Search
Now showing items 21-30 of 40
Evaluating techniques of finding a path in a dynamic digital search domain
(2009)
Moving from one point to another in an efficient yet effective manner has always been a
problem for people. The same problem can be related to mathematical graph theory,
where moving from one co-ordinate to another ...
Performance comparison of enterprise applications on mobile operating systems
(Telkomnika, 2011-12)
Due to the advances in mobile phone technology, Smartphones have the ability to access web services within applications the user interacts with to retrieve and send information from and to web services. As Smartphones have ...
A preliminary exploration of database performance for use with ‘big data’ projects in the aviation industry
(2014)
This thesis will demonstrate the effectiveness of processing data for the airline industry using both a MariaDB and MongoDB database. Conclusions will be drawn on pertinent issues such as the performance of processing large ...
Stealth analysis of Network Topology using Spanning Tree Protocol
(2015-05)
Almost every network over the last 30 years is built on Spanning Tree Protocol (STP). This protocol makes topology information available to individual switches by exchanging Bridge Protocol Data Units (BPDUs) containing ...
Factors affecting the concentration of domoic acid in scallop, pecten maximus
(2006)
Domoic acid, a neurotoxin produced by some Pseudo-nitzschia species, can accumulate
in shellfish, consumption of which can result in Amnesic Shellfish Poisoning. Since its
detection in Irish king scallop, Pecten maximus, ...
The interaction between A20 and the NR4A subfamily of nuclear receptors in the pathogenesis of rheumatoid arthritis
(2011)
Rheumatoid arthritis (RA) is a chronic, progressive inflammatory disease that affects nearly 1 %
of the world’s population. RA is characterized by inflammation of the synovial joints leading to
joint damage which can ...
Teaching java programming using cable in a collaborative online environment
(Institute of Advanced Engineering and Science (IAES), 2012-07)
With the emergence and evolution of computer hardware, software and networks - virtual classrooms now exist which enable teachers and students to experience learning activities and to work together at a distance either ...
Traffic isolation techniques in securing multi-tenant virtual environments
(2015-01)
A fundamental function of almost any network is to ensure that certain types of traffic are kept isolated from other traffic in the network. With multi-tenant environments such as datacentres and the cloud providing isolation ...
Comparing the performance of enterprise applications on limited operating systems
(2012-09)
These days a Smartphone is just as important as a computer. It is essential that
users select a device that has the best performance possible. This thesis used simulation
to compare the performance of an application on ...
Legal, ethical & social issues in the case of an intrusive remote monitoring software
(The Institute of Advanced Engineering and Science, 2012-10)
In 2008, a laptop was stolen from a high school student in the USA. The laptop was being monitored by remote recovery software. The thief sold the laptop in question to another student who in turn sold it to a teacher. The ...