720 research outputs found

    Who\u27s Driving You? Driver Data Remains Unprotected Under COPPA and Shine the Light

    Get PDF
    As our lives become more driven by technology, California’s privacy laws fall short of protecting our personally identifiable information. Vehicles in particular present an increasing privacy concern, as our automobiles become more computer and less car. Cars today have increasingly sophisticated capabilities, stemming from connected technology and sensors, and their ability to capture geolocation and biometric data. This data can be used to make inferences about drivers’ behavioral patterns and daily habits. This Article analyzes whether California’s privacy laws—California Online Privacy Protection Act (“COPPA”) and Shine the Light—adequately address privacy concerns regarding driver data collected by the connected car. This Article considers how notice and consent can effectively protect connected car drivers, and concludes that consumers need a more effective way to manage how connected car data is collected, retained, and used

    Relationships between school taxes and town taxes in Vermont local government

    Get PDF
    Occasional paper (University of Vermont. Center for Research on Vermont) ; no. 8

    Reclaimed asphalt test specimen preparation assisted by image analysis

    Get PDF
    This paper presents a laboratory investigation aimed at establishing a protocol for the production of homogeneous asphalt mixtures test specimens, incorporating reclaimed asphalt by using a gyratory compactor with coring and trimming works. Stone mastic asphalt specimens were compacted at the previously identified target densities with the final aim of obtaining specimens with a fixed and homogeneous air void distribution. A microstructural study was conducted to characterize the homogeneity in the air void distribution using X-ray computed tomography (CT) combined with image analysis techniques. The study concluded that the gyratory compactor is suitable for producing homogeneous test specimens for the specified mixtures and a set of detailed procedures has been proposed for the production of the compacted specimens and to perform the microstructural study

    A spatial analysis of public transit routes in Amman, Jordan

    Get PDF
    Public transport is a basic service that must be provided to any society. An effective public transport system is the system that can provide adequate service coverage to all community groups, especially the low-income group, the elderly and the disabled. For performance evaluation, performance metrics are widely implemented; for this purpose transit accessibility is used in this study as it reflects the ease of reaching transit service and its convenience as a mode choice. This study aims to assess transit accessibility in Wadi Al-Seer, one of the main districts in Amman. Accessibility was measured on the basis of the percentage of service coverage area and served population. The analytical framework included the use of geographic information systems (GIS) software, through the creation of buffer areas representing the limits of pedestrians walking distance to public transit stations. The results shows that the overall accessibility is significant, but concentrated in the center of the district, while the outskirt is not properly served, in addition to a high percentage of overlapping routes. Thus improvements on the route distribution and increasing its numbers in low access areas are required

    Redesign of the Cam Dynamics Test Machine

    Get PDF
    The Cam Dynamics Test Machine (CDTM) was made to demonstrate cam operation and to test the dynamics of industrial cam-follower systems. Recent modifications made it inoperable in a classroom setting and revealed damage-causing flaws in the initial design. This project encompassed the redesign of the follower trains to eliminate those flaws. It also made the machine function in a classroom, improved the electrical wiring, and added storage space. Finally, the sensors were connected to a data acquisition board, and a Virtual Instrument was written to interpret their output voltages to aid future experimentation

    Measuring and Understanding CSR performance on Social Media

    Get PDF
    In recent years, business decisions and investment strategies have increasingly incorporated concerns of social issues. With increasing public attention on Corporate Social Responsibility (CSR), companies doing “harm” or “good” to society have eminently impacted the brand image, consumer perception, and employee retainment. To gain public awareness of companies’ improvement on CSR, companies share sustainable and ethical practices and business strategies on social media, such as Twitter. In this study, we aim to analyze the impact of social media as a moderator on the association between strengths and weaknesses of corporate social actions, and investigate whether the negative performance of CSR in the past leads to exemplary performance in one lag year

    Microstructural viscoplastic continuum model for asphalt concrete

    Get PDF
    This dissertation presents the development of an anisotropic viscoplastic continuum damage model to describe the permanent deformation of asphalt pavements. The model is developed to account for several phenomena that influence the permanent deformation of Asphalt Concrete (AC) at high temperatures. These phenomena include strain rate dependency, confining pressure dependency, dilation, aggregate friction, anisotropy, and damage. The model is based on Perzyna's theory of viscoplasticity with Drucker-Prager yield function modified to account for the microstructure anisotropy and damage. A parametric study was conducted to study the effect of key factors such as inherent anisotropy and damage on the model response. A preliminary investigation was conducted to demonstrate the capabilities of the model and its sensitivity to changes in the microstructure distribution and loading conditions. The model was used to describe laboratory experimental measurements obtained from the Federal Highway Administration (FHWA) Accelerated Loading Facility (ALF). The model had a good match with these experimental measurements. In particular, using the damage parameter, the model was able to capture the point at which AC experienced tertiary creep in a static creep test. A comprehensive experiment was conducted to systematically determine the model parameters and the evolution laws that describe AC hardening, anisotropy, and damage. The experiment consisted of a set of compressive triaxial strength tests conducted at three confining pressures and five strain rates. Based on these experimental measurements, the model was modified to include a nonassociated flow rule. The model was shown to capture the experimental measurements very well. Furthermore, an experiment was conducted to capture and characterize damage evolution in AC due to permanent deformation. AC specimens were loaded using a triaxial compression setup to four predefined strain levels at three confining pressures. X-Ray computed tomography and image analysis techniques were used to capture and characterize the evolution of cracks and air voids in the deformed specimens. Damage was found to be a localized phenomenon in the sense that there exists a critical section in an AC specimen that is mainly responsible for failure. The results of the damage experiment supported the damage evolution function proposed in the viscoplastic model

