Tech & Engineering Essay Examples and Topics. Page 21

5,890 samples

Security Plan For Visiting Head of State

The procedure of ensuring the safety of heads of state at airports differs significantly from that maintained in the standard flight mode.
  • Subjects: Accidents & Protection
  • Pages: 5
  • Words: 791

Strategic Decisions in the European Automobile Market

Particularly, this is true for the European automotive market, which is affected by uncertainties regarding the legal status of trade among European nations, in the wake of the "Brexit" aftermath, and growing uncertainties regarding the [...]
  • Subjects: Project Management
  • Pages: 4
  • Words: 1097

IoT Adoption and Cyber Awareness in Saudi Arabia

As the implementation of these cyber technologies penetrates the economic sector, there is a need to understand potential vulnerability for businesses to be attacked through the Internet and other networks.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 552

Role of Information Technology in the Business Sector

In this way, the author concludes that IT is powerful enough to affect the successfulness of business and its competitiveness. It is also vital to ensure that IT is aligned with the overall business goals [...]
  • Subjects: Technology Effect
  • Pages: 2
  • Words: 598

Malé International Airport: The Landside

The Male International Airport is the main international airport of the Republic of Maldives. This island can be found in the North Male Atoll, not far from the isle of Male, the city on which [...]
  • Subjects: Aviation
  • Pages: 4
  • Words: 1165

The Dissection of the Obogs and Lox Systems

On the other hand, it is rather critical to address the pilots' ability to identify the predictors of a hypoxic environment and their skills in terms of performing a pre-flight examination of the existing systems.
  • Subjects: Aviation
  • Pages: 1
  • Words: 286

Acquiring Knowledge About Computers

One of the key features of A.I.U.'s learning platform is the use of the Gradebook. The best feature of the instant messaging tool is the fact that it is easy to install with no additional [...]
  • Subjects: Computer Science
  • Pages: 8
  • Words: 1930

The Design Characteristics of an Airplane

Control defines the ability of an airplane to respond to the controlling actions of a pilot and the ability to produce the desired displacement of altitude in flight.
  • Subjects: Aviation
  • Pages: 2
  • Words: 540

Criteria for Evaluating Aspects of the Website

In the paper, I would start by stating the criteria to be used in the assessment. After establishing the criteria, I would proceed to evaluate each aspect of the website by vigilantly employing each criterion.
  • Subjects: Internet
  • Pages: 2
  • Words: 260

Proper Water Flow Requirements

In order to ascertain the proper flow of water, standard typical sprinkler testing should be carried out on all the established water systems.
  • Subjects: Engineering
  • Pages: 2
  • Words: 565

Information Technology Metrics and Measurements

The size of the project and the kind of team to be used by the manager help in making decision as to whether the project is worth to be undertaken or not.
  • Subjects: Project Management
  • Pages: 4
  • Words: 1276

IT Network Connectivity

Consequently, the Ethernet card is still available to internet users and can be used in the process of connecting the University's computers to their cable modem.
  • Subjects: Internet
  • Pages: 3
  • Words: 874

Technological Innovations: Importance in Manufacturing

Innovation is the principled exploitation of ideas related to knowledge of those entering the industry as well as those moving out of the industry for the purpose of hastening modernization within the company and expansion [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1000

Solar Powered Universal Charger

However, based on a thorough evaluation of a number of other options not listed here and the idea of a solar powered charger, the group settled on the design and development of a solar powered [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1385

ABC Ltd.’s Automated Accounting System Project

The project involves the installation of a computerized accounting system instead of the company's IT system and accounting processes. The new system will also enable the company to reduce employee costs by lowering the number [...]
  • Subjects: Project Management
  • Pages: 6
  • Words: 2571

Automated Accounting System’s Risk Management Plan

The process of designing an automated system project is associated with a number of risks, starting from the basic probability of equipment failure to more complex issues including the threat of the wrong choice of [...]
  • Subjects: Project Management
  • Pages: 3
  • Words: 939

Information Technology Quality Management Project

So the following factors have to be considered: Cost of the Smart Phone including the future cost of maintenance, Expected output / Results nature of the job in relation to the phone, Altitude of the [...]
  • Subjects: Project Management
  • Pages: 40
  • Words: 10237

Security Components in Sporting Goods Stores

Components of security within an organization are comprised of a list of practices that can help an organization have better management of security and reduce the associated losses. The first and most important component of [...]
  • Subjects: Other Technology
  • Pages: 5
  • Words: 1351

