Teses / dissertações sobre o tema "Internet des objets social (IoT social)"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 32 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Internet des objets social (IoT social)".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.
Masmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social". Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Texto completo da fonteThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds". Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024/document.
Texto completo da fonteThe paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024.
Texto completo da fonteThe paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
Ciortea, Andrei-Nicolae. "Tisser le Web Social des Objets : Permettre une Interaction Autonome et Flexible dans l’Internet des Objets". Thesis, Lyon, 2016. http://www.theses.fr/2016EMSE0813/document.
Texto completo da fonteThe Internet of Things (IoT) aims to create a global ubiquitous ecosystem composed of large numbers of heterogeneous devices. To achieve this vision, the World Wide Web is emerging as a suitable candidate to interconnect IoT devices and services at the application layer into a Web of Things (WoT).However, the WoT is evolving towards large silos of things, and thus the vision of a global ubiquitous ecosystem is not fully achieved. Furthermore, even if the WoT facilitates mashing up heterogeneous IoT devices and services, existing approaches result in static IoT mashups that cannot adapt to dynamic environments and evolving user requirements. The latter emphasizes another well-recognized challenge in the IoT, that is enabling people to interact with a vast, evolving, and heterogeneous IoT.To address the above limitations, we propose an architecture for an open and self-governed IoT ecosystem composed of people and things situated and interacting in a global environment sustained by heterogeneous platforms. Our approach is to endow things with autonomy and apply the social network metaphor to createflexible networks of people and autonomous things. We base our approach on results from multi-agent and WoT research, and we call the envisioned IoT ecosystem the Social Web of Things.Our proposal emphasizes heterogeneity, discoverability and flexible interaction in the IoT. In the same time, it provides a low entry-barrier for developers and users via multiple layers of abstraction that enable them to effectively cope with the complexity of the overall ecosystem. We implement several application scenarios to demonstrate these features
NITTI, MICHELE. "Managing the Internet of Things based on its Social Structure". Doctoral thesis, Università degli Studi di Cagliari, 2014. http://hdl.handle.net/11584/266422.
Texto completo da fonteAbdelghani, Wafa. "A multi-dimensional trust-model for dynamic, scalable and resources-efficient trust-management in social internet of things". Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30231.
Texto completo da fonteThe Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by giving them the ability to connect to the Internet, communicate and interact. The integration of the social component in the IoT has given rise to the Social Internet of Things (SIoT), which has overcome various issues such as interoperability, navigability and resource/service discovery. In this type of environment, participants compete to offer a variety of attractive services. Some of them resort to malicious behavior to propagate poor quality services. They launch so-called Trust-Attacks (TA) and break the basic functionality of the system. Several works in the literature have addressed this problem and have proposed different trust-models. Most of them have attempted to adapt and reapply trust models designed for traditional social networks or peer-to-peer networks. Despite the similarities between these types of networks, SIoT ones have specific particularities. In SIoT, there are different types of entities that collaborate: humans, devices, and services. Devices can have very limited computing and storage capacities, and their number can be as high as a few million. The resulting network is complex and highly dynamic, and the impact of Trust-Attacks can be more compromising. In this work, we propose a Multidimensional, Dynamic, Resources-efficient and Scalable trust-model that is specifically designed for SIoT environments. We, first, propose features to describe the behavior of the three types of nodes involved in SIoT networks and to quantify the degree of trust according to the three resulting Trust-Dimensions. We propose, secondly, an aggregation method based on Supervised Machine-Learning and Deep Learning that allows, on the one hand, to aggregate the proposed features to obtain a trust score allowing to rank the nodes, but also to detect the different types of Trust-Attacks and to counter them. We then propose a hybrid propagation method that allows spreading trust values in the network, while overcoming the drawbacks of centralized and distributed methods. The proposed method ensures scalability and dynamism on the one hand, and minimizes resource consumption (computing and storage), on the other. Experiments applied to synthetic data have enabled us to validate the resilience and performance of the proposed model
Ebrahiem, Waleed, e Naveed Arif. "Internet of Things : How vendors can use IoT to achieve value creation". Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-144582.
