Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 31 - 60 of 120

Full-Text Articles in Digital Communications and Networking

Founding Sap Student User Group (Sug) At Southern Illinois University Carbondale - Siu Sug, Jihoon Park, Siuc Isat Oct 2016

Founding Sap Student User Group (Sug) At Southern Illinois University Carbondale - Siu Sug, Jihoon Park, Siuc Isat

ASA Multidisciplinary Research Symposium

Enterprise Computing has quickly become of paramount importance for businesses vying to survive in today’s unlimited competition market. SAP software has become a front runner and leader of business and technical innovation in the enterprise computing industry. Major fortune 500 companies are using SAP software as their main operating software. As the need for individuals knowledgeable on SAP has increased dramatically, learning SAP is becoming important for the market of employment


Can Flight Data Recorder Memory Be Stored On The Cloud?, Yair Wiseman Oct 2016

Can Flight Data Recorder Memory Be Stored On The Cloud?, Yair Wiseman

Journal of Aviation Technology and Engineering

Flight data recorders (FDRs, or black boxes) generate data that is collected on an embedded memory device. A well-known difficulty with these devices is that the embedded memory device runs out of space. To avoid getting into this problematic situation, the software of the FDR is designed to operate in a watchful mode, constantly working to minimize the use of memory space; otherwise a larger FDR would be needed. However, larger FDRs can be a problem because they have very rigorous requirements; thus, enlargement is costly. Outcomes of this research include the recommendation to send FDR data to a remote …


Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana Oct 2016

Towards A Development Of A Mobile Application Security Invasiveness Index, Sam Espana

KSU Proceedings on Cybersecurity Education, Research and Practice

The economic impact of Mobile IP, the standard that allows IP sessions to be maintained even when switching between different cellular towers or networks, has been staggering in terms of both scale and acceleration (Doherty, 2016). As voice communications transition to all-digital, all-IP networks such as 4G, there will be an increase in risk due to vulnerabilities, malware, and hacks that exist for PC-based systems and applications (Harwood, 2011). According to Gostev (2006), in June, 2004, a well-known Spanish virus collector known as VirusBuster, emailed the first known mobile phone virus to Kaspersky Lab, Moscow. Targeting the Symbian OS, the …


Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang Oct 2016

Prediction And Recommendations On The It Leaners' Learning Path As A Collective Intelligence Using A Data Mining Technique, Seong-Yong Hong, Juyun Cho, Yonghyun Hwang

Journal of International Technology and Information Management

With the recent advances in computer technology along with pervasive internet accesses, data analytics is getting more attention than ever before. In addition, research areas on data analysis are diverging and integrating lots of different fields such as a business and social sector. Especially, recent researches focus on the data analysis for a better intelligent decision making and prediction system. This paper analyzes data collected from current IT learners who have already studied various IT subjects to find the IT learners’ learning patterns. The most popular learning patterns are identified through an association rule data mining using an arules package …


The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman Oct 2016

The Impact Of Analytics Utilization On Team Performance: Comparisons Within And Across The U.S. Professional Sports Leagues, Lee A. Freeman

Journal of International Technology and Information Management

Business analytics, defined as the use of data to make better, more relevant, evidence-based business decisions, has received a great deal of attention in practitioner circles. Organizations have adopted business analytics in an effort to improve revenue, product placement, and customer satisfaction. Professional sports teams are no different. While analytics has been used for over 30 years, the use of analytics by professional sports teams is a relatively new concept. However, it is unclear whether the teams that have adopted analytics are seeing any results. If not, then perhaps analytics is not the right solution. Analyses across the four, major …


A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao Oct 2016

A Data-Centric Analysis On Stem Majoring And Success: Attitude And Readiness, Xin James He, Myron Sheu, Jie Tao

Journal of International Technology and Information Management

This research studies attitude and readiness of STEM majoring and success with

the data from a survey with a total of 501 viable responses, with respect to STEM

(science, technology, engineering, and mathematics) related majors that are

essential and fundamental to skills relevant to big data business analytics.

