• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 1
  • Tagged with
  • 5
  • 5
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Framtida möjligheter för mobil styrning av hemmet : / Future possibilities for mobile control of electrical devices at home

Kääramees Vretblad, Oskar January 2012 (has links)
Målen med denna undersökning har varit att studera vilka tekniker som idag finns för att möjliggöra mobil styrning av hemmet och därigenom underlätta elanvändarens roll i en uppgradering av det befintliga elnätet, vilken/vilka tekniker som bör få störst betydelse för framtidens smarta hem, samt hur en implementering av en mobil applikation för fjärrstyrning av hemmet skulle kunna tas fram. Undersökningen har i första hand genomförts genom en omfattande förstudie och informationsinhämtning, genom jämförelser av för- och nackdelar mellan olika nätverkstekniker, samt genom utredande av lämplig utvecklingsmiljö baserat på tillgång till öppet utvecklar API, produkttillgänglighet och support, samt initialkostnad för utvecklingsverktyg och system för testning. Undersökningen har visat att det idag inte finns någon klar vinnare bland nätverksteknikerna på området, även om Zigbee, Z-Wave och Wi-Fi är de starkaste kandidaterna till att vinna stora marknadsandelar. Det är således inte uppenbart att någon teknik kommer att få mycket större utbredning än de övriga då teknikerna istället kan komma att komplettera varandra då de är starka på olika områden. Undersökningen har också visat att som utvecklingsmiljö är det svenska företaget Telldus produktlösning (Tellstick) en relativt billig och enkel produkt att använda för att komma igång med styrning av hemmet, samt att de tillhandahåller två öppna APIer och uppmuntrar tredjepartsutveckling av applikationer för deras system. / The objectives of this study has been to examine the techniques available for enabling home automation via mobile control (for instance via a smartphone) in order to facilitate the user's role in contributing to the upgrade of the present power-grid, but also to treat the matter of which of the techniques that will probably be of most importance for the future of the smart home, and how an implementation of a mobile application for remote home controlling could be developed. The investigation was primarily conducted through a comprehensive feasibility study of information gathering, comparison of the pros and cons of different networking techniques, and investigation of suitable development environments based on the availability of open developer APIs, availability of product solutions and support, and the cost of development tools for both development and system testing. The investigation has shown that there is currently no clear winner among the networking techniques in this area, although Zigbee, Z-Wave and Wi-Fi are the strongest candidates to gain large market shares. There is also no certainty that any technology will play a much greater role than the others since the techniques may complement each other because of their strength in different areas. The investigation also showed that as for a development environment the product solution developed by the Swedish company Telldus (called Tellstick) is relatively cheap and simple to use to get started with home automation, and that they encourage third party development by offering two open APIs for application development.
2

Bluetooth Communication For Remote Controlling Purpose / Bluetooth-kommunikation för fjärrstyrningsändamål

Florén, Johan, Lindberg, Daniel January 2004 (has links)
<p>The concept of remote controlling electrical devices is not new; people of today are used to being able to control their household electronic items without making an effort to walk up to the device. </p><p>In this thesis the aim is to use Bluetooth radio signals instead of the traditional infrared light to achieve the remote control functions. As a test application a Sony Compact Disc player is modified in order to be radio controlled with a standard Ericsson T39 mobile phone used as a remote. Since the test application is rather simple without any special requirements the development of a specific radio communication system has not been considered. Instead available pre-manufactured devices were examined. A Bluetooth evaluation kit was purchased and the test project consisted of the goal of linking the evaluation board to the CD player with an AVR microcontroller and getting the whole system to communicate with the mobile phone.</p>
3

Bluetooth Communication For Remote Controlling Purpose / Bluetooth-kommunikation för fjärrstyrningsändamål

Florén, Johan, Lindberg, Daniel January 2004 (has links)
The concept of remote controlling electrical devices is not new; people of today are used to being able to control their household electronic items without making an effort to walk up to the device. In this thesis the aim is to use Bluetooth radio signals instead of the traditional infrared light to achieve the remote control functions. As a test application a Sony Compact Disc player is modified in order to be radio controlled with a standard Ericsson T39 mobile phone used as a remote. Since the test application is rather simple without any special requirements the development of a specific radio communication system has not been considered. Instead available pre-manufactured devices were examined. A Bluetooth evaluation kit was purchased and the test project consisted of the goal of linking the evaluation board to the CD player with an AVR microcontroller and getting the whole system to communicate with the mobile phone.
4

Developing Primary Controls for Multiple CE-Machines in a Teleoperation's Environment / Utveckling av primärkontroller för flera CE-maskiner i en fjärrstyrningsmiljö

