• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 63
  • 19
  • 12
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 142
  • 24
  • 19
  • 19
  • 16
  • 16
  • 15
  • 15
  • 15
  • 15
  • 15
  • 14
  • 13
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Secure Localization Topology and Methodology for a Dedicated Automated Highway System

Deka, Bhaswati 01 May 2013 (has links)
Localization of nodes is an important aspect in a vehicular ad-hoc network (VANET). Research has been done on various localization methods. Some are more apt for a specific purpose than others. To begin with, we give an overview of a vehicular ad-hoc network, localization methods, and how they can be classified. The distance bounding and verifiable trilateration methods are explained further with their corresponding algorithms and steps used for localization. Distance bounding is a range-based distance estimation algorithm. Verifiable trilateration is a popular geometric method of localization. A dedicated automated highway infrastructure can use distance bounding and/or trilateration to localize an automated vehicle on the highway. We describe a highway infrastructure for our analysis and test how well each of the methods performs, according to a security measure defined as spoofing probability. The spoofing probability is, simply put, the probability that a given point on the highway will be successfully spoofed by an attacker that is located at any random position along the highway. Spoofing probability depends on different quantities depending on the method of localization used. We compare the distance bounding and trilateration methods to a novel method using friendly jamming for localization. Friendly jamming works by creating an interference around the region whenever communication takes place between a vehicle and a verifier (belonging to the highway infrastructure, which is involved in the localization process using a given algorithm and localization method). In case of friendly jamming, the spoofing probability depends both on the position and velocity of the attacker and those of the target vehicle (which the attacker aims to spoof). This makes the spoofing probability much less for friendly jamming. On the other hand, the distance bounding and trilateration methods have spoofing probabilities depending only on their position. The results are summarized at the end of the last chapter to give an idea about how the three localization methods, i.e. distance bounding, verifiable trilateration, and friendly jamming, compare against each other for a dedicated automated highway infrastructure. We observe that the spoofing probability of the friendly jamming infrastructure is less than 2% while the spoofing probabilities of distance bounding and trilateration are 25% and 11%, respectively. This means that the friendly jamming method is more secure for the corresponding automated transportation system (ATS) infrastructure than distance bounding and trilateration. However, one drawback of friendly jamming is that it has a high standard deviation because the range of positions that are most vulnerable is high. Even though the spoofing probability is much less, the friendly jamming method is vulnerable to an attack over a large range of distances along the highway. This can be overcome by defining a more robust infrastructure and using the infrastructure's resources judiciously. This can be the future scope of our research. Infrastructures that use the radio resources in a cost effective manner to reduce the vulnerability of the friendly jamming method are a promising choice for the localization of vehicles on an ATS highway.
92

A three-layered robustness analysis of cybersecurity: Attacks and insights

Schweitzer, David 11 December 2019 (has links)
Cybersecurity has become an increasingly important concern for both military and civilian infrastructure globally. Because of the complexity that comes with wireless networks, adversaries have many means of infiltration and disruption of wireless networks. While there is much research done in defending these networks, understanding the robustness of these networks is tantamount for both designing new networks and examining possible security deficiencies in preexisting networks. This dissertation proposes to examine the robustness of wireless networks on three major fronts: the physical layer, the data-link layer, and the network layer. At the physical layer, denial-of-service jamming attacks are considered, and both additive interference and no interference are modeled in an optimal configuration and five common network topologies. At the data-link layer, data transmission efficacy and denial-of-sleep attacks are considered with the goal of maximizing throughput under a constrained lifetime. At the network layer, valid and anomalous communications are considered with the goal of classifying those anomalous communications apart from valid ones. This dissertation proposes that a thorough analysis of the aforementioned three layers provides valuable insights to robustness on general wireless networks.
93

Resisting the Resistance: The Emancipation of Students from the Hidden Curriculum of Commodified Resistant Narratives in Young Adult Dystopian Film Through Open Pedagogical Space and Culture-Jamming

