Search
Now showing items 1-10 of 80
Petri net modeling of fault analysis for probabilistic risk assessment
(2013-04-01)
Fault trees and event trees have been widely accepted as the modeling strategy to perform Probabilistic Risk Assessment (PRA). However, there are several limitations associated with fault tree/event tree modeling. These ...
Development of energy compensated Geiger Muller detector based on the T2416A Canberra Co. GM detector
(2013-07-08)
Geiger Muller counters have been a fundamental device in radiation detection for decades due to their simplicity and low cost. Canberra Company has been designing and manufacturing Geiger Muller detectors in various designs ...
Simulation of dynamic response of Self-Powered-Inconel-Neutron-Detector lead cables using a semi-empirical model
(2013-11-01)
The work presented here was devoted to the modelling and simulation of the dynamic response of lead cables of Inconel self-powered neutron detectors in a CANDUpower reactor. The main goal was to develop a semi-empirical ...
Energy-economic model for transition to renewables
(2013-05-01)
Presented in this thesis is a macro-economic model based on a three-factor production
function, utilizing energy, capital, and labour as the three production factors. With a
primary focus on energy production we include ...
The effects of Hydroxypropyl-β-Cyclodextrin on the American Flagfish (Jordanella floridae) over one complete life-cycle
(2013-08-01)
Understanding the impacts of pharmaceuticals and personal care products (PPCPs) on aquatic ecosystems is an important issue in aquatic toxicology. Many PPCPs have been shown to cause effects on aquatic biota within detected ...
On matrix-free pseudo-arclength continuation methods applied to a nonlocal partial differential equation in 1+1D with pseudo-spectral time-stepping
(2013-08-01)
In this thesis we examine a recent animal aggregation model which describes the
evolution of two populations of animals moving on a 1-dimensional spatial domain
differing only by the direction they travel. The equations ...
Robust curved road boundary identification using hierarchical clustering.
(2013-11-01)
We develop a new method for automatic curved road boundary detection in images captured by
traffic cameras. The proposed method combines data driven (edge segments) and model based
(2nd degree polynomial models for road ...
Design and implementation of the crypto-assistant: an eclipse plugin for usable password-based column level encryption based on hiberate and jasypt
(2013-03-01)
The lack of encryption of data at rest or in motion is one of the top 10 database vulnerabilities according to team SHATTER [72]. In the quest to improve the security landscape, we identify an opportunity area: two tools ...
Reliable peer-to peer multicast streaming
(2013-01-01)
P2P is increasingly gaining its popularity for streaming multimedia contents. The architecture of streaming has shifted from traditional client server architecture to P2P architecture. Although it is scalable and robust ...
Reconsidering the 'new' penology: Risk management, dangerous and judicial decision-making.
(2013-07-01)
As a result of the prevailing sense that ‘nothing works’ and the proliferation of risk oriented concerns in the criminal justice system, the current penal era has been characterized as a “new penology.” According to Malcolm ...