• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 11
  • 10
  • 3
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 60
  • 22
  • 12
  • 12
  • 12
  • 12
  • 11
  • 11
  • 10
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Demonstrationsutrustning för M2M tillämpning / Equipment for demonstration of M2M application

Karlsson, Patrik January 2004 (has links)
Detta examensarbete är ett utvecklingsarbete av demonstrationsutrustning för enkel visning av fördelarna med M2M-tekniken vid insamling av mätdata och automatisk övervakning. Arbetet består av en praktisk del, som utgörs av demonstrationsväskan, och en mer teoretisk del, som utgörs av demonstrationsprogrammet. Programmet har utvecklats till att med ett mätkort kopplat till en PC samla in mätvärden (spänningar), dessa skickas sedan som ett SMS med ett GSM-modem till en mottagare. Mottagaren kan vara en serviceman som vill ha felmeddelanden från utrustning inom dennes ansvarsområde, mottagaren kan även vara en server som rymmer en databas vilken används för att spara viktiga mätvärden för längre tid, t.ex. loggning av elförbrukning hos något kraftbolags kund. Det hela har alltså resulterat i ett färdigt och väl fungerande program, som utför just det som är uppdraget ovan. Mätresultatenhar tillräcklig noggrannhet för detta uppdrag om att demonstrera fördelarna med M2M-tekniken, och mätresultatet kommer även fram till mottagaren i sin rätta form. Detta betyder att M2M Communication AB nu kan demonstrera vinsten med M2M-tekniken för potentiell kund på ett enkelt och förklarande sätt. Integrerat i demonstrationsutrustningen har nu också företaget fått en enkel och självklar utrusning för att i praktiken se hur nya givare och annan utrusning fungerar ihop med ComHost 300 som är företagets primära produkt. / The goal with this master thesis is to develop a simple equipment to show the advantage of using M2M-technic when collect measured data and when using automatic monitoring of alarm and sensors. The thesis is divided in two parts, a practical part that corresponds to a case with sensors and equipment. The case is used to collect measure data to be used when demonstrating the theoretical part, which corresponds to the software program. The software program is developed to measure voltage with the data acquisition card, and then send them as a SMS text message via the GSM network. For this tasks the software also have to control the GSM-modem. This text message is either sent to a computer for logging in a database, or to the service department who owns the equipment measured. This work has ended up in well function software that can be installed on a PC-system with a Windows 2000(tm) operation system. The accuracy on the measured data is good enough for the task to demonstrate the function of the M2M-technic. The text message is also arrive to the receiver as expected. The result of this master thesis ends up giving the company M2M Communication AB the possibility to demonstrate the M2M-technic on a simple and explaining manner for a potential customer. Integrated in the new equipment the company also has been given a possibility to test new sensors and signal sources in a real world M2M test.
42

OS Google Chrome - teorie a praxe / OS Google Chrome - theory and practice

Plecháč, David January 2017 (has links)
The thesis is focused on the characteristics of the key features of the operating system Google Chrome OS and on the evaluation of deployment of this operating system in practise. The theoretical part describes the purpose and philosophy of the commercial operating system Google Chrome OS and its relation with Chrome web browser. The connection with open-source projects Chromium and Chromium OS is explained. Details of application development and deployment options, in the form of virtualization and domain administration, are analysed. The practical part applies theoretical knowledge from the development of applications for Chrome OS to create thin client application for remote control of hardware sensor over the internet. This sensor is designed and built on the platform Arduino. The sensor measures the temperature and humidity of the ambient air and remote controls high-voltage switching relays. Communication over TCP/IP uses modern MQTT protocol, for which the server is configured with MQTT Broker Mosquitto. The next section demonstrates the procedure for building a customized build of Chromium OS from the publicly provided Google source codes. Based on the evaluation of the acquired theoretical and practical knowledge, I assess the possibility of deploying the Chrome OS in private and commercial areas.
43

IoT som understöd åt beslutstödssystem : En studie om risker och fördelar vid utveckling ochimplementation av IoT som understöd åt beslutsstödsystem, med inriktad målgrupp små och medelstora organisationer / IoT to Support Decision Support Systems : A study on risks and benefits in developing and implementing IoT as support for decision support systems, targeted to small and medium-sized organizations

