Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,149 Full-Text Articles 3,536 Authors 1,022,331 Downloads 143 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,149 full-text articles. Page 6 of 87.

Iot Ecosystems Enable Smart Communication Solutions: A Case Study, Debasish Swapnesh Kumar Nayak, Shreerudra Pratik, Jogeswar Tripathy 2022 Department of Computer Science & Engineering, Institute of Technical Education and Research, Siksha ‘O’ Anusandhan (Deemed to be) University, Bhubaneswar, India-751030

Iot Ecosystems Enable Smart Communication Solutions: A Case Study, Debasish Swapnesh Kumar Nayak, Shreerudra Pratik, Jogeswar Tripathy

International Journal of Smart Sensor and Adhoc Network

The Internet of Things (IoT) is a platform for innovation, allowing people to invest in and use IoT to improve life, business, and society. It will be applicable to all or any industry sectors, verticals, people, machines, and everything. This creates difficult requirements in terms of higher system capacity, extremely low latency, such as for the tactile Internet, extremely high throughput values, a wide range of services, such as IoT and M2M, and a more uninterrupted experience. As a symbiotic confluence of up to date and existing technologies, the IOT architecture will use Hetnet RAN, Cloud enhanced RAN, and SW …


Tourism Decision Making System & Auto Guidance Technique Using Data Analytics, Asik Rahaman Jamader Mr., Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr. 2022 Dept. of Tourism & Hotel Management , Penguin School of Hotel Management, Kolkata, India

Tourism Decision Making System & Auto Guidance Technique Using Data Analytics, Asik Rahaman Jamader Mr., Puja Das Ms., Biswaranjan Acharya Mr., Sandhya Makkar Dr.

International Journal of Computer Science and Informatics

A unique Tourism Decision Making System TDMS) describes and evaluates the evaluation of research and developments in information technology meant for pronouncement sustain as well as examination during the sector of visiting the attractions. Individuals in the tourism sector are classified according to their decision-making technologies. The current trends and growth directions of choice help technologies were analysed for visitors from various advertising categories. The potential to provide customising, augmentation, and help for visitors at all phases of their trips by integrating modern automated approaches with GIS capabilities demonstrates the need for breakthroughs in digital advanced analytics.


A Hybrid Scheme Based On Alternative Scalar Leader Election (Hs-Asle) For Redundant Data Minimization In Multi-Event Occurrence Scenario For Wmsns, Sushree Bibhuprada B. Priyadarshini Dr. 2022 Siksha 'O' Anusandhan Deemed to be University

A Hybrid Scheme Based On Alternative Scalar Leader Election (Hs-Asle) For Redundant Data Minimization In Multi-Event Occurrence Scenario For Wmsns, Sushree Bibhuprada B. Priyadarshini Dr.

International Journal of Smart Sensor and Adhoc Network

The current paper reports a hybrid approach namely “Hybrid Scheme based on Alternative Scalar Leader Election (HS-ASLE) for camera sensor actuation in multi-event occurrence scenario. In the proposed approach, the whole monitored zone gets segregated into multiple virtual sub-compartments and in each of the sub-compartments, one and three scalar leaders are elected alternatively that behave as the representatives of scalars to report event information. During the event occurrence, the event information gets trapped through the scalar leaders in lieu of scalars and the leaders convey the event occurrence information to the respective camera sensors. Pervasive experiment and …


Books Within Books In Fantasy And Science Fiction: “You Are The Dreamer And The Dream”, Phillip Fitzsimmons 2022 Southwestern Oklahoma State University

Books Within Books In Fantasy And Science Fiction: “You Are The Dreamer And The Dream”, Phillip Fitzsimmons

Faculty Books & Book Chapters

This chapter discusses books that exist only within works of science fiction and fantasy—what the “List of Fictional Books” on Wikipedia calls a “fictional book” and what Claire Fallon calls “invented books” in her article for the Huffpost website, “Fictional Books Within Books We Wish Were Real.”


