KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

43
IMPORTANT THESE PAGES ARE STILL BEING UPDATED DO NOT RUSH TO GET IN YOUR CHOICES AS THEY ARE NOT ALLOCATED ON A FIRST COME, FIRST SERVE BASIS. MONITOR THIS PAGE REGULARLY TO LOOK FOR NEW PROJECTS IF THE AWARD YOU ARE UNDERTAKING IS EXCLUDED FROM DOING A PARTICULAR PROJECT THEN IT IS NORMALLY FOR A GOOD REASON. IF YOU REQUIRE CLARIFICATION FROM THE MEMBER OF STAFF THEN PLEASE EMAIL HIM/HER DIRECTLY. NOTE A MEMBER OF STAFF DOES NOT HAVE THE ABILITY TO ALLOCATE A PROJECT DIRECTLY TO ANY STUDENT. YOUR CHOSEN PROJECT MUST BE LINKED TO THE AWARD YOU ARE UNDERTAKING.

Transcript of KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

Page 1: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

IMPORTANT

THESE PAGES ARE STILL BEING UPDATEDDO NOT RUSH TO GET IN YOUR CHOICES AS THEY ARE NOT ALLOCATED ON A FIRST COME, FIRST SERVE BASIS.

MONITOR THIS PAGE REGULARLY TO LOOK FOR NEW PROJECTS

IF THE AWARD YOU ARE UNDERTAKING IS EXCLUDED FROM DOING A PARTICULAR PROJECT THEN IT IS NORMALLY FOR A GOOD REASON. IF YOU REQUIRE CLARIFICATION FROM THE MEMBER OF STAFF THEN PLEASE EMAIL HIM/HER DIRECTLY.

NOTE A MEMBER OF STAFF DOES NOT HAVE THE ABILITY TO ALLOCATE A PROJECT DIRECTLY TO ANY STUDENT.

YOUR CHOSEN PROJECT MUST BE LINKED TO THE AWARD YOU ARE UNDERTAKING.

Page 2: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

KEY TO STAFF MEMBERS

PA Paul Angel GM Gaius MulleyAJB Andrew Blyth KN Keith NorrisGB Gaylor Boobyer PP Peter Plassmann

ML Mitch LangfordDJC Daniel Cunliffe DCR Colin ReesPD Phil DaviesNT Nathan Thomas NS Nigel StantonIW Ian Wilson GS Geneen StubbsGVE Geoff Evans IS Iain SutherlandDWF Dave Farthing PT Paula ThomasJGH John Hanlon DT Doug TudhopeGH Gary Higgs JV John VeaseyIRI Ian Inglis KV Keith VerheydenDK Dave Kidner JMW Mark WareSFL Stuart LewisDMcP Duncan McPhee JAW Andrew WareJM Jim MoonCWM Colin Morris

Page 3: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

KEY TO AWARDS FOR EXCLUSION PURPOSES

C ComputerStudies /Computing

SE Software EngineeringNMA Network Management

& AdministrationNetwork Management

& SecurityIS Information SystemsCN Computer NetworksICT Information

Communications Technology

BIT Business Information Technology

MC Multimedia ComputingIC Internet Computing

CGD Computer Games Development

CF Computer Forensics

Page 4: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

CSS Computer Systems Security

REMEMBER: YOUR CHOSEN PROJECT MUST BE LINKED TO THE AWARD YOU ARE UNDERTAKING.

Page 5: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

FINAL YEAR MODULE CODES

CS3S02 Interactive Multimedia & Hypermedia SE3S03 Building Highly Reliable Software SystemsCS3S03 E-Learning & Assessment SE3S04 Advanced Internet DevelopmentCS3S04 Analysis & Visualsation of Spatial Data SE3S05 Software Component DevelopmentCS3S05 Computer Imaging/Graphics SY3S01 Operating SystemsIS3S01 Strategic IS Management SY3S02 NetworksIS3S02 Advanced Databases & Modelling SY3S06 Distributed Computer SystemsIS3S03 E-Commerce: Systems & Strategy SY3S04 Systems Security & AdministrationLL3S01 Computers & Law IS3S04 Advanced Digital Investigation TechniquesSE3S01 Object Oriented Systems CS3S07 Interactive Multimedia and the Emerging WebCS3S06 Advanced Real-Time Rendering Techniques CS3S08 Artificial Intelligence for Game Developers

