Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

PDF

Brigham Young University

Theses/Dissertations

BYU

Articles 1 - 5 of 5

Full-Text Articles in Entire DC Network

Who Uses Multi-Factor Authentication?, Leah Roberts Jun 2021

Who Uses Multi-Factor Authentication?, Leah Roberts

Undergraduate Honors Theses

A sample of 47 BYU students were recruited to participate in this study to determine who was using Multi-factor Authentication (MFA) on their online accounts. This study determined that there were many different factors that separated those who used MFA and those who did not. Some of those factors included: time spent on the internet each day, gender, the website itself, and personal privacy behaviors.


Modeling Wireless Networks For Rate Control, David C. Ripplinger Jul 2011

Modeling Wireless Networks For Rate Control, David C. Ripplinger

Theses and Dissertations

Congestion control algorithms for wireless networks are often designed based on a model of the wireless network and its corresponding network utility maximization (NUM) problem. The NUM problem is important to researchers and industry because the wireless medium is a scarce resource, and currently operating protocols such as 802.11 often result in extremely unfair allocation of data rates. The NUM approach offers a systematic framework to build rate control protocols that guarantee fair, optimal rates. However, classical models used with the NUM approach do not incorporate partial carrier sensing and interference, which can lead to significantly suboptimal performance when actually …


A See-Ability Metric To Improve Mini Unmanned Aerial Vehicle Operator Awareness Using Video Georegistered To Terrain Models, Cameron Howard Engh Nov 2008

A See-Ability Metric To Improve Mini Unmanned Aerial Vehicle Operator Awareness Using Video Georegistered To Terrain Models, Cameron Howard Engh

Theses and Dissertations

Search and rescue operations conducted in wilderness environments can be greatly aided by the use of video filmed from mini-UAVs. While lightweight, inexpensive and easily transportable, these small aircraft suffer from wind buffeting and may produce video that is difficult to search. To aid in the video search process, we have created a system to project video frames into a 3D representation of the search region. This projection allows us to tie each frame of video to a real-world location, enabling a myriad of novel views, mosaics and metrics that can be used to guide the search including a new …


A Bittorrent Proxy, Robert Brent Larsen Mar 2008

A Bittorrent Proxy, Robert Brent Larsen

Theses and Dissertations

BitTorrent is a peer-to-peer protocol useful for distributing large files over the Internet. Many organizations use BitTorrent to distribute their software in order to reduce client download time and reduce the load on their servers. While there is a lot of legitimate content available via BitTorrent, some organizations ban BitTorrent usage due to concerns over copyright infringement and the amount of bandwidth that peers can consume. A BitTorrent proxy will allow organizations to control those risks and allow its members to use the BitTorrent protocol for approved uses. It will allow the organization to control the files that are downloaded …


Hop-By-Hop Transport Control For Multi-Hop Wireless Networks, Daniel N. Scofield Apr 2007

Hop-By-Hop Transport Control For Multi-Hop Wireless Networks, Daniel N. Scofield

Theses and Dissertations

TCP can perform poorly in multi-hop wireless networks due to problems with contention and poor feedback from end-to-end control algorithms. This thesis explores the design of a hop-by-hop transport protocol (HxH). By allowing intermediate nodes to actively participate, the protocol can respond more quickly to changing network conditions and exploit the unique characteristics of wireless networks. Results indicate that hop-by-hop transport can achieve throughput rates that are double those of TCP, depending on the speed of the wireless links.