The David Oberhelman Collection Of Science Fiction, Fantasy, And Tolkieniana At Oklahoma State University, Phillip Fitzsimmons 2022 Southwestern Oklahoma State University

The David Oberhelman Collection Of Science Fiction, Fantasy, And Tolkieniana At Oklahoma State University, Phillip Fitzsimmons

Faculty Books & Book Chapters

In September 2020 I drove to the Oklahoma State University (OSU) Stillwater campus to see “The David Oberhelman J. R. R. Tolkien Collection” exhibit, on display on the Edmon Low Library’s second-floor mezzanine in the Lisa and Mark Snell Gallery.


Experience A Faster And More Private Internet In Library And Information Centres With 1.1.1.1 Dns Resolver, Subhajit Panda 2022 Chandigarh University, Mohali, Punjab

Experience A Faster And More Private Internet In Library And Information Centres With 1.1.1.1 Dns Resolver, Subhajit Panda

International Journal of Smart Sensor and Adhoc Network

As a densely populated country with a large user base, the library and information centres (LICs) in India always suffer from a lack of internet speed. Indian LICs frequently employ open DNS resolvers to achieve high internet speeds. In the new normal, the cyberattacks on Indian educational institutions have skyrocketed, necessitating the development of a more secure and quicker DNS resolver. To meet this demand, the paper assesses Cloudflare's 1.1.1.1 DNS resolver and demonstrates its suitability for Indian LICs. To examine the demand of Cloudflare’s 1.1.1.1 DNS resolver in providing the most secure and fastest private network, the researchers use …


Iot-Fog-Edge-Cloud Computing Simulation Tools, A Systematic Review, ABHILASH PATI, Manoranjan Parhi, Binod Kumar Pattanayak 2022 Siksha 'O' Anusandhan (Deemed to be University)

Iot-Fog-Edge-Cloud Computing Simulation Tools, A Systematic Review, Abhilash Pati, Manoranjan Parhi, Binod Kumar Pattanayak

International Journal of Smart Sensor and Adhoc Network

The Internet of Things (IoT) perspective promises substantial advancements in sectors such as smart homes and infrastructure, smart health, smart environmental conditions, smart cities, energy, transportation and mobility, manufacturing and retail, farming, and so on. Cloud computing (CC) offers appealing computational and storage options; nevertheless, cloud-based explanations are frequently conveyed by downsides and constraints, such as energy consumption, latency, privacy, and bandwidth. To address the shortcomings related to CC, the advancements like Fog Computing (FC) and Edge Computing (EC) are introduced later on. FC is a novel and developing technology that connects the cloud to the network edges, allowing for …


A Voice Controlled Home Automation System, Priyanka Maharana, Arpita Mahapatra 2022 Research Scholar, IMIT

A Voice Controlled Home Automation System, Priyanka Maharana, Arpita Mahapatra

International Journal of Smart Sensor and Adhoc Network

Home automation is the process of making the home appliances operate on the voice command or the movement. For the current research work the voice-controlled home automation is considered. In the current research work the main objective is to develop a voice-controlled home automation system. The appliances like light, fan and door have been considered for making them operate on voice command. For developing the project the ESP 8266 wifi module is considered along with servo motor, toy motor, light and fan. All of the appliances are configured by using the Blynk application and IFTTT server. Finally, Arduino IDE is …


Survey On Security Issues And Protective Measures In Different Layers Of Internet Of Things (Iot), Rasmita Jena, Anil Kumar Biswal, Debabrata Singh, Arundhati Lenka 2022 Udayanath (Auto.) College of Science and Technology, Adaspur Cuttack, Odisha

Survey On Security Issues And Protective Measures In Different Layers Of Internet Of Things (Iot), Rasmita Jena, Anil Kumar Biswal, Debabrata Singh, Arundhati Lenka

International Journal of Smart Sensor and Adhoc Network

In general perspective, Internet of things is defined as a network of physical objects by connecting” things to things” through the sensors, actuators and processors, to communicate and exchange data and information among each other along with other related devices and systems spread over different locations, without human-to-human or human-to-computer interactions. This survey summarises all the security threats along with privacy issues that may be confronted by the end users in Internet of Things (IoT). The majority of survey is to gather information about the current security requirements for IoT, the further scope and the challenges in IoT and the …


