Дисертації з теми "Social Internet of Things (Social IoT)"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Social Internet of Things (Social IoT).

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 дисертацій для дослідження на тему "Social Internet of Things (Social IoT)".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

NITTI, MICHELE. "Managing the Internet of Things based on its Social Structure." Doctoral thesis, Università degli Studi di Cagliari, 2014. http://hdl.handle.net/11584/266422.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Society is moving towards an “always connected” paradigm, where the Internet user is shifting from persons to things, leading to the so called Internet of Things (IoT) scenario. The IoT vision integrates a large number of technologies and foresees to embody a variety of smart objects around us (such as sensors, actuators, smartphones, RFID, etc.) that, through unique addressing schemes and standard communication protocols, are able to interact with each Others and cooperate with their neighbors to reach common goals [2, 3]. IoT is a hot research topic, as demonstrated by the increasing attention and the large worldwide investments devoted to it. It is believed that the IoT will be composed of trillions of elements interacting in an extremely heterogeneous way in terms of requirements, behavior and capabilities; according to [4], by 2015 the RIFD devices alone will reach hundreds of billions. Unquestionably, the IoT will pervade every aspect of our world and will have a huge impact in our everyday life: indeed, as stated by the US National Intelligence Council (NIC) [5], “by 2025 Internet nodes may reside in everyday things − food packages, furniture, paper documents, and more”. Then, communications will not only involve persons but also things thus bringing about the IoT environment in which objects will have virtual counterparts on the Internet. Such virtual entities will produce and consume services, collaborate toward common goals and should be integrated with all the other services. One of the biggest challenges that the research community is facing right now is to be able to organize such an ocean of devices so that the discovery of objects and services is performed efficiently and in a scalable way. Recently, several attempts have been made to apply concepts of social networking to the IoT. There are scientific evidences that a large number of individuals tied in a social network can provide far more accurate answers to complex problems than a single individual (or a small group of – even knowledgeable – individuals) [1]. The exploitation of such a principle, applied to smart objects, has been widely investigated in Internet-related researches. Indeed, several schemes have been proposed that use social networks to search Internet resources, to route traffic, or to select effective policies for content distribution. The idea that the convergence of the “Internet of Things” and the “Social Networks” worlds, which up to now were mostly kept separate by both scientific and industrial communities, is possible or even advisable is gaining momentum very quickly. This is due to the growing awareness that a “Social Internet of Things” (SIoT) paradigm carries with it many desirable implications in a future world populated by objects permeating the everyday life of human beings. Therefore, the goal of this thesis is to define a possible architecture for the SIoT, which includes the functionalities required to integrate things into a social network, and the needed strategies to help things to create their relationships in such a way that the resulting social network is navigable. Moreover, it focuses on the trustworthiness management, so that interaction among objects that are friends can be done in a more reliable way and proposes a possible implementation of a SIoT network. Since this thesis covers several aspects of the Social internet of Things, I will present the state of the art related to the specific research activities at the beginning of every Chapter. The rest of the thesis is structured as follows. In Chapter 1, I identify appropriate policies for the establishment and the management of social relationships between objects, describe a possible architecture for the IoT that includes the functionalities required to integrate things into a social network and analyze the characteristics of the SIoT network structure by means of simulations. Chapter 2 addresses the problem of the objects to manage a large number of friends, by analyzing possible strategies to drive the objects to select the appropriate links for the benefit of overall network navigability and to speed up the search of the services. In Chapter 3, I focus on the problem of understanding how the information provided by members of the social IoT has to be processed so as to build a reliable system on the basis of the behavior of the objects and define two models for trustworthiness management starting from the solutions proposed for P2P and social networks. Chapter 4 presents an implementation of a SIoT platform and its major functionalities: how to register a new social object to the platform, how the system manages the creation of new relationships, and how the devices create groups of members with similar characteristics. Finally, in Chapter 5, conclusions will be drawn regarding the effectiveness of the proposed Introduction 3 algorithms, and some possible future works will be sketched
2

Ebrahiem, Waleed, and Naveed Arif. "Internet of Things : How vendors can use IoT to achieve value creation." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-144582.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The IoT (Internet of Things) is developing rapidly, as a result of that, the number of connected devices in Sweden has doubled every year. According to big companies like Ericsson, the estimated number of connected devices worldwide will be 50 billion in 2020. IoT, by itself, may be a relatively simple concept of connected devices and machines, but its implications are profound. For companies in Sweden which offer a broad range of non-connected tools and products, it is becoming increasingly important to adapt their products to IoT; adherence to IoT will warrant new developments which offer value-added services such as monitoring and remote control, etc. The primary research method employed for this thesis is a case study at a vendor company who today offers their customers non-connected tools. To be able to demonstrate the concept of IoT enhanced tools we create a conceptual framework and a prototype, which we present to our interviewees and use as a starting point for qualitative interviews. In this thesis, we want to know how vendors could benefit themselves by the use of IoT in their businesses. We formulated some research questions, being, based on a vendor’s perspective: why do they (vendors) need connected products; how can such products be made marketable to the customer; and what are the predicted benefits of IoT-connected products for the customers? The case study brings to light some issues dealing with the business model, service providing, data display and data security which every company should take into consideration before implementing IoT.
3

Johansson, Fredrik, and Martin Göthe. "Internet of Things, bekvämt, men säkert? : En studie kring säkerhetsaspekter inom IoT." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-135063.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The new technological phenomenon Internet of Things (IoT) is steadily growing and has become more incorporated into our daily lives. The technology can be found in a variety of applications in today's society and has helped to simplify and streamline tasks and processes. Analysts estimate that the market for IoT could potentially be worth 11 billion dollars by 2025. Large technology corporations are spending a vast amount of money to promote their IoT products, but we are also seeing companies which normally are not associated with IT making an entrance to make their products connected. During the fall of 2016 media reported about a big security breach within the IoT that affected security cameras and forced them to commit denial of service attacks. This event led us to take a closer look at the IoT and the security around the products. The aim of this study is to investigate how developers and security experts working with IoT perceive the current state of security and the possible threats and risks we face when using the technology. For this study we have used a qualitative approach with semi-structured interviews. A total of eight interviews were conducted equally divided between developers and security experts. Our results show that a common denominator between the respondents' answers was that the lack of standardization and platforms for IoT-applications is a problem. However, a unified security solution is currently unattainable due to the vast number of platforms present in IoT today. Therefore, the use of a standard or platform does not guarantee security. Also, with the increasing popularity of IoT, products from developers without the proper knowledge is becoming a serious security concern for the IoT.
4

Laya, Andrés. "The Internet of Things in Health, Social Care, and Wellbeing." Doctoral thesis, KTH, Radio Systems Laboratory (RS Lab), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-212548.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things (IoT) enables opportunities to remotely sense and control objects via communication networks. We study services based on connected devices and the collaboration they generate between the ICT and the Health, Social Care and Wellbeing (HSCWB) industries. In HSCWB, IoT can support a change from episodic treatments of illness to preventive care and wellbeing solutions. The IoT can be a supporter in cost efficient and high quality health care. The objective is to achieve healthier life years and more efficiency in health and social care. Even if the potential of IoT in HSCWB has been proven in pilot projects and small-scale solutions, the benefits and opportunities for many actors are still unclear. There is a research gap in studying the roles and business opportunities for market-driven technology-based solutions enabled by connected devices. The research approach separates technological and business domains. On the technology side, the focus is on advances in connectivity for IoT. We present the technical details on a limitation to support IoT devices in cellular networks. We quantify the limitations in the Random Access Channel of the LTE air interface to support IoT devices. Moreover, we propose the adaptation of an access mechanism to enable massive number of simultaneous access attempt in cellular networks. On the business side, we identify and present how the conditions of the health and social care structure in Sweden affect the establishment of IoT solutions in HSCWB. We then show how these conditions have generated three distinctive development patterns—to innovate within the public sector, to develop solutions in the private care sector, or to target the wellbeing sector to avoid regulatory setbacks. Based on these patterns, we look closer into study cases to show how business opportunities have been addressed from a business network perspective. When deploying an IoT service, not all critical challenges can be appreciated at a single firm level. Therefore, we rely on a network-level business model framework to analyze emerging IoT services in HSCWB. The findings suggest that IoT components can improve an existing service by automating internal working processes, or they can enable new value propositions and convenience to end users. In general terms, the collaboration can be used (i) to improve the efficiency of existing services in health and social care without an original intention to change the service offering, or (ii) to create novelty and differentiation, without affecting the internal logics of existing HSCWB services.

QC 20180828


IoT Ecosystems (VINNOVA)
COIN-SWEAT
MTC2020
M2MRISE
5

Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024/document.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Récemment, l'intégration entre les environnements informatiques et de réseautage a été largement promu pour fournir des services intelligents à des utilisateurs finaux ainsi que l'utilisation efficace des ressources. Cette convergence a ouvert la voie à l'émergence de l'internet des objets (IdO). Le paradigme de l'IdO repose principalement sur la fabrication d'objets, appelés les choses, disparaître et se tissent dans le tissu de notre vie de tous les jours pour nous soutenir dans l'accomplissement des activités quotidiennes. L'évolutivité et l'hétérogénéité sont parmi les principaux défis qui entravent la réalisation à grande échelle de services de l'IdO dans la vie quotidienne des utilisateurs. Afin de relever les défis de l'IdO, un nouveau volet de recherche est venu en avant dans la littérature comme une classe paradigmatique des Cyber-physiques systèmes sociaux (CSPR), qui est connu comme l'Internet social des choses (Siot). Le SIOT se fonde sur la notion soulignée par phénomène petite-monde où la structure sociale permettant relation sociale fondée sur la confiance entre les personnes et les objets, d'une manière qui ressemble à des services de réseaux sociaux traditionnels (SNS) est suggérée de relever les défis de l'IdO. Cependant, depuis SIOT hérite des caractéristiques de différents informatiques et de réseautage environnements (par exemple, l'IdO et SNS) cela, en fait, augmente la quantité et la variété des données contextuelles qui doit être manipulé pour Adaptive fourniture de services dans Siot, qui agit comme le principal défi adressé dans cette thèse. Autrement dit, dans cette thèse, nous proposons la notion de contexte cognitif lorsque, dans certaine situation spatio-temporelle, le raisonnement sur les aspects objectifs du cadre, ce qui représente l'environnement physique, avec le contexte subjective, qui représente les aspects comportementaux et sociaux, est considéré comme l'amélioration des services SIOT intelligence et la capacité d'adaptation aux besoins conjoncturels des utilisateurs. Nous envisageons technologies du Web sémantique pour déployer notre contexte cognitif proposé dans deux domaines d'application; sensible au contexte recommandation des tâches quotidiennes dans les maisons intelligentes et structure sociale dépendant de la situation des choses. Un prototype de preuve de concept a été développé pour chaque domaine d'application, dans le but de démontrer l'intégration harmonieuse des objets sur le Web pour la réalisation de certaines applications. Nos résultats empiriques montrent un niveau de service amélioré l'adaptabilité et la complexité en temps de fonctionner lors de l'application de notre contexte cognitif suggéré
The paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
6

Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Récemment, l'intégration entre les environnements informatiques et de réseautage a été largement promu pour fournir des services intelligents à des utilisateurs finaux ainsi que l'utilisation efficace des ressources. Cette convergence a ouvert la voie à l'émergence de l'internet des objets (IdO). Le paradigme de l'IdO repose principalement sur la fabrication d'objets, appelés les choses, disparaître et se tissent dans le tissu de notre vie de tous les jours pour nous soutenir dans l'accomplissement des activités quotidiennes. L'évolutivité et l'hétérogénéité sont parmi les principaux défis qui entravent la réalisation à grande échelle de services de l'IdO dans la vie quotidienne des utilisateurs. Afin de relever les défis de l'IdO, un nouveau volet de recherche est venu en avant dans la littérature comme une classe paradigmatique des Cyber-physiques systèmes sociaux (CSPR), qui est connu comme l'Internet social des choses (Siot). Le SIOT se fonde sur la notion soulignée par phénomène petite-monde où la structure sociale permettant relation sociale fondée sur la confiance entre les personnes et les objets, d'une manière qui ressemble à des services de réseaux sociaux traditionnels (SNS) est suggérée de relever les défis de l'IdO. Cependant, depuis SIOT hérite des caractéristiques de différents informatiques et de réseautage environnements (par exemple, l'IdO et SNS) cela, en fait, augmente la quantité et la variété des données contextuelles qui doit être manipulé pour Adaptive fourniture de services dans Siot, qui agit comme le principal défi adressé dans cette thèse. Autrement dit, dans cette thèse, nous proposons la notion de contexte cognitif lorsque, dans certaine situation spatio-temporelle, le raisonnement sur les aspects objectifs du cadre, ce qui représente l'environnement physique, avec le contexte subjective, qui représente les aspects comportementaux et sociaux, est considéré comme l'amélioration des services SIOT intelligence et la capacité d'adaptation aux besoins conjoncturels des utilisateurs. Nous envisageons technologies du Web sémantique pour déployer notre contexte cognitif proposé dans deux domaines d'application; sensible au contexte recommandation des tâches quotidiennes dans les maisons intelligentes et structure sociale dépendant de la situation des choses. Un prototype de preuve de concept a été développé pour chaque domaine d'application, dans le but de démontrer l'intégration harmonieuse des objets sur le Web pour la réalisation de certaines applications. Nos résultats empiriques montrent un niveau de service amélioré l'adaptabilité et la complexité en temps de fonctionner lors de l'application de notre contexte cognitif suggéré
The paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
7

