Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2021

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 145

Full-Text Articles in Digital Communications and Networking

Machine Learning Techniques For Network Analysis, Irfan Lateef Dec 2021

Machine Learning Techniques For Network Analysis, Irfan Lateef

Dissertations

The network's size and the traffic on it are both increasing exponentially, making it difficult to look at its behavior holistically and address challenges by looking at link level behavior. It is possible that there are casual relationships between links of a network that are not directly connected and which may not be obvious to observe. The goal of this dissertation is to study and characterize the behavior of the entire network by using eigensubspace based techniques and apply them to network traffic engineering applications.

A new method that uses the joint time-frequency interpretation of eigensubspace representation for network statistics …


Lapindo Embankment Security Monitoring System Based On Iot, Shazana Dhiya Ayuni, Syamsudduha Syahrorini, Jamaaluddin Jamaaluddin Dec 2021

Lapindo Embankment Security Monitoring System Based On Iot, Shazana Dhiya Ayuni, Syamsudduha Syahrorini, Jamaaluddin Jamaaluddin

Elinvo (Electronics, Informatics, and Vocational Education)

Since 2006 Lapindo mudflow caused by natural gas drilling in Sidoarjo. Nowdays the mudflow still can't be stopped, and to prevent it from resident's houses, embankments were built. Eventough the embankments and guardrails has been built but sometimes the mud flowing into resident's houses while its raining or the embankments were subsidence or reep. Severity, the distance between the embankment and the residents' houses is about 500 m. So far, the handling action while embankments ware subsidence is residents report the accidents to related parties, namely PPLS. But the response is too late and take a long time to occur …


Power Monitoring And Passenger Classification On Logistics Elevator, Isa Hafidz, Aldhitiansyah Putra, Billy Montolalu, Dimas Adiputra, Rifky Dwi Putranto, Rafly Daffaldi, Dinda Karisma Ulfa Dec 2021

Power Monitoring And Passenger Classification On Logistics Elevator, Isa Hafidz, Aldhitiansyah Putra, Billy Montolalu, Dimas Adiputra, Rifky Dwi Putranto, Rafly Daffaldi, Dinda Karisma Ulfa

Elinvo (Electronics, Informatics, and Vocational Education)

The elevator has an important role in assisting transportation and logistics activities in a building. However, if the elevator is not used wisely, then the power consumption will be inefficient. A policy of elevator usage is necessary to ensure the effectiveness of elevator power consumption. Therefore, in this study, elevator power consumption monitoring is proposed. The power consumption behavior can be learned so a suitable policy can be made accordingly. Two elevators in Telkom Campus Surabaya are monitored to understand the daily electrical energy usage. Internet of Things (IoT) based real-time power monitoring system is used to monitor the electrical …


Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh Dec 2021

Crowd Detection System Using Blimp Drones As An Effort To Mitigate The Spread Of Covid-19 Based On Internet Of Things, Mashoedah Mashoedah, Oktaf Agni Dhewa, Zulhakim Seftiyana Roviyan, Dheni Leo, Silvia Larasatul Masyitoh

Elinvo (Electronics, Informatics, and Vocational Education)

The application of health protocols is a regulation that is applied to prevent the spread of Covid-19. Public awareness of the implementation of health protocols is still lacking. This study aims to determine the performance of the detection system using the Blimp Drone as an effort to mitigate the spread of Covid-19 based on the Internet of Things. The method used in system development consists of literature review, needs analysis, design, manufacture, and testing. This system uses the Blimp Drone as a vehicle to carry out flight missions. Raspberry pi camera as a component for distance detection in …


The Automatic Monitoring System For Wpp, Spp, And Pln Based On The Internet Of Things (Iot) Using Sonoff Pow R2, Yosi Apriani, Muhammad Rama Bagaskara, Ian Mochamad Sofian, Wiwin A. Oktaviani, Muhammad Hurairoh Dec 2021

The Automatic Monitoring System For Wpp, Spp, And Pln Based On The Internet Of Things (Iot) Using Sonoff Pow R2, Yosi Apriani, Muhammad Rama Bagaskara, Ian Mochamad Sofian, Wiwin A. Oktaviani, Muhammad Hurairoh

Elinvo (Electronics, Informatics, and Vocational Education)

