Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,125 Full-Text Articles 3,389 Authors 1,223,234 Downloads 154 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,125 full-text articles. Page 38 of 85.

Exploring Adoption Of Augmented Reality Smart Glasses: Applications In The Medical Industry, Nuri A. Basoglu, Muge Goken, Marina Dabic, Dilek Ozdemir Gungor, Tugrul U. Daim 2018 Izmir Institute of Technology

Exploring Adoption Of Augmented Reality Smart Glasses: Applications In The Medical Industry, Nuri A. Basoglu, Muge Goken, Marina Dabic, Dilek Ozdemir Gungor, Tugrul U. Daim

Engineering and Technology Management Faculty Publications and Presentations

This study explores the use of augmented reality smart glasses (ARSGs) by physicians and their adoption of these products in the Turkish medical industry. Google Glass was used as a demonstrative example for the introduction of ARSGs. We proposed an exploratory model based on the technology acceptance model by Davis. Exogenous factors in the model were defined by performing semi-structured in-depth interviews, along with the use of an expert panel in addition to the technology adoption literature. The framework was tested by means of a field study, data was collected via an Internet survey, and path analysis was used. The …


Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli 2018 Kennesaw State University

Implementation Of Secure Dnp3 Architecture Of Scada System For Smart Grids, Uday Bhaskar Boyanapalli

Master of Science in Computer Science Theses

With the recent advances in the power grid system connecting to the internet, data sharing, and networking enables space for hackers to maliciously attack them based on their vulnerabilities. Vital stations in the smart grid are the generation, transmission, distribution, and customer substations are connected and controlled remotely by the network. Every substation is controlled by a Supervisory Control and Data Acquisition (SCADA) system which communicates on DNP3 protocol on Internet/IP which has many security vulnerabilities. This research will focus on Distributed Network Protocol (DNP3) communication which is used in the smart grid to communicate between the controller devices. We …


Minutes & Seconds: The Scientists, Patrick Aievoli 2018 Long Island University - C W Post Campus

Minutes & Seconds: The Scientists, Patrick Aievoli

Zea E-Books Collection

Minutes & Seconds, is a captivating intelligible read for those who strive to understand where the “what if” moment has gone. Succeeding his other captivating books, Aievoli’s deep introspective lens dials his readers in to awaken the proverbial sleeping giant inside of our consciousness. He designs an insightful exciting romp through the surreal landscape of our society and illustrates how various pioneers have lead us to a crossroads. I’m truly impressed with Aievoli’s perspicacious comprehension of where digital has taken us through the hands of these select individuals. --Sequoyah Wharton

In creating Minutes & Seconds, Aievoli has assembled an interesting …


Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham, Jyoti Parwatikar, John DeHart, Adam Drescher, Patrick Crowley 2018 Washington University in St Louis

Decoupling Information And Connectivity Via Information-Centric Transport, Hila Ben Abraham, Jyoti Parwatikar, John Dehart, Adam Drescher, Patrick Crowley

Computer Science and Engineering Publications and Presentations

The power of Information-Centric Networking (ICN) architectures lies in their abstraction for communication --- the request for named data. This abstraction promises that applications can choose to operate only in the information plane, agnostic to the mechanisms implemented in the connectivity plane. However, despite this powerful promise, the information and connectivity planes are presently coupled in today's incarnations of leading ICNs by a core architectural component, the forwarding strategy. Presently, this component is not sustainable: it implements both the information and connectivity mechanisms without specifying who should choose a forwarding strategy --- an application developer or the network operator. In …


The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow 2018 University of Pennsylvania Carey Law School

The Tao Of The Dao: Taxing An Entity That Lives On A Blockchain, David J. Shakow

All Faculty Scholarship

In this report, Shakow explains how a decentralized autonomous organization functions and interacts with the U.S. tax system and presents the many tax issues that these structures raise. The possibility of using smart contracts to allow an entity to operate totally autonomously on a blockchain platform seems attractive. However, little thought has been given to how such an entity can comply with the requirements of a tax system. The DAO, the first major attempt to create such an organization, failed because of a programming error. If successful examples proliferate in the future, tax authorities will face significant problems in getting …


Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan 2018 The University of Western Ontario

Real-Time Intrusion Detection Using Multidimensional Sequence-To-Sequence Machine Learning And Adaptive Stream Processing, Gobinath Loganathan

Electronic Thesis and Dissertation Repository

A network intrusion is any unauthorized activity on a computer network. There are host-based and network-based Intrusion Detection Systems (IDS's), of which there are each signature-based and anomaly-based detection methods. An anomalous network behavior can be defined as an intentional violation of the expected sequence of packets. In a real-time network-based IDS, incoming packets are treated as a stream of data. A stream processor takes any stream of data or events and extracts interesting patterns on the fly. This representation allows applying statistical anomaly detection using sequence prediction algorithms as well as using a stream processor to perform signature-based intrusion …


An Iot System For Converting Handwritten Text To Editable Format Via Gesture Recognition, Nidhi patel 2018 Kennesaw State University

An Iot System For Converting Handwritten Text To Editable Format Via Gesture Recognition, Nidhi Patel

Master of Science in Computer Science Theses

Evaluation of traditional classroom has led to electronic classroom i.e. e-learning. Growth of traditional classroom doesn’t stop at e-learning or distance learning. Next step to electronic classroom is a smart classroom. Most popular features of electronic classroom is capturing video/photos of lecture content and extracting handwriting for note-taking. Numerous techniques have been implemented in order to extract handwriting from video/photo of the lecture but still the deficiency of few techniques can be resolved, and which can turn electronic classroom into smart classroom.

