Other Technology Essay Examples and Topics. Page 2

597 samples

Means of Destruction & Atomic Bomb Use Politics

This information relates to the slide concerning atomic energy, which also advocates for the participation of the Manhattan Project's researchers and policy-makers in the decision to atomic bombing during World War II.
  • Pages: 2
  • Words: 529

The TREND-UP Solar Technology

This work contributes to the advancement of solar technology by illuminating the factors that affect the price and competitiveness of these systems.
  • Pages: 4
  • Words: 1307

CRISPR: The Emerging Biotechnology

The understanding of CRISPR can negatively impact the manufacture and deployment of bioweapons through the application of technology to improve the lethality of bacteria or potential viruses.
  • Pages: 2
  • Words: 635

MyFitnessPal and Samsung Health: Personal Reflection

I like how MyFitnessPal and Samsung Health allow me to track my daily activity and eating habits. Samsung Health integrates with my fitness watch, which makes it convenient to track my activity during the workouts.
  • Pages: 1
  • Words: 293

Technology to Improve Gun Safety

Although the author's key argument regarding the safety of personalized weapons could be seen as debatable, the overall structure of the argument is quite compelling, particularly, due to the opportunity to the sue of statistical [...]
  • Pages: 3
  • Words: 847

Wearable Exoskeletons for Industry Use

Even though most of the work in the field of exoskeletons is still experimental, there are significant challenges hindering the implementation of exoskeletons in the industry including safety and discomfort.
  • Pages: 27
  • Words: 8592

Keurig K-Select Coffee Maker Description

The selected object for the technical overview is the Keurig K-Select Coffee Maker - a single-serve K-cup coffee brewer. Concerning the primary functionality of the device, the user needs specialized K-Cup pods to brew coffee.
  • Pages: 2
  • Words: 611

Single and Double Buffering Analysis

The concepts of single buffering and double buffering are essential to understanding how animation is being displayed. Hence, single buffering and double buffering are particularly useful in animation and address the issue of display and [...]
  • Pages: 1
  • Words: 283

Augmented Reality Application Analysis

The optical scanner of the device reads the image of a real object; the device software identifies and analyzes the resulting image, selects or calculates the visible complement corresponding to the image, combines the actual [...]
  • Pages: 10
  • Words: 2763

Aspects of Three Dimensional Displays

An ideal 3D array should act as a door to the world, allowing viewers to see the same 3D scene as if the collection were a clear window to a physical object.
  • Pages: 2
  • Words: 557

Intense Pulsed Light and Laser Devices

The use of light sources is common in the field of cosmetology, and the two most prominent technologies are intense pulsed light and laser devices.
  • Pages: 6
  • Words: 1716

Physical Security and Biometric Techniques

The sophistication of technology-enabled a greater level of identification of key personal physical traits unique to an individual, and the use of this enhanced recognition is biometrics.
  • Pages: 2
  • Words: 587

The Autopilot Systems: Examples of Devices

The Pixhawk 4 and MP21283X autopilots with different characteristics to redundancy are analyzed, as well as the NASA Swift UAV using off-the-shelf autopilot solutions.
  • Pages: 2
  • Words: 702

The Dipole and Dish Antenna Experiments

The transmitter and receiver's wavelength are in proportion to the antenna height. It indicates that the shorter the antenna, the greater the frequencies, and the larger the transmitter, the lesser the intensity.
  • Pages: 3
  • Words: 967

Smart Home and Control Security System

The two represent the technical characteristics of the sensors and units that are installed in this smart home system. In addition to "Methods," the article is also missing the "Discussion" section that should interpret what [...]
  • Pages: 2
  • Words: 584

Researching and Analysis of Smart Textiles

Smart textiles, also called electronic textiles or e-textiles, are fabrics with implemented electronic parts, including sensors and microcomputers, that may sense environmental stimuli and react to them. The second generation of smart textiles is active [...]
  • Pages: 2
  • Words: 562

Bitcoin: The Key Characteristics

In theory, this should increase the cybersecurity of the use of such money, and this presentation will detail the characteristics of Bitcoin as one of the most important cryptocurrencies of our time.
  • Pages: 6
  • Words: 1715

