• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 89
  • 9
  • 7
  • 4
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 137
  • 137
  • 137
  • 35
  • 33
  • 30
  • 28
  • 27
  • 22
  • 21
  • 21
  • 21
  • 19
  • 19
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

THE ECO-SMART CAN V2.0

Nanto, Darack B 05 April 2018 (has links)
I noticed that the workers had the same itinerary when emptying trashcans, meanwhile trashcans needed urgently to be emptied. Traditionally, ETSU maintenance operate on daily routes to pick trash on designated time, regardless the level of the containers. This leads to overflown trashcan in busy areas or during rush hours in certain areas. This overflown trashcan result in an unclean environment for the community and an unpleasant look of our beautiful campus. The time, resources and labor invested in collecting the trash could be saved. Therefore, I decided to use the Internet of Things (IoT) to create a device that will optimize trash collection, to reduce costs and pollution. The Eco-Smart Can will contain a renewable source of energy such as the solar panel. Furthermore, it will have a compactor as well to decrease the trash volume. The system in the Eco-Smart can will give prior information of the trash level to maintenance facility so that they can empty the trash in a timely manner and preserve the environment.
72

The Privacy Paradox: Factors influencing information disclosure in the use of the Internet of Things (IoT) in South Africa

Davids, Natheer 21 January 2021 (has links)
The Internet of Things (IoT) has been acknowledged as one of the most innovative forms of technology since the computer, because of the influence it can have on multiple sectors of physical and virtual environments. The growth of IoT is expected to continue, by 2020 the number of connected devices is estimated to reach 50 billion. Recent developments in IoT provide an unprecedented opportunity for personalised services and other benefits. To exploit these potential benefits as best as possible, individuals are willing to provide their personal information despite potential privacy breaches. Therefore, this paper examines factors that influence the willingness to disclose personal information in the use of IoT in South Africa (SA) with the use of the privacy calculus as the theoretical underpinnings of this research. The privacy calculus accentuates that a risk-benefit trade off occurs when an individual decides to disclose their personal information, however, it is assumed that there are more factors than perceived risks and perceived benefits that influence information disclosure. After analysing previous literature, this study identified the following factors; information sensitivity, privacy concerns, social influence, perceived benefits, (perceived) privacy risks and privacy knowledge as possible key tenants in relation to willingness to disclose personal information. This research took on an objective ontological view, with the underlying epistemological stance being positivistic. The research incorporated a deductive approach, employing the use of a conceptual model which was constructed from a combination of studies orientated around privacy, the privacy calculus and the privacy paradox. Data for this research was collected using the quantitative research approach, through the use of an anonymous online questionnaire, where the targeted population was narrowed down to the general public residing within SA that make use of IoT devices and/or services. Data was collected using Qualtrics and analysed using SmartPLS 3. SmartPLS 3 was used to test for correlations between the factors which influence information disclosure in the use of IoT by utilising the complete bootstrapping method. A key finding was that the privacy paradox is apparent within SA, where individuals pursue enjoyment and predominantly use IoT for leisure purposes, while individuals are more likely to adopt self-withdrawal tendencies when faced with heightened privacy concerns or potential risks.
73

A realistic named data networking architecture for the Internet of things / Une Architecture NDN realiste pour l'Internet des Objets

Abane, Amar 02 December 2019 (has links)
L’Internet des objets (IdO) utilise l’interconnexion de milliards de petits appareils informatiques, appelés «Objets», pour fournir un accès à des services et à des informations partout dans le monde. Cependant, la suite de protocoles IP a été conçue il y a plusieurs décennies dans un but totalement différent, et les fonctionnalités de l’IoT soulignent désormais les limites de l’IP. En parallèle aux efforts d’adaptation de l’IP à l’IdO, des architectures alternatives basées sur les réseaux orientés information promettent de satisfaire nativement les applications Internet émergentes. L’une de ces architectures est appelée réseau de données nommées (NDN). Nos objectifs à travers le travail rapporté dans ce manuscrit peuvent êtrerésumés en deux aspects. Le premier objectif est de montrer que NDN est adapté à la prise en charge des systèmes IdO. Le deuxième objectif est la conception de deux solutions de communication légères pour les réseaux sans fil contraints avec NDN. / The Internet of Things (IoT) uses the interconnection of billions of small computing devices, called “Things”, to provide access to services and information all over the world. However, the IP protocol suite has been designed decades ago for a completely different purpose, and IoT features now highlight the limitations of IP. While adapting IP for the IoT might be seen as cutting corners, alternative architectures based on the Information Centric Networking (ICN) paradigm promise to natively satisfy emerging Internet applications. One of these architectures is Named Data Networking (NDN). Our objectives through the work reported in this manuscript can be summarized in two aspects. The first objective is to show that NDN is suitable to support IoT networking. The second objective is the design of two solutions for lightweight forwarding in constrained wireless networks.
74

