The Prevalence of Visual Culture and Graphic Design

2.1.2. Defining Graphic Design 2.1.3. A Brief History of Graphic Design 2.1.4. Innovations and Relevant Issues 2.2. (Graphic) Design Education 2.2.1. The Need for a Comprehensive Curriculum 3. Methodology……………………………………………………………………………. 3.1. Introduction 3.2. Sample Description 3.3. Research Method 3.4. Justification of Data 3.4.1. The Great Debate 3.4.2. Crouwel: Abstraction and Organisation 3.4.3. Van Toorn: Visual Editing … Read more

Review and Summary of Cornell’s “PageRank” Algorithm

Everyday, billions of entries are typed into search engines such as Google, Yahoo, Bing, etc. At an incredulous speed, thousands of suggested websites and journal articles are generated that are most closely related to the keywords entered by the user. However, deciphering an algorithm that would take certain keywords and output the “best” suited websites … Read more

MacOS

Introduction It was in the year of 1984 that Apple released the first affordable personal computer for the general public consumer called the Macintosh. From that day to this, Apple have grown from strength to strength. The operating system used by Macintosh personal computers and laptops has changed greatly since its infancy and is now … Read more

Hyper Text Transfer protocol

Introduction:   HTTP (Hyper Text Transfer protocol) has been used on the World Wide Web since 1991, it was developed by an organisation called CERN which is the European organisation for Nuclear Research. HTTP is a set of rules for transferring many different variants of files such as images, text, videos etc. HTTP is used … Read more

Asymmetric Cryptography

Abstract In today’s technology, securing a system is an essential issue. Numerous procedures are given to secure system. Cryptographic is a strategy of changing a message into such frame which is ambiguous, and afterward retransforming that message back to its unique shape. If you want to keep your information safe and secret, you have the … Read more

How gamification can be incorporated into a mobile app

1.1 Aims and Objectives The projects aim is to explore how gamification can be incorporated into a mobile app which motivates pro-environmental behavior. Through examining existing ideas using gamification as a tool to motivate, the project aims to identify what contributes to the success and pitfalls and techniques to be applied when motivating environmental behavior. … Read more

Data Transfer method, and Power Management.

Abstract—because of speedy growth in the electronics field and the need for fast and easy connect between the computer and its related peripherals and electronic devices, USB has been used. USB is the result of joint development between various companies. It has been designed to create channels of communication of little and medium speeds, the … Read more

The growth of computer networks

Introduction   over the past decade , the use of computer networks are growing rapidly across the world, today alot of data has been transmitted over world wide web. the data is not only text, there are several types of data such as : audio , image and other multimedia , images have been vastly … Read more

Huawei Technologies Co., Ltd.

Huawei Technologies Co., Ltd. (hereafter; Huawei) is a Chinese multinational provider of information and communications technology solutions that is headquartered in Shenzhen, Guangdong. At its early stages, Huawei only focused on manufacturing phone switches but has now expanded to building telecommunication network and also designing smart phones for the consumer market around the world. This … Read more

Growth in the electronics field

Because of speedy growth in the electronics field and the need for fast and easy connect between the computer and its related peripherals and electronic devices, USB has been used. USB is the result of joint development between various companies. It has been designed to create channels of communication of little and medium speeds, the … Read more

ICT infrastructure in libraries

Many studies have been conducted regarding the use of ICT in libraries. For instance in India, Sampath Kumar & Biradar (2010) observe the use of information communication technology (ICT) in 31 college libraries in Karnataka, India by analyzing the ICT infrastructure, status of library automation, barriers to implementation of library automation and librarians’ attitudes towards … Read more

Property website project

The E-state Locator provides an online platform for the property buyer/seller by providing the online application and an android application through which the user can do the task better with comfort and maintain the accuracy. Objective :- By using the application user can not have to roam here and there to buy property. He/she can … Read more

Internet connection and devices

These days the Internet of things becomes one of the essential part in our every day life by giving us products such as streamlining business processes, controlling over door locks, giving a picture of our resource consumption measurements, and better connect us to the people, systems, devices and surroundings that shape our daily lives. Therefore, … Read more

Net Neutrality

Net Neutrality is the principle that every point on the network can connect to any other point on the network, without discrimination on the basis of origin, destination or type of data. This principle is the central reason for the success of the Internet. Net Neutrality is crucial for innovation, competition and for the free … Read more

Operating systems

Introduction At the most fundamental level, an operating system serves as an intermediary—that is, a middleman—between a computer user and computer hardware (Bower, 2015). It is an extensive and complicated group of system programs that oversees the many operations of a computer and handles the management of computer resources (Garrido, Schlesinger, & Hoganson, 2013). Furthermore, … Read more