Computing Dissertations and Theses
Recent Submissions
-
A development framework for software integration projects – case study: Web app Integration with OpenWeather API
(2023)RESEARCH QUESTIONS Q1. What are the key stages of the Software Development Life Cycle (SDLC) implementation in software integration projects, and how do they contribute to the successful integration of software systems? Q2. ... -
A new approach for the prevention of sinkhole attack in mobile wireless sensor networks
(2023)RESEARCH QUESTIONS Main research question is: Is it possible to prevent a sinkhole attack on MWSN using a combination of Blowfish and RSA algorithms? Then it was broken down into the following questions: Q1: What would ... -
New Zealand Stock Market prediction using sentiment analysis
(2022)In this research, I addressed this gap and tried to focus on the New Zealand Stock Exchange (NZX). For the proposed model, I used the financial news only, for the SA and for the stock data I took five of the biggest New ... -
Critical comparison of statistical and deep learning models applied to the New Zealand Stock Market Index
(2022)RESEARCH QUESTIONS 1. What are the critical fundamental determinants of the NZX 50 Index movements? 2. How can effective forecasting models based on HWES and ARIMA methodologies be devised and applied with high precision ... -
Identification of queen-less beehives using signal enhancement techniques and neural networks
(2021)Beekeeping has a long history of about 180 years in New Zealand. The first group of honey bees introduced has expanded to approximately one million registered beehives by now. An increasing number of residents have been ... -
A CNN-based identification of honeybees' infection using augmentation
(2021)RESEARCH QUESTIONS: [Are standard images classified accurately using Convolutional Neural Network (CNN) or transfer learning method?] Can varroa destructor mite be identified correctly from a small number of low-quality ... -
A framework for analysis and comparison of deepfakes detection methods
(2021)With the rise of AI (Artificial Intelligence), people can already utilise Deepfakes technology to generate fake pictures and videos increasingly. Similar to all technologies, while bringing benefits, this technology also ... -
Deep correlation learning for urban air quality: Analysis and prediction in New Zealand
(2021)RESEARCH QUESTIONS: • RQ1: Can we relate all the variables involved in air-quality monitoring to establish which ones have dependencies on the others? • RQ2: Can we further model this inter-relationship and automate ... -
A hybrid intelligent intrusion detection system for advanced persistent threats
(2020)RESEARCH MOTIVATION: The objective of this research is to investigate how to increase the detection rate and increase the tracking rate of APT and TA in their early attack phases within an environment of distributed ... -
Automatic assessment of dysarthric severity level using audio-video cross-modal approach in deep learning
(2020)Dysarthria is a speech disorder disease that can have a significant impact on a person's daily life. Early detection of the disease can put the patient into therapy sessions more quickly. Researchers have established various ... -
Analysis of the metrics that influence the performance of SOAP/XML message routing in ESB Applications
(2020)RESEARCH QUESTION: What are the key performance metrics that influence the performance of SOAP/XML message routing tasks in ESB Applications?\ TASKS: Finding ESB performance evaluation set up and method from existing ... -
Visualising vein pattern based on sparse auto-encoder algorithm
(2020)RESEARCH QUESTIONS: Q1: How is it possible to apply deep learning algorithms such as Autoencoder (AE) instead of current simple neural networks with limited capabilities for uncovering vein pattern? Q2: Can deep learning ... -
Analysis and evaluation of quantum key distribution protocols
(2020)Quantum Key Distribution (QKD) which is the name of cryptography in quantum environment act as the highest developed area in quantum communication and computing technology (QCIT). QKD is inventive technology which utilize ... -
Intelligent beehive status monitoring in noisy environment
(2020)Artificial neural network (ANN) based bee-hive monitoring algorithm does not perform very efficiently in noisy environments. Although an ANN based bee-hive monitoring algorithm using audio signals of a beehive could perform ... -
Activity recognition and resident identification in smart home environment
(2020)World’s population is ageing rapidly. There have been various efforts to improve the quality of life for elderly. Ambient assisted living is one possible solution which enables elderly or disabled people to live a better ... -
Using VM replication to build a consistent, fast HA system
(2016)Virtualization supplies a straightforward approach to high availability through iterative replications of virtual machine (VM) checkpoints that encapsulate the protected services. Unfortunately, traditional VM replication ... -
A crypto-economy based distributed & asynchronous hashgraphy algorithm for a tracking system
(2018)RESEARCH QUESTIONS: •How Hashgraphy can be applied for real-time tracking of an object? •How Hashgraphy can be used to deliver real-time data from weather to traffic conditions by the tracking system? •How can Hashgraphy ... -
Modelling wear patterns on footwear outsoles
(2019)ABSTRACT: The outsoles of footwear develop nicks, cuts, and tears via repeated exposure to the abrasive forces that occur between the outsole and the ground. These abrasions result in the formation of characteristics ... -
Support Vector Machine (SVM) aggregation modelling for spatio-temporal air pollution analysis
(2019)RESEARCH QUESTIONS: 1. Dealing with long term historical data of spatio-temporal is always challenging. SVM ensemble and other methods are used to handle long term historical data, but these methods result in slow ... -
Evaluation of WEP, WPA and WPA2 security protocols on 802.11ac client to server WLAN performance
(2016)RESEARCH OBJECTIVE: The key objective of the research is to find out the impact of enabling security protocols on the WLAN performance in a real test bed environment. The research has measured the 802.11ac WLAN performance ...