    Physical-Layer Security in Cognitive Radio Networks

    Get PDF
    The fifth-generation (5G) communications and beyond are expected to serve a huge number of devices and services. However, due to the fixed spectrum allocation policies, the need for cognitive radio networks (CRNs) has increased accordingly. CRNs have been proposed as a promising approach to address the problem of under-utilization and scarcity of the spectrum. In CRNs, secondary users (SUs) access the licensed spectrum of the primary users (PUs) using underlay, overlay, or interweave paradigms. SUs can access the spectrum band simultaneously with the PUs in underlay access mode provided that the SUs’ transmission power does not cause interference to the PUs’ communication. In this case, SUs should keep monitoring the interference level that the PU receiver can tolerate and adjust the transmission power accordingly. However, varying the transmission power may lead to some threats to the privacy of the information transfer of CRNs. Therefore, securing data transmission in an underlay CRN is a challenge that should be addressed. Physical-layer security (PLS) has recently emerged as a reliable method to protect the confidentiality of the SUs’ transmission against attacks, especially for the underlay model with no need for sharing security keys. Indeed, PLS has the advantage of safeguarding the data transmission without the necessity of adding enormous additional resources, specifically when there are massively connected devices. Apart from the energy consumed by the various functions carried out by SUs, enhancing security consumes additional energy. Therefore, energy harvesting (EH) is adopted in our work to achieve both; energy efficiency and spectral efficiency. EH is a significant breakthrough for green communication, allowing the network nodes to reap energy from multiple sources to lengthen battery life. The energy from various sources, such as solar, wind, vibration, and radio frequency (RF) signals, can be obtained through the process of EH. This accumulated energy can be stored to be used for various processes, such as improving the users’ privacy and prolonging the energy-constrained devices’ battery life. In this thesis, for the purpose of realistic modelling of signal transmission, we explicitly assume scenarios involving moving vehicles or nodes in networks that are densely surrounded by obstacles. Hence, we begin our investigations by studying the link performance under the impact of cascaded Îș−Ό fading channels. Moreover, using the approach of PLS, we address the privacy of several three-node wiretap system models, in which there are two legitimate devices communicating under the threat of eavesdroppers. We begin by a three-node wiretap system model operating over cascaded Îș − ÎŒ fading channels and under worst-case assumptions. Moreover, assuming cascaded Îș − ÎŒ distributions for all the links, we investigate the impact of these cascade levels, as well as the impact of multiple antennas employed at the eavesdropper on security. Additionally, the PLS is examined for two distinct eavesdropping scenarios: colluding and non-colluding eavesdroppers. Throughout the thesis, PLS is mainly evaluated through the secrecy outage probability (SOP), the probability of non-zero secrecy capacity (Pnzcr ), and the intercept probability (Pint). Considering an underlay CRN operating over cascaded Rayleigh fading channel, with the presence of an eavesdropper, we explore the PLS for SUs in the network. This study is then extended to investigate the PLS of SUs in an underlay single-input-multiple-output (SIMO) CRN over cascaded Îș-ÎŒ general fading channels with the presence of a multi-antenna eavesdropper. The impact of the constraint over the transmission power of the SU transmitter due to the underlay access mode is investigated. In addition, the effects of multiple antennas and cascade levels over security are well-explored. In the second part of our thesis, we propose an underlay CRN, in which an SU transmitter communicates with an SU destination over cascaded Îș-ÎŒ channels. The confidentiality of the shared information between SUs is threatened by an eavesdropper. Our major objective is to achieve a secured network, while at the same time improving the energy and spectrum efficiencies with practical modeling for signals’ propagation. Hence, we presume that the SU destination harvests energy from the SU transmitter. The harvested energy is used to produce jamming signals to be transmitted to mislead the eavesdropper. In this scenario, a comparison is made between an energy-harvesting eavesdropper and a non-energy harvesting one. Additionally, we present another scenario in which cooperative jamming is utilized as one of the means to boost security. In this system model, the users are assumed to communicate over cascaded Rayleigh channels. Moreover, two scenarios for the tapping capabilities of the eavesdroppers are presented; colluding and non-colluding eavesdroppers. This study is then extended for the case of non-colluding eavesdroppers, operating over cascaded Îș-ÎŒ channels. Finally, we investigate the reliability of the SUs and PUs while accessing the licensed bands using the overlay mode, while enhancing the energy efficiency via EH techniques. Hence, we assume that multiple SUs are randomly distributed, in which one of the SUs is selected to harvest energy from the PUs’ messages. Then, utilizing the gathered energy, this SU combines its own messages with the amplified PUs messages and forwards them to the destinations. Furthermore, we develop two optimization problems with the potential of maximizing the secondary users’ rate and the sum rate of both networks
    • 

    corecore