Tech & Engineering Essay Examples and Topics. Page 19

4,315 samples

Technological Innovations: Importance in Manufacturing

Innovation is the principled exploitation of ideas related to knowledge of those entering the industry as well as those moving out of the industry for the purpose of hastening modernization within the company and expansion [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1000

The Flashlight Technology Description

The plastic casing of the husky flashlight consists of a 5 inch cylindrical plastic container with a very thin spring or a strip piece of metal that is used to make the electrical connections between [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 649

Security Components in Sporting Goods Stores

Components of security within an organization are comprised of a list of practices that can help an organization have better management of security and reduce the associated losses. The first and most important component of [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1351

Mechanics of Materials, Stresses in Beams

It implies that the material near the top surface of the beam is in compression with the x-direction with the bottom surface in tension.
  • Subjects: Engineering
  • Pages: 15
  • Words: 3876

Digital Control Systems: Digital Signal Processing

The second use of the digital filters is the "signal restoration" which is needed when there is distortion of a signal due to any reason like poor equipment quality or mishandling of devices etc.in this [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1459

Operating Systems: Discussing Different Types

The failure-oblivious computing technique allows a server to concentrate on executing critical data and discard any errors detected in the program execution environment.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2040

DC Stepper Motors: Power Element for Control

The term hybrid is derived from the fact that the motor is operated under the combined principles of the permanent magnet and variable-reluctance stepper motors.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1432

Interoperability of Web Services

Interoperability is the felicity of a software interface working with diverse and varied software systems swiftly and at ease for providing special finesse and rhythm to web services' network and its operations.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2410

The Various Types of Aviation Pioneers

This paper explores the various types of aviation pioneers and focuses on Sir Frank Whittle by detailing his invention coupled with how it contributed to the future of aviation. In this way, it is clear [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 837

Recommender Systems: Techniques and Uses

Consumers can have access to so many items on sale over the internet and recommender systems are there to help them make the right choice or pick according to their liking after they have inputted [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1332

Technology Acceptance Model

Hence, it is vital to understand the concepts of PEOU and PU that play the most significant roles in the analyzed model and determine its essence. TAM represents a research approach to contemplate on the [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1477

Disinfecting Robots: Care Ethics, and Design

Thus, the utilization of this technology may be expected to reduce the incidence rate of HAIs. However, it is essential to consider the cost of this technology and reimbursement as they may be key factors [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 550

Workforce Learning and Development in the Digital Era

One of the most important tasks facing the UAE in the field of developing the potential of the workforce to work in the public sphere is the restructuring of the training and development of specialists, [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1229

Multi-Hazard Risks in New York City

During the last decade, the need for evidence-based strategies that could be used to respond to various emergencies has increased as a result of an increase in the rate of disasters.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 585

Advancement of Communication Through Technology

From this it can be seen that advances in communication are intertwined with advances in technology and as such this paper will explore the various new forms of communication that have occurred as a direct [...]
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 804

Influence of YouTube and Facebook on Business

Two of the most influential and promising technologies in this age are the YouTube and Facebook, a social website. The impact of social media on business is remarkable and companies use YouTube to market their [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2171

Software Engineering Online Learning Center

However, it is not easy to tell what the website is promoting just by the look of the homepage and thus, visitors with less time might not be interested to click to the sub-sections and [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

Physical Security Control and Web Hosting

This paper will discuss the physical security controls that most web hosting and business continuity providers offer to their customers as well as provide examples of such providers along with their products to potential customers.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 920

Computer Museum: Personal Experience

While in the Revolution, I got a chance to see a working replica of the Atanasoff-Berry Computer, which was the first real model of a working computer.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1211

Problems and Opportunities Created by Having Too Much Data

An increase in the size of data generated directly increases the amount of data handled and required in different departments of the institution, company, organization or business for marketing, planning and budgeting, decision making, report [...]
  • Subjects: Data
  • Pages: 3
  • Words: 901

Design for Manufacturability Principles

According to Anderson, design for manufacturability constitutes a process of proactive design of products that guarantee the best cost of manufacturing and customer satisfaction among others.
  • Subjects: Engineering
  • Pages: 3
  • Words: 905

Industrial Engineering Jobs: Job Descriptions and Main Tasks

Industrial Engineering is a branch of engineering concerned with the production or manufacturing processes and their improvement. The Industrial Engineer could have various job titles including: Safety, health and environment specialist Logistics planner Manufacturing Engineer [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1618

Geotechnical Engineering: The Finite Element Software

The use of FEA in geotechnical engineering requires an engineer to have a wide range of skills including a proper background of soil mechanics and finite element theory, a thorough comprehension of various constitutive soil [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2194

Recovering from Computer System Crashes

In the event of a crash, the first step is to identify the type of crash and then determine the best way to recover from the crash.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1442

