Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,125 Full-Text Articles 3,389 Authors 1,124,087 Downloads 154 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,125 full-text articles. Page 33 of 85.

Confidence Inference In Defensive Cyber Operator Decision Making, Graig S. Ganitano 2019 Air Force Institute of Technology

Confidence Inference In Defensive Cyber Operator Decision Making, Graig S. Ganitano

Theses and Dissertations

Cyber defense analysts face the challenge of validating machine generated alerts regarding network-based security threats. Operations tempo and systematic manpower issues have increased the importance of these individual analyst decisions, since they typically are not reviewed or changed. Analysts may not always be confident in their decisions. If confidence can be accurately assessed, then analyst decisions made under low confidence can be independently reviewed and analysts can be offered decision assistance or additional training. This work investigates the utility of using neurophysiological and behavioral correlates of decision confidence to train machine learning models to infer confidence in analyst decisions. Electroencephalography …


High Resolution Low-Bandwidth Real-Time Reconnaissance Using Structure From Motion With Planar Homography Estimation, Christian M.A. Arnold 2019 Air Force Institute of Technology

High Resolution Low-Bandwidth Real-Time Reconnaissance Using Structure From Motion With Planar Homography Estimation, Christian M.A. Arnold

Theses and Dissertations

Aerial real-time surveillance exists in a paradigm balancing the constraints of delivering high quality data and transporting data quickly. Typically, to have more of one, sacrifices must be made to the other. This is true of the environment in which an Unmanned Aerial Vehicle (UAV) operates, where real-time communication may be done through a low-bandwidth satellite connection resulting in low-resolution data, and serves as the primary limiting factor in all intelligence operations. Through the use of efficient computer vision techniques, we propose a new Structure from Motion (SfM) method capable of compressing high-resolution data, and delivering that data in real-time. …


Modeling A Consortium-Based Distributed Ledger Network With Applications For Intelligent Transportation Infrastructure, Luis A. Cintron 2019 Air Force Institute of Technology

Modeling A Consortium-Based Distributed Ledger Network With Applications For Intelligent Transportation Infrastructure, Luis A. Cintron

Theses and Dissertations

Emerging distributed-ledger networks are changing the landscape for environments of low trust among participating entities. Implementing such technologies in transportation infrastructure communications and operations would enable, in a secure fashion, decentralized collaboration among entities who do not fully trust each other. This work models a transportation records and events data collection system enabled by a Hyperledger Fabric blockchain network and simulated using a transportation environment modeling tool. A distributed vehicle records management use case is shown with the capability to detect and prevent unauthorized vehicle odometer tampering. Another use case studied is that of vehicular data collected during the event …


Near Real-Time Rf-Dna Fingerprinting For Zigbee Devices Using Software Defined Radios, Frankie A. Cruz 2019 Air Force Institute of Technology

Near Real-Time Rf-Dna Fingerprinting For Zigbee Devices Using Software Defined Radios, Frankie A. Cruz

Theses and Dissertations

Low-Rate Wireless Personal Area Network(s) (LR-WPAN) usage has increased as more consumers embrace Internet of Things (IoT) devices. ZigBee Physical Layer (PHY) is based on the Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 specification designed to provide a low-cost, low-power, and low-complexity solution for Wireless Sensor Network(s) (WSN). The standard’s extended battery life and reliability makes ZigBee WSN a popular choice for home automation, transportation, traffic management, Industrial Control Systems (ICS), and cyber-physical systems. As robust and versatile as the standard is, ZigBee remains vulnerable to a myriad of common network attacks. Previous research involving Radio Frequency-Distinct Native Attribute …


A Multi-Vehicle Cooperative Localization Approach For An Autonomy Framework, Edwin A. Mora 2019 Air Force Institute of Technology

A Multi-Vehicle Cooperative Localization Approach For An Autonomy Framework, Edwin A. Mora

