Tech & Engineering Essay Examples and Topics. Page 21

5,359 samples

Problems and Opportunities Created by Having Too Much Data

An increase in the size of data generated directly increases the amount of data handled and required in different departments of the institution, company, organization or business for marketing, planning and budgeting, decision making, report [...]
  • Subjects: Data
  • Pages: 3
  • Words: 901

Design for Manufacturability Principles

According to Anderson, design for manufacturability constitutes a process of proactive design of products that guarantee the best cost of manufacturing and customer satisfaction among others.
  • Subjects: Engineering
  • Pages: 3
  • Words: 905

Industrial Engineering Jobs: Job Descriptions and Main Tasks

Industrial Engineering is a branch of engineering concerned with the production or manufacturing processes and their improvement. The Industrial Engineer could have various job titles including: Safety, health and environment specialist Logistics planner Manufacturing Engineer [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1618

Geotechnical Engineering: The Finite Element Software

The use of FEA in geotechnical engineering requires an engineer to have a wide range of skills including a proper background of soil mechanics and finite element theory, a thorough comprehension of various constitutive soil [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2194

Victorian Desalination Project Management

The contractor was tasked with the responsibility of completing the project under the supervision of the Department of Sustainability and Environment [herein referred to as DSE].
  • Subjects: Project Management
  • Pages: 10
  • Words: 2794

RSA: Public/Private Key Encryption

This paper will explore the definition, structure, and the use of Rivest, Shamir, and Adleman's public key cryptographic algorithm. This method entails the use of a public key for encryption purposes.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1459

IDS Deployment: Purpose and the Degree of Risk

Among the reasons behind the use of an Intrusion Detection System in the company are in relation to access control. In addition to that it would be wise for the administrator to develop and enforce [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 900

Microcontroller Comparison Report

The microcontroller is therefore a very crucial device that largely determines the fulfillment of the objective of the system, provided the right algorithms are set in the programming stage.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 1888

Pre-Construction Design Specifications: Water Piping Sub-System

The criteria of complexity and implementation are related to the flexible PDS criteria of the system being powering set-up, repeatability of measurement, reduced temperature setup time, and progressive heating/cooling supply temperature.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1395

Manufacturing Concepts: Product Design Specification

Decrease the percentage of spoilage The key purpose of the accelerator is to control the position of the lathe cutter and chuck and define the proper cutting angle, considering the optical tilt angle.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1401

Major Issues Concerning Violence in the USA

In the first place, it is important to focus on the positive features of the website. It is also necessary to note that the website is safe in terms of the information and links presented.
  • Subjects: Internet
  • Pages: 3
  • Words: 902

Stress Analysis of Thin Walled Structures and Results

This consideration takes the priority of the passengers' safety to ensure they do not experience the effects of either deformation or heat dissipated by the parts involved in the impact."At the same time other structural [...]
  • Subjects: Project Management
  • Pages: 12
  • Words: 3343

The Voice Recognition Software

It has been applied in many health facilities in communication, with the advancement and development of information and technology in many states especially in the developed and the developing states. With the use of computer [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 851

Network Reconnaissance Using Command Line

The command enters works through the interactive mode when no arguments are stated, or when the in itial argument is a - and the following argument is the server's internet address name or the host [...]
  • Subjects: Internet
  • Pages: 8
  • Words: 2247

The Software Certification Process

In the process of certifying software, the personnel look at how the software is able to handle such attacks in order to offer protection to the information stored or processed; determines the quality of the [...]
  • Subjects: Computer Science
  • Pages: 13
  • Words: 4011

Fire Protection Review Plan

For the firefighting process to be effective, firefighting equipments should be given to the community members to use them in case of a fire outbreak.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 962

Solar Cell and Chemical Engineering

The ink technology assures a reduced cost of the solar cells and offers them a long life. The solar Cell Efficiency technique looks at various compositions of solar cells.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1160

