Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,142 Full-Text Articles 3,520 Authors 1,022,331 Downloads 143 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,142 full-text articles. Page 4 of 87.

A Machine Learning Based Drug Recommendation System For Health Care, Mahima Mohapatra, Mamata Nayak, Saswati Mahapatra 2022 Institute of Technical Education and Research, Bhubaneswar, Odisha, India

A Machine Learning Based Drug Recommendation System For Health Care, Mahima Mohapatra, Mamata Nayak, Saswati Mahapatra

Graduate Research in Engineering and Technology (GRET)

In today’s digital era healthcare is one among the major core areas of the medical domain. People trying to find suitable health-related information that they are concerned with. The Internet could be a great resource for this kind of data, however you need to take care to avoid getting harmful information. Nowadays, a colossal quantity of clinical information dispersed totally across different websites on the Internet prevents users from finding useful information for their well-being improvement. Errors in medication are one of the foremost severe medical faults that would be a threat to patients’ lives. These problems increases the requirement …


Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings 2022 South East Technological University

Graph-Based Heuristic Solution For Placing Distributed Video Processing Applications On Moving Vehicle Clusters, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Vehicular fog computing (VFC) is envisioned as an extension of cloud and mobile edge computing to utilize the rich sensing and processing resources available in vehicles. We focus on slow-moving cars that spend a significant time in urban traffic congestion as a potential pool of onboard sensors, video cameras, and processing capacity. For leveraging the dynamic network and processing resources, we utilize a stochastic mobility model to select nodes with similar mobility patterns. We then design two distributed applications that are scaled in real-time and placed as multiple instances on selected vehicular fog nodes. We handle the unstable vehicular environment …


Scaling And Placing Distributed Services On Vehicle Clusters In Urban Environments, Kanika Sharma, Bernard Butler, Brendan Jennings 2022 South East Technological University

Scaling And Placing Distributed Services On Vehicle Clusters In Urban Environments, Kanika Sharma, Bernard Butler, Brendan Jennings

Articles

Many vehicles spend a significant amount of time in urban traffic congestion. Due to the evolution of autonomous vehicles, driver assistance systems, and in-vehicle entertainment, these vehicles have plentiful computational and communication capacity. How can we deploy data collection and processing tasks on these (slowly) moving vehicles to productively use any spare resources? To answer this question, we study the efficient placement of distributed services on a moving vehicle cluster. We present a macroscopic flow model for an intersection in Dublin, Ireland, using real vehicle density data. We show that such aggregate flows are highly predictable (even though the paths …


Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí de Fréin 2022 University of Debrecen

Ml-Based Online Traffic Classification For Sdns, Mohammed Nsaif, Gergely Kovasznai, Mohammed Abboosh, Ali Malik, Ruairí De Fréin

Articles

Traffic classification is a crucial aspect for Software-Defined Networking functionalities. This paper is a part of an on-going project aiming at optimizing power consumption in the environment of software-defined datacenter networks. We have developed a novel routing strategy that can blindly balance between the power consumption and the quality of service for the incoming traffic flows. In this paper, we demonstrate how to classify the network traffic flows so that the quality of service of each flow-class can be guaranteed efficiently. This is achieved by creating a dataset that encompasses different types of network traffic such as video, VoIP, game …


Splicecube Architecture: An Extensible Wi-Fi Monitoring Architecture For Smart-Home Networks, Namya Malik 2022 Dartmouth College

Splicecube Architecture: An Extensible Wi-Fi Monitoring Architecture For Smart-Home Networks, Namya Malik

Dartmouth College Master’s Theses

The vision of smart homes is rapidly becoming a reality, as the Internet of Things and other smart devices are deployed widely. Although smart devices offer convenience, they also create a significant management problem for home residents. With a large number and variety of devices in the home, residents may find it difficult to monitor, or even locate, devices. A central controller that brings all the home’s smart devices under secure management and a unified interface would help homeowners and residents track and manage their devices.

