Architecture Essays (Examples)

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

...Architecture Enhancing Communication, migration from 4G to 5G
Aims and objectives
1. To determine how the migration from 4G to 5G will enhance Communication
The primary aim of the dissertation is to determine how the migration from 4G to 5G will enhance Communication. Migration to 5G is expected to bring various enhancements as compared to the 4G. These enhancements include low latencies, high speeds, low power consumption, enhanced reliability, and greater terminal device densities. Also, and perhaps the most important features of 5G is the new network capabilities that could allow several virtual networks with differential performance capabilities to be supported by a single physical network (Alkhazaali 2017). Given these capabilities, this paper aims to determine how Communication will be enhanced.
2. To identify some of the challenges of 5G
Experience has shown that technology, however, how advanced, has some peculiar limitations that make it vulnerable. As a result, this dissertation……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

Web 2 0 And Online Studio Education

Pages: 6 (1931 words) Sources: 5 Document Type:Research Paper Document #:53632130

...Architecture Online Studio Education
The rise of Web 2.0 Technologies paves the way to a collaborative and interactive learning environment making the exchange of content and collaboration over the web (Loannao, 2018). The internet, since then, started becoming the reservoir of knowledge, giving free access to information and educational resources (Loannao, 2018). Because of these developments, online courses and online education began and were incorporated in different educational fields as the means of expanding knowledge and enhancing the learning procedure (Loannao, 2018). Studio-based learning is the practical education where the learning is done through doing, relying on the jury system for evaluating and assessing the student’s projects (Siddiqi, 2002). The entire course is designed in the traditional pedagogy.
Online Studio Education is more than just a different teacher and student interaction format as it involves consistency within the educational resources as all the students receive the consistent course material and access……

References

References

Bender, D. M. (2006). Using Online Education Technologies to Support Studio Instruction. Educational Technology and Society.

Kurt, S. (2009). An analytic study on the traditional studio environments and the use of the constructivist studio in the architectural design education. Procedia Social and Behavioral Sciences, 401-408.

Loannao, O. (2018). Opening up design studio education using blended and networked formats. International Journal of Educational Technology in Higher Education.

Nottingham, A. (2014). Reshaping design education: teaching graphic design online and onsite. The University of Melbourne.

Pasin, B. (2017). Rethinking the Design Studio-Centered Architectural Education. A Case Study at Schools of Architecture in Turkey. The Design Journal.

Siddiqi, A. A. (2002). ARCHITECTURAL DESIGN STUDIO PROJECTS AND THE CHARADES OF CURRICULUM. The 6th Saudi Engineering Conference, KFUPM. Architecture Department, College of Environmental Design, KFUPM Dhahran.

Studyspark

Study Document Study Document

Cloud Computing And Cost Effectiveness

Pages: 5 (1591 words) Sources: 5 Document Type:Annotated Bibliography Document #:36737117

...Architecture A Study of how Cloud Computing related to Cost-Effectiveness
Annotated Bibliography
Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.
This article ascertains that the major reason why SMEs in Ireland adopt cloud computing is for cost-effectiveness. The study shows that cloud computing supports greater capacity levels and also protracted capabilities of the organization, devoid of incurring additional costs, which would have otherwise required investment in personnel training, infrastructure, and software. Also, a key feature of cloud computing is its capacity to diminish the financial burden that is placed on firms in technology adoption. The authors also demonstrate that cost reduction can be achieved through the capability to shift from a CAPEX cost structure to an OPEX one. Cloud computing also facilitates the utilization of resources as it eradicates the necessity for the organization……

References

References

Attaran, M. (2017). Cloud Computing Technology: Leveraging the Power of the Internet to Improve Business Performance. Journal of International Technology and Information Management, 26(1), 112 – 137.

Carcary, M., Doherty, E., & Conway, G. (2015). The adoption of cloud computing by Irish SMEs- an exploratory study. Electronic Journal of Information Systems Evaluation, 17(1), 3.

Elmonem, M. A. A., Nasr, E. S., & Geith, M. H. (2016). Benefits and challenges of cloud ERP systems–A systematic literature review. Future Computing and Informatics Journal, 1(1-2), 1-9.

Shankar, K. (2016). Effectiveness of Cloud Computing in Global Business. Journal of Applied Management-Jidnyasa, 8(1), 66-73.

