Student | Title | Supervisor | Moderator | Module |
---|
Aakash Kumar Gurung | [Industrial] Forensic Analysis of Watsapp/Kik/Sanpchat/Instagram/Facebook/Telegram on Android and iOS devices. | Shancang Li | Laurence Semmens | 2022-CMT400 |
This project focuses on looking for research to be conducted on common messaging apps such as:
· Whatsapp
· Kik
· Snapchat
· Instagram
· Facebook Messenger
· Telegram
Aims:
· Provided an overview of the applications features and differences on both platformers.
· Identify the best extraction types (Logical, File System & Full File System) and extraction software/hardware (UFED, XRY and Oxygen etc…) for extracting data...[more] |
Aaron James | VizDoom AI via Deep Reinforcement Learning | Frank C Langbein | Steven Schockaert | 2021-CM3203 |
In this paper, I will adapt an existing algorithm to the ViZDoom visual deep reinforcement learning
library and try to find optimal algorithmic settings for some default scenarios provided by the library
under the PPO and A2C algorithms. I will attempt to further this into playing The Ultimate DOOM
once these settings are found. I will follow existing novel methodologies such as transfer learning,
curriculum learning, and reward shaping to allow the machine learning algorithm to develop an
under...[more] |
Abdullah Alshatti | Anomaly Detection in Gas Pipeline SCADA Systems | Neetesh Saxena | Shancang Li | 2022-CMT400 |
With the great industrial expansion and development in recent times, appropriate tools and systems need to be used to ensure the proper functioning and operation of these systems. One of most commonly used systems is the Supervisory Control And Data Acquisition system (SCADA), it provides supervision, control and monitoring of the system through the use of an extended network of sensors and actuators along with programmable logic controllers managed through Human Machine Interface devices. All o...[more] |
Abdullah Barayan | Credit Card Fraud Detection using novelty detection techniques | Yuhua Li | Alun D Preece | 2022-CMT400 |
Credit card fraud is a growing issue affecting the financial industry and cardholders worldwide, resulting in billions of dollars in losses annually. A considerable amount of research has been done to detect credit card fraud. Most proposed machine and deep learning fraud detection approaches use a supervised learning methodology that requires appropriately labelled and balanced training datasets. Organising these datasets takes a great deal of time and effort. It is difficult for these approach...[more] |
Adekoyejo Coker | Cardiff Youth Service – Digital Youth Club (Discord) | Catherine Teehan | Víctor Gutiérrez Basulto | 2021-CM3203 |
Over the past 18 months Cardiff Youth Service has needed to offer a range of digital services and opportunities to young people in the city. Moving into a Covid recovery model we still want to offer these services and opportunities as some young people prefer accessing our service online. Young people have told us they would like to engage with our service through discord and we now have a young person steering group to tell us how it should look, what it should include and what should be on off...[more] |
Akin Kaki | Search by image in camera trap dataset | Charith Perera | Carolina Fuentes Toro | 2021Place-CMT400 |
This project focuses on designing a technique that allows researchers to search for images in the same location in a camera trap dataset by using few images from that location or using a single image when the whole dataset is processed using the technique. Using the same principle, the presence of animal in the camera trap image is also identified. and finally by using the results from the above, this project also focus on how normalization of data can affect the perfomance of a machine learning...[more] |
Alexander Jones | Cyber Security Education Online Portal | Yulia Cherdantseva | Oktay Karakus | 2021-CM3203 |
The aim of this project is to develop a web-application for hosting cyber security educational material for audiences of different ages starting from primary school and up to the MSc level, and beyond. The application will have must allow access to educational material, allow filtering of material based on different criteria. User roles in the application will include: Admin, Educator, and Participant. The access permissions will vary based on the role. The material stored will vary by type and ...[more] |
Alex Hayman | Creating Cyber Security Training Exercises for Developers | Yulia Cherdantseva | Fernando Loizides | 2021-CM3203 |
Web applications are often a point of interest for cyber criminals as they are publicly available online and contain personal data, user credentials and financial information. Once the application is compromised, hackers can pivot around the network where the website is being hosted and target more machines. It is essential for developers to have good security practices when developing websites. There is also a growing market in gamification of cyber security learning. Websites such as HackTheB...[more] |
Ali Atieh | Designing a digital diary for Caregivers: Kitabuk Digital Diary | Carolina Fuentes Toro | Irena Spasic | 2022-CMT403 |
This project involves the design/development/evaluation of a digital diary.
This project investigates the useability of a digital diary with informal caregivers as a focus group to produce high-level guidelines that will enable researchers and developers to create a digital diary system that meets the expectations of informal caregivers.[more] |
Andrei Cojocariu | Generating fake travel source and destination location pairs | Padraig Corcoran | Matthew J W Morgan | 2021-CM3203 |
Route planning services, such as Google Maps, require users to submit their source and destination location pairs. For example, if I want a route from my home to the cinema, I submit the location of my home and the location of the cinema. If a user is concerned about their privacy, they may wish to obfuscate or hide the true locations in question. This can be achieved by submitting to the service provider a set of fake source and destination location pairs along with the true location pair. If t...[more] |
Andrew Jones | Developing Machine Learning Models for Assessing Fantasy Premier League Player Performance | Federico Liberatore | Martin Caminada | 2022-CMT403 |
Overview
Creating machine learning models, which will use open source event and Fantasy Premier League (FPL) data, in order to evaluate performance of players. For example is a player over/under performing, is this performance sustainable or is it likely to regress to mean. Creating a model for 'expected points', this can be compared to actual points scored by a player to help inform a person's decisions when selecting a fantasy football team.
The Problem in More Depth
Football in recent year...[more] |
Anthos Kountouris | Analysing the discourse related to electrical vehicles on social media. | Padraig Corcoran | Amir Javed | 2021-CM3203 |
The UK government has committed to transitioning from fossil fuel to electrical vehicles. Many people support this goal because it will result in a more sustainable world. However, many others have concerns about the transition. These concerns include not being able to afford the cost of expensive new electrical vehicles and not being able to charge their vehicles.
The aim of this project is to perform an analysis of the discourse related to electrical vehicles on social media and specifical...[more] |
Asrar Esmaeel T Alahmadi | Cyber Risks Assessment for Connected and Autonomous Vehicles | Neetesh Saxena | Yulia Cherdantseva | 2022-CMT400 |
This project aims to understand connected and autonomous vehicles use case scenario, predict risks for critical assets, perform modelling assessment, and develop a GUI/webpage for situational awareness.[more] |
Astrid Rickaby-Pratt | Cardiff University Staff Web-App | Yulia Cherdantseva | Sylwia Polberg | 2021-CM3203 |
Universities' academic staff, Cardiff included, have been subject to overwork without compensation consistently for over a decade. The aim of this project is to develop a staff-focused web application similar to the Cardiff University student app, but meeting staff needs and expectations. It focuses on both requirements gathering and specification as well as prototype implementation, and pays homage to possible cyber-security threats as a standalone online program that may be subject to attack.[more] |
Bingjie Lu | Solving N-Puzzle Problems | Yukun Lai | Paul L Rosin | 2022-CMT403 |
The n-puzzle is known in various versions, including the 8 puzzle, the 15 puzzle, and with various names (Gem Puzzle, Boss Puzzle, Game of Fifteen, Mystic Square and many others). It is a sliding puzzle that consists of a frame of numbered square tiles in random order with one tile missing. If the size is 3*3, the puzzle is called the 8-puzzle or 9-puzzle, and if 4*4, the puzzle is called the 15-puzzle or 16-puzzle. The object of the puzzle is to place the tiles in order (see diagram) by making ...[more] |
Bojun Liang | IoT security (multiple projects) | George Theodorakopoulos | Neetesh Saxena | 2022-CMT400 |
IoT devices (smart lightbulbs, smart plugs, smart cameras, etc) are entering the market without much regard for security. A project in this area will focus on designing and implementing attacks against IoT devices, or on defences that mitigate existing attacks.
