Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

2020

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 161

Full-Text Articles in Computer Engineering

Three Emerging Innovative Technologies Required For Cyber Operations To Execute Commander’S Intent At Machine Speed, Andrew Stewart Dec 2020

Three Emerging Innovative Technologies Required For Cyber Operations To Execute Commander’S Intent At Machine Speed, Andrew Stewart

Military Cyber Affairs

Decision advantage for the DoD and Combined Cyber Operations results from the secure, seamless, and rapid maneuver of data and information. In the DoD’s 2018 Artificial Intelligence Strategy, the DoD recognized that it must, “put in place key building blocks and platforms to scale and democratize access to AI. This includes creating a common foundation of shared data, reusable tools, frameworks and standards, and cloud and edge services.”[1] More than ever, integrated, adaptive cyber operations provide the means of maneuver for data to enable DoD’s decision advantage-based goals. To support this vision, the integrated implementation three innovative cyber technologies …


Assessing Impacts Of 5th Generation (5g) Cellular Telecommunications On Internet Of Things (Iot) Deployments, Michael Love, Marwan Jamal Dec 2020

Assessing Impacts Of 5th Generation (5g) Cellular Telecommunications On Internet Of Things (Iot) Deployments, Michael Love, Marwan Jamal

Military Cyber Affairs

The Internet of Things (IoT) is emerging as a primary enabler of the transformation to digital business services in today’s economy. At the same time, 5th Generation (5G) cellular transport technology is emerging as a viable means to support IoT data requirements. Although 5G is still in its infancy, DoD leaders need to understand the impacts that 5G will have on IoT projects as there are several challenges involved with integrating 5G into IoT. In order to achieve the maximum benefits of high bandwidth, low latency and superior performance, an entirely new grid of cell sites and access units …


A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany Dec 2020

A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany

Future Computing and Informatics Journal

Requirements engineering is a crucial phase of software engineering, and requirements prioritization is an essential stage of requirements engineering particularly in agile software development. Requirements prioritization goals at eliciting which requirements of software need to be covered in a particular release. The key point is which requirement will be selected in the next iteration and which one will be delayed to other iterations for minimizing risk during development and meeting stakeholders’ needs. There are many existing techniques for requirement prioritization, but most of these techniques do not cover continuous growth, change of requirements, and requirements dependencies. The prioritization techniques need …


The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro Dec 2020

The Ftc And Ai Governance: A Regulatory Proposal, Michael Spiro

Seattle Journal of Technology, Environmental & Innovation Law

No abstract provided.


Network Virtualization And Emulation Using Docker, Openvswitch And Mininet-Based Link Emulation, Narendra Prabhu Dec 2020

Network Virtualization And Emulation Using Docker, Openvswitch And Mininet-Based Link Emulation, Narendra Prabhu

Masters Theses

With the advent of virtualization and artificial intelligence, research on networked systems has progressed substantially. As the technology progresses, we expect a boom in not only the systems research but also in the network of systems domain. It is paramount that we understand and develop methodologies to connect and communicate among the plethora of devices and systems that exist today. One such area is mobile ad-hoc and space communication, which further complicates the task of networking due to myriad of environmental and physical conditions. Developing and testing such systems is an important step considering the large investment required to build …


Performance Evaluation Of Classical And Quantum Communication Systems, Gayane Vardoyan Dec 2020

Performance Evaluation Of Classical And Quantum Communication Systems, Gayane Vardoyan

Doctoral Dissertations

The Transmission Control Protocol (TCP) is a robust and reliable method used to transport data across a network. Many variants of TCP exist, e.g., Scalable TCP, CUBIC, and H-TCP. While some of them have been studied from empirical and theoretical perspectives, others have been less amenable to a thorough mathematical analysis. Moreover, some of the more popular variants had not been analyzed in the context of the high-speed environments for which they were designed. To address this issue, we develop a generalized modeling technique for TCP congestion control under the assumption of high bandwidth-delay product. In a separate contribution, we …


Monetary Impact Of National Exchange Carrier Association Tariffs On Internet Access Cost In Rural Areas, Tim Obermier, Angela K. Hollman Dec 2020

