User Tools

Site Tools


public:sc-t-701-rem4-18-1:rem4-18-approvedtitles

This is an old revision of the document!


<-BACK to REM4-18 MAIN


Approved Tentative Titles & Descriptions




Improving usability of medical imaging viewer for virtual reality

Tomáš Michalík

I have found an interesting paper http://ieeexplore.ieee.org/abstract/document/7892382/ (Links to an external site.)Links to an external site. on which I would like to build a topic for this writing.

In the paper mentioned above, there is described a method / a type of visualization of a volumetric data (in this case MRI). It displays a part of the data in a decomposed form (single voxels are displayed with gaps in between). Because of its computational expensive rendering there must be displayed only a data subset.

A possible improvement is based on using Leap Motion, hands tracking technology, instead of HTC Vive 3D controllers. My hypothesis is that using hand itself, without any controller in it, will enable user to interact with the environment with higher precision.

Why this may have a significant impact: increasing precision allows us to display the data smaller (with higher precision user still will be able to do the same task – e.g. selecting particular voxels) → the smaller the data on the screen the higher frame rate is possible (the most computationally expensive part is only rendering volumetric data not the scene around). This could be used for increasing frame rate or to display larger subset of the data with the same frame rate.








Comparing the Burrow-Wheeler Aligner (BWA) and the Bowtie 2 software for short read alingment

Antton Lamarca

Both the 'Burrow-Wheeler Alinger (BWA)' and 'Bowtie 2' are used to perform mapping of short DNA sequence reads against a known genome. However, the computational strategies used by each of them are different. As a result, their performances vary. For example, 'Bowtie 2' seems to be considerably faster.

There are other candidares as well, the comparison could involve other programs. The good thing about these software packeges is that as they use pretty much the same input data, the comparison of the outcome is quite intuitive.








Intrusions in the cloud - A comparison of three approaches

Guðný Lára Guðmundsdóttir

I have researched some more and found that there have been some Intrustion detection systems suggested and/or implement in papers. Would it make sense to choose two of those, explain and compare so the hypotheses could be that one does some thing better?

This “doing better” could be experimented by doing various intrusions and checking to see whether the system detected the intrusion or not, simply compare how many intrusions were detected per system.








/var/www/cadia.ru.is/wiki/data/attic/public/sc-t-701-rem4-18-1/rem4-18-approvedtitles.1516895295.txt.gz · Last modified: 2024/04/29 13:32 (external edit)

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki