Javascript is disabled. Please enable it for better working experience.

Research Papers on Engineering

Engineering is the process of creating, inventing, envisioning and building the world around us. Students are often asked to submit research papers in their semesters. Therefore Researchomatic is helping users by providing latest engineering research papers. The engineering research papers that are available on Researchomatic consist of both old and new developments in the field of engineering.

Robin-Karp Algorithm & Boyer-Moore Algorithm
Rating
Robin-Karp algorithm & Boyer-Moore Algorithm Robin-Karp algorithm & Boyer-Moore Algorithm Rabin-Karp algorithm The core aim of the algorithm of Rabin-Karp was to determine a pattern which involves a substring within a text with the usage of hashing. It has been observed that this algorithm is of considerable theoretical importance and is also considered ...
Dynamics Around The Coal Power Plant
Rating
Dynamics around the Coal Power Plant Introductory Overview2 Coal Power Plant3 Efficiency5 Changing the thermo physical properties of the working medium5 Introduction of composite working medium6 Fluidized bed combustion6 Integrated gasification combined cycle7 Working Principle: Rankine Cycle9 Types of Pulverizers10 Boiler11 Types of Boilers13 Economizer15 Air preheater16 Electrostatic precipitator16 Smoke stack17 Generator17 Transformers18 Boiler Principles18 Thermodynamics18 Saturated Steam to Superheated Steam20 Heat Transfer22 Thermal Modes22 Energy Balance23 Vapor Power Systems of A Thermodynamic ...
Biometrics
Rating
Biometrics Biometrics Introduction The term biometrics is derived from two Greek words bio and metrics, which mean life and to measure respectively. This depicts that biometrics is used to measure or quantify the traits or characteristics of a living being. The term is now used mostly, to refer to the science and technology ...
Coal Thermal Power Plant
Rating
Coal Thermal Power Plant Introduction Steam Power Plant A thermal power station is a facility that produces electricity from burning coal, fuel oil or gas in a boiler designed for this purpose. The operation of all power plants or power plants is similar. Fuel is stored in parks or adjacent tanks, from where ...
International Conference Paper: Information Security Policy Development
Rating
International Conference Paper: Information Security Policy Development KEYWORDS - Information Security, UAE e-government, Controls, Risks ABSTRACT The information security policy would describe security in several terms, but is not simply guidelines, procedures or standards. It is a statement of goals to be achieved by procedures applied to different departments. Policy would guide employees ...
Can Good Hacker Stop Fight Against
Rating
Can good Hacker stop fight against The following paper discusses about the Cyber Crime can good hacker help in fighting against the cyber crime. The following paper has three parts; the first part gives an overview, which will be discussing the overview of the paper. The second part is a ...
Video Games
Rating
Video games Video games Introduction Children of all ages need some fun activity to keep them going. One of the most popular ways of entertainment for children is the video games. They are known as an excellent source of entertainment for all age groups of kids and even adults. Some people consider it ...
Implications Of Encryption
Rating
Implications of Encryption [Name of the institute] Implications of Encryption Introduction The world has evolved dynamically and so are its approaches and perceptions. Privacy and secrecy have to be maintained and guarded against the illegal intrusion. Even in olden days people have appeared to be concerned about the secrecy of their messages and ...
Wireless Local Area Network: Security Issues And Countermeasures
Rating
Wireless Local Area Network: Security Issues and Countermeasures [Name of the Institute] Introduction1 Security Issues1 Active Attacks1 Types of Active Attacks1 Denial-of-Service (DoS)2 Message Modification2 Replay2 Masquerading2 Passive Attacks2 Traffic Analysis3 Eavesdropping3 Other Types of Attacks3 Availability Attacks3 Authentication Attacks3 Confidentiality Attacks3 Integrity Attacks3 Access Control Attacks4 Countermeasures4 Technical Countermeasures4 Turning on Encryption4 Activation of Firewall4 Changing default SSID4 Prevention of Auto Connection to Open WiFi5 Disabling adapter of WiFi5 Operational Countermeasures5 Management Countermeasures5 Summary6 References8 Wireless Local Area Network: ...
Managing Human Factors In Aircraft Maintenance
Rating
Managing Human Factors in Aircraft Maintenance Abstract It is evident through the US statistics that almost eighty percent of the accidents and malfunctions in aviation and aircrafts industry are because of human factors with fifty percent because of managing human factor issues. Since over ten years, the term P.E.A.R has been employed ...
41 - 50 of 373 Go To Page 1  2  3  4  5  6  7  8  9  10