Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 28 of 28

Full-Text Articles in Digital Communications and Networking

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden Oct 2023

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden

Copyright, Fair Use, Scholarly Communication, etc.

Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.

My Administration places the highest urgency …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M Mar 2022

Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M

Library Philosophy and Practice (e-journal)

This study explains the development of the world of libraries to establish a very close relationship with the world of information technology. For this reason, facilities and infrastructure are needed to facilitate data and information retrieval quickly and accurately. Facing the challenges of the Industrial Revolution 5.0 era by utilizing information technology, libraries must also adapt to the times. Because the library has an important role, among others, as a source of information and the development of knowledge. Used libraries are still conventional to be converted into digital libraries. In essence, this development represents the desire of library users for …


Crest Or Trough? How Research Libraries Used Emerging Technologies To Survive The Pandemic, So Far, Scout Calvert Oct 2021

Crest Or Trough? How Research Libraries Used Emerging Technologies To Survive The Pandemic, So Far, Scout Calvert

UNL Libraries: Faculty Publications

Introduction

In the first months of the COVID-19 pandemic, it was impossible to tell if we were at the crest of a wave of new transmissions, or a trough of a much larger wave, still yet to peak. As of this writing, as colleges and universities prepare for mostly in-person fall 2021 semesters, case counts in the United States are increasing again after a decline that coincided with easier access to the COVID vaccine. Plans for a return to campus made with confidence this spring may be in doubt, as we climb the curve of what is already the second …


The Impact Of Cloud Computing On Academic Libraries, Sivankalai S Sep 2021

The Impact Of Cloud Computing On Academic Libraries, Sivankalai S

Library Philosophy and Practice (e-journal)

With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …


Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr. Jun 2021

Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.

Library Philosophy and Practice (e-journal)

Working with sensors has become an area of expertise within the domain of electronic engineering. On a day to day basis, thousands of sensors are put to use around us, for instance, in smoke alarms, speedometers, motors, computers, radiators etc. to accumulate sensor data, cables that connect the sensors to the bottom station after which the information is worked on. But cabling is often expensive especially when handling large scale industrial applications [5]. For an equivalent reason, low-cost wireless networks came into the picture recently and are in high demand. A research paper we found during our review of …


A Probabilistic Broadcasting Protocols In Mobile Ad Hoc Networks: A Bibliometric Survey, Sumit Kumar, Ayushi Kamboj May 2021

A Probabilistic Broadcasting Protocols In Mobile Ad Hoc Networks: A Bibliometric Survey, Sumit Kumar, Ayushi Kamboj

Library Philosophy and Practice (e-journal)

Broadcasting in Mobile ad hoc network is very crucial process and if not taken care led to Broadcast storm problem. Several Broadcasting techniques are proposed in the literature, but probabilistic broadcasting is the one the major technique which can really avoid the broadcasting storm problem. The protocols employing probabilistic broadcasting is surveyed in this bibliometric paper. The bibliometric survey aims to throw light on several types of protocols employed in Mobile ad hoc Network. The primary aim of this paper is to assess the amount of work done in the field of Probabilistic Broadcasting in Mobile ad hoc Network, as …


A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr. May 2021

A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr.

Library Philosophy and Practice (e-journal)

Background: This research aims to look into the work that has been done on Face Presentation attacks and detection with domain adaptation techniques from 2011 to 2021 utilizing bibliography methods.

Approaches: Diverse research articles on Face Presentation Attacks were retrieved using the two most popular databases Web of Science & Scopus. Research articles consider between 2011-2021. Some research results, such as documents by year, documents by source, documents by funding agencies, countries, etc are obtained using Web of Science and Scopus Analyzers. The analysis is performed using Vos Viewer version 1.6.16 and various parameters such as keywords, co-authorship, co-occurrences, citation …


Bibliometric Analysis Of Particle Swarm Optimization Techniques Used To Enhance Low-Energy Adaptive Clustering Hierarchy Protocol For Wireless Sensor Networks, Anupkumar M. Bongale Dr. Apr 2021

