SEARCH RESULTS

YOU WERE LOOKING FOR :Civil Engineering Applications of Computer Technology

Essays 1111 - 1140

The Life and Career of Union Pioneer A. Phillip Randolph

"color line" as the principal problem of the twentieth century, but rather felt that the principal problems of black Americans wer...

Overview of the Civil Rights Movement

at work, refused to give up her seat on a Montgomery bus to a white man (Bush, 2003). She was arrested and jailed, infuriating th...

Law Firms and Software Uses

facts ("Summation Products," 2005). In addition to helping lawyers locate important information, it provides links for documents, ...

Causes and Effects of the U.S. Civil War

from east to west and the number of states was growing with that expansion (Foner and Garraty, 1991). Among the more precipitory ...

Examination of the Civil Rights Movement Between 1945 and 1965

Education, and the timing couldnt have been better (Carson). Brown declared segregation in public schools unconstitutional, whi...

DEF Corporation Application Architecture

Though the tactical approach can produce an application architecture that addresses the companys current needs, the strategic appr...

Development of Autonomic Computing

which the design of an autonomic computer system should be designed, helping increase efficiency as well as overcome the shortage ...

Fuzzy Logic Controllers (FLC) In Computer Systems

However even with this there is no any exactness as this does not mean that it is plus or minus 2 or 3 degrees (Rosenstein, 2004)....

An Analysis of Louis Fischer's, The Essential Gandhi

courts and token governorships were merely means to placate the population without offering "real freedom or power" (Fischer 158)....

Literacy Standards Within Nursing Education Programs

thinks is, to a certain extent, a result of genetic influences; however, this capacity is also highly influenced by the process o...

Civil War Context of Literary Characters Henry Fleming and Huckleberry Finn

. . . Dont go a-thinkin you can lick the hull rebel army at the start, because yeh cant" (Crane 5). In his innocence, however, he ...

Computer Hacking and Ethics

productive. Like having a firewall, these individuals can help people protect their sites from unscrupulous individuals who want t...

Computer Science and Graph Theory's Future

irrelevant nor is it important as to how long the lines are (2003). This idea is contrary to most other forms of mathematics such ...

Questions and Answers Regarding Legal Issues

which would violate the dormant Commerce Clause (2001). In the case at hand, the state of Alabama is prohibiting a right that al...

Hiring Process and Why Transcripts from High School Should Not be Used

they are minors, unaware of the ramifications of their actions and are likely to make mistakes. Most children at one time or anot...

EcoTerrorism and Eco Sabotage vs. Civil Disobedience

provides a more peaceful perspective and make environmental civil disobedience known. Civil disobedience in many ways highlights t...

After the Civil War and the Role of Women in Virginia

another aspect of the post-Civil war years. This aspect was the women who lived then. Indeed, to assess history only based on ou...

U.S. South Before the Civil War, Slaves, and the Role Played by Religion

conditions as they relate to the white man instilling religion into the slaves of the South. "In the 1780s, Methodists--who repr...

Government's Only Legitimate Form, Human Nature, and Second Treatise on Government by John Locke

of perfect freedom to order their actions, and dispose of their possessions and persons as they think fit, within the bounds of th...

Civil Rights Activist Al Sharpton's Life and Achievements

age of nine (2003). Hence, even his childhood was entrenched in religion and preaching. That said, he did pursue other interests w...

A Serial Killer's Needs and the Application of Abraham Maslow's Hierarchy of Needs

Of course, this is not unusual. There have been numerous serial killers who have led ordinary lives. In fact, there is a stereotyp...

Application of Therapeutic Containment

deal of anxiety for themselves and for those around them. This chaotic behavior, according to Bacher, is the results from "either ...

Application of Montessori Mathematics to Children Between the Ages of Three and Six

children, materials such as colored rods and beads (Kahn, nd; University of Kansas, 2000). Among other things, young children can ...

Types of Computer Programming Languages

of that market. The very first programming languages, back in the...

Service Consultants and Differences Between Patents and Copyrights

copyright does not protect ideas but just the way the idea is expressed in a piece of work (UK, 2002). A patent, on the other han...

U.S. History's Watershed Event, the Civil War

as well as begin to collectively respond as a liberated people rather than race of repressed second class citizens. It was due in...

Criminology Application of Psychoanalytic Theory

those who fear them may not only benefit from psychological help, but it also helps to understand criminology in general at a new ...

Neuman and Rogers Systems Model Application

the realization of the "dehumanizing" of patients that led to them being referred to as "Bed x," "Case x" or some other nameless, ...

Overview of Direct Manipulation Interfaces

the user (Smith, 1997). As a term "direct manipulation" (DM) refers to a style of human-computer interactive design that features...

Tutorial on Electronic Commerce Quality Management

Research Approach Research will be conducted using the Internet, which provides a vast array of information from reputable source...