Tesi sul tema "Internet des objets – Innovation"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Internet des objets – Innovation".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Tran, Thi Thanh Huong. "Be innovative to be green : how consumers respond to eco-innovative product designs". Electronic Thesis or Diss., Université de Lille (2018-2021), 2018. http://www.theses.fr/2018LILUA018.
Testo completoThe introduction of eco-innovation is considered an effective way for companies to strategically align themselves with consumers’ increasing environmental concerns. Drawing on the sustainability and innovation literature, this dissertation proposes that product design factors, individual differences, and situational variables, significantly influence consumer responses to eco-innovation. The findings of five online experiments explore the underlying mechanisms of how consumers respond to eco-innovative product designs across various Internet-of-Things product categories. Specifically, we uncover the effect of trade-offs between innovative features and eco-friendly benefits on consumer responses and shine new light on the moderating role of consumer beliefs about eco-friendly product effectiveness (Study 1). Our results also show that different types of eco-friendly attributes in new product designs trigger different consumer responses (Study 2). Moreover, this dissertation sheds light on the nature of eco-friendly consumer innovativeness and its interaction effects with perceived trade-offs in eco-innovative product designs on consumers’ product evaluation and purchase intentions (Study 3). We also document consumers’ associations between detachability of an eco-friendly attribute on consumer responses (Study 4). Finally, we highlight that consumers’ evaluations of eco-innovation hinge on ecological country of manufacture and its congruence with product eco-friendliness (Study 5). The dissertation concludes with theoretical and managerial implications, such as advice for firms on the best practices for competitive advantage achievement in an eco-innovation context
Frissa, Nassima. "Internet physique : conditions de déploiement et intérêt au regard du développement d'une logistique durable". Thesis, Lille 1, 2019. http://www.theses.fr/2019LIL1A028.
Testo completoThe physical internet is an innovative concept that ultimately allows the reorganization of the supply chain into a single large open network through the interconnection of logistics networks in a standardized way, through collaboration protocols, with modular containers and by communication platforms. The study undertaken by this thesis focuses on the understanding of this new logistics network and the conditions of its deployment on the real plane based on the analysis of a set of logistical innovations that preceded it. The innovations selected all have a similarity to the physical Internet (one of its components). The chosen method was to understand the path of success and deployment of these innovations, for the one to compare with the physical internet. The innovations selected (containerization, pooling and freight exchanges among others) made it possible to conduct this analysis based on certain theories of innovation and the economy of services. The result is that one of the major obstacles to the deployment of the physical internet is its lack of maturity from a service point of view and the incomplete integration of all potential users of the new network (small players in particular) in the design of the service
Madsen, Christine McCarthy. "Communities, innovation, and critical mass : understanding the impact of digitization on scholarship in the humanities through the case of Tibetan and Himalayan studies". Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:928053ea-e8d9-44ff-9c9a-aaae1f6dc695.
Testo completoBru, Laurie. "Les enjeux de la normalisation européenne des objets connectés de santé". Electronic Thesis or Diss., Toulouse 1, 2019. http://www.theses.fr/2019TOU10038.
Testo completoConnected objects in health are emerging technologies. They are subject to many innovations and may incorporate blockchains, High Performance Computing, artificial intelligence and nanotechnologies. These objects are multiplying at a rapid rate within the internal market in the European Union and are creating new challenges, particularly with regard to the protection of personal data, public health considerations, cybersecurity and the competitivity of European companies in a globalized world. These objects need a framework. European standardization is a particularly appropriate regulatory tool to answer all these concerns. It overcomes the drawbacks of hard law, in particular because of its flexibility and ability to adapt to the evolution of the state of the art and the digitization of economy. European standardization organizations will therefore have to develop and update standards for the technologies on which connected objects in health are based. European institutions must support this standardization to ensure it is commensurate with the stakes involved
Moctar, m'baba Leyla. "Combining Blockchain and IoT for business processes deployment and mining". Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS010.
Testo completoBlockchain, first utilized in 2009 for cryptocurrency transactions, quickly evolved beyond financial applications. The BPM community recognized its potential for enhancing business process management (BPM) and fostering inter-organizational collaborations. Despite extensive research on blockchain-based business process execution, process mining from blockchain data has recently begun to be explored. Current studies mainly focus on activity-centric processes, often overlooking artifact-centric processes prevalent in blockchain applications. Traditional logging formats like XES, while commonly used, face challenges like information loss and denormalization when applied to artifact-centric data. The introduction of OCEL partially addressed these issues by enabling the storage of object-centric event data, but it lacks support for object evolution and relations.This thesis addresses these challenges by proposing ACEL, an extension of OCEL that comprehensively supports artifact-centric event data storage. We present an artifact-centric method to gather event data from blockchain applications, converting them into ACEL logs. The approach's viability is assessed using Cryptokitties and Augur Ethereum applications. We initially compare ACEL's process mining capabilities with OCEL, and then introduce a discovery method using hierarchical clustering and information gain analysis to derive GSM models, the standard for artifact-centric processes. Our evaluation on Cryptokitties confirms the feasibility of this approach and highlights the advantages of ACEL in artifact-centric process mining
Abdel-Sattar, Nesrine M. A. K. "Innovation in Arabic online newsrooms : a comparative study of the social shaping of multimedia adoption in Aljazeera Net, Almassae and Almasry Alyoum in the context of the Arab Spring". Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:a442328b-2288-4731-b140-2c3a6d0bd91b.
Testo completoBru, Laurie. "Les enjeux de la normalisation européenne des objets connectés de santé". Thesis, Toulouse 1, 2019. http://www.theses.fr/2019TOU10038.
Testo completoConnected objects in health are emerging technologies. They are subject to many innovations and may incorporate blockchains, High Performance Computing, artificial intelligence and nanotechnologies. These objects are multiplying at a rapid rate within the internal market in the European Union and are creating new challenges, particularly with regard to the protection of personal data, public health considerations, cybersecurity and the competitivity of European companies in a globalized world. These objects need a framework. European standardization is a particularly appropriate regulatory tool to answer all these concerns. It overcomes the drawbacks of hard law, in particular because of its flexibility and ability to adapt to the evolution of the state of the art and the digitization of economy. European standardization organizations will therefore have to develop and update standards for the technologies on which connected objects in health are based. European institutions must support this standardization to ensure it is commensurate with the stakes involved
Tran, Thi Thanh Huong. "Be innovative to be green : how consumers respond to eco-innovative product designs". Thesis, Lille 1, 2018. http://www.theses.fr/2018LIL1A018/document.
