PGT List of Ideas

You might also like

Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 26

Proposer Category

First Last Feel free to put any category (I will organi


First Last Other
First Last Collated

Daniela Romano digital healthcare

Daniela Romano digital healthcare

Daniela Romano digital healthcare

Daniela Romano digital healthcare

Mahmoud Elbasir privacy risk

Mahmoud Elbasir Mobile learning

Eerke Boiten privacy and networking

Eerke Boiten privacy, risk, security

Eerke Boiten privacy, risk, security

Eerke Boiten privacy, risk, security


Eerke Boiten security

Laleh Kasraian Digital Tranformation

Laleh Kasraian Digital Tranformation

Laleh Kasraian Big Data Analytics/Business Intelligence

Laleh Kasraian Big Data Analytics/Business Intelligence

Mehmet Sabir Kiraz Cyber Security- decentralized networks


Mehmet Sabir Kiraz Cyber Security, cryptography

Mehmet Sabir Kiraz Cyber Security, cryptography

Mehmet Sabir Kiraz Cyber Security, cryptography

Mehmet Sabir Kiraz Cyber Security, cryptography

Cyber Security, cryptography


Mehmet Sabir Kiraz
Darpan Triboan Data Analytics, Computer Science
Darpan Triboan Human-Computer Interface, Computer Science

Darpan Triboan Internet-of-Things, Computer Science

Darpan Triboan Assisted Living Systems, Human-Computer Interfac


Darpan Triboan Internet-of-Things, Computer Science

Darpan Triboan Ecommerce, Computer Science

Darpan Triboan Recommendation System

Ahmet Orun Computer Vision

Ahmet Orun Image data processing, Artificial Intelligence


Ahmet Orun Arificial Intelligence, data processing

Ahmet Orun Artificial Intelligence, machine vision

Ahmet Orun Computer Vision, image processing, AI

Ahmet Orun Quantum physics, Video processing, data analysis

Ahmet Orun Quantum Computing


Ashraf Tantawy Arificial Intelligence, Reinforcement Learning

Ashraf Tantawy Artificial Intelligence, Data Science, IoT

Mannai Usama Mobile App development


Mannai Usama Web Applications
Hossein Malekmohamadi AI
Hossein Malekmohamadi AI
Suleiman Yerima AI

Suleiman Yerima AI

Suleiman Yerima Cyber Security, AI

Suleiman Yerima Cyber Security, AI

Suleiman Yerima Cyber Security, AI


Suleiman Yerima Cyber Security, AI

Suleiman Yerima Cyber Security, AI


Title
TBC
TBC
Link to Webstie

Smart Footwear

Game Addiction

Autonomous Sensory Meridian Response

COMPULSIVE HOARDING
How is the Information Privacy management in
public social media is influenced by privacy risks,
mitigation plans and policies?

What are the factors affecting the adoption of Mobile learning in higher education?

Study of privacy by observing network traffic

Data protection impact assessment (DPIA)

What could possibly go wrong?

Contact tracing apps: technology


Ransomware: which controls work?

Digital Transformation Through the Lens of Enterprise Architecture: A Systematic Review

The Application of Digital-Twins Technology in Preventive Maintenance Systems: from the Industry 4.0 pe

The Application of Big Data Analytics in Wellbeing and Mental Health: Key Requirements, Techniques and

The Role of the Business Intelligence Systems to SMEs’ organisational Performance: A Case Study Resear

Danksharding in Ethereum 2.0


Non-interactive Distributed Key Generation and Key Resharing & its Applications to Blockchain

Implementation and Security analysis of EdDSA

Malleability of ECDSA Signatures

Analysing the Security and Complexity og Cryptographic Hash Functions

Security and Complexity Analysis of Threshold Signatures


Interactive Climate and Social Economics Data Visualization for Supporting Individuals & Policymakers
Enhancing Assistive System User Interaction Methods for Non-Technical Users

RFID based Multi-resident human activity detection in a smart home environment

Visualisation Smart Home Activities using Virtual Avatars to preserve privacy


A Low-cost IoT-camera based wild Animal and/or Intrusion Detection system in a Rural Area

Multicultural Wedding Logistics and Management System

Personalised film and series recommendation system

Development of product type/quality inspection system

Intelligent Aerial surveillance by satellite images


Intelligent Geographic Information System development

Security and Transportation system development

Medical Health Applications system development

Material analysis by Computational Quantum Physics and video imaging system

Quantum circuit design and demonstration for extraordinary tasks


Reinforcement Learning Agent Training and Deployment for a predefined Task

Exploratory Data Analysis for Smart Cities

Design and develop Android applications


Design and develop Web applications using .NET
Tracking and detection of blood clots
Water data visualisaion
Flood risk pattern recognition from satellite images using deep learning

