System on Chip for aerospace embedded equipment

The aeronautic and aerospace industries are exploring new approached to reduce the mass of cables, bulky electronic systems. This rationally leads onto aircraft weight reduction as well as the amount of CO2 and greenhouse gas emitted by aircrafts. To reduce the mass of cables, power harvesting technique could be utilized. In this approach, the energy needed to power on electronic systems can be harvested from available and reliable sources such as vibration, passenger’s seat heat, data line idle states etc.

Network Virtualization and Slicing in 5G Mobile Networks

Unlike services provided by current mobile networks only focus on voice and data, the services provided by 5G networks can range from high data rate services (e.g., VR) to ultra-reliable low latency communication (e.g., vehicle communication). Therefore, a more flexible and effective 5G mobile network is expected to be designed and operated. Network virtualization and slicing has been proposed to address these challenges to enable a new way to design, deploy and manage networking services. Can we implement network virtualization and slicing into 5G networks directly?

Automated Impact Analyses to Support Code Review Practices

Large software systems are updated incrementally to add new features or fix bugs. It is a common practice in the software industry to have each incremental change reviewed by a peer to detect software quality issues and transfer knowledge among team members. While peer review boasts technical and non-technical benefits, it is still primarily based on low-level textual differencing, which place the prior and updated versions of the software source code next to one another.

Anomaly Detection in Event Data

The proposed research project targets anomaly detection of event data. The project has a duration of six months and aims to achieve two objectives: (1) to evaluate the effectiveness of a novel approach for real-world data, and (2) compare it to alternative methods. The intern will use existing research resources, and will apply them to real-world data provided by the partner, Acerta Analytics Solutions, Inc. to evaluate the different methods.

Microgrid’s Performance Modeling & Optimization Method Based on Data Mining & Artificial Intelligence

With the maturity of renewable energy technology in recent years, micro-network has become an ideal power supply solution to the remote villages and islands. Recently, researchers have tried to reduce the cost of the system based on ideal assumptions. However, the factors that actually affect the system life cycle cost are varied. Including the control of the system, the maintenance mode of the system, the geographical factors of the power station and the configuration of the system will greatly affect the cycle cost of the whole system.

Development and validation of analysis tools and interfaces for automated rehabilitation systems

Automated physiotherapy motion tracking system may improve clinical outcomes by providing subjective measures and continuous monitoring. A study into different metrics that PTs may find useful for diagnosis and a user interface study assessing the current usability of the Automated Rehabilitation System, a system being developed by Cardon rehabilitation, will be conducted. A method to model the central nervous system using controls will be investigated to see if fatigue can be detected, which is a useful metric to provide both patients and physiotherapists.

Applied Machine Learning for Malware and Network Intrusion Detection

Wedge Networks is a leading cybersecurity solution provider in Canada. In this project, we aim to investigate the application of statistical machine learning and deep learning to cyber threat detection, aiming to detect both network intrusions and malware binaries transmitted in the network.

Enhancing Lateness Management in Cross-docking

Today's marketplace is moving faster than ever, and companies are challenged to distribute their products more quickly, efficiently and cost-effectively. This has led to the rise of cross-docking in the global supply chain to help keep pace with customer demand. Cross-docking refers to the practice of unloading goods or materials from an incoming vehicle (e.g., train car, truck, vessel container) and then loading them directly onto outbound vehicles with no storage in between.

Enhancing Lateness Management in Cross-docking

Today's marketplace is moving faster than ever, and companies are challenged to distribute their products more quickly, efficiently and cost-effectively. This has led to the rise of cross-docking in the global supply chain to help keep pace with customer demand. Cross-docking refers to the practice of unloading goods or materials from an incoming vehicle (e.g., train car, truck, vessel container) and then loading them directly onto outbound vehicles with no storage in between.

Prototype Behavior Based Integrity Verification (BBIV)

Web computing, in which the world-wide web is itself employed as a distributed computing platform, is entering a stage of rapid expansion with the advent of Open Web Platform so that programs that once worked only a native environment on desktop, tablets or phones can now work from within a browser itself. There is therefore a need for a new form of protection for apps.

Pages