Page 6: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

Project Titles for Level Three Project 2008-2009 CS3D01

Description Awards Excluded1. GVETourist AdvisorMany areas of the UK have several web sites dedicated to helping visitors plan their trips. Most are disjoint and provide nothing more than a set of electronic brochures. The purpose of this project would be to target a specific area of the UK (or any other country by agreement) and generate an integrated tourist advisor for that area

CGD CSS CF NMA

2. GVEHouse Self BuildHouse Self Build projects constitute a large proportion of the new builds in the UK each year. A system is required which will advise throughout the process from planning to VAT reclamation. The system should be web based.

CGD CSS CF NMA

3. GVELegal cases revision toolLearning Cases for Law modules is a difficult prospect for most law students due to their often complex and multi faceted nature. This project is intended to provide a mechanism (preferably web based) for constructing and sharing case synopses among law students preparing for their seminars and also examinations.Note:Module LL3S01 would be helpful

CGD CSS CF NMA

Page 7: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

4. GVEHospital “off duty” Roster generatorA system to generate the weekly off duty rota for a hospital ward, together with maintaining records of sickness, leave, maternity leave etc. The system will require the generation of a scheduling algorithm to achieve appropriate skill mixes.

CGD CSS CF NMA

5. JMWDeveloping a GPS based on-line location tracking systemThe student will develop and evaluate on-line location-based tracking system. This will require student to use specialist web mapping software (e.g. Google Maps, Virtual Earth or GeoServer) and hardware (e.g. GPS enabled hand-held device – to be supplied by Tutor), together with standard web technologies (JavaScript, PHP, MySQL).Note:Student should have studied web development previously (e.g. Rich Internet Application Development at level 2) and preferably be studying Advanced Internet Development at level 3. Alternatively, GIS experience at level 2 (and possible 3)6. JMWDeveloping an on-line mapping application using open source softwareThe student will be expected to:- identify a suitable application area for the proposed web mapping site- review available software (e.g. MapServer, GeoServer) in terms of

system requirements and functionality, and also data availability- design, implement and evaluate web mapping siteNote:Student should have studied web development previously (e.g. Rich Internet Application Development at level 2) and preferably be studying Advanced Internet Development at level 3. Alternatively, GIS experience at level 2 (and possible 3).

Page 8: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

7. JMWBuilding a dynamic online mapping application using Google Maps, PHP and MySQLThe student will carry out a review and evaluation of Google’s web mapping API, paying particular attention to its use in so called map mashups. The student will be expected to build a demonstrator mashup of his/her own.NoteStudent should have studied web development previously (e.g. Rich Internet Application Development at level 2) and preferably be studying Advanced Internet Development at level 3. Alternatively, GIS experience at level 2 (and possible 3).

8. DWFForensic analysis of smart-phonesScene of crime investigation may include analysis of evidence mobile cell phones. Although there has been some work published on this, smart-phones have special additional characteristics. Forensic analysis of such equipment must satisfy preservation of evidence rules.

In this project the student will:• identify what kinds of information are recorded on smart-phones that may be useful as forensic evidence;• investigate how such information can be retrieved in a sound manner;• produce guidance on what evidence should be collected and how;• evaluate the guidance against a set of criteria.

A smart-phone can be made available (under supervision) for use in this project.NoteCo-requisite of IS3204 Advanced Digital Investigation Techniques and Tools

Only available for Computer Forensics Students

Page 9: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

9. DWFA CBL system using reusable learning objectsCreating useful CBL material is very time-consuming. Sometimes CBL elements are useful in more than one CBL system. A variety of approaches to re-use of learning material has been proposed over the years; Littlejohn (2003) Reusing Online Resources: a sustainable approach to e-learning is a useful summary. The most comprehensive approach uses reusable learning objects to encapsulate the reusable material and a range of other relevant information into each component.