Theses and Dissertations

Offensive techniques produced by technological advancement present opportunities for adversaries to threaten the operational advantages of our joint and allied forces. Combating these new methodologies requires continuous and rapid development towards our own set of \game-changing" technologies. Through focused development of unmanned systems and autonomy, the Air Force can strive to maintain its technological superiority. Furthermore, creating a robust framework capable of testing and evaluating the principles that define autonomy allows for the exploration of future capabilities. This research presents development towards a hybrid reactive/deliberative architecture that will allow for the testing of the principles of task, cognitive, and peer …


A Blockchain-Based Anomalous Detection System For Internet Of Things Devices, Joshua K. Mosby 2019 Air Force Institute of Technology

A Blockchain-Based Anomalous Detection System For Internet Of Things Devices, Joshua K. Mosby

Theses and Dissertations

Internet of Things devices are highly susceptible to attack, and owners often fail to realize they have been compromised. This thesis describes an anomalous-based intrusion detection system that operates directly on Internet of Things devices utilizing a custom-built Blockchain. In this approach, an agent on each node compares the node's behavior to that of its peers, generating an alert if they are behaving differently. An experiment is conducted to determine the effectiveness at detecting malware. Three different code samples simulating common malware are deployed against a testbed of 12 Raspberry Pi devices. Increasing numbers are infected until two-thirds of the …


Autonomous Association Of Geo Rso Observations Using Deep Neural Networks, Ian W. McQuaid 2019 Air Force Institute of Technology

Autonomous Association Of Geo Rso Observations Using Deep Neural Networks, Ian W. Mcquaid

Theses and Dissertations

Ground-based non-resolved optical observations of resident space objects (RSOs) in geosynchronous orbit (GEO) represent the majority of the space surveillance network’s (SSN’s) deep-space tracking. Reliable and accurate tracking necessitates temporal separation of the observations. This requires that subsequent observations be associated with prior observations of a given RSO before they can be used to create or refine that RSO’s ephemeris. The use of astrometric data (e.g. topocentric angular position) alone for this association task is complicated by RSO maneuvers between observations, and by RSOs operating in close proximity. Accurately associating an observation with an RSO thus motivates the use of …


Unresolved Object Detection Using Synthetic Data Generation And Artificial Neural Networks, Yong U. Sinn 2019 Air Force Institute of Technology

Unresolved Object Detection Using Synthetic Data Generation And Artificial Neural Networks, Yong U. Sinn

Theses and Dissertations

This research presents and solves constrained real-world problems of using synthetic data to train artificial neural networks (ANNs) to detect unresolved moving objects in wide field of view (WFOV) electro-optical/infrared (EO/IR) satellite motion imagery. Objectives include demonstrating the use of the Air Force Institute of Technology (AFIT) Sensor and Scene Emulation Tool (ASSET) as an effective tool for generating EO/IR motion imagery representative of real WFOV sensors and describing the ANN architectures, training, and testing results obtained. Deep learning using a 3-D convolutional neural network (3D ConvNet), long short term memory (LSTM) network, and U-Net are used to solve the …


Sustainability In An It Context, Dikran Kassabian 2019 West Chester University of Pennsylvania

Sustainability In An It Context, Dikran Kassabian

Sustainability Research & Practice Seminar Presentations

No abstract provided.


Sequence Design Via Semidefinite Programming Relaxation And Randomized Projection, Dian Mo 2019 University of Massachusetts Amherst

Sequence Design Via Semidefinite Programming Relaxation And Randomized Projection, Dian Mo

Doctoral Dissertations

Wideband is a booming technology in the field of wireless communications. The receivers in wideband communication systems are expected to cover a very wide spectrum and adaptively extract the parts of interest. The literature has focused on mixing the input spectrum to baseband using a pseudorandom sequence modulation and recovering the received signals from linearly independent measurements by parallel branches to mitigate the pressures from required extreme high sampling frequency. However, a pseudorandom sequence provides no rejection for the strong interferers received together with weak signals from distant sources. The interferers cause significant distortion due to the nonlinearity of the …


