Tech & Engineering Essay Examples and Topics. Page 19

4,409 samples

Artificial Intelligence in Drone Technology for Farming

Automated drones fitted with spraying features are used in the monitoring of agricultural processes and crops to schedule tasks and expeditiously address the observed issues throughout plant life.
  • Subjects: Robotics
  • Pages: 11
  • Words: 3010

Remote Sensing Monitoring the Ground Water Quality

The overall view of the water quality index of the present study area revealed that most of the study area with > 50 standard rating of water quality index exhibited poor, very poor and unfit [...]
  • Subjects: Other Technology
  • Pages: 25
  • Words: 7005

VMware Server Virtualization Solution

This layer is generally called Virtual Machine Monitor or Virtualization Layer and manages the control of VMs that are abstractions of the hardware resources on a single server.
  • Subjects: Computer Science
  • Pages: 45
  • Words: 13587

Firefighting Methods, Technology Availability in Qatar

The construction of tall buildings in Qatar is necessary because of the desire for contractors to maximize space use and exploit economies of scale in construction. Firefighting efforts in high-rise buildings are also a dangerous [...]
  • Subjects: Other Technology
  • Pages: 35
  • Words: 8540

Airports Security Systems’ and Passengers’ Satisfaction

All these were aimed at ensuring passenger safety and restoration of confidence in the United States aviation system, and the overall effect of the new regulations was to ensure passenger satisfaction in services provided by [...]
  • Subjects: Aviation
  • Pages: 19
  • Words: 4975

Network Security: Why Is It Important?

Network safety, regardless of the company size, is one of the most important things to remember when operating over the Web, local area network or other technologies.
  • Subjects: Computer Security
  • Pages: 2
  • Words: 656

Business Report: Demand for Electricity

For instance, contemporary concerns about global warming and the 'carbon footprint' of the UK power industry virtually dictate official attention to matters of fuel in use and the national volume of electricity consumption.
  • Subjects: Engineering
  • Pages: 35
  • Words: 3495

Cyber Theft: Security Measures for Organizations

Relative to this fact, Mukhopadhyay et al.say that the uptake of technology and the prominence of the Internet of Things, which is a network of objects that communicate with each other, has increasingly exposed companies [...]
  • Subjects: Cyber Security
  • Pages: 28
  • Words: 7690

The Importance of Database Design

It provides a rough overview of all the tables included in the system design, alongside their attributes that define the relationships that exist in the database.
  • Subjects: Data
  • Pages: 3
  • Words: 548

Acoustic and Electric Recordings

At the moment, it develops even faster; however, one of the crucial factor for this development was the transition from the acoustic to the electric recording.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 567

The Resilience of Austria to the Threat of Cyber-Attack

The study will focus on examining the resilience of Austria to the threat of cyber-attack. The significance of the study will help in contributing to the literature about cybercrime and ways to respond to the [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 489

The Boundaries of Integrating Machines Into Human Life

In the third stage, with the advent of the Internet, PC, and multiple interactive devices, the focus was shifted to the perception of the mechanism as an autopoietic system in a social setting.
  • Subjects: Robotics
  • Pages: 7
  • Words: 1954

Ethics of Information and Personal Data Protection

The right to privacy and confidentiality of correspondence is a constitutional right, and violation of this jeopardizes the law. Thus, access to confidential information should be provided to law enforcement agencies only in case of [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1043

Google Technologies That Are Currently Developing

One of the areas that Google invests in and promotes is self-driving automobiles. The company is working with the Renewable Energy Buyers Alliance to promote legislative changes that simplify corporate procurement of wind and solar [...]
  • Subjects: Computer Science
  • Pages: 9
  • Words: 2681

Relation Between Technology and Data Gathering

For instance, the tool can collect data on what a customer has chosen and predict what they may want to buy. No traditional data collection method can be that effective in the gathering of customer [...]
  • Subjects: Data
  • Pages: 1
  • Words: 322

Telecommuting: Benefits and Disadvantages

As the research states, telecommuting generally allows people to work from home, which reduces office space and, as a result, the expenses associated with the operating costs and the amount of energy use.
  • Subjects: Technology Effect
  • Pages: 3
  • Words: 976

Cloud Computing in Business

Cloud computing is an internet based service that allows clients to use external IT resources from cloud service providers.
  • Subjects: Cloud Computing
  • Pages: 13
  • Words: 880

Dangers of Logic and Artificial Intelligence

The following are the dangers of logic and artificial intelligence when applied in various areas. The last danger of logic and artificial intelligence relates to autonomous weapons.
  • Subjects: AI
  • Pages: 5
  • Words: 1239

