Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,142 Full-Text Articles 3,520 Authors 1,022,331 Downloads 143 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,142 full-text articles. Page 3 of 87.

Cyber Deception For Critical Infrastructure Resiliency, Md Ali Reza Al Amin 2022 Old Dominion University

Cyber Deception For Critical Infrastructure Resiliency, Md Ali Reza Al Amin

Computational Modeling & Simulation Engineering Theses & Dissertations

The high connectivity of modern cyber networks and devices has brought many improvements to the functionality and efficiency of networked systems. Unfortunately, these benefits have come with many new entry points for attackers, making systems much more vulnerable to intrusions. Thus, it is critically important to protect cyber infrastructure against cyber attacks. The static nature of cyber infrastructure leads to adversaries performing reconnaissance activities and identifying potential threats. Threats related to software vulnerabilities can be mitigated upon discovering a vulnerability and-, developing and releasing a patch to remove the vulnerability. Unfortunately, the period between discovering a vulnerability and applying a …


Snap : A Software-Defined & Named-Data Oriented Publish-Subscribe Framework For Emerging Wireless Application Systems, Manveen Kaur 2022 Clemson University

Snap : A Software-Defined & Named-Data Oriented Publish-Subscribe Framework For Emerging Wireless Application Systems, Manveen Kaur

All Dissertations

The evolution of Cyber-Physical Systems (CPSs) has given rise to an emergent class of CPSs defined by ad-hoc wireless connectivity, mobility, and resource constraints in computation, memory, communications, and battery power. These systems are expected to fulfill essential roles in critical infrastructure sectors. Vehicular Ad-Hoc Network (VANET) and a swarm of Unmanned Aerial Vehicles (UAV swarm) are examples of such systems. The significant utility of these systems, coupled with their economic viability, is a crucial indicator of their anticipated growth in the future. Typically, the tasks assigned to these systems have strict Quality-of-Service (QoS) requirements and require sensing, perception, and …


Demonstrating Configuration Of Software Defined Networking In Real Wireless Testbeds, Saish Urumkar, Gianluca Fontanesi, Avishek Nag, Sachin Sharma 2022 Technological University Dublin

Demonstrating Configuration Of Software Defined Networking In Real Wireless Testbeds, Saish Urumkar, Gianluca Fontanesi, Avishek Nag, Sachin Sharma

Conference papers

Currently, several wireless testbeds are available to test networking solutions including Fed4Fire testbeds such as w-ilab. t and CityLab in the EU, and POWDER and COSMOS in the US. In this demonstration, we use the w-ilab.t testbed to set up a wireless ad-hoc Software-Defined Network (SDN). OpenFlow is used as an SDN protocol and is deployed using a grid wireless ad-hoc topology in w-ilab.t. In this paper, we demonstrate: (1) the configuration of a wireless ad-hoc network based on w-ilab.t and (2) the automatic deployment of OpenFlow in an ad-hoc wireless network where some wireless nodes are not directly connected …


Experimenting An Edge-Cloud Computing Model On The Gpulab Fed4fire Testbed, Vikas Tomer, Sachin Sharma 2022 Graphic Era Deemed to be University

Experimenting An Edge-Cloud Computing Model On The Gpulab Fed4fire Testbed, Vikas Tomer, Sachin Sharma

Conference papers

There are various open testbeds available for testing algorithms and prototypes, including the Fed4Fire testbeds. This demo paper illustrates how the GPULAB Fed4Fire testbed can be used to test an edge-cloud model that employs an ensemble machine learning algorithm for detecting attacks on the Internet of Things (IoT). We compare experimentation times and other performance metrics of our model based on different characteristics of the testbed, such as GPU model, CPU speed, and memory. Our goal is to demonstrate how an edge-computing model can be run on the GPULab testbed. Results indicate that this use case can be deployed seamlessly …


The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan 2022 Old Dominion University

The Message Design Of Raiders Of The Lost Ark On The Atari 2600 & A Fan’S Map, Quick Start, And Strategy Guide, Miguel Ramlatchan, William I. Ramlatchan

