• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 597
  • 135
  • 42
  • 32
  • 14
  • 12
  • 9
  • 7
  • 7
  • 6
  • 4
  • 3
  • 2
  • 1
  • Tagged with
  • 959
  • 401
  • 380
  • 290
  • 268
  • 227
  • 207
  • 183
  • 181
  • 158
  • 155
  • 130
  • 103
  • 84
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
281

Converging over deterministic networks for an Industrial Internet / Converger sur des réseaux déterministes pour un Internet Industriel

Thubert, Pascal 16 March 2017 (has links)
En s'appuyant sur une connaissance précise du temps, sur la réservation de ressources et l'application distribuée de règles d'admission strictes, un réseau déterministe permet de transporter des flux pré-spécifiés avec un taux de perte extrêmement bas et une latence maximale majorée, ouvrant la voie au support d'applications critiques et/ou temps-réel sur une infrastructure de réseau convergée. De nos jours, la Technologie Opérationnelle (OT) s'appuie sur des réseaux déterministes mais conçus à façon, en général propriétaires, utilisant typiquement des liens série spécifiques, et opérés en isolation les uns des autres, ce qui multiplie la complexité physique et les coûts d'achat et de déploiement (CAPEX), ainsi que d'opération et maintenance (OPEX), et empêche l'utilisation agile des ressources. En apportant le déterminisme dans les réseaux des Technologies de l'Information (IT), une nouvelle génération de réseaux commutés de l'IT va permettre l'émulation de ces liens série et la convergence de réseaux autrefois dédiés sur une infrastructure commune à base d'IP. En retour, la convergence de l'IT et de l'OT permettra de nouvelles optimisations industrielles, en introduisant des technologies héritées de l'IT, comme le BigData et la virtualisation des fonctions du réseau (NFV), en support des opérations de l'OT, améliorant les rendements tout en apportant une réduction supplémentaire des coûts. Les solutions de réseaux déterministes réclament des possibilités nouvelles de la part des équipements, possibilités qui vont bien au-delà de celles demandées pour les besoins classiques de la QoS. Les attributs-clé sont : - la synchronisation précise de tous les n'uds, en incluant souvent la source et la destination des flux- le calcul centralisé de chemins de bout en bout à l'échelle du réseau- de nouveaux filtres de mise en forme du trafic à l'intérieur comme à l'entrée du réseau afin de le protéger en tous points- des moyens matériels permettant l'accès au medium à des échéances précises. Au travers de multiples papiers, de contributions à des standards, et de publication de propriété industrielle, le travail présenté ici repousse les limites des réseaux industriels sans fils en offrant : 1. Le calcul centralisé de chemin complexes basé sur une technologie innovante appelée ARC 2. La signalisation de ces chemins complexes et la traçabilité des paquets par une extension de la technologie BIER-TE 3. Réplication, Renvoi et Elimination des doublons le long de ces chemins complexes 4. Un temps-réel basé sur un échéancier qui assure un haut taux de délivrance et garantit une latence bornée 5. La capacité de transporter à la fois des flux déterministes et du trafic IPv6 à multiplexage statistique sur un maillage 6TiSCH partagéCe manuscrit rapporte des améliorations apportées aux techniques existantes des réseaux sans fils à basse puissance (LoWPAN) comme Zigbee, WirelessHART'et ISA100.11a, afin d'amener ces nouveaux bénéfices jusqu'aux réseaux opérationnels sans fil. Elle a été implémentée en programme et sur du matériel open-source, et évaluée face à du IEEE Std. 802.15.4 classique ainsi que du 802.15.4 TSCH, utilisés en topologie maillée. L'expérience menée montre que notre nouvelle proposition permet d'éviter les à-coups et de garantir des taux élevés de délivrance, même face à des évènements exceptionnels comme la perte d'un relais ou la dégradation temporaire d'un lien radio. / Based on time, resource reservation, and policy enforcement by distributed shapers, Deterministic Networking provides the capability to carry specified unicast or multicast data streams for real-time applications with extremely low data loss rates and bounded latency, so as to support time-sensitive and mission-critical applications on a converged enterprise infrastructure.As of today, deterministic Operational Technology (OT) networks are purpose-built, mostly proprietary, typically using serial point-to-point wires, and operated as physically separate networks, which multiplies the complexity of the physical layout and the operational (OPEX) and capital (CAPEX) expenditures, while preventing the agile reuse of the compute and network resources.Bringing determinism in Information Technology (IT) networks will enable the emulation of those legacy serial wires over IT fabrics and the convergence of mission-specific OT networks onto IP. The IT/OT convergence onto Deterministic Networks will in turn enable new process optimization by introducing IT capabilities, such as the Big Data and the network functions virtualization (NFV), improving OT processes while further reducing the associated OPEX.Deterministic Networking Solutions and application use-cases require capabilities of the converged network that is beyond existing QOS mechanisms.Key attributes of Deterministic Networking are: - Time synchronization on all the nodes, often including source and destination - The centralized computation of network-wide deterministic paths - New traffic shapers within and at the edge to protect the network- Hardware for scheduled access to the media.Through multiple papers, standard contribution and Intellectual Property publication, the presented work pushes the limits of wireless industrial standards by providing: 1. Complex Track computation based on a novel ARC technology 2. Complex Track signaling and traceability, extending the IETF BIER-TE technology 3. Replication, Retry and Duplicate Elimination along the Track 4. Scheduled runtime enabling highly reliable delivery within bounded time 5. Mix of IPv6 best effort traffic and deterministic flows within a shared 6TiSCH mesh structureThis manuscript presents enhancements to existing low power wireless networks (LoWPAN) such as Zigbee, WirelessHART¿and ISA100.11a to provide those new benefits to wireless OT networks. It was implemented on open-source software and hardware, and evaluated against classical IEEE Std. 802.15.4 and 802.15.4 TSCH radio meshes. This manuscript presents and discusses the experimental results; the experiments show that the proposed technology can guarantee continuous high levels of timely delivery in the face of adverse events such as device loss and transient radio link down.
282

