Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking

Iowa State University

Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 32

Full-Text Articles in Computer Engineering

Aggregation, Indexing And Visualization Using The Elk Stack, Bradlee Beadle Jan 2019

Aggregation, Indexing And Visualization Using The Elk Stack, Bradlee Beadle

Creative Components

My idea of what this final creative component of my education should be is related to the next step in the journey of life. I’m not aspiring to break new ground at this point, I am aspiring to teach those who desire to learn. I want to help build a strong foundation of learning for each student or individual I have the privilege to engage with in whatever capacity that entails. With that in mind, I decided to approach this last experience from a different perspective. This is not something that has never been done before. However, it is ...


Cost Optimization Of Allocating Virtual Network Functions With Precedence In Multicast Networks, Ramcharan Chalamalasetty Jan 2019

Cost Optimization Of Allocating Virtual Network Functions With Precedence In Multicast Networks, Ramcharan Chalamalasetty

Creative Components

In the past few years, Network Function Virtualization (NFV) has been widely used to reduce the operational and capital costs of implementing network functions with better performance and easier network management. NFV is a network architecture completely built relying on Virtual Network Functions (VNFs). Quite a few developments have been done for the optimization of resource allocation to implement VNFs in various networks. In this report, an algorithm for reducing the cost of placing the VNFs within a Multicast network along with a choice of selecting the precedence of the VNFs is presented. The proposed approach is formulated as a ...


Cyber Defense Competition Card Game, Ryan Luckinbill Jan 2019

Cyber Defense Competition Card Game, Ryan Luckinbill

Creative Components

Cyber Defense Competition Game is a JavaScript web application used to represent a card game version of a Cyber Defense Competition online. Cyber Defense Competitions have often been used to teach the concepts of information security and have participants compete against each other to protect their assets. This game attempts to create many of the same experiences that could be had during a Cyber Defense Competition but without much of the setup and taking much less time.

This project is the first step towards an easily playable card game between two players and a moderator. This version of the game ...


Security Analysis Of Vehicle To Vehicle Arada Locomate On Board Unit, Ramanni J Veeraraghava Jan 2019

Security Analysis Of Vehicle To Vehicle Arada Locomate On Board Unit, Ramanni J Veeraraghava

Creative Components

Arada Locomate On-Board Unit is a vehicle-to-vehicle communication device that supports the WAVE protocol, which is the standard for vehicle to vehicle communication. Successful attacks on the device could be used to control the behavior of the connected vehicle. This creative component assesses the security of the device and discusses the vulnerabilities of the applications installed on the device. It reports about our results to exploit the known vulnerabilities of Dropbear ssh, Busybox telnet, and the Linux kernel, which are installed on the device and discusses how to obtain the private keys of the device to use them for attacks ...


Assessing Coexistence Of Ieee 802.15.4 Networks And Ieee 802.11b/G/N Networks - A Study Of Interference Effects, Resy Verma Jan 2019

Assessing Coexistence Of Ieee 802.15.4 Networks And Ieee 802.11b/G/N Networks - A Study Of Interference Effects, Resy Verma

Creative Components

The study of the coexistence capabilities of networks based on the IEEE 802.11 and IEEE 802.15.4 standards has long been of interest to researchers owing to the individual success of these two technologies in various applications of Internet of Things (IoT). Operating in the same Industrial-Scientific-Medical (ISM) band, their coexistence does not always yield satisfactory results. The performance of a network based on IEEE 802.15.4 standard has been shown to be significantly lowered in the presence of a strong IEEE 802.11 based network (Wireless LAN) to the extent that communication based on the IEEE ...


Data, Data Everywhere: Implications And Considerations, Matthew D. Pistilli Aug 2018

Data, Data Everywhere: Implications And Considerations, Matthew D. Pistilli

Iowa State University Articles and Manuscripts

Learning Analytics in Higher Education provides a foundational understanding of how learning analytics is defined, what barriers and opportunities exist, and how it can be used to improve practice, including strategic planning, course development, teaching pedagogy, and student assessment. Well-known contributors provide empirical, theoretical, and practical perspectives on the current use and future potential of learning analytics for student learning and data-driven decision-making, ways to effectively evaluate and research learning analytics, integration of learning analytics into practice, organizational barriers and opportunities for harnessing Big Data to create and support use of these tools, and ethical considerations related to privacy and ...


Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen Jan 2018

Transportation Safety Performance Of Us Bus Transit Agencies And Population Density: A Cross-Sectional Analysis (2008-2014), Ilker Karaca, Peter T. Savolainen

Finance Conference Papers, Posters, and Proceedings

The paper examines the transportation safety performance of transit agencies providing public bus service in the US by using data from the National Transit Database (NTD)

Uses NTD data for a seven-year period from 2008 to 2014 • 3,853 observations for 651 public transportation agencies in 50 states

Seven types of bus transit fatalities and injuries (including passengers, operators, pedestrians, bicyclists)

Main explanatory variable: urban density obtained from the US Census figures

Other explanatory variables: total agency revenue miles, unlinked passenger trips, agency fleet size, and urban population


Designing And Evaluating Personalized Lifestyle Blog Using Wordpress, Sijia He Jan 2018

Designing And Evaluating Personalized Lifestyle Blog Using Wordpress, Sijia He

Graduate Theses and Dissertations

“Blog” is a concentrate of “weblog” and was invented in the late 1990s to provide a chronological ordered calendar style method of discussion or informational websites published on the Internet. People are motivated by different reasons to start or run a blog, which means there are many different types of blogs. Some blogs focus on a particular subject such as a lifestyle blog, which is best defined as a digital content representation of its author's everyday life and interests.

Blogging in itself is quite popular, but it would not be what it is today without blog platforms such as ...


Multicasting In Network Function Virtualization (Nfv) Environment, Manika Dhingra Jan 2018

Multicasting In Network Function Virtualization (Nfv) Environment, Manika Dhingra

Creative Components

Network Function Virtualization is a growing concept in the research field because of its ability to decouple network functions, like network address translation (NAT), domain name service (DNS), firewall, intrusion detection (IDS) etc., from proprietary hardware equipment. They can now run in software making the network more flexible and agile. This also reduces hardware and maintenance costs of the network. Nowadays many applications use multicasting as it saves a huge amount of communication bandwidth. But many packets need intermediary processing before reaching their destinations. For this processing, Virtual Network functions (VNFs) are implemented in the network where processing of packets ...


Implementing Cis Cybersecurity Controls For The Department Of Residence, Iowa State University, Vishwas Kaup Vijayananda Jan 2018

Implementing Cis Cybersecurity Controls For The Department Of Residence, Iowa State University, Vishwas Kaup Vijayananda

Creative Components

The Department of Residence (DoR) at Iowa State University houses over 13,000 students, and employs over 300 staff members. Department of Residence’s IT team is in charge of taking care of Information systems assets (data, servers, systems, IP Phones, networking devices, VMs and printers) that are used by the students and the staff members. It is imperative for the DoR to reduce total IT spending, and also to secure the infrastructure to keep hackers and cyber criminals at bay. Various cybersecurity solutions were discussed, and we finally decided to implement CIS-Security Framework. It was one of the most ...


Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner Jul 2017

Top-Down Construction Cost Estimating Model Using An Artificial Neural Network, Douglas D. Gransberg, H. David Jeong, Ilker Karaca, Brendon Gardner

Finance Reports

This report contains the information and background on top-down cost estimating using artificial neural networks (ANN)_to enhance the accuracy of MDT early estimates of construction costs. Upon conducting an extensive review of MDT’s budgeting and cost estimating efforts, and following a survey of agency experts on the identification of the most salient project attributes with the dual-objectives of low effort and high accuracy, a rational method for top-down variable selection is proposed. Selected variables were further tested in their explanatory power of construction costs through the application of two cost estimating methodologies—multiple regression and artificial neural network ...


Threshold Cointegration And Price Transmission When Expectations Matter, Sergio H. Lence, Giancarlo Moschini, Fabio G. Santeramo Jul 2017

Threshold Cointegration And Price Transmission When Expectations Matter, Sergio H. Lence, Giancarlo Moschini, Fabio G. Santeramo

Economics Publications

We examine the performance of the threshold cointegration approach, specifically Band-TVECM, to price transmission analysis in an explicit context where trade decisions are made based on expectation of final prices, because trade takes time. We find that, following a standard inference strategy, a large portion of three-regime cases are not identified as such. Results show that transfer costs are systematically underestimated, particularly in three-regime models. The speed of price transmission is also biased in three-regime models. Furthermore, inferences about occurrence of trade are poor, with estimated models suggesting far lower market integration than is true in the data generating process .


