• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 531
  • 112
  • 107
  • 36
  • 34
  • 23
  • 13
  • 9
  • 9
  • 8
  • 7
  • 5
  • 5
  • 5
  • 2
  • Tagged with
  • 991
  • 991
  • 292
  • 231
  • 222
  • 199
  • 194
  • 185
  • 181
  • 140
  • 131
  • 117
  • 117
  • 114
  • 105
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Compressive spectrum sensing in cognitive IoT

Zhang, Xingjian January 2018 (has links)
With the rising of new paradigms in wireless communications such as Internet of things (IoT), current static frequency allocation policy faces a primary challenge of spectrum scarcity, and thus encourages the IoT devices to have cognitive capabilities to access the underutilised spectrum in the temporal and spatial dimensions. Wideband spectrum sensing is one of the key functions to enable dynamic spectrum access, but entails a major implementation challenge in terms of sampling rate and computation cost since the sampling rate of analog-to-digital converters (ADCs) should be higher than twice of the spectrum bandwidth based on the Nyquist-Shannon sampling theorem. By exploiting the sparse nature of wideband spectrum, sub-Nyquist sampling and sparse signal recovery have shown potential capabilities in handling these problems, which are directly related to compressive sensing (CS) from the viewpoint of its origin. To invoke sub-Nyquist wideband spectrum sensing in IoT, blind signal acquisition with low-complexity sparse recovery is desirable on compact IoT devices. Moreover, with cooperation among distributed IoT devices, the complexity of sampling and reconstruc- tion can be further reduced with performance guarantee. Specifically, an adaptively- regularized iterative reweighted least squares (AR-IRLS) reconstruction algorithm is proposed to speed up the convergence of reconstruction with less number of iterations. Furthermore, a low-complexity compressive spectrum sensing algorithm is proposed to reduce computation complexity in each iteration of IRLS-based reconstruction algorithm, from cubic time to linear time. Besides, to transfer computation burden from the IoT devices to the core network, a joint iterative reweighted sparse recovery scheme with geo-location database is proposed to adopt the occupied channel information from geo- location database to reduce the complexity in the signal reconstruction. Since numerous IoT devices access or release the spectrum randomly, the sparsity levels of wideband spec-trum signals are varying and unknown. A blind CS-based sensing algorithm is proposed to enable the local secondary users (SUs) to adaptively adjust the sensing time or sam- pling rate without knowledge of spectral sparsity. Apart from the signal reconstruction at the back-end, a distributed sub-Nyquist sensing scheme is proposed by utilizing the surrounding IoT devices to jointly sample the spectrum based on the multi-coset sam- pling theory, in which only the minimum number of low-rate ADCs on the IoT devices are required to form coset samplers without the prior knowledge of the number of occu- pied channels and signal-to-noise ratios. The models of the proposed algorithms are derived and verified by numerical analyses and tested on both real-world and simulated TV white space signals.
52

Strategy Development of SMEs in the Internet of Things era : Case Study on Chinese Enterprises

Yunli, Lu, Xiuting, Li January 2010 (has links)
<p>Internet of Things (IOT) has become the key theme of the world since 2009 and been considered as the third wave in the information industry after the waves of Computer, Internet and Mobile Radio Communication. It is expected to have a strong influence on small and medium companies (SMEs). However, little research on what and how the influence of IOT on the SME’s development can be found in the literature. The purpose of the thesis is to examine how IOT influences the organizational changes in SMEs. Finally, suggestions for strategy developments will be proposed to assist the SMEs in making their organization changes successfully. Two main models are applied for this part: change model (OD model) and business model. Moreover, the SWOT theory is adopted to identify the SMEs position in IOT era. We collect the primary data through launching the survey on internet. After data documentation, we apply “Approximation of the Probability Hypothesis Testing” Method to conduct data analysis. After researching, we found out the IOT brings “revolution” change to the Logistics of SMEs while only “adapting” change for Manufactures’ business development. Compare to logistic industry, the manufacturing SMEs seldom adopts IT technologies for their selling channel because they are lacking of resources and knowledge for the new technologies. We suggest the logistic SMEs should establish logistic network between the logistic companies to enhance information and resource integration. For the manufacturing SMEs should apply knowledge management and change the companies into learning organizations. In future, IOT will bring radical changes for manufacturers, which are the biggest area with application of IOT technology. Nevertheless, the logistics industry might go out of fashion. In other words, logistics industry may die out or change to other functions.</p>
53

Strategy Development of SMEs in the Internet of Things era : Case Study on Chinese Enterprises

