Simulation of Network Attacks, Part II

The rapid propagation of Internet into nearly every aspect of our daily life together with the increase in volume and sophistication of network attacks puts a special emphasis on the security of the network systems. Currently, security modeling and simulation is one of the widely acknowledged methods for network security evaluation. However, in spite of […]

Read More
Software Diversity Measurement

Given a landscape of computer software that is made up of very few platforms and operating system types, attacks on software can often come in the form of comparing differences between instances or revisions of software. Diversifying software is an effective technique to mitigate these kinds of attacks. Software diversification is a means to generate […]

Read More
The review of the numerical analytical methods used in contamination monitoring

This project is mainly about the investigation of the reliability of the computer-aided calculations used in conjunctions with the electronic instruments employed to detect radioactive contamination that may be deposited on surfaces such as a human skin. The investigations will be carried out using scientific theories including mathematical and statistical techniques as well as experiments […]

Read More
Toward Automating Pattern-based Application Integration

Integration is a core IT operation, and is aided by a number of available best]practice techniques for integration (integration patterns). However the application of these patterns has little to no automated support. They are applied by consultants on a per-customer basis, making it an expensive and time consuming task. A computer science student from the […]

Read More
Computation of Wind Loading on a Shuttle Tanker during FPSO Offloading

Wind forces on an offloading tanker that is approaching a Floating Production and Storage Offloading (FPSO) vessel are influenced by so-called shielding or shadow effects, which are caused by the distorted wind fields in the wake of the FPSO. During the offloading operations, an offloading tanker approaching an FPSO will experience changing flow conditions that […]

Read More
On-Demand Expansion of eBusiness Services to the Cloud

The project will help eBusiness service providers to react faster and more economically to changing demands on their IT services. The goal is to develop automated techniques to utilize off-site computing resources that are offered on the Internet (so-called cloud computing resources), whenever there is a particularly high demand on the company internal computing infrastructure. […]

Read More
Quasi-Experimental Study of a Community-Based, Collaborative Nutrition Education Initiative

The gNutrition for Youh initiative is a recent and unique partnership sponsored by Thrifty Foods, and delivered through 18 municipal recreation centres, with Springwell Nutrition Group, and evaluated by the University of Victoria. In 2008]09, over 1,300 participants attended education seminars. More than 225 also attended grocery stores tours. Process evaluation data suggested that the […]

Read More
Sensor web adaptation to geotechnical sensor networks

This project investigates the use of adaptive sensor web systems in supporting a geotechnical sensor called the ShapeAccelArray. ShapeAccelArrays measure the movement of earth by placing a long (up to 100m long) thin (27mm diameter) tube containing special micromechanical gravity sensors inside a drilled hole in the earth. These holes are typically in earthen slopes […]

Read More
Verification of Elasto-Plastic Models in Svsolid Software

This project is to verify the elasto-plastic models in SVSolid software using the well]known FEM software, ABAQUS. SVSolid 2D/3D is powerful software designed specifically for geotechnical engineering field to conduct stress/deformation analysis, while ABAQUS is a software package designed for general engineering applications. The elasto-plastic model is applicable in many engineering materials. Three geotechnical engineering […]

Read More