• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 738
  • 148
  • 140
  • 54
  • 49
  • 27
  • 23
  • 22
  • 13
  • 10
  • 9
  • 7
  • 6
  • 5
  • 5
  • Tagged with
  • 1382
  • 1189
  • 368
  • 288
  • 278
  • 259
  • 239
  • 212
  • 209
  • 165
  • 159
  • 141
  • 141
  • 131
  • 125
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks

KALYONCU, Samet January 2013 (has links)
Internet of Things, is a new expression described as the future of the internet, promises a new world surrounded by tiny smart objects interacting with the environment, communicating with each other, and controlled over internet. Investigating which low power wireless solution and authentication mechanism fits best for IoT networks, and applying these technologies on simulator and real hardware is the main task of this project. Bluetooth Low Energy, ANT, 6LoWPAN and ZigBee are investigated low power wireless technologies which might be used to create an IoT network. Yet, BLTE and ANT have narrower application areas compared to the others, therefore ZigBee and 6LoWPAN technologies are investigated in depth and compared as the 2 promising solutions for implementation and integration of Internet of things concept. SPINS, TinySec, TinyECC, SenSec, MiniSec, ContikiSec and AES CCM are the main security frameworks especially designed for wireless sensor networks providing confidentiality, authentication and integrity. These frameworks were described and compared to find out most suitable authentication mechanism for IoT networks. Contiki OS is used as the operating system of nodes during the implementation of network both on simulator Cooja and real hardware. ZigBee and 6LoWPAN were compared considering interoperability, packet overhead, security and availability. As a result 6LoWPAN came forward due to providing high interoperability and slightly less packet overhead features. ZigBee devices require extra hardware to operate with different technologies. Among the discussed security frameworks, ContikiSec and AES CCM were highlighted because of flexibility, providing different levels of security. Resource limited characteristic and diversity of IoT applications make flexibility a very useful feature while implementing a security framework. Experiments committed to implement a working IoT network were not hundred percent successful. 6LoWPAN was successfully implemented but implementation of the security framework was failed due to compatibility issues between the sensor and the router node. Firmware of the sensor node is not designed to provide any kind of security, therefore security features of the router node is also disabled.
2

Die teilbaren u. unteilbaren Sachen und die rechtliche Bedeutung des Gegensatzes nach dem Bürgerlichen Gesetzbuch /

Jacobsohn, Alfred. January 1915 (has links)
Thesis (doctoral)--Universität Erlangen.
3

Der Bestandteilsbegriff und seine Rechtsprechung /

Damm, Richard. January 1933 (has links)
Thesis (doctoral)--Philipp-Univerisität zu Marburg.
4

Embedded Sensor System mit EtherCAT für Messungen des Raumklimas

Püschel, M., Crämer, P., Kipfelsberger, S., Versen, M. 13 February 2024 (has links)
No description available.
5

The things I left behind

Keyes, Laura 08 1900 (has links)
This thesis consists of a preface and twenty-one original short stories. The preface examines the differences between creative nonfiction, autobiography, and memoir. The twenty-one interrelated stories included are autobiographical in nature, in some ways memoirs and in some ways creative nonfiction. The over-all theme of the collection explores one character's journey of self-discovery and transformation.
6

AI Planning-Based Service Modeling for the Internet of Things

Bahers, Quentin January 2015 (has links)
It is estimated that by 2020, more than 50 billion devices will be interconnected, to form what is called the Internet of Things. Those devices range from consumer electronics to utility meters, including vehicles. Provided with sensory capabilities, those objects will be able to transmit valuable information about their environment, not only to humans, but even more importantly to other machines, which should ultimately be able to interpret and take decisions based on the information received. This “smartness” implies gifting those devices with a certain degree of automation. This Master’s Thesis investigates how recent advances in artificial intelligence planning can be helpful in building such systems. In particular, an artificial intelligence planner able to generate workflows for most of IoT-related use cases has been connected to an IoT platform. A performance study of a state-of-the planner, Fast Downward, on one of the most challenging IoT application, Smart Garbage Collection (which is similar to the Traveling Salesman Problem) has also been carried out. Eventually, different pre-processing and clustering techniques are suggested to tackle the latest AI planners’ inefficiency on quickly finding plans for the most difficult tasks.
7

Irrtumsprobleme bei der Doppel-Individualisierung von Personen und Sachen /

Mohnen, Heinz, January 1938 (has links)
Thesis (doctoral)--Universität Köln, 1939. / Includes bibliographical references (p. 9-11).
8

Eigentumsvorbehalt und Sachbestandteil /

Mangold, Hans Joachim, January 1934 (has links)
Thesis (doctoral)--Universität Marburg a.d. Lahn, 1934. / Includes bibliographical references (p. v-viii).
9

In welchem verhältnisse steht der [paragraph] 119 abs. 2 B.G.B. zu den [paragraphen] 459-464, 538, 539 B.G.B.? ... /

Kügler, Max, January 1908 (has links)
Inaugural dissertation--Heidelberg. / Lebenslauf. "Literatur": p. [3]-5.
10

Accessio en die onderskeid tussen by- en hulpsake

Van Zyl, David 13 August 2015 (has links)
LL.M. / Please refer to full text to view abstract

Page generated in 0.0745 seconds