Tech & Engineering Essay Examples and Topics. Page 13

5,359 samples

Discussion: LED Lighting in Schools

In this sense, LED light will decrease the demand on the electricity system, which, in turn, will reduce the strain on the environmental resources required to generate power and saves money.
  • Subjects: Technology in Education
  • Pages: 2
  • Words: 670

Data Visualization with the Use of the R Language

One of the most functional programming languages is R which offers a variety of tools and modules for data visualization. Since R is an open-source program, it provides multipaneled figures and 3D graphics for data [...]
  • Subjects: Data
  • Pages: 2
  • Words: 564

FashTec Technology Company’s Design Thinking

In addition, the company makes special robots that can receive and execute instructions. Furthermore, the robots can be shared by different enterprise owners at a lower cost.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1065

Risks and Opportunities of “Platformization”

The growth of the sharing economy, which has been witnessed through the success of multinational companies, such as Airbnb and Uber, has also elevated the importance of "platformization" in the global economy.
  • Subjects: Programming
  • Pages: 9
  • Words: 2558

An Image Encryption Three-Steps Scheme

The first phase incorporates the use of the Rossler attractor for the Rossler system; the second stage includes the usage of a PRNG S-Box, while the third stage concerns the implementation of the Recaman's Sequence.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 2003

Cybersecurity Contingency & Incident Review Process

Next, it is necessary to implement various stages of digital transformation of cybersecurity, which include improving the maturity of enterprises in cybersecurity issues and the use of new solutions.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1416

Forensic Accounting and Cyber Security

The recent trend of increased exposure due to the access of extended financial and fraud concerns by social media and the internet has necessitated the need to curb the tendency.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1399

Computational Models or Protocols of E-Work

The product holon ensures the quality and correct fabrication of a product by holding the product and process knowledge and providing consistent and updated information to the other holons.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1432

Discussion: Reliability and Maintainability

The implications of the potential for failure in production can be minimized if all participants follow a specific plan and share their knowledge and experiences.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 313

Blockchain-Based Community Battery Storage System

The current moment provides a unique business opportunity to implement a community-level battery storage system based on blockchain technology that would provide sustainable electricity for the Egyptians and contribute to the development of new RES [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 607

Optimising Efficiency of Solar Plants in the Gulf

For this reason, the study delves into the peculiarities of the solar industry and the ways to increase effectiveness and optimise the work of plants in the Gulf Cooperation Council.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1502

Automation of Gas Lift Distribution Manifold

The purpose of this work is to analyze the working processes of the gas-lift distribution manifold in order to understand how these processes can be optimized.
  • Subjects: Engineering
  • Pages: 1
  • Words: 309

Information Security Awareness

One of the significant human factors that influence ISA is the individuals' perception of security. Hence, individuals' perceptions of information leakage and security awareness play a significant role in the success of ISA programs.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 958

3D Metrics in Online Education

The purpose of this article review is to evaluate the significance of the paper under consideration for the field of employing 3D technology in education.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1126

Data- and Knowledge-Driven Decision Support Systems

AI should be able to enhance its capability through the format of data-driven DSS, which opens a gateway to proceed with subsequent steps of CCT to deliver a high level of functionality and decision support.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 551

E-Systems and Autonomous Agents

Action agents, reasoning agents, and control agents are the levels of cooperation in a hierarchy from the lowest to the highest, respectively.
  • Subjects: Computer Science
  • Pages: 2
  • Words: 566

Automation of Gas Distribution Manifold

This made it easier to center the connections on the screw openings and complete the screwing activity on a revolving station with a set of manifolds; the end-design effectors and samples are discussed.
  • Subjects: Engineering
  • Pages: 2
  • Words: 602

K-12 Learning and Technology in a Post-COVID-19 Era

Key aspects of K-12 learning that will be explored in the proposed study include an understanding of specific technologies that would have the greatest impact on young learners as well as the main areas of [...]
  • Subjects: Technology in Education
  • Pages: 5
  • Words: 1197

