• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • Tagged with
  • 6
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Interaction models for profiling assets in an extensible and semantic WoT framework,

Amir, Mohammad, Hu, Yim Fun, Pillai, Prashant, Cheng, Yongqiang, Bibiks, Kirils January 2013 (has links)
No / This paper addresses interoperability issues in an IoT-based cloud environment consisting of multiple WSN clusters made up of connected objects embedded with smart devices which are fully integrated to the Web, forming the Web-ofThings (WoT). Two levels of interoperability are considered: Device-level interoperability and semantic-level interoperability. Eminent issues relating to device heterogeneity and platform dependencies are resolved by using an OSGi (Open Service Gateway initiative) framework as the software fabric for IoT deployment. However, OSGi alone is not enough to resolve data heterogeneity issues, and even less in providing a semantic mapping of devices and their data streams in a generic deployment. To enable this level of interoperability, a novel system that envisages an all-purpose collaboration framework for the WoT to deliver Sensing and Collaboration as a Service (SeaaS/CaaS) is presented.
2

A secure design of WoT services for smart cities / Conception sécurisée de services IoT pour les villes connectées

El jaouhari, Saad 13 December 2018 (has links)
WebRTC est une technologie récente de communication qui permet d’établir des échanges multimédia conversationnels directement entre navigateurs. Nous nous intéressons dans cette thèse à des locuteurs dans un Smart Space (SS) défini comme un environnement centré-utilisateur instrumenté par unensemble de capteurs et d’actionneurs connectés. Nous analysons les capacités nécessaires pour permettre à un participant d’une session WebRTC d’impliquer dans cette même session, les flux induits par les objets connectés appartenant au SS d’un utilisateur quelconque de la session. Cette approche recèle un gisement de nombreux nouveaux usages. Nous limitons notre analyse à ceux concernant l’exercice distant d’une expertise et d’un savoir-faire. Techniquement, il s’agit d’articuler de façon contrôlée WebRTC et IoT/WoT. Nous procédons à une extension de WebRTC par WoT pour fournir à tout utilisateur d’une session WebRTC, un accès aux objets connectés du SS de tout autre participant à la session, en mettant l’accent sur la sécurisation de cet accès ainsi que sur sa conformité aux exigences de respect de la vie privée (RGPD) de l’utilisateur concerné. Le positionnement de notre approche dans le contexte des services de communication opérant dans les villes connectées, impose la prise en compte de SSs multiples et variés induisant chacun ses propres politiques de routage et de sécurité. Pour répondre à nos objectifs, il devient nécessaire au cours d’une session WebRTC, d’identifier, sélectionner, déployer et appliquer les règles de routage et de sécurité de façon à garantir un accès rapide et sécurisé aux différents SSs concernés et distribués sur tout le réseau. Nous développons une architecture originale répondant à ces besoins et intégrant un contrôleur SDN du fait de l’étroite imbrication entre les problématiques de routage et de sécurité. Un prototype illustrant notre approche a été mis en oeuvre et testé afin d’évaluer la performance et la sécurité du système. Nous illustrons finalement notre approche dans le domaine de la santé en démontrant son apport pour gérer une infrastructure de grande taille telle qu’un hôpital. / The richness and the versatility of WebRTC, a new peer-to-peer, real-time and browser based communication technology, allowed the imagination of new and innovative services. In this thesis, we analyzed the capabilities required to allow a participant in a WebRTC session to access the smart Things belonging to his own environment as well as those of any other participant in the same session. The access to such environment, which we call “SmartSpace (SS)”, can be either passive, for example by monitoring the contextual information provided by the sensors, or active by requesting the execution of commands by the actuators, or a mixture of both. This approach deserves attention because it allows solving in an original way various issues such as allowing experts to remotely exercise and provide their expertise and/or knowing how. From a technical point of view the issue is not trivial because it requires a smooth and mastered articulation between two different technologies: WebRTC and the Internet of Things (IoT) /Web of Things (WoT). Hence, the first part of the problem studied in this thesis, consists in analyzing the possibilities of extending WebRTC capabilities with theWoT. So as to provide a secure and privacy-respectful access to the various smart objects located in the immediate environment of a participant to any otherend-user involved in the same ongoing WebRTC session. This approach is then illustrated in the ehealth domain and tested in a real smart home (a typical example of a smart space). Moreover,positioning our approach in the context of communication services operating in smart cities requires the ability to support a multiplicity of SSs,each with its own network and security policy. Hence,in order to allow a participant to access one of his own SSs or one of another participant (through a delegation of access process), it becomes necessary to dynamically identify, select, deploy, and enforce the SS’s specific routing and security rules, so as to have an effective, fast and secure access. Therefore, the second part of the problem studied in this Ph.D.consists in defining an efficient management of the routing and security issues regarding the possibility of having multiple SSs distributed over the entire network.
3

