• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 680
  • 143
  • 109
  • 36
  • 34
  • 26
  • 16
  • 10
  • 9
  • 8
  • 7
  • 6
  • 5
  • 5
  • 2
  • Tagged with
  • 1204
  • 1204
  • 375
  • 279
  • 278
  • 257
  • 245
  • 218
  • 207
  • 164
  • 160
  • 139
  • 138
  • 126
  • 122
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
431

Spline Based Intrusion Detection in Vehicular Ad Hoc Networks (VANET)

Schmidt, David A., Khan, Mohammad S., Bennett, Brian T. 01 April 2019 (has links)
Intrusion detection systems (IDSs) play a crucial role in the identification and mitigation for attacks on host systems. Of these systems, vehicular ad hoc networks (VANETs) are particularly difficult to protect due to the dynamic nature of their clients and their necessity for constant interaction with their respective cyber-physical systems. Currently, there is a need for a VANET-specific IDS that can satisfy these requirements. Spline function-based IDSs have shown to be effective in traditional network settings. By examining the various construction of splines and testing their robustness, the viability for a spline-based IDS can be determined.
432

Comparing the impact of internet of things and cloud computing on organisational behavior: a survey

García-Tadeo, Diego A., Reddy Peram, Dattatreya, Suresh Kumar, K., Vives, Luis, Sharma, Trishu, Manoharan, Geetha 01 January 2022 (has links)
Cloud computing is about delivery of different computing services involving databases, analytics, software, networking with the use of internet to enhance innovation, incorporate flexibility in resources and broaden profitability. However, Internet of Things (IoT) is an essential system for interrelating computer devices, digital machines, people and others which are offered with unique identifiers where data can be transferred with human involvement and wireless network. 42% of organisations in UK use cloud computing. The problem with cloud computing revolves around security and privacy issues as data is stored by a third party from inside or outside of the organisation leading to broken authentication, compromising of credentials and others. The use of IoT is vulnerable as it provides connectivity to devices, machines and people therefore, it needs to contain more storage that is made from cloud facilities. Survey has been conducted where primary quantitative method has been considered to obtain data from 101 managers of the organisation that has adopted cloud computing and IoT. However, 8 close-ended questions have been asked to 101 managers. Positivism philosophy has been used to make quantifiable observations along with descriptive design and others. The results and discussion will analyse responses of the respondents after conducting statistical analysis. However, research has been revolving around making a comparison between using cloud computing and IoT along with analysing organisational behaviour. / Revisión por pares
433

Signal Processing and Machine Learning Methods for Internet of Things: Smart Energy Generation and Robust Indoor Localization

