Introduction It has always been a problem determining the number of speakers required for a quality sound system especially in cases where speech separation of an individual speaker from a multispeaker signal is required. In this regard, various theoretical approaches such as the subjective threshold hypothesis for the detection of...
Topic: Tech & Engineering
Words: 5145
Pages: 19
Net neutrality regulations are critical to the openness and innovation of the Internet. It is a concept that has been built into the creation of the Internet since its foundations almost 30 years ago. Without net neutrality, major internet service providers (ISP) the likes of Verizon and Comcast would be...
Topic: Internet
Words: 567
Pages: 2
Introduction In the twenty-first century, technological progress is concentrated in the field of semi-automatic and automatic innovations. It can be seen everywhere in both the private and military sectors. This is why it is essential to know the latest advances in this scientific area. This paper aims to review academic...
Topic: Tech & Engineering
Words: 553
Pages: 2
Aircraft Solutions (AS) is a recognized leader in the design and fabrication of component products and services for companies in the electronics, commercial, defense, and aerospace industry. The mission of AS is to provide customer success through machined products and related services and to meet cost, quality, and schedule requirements....
Topic: Tech & Engineering
Words: 2478
Pages: 9
Executive Summary In the engineering of software, the software methodology applied plays a significant role in the final product of the process. For example, in a traditional linear model software is created following a set of steps and changes are often difficult and costly to implement. The pressure created by...
Topic: Programming
Words: 6259
Pages: 23
First, Safety Management System (SMS) is directly related to the provision of safety to the staff that is largely founded on the adherence to and advocating of the established standards by the personnel themselves. Hence, the human factor will be integrated by the related activities of your workers who –...
Topic: Aviation
Words: 283
Pages: 1
Introduction Artificial Intelligence is a broad-based division of computer science specializing in the development of intelligent machines with the ability to perform tasks requiring human intellect. It is a science with many disciplines, approaches, and programmable functions and a capability to learn, reason, solve problems, and make decisions. This paper...
Topic: Intelligence
Words: 1120
Pages: 4
Introduction The world of computing has been the most dynamic revolution in the recent times; it has attracted a number of microchip manufactures to come up with the most sophisticated Integrated Circuitry ever witnessed in the world. With increase in the number of computer users, there has been a great...
Topic: Intel
Words: 1415
Pages: 5
Introduction A disaster is a sudden catastrophic event that occurs and hinders the normal operation of a business or organization such as efficient processing of information technology systems that support business functions. Many organizations and businesses invest a lot of resources towards various infrastructures to ensure they remain afloat in...
Topic: Disaster
Words: 1151
Pages: 4
A database is computerized system of information with the ability to search and process data (Vermaat et al. 556). Data is the collection of texts, images, audio, video, and other items presented in the form of records in the database. Data along with a database management system and applications are...
Topic: Data Management
Words: 566
Pages: 2
Java offers three basic types of loops: FOR, WHILE, and DO…WHILE. Their fundamental function is executing a block of code repeatedly, based on a Boolean condition (Farrell, 2014). However, they differ in how they evaluate their conditional expression (Farrell, 2014). A WHILE loop evaluates its conditional expression before executing, therefore,...
Topic: Programming
Words: 283
Pages: 1
Audience The genre selected for the present analysis is a knowledge base article. The chosen source is a support page for Google’s Analytics application (“How can we help you?” n.d.). The intended audience is represented by the users of the Google Analytics app, which means the people who want to...
Topic: Google
Words: 1515
Pages: 6
The contemporary world is characterized by an increased use of wireless communication. Such communication entails the use of smart phones and iPods in our daily communications. The use of wireless communication has become very essential which has greatly enhanced sharing of information greatly. Security of the information transmitted over wireless...
Topic: Radio
Words: 2276
Pages: 8
The Boeing Company, similar to other large aircraft manufacturers, is experiencing an economic decline due to the combination of recent events. Examining the company’s financial performance from 2015 to 2019, one can see a gradual increase in revenue from 2015 to 2018, followed by a steep decrease between 2018 and...
Topic: Boeing
Words: 640
Pages: 2
Cyber security and information assurance refer to steps taken to protect networks and computer systems from being disrupted as well as preventing unauthorized access (Sara, 2008). Cyber security and information assurance aim at providing three things: integrity, confidentiality and availability (Knapp, 2009). Integrity is enhanced through ensuring that users are...
Topic: Tech & Engineering
Words: 259
Pages: 2
Introduction There has been an increase in the use of the Unified Modeling Language in many contexts; it is used in application domain, methodology, and platform. For this reason, there has been more concern for customized consistency. There has been little support for customizations that are specific safe for the...
Topic: Management
Words: 4257
Pages: 15
Introduction In many engineering applications, there is a need for efficiency. Power management is an elemental strategy for improving efficiency. The idea is to reduce power consumption to the least possible value while ensuring performance is okay. In the design of digital logic, power scaling is a major way to...
Topic: Energy
Words: 934
Pages: 2
Introduction Unmanned vehicles have grown in popularity, especially because of their versatility in use. These autonomous vehicles are used in multiple areas such as monitoring disaster areas, an inspection of projects and infrastructure, military operations, and spraying of agricultural chemicals, among others. The unmanned vehicles are also equipped with cameras,...
Topic: Tech & Engineering
Words: 1399
Pages: 5
The growing concerns about the emerging threats to security mean that intuitions have to upgrade their security system to include intelligence gathering system based on information technology. In this hospital security as well as information technology officers concerned with security issues do want to upgrade and include intelligent building IT...