Bibliometric Analysis Of Particle Swarm Optimization Techniques Used To Enhance Low-Energy Adaptive Clustering Hierarchy Protocol For Wireless Sensor Networks, Anupkumar M. Bongale Dr.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network (WSN) is a network of tiny wireless sensor nodes. The sensor nodes sense information and transmit the sensed information to a data collection point known as Base Station. WSNs have gained massive popularity due to their incredible benefits, and active research is ongoing for the past two decades. The primary concern with WSN is that the sensor operates on a limited power supply. Due to the nature of applications of WSNs and the hostile environment where the sensors are deployed, providing unlimited power or energy supply is not an option. Hence, the research work mainly focuses on …


Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni Apr 2021

Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni

Library Philosophy and Practice (e-journal)

Background: This study aims to analyze the work done in domain of cloud computing and edge computing using artificial intelligence from 2015 to 2021. Recent research shows the bibliometric methods are useful for such kind of analysis. Thus in this paper analysis is carried out using the bibliometric methods.

Methods: different articles on edge computing and edge intelligence were retrieved using one of the most popular database- Scopus. The research articles are considered between 2015 to 2021. Scopus analyzer is used for getting some analysis results such as documents by year, source, country and so on. VOSviewer Version 1.6.16 is …


Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina Apr 2021

Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina

Library Philosophy and Practice (e-journal)

This study aims to discuss digital government and regulation, analyzed through the bibliometric approach with the Scopus database for the last 20 years and visualized through the VOSviewer software version 1.6.16. The results indicate that the topic of e-government has become essentially prominent and has been the most discussed in the past two decades. Approximately 41.1% of digital government and regulation articles are classified under the subject area of 'Computer Science', continued by Social Sciences (18.3%), and Business, Management and Accounting (10.2%), with the majority of being 'All Open Access' (46%). The trend of publication in this field includes the …


Bibliometric Survey On Predictive Analysis Using Multiple Regression For Invoice Generation System, Chetana Nadekar, Subodh Awate, Dattatray Damse, Smita Khairnar Feb 2021

Bibliometric Survey On Predictive Analysis Using Multiple Regression For Invoice Generation System, Chetana Nadekar, Subodh Awate, Dattatray Damse, Smita Khairnar

Library Philosophy and Practice (e-journal)

The research is exploring the opportunities available for the application of Predictive analysis using multi regression for invoice generation systems. We work by analyzing the data generated and saved in the database of the clinic. This database contains the financial operations along and also contains other useful information that is being gathered about the patients.

We are proposing a different approach for a billing system to make the task easier for the generation of invoices for the clinic. The mapping of the relational data and using a predictive model that is based on a regression analysis that will predict the …


Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite Jan 2021

Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite

Library Philosophy and Practice (e-journal)

Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …


Estimating Remaining Useful Life In Machines Using Artificial Intelligence: A Scoping Review, Sameer Sayyad, Satish Kumar, Arunkumar Bongale, Anupkumar Bongale, Shruti Patil Jan 2021

Estimating Remaining Useful Life In Machines Using Artificial Intelligence: A Scoping Review, Sameer Sayyad, Satish Kumar, Arunkumar Bongale, Anupkumar Bongale, Shruti Patil

Library Philosophy and Practice (e-journal)

The remaining useful life (RUL) estimations become one of the most essential aspects of predictive maintenance (PdM) in the era of industry 4.0. Predictive maintenance aims to minimize the downtime of machines or process, decreases maintenance costs, and increases the productivity of industries. The primary objective of this bibliometric paper is to understand the scope of literature available related to RUL prediction. Scopus database is used to perform the analysis of 1673 extracted scientific literature from the year 1985 to 2020. Based on available published documents, analysis is done on the year-wise publication data, document types, language-wise distribution of documents, …


A Literature Survey And Bibliometric Analysis Of Application Of Artificial Intelligence Techniques On Wireless Mesh Networks, Smita R. Mahajan Mrs., Harikrishnan R Dr., Ketan Kotecha Dr. Jan 2021

A Literature Survey And Bibliometric Analysis Of Application Of Artificial Intelligence Techniques On Wireless Mesh Networks, Smita R. Mahajan Mrs., Harikrishnan R Dr., Ketan Kotecha Dr.

