Spelling suggestions: "subject:"then internet off things"" "subject:"then internet oof things""
271 |
Monitorage des réseaux des capteurs sans fils (WSN) : application à l'interopérabilité sécurisée / Wireless Sensors Networks (WSN) monitoring : application to secure interoperabilityFuentes Samaniego, Raul Armando 27 February 2017 (has links)
La formule "Internet of Things'' a pris du sens à la fois au sein de la communauté public et de recherche. La raison principale est qu'en 2011, le nombre d'objets connectés à Internet surpassent le nombre d'humains en ligne, et il est attendu qu'en 2020, le nombre d'objets connectés dépassent les 20 billions. Etant donné la présence d'un grand nombre de plateformes hétérogènes qui composent l'IoT, notre intérêt se focalise sur les Réseaux de Capteurs (WSN), qui sont composés des petits dispositifs avec des contraintes de ressources (capacité de mémoire faible, processeur de faible puissance et faible puissance matérielle) qui collectent un ou plusieurs types de données. Presque toutes les recherches menées à ce jour reposent sur la standardisation de protocoles de communication, l'amélioration de la performance, l'optimisation de la consommation de ressources, etc. La sécurité a été reléguée au second plan, dû principalement au faibles ressources disponibles sur les capteurs. Cependant, les données collectées dans de multiples scénarios peuvent être très sensibles. Les données doivent être stockées de manière sûr et doivent être transmises de manière sûr d'un point à un autre. Le travail développé dans cette thèse définit les mécanismes permettant de garantir une communication sûr entre les capteurs. Et aussi fournissant des outils natifs pour le monitorage des communications, afin de valider ces mécanismes directement sur le réseaux / The denominated "Internet of Things'' (IoT) has been getting relevance in both the public and research communities. The main reason is that on 2011, the number of “objects” connected to the Internet surpassed the number of humans online, and is expected that for 2020, the number of objects exceeds the amount of 20 billion. Because of the high number of heterogeneous platforms that composed the IoT, our interest is centered around the Wireless Sensors Networks (WSN), which are composed by small devices with constrained resources (small amount of memory, small power processor, and small power supply) that collect one or more type of data. Almost all the research conducted to date relies on standardizing the communication protocols, ameliorating the performance, optimizing the resource consumption, etc. Security has been relegated to a second plane, due mainly to the low resources available on the sensors. However, the data collected in many scenarios can be highly sensitive. The data must be stored in a safe way and must be transmitted in a safe approach from the origin to the destiny. The work developed in this dissertation defines mechanisms to guarantee the safety of the communication between sensors. And, providing native tools for the monitoring of the communication, to validate these mechanisms directly on the network
|
272 |
Complexity Control for Low-Power HEVC Encoding / Contrôle de la complexité pour l'encodage HEVC basse consommation d'énergieMercat, Alexandre 07 December 2018 (has links)
L'Internet des objets (loT) est devenu une réalité et ses applications pressenties vont fortement augmenter la demande de vidéo mobile. En conséquence, les systèmes montent en complexité algorithmique et le portage du codage vidéo sur plates-formes embarquées devient problématique. Les nouveaux contenus vidéo 4K et 360°, venant avec des résolutions spatiales (8K, 16K) et temporelles (120 images/seconde élevées compliquent encore le problème. Il est donc nécessaire de réduire l'empreinte des nouveaux codec tels que HEVC tout en préservant les performances en compression et en qualité d'image de ces codecs, La performance énergétique limitée des batteries des systèmes embarqués pousse à proposer de nouvelle méthodes pour ajuster et contrôler la complexité et l'énergie des codecs HEVC. Ce document propose un ensemble d'études dont l'objectif est d'ajuster et de contrôler la complexité et donc la consommation énergétique de l'encodeur HEVC. Deux méthodes de prédiction de découpe de CTU sont proposées : la première basée sur une approche statistique utilisant la variance de l'image et la seconde utilisant l'intelligence artificielle. À partir de cette prédiction, une méthode est proposée pour ajuster la complexité de l'encodage