• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 533
  • 112
  • 107
  • 36
  • 34
  • 23
  • 13
  • 9
  • 9
  • 8
  • 7
  • 5
  • 5
  • 5
  • 2
  • Tagged with
  • 996
  • 996
  • 295
  • 231
  • 225
  • 200
  • 195
  • 187
  • 181
  • 140
  • 134
  • 117
  • 117
  • 116
  • 106
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Modelling QoS in IoT applications

Awan, Irfan U., Younas, M., Naveed, W. January 2015 (has links)
No / Abstract: Internet of Things (IoT) aims to enable the interconnection of a large number of smart devices (things) using a combination of networks and computing technologies. But an influx of interconnected things makes a greater demand on the underlying communication networks and affects the quality of service (QoS). This paper investigates into the QoS of delay sensitive things and the corresponding traffic they generate over the network. Things such as security alarms, cameras, etc, generate delay sensitive information that must be communicated in a real time. Such things have heterogeneous features with limited buffer capacity, storage and processing power. Thus the most commonly used Best Effort service model cannot be an attractive mechanism to treat delay sensitive traffic. This paper proposes a cost-effective analytical model for a finite capacity queueing system with pre-emptive resume service priority and push-out buffer management scheme. Based on the analytical model various simulation results are generated in order to analyse the mean queue length and the blocking probability of high and low priority traffic for system with various capacities.
102

Aggregated sensor payload submission model for token-based access control in the Web of Things

Amir, Mohammad, Pillai, Prashant, Hu, Yim Fun 26 October 2015 (has links)
Yes / Web of Things (WoT) can be considered as a merger of newly emerging paradigms of Internet of Things (IoT) and cloud computing. Rapidly varying, highly volatile and heterogeneous data traffic is a characteristic of the WoT. Hence, the capture, processing, storage and exchange of huge volumes of data is a key requirement in this environment. The crucial resources in the WoT are the sensing devices and the sensing data. Consequently, access control mechanisms employed in this highly dynamic and demanding environment need to be enhanced so as to reduce the end-to-end latency for capturing and exchanging data pertaining to these underlying resources. While there are many previous studies comparing the advantages and disadvantages of access control mechanisms at the algorithm level, vary few of these provide any detailed comparison the performance of these access control mechanisms when used for different data handling procedures in the context of data capture, processing and storage. This study builds on previous work on token-based access control mechanisms and presents a comparison of two different approaches used for handling sensing devices and data in the WoT. It is shown that the aggregated data submission approach is around 700% more efficient than the serial payload submission procedure in reducing the round-trip response time.
103

Machine Learning for Botnet Detection: An Optimized Feature Selection Approach

Lefoane, Moemedi, Ghafir, Ibrahim, Kabir, Sohag, Awan, Irfan U. 05 April 2022 (has links)
Yes / Technological advancements have been evolving for so long, particularly Internet of Things (IoT) technology that has seen an increase in the number of connected devices surpass non IoT connections. It has unlocked a lot of potential across different organisational settings from healthcare, transportation, smart cities etc. Unfortunately, these advancements also mean that cybercriminals are constantly seeking new ways of exploiting vulnerabilities for malicious and illegal activities. IoT is a technology that presents a golden opportunity for botnet attacks that take advantage of a large number of IoT devices and use them to launch more powerful and sophisticated attacks such as Distributed Denial of Service (DDoS) attacks. This calls for more research geared towards the detection and mitigation of botnet attacks in IoT systems. This paper proposes a feature selection approach that identifies and removes less influential features as part of botnet attack detection method. The feature selection is based on the frequency of occurrence of the value counts in each of the features with respect to total instances. The effectiveness of the proposed approach is tested and evaluated on a standard IoT dataset. The results reveal that the proposed feature selection approach has improved the performance of the botnet attack detection method, in terms of True Positive Rate (TPR) and False Positive Rate (FPR). The proposed methodology provides 100% TPR, 0% FPR and 99.9976% F-score.
104

Surplus and Scarce Energy: Designing and Optimizing Security for Energy Harvested Internet of Things