Åkerlund, Mathilda. "IoT on Twitter : A Mixed Methods Study." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-149232.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Lundgren, Emil, and Markus Karmehag. "SAMBANDET MELLAN AUTONOMI OCH IoT-LÖSNINGAR I EN LINJEORGANISATION." Thesis, Umeå universitet, Institutionen för informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-173342.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The 4th phase of the industrial revolution is focused on the relationship between the humans and the machines and how they can collaborate. We are going to look deeper into the relationship between autonomy and IoT-based solutions in a line organization with the help of a case study. In this case study, we discovered that the industry and their workers will benefit from using IoT-solutions to maintain more competitiveness to the market. With the use of IoT- based solutions such as a digital Dashboard, they get more reliable information and better ways of communication within the organization. Our study emphasizes the necessity of improving the autonomy within an industrial workplace. The personnel in an organization will be able to use IoTin a way to get more creative, gain more responsibility, keep a higher level of quality and make the work procedures more efficient.
9

Davids, Natheer. "The Privacy Paradox: Factors influencing information disclosure in the use of the Internet of Things (IoT) in South Africa." Master's thesis, Faculty of Commerce, 2021. http://hdl.handle.net/11427/32636.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things (IoT) has been acknowledged as one of the most innovative forms of technology since the computer, because of the influence it can have on multiple sectors of physical and virtual environments. The growth of IoT is expected to continue, by 2020 the number of connected devices is estimated to reach 50 billion. Recent developments in IoT provide an unprecedented opportunity for personalised services and other benefits. To exploit these potential benefits as best as possible, individuals are willing to provide their personal information despite potential privacy breaches. Therefore, this paper examines factors that influence the willingness to disclose personal information in the use of IoT in South Africa (SA) with the use of the privacy calculus as the theoretical underpinnings of this research. The privacy calculus accentuates that a risk-benefit trade off occurs when an individual decides to disclose their personal information, however, it is assumed that there are more factors than perceived risks and perceived benefits that influence information disclosure. After analysing previous literature, this study identified the following factors; information sensitivity, privacy concerns, social influence, perceived benefits, (perceived) privacy risks and privacy knowledge as possible key tenants in relation to willingness to disclose personal information. This research took on an objective ontological view, with the underlying epistemological stance being positivistic. The research incorporated a deductive approach, employing the use of a conceptual model which was constructed from a combination of studies orientated around privacy, the privacy calculus and the privacy paradox. Data for this research was collected using the quantitative research approach, through the use of an anonymous online questionnaire, where the targeted population was narrowed down to the general public residing within SA that make use of IoT devices and/or services. Data was collected using Qualtrics and analysed using SmartPLS 3. SmartPLS 3 was used to test for correlations between the factors which influence information disclosure in the use of IoT by utilising the complete bootstrapping method. A key finding was that the privacy paradox is apparent within SA, where individuals pursue enjoyment and predominantly use IoT for leisure purposes, while individuals are more likely to adopt self-withdrawal tendencies when faced with heightened privacy concerns or potential risks.
10

Masmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social." Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
L'IoT social est un nouveau paradigme qui améliore la navigabilité des réseaux IoT et stimule la découverte de services en intégrant les contextes sociaux. Néanmoins, ce paradigme est confronté à plusieurs défis qui réduisent la qualité de ses performances. La confiance, en particulier les attaques de confiance, est l'un des défis les plus importants. Certains utilisateurs adoptent des comportements malveillants et lancent des attaques pour propager des services malveillants. Un mécanisme de gestion de la confiance est devenu une exigence majeure dans l'IoT social pour prévenir ces attaques en temps réel et garantir des expériences dignes de confiance pour les utilisateurs finaux. Cependant, peu de travaux ont abordé les questions de gestion de la confiance pour prévenir les attaques de confiance dans les environnements de l'IoT social. La plupart des études ont été menées pour détecter les attaques en mode hors ligne avec ou sans spécification du type d'attaque réalisée. En outre, elles n'ont pas pris en compte les propriétés de sécurité, telles que la cryptographie, la transparence et l'immutabilité, etc. A cet égard, nous devons traiter les transactions en continu pour prévenir ces attaques au niveau de la génération des transactions en temps réel tout en maintenant les propriétés de sécurité. Pour ce faire, nous avons comparé les techniques et technologies utilisées précédemment, dont le point commun est la prévention des attaques dans les contextes sociaux et l'IoT. Sur la base de ces comparaisons, nous avons indiqué que la technologie blockchain peut aider à développer un mécanisme de gestion de la confiance qui peut prévenir les attaques de confiance tout en maintenant la sécurité. Pour le temps réel, nous avons proposé de combiner un moteur de traitement de flux distribué, connu sous le nom d'Apache Spark, avec la technologie blockchain. Notre choix est basé sur une comparaison des moteurs de traitement de flux de données open source. En conséquence, nous proposons un nouveau mécanisme de gestion de la confiance, basé sur la blockchain et Apache Spark. Ce mécanisme permet de prévenir en temps réel tous les types d'attaques de confiance effectuées par des nœuds malveillants, afin d'obtenir un environnement fiable. L'expérimentation réalisée sur un jeu de données réelles nous permet de prouver la performance de notre proposition
The social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
11

Svensson, Jesper, Niclas Carlén, and August Forsman. "Innovating with sensors : A micro-level perspective investigating how IoT solutions affect work practices." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-147760.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things is increasingly becoming an essential factor for organisational success. This study focuses on a micro level perspective how sensor-based IoT systems address process information requirements in organisations. The study encompasses three different cases were IoT-based systems were implemented and what the automational, informational and transformational effects have been on their processes. To gauge these effects, we have used a framework for assessing the business value of the IoT implementations. Moreover, we have used a framework for generating digital options to address the information requirements in processes. The purpose of the study is to measure the effects on business processes, how actors explore innovation opportunities enabled by IoT and how sensor-based system address information requirements. The results of the study identified several complex factors and contribute with practices on how to utilise sensor-systems as an enabling technology for continued process innovation.
12

Filip, Tomas, and Kobets Kirill. "Internet of Things inom integrerad vård för äldre : En kvalitativ studie ur ett säkerhetsperspektiv." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-98143.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
I samma takt som den äldre populationen i de flesta länder fortsatt växer så ökar efterfrågan för äldrevård. Samtidigt har Internet of Things (IoT) snabbt blivit ett av det mest välkända och omtalade begreppet kring företag och teknologi. Ett tillämpningsområde som IoT idag riktar sig mot är hälso- och sjukvården. IoT förväntas inom detta område kunna förse äldre med integrerad vård som i framtiden kan minska sjukvård och kostnader. Teknologins alla fördelar har dock även medfört nackdelar i form av nya säkerhetsattacker och sårbarheter i hälso- och sjukvårdssystemen. Problemet med IoT teknologin är att den i dagsläget inte stöds av adekvata åtgärder för sekretess och säkerhet. Syftet med studien var att undersöka hur frågor kring säkerhet påverkar utvecklingen av IoT lösningar riktade mot integrerad vård för äldre. Via semi-strukturerade intervjuer med fem informanter med erfarenhet och kompetens inom området för integrerad vård för äldre, IoT och säkerhet kunde empirin för studien samlas in. Vidare analyserades det empiriska resultatet tillsammans med litteraturen vilket resulterade i att ett antal faktorer som påverkar utvecklingen av IoT lösningar riktade mot integrerad vård för äldre identifierades. Resultatet för studien visar att faktorerna tid, ekonomi och användarvänlighet påverkar aktörers val av att prioritera funktionalitet före säkerhet under utveckling. Aktörer tvingas istället göra ett antal avvägningar och arbeta på olika sätt för att implementera tillräcklig säkerhet i sina IoT lösningar. Vidare visar resultatet att bristen på tydliga riktlinjer och standarder är en faktor som påverkar aktörers förenlighet med lagar och regler som ställer hårda krav på säkerheten. Utöver detta visar resultatet att det är viktigt att definiera ägandefrågan under utvecklingsstadiet eftersom frågan i dagsläget är otydlig och diffus.
As the elderly population in most countries continues to grow, the demand for elderly care is increasing. At the same time, the Internet of Things (IoT) has quickly become one of the most well-known and widely spoken concept of business and technology. One area of use that IoT is currently addressing is healthcare. In this area, IoT is expected to be able to provide the elderly with integrated care that in the future can reduce healthcare and costs. All the advantages of IoT have also brought disadvantages in the form of new security attacks and vulnerabilities in the health care systems. The problem with the IoT technology is that it is not currently supported by adequate privacy and security measures. The purpose of the study was to investigate how security issues affect the development of IoT solutions aimed at integrated care for the elderly. Through semi-structured interviews with five informants with experience and competence in the field of integrated care for elderly, IoT and security, the empirical data for the study could be collected. Furthermore, the empirical result was analyzed together with the literature, and a number of factors were identified that have influence on the development of IoT solutions aimed at integrated care for the elderly. The results of the study show that the factors of time, economy and user friendliness affect the actors' choice of prioritizing functionality before security during development. Instead, actors are forced to make a number of tradeoffs and work in different ways to implement adequate security in their IoT solutions. Furthermore, the results show that the lack of clear guidelines and standards is a factor that influences actors' compliance with laws and regulations that impose strict safety requirements. In addition, the results show that it is important to define the ownership issue during the development stage, as the issue is currently unclear and diffuse.
13

Byrskog, Michael. "Interoperabilitetinom eHälsa : Enkvalitativ studie om användningen av IoT för glukosdata." Thesis, Mittuniversitetet, Avdelningen för data- och systemvetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31460.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This study is about interoperability in the collection and transmission of glucose data and focuses on a new eHealth technology. This technology is part of the Internet of Things (IoT) and involves interoperability in systems with sensors applied to the human body. The purpose has been to investigate the interoperability of data collection and transmission of glucose data based on the interoperability issues, how interoperability is used, and the pros and cons of different types of interoperability. A case study with six semi-structured interviews has been conducted. The analysis of the interviews has been conducted using a theoretical framework dealing with IoT and interoperability as well as a two-part interoperability model. The first part of the model has been used to analyze the occurrence of basic, functional and semantic interoperability in the collection and transmission of glucose data. The second part of the model has been used to analyze the information systems based on different maturity levels for interoperability. When collecting glucose data, there are basic, functional and to some extent semantic interoperability. When transmitting glucose data, basic and functional interoperability occur. Basic interoperability dominates here, except for one case. When collecting glucose data, messages and notifications and the automatic adjustment of medication have been identified as benefits. In the case of transmitting glucose data, the fact that respondents do not need to bring their device to caregivers and, in one case, that several users can see the glucose data collected have been identified as benefits. Some clear disadvantages have not been identified.The second part of the interoperability model has resulted in twomaturation levels for the interoperability of transmitting glucose data,"distributed organization-bound" and "integrated national".
Denna studie handlar om interoperabilitet vid insamling och vidarebefordran av glukosdata och fokuserar på en ny teknik inom eHälsa. Denna teknik är en del av Internet of Things (IoT) och involverar interoperabilitet inom system med sensorer som appliceras på människokroppen. Syftet har varit att undersöka interoperabiliteten vid insamling och vidarebefordran av glukosdata utifrån frågeställningarna om vilka olika sorters interoperabilitet som förekommer, hur interoperabiliteten används och vilka för- och nackdelar som finns med olika sorters interoperabilitet. En fallstudie med sex semistrukturerade intervjuer har genomförts. Analysen av intervjuerna har utförts med hjälp av ett teoretiskt ramverk som behandlar IoT och interoperabilitet samt en tvådelad interoperabilitetsmodell. Första delen av modellen har använts för att analysera förekomsten av grundläggande, funktionell och semantisk interoperabilitet vid insamling och vidarebefordran av glukosdata. Andra delen av modellen har använts för att analysera informationssystemen utifrån olika mognadsnivåer för interoperabiliteten. Vid insamling av glukosdata förekommer grundläggande, funktionell och i viss mån semantisk interoperabilitet. Vid vidarebefordran av glukosdata förekommer grundläggande och funktionell interoperabilitet. Grundläggande interoperabilitet dominerar här med undantag för ett fall. Vid insamling av glukosdata har meddelanden och notifikationer och den automatiska justeringen av medicinering framkommit som fördelar. Vid vidarebefordran av glukosdata har det faktum att respondenterna inte behöver ta med sin anordning till vårdgivarna och, i ett fall, att flera användare kan se de insamlade glukosdata framkommit som fördelar. Några tydliga nackdelar har inte kunnat identifieras. Andra delen av interoperabilitetsmodellen har resulterat i två mognadsnivåer för interoperabiliteten vid vidarebefordran av glukosdata, ”distribuerad organisationsbunden” och ”integrerad nationell”.
14