Xue, C. T. S., & Xin, F. T. W. (2016). Benefits and challenges of the adoption of cloud computing in business. International Journal on Cloud Computing: Services and Architecture, 6(6), 01-15.

Studyspark

Study Document Study Document

Field Experience Report Observation In The Deaf Classroom

Pages: 9 (2606 words) Sources: 8 Document Type:Essay Document #:99266210

...Architecture Field Experience Report - Observation in the classroom at the school for the Deaf
Introduction
In the US, residential institutions of learning have had a long relationship with the deaf community. They are the centers where linguistic and cultural transmission takes place. The residential, educational institutions for deaf people serve learners at K-12 levels. They avail dormitories for learners who hail from far geographical distances. Usually, each state has built, at least, one residential program of education for the deaf (Romano, 2013). It has also been noted that large communities of the deaf usually settle near a residential school. A good number of states offer education programs that provide language services and training for the deaf, including a rich cultural environment where American Deaf learners are taught American Sign Language and English Bilingual instruction. Such settings are also referred to as deafcentric. Learners are enabled to interact with teachers, heads,……

References

References

Guardino, C., & Antia, S. D. (2012). Modifying the classroom environment to increase engagement and decrease disruption with students who are deaf or hard of hearing. Journal of Deaf Studies and Deaf Education, 17(4), 518-533.

Hombo, C. M. (2003). NAEP and No Child Left Behind: Technical challenges and practical solutions. Theory into Practice, 42(1), 59-65.

Jeffries Jr., R. L. (2010). A Case Study of a Teacher Implementing Guided Reading in a Deaf Classroom. ProQuest LLC.

Malik, A. M., Rashid, M., Awan, M. Y., & Alvi, I. B. (2018). The Role of Architecture in the Identification of Obstacles and Spatial Solutions to Inclusive Education. UMT Education Review (UER), 1(2), 39-58.

Renard, M. (1999). Les sourds dans la ville: surdités et accessibilité. ARDDS (Association pour la réadaptation et la défense des devenus-sourds).

Romano, A.M. (2013). Observing a Residential School for the Deaf: Identifying Factors in Creating a Deafcentric Environment. (The Honors Program, Gallaudet University).

Staten, F. D. (2011). Examining the influence of the residential school for the deaf experience on deaf identity. (Doctor of Philosophy thesis, University of Iowa).

Van Gent, T., Goedhart, A. W., Knoors, H. E., Westenberg, P. M., & Treffers, P. D. (2012). Self-concept and ego development in deaf adolescents: a comparative study. Journal of deaf studies and deaf education, 17(3), 333-351.

Studyspark

Study Document Study Document

The Cost Effectiveness In Cloud Computing Within An Accounting Organization

Pages: 15 (4615 words) Sources: 15 Document Type:Research Paper Document #:23416384

...Architecture The Cost Effectiveness of Cloud Computing within an Accounting Organization
Table of Contents
1 Introduction 4
1.1 Background 4
1.2 Significance of the Topic 4
1.3 Research Problem 5
1.4 Research Questions 5
1.5 Purpose of the Study 5
1.6 Methodology 5
1.7 Good Title for Study 5
2 Literature Review 6
2.1 Cloud Computing Definition 6
2.2 Types of Cloud Computing Services 6
2.2.1 Infrastructure as a Service (IaaS) 6
2.2.2 Platform as a Service (PaaS) 7
2.2.3 Software as a Service (SaaS) 7
2.3 Deployment of Organizational Cloud Services 8
2.3.1 Public Cloud 8
2.3.2 Private Cloud 8
2.3.3 Hybrid Cloud 9
2.4 Effectiveness of Cloud Computing 9
2.4.1 Cost-Savings 9
2.4.2 Remote Accessibility 10
2.4.3 Scalability and Flexibility 11
2.4.4 Security 11
2.4.5 Energy Efficiency 11
3 Methodology 12
3.1 Research Approach and Design 12
3.2 Data Collection Sources & Selection Plan 12
3.3 Proposed Interview Questions……

References

References

Bauer, E., & Adams, R. (2015). Reliability and availability of cloud computing. Hoboken: John Wiley & Sons.

Chang, W. Y., Abu-Amara, H., & Sanford, J. F. (2018). Transforming enterprise cloud services. New York: Springer Science & Business Media.

