Skip to main content

Honours and Masters project

Displaying 91 - 100 of 256 honours projects.


Continual Few-shot reinforcement learning

This project takes a different approach to RL, inspired by evidence that Hippocampus replays to the frontal cortex directly. It is likely used for model building, as opposed to the mainstream view in cognitive science and ML - where 'experience replay' ultimately improves policy. The predicted benefits are sample efficiency, better ability to generalize to new tasks and an ability to learn new tasks without forgetting old ones. The project objective is to improve biological models and advance state-of-the-art in continual reinforcement learning.

 

Automated Video-based Epilepsy Seizure Classification and Sudden Unexpected Death in Epilepsy (SUDEP) Detection

Develop, implement, and test deep learning techniques for automatic classification of epileptic seizures using video data of seizures

Ambulance Clinical Record Information Complexity

Turning Point’s National Ambulance Surveillance System is a surveillance database comprising enriched ambulance clinical data relating to alcohol and other substance use, suicidal and self-injurious thoughts and behaviours, and mental health-related harms in the Australian population. These data are used to inform policy and intervention design and are the subject of ever-increasing demand from academic professionals and units, government departments, and non-government organisations.

 

Learning from massive amounts of EEG data

The existing deep learning-based time series classification (TSC) algorithms have some success in multivariate time series, their accuracy is not high when we apply them to brain EEG time series (65-70%). This is because there is a large variation between EEG data of different subjects, so a TSC model cannot generalise on unseen subjects well. In this research project, we investigate self-supervised contrastive learning to encode the EEG data. This way we can better model the distribution of our EEG data before classifying it into different mental statuses. See recent work here [1].

A Neuro-Symbolic Agent for Playing Minecraft

In this project, you will build an autonomous agent in the MineRL environment for playing Minecraft or an agent for Animal-AI.  Herein, you will learn how to incorporate symbolic prior knowledge for improving the performance of an agent trained by using deep reinforcement learning (RL) technique, which is the core technique to build AlphaGo. An RL-based agent learns a stochastic policy to decide which action to take in the next step. Correct choices of actions will be rewarded by the gaming environment.

Building consistent world states for an autonomous agent

Building a robust and trustworthy (semi-)autonomous agent requires us to build a consistent picture of the state of the world based on the data received from some perception module.

Efficient exploration of consistent worlds

Given a knowledge base describing the existing background constraints and assumptions about what is possible in the world as well as the prior experience of an autonomous agent on the one hand and probabilistic perception of the current state of the world of the autonomous agent, on the other hand, it is essential to devise and efficiently enumerate the most consistent world models that are likely to be valid under the prior knowledge in order to refine the agent’s up-to-date perception and take the most suitable actions.

Mini-LCG

Mini-CP https://www.info.ucl.ac.be/~pschaus/minicp.html is a minimal form of constraint programming solver, designed to allow for easy experimentation and learning. 

One of the most efficient approaches to discrete optimisation solving is using lazy clause generation, which is a hybrid SAT/CP approach to solving problems.  But MiniCP does not currently support this. 

Secure & Efficient Implementation of Quantum-Safe Cryptography

Since the 1990s, researchers have known that commonly-used public-key cryptosystems (such as RSA and Diffie-Hellman systems) could be potentially broken using efficient algorithms running on a special type of computer based on the principles of quantum mechanics, known as a quantum computer. Due to significant recent advances in quantum computing technology, this threat may become a practical reality in the coming years. To mitigate against this threat, new `quantum-safe’ (a.k.a.

Identifying the encryption algorithm

IT Forensics is the art of extracting digital pieces of evidence also known as (aka) artifacts in a forensically sound manner, that is presentable to a court of law. In doing this it covers a range of conceptual levels, from high-level operating systems and computer theory down to computer networking.   

The specific objective(s) of this project is to look at an encrypted piece of data and distinguish what encryption algorithm is used/employed. This would benefit IT Forensics researchers/investigators attacking encrypted volumes, files, folders, etc.