Bauer, Robert B 01 December 2015 (has links) (PDF)
Young Adult Dystopian Film exercises an influence over young people of which they are not aware. As part of a structure of domination these films teach students to participate in their own oppression by the capitalist system. The film industry maintains a hidden curriculum like that utilized in school classrooms to conceal the oppression from the masses. One particularly effective means is the portrayal of resistance against oppression in the narratives of the YA Dystopian Film. Young people are drawn to that narrative and end up supporting the structure of domination financially and ideologically. Modes of resistance to this oppression can be found in Media Literacy Education and Public Pedagogy (e.g. culture-jamming). Teachers can incorporate Media Literacy and culture–jamming into a form of radical pedagogy to emancipate students from that oppressive relationship.This thesis investigates the usage of this radical pedagogy though an action research project in a high school drama class in the intermountain west. The students learned the theories, critically reflected on the situation, and created a live culture-jamming performance. The results of the action research show the affordances and limitations of this approach and offer suggestions for instigating its usage by media literacy educators.
94

Evaluation of Drone Neutralization Methods using Radio Jamming and Spoofing Techniques / Utvärdering av drönar-neutraliseringsmetoder genom användandet av radiostörning- och spoofingtekniker

Rozenbeek, David Jan January 2020 (has links)
The usage of drones is steadily increasing as drones are becoming more available and useful to the general public, but drone usage also leads to problems as for example airports have had to shutdown due to drone sightings. It has become clear that a counter-drone system must be in place to neutralize intruding drones. However, neutralizing a drone is not an easy task, the risk of causing collateral damage and interfering with other radio systems must be highly considered when designing a counter-drone system. In this thesis a set of consumer drones was selected based on market popularity. By studying the wireless communication links of the selected drones a set of drone neutralization methods was identified. For each neutralization method a set of jamming and spoofing techniques was selected from current research. The techniques was used in practise by subjecting the drones to the techniques in a series of drone behaviour experiments. The results was used to evaluate the techniques in four criteria based on avoiding collateral damage, mitigating radio interference, identification requirement and handling multiple intruding drones. The evaluation was then summarized to discuss suitable drone neutralization methods and jamming & spoofing techniques. The results showed that there are neutralization methods that could potentially avoid causing col- lateral damage for certain drones. A full-band barrage jamming technique was shown to best the best performing based on the evaluation criteria, but was also the technique that theoretically induced the most radio interference. Furthermore, drones operating in way-point mode can only be neutralized using a GNSS jamming or spoofing neutralization method. Also using a GPS spoofing neutralization method was shown to be difficult to implement in practise. / Populariteten av att flyga drönare ökar stadigt i och med att drönartekniken blir mer tillgänglig och an- vändbart för allmänheten. Men användningen av drönare leder också till problem när till exempel flyg- platser har varit tvungna att stänga av på grund av drönar observationer. Det har blivit tydligt att ett anti-drönarsystem måste vara på plats för att neutralisera inkräktande drönare. Men att neutralisera en drönare är inte en enkel uppgift, risken för att orsaka sido-skador på personer, byggander eller objekt; eller störa andra radiosystem måste beaktas starkt när man utformar ett anti-drönarsystem. I detta examensarbete valdes en uppsättning konsumentdrönare ut baserat på marknadens popularitet. Genom att studera de trådlösa kommunikationslänkarna för de valda drönarna identifierades en uppsättning av drönar-neutraliseringsmetoder. För varje neutraliseringsmetod valdes en uppsättning av störnings- och spoofing-tekniker ut från aktuell forskning. Teknikerna användes i praktiken genom att utsätta drönarna för teknikerna i en serie drönar-beteendeexperiment. Resultaten användes sedan för att utvärdera teknikerna i fyra utvärderingskriterier baserade på att undvika sido-skador, mildra radiostörningar, identifieringsbehov och hantering av flera inkräktande drönare. Utvärderingen sammanfattades sedan för att diskutera lämpliga drönar-neutraliseringsmetoder och störnings- spoofing-tekniker. Resultaten visade att det finns neutraliseringsmetoder som potentiellt kan undvika att orsaka sido- skador eller radio-störningar för vissa typer av drönare. En full-bands störningsteknik visade sig vara bäst presterande baserat på utvärderingskriterierna, men var också den teknik som teoretiskt inducerade mest radiostörningar. Dessutom visades det att drönare som flyger i navigeringsläge endast kan neutraliseras med hjälp av en GNSS-störnings- eller spoofing metoder. Att använda en GPS-spoofing metod visade sig också vara svår att implementera i praktiken.
95

