Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
The one statement that must remain supreme in the wake of adversarial times and shall by no means suggest that any entity has the right to invade peculiar zones which have been earmarked. Human nature should be understood and more than that there is a dire need to find out how development and growth bases of the human beings are judged.
10 pages (2699 words)
, Download 3
, Research Proposal
Free
Cyclic or repetitive loading occurs in many applications like rotating equipment, thermal cyclic loading, etc. It is relevant to bring out two important aspects of fatigue fracture – 1) It involves cyclic or repetitive loading and 2) The applied load is well below the yield stress.
Preview sample
sponsored ads
Hire a pro to write a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
The Tiger Moth one-piece fixed wooden pitch propeller had no cracks and I only had to make sure that the wooden propeller was stored properly where there was no exposure of moisture. I only had to spray some paint on the newly installed Spitfire propeller that I had attached to the Tiger Moth and it is now ready for the exhibition.
More than seventy percent of the human race is subjected to this ‘feed’. The feed may very well be referred to as a combination of the present-day internet highly dominated by advertisements and interacting suggesting bodies.
12 pages (3396 words)
, Download 1
, Literature review
Free
There is a need for timely tackling of dissatisfactory results and any commitment issues that can interfere with the results of requirements. With consideration of changes that occur in the market daily, it is necessary to be flexible in the requirements needs though with consideration to the costs of time and money. The control over time and money allows for working within budgetary limits.
7 pages (2135 words)
, Download 0
, Literature review
Free
The information that has been collected by the system and stored can be used by the management for promotional purposes of those employees who have high-performance rates. On the other hand, the information collected can be used to dismiss employees who have shown extremely poor performance for a specific period of time (Lehpamer 2012, p. 165).
7 pages (1792 words)
, Download 1
, Research Proposal
Free
Being a student/lecturer at King Saud University, you were randomly selected to take part in this survey. I will greatly appreciate you taking some time to fill out this questionnaire which should take less than 15 minutes of your time. No identifying information of any kind will be collected about you. Only indirect information will be collected, like the course, you are undertaking as a student.
13 pages (3250 words)
, Download 0
, Research Proposal
Free
The smart grid aims at solving the downfalls of the old energy system and making things run more smoothly. For instance, if you take an example of the old lighting system, you will see that it was full of flaws, for instance, it's high energy consumption and the power wastages that come about when people leave their lights on and forget to switch them off.
The insecurity issues can either be internal or external. The external risks may result from the villages that are around by sneaking in with the mission of robbery (Fennelly, L. J., 2004). At times, the alarm systems may be activated by false alarms such as vibration or movements of animals around the entrance and along the fence.
12 pages (7093 words)
, Download 1
, Research Paper
Free
The use of GPS as a reliable tool for navigation is taking a different turn in these modern times. This has called for improved levels of accuracy since the quality of this service cannot be compromised. The residuals were analyzed by applying the de-noising and threshold functions found on the wavelet toolbox for MATLAB in order to come up with recommendations of how to treat the errors.
The operation of the intragastric balloon is best understood by considering the functional components of the device. The size of the balloon is determined by the pressure of the fluid that has been used to fill it. Before insertion through the esophagus, the balloon must be in an uninflated condition.
13 pages (3250 words)
, Download 0
, Research Proposal
Free
Many power utility companies practice load shedding during peak hours to ensure the capacity of their power supply is not exceeded. This has resulted in renewable sources of energy such as solar and wind getting integrated into the traditional grid to boost the existing power. Most of these generation points are scattered all over and hence a system to integrate all of them is necessary.
The persons affected are people who live in regions that experience winter and summer in higher altitudes. The micro-environment around the home is also affected. The only cost is designing of the landscape. When it comes to saving, a properly designed landscape is estimated to save up to 25% of household energy consumption for cooling and heating (Pandian).
Sand filters can be modified to improve their performance and design. One way of modifying these sand filters is that of adding a peat layer in the sand filters’ filtration chamber. The peat layer added to the sand filter may enhance the growth of microbes, which in turn improves nutrient and metals removal rates (Lindeburg, 2012).
Aircraft that are remotely piloted normally recognized as drones are non-passenger aircraft flown remotely and range from long-endurance systems to short-range systems. Even though unmanned aircraft vehicles (UAVs) have been utilized for many years, they have recently increased in number as well as effectiveness as automation technologies, sensors and aircraft continue advancing.
