You searched for subject:(Internet of Things management concern)
.
Showing records 1 – 30 of
397656 total matches.
◁ [1] [2] [3] [4] [5] … [13256] ▶

University of North Texas
1.
Aldossari, Mobark.
Three Essays on Internet of Things Adoption and Use.
Degree: 2019, University of North Texas
URL: https://digital.library.unt.edu/ark:/67531/metadc1505259/
► Internet of Things (IoT) is a promising technology with great potential for individuals, society, governments, and the economy. IoT is expected to become ubiquitous and…
(more)
▼ Internet of
Things (IoT) is a promising technology with great potential for individuals, society, governments, and the economy. IoT is expected to become ubiquitous and influence every aspect of everyday experience. Thus, IoT represents an important phenomena for both organizational and behavioral information system (IS) researchers. This dissertation seeks to contribute to IS research by studying the aspects that influence IoT adoption and use at both consumer and organizational levels. This dissertation achieves this purpose in a series of three essays. The first essay focuses on IoT acceptance in the context of smart home. The second essay focuses on examining the effect of artificial intelligence (AI) capabilities on consumers' IoT perceptions and intentions. Finally, the third essay focuses on the organizational investment and adoption of IoT technologies.
Advisors/Committee Members: Sidorova, Anna, Evangelopoulos, Nicholas, Torres, Russell.
Subjects/Keywords: Internet of Things (IoT); Internet of Things adoption; Internet of Things investment; Internet of Things management concern; Organizational Internet of Things; Smart home; Artificial intelligence
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share






Oregon State University
2.
Abdelwahab, Sherif.
Architectures and Algorithms for Dynamic Overlay Networks.
Degree: PhD, 2017, Oregon State University
URL: http://hdl.handle.net/1957/61784
► Most of today’s Internet of Things (IoT) applications assume that data will be moved off devices into centralized cloud platforms. While existing IoT systems leverage…
(more)
▼ Most of today’s
Internet of
Things (IoT) applications assume that data will be moved off
devices into centralized cloud platforms. While existing IoT systems leverage cloud-based analytics for meaningful data reasoning, the assumption that data should always be moved off the devices is problematic. The amount of data to be moved from devices over
Internet gateways to cloud platforms is huge which potentially make it cost inefficient. In other scenarios, privacy concerns of customers or organizational rules complicate the process of transferring data to third-party data centers.
This dissertation proposes architectures and dynamic overlay network algorithms for in-network
and edge processing of data offered by the globally available IoT devices and provides a global platform for meaningful and responsive data analysis and decision making. The proposed techniques shift IoT analytics from a ”collect data now and analyze it later” scenario to directly
providing meaningful information from the in-network processing of devices data at or near the
devices. The techniques serve future IoT use cases including distributed context awareness, on-demand data analysis, and in-network decision making. The dissertation comprises three main components.
The first component is a device
management protocol for cloning devices’ data in proximate
Edge Computing platforms. Unlike existing application-layer IoT
management protocols the
proposed protocol uses the LTE/LTE-A radio frame structure, device-to-device communication,
and IoT data properties to avoid excessive network access latency in existing technologies.
The second component realizes distributed IoT analytics as overlay networks of devices clones. By means of virtual network embedding, it selects and interconnects devices’ clones to efficiently realize applications’ virtual topologies to achieve goals such as minimum latency, minimum infrastructure cost, or maximum infrastructure utilization.
Finally, the dissertation presents a communication middleware that allows autonomous discovery, self-deployment, and online migration of devices’ clones across heterogeneous Edge computing platforms. The middleware ensures that communication latency between clones is kept minimum despite the uncontrolled variability of the network and hosting platforms conditions.
We evaluate the proposed architectures and algorithms through simulations and prototype
implementation of various components in controlled testbed environments, which we evaluate
using real user applications. We explore the feasibility of the proposed techniques from both
theoretical and practical perspectives.
Advisors/Committee Members: Hamdaoui, Bechir (advisor), Lee, Ben (committee member).
Subjects/Keywords: Internet of Things
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Abdelwahab, S. (2017). Architectures and Algorithms for Dynamic Overlay Networks. (Doctoral Dissertation). Oregon State University. Retrieved from http://hdl.handle.net/1957/61784
Chicago Manual of Style (16th Edition):
Abdelwahab, Sherif. “Architectures and Algorithms for Dynamic Overlay Networks.” 2017. Doctoral Dissertation, Oregon State University. Accessed April 21, 2021.
http://hdl.handle.net/1957/61784.
MLA Handbook (7th Edition):
Abdelwahab, Sherif. “Architectures and Algorithms for Dynamic Overlay Networks.” 2017. Web. 21 Apr 2021.
Vancouver:
Abdelwahab S. Architectures and Algorithms for Dynamic Overlay Networks. [Internet] [Doctoral dissertation]. Oregon State University; 2017. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/1957/61784.
Council of Science Editors:
Abdelwahab S. Architectures and Algorithms for Dynamic Overlay Networks. [Doctoral Dissertation]. Oregon State University; 2017. Available from: http://hdl.handle.net/1957/61784

Halmstad University
3.
KALYONCU, Samet.
Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks.
Degree: Computer and Electrical Engineering (IDE), 2013, Halmstad University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27158
► Internet of Things, is a new expression described as the future of the internet, promises a new world surrounded by tiny smart objects interacting…
(more)
▼ Internet of Things, is a new expression described as the future of the internet, promises a new world surrounded by tiny smart objects interacting with the environment, communicating with each other, and controlled over internet. Investigating which low power wireless solution and authentication mechanism fits best for IoT networks, and applying these technologies on simulator and real hardware is the main task of this project. Bluetooth Low Energy, ANT, 6LoWPAN and ZigBee are investigated low power wireless technologies which might be used to create an IoT network. Yet, BLTE and ANT have narrower application areas compared to the others, therefore ZigBee and 6LoWPAN technologies are investigated in depth and compared as the 2 promising solutions for implementation and integration of Internet of things concept. SPINS, TinySec, TinyECC, SenSec, MiniSec, ContikiSec and AES CCM are the main security frameworks especially designed for wireless sensor networks providing confidentiality, authentication and integrity. These frameworks were described and compared to find out most suitable authentication mechanism for IoT networks. Contiki OS is used as the operating system of nodes during the implementation of network both on simulator Cooja and real hardware. ZigBee and 6LoWPAN were compared considering interoperability, packet overhead, security and availability. As a result 6LoWPAN came forward due to providing high interoperability and slightly less packet overhead features. ZigBee devices require extra hardware to operate with different technologies. Among the discussed security frameworks, ContikiSec and AES CCM were highlighted because of flexibility, providing different levels of security. Resource limited characteristic and diversity of IoT applications make flexibility a very useful feature while implementing a security framework. Experiments committed to implement a working IoT network were not hundred percent successful. 6LoWPAN was successfully implemented but implementation of the security framework was failed due to compatibility issues between the sensor and the router node. Firmware of the sensor node is not designed to provide any kind of security, therefore security features of the router node is also disabled.
