• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 678
  • 143
  • 109
  • 36
  • 34
  • 26
  • 16
  • 10
  • 9
  • 8
  • 7
  • 5
  • 5
  • 5
  • 2
  • Tagged with
  • 1200
  • 1200
  • 372
  • 279
  • 276
  • 257
  • 245
  • 217
  • 207
  • 163
  • 159
  • 139
  • 137
  • 126
  • 122
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
251

A Framework to Support Opportunistic Groups in Context-Aware Applications

deFreitas, Adrian A. 01 May 2016 (has links)
Context-aware computing utilizes information about users and/or their environments in order to provide relevant information and services. To date, however, most context-aware applications only take advantage of contexts that can either be produced on the device they are running on, or on external devices that are known beforehand. While there are many application domains where sharing context is useful and/or necessary, creating these applications is currently difficult because there is no easy way for devices to share information without 1) explicitly directing them to do so, or 2) through some form of advanced user coordination (e.g., sharing credentials and/or IP addresses, installing and running the same software). This makes these techniques useful when the need to share context is known a priori, but impractical for the one time, opportunistic encounters which make up the majority of users’ lives. To address this problem, this thesis presents the Group Context Framework (GCF), a software framework that allows devices to form groups and share context with minimal prior coordination. GCF lets devices openly discover and request context from each other. The framework then lets devices intelligently and autonomously forms opportunistic groups and work together without requiring either the application developer or the user to know of these devices beforehand. GCF supports use cases where devices only need to share information once or spontaneously. Additionally, the framework provides standardized mechanisms for applications to collect, store, and share context. This lets devices form groups and work together, even when they are performing logically separate tasks (i.e., running different applications). Through the development of GCF, this thesis identifies the conceptual and software abstractions needed to support opportunistic groups in context-aware applications. As part of our design process, we looked at current contextsharing applications, systems, and frameworks, and developed a conceptual model that identifies the most common conditions that cause users/devices to form a group. We then created a framework that supports grouping across this entire model. Through the creation of four prototype systems, we show how the ability to form opportunistic groups of devices can increase users and devices’ access to timely information and services. Finally, we had 20 developers evaluate GCF, and verified that the framework supports a wide range of existing and novel use cases. Collectively, this thesis demonstrates the utility of opportunistic groups in context-aware computing, and highlights the critical challenges that need to be addressed to make opportunistic context sharing both practical and usable in real-world settings. The contributions of this thesis are: 1. A conceptual model, based on an analysis of prior literature, which describes the conditions under which users and/or devices form and work in groups. 2. An implementation of the Group Context Framework, which highlights the software abstractions and architecture needed to support all of the group types identified in our conceptual model. 3. A demonstration of the value of opportunistic groups in context aware computing, through the creation of four major systems and numerous smaller applications. 4. A validation of GCF’s robustness, through an examination of 65 ideas submitted by 20 developers. 5. An examination of the challenges associated with utilizing opportunistic groups in context-aware applications, based on our own experiences using GCF, as well as from issues raised by developers from academia and industry.
252

Security testing of the Zigbee communication protocol in consumer grade IoT devices

van Leeuwen, Daniel, Ayuk, Leonel Taku January 2019 (has links)
With the ever increasing number of Internet of Things devices going out on the market for consumers that are Zigbee certified there is a need for security testing. This is to make sure that security standards are upheld and improved upon in order to make sure networks are protected from unauthorized users. Even though a lot of research and testing has been done on the Zigbee key exchange mechanism, called Zigbee commissioning, improvements have still not been enough with severe vulnerabilities in consumer grade devices still existing today. The devices tested in this study use EZ-mode commissioning in order to exchange the network key between a Zigbee coordinator and a Zigbee end device in order to encrypt later communication after being paired.  By using a simple radio receiver and a packet capturing program such as Wireshark an eavesdropping attack was conducted in order to capture the network key. The experiment demonstrates that this is still a weak point as the network key was successfully captured using eavesdropping. The analysis of the results show that previous criticisms of Zigbee commissioning have still not fully been addressed and can be a potential weak point in networks that use Zigbee certified IoT products.
253

What Are the Security Challenges Concerning Maintenance Data in the Railway Industry

