Spelling suggestions: "subject:"ehe internet off things"" "subject:"ehe internet oof things""
21 |
Realizace monitorovacího systému pokojových rostlin v prostředí IoT / Implementation of monitoring system of house plants in IoT environmentMach, Sebastián January 2020 (has links)
This master's thesis is about the design and development of a flower pot sensor, which monitors data related to the cultivation of houseplants. The sensor sends the data to the cloud, where the analysis is performed and the evaluated living conditions of the monitored plant are displayed to the user.
|
22 |
Smart Contract for IoT in Hostile EnvironmentsMorales Gomez, Marcelo 04 May 2022 (has links)
No description available.
|
23 |
Automated Monitoring for Data Center InfrastructureJafarizadeh, Mehdi January 2021 (has links)
Environmental monitoring using wireless sensors plays a key role in detecting hotspots or over-cooling conditions in a data center (DC). Despite a myriad of Data Center Wireless Sensor Network (DCWSN) solutions in literature, their adoption in DCs is scarce due to four challenges: low reliability, short battery lifetime, lack of adaptability, and labour intensive deployment. The main objective of this research is to address these challenges in our specifically designed hierarchical DCWSN, called Low Energy Monitoring Network (LEMoNet).
LEMoNet is a two-tier protocol, which features Bluetooth Low Energy (BLE) for sensors communication in the first tier. It leverages multi-gateway packet reception in its second tier to mitigate the unreliability of BLE. The protocol has been experimentally validated in a small DC and evaluated by simulations in a midsize DC. However, since the main application of DCWSNs is in colocation and large DCs, an affordable and fast approach is still required to assess LEMoNet in large scale. As the first contribution, we develop an analytical model to characterize its scalability and energy efficiency in a given network topology. The accuracy
of the model is validated through extensive event-driven simulations. Evaluation results show that LEMoNet can achieve high reliability in a network of 4800 nodes at a duty cycle of 15s.
To achieve the network adaptability, we introduce and design SoftBLE, a Software-Defined Networking (SDN) based framework that provides controllability to the network. It takes advantages of advanced control knobs recently available in BLE protocol stacks. SoftBLE is complemented by two orchestration algorithms to optimize gateway and sensor parameters based on run-time measurements. Evaluation results from both an experimental testbed and a large-scale simulation study show that using SoftBLE, sensors consume 70% less power in data collection compared to those in baseline approaches while achieving the Packet Reception Rate (PRR) no less than 99.9%.
One of its main steps of DCWSN commissioning is sensor localization, which is labour-intensive if is driven manually. To streamline the process, we devise a novel approach for automated sensor mapping. Since Radio Frequency (RF) alone is not a reliable data source for sensor localization in harsh and multi-path rich environments such as a DCs, we investigate using non-RF alternatives. Thermal Piloting is a classification model to correlate temperature sensor measurements with the expected thermal values at their locations. It achieves an average localization error of 0.64 meters in a modular DC testbed. The idea is further improved by a multimodal approach that incorporates pairwise Received Signal Strength (RSS) measurements of RF signals. The problem is formulated as Weighted Graph Matching
(WGM) between an analytical graph and an experimental graph. A parallel algorithm is proposed to find heuristic solutions to this NP-hard problem, which is 30% more accurate than the baselines. The evaluation in a modular DC testbed shows that the localization errors using multi-modality are less than one-third of that of using thermal data alone. / Thesis / Candidate in Philosophy
|
24 |
Digitalisering av intern hantering av kvalitetsavvikelser / Digitalization of internal management of quality deviationsLindh, Jesper, Forsberg, Albin January 2022 (has links)
