Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- California State University, San Bernardino (9)
- City University of New York (CUNY) (2)
- Technological University Dublin (2)
- The University of Akron (2)
- University of Massachusetts Amherst (2)
-
- University of Nebraska - Lincoln (2)
- University of New Mexico (2)
- Association of Arab Universities (1)
- Bentley University (1)
- California Polytechnic State University, San Luis Obispo (1)
- DePaul University (1)
- Florida International University (1)
- Harrisburg University of Science and Technology (1)
- Kennesaw State University (1)
- Penn State Dickinson Law (1)
- Purdue University (1)
- Southern Methodist University (1)
- Western University (1)
- Keyword
-
- ToC (3)
- Deep Learning (2)
- IoT (2)
- SDN (2)
- Tech policy (2)
-
- Adoption factor (1)
- Adoption model. (1)
- And VFT (1)
- Anomaly (1)
- Artificial intelligence (1)
- Audio (1)
- Audit (1)
- Audit evidence (1)
- Audit risk (1)
- Auditing standards (1)
- Auditors (1)
- Autoencoders (1)
- Banking (1)
- Big data (1)
- Blockchain (1)
- Business Process (1)
- Business and Management (1)
- CJEU (1)
- Caching (1)
- Charter of fundamental rights (1)
- Cloud Computing (1)
- Cloud burst (1)
- Communication (1)
- Computer Engineering (1)
- Concert (1)
- Publication
-
- Journal of International Technology and Information Management (9)
- Open Educational Resources (2)
- Williams Honors College, Honors Research Projects (2)
- 2020 (1)
- African Conference on Information Systems and Technology (1)
-
- Articles (1)
- CDM Annual Reports (1)
- Computer Engineering (1)
- Computer Science ETDs (1)
- Conference papers (1)
- Dickinson Law Review (2017-Present) (1)
- Doctoral Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- FIU Electronic Theses and Dissertations (1)
- Faculty Publications (1)
- Future Computing and Informatics Journal (1)
- Library Philosophy and Practice (e-journal) (1)
- Masters Theses (1)
- Mathematics & Statistics ETDs (1)
- Operations Research and Engineering Management Theses and Dissertations (1)
- Other Student Works (1)
- Zea E-Books Collection (1)
- Publication Type
Articles 1 - 30 of 32
Full-Text Articles in Digital Communications and Networking
A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany
A Supporting Tool For Requirements Prioritization Process In Agile Software Development, Ramdan Mowad, Khaled Abdelazim Muhammad, Essam Elfakharany
Future Computing and Informatics Journal
Requirements engineering is a crucial phase of software engineering, and requirements prioritization is an essential stage of requirements engineering particularly in agile software development. Requirements prioritization goals at eliciting which requirements of software need to be covered in a particular release. The key point is which requirement will be selected in the next iteration and which one will be delayed to other iterations for minimizing risk during development and meeting stakeholders’ needs. There are many existing techniques for requirement prioritization, but most of these techniques do not cover continuous growth, change of requirements, and requirements dependencies. The prioritization techniques need …
Network Virtualization And Emulation Using Docker, Openvswitch And Mininet-Based Link Emulation, Narendra Prabhu
Network Virtualization And Emulation Using Docker, Openvswitch And Mininet-Based Link Emulation, Narendra Prabhu
Masters Theses
With the advent of virtualization and artificial intelligence, research on networked systems has progressed substantially. As the technology progresses, we expect a boom in not only the systems research but also in the network of systems domain. It is paramount that we understand and develop methodologies to connect and communicate among the plethora of devices and systems that exist today. One such area is mobile ad-hoc and space communication, which further complicates the task of networking due to myriad of environmental and physical conditions. Developing and testing such systems is an important step considering the large investment required to build …
The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman
The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman
Library Philosophy and Practice (e-journal)
This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …
Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle
Blockchain Based Communication Architectures With Applications To Private Security Networks, Ashley N. Mayle
Computer Science ETDs
Existing communication protocols in security networks are highly centralized. While this naively makes the controls easier to physically secure, external actors require fewer resources to disrupt the system because there are fewer points in the system can be interrupted without the entire system failing. We present a solution to this problem using a proof-of-work-based blockchain implementation built on MultiChain. We construct a test-bed network containing visual imagers and microwave sensor information. These data types are ubiquitous in perimeter security systems and allow a realistic representation of a real-world network architecture. The cameras in this system use an object detection algorithm …
Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan
Analysis Of Cloud Bursting On Openstack Infrastructure To Aws, Bao Pham, Ronald C. Jones, Majid Shaalan
Other Student Works
Cloud computing is the development of distributed and parallel computing that seeks to provide a new model of business computing by automating services and efficiently storing proprietary data. Cloud bursting is one of the cloud computing techniques that adopts the hybrid cloud model which seeks to expand the resources of a private cloud through the integration with a public cloud infrastructure. In this paper, the viability of cloud bursting is experimented and an attempt to integrate AWS EC2 onto an Openstack cloud environment using the Openstack OMNI driver is conducted.
