Javascript is disabled. Please enable it for better working experience.

Dissertation on Technology

PhD students and postgraduate technology students are required to submit multiple dissertations (based on university requirements) for degree completion. The dissertations require much research and review of the past literature. To assist them with their research, this section of Researchomatic comprises solely of dissertations on technology. Students from all around the world access these dissertations for a good quality literature review.

Forensic Analysis On Android Mobiles
Rating
Forensic analysis on Android Mobiles By Acknowledgement I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible. Declaration I [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided ...
Gender Identity In Second Life
Rating
Gender Identity in Second Life By ACKNOWLEDGEMENT I would like to take this chance for thanking my research facilitator, friends & family for support they provided & their belief in me as well as guidance they provided without which I would have never been able to do this research. DECLARATION I, (Your name), would ...
The Role Of The Production/Project Manager exploring The Relationship Between Identity And Work
Rating
The role of the Production/Project manager Exploring the relationship between identity and work By ACKNOWLEDGEMENT I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible. DECLARATION I, [type your full first names and surname here], declare that the contents ...
Case Study Analysis And Simulation-Based Comparative Study Of Is-Is And Ospf In Any Enterprise Environment
Rating
[Case Study Analysis and Simulation-Based Comparative Study of IS-IS and OSPF in any Enterprise Environment] By ACKNOWLEDGEMENT I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible. DECLARATION I, [type your full first names and surname here], ...
Proposal
Rating
PROPOSAL Simulation-Based Comparative Study of IS-IS and OSPF [Name of the Institute] Simulation-Based Comparative Study of IS-IS and OSPF CHAPTER 1: INTRODUCTION In modern era, computer communication networks are growing rapidly day by day. Communication technology facilitates provision of such services as file transferring, print sharing, video streaming and voice conferencing. Internet is a global ...
The Identification Of Genes Involved In Exo-Polysaccarides Production In Rhodobacter Sphaeroides 2.4.1 Regulated By The Response Regulator Rsp0087
Rating
[The identification of genes involved in Exo-polysaccarides production in Rhodobacter sphaeroides 2.4.1 regulated by the response regulator RSP0087] by Acknowledgement I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible. Declaration I, [type your full first names and ...
Metal Organic Frameworks
Rating
[Metal Organic Frameworks] By ACKNOWLEDGEMENT I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible DECLARATION I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and ...
Cyber Security Management
Rating
CYBER SECURITY MANAGEMENT Cyber Security Management in a Real Time Distributed Control Systems: A Field Based Case Study By ABSTRACT Real time distributed control systems are widely distributed systems, and require a large number of remote terminals, each controlling a small number of devices, and gathering data from a small number of sensors. In ...
Cloud Computing Security: How Secure Is The Cloud?
Rating
Cloud Computing Security: How Secure is the Cloud? by Table of Contents CHAPTER 1: INTRODUCTION1 Background of the Study1 Research Aims and Objectives3 Significance of the Study3 Hypothesis/Research Question4 CHAPTER 2: LITERATURE REVIEW5 Cloud Computing5 Cloud Computing: Advantages and Disadvantages5 Cloud Computing Security Concerns9 CHAPTER 3: METHODOLOGY12 Search Technique12 Inclusion and exclusion criteria12 Search terms - key terms13 REFERENCES14 Chapter 1: Introduction Background of the Study Cloud computing is ...
Cloud Computing Security: How Secure Is The Cloud?
Rating
Cloud Computing Security: How Secure is the Cloud? by ACKNOWLEDGEMENT I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible. DECLARATION I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent ...
171 - 180 of 302 Go To Page 13  14  15  16  17  18  19  20  21  22