Smartphones nowadays can perform functions similar to those of card readers and servers. Smartphones can also be used with traditional access systems panels. It can be able to verify identity, permission granting for a particular period, and the Smartphone’s Global Positioning Satellite (GPS) can be used to ascertain whether the person is near the door. (Cullis, 2014)
In computer science, privacy refers to the availing of data only to those deemed as authorized through security features afforded through various means like passwords, applications, and so on. In doing so, one can control the content they feel foreign parties shouldn’t be allowed to have access to.
Shopping in an augmented world has become increasingly interactive as retail stores have integrated technologies that support shoppers. This project presents Smart Shopping Mall Trolley that supports shoppers while making their purchases in the stores. The group conducted an extensive literature search, focus group discussion, and user study to conceive the design for the trolley.
Any noise survey is required to start with an initial noise survey. This is required for any case where the workers could be having exposure of 82 dBA and above with a time duration of 8 hours or more or having a similar energy equivalent. The initial survey is usually inexpensive and can be considered as a red-flagging exercise
Pumps, control valves, and compressors have been found to play important roles in industry as they have a significant impact on the movement of gas and other fluids within the plant. They could be used to change the speed of transporting the gas, change direction and even regulate pressure and therefore affect the performance of the system.
IB is a building that is flexible and adaptable by helping its users achieve their goals and support the functions of the occupants. In designing an IB, a holistic approach is required involving technology designers from the beginning. These technology designers include personnel responsible for the installation of information systems, security systems, and building automation systems.
The risk strategies cited started all the way from the design phase in order to ensure that system security was at the core of the development of the building management system. The installation phase was also found to be vulnerable and therefore measures must be undertaken to ensure security is not breached.
An intelligent building is a building installed with innovative technology that has information and control services that fulfill the needs and wants of the occupants. Intelligent buildings use communication technologies that integrate and centralize monitoring, control, management, and operation of building (s) services.
First, it needs to be understood that this project needs security from hacking. This will be minimized by ensuring the system has a password so that only authorized individual(s) can access the system at one time. The computers at the central point will have the latest anti-virus software to prevent the system from damaging.
Nanotech has led to amazing innovations that have revolutionized many areas of human life due to its many applications. The uses include medical uses, industrial processes, materials such as clothes, electronics, molecular manufacturing, sustainable energy applications, environmental applications, robotics, and many others. The use of nanotech has had numerous benefits.
The report will explain how this project is useful to the new facility as well as its objective that helps in minimizing the risks involved. The report also has a site plan which to mark the areas of concern, the site plans, the scenario, and formulas involved. Moreover, the concept has intrusion detection systems that can identify vehicle number plates as well as individuals.
Additionally, the dual technology sensors employ one or a number of sensors to detect any form of motion in the protected area. In other words, if the sensor is triggered, the security system is able to send a signal to the control panel of the security system that is linked to the monitoring center which then alerts the owner of any adversary or security threat within the protected area.
The development of AI-enabled devices raises several ethical issues including the prospect of increased unemployment and inequalities and human dependence on machines. Perhaps the biggest worry is that technology might end up being a superior creature to humans. This article explores the ethical concerns related to AI and provides recommendations for future research.
6 pages (2154 words)
, Download 0
, Literature review
Free
There has been a significant development in the field of optical modulation techniques in recent years [12]. Prior to the current shift towards advanced optical modulation technologies, the Wavelength-Division Multiplexed (WDM) optical transmission techniques were widely used from as early as the 1990s.
The introduction of new technologies surpassed imagination and changed the artistic point of view, communication and human consciousness. It's also mentioned, that the artists together with a broad audience believed in the world-creating synthesis of art and technology, which seemed to shape life in a pleasant way.
The largest number of plants however exists in Western Europe, and specifically in France, where 80 percent of France’s electricity was generated by nuclear power in 2001. Because France has limited resources of fossil fuels, it embarked on a national program many years earlier to use nuclear power to generate the majority of the country’s electricity.
A heating element may be defined as being one that employs the mechanism of resistive heating to convert electrical power into thermal power i.e. heat. The basic functionality of a heating element involves the application of resistance to an electric current within the heating element. This process leads to the heating of that element.
The report looks at ways in which petroleum is converted into mechanical and electrical energy. By analyzing the diesel engine, its use as a prime mover is explained. Diesel power plants are a source of electricity. Diesel power plants consist of several elements: Fuel supply, air intake, exhaust, and cooling system.
