Spelling suggestions: "subject:"then internet off things"" "subject:"then internet oof things""
461 |
Low Energy GPS Positioning : A device-server approach / Lågenergipositionering med GPSSzilassy, Martin, Örn, Daniel January 2015 (has links)
GPS is widely used for localization and tracking, however traditional GPS receivers consume too much energy for many applications. This thesis implements and evaluates the performance of a low energy GPS solution, including a working hardware prototype, that reduces energy consumption significantly. The prototype operates for 2 years on a coin cell battery, sampling every minute. The corresponding time for a traditional receiver is 2 days. The main difference is that a traditional receiver requires 30 seconds of data to estimate a position; this solution only requires 2 milliseconds of data, a reduction of a factor 15 000. The solution consists of a portable device, sampling the GPS signal, and server software that utilizes Doppler navigation and Coarse Time Navigation to estimate positions. The median positioning error is at most 38 meters in our tests. We expect that this solution will enable positioning for billions of devices in the near future.
|
462 |
Modèles partagés et infrastructures ouverte pour l'internet des objets de la ville Intelligente / Shared self-configuring models and software infrastructures for Smart City monitoring and control.Lemke, Laurent 06 June 2017 (has links)
Les villes contemporaines font face à de nombreux enjeux : énergétiques,écologiques, démographiques ou encore économiques. Pour y répondre, des moyens technologiques sont mis en place dans les villes via l’utilisation de capteurs et d’actionneurs. Ces villes sont dites intelligentes.Actuellement, les villes intelligentes sont opérés des acteurs qui ne partagent ni leurs données de capteurs ni l’accès à leurs actionneurs.Cette situation est dite verticale : chaque opérateur déploie ses propres capteurs et actionneurs et possède sa propre infrastructure informatique hébergeant ses applications. Cela conduit à une redondance de l’infrastructure et à des applications ad-hoc pour superviser et contrôler un domaine de la ville.Une tendance est d’aller vers une situation dite horizontale via l’utilisation d’une plateforme de médiation ouverte et partagée. Les données de capteurs et les accès aux actionneurs sont mutualisés au sein de ce type de plateforme, permettant leur partage entre les différents acteurs. Les coûts d’infrastructure et de développement s’en trouvent alors réduits.Cette thèse s’inscrit dans ce contexte d’horizontalisation, au sein d’une plate- forme ouverte et partagée, dans laquelle nous proposons :1) une couche d’abstraction pour le contrôle et la supervision de la ville, 2) un mécanisme de contrôle de concurrence gérant les cas de conflits, 3) un mécanisme de coordination favorisant la réutilisation des actionneurs, 4) une implémentation de notre travail par une preuve de concept.L’abstraction que nous proposons se base sur des modèles issus des systèmes réactifs. Ils ont pour objectif d’être générique et représente l’invariant de la ville intelligente : les éléments physiques. Ils permettent aux applications de contrôler et superviser la ville.Pour faciliter le développement d’applications nous uniformisons l’interface de nos modèles. Ces applications pouvant avoir des contraintes temps réel, particulièrement celles qui ont des objectifs de contrôle, nous proposons de tirer parti de l’architecture distribuée de ce type de plateforme.Compte-tenu du partage des actionneurs, nous avons identifié que des conflits peuvent survenir entre les applications. Nous proposons un mécanisme de contrôle de concurrence pour traiter ces cas de conflits.Nous avons également identifié qu’un mécanisme de coordination doit être offert aux applications souhaitant effectuer atomiquement des opérations de contrôle. Un tel mécanisme favorise la réutilisation des actionneurs présents dans la ville.Enfin, nous avons implémenté nos propositions autour d’une preuve de concept, comprenant plusieurs cas d’usages, permettant de démontrer notre travail. / Nowadays cities face several challenges and are concerned by ecological, energetic, economical, and demographical aspects. Smart cities, equipped with sensors, actuators, and digital infrastructures, are meant to tackle these issues.Current smart cities are operated by several actors without sharing sensor data or accesses to the actuators. This is a vertical organization, in which each actor deploys its own sensors and actuators, and manages its own digital infrastructure. Each actor may be interested in a different aspect of city management, for instance traffic management, air control, etc. The current trend is a transition towards a more horizontal organization, based on an open and shared mediation platform. In such a platform, sensor data and accesses to actuators can be shared among several actors. The costs related to nfrastructure deployment and management are therefore reduced for each individual actor. This PhD is a contribution to this volution towards horizontal organizations, with open and shared platforms. We propose: (1) an abstraction layer for the ontrol and supervision of the city; (2) a concurrency management mechanism; (3) a coordination mechanism that helps haring actuators; (4) a proof-of-concept implementation of these contributions. The abstraction layer we propose helps users control and supervise a city. It is based upon formal models inspired by the ones used in the programming of reactive systems. They represent the physical elements present in each smart city, with genericity principles. In order to ease application development, the interface of those models is made uniform. Since applications, especially control ones, may ave real-time constraints, we also list the constraints this poses on distributed infrastructures. As soon as actuators are shared, conflicts may occur between users. Our proposals include a concurrency management mechanism, based on eservation principles. We also provide a coordination mechanism for the users to be able to perform several actions in an tomic way.All these principles have been implemented as a proof of concept. We review several use cases, to demonstrate he potential benefits of our proposals.
