Wednesday, May 6, 2020
Design of Command and Control â⬠Free Samples to Students
Question: Discuss about the Design of Command and Control. Answer: Introduction: Embracing of no user interface have been the case in the modern world where people or users considers the systems with the best interface are those that uses no user interface. The statement above has been advanced in that voice user interface (VUIs) is best as the system interface compared to graphical user interface (GUI). Interacting with each other is very different from the way we interact with graphic interfaces. The idea here is embracing the No user interface as described by((josh.ai, 2016)where he talks of thinking of how to design without any thought of user interface in mind. There are some principles meant for designing No user interface for embracing typical process: The example of Locking and unlocking a car. The guidelines is one have to walk the where the ca is then retrieve the car keys from the pocket, then push the unlock button and lastly you open the car. The step two and three in opening the car lock can be put together using a digital interface as follows. From the figure below you realize that the app from the phone that is used in controlling the locks is digital interface but sometimes it may break or go obsolete or sometimes one may forget a phone. This leads to us coming up with solution whereby we conclude by saying that the best interface is the no user interface and if there is then it should not be complicated than when there is no user interface. TWISTED PAIR CABLE COAXIAL CABLE FIBRE OPTIC CABLE It provides the least bandwidth of about 1.5mb/s for a distance of 2.5 km for about 24 voice channels compared with fibre optic Coaxial cable are meant for transmitting signals especially for cctv cameras especially for receiving audios and videos and also in sending signals to tvs . It provides more bandwidth than either of the two that is up to 10Gbps and even beyond.It can transmit to almost 200km with a bandwidth of 2.5Gbps for over 32,000.The attenuation of fiber doesnt change as bandwidth increases or decreases. It is less secure as it can be tapped without the breakage of the whole system. It is the poorest in security while sending large amount of data like audio and videos. Considering it less attenuation loss of about 3% it is more secure than twisted pair especially when sending Large data files Fibre is the most secure as it is made out of glass and the only way to break it is by breaking it and which will go make the whole system go down. The attenuation of fiber doesnt change as bandwidth increases or decreases. It is the cheapest and mostly used in small organizations as its installation equipments are cheap and it is easy to maintain. It is more expensive compared than coaxial cable since of the content of coaxial copper cable and due to highly coating hence making it more expensive. It is less expensive but the cost of electronics that it requires during installation make it the most expensive compared to the others. It covers a distance of up to 2.5 km It can cover a distance of up to 100m It can cover a distance of up to 200 km The interference rating is very high as traffic is normal and because tapping the network is easy hence increasing the rate of interference. The interference rating is not as high for twisted cable since it might be hand to tap. Very rare case of interference but when they occur they are vital as they break the whole system. TASKS RADIO FREQUENCY IDENTIFICATION SENSORS VIDEO TRACKING ADVANTAGES -A Unique Easy way of in identifying is easy when implementing with RFID -there is simultaneously reading of tags - combination of RFID tags with sensors -tags used ion RFID their sensitivity is less in adverse conditions -storage of very large amounts by rfid tags as an additional specification to identifier that is unique -its can identify most items generally as well as individually. -The Limit Switch sensors have High Current Capability and have a cost which is Low. -photoelectric sensors sense all kinds of materials and have a long life with a very fast response time(A. Dunkels, 2007). -sensors such as inductive sensors are resistant to environments that are very harsh - Comprehensive data be tracked and all footage with seconds can be followed -It intensified in the manner that it can give all the required information as far as it was tracked and recorded. -It is not easy to manipulate it like in other cases with photos. -It gives assurelity that there is enough security as everything can be tracked eg Video track for trucks that goes for long journeys. DISADVANTAGES -manufacture of tags is not yet 100% error free. -tags may be damaged also during their usage which may lead to a read failure and which may not be detected. -it may be affected by viruses such as slammer virus that attack the sql systems. -Rapid growth of technology hence making application of it obsolete with a very short time hence becoming outdated for a short time due to updates. -sensors requires the physical contact with the intruder. -Sometimes slow response are experienced in limit switch sensors -the range of sensitivity is affected by some colours and the target reflections -sometimes the distance may affect sensing -ultrasonic sensors is very sensitive to changes in temperature. -Itrequires a lot of storage as it is huge in amount of what to be stored. -it is expensive to install them in different gadgets -It need some expertise to people who are skilled the video tracking knowledge. KEY REQUIREMENTS -Power -Automatic identification -Unique identity -reliability requirements -automated driving -strictest safety requirements - -public or the private access -work flow should be customizable -ease of use and capabilities of multi user. - APPLICATION -It is used for identifying instances where a db. is maintained in the background to provide or receive information needed. It is applied by organization that provides logistics solution are such us UPS, FedEx and USPS -It is applied in port as technology meant for automatic collection of data -Other application of RFID in manufacturing and distribution where in picking and system for sorting in the warehouse. -manufacturing control, customer service management, inspection and compliance validation and logistics. Applied in 1.Basic End of travel sensing 2.material handling and parts detection 3.Level sensing It is applied in. -Tracking cargo trucks that go for long distances. -for surveilling of animal in game reserves. -For tracking events in games as the happen like football matches. An agreement