Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2)
- Computer and Systems Architecture (2)
- Electrical and Computer Engineering (2)
- Electrical and Electronics (2)
- Hardware Systems (2)
-
- Physical Sciences and Mathematics (2)
- Systems and Communications (2)
- Anthropology (1)
- Art and Design (1)
- Arts and Humanities (1)
- Business (1)
- Communication (1)
- Communication Technology and New Media (1)
- Contemporary Art (1)
- Controls and Control Theory (1)
- Dentistry (1)
- Digital Humanities (1)
- E-Commerce (1)
- Engineering Science and Materials (1)
- Graphic Design (1)
- History (1)
- History of Art, Architecture, and Archaeology (1)
- Industrial and Organizational Psychology (1)
- Intellectual Property Law (1)
- Labor History (1)
- Law (1)
- Manufacturing (1)
- Keyword
-
- 3D printing (1)
- Algorithm (1)
- Attacker Model Ontology (1)
- Attacker Modeling (1)
- Consumerism (1)
-
- Cyber-Physical Systems (1)
- Delay Tolerant Networks (1)
- Device to Device Communication (1)
- Edge Learning (1)
- Energy Balancing (1)
- Facial recognition (1)
- Integration Framework (1)
- Mobile AdHoc Networks (1)
- Mobile Social Networks (1)
- Network Lifetime (1)
- Orthodontic (1)
- Orthognathic (1)
- Peer-to-Peer Energy Sharing (1)
- Plastic (1)
- Plasticene (1)
- Postdigital (1)
- Security Review Process (1)
- Surgery (1)
- TinyML (1)
- Wireless Networks (1)
Articles 1 - 6 of 6
Full-Text Articles in Digital Communications and Networking
Wifi Sensing At The Edge Towards Scalable On-Device Wireless Sensing Systems, Steven M. Hernandez
Wifi Sensing At The Edge Towards Scalable On-Device Wireless Sensing Systems, Steven M. Hernandez
Theses and Dissertations
WiFi sensing offers a powerful method for tracking physical activities using the radio-frequency signals already found throughout our homes and offices. This novel sensing modality offers continuous and non-intrusive activity tracking since sensing can be performed (i) without requiring wearable sensors, (ii) outside the line-of-sight, and even (iii) through the wall. Furthermore, WiFi has become a ubiquitous technology in our computers, our smartphones, and even in low-cost Internet of Things devices. In this work, we consider how the ubiquity of these low-cost WiFi devices offer an unparalleled opportunity for improving the scalability of wireless sensing systems. Thus far, WiFi sensing …
A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos
A General Framework For Characterizing And Evaluating Attacker Models For Cps Security Assessment, Christopher S. Deloglos, Christopher Deloglos
Theses and Dissertations
Characterizing the attacker’s perspective is essential to assessing the security posture and resilience of cyber-physical systems. The attacker’s perspective is most often achieved by cyber-security experts (e.g., red teams) who critically challenge and analyze the system from an adversarial stance. Unfortunately, the knowledge and experience of cyber-security experts can be inconsistent leading to situations where there are gaps in the security assessment of a given system. Structured security review processes (such as TAM, Mission Aware, STPA-SEC, and STPA-SafeSec) attempt to standardize the review processes to impart consistency across an organization or application domain. However, with most security review processes, the …
Leveraging Peer-To-Peer Energy Sharing For Resource Optimization In Mobile Social Networks, Aashish Dhungana
Leveraging Peer-To-Peer Energy Sharing For Resource Optimization In Mobile Social Networks, Aashish Dhungana
Theses and Dissertations
Mobile Opportunistic Networks (MSNs) enable the interaction of mobile users in the vicinity through various short-range wireless communication technologies (e.g., Bluetooth, WiFi) and let them discover and exchange information directly or in ad hoc manner. Despite their promise to enable many exciting applications, limited battery capacity of mobile devices has become the biggest impediment to these appli- cations. The recent breakthroughs in the areas of wireless power transfer (WPT) and rechargeable lithium batteries promise the use of peer-to-peer (P2P) energy sharing (i.e., the transfer of energy from the battery of one member of the mobile network to the battery of …
Let’S Face It: The Effect Of Orthognathic Surgery On Facial Recognition Algorithm Analysis, Carolyn Bradford Dragon
Let’S Face It: The Effect Of Orthognathic Surgery On Facial Recognition Algorithm Analysis, Carolyn Bradford Dragon
Theses and Dissertations
Aim: To evaluate the ability of a publicly available facial recognition application program interface (API) to calculate similarity scores for pre- and post-surgical photographs of patients undergoing orthognathic surgeries. Our primary objective was to identify which surgical procedure(s) had the greatest effect(s) on similarity score.
Methods: Standard treatment progress photographs for 25 retrospectively identified, orthodontic-orthognathic patients were analyzed using the API to calculate similarity scores between the pre- and post-surgical photographs. Photographs from two pre-surgical timepoints were compared as controls. Both relaxed and smiling photographs were included in the study to assess for the added impact of facial pose on …
Efficient Information Dissemination In Vehicular Networks With Privacy Protection, Xiaolu Cheng
Efficient Information Dissemination In Vehicular Networks With Privacy Protection, Xiaolu Cheng
Theses and Dissertations
Vehicular ad hoc network (VANET) is a key component of intelligent transportation System (ITS). In VANETs, vehicles and roadside units exchange information for the purpose of navigation, safe driving, entertainment and so on. The high mobility of vehicles makes efficient and private communications in VANETs a big challenge.
Improving the performance of information dissemination while protecting data privacy is studied in this research. Meet-Table based information dissemination method is first proposed, so as to improve the information dissemination, and to efficiently distribute information via utilizing roadside units, Cloud Computing, and Fog Computing. A clustering algorithm is proposed as well, to …
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Theses and Dissertations
Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …