Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2018

Institution
Keyword
Publication
Publication Type
File Type

Articles 121 - 149 of 149

Full-Text Articles in Engineering

Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long Jan 2018

Exploring Generational Differences In Text Messaging Usage And Habits, Daniel Wayne Long

CCE Theses and Dissertations

Members of society today embrace multiple communication media for various purposes and intents. Text messaging has been identified as the medium of choice for continual relationship maintenance and text messaging from mobile devices overshadows all other media forms for the support of social connections. Text messaging is changing everything from how operators market their plans to how advertisers and service providers reach consumers. But just as technology usage of social media and internet access are different across generational boundaries, text messaging usage and habits may also be different for various generational groups. The majority of peer-reviewed research regarding text messaging …


Active Directory And Group Policy From The Ground Up, Nicholas Maurer Jan 2018

Active Directory And Group Policy From The Ground Up, Nicholas Maurer

Undergraduate Research

In this paper, I describe my experience in building a virtual network using VMware’s ESXI platform along with my experience with using Group Policy and Active Directory to administrate a network. I also detail some of my goals and my intentions with this project and where I intend on taking it in the future.


User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yanju Liu, Zhan Wang Jan 2018

User-Friendly Deniable Storage For Mobile Devices, Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen-Tao Zhu, Yanju Liu, Zhan Wang

Research Collection School Of Computing and Information Systems

Mobile devices are prevalently used to process sensitive data, but traditional encryption may not work when an adversary is able to coerce the device owners to disclose the encryption keys. Plausibly Deniable Encryption (PDE) is thus designed to protect sensitive data against this powerful adversary. In this paper, we present MobiPluto, a user-friendly PDE scheme for denying the existence of sensitive data stored on mobile devices. A salient difference between MobiPluto and the existing PDE systems is that any block-based file systems can be deployed on top of it. To further improve usability and deniability of MobiPluto, we introduce a …


Real-Time Inbound Marketing: A Use Case For Digital Banking, Alan Megargel, Venky Shankararaman, Srinivas K. Reddy Jan 2018

Real-Time Inbound Marketing: A Use Case For Digital Banking, Alan Megargel, Venky Shankararaman, Srinivas K. Reddy

Research Collection School Of Computing and Information Systems

Over the years banks have been strategically using digital technologies to help transform various aspects of their business. In recent times, this strategy has evolved into one of digital augmentation of the bank’s processes, products and channels. This allows for reaching out to customers and partners through digital platforms, for example; the addition of mobile apps for customers to access and perform service transactions. Marketing continues to play a major role in supporting the expansion of business and increasing revenue for the bank. Marketing has evolved from mass direct targeting to more personalised, face-to-face and real-time targeting. In the digital …


Design, Implementation And A Pilot Study Of Mobile Framework For Pedestrian Safety Using Smartphone Sensors, Aawesh Man Shrestha Jan 2018

Design, Implementation And A Pilot Study Of Mobile Framework For Pedestrian Safety Using Smartphone Sensors, Aawesh Man Shrestha

Electronic Theses and Dissertations

Pedestrian distraction from smartphones is a serious social problem that caused an ever increasing number of fatalities especially as virtual reality (VR) games have gained popularity recently. In this thesis, we present the design, implementation, and a pilot study of WiPedCross, a WiFi direct-based pedestrian safety system that senses and evaluates a risk, and alerts accordingly the user to prevent traffic accidents. In order to develop a non-intrusive, accurate, and energy-efficient pedestrian safety system, a number of technical challenges are addressed: to enhance the positioning accuracy of the user for precise risk assessment, a map-matching algorithm based on a Hidden …


Architectures For Real-Time Automatic Sign Language Recognition On Resource-Constrained Device, James M. Blair Jan 2018

Architectures For Real-Time Automatic Sign Language Recognition On Resource-Constrained Device, James M. Blair

