Do teachers change when they are evaluated? Do parents worry about their kids being in school? Have many students been accused of something they didn’t do? All of these problems can be eliminated with one little piece of technology hanging from the ceiling. Cameras have...
Quantum computing is the area of study focused on the development and developing computer technologies based on the quantum theory. The quantum theory is a theory which explains the nature and behaviour of energy and matter on a quantum (atomic and subatomic) level. Over time...
After the hack that affected the Japanese cryptocurrency exchange, Coincheck on January 26, Coincheck announced it was going to have to pay back more than $500m to the 260, 000 customers that were affected. The attack has been termed, “The Biggest Digital Currency Theft In...
Nowadays there is so much competition among every business sector due to the rapid increase in the mobile applications, not only you require an extremely functioning app, but also need an excellent marketing approach to attract the audience in a very efficient manner. If you...
Today I am going to compare and explain each of the layers in both the OSI and TCP/IP models. First I will be talking about the OSI model. The OSI (Open systems interconnection model) model has 7 layers from the Physical layer to the Application...
To know about STP (Spanning Tree Protocol) and also known as Spanning Tree Algorithm (SPA). It is a layer 2 protocol which usually runs on all the switches or bridges and also its specification is that, it is an IEEE 802.1 D. as we know...
Mobile marketing is promotional activity designed for delivery to cell phones, smartphones and other handheld devices. Usually, mobile marketing is used as a component of a multi-channel campaign. Moreover, Mobile advertising is a form of advertising via mobile (wireless) phones or other mobile devices. It...
In this experiment, I implemented spanning tree protocol which is a layer 2 protocol. Spanning tree protocol was invented by Radia Perlman to avoid loops in the network. Spanning tree protocol helps to avoid loops in case of redundant paths. Loops are avoided in spanning...
A day without Internet would feel like we have travelled back to the past, where we are so primitive, we are left with a great void, absence of Information. Technology has developed to a stage where we started feeling Incomplete without it, our engineers strive...
Drones are small flying robots which have, till recently, been used either as cheap toys or as expensive weapons. They were either small, spider-like devices that could sometimes be seen flying around in parks or on beaches, or large military planes that dealt with shooting...
Search Engine Optimization or SEO is a process to create more traffic to a website with the help of specialized techniques. Some website has a better ranking than the other, why is it that certain website ranks higher than the other. It is because of...
What Is Cryptocurrency? The word ‘crypto’ comes from the Greek word meaning ‘hidden’; ‘crypt’ translates as ‘hiding place’. These form a private, hidden and secure currency. Cryptocurrency is a decentralized currency that uses peer-to-peer technology, which enables all functions such as currency issuance, transaction processing...
No doubt, national security is a big challenge and very important for any country, especially for the United States in the 21st century. Due to the US government data breaches in the past and great security concern, the federal government (Trump administration) is considering a...
Ms. Jelinek Pi says he spent 227 days as a castaway at sea. Back on the raft and lifeboat, Pi kept himself busy with tasks. His daily schedule includes chores and activities. He fed himself and Richard Parker, kept the vessel functioning smoothly, and stimulated...
Today, we’re going to talk about the future of drones and how they will impact society. Everyone’s favorite mad scientist Nikola Telsa invented the RC-boat in 1898. But one of the first mass-produced, unmanned aerial drones was the Radioplane. It was a small remote-controlled plane...
Microstrip antenna is being extensively used in mobile and other hand held communication devices. The microstrip antenna can be fabricated on the same printed circuit board containing the electronic components of the device. This leads to efficient use of the available space and making the...
As our daily lives become more and more dependent on Internet-based tools and services, and as those platforms accumulate more of our most sensitive data, the demand grows for experts in the field of cybersecurity. The core functionality of cybersecurity involves protecting information and systems...
For any linear program (LP) it is possible to formulate a partner LP using the same data, and the solution to either the original LP (the primal) or the partner (the dual) provides the same information about the problem being modelled. DEA is no exception...
Introducition A cryptocurrency is a digital asset in which encryption techniques are used to regulate the generation of units of currency designed to work as a medium of exchange that uses cryptography to secure its transactions, to control the creation of additional units, verify the...