Professional Documents
Culture Documents
PGT List of Ideas
PGT List of Ideas
PGT List of Ideas
Suleiman Yerima AI
Smart Footwear
Game Addiction
COMPULSIVE HOARDING
How is the Information Privacy management in
public social media is influenced by privacy risks,
mitigation plans and policies?
What are the factors affecting the adoption of Mobile learning in higher education?
The Application of Digital-Twins Technology in Preventive Maintenance Systems: from the Industry 4.0 pe
The Application of Big Data Analytics in Wellbeing and Mental Health: Key Requirements, Techniques and
The Role of the Business Intelligence Systems to SMEs’ organisational Performance: A Case Study Resear
In this project you will work with a researcher at the University College London
Interaction Centre and myself (Supervisor), to creates a Database of Sensors’
data (e.g.; pressure sensor, EMG, mocap) and an algorithm to control the
flexibility of a smart footwear.
Skills: Good programming skills and interest in AI & research
Autonomous Sensory Meridian Response (ASMR) is a tingling sensation, equivalent to a low-level euphoria, triggered by pa
This study aims to examine and investigate the potential risk of threats to users'
use of social media
The study is going to research about the application of Big Data Analytics in
medical areas like predicting spread of disease, detecting health anomalies,
patient monitoring through data collected from wearables and sensors. Big Data
Analytics promises to adopt a various range of technologies/techniques that
may transform the type of service delivery for health treatments/management
and provide solutions to the numerous health disorders.
The main aim of the research is to explore the role of Business Intelligence
Systems in the performance of Small and Medium-size Enterprises (SMEs) in a
particular domain in industry (e.g. Retail, Or Transport, etc.).Business
intelligence systems collect the key facts from large amounts of
unstructured/structured data and translates them into useable information
which assists companies/stakeholders to make strategic/tactical decisions in
time and may affect the organisational performance.
Sharding refers to splitting a blockchain into smaller portions to enhance overall
efficiency. Danksharding is a new type of sharding design that implements the
idea of a merged market fee. Unlike the conventional sharding, where each
shard has its own block and block proposer, there is only one proposer in
danksharding. In this design, it is the responsibility of the block builders to
decide which transactions and data go into each block slot.
Blockchain nodes may require authenticating to end users and between
themselves using digital signatures where these nodes are publicly known the
underlying their public keys. Due to permissionless setting, these nodes may
change over time. Non-interactive key distribution mechanism provides the
participating nodes a secret sharing of the nodes’ signing key, and makes them
easy for existing participants to reshare the secret key to a new set of nodes
whenever the composition of the node changes. The main goal of this Project is
to analyse the security of the existing mechanisms (especially in the context of
Blockchains) about non-interactive publicly verifiable secret sharing schemes
where a dealer can construct a Shamir secret sharing of a field element and
confidentially yet verifiably distribute shares to multiple receivers. The Project
work plan consists in two stages; first, the analysis of the State of The Art
regarding non-interactive publicly verifiable secret sharing protocols will be
performed. Second, main activities will take place and correspond to the design
and implementation of novel algorithms and its performance evaluation on a
testnet of blockchain such as Ethereum, ICP, and Polkadot.
https://eprint.iacr.org/2021/339.pdf
https://www.rfc-editor.org/rfc/rfc8032#section-5.1.6
Project Objectives:
To develop a natural HCI by doing the following:
• Integrating voice-based services such as Amazon Echo/Google to inform
inhabitant/user with a bespoke assistance instruction (i.e. suggesting to take
medicine, reminding for doctor appointments, cooking instructions)
• Develop supporting IOs/Android mobile applications to allow users to set up
and interact with the system.
• Evaluate the system with non-technical users.
Project Objectives:
The objectives to identify multiple residents and detect their actions with
everyday objects are:
• Integrating the UHF RFID tag reader already available in the CIIRG lab into your
system.
• Manipulating (Store, query and update and delete) RFID cards/tags-related
data (i.e., location, signal strength, etc) into the database via web service.
• Broadcasting sensing data in real-time on a mobile application or web browser.
Assisted living systems are being developed for the elderly, professional health
services and even for their family members and relatives to monitor, and
provide efficient care and support for the elderly when required non-intrusively.
In general, assisted living systems collects data using appropriate smart Internet-
of-things (IoT) devices/sensors, analyse the data to recognise the daily activities
being performed by the inhabitant in a given room and prompt them if required.
The goal of the project is not to recognise their daily activities but to simulate
the person’s actions in a given virtual room with a virtual avatar of a person
from the sensors' data log. You can think of this virtual simulation of the home
environment and virtual avatar as the strategic game The Sims: FreePlay game.
The sensor's data log will have information about what object they are
interacting with, when are they doing it and how are they interacting with it. You
can create your own data log to simulate the actions and move the avatar in the
virtual space or use existing real datasets available online for human activity
recognition.
This virtualisation of the events of a person helps anonymise and preserve an
individual’s privacy and integrity when their information is shared with another
person for monitoring and care purposes.
What problem is this project solving?
How to develop a low-cost, energy-efficient and limited or no internet access for
an Internet-of-Things (IoT) based Assisted system?
Background:
The assisted living systems are typically used by non-technical expert users and
configuring/maintaining Internet-of-Things (IoT) devices to the system is the
biggest challenge. Moreover, assisted living systems in rural areas with limited
internet access, low-income community and elderly populations living in fear of
wild animals entering the property or their house being broken into.
In this project, you will be expected to explore developing and working with
physical IoT devices that you must identify and acquire yourself to create a small
network of IoT devices with sensors that is low cost, uses low energy or self-
charging and does not rely on the internet to function or create automation
tasks. Support will be provided by the supervisor regardless of your experience
in working with physical IoT devices.
A variation of the project can be to use develop a wild animal detection or
intrusion detection system
In the multicultural society using IoTlive
that we devices (i.e., ESP32
in, wedding microcontroller)
planning with
and arrangement
low-energy
have numerous challenges and they differ based on your faith or religion. (see
consumption/self-charging and little to no internet connection
https://www.tensorflow.org/lite
Your task is to develop a system to forallow
morecouples
information).
to plan their wedding from
start to finish and give them options to choose their own venues, catering, decor
etc in a single solution.
A literature review will be required to understand the current market and key
features required by couples from different religions.
Your solution can explore features such as getting instant quotes from different
services, invitations management, events photo and video sharing solutions etc.
We are all familiar with Netflix, Amazon, Disney Plus and other such streaming
services and they attempt to recommend films and series to you.
Your task is to conduct a literature review on the recommendation system and
develop our own recommendation system.
The literature review can explore questions such as:
How accurate are their recommendations?
How and why do they derive such recommendations?
What metrics or parameters are used to rank and propose films and series?
The research would require some lab experiments by using quantum instrumentation
located in HLS Lab and hence requires attendance in the Lab at faculty of Health & life
sciences (Hawthorn Building). More specifically the experiments would be on
“characterisation of specific materials by use of computational quantum physics”.
Video processing of interferometric images by use of laser interferometer (quantum
eraser set) will be the main task.
https://www.spiedigitallibrary.org/journals/optical-engineering/volume-59/issue-
3/033102/Investigation-on-a-quantum-communication-phenomenon-between-
subatomic-properties-of/10.1117/1.OE.59.3.033102.short
https://kobit.org.tr/posters/orun.pdf
This project will investigate modern techniques used for Android or Windows
malware obfuscation (evasive behaviours that makes malware more difficult to
analyze or detect). The project will utilize real malware samples with obfuscation
and non-obfuscation properties to extract features for identifying obfuscation
and obfuscation types. The efficacy of these features will be tested using deep
learning/machine learning models.
In this project, different options for malware family visualization (e.g. byteplot,
markov plot) will be explored. The project will create tools for visualization of
the malware samples and the classification of the samples into various families
using deep learning techniques.
This project will use machine learning (supervised or unsupervised) with IoT
botnet traffic features to develop and evaluate detection models.
This project will create a fully automated systems to classify Office or PDF
documents as potentially malicious or dangerous. A set of features for
identifying malicious behaviour will be identified and analysed, and then used to
develop heuristics or supervised machine learning models for malicious
document detection.
This project will propose an evaluate and approach to detect illegitimate URLs
from mining DNS requests. The system would be created to identify malicious
Botnets that use DGA (Domain Generation Algorithms) to conceal their
command and control channels.
-level euphoria, triggered by particular videos and sounds, which is a very popular trend on YouTube. In this project you will analyse so
project you will analyse some EEG recording with Matlab obtained from people experiencing ASMR