Library Philosophy and Practice (e-journal)

Recent years have seen a surge in the use of technology for executing transactions in both online and offline modes. Various industries like banking, e-commerce, and private organizations use networks for the exchange of confidential information and resources. Network security is thus of utmost importance, with the expectation of effective and efficient analysis of the network traffic. Wireless Mesh Networks are effective in communicating information over a vast span with minimal costs. A network is evaluated based on its security, accessibility, and extent of interoperability. Artificial Intelligence techniques like machine learning and deep learning have found widespread use to solve …


Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof. Nov 2020

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman Aug 2020

A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman

Library Philosophy and Practice (e-journal)

Data mining is characterized as searching for useful information through very large data sets. Some of the key and most common techniques for data mining are association rules, classification, clustering, prediction, and sequential models. For a wide range of applications, data mining techniques are used. Data mining plays a significant role in disease detection in the health care industry. The patient should be needed to detect a number of tests for the disease. However, the number of tests should be reduced by using data mining techniques. In time and performance, this reduced test plays an important role. Heart disease is …


Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa Feb 2020

Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa

Library Philosophy and Practice (e-journal)

In Cryptography, Block Cipher is an algorithm used to encode the data which is used to transfer over internet. Cryptanalyst tries to break secret code by using different methods like Brute Force attack, Linear Cryptanalysis and differential cryptanalysis etc. The basic aim of this bibliometric survey is to understand the extent of the available literature for the area of cryptanalysis of block ciphers towards cyber security. The bibliometric analysis is primarily based on Scopus as it provides research database for various areas and tools like Sciencescape, Gephi etc. It is analyzed by bibliometric survey that major publications are from conference, …


Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner Feb 2020

Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Slides of two classes taught in the Theory Proseminar in the School of Public Administration at the University of Nebraska at Omaha by Sue Ann Gardner on February 11 and 18, 2020.

Connects information theory to applicable knowledge frameworks in public administration. Includes an in-depth discussion of the concepts addressed in Samiya Umoja Noble's book Algorithms of Oppression (published by New York University Press, New York, New York, United States, 2018) in the context of public administration and public academic libraries.


Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar Jan 2020

Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar

Library Philosophy and Practice (e-journal)

There are numerous libraries in Pakistan that cannot afford RFID technology because of the limited budget and resources and confronted book theft, low security, and delay services. This paper base an experiment that how libraries can adopt this technology effectively and productively with a lower budget and higher outcomes. The FAST-National University of Computer and Emerging Sciences Library Karachi campuses is the principal library in Pakistan which has adopted UHF-RFID technology with the integration of ILS insignia; SIP II compliance that jointly works with library integrated system and numerous activities can be made through this. An exploratory study conducted in …


Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh Aug 2019

Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh

Library Philosophy and Practice (e-journal)

Cyberpsychology refers to the study of the mind and behavior in the context of interactions with technology. It is an emerging branch, which has focused on the psychological aspects connected to the increasing presence and usages of technology in modern lives. This paper traces recent advancement and trends of Cyberpsychology is an emerging domain of knowledge and goes on the give a literature review of the same. An analysis of the recent research and literature covering 300 most relevant research papers from the period of 2012 to 15, August 2019 was conducted to determine and shape the research pattern based …


Your Internet Data Is Rotting, Paul Royster May 2019

Your Internet Data Is Rotting, Paul Royster

UNL Libraries: Faculty Publications

The internet is growing, but old information continues to disappear daily.

Many MySpace users were dismayed to discover earlier this year that the social media platform lost 50 million files uploaded between 2003 and 2015. The failure of MySpace to care for and preserve its users’ content should serve as a reminder that relying on free third-party services can be risky. MySpace has probably preserved the users’ data; it just lost their content. The data was valuable to MySpace; the users’ content less so.