Distance Learning Faculty & Staff Books

The message design and human performance technology in video games, especially early video games have always been fascinating to me. From an instructional design perspective, the capabilities of the technology of the classic game consoles required a careful balance of achievable objectives, cognitive task analysis, guided problem solving, and message design. Raiders on the Atari is an excellent example of this balance. It is an epic adventure game, spanning 13+ distinct areas, with an inventory of items, where those hard to find items had to be used by the player to solve problems during their quest (and who would have …


Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, shimaa mohamed ouf, Amira M. Idrees AMI 2022 BIS Helwan University

Credit Card Fraud Detection Using Machine Learning Techniques, Nermin Samy Elhusseny, Shimaa Mohamed Ouf, Amira M. Idrees Ami

Future Computing and Informatics Journal

This is a systematic literature review to reflect the previous studies that dealt with credit card fraud detection and highlight the different machine learning techniques to deal with this problem. Credit cards are now widely utilized daily. The globe has just begun to shift toward financial inclusion, with marginalized people being introduced to the financial sector. As a result of the high volume of e-commerce, there has been a significant increase in credit card fraud. One of the most important parts of today's banking sector is fraud detection. Fraud is one of the most serious concerns in terms of monetary …


Dual-Axis Precision Imager, Gary Huarng 2022 California Polytechnic State University, San Luis Obispo

Dual-Axis Precision Imager, Gary Huarng

Computer Engineering

The Dual-Axis Precision Imager (DAPI) is a drawing robot that processes images and draws them on a whiteboard. The system has two modes: a Sobel filter mode that finds the edges of the input image with a Sobel filter, and a tri-tone grayscale mode that approximates the shading of the input image with the colors white, gray, and black. The DAPI consists of an Arduino-controlled XY gantry system with a pen mounted on the gantry head, and a Processing IDE program that processes the original image, converts the processed image into gantry instructions, and sends them to the Arduino for …


Therapeutic Mechanical Horse, Cade M. Liberty, Aleya Dolorfino, Peter Philips, Zuzanna Dominik, Luke Watts 2022 California Polytechnic State University, San Luis Obispo

Therapeutic Mechanical Horse, Cade M. Liberty, Aleya Dolorfino, Peter Philips, Zuzanna Dominik, Luke Watts

Mechanical Engineering

Jack's Helping Hand and its hippotherapy participants required a device to serve as an alternative to a live horseback riding experience that could also increase the range of riders. This would provide more clients with equine-assisted therapy that has proven to better the lives of people with both physical and mental disabilities. Horses can be unpredictable, tall, and sometimes anxiety-inducing, especially for new riders. Our group’s aim was to develop a mechanical horse that will be able to reduce these issues for equine therapy centers and the riders they help. When a rider gets to practice sitting on the horse …


Total Sky Imager Project, Ryan D. Maier, Benjamin Jack Forest, Kyle X. McGrath 2022 California Polytechnic State University, San Luis Obispo

Total Sky Imager Project, Ryan D. Maier, Benjamin Jack Forest, Kyle X. Mcgrath

Mechanical Engineering

Solar farms like the Gold Tree Solar Farm at Cal Poly San Luis Obispo have difficulty delivering a consistent level of power output. Cloudy days can trigger a significant drop in the utility of a farm’s solar panels, and an unexpected loss of power from the farm could potentially unbalance the electrical grid. Being able to predict these power output drops in advance could provide valuable time to prepare a grid and keep it stable. Furthermore, with modern data analysis methods such as machine learning, these predictions are becoming more and more accurate – given a sufficient data set. The …


Mars Prototype Rover Environmental Measurement System, James A. Renick 2022 California Polytechnic State University, San Luis Obispo

Mars Prototype Rover Environmental Measurement System, James A. Renick

Computer Engineering

In my senior project, the problem I am trying to solve is how to efficiently design, create, and install an original library onto a Mars prototype rover operating system and to further use that library to integrate a new weather measurement sensor device into the rover system with the necessary software and hardware implementations. This is an important and highly valued problem as many aerospace and other engineering companies utilize rovers and other autonomous systems for important research, explorations, and reconnaissance missions and goals. In solving this problem, I utilized many resources that were available to me such as advisors, …


