Browsing Faculty of Science by Title
Now showing items 228-247 of 423
-
Kill switch design pattern for microservice architectures on internet of things devices
(2020-12-01)Containers and virtual machines are being adopted to develop embedded Linux Internet-of-Things applications. Consumer Internet-of-Things devices have been notoriously insecure due to loss of continued software support. To ... -
Leveraging vehicular cloud computing through location and request prediction
(2023-04-01)In recent years, the implementation of Vehicular Ad-hoc networks (VANET) has been acknowledged as a promising solution for monitoring road conditions. Despite the many benefits they can bring to society, the growing demand ... -
Lexichrome: Text Construction and Lexical Discovery with Word-Color Associations Using Interactive Visualization
(ACM, 2020-07-03)Based on word-color associations from a comprehensive, crowdsourced lexicon, we present Lexichrome: a web application that explores the popular perception of relationships between English words and eleven basic color terms ... -
A location privacy model and framework for mobile toy computing
(2015-08-01)Many toys on the market are becoming integrated with the sensory and networking capabilities of mobile technology. Toy computing is an emerging area of research with the characteristics of physical computing, services ... -
A low-fidelity serious game authoring tool and educational network to facilitate medical-based cultural competence education
(2015-12-01)Here I present Fydlyty, a web-based, low-fidelity serious game for medical-based cultural competence education and training. Fydlyty includes a scenario editor and dialogue editor which has the ability to build conversations, ... -
Magic Pen: automatic pen-mode switching for document annotation
(2022-08-01)Traditional digital pen interfaces use menu buttons to change pen modes, resulting in time and cognitive load spent on round-trips and potential errors from tapping small mode selection buttons. This thesis presents Magic ... -
Managing developer interruption
(2018-12-01)The high frequency of interruptions during cognitively-intense activities can be annoying and detrimental to deadline-driven work, such as software development. When developers are interrupted they not only lose productivity ... -
Mass transport in the cathode electrode of a molten carbonate fuel cell
(2009-04-01)A molten carbonate fuel cell (MCFC) is an electro-chemical energy conversion technology that runs on natural gas and employs a molten salt electrolyte. In order to keep the electrolyte in this state, the cell must be kept ... -
Material properties and mechanical behaviour of large-scale additively manufactured multi-layered steels
(2020-03-01)Metal Big Area Additive Manufacturing is an additive manufacturing technique based on gas metal arc welding. The systems’ dual nozzle design prints two steels simultaneously; in this study, the test samples are made from ... -
Mathematical methods for 2D-3D cardiac image registration
(2016-12-01)We propose a mathematical formulation aimed at intensity-based slice-to-volume registration, aligning a cross-sectional slice of a 3D volume to a 2D image. The approach is flexible and can accommodate various regularization ... -
Mathematical modelling of the plunger pump operation with numerical methods for simulating the flow across the valve
(2011-12-01)Plunger pumps are needed for heavy duty sludge pumping at wastewater treatment facilities. America's leading pump manufacturer Wastecorp Inc. brought their plunger pump problem to us in late 2009. It was found that when ... -
A matrix-free numerical bifurcation method applied to sheared annular electroconvection
(2015-08-01)We investigate the flow transitions in sheared annular electroconvection using matrix-free numerical bifurcation methods. In particular, we study a model that simulates a liquid crystal film in the Smectic A phase suspended ... -
MAVIDS: an intelligent intrusion detection system for autonomous unmanned aerial vehicles
(2021-07-01)Unmanned Aerial Vehicles (UAVs) face a large threat landscape, being used in numerous industries in hostile environments while relying on wireless communication. As attacks against UAVs increase, an intelligent Intrusion ... -
Mechanisms by which exercise promotes cognitive function in both depressed and non-depressed individuals
(2017-12-01)Major depressive disorder (MDD) is a debilitating disease characterized by low mood, memory deficits, poor sleep quality and alterations in biochemical markers associated with neuroplasticity. Less than half of MDD patients ... -
Metabifurcation analysis of a phenomenological ventricular cell model
(2018-08-01)Heart disease is the leading cause of death in America, and arrhythmia is considered one of the most important precursors of heart attacks. We cannot predict arrhythmia directly; however, it has been shown that cardiac ... -
Metabolic, neurotoxic and immunotoxic effects of PFAAs and their mixtures on the proteome of plasma and head kidney from rainbow trout
(2023-03-01)PFAAs (Perfluoroalkyl acids) are a class of bioaccumulative, persistent and ubiquitous aquatic contaminants. A paucity of toxicological information exists for short chain PFAAs and PFAA mixtures. In order to address these ... -
Metal-free methodology for the preparation of ynones using potassium alkynyltrifluoroborates and its application to the synthesis of natural products
(2015-03-01)A straightforward procedure for the preparation of ynones from potassium alkynyltrifluoroborate salts and acyl chlorides or anhydrides has been developed. The one-pot reaction is advantageous in that it does not require ... -
A method to detect and represent temporal patterns from time series data and its application for analysis of physiological data streams
(2020-03-01)In critical care, complex systems and sensors continuously monitor patients’ physiological features such as heart rate, respiratory rate thus generating significant amounts of data every second. This results to more than ... -
A mixed-method approach to analyze the robustness of natural language processing classifiers
(2021-04-01)Natural language processing algorithms (NLP) have become an essential approach for processing large amounts of textual information with applications such as spam, phishing and content moderation. Malicious actors can craft ... -
Mobility modeling and topology prediction in cognitive mobile networks
(2012-07-01)The purpose of this thesis is to analyze a non-intrusive connectivity visualization method for OLSR-based MANET topology in different mobility models. The visualization relies on the local topology databases (neighborhood ...