Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,123 Full-Text Articles 3,386 Authors 1,124,087 Downloads 153 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,123 full-text articles. Page 7 of 85.

Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari 2023 The Institute of Finance Management

Acceptance Of Interoperable Electronic Health Record (Ehrs) Systems: A Tanzanian E-Health Perspective, Emmanuel Mbwambo, Herman Mandari

Journal of International Technology and Information Management

The study assessed factors that influence the acceptance of interoperable electronic Health Records (EHRs) Systems in Tanzania Public Hospitals. The study applied a hybrid model that combined the Technology Acceptance Model (TAM) and Technology-Organization-Environment (TOE). Snowball sampling technique was applied and a total of 340 questionnaires were distributed to selected clinics, polyclinics and hospitals, of which 261 (77%) received questionnaires were considered to be valid and reliable for subsequent data analysis. IBM SPSS software version 27.0 was employed for data analysis. Findings indicated that relative advantage, compatibility, management support, organizational competency, training and education, perceived ease of use, perceived usefulness, …


Learning Outcomes And Learner Satisfaction: The Mediating Roles Of Self-Regulated Learning And Dialogues, Sean Eom, Nicholas Jeremy Ashill 2023 Southeast Missouri State University

Learning Outcomes And Learner Satisfaction: The Mediating Roles Of Self-Regulated Learning And Dialogues, Sean Eom, Nicholas Jeremy Ashill

Journal of International Technology and Information Management

The interdependent learning process is regarded as a crucial part of e-learning success, but it has been largely ignored in e-learning empirical research. Grounded in constructivist and social constructivist theory, we present and test an e-learning success model consisting of eight e-learning critical success factors (CSF) derived from constructivist and social constructivist models. Three hundred seventy-two on-line students from a Midwestern university in the United States participated in the survey. The data collected from the survey was used to examine the partial least squares structural equation model. The results highlight the importance of self-regulated learning and dialogical processes to explain …


A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong 2023 South China University of Technology

A Structure-Aware Generative Adversarial Network For Bilingual Lexicon Induction, Bocheng Han, Qian Tao, Lusi Li, Zhihao Xiong

Computer Science Faculty Publications

Bilingual lexicon induction (BLI) is the task of inducing word translations with a learned mapping function that aligns monolingual word embedding spaces in two different languages. However, most previous methods treat word embeddings as isolated entities and fail to jointly consider both the intra-space and inter-space topological relations between words. This limitation makes it challenging to align words from embedding spaces with distinct topological structures, especially when the assumption of isomorphism may not hold. To this end, we propose a novel approach called the Structure-Aware Generative Adversarial Network (SA-GAN) model to explicitly capture multiple topological structure information to achieve accurate …


The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky 2023 California State University, Los Angeles

The Need For International Ai Activities Monitoring, Parviz Partow-Navid, Ludwig Slusky

Journal of International Technology and Information Management

This paper focuses primarily on the need to monitor the risks arising from the dual-use of Artificial Intelligence (AI). Dual-use AI technology capability makes it applicable for defense systems and consequently may pose significant security risks, both intentional and unintentional, with the national and international scope of effects. While domestic use of AI remains the prerogative of individual countries, the unregulated and nonmonitored use of AI with international implications presents a specific concern. An international organization tasked with monitoring potential threats of AI activities could help defuse AI-associated risks and promote global cooperation in developing and deploying AI technology. The …


Defense Of A Small Network, Isabella Adkins 2023 The University of Akron

Defense Of A Small Network, Isabella Adkins

Williams Honors College, Honors Research Projects

A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.


Small Business Office Network, Michael Gerome 2023 The University of Akron

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi 2023 The University of Akron

Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi

Williams Honors College, Honors Research Projects

Audio and video streaming across delay tolerant networks are relatively new phenomena. During the Apollo 11 mission, video and audio were streamed directly back to Earth using fully analog radios. This streaming capability atrophied over time. The gradual conversion to digital electronics contributed greatly to this. Additionally, 21st century space systems face the new requirement of interconnectedness. Delay Tolerant Networking (DTN) attempts to solve this requirement by uniting traditional point to point links into a robust and dynamic network. However, DTN implementations present bottlenecks due to low performance. High-Rate Delay Tolerant Networking (HDTN) is a performance-optimized DTN implementation. This work …


Leveraging Ansible To Locate Network Devices, Elijah Hadden 2023 The University of Akron

Leveraging Ansible To Locate Network Devices, Elijah Hadden

Williams Honors College, Honors Research Projects

This report demonstrates the collection of Layer 2 and Layer 3 network device information using Ansible and explains the limitations identified performing such a procedure. Maintaining dynamic documentation of network information using automation would benefit network security with improvements to attack surface visibility and cyberattack incident response time. After the procedure was conducted, it was determined that Ansible alone is incapable of producing the intended information base due to the way it handles numerical variables. This report identifies limitations in Ansible’s ability to manipulate large quantities of network information and necessitates further discussion regarding what Ansible can and should be …


