• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 666
  • 136
  • 109
  • 36
  • 34
  • 26
  • 16
  • 10
  • 9
  • 8
  • 7
  • 5
  • 5
  • 5
  • 2
  • Tagged with
  • 1176
  • 1176
  • 363
  • 277
  • 265
  • 252
  • 233
  • 207
  • 205
  • 160
  • 157
  • 136
  • 135
  • 123
  • 121
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Internet of Things : Uppkopplade sensorer med Raspberry Pi

Bengtsson, Jenny, Nykvist, Filip, Ljung, Alvin January 2017 (has links)
I detta projekt, som gjorts på uppdrag av IoT Sverige, har en produkt skapats åt derasDemorum för att visa hur Internet of Things fungerar och vad man kan använda dettill. Rapporten beskriver hur arbetet har utformats fram till den färdiga produktensom, utifrån deras önskemål, består av en koldioxid- och en rörelsesensor koppladetill en enkortsdator. Med hjälp av kodade skript skickas den insamlade datan till enserver placerad på ett så kallat moln. I grafer på en hemsida kan man därefter se datan illustrativt och det enda man då behöver är en dator med internetuppkoppling.
32

How Internet of Things changes business model of Microsoft OEM team / How IOT changes business model of Microsoft

Hruška, Jan January 2017 (has links)
The main goal of this thesis is to discover how an emerging technological megatrend, the Internet of Things, changes the business model of the Microsoft OEM team. OEM business is fully dependent on sales of Windows licenses; however, the PC market is declining and whole Microsoft is shifting into offering of cloud services while being financed by the OEM revenues. Nevertheless, the strategy of how the OEM team fits into the future of cloud offerings is clearly missing. To discover what changes should be made inside the current business model, 13 interviews with managers across Microsoft were conducted and analyzed. Identified themes were assigned to business model building blocks, ranked by the importance, and supported by relevant quotes from interviews as well as the theoretical background. The most important subjects of changes were identified as partners, activities and value proposition; however, changes will be seen in every aspect of the OEM business. As a result, specific changes in building blocks are described and the first steps towards the Internet of Things strategy suggested. That will ensure the relevance of the conservative OEM team in the connected future.
33

Localization and Proximity Detection in the Internet of Things Based on an Augmented UHF RFID System

Rostamian, Majed January 2014 (has links)
In the "Internet of Things" (IoT), the things will be able to sense, communicate, and interact. They will also exchange data, information and knowledge, and locate themselves and other things that surround them. In order to be able to interact, the things need to recognize that they are in proximity of other things. It is anticipated that the most widespread components of the IoT will be passive radio frequency identification (RFID) tags because they are inexpensive and provide automatic identification. However, passive RFID tags are not capable of performing complex operations, such as proximity detection and localization, which will be required in future networks. In this thesis, we describe existing problems with current RFID systems and survey potential solutions for localization and proximity detection. Then we present a new RFID device called "Sense-a-Tag" (ST) that can passively detect and decode backscattered signals from tags in its proximity. There have already been an attempt to use this device for tracking. However, detailed analysis of the performance of the ST especially for proximity detection has not been performed yet. We show that when STs are added to a standard RFID system, the problems of proximity detection and localization with RFID tags can readily be solved. Then we applied ST-based system for identifying people and object interactions. The potential uses of ST as an augmented device for IoT applications are discussed in this thesis. Advantages and limitations of an ST based RFID system have been investigated in details for each application. Results obtained from real experiments illustrate that an ST-based RFID system is feasible for proximity detection applications. In addition, a special software is developed in C\# to process the data and run a localization algorithm based on proximity detection information. The same software has been used for tracking people's activity. Different scenarios have been considered in the experiments. We tried to consider majority of factors that might affect the accuracy in the experiments including: angle and distance between the reader/ST and tags, timing in sending queries, presence of human body, etc. The simulations based on real experiments and results illustrates that an ST-based RFID system can be a realistic solution for proximity detection and localization for Location Positioning systems (LPS) and activity monitoring in future IoT.
34

