Ubisoft has an extensive database of characters heads represented as polygonal meshes. Those come from two primary sources: processed 3D scans and models made by artists. It would be convenient to use this database to mix-and-match parts of characters to create new human-like character heads. Lets say we wish to replace the nose of one character with another nose. We want the junction between the nose and the surrounding areas to be as seamless as possible while accommodating for the new nose, which could have a different size.
ElectroMotion Energy has created an all in one AC, heating, hot water, and electricity unit to serve industrial and residential needs. This unit requires optimization algorithms and an advanced control system to optimize performance of the deployed unit around multiple objectives. These objectives consist of: meeting onsite electricity demands, meeting on site heating or AC demands, taking advantage of economical times to sell power to the grid, and to assist the municipal grids in providing electricity during peak demands.
In this project we address the problem of power consumption for wireless sensor nodes. This is where among different components of a sensor, RF transceivers consume a significant amount of power e.g. approximately 80%. Hence the main objective is this project is to tackle the power consumption problem at the RF transmitter, where we aim to reduce the power consumption to micro-watts of power, with minimal sacrifice in achievable data rate and by keeping the connectivity range within an acceptable radius.
Head Injury Prevention (HIP) Lab at Simon Fraser University in collaboration with Shield-X Technology Inc. had previously developed an impact diverting mechanism in the form of a thin multi-layered-membrane. The technology has been successfully integrated onto the exterior of a football helmet (external version) to reduce linear and rotational acceleration experienced during impact to the head. The research will focus mainly on how to adopt the technology by adding it into the interior of a single-impact helmet such as bicycle helmet without changing the exterior appearance of the helmet. A
There is ample evidence that increasing Canadas innovation, productivity and competitive advantage depends on expanding its skilled digital workforce to both implement and adopt innovative technologies. Despite the pressing need to increase the digital skills and participation of underrepresented groups in information and communications technology (ICT) industry and programs to diversifying computer science, the numbers have remained persistently low. While some initiatives have demonstrated success, often it is transient and not sustained.
Control is a leader in mobile payment analytics and alerts for SaaS, subscription, and eCommerce businesses, enabling instant intelligence anywhere via its Android, iOS, and web-based products. We collect our customers’ payment data and provide them with their key business metrics that helps them monitor their performance.
In this project the intern will develop an intelligent virtual concierge and integrate it with Curatios social network platform. The intelligent concierge will learn about each user over time and act as a personal assistant of the user in using the social network platform.
With increasing security risks in critical network infrastructures and emerging cloud technologies with shared capabilities, as well as increasing regulatory requirements on privacy, and data protection, there is a growing need for new approaches to manage security and privacy compliance.
Several customer satisfaction problems are identified in service industry as the causes of inefficiencies, and then further they could potentially lead to value destruction and loss of competitiveness. Such emerging organizational threats can be turned into opportunities by integrating a customer satisfaction management module into the existing operating software tool.
Bells Cyber Threat Intelligence (CTI) team is collaborating with academic institutions in order to further research and develop cyber security analytics for the protection of critical infrastructure and data. The focus of this research is to create and leverage a traffic classification project specifically for network security purposes. This research to design distributed algorithms fast enough for analyzing massive high-dimensional
data generated by network traffic to detect cyber threats/ attacks and anomaly in the network.