Welding involves the use of different technologies to ensure that metals or thermoplastics are joined through fusion. This is a process whereby metals are joined by high-temperature heating in order to ensure the base metals being joined melt and a filler material cools around the heated section to form a joint which is strong as the base material.
Interactive multimedia is explained by three decisive factors: it is the package of resources that includes the mixture of texts, graphics, stills, images, animation, video, and audio; these resources are packaged, integrated, and linked together that tender user the capability to browse, navigate and study these resources.
There is the need to bring the fuselage into contact with the wings. The place where the wings join the fuselage is called the wing joint. At the other end of the wing is the tip. The assembly is influenced by government regulation, materials used the shape of the unit and the technology for joining components with close tolerances.
In addressing the concerns emerging in health information systems, the most critical factor to consider is the organization’s awareness of the changing environment. Health care organizations must identify the threats, issues, developments, and applications that encompass the latest developments in telecommunications and security.
Enough is being spent on research and new technology to ease the flying experience of the passengers. However, so far these techniques and technologies have not been able to make the air travel safer or reduce the incidences of hijacking.
12 pages (3483 words)
, Download 0
, Literature review
Free
Electrode development has also taken a different turn as design methods are innovated with the latest one being PTFE binding technology that has greatly improved the PME fuel cells performance. Catalysts development has also been adhered to to ensure compatibility with upcoming materials – the use of carbon-coated catalyst is especially advocated due to the achievable efficiency levels.
The two new technologies are Enhanced Geothermal System and Low-temperature and co-produced geothermal technology. It has also emerged from the discussion that geothermal will remain one of the energies for the future because it is sustainable, cheaper compared to other sources, such as natural gas and goal and above all, the fact that it cleans energy.
Adhesion can be increasing by printing the initial layer slowly and closer to the build surface, at an increased temperature in order to increase adhesion. It is also advisable to raise ambient temperature; however, even though replicator 2 does not have to be a heated bed, it is important to ensure that the cooling is gradual (El-Hofy, 2005).
Can thinking of human beings be defined? Can the definition be quantified so that it can be a scale of reference? This question will set the reference against which the thinking capability of any machine can be determined. The reference will be used to measure whether a machine can think at the level at which a human being can.
14 pages (4268 words)
, Download 0
, Literature review
Free
According to Electropaedia (2005), steam turbines remain to be the most resourceful and ancient technology that is still commercially viable. Generating heat through steam turbines has been existent for more than one century when they substituted reciprocating steam engines thanks to their lower costs and higher efficiencies.
Laser scanning is the process used in surveying from 1998. The process is a new technology that does precise surveying. The technology is getting into the minds of several surveyors and engineers in the name of getting accurate measurements once in a difficult situation. The technology is efficient in measuring inbuilt environments like in a building.
It is clear that renewable energy technologies are important in integrating alternative sources into an electric power network. The use of solar power in Saudi Arabia as one of the alternative energy sources could be considered an important step towards the reduction of its independence on energy from fossil sources.
The performance targets for the contractor are set and a BREEAM official is present to ensure that the soft landing standards are adhered to. This is followed by the design development and review, pre-handover, the initial, and the extended aftercare. The new BREEAM construction scheme assesses the buildings in the new build design stage and the new build post-construction stage.
The manufacturing industry has a role to ensure that the quality of the hydraulic system withstands stress. This is achievable by focusing on quality while cutting on the cost of production (Rockart & Short 1989, p.10). They should employ enough engineers, to avoid overloading the engineers that are there making their work ineffective.
ICT also helps in the integration of systems globally. This enables the tourists to have easy access to their operations. This technology enhances the competitiveness of the tour participants, especially in the aspect of networking. Clustering is also enabled by ICT sophistication. Information and communications are essential in diverse ways in tourism and business events.
There is also the need to decrease the amount of greenhouse gases that are produced by vehicles through emissions. Various national as well as local governments have been able to come up with tax credits that promote the embracing of electric vehicles based on the size of the battery and the range that they can travel on the batteries.
Additionally, Wikipedia associates the digital revolution with diverse changes that resulted from the use of digital computing as well as communication technology. To some extent, this argument is in connection with Gere’s view. According to Gere, digital culture is defined by the extensive use of digital elements in every activity in the world.