Hakkestad, Mårten, and Simon Rynningsjö. "Who hacked my toaster? : A study about security management of the Internet of Things." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158468.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things is a growing area with growing security concerns, new threat emerge almost everyday. Keeping up to date, monitor the network and devices and responding to compromised devices and networks are a hard and complex matters.  This bachelor’s thesis aims to discover how a IT-company can work with security management within the Internet of Things, this is done by looking into how a IT-company can work with updating, monitoring and responding within the Internet of Things, as well what challenges there are with working with this.  A qualitative research approach was used for this case study along with an interpretative perspective, as well as abductive reasoning. Interviews were performed with employees of a large IT-company based in Sweden, along with extensive document analysis.  Our bachelor’s thesis results in challenges with Security Management within the areas updating, monitoring and responding along with how our Case Company works with these security challenges. Largely these challenges can be summarized that everything is harder with the number of devices there are within the Internet of Things
Internet of Things eller Sakernas internet är ett växande område med en växande hotbild och nya hot uppkommer dagligen. Att hålla sig uppdaterad, övervaka nätverk och enheter samt att reagera på att enheter och nätverk blir hackade är en svår och komplicerad uppgift. Den här uppsatsen ämnar undersöka hur ett IT-företag kan arbeta med säkerhetshantering inom Internet of Things. Detta har gjorts genom att kolla utmaningar och säkerhetslösningar inom de tre områdena uppdatera, övervaka och reagera.  En kvalitativ forskningsmetod har använts i denna fallstudie tillsammans med ett tolkande synsätt och en abduktiv ansats. Vi har utfört intervjuer på ett stort IT-företag baserat i Sverige tillsammans med en utförlig dokumentanalys.  Resultatet av denna uppsats påvisar ett antal utmaningar inom säkerhetshanteringen inom områdena uppdatera, övervaka och reagera tillsammans med hur vårt fallföretag jobbar med att motarbeta dessa utmaningar. I stort sett kan utmaningarna sammanfattas till att allting är svårare när mängden enheten är så hög som den är inom Internet of Things.
15

Vergara, Rammsy Andrea, Karolina Ekbäck, and Marcus Viksten. "Smart Omedelbart? : En kvalitativ studie om IoT och dess bidrag till smarthet inom offentlig verksamhet." Thesis, Umeå universitet, Institutionen för informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-183641.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The use of the Internet of Things is increasing in our society and it brings value to the public sector, companies and individuals' personal lives. There is however a strong indication that many Swedish municipalities do not use IoT. The use of IoT can contribute to smartness, efficiency and effectiveness, decreased costs and increased public value. Therefore it is problematic that it is not used to a greater extent. In this study we conduct interviews with IT-staff involved in IoT initiatives within Swedish municipalities to find out how they are working with IoT. Using related research and a theoretical framework called Dimensions of smartness in government we analyze how the municipalities are working with IoT and how it contributes to smartness. The results of the study suggest that working with IoT within the municipalities does contribute to smartness even though a majority of the municipalities state that they are in an early stage. We also conclude that the municipalities work on an operative level rather than a strategic level in implementing IoT-solutions. Organisational integration was identified as a vital part for successful IoT usage. This study will help municipalities with their journey on using IoT and making their municipality smarter by highlighting the important measures to take while working with the Internet of Things.
16

Rosell, Mathias. "Hur bör manipulation av IoT-enheter i det smarta hemmet hanteras och åtgärdas av användare och utvecklare : En systematisk litteraturstudie för att kartlägga åtgärder för smarta hem." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18652.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
IoT-enheter är för många människor idag en del av vardagen och fler och fler enheter ansluts till människors hushåll. Smarta hem har allt från kylskåp och övervakningskameror som är anslutna till ett nätverk och internet. Problematiken med det är att många av dessa enheter har inte tillräcklig kapacitet eller en avsaknad av tillräckliga säkerhetsåtgärder för att skydda sig mot potentiella attackvektorer. Bristande säkerheten för enheter i det smarta hemmet kan leda till att enheterna blir hackade och manipulerade av angripare. Den som kan skydda det smarta hemmet mot manipulation av dess IoT-enheter är både användare i det smarta hemmet och utvecklare av enheterna. Men det är inte alltid tydligt för vem åtgärden gäller, vilket är något den här studien vill klargöra. Den här litteraturstudien utgår från befintliga åtgärder identifierade av tidigare forskning. Den skiljer sig från den tidigare forskningen genom att kartlägga vilka åtgärder som är applicerbara för användare och utvecklare för att skydda det smarta hemmet mot manipulation. Med hjälp av en systematisk litteratursökning valdes 22 studier ut för att besvara studiens frågeställning. För att besvara studiens forskningsfråga används en kartläggande granskningsmetod. Metoden används för att kartlägga och identifiera vilka åtgärder som rekommenderas för både användare och utvecklare. Med hjälp av den tidigare forskningen framställs ett ramverk för att förtydliga vad användaren i det smarta hemmet själv utföra och vilka åtgärder utvecklare kan och bör utföra. Ramverket demonstrerar dessutom en rekommenderad ordning från författaren som åtgärderna bör utföras i.
Users of IoT devices are for many people today part of everyday life and more and more devices are connected to people's households. Smart homes have everything from refrigerators and surveillance cameras connected to a network and the internet. The problem with this is that many of these units do not have sufficient capacity or lack adequate security measures to protect themselves against potential attack vectors. Lack of security for devices in the smart home can cause the devices to be hacked and manipulated by attackers. Those who can protect the smart home from tampering with its IoT devices are the users in the smart home and the developers of the IoT devices. Although it is not always clear for whom the security measures apply to, which is something that this study aims to clarify. This literature study is based on existing security measures identified by previous research. It differs from previous research by mapping out which security measures and best practices that are applicable to users and developers to protect the smart home from being manipulated. Using a systematic literature search, 22 studies were selected to answer the study's question. To answer the study's research question, a mapping method is used. The method is used to map and identify which actions are recommended for both users and developers. Using the previous research, a framework is created to clarify what the user in the smart home can do and what actions developers can and should take. The framework also demonstrates a recommended order from the author in which the measures should be carried out.
17

Winnberg, Lise-Lott, and Mimmi Jackléus. "IoT användning inom kommunal verksamhet : – i Östergötland." Thesis, Linköpings universitet, Informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151405.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Internet of Things blir allt mer vanligt och inkluderas redan på vissa ställen i till exempel stadsplaner förnybyggnationer men finns även i smarta kontor och infrastruktur. Det finns en uppsjö med privatägdaföretag som specialiserat sig på IoT-lösningar och tillämpningar av detta på olika delar i samhället. Det ärredan på tal att installera IoT sensorer i vattenledningar till exempel så att underhåll kan förutses och därmedminska avvikelser av tillförsel samt minska eventuella förlust.I den här kvalitativa undersökning har vi studerat hur IoT används i kommuner, vad de tror IoT har förframtid i Sveriges kommuner samt hur de ser att IoT kan användas för att skapa nytta i kommunalaverksamheter, men också vad som kan tänkas vara ett hinder som står i vägen för att realisera detta.Efter att ha intervjuat ett antal kommuner över hela Östergötlands län har vi funnit att det i nuläget intefinns så mycket IoT i kommunerna och att det beror på flera orsaker. En av dem är att det råder brist påregelverk som behandlar IoT men även standardisering av IoT och vad införande av IoT lösningar faktisktinnebär i kommun eller stadssammanhang. Vad ska man satsa på? Om detta råder det osäkerhet, däremotom det fanns konkreta exempel med direkt verksamhetsnytta skulle det nog vara skillnad. Detta kanDigitaliseringsmyndigheten som kommer till hösten eventuellt råda bot på, men det verkar som att derasroll inte är så väldefinierad, och det märktes när vi pratade med respondenterna. De hade olikaförhoppningar av vad myndigheten kan bistå med eller vad deras arbete kommer att mynna ut i.Vi har även upptäckt att det inte finns några krav på statens sida på att kommunerna tar fram en strategisom behandlar IoT men även digitaliseringsstrategi. Trots detta har ett par respondenter redan endigitaliseringsstrategi eller jobbade på det.En annan orsak är att de finansiella medel kommunerna har i nuläget inte räcker till för en digital satsning,medlen behövs för att underhålla verksamheten. En kommuns fokus är alltid verksamheten ochmedborgarna. Om begränsade medel tvingar till ett val mellan investering i tekniska möjligheter, även omde kan generera större vinst i längden, och verksamhetsutveckling av annan form eller underhåll, kommeralltid verksamheten först. Som en av respondenterna förklarade, att om valet står mellan att bygga en nyförskola eller att investera i ett nytt teknikprojekt är det ganska självklart vart pengarna slutligen går.
The Internet of Things is becoming more common and more common and is already included in someplaces such as city plans for new buildings, in smart offices and infrastructure. There is a wealth ofprivately-owned companies specializing in IoT solutions and application of this to different parts of society.A great example is installing IoT sensors in water pipes so that maintenance can be foreseen, thus reducingsupply deviations and reducing any losses.In this qualitative bachelor thesis, we have investigated how IoT is used in municipalities, what they thinkIoT has to offer the future of Sweden's municipalities and how they see IoT can be used to create utility inmunicipal activities, but also what may be an obstacle in the process of realizing this.After interviewing a few of the municipalities across Östergötland County we have found that currentlythere are few IoT solutions in the municipalities and that it is due to several reasons. One of them is thelack of regulations that deal with IoT, but also the lack of standardisation of IoT, and what the introductionof IoT solutions would entail in municipalities or towns. What to invest in? There is some uncertainty there.If there were concrete examples of direct municipial operation benefit that would probably be a difference.This might possibly be resolved by the Digitaliseringsmyndigheten which will be established in the autumnhowever it seems that their role is not so well-defined, which we noticed when we spoke to respondents.They had different hopes of what the government can assist with or what their work would result in.We have discovered that there is no requirement for the state to provide municipalities with a strategy thataddresses the IoT or a digitization strategy. Nevertheless, a couple of respondents already have a digitizationstrategy or were working on it.Another reason is that the funds the municipalities currently have is not enough for such a venture, thosefunds are necessary to maintain and keep the municipal operation running. A municipality's focus is alwaysthe business and the citizens. If limited funds force a choice between investment in technical capabilities,although they can generate greater profit in the long run, and operational development of other forms ormaintenance, the operation will always come first. As one of the respondents explained, if the choice isbetween building a new preschool or investing in a new technology project, it is obvious where the moneyends up.
18

Henriksson, Joar, and Daniel Gustavsson. "Vårdplaceringsproblematik på Norrlands Universitetssjukhus : En fallstudie gällande vårdplaceringsprocessen och hur IoT kan användas inom den." Thesis, Umeå universitet, Institutionen för informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-159182.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The complex process of patient placement within a hospital is a big challenge. The main focus in the process is how to coordinate clinics to make sure that the patients get the best possible care. The rise of digital health has led to a greater use of technologies to facilitate the activities within the hospitals’ processes. This study has been focusing on how Internet of Things can be used in the patient placement process. Respondents to participate in the interviews were chosen with help from a coordinator based on their experience within the study area of interest. Observations were done in meetings where the staff discussed patient placements. From a perspective of problem based coordination, a thematic analysis was done on the collected data and from the themes that were created a solution was presented. The object of this study is to map the process of patient placement and to present an analytic approach on how to facilitate the patient placement process with the use of Internet of Things. Our proposed approach will contribute to a greater understanding of the patient placement process and how Internet of Things can be used within it.
19