Monetary Impact Of National Exchange Carrier Association Tariffs On Internet Access Cost In Rural Areas, Tim Obermier, Angela K. Hollman

Mountain Plains Journal of Business and Technology

This study examines the monetary impact of tariffs on consumer internet access via a digital subscriber line (DSL). Historically, the Communications Act of 1934 mandated that telephony services be provided to everyone, without exclusion. With the rapid emergence of the internet, the Connect America Fund was recently implemented to ensure equal access to both voice and broadband services. Since many telephony companies have emerged as internet service providers, DSL internet service is often bundled together with a landline telephone, especially in rural areas. This study examines the total cost of such bundled DSL internet service across the classes of cities …


An Efficient Deep-Learning-Based Detection And Classification System For Cyber-Attacks In Iot Communication Networks, Qasem Abu Al-Haija, Saleh Zein-Sabatto Dec 2020

An Efficient Deep-Learning-Based Detection And Classification System For Cyber-Attacks In Iot Communication Networks, Qasem Abu Al-Haija, Saleh Zein-Sabatto

Electrical and Computer Engineering Faculty Research

With the rapid expansion of intelligent resource-constrained devices and high-speed communication technologies, the Internet of Things (IoT) has earned wide recognition as the primary standard for low-power lossy networks (LLNs). Nevertheless, IoT infrastructures are vulnerable to cyber-attacks due to the constraints in computation, storage, and communication capacity of the endpoint devices. From one side, the majority of newly developed cyber-attacks are formed by slightly mutating formerly established cyber-attacks to produce a new attack that tends to be treated as normal traffic through the IoT network. From the other side, the influence of coupling the deep learning techniques with the cybersecurity …


Intelligent Networks For High Performance Computing, William Whitney Schonbein Dec 2020

Intelligent Networks For High Performance Computing, William Whitney Schonbein

Computer Science ETDs

There exists a resurgence of interest in `smart' network interfaces that can operate on data as it flows through a network. However, while smart capabilities have been expanding, what they can do for high-performance computing (HPC) is not well-understood. In this work, we advance our understanding of the capabilities and contributions of smart network interfaces to HPC. First, we show current offloaded message demultiplexing can mitigate (but not eliminate) overheads incurred by multithreaded communication. Second, we demonstrate current offloaded capabilities can be leveraged to provide Turing complete program execution on the interface. We elaborate with a framework for offloading arbitrary …


How Live Streaming And Twitch Have Changed The Gaming Industry, Krystal Ruiz Dec 2020

How Live Streaming And Twitch Have Changed The Gaming Industry, Krystal Ruiz

ART 108: Introduction to Games Studies

Live streaming in itself has become a booming industry in which its content consists of “streamers” who live broadcast numerous events and real-time interactions while simultaneously chatting with viewers drawing huge and increasing numbers (Adamovich). Twitch has especially excelled at garnering attention as one of the most popular live streaming platforms that focuses on broadcasting and viewing video game content (Adamovich). Twitch has grown rapidly within the last few years asserting its dominance as one of the major forces in the games industry and becoming a multi-billion-dollar industry (Adamovich). For example, according to Descrier, in 2016 there were approximately 292 …


Multi-Layer Utilization Of Beamforming In Millimeter Wave Mimo Systems, Mustafa S. Aljumaily Dec 2020

Multi-Layer Utilization Of Beamforming In Millimeter Wave Mimo Systems, Mustafa S. Aljumaily

Doctoral Dissertations

mmWave frequencies ranging between (30-300GHz) have been considered the perfect solution to the scarcity of bandwidth in the traditional sub-6GHz band and to the ever increasing demand of many emerging applications in today's era. 5G and beyond standards are all considering the mmWave as an essential part of there networks. Beamforming is one of the most important enabling technologies for the mmWave to compensate for the huge propagation lose of these frequencies compared to the sub-6GHz frequencies and to ensure better spatial and spectral utilization of the mmWave channel space. In this work, we tried to develop different techniques to …


Evaluation Of Characteristics Of Wireless Sensor Networks With Analytical Modeling, Halim Khujamatov, Ernazar Reypnazarov, Doston Hasanov, Elaman Nurullaev, Shahzod Sobirov Dec 2020