Topic: Intelligence
Words: 840
Pages: 3
Introduction Globalization is a process beneficial in numerous ways as it supports economic growth and assists in accessing and creating opportunities – the Internet is possibly both one of its most visible facets and a driving force. Web security is one of the issues on which the effects of globalization...
Topic: Globalization
Words: 1999
Pages: 7
Introduction A planned change is a change executed systematically in tandem with organization’s future goals and expectations. It ensures an organization moves steadily in its processes of implementing a given solution. In IT project management, change refers to project management process, where the perceived change facets to a project are...
Topic: Success
Words: 1740
Pages: 5
Abstract This paper investigates the number of Clusters in K-Means Clustering and analyzes the methods used in numbering. The purpose is to obtain the correct number of clusters in a given document with the least number of errors and achieve an accurate number of clusters. A comparison of the different...
Topic: Tech & Engineering
Words: 2475
Pages: 9
Introduction Framers Company is in the process of launching a new product. One of the objectives is to provide customers with low prices within a limited time. The company also aims at producing a product that is unique in the market and one that will fulfill the needs of the...
Topic: Information Technology
Words: 862
Pages: 3
EMC EMC was first created in 1979 before starting as an information systems infrastructure, dealing in both software and hardware in 1981. With several partnerships, acquisitions, and a series of new research and development projects in various countries including Singapore, and tapping on cheap Chinese labor, the company grew further...
Topic: Management
Words: 1560
Pages: 5
Introduction Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of the internet. These two entities have virtually transformed the world as far as information processing and communication is concerned. Organizations have extensively employed the use of computer...
Topic: Success
Words: 837
Pages: 3
Introduction Education is of great importance to the society and because of this; individuals and governments have invested significant amounts of money in its development. Innovations in Information Technology have enabled great advances to be made in education through online learning. This form of learning is able to overcome problems...
Topic: Distance Education
Words: 842
Pages: 3
Summary Industrial plants in the United States are unlikely to stop using fossil fuels because the amount of power acquired from other sources is still inadequate. The fact that wind and solar photovoltaic (PV) energy are in short supply has compelled environmentally-conscious organizations to seek different means of mitigating the...
Topic: Electricity
Words: 461
Pages: 2
Introduction The rapid advancement in the use of information technology has also resulted in increased usage of databases for the storage of Information. Newer technologies such as data mining use the stored data in such a way that not only permits quick access to deeply buried information but they also...
Topic: Tech & Engineering
Words: 788
Pages: 2
Project Scope The Erie Company Department of Public Works — Division of Highways seeks proposals from consultants for professional engineering services for design, construction, administration, and construction inspection services for the Dona Street extension. The extension will be located west of NYS Route 5 for a distance of approximately 1,550...
Topic: Tech & Engineering
Words: 605
Pages: 2
Introduction Database Management Systems (DBMS) is a major requirement in any organizational setup, and one of the most popular DBMS is the Relational Database Management Systems (RDBMS). It is formatively one of the most significant landmarks made towards understanding the hypothetical and technological framework of a database. Although it has...
Topic: Data Management
Words: 1358
Pages: 4
All spheres of modern life are influenced by the technical innovations, developed for the last ten years. Medical care is not the exception. Different types of medical equipment are used during curing for many years. The innovations in the educational sphere have come later. Today the software and other innovations...
Topic: Nursing
Words: 607
Pages: 2
Introduction Information system development methodologies can be defined as a set of procedures and techniques aided with the necessary documentation that is used to design and implement a new information system or update an existing information system (Blanchard & Fabrycky, 2006). The methods of development are usually based on a...
Topic: Tech & Engineering
Words: 3064
Pages: 10
Introduction In the book by Shneiderman and Plaisant (2010), designing Human-Computer Interaction (HCI) is the science of studying and structuring interaction between users and the devices or machines such as computers. It’s a process that requires proper planning, incorporates numerous fields of disciplines such as the study of computer science,...
Topic: Computers
Words: 3787
Pages: 14
Performance evaluation of i/o workloads Flash-based solid state disks (SSD) is a performance based data storage technology that optimizes the use of flash-based technology to implement its data storage capabilities compared with mechanically available data storage technologies (Park & Shen, 1). Technically, the promise for better performance of the SSD...
Topic: Memory
Words: 2251
Pages: 8
Introduction This is the age of computers and computer based technologies. The increasing use of computers has made it essential to have the knowhow of computer related terminologies. This paper deals with the comparison of two operating systems which are Windows and Macintosh. Understanding a better operating system is quite...
Topic: Tech & Engineering
Words: 2943
Pages: 11
Introduction After many inventions or technology development, threats are also involved in many ways. New technologies give us latest types of crime which directly or indirectly harm us. Computer is the main source of the online data library. It not only gives us our required information, but when we download...
Topic: Cybercrime
Words: 9208
Pages: 40
The success of any business organization depends on its leaders’ willingness to apply appropriate models and theories, empower their followers, and make strategic decisions depending on the forces experienced in the sector. Managers need to utilize their competencies to support all core functions and ensure that every partner is involved...
Topic: Airlines
Words: 2471
Pages: 9
Conficker, which is also referred to as Downup, Downadup and Kido, is a worm that affects Microsoft Windows operating system which was discovered at first in November 2008. It checks for defects in the Windows software to designate computers and connect them into a virtual machine which can be dominated...
Topic: Microsoft
Words: 930
Pages: 3
Introduction Strategic planning is not a concept that is uniquely applied to the field of information technology. In modern times, every segment of life and every undertaking that is successful must utilize the advantages availed by strategic planning. To state simply, strategic planning is about the careful organization of the...
