Search results
1 – 10 of over 10000David C. Yen and David C. Chou
The emerging wireless technology is now widely applied in the business world. This article addresses the services and technologies of wireless communications used in the business…
Abstract
The emerging wireless technology is now widely applied in the business world. This article addresses the services and technologies of wireless communications used in the business world. Its business applications, managerial issues, and future development are also addressed.
Details
Keywords
The purpose of this paper is to understand how visionary system architects wean the development of a new technology away from the seductions of the path of least resistance – a…
Abstract
Purpose
The purpose of this paper is to understand how visionary system architects wean the development of a new technology away from the seductions of the path of least resistance – a complementary relationship with the entrenched system.
Design/methodology/approach
The paper draws on two cases wherein critical players started pursuing visions of a full‐fledged system while the technology was still an appendage to an established one: Theodore Vail and the development of the Bell telephone system; and the US Navy and the development of wireless telegraphy. Vail's interests were of a commercial nature, securing competitive advantage over Western Union and future rivals. The US Navy's interests were of a geopolitical nature, overthrowing Britain's monopoly on trans‐oceanic cable telegraphy.
Findings
The pursuit of system benefits requires long‐term thinking. In terms of day‐to‐day actions it requires a persistent effort against the seductions of a complementary relationship or the path of least resistance. Vail was compelled to form a separate organization – AT&T – to maintain focus on system formation in the face of short‐term distractions. The US Navy pushed for rules against cross ownership of cable and wireless and opposed international treaties that clubbed the two technologies into the same category, as it wanted the latter to develop independently of the former.
Originality/value
The failure of anticipation, in the case of network technologies, is largely rooted in our inability to see beyond the path of least resistance. Drawing on strategies employed by Vail and the US Navy to wean the development of a new technology away from the path of least resistance, the paper alerts us to possibilities other than the seemingly obvious ones.
Details
Keywords
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange…
Abstract
Develops an original 12‐step management of technology protocol and applies it to 51 applications which range from Du Pont’s failure in Nylon to the Single Online Trade Exchange for Auto Parts procurement by GM, Ford, Daimler‐Chrysler and Renault‐Nissan. Provides many case studies with regards to the adoption of technology and describes seven chief technology officer characteristics. Discusses common errors when companies invest in technology and considers the probabilities of success. Provides 175 questions and answers to reinforce the concepts introduced. States that this substantial journal is aimed primarily at the present and potential chief technology officer to assist their survival and success in national and international markets.
Details
Keywords
Peter Reji Ramanatt, K. Natarajan and K.R. Shobha
Aircraft manufacturers for a long time have been looking to reduce the weight of on board equipment to enhance performance both from commercial aspect and from military aspect…
Abstract
Purpose
Aircraft manufacturers for a long time have been looking to reduce the weight of on board equipment to enhance performance both from commercial aspect and from military aspect. The existing wired technology, using cables to connect different on board line replaceable unit apart from increasing the weight also increases the complexity related to electromagnetic interference, installation and maintenance. With continuous technology upgradation in the wireless domain, aviation industry is in the process of using wireless technology for intra-aircraft communication. Wireless technology can meet most of the challenges of modern avionics systems and significantly reduce the weight. This paper aims to look at various aspects of implementing a wireless network including issues related to wired network, aircraft channel, interference issues, suitable wireless protocols for aircraft applications and security aspects.
Design/methodology/approach
The paper has relied on literature study on wireless avionics intra-communications (WAIC) and the research work carried out in specific areas related to channel inside an aircraft, interference issues of wireless systems with onboard and external systems operating in the same band and security issues related to wireless network and security requirements of implementing an avionics wireless network (AWN). To identify suitable wireless protocol for AWN literature review and simulation to compare different protocols was carried out.
Findings
A single wireless protocol may not be suitable for all aircraft systems, and therefore, there may be a requirement to use multiple technologies. Mutual interference is not expected between WAIC systems with on board and external systems operating in the same band. The channel inside an aircraft is expected to be Rician (LOS) or Rayleigh (NLOS). However, additional measurements may have to be undertaken to have a generalized channel model. Security aspects in an AWN are critical and needs to be analyzed in detail prior to any wireless deployment.
Practical implications
Implementation of wireless technology can pave the way for usage of wireless technology for future generation avionics. With International Telecommunication Union allotting dedicated band for WAIC operations, considerable amount of research has been initiated in this field. It is believed that in the coming 2-3 years, the designers will be ready to replace the existing data wires with wireless transceivers. With radio technical commission for aeronautics and EURACAE involved in development of minimum operations performance standards for WAIC systems use of wireless for intra communication is bound to happen. Therefore, it is necessary to look at different issues for integrating wireless in the avionics domain.
Originality/value
The existing studies have been carried out in individual domains of using wireless in avionics. Separate studies and research work has been carried out for identifying wireless protocols, aircraft channel models, interference issues and security aspects. The paper has attempted to look at all these aspects together including certification.
Siu C. Hui, C.T. Lau and A.C.M. Fong
A wireless campus environment provides user mobility, as users are no longer tied to fixed locations to access the network. It also offers high network accessibility as network…
Abstract
A wireless campus environment provides user mobility, as users are no longer tied to fixed locations to access the network. It also offers high network accessibility as network resources remain accessible after office hours. While existing communication applications can work in a wireless network, they are separate applications that often require different devices. This paper describes a personal communications system that integrates various services into a unified platform, providing a one‐stop source for both information access and communication within a wireless campus environment.
Details
Keywords
Javad Soroor and Mohammad J. Tarokh
As the technology evolves, the ways in which supply chain is coordinated improve. During a careful study on the intelligent wireless web (IWW) and its services for future…
Abstract
Purpose
As the technology evolves, the ways in which supply chain is coordinated improve. During a careful study on the intelligent wireless web (IWW) and its services for future applications, its great potentials for the implementation of a mobile real‐time system for supply chain coordination were realized. This paper seeks to introduce a development process for the IWW. In addition, it aims to explain the concept of mobile real‐time supply chain coordination, and propose and describe a practical model for this subject matter based on the most recent technologies including the IWW and agents.
Design/methodology/approach
Objectives were achieved through a thorough study on the IWW, agent technology, and the ways of applying them for mobile real‐time coordination in supply processes. As a method to conduct the research, first, the paper made out what the IWW services are and how one may develop them. Since mobile real‐time coordination is an absolutely innovative concept, the study prepared a comprehensive understanding of it and then, a practical framework was sketched and explained to implement the suggested system. The approach to this topic was a realistic one and an attempt was made to include all the prerequisites and details for the intended system.
Findings
In the course of the work, it was found that the IWW and other corresponding technologies have the greatest potentials ever available for the realization of a mobile real‐time supply chain coordination system and most of the chapters illustrate the claim.
Originality/value
Mobile real‐time coordination and its use in supply chains is something new. The development process for IWW proposed here is totally practicable and no other implementation scenario for the application of the IWW in mobile real‐time coordination has been suggested yet.
Details
Keywords
Bin Xie, Anup Kumar, Dave Cavalcanti and Dharma P. Agrawal
This paper proposes a new Heterogeneous Multi‐hop Cellular IP (MCIP) network that integrates multi‐hop communication with Cellular IP. MCIP increases the coverage of the wireless…
Abstract
This paper proposes a new Heterogeneous Multi‐hop Cellular IP (MCIP) network that integrates multi‐hop communication with Cellular IP. MCIP increases the coverage of the wireless network and improves the network robustness against adverse propagation phenomena by supporting communication in dead zones and areas with poor radio coverage. MCIP includes three components: location management, connection management and route reconfiguration. Location management is responsible for maintaining the location information for Mobile Stations (MSs) in a local domain. Connection management establishes an initial path for data transmission and a route reconfiguration mechanism is proposed to take advantage of various multi‐hop connection alternatives available based on terminal interfaces, network accessibility and topology. Our simulation results show that MCIP performs well in networks of various sizes including scalability, throughput, and packet delay.
Details
Keywords
Bilal Erman Bilgin and Vehbi Cagri Gungor
High packet error rates and variable link capacity due to harsh electric power system environments make reliable communication a challenging task for WSN in smart grid. Therefore…
Abstract
Purpose
High packet error rates and variable link capacity due to harsh electric power system environments make reliable communication a challenging task for WSN in smart grid. Therefore, to increase network reliability and hence, to improve smart grid system performance, there is an urgent need for reliable communication protocols. The purpose of this paper is to propose an Adaptive Forward Error Correction (AFEC) mechanism for different smart grid environments, including 500 kV outdoor substation and underground transformer vaults, to address these challenges.
Design/methodology/approach
This paper presents the comparative performance evaluations of proposed AFEC mechanism for different smart grid environments. Simulation experiments have been performed by extending the ns‐2 network simulator. It also introduces existing and potential smart grid applications, research challenges, and opportunities of smart grid.
Findings
Comparative performance evaluations show that the proposed AFEC mechanism achieves high communications reliability without causing unnecessary network overhead. Also the advantages of existing smart grid applications have been presented.
Originality/value
The paper shows that high communications reliability without causing unnecessary network overhead has been achieved. Also comprehensive reviews of WSN smart grid applications have been presented.
Details
Keywords
Young-Long Chen and Chung-Ming Cheng
Wu et al.'s scheme has a security problem that is related to anonymity: attackers can determine by interception the identity of a legal user. This paper aims to propose a new…
Abstract
Purpose
Wu et al.'s scheme has a security problem that is related to anonymity: attackers can determine by interception the identity of a legal user. This paper aims to propose a new secure authentication which combines a chaos system with an Arnold cat map. The scheme improves upon that of the Wu et al.'s scheme. The scheme proposed herein provides for full anonymity and improves the security of authentication messages for wireless communications.
Design/methodology/approach
A novel scheme that integrates a chaos sequence is used with an Arnold cat map for authentication messages. Authentication messages are shuffled using an Arnold cat map to improve the security of authentication in wireless communications. An analytic approach based on a chaos sequence with an Arnold cat map is developed to secure authentication. The proposed scheme is presented in this study to overcome the inherent drawbacks of existing designs.
Findings
The integrated scheme involves two steps. First, a chaos map is used to generate a set of chaos sequences that is added to the authentication messages. Second, the authentication messages are shuffled using an Arnold cat map. The main feature of the proposed design is such that the chaos systems are sensitive to the initial values of conditions. Sensitivity will lead to long-term behavior unpredictability to reflect the non-linear dynamic systems. Furthermore, to increase the complexity of the authentication message, the authors also use an Arnold cat map.
Originality/value
The proposed scheme provides functions that include full anonymity properties, protection of the real identity of the user, one-time password properties, timestamp benefits and sufficient complexity of the password. The analysis shows that the proposed scheme exhibits the advantages of the chaos system and is more secure than previous schemes. Notably, the proposed scheme is effective for wireless communications.
Details
Keywords
The article aims to review the history of 3G in the USA from the differing perspectives of the government, regulators and network operators, with the narrative based around the…
Abstract
Purpose
The article aims to review the history of 3G in the USA from the differing perspectives of the government, regulators and network operators, with the narrative based around the various spectrum bands that have been proposed for 3G at various times during the past decade.
Design/methodology/approach
This case study of the background to the development of advanced mobile data services in the USA is written from the perspective of someone familiar with the somewhat different processes evident so far in Europe. Contrasting the USA with Europe is of particular interest because it is the USA, perhaps surprisingly, that is suffering due to a somewhat laisse‐faire attitude to spectrum allocation in the past, whereas the elements of dirigisme in Europe have at least produced consistency, even if progress has been slow.
Findings
What is revealed is a not untypical story of the authorities trying to unwind decisions which seemed to be perfectly sensible at the time when they were taken, but have been overtaken by events (including new technologies) and hence are currently decidedly sub‐optimal. As ever, vested interests do not intend to make concessions without being paid off handsomely.
Originality/value
As things stand, 3G is a reality provided that it reuses existing 2G spectrum bands, but that does not present a blueprint for the future if the USA does not wish to be left behind.
Details