The Ftc And Ai Governance: A Regulatory Proposal, 2020 Seattle University School of Law
The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro
Seattle Journal of Technology, Environmental & Innovation Law
No abstract provided.
A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak
Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover ...
Rapid Restoration Techniques For Software-Defined Networks, 2020 Technological University Dublin
Rapid Restoration Techniques For Software-Defined Networks, Ali Malik, Ruairí De Fréin, Benjamin Aziz
There is increasing demand in modern day business applications for communication networks to be robust and reliable due to the complexity and critical nature of such applications. As such, data delivery is expected to be reliable and secure even in the harshest of environments. Software-Defined Networking (SDN) is gaining traction as a promising approach for designing network architectures which are robust and flexible. One reason for this is that separating the data plane from the control plane, increases the controller’s ability to configure the network rapidly. When network failure events occur, the network manager may trade-off the optimality of ...
Trading Up: Exchanging Our Data For A Better Life, 2020 Brigham Young University
Trading Up: Exchanging Our Data For A Better Life, Nathan Turner
Marriott Student Review
We live in a data-driven economy. Many people feel like consumers are on the losing end of an economic data-battle with tech giants, but this is simply not true; our data can drive innovation. That’s right—personal data collected from you and me can influence new technologies that will improve our lives. This should excite us, but our fear of losing data privacy can quell our excitement for progress and even restrict innovation. Our quality of life has already begun to improve through data driven innovation, and technological progress is not slowing down. If we let our fear of ...
Minet Magnetic Localization, 2020 University of Mississippi
Minet Magnetic Localization, Michael Robert Drake
Indoor localization is a modern problem of computer science that has no unified solution, as there are significant trade-offs involved with every technique. Magnetic localization is a less popular sub-field that is rooted in infrastructure-free design, which can allow universal setup. Magnetic localization is also often paired with probabilistic programming, which provides a powerful method of estimation, given a limited understanding of the environment. This thesis presents Minet, which is a particle filter based localization system using the Earth's geomagnetic field. It explores the novel idea of state space limitation as a method of optimizing a particle filter, by ...
Zenneck Waves In Decision Agriculture: An Empirical Verification And Application In Em-Based Underground Wireless Power Transfer, Usman Raza, Abdul Salam
In this article, the results of experiments for the observation of Zenneck surface waves in sub GHz frequency range using dipole antennas are presented. Experiments are conducted over three different soils for communications distances of up to 1 m. This empirical analysis confirms the existence of Zenneck waves over the soil surface. Through the power delay profile (PDP) analysis, it has been shown that other subsurface components exhibit rapid decay as compared to the Zenneck waves. A potential application of the Zenneck waves for energy transmission in the area of decision agriculture is explored. Accordingly, a novel wireless through-the-soil power ...
Locating Relay Nodes To Maximize Wireless Sensor Network Lifetime: A Numerical Study, 2020 University of Arkansas, Fayetteville
Locating Relay Nodes To Maximize Wireless Sensor Network Lifetime: A Numerical Study, Maria Rene Arandia Jimenez
Industrial Engineering Undergraduate Honors Theses
A wireless sensor network (WSN) is a group of sensors deployed over an area, which monitor changes in the environment, collects them as data and forwards it between sensors through wireless links. Data is routed, either in a single-hop or multi-hop manner, with the goal of getting this collected data to the sink nodes, which have higher computational capabilities and connects the network with a user interface. Studies have determined that multi-hop WSNs that integrate relay nodes, which function is to only receive and forward data, can maximize lifetime network. A linear programming model, created by Chang and Tassiulas in ...
On-Site And External Energy Harvesting In Underground Wireless, 2020 Purdue University
On-Site And External Energy Harvesting In Underground Wireless, Usman Raza, Abdul Salam
Energy efficiency is vital for uninterrupted long-term operation of wireless underground communication nodes in the field of decision agriculture. In this paper, energy harvesting and wireless power transfer techniques are discussed with applications in underground wireless communications (UWC). Various external wireless power transfer techniques are explored. Moreover, key energy harvesting technologies are presented that utilize available energy sources in the field such as vibration, solar, and wind. In this regard, the Electromagnetic(EM)- and Magnetic Induction(MI)-based approaches are explained. Furthermore, the vibration-based energy harvesting models are reviewed as well. These energy harvesting approaches lead to design of an ...
