Search
Now showing items 141-150 of 393
Kill switch design pattern for microservice architectures on internet of things devices
(2020-12-01)
Containers and virtual machines are being adopted to develop embedded Linux Internet-of-Things applications. Consumer Internet-of-Things devices have been notoriously insecure due to loss of continued software support. To ...
Extending the relational model with constraint satisfaction
(2021-01-01)
We propose a new approach to data driven constraint programming. By extending the relational model to handle constraints and variables as first class citizens, we are able to express first order logic SAT problems using ...
Deep learning approach to discontinuity-preserving image registration
(2020-05-01)
Image registration is an indispensable tool in medical image analysis. Traditionally, registration algorithms are aimed at aligning image pairs using regularizers to impose smoothness restrictions on unknown deformation ...
Automatic fault localization in concurrent programs using noising and search strategies
(2020-05-01)
Multithreaded programs can have considerable performance benefits over sequential programs. However, these advantages often come at a cost with respect to program understandability as well as testing and debugging challenges. ...
Development and comparison of augmented and virtual reality interactions for direct ophthalmoscopy
(2020-10-01)
Direct ophthalmoscopy is a medical procedure whereby a health professional examines the back of the eye, searching for life-threatening risks. The direct ophthalmoscope is used for examining the patient and it requires ...
Empirically detecting colour: can we use solar cells as colour sensors?
(2021-08-01)
The purpose of this thesis was to explore the possibility of using solar cells as a colour sensor. Colour sensors already exist, yet they are either costly or fail at correctly sensing monochromatic light. Our experiment ...
Simulating a virtual drilling task using audio, visual, and mouse movement cues during the COVID-19 pandemic
(2021-04-01)
This work examined whether a real-world drilling task can be successfully simulated using combinations of appropriate audio, visual cues, and basic haptic stimuli obtained with mouse movements instead of a haptic device. ...
SegmentPerturb: effective black-box hidden voice attack on commercial ASR systems via selective deletion
(2021-08-01)
Voice control systems continue becoming more pervasive as they are deployed in mobile phones, smart home devices, automobiles, etc. Commonly, voice control systems have high privileges on the device, such as making a call ...
Automatic fall risk detection based on imbalanced data
(2021-08-01)
In recent years, the declining birthrate and ageing population have gradually brought countries into an ageing society. In regards to the accidents that occur amongst the elderly, falls are an important problem that quickly ...
Assessing the memorability of familiar vocabulary for system assigned passphrases
(2021-08-01)
Text-based secrets are still the most commonly used authentication mechanism in information systems. Initially introduced as more secure authentication keys that people could recall, passphrases are tokens consisting of ...