The document describes several final year project ideas including predictive analytics, a soccer playing agent team for Robocup simulation, the game of Hex, intelligent web search using semantic knowledge, plagiarism detection, text compression using LZW method, searching multiple search engines, tracking website access statistics, mobile phone location services, and image analysis tools. The projects involve developing algorithms and applications in areas such as predictive modeling, artificial intelligence, games, search engines, data compression, and computer vision.
Information retrieval is the huge field and this research paper we are presenting the Information retrieval
in which we explore relevance ranking using terms relevance using hyperlinks, synonyms, ontologies, indexing
of documents web search engine directories and some other things there are some more difference sources that
we use in Information retrieval let's talk about the mobile Information retrieval that article is Information retrieval
such as design, moving things file folder, speech, voice, video, images and possible combination of mobile
devices mobile it shall becoming even permanent in upcoming years according to previous studies mobile phone
devices toward computer as a primary tool of internet. In Information retrieval we have three major examples
physics recommended, e-commerce and movies and media sites the Information retrieval is a complex procedure
Mainly there are three types of information retrieval. Information retrieval system knowledge based system
database management system so in that case Information retrieval system we have web search engine keyword
search of a extensive formula update capability is shared used for both read and write and legal system is
significant detective capabilities and relevantly small schema.
The document discusses the differences and similarities between open source and open data. Open source refers to software where the source code is openly available, while open data refers to freely available data that can be used and shared by anyone. Both open source and open data aim for transparency and collaboration. However, open source focuses on programs and code, while open data focuses on freely sharing raw data for any purpose. Laws and adoption have also progressed further for open data compared to open source. Overall, the goals of openness are largely aligned between the two concepts.
This document discusses building knowledge graphs using DIG (Distributed Information Graphs) to integrate heterogeneous data sources. It describes the steps involved, including data acquisition, feature extraction, mapping to an ontology, entity resolution, graph construction, and deployment. As a use case, DIG has been used to build a knowledge graph from over 100 million web pages related to human trafficking to help law enforcement identify victims and prosecute traffickers.
Extracting, Aligning, and Linking Data to Build Knowledge GraphsCraig Knoblock
This document discusses building knowledge graphs by extracting, aligning, and linking data from various sources. It describes crawling websites to acquire raw data, using both structured and unstructured extraction to extract features from the data, aligning the extracted features to a common schema, and resolving entities in the data to merge records referring to the same real-world entity. It also discusses techniques for collectively resolving entities in large datasets, summarizing graphs by grouping similar nodes into super-nodes, and using the summarized graph to predict links in the original graph. The overall goal is to clean, organize, and link disconnected data into a knowledge graph that is easier to query, analyze, and visualize.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Deep neural networks for matching online social networking profilesTraian Rebedea
The document presents a study on using deep neural networks to match online social networking profiles that belong to the same individual. It describes extracting features from profiles, including domain-specific and text-based features. A deep neural network model with multiple fully-connected layers is proposed and shown to achieve high precision and recall on a large dataset, outperforming other supervised and unsupervised baseline methods. The study demonstrates applying deep learning techniques to the task of linking profiles from different social networks that refer to the same person.
Building efficient and effective metasearch enginesunyil96
This document discusses building efficient and effective metasearch engines. It describes how metasearch engines provide unified access to multiple existing search engines without maintaining their own indexes. The main challenges in building metasearch engines are database selection, document selection, and result merging. Database selection identifies relevant search engines for a query. Document selection determines which documents to retrieve from selected search engines. Result merging combines results into a single ranked list. Techniques for tackling these challenges are surveyed.
Information retrieval is the huge field and this research paper we are presenting the Information retrieval
in which we explore relevance ranking using terms relevance using hyperlinks, synonyms, ontologies, indexing
of documents web search engine directories and some other things there are some more difference sources that
we use in Information retrieval let's talk about the mobile Information retrieval that article is Information retrieval
such as design, moving things file folder, speech, voice, video, images and possible combination of mobile
devices mobile it shall becoming even permanent in upcoming years according to previous studies mobile phone
devices toward computer as a primary tool of internet. In Information retrieval we have three major examples
physics recommended, e-commerce and movies and media sites the Information retrieval is a complex procedure
Mainly there are three types of information retrieval. Information retrieval system knowledge based system
database management system so in that case Information retrieval system we have web search engine keyword
search of a extensive formula update capability is shared used for both read and write and legal system is
significant detective capabilities and relevantly small schema.
The document discusses the differences and similarities between open source and open data. Open source refers to software where the source code is openly available, while open data refers to freely available data that can be used and shared by anyone. Both open source and open data aim for transparency and collaboration. However, open source focuses on programs and code, while open data focuses on freely sharing raw data for any purpose. Laws and adoption have also progressed further for open data compared to open source. Overall, the goals of openness are largely aligned between the two concepts.
This document discusses building knowledge graphs using DIG (Distributed Information Graphs) to integrate heterogeneous data sources. It describes the steps involved, including data acquisition, feature extraction, mapping to an ontology, entity resolution, graph construction, and deployment. As a use case, DIG has been used to build a knowledge graph from over 100 million web pages related to human trafficking to help law enforcement identify victims and prosecute traffickers.
Extracting, Aligning, and Linking Data to Build Knowledge GraphsCraig Knoblock
This document discusses building knowledge graphs by extracting, aligning, and linking data from various sources. It describes crawling websites to acquire raw data, using both structured and unstructured extraction to extract features from the data, aligning the extracted features to a common schema, and resolving entities in the data to merge records referring to the same real-world entity. It also discusses techniques for collectively resolving entities in large datasets, summarizing graphs by grouping similar nodes into super-nodes, and using the summarized graph to predict links in the original graph. The overall goal is to clean, organize, and link disconnected data into a knowledge graph that is easier to query, analyze, and visualize.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Deep neural networks for matching online social networking profilesTraian Rebedea
The document presents a study on using deep neural networks to match online social networking profiles that belong to the same individual. It describes extracting features from profiles, including domain-specific and text-based features. A deep neural network model with multiple fully-connected layers is proposed and shown to achieve high precision and recall on a large dataset, outperforming other supervised and unsupervised baseline methods. The study demonstrates applying deep learning techniques to the task of linking profiles from different social networks that refer to the same person.
Building efficient and effective metasearch enginesunyil96
This document discusses building efficient and effective metasearch engines. It describes how metasearch engines provide unified access to multiple existing search engines without maintaining their own indexes. The main challenges in building metasearch engines are database selection, document selection, and result merging. Database selection identifies relevant search engines for a query. Document selection determines which documents to retrieve from selected search engines. Result merging combines results into a single ranked list. Techniques for tackling these challenges are surveyed.
Wholi is a company that aggregates data from public online sources to build knowledge graphs about people and companies. They use machine learning and natural language processing techniques like named entity recognition and topic modeling to extract useful features from text data. They also employ bootstrapped entity and relationship learning to infer additional information. Wholi matches profiles using a deep learning classifier trained on a large dataset of over 500,000 social media profiles to determine which profiles belong to the same individuals. Their goal is to provide a more complete online identity for matching purposes.
The document summarizes experiences building a semantic web application to detect conflicts of interest using FOAF and DBLP data. It involved multiple steps: obtaining and preparing data; representing entities and relationships in an ontology; querying the data using semantic associations to determine COI levels; visualizing results; and evaluating based on a conference review dataset. The system was able to detect indirect COI relationships that syntactic matching would miss.
This document discusses several key aspects of mathematics and algorithms used in internet information retrieval and search engines:
1. It explains how search engines like Google can rapidly rank billions of web pages using algorithms based on the topology and link structure of the web graph, such as PageRank.
2. It describes two main types of page ranking algorithms - static importance ranking based on link analysis, and dynamic relevance ranking based on statistical learning models to match pages to queries.
3. It proposes a new ranking algorithm called BrowseRank that models user browsing behavior using Markov chains and takes into account visit duration to better reflect true page importance.
This document discusses incentive-based tagging to maximize the quality of resource tagging in social tagging systems. It finds that most resources are under-tagged, receiving too few tags to be useful, while a few popular resources are over-tagged. It proposes rewarding users for tagging under-tagged resources to address this imbalance. The key concepts of tagging quality, tagging stability, unstable and stable points are introduced. An optimal incentive allocation algorithm is presented to decide how to distribute rewards among resources to maximize overall tagging stability.
The document discusses several mathematical models and algorithms used in internet information retrieval and search engines:
1. Markov chain methods can be used to model a user's web surfing behavior and page visit transitions.
2. BrowseRank models user browsing as a Markov process to calculate page importance based on observed user behavior rather than artificial assumptions.
3. Learning to rank problems in information retrieval can be framed as a two-layer statistical learning problem where queries are the first layer and document relevance judgments are the second layer.
4. Stability theory can provide generalization bounds for learning to rank algorithms under this two-layer framework. Modifying algorithms like SVM and Boosting to have query-level stability improves performance.
This document discusses machine learning and information retrieval. It introduces machine learning and describes some common applications like bioinformatics, robotics, and computer vision. It then discusses information retrieval, including traditional keyword search approaches and a new example-based approach. Several prototype systems are described that use this example-based approach for tasks like movie search, academic literature search, image retrieval, and protein search. The approach is statistically principled, computationally fast, and easily parallelized.
Semantic Web-based E-Commerce: The GoodRelations OntologyMartin Hepp
Semantic Web-based E-Commerce: The GoodRelations Ontology
Presentation at the Semantic Technology Conference, June 15, 2009
http://purl.org/goodrelations/
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM csandit
With the increasing growth of Internet and World Wide Web, information retrieval (IR) has
attracted much attention in recent years. Quick, accurate and quality information mining is the
core concern of successful search companies. Likewise, spammers try to manipulate IR system
to fulfil their stealthy needs. Spamdexing, (also known as web spamming) is one of the
spamming techniques of adversarial IR, allowing users to exploit ranking of specific documents
in search engine result page (SERP). Spammers take advantage of different features of web
indexing system for notorious motives. Suitable machine learning approaches can be useful in
analysis of spam patterns and automated detection of spam. This paper examines content based
features of web documents and discusses the potential of feature selection (FS) in upcoming
studies to combat web spam. The objective of feature selection is to select the salient features to
improve prediction performance and to understand the underlying data generation techniques.
A publically available web data set namely WEBSPAM - UK2007 is used for all evaluations.
Search logs from user interactions with image archives can be analyzed and utilized in three ways:
1. To understand user search behavior and how professional users search differently than average users.
2. As training data to automatically annotate images with concepts using similar queries and clicked images, though reliability varies by concept.
3. As additional positive training samples to improve automated image classification systems, especially when combined with manually annotated samples.
Privacy Protectin Models and Defamation caused by k-anonymityHiroshi Nakagawa
Introduction of Privacy Protection Mathematical Models are the topics of this slide. The Models explained are 1) Private Information Retrieval, 2) IR with Homomorphic Encryption, 3) k-anonymity, 4) l-diversity, and finally 5) Defamation caused by k-Anonymity
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
KBC (Java Program written on Blue J Editor)Mahir Bathija
This document defines a class called KBC that simulates the game show "Kaun Banega Crorepati" (Who Wants To Be A Millionaire). The class contains questions, options, answers, prize amounts, a history array to track questions asked, and lifeline booleans. The main method initializes a KBC object, randomly selects questions for the player, allows them to use lifelines if needed, and checks their answer to determine if they win the corresponding prize amount or lose. The game is played in a loop until all questions are answered or the player gets a question wrong.
