Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

976 Full-Text Articles 1351 Authors 485615 Downloads 86 Institutions

All Articles in Digital Communications and Networking

Faceted Search

976 full-text articles. Page 1 of 36.

The Practicality Of Cloud Computing, Xiaohua (Cindy) Li 2017 Sacred Heart University

The Practicality Of Cloud Computing, Xiaohua (Cindy) Li

Cindy Li

Since its inception, cloud computing has become the current paradigm. Organizations of different size and type have embraced the concept because of its both technological and economic advantages. Sacred Heart University Library has recently published its newly designed website on the cloud. For a small academic library, what does it mean to put their online data on the cloud? This paper will analyze and discuss the advantages of cloud computing, and some potential obstacles created by it through the author’s observations. This paper hopes the uniqueness of the case will contribute to the improvement of cloud computing experience of ...


One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer DR, Michael McKeever, Jonathan Blackledge Professor 2017 Dublin Institute of Technology

One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge Professor

Conference papers

In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising security using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific ``one-to-Cloud'' storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by ``Virtual Prototyping'' in the latest version ...


Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin McFall 2017 Kennesaw State University

Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall

The Kennesaw Journal of Undergraduate Research

The standard method for speed control is the cruise control system built into most modern vehicles. These systems employ a PID controller which actuates the accelerator thus, in turn, maintains the desired vehicle speed. The main drawback of such a system is that typically the cruise control will only engage above 25 mph. The goal of this paper is to describe a system which we used to control vehicle speed from a stop to any desired speed using an Arduino microcontroller and a CAN BUS shield, from where autonomous features can be built upon. With this system, we were able ...


The Dark Destiny Of Safety, Max Rowe, Jose Trejos 2017 Northwestern University

The Dark Destiny Of Safety, Max Rowe, Jose Trejos

Politica Northwestern

Most people imagine hacking to be an exceedingly complex crime, requiring an understanding of computing systems that goes far beyond that of average, functionally literate PC users. While there are sophisticated hacking techniques which do fit this description, many forms of hacking require little more than the ability to install basic programs on a computer. Perhaps the simplest of all forms of hacking is DDoS , or Denial of Service attack. DDoS is a simple brute-force method that spams a server with millions of identical simple requests, which can cause sites and providers to be overloaded and temporarily shut down. Users ...


Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis 2017 Iowa State University

Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis

Douglas Jacobson

A network connection blocker for monitoring connections between host computers in a network and blocking the unwanted connections. The host computers transmit connection packets between each other in accordance with a network protocol suite when seeking to establish, providing network services with, and close the connections. The network protocol suite includes a connection oriented transport layer protocol. The network connection blocker comprises a network interface that receives the connection packets transmitted between the host computers. It also comprises a blocking module that processes the received connection packets to detect the unwanted connections. The blocking module then generates connection packets in ...


Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell 2017 California Polytechnic State University, San Luis Obispo

Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell

Computer Science

I’m going to discuss the process used to research, design, and develop a mobile application to handle song requests from patrons to disc jockeys. The research phase was completed in the first half of the project, during CSC-491, along with much of the design. The rest of the design and all of the development was completed during CSC-492. Once development began there were times when reverting back to the design phase was needed, which became apparent as more was learned about the mobile platform chosen for development, Android, and the backend server utilized, Google Firebase. Ultimately the project was ...


Smartgarden, Samuel S. Lees, Matthew T. Lindly 2017 California Polytechnic State University, San Luis Obispo

Smartgarden, Samuel S. Lees, Matthew T. Lindly

Computer Engineering

The problem that the SmartGarden project seeks to solve is the challenge of watering succulents correctly and maintaining consistent plant health. Too much water can cause root rot and drowning while too little water can cause dehydration and starvation.
The SmartGarden solves this common problem by configuring a Raspberry Pi to measure soil moisture, store the data to an AWS server in the cloud, and water the succulent when necessary, informing the user by providing both a web-interface and a variety of notifications.


Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips 2017 California Polytechnic State University, San Luis Obispo

Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips

Electrical Engineering

The Internet of Things asserts that there exists a global need for all objects to connect easily and accessibly. Today, smartphones, tablets, laptops and smart watches makeup just a few of the interconnected devices by the greater population. As a result a growing need for wireless connection between personal devices like phones, and computers to everyday appliances exists. This idea extends directly to households, businesses and buildings, where a growing need for smart home or smart-business appliances has taken root. Many companies like Nest, ADT and Apple make products for automated home security and in home media control. The Wireless ...


Blend It Wine Blending Distribution System, Connor Clarry, Russell Temple, Matt Moren 2017 California Polytechnic State University, San Luis Obispo

Blend It Wine Blending Distribution System, Connor Clarry, Russell Temple, Matt Moren

Mechanical Engineering

No abstract provided.


Micro-Spi Sediment Profile Imaging Micro-Inspector, Andrew P. Corvin, Caleb T. Davies, Matt R. Ferrari 2017 California Polytechnic State University, San Luis Obispo

Micro-Spi Sediment Profile Imaging Micro-Inspector, Andrew P. Corvin, Caleb T. Davies, Matt R. Ferrari

Mechanical Engineering

This project was proposed by Dr. Brian Paavo through a desire to more easily study the benthic sediment layers of the ocean. To do so, he asked us to build a simple and compact machine for use in sediment profile imagery (SPI). Although devices like this already exist, they are all large scale devices that require a ship with a crane to deploy, which is expensive and time consuming. Instead, he desired a “micro” SPI, which is capable of being deployed from a small vessel that can easily navigate shallow waters. Our interpretation of these requirements was as follows: a ...


