Search
Now showing items 11-20 of 28
Threat modelling for legacy enterprise applications
(2013)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...
Dynamically Extending the Reach of Wireless Networks in Determining Movement of Individuals Between Cells
(2011-06-22)
Location Based Systems are now a ubiquitous part of
everyday life, seamlessly assisting us in everything we do from
driving our cars to finding a cab, even preventing us missing our
bus or train stop when oversleeping ...
Fingerprint watermarking using svd and dwt based steganography to enhance security
(2015-09-15)
Identification of persons by way of biometric features has evolved significantly over the
years. During this time, biometric recognition has received much attention due to its need
for security. Amongst the many existing ...
Characterisation and investigation of alginate dressings containing hydrogen peroxide for the promotion of wound healing
(2011)
The care of chronic wounds carries a heavy financial burden on the healthcare industry,
with billons being spent annually on their treatment. This, coupled with a decreased
quality of life for sufferers, has led to an ...
High performance liquid chromatography method development and chemometric analysis of ecstasy and cocaine
(2011)
Consumption of illegal drugs of abuse remains a major social issue aligned with a
global law-enforcement priority. Forensic analysts are faced with the challenge of
continually developing sophisticated methods of ...
Performance comparison of enterprise applications on mobile operating systems
(Telkomnika, 2011-12)
Due to the advances in mobile phone technology, Smartphones have the ability to access web services within applications the user interacts with to retrieve and send information from and to web services. As Smartphones have ...
A preliminary exploration of database performance for use with ‘big data’ projects in the aviation industry
(2014)
This thesis will demonstrate the effectiveness of processing data for the airline industry using both a MariaDB and MongoDB database. Conclusions will be drawn on pertinent issues such as the performance of processing large ...
Stealth analysis of Network Topology using Spanning Tree Protocol
(2015-05)
Almost every network over the last 30 years is built on Spanning Tree Protocol (STP). This protocol makes topology information available to individual switches by exchanging Bridge Protocol Data Units (BPDUs) containing ...
The interaction between A20 and the NR4A subfamily of nuclear receptors in the pathogenesis of rheumatoid arthritis
(2011)
Rheumatoid arthritis (RA) is a chronic, progressive inflammatory disease that affects nearly 1 %
of the world’s population. RA is characterized by inflammation of the synovial joints leading to
joint damage which can ...
Teaching java programming using cable in a collaborative online environment
(Institute of Advanced Engineering and Science (IAES), 2012-07)
With the emergence and evolution of computer hardware, software and networks - virtual classrooms now exist which enable teachers and students to experience learning activities and to work together at a distance either ...