Annotated Bibliography – impact of social media on young people

Ehmke, Rachel. “How Using Social Media Affects Teenagers.” Child Mind Institute, Child Mind Institute, 23 Oct.2018, childmind.org/article/how-using-social-media-affects-teenagers/. Rachel Ehmke begins this article by citing a survey conducted by the Royal Society for Public Health in which it asked 14-24 year olds in the UK how social media platforms such as Snapchat, Facebook, Twitter, and Instagram … Read more

EnOcean: Reshaping the realm of IoT using Self-Powered Wireless Technology

Abstract: This research paper gives a detailed analysis of EnOcean, an ultra-low-power wireless communication technology that is powered by energy harvesting. Making use of the changes in energy state around sensors like motion, temperature or light intensity change, the device powers itself, thereby minimizing the human interference in maintenance. Taking advantage of the energy efficiency … Read more

Make a recommendation about cloud-based technologies for a school

Introduction: Your school has inquired a recommendation about cloud-based technologies. This new technology has become popular and has changed the way students and teachers interact in classrooms. Schools can now store their data in cloud-based technologies. Although schools can benefit significantly when transitioning to cloud-based technologies, they still need to consider the costs involved. Security … Read more

Affordable custom IoT end-points

Internet of Things (IoT) is a burgeoning field which is the next big thing in the world of automation. IoT devices usually have a universal application as they are not constrained to any one particular domain. With more advances in technology and the impact it can have on our daily lives, IoT can have various … Read more

The Ethics of the Internet of Things

Introduction Often called the Internet of everything, the term Internet of Things(IoT) was coined in 1999 by Kevin Ashton, who dreams of a system where the Internet is connected to every physical object, via ubiquitous sensors (science direct). Specifically, the definition of IoT, as defined by Sholla, Naaz, and Chisti in their article Incorporating Ethics … Read more

End-to-End encryption (E2EE)

Introduction In the world we live in today, secrecy is sacred to everyone; there are many things that are said and done that we do not want others to know. Over time in our society conversations have moved from many different platforms. We started with communications face-to-face, then strictly over the telephone, and after the … Read more

Intention recognition – applications

Intention recognition has the outstanding purpose of interpreting the actions and goals of one or more agents from a series of observations on the agents’ actions and the environmental conditions. This research field has shown a remarkable strength in providing personalised support for many different applications whilst also being connected  to many different fields of … Read more

Current/future trends in 4G/5G and what they mean for the future of mobile networking

Wireless Mobile & Communications Coursework. As an alternative to programming in addition to the lab functionality program for higher marks you will need to provide an essay detailing the current and future trends in the 4G/5G mobile network technologies and what it would mean for the future of mobile networking. Typically, able to relate facts/ … Read more

Biometric Security and Privacy

Introduction Over the previous decade, the security look into area has seen huge development in regard to all parts of data access and sharing. Guaranteeing sheltered and secure correspondence and communication among clients and, decently, their on-line personalities presents remarkable difficulties to scholastics and in addition industry and people in general. Security breaks, charge card … Read more

Difficulties tended to by the USA Patriot Act

Abstract: A straightforward compliance program is characterized as making a point to pursue the guidelines and certain moves to be made with the end goal to avoid incidents. Regardless of the instruments or systems they utilize, they are regularly worried about finished or under-control, as well as regulatory effectiveness. In spite progress in the use … Read more

Virtual SIM – alternative to SIM card

EXISTING PRODUCT Since the origin of Mobile phones, the only thing that has not developed much in mobile phones is the SIM card i.e. Subscriber Identity Module Card. It is a device which contains user identity, network authorization data, personal security keys, contact lists and text messages. Functionality of the SIM card: • Identification of … Read more

Operating systems – the choice of Linux as opposed to Windows

Operating Systems Historical Recap: Linux Presently Linux operating system is actually all over. It’s found in phones, cars, refrigerators, Roku devices as well as runs the super computers, the larger percentage of the internet, plus the world’s stock exchange. Its history began back in 1991, with a graduate student, Linus Torvalds who created a new … Read more