Monday, December 9, 2019

Applications and Challenges in Technology †MyAssignmenthelp.com

Question: Discuss about the Applications and Challenges in Technology. Answer: Introduction: An interface can either be s user interface containing all set of dials, operating system commands, knobs, graphical display formats and other devices availed by a computer program to enable the user to communicate and make use of the computer or the program (Tan Wang, 2010). The statement "the best interface for a system is no User Interface" Means that no user interface is the best interface compared to all other interfaces as it makes it possible for computers and programs operate and perform tasks without necessarily need for human operation (Stankovic, 2014). The no user interface system was designed by Golden Krishna in a way that it makes computers work for human instead of us working for them and also provide solutions to individuals and adapt the best suit to each person and their needs. The no interface use was developed following three principles which are; eliminating interfaces to embrace natural processes, leverage computer rather than catering to them and developing a system that adapts for individuals. No interface can be applied in communication domain where people can exchange SMS which has become one of the most used applications in the world (Ni, et.al 2004). The no user interface has also been employed in the movie industries where robots are being used to take parts and perform tasks used to be carried out by a human. For instance, in communication, many people exchange information through applications such as what sap and we Chat apps. It has become a central part of human life in modern world (Bandyopadhyay Sen, 2011). The introduction of artificial intelligence in the movie industry has made things movies become interesting. Many recent films have been acted by robots given human characters and resemblance. Robots passing the turning test have brought about huge implications on people as it shows that artificial intelligence has reached human level. It is the simplest transmission medium consisting of one or more pairs of electrical son arranged in a spiral (Gama, et.al, 2012). This type of support cable is fit for transmitting in both analog and digital systems. It is suitable for transmitting information in a distance of about 100 meters. It consists of two copper wires that are about 1 mm thick. The wires are twisted to reduce electrical interference from similar pairs in the surrounding environment(Atzori, et.al, 2010). The cables exhibit electromagnetic interference when the two wires are parallel to each other. They consist of color-coded copper wires that do not have any foil or braid as an insulator to guard interference. The wire pairs within each cable are in varying amounts per foot to produce cancellation. They are made up of copper wires that are twisted together and covered with a foil or in a braided mesh as well as the outer PVC cover. The braided mesh or prevents guard penetration of electromagnetic noise and do away with cross talk (Larsson, et.al, 2014). The covering must be grounded to prevent the foil from becoming a magnetic field. Bandwidth- the productive capacity of twisted pair cable rely on several factors such as conductor gauge, length of the circuit and the space between amplifiers. A high band frequency may cause interference (Tyson, 2004). Distance- the distance between twisted pairs is limited. As the distance between the network elements increases, signal loss increases and quality becomes small at a particular frequency. Security- twisted pair cables are the highly insecure medium of transmission. Placing physical taps on a UTP is easy (Wang, et.al, 2014). Also, the energy radiated is easily intercepted through use of inductive coils without the need for placement of a physical tap. Cost the acquiring process, deployment and rearrangement costs for UTP are too small, at least in the wires applications. The costs are however high in high-capacity, and long distance applications due to needs for dull, conduit placement and splicing of many large pair cables. Interference rating- twisted pairs are highly susceptible to dangers of foreign intervention. Coaxial cable is ubiquitous and significantly used currently. For instance, the television wire is a coaxial cable. It has a solid-copper wire running down at the middle of the cable and a solid copper wire as an insulator covered by a metal foil and a braided cable (Hecht, 2015). The foil shields it against electromagnetic interference. The cable is finally covered by another layer that includes the braided cable. It is a coaxial cable which is around inch thick used for short distance. It connects directly to a work station network adapter card by use of a British naval connector (Hecht, 2015). It transfers' information to a maximum distance of 185 meters. It is about inch thick and supports the transfer of data over a longer distance than the thin net. It can transfer data to a maximum of 500 meters and is mostly used as a backbone to connect smaller thin net based networks (Hecht, 2015). Optical fiber cables carry digital data by the use of optical fiber signal. Data is transferred in the form of modulated pulses of light. It is made up of a fragile cylinder glass, referred to as the core covered by a concentric layer of glass, called the cladding (Borgia, 2014). A fiber contains two cables, one for transmitting and another for receiving data. The core can be made using an optical quality transparent plastic and the cladding of gel which is capable of reflecting signals back to the fiber hence reducing the loss of signal. Multimode fiber uses several rays of light at the same time with every running at its particular reflection angle to transmit data over short distances. The fiber does not conduct electromagnets, and thus it is safe in such environments (Borgia, 2014). An optical fiber cable can transmit data at a bandwidth over 500 MHz/km, has less data interference as every cable is independent in its work. Signal