Power BI consists of various components that are available on the market separately and can be purchased and used independently, such as Power BI Desktop, Power BI Embedded, Power BI Gateway, and Power BI Mobile [...]
The area of embedded systems has received massive development because of emerging platforms dependent on computers and embedded systems for controlling and monitoring all matters autonomously. The evolution of IoT has occurred due to the [...]
In this paper offers a simple definitive view of routers and switches, their advantages, and the classifications of a switch. Overall, a router and a switch exhibits fundamental functional differences; while the former suits a [...]
For businesses, personal data legislates the burden of data protection to the owners. Conclusively, the GDPR is generally good for data privacy and security.
Avionics are the set of electronic types of equipment and systems designed to use in aviation. The first such device to be used on aircraft was the communication and navigation systems based on analog and [...]
One of the essential traits of smartphone addiction is tolerance which is defined as "a gradual increase in the mobile phone use to obtain the same level of satisfaction".
It is thus important that a review of the closure schedule and plan is communicated early enough to the project team.
It was the Internet that allowed the phenomenon of cyberbullying to emerge, the essence of which is the harassment of someone on the Internet by large groups of users.
Opponents of the Internet tend to view and criticize it one-dimensionally as a source of mindless entertainment, whereas in reality, it is rich with potential uses that have their unique properties.
Introduction of the smartphone to mass public Driven by iPhone created by Apple and Steve Jobs in 2007 Revolutionized the world of communications and information exchange Smartphone went from being a tool to the [...]
In this context, the implementation of TAM in the company is critical for the effective functioning of the organization. In this context, the introduction of TAM leads to the fact that satisfaction directly affects the [...]
The Oklahoma policy emphasizes the security of the building and the local environment is crucial to the security of the agency's information.
It is also possible to promote the collaboration of citizens, organizations, and the government via smart technologies. Another method to improve the environmental situation in the city is the implementation of eco-friendly public transport.
One of the components of the strategy is to support the heritage of the country's founding fathers, which means the UAE has to remain among the most advanced nations.
However, despite the numerous benefits of such technology, there are concerns of the effects it has on humans. In that regard, media and communication technologies are suggested to affect the mental capacity of people while [...]
Finally, the recommendations, as per the improvement of the incident response capability, are introduced to ensure the elimination of the identified drawbacks and the compliance of the engineering company with the security requirements presented by [...]
First of all, the professionals would need to plan maintenance differently in NT and NU than in most of the other provinces and territories.
Furthermore, since video conferencing is used as an education tool, my peers and I now have the opportunity to study in our residential areas.
The blender is the key played in the mixing process of various components used in the production of drugs. The paper aims to present a standard procedure to be used in cleaning the V-blender.
Most of the learning activities were undertaken in a classroom in front of the students, and assessment processes were conducted in class with paper and pen assessments.
The users can sign in their accounts and transact to another user and the blockchain records the transaction which is viewed by other users. It is difficult to collect taxes and trace malicious activities in [...]
To conclude, the implementation of artificial intelligence along with surveillance technologies will help policing maintain control over a big population. Artificial Intelligence allows policing to effectively prevent potential criminal events via the prediction of a [...]
All these were aimed at ensuring passenger safety and restoration of confidence in the United States aviation system, and the overall effect of the new regulations was to ensure passenger satisfaction in services provided by [...]
To fulfill the frameworks of project management, human resources are required at managerial and project members level.
The impacts on these organisations vary considerably depending on the type of crisis, the severity of the crisis and the way in which the organisation has planned for, and responded to the crisis.
Nanoengineering is considered to be the practical application of nanoscience and involves the application of its theoretical principles to develop structures and materials that are small, powerful, and efficient.
This paper investigates the various technical procedures used in the execution of the phishing scams; highlight the trends of these technical capabilities and the strategies that can be deployed to help in the prevention of [...]
The concept behind the use of a seatbelt is to make the passenger a part of the car. Instead, the seatbelts help transfer the impact to the body of the car away from the passenger.
It must be noted though that liquid cooling systems utilize more electricity compared to traditional fan cooling systems due to the use of both a pump and a radiator in order to dissipate the heat [...]
