Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,142 Full-Text Articles 3,520 Authors 1,022,331 Downloads 143 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,142 full-text articles. Page 5 of 87.

Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger 2022 Bowling Green State University

Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger

Honors Projects

As global internet usage expands, websites are growing in both size and complexity. Contrary to the common belief that the internet is immaterial and “environmentally friendly”, web pages have significant negative environmental impacts (Frick, 2015). Websites contribute to global greenhouse gas (GHG) emissions and electricity consumption. Considering the current climate crisis, it is crucial that web developers be aware of the impact that their work has on the environment and actively work to improve site energy efficiency. With a lack of regulation and awareness, the environmental impact of websites has remained unchecked despite growing concerns for sustainability. Further research and …


Small Town To The World Wide Web: Designing A Website For A Local Business, Madison Cozzens 2022 Bowling Green State University

Small Town To The World Wide Web: Designing A Website For A Local Business, Madison Cozzens

Honors Projects

The Raspberry and The Rose is a small business in Medina, OH, and had a multitude of visual communication issues that needed to be solved. But what's an online presence without a website? "Small Town to the World Wide Web: Designing a Website for a Local Business" focuses on fulfilling a local business's need for a strong online presence. It dives into how a user's experience on the website can impact brand loyalty, foot traffic, and overall perception of a business. The ultimate goal of this project is to provide insight into how a non-e-commerce website can impact a business.


Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman 2022 Kennesaw State University

Analysis Of The Internal Delays Of Various Wireless Technologies For Autonomous Vehicle Applications, Luanne Seaman

Symposium of Student Scholars

Analysis of the Internal Delays of Various Wireless Technologies for Autonomous Vehicle Applications

Poster Presentation Undergraduate Student: Luanne Seaman

Research Mentor: Dr. Billy Kihei

Autonomous vehicles use VANETs (vehicular ad-hoc networks) to communicate with the world around them. Despite the simple premise, VANETs rely on a variety of wireless technologies depending on range, internal delay, urgency of information, and other factors. Therefore, VANET algorithms will need to weigh these elements accordingly. Through this research, I hope to contribute reliable measurements of internal delay to reduce the algorithms’ complexity. To calculate internal delay, I connected two Arduinos to a STM32 Nucleo …


Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection, Rachel Meyer 2022 Olivet Nazarene University

Preprocessing Of Astronomical Images From The Neowise Survey For Near-Earth Asteroid Detection, Rachel Meyer

Scholar Week 2016 - present

Asteroid detection is a common field in astronomy for planetary defense which requires observations from survey telescopes to detect and classify different objects. The amount of data collected each night is increasing as better designed telescopes are created each year. This amount is quickly becoming unmanageable and many researchers are looking for ways to better process this data. The dominant solution is to implement computer algorithms to automatically detect these sources and to use Machine Learning in order to create a more efficient and accurate classifier. In the past there has been a focus on larger asteroids that create streaks …


Empirical Analysis Of Dynamic Load Balancing Techniques In Cloud Computing, Arpita Mahapatra, Priyanka Maharana 2022 IMIT, Cuttack

Empirical Analysis Of Dynamic Load Balancing Techniques In Cloud Computing, Arpita Mahapatra, Priyanka Maharana

International Journal of Smart Sensor and Adhoc Network

Virtualization, dispersed registration, systems administration, programming, and web administrations are all examples of "distributed computing." Customers, datacenters, and scattered servers are just a few of the components that make up a cloud. It includes things like internal failure adaption, high accessibility, flexibility, adaptability, lower client overhead, lower ownership costs, on-demand advantages, and so on. The basis of a feasible load adjusting computation is key to resolving these challenges. CPU load, memory limit, deferral, and system load are all examples of heaps. Burden adjustment is a method for distributing the load across the many hubs of a conveyance framework in order …


Artificial Intelligence For Satellite Communication: A Review, Fares Fourati, Mohamed-Slim Alouini 2022 Computer, Electrical and Mathematical Sciences and Engineering Division, King Abdullah University of Science and Technology (KAUST), Thuwal 23955-6900, Kingdom of Saudi Arabia

Artificial Intelligence For Satellite Communication: A Review, Fares Fourati, Mohamed-Slim Alouini

