StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Applications of Genetic Algorithms to Neural Networking Information Technology Term Paper
7 pages (1943 words) , Download 5 , Term Paper
Free
Since the overall architecture of the network is essential to the operation, a broad study has focused on using evolutionary techniques to evolve the best architecture (much similar to the development of our own brainpower). One simple method is to use a Boolean (N x N) matrix, (where N is the number of neurons in the neural network).
Preview sample
Facial Recognition as the Part of the Biometric System of Identifying Information Technology Research Proposal
24 pages (6413 words) , Download 3 , Research Proposal
Of all these biometrics, it is facial recognition which is being met with contrasting views and arguments regarding questions of its use, accuracy and usefulness; and since it relates to visual recognition and identification, it offers concrete physical identification, that its use has given rise to concerns of invasion of privacy.
Preview sample
sponsored ads
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Security Risk Analysis for Intrusion Detection and Prevention of Cybercrime Information Technology Report
12 pages (3283 words) , Download 3 , Report
Free
To guard against network or cyber-attacks. An intrusion detection system needs to be used. This system as stated above detects intrusion by monitoring network traffic and is therefore not perfect. These systems are reinforced with intrusion prevention systems to make a strong defense against cyber attacks. The intrusion prevention system being passive is more effective against any intrusion.
Preview sample
Benefits of Dynamic Host Configuration Protocol Information Technology Essay
6 pages (1654 words) , Download 2 , Essay
Free
Traditionally, all the TCP/IP parameters were configured manually which is commonly referred to as static configuration. Every machine required an IP address, subnet mask and a default gateway be inputted manually. If one of the values was wrongly entered, it disrupted the communication and it was hard to quickly establish the cause.
Preview sample
Technology solution Information Technology Assignment
3 pages (750 words) , Download 3 , Assignment
The second component had to do with the institutionalization of a customer relationship management plan that will focus on the use of new media. This part of the essay shall however concentrate on centralization of the sales and product offices. Components of Sales and Product IT Centralization Resources: people A well resourced human capital base shall be needed for the success implementation of the IT centralization process.
Preview sample
Software Development Project Easy Retrieval of Data from Hard Disk Drives Information Technology Research Proposal
7 pages (1955 words) , Download 2 , Research Proposal
Free
Business or technical needs that will be met by the project VI. The boundaries of the project- what the project will not address VII. Detailed implementation of the project VIII. The coding standards IX. Version control policy X. List of the necessary hardware components requirements for the user XI.
Preview sample
Service Level Agreement Revisions Information Technology Coursework
3 pages (750 words) , Download 2 , Coursework
Restriction on Use of Data Datanal and Mineretek will be provided with varied data of different clients of Finman. This data should be used only for the purpose that has been defined in the Service Level Agreement in order to reach the desired objectives.
Preview sample
The Ethernet Technology Report Information Technology Essay
4 pages (1000 words) , Download 4 , Essay
Free
Introduced in 1980, Ethernet is presently the most widely used LAN technology that defines the cabling and signaling specification for the physical and data link layer of the OSI model. It refers to the protocols defined by the underlying data rates, the physical medium, running different signaling methods.
Preview sample
The latest 4G communications development Information Technology Research Paper
3 pages (750 words) , Download 3 , Research Paper
In this scenario, high speed information and data transmission rate indicates that 4G communication systems are available for a person who is moving in a plane, car or train. In addition, the arrival of 4G integrated systems offered a completely renovated set of services all through the telecommunication sector, demonstrating an entirely new level for users and a great investment intended for providers (Renshaw; Turban, Leidner and McLean).
Preview sample
Impact of Social Networking Information Technology Research Paper
5 pages (1375 words) , Download 2 , Research Paper
Free
With the current technological advancements, the conduction of business transactions has continuously been transformed. In the early day, business was mainly conducted offline while currently, various organizations incorporate both offline and online transactions in ensuring they are able to meet a wide range of customers.
Preview sample
Reporting Forensic Evidence Information Technology Research Paper
4 pages (1258 words) , Download 2 , Research Paper
Free
It is very critical and essential for any forensic investigator carrying out any form of forensic investigation to be familiar with the types of data collected to be used as the final forensic report. This is because the attorney will evidently use the report obtained while in court and can unfortunately be utilized by the opposing attorney during the court case.
Preview sample
An IT strategy focused on maintaining a cutting-edge technology position Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
It is argued that any firm which is just viewing technology as a mere tool to support the business processes may no longer continue to dominate the market.It is critical for the modern firms to actually develop the efficient IT infrastructure
Preview sample
Speech in Cyberspace and Internet Governance Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Internet governance should get the same attention as ranch governance or minimal flatteringly. The idea that internet policy can be examined by the conventional tools of policy is defined by counter paper stating that internet governance should be obsessed exclusively or primarily by concerns of network engineering (Solum, 2008, web).