An Overview of Hall Effect Sensors

Edwin Hall, discovered that a magnetic field affected the flow of current in a gold rectangle that was placed perpendicular to the magnetic field. The other common application of hall-effect sensor technology is in gear-tooth [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 588

Request for Proposal (RFP)

One of the main requirements that will precede vendor selection is the submission of the request for proposal form, a document designed by the project owners and acquired by the prospective vendors based on the [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 581

Method of Construction of Hydro Schemes

In the first section, the construction techniques used in the construction of the dams and their hydropower stations are given in detail.
  • 4
  • Subjects: Engineering
  • Pages: 18
  • Words: 4900

Communication Protocol Engineering

The architecture is important in the merging of the different parts of the protocol. So as to handle this complicated task, the protocol systems are divided into subsets of the system which are commonly known [...]
  • Subjects: Engineering
  • Pages: 8
  • Words: 2362

Steganography in Current Digital Media

When the hair grew, the slave went to the recipient of the message who shaved the head to expose the hidden message. In these methods, the hidden information within files may be known to the [...]
  • Subjects: Computer Security
  • Pages: 13
  • Words: 3674

Datapath in Arithmetic and Logic Unit (ALU)

Arithmetic Logic Unit Decoder refers to the component of the ALU that takes the data bits found in the instruction register and performs the necessary decoding by specifying the operands and functional operations to be [...]
  • Subjects: Data
  • Pages: 2
  • Words: 634

VisualDX: Human-Computer Interaction

VisualDX is structured such that the user is guided through the steps of using the software system without having to be a software specialist.
  • Subjects: Engineering
  • Pages: 2
  • Words: 553

Types of Tests for Testing of High Voltage Equipment

The calculation of the loss is gotten by the product of the power frequency, insulation capacitance and the square of the voltage of the equipment multiplied by the loss factor of the insulation.
  • Subjects: Engineering
  • Pages: 2
  • Words: 687

Nanotechnology in the US Analysis

From a broad perspective, it should be known that the US nanotechnology initiative has spent a lot of money to enhance its use in the country.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1140

Use of Seatbelt While Driving

The concept behind the use of a seatbelt is to make the passenger a part of the car. Instead, the seatbelts help transfer the impact to the body of the car away from the passenger.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1038

Radio Over Fibre or Fibre Wireless Systems

With the increasing rate of urbanization and general modernization, more and more people are finding themselves in need of the Internet, which translates to rampant demand for the Internet distribution systems.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2473

Fiber Optics Usage in Medicine

An optical fiber can be explained as a flexible length of transparent pure glass with width not larger than human hair, which has the ability to transmit messages in modulated light waves through application of [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1228

Systems Analysis and Design: Smartcards

Lowering cost, creating administrative efficiency, improving patients' outcomes, fostering the relationship between patients and physicians, the desire to meet the ever increasing demand for privacy, security, as well as identity issues, propel the need to [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 297

Commercial Airport Security Plan for the US

The intent of this security plan is to help the airport commission, tenants, and local law enforcement enhance security of the airport grounds, facilities, buildings and procedures.
  • Subjects: Aviation
  • Pages: 15
  • Words: 3914

Global Positioning System Technology and Security

The report revolves around the activities involved in movement of cargo from the place of origin to the destination with much emphasis being given to application of Global Positioning System technology and its importance in [...]
  • Subjects: Other Technology
  • Pages: 14
  • Words: 3819

Electrical Engineering Building Uses Wind Energy

The purpose of this fact-finding mission was to determine an appropriate type and rating of the wind turbine based on three factors: the average wind data at UNSW; the peak power demand for the EE [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1132

Online Banking and Cryptographic Issues

A disadvantage of online banking is that it inherently reduces the interaction between banks and their customers and in addition, security is not guaranteed in this type of banking, that is, hackers have a chance [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1467

E-bazaar Implementing Virtual Private Networks

With increase in the popularity of the internet, many businesses turned to the internet in order to cut on running costs and expand their network which has eventually paved way for the evolution of virtual [...]
  • Subjects: Internet
  • Pages: 12
  • Words: 1855

