Browsing Computing by Title
Now showing items 141-160 of 304
-
ICT in rural New Zealand: The Miranda case
(2007)The research question for this masters project was what are the impacts of ICT provision in Miranda as an example of rural NZ? In order to answer this question firstly the ICT provision in Miranda needed to be assessed. ... -
Identification of queen-less beehives using signal enhancement techniques and neural networks
(2021)Beekeeping has a long history of about 180 years in New Zealand. The first group of honey bees introduced has expanded to approximately one million registered beehives by now. An increasing number of residents have been ... -
The impact of human shadowing/movement on performance of 802.11ac client-to-server WLAN
(University of Bahrain (Zallaq, Bahrain), 2019-05-01)This paper investigates the impact of human movement on 802.11ac WLAN performance using IPv4, IPv6, TCP and UDP protocols. The results show that on average, the TCP and UDP on WLAN with human movement has a lower throughput ... -
Impact of IPSec security on VoIP in different environments
(2017-07)In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ... -
Impact of IPSec security on VoIP in different environments
(Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)In this paper, the performance of VoIP on IPv4, IPv6 and 6in4 protocol with and without IPsec is compared. RTT (Round Trip Time), Throughput, Jitter and CPU usage are compared in VoIP networks. The results for throughput ... -
The impact of mobile devices on SMEs in Auckland, New Zealand
(2008)Business is selling goods and services to customers (Thefreedictionary, 2008). Wholesale Small and Medium Enterprises (SMEs) are doing business and having the latest information is very important for their business. The ... -
Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN
(Institute of Electrical and Electronics Engineers (IEEE), 2017-07-04)In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ... -
Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN
(2017-07)In this paper, wireless 802.11ac client-server network with open system (no security) and WPA2 (Wi-Fi Protected Access 2) security is investigated. The results shows that, by implementing WPA2 security, TCP throughput of ... -
Impact of SSL Security on bandwidth and delay in IEEE 802.11n WLAN Using Windows 7
(Institute of Electrical and Electronics Engineers (IEEE), 2016-07-22)IPSec (IP Security) and SSL (Secure Socket Layer) are the main technologies for securing communications via the Internet. In this paper, we present new results on the performance of SSL using Windows 7 operating system ... -
The impact of wireless LAN security on performance for different windows operating systems
(Institute of Electrical and Electronics Engineers (IEEE), 2008-07-09)This paper investigates the impact of various encryption techniques (WEP-64, WEP-128 and WPA) on performance of wireless LANs for Windows operating systems (Windows Server 2003, Windows XP and Windows Vista) and for both ... -
Impacts, changes, and technical issues that arise when introducing an online learning tool in a tertiary educational organisation
(2011)The introduction and use of online learning tools have been on the increase over the last decade. Educational organisations all over the world have implemented online learning to improve the accessibility to study from ... -
Implementation of evolutionary algorithms for deep architectures
(CEUR Workshop Proceedings, 2014-11)Deep learning is becoming an increasingly interesting and powerful machine learning method with successful applications in many domains, such as natural language processing, image recognition, and hand-written character ... -
Improved learning through peer tutoring in a declarative programming course
(Global Business and Technology Association, 2014-07)A method of peer tutoring was used and evaluated in an introductory programming course in Haskell. Students were paired on the basis of skill level with pairings opposite those suggested by the existing literature. This ... -
Improving network performance : an evaluation of TCP/UDP on networks
(2014)Computer networks are complex - they are a heterogeneous environment in which numerous services, such as electronic mail, web browsing, voice and multimedia data, traverse the globe daily. The needs and demands of end users ... -
Improving the understandability of artifact-centric workflows using BPMN with extensions
(2015)Since 2003 the enterprises have accelerated research in this approach through development of methods, tools and other technologies in support of the artifact-centric approach. The artifact-centric approach is expected to ... -
Incorporating a code review process into the assessment
(2007)This paper describes an action research process, which is used to implement the Code Review Process (CRP). The CRP was used as one of the assessment methods in a third year undergraduate Web Application Development course. ... -
Increasing self-compassion in young people through virtual reality
(2019-10)As part of our proposal, we aim to: provide increased practice/exposure and target a younger audience increase the chance of generalisation to everyday life employ better VR visualisation, e.g. assigning more ... -
Incremental and decremental max-flow for online semi-supervised learning
(Institute of Electrical and Electronics Engineers (IEEE), 2016-04-13)Max-flow has been adopted for semi-supervised data modelling, yet existing algorithms were derived only for the learning from static data. This paper proposes an online max-flow algorithm for the semi-supervised learning ... -
Incremental and parallel learning algorithms for data stream knowledge discovery
(2018-02)Incremental and parallel are two capabilities for machine learning algorithms to accommodate data from real world applications. Incremental learning addresses streaming data by constructing a learning model that is updated ... -
The Influence of WPA2 Security on the UDP performance of IPv4 and IPv6 Using 802.11n WLAN in Windows 7-Windows 2008 environment
(Institute of Electrical and Electronics Engineers (IEEE), 2011-02-16)The impact of WPA2 security-bandwidth trade-off for IPv4 and IPv6 on wireless 802.11n network implementing Windows 7-Windows Server 2008 is investigated. The highest point of difference between open system and WPA2 for UDP ...