Search
Now showing items 541-545 of 545
“Can we keep blogging?”: Analyzing blogging in a grade six classroom as a trauma-informed practice for students and educators
(2024-02-01)
Trauma-informed practice is a high-profile term in education, with multiple definitions and implementation strategies for classroom practice. Through phenomenological and case study methods, this study examines how one ...
Filtering antennas based on rectangular dielectric resonators
(2023-12-01)
Filters and antennas are essential components in communication systems. Being able to simultaneously realize filter and radiation functions, filtering antennas have attracted much attention due to their compactness and low ...
Development and validation of scaled electric combat vehicle virtual model
(2023-11-01)
This research focuses on an 8x8 scaled electric combat vehicle (SECV) and aims to create a virtual model made of the same vehicle on a vehicle dynamics simulation software using parameters from the actual vehicle. In the ...
DL-based defense against polymorphic network attacks
(2024-01-01)
Network security is of vital importance in our world dominated by internet systems. These systems are vulnerable to large-scale rapidly evolving attacks by sophisticated cyber attackers who can have an upper edge over the ...
Filtering honeywords using probabilistic context free grammar
(2023-10-01)
With the growing prevalence of cyber threats, effective password policies have become crucial for safeguarding sensitive information. Traditional password-based authentication techniques are open to a number of threats. ...