Changing Care Paradigms: A Pilot Study On User-Interface And Design Implications On The Efficacy Of Medical Record Systems In Low-Resource Settings, Raveen S. Kariyawasam 2022 University of Pennsylvania

Changing Care Paradigms: A Pilot Study On User-Interface And Design Implications On The Efficacy Of Medical Record Systems In Low-Resource Settings, Raveen S. Kariyawasam

Wharton Research Scholars

Electronic Medical Record Systems (EMRS) has quickly become the backbone of the healthcare delivery ecosystem in developed countries. Their reaches range from insurance to billing to physician charting. Despite the mainstream use of EMRS in developed countries, their implementation in low-resource settings has faced more barriers and challenges. During the development of EMRS, the concerns, hurdles, and considerations of developed nations are what were used as inspiration when designing these systems. This thesis explores the use of effective User Interface and User Experience (UI/UX) design to help lower the accessibility barriers associated with EMRS implementation and usage in low-resource settings. …


Dielectrophoretic Trapping Of Carbon Nanotubes For Temperature Sensing, Kaylee Burdette 2022 Marshall University

Dielectrophoretic Trapping Of Carbon Nanotubes For Temperature Sensing, Kaylee Burdette

Theses, Dissertations and Capstones

Conventional sensors are rapidly approaching efficiency limitations at their current size. In designing more efficient sensors, low dimensional materials such as carbon nanotubes (CNTs), quantum dots, and DNA origami can be used to enable higher degrees of sensitivity. Because of the high atomic surface to core ratio, these materials can be used to detect slight changes in chemical composition, strain, and temperature. CNTs offer unique advantages in different types of sensors due to their electromechanical properties. In temperature sensing, the high responsiveness to temperature and durability can be used to produce an accurate, reliable sensor in even extreme temperatures. This …


Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells 2022 University of New Hampshire, Durham

Removing Physical Presence Requirements For A Remote And Automated World - Api Controlled Patch Panel For Conformance Testing, Hunter George Wells

Honors Theses and Capstones

Quality assurance test engineers at the UNH-InterOperability Lab must run tests that require driving and monitoring a selection of DC signals. While the number of signals is numerous, there are limited ports on the test equipment, and only a few signals need patching for any given test. The selection of signals may vary between the 209 different tests and must be re-routed frequently. Currently, testers must leave their desk to manually modify the test setup in another room. This posed a considerable issue at the onset of the COVID-19 Pandemic when physical access was not possible. In order to enable …


Developing Reactive Distributed Aerial Robotics Platforms For Real-Time Contaminant Mapping, Joshua Ashley 2022 University of Kentucky

Developing Reactive Distributed Aerial Robotics Platforms For Real-Time Contaminant Mapping, Joshua Ashley

Theses and Dissertations--Electrical and Computer Engineering

The focus of this research is to design a sensor data aggregation system and centralized sensor-driven trajectory planning algorithm for fixed-wing aircraft to optimally assist atmospheric simulators in mapping the local environment in real-time. The proposed application of this work is to be used in the event of a hazardous contaminant leak into the atmosphere as a fleet of sensing unmanned aerial vehicles (UAVs) could provide valuable information for evacuation measures. The data aggregation system was designed using a state-of-the-art networking protocol and radio with DigiMesh and a process/data management system in the ROS2 DDS. This system was tested to …


A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan 2022 DePaul College of Law

A Proportionality-Based Framework For Government Regulation Of Digital Tracing Apps In Times Of Emergency, Sharon Bassan

Dickinson Law Review (2017-Present)

Times of emergency present an inherent conflict between the public interest and the preservation of individual rights. Such times require granting emergency powers to the government on behalf of the public interest and relaxing safeguards against government actions that infringe rights. The lack of theoretical framework to assess governmental decisions in times of emergency leads to a polarized and politicized discourse about potential policies, and often, to public distrust and lack of compliance.

