• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 754
  • 158
  • 140
  • 54
  • 49
  • 27
  • 23
  • 22
  • 13
  • 10
  • 9
  • 7
  • 6
  • 6
  • 5
  • Tagged with
  • 1415
  • 1218
  • 380
  • 291
  • 291
  • 265
  • 251
  • 225
  • 212
  • 167
  • 165
  • 144
  • 144
  • 131
  • 126
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

O partido das coisas: modernidade, ciência e decisão / On the side of things: modernity, science and decision

Caue Cardoso Polla 28 August 2008 (has links)
Nosso estudo tem como objetivo dimensionar o alcance da pergunta que é uma coisa? na filosofia de Martin Heidegger na década de 30. Num primeiro momento, a análise da pergunta que é uma coisa? mostra as implicações conceituais envolvidas no processo histórico de elaboração de teorias acerca da coisa. Num segundo momento, trata-se de compreender o papel decisivo da modernidade filosófica e científica na construção da determinação dominante da coisa que impera até os dias atuais. Num terceiro momento, pretende-se esclarecer o caráter de decisão da época moderna em sua totalidade. Por fim, uma reflexão final aponta para os caminhos abertos por Heidegger em sua aproximação a uma resposta para a pergunta que é uma coisa?. / Our study aims at analyzing the reach of the question what is a thing? in the philosophy of Martin Heidegger during the 30s. At first, the analysis of the question what is a thing? shows the conceptual implications intertwined in the historical process of the elaboration of theories regarding the thing. Secondly, it shows the necessity of understanding the decisive role of modernity both philosophical and scientific in the construction of the up to nowadays dominant determination of the thing. Thirdly, we intend to clarify the character of decision of the modern epoch in its entirety. As a conclusion, a reflection points out to the paths opened up by Heidegger in his approximation of an answer to the question what is a thing?.
132

Microsoft  Azure i IoT-utveckling / Microsoft Azure in IoT development

Persson, Henrik January 2017 (has links)
AF’s office in Karlstad currently offer consultation regarding Internet of Things but are looking to expand into development of services. They have requested that an end-to-end solution is developed in order to demonstrate the technology to potential clients. This thesis describes the work performed to realize an end-to-end solution for connecting sensors and actuators to the cloud. It also describes the problems experienced while working with Microsofts platform for cloud services, Azure. / Företaget ÅFs Karlstadkontor bistår i dagsläget med konsultering gällande Internet of Things men vill även börja utveckla och sälja tjänster. För att kunna demonstrera teknologin för potentiella kunder har de begärt att en end-to-end-lösning utvecklas. Den här uppsatsen beskriver det arbete som har utförts för att realisera en end-to-end-lösning för att koppla sensorer och ställdon till molnet. Den redogör även för de svårigheter som upplevdes gällande Microsofts plattform för molntjänster, Azure.
133

Att säga "No More" till ondskan : En narrativ analys av Stranger Things-karaktären Eleven som kristusgestalt / To say "No More" to evil : A narrative analysis of Stranger Things character Eleven as a Christ-figure

Andersson, Malin January 2018 (has links)
Uppsatsens ansats är att undersöka hur den kvinnliga karaktären Eleven kan tolkas som en kristusgestalt. Med hjälp av en narrativ analys av utvalda scener i säsong ett av tv-serien Stranger Things där karaktären Eleven figurerar, analyseras både Elevens handlingar och hennes karaktäristiska drag med hjälp av bland annat Tomas Axelsons förståelse av en kristusgestalt och dess rötter, samt Lloyds Baughs åtta kriterier för kristusgestalter. Resultatet visar att Elevens karaktäristiska drag och handlingar är till stor del förenliga med en kristusgestalts, men är inte oproblematiskt. Många av Elevens handlingar, även de som genomförs med ett beskyddande syfte, genomsyras av våld, vilket inte är kristuslikt alls. Tidigare forskning menar att våld är vanligt förekommande bland dagens kristusgestalter, men frågan kan ställas huruvida detta så vitt skiljande drag bör påverka tolkning av karaktärer som kristusgestalter.
134

Internet of Things (IoT) Industry Gateway Modelling

Iqbal, Muhammad Azhar January 2016 (has links)
The Internet of Things (IoT) provide the possibility to build dynamic industrial systems and applications to improve the quality of production in industrial areas. There are many Industrial IoT Gateways (IoTGWs) available on the market, all of which have different functionalities and properties. Here, the different properties of the IIoTGWs were explored, with the researcher’s as well as vendor’s perspective in mind. The most important properties were identified using research papers and technical data sheets, based on this, a model was created. The model showed the best two gateways available in the database. The results show that methods used can be applied in future research.
135

Comparison between SensibleThings and Kaa platform

Lu, Cao January 2016 (has links)
With the Internet of Things becoming more and more popular, and a prediction that there will be more than 50 million devices connected to the Internet in 2020, the quantity of IoT platforms on the market is rapidly growing. Facing so many platforms to choose, the object of this thesis is to give some suggestions for reference by performing a quantitative comparison between two platforms: SensibleThings and Kaa. These two platforms have difference architectures so may suitable in different scenes. The comparison includes some measurement and evaluation under two designed scenarios and a general contrast in theory. Two scenarios cover cases of message delivery between two endpoints at different rates and multiple endpoints pushing log data continually. The result of measurement together with the theoretical analysis draw out the following conclusion. SensibleThings platform is more suitable for simple and small-scale message delivery between endpoints, like home environment with few devices. And Kaa platform is more suitable for large-scale and complicated application for data collection and processing, like meteorology field with huge amount of sensors and data.
136