Texto completo da fonteJohansson, Fredrik, e Martin Göthe. "Internet of Things, bekvämt, men säkert? : En studie kring säkerhetsaspekter inom IoT". Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-135063.
Texto completo da fonteÅkerlund, Mathilda. "IoT on Twitter : A Mixed Methods Study". Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-149232.
Texto completo da fonteLundgren, Emil, e Markus Karmehag. "SAMBANDET MELLAN AUTONOMI OCH IoT-LÖSNINGAR I EN LINJEORGANISATION". Thesis, Umeå universitet, Institutionen för informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-173342.
Texto completo da fonteSvensson, Jesper, Niclas Carlén e August Forsman. "Innovating with sensors : A micro-level perspective investigating how IoT solutions affect work practices". Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-147760.
Texto completo da fonteByrskog, Michael. "Interoperabilitetinom eHälsa : Enkvalitativ studie om användningen av IoT för glukosdata". Thesis, Mittuniversitetet, Avdelningen för data- och systemvetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31460.
Texto completo da fonteDenna studie handlar om interoperabilitet vid insamling och vidarebefordran av glukosdata och fokuserar på en ny teknik inom eHälsa. Denna teknik är en del av Internet of Things (IoT) och involverar interoperabilitet inom system med sensorer som appliceras på människokroppen. Syftet har varit att undersöka interoperabiliteten vid insamling och vidarebefordran av glukosdata utifrån frågeställningarna om vilka olika sorters interoperabilitet som förekommer, hur interoperabiliteten används och vilka för- och nackdelar som finns med olika sorters interoperabilitet. En fallstudie med sex semistrukturerade intervjuer har genomförts. Analysen av intervjuerna har utförts med hjälp av ett teoretiskt ramverk som behandlar IoT och interoperabilitet samt en tvådelad interoperabilitetsmodell. Första delen av modellen har använts för att analysera förekomsten av grundläggande, funktionell och semantisk interoperabilitet vid insamling och vidarebefordran av glukosdata. Andra delen av modellen har använts för att analysera informationssystemen utifrån olika mognadsnivåer för interoperabiliteten. Vid insamling av glukosdata förekommer grundläggande, funktionell och i viss mån semantisk interoperabilitet. Vid vidarebefordran av glukosdata förekommer grundläggande och funktionell interoperabilitet. Grundläggande interoperabilitet dominerar här med undantag för ett fall. Vid insamling av glukosdata har meddelanden och notifikationer och den automatiska justeringen av medicinering framkommit som fördelar. Vid vidarebefordran av glukosdata har det faktum att respondenterna inte behöver ta med sin anordning till vårdgivarna och, i ett fall, att flera användare kan se de insamlade glukosdata framkommit som fördelar. Några tydliga nackdelar har inte kunnat identifieras. Andra delen av interoperabilitetsmodellen har resulterat i två mognadsnivåer för interoperabiliteten vid vidarebefordran av glukosdata, ”distribuerad organisationsbunden” och ”integrerad nationell”.
Davids, Natheer. "The Privacy Paradox: Factors influencing information disclosure in the use of the Internet of Things (IoT) in South Africa". Master's thesis, Faculty of Commerce, 2021. http://hdl.handle.net/11427/32636.
Texto completo da fonteVergara, Rammsy Andrea, Karolina Ekbäck e Marcus Viksten. "Smart Omedelbart? : En kvalitativ studie om IoT och dess bidrag till smarthet inom offentlig verksamhet". Thesis, Umeå universitet, Institutionen för informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-183641.
Texto completo da fonteWinnberg, Lise-Lott, e Mimmi Jackléus. "IoT användning inom kommunal verksamhet : – i Östergötland". Thesis, Linköpings universitet, Informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151405.
