Добірка наукової літератури з теми "Internet industriel des objets"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Internet industriel des objets".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Internet industriel des objets"
Meiller, Yannick. "La sécurité de l’information devrait être plus présente dans les programmes des écoles de management." Sécurité et stratégie 32, no. 4 (March 19, 2024): 12–16. http://dx.doi.org/10.3917/sestr.032.0012.
Повний текст джерелаPigenet, Michel, and Noelle Gerome. "Archives sensibles. Images et objets du monde industriel et ouvrier." Le Mouvement social, no. 184 (July 1998): 121. http://dx.doi.org/10.2307/3779467.
Повний текст джерелаPhilibert, Jean-Marc. "Erakor ou la lente consommation d'un capital collectif imaginaire." Anthropologie et Sociétés 18, no. 3 (September 10, 2003): 75–89. http://dx.doi.org/10.7202/015329ar.
Повний текст джерелаFarasat Rahimli, Sabuhi. "INTELLIGENT OPTIMIZATION SYSTEM FORMULATED ON INDUSTRIAL INTERNET PLATFORM." SCIENTIFIC WORK 71, no. 10 (October 23, 2021): 75–79. http://dx.doi.org/10.36719/2663-4619/71/75-79.
Повний текст джерелаSPITSYNA, L. YU, E. B. GRIBANOVA, I. A. LYZIN, and V. V. SPITSYN. "DIGITALIZATION OF RELATIONSHIPS WITH CUSTOMERS OF RUSSIAN INDUSTRIAL ENTERPRISES: TRENDS AND PATTERNS OF DEVELOPMENT." Herald of Omsk University. Series: Economics 20, no. 3 (2022): 88–98. http://dx.doi.org/10.24147/1812-3988.2022.20(3).88-98.
Повний текст джерелаArora, Jyoti, Pooja Kherwa, and Meena Tushir. "A comprehensive survey on the significance of industrial Internet of Things, energy management and big data analytics." Journal of Information and Optimization Sciences 45, no. 2 (2024): 247–56. http://dx.doi.org/10.47974/jios-1544.
Повний текст джерелаPrima, Wandynata, and Yo Ceng Giap. "Object Detection Radar Prototype with Ultrasonic Sensor Using Iot-Based Arduino." bit-Tech 3, no. 2 (April 18, 2021): 81–88. http://dx.doi.org/10.32877/bt.v3i2.187.
Повний текст джерелаPriya George, Anu, and X. Felix Joseph. "Designing a Portable Camera Image Acquisition System Operating Within an Indoor Wi-Fi Network and Optimized for A Robotic Vehicle." International Journal of Engineering & Technology 7, no. 3.27 (August 15, 2018): 132. http://dx.doi.org/10.14419/ijet.v7i3.27.17673.
Повний текст джерелаMadugula, Lavanya. "Applications of IoT in Manufacturing: Issues and Challenges." Journal of Advanced Research in Embedded System 8, no. 1&2 (July 29, 2021): 3–7. http://dx.doi.org/10.24321/2395.3802.202101.
Повний текст джерелаSandri, Eva. "Quelles utilisations des images de l’exposition sur les sites Internet de musées ? Congruence et incohérence entre objets et images numériques." Article cinq 7, no. 2 (May 7, 2015): 95–109. http://dx.doi.org/10.7202/1030252ar.
Повний текст джерелаДисертації з теми "Internet industriel des objets"
Benouakta, Amina. "Conception de systèmes antennaires pour applications de supervision et de localisation dans l'Internet des objets industriel." Electronic Thesis or Diss., Université Côte d'Azur, 2024. http://www.theses.fr/2024COAZ4011.
Повний текст джерелаThis thesis is part of the concept of the Internet of Things (IoT), object identification, and traceability in so-called complex environments through Ultra-Wide Band (UWB) technology known for its high temporal precision. The objective is to contribute to the advancement of real-time UWB-based localization systems through the design and optimization of UWB antennas that are reconfigurable, multi-standards, and multi-functions. Therefore, any localization system integrating the optimized antennas will have improved localization quality and new functionalities.The main contributions developed in this thesis involve enhancements to real-time localization systems (RTLS) based on UWB technology: design and fabrication of frequency reconfigurable UWB antennas; design and fabrication of a multi-standard localization electronic board (UWB and Long Range - LoRa); experimental study of RTLS systems incorporating the designed antennas and validation of the evolution of the localization in terms of extended reading ranges, detectability of objects without prior knowledge of their orientations, and improved location accuracy through the attenuation of multi-path signals
Brun-Laguna, Keoma. "Deterministic Networking for the Industrial IoT." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS157.