Seasonal rainfall pattern analysis and prediction

Obfuscated malware detection using machine learning

Identifying Windows malware families using visualization techniques

IoT botnet detection through network traffic analysis


Document analysis for malicious behaviour detection

Identifying fraudulent URLs using Domain-based features


Short Description
TBC
TBC
Link to Website

In this project you will work with a researcher at the University College London
Interaction Centre and myself (Supervisor), to creates a Database of Sensors’
data (e.g.; pressure sensor, EMG, mocap) and an algorithm to control the
flexibility of a smart footwear.
Skills: Good programming skills and interest in AI & research

Video game addiction is the compulsive or uncontrolled use of video games in a


way that causes problems in other areas of the person's life. In this project, we
will explore 3D game addiction and utilise in-game messaging to communicate
with players. Gameplay will be also analysed to evaluate the game experience.
The project might also utilise and head-mounted display and frontal EEG to
analyse game play, should f2f evaluation be allowed.
Skills: Good programming skills, interest in Virtual Reality, AI, Human computer
interaction and research.

Autonomous Sensory Meridian Response (ASMR) is a tingling sensation, equivalent to a low-level euphoria, triggered by pa

Compulsive hoarding is a behavioural pattern characterised by excessive


acquisition of and an inability or unwillingness to discard large quantities of
objects in the home. In this project you will work with the University of Sheffield
Psychology Department and myself (Supervisor) to customise a UNITY Virtual
Immersive Environment to test how clutter affect the cognitive performance in
the general population. Your role will be to customise the Virtual Environment in
Unity.
Skills: Good programming skills, interest in Unity scripts, Virtual Reality, AI,
Human computer interaction and research.

This study aims to examine and investigate the potential risk of threats to users'
use of social media

This project seeks in helping researchers to understand


and distinguish the main attributes and features surrounding
M-learning by highlighting to investigate the factors affecting
m-learning in higher education

Setting up situations known to be privacy sensitive (apps, smart devices,


browsing, ...) in such a way that network traffic can be observed and contrasted
between slightly varied scenarios in order to answer important privacy
questions.
Investigate a number of published DPIAs and see what is good/bad about them -
deeper analysis or development of tools and templates to improve them.
Study a recently published "innovative" data collection and processing
application (supervisor's Twitter feed e.g. will have topical examples) and
analyse the risk associated, maybe leading to a formal DPIA.
Analyse several contact tracing apps, their technological choices, compare and
contrast and explain what is best and why - maybe leading to some new ideas.
There is decent knowledge about which controls might be considered against
ransomware. For ransomware attacks where details have been made public,
consider which controls were in place and which were not, and see if some
qualitative or even quantitative conclusions are possible on which controls really
make the difference.

The study explores the role of enterprise architecture as an important


component to support Digital Transformation in SMEs. The research focuses on
the contribution of how emerging technologies are supported by modern
Enterprise Architectures, as well as what the benefits and challenges are in
adopting such an architecture to support and drive Digital Transformation.

The study focuses on the necessity for developing an effective system as


Preventive Maintenance and introducing advanced modern technologies to
reduce the high cost of maintenance by adopting the technology of digital twins
(DTs) and their components through the lens of Industry 4.0 context.

The study is going to research about the application of Big Data Analytics in
medical areas like predicting spread of disease, detecting health anomalies,
patient monitoring through data collected from wearables and sensors. Big Data
Analytics promises to adopt a various range of technologies/techniques that
may transform the type of service delivery for health treatments/management
and provide solutions to the numerous health disorders.