Low-Cost Uav Swarm For Real-Time Object Detection Applications, Joel Valdovinos Miranda 2022 California Polytechnic State University, San Luis Obispo

Low-Cost Uav Swarm For Real-Time Object Detection Applications, Joel Valdovinos Miranda

Master's Theses

With unmanned aerial vehicles (UAVs), also known as drones, becoming readily available and affordable, applications for these devices have grown immensely. One type of application is the use of drones to fly over large areas and detect desired entities. For example, a swarm of drones could detect marine creatures near the surface of the ocean and provide users the location and type of animal found. However, even with the reduction in cost of drone technology, such applications result costly due to the use of custom hardware with built-in advanced capabilities. Therefore, the focus of this thesis is to compile an …


Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina 2022 Old Dominion University

Runtime Energy Savings Based On Machine Learning Models For Multicore Applications, Vaibhav Sundriyal, Masha Sosonkina

Electrical & Computer Engineering Faculty Publications

To improve the power consumption of parallel applications at the runtime, modern processors provide frequency scaling and power limiting capabilities. In this work, a runtime strategy is proposed to maximize energy savings under a given performance degradation. Machine learning techniques were utilized to develop performance models which would provide accurate performance prediction with change in operating core-uncore frequency. Experiments, performed on a node (28 cores) of a modern computing platform showed significant energy savings of as much as 26% with performance degradation of as low as 5% under the proposed strategy compared with the execution in the unlimited power case.


A Comprehensive Study On Security In Wireless Sensor Networks(Wsns), Sucheta Panda, Sushree Bibhuprada B. Priyadarshini 2022 SIKSHA O ANUSANDHAN DEEMED TO BE UNIVERSITY

A Comprehensive Study On Security In Wireless Sensor Networks(Wsns), Sucheta Panda, Sushree Bibhuprada B. Priyadarshini

International Journal of Smart Sensor and Adhoc Network

Wireless Sensor Networks(WSNs) are an important component of today's ubiquitous and pervasive computing. Without WSNs, the applications aren't as clever as they could be. Almost every scenario involving WSNs necessitates a quick and precise localization process. Existing frameworks and algorithms, on the other hand suffer from a significant disadvantage when it comes to beacon node trust, which is a critical component in Wireless Sensor Network. For localization this has to be ensured.. This issue is addressed in our current solution. In the harsh environment of WSN operations, malicious nodes are inescapable. As a consequence, A technique has been proposed to …


Cross-Atlantic Experiments On Eu-Us Test-Beds, Sachin Sharma, Avishek Nag, Byrav Ramamurthy 2022 Technological University Dublin

Cross-Atlantic Experiments On Eu-Us Test-Beds, Sachin Sharma, Avishek Nag, Byrav Ramamurthy

Articles

Today, there are a number of real testbeds worldwide among which Fed4Fire testbeds are prominent in the EU, while POWDER and COSMOS are prominent in the US. This paper aims to validate inter-testbed experiments between the EU and the US by connecting a number of Fed4Fire and US testbeds as part of an NGIAtlantic project. The goal is to compare the hop count, the topology formed, the maximum bandwidth permitted, and the loss and jitter that occurred between different testbeds. Additionally, Software Defined Networking (SDN) experiments between EU and US testbeds are conducted, and an edge-computing use case is developed …


Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari 2022 Department of Computer Application, Institute of Technical Education and Research, Siksha ‘O’ Anusandhan Deemed to be University, Odisha, India

Classification Of Internet Advertisement, Biswajit Biswal, Banasmita Subhadarshini, Sasmita Jena, Binita Kumari

Graduate Research in Engineering and Technology (GRET)

The investigation of web ad is vital now daily in human existence. Commercial and their connected regions are economy concern business has become an outstanding field in the wide spread region. Publicizing area are producing part of data and information which help to comprehend and should be examination, propositions information are should change over into significant information. To utilize these clients' data, settle on future choice and accomplish powerful choices, these choices help to comprehend client's need and utilization of the labour and products. Utilize client's information and carry out information mining strategies to get familiar with clients' examples and …


Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo 2022 Odisha University of Technology and Research, Bhubaneswar, Odisha, India