Projektet riktar sig mot ett företag som är verksamma inom förpackningsindustrin med behandling och hållbarhet av papper. Operatörerna på anläggningen arbetar med att applicera plastbeläggning på papper för att göra det mer resistent mot vätska. När pappersrullar erhåller ett mindre vanligt produktionsfel utan tydlig åtgärd, finns en felhantering som kallas för ''tveksam bedömning'' (TVB). Hanteringen av TVB:er har tidigare bestått av mycket manuell hantering, vilket är ineffektivt, tidskrävande och otydligt som i sin tur kan leda till missförstånd. För att förbättra felhanteringen har ett befintligt program, som företaget använder sedan tidigare, vidareutvecklats för att kunna rapportera TVB:er och även kunna spåra tidigare TVB:er. Syftet med projektet är att förenkla processen för hanteringen av TVB:er samt minimera och underlätta arbetet för operatörerna. Genom att automatisera hur och var information sparas, samt koppla det till ett lättanvänt användargränssnitt, förenklas proceduren och minimerar arbetet för operatörerna. / This project targets a company that are operative within treatment and durability of paper in the packaging industry. At their facility, the production consists of applying plastic coating on the paper to make it more resistant to liquids, as the final product is intended as a container for liquid, e.g. milk. When paper rolls have a less common or more difficult error, there is an error handling procedure called ''questionable assessment''. This procedure consists of much manual handling which is ineffective, time consuming and inexplicit, which can lead to misunderstanding. To improve the error handling, an existing program that the company uses, will be further developed to manage error reports and to track earlier error reports. The purpose of the project is to simplify the process and minimize the workload for the staff. By automating how and where the information is stored as well as connecting it to a user-friendly interface, it will improve the procedure and minimize the work needed by the staff.
|
25 |
Context-Based Multi-Tenancy Policy Enforcement For Data Sharing In IoT SystemsNguyen, Huu Ha 09 August 2021 (has links)
No description available.
|
26 |
Solutions for Internet of Things Security Challenges: Trust and AuthenticationMcGinthy, Jason M. 12 July 2019 (has links)
The continuing growth of Internet-connected devices presents exciting opportunities for future technology. These Internet of Things (IoT) products are being manufactured and interleaved with many everyday activities, which is creating a larger security concern. Sensors will collect previously unimaginable amounts of private and public data and transmit all of it through an easily observable wireless medium in order for other devices to perform data analytics. As more and more devices are produced, many are lacking a strong security foundation in order to be the "first to market." Moreover, current security techniques are based on protocols that were designed for more-capable devices such as desktop computers and cellular phones that have ample power, computational ability, and memory storage. Due to IoT's technological infancy, there are many security challenges without proper solutions. As IoT continues to grow, special considerations and protections must be in place to properly secure this data and protect the privacy of its users. This dissertation highlights some of the major challenges related to IoT and prioritizes their impacts to help identify where gaps are that must be filled. Focusing on these high priority concerns, solutions are presented that are tailored to IoT's constraints. A security feature-based framework is developed to help characterize classes of devices to help manage the heterogeneous nature of IoT devices and networks. A novel physical device authentication method is presented to show the feasibility in IoT devices and networks. Additional low-power techniques are designed and evaluated to help identify different security features available to IoT devices as presented in the aforementioned framework. / Doctor of Philosophy / The Internet has been gaining a foothold in our everyday lives. Smart homes, smart cars, and smart cities are becoming less science fiction and more everyday realities. In order to increase the public’s general quality of life, this new Internet of Things (IoT) technological revolution is adding billions of devices around us. These devices aim to collect unforeseen amounts of data to help better understand environments and improve numerous aspects of life. However, IoT technology is still in its infancy, so there are still many challenges still remaining. One major issue in IoT is the questionable security for many devices. Recent cyber attacks have highlighted the shortcomings of many IoT devices. Many of these device manufacturers simply wanted to be the first in a niche market, ignoring the importance of security. Proper security implementation in IoT has only been done by a minority of designers and manufacturers. Therefore, this document proposes a secure design for all IoT devices to be based. Numerous security techniques are presented and shown to properly protect the data that will pass through many of these devices. The overall goal for this proposed work aims to have an overall security solution that overcomes the current shortfalls of IoT devices, lessening the concern for IoT’s future use in our everyday lives.
