• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 592
  • 135
  • 42
  • 32
  • 14
  • 12
  • 9
  • 7
  • 7
  • 6
  • 4
  • 3
  • 2
  • 1
  • Tagged with
  • 950
  • 396
  • 375
  • 289
  • 268
  • 226
  • 204
  • 181
  • 179
  • 155
  • 155
  • 129
  • 103
  • 84
  • 84
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Impact of Internet of Things on Urban Mobility

Vaidian, Iulia, Azmat, Muhammad, Kummer, Sebastian 07 1900 (has links) (PDF)
The urban population is predicted to increase to 66% by 2050. The rapid growth of urbanization and increasing congestion are significant challenges faced by the world today. Innovative solutions in urban mobility are key for a successful development and a sustainable future. The new paradigm, Internet of Things (IoT), facilitates the need for new approaches in urban transportation, leading to a modern concept: Smart Mobility. The boom of technology and innovation from recent years allowed a great expansion of IoT. Furthermore, the number of smart devices that communicate, cooperate and complement each other, grows rapidly in every domain broadening the scope of IoT applications. This paper sets to discuss the impact that IoT might have on urban mobility, mentioning its implications, challenges and technical solutions. It further reviews the advancements made in the transport infrastructure along the years that support the emergence of Smart Mobility. Three main research questions stay at the forefront of this paper which are drafted in pursuit of the solutions for the problems and challenges currently faced by urban transportation. Which leads to a sustainable future with efficient and effective urban transportation system. The paper uses a mix-method approach, using on one hand qualitative research for literature review (State of the field) and on the other hand quantitative research to assess public opinion on the research topic, through an online questionnaire. To answer the research questions with proper arguments, both research methods were necessary, which lead to optimal results. The results of the questionnaire were interpreted based on Spearman's correlation and descriptive statistical analysis. They brought an in-depth view on the public opinion regarding IoT and the developments enabled by this paradigm within the urban mobility sphere. The output of the questionnaire highlights the eagerness of participants usually stuck in traffic to see innovation within urban mobility. Over all the results based on the opinions suggest that the public strongly believes in the Internet of Thing's applications and its adaptation will benefit the urban transportation system. Furthermore, new developments in the urban mobility sphere will be largely embraced.
122

Saving resources through smart farming : An IoT experiment study

Jonarv Hultgren, Susanne, Tennevall, Philip January 2019 (has links)
Context: Smart farming, agritech, is growing in popularity and is starting to develop rapidly with some already existing technology that is implemented in agriculture for both industrial and private use. Objectives: The goal of this thesis is to investigate the benefits and issues with implementing technology in agriculture, agritech. In this thesis the investigation and research is performed by conduction a literature study and an experiment. Realization: A prototype was created to monitor the soil moisture level and calculating the average soil moisture value, then water the plants when needed. This was then compared to a manually watered pot to investigate if agritech could reduce the water usage when maintaining plants. Results: The result of the experiment indicates that it is possible to improve the use of resources such as human labor, time spent on maintaining the plants and water usage. Conclusions: The conclusion of this thesis is with the help of agritech, human workers can spend more time on other tasks and maintain the technology implemented. Instead of observing the plants to see if they need watering and watering them manually. Water usage may also be minimized with the help of sensors that make sure the plants only get watered when needed by constantly checking the soil moisture level.
123

