Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

University of Nebraska - Lincoln

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 69

Full-Text Articles in Digital Communications and Networking

On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez Dec 2023

On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez

Department of Mathematics: Dissertations, Theses, and Student Research

In order to communicate information over a noisy channel, error-correcting codes can be used to ensure that small errors don’t prevent the transmission of a message. One family of codes that has been found to have good properties is low-density parity check (LDPC) codes. These are represented by sparse bipartite graphs and have low complexity graph-based decoding algorithms. Various graphical properties, such as the girth and stopping sets, influence when these algorithms might fail. Additionally, codes based on algebraically structured parity check matrices are desirable in applications due to their compact representations, practical implementation advantages, and tractable decoder performance analysis. …


Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto Dec 2023

Renovating The Ipmu Via Internet Of Things For Pollutant Emission Estimations In Poultry Facilities, Joshua Dotto

Department of Agricultural and Biological Systems Engineering: Dissertations, Theses, and Student Research

The emissions of ammonia (NH3), particulate matter (PM2.5), and carbon dioxide (CO2) are major concerns in poultry facilities. They can pose environmental concerns and nuances. Robust and affordable measurement systems are needed to accurately measure in-barn concentrations and quantify the emissions.

The Intelligent Portable Monitoring Unit (iPMU or PMU3) developed in 2016 was reconstructed into PMU4 to include upgraded NH3 and PM2.5 sensors and wireless connectivity for a low-cost, robust, and accurate air quality monitoring device with contactless data transfer using the concept of Internet of Things (IoT). In addition, a user-friendly …


Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden Oct 2023

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden

Copyright, Fair Use, Scholarly Communication, etc.

Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.

My Administration places the highest urgency …


Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian) Mar 2023

Chatgpt As Metamorphosis Designer For The Future Of Artificial Intelligence (Ai): A Conceptual Investigation, Amarjit Kumar Singh (Library Assistant), Dr. Pankaj Mathur (Deputy Librarian)

Library Philosophy and Practice (e-journal)

Abstract

Purpose: The purpose of this research paper is to explore ChatGPT’s potential as an innovative designer tool for the future development of artificial intelligence. Specifically, this conceptual investigation aims to analyze ChatGPT’s capabilities as a tool for designing and developing near about human intelligent systems for futuristic used and developed in the field of Artificial Intelligence (AI). Also with the helps of this paper, researchers are analyzed the strengths and weaknesses of ChatGPT as a tool, and identify possible areas for improvement in its development and implementation. This investigation focused on the various features and functions of ChatGPT that …


Data Management In Web Applications To Balance Performance And Security, Caleb Marcoux May 2022

Data Management In Web Applications To Balance Performance And Security, Caleb Marcoux

Honors Theses

As web applications become increasingly popular, many are running several calculations and data processing on the client machine, it is important to consider data management practices on the front-end of these web applications. Typically, some data from the server is stored in the client's memory or hard disk. How much data should be stored for how long, as well as many other considerations, influence the time and space performance of the web application, as well as its security. In this thesis, we explore several challenges, solutions, and design patterns in web application data management through the lens of a senior …


Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao May 2022

Symbolic Ns-3 For Efficient Exhaustive Testing, Jianfei Shao

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Exhaustive testing is an important type of simulation, where a user exhaustively simulates a protocol for all possible cases with respect to some uncertain factors, such as all possible packet delays or packet headers. It is useful for completely evaluating the protocol performance, finding the worst-case performance, and detecting possible design or implementation bugs of a protocol. It is, however, time consuming to use the brute force method with current NS-3, a widely used network simulator, for exhaustive testing. In this paper, we present our work on Sym-NS-3 for more efficient exhaustive testing, which leverages a powerful program analysis technique …


Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D Apr 2022

Society Dilemma Of Computer Technology Management In Today's World, Iwasan D. Kejawa Ed.D