Information Systems Project Selection Practice

In this method, the project selected in an array of possible projects to be mounted is the one that gives the shortest period of return on the initial investment.
  • Subjects: Project Management
  • Pages: 3
  • Words: 1142

Using Information Technology to Analyze Financial Market

The difference now is that with the wide availability of personal-use software and the wide spread of internet helped to maintain all the data needed quicker and without the need to special skills or expensive [...]
  • Subjects: Applications
  • Pages: 8
  • Words: 1038

Mechanics of Materials, Stresses in Beams

It implies that the material near the top surface of the beam is in compression with the x-direction with the bottom surface in tension.
  • Subjects: Engineering
  • Pages: 15
  • Words: 3876

CCTMS LabVIEW Interface: Program Development

The functionality of this counter is as follows: The counter will start count down to zero on receiving a START trigger from CCTMS server. On reaching a value zero the counter will start counting upwards.
  • Subjects: Programming
  • Pages: 4
  • Words: 514

Operating Systems: Discussing Different Types

The failure-oblivious computing technique allows a server to concentrate on executing critical data and discard any errors detected in the program execution environment.
  • Subjects: Computer Science
  • Pages: 7
  • Words: 2040

Usability Testing and Pact Analysis Report

The PACT analysis is conducted to find the utility of the tool in the optimum resource management at a call center. The usefulness of the Call Center Traffic Monitoring System is to be measured by [...]
  • Subjects: Computer Science
  • Pages: 12
  • Words: 3200

DC Stepper Motors: Power Element for Control

The term hybrid is derived from the fact that the motor is operated under the combined principles of the permanent magnet and variable-reluctance stepper motors.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1432

The Various Types of Aviation Pioneers

This paper explores the various types of aviation pioneers and focuses on Sir Frank Whittle by detailing his invention coupled with how it contributed to the future of aviation. In this way, it is clear [...]
  • Subjects: Aviation
  • Pages: 7
  • Words: 837

Recommender Systems: Techniques and Uses

Consumers can have access to so many items on sale over the internet and recommender systems are there to help them make the right choice or pick according to their liking after they have inputted [...]
  • Subjects: Computer Science
  • Pages: 4
  • Words: 1332

Project for Wireless Internet Access for Hostel (WIAH)

There has been great demand of more convenient wireless internet access by guests although internet connection is already available in the common rooms of the hostel at a reasonable fee.
  • Subjects: Project Management
  • Pages: 3
  • Words: 888

Printed Book of Technologies of Electronic Publication

According to the copyright in the United States, works first published before 1923 in the United States are in the public domain1, which means these books do not come within the purview of copyright regulations [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1249

Driver Fatigue Monitoring System: Service Design

It tracks the driver's ability to maintain a distance from the car in front of the vehicle and the ability to keep the vehicle steady in the middle of the road.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1112

Technology Acceptance Model

Hence, it is vital to understand the concepts of PEOU and PU that play the most significant roles in the analyzed model and determine its essence. TAM represents a research approach to contemplate on the [...]
  • Subjects: Other Technology
  • Pages: 6
  • Words: 1477

Zuhair Fayez Partnership: Project Quality Management in Practice

Project quality management is among the most challenging areas for a Project Manager because this area of expertise implies that the quality of the project's outputs remains consistent throughout the duration of the project.
  • Subjects: Project Management
  • Pages: 14
  • Words: 3914

Disinfecting Robots: Care Ethics, and Design

Thus, the utilization of this technology may be expected to reduce the incidence rate of HAIs. However, it is essential to consider the cost of this technology and reimbursement as they may be key factors [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 550

Workforce Learning and Development in the Digital Era

One of the most important tasks facing the UAE in the field of developing the potential of the workforce to work in the public sphere is the restructuring of the training and development of specialists, [...]
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1229

Multi-Hazard Risks in New York City

During the last decade, the need for evidence-based strategies that could be used to respond to various emergencies has increased as a result of an increase in the rate of disasters.
  • Subjects: Accidents & Protection
  • Pages: 2
  • Words: 585

Toolkit for Context-Aware Applications

The final challenge that has to be overcome in the design of context-aware applications as given by Coulouris, Dollimore and Kindberg is context dynamism. According to the framework, this function is carried out by the [...]
  • Subjects: Applications
  • Pages: 10
  • Words: 2911

Extensible HyperText Markup Language

The role of internet in education and business remains pivotal to the very existence of these two critical facets of life.
  • Subjects: Internet
  • Pages: 3
  • Words: 836

