Spelling Correction for Improved Detection of Malicious Chat Messages

Cyberbullying, sexting, profanity and other forms of malicious chat messages have become increasingly common in online virtual worlds and social networks that are used by children and teenagers. These conversations are dangerous to children. The partner organization has already implemented a rule based filtering system to filter out malicious messages. However, not all the malicious […]

Read More
Tailoring few-cycle pulses: Terahertz time-domain differentiator

The employment of THz radiation, i.e. radiation with frequencies falling between the microwaves and infrared domains, is arousing an ever-increasing interest in the last decade. Thanks to its invaluable features, such as transparency to the most part of the materials, negligible ionizing energy and availability of high frequency carriers, this technology is penetrating in lots […]

Read More
Time-aware Network Diffusion for Social Network Analytics

Nowadays, social networks, such as Twitter and Facebook, become platforms where ideas and opinions are constantly exchanged and rapidly reach populations that are geographically dispersed. Many marketing, political, and social campaigns rely on this fact to spread ideas, raise awareness in a massive way, and increase the popularity of products and services. Successful campaigns are […]

Read More
Anomaly Detection in SCADA Networks

SCADA (Supervisory Control and Data Acquisition) systems enable network-based monitoring and/or control of processes in various industrial sectors including electrical power distribution, energy, waste water and water. These systems serve as the backbone of much of Canada’s critical infrastructure. Security compromise of SCADA systems allows malicious attackers to gain control of the industrial processes in […]

Read More
Lively Web of Things (LWoT)

The term Web of Things (WoT) refers to the concept of integrating resources and interactions involving devices, data, and people on the web. WoT features interactions as first class entities above and beyond traditional web resources and, thus, enabling applications with substantial context awareness, personalization, and automation. Lively is a new open source approach to […]

Read More
Business Intelligence and Recommendation for Samsung Knox Community Forum

Companies usually use private forums to share sensitive information and discuss strategies. Valuable business knowledge is hidden inside the user generated content in these forums and waiting to be extracted and reused. Knox Community Forum, a thriving private forum inside Samsung where employers from all around the world post content like win notices of deals, […]

Read More
Xahive Expansion Project

The XAHIVE mandate is to improve the privacy and security of communication between professionals. At XAHIVE, Carleton students will be researching a differentiator in communication encryption and decryption coupled with a significant increase the convenience while retaining all levels of existing functionality. Additionally, students will be researching methods and processes to convert XAHIVE into an […]

Read More
The effect of dynamic information display on perception of public restroom cleanliness

The cleanliness of restroom drives people’s preferences. In places such as hotels, restaurants and hospitals, a dirty bathroom will drive away potential customers as it lead them to question the cleanliness of the whole facility. Visionstate Inc. developed WANDA (Washroom Attendant Notification Digital Aid), a LCD touch screen that display the time of most recent […]

Read More
Establishing Anxiety Detection Algorithm using Smart Wearables

Snug Vest is a wearable jacket that reduces anxiety using Deep Pressure Therapy (DPT). Snug Vest can be improvised by automating the therapy as the person wearing the vest gets anxious. In the current research, we aim to develop an anxiety detecting algorithm to calculate the real-time anxiety value using different bio data obtained from […]

Read More
Secure remote Web Proxy without the use of VPN

The aim of project is to establish a secure remote proxy connection between two parties where one party is behind a firewall or say NAT. This strategy is required in Martello’s product, MarWatch where technician is remotely located from client. In case, client faces any trouble, services from technician are invoked making sure they do […]

Read More
Spatio-Temporal Resolution Enhancement for HighFrame Rate Display

The quality of projected video plays a huge role in the digital projector market. Methods to increase the quality of projected video at lower costs are constantly being researched. A promising approach to reducing cost and increasing the quality of viewed video is the combination of up-converting the frame rate of high-resolution video and projecting […]

Read More
Eye Tracking as a functional biomarker in Neurological and Mental Health Disease

There is an urgent need for the development of new tools that can provide a relatively highthroughput, objective assessment of brain function in individuals with neurodevelopmental, neurodegenerative or psychiatric disorders. The overarching objective of this research proposal is to use eye movement tasks to identify biomarkers that can be used in the assessment of brain […]

Read More