Javascript is disabled. Please enable it for better working experience.

Research Papers on IT

Research and Development is important within every subject and every field. IT Students from undergraduate, post-graduate and PhD programs are required to make a number of research papers and papers throughout their educational tenure. These IT researches require much review of the previous literature. This section of the online library has a vast range of IT research papers to study from.

Computer Science-Memory Management
Rating
Computer Science-Memory Management Abstract The following study is conducted to explore the significance as well as implementation of memory management, its process and its threads. A comprehensive and detailed research is conducted to be acknowledged with the utilization as well as the functions of memory management. Memory management is supposed to be ...
Information Infrastructures, Intellectual Property, Telecommunications, And Legacy Information Policy Issues
Rating
Information Infrastructures, Intellectual Property, Telecommunications, and Legacy Information Policy Issues Information Infrastructures, Intellectual Property, Telecommunications, and Legacy Information Policy Issues Introduction In this paper, I would discuss the concept of copyright, the legal assertions regarding it, the importance of copyright for a software which would relate to the case study in that it ...
Mobile Computing And Social Networks
Rating
Mobile Computing and Social Networks Mobile Computing and Social Networks Introduction In today's modern and rapidly changing technology has brought many benefits to the human beings. It is a fact that Information Technology and its smart products like mobile computing and social networking have allowed people to share their experiences and stories ...
Database Management
Rating
Database Management Database Management The relational model is based on organizing the data in tabular form. Data manipulation is done according to the mathematical concept of relation of set theory, that is to say, the relational algebra. The relational algebra was invented in 1970 by EF Codd, director of IBM Research Center in San ...
Fitness In Informational Technology
Rating
Fitness in Informational Technology Abstract The use of information technology in daily life is common to all Americans. This use is so common that Americans use computers with quite fluency. This fluency however means that they are computer literate. Fitness in Information technology refers to being fluent in information technology. It means ...
Hacktivism
Rating
Hacktivism Abstract In this study we try to explore the concept of “Hacktivism” in a holistic context. The main focus of the research is on “Hacktivism” in the context of “Ethics”. The research also analyzes many aspects of “Hacktivism” and tries to gauge its effect on the “Society”. Finally the research describes ...
It Project Management
Rating
IT Project Management Abstract IT Project management today is everywhere, practiced by all in every country thus the new definition of project management consists of a lot more substance. The advent of new technology has modified many businesses being a significant factor for many. The work environment has been fundamentally changed by ...
Electronic Medical Record Implementation In Hospital
Rating
Electronic Medical Record Implementation in Hospital Electronic Medical Record Implementation in Hospital Introduction The electronic medical record (EMR) is the data register controlling and maintaining social, medical and preventive patient records. This information is obtained directly or indirectly and constantly updated. This paper focuses on providing impletation strategies for this system. We will ...
Database Performance Tuning And Optimization
Rating
DATABASE PERFORMANCE TUNING AND OPTIMIZATION Database Performance Tuning and Optimization Database Performance Tuning and Optimization Introduction Database tuning is a set of interdependent activities aimed at optimizing and regulating the performance of a database. The term refers to the configuration of files that are used in the database, the hardware and software components of ...
Topological Vulnerability Analysis Approach
Rating
Topological Vulnerability Analysis Approach Table of Contents Summary3 Introduction4 Discussion4 Optimal Network Protection4 Intrusion Detection and Response5 Conclusion6 End Notes7 Bibliography8 Summary Topological Vulnerability Analysis approach is a very effective approach for ensuring the security of the network. The reason of its success is the process and steps involved in this approach. The core process or element of TVA is Attack ...
31 - 40 of 287 Go To Page 1  2  3  4  5  6  7  8  9  10