Now showing items 8771-8790 of 16815

    • The k-best paths in Hidden Markov Models. Algorithms and Applications to Transmembrane Protein Topology Recognition. 

      Golod, Daniil (University of Waterloo, 2009-08-26)
      Traditional algorithms for hidden Markov model decoding seek to maximize either the probability of a state path or the number of positions of a sequence assigned to the correct state. These algorithms provide only a ...
    • A k-Conjugacy Class Problem 

      Roberts, Collin (University of Waterloo, 2007-09-07)
      In any group G, we may extend the definition of the conjugacy class of an element to the conjugacy class of a k-tuple, for a positive integer k. When k = 2, we are forming the conjugacy classes of ordered pairs, when k ...
    • K-theory for C*-Algebras and for Topological Spaces 

      Xiao, Rui Philip (University of Waterloo, 2015-04-27)
      K-theory is the study of a collection of abelian groups that are invariant to C*-algebras or to locally compact Hausdorff spaces. These groups are useful for distinguishing C*-algebras and topological spaces, and they are ...
    • Kalman Filter Based Sensor Placement For Burgers Equation 

      Zonov, Stanislav (University of Waterloo, 2019-06-03)
      The algorithm used for determining sensor placement in this thesis will be based on the Kalman filter. This filter is very famous and its application are numerous - some examples include aircraft navigation, finance and ...
    • Keeping it simple. Short stories written by the young generation in post-war Germany. 

      Baumann, Julia (University of Waterloo, 2017-08-30)
      This thesis deals with selected short stories written by the so-called “young generation” in post-war Germany. To emphasize the importance of the historical, social and political background for the popularity of the short ...
    • Keeping Up With the Joneses: Electricity Consumption, Publicity and Social Network Influence in Milton, Ontario 

      Deline, Mary Elizabeth (University of Waterloo, 2010-05-21)
      Abstract This study used an exploratory research focus to investigate if making electricity consumption public and subject to social norms and networks resulted in consumption decreases for households in Milton, Ontario. ...
    • Kernel Methods and Measures for Classification with Transparency, Interpretability and Accuracy in Health Care 

      Carrington, André (University of Waterloo, 2018-09-05)
      Support vector machines are a popular method in machine learning. They learn from data about a subject, for example, lung tumors in a set of patients, to classify new data, such as, a new patient’s tumor. The new tumor is ...
    • Kernel Methods in Computer-Aided Constructive Drug Design 

      Wong, William Wai Lun (University of Waterloo, 2009-05-14)
      A drug is typically a small molecule that interacts with the binding site of some target protein. Drug design involves the optimization of this interaction so that the drug effectively binds with the target protein while ...
    • Kernelized Supervised Dictionary Learning 

      Jabbarzadeh Gangeh, Mehrdad (University of Waterloo, 2013-04-25)
      The representation of a signal using a learned dictionary instead of predefined operators, such as wavelets, has led to state-of-the-art results in various applications such as denoising, texture analysis, and face ...
    • Key Agreement over Wiretap Models with Non-Causal Side Information 

      Zibaeenejad, Ali (University of Waterloo, 2012-06-20)
      The security of information is an indispensable element of a communication system when transmitted signals are vulnerable to eavesdropping. This issue is a challenging problem in a wireless network as propagated signals ...
    • Key Compression for Isogeny-Based Cryptosystems 

      Leonardi, Christopher (University of Waterloo, 2016-04-21)
      We present a method for key compression in quantum-resistant isogeny-based cryptosystems, which reduces storage and transmission costs of per-party public information by a factor of two, with no effect on the security level ...
    • Key establishment --- security models, protocols and usage 

      Ustaoglu, Berkant (University of Waterloo, 2008-07-30)
      Key establishment is the process whereby two or more parties derive a shared secret, typically used for subsequent confidential communication. However, identifying the exact security requirements for key establishment ...
    • Key Randomization Countermeasures to Power Analysis Attacks on Elliptic Curve Cryptosystems 

      Ebeid, Nevine Maurice (University of Waterloo, 2007-04-25)
      It is essential to secure the implementation of cryptosystems in embedded devices agains side-channel attacks. Namely, in order to resist differential (DPA) attacks, randomization techniques should be employed to ...
    • Keyframe-based monocular SLAM: design, survey, and future directions 

      Younes, Georges; Asmar, Daniel; Shammas, Elie; Zelek, John (Elsevier, 2017-12-01)
      Extensive research in the field of monocular SLAM for the past fifteen years has yielded workable systems that found their way into various applications in robotics and augmented reality. Although filter-based monocular ...
    • The Keystone XL Pipeline Dispute: A Strategic Analysis 

      Payganeh, Sevda (University of Waterloo, 2013-09-03)
      TransCanada Corporation has proposed the Keystone XL pipeline project to transfer crude bitumen from the oil sand fields in northern Alberta, Canada, to oil refineries located in the southern part of the United States. ...
    • The Kijiji Kit: A Slum Upgrading Strategy for Nairobi, Kenya 

      Kim, Lily (University of Waterloo, 2008-01-25)
      This thesis is sited in Mukuru-Kwa-Njenga, a slum community in Nairobi, Kenya. Like many others around the world, this community faces issues of health, sanitation, mobility, and basic services. Through the investigation ...
    • KimiaNet: Training a Deep Network for Histopathology using High-Cellularity 

      Riasatian, Abtin (University of Waterloo, 2020-09-11)
      With the recent progress in deep learning, one of the common approaches to represent images is extracting deep features. A primitive way to do this is by using off-the-shelf models. However, these features could be improved ...
    • Kinematic and three-dimensional dynamic modeling of a biped robot 

      Khajepour, Amir; Hashemi, Ehsan (Sage, 2017-03-01)
      This article focuses on inverse kinematic formulation and dynamic modeling of the Nao biped robot's lower body, accompanied by verification with the joints' angles as experimental data. Dynamic modeling in two different ...
    • Kinematic Templates: Guiding Cursor Movement in End-User Drawing Tools 

      Fung, Richard Hai-Ping (University of Waterloo, 2009-08-26)
      This thesis presents kinematic templates, end-user drawing tools that influence the mouse cursor's movement within specific areas of a digital canvas. Two types of kinematic templates influence the cursor's movement: ...
    • Kinematic variability in repetitive occupational tasks as an individual trait from different motor control perspectives 

      Oomen, Nathalie (University of Waterloo, 2022-07-06)
      Recent ergonomic research suggests that individuals with low motor variability (repeaters) are at higher risk of developing work-related musculoskeletal disorders than individuals with high motor variability (replacers) ...

      UWSpace

      University of Waterloo Library
      200 University Avenue West
      Waterloo, Ontario, Canada N2L 3G1
      519 888 4883

      All items in UWSpace are protected by copyright, with all rights reserved.

      DSpace software

      Service outages