Tuesday, May 5, 2020

Coaxial Cable Structure Composite Cathode †Assignmenthelp.com

Question: Discuss about the Coaxial Cable Structure Composite Cathode. Answer: Introduction: The statement for discussion no interface is the best interface is the most controversial topic of discussion in the development of applications. Developer are always trying to make the user interface as friendly as possible for the users to have the best experience is the use of the application. This has become a controversial topic as the navigation of different user interface has made the application management to be slow in terms of reaching the desired working procedure. It shows that the user of multiple user interface makes the application slow in working (Page, 2014). Many of the fluent users of the applications often find that the use of such interface is useless. They do not wish to see them anymore. It has been termed as a waste of energy. The use of such extensive interface design makes the user lose focus from the main point of view the application was designed. The developers are designing the model based on the fact that the model will be natural and humane to use (Pag e, 2014). This type of implementation of user interfaces make the use of large amount of resources by the developers. Example 1: there has been a recent hike in the implementation of near field communication (NFC) technology management in mobile developers. This has been added so that the user may use hi or hers mobile devices to pay for any kind of purchase they would be doing. They will be able to just swipe their mobile devices with similar NFC enabled machines and pay the amount they have spent. The mobile devices are directly synchronized with the users debit or credit cards (Page, 2014). Though the access of the system on the phone requires a lot of interface changing and thus making a delay in the implementation of an easy function. The NFC tag in the mobile will get activated once the user enters the shop and the amount of money will be deducted based on the items he is selecting from the store. Example 2: the development in the automobile industry has seen a recent growth with the implementation of smart technology inside the cars which would provide helpful work for the user of the car. Some vehicles offer the option of unlocking their cars with the help of their mobile devices. A special application related to the model of the car has to be installed and then configured to be compatible with the vehicle of the user (Page, 2014). The user when done setting up has to then follow a series of steps before he is able to unlock the car. This make the use of so many interface design slows and delays in the use of the application. Specifications of Cables Types of cables Bandwidth of the cables Distance of transmission Interference rating of the cables Cost of setting up the cables Security of the cables Twisted Pair Cable 3 MHz 100 meters The wires are not able to withstand interference for a certain distance The wire cost less and are used widely The security system is apparently negligible in the cable Coaxial Cable 350 MHz 500 meters The wires has the least amount of interference (Jullien et al., 2013). These are average in cost and only used when it is absolutely necessary There is a presence of mediocre security in the wires Fiber Optic Cable 2 GHz 10 km for single mode 2 km for multi-mode There are no electromagnetic interference in the wires transmission It is very costly and thus used for the transmission of long distance information The wires consists of high security Twisted Pair Cable CAT 5E the wires are used in the transfer of gigabit Ethernet CAT 6 due to a speed of 250 MHz it be easily replaceable with 5E. CAT 7 the wires produces a 1.2 GHz speed when paired with a Siemon (Li et al., 2015). Coaxial Cable Hard-line coaxial cable: used for heavy duty transmission due to its 0.5 inch thickness Semi-Rigid Coaxial Cable: used where the wires have to run straight (Li et al., 2015). Twin-Axial Cable: this type of wire can be used in replacement of the older version. Fiber Optic Cable Multimode fiber: capable of carrying multiple transmissions at once. Single mode fiber: carry a single transmission at a given time (Li et al., 2015). Summarized Table of Advantages, Disadvantages and Application of IoT IoT Devices Advantages Disadvantages Application RFID Larger scanning range Faster reading and working procedures Has a cost effective price tag Costly due to the extensive use of battery Requires extensive programming (Hennink, Bonicel Bindels, 2015) Electromagnetic interference causes disturbance Warehouse item tracking To do a particular task over and over Library book tracking Sensors Resistive to the environmental conditions Costs less than others Has a longer life span Requires contact with the device to have the working capability activated Limited up to a certain distance Sense only metal objects Part detection Material handling in an warehouse (Hennink, Bonicel Bindels, 2015) Video Tracking Collection of information Communication between devices Increases risk factor There are no security measures of this prospect. To create reality games. Medical surgery Increase in the interaction between the human and the system. There has always been a hike in the wanting to stay connected to the internet at all times. This has now been made possible by the introduction of the devices termed as internet of things (Wortmann Flchter, 2015). The devices have the ability to collect information from the surrounding places and the person the device is being worn by to a remote server for the analysis of the information collected. This can range from temperature walking pattern and other details which could help the analytics to find the health state of the individual or the type of weather the individual is going to experience in the next few hours (Wortmann Flchter, 2015). Though this