Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

1,085 Full-Text Articles 1,612 Authors 517,250 Downloads 101 Institutions

All Articles in Digital Communications and Networking

Faceted Search

1,085 full-text articles. Page 1 of 41.

Minutes & Seconds: The Scientists, Patrick Aievoli 2018 Long Island University - C W Post Campus

Minutes & Seconds: The Scientists, Patrick Aievoli

Zea E-Books

Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton

In creating Minutes & Seconds, Aievoli has assembled an ...


Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham, Jyoti Parwatikar, John DeHart, Adam Drescher, Patrick Crowley 2018 Washington University in St Louis

Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham, Jyoti Parwatikar, John Dehart, Adam Drescher, Patrick Crowley

Computer Science and Engineering Publications and Presentations

The power of Information-Centric Networking (ICN) architectures lies in their abstraction for communication --- the request for named data. This abstraction promises that applications can choose to operate only in the information plane, agnostic to the mechanisms implemented in the connectivity plane. However, despite this powerful promise, the information and connectivity planes are presently coupled in today's incarnations of leading ICNs by a core architectural component, the forwarding strategy. Presently, this component is not sustainable: it implements both the information and connectivity mechanisms without specifying who should choose a forwarding strategy --- an application developer or the network operator. In practice ...


The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow 2018 University of Pennsylvania Law School

The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow

Faculty Scholarship

In this report, Shakow explains how a decentralized autonomous organization functions and interacts with the U.S. tax system and presents the many tax issues that these structures raise. The possibility of using smart contracts to allow an entity to operate totally autonomously on a blockchain platform seems attractive. However, little thought has been given to how such an entity can comply with the requirements of a tax system. The DAO, the first major attempt to create such an organization, failed because of a programming error. If successful examples proliferate in the future, tax authorities will face significant problems in ...


Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan 2018 The University of Western Ontario

Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan

Electronic Thesis and Dissertation Repository

A network intrusion is any unauthorized activity on a computer network. There are host-based and network-based Intrusion Detection Systems (IDS's), of which there are each signature-based and anomaly-based detection methods. An anomalous network behavior can be defined as an intentional violation of the expected sequence of packets. In a real-time network-based IDS, incoming packets are treated as a stream of data. A stream processor takes any stream of data or events and extracts interesting patterns on the fly. This representation allows applying statistical anomaly detection using sequence prediction algorithms as well as using a stream processor to perform signature-based ...


An Iot System For Converting Handwritten Text To Editable Format Via Gesture Recognition, Nidhi patel 2018 Kennesaw State University

An Iot System For Converting Handwritten Text To Editable Format Via Gesture Recognition, Nidhi Patel

Master of Science in Computer Science Theses

Evaluation of traditional classroom has led to electronic classroom i.e. e-learning. Growth of traditional classroom doesn’t stop at e-learning or distance learning. Next step to electronic classroom is a smart classroom. Most popular features of electronic classroom is capturing video/photos of lecture content and extracting handwriting for note-taking. Numerous techniques have been implemented in order to extract handwriting from video/photo of the lecture but still the deficiency of few techniques can be resolved, and which can turn electronic classroom into smart classroom.

In this thesis, we present a real-time IoT system to convert handwritten text into ...


Purdue Air Sense: A Methodology For Improving The Accuracy Of Ambient Aerosol Mass Concentration And Size Distribution Measurement With Low-Cost Optical Sensing Techniques, Rishabh Ramsisaria, Satya Sundar Patra, Brandon Emil Boor 2018 Purdue University

Purdue Air Sense: A Methodology For Improving The Accuracy Of Ambient Aerosol Mass Concentration And Size Distribution Measurement With Low-Cost Optical Sensing Techniques, Rishabh Ramsisaria, Satya Sundar Patra, Brandon Emil Boor

The Summer Undergraduate Research Fellowship (SURF) Symposium

There is a global lack of a means for monitoring air pollutant levels at a local level due to expensive and bulky instrument requirements. It is important to monitor toxic gas levels, as well as particulate matter levels, in the atmosphere to study their effects on human health and to further develop city- and community-level air pollution solutions. In this study, with the means of a Raspberry Pi, low-cost Alphasense Optical Particle Counter and gas sensors, and methodical calibration techniques, we built a portable 3-D printed module powered by clean electricity generated by an on-board Voltaic solar cell that measures ...