RAD Data Communications Company

The UDP model is another procedure that is important in the realization of networking objectives. It is one of the simplest transport procedures in networking.
  • Subjects: Project Management
  • Pages: 2
  • Words: 498

Development of Municipal Wi-Fi

Municipal Wi-Fi's are usually expensive to construct and maintain, and that is why a collaborative agreement between the private sector and the local government is necessary for the success of these services.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1252

Software Engineering Online Learning Center

However, it is not easy to tell what the website is promoting just by the look of the homepage and thus, visitors with less time might not be interested to click to the sub-sections and [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 858

Process Virtualization Theory Overview

Therefore, the author found it appropriate to address the theoretical underpinning of IT in virtualization processes to account for the gap in the field.
  • Subjects: Technology Effect
  • Pages: 5
  • Words: 1420

Aspects of Nuclear Engineering

As such, the power level is a function of the rate of fission and neutron population in a reactor. This is given by: When the ratio keff is equivalent 1 then this is referred to [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 897

Physical Security Control and Web Hosting

This paper will discuss the physical security controls that most web hosting and business continuity providers offer to their customers as well as provide examples of such providers along with their products to potential customers.
  • Subjects: Computer Security
  • Pages: 3
  • Words: 920

Computer Museum: Personal Experience

While in the Revolution, I got a chance to see a working replica of the Atanasoff-Berry Computer, which was the first real model of a working computer.
  • Subjects: Technology Effect
  • Pages: 4
  • Words: 1211

Database Management: Review of the SQL tutorial

Thus, the keyword from is used to identify the table from which the data will be retrieved, while an optional keyword where specifies the criteria which will be used for selecting the data.
  • Subjects: Data
  • Pages: 3
  • Words: 846

Problems and Opportunities Created by Having Too Much Data

An increase in the size of data generated directly increases the amount of data handled and required in different departments of the institution, company, organization or business for marketing, planning and budgeting, decision making, report [...]
  • Subjects: Data
  • Pages: 3
  • Words: 901

Design for Manufacturability Principles

According to Anderson, design for manufacturability constitutes a process of proactive design of products that guarantee the best cost of manufacturing and customer satisfaction among others.
  • Subjects: Engineering
  • Pages: 3
  • Words: 905

Industrial Engineering Jobs: Job Descriptions and Main Tasks

Industrial Engineering is a branch of engineering concerned with the production or manufacturing processes and their improvement. The Industrial Engineer could have various job titles including: Safety, health and environment specialist Logistics planner Manufacturing Engineer [...]
  • Subjects: Engineering
  • Pages: 4
  • Words: 1618

Geotechnical Engineering: The Finite Element Software

The use of FEA in geotechnical engineering requires an engineer to have a wide range of skills including a proper background of soil mechanics and finite element theory, a thorough comprehension of various constitutive soil [...]
  • Subjects: Engineering
  • Pages: 7
  • Words: 2194

Victorian Desalination Project Management

The contractor was tasked with the responsibility of completing the project under the supervision of the Department of Sustainability and Environment [herein referred to as DSE].
  • Subjects: Project Management
  • Pages: 10
  • Words: 2794

Recovering from Computer System Crashes

In the event of a crash, the first step is to identify the type of crash and then determine the best way to recover from the crash.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1442

RSA: Public/Private Key Encryption

This paper will explore the definition, structure, and the use of Rivest, Shamir, and Adleman's public key cryptographic algorithm. This method entails the use of a public key for encryption purposes.
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1459

IDS Deployment: Purpose and the Degree of Risk

Among the reasons behind the use of an Intrusion Detection System in the company are in relation to access control. In addition to that it would be wise for the administrator to develop and enforce [...]
  • Subjects: Computer Science
  • Pages: 3
  • Words: 900

Microcontroller Comparison Report

The microcontroller is therefore a very crucial device that largely determines the fulfillment of the objective of the system, provided the right algorithms are set in the programming stage.
  • Subjects: Computer Science
  • Pages: 9
  • Words: 1888

Pre-Construction Design Specifications: Water Piping Sub-System

The criteria of complexity and implementation are related to the flexible PDS criteria of the system being powering set-up, repeatability of measurement, reduced temperature setup time, and progressive heating/cooling supply temperature.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1395

Manufacturing Concepts: Product Design Specification

Decrease the percentage of spoilage The key purpose of the accelerator is to control the position of the lathe cutter and chuck and define the proper cutting angle, considering the optical tilt angle.
  • Subjects: Engineering
  • Pages: 5
  • Words: 1401