Masséus, Jonatan. "Where Did The Car Go? : Smart cities, calm technology and the future of autonomous cars." Thesis, Internationella Handelshögskolan, Jönköping University, IHH, Informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50202.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Urbanization has been a growing trend in the past fifty years. Cities are now transforming into smart cities, spaces whose infrastructure comprises an embedded digital layer. Hardware collects real-time data in the urban environment and software elaborates it to improve all types of services, from traffic to waste management to well-being. One technology that is expected to use this digital layer to further change the urban environment is the autonomous car. The purpose of this dissertation is to explore what key design attributes future autonomous cars should possess if they have not only to co-exist with and be accepted by people in the landscape of tomorrow’s smart cities, but also what they should not possess in order not to cause any harm. In this sense, the dissertation recognizes calm technology to be necessary in the design of a future autonomous car to support a human-centered, as opposed to a car- or technology-centered, environment. A socio-technical and systemic lens is applied to the phenomenological investigation of nine companies carried out by means of twelve in-depth semi-structured interviews with experts working within the automotive sector, the smart city industry, and calm technology. Eight attributes (safety, on-demand, geo-tracking, sharing, multiple purposes, communication through smart devices, electrical care and IoT/connectedness) are identified as necessary for future autonomous cars to implement in order to take advantage of the smart city infrastructure and provide a human-centered experience. Additionally, six out of the eight calm technology principles recognized in literature are considered necessary when designing future autonomous cars.
20

Iezzi, Valeria. "Connectedness : Designing interactive systems that foster togetherness as a form of resilience for people in social distancing during Covid-19 pandemic. Exploring novel user experiences in the intersection between light perception, tangible interactions and social interaction design (SxD)." Thesis, Malmö universitet, Malmö högskola, Institutionen för konst, kultur och kommunikation (K3), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-37697.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This thesis project explores how interactive technologies can facilitate a sense of social connectedness with others whilst remotely located. While studying the way humans use rituals for emotional management, I focused my interest on the act of commensality because it is one of the oldest and most important rituals used to foster togetherness among families and groups of friends. Dining with people who do not belong to the same household is of course hard during a global pandemic, just like many of the other forms of social interactions that were forcibly replaced by the use of technological means such as video-chat apps, instant messaging and perhaps an excessive use of social networking websites. These ways of staying connected, however, lack the subtleties of real physical interaction, which I tried to replicate with my prototype system, which consists of two sets of a lamp and a coaster which enable to communicate through light and tactile cues. The use of such devices creates a new kind of ritual based on the simultaneous use of the devices by two people, thus enabling a new and original form of commensality that happens through a shared synchronized experience.
21

Corino, Gianni. "Internet of props : a performative ontology and design framework for the Internet of Things." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9511.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Set in the relatively new and fast developing field of investigation known as Internet of Things (IoT), this research starts by looking at the lack of critical and conceptual reflection on the area. With a main research question that challenges the underlying concepts of the IoT, the study develops a performative design framework to critique the field of investigation. The main corpus consists of: 1. speculative inquiry into the ontological dualisms of ‘objects’ and ‘things’ and the emerging social dimension of humans and non-humans; 2. the identification of an ontological-performative model based on the idea of Props; 3. the entanglement of theory and practice to construct a performative design framework, called the Internet of Props, which includes: an enabling platform (Smarter Planet Lab) and a set of design strategies (Transactional Props) to demonstrate and evaluate this model and framework; 4. a combined-evaluation conversational analysis methodology that assesses the performativity of the setting and the Props, through linguistic and socio-behavioural studies. Inspired by the concepts of ontological theatre, the entanglement of humans and non-humans, and the Internet of People; the IoT is imagined and performed in a theory-driven, practice-based investigation of the Internet of Props, which aims to bring new theoretical and practical knowledge for the future of the IoT.
22

Skytte, André, and Victor Olsson. "Framtidens teknikinformatör : Hur Internet of Things påverkar en arbetsroll." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-66810.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Ett teknikskifte mot Internet of Things (IoT) kan medföra förändringar både för företag och konsumenter i form av förändrade arbetsroller, nya sätt att producera innehåll och nya sätt att ta del av innehållet. Fokus i denna rapport har legat på vad detta innebär för tekniska skribenter. För att belysa detta problem har en undersökning utförts på ett fallföretag som specialiserar sig på att producera teknisk dokumentation och som börjat kolla närmre på IoT. Undersökningen ledde fram till slutsatsen att rollen som teknisk skribent inom en IoT-kontext kommer se annorlunda ut gentemot en teknisk skribent som skriver traditionellt. För att skriva teknisk dokumentation för IoT ställs högre krav på teknisk kompetens i form av grundläggande programmeringskunskap och ett objektorienterat tankesätt.
A technology change towards the Internet of Things (IoT) can lead to changes for both businesses and consumers in the form of changing work roles, new ways of producing content and new ways to share content. The focus of this report has been on what this means for technical writers. To highlight this problem, an investigation has been conducted at a case company specializing in producing technical documentation and which has begun to look closer at IoT. The investigation led to the conclusion that the role of technical writer within an IoT-context looks different from a technical writer who writes traditionally. To write technical documentation for IoT, higher demands are placed on technical competence in the form of basic programming skills and object-oriented thinking.
23

Göttert, Rebecca. "Materializing social presence: Exploring the Internet of Things using a Research through Design approach." Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21210.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This thesis examines the role connected devices in the home could play for maintaining and taking care of close relationships of people living apart. Communication tools nowadays offer many different ways of communicating and they are mostly focused on mobile devices. Social presence describes the feeling that humans have when communicating with each other and can be mediated through communication tools in different strengths. The Internet of Things is one rapidly developing branch of contemporary technology and estimates say by 2020 about 200 billion devices will be connected. This research focuses on the possibilities the Internet of Things offers to the notion of social presence in the domestic setting by exploring how we feel interrupted by current devices: Through a Research through Design approach, alternative concepts will be developed to materialize the feeling of social presence.
24

Aqeel, Muhammad. "Internet of Things : Systematic literature review of security and future research." Thesis, Uppsala universitet, Informationssystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420118.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things (IoT) is the network of billions of devices, people and services to Interconnect and exchange information and useful data. The IoT applications are highly affirming to increase the level of comfort, efficiency and automations for the user. The high level of security and privacy, authentication and recovery from the attacks is required to implement IoT automated world. In this thesis I am presenting an overview of IoT layer architecture and attacks regarding security from the layer’s perspective. In addition, this thesis will provide an overview to solve the security and privacy threats. Furthermore, this paper discusses the current state of research on IoT security requirements and future research directions with respect to IoT security and privacy, a detailed review of the security challenges and sources of threat in the IoT applications is presented. Finally, this thesis presents the security issues, various emerging and existing technologies focused on achieving a high degree of trust in the IoT applications.
25

Tägt, Daniel, and Erik Wijnbladh. "Informationssäkerhet inom Internet of Things, vad finns det för behov av en standard? : En kvalitativ studie om utvecklarnas syn på behovet av en standard inom Internet of Things." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-72501.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Abdelghani, Wafa. "A multi-dimensional trust-model for dynamic, scalable and resources-efficient trust-management in social internet of things." Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30231.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
L'internet des Objets (IoT) est un paradigme qui a rendu les objets du quotidien, intelligents en leur offrant la possibilité de se connecter à Internet, de communiquer et d'interagir. L'intégration de la composante sociale dans l'IoT a donné naissance à l'Internet des Objets Social (SIoT), qui a permis de surmonter diverse problématiques telles que l'interopérabilité et la découverte de ressources. Dans ce type d'environnement, les participants rivalisent afin d'offrir une variété de services attrayants. Certains d'entre eux ont recours à des comportements malveillants afin de propager des services de mauvaise qualité. Ils lancent des attaques, dites de confiance, et brisent les fonctionnalités de base du système. Plusieurs travaux de la littérature ont abordé ce problème et ont proposé différents modèles de confiance. La majorité d'entre eux ont tenté de réappliquer des modèles de confiance conçus pour les réseaux sociaux ou les réseaux pair-à-pair. Malgré les similitudes entre ces types de réseaux, les réseaux SIoT présentent des particularités spécifiques. Dans les SIoT, nous avons différents types d'entités qui collaborent, à savoir des humains, des dispositifs et des services. Les dispositifs peuvent présenter des capacités de calcul et de stockage très limitées et leur nombre peut atteindre des millions. Le réseau qui en résulte est complexe et très dynamique et les répercussions des attaques de confiance peuvent être plus importantes. Nous proposons un nouveau modèle de confiance, multidimensionnel, dynamique et scalable, spécifiquement conçu pour les environnements SIoT. Nous proposons, en premier lieu, des facteurs permettant de décrire le comportement des trois types de nœuds impliqués dans les réseaux SIoT et de quantifier le degré de confiance selon les trois dimensions de confiance résultantes. Nous proposons, ensuite, une méthode d'agrégation basée sur l'apprentissage automatique et l'apprentissage profond qui permet d'une part d'agréger les facteurs proposés pour obtenir un score de confiance permettant de classer les nœuds, mais aussi de détecter les types d'attaques de confiance et de les contrer. Nous proposons, ensuite, une méthode de propagation hybride qui permet de diffuser les valeurs de confiance dans le réseau, tout en remédiant aux inconvénients des méthodes centralisée et distribuée. Cette méthode permet d'une part d'assurer la scalabilité et le dynamisme et d'autre part, de minimiser la consommation des ressources. Les expérimentations appliquées sur des de données synthétiques nous ont permis de valider le modèle proposé
The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by giving them the ability to connect to the Internet, communicate and interact. The integration of the social component in the IoT has given rise to the Social Internet of Things (SIoT), which has overcome various issues such as interoperability, navigability and resource/service discovery. In this type of environment, participants compete to offer a variety of attractive services. Some of them resort to malicious behavior to propagate poor quality services. They launch so-called Trust-Attacks (TA) and break the basic functionality of the system. Several works in the literature have addressed this problem and have proposed different trust-models. Most of them have attempted to adapt and reapply trust models designed for traditional social networks or peer-to-peer networks. Despite the similarities between these types of networks, SIoT ones have specific particularities. In SIoT, there are different types of entities that collaborate: humans, devices, and services. Devices can have very limited computing and storage capacities, and their number can be as high as a few million. The resulting network is complex and highly dynamic, and the impact of Trust-Attacks can be more compromising. In this work, we propose a Multidimensional, Dynamic, Resources-efficient and Scalable trust-model that is specifically designed for SIoT environments. We, first, propose features to describe the behavior of the three types of nodes involved in SIoT networks and to quantify the degree of trust according to the three resulting Trust-Dimensions. We propose, secondly, an aggregation method based on Supervised Machine-Learning and Deep Learning that allows, on the one hand, to aggregate the proposed features to obtain a trust score allowing to rank the nodes, but also to detect the different types of Trust-Attacks and to counter them. We then propose a hybrid propagation method that allows spreading trust values in the network, while overcoming the drawbacks of centralized and distributed methods. The proposed method ensures scalability and dynamism on the one hand, and minimizes resource consumption (computing and storage), on the other. Experiments applied to synthetic data have enabled us to validate the resilience and performance of the proposed model
27

Ben, Saied Yosra. "Collaborative security for the internet of things." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0013.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Cette thèse aborde des nouveaux défis de sécurité dans l'Internet des Objets (IdO). La transition actuelle de l'Internet classique vers l'Internet des Objets conduit à de nombreux changements dans les modèles de communications sous-jacents. La nature hétérogène des communications de l’IdO et le déséquilibre entre les capacités des entités communicantes qui le constituent rendent difficile l'établissement de connexions sécurisées de bout en bout. Contrairement aux nœuds de l’Internet traditionnel, la plupart des composants de l'Internet des Objets sont en effet caractérisés par de faibles capacités en termes d'énergie et de puissance calcul. Par conséquent, ils ne sont pas en mesure de supporter des systèmes de sécurité complexes. En particulier, la mise en place d'un canal de communication sécurisé de bout en bout nécessite l’établissement d'une clé secrète commune entre les deux nœuds souhaitant communiquer, qui sera négociée en s'appuyant sur un protocole d'échange de clés tels que le Transport Layer Security (TLS) Handshake ou l’Internet Key Exchange (IKE). Or, une utilisation directe de ces protocoles pour établir des connexions sécurisées entre deux entités de l’IdO peut être difficile en raison de l'écart technologique entre celles-ci et des incohérences qui en résultent sur le plan des primitives cryptographiques supportées. Le sujet de l'adaptation des protocoles de sécurité existants pour répondre à ces nouveaux défis a récemment été soulevé dans la communauté scientifique. Cependant, les premières solutions proposées n'ont pas réussi à répondre aux besoins des nœuds à ressources limitées. Dans cette thèse, nous proposons de nouvelles approches collaboratives pour l'établissement de clés, dans le but de réduire les exigences des protocoles de sécurité existants, afin que ceux-ci puissent être mis en œuvre par des nœuds à ressources limitées. Nous avons particulièrement retenu les protocoles TLS Handshake, IKE et HIP BEX comme les meilleurs candidats correspondant aux exigences de sécurité de bout en bout pour l'IdO. Puis nous les avons modifiés de sorte que le nœud contraint en énergie puisse déléguer les opérations cryptographiques couteuses à un ensemble de nœuds au voisinage, tirant ainsi avantage de l'hétérogénéité spatiale qui caractérise l’IdO. Nous avons entrepris des vérifications formelles de sécurité et des analyses de performance qui prouvent la sureté et l'efficacité énergétique des protocoles collaboratifs proposés. Dans une deuxième partie, nous avons porté notre attention sur une classe d’attaques internes que la collaboration entre les nœuds peut induire et que les mécanismes cryptographiques classiques, tels que la signature et le chiffrement, s'avèrent impuissants à contrer. Cela nous a amené à introduire la notion de confiance au sein d'un groupe collaboratif. Le niveau de fiabilité d'un nœud est évalué par un mécanisme de sécurité dédié, connu sous le nom de système de gestion de confiance. Ce système est lui aussi instancié sur une base collaborative, dans laquelle plusieurs nœuds partagent leurs témoignages respectifs au sujet de la fiabilité des autres nœuds. En nous appuyant sur une analyse approfondie des systèmes de gestion de confiance existants et des contraintes de l’IoD, nous avons conçu un système de gestion de confiance efficace pour nos protocoles collaboratifs. Cette efficacité a été évaluée en tenant compte de la façon dont le système de gestion de la confiance répond aux exigences spécifiques à nos approches proposées pour l'établissement de clés dans le contexte de l'IdO. Les résultats des analyses de performance que nous avons menées démontrent le bon fonctionnement du système proposé et une efficacité accrue par rapport à la littérature
This thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
28

