Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

1134 Full-Text Articles 1550 Authors 517250 Downloads 91 Institutions

All Articles in Digital Communications and Networking

Faceted Search

1134 full-text articles. Page 1 of 43.

User-Friendly Deniable Storage For Mobile Devices, Bing CHANG, Yao CHENG, Fengwei ZHANG, Wen-Tao ZHU, Yingjiu LI, Zhan WANG 2018 Singapore Management University

User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Fengwei Zhang, Wen-Tao Zhu, Yingjiu Li, Zhan Wang

Research Collection School Of Information Systems

Mobile devices are prevalently used to process sensitive data, but traditional encryption may not work when an adversary is able to coerce the device owners to disclose the encryption keys. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this powerful adversary. In this paper, we present MobiPluto, a user-friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. A salient difference between MobiPluto and the existing PDE systems is that any block-based file systems can be deployed on top of it. To further improve usability and deniability of MobiPluto, we introduce a ...


Analytical Modeling Of A Communication Channel Based On Subthreshold Stimulation Of Neurobiological Networks, Alireza Khodaei 2017 University of Nebraska - Lincoln

Analytical Modeling Of A Communication Channel Based On Subthreshold Stimulation Of Neurobiological Networks, Alireza Khodaei

Computer Science and Engineering: Theses, Dissertations, and Student Research

The emergence of wearable and implantable machines manufactured artificially or synthesized biologically opens up a new horizon for patient-centered health services such as medical treatment, health monitoring, and rehabilitation with minimized costs and maximized popularity when provided remotely via the Internet. In particular, a swarm of machines at the scale of a single cell down to the nanoscale can be deployed in the body by the non-invasive or minimally invasive operation (e.g., swallowing and injection respectively) to perform various tasks. However, an individual machine is only able to perform basic tasks so it needs to exchange data with the ...


Pubwc Bathroom Review App, Clay Jacobs 2017 California Polytechnic State University, San Luis Obispo

Pubwc Bathroom Review App, Clay Jacobs

Computer Science

For my senior project, I developed an iOS application to allow

users to find, rate, and review nearby public restrooms. The app takes

advantage of crowdsourced data to collect bathroom and review

information. I also created a REST API to interface with the backend

database that could be used to port the application to other platforms.


Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin MIAO, Jianfeng MA, Ximeng LIU, Junwei ZHANG, Zhiquan LIU 2017 Xidian University

Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu

Research Collection School Of Information Systems

Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but-curious third-party, which only executes a fraction of search operations and returns a fraction of false search results to save its computational and bandwidth resources. Thus, it is important to provide a results verification method to guarantee the correctness of the search results. Existing SE schemes allow multiple data owners to upload different records to the cloud server, but these schemes have ...


Commentary: Wanted - A New Generation Of Accountants, Poh Sun SEOW, Gary PAN, Clarence GOH 2017 Singapore Management University

Commentary: Wanted - A New Generation Of Accountants, Poh Sun Seow, Gary Pan, Clarence Goh

Research Collection School Of Accountancy

Facing a new wave of automation, young accountants must redefine their role and their value-add to their company, say three Singapore Management University observers.


Extracting Implicit Suggestions From Students’ Comments – A Text Analytics Approach, Venky SHANKARARAMAN, Swapna GOTTIPATI, Jeff Rongsheng LIN 2017 Singapore Management University

Extracting Implicit Suggestions From Students’ Comments – A Text Analytics Approach, Venky Shankararaman, Swapna Gottipati, Jeff Rongsheng Lin

Research Collection School Of Information Systems

At theend of each course, students are required to give feedback on the course andinstructor. This feedback includes quantitative rating using Likert scale andqualitative feedback as comments. Such qualitative feedback can providevaluable insights in helping the instructor enhance the course content andteaching delivery. However, the main challenge in analysing the qualitativefeedback is the perceived increase in time and effort needed to manually processthe textual comments. In this paper, we provide an automated solution foranalysing comments, specifically extracting implicit suggestions from thestudents’ qualitative feedback comments. The implemented solution leveragesexisting text mining and data visualization techniques and comprises three stages namely datapre-processing ...


An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo 2017 University of Pennsylvania Law School

An Unsung Success Story: A Forty-Year Retrospective On U.S. Communications Policy, Christopher S. Yoo

Faculty Scholarship

Looking backwards on the occasion of Telecommunications Policy’s fortieth anniversary reveals just how far U.S. communications policy has come. All of the major challenges of 1976, such as promoting competition in customer premises equipment, long distance, and television networking, have largely been overcome. Moreover, new issues that emerged later, such as competition in local telephone service and multichannel video program distribution, have also largely been solved. More often than not, the solution has been the result of structural changes that enhanced facilities-based competition rather than agency-imposed behavioral requirements. Moreover, close inspection reveals that in most cases, prodding by ...