Decode and Forward Relay Assisting Active Jamming in NOMA System

Akurathi, Lakshmikanth, Chilluguri, Surya Teja Reddy January 2022 (has links)
Non-orthogonal multiple access (NOMA), with its exceptional spectrum efficiency, was thought to be a promising technology for upcoming wireless communications. Physical layer security has also been investigated to improve the security performance of the system. Power-domain NOMA has been considered for this paper, where multiple users can share the same spectrum which bases this sharing on distinct power values. Power allocation is used to allocate different power to the users based on their channel condition. Data signals of different users are superimposed on the transmitter's side, and the receiver uses successive interference cancellation (SIC) to remove the unwanted signals before decoding its own signal. There exist an eavesdropper whose motive is to eavesdrop on the confidential information that is being shared with the users. The network model developed in this way consists of two links, one of which considers the relay transmission path from the source to Near User to Far User and the other of which takes into account the direct transmission path from the source to the destination, both of which experience Nakagami-m fading. To degrade the eavesdropper's channel, the jamming technique is used against the eavesdropper where users are assumed to be in a full-duplex mode which aims to improve the security of the physical layer. Secrecy performance metrics such as secrecy outage probability, secrecy capacity, etc. are evaluated and analyzed for the considered system. Mathematical analysis and simulation using MATLAB are done to assess, analyze and visualize the system's performance in the presence of an eavesdropper when the jamming technique is applied. According to simulation results, the active jamming approach enhances the secrecy performance of the entire system and leads to a positive improvement in the secrecy rate.
96

“Rösta på oss, annars limmar vi fast dig på E4:an” : En kvalitativ studie av falska valaffischer ur ett medieaktivistiskt perspektiv

Carlsson, Hannah January 2023 (has links)
The aim of this study is to analyze 25 fake election posters that have been put up between 2018 and 2022 in Sweden, through a narrative analysis, to gain an insight into how they displace political messages in the public space. The study is also done to gain a deeper understanding of the practice from a media activist perspective and to investigate how these practices renegotiate a traditional form of political communication. These renegotiation practices are theorized in terms of territorialization (Deleuze & Guattari, 1987). In addition, the concept right to the city (Harvey, 2003, 2008; Lefebvre, 1996) is used to understand the city as a public political space. The results of the study show that many fake election posters seem to want to challenge and try to influence their surroundings, although there are differences in what the the election posters specifically want to challenge or criticize. Common characteristics of the practice are activism, criticism, disclosure, disinformation, appropriation, intertextuality, irony, satire, humor, and political standpoints. This also shows that fake election posters can be understood as a type of activism, as there are many similarities with other media activist practices such as culture jamming, street art and graffiti.
97

Reciprocal sound transformations for computer supported collaborative jamming

Kallionpää, Roosa January 2020 (has links)
Collaborative jamming with digital musical instruments (DMI) exposes a need for output synchronization. While temporal solutions have been established, a better understanding of how live sound transformations could be balanced across instruments is required. In this work, a technology probe for reciprocal sound transformations was designed and developed by networking the instruments of four musicians and employing layered mapping between a shared interface, high-level sound attributes, and the sound synthesis parameters of each instrument. The probe was designed and used during a series of participatory design workshops, where seven high-level attributes were constructed according to the spectromorphology framework. The analysis, where the notion of sonic narrative and the concept of flow were applied, reveals how live controlling reciprocal sound transformations facilitates collaboration by supporting role-taking, motivating the ensemble, and directing the focus of its members. While generality of the implemented attributes cannot be claimed, challenges of the chosen mapping strategy and requirements for the user interface were identified. / Jammande i grupp med digitala musikinstrument (DMI) avslöjar ett behov för att kunna synkronisera dem utgående signalerna. Temporära lösningar har etablerats, men en bättre förståelse för hur live ljudtransformationer skulle kunna balanseras över flera instrument är nödvändig. I detta arbete utvecklades och designades en teknologisk sond för reciproka ljudtransformationer genom att koppla ihop fyra musikers instrument och en flerlagersavbildning skapades med ett delat gränssnitt, högnivå ljudattribut samt ljudsyntesparametrarna för varje instrument. Sonden designades och användes under co-design-workshops, där sju högnivå ljudattribut konstruerades enligt spectromorfologiramverket. Analysen, där begreppen soniskt berättande och konceptet flyt applicerades, avslöjar hur realtidskontroll av reciproka ljudtransformationer främjer medverkande genom att stödja rolltagande, motivera ensemblen, samt rikta fokuset hos medlemmarna. Även om det inte går att hävda att de implementerade attributen är generella, så identifierades utmaningarna hos den valda avbildningsstrategien och hos användargränssnittet.
98

