Time filter

Source Type

Marinov T.T.,Southern University at New Orleans | Marinova R.S.,Concordia University of Edmonton | Vatsala A.S.,University of Louisiana at Lafayette
Neural, Parallel and Scientific Computations | Year: 2015

This is a study concerning the identification of the heterogeneous flexural rigidity of a beam governed by the steady-state Euler-Bernoulli fourth order ordinary differential equation. We use the method of Variational Imbedding (MVI) to deal with the inverse problem for the coefficient identification from over-posed data. The method is identifying the coefficient by approximating it with a piece-wise polynomial function. Several types of piece-wise polynomial functions are considered: piece-wise constant; linear spline; and cubic spline. It is observed in this study that the numerical solution of the variational problem coincides with the direct simulation of the original problem within the second order of approximation. © Dynamic Publishers, Inc.


Butakov S.,Concordia University of Edmonton | Murzintsev S.,Altai Academy of Economics and Law | Tskhai A.,Altai Academy of Economics and Law
2016 International Conference on Platform Technology and Service, PlatCon 2016 - Proceedings | Year: 2016

The paper looks at the platform scalability problem for near-to-similar document detection tasks. The application areas for the proposed approach include plagiarism detection and text filtering in data leak prevention systems. The paper reviews limitations of the current solutions based on the relational DBMS and suggests data structure suitable for implementation in no-SQL databases on the highly scalable clustered platforms. The proposed data structure is based on key-value model and it does not depend on the shingling method used to encode the text. The proposed model was implemented on the clustered MongoDB platform and tested with the large dataset on the platform that was scaled up horizontally during the experiment. The experiments indicated the applicability of the proposed approach to near-to-similar document detection. © 2016 IEEE.


Utting N.,University of Ottawa | Utting N.,Concordia University of Edmonton | Lauriol B.,University of Ottawa | Lacelle D.,University of Ottawa | Clark I.,University of Ottawa
Quaternary Research (United States) | Year: 2016

Argon, krypton and xenon have different solubilities in water, meaning their ratios in water are different from those in atmospheric air. This characteristic is used in a novel method to distinguish between ice bodies which originate from the compaction of snow (i.e. buried snow banks, glacial ice) vs. ice which forms from the freezing of groundwater (i.e. pingo ice). Ice which forms from the compaction of snow has gas ratios similar to atmospheric air, while ice which forms from the freezing of liquid water is expected to have gas ratios similar to air-equilibrated water. This analysis has been conducted using a spike dilution noble gas line with gas extraction conducted on-line. Samples were mixed with an aliquot of rare noble gases while being melted, then extracted gases are purified and cryogenically separated. Samples have been analysed from glacial ice, buried snow bank ice, intrusive ice, wedge ice, cave ice and two unknown ice bodies. Ice bodies which have formed from different processes have different gas ratios relative to their formation processes. © 2015 University of Washington.


Katam S.,Concordia University of Edmonton | Zavarsky P.,Concordia University of Edmonton | Gichohi F.,Government of Alberta
2015 World Congress on Industrial Control Systems Security, WCICSS 2015 | Year: 2015

Domain Based Security (DBSy) is a model-based approach, developed by the Defence Evaluation and Research Agency for the UK Ministry of Defence, to analyze information security risks in business context for the purpose of providing a direct mapping between the risks and security controls needed to manage them. The traditional DBSy modelling partitions business processes and underlying IT infrastructure into logical domains of predefined confidentiality levels to enforce restrictions on sharing of information. While constrains on sharing of information are addressing requirements on confidentiality of the information, industrial control systems primarily require and rely on timely and correct information. Therefore, this short paper explores applicability of the DBSy modeling to SCADA industrial control system environments in which integrity and availability of information is important for correct operation of the system, protection of human lives and prevention of damages to environment. Examples are shown to illustrate that on confidentiality focused legacy style DBSy modeling can be extended to consider and address integrity and availability requirements of industrial control systems. © 2015 Infonomics Society.


Dumsday T.,Concordia University of Edmonton
Journal of Bioethical Inquiry | Year: 2016

If elective abortion is publicly funded, then the government is obligated to take active measures designed to reduce its prevalence. I present two arguments for that conclusion. The first argument is directed at those pro-choice thinkers who hold that while some or all elective abortions are morally wrong, they still ought to be legally permitted and publicly subsidized. The second argument is directed at pro-choice thinkers who hold that there is nothing morally wrong with elective abortion and that it should be both legally permitted and publicly subsidized. The second argument employs premises that generalize beyond the abortion debate and that may serve to shed light on broader questions concerning conscience and the requirements of political compromise in a democracy. © 2015, Journal of Bioethical Inquiry Pty Ltd.


Yellanki S.,Concordia University of Edmonton | Lindskog D.,Concordia University of Edmonton | Zavarsky P.,Concordia University of Edmonton | Ruhl R.,Concordia University of Edmonton
Proceedings - International Computer Software and Applications Conference | Year: 2016

This paper proposes a customization of the IETF RFC 6280 Geopriv to facilitate compliance of Wi-Fi positioning systems with existing privacy regulations. It is shown that APIs of existing Wi-Fi positioning systems, based on the distribution phase of the IETF RFC 6280 Geopriv, do not fully protect location privacy of a user of an IEEE 802.11 (Wi-Fi) enabled device. The existing controls of the WiPS are compared with requirements of privacy regulations. To address gaps identified in these controls, the RFC 6280 architecture is modified to include design rules into the rule maker component. We also show that existing WiPS privacy protecting controls should be enhanced to be in compliant with this modified Geopriv which significantly enhances users control over location privacy. © 2016 IEEE.


