Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

937 Full-Text Articles 1293 Authors 444218 Downloads 84 Institutions

All Articles in Digital Communications and Networking

Faceted Search

937 full-text articles. Page 1 of 34.

Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley 2017 Cedarville University

Augmented Reality Technician Assistance Program, Jackson W. Volante, Kidron R. Filbrun, Jeffrey T. Deane, Andrew T. Carr, Nathan A. Harold, Daniel J. Eckley

The Research and Scholarship Symposium

The Augmented Reality Technician Assistance Program is a proof-of-concept project for allowing a remote expert to communicate with and assist a field technician in completing procedures with which the technician may be unfamiliar. For example, an expert in Navy aircraft maintenance could advise an Air Force flight mechanic about performing repairs or maintenance on Navy aircraft. The end goal of our Cedarville computer science capstone project is to create an experimental prototype to deliver to the Air Force Research Laboratory. In our prototype the expert uses a Microsoft Surface Pro tablet to communicate via marked up still images with a ...


Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell 2017 University of Nebraska-Lincoln

Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell

Publications from Information Technology Services

How can academic institutions help educate their students about the risks of identity theft? Or teach students to better understand how one’s online presence can hold so much joy and angst? For one campus, the University of Nebraska–Lincoln, the opportunity came from a middle school teacher engaging his students in a future problem-solving activity. UNL had the opportunity to create a 45-minute presentation on identity theft for local public school students who would be spending the day on campus researching this topic.

While preparing the presentation, we realized a top 10 list on identity theft for UNL students ...


Making Random - Cryptography And The Generation Of Random Sequences, Samuel Barton 2017 University of Southern Maine

Making Random - Cryptography And The Generation Of Random Sequences, Samuel Barton

Thinking Matters

The algorithm utilizes the behavior of modern operating systems to generate random bits by putting the process to sleep for 10 microseconds, and then comparing the actual number of microseconds slept to the expected amount. The reason why this works for generating \random" bits is that modern operating systems do not wake processes exactly when they request. This is due to process scheduling. The algorithm uses the randomness in actual sleep time to generate each bit.

The bits are not truly random, as if a person were able to force the algorithm to always execute, then we would not have ...


Research Poster.Pdf, Desiree Dominguez 2017 University of Central Florida

Research Poster.Pdf, Desiree Dominguez

Desiree Dominguez

Analyzing Wi-Fi probe request is essential for public safety and search and rescue missions. In this paper, we studied how Wi-Fi-probe requests are affected by different materials such as cloth, plastic, concrete, and metal when captured by Unmanned Aerial Serial (UAS) when having an attached a Wi-Fi Pineapple Tetra. Leaving the mobile devices active and setting them in a random position in an open zoned grid, the drone flying a mapping mission captured the Wi-Fi probe requests to determine the effect these materials have on the transmission of Wi-Fi probe requests. Through this method, the location of the Android Smartphones ...


Cloud Computing: Current And Future Impact On Organizations, Yiyun Zhu 2017 Western Oregon University

Cloud Computing: Current And Future Impact On Organizations, Yiyun Zhu

Student Theses, Papers and Projects (Computer Science)

This project focuses on the business application of cloud computing, both at present and in the future. This investigation aims to assist business users of cloud computing services to improve the perception of cloud computing, to assess the value of their cloud computing service relationships, and to assist in selecting appropriate cloud computing services. This project bases its information on the existing cloud computing technology to clarify the technical aspects of current cloud services and companies. It presents the key elements of conception of cloud computing, its definitions, main service models, and implementation types. Ultimately, this paper analyzes the cons ...


Collaborating Through Virtual Communities Using Cloud Technology, Diane Stottlemyer 2017 American Public University System

Collaborating Through Virtual Communities Using Cloud Technology, Diane Stottlemyer

ePress Monographs

Collaboration and communication are both essential for successful interaction and participation in virtual communities. In this book, there are discussions of how a virtual community can be an essential communication tool to enhance traditional and online schools. In addition, the virtual community can provide information on the importance of collaboration for those who want to discuss a specific topic area. The virtual community is a tool that can encourage the interaction and exchange of information between individuals. Cloud Technology has helped schools in many ways managing cost while still improving communication and e-collaboration. Cloud technology has increased opportunities for setting ...


Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler 2017 CUNY La Guardia Community College

Promoting Information Resources To Students: Using Wordpress To Maintain Library Data Sets, Derek Stadler

Publications and Research

Although it began as a blog tool, WordPress has grown into a complete content management system with thousands of interactive themes available. Since it uses the MySQL database management system, the open-source software suits the needs of library websites by aggregating a college library’s complete database inventory. Rather than update several HTML pages within a site when new vendors are added or a URL is changed, information from vendors can be maintained in a database table and then displayed to students, highlighting available resources and information. The presentation highlights the use of some simple WordPress plugins to manage many ...


Contributions To Edge Computing, Vernon K. Bumgardner 2017 University of Kentucky

Contributions To Edge Computing, Vernon K. Bumgardner

Theses and Dissertations--Computer Science

Efforts related to Internet of Things (IoT), Cyber-Physical Systems (CPS), Machine to Machine (M2M) technologies, Industrial Internet, and Smart Cities aim to improve society through the coordination of distributed devices and analysis of resulting data. By the year 2020 there will be an estimated 50 billion network connected devices globally and 43 trillion gigabytes of electronic data. Current practices of moving data directly from end-devices to remote and potentially distant cloud computing services will not be sufficient to manage future device and data growth.

Edge Computing is the migration of computational functionality to sources of data generation. The importance of ...


Inference In Networking Systems With Designed Measurements, Chang Liu 2017 University of Massachusetts Amherst

Inference In Networking Systems With Designed Measurements, Chang Liu

Doctoral Dissertations May 2014 - current

Networking systems consist of network infrastructures and the end-hosts have been essential in supporting our daily communication, delivering huge amount of content and large number of services, and providing large scale distributed computing. To monitor and optimize the performance of such networking systems, or to provide flexible functionalities for the applications running on top of them, it is important to know the internal metrics of the networking systems such as link loss rates or path delays. The internal metrics are often not directly available due to the scale and complexity of the networking systems. This motivates the techniques of inference ...


Oefs: On-Demand Energy-Based Forwarding Strategy For Named Data Wireless Ad Hoc Networks, Rana Asif Rehman, Syed Hassan Ahmed, Byung-Seo Kim 2016 National University of Computer and Emerging Sciences

Oefs: On-Demand Energy-Based Forwarding Strategy For Named Data Wireless Ad Hoc Networks, Rana Asif Rehman, Syed Hassan Ahmed, Byung-Seo Kim

Rana Asif Rehman

The futuristic Internet paradigm, named data networking (NDN), was recently introduced to solve the severe issues of current Internet architecture, such as complex usage, poor resource utilization, inefficient mapping, scalability, location dependence, and so on. Communication in NDN is based on content names decoupling from their locations. NDN also provides strong built-in functionalities, like multi-path routing, security primitives, flow balance mechanisms, and in-networking caching. Similarly, NDN-based mobile ad hoc networks are highly dynamic in nature whereby the participating nodes have experienced highly challengeable environments and constraints, such as channel fluctuations, intermittent connectivity, and low battery power. In this environment, if ...


Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali 2016 The University of Western Ontario

Modelling And Analysis Of Smart Grids For Critical Data Communication, Abdulfattah Noorwali

Electronic Thesis and Dissertation Repository

Practical models for the subnetworks of smart grid are presented and analyzed. Critical packet-delay bounds for these subnetworks are determined, with the overall objective of identifying parameters that would help in the design of smart grid with least end-to-end delay.

A single-server non-preemptive queueing model with prioritized critical packets is presented for Home Area Network (HAN). Closed-form expressions for critical packet delay are derived and illustrated as a function of: i) critical packet arrival rate, ii) service rate, iii) utilization factor, and iv) rate of arrival of non-critical packets. Next, wireless HANs using FDMA and TDMA are presented. Upper and ...


Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez 2016 California Polytechnic State University, San Luis Obispo

Teaching The Internet Of Things: Bridging A Path From Cpe329, Steven Han, Rafael Lopez

Computer Engineering

“The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices via the Internet is becoming pervasive, from the commercial kitchen to the residential basement room to the arm of the fitness buff.” - WSO2

In this report, we will investigate procedures and technologies used in IoT. A variety of cloud platforms will be described to demonstrate its strengths and usage on IoT applications. Furthermore, demonstrate the most popular hardware being used in several of these applications. This report is aimed to give a good understanding on what it takes to put together an IoT application ...