Uma arquitetura de seguran?a para sistemas embarcados virtualizados

Vasconcelos, Matheus Duarte 31 August 2017 (has links)
Submitted by PPG Ci?ncia da Computa??o (ppgcc@pucrs.br) on 2018-03-21T19:00:14Z No. of bitstreams: 1 MATHEUS_DUARTE_VASCONCELOS_DIS.pdf: 1962973 bytes, checksum: 77c055e16913a3e7b366d18bb3c59fa3 (MD5) / Approved for entry into archive by Tatiana Lopes (tatiana.lopes@pucrs.br) on 2018-04-04T13:36:20Z (GMT) No. of bitstreams: 1 MATHEUS_DUARTE_VASCONCELOS_DIS.pdf: 1962973 bytes, checksum: 77c055e16913a3e7b366d18bb3c59fa3 (MD5) / Made available in DSpace on 2018-04-04T13:40:43Z (GMT). No. of bitstreams: 1 MATHEUS_DUARTE_VASCONCELOS_DIS.pdf: 1962973 bytes, checksum: 77c055e16913a3e7b366d18bb3c59fa3 (MD5) Previous issue date: 2017-08-31 / Historically embedded systems (ES) were designed to perform a single task throughout their lifetime. However, this view has changed with the new paradigm of computing called the Internet of Things or IoT. An example of environment where IoT can be applied are smart cities by creating products such as smart poles. Thus, smart poles can be responsible not only for city lighting, but also for the control of security cameras, in addition to temperature and noise sensors. In this scenario, the virtualization technique in ES appears to contribute to the development of IoT devices since it allows a better use of the available resources in the ES besides contributing to the increase of the security. ES security has been neglected and IoT oriented ES have attracted malicious attacks as they play a central role in the operation of essential services for individuals and enterprises. Therefore, the objective of this work is to identify a set of security mechanisms that use cryptography techniques that, combined with the virtualization technique, can establish a security architecture for IoT oriented virtualized ES (VES). Thus, establishing a minimum level of confidence between the users and the SEV. Two security mechanisms have been implemented in prplHypervisor: integrity checking and introspection of guest system hypercalls. The results show that for a guest system with a size of 256kB the integrity check mechanism imposed a 150.33ms initialization delay time while the introspection engine imposed 10.57ms of initialization delay. 2,029 lines of code have been added to the prplHypervisor to perform the integrity check and 120 lines of code to implement the introspection engine. The final size of the prplHypervisor has 32kB which represents a 53% increase over the original code. However, growth does not prevent the use of security mechanisms since the storage capacity available on the platform is 2MB. / Historicamente os sistemas embarcados (SE) eram desenvolvidos para realizar uma ?nica tarefa em toda a sua vida. Entretanto, esta vis?o mudou com o novo paradigma da computa??o chamado Internet das Coisas ou IoT. Um ambiente onde a IoT pode ser aplicada s?o as cidades inteligentes por meio da cria??o de produtos como, por exemplo, os postes inteligentes. Assim, os postes inteligentes podem ser respons?veis n?o s? pela ilumina??o da cidade, mas encarregados tamb?m pelo controle de c?meras de seguran?a, al?m de sensores de temperatura e ru?do. Neste cen?rio, a t?cnica de virtualiza??o em SE surge para contribuir no desenvolvimento de dispositivos IoT, pois permite uma melhor utiliza??o dos recursos dispon?veis nos SE al?m de auxiliar para o aumento da seguran?a. A seguran?a dos SE tem sido negligenciada e os SE voltados para IoT t?m atra?do ataques maliciosos, visto que, desempenham um papel central no funcionamento de servi?os essenciais para as pessoas e empresas. O objetivo deste trabalho ? identificar um conjunto de mecanismos de seguran?a que utilizam t?cnicas de criptografia que, combinados com a t?cnica de virtualiza??o, possam estabelecer uma arquitetura de seguran?a para os SE virtualizados (SEV) voltados para IoT. Assim, estabelecendo um n?vel de confian?a m?nimo entre os usu?rios e os SEV. Al?m disso, foram implementados dois mecanismos de seguran?a no prplHypervisor: a verifica??o de integridade e a introspec??o das hypercalls do sistema convidado. Os resultados mostram que para um sistema convidado com tamanho de 256kB o mecanismo de verifica??o de integridade imp?s um tempo de atraso na inicializa??o de 150,33ms enquanto o mecanismo de introspec??o imp?s 10,57ms de atraso na inicializa??o. Foram adicionados 2.029 linhas de c?digo ao prplHypervisor para realizar a verifica??o de integridade e 120 linhas de c?digo para implementar o mecanismo de introspec??o. O tamanho final do prplHypervisor possui 32kB o que representa um aumento de 53% em rela??o ao c?digo original. Todavia, o crescimento n?o inviabiliza o uso dos mecanismos de seguran?a, dado que, a capacidade de armazenamento dispon?vel na plataforma utilizada ? de 2MB.
124

Internet of Things mesh network : Using the Thread networking protocol

Alm, Anton January 2019 (has links)
This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. The upgrade includes implementing Thread technology together with Thread verified hardware from Nordic semiconductor and the Raspberry Pi Foundation. Thread is an IoT mesh networking protocol that was released year 2014. Compared to Bluetooth it offers IP communication (including IPv6) combined with higher reliability, performance and security. The process of installing, compiling and configuring the Thread network is explained. The result is an operational thread network that has sensor devices sending data to an HTTP web server, where the data is stored and monitored. Though, there are many improvements and functions that can be implemented to make this demonstrator more appealing.
125

Framework for Anonymous Secure Data Transfer in Vehicular Ad-Hoc Networks

Stegall, Jabari 17 December 2018 (has links)
With the increasing number of Vehicular Autonomous Network (VANET) architectures and applications, user privacy must be addressed and protected. Internet of Things (IoT) and their applications take care of everyday mundane task in order to increase user convenience and productivity. However, studies have shown that IoT architectures can be a weak spot in network security, including data being sent plain text. In this thesis, a VANET architecture is proposed that is capable of securing anonymous data collection from a distributed set of autonomous vehicles. The proposed architecture features a hybrid combination of centralized and decentralized routing concepts. Unlike other VANET implementations, our proposed architecture provides anonymity to users in the network. Lower latency can be achieved by merging data from live short-range ad-hoc routing methods with the data collected from a pseudo-live long range centralized routing methods. The proposed architecture guarantees user anonymity within the VANET framework. Most VANET models assume users do not value the privacy of their identity. We assume that each vehicle is equipped with a VANET computer capable of storing data, performing calculations, and both sending and receiving data wirelessly. Therefore vehicles can communicate directly with each other and exchange data within short distances as well as communicate with long-range wireless infrastructure. Simulation results show the implementation is equipped to handle diverse traffic scenarios as well as deter adversaries to the network from maliciously trying to manipulate collected data.
126

