Matching Items (20)
137465-Thumbnail Image.png
Description
As technologies advance, so does the curiosity and exploration of humankind. There are many domains across this planet that are unexplored \u2014 the depths of Earth's ocean being one of the most predominant. While the ocean covers seventy percent of Earth's surface, a vast ninety-five percent of this realm remains

As technologies advance, so does the curiosity and exploration of humankind. There are many domains across this planet that are unexplored \u2014 the depths of Earth's ocean being one of the most predominant. While the ocean covers seventy percent of Earth's surface, a vast ninety-five percent of this realm remains untouched and unseen by the human eye. The biggest causality of this can be identified in the limitations of current technologies and the large expense associated with delving into these dangerous and uncharted areas. Underwater communication between unmanned devices is the solution to this problem. With the oceanic deployment of wirelessly connected unmanned underwater vehicles (UUVs), researchers can limit risk to human safely and retrieve invaluable oceanographic data from unimaginable depths. However, before this system can be physically deployed, the network topology and environmental interactions must be simulated. More specific to the application, how does attenuation of optical propagation degrade between transmissions? A widely used open source network simulator is the ns series: ns-1, ns-2, and ns-3. Ns-3 is the most recent version, and is a valuable tool for modeling network interactions. However, underwater simulation proposes a limitation \u2014 a three-dimensional consideration for pressure. To properly model this interaction, it is vital that an extension to ns-3 be provided in order to account for the affects pressure has on the propagation of a signal at varying depths.
ContributorsSowa, Ryan John (Author) / Richa, Andrea (Thesis director) / Saripalli, Srikanth (Committee member) / Zhou, Chenyang (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05
134762-Thumbnail Image.png
Description
IoT Media broadcast devices, such as the Roku stick, Amazon Fire, and Chromecast have been emerging onto the market recently as a portable and inexpensive alternative to cable and disk players, allowing easy integration between home and business Wi-Fi networks and television systems capable of supporting HDMI inputs without the

IoT Media broadcast devices, such as the Roku stick, Amazon Fire, and Chromecast have been emerging onto the market recently as a portable and inexpensive alternative to cable and disk players, allowing easy integration between home and business Wi-Fi networks and television systems capable of supporting HDMI inputs without the additional overhead of setting up a heavy or complicated player or computer. The rapid expansion of these products as a mechanism to provide for TV Everywhere services for entertainment as well as cheap office appliances brings yet another node in the rapidly expanding network of IoT that surrounds us today. However, the security implications of these devices are nearly unexplored, despite their prevalence. In this thesis, I will go over the structure and mechanisms of Chromecast, and explore some of the potential exploits and consequences of the device. The thesis contains an overview of the inner workings of Chromecast, goes over the segregation and limited control and fundamental design choices of the Android based OS. It then identifies the objectives of security, four different potential methods of exploit to compromise those objectives on a Chromecast and/or its attached network, including rogue applications, traffic sniffing, evil access points and the most effective one: deauthentication attack. Tests or relevant analysis were carried out for each of these methods, and conclusions were drawn on their effectiveness. There is then a conclusion revolving around the consequences, mitigation and the future implications of security issues on Chromecast and the larger IoT landscape.
ContributorsHuang, Kaiyi (Author) / Zhao, Ziming (Thesis director) / Ahn, Gail-Joon (Committee member) / W. P. Carey School of Business (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
135018-Thumbnail Image.png
Description
The software element of home and small business networking solutions has failed to keep pace with annual development of newer and faster hardware. The software running on these devices is an afterthought, oftentimes equipped with minimal features, an obtuse user interface, or both. At the same time, this past year

