• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 745
  • 155
  • 140
  • 54
  • 49
  • 27
  • 23
  • 22
  • 13
  • 10
  • 9
  • 7
  • 6
  • 5
  • 5
  • Tagged with
  • 1398
  • 1202
  • 373
  • 290
  • 286
  • 262
  • 248
  • 220
  • 210
  • 164
  • 162
  • 143
  • 141
  • 131
  • 125
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Quantitative Comparison of SensibleThings and Dweet.io

Zhao, Yun January 2016 (has links)
The objective of this paper is to perform a quantitative comparison of Dweet.io and SensibleThings from different aspects. With the fast development of internet of things, the platforms for internet-of-things face bigger challenges. This paper will evaluate both systems in four parts. The first part shows the general comparison of input ways and output functions provided by the platforms. The second part shows the security comparison, which focuses on the protocol types of the packets and the stability during the communication. The third part shows the scalability comparison when the value becomes bigger. The fourth part shows the scalability comparison when speeding up the processes. After the comparisons, I concluded that Dweet.io is more easy to use on devices and supports more programming languages. Dweet.io realizes visualization and it can be shared. Dweet.io is safer and more stable than SensibleThings. SensibleThings provides more openness. SensibleThings has better scalability in handling big values and quick speed.
52

Pervasive service discovery in low-power and lossy networks

Djamaa, B. January 2016 (has links)
Pervasive Service Discovery (SD) in Low-power and Lossy Networks (LLNs) is expected to play a major role in realising the Internet of Things (IoT) vision. Such a vision aims to expand the current Internet to interconnect billions of miniature smart objects that sense and act on our surroundings in a way that will revolutionise the future. The pervasiveness and heterogeneity of such low-power devices requires robust, automatic, interoperable and scalable deployment and operability solutions. At the same time, the limitations of such constrained devices impose strict challenges regarding complexity, energy consumption, time-efficiency and mobility. This research contributes new lightweight solutions to facilitate automatic deployment and operability of LLNs. It mainly tackles the aforementioned challenges through the proposition of novel component-based, automatic and efficient SD solutions that ensure extensibility and adaptability to various LLN environments. Building upon such architecture, a first fully-distributed, hybrid pushpull SD solution dubbed EADP (Extensible Adaptable Discovery Protocol) is proposed based on the well-known Trickle algorithm. Motivated by EADPs’ achievements, new methods to optimise Trickle are introduced. Such methods allow Trickle to encompass a wide range of algorithms and extend its usage to new application domains. One of the new applications is concretized in the TrickleSD protocol aiming to build automatic, reliable, scalable, and time-efficient SD. To optimise the energy efficiency of TrickleSD, two mechanisms improving broadcast communication in LLNs are proposed. Finally, interoperable standards-based SD in the IoT is demonstrated, and methods combining zero-configuration operations with infrastructure-based solutions are proposed. Experimental evaluations of the above contributions reveal that it is possible to achieve automatic, cost-effective, time-efficient, lightweight, and interoperable SD in LLNs. These achievements open novel perspectives for zero-configuration capabilities in the IoT and promise to bring the ‘things’ to all people everywhere.
53

Internet of Things : Uppkopplade sensorer med Raspberry Pi

Bengtsson, Jenny, Nykvist, Filip, Ljung, Alvin January 2017 (has links)
I detta projekt, som gjorts på uppdrag av IoT Sverige, har en produkt skapats åt derasDemorum för att visa hur Internet of Things fungerar och vad man kan använda dettill. Rapporten beskriver hur arbetet har utformats fram till den färdiga produktensom, utifrån deras önskemål, består av en koldioxid- och en rörelsesensor koppladetill en enkortsdator. Med hjälp av kodade skript skickas den insamlade datan till enserver placerad på ett så kallat moln. I grafer på en hemsida kan man därefter se datan illustrativt och det enda man då behöver är en dator med internetuppkoppling.
54

How Internet of Things changes business model of Microsoft OEM team / How IOT changes business model of Microsoft

Hruška, Jan January 2017 (has links)
The main goal of this thesis is to discover how an emerging technological megatrend, the Internet of Things, changes the business model of the Microsoft OEM team. OEM business is fully dependent on sales of Windows licenses; however, the PC market is declining and whole Microsoft is shifting into offering of cloud services while being financed by the OEM revenues. Nevertheless, the strategy of how the OEM team fits into the future of cloud offerings is clearly missing. To discover what changes should be made inside the current business model, 13 interviews with managers across Microsoft were conducted and analyzed. Identified themes were assigned to business model building blocks, ranked by the importance, and supported by relevant quotes from interviews as well as the theoretical background. The most important subjects of changes were identified as partners, activities and value proposition; however, changes will be seen in every aspect of the OEM business. As a result, specific changes in building blocks are described and the first steps towards the Internet of Things strategy suggested. That will ensure the relevance of the conservative OEM team in the connected future.
55

