Spelling suggestions: "subject:"1nternet off chings."" "subject:"1nternet off bushings.""
41 |
Digitalisering av intern hantering av kvalitetsavvikelser / Digitalization of internal management of quality deviationsLindh, Jesper, Forsberg, Albin January 2022 (has links)
Projektet riktar sig mot ett företag som är verksamma inom förpackningsindustrin med behandling och hållbarhet av papper. Operatörerna på anläggningen arbetar med att applicera plastbeläggning på papper för att göra det mer resistent mot vätska. När pappersrullar erhåller ett mindre vanligt produktionsfel utan tydlig åtgärd, finns en felhantering som kallas för ''tveksam bedömning'' (TVB). Hanteringen av TVB:er har tidigare bestått av mycket manuell hantering, vilket är ineffektivt, tidskrävande och otydligt som i sin tur kan leda till missförstånd. För att förbättra felhanteringen har ett befintligt program, som företaget använder sedan tidigare, vidareutvecklats för att kunna rapportera TVB:er och även kunna spåra tidigare TVB:er. Syftet med projektet är att förenkla processen för hanteringen av TVB:er samt minimera och underlätta arbetet för operatörerna. Genom att automatisera hur och var information sparas, samt koppla det till ett lättanvänt användargränssnitt, förenklas proceduren och minimerar arbetet för operatörerna. / This project targets a company that are operative within treatment and durability of paper in the packaging industry. At their facility, the production consists of applying plastic coating on the paper to make it more resistant to liquids, as the final product is intended as a container for liquid, e.g. milk. When paper rolls have a less common or more difficult error, there is an error handling procedure called ''questionable assessment''. This procedure consists of much manual handling which is ineffective, time consuming and inexplicit, which can lead to misunderstanding. To improve the error handling, an existing program that the company uses, will be further developed to manage error reports and to track earlier error reports. The purpose of the project is to simplify the process and minimize the workload for the staff. By automating how and where the information is stored as well as connecting it to a user-friendly interface, it will improve the procedure and minimize the work needed by the staff.
|
42 |
Context-Based Multi-Tenancy Policy Enforcement For Data Sharing In IoT SystemsNguyen, Huu Ha 09 August 2021 (has links)
No description available.
|
43 |
Solutions for Internet of Things Security Challenges: Trust and AuthenticationMcGinthy, Jason M. 12 July 2019 (has links)
The continuing growth of Internet-connected devices presents exciting opportunities for future technology. These Internet of Things (IoT) products are being manufactured and interleaved with many everyday activities, which is creating a larger security concern. Sensors will collect previously unimaginable amounts of private and public data and transmit all of it through an easily observable wireless medium in order for other devices to perform data analytics. As more and more devices are produced, many are lacking a strong security foundation in order to be the "first to market." Moreover, current security techniques are based on protocols that were designed for more-capable devices such as desktop computers and cellular phones that have ample power, computational ability, and memory storage. Due to IoT's technological infancy, there are many security challenges without proper solutions. As IoT continues to grow, special considerations and protections must be in place to properly secure this data and protect the privacy of its users. This dissertation highlights some of the major challenges related to IoT and prioritizes their impacts to help identify where gaps are that must be filled. Focusing on these high priority concerns, solutions are presented that are tailored to IoT's constraints. A security feature-based framework is developed to help characterize classes of devices to help manage the heterogeneous nature of IoT devices and networks. A novel physical device authentication method is presented to show the feasibility in IoT devices and networks. Additional low-power techniques are designed and evaluated to help identify different security features available to IoT devices as presented in the aforementioned framework. / Doctor of Philosophy / The Internet has been gaining a foothold in our everyday lives. Smart homes, smart cars, and smart cities are becoming less science fiction and more everyday realities. In order to increase the public’s general quality of life, this new Internet of Things (IoT) technological revolution is adding billions of devices around us. These devices aim to collect unforeseen amounts of data to help better understand environments and improve numerous aspects of life. However, IoT technology is still in its infancy, so there are still many challenges still remaining. One major issue in IoT is the questionable security for many devices. Recent cyber attacks have highlighted the shortcomings of many IoT devices. Many of these device manufacturers simply wanted to be the first in a niche market, ignoring the importance of security. Proper security implementation in IoT has only been done by a minority of designers and manufacturers. Therefore, this document proposes a secure design for all IoT devices to be based. Numerous security techniques are presented and shown to properly protect the data that will pass through many of these devices. The overall goal for this proposed work aims to have an overall security solution that overcomes the current shortfalls of IoT devices, lessening the concern for IoT’s future use in our everyday lives.