The student will also research reusable learning objects, and will produce two or more CBL systems out of reusable learning objects to demonstrate how the approach can work. The CBL topic will be given to the student. The student will evaluate the CBL systems in terms of usability and ease of development.

In this project the student will: research good practice in CBL design; research past work on reusable learning objects; design and produce two or more CBL systems to teach a given topic;

evaluate the CBL in order to prove or disprove the student’s hypothesis about reusable learning objects.Note:Co-requisite module CS3S07 Interactive Multimedia and the Emerging Web

SE

BIT

NMA

CGD

IS

CSS

CN CF ICT

10. DWFDigital media library for A470s Big BandThe A470s University of Glamorgan Big Band currently has a variety of digital media and web pages. The Band Leader requires an easy-to-use method storing and disseminating digital media.

In this project the student will: research how similar groups store and publish up-to-date material;

NMA CN CF CGD CSS

Page 10: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

analyse the Band’s requirements and research alternative technologies that could be used to satisfy them;

design and produce a working system using an appropriate host;evaluate the system with the Band Leader and committee members.Note:Co-requisite module CS3S07 Interactive Multimedia and the Emerging Web11. DWFAutomated detection fraudulent e-commerce paymentsA variety of techniques can be used to detect fraudulent e-commerce payments. For example, a sophisticated technique follows up failed payment attempts to determine if previous and subsequent successful attempts are by the same fraudster.

In this project the student will: research the various fraud detection techniques available; design and produce software that combines various appropriate

techniques;evaluate the software in order to determine its effectiveness.NOTECo-Requisite module IS3S03 E-commerce Systems & Strategy

SE

CGD

NMA

CSS

IS CN

CF

ICT

BIT

12. DWFAdvisor/demonstrator for mobile e-commerceE-commerce can now be conducted using common mobile phones and PDAs. Developing e-commerce sites that are suited to such devices, though, is tricky.

The student will: research the technical, HCI etc. requirements for mobile e-commerce; research the tools available for developing e-commerce sites that work

on mobile devices;

NMA CN CF CGD CSS

Page 11: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

develop guidelines for developing mobile e-commerce sites; produce a prototype advisor/demonstrator for mobile e-commerce; evaluate the prototype system.

The supervisor can provide example paper-based assessments, and arrange for a small group of students to evaluate the environment.NOTECo-Requisite module IS3S03 E-commerce Systems & Strategy

13. DWFProject management gameGames and role-play are valid educational tools. A computer game is required to help students learn project management skills. Such a game might draw on ideas from games like Football Manager and Intel’s IT Manager (http://itmg2.intel.com/eng/) and from project management techniques like Earned Value Analysis.

The student will: identify project management techniques that might be appropriate for

this game; evaluate relevant computer games and identify how to make the game

engaging; produce a prototype Project Manager game; evaluate the game with end users.

Students should not underestimate the programming skills required to produce such a computer game. The supervisor can arrange for a small group of students to evaluate the game

This project is only available for Computer Games Development students

14. GSThree projects (a), (b) & (c)Using Web 2.0 to support Learning

NMA CN CF CGD CSS

Page 12: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

There are numerous Web 2.0 tools and technologies that are available and which hold great potential for supporting learning at all ages and levels. This project will investigate a specific tool e.g. blogs, wikis, social networking etc and investigate its suitability in the learning environment.

This project will require that you explore existing research into Web 2.0 tools and technologies, learning theories and learning styles to elicit a suitable solution for the chosen users.

