• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 2
  • 2
  • Tagged with
  • 10
  • 10
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A Distributed Range Query Framework for Internet of Things

Zhang, Congcong January 2014 (has links)
With the rapid development of information technology, applications referring to the Internet of things are booming. Applications that gather information from sensors and affect the context environment with actuators can provide customized and intelligent behaviour to users. These applications have become widely used nowadays in daily life and have initiated the multi-dimensional range query demand referring to the Internet of things. As the data information is fully distributed and the devices like sensors, mobile phones, etc., has limited resources and finite energy, supporting efficient range query is a tough challenge. In this paper, we have proposed a distributed range query framework for Internet of things. In order to save energy costs and reduce the network traffic, we suggest a reporting data range mechanism in the sensing peers, which choose to report a data range and report again only when the peer senses an abnormal data instead of the common moving data method. In addition, we selected some strong peers to be used as the super peers to create a data index by collecting the reporting data range, which will be used for performing range queries. The study has shown that our proposal framework could reduce resource costs in the less strong peers like sensors and mobile phones, and reduce network traffic among all the peers within the network, as well as support a range query function. According the evaluation results, the reporting data range method could greatly reduce the data migration times and save energy costs, and the data index could significantly reduce accessing unnecessary peers and diminish the network traffic.
2

Cascading permissions policy model for token-based access control in the web of things

Amir, Mohammad, Pillai, Prashant, Hu, Yim Fun January 2014 (has links)
No / The merger of the Internet of Things (IoT) with cloud computing has given birth to a Web of Things (WoT) which hosts heterogeneous and rapidly varying data. Traditional access control mechanisms such as Role-Based Access schemes are no longer suitable for modelling access control on such a large and dynamic scale as the actors may also change all the time. For such a dynamic mix of applications, data and actors, a more distributed and flexible model is required. Token-Based Access Control is one such scheme which can easily model and comfortably handle interactions with big data in the cloud and enable provisioning of access to fine levels of granularity. However, simple token access models quickly become hard to manage in the face of a rapidly growing repository. This paper proposes a novel token access model based on a cascading permissions policy model which can easily control interactivity with big data without becoming a menace to manage and administer.
3

Aggregated sensor payload submission model for token-based access control in the Web of Things

Amir, Mohammad, Pillai, Prashant, Hu, Yim Fun 26 October 2015 (has links)
Yes / Web of Things (WoT) can be considered as a merger of newly emerging paradigms of Internet of Things (IoT) and cloud computing. Rapidly varying, highly volatile and heterogeneous data traffic is a characteristic of the WoT. Hence, the capture, processing, storage and exchange of huge volumes of data is a key requirement in this environment. The crucial resources in the WoT are the sensing devices and the sensing data. Consequently, access control mechanisms employed in this highly dynamic and demanding environment need to be enhanced so as to reduce the end-to-end latency for capturing and exchanging data pertaining to these underlying resources. While there are many previous studies comparing the advantages and disadvantages of access control mechanisms at the algorithm level, vary few of these provide any detailed comparison the performance of these access control mechanisms when used for different data handling procedures in the context of data capture, processing and storage. This study builds on previous work on token-based access control mechanisms and presents a comparison of two different approaches used for handling sensing devices and data in the WoT. It is shown that the aggregated data submission approach is around 700% more efficient than the serial payload submission procedure in reducing the round-trip response time.
4

En studie kring hur dator/Internet används som verktyg i gymnasieskolans yrkesutbildning / A STUDY AROUND HOW COMPUTOR / INTERNET IS USED AS A TOOL IN UPPER SECONDARY VOCATIONAL EDUCATION

Tran, Lien, Gustafsson, Niklas January 2010 (has links)
Syftet med detta examensarbete är att undersöka hur dator/Internet enligt fyra lärare kan fungera som ett pedagogiskt verktyg i undervisningen gällande gymnasieskolans yrkesämnen. Tidigare forskning visar att datoranvändning fyller en viktig funktion i kunskap och lärande och att dator/Internet som verktyg i undervisning är ett sätt att förbereda elever inför deras framtida yrke. Dator/Internet ersätter inte den traditionella hantverksundervisningen med att praktiskt överföra handlaget. Däremot kan dator/Internet vara nödvändigt i vissa moment i undervisning för att uppnå den moderna tidens krav. Nyckelord: Data/Internet, IKT, IKT som verktyg i undervisning, IKT utveckling, datakunskap / The purpose with this thesis is to explore how computor / internet, according to four teachers, can function as an educational tool in the teaching at Upper Secondary Vocational Training. Earlier research has shown that the use of computor fills an important function in aquiring knowledge and learning and that computor / internet as a tool in teaching is a way to prepare the students for their future vocation. Computor / internet does not substitute the traditional teaching of the handicrafts and the practical transmition of the skill. However, the computor / internet can be necessary at certain stages in the teaching in order to reach the contemporary demands.
5

En studie kring hur dator/Internet används som verktyg i gymnasieskolans yrkesutbildning / A STUDY AROUND HOW COMPUTOR / INTERNET IS USED AS A TOOL IN UPPER SECONDARY VOCATIONAL EDUCATION

