PATS2
You are not logged in
Time stamp: 17:35:05-21/7/2024

[Login]

2012 | 2013 | 2014 | 2015 | 2016 | 2017 | 2018 | 2019 | 2020 | 2021 | 2022 | 2023 | 2024
[PDF/Print]

Projects from 2022

StudentTitleSupervisorModeratorModule
Aakash Kumar Gurung[Industrial] Forensic Analysis of Watsapp/Kik/Sanpchat/Instagram/Facebook/Telegram on Android and iOS devices.Shancang LiLaurence Semmens2022-CMT400
This project focuses on looking for research to be conducted on common messaging apps such as: · Whatsapp · Kik · Snapchat · Instagram · Facebook Messenger · Telegram Aims: · Provided an overview of the applications features and differences on both platformers. · Identify the best extraction types (Logical, File System & Full File System) and extraction software/hardware (UFED, XRY and Oxygen etc…) for extracting data...[more]
Aaron JamesVizDoom AI via Deep Reinforcement LearningFrank C LangbeinSteven Schockaert2021-CM3203
In this paper, I will adapt an existing algorithm to the ViZDoom visual deep reinforcement learning library and try to find optimal algorithmic settings for some default scenarios provided by the library under the PPO and A2C algorithms. I will attempt to further this into playing The Ultimate DOOM once these settings are found. I will follow existing novel methodologies such as transfer learning, curriculum learning, and reward shaping to allow the machine learning algorithm to develop an under...[more]
Abdullah AlshattiAnomaly Detection in Gas Pipeline SCADA SystemsNeetesh SaxenaShancang Li2022-CMT400
With the great industrial expansion and development in recent times, appropriate tools and systems need to be used to ensure the proper functioning and operation of these systems. One of most commonly used systems is the Supervisory Control And Data Acquisition system (SCADA), it provides supervision, control and monitoring of the system through the use of an extended network of sensors and actuators along with programmable logic controllers managed through Human Machine Interface devices. All o...[more]
Abdullah BarayanCredit Card Fraud Detection using novelty detection techniquesYuhua LiAlun D Preece2022-CMT400
Credit card fraud is a growing issue affecting the financial industry and cardholders worldwide, resulting in billions of dollars in losses annually. A considerable amount of research has been done to detect credit card fraud. Most proposed machine and deep learning fraud detection approaches use a supervised learning methodology that requires appropriately labelled and balanced training datasets. Organising these datasets takes a great deal of time and effort. It is difficult for these approach...[more]
Adekoyejo CokerCardiff Youth Service – Digital Youth Club (Discord)Catherine TeehanVíctor Gutiérrez Basulto2021-CM3203
Over the past 18 months Cardiff Youth Service has needed to offer a range of digital services and opportunities to young people in the city. Moving into a Covid recovery model we still want to offer these services and opportunities as some young people prefer accessing our service online. Young people have told us they would like to engage with our service through discord and we now have a young person steering group to tell us how it should look, what it should include and what should be on off...[more]
Akin KakiSearch by image in camera trap datasetCharith PereraCarolina Fuentes Toro2021Place-CMT400
This project focuses on designing a technique that allows researchers to search for images in the same location in a camera trap dataset by using few images from that location or using a single image when the whole dataset is processed using the technique. Using the same principle, the presence of animal in the camera trap image is also identified. and finally by using the results from the above, this project also focus on how normalization of data can affect the perfomance of a machine learning...[more]
Alexander JonesCyber Security Education Online PortalYulia CherdantsevaOktay Karakus2021-CM3203
The aim of this project is to develop a web-application for hosting cyber security educational material for audiences of different ages starting from primary school and up to the MSc level, and beyond. The application will have must allow access to educational material, allow filtering of material based on different criteria. User roles in the application will include: Admin, Educator, and Participant. The access permissions will vary based on the role. The material stored will vary by type and ...[more]
Alex Hayman Creating Cyber Security Training Exercises for DevelopersYulia CherdantsevaFernando Loizides2021-CM3203
Web applications are often a point of interest for cyber criminals as they are publicly available online and contain personal data, user credentials and financial information. Once the application is compromised, hackers can pivot around the network where the website is being hosted and target more machines. It is essential for developers to have good security practices when developing websites. There is also a growing market in gamification of cyber security learning. Websites such as HackTheB...[more]
Ali AtiehDesigning a digital diary for Caregivers: Kitabuk Digital DiaryCarolina Fuentes ToroIrena Spasic2022-CMT403
This project involves the design/development/evaluation of a digital diary. This project investigates the useability of a digital diary with informal caregivers as a focus group to produce high-level guidelines that will enable researchers and developers to create a digital diary system that meets the expectations of informal caregivers.[more]
Andrei CojocariuGenerating fake travel source and destination location pairsPadraig CorcoranMatthew J W Morgan2021-CM3203
Route planning services, such as Google Maps, require users to submit their source and destination location pairs. For example, if I want a route from my home to the cinema, I submit the location of my home and the location of the cinema. If a user is concerned about their privacy, they may wish to obfuscate or hide the true locations in question. This can be achieved by submitting to the service provider a set of fake source and destination location pairs along with the true location pair. If t...[more]
Andrew JonesDeveloping Machine Learning Models for Assessing Fantasy Premier League Player PerformanceFederico LiberatoreMartin Caminada2022-CMT403
Overview Creating machine learning models, which will use open source event and Fantasy Premier League (FPL) data, in order to evaluate performance of players. For example is a player over/under performing, is this performance sustainable or is it likely to regress to mean. Creating a model for 'expected points', this can be compared to actual points scored by a player to help inform a person's decisions when selecting a fantasy football team. The Problem in More Depth Football in recent year...[more]
Anthos KountourisAnalysing the discourse related to electrical vehicles on social media.Padraig CorcoranAmir Javed2021-CM3203
The UK government has committed to transitioning from fossil fuel to electrical vehicles. Many people support this goal because it will result in a more sustainable world. However, many others have concerns about the transition. These concerns include not being able to afford the cost of expensive new electrical vehicles and not being able to charge their vehicles. The aim of this project is to perform an analysis of the discourse related to electrical vehicles on social media and specifical...[more]
Asrar Esmaeel T AlahmadiCyber Risks Assessment for Connected and Autonomous VehiclesNeetesh SaxenaYulia Cherdantseva2022-CMT400
This project aims to understand connected and autonomous vehicles use case scenario, predict risks for critical assets, perform modelling assessment, and develop a GUI/webpage for situational awareness.[more]
Astrid Rickaby-PrattCardiff University Staff Web-AppYulia CherdantsevaSylwia Polberg2021-CM3203
Universities' academic staff, Cardiff included, have been subject to overwork without compensation consistently for over a decade. The aim of this project is to develop a staff-focused web application similar to the Cardiff University student app, but meeting staff needs and expectations. It focuses on both requirements gathering and specification as well as prototype implementation, and pays homage to possible cyber-security threats as a standalone online program that may be subject to attack.[more]
Bingjie LuSolving N-Puzzle ProblemsYukun LaiPaul L Rosin2022-CMT403