The following URLs are a good starting point for your research:

Reader on Web 2.0 and Educationhttp://ictlogy.net/bibciter/reports/bibliographies.php?idb=27

e-Learning Centrehttp://www.e-learningcentre.co.uk/eclipse/Resources/learningstyles.htm

Index of Learning Theories and Modelshttp://www.learning-theories.com/ NOTE:CS3S03

15. PTForensic Wiping Tools for USB Flash MemoryUSB Flash Memory has increased in capacity significantly and is now used to store sensitive company and personal data. However, the removal of the data from USB and ensuring that it has been properly erased is difficult to achieve. There are a number of open source and proprietary tools that claim to forensically wipe USB Flash Memory but their effectiveness has not been tested.This project will look at USB Flash Memory, how data is stored and will

Only available for Computer Forensics and Computer Systems Security students

Page 13: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

evaluate the tools available for forensically wiping the data. It is expected that a prototype forensic wiping tool may be developed to demonstrate the limitations of current tools.NoteIS3S0416. PTHiding information in MS Office file MetadataWhen an MS Office file is created, it has a significant amount of metadata associated with the file. This metadata may be accessed and altered and, may also be used to hide other data. The aim of this project is to investigate the properties of MS Office file metadata and to develop a tool to show how this information may be used to hide data.

Only available for Computer Forensic Students

17. PTUsing Alternate Data SourcesAlternate Data Sources are a little known Windows function that may be used to hide data in a NTFS file system. Investigate how Alternate Data Sources work and show how they may be used to hide information in a file system.NoteIS3S04

Only available for Computer Forensic Students

18. PTAn Investigation into Anti Forensic ToolsThere are a number of weaknesses in current forensic analysis tools and techniques. The Metasploit project contains a number of anti-forensic tools that have been developed to exploit these weaknesses. The aim of this project is to investigate the effectiveness of these anti-forensics tools, to demonstrate their usefulness and to specify recommendations on how they may be improved.NoteIS3S04

Only available for Computer Forensic Students

Page 14: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

19. PTSIM Card Location Data AnalyserThe forensic analysis of a mobile phone SIM card can reveal a considerable amount of data concerning the calls, SMS, etc made by the user of the phone. Each data record contains location information that can be used to identify where in the UK the mobile phone was used. However, there are few tools that interpret this location data.The objective of this project will be to identify and evaluate the information that is stored on a SIM card using currently available open source tools, eg CPA SIM Analyser and then to develop a tool that can analyse the location data in order to identify the location of the mobile phone when it was used.NoteIS3S04

Only available for Computer Forensic Students

20. JMEvaluating XNAXNA is touted as a game development platform that is for everyone. The purpose of this project is to investigate the XNA platform and compare the development process with a more conventional approach, using unmanaged C++. In order to do this you will have to create small example programs using both platforms; this may be done using a number of individual code examples, or a partial implementation of a simple game on each platform. You are to evaluate whether XNA really provides a productivity boost for almost anyone to create professional cutting edge games.

XNA Developer center http://msdn2.microsoft.com/en-us/xna/default.aspx (Referenced 17-04-08)

Only available for CGD and SE

21. JMPartial arcade game implementation investigating up to date game features

Only available for CGD and SE

Page 15: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

Investigate and select an early arcade game, e.g. Space Invaders, Pac-Man, etc. Investigate ways in which games have changed since the selected game was developed and suggest how the selected game can be brought up to date. E.g. 3D graphics, distributed multi-player game, better game AI, etc. Develop a prototype that implements some of the suggested features and evaluate whether the changes are beneficial.

NoteSE3S01 OO Systems

22. JMEducational Computer Game Development.Chris Crawford is attributed with saying that “The fundamental motivation for all game-playing is to learn” (Egenfeldt-Nielsen, 1986). Investigate the history of educational computer games and produce a prototype system that you will then use to evaluate some aspects of educational computer games, and suggest whether these aspects can assist learning.

Egenfeldt-Nielsen 1986 “Understanding the educational potential of commercial computer games through activity and narratives”, http://game-research.com/index.php/articles/understanding-the-educational-potential-of-commercial-computer-games-through-activity-and-narratives/(Referenced 17-04-08)

Only available for CGD and SE

23. JMThe TileWorldThe Tileworld (Pollack and Ringuette, 1990) is an environment where aspects

of Intelligent Software Agents may be experimented upon [see reference (Pollack and Ringuette, 1990) for details]. You should re-create your own Tileworld like environment. Additionally, you are to

Only available for CGD and SE

Page 16: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

investigate the current literature on agent planning and create your own intelligent agents to run in the Tileworld. You are then to perform experiments to determine the effectiveness of your planning algorithms in handling tasks within the Tileworld.