Testo completoThe introduction of eco-innovation is considered an effective way for companies to strategically align themselves with consumers’ increasing environmental concerns. Drawing on the sustainability and innovation literature, this dissertation proposes that product design factors, individual differences, and situational variables, significantly influence consumer responses to eco-innovation. The findings of five online experiments explore the underlying mechanisms of how consumers respond to eco-innovative product designs across various Internet-of-Things product categories. Specifically, we uncover the effect of trade-offs between innovative features and eco-friendly benefits on consumer responses and shine new light on the moderating role of consumer beliefs about eco-friendly product effectiveness (Study 1). Our results also show that different types of eco-friendly attributes in new product designs trigger different consumer responses (Study 2). Moreover, this dissertation sheds light on the nature of eco-friendly consumer innovativeness and its interaction effects with perceived trade-offs in eco-innovative product designs on consumers’ product evaluation and purchase intentions (Study 3). We also document consumers’ associations between detachability of an eco-friendly attribute on consumer responses (Study 4). Finally, we highlight that consumers’ evaluations of eco-innovation hinge on ecological country of manufacture and its congruence with product eco-friendliness (Study 5). The dissertation concludes with theoretical and managerial implications, such as advice for firms on the best practices for competitive advantage achievement in an eco-innovation context
Mouawad, Mina Rady Abdelshahid. "Agile Multi-PHY Wireless Networking". Electronic Thesis or Diss., Sorbonne université, 2021. http://www.theses.fr/2021SORUS462.
Testo completoThis thesis contributes to the emerging field of agile multi-PHY wireless networking. Industrial wireless networks have relied on a single physical layer for their operation. One example is the standardized IETF 6TiSCH protocol stack for industrial wireless networking, which uses IEEE~802.15.4 O-QPSK radio in the 2.4~GHz band as its physical layer. Advances in radio chip manufacturing have resulted in chips that support a diverse set of long range and short range PHYs. We use the term "PHY'' to refer to any combination of: modulation, frequency band, and coding scheme. In this research, we argue that combining long-range and short-range PHYs can offer balanced network end-to-end performance that no single PHY achieves. We demonstrate how a set of short-range and long-range PHYs can be integrated under one generalized 6TiSCH ("g6TiSCH'') architecture and we evaluate its performance experimentally in a testbed of 36~motes at Inria-Paris. We further demonstrate, experimentally, how a TSCH slotframe can adapt the slot duration on a slot-by-slot basis, as a function of the bitrate of the used PHY ("6DYN''). Finally, we design and evaluate, through simulation, an objective function for RPL that optimizes for network lifetime ("Life-OF''). We demonstrate how Life-OF combines diverse PHYs to boost network lifetime to be up to 470% compared to the IETF standard MRHOF
Zhong, Zeling. "Comprendre l’appropriation des objets connectés grand public : une approche de modélisation à composants hiérarchiques". Thesis, Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLE017.
Testo completoAccording to Hoffman & Novak (2018), the smart connected object is presenting new opportunities for usage experience that have the potential to revolutionize consumers' lives. The main challenge for smart connected objects is to integrate their use into the daily practices of consumers by actively producing usage data in the long-term, namely appropriation. This research has validated the explanatory model of consumer smart connected object appropriation through the psychological needs of French consumers regarding their smart connected objects. Our results show that the smart connected object appropriation is strongly correlated with the need for self-identity, the need for having a place, the need for efficacy and effectance. And the smart connected object appropriation has a positive impact on perceived value of smart connected objects by consumers, their extra-role behaviors, as well as satisfaction of their daily life. Moreover, the mediating role of extra-role behaviors in the relationship between appropriation and perceived value allows us to understand in a complementary way the value cocreation mechanisms from the viewpoint of consumers, concerning how the smart connected object appropriation contributes to value creation by consumers
Horta, José Luis. "Innovative paradigms and architecture for future distribution electricity networks supporting the energy transition". Thesis, Paris, ENST, 2018. http://www.theses.fr/2018ENST0022/document.
Testo completoFuture electricity distribution grids will host an important and growing share of variable renewable energy sources and local storage resources. Moreover, they will face new load structures due for example to the growth of the electric vehicle market. These trends raise the need for new distribution grid architecture and operation paradigms to keep the grid stable and to ensure quality of supply. In addition, these new paradigms will enable the provision of advanced new services. In this thesis we propose a novel architecture capable of fostering collaboration among wholesale market actors, distribution system operators and end customers, to leverage flexible distributed energy resources while respecting distribution system constrains. The architecture is designed for providing innovative residential demand side management services, with a special focus on services enabled by self-consumption at the household and neighborhood level. Following these general objectives, the thesis provides three main contributions. First, based on internet of things and blockchain technology, we propose the building blocks for future distribution grid energy management architectures. Then, focusing on the services enabled by such architectures, we propose hour-ahead markets for the local exchange of renewable energy among households together with dynamic phase allocation mechanism to improve the quality of electricity supply. Finally, we propose a real time control mechanism for the adjustment of market decisions to satisfy distribution system operator constraints
Richter, Wolf R. "'Better' regulation through social entrepreneurship? : innovative and market-based approaches to address the digital challenge to copyright regulation". Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:8d609027-8605-4815-a499-3d2981028a24.
Testo completoHorta, José Luis. "Innovative paradigms and architecture for future distribution electricity networks supporting the energy transition". Electronic Thesis or Diss., Paris, ENST, 2018. http://www.theses.fr/2018ENST0022.
Testo completoFuture electricity distribution grids will host an important and growing share of variable renewable energy sources and local storage resources. Moreover, they will face new load structures due for example to the growth of the electric vehicle market. These trends raise the need for new distribution grid architecture and operation paradigms to keep the grid stable and to ensure quality of supply. In addition, these new paradigms will enable the provision of advanced new services. In this thesis we propose a novel architecture capable of fostering collaboration among wholesale market actors, distribution system operators and end customers, to leverage flexible distributed energy resources while respecting distribution system constrains. The architecture is designed for providing innovative residential demand side management services, with a special focus on services enabled by self-consumption at the household and neighborhood level. Following these general objectives, the thesis provides three main contributions. First, based on internet of things and blockchain technology, we propose the building blocks for future distribution grid energy management architectures. Then, focusing on the services enabled by such architectures, we propose hour-ahead markets for the local exchange of renewable energy among households together with dynamic phase allocation mechanism to improve the quality of electricity supply. Finally, we propose a real time control mechanism for the adjustment of market decisions to satisfy distribution system operator constraints
Vancaelemont, Anne. "Matérialité et travail institutionnel des consommateurs. Le cas de l'industrie de la musique enregistrée face à la "dématérialisation" (1994-2014)". Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLED039/document.