Smart Power Outlet, Kyrolos Melek, Joseph M. Garro, Ethan G. Frese, Madison Britton 2023 The University of Akron

Smart Power Outlet, Kyrolos Melek, Joseph M. Garro, Ethan G. Frese, Madison Britton

Williams Honors College, Honors Research Projects

With an ever-increasing demand on the electrical grid and an increase in electrical consumer goods per household, effective power management and monitoring for home users is a must. The objective of this project is to create a consumer outlet and companion phone application. The power outlet will measure power draw on each socket and report these measurements via an embedded system, wirelessly, to the application. The application will then allow for setting custom power draws at which an individual socket will switch off if exceeded and will display how much a given outlet or individual socket is costing per unit …


Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz 2023 The University of Akron

Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz

Williams Honors College, Honors Research Projects

This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cybersecurity. The project …


Persuasive Communication Systems: A Machine Learning Approach To Predict The Effect Of Linguistic Styles And Persuasion Techniques, Annye Braca, Pierpaolo Dondio 2023 Technological University Dublin

Persuasive Communication Systems: A Machine Learning Approach To Predict The Effect Of Linguistic Styles And Persuasion Techniques, Annye Braca, Pierpaolo Dondio

Articles

Prediction is a critical task in targeted online advertising, where predictions better than random guessing can translate to real economic return. This study aims to use machine learning (ML) methods to identify individuals who respond well to certain linguistic styles/persuasion techniques based on Aristotle’s means of persuasion, rhetorical devices, cognitive theories and Cialdini’s principles, given their psychometric profile.


Spatio-Temporal Deep Learning Approaches For Addressing Track Association Problem Using Automatic Identification System (Ais) Data, Md Asif Bin Syed 2023 West Virginia University

Spatio-Temporal Deep Learning Approaches For Addressing Track Association Problem Using Automatic Identification System (Ais) Data, Md Asif Bin Syed

Graduate Theses, Dissertations, and Problem Reports

In the realm of marine surveillance, track association constitutes a pivotal yet challenging task, involving the identification and tracking of unlabelled vessel trajectories. The need for accurate data association algorithms stems from the urge to spot unusual vessel movements or threat detection. These algorithms link sequential observations containing location and motion information to specific moving objects, helping to build their real-time trajectories. These threat detection algorithms will be useful when a vessel attempts to conceal its identity. The algorithm can then identify and track the specific vessel from its incoming signal. The data for this study is sourced from the …


Monitoring And Controlling Temperature Egg Incubator Prototype Based Lora Communication, Mas Aly Afandi, Fadhila Karin Purnomo, Raditya Artha Rochmanto, Sevia Indah Purnama 2022 (Scopus ID: 57209224197) Institut Teknologi Telkom Purwokerto, Indonesia, Indonesia

Monitoring And Controlling Temperature Egg Incubator Prototype Based Lora Communication, Mas Aly Afandi, Fadhila Karin Purnomo, Raditya Artha Rochmanto, Sevia Indah Purnama

Elinvo (Electronics, Informatics, and Vocational Education)

Poultry industries encounter problem in produce day old chicken (DOC). Poultry industries usually produce DOC using egg incubator. Egg incubator must have high accuracy in reading environment temperature inside the machine. The temperature environment inside the egg incubator machine needs to keep in range 36°C - 40°C. On the other hand, hatcheries and chicken coop usually not in one place. Poultry industries require applied technology to solve this problem. This problem can be solved by using internet of things. But internet of things can be so expensive. This research is aim to implement monitoring and controlling temperature inside egg incubator …


Performance Analysis Of The Energy Harvesting Techniques In Cooperative Communication Systems Of Nbiot Devices With Amplify And Forward (Af) Relaying Protocol, Ines Sastre Umayya, Muhamad Milchan, Hendy Briantoro, Yoedy Moegiharto 2022 Politeknik Elektronika Negeri Surabaya, Indonesia

Performance Analysis Of The Energy Harvesting Techniques In Cooperative Communication Systems Of Nbiot Devices With Amplify And Forward (Af) Relaying Protocol, Ines Sastre Umayya, Muhamad Milchan, Hendy Briantoro, Yoedy Moegiharto

Elinvo (Electronics, Informatics, and Vocational Education)

This study examines the system's performance with implementation of the energy harvesting (EH) techniques at source node, S and relay node, R. The RF signals which are used to energy harvesting proccess are broadcasted by destination node, D. The information signals from S are sent to D via a R in a cooperative communication framework. The R uses the amplify and forward (AF) protocol to forward the received signal from S to D. We propose a network system which contain of three femto cells, and an access point of each femto cells work as a relay (R), in a macro …


Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico de Luca 2022 University of Udine, Italy