Ciortea, Andrei-Nicolae. "Tisser le Web Social des Objets : Permettre une Interaction Autonome et Flexible dans l’Internet des Objets." Thesis, Lyon, 2016. http://www.theses.fr/2016EMSE0813/document.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
L’Internet des Objets (IoT) vise à créer un eco-système global et ubiquitaire composé d’un grand nombre d’objets hétérogènes. Afin d’atteindre cette vision, le World Wide Web apparaît comme un candidat adapté pour interconnecter objets et services à la couche applicative en un Web des Objets (WoT).Cependant l’évolution actuelle du WoT produit des silos d’objets et empêche ainsi la mise en place de cette vision. De plus, même si le Web facilite la composition d’objets et services hétérogènes, les approches existantes produisent des compositions statiques incapables de s’adapter à des environnements dynamiques et des exigences évolutives. Un autre défi est à relever: permettre aux personnes d’interagir avec le vaste, évolutif et hétérogène IoT.Afin de répondre à ces limitations, nous proposons une architecture pour IoT ouvert et autogouverné, constitué de personnes et d’objets situés, en interaction avec un environnement global via des plateformes hétérogènes. Notre approche consiste de rendre les objets autonomes et d’appliquer la métaphore des réseaux sociaux afin de créer des réseaux flexibles de personnes et d’objets. Nous fondons notre approche sur les résultats issus des domaines des multi-agents et du WoT afin de produit un WoT Social.Notre proposition prend en compte les besoins d’hétérogénéité, de découverte et d’interaction flexible dans l’IoT. Elle offre également un coût minimal pour les développeurs et les utilisateurs via différentes couches d’abstraction permettant de limité la complexité de cet éco-système. Nous démontrons ces caractéristiques par la mise en oeuvre de plus scénarios applicatifs
The Internet of Things (IoT) aims to create a global ubiquitous ecosystem composed of large numbers of heterogeneous devices. To achieve this vision, the World Wide Web is emerging as a suitable candidate to interconnect IoT devices and services at the application layer into a Web of Things (WoT).However, the WoT is evolving towards large silos of things, and thus the vision of a global ubiquitous ecosystem is not fully achieved. Furthermore, even if the WoT facilitates mashing up heterogeneous IoT devices and services, existing approaches result in static IoT mashups that cannot adapt to dynamic environments and evolving user requirements. The latter emphasizes another well-recognized challenge in the IoT, that is enabling people to interact with a vast, evolving, and heterogeneous IoT.To address the above limitations, we propose an architecture for an open and self-governed IoT ecosystem composed of people and things situated and interacting in a global environment sustained by heterogeneous platforms. Our approach is to endow things with autonomy and apply the social network metaphor to createflexible networks of people and autonomous things. We base our approach on results from multi-agent and WoT research, and we call the envisioned IoT ecosystem the Social Web of Things.Our proposal emphasizes heterogeneity, discoverability and flexible interaction in the IoT. In the same time, it provides a low entry-barrier for developers and users via multiple layers of abstraction that enable them to effectively cope with the complexity of the overall ecosystem. We implement several application scenarios to demonstrate these features
29

Ben, Saied Yosra. "Collaborative security for the internet of things." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00879790.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
30

Yelasani, kailash kumar yadav. "ECONOMIZED SENSOR DATA PROCESSING WITH VEHICLE PLATOONING." OpenSIUC, 2018. https://opensiuc.lib.siu.edu/theses/2305.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We present platooning as a special case of crowd-sensing framework. After offering a policy that governs platooning, we review common scenarios and components surrounding platooning. We present a prototype that illustrates efficiency of road usage and vehicle travel time derived from platooning. We have argued that beyond the commonly reported benefits of platooning, there are substantial savings in acquisition and processing of sensory data sharing the road. Our results show that data transmission can be reduced to low of 3% compared to normal data transmission using a platoon formation with sensor sharing.
31

Abed, Javad. "A NOVEL FRAMEWORK FOR SOCIAL INTERNET OF THINGS: LEVERAGING THE FRIENDSHIPS AND THE SERVICES EXCHANGED BETWEEN SMART DEVICES." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/5980.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As humans, we tackle many problems in complex societies and manage the complexities of networked social systems. Cognition and sociability are two vital human capabilities that improve social life and complex social interactions. Adding these features to smart devices makes them capable of managing complex and networked Internet of Things (IoT) settings. Cognitive and social devices can improve their relationships and connections with other devices and people to better serve human needs. Nowadays, researchers are investigating two future generations of IoT: social IoT (SIoT) and cognitive IoT (CIoT). This study develops a new framework for IoT, called CSIoT, by using complexity science concepts and by integrating social and cognitive IoT concepts. This framework uses a new mechanism to leverage the friendships between devices to address service management, privacy, and security. The framework addresses network navigability, resilience, and heterogeneity between devices in IoT settings. This study uses a new simulation tool for evaluating the new CSIoT framework and evaluates the privacy-preserving ability of CSIoT using the new simulation tool. To address different CSIoT security and privacy issues, this study also proposes a blockchain-based CSIoT. The evaluation results show that CSIoT can effectively preserve the privacy and the blockchain-based CSIoT performs effectively in addressing different privacy and security issues.
32

Vaisutis, Kathleen Learmonth. "Understanding the roles of social and tangible technologies in maintaining social interaction, habits and independence into old age." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/91542/1/Kathleen_Vaisutis_Thesis.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The research offers a deeper understanding of how objects currently facilitate social interaction and physical activity for older adults living independently. It uses this awareness to develop, from a human perspective, considerations for the design of internet connected objects that provide novel ways of maintaining contact with loved ones. The research found that people invest emotional attachment to objects and objects foster emotional responses in people. Objects can facilitate feeling connected to another however the relationship is a result of time and repeated interaction. Recreating this connection/relationship digitally is not as simple as attaching a hyperlink.
33

