SEARCH RESULTS

YOU WERE LOOKING FOR :History Design and Usage of Neural Networks

Essays 301 - 330

The Importance of Women's History

women to the sidelines of history, as insignificant to the progress of humanity. By implication, this view says that women did not...

Lies My Teacher Told Me by Loewen and A People's History of the US by Zinn

by such elements as patriotism and mindless optimism rather than a desire to set out the facts and analyse them with any degree of...

Archaeology and History of Stonehenge

Stonehenge's history and archaeology are examined in 5 pages....

Studying History and the Importance of Nation States According to Von Ranke

This paper discusses von Ranke's views on studying world history and the global importance of nation states in a paper consisting ...

The Error of Reconstruction by Kenneth Stampp and Revisionist History

Chapter One "What was real and fundamental was the idealism and the nobility of the two contending forces: the Yankees struggli...

The Journalist in Combat

The history of reporting in war is the history of telling America's story. This paper explores that history and how the war story ...

A Review of The American Privateers by Donald Chidsey

or her to make allowances for the various aspects of the book that seem somewhat sensationalized or overblown. It will also serve ...

Disputes and Western Civilization History

the author indicates were very gracious to those they conquered and allowed them the right to still possess their traditions and t...

History of Intelligence Assessment

IQ testing has a very long and complex history. Dozens of theorists have offered their opinions; many conducted research on these ...

Social Media and Public Accountability

In a paper of four pages, the writer looks at social media usage. Public accountability standards in particular are examined. Pape...

Unmanned Aircraft Usages

In a paper of three pages, the writer looks at unmanned aircraft uses. Applications in weather monitoring and agriculture are expl...

INFORMATION TECHNOLOGY – TRENDS AND USAGE

Focuses on using smart phone technology for a supply chain in a Fortune 500 company. There are 3 sources listed in the bibliograph...

IMPROVING THE USE OF GOVERNMENT REVERSE AUCTIONS

technique will have a definite impact on the methods and processes by which firms and agencies source their goods and services. In...

Illicit Drug Usage and Vulnerability

questionnaires. Obviously, drug use would be the dependent variable in such a study. That variable could be dichotomized, howeve...

Business and Information Technology in a Consideration of Siemens Business Services and Microsoft

scope and scale of operational concerns. The issues that concern Microsoft may be seen as those which are currently seen in the in...

Cancer Support Groups and Remedial Model Usage

in groups created by the reciprocal model and attention is given to both ideas and feelings (1990). The needs of the group members...

Microsoft's Software Dominance Threatened

offers. In addition, whether or not the company has achieved an unfair share...

Modern Warfare and WMD Justification

was not going to tolerate anything like this battle again, finding itself compelled to drill this fact home to the Japanese. "If ...

eStrategy Implementation Questions

by an entire enterprise, experts are unanimous in agreeing that enterprise strategic planning initiatives wont be successful, unle...

Overview of Global Higher Education

Altbach (2002) also reflects the views of a number of other theorists, who argue that there is an imperative for the globalization...

Classrooms, Technology, and Teacher Education

may inevitably have to use. The Problem Statement Increasingly, the use of microcomputers in the classroom setting has bee...

Workplace Rights of Employee Privacy

write policies regarding e-mail usage - this can also help protect against legal problems (York, 2000). When companies are open an...

Tool of Earned Value Management

in time management, quality circles and resource based models. Another tool that has been used effectively has been the Earned Val...

Condom Usage and Prevention of HIV

however, come replete with a number of risk (Hollen, 2004). Many of these risks can be life altering (Hollen, 2004). Some such a...

Language Characteristics

service in that it ensures that all involved share a common understanding of the terms being used. It also provides a means of cr...

Cluster Computing and Supercomputers

a single compute application-specific integrated circuit and the expected SDRAM-DDR memory chips, making the application-specific ...

Funeral Home Expansion

stored out of sight to enable the use of the full room. Stevens dilemma is that when it exceeds four concurrent funerals an...

Computer Technology and Effective Educator Communications

use in todays business environment, all of which are appropriate to specific sets of circumstances. The business environment is t...

Otto von Bismarck, Germany's Unification, and 'Blood and Iron'

of Gottingen and two years later transferred to the University of Berlin (World Political Leaders, 2001). Bismarcks academic care...

Educators, Computer Technology, and Effective Communication

to be able to agree on a definition" (Leadership Theories: Definition and framework, 2004). Though definitions can vary, one basi...