Browsing School of Science LYIT by Issue Date
Now showing items 21-40 of 40
-
Comparing the performance of enterprise applications on limited operating systems
(Letterkenny Institute of Technology, 2012-09)These days a Smartphone is just as important as a computer. It is essential that users select a device that has the best performance possible. This thesis used simulation to compare the performance of an application on ... -
Legal, ethical & social issues in the case of an intrusive remote monitoring software
(The Institute of Advanced Engineering and Science, 2012-10)In 2008, a laptop was stolen from a high school student in the USA. The laptop was being monitored by remote recovery software. The thief sold the laptop in question to another student who in turn sold it to a teacher. The ... -
Threat modelling for legacy enterprise applications
(Letterkenny Institute of Technology, 2013)Legacy enterprise applications provide unique challenges for software security personnel. The size and historical nature of these systems can result in vulnerabilities that do not have the appropriate countermeasures ... -
Cooperatively Extending the Range of Indoor Localisation
(IET, 2013-06-17)̶Whilst access to location based information has been mostly possible in the outdoor arena through the use of GPS, the provision of accurate positioning estimations and broad coverage in the indoor environment has proven ... -
Investigation of indoor positioning based on WLAN 802.11
(Letterkenny Institute of Technology, 2013-08)The need for location based services has dramatically increased within the past few years, especially with the popularity and capability of mobile device such as smart phones and tablets. The limitation of GPS for indoor ... -
A preliminary exploration of database performance for use with ‘big data’ projects in the aviation industry
(Letterkenny Institute of Technology, 2014)This thesis will demonstrate the effectiveness of processing data for the airline industry using both a MariaDB and MongoDB database. Conclusions will be drawn on pertinent issues such as the performance of processing large ... -
To Wireless Fidelity and Beyond - CAPTURE, Extending Indoor Positioning Systems
(IEEE, 2014-10-24)The benefits of context aware computing and specifically the context that location can provide to applications and systems has been heavily documented in recent times. Moreover the move from traditional outdoor ... -
CAPTURE - Cooperatively Applied Positioning Techniques Utilizing Range Extensions
(IEEE, 2014-10-27)The most commonly implemented Indoor Location Based Solution uses existing Wi-Fi network components to locate devices within its range. While this technique offers obvious economic rewards by utilizing a preinstalled ... -
Traffic isolation techniques in securing multi-tenant virtual environments
(Letterkenny Institute of Technology, 2015-01)A fundamental function of almost any network is to ensure that certain types of traffic are kept isolated from other traffic in the network. With multi-tenant environments such as datacentres and the cloud providing isolation ... -
An implementation and evaluation of PCI DSS 3.0 for E-Commerce in a testing environment
(Letterkenny Institute of Technology, 2015-03)Threats to personal payment card information are continually on the rise. To implement a formal process for protecting this information PCI DSS was created. However credit card fraud is still rising. This leads to the ... -
An augmented penetration testing framework for Mobile Devices on 802.11 ac Wireless Networks
(Letterkenny Institute of Technology, 2015-05)In combination with the rapid growth of mobile device ownership worldwide and some reported high profile cybersecurity issues, rigorous security testing techniques are required to ensure that sensitive corporate and domestic ... -
A comparison between Cloud Solutions with focus on DevOps tooling
(Letterkenny Institute of Technology, 2015-05)The DevOps philosophy keeps gaining popularity due to its practices that allow companies to quickly deliver software changes to their customers. Along with this advent, Cloud Solutions continue to expand their customer ... -
Stealth analysis of Network Topology using Spanning Tree Protocol
(Letterkenny Institute of Technology, 2015-05)Almost every network over the last 30 years is built on Spanning Tree Protocol (STP). This protocol makes topology information available to individual switches by exchanging Bridge Protocol Data Units (BPDUs) containing ... -
Improving compliance with Bluetooth device detection
(Letterkenny Institute of Technology, 2015-05)Attributed to Joshua Wright (2012) “Security will not get better until tools for practical exploration of the attack surface are made available”. With Bluetooth enabled but discovery mode turned off, auditing for Bluetooth ... -
Malware analysis and antivirus signature creation
(Letterkenny Institute of Technology, 2015-05)The rapid advances social media, educational tools and communications platforms available today have expanded the attack landscape through which the malicious user can propagate their work can carry out damaging attacks. ... -
Searchable symmetric encryption (sse): a mechanism for searching symmetrically encrypted data stored in the Cloud
(Letterkenny Institute of Technology, 2015-08) -
Fingerprint watermarking using svd and dwt based steganography to enhance security
(Letterkenny Institute of Technology, 2015-09-15)Identification of persons by way of biometric features has evolved significantly over the years. During this time, biometric recognition has received much attention due to its need for security. Amongst the many existing ... -
Synthesis and characterisation of novel astaxanthin metal complexes
(Letterkenny Institute of Technology, 2015-10)Astaxanthin is produced in a wide range of organisms, its extractability from the native Irish brown crab (Cancer pagurus) was carried out using glacial acetic acid. The extractable natural astaxanthin yield is quantified ... -
Exploring early year educators' perspectives of outdoors play
(2020-08)Acknowledgement of outdoor play affordances, positively supports children’s health, wellbeing, learning and development. There has been a visible diminishing of opportunities for children’s outdoor play in recent years. ... -
Effects of a fall on the quality of life of someone over the age of 65
(2020-08)Background: Care of the older person will become more important in the future due to the expected increase in this area of the population. Falls and fall related injuries are the most comm on cause of admission to ...