Spelling suggestions: "subject:"internet off things"" "subject:"internet oof things""
101 |
Impact of Internet of Things on Software Business Model and Software IndustryMurari, Bhanu Teja January 2016 (has links)
Context: Internet of things (IoT) technology is rapidly increasing and changes the business environment for a software organization. There is a need to understand what are important factors of business model should a software company focus on obtaining benefits from the potential that IoT offers. This thesis also focuses on finding the impact of IoT on software business model and software industry especially on software development. Objectives: In this thesis, we do research on IoT software business model and also software industry. The objectives of this research are included as follows: 1. Summarize the current business models for IoT and to identify the important factor for IoT business models. 2. Analyze the impact of IoT on software business models. 3. Analyze the impact of IoT on Software development especially on requirement engineering. 4. Provide recommendations how requirements engineering are connected to provide better support business modeling for IoT. Methods: We conducted a systematic literature review based on the guidelines suggested by Wohlin, to find the current business model for the IoT. Next, we designed and executed an industrial survey to explore the impact of IoT on a software business model and software development.The results of survey were statistically analyzed using descriptive statistics, chi-square test of significance and Friedman test. Results: 21 peer reviewed papers were identified which were analyzed in relation to their rigor and relevance. From the literature reviews, results indicate 9 business model elements are being focused on the IoT business models. In addition to this 4 most important business model factors were identified. On the other hand, the industrial survey resulted from 56 survey responses, identified that value proposition is the most important element for the IoT business model. It was also observed that even the impact is high for the value proposition. Regarding the software development, customer demands is highly impactful and moreover, the results suggest that requirement management is highly impactful. Conclusions: The current software business models were found for the IoT industries. In additional the software business model elements which were majorly focused in the IoT industries were also identified and the most important factor which brings the value for IoT business models were also discussed. Furthermore the impact of IoT on software business model element and software development, especially on the requirement phase, was analyzed and discussed. This helps the practitioners to understand the impact of IoT on software business models and software industry and helps the organization to improve IoT business to its full potential.
|
102 |
Performance analysis for an enhanced architecture of IoV via Content-Centric NetworkingLi, Zhuo, Chen, Yutong, Liu, Deliang, Li, Xiang 14 July 2017 (has links)
TCP/IP protocol gradually exposes many shortcomings such as poor scalability and mobility. Content-Centric Networking is a new architecture which cares about the content itself rather than its source. Therefore, this paper proposes a novel IoV architecture which based on Content-Centric Networking and tests its transmission interference time, transmission delay, and throughout in network layer. The experimental results show that the novel architecture is superior to the current IoV in the communication performance.
|
103 |
An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoTKhomlyak, Olha January 2017 (has links)
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "things" in IoT are embedded computing devices it is appropriate to talk about cryptography in embedded of systems. This kind of devices is based on microcontrollers, which have limited resources (processing power, memory, storage, and energy). Therefore, we can apply only lightweight cryptography. The goal of this work is to find the optimal cryptographic solution for IoT devices. It is expected that perception of this solution would be useful for implementation on “limited” devices. In this study, we investigate which lightweight algorithm is better to implement. Also, how we can combine two different algorithms in a hybrid scheme and modify this scheme due to data sending scenario. Compendex, Inspec, IEEE Xplore, ACM Digital Library, and Springer Link databases are used to conduct a comprehensive literature review. Experimental work adopted in this study involves implementations, measurements, and observations from the results. The experimental research covers implementations of different algorithms and experimental hybrid scheme, which includes additional function. Results show the performance of the considered algorithms and proposed hybrid scheme. According to our results, security solutions for IoT have to utilize algorithms, which have good performance. The combination of symmetric and asymmetric algorithms in the hybrid scheme can be a solution, which provides the main security requirements: confidentiality, integrity, and authenticity. Adaptation of this scheme to the possible IoT scenarios shows the results acceptable for implementation due to limited resources of hardware.