Testo completoConsumers are most of the time left at the margins of neo-institutional theory. Yet, the institutional work concept makes it possible to consider consumer practices aimed at maintaining or disrupting formerly institutionalized practices or at creating new ones. Furthermore, taking into account the practices material dimension allows us to consider how objects play a role in consumer institutional work processes. The case of the French recorded music industry from 1994 to 2014 - when MP3 downloading then streaming overcame CD consumption practices - is studied with a grounded theory inductive approach. Our dissertation shows that consumers collaborate in order to perform institutional work (maintaining, disrupting and creating institutionalized practices). To disrupt institutionalized practices, they use « bricolage » to assemble available practices and objects, among themcommunity-objects that play a specific role: sharing information and objects. Moreover, material resilience, not only contributes to practice maintenance but also to disruption and new practices institutionalization
Lemoine, Frédéric. "Internet des Objets centré service autocontrôlé". Thesis, Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1235/document.
Testo completoIn the digital era, the number of connected objects continues to grow and diversify. To support this increasing complexity, we wanted to bring a maximum of automatisms to the Internet of Things in order to guarantee end-to-end quality of service (QoS). To do this, a self-controlled service component is proposed to integrate the object into the digital ecosystem. Thanks to the calibration of each service, which makes it possible to know the behaviour, an automated composition becomes possible. We have illustrated the feasibility of our approach on a case study. We also have shown how connected objects can assemble themselves, cooperating to achieve a common objective, while meeting global QoS requirements
Lemoine, Frédéric. "Internet des Objets centré service autocontrôlé". Electronic Thesis or Diss., Paris, CNAM, 2019. http://www.theses.fr/2019CNAM1235.
Testo completoIn the digital era, the number of connected objects continues to grow and diversify. To support this increasing complexity, we wanted to bring a maximum of automatisms to the Internet of Things in order to guarantee end-to-end quality of service (QoS). To do this, a self-controlled service component is proposed to integrate the object into the digital ecosystem. Thanks to the calibration of each service, which makes it possible to know the behaviour, an automated composition becomes possible. We have illustrated the feasibility of our approach on a case study. We also have shown how connected objects can assemble themselves, cooperating to achieve a common objective, while meeting global QoS requirements
Ілляшенко, Сергій Миколайович, Сергей Николаевич Ильяшенко e Serhii Mykolaiovych Illiashenko. "Інтернет-біржі промислової власності – складова інноваційної інфраструктури". Thesis, Національний університет біоресурсів і природокористування України, 2018. http://essuir.sumdu.edu.ua/handle/123456789/72084.
Testo completoВыполнен анализ проблем и перспектив развития интернет-бирж промышленной собственности в Украине.
Analysis of the problems and prospects of development of Internet exchanges of industrial property in Ukraine.
Gyrard, Amélie. "Concevoir des applications internet des objets sémantiques". Thesis, Paris, ENST, 2015. http://www.theses.fr/2015ENST0018/document.
Testo completoAccording to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Gyrard, Amélie. "Concevoir des applications internet des objets sémantiques". Electronic Thesis or Diss., Paris, ENST, 2015. http://www.theses.fr/2015ENST0018.
Testo completoAccording to Cisco's predictions, there will be more than 50 billions of devices connected to the Internet by 2020.The devices and produced data are mainly exploited to build domain-specific Internet of Things (IoT) applications. From a data-centric perspective, these applications are not interoperable with each other.To assist users or even machines in building promising inter-domain IoT applications, main challenges are to exploit, reuse, interpret and combine sensor data.To overcome interoperability issues, we designed the Machine-to-Machine Measurement (M3) framework consisting in:(1) generating templates to easily build Semantic Web of Things applications, (2) semantically annotating IoT data to infer high-level knowledge by reusing as much as possible the domain knowledge expertise, and (3) a semantic-based security application to assist users in designing secure IoT applications.Regarding the reasoning part, stemming from the 'Linked Open Data', we propose an innovative idea called the 'Linked Open Rules' to easily share and reuse rules to infer high-level abstractions from sensor data.The M3 framework has been suggested to standardizations and working groups such as ETSI M2M, oneM2M, W3C SSN ontology and W3C Web of Things. Proof-of-concepts of the flexible M3 framework have been developed on the cloud (http://www.sensormeasurement.appspot.com/) and embedded on Android-based constrained devices
Bondu, Mathilde. "Ethique et objets connectés". Master's thesis, Université Laval, 2020. http://hdl.handle.net/20.500.11794/67170.
Testo completoCe projet de recherche porte sur l’opportunité de l’éthique comme mode de régulation des objets connectés. Actuellement au cœur d’une véritable course à l’innovation se faisant de plus en plus pressante, nous relèverons qu’il s’agit de biens complexes rendant difficile leur appréhension par le droit. Ce sujet se focalisera ensuite sur le cadre juridique applicable à cette technologie au regard des données personnelles récoltées de manière massives pour pouvoir enrichir et assurer le fonctionnement de ces objets. Démontrant certaines limites de ce régime légal au regard du poids de l’économie de la donnée, l’éthique sera étudiée de manière théorique dans le contexte du numérique comme outil de régulation, y compris son utilité mais aussi son inévitable manipulation par les acteurs du numérique. Ce projet aura pour objectif enfin de dresser un bilan concret des initiatives véritablement destinées à assurer une meilleure régulation des objets connectés par l’éthique, finalement débitrice d’une forte collaboration entre les trois acteurs principaux du numérique : pouvoirs publics, entreprises et citoyens.
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets". Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006.
Testo completoInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Hammi, Mohamed Tahar. "Sécurisation de l'Internet des objets". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLT006/document.
Testo completoInternet of Things becomes a part of our everyday lives. Billions of smart and autonomous things around the world are connected and communicate with each other. This revolutionary paradigm creates a new dimension that removes boundaries between the real and the virtual worlds. Its success is due to the evolution of hardware and communication technologies, especially wireless ones. IoT is the result of the development and combination of different technologies. Today, it covers almost all areas of information technology (IT).Wireless sensor networks are a cornerstone of IoT's success. Using constrained things, industrial, medical, agricultural, and other environments can be automatically covered and managed.Things can communicate, analyze, process and manage data without any human intervention. However, security issues prevent the rapid evolution and deployment of this high technology. Identity usurpation, information theft, and data modification represent a real danger for this system of systems.The subject of my thesis is the creation of a security system that provides services for the authentication of connected things, the integrity of their exchanged data and the confidentiality of information. This approach must take into account the things and communication technologies constraints
Park, Jin Suk S. M. Massachusetts Institute of Technology. "User innovation in Internet businesses". Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/42367.
Testo completoIncludes bibliographical references (leaf 39).
This paper examines the concept of user innovation, how this concept has been applied to internet businesses, and behaviors and motivation of the users who have participated in user innovative activities for internet businesses. This thesis presents definitions and characteristics of both user innovation activities in web businesses. As a major research method, a survey is conducted to identify the trend and phenomenon of current user innovation activities on the web. Major discoveries from the web user innovation survey are two. First, most lead users who participate in user innovation activity in the web businesses do not significantly differ by gender, age, or profession. Second, most lead users participate in user innovation activities for social-networking purpose as well as the goal of contributing to society. User innovations are seldom oriented or initiated from financial benefit purpose as similar as many traditional user innovations are formed for non financial benefit reasons. Internet businesses can leverage these findings to bring a user innovation to their business more effectively.
by Jin Suk Park.
S.M.
Aïssaoui, François. "Autonomic Approach based on Semantics and Checkpointing for IoT System Management". Thesis, Toulouse 1, 2018. http://www.theses.fr/2018TOU10061/document.
Testo completoCiortea, Andrei-Nicolae. "Tisser le Web Social des Objets : Permettre une Interaction Autonome et Flexible dans l’Internet des Objets". Thesis, Lyon, 2016. http://www.theses.fr/2016EMSE0813/document.
Testo completoThe Internet of Things (IoT) aims to create a global ubiquitous ecosystem composed of large numbers of heterogeneous devices. To achieve this vision, the World Wide Web is emerging as a suitable candidate to interconnect IoT devices and services at the application layer into a Web of Things (WoT).However, the WoT is evolving towards large silos of things, and thus the vision of a global ubiquitous ecosystem is not fully achieved. Furthermore, even if the WoT facilitates mashing up heterogeneous IoT devices and services, existing approaches result in static IoT mashups that cannot adapt to dynamic environments and evolving user requirements. The latter emphasizes another well-recognized challenge in the IoT, that is enabling people to interact with a vast, evolving, and heterogeneous IoT.To address the above limitations, we propose an architecture for an open and self-governed IoT ecosystem composed of people and things situated and interacting in a global environment sustained by heterogeneous platforms. Our approach is to endow things with autonomy and apply the social network metaphor to createflexible networks of people and autonomous things. We base our approach on results from multi-agent and WoT research, and we call the envisioned IoT ecosystem the Social Web of Things.Our proposal emphasizes heterogeneity, discoverability and flexible interaction in the IoT. In the same time, it provides a low entry-barrier for developers and users via multiple layers of abstraction that enable them to effectively cope with the complexity of the overall ecosystem. We implement several application scenarios to demonstrate these features
Bouchereau, Aymeric. "Les objets connectés au service de l'apprentissage". Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCC018.
Testo completoLearning - a vital principle of evolution - ensures the transformation of primary data captured by our senses into useful knowledge or abstract and general ideas that can be used in new situations and contexts. Cognitive neuroscience shows that the mechanisms of learning are stimulated by cognitive (e.g. wondering, evaluating errors), physical (e.g. manipulating, moving) and social (e.g. debating, collaborating) engagement. The learner builds knowledge through experience, by exploring his environment, formulating hypotheses and experimenting.Learning is crucial in a context where the exponential evolution of information and communication technologies is changing objects, practices and uses. The development of the Internet of Things (IoT) transforms common objects (e.g. light bulbs, watches, cars) into connected devices (CD) that can collect data and act on the user's environment. Learning becomes both biological and artificial and allows the creation of artificial intelligence systems (AIS) that analyse large volumes of data to automate tasks and assist individuals.Technologies can support learning when the technical possibilities they offer are used to support the process of knowledge construction. Thus, this thesis focuses on learning in the context of IoT and examines how the specificities of CD can be articulated with the mechanisms of learning.In order to identify the characteristics of learning in the context of IoT, we studied existing uses of CD. Based on the state of the art, we proposed a conceptual tool describing the IoT through four dimensions of analysis: Data, Interfaces, Agents and Pervasiveness. This tool enabled us to identify, list, classify and ultimately analyse the uses of CD for learning. In the context of these uses, learning is characterised by physical commitment, contextualisation of knowledge and bringing pedagogical activities closer to reality.Building on the results of this initial work, we have developed an approach to put the specificities of CD to learn sciences. The abstract and often counter-intuitive aspect of scientific knowledge hinders their learning, partly because our perception of reality is subjective and limited by our senses. However, data collected by CD and analysed by AIS provide information about the environment that can be used to extend human perception.Therefore, the objective of our approach, translated by the Data - Representations - Interactions (DRI) model, aims at exploiting OCs and SIAs to facilitate the observation of physical phenomena. According to the DRI model, the learner interacts with representations of a physical phenomenon generated by CD and AIS. In accordance with the mechanisms of learning (e.g. constructivism, role of experience), the learner is led to make observations and manipulations, formulate hypotheses and test them. In order to evaluate the effects and constraints of the DRI model, we have designed LumIoT devices dedicated to the learning of photometric quantities (e.g. luminous flux, luminous intensity, illuminance). Then, we conducted an experiment with 17 students of the Master 1 Multimedia Products and Services of the University of Franche-Comté (Montbéliard).The results of the experiment show that the LumIoT devices, based on the DRI model, have facilitated the observation and understanding of photometric quantities. By making abstract knowledge accessible, the DRI model paves the way for learning devices using CD and AIS to mediate knowledge
Fayad, Achraf. "Protocole d’authentification sécurisé pour les objets connectés". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAT051.