type of information may sound fun at the beginning it can turn into a bane any time. The devices which are coming out in the market lack the security measure. These devices are a way of competing in the market. The device has been made in such a way that it would stay connected to the internet all the time and will be able to tran smit information to and from the device (Wortmann Flchter, 2015). The developers have always considered internet of things to become the best technology in the market. Security measure in a device is the most important part of any development of a device. The user of the device can store any amount of information on the device and simultaneously the information will be transferred to the cloud server of the device (Skarmeta Moreno, 2013). The information might include the individuals bank statement or informa6tion like personal detail and other which will become a vulnerable source of information for anyone who hacks into the system server to steal the data. The user is often not able to fully check out whether the users information is being shared by the user. Then by changing the settings will be helpful for the individual (Skarmeta Moreno, 2013). This can be avoided by the developer by limiting to the amount of data that the device can collect and store on the servers. Apart from this the developers should always look into the matter of keeping a device safe from hackers. Security should be put up as the primary concern during the implementation of any technological device (Skarmeta Moreno, 2013). When the developers find a vulnerable threat in their device they should try to eradicate the threat as soon as possible and stop the replication of such threats. Apart from all these the companies should be providing support and clarity for the device throughout the life time of the device the individual is using for. Providing a choice to the user to accept which type of data he or she wants to share with the device can also limit the probability of the device from getting hacked and sensitive data being stolen by the hackers. Encrypting the files which are being sent and received by the device should be done. There should also b e the use of an encrypted and secure network by the user of the device to avoid any unauthorized user from accessing the device (Skarmeta Moreno, 2013). Blocking mode: All the requests from this phase are being made so that the connection can be established between the two end points of the two systems (Cui, 2016). If the connection fails then there is a retry of the connection. The completion of the connection between the two end take a certain amount of time termed as waiting time. As the connection is asynchronous a synchronous message is received by the sender. Thus the connection is established between the sender and the receiver (Mulani Pingle, 2016). Publish or subscribe paradigm: it has also been referred to as pub/sub. This communication is unidirectional in nature. The message when received by the publisher has to be acknowledged by the user to view the requested file (Mulani Pingle, 2016). The subscriber can then on view the files shared or uploaded. After the copying a success message is shared by the publisher with the subscriber. A suboptimal state is reached when the messages starts to travel in the opposite direction of the command message line (Stankovic, 2014). The statement of the Nielsens law states that the bandwidth of every user in the world will increase by a factor of 50% (Nielsen, 2014). This law is very much similar to the Moores law but the difference has been found which concludes that the bandwidth of any device will not become more than the speed of the same working computer (Waldrop, 2016). Moores law has stated that a systems capability will get doubles within a stipulated time of 18 months. Implication of Nelsons law in Internet of Things A prediction has been made that by the end of 2020 the electronics will get united under a single roof with the help of internet and get implemented in to a single body called internet of things (Gubbi et al., 2013). This can imply that around 99% of all the electronics device will get connected to the internet of things. Reference Cui, X. (2016). The internet of things. In Ethical Ripples of Creativity and Innovation (pp. 61-68). Palgrave Macmillan, London. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions. Future generation computer systems, 29(7), 1645-1660. Hennink, J., Bonicel, J. P., Bindels, P. M. W. (2015). U.S. Patent No. 8,938,144. Washington, DC: U.S. Patent and Trademark Office. Jullien, C., Besnier, P., Dunand, M., Junqua, I. (2013). Advanced modeling of crosstalk between an unshielded twisted pair cable and an unshielded wire above a ground plane. IEEE Transactions on Electromagnetic Compatibility, 55(1), 183-194 Li, Q., Zhang, Z., Guo, Z., Zhang, K., Lai, Y., Li, J. (2015). Coaxial-cable structure composite cathode material with high sulfur loading for high performance lithiumsulfur batteries. Journal of Power Sources, 274, 338-344. Mulani, T. T., Pingle, S. V. (2016). Internet of things. International Research Journal of Multidisciplinary Studies, 2(3). Nielsen, J. (2014). Nielsens Law of Internet Bandwidth, 1998. Page, T. (2014). Skeuomorphism or flat design: future directions in mobile device User Interface (UI) design education. International Journal of Mobile Learning and Organisation, 8(2), 130-142. Skarmeta, A., Moreno, M. V. (2013, August). Internet of things. In Workshop on Secure Data Management (pp. 48-53). Springer, Cham. Stankovic, J. A. (2014). Research directions for the internet of things. IEEE Internet of Things Journal, 1(1), 3-9. Waldrop, M. M. (2016). The chips are down for Moore's law. Nature, 530(7589), 144-147. Wortmann, F., Flchter, K. (2015). Internet of things. Business Information Systems Engineering, 57(3), 221-224.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.