Machine Learning with Reconfigurable Privacy on Resource-Limited Edge Computing Devices / Maskininlärning med Omkonfigurerbar Integritet på Resursbegränsade Edge-datorenheter

Tania, Zannatun Nayem January 2021 (has links)
Distributed computing allows effective data storage, processing and retrieval but it poses security and privacy issues. Sensors are the cornerstone of the IoT-based pipelines, since they constantly capture data until it can be analyzed at the central cloud resources. However, these sensor nodes are often constrained by limited resources. Ideally, it is desired to make all the collected data features private but due to resource limitations, it may not always be possible. Making all the features private may cause overutilization of resources, which would in turn affect the performance of the whole system. In this thesis, we design and implement a system that is capable of finding the optimal set of data features to make private, given the device’s maximum resource constraints and the desired performance or accuracy of the system. Using the generalization techniques for data anonymization, we create user-defined injective privacy encoder functions to make each feature of the dataset private. Regardless of the resource availability, some data features are defined by the user as essential features to make private. All other data features that may pose privacy threat are termed as the non-essential features. We propose Dynamic Iterative Greedy Search (DIGS), a greedy search algorithm that takes the resource consumption for each non-essential feature as input and returns the most optimal set of non-essential features that can be private given the available resources. The most optimal set contains the features which consume the least resources. We evaluate our system on a Fitbit dataset containing 17 data features, 4 of which are essential private features for a given classification application. Our results show that we can provide 9 additional private features apart from the 4 essential features of the Fitbit dataset containing 1663 records. Furthermore, we can save 26:21% memory as compared to making all the features private. We also test our method on a larger dataset generated with Generative Adversarial Network (GAN). However, the chosen edge device, Raspberry Pi, is unable to cater to the scale of the large dataset due to insufficient resources. Our evaluations using 1=8th of the GAN dataset result in 3 extra private features with up to 62:74% memory savings as compared to all private data features. Maintaining privacy not only requires additional resources, but also has consequences on the performance of the designed applications. However, we discover that privacy encoding has a positive impact on the accuracy of the classification model for our chosen classification application. / Distribuerad databehandling möjliggör effektiv datalagring, bearbetning och hämtning men det medför säkerhets- och sekretessproblem. Sensorer är hörnstenen i de IoT-baserade rörledningarna, eftersom de ständigt samlar in data tills de kan analyseras på de centrala molnresurserna. Dessa sensornoder begränsas dock ofta av begränsade resurser. Helst är det önskvärt att göra alla insamlade datafunktioner privata, men på grund av resursbegränsningar kanske det inte alltid är möjligt. Att göra alla funktioner privata kan orsaka överutnyttjande av resurser, vilket i sin tur skulle påverka prestanda för hela systemet. I denna avhandling designar och implementerar vi ett system som kan hitta den optimala uppsättningen datafunktioner för att göra privata, med tanke på begränsningar av enhetsresurserna och systemets önskade prestanda eller noggrannhet. Med hjälp av generaliseringsteknikerna för data-anonymisering skapar vi användardefinierade injicerbara sekretess-kodningsfunktioner för att göra varje funktion i datasetet privat. Oavsett resurstillgänglighet definieras vissa datafunktioner av användaren som viktiga funktioner för att göra privat. Alla andra datafunktioner som kan utgöra ett integritetshot kallas de icke-väsentliga funktionerna. Vi föreslår Dynamic Iterative Greedy Search (DIGS), en girig sökalgoritm som tar resursförbrukningen för varje icke-väsentlig funktion som inmatning och ger den mest optimala uppsättningen icke-väsentliga funktioner som kan vara privata med tanke på tillgängliga resurser. Den mest optimala uppsättningen innehåller de funktioner som förbrukar minst resurser. Vi utvärderar vårt system på en Fitbit-dataset som innehåller 17 datafunktioner, varav 4 är viktiga privata funktioner för en viss klassificeringsapplikation. Våra resultat visar att vi kan erbjuda ytterligare 9 privata funktioner förutom de 4 viktiga funktionerna i Fitbit-datasetet som innehåller 1663 poster. Dessutom kan vi spara 26; 21% minne jämfört med att göra alla funktioner privata. Vi testar också vår metod på en större dataset som genereras med Generative Adversarial Network (GAN). Den valda kantenheten, Raspberry Pi, kan dock inte tillgodose storleken på den stora datasetet på grund av otillräckliga resurser. Våra utvärderingar med 1=8th av GAN-datasetet resulterar i 3 extra privata funktioner med upp till 62; 74% minnesbesparingar jämfört med alla privata datafunktioner. Att upprätthålla integritet kräver inte bara ytterligare resurser utan har också konsekvenser för de designade applikationernas prestanda. Vi upptäcker dock att integritetskodning har en positiv inverkan på noggrannheten i klassificeringsmodellen för vår valda klassificeringsapplikation.
283

Discrete Control in the Internet of things and Smart Environments through a Shared Infrastructure / Contrôle Discret pour l’Internet des Objets et les Environnements Intelligents au travers d'une infrastructure partagée

Zhao, Mengxuan 07 May 2015 (has links)
L'Internet des Objets (IdO) et les Environnements Intelligents (EI) ont attiré beaucoup d'activités de recherche et développement au cours de la dernière décennie. Pourtant, de nombreuses applications IdO/EI d'aujourd'hui sont encore limitées à l'acquisition et au traitement des données de capteurs et de leur contexte, avec un contrôle, le cas échéant, utilisant soit des solutions de base ou demandant l'intervention humaine, loin du contrôle automatique qui est un facteur essentiel de promouvoir ces technologies. Cette thèse vise à apporter le savoir-faire de la théorie du contrôle et des systèmes réactifs dans le domaine IdO/EI pour arriver à une solution avec une méthode formelle pour l'aspect de contrôle qui fait défaut. Nous proposons l'extension d'un canevas logiciel pour une infrastructure générique et partagée IdO/EI qui offre des interfaces de haut niveau pour réduire l'effort de conception, et qui permet l'auto-configuration et l'adaptation des applications de contrôle sur des propriétés génériques de l'environnement sans intervention humaine en utilisant les connaissances générales sur le domaine qui s'appliquent à chaque instance cible de système IdO/EI. Dans cette infrastructure étendue, les entités physiques individuelles (y compris toutes les "choses", appareils électriques et sous-ensembles de l'espace) peuvent être regroupées comme des entités virtuelles par des propriétés communes afin de fournir un niveau d'abstraction plus élevé pour le contrôle et d'autres applications, ainsi qu'une meilleure adaptation aux changements des configurations au niveau inférieur. Sur le requis d'une solution générique et commun dénominateur partagée par toutes les applications de l'IdO/EI dans un environnement donné, nous proposons pour cette infrastructure, de modéliser les entités cibles supervisées et contrôlées, y compris les entités individuelles et de leurs regroupements, ainsi que les choses et les entités spatiales, par des automates à états finis, pour être en mesure d'appliquer la technique de la synthèse des contrôleur discrets (SCD) aux différents niveaux d'abstraction et de granularité. SCD est une méthode formelle qui construit automatiquement un contrôleur, s'il existe, en assurant les objectifs de contrôle exigés concernant le modèle de comportement du système donné en termes d'automates parallèles synchrones. Les langages de programmation BZR et les outils Sigali existants sont utilisés pour effectuer la SCD et de générer un contrôleur de manière automatique. Les modules logiciels nécessaires sont proposés dans l'implémentation tels que le module de maintenance de relation qui garde une association correcte entre les instances d'entités individuelles et les groupes, et répercute des commandes d'action du contrôle de haut niveau aux actionneurs correspondants. Ce module est destiné à évoluer plus tard vers une solution plus générique comme une base de données graphes comprenant à la fois la base de connaissances générales et relations spécifiques d'instance environnement. La résolution des conflits entre les objectifs de contrôle venant de contrôleurs concurrent est également indispensable en raison des objectifs de l'ouverture de la plateforme. Un simulateur de contexte basé sur Java a été développé pour simuler l'environnement de la maison au sein de plusieurs scénarios proposés pour la validation, tels que le contrôle de la charge électrique et l'adaptation au contexte de l'activité. / The Internet of Things (IoT) and Smart Environments (SE) have attracted a lot of research and development activities during the last decade. Yet many present-day IoT/SE applications are still limited to the acquisition and processing of sensor data and its context, with control, if any, using either basic solutions or requiring human intervention, far away from the automatic control which is an essential factor to promote the technologies. This thesis targets to bring knowhow from control theory and reactive systems to the IoT/SE domain to achieve a solution with a formal method for the missing control aspect. We propose the extension of a framework in order to build a shared generic IoT/SE infrastructure offering high-level interfaces to reduce design effort, and enabling the self-configuration and adaptation of control applications over generic properties of the environment without human interaction by using general knowledge over the domain that applies to each target instance of IoT/SE system. In this extended framework, individual physical entities (including all relevant "things", appliances and subsets of space) may be grouped as virtual entities by shared properties to provide a higher level abstraction for control and other applications and better adaptation to lower level configuration changes. Requiring a generic common denominator solution shared by all IoT/SE applications in a given environment, we propose for this infrastructure, to model by finite state automata the target entities to be monitored and controlled, including both individual entities and their groupings, as well as things and space entities, to be able to apply discrete controller synthesis (DCS) technique over any of these at different levels of abstraction and granularity. DCS is a formal method which constructs automatically a controller, if it exists, guaranteeing the required control objectives regarding to the given system behavior model in terms of synchronous parallel automata. The existing BZR programming language and Sigali tools are employed to perform DCS and generate a controller in an automatic way. Necessary supporting software modules are proposed in the implementation such as the relation maintenance module keeping the correct association between individual entity instances and groups, and dispatching the action orders from the high level control to corresponding actuators. This module would evolve later to a more generic solution such as a graph data base including both the general knowledge base and specific environment instance relations. Conflict resolution between objectives of control coming from concurrent controllers is also indispensable due to the intended openness of the platform. A java based context simulator has been developed to simulate the home environment within several scenarios proposed for the validation, such as electrical load control and activity context adaptation.
284

