Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,123 Full-Text Articles 3,386 Authors 1,124,087 Downloads 153 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,123 full-text articles. Page 45 of 85.

Blend It Wine Blending Distribution System, Connor Clarry, Russell Temple, Matt Moren 2017 California Polytechnic State University, San Luis Obispo

Blend It Wine Blending Distribution System, Connor Clarry, Russell Temple, Matt Moren

Mechanical Engineering

No abstract provided.


Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell 2017 California Polytechnic State University, San Luis Obispo

Djukebox: A Mobile Application Senior Project, Alexander M. Mitchell

Computer Science and Software Engineering

I’m going to discuss the process used to research, design, and develop a mobile application to handle song requests from patrons to disc jockeys. The research phase was completed in the first half of the project, during CSC-491, along with much of the design. The rest of the design and all of the development was completed during CSC-492. Once development began there were times when reverting back to the design phase was needed, which became apparent as more was learned about the mobile platform chosen for development, Android, and the backend server utilized, Google Firebase. Ultimately the project was purely …


Smartgarden, Samuel S. Lees, Matthew T. Lindly 2017 California Polytechnic State University, San Luis Obispo

Smartgarden, Samuel S. Lees, Matthew T. Lindly

Computer Engineering

The problem that the SmartGarden project seeks to solve is the challenge of watering succulents correctly and maintaining consistent plant health. Too much water can cause root rot and drowning while too little water can cause dehydration and starvation.
The SmartGarden solves this common problem by configuring a Raspberry Pi to measure soil moisture, store the data to an AWS server in the cloud, and water the succulent when necessary, informing the user by providing both a web-interface and a variety of notifications.


Micro-Spi Sediment Profile Imaging Micro-Inspector, Andrew P. Corvin, Caleb T. Davies, Matt R. Ferrari 2017 California Polytechnic State University, San Luis Obispo

Micro-Spi Sediment Profile Imaging Micro-Inspector, Andrew P. Corvin, Caleb T. Davies, Matt R. Ferrari

Mechanical Engineering

This project was proposed by Dr. Brian Paavo through a desire to more easily study the benthic sediment layers of the ocean. To do so, he asked us to build a simple and compact machine for use in sediment profile imagery (SPI). Although devices like this already exist, they are all large scale devices that require a ship with a crane to deploy, which is expensive and time consuming. Instead, he desired a “micro” SPI, which is capable of being deployed from a small vessel that can easily navigate shallow waters. Our interpretation of these requirements was as follows: a …


An Analysis Of Heroku And Aws For Growing Startups, Colton B. Stapper 2017 California Polytechnic State University, San Luis Obispo

An Analysis Of Heroku And Aws For Growing Startups, Colton B. Stapper

Computer Science and Software Engineering

This project presents information on the architecture of most modern cloud-hosting platforms, and gives a cost-benefit analysis of two common Platform-as-a-Service (PaaS) companies: Heroku and AWS.


Recommending Personalized Schedules In Urban Environments, Cen CHEN 2017 Singapore Management University

Recommending Personalized Schedules In Urban Environments, Cen Chen

Dissertations and Theses Collection

In this thesis, we are broadly interested in solving real world problems that involve decision support for coordinating agent movements in dynamic urban environments, where people are agents exhibiting different human behavior patterns and preferences. The rapid development of mobile technologies makes it easier to capture agent behavioral and preference information. Such rich agent specific information, coupled with the explosive growth of computational power, opens many opportunities that we could potentially leverage, to better guide/influence the agents in urban environments. The purpose of this thesis is to investigate how we can effectively and efficiently guide and coordinate the agents with …


Scalable And Fully Distributed Localization In Large-Scale Sensor Networks, Miao Jin, Su Xia, Hongyi Wu, Xianfeng David Gu 2017 Old Dominion University

Scalable And Fully Distributed Localization In Large-Scale Sensor Networks, Miao Jin, Su Xia, Hongyi Wu, Xianfeng David Gu

Electrical & Computer Engineering Faculty Publications

This work proposes a novel connectivity-based localization algorithm, well suitable for large-scale sensor networks with complex shapes and a non-uniform nodal distribution. In contrast to current state-of-the-art connectivity-based localization methods, the proposed algorithm is highly scalable with linear computation and communication costs with respect to the size of the network; and fully distributed where each node only needs the information of its neighbors without cumbersome partitioning and merging process. The algorithm is theoretically guaranteed and numerically stable. Moreover, the algorithm can be readily extended to the localization of networks with a one-hop transmission range distance measurement, and the propagation of …


Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips 2017 California Polytechnic State University, San Luis Obispo

