Wireless Technology Essays (Examples)

Studyspark

Study Document Study Document

Starbucks Use Of Wireless Technology

Pages: 2 (686 words) Sources: 5 Document Type:Term Paper Document #:87468045

… this world of technological advancement, companies are trying to gain competitive advantage through using unique ways of reaching out to the customers. Since wireless technology is everywhere, many companies have commercialized and expanded their business through it. Starbucks is one such company.
Starbuck uses GPS (Global Positioning System) ……

References

References

Brewin, B. (2001, Jan 08). Starbucks takes wireless leap. Computer World .

Greenemeier, L. (2014, June 24). Starbucks to Offer Wireless Caffeine for Smartphones. Scientific American .

How Household Names Use GIS. (2019, October 9). USC Dornsife.

Torrington, M. (2016, April 12). Starbucks: A Case Study in Effective Mobile App Marketing. Digital Turbine.

Wheeler, C. (2014). Going BIG with GIS. Esri User Conference.

Studyspark

Study Document Study Document

Virtual Learning Solutions For English As Second Language Students

Pages: 11 (3230 words) Sources: 10 Document Type:Research Paper Document #:70086670

How technology Enhances ESL Students’ Learning Experience
Introduction
In the COVID-19 era, education has taken a dramatic turn towards distance learning, meaning that virtual classrooms … turn towards distance learning, meaning that virtual classrooms are now more popular than ever. But what is the effect of the use of technology in an ESL classroom? Evidence shows that technology actually does enhance ESL students’ learning experience (Kasapoglu-Akyol, 2010). The fact is that ESL students use technology tools in their daily lives and thus not to use technology for learning purposes is akin to taking a fish out of water and then asking it to learn to swim. In the digital … taking a fish out of water and then asking it to learn to swim. In the digital era, digital natives have been using technology since birth and it is older teachers and educational systems that are slow to recognize this……

References

References

Alvarez-Marinelli, H., Blanco, M., Lara-Alecio, R., Irby, B. J., Tong, F., Stanley, K., & Fan, Y. (2016). Computer assisted English language learning in Costa Rican elementary schools: an experimental study. Computer Assisted Language Learning, 29(1), 103-126.

Beetham, H., & Sharpe, R. (Eds.). (2013). Rethinking pedagogy for a digital age: Designing for 21st century learning. NY: Routledge.

Cassady, J. C., Smith, L. L., & Thomas, C. L. (2017). Supporting emergent literacy for English language learners with computer?assisted instruction. Journal of Research in Reading.

Jiang, H., Tang, M., Peng, X., & Liu, X. (2018). Learning design and technology through social networks for high school students in China. International Journal of Technology and Design Education, 28(1), 189-206.

Kahai, S. S., Carroll, E., & Jestice, R. (2007). Team collaboration in virtual worlds. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 38(4), 61-68.

Kasapo?lu-Akyol, P. (2010). Using educational technology tools to improve language and communication skills of ESL students. Novitas-Royal, 4(2).

Meskill, G., & Mossop, J. (2003). Technologies use with learners of ESL in New Your State: Preliminary report. Retrieved from  https://www.albany.edu/lap/Papers/technology%20use.htm 

Park, J. Y. (2011). Design education online: Learning delivery and evaluation. International Journal of Art & Design Education, 30(2), 176-187.

Studyspark

Study Document Study Document

Security In Communication Challenges

Pages: 10 (2871 words) Sources: 11 Document Type:Research Paper Document #:73429324

Chapter 1: Introduction
wireless communications are, to any extent, the most rapidly growing section of the communications sector. For this reason, it has seized the consideration and … Furthermore, the statistics indicate that more than 60 percent of the population in the world has accessibility to internet (GSMA, 2019).
In delineation, wireless communication takes into account the transmission of message signals through minimal energy radio frequency waves by utilizing open air, with the media aspect … conveyed to the nearby antenna spot and is transported via optic-fiber cable to a wired telephone or via radio signal to a different wireless phone. Notably, the vulnerable and open nature of wireless communications networks causes wireless transmissions to be substantially more susceptible to different malicious attacks by impostors. This varies from identity theft, eavesdropping to interrupt data, violating the … the ability to incapacitate or deactivate firewall protection to attain accessibility to private……

References

References

Bagheri-Karam, G. (2010). Physical-Layer Security in Wireless Communication Systems. Ontario: Waterloo.

Chang, Z. (2019). Physical Layer Security in Wireless Communications. University Of Jyväskylä. Retrieved from:  http://users.jyu.fi/~timoh/TIES327/WPLS.pdf 

Chen, Q., Zhang, C., & Zhang, S. (2008). Secure transaction protocol analysis: models and applications. Springer-Verlag.

GSMA. (2019). Number of Mobile Subscribers Worldwide Hits 5 Billion. Retrieved from:  https://www.gsma.com/newsroom/press-release/number-mobile-subscribers-worldwide-hits-5-billion/ 

Gu, X., & Hunt, R. (2005). Wireless LAN attacks and vulnerabilities. the proceeding of IASTED Networks and Communication Systems.