losses are limited over 500 m. They, however, have high costs to implement as there is a need for electrical power for transmission to occur and or aluminum. Sensors are devices used to provide information when an object is present or not. They include inductive, captive, limit switches, ultrasonic sensors and photoelectric. They are packaged according to their configurations to meet the requirements present in industrial and commercial applications. Sensors are of different types with each having its strengths and weaknesses as enumerated below. The RFID was developed to replace the barcode for technology and has become well known due to its many applications. Its main components are RFID reader and RFID tag (Hank, 2013). The user gets information from the passive tag through transmitting a signal. Advantages of RFID RFID can store more information as compared to barcodes and it follows the commands of the reader. RFID tags are used for monitoring the health records of patients in hospitals and tracking of luggage. It gives the location of the reader together with its identification. The tags can be read only and also read or write as opposed to barcodes. RFID is used for security and attendance reasons in institutions as well as office establishments. Advantages of RFID RFID coverage is limited within 3 meters. The technology has brought about the loss of jobs for unskilled laborers. Active RFIDs are expensive as they need to use a battery. Programming RFID is time-consuming External electromagnetic interference can hinder the RFID remote reading. Issues of security and privacy in IoT IoT security is a serious concern to information technology professionals. New technologies exhibit challenges in growing as organizations rival for the available market share to get their standards upheld. In the period of the old replacement of IoT, thus securing the machines, apps and the platforms that make it possible for IoT to thrive (Want, et.al, 2015). This kind of situation is highly witnessed in the mobile device apps development. Simultaneously, IoT platforms are often the same in their designs, making it possible for hackers to exploit common vulnerabilities of one standard IoT device platform in different levels of devices. Also, after threats have been pinpointed, less costly devices can make it hard for IoT processes from giving security patches. Since people will have their daily activities and conducts recorded, measured and analyzed, they are a high need for the developers and policy makers to alerting users and individuals who gather their information, how it is stored and used and to whom it is availed and for what purposes. The privacy principles outline that the users should be in a position to control their data as well as they can choose smart surroundings with no possible negative implications (Roman, et.al, 2011). Information collected by use of sensors within objects that are linked to each other can result in huge amount of data that can be merged, analyzed and an action taken with all potential accountability, transparency, security or meaningful intentions. The time budget saved by redesigning the application to use the publish/subscribe communication model is 12/3+2 = 6ms The Nielson's law states that a high-end user's connection speed grows by 50% per year. The reason for this growth is as a result business realities experience from technological limitations. The average increase is constituted by the facts that: telecoms companies are conservative, the user's reluctance in spending much money on bandwidth and the increasing baser of the user base (Gubbi, et.al, 2013). This law is related to Moore's law in that they are both measures of leading edge capabilities. The Moore's law acknowledges that a design gap exists and cannot use all available transistors immediately. The Nielson's law focuses on the fast speeds present for high-end users of the internet. References Atzori, L., Iera, A., Morabito, G. (2010). The internet of things: A survey.Computer networks,54(15), 2787-2805. Bandyopadhyay, D., Sen, J. (2011). Internet of things: Applications and challenges in technology and standardization.Wireless Personal Communications,58(1), 49-69. Bi, Z., Da Xu, L., Wang, C. (2014). Internet of things for enterprise systems of modern manufacturing.IEEE Transactions on industrial informatics,10(2), 1537-1546. Borgia, E. (2014). The Internet of Things vision: Key features, applications and open issues.Computer Communications,54, 1-31. Gama, K., Touseau, L., Donsez, D. (2012). Combining heterogeneous service technologies forbuilding an Internet of Things middleware.Computer Communications,35(4), 405-417. Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M. (2013). Internet of Things (IoT): A vision, architectural elements, and future directions.Future generation computer systems,29(7), 1645-1660. Hank, P., Mller, S., Vermesan, O., Van Den Keybus, J. (2013, March). Automotive ethernet: in-vehicle networking and smart mobility. InProceedings of the Conference on Design, Automation and Test in Europe (pp. 1735-1739). EDA Consortium.Hecht, J. (2015).Understanding fiber optics. Jeff Hecht. Larsson, E. G., Edfors, O., Tufvesson, F., Marzetta, T. L. (2014). Massive MIMO for next generation wireless systems.IEEE Communications Magazine,52(2), 186-195. Ni, L. M., Liu, Y., Lau, Y. C., Patil, A. P. (2004). LANDMARC: indoor location sensing using active RFID.Wireless networks,10(6), 701-710. Roman, R., Najera, P., Lopez, J. (2011). Securing the internet of things.Computer,44(9), 51-58. Stankovic, J. A. (2014). Research directions for the internet of things.IEEE Internet of Things Journal,1(1), 3-9. Tan, L., Wang, N. (2010, August). Future internet: The internet of things. InAdvanced Computer Theory and Engineering (ICACTE), 2010 3rd International Conference on(Vol. 5, pp. V5-376). IEEE. Tyson, J. (2004). How internet infrastructure works.Retrieved December,3, 2004. Want, R., Schilit, B. N., Jenson, S. (2015). Enabling the internet of things.Computer,48(1), 28-35.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.