This document outlines terms of use for accessing a resource. It states that the resource can only be viewed on two specified websites and cannot be embedded on other sites. It requests the viewer to contact the owner if accessed elsewhere. The document notes that following these guidelines allows the owner to continue sharing free resources. The full terms of use are on the last slide and the document provides copyright information, prohibiting recording, altering or claiming the presentation as one's own without permission.
Final Year Project Report on Self Tacit Zone (Location Based Android App)Parthik Poshiya
This document is a project report for an Android application called Self Tacit Zone. It was created by Parthik Poshiya and Keyur Hudka to fulfill the requirements for a Bachelor of Engineering degree. The report includes an introduction that outlines the problem summary, aim and objectives, problem specifications, literature review, tools and technology used, and a prior art search. It also covers the design, analysis, implementation, and testing of the Self Tacit Zone application.
This document presents a project on developing a Bangladesh Cricket Management System. It includes sections on the project requirements analysis, database design, ER diagram, flow chart, and workflow. The project deliverables are listed as team management information, upcoming series fixer, international travel news, and player statistics. The project timeline includes completing the requirements, database development, and deploying the system to production. Project roles and the management of scope, time, cost, quality, resources, risk, and communication are also outlined.
Cricket is a bat-and-ball game played between two teams of 11 players on a rectangular grass pitch. One team bats, trying to score runs by hitting the ball and running between the wickets, while the other team bowls and fields trying to get the batsmen out. A game is divided into innings where the teams alternate between batting and fielding. The objective is for the batting team to score more runs than their opponent.
This document discusses factors that influence tourism consumer behavior and decision making. It covers motivation theories, roles and psychographics of tourists, and models of the consumer decision process. Key elements discussed include attitudes, perceptions, images, and motivators that differ between individuals and affect travel decisions.
The document provides an overview of the history and evolution of accounting practices. It discusses how accounting originated in ancient civilizations like Babylon in 2600 BC and evolved into the double-entry system in 15th century Italy. It then covers the introduction of modern accounting in India in 1850 and defines key accounting concepts like bookkeeping, accounting, financial accounting, and cost accounting. Finally, it outlines the major users and principles of accounting.
This document is a project report for developing an online clothes shopping system. It includes sections on the project description, requirements analysis, tools used, software development lifecycle, system design, testing, implementation, maintenance, future scope, and conclusion. The project aims to build a web application that allows customers to browse, select, and purchase clothes online through registering on the site and interacting with the admin module to manage the clothing products and information.
This document provides an overview of a machine learning course. It outlines the course structure, including topics covered, assignments, and grading. The course covers fundamental machine learning algorithms for classification, regression, clustering, and dimensionality reduction. It also discusses applications of machine learning like spam filtering, recommender systems, and chess playing computers.
This document provides an overview of a machine learning course. It outlines the course structure, including topics covered, assignments, and grading. The course covers fundamental machine learning algorithms for classification, regression, clustering, and dimensionality reduction. It also discusses applications of machine learning like spam filtering, recommender systems, and chess playing programs.
Wholi is a company that aggregates data from public online sources to build knowledge graphs about people and companies. They use machine learning and natural language processing techniques like named entity recognition and topic modeling to extract useful features from text data. They also employ bootstrapped entity and relationship learning to infer additional information. Wholi matches profiles using a deep learning classifier trained on a large dataset of over 500,000 social media profiles to determine which profiles belong to the same individuals. Their goal is to provide a more complete online identity for matching purposes.
The document summarizes experiences building a semantic web application to detect conflicts of interest using FOAF and DBLP data. It involved multiple steps: obtaining and preparing data; representing entities and relationships in an ontology; querying the data using semantic associations to determine COI levels; visualizing results; and evaluating based on a conference review dataset. The system was able to detect indirect COI relationships that syntactic matching would miss.
This document discusses several key aspects of mathematics and algorithms used in internet information retrieval and search engines:
1. It explains how search engines like Google can rapidly rank billions of web pages using algorithms based on the topology and link structure of the web graph, such as PageRank.
2. It describes two main types of page ranking algorithms - static importance ranking based on link analysis, and dynamic relevance ranking based on statistical learning models to match pages to queries.
3. It proposes a new ranking algorithm called BrowseRank that models user browsing behavior using Markov chains and takes into account visit duration to better reflect true page importance.
This document discusses incentive-based tagging to maximize the quality of resource tagging in social tagging systems. It finds that most resources are under-tagged, receiving too few tags to be useful, while a few popular resources are over-tagged. It proposes rewarding users for tagging under-tagged resources to address this imbalance. The key concepts of tagging quality, tagging stability, unstable and stable points are introduced. An optimal incentive allocation algorithm is presented to decide how to distribute rewards among resources to maximize overall tagging stability.
The document discusses several mathematical models and algorithms used in internet information retrieval and search engines:
1. Markov chain methods can be used to model a user's web surfing behavior and page visit transitions.
2. BrowseRank models user browsing as a Markov process to calculate page importance based on observed user behavior rather than artificial assumptions.
3. Learning to rank problems in information retrieval can be framed as a two-layer statistical learning problem where queries are the first layer and document relevance judgments are the second layer.
4. Stability theory can provide generalization bounds for learning to rank algorithms under this two-layer framework. Modifying algorithms like SVM and Boosting to have query-level stability improves performance.
This document discusses machine learning and information retrieval. It introduces machine learning and describes some common applications like bioinformatics, robotics, and computer vision. It then discusses information retrieval, including traditional keyword search approaches and a new example-based approach. Several prototype systems are described that use this example-based approach for tasks like movie search, academic literature search, image retrieval, and protein search. The approach is statistically principled, computationally fast, and easily parallelized.
Semantic Web-based E-Commerce: The GoodRelations OntologyMartin Hepp
Semantic Web-based E-Commerce: The GoodRelations Ontology
Presentation at the Semantic Technology Conference, June 15, 2009
http://purl.org/goodrelations/
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM csandit
With the increasing growth of Internet and World Wide Web, information retrieval (IR) has
attracted much attention in recent years. Quick, accurate and quality information mining is the
core concern of successful search companies. Likewise, spammers try to manipulate IR system
to fulfil their stealthy needs. Spamdexing, (also known as web spamming) is one of the
spamming techniques of adversarial IR, allowing users to exploit ranking of specific documents
in search engine result page (SERP). Spammers take advantage of different features of web
indexing system for notorious motives. Suitable machine learning approaches can be useful in
analysis of spam patterns and automated detection of spam. This paper examines content based
features of web documents and discusses the potential of feature selection (FS) in upcoming
studies to combat web spam. The objective of feature selection is to select the salient features to
improve prediction performance and to understand the underlying data generation techniques.
A publically available web data set namely WEBSPAM - UK2007 is used for all evaluations.
Search logs from user interactions with image archives can be analyzed and utilized in three ways:
1. To understand user search behavior and how professional users search differently than average users.
2. As training data to automatically annotate images with concepts using similar queries and clicked images, though reliability varies by concept.
3. As additional positive training samples to improve automated image classification systems, especially when combined with manually annotated samples.
Privacy Protectin Models and Defamation caused by k-anonymityHiroshi Nakagawa
Introduction of Privacy Protection Mathematical Models are the topics of this slide. The Models explained are 1) Private Information Retrieval, 2) IR with Homomorphic Encryption, 3) k-anonymity, 4) l-diversity, and finally 5) Defamation caused by k-Anonymity
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
KBC (Java Program written on Blue J Editor)Mahir Bathija
This document defines a class called KBC that simulates the game show "Kaun Banega Crorepati" (Who Wants To Be A Millionaire). The class contains questions, options, answers, prize amounts, a history array to track questions asked, and lifeline booleans. The main method initializes a KBC object, randomly selects questions for the player, allows them to use lifelines if needed, and checks their answer to determine if they win the corresponding prize amount or lose. The game is played in a loop until all questions are answered or the player gets a question wrong.
This document outlines terms of use for accessing a resource. It states that the resource can only be viewed on two specified websites and cannot be embedded on other sites. It requests the viewer to contact the owner if accessed elsewhere. The document notes that following these guidelines allows the owner to continue sharing free resources. The full terms of use are on the last slide and the document provides copyright information, prohibiting recording, altering or claiming the presentation as one's own without permission.
Final Year Project Report on Self Tacit Zone (Location Based Android App)Parthik Poshiya
This document is a project report for an Android application called Self Tacit Zone. It was created by Parthik Poshiya and Keyur Hudka to fulfill the requirements for a Bachelor of Engineering degree. The report includes an introduction that outlines the problem summary, aim and objectives, problem specifications, literature review, tools and technology used, and a prior art search. It also covers the design, analysis, implementation, and testing of the Self Tacit Zone application.
This document presents a project on developing a Bangladesh Cricket Management System. It includes sections on the project requirements analysis, database design, ER diagram, flow chart, and workflow. The project deliverables are listed as team management information, upcoming series fixer, international travel news, and player statistics. The project timeline includes completing the requirements, database development, and deploying the system to production. Project roles and the management of scope, time, cost, quality, resources, risk, and communication are also outlined.
Cricket is a bat-and-ball game played between two teams of 11 players on a rectangular grass pitch. One team bats, trying to score runs by hitting the ball and running between the wickets, while the other team bowls and fields trying to get the batsmen out. A game is divided into innings where the teams alternate between batting and fielding. The objective is for the batting team to score more runs than their opponent.
This document discusses factors that influence tourism consumer behavior and decision making. It covers motivation theories, roles and psychographics of tourists, and models of the consumer decision process. Key elements discussed include attitudes, perceptions, images, and motivators that differ between individuals and affect travel decisions.
The document provides an overview of the history and evolution of accounting practices. It discusses how accounting originated in ancient civilizations like Babylon in 2600 BC and evolved into the double-entry system in 15th century Italy. It then covers the introduction of modern accounting in India in 1850 and defines key accounting concepts like bookkeeping, accounting, financial accounting, and cost accounting. Finally, it outlines the major users and principles of accounting.
This document is a project report for developing an online clothes shopping system. It includes sections on the project description, requirements analysis, tools used, software development lifecycle, system design, testing, implementation, maintenance, future scope, and conclusion. The project aims to build a web application that allows customers to browse, select, and purchase clothes online through registering on the site and interacting with the admin module to manage the clothing products and information.
This document provides an overview of a machine learning course. It outlines the course structure, including topics covered, assignments, and grading. The course covers fundamental machine learning algorithms for classification, regression, clustering, and dimensionality reduction. It also discusses applications of machine learning like spam filtering, recommender systems, and chess playing computers.
This document provides an overview of a machine learning course. It outlines the course structure, including topics covered, assignments, and grading. The course covers fundamental machine learning algorithms for classification, regression, clustering, and dimensionality reduction. It also discusses applications of machine learning like spam filtering, recommender systems, and chess playing programs.