Illoh O.,Concordia University of Edmonton | Illoh O.,Information Assurance | Aghili S.,Concordia University of Edmonton | Butakov S.,Concordia University of Edmonton
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015

The use of cloud services as a business solution keeps growing, but there are significant associated risks that must be addressed. Despite the advantages and disadvantages of cloud computing, service integration and alignment with existing enterprise architecture remains an ongoing priority. Typically, quality of services provided is outlined in a service level agreement (SLA). A deficient template for evaluating, negotiating and selecting cloud SLAs could result in legal, regulatory, and monetary penalties, in addition to loss of public confidence and reputation. This research emphasizes (or advocates) the implementation of the proposed SLA evaluation template aimed at cloud services, based on the COBIT 5 for Risk framework. A gap analysis of existing SLAs was done to identify loopholes, followed by a resultant template where identified gaps were addressed. © Springer International Publishing Switzerland 2015.


Monika,Concordia University of Edmonton | Zavarsky P.,Concordia University of Edmonton | Lindskog D.,Concordia University of Edmonton
Procedia Computer Science | Year: 2016

The focus of the paper is on providing insights on how ransomware have evolved from its starting till March 2016 by analyzing samples of selected ransomware variants from existing ransomware families in Windows and Android environments. Seventeen Windows and eight Android ransomware families were analyzed. For each ransomware family, at least, three variants belonging to the same family were compared. The analysis revealed that ransomware variants behave in a very similar manner, but use different payloads. Our analysis shows that there has been a significant improvement in encryption techniques used by ransomware. The experimental results in Windows environment demonstrate that detection of ransomware is possible by monitoring abnormal filesystem and registry activities. In Android environment, our analysis reveals that likelihood of ransomware attacks can be reduced by paying a closer attention to permissions requested by the Android applications. © 2016 The Authors.


Kaur J.,Concordia University of Edmonton | Lindskog D.,Concordia University of Edmonton
ACM International Conference Proceeding Series | Year: 2016

In this research paper, we describe an algorithm that could be implemented on an intrusion response system (IRS) designed specifically for mobile ad hoc networks (MANET). Designed to supplement a MANET's hierarchical intrusion detection system (IDS), this IRS and its associated algorithm would be implemented on the root node operating in such an IRS, and would rely on the optimized link state routing protocol (OLSR) to determine facts about the topology of the network, and use that determination to facilitate responding to network intrusions and attacks. The algorithm operates in a query-response mode, where the IRS function of the IDS root node queries the implemented algorithm, and the algorithm returns its response, formatted as an unordered list of nodes satisfying the query. © 2016 ACM.


News Article | December 2, 2016
Site: www.marketwired.com

Editors Note: There is a photo associated with this press release. Concordia University of Edmonton (CUE) and Covenant Health will be working together to establish a collaborative research program relating to the environmental and psycho emotional health of children. "We are so blessed to embark on this new relationship with CUE. Research is the pinnacle of influencing practice from evidence and engaging with an academic partner that shares interests aligning with our work is truly wonderful. While this is the beginning and the agreement considers only one area of expertise, we hope to expand our connections over time. Knowledge translation from research to practice is key in improving health of our communities in which we serve, embracing innovative ways of 'thinking and doing' supports our staff and physicians and students to provide leading edge care. Aligning with our strategic directions, it is relationships such as this that will enable us to 'design, implement and share high performing systems of care and service based upon integration, innovation and evidence' and thereby help us to achieve our vision." The agreement will boost a range of research and collaboration activities based on the further validation of existing environmental health tools, the development of emotional overlays for inclusion with these tools, and the creation of home assessment tools. The research activities will also include the development of ongoing education and certification programs to transition the knowledge gathered to the clinical and researcher communities for practical use. Manfred Zeuch, CUE's VP International and Research, is pleased with agreement: "We are excited about this cooperation agreement, which is the first to be signed with the assistance of the CIAR, and which echoes CUE's mandate: to foster meaningful partnerships in Edmonton and area, that bring solutions with the view of enhancing general social wellness and building a strong community. The CUE researchers involved in this collaboration are also leading our graduate certificate and new degree projects in the areas of Psychology and Public Health. This partnership with Covenant Health will surely strengthen the directions undertaken." Covenant Health is Canada's largest Catholic health care organization with over 14,000 physicians, employees and volunteers serving in 12 communities across Alberta. A major provider in Alberta's integrated health system, Covenant Health works with Alberta Health Services and community partners to positively influence the health of Albertans through a broad range of programs and services. www.covenanthealth.ca Concordia University of Edmonton offers over 45 majors and minors as well as two after-degree programs, three master's degrees and several graduate certificates and diplomas. It recently launched the Centre for Innovation and Applied Research (CIAR) - formerly known as the Edmonton Institute for Community Research (EICR) - which acts as its community-friendly coordinating hub, enhancing access to the academic and student research talents in the applied research, information access, project collaboration, and business incubation services of CUE's Faculties of Arts, Education, Management and Science. www.concordia.ab.ca research.concordia.ab.ca/ciar To view the photo associated with this press release, please visit the following link: www.marketwire.com/library/20161202-cuecovenant1202px800.jpg.

Loading Concordia University of Edmonton collaborators
Loading Concordia University of Edmonton collaborators