141 |
Indoor Positioning System for Smart DevicesYang, Yuan 19 November 2021 (has links)
No description available.
|
142 |
Hantering av mät-filer från Wi-Fi fjärrkontroll / MANAGEMENT OF MEASUREMENT FILES FROM WI-FI REMOTE CONTROLKalo, Alexander January 2021 (has links)
A measuring system Striton has been developed at the department of biomedicalengineering, University Hospital of Umeå, for motion analysis using motion sensors whichattaches to the patient’s lower body to assess the risk for potential neurological andmusculoskeletal damage. The measuring system is comprised of two motion sensor unitsand a remote control where data is gathered based on step height, step width, theorientation of the calves and step frequency. The motion sensor units which attach to thecalves are comprised of a MCU with a built in Wi-Fi module, a IMU and and time-of-flightsensors. Data is transferred through Wi-Fi and stored on a SD-card as CSV-files on theremote control which is comprised of a Raspberry Pi Zero WH running a Linux operatingsystem (Raspbian). The remote control also has the functions to initiate and complete ameasurement as well as mark an event. The extraction of data from the remote control toanother unit for analysis occurs through SSH and SFTP using third-party programs whichmay require technical knowledge. A unique software was designed specifically for Stritonfor the operating system Windows 10 using Visual Studio (2019) which provides thefunctions to connect to a predefined Wi-Fi access point as well as automatically reconnectto previously connected access point at shutdown, connect through SFTP, list the savedfiles on the remote control, perform file operations, synchronize the date and time on theremote control as well as change settings in the software which is saved locally in a settingsfile. The user interface is minimalistic with the intention to reduce complexity and timerequirement to extract the data from the measuring system Striton. / Ett mätsystem Striton har utvecklats av CMTS, Medicinsk Teknik – FoU på NorrlandsUniversitetssjukhus för rörelseanalys med hjälp av rörelsesensorer som fästs på patientensunderben för att bedöma en potentiell neurologisk samt muskuloskeletal skada.Mätsystemet består av två sensorenheter samt en fjärrkontroll där data samlas in baseratpå höjd av steg, stegbredd, underbenens orientering samt stegfrekvens. Sensorenheternasom fästs på underbenen består av en MCU med inbyggd Wi-Fi modul, IMU och time-offlight sensorer. Data förs över via Wi-Fi och lagras på ett SD-kort i form av CSV-filer påfjärrkontrollen beståendes av en Raspberry Pi Zero WH som driver ett Linuxoperativsystem (Raspbian). Fjärrkontrollen har även funktionerna att kunna starta ochstoppa en mätning samt markera en händelse. Extrahering av data från fjärrkontrollen tillen annan enhet för analys sker via SSH och SFTP med hjälp av tredjepartsprogram som kankräva teknisk kunskap. En unik programvara designades specifikt för Striton tilloperativsystemet Windows 10 i miljön Visual Studio (2019) och tillhandahålleregenskaperna att kunna ansluta till en bestämd Wi-Fi åtkomstpunkt samt automatisktåteransluta till föregående åtkomstpunkt vid avslut, ansluta via SFTP, visa sparade filer frånfjärrkontrollen, utföra filoperationer, synkronisera datum och tid på fjärrkontrollen samtändra inställningar i programvaran som sparas i en lokal inställningsfil. Gränssnittet ärminimalistiskt med syfte att reducera komplexiteten samt tidsåtgången för extrahering avdata från mätsystemet Striton.
|
143 |
Inteligentní elektroměr / Intelligent electricity meterHaman, Martin January 2020 (has links)
The diploma thesis describe design and realization of smart energy meter. The smart energy meter allows remote reading of the measured values and with connected externals modules also switching of connected load. The theoretical part covered measured values definition, required function analysis, components selection and design of smart energy meter. The practical part deal with firmware development, programming, remote control and reading of the measured values. The final chapter deal with realization and calibration of the smart energy meter.
|
144 |
Black-box analýza zabezpečení Wi-Fi / Black-Box Analysis of Wi-Fi Stacks SecurityVenger, Adam January 2021 (has links)
Zariadenia, na ktoré sa každodenne spoliehame, sú stále zložitejšie a využívajú zložitejšie protokoly. Jedným z týchto protokolov je Wi-Fi. S rastúcou zložitosťou sa zvyšuje aj potenciál pre implementačné chyby. Táto práca skúma Wi-Fi protokol a použitie fuzz testingu pre generovanie semi-validných vstupov, ktoré by mohli odhaliť zraniteľné miesta v zariadeniach. Špeciálna pozornosť bola venovaná testovaniu Wi-Fi v systéme ESP32 a ESP32-S2. Výsledkom práce je fuzzer vhodný pre testovanie akéhokoľvek Wi-Fi zariadenia, monitorovací nástroj špeciálne pre ESP32 a sada testovacích programov pre ESP32. Nástroj neodhalil žiadne potenciálne zraniteľnosti.