This document describes a movie recommendation system that uses machine learning techniques like cosine similarity and TF-IDF. It discusses collecting movie data, preprocessing it using techniques like TF-IDF to generate feature vectors, and then calculating cosine similarity between movies to find similar movies and make recommendations. The system was developed in Python using libraries like NumPy, Pandas, and Matplotlib. It demonstrates generating recommendations based on both movie genres and titles and achieves good results. Pseudocode is also provided to explain the technical approach.
Visualization of Computer Forensics Analysis on Digital EvidenceMuhd Mu'izuddin
- This is my first article, its for my Final Year Project for Bachelor's of Computer Science (Systems and Networking)
- It also will be uploaded into CyberSecurity Malaysia E-Bulletin for 2017
Semantic Web & Information Brokering: Opportunities, Commercialization and Ch...Amit Sheth
Amit Sheth, "Semantic Web & Info. Brokering Opportunities, Commercialization and Challenges," Keynote talk at the workshop on Semantic Web: Models, Architecture and Management, September 21, 2000, Lisbon, Portugal.
This was the keynote given at probably the first international event with "Semantic Web" in title (and before the well known SciAm article). As in TBL's use of Semantic Web in his 1999 book, (semantic) metadata plays central role. The use of Worldmodel/Ontology is consistent with our use of ontology for (Web) information integration in 1994 CIKM paper. Summary of the talk by event organizers and other details are at: http://knoesis.org/library/resource.php?id=735
Prof. Sheth started a Semantic Web company Taalee, Inc. in 1999 (product was called MediaAnywhere A/V search engine- discussed in this paper in the context of one of its use by a customer Redband Broadcasting). The product included Semantic Web/populated Ontology based semantic (faceted) search, semantic browsing, semantic personalization, semantic targeting (advertisement), etc as is described in U.S. Patent #6311194, 30 Oct. 2001 (filed 2000). MediaAnywhere has about 25 ontologies in News/Business, Sports, Entertainment, etc.
Taalee merged to become Voquette in 2001 (product was called SCORE), Semagix in 2004 (product was called Semagix Freedom), and then Fortent in 2006 (products included Know Your Customers).
Query aware determinization of uncertain objectsieeepondy
This paper addresses the problem of storing probabilistic data generated by automated data analysis techniques in legacy systems that only accept deterministic data. It proposes a query-aware strategy for determinizing probabilistic data by minimizing the expected cost of answering queries to generate an optimal deterministic representation. An algorithm is developed to approximate the near-optimal solution to the NP-hard determinization problem. The paper shows the advantages of this query-aware approach over traditional methods like thresholding through empirical evaluation on real and synthetic datasets.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
This document discusses various topics related to website development and optimization. It covers front-end performance techniques like using content delivery networks and gzipping components. It also discusses tools for front-end performance analysis. Other topics covered include tag management systems, version control systems like Git and SVN, responsive vs adaptive design, and content management systems. The document provides information on technologies and best practices for building high performing websites.
This document discusses techniques for analyzing unstructured text data from computer data inspection. It discusses using clustering algorithms like K-means and hierarchical clustering to automatically group related documents without supervision. The goal is to help computer examiners analyze large amounts of text data more efficiently. Prior work on clustering ensembles, evolving gene expression clusters, self-organizing maps, and thematically clustering search results is reviewed as relevant to this problem. The problem is how to identify and cluster documents stored across multiple remote locations during computer inspections when existing algorithms make this difficult.
This document describes CrowdSource, a system that uses natural language processing to infer high-level malware capabilities based on low-level strings extracted from malware binaries. It trains a machine learning model on millions of technical documents from StackExchange to map low-level strings to high-level capabilities. The system was evaluated on 1,457 malware samples and shown to detect 14 capabilities with an average F1-score of 0.86 and can analyze tens of thousands of samples per day.
The document provides an overview of text-based games and includes a sample output from a text-based dragon adventure game. Text-based games preceded modern video games, using only text for interaction through command line prompts. The sample output shows the player moving between rooms and interacting with items to complete the goal before encountering the villain, demonstrating how these early games worked without graphics. It also provides guidance for a class project to design and develop a original text-based game.
1 IT 140 A Mini History of Text-Based Games TextSilvaGraf83
1
IT 140 A Mini History of Text-Based Games
Text-based games were the predecessor to the reality-based video games we play today. They were
"interactive fiction" where words came to life as players read text and made decisions about what to do.
These text-based games simulated environments where players used text commands to control their
characters and influence the gaming environment.
Imagine a current action-adventure video game where, instead of using a controller or touchscreen to
give your character directions, you enter text on a command line. There are no graphics on the screen,
forcing you to use your imagination. Commands you enter might be “open door”, “go west”, or “fight
troll”. These commands change the way the story plays out.
While it may be hard to imagine a video game without any videos, these text games were very popular
in the 70s and 80s. Many programmers and computer technicians played role-playing board games, like
Dungeons and Dragons, with their friends. A text-based game allowed them to take their adventures to
the digital realm. They could play their games on the mainframes at work, submitting commands with a
teleprinter and receiving the output on paper.
T100S Teleprinter by Jens Ohlig under CC BY-SA 2.0
https://commons.wikimedia.org/wiki/File:T100S_teleprinter.jpg
https://www.flickr.com/people/[email protected]
https://creativecommons.org/licenses/by-sa/2.0/deed.en
2
Eventually, monochrome monitors allowed players to see their input and output in real time, right
before their eyes. Players were able to enjoy playing Lunar Lander and Star Trek using displays like the
following:
GT40 Lunar Lander by Brouhaha under CC BY-SA 3.0
Star Trek Text Game by James Gibbon under CC BY-SA 3.0
You can still find playable versions of these games online, such as Lunar Lander, Star Trek, and Zork.
They will help you see how far game development has come. (Note: Links may change over time. Search
for the game name and “simulator”.)
In this class, you will have the opportunity to create your own version of a text-based game. You will be
able to see your code come to life as it becomes interactive. Through the use of conditionals and loops,
you will be able to guide adventurers through your world in the same way these early text-based games
did several decades ago.
https://commons.wikimedia.org/wiki/File:GT40_Lunar_Lander.jpg
https://en.wikipedia.org/wiki/User:Brouhaha
https://creativecommons.org/licenses/by-sa/3.0/deed.en
https://commons.wikimedia.org/wiki/File:Star_Trek_text_game.png
https://en.wikipedia.org/wiki/User:Jamesgibbon
https://creativecommons.org/licenses/by-sa/3.0/deed.en
http://www.lunarmissionsimulator.com/
http://mtrek.com/play-now/
http://www.web-adventures.org/cgi-bin/webfrotz?s=ZorkDungeon
3
References
McIntosh, J. (2018, July 20). A brief history of text-based games and open source. Opensource.com.
https://opensource.com/article/18/ ...
The document provides an overview of machine learning use cases. It begins with an agenda that will discuss the basic framework for ML projects, model deployment options, and various ML use cases like text classification, image classification, object detection, etc. It then covers the basic 5 step framework for ML projects - defining the problem, planning the solution, acquiring and preparing data, designing and training a model, and deploying the solution. Next, it discusses popular methods for various tasks like image classification, object detection, pose estimation. Finally, it shares several use cases for each task to demonstrate real-world applications.
professional fuzzy type-ahead rummage around in xml type-ahead search techni...Kumar Goud
Abstract – It is a research venture on the new information-access standard called type-ahead search, in which systems discover responds to a keyword query on-the-fly as users type in the uncertainty. In this paper we learn how to support fuzzy type-ahead search in XML. Underneath fuzzy search is important when users have limited knowledge about the exact representation of the entities they are looking for, such as people records in an online directory. We have developed and deployed several such systems, some of which have been used by many people on a daily basis. The systems received overwhelmingly positive feedbacks from users due to their friendly interfaces with the fuzzy-search feature. We describe the design and implementation of the systems, and demonstrate several such systems. We show that our efficient techniques can indeed allow this search paradigm to scale on large amounts of data.
Index Terms - type-ahead, large data set, server side, online directory, search technique.
Enhanced Web Usage Mining Using Fuzzy Clustering and Collaborative Filtering ...inventionjournals
This document discusses an enhanced web usage mining system using fuzzy clustering and collaborative filtering recommendation algorithms. It aims to address challenges with existing recommender systems like producing low quality recommendations for large datasets. The system architecture uses fuzzy clustering to predict future user access based on browsing behavior. Collaborative filtering is then used to produce expected results by combining fuzzy clustering outputs with a web database. This approach aims to provide users with more relevant recommendations in a shorter time compared to other systems.
The document describes a system for automatically classifying bug reports from cloud infrastructure software using natural language processing techniques. It preprocesses bug descriptions to extract keywords, encodes them as vectors, performs hierarchical clustering to group similar bugs, and assigns classifications to new unlabeled bugs based on the cluster labels. Preliminary results show the system can accurately predict categories and specific classes for bug reports, especially with a large dataset. Future work aims to improve performance and apply the system to analyze bugs in other cloud infrastructures.
The Internet is the largest source of information created by humanity. It contains a variety of materials available in various formats, such as text, audio, video, and much more. In all, web scraping is one way. There is a set of strategies here in which we get information from the website instead of copying the data manually. Many webbased data extraction methods are designed to solve specific problems and work on ad hoc domains. Various tools and technologies have been developed to facilitate web scraping. Unfortunately, the appropriateness and ethics of using these web scraping tools are often overlooked. There are hundreds of web scraping software available today, most of them designed for Java, Python, and Ruby. There is also open-source software and commercial software. Web-based software such as YahooPipes, Google Web Scrapers, and Firefox extensions for Outwit are the best tools for beginners in web cutting. Web extraction is basically used to cut this manual extraction and editing process and provide an easy and better way to collect data from a web page and convert it into the desired format and save it to a local or archive directory. In this study, among other kinds of scrub, we focus on those techniques that extract the content of a web page. In particular, we use scrubbing techniques for a variety of diseases with their own symptoms and precautions.
Query by Example of Speaker Audio Signals using Power Spectrum and MFCCsIJECEIAES
Search engine is the popular term for an information retrieval (IR) system. Typically, search engine can be based on full-text indexing. Changing the presentation from the text data to multimedia data types make an information retrieval process more complex such as a retrieval of image or sounds in large databases. This paper introduces the use of language and text independent speech as input queries in a large sound database by using Speaker identification algorithm. The method consists of 2 main processing first steps, we separate vocal and non-vocal identification after that vocal be used to speaker identification for audio query by speaker voice. For the speaker identification and audio query by process, we estimate the similarity of the example signal and the samples in the queried database by calculating the Euclidian distance between the Mel frequency cepstral coefficients (MFCC) and Energy spectrum of acoustic features. The simulations show that the good performance with a sustainable computational cost and obtained the average accuracy rate more than 90%.
Bill Chang has extensive experience in machine learning, computer vision, and software engineering. He has worked as a research assistant and data scientist applying these skills to various projects. Some of his responsibilities included developing tools to gather and analyze human behavior data using Amazon Mechanical Turk, creating features for the Archive of Many Outdoor Scenes website, and publishing papers on detecting physical activity from webcam images. Bill Chang has strong skills in Python, Java, C++, and machine learning algorithms and seeks a role where he can continue solving problems through data-driven approaches.
1. The document proposes techniques to improve search performance by matching schemas between structured and unstructured data sources.