|
104 |
Indoor Localization Using Augmented UHF RFID System for the Internet-of-ThingsWang, Jing January 2017 (has links)
Indoor localization with proximity information in ultra-high-frequency (UHF) radio-frequency-identification (RFID) is widely considered as a potential candidate of locating items in Internet-of-Things (IoT) paradigm. First, the proximity-based methods are less affected by multi-path distortion and dynamic changes of the indoor environment compared to the traditional range-based localization methods. The objective of this dissertation is to use tag-to-tag backscattering communication link in augmented UHF RFID system (AURIS) for proximity-based indoor localization solution. Tag-to-tag backscattering communication in AURIS has an obvious advantage over the conventional reader-to-tag link for proximity-based indoor localization by keeping both landmark and mobile tags simple and inexpensive. This work is the very first thesis evaluating proximity-based localization solution using tag-to-tag backscattering communication.Our research makes the contributions in terms of phase cancellation effect, the improved mathematical models and localization algorithm. First, we investigate the phase cancellation effect in the tag-to-tag backscattering communication, which has a significant effect on proximity-based localization. We then present a solution to counter such destructive effect by exploiting the spatial diversity of dual antennas. Second, a novel and realistic detection probability model of ST-to-tag detection is proposed. In AURIS, a large set of passive tags are placed at known locations as landmarks, and STs are attached mobile targets of interest. We identify two technical roadblocks of AURIS and existing localization algorithms as false synchronous detection assumption and state evolution model constraints. With the new and more realistic detection probability model we explore the use of particle filtering methodology for localizing ST, which overcomes the aforementioned roadblocks. Last, we propose a landmark-based sequential localization and mapping framework (SQLAM) for AURIS to locate STs and passive tags with unknown locations, which leverages a set of passive landmark tags to localize ST, and sequentially constructs a geographical map of passive tags with unknown locations while ST is moving in the environment. Mapping passive tags with unknown locations accurately leads to practical advantages. First, the localization capability of AURIS is not confined to the objects carrying STs. Second, the problem of failed landmark tags is addressed by including passive tags with resolved locations into landmark set. Each of the contributions is supported by extensive computer simulation to demonstrate the performance of enhancements.
|
105 |
Supply Chain Discovery Services in an Internet of Things EnvironmentDahbi, Abdelmounaim January 2017 (has links)
Electronic Product Code (EPC) refers to a numbering standard developed to uniquely identify physical objects, loads, locations, assets and other entities which are to be
tracked or otherwise identified. The tracking technology consists of assigning Radio Frequency Identification (RFID) tags, holding universally unique EPC codes, to the entities to be identified. While the EPC-RFID technology is used to identify and capture data about the physical objects to be tracked in a supply chain, the EPCglobal Network ensures the exchange of the captured data between supply chain stakeholders. Such a real-time data exchange increases visibility and efficiency throughout the supply chain, and thus it increases both company profitability and customer satisfaction. The EPCglobal Network can be regarded as the backbone for the future Internet of Things (IoT). We focus our work in this thesis on Discovery Services (DS); a suite of network lookup services enabling users to retrieve all relevant information sources with regards to a given EPC. They can be viewed as search engines for the future business infrastructure deployed in the IoT. Motivated by the unprecedented and incessantly growing amount of EPC data, the expected epidemic growth in the solicitation frequency of the lookup service, and also the foreseen exceptionally large flow of highly sensitive EPC information, we focus on proposing solutions to problems pertaining to two main challenges; architecture design of Discovery Services and their security. On the architecture design level, we propose novel DS architectures with focus directed towards meeting four major requirements; network scalability, query responsiveness, service extensibility and
acceptance. On the security level, we propose probabilistic security schemes aiming at securing even further Discovery Services in the IoT in general, and in the EPCglobal network in particular.
|
106 |
SITE: The Simple Internet of Things Enabler for Smart HomesHafidh, Basim January 2017 (has links)
This thesis presents the Simple Internet of Things Enabler (SITE), a smart home solution that allows users to specify and centrally control IoT smart objects. Unlike most existing systems, SITE supports End-User Development (EUD). It includes features that make the system accessible to users that do not possess a background in Information Technology (IT). Hence, it defines a simple language for the specification of control rules for smart objects. It also provides a user interface to graphically illustrate data received from smart objects.
Furthermore, we present the SITE architecture and describe the components that enable users to define, register, and operate smart objects within a smart home environment. Since deploying applications on the cloud renders many advantages pertaining to data security, robustness, and elasticity of resources, we additionally propose a cloud-based architecture for SITE. In this case, SITE acts as a service hosted on a cloud platform that realizes monitoring and control of a smart home remotely.
Moreover, since most of the objects in any environment are not inherently smart, we propose a framework that affords “everyday” objects the necessary modules to measure and report their state. Hence, users realize the smart objects using a transducer network framework that supports the amalgamation of multiple transducers into a single smart object. To make these objects easily reconfigurable, we apply a plug and play mechanism to enable the clustering of any number of transducers. We propose an algorithm that dynamically detects added and removed transducers from a smart object.
To assess the usability of SITE, we conduct an empirical study involving 20 participants belonging to two user groups: users with technical training (IT users) and users without technical training (Non-IT users). We demonstrate that both user groups can satisfactorily build smart objects and define control rules in a smart home environment using SITE.
|
107 |
Potenciál IoT v Smart city / Potential of IoT in Smart CityPavlíček, Tomáš January 2016 (has links)
The aim of this masters thesis is to identify, in which phase of adoption of Internet of Things (IoT) application areas of concept Smart City are nowadays Czech regional cities, what is their outlook to 2025 and also identify in which dimensions of concept Smart city, supported by IoT technologies, perceive Czech regional cities the greatest potential. Based on information obtained from the studied materials, the concept of Internet of Things (IoT) is described, along with a detailed description of one of its application area, namely Smart City. This area is further divided into specific dimensions, that cover specific application areas which can, through internet technology, support things in a special way. With these insights, the questionnaire (built on identified IoT application areas of smart city) was developed. Thesis should be beneficial for all towns in the Czech Republic, because it provides a comprehensive view of individual IoT application areas of concept Smart City including information on which of these IoT application areas are currently focusing regional cities, and on which they want to focus to the future. On the other hand, the survey results could also be beneficial for commercial entities, which focus on IoT implementation in cities. These entities will be able to recognise which IoT products are currently best for cities.