|
463 |
Étude de modulation et codage conjoint avec récepteur itératif pour la couche physique des réseaux longue portée bas débit / The physical layer for low power wide area networks : a study of combined modulation and coding associated with an iterative receiverRoth, Yoann 10 July 2017 (has links)
Dans le contexte de l'Internet des Objets (IoT), on estime à plus de 10% la proportion de connections réalisées via les réseaux longue portée bas débit, représentant ainsi plusieurs milliards d’objet connectés. Afin de satisfaire les exigences en termes de sensibilité et de réduction du débit, deux approches sont généralement envisagées : l’approche bande étroite, et l’approche faible efficacité spectrale. En comparant les performances des systèmes existants à la limite théorique issue de la théorie de l'information et démontrée par Shannon, on constate qu’un gain en performance est atteignable, tout en travaillant toujours à de faibles niveaux de sensibilité. La théorie de l'information permet d'affirmer qu'un compromis entre l'efficacité spectrale et l'efficacité énergétique doit toujours être fait. Ainsi, une haute efficacité énergétique s'obtiendra au détriment d'une efficacité spectrale faible. A l'inverse, un système fonctionnant à une haute efficacité spectrale devra utiliser plus d'énergie pour transmettre le même nombre de bits et atteindre le même taux d'erreur.Ce travail s’intéresse à l’approche faible efficacité spectrale. En partant des modulations orthogonales, qui permettent d’atteindre la limite théorique de Shannon à des efficacités spectrales très faibles, et des processus turbo, qui atteignent d’excellentes performances à des efficacités spectrales élevées, l’utilisation conjointe d’une modulation orthogonale et d'un code correcteur associés à un récepteur itératif dans une technique dénommée Turbo-FSK est étudiée. Les différents paramètres de la technique sont optimisés en utilisant un outil classique des processus itératifs, l’Extrinsic Information Transfer (EXIT) chart. Les performances mesurées démontrent que la technique permet bien d’atteindre de très faibles niveaux de sensibilité et répond aux critères des réseaux longue portée bas débit. Cependant, la technique ne dispose de point de fonctionnement qu’à de très faibles valeurs d’efficacité spectrale : pour certaines applications ou si la portée nécessaire est réduite, il peut être bénéfique pour le système d’augmenter son efficacité spectrale. Ceci est rendu possible grâce à l’introduction d’une composante linéaire dans l’alphabet de modulation et d’un mécanisme de poinçonnage spécifique à la technique dans une version flexible appelée Coplanar Turbo-FSK. L’étude de l’influence des paramètres et des performances sur un canal à bruit blanc additif gaussien permet en effet de conclure sur la flexibilité de l’efficacité spectrale du système, tout en fonctionnant proche de la limite théorique. Finalement, l’étude jusqu’ici théorique est étendue à un contexte plus pratique, où des canaux sélectifs en fréquences sont considérés. Une encapsulation du système utilisant une architecture OFDM est considérée, et différentes mesures caractéristiques des systèmes de télécommunication sont évaluées. Les résultats sont confrontés à la solution Narrow-Band IoT proposée par l’organisme 3GPP et démontrent ici encore le potentiel de la solution Turbo-FSK pour les réseaux longue portée bas débit. / More than 10% of the Internet-of-Things (IoT) connections are expected to be realized through Low Power Wide Area (LPWA) networks, representing several billions of connected devices. Several industrial solutions have been developed and a standardization process is ongoing. The low levels of sensitivity and low data rate required for the long range communication are achieved by the means of two strategies: a narrow-band strategy and a low spectral efficiency strategy. Considering the limits of the information theory, additional gains in the communication's energy efficiency can be achieved. Nonetheless, a trade-off