Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 31 - 60 of 2210

Full-Text Articles in Engineering

Hybrid Method Neighbor Node Discovery In Wireless Sensor Networks: A Framework, Sagar Mekala, Shahu Chatrapati Kaila, Jyothi Rani Matang Apr 2024

Hybrid Method Neighbor Node Discovery In Wireless Sensor Networks: A Framework, Sagar Mekala, Shahu Chatrapati Kaila, Jyothi Rani Matang

Makara Journal of Technology

Wireless devices are now being adapted for diverse purposes, such as healthcare, agriculture, transportation, and tactical operations, which present challenges in network formation owing to high device mobility. Current methods rely on discovery techniques for forming wireless sensor networks (WSNs); however, the existing research has been criticized for its high time complexity and redundant neighbor discovery process. In this study, we provide a hybrid strategy to effectively handle the difficulties of locating neighboring nodes in WSNs. Our method combines several strategies to produce precise and effective neighbor detection. Herein, shared memory–based discovery, a beacon technique, and range and distance overlap …


The Next Threat Landscape: Securing America’S Cyber-Physical Systems, Grayson Thomas Apr 2024

The Next Threat Landscape: Securing America’S Cyber-Physical Systems, Grayson Thomas

Honors College Theses

The goal of this research is to explore, identify, and enumerate the security threats that exist to industry current industrial controls systems (ICS) and supervisory control and data acquisition systems (SCADA). A scale lab similar to industry standard will be built and developed for research purposes. The Purdue Model for ICS and the Cyber Kill Chain will be referenced as frameworks for attack sequences, and the MITRE ATT&CK framework will be referenced for attack types. Attempts will be made to compromise the various pieces of our built SCADA system via configuration errors, software vulnerabilities, and deployment mistakes common with industrial …


A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka Apr 2024

A Design Science Approach To Investigating Decentralized Identity Technology, Janelle Krupicka

Cybersecurity Undergraduate Research Showcase

The internet needs secure forms of identity authentication to function properly, but identity authentication is not a core part of the internet’s architecture. Instead, approaches to identity verification vary, often using centralized stores of identity information that are targets of cyber attacks. Decentralized identity is a secure way to manage identity online that puts users’ identities in their own hands and that has the potential to become a core part of cybersecurity. However, decentralized identity technology is new and continually evolving, which makes implementing this technology in an organizational setting challenging. This paper suggests that, in the future, decentralized identity …


Enhancing Cybersecurity Learning Efficiency: Leveraging Spaced Repetition Systems For Rapid Adaptation, Takudzwanashe Nyabadza Apr 2024

Enhancing Cybersecurity Learning Efficiency: Leveraging Spaced Repetition Systems For Rapid Adaptation, Takudzwanashe Nyabadza

Research Week

No abstract provided.


Secure Cislunar Communication Architecture: Cryptographic Capabilities And Protocols For Lunar Missions, Michael Hamblin, Bilal Abu Bakr Apr 2024

Secure Cislunar Communication Architecture: Cryptographic Capabilities And Protocols For Lunar Missions, Michael Hamblin, Bilal Abu Bakr

Research Week

The surge in lunar missions intensifies concerns about congestion and communication reliability. This study proposes a secure cislunar architecture for real-time, cross-mission information exchange. We focus on cryptographic protocols and network design for a native IPv6 cislunar transit system.

Through a review of internet and space communication advancements, we emphasize the need for a secure network, exemplified by LunaNet. A robust data transit system with encryption is crucial for a common communication infrastructure. Traditional protocols face latency challenges. We advocate for user-friendly encryption methods to address confidentiality within the CIA Triad. Integrity is maintained through cryptographic message authentication codes. Availability …


Cyber Attacks Against Industrial Control Systems, Adam Kardorff Apr 2024

Cyber Attacks Against Industrial Control Systems, Adam Kardorff

LSU Master's Theses

Industrial Control Systems (ICS) are the foundation of our critical infrastructure, and allow for the manufacturing of the products we need. These systems monitor and control power plants, water treatment plants, manufacturing plants, and much more. The security of these systems is crucial to our everyday lives and to the safety of those working with ICS. In this thesis we examined how an attacker can take control of these systems using a power plant simulator in the Applied Cybersecurity Lab at LSU. Running experiments on a live environment can be costly and dangerous, so using a simulated environment is the …


Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem Mar 2024

Performance Analysis Of Mobile Edge Computing Deployment Models In 5g Networks, Safaa Alali, Abdulkaim Assalem