Albrektsson, Elof, and Per Helsingen. "Informationshantering i fastighetsbranschen." Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23539.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Caballero, Codina Víctor. "New Challenges on Web Architectures for the Homogenization of the Heterogeneity of Smart Objects in the Internet of Things." Doctoral thesis, Universitat Ramon Llull, 2020. http://hdl.handle.net/10803/669186.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Aquesta tesi tracta de dues de les noves tecnologies relacionades amb la Internet of Things (IoT) i la seva integració amb el camp de les Smart Grids (SGs); aquestes tecnologies son la Web of Things (WoT) i la Social Internet of Things (SIoT). La WoT és una tecnologia que s’espera que proveeixi d’un entorn escalable i interoperable a la IoT usant la infraestructura web existent, els protocols web y la web semàntica. També s’espera que la SIoT contribueixi a solucionar els reptes d’escalabilitat i capacitat de descobriment creant una xarxa social d’agents (objectes i humans). Per explorar la sinergia entre aquestes tecnologies, l’objectiu és el de proporcionar evidència pràctica i empírica, generalment en forma de prototips d’implementació i experimentació empírica. En relació amb la WoT i les SGs, s’ha creat un prototip per al Web of Energy (WoE) que té com a objectiu abordar els desafiaments presents en el domini les SGs. El prototip és capaç de proporcionar interoperabilitat i homogeneïtat entre diversos protocols. El disseny d’implementació es basa en el Model d’Actors, que també proporciona escalabilitat del prototip. L’experimentació mostra que el prototip pot gestionar la transmissió de missatges per a aplicacions de les SGs que requereixen que la comunicació es realitzi sota llindars de temps crítics. També es pren una altra direcció d’investigació similar, menys centrada en les SGs, però per a una gamma més àmplia de dominis d’aplicació. S’integra la descripció dels fluxos d’execució com a màquines d’estats finits utilitzant ontologies web (Resource Description Framework (RDF)) i metodologies de la WoT (les accions es realitzen basant-se en peticions Hyper-Text Transfer Protocol/Secure (HTTP/S) a Uniform Resource Locators (URLs)). Aquest flux d’execució, que també pot ser un plantilla per a permetre una configuració flexible en temps d’execució, s’implementa i interpreta com si fos (i mitjançant) un Virtual Object (VO). L’objectiu de la plantilla és ser reutilitzable i poder-se compartir entre múltiples desplegaments de la IoT dins el mateix domini d’aplicació. A causa de les tecnologies utilitzades, la solució no és adequada per a aplicacions de temps crític (llindar de temps relativament baix i rígid). No obstant això, és adequat per a aplicacions que no demanden resposta en un temps crític i que requereixen el desplegament de VOs similars en el que fa referència al flux d’execució. Finalment, el treball s’enfoca en una altra tecnologia destinada a millorar l’escalabilitat i la capacitat de descobriment en la IoT. La SIoT està sorgint com una nova estructura de la IoT que uneix els nodes a través de relacions significatives. Aquestes relacions tenen com a objectiu millorar la capacitat de descobriment; en conseqüència, millora la escalabilitat d’una xarxa de la IoT. En aquest treball s’aplica aquest nou paradigma per optimitzar la gestió de l’energia en el costat de la demanda a les SGs. L’objectiu és aprofitar les característiques de la SIoT per ajudar a la creació de Prosumer Community Groups (PCGs) (grups d’usuaris que consumeixen o produeixen energia) amb el mateix objectiu d’optimització en l’ús de l’energia. La sinergia entre la SIoT i les SGs s’ha anomenat Social Internet of Energy (SIoE). Per tant, amb la SIoE i amb el focus en un desafiament específic, s’estableix la base conceptual per a la integració entre la SIoT i les SGs. Els experiments inicials mostren resultats prometedors i aplanen el camí per a futures investigacions i avaluacions de la proposta. Es conclou que el WoT i la SIoT són dos paradigmes complementaris que nodreixen l’evolució de la propera generació de la IoT. S’espera que la propera generació de la IoT sigui un Multi-Agent System (MAS) generalitzat. Alguns investigadors ja estan apuntant a la Web i les seves tecnologies (per exemple, Web Semàntica, HTTP/S)—i més concretamente a la WoT — com a l’entorn que nodreixi a aquests agents. La SIoT pot millorar tant l’entorn com les relacions entre els agents en aquesta fusió. Les SGs també poden beneficiar-se dels avenços de la IoT, ja que es poden considerar com una aplicació específica d’aquesta última.
Esta tesis trata de dos de las novedosas tecnologías relacionadas con la Internet of Things (IoT) y su integración con el campo de las Smart Grids (SGs); estas tecnologías son laWeb of Things (WoT) y la Social Internet of Things (SIoT). La WoT es una tecnología que se espera que provea de un entorno escalable e interoperable a la IoT usando la infraestructura web existente, los protocolos web y la web semántica. También se espera que la SIoT contribuya a solucionar los retos de escalabilidad y capacidad de descubrimiento creando una red social de agentes (objetos y humanos). Para explorar la sinergia entre estas tecnologías, el objetivo es el de proporcionar evidencia práctica y empírica, generalmente en forma de prototipos de implementación y experimentación empírica. En relación con la WoT y las SGs, se ha creado un prototipo para la Web of Energy (WoE) que tiene como objetivo abordar los desafíos presentes en el dominio las SGs. El prototipo es capaz de proporcionar interoperabilidad y homogeneidad entre diversos protocolos. El diseño de implementación se basa en el Modelo de Actores, que también proporciona escalabilidad del prototipo. La experimentación muestra que el prototipo puede manejar la transmisión de mensajes para aplicaciones de las SGs que requieran que la comunicación se realice bajo umbrales de tiempo críticos. También se toma otra dirección de investigación similar, menos centrada en las SGs, pero para una gama más amplia de dominios de aplicación. Se integra la descripción de los flujos de ejecución como máquinas de estados finitos utilizando ontologías web (Resource Description Framework (RDF)) y metodologías de la WoT (las acciones se realizan basándose en peticiones Hyper-Text Transfer Protocol/Secure (HTTP/S) a Uniform Resource Locators (URLs)). Este flujo de ejecución, que también puede ser una plantilla para permitir una configuración flexible en tiempo de ejecución, se implementa e interpreta como si fuera (y a través de) un Virtual Object (VO). El objetivo de la plantilla es que sea reutilizable y se pueda compartir entre múltiples despliegues de la IoT dentro del mismo dominio de aplicación. Debido a las tecnologías utilizadas, la solución no es adecuada para aplicaciones de tiempo crítico (umbral de tiempo relativamente bajo y rígido). Sin embargo, es adecuado para aplicaciones que no demandan respuesta en un tiempo crítico y que requieren el despliegue de VOs similares en cuanto al flujo de ejecución. Finalmente, el trabajo se enfoca en otra tecnología destinada a mejorar la escalabilidad y la capacidad de descubrimiento en la IoT. La SIoT está emergiendo como una nueva estructura de la IoT que une los nodos a través de relaciones significativas. Estas relaciones tienen como objetivo mejorar la capacidad de descubrimiento; en consecuencia, mejora la escalabilidad de una red de la IoT. En este trabajo se aplica este nuevo paradigma para optimizar la gestión de la energía en el lado de la demanda en las SGs. El objetivo es aprovechar las características de la SIoT para ayudar en la creación de Prosumer Community Groups (PCGs) (grupos de usuarios que consumen o producen energía) con el mismo objetivo de optimización en el uso de la energía. La sinergia entre la SIoT y las SGs ha sido denominada Social Internet of Energy (SIoE). Por lo tanto, con la SIoE y con el foco en un desafío específico, se establece la base conceptual para la integración entre la SIoT y las SG. Los experimentos iniciales muestran resultados prometedores y allanan el camino para futuras investigaciones y evaluaciones de la propuesta. Se concluye que la WoT y la SIoT son dos paradigmas complementarios que nutren la evolución de la próxima generación de la IoT. Se espera que la próxima generación de la IoT sea un Multi-Agent System (MAS) generalizado. Algunos investigadores ya están apuntando a la Web y sus tecnologías (por ejemplo,Web Semántica, HTTP/S)—y más concretamente a la WoT — como el entorno que nutra a estos agentes. La SIoT puede mejorar tanto el entorno como las relaciones entre los agentes en esta fusión. Como un campo específico de la IoT, las SGs también pueden beneficiarse de los avances de la IoT.
This thesis deals with two novel Internet of Things (IoT) technologies and their integration to the field of the Smart Grid (SG); these technologies are the Web of Things (WoT) and the Social Internet of Things (SIoT). The WoT is an enabling technology expected to provide a scalable and interoperable environment to the IoT using the existing web infrastructure, web protocols and the semantic web. The SIoT is expected to expand further and contribute to scalability and discoverability challenges by creating a social network of agents (objects and humans). When exploring the synergy between those technologies, we aim at providing practical and empirical evidence, usually in the form of prototype implementations and empirical experimentation. In relation to the WoT and SG, we create a prototype for the Web of Energy (WoE), that aims at addressing challenges present in the SG domain. The prototype is capable of providing interoperability and homogeneity among diverse protocols. The implementation design is based on the Actor Model, which also provides scalability in regards to the prototype. Experimentation shows that the prototype can handle the transmission of messages for time-critical SG applications. We also take another similar research direction less focused on the SG, but for a broader range of application domains. We integrate the description of flows of execution as Finite-State Machines (FSMs) using web ontologies (Resource Description Framework (RDF)) and WoT methodologies (actions are performed on the basis of calls Hyper Text Transfer Protocol/ Secure (HTTP/S) to a Uniform Resource Locator (URL)). This execution flow, which can also be a template to allow flexible configuration at runtime, is deployed and interpreted as (and through) a Virtual Object (VO). The template aims to be reusable and shareable among multiple IoT deployments within the same application domain. Due to the technologies used, the solution is not suitable for time-critical applications. Nevertheless, it is suitable for non-time-critical applications that require the deployment of similar VOs. Finally, we focus on another technology aimed at improving scalability and discoverability in IoT. The SIoT is emerging as a new IoT structure that links nodes through meaningful relationships. These relationships aim at improving discoverability; consequently, improving the scalability of an IoT network. We apply this new paradigm to optimize energy management at the demand side in a SG. Our objective is to harness the features of the SIoT to aid in the creation of Prosumer Community Group (PCG) (groups of energy users that consume or produce energy) with the same Demand Side Management (DSM) goal. We refer to the synergy between SIoT and SG as Social Internet of Energy (SIoE). Therefore, with the SIoE and focusing on a specific challenge, we set the conceptual basis for the integration between SIoT and SG. Initial experiments show promising results and pave the way for further research and evaluation of the proposal. We conclude that the WoT and the SIoT are two complementary paradigms that nourish the evolution of the next generation IoT. The next generation IoT is expected to be a pervasive Multi-Agent System (MAS). Some researchers are already pointing at the Web and its technologies (e.g. Semantic Web, HTTP/S) — and more concretely at the WoT — as the environment nourishing the agents. The SIoT can enhance both the environment and the relationships between agents in this fusion. As a specific field of the IoT, the SG can also benefit from IoT advancements.
35

Tsipenyuk, Gregory. "Evaluation of decentralized email architecture and social network analysis based on email attachment sharing." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/273963.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Present day email is provided by centralized services running in the cloud. The services transparently connect users behind middleboxes and provide backup, redundancy, and high availability at the expense of user privacy. In present day mobile environments, users can access and modify email from multiple devices with updates reconciled on the central server. Prioritizing updates is difficult and may be undesirable. Moreover, legacy email protocols do not provide optimal email synchronization and access. Recent phenomena of the Internet of Things (IoT) will see the number of interconnected devices grow to 27 billion by 2021. In the first part of my dissertation I am proposing a decentralized email architecture which takes advantage of user's a IoT devices to maintain a complete email history. This addresses the email reconciliation issue and places data under user control. I replace legacy email protocols with a synchronization protocol to achieve eventual consistency of email and optimize bandwidth and energy usage. The architecture is evaluated on a Raspberry Pi computer. There is an extensive body of research on Social Network Analysis (SNA) based on email archives. Typically, the analyzed network reflects either communication between users or a relationship between the email and the information found in the email's header and the body. This approach discards either all or some email attachments that cannot be converted to text; for instance, images. Yet attachments may use up to 90% of an email archive size. In the second part of my dissertation I suggest extracting the network from email attachments shared between users. I hypothesize that the network extracted from shared email attachments might provide more insight into the social structure of the email archive. I evaluate communication and shared email attachments networks by analyzing common centrality measures and classication and clustering algorithms. I further demonstrate how the analysis of the shared attachments network can be used to optimize the proposed decentralized email architecture.
36

Alves, Tiago Marcos. "Explorando a internet das coisas sociais utilizando NFC em um campus universitário." Universidade do Vale do Rio dos Sinos, 2015. http://www.repositorio.jesuita.org.br/handle/UNISINOS/4968.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Submitted by Silvana Teresinha Dornelles Studzinski (sstudzinski) on 2015-11-30T12:28:21Z No. of bitstreams: 1 TIAGO MARCOS ALVES_.pdf: 2097379 bytes, checksum: f4cd33a52ef54f387fff8437a89207e8 (MD5)
Made available in DSpace on 2015-11-30T12:28:21Z (GMT). No. of bitstreams: 1 TIAGO MARCOS ALVES_.pdf: 2097379 bytes, checksum: f4cd33a52ef54f387fff8437a89207e8 (MD5) Previous issue date: 2015-08-26
UNISINOS - Universidade do Vale do Rio dos Sinos
A Internet das Coisas (IoT) permite a interconexão de objetos inteligentes, tais como smartphones, tablets, televisores e sensores sem fio, com os seres humanos, usando diferentes protocolos de comunicação através do desenvolvimento de uma rede heterogênea multimodal dinâmica. Neste sentido a convergência da tecnologia de IoT com o conceito de redes sociais fez surgir um paradigma chamado Internet das Coisas Sociais (SIoT). Na SIoT, os objetos imitam comportamentos de seres humanos e criam seus próprios relacionamentos baseado em regras estabelecidas pelos seus proprietários. Nesse âmbito, este trabalho propõe a disponibilização de uma rede social que explore os conceitos de SIoT utilizando a tecnologia Near Field Communication (NFC). O modelo proposto define uma plataforma para lidar com a comunicação de objetos inteligentes em um campus universitário para benefício dos estudantes, professores e demais participantes da comunidade acadêmica. Neste modelo, a definição de objetos inteligentes é a de objetos que oferecem funcionalidades para interação com os seres humanos, tais como smartphones, tablets, refrigeradores e televisores. Como contribuição científica, este trabalho propõe uma rede social para objetos inteligentes com aplicação em um ambiente universitário, baseada na abordagem de SIoT. O modelo, denominado SIoTCampus, foca no uso dos inúmeros objetos existentes em um campus universitário, propondo um relacionamento entre estes com a finalidade de ser uma nova ferramenta para disseminar informações entre os membros que compõem a comunidade universitária, tais como professores, funcionários, alunos e visitantes. Dentre os cenários existentes de aplicações exclusivas para SIoT não foi observado uma aplicação para este tipo de relacionamento focada para um campus universitário. Desta forma, a proposta do modelo SIoTCampus é a de uma rede social exclusiva para objetos inteligentes em um ambiente acadêmico em que as informações de contexto, como localização, agenda, etc são usadas como critérios para estabelecer relacionamentos entre os dispositivos inteligentes. Configurações iniciais sobre preferências dos proprietários são informadas neste modelo em um aplicativo móvel desenvolvido para esta função. Assim, informações específicas sobre determinados assuntos, eventos publicados, notícias relevantes a determinados temas em um campus universitário, que forem capturados por estes objetos são enviadas a um servidor e analisadas de forma que estas informações possam ser ou não usadas para estabelecer relações entre estes objetos. Os resultados obtidos com a realização deste trabalho apresentaram uma arquitetura de comunicação que buscou lidar com os possíveis relacionamentos entre os objetos inteligentes presentes na universidade. A avaliação deste trabalho foi feita através da utilização de cenários visando explorar a ideia principal aqui descrita que é o relacionamento entre os objetos inteligentes. Alguns cenários para esta avaliação foram executados e aplicados a um grupo de estudantes do curso de Ciência da Computação da Universidade do Vale do Rio dos Sinos. Dentre os resultados alcançados cabe destacar que para 80% dos usuários que participaram desta avaliação o modelo pode se tornar uma importante ferramenta de integração entre os componentes do campus acadêmico. Outro ponto importante destacado para o perfil de participantes desta avaliação foi que o emprego da tecnologia NFC amplia as possibilidades de uso do modelo. Isto se justifica devido às novas formas de interação entre os dispositivos de usuários que poderiam ser atendidas pelo emprego desta tecnologia.
The Internet of Things (IoT) allows the interconnection of smart objects, such as smartphones, tablets, televisions and wireless sensors, with humans, using different communication protocols through the development of a heterogeneous multi-modal dynamic network. In this sense the convergence of IoT technology with the concept of social networks has given rise to a paradigm called Internet of Things Social (SIoT). In SIoT objects mimic behaviors of humans and create their own relationships based on rules established by its owners. In this context, this paper proposes the provision of a social network that explore the concepts of SIoT using Near Field Communication (NFC) technology. The proposed model defines a platform to handle communication of smart objects on a college campus for the benefit of students, teachers and other participants from the academic community. In this model, the definition of the smart objects are objects that provide functionality for interacting with humans, such as smartphones, tablet, refrigerators and televisions. As a scientific contribution this paper proposes a social network for smart objects with application in a university setting, based on the approach of SIoT. The model, called SIoTCampus, focuses on the use of several existing objects on a college campus, suggesting a relationship between these in order to be a new tool to disseminate information among the members of the university community, including faculty, staff, students and visitors. Among the existing scenarios of unique applications for SIoT, it was not observed an application for this kind of focused relationship to a college campus. Thus the proposal of SIoTCampus model is an exclusive social network for smart objects in an academic environment in which context information such as location, calendar, etc. are used as criteria for establishing relationships between intelligent devices. Initial settings on preferences of owners are informed in this model in a mobile application developed for this function. So specific information about certain subjects, published events, relevant news certain topics on a college campus, which are captured by these objects are sent to a server and analyzed so that this information may or may not be used to establish relationships between these objects. The results of this work showed a communications architecture that sought to deal with the possible relationships between intelligent objects present at the university. The assessment of this work was done through the use of scenarios to explore the main idea here is that described the relationship between Smart Objects. Some scenarios for this assessment were implemented and applied to a group of students of Computer Science Course of the Universidad do Vale do Rio dos Sinos. Among the results we highlight that for 80% of users who participated in this evaluation found that the model can become an important integration tool among members of the academic campus. Another important point highlighted to the participants profile of this evaluation was that the use of NFC technology expands the model of using possibilities. This is justified due to new forms of interaction between devices of users that could be met by the use of this technology.
37