We envision a solution called the SPLICEcube whose goal is to detect smart devices, …


Data Management In Web Applications To Balance Performance And Security, Caleb Marcoux 2022 University of Nebraska - Lincoln

Data Management In Web Applications To Balance Performance And Security, Caleb Marcoux

Honors Theses, University of Nebraska-Lincoln

As web applications become increasingly popular, many are running several calculations and data processing on the client machine, it is important to consider data management practices on the front-end of these web applications. Typically, some data from the server is stored in the client's memory or hard disk. How much data should be stored for how long, as well as many other considerations, influence the time and space performance of the web application, as well as its security. In this thesis, we explore several challenges, solutions, and design patterns in web application data management through the lens of a senior …


Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn 2022 Air University, Air Force Cyber College

Defensive Industrial Policy: Cybersecurity Interventions To Reduce Intellectual Property Theft, Dr. Chad Dacus, Dr. Carl (Cj) Horn

Military Cyber Affairs

Through cyber-enabled industrial espionage, China has appropriated what Keith Alexander, the former Director of the National Security Agency, dubbed “the largest transfer of wealth in history.” Although China disavows intellectual property (IP) theft by its citizens and has set self-sustained research and development as an important goal, it is unrealistic to believe IP theft will slow down meaningfully without changing China’s decision calculus. China and the United States have twice agreed, in principle, to respect one another’s IP rights. However, these agreements have lacked any real enforcement mechanism, so the United States must do more to ensure its IP is …


Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa McKee 2022 Dakota State University

Privacy Assessment Breakthrough: A Design Science Approach To Creating A Unified Methodology, Lisa Mckee

Masters Theses & Doctoral Dissertations

Recent changes have increased the need for and awareness of privacy assessments. Organizations focus primarily on Privacy Impact Assessments (PIA) and Data Protection Impact Assessments (DPIA) but rarely take a comprehensive approach to assessments or integrate the results into a privacy risk program. There are numerous industry standards and regulations for privacy assessments, but the industry lacks a simple unified methodology with steps to perform privacy assessments. The objectives of this research project are to create a new privacy assessment methodology model using the design science methodology, update industry standards and present training for conducting privacy assessments that can be …


A Novel Data Lineage Model For Critical Infrastructure And A Solution To A Special Case Of The Temporal Graph Reachability Problem, Ian Moncur 2022 University of Arkansas, Fayetteville

A Novel Data Lineage Model For Critical Infrastructure And A Solution To A Special Case Of The Temporal Graph Reachability Problem, Ian Moncur

Graduate Theses and Dissertations

Rapid and accurate damage assessment is crucial to minimize downtime in critical infrastructure. Dependency on modern technology requires fast and consistent techniques to prevent damage from spreading while also minimizing the impact of damage on system users. One technique to assist in assessment is data lineage, which involves tracing a history of dependencies for data items. The goal of this thesis is to present one novel model and an algorithm that uses data lineage with the goal of being fast and accurate. In function this model operates as a directed graph, with the vertices being data items and edges representing …


Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan 2022 University of Arkansas, Fayetteville

Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan

Computer Science and Computer Engineering Undergraduate Honors Theses

The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.


How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar 2022 University of Arkansas, Fayetteville

How Blockchain Solutions Enable Better Decision Making Through Blockchain Analytics, Sammy Ter Haar

Information Systems Undergraduate Honors Theses

Since the founding of computers, data scientists have been able to engineer devices that increase individuals’ opportunities to communicate with each other. In the 1990s, the internet took over with many people not understanding its utility. Flash forward 30 years, and we cannot live without our connection to the internet. The internet of information is what we called early adopters with individuals posting blogs for others to read, this was known as Web 1.0. As we progress, platforms became social allowing individuals in different areas to communicate and engage with each other, this was known as Web 2.0. As Dr. …


Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover 2022 University of Arkansas, Fayetteville

Comparative Study Of Snort 3 And Suricata Intrusion Detection Systems, Cole Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Network Intrusion Detection Systems (NIDS) are one layer of defense that can be used to protect a network from cyber-attacks. They monitor a network for any malicious activity and send alerts if suspicious traffic is detected. Two of the most common open-source NIDS are Snort and Suricata. Snort was first released in 1999 and became the industry standard. The one major drawback of Snort has been its single-threaded architecture. Because of this, Suricata was released in 2009 and uses a multithreaded architecture. Snort released Snort 3 last year with major improvements from earlier versions, including implementing a new multithreaded architecture …


Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover 2022 University of Arkansas, Fayetteville

Analysis Of Gpu Memory Vulnerabilities, Jarrett Hoover

Computer Science and Computer Engineering Undergraduate Honors Theses

Graphics processing units (GPUs) have become a widely used technology for various purposes. While their intended use is accelerating graphics rendering, their parallel computing capabilities have expanded their use into other areas. They are used in computer gaming, deep learning for artificial intelligence and mining cryptocurrencies. Their rise in popularity led to research involving several security aspects, including this paper’s focus, memory vulnerabilities. Research documented many vulnerabilities, including GPUs not implementing address space layout randomization, not zeroing out memory after deallocation, and not initializing newly allocated memory. These vulnerabilities can lead to a victim’s sensitive data being leaked to an …