Cost Structure of IoT Connectivity Services

Lin, Lu January 2019 (has links)
This thesis is a techno-economic study focus on the IoT connectivity service field. It describes the specifications of LPWAN, LPLAN, and Cellular-IoT technologies. The analysis method of dimensioning and cost structure calculation of IoT network is enhanced from previous wireless network research, which is also a research gap in the telecom industry. By using this method, the dimensioning results and cost structure performances can be obtained when having the inputs of the scenario. The results are compared among SigFox, LoRaWAN, NB-IoT, LTE-M, EC-GSM-IoT, and WiFi-HaLow. Furthermore, we find out the cost driver of different technologies. When it comes to different actors, a new market entrant or an incumbent, the strategies taken by the actors are compared. They are building own sites or leasing sites from other actors, even reusing sites if possible. The contribution of this thesis is pointing out the dimensioning and cost structure calculation method of deploying IoT connectivity. Another contribution is comparing the cost performance and figuring out the cost driver. SigFox is costefficient for low capacity scenario, while LTE-M is of good cost performance for high capacity cases. The cost driver is operation and maintenance cost and site build cost. By leasing and reusing sites, the site build cost can be largely reduced. / Denna avhandling har ett ekonomiskt och tekniskt perspektiv på anslutningstjänsten IoT. Den beskriver specifikationerna för LPWAN, LPLAN och Cellular-IoT teknik. Analysmetoden för dimensionering och beräkning av kostnadsstruktur av IoT-nätet har förbättrats jämfört med tidigare trådlös nätverksforskning, vilket i sig är ett område som saknar tillräcklig forskning inom telekombranschen. Genom att använda den här metoden kan dimensioneringens resultat och prestandan av kostnadsstrukturen erhållas när indata finns tillgängligt för olika fall/scenarion. Resultaten jämförs bland SigFox, LoRaWAN, NB-IoT, LTE-M, EC-GSM-IoT och WiFi-HaLow. Dessutom hittar vi kostnadsdrivaren av olika teknologier. När det gäller olika aktörer, en ny marknadsaktör eller en etablerad aktör, jämförs de olika strategier som aktörerna använder. De bygger egna basstationer eller leasar basstationer från andra aktörer, och i vissa fall även återanvändning av basstationer om så är möjligt. Denna avhandling bidrar till att peka ut beräkningsmetoden för dimensioneringen och kostnadsstruktur av att bygga ut IoT-anslutningar. En annan slutsats är jämförelsen av kostnadseffektiviteten mellan olika teknologier och att komma underfund med kostnadsdrivaren. SigFox är kostnadseffektiv i fallen där kapaciteten är låg, medan LTE-M har bra kostnadseffektivitet i fallen där kapaciteten är hög. Kostnadsdrivaren är driftoch underhållskostnad samt kostnad för konstruktionen av byggplatsen. Genom att leasa och återanvända basstationer kan kostanden för konstruktionen av byggplatsen minskas till en stor del.
285

Intercloud-Kommunikation für Mehrwehrtdienste von Cloud-basierten Architekturen im Internet of Things

Grubitzsch, Philipp 06 June 2018 (has links) (PDF)
Das Internet of Things (IoT) ist aktuell ein junger Wachstumsmarkt, dessen Bedeutung für unsere Gesellschaft in naher Zukunft vielen Menschen erst noch wirklich bewusst werden wird. Die Subdomänen Smart-Home, Smart-Grid, Smart-Mobility, Industrie 4.0, Smart-Health und viele mehr sind wichtig für unsere zukünftige Wettbewerbsfähigkeit, die Herausforderungen zur Bewältigung des Klimawandels, unsere Gesundheit, aber auch für trivialere Dinge wie Komfort. Andererseits ergibt sich hierbei bereits dasselbe große Problem, das in einer ähnlichen Form schon bei klassischem Cloud-Computing bekannt ist: Vendor-Silos, die keinen hersteller- oder anbieterübergreifenden Austausch von Gerätedaten ermöglichen, verhindern eine schnelle Verbreitung dieser neuen Technologie. Diensteanbieter müssen ihre Produkte aufwendig für unzählige Technologien bereitstellen, was die Entwicklung von Diensten unnötig teuer macht und letztendlich das Dienstangebot insgesamt einschränkt. Cloud-Computing wird dabei in Zukunft eine wichtige Rolle spielen. Die Dissertation beschäftigt sich daher mit dem Problem IoT-Gerätedaten an IoT-Clouds plattformübergreifend und anbieterübergreifend nutzbar zu machen. Die Motivation und die adressierte Forschungslücke zeigen die Notwendigkeit der Beschäftigung mit dem Thema auf. Ausgehend davon, wird das Konzept einer dezentral organisierten IoT-Intercloud vorgeschlagen, welches in der Lage ist heterogene IoT-Clouds zu integrieren. Die Analyse des Standes der Technik zeigt, das IoT-Clouds genügend Eigenschaften teilen, um in Zukunft eine Adaption zu einer einheitlichen Schnittstelle für die IoT-Intercloud zu schaffen. Das Konzept umfasst zunächst die Komponentenarchitektur eines Intercloud-Brokers zur Etablierung einer IoT-Intercloud. Ausgehend davon wird in vertiefenden Teilkonzepten ein Discovery-Service zum Finden von Gerätedaten und einem Push-Stream-Provider, für die Zustellung von IoT-Event-Notifications in Echtzeit, behandelt. Eine Evaluation zeigt letztlich die praxistaugliche Realisierbarkeit, Skalierbarkeit und Performance der Konzeption und des implementierten Prototyps.
286