Social Media In State Politics: Mining Policy Agendas Topics, Lei Qi, Rihui Li, Johnny S. Wong, Wallapak Tavanapong, David A. M. Peterson Jan 2017

Social Media In State Politics: Mining Policy Agendas Topics, Lei Qi, Rihui Li, Johnny S. Wong, Wallapak Tavanapong, David A. M. Peterson

Computer Science Conference Presentations, Posters and Proceedings

Twitter is a popular online microblogging service that has become widely used by politicians to communicate with their constituents.Gaining understanding of the influence of Twitter in state politics in the United States cannot be achieved without proper computational tools. We present the first attempt to automatically classify tweets of state legislatures (policy makers at the state level) into major policy agenda topics defined by Policy Agendas Project (PAP), which was initiated to group national policies.


Self Vs. Digital Self, Glenn Allen Terpstra Jan 2016

Self Vs. Digital Self, Glenn Allen Terpstra

Graduate Theses and Dissertations

The aim of this study is to compare three different identity profiles that people make use of in order to observe new patterns of identity in our digital age. The first is a physical profile based on age and location, the second is a digital profile established with Facebook profile pictures, and the third is a collection of "junk mail" indicating an advertised profile. The purpose of these comparisons is to bring attention to the many elements of identity we have today. A visual installation of the information collected through this research will provide a unique experience where viewers are ...


Why Cyberbullies Choose Cyberspace: From The Perspective Of Uses And Gratifications, Sisi Hu Jan 2016

Why Cyberbullies Choose Cyberspace: From The Perspective Of Uses And Gratifications, Sisi Hu

Graduate Theses and Dissertations

This study employs uses and gratifications (U&G) theory to examine the motives and face-to-face bullying experiences of cyberbullies and how those motives and experiences influence their Internet bullying. An online survey and multiple regressions were employed to test the hypotheses. The results revealed that a cyberbully with more victim experience in face-to-face bullying will be more likely to have reactive than instrumental aggression motives to conduct cyberbullying behavior; while a cyberbully with more bully experience in face-to-face bullying will be more inclined to instrumental than reactive aggression motives. Further, a cyberbully with either reactive motives or instrumental motives relies on both the anonymity and wider audience available on the Internet. The results contribute to U&G theory with problem behavior research, and some practical applications of anti-cyberbullying campaigns are discussed.


Website Gender Perceptions: Effects And Recommendations For Gender Inclusivity, Jacklin Hope Stonewall Jan 2016

Website Gender Perceptions: Effects And Recommendations For Gender Inclusivity, Jacklin Hope Stonewall

Graduate Theses and Dissertations

This paper examines the interactions of design elements and perceptions of a website’s gender as well as the effects of perceived gender on aspects of user experience. Designing for a particular gender is common in both product and web design, but in many situations is exclusionary. While imparting gender onto a product is often intentional, gender bias in websites largely is not. The unintentional gender bias in websites is created through a combination of internalized biases, biased tools, and culture. This work lays the foundation for understanding how websites become gendered as well as the effects of gendering on ...


Advanced Terahertz Data Processing For Nde Applications, C.P. Thomas Chiou, John R. Nagel, Jared L. Taylor, Donald Palmer Jr, Nathan R. Smith Jan 2016

Advanced Terahertz Data Processing For Nde Applications, C.P. Thomas Chiou, John R. Nagel, Jared L. Taylor, Donald Palmer Jr, Nathan R. Smith

Review of Progress in Quantitative Nondestructive Evaluation

Recently terahertz technology (THz) has emerged as a very powerful NDE tool for inspecting and characterizing dielectric materials. Due to its exceptional longitudinal and lateral resolutions, time-domain pulsed THz scan is particularly effective for inspecting thin layered dielectric media. This pulsed scanning produces multi-dimensional data for which advanced processing techniques are needed to extract and analyze the ample information within. In this presentation we conduct a comparable study of several renowned data processing techniques to determine their applicability and performance in processing THz data. These data processing techniques include an outlier detection algorithm based on minimum covariance determinant estimator, the ...


Touch-Screen Tablet Navigation And Older Adults: An Investigation Into The Perceptions And Opinions Of Baby Boomers On Long, Scrolling Home Pages And The "Hamburger Icon", Linda Litchfield Griffen Jan 2015

Touch-Screen Tablet Navigation And Older Adults: An Investigation Into The Perceptions And Opinions Of Baby Boomers On Long, Scrolling Home Pages And The "Hamburger Icon", Linda Litchfield Griffen

Graduate Theses and Dissertations

How information and navigation are presented on a website can greatly impact one's ability to successfully use the site. While this is an important consideration for all audiences, it is especially important for older adults. Decreases in visual acuity, working memory, and the ability to block out distractions can greatly impact the successful use of a website and, therefore, the overall user experience for older adults. Compounding these issues, it has been observed web designers often do not take into consideration the usability needs of older adults. This is unfortunate, since the world population is experiencing an unprecedented increase ...


