Abstract This article discusses the detailed data structure of Ethereum blockchain and defines its essential components, essence, and advantages. It is argued that the primary Ethereum’s elements are accounts, state, fuel, transactions, and blocks. It is concluded that the platform has a significant and appropriate architecture. Introduction Ethereum’s platform allows...
Topic: Blockchain
Words: 1452
Pages: 5
Aviation security is the result of painstaking organizational work to predict potential scenarios and response methods. An Emergency Response Plan (ERP) is a strategy for dealing with accidents that may arise on board, in the office, or in the airport area. Crisis management is a field of activity that organizes,...
Topic: Aviation
Words: 611
Pages: 2
Introduction Hacktivists, organized criminals, and state-sponsored operatives continue to launch incessant, high-profile attacks on commercial, governmental, and even vital public infrastructure. This has heightened cybersecurity awareness among the concerned organizations as they seek to guard their valuable information and data against being stolen and redistributed in the black markets. Intellectual...
Topic: Cybersecurity
Words: 1971
Pages: 7
Introduction Cloud computing is an emerging trend in computing. In this computing model, users can access their computing resources via the internet on demand. The underlying principle is that users of computing resources only need to use the application rather than have the application installed on their personal computers. Cloud...
Topic: Tech & Engineering
Words: 2451
Pages: 9
Enterprise organizations have a lot to handle in the era when cyberattacks have become not just a tangible threat but a lived reality. Statistically, two-thirds of all organizations report up to 25 security breaches every month. At the same time, one in five respondents admits that they have only limited...
Topic: Cybersecurity
Words: 591
Pages: 2
Introduction In the modern world, information is considered one of the most valuable assets. It is rational to invest in the development of qualitative and instant information sharing systems because this approach leads to a significant advantage in the market. That is why individuals and businesses draw specific attention to...
Topic: Tech & Engineering
Words: 1408
Pages: 5
Overview Technological advancement has had a lot of impact on how man communicates and performs tasks. The most significant impact of technology is that it has globalized the whole world making the globe to be a small village in terms of communication and work. This research paper examines how technological...
Topic: Tech & Engineering
Words: 832
Pages: 3
A Brief Description We chose the website of the Internet Mental Health Organization. This website is dedicated to all the individuals in society, trying to inform them regarding mental health disorders, prevention, and consequences. More specifically, this website is directed to that target group, population, which has experienced (or is...
Topic: Internet
Words: 551
Pages: 2
Introduction Since its invention in 1973 and subsequent adoption as the network standard IEEE 802.3, Ethernet has grown to become the most widely used technology in networking business systems such as back-office mainframe computers, printers and data servers. Over time, factors such as improved speeds, ease of installation and maintenance,...
Topic: Tech & Engineering
Words: 1119
Pages: 4
Cyberbullying refers to the deliberate humiliation, insults, and threats targeted at a person via the modern means of communication. This form of mockery is widely spread among schoolchildren and teenagers. The difficulty of dealing with this problem is that the First Amendment of the US Constitution guarantees the freedom of...
Topic: First Amendment
Words: 553
Pages: 2
We do understand that assuming the position of safety director at one of the world’s busiest airports presents its own set of challenges. It is especially difficult to manage the new work responsibilities during the COVID-19 pandemic. Our consulting company would be happy to guide you through the process of...
Topic: Airport
Words: 538
Pages: 2
Coy, W. (2004). Between the disciplines. ACM SIGCSE Bulletin, 36(2), 7–10. “Between the disciplines” was first published in the year 2004 to explain the nature and characteristics of computer science. The journal not only explains computer science in its authentic details but also analyses its usability in a future-oriented manner...
Topic: Computers
Words: 1133
Pages: 4
Introduction Projects are essential parts of any business because they are the means for achieving organizational objectives. While operations are routine activities that are foundational to the functioning of a company, projects are planned and implemented in order to achieve specific goals. For instance, if a business is facing challenges...
Topic: Management
Words: 1947
Pages: 7
Recent research has shown that many companies are data-rich but still information poor, despite having invested heavily in IT. This is because they have not invested in Business Intelligence (BI) systems, which can be exploited to improve business performance, and increase profits. Business Intelligence models are used to obtain business...
Topic: Business Intelligence
Words: 617
Pages: 2
Abstract The purpose of this project is to implement radio frequency identification and automated materials handling systems in a new public library building. RFID and AMH technologies allow for automatization of several essential processes that would otherwise have to be conducted by people. AMH equipment is capable of sorting and...
Topic: Radio
Words: 1492
Pages: 5
Abstract Neural networks have been defined as mathematical constructs that have the ability to emulate the numerous processes individuals utilize to recognize patterns, learn tasks and solve problems. For a long time, Neural networks have been characterized in terms of their number and types of connections specifically between the person...
Topic: Tech & Engineering
Words: 2706
Pages: 10
Introduction In engineering design, the procedure of coming up with a component involves idea synthesis at the initial state after problem definition. Creative thinking then follows to evaluate possible designs to meet the functional requirements of the mentioned need. Vetting is also done to come up with a sensible number...
Topic: Tech & Engineering
Words: 825
Pages: 3
The advancement of technology is gradually changing and reshaping the face of the 21st century. All industries, including the world of academia, are susceptible to this “bugbear”. According to Market and Research (2018), automation in the education segment is expected to grow by 47.5% through 2021. The conventional framework of...
Topic: School
Words: 306
Pages: 1
Summary The website, baselinemag.com, primarily showcases information that relates to new business developments in the IT industry. This can range from what is currently trending in the industry today, what policies are currently being developed and finally it also showcases articles giving advice to businesses about current trends in employment,...