Recruiting and keeping students in STEM areas have attracted a large body of

attention in pedagogical studies. An effective way of achieving such a goal is to

show them how rewarding and self-fulfilling STEM careers can be toward

perspective students. One example of the abundance of STEM careers is the rapid

growth …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy Oct 2016

Motivations For Social Network Site (Sns) Gaming: A Uses And Gratification & Flow Perspective, Brinda Sampat, Bala Krishnamoorthy

Journal of International Technology and Information Management

The penetration of the internet, smart-phones and tablets has witnessed tremendous increase in the number of people playing online games in the past few years. Social networking site (SNS) games are a subset of digital games. They are platform based, multiplayer and reveal the real identity of the player. These games are hosted on social networks such as Facebook, where in people play with many other players online. The risks associated with social network gaming are addiction, theft, fraud, loneliness, anxiety, aggression, poor academic performance, cognition distortion etc. This study aims to understand the user motivations to continue to play …


Violating Of Individual Privacy: Moroccan Perceptions Of The Ban Of Voip Services, Tyler Delhees Oct 2016

Violating Of Individual Privacy: Moroccan Perceptions Of The Ban Of Voip Services, Tyler Delhees

Independent Study Project (ISP) Collection

On January 6, 2016, the Moroccan telecommunications regulatory agency, the ANRT, announced a ban onVoice Over Internet Protocol(VoIP) calling services such as Skype, WhatsApp, and Viber. The ban triggered sweeping opposition among the Moroccan public, opening discussion of digital rights, censorship, and Internet governance. Considering liberal democratic rights in the 2011 Moroccan Constitution and a history of censorship, this study analyzes the official justification of the ANRT alongside additional explanations involving business interests and the security services. The purpose of this study is to gauge the perceptions of Moroccans on the decision of the ANRT and provide a holistic explanation. …


Toward Distributed At-Scale Hybrid Network Test With Emulation And Simulation Symbiosis, Rong Rong Sep 2016

Toward Distributed At-Scale Hybrid Network Test With Emulation And Simulation Symbiosis, Rong Rong

FIU Electronic Theses and Dissertations

In the past decade or so, significant advances were made in the field of Future Internet Architecture (FIA) design. Undoubtedly, the size of Future Internet will increase tremendously, and so will the complexity of its users’ behaviors. This advancement means most of future Internet applications and services can only achieve and demonstrate full potential on a large-scale basis. The development of network testbeds that can validate key design decisions and expose operational issues at scale is essential to FIA research. In conjunction with the development and advancement of FIA, cyber-infrastructure testbeds have also achieved remarkable progress. For meaningful network studies, …


After The Avalanche: The Post-Snowden Intelligence Politics Between The United States, The United Kingdom, And Germany, Jobel Kyle P. Vecino Sep 2016

After The Avalanche: The Post-Snowden Intelligence Politics Between The United States, The United Kingdom, And Germany, Jobel Kyle P. Vecino

Claremont-UC Undergraduate Research Conference on the European Union

The revelations of PRISM and XKeyscore by ex-National Security Agency (NSA) analyst Edward Snowden resulted in arguably the largest intelligence leak so far in the 21st century. The leak revealed that the NSA was working with the British Government Communications Headquarters (GCHQ) on surveillance and data collection of individuals throughout Europe. Similarly, the NSA also colluded with the German Federal Intelligence Service (BND) on similar data collection and surveillance activities. Whereas the British government reacted relatively benignly to the revelations despite cries of government abuse, the German government reacted negatively to the revelations, eventually opening a rift between Washington …


Routing Algorithm With Uneven Clustering For Energy Heterogeneous Wireless Sensor Networks, Ying Zhang, Wei Xiong, Dezhi Han, Wei Chen, Jun Wang Sep 2016

Routing Algorithm With Uneven Clustering For Energy Heterogeneous Wireless Sensor Networks, Ying Zhang, Wei Xiong, Dezhi Han, Wei Chen, Jun Wang

Computer Science Faculty Research

Aiming at the “hotspots” problem in energy heterogeneous wireless sensor networks, a routing algorithm of heterogeneous sensor network with multilevel energies based on uneven clustering is proposed. In this algorithm, the energy heterogeneity of the nodes is fully reflected in the mechanism of cluster-heads’ election. It optimizes the competition radius of the cluster-heads according to the residual energy of the nodes. This kind of uneven clustering prolongs the lifetime of the cluster-heads with lower residual energies or near the sink nodes. In data transmission stage, the hybrid multihop transmission mode is adopted, and the next-hop routing election fully takes account …