Deep Neural Network Architectures For Modulation Classification Using Principal Component Analysis, Sharan Ramjee, Shengtai Ju, Diyu Yang, Aly El Gamal 2018 Purdue University

Deep Neural Network Architectures For Modulation Classification Using Principal Component Analysis, Sharan Ramjee, Shengtai Ju, Diyu Yang, Aly El Gamal

The Summer Undergraduate Research Fellowship (SURF) Symposium

In this work, we investigate the application of Principal Component Analysis to the task of wireless signal modulation recognition using deep neural network architectures. Sampling signals at the Nyquist rate, which is often very high, requires a large amount of energy and space to collect and store the samples. Moreover, the time taken to train neural networks for the task of modulation classification is large due to the large number of samples. These problems can be drastically reduced using Principal Component Analysis, which is a technique that allows us to reduce the dimensionality or number of features of the samples ...


The Analysis And Deployment Of A Fully Open Monitoring System In The Sri Lankan Deduroya Basin: The 4onse Project, Massimiliano Cannata, Daniele Strigaro, Imran Shahid, Rangajeewa Ratnayake, B.H. Sudantha 2018 Institute of Earth Sciences, SUPSI-DACD, Switzerland

The Analysis And Deployment Of A Fully Open Monitoring System In The Sri Lankan Deduroya Basin: The 4onse Project, Massimiliano Cannata, Daniele Strigaro, Imran Shahid, Rangajeewa Ratnayake, B.H. Sudantha

Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings

The 4onse project studies non-conventional monitoring systems fully based on open technologies (hardware, standard protocols, software and data) for the management of resources and natural hazards in developing countries. After the design of hydro-meteorological stations and software for the collection, management and distribution of data, the study involves the installation of 30 stations in the Deduroya Oya river basin in Sri Lanka. The system will be analysed to fully understand the real cost of ownership, data quality and applicability in real situations. If properly validated, these systems can provide an alternative solution, effective and sustainable for the protection of property ...


Soa Maturity Influence On Digital Banking Transformation, Alan MEGARGEL, Venky SHANKARARAMAN, Terence P. C. FAN 2018 Singapore Management University

Soa Maturity Influence On Digital Banking Transformation, Alan Megargel, Venky Shankararaman, Terence P. C. Fan

Research Collection School Of Information Systems

Digital Banking is an evolution of online banking, where the banks attempt to further enhance customer experience by integrating digital technologies such as mobile technology, social media and analytics. Traditional banks have the highest barriers to entry into the digital banking market due to the presence of legacy core banking systems. These legacy systems while still high performing and reliable, are inflexible to change and are not easily integrated to the modern application systems needed for delivering digital banking services across multiple online banking channels. One solution that is widely adopted in the industry to overcome this obstacle is the ...


Dynamic Routing And Network Monitoring For The Polywog Protocol, Josh Pfeffer, Ryan Lawrence 2018 California Polytechnic State University, San Luis Obispo

Dynamic Routing And Network Monitoring For The Polywog Protocol, Josh Pfeffer, Ryan Lawrence

Computer Science

This document analyzes the implementation of dynamic routing for router nodes in a mesh network. It examines the algorithm used to populate both the minimum-distance and the routing tables. Furthermore, it describes the node configurations used for testing and applications for mesh networks.

Additionally, this document describes the implementation and testing of network monitoring in a mesh network. It discusses the steps used to forward active nodes in the network between router nodes, a gateway node, and a network monitor.

Lastly, this paper details our future plans for implementing additional features for a network monitor.


A Survey Of Security Attacks And Defenses In Vehicular Ad-Hoc Networks, Pierson Yieh 2018 California Polytechnic State University, San Luis Obispo

A Survey Of Security Attacks And Defenses In Vehicular Ad-Hoc Networks, Pierson Yieh

Computer Science

No abstract provided.


Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball 2018 California Polytechnic State University, San Luis Obispo

Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball

Computer Engineering

The objective of this project was to develop a system that streams real-time video from a Crazyflie 2.0 nano quadcopter. We discuss the motivation behind the project including applications to swarm robotics and computer vision research. We highlight the initial research and design goals that guided the development of the system such as hardware selection and system specifications. We detail the software and hardware subsystems that we implemented including the video-streaming board, firmware, and video-streaming user application. We examine the performance of the final system and discuss the limitations imposed by the hardware. We conclude by describing future work ...