Topic: Tech & Engineering
Words: 734
Pages: 2
Introduction The use of internet in the world has enabled the sharing of vast range of information and services. The ability of internet users to access information in this colossal interconnection of computers is enabled by use of databases that avail and store the information that is available in the...
Topic: Data Management
Words: 1071
Pages: 4
Introduction Radio Frequency Identification (henceforth RFID) is the application of a small tag into a product, animal, or person to identify or track them via radio waves (wikipedia, 2008). This small tag is a low-cost device that can hold a limited amount of dataolnar). RFID is a technology that has...
Topic: Radio
Words: 1721
Pages: 4
Introduction Data and information are presently being treated as a very pertinent corporate resource. This has come as a result of innovations especially in IT where the corporate world now is embracing these innovations to establish a competitive edge. These systems are of great benefit to the organization, however, the...
Topic: Disaster
Words: 516
Pages: 2
Introduction Fluid flow visualization entails the creation of a means of making fluid flow patterns perceivable. This is important because the flow patterns can be used a basis for analysis in experimentation and in model simulations. A few methods of fluid visualization are: surface flow visualization, particle tracer and optical...
Topic: Tech & Engineering
Words: 800
Pages: 3
Background The need to cut carbon emissions has become a global priority to mitigate climate change effects. Unstable global oil prices, unreliable supply due to political instability in oil-exporting countries, and more importantly, the growing fossil fuel-related carbon dioxide (CO2) footprint are the factors driving the shift to renewable energy...
Topic: Energy
Words: 2505
Pages: 9
Bluetooth refers to a short range wireless technology that is used with communication and computing devices. Just like the other types of wireless technologies, Bluetooth comes with several security threats. These threats compromise the security of a device as well as that of others in the network. One of such...
Topic: Tech & Engineering
Words: 570
Pages: 2
Introduction I am writing this proposal to inform you of the need to change the IT department into a CIO organisation. The proposed modification will improve the efficiency of the department. Besides, it will be easy to track data and other information from a central location. Leadership philosophy The leadership...
Topic: Information Technology
Words: 617
Pages: 2
Due to their inherent hazards and lethal potential, aviation accidents constitute critical events requiring thorough investigations. Their major purpose is the identification of the primary causes and the development of possible ways to eliminate future occurrences. However, experience has demonstrated that a single factor, which may be evident at first...
Topic: Management
Words: 897
Pages: 3
One of the problems preconditioning the slow pace of IT technologies rise is the existing legislation. By the current laws, the Czech state can conduct business through its participation in a joint-stock company or via a state enterprise (Ondrich & Sebestova, 2017). In such a way, state-owned enterprises (SOE) acquire...
Topic: Tech & Engineering
Words: 283
Pages: 1
Abstract The architectural framework of the proposed system draws on an interactive interplay of a variety of system technologies that make up an integral whole of a single unit of a decision support system (DSS) for the retail industry. The DSS is solely a tool for decision-making for retail managers...
Topic: Tech & Engineering
Words: 2315
Pages: 9
Introduction Despite technological advancements, aviation accidents still occur, threatening the air transport sector. To reduce their number, it is vital to investigate past incidences and acquire critical insights to promote the future enhancement and effective risk management. The provided report focuses on the analysis of TAM Airlines Flight 3054 to...
Topic: Airport
Words: 2598
Pages: 9
A user guide is also known as a manual. In simple terms a user guide or user’s guide is a practical communication document meant to provide help to people using a particular system. User guides are mostly linked with electronics such as telephones, computer hardware and software, radios, cameras among...
Topic: Blackberry
Words: 751
Pages: 3
Goodall, J. R. & Ozok, A. A User-Centered Approach to Visualizing Network Traffic for Intrusion Detection. USA, 2005. The article is dedicated to the disclosure of the intrusion detection analysis aimed at providing integrity and safety to high-speed computer networks of the modern period. The authors managed to pay attention...
Topic: Computers
Words: 1027
Pages: 4
Collaboration is critical to an organization’s information security because its lack can be exploited by an attacker as a vulnerability. There is also a tendency to use compartmentalized security measures that can be bypassed individually to gain access to an organization’s sensitive data (Secude, 2020). Furthermore, it is possible that...
Topic: Collaboration
Words: 181
Pages: 2
Introduction A small local company manufacturing specialized machined ‘valve-body’ components for the petroleum industry wants to automate one of their existing manufacturing facilities. This proposed update is required in order maximize the profit margins of this particular facility by reducing operating costs and increasing overall operating efficiency. A Zilog Z80...
Topic: Manufacturing
Words: 1874
Pages: 8
Unmanned aerial system (UAS) comprises an aircraft device, payloads, and ground-control systems (GCS). A GCS is dedicated to unmanned aerial vehicles (UAVs) and mounted aboard automobiles to enhance proximity to UAS restricted by a variety of communicating capacities (Yang, Lin, & Liu, 2016). UASs are designed with ground-control channels comprising...
Topic: Tech & Engineering
Words: 1405
Pages: 5
In this paper, I am going to show the basic procedures that ought to be undertaken while performing a digital forensic examination. These procedures are evaluated in form of answers to some pre written questions. From what equipments to pack to what to do first after arriving at the scene...
Topic: Computers
Words: 3657
Pages: 10
Introduction The current waves in the developments of electronic devices, especially in their movement towards mobility, focus on the requirement for energy efficiency abreast with productivity. The low consumption of the circuits used in mobile devices represents a large industry. The implementation of low-energy circuits can be seen at the...
