Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 160

Full-Text Articles in Engineering

Light Based Wireless Communication, Nick Ghaffarian, Gibson Puckett Jun 2024

Light Based Wireless Communication, Nick Ghaffarian, Gibson Puckett

Electrical Engineering

The demand for high-speed, secure wireless communication is escalating, particularly in high-density environments like urban areas, and critical sectors such as healthcare and defense. Traditional Wi-Fi struggles with issues like signal congestion, electromagnetic interference, and security vulnerabilities, compromising connectivity quality. LiFi is much more suitable for areas like hospitals which contain equipment highly sensitive to electromagnetic interference, has a high bandwidth far away from standard radio waves which enables strong communication in highly congested areas.

We developed a small scale, low-cost LiFi system to demonstrate a proof of concept of LiFi that grants the user full access to the internet. …


Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant May 2023

Protecting The Infrastructure Of Michigan: Analyzing And Understanding Internet Infrastructure, Samuel Blaser, Travis Munyer, Damian Ramirez, Lester Juarez, Jackson Servant

Theses/Capstones/Creative Projects

The Michigan Army National Guard DCOE is hoping to increase their understanding of the physical, electrical, protocol, and logical topography of internet service. In order to understand the infrastructure of the internet, information must be collected on its pieces. By studying, describing, and illustrating the infrastructure of the global internet we can develop hardening tactics, improve user training, and develop contingency plans in the case of an attack. The research is focused on where data lives, locating data centers in the region, identifying global infrastructure and who owns it, and potential for hardening. An interactive map has been created in …


Detection Of Truthful, Semi-Truthful, False And Other News With Arbitrary Topics Using Bert-Based Models, Elena Shushkevich, John Cardiff, Anna Boldyreva Jan 2023

Detection Of Truthful, Semi-Truthful, False And Other News With Arbitrary Topics Using Bert-Based Models, Elena Shushkevich, John Cardiff, Anna Boldyreva

Conference Papers

Easy and uncontrolled access to the Internet provokes the wide propagation of false information, which freely circulates in the Internet. Researchers usually solve the problem of fake news detection (FND) in the framework of a known topic and binary classification. In this paper we study possibilities of BERT-based models to detect fake news in news flow with unknown topics and four categories: true, semi-true, false and other. The object of consideration is the dataset CheckThat! Lab proposed for the conference CLEF-2022. The subjects of consideration are the models SBERT, RoBERTa, and mBERT. To improve the quality of classification we use …


How Online Discourse Networks Fields Of Practice: The Discursive Negotiation Of Autonomy On Art Organisation About Pages, Tommie Soro Jan 2023

How Online Discourse Networks Fields Of Practice: The Discursive Negotiation Of Autonomy On Art Organisation About Pages, Tommie Soro

Articles

This article examines how the online discourse of art organisations forges relationships between the artworld and the fields of politics and economy. Combining elements of Pierre Bourdieu’s field analysis and Norman Fairclough’s critical discourse analysis, the article analyses an elite art magazine, e-flux, and an elite art museum, IMMA, and the activities of discourses, genres, and utterances on their about pages. Its results suggest that the about pages of these organisations forge links between the artworld and the fields of politics and economy by mobilising discourse in these fields and by incorporating discourse practices from these fields. The ideological tension …


Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi Jan 2023

Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi

Williams Honors College, Honors Research Projects

Audio and video streaming across delay tolerant networks are relatively new phenomena. During the Apollo 11 mission, video and audio were streamed directly back to Earth using fully analog radios. This streaming capability atrophied over time. The gradual conversion to digital electronics contributed greatly to this. Additionally, 21st century space systems face the new requirement of interconnectedness. Delay Tolerant Networking (DTN) attempts to solve this requirement by uniting traditional point to point links into a robust and dynamic network. However, DTN implementations present bottlenecks due to low performance. High-Rate Delay Tolerant Networking (HDTN) is a performance-optimized DTN implementation. This work …


Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle Jan 2023

Hashes Are Not Suitable To Verify Fixity Of The Public Archived Web, Mohamed Aturban, Martin Klein, Herbert Van De Sompel, Sawood Alam, Michael L. Nelson, Michele C. Weigle

