What do demonstrations on city streets in the Philippines in 2001, the election of Barack Obama as President of the United States in 2008, revocation of the results of the fraudulent elections in Moldavia in 2009, the M-15 movement with their camps and demonstrations in...
A conventional boost converter has a high power efficient CMOS adaptive controlled boost step-up LED drive implemented in BCD technology. A novel adaptive minimum frequency control provides up to 52v from a single battery 4.5v input supply to ten series connected LEDs at the output....
According to Andy Jankowski, Managing Director at Enterprise Strategies, who spoke at a recent Future of Work conference, companies will be looking to employ “disruptors”- those who respectfully challenge the status quo and find new approaches to creating solutions. For recruiters, this means that recruiting...
Embarking on the journey of software development entails navigating through a series of well-defined stages, collectively known as the software development life cycle. Each phase, from planning to maintenance, plays a vital role in shaping the final product. In this essay, we delve into the...
Technology is rapidly growing in seconds, dominating all over in the world’s interest. One of the most popular things we have today is cell phones. Almost everything we need is on that one small gadget. Having the access to technology that one can take with...
John Searle and Alan Turing have contrasting views when it comes to the debate on artificial intelligence (AI) and consciousness. Alan Turing is most famous for developing the Turing test, which is used to see if a machine can trick someone that it is indeed...
Currently women represent over half of the workforce, but this is not true for women in the computer science careers. Women only earn 28% of computer science undergraduate degrees (Cech). Even after half a century after the Civil Rights Act, women and minorities continue to...
I’m an incoming transfer student interested in computer science. As a child, the theme of network security and programming have helped sparked my interest in all things digital. Movie were my first revelation to the kind of community established among programmers. Hackers, released in 1995,...
The first substantial computer was the giant ENIAC machine by John W. Mauchly and J. Presper Eckert at the University of Pennsylvania. ENIAC (Electrical Numerical Integrator and Calculator) used a word of 10 decimal digits instead of binary ones like previous automated calculators/computers. ENIAC was...
This paper aims to provide a review of MEMS-Accelerometers different operating principles. At first variety of acceleration sensing and their basic principles as well as a brief overview of their fabrication mechanism will be discussed and lastly the paper will be focused on most commercialized...
Abstract The long-dreamed vision of “computing as a utility” has finally taken shape in the form of cloud computing. This paradigm shift is the biggest buzz in today’s computer world. The pay-as-you-go model of cloud attracts more and more customers towards it. As a result...
In an effort to understand the human mind, philosophers and scientists alike have looked towards complex technology to help explain psychological phenomena. In medieval times, philosophers compared the brain to a hydraulic pump, which was largely influenced by the prevalence of hydraulic systems as a...
Due to limited mobility, ill-stricken individuals have lots of free time. They have all the time to spend online in social media. The addictive nature of the browsing trend catches up with them. Spending much of the time in social forums such as Facebook leads...
Operation management can be defined as “a configuration of resources combined for the provision of goods or services” (Morris, 1978). It involves planning, organizing, and supervising processes, and make necessary improvements for higher profitability. There must be some adjustment in everyday operations to support the...
The term “robotics” was first coined by the legendary science fiction writer Sir Isaac Asimov in his 1941 short story “Liar!”. One of the first to see the vast potential of the up and coming technologies that were yet to see public approval or interest...
Internet Usage Statistics in Iran According to the latest statistics from the Internet World Stats (IWS) in June 2017, 56,700,000 Iranians are using the Internet in their daily lives, accounting for 70% of the population (Internet World Stats, 2017). This figure represents a 28% increase...
Net neutrality enforces internet service providers to enable access to all content and applications regardless of the source, and without favoring or blocking particular products or websites. Internet providers like Comcast & Verizon should not control what we see and do online. In 2015, Internet...
As vital to our lives, information technology is facing a number of serious problems and it is up to IT professionals and IT consumers to respond. As more emerging IT technologies become available on the market, most IT experts and users are unable to meet...
In today’s growing word cybersecurity is very necessary because, As technology provides many facilities to use it also some effects like security threats and cyber attacks. To protect the data from hankering and the cyber attacks we will require the cybersecurity. Cybersecurity is a process...