Frindberg, Simon January 2018 (has links)
Det studien har identifierat är en avsaknad av sammanställda risker och fördelar för den vanligaste organisationstypen i många länder; SMEs (small and medium-sized enterprises). Det existerar inga sammanfattade hjälpmedel för utveckling och implementation för IoT (Internet of Things) som understöd åt beslutsstödsystem (ERP_DSS) för målgruppen SMEs. Det studien presenterar är ett ramverk med fördelar som rekommenderas att följas och risker som rekommenderas att undvikas, vid utveckling och implementation av IoT som understöd åt beslutsstödsystem. Studien har också praktiskt prövat användbarheten av ramverket genom design science, där prototyper utvecklats. Ramverkets användbarhet kan efter lyckad utveckling av protyper och ytterligare identifierade risker, presentera ett fungerande och sammanställt hjälpmedel för målgruppen SMEs.
44

Univerzální domácí brána pro IoT zařízení / Universal Home Gateway for IoT Devices

Šelinga, Martin January 2018 (has links)
This diploma thesis consists of theoretical description of M2M communication and main differences comparing with H2H communication. There is also a description of protocols used in Internet of Things and description of practical implementation of protocols WM-BUS and Z-Wave in Python programming language with usage of Django framework.
45

Improvement on the Radio Link Reliability of Wireless M2M Application in Industrial Environment

Shi, Li January 2009 (has links)
The study presented in this thesis is focused on the investigation of wireless application in industrial environment. The objective of this work is to provide an insight on the development of the wireless machine to machine (M2M) application, and a systematic approach for improving the application reliability on radio link level by end users. As a specific case, ABB Robotics’ Remote Service concept is examined to check whether the selection of cellular technology as its wireless access method and the choice of standard radio link components are able to satisfy the application requirement under different circumstances. Several modifications of the radio link components and topologies, e.g. repeater system, combiner, etc, are proposed for the enhancement of radio link reliability. Theoretical evaluations of these options are based on detailed radio link calculation and MATLAB simulation using propagation model dedicated for industrial environment. Furthermore, on site test is carried out to validate the theoretical evaluations. The M2M market investigation is also included in the task, in order to select the most cost-effective components from different suppliers. While walking through the radio link optimization process of the specific case, necessary information and knowledge common to all wireless M2M application are explained. In the end, in addition to a guide line for installation and other supporting documents regarding to the Remote Service, some rules of thumb available for the radio link optimization in all kinds of industrial environments are generalized and presented in the form of a flowchart, which can be beneficial for those support engineers of the application provider, who are not necessarily experts in wireless technology.
46

Towards interoperability, self-management, and scalability for scalability for machine-to-machine systems / Vers l'interopérabilité, l'autogestion, et la scalabilité des systèmes Machine-to-Machine