The n-puzzle is known in various versions, including the 8 puzzle, the 15 puzzle, and with various names (Gem Puzzle, Boss Puzzle, Game of Fifteen, Mystic Square and many others). It is a sliding puzzle that consists of a frame of numbered square tiles in random order with one tile missing. If the size is 3*3, the puzzle is called the 8-puzzle or 9-puzzle, and if 4*4, the puzzle is called the 15-puzzle or 16-puzzle. The object of the puzzle is to place the tiles in order (see diagram) by making ...[more]
Bojun LiangIoT security (multiple projects)George TheodorakopoulosNeetesh Saxena2022-CMT400
IoT devices (smart lightbulbs, smart plugs, smart cameras, etc) are entering the market without much regard for security. A project in this area will focus on designing and implementing attacks against IoT devices, or on defences that mitigate existing attacks. This project requires either hands-on experience with or willingness to learn network traffic sniffing and pentesting at the level of CMT121. If you are interested, please join the meeting at 10:00am (UK time) on Thuirsday 3 March at the...[more]
Brandon DaviesAnalysing Conspiracy Theories on Social and Online Media [Multiple Projects]Alun D PreeceNervo Verdezoto Dias2022-CMT404
The damage misinformation and conspiracy theories can cause has risen to prominence in recent years. During the COVID-19 pandemic, conspiracy theories spread via social media have led to numerous disruptive events including attacks on 5G towers and direct action by anti-vaccination groups. In the political arena, QAnon conspiracy theorists were involved in the January 2021 attack on the United States Capitol, threatening the legitimate democratic process of a major nation state. This project is...[more]
Brayan ThomasDesign and develop an engaging web application to educate users on data collection in the context of Ecommerce websites.Martin J ChorleyJing Wu2022-CMT403
I have proposed the design and development of data collection self awareness web application, as my current is goal is to be a web developer I have prosed this project as my current goal is to become a web developer. I have chosen this project because I think I can gain a lot of experience in web development whilst creating a web application using Django. I have chosen Django over Flask for a couple of reasons. Firstly, I already have some experience in Flask, so developing a website using Dj...[more]
Chilli GoodmanUsing Minecraft for Education to Teach about the Impact of Rising Sea Levels on Welsh Coastal RegionsCatherine TeehanLouise Knight2021-CM3203
Wales Coastal Monitoring Centre - A Welsh Government funded organisation based in the Vale of Glamorgan, focusing on the monitoring of Welsh coastlines with regard to erosion, flood risk and coastal defences. As part of their programme, they are currently developing a series of lessons to be delivered within Primary schools across Wales educating children on the impacts of climate change, coastal erosion and flooding. To support the project, you will build a Minecraft for Education world that wi...[more]
Ching-Chan LinPrivacy of data visualisation and restriction of data sharingParisa EslambolchilarYuhua Li2022-CMT403
This project aims to investigate privacy issues of personal health data visualisation shared on online health data platforms. When people share their health data visualisation like daily steps and calories on a web platform, their personal information could be identified by the data trends and analysis. Therefore, this project creates interactive visualisations on a web platform and invites participants to compare them the visualisations and fill in a questionnaire to understand people’s thoug...[more]
Daniel RedlyDevelopment and Evaluation of a Web Application for Creating Click Tracks with Advanced Rhythmic FeaturesDave MarshallKirill Sidorov2022-CMT403
My idea is to create a web application to act as a metronome/click track generator with advanced features such as polyrhythms, odd time signatures and accelerando and ritardando (speeding up and slowing down). To my knowledge, some such web applications exist already which can handle odd time signatures and polyrhythms, but none with accelerando and ritardando, so I would focus mostly on this. A user would be able to define a start and end tempo, and choose a function to determine the rate of ch...[more]
Daniel WeirGenerating Natural Language Descriptions of Rainfall Radar DataPadraig CorcoranOmer F Rana2022-CMT403
The Met Office provides an API which allows users to download rainfall radar data for the UK. That is, a time series of rainfall maps corresponding to the UK (https://www.metoffice.gov.uk/services/data/datapoint). The aim of this project is to create a computer system which transforms a given time series of rainfall maps into a corresponding natural language description. For example, a natural language description may contain the expression “It rained very heavily from 9AM to 10AM in Cardiff c...[more]
Dan LawAutomatic analysis of music performance styleAndrew JonesFederico Liberatore2021-CM3203
One of the fundamental problems in computational music is the analysis and modelling of performance style. The aims of this project are as follows: (1) Investigate what relevant performance features (e.g. variations in dynamics, tempo, timbre) can be reliably extracted from audio recordings. (2) Provide a means of exploring which of these features are relevant to the perception of performance style. (3) Investigate what operations can be applied to styles, e.g. interpolation between styles, styl...[more]
Devaang MisraHuman Robot Interaction in Healthcare: supporting everyday taskCarolina Fuentes ToroYulia Cherdantseva2021-CM3203
As the title suggests, the problem being tackled here is supporting everyday tasks in a Healthcare environment with the help of robots. The robot being used here is Pepper, a semi-humanoid robot that was manufactured by SoftBank Robotics. In a healthcare environment, Pepper can perform a myriad of everyday tasks, involving greeting hospital visitors, carrying small talks with patients or their families and keeping them entertained, communicating with nurses to provide instructions, Pepper can al...[more]
Dominyque MohammedImplementation of a data privacy protection method for transaction dataJianhua ShaoJames Osborne2021-CM3203
As an increased amount of transaction data being gathered and stored, how to protect the private information contained within such data sets becomes an important issue. This project aims to implement one of the exisiting algorithms for anonymizing transaction data. The system is expected to be developed in Python.[more]
Ellis DoranIoT security (multiple projects)George TheodorakopoulosNeetesh Saxena2022-CMT400
IoT devices (smart lightbulbs, smart plugs, smart cameras, etc) are entering the market without much regard for security. A project in this area will focus on designing and implementing attacks against IoT devices, or on defences that mitigate existing attacks. This project requires either hands-on experience with or willingness to learn network traffic sniffing and pentesting at the level of CMT121. If you are interested, please join the meeting at 10:00am (UK time) on Thuirsday 3 March at the...[more]
Emima VaipanSSID Stripping Attack: From Vulnerability to Tangible ThreatEirini S AnthiPadraig Corcoran2021-CM3203
This project aims to research and develop hardware tooling that can enable a range of attacks, including a phishing attack, against IEEE 802.11-compliant devices. This attack was recently detected in iPhones and can have lots of severe consequences such as a leak of sensitive data. More specifically, this vulnerability enables SSIDS to be crafted and allows for unintended behaviour in phones whey they ingest them. This project will involve creating a hardware rogue Access Point that will imple...[more]
Esther PearsonHow can incentives be used to change cybersecurity behaviours [INDUSTRY PROJECT]Eirini S AnthiGeorge Theodorakopoulos2022-CMT400
The shift to hybrid home/work environments has blurred digital boundaries yet people's organisational and personal security habits can be different. This project will investigate how do individual and organisational behaviours influence people's security behaviours in hybrid home/work environments, and what individual and organisational incentives could be used to change their security behaviours? This project will be co-supervised by our industry partner Anete Poriete from Cybersmart.[more]
Ethan CaldeiraCreating an Interactive Virtual Companion to Support and Enhance Mental WellbeingNervo Verdezoto DiasNeetesh Saxena2021-CM3203
This project aims to create a mobile application that will make users aware of their mental wellbeing and help users deal with any stress they might face. The application will guide users through becoming more mindful via a variety of different means. Simplifying these methods by using a virtual companion to increase user engagement, so that all are able to get the benefits.[more]
