Search
Now showing items 531-540 of 541
Acknowledging offender trauma at intake: a qualitative thematic analysis of Canadian correctional policy
(2023-08-01)
Trauma has seldom been discussed in the literature in relation to incarceration. The research that does exist has tended to be gendered, focusing predominantly on the trauma experiences of female offenders. The current ...
Gloss positioning for a gaze aware L2 reading aid
(2023-08-01)
An important aspect of language learning is reading texts written in the learner’s second language (L2). However, reading can be a daunting task for language learners, as text may contain a large amount of unknown vocabulary. ...
Spectrum sharing for multi-user massive MIMO networks
(2023-12-01)
In this dissertation, we propose a creative approach to advance 5G network technologies by investigating the impact of employing an underlay spectrum sharing (USS) scheme on the performance of two massive multi-input-multi-output ...
Design and development of a context-aware collaborative autonomous real-time vehicle systems framework
(2023-11-01)
The increasing autonomy of intelligent systems, with applications extending from self-driving vehicles to home-based robots, has emerged as a critical area of focus in modern research. Yet, to acknowledge the full potential ...
Poisson Distribution based algorithm to reduce grid harmonics caused by EV chargers
(2023-12-01)
The global market of electric vehicles (EVs) is growing rapidly because of several factors such as growing concerns for pollution, governmental incentives/subsidies and regulations and consumers’ increasing interest in ...
Enhancing password security: a quest for optimal honeywords
(2023-10-01)
In this capstone report, our primary focus is on harnessing the capabilities of the GPT4 model to enhance password security through the generation of honeywords. Honeywords are decoy passwords designed to strengthen the ...
Guarding the gate: using honeywords to enhance authentication security
(2023-10-01)
A honeyword (false password) can be defined as a duplicate password (rearranged) resembling the same characteristics of the original password. It is very challenging for any cyberpunk to distinguish between a real password ...
Preliminary design of a social asymmetric virtual reality upper-limb exergame for individuals with dementia utilizing insights from caregivers
(2023-10-01)
This thesis investigates the usability, task load, cooperative performance, and social presence effects of an asymmetric VR game for upper limb activity in the context of elderly care from the perspective of caregivers. ...
Deep learning models for defect and anomaly detection on industrial surfaces
(2023-12-01)
Automated quality control is essential across various industries to reduce manual inspection and improve operational efficiency. While there are advances in computer vision and machine learning for defect detection, ...
Effect of neck muscle vibration on upper limb sensorimotor integration and motor performance
(2022-07-01)
Upper limb control depends on accurate internal models of the position of the limbs relative to the head and neck. The cerebellum is heavily involved in SMI of neck sensory inputs and motor learning; therefore, it is likely ...