Anomaly Detection Using Deep Learning Techniques

Therefore, the primary objective of the research is to propose a systematical performance analysis of deep learning-based approaches and their implementation in anomaly detection in unsupervised and semi-supervised settings.
  • Subjects: AI
  • Pages: 3
  • Words: 1585

The Query by Humming System Development

Hummed by the user, the melody is recorded, and these characteristics are extracted to be compared to the features of other songs.
  • Subjects: Applications
  • Pages: 3
  • Words: 841

Scaling and Success of DevOps for Military

HQDA Army G-4 is a special unit involved in the development and evaluation of logistics processes, programs, and policies for the national military sector.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 829

The Artificial Intelligence Use in Solar Panels

The use of solar PV panels as sources of renewable energy has been gaining traction in the recent decades. This implies that the output of energy in PV solar panels is often unstable.
  • Subjects: AI
  • Pages: 5
  • Words: 1430

Deep Learning Enhanced Wireless Sensing

The increasing number and diversity of wireless devices, as well as increased spectrum consumption, are some of the trends that have been noted. What kind of technology is used in the deep learning and wireless [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1414

Supporting Students for Scientific Research

Today, stakeholders can witness the massive importance of technology in the healthcare, transportation industry, production industry, and even recently in the sports industry with the introduction of 'VAR' as explained by Brunton.et al.[1] in their [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 900

Global Cybersecurity in the 21st Century

Research Question: Is there a significant connection between the US President's approach to cybersecurity and the actual presence of the given phenomenon?
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 333

The Use of Technology in American Schools

In the Introduction section of their study, Machado and Chung state that the use of technology in American schools is on the rise.
  • Subjects: Technology in Education
  • Pages: 3
  • Words: 873

The Air Force Airworthiness Assessment Process

The site is relevant because it helps to trace the history of the formation of airworthiness. The article is relevant to the task because it directly explains the value of certification and airworthiness acceptance processes.
  • Subjects: Aviation
  • Pages: 2
  • Words: 672

The Cybercrime Impact on People and Business

A cybercrime that occurred in 2013 involved a hacker attack on the computer gateway of a retail giant, which led to the leakage of customer data.
  • Subjects: Cyber Security
  • Pages: 1
  • Words: 389

Reducing Project Time and Its Key Advantages

Time-to-market is one of the crucial factors that can justify project crushing at the moment. For instance, there have been many cases when I had limited resources to conduct a comprehensive research, the only way [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 429

Airport Security: Technological Requirements

There are numerous methods and procedures for ensuring the safety of passengers and airport property when it comes to airport security. The cyber security model is used to determine the security level of an airport, [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1454

Ethics in Information Security

The deficiency of such touchy information may be shocking for one's clients, so people should have total confidence in the people used in safeguarding data.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 557

Architectural Heritage: Digital Preservation

The main aims of digital preservations are; to enable the supply of heritage through digital outlets to large audiences, to guarantee that initial measurements and forms of natural heritage are not lost in case of [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2306

Technology to Improve Gun Safety

Although the author's key argument regarding the safety of personalized weapons could be seen as debatable, the overall structure of the argument is quite compelling, particularly, due to the opportunity to the sue of statistical [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 847

Robotics and Related Social & Political Problems

The combination of engineering and computer science has aided people in developing the field of robotics. The social impact of robotics lies in the problems that robots are designed to solve.
  • Subjects: Robotics
  • Pages: 2
  • Words: 581

Combining Programming Languages C++ and Python

C++ and Python are not the only languages that can be combined in this way. By combining this functionality with Python's data-processing functionality, one can adjust the grocery-tracking program to work with a graphical interface, [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 281

Model-Driven Engineering of Adaptive User Interfaces

According to the authors, the technique is based on a graphical tool and conceptual framework that simplifies the work of designers when creating adaptive end-user interfaces, editing rules, modelizing context situations, and managing the whole [...]
  • Subjects: Applications
  • Pages: 2
  • Words: 607

