Search for an essay or resource:

Organization is a social unit of people

Introduction : Organization is a social unit of people, systematically arranged and managed to meet a need or to pursue collective goals on a continuing basis. All organizations have a management structure that determines relationships between functions and positions, subdivides and delegates roles, responsibilities and authority to carry out defined tasks. Every organization needs to imporove their strategical approach to gain competitive advantage, survival in market and also to achieve targets in global markets. Many … Read more

MIMO system

LITERATURE REVIEW   Nowadays, the high-speed cellular network has grown rapidly. This high-speed cellular network develops as the number of users increases. The increasing number of users will cause high demand and large data-rate requirement may be needed. The multiple-input multiple-output (MIMO) has been developed in promising better spatial diversity and system capacity. Basically, this … Read more

Web program assaults

Web program assaults are a portion of the main vectors used to pick up passage into systems. Numerous striking program assaults use malware – noxious programming that can contaminate frameworks with code to take verification information or make frameworks wind up plainly inaccessible to honest to goodness clients – and accordingly trade off host frameworks … Read more

SSL vs TLS

Summary Introduction Background Secure connections in the time that we live is vital due to the vast number of people who transfer data that is private online, for example, shopping and entering card details. The way that these connections are established is just as important, as a flaw in establishing the connection can lead to … Read more

Wireless Sensor Network – Deployment

Abstract: Wireless sensor network is growing area for research, commercial development and armed forces of country. Performance of Wireless Sensor Network depends on coverage and connectivity of network whereas coverage of network depends on deployment of sensors. Deployment can be done either Random deployment or Deterministic deployment. Deterministic deployment of homogenous sensor nodes is impractical … Read more

Internet Safety For Children

Internet safety for children has become a rising concern to parents all around the world. Every day we hear and watch some sort of disturbing news regarding children who fall victims to dangerous predators, who have found a new and easy way of preying on their victims by the use of the Internet from the … Read more

Development of computing technology

Ever since the inception of the computer, every iteration has needed a processor that handles the logic that the system was designed for. These processors could only handle a single task at a time until the introduction of multi-core processors. Multicore processors overcome the limitation of previous processors by combining two or more processing units … Read more

Components of a computer

Internal Components It is important for any computer system to consider the internal components, they need to be compatible in order to make a fully functional computer system. When you do not consider how the components interact with each other (either connecting together physically or communicate/share information). Processors The processor works like the brain of … Read more

Big data

In the modern age of information technology, the sheer volume of data that is harvested has exploded exponentially with the advent of the internet and sensory technology making note of changes in their environment. Businesses collate this information and use it to their advantage to better their business, customer experiences, predict trends and identify previous … Read more

New technology

INTRODUCTION With the discussions of even though technology can be further advanced, is is fully necessary, there are many questions posed from that statement. New technology can be highly beneficial, from helping people’s health to increasing the safety and efficiency of transportation. Even with the social stigmas that new technology was given, it is the … Read more

Mobile-responsive web design

Mobile-responsive web design is the approach that suggests that design and development should respond to the customers’ behavior and environment based on screen-size, platform and orientation. The practice consists of a mix of flexible grids and layouts, images and an intelligent use of CSS media queries (Smashing Magazine, 2011). This means that websites should now … Read more

The Use Of Instant Messaging

Instant Messaging is the most-used form of communication within society today. However, studies have shown that the new application, Snapchat, has rapidly been rising in numbers regarding users and every day usage. The purpose of this study was to look at the nature of Snapchat, why it’s so appealing, and what exactly is so appealing … Read more

E-waste: A hidden source of waste

Protecting the environment has always been one of the top priorities of many countries these days. However, little do we know that not only are plastic bags and other types of household waste the main sources for pollution; there is another type of waste, electronic waste (or e-waste), that is rapidly increasing every year due … Read more

Apple and their war with Privacy

Apple is currently battling the war on privacy. The United Nations recognizes “privacy” as a basic human right as does Apple. The question of how much of your privacy are you giving up by obtaining a smartphone has been a hot topic in the news lately. An iPhone like most other smartphones can locate itself, … Read more

Security Mechanisms of Virtual Private Network

III. Security Mechanisms of Virtual Private Network To prevent leaking or stealing of private information VPNs typically allow only authenticated remote access using tunnelling protocols and various encryption techniques. VPNs cannot make the user completely anonymous in the internet, but they can usually increase anonymity and confidentiality of the information. To prevent disclosure of private … Read more

Variable voltage regulators

5.5 723 Variable voltage regulators The 3 terminal regulators have the following limitations : (i)No short circuit protection. (ii)Output voltage (positive or negative) is fixed. These limitations have been overcome in 723 general purpose regulator, which can be adjusted over a wide range of both positive (or) negative regulated voltage. This IC is inherently low … Read more

Waveform generators

3.6 Waveform generators 3.6.1 Triangular wave generator A triangular wave generator can be formed by simply connecting an integrator to a square wave generator. The resultant circuit is shown in Figure. This circuit requires dual op-amp, two capacitors, and at least five resistors. Triangular wave generator The frequencies of the square wave and triangular wave … Read more

AC characteristics

2.4 AC characteristics For small signal sinusoidal (ac) applications, one has to know the ac characteristics such as frequency response and slew rate. Frequency Response of an OP-Amp Ideally an open loop op-amp has infinite Bandwidth. It means that, if its A0L = 90dB with dc signal its gain should remain the same 90dB through … Read more

Error coefficients

There are two types of error coefficients such as: 1. Static error coefficient 2. Dynamic error coefficient Static error coefficient Ability of the system to reduce or eliminate the steady state error is static error coefficient. It is of 3 different types. 1. Position error coefficient:- Here the reference input signal is a constant (step … Read more