The main aim of the research is to explore the role of Business Intelligence
Systems in the performance of Small and Medium-size Enterprises (SMEs) in a
particular domain in industry (e.g. Retail, Or Transport, etc.).Business
intelligence systems collect the key facts from large amounts of
unstructured/structured data and translates them into useable information
which assists companies/stakeholders to make strategic/tactical decisions in
time and may affect the organisational performance.
Sharding refers to splitting a blockchain into smaller portions to enhance overall
efficiency. Danksharding is a new type of sharding design that implements the
idea of a merged market fee. Unlike the conventional sharding, where each
shard has its own block and block proposer, there is only one proposer in
danksharding. In this design, it is the responsibility of the block builders to
decide which transactions and data go into each block slot.
Blockchain nodes may require authenticating to end users and between
themselves using digital signatures where these nodes are publicly known the
underlying their public keys. Due to permissionless setting, these nodes may
change over time. Non-interactive key distribution mechanism provides the
participating nodes a secret sharing of the nodes’ signing key, and makes them
easy for existing participants to reshare the secret key to a new set of nodes
whenever the composition of the node changes. The main goal of this Project is
to analyse the security of the existing mechanisms (especially in the context of
Blockchains) about non-interactive publicly verifiable secret sharing schemes
where a dealer can construct a Shamir secret sharing of a field element and
confidentially yet verifiably distribute shares to multiple receivers. The Project
work plan consists in two stages; first, the analysis of the State of The Art
regarding non-interactive publicly verifiable secret sharing protocols will be
performed. Second, main activities will take place and correspond to the design
and implementation of novel algorithms and its performance evaluation on a
testnet of blockchain such as Ethereum, ICP, and Polkadot.
https://eprint.iacr.org/2021/339.pdf

In this project, we aim to analyse the security of EdDSA. In particular, we analyse


how the randomness is used while generating the signatures and also the
correct usage will be recommended.

https://www.rfc-editor.org/rfc/rfc8032#section-5.1.6

Malleability allows anyone to modify the signature in a specific way without


access to the private key and yet the signature remains perfectly valid. In this
project, we aim to analyse the malleability of ECDSA signature and recommend
how to use it in practice.
In this project, we aim to analyse the security and efficieny of some specific hash
functions such as MiMC, Poseidon, and Sinsemilla.
We aim to compare the security and complexity of existing threshold signatures
(ECDSA, EdDSA, BLS).
This project is set in the context of developing disaster risk reduction and
mitigation strategies with the aid of visualising various climate, social and
economic data. In this project, you are required to develop an interactive
webpage to allow individuals and policymakers to visualise historic data, and
overlay short- and long-term prediction data such as temperature and rainfall
data of a specific region or around the world. The data used for visualisation
should ideally be real and can be retrieved from an external application protocol
interface (API) or suitable agencies but can be simulated if needed. However,
the candidate will be expected to carry out a literature review on disaster risk
reduction, key climate change factors of a given type of disaster such as flooding
and provide insights into social and economic impact for a given region.
Project Objectives:
• To develop a dynamic website with visualisation of climate and social data of a
given disaster-prone region with interactive capabilities with charts and
diagrams (i.e., using D3, React, Charts and other java scripts).
• To visualise data across the various timeline and one or more parameters.
• To load sample data from a file (i.e., XML, EXCEL, CSV, JSON) and visualises the
data.
With the recent advancements in smart home technologies and the evolution of
human-computer interface (HCI) methods, it is now possible to provide natural
HCI to non-technical expert users. For instance, conventional methods of voice-
based devices such as Amazon Echo and Google Home, and touch and gesture-
based methods using smartphones and Smart TV devices are now being
integrated within AAL systems. A typical use case scenario could be to remind
the elderly to take their afternoon medicines using the voice-based device or
prompting while entertaining themselves on Smart TV.

Project Objectives:
To develop a natural HCI by doing the following:
• Integrating voice-based services such as Amazon Echo/Google to inform
inhabitant/user with a bespoke assistance instruction (i.e. suggesting to take
medicine, reminding for doctor appointments, cooking instructions)
• Develop supporting IOs/Android mobile applications to allow users to set up
and interact with the system.
• Evaluate the system with non-technical users.

In order to monitor and care for vulnerable individuals, an unintrusive and


privacy-preserving method is required to detect their daily activities within a
given environment and provide assistance when required. In this project, you
are required to work with a UHF RFID tag reader and microcontrollers to read
RFID tags to detect, locate and track individuals in a given room. The data
collected from the reader will be needed to be visualised using 2D/3D objects on
a mobile or web browser application.