Повний текст джерелаThe Internet of Things (IoT) evolved from a connected toaster in 1990 to networks of hundreds of tiny devices used in industrial applications. Those “Things” usually are tiny electronic devices able to measure a physical value (temperature, humidity, etc.) and/or to actuate on the physical world (pump, valve, etc). Due to their cost and ease of deployment, battery-powered wireless IoT networks are rapidly being adopted. The promise of wireless communication is to offer wire-like connectivity. Major improvements have been made in that sense, but many challenges remain as industrial application have strong operational requirements. This section of the IoT application is called Industrial IoT (IIoT). The main IIoT requirement is reliability. Every bit of information that is transmitted in the network must not be lost. Current off-the-shelf solutions offer over 99.999% reliability. That is, for every 100k packets of information generated, less than one is lost. Then come latency and energy-efficiency requirements. As devices are battery-powered, they need to consume as little as possible to be able to operate during years. The next step for the IoT is to target time-critical applications. Industrial IoT technologies are now adopted by companies over the world, and are now a proven solution. Yet, challenges remain and some of the limits of the technologies are still not fully understood. In this work we address TSCH-based Wireless Sensor Networks and study their latency and lifetime limits under real-world conditions. We gathered 3M network statistics 32M sensor measurements on 11 datasets with a total of 170,037 mote hours in real-world and testbeds deployments. We assembled what we believed to be the largest dataset available to the networking community. Based on those datasets and on insights we learned from deploying networks in real-world conditions, we study the limits and trade-offs of TSCH-based Wireless Sensor Networks. We provide methods and tools to estimate the network performances of such networks in various scenarios. We believe we assembled the right tools for protocol designer to built deterministic networking to the Industrial IoT
Li, Dun. "Optimized blockchain deployment and application for trusted industrial internet of things." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAS016.
Повний текст джерелаThe continued advancement of the Industrial Internet of Things (IIoT) presents promising prospects and numerous opportunities for improving the operational frameworks of industrial systems. However, IIoT architectures face significant challenges, including centralized control, vulnerability to cyber attacks, privacy violations, and data accuracy issues.These challenges create significant obstacles in securing data, which is crucial for the growth of this technology. To address these issues, many researchers suggest integrating blockchain technology as a stable means to safeguard data within IIoT systems.Blockchain's features of distributed storage, decentralization, and immutability offer distinct advantages in data secure storage, identity verification, and access control. Despite these benefits, as IIoT applications diversify and data scales expand, the high resource demand of blockchain systems clashes with the limited resources of IIoT devices, leading to unresolved contradictions and persistent issues within this solution. Existing blockchain architectures still lack anonymous and efficient IIoT identity authentication, with complex encryption and decryption processes inducing excessive system overhead. To address these issues, the thesis builds on prior research to optimize blockchain performance, aiming to resolve the shortcomings and bottlenecks in current blockchain-based IIoT architectures regarding data security protection. Firstly, this thesis introduces a lightweight blockchain-enabled protocol designed for secure data storage in the dynamic IIoT environment. It incorporates bilinear mapping for system initialization, entity registration, and authentication technology to authenticate IIoT entities efficiently and securely, along with an off-chain data storage approach to ensure data integrity with reduced resource consumption.Furthermore, the thesis addresses the limitations of Hyperledger fabric systems in high availability scenarios by proposing Trie-Fabric, which enhances transaction processing through a Directed Acyclic Graph (DAG) based transaction sorting algorithm. This approach significantly reduces terminated transactions, optimizes conflict handling, and increases efficiency by more than 60% in its best case, according to comparative experimental results.To manage the increasingly sophisticated industrial processes and privacy-sensitive data generated by IIoT devices, the thesis proposes a smart contract-assisted access control scheme utilizing the Attribute-Based Access Control (ABAC) model.This scheme, supported by bloom filter components, demonstrates controlled contract execution times, stable system throughput, and a rapid consensus process in real-world simulations, making it highly capable of handling high-throughput and effective consensus even under large-scale request scenarios.Lastly, the thesis introduces the Zero-Knowledge Proof (ZKP) algorithm, which integrates a non-interactive zero-knowledge proof protocol with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to enhance security and efficiency in IIoT content distribution. Combined with the Distributed Publish-Subscribe IIoT (DPS-IIoT) system using Hyperledger fabric, it significantly improves bandwidth efficiency and overall throughput in IIoT environments.Through comprehensive security performance evaluations and experimental results, this research confirms the protocols' effectiveness in minimizing system overhead, improving storage reliability, and enhancing overall IIoT data management and application security. This thesis provides an in-depth examination of advanced data management protocols and systems for the IIoT, which are crucial for advancing the manufacturing sector. Consequently, this work makes a significant contribution to the field of IIoT data security, offering scalable and robust solutions for current and future industrial systems
Vallois, Valentin. "Securing industrial internet of things architectures through Blockchain." Electronic Thesis or Diss., Université Paris Cité, 2022. http://www.theses.fr/2022UNIP7335.
