Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Internet Enabled Remote Driving Of A Combat Hybrid Electric Power System For Duty Cycle Measurement, Jarrett Goodell, Marc Compere, Wilford Smith, Mark Brudnak, Mike Pozolo, Et Al. Feb 2018

Internet Enabled Remote Driving Of A Combat Hybrid Electric Power System For Duty Cycle Measurement, Jarrett Goodell, Marc Compere, Wilford Smith, Mark Brudnak, Mike Pozolo, Et Al.

Marc Compere

This paper describes a human-in-the-loop motion-based simulator interfaced to hybrid-electric power system hardware, both of which were used to measure the duty cycle of a combat vehicle in a virtual simulation environment. The project discussed is a greatly expanded follow-on to the experiment published in [1,7]. This paper is written in the context of [1,7] and therefore highlights the enhancements. The most prominent of these enhancements is the integration (in real-time) of the Power & Energy System Integration Lab (P&E SIL) with a motion base simulator by means of a “long haul” connection over the Internet (a geographical distance of …


3d Virtual Worlds And The Metaverse: Current Status And Future Possibilities, John David N. Dionisio, William G. Burns Iii, Richard Gilbert Aug 2015

3d Virtual Worlds And The Metaverse: Current Status And Future Possibilities, John David N. Dionisio, William G. Burns Iii, Richard Gilbert

John David N. Dionisio

Moving from a set of independent virtual worlds to an integrated network of 3D virtual worlds or Metaverse rests on progress in four areas: immersive realism, ubiquity of access and identity, interoperability, and scalability. For each area, the current status and needed developments in order to achieve a functional Metaverse are described. Factors that support the formation of a viable Metaverse, such as institutional and popular interest and ongoing improvements in hardware performance, and factors that constrain the achievement of this goal, including limits in computational methods and unrealized collaboration among virtual world stakeholders and developers, are also considered.


Technology Professional Development: Long-Term Effects On Teacher Self-Efficacy, George Watson Jul 2015

Technology Professional Development: Long-Term Effects On Teacher Self-Efficacy, George Watson

George R Watson

The West Virginia K-12 RuralNet Project was an NSF funded program to train inservice teachers on integrating the Internet into science and mathematics curriculum. The program involved training inservice teachers through an intensive summer workshop and supplemental online courses. This study examines the effects of the project on the long-term self-efficacy of inservice teachers and their use of the Internet in the classroom. The specific research questions addressed are: Do professional development programs affect the long-term self-efficacy of inservice teachers? Did the addition of online courses and follow-up to the program affect self-efficacy levels? Finally, do certain external factors, specifically …


Robust Lifetime Measurement In Large-Scale P2p Systems With Non-Stationary Arrivals, Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri Loguinov Jan 2015

Robust Lifetime Measurement In Large-Scale P2p Systems With Non-Stationary Arrivals, Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri Loguinov

Zhongmei Yao

Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work has shown that direct sampling of user lifetimes may lead to certain bias (arising from missed peers and round-off inconsistencies) and proposed a technique that estimates lifetimes based on sampled residuals. In this paper, however, we show that under non-stationary arrivals, which are often present in real systems, residual-based sampling does not correctly reconstruct user lifetimes and suffers a varying degree of bias, which in some cases makes estimation completely impossible. We overcome this problem using two contributions: a …


Stochastic Analysis Of Horizontal Ip Scanning, Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov Jan 2015

Stochastic Analysis Of Horizontal Ip Scanning, Derek Leonard, Zhongmei Yao, Xiaoming Wang, Dmitri Loguinov

Zhongmei Yao

Intrusion Detection Systems (IDS) have become ubiquitous in the defense against virus outbreaks, malicious exploits of OS vulnerabilities, and botnet proliferation. As attackers frequently rely on host scanning for reconnaissance leading to penetration, IDS is often tasked with detecting scans and preventing them. However, it is currently unknown how likely an IDS is to detect a given Internet-wide scan pattern and whether there exist sufficiently fast scan techniques that can remain virtually undetectable at large-scale. To address these questions, we propose a simple analytical model for the window-expiration rules of popular IDS tools (i.e., Snort and Bro) and utilize a …


Uprising: The Internet's Unintended Consequences, Marcus Breen Sep 2012

Uprising: The Internet's Unintended Consequences, Marcus Breen

Marcus Breen

The Internet has transformed the social relations that were once managed by the powers that be. As a rapidly maturing communications technology, the Internet has brought people together even while it has reinforced privatism. The desktop computer, the laptop, the cellular and mobile phone, the Global Positoning System, the pilotless drone aircraft, video games and government documents courtesy of Wikileaks, all are connected on the network of networks. Together these converged elements of a global socio-technical system offer wonderful possibilities for human emancipation, even while those ideas collide with established ideas of civility and decency. Utilizing a transdisciplinary approach, Uprising …


Application Layer End-To-End Arguments: From Ends To Means, And Beyond Network Neutrality, Matthias Bärwolff May 2009

Application Layer End-To-End Arguments: From Ends To Means, And Beyond Network Neutrality, Matthias Bärwolff

Matthias Bärwolff

This paper observes that the ultimate objectives of the end-to-end arguments do not necessarily entail a preference for having functions with the end hosts rather than with the network. The horizontal connotations of the end-to-end metaphor collapse when it is elevated to an application layer argument featuring strong "second order" objectives such as those pursued by network neutrality adherents. An internet that serves those ends will have to allow for ISPs to tussle with end users over economic value and surplus considerations, and acknowledge the beneficial rôle of the resulting transactions between the internet’s stakeholders.


The Paradigm Shift In Transnational Organised Crime, K. Michael Jul 2008

The Paradigm Shift In Transnational Organised Crime, K. Michael

Associate Professor Katina Michael

The definition of “organized crime” remains contentious because it has meant different things to different stakeholders over time. Does “organized crime” refer to illegal activities, relations between illegal organizations, how actors work together to engage in crimes, the infrastructure supporting crimes, or to the bricks and mortar of an illegal organization? Depending on the definition embraced by a stakeholder, their unit of analysis (eg crime group under investigation), and the particular time the study was conducted, an analyst may well be led to believe that some organized crime is really “disorganized” in nature. The two typologies of “organized” versus “disorganized” …


The (In)Essentiality Of Monopoly Power In Network Neutrality Violations, Matthias Bärwolff May 2008

The (In)Essentiality Of Monopoly Power In Network Neutrality Violations, Matthias Bärwolff

Matthias Bärwolff

It has recently been proposed that competition in the provision of internet access does not obtain the normative goals of network neutrality proponents. Even under competition internet access providers will still have substantial incentives to discriminate against independent providers' content and applications.

We argue that this argument effectively conforms to basic insights from models of monopolistic competition and, in itself, holds little of the policy relevance alleged by network neutrality advocates. Without empirical validation the conclusions of such an argument-an urgent call for material network neutrality regulation-is unjustified.

Further, we point to the duality of the discrimination problem, for the …