Khan, Hiba January 2019 (has links)
Recently, technology advancement has brought improvement in all the sectors, including the railway sector. The Internet of Things (IoT) based railway systems have immense potential to improve quality and systems that will enable more efficient, environmental friendly railway system. Many research brought innovations that offer enormous benefits for rail travel. The current research focuses on the railway industries, as they want to reap the benefits of IT concept such as Cloud Computing, Information Security, and Internet of Things (IoT). Railway industries are generating a large volume of data every day from different sources. In addition, machine and human interactions are rapidly increasing along with the development of technologies. This data need to be properly gathered, analysed and shared in a way that it is safe from different types of cyberattacks and calamities. To overcome smart devices’ and Cloud’s limitations, the new paradigm known as Fog computing has appeared. In which an additional layer processes the data and sends the results to the Cloud. Despite numerous benefits of Fog, computing brings into IoT-based environments, privacy and security issues remain the main challenge for its implementation. Hence, the primary purpose of this research is to investigate the potential challenges, consequences, threats, vulnerabilities, and risk management of data security in the railway infrastructure in the context of eMaintenance.
254

Hashing algorithms : A comparison for blockchains in Internet of things

Dahlin, Karl January 2018 (has links)
In today’s society blockchains and the Internet of things are two very discussed subjects this has led to thoughts about combining them by using a blockchain in Internet of things. This objective of this study has been to solve the problem which hashing algorithms is the best for a blockchain used in an Internet of things network. This have been done by first selecting a few hashing algorithms and setting up a scenario where a blockchain can be used in an Internet of things network. After that I specified what to compare, speed, input length and output length. The study has been conducted with the aid of literary studies about the hashing algorithms and a program that implements the algorithms and tests their speed. The study has shown that out of the selected hashing algorithms MD5, SHA-256, SHA3-256 with the conditions specified for the study that the hashing algorithm SHA3-256 is the best option if speed is not of the utmost importance in the scenario since it is from a newer standard and do not have a max input length. If speed is the very important in other words if SHA3-256 is to slow then SHA-256 would be best for the Internet of things network.
255

Desenvolvimento, validação e uso de um dispositivo de medição dos raios ultravioleta na cidade de Bauru - SP /

Morales, Ivan Leal January 2019 (has links)
Orientador: João Pedro Albino / Banca: Maria Cristina Gobbi / Banca: Kelton Augusto Pontara da Costa / Resumo: Diariamente, somos expostos a radiação ultravioleta e sem que percebamos, podemos estar aptos a enfrentar problemas posteriores por causa das ações maléficas da ultravioleta sobre nossa pele, podendo desenvolver um câncer no futuro. Ações de prevenção são necessárias inclusive alertas visuais ou fontes de consultas. A Internet das Coisas é uma tecnologia em crescimento que permite que sensores sejam utilizados e que seus dados sejam coletados e armazenados. A integração com a Internet permite que as informações sejam disponibilizadas para consulta pública. Este relatório técnico apresentou o processo de elaboração de um dispositivo na plataforma Arduino e sua aplicação, a fim de apresentar os dados para análise de Raios Ultravioleta coletados online, disponibilizando-os para a comunidade, de forma a colaborar na divulgação de informações dos Índices de Radiação Ultravioleta para que as pessoas pudessem se prevenir contra os efeitos negativos advindo da exposição à tal radiação / Abstract: Every day, we are exposed to ultraviolet radiation and without realizing it, we may be able to face later problems because of the harmful actions of ultraviolet on our skin and may develop a cancer in the future. Prevention actions are required including visual alerts or sources of queries. The Internet of Things is a growing technology that allows sensors to be used and their data to be collected and stored. Integration with the Internet allows information to be made available for public consultation. This technical report presented the process of elaboration of a device in the Arduino platform and its application, in order to present the data for analysis of Ultraviolet Rays collected online, making them available to the community, in order to collaborate in the dissemination of information of the Indices of Ultraviolet radiation so that people could be warned against the negative effects of exposure to such radiation / Mestre
256

Determinants of key success criteria in establishing and sustaining an Internet of Things (IOT) new technology venture (NTV) in South Africa