Chen, Leian January 2022 (has links)
The application of Internet of Things (IoT) where sensors and actuators embedded in physical objects are linked through wired and wireless networks has shown a rapid growth over the past years in various domains with the benefits of improving efficiency and productivity, reducing cost, providing mobility and agility, etc. This dissertation focuses on developing signal processing and machine learning based techniques in IoT with applications to 1) smart energy generation and 2) robust indoor localization in smart city. Smart grids, in contrast to legacy grids, facilitate more efficient electricity generation and consumption by allowing two-way information exchange among various components in the grid and the users based on the measurements from numerous sensors located at different places. Due to the introduction of information communications, a smart grid is faced with the risk of external attacks which is aimed to take control of the grid. In particular, electricity generation from photovoltaic (PV) systems is a mature power generation technology utilizing renewable resources, owning to its advantages in clean production, reduced cost and high flexibility. However, the performance of a PV system can be susceptible and unstable due to various physical failures and dynamic environments (internal circuit faults, partial shading, etc.). To safeguard the system security, fault or attack detection technologies are of great importance for PV systems and smart grids. Existing approaches on fault or attack detection either rely on the prediction by a predetermined system model which acts as reference data for comparison or can be applied only within a certain set of component (e.g., several PV strings) based on local statistical properties without the capability of generalization. Furthermore, the output performance of a PV system is dynamic under different environmental conditions (irradiance level, temperature, etc.), which can be optimized by the technique of maximum power point tracking (MPPT). However, previous studies on MPPT usually require prior knowledge of the system model or high computational complexity for iterative optimization. Smart city, as another important application of IoT, relies on analysis of the measurement data from sensors located at users and environments to provider intelligent solutions in our daily life. One of the fundamental tasks for advanced location-based services is to accurately localize the user in a certain environment, e.g., on a certain floor inside a building. Indoor localization is faced with challenges of moving users, limited availability of sensors and noisy measurements due to hardware constraints and external interferences. This dissertation first describes our advanced fault/attack detection and localization methods for PV systems and smart grids, then develops our enhanced MPPT techniques for PV systems, and finally presents our robust indoor localization methods for smartphone users, based on statistical signal processing and machine learning approaches. In Chapter 2 and Chapter 3, we proposes fault/attack detection method in PV systems and smart grids respectively in the framework of abrupt change detection utilizing sequential output measurements without assuming any prior knowledge of the system characteristics or particular faulty/attack patterns, such that an alarm will triggered regardless of the magnitude or the type of faulty/attack signals. Starting from the proposed fault detection method in Chapter 2, we present our fault localization method for PV systems in Chapter 4 where the central controller is able to identify the faulty PV strings without full knowledge of each local measurements. Chapter 5 studies the MPPT method under dynamic shading conditions where we adopt neural networks to assist the identification of the global maximum power point by depicting the relationship between the system output power and the operating voltage. In Chapter 6, to tackle the challenge of accurate and robust indoor localization for smart city when sensors provides noisy measurement data, we propose a cooperative localization method which exploits the readings of the received strengths of Wi-Fi signals at the smartphone users and the relative distances among neighboring users to combat the deterioration due to aggregated measurement errors. Throughout the dissertation, our proposed methods are followed by simulations (of a PV system or a grid under various operating conditions) or experiments (of localizing moving users with smartphones to record sensors' measurements). The results demonstrate that our proposed fault/attack detection and localization methods and MPPT schemes can achieve higher adaptivity and efficiency with robustness against various external conditions an lower computational complexity, and our cooperative localization methods have high localization accuracy even given large measurement errors and limited measurement data.
434

Efficient naming for Smart Home devices in Information Centric Networks

Rossland Lindvall, Caspar, Söderberg, Mikael January 2020 (has links)
The current network trends point towards a significant discrepancy between the data usage and the underlying architecture; a severely increasing amount of data is being sent from more devices while data usage is becoming more data-centric instead of the previously host-centric. Information Centric Network (ICN) is a new alternative network paradigm that is designed for a data-centric usage. ICN is based on uniquely naming data packages and making it location independent. This thesis researched how to implement an efficient naming for ICN in a Smart Home Scenario. The results are based on testing how the forwarding information base is populated for numerous different scenarios and how a node's duty cycle affects its power usage. The results indicate that a hierarchical naming is optimized for hierarchical-like network topology and a flat naming for interconnected network topologies. An optimized duty cycle is strongly dependent on the specific network and accordingto the results can a sub-optimal duty cycle lead to excessive powerusage.
435

Education of IoT in an industrial context

Söderby, Karl January 2020 (has links)
As the rise of Industry 4.0 sheds light on many emerging technologies, oursociety will change with it. While it brings forth many positive aspects, itcannot be ignored the socio-economic problems we may face in the future.Many jobs will be transformed, manual labour such as order picking, forkliftdriving will be vanishing, and humanity will have to adapt, as we have for theprevious industrial revolutions.Educating the industrial workers that face unemployment due to automationis an important ethical matter, but can we as humans develop our knowledgewith the technology, as opposed to adapting to it? This thesis uses methodsof interaction design to create an alternative educational format, forindustrial workers to learn about the Internet of Things, an essentialcomponent of Industry 4.0.The result of this is TIOTTA (Teaching Internet of Things ThroughApplication), a contextual learning material designed together with industrialworkers.
436