|
145 |
Zabezpečení bezdrátových sítí IEEE 802.11 / Security of wireless computer networks IEEE 802.11Škodák, Jaroslav January 2008 (has links)
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.
|
146 |
Optimalizace vedení logistiky skladového hospodářství ve velké firmě / Logistic process leadership optimization in big enterprisePřichystal, Tomáš January 2008 (has links)
The Master’s thesis deals with logistics and resources monitoring area, which is inseparable part of every production oriented economic activity. It uses electronic monitoring systems for more effective dealing with stock records in a production company that has many stores. The monitoring utilizes modern technologies, that are burgeoning and finding its use in all branches of market.
|
147 |
Ochrana bezdrátových sítí poskytovatelů internetu / Security protection techniques of wireless networks of internet providersŽiško, Róbert January 2009 (has links)
This master’s thesis can be used as the guidebook for Wi-Fi networks provider in non-licensed zones 2,4GHz and 5GHz. It is good tool to understand wireless technology area and its protection. Reader can follow network design and avoid mistakes that are mentioned in work. This text shouldn’t be a tool or a guide for possible attackers, but an impulse for small providers who provide their networks in unsecured form. In the opening chapter of my work, matters of Wi-Fi networks are thoroughly analyzed. As they are able to get internet connection in a lot of inaccessible places, they are considered to be crucial for the present times. The basic procedure describing Wi-Fi planning is written in thesis and also its legislative that has to be strictly observed. The big disadvantage is riskiness of the wireless connection that allows attackers to attack network in many ways. For mentioned reason it is very important to take utmost account of Wi-Fi network’s security and attack resistance. Unfortunately a lot of networks are either secured partially or unsecured at all. These types of networks are frequently attacked in order to get “free” Internet access or because of competitors fight. In the text below we can find possible Wi-Fi attack forms using by attackers to get Internet access or destroy network hardware what can cause big financial loss to providers. I described design and realization of little-town network using safety tools implementation based on my experience. For that purpose I implemented benchmark tests in graphics as well as practical format.
|
148 |
Zabezpečení standardu 802.11 a jeho možnosti / 802.11 standard security techniques and their featuresEndrle, Pavel January 2009 (has links)
This master´s thesis is about 802.11 standard security techniques and their features. Particular types of this standard and its features are shown in the introduction. Wireless network security cypher alghoritm types, their features, weaknesses and principles of functions are closely described in next few chapters. Realized attacks on these security alghoritms with their principles are described and shown in the practical part of thesis. One chapter is about effectivity, accessibility and practicability valorization of these attacks in practice.
|
149 |
Datová síť pro smart grid v energetice / Data network for smart grid energyDurkoš, Michal January 2013 (has links)
Electric grid as we now it has been without significant change for a long time. Along with the human population grows demand for electricity, which leads to need to create more energy. Bigger interest is in ecology and use of renewable sources, although these do not have constant output which often stresses the grid. These problems are to be solved by smart grids. Smart grids are capable of adjusting energy generation to immediate demand including renewable sources to compensate energy fluctuations in grid. They provide demand response and other applications interesting for end users. Smart grids are combination of achievements in energy, informatics and communication technology. Communication, which is key part of smart grids, has to met certain requirements and can be executed by various technologies. There are described various communication technologies and a design concept of data communication in this paper.
|
150 |
Měření v bezdrátové síti 802.11n se skrytými uzly / Measurements in an 802.11n radio network with hidden nodesVágner, Adam January 2013 (has links)
The current large concentration of wireless networks brings new horizons, but also new concerns. Failure to follow basic rules may produce far-reaching problems that could make more wrinkles to all affected managers and administrators. The aim of this thesis was to measure and compare the radio parameters of selected products and how they behave in neighboring interference and the speed they have while there are hidden nodes. The resulting values were measured in the laboratory network Wificolab and compared with the various support protocols. Possible effects on the specific situation are also analyzed in this thesis.
|
Page generated in 0.0254 seconds