Technological Determinism and Society

This is due to the fact that if earlier the influence of technology was largely limited to the production of material goods, today this influence permeates the entire life of a person.
  • Pages: 3
  • Words: 761

Neural Image Compression in Satellite Industry

The current paper discusses the efficiency of various autoencoders and image compression frameworks in regard to satellite imagery. Another advantage of the framework, compared to traditional algorithms of image compression, is the high accuracy of [...]
  • Pages: 3
  • Words: 849

Machine Learning for Internet of Things Devices

Hussain et al.justify the use of ML for IoT by pointing out the vast amount of data that IoT gathers. Other recent papers, such as the one by Diedrichs et al, focus on the more [...]
  • Pages: 3
  • Words: 857

Technological Objects and Their Capabilities

The thermostat has digital data transmission to the user and is compatible with the small detail and the user's device. The allowable settings are Wi-Fi up to 5 GHz, the possibility of IP addressing, and [...]
  • Pages: 3
  • Words: 885

Ohio.gov Platform: Information and Services

On the site, a person can post a resume and indicate the preferred areas of work, which will be taken into account in the future and will help to contact the most suitable employers.Ohio.gov also [...]
  • Pages: 1
  • Words: 294

Internet of Things Security Issues

The creation of intelligent devices provoked further development in this area, which led to the emergence of the Internet of things.
  • Pages: 4
  • Words: 1003

Analysis of Technology in Milk Industry

With the use of the devices in the production, individuals have been able to lower the costs involved, like labor, and reduce the time consumption during packaging.
  • Pages: 8
  • Words: 2423

Information Technology Aspects and Issues

Two Uses of ICT at Home ICT has a variety of utilities, and it has proved relevant in the home environment. In the home environment, it is used for social media access. Currently, people can communicate and interact with others in the comfort of their homes. Another good use of social media is when it […]
  • Pages: 4
  • Words: 1131

The Misleading Graphical Display

In particular, this technique can be used to emphasize a certain point of view, which does not allow the viewer to assess the situation in context.
  • Pages: 1
  • Words: 278

Discussion of Internet of Things

Internet of Things implies connecting devices into a chain and allowing them to collect and analyze information. IoT systems operate in real-time and usually consist of some "smart" devices and cloud platforms.
  • Pages: 1
  • Words: 349

Reviewing Meaning and Benefits of Routers and Switches

In this paper offers a simple definitive view of routers and switches, their advantages, and the classifications of a switch. Overall, a router and a switch exhibits fundamental functional differences; while the former suits a [...]
  • Pages: 2
  • Words: 594

Component Levels of NPS

Access clients are devices that are secondary to the leading network, and they provide secure pathways through which the user gadgets get to communicate with the client-server.
  • Pages: 1
  • Words: 389

Smart Bed Technology in Healthcare

An example of such a technology is a smart bed, which is a type of bed with sensors that collect information on the occupant. Nurses could use smart beds to track a patient's response to [...]
  • Pages: 1
  • Words: 292

Computerized Animation as a Useful Study Tool

To examine the evolution of computerized animation as a useful study tool, the research will be answering the following questions: What is the role of writing in the process of animation?
  • Pages: 4
  • Words: 1144

Scheduling a Production Machine for General Maintenance

On the other hand, machine availability refers to the active time a machine is available for the production process. The program increases downtime and lessens the active machine availability as the production process is stopped [...]
  • Pages: 2
  • Words: 546

Simple and Useful Software Making

The dimension was that of tracking the parcels as they traveled from the postal office and to the customer. The majority of them formulated the scope of the project and the conditions in which we [...]
  • Pages: 2
  • Words: 562

Cashless Technology Trend in China

Once the money is removed from their pocket and placed in the hand of a burglar, it will be impossible to trace or establish that it belongs to a specific individual.
  • Pages: 5
  • Words: 1493

Expo 2020: Connecting Minds, Creating the Future

The London World Expo marked a watershed moment in the evolution of commodity derivatives to the abundance of new industrial technology and hence is considered the first World Exhibition in the contemporary sense.
  • Pages: 5
  • Words: 1429