|
44 |
Distributed Wireless Resource Management in the Internet of ThingsPark, Taehyeun 18 June 2020 (has links)
The Internet of Things (IoT) is a promising networking technology that will interconnect a plethora of heterogeneous wireless devices. To support the connectivity across a massive-scale IoT, the scarce wireless communication resources must be appropriately allocated among the IoT devices, while considering the technical challenges that arise from the unique properties of the IoT, such as device heterogeneity, strict communication requirements, and limited device capabilities in terms of computation and memory. The primary goal of this dissertation is to develop novel resource management frameworks using which resource-constrained IoT devices can operate autonomously in a dynamic environment. First, a comprehensive overview on the use of various learning techniques for wireless resource management in an IoT is provided, and potential applications for each learning framework are proposed. Moreover, to capture the heterogeneity among IoT devices, a framework based on cognitive hierarchy theory is discussed, and its implementation with learning techniques of different complexities for IoT devices with varying capabilities is analyzed. Next, the problem of dynamic, distributed resource allocation in an IoT is studied when there are heterogeneous messages. Particularly, a novel finite memory multi-state sequential learning is proposed to enable diverse IoT devices to reallocate the limited communication resources in a self-organizing manner to satisfy the delay requirement of critical messages, while minimally affecting the delay-tolerant messages. The proposed learning framework is shown to be effective for the IoT devices with limited memory and observation capabilities to learn the number of critical messages. The results show that the performance of learning framework depends on memory size and observation capability of IoT devices and that the learning framework can realize low delay transmission in a massive IoT. Subsequently, the problem of one-to-one association between resource blocks and IoT devices is studied, when the IoT devices have partial information. The one-to-one association is formulated as Kolkata Paise Restaurant (KPR) game in which an IoT device tries to choose a resource block with highest gain, while avoiding duplicate selection. Moreover, a Nash equilibrium (NE) of IoT KPR game is shown to coincide with socially optimal solution. A proposed learning framework for IoT KPR game is shown to significantly increase the number of resource blocks used to successful transmit compared to a baseline. The KPR game is then extended to consider age of information (AoI), which is a metric to quantify the freshness of information in the perspective of destination. Moreover, to capture heterogeneity in an IoT, non-linear AoI is introduced. To minimize AoI, centralized and distributed approaches for the resource allocation are proposed to enable the sharing of limited communication resources, while delivering messages to the destination in a timely manner. Moreover, the proposed distributed resource allocation scheme is shown to converge to an NE and to significantly lower the average AoI compared to a baseline. Finally, the problem of dynamically partitioning the transmit power levels in non-orthogonal multiple access is studied when there are heterogeneous messages. In particular, an optimization problem is formulated to determine the number of power levels for different message types, and an estimation framework is proposed to enable the network base station to adjust power level partitioning to satisfy the performance requirements. The proposed framework is shown to effectively increase the transmission success probability compared to a baseline. Furthermore, an optimization problem is formulated to increase sum-rate and reliability by adjusting target received powers. Under different fading channels, the optimal target received powers are analyzed, and a tradeoff between reliability and sum-rate is shown. In conclusion, the theoretical and performance analysis of the frameworks proposed in this dissertation will prove essential for implementing an appropriate distributed resource allocation mechanisms for dynamic, heterogeneous IoT environments. / Doctor of Philosophy / The Internet of Things (IoT), which is a network of smart devices such as smart phones, wearable devices, smart appliances, and environment sensors, will transform many aspects of our society with numerous innovative IoT applications. Those IoT applications include interactive education, remote healthcare, smart grids, home automation, intelligent transportation, industrial monitoring, and smart agriculture. With the increasing complexity and scale of an IoT, it becomes more difficult to quickly manage the IoT devices through a cloud, and a centralized management approach may not be viable for certain IoT scenarios. Therefore, distributed solutions are needed for enabling IoT devices to fulfill their services and maintain seamless connectivity. Here, IoT device management refers to the fact that the system needs to decide which devices access the network and using which resources (e.g., frequencies). For distributed management of an IoT, the unique challenge is to allocate scarce communication resources to many IoT devices appropriately. With distributed resource management, diverse IoT devices can share the limited communication resources in a self-organizing manner. Distributed resource management overcomes the limitations of centralized resource management by satisfying strict service requirements in a massive, complex IoT.