[en] FIOT: AN AGENT-BASED FRAMEWORK FOR SELF-ADAPTIVE AND SELF-ORGANIZING INTERNET OF THINGS APPLICATIONS / [pt] FIOT: UM FRAMEWORK BASEADO EM AGENTES PARA APLICAÇÕES AUTO-ORGANIZÁVEIS E AUTOADAPTATIVAS DE INTERNET DAS COISAS

NATHALIA MORAES DO NASCIMENTO 01 June 2016 (has links)
[pt] A ideia principal da Internet das Coisas (IoT) é conectar bilhões de coisas à Internet nos próximos anos, a exemplo de carros, roupas e comidas. Entretanto, muitos problemas precisam ser resolvidos antes que essa ideia possa ser concretizada. Alguns desses problemas estão relacionados à necessidade de construir sistemas para IoT que sejam auto-organizáveis e autoadaptativos. Este trabalho, portanto, apresenta a elaboração do Framework para Internet das Coisas (FIoT), que oferece suporte ao desenvolvimento de aplicações para IoT com essas características. Ele é baseado nos paradigmas de Sistemas Multiagente (SMA) e algumas técnicas abordadas em Aprendizado de Máquina, a exemplo de redes neurais e algoritmos evolutivos. Um agente pode ter algumas características, como autonomia e sociabilidade, que tornam SMAs compatíveis com sistemas que requerem auto-organização. Redes neurais e algoritmos de evolução vêm sendo comumente usados nos estudos de robótica, no intuito de prover autonomia e adaptação à agentes físicos (ex.: robôs, sensores). Para demonstrar o uso do FIoT, dois grupos de problemas em IoT serão instanciados: (i) Cidades Inteligentes e (ii) Quantificação de Coisas. / [en] The agreed fact about the Internet of Things (IoT) is that, within the coming years, billions of resources, such as cars, clothes and foods will be connected to the Internet. However, several challenging issues need to be addressed before the IoT vision becomes a reality. Some open problems are related to the need of building self-organizing and self-adaptive IoT systems. To create IoT applications with these features, this work presents a Framework for Internet of Things (FIoT). Our approach is based on concepts from Multi-Agent Systems (MAS) and Machine Learning Techniques, such as a neural network and evolutionary algorithms. An agent could have characteristics, such as autonomy and social ability, which makes MAS suitable for systems requiring self-organization (SO). Neural networks and algorithms of evolution have been commonly used in robotic studies to provide embodied agents (as robots and sensors) with autonomy and adaptive capabilities. To illustrate the use of FIoT, we derived two different instances from IoT applications: (i) Quantified Things and (ii) Smart Cities. We show how exible points of our framework are instantiated to generate an application.
75

Wireless Beehive Monitoring : Using edge computing and TinyML to classify sounds

Holmgren, Mattias, Holmér, Elias January 2022 (has links)
As an essential and indispensable contributor to pollinating the world's crops and plants, the honey bee is key to the sustainability of humans' and our ecosystems' continued survival. Following in the footsteps of the companies TietoEvry and Beelabs project, this report also works towards monitoring bees during their daily activities. This project aims to investigate the feasibility of using wireless, battery-driven devices inside beehives to detect the sound of bees using machine learning for edge devices. Beelab has focused on measurements in and around the beehive regarding weight, temperature, barometric pressure and humidity. Sound analysis is still in its infancy with few finished working alternatives; therefore, this project will focus on the sound attribute by implementing machine learning and classification algorithms and applying it to a prototype—the progress is thoroughly documented in this report. The device records a snippet of sound and prepares to send it over a wireless transmission medium. By streamlining the code and optimizing the hardware, the device runs continuously for a month using a small, cheap battery.
76

PAN-Analys av IKEA TRÅDFRI. : En fördjupning av säkerhetsrisker kopplade till OTA-uppdateringar inom IKEA TRÅDFRI:s PAN.