This project requires either hands-on experience with or willingness to learn network traffic sniffing and pentesting at the level of CMT121. If you are interested, please join the meeting at 10:00am (UK time) on Thuirsday 3 March at the...[more] |
Brandon Davies | Analysing Conspiracy Theories on Social and Online Media [Multiple Projects] | Alun D Preece | Nervo Verdezoto Dias | 2022-CMT404 |
The damage misinformation and conspiracy theories can cause has risen to prominence in recent years. During the COVID-19 pandemic, conspiracy theories spread via social media have led to numerous disruptive events including attacks on 5G towers and direct action by anti-vaccination groups. In the political arena, QAnon conspiracy theorists were involved in the January 2021 attack on the United States Capitol, threatening the legitimate democratic process of a major nation state.
This project is...[more] |
Brayan Thomas | Design and develop an engaging web application to educate users on data collection in the context of Ecommerce websites. | Martin J Chorley | Jing Wu | 2022-CMT403 |
I have proposed the design and development of data collection self awareness web application, as my current is goal is to be a web developer
I have prosed this project as my current goal is to become a web developer.
I have chosen this project because I think I can gain a lot of experience in web development whilst creating a web application using Django.
I have chosen Django over Flask for a couple of reasons. Firstly, I already have some experience in Flask, so developing a website using Dj...[more] |
Chilli Goodman | Using Minecraft for Education to Teach about the Impact of Rising Sea Levels on Welsh Coastal Regions | Catherine Teehan | Louise Knight | 2021-CM3203 |
Wales Coastal Monitoring Centre - A Welsh Government funded organisation based in the Vale of Glamorgan, focusing on the monitoring of Welsh coastlines with regard to erosion, flood risk and coastal defences. As part of their programme, they are currently developing a series of lessons to be delivered within Primary schools across Wales educating children on the impacts of climate change, coastal erosion and flooding. To support the project, you will build a Minecraft for Education world that wi...[more] |
Ching-Chan Lin | Privacy of data visualisation and restriction of data sharing | Parisa Eslambolchilar | Yuhua Li | 2022-CMT403 |
This project aims to investigate privacy issues of personal health data visualisation shared on online health data platforms. When people share their health data visualisation like daily steps and calories on a web platform, their personal information could be identified by the data trends and analysis. Therefore, this project creates interactive visualisations on a web platform and invites participants to compare them the visualisations and fill in a questionnaire to understand people’s thoug...[more] |
Daniel Redly | Development and Evaluation of a Web Application for Creating Click Tracks with Advanced Rhythmic Features | Dave Marshall | Kirill Sidorov | 2022-CMT403 |
My idea is to create a web application to act as a metronome/click track generator with advanced features such as polyrhythms, odd time signatures and accelerando and ritardando (speeding up and slowing down). To my knowledge, some such web applications exist already which can handle odd time signatures and polyrhythms, but none with accelerando and ritardando, so I would focus mostly on this. A user would be able to define a start and end tempo, and choose a function to determine the rate of ch...[more] |
Daniel Weir | Generating Natural Language Descriptions of Rainfall Radar Data | Padraig Corcoran | Omer F Rana | 2022-CMT403 |
The Met Office provides an API which allows users to download rainfall radar data for the UK. That is, a time series of rainfall maps corresponding to the UK (https://www.metoffice.gov.uk/services/data/datapoint).
The aim of this project is to create a computer system which transforms a given time series of rainfall maps into a corresponding natural language description. For example, a natural language description may contain the expression “It rained very heavily from 9AM to 10AM in Cardiff c...[more] |
Dan Law | Automatic analysis of music performance style | Andrew Jones | Federico Liberatore | 2021-CM3203 |
One of the fundamental problems in computational music is the analysis and modelling of performance style. The aims of this project are as follows: (1) Investigate what relevant performance features (e.g. variations in dynamics, tempo, timbre) can be reliably extracted from audio recordings. (2) Provide a means of exploring which of these features are relevant to the perception of performance style. (3) Investigate what operations can be applied to styles, e.g. interpolation between styles, styl...[more] |
Devaang Misra | Human Robot Interaction in Healthcare: supporting everyday task | Carolina Fuentes Toro | Yulia Cherdantseva | 2021-CM3203 |
As the title suggests, the problem being tackled here is supporting everyday tasks in a Healthcare environment with the help of robots. The robot being used here is Pepper, a semi-humanoid robot that was manufactured by SoftBank Robotics.
In a healthcare environment, Pepper can perform a myriad of everyday tasks, involving greeting hospital visitors, carrying small talks with patients or their families and keeping them entertained, communicating with nurses to provide instructions, Pepper can al...[more] |
Dominyque Mohammed | Implementation of a data privacy protection method for transaction data | Jianhua Shao | James Osborne | 2021-CM3203 |
As an increased amount of transaction data being gathered and stored, how to protect the private information contained within such data sets becomes an important issue. This project aims to implement one of the exisiting algorithms for anonymizing transaction data. The system is expected to be developed in Python.[more] |
Ellis Doran | IoT security (multiple projects) | George Theodorakopoulos | Neetesh Saxena | 2022-CMT400 |
IoT devices (smart lightbulbs, smart plugs, smart cameras, etc) are entering the market without much regard for security. A project in this area will focus on designing and implementing attacks against IoT devices, or on defences that mitigate existing attacks.
This project requires either hands-on experience with or willingness to learn network traffic sniffing and pentesting at the level of CMT121. If you are interested, please join the meeting at 10:00am (UK time) on Thuirsday 3 March at the...[more] |
Emima Vaipan | SSID Stripping Attack: From Vulnerability to Tangible Threat | Eirini S Anthi | Padraig Corcoran | 2021-CM3203 |
This project aims to research and develop hardware tooling that can enable a range of attacks, including a phishing attack, against IEEE 802.11-compliant devices. This attack was recently detected in iPhones and can have lots of severe consequences such as a leak of sensitive data. More specifically, this vulnerability enables SSIDS to be crafted and allows for unintended behaviour in phones whey they ingest them.
This project will involve creating a hardware rogue Access Point that will imple...[more] |
Esther Pearson | How can incentives be used to change cybersecurity behaviours [INDUSTRY PROJECT] | Eirini S Anthi | George Theodorakopoulos | 2022-CMT400 |
The shift to hybrid home/work environments has blurred digital boundaries yet people's organisational and personal security habits can be different. This project will investigate how do individual and organisational behaviours influence people's security behaviours in hybrid home/work environments, and what individual and organisational incentives could be used to change
their security behaviours?
