Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

936 Full-Text Articles 1156 Authors 384094 Downloads 66 Institutions

All Articles in Digital Communications and Networking

Faceted Search

936 full-text articles. Page 1 of 33.

Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh 2016 The University of Western Ontario

Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh

Electronic Thesis and Dissertation Repository

With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on ...


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown 2016 Pepperdine University

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is ...


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar 2016 Robert Gordon University

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized ...


Privacy And The Information Age: A Longitudinal View, Charles E. Downing 2016 Northern Illinois University

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake ...


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee 2016 Miami University

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong 2016 Texas State University

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa 2016 Winston-Salem State University

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This ...


The Fcc And The “Pre-Internet”, John Blevins 2016 Loyola University School of Law - New Orleans

The Fcc And The “Pre-Internet”, John Blevins

Indiana Law Journal

Network neutrality has dominated broadband policy debates for the past decade. While important, network neutrality overshadows other policy levers that are equally important to the goals of better, cheaper, and more open broadband service. This lack of perspective has historical precedent—and understanding this history can help refocus today’s policy debate. In the 1960s and 1970s, telephone companies threatened the growth of the nascent data industry. The FCC responded with a series of rulemakings known as the “Computer Inquiries” proceedings. In the literature, Computer Inquiries enjoys hallowed status as a key foundation of the Internet’s rise.

This Article ...


Oluso, Diego Fernandez, Tyler Heucke, Nishant Mattu, Michael Roesch 2016 California Polytechnic State University, San Luis Obispo

Oluso, Diego Fernandez, Tyler Heucke, Nishant Mattu, Michael Roesch

Computer Engineering

Oluso is a new startup offering affordable, inexpensive technology to empower the individual. Our product is designed to keep the user in contact with someone close to them in emergency situations. Over the course of the past several months we have performed interviews with both individuals who may be interested in this product as well as organizations who may be interested in purchasing this product for their members. Our product is nearing completion and all of the companies we have interviewed have displayed a significant amount of interest in our product. The combination of easy communication and peace of mind ...


El Capitán: Cal Poly Rose Float Digital Drive System, Gregory Raffi Baghdikian 2016 California Polytechnic State University, San Luis Obispo

El Capitán: Cal Poly Rose Float Digital Drive System, Gregory Raffi Baghdikian

Computer Engineering

In today’s world of smartphones, self-driving cars, and internet-connected coffee makers, it seems as if computers are contained in everything around us. These “embedded systems” have become critical components of our lives, improving everything about the things they control, from cost, to speed, to simplicity. One area that embedded systems has hardly gained a foothold is in the world of floatbuilding. Most of the floats in the Tournament of Roses Parade, including the one built jointly by Cal Poly San Luis Obispo and Cal Poly Pomona, are technologically very simple, using mostly analog components and rudimentary discrete digital logic ...


Duck Watch: A Smart System For Public Lap Pools, Daniel Griffith, Jill Thetford 2016 California Polytechnic State University, San Luis Obispo

Duck Watch: A Smart System For Public Lap Pools, Daniel Griffith, Jill Thetford

Computer Engineering

This paper presents Duck Watch, a proof of concept for a smart swimming pool. With our system, a swimmer will be able to log on to our website prior to leaving his or her house to help them decide if the conditions are favorable to go to a public lap swimming pool. Our system will inform the user of a number of environmental factors such as water temperature, exterior temperature, and humidity, as well as whether or not there are any open lanes currently.


Musictrakr, Benjamin Lin 2016 California Polytechnic State University, San Luis Obispo

Musictrakr, Benjamin Lin

Computer Engineering

MusicTrackr is an IoT device that musicians attach to their instruments. The device has a start and stop button that allows users to record their playing sessions. Each recorded session is sent wirelessly to a cloud database. An accompanying website displays all of the recorded sessions, organized by date. After picking a specific date, the user can view graphs showing total practice time and average session length as well play back any recordings during that date. In addition, the user may add comments to any specific date or recording. Lastly, the user may tag a specific date with a color ...


Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson 2016 California Polytechnic State University, San Luis Obispo

Ipv6 And Ospf Networks Lab, Kevin Jeremy Watson

Computer Engineering

No abstract provided.


A Multi-Carrier Collaborative Solution To Minimize Connectivity-Loss, Michael Wong 2016 California Polytechnic State University - San Luis Obispo

A Multi-Carrier Collaborative Solution To Minimize Connectivity-Loss, Michael Wong

Master's Theses and Project Reports

Nearly two-thirds of Americans own a smart phone, and 19% of Americans rely on their smartphone for either accessing valuable information or staying connected with their friends and family across the globe [15]. Staying always-on and always-connected to the Internet is one of the most important and useful features of a smartphone. This connection is used by almost every single application on the device including web browsers, email clients, messaging applications, etc. Unfortunately, the cellular networks on our smartphones are not perfect and do not always have cellular signal. Our devices often lose Internet connection when users are on the ...