Measurement and modelling of combustion in a spark ignition engine

Brown, Andrew Gavin January 1991 (has links)
A study has been conducted into the causes of cycle by cycle variations in combustion within a spark ignition engine, the best measured engine parameter to use for its characterization, and the effects that: ignition timing, equivalence ratio, fuel type, throttle position and knock, have upon it. A Ricardo E6 single cylinder variable compression ratio research engine was instrumented to allow measurement of: cylinder pressure, temperatures, speed, load, fuel flow and air flow. The engine was also fitted with an optical slice that allowed optical access to the combustion chamber and enabled measurement of the early flame speed (up to 10 mm from spark plug gap) using a laser schileren system. Cylinder pressure data were collected on a dedicated HP1000 computer for every degree of crank angle rotation for up to 300 successive cycles. A phenomenological model was developed for turbulent combustion that split the combustion process into three phases: early laminar burn, turbulent combustion, and final burn. The model allowed the study of the physical phenomena occurring within the combustion chamber and enabled insights to be gained into their effects on combustion and cyclic variations. The study showed: The variation in mixture strength has a far greater effect on the average and Coefficient of Variation (COV) values of all the combustion performance parameters, than does changing the fuel type. Cycle by cycle variations in combustion are best characterized by COV of imep. The onset of knock has no discernible effect on the COVs of the measured parameters. The part throttle results show higher COVs than at Wide Open Throttle (WOT) due to slower burn, supporting the theory that faster initial flame speeds reduce cyclic variations. The combustion model was used to support the hypothesis that cycle by cycle variations are caused by movement of the flame kernel by turbulence within the combustion chamber.
4

Accession of least developed countries into the world trade organisation: the perspective of south Sudan

Oliver, Bakadi Sannah January 2013 (has links)
Magister Legum - LLM
5

A generic and extensible asset model for a semantic collaboration framework

Amir, Mohammad, Hu, Yim Fun, Pillai, Prashant 25 February 2014 (has links)
No / Analysis of existing literature reveals the growing need to tackle the issue of unified data dissemination. Where this issue has been given some focus, the outreach has been more or less limited to similar systems (i.e. cross-instance collaboration) and no particular focus has been applied on the problem of exposing this data or knowledge to third parties (i.e. cross-vendor collaboration). This paper proposes an integration of semantic technologies within the Web of Things based on the concept and principles of the Service-Oriented Architecture to realize a distributed and semi-autonomous collaboration framework that is capable of offering cross-vendor information exchange and collaboration facilities. Powered by a semantic engine and exposed as a web application with a RESTful API, the generic framework realizes an extensible knowledge management and exchange system that accounts for the dynamic landscape in business-centric Web of Things applications. Disaster management is taken as a potential application scenario to critically analyse and evaluate the system prototype and show that the asset model for the proposed framework is sufficiently capable of meeting the modern-day and next-generation collaboration needs in a world of ever-increasing cross-vendor information sharing.
6

An alternate military strategy for the War on Terrorism

Canonico, Peter J. 12 1900 (has links)
Approved for public release; distribution in unlimited. / Alternate Military Strategy for the War on Terrorism calls for addressing the war as a global insurgency. Addressing the war on terrorism as a Global Insurgency provides an alternative strategic framework for prosecuting the campaign. This study is intended to determine the utility of analyzing the war on terrorism using an insurgency/counterinsurgency conceptual framework. Additionally, the recommendations can be applied to the strategic campaign, even if it is politically unfeasible to address the war as an insurgency. The study is broken down into five chapters: an introduction, explanation of Dr. McCormick’s Counterinsurgency model used for analysis, application of the model to a historical case, application to the war on terrorism, and conclusions. The first half of the study is intended to provide a thorough understanding of Dr. McCormick’s model. This is done by, first providing an overview of the model and, second, applying the model to a historical case: the insurgency in Lebanon following the Israeli invasion in 1982. The second half of the study addresses the current U.S. lead war on terrorism. The counterinsurgency model is applied to the war on terrorism based on the al Qaeda Network and the United States’ vision and mission for the conflict. Ten on terrorism are drawn from the analysis. The final chapter addresses the utility provided by the insurgency/counterinsurgency framework as applied to the war on terrorism. / Major, United States Army

Page generated in 0.0197 seconds