Fundamental Limits Of Covert Communication In Packet Channels, Ramin Soltani 2019 University of Massachusetts Amherst

Fundamental Limits Of Covert Communication In Packet Channels, Ramin Soltani

Doctoral Dissertations

This dissertation focuses on covert communication in channels where the communication takes place by the transmission of packets. Consider a channel where authorized transmitter Jack sends packets to authorized receiver Steve according to a Poisson process with rate $\lambda$ packets per second for a time period $T$. Jack's transmitted packet visit Alice, Willie, Bob and Steve, respectively. Suppose that covert transmitter Alice wishes to communicate information to covert receiver Bob without being detected by a watchful adversary Willie. We consider three sets of assumptions for this channel. For each set of assumptions, we present a technique for establishing covert communication …


Recipe For Disaster, Zac Travis 2019 University of New Mexico

Recipe For Disaster, Zac Travis

MFA Thesis Exhibit Catalogs

Today’s rapid advances in algorithmic processes are creating and generating predictions through common applications, including speech recognition, natural language (text) generation, search engine prediction, social media personalization, and product recommendations. These algorithmic processes rapidly sort through streams of computational calculations and personal digital footprints to predict, make decisions, translate, and attempt to mimic human cognitive function as closely as possible. This is known as machine learning.

The project Recipe for Disaster was developed by exploring automation in technology, specifically through the use of machine learning and recurrent neural networks. These algorithmic models feed on large amounts of data as a …


Ict Competencies In Eight Mayan-Speaking Communities Of Mexico: Preliminary Findings, J. Gabriel D. Domínguez Castillo, Alexander N. Chen, Mark E. McMurtrey Ph.D., Edith J. Cisneros Cohernour, Marianne Gabriel 2019 Autonomous University of Yucatan (UADY), Mexico

Ict Competencies In Eight Mayan-Speaking Communities Of Mexico: Preliminary Findings, J. Gabriel D. Domínguez Castillo, Alexander N. Chen, Mark E. Mcmurtrey Ph.D., Edith J. Cisneros Cohernour, Marianne Gabriel

Journal of International Technology and Information Management

The skills related to the use of information and communication technologies (ICT) were examined in this study within the context of eight communities with a high degree of vulnerability and diversity. The objectives of the study were: a) to conduct a diagnosis of thirteen competencies related to the use of ICT in eight Mayan-speaking communities in the state of Yucatan, Mexico, and b) to examine such variables as gender, marital status, and the education level of their parents. in relation to the degree of ICT among these youth.

The findings indicate that there are differences in the use of technology …


Great Modules In Drupal 7... And Drupal 8...?, Rachel S. Evans, Lauren Blais 2019 University of Georgia Law Library

Great Modules In Drupal 7... And Drupal 8...?, Rachel S. Evans, Lauren Blais

Presentations

The two presenters each shared their favorite Drupal modules, giving site examples of each in action and talking about the benefits and drawbacks of each. Most UGA websites using Drupal are in the process of migrating content from 7 to 8, so each module discussed was then described in terms of availability in 8. The following five modules were explored:

  • Quick Tabs
  • Flex Slider
  • Geolocation and Leaflet
  • Biblio (not in D8)
  • Environment Indicator


Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng 2019 China Internet Network Information Center, China

Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng

Information Science Faculty Publications

The vision of the Internet of Things (IoT) covers not only the well-regulated processes of specific applications in different areas but also includes ubiquitous connectivity of more generic objects (or things and devices) in the physical world and the related information in the virtual world. For example, a typical IoT application, such as a smart city, includes smarter urban transport networks, upgraded water supply, and waste-disposal facilities, along with more efficient ways to light and heat buildings. For smart city applications and others, we require unique naming of every object and a secure, scalable, and efficient name resolution which can …


The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar CheshmehSohrabi, Ahmad Shabani 2019 University of Isfahan

The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani

Library Philosophy and Practice (e-journal)

Introduction: This paper aims to develop a Scientific Information Exchange General Model at Digital Library in Context of Internet of things, which would enable automated and efficient library services. To accomplish its objective, the main classes (Concepts), sub-classes, attributes are identified in order to introduce an appropriate model.