Computer Science Faculty Publications

Web archives, such as the Internet Archive, preserve the web and allow access to prior states of web pages. We implicitly trust their versions of archived pages, but as their role moves from preserving curios of the past to facilitating present day adjudication, we are concerned with verifying the fixity of archived web pages, or mementos, to ensure they have always remained unaltered. A widely used technique in digital preservation to verify the fixity of an archived resource is to periodically compute a cryptographic hash value on a resource and then compare it with a previous hash value. If the …


Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger Apr 2022

Sustainability In Web Development Through Energy Efficiency, Hannah Bebinger

Honors Projects

As global internet usage expands, websites are growing in both size and complexity. Contrary to the common belief that the internet is immaterial and “environmentally friendly”, web pages have significant negative environmental impacts (Frick, 2015). Websites contribute to global greenhouse gas (GHG) emissions and electricity consumption. Considering the current climate crisis, it is crucial that web developers be aware of the impact that their work has on the environment and actively work to improve site energy efficiency. With a lack of regulation and awareness, the environmental impact of websites has remained unchecked despite growing concerns for sustainability. Further research and …


واقع تواصل أولياء أمور الطلبة مع مدارس أبنائهم في المرحلة الأساسية الأولى بمحافظة نابلس في فلسطين واتجاهاتهم نحو توظيف خدمات شبكة الإنترنت لتحسينه, Magdi Hinnawi Mar 2022

واقع تواصل أولياء أمور الطلبة مع مدارس أبنائهم في المرحلة الأساسية الأولى بمحافظة نابلس في فلسطين واتجاهاتهم نحو توظيف خدمات شبكة الإنترنت لتحسينه, Magdi Hinnawi

Palestine Technical University Research Journal

This study aimed at exploring the reality of communication between parents and the schools of their children in addition to investigating the parents’ attitudes towards using the Internet services to communicate with the schools at the basic elementary stage in Nablus Directorate /Palestine. Furthermore, the study aimed at examining the effect of some variables on these attitudes. To achieve these objectives, the descriptive method was employed by means of a questionnaire used to collect data. The sample of the study consisted of 120 parents chosen through the cluster-regional-randomized design. Results indicated that all parents support the importance of communication with …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy Dec 2021

The Evolution Of The Internet And Social Media: A Literature Review, Charles Alves De Castro, Isobel O'Reilly Dr, Aiden Carthy

Articles

This article reviews and analyses factors impacting the evolution of the internet, the web, and social media channels, charting historic trends and highlight recent technological developments. The review comprised a deep search using electronic journal databases. Articles were chosen according to specific criteria with a group of 34 papers and books selected for complete reading and deep analysis. The 34 elements were analysed and processed using NVIVO 12 Pro, enabling the creation of dimensions and categories, codes and nodes, identifying the most frequent words, cluster analysis of the terms, and creating a word cloud based on each word's frequency. The …


The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami Nov 2021

The Factors Influencing The Acceptance Of Web-Based E-Learning System Among Academic Staffs Of Saudi Arabia, Ikhlas Zamzami

Future Computing and Informatics Journal

It is possible to learn more quickly and effectively with e-learning software development because it provides learners with convenient and flexible learning environments. This allows them to progress further in their careers. Reports on web-based e-learning systems for in-service education have frequently neglected to include the viewpoint of the instructor. In order to conduct quantitative research, a sample of 50 academic staff members was selected. The purpose of this study was to investigate various factors that influence the intention to use web-based e-learning, with the theoretical foundation being provided by university lecturers. According to the findings of the study, the …


Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier Oct 2020

Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier

Dickinson Law Review (2017-Present)