Preview sample
The Dangers of Spam Information Technology Research Paper
5 pages (1422 words) , Download 2 , Research Paper
Free
Roper advises that internet users should be communicated the relevance of installing anti-spam security software on their systems. Roper also stated that it is advised to never reply to spam since it confirms the active status of the email account; this encourages the spammers to send more spam emails.
Preview sample
Mobile Phone Health Information Technology Literature review
4 pages (1313 words) , Download 3 , Literature review
Free
The use of mobile phones has grown at a high rate over the past few years. As such, it has been an essential tool for the current human lifestyles. Society has embraced mobile technology in many of their daily activities including banking, health and even in the management of their daily activities. Mobile health has developed through mobile technology promoting the health sector in what constitutes m health or m-Health.
Preview sample
Super Mario Game Information Technology Research Paper
3 pages (750 words) , Download 15 , Research Paper
Free
Unlike the past when we were presented with not so smooth graphics of NES version of Super Mario, the arrival of Nintendo 64 has changed everything. 3D and good visual effects have made playing Mario games a fascinating experience (Bueno, 2009). Describe the nature of the user interface in details for Super Mario game?
Preview sample
The Role of Computer Technology in the Human Race Information Technology Thesis
8 pages (2150 words) , Download 2 , Thesis
Free
Computer technology has been a source of numerous changes that could not have been thought of before it. With the help of this new horizon man was able to compute large calculations and thus realize the meanings of the most of the data that was present around him.
Preview sample
DigiTools: Technology Application Tools Information Technology Report
8 pages (2127 words) , Download 2 , Report
Free
Despite being in the medical department, not all doctors are specialized in all areas. However, a patient may require emergency resuscitation or services that require urgent attendance in order to save a life which is the key aspect of patient care. The services may not be available being that the doctor concerned is committed or attending to another procedure in a different place.
Preview sample
Technology: A Blessing Information Technology Term Paper
10 pages (2774 words) , Download 3 , Term Paper
Free
Aside from the convenience and easy access, the power of computers and internet have opened up access to invincible quantity of information as never before. This has contributed a lot to advancement in medical field, educational field, business world and social life.
Preview sample
Digital Image Metadata and Exif Files Information Technology Research Paper
6 pages (1942 words) , Download 3 , Research Paper
Free
In the Exif Image file structure shown in Figure 3, “GPS IFD” is used as metadata for storing geographical information about the image. Figure 8 shows the contents stored in GPS IFD which is generally used to identify the location of any captured image. (Technical Standardization Committee on AV & IT Storage Systems and Equipment, 2002)
Preview sample
The Implementation of a Computerized Database Information Technology Essay
1 pages (799 words) , Download 2 , Essay
Free
This report represents a critical evaluation of the database system initially. The business rules of the system are presented next. The ER- model is designed according to the business rules. Finally, the list of key attributes and a list of relationships are provided. The implementation of a computerized database will provide several advantages to Lanchester Liners Company.
Preview sample
Technology: An Aid for Security or Stalking Information Technology Essay
5 pages (1501 words) , Download 3 , Essay
Free
People are living in an era where everything seems to be possible, technology advancements being made daily. A useful yet dangerous technology invention when it gets into the wrong hands is the surveillance device. These devices are being developed over the past 3 decades from the analog closed-circuit television (CCTV) to the digital Internet Protocol (IP) Video.
Preview sample
The current State of Security in Smartphone Information Technology Term Paper
5 pages (1466 words) , Download 2 , Term Paper
Free
The installation of applications from unreliable sources makes the data vulnerable since the hidden motive behind the application may not be apparent to the user at the time of installation of the application. Some developers often piggyback Trojans with valid applications that make the smartphone perform malicious activities.
Preview sample
Setting up Connection at Home Information Technology Essay
6 pages (1500 words) , Download 2 , Essay
Free
The author explains that a home network is established as a local area network. In addition, LAN (Local Area Network) outlines a network that covers a small geographic region like that office, home, or group of structures. In addition, home networks are used to share printers, files and a single connection to the internet among a group of systems.
Preview sample
Types of electronic medical records Information Technology Essay
5 pages (1250 words) , Download 3 , Essay
Free
An electronic health record is a digital version of a patient’s medical information which is maintained by the user over time. It usually keeps records on the relevant clinical information about the patient’s health history. Mainly it includes information on the person’s demographics, health problems, vital signs, progress notes, medications.
