Logical and physical network design
Introduction In the world today, information communication and technology has become one of the most relied upon pillars for economic development. It is through technology that the entire universe has…
Read more >Logical Database Design for HR management System
Task 1.1 The background information of the organization and operation that would support. In an organization a HR department is responsible for record each employee. Where the employees have an…
Read more >Low Level Programming Language Computer Science Essay
Low-level programming language is a programming language that provides little or no abstraction from a computers instruction set architecture. The word low refers to the small or nonexistent amount of…
Read more >Low-Power Folded Tree Architecture for DSP Applications
1 Low-Power Folded Tree Architecture for DSP applications Abstract— Wireless communication exhibits the highest energy consumption in wireless sensor network (WSN) nodes. Due to their limited energy supply from batteries,…
Read more >Lung Nodule Classification: Computed Tomography (CT) Scans
ABSTRACT This paper proposes a novel framework for the classification of lung nodules using computed tomography (CT) scans. The proposed framework is based on the integration between (i) the geometric…
Read more >Machine Learning in Malware Detection
1.0 Background Research Malware was first created in 1949 by John von Neumann. Ever since then, more and more malwares are created. Antivirus company are constantly looking for a method…
Read more >Malware And Exploit Protection
In today's modern world of information technology, malware and malware protection is becoming a large part of computer security. To analyse this problem various Internet and academic articles have been…
Read more >Managing Web Application Security Computer Science Essay
Changes in business environments and the advances in web technologies have made the services of corporate, public and private firms to be more widespread over the web by making use…
Read more >Matalan Architecture and Infrastructural Investigation
 Table of content Introduction of Organisation Collection of information Findings of Report Hardware & Software Operating Systems Networking Facilities Security issues Legal & Ethical Requirements Key Areas Systems Diagram…
Read more >Ipv4 Internet Protocol Security Features Computer Science Essay
There are many articles about IP v 4 and IP v 6 internet protocol and mostly of articles describes IPv6 more secure internet protocol, but I came across with one…
Read more >