The Data Market: A Proposal To Control Data About You, 2020 Southern Methodist University
The Data Market: A Proposal To Control Data About You, David Shaw, Daniel W. Engels
SMU Data Science Review
The current legal and economic infrastructure facilitating data collection practices and data analysis has led to extreme over-collection of data and the overall loss of personal privacy. Data over-collection has led to a secondary market for consumer data that is invisible to the consumer and results in a person's data being distributed far beyond their knowledge or control. In this paper, we propose a Data Market framework and design for personal data management and privacy protection in which the individual controls and profits from the dissemination of their data. Our proposed Data Market uses a market-based approach utilizing blockchain ...
Drones Detection Using Smart Sensors, 2020 Embry-Riddle Aeronautical University
Drones Detection Using Smart Sensors, Aishah Moafa
Dissertations and Theses
Drones are modern and sophisticated technology that have been used in numerous fields. Nowadays, many countries use them in exploration, reconnaissance operations, and espionage in military operations. Drones also have many uses that are not limited to only daily life. For example, drones are used for home delivery, safety monitoring, and others. However, the use of drones is a double-edged sword. Drones can be used for positive purposes to improve the quality of human lives, but they can also be used for criminal purposes and other detrimental purposes. In fact, many countries have been attacked by terrorists using smart drones ...
A Test Bed For Evaluating The Performance Of Iot Networks, 2020 Liberty University
A Test Bed For Evaluating The Performance Of Iot Networks, Hope Harvey
Senior Honors Theses
The use of smaller, personal IoT networks has increased over the past several years. These devices demand a lot of resources but only have limited access. To establish and sustain a flexible network connection, 6LoWPAN with RPL protocol is commonly used. While RPL provides a low-cost solution for connection, it lacks load balancing mechanisms. Improvements in OF load balancing can be implemented to strengthen network stability. This paper proposes a test bed configuration to show the toll of frequent parent switching on 6LoWPAN. Contiki’s RPL 6LoWPAN software runs on STM32 Nucleo microcontrollers with expansion boards for this test bed ...
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, 2020 University of Massachusetts Amherst
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan
Content delivery networks (CDNs) deploy hundreds of thousands of servers around the world to cache and serve trillions of user requests every day for a diverse set of content such as web pages, videos, software downloads and images. In this dissertation, we propose algorithms to provision traffic across cache servers and manage the content they host to achieve performance objectives such as maximizing the cache hit rate, minimizing the bandwidth cost of the network and minimizing the energy consumption of the servers.
Traffic provisioning is the process of determining the set of content domains hosted on the servers. We propose ...
Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, 2020 University of Nebraska - Lincoln
Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services
Advancing Technology in Education at the University of Nebraska, May 7, 2019
Welcome Address • Susan Fritz, Ph.D., Executive Vice President and Provost, University of Nebraska 6
Opening Remarks • Mary Niemiec, Associate Vice President for Digital Education, Director of University of Nebraska Online 6
Keynote Presentation: Shaping the Next Generation of Higher Education • Bryan Alexander, Ph.D. 6
Featured Extended Presentation: Redesigning Courses & Determining Effectiveness Through Research • Tanya Joosten, University of Wisconsin-Milwaukee (UWM), Erin Blankenship, Ph.D. (UNL), Ella Burnham (UNL), Nate Eidem, Ph.D. (UNK), Marnie Imhoff (UNMC), Linsey Donner (UNMC), Ellie Miller (UNMC) 7
5 Ways to Utilize ...
W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, 2020 Deenbandhu Chhotu Ram University of Science and Technology
W-Gun: Whale Optimization For Energy And Delay-Centric Green Underwater Networks, Rajkumar Singh Rathore, Houbing Song, Suman Sangwan, Sukriti Mazumdar, Omprakash Kaiwartya, Kabita Adhikari, Rupak Kharel
Underwater sensor networks (UWSNs) have witnessed significant R&D attention in both academia and industry due to their growing application domains, such as border security, freight via sea or river, natural petroleum production and the fishing industry. Considering the deep underwater-oriented access constraints, energy-centric communication for the lifetime maximization of tiny sensor nodes in UWSNs is one of the key research themes in this domain. Existing literature on green UWSNs are majorly adapted from the existing techniques in traditional wireless sensor network relying on geolocation and the quality of service-centric underwater relay node selection, without paying much attention to the ...
