Internet of the future
  • Mentors: Andrej Kos, PhD; Matevž Pustišek, PhD; Urban Sedlar, PhD
  • Research Area: Internet of the future
  • Description: New generation of the internet was thought to be something like interplanetary internet, composed of sets of decentralized network nodes that are able to communicate with each other. Because of the delays that come to the fore in this area it is necessary to make a new selection of protocols and technologies. Nowadays, there is more and more applications that need decentralized infrastructure and tolerance for the delays. This is one of the reasons why the new generation of the internet is needed. You have to study new generations of the internet and establish prototype decentralized network that will be able to work despite delays (e.g. without DNS).
Block chain identity
  • Mentor: Matevž Pustišek, PhD; Urban Sedlar, PhD; Andrej Kos, PhD
  • Research Area: Block-chain
  • Description: You have to analyse the research area of block-chain and identity management. With the use of block-chain technology you will establish prototype solution for identity management.
Cyber security
  • Mentor: Matevž Pustišek PhD; Janez Sterle, MSc; Andrej Kos, PhD
  • Research field: Cyber security
  • Description: You have to study the area of cyber security. Make a list of mechanisms for ensure cyber security in the area of »medicine«/ »energetics«/ »state authorities«. You should consider the example of agency for national security (ENISA).
Block chain slot machine
  • Mentor: Urban Sedlar, PhD; Andrej Kos, PhD; Matevž Pustišek, PhD
  • Research area: Block-chain
  • Description: You should analyse block-chain and o-line gaming area. Establish piloting solution for »slot machine« that will be based on block-chin mechanisms.
IoT platform analysis
  • Mentor: Andrej Kos, PhD; Matevž Pustišek, PhD; Urban Sedlar, PhD
  • Research Area: Internet of Things
  • Description: You should research IoT platform. Special attention should be put to the support block-chain technology. Compare different IoT supports from the perspectives of different IoT platforms.
Forensics and new networks control
  • Mentor: Andrej Kos, PhD
  • Research Area: Cyber Security
  • Description: You should specify the importance of cyber security, network monitoring and cyber-attacks protection. Special attention should be paid to SDN. Possible tactics: intrusion detection, denial of service, detection of IoT attacks in IoT/M2M
Production of radio-wave measuring device with a graphic display of measurements with the use of USB DVB-T key and GNU RADIA
  • Mentor: Matevž Pogačnik, PhD; Janez Bešter, PhD
  • Research Area: Multimedia, radio and radio waves
Production of DAB+ analyser with the use of computer and USB key
  • Mentor: Matevž Pogačnik, PhD; Janez Bešter, PhD
  • Research Area: Multimedia, radio in radio waves
Virtulalization of the access network – CORD
  • Mentor: Andrej Kos, PhD
  • Description: Overview of the open CORD architecture (Central Office Re-architected as a Datacenter) from the point of view of the development of technologies, standards and possible variants R-CORD, M-CORD. Overview of CORD open source building blocks, overview of actors and comparison between them. Proof of concept set-up of CORD environment (minimum viable) and simple network test. Because of the limited amount of resources, it is possible to emulate certain elements – virtual POD (if the time and equipment availabe, maybe you can use half POD). Presentation of results and transfer of experience.
    More at https://guide.opencord.org/.
LoRaWAN local network
  • Mentor: Andrej Kos, Matevž Pustišek
  • Description: Examine the architecture and set-up a local LoRaWAN network (https://github.com/TheThingsNetwork/ttn). Establishing the operation with the LoRA gateway and the selected node. Performance measurement.
Terminal equipment security mechanisms
  • Mentor: Urban Sedlar, PhD.
  • Description: Overview of security mechanisms of modern terminal equipment (mobile phones, tablets) and mobile OS in the context of applications that work with security sensitive data
Overview of security and rescue practices
  • Mentor: Urban Sedlar, PhD.
  • Description: Researching modern business models for mobile and web applications for security and rescue (examples: iHelp, emergency call, AED device directory, messaging pager messages to mobile devices, etc.)
Cloud and fog computing for protection and rescue
  • Mentor: Urban Sedlar, PhD.