Jönsson, Linus, Schenström, Oscar January 2020 (has links)
Purpose – The purpose of this study is to elaborate security risks with OTA updates within TRÅDFRI:s PAN. To ensure that today’s IoT devices maintains a high and robust standard to protect end-user’s integrity. Method – To answer the questions and to provide research-based evidence the study was carried out as a case study and two methods were applied in the study. An initial literature review in which the Zigbee protocol and it´s process for certification as well as OTA updates was studied. The literature review was followed by a qualitative experiment with focus on how IKEA implemented the PAN-security in practice. Findings – The findings show reduced security within the TRÅDFRI:s PAN when a third party device performs the OTA update. The experiments also questions parts of the certificate issued by Zigbee Alliance. Implications - Due to the increasing popularity of IoT devices, requirements are increasing from a data security perspective. The data security perspective is more important than ever and take up significantly more space during the development process as well as during the life cycle. This study discusses the OTA updates impact on integrity as well as how an established IoT company, such as IKEA, has implemented this necessary feature to maintain its products during the products life cycle. Limitations – Data gathered from the experiment was limited to TRÅDFRI E27 LED Bulb and therefore the result cannot be seen as a generalization of all TRÅDFRI products.
77

Where Did The Car Go? : Smart cities, calm technology and the future of autonomous cars

Masséus, Jonatan January 2020 (has links)
Urbanization has been a growing trend in the past fifty years. Cities are now transforming into smart cities, spaces whose infrastructure comprises an embedded digital layer. Hardware collects real-time data in the urban environment and software elaborates it to improve all types of services, from traffic to waste management to well-being. One technology that is expected to use this digital layer to further change the urban environment is the autonomous car. The purpose of this dissertation is to explore what key design attributes future autonomous cars should possess if they have not only to co-exist with and be accepted by people in the landscape of tomorrow’s smart cities, but also what they should not possess in order not to cause any harm. In this sense, the dissertation recognizes calm technology to be necessary in the design of a future autonomous car to support a human-centered, as opposed to a car- or technology-centered, environment. A socio-technical and systemic lens is applied to the phenomenological investigation of nine companies carried out by means of twelve in-depth semi-structured interviews with experts working within the automotive sector, the smart city industry, and calm technology. Eight attributes (safety, on-demand, geo-tracking, sharing, multiple purposes, communication through smart devices, electrical care and IoT/connectedness) are identified as necessary for future autonomous cars to implement in order to take advantage of the smart city infrastructure and provide a human-centered experience. Additionally, six out of the eight calm technology principles recognized in literature are considered necessary when designing future autonomous cars.
78

Sécurisation de l'Internet des objets / Securing the Internet of things

Hammi, Mohamed Tahar 17 September 2018 (has links)
L'Internet des Objets ou en anglais the Internet of Things (IoT) représente aujourd'hui une partie majeure de notre vie quotidienne. Des milliards d'objets intelligents et autonomes, à travers le monde sont connectés et communiquent entre eux. Ce paradigme révolutionnaire crée une nouvelle dimension qui enlèveles frontières entre le monde réel et le monde virtuel. Son succès est dû à l’évolution des équipements matériels et des technologies de communication notamment sans fil. L’IoT est le fruit du développement et de la combinaison de différentes technologies. Il englobe presque tous les domaines de la technologie d’information (Information Technology (IT)) actuels.Les réseaux de capteurs sans fil représentent une pièce maîtresse du succès de l'IoT. Car en utilisant des petits objets qui sont généralement limités en terme de capacité de calcul, de mémorisation et en énergie, des environnements industriels, médicaux, agricoles, et autres peuvent être couverts et gérés automatiquement.La grande puissance de l’IoT repose sur le fait que ses objets communiquent, analysent, traitent et gèrent des données d’une manière autonome et sans aucune intervention humaine. Cependant, les problèmes liés à la sécurité freinent considérablement l’évolution et le déploiement rapide de cette haute echnologie. L'usurpation d’identité, le vols d’information et la modification des données représentent un vrai danger pour ce système des systèmes.Le sujet de ma thèse consiste en la création d'un système de sécurité permettant d’assurer les services d’authentification des objets connectés, d’intégrité des données échangées entres ces derniers et de confidentialité des informations. Cette approche doit prendre en considération les contraintes des objets et des technologies de communication utilisées. / Internet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints.
79

Design and Implementation of Energy Usage Monitoring and Control Systems Using Modular IIOT Framework