Despite the advantages and the opportunities of distributed resource management, it is necessary to address the challenges related to an IoT, such as analyzing intricate interaction of heterogeneous devices, designing viable frameworks for constrained devices, and quickly adapting to a dynamic IoT. Furthermore, distributed resource management must enable IoT devices to communicate with high reliability and low delay. In this regard, this dissertation investigates these critical IoT challenges and introduces novel distributed resource management frameworks for an IoT. In particular, the proposed frameworks are tailored to realistic IoT scenarios and consider different performance metrics. To this end, mathematical frameworks and effective algorithms are developed by significantly extending tools from wireless communication, game theory, and machine learning. The results show that the proposed distributed wireless resource management frameworks can optimize key performance metrics and meet strict communication requirements while coping with device heterogeneity, massive scale, dynamic environment, and scarce wireless resources in an IoT.
|
45 |
Online Optimization for Edge Computing under Uncertainty in Wireless NetworksLee, Gilsoo 24 April 2020 (has links)
Edge computing is an emerging technology that can overcome the limitations of centralized cloud computing by enabling distributed, low-latency computation at a network edge. Particularly, in edge computing, some of the cloud's functionalities such as storage, processing, and computing are migrated to end-user devices called edge nodes so as to reduce the round-trip delay needed to reach the cloud data center. Despite the major benefits and practical applications of using edge computing, one must address many technical challenges that include edge network formation, computational task allocation, and radio resource allocation, while considering the uncertainties innate in edge nodes, such as incomplete future information on their wireless channel gains and computing capabilities. The goal of this dissertation is to develop foundational science for the deployment, performance analysis, and low-complexity optimization of edge computing under the aforementioned uncertainties. First, the problems of edge network formation and task distribution are jointly investigated while considering a hybrid edge-cloud architecture under uncertainty on the arrivals of computing tasks. In particular, a novel online framework is proposed to form an edge network, distribute the computational tasks, and update a target competitive ratio defined as the ratio between the latency achieved by the proposed online algorithm and the optimal latency. The results show that the proposed framework achieves the target competitive ratio that is affected by the wireless data rate and computing speeds of edge nodes. Next, a new notion of ephemeral edge computing is proposed in which edge computing must occur under a stringent requirement on the total computing time period available for the computing process. To maximize the number of computed tasks in ephemeral edge networks under the uncertainty on future task arrivals, a novel online framework is proposed to enable a source edge node to offload computing tasks from sensors and allocate them to neighboring edge nodes for distributed task computing, within the limited total time period. Then, edge computing is applied for mobile blockchain and online caching systems, respectively. First, a mobile blockchain framework is designed to use edge devices as mobile miners, and the performance is analyzed in terms of the probability of forking event and energy consumption. Second, an online computational caching framework is designed to minimize the edge network latency. The proposed caching framework enables each edge node to store intermediate computation results (IRs) from previous computations and download IRs from neighboring nodes under uncertainty on future computation. Subsequently, online optimization is extended to investigate other edge networking applications. In particular, the problem of online ON/OFF scheduling of self-powered small cell base stations is studied, in the presence of energy harvesting uncertainty with the goal of minimizing the operational costs that consist of energy consumption and transmission delay of a network. Such a framework can enable the self-powered base stations to be functioned as energy-efficient edge nodes. Also, the problem of radio resource allocation is studied when a base station is assisted by self-powered reconfigurable intelligent surfaces (RIS). To this end, a deep reinforcement learning approach is proposed to jointly optimize the transmit power, phase shifting, and RIS reflector's ON/OFF states under the uncertainties on the downlink wireless channel information and the harvested energy at the RIS. Finally, the online problem of dynamic channel allocation is studied for full-duplex device-to-device (D2D) networks so that D2D users can share their