Electronic News Gathering

The Characteristics involve the Utilization of electrical video to gather information, the Incorporation of Audio technologies in gathering news, and the Utilization of portable equipment in the newsgathering process.
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1366

Photoshop: The Story and the Impact

Photography and graphic design play an important role in the life of the modern society. Photography an Photoshop are the parts of a variety of fields and industries today.
  • Subjects: Applications
  • Pages: 7
  • Words: 895

Aviation Crisis Management Toolkit

The impacts on these organisations vary considerably depending on the type of crisis, the severity of the crisis and the way in which the organisation has planned for, and responded to the crisis.
  • Subjects: Aviation
  • Pages: 13
  • Words: 3593

Big Data and Artificial Intelligence

Of course, there are cons associated with deep fake technology; its core concept is to create a fake so good that it can be considered authentic.
  • Subjects: AI
  • Pages: 1
  • Words: 286

ARC-IT Communications View Description

Architecture Reference for Cooperative & Intelligent Transportation terms the protocol stacks as solutions and consists of a collection of standards to regulate the communication process.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 570

Internet Hacking and Cybersecurity Conundrum Analysis

Many people have gained access to computer systems, the Internet, and related products and services, leading to the emergence of cyber-related threats. Cybersecurity improvements are vital to the continuous developments in information technology, national security, [...]
  • Subjects: Cyber Security
  • Pages: 3
  • Words: 824

Internet Hacking and Cybersecurity Conundrum

Therefore, the increasing number of attacks during the pandemic could be handled with the help of machine learning and have the numerous human workers assigned to less crucial tasks that actually require human judgment.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1206

AI and Job Security Aspects

The biggest fear in the economy's digitalization is the loss of jobs, but this will only be in the short term and only if there is the uncontrolled use of artificial intelligence.
  • Subjects: AI
  • Pages: 4
  • Words: 1132

Nuclear Energy: High-Entropy Alloy

One of the tools for reducing the level of greenhouse gas emissions is the development of nuclear energy, which is characterized by a high degree of environmental efficiency and the absence of a significant impact [...]
  • Subjects: Engineering
  • Pages: 15
  • Words: 4165

Manifestation of Strategic Cultures in Cyber Conflict

The discourse in strategic culture can be traced back to over four decades ago where it incited a renewed thinking of both the origins of the concept of strategy and the strategic choices in politics.
  • Subjects: Cyber Security
  • Pages: 27
  • Words: 7451

The Latest Cyber Defense Methods

Conversely, if the application's ability to perform specific tasks is limited, the attacker's objectives may not be fulfilled, and the scope of the damage can be minimized. As a result, it is inadvisable to remain [...]
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1094

Cyber Vulnerabilities and Threats

It is the cyber defense specialist's task to remain aware of the latest threats and issues in security so that they can prepare for potential attacks and be ready to respond to them.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1104

Implementation of the Boston’s Smart City Concept

Unfortunately, most attempts to adopt smart technology to the city's public services end in the stage of an idea; however, Boston has solemnly decided that making their town innovative and friendly to robotics is the [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 608

Fall-Preventing Technology: Bed Alarms

This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
  • Subjects: Other Technology
  • Pages: 7
  • Words: 974

Information Age, Future, and Big Data

According to Blecker et al, the prevalence of heart failure has been on the rise despite the few reported cases of admissions and readmissions in hospitals.
  • Subjects: Data
  • Pages: 2
  • Words: 600

Analysis of The Veteran Affairs Data Breach

The majority of the data in the hard drive was linked to the veterans and their spouses. The 2006 incident was the second occurrence since 2004 that the VA was found in violation of the [...]
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 589

HindSight: Direct Encoding of Personal Interaction History

Finally, the two properties which are of the most relevance to the presented research: the extent to which history is directly tied to an object or recorded separately and whether history is tied to an [...]
  • Subjects: Applications
  • Pages: 4
  • Words: 1430

Business Information System

In order to ensure that no shortfall from the individual and collective ends of the personnel involved, the British Computer Society has developed a code of conduct as a criteria for membership that defines the [...]
  • Subjects: Applications
  • Pages: 7
  • Words: 1901

Proxy Fights: Definition, Factors and Implications

In a way, the phenomenon of a proxy fight can be viewed as the tool for reinforcing the strengths of the organization by creating a very strong and well-coordinated team of shareholders, who are willing [...]
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 664

