Open Access. Powered by Scholars. Published by Universities.®

Automotive Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Automotive Engineering

A Novel All Wheel Drive Torque Vectoring Control System Applied To Four Wheel Independent Drive Electric Motor Vehicles Utilizing Super Twisting And Linear Quadratic Regulator Methods, Kenneth Daniel Schmutz Dec 2018

A Novel All Wheel Drive Torque Vectoring Control System Applied To Four Wheel Independent Drive Electric Motor Vehicles Utilizing Super Twisting And Linear Quadratic Regulator Methods, Kenneth Daniel Schmutz

Master's Theses

This thesis contains the design and simulation test results for the implementation of a new all-wheel drive (AWD) torque vectoring (TV) control system. A separate algorithm using standard control methods is included in this study for a comparison. The proposed controller was designed to be applied to an AWD independent drive electric vehicle, however the main concepts can be re-purposed for other vehicle drive train configurations. The purpose of the control system is to assist the driver in achieving a desired vehicle trajectory whilst also maintaining stability and control of the vehicle. This is accomplished by measuring various real time …


Vehicle Pseudonym Association Attack Model, Pierson Yieh Jun 2018

Vehicle Pseudonym Association Attack Model, Pierson Yieh

Master's Theses

With recent advances in technology, Vehicular Ad-hoc Networks (VANETs) have grown in application. One of these areas of application is Vehicle Safety Communication (VSC) technology. VSC technology allows for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications that enhance vehicle safety and driving experience. However, these newly developing technologies bring with them a concern for the vehicular privacy of drivers. Vehicles already employ the use of pseudonyms, unique identifiers used with signal messages for a limited period of time, to prevent long term tracking. But can attackers still attack vehicular privacy even when vehicles employ a pseudonym change strategy? The major contribution …