An Analysis Of Heroku And Aws For Growing Startups, Colton B. Stapper 2017 California Polytechnic State University, San Luis Obispo

An Analysis Of Heroku And Aws For Growing Startups, Colton B. Stapper

Computer Science

This project presents information on the architecture of most modern cloud-hosting platforms, and gives a cost-benefit analysis of two common Platform-as-a-Service (PaaS) companies: Heroku and AWS.


Vertical Search Engines, Kevin Curran, Jude Mc Glinchey 2017 Dublin Institute of Technology

Vertical Search Engines, Kevin Curran, Jude Mc Glinchey

The ITB Journal

This paper outlines the growth in popularity of vertical search engines, their origins, the differences between them and well-known broad based search engines such as Google and Yahoo. We also discuss their use in business-to-business, their marketing and advertising costs, what the revenue streams are and who uses them.


Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane 2017 Dublin Institute of Technology

Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane

The ITB Journal

The Internet has already become a hostile environment for computers, especially when they are directly connected with a public IP address. We have experienced this hostile activity where on an average day; the ITB Honeypot recorded over a thousand reconnaissance attacks seeking unauthorised entry onto our private network. Our Honeypot is a basic PC running Windows XP with no services offered and no activity from users that would generate traffic. The Honeypot is running in a passive state on a stub-network where all inbound and outbound traffic is recorded at the bridging computer to the WAN. We report on the ...


Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley 2017 Cedarville University

Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley

The Research and Scholarship Symposium

The Augmented Reality Technician Assistance Program is a proof-of-concept project for allowing a remote expert to communicate with and assist a field technician in completing procedures with which the technician may be unfamiliar. For example, an expert in Navy aircraft maintenance could advise an Air Force flight mechanic about performing repairs or maintenance on Navy aircraft. The end goal of our Cedarville computer science capstone project is to create an experimental prototype to deliver to the Air Force Research Laboratory. In our prototype the expert uses a Microsoft Surface Pro tablet to communicate via marked up still images with a ...


Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell 2017 University of Nebraska-Lincoln

Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell

Publications from Information Technology Services

How can academic institutions help educate their students about the risks of identity theft? Or teach students to better understand how one’s online presence can hold so much joy and angst? For one campus, the University of Nebraska–Lincoln, the opportunity came from a middle school teacher engaging his students in a future problem-solving activity. UNL had the opportunity to create a 45-minute presentation on identity theft for local public school students who would be spending the day on campus researching this topic.

While preparing the presentation, we realized a top 10 list on identity theft for UNL students ...


Making Random - Cryptography And The Generation Of Random Sequences, Samuel Barton 2017 University of Southern Maine

Making Random - Cryptography And The Generation Of Random Sequences, Samuel Barton

Thinking Matters

The algorithm utilizes the behavior of modern operating systems to generate random bits by putting the process to sleep for 10 microseconds, and then comparing the actual number of microseconds slept to the expected amount. The reason why this works for generating \random" bits is that modern operating systems do not wake processes exactly when they request. This is due to process scheduling. The algorithm uses the randomness in actual sleep time to generate each bit.

The bits are not truly random, as if a person were able to force the algorithm to always execute, then we would not have ...


Research Poster.Pdf, Desiree Dominguez 2017 University of Central Florida

Research Poster.Pdf, Desiree Dominguez

Desiree Dominguez

Analyzing Wi-Fi probe request is essential for public safety and search and rescue missions. In this paper, we studied how Wi-Fi-probe requests are affected by different materials such as cloth, plastic, concrete, and metal when captured by Unmanned Aerial Serial (UAS) when having an attached a Wi-Fi Pineapple Tetra. Leaving the mobile devices active and setting them in a random position in an open zoned grid, the drone flying a mapping mission captured the Wi-Fi probe requests to determine the effect these materials have on the transmission of Wi-Fi probe requests. Through this method, the location of the Android Smartphones ...


Cloud Computing: Current And Future Impact On Organizations, Yiyun Zhu 2017 Western Oregon University

Cloud Computing: Current And Future Impact On Organizations, Yiyun Zhu

Student Theses, Papers and Projects (Computer Science)

This project focuses on the business application of cloud computing, both at present and in the future. This investigation aims to assist business users of cloud computing services to improve the perception of cloud computing, to assess the value of their cloud computing service relationships, and to assist in selecting appropriate cloud computing services. This project bases its information on the existing cloud computing technology to clarify the technical aspects of current cloud services and companies. It presents the key elements of conception of cloud computing, its definitions, main service models, and implementation types. Ultimately, this paper analyzes the cons ...


On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael McKeever, Jonathan Blackledge Profesor 2017 Dublin Institute of Technology

On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Profesor

Conference papers

Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise ...


Collaborating Through Virtual Communities Using Cloud Technology, Diane Stottlemyer 2017 American Public University System

Collaborating Through Virtual Communities Using Cloud Technology, Diane Stottlemyer

ePress Monographs

Collaboration and communication are both essential for successful interaction and participation in virtual communities. In this book, there are discussions of how a virtual community can be an essential communication tool to enhance traditional and online schools. In addition, the virtual community can provide information on the importance of collaboration for those who want to discuss a specific topic area. The virtual community is a tool that can encourage the interaction and exchange of information between individuals. Cloud Technology has helped schools in many ways managing cost while still improving communication and e-collaboration. Cloud technology has increased opportunities for setting ...


Digital Commons powered by bepress