Pacheco, Fabiana Beal. "Modelos de negócio para produtos/serviços baseados em internet das coisas: o caso de uma empresa de automação residencial." Universidade do Vale do Rio dos Sinos, 2015. http://www.repositorio.jesuita.org.br/handle/UNISINOS/4884.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Submitted by Silvana Teresinha Dornelles Studzinski (sstudzinski) on 2015-10-23T14:44:19Z No. of bitstreams: 1 Fabiana Beal Pacheco_.pdf: 1625052 bytes, checksum: f8aba4b963587ce97156993ac679d2d9 (MD5)
Made available in DSpace on 2015-10-23T14:44:19Z (GMT). No. of bitstreams: 1 Fabiana Beal Pacheco_.pdf: 1625052 bytes, checksum: f8aba4b963587ce97156993ac679d2d9 (MD5) Previous issue date: 2015-05-29
Nenhuma
A Internet das Coisas (IoT) é uma evolução dentro do paradigma de computação ubíqua, que consiste na presença pervasiva de objetos e “coisas” inteligentes ao nosso redor. A IoT inspira um novo modelo de negócios, o qual força as organizações de vários setores a ajustar suas estratégias, a fim de obter sucesso no mercado digital que se expandirá cada vez mais. Muitas empresas enfrentam dificuldades de entender a complexidade sem precedentes de desenvolver modelos de negócio adequados à evolução das tecnologias digitais. Desta forma, o presente estudo teve como objetivo analisar como pode ser definido um modelo de negócio para produtos e serviços baseados em IoT, identificando os elementos mais relevantes e os facilitadores e as barreiras existentes neste contexto tecnológico. Para a presente pesquisa adotou-se uma abordagem qualitativa, de nível exploratório, tendo como método de pesquisa a metodologia baseada em design - a Design Research (DR). A DR foi utilizada para instanciação de um modelo de negócio, seguindo o Business Model Canvas, para um produto baseado em IoT. Para obtenção de dados empíricos, o estudo foi realizado em uma empresa de desenvolvimento de produtos eletrônicos, mais especificamente, na linha de automação residencial. As atividades realizadas com a empresa, as quais compreenderam sessões de trabalho e entrevistas semiestruturadas, tiveram como propósito compreender o problema a ser tratado na pesquisa, levantar a motivação da empresa em abordá-lo, realizar o desenho do modelo de negócio e, posteriormente, executar a validação do mesmo, assim como avaliar o método de pesquisa utilizado. Os principais resultados indicam que um modelo de negócio para produtos e serviços baseados em IoT podem ser gerados a partir do Business Model Canvas, porém possuem elementos específicos que precisam ser considerados, especialmente relacionados com aspectos tecnológicos advindos de IoT e a oferta de serviços integrados ao produto. Além disso, foram identificados oito facilitadores e sete barreiras para a geração de modelos de negócio para IoT, que contribuem tanto para enriquecer a literatura sobre o tema, como referência para os gestores no momento da concepção de novos modelos de negócios para produtos e serviços baseado em IoT.
The Internet of Things (IoT) is an evolution from ubiquitous computing, which concept is the pervasive presence around us of a variety of smart objects and things. The IoT inspires innovative business models, which forces organizations across industries to adjust their strategies in order to succeed in digital market environments. Many companies have difficulties to capture the unprecedented complexity and to develop adequate business models to address digital innovation. In this way, this study aims to analyze how a business model to Internet of Things (IoT) products and services can be generated, identifying key components, opportunities and challenges that could be faced in such technological context. A qualitative approach, in an exploratory level, was chosen to be followed as well as a design science method, named as Design Research (DR). The DR was applied to instantiate a business model to an IoT product, having Business Model Canvas as guidance. In order to get empirical data and evidence, this study was conducted in an electronic solutions company, focused on home automation. Several activities were executed along with managers of this company, which included work sessions and semi-structured interviews. The purpose of these activities were understanding the problem to be addressed during the research and the motivation behind this initiative, designing a business model, and validating it and the research method applied afterwards. This research main outcomes suggest that a business model to IoT products and services could be generated from the Business Model Canvas, although there are specific elements that need to be considered, especially those related to technological matters and an integrated product and services offering. Besides that, there have been found eight opportunities and seven challenges concerning business model generation to IoT, which contributes as an enhancement to this topic literature and as reference to managers when conceiving new business models to IoT products and services.
38

Alam, Kazi Masudul. "Towards Cloud-based Vehicular Cyber-physical Systems." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36227.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
We are living in the age of information technology, where we are fully occupied with the revolutionary innovations of the last few decades such as the Internet, mobile devices, wireless communications, social networks, wearables, cloud computing, etc. While these technologies have become integral part of our daily life, we are now anxiously waiting to embrace Internet-of-Things (IoT), intelligent digital assistants, driver-less cars, drone deliveries, virtual reality, and smart city applications. Recently, research community is demonstrating increasing interests about Cyber-Physical Systems (CPS) that resides in the cross-section of embedded systems, network communications, and scalable distributed infrastructures. The main responsibility of a CPS is to collect sensory data about the physical world and to inform the computation module using communication technologies that processes the data, identifies important insights and notifies back using a feedback loop. These notifications can however be control commands to reconfigure the physical world. Such a setup is a useful method to deploy smart city applications. In this dissertation, we keep our focus onto the smart transport objective using vehicular CPS (VCPS) based systems organization. We have compiled this dissertation with our research contributions in this growing field of VCPS. One of our key contributions in this field is an architecture reference model for the cloud-based CPS, C2PS, where we analytically describe the key properties of a CPS: computation, communication and control, while integrating cloud features to it. We have identified various types of computation and interaction modes of this paradigm as well as describe Bayesian network and fuzzy logic based smart connection to select a mode at any time. It is considered that the true adoption of CPS is only possible through the deployment of the IoT systems. Thus, it is important to have IoT as a foundation in the CPS architectures. Our next contribution is to leverage existing Vehicular Adhoc Network (VANET) technologies and map them with the standard IoT-Architecture reference model to design the VCPS, Social Internet-of-Vehicles (SIoV). In this process, we have identified the social structures and system interactions among the subsystems involved in the SIoV. We also present a message structure to facilitate different types of SIoV interactions. The ability of dynamic reconfiguration in a C2PS is very appealing. We capture this feature in the VCPS by designing a model-based reconfiguration scheme for the SIoV, where we measure the data workloads of distinct subsystems involved in various types of SIoV interactions. We further use these models to design dynamic adaptation schemes for the subsystems involved in VCPS interactions. Our final contribution is an application development platform based on C2PS design technique that uses server-client based system communications. In this platform, server side is built using JAVA, client side uses Android, message communication uses JSON and every component has its own MySQL database to store the interactions. We use this platform to emulate and deploy SIoV related applications and scenarios. Such a platform is necessary to continue C2PS related research and developments in the laboratory environment.
39

Pretorius, Daniel Arnoldus. "Factors that affect digital transformation in the telecommunication industry." Thesis, Cape Peninsula University of Technology, 2019. http://hdl.handle.net/20.500.11838/3023.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (MTech (Business Information Systems))--Cape Peninsula University of Technology, 2019
The internet, mobile communication, social media, and other digital services have integrated so much into our daily lives and businesses alike. Companies facing digital transformation experience this as exceptionally challenging. While there are several studies that state the importance of digital transformation and how it influences current and future businesses, there is little academic literature available on factors that affect the success or failure of digital transformation in companies. It is unclear what factors affect digital transformation in an established telecommunications company. The aim of this study was therefore to explore the factors that affect digital transformation in a telecommunications company in South Africa, and to what extent. One primary research question was posed, namely: “What factors affect digital transformation in a telecommunications company in South Africa?” To answer the question, a study was conducted at a telecommunications company in South Africa. The researcher adopted a subjective ontological and interpretivist epistemological stance, as the data collected from the participants’ perspective were interpreted to make claims about the truth, and because there are many ways of looking at the phenomena. An inductive approach was selected to enable the researcher to gain in-depth insight into the views and perspective of factors that influence digital transformation in the specific company. The explorative research strategy was used to gain an understanding of the underlying views, reasons, opinions, and thoughts of the 15 participants by means of semi-structured interviews. The participants were made aware that they do not have to answer any question if they are uncomfortable, and they could withdraw their answers at any time. The data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, 36 findings were identified. From this research, it was inter alia concluded that successful digital transformation of companies depends on how Management drives digital transformation, and the benefits of new digital technologies should be carefully considered when planning to implement digital transformation.
40

Anantharam, Pramod. "Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social Systems." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1464417646.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Kazeem, Ganiat Omolara. "Technology In Policing : An ethnographic study of the use of information and communication technology within Bedfordshire police force." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-76419.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Policing in The United Kingdom is an intricate business, balancing the enforcement of statute and other laws while dealing with public safety and security. Policing engages a diverse and complicated set of organisational structures and processes relying heavily on the skill and expertise of officers on the ground. Their role in preventing and or intercepting crime before, during and after it occurs is integral to sustaining peace, security, law and order in communities. The police operational and logistics staff work day to day with information and communication technologies, ranging from conventional databases and information systems to ubiquitous and specialised tools.  Understanding the use of technology and its management in policing has formed the backbone of this research conducted through a qualitative approach. This study adopted an interpretive paradigmic analytical lens using ethnography situated in the workplace as a methodology. The qualitative study took the form of field immersion for nine months using interviewing, and shadowing/observation to suit the complexity of the socio-technical context. Analysis was conducted using thematic analytical methods. Understanding how the police force interact with and shape the way that information and communication technologies enable them to fight crime is, then, the subject of this thesis. The findings highlighted the complexities and  intricacies involved in the use of technology, identifying unique differentiations in the way technology is engaged and integrated into policing including comparative understanding relative to other sectors and industries.  On the whole the central features of this work highlight understanding of the role information and communication technologies; usefulness, usage in practice and operational activity, strategic business goals, knowledge management, business intelligence and intelligence led architecture, governance and performance models in policing the county of Bedfordshire, England.
42

Attié, Elodie. "The connected consumer : A theoretical framework of consumer adoption/consequences of the Internet of Things and smart connected objects." Thesis, Toulouse 1, 2019. http://www.theses.fr/2019TOU10048.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Le résumé en français n'a pas été communiqué par l'auteur
Over the last decade, technological and Internet innovations have increasingly invaded the consumer market (N’Goala, 2016). The Internet of Things (IoT) is becoming a common platform, and disrupts relationships between consumers and companies (Bohli et al., 2009); in essence, this is a timely research. The major goal of this thesis is to deepen the understanding of the acceptance and the adoption processes of the IoT and smart connected technologies, as well as the related consequences on perceived well-being. To do this, four contexts of study have been explored: smart connected objects, smart sleep applications, smart homes, and smart stores. First, we performed qualitative exploratory studies, and secondly we conducted quantitative studies to build conceptual models according to our qualitative findings and the literature. The results show that technology benefits are the first factors that enable technology acceptance through perceived usefulness and perceived ease of use; subsequently, self-improvement, through perceived social image and well-being benefits, are the main reasons to continue using the IoT and smart connected technologies. The acceptance and the adoption of these technologies also depend on users’ personality traits while perceived risks and fears on the use of the personal data are the main barriers. In turn, the IoT and smart connected technologies influence perceived well-being according to the experience of use, personality traits, and the technology
43

