Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

962 Full-Text Articles 1328 Authors 444218 Downloads 86 Institutions

All Articles in Digital Communications and Networking

Faceted Search

962 full-text articles. Page 1 of 35.

Instructional Strategies In Diagram-Based Itss: Lessons Learned From Two Tutoring Systems, Enruo Guo, Stephen B. Gilbert 2017 Iowa State University

Instructional Strategies In Diagram-Based Itss: Lessons Learned From Two Tutoring Systems, Enruo Guo, Stephen B. Gilbert

Stephen B. Gilbert

Unlike text-based input to an intelligent tutoring system, a diagram is perceived as a whole state; the operation sequence is less important. Traditional step-wise coaching is not as appropriate in diagram-based intelligent tutoring systems (DITS). From two previous tutoring systems, StaticsTutor and Thermo Cycle Tutor, we propose cross-domain pedagogical guidelines for DITS. In particular, instruction needs to be mapped to a hierarchical understanding of the diagram, where each level focuses on different characteristics of the drawing. Also, instruction needs to address conceptual knowledge and procedure expertise separately. Some practical suggestions are described to achieve these goals, such as 1) different ...


Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin McFall 2017 Kennesaw State University

Autonomous Speed Control For Kia Optima, Andrew J. Combs, Kyle Fugatt, Kevin Mcfall

The Kennesaw Journal of Undergraduate Research

The standard method for speed control is the cruise control system built into most modern vehicles. These systems employ a PID controller which actuates the accelerator thus, in turn, maintains the desired vehicle speed. The main drawback of such a system is that typically the cruise control will only engage above 25 mph. The goal of this paper is to describe a system which we used to control vehicle speed from a stop to any desired speed using an Arduino microcontroller and a CAN BUS shield, from where autonomous features can be built upon. With this system, we were able ...


The Dark Destiny Of Safety, Max Rowe, Jose Trejos 2017 Northwestern University

The Dark Destiny Of Safety, Max Rowe, Jose Trejos

Politica Northwestern

Most people imagine hacking to be an exceedingly complex crime, requiring an understanding of computing systems that goes far beyond that of average, functionally literate PC users. While there are sophisticated hacking techniques which do fit this description, many forms of hacking require little more than the ability to install basic programs on a computer. Perhaps the simplest of all forms of hacking is DDoS , or Denial of Service attack. DDoS is a simple brute-force method that spams a server with millions of identical simple requests, which can cause sites and providers to be overloaded and temporarily shut down. Users ...


Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips 2017 California Polytechnic State University, San Luis Obispo

Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips

Electrical Engineering

The Internet of Things asserts that there exists a global need for all objects to connect easily and accessibly. Today, smartphones, tablets, laptops and smart watches makeup just a few of the interconnected devices by the greater population. As a result a growing need for wireless connection between personal devices like phones, and computers to everyday appliances exists. This idea extends directly to households, businesses and buildings, where a growing need for smart home or smart-business appliances has taken root. Many companies like Nest, ADT and Apple make products for automated home security and in home media control. The Wireless ...


Vertical Search Engines, Kevin Curran, Jude Mc Glinchey 2017 Dublin Institute of Technology

Vertical Search Engines, Kevin Curran, Jude Mc Glinchey

The ITB Journal

This paper outlines the growth in popularity of vertical search engines, their origins, the differences between them and well-known broad based search engines such as Google and Yahoo. We also discuss their use in business-to-business, their marketing and advertising costs, what the revenue streams are and who uses them.


Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane 2017 Dublin Institute of Technology

Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane

The ITB Journal

The Internet has already become a hostile environment for computers, especially when they are directly connected with a public IP address. We have experienced this hostile activity where on an average day; the ITB Honeypot recorded over a thousand reconnaissance attacks seeking unauthorised entry onto our private network. Our Honeypot is a basic PC running Windows XP with no services offered and no activity from users that would generate traffic. The Honeypot is running in a passive state on a stub-network where all inbound and outbound traffic is recorded at the bridging computer to the WAN. We report on the ...


Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley 2017 Cedarville University

Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley

The Research and Scholarship Symposium

The Augmented Reality Technician Assistance Program is a proof-of-concept project for allowing a remote expert to communicate with and assist a field technician in completing procedures with which the technician may be unfamiliar. For example, an expert in Navy aircraft maintenance could advise an Air Force flight mechanic about performing repairs or maintenance on Navy aircraft. The end goal of our Cedarville computer science capstone project is to create an experimental prototype to deliver to the Air Force Research Laboratory. In our prototype the expert uses a Microsoft Surface Pro tablet to communicate via marked up still images with a ...


Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell 2017 University of Nebraska-Lincoln

Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell

Publications from Information Technology Services

How can academic institutions help educate their students about the risks of identity theft? Or teach students to better understand how one’s online presence can hold so much joy and angst? For one campus, the University of Nebraska–Lincoln, the opportunity came from a middle school teacher engaging his students in a future problem-solving activity. UNL had the opportunity to create a 45-minute presentation on identity theft for local public school students who would be spending the day on campus researching this topic.

While preparing the presentation, we realized a top 10 list on identity theft for UNL students ...


Making Random - Cryptography And The Generation Of Random Sequences, Samuel Barton 2017 University of Southern Maine

Making Random - Cryptography And The Generation Of Random Sequences, Samuel Barton

Thinking Matters

The algorithm utilizes the behavior of modern operating systems to generate random bits by putting the process to sleep for 10 microseconds, and then comparing the actual number of microseconds slept to the expected amount. The reason why this works for generating \random" bits is that modern operating systems do not wake processes exactly when they request. This is due to process scheduling. The algorithm uses the randomness in actual sleep time to generate each bit.

The bits are not truly random, as if a person were able to force the algorithm to always execute, then we would not have ...


Research Poster.Pdf, Desiree Dominguez 2017 University of Central Florida

Research Poster.Pdf, Desiree Dominguez

Desiree Dominguez

Analyzing Wi-Fi probe request is essential for public safety and search and rescue missions. In this paper, we studied how Wi-Fi-probe requests are affected by different materials such as cloth, plastic, concrete, and metal when captured by Unmanned Aerial Serial (UAS) when having an attached a Wi-Fi Pineapple Tetra. Leaving the mobile devices active and setting them in a random position in an open zoned grid, the drone flying a mapping mission captured the Wi-Fi probe requests to determine the effect these materials have on the transmission of Wi-Fi probe requests. Through this method, the location of the Android Smartphones ...


Cloud Computing: Current And Future Impact On Organizations, Yiyun Zhu 2017 Western Oregon University

Cloud Computing: Current And Future Impact On Organizations, Yiyun Zhu

Student Theses, Papers and Projects (Computer Science)

This project focuses on the business application of cloud computing, both at present and in the future. This investigation aims to assist business users of cloud computing services to improve the perception of cloud computing, to assess the value of their cloud computing service relationships, and to assist in selecting appropriate cloud computing services. This project bases its information on the existing cloud computing technology to clarify the technical aspects of current cloud services and companies. It presents the key elements of conception of cloud computing, its definitions, main service models, and implementation types. Ultimately, this paper analyzes the cons ...


Collaborating Through Virtual Communities Using Cloud Technology, Diane Stottlemyer 2017 American Public University System

Collaborating Through Virtual Communities Using Cloud Technology, Diane Stottlemyer

ePress Monographs

Collaboration and communication are both essential for successful interaction and participation in virtual communities. In this book, there are discussions of how a virtual community can be an essential communication tool to enhance traditional and online schools. In addition, the virtual community can provide information on the importance of collaboration for those who want to discuss a specific topic area. The virtual community is a tool that can encourage the interaction and exchange of information between individuals. Cloud Technology has helped schools in many ways managing cost while still improving communication and e-collaboration. Cloud technology has increased opportunities for setting ...


Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler 2017 CUNY La Guardia Community College

Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler

Publications and Research

Although it began as a blog tool, WordPress has grown into a complete content management system with thousands of interactive themes available. Since it uses the MySQL database management system, the open-source software suits the needs of library websites by aggregating a college library’s complete database inventory. Rather than update several HTML pages within a site when new vendors are added or a URL is changed, information from vendors can be maintained in a database table and then displayed to students, highlighting available resources and information. The presentation highlights the use of some simple WordPress plugins to manage many ...