Topic: Strategic Planning
Words: 1984
Pages: 6
Introduction Information systems can bridge what was once an unbridgeable gap between service and a customer by making information available to previously unreachable populations. Current information technology can greatly assist service industries like hotel chains or airlines in making information readily available to previously unreachable populations. In most countries the...
Topic: Tech & Engineering
Words: 2389
Pages: 8
Abstract The world is going digital each day, hence Scientists and researchers are busy improving the old technology while subjecting business and technology into a new era of fourth generation digital technology. It all started from first generation, and then evolved to the second and third generation. At the start...
Topic: Tech & Engineering
Words: 2650
Pages: 10
Since I began working, I have interacted with various types of system software. I have found it very interesting working on different types of BIOS and device firmware, operating systems, utility systems, and operating software. Over time, I have been able to set up several websites using different server operating...
Topic: Software
Words: 1230
Pages: 3
Introduction The software development industry is fast growing as user requirements change-requiring applications that can address these requirements. As the costs of development rises in developed countries, a new source of labour market is emerging to provide labour for development of such applications at reduced costs. This is achieved through...
Topic: Software
Words: 1100
Pages: 4
Cloud computing technology has become one of the fastest-growing areas of the IT market in recent years. Businesses choose cloud services to reduce costs, improve internal interaction, streamline operations, help with faster decision-making, and ensure more flexibility. When choosing appropriate cloud technology, companies need to consider cloud deployment models and...
Topic: Tech & Engineering
Words: 339
Pages: 1
Introduction This topic involves studying the effects of the continued use of digital media on the human brain. The issue presented is becoming more urgent every year since the usage of digital technologies and social networks has an increasing impact on human life. Almost half of the world’s population uses...
Topic: Brain
Words: 1725
Pages: 6
Technology has been evolving at a very fast rate in the 21st century. Previously, it took several days or weeks for the news or messages to reach people in remote places. However, technology has brought a revolution in the way people communicate and transact businesses. The medical profession has benefited...
Topic: Communication
Words: 567
Pages: 2
A fire that occurred on June 18, 2007, in Charleston, South Carolina, was one of the most tragic events that lead to mass deaths of firefighters in the United States. Nine people died that day; they were all experienced firefighters between the ages of 27 and 56. Even though several...
Topic: Tech & Engineering
Words: 547
Pages: 2
Execution of business processes in the 21st century has been faced with a lot of challenges like insecurity and conviviality. Due to this a lot of organizations have employed information technology mechanisms to protect their information infrastructure from being accessed by unauthorized persons and also to check authentication (Neumann, 5)....
Topic: Tech & Engineering
Words: 1209
Pages: 4
Introduction We have two different types of ethics. This is the professional ethics and the human ethics. Professional ethics include ethics of a professional person like a doctor, a software engineer etc. Human ethics are the ethics which enable one to live well with the society. Ethics is very important...
Topic: Ethics
Words: 1962
Pages: 7
Advantage of logic gates There are several advantages of logic gates on computer operations and performances. First, the logic gates are faster, consume much less power, and are much smaller in size ( Nationmaster 1). The logic gates are cascadable. This gives the advantage of enabling the circuit construction, where...
Topic: Computers
Words: 1545
Pages: 6
In Java, statements can be executed conditionally through IF…ELSE and SWITCH structures. The IF statement evaluates a Boolean expression; if true, an associated block of code is executed; otherwise, the following ELSE block is executed (Farrell, 2014). Common mistakes when writing an IF…ELSE statements include errors in syntax, such as...
Topic: Tech & Engineering
Words: 294
Pages: 1
Description Hacktivism is the use of technology or computer system for social or political motivations or to promote a certain agenda. One prominent example of hacktivism was Aaron Swartz who broke into the MITs computer system in 2013 and downloaded thousands of academic journals and articles, later published online as...
Topic: Terrorism
Words: 415
Pages: 1
Quotation: In order to show the magnitude of changes, McCloskey (2016) writes that “People moved from tents and mud huts to split-levels and city condominiums, from waterborne diseases to 80-year life spans, from ignorance to literacy” (p. 499). The technique that appealed to me: After giving the statistics numbers regarding...
Topic: Tech & Engineering
Words: 282
Pages: 1
Abstract Data breaches pose the most significant threat to many companies, especially those doing business in the digital space. In this regard, Intrusion Detection Systems draw special attention from scholars, IT experts, and business leaders since their functions are directly related to monitoring network traffic and identifying malicious activity or...
Topic: Tech & Engineering
Words: 1073
Pages: 3
Introduction Cybersecurity takes up an indispensable place in the security management of each company. Frequently the reasons for the system hacking become non-executive directors, who lack knowledge on the topic of cybersecurity, therefore possessing high risks to the enterprise. Luckily, many preventive and defensive strategies are created in order to...
Topic: Cybersecurity
Words: 1302
Pages: 4
Depending on the objective, two types of path planning and simulation of unmanned underwater device trajectories should be allocated. These are the path from one point to the other and the complete grid coverage of the space (Panda et al., 2020). The initial analysis of both scenarios gives a vivid...
Topic: Vehicles
Words: 368
Pages: 1
Introduction Network design refers to a process that involves topological design, synthesis of network, and network realization. The main reason behind network design is to ensure that the business acquires a network that meets its business model. Many organizations are now focusing their attention towards designing information system network that...
Topic: Tech & Engineering
Words: 765
Pages: 2
Venkatesh, V. C. (2007). Precision Engineering. New York: Tata McGraw-Hill. The idea of precision engineering is outlined in the book due to the concepts of multi-dimensional approach when talking about the industrial growth in post-industrial society. In this respect, special attention is grabbed in the book to precision machinery, as...
Topic: Tech & Engineering
Words: 1807
Pages: 6
The article researched, “Emerging Technologies Being Incorporated in the Fire Service”, discuses eight new devices developed for the Fire Service. It summarizes these new devices without detailed description, providing an overview of the ways new technology is being integrated into firefighting equipment. These devices include three solutions for monitoring a...
Topic: Tech & Engineering
Words: 367
Pages: 1
Top-down parsing was introduced in the 1970s, and it remains a widespread strategy that has also become the basis for newer and more sophisticated algorithms. The top-down strategy was preferred during an extended period of time due to its comparative simplicity, usability, and an opportunity to customize. As the term...
Topic: Computers
Words: 555
Pages: 2
Introduction In general telecommunication systems are the different ways in which the information is passed from one place to another covering a certain distance. The message passed may be verbal or written. The mode of communication used depends on several factors such as the urgency of the message, the magnitude...
Topic: Telecommunications
Words: 720
Pages: 2
Classes and objects are one of the key attributes in object-oriented programming (OOP). The general relation between the two can be described as “is-a”: a class describes a template for objects, while an object is a specific instance of a class (Farrell, 2014). The primary concept of this relationship is...
Topic: Programming
Words: 357
Pages: 1
Abstract The purpose of the following research paper is to define how various psychological factors influence motorcyclists’ behavior in terms of safety. Among the concepts discussed, the issues of helmet wearing and exceeding speed limits will be outlined. With the help of peer-reviewed studies on the matter, some motorcyclists’ behavioral...
Topic: Psychology
Words: 412
Pages: 1
Introduction This is an elaborate plan on data quality evaluation for GlaxoSmithKline plc (GSK). This is a multinational pharmaceutical company with headquarters in London. There are issues in master data management as a result of two firms merging in 2000; Glaxo Wellcome merged with SmithKline Beecham Company. These two companies...
Topic: Tech & Engineering
Words: 838
Pages: 3
Introduction Technological progress has skyrocketed over the past few decades, allowing for the simplification and enhancement of a variety of processes within every domain. Industry and agriculture are among the areas that have experienced a vast rise in effectiveness and performance quality due to the integration of new types of...
Topic: Agriculture
Words: 851
Pages: 3
One of the major COVID-19 testing laboratories in the Czech Republic has recently faced an obscure cyberattack in March 2020. The representative of the Brno University Hospital, Pavel Zara, claimed that the situation is still in progress and there is no detailed information available on the incident. A cyberattack hit...
Topic: Cyber-Attack
Words: 306
Pages: 1
Introduction Technological advances are one of the most significant benefits of the modern world. The fact that various machines perform tasks on behalf of people is considered a characteristic feature of a developed society. However, it is also necessary to comment on the drawbacks of technology when it comes to...
Topic: Tech & Engineering
Words: 1678
Pages: 6
Introduction Managing a project is one of the major challenges that one needs to face when performing in the contemporary business setting. Projects implemented in the telecommunications industry are, in turn, even more, challenging than others due to the additional need to focus on communication-related concerns and the assessment of...
Topic: Auditing
Words: 1175
Pages: 4
Biotechnology is the act of using animals, plants and microorganisms to create products or perform certain tasks. Biotechnology has applications in four main industrial areas, which include; crop production and agriculture, health care, non-food uses of crops and other products (like vegetable oils, biofuels and biodegradable plastics) and finally in...
Topic: Tech & Engineering
Words: 540
Pages: 2
Noticing and Articulating the Problem The world is confronting an increasing flow of disinformation within cyberspace. Examples incorporate the spread of cyber-rumors by social media bots during French elections within the Macron Leaks attack or the partisan messages during Brexit in the United Kingdom. Thus, the growing threat of conspiracy...
Topic: Homeland Security
Words: 1015
Pages: 4
Introduction This paper investigates current trends in turning the brain waves into music, through surveying the literature on the methods of turning Electroencephalography (EEG) waves into Musical Instrument Digital Interface (MIDI) music. The effects of the music on the human body are well known and documented, where different types of...
Topic: Music
Words: 2181
Pages: 8
Introduction Biometrics is a security technology that is programmed in accordance of individuals’ body characteristics such as finger prints or eye retina to mention but a few. Its relevance is becoming an interesting topic in regards to computer and internet security. According to Bolle and Ratha (2004, p.6) the first...
Topic: Computers
Words: 1085
Pages: 4
Introduction The idea of human-machine communication has always been of interest to mankind. The recent technological developments prove that the use of specific low-end systems and EEG can allow recognizing unspoken speech and thus make direct communication without actually uttering words possible. In this respect, the impact of personal peculiarities...
Topic: Tech & Engineering
Words: 580
Pages: 2
Boeing faced the biggest blow in 1999 when airbus, their biggest competitor delivered more airplanes than Boeing. This was then followed by a shrank down of Boeing’s earnings and a consequent laying off of 9,300 employees out of the 126,000 employees that it had. During the gulf war, there was...
Topic: Boeing
Words: 813
Pages: 3
It seems reasonable to state that waging war has always been an expensive undertaking. What is more, with the flow of time, weapons, armory, and other military equipment – as well as expenses on army maintenance – have become pricier. It is not surprising that recent technical progress provides the...
Topic: Tech & Engineering
Words: 298
Pages: 1
The number of unmanned systems in the world is regularly increasing. Today, this diversity includes “self-managed” planes, vehicles, drones, seagoing ships, and spacecraft. Each designed device solves unique problems, hence the variety of interfaces for control and monitoring (Howard, 2013). There is no need to create machine functionality that will...
Topic: Tech & Engineering
Words: 404
Pages: 1
Introduction Communicating video content may take a variety of forms. These may include a point-to-point communication and broadcast method in addition to the multicast method. To communicate video efficiently in a fraction of the initial downloading time, streaming video is an important requirement. HTTP streaming Video HTTP streaming is an...
Topic: Tech & Engineering
Words: 553
Pages: 2
Introduction The article chosen for analysis was written by an Information Systems (IS) management professor with tremendous experience in the field. It is known as “The relations of requirements uncertainty and stakeholder perception gaps to project management performance” by James Jiang, Shelly Wu, Gary Klein and Liang, T.P for the...
Topic: Information Management
Words: 2082
Pages: 7
Introduction The VoIP problem was identified after carrying out a thorough assessment of the company’s communication systems. The analysis of the problem showed that the company’s VoIP network and infrastructure was prone to denial-of-service attacks (DoS) that affected the quality of the calls. The company’s Internet Protocol infrastructure is made...
Topic: Management
Words: 3974
Pages: 14
The Creative Process of Generating new Ideas In engineering design, engineers have to come up with new ideas because if they stick to the same old styles people will become bored with their designs. Besides that, they have to update their skills by finding ways of applying ideas from other...
Topic: Tech & Engineering
Words: 1678
Pages: 6
Introduction The principles of IP telephony are based on transferring the voice using the Internet Protocol, which is currently considered the most perspective and used protocol for data transfer over the networks. The world market for IP telephony is actively developing and currently, VoIP (Voice-over-IP) technology is supported by almost...
Topic: Internet
Words: 729
Pages: 2
Abstract Biomass energy is extracted from living or dead plant matter. This type of energy has an advantage over fossil fuel because it is a renewable energy source while fossil fuel is not. Majorly, biomass energy is used to produce electricity and heat. In this regard, plant matter even in...
Topic: Energy
Words: 3383
Pages: 12
Awazu, Y, Baloh, P, Desouza, KC, Wecht, CH, Kim, J & Jha, S 2009, ‘information-communication technologies open up innovation’, Technology Management, p. 51. The article under analysis explores the effect of information and communication technologies on innovation processes and difficulties connected with the development of these technologies. The article starts with...
Topic: Communication
Words: 673
Pages: 3
A subnet is an individually identifiable part of a particular Internet Protocol network. Subnetting is achieved by dividing the computer networks into groups of computers that manifest a distinct, selected IP address routing prefix. Subnetting is important when dealing with many connections of computers in large networks. These large connections...
Topic: Tech & Engineering
Words: 1157
Pages: 4
Introduction Fire hazards can pose a significant danger to the production and human lives that are essential to diminish through fire prevention control. The inspection of the amount of extinguishers and acetone in welding and molding shops in the project safeguards the space from potential danger. The welding shop faced...
Topic: Fire Safety
Words: 865
Pages: 3
In the past, dating suggested sharing intimate time with one’s partner, but the rules have changed. Today, it is possible to search for information about a potential lover online before becoming acquainted in person. The result of this search may vary from positive, such as similar taste in music, to...
Topic: Tech & Engineering
Words: 336
Pages: 1
History and applications of lead-based alloys Lead never occurs free in nature but in a compound known as lead sulphide (Galena). The ancient Egyptians used Galena in eye paintings because of its metallic look that served to attract the attention of ancient metal workers. Extraction of lead from its ore...
Topic: Tech & Engineering
Words: 2713
Pages: 9
How solar panels operate A solar panel, also known as a photovoltaic panel, is an assemblage of photovoltaic cells that convert sun rays directly into electricity through a process known as the photovoltaic effect; the interconnected photovoltaic cells (or the photovoltaic module) are protected from the environment, sometimes with a...
Topic: Tech & Engineering
Words: 2578
Pages: 10
Interview Notes This paper aims to develop a web-based emergency management system for the government of Lazarus Island. In particular, this system will be used at the response stage of disaster management, and its key purposes will be to help coordinate the relief efforts of various governmental and non-governmental organizations....
Topic: Disaster
Words: 1779
Pages: 6
The essay starts by introducing Roman and other high-school students that admit to texting and driving. The author explains that teenagers are willing to put their lives in danger because of the urgent need to connect. Turkle (2011) states that the contemporary generation is particularly used to having robot pets....
Topic: Tech & Engineering
Words: 675
Pages: 2
Background WIFI’s reliance on radio frequencies for data transmission has two significant limitations. First, the amount of data that can be transferred at a time is limited; and second, radiofrequency resources are constrained, which might lower WIFI capacity to transmit data in the future. One of the solutions to this...
Topic: Tech & Engineering
Words: 1514
Pages: 5
Symbol Meaning(s): This symbol is new to society since it has been created as a result of the emergence of new digital technology. It looks like an upside-down drop with a circle in it. Its appearance resembles a hot air balloon or a pin that travelers put on the world...
Topic: Tech & Engineering
Words: 227
Pages: 1
Identifying strategic issues and options of the organization requires close analysis of its external and internal macroenvironments. The scope of this assignment covers detailed analysis of Australian Securities and Investments Commission (ASIC), its current problems, and areas for growth. Prior to deriving insights regarding ASIC’s strategic issues and options, it...
Topic: Tech & Engineering
Words: 1987
Pages: 7
Introduction Google Play Store app is pre-installed on compatible Android devices. You can download applications, games, and other digital content. You can download free and paid games for your Android phone on Google Play. Your Smartphone has a Google Play Protection feature that warns you about potentially dangerous applications and...
Topic: Google
Words: 392
Pages: 1
Technology is an irreplaceable part of numerous life spheres, and medicine is not an exception. Electronic medical records (EMRs), electronic health records (EHRs), and others are essential parts of clinical information systems in the United States. For example, the EHR is a continuous record of patient health information that is...