Jerash for Research and Studies Journal مجلة جرش للبحوث والدراسات

5G networks and Mobile Edge Computing (MEC) are two main pillars of the next technological revolution. The first pillar provides ultra-reliable, high-bandwidth connectivity with ultra-low latency, while the second pillar gives mobile networks cloud computing capabilities at the edge of the network, enabling compute-dense, context-aware services for mobile users. So the next generation of mobile networks will see close integration between computing and communication. Therefore, it was necessary to study the different deployment options for edge hosts in 5G network, to know the effect of those options on the overall performance of the network. In this research, (Omnetpp 6.0) network …


Data-Driven Approaches For Enhancing Power Grid Reliability, Behrouz Sohrabi Mar 2024

Data-Driven Approaches For Enhancing Power Grid Reliability, Behrouz Sohrabi

Electronic Theses and Dissertations

This thesis explores the transformative potential of data-driven approaches in addressing key operational and reliability issues in power systems. The first part of this thesis addresses a prevalent problem in power distribution networks: the accurate identification of load phases. This study develops a data-driven model leveraging consumption measurements from smart meters and corresponding substation data to reconstruct topology information in low-voltage distribution networks. The proposed model is extensively tested using a dataset with more than 5,000 real load profiles, demonstrating satisfactory performance for large-scale networks. The second part of the thesis pivots to a crucial safety concern: the risk and …


Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin Feb 2024

Emoji Use In Social Media Posts: Relationships With Personality Traits And Word Usage, Shelia Kennison, Kameryn Fritz, Maria Andrea Hurtado Morales, Eric Chan-Tin

Computer Science: Faculty Publications and Other Works

Prior research has demonstrated relationships between personality traits of social media users and the language used in their posts. Few studies have examined whether there are relationships between personality traits of users and how they use emojis in their social media posts. Emojis are digital pictographs used to express ideas and emotions. There are thousands of emojis, which depict faces with expressions, objects, animals, and activities. We conducted a study with two samples (n = 76 and n = 245) in which we examined how emoji use on X (formerly Twitter) related to users’ personality traits and language use …


Fair Fault-Tolerant Approach For Access Point Failures In Networked Control System Greenhouses, Mohammed Ali Yaslam Ba Humaish Feb 2024

Fair Fault-Tolerant Approach For Access Point Failures In Networked Control System Greenhouses, Mohammed Ali Yaslam Ba Humaish

Theses and Dissertations

Greenhouse Networked Control Systems (NCS) are popular applications in modern agriculture due to their ability to monitor and control various environmental factors that can affect crop growth and quality. However, designing and operating a greenhouse in the context of NCS could be challenging due to the need for highly available and cost-efficient systems. This thesis presents a design methodology for greenhouse NCS that addresses these challenges, offering a framework to optimize crop productivity, minimize costs, and improve system availability and reliability. It contributes several innovations to the field of greenhouse NCS design. For example, it recommends using the 2.4GHz frequency …


Adaptive Inter-Vehicular Collaboration For Level 5 Autonomous Driving, Sumbal Malik Feb 2024

Adaptive Inter-Vehicular Collaboration For Level 5 Autonomous Driving, Sumbal Malik

Dissertations

The evolution of sensor technologies, mobile networks, and artificial intelligence has significantly expanded the horizons of various sectors, notably in autonomous driving. According to the World Health Organization, over 1.3 million people succumb to traffic accidents annually, predominantly due to human negligence. Complex urban environments, characterized by mixed traffic flow involving Human Driven Vehicles and Connected and Autonomous Vehicles, intricate traffic patterns, frequent lane changes, and slow speeds, face escalating challenges related to traffic accidents and congestion. These challenges lead to wasted time, increased fuel consumption, and heightened pollution emission levels. Hence, the development of a safe and robust version …


Tree Localization In A Plantation Using Ultra Wideband Signals, Akshat Verma Jan 2024

Tree Localization In A Plantation Using Ultra Wideband Signals, Akshat Verma

The Journal of Purdue Undergraduate Research

No abstract provided.


Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan Jan 2024

Securing Edge Computing: A Hierarchical Iot Service Framework, Sajan Poudel, Nishar Miya, Rasib Khan

Posters-at-the-Capitol

Title: Securing Edge Computing: A Hierarchical IoT Service Framework

Authors: Nishar Miya, Sajan Poudel, Faculty Advisor: Rasib Khan, Ph.D.