This project will be co-supervised by our industry partner Anete Poriete from Cybersmart.[more] |
Ethan Caldeira | Creating an Interactive Virtual Companion to Support and Enhance Mental Wellbeing | Nervo Verdezoto Dias | Neetesh Saxena | 2021-CM3203 |
This project aims to create a mobile application that will make users aware of their mental wellbeing and help users deal with any stress they might face. The application will guide users through becoming more mindful via a variety of different means. Simplifying these methods by using a virtual companion to increase user engagement, so that all are able to get the benefits.[more] |
Eun-Kyul Ko | When is the best time to exchange your money? | Parisa Eslambolchilar | Sylwia Polberg | 2021-CM3203 |
The foreign exchange market is so unpredictable; you never know when is the best time to exchange your money. Especially with current political problems such as Brexit and COVID-19 it makes the currency fluctuate even more. As an international student I often face problems regarding fluctuating exchange rates. With the same amount of money you send over from abroad, one day you can get a few percent more, and the next day you get a few percent less. Although the percentages are less than 1%, dep...[more] |
Evan Smith | Game with 2D or 3D graphics, dynamics, networking [multiple projects, must be specialised in discussion] | Frank C Langbein | Carolina Fuentes Toro | 2021Place-CMT400 |
2D "Fall Guys" like game. For this project, you may choose an arbitrary game that is played in a 2D or 3D environment with one or more players. The aim of this project is to implement a user interface and game engine with 2D or 3D graphics and suitable dynamics (physics) simulations to run this game and potentially add networking capabilities. The focus could be specifically on 2D or 3D environments, how to generate, store, manage and render them. You could consider specific rendering effects, e...[more] |
Finn Milliner | Security Analysis in SMS-based Applications | Neetesh Saxena | Bailin Deng | 2021-CM3203 |
This project aims to analyse the security level of the applications and services that are either based on Short Message Service (SMS) (such as SMS-based mobile-banking) or do use SMS to provide some sort of service, such as in One-time Password (OTP). Outcome will reflect research-based advantages and limitations with quantitative information about the security level of the application and services used. The work will also provde recommendations to address the existing/found security issues.[more] |
Francesco Zucchelli | Detecting DDoS attack on a network | Amir Javed | Jose Camacho Collados | 2021-CM3203 |
Using Cyber range to simulate DoS attack on a network – Within the project student will work on already collected dataset. They will then pre-process the data and build supervise/unsupervised machine learning model to detect an ongoing attacks.[more] |
George Grainger | Developing a web application to Visualise IoT Data for Abacws Building | Charith Perera | Martin Caminada | 2021-CM3203 |
The Internet of Things (loT) is a recent emerging technology that provides substantial amounts of data previously inaccessible to humanity. The aim of this project is to develop a system to make it easier to access the data produced by/for the Cardiff University Computer Science Abacws building. Making this data more accessible opens the door to a range of possible applications and people wishing to access, process and utilise sensor data for the building. During this report I will explain the t...[more] |
George Haddon-Gill | Generating fake GPS trajectories | Padraig Corcoran | Hiroyuki Kido | 2021-CM3203 |
Many location based services (LBS), such as Strava, require users to submit their GPS trajectory which may come from a smartphone or Sat Nav system. If a user is concerned about their privacy, they may wish to obfuscate or hide their true trajectory. This can be achieved by submitting to the LBS a set of fake trajectory along with the true trajectory. If the LBS cannot differentiate between the true and fake trajectories, they can determine which is the actual true trajectory. The goal of this p...[more] |
Georgios Psevdiotis | MyBookChoice - A reading books recommender algorithm and website | Dr Daniela Tsaneva | Hantao Liu | 2021-CM3203 |
Sometimes people find it difficult to decide what book to read next or are unaware what new books have been printed. The aim of this project is to create a recommender system in the form of a web site, which uses a recommendation algorithm returning the results of recommended books to the user depending on the criteria they have selected. The website would have to provide visual selection of the desired book features and easy to use, as well as responsive, while also being efficient in recommend...[more] |
Gregor Webster | First Person Shooter Bots Via Reinforcement Learning | Frank C Langbein | Yulia Cherdantseva | 2021-CM3203 |
This project's focus was the building of better FPS bots through the use of
reinforcement learning, and specifically the area of sample biassing as a means of
achieving that improvement. To find out if sample biassing was a useful improvement,
data needed to be gathered on both unbiased and biassed programs.
To that end, a simple reinforcement learning algorithm was adopted and adapted to
generate the data needed. After six runs, three unbiased and three with varying levels
of bias, sufficient d...[more] |
Hanci Quan | Image to Speech System | Bailin Deng | Víctor Gutiérrez Basulto | 2022-CMT400 |
In this project, you will build a prototype system that converts the text inside an image to a speech. Such a system can be useful for people with visual impairment. The hardware consists of a computer attached to a camera. The system will use computer vision libraries to extract text that is inside an image captured by the camera, and then use text-to-speech APIs to convert the text to audio. The system is expected to be deployed on a PC with a webcam, or on a raspberry PI with a camera module.[more] |
Haoda Ye | Create a localhost 3D game with Chinese ink painting rendering style | Frank C Langbein | Charith Perera | 2022-CMT403 |
This project aims to create a 3D Multiplayer game with a Chinese ink painting rendering style in the Unity Game engine. The project's core is to design shaders that can showcase Chinese ink style and a simple asynchronous local-host network communication framework. The core of the shader displays the silhouette line of the model, and the blur samples the ramp texture. The key to the network framework is the state synchronization of sockets and custom messages. The gameplay is not the focus of th...[more] |
Harvey Allen | Sentiment Analysis of Financial News Headlines with Market Comparison | Irena Spasic | Martin J Chorley | 2021-CM3203 |
This project is based on the following Kaggle dataset:
https://www.kaggle.com/notlucasp/financial-news-headlines
Scraped from CNBC, the Guardian, and Reuters official websites, the headlines in these datasets reflects the overview of the U.S. economy and stock market every day for the past year to 2 years.
Data scraped from CNBC contains the headlines, last updated date, and the preview text of articles from the end of December 2017 to July 19th, 2020.
Data scraped from the Guardian Business ...[more] |
Henrijs Princis | Explainable SAT Proofs for Social Choice and Argumentation Theory | Richard Booth | Hiroyuki Kido | 2021-CM3203 |
The aim of this project is to implement the workflow described by Geist and Peters [1] for generating concise human-readable mathematical proofs for theorems via the use of SAT solvers. Initially the focus will be on theorems in the area of social choice, before potentially branching out into argumentation theory or matching theory. The project will involve research on automated theorem proving, SAT solvers, explainable AI (XAI).
Possible project outputs include:
- Comparison of the performanc...[more] |
Henry Booth | Monitoring Marine Debris Hotspots via Satellite Imagery | Oktay Karakus | Charith Perera | 2022-CMT403 |
This project can be split into 3 main parts.
Part 1)
Location of a suitable area of ocean to search for marine debris over a suitable time frame (3-4 years). This will have to consider year-round cloud cover and sea state, as well as the degree to which debris is expected to aggregate in the area.
Part 2)
Collecting and filtering a satellite dataset to account for cloud cover and sea state.
Train a machine learning model that can identify marine debris from satellite images. This could be ...[more] |
Hermond Tamba | Mapping the character of places from georeferenced data | Chris B Jones | Matthew J W Morgan | 2022Place-CMT404 |
The characteristics of locations within cities can be viewed from various perspectives - for example with regard to activities and facilities (e.g. types of shopping. types of restaurants, parks, sports, cinema, cultural heritage, biodiversity etc). This project will attempt to evaluate the effectiveness of a topic modelling approach (using Latent Dirichlet Analysis - LDA), or similar, that uses geo-referenced text as input and that has been applied in recent research literature. Factors that ...[more] |
Hossein Ramezanian | A comprehensive evaluation of artificially intelligent learning in the detection of phishing emails | Neetesh Saxena | Shancang Li | 2022-CMT400 |
Phishing email attacks are potent and dangerous by design. Many companies, industries and individuals have fallen victim to it. Advancements have been made to combat these attacks; however, the technology does not stop a significant portion of these attacks. This could be for many reasons, but it could be attributed to the nature of well-made phishing emails, as it mimics the textual behaviour a regular client or friend would follow.