data with a low communication latency when users dynamically arrive on the network. In conclusion, the analytical foundations and frameworks presented in this dissertation will provide key guidelines for effective design of edge computing in wireless networks. / Doctor of Philosophy / Smart cities will rely on an Internet of Things (IoT) system that interconnects cars, drones, sensors, home appliances, and other digital devices. Modern IoT systems are inherently designed to process real-time information such as temperature, humidity, or even car navigational data, at any time and location. A unique challenge in the design of such an IoT is the need to process large volumes of data over a wireless network that consists of heterogeneous IoT devices such as smartphones, vehicles, home access points, robots, and drones. These devices must perform local (on-device or so-called edge) processing of their data without relying on a remote cloud. This vision of a smart city seen as a mobile computing platform gives rise to the emerging concept of edge computing using which smartphones, sensors, vehicles, and drones can exchange and process data locally on their own devices. Edge computing allows overcoming the limitations of centralized cloud computation by enabling distributed, low-latency computation at the network edge.
Despite the promising opportunities of edge computing as an enabler for smart city services such as autonomous vehicles, drones, or smart homes, one must address many challenges related to managing time-varying resources such as energy and storage, in a dynamic way. For instance, managing communication, energy, and computing resources in an IoT requires handling many uncertain factors such as the intermittent availability of wireless connectivity and the fact that the devices do not know a priori what type of tasks they need to process. The goal of this dissertation is to address the fundamental challenges in edge computing under uncertainty in an IoT. In particular, this dissertation introduces novel mathematical algorithms and frameworks that exploit ideas from the fields of online optimization, machine learning, and wireless communication to enable future IoT services such as smart factories, virtual reality, and autonomous systems. In this dissertation, holistic frameworks are developed by designing, analyzing, and optimizing wireless communications systems with an emphasize on emerging IoT applications. To this end, various mathematical frameworks and efficient algorithms are proposed by drawing on tools from wireless communications, online optimization, and machine learning to yield key innovations. The results show that the developed solutions can enable an IoT to operate efficiently in presence of uncertainty stemming from time-varying dynamics such as mobility of vehicles or changes in the wireless networking environment. As such, the outcomes of this research can be used as a building block for the large deployment of smart city technologies that heavily rely on the IoT.
|
46 |
Supporting User Interactions with Smart Built EnvironmentsHandosa, Mohamed Hussein Hafez 04 February 2019 (has links)
Before the recent advances in sensing, actuation, computing and communication technologies, the integration between the digital and the physical environment was limited.
Humans linked those two worlds by collecting data about the physical environment before feeding it into the digital environment, and by changing the state of the physical environment based on the state of the digital environment.
The incorporation of computing, communication, sensing, and actuation technologies into everyday physical objects has empowered the vision of the Internet of Things (IoT). Things can autonomously collect data about the physical environment, exchange information with other things, and take actions on behalf of humans. Application domains that can benefit from IoT include smart buildings, smart cities, smart water, smart agriculture, smart animal farming, smart metering, security and emergencies, retail, logistics, industrial control, and health care.
For decades, building automation, intelligent buildings, and more recently smart buildings have received a considerable attention in both academia and industry. We use the term smart built environments (SBE) to describe smart, intelligent, physical, built, architectural spaces ranging from a single room to a whole city. Legacy SBEs were often closed systems operating their own standards and custom protocols. SBEs evolved to Internet-connected systems leveraging the Internet technologies and services (e.g., cloud services) to unleash new capabilities. IoT-enabled SBEs, as one of the various applications of the IoT, can change the way we experience our homes and workplaces significantly and make interacting with technology almost inevitable. This can provide several benefits to modern society and help to make our life easier. Meanwhile, security, privacy, and safety concerns should be addressed appropriately.
