Evaluate the implementation of the e-government program in Yeme

This study is to evaluate the implementation of the e-government program in Yemen. The study says that years of poor governance culminated in the coronation in 2011 in a large-scale rebellion against the corrupt rule. After the genocide of the government that came to power, in an attempt to re-unite the country and reconcile it, … Read more

Mobility XE

Paste your essay in her1. Visit the Net Motion Web site (www.netmotionwireless.com) and access and read other Mobility XE success stories. Discuss the patterns that can be observed in the benefits that Mobility XE users have realized via its deployment and use.    Net Motion’s Mobility XE users are spread across diverse fields and industries. … Read more

Cyber crimes

With the widespread use of the Internet, the cyber crimes have also increased. As per the statistics in Verizon (2016), organisations face cyber threats not only from the outsider  but also from the person within the organisation. The motives of the cyber attacks can be financial, espionage, grudge, and fun. The Microsoft Windows is the … Read more

Piracy of the entertainment industry: an overview to the US piracy industry

Currently computer/ internet piracy is the most advanced and ignored illegal activity in the world. At present, with the improvement of technology, some of the newer updates of the entertainment industry are being experienced by the people even before a company releases updates officially. According to PC Magazine the word piracy is known as the … Read more

Transmission control protocol

Most currently internet applications depend on the Transmission Control Protocol (TCP) [1] to deliver data reliably over the network. However it was not part of its initial design, the most essential element of TCP is congestion control; this defines TCP’s performance characteristics. In this thesis we present a survey of the congestion control proposals for … Read more

Image processing

1.1 IMAGE An image is an ancient rarity that portrays visual recognition, for example a two-dimensional picture that has a comparative appearance to some subject – for the most part a physical article or a man, consequently giving a delineation of it. An image is a cluster, or a network of square pixels (picture components) … Read more

Mobile ad-hoc network

Abstract— A mobile ad-hoc network is a type of network in which all the nodes can communicate to each other without any infrastructure. This unique property of MANET is useful in conditions where exchange of information is the prime objective under any circumstances. In this type of network all communicating nodes cooperate with each other … Read more

Technology used in hospitality industry

Introduction Technology has been used widely in many industries recently. It is no doubt that technology changing both the operation and performance of variety of industries. While, some of the industries take a further step to update their business by using smart technology in order to advance to their competitors and enlarge the global market … Read more

The Personal Software ProcessSM (PSPSM)

CRITICAL REVIEW The Personal Software ProcessSM (PSPSM) Abstract : The Personal Software ProcessSM (PSPSM) has become a very effective idea in the modern era. It provides the engineers with a disciplined framework for doing the software work. PSP can be used with any programming language and helps in writing assignments, running tests, defining processes and … Read more

Software quality

INTRODUCTION Brief Introduction Software quality is considered as great importance in the software engineering field. Thus, building software of high quality is very expensive task. Consequently in order to increase the efficiency and usefulness of quality assurance and testing, software defect prediction is used to discover defect-prone modules in a forthcoming version of a software … Read more

Data Warehouse for decision making

Data Warehouse (DW) is one of the solutions for decision-making process in a business organization. But it only stores data for managerial purpose and it has no intelligent mechanism for decision making. This raises the issue of knowledge storage in organization for high capability decision support. The enterprise-wide information delivery systems provided in a DW … Read more

Enhancing food security via a web based system

Background to the Problem According to World Food Summit (1996), food security exists when all people, at all times, have physical and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Hoffman (2010, p.152) observes that the Internet is “the most important … Read more

Frame relay technology

Abstract The world today completely works on digital signals though the real world is analog, and computer networks provide the backbone for communication. Networking has become a necessity for communication & includes various networking devices and many protocols. A pre requisite knowledge of networking is not only important but increases the demand of professionals in … Read more