RSA: Public/Private Key Encryption

This paper will explore the definition, structure, and the use of Rivest, Shamir, and Adleman's public key cryptographic algorithm. This method entails the use of a public key for encryption purposes.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1459

IDS Deployment: Purpose and the Degree of Risk

Among the reasons behind the use of an Intrusion Detection System in the company are in relation to access control. In addition to that it would be wise for the administrator to develop and enforce [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 900

Microcontroller Comparison Report

The microcontroller is therefore a very crucial device that largely determines the fulfillment of the objective of the system, provided the right algorithms are set in the programming stage.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 1888

Pre-Construction Design Specifications: Water Piping Sub-System

The criteria of complexity and implementation are related to the flexible PDS criteria of the system being powering set-up, repeatability of measurement, reduced temperature setup time, and progressive heating/cooling supply temperature.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1395

Manufacturing Concepts: Product Design Specification

Decrease the percentage of spoilage The key purpose of the accelerator is to control the position of the lathe cutter and chuck and define the proper cutting angle, considering the optical tilt angle.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1401

Major Issues Concerning Violence in the USA

In the first place, it is important to focus on the positive features of the website. It is also necessary to note that the website is safe in terms of the information and links presented.
  • Subjects: Internet
  • Pages: 3
  • Words: 902

The Voice Recognition Software

It has been applied in many health facilities in communication, with the advancement and development of information and technology in many states especially in the developed and the developing states. With the use of computer [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 851

Fire Protection Review Plan

For the firefighting process to be effective, firefighting equipments should be given to the community members to use them in case of a fire outbreak.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 962

An Overview of Hall Effect Sensors

Edwin Hall, discovered that a magnetic field affected the flow of current in a gold rectangle that was placed perpendicular to the magnetic field. The other common application of hall-effect sensor technology is in gear-tooth [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 588

Method of Construction of Hydro Schemes

In the first section, the construction techniques used in the construction of the dams and their hydropower stations are given in detail.
  • 4
  • Subjects: Engineering
  • Pages: 18
  • Words: 4900

Communication Protocol Engineering

The architecture is important in the merging of the different parts of the protocol. So as to handle this complicated task, the protocol systems are divided into subsets of the system which are commonly known [...]
  • Subjects: Engineering
  • Pages: 8
  • Words: 2362

VisualDX: Human-Computer Interaction

VisualDX is structured such that the user is guided through the steps of using the software system without having to be a software specialist.
  • Subjects: Engineering
  • Pages: 2
  • Words: 553

Description and Countering to Phishing

This paper investigates the various technical procedures used in the execution of the phishing scams; highlight the trends of these technical capabilities and the strategies that can be deployed to help in the prevention of [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2327

Radio Over Fibre or Fibre Wireless Systems

With the increasing rate of urbanization and general modernization, more and more people are finding themselves in need of the Internet, which translates to rampant demand for the Internet distribution systems.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2473

Process Description of a Rescue Robot

Roboticists in the physical design of rescue robots ensure that the robots can traverse places that are physically unreachable to human rescuers and additionally equip them with a variety of distributed technology that enable them [...]
  • Subjects: Robotics
  • Pages: 3
  • Words: 967

Fiber Optics Usage in Medicine

An optical fiber can be explained as a flexible length of transparent pure glass with width not larger than human hair, which has the ability to transmit messages in modulated light waves through application of [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1228

Systems Analysis and Design: Smartcards

Lowering cost, creating administrative efficiency, improving patients' outcomes, fostering the relationship between patients and physicians, the desire to meet the ever increasing demand for privacy, security, as well as identity issues, propel the need to [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 297

Commercial Airport Security Plan for the US

The intent of this security plan is to help the airport commission, tenants, and local law enforcement enhance security of the airport grounds, facilities, buildings and procedures.
  • Subjects: Aviation
  • Pages: 15
  • Words: 3914

Global Positioning System Technology and Security

The report revolves around the activities involved in movement of cargo from the place of origin to the destination with much emphasis being given to application of Global Positioning System technology and its importance in [...]
  • Subjects: Other Technology
  • Pages: 14
  • Words: 3819

Electrical Engineering Building Uses Wind Energy

The purpose of this fact-finding mission was to determine an appropriate type and rating of the wind turbine based on three factors: the average wind data at UNSW; the peak power demand for the EE [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1132

Cybercrime and Its Impact in the GCC Region

The introduction of the information and communication technologies nowadays offers a great range of advantages for the society, especially for the financial sector.
  • Subjects: Cyber Security
  • Pages: 20
  • Words: 5268

Ethical Hacking: Is It a Thing?

