Computing and Communication Workshop and Conference最新文献

筛选
英文 中文
Interactive clothes based on IOT using NFC and Mobile Application 基于NFC和移动应用的物联网交互式服装
Computing and Communication Workshop and Conference Pub Date : 1900-01-01 DOI: 10.1109/CCWC.2017.7868339
G. KishoreKumarReddyN., K. Rajeshwari
{"title":"Interactive clothes based on IOT using NFC and Mobile Application","authors":"G. KishoreKumarReddyN., K. Rajeshwari","doi":"10.1109/CCWC.2017.7868339","DOIUrl":"https://doi.org/10.1109/CCWC.2017.7868339","url":null,"abstract":"The invention of Internet has made the day-to-day life facile and less complicated. A new revolution of Internet is the Internet of Things (IOT) where various devices and systems are connected to leverage data anywhere; anytime. IOT is expected to spread rapidly, over the coming years. A new dimension of services will be unleashed due to this confluence and motivation thereby improving the Quality of livelihood. Though IOT has made its way to all major industrial fields; textile industry is one region IOT has not made its mark yet. The proposed system is called the ‘Interactive clothes’ that makes use of NFC tags and IOT. A NFC tag is embedded within the clothes that consists of a unique Id. A mobile application is developed that scans the NFC tag present in the cloth and gets linked to a database stored in a cloud. It provides a digital environment for both the manufacturers and the end users. For manufacturers, the system has the potential to identify cheap replicas, keep track of the loyal customers, minimize the wastage of resources by eliminating price tags and to keep track of the goods using a single relational database system. As for end users, the benefits are immense. The mobile application provides a simple user interface where users could get advice on matching their clothes with other outfits, dressing according to the season, facilitating dry cleaning process, and deciding whether the color suits their skin tone. It also helps us keep track of the frequency of use.","PeriodicalId":118740,"journal":{"name":"Computing and Communication Workshop and Conference","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121805861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Survey From 1G to 5G Including the Advent of 6G: Architectures, Multiple Access Techniques, and Emerging Technologies 从1G到5G的调查,包括6G的出现:架构,多址技术和新兴技术
Computing and Communication Workshop and Conference Pub Date : 1900-01-01 DOI: 10.1109/CCWC54503.2022.9720781
A. Shah
{"title":"A Survey From 1G to 5G Including the Advent of 6G: Architectures, Multiple Access Techniques, and Emerging Technologies","authors":"A. Shah","doi":"10.1109/CCWC54503.2022.9720781","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720781","url":null,"abstract":"There is an evolution in cellular communication due to the high demand for better quality of service, data rates, capacity, and lower latency. To satisfy these expectations, cellular network design is being drastically improved. This paper provides a survey of cellular network architectures, multiple access techniques, and emerging technologies from first generation (1G) to fifth generation (5G). The paper also includes a glimpse at what the forthcoming sixth generation (6G) might anticipate. The architecture of the cellular network from 1G to 5G is presented. Some of the important emerging technologies that enable the architecture to be improved and fulfill user needs are discussed. These emerging technologies include massive MIMO, software-defined networking, mm-Wave, etc. Moreover, multiple access techniques used from 1G to 5G are studied. Comparison among different generations of cellular communication is presented. There are challenges and open issues for 6G which are described.","PeriodicalId":118740,"journal":{"name":"Computing and Communication Workshop and Conference","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131313202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Contactless Payments through E-wallets on Mobile Devices in the Context of Covid 19 at VietNam 越南新冠肺炎疫情背景下移动设备电子钱包非接触式支付
Computing and Communication Workshop and Conference Pub Date : 1900-01-01 DOI: 10.1109/CCWC54503.2022.9720868
Nguyen Binh Phuong Duy, Giang Nguyen Thi Phuong
{"title":"Contactless Payments through E-wallets on Mobile Devices in the Context of Covid 19 at VietNam","authors":"Nguyen Binh Phuong Duy, Giang Nguyen Thi Phuong","doi":"10.1109/CCWC54503.2022.9720868","DOIUrl":"https://doi.org/10.1109/CCWC54503.2022.9720868","url":null,"abstract":"This paper examines factors affecting the usefulness and behavioral intention to use E- Wallet on mobile devices in the context of Covid-19 pandemic in Vietnam. Under the social distancing policy adopted by the Government, it is necessary to reduce cash payment activities. The researcher investigates 5 factors to enhance behavioral intention to use E-Wallet, including Perceived Ease of Use, Perceived Usefulness, Convenience, Security and Privacy, and Social Influence. Also, Perceived Usefulness is considered a crucial factor in stimulating new users to use E- Wallet payment on mobile devices. Using SEM method, the researcher analyzes data collected from users with payment activities in the Covid-19 pandemic. The result illustrates a positive correlation of examined factors with Perceived Usefulness and Behavioral Intention. Whereas Social Influence strongly affects Behavioral Intention, Security and Privacy does not show a statistically significant relationship with it. Nevertheless, Security and Privacy has the strongest impact on the enhancement of the usefulness to users. From these results, the researcher discusses administrative implications to improve Perceived Usefulness and Behavioral Intention of users in Vietnam.","PeriodicalId":118740,"journal":{"name":"Computing and Communication Workshop and Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116194949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信