Search
Now showing items 1-10 of 21
Angiotensin-I-converting enzyme and prolyl endopeptidase inhibitory peptides from marine processing by-products
(2011)
Like many natural resource-based processing industries, the seafood processing sector gives
rise to a significant volume of organic waste, Environmental issues, economic concerns and
legal restrictions regarding the ...
Deploying enterprise solutions to the cloud - issues and vulnerabilities
(2012)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...
Synthesis and characterisation of novel astaxanthin metal complexes
(2015-10)
Astaxanthin is produced in a wide range of organisms, its extractability from the native
Irish brown crab (Cancer pagurus) was carried out using glacial acetic acid. The
extractable natural astaxanthin yield is quantified ...
An augmented penetration testing framework for Mobile Devices on 802.11 ac Wireless Networks
(2015-05)
In combination with the rapid growth of mobile device ownership worldwide and some reported high profile cybersecurity issues, rigorous security testing techniques are required to ensure that sensitive corporate and domestic ...
A comparison between Cloud Solutions with focus on DevOps tooling
(2015-05)
The DevOps philosophy keeps gaining popularity due to its practices that allow
companies to quickly deliver software changes to their customers. Along with this
advent, Cloud Solutions continue to expand their customer ...
Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation
(2010)
This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited ...
Threat modelling for legacy enterprise applications
(2013)
Legacy enterprise applications provide unique challenges for software security personnel. The
size and historical nature of these systems can result in vulnerabilities that do not have the
appropriate countermeasures ...
Fingerprint watermarking using svd and dwt based steganography to enhance security
(2015-09-15)
Identification of persons by way of biometric features has evolved significantly over the
years. During this time, biometric recognition has received much attention due to its need
for security. Amongst the many existing ...
Characterisation and investigation of alginate dressings containing hydrogen peroxide for the promotion of wound healing
(2011)
The care of chronic wounds carries a heavy financial burden on the healthcare industry,
with billons being spent annually on their treatment. This, coupled with a decreased
quality of life for sufferers, has led to an ...