The software element of home and small business networking solutions has failed to keep pace with annual development of newer and faster hardware. The software running on these devices is an afterthought, oftentimes equipped with minimal features, an obtuse user interface, or both. At the same time, this past year has seen the rise of smart home assistants that represent the next step in human-computer interaction with their advanced use of natural language processing. This project seeks to quell the issues with the former by exploring a possible fusion of a powerful, feature-rich software-defined networking stack and the incredible natural language processing tools of smart home assistants. To accomplish these ends, a piece of software was developed to leverage the powerful natural language processing capabilities of one such smart home assistant, the Amazon Echo. On one end, this software interacts with Amazon Web Services to retrieve information about a user's speech patterns and key information contained in their speech. On the other end, the software joins that information with its previous session state to intelligently translate speech into a series of commands for the separate components of a networking stack. The software developed for this project empowers a user to quickly make changes to several facets of their networking gear or acquire information about it with just their language \u2014 no terminals, java applets, or web configuration interfaces needed, thus circumventing clunky UI's or jumping from shell to shell. It is the author's hope that showing how networking equipment can be configured in this innovative way will draw more attention to the current failings of networking equipment and inspire a new series of intuitive user interfaces.
ContributorsHermens, Ryan Joseph (Author) / Meuth, Ryan (Thesis director) / Burger, Kevin (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
137673-Thumbnail Image.png
Description
Speakshield.com will be a social networking site in the style of Twitter.com, but created for businesses that need a more secure way to communicate with their employees without compromising their organization's trade secrets and their employees' personal data. This website will be used by businesses to allow coworkers to collaborate

Speakshield.com will be a social networking site in the style of Twitter.com, but created for businesses that need a more secure way to communicate with their employees without compromising their organization's trade secrets and their employees' personal data. This website will be used by businesses to allow coworkers to collaborate on projects, communicate their ideas publicly to the company, and network with each other, without having that private information leak out to unintended recipients or be vulnerable in case of hacking incidents.
ContributorsKlepfish, Mikhail (Author) / Anderson, Dennis (Thesis director) / Happel, Stephen (Committee member) / Hensley, Matt (Committee member) / Barrett, The Honors College (Contributor) / W. P. Carey School of Business (Contributor) / Department of Information Systems (Contributor)
Created2013-05
147558-Thumbnail Image.png
Description

The insurance industry consists of financial advisors planning for individual’s financial future through defensive investments that will payout in case of something happening to a person’s greatest asset—themselves. Each financial advisor is mandated to pass a professional exam to receive their license in order to take in clients in each

The insurance industry consists of financial advisors planning for individual’s financial future through defensive investments that will payout in case of something happening to a person’s greatest asset—themselves. Each financial advisor is mandated to pass a professional exam to receive their license in order to take in clients in each state. There is a process in which clients are serviced and sold on different products of insurance. Advisors need to consider client needs and service them with products are in their best interest and within financial reason. <br/> To sell a product you must have clients, and the way that financial advisor receive clients are generally through two ways: company provided or their own connections. At the end of the day, the goal is to get in front of more people and expand you circle. In that sense, there are two common way people address this expansion of circles and that is build relationships versus networking. The goal of this paper is to dive deep in the insurance industry and analyze the sales process when comparing the difference in selling through building relationships versus selling through networking.<br/> The research plan I have in mind start from researching background and history, to current practices environment, to method process solutions. In the initial stages of my research, I will focus on background and history of the financial services industry in terms of sales and insurance. This will address insurance sales processes in the financial services industry and its features as well as benefits. After explaining the step by step process and potential results of the sales process in the insurance industry, I will start researching current environments of the industry. This will explain the history, key theoretical elements, and significant events of the industry. <br/> The history of the background will set stage for me to address situational challenges in the business based on my own experience to which I will do research to find plausible sales process solutions when comparing relationship sales to networking sales. This research will then be synthesized with my own experimental solutions as I work in the industry, which will help me complete chapter 4 and 5 of my theses – Methods and Execution of Results.

ContributorsSkelnik, Eason John (Author) / Byrne, Jared (Thesis director) / Desiderio, Jake (Committee member) / Department of Finance (Contributor) / Department of Supply Chain Management (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
171790-Thumbnail Image.png
Description
Transportation network connectivity has been linked to positive urban outcomes, including increased rates of active transportation, reduced reliance on automobiles and other social and economic benefits. While many stakeholders in greenfield development processes have emphasized the positive benefits of connectivity and connectivity has increased in many U.S. metros in the