Andersson, Ingo, Garbers, Joel January 2020 (has links)
Background: An intermediate step towards fully autonomous construction equipment is “assisted tele-remote operation”. These sorts of operations imply that an operator remotely supports machines that has encountered a situation that autonomous systems onboard the construction machines (CM) cannot solve. Considering teleoperators are not required to continuously monitor the CM in an assisted tele-remote environment, multiple construction machines can be teleoperated simultaneously. For simplification, “assisted tele-remote operation” will now be referred to as “teleoperations”. Volvo Construction Equipment is currently exploring the possibility to teleoperate wheel loaders, articulated haulers, and excavators from a single platform. To do this, primary controls adapted for operating these machines are needed. The primary controls should be designed with the needs of a teleoperator in mind while taking functionality into account, which is needed when CM are both operated conventionally and in tele-remote applications. This procedure will be referred to as relevant primary controls. As the primary controls from three different CM-types are destined to be combined into one platform, the teleoperations platform will be referred to as “3-1 CM teleoperations platform”. The purpose of this thesis project was to propose a relevant solution to primary controls for a 3-1 CM teleoperations platform. To fulfil this purpose, the following two research questions (RQ) where formulated: • RQ1: What are the challenges for teleoperating construction equipment? • RQ2: What defines primary controls in a 3-1 CM teleoperations platform and how can the layout be improved? Method: Using interviews, observations, and literature as qualitative data collection methods, several insights where gained. A scenario for the CM was defined to define the situation in which the quantitative data collection method would be performed. Needs of current CM operators combined with teleoperators have been analysed and listed. Quantitative data has been collected and analysed to design the layout of the primary controls using the objective data as a basis. Result: The research questions were answered with the following results: • RQ1: Insights that resulted in several themes describing how teleoperations can be developed by looking at different challenges it can face. • RQ2: Specifications of the functions included in the new ‘primary controls’ based on CM functions from the company and from teleoperating experiences from several industries. An analysis on how often the functions for the new ‘primary controls’ were used, was carried out. The answers to the research questions were used as a basis to fulfil the purpose of this thesis project by proposing a conceptual solution for primary controls to a teleoperation’s platform for operating multiple CM. Conclusions: It was established that a 3-1 CM teleoperations platform can be developed towards certain CE-machine types. Moreover, additional analysis with experienced operators of each machine type are needed to improve and verify the most optimal layout of the primary controls and platform. Further research is still required to validate the answers to RQ1 and RQ2.
5

A security analysis in a life science environment : a case study / En säkerhetsanalys inom life science : en fallstudie

Gripenstedt, Daniel, Öberg, Joakim January 2021 (has links)
The cyber-threat against life-science is much larger today than just a couple of years back. Companies within the field have valuable information from example R&amp; Din pharmaceuticals, biotech, personal data of vulnerable patients or medical devices and that is something attackers are very much aware of. Lab equipment have generally been disconnected from the internet to protect their data even more but the benefits a company would gain in diagnostics and support could outweigh it. In this paper a fictional environment with lab instruments, control units and databases is set up based on a real system used by Company X. A security analysis for the system is conducted with the goal to identify and analyse potential threats and risks. This was done by first study relevant literature along with meetings with representatives from Company X. The security analysis is made with a threat model called Yacraf which includes six different phases, the process was easy to follow and resulted in potential ways how an attacker could gain access to the system. The results also show different protection scenarios for these attacks and how Company X could implement preventive measures in advance. If Company X where to implement such a remote control system a first step would be to educate the employees to recognize common cyber-threats and only set up the remote connection when needed. / Cyberhotet mot life science är mycket större idag än för bara ett par år tillbaka. Företag sitter på värdefull information från exempel forskning och utveckling inom läkemedel, bioteknik, personuppgifter om utsatta patienter eller medicintekniska produkter och det är något som hackare är mycket medvetna om. Labutrustning har i allmänhet kopplats bort från internet för att skydda deras data ännu mer, men fördelar företag kan vinna på diagnistik och support skulle kunna uppväga det. I denna uppsats skapas en fiktiv miljö med laboratorieinstrument, styrenheter och databaser baserat på ett verkligt system som används av företag X. En säkerhetsanalys för systemet genomförs med målet att identifiera och analysera potentiella hot och risker. Detta gjordes genom att först studera relevant litteratur tillsammans med möten med företrädare för företag X. Säkerhetsanalysen är gjord med en hotmodell som heter Yacraf som innehåller sex olika faser, processen var lätt att följa och resulterade i potentiella sätt hur en angripare kunde vinna tillgång till systemet. Resultaten visar också olika skyddsscenarier för dessa attacker och hur Company X kunde genomföra förebyggande åtgärder i förväg. Om företag X skulle implementera ett sådant fjärrkontrollsystem skulle ett första steg vara att utbilda de anställda att känna igen vanliga cyberhot och bara ansluta fjärranslutningen vid behov.

Page generated in 0.1113 seconds