Subjects/Keywords: Internet of things
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
KALYONCU, S. (2013). Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks. (Thesis). Halmstad University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27158
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
KALYONCU, Samet. “Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks.” 2013. Thesis, Halmstad University. Accessed April 21, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27158.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
KALYONCU, Samet. “Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks.” 2013. Web. 21 Apr 2021.
Vancouver:
KALYONCU S. Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks. [Internet] [Thesis]. Halmstad University; 2013. [cited 2021 Apr 21].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27158.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
KALYONCU S. Wireless Solutions and Authentication Mechanisms for Contiki Based Internet of Things Networks. [Thesis]. Halmstad University; 2013. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-27158
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
4.
Maria Luiza Burgarelli Alves dos Santos.
FLAT: Federated Lightweight Authentication of Things.
Degree: 2018, Universidade Federal de Minas Gerais; UFMG
URL: http://hdl.handle.net/1843/ESBF-B6QGC7
► Exportado OPUS
Made available in DSpace on 2019-08-13T18:00:31Z (GMT). No. of bitstreams: 1 marialuizabulgarellialvesdossantos.pdf: 1946562 bytes, checksum: fe9f871ea38673c2f0effc3d72d8c16a (MD5) Previous issue date: 13
A autenticação…
(more)
▼ Exportado OPUS
Made available in DSpace on 2019-08-13T18:00:31Z (GMT). No. of bitstreams: 1 marialuizabulgarellialvesdossantos.pdf: 1946562 bytes, checksum: fe9f871ea38673c2f0effc3d72d8c16a (MD5) Previous issue date: 13
A autenticação de dispositivos e o controle de acesso aos recursos disponíveis na rede é um dos atuais desafios em IoT. Neste sentido, é essencial que exista um modelo de gestão de identidades para IoT que contemple as características específicas deste contexto, especialmente quando consideramos as restrições computacionais dos dispositivos e sua potencial mobilidade entre domínios. Como solução para este problema é proposto o FLAT, um protocolo de autenticação federada para IoT. FLAT associa: o uso de apenas criptografia simétrica no Cliente, a substituição de criptossistemas tradicionais como o RSA/DSA por criptossistemas equivalentes baseados em curvas elípticas, e o uso de certificados implícitos. O dispositivo Cliente no
FLAT é mais eficiente do que a solução baseline em total de dados trocados e em tempo de computação. FLAT também é capaz de reduzir o total de dados transmitidos em cerca de 31% em relação à solução baseline, sendo uma alternativa leve para autenticação em IoT.
The Internet of Things (IoT) applications and technologies have been modifying the way people and businesses interact. The IoT growth, however, is followed by several challenges. Among them, a critical aspect in IoT is the authentication of devices and its access control to the available network resources. The Identity Management (IdM) provides means to manage identities of devices and users, being also responsible for the authentication and authorization tasks. In this sense, it is essential to IoT the development of an IdM model that contemplates the specific characteristics of this context, especially considering the computational and storage restrictions of devices and their potential mobility between different domains.
Nowadays, widely used IdM solutions are based on asymmetric cryptography, and thus, require more computation and storage from devices, which is not a desirable approach in restricted devices, commonly found in IoT scenarios. As a solution to this problem, it is proposed FLAT, a federated authentication protocol for IoT. FLAT associates: (i) the use of only symmetric cryptosystems in the Client side, (ii) the replacement of traditional cryptosystems such as RSA/DSA by equivalent cryptosystems based on elliptic curves, and (iii) the use of implicit certificates, providing a lightweight solution for authenticating restricted devices. The results show that FLAT can reduce the data exchange overhead in around 31% when compared to the baseline solution. FLAT's Client is also more efficient than the baseline solution in terms of data transmitted, data received, total data exchange, and computation time. FLAT offers an alternative to IoT scenarios where the device authentication between
different domains is necessary, and can be executed even in devices with computational and storage restrictions.
Advisors/Committee Members: Leonardo Barbosa e Oliveira, Marco Aurelio Amaral Henriques, João Guilherme Maia de Menezes, Daniel Fernandes Macedo, Marco Aurelio Amaral Henriques, Jean Everson Martina.
Subjects/Keywords: Authentication; Internet of Things; Federated Identity Management; Computação; Internet das coisas
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Santos, M. L. B. A. d. (2018). FLAT: Federated Lightweight Authentication of Things. (Masters Thesis). Universidade Federal de Minas Gerais; UFMG. Retrieved from http://hdl.handle.net/1843/ESBF-B6QGC7
Chicago Manual of Style (16th Edition):
Santos, Maria Luiza Burgarelli Alves dos. “FLAT: Federated Lightweight Authentication of Things.” 2018. Masters Thesis, Universidade Federal de Minas Gerais; UFMG. Accessed April 21, 2021.
http://hdl.handle.net/1843/ESBF-B6QGC7.
MLA Handbook (7th Edition):
Santos, Maria Luiza Burgarelli Alves dos. “FLAT: Federated Lightweight Authentication of Things.” 2018. Web. 21 Apr 2021.
Vancouver:
Santos MLBAd. FLAT: Federated Lightweight Authentication of Things. [Internet] [Masters thesis]. Universidade Federal de Minas Gerais; UFMG; 2018. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/1843/ESBF-B6QGC7.
Council of Science Editors:
Santos MLBAd. FLAT: Federated Lightweight Authentication of Things. [Masters Thesis]. Universidade Federal de Minas Gerais; UFMG; 2018. Available from: http://hdl.handle.net/1843/ESBF-B6QGC7

Texas A&M University
5.