Quantitative Comparison of SensibleThings and ThingsWorx

Yu, Yun January 2016 (has links)
Internet of things is a technology innovation which connects thousands of mil- lions of sensors and actuators. Platform is which provides both hardware and software service. There are so many platforms existed in the market. The objective of this study has been to answer the question which IoT platform fits bests for different scenarios by performing a quantitative comparison between SensibleThings and ThingWorx. The study has been conducted with the aid of my su- pervisor Stefan Forsström and professor TingTing Zhang. The study has shown that SensibleThings and ThingWorx both has its innovation features thus it fits to the different cases according to cases’ need. If the sensor need to update data quicker than 25 times/sec, it is better to choose ThingWorx. If the sensor doesn’t have good hardware it is better to use SensibleThings cause it is light- weight enough. For the case that more than one sensors’ data rush into one point simultaneously, ThingWorx has better performance. In this paper I use a health care system as an example. I think ThingWorx is more suitable for this case regard of its mature service on security and graphical visualization. Finally I presented my future work for platform evaluation.
137

Quantitative comparison of SensibleThings and Microsoft Azure IoT Hub

Jiang, Yiliang January 2016 (has links)
With the development of the Internet-of-Things, more and more IoT platforms come up with different structures and characteristics. Making balance of their advantages and disadvantages, we should choose the suitable platform in differ- ent scenarios. For this project, I make comparison of a cloud-based centralized platform, Microsoft Azure IoT hub and a fully distributed platform, Sensi- bleThings. Quantitative comparison is made for performance by 2 scenarios, messages sending speed adds up, devices lie in different location. General com- parison is made for security, utilization and the storage. Finally I draw the con- clusion that SensibleThings performs more stable when a lot of messages push- es to the platform. Microsoft Azure has better geographic expansion. For gener- al comparison, Microsoft Azure IoT hub has better security. The requirement of local device for Microsoft Azure IoT hub is lower than SensibleThings. The SensibleThings are open source and free while Microsoft Azure follow the con- cept “pay as you go” with many throttling limitations for different editions. Microsoft is more user-friendly.
138

Impact of Internet of Things on Software Business Model and Software Industry

Murari, Bhanu Teja January 2016 (has links)
Context: Internet of things (IoT) technology is rapidly increasing and changes the business environment for a software organization. There is a need to understand what are important factors of business model should a software company focus on obtaining benefits from the potential that IoT offers. This thesis also focuses on finding the impact of IoT on software business model and software industry especially on software development. Objectives: In this thesis, we do research on IoT software business model and also software industry. The objectives of this research are included as follows: 1. Summarize the current business models for IoT and to identify the important factor for IoT business models. 2. Analyze the impact of IoT on software business models. 3. Analyze the impact of IoT on Software development especially on requirement engineering. 4. Provide recommendations how requirements engineering are connected to provide better support business modeling for IoT. Methods: We conducted a systematic literature review based on the guidelines suggested by Wohlin, to find the current business model for the IoT. Next, we designed and executed an industrial survey to explore the impact of IoT on a software business model and software development.The results of survey were statistically analyzed using descriptive statistics, chi-square test of significance and Friedman test. Results: 21 peer reviewed papers were identified which were analyzed in relation to their rigor and relevance. From the literature reviews, results indicate 9 business model elements are being focused on the IoT business models. In addition to this 4 most important business model factors were identified. On the other hand, the industrial survey resulted from 56 survey responses, identified that value proposition is the most important element for the IoT business model. It was also observed that even the impact is high for the value proposition. Regarding the software development, customer demands is highly impactful and moreover, the results suggest that requirement management is highly impactful. Conclusions: The current software business models were found for the IoT industries. In additional the software business model elements which were majorly focused in the IoT industries were also identified and the most important factor which brings the value for IoT business models were also discussed. Furthermore the impact of IoT on software business model element and software development, especially on the requirement phase, was analyzed and discussed. This helps the practitioners to understand the impact of IoT on software business models and software industry and helps the organization to improve IoT business to its full potential.
139

Performance analysis for an enhanced architecture of IoV via Content-Centric Networking

Li, Zhuo, Chen, Yutong, Liu, Deliang, Li, Xiang 14 July 2017 (has links)
TCP/IP protocol gradually exposes many shortcomings such as poor scalability and mobility. Content-Centric Networking is a new architecture which cares about the content itself rather than its source. Therefore, this paper proposes a novel IoV architecture which based on Content-Centric Networking and tests its transmission interference time, transmission delay, and throughout in network layer. The experimental results show that the novel architecture is superior to the current IoV in the communication performance.
140

An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoT

Khomlyak, Olha January 2017 (has links)
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "things" in IoT are embedded computing devices it is appropriate to talk about cryptography in embedded of systems. This kind of devices is based on microcontrollers, which have limited resources (processing power, memory, storage, and energy). Therefore, we can apply only lightweight cryptography. The goal of this work is to find the optimal cryptographic solution for IoT devices. It is expected that perception of this solution would be useful for implementation on “limited” devices. In this study, we investigate which lightweight algorithm is better to implement. Also, how we can combine two different algorithms in a hybrid scheme and modify this scheme due to data sending scenario. Compendex, Inspec, IEEE Xplore, ACM Digital Library, and Springer Link databases are used to conduct a comprehensive literature review. Experimental work adopted in this study involves implementations, measurements, and observations from the results. The experimental research covers implementations of different algorithms and experimental hybrid scheme, which includes additional function. Results show the performance of the considered algorithms and proposed hybrid scheme. According to our results, security solutions for IoT have to utilize algorithms, which have good performance. The combination of symmetric and asymmetric algorithms in the hybrid scheme can be a solution, which provides the main security requirements: confidentiality, integrity, and authenticity. Adaptation of this scheme to the possible IoT scenarios shows the results acceptable for implementation due to limited resources of hardware.

Page generated in 0.032 seconds