Search
Now showing items 201-210 of 263
Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt
(2013-03-01)
The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ...
Faulty node repair and dynamically spawned black hole search in clouds
(2015-03-01)
The reality of the constant emergence of new threats justifies the necessity to protect
network assets and mitigate the risks associated with attacks. In this context, eliminating faulty network entities in the distributed ...
Characterization of a secreted escherichia coli 086a:K61 protease that inactivates human coagulation FV
(2011-08-01)
Background: Escherichia coli (E.coli) O86a:K61 belongs to the Enteropathogenic E. coli (EPEC) group of pathogens. Acute gastroenteritis affects 2-4 billion people annually and EPEC is associated with 10-40% of hospitalized ...
Mathematical modelling of the plunger pump operation with numerical methods for simulating the flow across the valve
(2011-12-01)
Plunger pumps are needed for heavy duty sludge pumping at wastewater treatment
facilities. America's leading pump manufacturer Wastecorp Inc. brought
their plunger pump problem to us in late 2009. It was found that when ...
Numerical methods for simulating diffusion in cellular media
(2011-12-01)
Diffusion imaging is a relatively recent branch of magnetic resonance imaging that
produces images of human physiology through diffusion of water molecules within the
body. One difficulty in calculating diffusion ...
Detection of gasoline from internal tissues for use in determining victim status at the time of a fire
(2012-08-01)
In Ontario, fire investigators from the Office of the Fire Marshal (OFM) are responsible for determining the origin and cause of suspicious fires. As part of the investigation, fire debris samples are collected from the ...
Convection in a differentially heated rotating spherical shell of Boussinesq fluid with radiative forcing
(2012-12-01)
In this study we investigate the
flow of a Boussinesq
fluid contained in a rotating, differentially heated spherical shell. Previous work, on the spherical shell of Boussinesq fluid, differentially heated the shell by ...
Spatial sound and sound localization on a horizontal surface for use with interactive surface (tabletop) computers
(2012-08-01)
Tabletop computers (also known as surface computers, smart tables, and
interactive surface computers) have been growing in popularity for the last decade
and are poised to make in-roads into the consumer market, opening ...
Reliable peer-to peer multicast streaming
(2013-01-01)
P2P is increasingly gaining its popularity for streaming multimedia contents. The architecture of streaming has shifted from traditional client server architecture to P2P architecture. Although it is scalable and robust ...
Computational and laboratory investigations of a model of blood droplet flight for forensic applications
(2012-09-01)
We present a three-dimensional, forward model of blood droplets in
ight. The proposed
model is based on a set of ordinary di erential equations (ODEs) incorporating viscous
drag and gravitational forces. We validate the ...