Riaño, Diana Patricia Riaño. "Integração de dados estatísticos sociais no desenvolvimento de uma possível arquitetura para a internet das coisas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-20122016-081503/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Os objetivos deste trabalho de mestrado consistem em determinar: (i) como modificar a arquitetura de referência de Internet das Coisas para identificar e priorizar as necessidades dos usuários em um determinado contexto; (ii) como transformar dados sociais subjetivos em uma medida objetiva de impacto social; (iii) como correlacionar informações sociais e dados digitais de forma a medir a satisfação dos usuários com os serviços de Internet das Coisas desenvolvidos; (iv) como validar o sistema total; e (v) se a arquitetura é reconfigurável e pode ser adotada e validada em diferentes casos de uso. O método de desenvolvimento começa de uma extensa investigação bibliográfica sobre projetos, arquiteturas e plataformas de Internet das Coisas desenvolvidas e em desenvolvimento, tecnologia social e teoria de grafos. É proposto um mapa conceitual que serve de base a todo o trabalho. A teoria de grafos fornece um conjunto de métricas que permite identificar as reais necessidades de usuários e comunidades e, então, especificar as aplicações e serviços de Internet das Coisas a serem desenvolvidos. ´E proposta uma função de fitness para avaliar a satisfação de requisitos de uma especificação. A validação do método é feita por meio de um estudo de caso. Para uma cidade hipotética são descritos os serviços educacionais, de saúde e de transporte disponíveis. É identificado o problema de oferecimento de serviços educacionais a comunidades distantes e a necessidade desses serviços se integrarem com as entidades culturais e de saúde. Com isso, ´e especificada a aplicação Aula Móvil. Essa aplicação é completamente descrita por meio dos modelos de domínio, de informação, funcional e de comunicação da arquitetura de referência IoT-A. Para o desenvolvimento do software, é feita uma descrição completa em UML: diagrama de classes e diagramas de sequência. Apesar de se ter adotado um estudo de caso simples, fica demonstrada a viabilidade de se integrar a avaliação de dados estatísticos sociais no ciclo de projeto de aplicações de Internet das Coisas. ´E mostrado também que as aplicações de Internet das Coisas geram impacto social a curto, médio e longo prazos. O método e arquitetura propostos neste trabalho são suficientemente genéricos para serem utilizados em outras aplicações relacionadas a uma cidade e também em outros domínios como os de M2M e da iniciativa Industry 4.0.
The objectives of this master thesis consist in determining: (i) how modify an IoT reference architecture to identify and prioritize end user\'s needs in a given context; (ii) how transform subjective social data in a objective measure of social impact; (iii) how correlate social data and digital data to measure the end users\' satisfaction with the developed IoT services; (iv) how validate the total system; and (v) if the architecture is reconfigurable and can be adopted and validated in di?erent use cases. The development method started with and extensive bibliographic research about IoT projects, architectures and platforms, already developed and under development, social technology and graphs theory. A conceptual map is proposed and is used as a basis for the entire work. The graphs theory provides a set of metrics that allow the identification of end users\' and communities\' needs and, then, to specify the IoT applications and services to be developed. A fitness function is proposed to evaluate the fulfillment of requirements of a specification. The whole method validation is made by means of a case study. To do so, the available educational, health and transport services of a hypothetical city are described. The problem of o?ering educational services to distant communities and the need to integrate such services to the cultural and health entities are identified. As a result, a Mobile Class application is specified. This application is completely described by the domain, informational, functional and communicational models of the IoT-A reference architecture. For the software development, a complete UML description is made: class diagrams and sequence diagrams. In spite of having adopted a simple case study, the feasibility of integrating the social statistical data evaluation in the design cycle of IoT applications is demonstrated. It is also shown that IoT applications generate social impact in the short, medium and large terms. The method and architecture proposed in this work are generic enough to be used in other applications related to a city as is other domains as M2M and from the Industry 4.0 Initiative.
44

Elvin, Nicklas, and Frida Nilsson. "Barriärer för digital transformation : En kvalitativ fallstudie i försäkringsbranschen." Thesis, Umeå universitet, Institutionen för informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-171106.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The entry of information technology into our homes and workplaces has changed our way of life. Technologies such as the Internet of Things and Artificial Intelligence are increasingly being used by companies today as means to create new smart services. Digital transformation is happening here and now across many industries. A digital transformation involves a major change in the company and its business model with the aim of creating value. Due to the extensive nature of the digital transformation, there are good incentives to thoroughly investigate existing barriers before a change work can begin. Many studies have been conducted aimed at examining barriers to digital development in, for example, the production industry, but few studies have been conducted aimed at examining barriers within the service sector. This study aims to investigate the barriers that can hamper a digital transformation of an insurance company. In order to answer this research question, a case study was conducted with five semi-structured interviews with informants at an insurance company. The results show that several different barriers exist, most of which can be linked to technical, environmental, organizational and cultural barriers.
45

Martof, Jan. "Návrh změn marketingové komunikace vybrané společnosti na Internetu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318314.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The purpose of this thesis is to propose changes of marketing strategy on the Internet. Based on theoretical knowledge and general analysis of competitors online communication have been proposed particular elements of SEO. Many of these proposals can be practically used. Results of this work can help optimize own website, start PPC campaign or just to be solid groud for other marketing activities on the Internet.
46

Igelmo, Victor. "Context-aware augmented reality experiences using cloud-based systems." Thesis, Högskolan i Skövde, Institutionen för ingenjörsvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19172.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The new reality is about connectivity. From social media to collaborative tools in work environments, people and their devices are highly intercommunicated. This reality also affects the manufacturing industry, which has been developing standards to keep up with technology and take advantage of it. These technologies are encompassed in what has been called Industry 4.0. Out of all the technologies, apart from artificial intelligence, the main drives of Industry 4.0 are considered by many studies augmented reality (AR) and industrial internet of things (IIoT). This thesis suggests that these drivers have been mostly tested either in an isolated fashion or with limited connectivity. The main objective is to explore the advantages of connecting AR, IIoT, and the main source of information in the manufacturing process: product lifecycle management (PLM) systems. Two sub-objectives are extracted from the main one: to study of value created from real-time role-dependent AR information displaying, and to study how the connection AR-IIoT-PLM can affect developing and deploying times of AR experiences. To achieve the mentioned objectives, a case of study is built, and the combined system implemented on it. Following design and creation methodology, an artefact is created, and conclusions are extracted from the design, implementation, and usage stages. Main results are an improvement in developing and deploying time of AR experiences, along with guidelines to extract as much value as possible from the implementation of a combined system of this sort. This thesis includes a discussion section, where the potential of the system is explained and framed within the near future of manufacturing companies.
47

Domanski, Mikolaj. "The concept of a smart hotel and its impact on guests’ satisfaction, privacy and the perception of the service quality." Thesis, Södertörns högskola, Turismvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-41848.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Smart technology has become very extensive and popular in many areas of our lives in the last few years. Their role is to make life and activities performed by the user easier, faster, better and more interesting. Smart technology has been used for years in areas such as education, industry and transport. The response of the hospitality industry is to implement technology in hotels, usually the more luxurious ones, that improves the operation of employees and is a convenience for hotel guests. The name of this concept is a smart hotel, which is similar to the already existing smart house and smart city concepts. The purpose of the study was to examine the concept of smart hotel and investigate the impact that smart technology has on guests’ satisfaction, privacy and service quality. The study was conducted using mixed methods research whereby both qualitative and quantitative data were collected in parallel, analyzed individually and then linked with each other. Qualitative data collection constituted of in-dept interviews with hotel employees and hotel guests, and the quantitative part of the study was based on the online survey with hotel guests. The main findings are a proposal definition of a smart hotel, and the belief that smart technology contributes to a better quality of provided services by employees and increases the grade of satisfaction among guests. However, the result also shows that a greater role of hotels is needed in order to reduce the disproportion of equal access to smart technology for all hotel guests.
48

Botero, Oscar. "Heterogeneous RFID framework design, analysis and evaluation." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0011.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Le paradigme de l'Internet des choses établit l'interaction et la communication avec une énorme quantité d'acteurs. Le concept combine un grand nombre de technologies et de protocoles et des adaptations des éléments préexistants pour offrir de nouveaux services et applications. Une des technologies clés de l'Internet des objets est l'identification par radiofréquence abrégée en anglais RFID («Radio Frequency Identification»). Elle propose un ensemble de solutions qui permettent le suivi et la traçabilité des personnes, des animaux et pratiquement n'importe quel objet en utilisant des liaisons sans fil. En considérant le concept de l'Internet des choses, plusieurs technologies doivent être liées afin de fournir des interactions qui conduisent à la mise en œuvre de services et d'applications. Le défi est que ces technologies ne sont pas nécessairement compatibles et conçues pour fonctionner ensemble. Dans ce contexte, l'objectif principal de cette thèse est de concevoir un « framework » hétérogène qui permettra l'interaction de divers dispositifs tels que la RFID, des capteurs et des actionneurs afin de fournir de nouvelles applications et de services. À cet effet, notre première contribution est la conception et l'analyse d'une architecture d'intégration pour les dispositifs hétérogènes. Dans la seconde contribution, nous proposons un modèle d'évaluation de la topologie RFID et un outil d'optimisation pour la planification de réseaux de cette technologie. Enfin, nous avons implémenté une version simplifiée du framework en utilisant du matériel embarqué et indicateurs de performance sont fournis ainsi que la configuration détaillée de la plateforme de test
The Internet of Things paradigm establishes interaction and communication with a huge amount of actors. The concept is not a new-from-scratch one; actually, it combines a vast number of technologies and protocols and surely adaptations of pre-existing elements to offer new services and applications. One of the key technologies of the Internet of Things is the Radio Frequency Identification just abbreviated RFID. This technology proposes a set of solutions that allow tracking and tracing persons, animals and practically any item wirelessly. Considering the Internet of Things concept, multiple technologies need to be linked in order to provide interactions that lead to the implementation of services and applications. The challenge is that these technologies are not necessarily compatible and designed to work with other technologies. Within this context, the main objective of this thesis is to design a heterogeneous framework that will permit the interaction of diverse devices such as RFID, sensors and actuators in order to provide new applications and services. For this purpose in this work, our first contribution is the design and analysis of an integration architecture for heterogeneous devices. In the second contribution, we propose an evaluation model for RFID topologies and an optimization tool that assists in the RFID network planning process. Finally, in our last contribution, we implemented a simplified version of the framework by using embedded hardware and performance metrics are provided as well as the detailed configuration of the test platform
49

Botero, Oscar. "Heterogeneous RFID framework design, analysis and evaluation." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00714120.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The Internet of Things paradigm establishes interaction and communication with a huge amount of actors. The concept is not a new-from-scratch one; actually, it combines a vast number of technologies and protocols and surely adaptations of pre-existing elements to offer new services and applications. One of the key technologies of the Internet of Things is the Radio Frequency Identification just abbreviated RFID. This technology proposes a set of solutions that allow tracking and tracing persons, animals and practically any item wirelessly. Considering the Internet of Things concept, multiple technologies need to be linked in order to provide interactions that lead to the implementation of services and applications. The challenge is that these technologies are not necessarily compatible and designed to work with other technologies. Within this context, the main objective of this thesis is to design a heterogeneous framework that will permit the interaction of diverse devices such as RFID, sensors and actuators in order to provide new applications and services. For this purpose in this work, our first contribution is the design and analysis of an integration architecture for heterogeneous devices. In the second contribution, we propose an evaluation model for RFID topologies and an optimization tool that assists in the RFID network planning process. Finally, in our last contribution, we implemented a simplified version of the framework by using embedded hardware and performance metrics are provided as well as the detailed configuration of the test platform
50

Chih-HsiangShao and 邵致翔. "A Group Handoff Scheme for Proximate Data Sharing Using the Social Internet of Thing (S-IOT) Mechanism." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/71930925312618906682.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
碩士
國立成功大學
資訊工程學系
105
Internet of Things (IOT) emerge in large numbers surrounding us and it has already been along with us everywhere. The things not only communicate with each other without human intervention but also own some relationships called Social IOT (S-IOT), which is the same as social relationships of human beings. In this work, architecture and scheme for a group handoff from a mobile AP to a fixed AP and vice versa, for which the group is for downloading and sharing of geo touring information, e.g., Point Of Interest’s (POI’s), using the proposed S-IOT mechanism. Using the proposed mechanism, all handheld devices in a touring group can communicate with each other and then have the group handoff from a mobile AP to a fixed AP and vice versa automatically and transparently to provide the required POI’s content in a more efficient way. This work (1) defines an S-IOT architecture and two functional scenarios called m-AP mode and f-AP mode for group touring, (2) proposes two control schemes called conservative mode and aggressive mode to handle the handoff from m-AP mode to f-AP mode, and (3) provides control schemes for handoff from m-AP mode to f-AP mode and vice versa. A real system is developed using the Android system and the performance analysis is evaluated from the perspective of power consuming, service time, etc.

До бібліографії