The usefulness of monitoring systems in the electric power system supports the importance of people's work today. One of which is the monitoring system at the generator. The monitoring system for Wind Power Plant (WPP), Solar Power Plant (SPP), and electricity from State Electricity Company (PLN) use IoT (Internet of Things) in the form of Sonoff Pow R2. With the monitoring system on this tool, the parameter values for WPP, SPP, and PLN can be seen and monitored online via a smartphone. The purpose of this research is to design a monitoring system for WPP, SPP, and PLN based on …


Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao Dec 2021

Comparative Analysis Of Rgb-Based Eye-Tracking For Large-Scale Human-Machine Applications, Brett Thaman, Trung Cao

Posters-at-the-Capitol

Gaze tracking has become an established technology that enables using an individual’s gaze as an input signal to support a variety of applications in the context of Human-Computer Interaction. Gaze tracking primarily relies on sensing devices such as infrared (IR) cameras. Nevertheless, in the recent years, several attempts have been realized at detecting gaze by acquiring and processing images acquired from standard RGB cameras. Nowadays, there are only a few publicly available open-source libraries and they have not been tested extensively. In this paper, we present the result of a comparative analysis that studied a commercial eye-tracking device using IR …


Improving Noise Immunity And Efficiency Using High-Precision Iterative Codes, Sherzod Shukhratovich Atadjanov, Aziza Ahmadjanovna Tursunova Dec 2021

Improving Noise Immunity And Efficiency Using High-Precision Iterative Codes, Sherzod Shukhratovich Atadjanov, Aziza Ahmadjanovna Tursunova

Bulletin of TUIT: Management and Communication Technologies

The article discusses the issues of ensuring noise immunity in digital broadcasting systems, shows the importance of the transition to the optimal code and the need to use it in the field of noiseless coding in various areas of telecommunication transmission and reception of digital signals. The previous algorithms and error-correcting coding methods based on the Gray code, which are used in multi-level digital broadcast modulation schemes to minimize the intensity of bit errors, are highlighted. A model of error-correcting coding by the Gray method and methods for estimating the probability of error for the Gray code are presented. Based …


Automated Report Based System To Encourage A Greener Commute To Campus, Ronald Velasquez Dec 2021

Automated Report Based System To Encourage A Greener Commute To Campus, Ronald Velasquez

Computer Science and Computer Engineering Undergraduate Honors Theses

This project consists of the design and implementation of a tool to encourage greener commutes to the University of Arkansas. Trends in commuting of the last few years show a decline in not so environment-friendly commute modes. Nevertheless, ensuring that this trend continues is vital to assure a significant impact. The created tool is an automated report system. The report displays information about different commute options. A Google form allows users to submit report requests, and a web app allows the sustainability office to process them in batches. This system was built in the Apps Script platform. It implements several …


Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil Dec 2021

Network Management, Optimization And Security With Machine Learning Applications In Wireless Networks, Mariam Nabil

Theses and Dissertations

Wireless communication networks are emerging fast with a lot of challenges and ambitions. Requirements that are expected to be delivered by modern wireless networks are complex, multi-dimensional, and sometimes contradicting. In this thesis, we investigate several types of emerging wireless networks and tackle some challenges of these various networks. We focus on three main challenges. Those are Resource Optimization, Network Management, and Cyber Security. We present multiple views of these three aspects and propose solutions to probable scenarios. The first challenge (Resource Optimization) is studied in Wireless Powered Communication Networks (WPCNs). WPCNs are considered a very promising approach towards sustainable, …


Approaches To Improve The Execution Time Of A Quantum Network Simulation, Joseph B. Tippit Dec 2021

Approaches To Improve The Execution Time Of A Quantum Network Simulation, Joseph B. Tippit

Theses and Dissertations

Evaluating quantum networks is an expensive and time-consuming task that benefits from simulation. A potential improvement is to utilize GPUs, namely by leveraging NVIDIA's programming framework, CUDA. To avoid performance pitfalls of higher level languages and programming models such as the so called "two language problem," the Julia Programming Language provides the basis for the development effort. This research develops a two module prototype quantum network simulation framework using GPUs and Julia. Performance of the software is measured and compared against other languages such as MATLAB.


Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler Dec 2021

Contrastive Learning For Unsupervised Auditory Texture Models, Christina Trexler

Computer Science and Computer Engineering Undergraduate Honors Theses

Sounds with a high level of stationarity, also known as sound textures, have perceptually relevant features which can be captured by stimulus-computable models. This makes texture-like sounds, such as those made by rain, wind, and fire, an appealing test case for understanding the underlying mechanisms of auditory recognition. Previous auditory texture models typically measured statistics from auditory filter bank representations, and the statistics they used were somewhat ad-hoc, hand-engineered through a process of trial and error. Here, we investigate whether a better auditory texture representation can be obtained via contrastive learning, taking advantage of the stationarity of auditory textures to …


Deep Learning Based Speech Enhancement And Its Application To Speech Recognition, Ju Lin Dec 2021

Deep Learning Based Speech Enhancement And Its Application To Speech Recognition, Ju Lin

All Dissertations

Speech enhancement is the task that aims to improve the quality and the intelligibility of a speech signal that is degraded by ambient noise and room reverberation. Speech enhancement algorithms are used extensively in many audio- and communication systems, including mobile handsets, speech recognition, speaker verification systems and hearing aids. Recently, deep learning has achieved great success in many applications, such as computer vision, nature language processing and speech recognition. Speech enhancement methods have been introduced that use deep-learning techniques, as these techniques are capable of learning complex hierarchical functions using large-scale training data. This dissertation investigates the deep learning …


Wi-Fi Sensing: Device-Free In-Zone Object Movement Detection, Nicholas P. Schnorr Dec 2021

Wi-Fi Sensing: Device-Free In-Zone Object Movement Detection, Nicholas P. Schnorr

Master's Theses

Wi-Fi Sensing is becoming a prominent field with a wide range of potential applications. Using existing hardware on a wireless network such as access points, cell phones, and smart home devices, important information can be inferred about the current physical environment. Through the analysis of Channel State Information collected in the Neighborhood Discovery Protocol process, the wireless network can detect disturbances in Wi-Fi signals when the physical environment changes. This results in a system that can sense motion within the Wi-Fi network, allowing for movement detection without any wearable devices.

The goal of this thesis is to answer whether Wi-Fi …


Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang Dec 2021

Machine Learning For Unmanned Aerial System (Uas) Networking, Jian Wang

Doctoral Dissertations and Master's Theses

Fueled by the advancement of 5G new radio (5G NR), rapid development has occurred in many fields. Compared with the conventional approaches, beamforming and network slicing enable 5G NR to have ten times decrease in latency, connection density, and experienced throughput than 4G long term evolution (4G LTE). These advantages pave the way for the evolution of Cyber-physical Systems (CPS) on a large scale. The reduction of consumption, the advancement of control engineering, and the simplification of Unmanned Aircraft System (UAS) enable the UAS networking deployment on a large scale to become feasible. The UAS networking can finish multiple complex …


Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry Nov 2021

Ggnb: Graph-Based Gaussian Naive Bayes Intrusion Detection System For Can Bus, Riadul Islam, Maloy K. Devnath, Manar D. Samad, Syed Md Jaffrey Al Kadry

Computer Science Faculty Research

The national highway traffic safety administration (NHTSA) identified cybersecurity of the automobile systems are more critical than the security of other information systems. Researchers already demonstrated remote attacks on critical vehicular electronic control units (ECUs) using controller area network (CAN). Besides, existing intrusion detection systems (IDSs) often propose to tackle a specific type of attack, which may leave a system vulnerable to numerous other types of attacks. A generalizable IDS that can identify a wide range of attacks within the shortest possible time has more practical value than attack-specific IDSs, which is not a trivial task to accomplish. In this …


Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager Nov 2021

Ransomware Education: Availability, Accessibility, And Ease Of Use, Judson Gager, Judson Gager

Honors College Theses

With cybersecurity constantly in the media outlets with breaches, cybercrime, and cyberwarfare, it has become a significant concern for all. One of the most recent breaches in the summer of 2021 was the Colonial Pipeline breach, which has proven the country's reliance on these industrial control systems and networking. The systems were taken for ransom by a new type of ransomware written in a different programming language. Although the Colonial Pipeline breach was quickly addressed, the impact of the gas shortage and the response time were alarming at triaging the breach. However, this attack showed the public how dangerous ransomware …


The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami Nov 2021

The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami

Future Computing and Informatics Journal

It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …


Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre Nov 2021

Joint Latency-Energy Optimization Scheme For Offloading In Mobile Edge Computing Environment Based In Deep Reinforcement Learning, Jui Mhatre