Tran, Lien, Gustafsson, Niklas January 2010 (has links)
<p>Syftet med detta examensarbete är att undersöka hur dator/Internet enligt fyra lärare kan fungera som ett pedagogiskt verktyg i undervisningen gällande gymnasieskolans yrkesämnen.</p><p>Tidigare forskning visar att datoranvändning fyller en viktig funktion i kunskap och lärande och att dator/Internet som verktyg i undervisning är ett sätt att förbereda elever inför deras framtida yrke.</p><p>Dator/Internet ersätter inte den traditionella hantverksundervisningen med att praktiskt överföra handlaget. Däremot kan dator/Internet vara nödvändigt i vissa moment i undervisning för att uppnå den moderna tidens krav.</p><p>Nyckelord: Data/Internet, IKT, IKT som verktyg i undervisning, IKT utveckling, datakunskap</p> / <p>The purpose with this thesis is to explore how computor / internet, according to four teachers, can function as an educational tool in the teaching at Upper Secondary Vocational Training. Earlier research has shown that the use of computor fills an important function in aquiring knowledge and learning and that computor / internet as a tool in teaching is a way to prepare the students for their future vocation. Computor / internet does not substitute the traditional teaching of the handicrafts and the practical transmition of the skill. However, the computor / internet can be necessary at certain stages in the teaching in order to reach the contemporary demands. </p>
6

Ochrana osobních údajů na internetu podle práva Evropské unie / The protection of personal data on the Internet under European Union law

Krejčířová, Edita January 2013 (has links)
The purpose of my thesis is to analyse a development of technologies in comparison with the protection of personal data on the internet under law of the EU. However, it would not be possible to describe every single technology and its reflection in law of the EU. Therefore, the thesis is mainly focused on two most significant internet technologies - cookies and cloud computing. The key for selection of the most important representative technologies was especially a frequency of their use. The thesis is composed of two main chapters, each of them dealing with different aspects of the development of technologies in comparison with protection of personal data on the internet under law of the EU. Chapter One is introductory and defines basic terminology used in the thesis under applicable law of the EU. The chapter is subdivided into two parts. Part One describes personal data and its role in applicable law of the EU. Part Two deals with the specific technologies - cookies and cloud computing. This part particularly points out risks of these technologies and provides possible solutions. Chapter Two analyzes the upcoming reform of data protection in EU. The chapter is mainly focused on proposal for General Data Protection Regulation, which could dramatically change the protection of personal data on the...
7

Vybrané aspekty ochrany osobnosti se zaměřením na nová média / Selected aspects of protection of personality focused on new media

Holubová, Tereza January 2018 (has links)
This diploma thesis deals with selected aspects of personality rights protection with focus on new media. It provides analysis of national and EU regulation and presents Czech and European case law on the topic. Deficiencies in laws governing this area and in practices used for protection of personality rights are highlighted as well. The first chapter focuses on the internet law, related phenomena and on the definition of the concept of new media. The following chapter introduces the notion of personality protection as embodied in the constitutional and civil law. Attention is focused on the human rights and on the different personality rights, such as right to protection of the name and appearance, right to dignity, honour and respect and right to privacy. Fake profiles on social media and automatic face recognition techniques are mentioned in this context. Chapter three provides a brief introduction to the data protection and targeted advertising. The following section deals with limitations of personality rights, particularly with conflicts between human rights, with legal licenses, permissions and with typical unlawful interference with personality rights, which can be encountered on the internet. The issue of defamation, hate speech and street view services is discussed in detail....
8

Projevy zneužití dominance v oblasti internetových platforem / Forms of abuse of Dominance in the Area of the Internet Platform

Čížek, Ondřej January 2017 (has links)
Forms of abuse of dominance in the area of the Internet platforms The thesis is dedicated to the topic of abuse of dominant position in the area of the Internet platforms. Its aim is, firstly, to outline the challenges arising from the specific nature of the area, which might, from the competition-authorities' point of view, complicate the enforcement of competition law in the case of abuse of dominance. Secondly, the thesis tries to find the answer on the question to what extent these problems have been reflected in the existing decision-making practice. The structure of the thesis is divided into four main parts. The first part is an introduction. The second part provides an essential introduction to the area in question. It defines the term "Internet platform", provides an overview of the most important types of the Internet platforms and describes the specifics of the area in question, whose description is essential for the following parts. The third part analyses the problems that competition law may face in the context of possible abuse of dominance within the meaning of Art. 102 TFEU in the area of the Internet platforms. This section is divided according to three basic steps of a competition analysis of abuse of dominance, i.e. definition of the relevant market, the determination of market...
9

Výměna informací pro internetový prodej v oblasti cestovního ruchu / Exchange of Information for Internet Sales of Tourism

Macháček, Pavel January 2013 (has links)
This master´s thesis describes creation of model and methodic for functional diagram of electronic data transfer for exchange of information for internet sales of tourism. One part of this master´s thesis analyses current situation and defines its problems. This analyses leads into suggestion how to create model for functional electronic data transfer diagram in tourism.
10

Chování dětí mladšího školního věku na internetu (sociálních sítích) a jejich motivace ke sdělování osobních údajů v tomto prostředí / Behavior of children in younger school age on the Internet (social networks) and their motivation for sharing personal data in this enviroment

Zadražilová, Tereza January 2013 (has links)
This master thesis aims mainly on behaviour of primary-school children in the environment of the internet and on motivation which can lead to dangerous behaviour such as providing personal data. The theoretical part defines basic terms. Firstly, it focuses on psychological profile of primary-school children and on their experience with new technologies, then it describes major types of danger as results of hazardous behaviour of children on the internet focusing on cyberbullying and cybergrooming. The end of the theoretical part presents a number of basic researches related to primary-school children behaviour on the internet, which took place in the Czech Republic during last several years. The empirical part aims on qualitative research using the method called focus groups among primary-school children. Firstly, the research purpose and the methodology are described, followed by the most important part of the thesis - presentation of the results of the research and its evaluation, which involves also recommendation for education in this field and other potential researches. The conclusion of the thesis focuses mainly on the evaluation of the research and the work as a whole from the writer's point of view and on propounding of possible further development in this area. Keywords Children,...

Page generated in 0.093 seconds