Topic: Tech & Engineering
Words: 651
Pages: 2
Introduction The Internet of Military Things (IoMT) is a unique form of technology under the Internet-of-Things (IoT) framework applied in the execution of military operations. The IoMT has wide application in advanced combat operations and intelligence-oriented warfare processes (Suri et al., 2016). A majority of the highly advanced military units...
Topic: Internet
Words: 634
Pages: 2
In modern times, the importance of digitalization of the company’s functions can not be underestimated. In the competitive environment that moves towards globalization with each new technological advancement, a company that lags behind in technology implementation will be expected to fail in most cases. However, to deal with the ever-increasing...
Topic: Tech & Engineering
Words: 559
Pages: 2
It goes without saying that education is immeasurably significant for any person in the contemporary world. The development of technologies is determined not only by certain people’s inherent intelligence but the process of their acquisition of various skills, knowledge, habits, values, and beliefs. Education enhances creativity, develops reasoning and logical...
Topic: Tech & Engineering
Words: 281
Pages: 1
Introduction Safety is one of the pillars of the modern civil aviation industry. Regarding the constantly growing number of passengers and the high price of mistake, there is a critical need for practical systems and approaches that will help to minimize the chance of error and create a safe environment...
Topic: Aviation
Words: 2125
Pages: 8
The coronavirus pandemic has accelerated the digital transformation in various sectors across the globe. In the news article “The Robot That’s Keeping Facilities Clean During Covid-19,” Gaskell (2020) explores how organizations in different sectors are leveraging robots to disinfect their facilities. This article focuses on one robot developed at the...
Topic: Management
Words: 319
Pages: 1
Description of the Problem Following the integration of technology such as the hybrid-cloud system, artificial intelligence, augmented reality, API platforms, blockchain, and robotic process automation into company operations, the organization’s susceptibility to cybersecurity threats, particularly cyberattacks, has increased significantly. Significant gaps exist in intelligence or knowledge related to the aforementioned...
Topic: Innovation
Words: 1756
Pages: 6
Introduction Software engineers have been researching widely on how software development methods can be improved. The main aim of doing this has been to provide the client with the best possible application that he or she wants and to promote communication between the client and the developers of the system....
Topic: Agile Project Management
Words: 4339
Pages: 16
Introduction Over the years, computers have become an integral part of the business environment. This has been as a result of their efficiency, accuracy, and speed which has revolutionized the manner in which business is conducted. An integral part of computer systems is their ability to store and manipulate data....
Topic: Microsoft
Words: 842
Pages: 3
Data analysis has greatly changed several industries in the last few years (Fuller 1; Innovative Enterprise par. 1; Salim par. 1). Record firms utilize analytics to capture critical information about listening to music online since several platforms allow users to consume music using modern technologies. While producers couldn’t collect information...
Topic: Music
Words: 292
Pages: 1
Introduction A person’s right to privacy has been highly cherished in the US and in many countries across the world. This is because the consequences for victims of privacy intrusion can be devastating, ranging from hurtful gossips to stealing of identity and even damaged credit ratings (Chiu, 2000). Even though...
Topic: Internet
Words: 2835
Pages: 10
In the course of the development of computer technologies, data transmission acquired a new electronic status. Needless to say that paper documentation is in the past and there is a tangible tendency to download all necessary information into the computer as it is considered to be the safest and effective...
Topic: Health
Words: 559
Pages: 2
History Group ware is an extensive concept that largely goes beyond CSCW (Computer- Supported cooperative work). Some authors argue that they are the same. According to Cartensen, collaborative software or groupware is one of the components of CSCW. Cartensen that CSCW and by far groupware tackles problems of collaborative actions...
Topic: Tech & Engineering
Words: 1106
Pages: 4
In recent years, there has been tremendous growth in data volume across all organizations. Data has become the backbone of competitiveness, productivity, development, and innovation in many companies. Fleckenstein and Fellows (2018) note that a large amount of information places people in a particular context in which data management becomes...
Topic: Data Management
Words: 316
Pages: 1
Abstract CRISPR (clustered regularly interspaced short palindromic repeats) has emerged as an exciting tool for biological research over centuries. It is used in cell alteration and has gained an advantage over the previously used techniques. Due to its high speed and ease of use, it has been endorsed in agriculture...
Topic: Innovation
Words: 2374
Pages: 8
Introduction Project management is a process of scheduling, organizing, inspiring and conniving resources to realize explicit goals. It also refers to submission of acquaintance, skills and techniques to an extensive array of actions with an aim to meet project particulars (Kanda, 2011). Projects are temporary, unique and undertaken to meet...
Topic: Management
Words: 615
Pages: 2
Executive summary This report gives a comprehensive analysis of several issues associated with computer security. The findings of the report reveal several limitations of software licensing as a measure of ensuring computer security. One of the major limitations that the report has focused on relates to the fact that licensing...
Topic: Computers
Words: 1637
Pages: 6
Introduction In the recent past, internet has played a pivotal role in boosting science, business, and education. Nevertheless, to many people, the internet is an additional tool for committing many crimes. Internet has spawned the entry of new forms of crime in cyberspace besides making older crimes easier to commit....
Topic: Cybercrime
Words: 1419
Pages: 5
The term methodology refers to a complete description of a system that considers the process, people, modeling language, project management, social structures and products. We however note that not all the systems developed to bear the meaning of this word. They are rather Object-Oriented than being Agent-Oriented. It is with...
Topic: Software
Words: 1057
Pages: 3
Communication is essential to most human activities, including business, and, as a result, the available means of communication can either facilitate or undermine the performance of a given company. Thanks to the advances in information and communication technology (ICT), today’s companies have a wider range of communication tools available to...