Department: School of Computing and Analytics, College of Informatics, Northern Kentucky University

Abstract:

Edge computing, a paradigm shift in data processing, faces a critical challenge: ensuring security in a landscape marked by decentralization, distributed nodes, and a myriad of devices. These factors make traditional security measures inadequate, as they cannot effectively address the unique vulnerabilities of edge environments. Our research introduces a hierarchical framework that excels in securing IoT-based edge services against these inherent risks.

Our secure by design approach prioritizes …


Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le Jan 2024

Motivations Driving Video Research Podcasts: Impact On Value And Creation Of Research Video Presentations, My Doan, Anh Tran, Na Le

Posters-at-the-Capitol

Abstract

Purpose: The purpose of the study is to better understand the role and impact of video research podcasts in bridging the gap between academia and the general public, especially concerning the challenges of accessibility and comprehension of scholarly research.

Methods: A 10-question survey was administered to evaluate the effectiveness, utility, and acceptance of video recordings in research presentations. The survey also aimed to gather insights into the motivations, challenges, and benefits of using video podcasts for research dissemination. Results were then analyzed using the Unified Theory of Acceptance and Use of Technology (UTAUT) model.

Results: There were 102 respondents …


Digital Phobia: An Inquiry For Mapping The Unseen Dimension Of New Digital Anxiety, The ‘Digiphobia’, Amarjit Kumar Singh ,Library Assistant, Md. Arshad Ali , Professional Assistant, Dr. Pankaj Mathur, Deputy Librarian, Jan 2024

Digital Phobia: An Inquiry For Mapping The Unseen Dimension Of New Digital Anxiety, The ‘Digiphobia’, Amarjit Kumar Singh ,Library Assistant, Md. Arshad Ali , Professional Assistant, Dr. Pankaj Mathur, Deputy Librarian,

Library Philosophy and Practice (e-journal)

Background: As technology continues to advance, individuals' interactions with digital platforms have become integral to daily life. Amidst this technological evolution, a novel concern emerges—Digital Phobia, hereafter referred to as “Digiphobia.” This phenomenon, although not previously explored in scholarly literature, necessitates an in-depth investigation due to its potential impact on individuals' well-being. Our research employs a two-step methodology to investigate its existence, implications, and manifestations.

Introduction: This research paper introduces and proposes the term "Digiphobia" as a comprehensive conceptualization of anxiety arising from interactions with digital spaces, applications, and environments. The proliferation of digital technologies has led to the emergence …


Alice In Cyberspace 2024, Stanley Mierzwa Jan 2024

Alice In Cyberspace 2024, Stanley Mierzwa

Center for Cybersecurity

‘Alice in Cyberspace’ Conference Nurtures Women’s Interest, Representation in Cybersecurity


Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman Jan 2024

Railroad Condition Monitoring Using Distributed Acoustic Sensing And Deep Learning Techniques, Md Arifur Rahman

Electronic Theses and Dissertations

Proper condition monitoring has been a major issue among railroad administrations since it might cause catastrophic dilemmas that lead to fatalities or damage to the infrastructure. Although various aspects of train safety have been conducted by scholars, in-motion monitoring detection of defect occurrence, cause, and severity is still a big concern. Hence extensive studies are still required to enhance the accuracy of inspection methods for railroad condition monitoring (CM). Distributed acoustic sensing (DAS) has been recognized as a promising method because of its sensing capabilities over long distances and for massive structures. As DAS produces large datasets, algorithms for precise …


Constructing And Probing A Fortified Network, Maxim Davis Jan 2024

Constructing And Probing A Fortified Network, Maxim Davis

Williams Honors College, Honors Research Projects

Computer networking is extremely valuable and is essential to modern infrastructure and life. Due to this fact, network security is also extremely vital and is also constantly under attack due to how precious information is in the modern world. In order to set up network security and harden systems from attack, many organizations establish guidelines, standards and techniques to defend against such threats. There is also the major issue of needing to constantly test these different standards and procedures regarding network security as if these security measures are not tested, the danger of potential threats is exponential. This project seeks …


Development Of A Solidworks Api, Andrew Magyar Jan 2024

Development Of A Solidworks Api, Andrew Magyar

Williams Honors College, Honors Research Projects

With the current advancements in CAD software, and precision of modern motors, we believe that a new way to communicate from hardware to software is possible. This report details the steps we have taken to attempt just that. The essential idea behind this is that modern controls for robotics are not as user friendly as they can be. The general action taken is to create an API for SolidWorks that connects it to the other necessary controller software and makes it so that a robot, and its exact current position, can be changed simply and intuitively from SolidWorks. Furthermore, the …