Instructional Strategies In Diagram-Based Itss: Lessons Learned From Two Tutoring Systems, Enruo Guo, Stephen B. Gilbert Jan 2014

Instructional Strategies In Diagram-Based Itss: Lessons Learned From Two Tutoring Systems, Enruo Guo, Stephen B. Gilbert

Industrial and Manufacturing Systems Engineering Conference Proceedings and Posters

Unlike text-based input to an intelligent tutoring system, a diagram is perceived as a whole state; the operation sequence is less important. Traditional step-wise coaching is not as appropriate in diagram-based intelligent tutoring systems (DITS). From two previous tutoring systems, StaticsTutor and Thermo Cycle Tutor, we propose cross-domain pedagogical guidelines for DITS. In particular, instruction needs to be mapped to a hierarchical understanding of the diagram, where each level focuses on different characteristics of the drawing. Also, instruction needs to address conceptual knowledge and procedure expertise separately. Some practical suggestions are described to achieve these goals, such as 1) different ...


Generating A Framework For The Evaluation Of Structural Layout Preferences Within E-Commerce Websites, Bennett Stone Jan 2014

Generating A Framework For The Evaluation Of Structural Layout Preferences Within E-Commerce Websites, Bennett Stone

Graduate Theses and Dissertations

Global businesses are increasingly reliant on sales through electronic channels, and the importance of aesthetic satisfaction for e-commerce visitors is crucial to survival. A study by Kogaonkar and Wolin (Korgaonkar et al., 1999) shows that consumers are motivated to make purchases online based on "the aesthetic enjoyment and positive experience of emotion online," enhancing the need for websites that appeal to a visitors aesthetic preferences. Pursuing a competitive foothold within a shifting global marketplace, companies often seek out new visual bases for web presences, generating web designs based on perceived preferences of design. These designs are often assumed to be ...


User Experience: A Review Of Methodology And The Creation Of An Evaluation Instrument, Ryan Graham Williams Jan 2014

User Experience: A Review Of Methodology And The Creation Of An Evaluation Instrument, Ryan Graham Williams

Graduate Theses and Dissertations

Understanding human interaction with a machine is a complicated task. Humans are creatures of nature and have spontaneous and irrational behaviors while machines are logical and process oriented. It is easy to see why interactions between humans and machines are a challenge for designers, developers, and engineers. Advances in technology have increased the capacity of machines to respond to humans in natural dialogue and everyday environments. This study hopes to contribute in understanding effective communication strategies between users and machines with the development of an instrument that incorporates best practices in user evaluation in human factors, cognitive response, and post ...


Asking The Players: A Mental Models Approach To How Long-Term Players Of A Massively Multiplayer Online Game Perceive The Risks Associated With Gaming, Sarani Rangarajan Jan 2014

Asking The Players: A Mental Models Approach To How Long-Term Players Of A Massively Multiplayer Online Game Perceive The Risks Associated With Gaming, Sarani Rangarajan

Graduate Theses and Dissertations

Video games represent a fast-growing medium and researchers are exploring their social influence, especially regarding the risks associated with gaming. Most studies have focused on an expert's view, rather than exploring how users themselves perceive and mitigate such risks. This qualitative study fills this gap by conducting in-depth interviews with 18 players of the browser based Massively Multi-player Online (MMO) strategy game, Lord of Ultima, in order to generate a mental model of how gamers see the risks associated with playing a MMO game. Results suggest that the primary risks in the minds of the gamers are loss of ...


Design Of A Programmable Saw Correlator Using Binary Phase Shift Key Encryption For Wireless Network Security, John R. Haughery, William R. Grisé, Robert Mertens Jan 2014

Design Of A Programmable Saw Correlator Using Binary Phase Shift Key Encryption For Wireless Network Security, John R. Haughery, William R. Grisé, Robert Mertens

Agricultural and Biosystems Engineering Conference Proceedings and Presentations

A Programmable Surface Acoustic Wave (PSAW) correlator pair using Binary Phase Shift Key (BPSK) modulation and an 11-bit Barker code sequence is proposed to increase the security levels of wirelessly transmitted network data in the 2.45 GHz WiFi frequency band. Due to the unique properties of SAW correlator’s interdigital transducer (IDT) fingers, their orientation, and the alternating polarity between sets of IDT fingers, they are well suited for BPSK encoding applications. This encryption is made possible with the use of well-matched PSAW correlator pairs that encode RF burst signals to produce a high auto-correlation vs. cross-correlation signal. This ...


