Examples of cloud platforms are Open Stack and Own Cloud; each have different applications and limitations in the Cloud computing realm.
Automated drones fitted with spraying features are used in the monitoring of agricultural processes and crops to schedule tasks and expeditiously address the observed issues throughout plant life.
The overall view of the water quality index of the present study area revealed that most of the study area with > 50 standard rating of water quality index exhibited poor, very poor and unfit [...]
This layer is generally called Virtual Machine Monitor or Virtualization Layer and manages the control of VMs that are abstractions of the hardware resources on a single server.
The construction of tall buildings in Qatar is necessary because of the desire for contractors to maximize space use and exploit economies of scale in construction. Firefighting efforts in high-rise buildings are also a dangerous [...]
All these were aimed at ensuring passenger safety and restoration of confidence in the United States aviation system, and the overall effect of the new regulations was to ensure passenger satisfaction in services provided by [...]
Network safety, regardless of the company size, is one of the most important things to remember when operating over the Web, local area network or other technologies.
The importance that technologies have for new generations has long been discovered, and the consequences are still being discussed.
It can be used to set the degree of influence of independent variables on the dependent ones. Before proceeding to the analysis of data, it is vital to identify the variables.
The two selected cloud providers are Amazon Web Services and Microsoft Azure, which are in the top 5 largest providers in the United States.
Planning using the EOP is critical to minimize the impacts of an incident and ensure preparedness, coordination, and rapid response from all relevant agencies.
For instance, contemporary concerns about global warming and the 'carbon footprint' of the UK power industry virtually dictate official attention to matters of fuel in use and the national volume of electricity consumption.
Relative to this fact, Mukhopadhyay et al.say that the uptake of technology and the prominence of the Internet of Things, which is a network of objects that communicate with each other, has increasingly exposed companies [...]
Infusion of funds from the central bank during natural disasters results in higher process of exports as a direct result of an increase in the value of the local currency.
It provides a rough overview of all the tables included in the system design, alongside their attributes that define the relationships that exist in the database.
At the moment, it develops even faster; however, one of the crucial factor for this development was the transition from the acoustic to the electric recording.
The study will focus on examining the resilience of Austria to the threat of cyber-attack. The significance of the study will help in contributing to the literature about cybercrime and ways to respond to the [...]
Ambrosino and Harris successfully appeal to ethos, convincing their audience that they have researched the issues and are qualified to lead the public in discussing them.
In the third stage, with the advent of the Internet, PC, and multiple interactive devices, the focus was shifted to the perception of the mechanism as an autopoietic system in a social setting.
Various aspects can be analyzed concerning cyberterrorism, competing factors, and possible course of actions in corporations to show that cyberterrorism is a legitimate option for the expression of grievances by terrorists.
To begin with, in the modern world, it is crucial to come up with newer models of education and extend the existing approaches.
The right to privacy and confidentiality of correspondence is a constitutional right, and violation of this jeopardizes the law. Thus, access to confidential information should be provided to law enforcement agencies only in case of [...]
One of the areas that Google invests in and promotes is self-driving automobiles. The company is working with the Renewable Energy Buyers Alliance to promote legislative changes that simplify corporate procurement of wind and solar [...]
This study is aimed at identifying both positive and negative influences of computer technologies on the human resources who work in offices.
For instance, the tool can collect data on what a customer has chosen and predict what they may want to buy. No traditional data collection method can be that effective in the gathering of customer [...]
As the research states, telecommuting generally allows people to work from home, which reduces office space and, as a result, the expenses associated with the operating costs and the amount of energy use.
It is important to have a disaster preparedness program for your family. This will reduce the impact on your family’s lives and ensure faster recovery.
Cloud computing is an internet based service that allows clients to use external IT resources from cloud service providers.
The following are the dangers of logic and artificial intelligence when applied in various areas. The last danger of logic and artificial intelligence relates to autonomous weapons.
The Characteristics involve the Utilization of electrical video to gather information, the Incorporation of Audio technologies in gathering news, and the Utilization of portable equipment in the newsgathering process.
