• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 743
  • 154
  • 140
  • 54
  • 49
  • 27
  • 23
  • 22
  • 13
  • 10
  • 9
  • 7
  • 6
  • 5
  • 5
  • Tagged with
  • 1395
  • 1200
  • 372
  • 289
  • 285
  • 262
  • 247
  • 220
  • 209
  • 164
  • 161
  • 143
  • 141
  • 131
  • 125
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

This Family of Things: Reflecting on the significance of objects in poetry

Julie, Lisa January 2019 (has links)
Magister Artium - MA / The creative project is a mini-thesis. It is made up of a collection of poems, titled This Family of Things. The collection consists mainly of narrative and descriptive poems which explore the relationship between people and objects and objects and space. The poems explore the day-today experiences of a mother and her young son. The poems exhibit certain elements of the narrative poem. The poems tell a story, and there are two distinct characters and instances of dialogue. This mini-thesis also includes a reflective essay in which I discuss the functionality of objects in poetry. In the essay, I discuss the potentially of objects in creative work. I discuss to what extent objects illuminate space and how objects can potentially disrupt space. I also discuss the separation of objects and things. I discuss creative influences and the various processes involved in the formulation of the creative project.
12

Autonomic Approach based on Semantics and Checkpointing for IoT System Management / Approche autonomique basée sur la sémantique et le checkpointing pour la gestion des systèmes de l'internet des objets

Aïssaoui, François 28 November 2018 (has links)
Le résumé en français n'a pas été communiqué par l'auteur. / Le résumé en anglais n'a pas été communiqué par l'auteur.
13

Three Essays on Internet of Things Adoption and Use

Aldossari, Mobark 05 1900 (has links)
Internet of Things (IoT) is a promising technology with great potential for individuals, society, governments, and the economy. IoT is expected to become ubiquitous and influence every aspect of everyday experience. Thus, IoT represents an important phenomena for both organizational and behavioral information system (IS) researchers. This dissertation seeks to contribute to IS research by studying the aspects that influence IoT adoption and use at both consumer and organizational levels. This dissertation achieves this purpose in a series of three essays. The first essay focuses on IoT acceptance in the context of smart home. The second essay focuses on examining the effect of artificial intelligence (AI) capabilities on consumers' IoT perceptions and intentions. Finally, the third essay focuses on the organizational investment and adoption of IoT technologies.
14

Resource constrained Industrial IoT device

Wernersson, Henrik Wernersson, Atwa, Yassin January 2016 (has links)
I dagens läge är industriella nätverk inte anpassade för att koppla upp resursbegränsade enheter pga av att industriella nätverks-protokollen som används är mer anpassade för real time applikationer. Det skulle vara ett stort steg för de industriella nätverken att kunna koppla upp resursbegränsade enheter för enkel övervakning samt analysering av data. Efter en undersökningsperiod av ett flertal olika IoT-protokoll, gjordes valet att implementera CoAP på en Anybus CompactCom-modul för testning. Under projektets gång användes det en del white-box testning i början vid implementationen av libCoAP. Efter att en fungerande implementation var gjord, påbörjades testning av input och output överensstämmelser med hjälp av black-box testning istället. Resultatet jämfördes i slutändan med den existerande lösningen att skicka parameterdata med hjälp av TCP. Resultatet hade en responstidsskillnad som var 92,3 % snabbare. Samtidigt tog det sammanlagt 24,2 % mindre plats i minnet (FLASH och RAM) för implementationen på Anybus CompactCom-modulen.
15

Privacy issues of the Internet of Things / Privacy issues of the Internet of Things

Mašek, Martin January 2016 (has links)
More and more devices and sensors are around us in today's world. There is an increasing tendency to connect devices and sensors to the Internet. We call such network the Internet of Things. As the cost of computing power continues to decrease, data collection and analysis becomes cheaper. Thus, we are able to get much better insight into different domains. This could be a problem in commercial sector, where we do not want to compromise proprietary know how or data. Especially big concerns are around personal data. We can now analyse behavior of people or get access to personal information such as health or spending patterns. This thesis addresses these privacy issues. Powered by TCPDF (www.tcpdf.org)
16

A Network Telescope Approach for Inferring and Characterizing IoT Exploitations

Unknown Date (has links)
While the seamless interconnection of IoT devices with the physical realm is envisioned to bring a plethora of critical improvements on many aspects and in diverse domains, it will undoubtedly pave the way for attackers that will target and exploit such devices, threatening the integrity of their data and the reliability of critical infrastructure. The aim of this thesis is to generate cyber threat intelligence related to Internet-scale inference and evaluation of malicious activities generated by compromised IoT devices to facilitate prompt detection, mitigation and prevention of IoT exploitation. In this context, we initially provide a unique taxonomy, which sheds the light on IoT vulnerabilities from five di↵erent perspectives. Subsequently, we address the task of inference and characterization of IoT maliciousness by leveraging active and passive measurements. To support large-scale empirical data analytics in the context of IoT, we made available corresponding raw data through an authenticated platform. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2018. / FAU Electronic Theses and Dissertations Collection
17

