• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 752
  • 158
  • 140
  • 54
  • 49
  • 27
  • 23
  • 22
  • 13
  • 10
  • 9
  • 7
  • 6
  • 5
  • 5
  • Tagged with
  • 1411
  • 1214
  • 377
  • 291
  • 289
  • 265
  • 251
  • 224
  • 212
  • 166
  • 164
  • 144
  • 143
  • 131
  • 126
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

Design of asset tracking device with GPRS Interface

Maharaj, Robin January 2019 (has links)
Thesis (Master of Engineering in Electrical Engineering)--Cape Peninsula University of Technology, 2018. / IOT devices have the potential to improve asset lifecycle optimization because of their ability to provide relevant real time data to high level applications. This data with minimal latency can assist asset managers to control the behaviour of assets and asset users to optimize asset lifecycle cost. There are many environments that require asset tracking devices but this design focussed on motor vehicles with auxiliary functions and apparatus. This research work documented the design of an asset tracking device built and tested on a 32.bit microcontroller platform with built-in CAN peripheral. This design resolved handling multiple serial interfaces collating data simultaneously concatenating this data and transmitting the data via GPRS interface as a single UDP sentence. Apart from interfacing various serial interfaces to the Stm24f4 this design also implemented a Wireless module as well as a multichannel ADC Module. This design was accomplished by researching and implementing software techniques as well as researching the hardware/firmware in terms of DMA and Nested Vector Interrupt Controller of the STM32 devices. The solution that this design will accomplish is to provide the industry an asset-tracking device with data capturing functionality capable of delivering the above needs at reasonable data cost. The device designed in this thesis is the client device of asset tracking network. This design was accomplished on a proof of concept basis delivering built hardware in the form of various application modules interfaced to a 32 –bit microcontroller via uart, SPI and CAN.
332

Microservices-based approach for Healthcare Cybersecurity

Unknown Date (has links)
Healthcare organizations, realizing the potential of the Internet of Things (IoT) technology, are rapidly adopting the technology to bring signi cant improvements in the quality and e ectiveness of the service. However, these smart and interconnected devices can act as a potential \back door" into a hospital's IT network, giving attack- ers access to sensitive information. As a result, cyber-attacks on medical IoT devices have been increasing since the last few years. It is a growing concern for all the stakeholders involved, as the impact of such attacks is not just monetary or privacy loss, but the lives of many patients are also at risk. Considering the various kinds of IoT devices one may nd connected to a hospital's network, traditional host-centric security solutions (e.g. antivirus, software patches) are at odds with realistic IoT infrastructure (e.g. constrained hardware, lack of proper built-in security measures). There is a need for security solutions which consider the challenges of IoT devices like heterogeneity of technology and protocols used, limited resources in terms of battery and computation power, etc. Accordingly, the goals of this thesis have been: (1) to provide an in-depth understanding of vulnerabilities of medical IoT devices; (2) to in- troduce a novel approach which uses a microservices-based framework as an adaptive and agile security solution to address the issue. The thesis focuses on OS Fingerprint- ing attacks because of its signi cance for attackers to understand a target's network. In this thesis, we developed three microservices, each one designed to serve a speci c functionality. Each of these microservices has a small footprint with RAM usage of approximately 50 MB. We also suggest how microservices can be used in a real-life scenario as a software-based security solution to secure a hospital's network consisting of di erent IoT devices. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2018. / FAU Electronic Theses and Dissertations Collection
333

Fog e edge computing : uma arquitetura h?brida em um ambiente de internet das coisas

