SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 61 - 90

Telemedicine Application of Network Architecture

In ten pages this paper discusses the telemedicine application possibilities of Lucent Technologies' WaveStar and LambaRouter and ...

Agenda for American Civil Reform Justice A Response

Civil litigation is considered in this overview of six pages and incorporates examples to reveal civil justice inadequacies includ...

Issues Investigation and Genetic Engineering

1990 the U.S.D.A. had approved almost one-hundred test plantings of genetically altered crops (Nash, 1990). It has been a slow pro...

21st Century and Technology

long way in the past few decades. While once a pie in the sky idea, many women have birthed babies that have not belonged to them....

Information Technology of 'Switches'

In three pages this research paper examines the ATM information technology of 'switches' in terms of their engineering and computa...

The Many Applications of Genetic Engineering

can be amplified. Copies can be made off of the original template to use in biological and medical research and other application...

Farming and Innovations in Technology

a component of agriculture for centuries. This practice has become even more refined in the last few years, however. The selecti...

Manufacturing and Cutting Edges

materials (Tsai et al, 2003). The resulting cut is similar to an extension of a crack, but is controllable (Tsai et al, 2003). Ho...

Arguing Against Genetic Engineering

Even if we ignore the more controversial areas of genetic engineering, areas such as genetic engineering targeting the human...

Software Quality and Can It Be Measured?

required manner at the required time in a way that is easy for the users to implement and understand. Other qualities that are req...

Sound Engineering and Illumination

as a generative appearance-based method. This is an applicable perspective that is utilized when integrating illumination enginee...

Examining Automating Asymptotes

x --> 3+ f(x) --> 8 x --> 3- f(x) --> 8 The end behavior is:...

An Engineering Problem

of the day. Whatever the reason, it is a problem now. When contemplating this subject that is of great importance to those who are...

Law as a Social Engineering Tool

guiding tool, pointing the way to what should be, rather than a reflective tool, reflecting opinion. The way the law is seen to ...

Overview of Two Web Articles on Creative Design

- this individual needs physical and creative space - the impressive results make it well worth the extra effort. For example, in...

Software Development and Requirements Engineering

requirement engineering can be seen. By examining this distinctive part of the software development process there is the potential...

Business Process Re-engineering - Implementing a New ICT System

how ICT could be introduced with a new system that will change the process in an organization and the way the processes and models...

Object Technology and Business Engineering

e-commerce and the Internet, it might be helpful to define e-commerce. Electronic commerce, as it is known as, involves th...

The Pyramid Building of Ancient Egypt and the Beginnings of Engineering, Technology, and Cultural Dynamics

machines constructed of short pieces of wood; from the second tier the stones were raised by a similar machine to the third; and s...

Choosing a Computer

programs at later stages in the course, such as for analysis of results from primary research. There is also the need to be able ...

Investigating Computer Fraud

This paper discusses the field of computer forensics, what it is, what investigators do, detection tools, cyberslacking, chain of ...

Digital Investigations

Stenography detection, FRCP rules, chain of custody, dumb ideas in computer security, bots, botnet attacks, computer forensic spec...

Civil Rights Act of 1991

charges of intentional discrimination.4 Furthermore, the 1991 Act broadened the language of the 1866 Civil Rights Act and extended...

The Necessity of Firewalls in the Information Age

any given companys entire computer system with the intent to destroy data is more than enough reason to augment security measures....

Forensics and Computer Crime

In eight pages computer forensic specialists are considered in a discussion of computer crime investigation that includes crime ty...

Injuries Related to Computer Work

How might one tell if a condition is work-related? In determining whether or not an MSD is related to work, it is important to exa...

The U.S. Civil War: Causes and Implications

deal of power because their populations were growing so much. At the same time, Southern States were losing power and they began t...

Apple Computers' Struggle Against Microsoft.

A paper that addresses the problems faced by Apple Computers, Inc. The author contends that Apple computers main competition, Mic...

Saudi Arabia and the Exporting of Computers

In thirteen pages this paper considers Acme Computer's decision making process involving a cautious approach to exporting computer...

Computer Evolution from Mainframe to Distributed Systems

has been the most long-standing and still carries one of the worlds most recognizable names. Early History of the Industry...