Browsing Computing Dissertations and Theses by Type of Research "Masters Thesis"
Now showing items 1-20 of 62
-
Activity recognition and resident identification in smart home environment
(2020)World’s population is ageing rapidly. There have been various efforts to improve the quality of life for elderly. Ambient assisted living is one possible solution which enables elderly or disabled people to live a better ... -
Analysing and identifying website personality by extending existing libraries
(2016)Previously, website personality was only assessed and classified by human interaction. This brings with it a host of problems as humans act depending on their likes and dislikes. For example, if someone likes the particular ... -
Analysis and evaluation of quantum key distribution protocols
(2020)Quantum Key Distribution (QKD) which is the name of cryptography in quantum environment act as the highest developed area in quantum communication and computing technology (QCIT). QKD is inventive technology which utilize ... -
Analysis of e-commerce sites using the 7C Framework, by developing a software tool
(2016)Businesses are moving rapidly to leverage the internet to market and sell their products through virtual stores or websites. The success of an enterprise is directly linked to e-commerce quality, and for businesses to ... -
Analysis of L4 DoS/DDoS attacks and mitigation techniques for DNS reflection attack
(2018)Cybersecurity is a very important area that needs to be worked on and improved. Day by day technology becomes closer to human life in many ways. In recent years, especially after the emergence of IoT and cloud computing, ... -
Analysis of the metrics that influence the performance of SOAP/XML message routing in ESB Applications
(2020)RESEARCH QUESTION: What are the key performance metrics that influence the performance of SOAP/XML message routing tasks in ESB Applications?\ TASKS: Finding ESB performance evaluation set up and method from existing ... -
An application of soft systems methodology on a holistic level: Recommendations for developing and implementing green ICT strategies in New Zealand
(2011)This thesis has been conducted in order to identify and explore the issues involved in the development and implementation of Green ICT strategies in ICT recycling in New Zealand. There were interactions with five stakeholders ... -
Automatic assessment of dysarthric severity level using audio-video cross-modal approach in deep learning
(2020)Dysarthria is a speech disorder disease that can have a significant impact on a person's daily life. Early detection of the disease can put the patient into therapy sessions more quickly. Researchers have established various ... -
A cluster based collaborative filtering method for improving the performance of recommender systems in ecommerce
(2017-07)Rapid growth of E-commerce has made a huge number of products and services accessible to the users. The vast variety of options makes it difficult for the users to finalize their decisions. Recommender systems aim at ... -
A CNN-based identification of honeybees' infection using augmentation
(2021)RESEARCH QUESTIONS: [Are standard images classified accurately using Convolutional Neural Network (CNN) or transfer learning method?] Can varroa destructor mite be identified correctly from a small number of low-quality ... -
A computational referencing approach to stocks correlation analysis
(2013)The activity of the stock market is dynamic and complicated, with financial figures changing every minute. Thus, it is not ever an easy task for a professional investor to discover the beneficial knowledge that will ... -
A crypto-economy based distributed & asynchronous hashgraphy algorithm for a tracking system
(2018)RESEARCH QUESTIONS: •How Hashgraphy can be applied for real-time tracking of an object? •How Hashgraphy can be used to deliver real-time data from weather to traffic conditions by the tracking system? •How can Hashgraphy ... -
Detecting Sybil attack in mobile wireless sensor networks using observer nodes
(2019)RESEARCH QUESTIONS: What lightweight, scalable algorithm can be developed to detect the Sybil nodes in MWSNs? Then, I broke it to more detailed questions as follows: How many observer nodes would be enough for a ... -
Determining the accuracy of budgets : a machine learning application for budget change pattern recognition
(2012)With the aid of open-sourced database and software libraries, we developed a data mining software prototype for SME business intelligent budgeting planning. The experiment demonstrates the existence of the change pattern ... -
Dynamic class imbalance learning for incremental LPSVM
(2012)Abstract Linear Proximal Support Vector Machines (LPSVM), like decision trees, classic SVM, etc. are originally not equipped to handle drifting data streams that exhibit high and varying degrees of class imbalance. For ... -
An e-learning 2.0 model
(2011)It has been almost 6 years since the term “E-learning 2.0”was first introduced by Stephen Downes. In 2005, Downes announced a very important principle of E-learning. According to his theory, learning content is no longer ... -
An edge-based steganography algorithm for hiding text into images
(2019)RESEARCH QUESTIONS: • How can I improve existing steganography methods in terms of capacity and transparency? • How can I reduce the complexity of existing steganography methods? • How can I increase the robustness ... -
The effect of mobility, security and shadowing on latest wireless LAN standard (IEEE802.11ac)
(2015)This thesis focuses on the evaluation of IEEE 802.11ac WLAN performance using TCP and UDP for both versions of the Internet Protocol (IPv4, IPv6) in three scenarios, namely, the effect of implementing WPA2 security encryption, ... -
Encryption, storage technology and security of data at rest
(2015-11)The term cryptography is defined as the encryption of sensitive information such as, data, image and others. The cryptographic techniques have changed over the years based on the developments of encryption software and ... -
Evaluating spammer detection systems for Twitter
(2017)Twitter is a popular Social Network Service. It is a web application with dual roles of online social network and microblogging. Users use Twitter to find new friends, update their activities or communicate with each other ...