Major Issues Concerning Violence in the USA

In the first place, it is important to focus on the positive features of the website. It is also necessary to note that the website is safe in terms of the information and links presented.
  • Subjects: Internet
  • Pages: 3
  • Words: 902

Stress Analysis of Thin Walled Structures and Results

This consideration takes the priority of the passengers' safety to ensure they do not experience the effects of either deformation or heat dissipated by the parts involved in the impact."At the same time other structural [...]
  • Subjects: Project Management
  • Pages: 12
  • Words: 3343

The Voice Recognition Software

It has been applied in many health facilities in communication, with the advancement and development of information and technology in many states especially in the developed and the developing states. With the use of computer [...]
  • Subjects: Other Technology
  • Pages: 3
  • Words: 851

The Software Certification Process

In the process of certifying software, the personnel look at how the software is able to handle such attacks in order to offer protection to the information stored or processed; determines the quality of the [...]
  • Subjects: Computer Science
  • Pages: 13
  • Words: 4011

Fire Protection Review Plan

For the firefighting process to be effective, firefighting equipments should be given to the community members to use them in case of a fire outbreak.
  • Subjects: Other Technology
  • Pages: 3
  • Words: 962

Solar Cell and Chemical Engineering

The ink technology assures a reduced cost of the solar cells and offers them a long life. The solar Cell Efficiency technique looks at various compositions of solar cells.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1160

Request for Proposal (RFP)

One of the main requirements that will precede vendor selection is the submission of the request for proposal form, a document designed by the project owners and acquired by the prospective vendors based on the [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 581

Method of Construction of Hydro Schemes

4
In the first section, the construction techniques used in the construction of the dams and their hydropower stations are given in detail.
  • Subjects: Engineering
  • Pages: 18
  • Words: 4900

Communication Protocol Engineering

The architecture is important in the merging of the different parts of the protocol. So as to handle this complicated task, the protocol systems are divided into subsets of the system which are commonly known [...]
  • Subjects: Engineering
  • Pages: 8
  • Words: 2362

Steganography in Current Digital Media

When the hair grew, the slave went to the recipient of the message who shaved the head to expose the hidden message. In these methods, the hidden information within files may be known to the [...]
  • Subjects: Computer Security
  • Pages: 13
  • Words: 3674

Datapath in Arithmetic and Logic Unit (ALU)

Arithmetic Logic Unit Decoder refers to the component of the ALU that takes the data bits found in the instruction register and performs the necessary decoding by specifying the operands and functional operations to be [...]
  • Subjects: Data
  • Pages: 2
  • Words: 634

VisualDX: Human-Computer Interaction

VisualDX is structured such that the user is guided through the steps of using the software system without having to be a software specialist.
  • Subjects: Engineering
  • Pages: 2
  • Words: 553

Types of Tests for Testing of High Voltage Equipment

The calculation of the loss is gotten by the product of the power frequency, insulation capacitance and the square of the voltage of the equipment multiplied by the loss factor of the insulation.
  • Subjects: Engineering
  • Pages: 2
  • Words: 687

Description and Countering to Phishing

This paper investigates the various technical procedures used in the execution of the phishing scams; highlight the trends of these technical capabilities and the strategies that can be deployed to help in the prevention of [...]
  • Subjects: Cyber Security
  • Pages: 8
  • Words: 2327

Nanotechnology in the US Analysis

From a broad perspective, it should be known that the US nanotechnology initiative has spent a lot of money to enhance its use in the country.
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1140

Use of Seatbelt While Driving

The concept behind the use of a seatbelt is to make the passenger a part of the car. Instead, the seatbelts help transfer the impact to the body of the car away from the passenger.
  • Subjects: Accidents & Protection
  • Pages: 4
  • Words: 1038

Radio Over Fibre or Fibre Wireless Systems

With the increasing rate of urbanization and general modernization, more and more people are finding themselves in need of the Internet, which translates to rampant demand for the Internet distribution systems.
  • Subjects: Other Technology
  • Pages: 9
  • Words: 2473

Process Description of a Rescue Robot

Roboticists in the physical design of rescue robots ensure that the robots can traverse places that are physically unreachable to human rescuers and additionally equip them with a variety of distributed technology that enable them [...]
  • Subjects: Robotics
  • Pages: 3
  • Words: 967

