Browsing Computing by Title
Now showing items 297-304 of 304
-
Vein pattern visualization through multiple mapping models and local parameter estimation for forensic investigation
(International Conference on Pattern Recognition (ICPR), 2014)Forensic investigation methods based on some human traits, including fingerprint, face, and palmprint, have been developed significantly, but some major aspects of particular crimes such as child pornography still lack of ... -
Virtualization and information security : a virtualized DMZ design consideration using VMware ESXi 4.1
(2012)RESEARCH QUESTION: Is it secure to implement DMZ in a virtual network infrastructure? Sub-questions: How can virtualized DMZs be implemented? Which is the most secure type of virtual DMZ? Which DMZ design ... -
Visualising vein pattern based on sparse auto-encoder algorithm
(2020)RESEARCH QUESTIONS: Q1: How is it possible to apply deep learning algorithms such as Autoencoder (AE) instead of current simple neural networks with limited capabilities for uncovering vein pattern? Q2: Can deep learning ... -
Visualising vein pattern using deep learning for forensic investigation
(2021-12)Child sexual abuse is a severe global problem that has gained public attention in recent years. Due to the popularity of digital cameras, many perpetrators take images of their sexual activities. Even though most common ... -
What are the significant factors that have influenced the adoption of Moodle by staff in a Māori tertiary institution?
(2013)The purpose of this research is to get a clear understanding of the significant factors that are influencing the adoption of a Learning Management System (LMS) by staff within a Māori tertiary institution. The LMS (Moodle) ... -
A workflow approach for a token web application specification
(2008)In our third year Web Application Development course, there is a traditional assignment, which requires the students design and develop a token web application in ASP.NET. We have been specifying such a token web application ... -
A Workflow Execution Platform for Collaborative Artifact-Centric Business Processes
(Springer Verlag, 2014)To execute an artifact-centric process model, current workflow execution approaches require it to be converted to some existing executable language (e.g., BPEL) in order to run on a workflow system. We argue that the ... -
WPA2 security-bandwith trade-off in 802.11n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems
(Institute of Electrical and Electronics Engineers (IEEE), 2012-07-01)In this paper, we present new results on the performance of IEEE 802.11n using open system (no security) and WPA2 security for Windows XP and Windows 7. Enabling WPA2 security results in approximately 4.4 Mbps less TCP ...