Ben Alaya, Mahdi 06 July 2015 (has links)
La communication Machine-to-Machine (M2M) est l'un des principaux fondements de l'Internet des Objets (IoT). C'est un phénomène qui a évolué discrètement au cours du temps et vient d’émerger à la surface pour do! nner naissance à une explosion de nouveaux usages et services. Capteurs, actionneurs, tags, véhicules et objets intelligents ont tous la possibilité de communiquer. Le nombre de connexions M2M est en constante augmentation et il est prévu de voir des milliards d’objets connectés dans un futur proche. Les applications M2M offrent des avantages dans divers domaines à savoir les villes intelligentes, les voitures connectées, les usines du futures, l’agriculture de précision, l’environnement, la santé, etc. La croissance rapide de cet écosystème est entrain de conduire le M2M vers un avenir prometteur. Cependant, les opportunités d'expansion des marchés M2M ne sont pas évidentes. En effet, un ensemble de challenges doivent être surmontés afin de permettre un déploiement à grande échelle dans des domaines diverses et variés à savoir les défis d’interopérabilité, de complexité et de scalabilité. Actuellement, le marché du M2M souffre d'une fragmentation verticale importante touchant la majorité des domaines industriels. En effet, diverses solutions propriétaires ont été conçues pour répondre à des applications spécifiques engendrant ainsi un sérieux problème d''interopérabilité. Pour adresser ce challenge, nous avons conçu, développer et expérimenté la plateforme OM2M offrant une architecture opérationnelle, flexible et extensible pour l'interopérabilité M2M conforme à la norme SmartM2M. Pour supporter les environnements contraints, nous avons proposé une nouvelle convention de nommage basée sur une structure de ressources non-hiérarchique permettant d’optimiser la taille des messages échangés. Pour assurer l’interopérabilité sémantique entre les applications et les machines, nous avons proposé l'ontologie IoT-O. Cette dernière est composée de cinq modèles de base représentant les capteurs, les actionneurs, les observations, les actuations et les web ! services pour permettre de converger rapidement vers un vocabulaire commun pour l'IoT. Une plateforme M2M horizontale permet d'interconnecter des machines hétérogènes largement distribués et qui évoluent fréquemment en fonction des changements de l’environnement. Maintenir ces systèmes complexes en vie est coûteux en termes de temps et d'argent. Pour adresser ce challenge, nous avons conçu, développé et intégré le framework FRAMESELF afin d'ajouter des capacités d'autogestion aux systèmes M2M basées sur le paradigme de l'informatique autonome. En étendant le modèle d'architecture de référence MAPE-K, notre solution permet d'adapter dynamiquement le comportement de la plateforme OM2M par en fonctions des changements du contexte et des politiques haut niveaux. Nous avons défini un ensemble de règles sémantiques pour faire du raisonnement sur l'ontologie IoT-O en tant que modèle de connaissance. Notre objectif est de permettre la découverte automatique entre les machines et les applications à travers un appariement sémantique et une reconfiguration dynam! ique de l'architecture des ressources. L’interopérabilité et l’autogestion ouvrent la voie à un déploiement de masse des systèmes M2M. Par contre, ces derniers se basent sur l'infrastructure actuelle d'internet qui n'a jamais été conçu pour ce genre de d'utilisation ce qui pose de nouvelles exigences en termes de scalabilité. Pour adresser ce challenge, nous avons conçu, simulé et validé l'approche OSCL proposant une nouvelle topologie de réseau maillé M2M comme alternative à l'approche centralisée actuelle. OSCL s'appuie sur les techniques de routage centrées sur l'information favorisant les communications à sauts multiples et un cache distribué pour une meilleure dissémination des données. Nous avons développé le simulateur OSCLsim pour valider l'approche proposée.[...] / Machine-to-Machine (M2M) is one of the main features of Internet of Things (IoT). It is a phenomenon that has been proceeding quietly in the background, and it is coming into the surface, where explosion of usage scenarios in businesses will happen. Sensors, actuators, tags, vehicles, and intelligent things all have the ability to communicate. The number of M2M connections is continuously increasing, and it has been predicted to see billions of machines interconnected in a near future. M2M applications provide advantages in various domains from smart cities, factories of the future, connected cars, home automation, e-health to precision agriculture. This fast-growing ecosystem is leading M2M towards a promising future. However, M2M market expansion opportunities are not straightforward. A set of challenges should be overcome to enable M2M mass-scale deployment across various industries including interoperability, complexity, and scalability issues. Currently, the M2M market is suffering from a high vertical fragmentation affecting the majority of business sectors. In fact, various vendor-specific M2M solutions have been designed independently for specific applications, which led to serious interoperability issues. To address this challenge, we designed, implemented, and experimented with the OM2M platform offering a flexible and extensible operational architecture for M2M interoperability compliant with the SmartM2M standard. To support constrained environments, we proposed an efficient naming convention relying on a non-hierarchical resource structure to reduce the payload size. To reduce the semantic gap between applications and machines, we proposed the IoT-O ontology for an effective semantic interoperability. IoT-O consists of five main parts, which are sensor, actuator, observation, actuation and service models and aims to quickly converge to a common IoT vocabulary. An interoperable M2M service platform enables one to interconnect heterogeneous devices that are widely distributed and frequently evolving according to their environment changes. Keeping M2M systems alive is costly in terms of time and money. To address this challenge, we designed, implemented, and integrated the FRAMESELF framework to retrofit self-management capabilities in M2M systems based on the autonomic computing paradigm. Extending the MAPE-K reference architecture model, FRAMESELF enables one to dynamically adapt the OM2M system behavior according to high level policies how the environment changes. We defined a set of semantic rules for reasoning about the IoT-O ontology as a knowledge model. Our goal is to enable automatic discovery of machines and applications through dynamic reconfiguration of resource architectures. Interoperability and self-management pave the way to mass-scale deployment of M2M devices. However, current M2M systems rely on current internet infrastructure, which was never designed to address such requirements, thus raising new requirements in term of scalability. To address this challenge, we designed, simulated and validated the OSCL overlay approach, a new M2M meshed network topology as an alternative to the current centralized approach. OSCL relies on the Named Data Networking (NDN) technique and supports multi-hop communication and distributed caching 5 to optimize networking and enhance data dissemination. We developed the OSCLsim simulator to validate the proposed approach. Finally, a theoretical model based on random graphs is formulated to describe the evolution and robustness of the proposed system.
47