  • Description: Use cloud and fog architecture to ensure high availability of applications in the field of security and rescue
Analysis and visualization for protection and rescue
  • Mentor: Urban Sedlar, PhD.
  • Description: Procedures and scenarios for the analysis and visualization of large amounts of data in security and rescue services
Blockchain-defined networking
  • Mentor: Urban Sedlar, PhD.
  • Description: Blockchain-defined networking – provision of network access, AAA, block-based SDN and VNF configurations
Artificial intelligence and network security
  • Mentor: Urban Sedlar, PhD.
  • Description: Using artificial intelligence and machine learning to provide network security (eg, prevent DDoS by ML)
Machine Learning and Network Monitoring
  • Mentor: Urban Sedlar, PhD.
  • Description: Using machine learning to control and manage networks (traffic type detection, adaptive QoS, auto-VLAN segmentation, anomaly alarms, etc.)
Tools for ethical hacking in the Python programming language
  • Mentor: doc. dr. Urban Sedlar ali prof. Andrej Kos
  • Scope: Cyber Security
  • Description: Explore the aspects of ethical hacking and cyber security in general. In the Python programming language, create tools that perform penetration tests and display vulnerabilities of systems, networks, protocols, and devices.
Kali’s operating system – the ultimate tool for ethical hacking
  • Mentor: doc. dr. Urban Sedlar ali prof. Andrej Kos
  • Scope: Cyber Security
  • Description: Use the Kali operating system into the cyber security domain and compare it with other similar tools. Use built-in Kali Tools for ethical healing of your home network and end devices, and make recommendations on how to protect your own devices and network in a global cyber space.
Layer 8 – a user: the greatest vulnerability of cyberspace
  • Mentor: doc. dr. Urban Sedlar ali prof. Andrej Kos
  • Scope: Cyber Security
  • Description: Explore the psychological aspects of hacking and human vulnerability in a cyber space through past attacks of this type. Set the concept of social engineering as a threat to all stakeholders of the cyber space and its consequences. Prepare the questionnaires and test a cyber-attack with the help of social engineering on a test group of users of different ages, education and interest structures. Analyze results and make recommendations.
Interactive paper – Enriched reality application
  • Mentor: dr. Jože Guna, dr. Matevž Pogačnik
  • Scope: Interactive paper – augmented reality
  • Description: Overview of Enhanced Reality Fields, Devices, Solutions, and Interfaces. Designing an Enhanced reality application using a mobile phone / tablet in combination with printed materials. Creating a prototype using existing software libraries, such as Vuforia. Suggest and implement a simple experiment to measure user experience and conduct a user study (experiment with users).
Interactive sandbox “as a tangible user interface
  • Mentor: dr. Jože Guna, dr. Matevž Pogačnik
  • Area: Interactive sandbox “as a tangible user interface example
  • Description: Overview of the scope, devices, solutions and interfaces for tangible interfaces. The physical execution of the sandbox and related software have already been made and available in the LMMFE laboratory. The work would include the analysis and implementation of an interactive application on an “interactive sandbox” example. An example is, for example, simulation of the electric / magnetic field using physical elements (eg balls as electrons) and visualization using real-time projection. Different modes of interaction with the application are also an important part.
Create glasses for tracking the view (VŠŠ, UNI, MM)
  • Mentor: dr. Jože Guna, dr. Matevž Pogačnik
  • Scope: Interactive Multimedia Systems
  • Description: Create and test a simple and affordable system for tracking users’ views using a USB camera. It is envisaged to use accessible components for home use. The principle of action is based on the recognition of eye pupil motion through an IR camera, and the processing of images on a personal computer. The system is built in the form of glasses, allowing both the control and the function of monitoring the user’s view in the room.
User experience in virtual reality systems (VŠŠ, UNI, MM)
  • Mentor: dr. Jože Guna, dr. Matevž Pogačnik
  • Scope: Virtual reality systems
  • Description: Overview of virtual reality devices, solutions and interfaces. Survey of methods of measuring user experience (eg questionnaires, user response observation, measurement of bio-physiological response) and immersion in virtual reality environments. Proposal and implementation of a simple experiment to measure the user experience in the case of Oculus Rift and the implementation of a user study (experiment with users).