Topic: Tech & Engineering
Words: 555
Pages: 2
Introduction Identification and authentication are the most important requirements of any security system. Electronic systems such as computers and communication devices have some sort of identification and authentication capabilities. Radio Frequency Identification (RIFD) technology is a form of Real Time Location System (RTLS) that uses an object known as RFID...
Topic: Radio
Words: 1568
Pages: 5
Introduction In the modern digital world, data holds significant value. Cybercrime is one of the biggest threats to businesses and companies strive to protect digital assets. Cybersecurity is a critical part of business infrastructure, aiming at protecting consumer data, proprietary information, financial data, and potential security threats, among others. Virtually...
Topic: Challenges
Words: 2344
Pages: 8
The iPhone X is one of the smartphones innovated and designed by Apple Inc. and it was released in 2017. The device delivered new features that lacked in its predecessors, such as the Face ID and OLED screen. It uses Apple A11 bionic system and delivers a slate form factor...
Topic: Apple
Words: 832
Pages: 3
Executive Summary Zero Trust Architecture is an innovative way of providing cybersecurity, which is beneficial for companies who have confidential information and, at the same time, outsource employees who do not work from the office computers. It is focused on protecting diverse resources such as databases, network accounts, and different...
Topic: Tech & Engineering
Words: 1739
Pages: 6
The film industry in Indonesia has been growing during the last several decades. One of the significant factors that influence this sector is technology development. The emergence of new internet technologies has made video content accessible to mass audiences, providing entertainment and education. However, the implication of new technologies has...
Topic: Cinema
Words: 398
Pages: 1
Project Objective To upgrade the existing email system by January 15th, 2011, in such a way that it becomes: one system with a capacity of 2500 users, replacing the existing 5 systems and making it capable of both LAN and remote (Wi-Fi) access; install new standards and protocols, reconfigure the...
Topic: Tech & Engineering
Words: 644
Pages: 2
With each year, technology is becoming more integrated into people’s lives. In education, teachers try to blend it with other tasks to prepare students for using devices in the future. Moreover, COVID-19 forced educators to transition to online teaching, which cannot be facilitated without the technology that allows them to...
Topic: Inequality
Words: 818
Pages: 3
Introduction Digital Media in Problem-Solving Advanced Data Collection Engaging the Target Audience Gaining Competitive Advantage Creating Solution-Based Content Hiring Professional Staff Adaptive Marketing Environment Simplified Estimation Algorithms Conclusion References Baglione, S., Tucci, L., & Woock, P. (2020). Invasive job hiring practices and social media data usage knowledge on job intentions....
Topic: Tech & Engineering
Words: 306
Pages: 1
Introduction Programmable controller applications refer to digital computers that are designed for the automation of electrochemical processes. They are mainly used in different industries and machines for purposes such as packaging. PCAs differ from general-purpose computers in that they are designed to accept multiple inputs and output arrangements, temperature ranges,...
Topic: Tech & Engineering
Words: 532
Pages: 2
Being on the Internet requires a lot of critical thinking and the ability to discern fact from fiction. With the abundance of information that is thrown at Internet users from every corner of every site, the range of false data is huge, and taking this information for granted may cost...
Topic: Fiction
Words: 853
Pages: 3
Introduction “Safety of the workers and the users of a facility is one of the most essential aspects for any engineering work.” (Skibniewski, 1983) Fault or failure in a completed project can lead to huge costs in terms of repairs and accidents. The defects may also cause unnecessary delays or...
Topic: Management
Words: 920
Pages: 3
Introduction Competition in business is increasing by day. Price of goods is not just the factor that has to be overlooked while considering the overall development of business but quality of products and services to customers should also be considered. Time also plays a major role in all business activities....
Topic: Technology
Words: 1154
Pages: 4
Introduction System engineering is generally required for the proper arrangement of the managed system and for professional risk management practices. Considering the fact, that the necessity to improve the entire performance of any system is required for the smoother decision making and problem solving processes, the system engineering practices are...
Topic: Tech & Engineering
Words: 1616
Pages: 6
Introduction Social media platforms provide an immense opportunity for people to share their experiences with the world. TapBooth has numerous features that allow its users to improve their experience while taking photos and posting them on the most popular platforms (“Help,” n.d.). However, I would like to focus on the...
Topic: Tech & Engineering
Words: 555
Pages: 2
A project is a temporary establishment, intended for the creation of unique products and services. “Temporary”, implies that every project has a beginning, and inevitably an ending point, reached when the established objectives are completed. “Unique”, on the other hand, means that the created products or services sufficiently differ from...
Topic: Management
Words: 2472
Pages: 9
Situational awareness is crucial in carrying out unmanned missions, which is why any opportunity to improve it deserves careful consideration. The majority of opportunities to enhance situational awareness belong to its first stage, which is the perception of the needed data. Research indicates that it is the most error-prone component...
Topic: Tech & Engineering
Words: 296
Pages: 1
It is quite easy to provide a basic technical definition of Virtual Reality. It is a three-dimensional environment generated by a computer with which an individual can interact. What is more, a person using special tools like VR headsets and controllers can manipulate objects stimulated by computers and perform some...
Topic: Virtual Reality
Words: 280
Pages: 1
Information technology (IT) has been useful in transforming different sectors of modern economies. Business entities have integrated innovation in management and operational roles for effectiveness. Similarly, academic institutions have adopted online information systems for enhancing students’ performance. Many communities practiced farming and cattle rearing as a traditional way of life....