|
27 |
Online Optimization for Edge Computing under Uncertainty in Wireless NetworksLee, Gilsoo 24 April 2020 (has links)
Edge computing is an emerging technology that can overcome the limitations of centralized cloud computing by enabling distributed, low-latency computation at a network edge. Particularly, in edge computing, some of the cloud's functionalities such as storage, processing, and computing are migrated to end-user devices called edge nodes so as to reduce the round-trip delay needed to reach the cloud data center. Despite the major benefits and practical applications of using edge computing, one must address many technical challenges that include edge network formation, computational task allocation, and radio resource allocation, while considering the uncertainties innate in edge nodes, such as incomplete future information on their wireless channel gains and computing capabilities. The goal of this dissertation is to develop foundational science for the deployment, performance analysis, and low-complexity optimization of edge computing under the aforementioned uncertainties. First, the problems of edge network formation and task distribution are jointly investigated while considering a hybrid edge-cloud architecture under uncertainty on the arrivals of computing tasks. In particular, a novel online framework is proposed to form an edge network, distribute the computational tasks, and update a target competitive ratio defined as the ratio between the latency achieved by the proposed online algorithm and the optimal latency. The results show that the proposed framework achieves the target competitive ratio that is affected by the wireless data rate and computing speeds of edge nodes. Next, a new notion of ephemeral edge computing is proposed in which edge computing must occur under a stringent requirement on the total computing time period available for the computing process. To maximize the number of computed tasks in ephemeral edge networks under the uncertainty on future task arrivals, a novel online framework is proposed to enable a source edge node to offload computing tasks from sensors and allocate them to neighboring edge nodes for distributed task computing, within the limited total time period. Then, edge computing is applied for mobile blockchain and online caching systems, respectively. First, a mobile blockchain framework is designed to use edge devices as mobile miners, and the performance is analyzed in terms of the probability of forking event and energy consumption. Second, an online computational caching framework is designed to minimize the edge network latency. The proposed caching framework enables each edge node to store intermediate computation results (IRs) from previous computations and download IRs from neighboring nodes under uncertainty on future computation. Subsequently, online optimization is extended to investigate other edge networking applications. In particular, the problem of online ON/OFF scheduling of self-powered small cell base stations is studied, in the presence of energy harvesting uncertainty with the goal of minimizing the operational costs that consist of energy consumption and transmission delay of a network. Such a framework can enable the self-powered base stations to be functioned as energy-efficient edge nodes. Also, the problem of radio resource allocation is studied when a base station is assisted by self-powered reconfigurable intelligent surfaces (RIS). To this end, a deep reinforcement learning approach is proposed to jointly optimize the transmit power, phase shifting, and RIS reflector's ON/OFF states under the uncertainties on the downlink wireless channel information and the harvested energy at the RIS. Finally, the online problem of dynamic channel allocation is studied for full-duplex device-to-device (D2D) networks so that D2D users can share their data with a low communication latency when users dynamically arrive on the network. In conclusion, the analytical foundations and frameworks presented in this dissertation will provide key guidelines for effective design of edge computing in wireless networks. / Doctor of Philosophy / Smart cities will rely on an Internet of Things (IoT) system that interconnects cars, drones, sensors, home appliances, and other digital devices. Modern IoT systems are inherently designed to process real-time information such as temperature, humidity, or even car navigational data, at any time and location. A unique challenge in the design of such an IoT is the need to process large volumes of data over a wireless network that consists of heterogeneous IoT devices such as smartphones, vehicles, home access points, robots, and drones. These devices must perform local (on-device or so-called edge) processing of their data without relying on a remote cloud. This vision of a smart city seen as a mobile computing platform gives rise to the emerging concept of edge computing using which smartphones, sensors, vehicles, and drones can exchange and process data locally on their own devices. Edge computing allows overcoming the limitations of centralized cloud computation by enabling distributed, low-latency computation at the network edge.
