Search
Now showing items 111-120 of 122
Specifics of forced-convective heat transfer to supercritical CO2 flowing upward in vertical bare tubes
(2015-04-01)
Heat transfer in the forced convection regime of fluids at supercritical conditions has been studied extensively for the past 60 years. The dominant approach to summarize the experimental results was by proposing empirical ...
Effects of dietary fermentable material on innate and adaptive immune measures in male and female rats under resting and immunized conditions
(2015-02-01)
Sex-based differences in immune parameters are well recognized, and recent evidence suggests differences in microbiota composition between sexes, necessitating assessment of effects of dietary fermentable material (DFM) ...
On the potential of intent-based access control (IBAC) in preventing insider threats
(2015-11-01)
Existing access control mechanisms are based on the concepts of identity enrollment and recognition, and assume that recognized identity is synonymous with ethical actions. However, statistics over the years show that the ...
Towards measuring privacy
(2015-04-01)
The acceptable threshold for privacy is an individual choice, informed by culture, tradition and experience. That it is important, conversely, is self-evident. We use it to moderate personal information disclosure, how ...
CORE: a framework for the automatic repair of concurrency bugs
(2015-01-01)
Desktop computers now contain 2, 4 or even 8 processors. To benefit from them programs must be written to work in parallel. If writing good code is hard, writing good parallel code is much harder. Parallelization adds ...
Dynamic probabilistic network protection in large-scale failure scenarios
(2015-01-01)
Large-scale failure resulting from natural disasters or intentional attacks is now considered a serious risk for communication network infrastructure. In these events, simultaneous damages in several links and nodes may ...
A presence of obligation: cyberbehaviour, policy, and restorative practices
(2015-03-26)
Ontario Safe Schools’ policies have undergone major changes over the last 15 years. Zero tolerance policies and practices of the 1990’s have given way to more progressive approaches to school discipline that include ...
Measuring Web 2.0 interaction: a meta-synthesis of literature on using transactional distance and social presence
(2015)
In this study, the researcher created an instrument, based on a meta-synthesis of relevant literature, to measure the presence of the variables associated with Transactional Distance and Social Presence when used as a ...
Analysis of resistance nodulation division efflux pumps in Acinetobacter baumannii
(2015-01-01)
Strains from Canadian hospitals were classified as A. baumannii, A. pitti, or A. osocomialis and the most commonly expressed resistance nodulation division (RND) efflux pump was adeFGH. A collection of A. baumannii isolates ...
Vines of oppression: a review of the literature, educational criticism and narrative analysis of social media research in public education
(2015)
This arts-based educational inquiry paper is divided into three main sections; a review of the literature, an educational criticism discussing themes arising from the review of the literature, and a narrative analysis ...