Practical Connection Paper: Research Processes & Methodology

However, on further analysis, one will recognize the link between the capability of locating the existing academic resources on which a paper will be based in the future and the skill of an IT Project [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 832 832

Researching of Waterfall Model

The Agile SDLC paradigm is a blend of iterative and incremental modeling techniques that emphasizes process scalability and service quality through the fast turnaround of a functional software package.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 697

Strong Continuity of the Business

A project manager who can gather the required data from the team leaders, consolidate it, and see the project through to completion should be chosen.
  • Subjects: Cloud Computing
  • Pages: 2
  • Words: 665

The Invento Robotics Products Analysis

The 5 C's of brand management has grown in popularity since it thoroughly evaluates all the important aspects of a company and allows for approach adjustments depending on what is and is not effective.
  • Subjects: Robotics
  • Pages: 6
  • Words: 1665

“Health Expenditure and Suicide Rates” Dataset Study

In conclusion, the dataset regarding health expenditures and their correlation to suicide rates provides an apparent link between these two arguments, although it cannot be viewed as a complete tool for policymaking purposes.
  • Subjects: Data
  • Pages: 1
  • Words: 292

Excel: Column and Combination Charts

A column chart is the most fitting graph for the first worksheet - total profits per region. Hence, I would choose a column chart because it is simple and transparently shows the difference between the [...]
  • Subjects: Computer Science
  • Pages: 1
  • Words: 326

IT Project Management: Good Planning

However, things rarely go according to plan; the manager must be capable of rapid change and adaptation as the job progresses.
  • Subjects: Project Management
  • Pages: 1
  • Words: 282

Ethical Issues in the Artificial Intelligence Field

This study will analyze ethical bias and accountability issues arising from freedom of expression, copyright, and right to privacy and use the ethical frameworks of utilitarianism and deontology to propose a policy for addressing the [...]
  • Subjects: AI
  • Pages: 5
  • Words: 1458

The Digital Transformation and Innovation Nexus

The practical orientation of the study ensures its applicability in the current economic environment characterized by the increasing complexity of the organizational landscape.
  • Subjects: Technology Effect
  • Pages: 8
  • Words: 2128

Government Funding of Airports

Therefore, this paper discusses the federal and local funding of airports and the AIP and its applications in the aviation sector.
  • Subjects: Aviation
  • Pages: 4
  • Words: 1203

Incorporating Technology in Science Curriculum

The combination of technology innovation in training essentially alludes to the utilization of innovation to upgrade the understudy learning experience. The usefulness of EdTech can be evident in modern classroom where teaching and learning are [...]
  • Subjects: Technology in Education
  • Pages: 10
  • Words: 1706

The Technology Use in Communication Processes

It is important to note that the case titled "The Challenge of Organizational Communication" address the topic of the ever-increasing use of technology and the internet in the communication processes.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 601

Alexandrite Tunable Laser BeAl204:Cr3+

The main advantage of using tunable lasers is the possibility of adjusting the wavelength of the output laser light in a controlled manner.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 1000

“A Big Data Exploration…” Article by Meek et al.

The findings showed that the norm elements of high source credibility and medium recommendation scores, as well as the informational component of favorable recommendations framing, both impact the development of a reviewee "Like".
  • Subjects: Data
  • Pages: 1
  • Words: 313

Project Management Methodology Review: Scrum

According to Verzuh & Frederick, Scrum practices are common in the game development industry since they build team spirit and allow the developers to adopt new requirements from a product backlog.
  • Subjects: Project Management
  • Pages: 1
  • Words: 308

Keurig K-Select Coffee Maker Description

The selected object for the technical overview is the Keurig K-Select Coffee Maker - a single-serve K-cup coffee brewer. Concerning the primary functionality of the device, the user needs specialized K-Cup pods to brew coffee.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 611