NOTE you may apply this project to a different agent testbed if you wish, or even devise your own Agent testbed (in place of the Tileworld).

Pollack M and Ringuette M, 1990, “Introducing the Tileworld: Experimentally Evaluating Agent Architectures”,

http://www.agent.ai/doc/upload/200407/poll90_1.pdf (Referenced 17-04-08)

Lees M. 2002, “A history of the Tileworld agent testbed”, technical report, Computer Science Technical Report No. NOTTCS-WP-2002-1

http://www.cs.nott.ac.uk/WP/2002/2002-1.pdf (Referenced 17-04-08)NoteSE3S01 OO Systems

24. PAShadow MappingCreating realistic images using computer graphics relies on using realistic lighting and shadowing effects. This project focuses on a popular method of creating shadows called shadow mapping. Originally developed in the 1970s, this technique is widely used in real-time animation systems, particularly computer games, to create realistic shadow effects.

However, shadow mapping comes with a number of problems such as blocky shadows and numerous techniques have been developed to address these problems. This project focuses creating a simple shadow mapped scene to demonstrate the problems of using shadow mapping. As part of the project

NMA MC CF

Page 17: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

you are required to research and implement a number of techniques used to overcome the problems of shadow mapping. You are to demonstrate how these techniques work and evaluate how effective they are.

The project will be programming based with some maths and so will be suitable for Game Development students or final year students studying the Computer Graphics module CS3S05

25. PAProcedural Landscape GeneratorMany developers are turning to procedural techniques to create graphical content on-the-fly, rather than relying on artists to create pre-stored content. This allows large, complex natural objects to be created in real-time without having to store the object directly in memory. This can significantly reduce load times and memory requirements. For example, the up-coming game Spore relies on procedural techniques to create the models and worlds that populate the game environment.

This project involves the research and development of procedural techniques than can be used to create 3D landscapes. This will include research into fractal landscape and noise-based procedural techniques. You will be required to build a simple prototype tool that will use the techniques you research to allow a user to interactively create a 3D landscape. Using the tool, you are required to evaluate the effectiveness of the procedural techniques you implement.

The project will be programming based with some maths and so will be suitable for Game Development students or final year students studying the Computer Graphics module CS3S05

NMA CF

26. PA NMA CF

Page 18: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

Particle SystemsIn computer graphics, the look and behavior of effects such as smoke and fire can be achieved by creating and animating hundreds or thousands of points called particles.

This project involves the research and development of different particle systems to create a number of effects. You will first be required to research the techniques used to create the effects. You will then required to implement a number of effects using the researched particle systems and evaluate the effectiveness of the chosen techniques.

The project will be programming based with some maths and so will be suitable for Game Development students or final year students studying the Computer Graphics module. CS3S05

27. DTFast and flexible user interfaces for semantic web applicationsThe Hypermedia Research Unit is investigating the potential of various knowledge organisation systems (taxonomies, thesauri and also informal folksonomies) to assist Web based search and the information architecture of website design. These require fast and flexible user interfaces for Web applications that do not require regeneration of a web page for every interaction.

This project would investigate the potential of AJAX (Asynchronous JavaScript and XML) and related technologies for developing Web based access to taxonomies and thesauri in order to browse and display these knowledge organization systems as part of Web applications. Web service approaches may also be considered. Interfaces for poly-hierarchical structures would be of interest.

NMA IS ICT BIT MC

Page 19: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

Requires programming skills and interest

See alsohttp://www.w3schools.com/ajax/default.asphttp://en.wikipedia.org/wiki/AJAXhttp://hypermedia.research.glam.ac.uk/kos/star/NOTECS3S0728. DTDeveloping 3D interactive multimedia with DirectorThis project would design and implement an interactive 3D multimedia application, involving 3D modeling and the new 3D possibilities of Adobe Director MX 2004. A 3D model will be involved rather than a flat QTVR panorama. The subject matter will be decided jointly.

