||Natasha Edwards||James Osborne||1718-CMT400|
|The Love Cardiff android app is a mobile application, which aims to make a tied bond between the local in Cardiff and also an attraction for travellers to gain more information about Cardiff. The Love Cardiff App was conceptualised to create a unique platform to supplement all-rounded Cardiff information for users to directly acquire. The functionality of this app includes register and login, scan the latest specified Cardiff news, the map navigation supported by Google Map, the weather forecast...[more]|