Preview sample
Development of Staffing Management Plan Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
Preview sample
Comparison of Quality Philosophies Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
t of non-conformance Cost of non-conformance Role of Top Management Qualitative decision making begins from the top Improve managerial skills Demonstrate commitment, improve quality awareness, participation Leadership and participation Role of the Worker Enhanced team work, treat other departments as internal customer and improve productivity Assume responsibility and improve teamwork Quality awareness, personal concern and personal goal setting High level involvement The above table clearly demonstrates that the philosophies of Deming, Juran and Crosby clearly outline a distinctive approach to quality.
Preview sample
Tools for E-Businesses Information Technology Research Paper
8 pages (2156 words) , Download 2 , Research Paper
Free
The intent of an e-business is to generate income, strengthen service and limit price by expanding using the Internet. The prospects of online trading have substantial revenue and its realized when the services perform for the business. E-business has evolved and is continually changing to accommodate new technology, inventions, and innovations.
Preview sample
LAN Reliability and Availability Information Technology Research Paper
5 pages (1537 words) , Download 3 , Research Paper
Free
The changing level of technology has a great impact on organizational operations globally, especially in communication, which is essential in any organization. The process through which information is passed from one place to another becomes imperative due to the requirements of time and information integrity.
Preview sample
Human Factors in the Design of the Input Systems Information Technology Assignment
4 pages (1462 words) , Download 3 , Assignment
Free
Human factors refer to the "human characteristics”. A variety of human factors normally fall into one of three divisions of human personality such as physiological characteristics, physical characteristics, and psychological or behavioral individuality. However, these sub-divisions of human factors are not essentially equally limited (Nelson & Associates, 2010).
Preview sample
Wireless Network Security - Cloud Computing Network Information Technology Personal Statement
3 pages (750 words) , Download 3 , Personal Statement
Perhaps the gradual trigger to the interest in wireless networking security can be traced back from the vast time that I dedicated to the study and teaching Information technology. In my Undergraduate and Masters Studies at King Abdulaziz University, Jeddah; I encountered several cases of computing data hacking and unauthorized access to data centers.
Preview sample
Managed Service Provider Information Technology Research Paper
4 pages (1145 words) , Download 3 , Research Paper
Free
Before going into the discussion regarding managed service providers, let us get a better understanding of what a managed service provider actually is. White (n.d.) states, “A managed service provider supplies businesses with information technology needs via the Internet”. Through the above statement, it is clear that the major role of a managed service provider is to fulfill the IT needs of businesses.
Preview sample
People Capability Maturity Model Information Technology Research Paper
3 pages (750 words) , Download 2 , Research Paper
The best that corporations can do is to create an environment that makes the best people want to stay.” Business week, 21 August 2000 Nowadays all the organizations are facing tough competition in two markets i.e. one competition in the products and services (business market) and the other competition for the human force needed to produce these products and services (talent market).
Preview sample
EbXML - History and Features Information Technology Research Paper
4 pages (1158 words) , Download 2 , Research Paper
Free
The full form of ebXML or e-business XML is Electronic Business using eXtensible Markup Language. It is a member of the XML-based specifications family. The mission behind this technology is to institute an XML-based architecture that would enable the global utilization of electronic business data through a consistent, secure, interoperable, and most importantly, open-source framework.
Preview sample
How Popular Forms of Written Communications in Information Technology Can Be Improved Information Technology Research Paper
6 pages (1671 words) , Download 2 , Research Paper
Free
Companies utilize written communication to inculcate employees on company guiding principles, let customers know about goods, as well as services, and explain to investors of business strategies. The answer to writing effectual company communication is by tailoring the form of communication to your target addressees. 
Preview sample
A Survey of the Current State of Security in Smartphones Information Technology Term Paper
6 pages (1869 words) , Download 2 , Term Paper
Free
As you may notice in the examples above, there is no longer a need to steal or possess the mobile device in order for you to make use of its contents. Hackers and programmers can create programs to infect your devices such as smartphones and take your information, use it against you, or destroy your data.
Preview sample
Radio-Frequency Identification Information Technology Essay
3 pages (750 words) , Download 2 , Essay
Normal audio or video signals cannot travel longer distances and therefore these signals are superimposed with electromagnetic carrier waves which are capable of traveling longer distances. The process is called modulation and the resultant waves (carrier waves + audio/video waves) are called radio waves.
Preview sample
The Concept of Violence and Crimes Information Technology Article
6 pages (1529 words) , Download 2 , Article
Free
The police department in the Virgin Islands looks at ways that will assist them as the main security providers in the district through Management Information Systems Bureau. The mission statement covered the locals. The objective section narrows down to the relevant party that will enable the new system to work successfully.