Zarate Roldan, Jorge Edgar.
Ultra-Low Power Transmitter and Power Management for Internet-of-Things Devices.
Degree: PhD, Electrical Engineering, 2016, Texas A&M University
URL: http://hdl.handle.net/1969.1/156849
► Two of the most critical components in an Internet-of-Things (IoT) sensing and transmitting node are the power management unit (PMU) and the wireless transmitter (Tx).…
(more)
▼ Two of the most critical components in an
Internet-of-
Things (IoT) sensing and transmitting node are the power
management unit (PMU) and the wireless transmitter (Tx). The desire for longer intervals between battery replacements or a completely self-contained, battery-less operation via energy harvesting transducers and circuits in IoT nodes demands highly efficient integrated circuits. This dissertation addresses the challenge of designing and implementing power
management and Tx circuits with ultra-low power consumption to enable such efficient operation.
The first part of the dissertation focuses on the study and design of power
management circuits for IoT nodes. This opening portion elaborates on two different areas of the power
management field: Firstly, a low-complexity, SPICE-based model for general low dropout (LDO) regulators is demonstrated. The model aims to reduce the stress and computation times in the final stages of simulation and verification of Systems-on-Chip (SoC), including IoT nodes, that employ large numbers of LDOs. Secondly, the implementation of an efficient PMU for an energy harvesting system based on a thermoelectric generator transducer is discussed. The PMU includes a first-in-its-class LDO with programmable supply noise rejection for localized improvement in the suppression.
The second part of the dissertation addresses the challenge of designing an ultra-
low power wireless FSK Tx in the 900 MHz ISM band. To reduce the power consumption and boost the Tx energy efficiency, a novel delay cell exploiting current reuse is used in a ring-oscillator employed as the local oscillator generator scheme. In combination with an edge-combiner PA, the Tx showed a measured energy efficiency of 0.2 nJ/bit and a normalized energy efficiency of 3.1 nJ/(bit∙mW) when operating at output power levels up to -10 dBm and data rates of 3 Mbps. To close this dissertation, the implementation of a supply-noise tolerant BiCMOS ring-oscillator is discussed. The combination of a passive, high-pass feedforward path from the supply to critical nodes in the selected delay cell and a low cost LDO allow the oscillator to exhibit power supply noise rejection levels better than –33 dB in experimental results.
Advisors/Committee Members: Sanchez-Sinencio, Edgar (advisor), Entesari, Kamran (committee member), Datta, Aniruddha (committee member), Walker, Duncan M (committee member).
Subjects/Keywords: Internet-of-Things; Wireless Transmitter; Power Management Circuits
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Zarate Roldan, J. E. (2016). Ultra-Low Power Transmitter and Power Management for Internet-of-Things Devices. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/156849
Chicago Manual of Style (16th Edition):
Zarate Roldan, Jorge Edgar. “Ultra-Low Power Transmitter and Power Management for Internet-of-Things Devices.” 2016. Doctoral Dissertation, Texas A&M University. Accessed April 21, 2021.
http://hdl.handle.net/1969.1/156849.
MLA Handbook (7th Edition):
Zarate Roldan, Jorge Edgar. “Ultra-Low Power Transmitter and Power Management for Internet-of-Things Devices.” 2016. Web. 21 Apr 2021.
Vancouver:
Zarate Roldan JE. Ultra-Low Power Transmitter and Power Management for Internet-of-Things Devices. [Internet] [Doctoral dissertation]. Texas A&M University; 2016. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/1969.1/156849.
Council of Science Editors:
Zarate Roldan JE. Ultra-Low Power Transmitter and Power Management for Internet-of-Things Devices. [Doctoral Dissertation]. Texas A&M University; 2016. Available from: http://hdl.handle.net/1969.1/156849

University of Ottawa
6.
Alsobhi, Maryam.
Fleet Performance Monitoring System Using The Internet of Things (Business Model)
.
Degree: 2018, University of Ottawa
URL: http://hdl.handle.net/10393/37741
► Fleet management is one of the most challenging tasks faced by fleets managers. These companies need to shed light on several aspects that have direct…
(more)
▼ Fleet management is one of the most challenging tasks faced by fleets managers. These companies need to shed light on several aspects that have direct and indirect impacts on their businesses. For instance, monitoring driver performance and behaviour can be used as a mean to improve their operational efficiency and effectiveness, which may lead to increase customer satisfaction. Technological advances have made it possible for fleet companies to monitor fleet drivers. The Internet of things (IoT), is one of these technologies, which is a network of connected devices embedded with sensors through the internet, allowing them to communicate with one another and exchange information. Due to increase in societies needs, fleet companies need to maximize their operations. Thus, they encounter high operational costs and productivity issues that cost them a lot economically and environmentally. There are many suggested solutions on how to reduce costs such as reduce the number of operations. In this thesis we are suggesting using IoT to monitor fleet performance in order to cut unnecessary expenditure and improve efficiency, particularly by managing driver as a mean to overcome the problem. IoT solution works by implementing number of sensors to do specific function (for example: detecting risky event and warn fleet's driver) and generate data. Data are valuable for businesses in order to make better decisions that may lead to increase revenues and reduce costs. The simulation of our suggested solution shows improvement on fleet performance compare to non-IoT solutions. Then, we build an innovative sustainable business model to illustrate the benefits that fleet businesses can get by implementing such a solution predominantly because IoT is an economic and multi-purpose solution that can be used to solve a number of crossover problems.
Subjects/Keywords: Internet of Things;
IoT;
Business Model;
Fleet management;
Transportation
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Alsobhi, M. (2018). Fleet Performance Monitoring System Using The Internet of Things (Business Model)
. (Thesis). University of Ottawa. Retrieved from http://hdl.handle.net/10393/37741
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Alsobhi, Maryam. “Fleet Performance Monitoring System Using The Internet of Things (Business Model)
.” 2018. Thesis, University of Ottawa. Accessed April 21, 2021.
http://hdl.handle.net/10393/37741.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Alsobhi, Maryam. “Fleet Performance Monitoring System Using The Internet of Things (Business Model)
.” 2018. Web. 21 Apr 2021.