Texto completo da fonteThe Internet of Things is becoming more common and more common and is already included in someplaces such as city plans for new buildings, in smart offices and infrastructure. There is a wealth ofprivately-owned companies specializing in IoT solutions and application of this to different parts of society.A great example is installing IoT sensors in water pipes so that maintenance can be foreseen, thus reducingsupply deviations and reducing any losses.In this qualitative bachelor thesis, we have investigated how IoT is used in municipalities, what they thinkIoT has to offer the future of Sweden's municipalities and how they see IoT can be used to create utility inmunicipal activities, but also what may be an obstacle in the process of realizing this.After interviewing a few of the municipalities across Östergötland County we have found that currentlythere are few IoT solutions in the municipalities and that it is due to several reasons. One of them is thelack of regulations that deal with IoT, but also the lack of standardisation of IoT, and what the introductionof IoT solutions would entail in municipalities or towns. What to invest in? There is some uncertainty there.If there were concrete examples of direct municipial operation benefit that would probably be a difference.This might possibly be resolved by the Digitaliseringsmyndigheten which will be established in the autumnhowever it seems that their role is not so well-defined, which we noticed when we spoke to respondents.They had different hopes of what the government can assist with or what their work would result in.We have discovered that there is no requirement for the state to provide municipalities with a strategy thataddresses the IoT or a digitization strategy. Nevertheless, a couple of respondents already have a digitizationstrategy or were working on it.Another reason is that the funds the municipalities currently have is not enough for such a venture, thosefunds are necessary to maintain and keep the municipal operation running. A municipality's focus is alwaysthe business and the citizens. If limited funds force a choice between investment in technical capabilities,although they can generate greater profit in the long run, and operational development of other forms ormaintenance, the operation will always come first. As one of the respondents explained, if the choice isbetween building a new preschool or investing in a new technology project, it is obvious where the moneyends up.
Terrab, Imane. "Dispositifs de Social Software et nouveaux régimes de collaboration : nature technique des outils, discours et modalités collaboratives". Thesis, Paris Sciences et Lettres (ComUE), 2016. http://www.theses.fr/2016PSLED050/document.
Texto completo da fonteFor the last decade, Web 2.0 tools have entered the corporate sphere and are considered as part of a major technical and managerial shift. However, there is still a lack of theoretical framework to define the collaborative regimes that the new objects of Social Software carry. In this dissertation, we explore the dimensions through which Social Software objects offer a renewal of collaborative regimes. First, we highlight the technical and paradigmatic evolutions between Groupware and Social Software. Then we carry an empirical exploration of the field of Social Software, by analyzing publishers' commercial discourse and presenting four devices that we describe through the taxonomical frameworks of Computer Supported Cooperative Work and Enterprise 2.0. This analysis is supplemented by the modelization of the four devices' evolution paths, relying on a conceptual framework that focuses on the technical object. Finally, we suggest a novel framework to define the collaboration regimes proposed by Social Software devices. This research leads us to further discuss the links between technology and the management of collaboration
Henriksson, Joar, e Daniel Gustavsson. "Vårdplaceringsproblematik på Norrlands Universitetssjukhus : En fallstudie gällande vårdplaceringsprocessen och hur IoT kan användas inom den". Thesis, Umeå universitet, Institutionen för informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-159182.
Texto completo da fonteFilip, Tomas, e Kobets Kirill. "Internet of Things inom integrerad vård för äldre : En kvalitativ studie ur ett säkerhetsperspektiv". Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-98143.