Power Source for Rovers

When choosing suitable types of power sources for a rover, it is necessary to define environmental conditions where it is expected to operate.
  • Subjects: Engineering
  • Pages: 5
  • Words: 679

Aerospace Toxicology: Flourinert

The current knowledge about this fluid should become the foundation for completing additional experimentations and researches to discover additional health, toxicological, and safety benefits and expand its possible applications in different heat exchange systems.
  • Subjects: Engineering
  • Pages: 1
  • Words: 279

Security Plan For Visiting Head of State

The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 791

IoT Adoption and Cyber Awareness in Saudi Arabia

As the implementation of these cyber technologies penetrates the economic sector, there is a need to understand potential vulnerability for businesses to be attacked through the Internet and other networks.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 552

Acquiring Knowledge About Computers

One of the key features of A.I.U.'s learning platform is the use of the Gradebook. The best feature of the instant messaging tool is the fact that it is easy to install with no additional [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 1930

The Design Characteristics of an Airplane

Control defines the ability of an airplane to respond to the controlling actions of a pilot and the ability to produce the desired displacement of altitude in flight.
  • Subjects: Aviation
  • Pages: 2
  • Words: 540

Technological Innovations: Importance in Manufacturing

Innovation is the principled exploitation of ideas related to knowledge of those entering the industry as well as those moving out of the industry for the purpose of hastening modernization within the company and expansion [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1000

Security Components in Sporting Goods Stores

Components of security within an organization are comprised of a list of practices that can help an organization have better management of security and reduce the associated losses. The first and most important component of [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1351

Digital Control Systems: Digital Signal Processing

The second use of the digital filters is the "signal restoration" which is needed when there is distortion of a signal due to any reason like poor equipment quality or mishandling of devices etc.in this [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1459

Operating Systems: Discussing Different Types

The failure-oblivious computing technique allows a server to concentrate on executing critical data and discard any errors detected in the program execution environment.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2040

Usability Testing and Pact Analysis Report

The PACT analysis is conducted to find the utility of the tool in the optimum resource management at a call center. The usefulness of the Call Center Traffic Monitoring System is to be measured by [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3200

DC Stepper Motors: Power Element for Control

The term hybrid is derived from the fact that the motor is operated under the combined principles of the permanent magnet and variable-reluctance stepper motors.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1432

Interoperability of Web Services

Interoperability is the felicity of a software interface working with diverse and varied software systems swiftly and at ease for providing special finesse and rhythm to web services' network and its operations.
  • Subjects: Other Technology
  • Pages: 10
  • Words: 2410

The Various Types of Aviation Pioneers

This paper explores the various types of aviation pioneers and focuses on Sir Frank Whittle by detailing his invention coupled with how it contributed to the future of aviation. In this way, it is clear [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 837

Recommender Systems: Techniques and Uses

Consumers can have access to so many items on sale over the internet and recommender systems are there to help them make the right choice or pick according to their liking after they have inputted [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1332

Technology Acceptance Model

Hence, it is vital to understand the concepts of PEOU and PU that play the most significant roles in the analyzed model and determine its essence. TAM represents a research approach to contemplate on the [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1477

Disinfecting Robots: Care Ethics, and Design

Thus, the utilization of this technology may be expected to reduce the incidence rate of HAIs. However, it is essential to consider the cost of this technology and reimbursement as they may be key factors [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 550

Workforce Learning and Development in the Digital Era

One of the most important tasks facing the UAE in the field of developing the potential of the workforce to work in the public sphere is the restructuring of the training and development of specialists, [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1229

Multi-Hazard Risks in New York City

During the last decade, the need for evidence-based strategies that could be used to respond to various emergencies has increased as a result of an increase in the rate of disasters.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 585

Influence of YouTube and Facebook on Business

Two of the most influential and promising technologies in this age are the YouTube and Facebook, a social website. The impact of social media on business is remarkable and companies use YouTube to market their [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2171

Software Engineering Online Learning Center

However, it is not easy to tell what the website is promoting just by the look of the homepage and thus, visitors with less time might not be interested to click to the sub-sections and [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

Process Virtualization Theory Overview

Therefore, the author found it appropriate to address the theoretical underpinning of IT in virtualization processes to account for the gap in the field.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1420

Physical Security Control and Web Hosting

This paper will discuss the physical security controls that most web hosting and business continuity providers offer to their customers as well as provide examples of such providers along with their products to potential customers.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 920

Computer Museum: Personal Experience

While in the Revolution, I got a chance to see a working replica of the Atanasoff-Berry Computer, which was the first real model of a working computer.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1211