RESHAPING THE DISCOURSE ON PRIVACY IN THE ERA OF THE INTERNET OF THINGS

Spataru, Adriana January 2017 (has links)
This paper is situated at the border between privacy studies and law and media studies. More precisely, the research aims to find out how the discourse on privacy is reshaped in the context of the upcoming technological changes envisaged in the scenery of the IoT. In a world where potentially all items become connected, the era of the Web 2.0 seems to fade away and leave the floor for a new era where the machines are also empowered as to create human-related content. One of the dimensions of this technological shift is the ubiquity of data and the continuous flow of information it involves. In this new landscape, individual privacy is a construct that necessitates further reflection and content analysis. Where legislation sets up for being the patron of data protection, the European legal rules are undergoing a reform process aiming to adapt the legal framework to the social realities. In light of the above, this paper starts by mapping how privacy was conceptualized by analyzing different theories set up in various media contexts. It follows by sketching the new media context of the IoT and mainly how it functions and where it applies. In order to draw a conclusion on how the new type of communications under the IoT can carve the notion of privacy, this paper will analyze the legal texts that aim to regulate the field of privacy. Legal texts are chosen as empirical material because they are the best barometer of social realities. In addition, in this particular field, the European legal background is subject to a reformation aiming to impose stricter rules that mirror the need for a stronger protection of privacy under the fast technological changes. After the analysis of the empirical material, the research applies the findings on the IoT to the legal background in order to assess whether the legal regime is strong enough to protect personal data. After carrying out this examination, the theories presented at the beginning of the paper are tested under the IoT scenery in order to assess which one is the most appropriate for the new context. The analysis reveals that surveillance theories and especially the panspectric gaze theory are the most applicable in the IoT scenery.
35

Resource management in dense wireless networks

Mosavat-Jahromi, Seyed Hamed 22 December 2020 (has links)
Recently, the wide range of communication applications has greatly increased the number of connected devices, and this trend continues by emerging new technologies such as Internet-of-Things (IoT) and vehicular ad hoc networks (VANETs). The increase in the number of devices may sooner or later cause wireless spectrum shortage. Furthermore, with the limited wireless spectrum, transmission efficiency degrades when the network faces a super-dense situation. In IEEE 802.11ah-based networks whose channel access protocol is basically a contention-based one, the protocol loses its efficiency when the total number of contending users grows. VANETs suffer from the same problem, where broadcasting and receiving safety messages, i.e., beacons, are critical. An inefficient medium access control (MAC) can negatively impact the network's reliability. Effective resource management solutions are needed to improve the network's reliability and scalability considering the features of different types of networks. In this work, we address the resource management problem in dense wireless networks in vehicle-to-everything (V2X) systems and IoT networks. For IoT networks, e.g., sensor networks, in which the network topology is quite stable, the grouping technique is exploited to make the stations (STAs) compete in a group to mitigate the contention and improve the channel access quality. While, in VANETs, devices are mobile and the network topology changes over time. In VANETs, beacons should be broadcast periodically by each vehicle reliably to improve road safety. Therefore, how to share the wireless resources to ensure reliability and scalability for these dense static and mobile wireless networks is still a difficult and open problem. In static IoT networks, we apply the Max-Min fairness criterion to the STAs' throughput to group the STAs to ensure network performance and fairness. Formulation of the problem results in a non-convex integer programming optimization problem which avoids hidden terminals opportunistically. As solving the optimization problem has a high time complexity, the Ant Colony Optimization (ACO) method is applied to the problem to find the sub-optimal solution. To support reliable and efficient broadcasting in VANET, wireless resources are divided into basic resource units in the time and frequency domains, and a distributed and adaptive reservation-based MAC protocol (DARP) is proposed. For decentralized control in VANETs, each vehicle's channel access is coordinated with its neighbors to solve the hidden terminal problem. To ensure the reliability of beacon broadcasting, different kinds of preambles are applied in DARP to support distributed reservation, detect beacon collisions, and resolve the collisions. Once a vehicle reserves a resource unit successfully, it will not release it until a collision occurs due to topology change. Protocol parameters, including transmission power and time slots duration, can be adjusted to reduce collision probability and enhance reliability and scalability. Simulation of urban mobility (SUMO) is used to generated two different city traces to assess the DARP's performance. Then, a distributed network coding-based MAC protocol (NC-MAC) is proposed to support reliable single-hop vehicle-to-vehicle (V2V) beacon broadcasting. We combine the preamble-based feedback mechanism, retransmissions, and network coding together to enhance broadcasting reliability. We deploy the preamble mechanism to facilitate the negative acknowledgment (NACK) and retransmission request procedures. Moreover, linear combinations of missed beacons are generated according to the network coding (NC) principles. We also use SUMO to evaluate the NC-MAC's performance in highway and urban scenarios. Group-casting and applying multi-hop communication can ensure reliability in V2X systems. As an extension of the proposed NC-MAC, a distributed grouping and network coding-assisted MAC protocol (GNC-MAC) is proposed to support reliable group-casting and multi-hop communication, which can address blockchain protocols' requirements. We propose a new grouping protocol by combining preamble-based feedback mechanism, multi-hop communication, and network coding to improve group-casting reliability. The preamble mechanism is responsible for reporting a NACK and requesting retransmission due to beacon missing. The missed beacons are combined according to the NC principles and sent on a resource block. / Graduate
36