Haptic Foot Feedback For Kicking Training In Virtual Reality, Hank Huang, Hong Tan Aug 2016

Haptic Foot Feedback For Kicking Training In Virtual Reality, Hank Huang, Hong Tan

The Summer Undergraduate Research Fellowship (SURF) Symposium

As means to further supplement athletic performances increases, virtual reality is becoming helpful to sports in terms of cognitive training such as reaction, mentality, and game strategies. With the aid of haptic feedback, interaction with virtual objects increases by another dimension, in addition to the presence of visual and auditory feedback. This research presents an integrated system of a virtual reality environment, motion tracking system, and a haptic unit designed for the dorsal foot. The prototype simulates a scenario of virtual kicking and returns haptic response upon collision between the user’s foot and virtual object. The overall system was evaluated …


Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang Aug 2016

Topology Design And Delay Control For Communication Networks In Smart Grid, Xiaodong Wang

Doctoral Dissertations

Stability is a critical concern in the design and maintenance of power systems. Different approaches have been proposed for the analysis of power grid stability in various scenarios depending on small or large perturbations and the speed of the phenomenon of interest. In this work, we consider the power grid as a group of flocking birds, as synchronization is the key issue in both contexts. The framework of partial difference equation (PdE) is used to analyze the system stability, when designing the communication network of the power grid network for conveying measurements between different power stations. Both the cases where …


The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford Aug 2016

The Design And Validation Of A Wireless Bat-Mounted Sonar Recording System, Jeremy Joseph Langford

Masters Theses

Scientists studying the behavior of bats monitor their echolocation calls, as their calls are important for navigation and feeding, but scientist are typically restricted to ground-based recording. Recording bat calls used for echolocation from the back of the bat as opposed to the ground offers the opportunity to study bat echolocation from a vantage otherwise only offered to the bats themselves. However, designing a bat mounted in-flight audio recording system, (bat-tag), capable of recording the ultra-sound used in bat echolocation presents a unique set of challenges. Chiefly, the bat-tag must be sufficiently light weight as to not overburden the bat, …


A Multilingual Semi-Supervised Approach In Deriving Singlish Sentic Patterns For Polarity Detection, Siaw Ling Lo, Erik Cambria, Raymond Chiong, David Cornforth Aug 2016

A Multilingual Semi-Supervised Approach In Deriving Singlish Sentic Patterns For Polarity Detection, Siaw Ling Lo, Erik Cambria, Raymond Chiong, David Cornforth

Research Collection School Of Computing and Information Systems

Due to the huge volume and linguistic variation of data shared online, accurate detection of the sentiment of a message (polarity detection) can no longer rely on human assessors or through simple lexicon keyword matching. This paper presents a semi-supervised approach in constructing essential toolkits for analysing the polarity of a localised scarce-resource language, Singlish (Singaporean English). Corpus-based bootstrapping using a multilingual, multifaceted lexicon was applied to construct an annotated testing dataset, while unsupervised methods such as lexicon polarity detection, frequent item extraction through association rules and latent semantic analysis were used to identify the polarity of Singlish n-grams before …


Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh Jul 2016

Climbing Up Cloud Nine: Performance Enhancement Techniques For Cloud Computing Environments, Mohamed Abusharkh

Electronic Thesis and Dissertation Repository

With the transformation of cloud computing technologies from an attractive trend to a business reality, the need is more pressing than ever for efficient cloud service management tools and techniques. As cloud technologies continue to mature, the service model, resource allocation methodologies, energy efficiency models and general service management schemes are not yet saturated. The burden of making this all tick perfectly falls on cloud providers. Surely, economy of scale revenues and leveraging existing infrastructure and giant workforce are there as positives, but it is far from straightforward operation from that point. Performance and service delivery will still depend on …


Mims: Mobile Interruption Management System, Mohammad Kayes Kaykobad Jul 2016

Mims: Mobile Interruption Management System, Mohammad Kayes Kaykobad

Master's Theses (2009 -)

Mobile devices are increasing in an astronomical rate throughout the world. While it is bringing a lot of comfort to the users it is not coming without any hazards. Now a user is susceptible to mobile call interruptions wherever he is, whether he is in the middle of a very important discussion or in a very important task like performing a complicated emergency operation in a hospital. As a result researchers have been studying to find ways to minimize cost of mobile interruptions. In this thesis we have proposed a mobile interruption management system in which callers have been grouped …


