Abstract— Now days, purchasing branded Desktop PC from a single Vendor is getting expensive day by day. Also consumers are required to rely on single Vendor for their whole Desktop PC and thereby compromising on the hardware so as to reduce cost. To  ...
CHAPTER ONE1.1 Background of the StudyEvery organization employs staffs and creates personnel records. Staffs is one of the organizations most important, and usually most expensive assets. Like any other asset, staff is a resource that must be deployed to maximum advantage. The proper management of personnel records can make a significant contribution to this objective by ensuring that information is available to take decisions and to protect the right both of the state and individuals. More...
LIST OF ABBREVIATIONS2D - Two Dimension3D - Three DimensionCAD - Computer-Aided DesignCAE - Computer-Aided EngineeringCAM - Computer-Aided ManufacturingCFD - Computational Fluid DynamicsFEA - Finite Element AnalysisIC - Integrated CircuitMBD - Multi-body DynamicsMIT - Massachusetts Institute Of TechnologyNVH - Noise, Vibration and HarshnessPC - Personal ComputerLIST OF FIGURES PagesFi...
font-family:"Times New Roman","serif";mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">With the outbreak of the computer age in almost all areas of our world, computers had become essential tools in the progress of a nation and aided men throughout the course of history and this very moment, they can be found from a house kitchen to the busy streets of the urban world. Since it can process facts faster and more effective ...
font-family:"Times New Roman","serif";mso-fareast-font-family:"Times New Roman"; mso-ansi-language:EN-US;mso-fareast-language:EN-US;mso-bidi-language:AR-SA">In today’s electronic era computers have a hand in almost everything. Entertainment is no exception, in fact with the coming of digital information has made one of its greatest leaps. Movies, games, music, even books that that are simple and easy as it is have been impacted greatly by computers. But how far is too far? Music is now sto...
_Toc373237587">Abstract 150%;mso-layout-grid-align:none;text-autospace:none"> 12.0pt;line-height:150%;font-family:" verdana","sans-serif";mso-bidi-font-family: "Times New Roman""> 200%;mso-layout-grid-align:none;text-autospace:none"> 12.0pt;line-height:200%;font-family:" times="" new="" roman","serif""="">Cryptography is the practice and study of techniques for secure communication and has become so powerful that messages scrambled with it are virtually undecipherable, like many ...
INTRODUCTIONNowadays, it seems like almost every one own a car and in fact, we can say that each house have at least one car. But the more is approximately three cars per house. This figure shows that car is very important to people’s life as it completed the cycle of living. Without a car, it is almost impossible to move from one place to another especially for those who are always mobilise in their jobs. Car simplified our life and it makes time to be more valuable as we can save much tim...
INTRODUCTIONThe use of the electronic sophisticated and automatic machine called computer has justified the saying of our time that the world is global village. The computer make work done conveniently and faster, Adedapo (2010). Large volumes of data with the aid of computers are processed automatically into information and distributed across the globe in few seconds. Individuals, organization and governments communicate with one another, transact business and share ideas without incur...
ABSTRACTInformation technology has been a buzz world in the modern world. The current trends in the modern world are dominated by information technology. The status of the use of technology was gradually improved during few decades. The world is in the mist of the most radical and rapid transformation of commerce and society since the invention of the automobile. This research work highlights the impact of information technology on organization and its employees. It therefore outline the vari...
ABSTRACTThis project “COLLEGE MANAGEMENT SYSTEM” deals with the maintenance of all college information starting from the principal to the students.CMS is an automation system, which is used to store the departments, student, courses and other information of a college. Starting from registration of a new student in the department, it maintains all the details regarding the courses offered, staff members, bursary etc. The project deals with retrieval of information through an INTRANET ...
AbstractThis research report mainly focus on real time application in real analogy, its classification, difference application areas of real time application and functionality. Special emphasis is placed on hard and soft real time application. Typical examples of real time applications include Air Traffic Control System, Air Bag System, Anti-Lock Brakes, Network Multimedia System and Mobile Phone Embedded System. Real time application is becoming pervasive....
ABSTRACTCryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerce....
ABSTRACTIt is not uncommon nowadays to see computers entrusted with functions upon which human life are dependent, examples of such functions are embedded computers in heart pace-makers, anti-lock braking systems in cars, and fly-by-wire flight control systems for civil airliners. In recent times, the manufacturing industry has witnessed remarkable modernization in technology as well as the adoption of information technology and computer science on a massive scale. Automobile design and manuf...
ABSTRACTA carnivore is controversial program that is developed by the Federal Bureau of Investigation in US (United State) by which they are able to access the email activities of the person suspected. It was the third generation software of online detection. The FBI (Federal Bureau of Investigation) uses to configure the hardware with IP (Internet Protocol) address of software through which carnivore captures packets from a particular location. A carnivore is used to work on a phenomena of s...
ABSTRACTThe process of examination pre-registration is aimed to obtain accurate information on the intended candidates individually and collectively. These information are used to make a multitude of decisions such as the nature and structure of examination questions, categories and number of expected candidates, and other information which might be personal such as bio information. Unless a sufficiently accurate and efficient methods are used for the data ...