Wireless Window Blinds, Cooper Laone, Niraj Morar, Zachary Malig, Jake Phillips

Electrical Engineering

The Internet of Things asserts that there exists a global need for all objects to connect easily and accessibly. Today, smartphones, tablets, laptops and smart watches makeup just a few of the interconnected devices by the greater population. As a result a growing need for wireless connection between personal devices like phones, and computers to everyday appliances exists. This idea extends directly to households, businesses and buildings, where a growing need for smart home or smart-business appliances has taken root. Many companies like Nest, ADT and Apple make products for automated home security and in home media control. The Wireless …


Table Of Contents Jitim Vol 26 Issue 2, 2017, 2017 California State University, San Bernardino

Table Of Contents Jitim Vol 26 Issue 2, 2017

Journal of International Technology and Information Management

Table of Contents JITIM vol 26 issue 2, 2017


Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew 2017 UOWD

Comparative Analysis Of Big Data Analytics Software In Assessing Sample Data, Soly Mathew Biju, Alex Mathew

Journal of International Technology and Information Management

Over the last few years, big data has emerged as an important topic of discussion in most firms owing to its ability of creation, storage and processing of content at a reasonable price. Big data consists of advanced tools and techniques to process large volumes of data in organisations. Investment in big data analytics has almost become a necessity in large-sized firms, particularly multinational companies, for its unique benefits, particularly in prediction and identification of various trends. Some of the most popular big data analytics software used today are MapReduce, Hive, Tableau and Hive, while the framework Hadoop enables easy …


Preemptive Efficient Queueing For Scheduling Deadline-Bound Data Center Flows, VinayKrishna GopalaKrishna 2017 New Jersey Institute of Technology

Preemptive Efficient Queueing For Scheduling Deadline-Bound Data Center Flows, Vinaykrishna Gopalakrishna

Theses

This thesis introduces a new deadline aware flow scheduling scheme called Preemptive Efficient Queuing (PEQ). Unlike other schemes which use policies like EDF, SJF or fair share, this scheme aims to procrastinate flows as much as they can afford to, while keeping with their deadlines. Thereby, PEQ prioritizes more urgent flows that have shorter time to procrastinate, or cushion time. Results of PEQ are compared with state-of-the-art schemes for the transport of data-center flows, such as Preemptive Distributed Quick (PDQ) and Deadline-Driven Delivery (D3). The results show that PEQ outperforms D3 and PDQ. We identify results …


Vertical Search Engines, Kevin Curran, Jude Mc Glinchey 2017 Technological University Dublin

Vertical Search Engines, Kevin Curran, Jude Mc Glinchey

The ITB Journal

This paper outlines the growth in popularity of vertical search engines, their origins, the differences between them and well-known broad based search engines such as Google and Yahoo. We also discuss their use in business-to-business, their marketing and advertising costs, what the revenue streams are and who uses them.


Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane 2017 Technological University Dublin

Be Aware With A Honeypot, Stephen Meyer, Ivan Smyth, Mark Cummins, Anthony Keane

The ITB Journal

The Internet has already become a hostile environment for computers, especially when they are directly connected with a public IP address. We have experienced this hostile activity where on an average day; the ITB Honeypot recorded over a thousand reconnaissance attacks seeking unauthorised entry onto our private network. Our Honeypot is a basic PC running Windows XP with no services offered and no activity from users that would generate traffic. The Honeypot is running in a passive state on a stub-network where all inbound and outbound traffic is recorded at the bridging computer to the WAN. We report on the …


Stereoscopic 3-D Presentation For Air Traffic Control Digital Radar Displays, Jason G. Russi, Brent T. Langhals, Michael E. Miller, Eric L. Heft 2017 Air Force Institute of Technology

Stereoscopic 3-D Presentation For Air Traffic Control Digital Radar Displays, Jason G. Russi, Brent T. Langhals, Michael E. Miller, Eric L. Heft

AFIT Patents

An apparatus and method of presenting air traffic data to an air traffic controller are provided. Air traffic data including a two dimensional spatial location and altitude for a plurality of aircraft is received. A disparity value is determined based on the altitude for each aircraft of the plurality of aircraft. Left and right eye images are generated of the plurality of aircraft where at least one of the left and right eye images is based on the determined disparity value. The left and right eye images are simultaneously displayed to the air traffic controller on a display. The simultaneously …


Source Anonymization Of Digital Images: A Counter–Forensic Attack On Prnu Based Source Identification Techniques, Prithviraj Sengupta, Venkata Udaya Sameer, Ruchira Naskar, Ezhil Kalaimannan 2017 National Institute of Technology, Rourkela