Topic: Technology
Words: 1426
Pages: 5
Abstract The Third Generation Partnership Project (3GPP) develops High Speed Packet Access (HSPA) to make broadband a reality everywhere (Kumar, Sengupta and Liu 366). HSPA+, also referred to as HSPA Evolution, is a natural evolution of HSPA and provides a next-generational performance as a result of cost effective additional upgrades...
Topic: Tech & Engineering
Words: 1564
Pages: 5
Over the years, the automobile industry has seen many technological changes, the most notable one being self-driving cars. These vehicles do not need human drivers; instead, they use software and sensors to navigate, control, and move (Nielsen & Haustein, 2018). These cars can have substantial economic savings in the U.S....
Topic: Driving
Words: 395
Pages: 1
Abstract The increasing demand for the availability of mobile data transfer is closely linked with the development of new technologies that offer the end-users an opportunity to access web data. The process of technological development means the constant increase of the access speed, as well as the decrease of the...
Topic: Tech & Engineering
Words: 1357
Pages: 5
What is Bluetooth Technology? Bluetooth technology comes about due to an amalgamation of different wireless technologies. The specifications of this technology enable the unification of these technologies, thus forming “Bluetooth technology”. As a technology that relies on an open wireless protocol, Bluetooth enables data exchanges over short distances. However, radio...
Topic: Radio
Words: 1351
Pages: 5
Introduction One of the most important merits of MRI is the capability to create high contrast images particularly for soft tissues. This ability enabled it to be the technique of choice in the field of medical imaging. The high contrast is attained as a result in variations in signal intensity...
Topic: Tech & Engineering
Words: 2476
Pages: 6
Wind energy is the latest non-solar energy source, which is widely used. In many parts of the United States, the wind’s patterns and speeds vary because of the differences in terrain, vegetation, presence and size of water bodies (Aissaoui and Tahour 31). Wind power has many purposes in daily living,...
Topic: Technology
Words: 414
Pages: 1
The unprecedented technological development during the last couple of decades has entirely transformed people’s lives, introducing numerous previously unforeseeable opportunities. The enhanced computing capabilities and improvements in graphic processing have turned facial recognition into a widely-spread phenomenon, found in many useful devices. However, one area of its application remains an...
Topic: Tech & Engineering
Words: 597
Pages: 2
The OSHA proposal for benzene was aimed at limiting the amount of exposure from 10ppm to 1ppm. This rule was due to the reports in the media about the death of workers who were exposed to benzene levels that were above 10ppm, yet the initial limit set by OSHA was...
Topic: Health
Words: 878
Pages: 3
Front-end web developers usually worry about the look and feel of their design interfaces since it is a major consideration by end-users in their decision to use their product. As discussed in class, Vilar, (2010) proposed eight golden rules of interface design. The first on his list is that the...
Topic: Software
Words: 1653
Pages: 6
Introduction Any institution’s desire is to see its various departments operate at optimum levels. This is by far the most important consideration that drives institutions to try and entrench the usage of information systems in its operations. However, the more an enterprise adopts new technology, the more the management begins...
Topic: Management
Words: 1245
Pages: 4
Correlation and regression, how they are similar, how they are different, and for what each is used Correlation is a statistical technique of data analysis that is used to evaluate the relationship between two groups of numbers. The relationship tested is what is the effect of decrease or increase of...
Topic: Tech & Engineering
Words: 691
Pages: 2
Internet culture has spread across China and became one of the most important aspects of people’s daily lives. The one issue that has become a topic for serious conversation is the country’s firewall, which does not allow many Western sites to be accessed (Tereza, 2008). The difference between China and...
Topic: Culture
Words: 446
Pages: 1
The creation of a communication system that employs radio frequency signal transmission presupposes consideration of the available channels, equipment that can be used to establish the network, area, and the central purposes that drive its introduction. At the same time, it is critical to ensure that the transmitter can operate...
Topic: Radio
Words: 298
Pages: 1
The title of my research proposal is Increasing security in e-government through BPM in KSA. Background BPM is a strategy used in organizations and business operations to improve business processes. For example, it can be used to identify missing items that should not be missing or assist an employee in...
Topic: Management
Words: 535
Pages: 2
Today, governments should be more receptive to changing government operations, enhancing competence, and providing modern public service. To realize these goals, many government departments and IT firms have to embrace mobile computing gadgets in general, and the iPad and iPhone in particular. Many people, government departments, and organizations are already...
Topic: Apple
Words: 568
Pages: 2
Business Problem Business Unit: Elegant Solutions installs window treatments for home and office use. Issues: They have a large mobile workforce that spends most of the time out in the field with customers. The salespeople follow up on customer leads, visit the homes or offices, take the orders and measurements,...
Topic: Radio
Words: 310
Pages: 2
Introduction Web-based learning is a popular approach taken in e-learning directions. In that regard, the development of e-learning website, specialized in the preparation of Sat reasoning test, was a good idea to test several features common to web-based learning management systems as well as aligning to usage simplicity as one...
Topic: Tech & Engineering
Words: 957
Pages: 3
Methods of Measuring ERP Systems Enterprise Resource Planning can be evaluated using numerical methods; but there are also other nonnumeric methods of analysis. However, experts assert that there are no fixed rules that govern the way evaluation of the ERP systems should be done (Chen & Lin, 2008, p. 300)....
Topic: Tech & Engineering
Words: 1032
Pages: 3
Introduction In the cyber world, cyber-attacks are quite a common occurrence. The attacks target computer hardware such as scanners, computers, servers as well as software programs such as operating systems and protocols. The recovery of data is made increasingly difficult by the encryption and steganography programs (Britz, 2009, p. 217)....