Yunli, Lu, Xiuting, Li January 2010 (has links)
Internet of Things (IOT) has become the key theme of the world since 2009 and been considered as the third wave in the information industry after the waves of Computer, Internet and Mobile Radio Communication. It is expected to have a strong influence on small and medium companies (SMEs). However, little research on what and how the influence of IOT on the SME’s development can be found in the literature. The purpose of the thesis is to examine how IOT influences the organizational changes in SMEs. Finally, suggestions for strategy developments will be proposed to assist the SMEs in making their organization changes successfully. Two main models are applied for this part: change model (OD model) and business model. Moreover, the SWOT theory is adopted to identify the SMEs position in IOT era. We collect the primary data through launching the survey on internet. After data documentation, we apply “Approximation of the Probability Hypothesis Testing” Method to conduct data analysis. After researching, we found out the IOT brings “revolution” change to the Logistics of SMEs while only “adapting” change for Manufactures’ business development. Compare to logistic industry, the manufacturing SMEs seldom adopts IT technologies for their selling channel because they are lacking of resources and knowledge for the new technologies. We suggest the logistic SMEs should establish logistic network between the logistic companies to enhance information and resource integration. For the manufacturing SMEs should apply knowledge management and change the companies into learning organizations. In future, IOT will bring radical changes for manufacturers, which are the biggest area with application of IOT technology. Nevertheless, the logistics industry might go out of fashion. In other words, logistics industry may die out or change to other functions.
54

M2M Protocols, Solutions and Platforms for Smart Home Environments : Integrating C.STATUSTM and the MediaSense

Lodamo, Addisu January 2012 (has links)
Digital technological breakthroughs have brought about a huge change in the way the society interacts, responds to the immediate environment and the way that people live. Furthermore, Ubiquitous Computing and dirt cheap sensors have created a new paradigm in digital technology where human beings could control their environment in a different approach. In a number of paradigms of digital technology, multiple proprietary solutions in industry results in a huge cost for the end users to use the technology and thus a very sluggish penetration of the technology into the society. Moreover, such unorganized and vendor oriented standards create additional burdens on a person concerned in design and implementation.  This thesis presents existing and emerging technologies in relation to smart home environment having an aim to manifest available open standards and platforms. Smart Home Environment Infrastructures have been presented and discussed. Evaluation and integration of a proprietary elderly care sensor system dubbed   C.STATUSTM and the MediaSense overlay network has also been presented. Performance measurement and comparison has been conducted in relation to the proprietary sensor system running on the top of the peer-to-peer MediaSense Platform with the existing C.STATUSTM centralized sensor system. C.STATUSTM User Interface has been designed and implemented for an Android mobile platform. / smart home environment, Internet of things
55

Anonymous Location Based Messaging: The Yakkit Approach

Lach, Przemyslaw 13 April 2015 (has links)
The proliferation of mobile devices has resulted in the creation of an unprecedented amount of context about their users. Furthermore, the era of the Internet of Things (IoT) has begun and it will bring with it even more context and the ability for users to effect their environment through digital means. Applications that exist in the IoT ecosystem must treat context as a first class citizen and use it to simplify what would otherwise be an unmanageable amount of information. This thesis proposes the use of context to build a new class of applications that are focused on enhancing normal human behaviour and moving complexity away from the user. We present Yakkit—a location based messaging application that allows users to communicate with others nearby. The use of context allows Yakkit to be used without the creation of a login or a profile and enhances the normal way one would interact in public. To make Yakkit work we explore different ways of modelling location context and application deployment through experimentation. We model location in an attempt to predict a user’s final destination based on their current position and the trajectories of past users. Finally, we experiment deploying the Yakkit service on different servers to observe the effect of distance on the message transit time of Yakkit messages. / Graduate / przemek@uvic.ca
56

Creating a NoSQL database for the Internet of Things : Creating a key-value store on the SensibleThings platform

Zhu, Sainan January 2015 (has links)
Due to the requirements of the Web 2.0 applications and the relational databaseshave a limitation in horizontal scalability. NoSQL databases have become moreand more popular in recent years. However, it is not easy to select a databasethat is suitable for a specific use. This thesis describes the detailed design, im plementation and final performance evaluation of a key-value NoSQL databasefor the SensibleThings platform, which is an Internet of Things platform. Thethesis starts by comparing the different types of NoSQL databases to select themost appropriate one. During the implementation of the database, the algorithms for data partition, data access, replication, addition and removal ofnodes, failure detection and handling are dealt with. The final results for theload distribution and the performance evaluation are also presented in this pa per. At the end of the thesis, some problems and improvements that need betaken into consideration in the futures.
57

A Peer to Peer Security Protocol for the Internet of Things : Secure Communication for the SensibleThings Platform