Exploring Wireless Technology Applications In Clinical Staff Response Time Reduction In Healthcare Facilities, Chase R. Johnson 2017 Morehead State University

Exploring Wireless Technology Applications In Clinical Staff Response Time Reduction In Healthcare Facilities, Chase R. Johnson

Morehead State Theses and Dissertations

A thesis presented to the faculty of the College of Business and Technology at Morehead State University in partial fulfillment of the requirements for the Degree Master of Science by Chase R. Johnson on November 13, 2017.


A Novel Representation And Compression For Queries On Trajectories In Road Networks, Xiaochun YANG, Bin WANG, Kai YANG, Chengfei LIU, Baihua ZHENG 2017 Singapore Management University

A Novel Representation And Compression For Queries On Trajectories In Road Networks, Xiaochun Yang, Bin Wang, Kai Yang, Chengfei Liu, Baihua Zheng

Research Collection School Of Information Systems

Recording and querying time-stamped trajectories incurs high cost of data storage and computing. In this paper, we explore several characteristics of the trajectories in road mbox{networks}, which have motivated the idea of coding trajectories by associating timestamps with relative spatial path and locations. Such a representation contains large number of duplicate information to achieve a lower entropy compared with the existing representations, thereby drastically cutting the storage cost. We propose several techniques to compress spatial path and locations separately, which can support fast positioning and achieve better compression ratio. For locations, we propose two novel encoding schemes such that ...


Intent Recognition In Smart Living Through Deep Recurrent Neural Networks, Xiang ZHANG, Lina YAO, Chaoran HUANG, Quan Z. SHENG, Xianzhi WANG 2017 Singapore Management University

Intent Recognition In Smart Living Through Deep Recurrent Neural Networks, Xiang Zhang, Lina Yao, Chaoran Huang, Quan Z. Sheng, Xianzhi Wang

Research Collection School Of Information Systems

Electroencephalography (EEG) signal based intent recognition has recently attracted much attention in both academia and industries, due to helping the elderly or motor-disabled people controlling smart devices to communicate with outer world. However, the utilization of EEG signals is challenged by low accuracy, arduous and time-consuming feature extraction. This paper proposes a 7-layer deep learning model to classify raw EEG signals with the aim of recognizing subjects’ intents, to avoid the time consumed in pre-processing and feature extraction. The hyper-parameters are selected by an Orthogonal Array experiment method for efficiency. Our model is applied to an open EEG dataset provided ...


An Analysis Of Rumor And Counter-Rumor Messages In Social Media, Dion Hoe-Lian GOH, Alton Y. K. CHUA, Hanyu SHI, Wenju WEI, Haiyan WANG, Ee-peng LIM 2017 Nanyang Technological University

An Analysis Of Rumor And Counter-Rumor Messages In Social Media, Dion Hoe-Lian Goh, Alton Y. K. Chua, Hanyu Shi, Wenju Wei, Haiyan Wang, Ee-Peng Lim

Research Collection School Of Information Systems

Social media platforms are one of the fastest ways to disseminate information but they have also been used as a means to spread rumors. If left unchecked, rumors have serious consequences. Counter-rumors, messages used to refute rumors, are an important means of rumor curtailment. The objective of this paper is to examine the types of rumor and counter-rumor messages generated in Twitter in response to the falsely reported death of a politician, Lee Kuan Yew, who was Singapore’s first Prime Minister. Our content analysis of 4321Twitter tweets about Lee’s death revealed six categories of rumor messages, four categories ...


How Iridium Satellite Tracker Model 9602-Lp Asset Affects Span Of Control In High Altitidue Balloning, Steven Hamby 2017 Montana State University-Bozeman

How Iridium Satellite Tracker Model 9602-Lp Asset Affects Span Of Control In High Altitidue Balloning, Steven Hamby

2017 Academic High Altitude Conference

The Irdium Satelitte Network has greatly increased safety in the ballooning field by enabling a greater span of control in flight awarness and termination. This enhanced awareness stems from accurate high interval GPS coordinates that can be integrated into ground station tracking software. The Iridium Network creates the ability to send activation commands remotely with high reliabilty using emails. Additionally this feature has the ability to use local rf transmiters and recievers to increase the flexibilty of cutdown designs. The Iridium Modems provides significant coverage regardless of altitude and loss of ground communication. It is marketed at econmical price point ...


2017 Eclipse Rfd-900 Still Image System, Tristan Running Crane, Uciel Garcia Olmedo, David Schwehr 2017 Montana State University-Bozeman

2017 Eclipse Rfd-900 Still Image System, Tristan Running Crane, Uciel Garcia Olmedo, David Schwehr

2017 Academic High Altitude Conference

As part of the NASA Space Grant 2017 Eclipse Ballooning Project, Montana Space Grant Consortium designed a camera system capable of transmitting still images from a balloon borne payload to a remote ground station via a RFD-900 radio. This payload consists of a Raspberry Pi, a Raspberry Pi camera, custom power supply and a RFD 900MHz radio. This system was designed to record pictures at high and low resolution at altitude. The low resolution images could be selected for downlinking back to the ground via the radio, while the high resolution pictures were saved to the Raspberry Pi memory card ...