Testo completoThe interconnection of private resources on public infrastructure, user mobility and the emergence of new technologies (vehicular networks, sensor networks, Internet of things, etc.) have added new requirements in terms of security on the server side as well as the client side. Examples include the processing time, mutual authentication, client participation in the choice of security settings and protection against traffic analysis. Internet of Things (IoT) is in widespread use and its applications cover many aspects of today's life, which results in a huge and continuously increasing number of objects distributed everywhere.Security is no doubt the element that will improve and strengthen the acceptability of IoT, especially that this large scale deployment of IoT systems will attract the appetite of the attackers. The current cyber-attacks that are operational on traditional networks will be projected towards the Internet of Things. Security is so critical in this context given the underlying stakes; in particular, authentication has a critical importance given the impact of the presence of malicious node within the IoT systems and the harm they can cause to the overall system. The research works in this thesis aim to advance the literature on IoT authentication by proposing three authentication schemes that satisfy the needs of IoT systems in terms of security and performance, while taking into consideration the practical deployment-related concerns. One-Time Password (OTP) is an authentication scheme that represents a promising solution for IoT and smart cities environments. This research work extends the OTP principle and propose a new approach to generate OTP based on Elliptic Curve Cryptography (ECC) and Isogeny to guarantee the security of such protocol. The performance results obtained demonstrate the efficiency and effectiveness of our approach in terms of security and performance.We also rely on blockchains in order to propose two authentication solutions: first, a simple and lightweight blockchain-based authentication scheme for IoT systems based on Ethereum, and second, an adaptive blockchain-based authentication and authorization approach for IoT use cases. We provided a real implementation of our proposed solutions. The extensive evaluation provided, clearly shows the ability of our schemes to meet the different security requirements with a lightweight cost in terms of performance
Nicholls, Tom. "Digital era local government in England : service reform and the Internet". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:d85d7964-80d2-4b6d-bfac-418ed4f0fa6a.
Testo completoClaeys, Timothy. "Sécurité pour l'internet des objets : une approche des bas en haut pour un internet des objets sécurisé et normalisé". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAM062.
Testo completoThe rapid expansion of the IoT has unleashed a tidal wave of cheap Internet-connected hardware. Formany of these products, security was merely an afterthought. Due to their advanced sensing and actuatingfunctionalities, poorly-secured IoT devices endanger the privacy and safety of their users.While the IoT contains hardware with varying capabilities, in this work, we primarily focus on the constrainedIoT. The restrictions on energy, computational power, and memory limit not only the processingcapabilities of the devices but also their capacity to protect their data and users from attacks. To secure theIoT, we need several building blocks. We structure them in a bottom-up fashion where each block providessecurity services to the next one.The first cornerstone of the secure IoT relies on hardware-enforced mechanisms. Various security features,such as secure boot, remote attestation, and over-the-air updates, rely heavily on its support. Sincehardware security is often expensive and cannot be applied to legacy systems, we alternatively discusssoftware-only attestation. It provides a trust anchor to remote systems that lack hardware support. In thesetting of remote attestation, device identification is paramount. Hence, we dedicated a part of this work tothe study of physical device identifiers and their reliability.The IoT hardware also frequently provides support for the second building block: cryptography. Itis used abundantly by all the other security mechanisms, and recently much research has focussed onlightweight cryptographic algorithms. We studied the performance of the recent lightweight cryptographicalgorithms on constrained hardware.A third core element for the security of the IoT is the capacity of its networking stack to protect the communications.We demonstrate that several optimization techniques expose vulnerabilities. For example,we show how to set up a covert channel by exploiting the tolerance of the Bluetooth LE protocol towardsthe naturally occurring clock drift. It is also possible to mount a denial-of-service attack that leverages theexpensive network join phase. As a defense, we designed an algorithm that almost completely alleviates theoverhead of network joining.The last building block we consider is security architectures for the IoT. They guide the secure integrationof the IoT with the traditional Internet. We studied the IETF proposal concerning the constrainedauthentication and authorization framework, and we propose two adaptations that aim to improve its security.Finally, the deployment of the IETF architecture heavily depends on the security of the underlying communicationprotocols. In the future, the IoT will mainly use the object security paradigm to secure datain flight. However, until these protocols are widely supported, many IoT products will rely on traditionalsecurity protocols, i.e., TLS and DTLS. For this reason, we conducted a performance study of the most criticalpart of the protocols: the handshake phase. We conclude that while the DTLS handshake uses fewerpackets to establish the shared secret, TLS outperforms DTLS in lossy networks
Patrigeon, Guillaume. "Systèmes intégrés adaptatifs ultra basse consommation pour l’Internet des Objets". Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS036.
Testo completoThe Internet of Things is an infrastructure enabling advanced services by interconnecting things. Although the large variety of Internet of Things applications involve many kinds of technical solutions, many of those are based on a typical architecture that can be divided in three layers: the perception layer, the transport layer and the services layer. The dispositive that composed the perception layer, called “sensor nodes”, are subject of technical requirements: size, security, reliability, autonomous, and long lifetime. Sensor nodes’ energy efficiency is the most critical point where traditional technologies show their limitations. New strategies and solutions are proposed to overcome this technical challenge; however, how can those be evaluated, with which tools and at which level? How emerging technologies can be optimized and integrated inside microcontrollers for Internet of Things applications? Which are the new strategies for energy management to adopt with technologies such as 28 nm FD-SOI and non-volatiles memories? What are their limitations? Will they be sufficient?To evaluate the integration of emerging technologies inside low power microcontrollers, we propose a new methodology using an FPGA-based sensor node prototyping platform. Able to operate in already deployed wireless sensor networks, we use it to perform fast and precise evaluations, taking account of the application context. We studied and evaluated multiple memory architecture configurations based on STT magnetic memories as a replacement of traditional solutions, and showed that the non-volatile STT memory technology can improve a microcontroller’s energy efficiency for embedded applications
Mebrek, Adila. "Fog Computing pour l’Internet des objets". Thesis, Troyes, 2020. http://www.theses.fr/2020TROY0028.
Testo completoFog computing is a promising approach in the context of the Internet of Things (IoT) as it provides functionality and resources at the edge of the network, closer to end users. This thesis studies the performance of fog computing in the context of latency sensitive IoT applications. The first issue addressed is the mathematical modeling of an IoT-fogcloud system, and the performance metrics of the system in terms of energy consumed and latency. This modeling will then allow us to propose various effective strategies for content distribution and resource allocation in the fog and the cloud. The second issue addressed in this thesis concerns the distribution of content and object data in fog / cloud systems. In order to simultaneously optimize offloading and system resource allocation decisions, we distinguish between two types of IoT applications: (1) IoT applications with static content or with infrequent updates; and (2) IoT applications with dynamic content. For each type of application, we study the problem of offloading IoT requests in the fog. We focus on load balancing issues to minimize latency and the total power consumed by the system
Adomnicai, Alexandre. "Cryptographie légère pour l'internet des objets : implémentations et intégrations sécurisées". Thesis, Lyon, 2019. https://tel.archives-ouvertes.fr/tel-02868017.
