Search
Now showing items 31-40 of 110
An in-depth analysis of guesser behavior
(2020-11-01)
We propose a methodology to perform an in-depth analysis on different password guessers and their guessing abilities. We devise new metrics and statistics that directly compare the types of passwords each guesser generates, ...
Comparative analysis of deep learning and graph cut algorithms for cell image segmentation
(2020-08-01)
Image segmentation is a commonly used technique in digital image processing with many applications in the area of computer vision and medical image analysis. The goal of image segmentation is to partition an image into ...
Group representation learning for group recommendation
(2021-01-01)
Group recommender systems facilitate group decision making for a set of individuals (e.g., a group of friends, a team, a corporation, etc.). Existing group recommendation methods mostly learn group members' individual ...
Development and comparison of augmented and virtual reality interactions for direct ophthalmoscopy
(2020-10-01)
Direct ophthalmoscopy is a medical procedure whereby a health professional examines the back of the eye, searching for life-threatening risks. The direct ophthalmoscope is used for examining the patient and it requires ...
Empirically detecting colour: can we use solar cells as colour sensors?
(2021-08-01)
The purpose of this thesis was to explore the possibility of using solar cells as a colour sensor. Colour sensors already exist, yet they are either costly or fail at correctly sensing monochromatic light. Our experiment ...
Simulating a virtual drilling task using audio, visual, and mouse movement cues during the COVID-19 pandemic
(2021-04-01)
This work examined whether a real-world drilling task can be successfully simulated using combinations of appropriate audio, visual cues, and basic haptic stimuli obtained with mouse movements instead of a haptic device. ...
SegmentPerturb: effective black-box hidden voice attack on commercial ASR systems via selective deletion
(2021-08-01)
Voice control systems continue becoming more pervasive as they are deployed in mobile phones, smart home devices, automobiles, etc. Commonly, voice control systems have high privileges on the device, such as making a call ...
Automatic fall risk detection based on imbalanced data
(2021-08-01)
In recent years, the declining birthrate and ageing population have gradually brought countries into an ageing society. In regards to the accidents that occur amongst the elderly, falls are an important problem that quickly ...
Assessing the memorability of familiar vocabulary for system assigned passphrases
(2021-08-01)
Text-based secrets are still the most commonly used authentication mechanism in information systems. Initially introduced as more secure authentication keys that people could recall, passphrases are tokens consisting of ...
Effect of copper contamination at the cathode in Cu-Cl electrolyzers for hydrogen production
(2020-04-01)
In this work the effects of copper contamination on the coulombic and voltage efficiency of the hydrogen evolution reaction (HER) via the Cu-Cl thermochemical cycle are investigated. A novel proton pump configuration was ...