Web Archiving At Gvsu, Annie Benefiel, Matt Schultz 2017 Grand Valley State University

Web Archiving At Gvsu, Annie Benefiel, Matt Schultz

Matt Schultz

In 2017, GVSU Libraries began a web archiving initiative to capture our public-facing administrative, academic, arts, university publications and other websites and documents. In this presentation, Annie Benefiel (Archivist for Collection Management) and Matt Schultz (Metadata & Digital Curation Librarian) described the policy development process, the use of Archive-It as the web archiving solution, and the internal workflows followed to accomplish this important activity of capturing GVSU's institutional record.


Access Update For Gvsu, Matt Schultz, Kyle Felker 2017 Grand Valley State University

Access Update For Gvsu, Matt Schultz, Kyle Felker

Matt Schultz

By Fall 2016, GVSU Libraries began making a major strategic and technology shift toward the use of open source technologies versus commercial vendor solutions for digital preservation and access. In this presentation to the Mid-Michigan Digital Practitioners (MMDP) community, Matt Schultz (Metadata & Digital Curation Librarian) and Kyle Felker (Digital Initiatives Librarian) provide updates on these new directions.


How Useful Is Gsv As An Environmental Observation Tool? An Analysis Of The Evidence So Far., Katherine Nesse, Leah Airt 2017 Seattle Pacific University

How Useful Is Gsv As An Environmental Observation Tool? An Analysis Of The Evidence So Far., Katherine Nesse, Leah Airt

SPU Works

Researchers in many disciplines have turned to Google Street View to replace pedestrian- or carbased in-person observation of streetscapes. It is most prevalent within the research literature on the relationship between neighborhood environments and public health but has been used as diverse as disaster recovery, ecology and wildlife habitat, and urban design. Evaluations of the tool have found that the results of GSV-based observation are similar to the results from in-person observation although the similarity depends on the type of characteristic being observed. Larger, permanent and discrete features showed more consistency between the two methods and smaller, transient and judgmental ...


Event And Time-Triggered Control Module Layers For Individual Robot Control Architectures Of Unmanned Agricultural Ground Vehicles, Tyler Troyer 2017 University of Nebraska-Lincoln

Event And Time-Triggered Control Module Layers For Individual Robot Control Architectures Of Unmanned Agricultural Ground Vehicles, Tyler Troyer

Biological Systems Engineering--Dissertations, Theses, and Student Research

Automation in the agriculture sector has increased to an extent where the accompanying methods for unmanned field management are becoming more economically viable. This manifests in the industry’s recent presentation of conceptual cab-less machines that perform all field operations under the high-level task control of a single remote operator. A dramatic change in the overall workflow for field tasks that historically assumed the presence of a human in the immediate vicinity of the work is predicted. This shift in the entire approach to farm machinery work provides producers increased control and productivity over high-level tasks and less distraction from ...


Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David McCalman, Mark E. McMurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech 2017 University of Central Arkansas

Developing Ict Skills Of Stem Teachers In Mexico: The Key Role Of The Tutorial Function, Alexander N. Chen, David Mccalman, Mark E. Mcmurtrey, J. Gabriel Domínguez Castillo, Víctor Manuel Cab Pech

Journal of International Technology and Information Management

It is well documented in distance education literature that one of the factors that are considered essential to the success of an online course is the tutorial function. The role of counselor consists of assisting and encouraging students, building learning activities, and developing support strategies for the use of technology. The tutor thus was assessed as one element of great importance in on-line education, and, to some, an essential feature of this mode. In this paper, the importance of the tutorial function and its effect on the development of skills for using information and communication technology (ICT) in science, technology ...


Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr. 2017 IFHE University, IBS Hyderabad

Understanding The Determinants Affecting The Continuance Intention To Use Cloud Computing, Shailja Tripathi Dr.

Journal of International Technology and Information Management

Cloud computing has been progressively implemented in the organizations. The purpose of the paper is to understand the fundamental factors influencing the senior manager’s continuance intention to use cloud computing in organizations. A conceptual framework was developed by using the Technology Acceptance Model (TAM) as a base theoretical model. A questionnaire was used to collect the data from several companies in IT, manufacturing, finance, pharmaceutical and retail sectors in India. The data analysis was done using structural equation modeling technique. Perceived usefulness and perceived ubiquity are identified as important factors that affect continuance intention to use cloud computing. In ...


Table Of Contents Jitim Vol 26 Issue 3, 2017, 2017 California State University, San Bernardino

Table Of Contents Jitim Vol 26 Issue 3, 2017

Journal of International Technology and Information Management

Table of Contents


Digital Commons powered by bepress