Problems and Opportunities Created by Having Too Much Data

An increase in the size of data generated directly increases the amount of data handled and required in different departments of the institution, company, organization or business for marketing, planning and budgeting, decision making, report [...]
  • Subjects: Data
  • Pages: 3
  • Words: 901

Design for Manufacturability Principles

According to Anderson, design for manufacturability constitutes a process of proactive design of products that guarantee the best cost of manufacturing and customer satisfaction among others.
  • Subjects: Engineering
  • Pages: 3
  • Words: 905

Industrial Engineering Jobs: Job Descriptions and Main Tasks

Industrial Engineering is a branch of engineering concerned with the production or manufacturing processes and their improvement. The Industrial Engineer could have various job titles including: Safety, health and environment specialist Logistics planner Manufacturing Engineer [...]
  • Subjects: Engineering
  • Pages: 6
  • Words: 1618

Recovering from Computer System Crashes

In the event of a crash, the first step is to identify the type of crash and then determine the best way to recover from the crash.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1442

RSA: Public/Private Key Encryption

This paper will explore the definition, structure, and the use of Rivest, Shamir, and Adleman's public key cryptographic algorithm. This method entails the use of a public key for encryption purposes.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1459

IDS Deployment: Purpose and the Degree of Risk

Among the reasons behind the use of an Intrusion Detection System in the company are in relation to access control. In addition to that it would be wise for the administrator to develop and enforce [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 900

Microcontroller Comparison Report

The microcontroller is therefore a very crucial device that largely determines the fulfillment of the objective of the system, provided the right algorithms are set in the programming stage.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 1888

Pre-Construction Design Specifications: Water Piping Sub-System

The criteria of complexity and implementation are related to the flexible PDS criteria of the system being powering set-up, repeatability of measurement, reduced temperature setup time, and progressive heating/cooling supply temperature.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1395

Manufacturing Concepts: Product Design Specification

Decrease the percentage of spoilage The key purpose of the accelerator is to control the position of the lathe cutter and chuck and define the proper cutting angle, considering the optical tilt angle.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1401

Major Issues Concerning Violence in the USA

In the first place, it is important to focus on the positive features of the website. It is also necessary to note that the website is safe in terms of the information and links presented.
  • Subjects: Internet
  • Pages: 3
  • Words: 902

The Voice Recognition Software

It has been applied in many health facilities in communication, with the advancement and development of information and technology in many states especially in the developed and the developing states. With the use of computer [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 851

Method of Construction of Hydro Schemes

In the first section, the construction techniques used in the construction of the dams and their hydropower stations are given in detail.
  • 4
  • Subjects: Engineering
  • Pages: 18
  • Words: 4900

Communication Protocol Engineering

The architecture is important in the merging of the different parts of the protocol. So as to handle this complicated task, the protocol systems are divided into subsets of the system which are commonly known [...]
  • Subjects: Engineering
  • Pages: 8
  • Words: 2362

VisualDX: Human-Computer Interaction

VisualDX is structured such that the user is guided through the steps of using the software system without having to be a software specialist.
  • Subjects: Engineering
  • Pages: 2
  • Words: 553

Description and Countering to Phishing

This paper investigates the various technical procedures used in the execution of the phishing scams; highlight the trends of these technical capabilities and the strategies that can be deployed to help in the prevention of [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2327

Use of Seatbelt While Driving

The concept behind the use of a seatbelt is to make the passenger a part of the car. Instead, the seatbelts help transfer the impact to the body of the car away from the passenger.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1038

Radio Over Fibre or Fibre Wireless Systems

With the increasing rate of urbanization and general modernization, more and more people are finding themselves in need of the Internet, which translates to rampant demand for the Internet distribution systems.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2473

Process Description of a Rescue Robot

Roboticists in the physical design of rescue robots ensure that the robots can traverse places that are physically unreachable to human rescuers and additionally equip them with a variety of distributed technology that enable them [...]
  • Subjects: Robotics
  • Pages: 3
  • Words: 967

Fiber Optics Usage in Medicine

An optical fiber can be explained as a flexible length of transparent pure glass with width not larger than human hair, which has the ability to transmit messages in modulated light waves through application of [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1228

Systems Analysis and Design: Smartcards

Lowering cost, creating administrative efficiency, improving patients' outcomes, fostering the relationship between patients and physicians, the desire to meet the ever increasing demand for privacy, security, as well as identity issues, propel the need to [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 297