Eun-Kyul KoWhen is the best time to exchange your money?Parisa EslambolchilarSylwia Polberg2021-CM3203
The foreign exchange market is so unpredictable; you never know when is the best time to exchange your money. Especially with current political problems such as Brexit and COVID-19 it makes the currency fluctuate even more. As an international student I often face problems regarding fluctuating exchange rates. With the same amount of money you send over from abroad, one day you can get a few percent more, and the next day you get a few percent less. Although the percentages are less than 1%, dep...[more]
Evan SmithGame with 2D or 3D graphics, dynamics, networking [multiple projects, must be specialised in discussion]Frank C LangbeinCarolina Fuentes Toro2021Place-CMT400
2D "Fall Guys" like game. For this project, you may choose an arbitrary game that is played in a 2D or 3D environment with one or more players. The aim of this project is to implement a user interface and game engine with 2D or 3D graphics and suitable dynamics (physics) simulations to run this game and potentially add networking capabilities. The focus could be specifically on 2D or 3D environments, how to generate, store, manage and render them. You could consider specific rendering effects, e...[more]
Finn MillinerSecurity Analysis in SMS-based ApplicationsNeetesh SaxenaBailin Deng2021-CM3203
This project aims to analyse the security level of the applications and services that are either based on Short Message Service (SMS) (such as SMS-based mobile-banking) or do use SMS to provide some sort of service, such as in One-time Password (OTP). Outcome will reflect research-based advantages and limitations with quantitative information about the security level of the application and services used. The work will also provde recommendations to address the existing/found security issues.[more]
Francesco ZucchelliDetecting DDoS attack on a networkAmir JavedJose Camacho Collados2021-CM3203
Using Cyber range to simulate DoS attack on a network – Within the project student will work on already collected dataset. They will then pre-process the data and build supervise/unsupervised machine learning model to detect an ongoing attacks.[more]
George GraingerDeveloping a web application to Visualise IoT Data for Abacws BuildingCharith PereraMartin Caminada2021-CM3203
The Internet of Things (loT) is a recent emerging technology that provides substantial amounts of data previously inaccessible to humanity. The aim of this project is to develop a system to make it easier to access the data produced by/for the Cardiff University Computer Science Abacws building. Making this data more accessible opens the door to a range of possible applications and people wishing to access, process and utilise sensor data for the building. During this report I will explain the t...[more]
George Haddon-GillGenerating fake GPS trajectoriesPadraig CorcoranHiroyuki Kido2021-CM3203
Many location based services (LBS), such as Strava, require users to submit their GPS trajectory which may come from a smartphone or Sat Nav system. If a user is concerned about their privacy, they may wish to obfuscate or hide their true trajectory. This can be achieved by submitting to the LBS a set of fake trajectory along with the true trajectory. If the LBS cannot differentiate between the true and fake trajectories, they can determine which is the actual true trajectory. The goal of this p...[more]
Georgios PsevdiotisMyBookChoice - A reading books recommender algorithm and websiteDr Daniela TsanevaHantao Liu2021-CM3203
Sometimes people find it difficult to decide what book to read next or are unaware what new books have been printed. The aim of this project is to create a recommender system in the form of a web site, which uses a recommendation algorithm returning the results of recommended books to the user depending on the criteria they have selected. The website would have to provide visual selection of the desired book features and easy to use, as well as responsive, while also being efficient in recommend...[more]
Gregor WebsterFirst Person Shooter Bots Via Reinforcement LearningFrank C LangbeinYulia Cherdantseva2021-CM3203
This project's focus was the building of better FPS bots through the use of reinforcement learning, and specifically the area of sample biassing as a means of achieving that improvement. To find out if sample biassing was a useful improvement, data needed to be gathered on both unbiased and biassed programs. To that end, a simple reinforcement learning algorithm was adopted and adapted to generate the data needed. After six runs, three unbiased and three with varying levels of bias, sufficient d...[more]
Hanci QuanImage to Speech SystemBailin DengVíctor Gutiérrez Basulto2022-CMT400
In this project, you will build a prototype system that converts the text inside an image to a speech. Such a system can be useful for people with visual impairment. The hardware consists of a computer attached to a camera. The system will use computer vision libraries to extract text that is inside an image captured by the camera, and then use text-to-speech APIs to convert the text to audio. The system is expected to be deployed on a PC with a webcam, or on a raspberry PI with a camera module.[more]
Haoda YeCreate a localhost 3D game with Chinese ink painting rendering styleFrank C LangbeinCharith Perera2022-CMT403
This project aims to create a 3D Multiplayer game with a Chinese ink painting rendering style in the Unity Game engine. The project's core is to design shaders that can showcase Chinese ink style and a simple asynchronous local-host network communication framework. The core of the shader displays the silhouette line of the model, and the blur samples the ramp texture. The key to the network framework is the state synchronization of sockets and custom messages. The gameplay is not the focus of th...[more]
Harvey AllenSentiment Analysis of Financial News Headlines with Market ComparisonIrena SpasicMartin J Chorley2021-CM3203
This project is based on the following Kaggle dataset: https://www.kaggle.com/notlucasp/financial-news-headlines Scraped from CNBC, the Guardian, and Reuters official websites, the headlines in these datasets reflects the overview of the U.S. economy and stock market every day for the past year to 2 years. Data scraped from CNBC contains the headlines, last updated date, and the preview text of articles from the end of December 2017 to July 19th, 2020. Data scraped from the Guardian Business ...[more]
Henrijs PrincisExplainable SAT Proofs for Social Choice and Argumentation TheoryRichard BoothHiroyuki Kido2021-CM3203
The aim of this project is to implement the workflow described by Geist and Peters [1] for generating concise human-readable mathematical proofs for theorems via the use of SAT solvers. Initially the focus will be on theorems in the area of social choice, before potentially branching out into argumentation theory or matching theory. The project will involve research on automated theorem proving, SAT solvers, explainable AI (XAI). Possible project outputs include: - Comparison of the performanc...[more]
Henry BoothMonitoring Marine Debris Hotspots via Satellite ImageryOktay KarakusCharith Perera2022-CMT403
This project can be split into 3 main parts. Part 1) Location of a suitable area of ocean to search for marine debris over a suitable time frame (3-4 years). This will have to consider year-round cloud cover and sea state, as well as the degree to which debris is expected to aggregate in the area. Part 2) Collecting and filtering a satellite dataset to account for cloud cover and sea state. Train a machine learning model that can identify marine debris from satellite images. This could be ...[more]
Hermond TambaMapping the character of places from georeferenced dataChris B JonesMatthew J W Morgan2022Place-CMT404
The characteristics of locations within cities can be viewed from various perspectives - for example with regard to activities and facilities (e.g. types of shopping. types of restaurants, parks, sports, cinema, cultural heritage, biodiversity etc). This project will attempt to evaluate the effectiveness of a topic modelling approach (using Latent Dirichlet Analysis - LDA), or similar, that uses geo-referenced text as input and that has been applied in recent research literature. Factors that ...[more]
Hossein RamezanianA comprehensive evaluation of artificially intelligent learning in the detection of phishing emailsNeetesh SaxenaShancang Li2022-CMT400
