Mobile Communication Essays (Examples)

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

Enhancing communication, migration from 4G to 5G
Aims and objectives
1. To determine how the migration from 4G to 5G will enhance communication
The primary aim of the dissertation is to determine how the migration from 4G to 5G will enhance communication. Migration to 5G is expected to bring various enhancements as compared to the 4G. These enhancements include low latencies, high speeds, low power … with differential performance capabilities to be supported by a single physical network (Alkhazaali 2017). Given these capabilities, this paper aims to determine how communication will be enhanced.
2. To identify some of the challenges of 5G
Experience has shown that technology, however, how advanced, has some peculiar … seek to identify challenges that are attached to migration from 4G to 5G. 5G is a term that is used to refer to communication values that are beyond 4G standards, and the projections for an umbrella……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

Chapter 1: Introduction
Wireless communication are, to any extent, the most rapidly growing section of the communication sector. For this reason, it has seized the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et … the consideration and responsiveness of the media and the imaginings of the general public (Ijemaru et al., 2018). In the past decade, cellular communication systems have faced exponential growth and development and there exist billions of users all over the globe. Statistics indicate that by the culmination … over the globe. Statistics indicate that by the culmination of 2018, there were approximately 5.1 billion individuals across the globe that subscribed to mobile services, and this signified approximately 67 percent of the world’s populace. Furthermore, the statistics indicate that more than 60 percent of the population … the statistics indicate that more than 60 percent of the population in the……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Studyspark

Study Document Study Document

Impacts Of Long Distance Relationships On Interpersonal Communication

Pages: 6 (1902 words) Sources: 6 Document Type:Research Paper Document #:90404057

What are the Impacts of Long-Distance Relationships on Interpersonal communication?
Introduction
Long-distance relationships can essentially go one of two ways: they can make relationships stronger and fortify the bond between people, or they … relationship to be sustained. One of the major factors in determining which way the long-distance relationship will go is the factor of interpersonal communication and what the two parties expect, need and can deliver. If the distance cannot meet expectations or needs and support delivery, the interpersonal … and what the two parties expect, need and can deliver. If the distance cannot meet expectations or needs and support delivery, the interpersonal communication variable is likely to be negatively impacted. This paper will explain how it depends completely upon what type of communication is needed by the individuals in the long-distance relationship and what kind of relationship they have had in the past. Distance is unlikely ………

References

References

Etcheverry, P. E., & Le, B. (2005). Thinking about commitment: Accessibility of commitment and prediction of relationship persistence, accommodation, and willingness to sacrifice. Personal Relationships, 12(1), 103-123.

Farrell, J. E., Hook, J. N., Ramos, M., Davis, D. E., Van Tongeren, D. R., & Ruiz, J. M. (2015). Humility and relationship outcomes in couples: The mediating role of commitment. Couple and Family Psychology: Research and Practice, 4(1), 14.

Johnson, A. J. (2001). Examining the maintenance of friendships: Are there differences

between geographically close and long?distance friends?. Communication Quarterly, 49(4), 424-435.

Johnson, A. J., Haigh, M. M., Becker, J. A., Craig, E. A., & Wigley, S. (2008). College students’ use of relational management strategies in email in long-distance and geographically close relationships. Journal of Computer-mediated communication, 13(2), 381-404.

Keller, M. (2013). Social media and interpersonal communication. Social Work Today, 13(3), 10.