Photography and graphic design play an important role in the life of the modern society. Photography an Photoshop are the parts of a variety of fields and industries today.
The content will be piloted in one of the high schools, in order to use the teachers as trainers for a reaching more schools with the same methodology.
The impacts on these organisations vary considerably depending on the type of crisis, the severity of the crisis and the way in which the organisation has planned for, and responded to the crisis.
Of course, there are cons associated with deep fake technology; its core concept is to create a fake so good that it can be considered authentic.
Nevertheless, some of the technologies used by police and other agencies have raised concerns of the public over the threat to citizens' rights and freedoms.
The major function of community resources is informing the people living in New Orleans about upcoming storms and hurricanes.
Architecture Reference for Cooperative & Intelligent Transportation terms the protocol stacks as solutions and consists of a collection of standards to regulate the communication process.
Many people have gained access to computer systems, the Internet, and related products and services, leading to the emergence of cyber-related threats. Cybersecurity improvements are vital to the continuous developments in information technology, national security, [...]
Therefore, the increasing number of attacks during the pandemic could be handled with the help of machine learning and have the numerous human workers assigned to less crucial tasks that actually require human judgment.
Daily and globally, there are many aviation operations affected by weather including incidents and accidents Kenya has its own share of aviation accidents.
The criteria of selection for the literature will be the relevance to the research topic as well as the year of publication.
The biggest fear in the economy's digitalization is the loss of jobs, but this will only be in the short term and only if there is the uncontrolled use of artificial intelligence.
The innovativeness of the company ensured that it improved its performance and would survive any eventuality, from the 2008 financial crisis to the COVID-19 pandemic crisis. In conclusion, proper management of organizational change is critical [...]
One of the tools for reducing the level of greenhouse gas emissions is the development of nuclear energy, which is characterized by a high degree of environmental efficiency and the absence of a significant impact [...]
The discourse in strategic culture can be traced back to over four decades ago where it incited a renewed thinking of both the origins of the concept of strategy and the strategic choices in politics.
The gaming industry overpowers both the music and cinema industries and is considered one of the fastest-growing economic sectors globally video games are becoming a predominant human activity.
The topic of this research proposal is investigating the strategies used by organizations to combat identity theft by hackers and enhance cybersecurity in critical infrastructure.
Conversely, if the application's ability to perform specific tasks is limited, the attacker's objectives may not be fulfilled, and the scope of the damage can be minimized. As a result, it is inadvisable to remain [...]
It is the cyber defense specialist's task to remain aware of the latest threats and issues in security so that they can prepare for potential attacks and be ready to respond to them.
Unfortunately, most attempts to adopt smart technology to the city's public services end in the stage of an idea; however, Boston has solemnly decided that making their town innovative and friendly to robotics is the [...]
This presentation is dedicated to the use of technology for fall prevention. It provides administrators and nurses with an overview of bed alarms, their limitations and benefits.
According to Blecker et al, the prevalence of heart failure has been on the rise despite the few reported cases of admissions and readmissions in hospitals.
The majority of the data in the hard drive was linked to the veterans and their spouses. The 2006 incident was the second occurrence since 2004 that the VA was found in violation of the [...]
At that point, the association retrained a portion of the laborers as experts, software engineers, and support workforce for the robots.
The catastrophic consequences of the devastation in Central Texas and, in particular, in the city of Austin, were caused by flooding.
Finally, the two properties which are of the most relevance to the presented research: the extent to which history is directly tied to an object or recorded separately and whether history is tied to an [...]
In order to ensure that no shortfall from the individual and collective ends of the personnel involved, the British Computer Society has developed a code of conduct as a criteria for membership that defines the [...]
The reason foe switching off of the pumps was that the pump drew water from the sea and had long pipes with blowers to such in the seawater.
In a way, the phenomenon of a proxy fight can be viewed as the tool for reinforcing the strengths of the organization by creating a very strong and well-coordinated team of shareholders, who are willing [...]
In 2014, Marriott recorded losses amounting to around 600 million USD due to cyber attacks while those of Target were around 162 million USD in 2013.