School of Computing: Faculty Publications

Abstract - Is it true that some of the inhabitants of the world’s today are still hesitant in using computers? Research has shown that today many people are still against the use of computers. Computer technology management can be said to be obliterated by security problems. Research shows that some people in society feel reluctant or afraid to use computers because of errors and exposure of their privacy and their sophistication, which sometimes are caused by computer hackers and malfunction of the computers. The dilemma of not utilizing computer technology at all or, to its utmost, by certain people in …


Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M Mar 2022

Challenges Of The Industrial Revolution Era 1.0 To 5.0 : University Digital Library In Indoensia, Merlin Apriliyanti, Ilham M

Library Philosophy and Practice (e-journal)

This study explains the development of the world of libraries to establish a very close relationship with the world of information technology. For this reason, facilities and infrastructure are needed to facilitate data and information retrieval quickly and accurately. Facing the challenges of the Industrial Revolution 5.0 era by utilizing information technology, libraries must also adapt to the times. Because the library has an important role, among others, as a source of information and the development of knowledge. Used libraries are still conventional to be converted into digital libraries. In essence, this development represents the desire of library users for …


Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M Nov 2021

Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M

Library Philosophy and Practice (e-journal)

This paper will discuss catastrophe recovery and likelihood development for digital library structures. The article establishes a foundation for establishing Library continuity and disaster recovery strategies through the use of best practices. Library continuity development and catastrophe recovery are critical modules of the planning stage for a virtual digital library. Few institutions that experience a catastrophic disaster occurrence are powerless to recover always, but libraries can suggestively boost the possibility of long-term recovery of institutional digital resources by drafting a continuity and recovery strategy in preparation. This article is intended for system designers and administrators, as well as high-ranking library …


Crest Or Trough? How Research Libraries Used Emerging Technologies To Survive The Pandemic, So Far, Scout Calvert Oct 2021

Crest Or Trough? How Research Libraries Used Emerging Technologies To Survive The Pandemic, So Far, Scout Calvert

UNL Libraries: Faculty Publications

Introduction

In the first months of the COVID-19 pandemic, it was impossible to tell if we were at the crest of a wave of new transmissions, or a trough of a much larger wave, still yet to peak. As of this writing, as colleges and universities prepare for mostly in-person fall 2021 semesters, case counts in the United States are increasing again after a decline that coincided with easier access to the COVID vaccine. Plans for a return to campus made with confidence this spring may be in doubt, as we climb the curve of what is already the second …


The Impact Of Cloud Computing On Academic Libraries, Sivankalai S Sep 2021

The Impact Of Cloud Computing On Academic Libraries, Sivankalai S

Library Philosophy and Practice (e-journal)

With the introduction of computers and other forms of communication technology, library services have undergone a significant transformation. Libraries have been automated, networked, and are currently being converted into virtual or paperless libraries. This article is dedicated to many aspects of cloud computing, including different kinds and applications. There is a discussion about the advantages and drawbacks of cloud computing in academic libraries. The article also includes recommendations for professional librarians and academic libraries across the globe on how to take advantage of cloud computing resources. This article may be of use in the development of cloud-based services for university …


Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr. Jun 2021

Bibliometric Review On Iot Based System For Remote Downloading On Microcontroller, Arundhati Bandopadhyaya Ms., Diya Dodwad Ms., Diviyanshi Gupta Ms., Surya Koyyana Mr., Parag Narkhede Mr., Shripad Deshpande Mr.

Library Philosophy and Practice (e-journal)

Working with sensors has become an area of expertise within the domain of electronic engineering. On a day to day basis, thousands of sensors are put to use around us, for instance, in smoke alarms, speedometers, motors, computers, radiators etc. to accumulate sensor data, cables that connect the sensors to the bottom station after which the information is worked on. But cabling is often expensive especially when handling large scale industrial applications [5]. For an equivalent reason, low-cost wireless networks came into the picture recently and are in high demand. A research paper we found during our review of …


A Probabilistic Broadcasting Protocols In Mobile Ad Hoc Networks: A Bibliometric Survey, Sumit Kumar, Ayushi Kamboj May 2021

