Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,142 Full-Text Articles 3,520 Authors 1,022,331 Downloads 143 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,142 full-text articles. Page 7 of 87.

Multimodal Adversarial Learning, Uche Osahor 2022 West Virginia University

Multimodal Adversarial Learning, Uche Osahor

Graduate Theses, Dissertations, and Problem Reports

Deep Convolutional Neural Networks (DCNN) have proven to be an exceptional tool for object recognition, generative modelling, and multi-modal learning in various computer vision applications. However, recent findings have shown that such state-of-the-art models can be easily deceived by inserting slight imperceptible perturbations to key pixels in the input. A good target detection systems can accurately identify targets by localizing their coordinates on the input image of interest. This is ideally achieved by labeling each pixel in an image as a background or a potential target pixel. However, prior research still confirms that such state of the art targets models …


Speaker Encoding For Zero-Shot Speech Synthesis, Tristin W. Cory 2022 Missouri State University

Speaker Encoding For Zero-Shot Speech Synthesis, Tristin W. Cory

MSU Graduate Theses

Spoken communication, for many, is an essential part of everyday life. Some individuals can lose or not be born with the ability to speak. To function on a day-to-day basis, these individuals find other ways of communication. Adaptive speech synthesis is one of those ways. It recreates a user’s previous voice or creates a voice that blends with their regional dialect. Current adaptive speech synthesis techniques that achieve human-like speech require thirty minutes, to a few hours of high-quality audio recordings of a target speaker. This amount of recorded audio is not commonly possessed by people in need of a …


Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi 2022 IFHE University, IBS Hyderabad Telangana India

Evaluating The Factors Influencing Alignment Of It And Business In A Cloud Computing Environment, Dr. Shailja Tripathi

Journal of International Technology and Information Management

Aligning IT with business strategically is the recent area of attention among researchers and practitioners because of its potential impact on organizational performance. Currently, large numbers of enterprises are migrating towards cloud computing as on-premise implementation of Information technology (IT) infrastructure is expensive. The purpose of this research is to examine the factors that influence the alignment of IT and business in cloud computing environment. Therefore, this study used the Strategic Alignment Maturity (SAM) model as a framework to validate the evolution of IT-business alignment in a cloud computing platform. A questionnaire-based survey method was employed for data collection. The …


E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. McMurtrey Ph.D., Michael E. Ellis 2022 University of Central Arkansas

E-Payment Adoption In Saudi Arabia, Alexander N. Chen, Joseph Y. Thomas, Mark E. Mcmurtrey Ph.D., Michael E. Ellis

Journal of International Technology and Information Management

Internet technology has influenced banking systems because of its capability to enhance the performance of financial operations. Several factors influence the adoption of new technology within the financial industry. Namely the customers’ perception of benefit, quality, Ease of Use, Security, Self-Efficacy, and Trust. However, various cultures and geopolitical issues influence technology adoption and are therefore worth further study. This paper focuses on the factors that influence the behaviors of Saudi Arabians and their adoption of e-payment systems. The paper shows the fundamental discoveries of an investigation examining the dispersion and the adoption of e-payment technology in …


Jitim Front Cover Vol 31 1 2022, 2022 California State University, San Bernardino

Jitim Front Cover Vol 31 1 2022

Journal of International Technology and Information Management

Table of Content JITIM Vol 31. issue 1, 2022


Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya 2022 The Institute of Finance Management

Examining Factors Influencing Intention To Use M-Health Applications For Promoting Healthier Life Among Smartphone Users In Tanzania, Herman Mandari, Mahija Yahaya

Journal of International Technology and Information Management

Deaths related with Non-Communicable Diseases (NCDs) have recently increases, similarly, development of mobile technologies have paved a way in which Smartphone users can use m-health applications to address high level of sedentary behaviours that relates to negative health consequences. Therefore, this study was conducted to examine factors which may influence generation Y who are Smartphone users to adopt m-health applications in controlling NCDs in Tanzania. TAM theory was extended with awareness, trust and perceived cost to develop a research conceptual model of this study. Google form was used to developed online questionnaire which was distributed through social media platforms to …


Jitim Table Of Contents - Vol. 31 Issue 2 - 2022, 2022 California State University, San Bernardino

Jitim Table Of Contents - Vol. 31 Issue 2 - 2022

Journal of International Technology and Information Management

JITIM ToC


Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr. 2022 IFHE University, IBS Hyderabad, Telangana, India

Assessing Performance Impact Of Digital Transformation For Instructors In The Covid-19 Era, Shailja Tripathi Dr., Shubhangi Urkude Dr.