May require programming in Lingo NOTECS3S07

NMA

MC

IS CF ICT BIT CSS

29.DTSocial tagging and natural language processing of web documentsThe Hypermedia Research Unit is investigating the potential of social tagging (as in FLICKR) along with natural language processing (NLP) tools to assist with automatic indexing of Web documents. Various open source toolkits have become available with program libraries for this purpose.

This project would build on the HRU’s EnTag (Enhanced Tagging) JISC funded Project to investigate further interface ideas for tag clouds, etc and for automatic classification to assist with tagging

Requires programming skills and interest

NMA

MC

IS CF ICT BIT CSS

Page 20: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

See alsohttp://www.ukoln.ac.uk/projects/enhanced-tagging/NOTECS3S0730. CWMArtificial Immune Systems

Artificial Immune Systems (AIS) have appeared as a new computational approach for the Computational Intelligence community. Like other biologically inspired techniques such as neural networks and genetic algorithms, they try to extract ideas from a natural biological systems in order to develop computational tools for solving engineering problems such as pattern recognition, data analysis (clustering), function approximation and optimization. This project will involve investigation into the current state of AIS research and an implementation to demonstrate its applicability to some sample problem(s).

IS CN ICT BIT IC MC

31. CWMData Visualization using Neural Networks.Kohonen Self Organizing Maps are a type of neural network used for looking at relationships in large data sets and hence have an application in many areas of industry for data mining. The output of a Self Organizing Map is often misunderstood by users of the technique. This project will involve writing some software that will take the output from a Self Organizing Map and display it in a manner which makes clear the relationships discovered by the network. There will be no requirement to write the Kohonen software itself as the project will use existing software. The software that is written should be Windows based and user friendly and can be developed in any suitable language. This project is suitable for any student willing to develop some 2-D graphical software

IS CN ICT BIT IC MC

32. CWM NMA IS CN CF ICT BIT

Page 21: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

Genetic algorithms and neural networks

Backpropagation neural networks are usually trained using some iterative method derived from a mathematical analysis of the operation of the network. This technique is time consuming and requires understanding of the mathematical principles involved. This project will investigate the application of genetic algorithms to replace the "normal" training of the network. This involves setting up some candidate networks and then picking the best of these. The best of the population are then combined in some way to produce a new population of candidate networks. This procedure is continued until a satisfactory network is obtained.

The project can be coded in any suitable language (C, C++, JAVA) and a

graphical user interface to the software is not necessary, but good

programming skills are required.

IC CSS MC

33. CWMArtificial Intelligence Simulation with Reinforcement LearningThe aim of this project is to develop a simulation which will demonstrate the potential of using reinforcement learning. The system models a virtual world of creatures, predators and prey. The creatures exhibit random behavior initially but receive rewards based on their actions, learning is based on these rewards. A GUI will be used to provide a real-time view of the simulation as well as many statistics about the status of the program. Suitable programming language must be used and a good level of programming ability is required.

NMA

IC

IS

CSS

CN

MC

CF ICT BIT

34. JAWTeam Dynamics using AI

AI can be used to develop teams of NPC’s in a computer game. Such games

Only available for Computer Games Development

Page 22: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

can range from those involving sports teams to those involved with military action. The project could involve the use of a high level programming language such as C++ or C# through to a sophisticated development environment such as Game Maker.

The project has the scope to look at the HCI, AI solving, and graphics of such team games35. JAW3D CONNECT 4The original concept of this game is centuries old, Captain James Cook used to play it with his fellow officers on his long voyages, and so it has also been called "Captain's Mistress". Milton Bradley (now owned by Hasbro) published a version of this game called "Connect Four" in 1974.

3D Connect 4 aims to be the next generation of the game. The project has the scope to look at the HCI, AI solving, and graphics of the game.

Only available for Computer Games Development

36. JAWSUDOKU

Sudoku is a logic-based number placement puzzle. The objective is to fill a 9×9 grid so that each column, each row, and each of the nine 3×3 boxes (also called blocks or regions) contain the digits from 1 to 9 only once. The puzzle setter provides a partially completed grid.

The project has the scope to look at the HCI, AI solving, and graphics of the Sudoku.