Interoperable Ads-B Confidentiality, 2020 Air Force Institute of Technology
Interoperable Ads-B Confidentiality, Brandon C. Burfeind
Theses and Dissertations
The worldwide air traffic infrastructure is in the late stages of transition from legacy transponder systems to Automatic Dependent Surveillance - Broadcast (ADS-B) based systems. ADS-B relies on position information from GNSS and requires aircraft to transmit their identification, state, and position. ADS-B promises the availability of high-fidelity air traffic information; however, position and identification data are not secured via authentication or encryption. This lack of security for ADS-B allows non-participants to observe and collect data on both government and private flight activity. This is a proposal for a lightweight, interoperable ADS-B confidentiality protocol which uses existing format preserving encryption and ...
Techniques To Solve Decision-Making Problems, 2020 Scientific and Innovation Center of Information and Communication Technologies at Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Address: Amir Temurstreet, 108, 100200, Tashkent city, Republic of Uzbekistan, Phone:+998-95-195-47-52
Techniques To Solve Decision-Making Problems, Dilnoz Tulkunovna Muhamediyeva, Bekmuratov Fayzievich Tulkun
Chemical Technology, Control and Management
Solving decision-making problems in poorly formalized systems only with the help of deterministic and probabilistic methods is insufficient. To do this, it is necessary to widely apply the methods of hybrid intelligent systems and, especially, the methods of “soft” calculations (SoftCalculation, SoftComputing) and the directions of ComputationalIntelligence — intelligent computing technologies that are emerging on this theoretical and methodological base. An immune - fuzzy algorithm for the synthesis of fuzzy inference systems (FIS) is proposed. A two-stage adaptive FIS synthesis algorithm is described. At the first stage, the initial fuzzy parameters are clustered in order to reduce the number of input parameters ...
Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, 2020 Harrisburg University of Science and Technology
Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan
Other Student Works
Cloud computing is the development of distributed and parallel computing that seeks to provide a new model of business computing by automating services and efficiently storing proprietary data. Cloud bursting is one of the cloud computing techniques that adopts the hybrid cloud model which seeks to expand the resources of a private cloud through the integration with a public cloud infrastructure. In this paper, the viability of cloud bursting is experimented and an attempt to integrate AWS EC2 onto an Openstack cloud environment using the Openstack OMNI driver is conducted.
Apps For Actionable Workflows: Tools To Stay In The Loop And On Top Of Tasks, 2020 University of Georgia School of Law
Apps For Actionable Workflows: Tools To Stay In The Loop And On Top Of Tasks, Rachel S. Evans
No matter what member of the team you are or what type of library you are in - be it electronic resources manager, cataloger, head of acquisitions, ILS or systems administrator, or even repository coordinator - getting things done and meeting goals depends largely on how you communicate with one another and how you handle your time. Meeting goals and deadlines on both big and small projects in addition to your personal tasks can be achieved less painfully by making effective use of a few on point tools. This session will use the presenter's preferred platforms to show specific examples of ...
Wireless Underground Communications In Sewer And Stormwater Overflow Monitoring: Radio Waves Through Soil And Asphalt Medium, Usman Raza, Abdul Salam
Storm drains and sanitary sewers are prone to backups and overflows due to extra amount wastewater entering the pipes. To prevent that, it is imperative to efficiently monitor the urban underground infrastructure. The combination of sensors system and wireless underground communication system can be used to realize urban underground IoT applications, e.g., storm water and wastewater overflow monitoring systems. The aim of this article is to establish a feasibility of the use of wireless underground communications techniques, and wave propagation through the subsurface soil and asphalt layers, in an underground pavement system for storm water and sewer overflow monitoring ...
Piecing Together Summon Over Alma Documentation, 2020 Embry-Riddle Aeronautical University
Piecing Together Summon Over Alma Documentation, James M. Day
Ex Libris provides some useful documentation for “Alma-Summon Integration” but it is not complete. Most Alma documentation and online help pages assume you are using Primo. Sometimes the Alma configurations for Primo apply to Summon, but mostly they do not. The ELUNA Summon Product Working Group members using Summon over Alma started a project to identify existing documentation, consolidate it, and create supplemental documentation where necessary. We hope this will help Ex Libris provide better support for Summon over Alma.