Technology

Research Papers/Topics Technology

A lignin-eating bacterium could aid in the clean-up of some dye-contaminated sites

A research news short article featuring two published research papers in the field of biosciences. This was submitted to the University of Lincoln as an assessment.

Artificial Intelligence in Self-Driving: Study of Advanced Current Applications

In this paper, we investigate the advances of Artificial Intelligence (AI) in the field of self-driving technology. We provide an overview of the key processes involved in autonomous navigation, including perception, mapping, localization, path planning, and motion control. We highlight the crucial role of AI in the development of self-driving technologies, in particular Machine Learning (ML), Deep Learning Networks (DLN), and Computer Vision Techniques (CVT). Special attention is also given ...

Challenges in Learning Programming in Grade-11 ICT 2 Students at Young Achievers School of Caloocan INC

This research aims to identify the specific challenges faced by ICT students at Young Achievers' School of Caloocan INC. when learning programming and examine how these challenges impact their academic performance. By conducting this research, valuable information can be gathered to inform educational stakeholders about the difficulties students face when learning programming. The findings will aid in formulating targeted interventions, instructional methods, and support mechanisms to addres...

Assessment of Airline passenger service quality in Nigeria

  Air transport has provided a lot of benefits to the economic development of any nation and has enabled stronger political ties. The deregulation of the aviation sector has led to increasing number of private operators over the years and as the passenger traffic handled by the aviation sector increase airlines are faced with a lot of challenges resulting in service defection. Therefore, the aim of this paper is to assess the airline Passenger service quality in Nigeria. The specific objecti...

EFFECTS OF AGGREGATE SIZES

In the sense that the materials involved in this project were capital intensive more especially cement, so in carrying out the work one must have to be careful in the selection and collection of materials to be used in the casting of the concrete.The materials used are coarse aggregate (granite) fine aggregate (sand). The coarse aggregates used in this work were collected from Ishiagu while the fine aggregate was collected in front of the carpentry’s workshop on the campus.The test conform ...

The Management of Information Systems in Justice Delivery Systems: Case Study of the Judicial Service of Ghana

Abstract The Judicial Service as the third arm of the government of Ghana is the body mandated by the country’s constitution to dispense justice in the country, in a manner that peace, tranquility and stability prevail to ensure socio-economic development. In court operations in the country however, effectiveness, efficiency and speed of justice delivery are often reported to be very low.The main source of this problem as reported in most judicial services annual reports show that the probl...

The Challenges of integrating ICT in Education and the Way Forward

Introduction Information and Communication Technology(ICT) in education is a recent development. In developed countries, ICT has been fully integrated into formal teaching and learning processes based on their advancement in technology as well as economic and otherwise wellbeing. The story is different with developing countries, where information and communication technological knowhow is especially low. Though developing countries have embraced this phenomenon, the use of ICT in education is...

COMPUTER HARDWARE SYSTEM DESIGN

The arithmetic/logic unit is the component of the CPU where data is held temporarily and where calculations take place. The control unit controls and interprets the execution of instructions. Most of these actions are retrievals of instructions from memory followed by movements of data or addresses from one part of the CPU to another. The control unit determines the particular instruction to be executed by reading the contents of a program counter (PC), sometimes called an instruction pointer...

Pipelining

Pipelining is one way of improving the overall processing performance of a processor. This architectural approach allows the simultaneous execution of several instructions. Pipelining is transparent to the programmer; it exploits parallelism at the instruction level by overlapping the execution process of instructions. It is analogous to an assembly line where workers perform a specific task and pass the partially completed product to the next worker. This chapter explains various types of pi...

Application of Drone in Agriculture

The world population has increases day by day and projected to reach 9 billion people by 2050, so that the agricultural consumption will also increase. There is extreme need to fulfil the food demand of each and every person. Agriculture sector is the most promising sector, dealing with the lot of problems now a day’s one of the main problems is labour unavailability for farming. Other problems or difficulties are extreme weather events, inadequate amount and inefficient application of fert...

Military Use of Unmanned Aerial Vehicles- A Historical Study

The following study is devoted to the phenomenon of unmanned aerial vehicles used throughout known history on the battlefield or for military purposes. The purpose of the following text is to familiarise the reader with an overview with the contemporary and historical employment of the unmanned vehicles on the battlefield. The study also aims to show that the concept of unmanned combat vehicles, also unmanned aerial combat vehicles, is far more ancient than is it is widely known. The article ...

CAPTURING NETWORK TRAFFIC IN A NETWORKED ENVIROMENT USING WIRESHARK

What is Wireshark? Wireshark is a network packet analyzer. A network packet analyzer used to capture network packets and display that packet data as detailed as possible. My network capturing was done on wireshark on kali linux, Some intended uses of wireshark 1.Network administrators use it to troubleshoot network problems 2.Network security engineers use it to examine security problems 3.Engineers use it to verify network applications 4.Developers use it to debug protocol implementations 5...

Data Analytics Techniques

Some analytical techniques are required in order to the attempt some relevant information. It gives a broad overview of some of the most commonly used techniques and technologies to help the reader to better understand the tools based on big data analytics. There are many analytic techniques that could be employed when considering a big data project. Which ones are used that depends on the type of data being analyzed, the technology available to you, and the research questions you are trying ...

CSS 411: BASICS OF DIGITAL FORENSICS

TABLE OF CONTENTS 1.0.Introduction 1.1.Packet capturing and Analysis 1.2.Definition of key terms. 1.3.Scope of the work. 2.0.Related work. 2.1Aims and objectives of Research work. 3.0.Materials and Method. 3.1Tools and Applications used 3.2Wireshark 3.2.1Uses of Wireshark 3.2.2Features of Wireshark 4.0.Results and Discussion 4.1Packets Capturing using Wireshark 4.2Packets Analyzing using Wireshark 4.3IP address Capturing/Tracing 5.0.Summary & Conclusion 5.1Summary 5.2Conclusion References  1...

Cyber security

Cyber security is a fast growing pace in the society today and as a result of that, its growth is becoming more and more widespread. According to the 2015 (ISC) Global Information Security Workforce Study, a shortfall of 1.8 million cybersecurity jobs will happen by 2022 cite mat 1. Allegedly, the most common reason for this fact is the lack of qualified personnel. As a consequence of this trend even in education sector, Information Technology (IT), Cyber space, Online platform, medical field...


121 - 135 Of 1117 Results
@