|
108 |
Sistema automatizado de despacho de ladrillos haciendo uso óptimo del transporte / Automated brick dispatch system making optimal use of transportQuillatupa Amaya, Juan Angel, Ventura Navarro, Miguel 06 June 2019 (has links)
El presente trabajo de tesis es una propuesta de solución para una empresa enfocada en el proceso de planificación y distribución de producto terminado, quienes a diferencia de otras empresas donde se externaliza la operación logística de transporte, esta lo realiza con recursos propios. Además, las leyes nacionales actuales se vuelven cada vez más estrictas en cuanto al transporte. Es por esto que surge la necesidad de tener sistemas automatizados de planificación de distribución de despacho para hacer uso óptimo del transporte en función a la carga a entregar.
Para esto, los algoritmos, las matemáticas y la implementación de hardware son importantes, pues son la base para plantear una solución que considere todas las variables posibles en el negocio.
El documento está divido en ocho capítulos. El primero corresponde a los fundamentos teóricos, así como un análisis de la organización objetivo y la identificación de la situación problemática. El segundo capítulo establece los objetivos del proyecto, así como su fundamentación. También detalla los beneficios del proyecto y compara la solución con diferentes propuestas del mercado.
El tercer capítulo modela el negocio bajo el proceso de desarrollo de software RUP. El cuarto capítulo define los requerimientos del sistema, bajo el mismo proceso de desarrollo de software que en el modelado de negocio.
El quinto capítulo define la arquitectura del software, identifica las metas, restricciones y mecanismos arquitectónicos que van a restringir la construcción del producto. En el sexto capítulo se describen los patrones de sistema de la solución propuesta, el modelo de datos, y la construcción propiamente del sistema.
En el séptimo capítulo se describe el plan de calidad y las pruebas del software.
Finalmente, el octavo y último capítulo detalla la aplicación de gestión de proyectos bajo la metodología establecida por el PMI®. / This thesis work is a proposal for a solution for a company focused on the process of planning and distribution of finished product, who unlike other companies where the logistics operation of transportation is outsourced, this is done with own resources. In addition, current national laws are becoming stricter in terms of transport. That is why the need arises to have automated dispatch distribution planning systems to make optimal use of transport according to the load to be delivered.
For this, the algorithms, the mathematics and the hardware implementation are important, because they are the basis to propose a solution that considers all the possible variables in the business.
The document is divided into eight chapters. The first corresponds to the theoretical foundations, as well as an analysis of the objective organization and the identification of the problematic situation. The second chapter establishes the objectives of the project, as well as its foundation. It also details the benefits of the project and compares the solution with different market proposals.
The third chapter models the business under the RUP software development process. The fourth chapter defines the requirements of the system, under the same software development process as in business modeling.
The fifth chapter defines the architecture of the software, identifies the goals, restrictions and architectural mechanisms that will restrict the construction of the product. The sixth chapter describes the system patterns of the proposed solution, the data model, and the construction of the system itself.
In the seventh chapter, the quality plan and the software tests are described.
Finally, the eighth and last chapter details the application of project management under the methodology established by the PMI®. / Tesis
|
109 |
Latency based device fingerprinting in a low-power industrial wireless sensor networkKruger, Carel Phillip January 2021 (has links)
Security is a key challenge for any IIoT network and more so for constrained IWSN deployments.
Novel methods are thus required to enhance security, taking into consideration the lossy and low power
nature of the IWSN. The use of ICMP packets is proposed as a method to generate fingerprinting
information for IWSN devices. The ICMP based method uses the round-trip time information in the
ICMP header as a fingerprinting metric. The results showed that the effect of the physical layer can be
averaged out of the measurement if enough samples are available. A linear relationship was found
between hop count and round-trip time for a static network which can be used in the design phase of the
IWSN network or alternatively as a method to fingerprint routing anomalies in real-time. The ICMP
method was able to differentiate between devices from different vendors, but unable to fingerprint
devices from the same vendor due to physical layer interference. The work shows that fingerprinting
in an IWSN using the ICMP method is possible if the timing delta under investigation is an order
of magnitude larger than the timing variation introduced by the physical layer while maintaining a
reasonable signal-to-noise ratio. / Dissertation (MEng (Computer Engineering))--University of Pretoria, 2021. / Electrical, Electronic and Computer Engineering / MEng (Computer Engineering) / Unrestricted
|
110 |
Tech. is More: Holistic Integration of Technology into HousingKennedy, Tyler Douglas 15 July 2021 (has links)
No description available.
|
Page generated in 0.1005 seconds