Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Iowa State University

Digital Communications and Networking

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 71

Full-Text Articles in Engineering

Network Management: Developing A Training Curriculum, Keegan Newton Jan 2020

Network Management: Developing A Training Curriculum, Keegan Newton

Creative Components

Effective technical training within an IT department, designed to meet the operational needs of a corporation, is necessary for proper network management and sustainment. Even if technicians are hired based on stringent training pre-requisites, technology changes at a rate that demands continual training. A successful IT training curriculum relies on three elements: defined learning objectives and requirements, experienced instructors who are skilled at teaching, and a hands-on learning environment. Throughout this creative component, we will examine a large corporation, which we will refer to as, “Corporation Alpha,” that initially lacked an effective training program for its IT Department. Its lack ...


Shape Detection Of Physical Objects With Intel 5300 And The 802.11n Csi Tool, Andrew Lopez Jan 2020

Shape Detection Of Physical Objects With Intel 5300 And The 802.11n Csi Tool, Andrew Lopez

Creative Components

This thesis presents a detailed look at channel state information (CSI), an efficient approach to the shape detection of physical objects, and observations on how environment noise affects CSI. CSI describes the communication link between a transmitter and receiver through the properties of multiple channels. Once analyzed, these channels or subcarriers describe how the signal travels from the transmitting device to the receiving device. While this information was intended to help increase signal quality and strength of a communication link, many other applications have been suggested.

The proposed application in this paper provides a way with minimal resources to capture ...


Augmented And Virtual Reality Telecommunication Tool, Nicholas Wilson Jan 2020

Augmented And Virtual Reality Telecommunication Tool, Nicholas Wilson

Creative Components

The objective of this creative component is to design and develop a mixed reality telecommunication application. Video conferencing platforms have seen an incredible increase in popularity over the past few years and have become an essential tool in most modern industries. The importance of these platforms as well as their limitations provide an opportunity for advancement through the integration of mixed reality. With this goal in mind, I was tasked with developing a Unity application that must; connect multiple players through a network connection, support both VR and AR players, and allow players to exist in the same relative 3D ...


Analysis Of Jitter Control Using Real Time Scheduling, Fnu Geetika-Singh Jan 2020

Analysis Of Jitter Control Using Real Time Scheduling, Fnu Geetika-Singh

Creative Components

Jitter is defined as variation in the delay of received packets. In other words, jitter can be termed as the varying part of delay. Jitter is the variation in the latency on a packet flow between two systems, when some packets take longer than expected from one system to the other. At the transmitting side, packets are sent in a continuous stream with the packets spaced equally apart in most cases. Due to network congestion, improper queuing, channel properties or configuration errors, this steady stream can become lumpy, or the delay between each packet can vary instead of remaining constant ...


Security Analysis Of Vehicle To Vehicle Arada Locomate On Board Unit, Ramanni J Veeraraghava Jan 2019

Security Analysis Of Vehicle To Vehicle Arada Locomate On Board Unit, Ramanni J Veeraraghava

Creative Components

Arada Locomate On-Board Unit is a vehicle-to-vehicle communication device that supports the WAVE protocol, which is the standard for vehicle to vehicle communication. Successful attacks on the device could be used to control the behavior of the connected vehicle. This creative component assesses the security of the device and discusses the vulnerabilities of the applications installed on the device. It reports about our results to exploit the known vulnerabilities of Dropbear ssh, Busybox telnet, and the Linux kernel, which are installed on the device and discusses how to obtain the private keys of the device to use them for attacks ...


Assessing Coexistence Of Ieee 802.15.4 Networks And Ieee 802.11b/G/N Networks - A Study Of Interference Effects, Resy Verma Jan 2019

Assessing Coexistence Of Ieee 802.15.4 Networks And Ieee 802.11b/G/N Networks - A Study Of Interference Effects, Resy Verma

Creative Components

The study of the coexistence capabilities of networks based on the IEEE 802.11 and IEEE 802.15.4 standards has long been of interest to researchers owing to the individual success of these two technologies in various applications of Internet of Things (IoT). Operating in the same Industrial-Scientific-Medical (ISM) band, their coexistence does not always yield satisfactory results. The performance of a network based on IEEE 802.15.4 standard has been shown to be significantly lowered in the presence of a strong IEEE 802.11 based network (Wireless LAN) to the extent that communication based on the IEEE ...