Intelligent and Converged Networks

Satellite communication offers the prospect of service continuity over uncovered and under-covered areas, service ubiquity, and service scalability. However, several challenges must first be addressed to realize these benefits, as the resource management, network control, network security, spectrum management, and energy usage of satellite networks are more challenging than that of terrestrial networks. Meanwhile, artificial intelligence (AI), including machine learning, deep learning, and reinforcement learning, has been steadily growing as a research field and has shown successful results in diverse applications, including wireless communication. In particular, the application of AI to a wide variety of satellite communication aspects has demonstrated …


An Intelligent Wireless Transmission Toward 6g, Ping Zhang, Lihua Li, Kai Niu, Yaxian Li, Guangyan Lu, Zhaoyuan Wang 2022 State Key Laboratory of Networking and Switching Technology, and the School of Information and Communication Engineering, Beijing University of Posts and Telecommunications, Beijing 100876, China

An Intelligent Wireless Transmission Toward 6g, Ping Zhang, Lihua Li, Kai Niu, Yaxian Li, Guangyan Lu, Zhaoyuan Wang

Intelligent and Converged Networks

With the deployment and commercial application of 5G, researchers start to think of 6G, which could meet more diversified and deeper intelligent communication requirements. In this paper, a four physical elements, i.e., man, machine, object, and genie, featured 6G concept is introduced. Genie is explained as a new element toward 6G. This paper focuses on the genie realization as an intelligent wireless transmission toward 6G, including sematic information theory, end-to-end artificial intelligence (AI) joint transceiver design, intelligent wireless transmission block design, and user-centric intelligent access. A comprehensive state-of-the-art of each key technology is presented and main questions as well as …


Harmonious Wireless Networks: Perspective Of Interference Management, Wei Liu 2022 State Key Laboratory of Integrated Services Networks, Xidian University, Xi’an 710071, China

Harmonious Wireless Networks: Perspective Of Interference Management, Wei Liu

Intelligent and Converged Networks

This paper elaborates on the harmonious wireless network from the perspective of interference management. The coexistence of useful signals and interfering signals is beneficial in throughput terms of the entire wireless network. Useful signals and interfering signals are complementary and are in juxtaposition to each other in the context of a single communication link, and are in symbiosis within the framework of the networks. The philosophy behind this could be described by the Chinese traditional culture symbol of “yin” and “yang”. A wireless network having optimal performance must be a harmonious network where the interfering and useful signals harmoniously coexist …


Intelligent Throughput Stabilizer For Udp-Based Rate-Control Communication System, Michiko Harayama, Noboru Miyagawa 2022 Department of Electric Electronics and Informatics, Faculty of Engineering, Gifu University, Gifu 501-1193, Japan

Intelligent Throughput Stabilizer For Udp-Based Rate-Control Communication System, Michiko Harayama, Noboru Miyagawa

Intelligent and Converged Networks

In view of the successful application of deep learning, mainly in the field of image recognition, deep learning applications are now being explored in the fields of communication and computer networks. In these fields, systems have been developed by use of proper theoretical calculations and procedures. However, due to the large amount of data to be processed, proper processing takes time and deviations from the theory sometimes occur due to the inclusion of uncertain disturbances. Therefore, deep learning or nonlinear approximation by neural networks may be useful in some cases. We have studied a user datagram protocol (UDP) based rate-control …


Model-Based Reinforcement Learning For Router Port Queue Configurations, Ajay Kattepur, Sushanth David, Swarup Kumar Mohalik 2022 Artificial Intelligence System Group, Ericsson Research, Bangalore 560093, India

Model-Based Reinforcement Learning For Router Port Queue Configurations, Ajay Kattepur, Sushanth David, Swarup Kumar Mohalik

Intelligent and Converged Networks

Fifth-generation (5G) systems have brought about new challenges toward ensuring Quality of Service (QoS) in differentiated services. This includes low latency applications, scalable machine-to-machine communication, and enhanced mobile broadband connectivity. In order to satisfy these requirements, the concept of network slicing has been introduced to generate slices of the network with specific characteristics. In order to meet the requirements of network slices, routers and switches must be effectively configured to provide priority queue provisioning, resource contention management and adaptation. Configuring routers from vendors, such as Ericsson, Cisco, and Juniper, have traditionally been an expert-driven process with static rules for individual …