2. It involves constructing schema mappings using named entities and schema structures. It also uses strategies to narrow the search space to relevant documents.
3. The techniques were shown to improve search accuracy and reduce time/space complexity compared to existing methods.
Fyp list batch-2009 (project approval -rejected list)Mr SMAK
This document lists 29 final year projects for computer science students in the BS (CS) Batch of 2009 at Sir Syed University of Engineering & Technology in Karachi, Pakistan. It provides the roll numbers, names, project titles and assigned supervisors for each group of students. The remarks column notes whether project ideas were accepted, rejected or required revisions and additional consultation with supervisors.
The document contains 8 questions for an assignment on wireless application protocol. The questions cover topics such as comparing circuit-switched and packet-switched networks, frequency division multiplexing of voice channels, spread spectrum techniques, calculating bandwidth requirements for frequency division multiplexing with guard bands, advantages and disadvantages of bursty versus continuous data transmission in wireless systems, and disadvantages of wireless LANs compared to wired LANs. The last question discusses applications where the disadvantages of wireless LANs may be outweighed or override the advantages of wireless mobility.
This document provides an introduction to wireless communication and wireless application protocol (WAP). It discusses the benefits of wireless communication like freedom from wires and global coverage. It also covers some of the technical challenges in wireless communication like efficient use of spectrum, mobility support, and maintaining quality of service over unreliable links. It defines wireless communication and differentiates between wireless and mobile. It also describes various types of wireless technologies and their limitations.
The document summarizes the evolution of wireless networks from 1G to 4G. 1G networks used analog signals and standards like NMT, AMPS, and TACS. 2G introduced digital cellular and standards like GSM, CDMA, and IS-136. 2.5G provided upgrades like GPRS, EDGE, and CDMA2000 1x to support higher data rates. 3G networks supported broadband data and included W-CDMA and CDMA2000. 4G aims to provide fully integrated IP services with speeds over 100 Mbps.
Wireless Application Protocol (WAP) allows devices to access the Internet over wireless networks. There are three main categories of protocols for managing shared access to wireless networks: fixed assignment, demand assignment, and random assignment. Fixed assignment divides resources like frequency bands or time slots and allocates them exclusively. Demand assignment allocates resources only to nodes that need them. Random assignment does not preallocate resources and relies on collision detection and retransmission to manage shared access. Common protocols that fall under these categories include FDMA, TDMA, CDMA, ALOHA, and CSMA.
Wireless cellular networks divide geographic areas into cells served by base stations to allow for frequency reuse. As users travel between cells, their calls are handed off seamlessly. Cellular systems improve capacity by allocating unique frequency groups to each cell and reusing the same frequencies in cells sufficiently distant from each other. Larger networks connect multiple base stations and mobile switching centers to facilitate roaming and complete calls between mobile and fixed users.
This chapter discusses shared memory architecture and classifications of shared memory systems. It describes Uniform Memory Access (UMA), Non-Uniform Memory Access (NUMA), and Cache Only Memory Architecture (COMA). It also covers bus-based symmetric multiprocessors and basic cache coherency methods like write-through, write-back, write-invalidate, and write-update. Finally, it discusses snooping protocols for maintaining cache coherency, including write-invalidate and write-through, write-invalidate and write-back, write-once, write-update and partial write-through, and write-update and write-back.
This document discusses parallel computer memory architectures, including shared memory, distributed memory, and hybrid architectures. Shared memory architectures allow all processors to access a global address space, but lack scalability. Distributed memory assigns separate memory to each processor requiring explicit communication between tasks. Hybrid architectures combine shared memory within nodes and distributed memory between nodes for scalability.
This document discusses parallel computers and architectures. It defines parallel computers as collections of processing elements that cooperate and communicate to solve problems fast. It then examines questions about parallel computers, different types of parallelism, and opportunities for parallel computing in scientific and commercial applications. Finally, it discusses fundamental issues in parallel architectures, including naming, synchronization, latency and bandwidth, and different parallel frameworks and models like shared memory, message passing, and data parallelism.
This document provides an overview of parallel computing and parallel processing. It discusses:
1. The three types of concurrent events in parallel processing: parallel, simultaneous, and pipelined events.
2. The five fundamental factors for projecting computer performance: clock rate, cycles per instruction (CPI), execution time, million instructions per second (MIPS) rate, and throughput rate.
3. The four programmatic levels of parallel processing from highest to lowest: job/program level, task/procedure level, interinstruction level, and intrainstruction level.
This document discusses key concepts and terminologies related to parallel computing. It defines tasks, parallel tasks, serial and parallel execution. It also describes shared memory and distributed memory architectures as well as communications and synchronization between parallel tasks. Flynn's taxonomy is introduced which classifies parallel computers based on instruction and data streams as Single Instruction Single Data (SISD), Single Instruction Multiple Data (SIMD), Multiple Instruction Single Data (MISD), and Multiple Instruction Multiple Data (MIMD). Examples are provided for each classification.
This document provides an overview of a course on parallel computing for undergraduates. It outlines the theoretical and practical components of the course, including concepts that will be covered pre- and post-midterm. It also details assessment criteria, reading resources, and codes of conduct for the class.
This document discusses parallel computer memory architectures, including shared memory, distributed memory, and hybrid architectures. Shared memory architectures allow all processors to access a global address space, but lack scalability. Distributed memory assigns separate memory to each processor requiring explicit communication between tasks. Hybrid architectures combine shared memory within nodes and distributed memory between nodes for scalability.
This chapter discusses shared memory architecture and classifications of shared memory systems. It describes Uniform Memory Access (UMA), Non-Uniform Memory Access (NUMA), and Cache Only Memory Architecture (COMA). It also covers basic cache coherency methods like write-through, write-back, write-invalidate, and write-update. Finally, it discusses snooping protocols and cache coherency techniques used in shared memory systems.
Planning and scheduling involves fundamental engineering principles of first analyzing a problem and then developing a solution to meet defined needs. Key objectives include effective time management, optimizing the sequence of events, and defining necessary resources to ensure timely project progress. Gantt charts and PERT charts are common tools used to plan and schedule projects, with Gantt charts focusing more on calendar timelines and PERT charts emphasizing task dependencies. Function point analysis is an alternative technique for estimating the time and effort required for a software project based on identifying and weighting various user-requested application components and functionalities.
The document outlines a project plan structure covering 5 sections: 1) the software engineering process model and team roles, 2) risk analysis and management methods, 3) tasks and scheduling, 4) resources, costs and estimates, and 5) monitoring and management methods to track the project. A sample project plan is attached for reference.
The document outlines guidelines for formatting a final year project proposal. It includes sections for the project title, student names and roll numbers, main text formatting, headings formatting, figures and tables, and references. Guidelines are provided for font type, size, indentation, spacing, capitalization, and other formatting rules to maintain a consistent structure and appearance.
Students of the final year 2009 batch at Sir Syed University of Engineering & Technology are advised to submit 3 copies of their final year project proposals by March 03, 2012. The proposals can be in the areas of artificial intelligence, expert systems, communication & networking, 3D applications, mobile computing, or web applications. Proposals should be submitted to faculty members Naheed Khan, Shardha Nand, Asharaf Ali Waseem, or M. Kashif Khan. Projects must be completed by groups of 3 to 4 students, who will later defend their proposal to the final year project committee.
This document outlines 29 potential projects for university students to undertake with SUPARCO. The projects range from designing components of small satellites to analyzing aerodynamic properties to developing encryption systems. SUPARCO will provide funding and engineering support for selected projects. Students will gain hands-on experience working on challenges relevant to SUPARCO's objectives.
The document outlines the timeline and assessment policy for final year projects (FYP) for computer science students graduating in 2009 from Sir Syed University of Engineering & Technology in Karachi, Pakistan. Key dates are provided for submitting registration forms, proposals, requirements documents, design documents, progress reviews, reports and presentations. The assessment policy breaks down the project into components like requirements, design, presentations and reviews, allocating marks between supervisor and evaluation committee assessments with the total project marks equalling 200.
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
1. Some Final year Projects ideas:
Predictive Analytics
Predictive Analytics is primarily based on the concept of modeling business problems using
statistical ad data mining algorithms. These algorithms use a set of input variables from a given
data set to predict target variables that will support decision-making.
Predictive analytics is used in financial services, insurance, telecommunications, retail,
travel, healthcare, pharmaceuticals and other fields.
Good understanding of statistical and data mining algorithms.
Soccer Playing Agent Team for the Robocup
Simulation --- by Chris Carter
This project creates a football team that competes in the Robocup Simulation tournament.
Robocup is an international joint project to promote artificial intelligence, robotics, and related
fields. The ultimate goal of the Robocup project is to develop a team of fully autonomous
humanoid robots that can win against human world champion team in football. At the end of the
project, the student has produced a working team of 11 agents, capable of performing in the
Simulation, carrying out functions including running around the pitch, locating and chasing the
ball, passing to fellow team-mates, and shooting towards the goal. The system is written in Java.
Some screenshots are shown here (click on the picture to see a larger version).
The initial setup of 11 players in each team.
2. As the game plays on
The Game of Hex --- by Hayley Tinkler
Hex is a board game played on a hexagonal grid. Two players take it in turns to fill in the board
in their colour. Player one is to form a path of their colour from the top to the bottom while
player two is to form a path going from one side to another. This project implements this game
for a user to play against the computer. Artificial intelligence algorithm has been incorporated to
determine the computer's moves. Some screenshots are shown here.
User (black pieces) trying to get a chain across the bottom of the board, while the computer (white) attempts to block
the move.
User (black pieces) trying to get a chain across the top of the board, while the computer (white) attempts to block the
move.
Using Semantic Knowledge for Implementing
Intelligent Web Search --- by Joseph McElroy
Search engine technology on the internet is a multibillion dollar industry. The next step in
developing search engine technology is utilising semantic knowledge to satisfy customers search
requirements (semantics refers to aspects of meaning). This entails using experts' knowledge to
make search results more refined and ultimately improve the result over conventional methods.
The enhanced search engine utilises a chosen Wikipedia's article raw data and Yahoo's Keyword
3. extraction engine to extract important phrases / words which are closely related to the user's
search request. This hopefully presents the user with results which are closely linked with the
user's request. For instance, searching "David Beckham metatarsal injury" would bring up the
date of injury, name of player who injured him (Aldo Duscher) and their search results. A
conventional search request would only focus its search on "David Beckham metatarsal injury".
In addition to allowing user to enter a query, the interface of the search engine also shows a list of recent search
results.
For example, searching "Tony Blair" would bring not just articles about Tony Blair, but others like Labour Party,
Blair's Cabinets
Further topics may be suggested like background and family life, political career, etc.
Plagiarism Detector --- by Tarek Menacere
What is plagiarism? Plagiarism occurs when a student misrepresents, as his/her own work, the
work, written or otherwise, of any other person (including another student) or of any institution.
A recent survey of UK university students found that about one quarter of them admitted to
plagiarism and 16% said that they have done so more than once. The aim of this project is to
implement a plagiarism detector to compare to what extent two documents overlap and to
4. compare a document to sources available on the internet. Research shows that using a detector is
not only useful for identifying plagiarism, but also being able to warn students that their work
would be scrutinised electronically acts as a much stronger deterrent than simply issuing a
warning not to plagiarise.