Technology Acceptance Model and Technology Readiness

Perceived usefulness is a value that reflects the degree of confidence of the user that the technology used will increase their productivity. Thus, the technology of readiness determines the level of readiness of customers to [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 656

Information Technology and Pedagogy in Nigeria

Both public and private universities across the world have embraced the ICTs and are keen to utilize the potential of this technology to improve both the quality and efficiency of education. What are the environmental [...]
  • Subjects: Technology in Education
  • Pages: 6
  • Words: 1768

Ways in Which NFTs Can Benefit Companies

Therefore, NFTs hold the promise to facilitate the collectibles phase and change the game in client loyalty. Companies can monitor trends and the market daily to maximize NFT investment.
  • Subjects: Technology Effect
  • Pages: 1
  • Words: 275

Hacking Prevention: Mobile Phone Anti-Virus

However, the less discussed and addressed subject is the cybersecurity of mobile phones, which are among the most used and vital devices for the majority of the population.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 589

Single and Double Buffering Analysis

The concepts of single buffering and double buffering are essential to understanding how animation is being displayed. Hence, single buffering and double buffering are particularly useful in animation and address the issue of display and [...]
  • Subjects: Other Technology
  • Pages: 1
  • Words: 283

The 2018 Atlanta Government Ransomware Attack Analysis

The legal case showed the poor enforcement of the cybersecurity laws by the municipal government bodies and the resulting unpreparedness of the city governance units to cyber threats.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 928

Blockchain and Internet-of-Things in Agriculture

The intensification of the deep penetration of information technology in all areas of life has naturally led to the development of strategies to use it everywhere to optimize processes.
  • Subjects: Technology Effect
  • Pages: 9
  • Words: 2472

The Sierpinski Gasket and Recursion

The fractal antennae harness the aspects of self-similarity and space-filling to facilitate the reception of multiband waves in most devices. One of the companies that have prowess in the construction of fractal antennae is Motorola [...]
  • Subjects: Programming
  • Pages: 2
  • Words: 621

Information as Instrument of Power

Recent advances in the development of technologies and the tendency towards the digitalization of the modern world increased the value of information and the role it plays in the international discourse and security systems nowadays.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1136

TechnologyOne: Offering SAAS Around the World

When it comes to giving a piece of advice to a potential client regarding a support plan, I would recommend basing the decision on the consistency of need for the service.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 284

Entrepreneur Employing Mobile Enterprise Apps

The accounting functionality that is needed for a small business that was not discussed in the case is balance sheet automation to track assets and liabilities.
  • Subjects: Applications
  • Pages: 1
  • Words: 463

The NASCAR Video Game Project Management Plan

The plan attempts to draw the features and gameplay mechanics by replicating the thought process of a potential player. At this stage, the game should be well-advertised and ready for release.
  • Subjects: Project Management
  • Pages: 1
  • Words: 403

Knowledge-Sharing Tools and Their Advantages

Internet technologies contribute to the dissemination and storage of a large amount of diverse information, which determines the criticality of studying and managing them. Therefore, the nature of this work is to manage the information [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 569

Will Advancement in Technology Positively Impact the Future

Scientists are still advancing their discoveries on making the exoskeleton be linked to the coordination of the mind. In the 21st century and beyond, blockchain technology will continue to be one of the most astounding [...]
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1363

How Visual Analytics Influences Decision-Making

Next, in order to collect data on the influence of visual analytics on the human decision-making process, the research method will include an observation of the survey.
  • Subjects: Data
  • Pages: 1
  • Words: 335

Aspects of Self-Emission Light Sources

These variables are the degrees between the direction of light and the x, y, and z axes. Lastly, the intensity of the light emitted is the variable.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 286

Augmented Reality Application Analysis

The optical scanner of the device reads the image of a real object; the device software identifies and analyzes the resulting image, selects or calculates the visible complement corresponding to the image, combines the actual [...]
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2763