Despite the promising opportunities of edge computing as an enabler for smart city services such as autonomous vehicles, drones, or smart homes, one must address many challenges related to managing time-varying resources such as energy and storage, in a dynamic way. For instance, managing communication, energy, and computing resources in an IoT requires handling many uncertain factors such as the intermittent availability of wireless connectivity and the fact that the devices do not know a priori what type of tasks they need to process. The goal of this dissertation is to address the fundamental challenges in edge computing under uncertainty in an IoT. In particular, this dissertation introduces novel mathematical algorithms and frameworks that exploit ideas from the fields of online optimization, machine learning, and wireless communication to enable future IoT services such as smart factories, virtual reality, and autonomous systems. In this dissertation, holistic frameworks are developed by designing, analyzing, and optimizing wireless communications systems with an emphasize on emerging IoT applications. To this end, various mathematical frameworks and efficient algorithms are proposed by drawing on tools from wireless communications, online optimization, and machine learning to yield key innovations. The results show that the developed solutions can enable an IoT to operate efficiently in presence of uncertainty stemming from time-varying dynamics such as mobility of vehicles or changes in the wireless networking environment. As such, the outcomes of this research can be used as a building block for the large deployment of smart city technologies that heavily rely on the IoT.
|
28 |
Supporting User Interactions with Smart Built EnvironmentsHandosa, Mohamed Hussein Hafez 04 February 2019 (has links)
Before the recent advances in sensing, actuation, computing and communication technologies, the integration between the digital and the physical environment was limited.
Humans linked those two worlds by collecting data about the physical environment before feeding it into the digital environment, and by changing the state of the physical environment based on the state of the digital environment.
The incorporation of computing, communication, sensing, and actuation technologies into everyday physical objects has empowered the vision of the Internet of Things (IoT). Things can autonomously collect data about the physical environment, exchange information with other things, and take actions on behalf of humans. Application domains that can benefit from IoT include smart buildings, smart cities, smart water, smart agriculture, smart animal farming, smart metering, security and emergencies, retail, logistics, industrial control, and health care.
For decades, building automation, intelligent buildings, and more recently smart buildings have received a considerable attention in both academia and industry. We use the term smart built environments (SBE) to describe smart, intelligent, physical, built, architectural spaces ranging from a single room to a whole city. Legacy SBEs were often closed systems operating their own standards and custom protocols. SBEs evolved to Internet-connected systems leveraging the Internet technologies and services (e.g., cloud services) to unleash new capabilities. IoT-enabled SBEs, as one of the various applications of the IoT, can change the way we experience our homes and workplaces significantly and make interacting with technology almost inevitable. This can provide several benefits to modern society and help to make our life easier. Meanwhile, security, privacy, and safety concerns should be addressed appropriately.
Unlike traditional computing devices, things usually have no or limited input/output (I/O) capabilities. Leveraging the ubiquity of general-purpose computing devices (e.g., smartphones), thing vendors usually provide interfaces for their products in the form of mobile apps or web-based portals. Interacting with different things using different mobile apps or web-based portals does not scale well. Requiring the user to switch between tens or hundreds of mobile apps and web-based portals to interact with different things in different smart spaces may not be feasible. Moreover, it can be tricky for non-domestic users (e.g., visitors) of a given SBE to figure out, without guidance, what mobile apps or web-based portals they need to use to interact with the surrounding.
While there has been a considerable research effort to address a variety of challenges associated with the thing-to-thing interaction, human-to-thing interaction related research is limited. Many of the proposed approaches and industry-adopted techniques rely on more traditional, well understood and widely used Human-Computer Interaction (HCI) methods and techniques to support interaction between humans and things. Such techniques have mostly originated in a world of desktop computers that have a screen, mouse, and keyboard. However, SBEs introduce a radically different interaction context where there are no centralized, easily identifiable input and output devices. A desktop computer of the past is being replaced with the whole SBE. Depending on the task at hand and personal preferences, a user may prefer to use one interaction modality over another. For instance, turning lights on/off using an app may be more cumbersome or time-consuming compared to using a simple physical switch.
