ITC571 Emerging Technologies & Innovation: Wireless Network Research
VerifiedAdded on 2023/06/10
|8
|690
|389
Presentation
AI Summary
This presentation provides an overview of emerging wireless technologies and their application in managing operational activities through establishing a network. It analyzes the benefits of wireless technology, highlighting 24/7 data access, enhanced organizational production, effective communication, real-time data exchange, and improved network security. The presentation also covers security and privacy issues, such as data breaches and intrusion vulnerabilities, and reflects on Wi-Fi's advantages while emphasizing the importance of security measures. The presentation concludes by referencing various research papers and articles related to wireless communication, security, and network applications.

School of Computing & Mathematics
ITC571
Emerging Technologies &
Innovation
Research
Seminar Presentation
<<STUDENT ID>>
<<TOPIC>>
ITC571
Emerging Technologies &
Innovation
Research
Seminar Presentation
<<STUDENT ID>>
<<TOPIC>>
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

School of Computing & Mathematics
Introduction
• Purpose is to establish a network
• To manage the operational activities using
network
• Establish a network for the operational activity
management
• Analyze the benefits of wireless technology
Introduction
• Purpose is to establish a network
• To manage the operational activities using
network
• Establish a network for the operational activity
management
• Analyze the benefits of wireless technology

School of Computing & Mathematics
Literature Review
• How efficient could be the wireless technology
for the enterprises?
• What are the factors those could restrict the
enterprise form accessing the network at low
speed?
• What are the future implications of the wireless
technology?
Literature Review
• How efficient could be the wireless technology
for the enterprises?
• What are the factors those could restrict the
enterprise form accessing the network at low
speed?
• What are the future implications of the wireless
technology?
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

School of Computing & Mathematics
Results/Findings
• Wireless Technology benefits
• Wireless technology can allow 24*7 access to data
and information
• Organization’s production and output can be
enhanced
• Better and effective communication
• Real time data exchange
• Establishment of a network for the smooth flow of the
data and information
• Enhance the security of the network
Results/Findings
• Wireless Technology benefits
• Wireless technology can allow 24*7 access to data
and information
• Organization’s production and output can be
enhanced
• Better and effective communication
• Real time data exchange
• Establishment of a network for the smooth flow of the
data and information
• Enhance the security of the network
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

School of Computing & Mathematics
Results/Findings
• Application of Wireless Technology
• Manage communication
• Effective and efficient information exchange
• Within small industries
• Within small and medium industries
• For a large number of population
Results/Findings
• Application of Wireless Technology
• Manage communication
• Effective and efficient information exchange
• Within small industries
• Within small and medium industries
• For a large number of population

School of Computing & Mathematics
Results/Findings
• Security and Privacy Issues
• Expose of data and information
• Vulnerable to data breaches
• Vulnerable to intrusion
• Expose of sensitive information
• Physical and ethical issues
Results/Findings
• Security and Privacy Issues
• Expose of data and information
• Vulnerable to data breaches
• Vulnerable to intrusion
• Expose of sensitive information
• Physical and ethical issues
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

School of Computing & Mathematics
Reflection
• Wi-Fi is more advantageous than other wireless
network
• It can be the future of wireless technology
• Security issues are concerning factors in the
adoption
• Proper measures should be taken for assuring
the security and privacy of the data and
information being exchanged over the network
Reflection
• Wi-Fi is more advantageous than other wireless
network
• It can be the future of wireless technology
• Security issues are concerning factors in the
adoption
• Proper measures should be taken for assuring
the security and privacy of the data and
information being exchanged over the network
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

School of Computing & Mathematics
Refernces
Aral, S., Dellarocas, C., & Godes, D. (2013). Introduction to the special issue—social media and business transformation: a framework
for research. Information Systems Research, 24(1), 3-13.
Camps-Mur, D., Garcia-Saavedra, A., & Serrano, P. (2013). Device-to-device communications with Wi-Fi Direct: overview and
experimentation. IEEE wireless communications, 20(3), 96-104.
Can, O. and Sahingoz, O.K., 2015, May. A survey of intrusion detection systems in wireless sensor networks. In Modeling, Simulation,
and Applied Optimization (ICMSAO), 2015 6th International Conference on (pp. 1-6). IEEE.
Chen, M., Qian, Y., Mao, S., Tang, W. and Yang, X., 2016. Software-defined mobile networks security. Mobile Networks and
Applications, 21(5), pp.729-743.
Ermakov, S. A., Zavorykin, A. S., Kolenbet, N. S., Ostapenko, A. G., & Kalashnikov, A. O. (2014). Optimization of expert methods used
to analyze information security risk in modern wireless networks. Life Science Journal, 11(10), 511.
Helen, D., & Arivazhagan, D. (2014). Applications, advantages and challenges of ad hoc networks. JAIR, 2(8), 453-7.
Johns, T., & Gratton, L. (2013). The third wave of virtual work. Harvard Business Review, 91(1), 66-73.
Makwana, R., Baviskar, J., Panchal, N., & Karia, D. (2013, April). Wireless based load control and power monitoring system. In Energy
Efficient Technologies for Sustainability (ICEETS), 2013 International Conference on (pp. 1207-1211). IEEE.
Nugroho, E., & Sahroni, A. (2014, November). ZigBee and wifi network interface on Wireless Sensor Networks. In Electrical
Engineering and Informatics (MICEEI), 2014 Makassar International Conference on (pp. 54-58). IEEE.
Refernces
Aral, S., Dellarocas, C., & Godes, D. (2013). Introduction to the special issue—social media and business transformation: a framework
for research. Information Systems Research, 24(1), 3-13.
Camps-Mur, D., Garcia-Saavedra, A., & Serrano, P. (2013). Device-to-device communications with Wi-Fi Direct: overview and
experimentation. IEEE wireless communications, 20(3), 96-104.
Can, O. and Sahingoz, O.K., 2015, May. A survey of intrusion detection systems in wireless sensor networks. In Modeling, Simulation,
and Applied Optimization (ICMSAO), 2015 6th International Conference on (pp. 1-6). IEEE.
Chen, M., Qian, Y., Mao, S., Tang, W. and Yang, X., 2016. Software-defined mobile networks security. Mobile Networks and
Applications, 21(5), pp.729-743.
Ermakov, S. A., Zavorykin, A. S., Kolenbet, N. S., Ostapenko, A. G., & Kalashnikov, A. O. (2014). Optimization of expert methods used
to analyze information security risk in modern wireless networks. Life Science Journal, 11(10), 511.
Helen, D., & Arivazhagan, D. (2014). Applications, advantages and challenges of ad hoc networks. JAIR, 2(8), 453-7.
Johns, T., & Gratton, L. (2013). The third wave of virtual work. Harvard Business Review, 91(1), 66-73.
Makwana, R., Baviskar, J., Panchal, N., & Karia, D. (2013, April). Wireless based load control and power monitoring system. In Energy
Efficient Technologies for Sustainability (ICEETS), 2013 International Conference on (pp. 1207-1211). IEEE.
Nugroho, E., & Sahroni, A. (2014, November). ZigBee and wifi network interface on Wireless Sensor Networks. In Electrical
Engineering and Informatics (MICEEI), 2014 Makassar International Conference on (pp. 54-58). IEEE.
1 out of 8
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.