Design, Modeling, and Experimental Testing of a Variable Stiffness Structure for Shape Morphing

Mikol, Collin Everett 14 August 2018 (has links)
No description available.
99

Gels d'émulsions à base d'huiles cristallisables : mécanismes de formation et propriétés rhéoloqiques

Thivilliers, Florence 17 September 2007 (has links) (PDF)
La formation de cristaux dans la phase dispersée d'une émulsion huile-dans-eau fait apparaître des irrégularités ou aspérités aux interfaces pouvant entraîner des modifications rhéologiques spectaculaires comme le passage d'un état fluide à un état solide. Nous montrons que la gélification des émulsions par voie thermique peut être attribuée à deux mécanismes : la coalescence partielle, qui permet grâce aux cristaux interfaciaux deformer des liens irréversibles entre gouttes, et le «jamming » qui est un phénomène de blocage dû aux aspérités empêchant le mouvement relatif des surfaces au contact. Sur des systèmes modèles, nous établissons que les mécanismes et les cinétiques de gélification sont contrôlés par la proportion d'huile cristallisée, le diamètre moyen des gouttes et la composition de l'interface. Nous montrons en particulier que la coalescence partielle peut être décrite comme un processus de percolation nécessitant des contacts de type « solide contre liquide » entre les gouttes. Nous montrons ensuite que la mise en écoulement des émulsions ou des gels peut conduire à deux situations limites : la séparation macroscopique des phases (ou barattage) ou bien la persistance d'un gel de plus faible connectivité. Nous étudions l'influence des paramètres qui sont à l'origine de cette évolution topologique. La variété des états accessibles rend ces matériaux très attractifs pour les secteurs de la cosmétique et l'agroalimentaire.
100

Suspensions concentrées : expériences originales de rhéologie

Boyer, Francois 12 December 2011 (has links)
En 1970, George K. Batchelor suggérait que la connaissance des lois de l'hydrodynamique rendait possible la dérivation de propriétés rhéologiques macroscopiques telle la viscosité, à partir de la connaissance de la microstructure d'une suspension de particules. Quarante ans plus tard, ses espoirs ne se sont pas concrétisés et la rhéologie des suspensions,notamment en régime concentré, reste un domaine de recherche très actif.Considérant des suspensions modèles de particules non colloïdales dans un liquide newtonien, le travail expérimental réalisé au cours de cette thèse s'est d'abord attaché à unifier les concepts classiquement définies en rhéologie des suspensions et ceux issus des récentes avancées sur les écoulements granulaires. Dans ce but, un dispositif original de cisaillement à pression imposée a été développé et a permis une caractérisation claire des équations constitutives en régime très dense.Par la suite, des configurations d'écoulements à surface libre ont été utilisées pour la mesure des deux différences de contraintes normales.Enfin, la mise en cohérence de l'ensemble des résultats expérimentaux donne une formulation complète et cohérente de la rhéologie des suspensions non colloïdales. / In 1970, George K. Batchelor suggested that the knowledge of the laws of hydrodynamics made ​​possible the derivation of macroscopic rheological properties such as the effective viscosity, from the knowledge of the microstructure of a suspension of particles. Forty years later, his hopes have not materialized and the rheology of suspensions, particularly in the concentrated regime, remains an area of ​​active research. Considering suspensions of non-colloidal particles in a Newtonian liquid, the experimental work in this thesis was first attached to unify the concepts traditionally defined rheology of suspensions and those from recent advances on granular flows. For this purpose, an original of shear imposed pressure was developed and showed a clear characterization of constitutive equations in the dense regime. Subsequently, the configurations of free surface flows have been used for the measurement of both normal stress differences. Finally, the coherence of all the experimental results gives a complete and consistent formulation of the rheology of non-colloidal suspensions.

Page generated in 0.3339 seconds