Learning Management Website, Brendan A. Baronia 2018 California Polytechnic State University, San Luis Obispo

Learning Management Website, Brendan A. Baronia

Computer Engineering

The following system was developed as a basic course management system for use by teachers and students. The project started as an alternative to existing platforms, such as Moodle, though because of a two quarter time constraint the complexity of the system was reduced to a more reasonable level. The resulting system requirements included a simple course creation/enrollment system, with separate sections, topics, and resources including videos, files, and a basic graph problem.


Arm Mke1xf Mcu Replatform, Nathan Hong, Derek Lung, Japsimran Singh, Bevin Tang 2018 California Polytechnic State University, San Luis Obispo

Arm Mke1xf Mcu Replatform, Nathan Hong, Derek Lung, Japsimran Singh, Bevin Tang

Computer Engineering

After Cal Poly Racing’s electrical team began to hit the technical limits of the ADC and other I/O features of the current 8-bit Atmel AT90 microcontroller unit, it became clear that an upgrade was due. This replatforming project takes the functionalities of the old, 8-bit architecture, and aims to provide a 32-bit version using the ARM MKE1xF MCU. With the idea of having a working PCB as a stretch goal, the scope of the library development was limited to enable base functionality. Thus, the only libraries developed were for the Timer, ADC, SPI, UART, and CAN. Additionally, this ...


Delegation Application, Erik Matthew Phillips 2018 California Polytechnic State University, San Luis Obispo

Delegation Application, Erik Matthew Phillips

Computer Science

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


Inter Process Communication Between Two Servers Using Mpich, Nagabhavana Narla 2018 California State University, San Bernardino

Inter Process Communication Between Two Servers Using Mpich, Nagabhavana Narla

Electronic Theses, Projects, and Dissertations

The main aim of the project is to launch multiple processes and have those processes communicate with each other using peer to peer communication to eliminate the problems of multiple processes running on a single server, and multiple processes running on inhomogeneous servers as well as the problems of scalability. This entire process is done using MPICH which is a high performance and portable implementation of Message Passing Interface standard.

The project involves setting up the passwordless authentication between two local servers with the help of SSH connection. By establishing a peer to peer communication and by using a unique ...


Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh 2018 California Polytechnic State University, San Luis Obispo

Vehicle Pseudonym Association Attack Model, Pierson Yieh, Pierson Yieh

Master's Theses and Project Reports

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution ...


An Analysis Of Lora Low Power Technology And Its Applications, Gomathy Venkata Krishnan 2018 Portland State University

An Analysis Of Lora Low Power Technology And Its Applications, Gomathy Venkata Krishnan

Undergraduate Research & Mentoring Program

The number of Internet of Things (IoT) devices has exponentially increased in the last decade. With the increase in these devices, there is a necessity to effectively connect and control these devices remotely. Cellular technologies cannot handle this demand since they are not cost effective and easy to deploy. This is where LoRa technology comes handy. LoRa is long-range, low-power, low cost technology that supports internet of things applications. LoRa has many advantages in terms of capacity, mobility, battery lifetime and cost. It uses the unlicensed 915MHz ISM band and can be easily deployed.

This research is focused on setting ...


Remote Monitoring Of Cherry Wetness Using A Leaf Wetness Sensor And A Wireless Sensor Network, Shyla Clark 2018 University of New Orleans

Remote Monitoring Of Cherry Wetness Using A Leaf Wetness Sensor And A Wireless Sensor Network, Shyla Clark

University of New Orleans Theses and Dissertations

To get the best prices, sweet cherry growers must supply blemish-free fruit. Unfortunately, mature cherries have a fragile composition, rendering them susceptible to damage from heat, wind, birds, and rain. Rain is particularly devastating, because cherries split when they absorb too much water. Since rainstorms are common in the otherwise arid regions where most cherries are grown, growers must have a system for quickly deploying rain removal methods. The current industry solution relies on human observation and implementation, which is error-prone and costly. This project proposes an automated cherry wetness system using a Decagon Devices leaf wetness sensor (LWS) and ...


Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke 2018 Johnson & Wales University

Experiences Building, Training, And Deploying A Chatbot In An Academic Library, David Meincke

Library Staff Publications

No abstract provided.


Digital Commons powered by bepress