UNF Graduate Theses and Dissertations

Powerful, handheld computing devices have proliferated among consumers in recent years. Combined with new cameras and sensors capable of detecting objects in three-dimensional space, new gesture-based paradigms of human computer interaction are becoming available. One possible application of these developments is an automated sign language recognition system. This thesis reviews the existing body of work regarding computer recognition of sign language gestures as well as the design of systems for speech recognition, a similar problem. Little work has been done to apply the well-known architectural patterns of speech recognition systems to the domain of sign language recognition. This work creates …


Securing Soft Ips Against Hardware Trojan Insertion, Thao Phuong Le Jan 2018

Securing Soft Ips Against Hardware Trojan Insertion, Thao Phuong Le

Graduate Theses and Dissertations

Due to the increasing complexity of hardware designs, third-party hardware Intellectual Property (IP) blocks are often incorporated in order to alleviate the burden on hardware designers. However, the prevalence use of third-party IPs has raised security concerns such as Trojans inserted by attackers. Hardware Trojans in these soft IPs are extremely difficult to detect through functional testing and no single detection methodology has been able to completely address this issue. Based on a Register-Transfer Level (RTL) and gate-level soft IP analysis method named Structural Checking, this dissertation presents a hardware Trojan detection methodology and tool by detailing the implementation of …


Table Of Contents Jitim Vol 27 Issue 1, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 1, 2018

Journal of International Technology and Information Management

Table of Contents JITIM volume 27, issue 1 - 2018


Consuming Digital Debris In The Plasticene, Stephen R. Parks Jan 2018

Consuming Digital Debris In The Plasticene, Stephen R. Parks

Theses and Dissertations

Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …


Implementation Of Cache Attack On Real Information Centric Networking System, Faustina J. Anto Morais Jan 2018

Implementation Of Cache Attack On Real Information Centric Networking System, Faustina J. Anto Morais

UNF Graduate Theses and Dissertations

Network security is an ongoing major problem in today’s Internet world. Even though there have been simulation studies related to denial of service and cache attacks, studies of attacks on real networks are still lacking in the research. In this thesis, the effects of cache attacks in real information-centric networking systems were investigated. Cache attacks were implemented in real networks with different cache sizes and with Least Recently Used, Random and First In First Out algorithms to fill the caches in each node. The attacker hits the cache with unpopular content, making the user request that the results be fetched …


Enabling Low Cost Wifi-Based Traffic Monitoring System Using Deep Learning, Sayan Sahu Jan 2018

Enabling Low Cost Wifi-Based Traffic Monitoring System Using Deep Learning, Sayan Sahu

Electronic Theses and Dissertations

A traffic monitoring system (TMS) is an integral part of Intelligent Transportation Systems (ITS) for traffic analysis and planning. However, covering huge miles of rural highways (119,247 miles in U.S.) with a large number of TMSs is a very challenging problem due to the cost issue. This paper aims to address the problem by developing a low-cost and portable TMS called DeepWiTraffic based on COTs WiFi devices. The proposed system enables accurate vehicle detection (counting) and classification by exploiting the unique WiFi Channel State Information (CSI) of passing vehicles. Spatial and temporal correlations of CSI amplitude and phase data are …


Vehicle-To-Barrier Communication During Real-World Vehicle Crash Tests, Samil Temel, Mehmet C. Vuran, Mohammad M.R. Lunar, Zhongyuan Zhao, Abdul Salam, Ronald K. Faller, Cody S. Stolle Jan 2018

Vehicle-To-Barrier Communication During Real-World Vehicle Crash Tests, Samil Temel, Mehmet C. Vuran, Mohammad M.R. Lunar, Zhongyuan Zhao, Abdul Salam, Ronald K. Faller, Cody S. Stolle

School of Computing: Faculty Publications

Vehicle-to-barrier (V2B) communication is expected to facilitate wireless interactions between vehicles and roadside barriers in next-generation intelligent transportation systems. V2B systems will help mitigate single-vehicle, run-off-road crashes, which account for more than 50% of roadside crash fatalities. In this work, the characteristics of the wireless channel prior to and during a crash are analyzed using orthogonal frequency division multiplexing (OFDM) techniques, which has been used in existing vehicular communication systems. More specifically, the performance of OFDM-based V2B links are measured in real-world crash tests for the first time. Three crash tests conducted at the Midwest Roadside Safety Facility, Lincoln, Nebraska, …


Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook Jan 2018

Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook

Copyright, Fair Use, Scholarly Communication, etc.

