Building a chatbot for student queries (available)

It is important that student queries are replied to quickly and accurately. Many of the requests for information are fully explained in resources such as the student handbook. These include questions such as where students request extensions on coursework or how shuold they inform College if they are absent from a lecture. Frequently these questions … full description “Building a chatbot for student queries (available)”

Building a Full Causality Chain Across an Enterprise System (completed)

Data Provenance refers to records of the inputs, entities, systems and process that influence data of interest, providing a historical record of the data and its origins. To provide a holistic view of the data provenance in an enterprise system, the provenance records of the activities carried out on a client workstation is important. Last … full description “Building a Full Causality Chain Across an Enterprise System (completed)”

Computer Vision for Extreme Environments (available)

The use of data from extreme environments in computer vision have shown an increase of interest in recent years as drones and autonomous vehicles were introduced into new uses. Nuclear plants, deep underwater and space vehicles are some of the areas computer vision can be applied to develop a fully autonomous system. Furthermore, the development … full description “Computer Vision for Extreme Environments (available)”

Digital Humans in a Virtual Reality Football Platform. (available)

Libero is a VR football platform; a ground-breaking experience in visitor focused, immersive content that allows fans to truly live the history of famous football clubs, whilst also giving them a glimpse of what the future holds. Using A.I., world-class animation and award-winning storytelling, we can engage fans, new and old, in a way that … full description “Digital Humans in a Virtual Reality Football Platform. (available)”

Federated Machine Learning – Security and Privacy Evaluation Framework (available)

Project Description User data is essential for many of the modern business operations, especially related to the building consumer segmentation and profiling – for marketing and services personalisation. Dealing with user data has its positive and negatives, especially after the General Data Protection Regulation (GDPR) collecting and storing user’s personal data. Centralised machine learning approaches … full description “Federated Machine Learning – Security and Privacy Evaluation Framework (available)”

Interactive Visualisation of Disentangled Representations (available)

This project aims to develop an interactive visualisation toolkit based on existing technologies (IPython & Plotly) that will assist researchers in debugging and understanding complex models in the area of representation learning. Representation learning is a sub-field of machine learning that focuses on developing techniques for representing objects that exist in high-dimensional space (e.g. faces … full description “Interactive Visualisation of Disentangled Representations (available)”

Machine Learning for Crystal Structure Prediction (available)

Crystal Structure Prediction (CSP) is one of the major problems in computational chemistry with numerous applications in real life. This is essentially the (global) minimisation of a continuous, high-dimensional, complicated function. Many heuristic methods have been proposed for CSP and recently new methods based on Machine Learning were introduced. The goal of this project is … full description “Machine Learning for Crystal Structure Prediction (available)”

Machine Learning vs Machine Learning in Malware Evasion (available)

Machine learning is a popular approach to signature-less malware detection because it can generalize to new (unseen) malware families. Some recent works have proposed the use of AI/ML-powered malware to bypass machine learning anti-malware systems. The goal of the project is to model the system of malware vs anti-malware systems as two opponents using various … full description “Machine Learning vs Machine Learning in Malware Evasion (available)”

Mitigating Anti-Sandboxing Tricks used by Malware (available)

Aims: Detecting and Mitigating some Evasion Techniques used by Malware Background: Several malware samples exploit advanced tactics to detect whether they are run in a sandboxed/virtual analysis environment. In such cases, malware samples do not perform any malicious actions to evade analysis and detection by security researchers. The goal of the project is to analyse … full description “Mitigating Anti-Sandboxing Tricks used by Malware (available)”

Mixed Nash Equilibria in Net Coordination Games (available)

Net Coordination Games form a special class of many-player games with several applications in Theoretical Computer Sciene, Multi Agent Systems, and Semi Supervised Learning.  Nash equilibria correspond to the stable outcomes and they are the prominent solution concept in games. It is known that Net Coordination Games possess a pure Nash equilibrium, but unfortunately, it … full description “Mixed Nash Equilibria in Net Coordination Games (available)”

Python and Unreal Engine 4 integration (available)

This challenging project aims to integrate a Python-based agent framework that has been developed at RHUL with Unreal Engine 4 (UE4). With recent successes in reinforcement learning and other online learning approaches there has been much work on developing environments to test new and state of the art algorithms. UE4 provides the perfect development environment … full description “Python and Unreal Engine 4 integration (available)”

Stable Marriage of Students (available)

Constraint Satisfaction and the final year projects system Prof Cohen is a world leading researcher in the theory and practice of constraints and has written some tools for the department that need to be improved. At Royal Holloway, we allocate students to projects and staff as supervisors of those projects using a semi-automated process, using … full description “Stable Marriage of Students (available)”