Unlike traditional computing devices, things usually have no or limited input/output (I/O) capabilities. Leveraging the ubiquity of general-purpose computing devices (e.g., smartphones), thing vendors usually provide interfaces for their products in the form of mobile apps or web-based portals. Interacting with different things using different mobile apps or web-based portals does not scale well. Requiring the user to switch between tens or hundreds of mobile apps and web-based portals to interact with different things in different smart spaces may not be feasible. Moreover, it can be tricky for non-domestic users (e.g., visitors) of a given SBE to figure out, without guidance, what mobile apps or web-based portals they need to use to interact with the surrounding.
While there has been a considerable research effort to address a variety of challenges associated with the thing-to-thing interaction, human-to-thing interaction related research is limited. Many of the proposed approaches and industry-adopted techniques rely on more traditional, well understood and widely used Human-Computer Interaction (HCI) methods and techniques to support interaction between humans and things. Such techniques have mostly originated in a world of desktop computers that have a screen, mouse, and keyboard. However, SBEs introduce a radically different interaction context where there are no centralized, easily identifiable input and output devices. A desktop computer of the past is being replaced with the whole SBE. Depending on the task at hand and personal preferences, a user may prefer to use one interaction modality over another. For instance, turning lights on/off using an app may be more cumbersome or time-consuming compared to using a simple physical switch.
This research focuses on leveraging the recent advances in IoT and related technologies to support user interactions with SBEs. We explore how to support flexible and adaptive multimodal interfaces and interactions while providing a consistent user experience in an SBE based on the current context and the available user interface and interaction capabilities. / PHD / The recent advances in sensing, actuation, computing, and communication technologies have brought several rewards to modern society. The incorporation of those technologies into everyday physical objects (or things) has empowered the vision of the Internet of Things (IoT). Things can autonomously collect data about the physical environment, exchange information with other things, and take actions on behalf of humans. Several application domains can benefit from the IoT such as smart buildings, smart cities, security and emergencies, retail, logistics, industrial control, and health care. For decades, building automation, intelligent buildings, and more recently smart buildings have received considerable attention in both academia and industry. We use the term smart built environments (SBE) to describe smart, intelligent, physical, built, architectural spaces ranging from a single room to a whole city. SBEs, as one of the various applications of the IoT, can change the way we experience our homes and workplaces significantly and make interacting with technology almost inevitable. While there has been a considerable research effort to address a variety of challenges associated with the thing-to-thing interaction, human-to-thing interaction related research is limited. Many of the proposed approaches and industry-adopted techniques to support human-to-thing interaction rely on traditional methods. However, SBEs introduce a radically different interaction context. Therefore, adapting the current interaction techniques and/or adopting new ones is crucial for the success and wide adoption of SBEs. This research focuses on leveraging the recent advances in the IoT and related technologies to support user interactions with SBEs. We explore how to support a flexible, adaptive, and multimodal interaction experience between users and SBEs using a variety of user interfaces and proposed interaction techniques.
|
47 |
Voice Control of Fetch Robot Using Amazon AlexaLiu, Purong 23 March 2020 (has links)
With the rapid development of computers and technology, virtual assistants (VA) are becoming more and more common and intelligent. However, virtual assistants, such as Apple's Siri, Amazon's Alexa, and Google Assistant, do not currently have any physical functions. As an important part of the internet of things (IoT), the field of robotics has become a new trend in the usage of VA. In this project, a mobile robot, Fetch, is connected with the Amazon Echo Dot through the Amazon web service (AWS) and a local robot operation system (ROS) bridge server. We demonstrated that the robot could be controlled by voice commands through an Amazon Alexa. Given certain commands, Fetch was able to move in a desired direction as well as track and follow a target object. The follow model was also learned by Neural Network training, which allows for the target position to be predicted in future maps. / Master of Science / Nowadays, virtual personalized assistants (VPAs) exist everywhere around us. For example, Siri or android VPAs exist on every smartphone. More and more people are getting household Virtual Assistants, such as Amazon Alexa, Google Assistant, and Microsoft's Cortana. If the virtual assistants can connect with objects which have physical functions like an actual robot, they will be able to provide better services and more functions for humans. In this project, a mobile robot, Fetch, is connected with the Echo dot from Amazon. This connection allows us to control the robot by voice command. You can ask the robot to move in a given direction or track and follow a certain object. In order to let the robot learn how to predict the position of the target when the target is lost, a map is built as an influence factor. Since a designed algorithm of target position prediction is difficult to implement, we opted to use a machine learning method instead. Therefore, a machine learning algorithm was tested on the following model.