Protocol design for machine-to-machine networks

Aijaz, Adnan January 2014 (has links)
Machine-to-Machine (M2M) communications is an emerging communication paradigm that provides ubiquitous connectivity between devices along with an ability to communicate autonomously without human intervention. M2M communications acts as an enabling technology for the practical realization of Internet-of-Things (IoT). However, M2M communications differs from conventional Human-to-Human (H2H) communications due to its unique features such as massive number of connected devices, small data transmissions, little or no mobility, requirements of high energy efficiency and reliability, etc. These features create various challenges for existing communication networks which are primarily optimized for H2H communications. Therefore, novel solutions are required to meet the key requirements of M2M communications. In addition, enhancements are required at different layers of the protocol stack to support co-existence of M2M devices and H2H users. The main objective of this research is to investigate the challenges of M2M communications in two broad types of M2M networks; capillary M2M and cellular M2M networks. The primary focus is on developing novel solutions, algorithms, and protocol enhancements for successfully enabling M2M communications. Since cognitive radio technology is very promising for M2M communications, special emphasis is on capillary M2M networks with cognitive radio based Physical layer. Besides, the focus is also on exploring new frontiers in M2M communications. This thesis covers different aspects of M2M communications. Considering the motivation for cognitive M2M and service requirements of M2M devices, two cognitive MAC protocols have been proposed. The first protocol is centralized in nature and utilizes a specialized frame structure for co-existence with the primary network as well as handling different Quality-of-Service (QoS) requirements of M2M devices. The second protocol is a distributed cognitive MAC protocol, which is specially designed to provide high energy efficiency and reliability for M2M devices operating in challenging wireless environments. Both protocols explicitly account for the peculiarities of cognitive radio environments. The protocols have been evaluated using analytical modeling and simulation studies. Recently IETF has standardized a specially designed routing protocol for capillary M2M networks, known as RPL (Routing for Low Power and Lossy Networks). RPL is emerging as the de facto routing protocol for many M2M applications including the smart grid. On the other hand, the application of cognitive radio for smart grid communication is under active investigation in the research community. Hence, it is important to investigate the applicability and adaptation of RPL in cognitive radio environments. In this regard, an enhanced RPL based routing protocol has been proposed for cognitive radio enabled smart grid networks. The enhanced protocol provides novel modifications to RPL for protecting the primary users along with meeting the utility requirements of the secondary network. An important challenge in LTE-based cellular networks with M2M communications is the uplink radio resource management as available resources are shared between M2M devices and H2H users, having different and often conflicting QoS requirements. Apart from this, energy efficiency requirements become critically important. Further, the specific constraints of Single Carrier Frequency Division Multiple Access (SC-FDMA) complicate the resource allocation problem. In this respect, an energy efficient resource allocation algorithm for the uplink of LTE networks with M2M/H2H co-existence under statistical QoS guarantees has been developed, that is based on canonical duality theory. The proposed algorithm outperforms classical algorithms in terms of energy efficiency while satisfying the QoS requirements of M2M devices and H2H users. A new frontier in M2M communications is the nano-M2M communications, which is envisioned to create the Internet-of-Nano-Things (IoNT). Molecular communication (MC) is a promising communication technique for nano-M2M communications. In literature, no model for error performance of MC exists. Therefore, an error performance model has been developed that explicitly accounts for noise and interference effects. Since relaying and network coding based solutions are gaining popularity for nano-M2M networks, the error performance of a network coded molecular nano-M2M network has been evaluated as well. Finally, the thesis is concluded based on the overall picture of the research conducted. In addition, some directions for future work are included as well.
48

Från modell till modell : Transformering av information från ett modellspråk till ett annat

