Information Search and Analysis Skills

1.0 SYNOPSIS The research was carried on one of Microsoft Windows operating systems which is Windows 2000. The various factors such as security, reliability and easy to use interface were discussed. In Windows 2000 security is more improved as compared to previous versions, point-to-point Tunnel protocol (PPTP) and layer 2 Tunneling Protocol (L2TP as alternative […]

Read More »

Mathematical description of OFDM

When we talk about the Mathematical description of OFDM then we cannot neglect the following mathematical treatments: The Fourier transform The use of the Fast Fourier Transform in OFDM The guard interval and its implementation As we have discussed above that a large number of narrowband carriers which are spaced close to each other in […]

Read More »

Methodologies of data collection

The standard and procedure of data collection and gathering can be done by formal and informal way and then, after collecting that data, you do analysis on this data and is called data collection or anthology. In this part of the research procedure, researcher uses different methods and procedures. These methods can include of interviews, […]

Read More »

Methodology set of rituals

Unfortunately method is sometimes reduced to incantations or a set of rituals which are applied to data. Because the research object is complex due to its multi-dimensional characteristics it is not susceptible to exhaustive coverage. Therefore, method itself should investigate at a conceptual level and not simply applied in a mechanistic way. The methodology applied […]

Read More »

Pizza Hut Data analysis

Introduction Earlier chapters have set the stage for carrying out of this research. This chapter builds on the previous ones by reporting the results of the data analysis. The primary data collected through interviews and questionnaire is presented in graphs along with analysis and findings. From these analysis researchers will be able to proceed towards […]

Read More »