Повний текст джерелаIt's been ten years since blockchain technology was created. This amalgam of cryptography and peer-to-peer application brings many innovations and securities services beyond financial services to regular information systems and offers new use cases for distributed applications in industrial context. Meanwhile, IoT became prominent in the industry as the future industrial revolution, bringing new applications but paving the way for security vulnerabilities. During this thesis, we explored the main issues facing the Internet of Things. We studied how IIoT platform providers address these challenges by comparing the measures they have implemented with the ITU recommendations using the Analytic Hierarchical Process (AHP). This study allowed us to identify areas of improvement and use cases for the blockchain. Identity management is a recurring problem in the IIoT literature, and we propose an identity management approach for distributed systems assisted by blockchain to guarantee the uniqueness of identities and the integrity of the directory. From this work, we have developed a blockchain-secured firmware update distribution and validation system using the machine learning algorithm Locality Sensitive Hashing (LSH)
Haj-Hassan, Ali. "Securing communication protocols for the Internet of Things." Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0002.
Повний текст джерелаThe fusion of IP-enabled networks with low-power wireless technology has given birth tothe Industrial Internet of Things (IIoT). Due the large scale and dynamic nature of IIoT, thesecurity of such network is of paramount importance. One of the most critical attacks arethose conducted during the joining phase of new nodes to an IIoT network. In this thesis, we focus our study on securing the joining phase of such networks.Joining phases in IoT rely on mutual authentication methods based on a pre-shared key (PSK) shared between the network coordinator and the joining node. Standardization often lacks clear PSK sharing guidelines, which in large-scale and dynamic networks like IIoT makes pre-configuring each device with a unique key impractical. To address these concerns, this thesis introduces an autonomous mutual authentication and key establishment protocol for IIoT networks. In this solution, the network coordinator first authenticates the joining node via a certificate, and reciprocally, the joining node authenticates the network coordinator using a novel and lightweight consensus mechanism based on Shamir Secret Sharing. Once this mutual authentication is accomplished, a key is established between the network coordinator and the joining node over a public channel. Our solution was integrated into the 6TiSCH framework, ensuring robust security with high authentication success, even when dealing with malicious nodes. Additionally, it proved efficient in terms of communication, latency, and energy usage across various network scenarios, even on resource-constrained devices.Moreover, during the IoT network joining process, proxy nodes play a pivotal role in forwarding Join Requests and Join Responses between the joining node and the network coordinator. Securing this phase is vital, as malicious proxy nodes can disturb new node joins or redirect them another entity impersonating the coordinator. Therefore, we present a robust system focused on identifying malicious proxy nodes during the joining phase. Centered around the coordinator, this system maintains a log table tracking each node’s participation as a proxy node. Post each joining phase, the coordinator receives an End-to-End encrypted packet from the joining node, detailing any encounters with malicious proxy nodes. This information is utilized to calculate the number of legitimate proxy node involvements for each node. The detection system utilizes these metrics, in conjunction with adjustable parameters, to categorize nodes as either malicious or trustworthy. Additionally, our solution accounts for potential attacks on the detection process, originating from both proxy nodes and joining nodes
Amaro, da Cruz Mauro. "An enhanced multi-protocol middleware solution for Internet of things." Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.