Suleman, Hussain 05 December 2016 (has links)
A RESEARCH REPORT SUBMITTED TO THE FACULTY OF COMMERCE, LAW AND MANAGEMENT, UNIVERSITY OF THE WITWATERSRAND, IN PARTIAL FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF MANAGEMENT SPECIALISING IN ENTREPRENEURSHIP AND NEW VENTURE CREATION Johannesburg, 2016 / Technology entrepreneurship is vital to economic development as it could have positive effects on employment and could rejuvenate industries, especially through disruptive technologies. Studies have shown that South Africa has one of the highest new venture failure rates across the globe and it is, therefore, becoming critical to determine the key factors of successful technology ventures that could contribute to sustaining new technology ventures in South Africa. With the Internet of Things (IoT) fast becoming the most exciting technology trend aimed at transforming everyday business and individual lives, this study set out to investigate the key success criteria for IoT new ventures, as well as key sectors for IoT within South Africa. Linking technology entrepreneurship and the opportunities provided by IoT, this research aims to identify the key success criteria of entrepreneurial ventures within South Africa, as well as analyse the South African IoT ecosystem to determine which sectors provide the greatest opportunity for technology entrepreneurs. This research was conducted through primary research across IoT new technology ventures, as well as enterprises across industries within South Africa. The study found that successful ventures and unsuccessful ventures have different entrepreneur characteristics. A key characteristic for successful IoT ventures is entrepreneur ambitions, while education is the biggest hindrance to unsuccessful ventures. The related car and fleet management industries were found to provide the largest opportunity for IoT entrepreneurship in South Africa. This study provides valuable insight into the IoT market that will aid the sustainability of IoT entrepreneurship. From an academic perspective, it supplements the existing literature on technology and IoT entrepreneurship in South Africa. / MT2016
257

“Technology can always crash; pen and paper will always work.” : The Internet of Things in the Swedish Hockey League

Zachlund, Pontuz, Kallin, Mathias January 2019 (has links)
Background: Internet of Things is one of the most important areas of future technology and countless of industries are directing attention towards it. IoT has now started to appear in the sport industry. One sport that has not been investigated to the same extent within the terms of IoT is ice hockey. Problem Statement: Numerous teams in ice hockey have not yet realized the impact IoT may have on their team performance. With an absence in research on the use of IoT in the Swedish ice hockey industry, there is a knowledge gap on how Swedish ice hockey teams can grasp this opportunity and the main factors that affect their adoption. Research Purpose: IoT creates an opportunity for Swedish ice hockey teams to achieve a competitive advantage and thus a chance to gain new grounds in managing their teams. The purpose of this thesis is to investigate to what extent teams in the Swedish Hockey League are using IoT devices and explore the factors affecting the adoption process. Research Questions: To what extent are IoT devices used by teams in the Swedish Hockey League to increase teams’ performance? What main factors affect the adoption of IoT devices into teams in the Swedish Hockey League? Method: With an inductive approach, this qualitative research explores the IoT phenomenon in the context of ice hockey in SHL. With semi-structured interviews, this research gather data from the perspectives of seven SHL teams on IoT. By using a conventional content analysis, the data collected is categorized and divided into themes. Results: The use of IoT devices in SHL is low. The interest to adopt IoT devices is shared amongst many interview participants. When conducting the conventional content analysis on the data gathered from the interviews, certain themes became evident. The findings could be traced down to either their attitude, their competence within the field or their resources. Conclusion: The Internet of Things is changing the way professional sport teams are managed, coached, and led. The benefits that could be harvested from adopting IoT devices are undeniable, but there are several factors that facilitate a successful adoption. The culture and atmosphere in the organization, the skills and know-how, and the financial situation are all important parts of a successful adoption.
258

Security Challenges of Communication Protocols in IoT : Comparing security features of ZigBee and Z-Wave communication protocols in IoT devices

Shahidi, Hamed January 2019 (has links)
This research studies the security challenges in IoT devices. At first, security challenges have been described and then specifically the security of communication protocols in the IoT has been addressed. Finally, among different communication protocols, ZigBee and Z-Wave protocols have been chosen for this study. The criterion for choosing these two protocols is the level of security they provide for IoT devices to protect them against unauthorized access and hacking. Security, frequency, power consumption and data rate are the characteristics that have been discussed in the review of these two protocols. In the end, a comparison of the various features of these two protocols clarified that the security of IoT devices in each of these protocols depends on the type of the IoT device, the required range and other requirements, however, in most cases the ZigBee protocol showed more security than Z-Wave.
259

Desenvolvimento de tecnologia de hardware e software para o monitoramento de animais / Development of hardware and software technology for animal monitoring