Cybercrime and Its Impact in the GCC Region

The introduction of the information and communication technologies nowadays offers a great range of advantages for the society, especially for the financial sector.
  • Subjects: Cyber Security
  • Pages: 20
  • Words: 5268

Condenser Operation and Maintenance

The design of the surface condenser is such that steam is made to get its way into the condenser system through an opening at the top section of the condenser system after which distribution takes [...]
  • Subjects: Other Technology
  • Pages: 8
  • Words: 2202

The Guarantee of Aviation Security

The key events on this path were the creation of the Department of Homeland Security and the establishment of the Transportation Security Administration on the national arena in 2001-2002, as well as signing the aviation [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 583

Dubai Parks and Resorts Project

The last expert, the technical project manager, will be mandated with the role of providing technical skills in the implementation of the project since the role will be taken by an expert in the field [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2777

The Issues of Project Closeout

However, hotspots of dispute may emerge between the contractor and the owner after the proprietor begins a beneficial use of the project due to the parties not understanding their responsibilities.
  • Subjects: Project Management
  • Pages: 2
  • Words: 628

An Overview on Application of Data Normalization

Another aspect that needs to be considered is that the level of performance may be affected, and it is paramount to determine if the trade-off is reasonable in a particular situation.
  • Subjects: Data
  • Pages: 3
  • Words: 868

Concurrent Engineering with 3D Printer

After completing the first stage of the manufacturing process, the marketing department gets the task to sell the product to prospective customers. As a result, 3D printing leads to the emergence of better product designs.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1098

The Internet of Things in the Clinical Segment

On the other hand, the reduction in the cost of internet access and the increase in available bandwidth has made the mass adoption of the tiny-networked computers that make up the IoT possible.
  • Subjects: Internet
  • Pages: 8
  • Words: 2228

Statistical Theory for Support to the Research Project

The statistical theory, which has been developed to necessitate the extraction of information from raw data using formalism and machinery of mathematics, allows the researcher to study how various staffing ratios influence patient satisfaction during [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 496

Wi-Fi and LAN Technologies: Data Communication Lab

The units were TCP/IP LAN technology, advanced LAN technology, rack server module, wireless LAN technology, copper tool kit, protocol analyser, and network analyser. The notes indicated how the units were configured in real LAN networks.
  • Subjects: Data
  • Pages: 4
  • Words: 1113

Technology Upgrade: The “A” Energy Company

The following is an examination of the "A" Energy Company and delves into a SWOT assessment of the current system and the potential alternatives that can be implemented to replace it.
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 4204

System Vulnerabilities and Penetration Testing

It is advisable to change passwords frequently to give formal proof for authentication and to store passwords in the /etc/shadow file that allows programs with system privileges to access the passwords.
  • Subjects: Cyber Security
  • Pages: 4
  • Words: 1116

Learning Outcomes: Digital Basics

The basic principle in digital basics is that electronic/computer engineers and technicians can be able to use the same design used in a light switch to create an electronic switch with the capacity to produce [...]
  • Subjects: Computer Science
  • Pages: 2
  • Words: 553

Database and Data Warehousing for Smart Buy

The motivation for this proposal is that a data warehouse will enable Smart Buy to optimally exploit the potential of business intelligence in boosting its sales and on cutting down unnecessary expenditure.
  • Subjects: Computer Science
  • Pages: 8
  • Words: 1686

The Latest Development in EMAT Inspection of Welds

However, the innovation of EMAT technology in 1970s transformed the process of inspection as a noncontact, dry inspection that provided an option to the piezoelectric transducers.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1416

Family Plan For Specific Hazards and Risks

In my community, there is also the risk of xenophobic attacks. The gas has a distinct smell and can be recognized by people in my community.
  • Subjects: Accidents & Protection
  • Pages: 3
  • Words: 812

Summer Music Festival: Event Project Management Plan

The main objective of the festival is to raise funds for the Children Society of the United Kingdom. People below the age of fifteen years have low power and less interest in the event because [...]
  • Subjects: Project Management
  • Pages: 9
  • Words: 2448

Google Incorporated: General Information

Under the history section, the article states that the company was created in 1996 through the entrepreneurial attempts of Larry Page and Sergey Brin as a way to improve on the search engines that existed [...]
  • Subjects: Internet
  • Pages: 2
  • Words: 558

Compound Bows: Term Definition

Archery: this is the art shooting arrows using a compound bow Cam: this is the pulley of a compound bow The intention of this document is to offer archers with relevant information about compound [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1114

Platform as a Service Solution

Components of the PaaS solutions are service platforms. PaaS solutions are used to develop web applications on the Internet.
  • Subjects: Data
  • Pages: 2
  • Words: 577

Mechanical Engineering: Description and History

As a field of study, mechanical engineering has evolved to encompass the study of sophisticated machinery of the twenty-first century. This invention led to the development of mechanical engineering as a field of study.
  • Subjects: Engineering
  • Pages: 3
  • Words: 824

The Importance of IP Traffic Classification

One of the major challenges in the development of appropriate and effective QoS is lack of a proper pricing strategy. An effective pricing strategy is central to the classification of the QoS that customers receive.
  • Subjects: Internet
  • Pages: 3
  • Words: 825

Biometrics in Cryptography. Desirable Properties

Because it is the first step, it is a critical step in the scheme because it is used to ensure that the attacker cannot gain access to the key once the system is compromised.
  • Subjects: Cyber Security
  • Pages: 13
  • Words: 3353

WEP (Wired Equivalence Protocol)

Other vulnerabilities include the ability to compromise the WEP by the use of passive attacks, which is a condition where an attacker selects both the cipher text and the plain-text to attack WEP secured data.
  • Subjects: Cyber Security
  • Pages: 10
  • Words: 2556

The Quality Improvement Plan

This was indicative of a quality failure on the part of the project manager and the various parties involved since it did not adhere to the projected and set cost for the road improvement.
  • Subjects: Project Management
  • Pages: 20
  • Words: 5503

The Coop Program: Resolving Engineering Problems

This programme allows students to have a chance of practical application and work experience in the engineering field of study. The programme also benefits students as they learn to work with a team in a [...]
  • Subjects: Engineering
  • Pages: 8
  • Words: 2192

Electronics on Paper – Is It Better

However, height differences in paper vary up to some micrometers with respect to the fiber dimension and the manner in which the fibers intertwine.
  • Subjects: Technology Effect
  • Pages: 6
  • Words: 1655

Al Taweelah Desalination Plant

The three firms on the site were the Al Taweelah Power Company that ran the B and B2 plants, the Gulf Total Tractebel Power Company that ran A1's phase 1 and phase 2 plants and [...]
  • Subjects: Engineering
  • Pages: 2
  • Words: 627

Word Processing Software Upgrade

The key purpose of this project is; to implement an upgrade of the word program in use at Baderman Island Resort and Smith Systems Consulting.
  • Subjects: Project Management
  • Pages: 2
  • Words: 602

Programming Solution for the Library Reference System

The iterating part of the program code involves the data analysis part, as data matching part of the code will be repeated for several hundred times until the entire data base is scanned. The offered [...]
  • Subjects: Data
  • Pages: 2
  • Words: 539

The Web-Enabled Technology: Key Aspects

For data conveyance there is a protocol in place that enables the transfer of data without a snag."Hyper text transfer protocol" is the foundation of data conveyance on web.
  • Subjects: Internet
  • Pages: 8
  • Words: 2304

Majoring in Computer Science: Key Aspects

Computer Science, abbreviated as CS, is the study of the fundamentals of information and computation procedures and of the hands-on methods for the execution and application in computer systems.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 854