Journal of International Technology and Information Management

Digital transformation has evolved as the main issue for higher education institutions (HEIs) across the globe due to the Covid-19 outbreak. The purpose of this study is to investigate the performance impacts of digital transformation for instructors of HEIs during the pandemic. The technology-to-performance chain (TPC) model pursues to predict the influence of an information system on the performance of an individual user. Hence, TPC model is used to evaluate the performance of instructors due to digital transformation in the institutions during the Covid-19 pandemic. The data is collected from instructors of higher educational institutions. Recently, partial least squares path …


An Analysis Of Compressive Convolutional Autoencoders For Image Archiving In Medical Informatics, Charles Warren 2022 Michigan Technological University

An Analysis Of Compressive Convolutional Autoencoders For Image Archiving In Medical Informatics, Charles Warren

Dissertations, Master's Theses and Master's Reports

Within a given enterprise network, an array of data types needs to be communicated. These network transmissions consist of images, videos, text, and binaries that have unique requirements of bandwidth and computational overhead to transmit. With respect to medical informatics, these include a multitude of varying subjects, standards, and modalities which are communicated to and from imaging equipment, clinicians, and medical archives. To reduce the required bandwidth to transmit, or provide adequate storage capacity for archival purposes, the data may be compressed in such a way that reduces the size of the image when it is transferred or stored. The …


Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku 2022 The University of Akron

Lapnitor: A Web Service That Protects Your Laptop From Theft., Michael Ameteku

Williams Honors College, Honors Research Projects

Laptop theft is an issue worldwide. According to an article from 2018, Security Boulevard stated that a laptop is stolen every 53 seconds. Using a laptop's camera, we can monitor the surroundings of the laptop and reduce a laptop's probability of being stolen. According to the University of Pittsburgh, a laptop has a 1-in- 10 chance of being stolen and nearly half of these thefts occur in offices or classrooms. These thefts mostly occur when a laptop owner leaves their device unattended for a certain period of time to maybe go visit the restroom or attend to a call when …


Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian 2022 Quinnipiac University

Evolution And Diffusion Of Icts In The Indian Railways: A Historical Analysis, Ramesh Subramanian

Journal of International Technology and Information Management

The Indian Railway system is one of the largest socio-technical systems in the world. It has existed for over 160 years, starting from the British Colonial times. It continues to play a critical role in present-day India. It’s continued functioning is dependent not only on the personnel who are employed in the railways, but also the technologies that go into the system. A critical technology in the functioning of the railway system is information and communications technologies (ICTs). ICTs are deployed in almost every facet of the railway system. But these ICTs did not manifest themselves recently. They have been …


Online Discussion Forum And Pre-Migration Information Seeking: An Affordance Perspective, Daniel Gulanowski, Luciara Nardon, Michael J. Hine 2022 Carleton University

Online Discussion Forum And Pre-Migration Information Seeking: An Affordance Perspective, Daniel Gulanowski, Luciara Nardon, Michael J. Hine

Journal of International Technology and Information Management

Potential immigrants increasingly rely on online technologies to access needed information as they have limited access to offline sources of information at the pre-arrival stage. The purpose of this paper is to investigate the role of online discussion forums in facilitating potential immigrants’ access to relevant information about the host country labor market. This paper draws on extant literature on computer-mediated communication and a qualitative content analysis of 363 forum discussions to explore the phenomenon of increased use of online forums by prospective immigrants to Canada to access relevant labor market information. We draw on existing concepts of technology affordances …


Machine Learning Techniques For Network Analysis, Irfan Lateef 2021 New Jersey Institute of Technology

Machine Learning Techniques For Network Analysis, Irfan Lateef

Dissertations

The network's size and the traffic on it are both increasing exponentially, making it difficult to look at its behavior holistically and address challenges by looking at link level behavior. It is possible that there are casual relationships between links of a network that are not directly connected and which may not be obvious to observe. The goal of this dissertation is to study and characterize the behavior of the entire network by using eigensubspace based techniques and apply them to network traffic engineering applications.