Cost Optimization Of Allocating Virtual Network Functions With Precedence In Multicast Networks, Ramcharan Chalamalasetty Jan 2019

Cost Optimization Of Allocating Virtual Network Functions With Precedence In Multicast Networks, Ramcharan Chalamalasetty

Creative Components

In the past few years, Network Function Virtualization (NFV) has been widely used to reduce the operational and capital costs of implementing network functions with better performance and easier network management. NFV is a network architecture completely built relying on Virtual Network Functions (VNFs). Quite a few developments have been done for the optimization of resource allocation to implement VNFs in various networks. In this report, an algorithm for reducing the cost of placing the VNFs within a Multicast network along with a choice of selecting the precedence of the VNFs is presented. The proposed approach is formulated as a ...


Cyber Defense Competition Card Game, Ryan Luckinbill Jan 2019

Cyber Defense Competition Card Game, Ryan Luckinbill

Creative Components

Cyber Defense Competition Game is a JavaScript web application used to represent a card game version of a Cyber Defense Competition online. Cyber Defense Competitions have often been used to teach the concepts of information security and have participants compete against each other to protect their assets. This game attempts to create many of the same experiences that could be had during a Cyber Defense Competition but without much of the setup and taking much less time.

This project is the first step towards an easily playable card game between two players and a moderator. This version of the game ...


Mfaproxy: A Reverse Proxy For Multi-Factor Authentication, Alan Schmitz Jan 2019

Mfaproxy: A Reverse Proxy For Multi-Factor Authentication, Alan Schmitz

Creative Components

Multi-factor authentication has been shown to be an effective method to reduce the risk of remote attacks, because it prevents many attackers from easily gaining an initial foothold into an organization. Many sites only support single factor authentication based on passwords which have well known weaknesses. This paper describes MFAProxy, a reverse proxy that adds multi-factor authentication to sites that currently do not support it. The proxy can be deployed in a variety of configurations within a network to meet specific security goals. It supports flexible combinations of several factors including passwords, one-time passwords, and tokens based on public-key cryptography ...


Analyzing Driving Behavior From Can Data Using Context-Specific Information, Ashraf Shaikh Mohammed Jan 2019

Analyzing Driving Behavior From Can Data Using Context-Specific Information, Ashraf Shaikh Mohammed

Creative Components

Typical telematics and fleet-management systems today use embedded systems attached to the vehicle and get their driving data from their diagnostics port to identify the action of driver and grade it to provide feedback based on their quality of driving to efficiently handle the vehicle and also their driving behavior.

Today’s insurance companies provide embedded devices or the customer’s smartphone to analyze basic driving parameters such as speed, rpm, GPS location to understand driver’s braking, acceleration and distance travelled over a period and use it to assess quotes for insurance premium.

But most of the solutions above ...


Aggregation, Indexing And Visualization Using The Elk Stack, Bradlee Beadle Jan 2019

Aggregation, Indexing And Visualization Using The Elk Stack, Bradlee Beadle

Creative Components

My idea of what this final creative component of my education should be is related to the next step in the journey of life. I’m not aspiring to break new ground at this point, I am aspiring to teach those who desire to learn. I want to help build a strong foundation of learning for each student or individual I have the privilege to engage with in whatever capacity that entails. With that in mind, I decided to approach this last experience from a different perspective. This is not something that has never been done before. However, it is ...


Modeling Of Openflow Based Software Defined Networks Using Mininet, Aishwarya Kamal Maddala Jan 2019

Modeling Of Openflow Based Software Defined Networks Using Mininet, Aishwarya Kamal Maddala

Creative Components

Software-defined networking (SDN) has become one of the most important architectures for the management of large scale complex networks, which may require re-policing or re-configurations from time to time. By decoupling the control plane from data plane, SDN achieves easy re-policing. Hence, the network switches or routers forward packets simply by following the flow table rules which are set by the control plane. OpenFlow is the most popular SDN protocol or standard and has a set of design specifications. SDN or OpenFlow is a relatively new area, and it has attracted both academia and industry. This research work uses a ...


Data, Data Everywhere: Implications And Considerations, Matthew D. Pistilli Aug 2018

Data, Data Everywhere: Implications And Considerations, Matthew D. Pistilli

Iowa State University Articles and Manuscripts

Learning Analytics in Higher Education provides a foundational understanding of how learning analytics is defined, what barriers and opportunities exist, and how it can be used to improve practice, including strategic planning, course development, teaching pedagogy, and student assessment. Well-known contributors provide empirical, theoretical, and practical perspectives on the current use and future potential of learning analytics for student learning and data-driven decision-making, ways to effectively evaluate and research learning analytics, integration of learning analytics into practice, organizational barriers and opportunities for harnessing Big Data to create and support use of these tools, and ethical considerations related to privacy and ...


Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen Jan 2018

Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen

Finance Conference Papers, Posters, and Proceedings

The paper examines the transportation safety performance of transit agencies providing public bus service in the US by using data from the National Transit Database (NTD)

Uses NTD data for a seven-year period from 2008 to 2014 • 3,853 observations for 651 public transportation agencies in 50 states

Seven types of bus transit fatalities and injuries (including passengers, operators, pedestrians, bicyclists)

Main explanatory variable: urban density obtained from the US Census figures

Other explanatory variables: total agency revenue miles, unlinked passenger trips, agency fleet size, and urban population


Implementing Cis Cybersecurity Controls For The Department Of Residence, Iowa State University, Vishwas Kaup Vijayananda Jan 2018

Implementing Cis Cybersecurity Controls For The Department Of Residence, Iowa State University, Vishwas Kaup Vijayananda

Creative Components

The Department of Residence (DoR) at Iowa State University houses over 13,000 students, and employs over 300 staff members. Department of Residence’s IT team is in charge of taking care of Information systems assets (data, servers, systems, IP Phones, networking devices, VMs and printers) that are used by the students and the staff members. It is imperative for the DoR to reduce total IT spending, and also to secure the infrastructure to keep hackers and cyber criminals at bay. Various cybersecurity solutions were discussed, and we finally decided to implement CIS-Security Framework. It was one of the most ...


Multicasting In Network Function Virtualization (Nfv) Environment, Manika Dhingra Jan 2018

Multicasting In Network Function Virtualization (Nfv) Environment, Manika Dhingra

Creative Components

Network Function Virtualization is a growing concept in the research field because of its ability to decouple network functions, like network address translation (NAT), domain name service (DNS), firewall, intrusion detection (IDS) etc., from proprietary hardware equipment. They can now run in software making the network more flexible and agile. This also reduces hardware and maintenance costs of the network. Nowadays many applications use multicasting as it saves a huge amount of communication bandwidth. But many packets need intermediary processing before reaching their destinations. For this processing, Virtual Network functions (VNFs) are implemented in the network where processing of packets ...


Designing And Evaluating Personalized Lifestyle Blog Using Wordpress, Sijia He Jan 2018

Designing And Evaluating Personalized Lifestyle Blog Using Wordpress, Sijia He

Graduate Theses and Dissertations

“Blog” is a concentrate of “weblog” and was invented in the late 1990s to provide a chronological ordered calendar style method of discussion or informational websites published on the Internet. People are motivated by different reasons to start or run a blog, which means there are many different types of blogs. Some blogs focus on a particular subject such as a lifestyle blog, which is best defined as a digital content representation of its author's everyday life and interests.

Blogging in itself is quite popular, but it would not be what it is today without blog platforms such as ...


Guiding Early And Often: Using Curricular And Learning Analytics To Shape Teaching, Learning, And Student Success In Gateway Courses, Matthew D. Pistilli, Gregory L. Heileman Dec 2017

Guiding Early And Often: Using Curricular And Learning Analytics To Shape Teaching, Learning, And Student Success In Gateway Courses, Matthew D. Pistilli, Gregory L. Heileman

Iowa State University Articles and Manuscripts

This chapter provides information on how the promise of analytics can be realized in gateway courses through a combination of good data science and the thoughtful application of outcomes to teaching and learning improvement efforts—especially with and among instructors.


Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner Jul 2017

Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner

Finance Reports

This report contains the information and background on top-down cost estimating using artificial neural networks (ANN)_to enhance the accuracy of MDT early estimates of construction costs. Upon conducting an extensive review of MDT’s budgeting and cost estimating efforts, and following a survey of agency experts on the identification of the most salient project attributes with the dual-objectives of low effort and high accuracy, a rational method for top-down variable selection is proposed. Selected variables were further tested in their explanatory power of construction costs through the application of two cost estimating methodologies—multiple regression and artificial neural network ...