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
Blockchain And Its Transformational Impact To Global Business, Mohammed Qaudeer
Blockchain And Its Transformational Impact To Global Business, Mohammed Qaudeer
Operations Research and Engineering Management Theses and Dissertations
The advent of internet to the public back in 1994 resulted in the 4th industrial revolution disrupting and transforming business and communication models. As much as the transformation changed our lives and experiences, it has resulted in centralized models like Amazon and Facebook. It also resulted in exponential growth of Fraud, Identity theft, and lack of trust. Blockchain is considered an emerging technology of this era, which will trigger the 5th industrial revolution enabling another massive storm of disruptive transformation completely changing the current business models based on trust, security, collaboration and crypto currency. As the evolution of blockchain technology …
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
The Law Of Black Mirror - Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Using episodes from the show Black Mirror as a study tool - a show that features tales that explore techno-paranoia - the course analyzes legal and policy considerations of futuristic or hypothetical case studies. The case studies tap into the collective unease about the modern world and bring up a variety of fascinating key philosophical, legal, and economic-based questions.
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Tech Policy And Legal Theory Syllabus, Yafit Lev-Aretz, Nizan Packin
Open Educational Resources
Technology has changed dramatically over the last couple of decades. Currently, virtually all business industries are powered by large quantities of data. The potential as well as actual uses of business data, which oftentimes includes personal user data, raise complex issues of informed consent and data protection. This course will explore many of these complex issues, with the goal of guiding students into thinking about tech policy from a broad ethical perspective as well as preparing students to responsibly conduct themselves in different areas and industries in a world growingly dominated by technology.
Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle
Efficient Data Mining Algorithm Network Intrusion Detection System For Masked Feature Intrusions, Kassahun Admkie, Kassahun Admkie Tekle
African Conference on Information Systems and Technology
Most researches have been conducted to develop models, algorithms and systems to detect intrusions. However, they are not plausible as intruders began to attack systems by masking their features. While researches continued to various techniques to overcome these challenges, little attention was given to use data mining techniques, for development of intrusion detection. Recently there has been much interest in applying data mining to computer network intrusion detection, specifically as intruders began to cheat by masking some detection features to attack systems. This work is an attempt to propose a model that works based on semi-supervised collective classification algorithm. For …
Intelligent Sdn Traffic Classification Using Deep Learning: Deep-Sdn, Ali Malik, Ruairí De Fréin, Mohammed Al-Zeyadi, Javier Andreu-Perez
Intelligent Sdn Traffic Classification Using Deep Learning: Deep-Sdn, Ali Malik, Ruairí De Fréin, Mohammed Al-Zeyadi, Javier Andreu-Perez
Conference papers
Accurate traffic classification is fundamentally important for various network activities such as fine-grained network management and resource utilisation. Port-based approaches, deep packet inspection and machine learning are widely used techniques to classify and analyze network traffic flows. However, over the past several years, the growth of Internet traffic has been explosive due to the greatly increased number of Internet users. Therefore, both port-based and deep packet inspection approaches have become inefficient due to the exponential growth of the Internet applications that incurs high computational cost. The emerging paradigm of software-defined networking has reshaped the network architecture by detaching the control …
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Edge-Cloud Iot Data Analytics: Intelligence At The Edge With Deep Learning, Ananda Mohon M. Ghosh
Electronic Thesis and Dissertation Repository
Rapid growth in numbers of connected devices, including sensors, mobile, wearable, and other Internet of Things (IoT) devices, is creating an explosion of data that are moving across the network. To carry out machine learning (ML), IoT data are typically transferred to the cloud or another centralized system for storage and processing; however, this causes latencies and increases network traffic. Edge computing has the potential to remedy those issues by moving computation closer to the network edge and data sources. On the other hand, edge computing is limited in terms of computational power and thus is not well suited for …