Discrete Control in the Internet of things and Smart Environments through a Shared Infrastructure / Contrôle Discret pour l’Internet des Objets et les Environnements Intelligents au travers d'une infrastructure partagée

Zhao, Mengxuan 07 May 2015 (has links)
L'Internet des Objets (IdO) et les Environnements Intelligents (EI) ont attiré beaucoup d'activités de recherche et développement au cours de la dernière décennie. Pourtant, de nombreuses applications IdO/EI d'aujourd'hui sont encore limitées à l'acquisition et au traitement des données de capteurs et de leur contexte, avec un contrôle, le cas échéant, utilisant soit des solutions de base ou demandant l'intervention humaine, loin du contrôle automatique qui est un facteur essentiel de promouvoir ces technologies. Cette thèse vise à apporter le savoir-faire de la théorie du contrôle et des systèmes réactifs dans le domaine IdO/EI pour arriver à une solution avec une méthode formelle pour l'aspect de contrôle qui fait défaut. Nous proposons l'extension d'un canevas logiciel pour une infrastructure générique et partagée IdO/EI qui offre des interfaces de haut niveau pour réduire l'effort de conception, et qui permet l'auto-configuration et l'adaptation des applications de contrôle sur des propriétés génériques de l'environnement sans intervention humaine en utilisant les connaissances générales sur le domaine qui s'appliquent à chaque instance cible de système IdO/EI. Dans cette infrastructure étendue, les entités physiques individuelles (y compris toutes les "choses", appareils électriques et sous-ensembles de l'espace) peuvent être regroupées comme des entités virtuelles par des propriétés communes afin de fournir un niveau d'abstraction plus élevé pour le contrôle et d'autres applications, ainsi qu'une meilleure adaptation aux changements des configurations au niveau inférieur. Sur le requis d'une solution générique et commun dénominateur partagée par toutes les applications de l'IdO/EI dans un environnement donné, nous proposons pour cette infrastructure, de modéliser les entités cibles supervisées et contrôlées, y compris les entités individuelles et de leurs regroupements, ainsi que les choses et les entités spatiales, par des automates à états finis, pour être en mesure d'appliquer la technique de la synthèse des contrôleur discrets (SCD) aux différents niveaux d'abstraction et de granularité. SCD est une méthode formelle qui construit automatiquement un contrôleur, s'il existe, en assurant les objectifs de contrôle exigés concernant le modèle de comportement du système donné en termes d'automates parallèles synchrones. Les langages de programmation BZR et les outils Sigali existants sont utilisés pour effectuer la SCD et de générer un contrôleur de manière automatique. Les modules logiciels nécessaires sont proposés dans l'implémentation tels que le module de maintenance de relation qui garde une association correcte entre les instances d'entités individuelles et les groupes, et répercute des commandes d'action du contrôle de haut niveau aux actionneurs correspondants. Ce module est destiné à évoluer plus tard vers une solution plus générique comme une base de données graphes comprenant à la fois la base de connaissances générales et relations spécifiques d'instance environnement. La résolution des conflits entre les objectifs de contrôle venant de contrôleurs concurrent est également indispensable en raison des objectifs de l'ouverture de la plateforme. Un simulateur de contexte basé sur Java a été développé pour simuler l'environnement de la maison au sein de plusieurs scénarios proposés pour la validation, tels que le contrôle de la charge électrique et l'adaptation au contexte de l'activité. / The Internet of Things (IoT) and Smart Environments (SE) have attracted a lot of research and development activities during the last decade. Yet many present-day IoT/SE applications are still limited to the acquisition and processing of sensor data and its context, with control, if any, using either basic solutions or requiring human intervention, far away from the automatic control which is an essential factor to promote the technologies. This thesis targets to bring knowhow from control theory and reactive systems to the IoT/SE domain to achieve a solution with a formal method for the missing control aspect. We propose the extension of a framework in order to build a shared generic IoT/SE infrastructure offering high-level interfaces to reduce design effort, and enabling the self-configuration and adaptation of control applications over generic properties of the environment without human interaction by using general knowledge over the domain that applies to each target instance of IoT/SE system. In this extended framework, individual physical entities (including all relevant "things", appliances and subsets of space) may be grouped as virtual entities by shared properties to provide a higher level abstraction for control and other applications and better adaptation to lower level configuration changes. Requiring a generic common denominator solution shared by all IoT/SE applications in a given environment, we propose for this infrastructure, to model by finite state automata the target entities to be monitored and controlled, including both individual entities and their groupings, as well as things and space entities, to be able to apply discrete controller synthesis (DCS) technique over any of these at different levels of abstraction and granularity. DCS is a formal method which constructs automatically a controller, if it exists, guaranteeing the required control objectives regarding to the given system behavior model in terms of synchronous parallel automata. The existing BZR programming language and Sigali tools are employed to perform DCS and generate a controller in an automatic way. Necessary supporting software modules are proposed in the implementation such as the relation maintenance module keeping the correct association between individual entity instances and groups, and dispatching the action orders from the high level control to corresponding actuators. This module would evolve later to a more generic solution such as a graph data base including both the general knowledge base and specific environment instance relations. Conflict resolution between objectives of control coming from concurrent controllers is also indispensable due to the intended openness of the platform. A java based context simulator has been developed to simulate the home environment within several scenarios proposed for the validation, such as electrical load control and activity context adaptation.
287

