Advancing an Intelligent Transportation Data Platform and Environmental Sensing to Promote Sustainable Cities

Transportation services, ranging from public buses to private logistic fleets, could benefit significantly from the introduction of Roger’s 5G wireless networks. This project has a primary objective to support UBC’s efforts to achieve its 2050 GHG emission reduction goals with emphasis on reduction of GHG and air pollutant emissions from transportation services.

Read More
Opportunities for Sino-Canadian Collaboration in Global Health Governance and Multilateral Pandemic Response

The coronavirus pandemic has elevated global health governance from a “low politics” position in foreign policy practice to an economic and security priority of international importance. Conventional foreign policy approaches to pandemic management have proven ineffective in the time of Covid-19, as states struggle to fulfil public health obligations in an increasingly globalized world. Canada’s […]

Read More
Post-Occupancy Evaluation (POE)-based Framework for Net-Zero Home Construction- Wilden Living Lab (Phase II)

The proposed study will focus on extending the Wilden Living Lab (WLL) Research Program by constructing a net-zero house (as the third house of the program) with new material combinations and construction practice. A post occupancy evaluation will be conducted to identify cost-effective material selection tools for building energy-efficient detached homes. Accordingly, a net-zero house […]

Read More
Developing computation tools for the rational design of cyclic peptide therapeutics

The majority of drugs that enter the market are discovered by screening millions of random chemical compounds until a desired effect is achieved. With the recent explosion in available biological data and raw computing power, it is now possible to develop drugs through bottom-up design rather than trial-and-error testing. Bottom-up drug design has the potential […]

Read More
Anomalous DNS Query Detection Using Machine Learning Approaches

For organizations that use the Internet, their employees will visit thousands of websites every day. However, there is a chance that the destination website is not safe to visit. Such websites may be fraudulent, phishing, or even data-stealing related. On the other hand, determining if the target website link is suspicious or not could help […]

Read More
Network and Data Security Access Control

Imagine a refrigerator automatically orders the eggs from the online store to deliver at its location and make the payment on behalf of the owner. In today’s world, the network infrastructures are not limited to traditional datacenters or company’s premises. IoT (Internet of Things) and BYOD (Bring Your Own Device) are growing rapidly in our […]

Read More
Automation & Orchestration for Improved Security Communication

Speed is incredibly important when addressing issues with computer security. The longer the time between the attack’s start and resolution, the more assets that attackers can steal from a company. There are various security platforms that can alert a company to a cyber-attack. This research project aims to combine knowledge from all these platforms together […]

Read More
Creating a comparison and alert methodology for managing the CCTX feed

Most collaborations and government departments share their threat data feed in Data Exchange. Inescapably, nowadays with increasing threat data, it is a challenge to extract a large amount of threat data and unify the format more quickly. And as more and more companies join in sharing, the redundancy of this duplicate data will increase dramatically. […]

Read More
Real-time Automated Security Report Generation

In today’s world, organizations protect themselves and their customer’s data through the implementation of complex cybersecurity solutions composed of many different nodes, each generating constant streams of data. Building reports from this data through the calculation of various metrics can provide much needed visibility into the state of the environment. However, building such reports can […]

Read More
Stress Monitoring in Potash Mines

Mining induced stress in the area around tunnel openings represents a major design consideration in today’s potash mines. The actual induced stress is currently monitored using an array of techniques derived from the hard rock mining industry, one of the key assumptions being linear-elastic deformation behaviour of the rock. When using these methods in an […]

Read More