Ijemaru, G. K., Adeyanju, I. A., Olusunyi, K. O., Ofusori, T. J., Ngharamike, E. T., Sobowale, A. A. (2018). Security Challenges of Wireless Communications Networks: A Survey. International Journal of Applied Engineering Research, 13 (8): 5680 – 5692.

IJEMARU, G. K., UDUNWA, A. I., NGHARAMIKE, E. T., & OLEKA, E. U. (2015). Evaluating the Challenging Issues in the Security of Wireless Communication Networks in Nigeria. International Journal of Innovative Technology and Exploring Engineering (IJITEE), Vol. 3, Issue 12, pp. 1-5, 2014.

Jain, A. (2013). Network Security-The Biggest Challenge in Communication. Advance in Electronic and Electric Engineering. Research India Publications.

Studyspark

Study Document Study Document

Enhancing Communication Migration From 4G To 5G

Pages: 6 (1692 words) Document Type:Essay Document #:96575438

… this paper aims to determine how Communication will be enhanced.
2. To identify some of the challenges of 5G
Experience has shown that technology, however, how advanced, has some peculiar limitations that make it vulnerable. As a result, this dissertation will seek to identify challenges that are … Thus far, some of the constraints attached to migration from 4G to 5G include multi-mode user terminals, security, the choice among the various wireless systems available, jamming and spoofing, and network infrastructure and Quality of service (QoS) support (Alkhazaali 2017).
3. To establish strategies to maximize the … been developed to enhance flawless integration of cellular networks, e.g., 3G and GSM (Alkhazaali 2017; Gandotra and Jha 2016). Currently, a combination of wireless networks, e.g., WLAN and PLMN, is used.
The development of 4G was as a result of unprecedented and ever-increasing growth of users and … IoT, and better QoS and……

References

References

Alkhazaali, N.H., 2017. Mobile Communication through 5G Technology (Challenges and Requirements). International Journal of Communications, Network and System Sciences, 10(05), p.202.

Gandotra, P., and Jha, R.K., 2016. Device-to-device communication in cellular networks: A survey. Journal of Network and Computer Applications, 71, pp.99-117.

Penttinen, Jyrki T. J., et al. 2019. "Deployment," in 5G Explained: Security and Deployment of Advanced Mobile Communications, Wiley, pp.271-291

Shen, Xuemin. "Device-to-device communication in 5G cellular networks." IEEE Network 29, no. 2 (2015): 2-3.

Tehrani, M.N., Uysal, M., and Yanikomeroglu, H., 2014. Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions. IEEE Communications Magazine, 52(5), pp.86-92.

Zhang, A., and Lin, X., 2017. Security-aware and privacy-preserving D2D communications in 5G. IEEE Network, 31(4), pp.70-77.

Studyspark

Study Document Study Document

Barriers That Prevent Implementation Of IoT Within Small Businesses

Pages: 18 (5252 words) Sources: 37 Document Type:Case Study Document #:25628514

… especially into use by SMEs. To this end, this chapter describes more fully the study’s guiding Unified Theory of Acceptance and Use of technology theoretical/conceptual framework followed by an overview of the Internet of Things (IoT) and an analysis of current trends that are having an impact … Davis (2003) by integrating a number of disparate elements from previous models to create a more accurate approach to understanding how and why technology-related decisions are made by organizations today. The Venkatesh et al. (2003) theoretical model draws on a number of key elements from eight previous … from eight previous theories or models in order to produce a more robust overview concerning the effects of different motivational factors on the technology-related decision-making process to identify how and why end users actually use different technologies.
The rationale in support of this more comprehensive model included … applied to similar situations involving……

References

References

Ahamed, J., & Rajan, A.V. (2016). Internet of Things (IoT): Application systems and security vulnerabilities. 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), 1-5.

Aishah, S., Sahandi, R., Prakoonwit, S., & Khan, W. (2019). Big data and IoT opportunities for small and medium-sized enterprises (SMEs). In Handbook of Research on Big data and the IoT. doi: 10.4018/978-1-5225-7432-3.ch005

An, N. & Wang, J. (2018, October). Research and practice on innovative methods of ideological and political education for college student. Educational Sciences Theory and Practice, 18(5), 2386-2391.

Banham, R. (2016, July-August). IoT complexity: As the Internet of Things expands, the risks-and questions of liability-become more complicated. Risk Management, 63(6), 39-44.

Bhardwaj, A., Subramanyam, G. V., Avasthi, V. & Sastry, H. (2016). Review of solutions for securing end user data over cloud applications. International Journal of Advanced Computer Research, 6(27), 2277-2291.

Bok, H. (2014, September). An empirical study on factors influencing Internet advertising effects. Advances in Management, 7(9), 6-9.

Business.com. (2018). Disaster preparedness for small businesses. Business.com, September 26. Retrieved from  https://www.business.com/articles/business-disaster-prep/ .

Cass, J. (2019). Internet of Things: What it is, how it works, examples and more. Just Creative. Retrieved from  https://justcreative.com/2018/11/19/internet-of-things-explained/ .

 

Join thousands of other students and

"spark your studies".