Routing Strategy Of Reducing Energy Consumption For Underwater Data Collection, Jiehong Wu, Xichun Sun, Jinsong Wu, Guangjie Han 2022 School of Computer Science, Shenyang Aerospace University, Shenyang 110000, China

Routing Strategy Of Reducing Energy Consumption For Underwater Data Collection, Jiehong Wu, Xichun Sun, Jinsong Wu, Guangjie Han

Intelligent and Converged Networks

Underwater Wireless Sensor Networks (UWSNs) are widely used in many fields, such as regular marine monitoring and disaster warning. However, UWSNs are still subject to various limitations and challenges: ocean interferences and noises are high, bandwidths are narrow, and propagation delays are high. Sensor batteries have limited energy and are difficult to be replaced or recharged. Accordingly, the design of routing protocols is one of the solutions to these problems. Aiming at reducing and balancing network energy consumption and effectively extending the life cycle of UWSNs, this paper proposes a Hierarchical Adaptive Energy-efficient Clustering Routing (HAECR) strategy. First, this strategy …


Smart Water Management System, Julius Godslove Femi 2022 Compunet Limited Nigeria

Smart Water Management System, Julius Godslove Femi

International Journal of Smart Sensor and Adhoc Network

Water is one of the fundamental resources that aid life and there are speculations that estimate at 2025 almost half of the urban population will live under short supply and water stress. With the usage of new technological advancements in IoT (Internet of Things) powered smart devices for water management, it can become a worthy implementation towards avoiding the predicted water depletion. In the past years up until recently, water monitoring and management were manually carried out with intensive power requirements and high capital expense with low efficiency recorded. Overflow of water overhead tanks in residential, commercial, cooperate and educational …


A Quantitative Study Of Risk Scores And The Effectiveness Of Ai-Based Cybersecurity Awareness Training Programs, Meraj Farheen Ansari 2022 University of the Cumberlands

A Quantitative Study Of Risk Scores And The Effectiveness Of Ai-Based Cybersecurity Awareness Training Programs, Meraj Farheen Ansari

International Journal of Smart Sensor and Adhoc Network

Cybersecurity awareness training plays a dynamic role for organizations in certifying resources' accessibility. This paper determines the correlation between an employee's risk score and the effectiveness of AI-based security awareness training that deals with cyber threats. The research uses the Unified Theory of Acceptance and Use of Technology to update prior research, revealing that at-risk employees' behavior and information security awareness training implementation make up successful interventions. However, those studies did not discuss AI training, and so this research fills that literature gap. This study used a quantitative research design. The researcher analyzed survey responses using Pearson's Correlation and an …


Designing A Pipeline For Predicting Power Grid Stability With Artificial Neural Network (Ann), Sushree Gayatri Priyadarsini Prusty, Sashikanta Prusty 2022 Sudhananda Group of institutions

Designing A Pipeline For Predicting Power Grid Stability With Artificial Neural Network (Ann), Sushree Gayatri Priyadarsini Prusty, Sashikanta Prusty

International Journal of Smart Sensor and Adhoc Network

Renewable energy sources are becoming more popular, providing a much-needed alternative to traditional, limited, and climate-unfriendly energy sources. Wireless sensors, cloud computing, cyber security, and wide-area monitoring are basic communication and control technologies for smart grid applications. Design of communication and control architectures for the adoption of smart energy grids for rural loads and distributed energy, including energy storage solutions. In this work, a Machine Learning module called scikit-learn is used for pre-processing of labeled input data by using StandardScaler, KFold for cross-validation, and Confusion matrix for measuring performance. Also, the ML technique uses the binary classification method to divide …


Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M 2022 UIN Sunan Ampel of Surabaya, Inonesia

Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M

Library Philosophy and Practice (e-journal)

