-
A Proposed Combinatorial System Design for Ubiquitous Transaction Processing Systems
Issue:
Volume 5, Issue 1, June 2019
Pages:
1-12
Received:
24 June 2019
Accepted:
27 July 2019
Published:
3 September 2019
Abstract: As computing paradigm shift from a computing paradigm involving one-computer-many people to that involving one-person-one computer and eventually to the one involving one-person-many computers, the need for effective transaction management model for this advancement has also increased. This is because, new transaction management challenges are introduced. These challenges include increased mobile user bank, hybrid of mobile devices and transaction processing architecture related issues. This paper presents a Combinatorial System Design of Transaction Processing Elements for Ubiquitous Computing with the aim of justifying the choice of deploying Mobile-3PC Protocol on Three-tier transaction processing system architecture as the appropriate combinatorial system design for ubiquitous transaction processing systems. To achieve this aim, existing transaction processing systems are critically analysed and Compared against standards that influence transaction processing throughput and response time positively. A systematic analytical approach is used in analyzing the organizational structure of two-tier and three-tier system architectures. Subsequently, 2 Phase Commit and 3 Phase Commit communication protocols are analyzed and deployed on the three-tier system architecture to ascertain which one of the combinational transaction processing system design support ubiquitous computing effectively. The study shows that the Mobile-3 Phase Commit Protocol on Three-Tier system architecture displayed proactive management skill to curb process failures. This signifies higher transaction throughput. The inherent load balancing capability of the three-tier system architecture also shows support for improved response time. It is therefore recommended that the Mobile-3PC Protocol-on-Three-Tier system architecture be adopted as the combinatorial system design for ubiquitous transaction processing systems.
Abstract: As computing paradigm shift from a computing paradigm involving one-computer-many people to that involving one-person-one computer and eventually to the one involving one-person-many computers, the need for effective transaction management model for this advancement has also increased. This is because, new transaction management challenges are intr...
Show More
-
The Design of Three Phase Programmable Testing Power Based on CPLD_DSP
Issue:
Volume 5, Issue 1, June 2019
Pages:
13-18
Received:
3 August 2019
Accepted:
19 August 2019
Published:
3 September 2019
Abstract: A design of three phases programmable testing power program-controlled based on CPLD_DSP was introduced in the paper. RAM was driven and six DDS were generated in CPLD. RAM was driven and six DDS (three voltage signal and three current signal) were generated in CPLD. The six DDS signal was used as based signal of testing power. CPLD was programmed to control serial D/A chip named LTC1595B to adjust the value of voltage and current. Voltage signal and current signal were collected and computed and closed loop by DSP. After testing, the output frequency resolution of the system achieved 0.001Hz.The voltage and current control precision achieved 0.02%.
Abstract: A design of three phases programmable testing power program-controlled based on CPLD_DSP was introduced in the paper. RAM was driven and six DDS were generated in CPLD. RAM was driven and six DDS (three voltage signal and three current signal) were generated in CPLD. The six DDS signal was used as based signal of testing power. CPLD was programmed ...
Show More
-
An Overview Research on Wireless Communication Network
Mohaiminul Islam,
Shangzhu Jin
Issue:
Volume 5, Issue 1, June 2019
Pages:
19-28
Received:
30 July 2019
Accepted:
27 August 2019
Published:
11 September 2019
Abstract: Communication Systems can be Wired or Wireless and the medium used for communication can be Guided or Unguided. In Wired Communication, the medium is a physical path like Co-axial Cables, Twisted Pair Cables and Optical Fiber Links etc. which guides the signal to propagate from one point to other. Such type of medium is called Guided Medium. The term wireless refers to the communication or transmission of information over a distance without requiring wires, cables or any other electrical conductors. Wireless communication is one of the important mediums of transmission of data or information to other devices. The Communication is set and the information is transmitted through the air, without requiring any cables, by using electromagnetic waves like radio frequencies, infrared, satellite, etc., in a wireless communication technology network. At the end of the 19th century, the first wireless communication systems were introduced and the technology has significantly been developed over the intervening and subsequent years. Today, the term wireless refers to a variety of devices and technologies ranging from smart phones to laptops, tabs, computers, printers, Bluetooth, etc. On the other hand, Wireless Communication doesn’t require any physical medium but propagates the signal through space. Since, space only allows for signal transmission without any guidance, the medium used in Wireless Communication is called Unguided Medium. In the present days, wireless communication system has become an essential part of various types of wireless communication devices, that permits user to communicate even from remote operated areas. There are many devices used for wireless communication like mobiles. Cordless telephones, GPS, Wi-Fi, satellite television and wireless computer parts. Current wireless phones include 3 and 4G networks, Bluetooth and Wi-Fi technologies. This paper is focused on elements of Wireless Communication system, Types of Wireless Communication, Advantage & Disadvantage of it, Smart city, wireless network security.