Повний текст джерелаIn Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
Smache, Meriem. "La sécurité des réseaux déterministes de l’Internet des objets industriels (IIoT)." Thesis, Lyon, 2019. http://www.theses.fr/2019LYSEM033.
Повний текст джерелаTime synchronization is a crucial requirement for the IEEE802.15.4e based Industrial Internet of Things (IIoT). It is provided by the application of the Time-Slotted Channel-Hopping (TSCH) mode of the IEEE802.15.4e. TSCH synchronization allows reaching low-power and high-reliability wireless networking. However, TSCH synchronization resources are an evident target for cyber-attacks. They can be manipulated by attackers to paralyze the whole network communications. In this thesis, we aim to provide a vulnerability analysis of the TSCH asset synchronization. We propose novel detection metrics based on the internal process of the TSCH state machine of every node without requiring any additional communications or capture or analysis of the packet traces. Then, we design and implement novel self-detection and self-defence techniques embedded in every node to take into account the intelligence and learning ability of the attacker, the legitimate node and the real-time industrial network interactions. The experiment results show that the proposed mechanisms can protect against synchronization attacks
Thubert, Pascal. "Converging over deterministic networks for an Industrial Internet." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2017. http://www.theses.fr/2017IMTA0011/document.
Повний текст джерелаBased on time, resource reservation, and policy enforcement by distributed shapers, Deterministic Networking provides the capability to carry specified unicast or multicast data streams for real-time applications with extremely low data loss rates and bounded latency, so as to support time-sensitive and mission-critical applications on a converged enterprise infrastructure.As of today, deterministic Operational Technology (OT) networks are purpose-built, mostly proprietary, typically using serial point-to-point wires, and operated as physically separate networks, which multiplies the complexity of the physical layout and the operational (OPEX) and capital (CAPEX) expenditures, while preventing the agile reuse of the compute and network resources.Bringing determinism in Information Technology (IT) networks will enable the emulation of those legacy serial wires over IT fabrics and the convergence of mission-specific OT networks onto IP. The IT/OT convergence onto Deterministic Networks will in turn enable new process optimization by introducing IT capabilities, such as the Big Data and the network functions virtualization (NFV), improving OT processes while further reducing the associated OPEX.Deterministic Networking Solutions and application use-cases require capabilities of the converged network that is beyond existing QOS mechanisms.Key attributes of Deterministic Networking are: - Time synchronization on all the nodes, often including source and destination - The centralized computation of network-wide deterministic paths - New traffic shapers within and at the edge to protect the network- Hardware for scheduled access to the media.Through multiple papers, standard contribution and Intellectual Property publication, the presented work pushes the limits of wireless industrial standards by providing: 1. Complex Track computation based on a novel ARC technology 2. Complex Track signaling and traceability, extending the IETF BIER-TE technology 3. Replication, Retry and Duplicate Elimination along the Track 4. Scheduled runtime enabling highly reliable delivery within bounded time 5. Mix of IPv6 best effort traffic and deterministic flows within a shared 6TiSCH mesh structureThis manuscript presents enhancements to existing low power wireless networks (LoWPAN) such as Zigbee, WirelessHART¿and ISA100.11a to provide those new benefits to wireless OT networks. It was implemented on open-source software and hardware, and evaluated against classical IEEE Std. 802.15.4 and 802.15.4 TSCH radio meshes. This manuscript presents and discusses the experimental results; the experiments show that the proposed technology can guarantee continuous high levels of timely delivery in the face of adverse events such as device loss and transient radio link down
Hossayni, Hicham. "Enabling industrial maintenance knowledge sharing by using knowledge graphs." Electronic Thesis or Diss., Institut polytechnique de Paris, 2021. http://www.theses.fr/2021IPPAS017.