Symposium of Student Scholars

With the increasing number of mobile devices (MD), IoT devices, and computation-intensive tasks deployed on these devices, there is a need to increase the efficiency and speed of the deliverable. Due to inadequate resources, it is infeasible to compute all the tasks locally. Similarly, due to time constraints, it is not possible to compute the entire task at a remote site. Edge computing (EC) and cloud computing (CC) play the role of providing the resources to these devices on the fly. But a major drawback is increased delay and energy consumption due to transmission and offloading of computation tasks to …


Virtual Reality As Pedagogical Tool To Enhance Experiential Learning: A Systematic Literature Review, Muhammad Mujtaba Asad, Aisha Naz Ansari, Prathamesh Churi, Mohammad Mehdi Tahanzadeh Nov 2021

Virtual Reality As Pedagogical Tool To Enhance Experiential Learning: A Systematic Literature Review, Muhammad Mujtaba Asad, Aisha Naz Ansari, Prathamesh Churi, Mohammad Mehdi Tahanzadeh

Institute for Educational Development, Karachi

Since half of the century, technology has dominated the modern era. The rapid advancement of technology has reached generating artificial intelligence and artificial realities. So, virtual reality is an emerging technology and is applicable in education as well. Virtual reality is a computer-generated simulation, where people can interact within an artificial environment. Moreover, in an educational setting, such an environment provides students with a chance to get experiential learning. This paper has a systematic literature review on emerging technologies, such as virtual reality as a pedagogical tool for enhancing students’ experiential learning. This review aims to explore and understand the …


Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M Nov 2021

Disaster Recovery System And Service Continuity Of Digital Library, Sivankalai S, Virumandi A, Sivasekaran K, Sharmila M

Library Philosophy and Practice (e-journal)

This paper will discuss catastrophe recovery and likelihood development for digital library structures. The article establishes a foundation for establishing Library continuity and disaster recovery strategies through the use of best practices. Library continuity development and catastrophe recovery are critical modules of the planning stage for a virtual digital library. Few institutions that experience a catastrophic disaster occurrence are powerless to recover always, but libraries can suggestively boost the possibility of long-term recovery of institutional digital resources by drafting a continuity and recovery strategy in preparation. This article is intended for system designers and administrators, as well as high-ranking library …


Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara Nov 2021

Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara

Journal of Digital Forensics, Security and Law

Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are designed on internet banking(e-banking) and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, real phishing attack studies are essential to study and analyze the attackers’ attack techniques and strategies. This study focused …


Intelligent Internet Of Things Frameworks For Smart City Safety, Dimitrios Sikeridis Nov 2021

Intelligent Internet Of Things Frameworks For Smart City Safety, Dimitrios Sikeridis

Electrical and Computer Engineering ETDs

The emerging Smart City ecosystem consists of a vast edge network of Internet of Things (IoT) devices that continuously interact with mobile devices carried by its citizens. In this setting, the IoT infrastructure, apart from the main communications facilitator, acts as a crowdsourcing mechanism that collects massive amounts of user data, and can support public safety applications for the Smart City. In this thesis, we design and analyze learning mechanisms that extract intelligence from crowd interactions with the wireless IoT infrastructure, and optimize its energy efficiency while operating as a public safety network. First, we deploy a multi-story facility testbed …


A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner Nov 2021

A Deep-Dive Into Cryptojacking Malware: From An Empirical Analysis To A Detection Method For Computationally Weak Devices, Ege Tekiner

FIU Electronic Theses and Dissertations

Cryptojacking is an act of using a victim's computation power without his/her consent. Unauthorized mining costs extra electricity consumption and decreases the victim host's computational efficiency dramatically. In this thesis, we perform an extensive research on cryptojacking malware from every aspects. First, we present a systematic overview of cryptojacking malware based on the information obtained from the combination of academic research papers, two large cryptojacking datasets of samples, and numerous major attack instances. Second, we created a dataset of 6269 websites containing cryptomining scripts in their source codes to characterize the in-browser cryptomining ecosystem by differentiating permissioned and permissionless cryptomining …


Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen Nov 2021

Protection Of Patient Privacy On Mobile Device Machine Learning, Matthew Nguyen

Cybersecurity Undergraduate Research Showcase

An existing StudentLife Study mobile dataset was evaluated and organized to be applied to different machine learning methods. Different variables like user activity, exercise, sleep, study space, social, and stress levels are optimized to train a model that could predict user stress level. The different machine learning methods would test if both patient data privacy and training efficiency can be ensured.