[en] A REAL-TIME REASONING SERVICE FOR THE INTERNET OF THINGS / [pt] UM SERVIÇO DE RACIOCÍNIO COMPUTACIONAL EM TEMPO REAL PARA A INTERNET DAS COISAS

RUHAN DOS REIS MONTEIRO 17 January 2019 (has links)
[pt] O crescimento da Internet das Coisas (IoT) nos trouxe a oportunidade de criar aplicações em diversas áreas com o uso de sensores e atuadores. Um dos problemas encontrados em sistemas de IoT é a dificuldade de adicionar relações semânticas aos dados brutos produzidos por estes sensores e conseguir inferir novos fatos a partir destas relações. Além disso, devido à natureza destes sistemas, os dados produzidos por eles, conhecidos como streams, precisam ser analisados em tempo real. Streams são uma sequência de elementos de dados com variação de tempo e que não devem ser tratados como dados a serem armazenados para sempre e consultados sob demanda. Os dados em streaming precisam ser consumidos rapidamente por meio de consultas contínuas que analisam e produzem novos dados relevantes. A capacidade de inferir novas relações semânticas sobre dados em streaming é chamada de inferência sobre streams. Nesta pesquisa, propomos um modo semântico e um mecanismo para processamento e inferência sobre streams em tempo real baseados em Processamento de Eventos Complexos (CEP), RDF (Resource Description Framework) e OWL (Web Ontology Language). Apresentamos um middleware que suporta uma inferência contínua sobre dados produzidores por sensores. As principais vantagens de nossa abodagem são: (a) considerar o tempo como uma relação-chave entre a informação; (b) processamento de fluxo por ser implementado usando o CEP; (c) é geral o suficiente para ser aplicado a qualquer sistema de gerenciamento de fluxo de dados (DSMS). Foi desenvolvido no Laboratório de Colaboração Avançada (LAC) utlizando e um estudo de caso no domínio da detecção de incêndio é conduzido e implementado, elucidando o uso de inferência em tempo real sobre streams. / [en] The growth of the Internet of Things (IoT) has brought the opportunity to create applications in several areas, with the use of sensors and actuators. One of the problems encountered in IoT systems is the difficulty of adding semantic relations to the raw data produced by the sensors and being able to infer new facts from these relations. Moreover, due to the fact that many IoT applications are online and need to react instantly on sensor data collected by them, they need to be analyzed in real-time. Streams are a sequence of time-varying data elements that should not be stored forever and queried on demand. Streaming data needs to be consumed quickly through ongoing queries that continue to analyze and produce new relevant data, i.e. stream of output/result events. The ability to infer new semantic relationships over streaming data is called Stream Reasoning. We propose a semantic model and a mechanism for real-time data stream processing and reasoning based on Complex Event Processing (CEP), RDF (resource description structure) and OWL (Web Ontology Language). This work presents a middleware service that supports continuous reasoning on data produced by sensors. The main advantages of our approach are: (a) to consider time as a key relationship between information; (b) flow processing can be implemented using CEP; (c) is general enough to be applied to any data flow management system (DSMS). It was developed in the Advanced Collaboration Laboratory (LAC) and a case study in the field of fire detection is conducted and implemented, elucidating the use of real-time inference on streams.
288

Desenvolvimento de antena CPW em substrato têxtil em estrutura de malha para utilização em sistemas de indentificação por rádio frequência