In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …


Energy Conservation With Open Source Ad Blockers, Joshua M. Pearce Mar 2020

Energy Conservation With Open Source Ad Blockers, Joshua M. Pearce

Michigan Tech Publications

Internet-related electricity consumption is rising rapidly as global Internet users spend more than 6.5 h per day online. Open source ad blockers have the potential to reduce the time and thus electricity spent using computers by eliminating ads during Internet browsing and video streaming. In this study, three open source ad blockers are tested against a no-ad blocker control. Page load time is recorded for browsing a representative selection of the globally most-accessed websites, and the time spent watching ads on videos is quantified for both trending and non-trending content. The results show that page load time dropped 11% with …


False Data Injection Attack (Fdia): An Overview And New Metrics For Fair Evaluation Of Its Countermeasure, Mohiuddin Ahmed, Al-Sakib Khan Pathan Jan 2020

False Data Injection Attack (Fdia): An Overview And New Metrics For Fair Evaluation Of Its Countermeasure, Mohiuddin Ahmed, Al-Sakib Khan Pathan

Research outputs 2014 to 2021

The concept of false data injection attack (FDIA) was introduced originally in the smart grid domain. While the term sounds common, it specifically means the case when an attacker compromises sensor readings in such tricky way that undetected errors are introduced into calculations of state variables and values. Due to the rapid growth of the Internet and associated complex adaptive systems, cyber attackers are interested in exploiting similar attacks in other application domains such as healthcare, finance, defense, governance, etc. In today’s increasingly perilous cyber world of complex adaptive systems, FDIA has become one of the top-priority issues to deal …


Ensemble Machine Learning Approaches For Webshell Detection In Internet Of Things Environments, Binbin Yong, Wei Wei, Kuan-Ching Li, Jun Shen, Qingguo Zhou, Marcin Wozniak, Dawid Polap, Robertas Damasevicius Jan 2020

Ensemble Machine Learning Approaches For Webshell Detection In Internet Of Things Environments, Binbin Yong, Wei Wei, Kuan-Ching Li, Jun Shen, Qingguo Zhou, Marcin Wozniak, Dawid Polap, Robertas Damasevicius

Faculty of Engineering and Information Sciences - Papers: Part B

The Internet of things (IoT), made up of a massive number of sensor devices interconnected, can be used for data exchange, intelligent identification, and management of interconnected “things.” IoT devices are proliferating and playing a crucial role in improving the living quality and living standard of the people. However, the real IoT is more vulnerable to attack by countless cyberattacks from the Internet, which may cause privacy data leakage, data tampering and also cause significant harm to society and individuals. Network security is essential in the IoT system, and Web injection is one of the most severe security problems, especially …


Voting Booths And Interactive Art Installations: The Diebold Accuvote Ts In Context, Mike Richison Nov 2019

Voting Booths And Interactive Art Installations: The Diebold Accuvote Ts In Context, Mike Richison

Journal of Network Music and Arts

In 2016, I created an interactive installation called Video Voto Matic. This project was a mashup between the Votomatic voting system and a Roland TR-808 drum machine. To coincide with the 2020 election season, I am currently working on an update of the project that will include a touch screen voting interface and multiple networked stations that also produce audio and video output. The interface will be housed in the same voting booths that once housed the Diebold Accuvote TS. The Diebold Accuvote TS is a screen-based voting machine that does not utilize paper as a backup. Researchers have examined …


Considering Telematic Tools For Conferences, Scott Deal, Rodney Smith, Chuiyuan Meng, Matt Vice Nov 2019

Considering Telematic Tools For Conferences, Scott Deal, Rodney Smith, Chuiyuan Meng, Matt Vice

Journal of Network Music and Arts

Participation in conferences is an elemental component of professional life throughout the world. Two problems offset the social synergy gained from attending a far-away gathering of like-minded people. The first is the highly pronounced carbon footprint from air travel, and the second is the expense involved to participate in a conference which may be on another continent. These factors prevent many from participating who could otherwise benefit as well as contribute. As videoconferencing becomes more common and more sophisticated, it will serve as an alternative that not only benefits constituencies, but will expand the reach of a conference to more …


Understanding The Telematic Apparatus, Patrick Muller, Benjamin Burger, Joel De Giovanni, Matthias Ziegler Nov 2019

Understanding The Telematic Apparatus, Patrick Muller, Benjamin Burger, Joel De Giovanni, Matthias Ziegler