Smarta hem, dumma villkor? En studie om användare av smarta hem-produkter, personlig integritet och informerat samtycke till insamling av data

Tencic, Rebecca January 2018 (has links)
Denna studie har undersökt hur användare av smarta hem-produkter i Sverige förhåller sig tillsin personliga integritet i relation till sitt användande av dessa produkter. Den har ocksåundersökt om användarvillkor är ett effektivt verktyg för att säkra ett giltigt informeratsamtycke från användare av smarta hem-produkter i Sverige. Studien vill bidra tillforskningssamhället genom att lyfta frågan om informerat samtycke i relation till IoT (Internetof Things). Det främsta syftet med studien är att förstå i vilken utsträckning konsumenter iSverige ger informerat samtycke till insamling och behandling av data i samband medanvändande av smarta hem-produkter.Studien genomfördes med en kombination av kvalitativa och kvantitativa metoder. Denkvalitativa undersökningen bestod av 6 semistrukturerade intervjuer och den kvantitativa av enwebbenkät med 207 respondenter. Resultatet som framkom genom undersökningarna stämdetill stor del överens med tidigare forskning om personlig integritet och informerat samtycke isamband med insamling av data. En minoritet av respondenterna läser användarvillkor och dengenerella kunskapen om datainsamling visade sig vara låg i förhållande till hur mycket mångarespondenter uppger att de värderar sin personliga integritet. Flera respondenter värderar sinbekvämlighet över den personliga integriteten, vissa genom sitt agerande och andra mer explicitgenom att uttrycka att det är ett val de gjort.Slutsatserna i denna studie överensstämde med tidigare studier. Respondenterna har eninkonsekvent relation till sin personliga integritet. De upplever villkor och avtal för sina smartahem-enheter som svåra att förstå och många vet inte vad de givit sitt samtycke till. / This study has examined how users of smart home devices in Sweden relate to their personalintegrity in relation to their use of these devices. It has also examined whether end useragreements are an effective tool for securing informed consent to the collection of data fromusers of smart home devices in Sweden. The study hopes to contribute to the research societywithin its field by raising the issue of informed consent in relation to Internet of Things. Themain purpose of this study is to understand to what extent users of smart home devices inSweden provide informed consent to the collection and use of their data.The study was conducted with a combination of qualitative and quantitative methods. Theresearcher conducted 6 semi structured interviews and a web survey with 207 respondents. Theresults collected through the surveys were consistent with several previous studies on personalintegrity and informed consent in connection with data collections. A minority of therespondents read end user agreements and the overall knowledge about data collection proved tobe low in comparison to how many respondents state that they value their personal integrity.Several respondents place a larger value on their convenience than their personal integrity, somethrough their actions and others more explicitly by expressing that it is a choice they have made.The conclusions in this study have been largely consistent with previous studies. Respondentshave an inconsistent relationship to their personal integrity. They experience major difficultieswith understanding end user agreements and privacy policies and many do not know what theyhave given their consent to in regard to their smart home devices.
437