Preview sample
4G Trial Volunteers in the UK Information Technology Report
9 pages (2622 words) , Download 2 , Report
Free
High-speed data with high security and instant download is enabled by 4G which is based on WiMAX and LTE and supports the WiMAX Network systeь and mobile phone set. 4G technology enabled smartphones are based on wireless IP connectivity and manage voice data through packet-switching instead of circuit-switching as in the case of 3G.
Preview sample
Copyright Compensation and Intellectual Property Case Information Technology Essay
4 pages (1130 words) , Download 2 , Essay
Free
In the case of other companies such as NewLeaf Technologies who are looking to make use of an important property without the required permissions, they better think twice and seriously consider whether their actions are still within the boundaries of intellectual property rights. Otherwise, they may be facing serious and damaging suits. 
Preview sample
Network Security: a Vital Element in Todays Booming Commerce Information Technology Report
12 pages (4826 words) , Download 2 , Report
Free
A Virtual Private Network is an innovative concept since it allows clients to securely communicate over an insecure medium. A VPN enables enterprises to maintain connections between private networks in a secure manner. In addition, the use of a VPN is extremely crucial since effective internet communication is impossible to achieve without proper networks.
Preview sample
Phenomena of Piracy and Copyright Laws Information Technology Essay
4 pages (1000 words) , Download 2 , Essay
Free
The author states that the enormous success of systems such as Napster and iTunes has been a gift for individuals who want to avoid paying for downloading music. However, the peer-to-peer environment has been all that wonderful considering the fact those issues such as reliability, security, and routing.
Preview sample
Protecting Intellectual Property Rights In Software Information Technology Essay
5 pages (1250 words) , Download 2 , Essay
Free
Intellectual property right is not a new term for the current developing software industry. The term covers a variety of intangible rights of possession in a technology based asset like that software program. Every intellectual property "right" is itself a personal or corporate asset, a piece of the general possession pie.
Preview sample
The Need for Organizational Competencies Information Technology Essay
4 pages (1303 words) , Download 2 , Essay
Free
Generally speaking, there is a very complex and dangerous environment for security and privacy. In this scenario, there is a critical need for applying more appropriate security and privacy management technology-based solutions. However, for the implementation of such solutions, there is a need for effective planning and management of overall development.
Preview sample
How a Real Organization has Implemented Help Desk Information Technology Essay
4 pages (1152 words) , Download 2 , Essay
Free
An example of a real organization that has implemented help technology support operations is Novell Corporation. Novell is a multinational company that deals with software and services (Novell part 1). It specializes in systems management solutions, networking operating systems, and collaboration solutions (Novell part 2).
Preview sample
4G Cellular Communication Information Technology Research Paper
6 pages (1500 words) , Download 2 , Research Paper
Free
The journey of 4G began in the 1970’s when the first generation (1G) was launched that mainly used analog system. The second and third generation (2G & 3G) used digital system that was embraced by the people. 4G is expected to change the life of people entirely through various ways such as in communication sector.
Preview sample
Intelligence Collection at the United Nations for Peacekeeping Operations Information Technology Essay
4 pages (1186 words) , Download 2 , Essay
Free
This piece will address a total of three elements in analyzing the seminar paper "Intelligence Collection at the United Nations For Peace Keeping Operations”:  1) the strengths of the seminar paper and how well it addresses the topic; 2) the weaknesses of the seminar paper, and 3) suggestions for improvement.
Preview sample
The Discovery of Stored Personally Identifiable EU Member Information Information Technology Report
7 pages (2023 words) , Download 2 , Report
Free
Over the past years, the pre-trial for forensic discovery procedures and the necessary requirements carried out in the US have gradually changed. This is mainly in the area of forensic investigation requirements, where the US has been granted the right to search for the electronically stored data of individuals.
Preview sample
Cornish Villages 4G Trial Information Technology Report
10 pages (2862 words) , Download 2 , Report
Free
In October 2011, a trial run utilizing 4G/LTE technology was commenced among 200 residents of South Newquay and St Newlyn East in Cornwall, with mobile firm Everything Everywhere and wholesale service provider BT Wholesale. It was preceded by eight-week laboratory tests, and is not limited to mobile phone subscribers but also to fixed-line users, for which it is “a world first”.
Preview sample
Competitive Advantage through Innovation Information Technology Essay
3 pages (1148 words) , Download 3 , Essay
Free
Corporations progressively demand that IT investments return business value in form of quantifiable results. However, it is an admitted fact that at the present, information technology is offering excellent support for the management of business activities. In addition, corporations use information technology to manage all areas of business.
Preview sample
9401 - 9450 results of 10236 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us