It is also capable of determining the ground speed and the time in relation to ground station when in "line of sight" of transmission. LORAN is capable of providing highly accurate bearing, distance, time to [...]
This includes automating ticketing system for ski lift passes, equipment hire, lessons, and the bus transport system to and from the snow field areas. For prepaid customers, details are entered to the system for authentication [...]
However, in any distributed system, there is a need to either have a coordination mechanism that will ensure that all the computers in the system are synchronized or work towards the reduction of processing time [...]
In this paper we find that the smart clothes are dated back to the early 20th century and they can be attributed to the works of artists and scientists.
Thus, Digital Image Processing can be said to be the process where the digital images are refined through some computer algorithms to extract information that the computer can interpret.
Overall, healthcare information systems are ultimately vital and should be encouraged in all organizations to improve the quality of healthcare which is a very important need for all human beings.
It then sends a response to the ATM via our intranet to the server, from the server through the external network to the ATM.
Arguably one of the most epic accomplishments of the 21st century was the invention of the computer and the subsequent creation of the internet.
LCC's seek to maximize the use of their planes as much as possible by restricting the number of wasted hours that the plane may incur on the ground or in the air.
The latest development in the field is relevant to cross-cultural issues and their impact on safety which still requires further study and appropriate application in the airline industry as merger and acquisition of airlines is [...]
Goal of the ampere hour meter in the battery is to get information about battery life. The unit of electric current is ampere and for time is seconds.
The latest version of the Microsoft Office system program is a 32-bit application and can run on a Windows 64-bit platform.
In this article, Sakurai and Murayama present examples of the application of information technology in various stages of disaster management, including preparedness, recovery, response, and risk reduction.
The cellular layout is the type of facility planning where the equipment is grouped according to the performed function for a set of similar products.
The first group of stakeholders that should be considered for the Dubai Metro Project is the city community, who will be the ones using the system.
However, the sudden boost in the development of communication technology at the end of the 20th century transformed the ways of cooperation and teaching.
According to Sreelekha, Bhattacharyya, and Malathi, the market for the technology will grow in the future, and translation speed, cost, and quality are all significant factors in the success of an application.
The frequency distribution is used in a variety of situations in the hospital setting. The ratio of the standard error to skewness is used as a test of normality.
The second chapter of the book is just a wonderful revelation of the contemporary literacy situation in the society among youth.
One of the main advantages of interactive learning is that it is the best way of motivating the ability of students to make innovative ideas.
Nintendo has made lots of variation in the original game boy this includes the Game boy pocket which is 30% smaller than the original game boy with equal size screen, the Game boy color it [...]
Based upon its level of use in current society as it grows and expands in response to both consumer and corporate directives, it is safe to say that the internet will become even more integrated [...]
Online games are consistently evolving and taking advantage of modern technologies to improve the competitive aspects, viewer entertainment, market share, and social benefits in the modern digital age as evident in the example of League [...]
With the invention of new ways of production, communication, transportation, and medicine, society had to adapt in order to respond not only to the benefits but also to various challenges posed by the invention of [...]
Another negative aspect that raises opposition to COPPA and CIPA is the impossibility of controlling children in places other than home or a school library.
The application of artificial intelligence to manufacturing and agriculture is gradually expanding from the commercial and service industries. The global demand for AI is high, and it is expected to grow exponentially.
Although the above examples explain how humans can use AI to perform a wide range of tasks, it is necessary for stakeholders to control and manage the replication of human intelligence.
The rapid rise of technologies and the evolution of communication means resulted in the appearance of new approaches to the learning process.
Mostly, a WBS should be presented in a diagrammatic representation as this is the simplest way to outline the various sets of work required for the completion of the project.
As the software is ready and working, it will be much cheaper to make amendments than to change all the hardware of the company.
The variety of cameras available to the modern buyers is so large that often it can be frustrating for both the experts and the enthusiasts since choosing the most suitable product they have to take [...]
However, at the same time, the pilots managed to reach their destination point and were ready to land, though dispatchers of the airport did not allow them to do it, not understanding or ignoring the [...]
