System analysis

4.1 Introduction System analysis is a major activity which takes place when we are structure a latest system or changing one. Analysis will help us to understand about the existing system and also will know the requirements necessary for the latest system. And if there is no accessible system then system analysis will defines only […]

Read More »

TCP/IP network protocol

1. SYNOPSIS This report examines TCP/IP being used all over the world as a robust transmission protocol for networks. Robust transmission protocol is a protocol or system that has an ability to withstand changes in a procedure or recover from a range of exceptional inputs and situations in a given environment. The scenario here elaborates […]

Read More »

Tisco (tata iron and steel company limited)

1. Introduction TISCO (Tata Iron and Steel Company Limited) is the world’s sixth largest steel company which was established by Indian businessman Jamshetji Nusserwanji Tata in 1907. It is also the largest private sector steel company in India in terms of domestic production. The company is the fifth largest steel producer in the world as […]

Read More »

Visual cryptography

Introduction One of the popular solutions for image encryption is visual cryptography. Secret sharing concepts are used to encrypt a secret image into the shares (customized versions of the original image) which can be transmitted over an undeveloped communication channel and by overlapping shares, the secret message is obtained Visual cryptographic solutions are based on […]

Read More »

Vision 2020 in Malaysia – An Analysis

Keywords: wawasan malaysia analysis, vision malasia analysis Abstraction To achieve a vision during a long time is very difficult because it needs a lot of means and also people’s consent in order to be realized. Malaysia is the best example to learn how can achieve a strategic plan by studying its vision that called (wawasan […]

Read More »

Software engineering principles

Chapter 1 “Software is a great combination between artistry and engineering. When you finally get done and get to appreciate what you have done it is like a part of yourself that you’ve put together. I think a lot of the people here feel that way.” Introduction This report discusses Software Engineering principles in context […]

Read More »

Software piracy: An overview

SOFTWARE PIRACY IN AFRICA Software piracy is a combination of two different words which are software and piracy. Software can be defined as generic term for computer programs which operate the computer itself; Also Microsoft Encarta dictionary defined the word software as programs and applications that can be run on a computer system. Piracy can […]

Read More »

Software testing

1.0 Software Testing Activities We start testing activities from the first phase of the software development life cycle. We may generate test cases from the SRS and SDD documents and use them during system and acceptance testing. Hence, development and testing activities are carried out simultaneously in order to produce good quality maintainable software in […]

Read More »

Sustainable information security policy in an organization

Introduction The purpose of this research paper is to investigate how organizations design sustainable information security policies. Designing a sustainable information security policy is one of the most important issues facing organizations today. It should not only be the first step in an organization’s information security policy program but a continuing process to ensure the […]

Read More »

Measure the reusability of object oriented interfaces in uml diagrams

I. INTRODUCTION In recent years, computer software is the single most important technology in the world. Software developers have continually attempted to develop new technologies due to the growing importance of computer software. In these developments some of them focused on a technology domain i.e. object oriented system/programming [22]. Metrics are difficult to collect and […]

Read More »