Fog Computing : Architecture and Security aspects

Bozios, Athanasios January 2018 (has links)
As the number of Internet of Things (IoT) devices that are used daily is increasing, the inadequacy of cloud computing to provide neseccary IoT-related features, such as low latency, geographic distribution and location awareness, is becoming more evident. Fog computing is introduced as a new computing paradigm, in order to solve this problem by extending the cloud‟s storage and computing resources to the network edge. However, the introduction of this new paradigm is also confronted by various security threats and challenges since the security practices that are implemented in cloud computing cannot be applied directly to this new architecture paradigm. To this end, various papers have been published in the context of fog computing security, in an effort to establish the best security practices towards the standardization of fog computing. In this thesis, we perform a systematic literature review of current research in order to provide with a classification of the various security threats and challenges in fog computing. Furthermore, we present the solutions that have been proposed so far and which security challenge do they address. Finally, we attempt to distinguish common aspects between the various proposals, evaluate current research on the subject and suggest directions for future research.
127

Mechano-Magnetic Telemetry For Urban Infrastructure Monitoring

Orfeo, Daniel Jerome 01 January 2018 (has links)
Many cities seek utilities monitoring with centrally managed Internet of Things (IoT) systems. This requires the development of numerous reliable low-cost wireless sensors, such as water temperature and flow meters, that can transmit information from subterranean pipes to surface-mounted receivers. Traditional radio communication systems are either unable to penetrate through multiple feet of earthen and manmade material, or have impractically large energy requirements which necessitate either frequent replacement of batteries, or a complex (and expensive) built-in energy harvesting system. Magnetic signaling systems do not suffer from this drawback: low-frequency electromagnetic waves have been shown to penetrate well through several feet of earth and water. In the past, these signals were too weak for practical use; however, this has changed with the recent proliferation of high-sensitivity magnetometers and compact rare-earth magnets. A permanent magnet can be either rotated or vibrated to create an oscillating magnetic field. Utilizing this phenomenon, two types of magnetic transmitter are investigated in this study: one which uses a propeller to directly rotate a diametrically magnetized neodymium magnet; and a second in which a permanent magnet is oscillated back-and-forth across a novel soft-magnet Y-stator, which projects a switching magnetic field. In principle, these oscillating magnetic fields can be used for communication from subterranean infrastructure sensors—such as flow meters and leak detection devices—to an aboveground long range (LoRa) radio-networked Arduino receiver equipped with a magnetometer. Simulation software models the oscillating electromagnetic fields produced by the Y-stator configuration. Laboratory performance and field tests establish the capability of two IoT-linked leak-detection sensors that use magnetic telemetry. Remote datalogging demonstrates the viability of integrating many sensors and surface receivers into a single LoRa wireless IoT network.
128

Etude et optimisation de solutions reposant sur les réseaux cellulaires existants pour l'internet des objets / Study and optimisation of solutions based on the current cellular networks for the Internet of thingd