Chang, V. (Ed.). (2015). Delivery and adoption of cloud computing Services in Contemporary Organizations. IGI Global.

Hsien, W. F., Yang, C. C., & Hwang, M. S. (2016). A Survey of Public Auditing for Secure Data Storage in Cloud Computing. IJ Network Security, 18(1), 133-142.

Jamsa, K. (2016). Cloud computing. New York: Jones & Bartlett Publishers.

Maguire, M., & Delahunt, B. (2017). Doing a thematic analysis: A practical, step-by-step guide for learning and teaching scholars. AISHE-J: The All Ireland Journal of Teaching and Learning in Higher Education, 9(3).

Mehmood, R., Katib, S. S. I., & Chlamtac, I. (2020). Smart Infrastructure and Applications. New York: Springer International Publishing.

Prabhu, C. S. R. (2015). E-governance: concepts and case studies. New Delhi: PHI Learning Pvt. Ltd.

Studyspark

Study Document Study Document

Cyber Crime IT Security Auditing

Pages: 11 (3165 words) Sources: 7 Document Type:Research Paper Document #:36684821

… a 7-step process (Suduc et al., 2010), the steps being as follows: (1) vulnerability scanning – which entails scanning of infrastructure, (2) security architecture auditing – which involves auditing of extant security infrastructure, (3) report auditing – covering auditing of reports such as logs and unauthorized entry/breach ……

References

References

Almatari, O. and Helal, I., and Mazen, S., and El Hennawy, S. (2018). \\\\\\"Cybersecurity Tools for IS Auditing.\\\\\\" The 6th International Conference on Enterprise Systems, At Limassol, Cyprus 10.1109/ES.2018.00040.

Davis, W. S., & Yen, D. C. (Eds.). (2019). The information system consultant\\\\\\'s handbook: Systems analysis and design. CRC press.

Diamantopoulou, V., Tsohou, A., & Karyda, M. (2019). From ISO/IEC 27002: 2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance. In Computer Security (pp. 238-257). Springer, Cham.

Khan, M. (2017). Computer security in the human life. International Journal of Computer Science and Engineering (IJCSE), 6(1), 35-42.

Lenghel, R. D., & Vlad, M. P. (2017). INFORMATION SYSTEMS AUDITING. Quaestus, (11), 178.

Manaseer, S., & Alawneh, A. (2019). ON CYBERSECURITY AUDITING AWARENESS: CASE OF INFORMATION AND COMMUNICATION TECHNOLOGY SECTOR. International Journal of Computer Science and Information Security (IJCSIS), 17(7).

Suduc, A. M., Bîzoi, M., & Filip, F. G. (2010). Audit for information systems security. Informatica Economica, 14(1), 43.

Studyspark

Study Document Study Document

Firewalls And Filtering

Pages: 4 (1317 words) Sources: 4 Document Type:Research Paper Document #:22384393

...Architecture Cyber security tendencies have evolved into systems that are used for data security, mostly for big corporations which can afford the service. System vulnerability is one of the major concerns of organizations getting web servers, firewalls and security measures for their data. Technology companies burn the midnight oil trying to provide the highest level of security to databases, and a breach of security can be deemed a lapse by the technology company or that their security measures being ineffective. Hackers might send unauthorized packets of data including network inhibitors that might stall the ABC servers which contain online payment processing and customer data.
The best firewall recommended for this system is the next-generation system equipped with sophisticated security protocols for the deployment in the ABC system. It combines traditional firewall with other network devices that filter unauthorized network protocols. In a distributed system where traffic is passed through different nodes,……

References

References

Anderson, R. O. (1997). EMERGING CHALLENGE: SECURITY AND SAFETY IN CYBERSPACE. In R. O. Anderson, In Athena's Camp: Preparing for Conflict in the Information Age (pp. 231–252). RAND corporation.

Martin C. Libicki, L. A. (2015). The Efficacy of Security Systems. In L. A. Martin C. Libicki, The Defender’s Dilemma: Charting a Course Toward Cybersecurity (pp. 23-40). Santa Monica: RAND Corporation.

Mays, J. (2018, September 24). Understanding Load Balancing for Web Servers. Retrieved from Liquid Web:  https://www.liquidweb.com/kb/understanding-load-balancing/ 

Thu, A. A. (2013). Integrated Intrusion Detection and Prevention System with Honeypot on Cloud Computing Environment. International Journal of Computer Applications, 9-13.