A Probabilistic Broadcasting Protocols In Mobile Ad Hoc Networks: A Bibliometric Survey, Sumit Kumar, Ayushi Kamboj

Library Philosophy and Practice (e-journal)

Broadcasting in Mobile ad hoc network is very crucial process and if not taken care led to Broadcast storm problem. Several Broadcasting techniques are proposed in the literature, but probabilistic broadcasting is the one the major technique which can really avoid the broadcasting storm problem. The protocols employing probabilistic broadcasting is surveyed in this bibliometric paper. The bibliometric survey aims to throw light on several types of protocols employed in Mobile ad hoc Network. The primary aim of this paper is to assess the amount of work done in the field of Probabilistic Broadcasting in Mobile ad hoc Network, as …


A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr. May 2021

A Bibliometric Analysis Of Face Presentation Attacks Based On Domain Adaptation, Smita C. Khairnar, Shilpa Shailesh Gite Dr., Sudeep D. Thepade Dr.

Library Philosophy and Practice (e-journal)

Background: This research aims to look into the work that has been done on Face Presentation attacks and detection with domain adaptation techniques from 2011 to 2021 utilizing bibliography methods.

Approaches: Diverse research articles on Face Presentation Attacks were retrieved using the two most popular databases Web of Science & Scopus. Research articles consider between 2011-2021. Some research results, such as documents by year, documents by source, documents by funding agencies, countries, etc are obtained using Web of Science and Scopus Analyzers. The analysis is performed using Vos Viewer version 1.6.16 and various parameters such as keywords, co-authorship, co-occurrences, citation …


Bibliometric Analysis Of Particle Swarm Optimization Techniques Used To Enhance Low-Energy Adaptive Clustering Hierarchy Protocol For Wireless Sensor Networks, Anupkumar M. Bongale Dr. Apr 2021

Bibliometric Analysis Of Particle Swarm Optimization Techniques Used To Enhance Low-Energy Adaptive Clustering Hierarchy Protocol For Wireless Sensor Networks, Anupkumar M. Bongale Dr.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network (WSN) is a network of tiny wireless sensor nodes. The sensor nodes sense information and transmit the sensed information to a data collection point known as Base Station. WSNs have gained massive popularity due to their incredible benefits, and active research is ongoing for the past two decades. The primary concern with WSN is that the sensor operates on a limited power supply. Due to the nature of applications of WSNs and the hostile environment where the sensors are deployed, providing unlimited power or energy supply is not an option. Hence, the research work mainly focuses on …


Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni Apr 2021

Recent Trends In Cloud Computing And Edge Computing, Sonali Deshpande, Nilima Kulkarni

Library Philosophy and Practice (e-journal)

Background: This study aims to analyze the work done in domain of cloud computing and edge computing using artificial intelligence from 2015 to 2021. Recent research shows the bibliometric methods are useful for such kind of analysis. Thus in this paper analysis is carried out using the bibliometric methods.

Methods: different articles on edge computing and edge intelligence were retrieved using one of the most popular database- Scopus. The research articles are considered between 2015 to 2021. Scopus analyzer is used for getting some analysis results such as documents by year, source, country and so on. VOSviewer Version 1.6.16 is …


Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina Apr 2021

Discourse On Digital Government And Regulation: A Bibliometric Analysis, Prakoso Bhairawa Putera, Amelya Gustina

Library Philosophy and Practice (e-journal)

This study aims to discuss digital government and regulation, analyzed through the bibliometric approach with the Scopus database for the last 20 years and visualized through the VOSviewer software version 1.6.16. The results indicate that the topic of e-government has become essentially prominent and has been the most discussed in the past two decades. Approximately 41.1% of digital government and regulation articles are classified under the subject area of 'Computer Science', continued by Social Sciences (18.3%), and Business, Management and Accounting (10.2%), with the majority of being 'All Open Access' (46%). The trend of publication in this field includes the …


Bibliometric Survey On Predictive Analysis Using Multiple Regression For Invoice Generation System, Chetana Nadekar, Subodh Awate, Dattatray Damse, Smita Khairnar Feb 2021

Bibliometric Survey On Predictive Analysis Using Multiple Regression For Invoice Generation System, Chetana Nadekar, Subodh Awate, Dattatray Damse, Smita Khairnar

Library Philosophy and Practice (e-journal)

The research is exploring the opportunities available for the application of Predictive analysis using multi regression for invoice generation systems. We work by analyzing the data generated and saved in the database of the clinic. This database contains the financial operations along and also contains other useful information that is being gathered about the patients.

