Browsing by Supervisor "47590"
Now showing items 1-11 of 11
-
Analysing and identifying website personality by extending existing libraries
(2016)Previously, website personality was only assessed and classified by human interaction. This brings with it a host of problems as humans act depending on their likes and dislikes. For example, if someone likes the particular ... -
Analysis of e-commerce sites using the 7C Framework, by developing a software tool
(2016)Businesses are moving rapidly to leverage the internet to market and sell their products through virtual stores or websites. The success of an enterprise is directly linked to e-commerce quality, and for businesses to ... -
Analysis of the metrics that influence the performance of SOAP/XML message routing in ESB Applications
(2020)RESEARCH QUESTION: What are the key performance metrics that influence the performance of SOAP/XML message routing tasks in ESB Applications?\ TASKS: Finding ESB performance evaluation set up and method from existing ... -
Control of Internet search engines in China -- A study on Google and Baidu
(2008)Internet is universal, open, information sharing media environment. The characteristics of Internet make it hard to be controlled. According to much literature, China has been believed to have setup its own Internet border ... -
Detecting Sybil attack in mobile wireless sensor networks using observer nodes
(2019)RESEARCH QUESTIONS: What lightweight, scalable algorithm can be developed to detect the Sybil nodes in MWSNs? Then, I broke it to more detailed questions as follows: How many observer nodes would be enough for a ... -
An e-learning 2.0 model
(2011)It has been almost 6 years since the term “E-learning 2.0”was first introduced by Stephen Downes. In 2005, Downes announced a very important principle of E-learning. According to his theory, learning content is no longer ... -
An edge-based steganography algorithm for hiding text into images
(2019)RESEARCH QUESTIONS: • How can I improve existing steganography methods in terms of capacity and transparency? • How can I reduce the complexity of existing steganography methods? • How can I increase the robustness ... -
Requirements engineering process improvement in health IT projects. Master’s Thesis
(2013)Research has proved that requirements engineering in e-health projects is a challenge. Many of the ehealth software end-users do not believe in investment in this process and e-health vendors find it challenging to deliver ... -
Social networking sites, web 2.0 technologies and e-learning
(2011)The purpose of this research study is to attain an understanding of the use of social networking sites and Web 2.0 technologies by computing students for e-learning. Social networking sites have mostly been accepted ... -
Success factors for transactional eCommerce websites: An investigation focusing on technical and business contexts
(2012)This thesis research examines success factors for transactional eCommerce Websites focusing on technical and business contexts. Transactional websites in particular have become essential for eCommerce development and use. ... -
What are the significant factors that have influenced the adoption of Moodle by staff in a Māori tertiary institution?
(2013)The purpose of this research is to get a clear understanding of the significant factors that are influencing the adoption of a Learning Management System (LMS) by staff within a Māori tertiary institution. The LMS (Moodle) ...