Vancouver:
Alsobhi M. Fleet Performance Monitoring System Using The Internet of Things (Business Model)
. [Internet] [Thesis]. University of Ottawa; 2018. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/10393/37741.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Alsobhi M. Fleet Performance Monitoring System Using The Internet of Things (Business Model)
. [Thesis]. University of Ottawa; 2018. Available from: http://hdl.handle.net/10393/37741
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Minnesota
7.
Chen, Tianyi.
Efficient Methods for Distributed Machine Learning and Resource Management in the Internet-of-Things.
Degree: PhD, Electrical/Computer Engineering, 2019, University of Minnesota
URL: http://hdl.handle.net/11299/206678
► Undoubtedly, this century evolves in a world of interconnected entities, where the notion of Internet-of-Things (IoT) plays a central role in the proliferation of linked…
(more)
▼ Undoubtedly, this century evolves in a world of interconnected entities, where the notion of Internet-of-Things (IoT) plays a central role in the proliferation of linked devices and objects. In this context, the present dissertation deals with large-scale networked systems including IoT that consist of heterogeneous components, and can operate in unknown environments. The focus is on the theoretical and algorithmic issues at the intersection of optimization, machine learning, and networked systems. Specifically, the research objectives and innovative claims include: (T1) Scalable distributed machine learning approaches for efficient IoT implementation; and, (T2) Enhanced resource management policies for IoT by leveraging machine learning advances. Conventional machine learning approaches require centralizing the users' data on one machine or in a data center. Considering the massive amount of IoT devices, centralized learning becomes computationally intractable, and rises serious privacy concerns. The widespread consensus today is that besides data centers at the cloud, future machine learning tasks have to be performed starting from the network edge, namely mobile devices. The first contribution offers innovative distributed learning methods tailored for heterogeneous IoT setups, and with reduced communication overhead. The resultant distributed algorithm can afford provably reduced communication complexity in distributed machine learning. From learning to control, reinforcement learning will play a critical role in many complex IoT tasks such as autonomous vehicles. In this context, the thesis introduces a distributed reinforcement learning approach featured with its high communication efficiency. Optimally allocating computing and communication resources is a crucial task in IoT. The second novelty pertains to learning-aided optimization tools tailored for resource management tasks. To date, most resource management schemes are based on a pure optimization viewpoint (e.g., the dual (sub)gradient method), which incurs suboptimal performance. From the vantage point of IoT, the idea is to leverage the abundant historical data collected by devices, and formulate the resource management problem as an empirical risk minimization task – a central topic in machine learning research. By cross-fertilizing advances of optimization and learning theory, a learn-and-adapt resource management framework is developed. An upshot of the second part is its ability to account for the feedback-limited nature of tasks in IoT. Typically, solving resource allocation problems necessitates knowledge of the models that map a resource variable to its cost or utility. Targeting scenarios where models are not available, a model-free learning scheme is developed in this thesis, along with its bandit version. These algorithms come with provable performance guarantees, even when knowledge about the underlying systems is obtained only through repeated interactions with the environment. The overarching objective of this dissertation is to wed…
Subjects/Keywords: Internet-of-Things; Machine learning; Online learning; Optimization; Resource management
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Chen, T. (2019). Efficient Methods for Distributed Machine Learning and Resource Management in the Internet-of-Things. (Doctoral Dissertation). University of Minnesota. Retrieved from http://hdl.handle.net/11299/206678
Chicago Manual of Style (16th Edition):
Chen, Tianyi. “Efficient Methods for Distributed Machine Learning and Resource Management in the Internet-of-Things.” 2019. Doctoral Dissertation, University of Minnesota. Accessed April 21, 2021.
http://hdl.handle.net/11299/206678.
MLA Handbook (7th Edition):
Chen, Tianyi. “Efficient Methods for Distributed Machine Learning and Resource Management in the Internet-of-Things.” 2019. Web. 21 Apr 2021.
Vancouver:
Chen T. Efficient Methods for Distributed Machine Learning and Resource Management in the Internet-of-Things. [Internet] [Doctoral dissertation]. University of Minnesota; 2019. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/11299/206678.
Council of Science Editors:
Chen T. Efficient Methods for Distributed Machine Learning and Resource Management in the Internet-of-Things. [Doctoral Dissertation]. University of Minnesota; 2019. Available from: http://hdl.handle.net/11299/206678

Virginia Tech
8.
Park, Taehyeun.
Distributed Wireless Resource Management in the Internet of Things.
Degree: PhD, Electrical Engineering, 2020, Virginia Tech
URL: http://hdl.handle.net/10919/99055
► The Internet of Things (IoT), which is a network of smart devices such as smart phones, wearable devices, smart appliances, and environment sensors, will transform…
(more)
▼ The
Internet of
Things (IoT), which is a network of smart devices such as smart phones, wearable devices, smart appliances, and environment sensors, will transform many aspects of our society with numerous innovative IoT applications. Those IoT applications include interactive education, remote healthcare, smart grids, home automation, intelligent transportation, industrial monitoring, and smart agriculture. With the increasing complexity and scale of an IoT, it becomes more difficult to quickly manage the IoT devices through a cloud, and a centralized
management approach may not be viable for certain IoT scenarios. Therefore, distributed solutions are needed for enabling IoT devices to fulfill their services and maintain seamless connectivity. Here, IoT device
management refers to the fact that the system needs to decide which devices access the network and using which resources (e.g., frequencies). For distributed
management of an IoT, the unique challenge is to allocate scarce communication resources to many IoT devices appropriately. With distributed resource
management, diverse IoT devices can share the limited communication resources in a self-organizing manner. Distributed resource
management overcomes the limitations of centralized resource
management by satisfying strict service requirements in a massive, complex IoT.
Despite the advantages and the opportunities of distributed resource
management, it is necessary to address the challenges related to an IoT, such as analyzing intricate interaction of heterogeneous devices, designing viable frameworks for constrained devices, and quickly adapting to a dynamic IoT. Furthermore, distributed resource
management must enable IoT devices to communicate with high reliability and low delay. In this regard, this dissertation investigates these critical IoT challenges and introduces novel distributed resource
management frameworks for an IoT. In particular, the proposed frameworks are tailored to realistic IoT scenarios and consider different performance metrics. To this end, mathematical frameworks and effective algorithms are developed by significantly extending tools from wireless communication, game theory, and machine learning. The results show that the proposed distributed wireless resource
management frameworks can optimize key performance metrics and meet strict communication requirements while coping with device heterogeneity, massive scale, dynamic environment, and scarce wireless resources in an IoT.