Schenfeld, Matheus Crespi 23 March 2017 (has links)
Submitted by Caroline Xavier (caroline.xavier@pucrs.br) on 2017-11-14T10:44:09Z No. of bitstreams: 1 DIS_MATHEUS_CRESPI_SCHENFELD_COMPLETO.pdf: 6989470 bytes, checksum: 4a16f12e8953d43da2cb18cc63c6119a (MD5) / Approved for entry into archive by Caroline Xavier (caroline.xavier@pucrs.br) on 2017-11-14T10:44:28Z (GMT) No. of bitstreams: 1 DIS_MATHEUS_CRESPI_SCHENFELD_COMPLETO.pdf: 6989470 bytes, checksum: 4a16f12e8953d43da2cb18cc63c6119a (MD5) / Made available in DSpace on 2017-11-14T10:44:39Z (GMT). No. of bitstreams: 1 DIS_MATHEUS_CRESPI_SCHENFELD_COMPLETO.pdf: 6989470 bytes, checksum: 4a16f12e8953d43da2cb18cc63c6119a (MD5) Previous issue date: 2017-03-23 / Internet of Things (IoT) is considered a computational evolution that advocates the existence of a large number of physical objects embedded with sensors and actuators, connected by wireless networks and communicating through the Internet. From the beginning of the concept to the present day, IoT is widely used in the various sectors of industry and also in academia. One of the needs encountered in these areas was to be connected to IoT devices or subsystems throughout the world. Thus, cloud computing gains space in these scenarios where there is a need to be connected and communicating with a middleware to perform the data processing of the devices. The concept of cloud computing refers to the use of memory, storage and processing of shared resources, interconnected by the Internet. However, IoT applications sensitive to communication latency, such as medical emergency applications, military applications, critical security applications, among others, are not feasible with the use of cloud computing, since for the execution of all calculations and actions messaging between devices and the cloud is required. Solving this limitation found in the use of cloud computing, the concept of fog computing arises and whose main idea is to create a federated processing layer, still in the local network of the computing devices of the ends of the network. In addition to fog computing, there is also edge computing operating directly on the devices layer, performing some kind of processing, even with little computational complexity, in order to further decrease the volume of communication, besides collaborating to provide autonomy in decision making yet in the Things layer. A major challenge for both fog and edge computing within the IoT scenario is the definition of a system architecture that can be used in different application domains, such as health, smart cities and others. This work presents a system architecture for IoT devices capable of enabling data processing in the devices themselves or the closest to them, creating the edge computing layer and fog computing layer that can be applied in different domains, improving Quality of Services (QoS) and autonomy in decision making, even if the devices are temporarily disconnected from the network (offline). The validation of this architecture was done within two application scenarios, one of public lighting in smart city environment and another simulating an intelligent agricultural greenhouse. The main objectives of the tests were to verify if the use of the concepts of edge and fog computing improve system efficiency compared to traditional IoT architectures. The tests revealed satisfactory results, improving connection times, processing and delivery of information to applications, reducing the volume of communication between devices and core middleware, and improving communications security. It also presents a review of related work in both academia and industry. / Internet das Coisas (IoT) ? considerada uma evolu??o computacional que preconiza a exist?ncia de uma grande quantidade de objetos f?sicos embarcados com sensores e atuadores, conectados por redes sem fio e que se comunicam atrav?s da Internet. Desde o surgimento do conceito at? os dias atuais, a IoT ? amplamente utilizada nos diversos setores da ind?stria e tamb?m no meio acad?mico. Uma das necessidades encontradas nessas ?reas foi a de estar conectado com dispositivos ou subsistemas de IoT espalhados por todo o mundo. Assim, cloud computing ganha espa?o nesses cen?rios, onde existe a necessidade de estar conectado e se comunicando com um middleware para realizar o processamento dos dados dos dispositivos. O conceito de cloud computing refere-se ao uso de mem?ria, armazenamento e processamento de recursos compartilhados, interligados pela Internet. No entanto, aplica??es IoT sens?veis ? lat?ncia de comunica??o, tais como, aplica??es m?dico-emergenciais, aplica??es militares, aplica??es de seguran?a cr?tica, entre outras, s?o invi?veis com o uso de cloud computing, visto que para a execu??o de todos os c?lculos e a??es ? necess?ria a troca de mensagens entre dispositivos e nuvem. Solucionando essa limita??o encontrada na utiliza??o de cloud computing, surge o conceito de fog computing, cuja ideia principal ? criar uma camada federada de processamento ainda na rede local dos dispositivos de computa??o das extremidades da rede. Al?m de fog computing tamb?m surge edge computing operando diretamente na camada dos dispositivos, realizando algum tipo de processamento, mesmo que de pouca complexidade computacional, a fim de diminuir ainda mais o volume de comunica??o, al?m de colaborar para prover autonomia na tomada de decis?es ainda na camada das coisas. Um grande desafio tanto para fog quanto para edge computing dentro do cen?rio de IoT ? a defini??o de uma arquitetura de sistema que possa ser usada em diferentes dom?nios de aplica??o, como sa?de, cidades inteligentes entre outros. Esse trabalho apresenta uma arquitetura de sistema para dispositivos IoT capaz de habilitar o processamento de dados nos pr?prios dispositivos ou o mais pr?ximo deles, criando a camada de edge e fog computing que podem ser aplicadas em diferentes dom?nios, melhorando a Qualidade dos Servi?os (QoS) e autonomia na tomada de decis?o, mesmo se os dispositivos estiverem temporariamente desconectados da rede (offline). A valida??o dessa arquitetura foi feita dentro de dois cen?rios de aplica??o, um de ilumina??o p?blica em ambiente de IoT e outro simulando uma estufa agr?cola inteligente. Os principais objetivos das execu??es dos testes foram verificar se a utiliza??o dos conceitos de edge e fog computing melhoram a efici?ncia do sistema em compara??o com arquiteturas tradicionais de IoT. Os testes revelaram resultados satisfat?rios, melhorando os tempos de conex?o, processamento e entrega das informa??es ?s aplica??es, redu??o do volume de comunica??o entre dispositivos e core middleware, al?m de melhorar a seguran?a nas comunica??es. Tamb?m ? apresentada uma revis?o de trabalhos relacionados tanto no meio acad?mico como no da ind?stria.
334

