• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 32
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 53
  • 53
  • 50
  • 24
  • 23
  • 22
  • 19
  • 17
  • 17
  • 13
  • 11
  • 10
  • 10
  • 10
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Internet of Things and its Business Models

Egel, Jill January 2019 (has links)
The Internet of Things (IoT) is the next phase in the evolution of the internet, where everyday objects are connected to the internet, and obtain the capacity to communicate with other devices and sense their environment. Especially the IIoT is one of the most talked about industrial business concepts since the recent years, companies try to focus on business models and operational efficiency. That is why this thesis focuses on researching the industrial Internet of Things (IIoT). There is already a lot of information about the common Internet of Things but still a gap in research in the business perspective, especially surrounding the concept of business models for the IIoT. The goal of this project is to investigate different kinds of business models, how they work and how feasible they are. The need to research possible business models for an IIoT framework, as traditional business models are relevant for this study, such as the Business Model Canvas which has been proposed by Alexander Osterwalder or the Business Model Navigator by Oliver Gassmann. But there is still a lack of literature covering the business models for the IIoT. Therefore, after researching the concept of IIoT from a business perspective, I identified some useful criteria and suitable business models. With a qualitative literature study, I was able to develop an IIoT business model framework, based on the dynamics and complexity of the IIoT concept, which incorporates business strategies and provides companies with a flexible approach. The business model framework can be used in any business which is working in the industrial context. To demonstrate how the business model framework works for the IIoT, I clarified how suitable business models can improve the current business model of the very prominent and successful company Tesla. The results show how the framework of IIoT business models can be used to increase profit and work efficiently as a company. The models can also be formed to only highlight single components of an already existing business model, as it offers great flexibility, which is highly valuable in the fast evolving and innovative IIoT phenomenon.
12

Industry 4.0 with a Lean perspective - Investigating IIoT platforms' possible influences on data driven Lean

De Vasconcelos Batalha, Alex, Parli, Andri Linard January 2017 (has links)
Purpose: To investigate possible connections between an Industrial Internet of Things (IIoT) system, such as Predix, and data driven Lean practises. The aim is to examine if an IIoT platform can improve existing practises of Lean, and if so, which Lean tools are most likely influenced and how this is.Design/Methodology: The paper follows a phenomenon-based research approach. The methodology contains of a mix of primary and secondary data. The primary data was obtained through “almost unstructured” interviews with experts, while the secondary data comprises of a comprehensive review of existing literature. Moreover, a model was developed to investigate the connections between the concepts of IIoT and Lean.Findings: Findings derived from expert interviews at General Electric (GE) in Uppsala have led to the conclusion that Predix fulfils the necessary requirements to be considered an IIoT platform. However, the positive effects of the platform on the selected Lean tools could not be found. Only in one instance improved Predix the effectiveness of a Lean tool. Overall, data analytic efforts are performed and let to better in-process control. However, these efforts were independent from the Lean efforts carried out. There was no increase in data collection or analytics due to the Lean initiative and Predix is not utilised for data collection, storage, or analysis. It appears that the pharmaceutical industry is fairly slow in adapting new technologies. Firstly, the high regulatory requirements inherent within the pharmaceutical industry limit the application of cutting edge technology by demanding strict in-process control and process documentation. Secondly, the sheer size of GE itself slows down the adoption of new technology. Lastly, the pragmatic approach of the top management to align the digital strategies of the various industries and thereof resulting allocation of resources to other more technologically demanding businesses hinders the use of Predix at GE in Uppsala.
13

An evaluation of how edge computing is enabling the opportunities for Industry 4.0

Svensson, Wictor January 2020 (has links)
Connecting factories to the internet and enable the possibilities for these to autonomously talk to each other is called the Industrial Internet of Things(IIoT) and is mentioned as Industry 4.0 in the terms of the industrial revolutions. The machines are collecting data through very many different sensors and need to share these values with each other and the cloud. This will make a large load to the cloud and the internet, and the latency will be large. To evaluate how the workload and the latency can be reduced and still get the same result as using the cloud, two different systems are implemented. One which uses cloud and one which using edge computing. Edge computing is when the processing of the data is decentralized to the edge of the network. This thesis aims to find out ”When is it more favorable to use an edge solution and when is it to prefer a cloud solution”. The first system is implemented with an edge platform, Crosser, the second system is implemented with a cloud platform, Azure. Both implementations are giving the same outputs but the differences is where the data is processed. The systems are measured in latency, bandwidth, and CPU usage. The result of the measurements shows that the Crosser system has less latency, using smaller bandwidth but is needing more computational power of the device which is on the edge of the network. The conclusion of the results is that it depends on the demands of the system. Is the demands that it should have low latency and not using much bandwidth Crosser is to prefer. But if a very heavy machine learning algorithm is going to be executed in the system and the latency and bandwidth size is not a problem then the Cloud Reference System is to prefer.
14

Determining the performance costs in establishing cryptography services as part of a secure endpoint device for the Industrial Internet of Things

