Framework for Enterprise IT DevSecOps Governance to enable Continuous Security

In today’s business context, companies need to release software quickly in order to remain competitive. This requires internal teams to work closely together from the outset. Unfortunately, security is typically considered only at the very end. This means if any issues are discovered by the security team, it requires extensive rework. Typical responses are to […]

Read More
Connecting prey and specialized predator population dynamics: a hundred-and fifty year record of salmon and killer whale interactions

Pacific northwestern southern resident killer whale population only encompasses 74 individuals and is considered endangered. Chinook salmon, the main food source of resident killer whales, is today disappearing from the North American western coast. Yet, it remains unclear to which extent food deprivation is affecting recovery of resident killer populations. The main aim of this […]

Read More
New High Precision GNSS Positioning and Navigation System Using Triple-frequency GNSS Signals – Year two

Precise Point Positioning (PPP) is a next generation precise positioning technology using GNSS and is expected to be adopted in more and more applications. To date, all PPP systems available on the market are dual-frequency based systems and long positioning convergence time has limited its wide applications. With the progress of the GNSS modernization, triple-frequency […]

Read More
Exploring Deep Learning Architectures for Automatic Casting from Movies

Automatic casting applications aim is to accurately recognise facial regions that correspond to a same actor appearing in a movie to produce described video. This project will focus on the tasks of re-identify the face of each principal actors when they appear in different scenes of a movie. This is a challenging task because although […]

Read More
Generative Adversarial Networks for Addressing Data Privacy Issues

It is extremely important to preserve privacy of our citizens. One way to do it is to detect private information in the document and to indicate to owner of the documents that the documents contain privacy information. In order to develop machine learning algorithms to detect privacy data in the documents, the algorithms need to […]

Read More
Accelerate Transaction Latency of Pool Mining in Cryptocurrency Networks

In this project, using such mainstream cryptocurrencies as BitCoin and Ethereum as representatives, the intern will analyze the transaction collection strategies of their mining pools, and then collect transactions and the corresponding blocks data to build a large dataset, from which the computing power of different mining pools and their proportions will be analyzed, together […]

Read More
Impact of Post-Quantum Cryptography on PKI, Common Libraries, Protocols and Crypto Agility Requirements

Advances in quantum computing have Entrust Datacard and their customers concerned about whether the industry is ready to move to post quantum cryptographic algorithms, particularly for PKI use cases. Entrust Datacard and University of Ottawa will test the quantum-readiness of commercially-available PKI. The end goal is to provide guidance to the community about the impact […]

Read More
Learning PDF Document Structures using Recursive Neural Networks

Portable Document Format or PDF is the de facto standard for presenting textual-visual content. In this project, we aim to develop a machine learning framework for PDF document understanding. Despite the recent proliferation of deep learning-based methods for the analysis and processing of natural images, there have been considerably less efforts on designing similar approaches […]

Read More
Measurement-Based Geospatial Data Management

This project will develop and test a geospatial data management system for land surveyors. The system will of a mobile client for data collection and a web service that integrates and stores the data long term. Data processing will use the most accurate geodetic techniques to ensure data quality and optimal data integration strategies will […]

Read More
Development of signal processing techniques for animal movement data

In the past decade, the development of sophisticated sensors attached to animals (tags) have researchers to infer of horizontal and vertical movement of marine animals across time and space. The amount of data collected from these tags along with the analytical challenges surrounding the extraction of behavioural patterns has presented a significant barrier for researchers […]

Read More
Stateful Intrusion Detection using Algebraic State-Transition Diagrams

Increasingly, cyber threats evolve targeting companies, industries and governments. As defense systems are strengthening, threat actors developed new tactics, strategies and techniques to break down security perimeters. Generally, the security of the perimeters are enforced by multiples intrusion prevention and detection tools responsible to provide proactive insights, real-time insights and operational insights for the detection, […]

Read More