Many researchers tried to apply AI to solve this problem. The ...[more] |
Jack Davies | Detecting DDoS attack on a network | Amir Javed | George Theodorakopoulos | 2022-CMT400 |
Using Cyber range to simulate DoS attack on a network – Within the project student will work on already collected dataset. They will then pre-process the data and build supervise/unsupervised machine learning model to detect an ongoing attacks.
Aim:
1. Create a dataset using different topologies on the cyber range.
2. Create ML model to detect attacks
Desirable goals :
create a dashboard to show your results.[more] |
Jake Harkins | Predict Animal Movements using Collar data Help Fight Poaching and Save Animals | Charith Perera | Yulia Cherdantseva | 2021-CM3203 |
This project suits for a student who is highly motivated to make an impact on wildlife conservation activities, support climate change mitigation and fight against poaching activities. The student will be supported and advised by a team including academics and PhD students. This project is a collaboration between Cardiff University’s Danau Girang Field Centre (DGFC) (https://www.cardiff.ac.uk/danau-girang-field-centre), School of Bioscience and the School of Computer Science.
Your project is ...[more] |
James Goodrick-Clarke | Music makes you run faster... | Martin J Chorley | Sylwia Polberg | 2021-CM3203 |
Both Spotify and Last.FM allow you to access a list of a user's recently played tracks. Multiple services exist for tracking exercise (Strava, Fitbit, Runkeeper, ...) and associated data (heartrate, pace, ...). I'd like to create an app that allows you to compare your exercise data with your recently played music over a large time period to determine whether the music you were listening to has any impact on your performance in the exercise.
This could be created as a secure web application acc...[more] |
James Middleton | Evaluating the use of sky images for machine learning approaches to solar irradiance forecasting | Frank C Langbein | Omer F Rana | 2022-CMT403 |
Forecasting solar irradiance is a key component in the management of electrical grids with a high percentage of photovoltaic energy generation. The main challenge in solar irradiance forecasting comes from the stochastic nature of cloud advection and diffusion. This spatio-temporal phenomena requires spatio-temporal data to predict, a source of which is sky imagers; wide-angle lensed cameras facing upwards taking images of the sky at regular intervals. This study investigated the use of machine ...[more] |
Joseph Garnett | Drone forensics investigation | Shancang Li | George Theodorakopoulos | 2022-CMT400 |
You will be provided with a few Drone images that can be used to conduct drone foresnic investigation, including evicence extraction from cameras, GPS, connectivities, geolocation match, etc.[more] |
Joseph Wilson-Hall | Non-Photorealistic Rendering with Spot Colour | Paul L Rosin | Yukun Lai | 2021-CM3203 |
In a previous paper I developed a method (using traditional computer vision techniques) to add "spot colour" to images: http://users.cs.cf.ac.uk/Paul.Rosin/resources/papers/spot-CAe.pdf That is, colour is added to region (or regions) of a black and white image to make it look more attractive or interesting.
The aim of this project is to tackle this problem, but using the power of deep learning![more] |
Juncheng Chen | Explainable machine learning for exploiting technical and fundamental indicators in stock trading | Yuhua Li | Yipeng Qin | 2021-CM3203 |
The aim of this project is to use machine learning to combine technical analysis and fundamental analysis in stock trading. Technical analysis and fundamental analysis are two commonly employed investment tools for timing the market and select stocks. Technical analysis often relies on daily price or trading volume, and is usually applied for short-term trading, while fundamental analysis focuses on financial ratios and more suitable for long-term investing. Hedge fund managers have argued that,...[more] |
Kalvin Willis | Modelling Cyber-Attacks on Modbus TCP Protocol in ICS | Neetesh Saxena | Yuhua Li | 2021-CM3203 |
This project designs, develops and implements cyber-attacks on Modbus TCP protocol in ICS. You really need strong interest in programming (Python), you will be given the code which you need to understand and alter to mount cyber-attacks and obtain results/impact.[more] |
Kieran Chocian | Multi-player Othello game with AI and networking | Frank C Langbein | Shancang Li | 2022Place-CMT403 |
Othello is a turn-based game on an 8x8 grid that consists of white and black discs. Each player places a disc that outflanks one or more of their opponent discs, where
every disc outflanked is flipped. The game ends when neither player can place a disc, where the aim is to have more discs left on the board than your opponent does.
This project aims to create a networked server that allows a user to play Othello against either another human in real time, or against multiple AI agents of varyi...[more] |
Kriti Shewaramani | Comparative Analysis of Tree-Based Machine Learning Models and Neural Networks for Malware Prediction | Yuhua Li | Sandy Gould | 2021-CM3203 |
In the age of technology, malware attacks are occurring every day around the world. These attacks involve a malicious software that can lock up essential files, spam you with ads, or redirect you to malicious websites which can result in anything from data theft to the destruction of entire systems or devices. Cybercriminals use different types of malware like trojans, ransomware, spyware, or worms to infect individuals or organizations. Machine learning is a credible technology in today’s day...[more] |
Laura Choy | Virtual Reality educational puzzle using logic gates and 3d space limitations | Parisa Eslambolchilar | Jing Wu | 2021-CM3203 |
The project aims to introduce logic gates and truth tables in an educational game.
The project will use Unity with the SteamVR plugin to create a Virtual Reality environment and Blender for 3D models. The puzzle space consists of a small cube with multiple input and output points on the surface area and a truth table. The user then selects appropriate logic gates and wires to connect the input and output gates inside the cube to match a given truth table . The challenge is to reverse engineer t...[more] |
Lida Wen | Creating Othello AI Players Combining Heuristic Evaluation And Reinforcement Learning | Bailin Deng | Hantao Liu | 2021-CM3203 |
This project aims to explore possible ways of creating AI players that are capable to make sensible decisions in the board game Othello. The complexity and interactivity make this topic particularly interesting. To achieve the aim, the project starts with analysing the background, rulesets and advanced strategies used in the game. A GUI has then been designed with Pygame to visualise the game.
Four types of intelligent agents are created, which are Heuristics, Minimax, MCTS and DQN. Another thr...[more] |
Lingpei Meng | Security Automation Enterprise Network Construction | Shancang Li | Amir Javed | 2022-CMT400 |
Cybersecurity firm Check Point Research recently released its 2021 Security Report, showing a 50% increase in overall weekly attacks on enterprise networks in 2021. Therefore, it is crucial to building a secure enterprise network. In addition, with the development of NetDevOps related technologies in recent years, automated management networks have become a hot topic.