Testo completoWhile the internet of things (IoT) promises many advances for businesses, administrations and citizens, its deployment is a real challenge in terms of privacy and security. In order to ensure the confidentiality and the authenticity of information transmitted by these objects, numerous IoT protocols incorporate cryptographic algorithms within their specification. To date, these algorithms are the same as the ones used in traditionnal internet security protocols and thus, have not been designed with constrainted plateforms in mind. This thesis focuses on lightweight cryptography which aims at reduce as much as possible the cost of its implementation.Apart from the main goal of lightweight cryptography which is to consume less ressources than traditional algorithms, it is also valuable to take into account the integration of countermeasures against physical attacks during the design phase in order to limit their impact. Although this kind of attacks require a physical access to the target, this can be a realistic scenario as connected objets might be deployed everywhere and thus, potentially accessible by malicious people. Our works focus on the study of three lightweight cryptographic algorithms, each having a potential for industrial applications. Especially, we highlight the need of secure implementations by introducing two new side-channel attacks : one against ChaCha20, standardized by the IETF and now used in TLS 1.3, and another one against ACORN, an algorithm being part of the CAESAR portfolio
Kamgueu, Patrick Olivier. "Configuration dynamique et routage pour l'internet des objets". Electronic Thesis or Diss., Université de Lorraine, 2017. http://www.theses.fr/2017LORR0241.
Testo completoIn recent years, the growing interest of scientific and industrial community has led to the standardization of new protocols that consider the unique requirements of Wireless Sensor Networks (WSN) nodes. At network layer, RPL (IPv6 Routing Protocol for Low-power and Lossy Network) has been proposed by IETF as the routing standard for network that uses LLN nodes, namely, those where both nodes and their interconnects are constrained. They operate on low-power embedded batteries and use lossy links, making communications unreliable and lead to a significant data loss rates. This thesis aims to optimize the routing in WSNs (especially those using TCP/IP protocol stack), as well as their efficient and cost-effective connection to the Internet. First, we have proposed two new RPL objective functions. The first uses as unique routing criterion, the node remaining energy with the goal of maximizing the network lifetime. An energy model that allows the nodes to dynamically estimate their remaining energy at runtime has been implemented and integrate to the protocol. The second objective function uses fuzzy logic reasoning to combine several criteria to take Quality of Service into account. Indeed, this scheme provides a good trade-off on several inputs and requires a low memory footprint. In the last part of this thesis, we designed and implemented an architecture that enable an efficient integration of several RPL based WSNs to the Internet to achieve the Internet of Things vision
Kamgueu, Patrick Olivier. "Configuration dynamique et routage pour l'internet des objets". Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0241/document.
Testo completoIn recent years, the growing interest of scientific and industrial community has led to the standardization of new protocols that consider the unique requirements of Wireless Sensor Networks (WSN) nodes. At network layer, RPL (IPv6 Routing Protocol for Low-power and Lossy Network) has been proposed by IETF as the routing standard for network that uses LLN nodes, namely, those where both nodes and their interconnects are constrained. They operate on low-power embedded batteries and use lossy links, making communications unreliable and lead to a significant data loss rates. This thesis aims to optimize the routing in WSNs (especially those using TCP/IP protocol stack), as well as their efficient and cost-effective connection to the Internet. First, we have proposed two new RPL objective functions. The first uses as unique routing criterion, the node remaining energy with the goal of maximizing the network lifetime. An energy model that allows the nodes to dynamically estimate their remaining energy at runtime has been implemented and integrate to the protocol. The second objective function uses fuzzy logic reasoning to combine several criteria to take Quality of Service into account. Indeed, this scheme provides a good trade-off on several inputs and requires a low memory footprint. In the last part of this thesis, we designed and implemented an architecture that enable an efficient integration of several RPL based WSNs to the Internet to achieve the Internet of Things vision
Deetjen, Ulrike. "Internet use and health : a mixed methods analysis using spatial microsimulation and interviews". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:92b1d35c-1aed-435d-8daa-18b1cd9ccaa1.
Testo completoMoudoud, Hajar. "Intégration de la Blockchain à l’Internet des Objets". Electronic Thesis or Diss., Troyes, 2022. http://www.theses.fr/2022TROY0006.
Testo completoThe Internet of Things (IoT) is transforming traditional industry into a smart industry where decisions are made based on data. The IoT interconnects many objects that perform complex tasks. However, the intrinsic characteristics of the IoT lead to several problems, such as decentralization and privacy and security issues. Blockchain has emerged as a key technology to address the challenges of IoT. Due to its salient features such as decentralization, immutability, and security, blockchain has been proposed to establish trust in several applications, including IoT. The integration of blockchain with IoT opens the door to new possibilities that inherently improve trustworthiness, reputation, and transparency for all parties involved, while enabling security. However, conventional blockchains are computationally expensive, have limited scalability, and require high bandwidth, making them unsuitable for resource constrained IoT environments. The main objective of this thesis is to use blockchain as a key tool to improve IoT. To achieve our goal, we address the challenges of data reliability and security in IoT by using blockchain as well as new emerging technologies, including artificial intelligence
Smyk-Bhattacharjee, Dorota. "Lexical innovation on the Internet : neologisms in blogs /". [S.l.] : [s.n.], 2009. http://opac.nebis.ch/cgi-bin/showAbstract.pl?sys=000282953.
Testo completoMansouri, Zia. "Governing innovation : internet and renewal in Swedish banks /". Göteborg : School of Business, Economics and Law, Göteborg University, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016398666&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Testo completoKrishnan, Parthiphan. "Geography and the Internet : the impact of the Internet on information and innovation". Thesis, University of Reading, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.402911.
Testo completoBui, Duy-Hieu. "Système avancé de cryptographie pour l'internet des objets ultra-basse consommation". Thesis, Université Grenoble Alpes (ComUE), 2019. http://www.theses.fr/2019GREAT001/document.
