BCIT Citations Collection | BCIT Institutional Repository

BCIT Citations Collection

Pages

Linking education and research
Proceedings of 2010 IEEE Transforming Engineering Education: Creating Interdisciplinary Skills for Complex Global Environments, Dublin, Ireland, 6-9 April 2010. Most engineering careers will require engineers to work in multi-disciplinary teams. It is necessary for post-secondary institutions to provide opportunities for engineering students to work in multi-disciplinary teams during their education so that they can function and thrive in these environments upon graduation. One model for introducing and sustaining multi-disciplinary engineering education has been to link a number of the British Columbia Institute of Technology's (BCIT) engineering and technology capstone projects with the hub of multi-disciplinary researchers at the BCIT Technology Centre., Conference paper, Published.
A logical approach to promoting trust over knowledge to trust over action
Proceedings of 2016 14th Annual Conference on Privacy, Security and Trust (PST) in Auckland, New Zealand 12-14 Dec. 2016. We discuss two related forms of trust. One form of trust is related to the perceived knowledge of other agents; we accept the information that another agent provides if we believe they have sufficient expertise in a particular domain. The second form is related to action; we trust another agent to act on our behalf if we believe they will choose acceptable actions. In this paper, we explore the relationship between these two forms of trust. In particular, we use an existing model of trust to demonstrate how trust over knowledge can determine when trust over actions is appropriate. We take a formal approach to this problem, using logic-based tools for representing and reasoning about actions and beliefs to characterize trust over action. While our primary aim is to develop a formal methodology that permits trust over actions to be defined in terms of trust over knowledge, we also consider applications that are both practical and speculative. On the practical side, we consider how our methods can be used to reason about trusted third parties in communication protocols. On the speculative side, we suggest that models of trust have a role to play in the development of ethical decision-making agents., Conference paper, Published.
Low voltage distribution substation integration in smart Microgrid
Proceeding of IEEE 8th Conference on PowerElectronics, Jeju Island, South Korea, June 2011. A strategy is proposed to introduce a limited set of monitoring and control functions into a legacy low voltage distribution substation, and as such integrate it into a larger command and control architecture of a smart Microgrid. The focus of the work shall be on the retrofit strategy of some of the key components for measurement, monitoring, protection and control systems of the substation. Also Volt/VAR optimization of the feeder shall be considered as a part of the design. The article discusses the structure of the substation under study, followed by the actual design of IEC 61850 subsystems for the substation. A simulation model of the pilot project and its results is also included in the paper., Conference paper, Published.
Measuring gene expression noise in early drosophila embryos
Proceedings of the International Conference on Computational Science, ICCS 2012. In recent years the analysis of noise in gene expression has widely attracted the attention of experimentalists and theoreticians. Experimentally, the approaches based on in vivo fluorescent reporters in single cells appear to be straightforward and effective tools for bacteria and yeast. However, transferring these approaches to multicellular organisms presents many methodological problems. Here we describe our approach to measure between-nucleus variability (noise) in the primary morphogenetic gradient of Bicoid (Bcd) in the precellular blastoderm stage of fruit fly (Drosophila) embryos. The approach is based on the comparison of results for fixed immunostained embryos with observations of live embryos carrying fluorescent Bcd (Bcd-GFP). We measure the noise using two-dimensional Singular Spectrum Analysis (2D SSA). We have found that the nucleus-to-nucleus noise in Bcd intensity, both for live (Bcd-GFP) and for fixed immunstained embryos, tends to be signal-independent. In addition, the character of the noise is sensitive to the nuclear masking technique used to extract quantitative intensities. Further, the method of decomposing the raw quantitative expression data into a signal (expression surface) and residual noise affects the character of the residual noise. We find that careful masking of confocal images and use of appropriate computational tools to decompose raw expression data into trend and noise makes it possible to extract and study the biological noise of gene expression., Conference paper, Published.