Santhana Krishnan, Archanaa January 2018 (has links)
Internet of Things require a continuous power supply for longevity and energy harvesting from ambient sources enable sustainable operation of such embedded devices. Using selfpowered power supply gives raise two scenarios, where there is surplus or scarce harvested energy. In situations where the harvester is capable of harvesting beyond its storage capacity, the surplus energy is wasted. In situations where the harvester does not have sufficient resources, the sparse harvested energy can only transiently power the device. Transiently powered devices, referred to as intermittent computing devices, ensure forward progress by storing checkpoints of the device state at regular intervals. Irrespective of the availability of energy, the device should have adequate security. This thesis addresses the security of energy harvested embedded devices in both energy scenarios. First, we propose precomputation, an optimization technique, that utilizes the surplus energy. We study two cryptographic applications, namely bulk encryption and true random number generation, and we show that precomputing improves energy efficiency and algorithm latency in both applications. Second, we analyze the security pitfalls in transiently powered devices. To secure transiently powered devices, we propose the Secure Intermittent Computing Protocol. The protocol provides continuity to underlying application, atomicity to protocol operations and detects replay and tampering of checkpoints. Both the proposals together provide comprehensive security to self-powered embedded devices. / Master of Science / Internet of Things(IoT) is a collection of interconnected devices which collects data from its surrounding environment. The data collected from these devices enable emerging technologies like smart home and smart cities, where objects are controlled remotely. With the increase in the number of such devices, there is a demand for self-powered devices to conserve electrical energy. Energy harvesters are suitable for this purpose because they convert ambient energy into electrical energy to be stored in an energy buffer, which is to be used when required by the device. Using energy harvesters as power supply presents us with two scenarios. First, when there is sufficient ambient energy, the surplus energy, which is the energy harvested beyond the storage capacity of the buffer, is not consumed by the device and thus, wasted. Second, when the harvested energy is scarce, the device is forced to shutdown due to lack of power. In this thesis, we consider the overall security of an energy harvested IoT device in both energy scenarios. We optimize cryptographic algorithms to utilize the surplus energy and design a secure protocol to protect the device when the energy is scarce. Utilizing both the ideas together provides adequate security to the Internet of Things.
105

Smart Kitchen : Automatisk inventering av föremål / Smart Kitchen : Automated inventory of items

Edlund, Fredrik, Sarker, Saqib January 2016 (has links)
Internet of Things växer fort och förutspås bli en del av vardagen. Detta öppnar möjligheter för att skapa produkter som förenklar vardagslivet. Automatisk objektsidentifiering kombinerad med en automatiserad lagerstatus kan underlätta inventering, något som kan användas till exempel i smarta kylskåp för att göra vardagen enklare genom Internet of Things.Detta examensarbete studerar metoder inom objektsidentifikation för att ta fram ett system som automatiskt kan identifiera objekt och hantera lagerstatus. En prototyp framställdes och testades för att se vilka möjligheter som finns. Systemet använder en Raspberry Pi som basenhet, vilken använder Dlib-bibliotek för att identifiera objekt som har blivit fördefinierade. Vid okända objekt identifierar användaren objekt i en mobilapplikation, systemet kan genom detta lära sig identifiera nya objekt. Samma applikation används för att se lagerstatusen på de olika objekt som har registrerats av systemet. Prototypen klarar av att identifiera kända objekt samt att lära sig nya, enligt projektets mål. / Internet of Things is growing fast and is predicted to become a part of everyday life. This can be used to create products which will make everyday life easier. Automated object detection combined with an automated inventory check can make it easier to manage what is in stock, this is something that can be used in smart refrigerators as an example, to make life more convenient through Internet of Things. This Bachelor thesis studies methods regarding object detection with the purpose to build a system which automatically identifies objects and manages the inventory status. A prototype was built and tested to see what the possibilities there is with such a system. The Prototype uses a Raspberry Pi as core unit, which uses Dlib libraries to identify predefined objects. The user will identify unknown objects via the mobile phone application, which makes it possible for the system to learn how to identify new objects. The same application is used to check the inventory status for the different objects that has been identified by the system. The prototype can identify objects and learn to identify new ones, according to the goals of the project.
106

Distributed Communication for Streetlight Systems : A decentralized solution / Distributerad kommunication för gatlyktesystem : En decentraliserad lösning

