Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 5 of 5
Full-Text Articles in Entire DC Network
Who Uses Multi-Factor Authentication?, Leah Roberts
Who Uses Multi-Factor Authentication?, Leah Roberts
Undergraduate Honors Theses
A sample of 47 BYU students were recruited to participate in this study to determine who was using Multi-factor Authentication (MFA) on their online accounts. This study determined that there were many different factors that separated those who used MFA and those who did not. Some of those factors included: time spent on the internet each day, gender, the website itself, and personal privacy behaviors.
Modeling Wireless Networks For Rate Control, David C. Ripplinger
Modeling Wireless Networks For Rate Control, David C. Ripplinger
Theses and Dissertations
Congestion control algorithms for wireless networks are often designed based on a model of the wireless network and its corresponding network utility maximization (NUM) problem. The NUM problem is important to researchers and industry because the wireless medium is a scarce resource, and currently operating protocols such as 802.11 often result in extremely unfair allocation of data rates. The NUM approach offers a systematic framework to build rate control protocols that guarantee fair, optimal rates. However, classical models used with the NUM approach do not incorporate partial carrier sensing and interference, which can lead to significantly suboptimal performance when actually …
A See-Ability Metric To Improve Mini Unmanned Aerial Vehicle Operator Awareness Using Video Georegistered To Terrain Models, Cameron Howard Engh
A See-Ability Metric To Improve Mini Unmanned Aerial Vehicle Operator Awareness Using Video Georegistered To Terrain Models, Cameron Howard Engh
Theses and Dissertations
Search and rescue operations conducted in wilderness environments can be greatly aided by the use of video filmed from mini-UAVs. While lightweight, inexpensive and easily transportable, these small aircraft suffer from wind buffeting and may produce video that is difficult to search. To aid in the video search process, we have created a system to project video frames into a 3D representation of the search region. This projection allows us to tie each frame of video to a real-world location, enabling a myriad of novel views, mosaics and metrics that can be used to guide the search including a new …
A Bittorrent Proxy, Robert Brent Larsen
A Bittorrent Proxy, Robert Brent Larsen
Theses and Dissertations
BitTorrent is a peer-to-peer protocol useful for distributing large files over the Internet. Many organizations use BitTorrent to distribute their software in order to reduce client download time and reduce the load on their servers. While there is a lot of legitimate content available via BitTorrent, some organizations ban BitTorrent usage due to concerns over copyright infringement and the amount of bandwidth that peers can consume. A BitTorrent proxy will allow organizations to control those risks and allow its members to use the BitTorrent protocol for approved uses. It will allow the organization to control the files that are downloaded …
Hop-By-Hop Transport Control For Multi-Hop Wireless Networks, Daniel N. Scofield
Hop-By-Hop Transport Control For Multi-Hop Wireless Networks, Daniel N. Scofield
Theses and Dissertations
TCP can perform poorly in multi-hop wireless networks due to problems with contention and poor feedback from end-to-end control algorithms. This thesis explores the design of a hop-by-hop transport protocol (HxH). By allowing intermediate nodes to actively participate, the protocol can respond more quickly to changing network conditions and exploit the unique characteristics of wireless networks. Results indicate that hop-by-hop transport can achieve throughput rates that are double those of TCP, depending on the speed of the wireless links.