The detector produced in this project is able to compare both text files and MS Word documents.
The system uses several pattern matching algorithms, such as the Longest Common Subsequence
(LCS) and the Smith-Waterman algorithm, to calculate a verbatim score, a paraphrasing score,
and word count matching score etc, in order to determine the similarity of two files or a file and
web pages. These are some screenshots of the system.
Non-plagiarism case - software returns a low similarity score
Plagiarism case - software returns a high similarity score
A quick sort program that is similar to many programs in the internet - a list of websites with a similar program is
returned
Efficient Text Compression via LZW Method --- by
Nikolaos Patras
5. Data compression is the process of encoding information using fewer bits. Some compression
schemes are reversible so that the original data can be reconstructed (lossless data compression)
while others accept some loss of data to achieve higher compression (lossy data compression).
This project is mainly concerned with using the lossless data compression method, called LZW
(Lempel-Ziv-Welch). This method is used in the UNIX program "compress" and GIF (Graphics
Interchange Format) image format. In this project, the LZW method is implemented and
experiments are carried out to evaluate the performance.
The design of the interface of the program is shown below:
The algorithm implemented is tested against several files and the results show that the
compression ratio for text is promising. It is found that the compression ratio depends highly on
the repetitions in the original file. The following table gives a rough idea of the results.
Original size Size after compression
File Name Description Ratio
(bytes) (bytes)
bible.txt a large file with content from the bible 4.53M 3.37M 74%
a file contains some DNA sequences containing
dna.txt 1.09M 0.47M 43%
only characters A, C, G, T
aas.txt a file containing only a's 0.98M 45K 5%
Other Projects
Searching the Searchers --- by Daniel Nicolson
There are many web searching tools available on the internet. This project attempts to implement
a web service client which searches multiple search engines, and obtain and collate results from
them. In particular, this project incorporates search results from Google, Amazon, US Library of
Congress and Resource Discovery Network. The project provides a single platform for the users
to search multiple search engines and provides flexibility as of which search engines to exclude
if it is not expected to return relevant results (e.g., user can specify excluding US Library of
Congress when searching the term "Merseyside").
Who Would be Interested in Me? --- by James Squires
6. It is a common practice that academic staff maintained webpages describing their research work
and provding a list of their papers for other researchers to download. It would be nice if every
now and then one would receive an overview, in adjustable detail, of all the users that have hit
his page. From which external page did they come to the page? Which pages on his site where
they actually looking at, and did they download any paper? how often have they visited his
pages, recently? who are they, what do their home pages tell him? The project aims to tracking
the access to the academic staff's website and produce a number of statistics in relation to the
web traffic onto the website.
Mobile Phone Location --- by Neil Lindon
Location Based Services are a new concept to integrate the users' geographic location with the
notion of a service, e.g., to find the nearest restaurant or taxi rank. This project aims to research
and develop a method of locating a mobile device within a GSM network. A web application
was developed using the mobile positioning system software development kit developed by
Ericsson. The application was able to track the position of a mobile in the GSM network.
Image Analysis
Aim
The aim of this project is to:
Offer a set of tools for analysing images.
Objectives / major tasks
In order to complete this project fully a student will have to meet the following objectives.
1. Load, display and save image files in one or more formats.
2. Provide the user with tools to select certain parts of the image and then display
information about that selection such as number of pixels, or even better, total 'amount' of
a particular colour within the selection, taking account of different amounts of that colour
in each pixel.
3. Fancy selection aids, some examples being (i) choose a colour and select all those pixels
within certain limits; (ii). within certain range of target colour, within certain range of
target hue, ignoring saturation and lightness etc; (iii) click on a pixel (or swipe over a
small rectangle) and automatically select suitably similar pixels.
4. Provide other analytical information about the image.
5. Advanced: automatically scan the image and decide what features to meaasure - getting
into AI now.
6. Advanced: Provide a means for the user to set complex criteria for analysis and save that
set of criteria for reuse.
7. Advanced: Provide a means to compare a set of images under certain criteria and output
the results in some suitable format (such as CSV) for use in other data-processing
packages.
7. Title
Further development of a web-based plagiarism search tool
Aim
The aim of this project is to:
Improve an existing plagiarism detection tool to automatically find sources of plagiarism without
human intervention
Objectives / major tasks
In order to complete this project fully a student will have to:
1. Determine and document the requirements of the system
2. Write a programmatic interface to an existing web search engine
3. Integrate the new code into the existing plagiarism detector
4. Test and evaluate the new development
5. Design and implement a user interface to the system
Measuring the subject bias of different web search engines
Aim
The aim of this project is to:
Discover the extent to which specific search engines have selected the kinds of Web page that
they find.
8. Objectives / major tasks
In order to complete this project fully a student will have to:
1. Conduct a careful series of experiments, making "neutral" requests to a series of search
engines and classifying the pages returned
2. Write a program to automate the experiments done in step 1, so as to repeat the
experiments on a larger scale
3. Test the effectiveness of the system both for identifying the type of page returned and
measuring the search engine's bias
4. Prepare the results for publication
Title
Virtual Private Networks
Aim
The aim of this project is to:
Simulate and evaluate the tunnelling protocols used in virtual private networks
Objectives / major tasks
In order to complete this project fully a student will have to:
1. Learn how to write networking programs, and implement a communication channel
between two programs (or two copies of the same program), on the same or different
PCs.
2. Produce a user interface allowing tunnelling protocols to be demonstrated between
multiple (simulated) hosts.
3. Evaluate available tunnelling protocols (such as PPTP, L2TP, IPsec) and implement one
of them.
Title
RISK: A computer version of the game
Aim
The aim of this project is to:
9. Design and implement a computer version of the strategy game "RISK".
Objectives / major tasks
In order to complete this project fully a student will have to:
1. Implement (a subset of) the rules of the game.
2. Design and develop a graphical interface suitable for playing RISK.
3. Implement a multi player option for the game.
Title
Parallel processing implementation of the Mandelbrot set
Aim
The aim of this project is to:
Implement the Mandelbrot set as a distributed algorithm, and demonstrate the advantage of
distributing it.
Objectives / major tasks
In order to complete this project fully a student will have to:
1. Implement the Mandelbrot set algorithm as an ordinary program.
2. Develop and implement a technique to divide up the Mandelbrot set problem space.
3. Design and implement a communication protocol to allow parts of the problem space to
be sent from machine to machine.
4. Implement server programs to perform the calculation.
5. Implement a client program to control the computation and to display the result.
6. Implement parts of the system in a different language and on a different machine, to
evaluate the platform independence of the system.
7. Evaluate the performance of the implemented system for this and other distributed
applications.
Title
10. Application of the Google API to detect plagiarism
Aim
The aim of this project is to:
Automatically (and efficiently) scan Google for documents similar to a
given sample.
Objectives / major tasks
In order to complete this project fully a student will have to:
1. Register with Google API, in accordance with their terms for free, non-commercial use.
See http://www.google.com/apis/api_terms.html
2. Understand how the Ferret plagiarism detector works
3. Investigate which file formats can be accepted by Ferret
4. Write a program to download relevant pages from the web and run them through Ferret
together with the sample, in order to detect similar passages
5. Evaluate your method
6. Advanced objective: write a program to convert .pdf files to .txt, retaining only text.
Development of Scalable video streaming over streaming over heterogenours network
Recently, TV broadcasting has been widely adapted on different platforms, including desktops and smart
phones. To provide a high reliability and quality TV stream is always a challenging task for the
developers.
Our project aim to:
1. build Peer to Peer system with a real time live streaming application for heterogeneous network
which include PC and Android platform
2. provide an efficient, smooth, steady and high quality live streaming by integrating two technologies –
FastMesh and SIM
3. stream different format of video
Interactive 3D MAP of a big city like Karachi
The road system is complicated for tourists. It is not easy for the tourists to find their
interested place and go to their destinations efficiently with the 2D map.
Our project is develop to enable tourists or even locals to familiarize themselves in
11. places of HK with complicated road systems, so that they can walk through the city
by themselves with information provided from the interactive map on what buses to
take, where to take and even the shops information in that location. This interactive
3D Map will become the virtual city map for tourists/locals to get most accurate
information and real visualization before they travel in real.
A Collaborative Android Application Providing an Online Google Map with Audible Cantonese Location
Pronunciations for Expats and Tourists in Pakistan
Any country has hundreds of different locations whose names are difficult for foreigners to pronounce
and remember. Foreigners of ten have trouble communicating to local citizens, especially taxi drivers,
when they want to go to various tourist attractions or popular places.
Our goal in this project is to provide a tool to help non-urdu or Punjabi or any regional language
speakers in Pakistan to overcome the language barrier when they travel in the territory. In our Android
application, users can select languages: English, Traditional Chinese and Simplified Chinese. When users
tap on a location on the Google maps of Pakistan, the system displays the place name in the three
languages. Then, the users can tap to hear the pronunciations in English, Cantonese and Putonghua.
The system links to a tourist board, which is also created by us, so users can view additional useful
information of the location.
Tourism Based Social Networking Service
In recent years, Social Networking Services have been playing an important role in people’s life.
I Meanwhile, tourism is an everlasting popular topic. People like to travel to new places with friends.
12. o What if we combine the two factors?
o The users will find it very convenient to plan for trips and invite friends for trips since they will have
access to both tourism information and friends.
a The user experience of both social networking and tourism shall boost!
The major innovation of our project is that we endeavor to combine SNS and tourism information on a
Google Maps interface.
We will continue to implement more functions and explore the business value of the project. We
sincerely welcome any comments or questions from everyone.
Security Extension of GTalk based on Smart Card
The purpose of this project is to develop a security extension for Google Talk (GTalk) that will allow the
users to encrypt their Instance Messages (IM) and voice chat permitting the users to securely transfer
their data (text and VoIP) using public channels. Since, GTalk is normally used for group communication
so a key management issue will also be addressed in order to securely exchange symmetric keys
between
group members, if they are communicating in group environment.
Secure Email System
The emails using public email service providers (e.g., yahoo, gmail etc) are sent unencrypted leaving
them readable by the routers and the service providers. The purpose of this project is to develop an
infrastructure for sending secure emails without storing the private key of the user on the secondary
storage device rather it will be stored in the smartcard and will be used through smartcard whenever
13. required. In addition to the project shall also focus on securely managing the address book of the users.
Secure Email for Smart Phones
The objective of this project is to design and develop a secure email system for smart phones (Android
and iOS based mobile devices). The students will handle security credentials which will be used to
send/receive Secure Emails and to protect the address book entries. In addition, the system will also
handle different confirmation messages in order to inform the sender about the status of his/her email.
DRM using TC
Digital Rights Management (DRM) is one of the hot issues in current research. Trusted Computing (TC)
provides a mechanism to achieve this goal. The aim of this project is to develop a system that allows the
content providers to decide how the given data should be used and compells the client to follow the
criteria set by the content provider.
Flood Prediction
In order to have adequate time to evacuate people and avoid loss of life from serious floods, an efficient
and accurate flood prediction system is needed.
In this project, we reduced the computation time that required for simulation of flood accumulation to
enhance efficiency with a reasonable degree of accuracy. We analyzed and modified the existing
algorithms.