|
48 |
Improving WiFi Sensor Network Security Through Unassociated Device Communication Using Wireless Latency Shift KeyingJohnson, Jacob Edward 16 April 2024 (has links) (PDF)
IEEE 802.11 (WiFi) only has two modes of trust--complete trust or complete untrust. The lack of nuance leaves no room for sensors that a user does not fully trust, but wants to connect to their network, such as a WiFi sensor. Solutions exist, but they require advanced knowledge of network administration. We solve this problem by introducing a new way of modulating data in the latency of the network, called Latency Shift Keying. We use specific characteristics of the WiFi protocol to carefully control the latency of just one device on the network. We build a transmitter, receiver, and modulation scheme that is designed to encode data in the latency of a network. We develop an application, Wicket, that solves the WiFi trust issue using Latency Shift Keying to create a new security association between an untrusted WiFi sensor and a wired device on the trusted network. We evaluate its performance and show that it works in many network conditions and environments.
|
49 |
Indoor location identification technologies for real-time IoT-based applications: an inclusive surveyOguntala, George A., Abd-Alhameed, Raed, Jones, Stephen F., Noras, James M., Patwary, M., Rodriguez, Jonathan 21 September 2018 (has links)
Yes / The advent of the Internet of Things has witnessed tremendous success in the application of wireless sensor networks and ubiquitous computing for diverse smart-based applications. The developed systems operate under different technologies using different methods to achieve their targeted goals. In this treatise, we carried out an inclusive survey on key indoor technologies and techniques, with to view to explore their various benefits, limitations, and areas for improvement. The mathematical formulation for simple localization problems is also presented. In addition, an empirical evaluation of the performance of these indoor technologies is carried out using a common generic metric of scalability, accuracy, complexity, robustness, energy-efficiency, cost and reliability. An empirical evaluation of performance of different RF-based technologies establishes the viability of Wi-Fi, RFID, UWB, Wi-Fi, Bluetooth, ZigBee, and Light over other indoor technologies for reliable IoT-based applications. Furthermore, the survey advocates hybridization of technologies as an effective approach to achieve reliable IoT-based indoor systems. The findings of the survey could be useful in the selection of appropriate indoor technologies for the development of reliable real-time indoor applications. The study could also be used as a reliable source for literature referencing on the subject of indoor location identification. / Supported in part by the Tertiary Education Trust Fund of the Federal Government of Nigeria, and in part by the European Union’s Horizon 2020 Research and Innovation Programme under Grant agreement H2020-MSCA-ITN-2016 SECRET-722424
|
50 |
Similarity hash based scoring of portable executable files for efficient malware detection in IoTNamanya, Anitta P., Awan, Irfan U., Disso, J.P., Younas, M. 09 July 2019 (has links)
Yes / The current rise in malicious attacks shows that existing security systems are bypassed by malicious files. Similarity hashing has been adopted for sample triaging in malware analysis and detection. File similarity is used to cluster malware into families such that their common signature can be designed. This paper explores four hash types currently used in malware analysis for portable executable (PE) files. Although each hashing technique produces interesting results, when applied independently, they have high false detection rates. This paper investigates into a central issue of how different hashing techniques can be combined to provide a quantitative malware score and to achieve better detection rates. We design and develop a novel approach for malware scoring based on the hashes results. The proposed approach is evaluated through a number of experiments. Evaluation clearly demonstrates a significant improvement (> 90%) in true detection rates of malware.
|
Page generated in 0.3871 seconds