Computer programmers implemented the term 'hacker' at the beginning of the 1960s in the framework of a positive definition for an individual of dexterous software development skill.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 579

An Overview on Application of Data Normalization

Another aspect that needs to be considered is that the level of performance may be affected, and it is paramount to determine if the trade-off is reasonable in a particular situation.
  • Subjects: Data
  • Pages: 3
  • Words: 868

The Internet of Things in the Clinical Segment

On the other hand, the reduction in the cost of internet access and the increase in available bandwidth has made the mass adoption of the tiny-networked computers that make up the IoT possible.
  • Subjects: Internet
  • Pages: 8
  • Words: 2228

Wi-Fi and LAN Technologies: Data Communication Lab

The units were TCP/IP LAN technology, advanced LAN technology, rack server module, wireless LAN technology, copper tool kit, protocol analyser, and network analyser. The notes indicated how the units were configured in real LAN networks.
  • Subjects: Data
  • Pages: 4
  • Words: 1113

Technology Upgrade: The “A” Energy Company

The following is an examination of the "A" Energy Company and delves into a SWOT assessment of the current system and the potential alternatives that can be implemented to replace it.
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 4204

Learning Outcomes: Digital Basics

The basic principle in digital basics is that electronic/computer engineers and technicians can be able to use the same design used in a light switch to create an electronic switch with the capacity to produce [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 553

Database and Data Warehousing for Smart Buy

The motivation for this proposal is that a data warehouse will enable Smart Buy to optimally exploit the potential of business intelligence in boosting its sales and on cutting down unnecessary expenditure.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 1686

Family Plan For Specific Hazards and Risks

In my community, there is also the risk of xenophobic attacks. The gas has a distinct smell and can be recognized by people in my community.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 812

Google Incorporated: General Information

Under the history section, the article states that the company was created in 1996 through the entrepreneurial attempts of Larry Page and Sergey Brin as a way to improve on the search engines that existed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 558

Compound Bows: Term Definition

Archery: this is the art shooting arrows using a compound bow Cam: this is the pulley of a compound bow The intention of this document is to offer archers with relevant information about compound [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1114

Platform as a Service Solution

Components of the PaaS solutions are service platforms. PaaS solutions are used to develop web applications on the Internet.
  • Subjects: Data
  • Pages: 2
  • Words: 577

Biometrics in Cryptography. Desirable Properties

Because it is the first step, it is a critical step in the scheme because it is used to ensure that the attacker cannot gain access to the key once the system is compromised.
  • Subjects: Cyber Security
  • Pages: 13
  • Words: 3353

The Coop Program: Resolving Engineering Problems

This programme allows students to have a chance of practical application and work experience in the engineering field of study. The programme also benefits students as they learn to work with a team in a [...]
  • Subjects: Engineering
  • Pages: 8
  • Words: 2192

Electronics on Paper – Is It Better

However, height differences in paper vary up to some micrometers with respect to the fiber dimension and the manner in which the fibers intertwine.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1655

Programming Solution for the Library Reference System

The iterating part of the program code involves the data analysis part, as data matching part of the code will be repeated for several hundred times until the entire data base is scanned. The offered [...]
  • Subjects: Data
  • Pages: 2
  • Words: 539

Majoring in Computer Science: Key Aspects

Computer Science, abbreviated as CS, is the study of the fundamentals of information and computation procedures and of the hands-on methods for the execution and application in computer systems.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 854

Web Service Security: SAML and XACML

One reason for the development of this language can be traced to the need for a standard, generic and powerful access control and specification language.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 457

Comparison Between WiMax and LTE

The traditional mobile networks use the TDM and combination of the packet infrastructure that is partial, but with LTE and the WiMAX, they have simplified the network standards to the application of all- IP networks.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1957

Mobile Devices and Convenience

Mobile devices that fulfill such requirements provide the merit of functionality optimization, mobile network security with the consequence of the reduction in costs associated with downtimes while not negating the privilege of reduced general costs [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1618

Digital Information Technology

The nature of the configuration of the data path is also an important element in the design of data path and controller design.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2653

Southwest 737 Jet Forces Emergency Landing

The article gives all the actions that the company has been taken to establish the cause of the problem. This can add to the problem that is already in the company of delaying customers as [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 353

What Doesn’t Like Hardware Engineer

Among the things that may make a computer hardware engineer dislike his/her job is the fact that it is sometimes difficult to identify a problem in a computer system.
  • Subjects: Engineering
  • Pages: 2
  • Words: 566

Energy and Nanotechnologies: Australia’s Future

Given the concerns about the sustainability and the security of the energy supply, the fast pace of economic development, the connection between global warming and fossil fuels, the author seeks to investigate alternative energy efficient [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 599

Energy Trust: Technology and Innovation

Similarly, the Energy Trust demonstrates commercial and pre-commercial renewable energy technologies and builds market for renewable energy. Besides, renewable energy is cost effective than other sources of energy in the long run.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 593