Mobile learning is becoming an integral part of contemporary education. It is gaining popularity at the schools of Saudi Arabia as well.
When choosing suitable types of power sources for a rover, it is necessary to define environmental conditions where it is expected to operate.
The current knowledge about this fluid should become the foundation for completing additional experimentations and researches to discover additional health, toxicological, and safety benefits and expand its possible applications in different heat exchange systems.
The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
As the implementation of these cyber technologies penetrates the economic sector, there is a need to understand potential vulnerability for businesses to be attacked through the Internet and other networks.
One of the key features of A.I.U.'s learning platform is the use of the Gradebook. The best feature of the instant messaging tool is the fact that it is easy to install with no additional [...]
Control defines the ability of an airplane to respond to the controlling actions of a pilot and the ability to produce the desired displacement of altitude in flight.
Innovation is the principled exploitation of ideas related to knowledge of those entering the industry as well as those moving out of the industry for the purpose of hastening modernization within the company and expansion [...]
Components of security within an organization are comprised of a list of practices that can help an organization have better management of security and reduce the associated losses. The first and most important component of [...]
Input/ Output of data refers to the type of interface used to enter data and extract data. They are read/ write and can be made integral with the computer or used externally.
The second use of the digital filters is the "signal restoration" which is needed when there is distortion of a signal due to any reason like poor equipment quality or mishandling of devices etc.in this [...]
The failure-oblivious computing technique allows a server to concentrate on executing critical data and discard any errors detected in the program execution environment.
The PACT analysis is conducted to find the utility of the tool in the optimum resource management at a call center. The usefulness of the Call Center Traffic Monitoring System is to be measured by [...]
The term hybrid is derived from the fact that the motor is operated under the combined principles of the permanent magnet and variable-reluctance stepper motors.
Interoperability is the felicity of a software interface working with diverse and varied software systems swiftly and at ease for providing special finesse and rhythm to web services' network and its operations.
This paper explores the various types of aviation pioneers and focuses on Sir Frank Whittle by detailing his invention coupled with how it contributed to the future of aviation. In this way, it is clear [...]
Consumers can have access to so many items on sale over the internet and recommender systems are there to help them make the right choice or pick according to their liking after they have inputted [...]
Hence, it is vital to understand the concepts of PEOU and PU that play the most significant roles in the analyzed model and determine its essence. TAM represents a research approach to contemplate on the [...]
Thus, the utilization of this technology may be expected to reduce the incidence rate of HAIs. However, it is essential to consider the cost of this technology and reimbursement as they may be key factors [...]
One of the most important tasks facing the UAE in the field of developing the potential of the workforce to work in the public sphere is the restructuring of the training and development of specialists, [...]
The difference of ROILA from other languages for computing is that it should be simple for both machines and humans to understand.
During the last decade, the need for evidence-based strategies that could be used to respond to various emergencies has increased as a result of an increase in the rate of disasters.
The authors in this study talk about the current and future changes in the field of quality engineering. Introduced changes in the manufacturing field have brought quality engineering to the focus on creativity.
In itself, IT is related to making IT eco friendly if resources such as IT hardware utilized are environmentally friendly and the actions of users uphold conservation of the environment.
In the table, the primary key is Company branch code; this is the only candidate key since branch name is not guaranteed to be unique.
Two of the most influential and promising technologies in this age are the YouTube and Facebook, a social website. The impact of social media on business is remarkable and companies use YouTube to market their [...]
However, it is not easy to tell what the website is promoting just by the look of the homepage and thus, visitors with less time might not be interested to click to the sub-sections and [...]
Therefore, the author found it appropriate to address the theoretical underpinning of IT in virtualization processes to account for the gap in the field.
This paper will discuss the physical security controls that most web hosting and business continuity providers offer to their customers as well as provide examples of such providers along with their products to potential customers.
The setup in this experiment is as shown below: The below is a list of all the raw material and equipment used:
This article is a discussion of the results obtained by Mangiuc in an empirical study that involved both local and foreign companies in Romania.
