Browsing School of Science LYIT by Subject "Computing"
Now showing items 1-20 of 29
-
An augmented penetration testing framework for Mobile Devices on 802.11 ac Wireless Networks
(Letterkenny Institute of Technology, 2015-05)In combination with the rapid growth of mobile device ownership worldwide and some reported high profile cybersecurity issues, rigorous security testing techniques are required to ensure that sensitive corporate and domestic ... -
Automated real-time animation
(Letterkenny Institute of Technology, 2008)Producing animation for the computer game/entertainment industry is a time- consuming, difficult process. One approach to maximizing the utility of previously animated sequences is to blend and warp pre-existing sequences ... -
The capabilities of XML and its interaction with legacy databases
(Letterkenny Institute of Technology, 2003)This thesis endeavours to establish which of the applications within the Extensible Markup Language (XML) available at present, meet the requirements of a modem business engaging in Electronic Commerce (E-Commerce) ... -
CAPTURE - Cooperatively Applied Positioning Techniques Utilizing Range Extensions
(IEEE, 2014-10-27)The most commonly implemented Indoor Location Based Solution uses existing Wi-Fi network components to locate devices within its range. While this technique offers obvious economic rewards by utilizing a preinstalled ... -
Comparing the performance of enterprise applications on limited operating systems
(Letterkenny Institute of Technology, 2012-09)These days a Smartphone is just as important as a computer. It is essential that users select a device that has the best performance possible. This thesis used simulation to compare the performance of an application on ... -
A comparison between Cloud Solutions with focus on DevOps tooling
(Letterkenny Institute of Technology, 2015-05)The DevOps philosophy keeps gaining popularity due to its practices that allow companies to quickly deliver software changes to their customers. Along with this advent, Cloud Solutions continue to expand their customer ... -
Cooperatively Extending the Range of Indoor Localisation
(IET, 2013-06-17)̶Whilst access to location based information has been mostly possible in the outdoor arena through the use of GPS, the provision of accurate positioning estimations and broad coverage in the indoor environment has proven ... -
Deploying enterprise solutions to the cloud - issues and vulnerabilities
(Letterkenny Institute of Technology, 2012)Legacy enterprise applications provide unique challenges for software security personnel. The size and historical nature of these systems can result in vulnerabilities that do not have the appropriate countermeasures ... -
Dynamically Extending the Reach of Wireless Networks in Determining Movement of Individuals Between Cells
(2011-06-22)Location Based Systems are now a ubiquitous part of everyday life, seamlessly assisting us in everything we do from driving our cars to finding a cab, even preventing us missing our bus or train stop when oversleeping ... -
Evaluating elliptic curve cryptography for use on java card
(Letterkenny Institute of Technology, 2003)Smart cards are used as trusted storage and data processing systems to store cryptographic private keys and other valuable information. Java Card promises the ease of programming in Java to the world of smart cards. ... -
Evaluating techniques of finding a path in a dynamic digital search domain
(Letterkenny Institute of Technology, 2009)Moving from one point to another in an efficient yet effective manner has always been a problem for people. The same problem can be related to mathematical graph theory, where moving from one co-ordinate to another ... -
Fingerprint watermarking using svd and dwt based steganography to enhance security
(Letterkenny Institute of Technology, 2015-09-15)Identification of persons by way of biometric features has evolved significantly over the years. During this time, biometric recognition has received much attention due to its need for security. Amongst the many existing ... -
An implementation and evaluation of PCI DSS 3.0 for E-Commerce in a testing environment
(Letterkenny Institute of Technology, 2015-03)Threats to personal payment card information are continually on the rise. To implement a formal process for protecting this information PCI DSS was created. However credit card fraud is still rising. This leads to the ... -
Improving compliance with Bluetooth device detection
(Letterkenny Institute of Technology, 2015-05)Attributed to Joshua Wright (2012) “Security will not get better until tools for practical exploration of the attack surface are made available”. With Bluetooth enabled but discovery mode turned off, auditing for Bluetooth ... -
Investigation of indoor positioning based on WLAN 802.11
(Letterkenny Institute of Technology, 2013-08)The need for location based services has dramatically increased within the past few years, especially with the popularity and capability of mobile device such as smart phones and tablets. The limitation of GPS for indoor ... -
Legal, ethical & social issues in the case of an intrusive remote monitoring software
(The Institute of Advanced Engineering and Science, 2012-10)In 2008, a laptop was stolen from a high school student in the USA. The laptop was being monitored by remote recovery software. The thief sold the laptop in question to another student who in turn sold it to a teacher. The ... -
Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation
(Letterkenny Institute of Technology, 2010)This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited ... -
Magnumserver pages: improvements and extensions to java server pages
(Letterkenny Institute of Technology, 2005)Today vast amounts of services and information are provided by the WWW. By its very nature, the information involved is changeable; hence static web pages are no longer adequate and methods of coping with dynamic ... -
Malware analysis and antivirus signature creation
(Letterkenny Institute of Technology, 2015-05)The rapid advances social media, educational tools and communications platforms available today have expanded the attack landscape through which the malicious user can propagate their work can carry out damaging attacks. ... -
A novel approach to digital watermarking, exploiting colour spaces
(Letterkenny Institute of Technology, 2011)Watermarking is the process of embedding information in a carrier in order to protect the ownership of text, music, video and images, while steganography is the art of hiding information. Normally watermarks are embedded ...