Privacy-Preserving Blockchain-Based Registration Scheme For Av Parking System, Alexander Haastrup 2022 The University of Southern Mississippi

Privacy-Preserving Blockchain-Based Registration Scheme For Av Parking System, Alexander Haastrup

Honors Theses

Autonomous Vehicles (AV) are a prime example of how innovation and automation are at the forefront of growing technology trends. The concern of parking systems is becoming apparent as research into ways to increase the efficiency and cost-effectiveness of AV continues. To ward against various internet attackers and secure users' sensitive information, an efficient AV parking system must have powerful user privacy and cyber security capabilities. In my work, I present a blockchain-based privacy registration system for AV parking systems that meets the following criteria. The proposed scheme incorporates k-Nearest Neighbor (kNN) - an efficient and lightweight algorithm - for …


Enter The Battleverse: China's Metaverse War, Josh Baughman 2022 University of South Florida

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


Comparing Actively Managed Mutual Fund Categories To Index Funds Using Linear Regression Forecasting And Portfolio Optimization, Luke Weiner 2022 University of Arkansas, Fayetteville

Comparing Actively Managed Mutual Fund Categories To Index Funds Using Linear Regression Forecasting And Portfolio Optimization, Luke Weiner

Industrial Engineering Undergraduate Honors Theses

The global investment industry offers a wide variety of investment products especially for individual investors. One such product, index funds, which are younger than actively managed mutual funds, have typically outperformed managed funds. Despite this phenomenon, investors have displayed a tendency to continue investing in actively managed funds. Although only a small percentage of actively managed funds outperform index funds, the costs of actively managed funds are significantly higher. Also, managed fund performances are most often determined by their fund category such as growth or real estate. I wanted to answer the following question for individual investors: can we …


Modeling Damage Spread, Assessment, And Recovery Of Critical Systems, Justin Burns 2022 University of Arkansas, Fayetteville

Modeling Damage Spread, Assessment, And Recovery Of Critical Systems, Justin Burns

Graduate Theses and Dissertations

Critical infrastructure systems have recently become more vulnerable to attacks on their data systems through internet connectivity. If an attacker is successful in breaching a system’s defenses, it is imperative that operations are restored to the system as quickly as possible. This thesis focuses on damage assessment and recovery following an attack. A literature review is first conducted on work done in both database protection and critical infrastructure protection, then the thesis defines how damage affects the relationships between data and software. Then, the thesis proposes a model using a graph construction to show the cascading affects within a system …


Eco: A Sustainability Education Chatbot, Joey Gruber 2022 University of Nebraska at Omaha

Eco: A Sustainability Education Chatbot, Joey Gruber

Theses/Capstones/Creative Projects

There is a lack of access to information about sustainability from what the climate crisis is to how to recycle properly. For both sustainability-informed and uninformed individuals, learning new information about sustainability and reducing their waste in a way that compliments their lifestyle is time-consuming, requires strategic skills, and can cost them money. ECO is an audio and text-based chatbot that teaches users to be more environmentally conscious through waste reduction.


A Quantitative Comparison Of Algorithmic And Machine Learning Network Flow Throughput Prediction, Cayden Wagner 2022 Clemson University

A Quantitative Comparison Of Algorithmic And Machine Learning Network Flow Throughput Prediction, Cayden Wagner

All Theses

Applications ranging from video meetings, live streaming, video games, autonomous vehicle operations, and algorithmic trading heavily rely on low latency communication to operate optimally. A solution to fully support this growing demand for low latency is called dual-queue active queue management (AQM). Dual-queue AQM's functionality is reduced without network traffic throughput prediction.

Perhaps due to the current popularity of machine learning, there is a trend to adopt machine learning models over traditional algorithmic throughput prediction approaches without empirical support. This study tested the effectiveness of machine learning as compared to time series forecasting algorithms in predicting per-flow network traffic throughput …


Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao 2022 University of Nebraska-Lincoln

Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao

Computer Science and Engineering: Theses, Dissertations, and Student Research

Exhaustive testing is an important type of simulation, where a user exhaustively simulates a protocol for all possible cases with respect to some uncertain factors, such as all possible packet delays or packet headers. It is useful for completely evaluating the protocol performance, finding the worst-case performance, and detecting possible design or implementation bugs of a protocol. It is, however, time consuming to use the brute force method with current NS-3, a widely used network simulator, for exhaustive testing. In this paper, we present our work on Sym-NS-3 for more efficient exhaustive testing, which leverages a powerful program analysis technique …


Digital Commons powered by bepress