The discrete cosine transform (DCT) has widely been used in image and video compression coding. However, the conventional DCT causes severe block artifacts in the compressed image in low-bit-rate coding applications. The block effect is perceived as visible discontinuities cross the block boundaries. Many researchers have proposed other techniques, such as the filter bank approach, to remove or suppress this undesirable feature.
Sparkmatrix, a provider of online tools for property managers, has positioned one of its next-generation service provisioning commodities at IEEE 802.16 networks (or Wimax). The company successfully delivered IEEE 802.11 and IEEE 802.16 services to their customers. To improve the service quality and coverage, they considered deploying relays in order to erase any possible black notes and service deficiencies in buildings and offices.
This internship project with Deep Compression Inc. aims to produce a prototype demonstrating a new technique for asymmetric lossless data compression. Unlike conventional compression techniques, this prototype will allow representational information to be recovered using an algorithmic recovery procedure, algorithmic self-organizing structure (ASOS).
The project involves creating a vision based system to perform multi-camera 3D tracking of persons in an indoor environment. The implementation of this system will be using Open Vision Library (a standard library for image processing that is designed with hardware acceleration in mind) and it will be running on one or multiple processor hardware platform developed by LightHaus. LightHaus Logic is a Vancouver-based company that develops compact high-performance systems for advanced video analytics and embedded computer applications.
In order to produce ever more powerful computer chips designers have begun to produce CPUs with duplicated infrastructure and machines with multiple CPUs. This allows these devices to perform actual simultaneous calculation. The most recent generation of video game consoles are built with this manner of technology, thus adding a new dimension of complexity to the design of the underlying system. Taking a traditional computational task and dividing it for parallel execution is not trivial.
The objective of this project is to contribute a quantitative framework for analyzing potential inefficiencies of current practices at Bell Canada in the early stages of telecommunication service provisioning, particularly pre-sales and network request sub-processes. Models of these processes incorporating randomness are to be estimated from past data and utilized as a basis for efficiency improvement using both simulation and analytical optimization tools.
Sleep monitoring plays an essential role in the diagnosis of sleep disturbances. While the polysomnogram represents the gold standard, it has the disadvantage of assessing the patient’s sleep in an unfamiliar environment, usually a sleep clinic. This proposal targets the development of new computer vision-based methods for home-based sleep monitoring in partnership with Vigil Health Solutions, a company providing healthcare services and products internationally.
Optical imaging and the underlying image analysis has seen tremendous progress in recent years. Although it is now possible to perform multi-modal acquisition, the analysis frameworks for multi-modal data remain elusive. For example, the different scales and resolutions at which the images are taken require the use of mathematical techniques to deform, analyze and co-register images in a coherent framework. In parallel, J. Patera and his research group have, over the last few years, developed new Lie Algebra-based techniques to process images and perform continuous operations on them.
In their various versions (XP, 2003, Vista, Longhorn), Windows operating systems offer different cryptographic security technologies for data such as Encrypted File System and BitLocker. The capabilities of these tools depend on the presence of hardware modules for example, the Trusted Platform Module. The aim of this project is to complete a comprehensive study of the usage made of these technologies so that step-by-step tutorials can be prepared to guide users of these technological tools as per requirements.
Enquisite Software provides analytical services to corporate clients through the “mining” of data detailing how the clients’ customers interact with the clients’ Internet points-of-presence. To facilitate this work, Enquisite collects a continuous stream of client interaction data, which is stored in an Enquisite-held repository, over which Enquisite clients perform on-demand queries for business actionable knowledge.