Contributions To Edge Computing, Vernon K. Bumgardner 2017 University of Kentucky

Contributions To Edge Computing, Vernon K. Bumgardner

Theses and Dissertations--Computer Science

Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.

Edge Computing is the migration of computational functionality to sources of data generation. The importance of ...


Inference In Networking Systems With Designed Measurements, Chang Liu 2017 University of Massachusetts Amherst

Inference In Networking Systems With Designed Measurements, Chang Liu

Doctoral Dissertations May 2014 - current

Networking systems consist of network infrastructures and the end-hosts have been essential in supporting our daily communication, delivering huge amount of content and large number of services, and providing large scale distributed computing. To monitor and optimize the performance of such networking systems, or to provide flexible functionalities for the applications running on top of them, it is important to know the internal metrics of the networking systems such as link loss rates or path delays. The internal metrics are often not directly available due to the scale and complexity of the networking systems. This motivates the techniques of inference ...


High Performance Multiview Video Coding, Caoyang Jiang 2017 Michigan Technological University

High Performance Multiview Video Coding, Caoyang Jiang

Dissertations, Master's Theses and Master's Reports

Following the standardization of the latest video coding standard High Efficiency Video Coding in 2013, in 2014, multiview extension of HEVC (MV-HEVC) was published and brought significantly better compression performance of around 50% for multiview and 3D videos compared to multiple independent single-view HEVC coding. However, the extremely high computational complexity of MV-HEVC demands significant optimization of the encoder. To tackle this problem, this work investigates the possibilities of using modern parallel computing platforms and tools such as single-instruction-multiple-data (SIMD) instructions, multi-core CPU, massively parallel GPU, and computer cluster to significantly enhance the MVC encoder performance. The aforementioned computing tools ...


Oefs: On-Demand Energy-Based Forwarding Strategy For Named Data Wireless Ad Hoc Networks, Rana Asif Rehman, Syed Hassan Ahmed, Byung-Seo Kim 2016 National University of Computer and Emerging Sciences

Oefs: On-Demand Energy-Based Forwarding Strategy For Named Data Wireless Ad Hoc Networks, Rana Asif Rehman, Syed Hassan Ahmed, Byung-Seo Kim

Rana Asif Rehman

The futuristic Internet paradigm, named data networking (NDN), was recently introduced to solve the severe issues of current Internet architecture, such as complex usage, poor resource utilization, inefficient mapping, scalability, location dependence, and so on. Communication in NDN is based on content names decoupling from their locations. NDN also provides strong built-in functionalities, like multi-path routing, security primitives, flow balance mechanisms, and in-networking caching. Similarly, NDN-based mobile ad hoc networks are highly dynamic in nature whereby the participating nodes have experienced highly challengeable environments and constraints, such as channel fluctuations, intermittent connectivity, and low battery power. In this environment, if ...


Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali 2016 The University of Western Ontario

Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali

Electronic Thesis and Dissertation Repository

Practical models for the subnetworks of smart grid are presented and analyzed. Critical packet-delay bounds for these subnetworks are determined, with the overall objective of identifying parameters that would help in the design of smart grid with least end-to-end delay.

A single-server non-preemptive queueing model with prioritized critical packets is presented for Home Area Network (HAN). Closed-form expressions for critical packet delay are derived and illustrated as a function of: i) critical packet arrival rate, ii) service rate, iii) utilization factor, and iv) rate of arrival of non-critical packets. Next, wireless HANs using FDMA and TDMA are presented. Upper and ...


Hashtag Recommendation With Topical Attention-Based Lstm, Yang LI, Ting LIU, Jing JIANG, Liang ZHANG 2016 Singapore Management University

Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang

Research Collection School Of Information Systems

Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results ...


Rocket Stats, Kyle Cornelison 2016 California Polytechnic State University, San Luis Obispo

Rocket Stats, Kyle Cornelison

Computer Science

An Android application to allow Rocket League players to view their stats and track progress.


Digital Commons powered by bepress