Oliveira, Alexandre Henrique Soares de 07 April 2017 (has links)
Submitted by Lara Oliveira (lara@ufersa.edu.br) on 2017-07-10T22:31:35Z No. of bitstreams: 1 AlexandreHSO_DISSERT.pdf: 4241907 bytes, checksum: 7c578927aa89afb44e48b7e51e99d120 (MD5) / Approved for entry into archive by Vanessa Christiane (referencia@ufersa.edu.br) on 2017-07-18T15:08:29Z (GMT) No. of bitstreams: 1 AlexandreHSO_DISSERT.pdf: 4241907 bytes, checksum: 7c578927aa89afb44e48b7e51e99d120 (MD5) / Approved for entry into archive by Vanessa Christiane (referencia@ufersa.edu.br) on 2017-07-18T15:08:46Z (GMT) No. of bitstreams: 1 AlexandreHSO_DISSERT.pdf: 4241907 bytes, checksum: 7c578927aa89afb44e48b7e51e99d120 (MD5) / Made available in DSpace on 2017-07-18T15:09:43Z (GMT). No. of bitstreams: 1 AlexandreHSO_DISSERT.pdf: 4241907 bytes, checksum: 7c578927aa89afb44e48b7e51e99d120 (MD5) Previous issue date: 2017-04-07 / Fundação de Apoio à Pesquisa do RN / The knitted fabrics have elastic, easy production and malleability properties, these characteristics be useful in the design of flexible antennas, that can be used in a RFID tag, for example. The mean objective of this work is development of antenna with a Coplanar Waveguide fed (CPW), in a textile knitted substrate, for use in active RFID systems in microwave frequency of 2.45 GHz. From the characterization of the electrical properties by a Vector Networks Analyzer and one with a Dielectric Probe kit, obtained the values of Electrical Permissiveness and Loss Tangent, in sequence was carried out the characterization of the textile properties of Linear Density, Basis weight, Dimensional stability and Tensile Strength, based on the data obtained in characterization process, was chosen two fabrics with properties favorable to the design, modeling and construction of antennas. After the selection of the tissues, simulations were performed on Ansys HFSStm (High Frequency Structural Simulator) to obtain the parameters of Return Loss, Radiation Diagram, Current Density, Impedance, Gain and VSWR, as well as dimensional optimization of the antennas. Two CPW-fed antennas were simulated, one on textile substrate made from Soybean Protein Fibers (SPF) and the other with Polypropylene with corn Polylactic Acid fibers (PP + PLA). Based on the simulations, two antennas with their respective textile substrates were constructed and using a vector network analyzer, the return loss and the impedance shown by the Smith Chart were measured. Both showed a return loss below -10dB for central design frequency and wide bandwidth. The simulated and measured results were compared, analyzing them according to the specialized reading in the area. Showing the feasibility of developing CPW antennas in knitted fabrics for active RFID systems, in addition to the possibility of interoperability in internet of things (IoT) communication systems / Os tecidos de malha apresentam propriedades de elasticidade, facilidade de fabricação e maleabilidade, devido a estas características a utilização desse tipo de tecido traz vantagens na fabricação de antenas para aplicação no desenvolvimento de uma tag RFID. O presente trabalho tem como objetivo desenvolver antenas com guias de ondas coplanares (CPW), em substrato têxtil em estruturas de malha, para utilização em sistemas ativos de Identificação por Rádio Frequência, RFID, para frequência de operação em micro-ondas de 2,45 GHz. Foi realizada a caracterização das propriedades elétricas por meio de um Analisador de Redes Vetoriais e com uma sonda de medição de matérias dielétricos, obtive-se então os valores de Permissividade elétrica e Tangentes de perdas, em sequência foi realizada a caracterização das propriedades têxteis de Título, Gramatura, Estabilidade Dimensional e Resistência a tração, com base nos dados obtidos no processo de caracterização se elegeu dois tecidos com propriedades favoráveis ao projeto, modelagem e construção das antenas têxteis. Após a seleção dos tecidos foram feitas simulações no Ansys HFSS® (High Frequency Strucutural Simulator) para obtenção dos parâmetros de Perda de retorno, Diagrama de radiação, Densidade de corrente, Impedância, Ganho e VSWR, além da otimização dimensional das antenas. Foram simuladas duas antenas CPW, uma em substrato têxtil feito de fibras de Proteína de Soja (SPF) e outra com fibras de Polipropileno com Ácido Polilático de Milho (PP+PLA). Com base nas simulações foram construídas duas antenas com os respectivos substratos têxteis e utilizando um analisador de redes vetoriais foram medidos a perda de retorno e a impedância, mostrada por meio da Carta de Smith. Ambas apresentaram uma perda de retorno abaixo de -10 dB para frequência central de projeto e uma alta largura de banda. Foi realizada a comparação dos resultados simulados e os efetivamente medidos, analisando-os de acordo com a literatura especializada na área. Mostrando a viabilidade do desenvolvimento de antenas CPW em tecidos de malha para sistemas RFID ativos, além da possibilidade da interoperabilidade em sistemas de comunicação por Internet das coisas, Internet of Things, IoT / 2017-07-10
289

Införandet av General Data Protection Regulation och dess påverkan på svenska företag / The introduction of General Data Protection Regulation and its impact on Swedish companies