This study explains the development of the world of libraries to establish a very close relationship with the world of information technology. For this reason, facilities and infrastructure are needed to facilitate data and information retrieval quickly and accurately. Facing the challenges of the Industrial Revolution 5.0 era by utilizing information technology, libraries must also adapt to the times. Because the library has an important role, among others, as a source of information and the development of knowledge. Used libraries are still conventional to be converted into digital libraries. In essence, this development represents the desire of library users for …


Mytrials: Clinical Trial Application Concept, Katie Hollister 2022 California Polytechnic State University, San Luis Obispo

Mytrials: Clinical Trial Application Concept, Katie Hollister

Graphic Communication

A clinical trial’s success is dependent upon whether a patient attends their highly-structured clinical trial visit schedule, which may include both in-person clinic visits and virtual check-in visits. MyTrials is a clinical trial journey app prototype that enables patients to schedule, reschedule, and attend join their in-person or virtual clinic visits. This product seeks to reduce the burden that scheduling places on the patient, and provides trial-provided resources and a daily and weekly timeline to help patients navigate their clinical trial journey.


Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris 2022 Air Force Institute of Technology

Exploiting The Iot Through Network-Based Covert Channels, Kyle S. Harris

Theses and Dissertations

Information leaks are a top concern to industry and government leaders. The IoT is a technology capable of sensing real-world events. A method for exfiltrating data from these devices is by covert channel. This research designs a novel IoT CTC without the need for inter-packet delays to encode data. Instead, it encodes data within preexisting network information, namely ports or addresses. Additionally, the CTC can be implemented in two different modes: Stealth and Bandwidth. Performance is measured using throughput and detectability. The Stealth methods mimic legitimate traffic captures while the Bandwidth methods forgo this approach for maximum throughput. Detection results …


Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen 2022 University of Pennsylvania Carey Law School

Dismantling The “Black Opticon”: Privacy, Race Equity, And Online Data-Protection Reform, Anita L. Allen

Faculty Scholarship at Penn Carey Law

African Americans online face three distinguishable but related categories of vulnerability to bias and discrimination that I dub the “Black Opticon”: discriminatory oversurveillance, discriminatory exclusion, and discriminatory predation. Escaping the Black Opticon is unlikely without acknowledgement of privacy’s unequal distribution and privacy law’s outmoded and unduly race-neutral façade. African Americans could benefit from race-conscious efforts to shape a more equitable digital public sphere through improved laws and legal institutions. This Essay critically elaborates the Black Opticon triad and considers whether the Virginia Consumer Data Protection Act (2021), the federal Data Protection Act (2021), and new resources for the Federal Trade …


Ensemble Models For Intrusion Detection System Classification, Geethamanikanta Jakka, Izzat M. Alsmadi 2022 University of Cumberlands, Williamsburg

Ensemble Models For Intrusion Detection System Classification, Geethamanikanta Jakka, Izzat M. Alsmadi

International Journal of Smart Sensor and Adhoc Network

Using data analytics in the problem of Intrusion Detection and Prevention Systems (IDS/IPS) is a continuous research problem due to the evolutionary nature of the problem and the changes in major influencing factors. The main challenges in this area are designing rules that can predict malware in unknown territories and dealing with the complexity of the problem and the conflicting requirements regarding high accuracy of detection and high efficiency. In this scope, we evaluated the usage of state-of-the-art ensemble learning models in improving the performance and efficiency of IDS/IPS. We compared our approaches with other existing approaches using popular open-source …


An Efficient Threshold Secret Sharing Scheme Using Fast Fourier Transform, Vanashree Gupta 2022 Department of Scientific Computing, Modeling and Simulation Savitribai Phule Pune University, Pune , Maharashtra India

An Efficient Threshold Secret Sharing Scheme Using Fast Fourier Transform, Vanashree Gupta

International Journal of Smart Sensor and Adhoc Network

Secret Sharing is a robust key management method which is having applications in password management, secure multi party computation, e-voting etc. Threshold secret sharing is a method in which out of all the parties only predefined or certain number of parties can reconstruct the secret. In this paper we will describe the most popular Shamir’s secret sharing scheme along with its limitations. In Shamir’s scheme each shareholder receives one share per secret. We can use alternative way ramp (packed variant) scheme which overcomes this limitation and reduces load on each individual shareholder. But this impacts on efficiency as degree of …


Digital Commons powered by bepress