between spectral efficiency and energy efficiency should always be made. Reliable transmission with high energy efficiency will necessarily result in poor spectral efficiency, and in comparison, a system with a higher spectral efficiency has to consume more energy to transmit the same amount of bits with the same arbitrary level of error.This work considers the low spectral efficiency strategy. The combination of orthogonal modulations and a powerful channel code is studied. The scheme, so-called Turbo-FSK, associates the low spectral efficiency of Frequency Shift Keying (FSK) with the energy efficiency gain of a turbo receiver. Low levels of spectral efficiency can be achieved while optimizing the use of the available resource. The parameters of the scheme are optimized using a classic tool for iterative receivers, the Extrinsic Information Transfer (EXIT) chart. Performance of Turbo-FSK compared to existing LPWA solutions demonstrates the potential of the proposed solution to achieve low levels of sensitivity and to outperform existing schemes. However, the restrictions on low levels of spectral efficiency reduces the number of possible applications for the scheme. By introducing a linear component in the alphabet and a puncturing procedure, flexibility in spectral efficiency is achieved. A large range of spectral efficiencies can be obtained while maintaining performance close to the channel capacity theoretical limit. Eventually, more practical scenarios are considered for evaluating the performance of the scheme. Frequency selective channels are considered and an encapsulation in a Fast Fourier Transform (FFT) based system is implemented. Various indicators are studied and the Turbo-FSK scheme is compared to well-known technologies, such as schemes using Orthogonal Frequency Division Multiplexing (OFDM) associated with a powerful Forward Error Correction (FEC) scheme, namely Turbo Code (TC).
|
464 |
Integrating wireless technologies into intra-vehicular communicationSi, Wei 17 February 2016 (has links)
With the emergence of connected and autonomous vehicles, sensors are increasingly deployed within car. Traffic generated by these sensors congest traditional intra-vehicular networks, such as CAN buses. Furthermore, the large amount of wires needed to connect sensors makes it hard to design cars in a modular way. These limitations have created impetus to use wireless technologies to support intra-vehicular communication. In this dissertation, we tackle the challenge of designing and evaluating data collection protocols for intra-car networks that can operate reliably and efficiently under dynamic channel conditions.
First, we evaluate the feasibility of deploying an intra-car wireless network based on the Backpressure Collection Protocol (BCP), which is theoretically proven to be throughput-optimal.
We uncover a surprising behavior in which, under certain dynamic channel conditions, the average packet delay of BCP decreases with the traffic load. We propose and analyze a queueing-theoretic model to shed light into the observed phenomenon. As a solution, we propose a new protocol, called replication-based LIFO-backpressure (RBL). Analytical and simulation results indicate that RBL dramatically reduces the delay of BCP at low load, while maintaining its high throughput performance.
Next, we propose and implement a hybrid wired/wireless architecture, in which each node is connected to either a wired interface or a wireless interface or both. We propose a new protocol, called Hybrid-Backpressure Collection Protocol (Hybrid-BCP), for the intra-car hybrid networks. Our testbed implementation, based on CAN and ZigBee transceivers, demonstrates the load balancing and routing functionalities of Hybrid-BCP and its resilience to DoS attacks. We further provide simulation results, obtained based on real intra-car RSSI traces, showing that Hybrid-BCP can achieve the same performance as a tree-based protocol while reducing the radio transmission power by a factor of 10.