Only available for Computer Games Development

37. KN.NET Vs J2ME for mobile application developmentTypically, students are familiar with using a Java IDE and MS Visual Studio to develop basic applications. With the ever increasing range of available

NMA CN CF CGD CSS

Page 23: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

mobile devices, what IDE and features should developers use to develop applications for such evolving devices?

This project will require the student to investigate the development tools available to such developers. The knowledge gained will be demonstrated via both the production of suitable prototypes and a critical evaluation of the techniques and IDEs identified/used38. KNNetwork SimulatorsIn recent years, a number of Computer Networking simulators have been available to both computer network designers and the academic community.

Cisco are about to release their latest offering, namely, Packet Tracer V5.0. Cisco claims that this simulator will include the ability to support the development and integration of external programs through an open API.

This project will require the student to critically investigate/evaluate the capabilities of present day simulators (particularly PT 5.0) and their usefulness in supporting our own in-house computer network modules. The knowledge gained will be demonstrated through the production and critical evaluation of suitable computer network prototypes/activities to support computer network module delivery.NoteSY3S02 Computer Networks

SE

CGD

IS

CSS

CF

MC

ICT BIT IC

39. KNFacebook developmentSince last year, the Facebook Social Networking site has provided software developers with the ability to develop and deploy Facebook based applications. Developers can produce applications which interact with Facebook user details through a variety of techniques to enhance the user

Page 24: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

experience. However, this is an ever evolving area which although initially very basic and poorly documented now also has a Microsoft interest.

This project will require the student to investigate the development tools available to Facebook developers. The knowledge gained will be demonstrated both via the production of suitable prototypes and a critical evaluation of the techniques and IDEs available.NoteSE3S04 Adv Int Development40. JVAccounting Information SystemsResearch the development of Accounting Information Systems. Develop a budgeting tool for use by any large organization

41. JVBusiness GameResearch the use of Business Games and Business Simulations as educational tools. Develop a web-based business game.

42. JVRostering SystemResearch the problems associated with rostering of personnel within the National Health Service. Develop a useful rostering system for a small hospital department

43. IWCharacter Face Modelling ApplicationDescription: You will be required to develop an application that allows for manual and random generation of appropriate facial models.

Only available for Computer Games Development students

Page 25: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

This project involves:

determining the key parameters of a face model and associating them with an underlying computer generated representation;

applying an appropriate texture to the computer generated mesh; allowing for the manipulation of the key parameters using an intuitive

interface e.g. sliders, 2D mouse movements; arriving at a set of simple parameters that can be appropriately

randomised; ensuring that a rich variety of appropriate faces can generated; use of an appropriate 3D mesh and texture file format; manipulation, storage and retrieval of faces; programming with C++ and OpenGL/DirectX.

Note:CS3S06 – Advanced Real-Time Rendering Techniques

44. IWGenerating plausible n-ball billiards solutions (Shots)Description: Many pool games allow you to aim your cue, set spin and other shot characteristics and show you a forecast of what's going to happen to the balls on the table. However, for this project you will look at the reverse of the problem. Starting with the result of the shot (e.g. black ball in left corner pocket) your application will calculate the range of possible shots that can get you there. The system needs to be versatile enough to come up with a number of unintuitive shots (several balls and bounces) that leads to the same goal.

This project involves: modelling simple dynamics of billiards (or other related games); extending the application with constraints to make sure generated

shots obey the rules of 8-ball/9-ball/snooker, friction & spin, hopping etc.;

Only available for Computer Games Development students

Page 26: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

a reasonable understanding of related mathematics; use of appropriate 2D graphics to represent the game; exploration of possible solutions using appropriate search algorithms; using a search algorithm/heuristic to generate a range of shots to

achieve a defined goal; programming with C++ and OpenGL/DirectX.

NoteCS3S06 – Advanced Real-Time Rendering TechniquesCS3S08 – Artificial Intelligence for Game Developers

45. IWGenetic Algorithms and Adaptive Strategy Game AIDescription: Adaptive AI is an interesting research topic in the area of game development. Because most AI is hard-coded in the form of cause and effect rules a player can learn to anticipate how AI will behave in certain situations. In contrast, adaptive AI will adjust its strategic choices in line with observed patterns within the player’s playing style. You will investigate this area within the context of a provided turn-based strategy game called Advanced Protection.