Topic: Cyber-Attack
Words: 1290
Pages: 5
Introduction Organizational security is a complex and dynamic phenomenon. It is essential for institutions to invest in the best practices and components to ensure the security of persons, information, and the physical set up. This means that the security plan must encompass all the aspects that pertain to it. Such...
Topic: Tech & Engineering
Words: 1742
Pages: 6
Issues in the existing information system of the Newton Public Library The Newton Public Library operates through the kindness and donations of benefactors, especially Mr. Jimmy Chung. Ever since its inception, it has run through the manual or traditional system, except perhaps a few modifications when computers and the Internet...
Topic: Tech & Engineering
Words: 1470
Pages: 11
Critics of scrum have asserted that there is no difference between Scrum and XP without its technical practices. This has led to the development of a sentiment that Scrum is just XP without the technical practices and this paper will attempt to validate this claim by comparing and contrasting XP‘s...
Topic: Programming
Words: 1592
Pages: 6
An overview of the Integrated Cargo System This was an ambitious project initiated in the year 2000 by the Customs in conjunction with the government. Now it is called cargo management re-engineering (CRM). The Integrated Cargo System (ICS) is part of the CRM. By 2004, the export functionality was successfully...
Topic: Management
Words: 1413
Pages: 5
Introduction The economic value of the construction industry is significant and the industry contributes up to 10% of the annual GDP for most nations (Michael 2005, p.2). The industry encompasses the use of many other complementary industries such as electrical, mining, steel and transportation to name but a few. This...
Topic: Construction
Words: 3039
Pages: 11
Project management elements and processes and tools are usually the same irrespective of whether the project is IT based or not. The problem in the management of IT projects however comes in where most people attempt to manage these projects just like the construction or event organization projects. IT projects...
Topic: Management
Words: 1247
Pages: 4
Company network analysis The company in analysis throughout the course of this paper is IBS Electronics. The company is a global distributor foe electronic products and components. The company majors with the difficult to find electronic components and parts, selling of electronic components online, delivery of services to customers, and...
Topic: Risk Assessment
Words: 853
Pages: 3
Introduction File transfer protocol (FTP) is a protocol used to transfer files from one computer to another over a network connection, such as the Internet. Abhay Bhushan designed the first FTP protocol in 1971. It originally used dos command prompt, but has been redesigned using the Graphical User Interface (GUI)...
Topic: Tech & Engineering
Words: 3014
Pages: 10
Introduction The automobile industry was a significant game-changer in the 20th century in terms of technology. It is also safe to assume that the changes that are expected to happen in the automobile industry over the next twenty years will exceed the magnitude of the developments that have occurred over...
Topic: Vehicles
Words: 1962
Pages: 7
Introduction Today’s world is becoming more digitalized every day. Mobile culture is rapidly being embraced that most people cannot leave without their cell phones. The mobile phone has become a very useful device both as a communication and networking platform. According to Sharples, Taylor, and Vavoula (2007, 27), mobile technologies...
Topic: Tech & Engineering
Words: 1352
Pages: 5
Introduction A neural network refers to an information-processing model operating in a manner that is similar to the natural nervous systems of the human brain (Stergiou and Siganos, 1997). The novel structure is the primary component of this model comprising numerous integrated processing components (neurons) that function together to offer...
Topic: Tech & Engineering
Words: 2750
Pages: 10
The present world has the benefit of cheap and readily available IP networking. This has made many users the world over benefit from the advantages of networks especially as far as data transmission is concerned. The work of transmission of data via networks needs several procedures performed. For starters, host...
Topic: Tech & Engineering
Words: 1998
Pages: 7
Introduction Green IT is the important issue in the world of ICT today, and most of the organizations are taking the lead in the adoption of strategies that will boost Green IT for the sake of the climate. Green IT has some initiatives in order to apply it, such as...
Topic: Web Technology
Words: 1982
Pages: 5
Outline This work aims at establishing the procedures involved in the design and management of appropriate pilotage services such as pilotage requirements and the standard criteria for expected ship status. It will also highlight the factors to be considered such as pilot boarding, info to be provided, anchorage area and...
Topic: Management
Words: 1652
Pages: 5
Fire is defined as “a rapid, self-sustaining, exothermic oxidation reaction that produces heat and light in varying degrees” (University of Maryland University College, n.d., para.8). This definition differentiates fire from other slower oxidative reactions such as browning and rusting. Self-sustaining allude to the capability of the process to prolong even...
Topic: Tech & Engineering
Words: 1651
Pages: 6
Introduction After William Greene, an advocate from Minneapolis was assigned the job of searching through almost one and a half million automated papers for a present occasion; he addressed a professed good computer database. Three contacts have been nominated as relevant articles from a less significant example, thus ‘instructing’ their...
Topic: Technology
Words: 1641
Pages: 6
Technologies can be viewed as a dominating force in the modern world. Contemporary society benefits from the extensive use of diverse devices, software, and applications in different spheres of activity. They guarantee a significant increase in effectiveness, accuracy, and performance levels, along with the minimization of mistakes rate and effort...
Topic: Tech & Engineering
Words: 834
Pages: 3
Introduction Radio Frequency Identification (RFID) technology is based on the transmission of information through special RFID tags, which was initially used in sectors such as logistics, airline luggage automation or parcel distribution. One of the areas which are receiving a wide implementation of RFID technology in libraries (Kern, 2004). In...
Topic: Radio
Words: 1204
Pages: 4
Abstract The study aims at looking at how the knowledge of human behaviour will help the manufacturers of computers in coming up with better computer designs that are human friendly after incorporating much of how human behaves and relate. After the identification of the dominant human behaviour that can be...