I will use images of Cisco security equipment to design and build an automated secure enterprise network for small and medium-si...[more] |
Linsey Rimmer | Using Companion Applications as Rules Teaching Tools To Make Hobby Board Games More Approachable | Dr Daniel J. Finnegan | Hantao Liu | 2022-CMT403 |
‘Hobby’ board games have been growing over the past twenty years. However, such games feature unique and complex mechanics that can represent a barrier of entry to welcoming new players, restricting the capability of the genre to continue its growth. ‘Bloodborne: The Board Game’ is one of these more complex hobby board games which could benefit from more understanding as to how technology can aid the welcoming of new players into the activity. While studies into companion applications to...[more] |
Lizhuo Li | The second-hand trading system for Cardiff University students | Jianhua Shao | Irena Spasic | 2022-CMT403 |
With the popularity of the Internet, e-commerce business has developed more and more rapidly. People can place orders and pay for all kinds of goods on the website anytime, anywhere. At the same time, the second-hand trading market has gradually entered people's field of vision as an emerging e-commerce category. Modern consumerism has increased tremendously in line with economic development. While this has greatly increased the dynamism of the market, it has also led to a huge accumulation of u...[more] |
Luca Passariello | Analysing the Political and Topical Makeup of r/conspiracy | Alun D Preece | Yuhua Li | 2022-CMT400 |
The damage misinformation and conspiracy theories can cause has risen to prominence in recent years. During the COVID-19 pandemic, conspiracy theories spread via social media have led to numerous disruptive events including attacks on 5G towers and direct action by anti-vaccination groups. In the political arena, QAnon conspiracy theorists were involved in the January 2021 attack on the United States Capitol, threatening the legitimate democratic process of a major nation state.
This project is...[more] |
Magdalena Velkova | An application to help graduate students prepare for placement and graduate interviews | Martin J Chorley | Frank C Langbein | 2021-CMT403 |
Graduating from a prestigious university and getting outstanding academic results are just the first of many challenges a higher-education student must take before landing a full-time job. Unemployment amongst graduates is considered one of the main reasons for low life-satisfaction and high levels of anxiety amongst graduates, according to HESA (Graduates’ subjective wellbeing | HESA. 2020).
Graduate/placement programmes are one of the most wanted and competitive positions as the average emp...[more] |
Malaika Miah | Do people know what emoji ‘really’ mean? | Sandy Gould | Stuart M Allen | 2021-CM3203 |
Billions and billions of emoji are sent around the world every day. The Unicode Consortium defines which emoji exist and assigns a text description to each pictogram. But in reality we find emoji are used in many different ways. Sometimes consciously, sometimes not. In this project, you will try to understand whether people’s understanding of emoji matches the definition given by the Unicode consortium. If not, how do these understandings vary? For this project you will make use of web-program...[more] |
Marley Sudbury | Detecting metastatic tissue in lymph nodes with deep learning | Paul L Rosin | Dave Marshall | 2021-CM3203 |
To track the spread of a tumour, pathologists examine lymph nodes in the surrounding area for metastatic growths. This is done by looking at high resolution scans of slides with tissue taken from the lymph nodes. Deep learning systems have demonstrated a great ability to classify images, and so researchers have looked at applying these techniques to the problem of tissue classification, including lymph node classification, with the aim of creating a system which can aid pathologists. In this pro...[more] |
Mary Zacharias | Smart Home Activity Inference using Network Data | Charith Perera | Carolina Fuentes Toro | 2021Place-CMT403 |
This paper explores the development of a smart home-based activity recognition tool through a multi-stage device-state classification approach, using encrypted network data.
Through a comprehensive literature review and findings from subsequent experimentation, this paper demonstrates that commercial off-the-shelf (COTS) devices, and device activities, can be automatically recognised through patterns in their network activity. Subsequently, it finds that more complex human activities can be con...[more] |
Matthew Harris | How we can elevate our storytelling to better invest our audience in a modern world. | Nervo Verdezoto Dias | Hiroyuki Kido | 2021-CM3203 |
Following from my CM3116 Design Thinking module, I'm hoping to continue my research into how writers can elevate their stories to better engage their audience in a modern world. This project aims to solve the issue of a general lack of engagement within stories being told in modern media.
The aim of this project is to find the most effective methods of engaging audiences in different forms of media, and to identify the ways that writers are able to take advantage of these methods, to elevate th...[more] |
Matthew Herman | automated testing of Web Applications coursework | Martin Caminada | Bailin Deng | 2021-CM3203 |
One of the coursework assignments of Web Applications is to build a site that calculates the date of Easter for a particular year. Currently, much of the testing (and marking) is done automatically. However, with student numbers on the rise, we are interested in having a way to automatically test and evaluate some of the aspects. The difficulty, however, is that this testing needs to work on a wide variety of designs that the students come up with. In particular, we are interested in testing whe...[more] |
Matthew Larby | Theatre Company Website and Backend | Dr Daniela Tsaneva | Chris B Jones | 2021-CM3203 |
Custom Website Features for a Client
Client: Silchester Players – Amateur Theatre Group
IMDB style show history page
•Over 130 shows spanning over 45+ years
•Searchable/Filterable by cast or crew member
•Also shows photos from each show (see next item.)
Custom Image Gallery Widget
•Photos are already stored on Google Photos but theres no embeddable gallery for including it on the website since Google bought out and discontinued the Picasa galleries in 2016.
Blog page
•(Partially Star...[more] |
Mingrui Fang | Chinese Chess AI Player | Yukun Lai | Oktay Karakus | 2021-CM3203 |
The project aims to investigate different AI techniques for building an automatic game player for Chinese chess and then evaluate and discuss their performance and strength through a series of tests and data comparisons.[more] |
Muneerah Al Hajri | Technical and Sentimental Analysis for Stock Price Prediction Using LSTM and GRU | Yuhua Li | Yazmin Ibanez Garcia | 2022-CMT400 |
Any thriving and competitive economy depends heavily on the stock market. By making shares of a company publicly available, it aids in its financial growth. Additionally, it enables people to invest in those businesses and earn from doing so. However, due to the volatility of the stock market, stock trading entails a certain risk. This study aims to minimize this risk by providing a solution for stock price prediction. The solution is based on predicting the stock price using a combination of te...[more] |
Naomi Davidson | Applying Route Optimisation to Rota Generation for Home-Help Services | Richard Booth | Natasha Edwards | 2021-CM3203 |
This project is about developing and implementing an algorithm to solve a particular real-world problem. You are the boss of a company that organises home-help visits for elderly patients. Your staff is made up of a fixed number of support workers who must visit a fixed number of homes, spending a set amount of time at each home. Each patient has preferences about the number and timings (e.g., "not before 10am", "between 1pm and 2pm") of the visits they receive each day. You must assign staff to...[more] |
Noel Brooks | GPU Security Review [INDUSTRY PROJECT] | Eirini S Anthi | George Theodorakopoulos | 2022-CMT400 |
GPUs have developed rapidly in the past decade, both in terms of computational power, available memory, and the types of tasks they can perform. The recent introduction of GPU provision by cloud providers presents significant new risks, but little literature exists around the security implications of GPUs within the cloud. Further, malware has been identified which may be able to execute within GPU memory space, thereby bypassing many existing memory scanning tools. The security of GPUs needs to...[more] |
Nomair Shahzad | Digital Learning – Education of the future | Natasha Edwards | Charith Perera | 2021-CM3203 |
The COVID-19 pandemic resulted in world-wide disruption to life. Whilst all industries have been negatively affected by the pandemic, some have been hit harder than most.