Phishing email attacks are potent and dangerous by design. Many companies, industries and individuals have fallen victim to it. Advancements have been made to combat these attacks; however, the technology does not stop a significant portion of these attacks. This could be for many reasons, but it could be attributed to the nature of well-made phishing emails, as it mimics the textual behaviour a regular client or friend would follow. Many researchers tried to apply AI to solve this problem. The ...[more]
Jack DaviesDetecting DDoS attack on a networkAmir JavedGeorge Theodorakopoulos2022-CMT400
Using Cyber range to simulate DoS attack on a network – Within the project student will work on already collected dataset. They will then pre-process the data and build supervise/unsupervised machine learning model to detect an ongoing attacks. Aim: 1. Create a dataset using different topologies on the cyber range. 2. Create ML model to detect attacks Desirable goals : create a dashboard to show your results.[more]
Jake HarkinsPredict Animal Movements using Collar data Help Fight Poaching and Save AnimalsCharith PereraYulia Cherdantseva2021-CM3203
This project suits for a student who is highly motivated to make an impact on wildlife conservation activities, support climate change mitigation and fight against poaching activities. The student will be supported and advised by a team including academics and PhD students. This project is a collaboration between Cardiff University’s Danau Girang Field Centre (DGFC) (https://www.cardiff.ac.uk/danau-girang-field-centre), School of Bioscience and the School of Computer Science. Your project is ...[more]
James Goodrick-ClarkeMusic makes you run faster...Martin J ChorleySylwia Polberg2021-CM3203
Both Spotify and Last.FM allow you to access a list of a user's recently played tracks. Multiple services exist for tracking exercise (Strava, Fitbit, Runkeeper, ...) and associated data (heartrate, pace, ...). I'd like to create an app that allows you to compare your exercise data with your recently played music over a large time period to determine whether the music you were listening to has any impact on your performance in the exercise. This could be created as a secure web application acc...[more]
James MiddletonEvaluating the use of sky images for machine learning approaches to solar irradiance forecastingFrank C LangbeinOmer F Rana2022-CMT403
Forecasting solar irradiance is a key component in the management of electrical grids with a high percentage of photovoltaic energy generation. The main challenge in solar irradiance forecasting comes from the stochastic nature of cloud advection and diffusion. This spatio-temporal phenomena requires spatio-temporal data to predict, a source of which is sky imagers; wide-angle lensed cameras facing upwards taking images of the sky at regular intervals. This study investigated the use of machine ...[more]
Joseph GarnettDrone forensics investigationShancang LiGeorge Theodorakopoulos2022-CMT400
You will be provided with a few Drone images that can be used to conduct drone foresnic investigation, including evicence extraction from cameras, GPS, connectivities, geolocation match, etc.[more]
Joseph Wilson-HallNon-Photorealistic Rendering with Spot ColourPaul L RosinYukun Lai2021-CM3203
In a previous paper I developed a method (using traditional computer vision techniques) to add "spot colour" to images: http://users.cs.cf.ac.uk/Paul.Rosin/resources/papers/spot-CAe.pdf That is, colour is added to region (or regions) of a black and white image to make it look more attractive or interesting. The aim of this project is to tackle this problem, but using the power of deep learning![more]
Juncheng ChenExplainable machine learning for exploiting technical and fundamental indicators in stock tradingYuhua LiYipeng Qin2021-CM3203
The aim of this project is to use machine learning to combine technical analysis and fundamental analysis in stock trading. Technical analysis and fundamental analysis are two commonly employed investment tools for timing the market and select stocks. Technical analysis often relies on daily price or trading volume, and is usually applied for short-term trading, while fundamental analysis focuses on financial ratios and more suitable for long-term investing. Hedge fund managers have argued that,...[more]
Kalvin WillisModelling Cyber-Attacks on Modbus TCP Protocol in ICSNeetesh SaxenaYuhua Li2021-CM3203
This project designs, develops and implements cyber-attacks on Modbus TCP protocol in ICS. You really need strong interest in programming (Python), you will be given the code which you need to understand and alter to mount cyber-attacks and obtain results/impact.[more]
Kieran ChocianMulti-player Othello game with AI and networkingFrank C LangbeinShancang Li2022Place-CMT403
Othello is a turn-based game on an 8x8 grid that consists of white and black discs. Each player places a disc that outflanks one or more of their opponent discs, where every disc outflanked is flipped. The game ends when neither player can place a disc, where the aim is to have more discs left on the board than your opponent does. This project aims to create a networked server that allows a user to play Othello against either another human in real time, or against multiple AI agents of varyi...[more]
Kriti ShewaramaniComparative Analysis of Tree-Based Machine Learning Models and Neural Networks for Malware PredictionYuhua LiSandy Gould2021-CM3203
In the age of technology, malware attacks are occurring every day around the world. These attacks involve a malicious software that can lock up essential files, spam you with ads, or redirect you to malicious websites which can result in anything from data theft to the destruction of entire systems or devices. Cybercriminals use different types of malware like trojans, ransomware, spyware, or worms to infect individuals or organizations. Machine learning is a credible technology in today’s day...[more]
Laura ChoyVirtual Reality educational puzzle using logic gates and 3d space limitationsParisa EslambolchilarJing Wu2021-CM3203
The project aims to introduce logic gates and truth tables in an educational game. The project will use Unity with the SteamVR plugin to create a Virtual Reality environment and Blender for 3D models. The puzzle space consists of a small cube with multiple input and output points on the surface area and a truth table. The user then selects appropriate logic gates and wires to connect the input and output gates inside the cube to match a given truth table . The challenge is to reverse engineer t...[more]
Lida WenCreating Othello AI Players Combining Heuristic Evaluation And Reinforcement LearningBailin DengHantao Liu2021-CM3203
This project aims to explore possible ways of creating AI players that are capable to make sensible decisions in the board game Othello. The complexity and interactivity make this topic particularly interesting. To achieve the aim, the project starts with analysing the background, rulesets and advanced strategies used in the game. A GUI has then been designed with Pygame to visualise the game. Four types of intelligent agents are created, which are Heuristics, Minimax, MCTS and DQN. Another thr...[more]
Lingpei MengSecurity Automation Enterprise Network ConstructionShancang LiAmir Javed2022-CMT400
Cybersecurity firm Check Point Research recently released its 2021 Security Report, showing a 50% increase in overall weekly attacks on enterprise networks in 2021. Therefore, it is crucial to building a secure enterprise network. In addition, with the development of NetDevOps related technologies in recent years, automated management networks have become a hot topic. I will use images of Cisco security equipment to design and build an automated secure enterprise network for small and medium-si...[more]
Linsey RimmerUsing Companion Applications as Rules Teaching Tools To Make Hobby Board Games More ApproachableDr Daniel J. FinneganHantao Liu2022-CMT403
‘Hobby’ board games have been growing over the past twenty years. However, such games feature unique and complex mechanics that can represent a barrier of entry to welcoming new players, restricting the capability of the genre to continue its growth. ‘Bloodborne: The Board Game’ is one of these more complex hobby board games which could benefit from more understanding as to how technology can aid the welcoming of new players into the activity. While studies into companion applications to...[more]
Lizhuo LiThe second-hand trading system for Cardiff University studentsJianhua ShaoIrena Spasic2022-CMT403
