Current Search: access control (x)
View All Items
- Title
- AIRPORT SECURITY: EXAMINING THE CURRENT STATE OF ACCEPTANCE OF BIOMETRICS AND THE PROPENSITY OF ADOPTING BIOMETRIC TECHNOLOGY FOR AIRPORT ACCESS CONTROL.
- Creator
-
Sumner, Kristine, Liberman, Aaron, University of Central Florida
- Abstract / Description
-
The terrorist attacks of September 11, 2001 propelled the issue of aviation security to the forefront of the U.S. domestic agenda. Although hundreds of individual airports exist in the U.S., the travel activities at each of these airports combine to holistically comprise an aviation system that represents a significant portion of the U.S. social and economic infrastructure. Disruption at one airport resulting from a criminal act, such as terrorism, could exert detrimental effects upon the...
Show moreThe terrorist attacks of September 11, 2001 propelled the issue of aviation security to the forefront of the U.S. domestic agenda. Although hundreds of individual airports exist in the U.S., the travel activities at each of these airports combine to holistically comprise an aviation system that represents a significant portion of the U.S. social and economic infrastructure. Disruption at one airport resulting from a criminal act, such as terrorism, could exert detrimental effects upon the aviation system and U.S national security (9/11 Commission, 2004). Each U.S. airport is individually responsible for various aspects of security including the control of physical access to sensitive and secure areas and facilities (9/11 Commission, 2004). Biometric technology has been examined as one method of enhancing airport access control to mitigate the possibility of criminal acts against airports. However, successful implementation of biometric technology depends largely on how individual security directors at each airport perceive, understand, and accept that technology. Backgrounds, attitudes, and personal characteristics influence individual decisions about technology implementation (Rogers, 1995; Tornatzky and Fleischer, 1990). This study examines the problem of airport access control, as well as, the current trends in biometric technology. Utilizing a survey of airport security directors and security managers, this study draws upon innovation diffusion theory and organizational theories to determine what personal, organizational, and technical variables contribute to the propensity of airport security directors and managers to adopt biometric technology for airport access control.
Show less - Date Issued
- 2007
- Identifier
- CFE0001693, ucf:47220
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001693
- Title
- DESIGN IMPLEMENTATION OF A MICROCONTROLLER BASED EXTERNAL FACILITY ACCESS CONTROL SYSTEM.
- Creator
-
Fulbright Jr., Thomas, Richie, Samuel, University of Central Florida
- Abstract / Description
-
In order to solve the College of Engineering and Computer Science facility access problem, an automated system that provides exterior doors with a time schedule and allows authorized users to gain access to the facility after hours was developed. A microcontroller based system has been designed to interface with a personal computer. The system designed within this thesis can be used as a starting point for multiple facility access control systems. This thesis will describe the design,...
Show moreIn order to solve the College of Engineering and Computer Science facility access problem, an automated system that provides exterior doors with a time schedule and allows authorized users to gain access to the facility after hours was developed. A microcontroller based system has been designed to interface with a personal computer. The system designed within this thesis can be used as a starting point for multiple facility access control systems. This thesis will describe the design, integration, test, and final delivery of a facility access system that incorporates the Texas Instruments MSP430 microcontroller, a magnetic card swipe reader, and software developed in Microsoft Visual Basic .Net to provide a reliable and robust system for the College of Engineering and Computers Sciences needs.
Show less - Date Issued
- 2005
- Identifier
- CFE0000484, ucf:52897
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000484
- Title
- Real-time SIL Emulation Architecture for Cooperative Automated Vehicles.
- Creator
-
Gupta, Nitish, Pourmohammadi Fallah, Yaser, Rahnavard, Nazanin, Vosoughi, Azadeh, University of Central Florida
- Abstract / Description
-
This thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless...
Show moreThis thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless communication links. Vehicular communication has fueled the development of various Cooperative Vehicle Safety (CVS) applications. Development of safety applications for CAV requires testing in many different scenarios. However, the recreation of test scenarios for evaluating safety applications is a very challenging task. This is mainly due to the randomness in communication, difficulty in recreating vehicle movements precisely, and safety concerns for certain scenarios. We propose to develop a standalone Remote Vehicle Emulator (RVE) that can reproduce V2V messages of remote vehicles from simulations or from previous tests, while also emulating the over the air behavior of multiple communicating nodes. This is expected to significantly accelerate the development cycle. RVE is a unique and easily configurable emulation cum simulation setup to allow Software in the Loop (SIL) testing of connected vehicle applications in a realistic and safe manner. It will help in tailoring numerous test scenarios, expediting algorithm development and validation as well as increase the probability of finding failure modes. This, in turn, will help improve the quality of safety applications while saving testing time and reducing cost.The RVE architecture consists of two modules, the Mobility Generator, and the Communication emulator. Both of these modules consist of a sequence of events that are handled based on the type of testing to be carried out. The communication emulator simulates the behavior of MAC layer while also considering the channel model to increase the probability of successful transmission. It then produces over the air messages that resemble the output of multiple nodes transmitting, including corrupted messages due to collisions. The algorithm that goes inside the emulator has been optimized so as to minimize the communication latency and make this a realistic and real-time safety testing tool. Finally, we provide a multi-metric experimental evaluation wherein we verified the simulation results with an identically configured ns3 simulator. With the aim to improve the quality of testing of CVS applications, this unique architecture would serve as a fundamental design for the future of CVS application testing.
Show less - Date Issued
- 2018
- Identifier
- CFE0007185, ucf:52280
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007185
- Title
- BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES.
- Creator
-
Berrios-Ayala, Mark, Milon, Abby, University of Central Florida
- Abstract / Description
-
Imagine a world where someone's personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM...
Show moreImagine a world where someone's personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters' (GCHQ) mass shadowing sharing plan to America's Russian inspiration, SORM. Some countries are following the United States' poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation's strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today's blurred privacy expectations.
Show less - Date Issued
- 2014
- Identifier
- CFH0004537, ucf:45187
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004537