Source Anonymization Of Digital Images: A Counter–Forensic Attack On Prnu Based Source Identification Techniques, Prithviraj Sengupta, Venkata Udaya Sameer, Ruchira Naskar, Ezhil Kalaimannan

Annual ADFSL Conference on Digital Forensics, Security and Law

A lot of photographers and human rights advocates need to hide their identity while sharing their images on the internet. Hence, source–anonymization of digital images has become a critical issue in the present digital age. The current literature contains a number of digital forensic techniques for “source–identification” of digital images, one of the most efficient of them being Photo–Response Non–Uniformity (PRNU) sensor noise pattern based source detection. PRNU noise pattern being unique to every digital camera, such techniques prove to be highly robust way of source–identification. In this paper, we propose a counter–forensic technique to mislead this PRNU sensor noise …


Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou 2017 Stockholm University

Harnessing Predictive Models For Assisting Network Forensic Investigations Of Dns Tunnels, Irvin Homem, Panagiotis Papapetrou

Annual ADFSL Conference on Digital Forensics, Security and Law

In recent times, DNS tunneling techniques have been used for malicious purposes, however network security mechanisms struggle to detect them. Network forensic analysis has been proven effective, but is slow and effort intensive as Network Forensics Analysis Tools struggle to deal with undocumented or new network tunneling techniques. In this paper, we present a machine learning approach, based on feature subsets of network traffic evidence, to aid forensic analysis through automating the inference of protocols carried within DNS tunneling techniques. We explore four network protocols, namely, HTTP, HTTPS, FTP, and POP3. Three features are extracted from the DNS tunneled traffic: …


An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora 2017 University of Alabama, Birmingham

An Accidental Discovery Of Iot Botnets And A Method For Investigating Them With A Custom Lua Dissector, Max Gannon, Gary Warner, Arsh Arora

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a case study that occurred while observing peer-to-peer network communications on a botnet monitoring station and shares how tools were developed to discover what ultimately was identified as Mirai and many related IoT DDOS Botnets. The paper explains how researchers developed a customized protocol dissector in Wireshark using the Lua coding language, and how this enabled them to quickly identify new DDOS variants over a five month period of study.


Inferring Motion Direction Using Commodity Wi-Fi For Interactive Exergames, Kun QIAN, Chenshu WU, Zimu ZHOU, Yue ZHENG, Yang ZHENG, Yunhao LIU 2017 Singapore Management University

Inferring Motion Direction Using Commodity Wi-Fi For Interactive Exergames, Kun Qian, Chenshu Wu, Zimu Zhou, Yue Zheng, Yang Zheng, Yunhao Liu

Research Collection School Of Computing and Information Systems

In-air interaction acts as a key enabler for ambient intelligence and augmented reality. As an increasing popular example, exergames, and the alike gesture recognition applications, have attracted extensive research in designing accurate, pervasive and low-cost user interfaces. Recent advances in wireless sensing show promise for a ubiquitous gesture-based interaction interface with Wi-Fi. In this work, we extract complete information of motion-induced Doppler shifts with only commodity Wi-Fi. The key insight is to harness antenna diversity to carefully eliminate random phase shifts while retaining relevant Doppler shifts. We further correlate Doppler shifts with motion directions, and propose a light-weight pipeline to …


Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu 2017 Wuhan University, China

Lightweight Data Aggregation Scheme Against Internal Attackers In Smart Grid Using Elliptic Curve Cryptography, Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu

Information Science Faculty Publications

Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the …


Tum: Towards Ubiquitous Multi-Device Localization For Cross-Device Interaction, Han XU, Zheng YANG, Zimu ZHOU, Ke YI, Chunyi PENG 2017 Singapore Management University

Tum: Towards Ubiquitous Multi-Device Localization For Cross-Device Interaction, Han Xu, Zheng Yang, Zimu Zhou, Ke Yi, Chunyi Peng

Research Collection School Of Computing and Information Systems

Cross-device interaction is becoming an increasingly hot topic as we often have multiple devices at our immediate disposal in this era of mobile computing. Various cross-device applications such as file sharing, multi-screen display, and crossdevice authentication have been proposed and investigated. However, one of the most fundamental enablers remains unsolved: How to achieve ubiquitous multi-device localization? Though pioneer efforts have resorted to gesture-assisted or sensing-assisted localization, they either require extensive user participation or impose some strong assumptions on device sensing abilities. This introduces extra costs and constraints, and thus degrades their practicality. To overcome these limitations, we propose TUM, an …


Digital Commons powered by bepress