Visualizing IoT systems and data with Augmented Reality

Nilsson, Ann-Helén January 2019 (has links)
Internet of Things (förkortat IoT) representerar den 4:e vågen av digitalisering och harsom fokus att koppla samman smarta enheter (eller Things). De flesta av dagens mobiltelefoner är utrustade med ett flertal sensorer och kamera. Augmented Reality har settutveckling inom industrin och hälsa de senaste åren. Ett återkommande problem för ubikdatateknik är dynamiska miljöer. I detta arbete tar vi dessa observationer i åtanke och medhjälp av Design Science Research Methodology utvecklar en prototyp som utnyttjar Augmented Reality för att visa information om enheter, eller Things, och utvärderar teknikensfördelar och nackdelar för detta syfte. Vi utforskar även Emergent Configurations sominspiration till design, samt design-principer som kan tillämpas i vår prototyp, genom enlitteraturstudie där vi utforskar tidigare studier. Vi finner att Augmented Reality kan användas för att visualisera IoT system och data och att det finns flera designprinciper och nackdelar att överväga. / Internet of Things (IoT for short) represents the 4th wave of digitization and focuses onconnecting smart devices (or Things). Most of today’s mobile phones are equipped withseveral sensors and a camera. Augmented reality has in recent years seen developmentwithin industry and health care. A recurrent problem for ubiquitous computing is thedynamic environment Things, services and applications are presented with. Taking theseobservations into mind and utilizing so called Design Science Research Methodology, wedevelop a prototype that use Augmented Reality to display information and data of devices,or Things, and evaluate the pros and cons of the technique for this purpose. We alsoexplore Emergent Configurations as an inspiration of design and explore design principlesthat could be applicable to our prototype by carrying out a literature study and evaluatingprevious work. We find that Augmented Reality can be used to visualize IoT systems anddata and that there are several design principles as well as drawbacks to consider.
438

THE CONNECTED ELEPHANT IN THE ROOM: A study on adoption factors for the Internet of Things in the smart home environment

Thulin, Pauline, Henricson, Mattias January 2019 (has links)
Majoriteten av svenskarna (86%) tror att vi kommer se allt fler uppkopplade produkter i våra hem, men det är bara 33% som faktiskt vill ha fler smarta produkter i sina hem. I denna studie har författarna undersökt vilka faktorer som är centrala i svenska konsumenters adoption av IoT-produkten Facebook Portal, för att bidra med ökad förståelse för konsumenters motstånd mot användandet av denna typ av produkter. Utifrån en värdebaserad acceptansmodell (VAM) genomfördes en kvantitativ enkätundersökning där potentiella konsumenters attityd till användandet av Facebook Portal undersöktes utifrån faktorerna upplevd användbarhet (PU), upplevt nöje (PE), upplevd integritetsrisk (PPR) och upplevd påflugenhet (PI), i relation till det uppfattade värdet (PV) av produkten. Studien visade att upplevd användbarhet (PU) och upplevt nöje (PE) har ett starkt positivt samband med potentiella användares upplevda värde (PV) av Facebook Portal samt att upplevd dataintegritetsrisk (PPR) och upplevd påflugenhet (PI) har medelstarka negativa samband med potentiella konsumenters upplevda värde (PV) av produkten. Studien visade också att respondenter som identifierar produkten som användbar (PU) och upplever produkten som rolig (PE) också tenderar att vara mindre medhållande i att produkten utgör ett hot mot integriteten (PPR) eller upplevs påträngande (PI). / The majority of Swedes (86%) believe that smart home devices is a rising trend, yet only 33% actually want more smart objects in their homes. In this study, the authors elucidate the factors central to the Swedish consumers’ adoption of the IoT product Facebook Portal, to contribute to the understanding of their resistance to the use of this type of technology. Through a value based acceptance model (VAM), the authors conducted a quantitative survey, investigating consumers' attitudes toward the use of Facebook Portal through the factors perceived usefulness (PU), perceived enjoyment (PE), perceived privacy risk (PPR) and perceived intrusiveness (PI), in relation to the perceived value (PV) of the product. Perceived usefulness (PU) and perceived enjoyment (PE) showed a strong positive correlation to potential users' perceived value (PV) of Facebook Portal and perceived privacy risk (PPR) and perceived intrusiveness (PI) showed a medium strong negative correlation to potential consumers' perceived value (PV) of the product. The study also showed that respondents who identify the product as useful (PU) and perceive the product as enjoyable (PE) also tend to be less supportive in the claims that the product comes with a privacy risk (PPR) and/or is perceived as intrusive.
439

