Theses - Science LYIT
Browse by
Recent Submissions
-
Effects of a fall on the quality of life of someone over the age of 65
(2020-08)Background: Care of the older person will become more important in the future due to the expected increase in this area of the population. Falls and fall related injuries are the most comm on cause of admission to ... -
Exploring early year educators' perspectives of outdoors play
(2020-08)Acknowledgement of outdoor play affordances, positively supports children’s health, wellbeing, learning and development. There has been a visible diminishing of opportunities for children’s outdoor play in recent years. ... -
Evaluating elliptic curve cryptography for use on java card
(Letterkenny Institute of Technology, 2003)Smart cards are used as trusted storage and data processing systems to store cryptographic private keys and other valuable information. Java Card promises the ease of programming in Java to the world of smart cards. ... -
High performance liquid chromatography method development and chemometric analysis of ecstasy and cocaine
(Letterkenny Institute of Technology, 2011)Consumption of illegal drugs of abuse remains a major social issue aligned with a global law-enforcement priority. Forensic analysts are faced with the challenge of continually developing sophisticated methods of ... -
Synthesis and characterisation of some osmium and ruthenium complexes and the application of Os(bpy)2-(pyridine-4-COOH)-CI in an electrochemical DNA biosensor
(Letterkenny Institute of Technology, 2008)This thesis details the synthesis and characterisation of seven osmium and ruthenium bipyridyl complexes, reports on their electrochemical characteristics and outlines an application for one of the synthesised complexes ... -
Automated real-time animation
(Letterkenny Institute of Technology, 2008)Producing animation for the computer game/entertainment industry is a time- consuming, difficult process. One approach to maximizing the utility of previously animated sequences is to blend and warp pre-existing sequences ... -
Factors affecting the concentration of domoic acid in scallop, pecten maximus
(Letterkenny Institute of Technology, 2006)Domoic acid, a neurotoxin produced by some Pseudo-nitzschia species, can accumulate in shellfish, consumption of which can result in Amnesic Shellfish Poisoning. Since its detection in Irish king scallop, Pecten maximus, ... -
The interaction between A20 and the NR4A subfamily of nuclear receptors in the pathogenesis of rheumatoid arthritis
(Letterkenny Institute of Technology, 2011)Rheumatoid arthritis (RA) is a chronic, progressive inflammatory disease that affects nearly 1 % of the world’s population. RA is characterized by inflammation of the synovial joints leading to joint damage which can ... -
Improving compliance with Bluetooth device detection
(Letterkenny Institute of Technology, 2015-05)Attributed to Joshua Wright (2012) “Security will not get better until tools for practical exploration of the attack surface are made available”. With Bluetooth enabled but discovery mode turned off, auditing for Bluetooth ... -
Fingerprint watermarking using svd and dwt based steganography to enhance security
(Letterkenny Institute of Technology, 2015-09-15)Identification of persons by way of biometric features has evolved significantly over the years. During this time, biometric recognition has received much attention due to its need for security. Amongst the many existing ... -
Biological control of pyrenophora teres
(Letterkenny Institute of Technology, 2005)Pyrenophora teres the causal organism of barley net blotch disease is responsible for substantial loss in crop yield with yield losses as high as 40% under favourable conditions. Current control measures are achieved ... -
Synthesis and characterisation of novel astaxanthin metal complexes
(Letterkenny Institute of Technology, 2015-10)Astaxanthin is produced in a wide range of organisms, its extractability from the native Irish brown crab (Cancer pagurus) was carried out using glacial acetic acid. The extractable natural astaxanthin yield is quantified ... -
Stealth analysis of Network Topology using Spanning Tree Protocol
(Letterkenny Institute of Technology, 2015-05)Almost every network over the last 30 years is built on Spanning Tree Protocol (STP). This protocol makes topology information available to individual switches by exchanging Bridge Protocol Data Units (BPDUs) containing ... -
Searchable symmetric encryption (sse): a mechanism for searching symmetrically encrypted data stored in the Cloud
(Letterkenny Institute of Technology, 2015-08) -
A comparison between Cloud Solutions with focus on DevOps tooling
(Letterkenny Institute of Technology, 2015-05)The DevOps philosophy keeps gaining popularity due to its practices that allow companies to quickly deliver software changes to their customers. Along with this advent, Cloud Solutions continue to expand their customer ... -
An implementation and evaluation of PCI DSS 3.0 for E-Commerce in a testing environment
(Letterkenny Institute of Technology, 2015-03)Threats to personal payment card information are continually on the rise. To implement a formal process for protecting this information PCI DSS was created. However credit card fraud is still rising. This leads to the ... -
Comparing the performance of enterprise applications on limited operating systems
(Letterkenny Institute of Technology, 2012-09)These days a Smartphone is just as important as a computer. It is essential that users select a device that has the best performance possible. This thesis used simulation to compare the performance of an application on ... -
An augmented penetration testing framework for Mobile Devices on 802.11 ac Wireless Networks
(Letterkenny Institute of Technology, 2015-05)In combination with the rapid growth of mobile device ownership worldwide and some reported high profile cybersecurity issues, rigorous security testing techniques are required to ensure that sensitive corporate and domestic ... -
Investigation of indoor positioning based on WLAN 802.11
(Letterkenny Institute of Technology, 2013-08)The need for location based services has dramatically increased within the past few years, especially with the popularity and capability of mobile device such as smart phones and tablets. The limitation of GPS for indoor ... -
Traffic isolation techniques in securing multi-tenant virtual environments
(Letterkenny Institute of Technology, 2015-01)A fundamental function of almost any network is to ensure that certain types of traffic are kept isolated from other traffic in the network. With multi-tenant environments such as datacentres and the cloud providing isolation ...