Topic: Agriculture
Words: 888
Pages: 3
Introduction Information Technology Infrastructure Library is the collection of practices that should be adopted for better and improved information technology services, information technology operations, and concepts. In literal terms, it is a collection of books that was developed by the British Government. The figure that is shown is a collection...
Topic: Information Technology
Words: 866
Pages: 4
Surface Vessels Wave Glider is an unmanned marine system (UMS) unmanned surface vehicle with full autonomous capability. It is produced by Liquid Robotics, a wholly-owned subsidiary of The Boeing Company (“Wave glider,” 2019). Ten feet long, it employs wave energy to propel itself forward with complimentary use of stored solar...
Topic: Vehicles
Words: 582
Pages: 2
Though theoretical knowledge is essential, there is a growing belief that while teaching applied sciences, particularly engineering, a great emphasis should be put on the development of students practical skills. Therefore, some courses and curriculums need to be revised to improve the current state of education in this sphere. Many...
Topic: Students
Words: 909
Pages: 3
Safety management systems (SMSs) are an essential component of the aviation industry. Throughout the history of aviation, safety measures evolved from crew resource management aimed at improving communication between the crew members to the contemporary SMSs (Petitt, 2017). In order to continuously develop and improve the existing SMSs, sufficient information...
Topic: Aviation
Words: 582
Pages: 2
The search formulated as Stress site: Nature.com provides links to numerous publications about stress on the website of the scholarly journal Nature. These publications mainly focus on either high levels of stress found in contemporary society or the neural mechanisms involved (“Stress,” 2020). The search reveals that stress occupies a...
Topic: Google
Words: 326
Pages: 1
Fault Monitoring and Condition monitoring In the field of control engineering, fault detection and isolation and condition monitoring have happened to be among the most important topics. As a result, this paper intends to identify these two phenomena and how they are incorporated in the field of automotive engineering. To...
Topic: Tech & Engineering
Words: 1709
Pages: 6
Today’s rapid shift in the traditional patterns of social lifestyle caused by the COVID-19 pandemic outbreak has resulted in the necessity to define possible approaches to living a full-scale life while respecting the need for social distancing. Thus, one of the major challenges in the context was to define the...
Topic: Distance Education
Words: 321
Pages: 1
Introduction Artificial intelligence (AI) refers to the development of machines that simulate human intelligence, both in action and thought. It is a revolutionary branch of computer science that applies multiple approaches. Examples of AI technologies widely used today include planning, speech recognition, learning, and problem-solving. AI is common in the...
Topic: Artificial Intelligence
Words: 573
Pages: 2
iPhone is superior to Android because of its design, innovative technology used to build these phones, Apple’s operating system, and the company’s excellent service. Opponents may suggest that Android phones released recently are comparable in design to those by Apple. Moreover, Apple’s devices are recognized for their uniqueness and the...
Topic: IPhone
Words: 126
Pages: 1
Abstract Technological changes are happening at so fast a rate that organizations have to constantly remodel their strategies in order to beat competition. One of the major changes that institutions have had to undergo is the installation of reliable information systems such as office automation regimens. This paper seeks to...
Topic: Tech & Engineering
Words: 604
Pages: 2
The Internet was created for education, free transfer of information, the unification of communication, and a healthy society’s development. However, it has become a place to support anger and hatred, where people reflect their anti-social views. Numerous terrorist attacks were planned on the Internet, with the preparation and planning stages...
Topic: Internet
Words: 314
Pages: 1
Introduction The invention of computers basically as a vital communication tool has revolutionized man’s lifestyle in a big way. It has made the world today to become too small and be referred to as a “global village”. This new development has led to emergence of a new wave of crime...
Topic: Computers
Words: 1584
Pages: 6
Social engineering refers to a wide range of psychological maneuvering of misleading people to reveal confidential information and imperil its security. There are numerous forms of manipulations, which hackers use to make their victims disclose personal details. Moreover, cybercriminals follow a set of specific social norms within their subculture. This...
Topic: Tech & Engineering
Words: 621
Pages: 2
The unmanned ground vehicle (UGV) is a means of transportation on the ground, which can work without a person on board. This type of transport offers a profitable solution for many previously problematic areas of human activity. In places where it is hard or threatening for a person to work...
Topic: Technology
Words: 303
Pages: 1
Unmanned Aircraft Systems (UAS) operators stand for remote pilots of autonomous observation aircraft, such as drones, for example, that collect intelligence information. Space Systems operators functions include support of the space-related missions via air traffic controller. The current paper provides a comparison of situational awareness experienced by these two operators,...
Topic: Tech & Engineering
Words: 1111
Pages: 4
Electromagnetic waves of different lengths and frequencies are used for different purposes based on their characteristics and capabilities. The contemporary world technology utilizes the whole spectrum of electromagnetic waves from the longest radio waves to the shortest Gamma rays. Due to these waves’ capabilities to spread over long distances and...
Topic: Cinema
Words: 274
Pages: 1
Robosub is incredible international competition for mainly student teams seeking to demonstrate their technical success in developing fully autonomous submersibles that showcase the skills of modern devices. It should be recognized that the unique feature of the competition entirely affects the final design, which should have an unmanned device: according...
Topic: Competition
Words: 598
Pages: 2
The Flower Fairy Tale focuses on supplying custom and designer bouquets, which means that there is additional stress on the importance of the product being assembled by hand. This eliminates the option which would imply using robots or any other form of mechanical assistance in the production process. However, business...
Topic: Tech & Engineering
Words: 583
Pages: 2
Introduction Nanoparticles, also identified as ultrafine particles, refer to matter particles with a diameter of between 1 and 100 nm (nanometers). They have specific characteristics such as their inner structure, shape, surface characteristics, and size, which render them different from other materials, including spatial confinement, high surface energy, and various...