Advisors/Committee Members: Saad, Walid (committeechair), Clancy, Thomas Charles (committee member), Hudait, Mantu K. (committee member), Bish, Douglas R. (committee member), Reed, Jeffrey H. (committee member).
Subjects/Keywords: Internet of Things; Radio Resource Management; Wireless Networks
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Park, T. (2020). Distributed Wireless Resource Management in the Internet of Things. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/99055
Chicago Manual of Style (16th Edition):
Park, Taehyeun. “Distributed Wireless Resource Management in the Internet of Things.” 2020. Doctoral Dissertation, Virginia Tech. Accessed April 21, 2021.
http://hdl.handle.net/10919/99055.
MLA Handbook (7th Edition):
Park, Taehyeun. “Distributed Wireless Resource Management in the Internet of Things.” 2020. Web. 21 Apr 2021.
Vancouver:
Park T. Distributed Wireless Resource Management in the Internet of Things. [Internet] [Doctoral dissertation]. Virginia Tech; 2020. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/10919/99055.
Council of Science Editors:
Park T. Distributed Wireless Resource Management in the Internet of Things. [Doctoral Dissertation]. Virginia Tech; 2020. Available from: http://hdl.handle.net/10919/99055

Universidade Nova
9.
Mateus, Márcio Filipe Caetano.
Measuring data transfer in heterogeneous IoT environments.
Degree: 2012, Universidade Nova
URL: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/7580
► Dissertação para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores
Internet of Things (IoT) is characterised by the heterogeneity of the used…
(more)
▼ Dissertação para obtenção do Grau de Mestre em
Engenharia Electrotécnica e de Computadores
Internet of Things (IoT) is characterised by the heterogeneity of the used devices, which leads to information exchange problems. To address these problems, the Plug’n’Interoperate approach is used, where the steps needed to perform the information exchange between devices are described
by interoperability specifications (IS) and are operated by the devices. However, more than one IS can exist to describe the information exchange between each pair of devices, so to choose the suitable IS, there is the need to measure the information exchange described by each one. To do this, there already exist some methods. But, they rely on a deep understanding of the IS and
the data formats involved. To overcome this, an advanced measurement method is presented.
This method advances by measuring the data transfer provided by an IS, without the need of specific knowledge about it. This measurement does that, by relying only on an abstract view of the data transfer and providing results that allows the benchmarking of the entire interoperability performance of the IoT environment. Thus allowing the comparison of different IS without the need of being specialized on them.
Subjects/Keywords: Internet of things; Interoperability; Measurement
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Mateus, M. F. C. (2012). Measuring data transfer in heterogeneous IoT environments. (Thesis). Universidade Nova. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/7580
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Mateus, Márcio Filipe Caetano. “Measuring data transfer in heterogeneous IoT environments.” 2012. Thesis, Universidade Nova. Accessed April 21, 2021.
http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/7580.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Mateus, Márcio Filipe Caetano. “Measuring data transfer in heterogeneous IoT environments.” 2012. Web. 21 Apr 2021.
Vancouver:
Mateus MFC. Measuring data transfer in heterogeneous IoT environments. [Internet] [Thesis]. Universidade Nova; 2012. [cited 2021 Apr 21].
Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/7580.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Mateus MFC. Measuring data transfer in heterogeneous IoT environments. [Thesis]. Universidade Nova; 2012. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/7580
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Adelaide
10.
Wu, Yanbo.
Enabling traceability in large-scale RFID networks.
Degree: 2012, University of Adelaide
URL: http://hdl.handle.net/2440/74096
► The emergence of radio frequency identification (RFID) technology brings significant social and economic benefits. As a non line of sight technology, RFID provides an effective…
(more)
▼ The emergence of radio frequency identification (RFID) technology brings significant social and economic benefits. As a non line of sight technology, RFID provides an effective way to record movements of objects within a networked system formed by a set of distributed and collaborating parties. A trail of such recorded movements is the foundation for enabling traceability applications. While traceability is a critical aspect of the majority of RFID applications, realizing traceability for these applications brings many fundamental research and development issues, including storage efficiency, query processing complexity, privacy etc. In this dissertation, we present a novel approach to realize RFIID-based traceability in large, autonomous and heterogeneous distributed networks. We first propose a Peer-to-Peer (P2P) architecture, namely PeerTrack. PeerTrack does not require any kind of centralized database for the RFID data or their index, neither it requires RFID data to be fully shared to partners. In PeerTrack, only a specific portion of data is requested by partners, when the access is necessary. We introduce a distributed model, namely MOODS (a Model for mOving Objects in Discrete Space), for the essential data structures of traceability. MOODS is maintained by a distributed index on the top of a structured Peer-to-Peer overlay. We then propose efficient algorithms for the maintenance of MOODS. The algorithms are optimized to consume statistically minimal cost of bandwidth. Based on this model, we propose algorithms for efficient item-level and statistical traceability query processing. We also propose a traceability mining model for distributed RFID streams, namely TISH (Tilted TIme Frame of Histogram). TISH takes advantages of two important data mining tools, namely Tilted Time Series and Histogram, and combines them to describe the patterns of RFID streams in the dimensions of both time and space, and capture the dynamicity of the patterns. We propose efficient algorithms to maintain TISH and algorithms that use it for traceability query processing and RFID stream mining. We present a platform, namely PeerTrack Cloud, to bring the aforementioned RFID data modeling and traceability query processing techniques to the Cloud Environments. The platform features specific traceability-oriented modules for real-time query processing and efficient data storage. The techniques proposed in this dissertation are implemented in “Asset
Management System", which is a collaborative project with a local company. Finally, we conduct extensive performance studies of the proposed techniques. The experimental results reveal that our system i) is more scalable and outperforms the centralized approach when the data volume or the network becomes larger; ii) provides powerful programming interfaces for query processing; iii) is economy in both storage and bandwidth; and iv) can be easily adopted in cloud computing platforms.
Advisors/Committee Members: Sheng, Quanzheng (advisor), Shen, Hong (advisor), Zeadally, Sherali (advisor), Yu, Jian (advisor), Ranasinghe, Damith Chinthana (advisor), School of Computer Science (school).