This research focuses on leveraging the recent advances in IoT and related technologies to support user interactions with SBEs. We explore how to support flexible and adaptive multimodal interfaces and interactions while providing a consistent user experience in an SBE based on the current context and the available user interface and interaction capabilities. / PHD / The recent advances in sensing, actuation, computing, and communication technologies have brought several rewards to modern society. The incorporation of those technologies into everyday physical objects (or things) has empowered the vision of the Internet of Things (IoT). Things can autonomously collect data about the physical environment, exchange information with other things, and take actions on behalf of humans. Several application domains can benefit from the IoT such as smart buildings, smart cities, security and emergencies, retail, logistics, industrial control, and health care. For decades, building automation, intelligent buildings, and more recently smart buildings have received considerable attention in both academia and industry. We use the term smart built environments (SBE) to describe smart, intelligent, physical, built, architectural spaces ranging from a single room to a whole city. SBEs, as one of the various applications of the IoT, can change the way we experience our homes and workplaces significantly and make interacting with technology almost inevitable. While there has been a considerable research effort to address a variety of challenges associated with the thing-to-thing interaction, human-to-thing interaction related research is limited. Many of the proposed approaches and industry-adopted techniques to support human-to-thing interaction rely on traditional methods. However, SBEs introduce a radically different interaction context. Therefore, adapting the current interaction techniques and/or adopting new ones is crucial for the success and wide adoption of SBEs. This research focuses on leveraging the recent advances in the IoT and related technologies to support user interactions with SBEs. We explore how to support a flexible, adaptive, and multimodal interaction experience between users and SBEs using a variety of user interfaces and proposed interaction techniques.
|
29 |
Voice Control of Fetch Robot Using Amazon AlexaLiu, Purong 23 March 2020 (has links)
With the rapid development of computers and technology, virtual assistants (VA) are becoming more and more common and intelligent. However, virtual assistants, such as Apple's Siri, Amazon's Alexa, and Google Assistant, do not currently have any physical functions. As an important part of the internet of things (IoT), the field of robotics has become a new trend in the usage of VA. In this project, a mobile robot, Fetch, is connected with the Amazon Echo Dot through the Amazon web service (AWS) and a local robot operation system (ROS) bridge server. We demonstrated that the robot could be controlled by voice commands through an Amazon Alexa. Given certain commands, Fetch was able to move in a desired direction as well as track and follow a target object. The follow model was also learned by Neural Network training, which allows for the target position to be predicted in future maps. / Master of Science / Nowadays, virtual personalized assistants (VPAs) exist everywhere around us. For example, Siri or android VPAs exist on every smartphone. More and more people are getting household Virtual Assistants, such as Amazon Alexa, Google Assistant, and Microsoft's Cortana. If the virtual assistants can connect with objects which have physical functions like an actual robot, they will be able to provide better services and more functions for humans. In this project, a mobile robot, Fetch, is connected with the Echo dot from Amazon. This connection allows us to control the robot by voice command. You can ask the robot to move in a given direction or track and follow a certain object. In order to let the robot learn how to predict the position of the target when the target is lost, a map is built as an influence factor. Since a designed algorithm of target position prediction is difficult to implement, we opted to use a machine learning method instead. Therefore, a machine learning algorithm was tested on the following model.
|
30 |
Improving WiFi Sensor Network Security Through Unassociated Device Communication Using Wireless Latency Shift KeyingJohnson, Jacob Edward 16 April 2024 (has links) (PDF)
IEEE 802.11 (WiFi) only has two modes of trust--complete trust or complete untrust. The lack of nuance leaves no room for sensors that a user does not fully trust, but wants to connect to their network, such as a WiFi sensor. Solutions exist, but they require advanced knowledge of network administration. We solve this problem by introducing a new way of modulating data in the latency of the network, called Latency Shift Keying. We use specific characteristics of the WiFi protocol to carefully control the latency of just one device on the network. We build a transmitter, receiver, and modulation scheme that is designed to encode data in the latency of a network. We develop an application, Wicket, that solves the WiFi trust issue using Latency Shift Keying to create a new security association between an untrusted WiFi sensor and a wired device on the trusted network. We evaluate its performance and show that it works in many network conditions and environments.
|
Page generated in 0.1155 seconds