Internet Infrastructures For Large Scale Emulation With Efficient Hw/Sw Co-Design, Aiden K. Gula Oct 2021

Internet Infrastructures For Large Scale Emulation With Efficient Hw/Sw Co-Design, Aiden K. Gula

Masters Theses

Connected systems are becoming more ingrained in our daily lives with the advent of cloud computing, the Internet of Things (IoT), and artificial intelligence. As technology progresses, we expect the number of networked systems to rise along with their complexity. As these systems become abstruse, it becomes paramount to understand their interactions and nuances. In particular, Mobile Ad hoc Networks (MANET) and swarm communication systems exhibit added complexity due to a multitude of environmental and physical conditions. Testing these types of systems is challenging and incurs high engineering and deployment costs. In this work, we propose a scalable MANET emulation …


Resource Allocation In Distributed Service Networks, Nitish Kumar Panigrahy Oct 2021

Resource Allocation In Distributed Service Networks, Nitish Kumar Panigrahy

Doctoral Dissertations

The past few years have witnessed significant growth in the use of distributed network analytics involving agile code, data and computational resources. In many such networked systems, for example, Internet of Things (IoT), a large number of smart devices, sensors, processing and storage resources are widely distributed in a geographic region. These devices and resources distributed over a physical space are collectively called a distributed service network. Efficient resource allocation in such high performance service networks remains one of the most critical problems. In this thesis, we model and optimize the allocation of resources in a distributed service network. This …


Crest Or Trough? How Research Libraries Used Emerging Technologies To Survive The Pandemic, So Far, Scout Calvert Oct 2021

Crest Or Trough? How Research Libraries Used Emerging Technologies To Survive The Pandemic, So Far, Scout Calvert

UNL Libraries: Faculty Publications

Introduction

In the first months of the COVID-19 pandemic, it was impossible to tell if we were at the crest of a wave of new transmissions, or a trough of a much larger wave, still yet to peak. As of this writing, as colleges and universities prepare for mostly in-person fall 2021 semesters, case counts in the United States are increasing again after a decline that coincided with easier access to the COVID vaccine. Plans for a return to campus made with confidence this spring may be in doubt, as we climb the curve of what is already the second …


Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta Oct 2021

Effects Of Cloud Computing In The Workforce, Kevin Rossi Acosta

Cybersecurity Undergraduate Research Showcase

In recent years, the incorporation of cloud computing and cloud services has increased in many different types of organizations and companies. This paper will focus on the philosophical, economical, and political factors that cloud computing and cloud services have in the workforce and different organizations. Based on various scholarly articles and resources it was observed that organizations used cloud computing and cloud services to increase their overall productivity as well as decrease the overall cost of their operations, as well as the different policies that were created by lawmakers to control the realm of cloud computing. The results of this …


Shifting Satellite Control Paradigms: Operational Cybersecurity In The Age Of Megaconstellations, Carl A. Poole [*], Robert A. Bettinger, Mark Reith Oct 2021

Shifting Satellite Control Paradigms: Operational Cybersecurity In The Age Of Megaconstellations, Carl A. Poole [*], Robert A. Bettinger, Mark Reith

Faculty Publications

The introduction of automated satellite control systems into a space-mission environment historically dominated by human-in-the-loop operations will require a more focused understanding of cybersecurity measures to ensure space system safety and security. On the ground-segment side of satellite control, the debut of privately owned communication antennas for rent and a move to cloud-based operations or mission centers will bring new requirements for cyber protection for both Department of Defense and commercial satellite operations alike. It is no longer a matter of whether automation will be introduced to satellite operations, but how quickly satellite operators can adapt to the onset of …


Adopting A Risk-Intelligent Approach To Digital Transformation: Four Traits Of Digitally Mature Organisations, Clarence Goh, Gary Pan, Poh Sun Seow, Yuanto Kusnadi, Seah Gek Choo, Cheryl Lim Oct 2021

Adopting A Risk-Intelligent Approach To Digital Transformation: Four Traits Of Digitally Mature Organisations, Clarence Goh, Gary Pan, Poh Sun Seow, Yuanto Kusnadi, Seah Gek Choo, Cheryl Lim

Research Collection School Of Accountancy

Our objective is to understand how digitally mature organisations are managing the GRC aspects of their digital transformation programmes, and identify any traits or behaviours that could inform the development of best practices.