Testo completoThe Internet of Things (IoT) has been fostered by accelerated advancements in communication technologies, computation technologies,sensor technologies, artificial intelligence, cloud computing, and semiconductor technologies. In general, IoT contains cloud computing to do data processing, communication infrastructure including the Internet, and sensor nodes which can collect data, send them through the network infrastructure to the Internet, and receive controls to react to the environment. During its operations, IoT may collect, transmit and process secret data, which raise security problems. Implementing security mechanisms for IoT is challenging because IoT organizations include millions of devices integrated at multiple layers, whereas each layer has different computation capabilities and security requirements. Furthermore, sensor nodes in IoT are intended to be battery-based constrained devices with limited power budget, limited computation, and limited memory footprint to reduce costs. Implementing security mechanisms on these devices even encounters more challenges. This work is therefore motivated to focus on implementing data encryption to protect IoT sensor nodes and systems with the consideration of hardware cost, throughput and power/energy consumption. To begin with, a ultra-low-power block cipher crypto-accelerator with configurable parameters is proposed and implemented in ST 28nm FDSOI technology in SNACk test chip with two cryptography modules: AES and PRESENT. AES is a widely used data encryption algorithm for the Internet and currently used for new IoT proposals, while PRESENT is a lightweight algorithm which comes up with reduced security level but requires with much smaller hardware area and lower consumption. The AES module is a 32-bit datapath architecture containing multiple optimization strategies supporting multiple security levels from 128-bit keys up to 256-bit keys. The PRESENT module contains a 64-bit round-based architecture to maximize its throughput. The measured results indicate that this crypto-accelerator can provide medium throughput (around 20Mbps at 10MHz) while consumes less than 20uW at normal condition and sub-pJ of energy per bit. However, the limitation of crypto-accelerator is that the data has to be read into the crypto-accelerator and write back to memory which increases the power consumption. After that, to provide a high level of security with flexibility and configurability to adapt to new standards and to mitigate to new attacks, this work looks into an innovative approach to implement the cryptography algorithm which uses the new proposed In-Memory-Computing SRAM. In-Memory Computing SRAM can provide reconfigurable solutions to implement various security primitives by programming the memory's operations. The proposed scheme is to carry out the encryption in the memory using the In-Memory-Computing technology. This work demonstrates two possible mapping of AES and PRESENT using In-Memory Computing
Lemke, Laurent. "Modèles partagés et infrastructures ouverte pour l'internet des objets de la ville Intelligente". Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAM022/document.
Testo completoNowadays cities face several challenges and are concerned by ecological, energetic, economical, and demographical aspects. Smart cities, equipped with sensors, actuators, and digital infrastructures, are meant to tackle these issues.Current smart cities are operated by several actors without sharing sensor data or accesses to the actuators. This is a vertical organization, in which each actor deploys its own sensors and actuators, and manages its own digital infrastructure. Each actor may be interested in a different aspect of city management, for instance traffic management, air control, etc. The current trend is a transition towards a more horizontal organization, based on an open and shared mediation platform. In such a platform, sensor data and accesses to actuators can be shared among several actors. The costs related to nfrastructure deployment and management are therefore reduced for each individual actor. This PhD is a contribution to this volution towards horizontal organizations, with open and shared platforms. We propose: (1) an abstraction layer for the ontrol and supervision of the city; (2) a concurrency management mechanism; (3) a coordination mechanism that helps haring actuators; (4) a proof-of-concept implementation of these contributions. The abstraction layer we propose helps users control and supervise a city. It is based upon formal models inspired by the ones used in the programming of reactive systems. They represent the physical elements present in each smart city, with genericity principles. In order to ease application development, the interface of those models is made uniform. Since applications, especially control ones, may ave real-time constraints, we also list the constraints this poses on distributed infrastructures. As soon as actuators are shared, conflicts may occur between users. Our proposals include a concurrency management mechanism, based on eservation principles. We also provide a coordination mechanism for the users to be able to perform several actions in an tomic way.All these principles have been implemented as a proof of concept. We review several use cases, to demonstrate he potential benefits of our proposals
Naas, Mohammed Islam. "Placement des données de l'internet des objets dans une infrastructure de fog". Thesis, Brest, 2019. http://www.theses.fr/2019BRES0014/document.
Testo completoIn the coming years, Internet of Things (IoT) will be one of the applications generating the most data. Nowadays, IoT data is stored in the Cloud. As the number of connected objects increases, transmitting the large amount of produced data to the Cloud will create bottlenecks. As a result, latencies will be high and unpredictable. In order to reduce these latencies, Fog computing has been proposed as a paradigm extending Cloud services to the edge of the network. It consists of using any equipment located in the network (e.g. router) to store and process data. Therefore, the Fog presents a heterogeneous infrastructure. Indeed, its components have differences in computing performance, storage capacity and network interconnections. This heterogeneity can further increase the latency of the service. This raises a problem: the wrong choice of data storage locations can increase the latency of the service. In this thesis, we propose a solution to this problem in the form of four contributions: 1. A formulation of the IoT data placement problem in the Fog as a linear program. 2. An exact solution to solve the data placement problem using the CPLEX, a mixed linear problem solver. 3. Two heuristics based on the principle of “divide and conquer” to reduce the time of placement computation. 4. An experimental platform for testing and evaluating solutions for IoT data placement in the Fog, integrating data placement management with iFogSim, a Fog and IoT environment simulator
Billet, Benjamin. "Système de gestion de flux pour l'Internet des objets intelligents". Thesis, Versailles-St Quentin en Yvelines, 2015. http://www.theses.fr/2015VERS012V/document.
Testo completoThe Internet of Things (IoT) is currently characterized by an ever-growing number of networked Things, i.e., devices which have their own identity together with advanced computation and networking capabilities: smartphones, smart watches, smart home appliances, etc. In addition, these Things are being equipped with more and more sensors and actuators that enable them to sense and act on their environment, enabling the physical world to be linked with the virtual world. Specifically, the IoT raises many challenges related to its very large scale and high dynamicity, as well as the great heterogeneity of the data and systems involved (e.g., powerful versus resource-constrained devices, mobile versus fixed devices, continuously-powered versus battery-powered devices, etc.). These challenges require new systems and techniques for developing applications that are able to (i) collect data from the numerous data sources of the IoT and (ii) interact both with the environment using the actuators, and with the users using dedicated GUIs. To this end, we defend the following thesis: given the huge volume of data continuously being produced by sensors (measurements and events), we must consider (i) data streams as the reference data model for the IoT and (ii) continuous processing as the reference computation model for processing these data streams. Moreover, knowing that privacy preservation and energy consumption are increasingly critical concerns, we claim that all the Things should be autonomous and work together in restricted areas as close as possible to the users rather than systematically shifting the computation logic into powerful servers or into the cloud. For this purpose, our main contribution can be summarized as designing and developing a distributed data stream management system for the IoT. In this context, we revisit two fundamental aspects of software engineering and distributed systems: service-oriented architecture and task deployment. We address the problems of (i) accessing data streams through services and (ii) deploying continuous processing tasks automatically, according to the characteristics of both tasks and devices. This research work lead to the development of a middleware layer called Dioptase, designed to run on the Things and abstract them as generic devices that can be dynamically assigned communication, storage and computation tasks according to their available resources. In order to validate the feasability and the relevance of our work, we implemented a prototype of Dioptase and evaluated its performance. In addition, we show that Dioptase is a realistic solution which can work in cooperation with legacy sensor and actuator networks currently deployed in the environment
Hachem, Sara. "Middleware pour l'Internet des Objets Intelligents". Phd thesis, Université de Versailles-Saint Quentin en Yvelines, 2014. http://tel.archives-ouvertes.fr/tel-00960026.