We are proposing a different approach for a billing system to make the task easier for the generation of invoices for the clinic. The mapping of the relational data and using a predictive model that is based on a regression analysis that will predict the …


Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite Jan 2021

Bibliometric Survey On Zero-Knowledge Proof For Authentication, Adwait Pathak, Tejas Patil, Shubham Pawar, Piyush Raut, Smita Khairnar, Dr. Shilpa Gite

Library Philosophy and Practice (e-journal)

Background: Zero Knowledge Proof is a persuasive cryptographic protocol employed to provide data security by keeping the user's identity, using the services anonymously. Zero Knowledge Proof can be the preferred option to use in multiple circumstances. Instead of using the public key cryptographic protocols, the zero-knowledge proof usage does not expose or leak confidential data or information during the transmission. Zero Knowledge Proof protocols are comparatively lightweight; this results in making it efficient in terms of memory. Zero Knowledge Proof applications can reside in authentication, identity management, cryptocurrency transactions, and many more. Traditional authentication schemes are vulnerable to attacks …


Estimating Remaining Useful Life In Machines Using Artificial Intelligence: A Scoping Review, Sameer Sayyad, Satish Kumar, Arunkumar Bongale, Anupkumar Bongale, Shruti Patil Jan 2021

Estimating Remaining Useful Life In Machines Using Artificial Intelligence: A Scoping Review, Sameer Sayyad, Satish Kumar, Arunkumar Bongale, Anupkumar Bongale, Shruti Patil

Library Philosophy and Practice (e-journal)

The remaining useful life (RUL) estimations become one of the most essential aspects of predictive maintenance (PdM) in the era of industry 4.0. Predictive maintenance aims to minimize the downtime of machines or process, decreases maintenance costs, and increases the productivity of industries. The primary objective of this bibliometric paper is to understand the scope of literature available related to RUL prediction. Scopus database is used to perform the analysis of 1673 extracted scientific literature from the year 1985 to 2020. Based on available published documents, analysis is done on the year-wise publication data, document types, language-wise distribution of documents, …


A Literature Survey And Bibliometric Analysis Of Application Of Artificial Intelligence Techniques On Wireless Mesh Networks, Smita R. Mahajan Mrs., Harikrishnan R Dr., Ketan Kotecha Dr. Jan 2021

A Literature Survey And Bibliometric Analysis Of Application Of Artificial Intelligence Techniques On Wireless Mesh Networks, Smita R. Mahajan Mrs., Harikrishnan R Dr., Ketan Kotecha Dr.

Library Philosophy and Practice (e-journal)

Recent years have seen a surge in the use of technology for executing transactions in both online and offline modes. Various industries like banking, e-commerce, and private organizations use networks for the exchange of confidential information and resources. Network security is thus of utmost importance, with the expectation of effective and efficient analysis of the network traffic. Wireless Mesh Networks are effective in communicating information over a vast span with minimal costs. A network is evaluated based on its security, accessibility, and extent of interoperability. Artificial Intelligence techniques like machine learning and deep learning have found widespread use to solve …


Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof. Nov 2020

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman Aug 2020

A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman

Library Philosophy and Practice (e-journal)

Data mining is characterized as searching for useful information through very large data sets. Some of the key and most common techniques for data mining are association rules, classification, clustering, prediction, and sequential models. For a wide range of applications, data mining techniques are used. Data mining plays a significant role in disease detection in the health care industry. The patient should be needed to detect a number of tests for the disease. However, the number of tests should be reduced by using data mining techniques. In time and performance, this reduced test plays an important role. Heart disease is …