Chheta, Monil Vallabhbhai 05 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / This project aims to develop a cloud-based platform that integrates sensors with business intelligence for real-time energy management at the plant level. It provides facility managers, an energy management platform that allows them to monitor equipment and plant-level energy consumption remotely, receive a warning, identify energy loss due to malfunction, present options with quantifiable effects for decision-making, and take actions, and assess the outcomes. The objectives consist of: 1. Developing a generic platform for the monitoring energy consumption of industrial equipment using sensors 2. Control the connected equipment using an actuator 3. Integrating hardware, cloud, and application algorithms into the platform 4. Validating the system using an Energy Consumption Forecast scenario A Demo station was created for testing the system. The demo station consists of equip- ment such as air compressor, motor and light bulb. The current usage of these equipment is measured using current sensors. Apart from current sensors, temperature sensor, pres- sure sensor and CO2 sensor were also used. Current consumption of these equipment was measured over a couple of days. The control system was tested randomly by turning on equipment at random times. Turning on the equipment resulted in current consumption which ensured that the system is running. Thus, the system worked as expected and user could monitor and control the connected equipment remotely.
80

Conceptualizing the Next Generation of Post Occupancy Evaluations

Tripathi, Ishan 19 July 2022 (has links)
The design and construction of high-performance buildings have emerged as a preferred solution for reducing energy consumption and greenhouse gas emissions. However, sometimes there is a considerable gap between the design performance and the actual performance of the buildings. Post Occupancy Evaluations (POE) provide tools to quantify the performance relative to the occupant's health, well-being, and comfort. POE is getting widely accepted to obtain feedback for various parameters such as water, energy, indoor environmental quality, and occupant comfort. Key Performance Indicators (KPIs) can be derived based on the obtained feedback to determine the performance gaps. POE has evolved to be a robust scientific methodology; however, traditional methods of conducting POE have been proven time-consuming, inconsistent, and inefficient. This research aims to conceptualize the next generation of post occupancy evaluations that leverages cutting-edge technologies such as Building Information Modeling (BIM), Internet of Things based sensors (IoT), Geographic Information Systems (GIS), and digital twins. The key contributions of this research are presented in a series of manuscripts. In the first paper, the gaps in the existing POE were determined by conducting a thorough literature review. The observed gaps were classified in data collection, analysis, and visualization categories. Broader POE definition, spot measurements of parameters, and 2D plans and charts for visualization made the existing POE procedure time-consuming. Using digital twins that combine the geometric and parametric data from BIM models and built-environment data from GIS and sensor measurements were recommended as potential solutions to address the observed gaps. The second paper explored the application of BIM-IoT-GIS integration to conduct POE. Use case scenarios were developed to derive system requirements to host the BIM-IoT-GIS-integrated POE. Four sequential tests were conducted to integrate a BIM model from Revit and sensors' data from Excel with ArcGIS pro that contained the surrounding environment data. Based on lessons learned from the tests, an optimized workflow was recommended that can be used across a variety of projects. The third paper used the BIM-IoT-GIS-integration concept to create a holistic proof of concept for digital-twin-enabled POE. The proof of concept was validated by conducting a digital-twin-based POE on the STTC building on the Red River College campus in Winnipeg. The indoor thermal comfort was visualized within the STTC digital twin developed in ArcGIS Pro. The preliminary energy consumption analysis concluded that the STTC buildings' average energy savings were approximately 70,000 KWH/year. The potential users for digital-twin-enabled POE were presented with a comparison of iv existing POE and digital-twin-based POE over a survey and a focus group discussion. Based on opinion-based feedback, the conclusion can be made that digital twins improve the overall efficiency of POE. The fourth paper recommended the digital-twin-enabled POE procedure for UVic's engineering expansion project. It established the semantics for POE, followed by a digital twin execution plan that can be used for developing a digital twin during each phase (from planning to operations) of the project. Furthermore, the benefits of the digital-twin-enabled POE procedure were demonstrated by comparison with the existing POE procedure relative to the project phases. This study concluded that conducting the POE on the UVic ECS expansion project will enable the researchers to determine the effectiveness of sustainable features by comparing the performance of existing and proposed facilities. In conclusion, BIM-IoT-GIS-integrated digital twins address the limitations of data collection, analysis, and visualization. These digital twins will enable multi-objective analysis and spatial-temporal visualization and provide deeper insights into the way these high-performance buildings function. / Graduate / 2023-05-24

Page generated in 0.0812 seconds