DESIGN A SCALABLE AND SECURE NDN-BASED DATA RETRIEVAL FRAMEWORK FOR INTERNET OF THINGS

Yang, Ning 01 May 2020 (has links)
Internet of Things (IoT) has great potential in enabling many beneficial applications (i.e., connected vehicle applications). Named Data Networking (NDN) recently emerges as a promising networking paradigm in supporting IoT due to its data-centric architecture. In this dissertation, we present our research on design a scalable, efficient and secure ndn-based data retrieval framework for Internet of Things. Our work includes three parts:First, we envision an NDN-based Connected Vehicles (CV) application framework with a distributed data service model, as CV is a typical scenario of IoT. The scalability of the framework is greatly challenged by the fast mobility and vast moving area of vehicles. To handle such an issue, we develop a novel hyperbolic hierarchical NDN backbone architecture (H2NDN) by exploiting the location dependency of CV applications. H2NDN designs the backbone routers topology and the data/interest namespace by following the hierarchical architecture of geographic locations. The efficient data searching only requires static forwarding information base (FIB) configuration over NDN routers. To avoid overloading high-level routers, H2NDN integrates hyperbolic routing through carefully designed hyperbolic planes.Second, a distributed adaptive caching strategy is proposed to improve the efficiency of data caches on NDN routers. NDN provides native support to cache data at routers for future Interest packets. As we model the caching problem, the goal of cache allocation is to maximize the savings of Interest/Data forwarding hops under the limited cache space on each router. We discuss the impracticality of global optimization and provide the local caching method. Extensive ndnSIM based simulation with real traffic data proves the efficiency and scalability of the proposed H2NDN architecture.Finally, although NDN provides some security advantages such as secures data directly and uses name semantics to enable applications to reason about security, employing NDN to support IoT applications nevertheless presents some new challenges about security. In this dissertation, we focus on two resultant attacks that are not effectively handled in current studies, namely the targeted blackhole attack and the targeted content poisoning attack. We propose a lightweight and efficient approach named SmartDetour to tackle the two attacks. To ensure high scalability and collusion-resilience, SmartDetour lets each router respond to attacks (i.e., packet drops or corrupted data) independently in order to isolate attackers. The core solution contains a reputation-based probabilistic forwarding strategy and a proactive attacker detection algorithm. Extensive ndnSIM based simulation demonstrates the efficiency and accuracy of the proposed SmartDetour.
37

Realizace monitorovacího systému pokojových rostlin v prostředí IoT / Implementation of monitoring system of house plants in IoT environment

Mach, Sebastián January 2020 (has links)
This master's thesis is about the design and development of a flower pot sensor, which monitors data related to the cultivation of houseplants. The sensor sends the data to the cloud, where the analysis is performed and the evaluated living conditions of the monitored plant are displayed to the user.
38