Podcasts Recording and Audio Quality

It is important to note the quality of an audio product, such as a podcast, is highly important since it plays a major part in creating an enjoyable experience alongside the overall content of such [...]
  • Pages: 1
  • Words: 280

Analog and Digital Telecommunication Networks

Data conveyed from the sender to the recipient using analog signals is referred to as analog communication. Digitalization communication refers to the transmission of data between a producer and a recipient via digital signals.
  • Pages: 3
  • Words: 394

5G Telecommunications Networks

The sources are credible and relevant, and one can note that the 5G network is a sustainable and secure technology that guarantees a high level of protection against cyber threats and allows managing risks successfully.
  • Pages: 6
  • Words: 1984

Electric Coffee Maker: The Use of Pseudocode

Program Name: Coffee Maker Functions Code for Coffee Maker Functions: Apply PresetTime to begin brewing while the coffee maker is OFF IF want to set CoffeeMakerTime Press ON x 2 Apply input HH:MM Press ON [...]
  • Pages: 1
  • Words: 327

Information Sharing and Analysis Centers

It collects data from different sources and promotes sharing this information between the ISAC members. Only the members of ONG-ISAC receive the information classified as Red, Amber, and Green.
  • Pages: 1
  • Words: 397

Computerized Ordering System

In this report, the discussion will involve the considerations that prevail in the design and development of a computerized ordering system.
  • Pages: 5
  • Words: 1618

Drone Technology and Its Role in Logistics

Currently, the logistics industry is profitable and attractive to many companies globally due to the use of drone technology in improving service delivery to customers.
  • Pages: 8
  • Words: 2219

The Role of Technology in Human Capital Management

The two items mentioned can help relay visual information to people in a more accessible manner, enabling them to experience an image that is easier to comprehend and closer to reality than many other modes [...]
  • Pages: 1
  • Words: 275

The Vacuum Chamber Access System

Before embarking on the process of the necessities in the construction of the vacuum chamber it would be necessary to think of the kind of materials to be used in the endeavour.
  • Pages: 11
  • Words: 3028

Insert Skimmers: Use, Prevalence, and Protection

The principles governing skimmers are simple and worth discussing as a part of the protection preparation. It is essential to know the principles of skimmers functioning and methods of their detecting.
  • Pages: 1
  • Words: 374

Imaging Speed in Biomedical Engineering

A substitute for this in achieve the high speed requirement involves the use of a video rate laser scanner which would have an added advantage of being able to control the size of the aperture [...]
  • Pages: 10
  • Words: 2751

How Do Hybrid Cars Work

The branch supports hybrid cars because they help to protect the environment through the reduction of emissions to the atmosphere and use of less fuel.
  • Pages: 4
  • Words: 1135

Reproductive Technologies: Ways of Regulation

For instance, through the use of in-vitro fertilisation IVF, assistance has now been given to those who have problems in conception; also the use of PDGs prevents conception of severely abnormal children.
  • Pages: 5
  • Words: 1572

Discussion of Metallography History

The mechanical properties of a material are heavily dependent on the microstructure of the material. Using these two methods, it becomes possible to determine the quality and properties of the material.
  • Pages: 1
  • Words: 295

Pros and Cons of Using CSS-Preprocessors

In addition, these preprocessors bring the basic features of a high-level programming language to CSS, such as the use of variables, loops, math operations, if-else constructs, and more advanced functionality, for example, for working with [...]
  • Pages: 2
  • Words: 618

Evolution of Autonomous Driving Technology

The torpedo could travel hundreds of meters while maintaining underwater depth due to its pressurization system known as 'The Secret.' The Secret was a combination of hydrostatic and pendulum that gave the hydroplane stability to [...]
  • Pages: 5
  • Words: 1357

Cutting-Edge Technologies: Blockchain and AI

The users can sign in their accounts and transact to another user and the blockchain records the transaction which is viewed by other users. It is difficult to collect taxes and trace malicious activities in [...]
  • Pages: 5
  • Words: 1397

Toyota Land Cruiser GXR: Model Description

The region and the use of the car will guide the owner on the required level of protection. The ballistic level of protection depends on the owner of the vehicle's requirements.
  • Pages: 4
  • Words: 1118