A Metaverse Of Chinese Traditional Folk Villages And Houses With Great Aesthetic Pleasure: A Virtual World Dedicated To The Enthusiasts Of Life With Art, Culture, History And Architectures, Xiaobin Lin Jan 2024

A Metaverse Of Chinese Traditional Folk Villages And Houses With Great Aesthetic Pleasure: A Virtual World Dedicated To The Enthusiasts Of Life With Art, Culture, History And Architectures, Xiaobin Lin

MA Projects

Rapid growth of 3D visualisation technology has led to the maturation of metaverse, bringing innovative and immersive experiences to travellers and representing tremendous potential for revolutionising the tourism industry. Advantages of metaverse, plummeting cost of technology and emerging supportive policies are jointly building up a very promising future of metaverse in tourism. Big companies worldwide are heavily investing in metaverse. In China, Tencent SSV Digital Culture Lab has initiated the annual project “Explore Metaverse Plan”, providing a communication platform and exhibition opportunity for the small and midsize players working on the digitalisation of cultural and artistic heritage. Google Art & …


Explore Security And Machine Learning Applications In Next Generation Wireless Networks, Haolin Tang Jan 2024

Explore Security And Machine Learning Applications In Next Generation Wireless Networks, Haolin Tang

Theses and Dissertations

Next-generation (NextG) or Beyond-Fifth-Generation (B5G) wireless networks have become a prominent focus in academic and industry circles. This is driven by the increasing demand for cutting-edge applications such as mobile health, self-driving cars, the metaverse, digital twins, virtual reality, and more. These diverse applications typically require high communication network performance, including spectrum utilization, data speed, and latency. New technologies are emerging to meet the communication requirements of various applications. Intelligent Reflecting Surface (IRS) and Artificial Intelligence (AI) are two representatives that have been demonstrated as promising and powerful technologies in NextG communications. While new technologies significantly enhance communication performance, they …


Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco Jan 2024

Key Issues Of Predictive Analytics Implementation: A Sociotechnical Perspective, Leida Chen, Ravi Nath, Nevina Rocco

Journal of International Technology and Information Management

Developing an effective business analytics function within a company has become a crucial component to an organization’s competitive advantage today. Predictive analytics enables an organization to make proactive, data-driven decisions. While companies are increasing their investments in data and analytics technologies, little research effort has been devoted to understanding how to best convert analytics assets into positive business performance. This issue can be best studied from the socio-technical perspective to gain a holistic understanding of the key factors relevant to implementing predictive analytics. Based upon information from structured interviews with information technology and analytics executives of 11 organizations across the …


Internet-Of-Things Privacy In Wifi Networks: Side-Channel Leakage And Mitigations, Mnassar Alyami Jan 2024

Internet-Of-Things Privacy In Wifi Networks: Side-Channel Leakage And Mitigations, Mnassar Alyami

Graduate Thesis and Dissertation 2023-2024

WiFi networks are susceptible to statistical traffic analysis attacks. Despite encryption, the metadata of encrypted traffic, such as packet inter-arrival time and size, remains visible. This visibility allows potential eavesdroppers to infer private information in the Internet of Things (IoT) environment. For example, it allows for the identification of sleep monitors and the inference of whether a user is awake or asleep.

WiFi eavesdropping theoretically enables the identification of IoT devices without the need to join the victim's network. This attack scenario is more realistic and much harder to defend against, thus posing a real threat to user privacy. However, …


A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami Jan 2024

A New Cache Replacement Policy In Named Data Network Based On Fib Table Information, Mehran Hosseinzadeh, Neda Moghim, Samira Taheri, Nasrin Gholami

VMASC Publications

Named Data Network (NDN) is proposed for the Internet as an information-centric architecture. Content storing in the router’s cache plays a significant role in NDN. When a router’s cache becomes full, a cache replacement policy determines which content should be discarded for the new content storage. This paper proposes a new cache replacement policy called Discard of Fast Retrievable Content (DFRC). In DFRC, the retrieval time of the content is evaluated using the FIB table information, and the content with less retrieval time receives more discard priority. An impact weight is also used to involve both the grade of retrieval …


Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong Jan 2024

Anonymous Attribute-Based Broadcast Encryption With Hidden Multiple Access Structures, Tran Viet Xuan Phuong

