Search
Now showing items 31-40 of 110
Empirically detecting colour: can we use solar cells as colour sensors?
(2021-08-01)
The purpose of this thesis was to explore the possibility of using solar cells as a colour sensor. Colour sensors already exist, yet they are either costly or fail at correctly sensing monochromatic light. Our experiment ...
Kill switch design pattern for microservice architectures on internet of things devices
(2020-12-01)
Containers and virtual machines are being adopted to develop embedded Linux Internet-of-Things applications. Consumer Internet-of-Things devices have been notoriously insecure due to loss of continued software support. To ...
Automatic fault localization in concurrent programs using noising and search strategies
(2020-05-01)
Multithreaded programs can have considerable performance benefits over sequential programs. However, these advantages often come at a cost with respect to program understandability as well as testing and debugging challenges. ...
SegmentPerturb: effective black-box hidden voice attack on commercial ASR systems via selective deletion
(2021-08-01)
Voice control systems continue becoming more pervasive as they are deployed in mobile phones, smart home devices, automobiles, etc. Commonly, voice control systems have high privileges on the device, such as making a call ...
Assessing the memorability of familiar vocabulary for system assigned passphrases
(2021-08-01)
Text-based secrets are still the most commonly used authentication mechanism in information systems. Initially introduced as more secure authentication keys that people could recall, passphrases are tokens consisting of ...
An in-depth analysis of guesser behavior
(2020-11-01)
We propose a methodology to perform an in-depth analysis on different password guessers and their guessing abilities. We devise new metrics and statistics that directly compare the types of passwords each guesser generates, ...
Extending the relational model with constraint satisfaction
(2021-01-01)
We propose a new approach to data driven constraint programming. By extending the relational model to handle constraints and variables as first class citizens, we are able to express first order logic SAT problems using ...
Polymorphic Adversarial DDoS attack on IDS using GAN
(2020-12-01)
IDS are essential components in preventing malicious traffic from penetrating networks. IDS have been rapidly enhancing their detection ability using ML algorithms. As a result, attackers look for new methods to evade the ...
Deep learning approach to discontinuity-preserving image registration
(2020-05-01)
Image registration is an indispensable tool in medical image analysis. Traditionally, registration algorithms are aimed at aligning image pairs using regularizers to impose smoothness restrictions on unknown deformation ...
Comparative analysis of deep learning and graph cut algorithms for cell image segmentation
(2020-08-01)
Image segmentation is a commonly used technique in digital image processing with many applications in the area of computer vision and medical image analysis. The goal of image segmentation is to partition an image into ...