Sorry! No results found
Please visit us back tomorrow as we add 10, 000 new research topics everyday!
About 10 results ( 0,24 seconds)
queuing delay in a network, which carries information about traffic characteristics and congestion properties. The measurement results can be used to describe the normal behavior of the network and detect distributed denial-of-service attac...
and with the increase in the utilization of informational technologies and tools in the societies and companies, the threats have also raised for the people. At one end the information technologies are being used for the betterment of the ...
my career with a Sun 350 on my desk (Motorola 68010 processor, 17 inch screen graphic, diskless-server access to the network-, Sun Unix BSD 4.2 ...): c ' was a Rolls. Today I have more power in my pocket PC. All this to say that the segment...
1.5 Research Design11 1.5.1 Phenomenological Study12 1.5.2 Theoretical Framework14 1.5.3 Questionnaire Design15 1.5.4 Primary Sources16 1.5.5 Reliability of Research17 1.5.6 Research Ethics18 1.5.7 Validity of the Study19 1.5.8 Limitations...
simplified forms of the problem. In, a cell is presumed to have an exact form (hexagonal topology) and then a propagation form is not used. Many seek algorithms have been utilised for explaining multiobjective combinatorial optimization pro...
quality. The modern day engineers have this common task to improve the quality of existing devices and products. The role of engineer as a quality improving engineer is not hidden as all the products have dramatic improvements in their ease...
(5 U.S.C. 552a) is a federal law that requires each federal agency to follow privacy and records management rules for most compilations of personal information maintained by the agency. Changes in information technology have made significa...