Maguire, K. C., & Kinney, T. A. (2010). When distance is problematic: Communication, coping, and relational satisfaction in female college students' long-distance dating relationships. Journal of Applied Communication Research, 38(1), 27-46.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… from everyday objects to provide real-time analyses and new applications for these technologies are being developed every day. Indeed, there are already more mobile devices in use around the world than there are people, and most authorities agree that the Internet of Things deployments will continue to … many businesses at present is the Internet of Things or IoT. For example, according to An and Wang (2018), “After the Internet and mobile communication network, the Internet of Things has become an important trend in the development of information technology, greatly promoting the reform of the information … advantage, especially in an increasingly globalized marketplace (Schaffhauser, 2018).
Some of the most important features of IoT applications include the fact that conventional mobile devices such as smartphones, various types of personal computers, video systems and other handheld devices as well as objects that have traditionally not … ways. As Kaushik (2019)……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

Studyspark

Study Document Study Document

Competitive Advantage And Operations Management

Pages: 8 (2415 words) Sources: 6 Document Type:Research Paper Document #:99381670

… This in turn allowed Apple to innovate at a rapid pace and become the leader in consumer electronics during several critical years when mobile communication were entering the mainstream. The result is that today Apple still has a decent market share in a number of products, a massive ……

References

References

Deshmukh, G. & Das, R. (2012) Consumer buying behaviour for high involvement products. Asian Journal of Management. Vol. 3 (3) 153-157.

Halton, C. (2019) Credence good. Investopedia. Retrieved March 26, 2020 from https://www.investopedia.com/terms/c/credence-good.asp

Interbrand (2019) Best global brands. Interbrand Retrieved March 26, 2020 from https://www.interbrand.com/best-brands/best-global-brands/2019/ranking/

QSR (2017) The QSR Top 50. QSR Magazine. Retrieved March 26, 2020 from  https://www.qsrmagazine.com/content/qsr-50 

QuickMBA (2010) The value chain. QuickMBA.com. Retrieved March 26, 2020 from  http://www.quickmba.com/strategy/value-chain/ 

Zhang, B. (2018) The 10 best airlines to fly in North America. Business Insider. Retrieved March 26, 2020 from  https://www.businessinsider.com/best-airlines-in-north-america-for-2018-skytrax-2018-10 

Studyspark

Study Document Study Document

Twitter External Internal Analysis Report To CEO

Pages: 15 (4857 words) Sources: 1 Document Type:Essay Document #:23822356

… character constraint. The popularity of internet and social media devices has allowed social media companies to ensure that their platform is optimized for mobile devices. Encouraging real-time interactions. (C-141)
1.3.3. Global celebrities like Rihanna, Lady Gaga, Jimmy Fallon, and Taylor Swift use Twitter to communicate with their … million (C-143)
1.5. Ecological
1.5.1. Data centres require electricity and total energy use is increasing. (C-142)
1.5.2. In order to access social media, mobile phones and laptops are often used. These devices have their own carbon footprint.
1.6. Legal
1.6.1. Freedom of speech is suppressed in Jared …
· Twitter's global platform allows users to instantly share real-time breaking news, clip opinions, and knowledge and can be accessed using desktop or mobile web browsers (C-142).
3.2 Marketing and Sales
· It is the second major primary activity of Twitter.
· In 2017, sales and marketing … new apps and products to……

References

References

Thompson, Arthur A.,. (2015). Crafting and Executing Strategy: Concepts and Readings..New York: McGraw-Hill Education, (pp. 138-148)

Studyspark

Study Document Study Document

Privacy In Social Networks Regarding Machine Learning

Pages: 8 (2537 words) Sources: 10 Document Type:Research Paper Document #:98311751

… and information sharing may seem like two diametrically opposed concepts in the context of social media, and to a high degree they are. mobile devices allow users to set information sharing settings that allow algorithms on other applications to identify a person’s location, habits, and view other ……

References

References

Balle, B., Gascón, A., Ohrimenko, O., Raykova, M., Schoppmmann, P., & Troncoso, C. (2019, November). PPML\\\\\\\\\\\\'19: Privacy Preserving Machine Learning. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (pp. 2717-2718). ACM.

Bilogrevic, I., Huguenin, K., Agir, B., Jadliwala, M., Gazaki, M., & Hubaux, J. P. (2016). A machine-learning based approach to privacy-aware information-sharing in mobile social networks. Pervasive and Mobile Computing, 25, 125-142.