Dufrene, Louis-Adrien 14 December 2017 (has links)
L'Internet des objets (ldO) connaît un intérêt grandissant depuis plusieurs années, avec la multiplication des objets dits « connectés » et des applications associées. Pour assurer la connectivité de ces objets, des réseaux sans fil longue portée à faible consommation énergétique, dédiés à l'ldO, ont été développés, ces réseaux proposant une connectivité adaptée aux contraintes propres de l'ldO. Plus récemment, le 3GPP a fait évoluer ses technologies 2G et 4G pour pouvoir également fournir des solutions de connectivité adaptées à l'ldO. Pour obtenir l'extension de couverture requise, ces évolutions utilisent entre autres un mécanisme de répétition en aveugle. Dans ce contexte, cette thèse s'intéresse aux mécanismes de recombinaison au sein du récepteur et à l'impact de l'évolution temporelle du canal de propagation et des imperfections du système sur les performances de ces mécanismes, en prenant la technologie 2G comme cas d'application. Tout d'abord, nous nous intéressons aux performances des différents mécanismes dans le cadre d'un récepteur sans imperfection. Puis, nous considérons une synchronisation fréquentielle imparfaite et une estimation de canal imparfaite. Dans ce dernier cas, de nouveaux schémas de recombinaison mixte, alliant deux mécanismes de recombinaison successifs, sont proposés. Enfin, la dernière partie de l'étude consiste en une implémentation du système complet sur des cartes radio-logicielles. Les résultats de cette thèse peuvent être exploités afin d'adapter le schéma de combinaison en fonction de l'application visée, et ainsi de réduire la consommation énergétique du système. / The Internet of Things (loT) is a concept, where a large number of connected devices are communicating together through the same network, constituting an autonomous and intelligent entity. The increasing number of connected devices and IoT services confirms the growing interest for the loT and its applications. To provide connectivity to the devices, several dedicated wireless low power and wide area networks have been created. Recently, with the Release 13, the 3GPP decided to modify the 2G and 4G technologies, to be able to also provide such connectivity for the loT devices, creating the field of Cellular-loT. These evolutions imply a coverage extension compared to the legacy technologies. To obtain this extension, these new standards especially use a blind repetition mechanism. In this context, this thesis studies the performance of several diversity combiners at the receiver, and observes the impact of the temporal evolution of the propagation channel and of imperfections in the receiver. The 2G GSM system is chosen as the application case. Firstly, we consider a receiver without imperfection. Secondly, we consider imperfect frequency synchronization in the receiver. Then, we consider imperfect channel estimation and propose a hybrid combining scheme, obtained by mixing two different combining mechanisms. Finally, in the last part of our study, we carry out a hardware implementation of the system into a software-radio platform. With the theoretical and simulation results provided in this thesis, one can better evaluate the potential of each combining scheme proposed in the framework of loT communications to efficiently benefit from blind repetition mechanisms.
129

Strategy Development of SMEs in the Internet of Things era : Case Study on Chinese Enterprises

Yunli, Lu, Xiuting, Li January 2010 (has links)
<p>Internet of Things (IOT) has become the key theme of the world since 2009 and been considered as the third wave in the information industry after the waves of Computer, Internet and Mobile Radio Communication. It is expected to have a strong influence on small and medium companies (SMEs). However, little research on what and how the influence of IOT on the SME’s development can be found in the literature. The purpose of the thesis is to examine how IOT influences the organizational changes in SMEs. Finally, suggestions for strategy developments will be proposed to assist the SMEs in making their organization changes successfully. Two main models are applied for this part: change model (OD model) and business model. Moreover, the SWOT theory is adopted to identify the SMEs position in IOT era. We collect the primary data through launching the survey on internet. After data documentation, we apply “Approximation of the Probability Hypothesis Testing” Method to conduct data analysis. After researching, we found out the IOT brings “revolution” change to the Logistics of SMEs while only “adapting” change for Manufactures’ business development. Compare to logistic industry, the manufacturing SMEs seldom adopts IT technologies for their selling channel because they are lacking of resources and knowledge for the new technologies. We suggest the logistic SMEs should establish logistic network between the logistic companies to enhance information and resource integration. For the manufacturing SMEs should apply knowledge management and change the companies into learning organizations. In future, IOT will bring radical changes for manufacturers, which are the biggest area with application of IOT technology. Nevertheless, the logistics industry might go out of fashion. In other words, logistics industry may die out or change to other functions.</p>
130

Strategy Development of SMEs in the Internet of Things era : Case Study on Chinese Enterprises

Yunli, Lu, Xiuting, Li January 2010 (has links)
Internet of Things (IOT) has become the key theme of the world since 2009 and been considered as the third wave in the information industry after the waves of Computer, Internet and Mobile Radio Communication. It is expected to have a strong influence on small and medium companies (SMEs). However, little research on what and how the influence of IOT on the SME’s development can be found in the literature. The purpose of the thesis is to examine how IOT influences the organizational changes in SMEs. Finally, suggestions for strategy developments will be proposed to assist the SMEs in making their organization changes successfully. Two main models are applied for this part: change model (OD model) and business model. Moreover, the SWOT theory is adopted to identify the SMEs position in IOT era. We collect the primary data through launching the survey on internet. After data documentation, we apply “Approximation of the Probability Hypothesis Testing” Method to conduct data analysis. After researching, we found out the IOT brings “revolution” change to the Logistics of SMEs while only “adapting” change for Manufactures’ business development. Compare to logistic industry, the manufacturing SMEs seldom adopts IT technologies for their selling channel because they are lacking of resources and knowledge for the new technologies. We suggest the logistic SMEs should establish logistic network between the logistic companies to enhance information and resource integration. For the manufacturing SMEs should apply knowledge management and change the companies into learning organizations. In future, IOT will bring radical changes for manufacturers, which are the biggest area with application of IOT technology. Nevertheless, the logistics industry might go out of fashion. In other words, logistics industry may die out or change to other functions.

Page generated in 0.0989 seconds