ITC571 Emerging Technologies & Innovation: Wireless Network Research

Verified

Added on  2023/06/10

|8
|690
|389
Presentation
AI Summary
This presentation provides an overview of emerging wireless technologies and their application in managing operational activities through establishing a network. It analyzes the benefits of wireless technology, highlighting 24/7 data access, enhanced organizational production, effective communication, real-time data exchange, and improved network security. The presentation also covers security and privacy issues, such as data breaches and intrusion vulnerabilities, and reflects on Wi-Fi's advantages while emphasizing the importance of security measures. The presentation concludes by referencing various research papers and articles related to wireless communication, security, and network applications.
Document Page
School of Computing & Mathematics
ITC571
Emerging Technologies &
Innovation
Research
Seminar Presentation
<<STUDENT ID>>
<<TOPIC>>
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
School of Computing & Mathematics
Introduction
Purpose is to establish a network
To manage the operational activities using
network
Establish a network for the operational activity
management
Analyze the benefits of wireless technology
Document Page
School of Computing & Mathematics
Literature Review
How efficient could be the wireless technology
for the enterprises?
What are the factors those could restrict the
enterprise form accessing the network at low
speed?
What are the future implications of the wireless
technology?
Document Page
School of Computing & Mathematics
Results/Findings
Wireless Technology benefits
Wireless technology can allow 24*7 access to data
and information
Organization’s production and output can be
enhanced
Better and effective communication
Real time data exchange
Establishment of a network for the smooth flow of the
data and information
Enhance the security of the network
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
School of Computing & Mathematics
Results/Findings
Application of Wireless Technology
Manage communication
Effective and efficient information exchange
Within small industries
Within small and medium industries
For a large number of population
Document Page
School of Computing & Mathematics
Results/Findings
Security and Privacy Issues
Expose of data and information
Vulnerable to data breaches
Vulnerable to intrusion
Expose of sensitive information
Physical and ethical issues
Document Page
School of Computing & Mathematics
Reflection
Wi-Fi is more advantageous than other wireless
network
It can be the future of wireless technology
Security issues are concerning factors in the
adoption
Proper measures should be taken for assuring
the security and privacy of the data and
information being exchanged over the network
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
School of Computing & Mathematics
Refernces
Aral, S., Dellarocas, C., & Godes, D. (2013). Introduction to the special issue—social media and business transformation: a framework
for research. Information Systems Research, 24(1), 3-13.
Camps-Mur, D., Garcia-Saavedra, A., & Serrano, P. (2013). Device-to-device communications with Wi-Fi Direct: overview and
experimentation. IEEE wireless communications, 20(3), 96-104.
Can, O. and Sahingoz, O.K., 2015, May. A survey of intrusion detection systems in wireless sensor networks. In Modeling, Simulation,
and Applied Optimization (ICMSAO), 2015 6th International Conference on (pp. 1-6). IEEE.
Chen, M., Qian, Y., Mao, S., Tang, W. and Yang, X., 2016. Software-defined mobile networks security. Mobile Networks and
Applications, 21(5), pp.729-743.
Ermakov, S. A., Zavorykin, A. S., Kolenbet, N. S., Ostapenko, A. G., & Kalashnikov, A. O. (2014). Optimization of expert methods used
to analyze information security risk in modern wireless networks. Life Science Journal, 11(10), 511.
Helen, D., & Arivazhagan, D. (2014). Applications, advantages and challenges of ad hoc networks. JAIR, 2(8), 453-7.
Johns, T., & Gratton, L. (2013). The third wave of virtual work. Harvard Business Review, 91(1), 66-73.
Makwana, R., Baviskar, J., Panchal, N., & Karia, D. (2013, April). Wireless based load control and power monitoring system. In Energy
Efficient Technologies for Sustainability (ICEETS), 2013 International Conference on (pp. 1207-1211). IEEE.
Nugroho, E., & Sahroni, A. (2014, November). ZigBee and wifi network interface on Wireless Sensor Networks. In Electrical
Engineering and Informatics (MICEEI), 2014 Makassar International Conference on (pp. 54-58). IEEE.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]