Subjects/Keywords: RFID; traceability; internet of things
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Wu, Y. (2012). Enabling traceability in large-scale RFID networks. (Thesis). University of Adelaide. Retrieved from http://hdl.handle.net/2440/74096
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Wu, Yanbo. “Enabling traceability in large-scale RFID networks.” 2012. Thesis, University of Adelaide. Accessed April 21, 2021.
http://hdl.handle.net/2440/74096.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Wu, Yanbo. “Enabling traceability in large-scale RFID networks.” 2012. Web. 21 Apr 2021.
Vancouver:
Wu Y. Enabling traceability in large-scale RFID networks. [Internet] [Thesis]. University of Adelaide; 2012. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/2440/74096.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Wu Y. Enabling traceability in large-scale RFID networks. [Thesis]. University of Adelaide; 2012. Available from: http://hdl.handle.net/2440/74096
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Delft University of Technology
11.
Yang, Xueying (author).
LoRaWAN: Vulnerability Analysis and Practical Expoitation.
Degree: 2017, Delft University of Technology
URL: http://resolver.tudelft.nl/uuid:87730790-6166-4424-9d82-8fe815733f1e
► Internet of Things (IoT) applications nowadays have a wide impact on people’s daily life while the size of IoT has been increasing rapidly. Millions of…
(more)
▼ Internet of
Things (IoT) applications nowadays have a wide impact on people’s daily life while the size of IoT has been increasing rapidly. Millions of devices huge amount of data and different kinds of new protocols can bring many security issues. LoRaWAN is a MAC layer protocol for long-range low-power communication dedicated to the IoT. It can be used to transmit messages between IoT end devices and gateways. However, since the development of LoRaWAN is still at an early stage, the security level of the protocol is not well developed, and the need for analyzing and developing the security level of LoRaWAN is necessary and urgent. This research summarizes the secure features of LoRaWAN in the aspects of activation methods, key
management, cryptography, counter
management and message acknowledgement. Then, vulnerabilities of LoRaWAN are found and analyzed. 4 Attacks based on these vulnerabilities are designed and described via an attack tree method. These attacks are (1) replay attack, (2) eavesdropping, (3) bit flipping and (4) ACK spoofing. As a poof-of-concept, the attacks are implemented and executed in a LoRaWAN environment. Afterwards, mitigation and secure solutions against attacks are given to protect the security of LoRaWAN networks. The result of this research can be used in developing the security level of LoRaWAN protocol and setting the standard criteria for evaluating security of LoRaWAN devices.
Advisors/Committee Members: Kuipers, Fernando (mentor), Karampatzakis, Evgenios (mentor), Doerr, Christian (graduation committee), Delft University of Technology (degree granting institution).
Subjects/Keywords: LoRaWAN; Security; Internet of Things
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Yang, X. (. (2017). LoRaWAN: Vulnerability Analysis and Practical Expoitation. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:87730790-6166-4424-9d82-8fe815733f1e
Chicago Manual of Style (16th Edition):
Yang, Xueying (author). “LoRaWAN: Vulnerability Analysis and Practical Expoitation.” 2017. Masters Thesis, Delft University of Technology. Accessed April 21, 2021.
http://resolver.tudelft.nl/uuid:87730790-6166-4424-9d82-8fe815733f1e.
MLA Handbook (7th Edition):
Yang, Xueying (author). “LoRaWAN: Vulnerability Analysis and Practical Expoitation.” 2017. Web. 21 Apr 2021.
Vancouver:
Yang X(. LoRaWAN: Vulnerability Analysis and Practical Expoitation. [Internet] [Masters thesis]. Delft University of Technology; 2017. [cited 2021 Apr 21].
Available from: http://resolver.tudelft.nl/uuid:87730790-6166-4424-9d82-8fe815733f1e.
Council of Science Editors:
Yang X(. LoRaWAN: Vulnerability Analysis and Practical Expoitation. [Masters Thesis]. Delft University of Technology; 2017. Available from: http://resolver.tudelft.nl/uuid:87730790-6166-4424-9d82-8fe815733f1e
12.
Mosenia, Arsalan.
Addressing Security and Privacy Challenges in Internet of Things
.
Degree: PhD, 2017, Princeton University
URL: http://arks.princeton.edu/ark:/88435/dsp01fn107145x
► Internet of Things (IoT), also referred to as the Internet of Objects, is envisioned as a holistic and transformative approach for providing numerous services. The…
(more)
▼ Internet of
Things (IoT), also referred to as the
Internet of Objects, is envisioned as a holistic and transformative approach for providing numerous services. The rapid development of various communication protocols and miniaturization of transceivers along with recent advances in sensing technologies offer the opportunity to transform isolated devices into communicating smart
things. Smart
things, that can sense, store, and even process electrical, thermal, optical, chemical, and other signals to extract user-/environment-related information, have enabled services only limited by human imagination.
Despite picturesque promises of IoT-enabled systems, the integration of smart
things into the standard
Internet introduces several security challenges because the majority of
Internet technologies, communication protocols, and sensors were not designed to support IoT. Several recent research studies have demonstrated that launching security/privacy attacks against IoT-enabled systems, in particular wearable medical sensor (WMS)-based systems, may lead to catastrophic situations and life-threatening conditions. Therefore, security threats and privacy concerns in the IoT domain need to be proactively studied and aggressively addressed. In this thesis, we tackle several domain-specific security/privacy challenges associated with IoT-enabled systems.
We first target health monitoring systems that are one of the most widely-used types of IoT-enabled systems. We discuss and evaluate several energy-efficient schemes and algorithms, which significantly reduce total energy consumption of different implantable and wearable medical devices (IWMDs). The proposed schemes make continuous long-term health monitoring feasible while providing spare energy needed for data encryption.
Furthermore, we present two energy-efficient protocols for implantable medical devices (IMDs), which are essential for data encryption: (i) a secure wakeup protocol that is resilient against battery draining attacks, along with (ii) a low-power key exchange protocol that shares the encryption key between the IMD and the external device while ensuring confidentiality of the key.
Moreover, we introduce a new class of attacks against the privacy of a patient who is carrying IWMDs. We describe how an attacker can infer private information about the patient by exploiting physiological information leakage, i.e., signals that continuously emanate from the human body due to the normal functioning of organs or IWMDs attached to (or implanted in) the body.
