scholarly journals Current Trend in Wireless Networks

Author(s):  
Ali Hameed Yassir ◽  
Ali Fattah Dakhil ◽  
Waffa Muhammed Ali ◽  
Abeer Nasir Faisal

In this study, a general overview of the current trend wireless network has been presented the explosive parallel growth of both the Internet and cellular telephone services are becoming the two most important phenomena that impact the required modern feasible and secure telecommunications. A wireless service technology has become well-known in technology markets. WLAN implemented the development of the wired LAN. Industries produce the required components, which lead to the fast developments in designing and implementing of such networks. The merging of wireless network deemed to be a solution to some of the problems of the wired networks. In this survey study, we will try to discuss the advantages of wireless devices and indicate the challenges involved in this technology from the point of view of its foundation, architecture, requirements, its components, and protocols.

Author(s):  
Deniz Gozde Ertin Tezgor ◽  
◽  
Beste Karakaya Aytin ◽  

University campus gardens provide the integrity of the environment with educational buildings, connect the users and buildings, and provide liveable spaces for users. Campuses serve as a public space for academic, administrative and technical staff, especially students, as well as incoming visitors. As a public space, the ability of students to meet all their recreational, social and cultural needs is directly related to the content and designs of the open and green spaces of the campuses. It is essential to ensure the landscape designs of these spaces, in line with the structural and planting design principles, and with the successful composition of the user-space relationship where the user needs and desires are determined. From this point of view, it is aimed to evaluate the landscape designs of the two campuses of Trakya University, where art and design-oriented education is realised, in terms of user satisfaction. For this purpose, it was revealed by a survey that measures the satisfaction of the users of the two campuses where determined the spatial and landscape requirements of design-based education. In the survey, the users' duration and purpose of use of the campus, feelings created by various equipment on users, the usage the building and gardens and the current conditions of the campuses were determined. The frequency percentages of the data obtained in the survey study were evaluated using the SPSS 26.0 program. As a result, suggestions have been developed to improve the current use of the two campus gardens and to ensure the sustainability of the spaces.


2021 ◽  
Vol 8 (4) ◽  
pp. 116-120
Author(s):  
Igor' Lopatin

Economic crime at the regional level is a versatile category that is dangerous for the population of the region and negative from the point of view of society, characterized by the existing regional social conditions. The danger of manifestations of economic crime consists both in the consequence in the form of significant material damage to the population of the region, and in the destabilization of the regional economy as a whole. Parallel shadow operations with an illegal orientation are emerging and progressing in the regional society, which, given the current trend, can direct all the resources available in the region to their development.


Author(s):  
Endang Setyaningsih

Current trend in education has acknowledged the urgency to move students from the role of traditional receiver and echoer of information to the role of critical listener, speaker, reader, and writer. In so doing, the students need to embrace the role of text analysts who continuously question texts that they encounter. This study looked for indices of students’ engagement in text analyst role. The data for the analysis were collected from 25 EFL university students’ reviews which were randomly selected. Using the guidepost developed from Luke and Freebody’s (1999) Four Resources Framework, the study highlighted points of information and/or questions or issues addressed in the students’ writing which indicated students’ role as text analysts. The study revealed that 40 percent of the students failed to practice the text analyst role. Meanwhile, those who addressed the role showcased five major patterns of indices: (1) questioned the trustworthiness of text, (2) recognized bias, (3) uncovered hidden intention/agenda, (4) identified harmed/benefitted party, and (5) provided alternate point of view/way of saying and/or personal standing. This study concludes that the students will be able to engage in text analyst role under two conditions (1) they are not struggling with the basic comprehension and (2) they have reached a state of habituation of mind in terms of questioning text. It is therefore recommended that the students be given sufficient time for familiarization and have continuous practices to make a critical approach to texts.


Author(s):  
Sukant Kishoro Bisoy ◽  
Prasant Kumar Pattnaik

The Transmission Control Protocol (TCP) is a reliable protocol of transport layer which delivers data over unreliable networks. It was designed in the context of wired networks. Due to popularity of wireless communication it is made to extend TCP protocol to wireless environments where wired and wireless network can work smoothly. Although TCP work in wireless and wired-cum-wireless network, the performance is not up to the mark. In literature lot of protocols has been proposed to adopt TCP in wireless mobile ad hoc network. In this, we present an overall view on this issue and detailed discussion of the major factors involved. In addition, we survey the main proposals which aim at adapting TCP to mobile and static Ad hoc environments. Specifically, we show how TCP can be affected by mobility and its interaction with routing protocol in static and dynamic wireless ad hoc network.