A Novel Path Loss Forecast Model To Support Digital Twins For High Frequency Communications Networks, James Marvin Taylor Jr Jul 2020

A Novel Path Loss Forecast Model To Support Digital Twins For High Frequency Communications Networks, James Marvin Taylor Jr

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

The need for long-distance High Frequency (HF) communications in the 3-30 MHz frequency range seemed to diminish at the end of the 20th century with the advent of space-based communications and the spread of fiber optic-connected digital networks. Renewed interest in HF has emerged as an enabler for operations in austere locations and for its ability to serve as a redundant link when space-based and terrestrial communication channels fail. Communications system designers can create a “digital twin” system to explore the operational advantages and constraints of the new capability. Existing wireless channel models can adequately simulate communication channel conditions with …


Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services Mar 2020

Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services

Zea E-Books Collection

Advancing Technology in Education at the University of Nebraska, May 7, 2019

Welcome Address • Susan Fritz, Ph.D., Executive Vice President and Provost, University of Nebraska 6

Opening Remarks • Mary Niemiec, Associate Vice President for Digital Education, Director of University of Nebraska Online 6

Keynote Presentation: Shaping the Next Generation of Higher Education • Bryan Alexander, Ph.D. 6

Featured Extended Presentation: Redesigning Courses & Determining Effectiveness Through Research • Tanya Joosten, University of Wisconsin-Milwaukee (UWM), Erin Blankenship, Ph.D. (UNL), Ella Burnham (UNL), Nate Eidem, Ph.D. (UNK), Marnie Imhoff (UNMC), Linsey Donner (UNMC), Ellie Miller (UNMC) 7

5 Ways to …


Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa Feb 2020

Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa

Library Philosophy and Practice (e-journal)

In Cryptography, Block Cipher is an algorithm used to encode the data which is used to transfer over internet. Cryptanalyst tries to break secret code by using different methods like Brute Force attack, Linear Cryptanalysis and differential cryptanalysis etc. The basic aim of this bibliometric survey is to understand the extent of the available literature for the area of cryptanalysis of block ciphers towards cyber security. The bibliometric analysis is primarily based on Scopus as it provides research database for various areas and tools like Sciencescape, Gephi etc. It is analyzed by bibliometric survey that major publications are from conference, …


Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner Feb 2020

Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Slides of two classes taught in the Theory Proseminar in the School of Public Administration at the University of Nebraska at Omaha by Sue Ann Gardner on February 11 and 18, 2020.

Connects information theory to applicable knowledge frameworks in public administration. Includes an in-depth discussion of the concepts addressed in Samiya Umoja Noble's book Algorithms of Oppression (published by New York University Press, New York, New York, United States, 2018) in the context of public administration and public academic libraries.


Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar Jan 2020

Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar

Library Philosophy and Practice (e-journal)

There are numerous libraries in Pakistan that cannot afford RFID technology because of the limited budget and resources and confronted book theft, low security, and delay services. This paper base an experiment that how libraries can adopt this technology effectively and productively with a lower budget and higher outcomes. The FAST-National University of Computer and Emerging Sciences Library Karachi campuses is the principal library in Pakistan which has adopted UHF-RFID technology with the integration of ILS insignia; SIP II compliance that jointly works with library integrated system and numerous activities can be made through this. An exploratory study conducted in …


Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh Aug 2019

Recent Trends, Current Research In Cyberpsychology: A Literature Review, Amarjit Kumar Singh, Pawan Kumar Singh

Library Philosophy and Practice (e-journal)

Cyberpsychology refers to the study of the mind and behavior in the context of interactions with technology. It is an emerging branch, which has focused on the psychological aspects connected to the increasing presence and usages of technology in modern lives. This paper traces recent advancement and trends of Cyberpsychology is an emerging domain of knowledge and goes on the give a literature review of the same. An analysis of the recent research and literature covering 300 most relevant research papers from the period of 2012 to 15, August 2019 was conducted to determine and shape the research pattern based …