• Login
    Browsing Computing Dissertations and Theses by Title 
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Dissertations and Theses
    • Browsing Computing Dissertations and Theses by Title
    •   Research Bank Home
    • Unitec Institute of Technology
    • Study Areas
    • Computing
    • Computing Dissertations and Theses
    • Browsing Computing Dissertations and Theses by Title
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Computing Dissertations and Theses by Title

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-20 of 93

    • title
    • date published
    • date added to RB
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Thumbnail

        Activity recognition and resident identification in smart home environment 

        Kashyap, Venkatesh Subramanya (2020)
        World’s population is ageing rapidly. There have been various efforts to improve the quality of life for elderly. Ambient assisted living is one possible solution which enables elderly or disabled people to live a better ...
      • Thumbnail

        Analysing and identifying website personality by extending existing libraries 

        Chishti, Shafquat Ali (2016)
        Previously, website personality was only assessed and classified by human interaction. This brings with it a host of problems as humans act depending on their likes and dislikes. For example, if someone likes the particular ...
      • Thumbnail

        Analysis and evaluation of quantum key distribution protocols 

        Rouhani, Reza (2020)
        Quantum Key Distribution (QKD) which is the name of cryptography in quantum environment act as the highest developed area in quantum communication and computing technology (QCIT). QKD is inventive technology which utilize ...
      • Thumbnail

        Analysis of e-commerce sites using the 7C Framework, by developing a software tool 

        Yang, Chih-Hsiang (2016)
        Businesses are moving rapidly to leverage the internet to market and sell their products through virtual stores or websites. The success of an enterprise is directly linked to e-commerce quality, and for businesses to ...
      • Thumbnail

        Analysis of L4 DoS/DDoS attacks and mitigation techniques for DNS reflection attack 

        Al-Jarrah, Zaid (2018)
        Cybersecurity is a very important area that needs to be worked on and improved. Day by day technology becomes closer to human life in many ways. In recent years, especially after the emergence of IoT and cloud computing, ...
      • Thumbnail

        Analysis of the metrics that influence the performance of SOAP/XML message routing in ESB Applications 

        Wang, Lu (2020)
        RESEARCH QUESTION: What are the key performance metrics that influence the performance of SOAP/XML message routing tasks in ESB Applications?\ TASKS: Finding ESB performance evaluation set up and method from existing ...
      • Thumbnail

        An application of soft systems methodology on a holistic level: Recommendations for developing and implementing green ICT strategies in New Zealand 

        Zhang, Bing Qian (2011)
        This thesis has been conducted in order to identify and explore the issues involved in the development and implementation of Green ICT strategies in ICT recycling in New Zealand. There were interactions with five stakeholders ...
      • Thumbnail

        Automatic assessment of dysarthric severity level using audio-video cross-modal approach in deep learning 

        Tong, Han (2020)
        Dysarthria is a speech disorder disease that can have a significant impact on a person's daily life. Early detection of the disease can put the patient into therapy sessions more quickly. Researchers have established various ...
      • Thumbnail

        Benefits of using data warehousing and data mining tools 

        Ram, Shiu (2013)
        RESEARCH QUESTION: What benefits are organisations deriving from using data warehousing and data mining tools? This research was an attempt to find out the benefits that a sample of organisations are deriving by using ...
      • Thumbnail

        Challenges faced by staff and students at tertiary level in flexible learning environment: An institutional study 

        Sheriffdeen, Seyed (2007)
        This research is concerned with identifying the challenges / problems of flexible learning environments in the tertiary education sector. Flexible learning environments usually allow students to choose from a mix of learning ...
      • Thumbnail

        A cluster based collaborative filtering method for improving the performance of recommender systems in ecommerce 

        Alahmadi, Alaa (2017-07)
        Rapid growth of E-commerce has made a huge number of products and services accessible to the users. The vast variety of options makes it difficult for the users to finalize their decisions. Recommender systems aim at ...
      • Thumbnail

        A CNN-based identification of honeybees' infection using augmentation 

        Kaur, Manjit (2021)
        RESEARCH QUESTIONS: [Are standard images classified accurately using Convolutional Neural Network (CNN) or transfer learning method?] Can varroa destructor mite be identified correctly from a small number of low-quality ...
      • Thumbnail

        Computational land use management of public spaces in New Zealand 

        Dacey, Simon (2017)
        Land management is the process of managing the use and development of land resources, in both urban and rural settings. In all modern states, some land is held by central or local governments. This is called public land. ...
      • Thumbnail

        A computational referencing approach to stocks correlation analysis 

        Zhang, Ruibin (2013)
        The activity of the stock market is dynamic and complicated, with financial figures changing every minute. Thus, it is not ever an easy task for a professional investor to discover the beneficial knowledge that will ...
      • Thumbnail

        Control of Internet search engines in China -- A study on Google and Baidu 

        Wang, Nan (2008)
        Internet is universal, open, information sharing media environment. The characteristics of Internet make it hard to be controlled. According to much literature, China has been believed to have setup its own Internet border ...
      • Thumbnail

        Critical comparison of statistical and deep learning models applied to the New Zealand Stock Market Index 

        Dassanayake, Wajira (2022)
        RESEARCH QUESTIONS 1. What are the critical fundamental determinants of the NZX 50 Index movements? 2. How can effective forecasting models based on HWES and ARIMA methodologies be devised and applied with high precision ...
      • Thumbnail

        The critical success factors involved in the implementation of a digital classroom in New Zealand 

        Roberts, Malcolm (2007)
        Over the last five years New Zealand schools have set up digital classrooms. In a digital classroom, sets of computers are installed in classrooms and connected to the school’s network. The reasons for the schools setting ...
      • Thumbnail

        A crypto-economy based distributed & asynchronous hashgraphy algorithm for a tracking system 

        Kommushetty, Sushmitha (2018)
        RESEARCH QUESTIONS: •How Hashgraphy can be applied for real-time tracking of an object? •How Hashgraphy can be used to deliver real-time data from weather to traffic conditions by the tracking system? •How can Hashgraphy ...
      • Thumbnail

        Deep correlation learning for urban air quality: Analysis and prediction in New Zealand 

        Andrews, Regan Lee (2021)
        RESEARCH QUESTIONS: • RQ1: Can we relate all the variables involved in air-quality monitoring to establish which ones have dependencies on the others? • RQ2: Can we further model this inter-relationship and automate ...
      • Thumbnail

        Detecting Sybil attack in mobile wireless sensor networks using observer nodes 

        Alomirah, Abdulaziz Abdulrahman (2019)
        RESEARCH QUESTIONS: What lightweight, scalable algorithm can be developed to detect the Sybil nodes in MWSNs? Then, I broke it to more detailed questions as follows:  How many observer nodes would be enough for a ...

        Te Pūkenga

        Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

        • About Te Pūkenga
        • Privacy Notice

        Copyright ©2022 Te Pūkenga

        Usage Statistics

        For this collectionFor the Research Bank

        About

        About Research BankContact us

        Help for authors  

        How to add research

        Register for updates  

        LoginRegister

        Browse Research Bank  

        EverywhereInstitutionsStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaboratorThis CollectionStudy AreaAuthorDateSubjectTitleType of researchSupervisorCollaborator

        Te Pūkenga

        Research Bank is part of Te Pūkenga - New Zealand Institute of Skills and Technology

        • About Te Pūkenga
        • Privacy Notice

        Copyright ©2022 Te Pūkenga