HEVC. Cette solution étend l'espace de recherche autour de la prédiction et alloue la complexité dans l'image afin de minimiser les dégradations en termes de compression et de qualité. Enfin un système de contrôle temps réel de la complexité d'encodage est proposé. Il démontre l'applicabilité de contributions de ce document en maintenant la complexité d'encodage proche d'une consigne. / The Internet of Things (loT) is now a reality. Forthcoming applications will boost mobile video demand to an unprecedented level. The induced increase in computational complexity is a challenge when executing in real-time new video coding standards on embedded platforms, limited in computing, memory, and energy. New 4K UHD and 360-degree video contents coming with high spatial (SK, 16K) and temporal (120fp resolutions further complicate the problem. In this context, codecs such as HEVC (High Efficiency Vide Coding) must be worked on to reduce their complexity while preserving the bitrate and image quality. Th bounded energy density of embedded system's batteries requires designers to propose new methods scaling and controlling the complexity and energy consumption of HEVC codecs. This document presents a set of studies aiming at scaling and controlling the complexity, and therefore the energy consumption, of HEVC Intra encoding. Two methods of quad-tree partitioning prediction in "one-shot are proposed: one based on variance-aware statistic approach and one based on Machine Learning using data-mining classifiers. From the obtained prediction, a generic tunable complexity scheme of HEVC encoding is introduced. It expands the search space around the original partitioning prediction and allocates complexit in a frame while minimizing performance loss in terms of bitrate and visual quality. Finally, a real-time contr system is created that dynamically manages the encoding process to keep the encoding complexity under specific tarjet. It demonstrates the a licability of the mayor contributions of this document.
|
273 |
SYSTEM DESIGN AND DEVELOPMENT FOR VISUAL PROGRAMMING OF ROBOT-IOT WORKFLOWSPawan Sudhindra Rao (6866039) 12 October 2021 (has links)
<p>Autonomous
Mobile Robots (AMR) and IoT (Internet of Things) devices have substantial
potential to increase productivity in Small and Medium Enterprises (SME).
However, factors such as high costs involved in setting up and maintaining AMR
automation and deficit of programming expertise among factory workers render
AMR automation uneconomical for SMEs. </p><p><br></p><p></p><p>Visual
Programming can be used in the spatial context of the operating environment to
enable closer mental models at the right level of abstraction for novice
programmers. In this thesis, we develop a system for deploying a Spatially
Situated Visual Language (SSVL) for programming robot-IoT workflows. To address
the challenges of interoperability, scalability, and versatility of industrial
machinery, we develop a novel communication protocol based on the Resource
Description Framework (RDF). Our communication protocol forms the basis of a
system architecture that integrates SSVL, IoT devices, and mobile robots that
enables factory workers to program AMR workflows. We design, implement and
validate the system and the architecture following the systems engineering
approach. To evaluate the system developed in an industrial context, we deploy
the system to author AMR workflows for material handling application for an SME
painting factory.</p><p></p>
|
274 |
Using Blockly to Create Simple Sensor & Actuator Based Applications on the SensibleThings PlatformXia, Yuanhong January 2014 (has links)
Research at Miun investigates the so called “Internet of Things”. The research has so far produced components for sharing sensor and actuator information on the Internet, most notably the Sensible Things platform. The Sensible Things platform can run on many different devices such as smart phones, raspberry Pi devices, and desktop computers. However, programming applications based on the Sensible Things platform and deploying it on the hardware require knowledge of the Java programming language and the API of the platform. Today, many novice and first time programmers learn to program using the Blockly programming method, which include connecting blocks together to form simple procedures. Therefore, we have applied the Blocky method to ease the development of simple applications on the Sensible Things platform. After the work was done, the general users are now able to create entry level Sensible Things Applications.
|
275 |
Resource allocation in cellular Machine-to-Machine networksAlhussien, Nedaa 06 December 2021 (has links)
With the emergence of the Internet-of-Things (IoT), communication networks have evolved toward autonomous networks of intelligent devices capable of communicating without direct human intervention. This is known as Machine-to-Machine (M2M) communications. Cellular networks are considered one of the main technologies to support the deployment of M2M communications as they provide extended wireless connectivity and reliable communication links. However, the characteristics and Quality-of-Service (QoS) requirements of M2M communications are distinct from those of conventional cellular communications, also known as Human-to-Human (H2H) communications, that cellular networks were originally designed for. Thus, enabling M2M communications poses many challenges in terms of interference, congestion, spectrum scarcity and energy efficiency. The primary focus is on the problem of resource allocation that has been the interest of extensive research effort due to the fact that both M2M and H2H communications coexist in the cellular network. This requires that radio resources be allocated such that the QoS requirements of both groups are satisfied. In this work, we propose three models to address this problem.
In the first model, a two-phase resource allocation algorithm for H2H/M2M coexistence in cellular networks is proposed. The goal is to meet the QoS requirements of H2H traffic and delay-sensitive M2M traffic while ensuring fairness for the delay-tolerant M2M traffic. Simulation results are presented which show that the proposed algorithm is able to balance the demands of M2M and H2H traffic, meet their diverse QoS requirements, and ensure fairness for delay-tolerant M2M traffic.
With the growing number of Machine-Type Communication Devices (MTCDs) the problem of spectrum scarcity arises. Hence, Cognitive Radio (CR) is the focus of the second model where clustered Cognitive M2M (CM2M) communications underlaying cellular networks is proposed. In this model, MTCDs are grouped in clusters based on their spatial location and communicate with the Base Station (BS) via Machine-Type Communication Gateways (MTCGs). An underlay CR scheme is implemented where the MTCDs within a cluster share the spectrum of the neighbouring Cellular User Equipment (CUE). A joint resource-power allocation problem is formulated to maximize the sum-rate of the CUE and clustered MTCDs while adhering to MTCD minimum data rate requirements, MTCD transmit power limits, and CUE interference constraints. Simulation results are presented which show that the proposed scheme significantly improves the sum-rate of the network compared to other schemes while satisfying the constraints.
Due to the limited battery capacity of MTCDs and diverse QoS requirements of both MTCDs and CUE, Energy Efficiency (EE) is critical to prolonging network lifetime to ensure uninterrupted and reliable data transmission. The third model investigates the power allocation problem for energy-efficient CM2M communications underlaying cellular networks. Underlay CR is employed to manage the coexistence of MTCDs and CUE and exploit spatial spectrum opportunities. Two power allocation problems are proposed where the first targets MTCD power consumption minimization while the second considers MTCD EE maximization subject to MTCD transmit power constraints, MTCD minimum data rate requirements, and CUE interference limits. Simulation results are presented which indicate that the proposed algorithms provide MTCD power allocation with lower power consumption and higher EE than the (Equal Power Allocation) EPA scheme while satisfying the constraints. / Graduate
|
276 |
Transversality of Information and Communication Technologies in the Prevention of Gender-Based Violence from a Multilevel Approach — Proposals of Application / Transversalidad de las Tecnologías de la Información y las Comunicaciones en la Prevención de la Violencia de Género desde un Enfoque Multinivel — Propuestas de AplicaciónRodríguez Rodríguez, Ignacio 24 March 2021 (has links)
En la presente tesis se estudia, bajo la forma de compendio de publicaciones, el rol que pueden jugar las denominadas Tecnologías de la Información y la Comunicación (TIC) en la raíz de la desigualdad de género y las violencias que se desencadenan a partir de ésta. Muchas investigaciones se han centrado en la Violencia de Género (VG) y su conexión con otros temas relacionados, así como sus causas, orígenes, y medidas para hacerle frente. La interseccionalidad de las cuestiones de género, y dentro de éstas, la violencia, obliga a que el enfoque sea transversal y se aborde en diversos ámbitos (multinivel). A pesar de este enfoque múltiple y teniendo en cuenta que la forma en que se desarrolla la violencia y su impacto en las mujeres en un entorno caracterizado por el uso de las TIC, (teléfonos móviles, redes sociales o, en general, el uso de Internet), no se ha estudiado ni documentado suficientemente aún esta vertiente tecnológica. Esta tesis aborda las intersecciones entre las TICs y el ámbito de la igualdad y la VG como si de un relato cronológico se tratara. Así, primeramente, se parte del estudio del ámbito docente como origen de las brechas de género educativa y digital, las cuales, a la postre, pueden representar el germen de la desigualdad y la violencia. En este ámbito educativo, se analizan las distintas medidas que las universidades implementan basándose en aspectos tecnológicos para mitigar la violencia que se puede producir en dicho entorno. Con posterioridad, se evalúa la posible predicción de las agresiones mediante técnicas de aprendizaje máquina. Seguidamente, se analiza la gestión de esta violencia de género en un entorno Internet of Things y, finalmente, se aborda la protección de las personas supervivientes de VG por el uso de biosensores y análisis inteligente de datos.