Design And Development Of A Low-Cost Radio For An Open Cubesat, Michael Wegerson, Jeremy Straub, Ronald Marsh 2016 Selected Works

Design And Development Of A Low-Cost Radio For An Open Cubesat, Michael Wegerson, Jeremy Straub, Ronald Marsh

Jeremy Straub

A reliable communication system is key to the success of a CubeSat mission, allowing for data to be trans-mitted to the ground station and commands to be up-loaded to the satellite. To satisfy this need, the OpenOrbiter satellite (a 1-U CubeSat [1], being developed with a target parts budget of under $5,000 [2]) is leveraging previously space-tested [3], low-cost transceiver design which is based on the SI 4463 IC unit. This board design will be included in the publically available Open Framework for Educational Nanosatellites (OPEN) allowing others to modify, enhance and/or make use of the design in ...


Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki 2016 United Arab Emirates University

Enhancing Snort Ids Performance Using Data Mining, Mohammed Ali Almaleki

Theses

Intrusion detection systems (IDSs) such as Snort apply deep packet inspection to detect intrusions. Usually, these are rule-based systems, where each incoming packet is matched with a set of rules. Each rule consists of two parts: the rule header and the rule options. The rule header is compared with the packet header. The rule options usually contain a signature string that is matched with packet content using an efficient string matching algorithm. The traditional approach to IDS packet inspection checks a packet against the detection rules by scanning from the first rule in the set and continuing to scan all ...


Bluetooth Low Energy Platform With Simblee, Calvin W. Freeman 2016 University of Arkansas, Fayetteville

Bluetooth Low Energy Platform With Simblee, Calvin W. Freeman

Computer Science and Computer Engineering Undergraduate Honors Theses

Bluetooth Low Energy provides a platform for many developers to implement low power communication for a wide range of applications. The Internet of Things (IoT) is an emerging concept that is gaining traction in the world of embedded systems. Bluetooth Low Energy is one of the latest enablers of this movement and the Simblee module improves BLE accessibility. This thesis provides an evaluation of the average power consumption the Simblee uses in different use cases. By leveraging one of the Simblee’s most notable features, the Ultra Low Power mode, very low power consumption can be achieved, potentially increasing battery ...


Location-Aware Forwarding And Caching In Ccn-Based Mobile Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim 2016 Hongik University

Location-Aware Forwarding And Caching In Ccn-Based Mobile Ad Hoc Networks, Rana Asif Rehman, Byung-Seo Kim

Rana Asif Rehman

Content centric network (CCN) is conceived as a good candidate for a futuristic Internet paradigm due to its simple and robust communication mechanism. By directly applying the CCN paradigm in wireless multihop mobile ad hoc networks, we experience various kind of issues such as packet flooding, data redundancy, packet collisions, and retransmissions etc., due to the broadcast nature of the wireless channel. To cope with the problems, in this study, we propose a novel location-aware forwarding and caching scheme for CCN-based mobile ad hoc networks. Extensive simulations are performed by using simulator, named ndnSIM. Experiment results show that proposed scheme ...


Human Factors In The Development Of The Mobile Extreme Environment Research Station (Meers) Mission Control System (Mcs), Rebecca DeMarco 2016 Embry-Riddle Aeronautical University

Human Factors In The Development Of The Mobile Extreme Environment Research Station (Meers) Mission Control System (Mcs), Rebecca Demarco

Human Factors and Applied Psychology Student Conference

The developers for the MEERS MCS were required to develop a novel interface for their product. During the development of the MCS, analytical human factors methods and display principles were implemented to create the user interface. The methods and principles were also used so the MCS had a user centered design. The MCS went through several iterations of design. This presentation discusses the development process of the MEERS MCS from a human factors standpoint.


Animal Rights Talk: Moral Debate Over The Internet, Harold A. Herzog Jr., Beth Dinoff, Jessica R. Page 2016 Western Carolina University

Animal Rights Talk: Moral Debate Over The Internet, Harold A. Herzog Jr., Beth Dinoff, Jessica R. Page

Harold Herzog

Messages sent over Animal Rights-Talk, an electronic mail network devoted to the discussion of issues related to the animal rights movement, were analyzed. Messages typically fell into the following categories: questions and information, discussions of philosophical issues, ethical problems associated with the treatment of particular species, the politics of the animal rights movement, problems of moral consistency, the ethics of particular uses of non-human species (e.g., meat consumption, biomedical research with animal subjects), and matters pertaining to the internal life of the network (e.g., efforts at control of perceived norm violations). Debates between animal activists and animal researchers ...


Digital Commons powered by bepress