Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

2,233 Full-Text Articles 3,675 Authors 1,124,087 Downloads 150 Institutions

All Articles in Digital Communications and Networking

Faceted Search

2,233 full-text articles. Page 1 of 91.

An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif 2023 Helwan University

An Enhanced Adaptive Learning System Based On Microservice Architecture, Abdelsalam Helmy Ibrahim, Mohamed Eliemy, Aliaa Abdelhalim Youssif

Future Computing and Informatics Journal

This study aims to enhance Adaptive Learning Systems (ALS) in Petroleum Sector in Egypt by using the Microservice Architecture and measure the impact of enhancing ALS by participating ALS users through a statistical study and questionnaire directed to them if they accept to apply the Cloud Computing Service “Microservices” to enhance the ALS performance, quality and cost value or not. The study also aims to confirm that there is a statistically significant relationship between ALS and Cloud Computing Service “Microservices” and prove the impact of enhancing the ALS by using Microservices in the cloud in Adaptive Learning in the Egyptian …


Visual Question Answering: A Survey, Gehad Assem El-Naggar 2023 Future University in Egypt

Visual Question Answering: A Survey, Gehad Assem El-Naggar

Future Computing and Informatics Journal

Visual Question Answering (VQA) has been an emerging field in computer vision and natural language processing that aims to enable machines to understand the content of images and answer natural language questions about them. Recently, there has been increasing interest in integrating Semantic Web technologies into VQA systems to enhance their performance and scalability. In this context, knowledge graphs, which represent structured knowledge in the form of entities and their relationships, have shown great potential in providing rich semantic information for VQA. This paper provides an abstract overview of the state-of-the-art research on VQA using Semantic Web technologies, including knowledge …


Human-Machine Communication: Complete Volume. Volume 6, 2023 University of Central Florida

Human-Machine Communication: Complete Volume. Volume 6

Human-Machine Communication

his is the complete volume of HMC Volume 6.


Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov 2023 TUIT named after Muhammad al-Khwarazmi, Address: 108, Amir Temur st., Tashkent city, Republic of Uzbekistan, E-mail: botirov_fz@mail.ru, Phone:+998-97-751-16-97.

Investigation Of Information Security Incidents In The Enterprise, Fayzullajon Botirov

Chemical Technology, Control and Management

This article analyzes the concept of investigating information security incidents and the processes of responsibility for their commission, checking the place where the incident occurred, collecting and storing their data, as well as organizing the investigation of information security incidents at the enterprise.


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum 2023 University of South Florida

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott III 2023 Stephen F. Austin State University

Blockchain Security: Double-Spending Attack And Prevention, William Henry Scott Iii

Electronic Theses and Dissertations

This thesis shows that distributed consensus systems based on proof of work are vulnerable to hashrate-based double-spending attacks due to abuse of majority rule. Through building a private fork of Litecoin and executing a double-spending attack this thesis examines the mechanics and principles behind the attack. This thesis also conducts a survey of preventative measures used to deter double-spending attacks, concluding that a decentralized peer-to-peer network using proof of work is best protected by the addition of an observer system whether internal or external.


Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave 2023 Northern Illinois University

Sensor Module Network For Monitoring Trace Gases In The International Space Station, Aaron Beck, Drake Provost, Christopher English, Kamrin Gustave

Honors Capstones

The Jet Propulsion Laboratory (JPL) of the National Aeronautics and Space Administration (NASA) aims to develop a sensor network for the International Space Station (ISS) to ensure a comprehensive understanding of air quality within the station. The accumulation of carbon dioxide (CO­­­­­2) can lead to cognitive impairment, headaches, and potentially dangerous situations at high concentrations. Monitoring air content at the ISS is critical to maintaining a healthy environment for crew onboard. Exposure to harmful gases causes negative side effects that make crew sick, which may interfere with their responsibilities. CO2 is a gas that should be monitored …


Breast Tissue Tumor Detection Using Microstrip Patch Antenna With Defected Ground Structure, Nihal F. F. Areed, Hamdi Ahmed El Mikati, Laila T. Rakha 2023 Prof. at Electronics and Communications Engineering Department, Faculty of Engineering, Mansoura University-

Breast Tissue Tumor Detection Using Microstrip Patch Antenna With Defected Ground Structure, Nihal F. F. Areed, Hamdi Ahmed El Mikati, Laila T. Rakha

Mansoura Engineering Journal

This work proposes a slotted microstrip patch antenna with an inset feed and defective ground structure (DGS). The proposed antenna is built with Roger-RT/5880 (Ԑr=2.2) as the substrate material for X-band application with a resonant frequency of 10 GHz. The proposed design has been simulated using Finite Element Method (FEM) and the results of bandwidth and gain read about 700MHz and 8dB; respectively. The suggested design is compared with previously published equivalent designs in light of the most recent research. The comparison reveal that that the suggested design with tuned dimensions offers higher gain and wider bandwidth than what has …


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman 2023 University of South Florida

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane 2023 University of South Florida

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer 2023 National Defense University, College of Information and Cyberspace

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant 2023 University of Nebraska at Omaha

Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant

Theses/Capstones/Creative Projects

The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …


Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim 2023 University of Arkansas, Fayetteville

Preserving User Data Privacy Through The Development Of An Android Solid Library, Alexandria Lim