Further, we propose a new generic class of security attacks, called dedicated intelligent security attacks against sensor-triggered emergency responses (DISASTER), that is applicable to a variety of sensor-based systems. DISASTER exploits design flaws and security weaknesses of safety mechanisms deployed in cyber-physical systems (CPSs) to trigger emergency responses even in the absence of a real emergency. In addition to introducing DISASTER, we comprehensively…
Advisors/Committee Members: Jha, Niraj K (advisor).
Subjects/Keywords: Internet of Things;
Privacy;
Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Mosenia, A. (2017). Addressing Security and Privacy Challenges in Internet of Things
. (Doctoral Dissertation). Princeton University. Retrieved from http://arks.princeton.edu/ark:/88435/dsp01fn107145x
Chicago Manual of Style (16th Edition):
Mosenia, Arsalan. “Addressing Security and Privacy Challenges in Internet of Things
.” 2017. Doctoral Dissertation, Princeton University. Accessed April 21, 2021.
http://arks.princeton.edu/ark:/88435/dsp01fn107145x.
MLA Handbook (7th Edition):
Mosenia, Arsalan. “Addressing Security and Privacy Challenges in Internet of Things
.” 2017. Web. 21 Apr 2021.
Vancouver:
Mosenia A. Addressing Security and Privacy Challenges in Internet of Things
. [Internet] [Doctoral dissertation]. Princeton University; 2017. [cited 2021 Apr 21].
Available from: http://arks.princeton.edu/ark:/88435/dsp01fn107145x.
Council of Science Editors:
Mosenia A. Addressing Security and Privacy Challenges in Internet of Things
. [Doctoral Dissertation]. Princeton University; 2017. Available from: http://arks.princeton.edu/ark:/88435/dsp01fn107145x

University of Sydney
13.
Xu, Yizhen.
RESOURCE ALLOCATION IN THE INTERNET-OF-THINGS
.
Degree: 2021, University of Sydney
URL: http://hdl.handle.net/2123/24558
► The Internet-of-Things (IoT) is widely regarded as a promising paradigm for connecting the ever-growing use of smart devices through various communications protocols. However, despite the…
(more)
▼ The Internet-of-Things (IoT) is widely regarded as a promising paradigm for connecting the ever-growing use of smart devices through various communications protocols. However, despite the popularity and widespread of its applications, the development and deployment of IoT are limited by the efficiency of resource utilization. For instance, the ubiquitous data exchange among numerous IoT devices poses severe issues in terms of spectrum availability. Meanwhile, IoT integration with mobile edge computing brings alongside a number of challenges in terms of computation resource management. Although emerging techniques related to energy harvesting will alleviate IoT devices' energy shortage problem due to limited battery energy supply, the energy for communication and local computation will always be a scarce resource to be handled with care.
In this thesis, we introduce different resource allocation strategies for IoT devices to more efficiently utilize scarce resources including spectrum, computation and energy resources. In the first part, we focus on spectrum allocation and propose a new spectrum sensing framework based on Bayesian machine learning. We exploit the mobility of multiple secondary users (SUs) to simultaneously collect spectrum sensing data, and cooperatively derive global spectrum states. We first develop a novel non-parametric Bayesian learning model, referred to as beta process sticky hidden Markov model (BP-SHMM), to capture the spatial-temporal correlation in the collected spectrum data, where SHMM models the latent statistical correlation within each mobile SU's time series data while BP realizes the cooperation among multiple SUs. A Bayesian inference is then used to automatically infer heterogeneous spectrum states.
In the second part, we focus on computation resource allocation in a large-scale asynchronous MEC system with random task arrivals, distinct workloads, and diverse deadlines. By exploiting the Whittle index (WI) theory, we rigorously establish the WI indexability and derive a scalable closed-form solution. Consequently, in our WI-based offloading policy, each user only needs to calculate its WI and report it to the BS, and the users with the highest indices are selected to perform task offloading. Furthermore, when the task completion ratio becomes the focus, the shorter slack time less remaining workload priority rule is introduced into the WI-based offloading policy for further performance improvement. When the knowledge of user offloading energy consumption is not available prior to the offloading, we develop Bayesian learning-enabled WI policies accordingly.
Lastly, we tackle a general resource allocation problem with the constraints of energy consumption and queue package lengths. Specifically, we formulate it as a constrained deep reinforcement learning (DRL) with a mixed-action space including both discrete channel allocation and continuous energy harvesting time division. Then, we propose a novel DRL algorithm referred to as constrained discrete continuous soft actor critic…
Subjects/Keywords: Internet of Things;
Resource Allocation
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Xu, Y. (2021). RESOURCE ALLOCATION IN THE INTERNET-OF-THINGS
. (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/24558
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Xu, Yizhen. “RESOURCE ALLOCATION IN THE INTERNET-OF-THINGS
.” 2021. Thesis, University of Sydney. Accessed April 21, 2021.
http://hdl.handle.net/2123/24558.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Xu, Yizhen. “RESOURCE ALLOCATION IN THE INTERNET-OF-THINGS
.” 2021. Web. 21 Apr 2021.
Vancouver:
Xu Y. RESOURCE ALLOCATION IN THE INTERNET-OF-THINGS
. [Internet] [Thesis]. University of Sydney; 2021. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/2123/24558.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Xu Y. RESOURCE ALLOCATION IN THE INTERNET-OF-THINGS
. [Thesis]. University of Sydney; 2021. Available from: http://hdl.handle.net/2123/24558
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Rutgers University
14.
Liu, Jian.
Towards smart and secure IoT with pervasive sensing.
Degree: PhD, Electrical and Computer Engineering, 2019, Rutgers University
URL: https://rucore.libraries.rutgers.edu/rutgers-lib/61800/
► With the advancement of mobile sensing and pervasive computing, extensive research is being carried out in various application domains of Internet of Things (IoT), such…
(more)
▼ With the advancement of mobile sensing and pervasive computing, extensive research is being carried out in various application domains of
Internet of
Things (IoT), such as smart home, smart healthcare, connected vehicles, and their security issues. My research work explores the power of pervasive sensing technologies to benefit people's daily lives and make impacts on society advancement, especially in the emerging areas of smart healthcare, IoT security and IoT embedded system communications. In this dissertation, I mainly study the following topics: (1) how to perform vital signs monitoring during sleep towards smart healthcare; (2) how to conduct user authentication on any solid surface for IoT applications; (3) IoT security: side-channel security leakage of typing with a nearby phone; and (4) high-throughput and inaudible acoustic communication for IoT applications.
