Institution
British Columbia Institute of Technology
Education•Burnaby, British Columbia, Canada•
About: British Columbia Institute of Technology is a education organization based out in Burnaby, British Columbia, Canada. It is known for research contribution in the topics: Smart grid & Belief revision. The organization has 458 authors who have published 785 publications receiving 16140 citations.
Papers published on a yearly basis
Papers
More filters
••
30 Oct 2020
TL;DR: In this article, a Raspberry Pi 4 based mini intellectual system has been designed to facilitate online lecture delivery in government-run schools, which is an ideal low cost and energy-efficient solution to be provided to the students.
Abstract: The outbreak of novel Coronavirus in December 2019 has brought the whole world into a standstill. Besides medical hunt for finding the cure, there exists an equally important need to invent technological solutions for restoring different services while considering the restrictions imposed by the pandemic. Along with finding the cure for the disease, many other sectors also need urgent interventions from the research community for early restorations. School Education is one such sector. Online modes for classroom teaching can only be afforded if all our students have access to smart devices and internet facilities. We assess different features of the current state of affairs in government-run schools. Based upon evaluations, a low-cost Raspberry Pi 4 based mini intellectual system has been designed to facilitate online lecture delivery. The proposed system is an ideal low cost and energy-efficient solution to be provided to the students. The efficacy of the system demonstrates a great possibility for supplementing it along with the physical lecture delivery once the Novel Coronavirus scare is over.
••
TL;DR: In this paper, the authors evaluate the current practice of registered diagnostic medical sonographers, with specialty in abdomen, of the American Registry of Diagnostic Medical Sonographers (ARDMS).
Abstract: The authors' purpose was to evaluate the current practice of registered diagnostic medical sonographers, with specialty in abdomen, of the American Registry of Diagnostic Medical Sonographers (ARDMS).A randomized sample of 2350 registered diagnostic medical sonographers with specialty in abdomen were chosen from the ARDMS database to complete a task survey on the Internet.The survey consisted of a 235-item ques tionnaire with regard to demographics, education, and frequency of specific sonograms performed in daily practice.Compared with the 1994 survey, registrants have received more formal education and less on-the-job training. Traditional tasks remain the predominant responsibilities of registered diagnostic medical sonographers with specialty in abdomen, including liver, biliary system, gallbladder, kidney, and pancreas, but a small minority of sonographers also perform liver transplant, kidney transplant, trauma, and musculoskeletal sonograms, and use newer technologies, such as power Doppler and tis...
••
13 May 2014TL;DR: A novel steganographic approach that generates a watermark hidden within a honey token, i.e. a decoy Word document, that is retrievable via a secret cryptographic key, which is generated and held by law enforcement.
Abstract: Law enforcement employs an investigative approach based on marked money bills to track illegal drug dealers. In this paper we discuss research that aims at providing law enforcement with the cyber counterpart of that approach in order to track perpetrators that operate botnets. We have devised a novel steganographic approach that generates a watermark hidden within a honey token, i.e. A decoy Word document. The covert bits that comprise the watermark are carried via secret interpretation of object properties in the honey token. The encoding and decoding of object properties into covert bits follow a scheme based on bijective functions generated via a chaotic logistic map. The watermark is retrievable via a secret cryptographic key, which is generated and held by law enforcement. The honey token is leaked to a botmaster via a honey net. In the paper, we elaborate on possible means by which law enforcement can track the leaked honey token to the IP address of a botmaster's machine.
••
TL;DR: In this paper, the engineering group of a Canadian pulp and paper mill investigated the possibility of making a single process communication cabling "utility" through the plant, and the result was a design methodology that allowed a standardized cabling system to serve all communications needs throughout the process areas.
Abstract: In an ideal world, communications cabling for process control would be simple-buy all the computer, instrumentation, and electrical equipment from a single vendor, and connect it all together using a single cabling standard. But real life is never that simple; rarely are the programmable logic controllers (PLC), distributed control systems (DCS), drives, motor controls, field instrumentation, and computers all purchased from the same vendor. Supplying power to all this different equipment certainly doesn't require separate cabling structures, so why shouldn't the same be true for communications needs? Wouldn't a standard cabling infrastructure minimize the cabling infrastructure cost and complexity? The engineering group of a Canadian pulp and paper mill wondered about these two questions. They were designing a new steam plant and decided to investigate the possibility of making a single process communication cabling "utility" through the plant. The result was a design methodology that allowed a standardized cabling system to serve all communications needs throughout the process areas. Fiber-optic cable was chosen for all communications cabling outside of the control or electrical rooms. While the noise immunity and high data carrying capacity of fiber-optic cable was a factor, the primary reason was that fiber-optic cabling was the only system that could provide a single medium suitable for the very wide range of communications equipment in the mill.
••
20 Aug 2014TL;DR: In the paper, the salient characteristics of the attack technique are captured to devise a defensive approach that can accurately detect the corresponding attack code through dynamic analysis.
Abstract: We present a kernel data interception technique that is undetectable by existing approaches to malware detection, and propose practical methods to detect it. The technique is based on breaking concurrency in a way that enables the attack code to take over the synchronization established by target kernel modules. That level of control allows the attack code to interpose between those modules, and thus intercept sensitive data. We illustrate the overall technique as applied to intercepting keystrokes from a computer keyboard on Windows 7, and demonstrate it in practice through an attack kernel driver that we dubbed kbdinterceptor. The technique has no reliance on function hooking, machine code replacement, direct access to I/O bus, or attachment to any device driver stack whatsoever. In the paper, we capture the salient characteristics of the attack technique to devise a defensive approach that can accurately detect the corresponding attack code through dynamic analysis.
Authors
Showing all 459 results
Name | H-index | Papers | Citations |
---|---|---|---|
Michael Brauer | 106 | 480 | 73664 |
Sally Thorne | 58 | 242 | 15465 |
Anthony W.S. Chan | 37 | 105 | 4615 |
Thomas Berleth | 31 | 64 | 7845 |
Richard P. Chandra | 30 | 62 | 6941 |
Kirk W. Madison | 29 | 84 | 4238 |
David J. Sanderson | 29 | 61 | 2951 |
Zoheir Farhat | 24 | 90 | 1816 |
Rishi Gupta | 24 | 130 | 3830 |
John L.K. Kramer | 23 | 109 | 1539 |
Eric C. C. Tsang | 23 | 79 | 2875 |
Ellen K. Wasan | 22 | 55 | 2045 |
Paula N. Brown | 21 | 67 | 1275 |
Rodrigo Mora | 20 | 101 | 4927 |
Jaimie F. Borisoff | 18 | 86 | 1869 |