Topic: Computers
Words: 1356
Pages: 5
The first tutorial, ‘Learning about SQL databases’, focuses on creating and using reports, database security and publishing the web. The tutorial teaches about security and network connectivity, how to connect your web application to SQL server 2005 express edition, getting started with reporting services and how to embed, package and...
Topic: Tech & Engineering
Words: 893
Pages: 3
The robotic competition offers a platform to determine the selection of an efficient system concerning the guidelines and procedures of the challenge. According to RoboNation (2014), the competitors were awarded approximately $20,000 and a WAM-V program to establish a sensory set and propulsion software effectively. In this sense, this report...
Topic: Tech & Engineering
Words: 600
Pages: 2
Introduction On November 23, 2001.The initial global agreement on computer and internet-connected offence was opened for signature in Budapest. The agreement which is know as the convention on cybercrime was developed by the Council of Europe ( CoE ), climaxing a five-year process dating back to 1997.As of July 16,2002,the...
Topic: Cybercrime
Words: 4574
Pages: 15
Introduction Carbon Nanotubes (otherwise known as CNTs) are distinctive nanostructures which have very notable mechanical and electronic properties and which in recent days of sciences have been marvelously accepted as been of immerse benefit to technology and sciences throughout the world. Presently, the most assured technique for the production of...
Topic: Water
Words: 2793
Pages: 16
Functional representation of an image is f(x, y), where x and y are coordinates and amplitude f at any point gives the intensity of an image. Image processing is the conversion of image into image concerned variables using image processing techniques. There are three types of image processing techniques; they...
Topic: Tech & Engineering
Words: 660
Pages: 2
Introduction The main aim of this report is to find out the number of accidents that occurred in the year 2010 in the recreational boating services in US. The accidents has been grouped into various categories which includes; collision with recreational vessels, collision with fixed objects, flooding /swamping, capsizing and...
Topic: Safety
Words: 1446
Pages: 5
Introduction Help Desk is a system that helps an organization to clear customer queries related to a specific product that they had bought or wished to buy. Whether it is a simple household item or a supercomputer, customers will have several queries or doubts regarding the product they intend to...
Topic: Management
Words: 1217
Pages: 4
Before the era of computer-aided design (CAD), models, lasers and prototypes, individuals were laboriously carving materials from wood or sticking plastic pieces. The revolution of technology in the 1980s brought a solution to the problem. The concept of rapid prototyping resulted in the development of more automated methods. Three-dimensional printing...
Topic: Tech & Engineering
Words: 1735
Pages: 6
Everyday world practice regularly shows us that human life is an incredibly fragile phenomenon that can be damaged by external or internal factors. It is enough to look at the human body in detail to understand that, although it is a rather complicated technical mechanism it has too many nuances...
Topic: Tech & Engineering
Words: 579
Pages: 2
Energy is essential in ensuring that modern civilization is sustained. Large quantities of energy are needed by modern technologies and in the process increase the energy demand. Traditional sources of energy such as fossils and hydroelectric energy are not in a position to satisfy the ever-increasing global energy demands. Nuclear...
Topic: Disaster
Words: 555
Pages: 2
Modern technology of content creation implies the communication of the team of creators, contributors, and editors of the information published on the websites, often in a remote mode. One of the essential content management systems used for such collaboration is a wiki (Hawaiian word for quick), a website that enables...
Topic: Tech & Engineering
Words: 505
Pages: 2
Introduction Fires can result from negligence, an accident and malicious act causing disastrous fire outbreaks, supported by the presence of air combustion, nitrogen and hydroxyl air. Meanwhile, we employ proper techniques to fight this fire. Individual people and firms have decided to look at the efficient ways and the fastest...
Topic: Tech & Engineering
Words: 1126
Pages: 4
Background Vitamin A deficiency is most prevalent in diets that are primarily cereal-based with little consumption of meat or fresh vegetables. Pharmaceutical supplementation and food fortification with vitamin A (VA) are commonly practiced, but these programs have their shortcomings. The inventors conceived Golden Rice exclusively as a humanitarian product for...
Topic: Tech & Engineering
Words: 1880
Pages: 5
Introduction In recent times, most organizations are adopting emerging technologies to match the high competition in the market. Information systems (IS) are a set of components, which are integrated and aimed at the collection, processing, and storing of data in providing information, digital products, and knowledge (Yaacoub & Salman, 2020)....
Topic: Cybersecurity
Words: 2020
Pages: 7
Introduction In the real estate industry, increasing population projects a progressive opportunity in estimating future potential demand on dwellings. The significant increase in global ageing population has been recognised for decade in connection with the trends in morbidity and mortality of older adults has continuously dropped. So does in Thailand,...
Topic: Aging
Words: 5981
Pages: 2
The cyberspace has developed from a simple academic and research network to a complex communication network used to perpetrate many activities on a day to day basis. According to Spinello (2011), cyberspace have turned the world into a global village; but at the same time, it has hacked into lots...
Topic: Cyberspace
Words: 2772
Pages: 10
Introduction Information asset protection is a very critical aspect of business management process for the successful operations and continuity of any business. Any form of threat to the security of the electronic or computerized information and its process is a definite threat to the quality of business end result (Boran,...
Topic: Tech & Engineering
Words: 3490
Pages: 10
Given the fact that practically any router has both Wi-Fi antennas and Ethernet plugs, it would make perfect sense to use a complementing connection at a university. For example, libraries could significantly benefit from such a setup, as students would have the opportunity to use high-speed Wi-Fi. In contrast, the...