Software Engineering is a field in engineering that requires the practitioner to apply the principles of engineering in the design and development of software products.
In terms of the scope of professional career advice, the team of advisers will need deep detail on electrical and electronics engineering.
Juda and Chrosciel applied the established association to determine the pressure drop that occurs in a virgin filter using the following equation. Juda and Chrosciel used a model of a filtration fiber to elucidate the [...]
Therefore, airport security in the UAE must manage the latest challenges and threats to passengers, airport infrastructure and assets, and cargo.
Providing the opportunity of learning in any convenient manner, time, and pace as well as benefiting the instructor in terms of the idea of distributed instructions and assessment, the course focuses on both learners' and [...]
Furthermore, they have the same long-term goals: the support of strategic architecture planning and the use of an architecture knowledge base that supports and maintains the architecture evolution.
Agile is a system of ideas and principles of flexible project management, and Waterfall is a project management technique that involves a steady transition from one stage to the next without overlaps and returns to [...]
However, the research on this topic is extensive and shows the impact of technology to be a positive one. Further research on this and other topics should be considered due to the widespread presence of [...]
Drones are an emerging sector of the aviation industry that has been received differently by the public primarily due to the possibility of misuse, infringement of privacy, and military use in combat.
For the majority of modern companies, the process of data destruction is one of the essential procedures allowing the organization to run smoothly and manage their data efficiently while staying protected.
A fault tree analysis can be used to identify and examine the major factors that led to the failure of the O-rings in the Solid Rocket Boosters. The failure of the O-rings led to the [...]
The system discharges the customer's card, and when the customer collects the bank card, the system then hands out the requested amount of cash to the customer.
The Everest case study illustrates some key problems that need to be addressed to avert the recurrence of errors or omissions that may have occasioned the deaths of the climbers.
To avoid any legal issues, the organization should make sure that all employees are aware of major regulations and laws associated with the use of intellectual property. Of course, it is important to remember that [...]
Professionals claim that, first of all, the hackers stole the login information for one of the employees who worked in the bank.
Scanlan, who was the district inspector at the time, identified the hazards surrounding the coal mines and reported his findings about a possible explosion to other relevant professionals. Scanlan should not have taken heed to [...]
In establishing and maintaining safety in work place, a business should identify the major cause of the accidents in its systems of operations.
There are several integration testing levels: Component Integration Testing checks the interaction between the system components after their testing. System Integration Testing checks the interaction between different systems after the system testing.
The theory is developed from the perspective of a teacher and aims at the analysis of the classroom media employment as well as the accommodation of the reviewed sources to the school conditions.
The main purpose of the article is to show readers the process of development of teaching machines and the main principles of their work.
Using the naturalistic observation, this study aims to provide the discussion of how Americans use cell phones in public places and react to the other people's use of technologies.
In the Target security breach, the hackers focused on the crucial information that is stored in the magnetic strip of the credit cards.
Hershey outsourced the services of three firms to aid in the implementation of the ERP software. An effective criterion to determine the success of the project is necessary in order to evaluate major milestones in [...]
Through blogging, many people add information to the web leading to a tremendous growth of information on the web. Companies have been rather slow in accepting and implementing the new technology of web 2.0.
In spite of the fact that globalization may be defined as a serious problem in different spheres of life, it is wrong to believe that the future of IT may undergo negative effects; it seems [...]
The visually impaired To assist the visually impaired to use computers, there are Braille computer keyboards and Braille display to enable them to enter information and read it. Most of these devices are very expensive [...]
Consequently, the following is the work breakdown configuration: Work Breakdown Configuration for the Development and Implementation of the e-Commerce Application Project Preliminary Study/Survey Understanding the Apparel Market and its trends in marketing and selling Evaluation [...]
The difference between the archival materials and the library materials is that in the archives,the materials are arranged in groups on the basis of their information content.
Of the two companies, AMD was the first to introduce a 64-bit chipset with a clocking capability measurable in gigahertz. Although Intel chips resist over-clocking, the location of the L2 cache memory facilitates faster memory [...]