The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …


Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli Jan 2018

Application Of 3d Delaunay Triangulation In Fingerprint Authentication System, Wencheng Yang, Ahmed Ibrahim, Junaid Chaudhry, Song Wang, Jiankun Hu, Craig Valli

Research outputs 2014 to 2021

Biometric security has found many applications in Internet of Things (IoT) security. Many mobile devices including smart phones have supplied fingerprint authentication function. However, the authentication performance in such restricted environment has been downgraded significantly. A number of methods based on Delaunay triangulation have been proposed for minutiae-based fingerprint matching, due to some favorable properties of the Delaunay triangulation under image distortion. However, all existing methods are based on 2D pattern, of which each unit, a Delaunay triangle, can only provide limited discrimination ability and could cause low matching performance. In this paper, we propose a 3D Delaunay triangulation based …


Towards Designing Energy Efficient Symmetric Key Protocols, Sai Raghu Talluri Jan 2018

Towards Designing Energy Efficient Symmetric Key Protocols, Sai Raghu Talluri

UNF Graduate Theses and Dissertations

Energy consumption by various modern symmetric key encryption protocols (DES,

3-DES, AES and, Blowfish) is studied from an algorithmic perspective. The work

is directed towards redesigning or modifying the underlying algorithms for these

protocols to make them consume less energy than they currently do. This research

takes the approach of reducing energy consumption by parallelizing the

consecutive memory accesses of symmetric key encryption algorithms. To achieve

parallelization, an existing energy complexity model is applied to symmetric key

encryption algorithms. Inspired by the popular DDR3 architecture, the model assumes

that main memory is divided into multiple banks, each of which can …


Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu Jan 2018

Assessing Learning Outcomes Of A Mooc Incorporated Into An On-Campus Management Information Systems Class, Manying Qiu, Yaquan Xu

Journal of International Technology and Information Management

Massive open source online course (MOOC) platform enables enterprises to introduce their new innovations and deliver basic knowledge to handle the new products. We incorporated an openSAP course into a management information systems (MIS) class. Students learned the latest development of SAP customer relationship management (CRM) solutions along with the SAP enterprise resource planning (ERP) business processes integration that they learned in the classroom. 46.2% of the students obtained Record of Achievement and Confirmation of Participation certificates, which is higher than the average success rate of MOOCs. More importantly, the students experienced a way of sustainable and lifelong learning.


The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi Jan 2018

The Impact Of Personal Privacy On The Acceptance Of Mobile Phone Technology: A Case Of Tanzanian Smes, Renatus Michael Mushi

Journal of International Technology and Information Management

The adoption of mobile technology has gained a serious attention in organizations and individuals. SMEs in the developing countries have hugely been relying on mobile phone technology in performing their activities. The main reasons for the popularity of mobile phones include their perceived low cost, less learning curve, mobility and its compatibility with the usage at the SMEs level as compared to the desktop computers. Despite existence on studies on adoption of mobile technology in different contexts, few of them have explicitly explored the way personal privacy can affect its acceptance to be used at the workplaces.

This study covers …


Table Of Contents Jitim Vol 27 Issue 2, 2018 Jan 2018

Table Of Contents Jitim Vol 27 Issue 2, 2018

Journal of International Technology and Information Management

ToC JITIM vol 27 - 2, 2018


Special Issue: Neutrosophic Information Theory And Applications, Florentin Smarandache, Jun Ye Jan 2018

Special Issue: Neutrosophic Information Theory And Applications, Florentin Smarandache, Jun Ye

Branch Mathematics and Statistics Faculty and Staff Publications

Neutrosophiclogic,symboliclogic,set,probability,statistics,etc.,are,respectively,generalizations of fuzzy and intuitionistic fuzzy logic and set, classical and imprecise probability, classical statistics, and so on. Neutrosophic logic, symbol logic, and set are gaining significant attention in solving many real-life problems that involve uncertainty, impreciseness, vagueness, incompleteness, inconsistency, and indeterminacy. A number of new neutrosophic theories have been proposed and have been applied in computational intelligence, multiple-attribute decision making, image processing, medical diagnosis, fault diagnosis, optimization design, etc. This Special Issue gathers original research papers that report on the state of the art, as well as on recent advancements in neutrosophic information theory in soft computing, artificial intelligence, …