Threshold Cointegration And Price Transmission When Expectations Matter, Sergio H. Lence, Giancarlo Moschini, Fabio G. Santeramo Jul 2017

Threshold Cointegration And Price Transmission When Expectations Matter, Sergio H. Lence, Giancarlo Moschini, Fabio G. Santeramo

Economics Publications

We examine the performance of the threshold cointegration approach, specifically Band-TVECM, to price transmission analysis in an explicit context where trade decisions are made based on expectation of final prices, because trade takes time. We find that, following a standard inference strategy, a large portion of three-regime cases are not identified as such. Results show that transfer costs are systematically underestimated, particularly in three-regime models. The speed of price transmission is also biased in three-regime models. Furthermore, inferences about occurrence of trade are poor, with estimated models suggesting far lower market integration than is true in the data generating process .


Social Media In State Politics: Mining Policy Agendas Topics, Lei Qi, Rihui Li, Johnny S. Wong, Wallapak Tavanapong, David A. M. Peterson Jan 2017

Social Media In State Politics: Mining Policy Agendas Topics, Lei Qi, Rihui Li, Johnny S. Wong, Wallapak Tavanapong, David A. M. Peterson

Computer Science Conference Presentations, Posters and Proceedings

Twitter is a popular online microblogging service that has become widely used by politicians to communicate with their constituents.Gaining understanding of the influence of Twitter in state politics in the United States cannot be achieved without proper computational tools. We present the first attempt to automatically classify tweets of state legislatures (policy makers at the state level) into major policy agenda topics defined by Policy Agendas Project (PAP), which was initiated to group national policies.


Scaling Distributed All-Pairs Algorithms, Cory J. Kleinheksel, Arun K. Somani Feb 2016

Scaling Distributed All-Pairs Algorithms, Cory J. Kleinheksel, Arun K. Somani

Electrical and Computer Engineering Conference Papers, Posters and Presentations

In this paper we propose and prove that cyclic quorum sets can efficiently manage all-pairs computations and data replication. The quorums are O(N/√P) in size, up to 50% smaller than the dual N/√P array implementations, and significantly smaller than solutions requiring all data. Implementation evaluation demonstrated scalability on real datasets with a 7x speed up on 8 nodes with 1/3rd the memory usage per process.

The all-pairs problem requires all data elements to be paired with all other data elements. These all-pair problems occur in many science fields, which has led to their continued interest. Additionally ...


Advanced Terahertz Data Processing For Nde Applications, C.P. Thomas Chiou, John R. Nagel, Jared L. Taylor, Donald Palmer Jr, Nathan R. Smith Jan 2016

Advanced Terahertz Data Processing For Nde Applications, C.P. Thomas Chiou, John R. Nagel, Jared L. Taylor, Donald Palmer Jr, Nathan R. Smith

Review of Progress in Quantitative Nondestructive Evaluation

Recently terahertz technology (THz) has emerged as a very powerful NDE tool for inspecting and characterizing dielectric materials. Due to its exceptional longitudinal and lateral resolutions, time-domain pulsed THz scan is particularly effective for inspecting thin layered dielectric media. This pulsed scanning produces multi-dimensional data for which advanced processing techniques are needed to extract and analyze the ample information within. In this presentation we conduct a comparable study of several renowned data processing techniques to determine their applicability and performance in processing THz data. These data processing techniques include an outlier detection algorithm based on minimum covariance determinant estimator, the ...


Why Cyberbullies Choose Cyberspace: From The Perspective Of Uses And Gratifications, Sisi Hu Jan 2016

Why Cyberbullies Choose Cyberspace: From The Perspective Of Uses And Gratifications, Sisi Hu

Graduate Theses and Dissertations

This study employs uses and gratifications (U&G) theory to examine the motives and face-to-face bullying experiences of cyberbullies and how those motives and experiences influence their Internet bullying. An online survey and multiple regressions were employed to test the hypotheses. The results revealed that a cyberbully with more victim experience in face-to-face bullying will be more likely to have reactive than instrumental aggression motives to conduct cyberbullying behavior; while a cyberbully with more bully experience in face-to-face bullying will be more inclined to instrumental than reactive aggression motives. Further, a cyberbully with either reactive motives or instrumental motives relies on both the anonymity and wider audience available on the Internet. The results contribute to U&G theory with problem behavior research, and some practical applications of anti-cyberbullying campaigns are discussed.


Self Vs. Digital Self, Glenn Allen Terpstra Jan 2016

Self Vs. Digital Self, Glenn Allen Terpstra

Graduate Theses and Dissertations

The aim of this study is to compare three different identity profiles that people make use of in order to observe new patterns of identity in our digital age. The first is a physical profile based on age and location, the second is a digital profile established with Facebook profile pictures, and the third is a collection of "junk mail" indicating an advertised profile. The purpose of these comparisons is to bring attention to the many elements of identity we have today. A visual installation of the information collected through this research will provide a unique experience where viewers are ...