Bonawitz, K., Ivanov, V., Kreuter, B., Marcedone, A., McMahan, H. B., Patel, S., ... & Seth, K. (2017, October). Practical secure aggregation for privacy-preserving machine learning. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (pp. 1175-1191). ACM.

Hunt, T., Song, C., Shokri, R., Shmatikov, V., & Witchel, E. (2018). Chiron: Privacy-preserving machine learning as a service. arXiv preprint arXiv:1803.05961.

Lindsey, N. (2019). New Research Study Shows That Social Media Privacy Might Not Be Possible. Retrieved from https://www.cpomagazine.com/data-privacy/new-research-study-shows-that-social-media-privacy-might-not-be-possible/

Mohassel, P., & Zhang, Y. (2017, May). Secureml: A system for scalable privacy-preserving machine learning. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 19-38). IEEE.

Mooney, S. J., & Pejaver, V. (2018). Big data in public health: terminology, machine learning, and privacy. Annual review of public health, 39, 95-112.

Oh, S. J., Benenson, R., Fritz, M., & Schiele, B. (2016, October). Faceless person recognition: Privacy implications in social media. In European Conference on Computer Vision (pp. 19-35). Springer, Cham.

Studyspark

Study Document Study Document

Data Security Using RFID Bands At Music Festivals

Pages: 5 (1616 words) Sources: 6 Document Type:Essay Document #:97930410

...Mobile communication The radio frequency identification or RFID is the new technological method for quick identification of the user, especially if used for public events like music festivals. It makes data management easier, so that information about the attendees is managed technically by capturing data from scanners and transmitting it to the computer without the user's physical contact. This paper is about managing adult attendees at music festivals whose information would be stored in RFID wrist bands linked to their Twitter, Facebook, and credit/debit bank cards. The following sections would probe into its compliance issues and the related regulations that would impact the planned implementation.
Analysis
Description of the Chosen Use Case
RFID wrist bands would be used for managing adult attendees at a music festival at a hotel where bands would be linked to their Twitter and Facebook accounts and their bank credit/debit cards so that the buying of eatables is……

References

References

Event Tribe. (n.a.). The top 10 benefits of using RFID for events. Retrieved from  https://www.eventbrite.com/blog/academy/the-top-10-benefits-of-using-rfid-for-events/ 

ID&C. (n.a.). How to RFID wristbands work? Retrieved from  https://www.idcband.com/blog/how-do-rfid-wristbands-work/ 

Kacicki, T. (2019, July 15). 4 commonly overlooked facts about RFID wristbands. Intellitix. Retrieved from  https://intellitix.com/hub/four-commonly-overlooked-facts-rfid 

OECD. (2008). OECD policy guideline on RFID.  https://www.oecd.org/sti/ieconomy/40892347.pdf 

Quirk, R.E. & Borrello, S.J. (2005). RFID: Rapid deployment and regulatory challenges. Retrieved from  https://www.pharmamanufacturing.com/assets/Media/MediaManager/VenableRFIDpaper.pdf?SESSID=62935cf41f5a19909f5bb3ae3a598490 

Williamson, A., Tsay, L., Kateeb, I.A. & Burton, L. (2013). Solutions for RFID smart tagged card security vulnerabilities. AASRI Procedia, 4, 282-287. DOI: 10.1016/j.aasri.2013.10.042

Studyspark

Study Document Study Document

COVID 19 In South Africa Nigeria And Swaziland

Pages: 7 (2030 words) Sources: 6 Document Type:literature review Document #:53851517

… theory gives an understanding of how institutions are shaped, and the societal norms and frameworks are informed to all people of an organization. communication is the sole indicator of how organizations are formulated with the help of formal rules and regulations, as that would reflect how they ……

References

References

Coelho, A. (2019). The role of informal institutions in the enforcement of rules and how to improve corporate and public governance in Brazil: Studies based on a set of corporate governance cases involving state-owned companies (Working Paper). Retrieved from SSRN website  https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3434037 