Transportation network connectivity has been linked to positive urban outcomes, including increased rates of active transportation, reduced reliance on automobiles and other social and economic benefits. While many stakeholders in greenfield development processes have emphasized the positive benefits of connectivity and connectivity has increased in many U.S. metros in the past two decades, many street networks remain fragmented and local connectivity remains far below that of historic patterns. This paper explores barriers to and influences on connectivity outcomes in new community construction in the Phoenix metropolitan area, employing mixed qualitative and quantitative methods. Interviews were conducted with members from various stakeholder groups in the subdivision development process. Case studies were developed with space syntax and network analysis measurements to illustrate the influence of variables and stakeholders on the planning process. Participants illustrated a complex political and economic reality surrounding the concept of connectivity, with site conditions and development market dynamics playing the clearest roles in shaping connectivity. The result is subdivisions are achieving moderate levels of connectivity and improving from historic patterns of dendricity but remain entrenched in planning paradigms built around self-contained sites and the policy and market limitations for robust connectivity beyond individual developments.
ContributorsSchumerth, Noah John (Author) / King, David A (Thesis advisor) / Kuby, Michael (Committee member) / Lindsay, Lucas (Committee member) / Arizona State University (Publisher)
Created2022
189285-Thumbnail Image.png
Description
When does coercion succeed in international relations? Why do states resist coercion in some cases but concede in others? This dissertation adopts network analysis to investigate the network factors influencing the success and failure of economic and military coercion. The first chapter addresses the coercion target states’ information problem regarding

When does coercion succeed in international relations? Why do states resist coercion in some cases but concede in others? This dissertation adopts network analysis to investigate the network factors influencing the success and failure of economic and military coercion. The first chapter addresses the coercion target states’ information problem regarding how coercers would react to the targets’ resistances and concessions. By regarding resistances and concessions as network ties that can transmit information, it argues that past coercion outcomes endogenously influence targets’ current responses and coercion outcomes. Specifically, target states are more likely to concede to coercers who have been successful in gaining others’ compliance. Sender states are more likely to succeed in coercion when they had successful coercion in the past. The second chapter adds a condition to the first chapter’s argument. It argues that when being coerced by the same sender, a stronger sanction target’s compliance is likely to prompt a weaker target’s acquiescence, and that a weaker target’s resistance is likely to prompt a stronger target’s resistance. The third chapter explores how states’ positions in international security and economic networks influence the success and failure of military and trade coercion. States that occupy different network positions own different network power. I argue that when the coercion sender has relatively more network power than the target, the more likely coercion will be successful. I use interstate military alliances and arms transfer data to operationalize international security networks. International economic networks are operationalized by bilateral trade and regional trade agreements networks. Using military and trade coercion outcomes in the Military Compellent Threats (MCT) and the Threats and Imposition of Economic Sanctions (TIES) datasets as outcome variables, the statistical analysis partially supports my argument. Trade coercion is more likely to succeed when the sender has more network power. However, military coercion is less likely to succeed when the sender has more network power than the target.
ContributorsAi, Weining (Author) / Peterson, Timothy (Thesis advisor) / Thies, Cameron (Committee member) / Thomson, Henry (Committee member) / Chyzh, Olga (Committee member) / Arizona State University (Publisher)
Created2023
158301-Thumbnail Image.png
Description
The human transcriptional regulatory machine utilizes hundreds of transcription factors which bind to specific genic sites resulting in either activation or repression of targeted genes. Networks comprised of nodes and edges can be constructed to model the relationships of regulators and their targets. Within these biological networks small enriched structural