In this thesis, we present a real-time IoT system to convert handwritten text into editable format by implementing …


Purdue Air Sense: A Methodology For Improving The Accuracy Of Ambient Aerosol Mass Concentration And Size Distribution Measurement With Low-Cost Optical Sensing Techniques, Rishabh Ramsisaria, Satya Sundar Patra, Brandon Emil Boor 2018 Purdue University

Purdue Air Sense: A Methodology For Improving The Accuracy Of Ambient Aerosol Mass Concentration And Size Distribution Measurement With Low-Cost Optical Sensing Techniques, Rishabh Ramsisaria, Satya Sundar Patra, Brandon Emil Boor

The Summer Undergraduate Research Fellowship (SURF) Symposium

There is a global lack of a means for monitoring air pollutant levels at a local level due to expensive and bulky instrument requirements. It is important to monitor toxic gas levels, as well as particulate matter levels, in the atmosphere to study their effects on human health and to further develop city- and community-level air pollution solutions. In this study, with the means of a Raspberry Pi, low-cost Alphasense Optical Particle Counter and gas sensors, and methodical calibration techniques, we built a portable 3-D printed module powered by clean electricity generated by an on-board Voltaic solar cell that measures …


Deep Neural Network Architectures For Modulation Classification Using Principal Component Analysis, Sharan Ramjee, Shengtai Ju, Diyu Yang, Aly El Gamal 2018 Purdue University

Deep Neural Network Architectures For Modulation Classification Using Principal Component Analysis, Sharan Ramjee, Shengtai Ju, Diyu Yang, Aly El Gamal

The Summer Undergraduate Research Fellowship (SURF) Symposium

In this work, we investigate the application of Principal Component Analysis to the task of wireless signal modulation recognition using deep neural network architectures. Sampling signals at the Nyquist rate, which is often very high, requires a large amount of energy and space to collect and store the samples. Moreover, the time taken to train neural networks for the task of modulation classification is large due to the large number of samples. These problems can be drastically reduced using Principal Component Analysis, which is a technique that allows us to reduce the dimensionality or number of features of the samples …


The Analysis And Deployment Of A Fully Open Monitoring System In The Sri Lankan Deduroya Basin: The 4onse Project, Massimiliano Cannata, Daniele Strigaro, Imran Shahid, Rangajeewa Ratnayake, B.H. Sudantha 2018 Institute of Earth Sciences, SUPSI-DACD, Switzerland

The Analysis And Deployment Of A Fully Open Monitoring System In The Sri Lankan Deduroya Basin: The 4onse Project, Massimiliano Cannata, Daniele Strigaro, Imran Shahid, Rangajeewa Ratnayake, B.H. Sudantha

Free and Open Source Software for Geospatial (FOSS4G) Conference Proceedings

The 4onse project studies non-conventional monitoring systems fully based on open technologies (hardware, standard protocols, software and data) for the management of resources and natural hazards in developing countries. After the design of hydro-meteorological stations and software for the collection, management and distribution of data, the study involves the installation of 30 stations in the Deduroya Oya river basin in Sri Lanka. The system will be analysed to fully understand the real cost of ownership, data quality and applicability in real situations. If properly validated, these systems can provide an alternative solution, effective and sustainable for the protection of property …


Soa Maturity Influence On Digital Banking Transformation, Alan MEGARGEL, Venky SHANKARARAMAN, Terence P. C. FAN 2018 Singapore Management University

Soa Maturity Influence On Digital Banking Transformation, Alan Megargel, Venky Shankararaman, Terence P. C. Fan

Research Collection School Of Computing and Information Systems

Digital Banking is an evolution of online banking, where the banks attempt to further enhance customer experience by integrating digital technologies such as mobile technology, social media and analytics. Traditional banks have the highest barriers to entry into the digital banking market due to the presence of legacy core banking systems. These legacy systems while still high performing and reliable, are inflexible to change and are not easily integrated to the modern application systems needed for delivering digital banking services across multiple online banking channels. One solution that is widely adopted in the industry to overcome this obstacle is the …


A Unified Approach To Route Planning For Shared Mobility, Yongxin TONG, Yuxiang ZENG, Zimu ZHOU, Lei CHEN, Jieping YE, Ke XU 2018 Singapore Management University

A Unified Approach To Route Planning For Shared Mobility, Yongxin Tong, Yuxiang Zeng, Zimu Zhou, Lei Chen, Jieping Ye, Ke Xu