With the popularity of the Internet, e-commerce business has developed more and more rapidly. People can place orders and pay for all kinds of goods on the website anytime, anywhere. At the same time, the second-hand trading market has gradually entered people's field of vision as an emerging e-commerce category. Modern consumerism has increased tremendously in line with economic development. While this has greatly increased the dynamism of the market, it has also led to a huge accumulation of u...[more]
Luca PassarielloAnalysing the Political and Topical Makeup of r/conspiracyAlun D PreeceYuhua Li2022-CMT400
The damage misinformation and conspiracy theories can cause has risen to prominence in recent years. During the COVID-19 pandemic, conspiracy theories spread via social media have led to numerous disruptive events including attacks on 5G towers and direct action by anti-vaccination groups. In the political arena, QAnon conspiracy theorists were involved in the January 2021 attack on the United States Capitol, threatening the legitimate democratic process of a major nation state. This project is...[more]
Magdalena VelkovaAn application to help graduate students prepare for placement and graduate interviewsMartin J ChorleyFrank C Langbein2021-CMT403
Graduating from a prestigious university and getting outstanding academic results are just the first of many challenges a higher-education student must take before landing a full-time job. Unemployment amongst graduates is considered one of the main reasons for low life-satisfaction and high levels of anxiety amongst graduates, according to HESA (Graduates’ subjective wellbeing | HESA. 2020). Graduate/placement programmes are one of the most wanted and competitive positions as the average emp...[more]
Malaika MiahDo people know what emoji ‘really’ mean?Sandy GouldStuart M Allen2021-CM3203
Billions and billions of emoji are sent around the world every day. The Unicode Consortium defines which emoji exist and assigns a text description to each pictogram. But in reality we find emoji are used in many different ways. Sometimes consciously, sometimes not. In this project, you will try to understand whether people’s understanding of emoji matches the definition given by the Unicode consortium. If not, how do these understandings vary? For this project you will make use of web-program...[more]
Marley SudburyDetecting metastatic tissue in lymph nodes with deep learningPaul L RosinDave Marshall2021-CM3203
To track the spread of a tumour, pathologists examine lymph nodes in the surrounding area for metastatic growths. This is done by looking at high resolution scans of slides with tissue taken from the lymph nodes. Deep learning systems have demonstrated a great ability to classify images, and so researchers have looked at applying these techniques to the problem of tissue classification, including lymph node classification, with the aim of creating a system which can aid pathologists. In this pro...[more]
Mary ZachariasSmart Home Activity Inference using Network DataCharith PereraCarolina Fuentes Toro2021Place-CMT403
This paper explores the development of a smart home-based activity recognition tool through a multi-stage device-state classification approach, using encrypted network data. Through a comprehensive literature review and findings from subsequent experimentation, this paper demonstrates that commercial off-the-shelf (COTS) devices, and device activities, can be automatically recognised through patterns in their network activity. Subsequently, it finds that more complex human activities can be con...[more]
Matthew HarrisHow we can elevate our storytelling to better invest our audience in a modern world.Nervo Verdezoto DiasHiroyuki Kido2021-CM3203
Following from my CM3116 Design Thinking module, I'm hoping to continue my research into how writers can elevate their stories to better engage their audience in a modern world. This project aims to solve the issue of a general lack of engagement within stories being told in modern media. The aim of this project is to find the most effective methods of engaging audiences in different forms of media, and to identify the ways that writers are able to take advantage of these methods, to elevate th...[more]
Matthew Hermanautomated testing of Web Applications courseworkMartin CaminadaBailin Deng2021-CM3203
One of the coursework assignments of Web Applications is to build a site that calculates the date of Easter for a particular year. Currently, much of the testing (and marking) is done automatically. However, with student numbers on the rise, we are interested in having a way to automatically test and evaluate some of the aspects. The difficulty, however, is that this testing needs to work on a wide variety of designs that the students come up with. In particular, we are interested in testing whe...[more]
Matthew LarbyTheatre Company Website and BackendDr Daniela TsanevaChris B Jones2021-CM3203
Custom Website Features for a Client Client: Silchester Players – Amateur Theatre Group IMDB style show history page •Over 130 shows spanning over 45+ years •Searchable/Filterable by cast or crew member •Also shows photos from each show (see next item.) Custom Image Gallery Widget •Photos are already stored on Google Photos but theres no embeddable gallery for including it on the website since Google bought out and discontinued the Picasa galleries in 2016. Blog page •(Partially Star...[more]
Mingrui FangChinese Chess AI PlayerYukun LaiOktay Karakus2021-CM3203
The project aims to investigate different AI techniques for building an automatic game player for Chinese chess and then evaluate and discuss their performance and strength through a series of tests and data comparisons.[more]
Muneerah Al HajriTechnical and Sentimental Analysis for Stock Price Prediction Using LSTM and GRUYuhua LiYazmin Ibanez Garcia2022-CMT400
Any thriving and competitive economy depends heavily on the stock market. By making shares of a company publicly available, it aids in its financial growth. Additionally, it enables people to invest in those businesses and earn from doing so. However, due to the volatility of the stock market, stock trading entails a certain risk. This study aims to minimize this risk by providing a solution for stock price prediction. The solution is based on predicting the stock price using a combination of te...[more]
Naomi DavidsonApplying Route Optimisation to Rota Generation for Home-Help ServicesRichard BoothNatasha Edwards2021-CM3203
This project is about developing and implementing an algorithm to solve a particular real-world problem. You are the boss of a company that organises home-help visits for elderly patients. Your staff is made up of a fixed number of support workers who must visit a fixed number of homes, spending a set amount of time at each home. Each patient has preferences about the number and timings (e.g., "not before 10am", "between 1pm and 2pm") of the visits they receive each day. You must assign staff to...[more]
Noel BrooksGPU Security Review [INDUSTRY PROJECT]Eirini S AnthiGeorge Theodorakopoulos2022-CMT400
GPUs have developed rapidly in the past decade, both in terms of computational power, available memory, and the types of tasks they can perform. The recent introduction of GPU provision by cloud providers presents significant new risks, but little literature exists around the security implications of GPUs within the cloud. Further, malware has been identified which may be able to execute within GPU memory space, thereby bypassing many existing memory scanning tools. The security of GPUs needs to...[more]
Nomair ShahzadDigital Learning – Education of the futureNatasha EdwardsCharith Perera2021-CM3203
The COVID-19 pandemic resulted in world-wide disruption to life. Whilst all industries have been negatively affected by the pandemic, some have been hit harder than most. Arguably the most important area affected by the pandemic is the education sector. A joint report published by UNESCO, UNICEF and the World Bank states that COVID-19 pandemic-related school closures affected more than 1.6 billion learners and the current generation of students now risk losing $17 trillion in lifetime earnings (...[more]
Ohud AlsadiSecurity Analysis of the Smart Grid ProtocolsNeetesh SaxenaShancang Li2022-CMT400
The project aims to analyse current security (features and level) of the existing and implemented smart grid protocols. The project outcomes include exploring security issues, limitations and gaps, and reflecting takeaways with possible recommendation for improving security.[more]
Pablo Stutt CastroAutomated Region-of-Origin Classification of Traditional Music from Peninsular SpainAndrew JonesStuart M Allen2021-CM3203
