• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 5
  • 5
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Intelligent home automation security system based on novel logical sensing and behaviour prediction

Jose, Arun Cyril January 2017 (has links)
The thesis, Intelligent Home Automation Security System Based on Novel Logical Sensing and Behavior Prediction, was designed to enhance authentication, authorization and security in smart home devices and services. The work proposes a three prong defensive strategy each of which are analyzed and evaluated separately to drastically improve security. The Device Fingerprinting techniques proposed, not only improves the existing approaches but also identifies the physical device accessing the home cybernetic and mechatronic systems using device specific and browser specific parameters. The Logical Sensing process analyses home inhabitant actions from a logical stand point and develops sophisticated and novel sensing techniques to identify intrusion attempts to a home’s physical and cyber space. Novel Behavior prediction methodology utilizes Bayesian networks to learn normal user behavior which is later compared to distinguish and identify suspicious user behaviors in the home in a timely manner. The logical sensing, behavior prediction and device fingerprinting techniques proposed were successfully tested, evaluated and verified in an actual home cyber physical system. The algorithms and techniques proposed in the thesis can be easily modified and adapted into many practical applications in Industrial Internet of Things, Industry 4.0 and cyber-physical systems. / Thesis (PhD)--University of Pretoria, 2017. / Electrical, Electronic and Computer Engineering / PhD / Unrestricted
2

家庭保全營運模式分析 / A Case Study on Business Model Analysis Of Taiwan Home Security Firm

林佳慧 Unknown Date (has links)
保全產業在台灣的發展雖超過35餘年,但大多數人對它的營運模式卻不甚了解,其因源自於該產業具有模糊性及獨特性。然而近年來,由於全球ICT資通訊網路技術不斷發展與演進下,IOT物聯網應用市場前景一片看好,於是智能家庭市場又重新受到重視,特別是在家庭安全領域的應用上,已多家業者競相跨入此領域。本研究的主要動機基於此,期探討保全業者在家庭保全市場發展中如何建構出成功的營運發展模式。 本研究以保全業A公司個案為例,從保全業者在家庭保全市場的營運模式角度分析,藉由Osterwalder & Pigneur,(2010)提出的「營運模式發展九大區塊」之架構,從中分析其業者在(1) 顧客區隔(customer segments):企業針對不同群體的顧客或企業做區隔 (2) 價值主張(value propositions):為解決顧客的問題或滿足顧客的需求所提供的產品或服務的集合 (3) 遞送通路(channels):提供多樣的通路型態,傳遞訊息及遞送價值主張給顧客 (4) 顧客關係(customer relationships):針對不同的顧客區隔,提供不同的顧客關係管理 (5) 收益來源(revenue streams):顧客對企業提供的價值主張所願意支付的金額 (6) 關鍵資源(key resources):使商業模式能順利進行的重要資產 (7) 關鍵活動(key activities):遞送價值主張過程中所提供的主要行動 (8) 關鍵伙伴(key partnerships):遞送價值主張過程中的合作伙伴及供應商 (9) 成本結構(cost structure):遞送價值主張過程中所產生的成本,這九大區塊的構成的營運模式為何,進而初探可延展性發展的營運策略。 經個案探討後,探究A公司成功營運模式推得以下三個結論:第一 以持續創新的領導模式,在發展策略上追求領先 第二.以營運模式以「安全、安心」為價值主張訴求,走向技術導向的保全服務架構,而不選擇勞力密集的人力保全,建立出市場區隔及門檻 第三,A公司從研發生產到銷售服務,走向「一條龍」式的營運模式架構,在發展初期除取得日本關鍵伙伴資源,也逐漸在產業發展出牢不可破的供應鏈關係,這也是該公司營運模式發展中最重要的影響力及成功關鍵因素。 / Even though security industry has already developed for more than 35 years, most people may not really understand its business models because of the characteristic: ambiguity and uniqueness. Due to the ICT technology getting mature, the prospect of IOT network is getting better, and the market of “Smart Home” is more attention nowadays, especially the application of home security. Therefore many companies get into the competition. The way how security industry constructs successful business models to home security market is the motivation of the research. In the research, we provide the example of the leader security company A. From the security industry business model to home safety market, we develop the business model by applying Osterwalder & Pigneur (2010)’s nine business model to build the blocks, which are (1) Customer segments (2) Value propositions (3) Channels (4) Customer relationships (5) Revenue streams (6) Key resources (7) Key activities (8) Key partnerships (9) Cost structure, to analyze the target company’s business model, and to study its strategies of developments for the future and the key points for their successful operation. After exploring the case of company A, we can get the conclusion below: First, the leading model of creation and innovation is continuously leading the development strategies. Second, safe and secure are valuable proposition of business model, appeal to technology- oriented security service structure rather than labor-intensive human security to establish the market segmentation and barrier. Third, company A developed all-in-one business model from research and develop to sales service, and get the resource from the key partners in Japan in the beginning. By this way they developed the relationship of the solid supply chain. This is the key successful factors to the business model of the company.
3