Evaluation Of Characteristics Of Wireless Sensor Networks With Analytical Modeling, Halim Khujamatov, Ernazar Reypnazarov, Doston Hasanov, Elaman Nurullaev, Shahzod Sobirov

Bulletin of TUIT: Management and Communication Technologies

In this paper, a mathematical model of the operation process of the ZigBee standard wireless network for remote monitoring systems based on the Markov chain apparatus was developed. Using the model was evaluated of the operation process of the CSMA/CA algorithm of the MAC level of the IEEE 802.15.4 ZigBee standard. The peculiarity of this mathematical model is that it takes into account the level of loading of network elements and potential distortions in the transmitted packets as a result of the influence of interference. Using the developed mathematical model, the main characteristics of the network operation process, such as …


Authentication Based On Blockchain, Norah Alilwit Dec 2020

Authentication Based On Blockchain, Norah Alilwit

Doctoral Dissertations and Master's Theses

Across past decade online services have enabled individuals and organizations to perform different types of transactions such as banking, government transactions etc. The online services have also enabled more developments of applications, at cheap cost with elastic and scalable, fault tolerant system. These online services are offered by services providers which are use authentication, authorization and accounting framework based on client-server model. Though this model has been used over decades, study shows it is vulnerable to different hacks and it is also inconvenient to use for the end users. In addition, the services provider has total control over user data …


Pedagogy Of The Pandemic: A Case Study Of Emergency Remote Education In A Private Higher Education Institution In Egypt, Rania M Rafik Khalil, Shadia Fahim, Wadouda Badran, Hadia Fakhreldin, Maguid Hassan, Hani Ghali, Attia Attia, Sarah Khalil, Hassan Abdelhamid, Yasmine Abdel Moneim, Omar H. Karam Nov 2020

Pedagogy Of The Pandemic: A Case Study Of Emergency Remote Education In A Private Higher Education Institution In Egypt, Rania M Rafik Khalil, Shadia Fahim, Wadouda Badran, Hadia Fakhreldin, Maguid Hassan, Hani Ghali, Attia Attia, Sarah Khalil, Hassan Abdelhamid, Yasmine Abdel Moneim, Omar H. Karam

English Language and Literature

COVID19 caught almost every higher education institution off guard. The pandemic interrupted the teaching and learning process and required immediate implementation of emergency remote learning strategies. Teaching pedagogy turned to new ways of thinking about learning. Consequently, both academic staff and students had to adapt without warning to the challenges of teaching with advanced technology from home which was taking the world by storm. Overcoming this challenge in Egypt has been much easier for private universities in comparison to state universities because of the availability of facilities, funding, smaller cohorts and validation by partner western universities. This paper shares reflections …


Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof. Nov 2020

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


Monitoring Of Remote Hydrocarbon Wells Using Azure Internet Of Things, Derek W. Staal Nov 2020

Monitoring Of Remote Hydrocarbon Wells Using Azure Internet Of Things, Derek W. Staal

LSU Master's Theses

Remote monitoring of hydrocarbon wells is a tedious and meticulously thought out task performed to create a cyber-physical bridge between the asset and the owner. There are many systems and techniques on the market that offer this solution but due to their lack of interoperability and/or decentralized architecture they begin to fall apart when remote assets become farther away from the client. This results in extreme latency and thus poor decision making. Microsoft's Azure IoT Edge was the focus of this writing. Coupled with off-the-shelf hardware, Azure's IoT Edge services were integrated with an existing unit simulating a remote hydrocarbon …


Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle Nov 2020

Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle

Computer Science ETDs

Existing communication protocols in security networks are highly centralized. While this naively makes the controls easier to physically secure, external actors require fewer resources to disrupt the system because there are fewer points in the system can be interrupted without the entire system failing. We present a solution to this problem using a proof-of-work-based blockchain implementation built on MultiChain. We construct a test-bed network containing visual imagers and microwave sensor information. These data types are ubiquitous in perimeter security systems and allow a realistic representation of a real-world network architecture. The cameras in this system use an object detection algorithm …


Incentivization In Mobile Edge Computing Using A Full Bayesian Approach, Sean Lebien Nov 2020