The human transcriptional regulatory machine utilizes hundreds of transcription factors which bind to specific genic sites resulting in either activation or repression of targeted genes. Networks comprised of nodes and edges can be constructed to model the relationships of regulators and their targets. Within these biological networks small enriched structural patterns containing at least three nodes can be identified as potential building blocks from which a network is organized. A first iteration computational pipeline was designed to generate a disease specific gene regulatory network for motif detection using established computational tools. The first goal was to identify motifs that can express themselves in a state that results in differential patient survival in one of the 32 different cancer types studied. This study identified issues for detecting strongly correlated motifs that also effect patient survival, yielding preliminary results for possible driving cancer etiology. Second, a comparison was performed for the topology of network motifs across multiple different data types to identify possible divergence from a conserved enrichment pattern in network perturbing diseases. The topology of enriched motifs across all the datasets converged upon a single conserved pattern reported in a previous study which did not appear to diverge dependent upon the type of disease. This report highlights possible methods to improve detection of disease driving motifs that can aid in identifying possible treatment targets in cancer. Finally, networks where only minimally perturbed, suggesting that regulatory programs were run from evolved circuits into a cancer context.
ContributorsStriker, Shawn Scott (Author) / Plaisier, Christopher (Thesis advisor) / Brafman, David (Committee member) / Wang, Xiao (Committee member) / Arizona State University (Publisher)
Created2020
131992-Thumbnail Image.png
Description
Astrobiology, as it is known by official statements and agencies, is “the study of the origin, evolution, distribution, and future of life in the universe” (NASA Astrobiology Insitute , 2018). This definition should suit a dictionary, but it may not accurately describe the research and motivations of practicing astrobiologists. Furthermore,

Astrobiology, as it is known by official statements and agencies, is “the study of the origin, evolution, distribution, and future of life in the universe” (NASA Astrobiology Insitute , 2018). This definition should suit a dictionary, but it may not accurately describe the research and motivations of practicing astrobiologists. Furthermore, it does little to characterize the context in which astrobiologists work. The aim of this project is to explore various social network structures within a large body of astrobiological research, intending to both further define the current motivations of astrobiological research and to lend context to these motivations. In this effort, two Web of Science queries were assembled to search for two contrasting corpora related to astrobiological research. The first search, for astrobiology and its close synonym, exobiology, returned a corpus of 3,229 journal articles. The second search, which includes the first and supplements it with further search terms (see Table 1) returned a corpus of 19,017 journal articles. The metadata for these articles were then used to construct various networks. The resulting networks describe an astrobiology that is well entrenched in other related fields, showcasing the interdisciplinarity of astrobiology in its emergence. The networks also showcase the entrenchment of astrobiology in the sociological context in which it is conducted—namely, its relative dependence on the United States government, which should prompt further discussion amongst astrobiology researchers.
ContributorsBromley, Megan Rachel (Author) / Manfred, Laubichler (Thesis director) / Sara, Walker (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / School of Earth and Space Exploration (Contributor) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2019-12
132101-Thumbnail Image.png
Description
Ad hoc wireless networks present several interesting problems, one of which is Medium Access Control (MAC). Medium Access Control is a fundamental problem deciding who get to transmit next. MAC protocols for ad hoc wireless networks must also be distributed, because the network is multi-hop. The 802.11 Wi-Fi protocol is

Ad hoc wireless networks present several interesting problems, one of which is Medium Access Control (MAC). Medium Access Control is a fundamental problem deciding who get to transmit next. MAC protocols for ad hoc wireless networks must also be distributed, because the network is multi-hop. The 802.11 Wi-Fi protocol is often used in ad hoc networking. An alternative protocol, REACT, uses the metaphor of an auction to compute airtime allocations for each node, then realizes those allocations by tuning the contention window parameter using a tuning protocol called SALT. 802.11 is inherently unfair due to how it returns the contention window to its minimum size after successfully transmitting, while REACT’s distributed auction nature allows nodes to negotiate an allocation where all nodes get a fair portion of the airtime. A common application in the network is audio streaming. Audio streams are dependent on having good Quality of Service (QoS) metrics, such as delay or jitter, due to their real-time nature.

Experiments were conducted to determine the performance of REACT/SALT compared to 802.11 in a streaming audio application on a physical wireless testbed, w-iLab.t. Four experiments were designed, using four different wireless node topologies, and QoS metrics were collected using Qosium. REACT performs better in these these topologies, when the mean value is calculated across each run. For the butterfly and star topology, the variance was higher for REACT even though the mean was lower. In the hidden terminal and exposed node topology, the performance of REACT was much better than 802.11 and converged more tightly, but had drops in quality occasionally.
ContributorsKulenkamp, Daniel (Author) / Syrotiuk, Violet R. (Thesis director) / Colbourn, Charles J. (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2019-12