has been put in place that companies that manufactures the IOT products should be implemented with a realistic security(K. Ashton, 2009). This sensible security highly depends on the number of factors, how data is sensitive and the cost of alleviating vulnerability of the security. As part in producing and manufacturing this IOT the company should implement design process for security as follows. (1.) The firm should conduct an assessment for security risk. (2.) Retaining and minimizing the data gathered. Secondly the company should offer training to its employee in making this sensible and reasonable security.The company should be monitoring the IOT all through their life cycle and hence identifying the patches that may make the IOT products vulnerable(IoT Definitions, 2016). Some of the IoT devices may presents potential privacy and security risks that could be implemented and bring harm to the consumers. Some of the risk of security that can bring harm are (1) enablement of access that is not authorized (2) personal information misuse. (3) facilitation of been attacked by other systems (4.) Safety risks for security must be created. Privacy risks flowing must be identified in the IoT as they act as an addition to risks of security. The risks involved in privacy maybe direct collection of personal information that is sensitive, account numbers in finance, commerce through the mobile etc. Some of the privacy and security risks are perceived that they may not be realized, may also undermine the confidence of the consumer that necessitate the technologies management to meet the objectives. As one participant stated, promoting privacy and data protection principles remains paramount to ensure societalacceptance of IoT services. Blocking Mode: It has been identified that in blocking mode, end point generated from the operating request of mechanism. Therefore, the response generated based in the request which is after endpoint. It is also involved long time and sometimes the response is getting let or taking time gor originating from the operating sources. This is called synchronous case. However, in this mode of operation, asynchronous message can not be generated or received by any end point. This process also does not support any information exchange procedure between the two sources. Subscribe/Publish paradigm: Fotiu, Trossen and Polyzos, (2012) opined that publish/subscribe paradigm is the method of information exchange where it enable the all channels of communication including unidirectional to more subscriber from a publisher. Here, the subscriber declare the category interest or the data class for any communication to publisher. Therefore, when the publisher has ability to generate new message or data, subscriber pushes that message to the subscriber that interested (Levchuk Pattipati, 2013). Command or Response Paradigm: It is to be noted that, for overhead of the un-necessary messages, the response travelling to the reverse direction. Hence, the response become suboptimal for response/command. Therefore, according to the case study the total time saving will be 7ms (1ms in receiving message + 6ms in propagation delay between the sensor and application) Jacob Nielsen law is explained as principles referred to as the 10 usability heuristics for user interface design which were released by early 1994.The principles that brings in the law are as follows(FTW, 2013): (1) The user should be informed by the system to what is going on by the system giving time appropriate feedback with a given time that is realistic. (2)The system should be compatible with the user language and there should be some matching on the real world and the system itself that is in use. (3) it should allow one to redo and undo. (4) the system should show its consistency and the required standards. (5) the system should be built in that it prevents errors before they occur. (6) Mr Nielsen considers recognition to be better that to recall. (7) the system should be ease to use and efficient and much more flexible (8) the dialogues or the system contain information that is relevant to user only. (9) the system should be set in a way that it can correct from errors recognize them and diagnose them. (10) a system should produce a help function and documentation giving all guidelines on how to use the system. Moore law was named after its founder Gordon E. Moore which is the observation in computing history of the hardwares, that the transistors numbers on the circuits that are integrated doubles every two years but ranging for about 18 months. Many gadgets that are electronic and digital links to Moores Law. Moores Law says that there is a driving force in technology and social changes in the 20th and 21st centuries. Moores second law states that the cost used by producers or manufacturers in order to satisfy Moores law follows an opposite trend as the computer power cost to the consumer falls(Berlin, 2014). Some of the reason to why the Moore law exist? are such as producers in need of the law, manufacturers who are competing, provision of better design tools by technology that is successful, also in demand of customers. The existence of Moores law has led to reducing the robustness structure of device to handy to devices used by hands over the past number of years. References Josh.ai. (2016). NOUI. Retrieved aug 21, 2017, from https://medium.com/@joshdotai/no-ui-is-the-best-ui-cfeab4cae641 Dunkels, F. . (2007, Nov). architecture for wireless sensor networks. In sensore. An adaptive communication management. Berlin, D. b. (2014). OnLine: Driving Moores Law with Python-Powered Machine Learning: An Insiders Perspective. Retrieved aug 22, 2017, from https://www.slideshare.net/PyData/py-data-berlin-trent-mcconaghy-moores-law Fotiou, N., Trossen, D., Polyzos, G. C. (2012). Illustrating a publish-subscribe internet architecture. Telecommunication Systems, 1-13. FTW. (2013). 10 usability heuristics of user interface. Retrieved aug 22, 2017, from https://www.designprinciplesftw.com/collections/10-usability-heuristics-for-user-interface-design IoT Definitions. (2016). IOT. Retrieved 2017, from Online: https://gblogs.cisco.com/asiapacific/the-internet-of-everything-opportunity-for-anz-agribusiness/#more-120 Ashton. (2009). in That Internet of Things Thing, In the Real World, Things Matter More Than Ideas, , Online. Retrieved aug 22, 2017, from https://www.rfidjournal.com/articles/view?4986 Levchuk, G., Pattipati, K. (2013). Design of distributed command and control for collaborative situation assessment. Proceedings of ICCRTS.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.