Incentivization In Mobile Edge Computing Using A Full Bayesian Approach, Sean Lebien

Electrical and Computer Engineering ETDs

The advances of multi-access edge computing (MEC) have paved the way for the integration of the MEC servers, as intelligent entities into the Internet of Things (IoT) environment as well as into the 5G radio access networks. In this thesis, a novel artificial intelligence-based MEC servers’ activation mechanism is proposed, by adopting the principles of Reinforcement Learning (RL) and Bayesian Reasoning. The considered problem enables the MEC servers’ activation decision-making, aiming at enhancing the reputation of the overall MEC system, as well as considering the total computing costs to serve efficiently the users’ computing demands, guaranteeing at the same time …


Network Effects In Action, Christopher S. Yoo Nov 2020

Network Effects In Action, Christopher S. Yoo

All Faculty Scholarship

This Chapter begins by examining and exploring the theoretical and empirical limits of the possible bases of network effects, paying particular attention to the most commonly cited framework known as Metcalfe’s Law. It continues by exploring the concept of network externalities, defined as the positive external consumption benefits that the decision to join a network creates for the other members of the network, which is more ambiguous than commonly realized. It then reviews the structural factors needed for models based on network effects to have anticompetitive effects and identifies other factors that can dissipate those effects. Finally, it identifies alternative …


A Novel Energy-Efficient Sensor Cloud Model Using Data Prediction And Forecasting Techniques, Kalyan Das, Satyabrata Das, Aurobindo Mohapatra Oct 2020

A Novel Energy-Efficient Sensor Cloud Model Using Data Prediction And Forecasting Techniques, Kalyan Das, Satyabrata Das, Aurobindo Mohapatra

Karbala International Journal of Modern Science

An energy-efficient sensor cloud model is proposed based on the combination of prediction and forecasting methods. The prediction using Artificial Neural Network (ANN) with single activation function and forecasting using Autoregressive Integrated Moving Average (ARIMA) models use to reduce the communication of data. The requests of the users generate in every second. These requests must be transferred to the wireless sensor network (WSN) through the cloud system in the traditional model, which consumes extra energy. In our approach, instead of one second, the sensors generally communicate with the cloud every 24 hours, and most of the requests reply using the …


A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B. Oct 2020

A Novel Framework Using Neutrosophy For Integrated Speech And Text Sentiment Analysis, Florentin Smarandache, Kritika Mishra, Ilanthenral Kandasamy, Vasantha Kandasamy W.B.

Branch Mathematics and Statistics Faculty and Staff Publications

With increasing data on the Internet, it is becoming difficult to analyze every bit and make sure it can be used efficiently for all the businesses. One useful technique using Natural Language Processing (NLP) is sentiment analysis. Various algorithms can be used to classify textual data based on various scales ranging from just positive-negative, positive-neutral-negative to a wide spectrum of emotions. While a lot of work has been done on text, only a lesser amount of research has been done on audio datasets. An audio file contains more features that can be extracted from its amplitude and frequency than a …


Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier Oct 2020

Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier

Dickinson Law Review (2017-Present)

In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …


Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan Oct 2020

Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan

Other Student Works

Cloud computing is the development of distributed and parallel computing that seeks to provide a new model of business computing by automating services and efficiently storing proprietary data. Cloud bursting is one of the cloud computing techniques that adopts the hybrid cloud model which seeks to expand the resources of a private cloud through the integration with a public cloud infrastructure. In this paper, the viability of cloud bursting is experimented and an attempt to integrate AWS EC2 onto an Openstack cloud environment using the Openstack OMNI driver is conducted.


