Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

University of Nebraska - Lincoln

Discipline
Keyword
Publication
Publication Type

Articles 1 - 8 of 8

Full-Text Articles in Digital Communications and Networking

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof. Nov 2020

Bibliometric Analysis Of Firefly Algorithm Applications In The Field Of Wireless Sensor Networks, Anupkumar M. Bongale Dr., Rahul Raghvendra Joshi Prof., Kalyani Dhananjay Kadam Prof.

Library Philosophy and Practice (e-journal)

Wireless Sensor Network is a network of wireless sensor nodes that are capable of sensing information from their surroundings and transmit the sensed information to data collection point known as a base station. Applications of wireless sensor networks are large in number and forest fire detection, landslide monitoring, etc. are few applications to note. The research challenges in wireless sensor networks is the transmission of data from the sensor node to the base station in an energy-efficient manner and network life prolongation. Cluster-based routing techniques are extensively adopted to address this research challenge. Researchers have used different metaheuristic and soft …


The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman Nov 2020

The Effect Of Information Technology Audit For E-Health Of Indonesia Using Itil Framework V.3 Domain Service Design, Eva Mufidah, Ilham M, Anis Eliyana, Tanti Handriana, Indrianawati Usman

Library Philosophy and Practice (e-journal)

This study explain about E-Health Surabaya is a web-based health service technology application that is used to help people register as patients in hospitals and health centers. Although its function is very useful, there are also people who still do not understand how to use this application, there are also some shortcomings that cause inconvenience in its use. So that research is conducted in which the application uses ITIL V.3 framework with Domain Service Design to conduct an audit of the maturity level of this E-Health Surabaya Web Application. ITIL (Information Technology Infrastructure Technology) is a framework used to manage …


A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman Aug 2020

A Review Paper: Analysis Of Weka Data Mining Techniques For Heart Disease Prediction System, Basma Jumaa Saleh, Ahmed Yousif Falih Saedi, Ali Talib Qasim Al-Aqbi, Lamees Abdalhasan Salman

Library Philosophy and Practice (e-journal)

Data mining is characterized as searching for useful information through very large data sets. Some of the key and most common techniques for data mining are association rules, classification, clustering, prediction, and sequential models. For a wide range of applications, data mining techniques are used. Data mining plays a significant role in disease detection in the health care industry. The patient should be needed to detect a number of tests for the disease. However, the number of tests should be reduced by using data mining techniques. In time and performance, this reduced test plays an important role. Heart disease is …


A Novel Path Loss Forecast Model To Support Digital Twins For High Frequency Communications Networks, James Marvin Taylor Jr Jul 2020

A Novel Path Loss Forecast Model To Support Digital Twins For High Frequency Communications Networks, James Marvin Taylor Jr

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

The need for long-distance High Frequency (HF) communications in the 3-30 MHz frequency range seemed to diminish at the end of the 20th century with the advent of space-based communications and the spread of fiber optic-connected digital networks. Renewed interest in HF has emerged as an enabler for operations in austere locations and for its ability to serve as a redundant link when space-based and terrestrial communication channels fail. Communications system designers can create a “digital twin” system to explore the operational advantages and constraints of the new capability. Existing wireless channel models can adequately simulate communication channel conditions with …


Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services Mar 2020

Innovation In Pedagogy And Technology Symposium, 2019: Selected Conference Proceedings, University Of Nebraska Online, University Of Nebraska Information Technology Services

Zea E-Books Collection

Advancing Technology in Education at the University of Nebraska, May 7, 2019

Welcome Address • Susan Fritz, Ph.D., Executive Vice President and Provost, University of Nebraska 6

Opening Remarks • Mary Niemiec, Associate Vice President for Digital Education, Director of University of Nebraska Online 6

Keynote Presentation: Shaping the Next Generation of Higher Education • Bryan Alexander, Ph.D. 6

Featured Extended Presentation: Redesigning Courses & Determining Effectiveness Through Research • Tanya Joosten, University of Wisconsin-Milwaukee (UWM), Erin Blankenship, Ph.D. (UNL), Ella Burnham (UNL), Nate Eidem, Ph.D. (UNK), Marnie Imhoff (UNMC), Linsey Donner (UNMC), Ellie Miller (UNMC) 7

5 Ways to …


Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa Feb 2020

Bibliometric Survey For Cryptanalysis Of Block Ciphers Towards Cyber Security, Pooja Bagane, Sirbi Kotrappa

Library Philosophy and Practice (e-journal)

In Cryptography, Block Cipher is an algorithm used to encode the data which is used to transfer over internet. Cryptanalyst tries to break secret code by using different methods like Brute Force attack, Linear Cryptanalysis and differential cryptanalysis etc. The basic aim of this bibliometric survey is to understand the extent of the available literature for the area of cryptanalysis of block ciphers towards cyber security. The bibliometric analysis is primarily based on Scopus as it provides research database for various areas and tools like Sciencescape, Gephi etc. It is analyzed by bibliometric survey that major publications are from conference, …


Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner Feb 2020

Algorithms Of Oppression [Uno Pa Theory Proseminar Presentation], Sue Ann Gardner

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

Slides of two classes taught in the Theory Proseminar in the School of Public Administration at the University of Nebraska at Omaha by Sue Ann Gardner on February 11 and 18, 2020.

Connects information theory to applicable knowledge frameworks in public administration. Includes an in-depth discussion of the concepts addressed in Samiya Umoja Noble's book Algorithms of Oppression (published by New York University Press, New York, New York, United States, 2018) in the context of public administration and public academic libraries.


Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar Jan 2020

Implementation Of Uhf-Rfid Technology In An Academic Library Of Pakistan; A Case Study, Attya Shahid Ms, Naveed Sehar

Library Philosophy and Practice (e-journal)

There are numerous libraries in Pakistan that cannot afford RFID technology because of the limited budget and resources and confronted book theft, low security, and delay services. This paper base an experiment that how libraries can adopt this technology effectively and productively with a lower budget and higher outcomes. The FAST-National University of Computer and Emerging Sciences Library Karachi campuses is the principal library in Pakistan which has adopted UHF-RFID technology with the integration of ILS insignia; SIP II compliance that jointly works with library integrated system and numerous activities can be made through this. An exploratory study conducted in …