Project Objectives:
The objectives to identify multiple residents and detect their actions with
everyday objects are:
• Integrating the UHF RFID tag reader already available in the CIIRG lab into your
system.
• Manipulating (Store, query and update and delete) RFID cards/tags-related
data (i.e., location, signal strength, etc) into the database via web service.
• Broadcasting sensing data in real-time on a mobile application or web browser.
Assisted living systems are being developed for the elderly, professional health
services and even for their family members and relatives to monitor, and
provide efficient care and support for the elderly when required non-intrusively.
In general, assisted living systems collects data using appropriate smart Internet-
of-things (IoT) devices/sensors, analyse the data to recognise the daily activities
being performed by the inhabitant in a given room and prompt them if required.
The goal of the project is not to recognise their daily activities but to simulate
the person’s actions in a given virtual room with a virtual avatar of a person
from the sensors' data log. You can think of this virtual simulation of the home
environment and virtual avatar as the strategic game The Sims: FreePlay game.
The sensor's data log will have information about what object they are
interacting with, when are they doing it and how are they interacting with it. You
can create your own data log to simulate the actions and move the avatar in the
virtual space or use existing real datasets available online for human activity
recognition.
This virtualisation of the events of a person helps anonymise and preserve an
individual’s privacy and integrity when their information is shared with another
person for monitoring and care purposes.
What problem is this project solving?
How to develop a low-cost, energy-efficient and limited or no internet access for
an Internet-of-Things (IoT) based Assisted system?

Background:
The assisted living systems are typically used by non-technical expert users and
configuring/maintaining Internet-of-Things (IoT) devices to the system is the
biggest challenge. Moreover, assisted living systems in rural areas with limited
internet access, low-income community and elderly populations living in fear of
wild animals entering the property or their house being broken into.

In this project, you will be expected to explore developing and working with
physical IoT devices that you must identify and acquire yourself to create a small
network of IoT devices with sensors that is low cost, uses low energy or self-
charging and does not rely on the internet to function or create automation
tasks. Support will be provided by the supervisor regardless of your experience
in working with physical IoT devices.
A variation of the project can be to use develop a wild animal detection or
intrusion detection system
In the multicultural society using IoTlive
that we devices (i.e., ESP32
in, wedding microcontroller)
planning with
and arrangement
low-energy
have numerous challenges and they differ based on your faith or religion. (see
consumption/self-charging and little to no internet connection
https://www.tensorflow.org/lite
Your task is to develop a system to forallow
morecouples
information).
to plan their wedding from
start to finish and give them options to choose their own venues, catering, decor
etc in a single solution.
A literature review will be required to understand the current market and key
features required by couples from different religions.
Your solution can explore features such as getting instant quotes from different
services, invitations management, events photo and video sharing solutions etc.
We are all familiar with Netflix, Amazon, Disney Plus and other such streaming
services and they attempt to recommend films and series to you.
Your task is to conduct a literature review on the recommendation system and
develop our own recommendation system.
The literature review can explore questions such as:
How accurate are their recommendations?
How and why do they derive such recommendations?
What metrics or parameters are used to rank and propose films and series?

REAL-TIME PRODUCT INSPECTION SYSTEM :


Particularly industrial product analysis (e.g. medical tablets, fruits, tools, car parts, etc.) is
commercially very popular fields which attracts broad range of producers. In this research you are
expected to evaluate the inspection algorithms and software codes in Vbasic, VC++, Python, etc.
which may bring new optical solutions to traditional industrial production problems. The medical
tablet inspection project has a potential of strong links with the tablet producers and may also
lead to a future employment.
https://dora.dmu.ac.uk/bitstream/handle/2086/14262/
Intelligent Aerial surveillance by satellite images :
Pharmaceutical_Innovation_Orun_Smith.pdf?sequence=1
This application includes AI techniques to interpret video/images collected via
GoogleMAP and their classification to meet requirements of some specific tasks like local
urban inspections (e.g. railway/motorway inspection along its route, illegal building
extensions inspection or traffic surveillance (unauthorised parking, lost vehicle
detection, etc.) or environmental , agricultural, forestry, water management, etc.
observations.
In this application GoogleMap or other free observation satellites would be used for
professional aerial surveying and inspection by use of artificial intelligence techniques
applicable images for on-board automated instant image data processing. The similar
method was already applied onto satellite imagery for man made v natural feature
classification on the earth surface.
https://www.researchgate.net/publication/270558998_Automated_Identification_of_M
an-Made_Textural_Features_on_Satellite_Imagery_by_Bayesian_Networks
The system will be based on satellite images, maps, statistical data analysis by AI
methods for urban development prediction, As its research outcome would later be
applicable to flood estimation, land management, etc. which has an important economic
aspect for the estate market in the UK or any critical region in the World. It is expected
that any predictive system developed within this research can have a market potential
for the Estate & Housing market. (e.g. for property value estimation) or other topics
like: illegal construction detection, urban area growth, or environmental , agricultural,
forestry, water management, etc. observations.
https://www.sciencedirect.com/science/article/pii/S1361920917309008

CCTV applications, traffic management applications , airport security, behaviour


analysis from video files/online data, etc. This area is the specific application of
Machine Vision and Image/video processing
https://link.springer.com/chapter/10.1007/BFb0015987

Medical Health Applications ( medical imaging, Infrared imaging, tissue/skin


texture analysis for diseases or abnormality detection.) Our novel method
“intelligent Laser speckle Classification” is widely used for health abnormality
detection from skin imagery. (e.g. diabetes, skin diseases, etc.)
https://pubmed.ncbi.nlm.nih.gov/24661064/

The research would require some lab experiments by using quantum instrumentation
located in HLS Lab and hence requires attendance in the Lab at faculty of Health & life
sciences (Hawthorn Building). More specifically the experiments would be on
“characterisation of specific materials by use of computational quantum physics”.
Video processing of interferometric images by use of laser interferometer (quantum
eraser set) will be the main task.
https://www.spiedigitallibrary.org/journals/optical-engineering/volume-59/issue-
3/033102/Investigation-on-a-quantum-communication-phenomenon-between-
subatomic-properties-of/10.1117/1.OE.59.3.033102.short
https://kobit.org.tr/posters/orun.pdf

Quantum Computing refers to quantum circuit development


and running it on the remote quantum computers (e.g. IBM QX)
for some extraordinary tasks (e.g. quantum simulation, quantum
cryptography, etc. and you do not need to work in a specific lab.
Some knowledge of Python programming and free subscription
of IBM QX needed.
https://quantum-computing.ibm.com/
Reinforcement learning is an area of machine learning where intelligent agents
are trained on a specific task by interacting with the environment to maximize a
cumulative reward. Practical applications for reinforcement learning have
increased significantly over the last few years due to the use of deep learning in
agent design. In this project, you will pick a task of your choice and go through
the whole process of RL agent design. This includes creating the environment,
formulating the reward function, agent creation and training, and agent
validation. Example tasks: playing a game, lane tracking for an autonomous
vehicle, adaptive traffic light control, text summarization, robot arm object
grasping, online ad recommender, online news recommender, and industrial
equipment control. When selecting a task, note that the environment should
have either simulation available (preferred) or you need to build the
environment physically (not recommended for a short project unless you have
the environment already). What you will learn: Reinforcement Learning
fundamentals and how to design and deploy an agent (exciting domain!), Python
for machine learing or Matlab/Simulink, task domain experience.

Internet of Things (IoT) is an enabling technology for smart cities. Sensors


produce a large amount of data that could be explored in a variety of ways to
make our life more safe, secure, and resource-efficient. In this project, you will
use any smart city dataset available online and do the task of data analysis and
exploration (beyond simple data description). For example, you may get a smart
home dataset about energy consumption over a period of time. You will analyse
the data and may use it to infer the user activities, predict future energy
consmuption, or give insight on how to reduce energy consumption. The choice
of the dataset and the specific task will be yours, but the data analysis task
should be suitable for a graduate project. What you will learn: Data analysis and
visualisation, Data exploration, Python for data science.
Skills : good programming skill, SQL database and cloud computing

Deep learning and image processing skills are required


n and develop a system to visualise end-user's water consumption related to different activities and conditions.
This project will develop and evaluate deep learning based approaches for
recognizing flood patterns from satellite images.
This project will utilize rainfall datasets and other climate data to analyze the
climate patterns of a specific region and develop accurate prediction techniques
using machine learning.

This project will investigate modern techniques used for Android or Windows
malware obfuscation (evasive behaviours that makes malware more difficult to
analyze or detect). The project will utilize real malware samples with obfuscation
and non-obfuscation properties to extract features for identifying obfuscation
and obfuscation types. The efficacy of these features will be tested using deep
learning/machine learning models.
In this project, different options for malware family visualization (e.g. byteplot,
markov plot) will be explored. The project will create tools for visualization of
the malware samples and the classification of the samples into various families
using deep learning techniques.
This project will use machine learning (supervised or unsupervised) with IoT
botnet traffic features to develop and evaluate detection models.
This project will create a fully automated systems to classify Office or PDF
documents as potentially malicious or dangerous. A set of features for
identifying malicious behaviour will be identified and analysed, and then used to
develop heuristics or supervised machine learning models for malicious
document detection.
This project will propose an evaluate and approach to detect illegitimate URLs
from mining DNS requests. The system would be created to identify malicious
Botnets that use DGA (Domain Generation Algorithms) to conceal their
command and control channels.
-level euphoria, triggered by particular videos and sounds, which is a very popular trend on YouTube. In this project you will analyse so
project you will analyse some EEG recording with Matlab obtained from people experiencing ASMR

You might also like