Cascading permissions policy model for token-based access control in the web of things

Amir, Mohammad, Pillai, Prashant, Hu, Yim Fun January 2014 (has links)
No / The merger of the Internet of Things (IoT) with cloud computing has given birth to a Web of Things (WoT) which hosts heterogeneous and rapidly varying data. Traditional access control mechanisms such as Role-Based Access schemes are no longer suitable for modelling access control on such a large and dynamic scale as the actors may also change all the time. For such a dynamic mix of applications, data and actors, a more distributed and flexible model is required. Token-Based Access Control is one such scheme which can easily model and comfortably handle interactions with big data in the cloud and enable provisioning of access to fine levels of granularity. However, simple token access models quickly become hard to manage in the face of a rapidly growing repository. This paper proposes a novel token access model based on a cascading permissions policy model which can easily control interactivity with big data without becoming a menace to manage and administer.
18

Aggregated sensor payload submission model for token-based access control in the Web of Things

Amir, Mohammad, Pillai, Prashant, Hu, Yim Fun 26 October 2015 (has links)
Yes / Web of Things (WoT) can be considered as a merger of newly emerging paradigms of Internet of Things (IoT) and cloud computing. Rapidly varying, highly volatile and heterogeneous data traffic is a characteristic of the WoT. Hence, the capture, processing, storage and exchange of huge volumes of data is a key requirement in this environment. The crucial resources in the WoT are the sensing devices and the sensing data. Consequently, access control mechanisms employed in this highly dynamic and demanding environment need to be enhanced so as to reduce the end-to-end latency for capturing and exchanging data pertaining to these underlying resources. While there are many previous studies comparing the advantages and disadvantages of access control mechanisms at the algorithm level, vary few of these provide any detailed comparison the performance of these access control mechanisms when used for different data handling procedures in the context of data capture, processing and storage. This study builds on previous work on token-based access control mechanisms and presents a comparison of two different approaches used for handling sensing devices and data in the WoT. It is shown that the aggregated data submission approach is around 700% more efficient than the serial payload submission procedure in reducing the round-trip response time.
19

Internet of Things ur ett säkerhets- och personligt integritetsperspektiv : En studie om utmaningar vid utveckling av IoT-lösningar

Hortell, Erik, Wendel, Angelica January 2016 (has links)
Our everyday lives are getting more and more connected with the web, and with that emerges the so called Internet of Things paradigm. The main objective of digitalizing the physical environment is to streamline everyday tasks whether it is on an individual basis or on an industrial basis. The purpose of this study is to examine the security and privacy issues related to the Internet of Things and the challenges the industry faces when developing IoT-solutions. We carried out interviews with four respondents whom all were active in the IoT-industry. The result of our study shows that the ubiquitous nature of technology put more at stake, resulting in the industry having to responsibly handle security and privacy related issues in a different way than before. Also, because of the Internet of Things still being in such an early developmental stage, there are standardization issues at hand that complicates the development of IoT-solutions.
20

Internet to WSN configuration and access using 6LoWPAN

Firouzbakhsh, Navid, Mokhtari Karchegani, Arash January 2014 (has links)
The Internet of Things mission is to connect any objects to the Internet, in order to provide the ability to access everything, everywhere. It will enable people to control and monitor their environment in a very convenient way. In order to fulfill the Internet of Things mission, one idea is to wrap a non-IP based protocol stack in the objects equipped with sensors, actuators and computing resources to enable them to be connected to the Internet through a protocol translation gateway. An alternative and competing idea, is to embed the TCP/IP stack into such smart objects, enabling them to interact with the Internet seamlessly. However, in order to satisfy the Internet of Things needs such as scalability, interoperability and simplicity of configuration and management, the use of IP architecture for smart objects is of interest, since it has proven itself a highly scalable, interoperable and simple communication technology. In particular, the new optimized Internet Protocol, IPv6, which is capable of providing any single object with a unique address, accompanied by many other great features such as plug-and-play and a real end-to-end connectivity, can offer great benefits to the Internet of Things. Nevertheless, most of the smart objects specially deployed in Wireless Sensor Networks a subset of Internet of Things, are not able to adapt the large IPv6 packet because of their Link- Layer limitations. Hence, it is a quite challenging task for these devices to transmit an IPv6 packet. For this reason, the Internet Engineering Task Force organization has offered an IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) solution in order to solve the IPv6 adaptability problem. This thesis presents the design and deployment of an IPv6-based WSN using this solution. The result of this work is building a 6LoWPAN based on the Contiki OS. This WSN is able to send the measured environment temperature to a web server and control the status of a light through the Internet in a standard, scalable, and seamless way.

Page generated in 0.0234 seconds