Category: Computer Science
-
Google’s Instant Messaging review
Recently, Google has been making plans to start an instant messaging service. This is in response to the popularity of other instant messaging programs such as AIM, Skype, Vonage and other internet based platforms. There was speculation on whether Google was going to use the funds from its fairly recent 4 billion dollar stock sale…
-
WEB AUDIT of FRESHLINE ORGANICS
The purpose of this report is to present the finding of the web audit for the company named above. The company is owned by certified grower Werner Frtsch while the online website is the partnership venture equally owned by Werner Frtsch and his wife Lily that distributes Freshline’s groceries.
-
Recognition of Bangla Sign Language Alphabets by Image Processing
Abstract: This paper presents an image processing technique for mapping Bangla Sign Language alphabets to text. It attempts to process static images of the subject considered, and then matches them to a statistical database of pre-processed images to ultimately recognize the specific set of signed letters. Hand gesture recognition is a challenging problem in its…
-
Artificial intelligence
With all the different things in the world that change day by day, some can beone can encounter positive and some can be negative changes. Due to the fact of breakthroughs in Artificial Intelligence (AI), the effect on the job world and how National Aeronautics and Space Administration (NASA) contributes to the growth and positive…
-
Seven Categories of Computers
There are seven categories of computers. The first one that I will discuss is the personal/ desktop computer. This type of computer fits on a desk and can range in price from a couple hundred dollars to several thousand dollars. These computers can vary from special purpose to general purpose depending on the demands of…
-
A New Direction for Computer Architecture Research
Abstract In this paper we suggest a different computing environment as a worthy new direction for computer architecture research: personal mobile computing, where portable devices are used for visual computing and personal communications tasks. Such a device supports in an integrated fashion all the functions provided today by a portable computer, a cellular phone, a…
-
Bead Bar Network Paper
Introduction The purpose of this paper is to determine the network topology and architecture that best suites the Bead Bar. Also being discussed is the Bead Bar’s background, recommendations for the Bead Bar, as well as network advantages and drawbacks.
-
Computers Make Life Easier
Computers have made an impact in this world. From the past until the present people have been using computers for many different things. Although, theirs a lot of people who have used a computer; But they don’t understand it and maybe not even appreciate it. Now, what if their weren’t any computers at all? Would…
-
Business Networks Homework Assignment
1. A key problem when designing data communications networks is how to adapt to new technologies while organizations change. [True; p. 336] Easy 2. A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications. [True; p. 336]
-
Information Systems Concepts
The accuracy of data input is extremely important in any organization, whether small or large. Many data input methods exist but not all are created equally and some are better than others. Printed questionnaires can prove to be a rather challenging form of data input. Often, these questionnaires require respondents to fill in answers by…
-
What is DNS Poisoning?
The job of a DNS is to convert the human readable addresses entered into the address bar of a browser into machine readable IP addresses. For example when you type the URL (http://www.hotmail.com) into the address bar the first thing that occurs is the nearest DNS server is contacted and the IP address of hotmail…
-
Network Architecture in Entrepreneurship
The significance of networks as integral part of the explanation of entrepreneurial accomplishment is widely accredited. Ethernet, wireless LAN, WAN, MAN, ADSL, cable modem and dialup are common access networks, but have significantly diverse characteristics. Fast and accurate taxonomy of access network type can perk up protocol or application performance drastically. In this paper I…
-
Is Linux Ready for Prime Time?
Late release dates. The serious security holes, software flaws, patches here, patches there, and we are paying for this? Some would say that it’s a necessary evil because Microsoft has monopolized the PC desktop and everyone must stay compatible. Others would argue that there are alternatives such as Mac, UNIX, or Linux and following the…
-
Analysis of Riordan’s Manufacturing IT Systems
I. History: Riordan Manufacturing, Inc. is an industry leader in the field of plastic injection molding. With state-of-the art design capabilities, they create innovative plastic designs that have earned international acclaim. Attention to detail, extreme precision and enthusiastic quality control are the hallmarks of Riordan Manufacturing. Connected via a Wide Area Network (WAN) it maintains…
-
What is Microsoft Active Directory?
Microsoft Active Directory is the integrated, distributed directory service that is included with Microsoft Windows Server 2000 & 2003. With Active Directory, the administrator of the business can add
-
Computer Game Narratives
In this paper we investigate if, and then how interaction can define narrative in a computer game. When developing computer games that include stories or story elements it seems natural to use the traditional linear narrative and storytelling
-
Use of Technology to Improve Listening and Speaking Skills
I think nobody can deny that computers are in the center of our everyday life. Is your answer no? Then, just think again: Computers can divide/multiply or add numbers for us, we can draw money from computer-
-
Technical vs Charismatic Project Leader
Would you want a project manager to be technically adept as if you were raising a lead that has vast experience on the project? Or are you looking for some one to manage the people on the project and hope that team has the expertise to get the job done? The
-
What is Sarbanes-Oxley Act
Sarbanes-Oxley Act has been implemented since 2002. It main purpose was to regain the confidence in the capital market by forcing mandatory standards and rules for companies. This paper studies the reasons for the
-
Analysis of the RISC System/6000 Processor Architecture
Analysis of the RISC System/6000 Processor Architecture As far as Reduced Instruction Set Computer (RISC) systems go, IBM has played an enormous role in both their development and success. It was IBM who pioneered the path to RISC architecture and was the
-
What is Web Design and How does it Work – Computer Science Paper
I. Web Design • What is Web Design? Web design is the design of web pages, websites and web applications using HTML, CSS, images, and other media. Web design is part of starting a website (web development) which can include web server configuration, writing web applications and server security. 1
-
Biography of John von Neumann – Computer Science Essay
Biography of John von Neumann – Computer Science Essay John von Neumann, born János von Neumann then later called Johnny in the United States. His father was named Max Neumann, a top banker and John was brought up living in
-
Object Oriented Methods and Structual Oriented Method – Computer Science Research Paper
Object Oriented Methods and Structual Oriented Method – Computer Science Research Paper Object oriented methods and structural oriented methods have played important role which has significant impact in software development. The popularity of object oriented technology has grown dramatically, because of their new techniques. This can provide high-quality software and full-scale projects were developed that…
-
Reverse logistics systems for end-of-life computers in Sydney – Computer Engineering Research Paper
Reverse logistics systems for end-of-life computers in Sydney – Computer Engineering Research Paper Computers, with dramatically increased number and even shorter product life cycle, have become a serious problem in modern society. According to a report by the National Safety Council (Hamilton, Anita, 2001), some 500 million PCs will be rendered obsolete by 2007 in…
-
Dynamic Object Model and Adaptive Workflow – Computer Science Essay
Dynamic Object Model and Adaptive Workflow – Computer Science Essay 1 Introduction: Hammer and Champy identify three factors that characterize modern businesses: customers take charge, intense competition, and constant change.Also scientists and engineers require flexible models for process definition and execution. The outcomes of scientific processes evolve as the experiment unfolds. It is difficult to…