Semantic-based discovery and integration of heterogeneous things in a Smart City environment / Pour une découverte et une intégration efficaces des choses dans une ville intelligente

Petrolo, Riccardo 25 October 2016 (has links)
Une ville intelligente peut être considérée comme un système complexe dans lequel les différents acteurs coopèrent afin d’améliorer la zone urbaine, la rendant plus efficace et plus durable. Pour atteindre cet objectif, les technologies de l’information et de la communication et, en particulier l’Internet des Objets, sont appelées à jouer un rôle clé pour la mise en œuvre des solutions innovantes, des services et des applications. Cependant, en regardant l’état actuel de la ville intelligente, la réalisation d’un tel concept est encore loin d’être atteinte; le scénario réel est en effet caractérisé par un niveau élevé de fragmentation en raison de la pléthore de technologies et de dispositifs présents dans une ville. Afin de combler cette lacune, dans cette thèse, l’évolution de l’Internet des objets vers le Cloud of Things (CoT) est démontrée. Pour démontrer ce concept, le système d’exploitation VITAL est introduit. Dans le CoT, et en général dans le contexte Smart City, l’un des défis les plus importants est la découverte de données-sources appropriées aux besoins des utilisateurs. Cette découverte est une opération qui peut être exécutée directement in-network et / ou out-network. Dans cette thèse, les deux processus sont discutés en introduisant deux solutions différentes. En ce qui concerne la découverte in-network, la conception d’une passerelle pour le Cloud of Things est introduite. Cette passerelle est capable de découvrir et de gérer différents objets sur une base sémantique et, d’autre part, d’agir comme point final pour la présentation des données aux utilisateurs, combinant ainsi tous les aspects de cette thèse. / A Smart City can be seen as a complex system in which different actors cooperate in order to improve, the urban area, making it efficient and sustainable. To achieve this goal, the Information and Communication Technologies, and especially the prominent Internet of Things, are called to play a key role for implementing innovative solutions, services, and applications. However, looking at the current status, the realization of the Smart City is still far from being realized; the real scenario is indeed characterized with a high level of fragmentation due to the plethora of technologies and devices present in a city. In order to bridge this gap, in this thesis, the evolution of the Internet of Things towards the Cloud of Things (CoT) is demonstrated. To demonstrate this concept, the VITAL operating system is introduced. Within the CoT, and in general in the Smart City context, one of the most important challenges is the discovery of appropriate data-sources that satisfy user requirements. The discovery is an operation that can be performed directly in-network and/or out-network. In this thesis, both processes are discussed by introducing two different solutions. Going deeply towards an horizontal unification of different data-sources and the need to have processing capabilities closer to the network, in the last part of the dissertation, the design of a gateway for the Cloud of Things is introduced. This gateway is capable to discover and manage different semantic-like things and, on the other hand, to act as end-point for the presentation of data to users, bridging the contributions of this thesis.
56

Localization and Proximity Detection in the Internet of Things Based on an Augmented UHF RFID System

Rostamian, Majed January 2014 (has links)
In the "Internet of Things" (IoT), the things will be able to sense, communicate, and interact. They will also exchange data, information and knowledge, and locate themselves and other things that surround them. In order to be able to interact, the things need to recognize that they are in proximity of other things. It is anticipated that the most widespread components of the IoT will be passive radio frequency identification (RFID) tags because they are inexpensive and provide automatic identification. However, passive RFID tags are not capable of performing complex operations, such as proximity detection and localization, which will be required in future networks. In this thesis, we describe existing problems with current RFID systems and survey potential solutions for localization and proximity detection. Then we present a new RFID device called "Sense-a-Tag" (ST) that can passively detect and decode backscattered signals from tags in its proximity. There have already been an attempt to use this device for tracking. However, detailed analysis of the performance of the ST especially for proximity detection has not been performed yet. We show that when STs are added to a standard RFID system, the problems of proximity detection and localization with RFID tags can readily be solved. Then we applied ST-based system for identifying people and object interactions. The potential uses of ST as an augmented device for IoT applications are discussed in this thesis. Advantages and limitations of an ST based RFID system have been investigated in details for each application. Results obtained from real experiments illustrate that an ST-based RFID system is feasible for proximity detection applications. In addition, a special software is developed in C\# to process the data and run a localization algorithm based on proximity detection information. The same software has been used for tracking people's activity. Different scenarios have been considered in the experiments. We tried to consider majority of factors that might affect the accuracy in the experiments including: angle and distance between the reader/ST and tags, timing in sending queries, presence of human body, etc. The simulations based on real experiments and results illustrates that an ST-based RFID system can be a realistic solution for proximity detection and localization for Location Positioning systems (LPS) and activity monitoring in future IoT.
57

