Javascript is disabled. Please enable it for better working experience.

Essay on Technology

Writing an essay on a technology topic is not an easy task as it requires much research regarding the topic. Reviewing past essays in this case will provide students with a better sense and direction to the assignment. Researchomatic, therefore, has one of the biggest collections of essays on technology and related subjects in order to support and assist students in getting quality literature.

Renewable Energy And Squatter Settlement
Rating
Renewable Energy and Squatter Settlement Renewable Energy and Squatter Settlement Introduction The power sources are working more or less complex nature of man can extract energy for a particular job or get some use. Since prehistoric times, when mankind discovered fire for warmth and roasting, to the Middle Ages in which built windmills ...
Google Critique
Rating
GOOGLE CRITIQUE Google Critique: An Application of Depoliticization Theory Google Critique: An Application of Depoliticization Theory Introduction “Google critique: An application of depoliticization theory” is the research study conducted by Brian R. Hall which was published in August issue of International research journal named as Technology in Society. This research paper has covered a ...
Fuzzy System In Matlab
Rating
Fuzzy System In Matlab Fuzzy System In Matlab 1. Introduction In our Arabian nation peopled areas is very small comparing to total area because fresh water resources concentrate in these areas. Now, the existing fresh water almost enough for our needs, but in the near future with increasing in people numbers ...
Fuzzy Logic
Rating
FUZZY LOGIC Fuzzy Logic Fuzzy Logic Question 1 - Type 2 fuzzy logic a) Type-2 fuzzy sets and systems generalize (type-1) fuzzy sets and systems so that more uncertainty can be handled. From the very beginning of fuzzy sets, criticism was made about the fact that the membership function of a type-1 fuzzy ...
Designing A Robot
Rating
Designing a Robot Designing a Robot Introduction One of the main concerns in robotics is to plan a path for a robot system moving purposely and safely in an environment filled with known or unknown obstacles. There are two distinct categories which all existing approaches on robot motion planning fall into (Lumelsky 93). ...
Management Of Information Security
Rating
Management of Information Security Management of Information Security Introduction In this age of cutting edge technology, more and more companies have become dependent on technology in the form of information systems. These systems have many benefits for the organization. However, they also come with different types of direct and indirect risks. Hence, ...
Role Of Technology In Bringing Social And Cultural Change
Rating
Role of technology in bringing social and cultural change Role of technology in bringing social and cultural change Introduction The institutions of society are modified by the mass media technologies and this becomes an instrument of legitimating new meanings, stabilization of existing or alteration of previously built. Information technology has had its ...
Prolog Programming Language
Rating
PROLOG PROGRAMMING LANGUAGE Prolog Programming Language Prolog Programming Language Introduction Fuzzy Logic Programming integrates fuzzy logic and pure logic programming in order to provide these languages with the ability of dealing with uncertainty and approximate reasoning. There is no common method for this integration, though, most of the works in this field can ...
Neural Network-Based Cryptographic System
Rating
Neural Network-Based Cryptographic System Studying the Performance of Neural Networks on Problems Related to Cryptography Studying the Performance of Neural Networks on Problems Related to Cryptography Introduction Public key cryptography has motivated a number of hard and complex mathematical problems. These problems are related to computational algebra (?nite ?elds, ?nite groups, ...
Neural Network Model
Rating
Neural Network Model Neural Network Model for Detecting Intrusions or Attacks on a Network KDD Cup 1999 Computer Network Intrusion Detection Introduction The increasing reliance on networked computers, and the growing expertise in subverting such systems, makes intelligent and adaptive threat detection vital. Computer security revolves around con?dentiality, integrity, and availability. ...
191 - 200 of 1085 Go To Page 15  16  17  18  19  20  21  22  23  24