Our life truly has turned out to be substantially less demanding. Today gadgets are everywhere with us: at home, in the workplace, in instructive establishments. PCs opened up a universe of new doors previously us and they made life more agreeable, spared our chance. Everything...
The year 2018 was really special and full of adventurous event year for me because I became an adult, graduated my high school and entered the University. Although all that events were interesting, living without my family in a new hometown was a real challenge...
Aritifical Intellignece can replace human work. Ther are forecasts discussing a large nuber of jobless individuals in the following decades primarily because of AI system. Regardless, the while economic framework is entering a period of quickening change: markets, organization, training, governmnet, social welfare and business...
Multi-threading has emerged as promising and effective avenue in tolerating memory latency. The process of implementation is majorly distinguished into two types that is used to share memory units among the processors. First approach is the hardware approach which uses the shared memory machines; other...
Introduction On March 29, 2014, Michael Thomsen published an article entitled “Gamifying the classroom is a bad idea,” which discusses how educational video games can be more harmful than helpful. The article examines the issue of video games’ simplification of students’ cognitive performance because students’...
Introducing myself, I am Aastha Bajgain, born in 4th of June 2000, I am a permanent resident of Sundarharaincha Municipality, ward number 12, Morang, Nepal. I belong to a nuclear family with four members: Father, Mother, Elder brother and me. My brother has currently completed...
Introduction With the explosion of computers and of the internet in our everyday lives, the need for trustworthy computer security gradually increases. Biometric technologies provide user friendly and trustworthy control methodology for access to computer systems, networks and workplaces. The majority of research is expected...
As the digital economy becomes all-pervasive, there is a demand for everything to be adaptive, autonomous, and self-learning. In a truly digital world, there is no place for human errors, and no place either for people in repetitive and mundane tasks. The future is autonomous...
Introduction When getting past a crowd to go wherever they want to, people normally navigate the distance safely without giving a thought to what they are doing. They learn from the actions of other people and take note of any obstacles to avoid. On the...
In distributed systems, data sharing is supported by the Distributed Shared Memory (DSM) systems for multiple process networks. This paper mainly concentrates on the Multi-Threaded DSM systems that support data communication and computational synchronization in multi-threaded systems. Also, the distributed shared memory system reconsiders the...
Abstract Conventional systems are inundated by the unconventional characteristics of Big Data and provide several opportunities for researchers to explore avenues coupled with Big Data research. Semantic Web provides constructs for associating semantics or meaning to data and can be employed to express and query...
Abstract 3D concrete printing is the most revolutionary idea in the field of concrete technology to get a breakthrough instead of diversified constraints. it promises to be highly advantageous in terms of time and economical effeciency, accuracy, less manual labour etc. it mainly works on...
Introduction Used in business, autonomous artificial intelligence and alternative fields, 3D imaging provides terribly elaborated and valuable data regarding the setting or examined objects. Particularly in mobile artificial intelligence, 3D vision has become the world of interest of the many researchers and diverse imaging and...
Introduction Information and communications technology (ICT) has become an essential learning tool for college students, Business and information technology employees these days. While ICT may be found to improve learning effectiveness and efficiency, unethical use of ICT may also be found to be a problem....
Abstract One of the most important tools used to secure networks is firewalls. A firewall can be hardware or software. It filters all network traffic to prevent unauthorized access between computer networks. Other types of network security are access control, antivirus and antimalware, data loss...
The purpose of this paper is to study and describe the principles of strategic, environmentally sustainable site selection and development, studying the impact of technology trends. Site faculty or development laborers will spend a large portion of the development time inside building locales. In the...
Securing the sensitive information is very essential in this modern world. Impart authoritative necessities and desires to staff in both beginning and continuous ways to make a genuine endeavor at getting the word out to staff, however don’t be excessively genuine in its introduction. Much...
Computers, as much as it might seem, have not been around for long period of time. Changing the human society since the 20th century, they have impacted the world in many ways and is a step forward into the future for mankind. Having many purposes,...
Manufacturing sector has conventionally been considered as the backbone of economic development and impacts the social, environmental and political well-being of any nation. Over the course of last two centuries, this industry has evolved by leaps and bounds, thanks to scientific advances, globalization effect and...