Research Collection School Of Computing and Information Systems

There has been a dramatic growth of shared mobility applications such as ride-sharing, food delivery and crowdsourced parcel delivery. Shared mobility refers to transportation services that are shared among users, where a central issue is route planning. Given a set of workers and requests, route planning finds for each worker a route, i.e., a sequence of locations to pick up and drop off passengers/parcels that arrive from time to time, with different optimization objectives. Previous studies lack practicability due to their conflicted objectives and inefficiency in inserting a new request into a route, a basic operation called insertion. In this …


Exploring Offline Friendships On The Social Information Network: Network Characteristics, Information Diffusion, And Tie Strength, Felicia NATALI 2018 Singapore Management University

Exploring Offline Friendships On The Social Information Network: Network Characteristics, Information Diffusion, And Tie Strength, Felicia Natali

Dissertations and Theses Collection (Open Access)

The rapid increase in online social networking services over the last decade has pre- sented an unprecedented opportunity to observe users’ behaviour both on a societal and individual level. The insight gained from analysing such data can help foster a deeper understanding of social media users and the flow of information, while also offering valuable business applications. User relationships are among the most studied aspects of online behaviour. These relationships are not homogeneous. Past research has shown that people use social networks to both socialize and source in- formation. Hence, different types of links – used to socialize, gain information, …


Delegation Application, Erik Matthew Phillips 2018 California Polytechnic State University, San Luis Obispo

Delegation Application, Erik Matthew Phillips

Computer Science and Software Engineering

Delegation is a cross-platform application to provide smart task distribution to users. In a team environment, the assignment of tasks can be tedious and difficult for management or for users needing to discover a starting place for where to begin with accomplishing tasks. Within a specific team, members possess individual skills within different areas of the team’s responsibilities and specialties, and certain members will be better suited to tackle specific tasks. This project provides a solution, consisting of a smart cross-platform application that allows for teams and individuals to quickly coordinate and delegate tasks assigned to them.


Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball 2018 California Polytechnic State University, San Luis Obispo

Dynamic Video Streaming For Nano Quadcopters, Shane Daniel Kent, Ryan Weideman, Nicholas Kimball

Computer Engineering

The objective of this project was to develop a system that streams real-time video from a Crazyflie 2.0 nano quadcopter. We discuss the motivation behind the project including applications to swarm robotics and computer vision research. We highlight the initial research and design goals that guided the development of the system such as hardware selection and system specifications. We detail the software and hardware subsystems that we implemented including the video-streaming board, firmware, and video-streaming user application. We examine the performance of the final system and discuss the limitations imposed by the hardware. We conclude by describing future work that …


Learning Management Website, Brendan A. Baronia 2018 California Polytechnic State University, San Luis Obispo

Learning Management Website, Brendan A. Baronia

Computer Engineering

The following system was developed as a basic course management system for use by teachers and students. The project started as an alternative to existing platforms, such as Moodle, though because of a two quarter time constraint the complexity of the system was reduced to a more reasonable level. The resulting system requirements included a simple course creation/enrollment system, with separate sections, topics, and resources including videos, files, and a basic graph problem.


Arm Mke1xf Mcu Replatform, Nathan Hong, Derek Lung, Japsimran Singh, Bevin Tang 2018 California Polytechnic State University, San Luis Obispo

Arm Mke1xf Mcu Replatform, Nathan Hong, Derek Lung, Japsimran Singh, Bevin Tang

Computer Engineering

After Cal Poly Racing’s electrical team began to hit the technical limits of the ADC and other I/O features of the current 8-bit Atmel AT90 microcontroller unit, it became clear that an upgrade was due. This replatforming project takes the functionalities of the old, 8-bit architecture, and aims to provide a 32-bit version using the ARM MKE1xF MCU. With the idea of having a working PCB as a stretch goal, the scope of the library development was limited to enable base functionality. Thus, the only libraries developed were for the Timer, ADC, SPI, UART, and CAN. Additionally, this document discusses …


A Survey Of Security Attacks And Defenses In Vehicular Ad-Hoc Networks, Pierson Yieh 2018 California Polytechnic State University, San Luis Obispo

A Survey Of Security Attacks And Defenses In Vehicular Ad-Hoc Networks, Pierson Yieh

Computer Science and Software Engineering

No abstract provided.


Dynamic Routing And Network Monitoring For The Polywog Protocol, Ryan Lawrence, Josh Pfeffer 2018 California Polytechnic State University, San Luis Obispo

Dynamic Routing And Network Monitoring For The Polywog Protocol, Ryan Lawrence, Josh Pfeffer

Computer Science and Software Engineering

This document analyzes the implementation of dynamic routing for router nodes in a mesh network. It examines the algorithm used to populate both the minimum-distance and the routing tables. Furthermore, it describes the node configurations used for testing and applications for mesh networks.

Additionally, this document describes the implementation and testing of network monitoring in a mesh network. It discusses the steps used to forward active nodes in the network between router nodes, a gateway node, and a network monitor.

Lastly, this paper details our future plans for implementing additional features for a network monitor.


Vehicle Pseudonym Association Attack Model, Pierson Yieh 2018 California Polytechnic State University, San Luis Obispo

Vehicle Pseudonym Association Attack Model, Pierson Yieh

Master's Theses

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …


Digital Commons powered by bepress