Computer Science and Computer Engineering Undergraduate Honors Theses

In today’s world where any and all activity on the internet produces data, user data privacy and autonomy are not prioritized. Companies called data brokers are able to gather data elements of personal information numbering in the billions. This data can be anything from purchase history, credit card history, downloaded applications, and service subscriptions. This information can be analyzed and inferences can be drawn from analysis, categorizing people into groups that range in sensitivity — from hobbies to race and income classes. Not only do these data brokers constantly overlook data privacy, this mass amount of data makes them extremely …


The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob 2023 Liberty University

The Rapid Increase Of Ransomware Attacks Over The 21st Century And Mitigation Strategies To Prevent Them From Arising, Sanjay Jacob

Senior Honors Theses

Cyber-attacks have continued to become more common throughout the past century as more people are exposed to the Internet. Every year, various studies, reports, and scholarly research is done to emphasis the rapid increase of attacks. In this honors thesis, the student sought to gather further information about the rise of ransomware attacks, various cyber threats, discuss the psychological manipulation that exist, and provided the reader with an ethical complement of cyber-attacks. Additionally, case studies from previous research have been analyzed and mitigation strategies have been explained to provide the reader with practical application. This research emphasizes in on key …


Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros 2023 California State University, San Bernardino

Bridging The Gap Between Public Organizaions And Cybersecurity, Christopher Boutros

Electronic Theses, Projects, and Dissertations

Cyberattacks are a major problem for public organizations across the nation, and unfortunately for them, the frequency of these attacks is constantly growing. This project used a case study approach to explore the types of cybersecurity public organization agencies face and how those crimes can be mitigated. The goal of this paper is to understand how public organization agencies have prepared for cyberattacks and discuss additional suggestions to improve their current systems with the current research available This research provides an analysis of current cyber security systems, new technologies that can be implemented, roadblocks public agencies face before and during …


Vanet Applications Under Loss Scenarios & Evolving Wireless Technology, Adil Alsuhaim 2023 Clemson University

Vanet Applications Under Loss Scenarios & Evolving Wireless Technology, Adil Alsuhaim

All Dissertations

In this work we study the impact of wireless network impairment on the performance of VANET applications such as Cooperative Adaptive Cruise Control (CACC), and other VANET applications that periodically broadcast messages. We also study the future of VANET application in light of the evolution of radio access technologies (RAT) that are used to exchange messages. Previous work in the literature proposed fallback strategies that utilizes on-board sensors to recover in case of wireless network impairment, those methods assume a fixed time headway value, and do not achieve string stability. In this work, we study the string stability of a …


Enabling High Throughput And Reliable Low Latency Communication Over Vehicular Mobility In Next-Generation Cellular Networks, Snigdhaswin Kar 2023 Clemson University

Enabling High Throughput And Reliable Low Latency Communication Over Vehicular Mobility In Next-Generation Cellular Networks, Snigdhaswin Kar

All Dissertations

The fifth-generation (5G) networks and beyond need paradigm shifts to realize the exponentially increasing demands of next-generation services for high throughputs, low latencies, and reliable communication under various mobility scenarios. However, these promising features have critical gaps that need to be filled before they can be fully implemented for mobile applications in complex environments like smart cities. Although the sub-6 GHz bands can provide reliable and larger coverage, they cannot provide high data rates with low latencies due to a scarcity of spectrum available in these bands. Millimeter wave (mmWave) communication is a key enabler for a significant increase in …


Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield 2023 University of Arkansas, Fayetteville

Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield

Computer Science and Computer Engineering Undergraduate Honors Theses

As digital automation for Industrial Control Systems has grown, so has its
vulnerability to cyberattacks. The world of industry has responded effectively to this, but the world of academia is still lagging as its emphasis is still almost entirely on information technology. Considering this, we created a workforce development pod that serves as a hands-on learning module for teaching students key cybersecurity ideas surrounding operational technology using the NETLAB+ platform. A pod serves as the virtual environment where the learning exercise takes place. This project’s implementation involved the creation of a segmented network within the pod where a student starts …


Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer 2023 University of Tartu

Iot Health Devices: Exploring Security Risks In The Connected Landscape, Abasi-Amefon Obot Affia, Hilary Finch, Woosub Jung, Issah Abubakari Samori, Lucas Potter, Xavier-Lewis Palmer

School of Cybersecurity Faculty Publications

The concept of the Internet of Things (IoT) spans decades, and the same can be said for its inclusion in healthcare. The IoT is an attractive target in medicine; it offers considerable potential in expanding care. However, the application of the IoT in healthcare is fraught with an array of challenges, and also, through it, numerous vulnerabilities that translate to wider attack surfaces and deeper degrees of damage possible to both consumers and their confidence within health systems, as a result of patient-specific data being available to access. Further, when IoT health devices (IoTHDs) are developed, a diverse range of …


Enhanced Mobile Networking Using Multi-Connectivity And Packet Duplication In Next-Generation Cellular Networks, Prabodh Mishra 2023 Clemson University

Enhanced Mobile Networking Using Multi-Connectivity And Packet Duplication In Next-Generation Cellular Networks, Prabodh Mishra

All Dissertations

Modern cellular communication systems need to handle an enormous number of users and large amounts of data, including both users as well as system-oriented data. 5G is the fifth-generation mobile network and a new global wireless standard that follows 4G/LTE networks. The uptake of 5G is expected to be faster than any previous cellular generation, with high expectations of its future impact on the global economy. The next-generation 5G networks are designed to be flexible enough to adapt to modern use cases and be highly modular such that operators would have the flexibility to provide selective features based on user …


Digital Commons powered by bepress