Studyspark

Study Document Study Document

Myth In Anthropology Study Religion

Pages: 3 (1014 words) Sources: 3 Document Type:Essay Document #:69116947

...Architecture One of the most ubiquitous features of human culture, myth relies on storytelling as its primary vehicles. As a type of storytelling, myth depends on symbolism, which is why the substantive nature of a myth remains the same even when the details of the story may change or assume new meaning when it is applied to another society or historical epoch. The cross-cultural study of myths may explore similarities and differences between the overarching narratives told in different societies. Or, focusing on one society, an anthropologist might demonstrate how myth functions as a means of perpetuating the norms and values that bind together members of the community. Moreover, anthropologists study the way myth embeds itself into dimensions of culture such as art, music, language, or politics. Myth embodies meaning, adding tremendous weight to the differentiation between the sacred and profane aspects of life. Ultimately, myth is integral to the construction……

References

Bibliography

Eliade Mircea. “Myth.”

Eller, Jack David. “Studying Religion Anthropologically.”

Lee, Dorothy. “Religious Perspectives in Anthropology.”

Lewis, M. “The Anthropologists’ Encounter with the Supernatural.”

Malinowski, Bronislaw. “Rational Mastery by Man of His Surroundings\\\\"

Nash, June. \\\\"Devils, Witches and Sudden Death\\\\"

Turner, Victor W. “Religious Specialists.”

Studyspark

Study Document Study Document

Jesse Imeson Criminal Behavior

Pages: 7 (2025 words) Sources: 8 Document Type:Research Paper Document #:27881804

...Architecture Background and Biographical Data
The case of Jesse Norman Imeson reveals the possible connections between childhood upbringing, childhood trauma, and psychological characteristics on criminal behavior. While childhood experiences can never be used to condone violence or criminality, understanding the correlation between these factors may help identify early warning signs or risk factors that can then be used in crime prevention strategies. The story of Jesse Imeson gripped Canada because it involved the heinous killing of three individuals in the summer of 2007. Imeson was apprehended at age 22, pled guilty to all three counts of second-degree murder in 2008, and was sentenced to life in prison.
Jesse was the oldest of three children in the Imeson family. Until the first known traumatic event that occurred in Imeson’s early life, he was described by babysitters and friends as being “likeable,” “adventurous,” “happy,” and “wide-eyed...always smiling” boy who just wanted “to have……

References

References

Bartol, C. R., & Bartol, A, M. (2018). Criminal behavior: A psychological approach. Boston, MA: Pearson Learning Solutions.

“Jesse Imeson charged in death of Windsor man,” (2007). CTV News. Retrieved from:  https://www.ctvnews.ca/jesse-imeson-charged-in-death-of-windsor-man-1.251008 

Lessard, C. (2008). So, why did he do it? Grand Bend Strip. Retrieved from:  https://grandbendstrip.com/2008/11/so-why-did-he-do-it/ 

“LFP Archives: The hunt for, and truth about, spree killer Jesse Imeson,” (2018). The London Free Press. Retrieved from:  https://lfpress.com/news/local-news/lfp-archives-the-hunt-for-and-truth-about-spree-killer-jesse-imeson 

“Man who killed elderly couple and bartender has appeal rejected by Supreme Court,” (2019). CBC. Retrieved from:  https://www.cbc.ca/news/canada/london/man-who-killed-elderly-couple-and-bartender-has-appeal-rejected-by-supreme-court-1.5129542 

Mellor, L. (2013). Rampage. Toronto, Ontario: Dundurn

Paiva, M. (2019). Windsor murderer claims he was sexually abused. iHeart Radio. Retrieved from:  http://www.iheartradio.ca/purecountry/bc-north/windsor-murderer-claims-he-was-sexually-abused-1.9198384 

Perkel, C. (2018). Family of victims lash out as smirking killer gets life sentence. The Globe and Mail. Retrieved from:  https://www.theglobeandmail.com/news/national/family-of-victims-lash-out-as-smirking-killer-gets-life-sentence/article1350382/

Improve your studying and writing skills

We have over 150,000+ study documents to help you.

Join thousands of other students and

"spark your studies".