Search
Now showing items 31-40 of 110
Kill switch design pattern for microservice architectures on internet of things devices
(2020-12-01)
Containers and virtual machines are being adopted to develop embedded Linux Internet-of-Things applications. Consumer Internet-of-Things devices have been notoriously insecure due to loss of continued software support. To ...
SegmentPerturb: effective black-box hidden voice attack on commercial ASR systems via selective deletion
(2021-08-01)
Voice control systems continue becoming more pervasive as they are deployed in mobile phones, smart home devices, automobiles, etc. Commonly, voice control systems have high privileges on the device, such as making a call ...
Automatic fall risk detection based on imbalanced data
(2021-08-01)
In recent years, the declining birthrate and ageing population have gradually brought countries into an ageing society. In regards to the accidents that occur amongst the elderly, falls are an important problem that quickly ...
Assessing the memorability of familiar vocabulary for system assigned passphrases
(2021-08-01)
Text-based secrets are still the most commonly used authentication mechanism in information systems. Initially introduced as more secure authentication keys that people could recall, passphrases are tokens consisting of ...
Effect of copper contamination at the cathode in Cu-Cl electrolyzers for hydrogen production
(2020-04-01)
In this work the effects of copper contamination on the coulombic and voltage efficiency of the hydrogen evolution reaction (HER) via the Cu-Cl thermochemical cycle are investigated. A novel proton pump configuration was ...
An in-depth analysis of guesser behavior
(2020-11-01)
We propose a methodology to perform an in-depth analysis on different password guessers and their guessing abilities. We devise new metrics and statistics that directly compare the types of passwords each guesser generates, ...
Extending the relational model with constraint satisfaction
(2021-01-01)
We propose a new approach to data driven constraint programming. By extending the relational model to handle constraints and variables as first class citizens, we are able to express first order logic SAT problems using ...
Deep learning approach to discontinuity-preserving image registration
(2020-05-01)
Image registration is an indispensable tool in medical image analysis. Traditionally, registration algorithms are aimed at aligning image pairs using regularizers to impose smoothness restrictions on unknown deformation ...
Comparative analysis of deep learning and graph cut algorithms for cell image segmentation
(2020-08-01)
Image segmentation is a commonly used technique in digital image processing with many applications in the area of computer vision and medical image analysis. The goal of image segmentation is to partition an image into ...
Automatic fault localization in concurrent programs using noising and search strategies
(2020-05-01)
Multithreaded programs can have considerable performance benefits over sequential programs. However, these advantages often come at a cost with respect to program understandability as well as testing and debugging challenges. ...