School of Cybersecurity Faculty Publications

Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the correct participant but also respects the security of the identity user. In addition, when delivered, all the information must be protected for the party who employs the broadcasting service. Currently, Attribute-Based Broadcast Encryption (ABBE) is useful to apply for the broadcasting service. (ABBE) is a combination of Attribute-Based Encryption (ABE) and Broadcast Encryption (BE), which allows a broadcaster (or encrypter) to broadcast an encrypted message, including a predefined user set and specified access policy to …


Information Access For Infrastructurally-Challenged Environments And Beyond Through Mutually Aware Spectrum Sharing Technologies, Karyn Doke Jan 2024

Information Access For Infrastructurally-Challenged Environments And Beyond Through Mutually Aware Spectrum Sharing Technologies, Karyn Doke

Electronic Theses & Dissertations (2024 - present)

The Radio Frequency (RF) spectrum is scarce and to make it available for new mobile wireless services, regulators are forced to re-allocate spectrum from existing services or develop mechanisms to share spectrum with new entries. Television White Space (TVWS) and Citizen Broadband Radio Service (CBRS) are two examples of recently commercialized spectrum sharing technologies. TVWS enables sharing among fixed wireless broadband technologies (secondary users) and terrestrial TV broadcast services (primary users). CBRS enables spectrum sharing among 5G/LTE (secondary users) and naval radar (primary users). With both technologies, a central database determines when it is safe for secondary users to operate …


Exploring The Diffusion Potential Of A Collaborative Mobile Platform For Disaster Management And Relief, Joao De Mendonca Salim Jan 2024

Exploring The Diffusion Potential Of A Collaborative Mobile Platform For Disaster Management And Relief, Joao De Mendonca Salim

Honors Undergraduate Theses

This thesis describes the creation of a collaborative digital platform for disaster management and relief, focusing on the case study of the city of Petrópolis natural disaster in February 2022. The frequency and intensity of natural disasters are rising, necessitating efficient and timely disaster response efforts. This thesis details the development of a software application that fosters collaboration among governmental agencies, emergency services, non-governmental organizations (NGOs), and civil society to enhance logistical planning and situational awareness during disasters. The proposed platform harnesses the power of social networking and leverages the ubiquitous presence of smartphones equipped with cameras, GPS, and sensors …


The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin Jan 2024

The Impact Of Social Media On Charitable Giving For Nonprofit Organization, Namchul Shin

Journal of International Technology and Information Management

Research has extensively studied nonprofit organizations’ use of social media for communications and interactions with supporters. However, there has been limited research examining the impact of social media on charitable giving. This research attempts to address the gap by empirically examining the relationship between the use of social media and charitable giving for nonprofit organizations. We employ a data set of the Nonprofit Times’ top 100 nonprofits ranked by total revenue for the empirical analysis. As measures for social media traction, i.e., how extensively nonprofits draw supporters on their social media sites, we use Facebook Likes, Twitter Followers, and Instagram …


How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström Jan 2024

How Does Digitalisation Transform Business Models In Ropax Ports? A Multi-Site Study Of Port Authorities, Yiran Chen, Anastasia Tsvetkova, Kristel Edelman, Irina Wahlström, Marikka Heikkila, Magnus Hellström

Journal of International Technology and Information Management

This article investigates the relationship between digitalisation and business model changes in RoPax ports. The study is based on six RoPax ports in Northern Europe, examining their digitalisation efforts and the resulting changes in their business models, leading to further digital transformation. The paper offers insights by reviewing relevant literature on digitalisation’s role in business model innovation and its application in ports. The findings reveal that digitalisation supports relevant business model changes concerning port operation integration within logistics chains, communication, documentation flow, and cargo flow optimisation. However, exploring digitalisation’s potential for diversifying value propositions is still limited. Most digitalisation efforts …


What Can We Learn From A Co-Creation Journey For A Quick Scan Digital Transformation Maturity Assessment Tool For Development Ngos?, Anand Sheombar Jan 2024

What Can We Learn From A Co-Creation Journey For A Quick Scan Digital Transformation Maturity Assessment Tool For Development Ngos?, Anand Sheombar

Journal of International Technology and Information Management

This paper describes the approach and lessons learned from a co-creation process with Dutch development NGOs to create a practical and easy-to-use assessment tool for practitioners to assess the organisation's maturity level of digital transformation. For this study, we applied a design science research methodology, specifically a six-step co-creation approach suitable for developing maturity models. The digital maturity assessment tool (quick scan) created is a domain- specific digital transformation maturity tool for development NGOs rather than a generally applicable tool. This artefact was evaluated using an eight-point Requirements framework for the development of digital maturity assessment tools. By developing a …