The Airworthiness of Aircraft Analysis

The maximum coefficient of braking friction of the landing gear to the ground for the runway must be corrected for the effectiveness of the anti-skid system on the runway.
  • Subjects: Aviation
  • Pages: 3
  • Words: 867

Project Management Meeting User Expectations

This is one factor that shapes and organizes the future project because it directly impacts the adoption of the project. Consumers somehow know the details of the project and have a vision of how it [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 613

Adobe Acrobat Reader and Microsoft Word

In conclusion, both Adobe Acrobat Reader and Microsoft Word have minor menu design issues, but they are more apparent for the former.
  • Subjects: Computer Science
  • Pages: 1
  • Words: 284

Aspects of Three Dimensional Displays

An ideal 3D array should act as a door to the world, allowing viewers to see the same 3D scene as if the collection were a clear window to a physical object.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 557

Cyberattacks from Nation-States and Cybercriminals

The cyberattacks relate to infrastructure, military security, and businesses, and the nation-states and cybercriminals use them to distort critical messages for decision-making in these institutions.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1278

Control Station Design and Supporting Systems’ Risks

The systems controlling flights had powered down, forcing the pilots to use a downloaded system based on the flight status, and the pilots had to recycle power on both the PPOs. The pilots and crew [...]
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 861

The Gaming Room Client and Its Software Requirements

To do this, I created the appropriate UML diagrams describing the MVC structure of the database and server and the main interaction processes between the user and the software.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 332

MTC IT Project Management: The Triple Constraints

However, in agile, the emphasis is on general requirements; detailed and carefully elaborated requirements are not relevant at the initial stages of the project. There are no strict requirements for terms and resources, but there [...]
  • Subjects: Project Management
  • Pages: 1
  • Words: 318

Online Learning Perception and Effectiveness

While the solution allowed students to access information and continue their studies, there was apprehension in regard to the efficacy of online learning and the outcomes such shifts have on students' academic performances.
  • Subjects: Technology in Education
  • Pages: 4
  • Words: 1171

The Internet of Things (IoT) Security

The security of iOS devices is ensured primarily by maintaining the integrity of the code, verifying the authenticity of users and devices, and assigning ownership rights to users.
  • Subjects: Computer Security
  • Pages: 1
  • Words: 307

“Client-Server Model…” by Esfarjani and Nof

The innovative feature of the model implemented in the article is the combination of presentation programs and application programs and their execution on a client computer.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1173

Instrumentation and Experimental Procedures of Libs

The major elements of a typical LIBS configuration are a laser, a focusing lens, a detecting device to determine the spectral resolution of the light gathered, and a computer for signal analysis and information storage.
  • Subjects: Engineering
  • Pages: 2
  • Words: 657

Information System: Software Integration

The IBM PC has become the first personal computer accepted by the entire business community. As a result of the director's meticulous attention to detail, the user experience is pleasant and precise.
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 543

Optimizing Factory Efficiency via Artificial Intelligence

They allow enterprises to control the entire production cycle, and the close integration of production and computing systems ensures the flexibility of technological processes and the ability to change the types of products.
  • Subjects: AI
  • Pages: 8
  • Words: 1985

Waterfall Programming Methodology

The main principles of the Waterfall model are the importance of observing the stages of work and precise documentation. Due to the requirement of the complete order in the documentation, work on the project can [...]
  • Subjects: Programming
  • Pages: 1
  • Words: 376

Poor Access to the Internet in the United States

The plan for the project is to provide a list of areas currently in need of 3G/4G Internet and the general requirements for equipment necessary to succeed in connection.
  • Subjects: Internet
  • Pages: 1
  • Words: 368

Importance of Data Modelling in Programming

The second step is to understand the importance of details the more important they are, the more reasons to use the logical data model there are.
  • Subjects: Programming
  • Pages: 1
  • Words: 318

Encryption Techniques for Protecting Big Data

The public key is often used for encryption, and the private key is famous for the decryption process, and this type of information can be accessed only with the use of a specific password.
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 833
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.