We have made the achievement of providing a reasonably accurate simulation within a few minutes by
using a colorful 3D graphical user interface for result displays.
Time series Analysis of Stock Market Data
Project suggestions database
Produce a system to automate the processes of gathering project suggestions from staff,
14. allowing students to browse the suggestions, express their preferences, and be allocated a
suitable tutor, subject to resource constraints such as tutor availability, limits on the number
of students doing the same project, students suggesting unsuitable projects, etc...
Project Title Project suggestions database
Aim of the Project
Produce a system to automate the processes of gathering project suggestions from staff,
allowing students to browse the suggestions, express their preferences, and be allocated a
suitable tutor, subject to resource constraints such as tutor availability, limits on the number
of students doing the same project, students suggesting unsuitable projects, etc...
Basic Project tasks
• Design and implement a database that will support the basic project tasks
· Implement a Web front end to the database that will allow staff to enter
• suggestions and students to browse suggestions
1. Project Title
Development of a version of a “University Life” board game
2. Aim of the Project
The aim of the project is to develop a program which allows a number of players to play a board game
15. called “The University Life Game”. The game will represent the ups and downs of life as a university
student. In particular, the board will have squares to represent events happening in three aspects of
student life: financial, academic and general “life” events.
The program will provide facilities to display the current state of the game, simulate the dice throws
which control the players moves, enforce the rules of the game, receive player input and indicate the
winner. The program plays the role of the “banker”, controlling but not taking part in the game.
An essential feature of the implementation is that it should be designed in such a way as to allow a
programmer to change existing features and add extra ones with relative ease, making the program easy
to maintain and extend. In practice, this means that it should be designed using an object-oriented
approach.
So this project is recommended for students who have studied object-oriented design and have
programmed in languages with object-oriented facilities.
3. Background information and User Requirements
The University Life Game will be a board game played by between 2 and 6 players on a rectangular
board which displays a number of squares arranged around its edges. Each player has an identifying
token. Players take it in turn to throw two dice and the sum of the face values of the dice determines
how
far a player may move their token around the board. All players start on a square labelled “START” in
one corner of the board and move clockwise around the board.
A player's fate is determined by the square on which their token lands after a dice throw. These will
either specify a fixed event or will direct the player to pick an event card from a specified set of cards (in
the same way as “Chance” and “Community Chest” cards work in the game of Monopoly). There will be
three sets of cards : “Money”, “Study” and “Life”.
Students working on this project will be able to obtain some help with using Java at a technical help
forum which will be run by members of the teaching team. The objectives of the forum are twofold.
Firstly, to help students already familiar with procedural programming in languages such as Visual Basic,
16. Pascal, C etc. to move to Java. Secondly, to give a very brief introduction to basic object-oriented
programming in Java. Details of the forum, including when and where it is to be held, will be posted on
the StudyNet site for 3COM0056.
3.1 The board and event cards
The detailed design of the board and the precise nature and complexity of the rules of the game are not
fixed. However, some or all of the following features should be implemented:
· The board should have the following types of squares:
• Card square which direct a player to pick a card from a particular card set i.e.
( a “Money”, “Study” or “Life” card)
• Direct Event square which control movement on the board e.g. “receive good news, go forward
4 squares”, “Serious illness, return to start”, “ Family crisis, miss a turn”
• Rest squares where nothing happens
• Each card set should have a range of cards which cause players to gain or lose. The Money cards
will relate to a player's financial state. The Study cards will relate to their academic progress. The
Life cards may affect either.
• Money cards will cause the player to gain or lose money. They may gain money from or lose it to
the banker (the computer) or the other players.
• Study cards will affect a player’s academic progress . Players progress by passing modules. The
game must have rules which govern how a player can pass a module at a particular level and move
from one level of a programme to the next.
• These rules may be simple e.g. a pass consisting of a total of 120 academic credits, or may be
more complicated e.g. 120 credits or over with at least 60 credits for coursework and a pass in
the examination.
• Different rules may apply to different modules.
• Gaining or losing credits or other required attributes (such as a pass in an exam) is determined
by the cards in the “Study” set.
• The cards should have general instructions applicable to any module e.g. “penalised for
plagiarism, lose 30 credits”, “Pass the examination”, and it will be up to the player to determine
which of their modules will be affected.
• There may also be more general rules such that a player cannot progress to the next level until
they have passed at least three modules at the current level.
• Life cards may describe general life events which may affect either financial position or academic
progress.
3.2 The game
At the start of the game:
• Each player starts with a sum of money and a registration on four level modules
(You should give these modules names e.g. “Computer Systems”)
• The winner will be the player who first achieves a pass at level 3 in all four modules (or, players
may be allowed to complete their academic progress and the winner will be the one who has done so
with the most money or lowest student debt).
• Players may be eliminated from the game either by incurring severe academic penalties (e.g. failing
17. a module twice), by falling financially below an acceptable level of student debt , or by getting a
terminating event (e.g. a card: “You have decided to emigrate and withdraw from the university”, a
direct event : “Caught for drug-dealing; leave the university for jail” ).
3.3 The play
Players start at the START square and move their tokens clockwise around the board by the number of
squares determined by the total face value of the thrown dice. When a player lands on a square, there may
be consequences outside their control determined by the rules of the game which may affect either the
player or the other players e.g. “pick up a Money card”, “pay a fine”, “win at cards - collect £20 from
each player”, but there may also be decisions left to the player e.g. which module will be affected by a
gain/loss of academic credits
Players continue round the board until there is a winner.
3.4 Internal Design and Implementation
The program must be implemented using a modular structure. Its internal design should embody the
following characteristics of good program design: low coupling, high cohesion, minimised code
duplication. Maintainability and extendibility are important features of the internal design so that it
should be easy to change or add features.
The requirements for maintainability and extendibility mean that an object-oriented approach would be
most suitable for the development of this game. There is no requirement for the game to be implemented
in a specific programming language. However, students are strongly urged to choose a language which
has good facilities for object-orientation. Anyone with no experience of object-oriented development,
should investigate what may be involved before deciding to undertake this project.
Students are also strongly urged to develop the solution in a series of stages, starting with a very simple
version and then developing the complexity of the game in a controlled way. Stages in the development
of the game and the thorough testing of those stages will provide a good basis for the discussion required
in the project report.
Finally, playing the game involves random dice throws which are unpredictable and a full game may take
a long time to complete. An important aspect of the project is the development facilities which will allow
for testing to be undertaken under the control of the developer. These facilities would allow the developer
to control the random aspects of the game so that it can be tested under the full range of circumstances,
but would not be included as features available to end users.
3.5 Development
There are three main aspects to the project:
• the complexity of the game - rules and events
• the user interface - how players interact with the game
• maintenance facilities - such as save current game, load an old game, load a new game, help , table
of scores,
A student may choose where to place the main emphasis of their project. There is no need to implement
all three of these aspects to the same level of sophistication.
The game should display a visual representation of the board. However, the complexity of the user
interface may range from a static image of the board with text i/o to describe what is happening, to a
sophisticated GUI with advanced graphics.
Developing a game with complex rules may be balanced by providing a simple user interface or, minimal
maintenance facilities. On the other hand , a more advanced GUI or extensive maintenance facilities may
be provided for a simpler game. The project should be developed in a series of stages which implement
increasing functionality and each stage should be thoroughly tested. The project report should describe
the development strategy and the steps taken to ensure that each stage is thoroughly tested. The
appendices should contain the earlier simpler versions of the game together with testing plans and the
18. code of programs developed for the purposes of testing.
3.6 User Requirements
1-4
The program should display information about a player's current location, the current state of their
resources such as their bank balance and the state of their academic progress. A representation of the
board should be provided, but this may be just a primitive static display or even as simple as a text based
list. The program should ensure that players take turns, provide a random number simulating the throw of
two dice and update the player's position. It should follow through the consequences of each move either
by acting on events and by receiving and acting on any required player's input.
If a player has reached any of the terminating conditions, they must be informed that they have lost and
the program must stop them from participating further in the game. The program should inform the
winner that they have won.
4. Basic Project Tasks
The project will be assessed not only on its functionality but also on its internal design, the
implementation decisions taken and on the approach taken to ensure thorough testing
In order to be considered for a Third Class Honours standard in this project, a student must give evidence
of having adequately attempted to :
• Provide a clear and detailed specification of the game and its rules.
• Design and implement a program which enables two players to play the game. It should:
• display information about the players current position on the board and assets (money and
academic progress)
• enable players to move in turn
• process the events associated with the new position on the board
• display the results of a move
• enforce the rules of the game and inform a player if they have been terminated
• identify an inform the players of the winner
• Develop the game in stages
• Ensure that each stage in the development of the program has been adequately tested
• Develop the program in such a way as to make it easy to maintain and extend, reducing code
duplication
• Provide a justification of some of the design decisions
1. Project Title
A System for Scoring Cricket Matches
2. Aim of the Project
“In the old days, all you needed to keep the score at a cricket match was a stick
and a sharp knife. Each time a run was scored, you cut a notch on your stick.
Now you need a computer. This is because of cricket’s obsession with
statistics.” (Yapp, 1996)
19. Cricket is a fairly complex game. Consequently, accurate scoring is important, particularly as
the same event may need to be noted in several places on the score sheet. This project is
intended to support the work of the scorers of a cricket match.
Note: you may modify this project suggestion for games which are sufficiently similar to
cricket for an equivalent scoring system to be valuable, such as baseball. If you are
considering such a project, please discuss it with your project tutor,
3. Background Information and User Requirements
Cricket Described
The following description of the game of cricket is taken verbatim from the Cricinfo website.
(see references/bibliography). This project relates specifically to the form of the game in
which each side is restricted to one innings of a certain number of overs.
Cricket is a team sport for two teams of eleven players each. A formal game of cricket can
last anything from an afternoon to several days.
Although the game play and rules are very different, the basic concept of cricket is similar to
that of baseball. Teams bat in successive innings and attempt to score runs, while the
opposing team fields and attempts to bring an end to the batting team's innings. After each
team has batted an equal number of innings (either one or two, depending on conditions
chosen before the game), the team with the most runs wins.
The order in which the teams bat is determined by a coin toss. The captain of the side winning
the toss may elect to bat or field first.
All eleven players of the fielding team go out to field, two players of the batting team go out
to bat. The remainder of the batting team wait off the field for their turn to bat. Each batsman
wears protective gear and carries a cricket bat.
The game progresses by the bowling of balls. The sequence of events which constitutes a ball
follows. The fielding team disperses around the field, to positions designed to stop runs being
scored or to get batsmen out. One fielder is the bowler. He takes the ball and stands some
27 - 2
distance behind one of the wickets (i.e. away from the pitch). Another fielder is the wicketkeeper,
who wears a pair of webbed gloves designed for catching the ball and protective pads
covering the shins. He squats behind the opposite wicket. The rest of the fielders have no
special equipment - gloves to assist catching the ball are not allowed to anyone but the
wicket-keeper.
One batsman stands behind each popping crease, near a wicket. The batsman farthest from the
bowler is the striker, the other is the non-striker. Whenever a batsman hits the ball during a
delivery, he may score runs. A run is scored by the batsmen running between the popping
creases, crossing over midway between them. When they both reach the opposite crease, one
run is scored, and they may return for another run immediately. The fielding side attempts to
prevent runs being scored by threatening to run out one of the batsmen.