Do People Perceive Alexa As Gendered? A Cross-Cultural Study Of People’S Perceptions, Expectations, And Desires Of Alexa, Leopoldina Fortunati, Autumn P. Edwards, Anna Maria Manganelli, Chad Edwards, Federico De Luca

Human-Machine Communication

Mainly, the scholarly debate on Alexa has focused on sexist/anti-woman gender representations in the everyday life of many families, on a cluster of themes such as privacy, insecurity, and trust, and on the world of education and health. This paper takes another stance and explores via online survey methodology how university student respondents in two countries (the United States, n = 333; and Italy, n = 322) perceive Alexa’s image and gender, what they expect from this voice-based assistant, and how they would like Alexa to be. Results of a free association exercise showed that Alexa’s image was scarcely embodied …


Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li 2022 Purdue University

Digital Platform To Aid Youth Substance Abuse Prevention, Bingxuan Li

Discovery Undergraduate Interdisciplinary Research Internship

Through research and interviews, I discovered that a significant portion of students in Africa become drug addicts and drop out of school. The solution is to prevent youth substance abuse before it happens, so that more students in Africa may continue their education. With the strong motivation of expanding African student involvement in higher education, I participated DURI program to increase higher education rates in the Democratic Republic of the Congo, Africa. The local government is establishing rehabilitation centers to monitor at-risk students and prevent youth substance abuse, but due to extremely limited resources, it is critical to evaluate the …


A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan 2022 Old Dominion University

A Brief Review Of Dns, Root Servers, Vulnerabilities And Decentralization, Mallory Runyan

Cybersecurity Undergraduate Research Showcase

Since the 1980’s and creation of the World Wide Web, Internet utilization is a common and arguably, necessary, part of daily life. The internet is young and still relatively new, but as of 2016, 3.4 billion people were online, and that number has since grown [1]. This is a significant number, but as such a common part of daily life, how elements of the internet or its infrastructure work is complex. The world would very likely be thrown into dark ages if DNS or any other significant aspect of the internet's infrastructure were to succumb to an attack. The Colonial …


Effective Short Text Classification Via The Fusion Of Hybrid Features For Iot Social Data, Xiong Luo, Zhijian Yu, Zhigang Zhao, Wenbing Zhao, Jenq-Haur Wang 2022 University of Science and Technology Beijing

Effective Short Text Classification Via The Fusion Of Hybrid Features For Iot Social Data, Xiong Luo, Zhijian Yu, Zhigang Zhao, Wenbing Zhao, Jenq-Haur Wang

Electrical and Computer Engineering Faculty Publications

Nowadays short texts can be widely found in various social data in relation to the 5G-enabled Internet of Things (IoT). Short text classification is a challenging task due to its sparsity and the lack of context. Previous studies mainly tackle these problems by enhancing the semantic information or the statistical information individually. However, the improvement achieved by a single type of information is limited, while fusing various information may help to improve the classification accuracy more effectively. To fuse various information for short text classification, this article proposes a feature fusion method that integrates the statistical feature and the comprehensive …


Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-chi Feng, Feng Liu 2022 Portland State University

Sequential Frame-Interpolation And Dct-Based Video Compression Framework, Yeganeh Jalalpour, Wu-Chi Feng, Feng Liu

Computer Science Faculty Publications and Presentations

Video data is ubiquitous; capturing, transferring, and storing even compressed video data is challenging because it requires substantial resources. With the large amount of video traffic being transmitted on the internet, any improvement in compressing such data, even small, can drastically impact resource consumption. In this paper, we present a hybrid video compression framework that unites the advantages of both DCT-based and interpolation-based video compression methods in a single framework. We show that our work can deliver the same visual quality or, in some cases, improve visual quality while reducing the bandwidth by 10--20%.


Instructional Systems Design And The Diffusion And Adoption Of Technology: (Volume 1), Miguel Ramlatchan (Author & Editor), Mark Parsons (Author), Meghan Soldani (Author), Josie Joswick Mendoza (Author), Maria Satre (Author), Brittany Spitz (Author), Jasmine Bundy (Author), Amanda Kline (Author) 2022 Old Dominion University

Instructional Systems Design And The Diffusion And Adoption Of Technology: (Volume 1), Miguel Ramlatchan (Author & Editor), Mark Parsons (Author), Meghan Soldani (Author), Josie Joswick Mendoza (Author), Maria Satre (Author), Brittany Spitz (Author), Jasmine Bundy (Author), Amanda Kline (Author)

Distance Learning Faculty & Staff Books

Instructional designers, instructional systems designers, and other educational technologists are, by their nature, innovators. These professionals apply and extend the applied science of learning, systems, communication, and instructional design theory to help students learn. Technology in some capacity is used to make the connections between subject matter experts, teachers, instructors, and their learners. It is common for instructional designers to seek new tools, techniques, and innovations for the improvement of learning, access, quality, and student satisfaction. However, the adoption and diffusion of new educational technology and innovation is a complex process that depends on many variables. Understanding these processes and …


Digital Commons powered by bepress