Javascript is disabled. Please enable it for better working experience.

Dissertation on Technology

PhD students and postgraduate technology students are required to submit multiple dissertations (based on university requirements) for degree completion. The dissertations require much research and review of the past literature. To assist them with their research, this section of Researchomatic comprises solely of dissertations on technology. Students from all around the world access these dissertations for a good quality literature review.

Information Security
Rating
INFORMATION SECURITY Information Security Student Number Student Name Course Supervisor's Name Table of Contents PART B3 Academic Question3 Aims3 Objectives3 PART C5 Introduction5 Literature Review6 PART D13 Project Progress13 Planned Progress15 PART E16 Part B Academic Question What is the perception of risk and the strategic impact of existing IT on information security strategy? Aims The aim of this research, therefore, is to explore the following three issues: AIM 1: How do ...
Enhancing The Security Of 3-D Secure
Rating
Enhancing the security of 3-D secure by [Month, Year] TABLE OF CONTENTS LIST OF ABBREVIATIONiii EXECUTIVE SUMMARYiv Introduction1 Provisional Title of Project1 Aim of the Study1 Objectives of the Study1 Methods to be used3 Research strategy4 The work plan6 Key Milestones of the project6 Literature Review6 Additional comments10 BIBLIOGRAPHY13 APPENDIX18 LIST OF ABBREVIATION CNP: Card Not Present SSL: Encryption Secure Socket Layer MPI: Merchant plug-in interface EXECUTIVE SUMMARY In this research proposal, ...
Enhancing The Security Of 3-D Secure
Rating
Enhancing the Security of 3-D Secure by ACKNOWLEDGEMENT I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible. DECLARATION I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own ...
Role-Based Database Security (Rbds) Design author’s Name
Rating
Role-Based Database Security (RBDS) Design By [Department or University Name] ACKNOWLEDGEMENT I would like to thank my family, especially my good kids Nouf and Fares my lovely wife Mshale and my brother Abu Nawaf for their support shown not only during the time for this project but for the whole time I ...
Mpls Over An Ipv6 Infrastructure
Rating
MPLS Over An IPv6 Infrastructure by Acknowledgement I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible. DECLARATION I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own ...
Role-Based Database Security (Rbds) Design author’s Name
Rating
Role-Based Database Security (RBDS) Design By TABLE OF CONTENTS CHAPTER 1: INTRODUCTION3 Background of the research4 Problem Statement4 Rationale4 Significance6 Aims and Objectives6 Theoretical Frame work6 Limitation of the Study7 CHAPTER 2: LITERATURE REVIEW8 Advantages of RBAC Over Other Existing Security Models9 Core RBAC Features10 RBAC Critique13 Designing Database Security Model14 Roles and Groups14 Level Based15 User Based16 Group Based17 Responsibility based17 Network object18 Permission19 Role Hierarchy19 Inheritance20 Private roles21 Private-Role Hierarchy22 Global-role Hierarchy23 The ...
Student Record Prototype System
Rating
[Student Record Prototype System] by TABLE OF CONTENTS CHAPTER 3: FORM TYPE3 Database Schema4 The Language Tutor8 Consolidation10 REFERENCES16 CHAPTER 3: FORM TYPE A number of free GIS packages are listed in a document entitled “Open Source GIS”, last updated in 2008. However, many of the packages listed here are not fully fledged GIS software packages with an appropriate ...
Student Record Prototype System
Rating
Student Record Prototype System [Name of the Institute] [Name of the Supervisor] TABLE OF CONTENT CHAPTER 4: DISCUSSION AND ANALYSIS3 CHAPTER 5: STUDY TWO: STUDENT PROBLEM-SOLVING BEHAVIOR8 Comparison15 Results of rater classification19 Training examples23 CHAPTER 6: CONCLUSION25 Future plans26 REFERENCES29 CHAPTER 4: DISCUSSION AND ANALYSIS The area of artificial intelligence and knowledge-based systems offers great potential for enhancing the support of simulation ...
How Shouldthe Internet Be Adopted In Primary Education System So That Young Children Can Use It Positively And Constructively In Order To Avoid The Menace That Comes With It?
Rating
How shouldthe Internet be adopted in primary education system so that young children can use it positively and constructively in order to avoid the menace that comes with it? by ACKNOWLEDGEMENT I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research ...
Digital Video Production As A Literacy Practice In Uk
Rating
Digital Video Production as a Literacy Practice in UK By ABSTRACT Digital video production has the ability to alternate between modes of reception and production as students view and transform their texts. Film language may present an opportunity to teach kids how to be communicatively competent across different discourse communities with particular emphasis ...
161 - 170 of 302 Go To Page 12  13  14  15  16  17  18  19  20  21