SEARCH RESULTS

YOU WERE LOOKING FOR :Literature Review on Artificial Neural Networks Use

Essays 271 - 300

Australia's Event Industry - An Analysis

with more than 52,000 tourists, traveling to business events within the country (Time 2009, p. 94). It is said that many qualities...

Patton-Fuller Hospital: The OSI Model and Network Protocols

the use of Open Systems Interconnection (OSI) technology within the structure of a complex organization. Because the hospital is a...

Small Business Accounting: The Value of Business Acumen and Networking

by any professional who runs his or her own practice - should one expand ones practice to attain a higher level of service and com...

Network Administration and Age Discrimination

believe that social ills such as discrimination are a thing of the past. The fact is that injustices such as age discrimination ar...

Social Networking and Transformational Leadership in Learning Organizations

of information among employees at all levels of the organization, to develop organizational knowledge in the most broadly effectiv...

A Cost Benefit Analysis of Cloud Computing in Developing Nations

that utilized information technology heavily grew at a rate three times faster than others (Atkinson & McKay, 2007). Therefore, ju...

Information System Case Studies

a greater advantage than ever before when it comes to project management and related processes. This is because these tools have t...

Twitter Examined as a Medium in the Context of McLuchan

view of messages has focused on their content, looking at what there were saying, with little attention paid to the media itself. ...

Corporate Network Optimization

In a paper of three pages, the writer looks at the optimization of corporate networks. Examples are given in a 9-slide Power Point...

Strategies for Network Security

employees; and a plastic container plant in Georgia, with 45 employees. Each of these locations is required to maintain records pe...

Discussion Questions on Network Security

In a paper of five pages, the writer looks at network security. A variety of topics are addressed via discussion questions. Paper ...

Social Networking Pros and Cons

In a paper of three pages, the writer looks at the pros and cons of social networking. A negative view is ultimately established. ...

Example of Statistical Hypothesis Testing

The writer demonstrates the use of a hypothesis test with date that was collected by a student. The test is to determine if Faceb...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Leading a Public Organization

Public leadership is very different than leadership in the private sector. This is one of the topics discussed. Other topics inclu...

Summary and Review of Two Papers Using Meta Analysis

The writer looks at two research papers that used meta-analysis as methodology, but are presented in very different ways. The two ...

Can Sustainable Banking Help Stimulate Economic Growth in Sub Sahara Africa - A Literature Review

despite this knowledge of the benefit of local focus, with the need for investment, many external multinational corporations have ...

Syllabus Design: 19th Century Literature

4/13 - Laclos, "Dangerous Liaisons", Part IV Segment Five: The Literature of Tension Moving into the 20th century, these works hi...

Review of an Article on Force Used by Law Enforcement

the suspect reacts. This is of course an idea that makes sense. After all, police are more likely to react one way if a suspect is...

Monster Networking Case Study

been heavily involved in the marketing aspects of Monster.com (Eisenmann and Vivero, 2006; Wasserman, 1999). TMP spent over a bil...

Medieval Literature/Marie de France & Chaucer

appears to be that this text afforded him a superb creative pallet, not simply for creating memorable characters, but also for pr...

Sutton Hoo and its Relationship to Literature

princes do not seem as relevant as the observation regarding Germany (Hills 741). Yet, while it is important to note that the buri...

American Ethnic Literature

do, and does if people are given the opportunity to study and read such work. While many could well associate Amy Tans work...

Assistive Devices & The Elderly/Maintaining Independence

This study employed a prospective pre-test and a post-test randomized control trial design and a sample group of 53 senior adults ...

Knowledge Creation and Tesco; The Successful Use of Technology and a Loyalty Scheme

1. Introduction The commercial environment is becoming increasingly competitive. Companies need to find ways of keeping and then...

Management and Communication Applied to Mott, Inc.

Chubb Group 39 Keeping the Customer 44 Corporate Culture 47 CHAPTER 3: HISTORICAL PERSPECTIVES 49 Early Business-Changing Innovat...

Lead Poisoning and Asthma

Joseph, Havstad, Ownby, Peterson, et al (2005) explore lead poisoning as it relates to asthma. These researchers explore the hypo...

History of Latin Literature

long possessed in the oral tradition. It was during the 19th century that it seems literature actually emerged in written form and...

Evaluation of Talent Management Strategies; A Case Study Of a University

automated systems. The internal talents of employees can also lead to better performance as well as aid with the potential devel...

Showalter, Culture and Literature

formalist-structuralist critics have evaded the issue of sexual identity entirely or dismissed it as irrelevant and subjective" (S...