Author(s):  
Magnus Andersson ◽  
Rikard Lindgren

Ubiquitous access and pervasive computing concept is almost intrinsically tied to wireless communications. Emerging next-generation wireless networks enable innovative service access in every situation. Apart from many remote services, proximity services will also be widely available. People currently rely on numerous forms of identities to access these services. The inconvenience of possessing and using these identities creates significant security vulnerability, especially from network and device point of view in wireless service access. After explaining the current identity solutions scenarios, the chapter illustrates the on-going efforts by various organizations, the requirements and frameworks to develop an innovative, easy-to-use identity management mechanism to access the future diverse service worlds. The chapter also conveys various possibilities, challenges, and research questions evolving in these areas.


Author(s):  
Sheng-Uei Guan

M-commerce is largely unrealized to date because there still does not exist a single killer application that can attract wireless users to use wireless services. According to a recent survey by the Gartner, Inc. (Wong, 2005), besides the importance of coverage of wireless network and pricing issues, the wireless Internet and data services is the next crucial factor that attracts users to wireless service. As such, there is a need to improve the data services over the wireless network. One of these services is the information retrieval service. This article discusses the usage of ontology to create an efficient environment for m-commerce users to form queries. The establishment of a method that combines keyword searches with using ontology to perform query formation tasks further allows a more flexible m-commerce environment for users. Also, with the use of genetic algorithm, it is hoped that query effectiveness can be achieved, at the same time saving computational time.


2009 ◽  
Vol 55 (No. 3) ◽  
pp. 121-127 ◽  
Author(s):  
M. Ghadiryanfar ◽  
A. Keyhani ◽  
A. Akram ◽  
S. Rafiee

The aim of this study was to investigate the effect of the tractor supply on agricultural yield from a macro plan perspective. The required information was obtained from the Institute of Agricultural Machinery Extension and Ministry of Jihad-e-Agriculture of Iran. Regarding the number of tractors distributed, the maximum number of tractors distributed in Iran was 37 996 in 1983. The effect of this distribution pattern on the crops yields and planted area was investigated for a thirteen-year period from 1983 to 1996. The results showed that these tractors had significant effects on the crops yields and planted area. Also it was inferred that the power distribution in Iran agriculture with the current trend is not acceptable and no significant changes are expected from the current policy. It seems that the Iran agriculture market needs a shock like that in 1983, and that many tractors with different engine sizes should be supplied into the market in a short period of time.


2013 ◽  
Vol 378 ◽  
pp. 514-519
Author(s):  
Jin Jin Ma ◽  
Guang Jin ◽  
Xian Liang Jiang ◽  
Lu Juan Huang ◽  
Xian Mang He

Wireless network technology has developed rapidly and been widely used in different forms, such as Wireless LAN (WLAN), Wireless Sensor Network (WSN) and the 3G Mobile Communications. As one core curriculum of IT major, the computer network curriculum mainly focuses on the wired networks rather than the wireless networks and is hard to meet the needs of IT industry. In this paper, we firstly survey the current teaching of wireless network techniques and then discuss the necessity of the wireless network curriculums. By improving teaching contents and methods, we put forward a novel wireless network teaching mode using simulation tools.


Author(s):  
Rizik M. H. Al-Sayyed ◽  
Wadi’ A. Hijawi ◽  
Anwar M. Bashiti ◽  
Ibrahim AlJarah ◽  
Nadim Obeid ◽  
...  

Cloud computing is one of the paradigms that have undertaken to deliver the utility computing concept. It views computing as a utility similar to water and electricity. We aim in this paper to make an investigation of two highly efficacious Cloud platforms: Microsoft Azure (Azure) and Amazon Web Services (AWS) from users’ perspectives the point of view of users. We highlight and compare in depth the features of Azure and AWS from users’ perspectives. The features which we shall focus on include (1) Pricing, (2) Availability, (3) Confidentiality, (4) Secrecy, (5) Tier Account and (6) Service Level Agreement (SLA). The study shows that Azure is more appropriate when considering Pricing and Availability (Error Rate) while AWS is more appropriate when considering Tier account. Our user survey study and its statistical analysis agreed with the arguments made for each of the six comparisons factors.


Sign in / Sign up

Export Citation Format

Share Document