Browsing Theses - Science LYIT by Subject "Computing"
Now showing items 1-20 of 22
-
An augmented penetration testing framework for Mobile Devices on 802.11 ac Wireless Networks
(Letterkenny Institute of Technology, 2015-05)In combination with the rapid growth of mobile device ownership worldwide and some reported high profile cybersecurity issues, rigorous security testing techniques are required to ensure that sensitive corporate and domestic ... -
Automated real-time animation
(Letterkenny Institute of Technology, 2008)Producing animation for the computer game/entertainment industry is a time- consuming, difficult process. One approach to maximizing the utility of previously animated sequences is to blend and warp pre-existing sequences ... -
The capabilities of XML and its interaction with legacy databases
(Letterkenny Institute of Technology, 2003)This thesis endeavours to establish which of the applications within the Extensible Markup Language (XML) available at present, meet the requirements of a modem business engaging in Electronic Commerce (E-Commerce) ... -
Comparing the performance of enterprise applications on limited operating systems
(Letterkenny Institute of Technology, 2012-09)These days a Smartphone is just as important as a computer. It is essential that users select a device that has the best performance possible. This thesis used simulation to compare the performance of an application on ... -
A comparison between Cloud Solutions with focus on DevOps tooling
(Letterkenny Institute of Technology, 2015-05)The DevOps philosophy keeps gaining popularity due to its practices that allow companies to quickly deliver software changes to their customers. Along with this advent, Cloud Solutions continue to expand their customer ... -
Deploying enterprise solutions to the cloud - issues and vulnerabilities
(Letterkenny Institute of Technology, 2012)Legacy enterprise applications provide unique challenges for software security personnel. The size and historical nature of these systems can result in vulnerabilities that do not have the appropriate countermeasures ... -
Evaluating elliptic curve cryptography for use on java card
(Letterkenny Institute of Technology, 2003)Smart cards are used as trusted storage and data processing systems to store cryptographic private keys and other valuable information. Java Card promises the ease of programming in Java to the world of smart cards. ... -
Evaluating techniques of finding a path in a dynamic digital search domain
(Letterkenny Institute of Technology, 2009)Moving from one point to another in an efficient yet effective manner has always been a problem for people. The same problem can be related to mathematical graph theory, where moving from one co-ordinate to another ... -
Fingerprint watermarking using svd and dwt based steganography to enhance security
(Letterkenny Institute of Technology, 2015-09-15)Identification of persons by way of biometric features has evolved significantly over the years. During this time, biometric recognition has received much attention due to its need for security. Amongst the many existing ... -
An implementation and evaluation of PCI DSS 3.0 for E-Commerce in a testing environment
(Letterkenny Institute of Technology, 2015-03)Threats to personal payment card information are continually on the rise. To implement a formal process for protecting this information PCI DSS was created. However credit card fraud is still rising. This leads to the ... -
Improving compliance with Bluetooth device detection
(Letterkenny Institute of Technology, 2015-05)Attributed to Joshua Wright (2012) “Security will not get better until tools for practical exploration of the attack surface are made available”. With Bluetooth enabled but discovery mode turned off, auditing for Bluetooth ... -
Investigation of indoor positioning based on WLAN 802.11
(Letterkenny Institute of Technology, 2013-08)The need for location based services has dramatically increased within the past few years, especially with the popularity and capability of mobile device such as smart phones and tablets. The limitation of GPS for indoor ... -
Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation
(Letterkenny Institute of Technology, 2010)This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited ... -
Magnumserver pages: improvements and extensions to java server pages
(Letterkenny Institute of Technology, 2005)Today vast amounts of services and information are provided by the WWW. By its very nature, the information involved is changeable; hence static web pages are no longer adequate and methods of coping with dynamic ... -
Malware analysis and antivirus signature creation
(Letterkenny Institute of Technology, 2015-05)The rapid advances social media, educational tools and communications platforms available today have expanded the attack landscape through which the malicious user can propagate their work can carry out damaging attacks. ... -
A novel approach to digital watermarking, exploiting colour spaces
(Letterkenny Institute of Technology, 2011)Watermarking is the process of embedding information in a carrier in order to protect the ownership of text, music, video and images, while steganography is the art of hiding information. Normally watermarks are embedded ... -
A preliminary exploration of database performance for use with ‘big data’ projects in the aviation industry
(Letterkenny Institute of Technology, 2014)This thesis will demonstrate the effectiveness of processing data for the airline industry using both a MariaDB and MongoDB database. Conclusions will be drawn on pertinent issues such as the performance of processing large ... -
Prose warping for realtime animation
(Letterkenny Institute of Technology, 2007)3D computer games with animated characters are restricted to the animations provided by an animator. This thesis explores a method for having a character perform different animations using only simple base animations ... -
Searchable symmetric encryption (sse): a mechanism for searching symmetrically encrypted data stored in the Cloud
(Letterkenny Institute of Technology, 2015-08) -
Stealth analysis of Network Topology using Spanning Tree Protocol
(Letterkenny Institute of Technology, 2015-05)Almost every network over the last 30 years is built on Spanning Tree Protocol (STP). This protocol makes topology information available to individual switches by exchanging Bridge Protocol Data Units (BPDUs) containing ...