The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents our experience of using a social software development environment called SCI to support teaching programming for software engineering and computer science courses. It describes the benefit from using a Social Development Environment (SDE), particularly the effect of integrating the social side on students for the computer science classroom. This paper presents a study that tests...
Construction supply chain involves a multitude of stake holders, communication between different stake holders play the major role in construction projects. Cost and time over run of projects occur due to delay in communication. Despite of being one of the oldest industries, construction industry is still fragmented. Transferring and updating of information takes place repeatedly between different...
In order to study and analyze quantum communications security, we propose in this work a new quantum attack strategy alias: Malware Photon Injection Attack (MPIA). In this attack, we based on the philosophy of the classical attack “SQL Injection” and the physical properties of quantum entanglement. The effectiveness of MPIA is proved by the study of the mutual information variation, between emitter-receiver...
This paper presents a 3-FET stacked K/Ka-band class-AB power amplifier (PA) implemented in the GLOBALFOUNDRIES 45nm SOI process that is particularly optimized for future high-performance energy-efficient 5G mm-Wave transceiver front-ends. With a 2.9V power supply, the PA achieves 13.1dB power gain and a saturated output power (Psat) of 16.2dBm with a maximum power-added efficiency (PAE) of 41.5% at...
Packet communication's useful in cell-phone, mail, images. The goal is to let communications line effectively, its benefits billing by volume of data that is sent and received and not the call time, whenever packet creation's required; payloads is required. whenever a payload require a header and trailers; Headers and Trailers Supplies an entity, while Packet Generator Merges the entities representing...
It is an established fact that the data transmission between two devices or processes is achieved via packets, according to the rules and regulations of TCP/IP protocol suite. The said transmission involves all the layers of TCP/IP protocol suite. The different processes involved in the transmission follow the same rule of the TCP / IP suite either on the same device or on different devices. In this...
This paper reviews and compares different techniques to collect more energy for passive UHF RFID Tags. The main objective is to allow the tags to embed new functions and provide more than identification. Such additional capture of energy transforms the simple tag into an augmented tag able to perform new functions such as sensing, channel diversity and much more.
This paper introduces new functionalities for industrial safety applications using the wireless infrastructure of the IEEE 802.11 standard. The new amendments (n/ac/ad) for the 2.4, 5, and 60-GHz-band support additional high data rate modes, for e.g. video applications and device-to-device (D2D) communication. The huge bandwidth in the 60-GHz-band enables precise localization. However, Listen-Before-Talk...
This paper presents an all-metal parallel plate waveguide (PPW) Luneburg lens designed using an array of subwavelength Fakir bed of nails unit-cells. Variation of the metal post height and PPW-spacing modulates the effective refractive index. The lens operates in the Ku-band of frequencies, with more than 40% bandwidth, in a quasi-TEM mode. Broadband and low loss, with high directivity and wide field-of-view,...
Internet has become a global means of communication, turned our reality upside down. It has transformed communications, to the level that it is now our chosen standard of communication. Although there are many ways to protect information from undesired access, Quantum cryptography can be used to unconditionally secure data communications by applying the laws of quantum physics which overcomes the...
Future computing system designs will be constrained by power density and total system energy, and will require new programming models and implementation strategies. Data movement in the memory system and interconnect will dominate running time and energy costs, making communication cost reduction the primary optimization criteria for compilers. Communication cost can be divided into latency costs,...
On — chip communication suffer from bit error especially at highly dense implemented system on chip. Reducing the rate of bit error in On-chip communication is carried out by error detection and correction codes. But it has its own limitation. So reconfigurable multiple code based system is suitable for heterogeneous system design. But selecting correct code for the correct subsystem or for current...
In this paper a mechanism to identify a cloudlet for computation offloading in a decentralized manner is proposed. The cloudlet identification is carried out in two phases. In the first phase, cloudlets within WiFi range of the mobile device are identified without connecting to any of the cloudlets. In the second phase, selection of the ideal offloading cloudlet is done based on infrastructure specific...
Many networking applications implement topology adaptations to cope with network dynamics. Related work focuses on the specific application, lacking a general model for topology adaptations. In this paper, we analyze 14 topology adaptations from two different application domains. Based on the derived characteristics, we propose a general topology adaptation model. We present the Topology Adaptation...
Operational frequencies of miniaturized in-body/out-body dual use antenna are described. For miniaturization, millimeter-wave dipole antenna is employed. In the out-body condition, its operational frequency is 60 GHz and in the in-body condition (we assume it in the water), it drops to 10–20GHz due to the high dielectric constant medium (i.e. human body or water). Since the propagation loss inside...
Semiotic engineering is based upon the semiotic theory of Human-Computer Interaction (HCI), which focuses on communication between designers and users. Semiotic engineering tries to improve users' interpretation through meta-communication and emphasizes that designers should play the role of legitimate interlocutors in interactive systems. On the other hand, there is a gap in software engineering...
Team collaboration plays a key role in the success of any multi- user activity. Software engineering is a highly collaborative activity, where multiple developers and designers work together to solve a common problem. Meaningful and effective designer- developer collaboration improves the user experience, which can improve the chances of success for the project. Learning to program is another activity...
We analyze the conditions in which offloading computation reduces completion time. We extend the existing literature by deriving an inequality that relates computation offloading system parameters to the bits per instruction ratio of a computational job. This ratio is the inverse of the arithmetic intensity. We then discuss how this inequality can be used to determine the computations that can benefit...
Characterization of communication links in wireless sensor networks (WSN) deployed in mine environment is of paramount importance for achieving reliable network performance. Inaccurate communication model may lead to the inferior performance of protocols designed hence may exhibit inconsistent behavior due to link degradation. It is thus significant to account for propagation factors that affect link...
Internet of Things (IoT) is a world-wide network connecting all the smart objects together. It is the way in which all things are enabled to talk with each other. Whenever those smart things being connected over internet are restricted to only vehicles, then it is called as Internet of Vehicles (IoV). With continuously increasing urban population and rapidly expanding cities, vehicle ownership has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.