As the digital economy becomes all-pervasive, there is a demand for everything to be adaptive, autonomous, and self-learning. In a truly digital world, there is no place for human errors, and no place either for people in repetitive and mundane tasks. The future is autonomous...
Introduction When getting past a crowd to go wherever they want to, people normally navigate the distance safely without giving a thought to what they are doing. They learn from the actions of other people and take note of any obstacles to avoid. On the...
In distributed systems, data sharing is supported by the Distributed Shared Memory (DSM) systems for multiple process networks. This paper mainly concentrates on the Multi-Threaded DSM systems that support data communication and computational synchronization in multi-threaded systems. Also, the distributed shared memory system reconsiders the...
Abstract Conventional systems are inundated by the unconventional characteristics of Big Data and provide several opportunities for researchers to explore avenues coupled with Big Data research. Semantic Web provides constructs for associating semantics or meaning to data and can be employed to express and query...
Abstract 3D concrete printing is the most revolutionary idea in the field of concrete technology to get a breakthrough instead of diversified constraints. it promises to be highly advantageous in terms of time and economical effeciency, accuracy, less manual labour etc. it mainly works on...
Introduction Used in business, autonomous artificial intelligence and alternative fields, 3D imaging provides terribly elaborated and valuable data regarding the setting or examined objects. Particularly in mobile artificial intelligence, 3D vision has become the world of interest of the many researchers and diverse imaging and...
Introduction Information and communications technology (ICT) has become an essential learning tool for college students, Business and information technology employees these days. While ICT may be found to improve learning effectiveness and efficiency, unethical use of ICT may also be found to be a problem....
Abstract One of the most important tools used to secure networks is firewalls. A firewall can be hardware or software. It filters all network traffic to prevent unauthorized access between computer networks. Other types of network security are access control, antivirus and antimalware, data loss...
The purpose of this paper is to study and describe the principles of strategic, environmentally sustainable site selection and development, studying the impact of technology trends. Site faculty or development laborers will spend a large portion of the development time inside building locales. In the...
Securing the sensitive information is very essential in this modern world. Impart authoritative necessities and desires to staff in both beginning and continuous ways to make a genuine endeavor at getting the word out to staff, however don’t be excessively genuine in its introduction. Much...
Computers, as much as it might seem, have not been around for long period of time. Changing the human society since the 20th century, they have impacted the world in many ways and is a step forward into the future for mankind. Having many purposes,...
Manufacturing sector has conventionally been considered as the backbone of economic development and impacts the social, environmental and political well-being of any nation. Over the course of last two centuries, this industry has evolved by leaps and bounds, thanks to scientific advances, globalization effect and...
Introduction Robo-advisors are automated investment solutions which actively engage individuals with the digital resources and tools to guide them through their investment decision by making and managing their portfolios through techniques which uses algorithm. The role of advisors had an established view over the last...
Introduction Speech recognition is the capacity of a machine, database or program to recognize phrases, expressions or words in the spoken language and translate them to a machine-readable layout. The detection of non-native speakers’ dialog is, by itself, a very stimulating task. The discourse of...
Earlier this month, Bloomberg issued an alarming report alleging that Chinese manufacturers installed malicious microchips in computer equipment destined for U. S. tech companies, such as Amazon and Apple. This same article even insinuated that some of the effected equipment made its way into the...
In today’s world, the number of attacks and cyber threats are on the increase. With more and more technologies evolving, vulnerabilities are on the rise that attackers can exploit. One of the key points to note is that human factor is one of the top...
The strength of technology, its problems and potential deserves our deliberate reflection. Technology can be an aid or a hindrance to our personal and communal spiritual education, by steering our wishes and influencing our experience of time. Technology is often characterized by speed and efficiency,...
Cоuld Bitсоin bе the futurе оf оnlinе currency? This is juѕt one оf thе questions, frequently аѕkеd аbоut Bitcoin. Bitcoin is a tуре оf еlесtrоniс currency (CrурtоCurrеnсу) thаt iѕ аutоnоmоuѕ frоm trаditiоnаl bаnking and came intо сirсulаtiоn in 2009. Aссоrding tо some of thе tор...
Artificial Intelligence (AI) has emerged as one of the most transformative technologies of our time, holding the potential to revolutionize industries and enhance our everyday lives. Yet, with its rapid development, a pressing question arises: Can AI possibly replace the human brain? This essay explores...