Search
Now showing items 1551-1557 of 1557
Development and user experience assessment of a VR resource for lactation latching
(2023-12-01)
Breastfeeding is essential for infants and mothers. However, low breastfeeding rates have become a major health problem despite the use of electronic health resources used in videos, websites, and online video calls that ...
Predicting multi-person dynamics
(2023-12-01)
Humans unconsciously model the dynamics of the world around them; for example, we predict the movement of surrounding traffic and pedestrians while driving, or forecast player positions in a game of soccer. Our work builds ...
Understanding the usage of mental health apps among post-secondary students
(2023-12-01)
University is a period where adolescents are exposed to novel stressors such as extensive academic overwork, familial pressure, financial concerns, and substantial studying, which can lead to psychological disorders such ...
Read, skim, scan: gaze -aware documents as implicit feedback for multimodal typographical cuing
(2023-12-01)
Computer-based methods for displaying and formatting texts for speed reading, including the popular Rapid Serial Visual Presentation method, are increasingly popular in both research and commercial applications. However, ...
“Can we keep blogging?”: Analyzing blogging in a grade six classroom as a trauma-informed practice for students and educators
(2024-02-01)
Trauma-informed practice is a high-profile term in education, with multiple definitions and implementation strategies for classroom practice. Through phenomenological and case study methods, this study examines how one ...
DL-based defense against polymorphic network attacks
(2024-01-01)
Network security is of vital importance in our world dominated by internet systems. These systems are vulnerable to large-scale rapidly evolving attacks by sophisticated cyber attackers who can have an upper edge over the ...
Filtering honeywords using probabilistic context free grammar
(2023-10-01)
With the growing prevalence of cyber threats, effective password policies have become crucial for safeguarding sensitive information. Traditional password-based authentication techniques are open to a number of threats. ...