Peer-Inspired Student Performance Prediction In Interactive Online Question Pools With Graph Neural Network, Haotian Li, Huan Wei, Yong Wang, Yangqiu Song, Huamin. Qu Oct 2020

Peer-Inspired Student Performance Prediction In Interactive Online Question Pools With Graph Neural Network, Haotian Li, Huan Wei, Yong Wang, Yangqiu Song, Huamin. Qu

Research Collection School Of Computing and Information Systems

Student performance prediction is critical to online education. It can benefit many downstream tasks on online learning platforms, such as estimating dropout rates, facilitating strategic intervention, and enabling adaptive online learning. Interactive online question pools provide students with interesting interactive questions to practice their knowledge in online education. However, little research has been done on student performance prediction in interactive online question pools. Existing work on student performance prediction targets at online learning platforms with predefined course curriculum and accurate knowledge labels like MOOC platforms, but they are not able to fully model knowledge evolution of students in interactive online …


The Role Of Network Components In Improving The Reliability And Survivability Of Mobile Communication Networks, Dilmurod Davronbekov, Utkir Karimovich Matyokubov Sep 2020

The Role Of Network Components In Improving The Reliability And Survivability Of Mobile Communication Networks, Dilmurod Davronbekov, Utkir Karimovich Matyokubov

Acta of Turin Polytechnic University in Tashkent

This article compares the different architectures of mobile communication networks (MCN) and examines the survivability of the network. Typical survival strategies for improving MCN survivability, failure mitigation strategies for network elements, wireless network survival rates, failure scenarios at MCN levels, and survival indicators are presented. The importance of fiber-optic communication in the construction of communication lines between MCN components has been studied. The issue of designing MCNs in a cost-effective and highly viable way is considered, and the necessary expressions of the design process are given.


A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak Sep 2020

A Statistical Impulse Response Model Based On Empirical Characterization Of Wireless Underground Channel, Abdul Salam, Mehmet C. Vuran, Suat Irmak

Faculty Publications

Wireless underground sensor networks (WUSNs) are becoming ubiquitous in many areas. The design of robust systems requires extensive understanding of the underground (UG) channel characteristics. In this paper, an UG channel impulse response is modeled and validated via extensive experiments in indoor and field testbed settings. The three distinct types of soils are selected with sand and clay contents ranging from $13\%$ to $86\%$ and $3\%$ to $32\%$, respectively. The impacts of changes in soil texture and soil moisture are investigated with more than $1,200$ measurements in a novel UG testbed that allows flexibility in soil moisture control. Moreover, the …


Security Analysis Of The Anonabox Pro, Devi Sowjanya Vempati Sep 2020

Security Analysis Of The Anonabox Pro, Devi Sowjanya Vempati

LSU Master's Theses

The security posture of critical network appliances, such as routers, switches, and firewalls, is crucial as these devices provide the first line of defense against malicious actors. As there is typically no endpoint security software, such as anti-virus available for these devices, it is crucial that vendors release timely updates for vulnerabilities and that customers apply them quickly. The research effort documented in this thesis describes a developed methodology for triaging known vulnerabilities in network devices, assessing the security posture of device vendors, and locating likely weak points in released firmware images. To highlight this methodology, the Anonabox security appliance …


Direct Digital Synthesis: A Flexible Architecture For Advanced Signals Research For Future Satellite Navigation Payloads, Pranav R. Patel Sep 2020

Direct Digital Synthesis: A Flexible Architecture For Advanced Signals Research For Future Satellite Navigation Payloads, Pranav R. Patel

Theses and Dissertations

In legacy Global Positioning System (GPS) Satellite Navigation (SatNav) payloads, the architecture does not provide the flexibility to adapt to changing circumstances and environments. GPS SatNav payloads have largely remained unchanged since the system became fully operational in April 1995. Since then, the use of GPS has become ubiquitous in our day-to-day lives. GPS availability is now a basic assumption for distributed infrastructure; it has become inextricably tied to our national power grids, cellular networks, and global financial systems. Emerging advancements of easy to use radio technologies, such as software-defined radios (SDRs), have greatly lowered the difficulty of discovery and …


Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel Sep 2020

Joint 1d And 2d Neural Networks For Automatic Modulation Recognition, Luis M. Rosario Morel

Theses and Dissertations

The digital communication and radar community has recently manifested more interest in using data-driven approaches for tasks such as modulation recognition, channel estimation and distortion correction. In this research we seek to apply an object detector for parameter estimation to perform waveform separation in the time and frequency domain prior to classification. This enables the full automation of detecting and classifying simultaneously occurring waveforms. We leverage a lD ResNet implemented by O'Shea et al. in [1] and the YOLO v3 object detector designed by Redmon et al. in [2]. We conducted an in depth study of the performance of these …