Preserving content or intellectual property on the internet presents a conundrum. If it’s accessible, then it …


The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani Jan 2019

The Scientific Information Exchange General Model At Digital Library Context: Internet Of Things, Nayere Soleimanzade, Asefeh Asemi, Mozafar Cheshmehsohrabi, Ahmad Shabani

Library Philosophy and Practice (e-journal)

Introduction: This paper aims to develop a Scientific Information Exchange General Model at Digital Library in Context of Internet of things, which would enable automated and efficient library services. To accomplish its objective, the main classes (Concepts), sub-classes, attributes are identified in order to introduce an appropriate model.

Methodology: The approach of this study is basic, exploratory, and developmental and is run through a mixed method consisting of documentary, Delphi, and data modeling methods. The study population in the documentary section includes the study of information resources retrieved in related subjects. The study population in the Delphi section is …


The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard Jan 2019

The Global Disinformation Order: 2019 Global Inventory Of Organised Social Media Manipulation, Samantha Bradshaw, Philip N. Howard

Copyright, Fair Use, Scholarly Communication, etc.

Executive Summary

Over the past three years, we have monitored the global organization of social media manipulation by governments and political parties. Our 2019 report analyses the trends of computational propaganda and the evolving tools, capacities, strategies, and resources.

1. Evidence of organized social media manipulation campaigns which have taken place in 70 countries, up from 48 countries in 2018 and 28 countries in 2017. In each country, there is at least one political party or government agency using social media to shape public attitudes domestically.

2.Social media has become co-opted by many authoritarian regimes. In 26 countries, computational propaganda …


Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook Jan 2018

Cyber Security And Risk Society: Estonian Discourse On Cyber Risk And Security Strategy, Lauren Kook

Copyright, Fair Use, Scholarly Communication, etc.

The main aim of this thesis is to call for a new analysis of cyber security which departs from the traditional security theory. I argue that the cyber domain is inherently different in nature, in that it is lacking in traditional boundaries and is reflexive in nature. Policy-makers are aware of these characteristics, and in turn this awareness changes the way that national cyber security strategy is handled and understood. These changes cannot be adequately understood through traditional understanding of security, as they often are, without missing significant details. Rather, examining these changes through the lens of Ulrich Beck’s risk …


Utilizing Researchgate Social Network By Iranian Engineering, Amir Reza Asnafi, Maryam Rahmani Ma In Knowledge And Information Scienc Aug 2017

Utilizing Researchgate Social Network By Iranian Engineering, Amir Reza Asnafi, Maryam Rahmani Ma In Knowledge And Information Scienc

Library Philosophy and Practice (e-journal)

This study aimed to assess the role of Researchgate in the development of scientific- scholarly activities among Faculty Members of University of Tehran's Engineering College. This study is Survey and descriptive research and data collection tools, including profiles of researchers at the Researchgate and questionnaire. The study population included faculty members of University of Tehran's Engineering College in 2016 was 242 researcher were earned RG score. The sample 144 subjects who were selected via stratified random sampling method and the questionnaire distributed 144 questionnaires were collected and then Results were analyzed using SPSS software From the perspective of engineering researchers, …


Bridging The Communication Gap Successfully For Library/It Projects, Amanda Harlan, Dhanushka Samarakoon Apr 2016

Bridging The Communication Gap Successfully For Library/It Projects, Amanda Harlan, Dhanushka Samarakoon

Nebraska Library Association: Conferences

Have you ever had a difficult time describing a concept for a project? This can be especially true with collaborative projects between library and IT staff. Library and IT staff have historically been at odds concerning communication due to the use of jargon specific to their area, different working environments and styles, and conflicting best practices and standards that each follow. K-State Libraries and their internal IT department will share the communication issues with solutions from a librarian’s and developer’s perspective. We will also discuss how has influenced processes and methodologies used for collaborative projects between library and IT staff …