Zenneck Waves In Decision Agriculture: An Empirical Verification And Application In Em-Based Underground Wireless Power Transfer, Usman Raza, Abdul Salam
Zenneck Waves In Decision Agriculture: An Empirical Verification And Application In Em-Based Underground Wireless Power Transfer, Usman Raza, Abdul Salam
Faculty Publications
In this article, the results of experiments for the observation of Zenneck surface waves in sub GHz frequency range using dipole antennas are presented. Experiments are conducted over three different soils for communications distances of up to 1 m. This empirical analysis confirms the existence of Zenneck waves over the soil surface. Through the power delay profile (PDP) analysis, it has been shown that other subsurface components exhibit rapid decay as compared to the Zenneck waves. A potential application of the Zenneck waves for energy transmission in the area of decision agriculture is explored. Accordingly, a novel wireless through-the-soil power …
Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann
Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann
Mathematics & Statistics ETDs
This thesis uses a geometric approach to derive and solve nonlinear least squares minimization problems to geolocate a signal source in three dimensions using time differences of arrival at multiple sensor locations. There is no restriction on the maximum number of sensors used. Residual errors reach the numerical limits of machine precision. Symmetric sensor orientations are found that prevent closed form solutions of source locations lying within the null space. Maximum uncertainties in relative sensor positions and time difference of arrivals, required to locate a source within a maximum specified error, are found from these results. Examples illustrate potential requirements …
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan
Towards Optimized Traffic Provisioning And Adaptive Cache Management For Content Delivery, Aditya Sundarrajan
Doctoral Dissertations
Content delivery networks (CDNs) deploy hundreds of thousands of servers around the world to cache and serve trillions of user requests every day for a diverse set of content such as web pages, videos, software downloads and images. In this dissertation, we propose algorithms to provision traffic across cache servers and manage the content they host to achieve performance objectives such as maximizing the cache hit rate, minimizing the bandwidth cost of the network and minimizing the energy consumption of the servers. Traffic provisioning is the process of determining the set of content domains hosted on the servers. We propose …
Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes
Scalable Profiling And Visualization For Characterizing Microbiomes, Camilo Valdes
FIU Electronic Theses and Dissertations
Metagenomics is the study of the combined genetic material found in microbiome samples, and it serves as an instrument for studying microbial communities, their biodiversities, and the relationships to their host environments. Creating, interpreting, and understanding microbial community profiles produced from microbiome samples is a challenging task as it requires large computational resources along with innovative techniques to process and analyze datasets that can contain terabytes of information.
The community profiles are critical because they provide information about what microorganisms are present in the sample, and in what proportions. This is particularly important as many human diseases and environmental disasters …
Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services
Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services
Zea E-Books Collection
Advancing Technology in Education at the University of Nebraska, May 7, 2019
Welcome Address • Susan Fritz, Ph.D., Executive Vice President and Provost, University of Nebraska 6
Opening Remarks • Mary Niemiec, Associate Vice President for Digital Education, Director of University of Nebraska Online 6
Keynote Presentation: Shaping the Next Generation of Higher Education • Bryan Alexander, Ph.D. 6
Featured Extended Presentation: Redesigning Courses & Determining Effectiveness Through Research • Tanya Joosten, University of Wisconsin-Milwaukee (UWM), Erin Blankenship, Ph.D. (UNL), Ella Burnham (UNL), Nate Eidem, Ph.D. (UNK), Marnie Imhoff (UNMC), Linsey Donner (UNMC), Ellie Miller (UNMC) 7
5 Ways to …
Tiny Disco: A Cost-Effective, High-Fidelity Wireless Audio System, Luke Martin Liberatore
Tiny Disco: A Cost-Effective, High-Fidelity Wireless Audio System, Luke Martin Liberatore
Computer Engineering
The Tiny Disco is a WiFi based concert system, featuring improvements on popular “Silent Disco” concerts. Rather than being tied to compression and bandwidth restrictions present in traditional silent disco systems, the Tiny Disco system can deliver 320kbps+ audio quality, and allows listeners to bring their own headphones, further lending to the high quality audio experience.