This paper therefore shows that technology has completely changed concepts of the production of pornographic material, the distribution of pornographic material, access to pornographic material and our understanding of the concepts of privacy and identity.
The weight of the barge and the ballast water drives the support legs to the bottom of ocean or the sea in order to avoid further penetration when the rig is in operation.
Excessive use of the internet causes a person to feel lonely and depressed. The internet has provided the society with a lot of information both good and bad.
It is against this background that the present paper seeks to respond to a few issues related to project scheduling, primarily the identification of activities needed to estimate resources and durations, identification and discussion of [...]
Significant technologies as developed with respect to two Egyptian revolutions, one in the year 1952 and the other in the year 2011 are discussed in line with the roles that these communication technologies played in [...]
The growth of the internet in the period between the early 1990s and today has seen the area of network for businesses spread to cover the entire world.
With the rapid growth of online business, there has also been a resultant increase in the number of people and businesses that are connected to, have access to and share information.
Despite the large amount of information that the internet provides to people, research shows that the internet may have a negative effect on the intellectual ability of an individual. The use of technological devices may [...]
This network is usable in the Local Area Network and the Internet. A directory service is the type of software that keeps, arranges and avails information in a directory; it is an information store as [...]
In the past, people considered computers to be a reserve for scientist, engineers, the army and the government. Media is a field that has demonstrated the quality and value of computers.
The survey was conducted with the aid of the research questions which included; what type of computer was owned by the respondent and the brand of the primary computer.
The equipment running under the UPS gets supply of power for several minutes before switching the power to an alternative or emergency power options such as batteries in case of electric failures.
Similarly, entrepreneurs who are willing and able to venture into the SME industry can use the results from this study to assess the benefits of IoT incorporation in their businesses.
The automobile usually has two wheels, but there is an alternative to lock the axles of the rear wheels to connect the front pair as well. In response to the vertical force, the portion of [...]
In the stock exchange market, the spreadsheet software has been used to analyze the trends in stock performances and determine the most performing stocks based on the variances and beta of each stock.
Mounting entails the process by which the directories and files on the computer storage drives, such as the hard drive and the CD-ROM, are made available for the users to access through the computer system.
Hence, the essay explores the potential of virtual and augmented reality in exploring human perception and expanding the understanding of reality.
The representatives of the two firms argued that there was a great possibility of implementing the Hyperloop in the Middle East or Asia because of the increased need for fast and efficient transport and reduced [...]
An example of such a technology is a smart bed, which is a type of bed with sensors that collect information on the occupant. Nurses could use smart beds to track a patient's response to [...]
About 75% of parents say that "they are satisfied with the amount and quality of the educational media available to their children".
Therefore, the current plan will define the objectives, goals, and objectives, and scope of the implementation. The implementation of the cybersecurity management plan pursues both business and project goals and objectives.
The company is also catering the needs of the target customers in the most creative manner. The order received by the administration, which acknowledges the order with the restaurant and the customer.
The rapid adoption of digital solutions is exposing schools to the cyber-security threat, which is currently the biggest concern that these institutions face as they make a complete shift from the analog to the digital [...]
From this it can be seen that advances in communication are intertwined with advances in technology and as such this paper will explore the various new forms of communication that have occurred as a direct [...]
A tutor also qualifies as a module coordinator and hence the primary key of any of the tutors is the ModCoord. The association between the module coordinator and the student table is a one-to-many type.
It is for the serious impact of the fire that the department of fire fighting was initiated within every country to respond to fire incidences.
The main aspect of the gain spectrum in Silica fibres during the Raman amplification process is that the gain increases the frequency band to 40THz with a bandwidth of 6THz.
In this essay, I will provide examples proving the positive and negative influence of technology. I believe that filtering content and controlling the time spent on social networks will maximize the positive influence of technology.
The purpose of the study is to analyze the data obtained from the HR Department of the Dubai Government and outline the tendencies and factors that drive employees to decide on quitting Government employment.
Consequently, the analysis will involve the interpretation of the respondents' responses provided on the questionnaires. In addition, a final analysis will be conducted to focus on the issues which arise after data collection.