Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 4 of 4
Full-Text Articles in Engineering
Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris
Amplifying The Prediction Of Team Performance Through Swarm Intelligence And Machine Learning, Erick Michael Harris
Master's Theses
Modern companies are increasingly relying on groups of individuals to reach organizational goals and objectives, however many organizations struggle to cultivate optimal teams that can maximize performance. Fortunately, existing research has established that group personality composition (GPC), across five dimensions of personality, is a promising indicator of team effectiveness. Additionally, recent advances in technology have enabled groups of humans to form real-time, closed-loop systems that are modeled after natural swarms, like flocks of birds and colonies of bees. These Artificial Swarm Intelligences (ASI) have been shown to amplify performance in a wide range of tasks, from forecasting financial markets to …
Vehicle Pseudonym Association Attack Model, Pierson Yieh
Vehicle Pseudonym Association Attack Model, Pierson Yieh
Master's Theses
With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …
The Design, Building, And Testing Of A Constant On Discreet Jammer For The Ieee 802.15.4/Zigbee Wireless Communication Protocol, Alexandre J. Marette
The Design, Building, And Testing Of A Constant On Discreet Jammer For The Ieee 802.15.4/Zigbee Wireless Communication Protocol, Alexandre J. Marette
Master's Theses
As wireless protocols become easier to implement, more products come with wireless connectivity. This latest push for wireless connectivity has left a gap in the development of the security and the reliability of some protocols. These wireless protocols can be used in the growing field of IoT where wireless sensors are used to share information throughout a network. IoT is being implemented in homes, agriculture, manufactory, and in the medical field. Disrupting a wireless device from proper communication could potentially result in production loss, security issues, and bodily harm. The 802.15.4/ZigBee protocol is used in low power, low data rate, …
Modeling Adversarial Insider Vehicles In Mix Zones, Nicholas Plewtong
Modeling Adversarial Insider Vehicles In Mix Zones, Nicholas Plewtong
Master's Theses
Security is a necessity when dealing with new forms of technology that may not have been analyzed from a security perspective. One of the latest growing technological advances are Vehicular Ad-Hoc Networks (VANETs). VANETs allow vehicles to communicate information to each other wirelessly which allows for an increase in safety and efficiency for vehicles. However, with this new type of computerized system comes the need to maintain security on top of it.
In order to try to protect location privacy of the vehicles in the system, vehicles change pseudonyms or identifiers at areas known as mix zones. This thesis implements …