Efficient Information Dissemination In Vehicular Networks With Privacy Protection, Xiaolu Cheng Jan 2018

Efficient Information Dissemination In Vehicular Networks With Privacy Protection, Xiaolu Cheng

Theses and Dissertations

Vehicular ad hoc network (VANET) is a key component of intelligent transportation System (ITS). In VANETs, vehicles and roadside units exchange information for the purpose of navigation, safe driving, entertainment and so on. The high mobility of vehicles makes efficient and private communications in VANETs a big challenge.

Improving the performance of information dissemination while protecting data privacy is studied in this research. Meet-Table based information dissemination method is first proposed, so as to improve the information dissemination, and to efficiently distribute information via utilizing roadside units, Cloud Computing, and Fog Computing. A clustering algorithm is proposed as well, to …


Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri Jan 2018

Wi-Fi Finger-Printing Based Indoor Localization Using Nano-Scale Unmanned Aerial Vehicles, Appala Narasimha Raju Chekuri

Electronic Theses and Dissertations

Explosive growth in the number of mobile devices like smartphones, tablets, and smartwatches has escalated the demand for localization-based services, spurring development of numerous indoor localization techniques. Especially, widespread deployment of wireless LANs prompted ever increasing interests in WiFi-based indoor localization mechanisms. However, a critical shortcoming of such localization schemes is the intensive time and labor requirements for collecting and building the WiFi fingerprinting database, especially when the system needs to cover a large space. In this thesis, we propose to automate the WiFi fingerprint survey process using a group of nano-scale unmanned aerial vehicles (NAVs). The proposed system significantly …


Low Power Wide Area Networks (Lpwan): Technology Review And Experimental Study On Mobility Effect, Dhaval Patel Jan 2018

Low Power Wide Area Networks (Lpwan): Technology Review And Experimental Study On Mobility Effect, Dhaval Patel

Electronic Theses and Dissertations

In the past decade, we have witnessed explosive growth in the number of low-power embedded and Internet-connected devices, reinforcing the new paradigm, Internet of Things (IoT). IoT devices like smartphones, home security systems, smart electric meters, garage parking indicators, etc., have penetrated deeply into our daily lives. These IoT devices are increasingly attached and operated in mobile objects like unmanned vehicles, trains, airplanes, etc. The low power wide area network (LPWAN), due to its long-range, low-power and low-cost communication capability, is actively considered by academia and industry as the future wireless communication standard for IoT. However, despite the increasing popularity …


Common Carriage’S Domain, Christopher S. Yoo Jan 2018

Common Carriage’S Domain, Christopher S. Yoo

All Faculty Scholarship

The judicial decision invalidating the Federal Communications Commission's first Open Internet Order has led advocates to embrace common carriage as the legal basis for network neutrality. In so doing, network neutrality proponents have overlooked the academic literature on common carriage as well as lessons from its implementation history. This Essay distills these learnings into five factors that play a key role in promoting common carriage's success: (1) commodity products, (2) simple interfaces, (3) stability and uniformity in the transmission technology, (4) full deployment of the transmission network, and (5) stable demand and market shares. Applying this framework to the Internet …


Ambiqual – A Full Reference Objective Quality Metric For Ambisonic Spatial Audio, Miroslaw Narbutt, Andrew Allen, Jan Skoglund, Michael Chinen, Andrew Hines Jan 2018

Ambiqual – A Full Reference Objective Quality Metric For Ambisonic Spatial Audio, Miroslaw Narbutt, Andrew Allen, Jan Skoglund, Michael Chinen, Andrew Hines