Topic: Radio
Words: 297
Pages: 1
Developments in space exploration are taking the center stage in powerful world countries, particularly the US and Russia. The inability to refuel, service, and repair satellites once launched into space is a significant concern, as companies and governments lose millions of dollars in value due to minor problems (Vocative, 2017)....
Topic: Robots
Words: 375
Pages: 1
Introduction Server virtualization is a technique of organizing several separate virtual machines on one physical system. These virtual machines can be thought of as virtual private servers that hide the physical servers, operating systems, and other network resources from people using the servers. By implementing several virtual machines, various operating...
Topic: Tech & Engineering
Words: 1554
Pages: 5
The biometric software application can uniquely identify or verify an individual using a comparison and analysis of features based on the contours of a person’s face and behavior. This software can compare it with information in the database for subsequent identification. The author’s thesis aims to identify the benefits of...
Topic: Airport
Words: 952
Pages: 3
Abstraction In this method, the process of defining and analyzing data requirements to support the business process of an organization is known as data modeling. All data is stored in a model called concept model which has data definitions. It is implemented using logical models. There are different data models...
Topic: Tech & Engineering
Words: 2712
Pages: 10
Introduction The field of information technology has been faced with many challenges in its development. However, the security of data is arguably the main challenge in the whole industry. Every new product has to include an aspect of security to attract customers. This paper looks at the security of data...
Topic: Information Technology
Words: 2073
Pages: 8
Google Search is a universal information search tool used by millions of people. Many scholars agree that Google Search is also a useful research tool (Miller and Record, 2017). But this tool has drawbacks and limitations, which should be considered when searching through Google Search. Moreover, awareness when using search...
Topic: Google
Words: 1487
Pages: 5
Introduction RFID is fast taking shape as manifested by the recent media blitz and newspaper articles about the technology. Not many people are able to distinguish the different categories and benefits that the technology brings. It is the purpose of this paper to highlight on the history, uses and benefits...
Topic: Radio
Words: 2947
Pages: 10
Introduction Organizations cannot function effectively without data. In the 21st century, most organizations such as educational institutions, businesses and government agencies depend on modern information systems in undertaking their transactions (Whitman & Mattord, 2011, p. 40). As a result, protecting the data, either held by the firms or data that...
Topic: Tech & Engineering
Words: 917
Pages: 3
Introduction This proposal covers upgrading from Windows 7 to Windows 8.1. Currently, HACKM, LLC has around 5000 desktops/laptops that run Windows 7. In addition, many employees will also be connected to tablet computers. Apart from migration to Windows 8.1, the company also strives for efficient and optimal use of Windows...
Topic: Tech & Engineering
Words: 1820
Pages: 7
The current level of technology development allows the creation of many technological solutions aimed at ensuring human safety. One of the directions in this area is replacing humans with autonomous robots controlled by an operator. Thus, a person can be protected from working in a hazardous environment, and the likelihood...
Topic: Airport
Words: 386
Pages: 1
Introduction Titanium Diboride is a hard compound that consists of Titanium and Boron. Titanium Diboride is useful in designing various products (Huber, 3000). One such product is a capacitor. Apart from capacitors, Titanium Diboride is used in the making of extremely hard materials such as army wares and ceramic cutting...
Topic: Tech & Engineering
Words: 3637
Pages: 14
Summary description of its structure and purpose The site PCMAG.COM has rather interesting and clear structure with the help of which it is possible to identify the purpose set by the site developers. Looking at the main page of the site, the visitor is free to choose any interesting for...
Topic: Tech & Engineering
Words: 610
Pages: 2
The Balanced Scorecard or BSC is performance management and IT governance tool, which is used to evaluate the companys efficiency and identify those aspects which need modification or improvement (Kaplan & Norton, 1996). It helps to develop the policies of the enterprise according to the vision and the initial goals....
Topic: Tech & Engineering
Words: 849
Pages: 3
The companies, which specialize in the development of software solutions, have to attach great importance to business continuity planning because they are exposed to many internal and external threats, for example, the failure of hardware, virus attacks, power cuts, mistakes of the personnel and so forth. Each of these threats...
Topic: Tech & Engineering
Words: 1126
Pages: 4
The term “Anthropocene” was coined to refer to the era in which human beings became the main driver of environmental change. While scientists argue about whether a new geological era should be officially distinguished in the history of the Earth, the atmosphere is rapidly changing. An increase in the level...
Topic: Environment
Words: 1141
Pages: 4
Abstract Navigation has evolved over the years from rudimentary forms that included the use of celestial bodies to the satellite-assisted systems used today. Over the years with each new system solving the preceding systems errors aircraft navigation has improved at a constant pace. These improvements have made air travel safer...
Topic: Airlines
Words: 3248
Pages: 10
Introduction There are several barrier related to technology integration into studies. This literature review explores different aspects related to factors that affect technology integration into studies as well as the appropriate measures that need to be considered to address these underlying issues. This section has been put into four sections....
Topic: Technology
Words: 2444
Pages: 10
Quoting the words of Jakub Mochon, CT product manager at Siemens Medical Solutions, let us state that “the U.S. health system is very dependent on CT”, it is absolutely evident (Dargan, 2009/2010, p.30). According to the data provided by McCollough et. al., the usage of CT scans has increased dramatically....
Topic: Tech & Engineering
Words: 564
Pages: 2
Introduction Science is the marvel of the present world and modern technologies are an application of science to fulfill man’s long-cherished dreams to control and manipulate the forces of nature for his relevance. But at the same time, it is also very true that the blessings of science depend upon...
