SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 931 - 960

Issues of the Lebanese Civil War

in their policies, partly because other Arab nations pressured them into leaving the Palestinians free to pursue their attacks aga...

Different Cultural Applications of American Management Concepts

If we want to examine this we can use Hofstedes model of cultural diversity to show areas of difference. Hofstede, looking at cult...

A Learning Activity and 3 Theoretical Applications

warm-blooded mammals that bear life young and most are insect-eaters (Krantz and Barrow, 2003). Considering the many misconception...

Surgical Applications of MEMS Electrostatic Tweezers

improving health care and in surgical applications [2]. The diversification of MEMS technology has resulted from advancement in ...

DEF Corporation Application Architecture

Though the tactical approach can produce an application architecture that addresses the companys current needs, the strategic appr...

An Analysis of Louis Fischer's, The Essential Gandhi

courts and token governorships were merely means to placate the population without offering "real freedom or power" (Fischer 158)....

Literacy Standards Within Nursing Education Programs

thinks is, to a certain extent, a result of genetic influences; however, this capacity is also highly influenced by the process o...

Development of Autonomic Computing

which the design of an autonomic computer system should be designed, helping increase efficiency as well as overcome the shortage ...

Fuzzy Logic Controllers (FLC) In Computer Systems

However even with this there is no any exactness as this does not mean that it is plus or minus 2 or 3 degrees (Rosenstein, 2004)....

Civil Disobedience and Abortion

"That government is best which governs least....For government is an expedient by which men would...

July 1 to July 3 1863 Battle of Gettysburg

Couch defiantly pledged, "In no case must the enemy be allowed to cross the Susquehanna" (Brubaker, 2003, p. 74). Lees Lt. Gen. R...

Exporting Computers to Kenya

both computer systems and the Internet on the rise. Though South Africa is considered the "leader" in such a field, Kenya is defin...

Kennesaw Mountain Battle During the Civil War

slaves to keep crops coming in. The North was very reliant on the Souths products and it was also more the hub of government, Brit...

Reconstruction Era's Early and Late Stages

of things that are rarely mentioned in classroom history books. Most history books portray the Union troops as kind, benevolent so...

Computer Viruses and Critical Thinking

do in order to combat this horrendous situation? First, in order to resolve the difficulty, the critical thinking model should be ...

U.S. Navy Admiral Grace Brewster Murray Hopper

technology that would be more accessible to everyone through a common language" (OHanlon, 2001)....

Computer Recycling

"up to 25% recycled ABS plastic" (Recycled plastic helps build a better printer - and environment, 1995; p. 24). Though enc...

Political Systems Comparison

coercion is prevalent (British Library, 2003). However, big business has become so big and capital has become so concentrated in f...

Credit Card Fraud

nearly $70,000 using stolen credit card information (Brunker, 2004). Clearly, this is not a small-stakes game, but a potentially ...

Union and Confederacy Battle Plans During the Civil War

two armies would have simply pivoted around each other and ended up in each others rear, able to march unopposed to Washington or ...

Application of Auditing Techniques of Information Systems

of the details of transactions as well as balances ("Is Auditing," 2004). CAATs may also produce a large range of audit evidence ...

Case Study on Computer Crime

experts, criminal activity with computers can be broken down into three classes -- first being unauthorized use of a computer, whi...

Are Computers a Friend or Enemy of Education?

Wilson (2001) notes, however, that: "To take a meaningful role, online educational resources must become...

Computer Network Design and Analysis of Performance During Peak Usage and Increased User Numbers

design. The most common element affecting system performance in a network environment during both times of disaster and tim...

Physics Applications

of any size - whether that particle is subatomic or a "grain" comprising the universe - cannot be known. "The dimensions of the g...

Civil War Weapons and Military Strategy

a long growing season in very fertile soils. The northern winters were long and did not provide for an adequate growing season to...

U.S. Constitution, Civil Rights, and Slavery

that blacks, even if they were freed blacks, were not due citizenship and could never become citizens of the United States. As suc...

Dell Computer and a Change in Culture

success include: * Effective internal communication * Efficient business processes * Employee training * Employee motivation * Pos...

Slavery and the Causes of the U.S. Civil War

Ordinance was one of the earliest reflections of the importance of the issue of slavery in this nation. There were many more refl...

Reasons for the American Civil War by Bruce Levin

saw slavery as absolutely essential to their economy, Levine argues that American workers viewed the institution of slavery as con...