Browsing Faculty of Graduate Studies Online Theses by Title
Now showing items 6266-6285 of 7662
-
Seasonal and interannual variability of sea temperature and surface heat fluxes in the northwest Atlantic.
(Dalhousie University, 1992) -
SEASONAL VARIABILITY OF TOTAL SUSPENDED MATTER IN MINAS BASIN, BAY OF FUNDY
(2013-08-22)Total suspended matter (TSM) concentrations were derived from ocean colour imagery (MERIS data) in Minas Basin. Analysis of time series of TSM in 1-km2 pixel boxes throughout the Basin revealed an annual cycle in TSM in ... -
Seasonal variation and biological effects on mudflat erodibility in the Minas Basin, Bay of Fundy
(2014-01-06)The goal of this study was to investigate the effects of intertidal mudflat biofilms on sediment erosion in the Minas Basin of the Bay of Fundy, Canada. From April through November 2012, sediment cores were collected ... -
SEASONAL VARIATION OF LIPID AND CAROTENOID CONTENT OF CUCUMARIA FRONDOSA VISCERA OIL AND THE DEVELOPMENT OF METHODS FOR ITS QUALITY CONTROL
(2017-07-07)Little is known about the lipids and carotenoids of the lipid extracted from sea cucumber viscera (SCV) of Cucumaria frondosa, the species harvested from Nova Scotia, Canada. Tons of SCV are discarded as a waste stream ... -
Seaweed Amendments for Reduction of Damping off Caused by Pythium ultimum
(2014-08-22)Pythium ultimum is an oomycete which causes serious economic losses in greenhouses by causing damping off disease. Ascophyllum nodosum is known to act as a nutrient supplement and its application has shown to reduce diseases ... -
SEAWEED EXTRACT AND HUMIC ACIDS BIOSTIMULANTS TO IMPROVE GROWTH AND POST-HARVEST QUALITY OF SPINACH AND LETTUCE
(2018-08-29)The leafy greens are highly perishable vegetables that are affected by pre-harvest and post-harvest conditions. Biostimulants can be utilized to enhance germination, growth, yield and quality of the crops. In this study, ... -
Second-Adam Typology and the Restoration of the Holy Spirit in Cyril of Alexandria: Reasons for His Christological Defense
(2022-08-25)The purpose of this study is to analyse the merits of a scholarly position about Cyril of Alexandria’s motivation for his Christology during the Nestorian controversy. The position holds that Cyril’s Christology was ... -
A SECONDARY ANALYSIS OF SELF-RATED HEALTH AND HEALTH SERVICE USE OF FEMALE, BISEXUAL UNDERGRADUATE STUDENTS ON MARITIME CAMPUSES
(2016-07-12)Given the limited research on the health of bisexual women, findings suggest that this population is experiencing disproportionate rates of health disparities and have less protective factors. Guided by the Prince Edward ... -
SECRECY CAPACITY IN AN ALTERNATE RELAYING WIRELESS NETWORK WITH SUPERPOSITION CODING AND SUCCESSIVE DECODING
(2023-12-14)The broadcasting characteristics of radio channels pose security vulnerabilities in wireless communication networks. This thesis explores the implementation of physical layer security (PLS) within cooperative relaying ... -
"Secretary of Everything Important": An Analysis of Maurice Hankey and his role during the wartime Asquith government, 1914-5.
(2022-08-31)Maurice Hankey, Britain’s first Cabinet Secretary, has traditionally been portrayed as an apolitical bureaucrat who helped guide but never cajoled Britain’s decision makers during the First World War. This thesis argues ... -
Secrets of the ultimate trophy fish: the physiological ecology and behaviour of white sturgeon (Acipenser transmontanus Richardson, 1836) after angling
(2019-12-16)Around the world, human activities and climate change are altering ecosystems at unprecedented rates, which in many cases is outpacing our capacity to understand and predict the potential impacts on biodiversity. Fishing ... -
Secular Decreation: Acts of Undoing in Priscilla Becker's Internal West
(2016-08-31)In the collected journal entry excerpts gathered in Gravity and Grace (1952), twentieth-century French philosopher and Christian mystic Simone Weil introduces her concept of “decreation.” Here, “decreation” refers to an ... -
Secure Digital Wallet Authentication Protocol
(2017-05-11)Digital wallets have gained popularity for secure storage of credit cards. They are time saving, secure and track the expenditure. However, with the high dependency of these wallets on client side devices, the risk of data ... -
SECURE RULE MATCHING OF SIGNATURES IN DATA TRAFFIC WITH MACHINE LEARNING APPROACHES
(2020-12-16)Due to its enormous capabilities, machine learning has been applied to various disciplines since its emergence. Cybersecurity is no exception in this regard. However, the effectiveness of machine learning classifiers comes ... -
Secure, Full-duplex multi-domain communication network for Marine Robots
(2024-04-14)The underwater channel is a difficult communications medium as its link quality depends on the highly variable seabed and water column characteristics that vary on hourly, weekly, monthly and seasonal scales. One of the ... -
Securing Multi-party Crypto Wallets
(2023-04-27)Threshold Signature Scheme (TSS) is part of the Multi-Party Computation (MPC) problem, which enables multiple parties to generate digital signatures without revealing any secret information. Avoiding a single point of ... -
THE SECURITIZATION OF HUMANITARIAN AID: A CASE STUDY OF THE DADAAB REFUGEE CAMP
(2013-11-21)This thesis examines, empirically, the securitization of aid delivery at the Dadaab refugee camps in Kenya. Through a series of semi-structured interviews with aid workers, it documents their security concerns, organizatinonal ... -
A SECURITY FRAMEWORK BASED ON FLOW MARKING IP-TRACEBACK TECHNIQUES
(2016-08-23)Distributed-Denial-Of-Service (DDoS) attacks are one of the more challenging security issues on the Internet today. They can easily exhaust the resources of the potential victims. The problem is even more exacerbated since ... -
Security Framework for Combining Confidentiality and Integrity
(2015-05-08)Radio Frequency Identification (RFID) technology represents objects uniquely in order to track their movement in the real world. To avoid an unauthorized entity tracking the object and to offer security, RFID systems require ... -
SECURITY SOLUTIONS FOR SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) NETWORKS IN INDUSTRIAL CONTROL SYSTEMS
(2023-04-13)Supervisory Control and Data Acquisition (SCADA) networks play a vital role in Industrial Control Systems (ICSs). Industrial organizations perform operations remotely through SCADA systems to accelerate their processes. ...