Journal of Network Music and Arts

Under the conditions of its geographic distribution, the “telematic performance” can be regarded as a remediation of traditional concert, theater or dance formats. Conversely, and as this paper argues, the telematic performance can also be understood as an artistic format of its own right, one which then can serve as a trope for social interaction under the conditions of critical posthumanism. To gain a wider perspective, this paper analyzes Alan Turing’s “Imitation Game” from his seminal article Computing Machinery and Intelligence, 1950, proposing it as an early conceptualization of a telematic performance. This against-the-grain reading of Turing’s text reveals certain …


Sensing Place And Presence In An Intimal Long-Distance Improvisation, Ximena Alarcon Diaz, Paul Boddie, Cagri Erdem, Eigil Aandahl, Elias Sukken Andersen, Eirik Dahl, Mari Lesteberg, Alexander Refsum Jensenius Nov 2019

Sensing Place And Presence In An Intimal Long-Distance Improvisation, Ximena Alarcon Diaz, Paul Boddie, Cagri Erdem, Eigil Aandahl, Elias Sukken Andersen, Eirik Dahl, Mari Lesteberg, Alexander Refsum Jensenius

Journal of Network Music and Arts

INTIMAL is an interactive system for relational listening, which integrates physical-virtual interfaces for people to sonically improvise between distant locations. The aim is to embrace two key aspects in the context of human migration: the sense of place and the sense of presence. This paper reflects on the use of INTIMAL in a long-distance improvisation between the cities of Oslo, Barcelona and London in May 2019. This improvisation was performed by nine Colombian migrant women, who had been involved in a research process using the Deep Listening® practice developed by Pauline Oliveros. Here we describe the performance setting and the …


Telematic Music Vs. Networked Music: Distinguishing Between Cybernetic Aspirations And Technological Music-Making, Eric C. Lemmon Nov 2019

Telematic Music Vs. Networked Music: Distinguishing Between Cybernetic Aspirations And Technological Music-Making, Eric C. Lemmon

Journal of Network Music and Arts

No abstract provided.


Editorial, Sarah Weaver Nov 2019

Editorial, Sarah Weaver

Journal of Network Music and Arts

Welcome to the Journal of Network Music and Arts (JONMA). JONMA is a peer-reviewed open access digital research journal published by Stony Brook University. Network Music and Arts utilize the Internet and related technologies as an artistic medium for works created for this platform. JONMA will publish research by artists, technologists, educators, and related scholars. The journal content will include articles, audio and video documentation, and reviews for books and recordings.


A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa Jul 2019

A Longitudinal Analysis Of The Impact Of The Indicators In The Networked Readiness Index (Nri), Satya Pratipatti, Ahmed Gomaa

Journal of International Technology and Information Management

World Economic Forum publishes the Networked Readiness Index (NRI) annually, to reflect the Information and Communication Technology (ICT) status of different countries. The NRI is developed by aggregating 53 indicators. The study identifies the most critical indicators to focus on, to improve the NRI status of countries at different stages of economic development. It uses data from 117 countries and analyzes the changes in the indicators along with their impacts between the years 2012 and 2016. The study explores the differences between countries by grouping them into four groups based on their NRI status. The analysis identifies six indicators with …


Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond May 2019

Ipv6 Diffusion Milestones: Assessing The Quantity And Quality Of Adoption, John Pickard, Mark Angolia, Dale Drummond

Journal of International Technology and Information Management

There are currently two versions of Internet Protocol (IP) in use today, IP version 4 (IPv4) and IP version 6 (IPv6). The original version, IPv4, was standardized in the early 1980s as part of the Defense Advanced Research Project Agency Internet program and became the official Internet protocol in 1983 (Kleinrock, 2010). IPv6 was standardized in 1995 as its successor to provide enhanced capabilities and address IPv4 technological limitations, most notable of which was the anticipated exhaustion of address space (Deering & Hinden, 1995). While the two protocols have some functional similarities, they are distinct and not backward compatible; IPv4-only …


Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng Feb 2019

Is Dns Ready For Ubiquitous Internet Of Things?, Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zheng, Guanggang Geng

Information Science Faculty Publications

The vision of the Internet of Things (IoT) covers not only the well-regulated processes of specific applications in different areas but also includes ubiquitous connectivity of more generic objects (or things and devices) in the physical world and the related information in the virtual world. For example, a typical IoT application, such as a smart city, includes smarter urban transport networks, upgraded water supply, and waste-disposal facilities, along with more efficient ways to light and heat buildings. For smart city applications and others, we require unique naming of every object and a secure, scalable, and efficient name resolution which can …


Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Feb 2019

Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj

International Journal of Business and Technology

With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols).

In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol …


Me2b Jul 2018

Me2b

SIGNED: The Magazine of The Hong Kong Design Institute

Fixing the internet's biggest flaw


Internet Enabled Remote Driving Of A Combat Hybrid Electric Power System For Duty Cycle Measurement, Jarrett Goodell, Marc Compere, Wilford Smith, Mark Brudnak, Mike Pozolo, Et Al. Feb 2018

Internet Enabled Remote Driving Of A Combat Hybrid Electric Power System For Duty Cycle Measurement, Jarrett Goodell, Marc Compere, Wilford Smith, Mark Brudnak, Mike Pozolo, Et Al.

Marc Compere

This paper describes a human-in-the-loop motion-based simulator interfaced to hybrid-electric power system hardware, both of which were used to measure the duty cycle of a combat vehicle in a virtual simulation environment. The project discussed is a greatly expanded follow-on to the experiment published in [1,7]. This paper is written in the context of [1,7] and therefore highlights the enhancements. The most prominent of these enhancements is the integration (in real-time) of the Power & Energy System Integration Lab (P&E SIL) with a motion base simulator by means of a “long haul” connection over the Internet (a geographical distance of …


Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto Jan 2018

Establishing A Need For A Protocol For The Interoperability Of Heterogeneous Iot Home Devices, Jenna Bayto

Electronic Theses and Dissertations

The Internet of Things (IoT) refers to the field of connecting devices consumers use every day to the internet. As the world relies on more and more internet-driven technological devices to control functions within the home, issues with compatibility of those devices are surfacing. This research was created to establish the need for standardization of IoT devices within the home.


Transforming Yekaterinburg Into A Safe, Resilient-Smart And Sustainable City, S. A. Timashev, V. N. Alekhin, L. V. Poluyan, I. Fontanals, A. Gheorghe Jan 2018

Transforming Yekaterinburg Into A Safe, Resilient-Smart And Sustainable City, S. A. Timashev, V. N. Alekhin, L. V. Poluyan, I. Fontanals, A. Gheorghe

Engineering Management & Systems Engineering Faculty Publications

The initiative (since 2014) project described in this paper is a product of a joint innovative research and implementation effort of the Civil Engineering and Architecture Institute, Ural Federal University, the Science and Engineering Centre "Reliability and Safety of Large Systems and Machines", Ural Branch Russian Academy of Sciences (both Yekaterinburg), Start-up OptiCits, Barcelona, Spain and the Old Dominion University, Norfolk, VA, USA. The project is based on using the MAICS convergent technology [1] to create a versatile multi-purpose tool for optimizing the science and art of risk based governance of resilience-smart and sustainable city infrastructure and communities operating in …


Automating The Crowd-Mapping Workflow With Deep Learning, Lasith Niroshan Jan 2018

Automating The Crowd-Mapping Workflow With Deep Learning, Lasith Niroshan

Theses

Maintaining updated maps in an ever-changing built environment is important for supporting modern society in many ways. The usage of online crowdsourced maps in particular has gained importance in a wide range of recent location-based applications (route planning/navigation, urban planning, real estate, tourism, etc). However, both traditional map production methods and updating today’s online maps suffer from early obsolescence due to their largely manual map production/update workflows. Significant research efforts have focused on refining techniques to identify changes in raster satellite images, aiming to improve and streamline map production processes. Concurrently, the surge in Internet usage has led to a …