Macroeconomic Models for Performance and Investigation Prediction

Corporations are under a lot of scrutiny, especially when they annually release their financial reports to the government. If a corporation makes a mistake, or if an employee submits fraudulent information, or if it appears that either is the case, then they risk being asked to amend the filing by the government, which will cause their share price to suffer and force them to painstakingly redo the report at great expense. Caseware will sell software that can analyze these reports and determine if an amendment request is likely.

Research on Robust Face Recognition Algorithms

In recent years, face recognition algorithms based on deep neural networks have achieved human-level performance when tested on face recognition database. However, when put into real-world application, those algorithms are not robust enough, due to factors such as different lighting conditions, camera distance, and face orientations.

Dynamic Bandwidth Management

In the telecommunications industry, many schemas exist to cap or limit bandwidth at certain levels for clients. However, there are no real options available to allow clients to intelligently utilize spare bandwidth above their committed purchase rates. We propose to design, implement and evaluate novel bandwidth allocation mechanisms for high speed networks like the Cybera network. Cybera is a not-for-profit, technology-neutral organization responsible for driving Alberta’s economic growth through the use of digital technology.

Legal Question Answering with Machine Comprehension

ROSS Intelligence enables legal professionals to find analyze legal issues and find hidden information and cuts down on research time by using artificial intelligence specialized in legal research. Recent advances in neural networks applied to
natural language processing have brought results that are close to human performance in some tasks. However, this approach is still nascent in legal research and it has been identified as potentially fruitful.

Email Mining, Modeling, and Visualization

For this project, a data mining, visualization, and modeling technique will be developed and tested specifically for emails, using publicly available datasets. The mining will consist of gathering email and other potentially related datasets and cleaning those datasets. Cleaning will consist of removing duplicate or unnecessary information, as well as labeling data with basic information in order to ease training in the later steps. Next that data will be visualized in some form (graphs, charts, etc.) so that it may be more easily understood and a training model can be development.

Analysis and Optimization for Industrial Safety and Efficiency

Irwin's Industrial Safety is a leading provider of safety consulting, safety training, and safety operations management. Over the last 4 years, Irwin’s Safety has compiled data on project safety and efficiency over a wide scope of projects. Moving forward, Irwin’s Safety seeks research into how this data can best be analyzed, visualized, and used to optimize future projects. Before data can be analyzed, data scripting will be applied to transform the data into a suitable format.

Application of Neural Speech Synthesis Techniques to Improve Lyrical Audio Recordings

2012 marked a pivotal milestone in the field of neural networks. The intersection of general purpose computing using Graphics Processing Units (GPUs), labelled big datasets, and very large neural networks (called deep neural networks) enabled a break-through in machine learning that has led to impressive results in many fields and applications, such as self-driving vehicles and real-time language translation. Recently, the advances offered by these techniques have been applied to the areas of music and speech synthesis, which have opened up exciting new areas of applications.

A Context Aware, Lightweight, and Adaptive Authentication and Authorization

With increasing security risks in critical network infrastructures and emerging cloud technologies with shared capabilities, as well as increasing regulatory requirements on privacy, and data protection, there is a growing need for new approaches to manage security and privacy compliance.

The intelligent virtual agent as a patient Personalized companion

In this project the intern will develop an intelligent virtual concierge and integrate it with Curatio’s social network platform. The intelligent concierge will learn about each user over time and act as a personal assistant of the user in using the social network platform.

Interoperability of proofs with Dedukti and Beluga

Critical systems such as transportation systems require a high level of safety that can only be achieved with formal proof. Such formal proofs are typically expressed in some logic that can be verified by theorem provers. The diversity of theorem provers and logics has a negative consequence: the same theorem is proved many times and it is difficult for these systems to co-operate, because they do not implement the same logic. Logical frameworks are a class of theorem provers that overcome this issue by providing a generic framework in which we can represent and specify various logics.

Pages