While in the Revolution, I got a chance to see a working replica of the Atanasoff-Berry Computer, which was the first real model of a working computer.
An increase in the size of data generated directly increases the amount of data handled and required in different departments of the institution, company, organization or business for marketing, planning and budgeting, decision making, report [...]
0 were the dialog box that was used to show the paths and the names of the files of all the external programs.
According to Anderson, design for manufacturability constitutes a process of proactive design of products that guarantee the best cost of manufacturing and customer satisfaction among others.
Industrial Engineering is a branch of engineering concerned with the production or manufacturing processes and their improvement. The Industrial Engineer could have various job titles including: Safety, health and environment specialist Logistics planner Manufacturing Engineer [...]
Are the tools of monetary software constructive to the majority of firms? Are the tools of monetary software prejudicial to firms?
In the event of a crash, the first step is to identify the type of crash and then determine the best way to recover from the crash.
This paper will explore the definition, structure, and the use of Rivest, Shamir, and Adleman's public key cryptographic algorithm. This method entails the use of a public key for encryption purposes.
Among the reasons behind the use of an Intrusion Detection System in the company are in relation to access control. In addition to that it would be wise for the administrator to develop and enforce [...]
The microcontroller is therefore a very crucial device that largely determines the fulfillment of the objective of the system, provided the right algorithms are set in the programming stage.
The criteria of complexity and implementation are related to the flexible PDS criteria of the system being powering set-up, repeatability of measurement, reduced temperature setup time, and progressive heating/cooling supply temperature.
Decrease the percentage of spoilage The key purpose of the accelerator is to control the position of the lathe cutter and chuck and define the proper cutting angle, considering the optical tilt angle.
In the first place, it is important to focus on the positive features of the website. It is also necessary to note that the website is safe in terms of the information and links presented.
The choice of approach is done in the preliminary stages of structural design of shapes. 893Kg/mm3 The density of the envelope is 1.
It has been applied in many health facilities in communication, with the advancement and development of information and technology in many states especially in the developed and the developing states. With the use of computer [...]
The system will make it possible to carry out underwater sensing and imaging experiments using three communication layers namely: "the interface stations over the ocean surface; underwater base stations; and the sensing and imaging units, [...]
In the first section, the construction techniques used in the construction of the dams and their hydropower stations are given in detail.
The architecture is important in the merging of the different parts of the protocol. So as to handle this complicated task, the protocol systems are divided into subsets of the system which are commonly known [...]
The action of the government on the legislation of laws and the issuance of guidelines to the private sector on the development of system security software seem unethical.
VisualDX is structured such that the user is guided through the steps of using the software system without having to be a software specialist.
Meanwhile, knowledge is the combination of the entities of data and information to form a useful process of deciphering. The fourth and last challenge for KBMS is that the information stored for retrieval in the [...]
This paper investigates the various technical procedures used in the execution of the phishing scams; highlight the trends of these technical capabilities and the strategies that can be deployed to help in the prevention of [...]
The concept behind the use of a seatbelt is to make the passenger a part of the car. Instead, the seatbelts help transfer the impact to the body of the car away from the passenger.
With the increasing rate of urbanization and general modernization, more and more people are finding themselves in need of the Internet, which translates to rampant demand for the Internet distribution systems.
Roboticists in the physical design of rescue robots ensure that the robots can traverse places that are physically unreachable to human rescuers and additionally equip them with a variety of distributed technology that enable them [...]
An optical fiber can be explained as a flexible length of transparent pure glass with width not larger than human hair, which has the ability to transmit messages in modulated light waves through application of [...]
A key challenge is the provisioning of secure and trusted data storage that can be operated in such a hybrid cloud environment.
In our case, NFC technology is the innovation; the social system refers to the users of the technology while channels include the terminals at which the technology is applicable.
Lowering cost, creating administrative efficiency, improving patients' outcomes, fostering the relationship between patients and physicians, the desire to meet the ever increasing demand for privacy, security, as well as identity issues, propel the need to [...]