This project involves: investigating the use of Genetic Algorithms within the area of

adaptive game AI; developing an AI for Advanced Protection that learns from player

choices and adjusts its own style to adapt to new strategies; exploration of possible solutions using appropriate search algorithms; programming with C++.

NoteCS3S08 – Artificial Intelligence for Game Developers

Only available for Computer Games Development students

46. IW Only available for Computer Games Development

Page 27: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

Develop a 2D & 3D Genetic Algorithm Visualisation Educational ToolGenetic Algorithms (GA) are used to provide good answers to problems where exploring all possible solutions would be impossible. The objective of this project would be to produce an educational package that takes the user through the fundamentals of GA theory by use of interactive 2D and 3D problem visualisation tools. To be truly effective, the user should be able to input 3D mathematical functions from the keyboard that would form the basis of the Genetic Algorithm search procedure and 3D visualisation of the problem space.

This project involves: investigating the use of Genetic Algorithms within the area of

adaptive game AI; use of an appropriate 3D mesh and texture file format; manipulation, storage and retrieval of solutions; exploration of possible solutions using appropriate search algorithms; programming with C++ and OpenGL/DirectX.

NoteCS3S06 – Advanced Real-Time Rendering TechniquesCS3S08 – Artificial Intelligence for Game Developers

students

47. SFLIntegrated GPS Mobile Application Development

1. Survey and investigate the range of GPS applications for the latest generation of Nokia N95/N82 series mobile phones. Based on this research design and develop a prototype set of applications to integrate with the GPS facilities. Deploy and evaluate these applications.

48. SFL

Page 28: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

Open source ACOL BridgeSurvey and investigate open source ACOL Bridge applications. Based on this research design and develop a client server prototype Open source ACOL Bridge application possibly using or enhancing an existing open source application.

49. SFLYacht racing team website

2. Survey and investigate existing yacht racing team websites.Based on this research, design and develop an interactive web site, including communication and educational tools, etc.. Full specification to be agreed during early stages of project preferably using open source tools and possibly using or enhancing an existing open source application.

50. GMRandom Map GeneratorThis project will research and construct an algorithm which generates random maps. The output of the map will be a plain text file which can be converted into a Quake 1 map via a utility generated by a previous student project

NMA

MC

IS CF ICT BIT CSS

51. GMQuake 3 and PythonThis project will investigate how difficult it is to expose the Quake 3 bot API as a set of SWIG generated Python interfaces. If this were implemented then it should be possible to write the Quake 3 bot AI algorithms in Python.

NMA

MC

IS

IC

CF ICT BIT CSS

52. GMCSN and PythonThis project will generate a Python interface (using SWIG) for the free CSN library under GNU/Linux. The project will also construct a parallel execution

IS ICT BIT MC

Page 29: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

harness to spawn a parallel application. It will compare the CSN interface to other equivalents: MPI, OpenMP, and PVM. This project will be developed under GNU/Linux. 53. GMPython Whiteboard toolThis project will investigate whether it is possible to produce a whiteboard tool using Python and GNU/Linux

IS BIT

54. PDE-Portfolio Development SystemThis project will require the student to develop a system that could be used to provide a means of students/staff/individuals to have an electronic portfolio that could be used in place of a standard cv.Requires good web development skills

55. PDDistance Learning Adaptive TemplateIn order for academic staff to develop appropriate distance learning material they must be able to develop content and navigation that supports the developer. This system will be web-based and provide content management and also provide an automated audit and reporting systemRequires good web development skills  

56. PDVideo and Audio Development tool for Digital StorytellingIn order to be able to develop Digital Stories the user must have a knowledge of various audio/video development tools. This project will expect the student to develop a system that will guide the Digital Storyteller throughout the

Page 30: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc

process of creating a digital story from beginning to end.Good development skills are expected.

Page 31: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc
Page 32: KEY TO AWARDS FOR EXCLUSION PURPOSES.doc