Повний текст джерелаFormerly considered as part of general enterprise costs, industrial maintenance has become critical for business continuity and a real source of data. Despite the heavy investments made by companies in smart manufacturing, traditional maintenance practices still dominate the industrial landscape. In this Ph.D., we investigate maintenance knowledge sharing as a potential solution that can invert the trend and enhance the maintenance activity to comply with the Industry 4.0 spirit. We specifically consider the knowledge graphs as an enabler to share the maintenance knowledge among the different industry players.In the first contribution of this thesis, we conducted a field study through a campaign of interviews with different experts with different profiles and from different industry domains. This allowed us to test the hypothesis of improving the maintenance activity via knowledge sharing which is quite a novel concept in many industries. The results of this activity clearly show a real interest in our approach and reveal the different requirements and challenges that need to be addressed.The second contribution is the concept, design, and prototype of "SemKoRe" which is a vendor-agnostic solution relying on Semantic Web technologies to share the maintenance knowledge. It gathers all machine failure-related data in the knowledge graph and shares it among all connected customers to easily solve future failures of the same type. A flexible architecture was proposed to cover the varied needs of the different customers. SemKoRe received approval of several Schneider clients located in several countries and from various segments.In the third contribution, we designed and implemented a novel solution for the automatic detection of sensitive data in maintenance reports. In fact, maintenance reports may contain some confidential data that can compromise or negatively impact the company's activity if revealed. This feature came up as the make or break point for SemKoRe for the interviewed domain experts. It allows avoiding sensitive data disclosure during the knowledge-sharing activity. In this contribution, we relied on semantic web and natural language processing techniques to develop custom models for sensitive data detection. The construction and training of such models require a considerable amount of data. Therefore, we implemented several services for collaborative data collection, text annotation, and corpus construction. Also, an architecture and a simplified workflow were proposed for the generation and deployment of customizable sensitive data detection models on edge gateways.In addition to these contributions, we worked on different peripheral features with a strong value for the SemKoRe project, and that has resulted in different patents. For instance, we prototyped and patented a novel method to query time series data using semantic criteria. It combines the use of ontologies and time-series databases to offer a useful set of querying capabilities even on resource-constrained edge gateways. We also designed a novel tool that helps software developers to easily interact with knowledge graphs with little or no knowledge of semantic web technologies. This solution has been patented and turns out to be useful for other ontology-based projects
Basselot, Vivien. "Contribution à la modélisation des chaînes informationnelles et des processus décisionnels associés à un produit "intelligent" : application à un connecteur de test industriel." Thesis, Valenciennes, Université Polytechnique Hauts-de-France, 2019. http://www.theses.fr/2019UPHF0009.
Повний текст джерелаIn recent years, “smart products” have been introduced in many areas such as industry, health and transportation systems. These products are sources of information during their use phases. Collecting, processing this information is a definite advantage to aid the various stakeholders involved in the product lifecycle to improve the value chain. The large number of stakeholders and the diversity of their needs make it difficult to implement the information chains between the product and the stakeholders in the use phase (as well as the generation of information flows towards the upstream and downstream phases of the life cycle). Based on the concepts developed by the Closed Loop Lifecycle Management (CL2M) community, this thesis proposes a model of generic architecture for modeling the information chains and decision-making processes associated with a product during its use phase. The proposed model relies on secondary functions associated with the product, on holonic concepts, on product context (i.e. environment, task and user(s)) and on decision-making processes. This last point is inspired on Rasmussen's typology to characterize different cognitive levels. A methodological guide is also proposed helping to transform the model into operational architecture implementing information chains. The proposed architecture is implemented and validated as part of a POC (Proof of Concept) platform. Both the model and the guide are evaluated through scenarios representative of the use of a "smart" industrial test connector in the automotive field
Книги з теми "Internet industriel des objets"
Laziz, Hamani, and Palasse-Leroux Elodie, eds. Objets cultes du mobilier industriel. Paris: Éditions de La Martinière, 2012.
Знайти повний текст джерелаGrondin, Pierrette. Cyberculture et objets de design industriel. [Sainte-Foy, Québec]: Presses de l'Université Laval, 2001.
Знайти повний текст джерелаFrançois, Chéry, ed. Histoire des objets: Chronique du design industriel. Paris: Hazan, 2013.
Знайти повний текст джерелаNoëlle, Gérome, ed. Archives sensibles: Images et objets du monde industriel et ouvrier. Cachan: Editions de l'ENS-Cachan, 1995.
Знайти повний текст джерелаPiette-Coudol, Thierry. Les objets connectés: Sécurité juridique et technique. Paris: Lexis Nexis, 2015.