Topic: Technology
Words: 659
Pages: 2
Tech companies around the world try to outdo one another in coming up with new technologies. For that reason, these companies set aside a large share of their revenue for research and development (R&D). Startups and established organizations also get financial support from governments and NGOs, which helps in advancing...
Topic: Google
Words: 3027
Pages: 10
Introduction: Facts of the case On February 06, 2014, Ioan Leusca and Dezso Gyapias were charged in a U.S. Federal Court for stealing customer data from automated teller machines (ATMs). The two men had used data acquired from the ATMs to steal from bank customers in Connecticut, New Jersey and...
Topic: Computers
Words: 1682
Pages: 6
PayPal, an online money transfer service established in 1998, has since become the primary form of money transfers, overtaking the traditional system of money orders and checks. With a total income of $7.9 billion, the service allows users to deposit, withdraw, and transfer funds with 26 different currencies globally. Peter...
Topic: Tech & Engineering
Words: 558
Pages: 3
Introduction In the 21st century, the technological environment is under influence of high degree of robustness (Barry, Atul & Arun 1). This has had a great impact on various sectors of the economy. Amongst the technological sectors that have undergone revolution with a high magnitude, is the information communication technology...
Topic: Evolution
Words: 1515
Pages: 5
Introduction The past few decades have witnessed a dramatic increase in the number of internet users. This upward trend has been accompanied by an almost parallel increase in the process of streaming, which is a data transferring technique which enables users to process data continuously without interruptions in the form...
Topic: Internet
Words: 2218
Pages: 8
Due to globalization, there is greater demand for electricity, as most of the productive activities require energy power. Globalization has brought people, institutions, and governments of various nations together. Through globalization, international trade and capital investments have been conducted internationally through the help of information technology (Ehrfeld 210). The interaction...
Topic: Energy
Words: 1434
Pages: 5
What is Finite element analysis via (FLAC)? And how is it done? Finite element analysis (FEA) could run in 2D or 3D and is used for geotechnical applications in the determination of tunnels, deep foundations, slope stability, seepage analysis, soil structural analysis, and capacity for earth retaining structures (Lee, Y.S....
Topic: Tech & Engineering
Words: 7500
Pages: 12
Introduction The Xyz Company is a business organization offering its clients textile products and services within the major category of textile industries. In XYZ organization, communication is a very crucial activity for the growth and development of the company. Since the inception of xyz, communication has been a matter of...
Topic: Tech & Engineering
Words: 1556
Pages: 5
Energy harvesting can be described as a process of deriving energy from external sources, such as the sun, thermal power, and the wind. This method of capturing and storing energy is considered safe for the environment, and therefore, is a promising innovation. The energy harvesting systems are the technology used...
Topic: Energy
Words: 594
Pages: 2
Introduction Verizon is a telecommunication company in America providing services for wired and wireless communications beads on third-generation technology (Verizon, 2011a). The organization is innovative in the telecommunication sector and it provides video and broadband communications and other modes of entertainment through an advanced fiber-optic network. The organization is committed...
Topic: Tech & Engineering
Words: 1167
Pages: 4
Introduction Light-emitting diode, usually called LED, is used in a variety of electrical devices They send out signals from remote controls, figure out the numbers on digital clocks, signal you when your electrical devices are turned on, and lights up watches. When put together, they can form large pictures on...
Topic: Tech & Engineering
Words: 765
Pages: 3
Introduction The Association of Computer Machinery (ACM) code consists of 24 imperatives that are formulated as statements of personal responsibility. It comprises most of the issues that professionals are likely to encounter. The ACM code outlines how software engineers should conduct themselves ethically in their profession, and while relating to...
Topic: Computers
Words: 688
Pages: 2
The foremost thesis presented by these authors can be formulated as follows: the way in which codes of ethics help to advance the cause of an organization is not as much concerned with promoting the freedom of innovation, as it is concerned with controlling the actions of the employees. According...
Topic: Ethics
Words: 1109
Pages: 4
Encryption The security of data and information of the B manufacturing is paramount. The computer network represents one area that is vulnerable to security compromise, which might be detrimental to the prosperity of the company. Therefore, it is would be useful to encrypt data or information Schneier, 2001) that is...
Topic: Manufacturing
Words: 1288
Pages: 6
Introduction A microprocessor, commonly referred to as the Central Processing Unit (CPU), a central place where all data processing is done, is a gadget that distinguishes only binary code as numbers and ascertains basing on the orders by employing assemblage languages. This piece of writing is a detailed explanation of...
Topic: Tech & Engineering
Words: 1692
Pages: 8
Institutions of higher learning are increasingly using technology to aid in the learning process. However, this vital resource is prone to constant failures that slow down the learning process. In addressing this problem, Hitch (2002) and Wepner (2004), present similar and diverse ways of dealing with this predicament. Hitch (2002,...
Topic: Tech & Engineering
Words: 587
Pages: 2
Introduction Social networks have been having privacy issues; in the case of Beacon and Facebook, Facebook had made it possible for people to share their private life with others using Beacon; the launch had been done in December 2007. When the program was launched, it seemed to facilitate business and...
Topic: Ethics
Words: 600
Pages: 2
Abstract This research paper’s major purpose is to discuss and research accessibility issues in relation to websites. The paper questions whether enough is being done to make websites suitable for people with disabilities and from that look at what could be done to improve the area going forward. Do individuals/...
Topic: Technology
Words: 3706
Pages: 13
Personal computer operating systems have evolved with the development of personal computing power and user expectations and use. The 80s decade of the history of computer operating systems started with the introduction of apple computers that did not follow the then famous IBM architecture. Apple computer introduced the Macintosh which...
Topic: Computers
Words: 785
Pages: 2