School of Science LYIT: Recent submissions
Now showing items 21-40 of 40
-
Characterisation and investigation of alginate dressings containing hydrogen peroxide for the promotion of wound healing
(Letterkenny Institute of Technology, 2011)The care of chronic wounds carries a heavy financial burden on the healthcare industry, with billons being spent annually on their treatment. This, coupled with a decreased quality of life for sufferers, has led to an ... -
Malware analysis and antivirus signature creation
(Letterkenny Institute of Technology, 2015-05)The rapid advances social media, educational tools and communications platforms available today have expanded the attack landscape through which the malicious user can propagate their work can carry out damaging attacks. ... -
Threat modelling for legacy enterprise applications
(Letterkenny Institute of Technology, 2013)Legacy enterprise applications provide unique challenges for software security personnel. The size and historical nature of these systems can result in vulnerabilities that do not have the appropriate countermeasures ... -
A preliminary exploration of database performance for use with ‘big data’ projects in the aviation industry
(Letterkenny Institute of Technology, 2014)This thesis will demonstrate the effectiveness of processing data for the airline industry using both a MariaDB and MongoDB database. Conclusions will be drawn on pertinent issues such as the performance of processing large ... -
Deploying enterprise solutions to the cloud - issues and vulnerabilities
(Letterkenny Institute of Technology, 2012)Legacy enterprise applications provide unique challenges for software security personnel. The size and historical nature of these systems can result in vulnerabilities that do not have the appropriate countermeasures ... -
A novel approach to digital watermarking, exploiting colour spaces
(Letterkenny Institute of Technology, 2011)Watermarking is the process of embedding information in a carrier in order to protect the ownership of text, music, video and images, while steganography is the art of hiding information. Normally watermarks are embedded ... -
Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation
(Letterkenny Institute of Technology, 2010)This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited ... -
Evaluating techniques of finding a path in a dynamic digital search domain
(Letterkenny Institute of Technology, 2009)Moving from one point to another in an efficient yet effective manner has always been a problem for people. The same problem can be related to mathematical graph theory, where moving from one co-ordinate to another ... -
Prose warping for realtime animation
(Letterkenny Institute of Technology, 2007)3D computer games with animated characters are restricted to the animations provided by an animator. This thesis explores a method for having a character perform different animations using only simple base animations ... -
Angiotensin-I-converting enzyme and prolyl endopeptidase inhibitory peptides from marine processing by-products
(Letterkenny Institute of Technology, 2011)Like many natural resource-based processing industries, the seafood processing sector gives rise to a significant volume of organic waste, Environmental issues, economic concerns and legal restrictions regarding the ... -
The capabilities of XML and its interaction with legacy databases
(Letterkenny Institute of Technology, 2003)This thesis endeavours to establish which of the applications within the Extensible Markup Language (XML) available at present, meet the requirements of a modem business engaging in Electronic Commerce (E-Commerce) ... -
Magnumserver pages: improvements and extensions to java server pages
(Letterkenny Institute of Technology, 2005)Today vast amounts of services and information are provided by the WWW. By its very nature, the information involved is changeable; hence static web pages are no longer adequate and methods of coping with dynamic ... -
Mental health nursing students' experience of stress: burdened by a heavy load
(Blackwell Publishers Limited., 2009)This paper reports research outcomes of a study into personal stress experienced by mental health student nurses undertaking a diploma programme in Ireland. It uses a phenomenological research approach. The sample was ... -
CAPTURE - Cooperatively Applied Positioning Techniques Utilizing Range Extensions
(IEEE, 2014-10-27)The most commonly implemented Indoor Location Based Solution uses existing Wi-Fi network components to locate devices within its range. While this technique offers obvious economic rewards by utilizing a preinstalled ... -
To Wireless Fidelity and Beyond - CAPTURE, Extending Indoor Positioning Systems
(IEEE, 2014-10-24)The benefits of context aware computing and specifically the context that location can provide to applications and systems has been heavily documented in recent times. Moreover the move from traditional outdoor ... -
Dynamically Extending the Reach of Wireless Networks in Determining Movement of Individuals Between Cells
(2011-06-22)Location Based Systems are now a ubiquitous part of everyday life, seamlessly assisting us in everything we do from driving our cars to finding a cab, even preventing us missing our bus or train stop when oversleeping ... -
Cooperatively Extending the Range of Indoor Localisation
(IET, 2013-06-17)̶Whilst access to location based information has been mostly possible in the outdoor arena through the use of GPS, the provision of accurate positioning estimations and broad coverage in the indoor environment has proven ... -
Performance comparison of enterprise applications on mobile operating systems
(Telkomnika, 2011-12)Due to the advances in mobile phone technology, Smartphones have the ability to access web services within applications the user interacts with to retrieve and send information from and to web services. As Smartphones have ... -
Teaching java programming using cable in a collaborative online environment
(Institute of Advanced Engineering and Science (IAES), 2012-07)With the emergence and evolution of computer hardware, software and networks - virtual classrooms now exist which enable teachers and students to experience learning activities and to work together at a distance either ... -
Legal, ethical & social issues in the case of an intrusive remote monitoring software
(The Institute of Advanced Engineering and Science, 2012-10)In 2008, a laptop was stolen from a high school student in the USA. The laptop was being monitored by remote recovery software. The thief sold the laptop in question to another student who in turn sold it to a teacher. The ...