Minha jornada na oxiot: como desenvolvemos uma startup de hardware em saúde no Brasil do hackathon ao primeiro cliente / My journey at oxiot: how we developed a hardware startup in healthcare in Brazil from the hackathon to the first client

Costa Filho, Edson Renel da 01 November 2017 (has links)
Este trabalho baseia-se na minha experiência como um dos fundadores da Oxiot, startup que monitora consumo de oxigênio medicinal por paciente via Internet das Coisas. O problema de pesquisa é \"Como desenvolvemos uma startup de hardware em saúde no Brasil do hackathon ao primeiro cliente\", que se desdobra em três perguntas sobre a literatura de startups de hardware, a trajetória da Oxiot e suas contribuições. Este estudo é de natureza longitudinal e compreende de setembro de 2015 a agosto de 2017. O método utilizado foi o de Pesquisa-Ação, estruturado em 4 Ciclos, compostos por \"Planejar\", \"Agir & Observar\" e \"Refletir\". Os procedimentos de pesquisase baseiam em ProcessStudies. Os dados soft e hard coletadossão dispostos em Narrativa Estratégia e Visual Mapping, e analisados quantitativa e qualitativamente. Buscou-se neutralizar a tendência de parcialidade do pesquisador pela ponderação comterceiros. Foi realizada pesquisa bibliográfica na Web of Science, Google Acadêmico e Google. Foram triadas 247 obras, das quais, 8 selecionadas, às quais duas adicionadas por indicação ao autor. Das 10 totais analisadas, 3 classificam-se como Modelos de desenvolvimento de startup; 4, como Modelos de desenvolvimento de Modelos de Negócio; e 3, como Modelos de Referências para startups de hardware. Concluiu-se não haver um Modelo específico parastartup dehardware, apesar de haver conceitos aplicáveisna literatura geral. A formatação do produto e do Modelo de negócios foi estimulada por 36 eventos, majoritariamente relacionados aos subcomponentes Sistema de Gestão e de Inovação Aberta. O comparativo entre a experiência da Oxiote 5 literaturas resultou em 66 pontos; sendo 30 confirmações e 36 contribuições; sumarizados no Manifesto Oxiot, que declara as lições aprendidas em Sistema de Gestão e em cinco Estratégias Funcionais. Adicionalmente, foram elencadas 7 contribuições à prática, como ferramentas de gestão etécnicas de investimento, incluindo Modalidades de Investimento Corporação-Startups; edesenvolvidos dois cases, um sobre a atuação da GE Ventures, e outro, como caso de ensino, sobre valuatione investimento emstartupsearlystage. Conclui-se que este trabalho cumpriu seu propósitoe trouxe resultados além do escopo inicial, contribuindo à prática, teoria e ensino de empreendedorismo. Sugere-se que as \"estratégias funcionais\" possam ser o elemento conciliador faltante entre Modelos de desenvolvimento de startups, práticas em hardware e estratégia; e estas podem embasar umaliteratura específica para hardware. Hipótese que fica como sugestão de pesquisa futura. / This work is based in my experience as one of the founders of Oxiot, startup that monitors medical oxygen consumption per patient trough Internet of Things. The research problem is \"how we developed a hardware startup in Brazil since the Hackathon to the first client\", which unfolds in three questions about the hardware startups literature, Oxiot journey and its contributions. This is a longitudinal study conduct from September 2015 to August 2017. The method employed is Action Research, structured in four cycles, composed by \"Plan\", \"Act & Observe\" and \"Reflect\". The research procedures are based on Process Studies. The hard and soft data collected is displayed using Strategy Narrative and Visual Mapping, and then analyzed quantitatively and qualitatively. It was sought to neutralize the tendency of the researcher\'s partiality by weighting with third parties. A bibliographic search was conducted in the Web of Science, Google Scholar and Google. 247 works were screened, of which 8 were selected, to which two were added by indication to the author. Of the total 10 analyzed, 3 were classified as Startup Development Models; 4, such as Business Model Development Models; and 3, as Reference Models for Hardware Startups. It was concluded that there is no specific model for hardware startup, although there are applicable concepts from the general literature. The product and the business model formation were stimulated by 36 events, mostly related to the Management System and Open Innovation Subcomponents of the Business Model. The comparison between the Oxiot experience and 5 literatures resulted in 66 notes; being 30 confirmations and 36 contributions; which were summarized in the Oxiot Manifesto, which states the lessons learned in Management System and in five Functional Strategies. In addition, 7 contributions to the practice were listed, such as management tools and investment techniques, including Corporation-Startups Investment Models; and two cases were developed, one about GE Ventures actuation, and another, as a study case, about valuation and investment in early stage startups based on real events. It is concluded that this work fulfilled its purpose and brought results beyond the initial scope, contributing to the practice, theory and teaching of entrepreneurship. It is suggested that \"functional strategies\" could be the conciliatory element missing between startup development models, hardware practices and strategic management; and they could be the base for a specific hardware startup literature. Hypotheses that stands as a suggestion of future research.
335