Speech Emotion Recognition System Using Librosa For Better Customer Experience, Subhadarshini Mohanty, Subasish Mohapatra, Amlan Sahoo

Graduate Research in Engineering and Technology (GRET)

Call center employees usually depend on instinct to judge a potential customer and how to pitch to them. In this paper, we pitch a more effective way for call center employees to generate more leads and engagement to generate higher revenue by analyzing the speech of the target customer by using machine learning practices and depending on data to make data-driven decisions rather than intuition. Speech Emotion Recognition otherwise known as SER is the demonstration of aspiring to perceive human inclination along with the behavior. Normally voice reflects basic feeling through tone and pitch. According to human behavior, many creatures …


Forecasting The Time Delay In Delivery Of Pharmaceutical Products, Subhalaxmi Hotta, Sonali Sahoo, Tripti Swarnkar 2022 Department of Computer Application Siksha ‘O’ Anusandhan Deemed to be University, Bhubaneswar, India-75103

Forecasting The Time Delay In Delivery Of Pharmaceutical Products, Subhalaxmi Hotta, Sonali Sahoo, Tripti Swarnkar

Graduate Research in Engineering and Technology (GRET)

Supply chain management system is a centralized system which controls and plans the activities involved from production to delivery of a product. Disruption in treatment and loss of life occurs due to delay in delivery of pharmaceutical products. The objective is to do a model using Machine learning algorithms to determine: Classification to predict which product will be delayed and Regression shows how much time it will be delayed exactly. This study will use publicly available supply chain data which helps to identify primary aspect of predicting whether HIV drugs are delivered in time or not. It will then use …


Fortune Of Smart-Phones By A Model Recommendation, Sonali Sahoo, Subhalaxmi Hotta, Tripti Swarnkar 2022 Department of Computer Application Siksha ‘O’ Anusandhan Deemed to be University, Bhubaneswar, India-751030

Fortune Of Smart-Phones By A Model Recommendation, Sonali Sahoo, Subhalaxmi Hotta, Tripti Swarnkar

Graduate Research in Engineering and Technology (GRET)

In recent market, there are several cell phones available, Smart phones differ based on their Operating system. Here we are going to do a comparison between two Operating systems i.e., “IOS and ANDROID”. The comparison starts including the basic features of smart phones. The features are varying from each other. Some of them are categorical and some are numerical. According to these data, classify the smart phones using machine learning classification model. After the classification we are going to analyse which operating system-based Smartphone will be taken for further classification. A “Recommendation system”, will be designed which recommend a better …


Iot In Healthcare Domain, Manisha Banka, Ankita Mishra, Sushreeta Tripathy 2022 Institute of Technical Education and Research, Bhubaneswar, Odisha, India

Iot In Healthcare Domain, Manisha Banka, Ankita Mishra, Sushreeta Tripathy

Graduate Research in Engineering and Technology (GRET)

In the current scenario, the Internet of Things (IoT) is an emerging technology. IoT is a new pattern that has changed the long-established way of living into a modernistic life style. IoT is the network of physical objects, which enables to collect data and exchange it without human intervention. In general, IoT has been established to interlink the latest healthcare resources and to provide smart and efficient healthcare facilities to the people. IoT allows objects to be sensed and controlled remotely across existing network infrastructure. Health maintenance has become a considerable socio-economic concern when it comes to health expenses, need …


Application Of Text Mining In Social Media, Gopal Krushna Padhi, Sushreeta Tripathy 2022 Computer Application Dept of Institute of Technical Education & Research

Application Of Text Mining In Social Media, Gopal Krushna Padhi, Sushreeta Tripathy

Graduate Research in Engineering and Technology (GRET)

Text mining or information discovery is that sub manner of information mining that is extensively being used to find out hidden styles and huge records from the massive amount of unstructured written fabric. Text mining allows accelerate know-how discovery by way of notably growing the amount records that can be analyzed. Rapid development in digital facts acquisition strategies have caused huge extent of facts. More than 80 percentages of these day’s statistics is composed of unstructured or semi-based information. This sort of data cannot be used until or unless particular records or pattern is determined. The discovery of appropriate patterns …


Digital Commons powered by bepress