In recent years, interest in the field of Music Information Retrieval (MIR) has grown significantly, particularly in the field of Music Genre Classification (MCR). However, these studies often focus on contemporary musical genres, and traditional music is entirely absent from relevant datasets such as the GTZAN dataset. This project attempts to carry out some initial research in the field of automated classification of audio recordings of traditional music, and to research the challenges that th...[more]
Peter SnookDrone forensics investigationShancang LiPadraig Corcoran2021-CM3203
You will be provided with a few Drone images that can be used to conduct drone foresnic investigation, including evicence extraction from cameras, GPS, connectivities, geolocation match, etc.[more]
Qin LiuDetecting Lies in TextYukun LaiKirill Sidorov2022Place-CMT400
Lie Detection in text is a very active research field. From new stories to tweets interest in detecting lies is constantly growing. Many different datasets for training and many different models to do so exist. This project will explore how these models perform within specific contexts and their generalisation across datasets. Students need to have good coding skills in python and an interest in machine learning including deep learning.[more]
Rachael HansonDesigning an Interactive Application to Promote Healthy Ageing among Older Adults at HomeNervo Verdezoto DiasJames Osborne2021-CM3203
Prerequisites: -Basic knowledge of Human-Computer Interaction and user-centered and/or participatory design methods -Experience developing mobile and/or web applications in several platforms (e.g., Android, HTML5 & Javascript, etc.) -Desirable experience with Spanish (not mandatory) Digital health technologies are becoming increasingly prevalent to support and enhance the everyday experiences of older adults. However, their potential to promote healthy ageing practices has been limited. T...[more]
Ray MorrisonProviding corporate leadership with visibility of the residual risks associated with application development across monolithic and microservice architectures.Amir JavedYulia Cherdantseva2022-CMT400
For large companies with a variety of product lines, corporate level visibility of the compliance of product development teams with secure application development principles is important to give stakeholders assurance that regulatory requirements are being met. To achieve this, companies put in place corporate policies for secure development lifecycles and set maximum risk acceptance levels. The challenge comes in ensuring that the policy is being followed, and the Devs are not being forced to f...[more]
Rhys ConnorAnalysing The Raspberry Pi as a Cost Effective Solution for SMEsMartin CaminadaCrispin Cooper2021-CM3203
The objective of this is to analyse Raspberry Pi’s as a low energy and low cost solution for small enterprises and start-ups. This would look at the Raspberry Pi and analyse it when compared to a more traditional server set up.[more]
Robert BryantSentiment Analysis from Conspiracy Theories in the 2020 US ElectionAlun D PreeceLuis Espinosa-Anke2022-CMT403
In the 2020 US Election there was a great deal of hostile discourse between the supporters of the two candidates; Donald Trump and Joe Biden. On social media platforms conspiracy theories emerged, and took a more prominent place than they had done in any US Election to date. Using Natural Language Processing with a focus on Sentiment Analysis, this project aims to explore the relationships between the major figures of this election and the sentiment & conspiracies associated with them on Twi...[more]
Robert TurtonAutomatic Generation of Pixel ArtYukun LaiHantao Liu2022-CMT403
Pixel art is a form digital art where characters are represented using a small number of pixels. It was popular for video gaming, and still useful nowadays for various applications ranging from icons to animation. However, traditional approaches of pixel art generation are very time-consuming and require expertise. Recent work considers automatic generation of pixel art. The aim of the project is to develop a prototype system that achieves automatic generation of pixel art by implementing some r...[more]
Ruibo Chengexamination systemAsma IrfanJuan Hernandez Vega2022-CMT404
In China, the outbreak of COVID-19 is still affecting everyone's daily study and life, including the elderly, children, office workers, teachers and students. Outbreak not only for students, brings inconvenience in life, also brought difficulties in learning, which is one of difficult to offline test, outbreak also makes teachers is not convenient to write in the office, offline test for schools, enterprises and other institutions, time-consuming and site costs, labor costs, and overhead cost is...[more]
Ruslan LevondDevelop an IoT Edge device to Capture and Classify Species using Sounds to Support Wildlife Conservation ActivitiesCharith PereraVíctor Gutiérrez Basulto2021-CM3203
Wildlife has been in danger for quite some time from various kinds of human activities, ranging from directly destroying habitat to impact from climate change caused by human's unsustainable way of living. Many organisations have established conservation projects and activities to try to mitigate the effects and save wildlife, one of the most important activities of which is monitoring species. Automatic sound recognition systems have proven to be an effective tool used during conservation activ...[more]
Rytis DerzinauskasUtilising technology to improve the shopping experience in grocery stores of customers with dietary restrictionsNervo Verdezoto DiasFederico Liberatore2021-CM3203
My topic area is 'Customers with dietary restrictions'. Whether that would be because of their allergies, ethical beliefs, religion, or health condition. My aim is to find an easier everyday solution for customers to quickly access information whether a product in a grocery store has any ingredients that they cannot consume. This will help both customers and businesses avoid misfortunes where a person consumes a product that has ingredients they are allergic to or do not want to consume. My ...[more]
Safah AhmedThe Role of Technology on Women's SafetyCarolina Fuentes ToroNatasha Edwards2021-CM3203
I have started work on this topic area in the Design Thinking and prototyping module, where I have conducted initial interviews to get more insight around the problem and began to identify the solution. I want to develop this project further by doing more research and interviews to create a prototype of the solution, this is likely to be wearable technology such as a smart watch with GPS tracking features.[more]
Samantha HughesSpelling Practice / Spelling Test - tailored toward students with Dyslexia.Helen R PhillipsYulia Cherdantseva2021-CM3203
This project will consider an Automated or Semi-Automated Assessment Tool, supporting children to undertake spelling tests as part of synchronous (potentially in-class) or asynchronous learning materials. This will be tailored towards students with dyslexia as they will be able to change font colour, style and background colour. Additionally, it will allow the teacher to show more or less feedback depending on the severity of the case. My client for this project will be Matthew Moloughney.[more]
Samuel BowenNatural Language Processing (open proposal)Jose Camacho ColladosJing Wu2021-CM3203
This is a placeholder proposal for students interested in Natural Language Processing (NLP). I am open to suggestions in different areas including applications of NLP techniques in specialized domains. For this project, the student should have a clear idea of the area they want to work on (even if of course this can be further discussed and refined). Ideally, the student should have experience in Python for NLP/Machine Learning.[more]
Sam WinkworthInteractive Data Science to Help Tackle Climate ChangeCharith PereraStuart M Allen2021-CM3203
This project suits for a student who is highly motivated to make an impact on wildlife conservation activities, support climate change mitigation and fight against poaching activities. The student will be supported and advised by a team including academics and PhD students. This project is a collaboration between Cardiff University’s Danau Girang Field Centre (DGFC) (https://www.cardiff.ac.uk/danau-girang-field-centre), School of Bioscience and the School of Computer Science. Danau Girang Fie...[more]
Saul OllettCardiff Youth Service Digital platform for staffCatherine TeehanBailin Deng2021-CM3203
Cardiff Youth Service are looking for a digital platform, tool or application for the workforce to be able to work digitally agile and embrace technology. The platform will allow staff and volunteers to plan youth work sessions, record reflections and view upcoming service events, a clear link to www.Cardiffyouthservices.wales all of the above which will then be able to be viewed by a manager for sign off and then to senior management team[more]