Välfärdsteknik för människor med kognitiva funktionsnedsättningar : I ljuset av skyddet för den personliga integriteten / Using welfare technology on people with mental impairments : In the light of the protection of personal integrity

Stenberg, Amalia January 2018 (has links)
No description available.
336

Cyber Physical System for Continuous Evaluation of Fall Risks to Enable Aging-In-Place

Jagtap, Vinayak 29 April 2015 (has links)
Every year, one out of three adults over the age of 65 falls, and about 30% of the falls result in moderate to severe injuries. The high rate of fall-related hospitalizations and the fact that falls are a major source of morbidity and mortality in older adults have motivated extensive interdisciplinary clinical and engineering research with a focus on fall prevention. This research is aimed at developing a medical Cyber Physical System (CPS) composed of a human supervised mobile robot and ambient intelligence sensors to provide continuous evaluation of environmental risks in the home. As a preventive measure to avoid falls, we propose use of mobile robots to detect possible fall risks inside a house. As a step-up to that, we also define a control framework for intelligent, networked mobile robots to semi-autonomously perform assistive and preventive tasks. This framework is integrated in a smart home that provides monitoring and control capabilities of environmental conditions such as objects blocking pathways or uneven surfaces. The main outcome of this work is the realization of this system at Worcester Polytechnic Institute's (WPI) @Home testbed.
337

Evaluation of decentralized email architecture and social network analysis based on email attachment sharing

