Browsing Computing Dissertations and Theses by Date Published
Now showing items 21-40 of 89
-
Computational land use management of public spaces in New Zealand
(2017)Land management is the process of managing the use and development of land resources, in both urban and rural settings. In all modern states, some land is held by central or local governments. This is called public land. ... -
Evaluating spammer detection systems for Twitter
(2017)Twitter is a popular Social Network Service. It is a web application with dual roles of online social network and microblogging. Users use Twitter to find new friends, update their activities or communicate with each other ... -
A scenario based performance analysis of VANET protocols
(2017)Inter-vehicle communication is a major part of the Intelligent Transportation Systems (ITS). Vehicular Ad-Hoc Network (VANET) was primarily developed to improve safety and comfort for vehicles, passengers and drivers. ... -
Analysing and identifying website personality by extending existing libraries
(2016)Previously, website personality was only assessed and classified by human interaction. This brings with it a host of problems as humans act depending on their likes and dislikes. For example, if someone likes the particular ... -
SNET : a statistical normalisation method for Twitter
(2016)One of the major problems in the era of big data use is how to ‘clean’ the vast amount of data on the Internet, particularly data in the micro-blog website Twitter. Twitter enables people to connect with their friends, ... -
Analysis of e-commerce sites using the 7C Framework, by developing a software tool
(2016)Businesses are moving rapidly to leverage the internet to market and sell their products through virtual stores or websites. The success of an enterprise is directly linked to e-commerce quality, and for businesses to ... -
Evaluation of WEP, WPA and WPA2 security protocols on 802.11ac client to server WLAN performance
(2016)RESEARCH OBJECTIVE: The key objective of the research is to find out the impact of enabling security protocols on the WLAN performance in a real test bed environment. The research has measured the 802.11ac WLAN performance ... -
Using VM replication to build a consistent, fast HA system
(2016)Virtualization supplies a straightforward approach to high availability through iterative replications of virtual machine (VM) checkpoints that encapsulate the protected services. Unfortunately, traditional VM replication ... -
Encryption, storage technology and security of data at rest
(2015-11)The term cryptography is defined as the encryption of sensitive information such as, data, image and others. The cryptographic techniques have changed over the years based on the developments of encryption software and ... -
Improving the understandability of artifact-centric workflows using BPMN with extensions
(2015)Since 2003 the enterprises have accelerated research in this approach through development of methods, tools and other technologies in support of the artifact-centric approach. The artifact-centric approach is expected to ... -
The effect of mobility, security and shadowing on latest wireless LAN standard (IEEE802.11ac)
(2015)This thesis focuses on the evaluation of IEEE 802.11ac WLAN performance using TCP and UDP for both versions of the Internet Protocol (IPv4, IPv6) in three scenarios, namely, the effect of implementing WPA2 security encryption, ... -
Mobile internet user experience of Small to Medium Enterprises (SMEs) in New Zealand
(2015)This study is about SMEs (Small to medium enterprises) customers’ mobile internet experience in relation to its key attributes such as speed, security, cost, coverage, reliability and smart phones used. This study is ... -
Performance evaluation of defence mechanisms against ICMPv6 router advertisement flood attacks
(2015)The Internet Protocol version 6 (IPv6) was developed to replace the Internet Protocol version 4 (IPv4). IPv6 provides many improvements over IPv4. However, there are major problems with new features introduced in IPv6, ... -
Performance analysis of defense mechanisms against UDP flood attacks
(2014)A Distributed Denial of Service (DDoS) attack remains one of the most common and devastating security threats to the Internet world. The main purpose of an attack is to disable the use of services on the Internet or the ... -
Improving network performance : an evaluation of TCP/UDP on networks
(2014)Computer networks are complex - they are a heterogeneous environment in which numerous services, such as electronic mail, web browsing, voice and multimedia data, traverse the globe daily. The needs and demands of end users ... -
A multi-agent integrated analysis engine for decentralized network traffic monitoring
(2014)The advent of decentralized systems have been considered as an immense progress as compared to existing centralized systems. In this research, we present an extensible, exible, stable and to the utmost, decentralized network ... -
Security effectiveness of virtual DMZ in private clouds
(2014)Cloud Computing is being considered as emerging technology in recent times and defines a new IT model that delivers the services over internet. Big IT vendors like Google, Microsoft, Yahoo, Amazon and IBM have their own ... -
Spatio-temporal incremental data modelling for multidimensional environmental analysis
(2014)A variety of environmental problems increasingly attract academic research in order to protect ecosystems and minimise negative effects on human health. Advanced computational environmental analysis technologies have the ... -
A computational referencing approach to stocks correlation analysis
(2013)The activity of the stock market is dynamic and complicated, with financial figures changing every minute. Thus, it is not ever an easy task for a professional investor to discover the beneficial knowledge that will ... -
A methodology for multilevel analysis of scientific collaboration networks : mapping current computer science research in New Zealand
(2013)This research scientifically analysed the evolving Complex Network structures of the New Zealand Computer Science research community upon multiple levels (Macro, Meso, Micro, Topics). Methodological approaches utilised ...