Arguably the most important area affected by the pandemic is the education sector. A joint report published by UNESCO, UNICEF and the World Bank states that COVID-19 pandemic-related school closures affected more than 1.6 billion learners and the current generation of students now risk losing $17 trillion in lifetime earnings (...[more] |
Ohud Alsadi | Security Analysis of the Smart Grid Protocols | Neetesh Saxena | Shancang Li | 2022-CMT400 |
The project aims to analyse current security (features and level) of the existing and implemented smart grid protocols. The project outcomes include exploring security issues, limitations and gaps, and reflecting takeaways with possible recommendation for improving security.[more] |
Pablo Stutt Castro | Automated Region-of-Origin Classification of Traditional Music from Peninsular Spain | Andrew Jones | Stuart M Allen | 2021-CM3203 |
In recent years, interest in the field of Music Information Retrieval (MIR) has grown significantly, particularly in the field of Music Genre Classification (MCR). However, these studies often focus on contemporary musical genres, and traditional music is entirely absent from relevant datasets such as the GTZAN dataset. This project attempts to carry out some initial research in the field of automated classification of audio recordings of traditional music, and to research the challenges that th...[more] |
Peter Snook | Drone forensics investigation | Shancang Li | Padraig Corcoran | 2021-CM3203 |
You will be provided with a few Drone images that can be used to conduct drone foresnic investigation, including evicence extraction from cameras, GPS, connectivities, geolocation match, etc.[more] |
Qin Liu | Detecting Lies in Text | Yukun Lai | Kirill Sidorov | 2022Place-CMT400 |
Lie Detection in text is a very active research field. From new stories to tweets interest in detecting lies is constantly growing.
Many different datasets for training and many different models to do so exist.
This project will explore how these models perform within specific contexts and their generalisation across datasets.
Students need to have good coding skills in python and an interest in machine learning including deep learning.[more] |
Rachael Hanson | Designing an Interactive Application to Promote Healthy Ageing among Older Adults at Home | Nervo Verdezoto Dias | James Osborne | 2021-CM3203 |
Prerequisites:
-Basic knowledge of Human-Computer Interaction and user-centered and/or participatory design methods
-Experience developing mobile and/or web applications in several platforms (e.g., Android, HTML5 & Javascript, etc.)
-Desirable experience with Spanish (not mandatory)
Digital health technologies are becoming increasingly prevalent to support and enhance the everyday experiences of older adults. However, their potential to promote healthy ageing practices has been limited.
T...[more] |
Ray Morrison | Providing corporate leadership with visibility of the residual risks associated with application development across monolithic and microservice architectures. | Amir Javed | Yulia Cherdantseva | 2022-CMT400 |
For large companies with a variety of product lines, corporate level visibility of the compliance of product development teams with secure application development principles is important to give stakeholders assurance that regulatory requirements are being met. To achieve this, companies put in place corporate policies for secure development lifecycles and set maximum risk acceptance levels. The challenge comes in ensuring that the policy is being followed, and the Devs are not being forced to f...[more] |
Rhys Connor | Analysing The Raspberry Pi as a Cost Effective Solution for SMEs | Martin Caminada | Crispin Cooper | 2021-CM3203 |
The objective of this is to analyse Raspberry Pi’s as a low energy and low cost solution for small enterprises and start-ups. This would look at the Raspberry Pi and analyse it when compared to a more traditional server set up.[more] |
Robert Bryant | Sentiment Analysis from Conspiracy Theories in the 2020 US Election | Alun D Preece | Luis Espinosa-Anke | 2022-CMT403 |
In the 2020 US Election there was a great deal of hostile discourse between the supporters of the two candidates; Donald Trump and Joe Biden. On social media platforms conspiracy theories emerged, and took a more prominent place than they had done in any US Election to date.
Using Natural Language Processing with a focus on Sentiment Analysis, this project aims to explore the relationships between the major figures of this election and the sentiment & conspiracies associated with them on Twi...[more] |
Robert Turton | Automatic Generation of Pixel Art | Yukun Lai | Hantao Liu | 2022-CMT403 |
Pixel art is a form digital art where characters are represented using a small number of pixels. It was popular for video gaming, and still useful nowadays for various applications ranging from icons to animation. However, traditional approaches of pixel art generation are very time-consuming and require expertise. Recent work considers automatic generation of pixel art. The aim of the project is to develop a prototype system that achieves automatic generation of pixel art by implementing some r...[more] |
Ruibo Cheng | examination system | Asma Irfan | Juan Hernandez Vega | 2022-CMT404 |
In China, the outbreak of COVID-19 is still affecting everyone's daily study and life, including the elderly, children, office workers, teachers and students. Outbreak not only for students, brings inconvenience in life, also brought difficulties in learning, which is one of difficult to offline test, outbreak also makes teachers is not convenient to write in the office, offline test for schools, enterprises and other institutions, time-consuming and site costs, labor costs, and overhead cost is...[more] |
Ruslan Levond | Develop an IoT Edge device to Capture and Classify Species using Sounds to Support Wildlife Conservation Activities | Charith Perera | Víctor Gutiérrez Basulto | 2021-CM3203 |
Wildlife has been in danger for quite some time from various kinds of human activities, ranging from directly destroying habitat to impact from climate change caused by human's unsustainable way of living. Many organisations have established conservation projects and activities to try to mitigate the effects and save wildlife, one of the most important activities of which is monitoring species. Automatic sound recognition systems have proven to be an effective tool used during conservation activ...[more] |
Rytis Derzinauskas | Utilising technology to improve the shopping experience in grocery stores of customers with dietary restrictions | Nervo Verdezoto Dias | Federico Liberatore | 2021-CM3203 |
My topic area is 'Customers with dietary restrictions'. Whether that would be because of their allergies, ethical beliefs, religion, or health condition.
My aim is to find an easier everyday solution for customers to quickly access information whether a product in a grocery store has any ingredients that they cannot consume. This will help both customers and businesses avoid misfortunes where a person consumes a product that has ingredients they are allergic to or do not want to consume.
My ...[more] |
Safah Ahmed | The Role of Technology on Women's Safety | Carolina Fuentes Toro | Natasha Edwards | 2021-CM3203 |
I have started work on this topic area in the Design Thinking and prototyping module, where I have conducted initial interviews to get more insight around the problem and began to identify the solution. I want to develop this project further by doing more research and interviews to create a prototype of the solution, this is likely to be wearable technology such as a smart watch with GPS tracking features.[more] |
Samantha Hughes | Spelling Practice / Spelling Test - tailored toward students with Dyslexia. | Helen R Phillips | Yulia Cherdantseva | 2021-CM3203 |
This project will consider an Automated or Semi-Automated Assessment Tool, supporting children to undertake spelling tests as part of synchronous (potentially in-class) or asynchronous learning materials. This will be tailored towards students with dyslexia as they will be able to change font colour, style and background colour. Additionally, it will allow the teacher to show more or less feedback depending on the severity of the case.
My client for this project will be Matthew Moloughney.[more] |
Samuel Bowen | Natural Language Processing (open proposal) | Jose Camacho Collados | Jing Wu | 2021-CM3203 |
This is a placeholder proposal for students interested in Natural Language Processing (NLP). I am open to suggestions in different areas including applications of NLP techniques in specialized domains. For this project, the student should have a clear idea of the area they want to work on (even if of course this can be further discussed and refined). Ideally, the student should have experience in Python for NLP/Machine Learning.[more] |
Sam Winkworth | Interactive Data Science to Help Tackle Climate Change | Charith Perera | Stuart M Allen | 2021-CM3203 |
This project suits for a student who is highly motivated to make an impact on wildlife conservation activities, support climate change mitigation and fight against poaching activities. The student will be supported and advised by a team including academics and PhD students. This project is a collaboration between Cardiff University’s Danau Girang Field Centre (DGFC) (https://www.cardiff.ac.uk/danau-girang-field-centre), School of Bioscience and the School of Computer Science.
