ParticipACTION Physical Activity Report Card for Children and Youth and the Global Matrix 3.0: Evaluation and Strategic Harmonization

Global levels of childhood physical activity are declining while sedentary behaviours are rising, leading to the global increase in non-communicable disease. The aim of this project is two-fold: 1. to contribute to childhood physical activity promotion in Canada and worldwide, and 2. to contribute to the international diffusion of the scientific knowledge concerning childhood physical activity.

Opioid Use in Pediatric-Onset Inflammatory Bowel Disease

Patients with inflammatory bowel disease (IBD) have an inflamed digestive tract and experience diarrhea, fatigue, and abdominal pain. Youth with IBD are six times more likely to take opioids than youth without IBD. We are currently in the midst of an opioid crisis. In 2016, there were almost 3000 deaths related to opioid use in Canada. This increased to nearly 4000 deaths in 2017. Since 2001, opioid-related deaths have increased by 345% in the United States. IBD patients taking opioids have a poorer quality of life, regardless of how severe their IBD is.

Network Traffic Classification for Cyber Threat and Malware Detection

Bell’s Cyber Threat Intelligence (CTI) team is collaborating with academic institutions in order to further research and develop cyber security analytics for the protection of critical infrastructure and data. The focus of this research is to create and leverage a traffic classification project specifically for network security purposes. This research to design distributed algorithms fast enough for analyzing massive high-dimensional
data generated by network traffic to detect cyber threats/ attacks and anomaly in the network.

Condition assessment of infrastructure facilities using combined image processing and sensing technologies

As Canada's infrastructure grow older every year, the inspection and maintenance of these capital intensive assets becomes more challenging. Most deterioration mechanism occur over a long period of time. Certain defects remain unnoticed during regular inspection until it is too late. Unfortunately, delayed diagnosis of defects can significantly increase the annual cost of maintenance.
Inspectors and maintenance managers demand innovative methods that help them identify and quantify deficiencies earlier, and more accurately.

Improved pulse pressure approximation and pattern recognition algorithm for prediction of blood pressure-related health issues

Continuous blood pressure (BP) monitor is highly beneficial for detection and prevention of stroke and cardiovascular disease. The most common BP monitor technique still relies on using a cuff that slows the blood flow, which is both uncomfortable and makes continuous monitoring impossible. Furthermore, research has shown that due to the numerous artifacts, the existing cuff-less BP monitoring technologies such as pulse transit time (PTT) and tonometry are not effective.

Electrochemical Impedance Modeling and Optimization of Li-Ion Battery Utility using Active Battery Management System (ActiveBMS) - Year two

In the last decade, lithium-ion batteries (LIB) have become the most popular power sources for consumer devices, telecommunication, energy storage systems, as well as electric vehicles. This type of batteries is indispensable in maintain our modern society. GBatteries have developed an active battery management system (ActiveBMS), which hinders LIB degradation mechanisms, such as the anode cracking and temperature growth by continuously adapting bursts of energy during the charging process.

Generative Adversarial Networks for Addressing Data Privacy Issues

It is extremely important to preserve privacy of our citizens. One way to do it is to detect private information in the document and to indicate to owner of the documents that the documents contain privacy information. In order to develop machine learning algorithms to detect privacy data in the documents, the algorithms need to be trained with the existing documents that are annotated to point out private information. Access to those documents for training is limited since in many cases they are private as well.

Impact of Post-Quantum Cryptography on PKI, Common Libraries, Protocols and Crypto Agility Requirements

Advances in quantum computing have Entrust Datacard and their customers concerned about whether the industry is ready to move to post quantum cryptographic algorithms, particularly for PKI use cases. Entrust Datacard and University of Ottawa will test the quantum-readiness of commercially-available PKI. The end goal is to provide guidance to the community about the impact of particular PQ algorithms on common infrastructure, provide examples of safe migration paths where they exist, and recommend changes or mitigations based on discovered issues.

Ontario__University of Ottawa

A limited number of fully funded fellowships are available. However, Mitacs strongly recommends that you confirm the availability of $5,000 per year from your academic supervisor or university before applying.
Fellowships will be awarded competitively.