The Entity Relationship Diagrams

For each entity there's a specific primary key and these are all unique as shown below; For Event requests the primary key is the unique event number, For Event plans the primary key is the [...]
  • Subjects: Data
  • Pages: 2
  • Words: 852

Aviation Industry: New Technologies

The reason behind this is due to the fact that the researcher believes that as a student attempting to attain a Bachelor of Science in Aeronautics with a Minor in Safety and Human Factors his [...]
  • Subjects: Aviation
  • Pages: 3
  • Words: 1928

Web Service Security: SAML and XACML

One reason for the development of this language can be traced to the need for a standard, generic and powerful access control and specification language.
  • Subjects: Computer Science
  • Pages: 3
  • Words: 457

Enterprise Service Bus Overview

According to Footen and Faust, "ESB is a term used to describe a wide variety of products whose primary goal is to extend the simple messaging capabilities of an application server to allow the inclusion [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1017

Comparison Between WiMax and LTE

The traditional mobile networks use the TDM and combination of the packet infrastructure that is partial, but with LTE and the WiMAX, they have simplified the network standards to the application of all- IP networks.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 1957

Mobile Devices and Convenience

Mobile devices that fulfill such requirements provide the merit of functionality optimization, mobile network security with the consequence of the reduction in costs associated with downtimes while not negating the privilege of reduced general costs [...]
  • Subjects: Computer Science
  • Pages: 5
  • Words: 1618

Two VOIP Call Admission Control Methods

The other components include a soft phone, which runs on a computer, the analog telephone that connects to the public switched telephone networks, and the analog telephone adapter that contains the logic to communicate with [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1098

Digital Information Technology

The nature of the configuration of the data path is also an important element in the design of data path and controller design.
  • Subjects: Computer Science
  • Pages: 10
  • Words: 2653

Southwest 737 Jet Forces Emergency Landing

The article gives all the actions that the company has been taken to establish the cause of the problem. This can add to the problem that is already in the company of delaying customers as [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 353

What Doesn’t Like Hardware Engineer

Among the things that may make a computer hardware engineer dislike his/her job is the fact that it is sometimes difficult to identify a problem in a computer system.
  • Subjects: Engineering
  • Pages: 2
  • Words: 566

Energy and Nanotechnologies: Australia’s Future

Given the concerns about the sustainability and the security of the energy supply, the fast pace of economic development, the connection between global warming and fossil fuels, the author seeks to investigate alternative energy efficient [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 599

Management Systems in Company, Lan Technologies

LAN is the type of network architecture and technology to be used because of the smaller size of the networking area. The topology of the network describes the entire arrangement of the elements on the [...]
  • Subjects: Internet
  • Pages: 5
  • Words: 1417

Energy Trust: Technology and Innovation

Similarly, the Energy Trust demonstrates commercial and pre-commercial renewable energy technologies and builds market for renewable energy. Besides, renewable energy is cost effective than other sources of energy in the long run.
  • Subjects: Other Technology
  • Pages: 2
  • Words: 593

Groupware and Ordinary Databases

The database design is necessary in groupware because it helps to identify the data elements, type of data, and the file options.
  • Subjects: Data
  • Pages: 3
  • Words: 963

Hydraulic Pumps: Review

There are several types and a majority of them are adjustable in order to regulate the amount of pressure delivered by the pump few are not; depending on whether the pumps are hydrostatic or hydrodynamic.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1095

Networking Environments File System Security

Typically, the Linux command line uses the "chmod" command where the user is able to apply the change the mode typically defined in the syntax descriptive of the user account as "u", use of the [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2184

Types of Crime in Cyberspace

While there are numerous advantages that accrue from progress of the ICT like improving the speed at which information, news and ideas are transferred from one part of the globe to another and efficiency in [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2220

“Agile Project Management” by Gary Chin

In addition, a blend of both agile project management and classic project management is valuable to the project environment of the product development process.
  • 5
  • Subjects: Project Management
  • Pages: 12
  • Words: 3505
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.