The research aims to develop a new computer algorithm for automating simulations of complex power systems when simulations are used for design. The new algorithm will be able to find multiple optimal solutions, which will give the designer the ability to scrutinize and select the most suited option. Additionally the algorithm will be parallel in nature, which means it can be executed simultaneously and in unison on several computing machines.
Currently, cloud and Internet service providers typically use antivirus, firewall, packet inspection and intrusion detection systems (IDSs) to protect against cyber-security threats on the cloud and internet. These protection systems rely on the knowledge of a fixed and known database of threats to detect malicious activity, but they have no ability to detect new, mutated, threats dynamically. Once an undetected cyber-attack has caused damage and has subsequently been identified by technicians or third party sources, only then can these systems be updated by going offline.
The project will investigate a novel HVdc transmission arrangement referred to as a “symmetrical monopole”. This configuration has the ability to continue operation even when one of the transmission line conductors is faulted. This property allows for the use of new compact dc transmission lines which occupy only a fraction of the right-of-way of other transmission options, thereby minimizing the negative impact on the environment. The research will investigate the appropriate control and protection aspects of such a transmission scheme.
Attacks on computer networks happen every day, but many go undetected. Not all attacks succeed, but the ones that do often leave so called “back doors” behind that allow the attackers to easily gain access back into the computer network without having to attack it further. This project focuses on the use of mathematics and statistics to determine what features of network traffic (the data flowing on the wire between a computer network and the rest of the internet) can be used to determine if an unauthorized back door is present in a computer network.
An electrical power system is designed to provide safe and reliable supply to customers. However well designed the system, disturbances are unavoidable during the operation and the system should be able to continue secure operation. In fact, if it can be early determined that the system is moving towards an unsecure region, the operators can take necessary safety actions to keep the system secure. Thus, the main goal of this study is to develop novel techniques to monitor the stability of an electrical power system in real time.
This proposal presents research projects to evaluate a new technology, Electrovestibulography (EVestGTM) that holds potential to objectively, quickly and quantitatively measure the severity of concussion, thus aiding in its diagnosis. EVestG signals are recorded painlessly and non-invasively from the external ear in response to a vestibular stimulus; they are the brain signals modulated by the vestibular response. When concussed, people commonly experience balance (vestibular) problems and dizziness, as well as confused thinking.
Biomass combustion, which is a growing business, is used to generate heat and power. It is a very attractive system because it provides energy at cheaper price compared to oil and gas fuels and also emits fewer pollutants into the atmosphere. As the name implies, the combustion system is fired using renewable fuels such as forest and agriculture residues. Biovalco Inc., which is a Canadian company, is gradually increasing its share in this energy market.
The main objective of this research is to calculate Control performance standards in an interconnected power system without running the time domain simulation. Using a faster approach which requires probability distribution of load change. PSCAD and PSSE simulation tools will be used to carry out the research. System identification technique will be used to estimate necessary transfer function models. These transfer function models will be used to generate data for the calculation purpose.
In partnership with Zenfri Inc, this project seeks to facilitate the successful introduction of a mobile game called Clandestine Anomaly to the mobile game market. Due to the embryonic stage of the mobile game market this research will use primary and secondary research methods to create a market analysis and inform the market strategy. Firstly, this research will provide an understanding of the business environment by analyzing successful products and their marketing strategies along with industry trends and characteristics.
We propose to develop computer vision technologies for recognizing 3D environment for augmented reality (AR) mobile games. Given an image/video taken captured a mobile device (e.g. iPad), we would like to be able to recognize some useful information about the 3D environment of the game player. For example, one of our goals is to recognize whether the player is in an indoor or outdoor environment. This information will allow the game to project appropriate virtual objects and characters that interact with the user. Another goal is to recognize certain important objects (e.g.