Landström, Peter, Ulvegärde Rombouts, Julia January 2018 (has links)
I dagsläget har en individ väldigt lite kontroll över den persondata som samlas in och hur den används och vem som hanterar den. Detta vill EU ändra på med den nya dataskyddsförordningen General Data Protection Regulation (GDPR) som träder i kraft nästa år. De nya reglerna innefattar en större kontroll för individen över den data som har samlats av företag. Förordningen tvingar företag att strukturera om sina system så de är förenliga med GDPR. Då höga bötesbelopp kan drabba de företag som inte följer reglerna blir alla de som hanterar personuppgifter tvungna att se över sina processer över hanteringen. Uppsatsen har som syfte att undersöka hur väl förberedda svenska medelstora till stora företag är ett år innan införandet av GDPR och hur de arbetar med förändringarna ur ett tekniskt perspektiv, ett organisatoriskt perspektiv samt ur ett juridiskt perspektiv. Med ett teoretiskt fundament som grund genomfördes intervjuer på tre olika företag som hanterar personuppgifter i sina system, både som personuppgiftsansvariga och som personuppgiftsbiträden. Resultatet av studien användes för att designa en utvärderingsmodell som företag kan använda ett år efter införandet av GDPR. Utvärderingen kommer att skapa en överblick på hur väl övergången har gått och om det finns några områden som behöver ytterligare arbete. De slutsatser som drogs var att det fanns en del frågetecken gällande hur de tekniska lösningarna skulle se ut för att vara i linje med GDPR, de juridiska frågorna hanterades till stor del med hjälp av biträdesavtal mellan personuppgiftsansvariga, personuppgiftsbiträden och tredje part. Ur ett organisatoriskt perspektiv var det utbildning av personal och kunskap om GDPR och de ändringar i arbetssätt som detta medför. / At present an individual has very little control over the personal data collected, how it is used and who manages it. This is something the EU wants to change with the new General Data Protection Regulation (GDPR), which will come into force next year. The new regulation includes greater control for the individual regarding the data collected by companies. The Regulation forces companies to restructure their systems so that they are compliant with GDPR. Since high sanctions may affect those companies that do not comply with the rules, all those who handle personal data will have to review the processes that relate to the handling of personal data. The aim of this thesis is to investigate how well prepared Swedish medium to large sized companies are one year before the introduction of GDPR. The thesis focuses on how companies work with the changes from a technical perspective, an organizational perspective and from a legal perspective. With a theoretical foundation as a basis, interviews were conducted on three different companies that handle personal data, both as data controller and as data processor. The result of the study was used to design an evaluation model that companies can use one year after the introduction of GDPR. The evaluation will provide an overview of how well the transition has been and if there are any areas that need further work. There were some uncertainties regarding how the technical solutions would need to be designed and implemented to help the company being compliant with GDPR. The legal issues were largely handled through processing agreements between data controllers, data processors and third parties. The organizational perspective meant training of staff and questions regarding how to raise awareness about GDPR and the changes in working practices.
290

Seleção de Sensores em Redes de Sensores Sem Fio Heterogêneas para Cidades Inteligentes

Siqueira Júnior, Francisco de Assis 30 August 2016 (has links)
Submitted by Fernando Souza (fernandoafsou@gmail.com) on 2017-08-15T13:33:40Z No. of bitstreams: 1 arquivototal.pdf: 1946583 bytes, checksum: 46b84a872476f284510477eeb33e3b91 (MD5) / Made available in DSpace on 2017-08-15T13:33:40Z (GMT). No. of bitstreams: 1 arquivototal.pdf: 1946583 bytes, checksum: 46b84a872476f284510477eeb33e3b91 (MD5) Previous issue date: 2016-08-30 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / Despite being a well-established technology, research inWireless Sensor Networks (WSNs) are facing challenges due to its intrinsic connection to the paradigms of Smart Cities and IoT (Internet of Things - IoT). Traditionally, WSNs are deployed to meet the needs of a single application and are composed of sensors with the same physical characteristics. However, when considering smart environments, where several objects can collect data, trigger actions and interact with each other in order to provide sophisticated services, it is easy to see the diversity of the applications that can perform requests in such environments. It is also possible that different types of equipment interact with each other, such as sensors with different physical characteristics, thus creating a Heterogeneous WSN (HWSN). For this reason, this work aims to contribute to the management of HWSNs in Smart Cities environments by proposing an approach for dynamic and on-demand selection of sensors. This selection is performed by taking into account the physical characteristics of the sensors and the applications’ demands. This approach has been integrated into the POlicy-based Sensor SElection in Heterogeneous Wireless Sensor Network framework (POSSE-HWSN), which was implemented in order validate the proposal. Tests have shown that by using POSSE-HWSN it was possible to select the sensors with the most suitable hardware features to meet every application needs, thus improving the selection efficacy. / Apesar de ser uma tecnologia já consolidada, pesquisas em Redes de Sensores Sem Fio (RSSFs) vêm passando por desafios devido à sua intrínseca relação com os paradigmas de Cidades Inteligentes e Internet das Coisas (Internet of Things - IoT). Tradicionalmente, as RSSFs são implantadas e utilizadas para atender a uma única aplicação e são compostas de nós sensores com as mesmas características físicas. Contudo, ao se considerar ambientes inteligentes, onde vários objetos podem coletar dados, desencadear ações e interagir entre si de forma a prover serviços sofisticados, é fácil perceber a heterogeneidade dos tipos de aplicações que podem realizar requisições em tais ambientes. Além disso, é real a possibilidade de interação entre diferentes tipos de equipamentos, como por exemplo, sensores com diferentes características físicas, criando assim uma RSSF Heterogênea (RSSFH). Por este motivo, este trabalho objetiva contribuir para a gerência de RSSFHs em ambientes de Cidades Inteligentes ao propor uma abordagem para seleção dinâmica e sob-demanda de sensores, levando em consideração as características físicas dos sensores e as demandas das aplicações requisitantes. Esta abordagem foi utilizada no framework POlicy-based Sensor SElection in Heterogeneous Wireless Sensor Network (POSSE-HWSN), o qual foi implementado para validar a proposta. Testes realizados demonstram que através da utilização de POSSE-HWSN foi possível escolher os sensores com os recursos de hardware mais adequados para atender a cada aplicação, melhorando assim a eficácia da seleção.

Page generated in 0.0655 seconds