Conference papers

Streaming spatial audio over networks requires efficient encoding techniques that compress the raw audio content without compromising quality of experience. Streaming service providers such as YouTube need a perceptually relevant objective audio quality metric to monitor users’ perceived quality and spatial localization accuracy. In this paper we introduce a full reference objective spatial audio quality metric, AMBIQUAL, which assesses both Listening Quality and Localization Accuracy. In our solution both metrics are derived directly from the B-format Ambisonic audio. The metric extends and adapts the algorithm used in ViSQOLAudio, a full reference objective metric designed for assessing speech and audio quality. …


Blockchain For Trustful Collaborations Between Immigrants, Citizens And Governments, Chun-Wei Chiang Jan 2018

Blockchain For Trustful Collaborations Between Immigrants, Citizens And Governments, Chun-Wei Chiang

Graduate Theses, Dissertations, and Problem Reports

mmigrants usually are pro-social towards their hometowns and try to improve them. However, the lack of trust in their government can drive immigrants to work individually. As a result, their pro-social activities are usually limited in impact and scope. Although blockchain technology have the potential to solve the trust issue, people are not familiar with the technology and they have no idea why it is trustworthy. Previous research showed that the adopting user interface properly can increase people's trust in technology. This paper studies the interface factors that ease collaborations between immigrants and their home governments. We specifically focus on …


Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy Jan 2018

Applying Machine Learning To Advance Cyber Security: Network Based Intrusion Detection Systems, Hassan Hadi Latheeth Al-Maksousy

Computer Science Theses & Dissertations

Many new devices, such as phones and tablets as well as traditional computer systems, rely on wireless connections to the Internet and are susceptible to attacks. Two important types of attacks are the use of malware and exploiting Internet protocol vulnerabilities in devices and network systems. These attacks form a threat on many levels and therefore any approach to dealing with these nefarious attacks will take several methods to counter. In this research, we utilize machine learning to detect and classify malware, visualize, detect and classify worms, as well as detect deauthentication attacks, a form of Denial of Service (DoS). …


Resource Optimization In Wireless Sensor Networks For An Improved Field Coverage And Cooperative Target Tracking, Husam Sweidan Jan 2018

Resource Optimization In Wireless Sensor Networks For An Improved Field Coverage And Cooperative Target Tracking, Husam Sweidan

Dissertations, Master's Theses and Master's Reports

There are various challenges that face a wireless sensor network (WSN) that mainly originate from the limited resources a sensor node usually has. A sensor node often relies on a battery as a power supply which, due to its limited capacity, tends to shorten the life-time of the node and the network as a whole. Other challenges arise from the limited capabilities of the sensors/actuators a node is equipped with, leading to complication like a poor coverage of the event, or limited mobility in the environment. This dissertation deals with the coverage problem as well as the limited power and …


Next Generation Wireless Communication Networks: Energy And Quality Of Service Considerations, Md Munjure Mowla Jan 2018

Next Generation Wireless Communication Networks: Energy And Quality Of Service Considerations, Md Munjure Mowla

Theses: Doctorates and Masters

The rapid growth in global mobile phone users has resulted in an ever-increasing demand for bandwidth and enhanced quality-of-service (QoS). Several consortia comprising major international mobile operators, infrastructure manufacturers, and academic institutions are working to develop the next generation wireless communication systems fifth generation (5G) - to support high data rates and increased QoS. 5G systems are also expected to represent a greener alternative for communication systems, which is important because power consumption from the information and communication technology (ICT) sector is forecast to increase significantly by 2030. The deployment of ultra-dense heterogeneous small cell networks (SCNs) is expected to …


Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi Jan 2018

Coexistence And Secure Communication In Wireless Networks, Saygin Bakşi

Electrical & Computer Engineering Theses & Dissertations

In a wireless system, transmitted electromagnetic waves can propagate in all directions and can be received by other users in the system. The signals received by unintended receivers pose two problems; increased interference causing lower system throughput or successful decoding of the information which removes secrecy of the communication. Radio frequency spectrum is a scarce resource and it is allocated by technologies already in use. As a result, many communication systems use the spectrum opportunistically whenever it is available in cognitive radio setting or use unlicensed bands. Hence, efficient use of spectrum by sharing users is crucial to increase maximize …