Interaction in virtual reality systems (VŠŠ, UNI, MM)
  • Mentor: dr. Jože Guna, dr. Matevž Pogačnik
  • Scope: Virtual reality systems
  • Description: Overview of virtual reality devices, solutions and interfaces. Exploring the ways of interaction (management, eg gestures, voice, brain management) in virtual reality environments using accessible and advanced interfaces (eg LeapMotion, Myo, Oculus touch, Kinect 2, OCZ NIA, Emotiv Epoc, etc.). Proposal and implementation of a simple experiment to measure the user experience of various management modes in the case of the Oculus Rift system and the implementation of a user study (experiment with users).
Interaction in Augmented Reality Systems (VSŠ, UNI, MM)
  • Mentor: dr. Jože Guna, dr. Matevž Pogačnik
  • Scope: Augmented reality
  • Description: Overview of the field of devices, solutions and interfaces for augmented reality. Exploring ways of interaction (management, eg gestures, voice, brain management) in enriching reality environments using accessible and advanced interfaces (eg LeapMotion, Myo, Oculus touch, Kinect 2, OCZ NIA, Emotiv Epoc, etc.). Proposal and implementation of a simple experiment to measure the user experience of various management modes in the case of Google Cardboard / Google Daydream / Samsung Gear and the implementation of a user study (experiment with users).
Interaction in mixed reality systems and tangible interfaces (VŠŠ, UNI, MM)
  • Mentor: dr. Jože Guna, dr. Matevž Pogačnik
  • Scope: mixed reality systems and tangible user interaface
  • Description: Overview of the field of devices, solutions and interfaces for mixed reality. Examination of ways of interaction (management, eg gestures, voice, brain management) in mixed reality environments using accessible and advanced interfaces (eg LeapMotion, Myo, Oculus touch, Kinect 2, OCZ NIA, Emotiv Epoc, etc.). Study of Interaction Interaction Methods in the Case of Tangible Interfaces. Proposal and implementation of a simple experiment to measure the user experience of various management modes in the case of Google Cardboard / Google Daydream / Samsung Gear and the implementation of a user study (experiment with users).
Solutions to ensure the availability of content for blind or deaf users
  • Mentor: dr. Jože Guna, dr. Matevž Pogačnik
  • Area: Interactive applications upgraded with accessibility technologies solutions
  • Description: Overview of the field of devices, solutions and technologies for ensuring accessibility with a focus on the solution for blind (visually impaired) and deaf (hard of hearing) users on various devices (mobile devices, TV receivers). Proposal and implementation of solutions for ensuring the availability of multimedia content on TV sets for blind users (eg synchronization and playback of additional audio content). Proposal and implementation of solutions for ensuring the availability of multimedia content on TV sets for deaf users (eg reading subtitles, playing additional video content with the sign language on different devices).
IoT penetration tests
  • Mentor: dr. Andrej Kos, dr. Matevž Pustišek
  • Level: VSS or UNI
  • Description: Analyze and test methods and tools for penetration tests for IoT platforms and/or devices (example: OWASP testing project).
Location in 5G
  • Mentor: dr. Andrej Kos, dr. Andrej Štern
  • Research area: 5G, Location
  • Description: Explore your location using mobile systems. Prepare an overview of the capabilities of different systems. Pay special attention to 5G. Pay particular attention to areas where there is no GNSS capability (inside buildings, between buildings).
Use of 5G technology within military
  • Mentor: dr. Andrej Kos
  • Research area: 5G
  • Description: 5G offers many new possibilities to adapt to specific needs in the B2B market as well. Using virtualization technology (NFV), software-defined networks (SDNs), virtual private networks (VPNs), E2E services, orchestration, and shifting computing power to the edge of the network (MEC), 5G technology is also envisaged in military networks. Examine ways to use 5G in military systems and analyze / establish some services, such as PTT over 5G, HD video over 5G, 5G without fixed infrastructure.