Groupware and Ordinary Databases

The database design is necessary in groupware because it helps to identify the data elements, type of data, and the file options.
  • Subjects: Data
  • Pages: 3
  • Words: 963

Hydraulic Pumps: Review

There are several types and a majority of them are adjustable in order to regulate the amount of pressure delivered by the pump few are not; depending on whether the pumps are hydrostatic or hydrodynamic.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1095

Types of Crime in Cyberspace

While there are numerous advantages that accrue from progress of the ICT like improving the speed at which information, news and ideas are transferred from one part of the globe to another and efficiency in [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2220

Continuous Auditing Software Applications

There are several continuous auditing software applications available to increase the coverage of computer transactions audit some of which the company can effectively use.
  • Subjects: Applications
  • Pages: 3
  • Words: 880

Type I Certification at an Online Institution

To ensure that the new system is efficient in addressing the security requirements of the institution, I will use the waterfall model to undertake the system life cycle management analysis.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 765

Information Systems at WASS Film and Media

It is important for the business to asses the risks involved in new technologies and new ways of using information system for such will prepare managers and the owners of WASS Film and Media to [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 566

The Skydive Chicago Center’s Information System

The majority of the skydiving individuals congregate at the center with their skydiving gears including systems for taking images, capturing and storing videos showing the various movements performed by the experts, and the learning students [...]
  • Subjects: Applications
  • Pages: 3
  • Words: 931

How to Build a Desktop Personal Computer

The processor will determine the speed of the system but the choice between the two major types-Intel and AMD- remains a matter of taste.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1259

Doping Characteristics of Gallium Nitride (GaN)

The design of the device is done in a form that provides for diffusion in the emitter, is a quassi-neutral base with the doping densities in the emitter and the base.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 597

Data Mining and Machine Learning Algorithms

The shortest distance of string between two instances defines the distance of measure. However, this is also not very clear as to which transformations are summed, and thus it aims to a probability with the [...]
  • Subjects: AI
  • Pages: 6
  • Words: 1723

Policing Internet Fraud in Saudi Arabia

However, the criminals get the opportunity to use personal information in order to undermine the credibility and to destroy the image of the innocent person to be benefited economically or for other purpose.
  • Subjects: Cyber Security
  • Pages: 60
  • Words: 16625

Advanced Data & Computer Architecture

Solid knowledge and understanding of the information architecture, access, storage mechanisms and technologies, internet mechanisms, and systems administration contribute to the complete knowledge of the whole system architecture.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 2275

Aviation Safety: Controlled Flight Into Terrain (CFIT)

These errors range from drug and alcohol use by the pilots, homebuilt aircraft, use of student pilots, improper fuel management, on ground and in-flight judgment, unsterilized approach, inadequate flying skills, the inability of the flight [...]
  • Subjects: Aviation
  • Pages: 8
  • Words: 2209

Basic Network Technology SLP 1

The introductory and general tutorial comprises of Client-server, internet communication, the internet protocol model, the internet Resiliency, the OSI reference model and the Regional Internet registries.
  • Subjects: Internet
  • Pages: 2
  • Words: 555

Computer Hardware: Structure, Purpose, Pros and Cons

The main focus of the post is with respect to the security issues of web 2. 0 technologies is susceptible to is SQL injection attacks, which primarily entail the use of a code injection technique [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 961

Ethical Considerations in Information Technology

Some of these rules of ethics in security information include respect to matters of privacy and anonymity, taking responsibility, respect to intellectual property, and provision of diligent and professional services to principals and even acting [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 482

System Test and Evaluation Plan and Procedure

The concept of security assurance in the National Bank of America's security system revolves around the assurances of the company that the company's security system is completely secure.
  • Subjects: Computer Security
  • Pages: 5
  • Words: 1490

Cascading Style Sheet (CSS)

CSS removes the styling from the HTML to ensure that the HTML only handles the content while the CSS takes care of the styling of the web page.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 565

Background Chernobyl Nuclear Disaster

The aim of the research was to address engineering associated issues that could lead to a nuclear disaster, such as the Chernobyl nuclear disaster in Russia.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1587

HTML GUI vs. Text Editors

The demand for access to the Internet has only continued to rise and this is because the Internet has been able to bring the whole world together.
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1252

Computer Technology: Databases

Databases are components of Information Systems that are used when the Information Systems have large amounts of a, especially when the interfaces in the Information System are interactive, and when users can access the system [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 576

Threats to Information Security in Business Settings

In the course of the 1990s, there was the prevalence of DOS attacks and hackers. The spread of these Trojans is carried out by the viruses, and this can in turn bring about blended threats.
  • Subjects: Computer Security
  • Pages: 8
  • Words: 2214