Danau Girang Fie...[more] |
Saul Ollett | Cardiff Youth Service Digital platform for staff | Catherine Teehan | Bailin Deng | 2021-CM3203 |
Cardiff Youth Service are looking for a digital platform, tool or application for the workforce to be able to work digitally agile and embrace technology. The platform will allow staff and volunteers to plan youth work sessions, record reflections and view upcoming service events, a clear link to www.Cardiffyouthservices.wales all of the above which will then be able to be viewed by a manager for sign off and then to senior management team[more] |
Sebastian Thomas | Wales Safeguarding Repository: Document Discovery via Natural Language Processing | Alun D Preece | Jose Camacho Collados | 2022Place-CMT400 |
The Wales Safeguarding Repository (WSR) is an online collection of safeguarding review reports containing valuable information about learning experiences in tackling serious incidents involving children and vulnerable adults. Research in the School of Social Sciences at Cardiff University has highlighted the need for better learning to emerge from these reviews, in order to enhance the future safeguarding practices of professionals such as police officers, social workers and those working in hea...[more] |
Shaikha Alshehhi | Machine learning model to identify attacks on IoT device. | Amir Javed | Hiroyuki Kido | 2021-CM3203 |
The project aims to build a machine learning model to identify an ongoing cyberattack on IoT devices. The ML model will be built by analysing a publicly available labelled dataset https://www.stratosphereips.org/datasets-iot23 .
The project will be carried out in three stages :
Stage 1
1.Downloading and cleaning of the dataset. This will require you to download captured pcap file of malicious traffic.
2.Transforming the dataset into a machine-readable format.
Stage 2
By using a programming l...[more] |
Shakur Duale | Web Application that uses algorithms to automatically identify patterns on financial charts. | Federico Liberatore | Parisa Eslambolchilar | 2021-CM3203 |
My final project proposal is a web application that uses custom algorithms to identify candlestick patterns on financial charts while also teaching users what they are and how each pattern works.
Candlestick patterns are an essential tool in trading any financial market. Therefore, a solution like this would be educational and help newer traders be more successful and also save time for veteran traders who are analysing charts manually.
A lot of potential features are still undecided.[more] |
Sichu Huang | Segmentation of herbarium sheets | Paul L Rosin | Hiroyuki Kido | 2022-CMT400 |
Deep learning model will be used to perform segmentation of Herbarium sheets provided by the University of Wyoming. As a starting point, the resources (pre-trained model and data) from the paper "Cross-validation of a semantic segmentation network for natural history collection specimens", Nieva de la Hidalga, 2022 will be used.[more] |
Smit Jitesh | Building energy usage prediction | Yuhua Li | Helen R Phillips | 2021-CM3203 |
Prediction of building energy consumption is important to electricity distribution, management and environment. This project will develop a machine learning model to predict energy usage based on historic usage rates and observed weather. A relevant project can be found at https://www.kaggle.com/c/ashrae-energy-prediction/overview.
This project requires good programming skills (preferably in Python), knowledge of machine learning (regression).[more] |
Sophie Wells | To what extent does the effect of a denial of service attack on a public cloud environment differ against a private cloud environment and a physical environment | Andrew Hood | George Theodorakopoulos | 2022-CMT400 |
The project would entail setting up a physical, private cloud and public cloud environment. Then, a denial of service attack would be performed and closely monitored to measure the effect it had on each environment in order to compare them. This would allow patterns to be shown as well as any differences between simulate and real data.[more] |
Su Li | Industry Partners Relationship Management System | Wendy K Ivins | Sylwia Polberg | 2021-CM3203 |
Over the last ten years the School of Computer Science and Informatics has built up its engagement with industry and other external partners to provide meaningful opportunities to engage with students. These include:
Placements – including Professional Placement Year, Summer Placements, Work Experience; International – including Study Abroad and Global Opportunities; Projects – where partners act as clients and propose project ideas; Employability– including networking events, promotin...[more] |
Tapan Agarwal | Learning to Detect and Recognise Road Signs | Yukun Lai | Martin Caminada | 2021-CM3203 |
To improve driving experience, computer vision techniques are widely used for providing assistance. The project aims to develop a prototype that implements some machine learning technique to detect and recognise road signs from real world camera footage. Such technology is also an essential component for autonomous driving.[more] |
Thomas Clare | Simulating a Robot Swarm in a Factory setting | Bailin Deng | Helen R Phillips | 2021-CM3203 |
The purpose of this project is to develop a visualisation and planning tool for large scale robot warehouses. Allowing the user to change characteristics and see how they can affect the efficiency of the warehouse, and in doing so allow users to find optimal characteristics. In addition to this it will also act as a visualisation tool for teaching people how robots can be used for large scale automation in this style of factories. It would also serve to demonstrate the advantages of using artifi...[more] |
Thomas Lafferty | Medical image processing - lesions | Paul L Rosin | Yukun Lai | 2021-CM3203 |
This project will use a large database of images of skin lesions and attempt to perform automatic recognition of melanomas (cancer). The first step will be to segment the lesions, i.e. locate the region of interest in the image. This will be done by using rules to combine several techniques. Next, the regions are described by their shape , colour and texture to identify whether the lesion is malignant or not. The project will be based on techniques from the following paper:
H. Ganster, A. Pinz...[more] |
Thomas Lea-Redmond | Flake8 Linter for On-going Feedback on Student Coursework | Stuart M Allen | Xianfang Sun | 2021-CM3203 |
Based on a project I did during the Summer for the university. Project brief was a proof-of concept coursework evaluator using Flake8. The idea was to take the common coursework feedback ie dont use global; or this function should return an integer value, and make a tool that evaulated the students work and give them the tailored feedback. Continueing this work would include making this more apllicable to other settings for example other COMSC modules; and a "does this actually work" evaluation...[more] |
Thomas McVeigh | Technocamps Islands: Using Minecraft for Education to Develop Teaching Resources for Computer Science Topics and Concepts | Catherine Teehan | Omer F Rana | 2022-CMT403 |
Education is a big part of life and has a wide range of content delivery methods, from classroom lessons to worksheets there are many ways in which people can be taught. This project aims to see if an education resource can be created inside of the game Minecraft for Education while adhering to the 2022 Welsh Curriculum for Science.
First research shall be carried out into using game-based learning compared to gamified learning to see if game-based learning through Minecraft for education is th...[more] |
Tian Sou Zen Tan | Visualizing deep reinforcement learning | Jing Wu | Federico Liberatore | 2021-CM3203 |
Reinforcement learning (RL) enables agents to learn by interacting with the environment. The agent collects experience from trail-and-error and optimises its action rules from the environment feedback. In recent years, deep reinforcement learning, such as DQN [1], has achieved superhuman performance in playing chess, Atari games, etc. However, interpreting the behaviour of a deep RL agent is challenging, due to both the 'black-box' nature with deep learning and the randomness and long-time learn...[more] |
Tiecheng Wang | Analysis of face detection and exploration | Xianfang Sun | Padraig Corcoran | 2022-CMT400 |
This study compares different face recognition techniques, evaluates them, and chooses the most effective technique based on a face recognition system that is comparatively complete. Find solutions to reduce storage needs while accelerating retrieval.