Fiber Optics Usage in Medicine

An optical fiber can be explained as a flexible length of transparent pure glass with width not larger than human hair, which has the ability to transmit messages in modulated light waves through application of [...]
  • Subjects: Other Technology
  • Pages: 4
  • Words: 1228

Systems Analysis and Design: Smartcards

Lowering cost, creating administrative efficiency, improving patients' outcomes, fostering the relationship between patients and physicians, the desire to meet the ever increasing demand for privacy, security, as well as identity issues, propel the need to [...]
  • Subjects: Other Technology
  • Pages: 2
  • Words: 297

Commercial Airport Security Plan for the US

The intent of this security plan is to help the airport commission, tenants, and local law enforcement enhance security of the airport grounds, facilities, buildings and procedures.
  • Subjects: Aviation
  • Pages: 16
  • Words: 4422

Electrical Engineering Building Uses Wind Energy

The purpose of this fact-finding mission was to determine an appropriate type and rating of the wind turbine based on three factors: the average wind data at UNSW; the peak power demand for the EE [...]
  • Subjects: Engineering
  • Pages: 3
  • Words: 1132

Online Banking and Cryptographic Issues

A disadvantage of online banking is that it inherently reduces the interaction between banks and their customers and in addition, security is not guaranteed in this type of banking, that is, hackers have a chance [...]
  • Subjects: Cyber Security
  • Pages: 5
  • Words: 1467

E-bazaar Implementing Virtual Private Networks

With increase in the popularity of the internet, many businesses turned to the internet in order to cut on running costs and expand their network which has eventually paved way for the evolution of virtual [...]
  • Subjects: Internet
  • Pages: 12
  • Words: 1855

Cybercrime and Its Impact in the GCC Region

The introduction of the information and communication technologies nowadays offers a great range of advantages for the society, especially for the financial sector.
  • Subjects: Cyber Security
  • Pages: 20
  • Words: 5268

The Guarantee of Aviation Security

The key events on this path were the creation of the Department of Homeland Security and the establishment of the Transportation Security Administration on the national arena in 2001-2002, as well as signing the aviation [...]
  • Subjects: Aviation
  • Pages: 2
  • Words: 583

Dubai Parks and Resorts Project

The last expert, the technical project manager, will be mandated with the role of providing technical skills in the implementation of the project since the role will be taken by an expert in the field [...]
  • Subjects: Project Management
  • Pages: 10
  • Words: 2777

The Issues of Project Closeout

However, hotspots of dispute may emerge between the contractor and the owner after the proprietor begins a beneficial use of the project due to the parties not understanding their responsibilities.
  • Subjects: Project Management
  • Pages: 2
  • Words: 628

Ethical Hacking: Is It a Thing?

Computer programmers implemented the term 'hacker' at the beginning of the 1960s in the framework of a positive definition for an individual of dexterous software development skill.
  • Subjects: Cyber Security
  • Pages: 2
  • Words: 579

An Overview on Application of Data Normalization

Another aspect that needs to be considered is that the level of performance may be affected, and it is paramount to determine if the trade-off is reasonable in a particular situation.
  • Subjects: Data
  • Pages: 3
  • Words: 868

Concurrent Engineering with 3D Printer

After completing the first stage of the manufacturing process, the marketing department gets the task to sell the product to prospective customers. As a result, 3D printing leads to the emergence of better product designs.
  • Subjects: Engineering
  • Pages: 4
  • Words: 1098

The Internet of Things in the Clinical Segment

On the other hand, the reduction in the cost of internet access and the increase in available bandwidth has made the mass adoption of the tiny-networked computers that make up the IoT possible.
  • Subjects: Internet
  • Pages: 8
  • Words: 2228

Statistical Theory for Support to the Research Project

The statistical theory, which has been developed to necessitate the extraction of information from raw data using formalism and machinery of mathematics, allows the researcher to study how various staffing ratios influence patient satisfaction during [...]
  • Subjects: Project Management
  • Pages: 2
  • Words: 496

Wi-Fi and LAN Technologies: Data Communication Lab

The units were TCP/IP LAN technology, advanced LAN technology, rack server module, wireless LAN technology, copper tool kit, protocol analyser, and network analyser. The notes indicated how the units were configured in real LAN networks.
  • Subjects: Data
  • Pages: 4
  • Words: 1113

Technology Upgrade: The “A” Energy Company

The following is an examination of the "A" Energy Company and delves into a SWOT assessment of the current system and the potential alternatives that can be implemented to replace it.
  • Subjects: Technology Effect
  • Pages: 15
  • Words: 4204