• Login
    Browsing by Supervisor 
    •   Research Bank Home
    • Browsing by Supervisor
    •   Research Bank Home
    • Browsing by Supervisor
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing by Supervisor "48177"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-7 of 7

    • title
    • date published
    • date added to RB
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        Developing a navigation model for optimizing social comfort for side-by-side robotic wheelchairs 

        Nguyen, Vinh The (2018-01)
        Side-by-side robotic wheelchairs have significant direct benefits for users and lessening the burden on caregivers. The autonomous navigation function for side-byside robotic wheelchairs has attracted the attention of many ...
      • Thumbnail

        Encryption, storage technology and security of data at rest 

        Alkorbi, Mohammed (2015-11)
        The term cryptography is defined as the encryption of sensitive information such as, data, image and others. The cryptographic techniques have changed over the years based on the developments of encryption software and ...
      • Thumbnail

        Improving network performance : an evaluation of TCP/UDP on networks 

        Narayan, Shaneel (2014)
        Computer networks are complex - they are a heterogeneous environment in which numerous services, such as electronic mail, web browsing, voice and multimedia data, traverse the globe daily. The needs and demands of end users ...
      • Thumbnail

        Load balancing in a distributed network environment : an ant colony inspired approach 

        Veerisetty, Neeharika (2013)
        With the incidence of technology at each and every juncture of human life, there has been an accelerated growth in computational needs to satisfy the technological cravings. Computer networks have evolutionarily emerged ...
      • Thumbnail

        Performance analysis of defense mechanisms against UDP flood attacks 

        Treseangrat, Kiattikul (2014)
        A Distributed Denial of Service (DDoS) attack remains one of the most common and devastating security threats to the Internet world. The main purpose of an attack is to disable the use of services on the Internet or the ...
      • Thumbnail

        Performance evaluation of defence mechanisms against ICMPv6 router advertisement flood attacks 

        Mudaliar, Keysha (2015)
        The Internet Protocol version 6 (IPv6) was developed to replace the Internet Protocol version 4 (IPv4). IPv6 provides many improvements over IPv4. However, there are major problems with new features introduced in IPv6, ...
      • Thumbnail

        Requirements engineering process improvement in health IT projects. Master’s Thesis 

        Chitti, Anupama (2013)
        Research has proved that requirements engineering in e-health projects is a challenge. Many of the ehealth software end-users do not believe in investment in this process and e-health vendors find it challenging to deliver ...

        Te Pūkenga

        Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

        • About Te Pūkenga
        • Privacy Notice

        Copyright ©2022 Te Pūkenga

        About

        About Research BankContact us

        Help for authors  

        How to add research

        Register for updates  

        LoginRegister

        Browse Research Bank  

        EverywhereInstitutionsStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaborator

        Te Pūkenga

        Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

        • About Te Pūkenga
        • Privacy Notice

        Copyright ©2022 Te Pūkenga