Tiny Disco uses a Raspberry Pi as the audio server, and Espressif ESP32 microcontrollers as audio receivers/clients. The Tiny Disco is primarily geared toward smaller concerts and niche events where audio quality is valued, though due to its WiFi-based architecture, it can be expanded …
Annual Report 2019-2020, Depaul University College Of Computing And Digital Media
Annual Report 2019-2020, Depaul University College Of Computing And Digital Media
CDM Annual Reports
LETTER FROM THE DEAN
As I write this letter wrapping up the 2019-20 academic year, we remain in a global pandemic that has profoundly altered our lives. While many things have changed, some stayed the same: our CDM community worked hard, showed up for one another, and continued to advance their respective fields. A year that began like many others changed swiftly on March 11th when the University announced that spring classes would run remotely. By March 28th, the first day of spring quarter, we had moved 500 CDM courses online thanks to the diligent work of our faculty, staff, …
Technology Based Audit Tools: Implications For Audit Quality, Annie L. Witte
Technology Based Audit Tools: Implications For Audit Quality, Annie L. Witte
2020
Technology as an exogenous shock has proven to have pervasive effects on auditing firms, practitioners, regulators, and global markets. However, the dynamic nature of technology makes it uniquely challenging to articulate technology’s largescale implications on the auditing profession in recent times. Understanding how current technology has helped shape the contemporary auditing profession is vital to identify points of inflection within the industry (i.e., areas of risk and change), and key to elucidating the future of where the field is going.
The first paper (sole-authored) is a literature review that synthesizes auditing studies across methodologies, including archival, experimental, and qualitative methods. …
Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd
Blockchain Adoption Model For The Global Banking Industry, Zaina Kawasmi, Evans Akwasi Gyasi, Deneise Dadd
Journal of International Technology and Information Management
Blockchain has become the new hype term in the business world for the last decade. Due to the new technology’s characteristics and innovative applications, it is being adopted globally in a wide number of industries including the banking industry, yet no adoption model is provided to guide this process. This research aims to contribute to facilitating the successful adoption and implementation of the blockchain new technology in the banking industry. Building on the assumption that the blockchain’s adoption in banking will be directed by the regulations and best practices guidelines of the global banking regulatory bodies and practitioner, this research …
Creature Care, Alexander Weber
Creature Care, Alexander Weber
Williams Honors College, Honors Research Projects
Caring for a pet is a formidable responsibility that requires intense care and monitoring in order to protect and prolong the life of the animal. Traditionally, caring for a reptile presents a unique challenge for pet owners, who not only need to care for the animal but for the environment as well. Individual species distinctly require precise monitoring and control of environmental parameters such as temperature, humidity, and air quality; and deviation from the nominal values often leads to serious health problems for the reptile. To simplify reptile ownership, a system was designed that measures the critical parameters of a …
Terraria Server On A Raspberry Pi, Bradley Stoldt
Terraria Server On A Raspberry Pi, Bradley Stoldt
Williams Honors College, Honors Research Projects
My senior project is designed to display some of the material I have learned throughout the four years at The University of Akron, as well as explore into a newer piece of technology. I will be researching and documenting myself setting up a live network at my house that will have a raspberry pi running on it as a game server. The goal of this project is to get internal users to connect to the server, as well as users that are outside of my home network.
Ambiqual: Towards A Quality Metric For Headphone Rendered Compressed Ambisonic Spatial Audio, Miroslaw Narbutt, Jan Skoglund, Andrew Allen, Michael Chinen, Dan Barry, Andrew Hines
Ambiqual: Towards A Quality Metric For Headphone Rendered Compressed Ambisonic Spatial Audio, Miroslaw Narbutt, Jan Skoglund, Andrew Allen, Michael Chinen, Dan Barry, Andrew Hines
Articles
Spatial audio is essential for creating a sense of immersion in virtual environments. Efficient encoding methods are required to deliver spatial audio over networks without compromising Quality of Service (QoS). Streaming service providers such as YouTube typically transcode content into various bit rates and need a perceptually relevant audio quality metric to monitor users’ perceived quality and spatial localization accuracy. The aim of the paper is two-fold. First, it is to investigate the effect of Opus codec compression on the quality of spatial audio as perceived by listeners using subjective listening tests. Secondly, it is to introduce AMBIQUAL, a full …
The Impact Of E-Commerce On The Development Of Entrepreneurship In Saudi Arabia, Khulood Al-Mani
The Impact Of E-Commerce On The Development Of Entrepreneurship In Saudi Arabia, Khulood Al-Mani
Journal of International Technology and Information Management
This paper is based on a Ph.D. study investigating the critical challenges facing e-commerce adoption by entrepreneurs in Saudi Arabia, identifying the major driving factors, barriers, motivations, perceived advantages, potential problems and some practical solutions as well as future expectations from entrepreneurs’ perspectives. From the study findings, a set of practical recommendations were derived for the government, entrepreneurs and investors in Saudi Arabia to consider, to promote ecommerce entrepreneurship in the county.