Texto completo da fonteAs the elderly population in most countries continues to grow, the demand for elderly care is increasing. At the same time, the Internet of Things (IoT) has quickly become one of the most well-known and widely spoken concept of business and technology. One area of use that IoT is currently addressing is healthcare. In this area, IoT is expected to be able to provide the elderly with integrated care that in the future can reduce healthcare and costs. All the advantages of IoT have also brought disadvantages in the form of new security attacks and vulnerabilities in the health care systems. The problem with the IoT technology is that it is not currently supported by adequate privacy and security measures. The purpose of the study was to investigate how security issues affect the development of IoT solutions aimed at integrated care for the elderly. Through semi-structured interviews with five informants with experience and competence in the field of integrated care for elderly, IoT and security, the empirical data for the study could be collected. Furthermore, the empirical result was analyzed together with the literature, and a number of factors were identified that have influence on the development of IoT solutions aimed at integrated care for the elderly. The results of the study show that the factors of time, economy and user friendliness affect the actors' choice of prioritizing functionality before security during development. Instead, actors are forced to make a number of tradeoffs and work in different ways to implement adequate security in their IoT solutions. Furthermore, the results show that the lack of clear guidelines and standards is a factor that influences actors' compliance with laws and regulations that impose strict safety requirements. In addition, the results show that it is important to define the ownership issue during the development stage, as the issue is currently unclear and diffuse.
Rosell, Mathias. "Hur bör manipulation av IoT-enheter i det smarta hemmet hanteras och åtgärdas av användare och utvecklare : En systematisk litteraturstudie för att kartlägga åtgärder för smarta hem". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18652.
Texto completo da fonteUsers of IoT devices are for many people today part of everyday life and more and more devices are connected to people's households. Smart homes have everything from refrigerators and surveillance cameras connected to a network and the internet. The problem with this is that many of these units do not have sufficient capacity or lack adequate security measures to protect themselves against potential attack vectors. Lack of security for devices in the smart home can cause the devices to be hacked and manipulated by attackers. Those who can protect the smart home from tampering with its IoT devices are the users in the smart home and the developers of the IoT devices. Although it is not always clear for whom the security measures apply to, which is something that this study aims to clarify. This literature study is based on existing security measures identified by previous research. It differs from previous research by mapping out which security measures and best practices that are applicable to users and developers to protect the smart home from being manipulated. Using a systematic literature search, 22 studies were selected to answer the study's question. To answer the study's research question, a mapping method is used. The method is used to map and identify which actions are recommended for both users and developers. Using the previous research, a framework is created to clarify what the user in the smart home can do and what actions developers can and should take. The framework also demonstrates a recommended order from the author in which the measures should be carried out.
Hakkestad, Mårten, e Simon Rynningsjö. "Who hacked my toaster? : A study about security management of the Internet of Things". Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158468.
Texto completo da fonteInternet of Things eller Sakernas internet är ett växande område med en växande hotbild och nya hot uppkommer dagligen. Att hålla sig uppdaterad, övervaka nätverk och enheter samt att reagera på att enheter och nätverk blir hackade är en svår och komplicerad uppgift. Den här uppsatsen ämnar undersöka hur ett IT-företag kan arbeta med säkerhetshantering inom Internet of Things. Detta har gjorts genom att kolla utmaningar och säkerhetslösningar inom de tre områdena uppdatera, övervaka och reagera. En kvalitativ forskningsmetod har använts i denna fallstudie tillsammans med ett tolkande synsätt och en abduktiv ansats. Vi har utfört intervjuer på ett stort IT-företag baserat i Sverige tillsammans med en utförlig dokumentanalys. Resultatet av denna uppsats påvisar ett antal utmaningar inom säkerhetshanteringen inom områdena uppdatera, övervaka och reagera tillsammans med hur vårt fallföretag jobbar med att motarbeta dessa utmaningar. I stort sett kan utmaningarna sammanfattas till att allting är svårare när mängden enheten är så hög som den är inom Internet of Things.
Ben, Saied Yosra. "Collaborative security for the internet of things". Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00879790.
Texto completo da fonteBen, Saied Yosra. "Collaborative security for the internet of things". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0013.
Texto completo da fonteThis thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
Attié, Elodie. "The connected consumer : A theoretical framework of consumer adoption/consequences of the Internet of Things and smart connected objects". Thesis, Toulouse 1, 2019. http://www.theses.fr/2019TOU10048.