Mobile Sensor Gateway

Forsberg, Linus, Falkenström, Maximilian January 2019 (has links)
Den här uppsatsen beskriver processen av att skapa en plattformsoberoende mobilapplikation för att koppla upp mobila enheter mot trådlösa sensorer med hjälp av Bluetooth Low Energy, samla in data från uppkopplade sensorer och ladda upp den insamlade datan till en molnlagringstjänst. Allt eftersom konsumenter och forskare använder fler sensorer och andra Bluetooth-enheter, [1] ökar behovet av simplare och standardiserade lösningar för att arbeta med dessa. En litteraturstudie har genomförts där information om närliggande forskning insamlats och viktig information om de nödvändiga mjukvarukomponenter som krävs har utvärderats. I kombination med litteraturstudien har en IT-artefakt utvecklats i form av en mobilapplikation som har testats utefter insamlade krav för att säkerställa applikationens funktionalitet. Syftet med det här arbetet är att tydliggöra och konkretisera en mjukvaruutvecklingsprocess som kan användas för att skapa en mobilapplikation av det här slaget, samt vilka potentiella svårigheter som finns i dagsläget med att utforma den här typen av applikationer. Resultaten visar att en del tillverkare inte följer standarden för Bluetooth-kommunikation, detta gör det svårt att skriva generaliserade metoder för att hämta data från sensorer av alla typer och från samtliga tillverkare. / This thesis describes the process of creating a platform-independent mobile application for connecting mobile devices to wireless sensors using Bluetooth Low Energy, collecting data from connected sensors and uploading the collected data to a cloud storage service. As consumers and researchers use more sensors and other Bluetooth-devices, [1] one could argue that there is a need for simpler and standardised solutions to working with these. A literature study has been conducted where information on related research has been collected and important information about the necessary software components has been evaluated. In combination with the literature study, an IT artefact has been developed in the form of a mobile application that has been tested according to collected requirements to ensure the application's functionality. The purpose of this work is to contribute with a clear scientific process over what is required to create a mobile application of this kind and what potential difficulties exist in present-day design of this type of applications. The results show that some manufacturers may not be following the standards for Bluetooth data communication, thus making it hard to write generalized methods for retrieving data from sensors of any type or manufacturer.
440

Privacy by Design & Internet of Things: managing privacy

Alhussein, Nawras January 2018 (has links)
Personlig integritet motsvarar det engelska begreppet privacy, som kan uttryckas som rätten att få bli lämnad ifred. Det har ifrågasatts många gånger om personlig integritet verkligen finns på internet, speciellt i Internet of Things-system eller smarta system som de också kallas. Fler frågor ställs i samband med att den nya allmänna dataskyddsförordningen inom europeiska unionen börjar gälla i maj. I detta arbete studeras privacy by design-arbetssättet som den allmänna dataskyddsförordningen (GDPR) bland annat kommer med. I studien besvaras om privacy by design kommer kunna öka skyddet av den personliga integriteten i Internet of Things-system. För- och nackdelar tas upp och hur företag och vanliga användare påverkas. Genom en litteraturstudie och två intervjuer har frågan kunnat besvaras. Det visade sig att en stor del av problematiken inom Internet of Things avseende personlig integritet kan lösas genom att styra data. I privacy by design-arbetssättet ingår att skydda data i alla tillstånd genom olika metoder som kryptering. På det sättet bidrar privacy by design till ökad säkerhet inom Internet of Things-system. / Privacy means the right to be left alone. It has been questioned many times if privacy really exists on the internet, especially in Internet of Things systems or smart systems as they are also called. More questions occur when the new general data protection regulation (GDPR) within the European Union applies in May. In this paper privacy by design that the general data protection regulation comes with is being studied. This study answers whether privacy by design will be able to increase the protection of privacy in Internet of Things systems. Advantages and disadvantages are also addressed and how companies and common users are affected by the implementation of privacy by design. The question has been answered by a literature review and two interviews. It turned out that a significant part of the problems in Internet of Things regarding privacy may be solved by data management. The privacy by design includes protection of data in all states through different methods such as encryption. In this way, privacy by design contributes to increased security within Internet of Things system.

Page generated in 0.0828 seconds