Wallin, Fredrik January 2016 (has links)
Streetlights are usually lit during all dark hours even though vehicles or other objects are not using the road. Instead of wasting energy on keeping the streetlights lit when no vehicles are using the road, the streetlights should be lit whenever vehicles are in proximity of the streetlights and turned off otherwise. A distributed network can be used to handle the communication between streetlights for sharing information about vehicles in proximity. There are streetlight systems that adapt from the environment and handles communication but are still not optimized for country roads with low frequency of vehicles. Therefore, distributed communication for streetlight systems is implemented, by letting the streetlights be a part of a distributed system. Each streetlight is represented with a Zolertia RE-Mote, a sensor for detecting objects and an LED. The representation of the streetlights are wirelessly connected as a mesh network where they can communicate with each other and forward data packets to nodes more far away in the network. The concept of having the streetlights in a distributed system is believed to work and can be considered to be applied on streetlights at country roads to save energy. / Gatlyktor är oftast tända under alla timmar då det är mörkt ute, även fast det inte är något fordon eller annat objekt som använder vägen. Istället för att slösa energi på att ha gatlyktorna tända när det inte är några fordon som använder vägen, bör gatlyktorna vara tända när fordon är i närheten av dem och släckta annars. Ett distribuerat nätverk kan användas för att hantera kommunikationen mellan gatlyktor till att dela information om fordon i närheten. Det finns gatlyktsystem som anpassar efter miljön och hanterar kommunikationen, men är inte optimerat för landsvägar med låg trafik. Därför är distribuerad kommunikation för gatlyktsystem implementerat genom att låta gatlyktorna vara en del av ett distribuerat system. Varje gatlykta är representerad med en Zolertia RE-Mote, en sensor för detektering av objekt och en LED. Representationen är trådlöst kopplat som ett meshnätverk där de kan kommunicera med varandra och skicka vidare datapaket till noder längre bort i nätverket. Konceptet att ha gatlyktorna i ett distribuerat system tros fungera och kan tänkas att appliceras på gatlyktor på landsvägar för att spara energi.
107

”DET SKULLE VARA LÄTTARE IFALL DET INTE VAR EN GRUVA” : En kvalitativ fallstudie omimplementering av en uppkopplad filterindikator i gruvindustrin. / "IT WOULD BE EASIER IF IT WASN'T A MINE" : A qualitative case study on the implementation of a connected filter indicator in the mining industry.

Hällestrand, Claes, Johansson, Adam January 2022 (has links)
The extraction of metal and other natural resources has historically been and is still today an important part of Swedish society and its development. To keep pace with demand and at the sametime increase security, more and more digital technology has been implemented into the miningindustry. However, transforming an industry with the help of digital technology is no easy task and the mining industry faces unique challenges to overcome because of the complexity of the mining environment. Against this background the purpose of this study is to describe and analyse the challenges and enabling factors a small enterprise must face to implement Internet of things inan electronic filter indicator in the mining industry. To answer our research questions, we have useda qualitative case study with semi-structured interviews. The results show that the main challengesthat can prohibit an implementation of a filter indicator that has IoT qualities are environmentalaspects of mines such as gas, dust, and water along with challenges of network, connectivity, and power. Further challenges also exist connected to the development and implementation processes where qualified competence and skills are crucial for the success of a functional IoT product. Whatthis study shows are several enabling factors for implementing an IoT product in a specific mining company such as management of servers and data of various kinds, and an extensive network withseveral different connected products.
108

Virtual Commissioning of Robotic Cell Using Cloud-based Technologies and Advanced Visualization System

Ospina Eslava, David Mauricio, Santiago, Avendaño Flores January 2021 (has links)
The manufacturing industry is quickly adapting to new technologies. Some of these trending technologies are virtual commissioning, virtual reality, and cloud-based technologies. This project summarizes these three technologies and aims to create a commissioning tool adapted to the 4.0 Industry. The project’s methodology was to analyse a problem and consequently create a solution that solves it. The process of designing and developing was repeated iteratively, each time an evaluation was made. The final product developed has shown that it is worth spending time introducing the cloudbased technologies inside many applications since it saves time and allows to work remotely. Applying virtual reality to virtual commissioning has proven to add efficiency. At the same time, it gives an immersive experience with a real-time display of quantitative data and the process itself in a visual mode without interfering with the actual production. With these two technologies, virtual commissioning evolves and goes a step further. This project also proved that the user experience and interface in this type of immersive applications need much attention on creating a comfortableinterface that does not fatigue or cause rejection in the user.
109