Zhang, Hao January 2014 (has links)
With the rapid development of the Internet connected technologies and applications, people are keen on embracing the convenience and practi-­‐‑ calities they brings. As all kinds of technologies improve, the Internet of Things matures and is able to provide more advanced services to people, which connects a variety of devices, systems and applications beyond traditional machine-­‐‑to-­‐‑machine. However, it covers a variety of devices, protocols and applications, which makes it much more complex than a normal network. Nevertheless, equipped with appropriate security solutions, the Internet of Things is promising to bring us more conven-­‐‑ iences and be widely applied in our daily life. And like the main appli-­‐‑ cation areas, wireless sensor networks with a frequent but short com-­‐‑ munication character, it requires an efficient and flexible protocol to protect the information. To protect the traffic of the Internet of Things is the focal point of this research work. Although many protocols for the Internet have been put forward, it is still not enough to meet the increas-­‐‑ ingly complex requirements from applications. Many of them are not efficient enough to adapt the device diversity and timely communica-­‐‑ tion environment. This research work is trying to address this problem, by proposing a peer-­‐‑to-­‐‑peer security protocol to satisfy this varied environment. Secure communication is implemented on an open sourced platform for the Internet of Things. The philosophy of the platform it implemented on is also inherited to this protocol and the implementation. It avoids unnecessary handshakes between entities, which makes it more efficient in a wireless sensor network. Modulariza-­‐‑ tion and unit test are adapted in implementation to enhance the robust of the system. Its dynamic security level adjustment feature satisfies the realistic demand on one platform this protocol is implemented on. Finally, with a comparison test and an analysis using the BAN logic, the result shows that the proposed protocol is efficient to meet the specific goals and applicable for the platform. / SensibleThings Platform
58

Multi-hop Localization in Large Scale Deployments

Ibrahim, Walid 01 May 2014 (has links)
The development of Wireless Sensor Networks (WSNs) is enabled by the recent advances in wireless communication and sensing technologies. WSN have a wide range of scientific and commercial applications. In many applications the sensed data is useless if the location of the event is not associated with the data. Thus localization plays a substantial role in WSNs. Increased dependence on devices and sensed data presses for more efficient and accurate localization schemes. In many Internet of Things (IoT) deployments the area covered is large making it impossible to localize all devices and Sensor Networks (SNs) using single-hop localization techniques. A solution to this problem is to use a multi-hop localization technique to estimate devices' positions. In small areas SNs require at least three anchor nodes within their transmission range to estimate their location. Despite numerous existing localization techniques, the fundamental behavior of multi-hop localization is, as yet, not fully examined. Thus, we study the main characteristics of multi-hop localization and propose new solutions to enhance the performance of multi-hop localization techniques. We examine the assumptions in existing simulation models to build a more realistic simulation model, while studying and investigating the behavior of multi-hop localization techniques in large scale deployments before the actual deployment. We find that the introduced error follows the Gaussian distribution, but the estimated distance follows the Rayleigh distribution. We use the new simulation model to characterize the effect of hops on localization in both dense and sparse multi-hop deployments. We show that, contrary to common beliefs, in sparse deployments it is better to use long hops, while in dense deployments it is better to use short hops. Using short hops in dense deployments generates a large amount of traffic. Thus we propose a new solution which decreases and manages the overhead generated during the localization process. The proposed solution decreased the number of messages exchanged by almost 70% for DV-Distance and 55% for DV-Hop. Finally, we utilize mobile anchors instead of fixed anchors and propose a solution for the collinearity problem associated with the mobile anchor and use Kalman Filter (KF) to enhance the overall localization accuracy. Through simulation studies, we show that the scheme using a Kalman Filter decreases the estimation errors than using single direction by 31% and better than using weighted averages by 16% . As well, our new scheme overcomes the collinearity problem that appears from using mobile anchor nodes. / Thesis (Ph.D, Computing) -- Queen's University, 2014-04-30 01:53:55.817
59

A Security Analysis of Wireless Smart Home Technologies

Hansson, Niclas, Lantz, Alexander, Fischerström, Ludvig January 2015 (has links)
The use of electronics connected to local networks and the Internet is growingall the time. Nowadays you can control your electronics in your house even when away from home, which opens up for potential security threats. The purpose of this report is to point out the potential risks with connecting home electronics to the Internet and to shed light on what security mechanisms that are needed in these kinds of systems. This report contains a theoretical part in which relevant material has been summarized. This material includes the smart home solution Tellstick Net and the wireless technologies ZigBee and Z-Wave, which are commonly used in home automation. The Tellstick Net system was mapped out and a risk analysis with attack trees was performed. After the analysis of the system, the implementation of two potential security threats were attempted. The two attempted attacks were replay attack and cross-site request forgery. The replay attack was unsuccessful due to the way the system communicates and keeps connections alive. However, the cross-site request forgery was discovered to be successful in some cases. It depended on if the browser of the target supported cross-origin resource sharing, as that property protects against cross-site request forgery. Finally, the report discusses what impact the found security deficiencies have, what they entail and how they reflect on the need for security in smart technologies for the home.
60

Persondetektering i inomhusmiljö med enkla sensorer

Hjelmberg, Eric, Rowell, Henrik January 2015 (has links)
Denna rapport syftar till att beskriva arbetet kring att kunna detektera närvaro i ett rum medhjälp av så enkla sensorer som möjligt, kopplade till en Arduino. Samtidigt som detta skerså används också systemet till att med samma sensorer visa klimatet i rummet. Läsaren fåren inblick i problematiken med att detektera människor samt inom funktionen av de valdasensorerna. Utöver detta studeras energiförbrukningen i systemet. Rapportenmynnar ut i enslutsats där en procentuell chans för närvaro presenteras via en internetuppkoppling medhjälp av en omfattande testning av sensorernas beteende.

Page generated in 0.1599 seconds