Computer Science

Performance Analysis of One Dimension FDTD Code

Performance analysis of One dimension FDTD code using Parallel Processing Technique P. GUNAPANDIAN, M.R.SUBASREE, B. MANIMEGALAI   Abstract The requirement of longer processing time and larger memory makes FDTD method impractical for many cases. Implementation of parallel processing in FDTD method is proposed in this paper. The implementation depends mainly on computer architecture and programming […]

Read full post

Date: January 13th, 2018

How Number System Is Used In IT

In this documentation I have discussed of how the application of number system is used in IT applications in both hardware and applications, operating system and in programming language. I have discussed about the use of base 2 in the 8 bit bytes form use with the operation for subnet. The use of hexadecimal form […]

Read full post

Date: January 1st, 1970

Factors Determining Layout And Design

Facility layout and design is an important component of a businesss overall operations, both in terms of maximizing the effectiveness of the production process and meeting the needs of employees. The basic objective of layout is to ensure a smooth flow of work, material, and information through a system. The basic meaning of facility is […]

Read full post

Date: January 1st, 1970

Computerised Hotel Maintenance Systems

I intend to develop a computerised Hotel maintenance system for Global Grange Hotel. The proposed system would help to organise & manage the Maintenance department in an efficient manner in order to minimize the drawbacks of the current system. The main entities that I have taken into account are the ordering up to date stock, […]

Read full post

Date: January 1st, 1970

Introduction To Microsoft Office Computer Science Essay

PowerPoint uses a graphical approach to presentations in the form of slide shows that accompany the oral delivery of the topic. This program is widely used in business and classroomsand is an effective tool when used for training purposes. PowerPoint is one of the simplest computer programs to learn. It is the number 1 program used worldwide for presentations. Anyone can create […]

Read full post

Date: January 1st, 1970

The Adobe Systems Incorporated Computer Science Essay

This paper examines the multinational company, Adobe Systems Incorporated, its innovations, value added for its products, and competencies. The paper then examines the company’s structure culture, leadership and strategy for deploying its products. Adobe Systems Incorporated Adobe Systems Incorporated is an American multinational computer software corporation founded in 1982 by former Xerox employees John Warnock […]

Read full post

Date: January 1st, 1970

Computer Fraud

Task 1 (6.c)Importance and Effectiveness of Legal Regulation in Computer Fraud Introduction In today’s world due to the advancement in the modern technology there has been always problem arising related with computers especially computer fraud & misuse. People who are using computers are deceived in many ways like program fraud, system hacking, e-mail hoax, auction, […]

Read full post

Date: January 1st, 1970

Qualitative And Quantitative Research Methods Computer Science Essay

Qualitative research is involves using various methods ranging from participant observation, interviews, and action research, to ethnography, document review and grounded theory in order to investigate and explain phenomena of predominantly human sciences. However, qualitative research can also be found in various other disciplines, subject to suitable methodologies. A general shift in orientation of Information […]

Read full post

Date: January 1st, 1970

Database Security Threats And Countermeasures Computer Science Essay

Information is very critical asset. Organizations create so much information and they use database systems to handle the information within them to automate various functions. Due to information importance, information protection is a critical component of the database management system. Information security is the goal of a database management system (DBMS), also called database security. […]

Read full post

Date: January 1st, 1970