Bjurén, Johan January 2011 (has links)
Detta arbete undersöker möjligheterna att ta fram riktlinjer för en transformation från modelltyperna i EKD, som är ett mindre formellt semi-formellt modelleringsspråk, till UML, som är ett mer formellt semi-formellt modelleringsspråk, i syfte att komma närmare en systemspecifikation som kan implementeras som ett IT-system. Arbetet är utfört med en designansats som grund för hur arbetsprocessen sett ut. Processen följer genom hela arbetet och kan läsas om under metodkapitlet. Arbetet tar upp frågor som vilka modelltyper som är lämpliga att transformera till, vilken information som kan transformeras, vilken information som inte kan transformeras och vad som kan göras med denna. Riktlinjerna testas i valideringssyfte även på EKD modeller som skapats i annat syfte än för denna rapport.
49

Internet das coisas aplicada à indústria: dispositivo para interoperabilidade de redes industriais

Keller, Armando Leopoldo 13 January 2017 (has links)
Submitted by Silvana Teresinha Dornelles Studzinski (sstudzinski) on 2017-04-20T13:56:57Z No. of bitstreams: 1 Armando Leopoldo Keller_.pdf: 2124143 bytes, checksum: ba23113da63873463958e38c05ddbd88 (MD5) / Made available in DSpace on 2017-04-20T13:56:57Z (GMT). No. of bitstreams: 1 Armando Leopoldo Keller_.pdf: 2124143 bytes, checksum: ba23113da63873463958e38c05ddbd88 (MD5) Previous issue date: 2017-01-13 / Nenhuma / O objetivo deste trabalho, é realizar um estudo de forma mais abrangente sobre o conceito de Internet das Coisas e seus principais protocolos. Explora-se especificamente o conceito de IoT (Internet of Things) aplicado em sistemas de automação. Para tanto é apresentada uma revisão bibliográfica sobre o assunto, explorando os diversos protocolos desenvolvidos para aplicações de IoT, caracterizando-os quanto a taxa de transmissão, eficiência, segurança e confiabilidade. Também é realizado um levantamento do cenário atual, quanto a aplicação de protocolos de IoT em sistemas de automação, sempre tendo em mente a confiabilidade do sistema. Percebe-se que um grande dificultador do uso destes tipos de protocolo em ambientes industriais é justamente a heterogeneidade das redes existentes. Diante deste problema, a proposta do trabalho é desenvolver um dispositivo que atue como middleware para a interligação de redes de automação distribuídas, no caso especificamente a rede Modbus RTU, fazendo com que esta interligação seja de forma transparente utilizando o protocolo de Internet das Coisas MQTT (Message Queuing Telemetry Transport). Este dispositivo é testado com equipamentos em um cenário real através de um estudo de caso, onde duas redes Modbus RTU de um sistema geograficamente distribuído de geração de energia solar fotovoltaica, são interligadas, permitindo a criação de uma planta virtual de geração de energia do inglês virtual power plant (VPP). Com isso é possível tratar e gerenciar os sistemas distribuídos de geração como sendo uma única unidade geradora, facilitando o despacho. Para comprovar a eficiência e a confiabilidade do sistema, foram realizados testes onde o tempo entre as requisições e respostas foi medido, e através da sua distribuição foi obtido um tempo de 2,5 segundos para obter uma comunicação com baixa taxa de perda de mensagens. Estes testes comprovam o correto funcionamento do sistema proposto. / The objective of this work is to develop a more comprehensive study on the concept of Internet of Things (IoT) and its main protocols, specifically exploring the concept of IoT applied in automation systems. A bibliographic review explores the diverse protocols developed for IoT applications, characterizing them as transmission rate, efficiency, safety and confiability. A survey of the current scenario about the application of IoT protocols in automation systems is presented, always having the system confiability in mind. The heterogenity of the existent networks makes the use of this protocols a harder task. The proposal of this work is develop a device that acts as middleware for interlink distributed automation networks, in this case the Modbus RTU networks, in a transparent way using the internet of things procol MQTT (Message Queuing Telemetry Transport). This device is tested with equipments in a real scenario trough a case study, where two Modbus RTU networks of a geographically distributed solar photovoltaic power plant, is interlinked, allowing the criation of a VPP (Virtual Power Plant). This makes possible to manage the distributed power generator systems as a single generator unit, improving the electric energy dispatch. To prove the efficiency and confiability of the system, tests were made where the time between request and response was mensured, and based on his distribution the time of 2.5 seconds was determined to have a low message loss communication. Those tests validate the proposed system and the achievement of the goals of the present work.
50

Collaborative security for the internet of things

Ben Saied, Yosra 14 June 2013 (has links) (PDF)
This thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature

Page generated in 0.0329 seconds