Texto completo da fonteOver the last decade, technological and Internet innovations have increasingly invaded the consumer market (N’Goala, 2016). The Internet of Things (IoT) is becoming a common platform, and disrupts relationships between consumers and companies (Bohli et al., 2009); in essence, this is a timely research. The major goal of this thesis is to deepen the understanding of the acceptance and the adoption processes of the IoT and smart connected technologies, as well as the related consequences on perceived well-being. To do this, four contexts of study have been explored: smart connected objects, smart sleep applications, smart homes, and smart stores. First, we performed qualitative exploratory studies, and secondly we conducted quantitative studies to build conceptual models according to our qualitative findings and the literature. The results show that technology benefits are the first factors that enable technology acceptance through perceived usefulness and perceived ease of use; subsequently, self-improvement, through perceived social image and well-being benefits, are the main reasons to continue using the IoT and smart connected technologies. The acceptance and the adoption of these technologies also depend on users’ personality traits while perceived risks and fears on the use of the personal data are the main barriers. In turn, the IoT and smart connected technologies influence perceived well-being according to the experience of use, personality traits, and the technology
Masséus, Jonatan. "Where Did The Car Go? : Smart cities, calm technology and the future of autonomous cars". Thesis, Internationella Handelshögskolan, Jönköping University, IHH, Informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50202.
Texto completo da fonteBotero, Oscar. "Heterogeneous RFID framework design, analysis and evaluation". Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0011.
Texto completo da fonteThe Internet of Things paradigm establishes interaction and communication with a huge amount of actors. The concept is not a new-from-scratch one; actually, it combines a vast number of technologies and protocols and surely adaptations of pre-existing elements to offer new services and applications. One of the key technologies of the Internet of Things is the Radio Frequency Identification just abbreviated RFID. This technology proposes a set of solutions that allow tracking and tracing persons, animals and practically any item wirelessly. Considering the Internet of Things concept, multiple technologies need to be linked in order to provide interactions that lead to the implementation of services and applications. The challenge is that these technologies are not necessarily compatible and designed to work with other technologies. Within this context, the main objective of this thesis is to design a heterogeneous framework that will permit the interaction of diverse devices such as RFID, sensors and actuators in order to provide new applications and services. For this purpose in this work, our first contribution is the design and analysis of an integration architecture for heterogeneous devices. In the second contribution, we propose an evaluation model for RFID topologies and an optimization tool that assists in the RFID network planning process. Finally, in our last contribution, we implemented a simplified version of the framework by using embedded hardware and performance metrics are provided as well as the detailed configuration of the test platform
Botero, Oscar. "Heterogeneous RFID framework design, analysis and evaluation". Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00714120.
Texto completo da fonteOliveira, Ellis Bezerra de Mendonça. "Internet das coisas (IoT) e a Proteção dos dados". Master's thesis, 2021. https://hdl.handle.net/10216/138486.
Texto completo da fonteChih-HsiangShao e 邵致翔. "A Group Handoff Scheme for Proximate Data Sharing Using the Social Internet of Thing (S-IOT) Mechanism". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/71930925312618906682.
Texto completo da fonte國立成功大學
資訊工程學系
105
Internet of Things (IOT) emerge in large numbers surrounding us and it has already been along with us everywhere. The things not only communicate with each other without human intervention but also own some relationships called Social IOT (S-IOT), which is the same as social relationships of human beings. In this work, architecture and scheme for a group handoff from a mobile AP to a fixed AP and vice versa, for which the group is for downloading and sharing of geo touring information, e.g., Point Of Interest’s (POI’s), using the proposed S-IOT mechanism. Using the proposed mechanism, all handheld devices in a touring group can communicate with each other and then have the group handoff from a mobile AP to a fixed AP and vice versa automatically and transparently to provide the required POI’s content in a more efficient way. This work (1) defines an S-IOT architecture and two functional scenarios called m-AP mode and f-AP mode for group touring, (2) proposes two control schemes called conservative mode and aggressive mode to handle the handoff from m-AP mode to f-AP mode, and (3) provides control schemes for handoff from m-AP mode to f-AP mode and vice versa. A real system is developed using the Android system and the performance analysis is evaluated from the perspective of power consuming, service time, etc.