The Fcc And The “Pre-Internet”, John Blevins Jul 2016

The Fcc And The “Pre-Internet”, John Blevins

Indiana Law Journal

Network neutrality has dominated broadband policy debates for the past decade. While important, network neutrality overshadows other policy levers that are equally important to the goals of better, cheaper, and more open broadband service. This lack of perspective has historical precedent—and understanding this history can help refocus today’s policy debate. In the 1960s and 1970s, telephone companies threatened the growth of the nascent data industry. The FCC responded with a series of rulemakings known as the “Computer Inquiries” proceedings. In the literature, Computer Inquiries enjoys hallowed status as a key foundation of the Internet’s rise.

This Article, however, argues that …


Stpp: Spatial-Temporal Phase Profiling Based Method For Relative Rfid Tag Localization, Longfei Shangguan, Zheng Yang, Alex X. Liu, Zimu Zhou, Yunhao Liu Jul 2016

Stpp: Spatial-Temporal Phase Profiling Based Method For Relative Rfid Tag Localization, Longfei Shangguan, Zheng Yang, Alex X. Liu, Zimu Zhou, Yunhao Liu

Research Collection School Of Computing and Information Systems

Many object localization applications need the relative locations of a set of objects as oppose to their absolute locations. Although many schemes for object localization using radio frequency identification (RFID) tags have been proposed, they mostly focus on absolute object localization and are not suitable for relative object localization because of large error margins and the special hardware that they require. In this paper, we propose an approach called spatial-temporal phase profiling (STPP) to RFID-based relative object localization. The basic idea of STPP is that by moving a reader over a set of tags during which the reader continuously interrogating …


Passively Testing Routing Protocols In Wireless Sensor Networks, Xiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee-Pink Tan Jul 2016

Passively Testing Routing Protocols In Wireless Sensor Networks, Xiaoping Che, Stephane Maag, Hwee-Xian Tan, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

Smart systems are today increasingly developed with the number of wireless sensor devices that drastically increases. They are implemented within several contexts through our environment. Thus, sensed data transported in ubiquitous systems are important and the way to carry them must be efficient and reliable. For that purpose, several routing protocols have been proposed to wireless sensor networks (WSN). However, one stage that is often neglected before their deployment, is the conformance testing process, a crucial and challenging step. Active testing techniques commonly used in wired networks are not suitable to WSN and passive approaches are needed. While some works …


Privacy And The Information Age: A Longitudinal View, Charles E. Downing Jul 2016

Privacy And The Information Age: A Longitudinal View, Charles E. Downing

Journal of International Technology and Information Management

As information systems and data storage capacity become increasingly sophisticated, an important ethical question for organizations is “What can/will/should be done with the personal information that has been and can be collected?” Individuals’ privacy is certainly important, but so is less costly and more targeted business processes. As this conflict intensifies, consumers, managers and policy makers are left wondering: What privacy principles are important to guide organizations in self-regulation? For example, do consumers view the five rights originally stated in the European Data Protection Directive as important? Comprehensive? Is there a product discount point where consumers would forsake these principles? …


Practitioners' Expectations On Automated Fault Localization, Pavneet Singh Kochhar, Xin Xia, David Lo, Shanping Li Jul 2016

Practitioners' Expectations On Automated Fault Localization, Pavneet Singh Kochhar, Xin Xia, David Lo, Shanping Li

Research Collection School Of Computing and Information Systems

Software engineering practitioners often spend significant amount of time and effort to debug. To help practitioners perform this crucial task, hundreds of papers have proposed various fault localization techniques. Fault localization helps practitioners to find the location of a defect given its symptoms (e.g., program failures). These localization techniques have pinpointed the locations of bugs of various systems of diverse sizes, with varying degrees of success, and for various usage scenarios. Unfortunately, it is unclear whether practitioners appreciate this line of research. To fill this gap, we performed an empirical study by surveying 386 practitioners from more than 30 countries …


Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown Jul 2016

Crowdsourcing Management Education Assessment, Owen P. Hall Jr, Charla Griffy-Brown