Finally, we present TeaCP, a prototype Toolkit for the evaluation and analysis of Collection Protocols in both simulation and experimental environments. TeaCP evaluates a wide range of standard performance metrics, such as reliability, throughput, and latency. TeaCP further allows visualization of routes and network topology evolution. Through simulation of an intra-car WSN and real lab experiments, we demonstrate the functionality of TeaCP for comparing different collection protocols.
|
465 |
Integration of OPC Unified Architecture with IIoT Communication Protocols in an Arrowhead TranslatorRönnholm, Jesper January 2018 (has links)
This thesis details the design of a protocol translator between the industrial-automation protocol OPC UA, and HTTP. The design is based on the architecture of the protocol translator of the Arrowhead framework, and is interoperable with all of its associated protocols. The design requirements are defined to comply with a service-oriented architecture (SOA) and RESTful interaction through HTTP, with minimal requirement of the consuming client to be familiar with OPC UA semantics. Effort is put into making translation as transparent as possible, but limits the scope of this work to exclude a complete semantic translation. The solution presented in this thesis satisfies structural- and foundational interoperability, and bridges interaction to be independent of OPC UA services. The resulting translator is capable of accessing the content of any OPC UA server with simple HTTP-requests, where addressing is oriented around OPC UA nodes.
|
466 |
Distributed trust management mechanism for the internet of things using a multi-service approachMendoza, Carolina Veronica Lezama January 2014 (has links)
Orientador: Prof. Dr. João Henrique Kleinschmidt / Dissertação (mestrado) - Universidade Federal do ABC, Programa de Pós-Graduação em Engenharia da Informação, 2015. / Na Internet das Coisas os objetos físicos têm um componente virtual capaz de prover ou requisitar determinados serviços. É uma tendência que trará vantagens sem precedentes para a automação de processos e diversas aplicações. A análise de modelos de gerenciamento de confiança para IoT para detectar comportamentos maliciosos tem recebido poucas contribuições da comunidade científica. Alguns pesquisadores trataram desta questão, mas poucos trabalhos analisam os requisitos para a correta implementação da IoT. O objetivo desta dissertação é identificar o comportamento malicioso de nós e prevenir possíveis ataques que interrompam os serviços da rede. Neste trabalho são feitas diferentes abordagens para pesquisar um modelo de gerenciamento de confiança capaz de caracterizar o comportamento dos nós. O modelo proposto usa informações diretas geradas pelas comunicações entre os nós e recomendações de outros nós para calcular a confiança. Usa uma abordagem multi-serviço em que cada nó provê diversos serviços para os outros nós da rede. A habilidade de um nó em prover um serviço é recompensada, enquanto que um nó que não forneça um serviço corretamente é punido. Cada nó tem uma tabela de confiança dos seus vizinhos, que pode ser compartilhada com os outros nós como recomendações. A abordagem distribuída permite que os nós sejam completamente autônomos em tomar decisões sobre o comportamento dos nós. A avaliação de confiança dos nós é um meio efetivo de encorajar a colaboração na rede e ao mesmo tempo melhorar a segurança em redes distribuídas. Três ataques são testados para verificar a validade do modelo de confiança: ataque On-Off, ataque Seletivo e Bad mouthing. O modelo de gerenciamento de confiança foi implementado no Contiki, um sistema operacional desenvolvido para IoT e redes de sensores. Extensivas simulações foram feitas no simulador Cooja-Contiki para ilustrar os ataques e avaliar o desempenho do modelo proposto. Os resultados de simulação mostram que o modelo tem um bom desempenho em detectar os nós maliciosos. / In Internet of Things (IoT), the physical objects have a virtual component able to provide or require determined services. It is a trend that will bring unprecedented advantages to the process automation. The analysis of the trust management models for IoT to detect the malicious behavior on the network, has been undervalued and with little scientific contribution in the academic field. In spite of researchers has already addressed the issue, only few give a theoretic analysis on the requirements for the proper implementation of IoT. The purpose of this thesis work is to identify the malicious behavior of the nodes and prevent possible attacks that disrupt entire network to IoT context. In this thesis different approaches are followed to investigate a lightweight model of trust management able to characterize the behavior of the nodes with little effort. Our model use direct information generated from direct communication of nodes and recommendations of the others nodes to evaluate the trust. We use a multi-service approach where each node provides several services to others node. The ability to provide a service is rewarded and, punished when it is not provided. In our trust model each node has a trust table of their neighbors in the same radio coverage, which will be shared to others nodes as recommendations. This distributed approach allows nodes to be completely autonomous in making decisions about the behavior of other nodes. The trust evaluation of nodes is an effective method to encourage the collaboration on the network and at the same time to improve network security in distributed networks. In this thesis work, we present three attacks that can undermine the accuracy of trust evaluation. Based on our investigation on attacks and defense, we designed and implemented a trust management model based on the construction of Contiki, an operating system developed for IoT and sensor networks. Extensive simulations were performed using COOJA-Contiki to illustrate On-OFF attack, Selective attack and Bad mouthing attack, the effectiveness of the techniques used, and the overall performance of the proposed trust model. Simulation results shows effectiveness against these attacks and also a good performance to recognize the malicious nodes especially to the Bad mouthing attack when are used direct information and recommendations wherein is obtained a reduction time compared when is used only the direct information.
|
467 |
Policy-driven Security Management for Gateway-Oriented Reconfigurable EcosystemsJanuary 2015 (has links)
abstract: With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands. However, with the introduction and rising use of wear- able technology and evolving uses of smart-phones, the concept of Internet of Things (IoT) has become a prevailing notion in the currently growing technology industry. Cisco Inc. has projected a data creation of approximately 403 Zetabytes (ZB) by 2018. The combination of bringing benign devices and connecting them to the web has resulted in exploding service and data aggregation requirements, thus requiring a new and innovative computing platform. This platform should have the capability to provide robust real-time data analytics and resource provisioning to clients, such as IoT users, on-demand. Such a computation model would need to function at the edge-of-the-network, forming a bridge between the large cloud data centers and the distributed connected devices.
This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications. / Dissertation/Thesis / Masters Thesis Computer Science 2015
|
468 |
A soberania dos dados versus a autonomia do usuário: Big Data, Internet das Coisas e as estratégias afirmativas do anonimatoAbreu, Giovanna Oliveira Lima de 29 May 2015 (has links)
Submitted by Clebson Anjos (clebson.leandro54@gmail.com) on 2016-02-18T18:09:26Z
No. of bitstreams: 1
arquivototal.pdf: 1029536 bytes, checksum: c6402b495142035de9a42bf1bf610cc9 (MD5) / Made available in DSpace on 2016-02-18T18:09:26Z (GMT). No. of bitstreams: 1
arquivototal.pdf: 1029536 bytes, checksum: c6402b495142035de9a42bf1bf610cc9 (MD5)
Previous issue date: 2015-05-29 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / The interaction between society and technology in the context of mediated ambience, enhanced by processes and tools such as Big Data and Internet of Things are the basis of scientific advances that are gradually transforming our daily lives. With the Big Data phenomenon we are able to capture a massive quantity of data, creating endless possibilities of connections and control. The Internet of Things, in turn, is related to embedded devices networks that communicate with each other in an automated way to help make our lives more efficient and more vulnerable too. In the era of pervasive computing and datafication, any attempt to safeguard our data seems insufficient. So, this study presents a reflection on the existing oppositeness between the ideas of freedom as an essential attribute for online information sharing and the sovereignty imposed by the data control, besides we also examine the implications of this surveillance on the user autonomy. To understand the links between the mediations, the network and the members of this interconnected system, we adopted the Actor-Network Theory (LATOUR, 2012). This theory of social also inserts itself as the methodology, laying the foundations for guiding this study. Another important point is to understand the conceptual differences between surveillance, control and monitoring (LEMOS, 2009). The work, divided into two parts and their respective chapters, also includes the analysis of some attempts of resistance to this control imposed on members of the interconnected public sphere, and it points out the paradoxes concerning, particularly, to anonymity, one of the main forms of opposition to the monitoring state established in the net. Since we are in the middle of a still in progress process, accurate and airtight conclusions are not possible. However, if we are not able to set limits to the new digital society, then we run a risk of seeing vital rights, essential to the proper functioning of society, wrecked in the name of innovation and convenience. / A interação entre sociedade e tecnologia presente no contexto da midiatização, potencializada por processos e ferramentas como o Big Data e a Internet das Coisas são a base de avanços científicos que vêm, paulatinamente, transformando o nosso cotidiano. Com o fenômeno do Big Data capta-se uma torrente de dados, gerando infinitas possibilidades de conexões e controle. A Internet das Coisas, por sua vez, está relacionada às redes de dispositivos embarcados que se comunicam uns com os outros de forma automatizada para ajudar a tornar nossas vidas mais eficientes, porém mais vulneráveis. Na era da computação pervasiva e da dataficação, qualquer tentativa de salvaguardar nossos dados parece insuficiente. Assim, este estudo traz uma reflexão sobre o oposicionismo entre as ideias de liberdade como atributo essencial para o compartilhamento de informações online e a soberania conquistada através do controle dos dados, além de examinar as implicações da vigilância sobre a autonomia do usuário. Para compreender os vínculos entre as mediações, a rede e os integrantes desse sistema interconectado, adotamos a Teoria Ator-Rede (LATOUR, 2012). Essa teoria do social insere-se também como metodologia, lançando os princípios norteadores para elaboração da pesquisa. Outro ponto relevante é a compreensão das diferenças conceituais entre as ações de vigilância, controle e monitoramento (LEMOS, 2009). O trabalho, dividido em duas partes e seus respectivos capítulos, conta ainda com a análise de algumas tentativas de resistência ao controle imposto aos integrantes da esfera pública interconectada, e com apontamentos às antinomias referentes, em específico, ao anonimato, uma das principais formas de oposição ao monitoramento instaurado na rede. Por estarmos diante de um processo em franco desenvolvimento, conclusões exatas e certeiras não são possíveis. Todavia, se não formos, desde já, capazes de estabelecer limites para essa nova sociedade digital, então correremos o risco de vermos naufragar direitos vitais para o bom funcionamento da sociedade em prol da inovação e da conveniência.
|
469 |
O uso de mídias locativas no universo da internet das coisas: construindo uma prova de conceito / The use of local media in the universe of the internet of things: constructing a proof of conceptFerrasi, Faberson Augusto [UNESP] 17 April 2017 (has links)
Submitted by FABERSON AUGUSTO FERRASI null (faberson.ferrasi@gmail.com) on 2017-05-28T17:26:24Z
No. of bitstreams: 1
dissertassão_mestrado_Faberson Ferrasi_PPGMiT_2017.pdf: 1812047 bytes, checksum: 79b5df7e4bd32070c135e865cd18834d (MD5) / Rejected by Luiz Galeffi (luizgaleffi@gmail.com), reason: Solicitamos que realize uma nova submissão seguindo a orientação abaixo:
O arquivo submetido não contém o certificado de aprovação com as assinaturas dos membros da banca (de acordo com as normas de sua unidade).
Corrija esta informação e realize uma nova submissão com o arquivo correto.
Agradecemos a compreensão.
