The following study is devoted to the phenomenon of unmanned aerial vehicles used throughout known history on the battlefield or for military purposes. The purpose of the following text is to familiarise the reader with an overview with the contemporary and historical employment of the unmanned vehicles on the battlefield. The study also aims to... Continue Reading
ABSTRACT Data warehousing and business intelligence are key enablers in the drive to harness management information and improve decision-making. They underpin the recent wave of interest in data mining and customer relationship management, and create opportunities for performance improvements based on quantitative analysis at every le-vel in an... Continue Reading
ABSTRACT Data warehousing and business intelligence are key enablers in the drive to harness management information and improve decision-making. They underpin the recent wave of interest in data mining and customer relationship management and create opportunities for performance improvements based on quantitative analysis at every level in an... Continue Reading
Some analytical techniques are required in order to the attempt some relevant information. It gives a broad overview of some of the most commonly used techniques and technologies to help the reader to better understand the tools based on big data analytics. There are many analytic techniques that could be employed when considering a big data... Continue Reading
One of the major applications of linear algebra involving systems of linear equations is in finding the maximum or minimum of some quantity, such as profit or cost. In mathematics the process of finding an extreme value (maximum or minimum) of a quantity (normally called a function) is known as optimization . Linear programming (LP) is a branch of... Continue Reading
INTRODUCTION Big data is a word used for detailed information of massive amounts of data which are either structured, semi structured or unstructured. The data which is not able to be handled by the traditional databases and software Technologies then we divide such data as big data. The term big data is originated from the web companies who used... Continue Reading
is a fast growing pace in the society today and as a result of that, its growth is becoming more and more widespread. According to the 2015 (ISC) Global Information Security Workforce Study, a shortfall of 1.8 million cybersecurity jobs will happen by 2022 cite mat 1. Allegedly, the most common reason for this fact is the lack of... Continue Reading
The arithmetic/logic unit is the component of the CPU where data is held temporarily and where calculations take place. The control unit controls and interprets the execution of instructions. Most of these actions are retrievals of instructions from memory followed by movements of data or addresses from one part of the CPU to another. The control... Continue Reading
What is Linear Programming? A typical optimization problem is to find the best element from a given set. In order to compare elements, we need a criterion, which we call an objective function f(x). The given set is called the feasible set which is usually defined by {x ∈ Rn | gi (x) ≤ 0, i = 1, . . . , m}.... Continue Reading
INTRODUCTION2 DEFINITION OF TERMS:2 LITERATURE REVIEW:3 SCOPE OF WORK:3 OVERVIEW:3 USAGE OF 3 EFFECT OF SOCIAL MEDIA ADDICTION (LOSS OF INTEREST IN OTHER ACTIVITIES)4 IMPACT OF SOCIAL MEDIA ADDICTION:4 IMPACT OF SOCIAL MEDIA ADDICTION ON STUDENT ACADEMIC PERFORMANCE5 IMPACT OF SOCIAL MEDIA ADDICTION ON EMPLOYEES5... Continue Reading
The world population has increases day by day and projected to reach 9 billion people by 2050, so that the agricultural consumption will also increase. There is extreme need to fulfil the food demand of each and every person. Agriculture sector is the most promising sector, dealing with the lot of problems now a day’s one of the main problems is... Continue Reading
Hacking means to attack systems, networks and applications by exploiting their weaknesses, in order to gain unauthorized access to data and systems. • What are the goals of hacking? • Ethical hacking is the use of hacking knowledge, skills tools and techniques to demonstrate the true exploitable vulnerabilities of a system for the purpose of... Continue Reading
We need tools to facilitate research tasks • Some researchers need special tools indigenous to particular discipline • The concern here is with the general tools of research that the majority of researchers, regardless of discipline and situation, typically need to help carrying out research activities which finally derive meaningful and... Continue Reading
1. Introduction to Dynamic Programming Dynamic programming is a general type of approach to problem solving, and the particular equations used must be developed to fit each situation. Therefore, a certain degree of ingenuity and insight into the general structure of dynamic programming problems is required to recognize when and how a... Continue Reading
TABLE OF CONTENTS 1.0.Introduction 1.1.Packet capturing and Analysis 1.2.Definition of key terms. 1.3.Scope of the work. 2.0.Related work. 2.1Aims and objectives of Research work. 3.0.Materials and Method. 3.1Tools and Applications used 3.2Wireshark 3.2.1Uses of Wireshark 3.2.2Features of Wireshark 4.0.Results and Discussion 4.1Packets Capturing... Continue Reading
What is Wireshark? Wireshark is a network packet analyzer. A network packet analyzer used to capture network packets and display that packet data as detailed as possible. My network capturing was done on wireshark on kali linux, Some intended uses of wireshark 1.Network administrators use it to troubleshoot network problems 2.Network security... Continue Reading
INTRODUCTION Disaster according to Wikipedia “ A disaster is a serious disruption, occurring over a relatively short time, of the functioning of a community or a society involving widespread human, material, economic or environmental loss and impacts, which exceeds the ability of the affected community or society to cope using its own... Continue Reading
RootsMagic is one of the best genealogy software. We are certified technicians in and also have 10+ years of experience. We provide technical support for genealogy users through call chat and remote.... Continue Reading
is one way of improving the overall processing performance of a processor. This architectural approach allows the simultaneous execution of several instructions. is transparent to the programmer; it exploits parallelism at the instruction level by overlapping the execution process of instructions. It is analogous to an... Continue Reading