Search
Skip to Search Results- 1Brown, Heather
- 1Hauer, Bradley
- 1Johnson, Andrew
- 1Lotey, Harpreet
- 1MacGregor, Mike (Supervisor)
- 1Oram-Cardy, Janis
- 3Graduate and Postdoctoral Studies (GPS), Faculty of
- 3Graduate and Postdoctoral Studies (GPS), Faculty of/Theses and Dissertations
- 1Master of Science in Internetworking (MINT)
- 1Master of Science in Internetworking (MINT)/Capstone Projects & Reports (Master of Science in Internetworking (MINT))
- 1Educational Psychology, Department of
- 1Educational Psychology, Department of/Journal Articles (Educational Psychology)
-
A meta-analysis on the reading comprehension skills of individuals with autism spectrum disorders
Download2013
Brown, Heather, Oram-Cardy, Janis, Johnson, Andrew
This meta-analysis examined 36 studies comparing autism spectrum disorder (ASD) and control groups in reading comprehension. Three moderators (semantic knowledge, decoding skill, PIQ) and two text types (high vs. low social knowledge) were examined as predictors of reading comprehension in ASD....
-
Spring 2016
Algorithmic decipherment is a prime example of a truly unsupervised problem. This thesis presents several algorithms developed for the purpose of decrypting unknown alphabetic scripts representing unknown languages. We assume that symbols in scripts which contain no more than a few dozen unique...
-
2011-09-01
Internet based communication have become one of the fastest and easiest way of communication in different sectors of the world such as military, health care, educational or business sectors. Due to the privacy and security of the data VPN encryption is commonly used method to transfer the video...
-
Making Feminism Popular: Audience Interpellation in Late Post-Network Era Television (a Case Study of TNT’s THE CLOSER)
DownloadSpring 2016
This dissertation explores the serial design model of The Closer. It answers the following question: How does The Closer offer multiple entry points along a spectrum of views on gender and feminism, appeal to a range of viewers, and thus secure popularity? To generate metadata of how The...
-
Fall 2017
In the Internet of Things (IoT) era, security has increasingly become a challenge, so encryption has been widely used to protect data. Random number generators (RNGs), as an essential part of cryptographic systems, are implemented in connected devices for information security. However, inadequate...