on 2017-05-31T16:24:51Z (GMT) / Submitted by FABERSON AUGUSTO FERRASI null (faberson.ferrasi@gmail.com) on 2017-05-31T17:36:12Z
No. of bitstreams: 1
ferrasi_fa_me_bauru.pdf: 1814213 bytes, checksum: 548e7d51b663c5c3ae30e2fa3eafec17 (MD5) / Approved for entry into archive by Luiz Galeffi (luizgaleffi@gmail.com) on 2017-05-31T17:43:58Z (GMT) No. of bitstreams: 1
ferrasi_fa_me_bauru.pdf: 1814213 bytes, checksum: 548e7d51b663c5c3ae30e2fa3eafec17 (MD5) / Made available in DSpace on 2017-05-31T17:43:58Z (GMT). No. of bitstreams: 1
ferrasi_fa_me_bauru.pdf: 1814213 bytes, checksum: 548e7d51b663c5c3ae30e2fa3eafec17 (MD5)
Previous issue date: 2017-04-17 / Este trabalho tem por objetivo mostrar os resultados de um estudo exploratório sobre a evolução da Internet e conceituar sua fase atual denomina-se Internet das Coisas (Internet of Things - IoT). Tal conceito se apresenta como uma revolução tecnológica e oferece um grande potencial de inovação para diversas áreas. Nesta ocasião, são abordadas as possíveis inovações no uso dos dispositivos móveis alinhados ao seu potencial de comunicação com a Internet. Para isto, foi desenvolvido um experimento apoiado nas tecnologias, com o uso de dispositivos móveis, como smartphones e sensores de proximidade (beacons). Por meio do desenvolvimento de uma aplicação, são oferecidos recursos para captação autônoma de dados sobre a detecção da presença de pessoas em ambientes físicos. Através disso, oferecer um melhor gerenciamento dos dados obtidos e a possibilidade de outras formas de compartilhamento das informações geradas através da Internet, evidenciando, assim, o potencial de aplicação dos conceitos propostos na Internet das Coisas, foco central do projeto. / This work aims to show the results of an exploratory study on the evolution of the Internet and conceptualize its current phase is called Internet of Things (IoT). This concept presents itself as a technological revolution and offers great potential for innovation in several areas. This occasion, the possible innovations in the use of the mobile devices in line with their potential of communication with the Internet are approached. For this, an experiment was developed based on the technologies, with the use of mobile devices, such as smartphones and proximity sensors (beacons). Through the development of an application, resources are provided for autonomous capture of data on the detection of the presence of people in physical environments. Through this, offer a better management of the data obtained and the possibility of other forms of sharing of the information generated through the Internet, thus evidencing the potential of applying the concepts proposed in the Internet of Things, central focus of the project.
|
470 |
Service Level Modell – Erweiterung der Kundenbasis für das Internet der DingePaul, Erik 28 May 2018 (has links) (PDF)
In der vorliegenden Masterarbeit wird die Thematik eines Service-Level-Modells für das Kunden-Reporting eines hochtechnologisierten Unternehmens analysiert. Die stetig kürzer werdenden Technologiezyklen, der zunehmende Druck von anderen Wettbewerbern sowie die Flut an aufkommenden Kleinkunden, durch Technologien des Internet der Dinge, verlangen nach einer konsequenten Report-Standardisierung. Aufgrund der unterschiedlichen Ansätze im Kunden-Reporting des Unternehmens wurde untersucht, inwiefern die Erfahrungen mit Großkunden auf Kleinkunden nachhaltig und zielgerichtet adaptiert werden können. Die Analyse der theoretischen Grundlagen unterstreicht die Relevanz dieser Thematik und verdeutlicht die Gemeinsamkeiten zwischen dem unternehmensinternen Management-Reporting sowie dem Reporting für B2B-Kunden. Im Anschluss daran erfolgt eine Bestandsaufnahme des Customer-Reportings in Bezug auf das Foundry-Unternehmen. Dabei wurden alle kundenrelevanten Berichte der Fachabteilungen begutachtet. Im Nachgang dazu konnten entsprechende Optimierungsansätze herausgearbeitet sowie ein nachhaltiges Reporting-Konzept für Kleinkunden aufgezeigt werden. Das erarbeitete Konzept soll zukünftig seitens der Foundry als Grundlage für aufkommende Neukunden mit niedrigem Produkt-Volumina dienen. Betrachtet man nun das Resultat dieser Untersuchung bleibt festzuhalten, dass durch dieses Instrument dem Effekt der Informationsüberflutung auf Kundenseite deutlich entgegengewirkt wird. Überdies wird erreicht, dass auf Seiten der Foundry sowie dem B2B-Kunden ein homogenes Verständnis, in Bezug auf die technischen Inhalte, generiert wird.
Insgesamt betrachtet, liefert diese Arbeit einen wertvollen Beitrag zum Thema Customer-Reporting im hochtechnologisierten Umfeld. Man kann daher den Schluss ziehen, dass es gelingen kann, den vielfältigen Anforderungen der aufkommenden Kleinkunden mit einem generellen Reporting-Standard zu begegnen.
|
Page generated in 0.1285 seconds