Radiation Mapping from Aerial Data

The proposed project is focused on the development of software for accurate mapping of radiation levels on the ground using aircraft or unmanned aerial vehicles (UAV) for data collection. The problem of accurate radiation mapping is crucial for handling emergency radiological incidents (e.g., on nuclear plants), monitoring national borders, operating nuclear mine sites, etc. The […]

Read More
Computational performance enhancement of hand-held spectrometer

The intern will enhance the functionality of a hand-held gamma spectrometer produced by Environmental Instrument Canada (EIC). In order to improve the performance of the spectrometer, the control board will be switched to a higher spec microcontroller, and the firmware source code will be re-written from interpreted Javascript to C code. New functionality, including energy […]

Read More
Bluetooth Enabled Radiation Detectors

  The project involves adding Bluetooth connectivity to a gamma radiation detector. The resulting device will be simple, small, low cost and rugged, making it ideal for the Homeland Security and similar markets. Environmental Instruments Canada Inc. (EIC) is located in Saskatoon and designs and manufactures radiation detection equipment, mainly for use in uranium mines […]

Read More
Mobile Phone Based Ionizing Radiation Detector Optimization

The GammaGuard is the mobile application which the user can be used to detect radiation level by using detectors, in our research they are called CT 100 and CT007, or using mobile camera. The previous work was only focusing on the CT 007 which used the classic Bluetooth technology. In CT 100, the Bluetooth low […]

Read More
Design and Prove RightsEnforcer Cross-Platform Development Strategy and SDE

RightsEnforcer is a software system for Persistent Document Security, deployed and proven in the real world as a Windows-only client-server system. ‘Persistent’ information security controls access to the protected document, everywhere, always, and is therefore uniquely suited to be a dominant information security technology in ‘the Cloud’. But to thrive in the Cloud the RightsEnforcer […]

Read More