Mobilní aplikace pro bezpečnost domácnosti / Visual Home Security System for iOS-Based Mobile Devices

Bajaník, Filip January 2018 (has links)
The goal of this diploma thesis is to design and implement a mobile application for home security system on the iOS platform. The application introduces a complex solution allowing the transmission of the audio and video streams between the paired mobile devices using WebRTC. The final module represents universal solution for peer-to-peer audio and video communication. The thesis also deals with the field of computer vision, namely efficient motion detection algorithms. The module for motion detection implements ViBe algorithm using Metal. In case that the motion is detected the application notifies a user with a push notification. Synchronization of application data is implemented using Cloudkit and the data persistance using Realm library.
4

Internet of Things and Cybersecurity in a Smart Home

Kiran Vokkarne (17367391) 10 November 2023 (has links)
<p dir="ltr">With the ability to connect to networks and send and receive data, Internet of Things (IoT) devices involve associated security risks and threats, for a given environment. These threats are even more of a concern in a Smart Home network, where there is a lack of a dedicated security IT team, unlike a corporate environment. While efficient user interface(UI) and ease of use is at the front and center of IoT devices within Smart Home which enables its wider adoption, often security and privacy have been an afterthought and haven’t kept pace when needed. Therefore, a unsafe possibility exists where malicious actors could exploit vulnerable devices in a domestic home environment.</p><p dir="ltr">This thesis involves a detailed study of the cybersecurity for a Smart Home and also examines the various types of cyberthreats encountered, such as DDoS, Man-In-Middle, Ransomware, etc. that IoT devices face. Given, IoT devices are commonplace in most home automation scenarios, its crucially important to detect intrusions and unauthorized access. Privacy issues are also involved making this an even more pertinent topic. Towards this, various state of the art industry standard tools, such as Nmap, Nessus, Metasploit, etc. were used to gather data on a Smart Home environment to analyze their impacts to detect security vulnerabilities and risks to a Smart Home. Results from the research indicated various vulnerabilities, such as open ports, password vulnerabilities, SSL certificate anomalies and others that exist in many cases, and how precautions when taken in timely manner can help alleviate and bring down those risks.</p><p dir="ltr">Also, an IoT monitoring dashboard was developed based on open-source tools, which helps visualize threats and emphasize the importance of monitoring. The IoT dashboard showed how to raise alerts and alarms based on specific threat conditions or events. In addition, currently available cybersecurity regulations, standards, and guidelines were also examined that can help safeguard against threats to commonly used IoT devices in a Smart Home. It is hoped that the research carried out in this dissertation can help maintain safe and secure Smart Homes and provide direction for future work in the area of Smart Home Cybersecurity.</p>
5

Domov jako téma českých filosofických prací 20. a 21. století / Home as the topic of Czech philosophical work 20th and 21st century.

PŘEVRÁTILOVÁ, Pavlína January 2018 (has links)
The diplom a thesis deals with home and its concepts in philosophical works. The aim was to grasp and describe home as a philosophical category, using the ideas and theories that we found in the Czech philosophical texts that came out during the 20th and 21st centuries. Through these available information, we have attempted to unify and create a more coherent, interconnected theory, in which we divided home intoseveral basic chapters that are absolutely decisive and decisive for the concept and understanding of home, both past and present.

Page generated in 0.0366 seconds