In the world of today’s internet, ‘web notifications’ are becoming increasingly common. As opposed to a traditional search which is executed once against entered keywords, a web notification search is performed on a regular or continual basis, keeping track of available information changes in real time. The user is then notified once an item of interest appears on-line. Notification services receive continuous pings from blogs which inform of updates.
Triant Technologies provides the ModelWare Fault Detection software product to monitor sensor data collected from advanced manufacturing tools such as those used for semiconductor and flat panel display manufacturing. ModelWare Fault Detection software performs a range of analyses, including online, multivariate data analysis using a proprietary algorithm and implementation. The goal for this project is to improve the performance of the multivariate analysis methods when used with complex manufacturing equipment.
This project involves the modelling and implementation of algorithms using data collected with a laser triangulation camera. This camera is used to produce highly precise three-dimensional measurements inside rooms. It is activated manually or through a mechanical arm and takes measurements along three orthogonal axes.
The internship project with Pacific Nuclear Medicine will develop a software tool that brings two images obtained from different imaging modalities into spatial alignment (aka multi-modal registration). This is a necessary task for the creation of correct image fusions, which are essential for diagnosis and correction of nuclear medicine images. Additionally, the project will develop a feature-registration framework in which pattern-recognition techniques and feature-extraction methods to increase the accuracy and robustness of the registration algorithm will be employed.
The discrete cosine transform (DCT) has widely been used in image and video compression coding. However, the conventional DCT causes severe block artifacts in the compressed image in low-bit-rate coding applications. The block effect is perceived as visible discontinuities cross the block boundaries. Many researchers have proposed other techniques, such as the filter bank approach, to remove or suppress this undesirable feature.
Sparkmatrix, a provider of online tools for property managers, has positioned one of its next-generation service provisioning commodities at IEEE 802.16 networks (or Wimax). The company successfully delivered IEEE 802.11 and IEEE 802.16 services to their customers. To improve the service quality and coverage, they considered deploying relays in order to erase any possible black notes and service deficiencies in buildings and offices.
This internship project with Deep Compression Inc. aims to produce a prototype demonstrating a new technique for asymmetric lossless data compression. Unlike conventional compression techniques, this prototype will allow representational information to be recovered using an algorithmic recovery procedure, algorithmic self-organizing structure (ASOS).
In order to produce ever more powerful computer chips designers have begun to produce CPUs with duplicated infrastructure and machines with multiple CPUs. This allows these devices to perform actual simultaneous calculation. The most recent generation of video game consoles are built with this manner of technology, thus adding a new dimension of complexity to the design of the underlying system. Taking a traditional computational task and dividing it for parallel execution is not trivial.
The project involves creating a vision based system to perform multi-camera 3D tracking of persons in an indoor environment. The implementation of this system will be using Open Vision Library (a standard library for image processing that is designed with hardware acceleration in mind) and it will be running on one or multiple processor hardware platform developed by LightHaus. LightHaus Logic is a Vancouver-based company that develops compact high-performance systems for advanced video analytics and embedded computer applications.
In their various versions (XP, 2003, Vista, Longhorn), Windows operating systems offer different cryptographic security technologies for data such as Encrypted File System and BitLocker. The capabilities of these tools depend on the presence of hardware modules for example, the Trusted Platform Module. The aim of this project is to complete a comprehensive study of the usage made of these technologies so that step-by-step tutorials can be prepared to guide users of these technological tools as per requirements.