Sebastian ThomasWales Safeguarding Repository: Document Discovery via Natural Language ProcessingAlun D PreeceJose Camacho Collados2022Place-CMT400
The Wales Safeguarding Repository (WSR) is an online collection of safeguarding review reports containing valuable information about learning experiences in tackling serious incidents involving children and vulnerable adults. Research in the School of Social Sciences at Cardiff University has highlighted the need for better learning to emerge from these reviews, in order to enhance the future safeguarding practices of professionals such as police officers, social workers and those working in hea...[more]
Shaikha AlshehhiMachine learning model to identify attacks on IoT device.Amir JavedHiroyuki Kido2021-CM3203
The project aims to build a machine learning model to identify an ongoing cyberattack on IoT devices. The ML model will be built by analysing a publicly available labelled dataset https://www.stratosphereips.org/datasets-iot23 . The project will be carried out in three stages : Stage 1 1.Downloading and cleaning of the dataset. This will require you to download captured pcap file of malicious traffic. 2.Transforming the dataset into a machine-readable format. Stage 2 By using a programming l...[more]
Shakur DualeWeb Application that uses algorithms to automatically identify patterns on financial charts.Federico LiberatoreParisa Eslambolchilar2021-CM3203
My final project proposal is a web application that uses custom algorithms to identify candlestick patterns on financial charts while also teaching users what they are and how each pattern works. Candlestick patterns are an essential tool in trading any financial market. Therefore, a solution like this would be educational and help newer traders be more successful and also save time for veteran traders who are analysing charts manually. A lot of potential features are still undecided.[more]
Sichu HuangSegmentation of herbarium sheetsPaul L RosinHiroyuki Kido2022-CMT400
Deep learning model will be used to perform segmentation of Herbarium sheets provided by the University of Wyoming. As a starting point, the resources (pre-trained model and data) from the paper "Cross-validation of a semantic segmentation network for natural history collection specimens", Nieva de la Hidalga, 2022 will be used.[more]
Smit JiteshBuilding energy usage predictionYuhua LiHelen R Phillips2021-CM3203
Prediction of building energy consumption is important to electricity distribution, management and environment. This project will develop a machine learning model to predict energy usage based on historic usage rates and observed weather. A relevant project can be found at https://www.kaggle.com/c/ashrae-energy-prediction/overview. This project requires good programming skills (preferably in Python), knowledge of machine learning (regression).[more]
Sophie WellsTo what extent does the effect of a denial of service attack on a public cloud environment differ against a private cloud environment and a physical environmentAndrew HoodGeorge Theodorakopoulos2022-CMT400
The project would entail setting up a physical, private cloud and public cloud environment. Then, a denial of service attack would be performed and closely monitored to measure the effect it had on each environment in order to compare them. This would allow patterns to be shown as well as any differences between simulate and real data.[more]
Su LiIndustry Partners Relationship Management SystemWendy K IvinsSylwia Polberg2021-CM3203
Over the last ten years the School of Computer Science and Informatics has built up its engagement with industry and other external partners to provide meaningful opportunities to engage with students. These include: Placements – including Professional Placement Year, Summer Placements, Work Experience; International – including Study Abroad and Global Opportunities; Projects – where partners act as clients and propose project ideas; Employability– including networking events, promotin...[more]
Tapan AgarwalLearning to Detect and Recognise Road SignsYukun LaiMartin Caminada2021-CM3203
To improve driving experience, computer vision techniques are widely used for providing assistance. The project aims to develop a prototype that implements some machine learning technique to detect and recognise road signs from real world camera footage. Such technology is also an essential component for autonomous driving.[more]
Thomas ClareSimulating a Robot Swarm in a Factory settingBailin DengHelen R Phillips2021-CM3203
The purpose of this project is to develop a visualisation and planning tool for large scale robot warehouses. Allowing the user to change characteristics and see how they can affect the efficiency of the warehouse, and in doing so allow users to find optimal characteristics. In addition to this it will also act as a visualisation tool for teaching people how robots can be used for large scale automation in this style of factories. It would also serve to demonstrate the advantages of using artifi...[more]
Thomas LaffertyMedical image processing - lesionsPaul L RosinYukun Lai2021-CM3203
This project will use a large database of images of skin lesions and attempt to perform automatic recognition of melanomas (cancer). The first step will be to segment the lesions, i.e. locate the region of interest in the image. This will be done by using rules to combine several techniques. Next, the regions are described by their shape , colour and texture to identify whether the lesion is malignant or not. The project will be based on techniques from the following paper: H. Ganster, A. Pinz...[more]
Thomas Lea-RedmondFlake8 Linter for On-going Feedback on Student CourseworkStuart M AllenXianfang Sun2021-CM3203
Based on a project I did during the Summer for the university. Project brief was a proof-of concept coursework evaluator using Flake8. The idea was to take the common coursework feedback ie dont use global; or this function should return an integer value, and make a tool that evaulated the students work and give them the tailored feedback. Continueing this work would include making this more apllicable to other settings for example other COMSC modules; and a "does this actually work" evaluation...[more]
Thomas McVeighTechnocamps Islands: Using Minecraft for Education to Develop Teaching Resources for Computer Science Topics and ConceptsCatherine TeehanOmer F Rana2022-CMT403
Education is a big part of life and has a wide range of content delivery methods, from classroom lessons to worksheets there are many ways in which people can be taught. This project aims to see if an education resource can be created inside of the game Minecraft for Education while adhering to the 2022 Welsh Curriculum for Science. First research shall be carried out into using game-based learning compared to gamified learning to see if game-based learning through Minecraft for education is th...[more]
Tian Sou Zen TanVisualizing deep reinforcement learningJing WuFederico Liberatore2021-CM3203
Reinforcement learning (RL) enables agents to learn by interacting with the environment. The agent collects experience from trail-and-error and optimises its action rules from the environment feedback. In recent years, deep reinforcement learning, such as DQN [1], has achieved superhuman performance in playing chess, Atari games, etc. However, interpreting the behaviour of a deep RL agent is challenging, due to both the 'black-box' nature with deep learning and the randomness and long-time learn...[more]
Tiecheng WangAnalysis of face detection and explorationXianfang SunPadraig Corcoran2022-CMT400
This study compares different face recognition techniques, evaluates them, and chooses the most effective technique based on a face recognition system that is comparatively complete. Find solutions to reduce storage needs while accelerating retrieval. Face detection, face feature value extraction, and face feature value retrieval are the three stages of a full face retrieval system. Among them, face identification utilizing the MTCNN model is currently more used in the industry. For face featur...[more]
Tim LaneData Anarchy: Building A Social Media Platform Where Users Control Their DataKathryn JonesNatasha Edwards2021-CM3203
Despite the introduction of various laws and measures seeking to regulate digital data in the past few decades, there are still a huge number of issues surrounding data privacy and data control that have not been addressed. While major laws and regulations such as GDPR and PIPL do have a significant influence globally they only capture a small subset of problems surrounding data as they focus primarily upon personal data. From a technical perspective, centralised web applications are also inhere...[more]