Internet of things and automated farming / Uppkopplad och automatiserad odling

Ahlqvist, Niklas, Jungåker, Jonas, Perrin, Agnes January 2019 (has links)
The purpose of this project is to make it easier to grow plants domestically all year round. The objective is to construct a remotely controllable and environmentally independent automated hydroponic system. This would minimize the efforts required by the user to sustain plants in non-native climates. A hydroponic gardening system uses water as a growth medium instead of soil. The system is climate conscious and has benefits compared to conventional agriculture. Hydroponic systems are affected by several factors, this project only focuses on controlling the light intensity by isolating the system, and regulating the nutrient concentration through EC. The system uses a microcontroller for analysis and control. The results are promising, showing that the system works. However, the limitations in time led to a short test period, therefore the data gathered is limited. The discussion based on the results conclude that the system cannot be considered completely automatic but reduces the need of manual labour. / Syftet med detta projekt är att göra det lättare att odla växter inhemskt året runt. Målet är att konstruera ett fjärrstyrbart och miljöoberoende automatiskt hydroponiskt system. Detta ska minimera ansträngningarna från användaren för att underhålla växter i icke-inhemska klimat. Ett hydroponiskt odlingssystem använder vatten som tillväxtmedium istället för jord. Tekniken har fördelar jämfört med konventionell odling vilket gör hydroponi mer miljövänligt. Hydroponiska system påverkas av flera faktorer, men detta projekt fokuserar bara på att kontrollera ljusintensiteten genom att isolera ljuset inom systemet samt att reglera näringsämne-koncentrationen genom att mäta den elektriska ledningsförmågan i vattnet. Systemet använder en mikrokontroll för analys och kontroll. Resultaten är lovande och visar att systemet fungerar. Däremot har begränsningarna i tid lett till en kort testperiod, därför är data som samlas in begränsad. Diskussionen baserad på resultaten drar slutsatsen att systemet inte kan anses vara helt automatiskt men reducerar behovet av manuell arbetskraft.
110

Measuring the responsiveness of WebAssembly in edge network applications / Mätning av responsiviteten hos WebAssembly i edge network-applikationer

Scolati, Remo January 2023 (has links)
Edge computing facilitates applications of cyber-physical systems that require low latencies by moving compute and storage resources closer to the end application. Whilst the edge network benefits such systems in terms of responsiveness, it increases the systems’ complexity due to edge devices’ often heterogeneous and resource-constrained nature. In this work, we evaluate whether WebAssembly can be used as a lightweight and portable abstraction layer for such applications. Through the implementation of an edge network robot control scenario, we benchmark and compare the performance of WebAssembly against its native equivalent. We measure WebAssembly’s overhead and assess the impact of different placement options in the network. We further compare the overall application responsiveness against the latency requirements of an industrial application to evaluate its performance. We find that WebAssembly satisfies the portability and performance requirements of the selected industrial use case. Our empirical results show that WebAssembly doubles the execution latency in a localized setting, but does not excessively impact the overall responsiveness of a cyber-physical system. / Edge computing underlättar tillämpningar av cyberfysiska system som kräver låga latenser genom att flytta beräknings- och lagringsresurser närmare slutapplikationen. Även om edge-nätverket gynnar sådana system när det gäller reaktionsförmåga, ökar det systemens komplexitet på grund av edge-enheternas ofta heterogena och resursbegränsade natur. I detta arbete utvärderar vi om WebAssembly kan användas som ett lättviktigt och portabelt abstraktionslager för sådana applikationer. Genom att implementera ett robotkontrollscenario för edge-nätverk benchmarkar och jämför vi prestandan hos WebAssembly med dess inbyggda motsvarighet. Vi mäter WebAssemblys overhead och utvärderar effekten av olika placeringsalternativ i nätverket. Vi jämför även den övergripande applikationsresponsen mot latenskraven i en industriell applikation för att utvärdera dess prestanda. Vi konstaterar att WebAssembly uppfyller portabilitets- och prestandakraven för det utvalda industriella användningsfallet. Våra empiriska resultat visar att WebAssembly fördubblar exekveringslatensen i en lokaliserad miljö, men att det inte påverkar den övergripande responsiviteten i ett cyberfysiskt system i alltför hög grad.

Page generated in 0.0935 seconds