Ledwaba, Lehlogonolo P.I. January 2017 (has links)
Endpoint devices are integral in the realisation of any industrial cyber-physical system (ICPS) application. As part of the work of promoting safer and more secure industrial Internet of Things (IIoT) networks and devices, the Industrial Internet Consortium (IIC) and the OpenFog Consortium have developed security framework specifications detailing security techniques and technologies that should be employed during the design of an IIoT network. Previous work in establishing cryptographic services on platforms intended for wireless sensor networks (WSN) and the Internet of Things (IoT) has concluded that security mechanisms cannot be implemented using software libraries owing to the lack of memory and processing resources, the longevity requirements of the processor platforms, and the hard real-time requirements of industrial operations. Over a decade has passed since this body of knowledge was created, however, and IoT processors have seen a vast improvement in the available operating and memory resources while maintaining minimal power consumption. This study aims to update the body of knowledge regarding the provision of security services on an IoT platform by conducting a detailed analysis regarding the performance of new generation IoT platforms when running software cryptographic services. The research considers execution time, power consumption and memory occupation and works towards a general, implementable design of a secure, IIoT edge device. This is realised by identifying security features recommended for IIoT endpoint devices; identifying currently available security standards and technologies for the IIoT; and highlighting the trade-offs that the application of security will have on device size, performance, memory requirements and monetary cost. / Dissertation (MSc)--University of Pretoria, 2017. / Electrical, Electronic and Computer Engineering / MSc / Unrestricted
15

Multi-Source Fusion for Weak Target Images in the Industrial Internet of Things

Mao, Keming, Srivastava, Gautam, Parizi, Reza M., Khan, Mohammad S. 01 May 2021 (has links)
Due to the influence of information fusion in Industrial Internet of Things (IIoT) environments, there are many problems, such as weak intelligent visual target positioning, disappearing features, large error in visual positioning processes, and so on. Therefore, this paper proposes a weak target positioning method based on multi-information fusion, namely the “confidence interval method”. The basic idea is to treat the brightness and gray value of the target feature image area as a population with a certain average and standard deviation in IIoT environments. Based on the average and the standard deviation, and using a reasonable confidence level, a critical threshold is obtained. Compared with the threshold obtained by the maximum variance method, the obtained threshold is more suitable for the segmentation of key image features in an environment in which interference is present. After interpolation and de-noising, it is applied to mobile weak target location of complex IIoT systems. Using the metallurgical industry for experimental analysis, results show that the proposed method has better performance and stronger feature resolution.
16

Analysis of a Full-Stack Data Analytics Solution Delivering Predictive Maintenance to a Lab-Scale Factory

Hoyt, Nathan Wesley 02 June 2022 (has links)
With the developments of industry 4.0, data analytics solutions and their applications have become more prevalent in the manufacturing industry. Currently, the typical software architecture supporting these solutions is modular, using separate software for data collection, storage, analytics, and visualization. The integration and maintenance of such a solution requires the expertise of an information technology team, making implementation more challenging for small manufacturing enterprises. To allow small manufacturing enterprises to more easily obtain the benefits of industry 4.0 data analytics, a full-stack data analytics framework is presented and its performance evaluated as applied in the common industrial analytics scenario of predictive maintenance. The predictive maintenance approach was achieved by using a full-stack data analytics framework, comprised of the PTC Thingworx software suite. When deployed on a lab-scale factory, there was a significant increase in factory uptime in comparison with both preventative and reactive maintenance approaches. The predictive maintenance approach simultaneously eliminated unexpected breakdowns and extended the uptime periods of the lab-scale factory. This research concluded that similar or better results may be obtained in actual factory settings, since the only source of error on predictions would not be present in real world scenarios.
17

Complexity of Establishing Industrial Connectivity for Small and Medium Manufacturers with and Without Use of Industrial Innovation Platforms

Russell, Brian Dale 01 March 2019 (has links)
The manufacturing industry is continuously evolving as new practices and technology are adopted to improve productivity and remain competitive. There have been three well established manufacturing revolutions in recent history and some say that the fourth is occurring currently by the name of Smart Manufacturing, Indusrie 4.0, and others. This latest manufacturing revolution is highly dependent on industrial connectivity. This research aims to gage the ability of Industrial Innovation Platforms (IIPs) to reduce complexity of implementing base-line industrial connectivity for small and medium-sized enterprises (SMEs). The results of this study would be especially relevant to decision makers in industrial SMEs who are considering implementing industrial connectivity as well as providing insights into approaches for establishing base-line industrial connectivity. The research methodology consists of three main steps: 1) creation of IIP and non-IIP connectivity solutions that enable connectivity of the vast amount of industrial equipment, 2) Gathering measures from solutions in accordance with metrics identified for complexity evaluation, 3) discussion and interpretation of data To have a more complete analysis, quantitative and qualitative data was used and evaluated to address the varying elements of the broad task of establishing industrial connectivity. The research showed that IIPs can reduce complexity for select industrial equipment. Some industrial equipment have robust and streamlined connectivity solutions provided by the IIP. In these cases, the IIP almost certainly will reduce the complexity of establishing connectivity. Other industrial equipment have a solution provided by the IIP which requires piecing together and some component modifications. In these cases, the IIPs reduce complexity of establishing connectivity dependent on circumstances. Lastly, when no form of solution is available through the IIP for the industrial equipment, the IIP's has no ability to reduce complexity other than hosting the server used in connectivity. These findings open additional avenues of research which could improve the understanding of benefits IIPs may provide to SMEs.
18