RESHAPING THE DISCOURSE ON PRIVACY IN THE ERA OF THE INTERNET OF THINGS

Spataru, Adriana January 2017 (has links)
This paper is situated at the border between privacy studies and law and media studies. More precisely, the research aims to find out how the discourse on privacy is reshaped in the context of the upcoming technological changes envisaged in the scenery of the IoT. In a world where potentially all items become connected, the era of the Web 2.0 seems to fade away and leave the floor for a new era where the machines are also empowered as to create human-related content. One of the dimensions of this technological shift is the ubiquity of data and the continuous flow of information it involves. In this new landscape, individual privacy is a construct that necessitates further reflection and content analysis. Where legislation sets up for being the patron of data protection, the European legal rules are undergoing a reform process aiming to adapt the legal framework to the social realities. In light of the above, this paper starts by mapping how privacy was conceptualized by analyzing different theories set up in various media contexts. It follows by sketching the new media context of the IoT and mainly how it functions and where it applies. In order to draw a conclusion on how the new type of communications under the IoT can carve the notion of privacy, this paper will analyze the legal texts that aim to regulate the field of privacy. Legal texts are chosen as empirical material because they are the best barometer of social realities. In addition, in this particular field, the European legal background is subject to a reformation aiming to impose stricter rules that mirror the need for a stronger protection of privacy under the fast technological changes. After the analysis of the empirical material, the research applies the findings on the IoT to the legal background in order to assess whether the legal regime is strong enough to protect personal data. After carrying out this examination, the theories presented at the beginning of the paper are tested under the IoT scenery in order to assess which one is the most appropriate for the new context. The analysis reveals that surveillance theories and especially the panspectric gaze theory are the most applicable in the IoT scenery.
58

Resource management in dense wireless networks

Mosavat-Jahromi, Seyed Hamed 22 December 2020 (has links)
Recently, the wide range of communication applications has greatly increased the number of connected devices, and this trend continues by emerging new technologies such as Internet-of-Things (IoT) and vehicular ad hoc networks (VANETs). The increase in the number of devices may sooner or later cause wireless spectrum shortage. Furthermore, with the limited wireless spectrum, transmission efficiency degrades when the network faces a super-dense situation. In IEEE 802.11ah-based networks whose channel access protocol is basically a contention-based one, the protocol loses its efficiency when the total number of contending users grows. VANETs suffer from the same problem, where broadcasting and receiving safety messages, i.e., beacons, are critical. An inefficient medium access control (MAC) can negatively impact the network's reliability. Effective resource management solutions are needed to improve the network's reliability and scalability considering the features of different types of networks. In this work, we address the resource management problem in dense wireless networks in vehicle-to-everything (V2X) systems and IoT networks. For IoT networks, e.g., sensor networks, in which the network topology is quite stable, the grouping technique is exploited to make the stations (STAs) compete in a group to mitigate the contention and improve the channel access quality. While, in VANETs, devices are mobile and the network topology changes over time. In VANETs, beacons should be broadcast periodically by each vehicle reliably to improve road safety. Therefore, how to share the wireless resources to ensure reliability and scalability for these dense static and mobile wireless networks is still a difficult and open problem. In static IoT networks, we apply the Max-Min fairness criterion to the STAs' throughput to group the STAs to ensure network performance and fairness. Formulation of the problem results in a non-convex integer programming optimization problem which avoids hidden terminals opportunistically. As solving the optimization problem has a high time complexity, the Ant Colony Optimization (ACO) method is applied to the problem to find the sub-optimal solution. To support reliable and efficient broadcasting in VANET, wireless resources are divided into basic resource units in the time and frequency domains, and a distributed and adaptive reservation-based MAC protocol (DARP) is proposed. For decentralized control in VANETs, each vehicle's channel access is coordinated with its neighbors to solve the hidden terminal problem. To ensure the reliability of beacon broadcasting, different kinds of preambles are applied in DARP to support distributed reservation, detect beacon collisions, and resolve the collisions. Once a vehicle reserves a resource unit successfully, it will not release it until a collision occurs due to topology change. Protocol parameters, including transmission power and time slots duration, can be adjusted to reduce collision probability and enhance reliability and scalability. Simulation of urban mobility (SUMO) is used to generated two different city traces to assess the DARP's performance. Then, a distributed network coding-based MAC protocol (NC-MAC) is proposed to support reliable single-hop vehicle-to-vehicle (V2V) beacon broadcasting. We combine the preamble-based feedback mechanism, retransmissions, and network coding together to enhance broadcasting reliability. We deploy the preamble mechanism to facilitate the negative acknowledgment (NACK) and retransmission request procedures. Moreover, linear combinations of missed beacons are generated according to the network coding (NC) principles. We also use SUMO to evaluate the NC-MAC's performance in highway and urban scenarios. Group-casting and applying multi-hop communication can ensure reliability in V2X systems. As an extension of the proposed NC-MAC, a distributed grouping and network coding-assisted MAC protocol (GNC-MAC) is proposed to support reliable group-casting and multi-hop communication, which can address blockchain protocols' requirements. We propose a new grouping protocol by combining preamble-based feedback mechanism, multi-hop communication, and network coding to improve group-casting reliability. The preamble mechanism is responsible for reporting a NACK and requesting retransmission due to beacon missing. The missed beacons are combined according to the NC principles and sent on a resource block. / Graduate
59

