Thursday, December 12, 2019

Robotics and Computer Integrated Manufacturing †MyAssignmenthelp

Question: Discuss about the Robotics and Computer Integrated Manufacturing. Answer: Introduction: The best interface for a system is no User Interface- Using User Interface, we think only about screens that is simply depended on model which is constitutionally unnatural, contains diminishing nature and are inhumane. To make these user interface usable, greater knowledge of talent is required along with more time and money. Only a small improvement comes out after all these efforts. The best way is the no user interface path (Rayes Salam, 2017). A no user interface produces a design in which there are no digital interfaces. It provides a simple and easy technology without the use if interfaces. To enhance natural processes, interfaces should be eliminated. Instead of catering the computers, less influence should be given to them. A system should be created that consists of the involvement of humans rather than machines. Easy User Interface- Examples of Difficult user Interface are: User Interface used in Windows 8 mobile- Windows 8 has introduced a mobile version similar as the desktop version of the windows in 2012 (Staff, 2017). The phone with windows OS looks similar as the desktop version that contains tiles of multiple applications Nest Thermostat- Nest Thermostat is used as house hold material for making the room hot when needed and cold when there is need of cold. It is a user interface that has only a single switch for changing the temperature of the house. Convertbot Circular Menu- Convertbot is one of the user interfaces that are difficult to use as compared to other user interface. This convertbot is used in iPhones (Shack, 2017). It is used to convert the basic units in a circular motion. The features that are included in the convertbot are smooth textures and colors, smooth functioning and the slick animation that makes the iPhone to use with ease. Parallax effect- Scrolling effect of parallax is like 3D illusion where the background is divided into many layers which make a movement with different speed when they are scrolled. This a high technique of user interface where the website divided itself in many parts which are accessed by moving the side back and forth button that comes on the screen. The difficult user interface makes it difficult for the user to use the system whereas easy user interface makes the system very easy so that the user can use them without any difficulties. Features Twisted Pair Coaxial Cable Fibre Optic Bandwidth 16 MHz- 2000MHZ 10 MHz 500MHz-1000MHz Distance 100 meter approx 500 meter approx 550 meter approx Interference rating Low noise cancellation Higher compared to twisted pair Highest interference rate Cost Cheapest medium Moderately expensive Highly expensive Security Low security Moderate security Highly secured cable Types Example 1 Example 2 Example 3 Twisted Pair Modern line and telephone wires Terminal systems those are old. Example- IBM 3270 10GBASE-T Ethernet over single cable Coaxial Cable Television antenna and receiver Radio mast and receiver Equipment control of digital satellite Fibre Optic Fibre Fuse Free space coupling Cable construction The cables are used as in many parts of daily life which includes networking in its use. The twisted pairs are used in telephone wires in a twisted way so that to cancel the noise that comes in communication. Types Advantages Disadvantages Key Requirements Examples Sensor Does not need wiring. New devices can be accommodated. Less secure. Surroundings can trouble easily Sensor based devices. 1. Home Security Model 2. MABO RFID RFID tags stores more information. RFID is versatile. It is costly. Coverage range is small. RFID tag and detecting devices. 1. Real Hospital laundry Management application 2. RFID tags in Products of Shopping Malls Video Tracking Reduce operating expenses. Helps to locate assets. Requires cell data coverage. Requires a monthly fee. Camera and viewing machine. 1. Used in Retailers 2. Used in Banking Sectors Security from IoT devices- The security that are provided from the Internet of Things devices are- Privacy from IoT devices- The privacy that are achieved from IoT devices are mainly of two types- Data Oriented Privacy and Context-Oriented Privacy. Data Oriented Privacy- Data oriented privacy are the privacy that controls the data of a system. This is divided into two categories (Bertino, 2016). External type- in this type of attack, the person who is not authorized with the network gets to know about the data communication that is held between the nodes of the sensors. Internal type- the node of this network is firstly captured and then reprogrammed by the attackers to get those private data. This is much dangerous than the external type. Context-Oriented Privacy- The contextual information of a system is protected by this context oriented protection of privacy. Contextual information are those which provides timing and location that are transmitted over the signals. Round trip propagation delay between sensor and application: 12ms Time for processing each request: 3ms To send or receive any message: 2ms Total time taken by the application is: 1ms + 12ms + 3ms + 2ms = 18ms The budget of time that is saved is 18ms. The application that is designed will be more efficient that the model that is present. Neilsen law states that the bandwidth that is available with the connections of high end broadband will increase by half of its available bandwidth each year, which leads to compound growth of 57x in capacity in ten years (Eckhardt et al., 2015). The models strength is shown in the fact that is true for more than 15 years. Moore Law is a reliable law and computes the working speed of microprocessors, lessen the cost of the storage and the number of megapixel that a phones camera can load. The inexpensive transistors that can be placed in a microchip become doubles in 18 months. Comparison: Neilsen stated that that connection of high end broadband will increase by 50% every year whereas Moore stated that it doubles itself in every 18 months. The law stated by Jakob Neilsen is is 10% less than Moores Law. References Bertino, E. (2016, December). Data privacy for IoT systems: concepts, approaches, and research directions. InBig Data (Big Data), 2016 IEEE International Conference on(pp. 3645-3647). IEEE. Eckhardt, S., Quennehen, B., Olivi, D. J. L., Berntsen, T. K., Cherian, R., Christensen, J. H., ... Herber, A. (2015). Current model capabilities for simulating black carbon and sulfate concentrations in the Arctic atmosphere: a multi-model evaluation using a comprehensive measurement data set.Atmospheric Chemistry and Physics,15(16), 9413-9433. Hecht, J. (2015).Understanding fiber optics. Jeff Hecht. Miguelez, P., Esser, S. M., Slowik, F. (2015).U.S. Patent No. 8,958,694. Washington, DC: U.S. Patent and Trademark Office. Rayes, A., Salam, S. (2017). Internet of Things (IoT) Overview. InInternet of Things From Hype to Reality(pp. 1-34). Springer International Publishing. Shack. (2017).Designshack.net. Retrieved 26 August 2017, from https://designshack.net/articles/graphics/15-in-depth-examples-of-addictive-user-experience/ Staff, C. (2017).5 innovative examples of user interface design.Creative Bloq. Retrieved 26 August 2017, from https://www.creativebloq.com/web-design/user-interface-design-2131842 Velandia, D. M. S., Kaur, N., Whittow, W. G., Conway, P. P., West, A. A. (2016). Towards industrial internet of things: Crankshaft monitoring, traceability and tracking using RFID.Robotics and Computer-Integrated Manufacturing,41, 66-77.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.