Mechanical properties of low-strength concrete blocks simulating construction in developing countries
Proceedings of the 12th North American Masonry Conference in Boulder, Colorado, May 17-20th, 2015. It is believed that one of the causes for unacceptably high death toll in the 2010 Haiti earthquake was due to use of low-strength hollow concrete blocks for masonry construction. After the earthquake, a team of BCIT faculty and students started to work on developing a low-cost nondestructive testing device for strength evaluation of concrete blocks which could be used in Haiti and other countries. The concept is based on the relationship between the compressive strength and the corresponding resonant frequency determined when a block is subjected to a mild impact. A simple block mould procured from Haiti was used to manufacture units with varying mix proportions typical of low-to medium-strength concrete blocks. In total, more than 70 concrete blocks and companion cylinders were made using13 different mix proportions to determine the compressive strength and other mechanical properties., Conference paper, Published.
Mobile forensics for cloud data
Proceedings of 2016 14th Annual Conference on Privacy, Security and Trust (PST) in Auckland, New Zealand, 12-14 Dec. 2016. Forensic examinations of a mobile phone that consider only the internal memory can miss potentially vital data that is accessible from the device, but not stored locally. In this paper, we look at a forensic tool that is able to download data stored on the cloud, using credentials gleaned from device extractions. Through experimention with a variety of devices and configurations, we examine the effectiveness of the software for its stated purpose. The results suggest that we are able to obtain information from the cloud in this manner, but only under some relatively strong assumptions. Practical issues and legal considerations are discussed., Conference paper, Published.
MobiSense
Proceedings of Rehabilitation Engineering and Assistive Technology Society of North America Annual Conference 2014. Mobile devices such as phones and tablets are now ubiquitous and have become important tools in our daily lives. Our activities and behaviours are becoming increasingly coupled to these new devices with their ever improving sensor technologies. With current devices, mobility patterns and physical activity levels are particularly amenable to inference and analysis by leveraging the integration of GPS, accelerometers, and other sensors. Coupled with feedback through display screens, speakers, and vibration, mobile technology has reached a level of sophistication that it now presents as an attractive platform for assistive technology research and health-related applications. [...] The general goals of the MobiSense project are: 1) to collect mobility data in a simple to use manner; 2) to provide easily accessible summaries and analysis of daily behaviours; and 3) to enable further research and development by providing a sandbox environment for rapid prototyping and experimentation. The specific objectives of the research reported here are to leverage mobile data collection technology and centralized analysis to detail a wheelchair user's daily activity; thus, we developed a system based on Android phones, cloud computing and storage services, and custom web services., Conference paper, Published.
Motivating high school girls to study computer science
This research study aims to identify design strategies, instructional models and technological tools (e.g., educational games) that can be used to motivate high school girls to pursue computer science (CS) education. Part of this study, an educational game CodeBlock intended to teach basic programming, was designed and implemented for HoloLens devices. This study evaluates to what extent participating in a coding workshop consisting of a set of coding exercises and the CodeBlock game play could increase the interest of high school girls in CS. The workshop is conducted by undergraduate students who were involved in the design and implementation of the game, which has an additional benefit of exposing young girls to technologies implemented by post-secondary students, thus increasing the chances they will pursue post-secondary education in CS related fields., Not peer reviewed, Conference proceedings
Multi-agent control system for real-time adaptive VVO/CVR in Smart Substation
Proceedings of IEEE Electrical Power And Energy Conference, London, Ontario, Oct. 2012. This paper proposes a multi-agent based control system for real-time and adaptive Volt/VAR Optimization (VVO) and Conservation Voltage Reduction (CVR) in Smart Substations. The design and implementation of the proposed distributed control system using agent technology is discussed in the paper. Furthermore, the architecture, tasks and limits of each Intelligent Agent (IA) as a component of a multi-agent system (MAS) have been explained. A number of control functions are simulated and the results are presented in the paper. The results obtained demonstrate the potential of MAS for improving the efficiency of the system., Conference paper, Published.