Such a discourse was evident regarding Digital Tracing Apps (“DTAs”), which are apps installed on cellular phones to alert users that they were exposed to people who …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion 2022 Penn State Dickinson Law

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov 2022 The University of Akron

Garden Bot: Autonomous Home Garden Weed Removal Robot, Brendon Lovejoy, Robert Connolly, Isaac Lucas, Stevan Veselinov

Williams Honors College, Honors Research Projects

With frequent weeding being a tedious chore and an essential task for a successful garden, there is need for an automated method of handling this routine. Existing technologies utilize computer vision, GPS, multiple units and other tools to remove weeds from garden plots. However, these solutions are often complex and expensive, suited for large agricultural plots in contrast to small-scale home gardens. In addition, many of these technologies, along with manual tillers and cultivators suited for home use, are unable to perform weeding within rows of crops in a process known as intra-row weeding. The Garden Bot is an autonomous, …


Penetration Testing In A Small Business Network, Lee Kandle 2022 The University of Akron

Penetration Testing In A Small Business Network, Lee Kandle

Williams Honors College, Honors Research Projects

Penetration testing on a business network consisting of three routers, one switch, and one computer. Access Control Lists (ACLs) on the routers act as the firewall(s) for the network. 10 of the twelve ACLs do not deny any form of traffic to reflect the lax security standards common in small networks. Router 1 acts as the primary router of the Attacker/Pen Tester. Router 2 represents the edge router for the business and Router 3 is the inner router closest to end-user devices. Switch 1 is connected to Router 3 with one computer connected to the switch acting as an end-user. …


Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi 2022 University of Kentucky

Improving Network Policy Enforcement Using Natural Language Processing And Programmable Networks, Pinyi Shi

Theses and Dissertations--Computer Science

Computer networks are becoming more complex and challenging to operate, manage, and protect. As a result, Network policies that define how network operators should manage the network are becoming more complex and nuanced. Unfortunately, network policies are often an undervalued part of network design, leaving network operators to guess at the intent of policies that are written and fill in the gaps where policies don’t exist. Organizations typically designate Policy Committees to write down the network policies in the policy documents using high-level natural languages. The policy documents describe both the acceptable and unacceptable uses of the network. Network operators …


Protocols And Architecture For Privacy-Preserving Authentication And Secure Message Dissemination In Vehicular Ad Hoc Networks, Shafika Showkat Moni 2022 University of Kentucky

Protocols And Architecture For Privacy-Preserving Authentication And Secure Message Dissemination In Vehicular Ad Hoc Networks, Shafika Showkat Moni

Theses and Dissertations--Computer Science

The rapid development in the automotive industry and wireless communication technologies have enhanced the popularity of Vehicular ad hoc networks (VANETs). Today, the automobile industry is developing sophisticated sensors that can provide a wide range of assistive features, including accident avoidance, automatic lane tracking, semi-autonomous driving, suggested lane changes, and more. VANETs can provide drivers a safer and more comfortable driving experience, as well as many other useful services by leveraging such technological advancements. Even though this networking technology enables smart and autonomous driving, it also introduces a plethora of attack vectors. However, the main issues to be sorted out …


Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy 2022 West Virginia University

Incentive Analysis Of Blockchain Technology, Rahul Reddy Annareddy

Graduate Theses, Dissertations, and Problem Reports

Blockchain technology was invented in the Bitcoin whitepaper released in 2008. Since then, several decentralized cryptocurrencies and applications have become mainstream. There has been an immense amount of engineering effort put into developing blockchain networks. Relatively few projects backed by blockchain technology have succeeded and maintained a large community of developers, users, and customers, while many popular projects with billions of dollars in funding and market capitalizations have turned out to be complete scams.

This thesis discusses the technological innovations introduced in the Bitcoin whitepaper and the following work of the last fifteen years that has enabled blockchain technology. A …


Digital Commons powered by bepress