Знайти повний текст джерелаZbinden, Geoffrey. L'internet des objets: Une réponse au réchauffement climatique. Paris: Cygne, 2010.
Знайти повний текст джерелаIndustrial Internet of Things: Cybermanufacturing Systems. Springer, 2016.
Знайти повний текст джерелаIsaacs, Dan. Building Industrial Digital Twins: Design, Develop, and Deploy Digital Twin Solutions for Real-World Industries Using Azure Digital Twins. Packt Publishing, Limited, 2021.
Знайти повний текст джерелаBuilding Industrial Digital Twins: Design, Develop, and Deploy Digital Twin Solutions for Real-World Industries Using Azure Digital Twin. Packt Publishing, Limited, 2021.
Знайти повний текст джерелаInternet of Things in Business Transformation: Developing an Engineering and Business Strategy for Industry 5. 0. Wiley & Sons, Incorporated, John, 2020.
Знайти повний текст джерелаЧастини книг з теми "Internet industriel des objets"
Haupert, Jens, Xenia Klinge, and Anselm Blocher. "CPS-Based Manufacturing with Semantic Object Memories and Service Orchestration for Industrie 4.0 Applications." In Industrial Internet of Things, 203–29. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-42559-7_8.
Повний текст джерелаDuan, Ying, Wenfeng Li, Xiuwen Fu, and Lin Yang. "Reliable Data Transmission Method for Hybrid Industrial Network Based on Mobile Object." In Internet and Distributed Computing Systems, 466–76. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-45940-0_43.
Повний текст джерелаGautam, Aayushi, Santosh Kumar, and Swaran Singh. "Recent Advances on Deep Learning Based Thermal Infrared Object Tracking in Videos." In Integration of AI-Based Manufacturing and Industrial Engineering Systems with the Internet of Things, 89–109. Boca Raton: CRC Press, 2023. http://dx.doi.org/10.1201/9781003383505-6.
Повний текст джерелаFleischer, Torsten, Ayako Taniguchi, Jens Schippl, Yukari Yamasaki, Kosuke Tanaka, and Satoshi Nakao. "Social Acceptance of CAD in Japan and Germany: Conceptual Issues and Empirical Insights." In Acceptance and Diffusion of Connected and Automated Driving in Japan and Germany, 117–61. Cham: Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-59876-0_5.
Повний текст джерелаInnerhofer, Florian, Thomas Reuter, and Conny Coburger. "More Than Just Documenting the Past: 15 Years of 3D Scanning at the Archaeological Heritage Office of Saxony." In The 3 Dimensions of Digitalised Archaeology, 27–46. Cham: Springer International Publishing, 2024. http://dx.doi.org/10.1007/978-3-031-53032-6_3.
Повний текст джерелаDeNardis, Laura. "The Cyber-Physical Disruption." In The Internet in Everything, 25–56. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300233070.003.0002.
Повний текст джерелаBenghozi, Pierre-Jean, Sylvain Bureau, and Françoise Massit-Folléa. "Defining the Internet of Things." In L’Internet des objets, 91–99. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.97.
Повний текст джерелаBenghozi, Pierre-Jean, Sylvain Bureau, and Françoise Massit-Folléa. "Technical evolution of the Internet of Things." In L’Internet des objets, 111–20. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.99.
Повний текст джерелаBenghozi, Pierre-Jean, Sylvain Bureau, and Françoise Massit-Folléa. "The prominence and challenges of the Internet of Things." In L’Internet des objets, 101–10. Éditions de la Maison des sciences de l’homme, 2009. http://dx.doi.org/10.4000/books.editionsmsh.98.
Повний текст джерелаTiwari, Dr Ashish, Vidhu Chaudhary, Ashutosh Gupta, and Sarthak Shukla. "CLOUD COMPUTING, INTERNET OF THINGS, AND ITS FUTURE PERSPECTIVES." In Futuristic Trends in Network & Communication Technologies Volume 3 Book 2, 315–24. Iterative International Publisher, Selfypage Developers Pvt Ltd, 2024. http://dx.doi.org/10.58532/v3bgnc2p8ch1.