Topic: Tech & Engineering
Words: 747
Pages: 2
Introduction Team performance measurement plays an integral role in establishing a connection between planning, decision-making, actions, and results of a project. By analyzing team performance, determining its strengths and weaknesses, and assessing results, team members get the necessary information to avoid failures, monitor the progress, ensure continuous improvement, and achieve...
Topic: Performance
Words: 2658
Pages: 10
Abstract Efficient communication has been identified as a potential tool to enhance organisation agility. Many businesses have benefited from efficient communication systems in order to enhance their competitive advantages. Meanwhile, organisation depends on the real time communication to enhance organisational decision-making. Thus, this proposal discusses modelling of a network deployment...
Topic: Tech & Engineering
Words: 2459
Pages: 10
Since the invention of the internet protocol, communication has astronomically advanced creating new possibilities that did not exist before. Computer Supported Cooperative Work (C.S.C.W) is a technology that seeks to use computer systems to allow, coordinate and monitor collaborative group work. Developed recently, Google Wave is a web service technology...
Topic: Computers
Words: 2587
Pages: 9
The 2020 public hearing held by the CRTC (Canadian Radio-television and Telecommunications Commission) makes part of a comprehensive review of mobile wireless services. In his opening remarks, Ian Scott, the CEO and chairperson of the CRTC, stated that between 2016 and 2018, providers had made a lot of progress. They...
Topic: Radio
Words: 303
Pages: 1
One of the important aspects that Information technology has brought forward is telecommunications. Communication networks play an increasing important role in an ever shrinking business world. Organizations, big or small, used these networks to exchange information even beyond geographical boundaries. Through research, new communication standards are developed on regular basis...
Topic: Technology
Words: 874
Pages: 3
Study Design The study will employ a cross-sectional research design in examining regulations and technologies employed in the aviation industry to provide a high level of performance in safety management systems (SMS). This research design is appropriate because it is easy to implement, promotes data collection from a representative sample,...
Topic: Management
Words: 568
Pages: 2
With the rapid development of new technologies, the safety of personal data is expected to increase. However, no matter how secure a wireless network is, there are some special tools and methods that allow certain people to crack it. Despite the fact that there is a great number of solutions...
Topic: Cybercrime
Words: 573
Pages: 2
Introduction The rapid development of computer technologies has fastered the process of the information transmission through the Internet. Nowadays, we cannot imagine our life without internet communication since it is closely connected with many spheres of our life. Thus, internet serves as a universal source of the electronic database that...
Topic: Internet
Words: 1098
Pages: 4
Cryptographic Basis of Encryption Encryption is the process of converting data into a coded format for security and confidentiality purposes. This process is achieved by passing data through a predetermined set of mathematical formulae known as encryption algorithms. The most commonly used techniques of data encryption include symmetric and asymmetric...
Topic: Encryption
Words: 689
Pages: 2
In the contemporary world, interpersonal communication, overall, and dating, in particular, are changing concepts. Contrary to the traditional vision of a regular date filled with meaningful conversations, it is common to see a couple in a restaurant looking down on their phones without saying a word to each other. While...
Topic: Technology
Words: 1653
Pages: 6
Introduction The development of digital technologies and innovations that brought humankind to the era of the Internet has introduced multiple changes of various character in every part of life. One of them is the appearance and constant transformation of a new category of crime associated with computers and communication technologies...
Topic: Challenges
Words: 881
Pages: 3
Search engine crawlers, commonly identified as robots, spiders, or bots, are programs or scripts that methodically and spontaneously browse webpages. Crawling relates to the discovery procedure whereby search engines dispatch a group of robots – spiders or crawlers to locate updated and new content (Amudha & Phil, 2017). Bots, for...
Topic: Tech & Engineering
Words: 654
Pages: 2
Nowadays, people surf the web for pictures of cats much more often than for sketches of atomic bombs. The Internet became a vast database, and it was created to make fast access to this data open to everyone (Cukier, 2014). However, the web is becoming more and more commercialized: people...
Topic: Relationship
Words: 343
Pages: 1
Introduction Transport hubs and routes are in principle associated with particular safety concerns, as transport accidents are frequent causes of injury and death of passengers. At the same time, the airport administration is especially diligent in ensuring passenger safety. Numerous checks and security measures can cause anxiety among people, as...
Topic: Airport
Words: 999
Pages: 4
Over this course, I have learned much about Java and programming in general, particularly the object-oriented programming (OOP) paradigm. As it draws to a close, I understand that the concepts of inheritance and polymorphism are complex and challenging to master. Although I understand their application and utility, I still have...
Topic: Personality Development
Words: 305
Pages: 1
The development of technologies allowed humanity to communicate with each other over long distances. Today, when connecting is no longer a problem, the focus has shifted to the quality and security of networking. The Voice over Internet Protocol (VoIP) was created that allows for faster and cheaper communication. Although VoIP...
Topic: Internet
Words: 287
Pages: 1
Introduction Application whitelisting is a security technique that restricts applications or components that can be executed within an organization to a list of specifically approved (whitelisted) ones. Components in this case refers to libraries, configureation files, or other similar elements (Sedgewick, et al., 2015). Thus, only known “good” activity is...
Topic: Tech & Engineering
Words: 1101
Pages: 4
Most of these networks are genetic, worldwide web-based with a complex topology. A scale-free network is a connected network with the property that the number of links originating from a given mode exhibits a powerful law of distribution. This is network is constructed by adding nodes to the existing network...
Topic: Tech & Engineering
Words: 1244
Pages: 4