Dacin, M.T., Goodstein, J. & Scott, W.R. (2002). Institutional theory and institutional change: Introduction to the special research forum. Academy of Management Journal, 45(1), 45- 47. DOI: 10.2307/3069284

Escandon-Barbosa, D.M., Urbano, D., Hurtado-Ayala, A., Paramo, J.S. & Dominguez, A.Z. (2019). Formal institutions, informal institutions, and entrepreneurial activity: A comparative relationship between rural and urban areas in Colombia. Journal of Urban Management, 8(3), 458-471.  https://doi.org/10.1016/j.jum.2019.06.002 

Estrin, S. & Prevezer, M. (2010). The role of informal institutions in corporate governance: Brazil, Russia, India, and China compared. Asia Pacific Journal of Management, 28, 41- 67.  https://doi.org/10.1007/s10490-010-9229-1 

Kaufmann, W., Hooghiemstra, R. & Feeney, M.K. (2018). Formal institutions, informal institutions, and red tape: A comparative study. Public Administration, 96(2), 386-403. https://doi.org/10.1111/padm.12397

Meluch, A.L. (2016, August). Understanding the organizational and institutional origins of social support in a cancer support center. (Unpublished doctoral dissertation). Retrieved from https://etd.ohiolink.edu/!etd.send_file?accession=kent1466944822&disposition=inline

Torniainen, T.J. & Sasstamoinen, O.J. (2007). Formal and informal institutions and their hierarchy in the regulation of the forest lease in Russia. Forestry: An International Journal of Forest Research, 80(5), 489-501.  https://doi.org/10.1093/forestry/cpm033 

Studyspark

Study Document Study Document

Clinical Informatics

Pages: 11 (3264 words) Sources: 12 Document Type:Essay Document #:78574553

… that patients need.
Conclusion
Technology is changing the way that health care is provided in the 21st century. Information technology, EMR, telehealth, and communication systems are just some of the ways in which nursing is adapting. Collaborative care, continuity of care, and reduction of nursing errors are ……

References

References

Cho, O. M., Kim, H., Lee, Y. W., & Cho, I. (2016). Clinical alarms in intensive care units: Perceived obstacles of alarm management and alarm fatigue in nurses. Healthcare informatics research, 22(1), 46-53.

Effken, J., Weaver, C., Cochran, K., Androwich, I., & O’Brien, A. (2016). Toward a central repository for sharing nursing informatics’ best practices. CIN: Computers, Informatics, Nursing, 34(6), 245-246.

Elsayed, W. A., Hussein, F. M., & Othman, W. N. (2017). Relation between nursing informatics competency and nurses’ attitude toward evidence-based practice among qualified nurses at Mansoura Oncology Center. International Journal of Nursing Didactics, 7(6), 26-33.

Drolet, B. C., Marwaha, J. S., Hyatt, B., Blazar, P. E., & Lifchez, S. D. (2017). Electronic communication of protected health information: privacy, security, and HIPAA compliance. The Journal of hand surgery, 42(6), 411-416.

Haupeltshofer, A., Egerer, V., & Seeling, S. (2020). Promoting health literacy: What potential does nursing informatics offer to support older adults in the use of technology? A scoping review. Health Informatics Journal, 1460458220933417.

Kharbanda, E. O., Asche, S. E., Sinaiko, A. R., Ekstrom, H. L., Nordin, J. D., Sherwood, N. E., & O’Connor, P. (2018). Clinical decision support for recognition and management of hypertension: a randomized trial. Pediatrics, 141(2).

Khezri, H., & Abdekhoda, M. (2019). Assessing nurses’ informatics competency and identifying its related factors. Journal of Research in Nursing, 24(7), 529-538.

Kleib, M., & Nagle, L. (2018). Factors associated with Canadian nurses\\\\\\\\\\\\' informatics competency. CIN: Computers, Informatics, Nursing, 36(8), 406-415.

Join thousands of other students and

"spark your studies".