Повний текст джерелаТези доповідей конференцій з теми "Internet industriel des objets"
Zweig, David A., and C. J. Morgan. "Photon-limited Scene Matching Using Histogram Analysis." In Quantum-Limited Imaging and Image Processing. Washington, D.C.: Optica Publishing Group, 1986. http://dx.doi.org/10.1364/qlip.1986.tud3.
Повний текст джерелаBalantič, Zvone, and Branislav Šmitek. "Povezava človeških faktorjev z digitalno transformacijo v pametnih hišah." In Organizations at Innovation and Digital Transformation Roundabout: Conference Proceedings. University of Maribor Press, 2020. http://dx.doi.org/10.18690/978-961-286-388-3.4.
Повний текст джерелаArisoy, Erhan Batuhan, Guannan Ren, Erva Ulu, Nurcan Gecer Ulu, and Suraj Musuvathy. "A Data-Driven Approach to Predict Hand Positions for Two-Hand Grasps of Industrial Objects." In ASME 2016 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2016. http://dx.doi.org/10.1115/detc2016-60095.
Повний текст джерелаKumar, Pawan, Uma Yadav, Namrata Bansal, and Javalkar Dinesh Kumar. "Navigating Challenges in Industrial Automation with Internet of Things: Technical Solutions." In International Conference on Cutting-Edge Developments in Engineering Technology and Science. ICCDETS, 2024. http://dx.doi.org/10.62919/uieu2362.
Повний текст джерелаTew, Yiqi, and Yoon Ket Lee. "A Study on Multi-View Camera Casting Framework using Internet of Things Technology." In International Conference on Digital Transformation and Applications (ICDXA 2020). Tunku Abdul Rahman University College, 2020. http://dx.doi.org/10.56453/icdxa.2020.1021.
Повний текст джерелаCapurso, Giovanna, Michele Ruta, and Eugenio Di Sciascio. "Object (B)logging: a Decentralized Cognitive Paradigm for the Industrial Internet of Things." In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2019. http://dx.doi.org/10.1109/smc.2019.8914289.
Повний текст джерелаEdwards, Jeff, and Rahmat Shoureshi. "Recognition of Multiple Objects Using Geometric Hashing Techniques." In ASME 1996 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 1996. http://dx.doi.org/10.1115/imece1996-0415.
Повний текст джерелаXu, Zhengya, Hong Ren Wu, and Xinghuo Yu. "Interest points based object tracking with controlled cameras." In 2009 IEEE International Conference on Industrial Technology - (ICIT). IEEE, 2009. http://dx.doi.org/10.1109/icit.2009.4939565.
Повний текст джерелаNeves, Diogo Telmo, Mario Santos, and Mario Pinto. "ReActOR: A middleware as a service to interact with objects remotely." In 2015 IEEE International Conference on Industrial Technology (ICIT). IEEE, 2015. http://dx.doi.org/10.1109/icit.2015.7125456.
Повний текст джерелаHeierle, Victor Medina, Leire Varona Fontanal, and Víctor Fernández-Carbajales Cañete. "Improving gesture recognition with object tracking and image stabilization to communicate with industrial Cobots." In 2022 16th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS). IEEE, 2022. http://dx.doi.org/10.1109/sitis57111.2022.00024.
Повний текст джерелаЗвіти організацій з теми "Internet industriel des objets"
Porcel Magnusson, Cristina. Unsettled Topics Concerning Coating Detection by LiDAR in Autonomous Vehicles. SAE International, January 2021. http://dx.doi.org/10.4271/epr2021002.
Повний текст джерелаMalinowski, Owen. PR-335-203810-R01 Review of Xray Computed Tomography Performance. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), February 2021. http://dx.doi.org/10.55274/r0012020.
Повний текст джерелаAubry, Philippe, Nicolas Boileau, Marie Briandy, Marie-Christine Chauvat, Sandrine Conin, and Éric Min-Tung. Rapport sur le chantier IdRef en Normandie. Normandie Université, December 2023. http://dx.doi.org/10.51203/rapport.nu.000003.
Повний текст джерелаTao, Yang, Victor Alchanatis, and Yud-Ren Chen. X-ray and stereo imaging method for sensitive detection of bone fragments and hazardous materials in de-boned poultry fillets. United States Department of Agriculture, January 2006. http://dx.doi.org/10.32747/2006.7695872.bard.
Повний текст джерела