Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Technology

Journal

Discipline
Institution
Publication Year
Publication

Articles 1 - 11 of 11

Full-Text Articles in Computer Engineering

News - Screven-Jenkins Regional Library, Sharon Blank Jan 2019

News - Screven-Jenkins Regional Library, Sharon Blank

Georgia Library Quarterly

No abstract provided.


Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez Jan 2019

Big Five Technologies In Aeronautical Engineering Education: Scoping Review, Ruth Martinez-Lopez

International Journal of Aviation, Aeronautics, and Aerospace

The constant demands that technology creates in aerospace engineering also influence education. The identification of the technologies with practical application in aerospace engineering is of current interest to decision makers in both universities and industry. A social network approach enhances this scoping review of the research literature to identify the main topics using the Big Five technologies in aerospace engineering education. The conceptual structure of the dataset (n=447) was analyzed from different approaches: at macro-level, a comparative of the digital technology identified by cluster analysis with the number of co-words established in 3 and 8 and, a keyword central ...


Me2b Jul 2018

Me2b

SIGNED: The Magazine of The Hong Kong Design Institute

Fixing the internet's biggest flaw


The Viability Of Quantum Computing, Brennan Michael King May 2018

The Viability Of Quantum Computing, Brennan Michael King

Missouri S&T’s Peer to Peer

Quantum computing is an upcoming computational technology that could be the key to advancing the field and ushering in a new era of innovation. In this paper examines the viability of quantum computing extensively using only highly credible peer-reviewed articles from the last few years. These peer-reviewed articles will provide relevant facts and data from prominent researchers in the field of computer engineering. A growing problem in the field of electronics and computers is the concept of Moore’s law. Moore’s law refers to the doubling of transistors every two years in integrated circuits. Recent research has suggested that ...


Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson Oct 2017

Answering Food Insecurity: Serving The Community With Food And Knowledge Using Technology, Courtney Simpson

Purdue Journal of Service-Learning and International Engagement

The courses of Tech120, CGT110, and ENGT 180/181 and Red Gold at Purdue collaborated to design a robot that would plant and water a garden for a local community charter school. The students centered the project on the users’ needs for fresh food, nutrition education, and early exposure to STEM for children. The school, Anderson Preparatory Academy (APA), is comprised of many children who come from low-income families and are in the free or reduced lunch program. Inspired from “Farm Bot,” a similar system that allows for almost hands-free gardening, the “Boiler Bot” is designed to be scalable so ...


When Big Data Gets Too Big Sep 2017

When Big Data Gets Too Big

SIGNED: The Magazine of The Hong Kong Design Institute

Computer modelling has long been used as a design tool, and big data is a massive resource on which to build these models. But when the datasets get too big for computers to handle, innovative design solutions are needed. And the urge to play has driven technology forward


Table Of Contents Jan 2016

Table Of Contents

Journal of International Technology and Information Management

Table of Contents for Volume 25 Number 4


Table Of Contents Jan 2015

Table Of Contents

Journal of International Technology and Information Management

No abstract provided.


From The Desk Of The Editor Jan 2015

From The Desk Of The Editor

Journal of International Technology and Information Management

No abstract provided.


The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea Jan 2015

The "Bring Your Own Device" Conundrum For Organizations And Investigators: An Examination Of The Policy And Legal Concerns In Light Of Investigatory Challenges, Carla J. Utter, Alan Rea

Journal of Digital Forensics, Security and Law

In recent years, with the expansion of technology and the desire to downsize costs within the corporate culture, the technology trend has steered towards the integration of personally owned mobile devices (i.e. smartphones) within the corporate and enterprise environment. The movement, known as “Bring Your Own Device” (hereinafter referred to as “BYOD”), seeks to minimize or eliminate the need for two separate and distinct mobile devices for one employee. While taken at face value this trend seems favorable, the corporate policy and legal implications of the implementation of BYOD are further complicated by significant investigatory issues that far outweigh ...


Computers And Robotics, Wayne Tinga Jun 1985

Computers And Robotics, Wayne Tinga

Pro Rege

No abstract provided.