Information Technology Dissertations

Search to find a specific information technology dissertation.

Back to Dissertations Index

Analysis Of Qos Parameters

A Number of QoS [11] of parameters can be measured and monitored to determine whether a service level offered or received is being achieved. ...

Click here to read more

Energy Saving Web

In this Web assignment of session I have to complete six tasks. Each task has different functionality. In the task-1 of this assignment I have done some web base research on some energy saving sites. ...

Click here to read more

Traditionally Surveillance Was Done Manually

Surveillance is proving to be very effective technique to ensure the feeling of safety and security among the people of a state. ...

Click here to read more

Booming Information Technology In India

I would like to thank my supervisor JONATHAN C WESTLAKE for his insurmountable guidance and tremendous encouragement throughout this research. ...

Click here to read more

Ipv6 Core Router

Internet Protocol version 6 (IPv6) is the next generation of protocol defined by Internet Engineering Task force (IETF) to replace the exiting IPv4 protocol. ...

Click here to read more

Web 2 0 Can Be Described

Web 2.0 can be described as different types of web applications which allow people to publish knowledge that they have created and also allow to share with other people as well as facilitating interoperability from any web application. ...

Click here to read more

Enterprise Collaboration Tool

Enterprise Collaboration Tool is rethinking how technology can help companies manage customer relationships. ...

Click here to read more

Peer To Peer Network System

Task 01 – Familiarizing with the equipments & preparing an action plan. ...

Click here to read more

Network Application Wireless

Airwave Management Platform software tool for wireless network management, net work administrator is provided with centralized control for Wi-Fi networks where roaming data ...

Click here to read more

Study On The Factors Influencing

The title of the project chosen by the author is “Study on the Factors Influencing the Technical Defensive Measures on Spyware in Computers and mobile devices” which simply means that the author analyzes the topic through an empirical study. ...

Click here to read more

Voip Security Internet

User communications applications are in high demand in the Internet user community. Two classes of such applications are of great importance and attract interest by many Internet users: collaboration systems ...

Click here to read more

Wireless Sensor Networks

Mobile ad hoc networks (MANETs) and wireless sensor networks (WSNs) are relatively new communication paradigms. ...

Click here to read more

College Announcement Notification System

This project proposal is created to propose an IT solution to the student of Sunway University. ...

Click here to read more

Impacts Of Information Technology On Human Recource

Technology has affected every aspect of human life. ...

Click here to read more

Computer Supported Cooperative Work

In the Computer Supported Cooperative Work (CSCW) domain, researchers have always wondered about which principles and models to adopt for the development of collaborative applications capable to really meet the needs of their users. ...

Click here to read more

Analysis Of E Grocery Systems

The literature reviews the operational and strategic analysis of E-grocery systems. ...

Click here to read more

Six Sigma Lean Production Systems

Nowadays, the development of industrial core intrinsic technologies is more and more important due to the dynamic competition in the global market. Companies have to keep and continuously upgrade their intrinsic technologies in the professional field to gain the sustainable competitive advantage. However, they also have to continuously upgrade their management technologies, and keep sensitive to the latest issues as well as their integration with company’s current system. Otherwise, they still cannot survive in the market even though their intrinsic technologies are advanced....

Click here to read more

Card Security For Republic Bank Customers

There is no doubt that most organisations today are becoming essentially dependant on the use of credit cards, arguably its most strategic asset, is to support existing business operations....

Click here to read more

Cyber Crime

The advent of the third millennium has brought in an era of information society. ...

Click here to read more

Devices And Services

Autonomic networks attempt to find the method to improve the capability of networks, devices and services, in order to handle with unpredictable changes. ...

Click here to read more

Hi Mobile Internet Report 2008

Hi is one of the leading telecom providers in the Netherlands and they tend to be even bigger, in terms of mobile services. ...

Click here to read more

Electronic Business

In the emerging global economy, e-business have increasingly become a necessary component of business strategy and a strong catalyst for economic development. ...

Click here to read more

Internet Media

Information Technology Dissertation - Multimedia streaming over internet is getting its revolutionary in the communication, entertainment and interactive game industries. The web now becomes a popular medium for video streaming since the user... ...

Click here to read more

Honeynet

Honeynet is a kind of a network security tool, most of the network security tools we have are passive in nature for example Firewalls and IDS. ...

Click here to read more

Website Project Fantasy

Last year a project was completed for Mr. Starkey (hereinafter referred to as Client) to design a family website. The website was centered on a fantasy football league created for family and friends ...

Click here to read more

Voip Security Service

The purpose of VoIP DoS attack is to exhaust network resources and interrupt VoIP operations through a flood of messages or by corrupting or degrading the quality of messages, thus preventing subscribers ...

Click here to read more

Network Systems For Secure Communication

The main methodology involved behind this research project is to provide the importance of such technology from professionals and well referred articles. ...

Click here to read more

Solutions System Company

The main purpose of my research is to identify an appropriate system ...

Click here to read more

Mobile Sensor Networks

Wireless Sensor Networks abbreviated as WSNs belongs to a class of Low power and Lossy Networks (LLNs). ...

Click here to read more

Information Technology Tam

The growth of e-commerce has provided an opportunity to understand why people participate in e-commerce activities and adopt information technology. ...

Click here to read more

Mobile Ad Hoc Networks

Mobile Ad hoc Networks (MANETs) comprise of wireless devices that can move around all comers and assist in relaying packets on behalf of one another. ...

Click here to read more

Virtual Network For Development Execution

A Mobile Ad hoc Network (MANET) is a self-configuring network that is formed and deformed on the fly by a collection of mobile nodes without the help of any prior infra-structure or centralized management (Xiao et al., 2006). These networks are characterized as infrastructure less, mobile, autonomous, multi-hopped, self-organized and self-administered, having dynamic topology and unpredictable traffic patterns etc....

Click here to read more

Rich Web Applications

Web 2.0 is the emerging wave of online activity that has transformed the way society and businesses interact. ...

Click here to read more

New Computer Network

Here we are going to implement an new computer network for this company that 25 employees have been working in. ...

Click here to read more

Social Technology Use In Organizations

While one uses the social networking in an organization firstly the goal should be clear as to whether they are using the networking for the internal communication between employees of that organization? Or for communication with the external parties such as the customers or the competitors. And special care should be taken if it is being used for communication outside the organization and proper security conditions should be imposed as afterall it is done on the internet, and it remains on the internet. And also the organizations may be having much confidential data with them and can be of grief...

Click here to read more

Note: All of the dissertations in this section were written by students and then submitted to us to publish and help others. They are not the work of our own expert dissertation writers; we never publish the work that we produce for our customers. Thanks to all of the students who have submitted their dissertations to us. You should not hand in these dissertations as your own. We do not condone plagiarism!