Website Gender Perceptions: Effects And Recommendations For Gender Inclusivity, Jacklin Hope Stonewall Jan 2016

Website Gender Perceptions: Effects And Recommendations For Gender Inclusivity, Jacklin Hope Stonewall

Graduate Theses and Dissertations

This paper examines the interactions of design elements and perceptions of a website’s gender as well as the effects of perceived gender on aspects of user experience. Designing for a particular gender is common in both product and web design, but in many situations is exclusionary. While imparting gender onto a product is often intentional, gender bias in websites largely is not. The unintentional gender bias in websites is created through a combination of internalized biases, biased tools, and culture. This work lays the foundation for understanding how websites become gendered as well as the effects of gendering on ...


Touch-Screen Tablet Navigation And Older Adults: An Investigation Into The Perceptions And Opinions Of Baby Boomers On Long, Scrolling Home Pages And The "Hamburger Icon", Linda Litchfield Griffen Jan 2015

Touch-Screen Tablet Navigation And Older Adults: An Investigation Into The Perceptions And Opinions Of Baby Boomers On Long, Scrolling Home Pages And The "Hamburger Icon", Linda Litchfield Griffen

Graduate Theses and Dissertations

How information and navigation are presented on a website can greatly impact one's ability to successfully use the site. While this is an important consideration for all audiences, it is especially important for older adults. Decreases in visual acuity, working memory, and the ability to block out distractions can greatly impact the successful use of a website and, therefore, the overall user experience for older adults. Compounding these issues, it has been observed web designers often do not take into consideration the usability needs of older adults. This is unfortunate, since the world population is experiencing an unprecedented increase ...


User Experience: A Review Of Methodology And The Creation Of An Evaluation Instrument, Ryan Graham Williams Jan 2014

User Experience: A Review Of Methodology And The Creation Of An Evaluation Instrument, Ryan Graham Williams

Graduate Theses and Dissertations

Understanding human interaction with a machine is a complicated task. Humans are creatures of nature and have spontaneous and irrational behaviors while machines are logical and process oriented. It is easy to see why interactions between humans and machines are a challenge for designers, developers, and engineers. Advances in technology have increased the capacity of machines to respond to humans in natural dialogue and everyday environments. This study hopes to contribute in understanding effective communication strategies between users and machines with the development of an instrument that incorporates best practices in user evaluation in human factors, cognitive response, and post ...


Generating A Framework For The Evaluation Of Structural Layout Preferences Within E-Commerce Websites, Bennett Stone Jan 2014

Generating A Framework For The Evaluation Of Structural Layout Preferences Within E-Commerce Websites, Bennett Stone

Graduate Theses and Dissertations

Global businesses are increasingly reliant on sales through electronic channels, and the importance of aesthetic satisfaction for e-commerce visitors is crucial to survival. A study by Kogaonkar and Wolin (Korgaonkar et al., 1999) shows that consumers are motivated to make purchases online based on "the aesthetic enjoyment and positive experience of emotion online," enhancing the need for websites that appeal to a visitors aesthetic preferences. Pursuing a competitive foothold within a shifting global marketplace, companies often seek out new visual bases for web presences, generating web designs based on perceived preferences of design. These designs are often assumed to be ...


Instructional Strategies In Diagram-Based Itss: Lessons Learned From Two Tutoring Systems, Enruo Guo, Stephen B. Gilbert Jan 2014

Instructional Strategies In Diagram-Based Itss: Lessons Learned From Two Tutoring Systems, Enruo Guo, Stephen B. Gilbert

Industrial and Manufacturing Systems Engineering Conference Proceedings and Posters

Unlike text-based input to an intelligent tutoring system, a diagram is perceived as a whole state; the operation sequence is less important. Traditional step-wise coaching is not as appropriate in diagram-based intelligent tutoring systems (DITS). From two previous tutoring systems, StaticsTutor and Thermo Cycle Tutor, we propose cross-domain pedagogical guidelines for DITS. In particular, instruction needs to be mapped to a hierarchical understanding of the diagram, where each level focuses on different characteristics of the drawing. Also, instruction needs to address conceptual knowledge and procedure expertise separately. Some practical suggestions are described to achieve these goals, such as 1) different ...