A study into scalable transport networks for IoT deployment

Sizamo, Yandisa 14 March 2022 (has links)
The growth of the internet towards the Internet of Things (IoT) has impacted the way we live. Intelligent (smart) devices which can act autonomously has resulted in new applications for example industrial automation, smart healthcare systems, autonomous transportation to name just a few. These applications have dramatically improved the way we live as citizens. While the internet is continuing to grow at an unprecedented rate, this has also been coupled with the growing demands for new services e.g. machine-to machine (M2M) communications, smart metering etc. Transmission Control Protocol/Internet Protocol (TCP/IP) architecture was developed decades ago and was not prepared nor designed to meet these exponential demands. This has led to the complexity of the internet coupled with its inflexible and a rigid state. The challenges of reliability, scalability, interoperability, inflexibility and vendor lock-in amongst the many challenges still remain a concern over the existing (traditional) networks. In this study, an evolutionary approach into implementing a "Scalable IoT Data Transmission Network" (S-IoT-N) is proposed while leveraging on existing transport networks. Most Importantly, the proposed evolutionary approach attempts to address the above challenges by using open (existing) standards and by leveraging on the (traditional/existing) transport networks. The Proof-of-Concept (PoC) of the proposed S-IoT-N is attempted on a physical network testbed and is demonstrated along with basic network connectivity services over it. Finally, the results are validated by an experimental performance evaluation of the PoC physical network testbed along with the recommendations for improvement and future work.
39

Smart Contract for IoT in Hostile Environments

Morales Gomez, Marcelo 04 May 2022 (has links)
No description available.
40

Automated Monitoring for Data Center Infrastructure

Jafarizadeh, Mehdi January 2021 (has links)
Environmental monitoring using wireless sensors plays a key role in detecting hotspots or over-cooling conditions in a data center (DC). Despite a myriad of Data Center Wireless Sensor Network (DCWSN) solutions in literature, their adoption in DCs is scarce due to four challenges: low reliability, short battery lifetime, lack of adaptability, and labour intensive deployment. The main objective of this research is to address these challenges in our specifically designed hierarchical DCWSN, called Low Energy Monitoring Network (LEMoNet). LEMoNet is a two-tier protocol, which features Bluetooth Low Energy (BLE) for sensors communication in the first tier. It leverages multi-gateway packet reception in its second tier to mitigate the unreliability of BLE. The protocol has been experimentally validated in a small DC and evaluated by simulations in a midsize DC. However, since the main application of DCWSNs is in colocation and large DCs, an affordable and fast approach is still required to assess LEMoNet in large scale. As the first contribution, we develop an analytical model to characterize its scalability and energy efficiency in a given network topology. The accuracy of the model is validated through extensive event-driven simulations. Evaluation results show that LEMoNet can achieve high reliability in a network of 4800 nodes at a duty cycle of 15s. To achieve the network adaptability, we introduce and design SoftBLE, a Software-Defined Networking (SDN) based framework that provides controllability to the network. It takes advantages of advanced control knobs recently available in BLE protocol stacks. SoftBLE is complemented by two orchestration algorithms to optimize gateway and sensor parameters based on run-time measurements. Evaluation results from both an experimental testbed and a large-scale simulation study show that using SoftBLE, sensors consume 70% less power in data collection compared to those in baseline approaches while achieving the Packet Reception Rate (PRR) no less than 99.9%. One of its main steps of DCWSN commissioning is sensor localization, which is labour-intensive if is driven manually. To streamline the process, we devise a novel approach for automated sensor mapping. Since Radio Frequency (RF) alone is not a reliable data source for sensor localization in harsh and multi-path rich environments such as a DCs, we investigate using non-RF alternatives. Thermal Piloting is a classification model to correlate temperature sensor measurements with the expected thermal values at their locations. It achieves an average localization error of 0.64 meters in a modular DC testbed. The idea is further improved by a multimodal approach that incorporates pairwise Received Signal Strength (RSS) measurements of RF signals. The problem is formulated as Weighted Graph Matching (WGM) between an analytical graph and an experimental graph. A parallel algorithm is proposed to find heuristic solutions to this NP-hard problem, which is 30% more accurate than the baselines. The evaluation in a modular DC testbed shows that the localization errors using multi-modality are less than one-third of that of using thermal data alone. / Thesis / Candidate in Philosophy

Page generated in 0.1227 seconds