Face detection, face feature value extraction, and face feature value retrieval are the three stages of a full face retrieval system. Among them, face identification utilizing the MTCNN model is currently more used in the industry. For face featur...[more] |
Tim Lane | Data Anarchy: Building A Social Media Platform Where Users Control Their Data | Kathryn Jones | Natasha Edwards | 2021-CM3203 |
Despite the introduction of various laws and measures seeking to regulate digital data in the past few decades, there are still a huge number of issues surrounding data privacy and data control that have not been addressed. While major laws and regulations such as GDPR and PIPL do have a significant influence globally they only capture a small subset of problems surrounding data as they focus primarily upon personal data. From a technical perspective, centralised web applications are also inhere...[more] |
Timothy Capili | Species distribution modelling with machine learning | Chris B Jones | Bailin Deng | 2022-CMT400 |
This project will will use machine learning methods to predict the geographical distribution of wildlife species. Ground truth data for species distribution can be obtained from a citizen science portal such as the National Biodioversity Network. Data to characterise and differentiate between different locations will be obtained from various sources that record environmental features such as climate, land cover, elevation, soil types and population density. The project will experiment with class...[more] |
Tom Alfano-Hughes | Spelling Practice / Spelling Test | Helen R Phillips | Federico Liberatore | 2021-CM3203 |
This project will consider an Automated or Semi-Automated Assessment Tool, supporting children to undertake spelling tests as part of synchronous (potentially in-class) or asynchronous learning materials. This will be tailored towards students with dyslexia as they will be able to change font colour, style and background colour. Additionally, it will allow the teacher to show more or less feedback depending on the severity of the case.
My client for this project will be Matthew Moloughney.[more] |
Tyler Jenkins | Music makes you run faster... | Martin J Chorley | Carl Jones | 2021-CM3203 |
Both Spotify and Last.FM allow you to access a list of a user's recently played tracks. Multiple services exist for tracking exercise (Strava, Fitbit, Runkeeper, ...) and associated data (heartrate, pace, ...). I'd like to create an app that allows you to compare your exercise data with your recently played music over a large time period to determine whether the music you were listening to has any impact on your performance in the exercise.
This could be created as a secure web application acc...[more] |
Vicky Fernandes | An investigation into Car Hijacking [INDUSTRY PROJECT] | Eirini S Anthi | Amir Javed | 2022-CMT400 |
The project will utilise the new car simulator recently acquired in the school to investigate possible attack vectors on CANBus. The aims of the project are:
- Understand the protocols and functionalities of the CanBus network used on the simulator
- Identify possible attacks
- Collect data when the car is not under attack
- Launch attacks to interrupt the car's normal operation and collect data
- Propose mechanisms to make the system more secure[more] |
William Glover | Prostate MR Image Segmentation | Frank C Langbein | Alia I Abdelmoty | 2021Place-CMT403 |
The aim of this project is to investigate approaches towards automatically segmenting the prostate in MRI datasets, based on the PROMISE12 grand challenge, (promise12.grand-challenge.org) and also our own, internal data set (other data sets may also be used, of course). This is part of a research project for early-stage prostate cancer detection. You may develop your own approach or test and then extent already published approaches. Which technique you are using is your choice, but it is likely ...[more] |
Xiao Liu | Machine learning of where people look in images/videos | Hantao Liu | Yuhua Li | 2022-CMT403 |
Do you know where you are looking at while watching online videos? Do you know where the computers think you are looking at? Modelling visual saliency - predicting where human eyes pay attention to in visual content - has been a very active research area over the past few years in both academia and industry. This project aims to analyse visual attention data (both ground truth and predicted) in emerging applications in image and vision computing, such as computer rendered images, high-dynamic-ra...[more] |
Xin Zhang | Do people know what emoji ‘really’ mean? | Sandy Gould | Dr Katarzyna Stawarz | 2022-CMT403 |
Billions and billions of emoji are sent around the world every day. The Unicode Consortium defines which emoji exist and assigns a text description to each pictogram. But in reality we find emoji are used in many different ways. Sometimes consciously, sometimes not. In this project, you will try to understand whether people’s understanding of emoji matches the definition given by the Unicode consortium. If not, how do these understandings vary? For this project you will make use of web-program...[more] |
Yao Xiao | Generating and visualising realistic plants | Yukun Lai | Sylwia Polberg | 2021-CM3203 |
Plants come with complicated structures and lots of details. They are also very common in our daily lives. In computer graphics, to render a realistic outdoor scene, plants are often needed to be constructed. In many cases, we don't need to reconstruct a specific tree, but more likely expect the tree to be realistic looking. There are a large number of literatures looking at different approaches of generating trees or other plants in the computer. Practically, you can use e.g. L-system (http://e...[more] |
Yongyi Wu | Face image decomposition and manipulation | Jing Wu | Chris B Jones | 2021-CM3203 |
The appearance of a face is a joint effect from multiple factors including the shape, texture, and environment illumination. Altering any of these factors will change the appearance presented in face photos. This project will adopt the decompose-alter-combine process to manipulate the face appearance in photos. The student is expected to 1) explore and implement existing methods to decompose a face photo into different visual cues, e.g. facial contours, shading, reflectance/texture; Candidate te...[more] |
Yuechao Wang | Student Learning System App——Mobile Application | Beryl Noe | Louise Knight | 2021-CMT404 |
1、Target & Background
● Background
Due to Novel coronavirus pneumonia (COVID-19), in order to protect the safety of students, schools in most countries around the world change from offline teaching to online teaching, but the current student learning system can only view course materials and course playback on the computer, it cannot be done through mobile phones or ipad.
● Target
Realize that the student learning system on the mobile phone can watch the live broadcast of the cou...[more] |
Yueying Tian | Designing an Interactive Application to Support Caregiver's Feeding Practices of Young Children | Nervo Verdezoto Dias | Carolina Fuentes Toro | 2022-CMT403 |
Prerequisites:
-Basic knowledge of Human-Computer Interaction and user-centered and/or participatory design methods
-Experience developing mobile and/or web applications in several platforms (e.g., Android, HTML5 & Javascript, etc.)
-Desirable experience with Spanish (not mandatory)
Mobile applications are becoming increasingly prevalent to support self-care practices aiming to enhance people’s health and wellbeing. However, their potential to promote children’s healthy eating practices...[more] |
Yukun Ge | Machine learning of where people look in images/videos | Hantao Liu | Parisa Eslambolchilar | 2022Place-CMT403 |
Do you know where you are looking at while watching online videos? Do you know where the computers think you are looking at? Modelling visual saliency - predicting where human eyes pay attention to in visual content - has been a very active research area over the past few years in both academia and industry. This project aims to analyse visual attention data (both ground truth and predicted) in emerging applications in image and vision computing, such as computer rendered images, high-dynamic-ra...[more] |
Yuxi Wu | Forecasting Unit Sales of Retail Goods | Yuhua Li | Hantao Liu | 2022-CMT400 |
Relevant information about this project can be found at https://www.kaggle.com/c/m5-forecasting-accuracy/overview[more] |
Zhiliang Xiang | Neuro-symbolic approaches for Abstract and Relational Visual Reasoning Tasks | Víctor Gutiérrez Basulto | Beryl Noe | 2021-CMT400 |
Recently, there has been a lot of progress on basic vision tasks using neural approaches. However, it is still a big challenge the development of approached for tasks combining vision with abstract and structural reasoning. A main question from this research is whether pure deep learning is the ultimate way of doing abstract visual reasoning [1].
In another direction, there has been an increasing interest in the development of AI systems that combine the strengths of neural systems (e.g. dealin...[more] |
Zidong Lin | Image Inpainting in Generative Adversarial Nets Combining with Depth Information | Yukun Lai | Yipeng Qin | 2022-CMT403 |
Digital images are versatile nowadays. However, captured images may not contain the exact content of interest. For example, an image may contain extra objects/persons that are not intended to be included. It is therefore highly demanding to develop more intelligence image manipulation techniques. Recent advances in deep learning and generative adversarial networks provide a much more powerful tool for image manipulation.
Recently, with the development of monocular depth estimation, it is possi...[more] |