|
277 |
Regulátor solárního ohřevu bazénu / Solar pool heaterJablončík, Lukáš January 2017 (has links)
The master´s thesis deals with the design of the solar heating regulator of the swimming pool. The basis was to study the available solutions for the solar pool controllers, to define the requirements, to design the concept and the block diagram of the own thermostat. The thesis also provides a description of several for the Internet of Things. The most suitable is used to control the thermostat. The resulting thermostat regulates two power outputs for filtration and the pump, it can be set using the keyboard and graphic display. At the end of the work is practically verified functionality on the model and on the real pool with solar heating.
|
278 |
Bezpečná autentizace a klíčový management v Internetu věcí / Secure Authentication and Key Management in the Internet of ThingsŠkunda, Patrik January 2018 (has links)
This thesis deals with issues of secure authentication and key management in the Internet of Things. It describes basic protocols used in IoT, cryptographic primitives, communication technologies in IoT and end elements. It also includes a measuring the performance of cryptographic primitives on Raspberry Pi and selecting the appropriate LPWAN simulation technology. The conclusion of the work is devoted to the simulation of a LoRaWAN network
|
279 |
Auto počítač založený na Raspberry Pi / Car computer based on Raspberry PiMatula, Vladimír January 2020 (has links)
The main goal of this diploma thesis is to investigate the smart cars field together with the technologies linked closely to it. Further, the thesis offers an overview of options to extend the vehicle capabilities with the car computer created with the Raspberry Pi Zero W. The thesis provides hands-on experience and is stuctured into two parts. The first, theoretical section focuses on Internet of Things and Machine to Machine communication. It also describes the currently available smart car solutions on the market, their pros and cons. The practical part of this thesis describes design and creation of a smart computer based on Raspberry Pi Zero W with draft of self-made security system from vehicle containing a motion sensor and a camera. It also includes a development and integration steps with a mobile application capable of viewing the static information regarding the car state, such as Rotations per minute. Vehicle speed, etc. The created system also has the capability of informing the user about it's current location on request.
|
280 |
Implementace a vyhodnocení komunikační technologie LoRaWAN v simulačním prostředí NS-3 / Implementation of the LoRaWAN Communication Technology Using the Network Simulator 3Mašek, Petr January 2021 (has links)
The diploma thesis focuses on the description of LPWAN (Low Power Wide Area Network) technologies for use in IoT (Internet of Things) communication scenarios. The theoretical part compares communication technologies operating in the license-exempt frequency band, i.e. Sigfox and LoRaWAN (Long Range Wide Area Network). Furthermore, technologies using the licensed frequency spectrum are discussed, specifically, attention is focused on NB-IoT (Narrow Band IoT). Emphasis is placed on LoRaWAN technology and the properties of the unlicensed frequency band below the 1 GHz, which is utilized by this technology. The practical part of the thesis consists of the evaluation of simulation scenarios using an integrated module in the simulation environment NS-3 (Network Simulator 3). Attention is focused mainly on the analysis of data transmission success using selected communication parameters of LoRaWAN technology. The obtained simulation outputs with a focus on mMTC (massive Machine-Type Communication) communication scenarios confirm the relationship between the number of end devices and gateways, communication distance and transmission reliability, or the limit value for the duty cycle.
|
Page generated in 0.1147 seconds