DESIGN A SCALABLE AND SECURE NDN-BASED DATA RETRIEVAL FRAMEWORK FOR INTERNET OF THINGS

Yang, Ning 01 May 2020 (has links)
Internet of Things (IoT) has great potential in enabling many beneficial applications (i.e., connected vehicle applications). Named Data Networking (NDN) recently emerges as a promising networking paradigm in supporting IoT due to its data-centric architecture. In this dissertation, we present our research on design a scalable, efficient and secure ndn-based data retrieval framework for Internet of Things. Our work includes three parts:First, we envision an NDN-based Connected Vehicles (CV) application framework with a distributed data service model, as CV is a typical scenario of IoT. The scalability of the framework is greatly challenged by the fast mobility and vast moving area of vehicles. To handle such an issue, we develop a novel hyperbolic hierarchical NDN backbone architecture (H2NDN) by exploiting the location dependency of CV applications. H2NDN designs the backbone routers topology and the data/interest namespace by following the hierarchical architecture of geographic locations. The efficient data searching only requires static forwarding information base (FIB) configuration over NDN routers. To avoid overloading high-level routers, H2NDN integrates hyperbolic routing through carefully designed hyperbolic planes.Second, a distributed adaptive caching strategy is proposed to improve the efficiency of data caches on NDN routers. NDN provides native support to cache data at routers for future Interest packets. As we model the caching problem, the goal of cache allocation is to maximize the savings of Interest/Data forwarding hops under the limited cache space on each router. We discuss the impracticality of global optimization and provide the local caching method. Extensive ndnSIM based simulation with real traffic data proves the efficiency and scalability of the proposed H2NDN architecture.Finally, although NDN provides some security advantages such as secures data directly and uses name semantics to enable applications to reason about security, employing NDN to support IoT applications nevertheless presents some new challenges about security. In this dissertation, we focus on two resultant attacks that are not effectively handled in current studies, namely the targeted blackhole attack and the targeted content poisoning attack. We propose a lightweight and efficient approach named SmartDetour to tackle the two attacks. To ensure high scalability and collusion-resilience, SmartDetour lets each router respond to attacks (i.e., packet drops or corrupted data) independently in order to isolate attackers. The core solution contains a reputation-based probabilistic forwarding strategy and a proactive attacker detection algorithm. Extensive ndnSIM based simulation demonstrates the efficiency and accuracy of the proposed SmartDetour.
60

Realizace monitorovacího systému pokojových rostlin v prostředí IoT / Implementation of monitoring system of house plants in IoT environment

Mach, Sebastián January 2020 (has links)
This master's thesis is about the design and development of a flower pot sensor, which monitors data related to the cultivation of houseplants. The sensor sends the data to the cloud, where the analysis is performed and the evaluated living conditions of the monitored plant are displayed to the user.

Page generated in 0.0586 seconds