Tsipenyuk, Gregory January 2018 (has links)
Present day email is provided by centralized services running in the cloud. The services transparently connect users behind middleboxes and provide backup, redundancy, and high availability at the expense of user privacy. In present day mobile environments, users can access and modify email from multiple devices with updates reconciled on the central server. Prioritizing updates is difficult and may be undesirable. Moreover, legacy email protocols do not provide optimal email synchronization and access. Recent phenomena of the Internet of Things (IoT) will see the number of interconnected devices grow to 27 billion by 2021. In the first part of my dissertation I am proposing a decentralized email architecture which takes advantage of user's a IoT devices to maintain a complete email history. This addresses the email reconciliation issue and places data under user control. I replace legacy email protocols with a synchronization protocol to achieve eventual consistency of email and optimize bandwidth and energy usage. The architecture is evaluated on a Raspberry Pi computer. There is an extensive body of research on Social Network Analysis (SNA) based on email archives. Typically, the analyzed network reflects either communication between users or a relationship between the email and the information found in the email's header and the body. This approach discards either all or some email attachments that cannot be converted to text; for instance, images. Yet attachments may use up to 90% of an email archive size. In the second part of my dissertation I suggest extracting the network from email attachments shared between users. I hypothesize that the network extracted from shared email attachments might provide more insight into the social structure of the email archive. I evaluate communication and shared email attachments networks by analyzing common centrality measures and classication and clustering algorithms. I further demonstrate how the analysis of the shared attachments network can be used to optimize the proposed decentralized email architecture.
338

PSElastic : um modelo de elasticidade multinível para Brokers Publish/Subscribe

Wendt, Ivam Guilherme 23 February 2017 (has links)
Submitted by JOSIANE SANTOS DE OLIVEIRA (josianeso) on 2017-05-24T16:53:14Z No. of bitstreams: 1 Ivam Guilherme Wendt_.pdf: 2573131 bytes, checksum: 364b08dccce8d5d89f93cdf8605772d8 (MD5) / Made available in DSpace on 2017-05-24T16:53:14Z (GMT). No. of bitstreams: 1 Ivam Guilherme Wendt_.pdf: 2573131 bytes, checksum: 364b08dccce8d5d89f93cdf8605772d8 (MD5) Previous issue date: 2017-02-23 / CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / A Internet das Coisas (IoT - Internet of Things) é considerada a próxima grande evolução na era da computação após a Internet. Na Internet das Coisas muitos objetos que nos rodeiam serão conectados em redes e se comunicarão entre sí sem auxílio ou intervenção humana. Implementações de grande escala têm potencial para criar um enorme tráfego agregado. Muitas vezes Brokers ou Intermediários, são utilizados para possibilitar esta comunicação machine-to-machine (M2M), utilizando o modelo de comunicação Publish/- Subscribe que possui diversas bibliotecas particulares para uso na Internet das Coisas. Alguns trabalhos desenvolvidos pela comunidade visam tratar o desempenho no ambiente de Brokers Publish/Subscribe, no entanto impõem modificações e restrições quanto aos Brokers e arquitetura utilizada. Neste cenário, visando atender a necessidade de escalabilidade citada, é proposto um modelo de elasticidade chamado PSElastic. PSElastic fornece um modelo de elasticidade multinível para Brokers Publish/Subscribe, fazendo uso da elasticidade provida pela Computação em Nuvem, sem afetar o desempenho do sistema e sem a necessidade de investimentos ou ajustes por parte dos clientes e aplicações que fazem uso deste modelo. O modelo oferece a elasticidade de forma automática, reativa e multinível, onde multinível refere-se aos níveis de Broker e de Orquestrador do modelo. Buscando avaliar o modelo PSElastic foram definidos três cenários diferentes para a execução dos testes: Cenário 1, sem elasticidade; Cenário 2, elasticidade na camada de Brokers e Cenário 3, elasticidade multinível. Diferentes limites de réplicas de máquinas virtuais foram utilizados, assim como combinações de thresholds para avaliar o Tempo de Execução, quantidade de Mensagens por Segundo tratadas e a Eficiência na utilização dos recursos computacionais. PSElastic apresentou excelentes resultados ao reduzir em até 81,2% o tempo necessário para o tratamento de uma carga de dados e aumentar o throughput do ambiente com Broker Mosquitto de 54,95 mensagens por segundo (Mps) para 235,29 Mps e de 38,02 Mps para 202,02 Mps no ambiente com Broker RabbitMQ. / The Internet of Things (IoT) is considered the next big evolution in the computing era after the Internet. In Internet of Things many objects around us will be connected in networks and will communicate among themselves without assistance or human intervention. Large scale implementations has potential to create a huge aggregate traffic. Often brokers or intermediaries, are used to enable this machine-to-machine (M2M) communication using the Publish/Subscribe communication model that has several private libraries for use in Internet of Things. Some works developed by the community aim to treat performance in Publish/Subscribe brokers environment, however impose modifications and restrictions regarding brokers and architecture used. In this scenario, aiming to fulfill the need for cited scalability, we propose a elasticity model called PSElastic. The model provides an model with multilevel elasticity for Publish/Subscribe Brokers, making use of the elasticity promoted by cloud computing, not affecting system performance and without the need for investments or adjustments by customers and applications that make use of this model. PSElastic offers elasticity in the following manners: automatic, reactive and uses the multilevel elasticity, where multilevel refers to Broker level and Orchestrator model. In order to evaluate the model PSElastic, three different scenarios for execution of tests were defined: Scenario 1, without elasticity; Scenario 2, elasticity in the layer of Broker and Scenario 3, multilevel elasticity. Different limits of replica of virtual machines were used, as well as thresholds to evaluate Execution Time, number of Messages per Second handled and Efficiency in the use of computational resources. PSElastic showed excellent results by reducing the time needed to handle a data load by up to 81.2% and increase the throughput of the environment with Mosquitto Broker from 54.95 messages per second (Mps) to 235.29 Mps and from 38.02 Mps to 202.02 Mps in the environment with RabbitMQ Broker.
339