Remote Sensing Monitoring the Ground Water Quality

The overall view of the water quality index of the present study area revealed that most of the study area with > 50 standard rating of water quality index exhibited poor, very poor and unfit [...]
  • Pages: 20
  • Words: 7005

Novel Framework to Assist the Novice

The failure mode for SS-FMEA is thus represented as a violation of logical relations in the combination of elements that are specific for each system.
  • Pages: 12
  • Words: 3472

Firefighting Methods, Technology Availability in Qatar

The construction of tall buildings in Qatar is necessary because of the desire for contractors to maximize space use and exploit economies of scale in construction. Firefighting efforts in high-rise buildings are also a dangerous [...]
  • Pages: 36
  • Words: 8540

Acoustic and Electric Recordings

At the moment, it develops even faster; however, one of the crucial factor for this development was the transition from the acoustic to the electric recording.
  • Pages: 2
  • Words: 567

Analysis of Packet Sniffing Aspects

By definition, packet sniffing is the process of gathering data packets passing through a particular network for analysis, regardless of how the packets are addressed.
  • Pages: 3
  • Words: 888

Tabletop Centrifuge Manual

The next step involves the placement of the vials, which need to be placed at the opposites side around the rotor.
  • Pages: 2
  • Words: 561

ARC-IT Communications View Description

Architecture Reference for Cooperative & Intelligent Transportation terms the protocol stacks as solutions and consists of a collection of standards to regulate the communication process.
  • Pages: 2
  • Words: 570

Implementation of the Boston’s Smart City Concept

Unfortunately, most attempts to adopt smart technology to the city's public services end in the stage of an idea; however, Boston has solemnly decided that making their town innovative and friendly to robotics is the [...]
  • Pages: 2
  • Words: 608

Fall-Preventing Technology: Bed Alarms

This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
  • Pages: 7
  • Words: 1175

POD Placement Factors

The size of the population is what might affect the ability of the local emergency agencies to respond to an incident.
  • Pages: 1
  • Words: 313

George Winslow: Preparing for Next-Gen HD

This is mostly the norm for recording of TV programs but the author argues that Blu-Ray offers a higher resolution of 1080p which improves the quality of the media.
  • Pages: 3
  • Words: 547

Solar Powered Universal Charger

However, based on a thorough evaluation of a number of other options not listed here and the idea of a solar powered charger, the group settled on the design and development of a solar powered [...]
  • Pages: 5
  • Words: 1385

Security Components in Sporting Goods Stores

Components of security within an organization are comprised of a list of practices that can help an organization have better management of security and reduce the associated losses. The first and most important component of [...]
  • Pages: 5
  • Words: 1351

Interoperability of Web Services

Interoperability is the felicity of a software interface working with diverse and varied software systems swiftly and at ease for providing special finesse and rhythm to web services' network and its operations.
  • Pages: 10
  • Words: 2410

Technology Acceptance Model

Hence, it is vital to understand the concepts of PEOU and PU that play the most significant roles in the analyzed model and determine its essence. TAM represents a research approach to contemplate on the [...]
  • Pages: 6
  • Words: 1477

Disinfecting Robots: Care Ethics, and Design

Thus, the utilization of this technology may be expected to reduce the incidence rate of HAIs. However, it is essential to consider the cost of this technology and reimbursement as they may be key factors [...]
  • Pages: 2
  • Words: 550

Development of Municipal Wi-Fi

Municipal Wi-Fi's are usually expensive to construct and maintain, and that is why a collaborative agreement between the private sector and the local government is necessary for the success of these services.
  • Pages: 4
  • Words: 1252

The Voice Recognition Software

It has been applied in many health facilities in communication, with the advancement and development of information and technology in many states especially in the developed and the developing states. With the use of computer [...]
  • Pages: 3
  • Words: 851

Fire Protection Review Plan

For the firefighting process to be effective, firefighting equipments should be given to the community members to use them in case of a fire outbreak.
  • Pages: 3
  • Words: 962

An Overview of Hall Effect Sensors

Edwin Hall, discovered that a magnetic field affected the flow of current in a gold rectangle that was placed perpendicular to the magnetic field. The other common application of hall-effect sensor technology is in gear-tooth [...]
  • Pages: 2
  • Words: 588