Ipads As Tools For Communication With Parents, Beth Beschorner, Amy C. Hutchison Jan 2013

Ipads As Tools For Communication With Parents, Beth Beschorner, Amy C. Hutchison

Education Publications

A quick Internet search regarding iPad use in classrooms will reveal that school districts across the country are purchasing iPads and similar tablets at a rapid rate. Accordingly, teachers are beginning to consider ways in which iPads can be used in their classrooms. During our recent work in an early childhood classroom (Beschorner and Hutchison, 2013) we learned that, although reading and responding to text has been shown as one important classroom use for tablet technology (Hutchison, Beschorner, Crawford-Schmidt, 2012), another important use may be as a tool for innovative parent communication. While following two preschool teachers who were using ...


Revising An Extension Education Website For Limited Resource Audiences Using Social Marketing Theory, Sarah L. Francis, Peggy Martin, Kristin Taylor Dec 2011

Revising An Extension Education Website For Limited Resource Audiences Using Social Marketing Theory, Sarah L. Francis, Peggy Martin, Kristin Taylor

Food Science and Human Nutrition Publications

Spend Smart Eat Smart (SSES), a unique website combining nutrition and food buying education for limited resource audiences (LRAs), was revised using social marketing theory to make it more appealing and relevant to LRAs (25-40 years). Focus groups and surveys identified the needs and preferences of LRAs. Needs were cooking, basic health, and budget-friendly nutrition ideas. Preferences were limited text, more videos, graphics, and color. Usability testing of the revised site indicated users perceived the information valuable and the design appealing. By incorporating the needs and preferences of LRAs, SSES is now perceived as appealing as well as relevant.


A Modular Implementation Of Wii Remote Head Tracking For Virtual Reality, Ryan A. Pavlik, Judy M. Vance May 2010

A Modular Implementation Of Wii Remote Head Tracking For Virtual Reality, Ryan A. Pavlik, Judy M. Vance

Mechanical Engineering Conference Presentations, Papers, and Proceedings

Virtual reality (VR) environments based on interactive rendering of 3D computer graphics often incorporate the use of position and orientation tracking on the user’s head, hands, and control devices. The Wii Remote game controller is a massmarket peripheral that can provide a low-cost source of infrared point tracking and accelerometer data, making it attractive as a PC-based virtual reality head tracking system. This paper describes the development of an extension to the Virtual Reality Peripheral Network (VRPN) software to support the use of the Wii Remote game controller as a standard tracker object in a wide range of VR ...


Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis Mar 2000

Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis

Iowa State University Patents

A network connection blocker for monitoring connections between host computers in a network and blocking the unwanted connections. The host computers transmit connection packets between each other in accordance with a network protocol suite when seeking to establish, providing network services with, and close the connections. The network protocol suite includes a connection oriented transport layer protocol. The network connection blocker comprises a network interface that receives the connection packets transmitted between the host computers. It also comprises a blocking module that processes the received connection packets to detect the unwanted connections. The blocking module then generates connection packets in ...


Cmos Circuits For High Speed Serial Data Communication, Xiaoyu Xi Jan 1997

Cmos Circuits For High Speed Serial Data Communication, Xiaoyu Xi

Retrospective Theses and Dissertations

The serial data link has been dominant in network connections, such as Ethernet, FDDI or ATM, and will find even wider application in the future. This work focuses on the implementation of some basic building blocks for very high speed serial data communication using CMOS technology. At the transmitter end, a novel parallel-to-serial converter is presented, whose core is a 5 by 4 register matrix which combines the selection and shift schemes for conversion. Using this architecture, a pipelined data loading is applied to multiple data paths running at a sub-multiple of the data rate. This significantly reduces the dynamic ...


Performance Characteristics Of The Is-95 Standard For Cdma Spread Spectrum Mobile Communication Systems, Vijayalakshmi R. Raveendran Jan 1996

Performance Characteristics Of The Is-95 Standard For Cdma Spread Spectrum Mobile Communication Systems, Vijayalakshmi R. Raveendran

Retrospective Theses and Dissertations

No abstract provided.


An Analysis Of A Digitally Self Calibrated Parallel Pipelined Analog-To-Digital Converter, Venkata K. Navin Jan 1996

An Analysis Of A Digitally Self Calibrated Parallel Pipelined Analog-To-Digital Converter, Venkata K. Navin

Retrospective Theses and Dissertations

No abstract provided.