Energy efficient channel access mechanism for IEEE 802.11ah based networks

Wang, Yanru January 2018 (has links)
IEEE 802.11ah is designed to support battery powered devices that are required to serve for several years in the Internet of Things networks. The Restricted Access Window (RAW) has been introduced in IEEE 802.11ah to address the scalability of thousands of densely deployed devices. As the RAW sizes entail the consumed energy to support the transmitting devices in the network, hence the control mechanism for RAW should be carefully devised for improving the overall energy e ciency of IEEE 802.11ah. This thesis presents a two-stage adaptive RAW scheme for IEEE 802.11ah to optimise the energy efficiency of massive channel access and transmission in the uplink communications for highly dense networks. The proposed scheme adaptively controls the RAW sizes and device transmission access by taking into account the number of devices per RAW, retransmission mechanism, harvested-energy and prioritised access. The scheme has four completely novel control blocks: RAW size control that adaptively adjusts the RAW sizes according to different number of devices and application types in the networks. RAW retransmission control that improves the channel utilisation by retransmitting the collided packets at the subsequent slot in the same RAW. Harvested-energy powered access control that adjusts the RAW sizes with the consideration of the uncertain amount of harvested-energy in each device and channel conditions. Priority-aware channel access control that reduces the collisions of high-priority packets in the time-critical networks. The performance of the proposed controls is evaluated in Matlab under different net work scenarios. Simulation results show that the proposed controls improve the network performances in terms of energy efficiency, packet delivery ratio and delay as compared to the existing window control.
340

Antenna design with characteristic mode analysis for Internet of Things applications

Zhang, Qianyun January 2018 (has links)
The TV white space (TVWS) is one of the promising technologies to provide wide coverage, energy effcient and cost effective Internet of Things (IoT) services. However, its low operating frequency and wide bandwidth poses significant challenges to antenna designs. In this thesis, three antennas are developed using the characteristic mode analysis (CMA) for IoT devices operating over the TVWS. First, a very-low profile circular small antenna is transformed from a vertical monopole antenna. The CMA is used to determine the mode to be excited and to design a specific feeding structure. After being printed on Rogers 5880 substrate, the final antenna structure operates at 474 MHz with a V SWR < 2 bandwidth of 2.2 MHz. Its lateral radius is just 5.2% of the wavelength of its resonant frequency. Second, a compact U-shaped printed UWB monopole antenna is proposed to operate over the entire UHF TV spectrum. This antenna measures 0:36 0 0:06 0 0:01 0 where 0 is the wavelength of its lowest operating frequency. Its V SWR < 2 bandwidth is 87.5%, and the UWB behaviour is discussed by the CMA. Third, a novel antenna design method is established on annular ring-shaped structures with modal characteristics revealed by the CMA. Following the proposed method, another UWB antenna is achieved by creating and exciting multiple modes with resonant frequencies distributed across the UHF TV spectrum. All antenna designs are verified thorough simulations and measurements. Furthermore, antennas are also integrated into IoT devices and their system performance is measured under different communication scenarios. The system measurements also verify the good propagation property and the abundant spectrum resource of the TVWS.

Page generated in 0.3985 seconds