From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming GUO, Feida ZHU, Enhong CHEN, Qi LIU, Le WU, Chu GUAN 2016 University of Science and Technology of China

From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan

Research Collection School Of Information Systems

With the booming popularity of online social networks like Twitter and Weibo, online user footprints are accumulating rapidly on the social web. Simultaneously, the question of how to leverage the large-scale user-generated social media data for personal credit scoring comes into the sight of both researchers and practitioners. It has also become a topic of great importance and growing interest in the P2P lending industry. However, compared with traditional financial data, heterogeneous social data presents both opportunities and challenges for personal credit scoring. In this article, we seek a deep understanding of how to learn users’ credit labels from social ...


Hashtag Recommendation With Topical Attention-Based Lstm, Yang LI, Ting LIU, Jing JIANG, Liang ZHANG 2016 Singapore Management University

Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang

Research Collection School Of Information Systems

Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results ...


Rocket Stats, Kyle Cornelison 2016 California Polytechnic State University, San Luis Obispo

Rocket Stats, Kyle Cornelison

Computer Science

An Android application to allow Rocket League players to view their stats and track progress.


Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly 2016 La Salle University

Who's In And Who's Out?: What's Important In The Cyber World?, Tony M. Kelly

HON499 projects

The aim of this paper is to offer an introduction to the exploding field of cybersecurity by asking what are the most important concepts or topics that a new member of the field of cybersecurity should know. This paper explores this question from three perspectives: from the realm of business and how the cyber world is intertwined with modern commerce, including common weaknesses and recommendations, from the academic arena examining how cybersecurity is taught and how it should be taught in a classroom or laboratory environment, and lastly, from the author’s personal experience with the cyber world. Included information ...


Cpn-Dam Business Meeting, Amanda Harlan 2016 Kansas State University

Cpn-Dam Business Meeting, Amanda Harlan

Central Plains Network for Digital Asset Management

CPN-DAM Business Meeting

Wednesday, November 16, 2016

3:55pm - 4:55pm CST

Agenda

3:55-4:05pm Introduction

4:05-4:10pm Announce Executive Committee members for 2017-2018

4:10-4:25pm Reports from the Planning and Design Committees

4:25-4:40pm Report from Ad Hoc Executive Committee

  • Summary of what was accomplished in 2016

  • Action Items for 2017

    • Become a nonprofit corporation

    • Finalize membership and fees

    • Set up standing committees

    • 2017 conference and proceedings

    • Contacting vendor/sponsors/organizations for possible sponsorship

4:40-4:45pm Announcement on whether the CPN-DAM bylaws were approved or not approved

4:45-4:50pm Comments from audience

4 ...


Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau 2016 Virginia Wesleyan College

Digitization In The Classroom : Teaching Undergraduates The Art Of Digitizing History, Sophie Rondeau

Central Plains Network for Digital Asset Management

In the fall 2015 semester, a new course was offered at Virginia Wesleyan College (VWC) that involved a unique project collaboration between Professor Richard E. Bond and librarians, Patty Clark and Sophie Rondeau. The course, entitled Digital History 250, provided students with an introduction to how history is made and used in digital environments. Bond presented students with topics related to history and social media, spatial mapping, digital literacy, and the implications of crowd sourcing historical narratives, among others. The students were given a final project that involved creating digital exhibits using curated content from VWC yearbooks housed in the ...


Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh 2016 University of North Texas

Developing An Outreach Plan For Unt Scholarly Works, Pamela Andrews, Daniel Alemneh

Central Plains Network for Digital Asset Management

The University of North Texas Scholarly Works collections functions as our institution’s open access repository. This summer, we conducted a preliminary analysis of the collection’s holdings to assess our progress in archiving UNT faculty research in support of our Open Access and Long-term Digital Stewardship policy as passed in 2012. As we do not subscribe to any current research information systems (CRIS), this analysis took the form of a census using current faculty senate data to understand who is and is not contributing to the repository. After looking at our contribution population, we also examined what resource types ...


Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson 2016 Knox College

Beyond Electric Dreams: Instituting A Dam Program Where It Is Needed But Maybe Not Wanted, Gregory Johnson

Central Plains Network for Digital Asset Management

Digital content is created every second of everyday and can be found everywhere. And the need to preserve this content, as well as the have it available to your students, patrons, or faculty and staff is at a premium while budgets for DAM dwindle. And while the need and want for DAM is often there, the drive and funds to make it a reality sometimes is not.

This presentation will cover one such DAM implementation project at a Fortune 500 company, beginning with the vetting and purchasing of a DAM system through implementation and show how the lessons from its ...


Digital Commons powered by bepress