Abstract: Communication Systems can be Wired or Wireless and the medium used for communication can be Guided or Unguided. In Wired Communication, the medium is a physical path like Co-axial Cables, Twisted Pair Cables and Optical Fiber Links etc. which guides the signal to propagate from one point to other. Such type of medium is called Guided Medium. The te...
Show More
-
A Two-Connected Graph with Gallai’s Property
Abdul Naeem Kalhoro,
Ali Dino Jumani
Issue:
Volume 5, Issue 1, June 2019
Pages:
29-32
Received:
11 July 2019
Accepted:
14 August 2019
Published:
17 September 2019
Abstract: The most famous examples of Hypo-Hamiltonian graph is the Petersen graph. Before the discovery of Hypo-traceable graphs, Tibor Gallai, in 1966, raised the question whether the graphs in which each vertex is missed by some longest path. This property will be called Gallai’s property, various authors worked on that property. In 1969, Gallai’s question was first replied through H. Walther, who introduced a planar graph on 25 vertices satisfying Gallai’s criterion. Furthermore, H. Walther and H. Voss and Tudor Zamfirescu introduced the graph with 12 vertices and it was guessed that order 12 is the smaller possibility of such a graphLater the question was modifies by Tudor Zamfirescu and asked that whether there exists graphs of Paths and Cycles, that is to say i-connected graphs (planar or non-planar respectively), such that each set of j points are disjoint from some longest paths or cycles., Several good examples answering Tudor Zamfirescu’s questions were published. In this note a graphs is developed with the property that everyone vertex is missed by some longest cycle with connectivity 2, satisfying Gallai’s property. The designed graphs can be useful in various fields of science and technology including computational geometry, networking, theoretical computer science and circuit designing.
Abstract: The most famous examples of Hypo-Hamiltonian graph is the Petersen graph. Before the discovery of Hypo-traceable graphs, Tibor Gallai, in 1966, raised the question whether the graphs in which each vertex is missed by some longest path. This property will be called Gallai’s property, various authors worked on that property. In 1969, Gallai’s questio...
Show More
-
Bases, Challenges, and Main Dangers for Deploying Cybersecurity in Industry 4.0
Issue:
Volume 5, Issue 1, June 2019
Pages:
33-40
Received:
27 July 2019
Accepted:
6 September 2019
Published:
20 September 2019
Abstract: Cybercrime is making waves bigger and bigger in the global economy. Attack companies are adding up, as advances in the scanning of production and work processes make their data easier to prey. Hackers are forming their sights, especially in companies with business models dependent on the availability of digital infrastructures and content. Since the digitization of production and products is constantly deepening the integration, both inside and outside companies, the task of connecting any gaps to protect data availability, integrity and confidentiality increasingly devours the management of time and money. All manufacturing companies are potentially exposed to the risk of cyberattacks, as the root cause of each threat is a new form of addiction. All industrial production chains depend increasingly complex and interconnected, often digital goods, as well as the constant exchange of data, information and knowledge. There is no doubt the benefits of this smart network give companies up and down the value chain. The downside is that it leaves them more vulnerable to digital attacks as the number of points of contact with the outside world increases. In this paper we introduce the context of the problem at hand, ie the cybersecurity challenges for Industry 4.0. Next, we present aspects resulting from a bibliographic study on the subject, which highlights an example of an algorithm that provides security and information stored in Cloud Computing. I develop a topic on current Cybersecurity assessment scenarios, emphasizing an example of a deeper approach. The biggest security risks for Industry 4.0 are presented, where the most commonly used methods for cyber-attacks in Industry 4.0 are spelled out. A set of defense methods are exemplified. It summarizes a set of strategic principles for building a security system. Finally, the main layers are cybersecurity to Industry 4.0.
Abstract: Cybercrime is making waves bigger and bigger in the global economy. Attack companies are adding up, as advances in the scanning of production and work processes make their data easier to prey. Hackers are forming their sights, especially in companies with business models dependent on the availability of digital infrastructures and content. Since th...
Show More