The research was undertaken using a qualitative approach. Data collection techniques involved in-depth, semi-structured interviews, with (1) e-commerce entrepreneurs, and (2) government authorities, educational initiatives and private support …
Determinants Of Startup Funding: The Interaction Between Web Attention And Culture, Jie Ren, Viju Raghupathi, Wullianallur Raghupathi
Determinants Of Startup Funding: The Interaction Between Web Attention And Culture, Jie Ren, Viju Raghupathi, Wullianallur Raghupathi
Journal of International Technology and Information Management
Technology empowers entrepreneurs to pursue alternative funding through platforms like crowdfunding. This research explores significant startup funding factors using Crunchbase. Controlling for common factors (acquisition/funding-rounds/IPO), the research uniquely focuses on web attention - the visibility on social media - and its impact on funding. It also examines the moderating influence of startup’s home country culture (individualism/collectivism). Findings show stronger positive impact of web attention on startup funding for collectivist countries. While individualistic investors value personal goals, collectivists value collaborative goals - inclinations that align with crowdfunding behavior. Therefore while increasing web attention, crowdfunding efforts can be targeted towards collectivist countries.
Table Of Contents Jitim Vol 29 Issue 1, 2020
Table Of Contents Jitim Vol 29 Issue 1, 2020
Journal of International Technology and Information Management
Table of contents
Assessment Of The Needs Of Ict Skills On Employability In Smes: A Vft Approach, Renatus Michael Mushi
Assessment Of The Needs Of Ict Skills On Employability In Smes: A Vft Approach, Renatus Michael Mushi
Journal of International Technology and Information Management
the globalised economy comes with extra demand of ICT skills among the graduates. This is due to the demand if ICT technicalities in performing a number of basic activities in the workplaces. Majority of studies which concentrate with ICT skills on employability deals with technical enterprises. In non-technical companies such as construction, manufacturing and agriculture, ICT is studied as among the basic skill-set of graduates. However, recently, there has been special demand of graduates with basic ICT knowledge on recruitment processes. This indicates the growing demand of basic ICT skills among a broad range of professions. However, the type of …
Evaluating Students Information System Success Using Delone And Mclean’S Model: Student’S Perspective, Majaliwa Mkinga, Herman Mandari
Evaluating Students Information System Success Using Delone And Mclean’S Model: Student’S Perspective, Majaliwa Mkinga, Herman Mandari
Journal of International Technology and Information Management
System success is considered to be an important element in accomplishing the goals of the organization; therefore evaluation of system success needs to be done in order to ensure that investment in Information System is successful. Most of Higher Learning Institutions (HLIs) in Tanzania have adopted the use of IS in providing service to their customers. Nevertheless, there is less evidence that system success evaluation has been done in order to identify the desired characteristics which could make IS more effective. Due to that, this study evaluates the effectiveness of Student Information System (SIS) used at the Institute of Finance …
An Integrated View Of Data: Application Of Knowledge Modeling To Data Management, Sung-Kwan Kim, Wenjun Wang
An Integrated View Of Data: Application Of Knowledge Modeling To Data Management, Sung-Kwan Kim, Wenjun Wang
Journal of International Technology and Information Management
Data management has become an important challenge. Good data management requires an effective approach to collecting, storing, and accessing data across the enterprise. In this paper, a knowledge modeling approach to data management is introduced with an emphasis on data requirements analysis. A knowledge model can provide a high-level view of organizational data by specifying the structure and relationships of the knowledge contents used in business processes. The proposed knowledge modeling approach is business process oriented and decision oriented. The description of the knowledge contents in the model is based on ontological specification. The model is comprised of five elements: …