"Duplex" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 37 of 50 - About 500 Essays
  • Powerful Essays

    Rfid

    • 5186 Words
    • 21 Pages

    RFID Technology Overview‚ Mechanism‚ Applications and Limitations Manoj Chaudhari Electronics and Telecommunication Terna Engineering College Nerul‚ India mgchaudhari123@gmail.com Anusha Shetty Electronics and Telecommunication Terna Engineering College Nerul‚ India cool99_drake@yahoo.co.in Pravandu Panchal Electronics and Telecommunication Terna Engineering College Nerul‚ India pravandu.panchal@gmail.com Abstract— Radio Frequency Identification (RFID) is a convenient

    Premium RFID Modulation

    • 5186 Words
    • 21 Pages
    Powerful Essays
  • Good Essays

    Network Topolofy

    • 79785 Words
    • 320 Pages

    Top-Down Network Design Third Edition Priscilla Oppenheimer Priscilla Oppenheimer Cisco Press 800 East 96th Street Indianapolis‚ IN 46240 ii Top-Down Network Design Top-Down Network Design‚ Third Edition Priscilla Oppenheimer Copyright© 2011 Cisco Systems‚ Inc. Published by: Cisco Press 800 East 96th Street Indianapolis‚ IN 46240 USA All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means‚ electronic or mechanical‚ including photocopying

    Premium Routing protocol Computer network Routing

    • 79785 Words
    • 320 Pages
    Good Essays
  • Powerful Essays

    Abstact To create a continuous competitive market and deliver more services via mobile broadband to customers‚ the Third Generation Partnership Project (3GPP) developed an evolved 3G technology called LTE which tends towards the 4G technology. This work highlights the overview of LTE as well as the expectation which the technology is expected to meet which attributes its advantages. Being the first true IP-Packet technology with new architecture‚ the network architecture evolution is also discussed

    Premium

    • 3003 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    MASTER OF TELECOMMUNICATION MANAGEMENT THESIS TOPIC FEASIBILITY STUDY FOR WIMAX FOR RURAL AREAS IN GHANA THESIS SUBMITTED IN PARTIAL FULFILMENT FOR THE AWARD OF MASTER OF TELECOMMUNICATION MANAGEMENT SYLVESTER AGYEN KWADWO NTIAMOAH-SARPONG SUPERVISOR HANS BRONS FEBUARY 2011 [Type text] Page i SUMMARY The popularity of broadband Internet access services has increased significantly among the Ghanaian households during the past few years. At the same time‚ the development

    Premium Broadband Internet access Internet

    • 34366 Words
    • 138 Pages
    Powerful Essays
  • Good Essays

    Modern Interiors

    • 1099 Words
    • 5 Pages

    Modern Introduction: Welcome to the world of Modern Interiors Co. Interiors An Interior Decorator Firm which specializes in all kinds of Interior works. An Interior Decorator Firm which specializes in all kinds of Interior works. We are compact organization headed by a professional whose experience spans 5 years in Indian projects. All our project managers are professionally qualified and well experienced which ensures the implementation and maintenance of the highest degree of impeccable

    Premium Mumbai Maharashtra Navi Mumbai

    • 1099 Words
    • 5 Pages
    Good Essays
  • Good Essays

    concept paper

    • 1086 Words
    • 7 Pages

    FEE)  GROUP DEFINITION MINIMUM BASIC FEE S-imple (Hangars) Without partitions P50M & less 6% M-oderate (Art Galleries) With partitions P50M & less 7% E-xceptional (Aquariums) Requires Consultants P50M & less 8% R-esidences Single Detached or Duplex 10% of Proj. Const. Cost M-onumental Buildings (Expositions‚ Mausoleums‚ Memorials) Requires Concepts 12% of Proj. Const. Cost R-epetitive Buildings Construction of Similar Structures 1st Structure – MBF 2nd Structure – 80% of BF 3rd Structure –

    Premium Parking

    • 1086 Words
    • 7 Pages
    Good Essays
  • Better Essays

    A Reflection on the Issue of Conflict Mahatma Gandhi once said‚ “An eye for an eye will only make the whole world blind.” By this‚ he meant that conflict cannot resolve an issue without causing more issues‚ thus resulting in more conflict. Now‚ conflict‚ by its dictionary definition‚ may be described by the following: to come into collision or disagreement; to be contradictory‚ at variance‚ or in opposition. Different people may see conflict as either being good or bad. An individual who supports

    Premium Conflict The Hunger Games Terrorism

    • 1287 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    ACKNOWLEDGEMENT WE HEREBY TAKE THIS OPPORTUNITY TO THANK NTPC LTD. TANDA FOR GIVING US THIS OPPORTUNITY TO CONDUCT OUR TRAINING IN NTPC LTD.‚ TANDA. WE ARE GRATEFUL TO MR. D.N. TIWARI(DGM‚C&I) FOR ALLOWING US TO CONDUCT OUR TRAINING IN THE CONTROL & INSTRUMENTATION DEPARTMENT.WE ARE HEARTLY INDEBTED TO OUR PROJECT GUIDE Mr. LALIT KUMAR SINGH (Dy.SUPT‚C&I)FOR PROVIDING US WITH DETAILED IN DEPTH KNOWLEDGE AND VERY USEFUL INFORMATION ABOUT THE PROCESSES AND SYSTEMS USED IN THE PLANT.HIS SUPPORT

    Premium Electricity generation Thermal power station Control system

    • 13074 Words
    • 53 Pages
    Powerful Essays
  • Powerful Essays

    Client Server

    • 1373 Words
    • 6 Pages

    Client server Current system: In that Corporate Financial System is a 25-year-old IBM 3090 mainframe running under a Virtual Machine/Conversational Mode System (VM/CMS) operating system. Many of the business applications used by the system are written in COBOL‚ and data that is stored in a non-SQL-compliant FOCUS database. Personal computers (PCs) containing an office productivity software is centrally located throughout the Corporate headquarters. Many day-to-day operations that happen across

    Premium IBM Mainframe computer Microsoft

    • 1373 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Amit Kumar Saini Research Scholar Dr. Deepak Tyagi‚ Singhania University 3G Security Threats 1. Abstract The aim of the research was to study the 3G (third generation) wireless networks security threats. From the data gathered through observations and literature review‚ security threats that may be possible in 3G mobile networks were identified and the methods which may be used to minimize such security threats in networks were determined. Recommendations are given to minimize the security

    Premium Computer network Mobile phone GSM

    • 3176 Words
    • 13 Pages
    Powerful Essays
Page 1 34 35 36 37 38 39 40 41 50