Testo completoHaas, Michael. "Management of innovation in network industries : mobile internet in Japan and Europe /". Wiesbaden : Dt. Univ.-Verl, 2006. http://www.gbv.de/dms/zbw/509011543.pdf.
Testo completoConnier, Jean. "Conception et réalisation d'un système multi-fonctionnel d'aide à la mobilité pour personnes mavoyantes et aveugles". Thesis, Université Clermont Auvergne (2017-2020), 2019. http://www.theses.fr/2019CLFAC097.
Testo completoVisual impairment and blindness are sources of mobility difficulties for the affected people. In orderto lighten the burden of these difficulties, many mobility aids have been imagined, designed, tested, and more or less adopted. Designers of such assistive systems soon run into the complexity of the issue, which stands at the intersection of three domains that are, by themselves, complex: visual impairment, mobility, and perception.Having decided to design an electronic assistive system from the beginning, we tried to step back and analyzed a wide range of blind aids: white canes, mobile electronic devices serving different mobility purposes, urban systems, and systems not primarily designed for mobility. Their diversity helped us analyze assistive systems through several prisms: according to their technical characteristics, their functions, their shape, and their dependence to an infrastructure. Taken individually, each of these approaches quickly shows its limits, but, together, they draw an interesting portrait of the existing devices. Besides these rather classical approaches, we propose a new model for analyzing assistive systems, which relies on the way these systems take place in a person's perception / mobility process. This model has the advantages of being, a priori, relevant forall assistive systems – in spite of their dissimilarity – and meaningful for both evaluation and classification.We have designed and built an electronic mobility aid, called the 2SEES system. Like its predecessor, the SEES system, the 2SEES relies on three platforms: a smart cane, a smartphone, anda cloud computing back-end. The issues of energy consumption and geographical universality, essential for any mobile device, are made explicit and studied. A novelty of the 2SEES resides in its account of reliability issues ; it is thus designed around the complex equilibrium between energy consumption, universality, and reliability. Despite their importance in a system destined to be adopted by end users, these three notions are scarcely visible in the relevant literature.To concurrently enhance robustness and autonomy, we have integrated several sensors and processors in the smart cane, both by introducing redundancy, for fault tolerance, and by integratingheterogeneous sensors, for robustness against the diversity of environments.Two aspects of this equilibrium have been further studied. First, the need for robustness has been highlighted by a study of affinities between obstacle sensors and several types of potential obstacle materials. Secondly, we have tried to develop an energy-efficient indoor localization function that islittle dependent on infrastructures, and therefore easily scalable. This function works with embedded sensors (wheel encoder, inertial measurement unit) and a simplified particle filter, which estimates the position by checking the coherence of trajectories derived from sensor data against themap of the location.In addition to this work on the balance between robustness, energy consumption, and universality, we have developed a novel function, named SO2SEES, which allows communication between usersof the 2SEES and smart objects. This function enables users to ask, in natural language, questions tothe 2SEES, which are answered using information coming from surrounding smart objects. In orderto keep the system simple, users do not formulate their own questions, but are instead invited to pick them in a set of predefined questions, which are proposed by the system according to the nearby objects and the information they offer. This mode of operation shifts the system from a natural language processing artificial intelligence to an expert system working on dynamic and distributed knowledge bases. In this latter configuration, the main issue is the interoperability between the 2SEES and the smart objects and their back-ends that take part in the functionality
Sitzia-Verleure, Benjamin. "Internet-Based Innovation Screening and Pre-Assessment Tool - Prototype Methodology Implementation". Thesis, University of Canterbury. Mechanical Engineering, 2008. http://hdl.handle.net/10092/3428.
Testo completoPittoli, Philippe. "Influence d'une architecture de type maître-esclave dans les problématiques de sécurité de l'Internet des objets". Thesis, Strasbourg, 2019. http://www.theses.fr/2019STRAD006/document.
Testo completoThe Internet of things is a network design where "things" are connected to the Internet, such as thermometers or lights. These objects are constrained in memory, computational capacity and communication (packet size, shared medium). The thesis is focused on issues around those constraints. A client willing to send a request to an object may either establish a direct connection to the object (end-to-end architecture) or establish a connection to the network gateway, which is not constrained in memory or computation capabilities, and will be used as a broker between clients and objects (master-slave architecture). This purpose of the thesis is to understand and to spotlight the differences between those two kinds of architectures and to determine their viability in an IoT context
Ben, Fredj Sameh. "Intergiciel sémantique pour la recherche des services de l'internet des objets". Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0063/document.
Testo completoWith the advent of the Internet of Things (IoT), we are facing a proliferation of connected devices distributed over physical locations, so called smart spaces and offering IoT services. Enabling an easy and seamless discovery of these IoT services is crucial for the success of the Internet of Things. The characteristics of IoT services, such as their sheer number, their heterogeneity and their dynamicity induced by the mobility of the related devices, make discovering them a challenge. In this thesis, we propose a system architecture and the associated mechanisms to enable efficient and scalable semantic-based IoT service discovery supporting dynamic contexts. Our approach relies on distributed semantic gateways that embed clustering, information aggregation and semantic routing mechanisms
Malm, Mikael, e Patrik Sundén. "Intäktsmöjligheter för SMEs på internet". Thesis, Högskolan Väst, Avd för medier och design, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-8124.
Testo completoThe purpose of this paper was to identifying the opportunities for SMEs to obtain revenue with their productions online. The aim was also to investigate what SMEs think about how they can use the different revenue models. To investigate this, we used a mapping of revenue models and a group interview. The mapping was based on previous research and was used to obtain an overview of the revenue models used by companies today. The group interview was used to allow the company's to discuss with each other how different revenue models can be used, and how they feel about the use of alternative payment methods. In our study we found several different revenue models and that companies often use more than one revenue model. The interview showed us that SMEs often see more negative aspects of different revenue models than what they find the positive aspects. The study shows that there are a number of different revenue models that SMEs can make use of the internet, but they must be innovative and find ways to combine different revenue models to thrive online.