+1(316)4441378

+44-141-628-6690

Archive for the ‘Engineering’ Category

What makes a good website

I am required to write a minimum of a 3 page research paper on What Makes a Good Web Site/Page. Include topics as navigation, design, layout, usability, color etc. I need to use a minimum of five different sites and/or sources to complete your paper. It is to be typed in MLA style with both in-text citations and a works cited page. I must use at least 2 articles and 1 book out the 6 resources.

Brainstorm and create a custom credit for Green Roads

Brainstorm and create a custom credit for Green Roads, consider you are building a 4 lane road through a commercial area that has businesses on both sides of the road (grocery stores, gas stations, home improvement stores, clothing stores, sports stores, etc.)

Keep in mind it must be measurable and must not already be included in Green Roads.

Personal Statement- MS

I need a personal statement for MS in Mining Engineering that highlights the following;

-An explanation of why you want to study the course what is my motivation, and how the degree fits in your long-term plans

-Why am I suited to this MS program?, Mention what inspired you to apply and how it fits my skillset

-Include relevant experiences

-What skills have you developed up to the present, and what do you want to further develop? How will the programme help you develop those new skills?

-How can my work contribute to the department/University/society?


See my personal profile below

Mr X is an experienced International Social Sustainability professional and a certified GIS Specialist with extensive managerial experience on livelihood related and GIS studies on development projects. His field experience span managing team of consultants conducting multi-stakeholder engagements, social mapping, GIS mapping and livelihood restoration and

Five Simulation Models And The Main Characteristics Of Modelling Paradigms Are Discussed In Chapter 6dentify And Discuss A Theory Based Modelling Approach For Developing Polcies In Information Technology.

 Identify and discuss a theory based modelling approach for developing polcies in information technology. 
 As indicated above, select one example and describe how data visualization techniques can be used by a practitioner or analyst in developing a policy to solve a specific problem. Provide a thoughtful research-based analysis and include at least two references to support your thoughts.
 

Flow Measurement

Abstract:- (150 word)
A brief summary i will provide a paragraph to written in different way (paraphrasing)
Introduction :- (400 word)
What need to be included in the introduction:-
1. Pressure can be defined as ... ?
2. Pressure can either be static or dynamic in nature ? :-
        Fluids as for example water or any solvent, tend to flow from regions of high pressure to lower pressure in the absence of other forces and the pressure difference between those two regions is the driving force for the fluid to flow. ?
3. Hydrostatic head is also defined as .... ?
4. Flow measurement ?
5. Fluids in motion (fluid flow) :
e.g. water or gas through a piping system and its characterisation is a common problem need to be understood well when working as a Chemical Engineer.
5. chemical process industry the fluid streams are delivered to chemical reactors through a, usually not simple, piping network and thus their flow rate need to be determ

Personal Statement- MS

I need a personal statement for MS in engineering Management that highlights the following;

-An explanation of why you want to study the course what is my motivation, and how the degree fits in your long-term plans

-Why am I suited to this MS program?, Mention what inspired you to apply and how it fits my skillset

-Include relevant experiences

-What skills have you developed up to the present, and what do you want to further develop? How will the programme help you develop those new skills?

-How can my work contribute to the department/University/society?


See my personal profile below

Mr X is an experienced International Social Sustainability professional and a certified GIS Specialist with extensive managerial experience on livelihood related and GIS studies on development projects. His field experience span managing team of consultants conducting multi-stakeholder engagements, social mapping, GIS mapping and livelihood restoration

Personal Statement- MS

I need a personal statement for MS in engineering Management that highlights the following;

-An explanation of why you want to study the course what is my motivation, and how the degree fits in your long-term plans

-Why am I suited to this MS program?, Mention what inspired you to apply

-Include relevant experiences

-What skills have you developed up to the present, and what do you want to further develop? How will the programme help you develop those new skills?



See my personal profile below

Mr X is an experienced International Social Sustainability professional and a certified GIS Specialist with extensive managerial experience on livelihood related and GIS studies on development projects. His field experience span managing team of consultants conducting multi-stakeholder engagements, social mapping, GIS mapping and livelihood restoration and improvement related research. Specifically, Mr X has over 5 years experience and conducting

Intro To Engineering

In this assignment, you have to read an article thoroughly and then answer all the questions that are asked in the Microsoft Doc file.


The article named " AI The Road to Superintelligence." is attached as a .pdf file in the attachment section. Read that article and answer the questions for Assignment 5.


Note: I need it within 24 hours after I post the question.

Mobile Security Issues

 

While we as security practitioners have been working feverishly over the last 10 years to secure our traditional endpoints, our users have become less invested in their no-fun company laptop, and more enthralled with their smart phone or tablet. With the company laptop, you won the difficult battle of deploying appropriate controls: whole-disk encryption, data leakage prevention, group policycontrolled everything. When you weren't looking, users started working on their other devices more and more; then, one fateful day, your gadget-happy executive attended a big meeting with an iPad to take notes and a new battle began. It was just a matter of time before people started talking about data breaches with unprotected smart phones and tablets.

This weeks reading mentioned various types of mobile attacks. In your own words state what types of attacks exists and the method of approach you would utilize to address the attack in an enterprise setting.  Please s

Web Application

 

Create a Sample application that need to authenticate using oidc code.

Requirements:

Jdk 1.8

Spring boot (backend)

Web sphere 8.5.5

Authentication using Authz code flow(Oidc)

Authorization ( Locally in the app)

Please let me know any Questions and price that you are expecting to get this work done.

thank you