Journal of International Technology and Information Management

Assessment is now at the center of the new business education zeitgeist. This focus is the direct result of feedback from the business community regarding the growing gap between their needs and graduates from many business schools. Recently this divide has fallen under even closer scrutiny because of increasing student debt and the growing controversy over return-on- investment. Today business leaders are looking for web-savvy, problem-solving graduates. To this end, AACSB and regional accrediting bodies are calling for the adoption of comprehensive collaborative learning strategies to better align graduates’ skill sets with the real needs of business. Crowdsourcing, which is …


Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar Jul 2016

Towards A Taxonomy Of Challenges In An Integrated It Governance Framework Implementation, Mathew Nicho, Suadad Muamaar

Journal of International Technology and Information Management

The rapid adoption of IT governance (ITG) frameworks in organizations worldwide, along with the subsequent need to select and integrate overlapping ITG frameworks has presented practitioners with challenges in choice and integration of frameworks. In this respect, the purpose of this study was to explore the ITG frameworks integration (ITGFI) challenges faced by organizations worldwide; develop and test a theory-based integrated ITG challenges (IIC) taxonomy model created from extant literature; and validate and compare these with those empirically extracted from three case studies in the United Arab Emirates (UAE). The results present the audience with a taxonomy of a prioritized …


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee Jul 2016

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong Jul 2016

An Empirical Investigation On Ceo Turnover In It Firms And Firm Performance, Peiqin Zhang, David Wierschem, Francis A. Mendez Mediavilla, Keejae P. Hong

Journal of International Technology and Information Management

Drawn upon upper echelon theory and organizational theory, this research proposes to examine the impact of CEO turnover in IT firms on firm performance in terms of both sustainable accounting performance and market performance. We find that CEO turnover is a significant determinant of firm performance, especially in IT firms. This paper contributes to the IS literature by investigating the CEO turnover impact in IT firms compared to other industries. This study also has practical implications by providing the guideline for IT firms on the CEO turnover policy. Such firms should place additional emphasis on their succession planning efforts.


Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa Jul 2016

Facebook Use Among African American And Hispanic Students: An Exploratory Investigation Of Perceived Academic Impact, Sathasivam Mathiyalakan, Sharon D. White, Jorge O. Brusa

Journal of International Technology and Information Management

Facebook is one of the world’s leading social networking sites. It is pervasive in students’ lives and can impact their academic careers in a variety of ways. However, little research exists evaluating the use of Facebook in minority academic settings. An early step in this direction is to gain an understanding of how different student demographic groups use Facebook. An interest in further assessment of Facebook’s role in diverse segments of academia motivates the collection and analysis of Facebook-related data from minority serving institutions such as Historically Black Colleges or Universities (HBCUs) and Hispanic Serving Institutions (HSIs). This study presents …


Performance Optimization Of Network Protocols For Ieee 802.11s-Based Smart Grid Communications, Nico Saputro Jun 2016

Performance Optimization Of Network Protocols For Ieee 802.11s-Based Smart Grid Communications, Nico Saputro

FIU Electronic Theses and Dissertations

The transformation of the legacy electric grid to Smart Grid (SG) poses numerous challenges in the design and development of an efficient SG communications network. While there has been an increasing interest in identifying the SG communications network and possible SG applications, specific research challenges at the network protocol have not been elaborated yet. This dissertation revisited each layer of a TCP/IP protocol stack which basically was designed for a wired network and optimized their performance in IEEE 802.11s-based Advanced Metering Infrastructure (AMI) communications network against the following challenges: security and privacy, AMI data explosion, periodic simultaneous data reporting scheduling, …


Spectrally Efficient Cooperative Relay Networks Using Signal Space Diversity, Muhammad Ajmal Khan Jun 2016

Spectrally Efficient Cooperative Relay Networks Using Signal Space Diversity, Muhammad Ajmal Khan

Electronic Thesis and Dissertation Repository

Cooperative relaying has received widespread attention in recent years from both academic and industrial communities. It offers significant benefits in enabling connectivity as well as in increasing coverage, power saving, spatial diversity and channel capacity. However, one of the main limitations of the conventional cooperative relaying system is the repetition of the received data by the relays, which reduces the spectral efficiency and the data rate. In this thesis, signal space diversity (SSD) based technique is proposed to incorporate into the conventional relaying system to enhance spectral efficiency, data rate and system performance.

Firstly, SSD is introduced into a two-way …