If the batsmen are attempting to take runs, and a fielder gathers the ball and hits a wicket with
it, dislodging one or both bails, while no batsman is behind that wicket's popping crease, then
the nearest batsman is run out. Specifically, the batsman must have some part of his body or
his bat (provided he is holding it) grounded behind (not on) the crease. The batsmen carry
their bats as they run, and turning for another run is accomplished by touching the ground
beyond the crease with an outstretched bat. The batsmen do not have to run at any time they
think it is unsafe - it is common to hit the ball and elect not to run. If the batsmen run one or
three (or five! rare, but possible), then they have swapped ends and their striker/non-striker
roles are reversed for the next ball (unless the ball just completed is the end of an over).
In addition to scoring runs like this, if a batsman hits the ball so that it reaches the boundary
fence, he scores four runs, without needing to actually run them. If a batsman hits the ball
over the boundary on the full, he scores six runs. If a four or six is scored, the ball is
completed and the batsmen cannot be run out. If a spectator encroaches on to the field and
20. touches the ball, it is considered to have reached the boundary. If a fielder gathers the ball, but
then steps outside or touches the boundary while still holding the ball, four runs are scored. If
a fielder catches the ball on the full and, either during or immediately after the catch, steps
outside or touches the boundary, six runs are scored.
The batsmen usually stop taking runs when a fielder is throwing the ball back towards the
pitch area. If no fielder near the pitch gathers the ball and it continues into the outfield again,
the batsmen may take more runs. Such runs are called overthrows. If the ball reaches the
boundary on an overthrow, four runs are scored in addition to the runs taken before the
overthrow occurred.
Runs scored by a batsman, including all overthrows, are credited to him by the scorer. The
number of runs scored by each batsman is an important statistic.
If, while running multiple runs, a batsman does not touch the ground beyond the popping
crease before he returns for the next run, then the umpire at that end will signal one short,
and the number of runs scored is reduced by one.
The game is adjudicated by two umpires, who make all decisions on the field and whose
word is absolutely final. One umpire stands behind the non-striker's wicket, ready to make
judgements on LBWs and other events requiring a decision. The other umpire stands in line
with the striker's popping crease, about 20 metres (20 yards) to one side (usually the leg side,
but not always), ready to judge stumpings and run-outs at his end. The umpires remain at their
respective ends of the pitch, thus swapping roles every over.
How to Score
An example score sheet, scanned in from Smith (1993), is shown as an appendix. It shows
how events are recorded.
27 - 3
Note that each run needs to be scored for the batsman, the side and the bowler. This is the
type of multiple recording that your system should relieve the scorer of.
The aim of the system you are to develop is to support a cricket scorer in the most elegant and
efficient manner possible.
A number of software systems are already available to enable the scoring of cricket matches
(see Software websites below). You may design your program after an initial evaluation of
these systems, as a way of making improvements to way they work, but of course the design
and implementation of your system must be your own work.
4. Basic Project Tasks
In order to be considered for a pass at Third Class Honours standard in this project, a student
must give evidence of having adequately attempted to :
• develop a system which allows the scorer to score a complete one-innings 50-overs
match via a simple graphical user interface, including
• Enter the names of the teams and players, including identifying the captain and
wicket-keeper of each team
• Record the result of the toss and who bats first and second
• Score each ball, over, run and wicket, recording the result as each ball is
delivered and providing feedback to the scorer
• Support the recording of most of the types of invalid delivery and all of the
common ways of getting out; if you wish, you may ignore the less common
ones like Timed Out (Law 31; Smith; 1993, p.113) and Obstructing the Field
(Law 37; Smith; 1993, p.133)
• tell the score who has won at the end of the match
• keep the scoring records permanently in a database or other storage, and retrieve them
for later examination
• Allow the system to be tested quickly by scoring a three-over-a-side ‘match’ in
21. addition to the 50-over complete match
Your system must produce all of the information from a single entry for each event.
You will also need to provide a short user manual, full analysis and design documents for the
data storage and user interface, and the results you obtain when you test the system. You may
want to use historical information of a specific match from Cricinfo etc (see references
below) as test data.
References/bibliography
Books
Smith T (2000) Cricket Umpiring and Scoring; Weidenfeld and Nicholson, London. Dry,
factual, sets out the Laws of Cricket and examples of scoring. The reference book. (Note that
references in this project outline are to the 1993 edition of this work, and that a 2004 edition
is due out imminently.)
Yapp N (1996) Bluff Your Way in Cricket, Ravette Publishing; Horsham, West Sussex.
Humorous, but contains some grains of deeper truth about the game
Websites
27 - 4
http://www.cricinfo.com/ has the laws, explanations of the game, statistics, information
which can be used as input for testing your system, …
http://www.howstat.com.au/cricket/home.asp an Aussie statistics site
Software websites (the ‘competition’ to your system)
http://www.cricketstatz.com/cstatz.htm
http://www.ggiddings.freeserve.co.uk/csfw.htm
http://www.freedownloadscenter.com/Games/Misc_Games/Cricket_Scorer_Download.html
http://ourworld.compuserve.com/homepages/eddson/willow.htm
Appendix – score sheets
Taken from Smith (1993)
1. Project Title
Travellers’ Tales: a web-site for sharing stories
2. Aim of the Project
The aim of the project is to design and implement a web site to facilitate sharing the sort of
stories that people have when they have been travelling. Visitors to the website will be able to
search the storybase, add their own stories and comment on existing stories.
3. Background Information and User Requirements
Nikki&James write travel books. They have decided to set up a web site on which people can
22. share stories about their travels. They see the value of their web site as twofold, firstly some
of the stories will be useful to themselves (they plan to offer payment for any of the stories
which they use in their books) and secondly the site will be useful to other people who plan to
travel. They will seed the site with some of their own stories and pictures to get things started.
Nikki&James have looked at LotusNotes type discussions and have decided that this does not
provide what they want; in particular it is not easy to find particular postings based on
content. They have been following some of the links from
http://www.acsu.buffalo.edu/~duchan/narrative_links.html. They notice that some of the sites
have nice features they might consider including, but others are not so good.
Nikki&James require the system to:
• allow them to add their own stories (including illustrations such as photos and maps) to
the database.
• allow other site users to add stories; in the first instance they would like to moderate the
stories before allowing the stories to be placed on the web site. The moderation consists
of one of them reading each story submitted and rejecting any stories which contain
inappropriate material (this might not happen, but they prefer to be cautious, and they
want to read all the stories anyway).
• collect information about a person submitting a story, they want this to on a voluntary
basis, but it would be used firstly to pay users for any stories published in their books
(obviously complete names and addresses would not be disclosed on the web site), and
used as search criteria, for example a user might want to search for stories that retired
people tell about India. At the moment Nikki&James would like to collect sex, age-group,
party-type (lone traveller, small group, family group, large group), preferred mode
(independent traveller, guided trek, group lead by subject expert, etc.), and level of luxury
preferred (basic, mid range, luxurious). However they would like to be able to modify this
list as they gain experience.
• allow users to search for stories using the keywords above and allow users to search the
content of the stories themselves (see for example: Database Management Systems, Third
Edition, Ramakrishnan and Gehrke Chapter 27, ‘Information Retrieval and XML Data
Management’).
28 -2
• allow users to be able to respond to stories (a story might attract responses from many
users), but in a constrained way: they can respond under the following headings:
submit a similar story – the user has a story which they think is similar to the
u
given story.
submit a viewpoint story – the user has a story which they think casts the events
g
of the first story in a different light (the first story might say place X was terrible,
there was nothing to do, a viewpoint story might say having nothing to do turned
into an advantage, they were able to relax for the first time in years).
submit a ‘what if’ story – a ‘what if’ story is one where the user explores different
i
possibilities. What if you have been to these places in a different order, or at a
different time of year.
• allow the user control over the order they want to see the stories (e.g. most recent first,
those which generated the greatest number of responses first, etc.)
• provide the ‘next best’ stories if the user’s criteria have returned no stories. For example,
case based reasoning might be used, and a dialog with the users entered to establish which
criteria they want to relax. You could start by looking at http://www.ai-cbr.org/hall.html
and http://www.iiia.csic.es/People/enric/AICom_ToC.html
4. Basic Project tasks
In order to be considered for a pass at Third Class Honours standard on this project, a student
23. must give evidence of having adequately attempted to:
∗ design and implement an underlying database to store the stories and user details.
∗ design and implement the web interface which allows stories to be submitted for
moderation.
∗ link the website and database.
∗ provide the means for successfully moderated stories to be entered into the database
and therefore be available on the website
∗ allow users to search for stories using keywords.
1. Project Title
Job recruitment system
2. Aim of the Project
Produce a system to automate the job recruitment process.
3. Background Information and User Requirements
Basically the system needs to allow job recruiters to post jobs and job seekers to view the posted
24. jobs via different search categories such as location, industry, etc. and to apply for those they
think
are appropriate.
4. Basic Project Tasks
In order to be considered for a pass at Third Class Honours standard on this project, a student
must
give evidence of having adequately attempted to attain the following objectives. It is expected
that
most students attempting this project would have completed the following by Christmas.
• Analyse requirements, design and implement a database that will support the basic tasks
• Implement a web front end to the database which supports two interfaces that will allow
both types of user, job recruiter and job seeker to use the database effectively.
1. Project Title
A knowledge management system
2. Aim of the Project
Produce a system to provide a way to capture and share knowledge within a research and
development department of a chosen organisation.
25. 3. Background Information and User Requirements
One of an organisation’s most important resources is its people and what they know. If you can’t
plug into the knowledge you need, you’re powerless. Many knowledge sources are already tied
to
corporate intranets or available through the Internet but this does not always lead to accessibility
(Fowler, 2001). Many R&D departments, within themselves, waste valuable time reinventing the
wheel. ‘Ideally, combined intellectual and experience of the entire group should be readily
available
to everyone all the time’ (Pohs, 2002). The system proposed needs to find a way to capture,
organise and share the knowledge gained by such a department. Further requirements could
include
the following: allowing users to create profiles listing their skills and contact details which could
then be used as ‘yellow pages’ for workers and thus a way of finding support within the
organisation; addressing more specific issues such as aiding the annually replaced industrial
trainees by allowing the ‘passing down’ of knowledge between users.
4. Basic Project Tasks
In order to be considered for a pass at Third Class Honours standard on this project, a student
must
give evidence of having adequately attempted to attain the following objectives. It is expected
that
most students attempting this project would have completed the following by Christmas.
Produce a detailed requirements specification for a system that will support the capture,
m
organisation and sharing of knowledge by the R&D department of an organisation.
Identify a suitable approach for managing the knowledge, for example you may like to
o
investigate groupware approaches, and choose and install suitable software to implement
the system.
Design and implement some of the functions identified in your requirements specification
t
using your chosen software.
1. Project Title
A Web-based Resource Allocation and Problem Tracking System
2. Aim of the Project
The aim of the project is to produce a web-based application that records the allocation of software
26. and hardware resources to the employees of a company, and tracks the progress of technical staff
working on problems with particular resources.