The need for an accurate indoor humidity model for building envelope performance analysis
Proceedings of the Fourth International Building Physics Conference: Energy Efficiency and New Approaches: 15 June 2009, Istanbul, Turkey. The performance of a building envelope component is usually assessed based on the moisture analysis of individual components (such as cladding, sheathing board and/or drywall) for their drying potentials and likelihood of occurrence of problems associated with high moisture accumulation. In the current building envelope simulation practice, the indoor and outdoor boundary conditions are predefined in the context of the local weather data. The indoor boundary conditions are usually assumed to be constant throughout the simulation period, or two sets of values for the summer and winter periods are assumed. Although the outdoor boundary condition (weather data) is independent of the hygrothermal condition of the envelope, the indoor condition is highly influenced by the building enclosure and occupants? activities. Consequently, simplistic assumptions of indoor humidity profiles, which ignore the dynamic coupling of the indoor environment and building enclosure and represented with a set of empirical values, may lead to inaccurate conclusion about the moisture performance of the building enclosure. In this paper, the effects of indoor humidity profiles that are assumed during moisture performance evaluation of exterior building envelope component are analyzed. The indoor humidity profiles, which are considered in the study, are based on measured and simulated data of a real house. Indoor humidity models including a whole building hygrothermal model are used to generate four indoor humidity profiles. The hygrothermal dynamic responses of the building envelope component with respect to the various cases of indoor humidity assumptions are simulated and analyzed. The simulation results suggest that it is important to have more accurate indoor boundary conditions data, which are based on measurement or whole building hygrothermal modelling, to satisfactorily asses the moisture performance of a building enclosure and potential occupants health problems related to mould growth., Peer reviewed article, Published.
On keeping secrets
Proceedings of the 2015 Workshops at the Twenty-Ninth AAAI Conference on Artificial Intelligence in Austin, USA, 2015. Communication involves transferring information from one agent to another. An intelligent agent, either human or machine, is often able to choose to hide information in order to protect their interests. The notion of information hiding is closely linked to secrecy and dishonesty, but it also plays an important role in domains such as software engineering. In this paper, we consider the ethics of information hiding, particularly with respect to intelligent agents. In other words, we are concerned with situations that involve a human and an intelligent agent with access to different information. Is the intelligent agent justified in preventing a human user from accessing the information that they possess? This is trivially true in the case where access control systems exist. However, we are concerned with the situation where an intelligent agent is able to using a reasoning system to decide not to share information with all humans. On the other hand, we are also concerned with situations where humans hide information from machines. Are we ever under a moral obligation to share information with a computional agent? We argue that questions of this form are increasingly important now, as people are increasingly willing to divulge private information to machines with a great capacity to reason with that information and share it with others., Conference paper, Published.
On the representation and verification of cryptographic protocols in a theory of action
Proceedings of 2010 Eighth Annual International Conference on Privacy Security and Trust (PST) in Ottawa, ON, Canada, 17-19 Aug. 2010. Cryptographic protocols are usually specified in an informal, ad hoc language, with crucial elements, such as the protocol goal, left implicit. We suggest that this is one reason that such protocols are difficult to analyse, and are subject to subtle and nonintuitive attacks. We present an approach for formalising and analysing cryptographic protocols in a theory of action, specifically the situation calculus. Our thesis is that all aspects of a protocol must be explicitly specified. We provide a declarative specification of underlying assumptions and capabilities in the situation calculus. A protocol is translated into a sequence of actions to be executed by the principals, and a successful attack is an executable plan by an intruder that compromises the specified goal. Our prototype verification software takes a protocol specification, translates it into a high-level situation calculus (Golog) program, and outputs any attacks that can be found. We describe the structure and operation of our prototype software, and discuss performance issues., Conference paper, Published.

Pages