scispace - formally typeset
Search or ask a question
Institution

British Columbia Institute of Technology

EducationBurnaby, British Columbia, Canada
About: British Columbia Institute of Technology is a education organization based out in Burnaby, British Columbia, Canada. It is known for research contribution in the topics: Smart grid & Belief revision. The organization has 458 authors who have published 785 publications receiving 16140 citations.


Papers
More filters
Proceedings ArticleDOI
30 Oct 2020
TL;DR: In this article, a Raspberry Pi 4 based mini intellectual system has been designed to facilitate online lecture delivery in government-run schools, which is an ideal low cost and energy-efficient solution to be provided to the students.
Abstract: The outbreak of novel Coronavirus in December 2019 has brought the whole world into a standstill. Besides medical hunt for finding the cure, there exists an equally important need to invent technological solutions for restoring different services while considering the restrictions imposed by the pandemic. Along with finding the cure for the disease, many other sectors also need urgent interventions from the research community for early restorations. School Education is one such sector. Online modes for classroom teaching can only be afforded if all our students have access to smart devices and internet facilities. We assess different features of the current state of affairs in government-run schools. Based upon evaluations, a low-cost Raspberry Pi 4 based mini intellectual system has been designed to facilitate online lecture delivery. The proposed system is an ideal low cost and energy-efficient solution to be provided to the students. The efficacy of the system demonstrates a great possibility for supplementing it along with the physical lecture delivery once the Novel Coronavirus scare is over.
Journal ArticleDOI
TL;DR: In this paper, the authors evaluate the current practice of registered diagnostic medical sonographers, with specialty in abdomen, of the American Registry of Diagnostic Medical Sonographers (ARDMS).
Abstract: The authors' purpose was to evaluate the current practice of registered diagnostic medical sonographers, with specialty in abdomen, of the American Registry of Diagnostic Medical Sonographers (ARDMS).A randomized sample of 2350 registered diagnostic medical sonographers with specialty in abdomen were chosen from the ARDMS database to complete a task survey on the Internet.The survey consisted of a 235-item ques tionnaire with regard to demographics, education, and frequency of specific sonograms performed in daily practice.Compared with the 1994 survey, registrants have received more formal education and less on-the-job training. Traditional tasks remain the predominant responsibilities of registered diagnostic medical sonographers with specialty in abdomen, including liver, biliary system, gallbladder, kidney, and pancreas, but a small minority of sonographers also perform liver transplant, kidney transplant, trauma, and musculoskeletal sonograms, and use newer technologies, such as power Doppler and tis...
Proceedings ArticleDOI
13 May 2014
TL;DR: A novel steganographic approach that generates a watermark hidden within a honey token, i.e. a decoy Word document, that is retrievable via a secret cryptographic key, which is generated and held by law enforcement.
Abstract: Law enforcement employs an investigative approach based on marked money bills to track illegal drug dealers. In this paper we discuss research that aims at providing law enforcement with the cyber counterpart of that approach in order to track perpetrators that operate botnets. We have devised a novel steganographic approach that generates a watermark hidden within a honey token, i.e. A decoy Word document. The covert bits that comprise the watermark are carried via secret interpretation of object properties in the honey token. The encoding and decoding of object properties into covert bits follow a scheme based on bijective functions generated via a chaotic logistic map. The watermark is retrievable via a secret cryptographic key, which is generated and held by law enforcement. The honey token is leaked to a botmaster via a honey net. In the paper, we elaborate on possible means by which law enforcement can track the leaked honey token to the IP address of a botmaster's machine.
Journal ArticleDOI
TL;DR: In this paper, the engineering group of a Canadian pulp and paper mill investigated the possibility of making a single process communication cabling "utility" through the plant, and the result was a design methodology that allowed a standardized cabling system to serve all communications needs throughout the process areas.
Abstract: In an ideal world, communications cabling for process control would be simple-buy all the computer, instrumentation, and electrical equipment from a single vendor, and connect it all together using a single cabling standard. But real life is never that simple; rarely are the programmable logic controllers (PLC), distributed control systems (DCS), drives, motor controls, field instrumentation, and computers all purchased from the same vendor. Supplying power to all this different equipment certainly doesn't require separate cabling structures, so why shouldn't the same be true for communications needs? Wouldn't a standard cabling infrastructure minimize the cabling infrastructure cost and complexity? The engineering group of a Canadian pulp and paper mill wondered about these two questions. They were designing a new steam plant and decided to investigate the possibility of making a single process communication cabling "utility" through the plant. The result was a design methodology that allowed a standardized cabling system to serve all communications needs throughout the process areas. Fiber-optic cable was chosen for all communications cabling outside of the control or electrical rooms. While the noise immunity and high data carrying capacity of fiber-optic cable was a factor, the primary reason was that fiber-optic cabling was the only system that could provide a single medium suitable for the very wide range of communications equipment in the mill.
Proceedings ArticleDOI
20 Aug 2014
TL;DR: In the paper, the salient characteristics of the attack technique are captured to devise a defensive approach that can accurately detect the corresponding attack code through dynamic analysis.
Abstract: We present a kernel data interception technique that is undetectable by existing approaches to malware detection, and propose practical methods to detect it. The technique is based on breaking concurrency in a way that enables the attack code to take over the synchronization established by target kernel modules. That level of control allows the attack code to interpose between those modules, and thus intercept sensitive data. We illustrate the overall technique as applied to intercepting keystrokes from a computer keyboard on Windows 7, and demonstrate it in practice through an attack kernel driver that we dubbed kbdinterceptor. The technique has no reliance on function hooking, machine code replacement, direct access to I/O bus, or attachment to any device driver stack whatsoever. In the paper, we capture the salient characteristics of the attack technique to devise a defensive approach that can accurately detect the corresponding attack code through dynamic analysis.

Authors

Showing all 459 results

NameH-indexPapersCitations
Michael Brauer10648073664
Sally Thorne5824215465
Anthony W.S. Chan371054615
Thomas Berleth31647845
Richard P. Chandra30626941
Kirk W. Madison29844238
David J. Sanderson29612951
Zoheir Farhat24901816
Rishi Gupta241303830
John L.K. Kramer231091539
Eric C. C. Tsang23792875
Ellen K. Wasan22552045
Paula N. Brown21671275
Rodrigo Mora201014927
Jaimie F. Borisoff18861869
Network Information
Related Institutions (5)
University of Alberta
154.8K papers, 5.3M citations

80% related

University of British Columbia
209.6K papers, 9.2M citations

79% related

University of Western Ontario
99.8K papers, 3.7M citations

79% related

University of Calgary
104.9K papers, 3.6M citations

79% related

McMaster University
101.2K papers, 4.2M citations

79% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20223
202162
202082
201952
201860
201753