Methodology: The approach of this study is basic, exploratory, and developmental and is run through a mixed method consisting of documentary, Delphi, and data modeling methods. The study population in the documentary section includes the study of information resources retrieved in related subjects. The study population in the Delphi section is …


Design And Evaluation Of Iot-Enabled Instrumentation For A Soil-Bentonite Slurry Trench Cutoff Wall, Jeffrey C. Evans, Alan Marchiori, Yadong Li 2019 Bucknell University

Design And Evaluation Of Iot-Enabled Instrumentation For A Soil-Bentonite Slurry Trench Cutoff Wall, Jeffrey C. Evans, Alan Marchiori, Yadong Li

Faculty Journal Articles

In this work, we describe our approach and experiences bringing an instrumented soil-bentonite slurry trench cutoff wall into a modern IoT data collection and visualization pipeline. Soil-bentonite slurry trench cutoff walls have long been used to control ground water flow and contaminant transport. A Raspberry Pi computer on site periodically downloads the sensor data over a serial interface from an industrial datalogger and transmits the data wirelessly to a gateway computer located 1.3 km away using a reliable transmission protocol. The resulting time-series data is stored in a MongoDB database and data is visualized in real-time by a custom web …


Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles 2019 Univ of New Brunswick Fredericton

Hp Brazil: Journey Towards Industrial Internet Of Things Within Industry 4.0 Context, Rebecca Angeles

Journal of International Technology and Information Management

This paper features a case study of Hewlett Packard Brazil’s deployment of radio frequency identification-enabled Exceler8 platform to support its product assembly using Flextronics in Sorocaba, Sao Paulo and distribution by DHL. The study also identifies the stage HP Brazil belongs to in its journey to being a full smart factory using the framework of Odwazny et al. (2018). The case study and content analysis methods are used in analyzing the concepts prescribed by the Industry 4.0, smart factory, and Industrial Internet of Things (IIOT) frameworks to HP Brazil’s RFID system. The Odwazny et al. (2018) framework identifies HP Brazil …


A Diverse Band-Aware Dynamic Spectrum Access Architecture For Connectivity In Rural Communities, Vijay K. Shah 2019 University of Kentucky

A Diverse Band-Aware Dynamic Spectrum Access Architecture For Connectivity In Rural Communities, Vijay K. Shah

Theses and Dissertations--Computer Science

Ubiquitous connectivity plays an important role in improving the quality of life in terms of economic development, health and well being, social justice and equity, as well as in providing new educational opportunities. However, rural communities which account for 46% of the world's population lacks access to proper connectivity to avail such societal benefits, creating a huge "digital divide" between the urban and rural areas. A primary reason is that the Information and Communication Technologies (ICT) providers have less incentives to invest in rural areas due to lack of promising revenue returns. Existing research and industrial attempts in providing connectivity …


Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco 2019 University of Kentucky

Automated Network Security With Exceptions Using Sdn, Sergio A. Rivera Polanco

Theses and Dissertations--Computer Science

Campus networks have recently experienced a proliferation of devices ranging from personal use devices (e.g. smartphones, laptops, tablets), to special-purpose network equipment (e.g. firewalls, network address translation boxes, network caches, load balancers, virtual private network servers, and authentication servers), as well as special-purpose systems (badge readers, IP phones, cameras, location trackers, etc.). To establish directives and regulations regarding the ways in which these heterogeneous systems are allowed to interact with each other and the network infrastructure, organizations typically appoint policy writing committees (PWCs) to create acceptable use policy (AUP) documents describing the rules and behavioral guidelines that all campus network …


Digital Commons powered by bepress