Browsing School of Science LYIT by Title
Now showing items 33-40 of 40
-
Searchable symmetric encryption (sse): a mechanism for searching symmetrically encrypted data stored in the Cloud
(Letterkenny Institute of Technology, 2015-08) -
Stealth analysis of Network Topology using Spanning Tree Protocol
(Letterkenny Institute of Technology, 2015-05)Almost every network over the last 30 years is built on Spanning Tree Protocol (STP). This protocol makes topology information available to individual switches by exchanging Bridge Protocol Data Units (BPDUs) containing ... -
Synthesis and characterisation of novel astaxanthin metal complexes
(Letterkenny Institute of Technology, 2015-10)Astaxanthin is produced in a wide range of organisms, its extractability from the native Irish brown crab (Cancer pagurus) was carried out using glacial acetic acid. The extractable natural astaxanthin yield is quantified ... -
Synthesis and characterisation of some osmium and ruthenium complexes and the application of Os(bpy)2-(pyridine-4-COOH)-CI in an electrochemical DNA biosensor
(Letterkenny Institute of Technology, 2008)This thesis details the synthesis and characterisation of seven osmium and ruthenium bipyridyl complexes, reports on their electrochemical characteristics and outlines an application for one of the synthesised complexes ... -
Teaching java programming using cable in a collaborative online environment
(Institute of Advanced Engineering and Science (IAES), 2012-07)With the emergence and evolution of computer hardware, software and networks - virtual classrooms now exist which enable teachers and students to experience learning activities and to work together at a distance either ... -
Threat modelling for legacy enterprise applications
(Letterkenny Institute of Technology, 2013)Legacy enterprise applications provide unique challenges for software security personnel. The size and historical nature of these systems can result in vulnerabilities that do not have the appropriate countermeasures ... -
To Wireless Fidelity and Beyond - CAPTURE, Extending Indoor Positioning Systems
(IEEE, 2014-10-24)The benefits of context aware computing and specifically the context that location can provide to applications and systems has been heavily documented in recent times. Moreover the move from traditional outdoor ... -
Traffic isolation techniques in securing multi-tenant virtual environments
(Letterkenny Institute of Technology, 2015-01)A fundamental function of almost any network is to ensure that certain types of traffic are kept isolated from other traffic in the network. With multi-tenant environments such as datacentres and the cloud providing isolation ...