Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Old Dominion University

Series

Engineering

Articles 1 - 4 of 4

Full-Text Articles in Computer Engineering

Exploring The Relationship Between Teamwork Skills And Team Members' Centrality, Francisco Cima, Pilar Pazos, Ana Maria Canto Jan 2020

Exploring The Relationship Between Teamwork Skills And Team Members' Centrality, Francisco Cima, Pilar Pazos, Ana Maria Canto

Engineering Management & Systems Engineering Faculty Publications

The present paper describes an exploratory study of small teams working on a four-month project as part of a graduate engineering program. The research had two primary goals. The first was to utilize the log files from shared repositories used for team collaboration to describe the network structure of the teams. The second was to determine whether the network centrality of any individual team member is associated with their teamwork skills and attitudes towards the collaboration platform. The relationship between teamwork skills, attitudes towards the collaboration technology, and the centrality index was explored using Pearson correlations. A total of 35 …


A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo Jan 2020

A Tutorial And Future Research For Building A Blockchain-Based Secure Communication Scheme For Internet Of Intelligent Things, Mohammad Wazid, Ashok Kumar Das, Sachin Shetty, Minho Jo

Computational Modeling & Simulation Engineering Faculty Publications

The Internet of Intelligent Things (IoIT) communication environment can be utilized in various types of applications (for example, intelligent battlefields, smart healthcare systems, the industrial internet, home automation, and many more). Communications that happen in such environments can have different types of security and privacy issues, which can be resolved through the utilization of blockchain. In this paper, we propose a tutorial that aims in desiging a generalized blockchain-based secure authentication key management scheme for the IoIT environment. Moreover, some issues with using blockchain for a communication environment are discussed as future research directions. The details of different types of …


Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa Jan 2007

Applying The Levels Of Conceptual Interoperability Model In Support Of Integratability, Interoperability, And Composability For System-Of-Systems Engineering, Andreas Tolk, Saikou Y. Diallo, Charles D. Turnitsa

Computational Modeling & Simulation Engineering Faculty Publications

The Levels of Conceptual Interoperability Model (LCIM) was developed to cope with the different layers of interoperation of modeling & simulation applications. It introduced technical, syntactic, semantic, pragmatic, dynamic, and conceptual layers of interoperation and showed how they are related to the ideas of integratability, interoperability, and composability. The model was successfully applied in various domains of systems, cybernetics, and informatics.


Management Of Extremes In The Configuration Of Interoffice Telephone Switch & Priority Systems, C. Ariel Pinto Jan 2005

Management Of Extremes In The Configuration Of Interoffice Telephone Switch & Priority Systems, C. Ariel Pinto

Engineering Management & Systems Engineering Faculty Publications

This paper describes how to enable diverse enterprise customers for voice-data switch to achieve in configuration a balance among users, features, and perceived reliability subject to extremes of traffic. The analysis entailed the simulation of the voice-data switch with embedded priority system, generation of latency times for various configurations and transaction traffic rates, and the development of a framework and theoretical propositions for configuration of super-saturated systems. It was shown that the concept of tolerance levels defined in the risk of extreme events can be applied for embedded priority systems and was the basis for the application of the zone-configuration …