Camargo, João Fernando Calcagno 22 March 2019 (has links)
Internet das Coisas é um conceito novo que define a forma que os dispositivos se comunicam entre si sem a necessidade de interferência humana, possibilitando tomadas de decisão mais inteligentes, baseadas em dados coletados de sensores, tags e outros dispositivos. O objetivo do trabalho é a criação e validação de um sistema usando elementos de Internet das Coisas com mineração de dados para detectar padrões de comportamentos de animais, possibilitando o proprietário tomar decisões para segurança e saúde dos animais. Para tanto, foi feito um estudo da arte das soluções atuais de monitoramento animal e das tecnologias disponíveis para aplicação no sistema. Dois hardwares foram desenvolvidos para coleta dos dados, e foram integrados a uma ferramenta de mineração chamada Damicore. Apesar de algumas dificuldades envolvendo cobertura com a internet, foram realizados dois experimentos com êxito e seus dados foram processados pela ferramenta de mineração, produzindo clusters hierárquicos que possibilitam destacar determinados comportamentos animais através dos clusters encontrados. Finalmente, foram sugeridos alguns pontos de melhoria do sistema, para aumentar ainda mais a abrangência da solução. / Internet of Things is a new concept that defines the way devices communicate with each other without the need for human interference, enabling smarter decision-making based on data collected from sensors, tags and other devices. The goal of this project is to create and validate a system using Internet of Things features with data mining to detect patterns of animal behavior, enabling the owner to make decisions for animal safety and health. For this purpose, current animal monitoring solutions and technologies were reviewed. Based on that, two hardware devices were developed for data collection and integrated with a data mining tool, called Damicore. Despite some difficulties involving internet coverage, two experiments were successfully carried out and their data were processed by the data mining tool, producing hierarchical clusterings that enable to highlight certain animal behaviors by means of the found clusters. Finally, some factors that can benefit the evolution of the system were suggested to further increase the scope of the solution.
260

Klusterlagring samt visualisering av data från IoT-objekt / Cluster storage and visualization of data from IoT-objects

Elgh, Joakim, Forsberg, Joakim, Matti, Erik, Palm, Viktor, Sjöberg, Agaton, Karlbäck, Rasmus, Johns, Oliver January 2019 (has links)
Följande rapport beskriver hur ett system för klusterlagring samt visualisering av geografisk data utvecklades för kursen TDDD96 - Kandidatprojekt i mjukvaruutveckling. Produkten utvecklades på begäran av kunden Ubiquitous Computing and Analytics Group vid Institutionen för datavetenskap på LiU. Produkten som skapades består i stora drag av tre huvudsystem: dataflödet som tar emot data och transporterar till de andra två systemen, en distribuerad datalagring och en visualisering som presenterar mottagen data på ett behändigt sätt. I teorin beskriver rapporten främst de ingående teknologier som användes för att bygga produkten och hur dessa fungerar. Detta täcker bland annat Apache NiFi och Apache Kafka för dataflöde, Apache Ignite för distribuerad datalagring samt CesiumJS för visualisering. Där beskrivs också de ramverk som användes för samarbete i gruppen, Kanban och Scrum. Metoden täcker hur arbetet organiserats; hur kommunikation med externa parter skett, vilka dokument som skulle produceras samt deras syfte och även hur ansvar och uppgifter fördelats i gruppen. Det täcker också en mer teknisk del av arbetet: hur testning skulle utföras samt hur gruppen skulle använda sig av Git för versionshantering. Tre stora slutsatser nås. Först kommer rapporten presentera hur produkten skapar värde för kunden genom att beskriva de egenskaper kunden önskade att systemet skulle ha och hur dessa uppfylls. Sedan presenteras de lärdomar som kunde dras från projektet med stort fokus på komplexiteten att arbeta mot en extern kund och vad gruppen har lärt sig om det. Slutligen besvaras hur passande klusterlagring är för lagring och processering av stora mängder data. Slutsatsen blev att det passar väldigt bra på grund av dess kapacitet till parallella beräkningar. Till sist följer sju individuella delar där varje gruppmedlem har tagit en viss del av projektet som gruppmedlemmarna forskat vidare på. Agaton Sjöberg undersökte hur begreppet big data relaterar till den produkt som skapats i projektet samt dess applikationer. Erik Matti skapade en överblick på Apache NiFi och Apache Kafka som datakommunikationssystem. Joakim Elgh undersökte möjliga attackytor i projektgruppens distribuerade lagring och hur de kan åtgärdas. Joakim Forsberg jämförde Node.js med python som grund för en backend i en server. Oliver Johns undersökte skillnaderna mellan Apache Ignite och MySQL och för vilka användningsområden de passar. Rasmus Karlbäck jämförde Apache Hadoop och Apache Kafka som ramverk för distribuerad lagring. Viktor Palm undersökte CesiumJS, Leaflet och D3js som ramverk för geografisk visualisering.

Page generated in 0.084 seconds