Digital Performance Management: An Evaluation of Manufacturing Performance Management andMeasurement Strategies in an Industry 4.0 Context

Smith, Nathaniel David 22 March 2024 (has links) (PDF)
Manufacturing management and operations place heavy emphasis on monitoring and improving production performance. This supervision is accomplished through strategies of manufacturing performance management, a set of measurements and methods used to monitor production conditions. Over the last thirty years the most prevalent measurement of traditional performance management has been overall equipment effectiveness, a percentile summary metric of a machine's utilization. The technologies encapsulated by Industry 4.0 have expanded the ability to gather, process, and store vast quantities of data, creating opportunity to innovate on how performance is measured. A new method of managing manufacturing performance utilizing Industry 4.0 technologies has been proposed by McKinsey & Company and software tools have been developed by PTC Inc. to aid in performing what they both call digital performance management. To evaluate this new approach, the digital performance management tool was deployed on a Festo Cyber-Physical Lab, an educational mock production environment, and compared to a digitally enabled traditional performance management solution. Results from a multi-day production period displayed an increased level of detail in both the data presented to the user and the insights gained from the digital performance management solution as compared to the traditional approach. The time unit measurements presented by digital performance management paint a clear picture of what and where losses are occurring during production and the impact of those losses. This is contrasted by the single summary metric of a traditional performance management approach, which easily obfuscates the constituent data and requires further investigation to determine what and where production losses are occurring.
19

Analys av Purduemodellen förnätverkssäkerhet i industriellastyrsystem inom Industri 4.0 / Analysis of the Purdue model fornetwork security in industrialcontrol systems within Industry 4.0

Blom, Oskar, Cildavil, Antonia January 2024 (has links)
I detta examensarbete analyseras Purduemodellen och dess tillämplighet inomnätverkssäkerhet för industriella styrsystem inom ramarna för Industri 4.0. Genomen litteraturstudie granskas modellens struktur och funktion i relation till de nyautmaningarna som uppkommit genom ökad digitalisering och integrering av IIoTteknologier. Studien identifierar både styrkor och svagheter i den traditionellaPurduemodellen. I resultatavsnittet introduceras en modifierad version avPurduemodellen, utformad för att förstärka nätverkssäkerheten och öka systemensförmåga att hantera cyberhot samt anpassa sig till teknologiska förändringar i denindustriella sektorn. Denna anpassning har genomförts genom införandet avytterligare säkerhetsstandarder och verktyg i syfte att förbättra modellenseffektivitet och relevans. / In this thesis, the Purdue model and its applicability within network security forindustrial control systems under the framework of Industry 4.0 are analyzed.Through a literature review, the model's structure and function are examined inrelation to the new challenges that have emerged due to increased digitization andintegration of IIoT technologies. The study identifies both strengths and weaknessesin the traditional Purdue model. In the results section, a modified version of thePurdue model is introduced, designed to enhance network security and increase thesystems' ability to handle cyber threats and adapt to technological changes in theindustrial sector. This adaptation has been achieved by incorporating additionalsecurity standards and tools aimed at improving the model's efficiency andrelevance.
20

Industrial Internet of Things : En analys av hot och sårbarheter i industriella verksamheter

Johnsson, Daniel, Krohn, Lina January 2019 (has links)
Today the digital evolution is progressing rapidly. This entails both pros and cons concerning the security of devices. Despite the evolution, security has been left in the dark. This results in threats and vulnerabilities in devices, which could potentially be used by a hacker with the purpose of exploiting information. Security has not been a priority in industrial enterprises, even though industrial devices and other networked devices reside on the same network. The evolution of the infrastructure of the Internet has resulted in an increase of cyberattacks. These attacks used to target random individuals. The attacks of today are more intelligent, and hackers have changed their targets to specific enterprises to further exploit sensitive information, damage devices or for financial benefits. Safety in today’s industrial workplaces, such as firewalls, encryption and intrusion detection systems are not specifically designed to work in this type of environment. This leads to new threats and vulnerabilities which further leads to more exploited vulnerabilities. This formulate the following questions: Which are the most occurring threats and vulnerabilities today? What current methods and tools are suited for controlling security in IIoT-networks and its internal industrial devices? The purpose of this thesis was to examine the most occurring threats and vulnerabilities in IIoT-networks and its internal devices and reason among the methods to evaluate security in industrial enterprises. Lastly, an experiment in a real industrial workplace was conducted to attain a nuanced picture of the implementation of finding threats and vulnerabilities in industrial systems. In summary, there are a lot of different threats and vulnerabilities divided into categories and many tools are available to ensure the vulnerability. To conduct a test to find threats and vulnerabilities in an industrial enterprise, it needs to be ethically correct and the consequences carefully considered. The result of this thesis is a mapping and a demonstration of how threats and vulnerabilities are detected in an industrial workplace.

Page generated in 0.1227 seconds