Pastor, Liliana Luísa Dória. "A nova era do comércio digital: criação de valor na realidade portuguesa: pequenas e médias empresas portuguesas". Master's thesis, 2018. http://hdl.handle.net/10773/26770.
Texto completo da fonteThe IOT (Internet Of Things) is the most used means for sharing, collecting and searching information. Millions of users use the Internet on a daily basis for a variety of features, including a new business model that is increasingly being felt with greater influence in the market: e-commerce. "The costs of domestic trade reduce aggregate welfare and result in poorer access to consumer goods in small and remote cities. As a new commercial technology, e-commerce can increase trade between cities and alleviate spatial consumption inequality by (1) eliminating the fixed cost of entry into the market and (2) reducing the effects of distance on the costs of trade. " (Fan, Tang, Zhu, & Zou, 2018) According to AICEP, in Portugal, sales increased from 1.7 billion euros to 4.6 billion euros from 2009 to 2017. Gross growth is forecast to double by 2025. Despite the exponential growth of online sales, Portugal still remains in the lowest places in the world ranking. Then there were questions regarding Portugal's position in e-commerce that are interesting to analyze from an academic and professional point of view. What strategies do we need to implement to ensure the success of e-commerce? To answer the central question of the research work, an analysis of primary and secondary data was done, as well as in-depth interviews with some companies that invested in ecommerce. For a quantitative analysis, we conducted surveys by questionnaire, in order to have a generic view of the way some companies operate. The conclusions drawn from this study point to the tendency of companies to bet on ecommerce in order to obtain more profitability from the business model. This study made it possible to define practical suggestions for Portuguese companies in order to make a contribution to their business model.
Mestrado em Marketing
Singar, Arjun V. "A Relational Study of Personality Traits, Learning Styles, Learning Competencies, Learning Methods, and Assessment Methods for Engineering and Management Students Studying the Internet of Things Related Knowledge Areas". Thesis, 2022. https://etd.iisc.ac.in/handle/2005/5771.
Texto completo da fonteThiffault-Chouinard, Nicolas. "La preuve civile et les interactions avec les assistants vocaux, un point de vue comparé". Thesis, 2019. http://hdl.handle.net/1866/24457.
Texto completo da fonteRecent developments in the fields of artificial intelligence, of the Internet of Things and of voice recognition, together with the accessibility to electronic devices and wide Internet connection in the industrialized countries, led to the introduction of virtual personal assistants. This software, installed on various devices such as mobile phones and smart speakers, allow their users to interact with these devices using their voice. As these technologies allow their users to interact with connected devices through the Internet, they will most likely become the main gateway to the Internet in a near future. Considering the great variety of tasks performed with connected devices, the legal questions regarding evidence generated by and collected from their use must now be asked. First, this master’s thesis will compare the normative frameworks of both Quebec and other jurisdictions in order to define, technologically and legally, the virtual personal assistants and the evidence they generate. In a second time, this thesis will focus on the admissibility and the probative value of the evidence garnered from virtual personal assistants, in the context of Quebec’s civilist tradition. The author focuses on the conditions of admissibility and on the designation of technological documents and of their characteristics, analyzing first and foremost the criteria of authenticity and integrity and the questions of proportionality. The author discusses exceptions to admissibility, especially the violation of a fundamental right and privilege considerations. Furthermore, the author discusses the probative value of technological evidence, proposing that the understanding of the underlying technology is a key factor in the determination of the probative value of any technological evidence. Finally, the author suggests that artificial intelligence creates a new category of technological evidence that might be calling for changes in the judicial principles and procedures of the province of Quebec.
Fournier-Gendron, Hugo. "Sécurité informationnelle des systèmes cyberphysiques et risques à la santé et sécurité : quelle responsabilité pour le fabricant ?" Thèse, 2017. http://hdl.handle.net/1866/21353.
Texto completo da fonte