Javascript is disabled. Please enable it for better working experience.

Dissertation on Technology

PhD students and postgraduate technology students are required to submit multiple dissertations (based on university requirements) for degree completion. The dissertations require much research and review of the past literature. To assist them with their research, this section of Researchomatic comprises solely of dissertations on technology. Students from all around the world access these dissertations for a good quality literature review.

Internet
Rating
INTERNET Internet Today Table of Contents CHAPTER 02: LITERATURE REVIEW1 Internet: The epitome of life1 Internet and Consumer Markets1 Creating online presence3 Net Generation5 Exploration of the net6 Purchasing6 Attitudes to online consumption7 Conclusion10 References12 CHAPTER 02: LITERATURE REVIEW Internet: The epitome of life With the world now progressing at the speed of light, keeping track of changes which tend to prevail and ...
Preventing Online Identity Theft And Phasing
Rating
Preventing Online Identity Theft and Phasing By ACKNOWLEDGEMENTS First, I would like to thank God and my family for giving me unconditional support through all my personal and professional development. I would also like to show my appreciation to a number of people that where key to the development of this study. First, ...
Investigation Into The Absence Of Kuwaiti Young Leaders Within The Internet Service Providers Sector In Kuwait
Rating
Investigation into the Absence of Kuwaiti Young Leaders within the Internet Service Providers Sector in Kuwait By Table of Contents CHAPTER 3: METHODOLOGY1 Research Philosophy1 Research Methodology2 Research Plan and Design3 The Qualitative Research3 Research Participants4 Methods of Data Collection5 Methods of Data Analysis5 The Quantitative Research5 Structure of the Questionnaire6 The Research Function7 Data Collection Validity and Reliability8 Research Process Ethics and Confidentiality9 Conclusion10 REFERENCES11 CHAPTER 3: ...
Create And Simulate An Efficient College It Infrastructure
Rating
[Create and Simulate an Efficient College IT Infrastructure] by ACKNOWLEDGEMENT I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible. DECLARATION I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent ...
Airline Revenue Management
Rating
Airline Revenue Management by ACKNOWLEDGEMENT I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible DECLARATION I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, ...
Security Threats In Mobile Ad Hoc Networks
Rating
Security Threats in Mobile Ad Hoc Networks ACKNOWLEDGMENT I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible DECLARATION I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent ...
Web Service Technologies- Wsdl
Rating
Web Service Technologies- WSDL by Table of Contents INTRODUCTION3 PROBLEM STATEMENT4 PURPOSE/OBJECTIVES4 RESEARCH QUESTIONS5 THESIS CONTRIBUTION5 SCOPE OF THE THESIS6 LITERATURE REVIEW6 RESEARCH METHODOLOGY9 REFERENCES18 Web Services Technologies- WSDL Introduction Many companies provide access to their services and products through web services. For example, a wide variety of businesses that provide services to other businesses, such as shipping companies and credit card processing organizations, ...
Manet
Rating
MANET Security Threats in Mobile Ad Hoc Networks Security Threats in Mobile Ad Hoc Networks Chapter 1: INTRODUCTION Introduction This paper involves a discussion of the security issues and possible solutions in the mobile ad hoc network. The important characteristics of Mobile Ad Hoc Networks (MANET) include self-organisation and wireless medium. The wireless ...
Importance Of Runway Incursion Mitigation And The Role Of Safety Improvements With Perimeter Taxiway Operations At Heathrow Airport
Rating
Importance of Runway Incursion Mitigation and the Role of Safety Improvements with Perimeter Taxiway Operations at Heathrow Airport By TABLE OF CONTENTS CHAPTER 1: INTRODUCTION1 1.1. Background of the Study1 1.2. Problem Statement3 1.3. Purpose of the Study3 1.4. Aims and Objectives4 1.5. Rationale of the Study5 1.6. Research Questions7 1.7. Significance of the Study7 1.8. Ethical Considerations8 1.9. Definition of Terms8 REFERENCES9 CHAPTER ...
Transforming A Visual Basic Source Code Into An Algorithm
Rating
  [Transforming a Visual Basic Source Code into an Algorithm] by TABLE OF CONTENTS ACKNOWLEDGEMENT2 DECLARATION3 CHAPTER 2: BACKGROUND4 Introduction5 Education programming languages in high schools6 Reverse Engineering9 Reverse Engineering process11 Reverse Engineering and Software Systems12 Legacy System13 New Software System14 Objectives of Reverse engineering15 CHAPTER 3: LITERATURE REVIEW17 Introduction17 Algorithms18 Algorithms as a technology20 Classification of Algorithm21 Recursive or iterative21 Logical or procedural21 Serial or parallel21 Deterministic or non-deterministic22 Dynamic programming22 The greedy method23 Implementing ...
111 - 120 of 302 Go To Page 7  8  9  10  11  12  13  14  15  16