A new method that uses the joint time-frequency interpretation of eigensubspace representation for network statistics …


Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao 2021 Northern Kentucky University

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao

Posters-at-the-Capitol

Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …


Improving Noise Immunity And Efficiency Using High-Precision Iterative Codes, Sherzod Shukhratovich Atadjanov, Aziza Ahmadjanovna Tursunova 2021 Tashkent University of Information Technologies named after Muhammad al-Khwarizmi

Improving Noise Immunity And Efficiency Using High-Precision Iterative Codes, Sherzod Shukhratovich Atadjanov, Aziza Ahmadjanovna Tursunova

Bulletin of TUIT: Management and Communication Technologies

The article discusses the issues of ensuring noise immunity in digital broadcasting systems, shows the importance of the transition to the optimal code and the need to use it in the field of noiseless coding in various areas of telecommunication transmission and reception of digital signals. The previous algorithms and error-correcting coding methods based on the Gray code, which are used in multi-level digital broadcast modulation schemes to minimize the intensity of bit errors, are highlighted. A model of error-correcting coding by the Gray method and methods for estimating the probability of error for the Gray code are presented. Based …


Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler 2021 University of Arkansas, Fayetteville

Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler

Computer Science and Computer Engineering Undergraduate Honors Theses

Sounds with a high level of stationarity, also known as sound textures, have perceptually relevant features which can be captured by stimulus-computable models. This makes texture-like sounds, such as those made by rain, wind, and fire, an appealing test case for understanding the underlying mechanisms of auditory recognition. Previous auditory texture models typically measured statistics from auditory filter bank representations, and the statistics they used were somewhat ad-hoc, hand-engineered through a process of trial and error. Here, we investigate whether a better auditory texture representation can be obtained via contrastive learning, taking advantage of the stationarity of auditory textures to …


Automated Report Based System To Encourage A Greener Commute To Campus, Ronald Velasquez 2021 University of Arkansas, Fayetteville

Automated Report Based System To Encourage A Greener Commute To Campus, Ronald Velasquez

Computer Science and Computer Engineering Undergraduate Honors Theses

This project consists of the design and implementation of a tool to encourage greener commutes to the University of Arkansas. Trends in commuting of the last few years show a decline in not so environment-friendly commute modes. Nevertheless, ensuring that this trend continues is vital to assure a significant impact. The created tool is an automated report system. The report displays information about different commute options. A Google form allows users to submit report requests, and a web app allows the sustainability office to process them in batches. This system was built in the Apps Script platform. It implements several …


Approaches To Improve The Execution Time Of A Quantum Network Simulation, Joseph B. Tippit 2021 Air Force Institute of Technology

Approaches To Improve The Execution Time Of A Quantum Network Simulation, Joseph B. Tippit

Theses and Dissertations

Evaluating quantum networks is an expensive and time-consuming task that benefits from simulation. A potential improvement is to utilize GPUs, namely by leveraging NVIDIA's programming framework, CUDA. To avoid performance pitfalls of higher level languages and programming models such as the so called "two language problem," the Julia Programming Language provides the basis for the development effort. This research develops a two module prototype quantum network simulation framework using GPUs and Julia. Performance of the software is measured and compared against other languages such as MATLAB.


Wi-Fi Sensing: Device-Free In-Zone Object Movement Detection, Nicholas P. Schnorr 2021 California Polytechnic State University, San Luis Obispo

Wi-Fi Sensing: Device-Free In-Zone Object Movement Detection, Nicholas P. Schnorr

Master's Theses

Wi-Fi Sensing is becoming a prominent field with a wide range of potential applications. Using existing hardware on a wireless network such as access points, cell phones, and smart home devices, important information can be inferred about the current physical environment. Through the analysis of Channel State Information collected in the Neighborhood Discovery Protocol process, the wireless network can detect disturbances in Wi-Fi signals when the physical environment changes. This results in a system that can sense motion within the Wi-Fi network, allowing for movement detection without any wearable devices.

The goal of this thesis is to answer whether Wi-Fi …


Deep Learning Based Speech Enhancement And Its Application To Speech Recognition, Ju Lin 2021 Clemson University

Deep Learning Based Speech Enhancement And Its Application To Speech Recognition, Ju Lin

All Dissertations

Speech enhancement is the task that aims to improve the quality and the intelligibility of a speech signal that is degraded by ambient noise and room reverberation. Speech enhancement algorithms are used extensively in many audio- and communication systems, including mobile handsets, speech recognition, speaker verification systems and hearing aids. Recently, deep learning has achieved great success in many applications, such as computer vision, nature language processing and speech recognition. Speech enhancement methods have been introduced that use deep-learning techniques, as these techniques are capable of learning complex hierarchical functions using large-scale training data. This dissertation investigates the deep learning …


Digital Commons powered by bepress