3. Background Information and User Requirements
This system keeps track of the software and hardware resources that belong to a company.
Information kept about a resource includes its serial number, date of purchase, supplier, license
details (for software resources), current location (a room number) and the resource type (e.g.
"Hewlett Packard T540 Imaging Package", or “Microsoft Windows XP Professional 2002 Service
Pack 1”).
At any time, a resource may be allocated to a particular user (an employee of the company). A
resource may be allocated to a different user at different times during its use by the company.
Records are kept of the jobs performed on a resource by technical staff, such as installation of
patches for software resources, and physical repairs for hardware resources.
The company employs a number of technical staff, whose responsibilities include helping users with
resource-related problems. Each technician is competent in a number of resource types. In this
context, a “problem” might be any situation for which the employee needs help, such as getting a
new piece of hardware to work, or installing some software that requires technical assistance. A
problem might involve more than one resource.
When an employee has such a problem, they may log it with the system. This involves entry of the
details of the resources involved and the problem into a form on a web page.
When this form is submitted, the details are added to the outstanding problems log, and the
Technical Support Manager is notified by email. The Technical Support Manager retrieves the log,
finds a suitably qualified technician, and allocates the job of fixing the problem to them.
The technician works on the job, recording what they are doing on a form on a web page. When the
job is completed, information about it (a unique identifier, details of the original problem, start and
completion dates, technician's details and notes) is added to the resource's history.
4. Basic Project Tasks
In order to be considered for a pass at Third Class Honours standard on this project, a student
must
give evidence of having adequately attempted to attain the following objectives. It is expected
that
most students attempting this project would have completed the following by Christmas.
• produce a data model (ERA diagram and data dictionary) to support resource allocation and
problem tracking
• implement a database and web server to support the application
• implement the basic resource users' and technicians' functions through a simple web-based
interface
1. Project Title
Interactive Evolution of Behaviours
27. 2. Aim of the Project
The goal is to develop a software that generates a desired behaviour for very simple line-based cartoon
characters
using an interactive evolutionary algorithm. The software will run an evolutionary algorithm which will
present
the user with several instances of a simple line-cartoon 2-dimensional character performing simple
behaviours
(e.g. walking, dancing). The user orders them according to preference and the evolutionary algorithm then
creates new behaviours to be evaluated by the user in the next round.
3. Background Information and User Requirements
The candidate needs to
•review literature about evolutionary algorithms and implement an evolutionary algorithm. As a starting
point,
http://www.cs.sandia.gov/opt/survey/ea.html
provides a good start. In particular, (Goldberg, 1989), (Michalewicz, 1992) (or a later edition) are of
interest.
For ideas how to apply Evolutionary Algorithms to design, see
http://www.red3d.com/cwr/evolve.html
•learn how to implement simple line-based graphical animation (in a language of her or his choice)
•investigate how to translate the parameters from an evolutionary run into a cartoon character behaviour
(e.g. using suitable mappings or function generators)
•implement a user preference selection for a number of available behaviours
•implement a conversion of the user’s preferences into a selection criterium
Ideally, a final product would realize the following goals
•implementation of graphics with a very simple animated line-based “cartoon” character
•implementation of a basic Evolutionary Algorithm operating on chromosomes implemented as tuples of
real-valued numbers
•a translation of the Evolutionary Algorithm chromosomes into a behaviour (movement) of the “cartoon”
character
•presentation of the “cartoon” character behaviours to the user and selection interface, by which user can
identify her/his preferences to the Evolutionary Algorithm
1
4. Basic Project Tasks
In order to be considered for a pass at Third Class Honours standard on this project, a student must give
evidence of having adequately attempted to attain the following objectives. It is expected that most
students
attempting this project would have completed the following by Christmas.
•implementation of a graphics module with a very simple animated line-based “cartoon” character,
controlled
by specification of movement function.
This involves:
– writing a very simple animation software which is able to display moving lines
– construct a model of a simple line-based cartoon character
– creating an interface, by which the cartoon character can be controlled by external functions
– implement a function making the character perform simple moves through aforementioned interface
28. 1. Project Title
Absence booking system
2. Aim of the Project & Background Information and User Requirements
Produce a system that allows lecturers to book time away from work.
This seems like an almost trivial system to construct, but it is actually quite hard to get
right.
I can be away from the department for an hour or two, or a couple of weeks. I may have a
doctor's appointment which I don't want anyone to know about, or I may be presenting a
paper at a prestigious conference and I'd rather like everyone to notice. I may want to be
contacted at my home phone, or may need to give out my mobile number. I may not care
who sees the number, or I might prefer it to be visible only to trusted colleagues. I may book
two week's leave, but it only counts as nine days off my leave allowance, as one day is a
bank holiday. I might later find it necessary to change one day to "working at home" (as
some urgent request has come in from my boss).
• Implement a database that implements a reasonable proportion of the
requirements implied above.
Produce a design for a user interface that makes it easy to manage the system.
3. Basic Project tasks
In order to be considered for a pass at Third Class Honours standard on this project, a student
must give evidence of having adequately attempted to attain the following objectives. It is
expected that most students attempting this project would have completed the following by
Christmas.
29. 1. Project Title
A Simulation Tool for UH Racing
To specify, design, implement and test a simulator of a racing car and circuit for UH
Racing.
2. Aim of the Project
3. Background Information and User Requirements
UH Racing is the University of Hertfordshire’s Formula Student’s team. They race their
Formula Student car against other Universities in the UK, and recently reached the world
finals where they raced against international opposition.
UH Racing consists of a number of teams. Class 1 team is a (mainly) final year team who
each year design, build and compete in a new car in the UK and Internationally. Class 1-200
team is a team of first and second year students who further develop the previous year’s Class
1 team’s car and compete in this modified version in the UK. Class 3 team is a team of
students on their placement year and some second year students. The Class 3 team is involved
in design and business events.
The UH Racing’s teams are highly successful, and have won many racing competitions and
awards. The teams aim to remain one of the leading university teams, but their competitors
are catching up quickly. To retain their leading position, UH racing need to develop an
interactive simulator of how their car will perform on a racing circuit. They will use this
simulator as a test-bed for the design of their cars, and later for analysis of data logged from
the car during actual races. The simulator needs to be highly parameterised to allow different
car designs to be tested on the different racing circuits under different weather conditions. It
is important that simulation runs can produce various statistical results to let the UH Racing
teams analyse them in a meaningful manner to aid them in their engineering designs.
Any student undertaking this project would be involved directly with the UH Racing teams.
UH Racing would aid Computer Science students by specifying the parameters for the car
designs, and providing information on the analysis tools they use. The output of the most
30. advanced version of this simulator will need to be compatible with the results of logs from
UH Racing cars, to allow side-by-side analysis to provide feedback to improve car designs,
advise the driver and improve future versions of the simulation software.. There will be a
considerable amount of pure, applied and statistical mathematics in this project. Therefore,
some understanding of mathematics is essential to any student undertaking this project.
4. Basic Project tasks
In order to be considered for a pass at Third Class Honours standard on this project, a student
must give evidence of having adequately attempted to attain the following objectives:
• Code into a high-level programming language a basic set of equations given by UH
Racing personnel which describe the behaviours of their car on a specified racing circuit
• Develop a user interface which allows UH racing personnel to:
o input the necessary parameters for a simulation run
o view the results of that run in a suitable numeric form
This interface will adhere to good HCI principles which should be stated in the project
report.
• Allow the simulation program’s user to save the simulation output data in a form suitable
for importing into for example MS-Excel.
In order to be considered for a pass at Second Class Honours standard on this project, a
student must give evidence of having adequately attempted to attain the following objectives:
• Either (A)
o Code into a high-level programming language a set of equations given by UH
Racing personnel which describe the behaviours of the car on the racing circuit,
including additional parameters such as weather conditions to be specified by UH
Racing personnel
o Design a software-based simulation whose structure allows car and circuit
equations, parameters and values to be changed easily
o Develop a user interface which allows UH racing personnel to input the necessary
parameters for a simulation run and make use of its outputs; this interface will
adhere to good HCI principles which should be stated in the project report
o Provide tools to allow the user to view the results of a simulation run in at least
one graphical form specified by the UH Racing personnel
o Enable the user to specify different racing circuits on which to run simulated cars
o Using information provided by UH Racing personnel, optimise the car’s
acceleration and deceleration behaviour during a lap to produce the best possible
theoretical lap time
o Allow the program’s user to save the simulation output data in a form suitable for
importing into for example MS-Excel
• or (B)
o Provide a reasonably realistic view on a PC display of the car running in the
circuit derived form of information provided by your simulation, either in the
form of what the driver may see as they drive round the circuit or a birds-eye
view of the car being driven round the circuit. In either case, scenery around the
circuit can be omitted.
In order to be considered for a pass at First Class Honours standard on this project, a student
must give evidence of having adequately attempted to attain the following objectives:
• Either
o Both of tasks A and B required for Second Class Honours
• or
31. o All of the tasks required for Second Class Honours under A above, and
o Developing an interface to the data provided by GPS and other data saved in
electronic decides in the car itself during a lap of the circuit, and providing UH
Racing personnel with information about how well the driver’s actual
performance in each part of the circuit compares with the theoretical optimal lap
which your simulation will have computed
2
• or
o All of the tasks required for Second Class Honours under A above, and
o Developing statistically- and/or AI-based mechanisms which will help UH
Racing personnel optimise some of the many design and set-up parameters which
affect the car’s performance on race day.
Note: since this project is intended to support UH Racing’s efforts, the direction of which may change
during the development and testing of this year’s car, it is possible that during the year other objectives
may turn out to be more important to them than those listed above at Second and First Class Honours
standards. Project work on these alternatives will be acceptable subject to the agreement of UH racing
and of the project supervisor.
Additional information:
UH Racing’s home page is at http://www.uhracing.co.uk/
General information about Formula Student can be found here:
http://www.formulastudent.com/
To give you an idea of the type of things UH Racing would like, have a look this free lap
simulator provided by Bosch:
http://www.bosch-motorsport.de/content/language2/html/3050.htm
1. Project Title
A Facebook application for questionnaires and opinion polls
2. Aim of the Project & 3. Background Information and User Requirements
I think it would be cool to be able to add a questionnaire to a facebook page. Then you
could find out that 92% of males don't like your new hairstyle, but 69% of females have
the
same favourite movie as you have.
Cool maybe, but not easy I suspect -- definitely involves programming -- the API seems to
be
based on PHP.
Facbook is a popular "social networking" system. You can add applications to your
facebook page, see http://www.facebook.com/help.php?page=12 for more info on this. It
may be that someone has already build a questionnaire application, but even if so you
could
build your own.
Eventually, you should be able to easily create new questionnaires, an the results should
be
updated on everybody's page in real time.
Apart from the obvious development process, there are lots of interesting and subtle
privacy
32. and security issues that you could look at if you have time.
• Implement a simple Facebook application that doesn't do anything.
• Implement a Facebook application that does a fixed questionnaire.
4. Basic Project tasks
In order to be considered for a pass at Third Class Honours standard on this project, a student
must give evidence of having adequately attempted to attain the following objectives. It is
expected that most students attempting this project would have completed the following by
Christmas.