Timothy CapiliSpecies distribution modelling with machine learningChris B JonesBailin Deng2022-CMT400
This project will will use machine learning methods to predict the geographical distribution of wildlife species. Ground truth data for species distribution can be obtained from a citizen science portal such as the National Biodioversity Network. Data to characterise and differentiate between different locations will be obtained from various sources that record environmental features such as climate, land cover, elevation, soil types and population density. The project will experiment with class...[more]
Tom Alfano-HughesSpelling Practice / Spelling TestHelen R PhillipsFederico Liberatore2021-CM3203
This project will consider an Automated or Semi-Automated Assessment Tool, supporting children to undertake spelling tests as part of synchronous (potentially in-class) or asynchronous learning materials. This will be tailored towards students with dyslexia as they will be able to change font colour, style and background colour. Additionally, it will allow the teacher to show more or less feedback depending on the severity of the case. My client for this project will be Matthew Moloughney.[more]
Tyler JenkinsMusic makes you run faster...Martin J ChorleyCarl Jones2021-CM3203
Both Spotify and Last.FM allow you to access a list of a user's recently played tracks. Multiple services exist for tracking exercise (Strava, Fitbit, Runkeeper, ...) and associated data (heartrate, pace, ...). I'd like to create an app that allows you to compare your exercise data with your recently played music over a large time period to determine whether the music you were listening to has any impact on your performance in the exercise. This could be created as a secure web application acc...[more]
Vicky FernandesAn investigation into Car Hijacking [INDUSTRY PROJECT]Eirini S AnthiAmir Javed2022-CMT400
The project will utilise the new car simulator recently acquired in the school to investigate possible attack vectors on CANBus. The aims of the project are: - Understand the protocols and functionalities of the CanBus network used on the simulator - Identify possible attacks - Collect data when the car is not under attack - Launch attacks to interrupt the car's normal operation and collect data - Propose mechanisms to make the system more secure[more]
William GloverProstate MR Image SegmentationFrank C LangbeinAlia I Abdelmoty2021Place-CMT403
The aim of this project is to investigate approaches towards automatically segmenting the prostate in MRI datasets, based on the PROMISE12 grand challenge, (promise12.grand-challenge.org) and also our own, internal data set (other data sets may also be used, of course). This is part of a research project for early-stage prostate cancer detection. You may develop your own approach or test and then extent already published approaches. Which technique you are using is your choice, but it is likely ...[more]
Xiao LiuMachine learning of where people look in images/videosHantao LiuYuhua Li2022-CMT403
Do you know where you are looking at while watching online videos? Do you know where the computers think you are looking at? Modelling visual saliency - predicting where human eyes pay attention to in visual content - has been a very active research area over the past few years in both academia and industry. This project aims to analyse visual attention data (both ground truth and predicted) in emerging applications in image and vision computing, such as computer rendered images, high-dynamic-ra...[more]
Xin ZhangDo people know what emoji ‘really’ mean?Sandy GouldDr Katarzyna Stawarz2022-CMT403
Billions and billions of emoji are sent around the world every day. The Unicode Consortium defines which emoji exist and assigns a text description to each pictogram. But in reality we find emoji are used in many different ways. Sometimes consciously, sometimes not. In this project, you will try to understand whether people’s understanding of emoji matches the definition given by the Unicode consortium. If not, how do these understandings vary? For this project you will make use of web-program...[more]
Yao XiaoGenerating and visualising realistic plantsYukun LaiSylwia Polberg2021-CM3203
Plants come with complicated structures and lots of details. They are also very common in our daily lives. In computer graphics, to render a realistic outdoor scene, plants are often needed to be constructed. In many cases, we don't need to reconstruct a specific tree, but more likely expect the tree to be realistic looking. There are a large number of literatures looking at different approaches of generating trees or other plants in the computer. Practically, you can use e.g. L-system (http://e...[more]
Yongyi WuFace image decomposition and manipulationJing WuChris B Jones2021-CM3203
The appearance of a face is a joint effect from multiple factors including the shape, texture, and environment illumination. Altering any of these factors will change the appearance presented in face photos. This project will adopt the decompose-alter-combine process to manipulate the face appearance in photos. The student is expected to 1) explore and implement existing methods to decompose a face photo into different visual cues, e.g. facial contours, shading, reflectance/texture; Candidate te...[more]
Yuechao WangStudent Learning System App——Mobile ApplicationBeryl NoeLouise Knight2021-CMT404
1、Target & Background ● Background Due to Novel coronavirus pneumonia (COVID-19), in order to protect the safety of students, schools in most countries around the world change from offline teaching to online teaching, but the current student learning system can only view course materials and course playback on the computer, it cannot be done through mobile phones or ipad. ● Target Realize that the student learning system on the mobile phone can watch the live broadcast of the cou...[more]
Yueying TianDesigning an Interactive Application to Support Caregiver's Feeding Practices of Young ChildrenNervo Verdezoto DiasCarolina Fuentes Toro2022-CMT403
Prerequisites: -Basic knowledge of Human-Computer Interaction and user-centered and/or participatory design methods -Experience developing mobile and/or web applications in several platforms (e.g., Android, HTML5 & Javascript, etc.) -Desirable experience with Spanish (not mandatory) Mobile applications are becoming increasingly prevalent to support self-care practices aiming to enhance people’s health and wellbeing. However, their potential to promote children’s healthy eating practices...[more]
Yukun GeMachine learning of where people look in images/videosHantao LiuParisa Eslambolchilar2022Place-CMT403
Do you know where you are looking at while watching online videos? Do you know where the computers think you are looking at? Modelling visual saliency - predicting where human eyes pay attention to in visual content - has been a very active research area over the past few years in both academia and industry. This project aims to analyse visual attention data (both ground truth and predicted) in emerging applications in image and vision computing, such as computer rendered images, high-dynamic-ra...[more]
Yuxi WuForecasting Unit Sales of Retail GoodsYuhua LiHantao Liu2022-CMT400
Relevant information about this project can be found at https://www.kaggle.com/c/m5-forecasting-accuracy/overview[more]
Zhiliang XiangNeuro-symbolic approaches for Abstract and Relational Visual Reasoning TasksVíctor Gutiérrez BasultoBeryl Noe2021-CMT400
Recently, there has been a lot of progress on basic vision tasks using neural approaches. However, it is still a big challenge the development of approached for tasks combining vision with abstract and structural reasoning. A main question from this research is whether pure deep learning is the ultimate way of doing abstract visual reasoning [1]. In another direction, there has been an increasing interest in the development of AI systems that combine the strengths of neural systems (e.g. dealin...[more]
Zidong LinImage Inpainting in Generative Adversarial Nets Combining with Depth InformationYukun LaiYipeng Qin2022-CMT403
Digital images are versatile nowadays. However, captured images may not contain the exact content of interest. For example, an image may contain extra objects/persons that are not intended to be included. It is therefore highly demanding to develop more intelligence image manipulation techniques. Recent advances in deep learning and generative adversarial networks provide a much more powerful tool for image manipulation. Recently, with the development of monocular depth estimation, it is possi...[more]