We first propose to track the vital signs of both breathing rate and heart rate during sleep by using off-the-shelf WiFi without any wearable or dedicated devices. Our system reuses existing WiFi network of IoT and exploits the fine-grained channel information to capture the minute movements caused by breathing and heart beats. Our system thus has the potential to be widely deployed and perform continuous long-term monitoring. Our extensive experiments demonstrate that our system can accurately capture vital signs during sleep under realistic settings and achieve comparable or even better performance comparing to traditional and existing approaches, which is a strong indication of providing noninvasive, continuous fine-grained vital signs monitoring without any additional cost.
Moreover, we propose VibWrite that extends finger-input authentication beyond touch screens to any solid surface for smart access or IoT systems (e.g., access to apartments, vehicles or smart appliances). It integrates passcode, behavioral and physiological characteristics, and surface dependency together to provide a low-cost, tangible and enhanced security solution. VibWrite builds upon a touch sensing technique with vibration signals that can operate on surfaces constructed from a broad range of materials. It is significantly different from traditional password-based approaches, which only authenticate the password itself rather than the legitimate user, and the behavioral biometrics-based solutions, which usually involve specific or expensive hardware (e.g., touch screen or fingerprint reader), incurring privacy concerns and suffering from smudge attacks. VibWrite discriminates fine-grained finger inputs and supports three independent passcode secrets including PIN number, lock pattern, and simple gestures by extracting unique features to capture both behavioral and physiological characteristics such as contacting area, touching force, and etc. Our extensive experiments demonstrate that VibWrite can authenticate users with high accuracy, low false positive rate and is robust to various types of attacks.
In addition, we explore the limits of audio ranging on mobile…
Advisors/Committee Members: Chen, Yingying (chair), Raychaudhuri, Dipankar (internal member), Wei, Sheng (internal member), Yao, Yu-Dong (outside member), School of Graduate Studies.
Subjects/Keywords: WiFi sensing; Internet of things
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Liu, J. (2019). Towards smart and secure IoT with pervasive sensing. (Doctoral Dissertation). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/61800/
Chicago Manual of Style (16th Edition):
Liu, Jian. “Towards smart and secure IoT with pervasive sensing.” 2019. Doctoral Dissertation, Rutgers University. Accessed April 21, 2021.
https://rucore.libraries.rutgers.edu/rutgers-lib/61800/.
MLA Handbook (7th Edition):
Liu, Jian. “Towards smart and secure IoT with pervasive sensing.” 2019. Web. 21 Apr 2021.
Vancouver:
Liu J. Towards smart and secure IoT with pervasive sensing. [Internet] [Doctoral dissertation]. Rutgers University; 2019. [cited 2021 Apr 21].
Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/61800/.
Council of Science Editors:
Liu J. Towards smart and secure IoT with pervasive sensing. [Doctoral Dissertation]. Rutgers University; 2019. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/61800/

Rutgers University
15.
Yu, Haoyang, 1991-.
MobilityFirst Lite Over Things.
Degree: MS, Electrical and Computer Engineering, 2016, Rutgers University
URL: https://rucore.libraries.rutgers.edu/rutgers-lib/49352/
► New features like global reachability, mobility and multiple communication models are needed with the development of Internet of Things (IoT). However many approaches have been…
(more)
▼ New features like global reachability, mobility and multiple communication models are needed with the development of
Internet of
Things (IoT). However many approaches have been proposed to build an IoT platform based on IP-overlay architecture, but these solutions inheritly have constraints for new requirements in IP-based architecture. MobilityFirst, a clean-slate future
Internet architecture, was proposed in order to provide new features like global reachability, mobility and diverse communication models, using globally unique identifiers (GUID), global name resolution services (GNRS), etc; however, it is too bulky for computing-constraints and memory-limited devices. In this paper, we are designing the MobilityFirst Lite (MF-Lite) Over
Things architecture, which can run on a computing-limited embedded system for packet dissemination and data gathering. The MF-Lite, over
things, protocol supports different communication patterns like unicast and multicast. The sensor motes used with GUID are globally reachable and have seamless connection in sensor-to-sensor and sensor-to-infrastructure.
Advisors/Committee Members: Zhang, Yanyong (chair), Trappe, Wade (internal member), Lindqvist, Janne (internal member).
Subjects/Keywords: Internet of things; Computer networks
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Yu, Haoyang, 1. (2016). MobilityFirst Lite Over Things. (Masters Thesis). Rutgers University. Retrieved from https://rucore.libraries.rutgers.edu/rutgers-lib/49352/
Chicago Manual of Style (16th Edition):
Yu, Haoyang, 1991-. “MobilityFirst Lite Over Things.” 2016. Masters Thesis, Rutgers University. Accessed April 21, 2021.
https://rucore.libraries.rutgers.edu/rutgers-lib/49352/.
MLA Handbook (7th Edition):
Yu, Haoyang, 1991-. “MobilityFirst Lite Over Things.” 2016. Web. 21 Apr 2021.
Vancouver:
Yu, Haoyang 1. MobilityFirst Lite Over Things. [Internet] [Masters thesis]. Rutgers University; 2016. [cited 2021 Apr 21].
Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/49352/.
Council of Science Editors:
Yu, Haoyang 1. MobilityFirst Lite Over Things. [Masters Thesis]. Rutgers University; 2016. Available from: https://rucore.libraries.rutgers.edu/rutgers-lib/49352/

University of Sydney
16.
Goad, David Douglas.
Barriers to IoT Benefits Realization
.
Degree: 2021, University of Sydney
URL: http://hdl.handle.net/2123/24520
► The Internet of Things (IoT) is often referred to as one of the key technologies of the Fourth Industrial Revolution. Along with the three industrial…
(more)
▼ The Internet of Things (IoT) is often referred to as one of the key technologies of the Fourth Industrial Revolution. Along with the three industrial revolutions before it, this current industrial revolution promises to be disruptive, changing how we live our lives and run our organizations. Yet, while the IoT has demonstrated great promise, it will underperform in terms of expected adoption and resultant benefits realization compared to initially overly optimistic industry forecasts. This is partly due to several barriers to implementing IoT based solutions that inhibit, reduce, or slow the realization of the intended benefits. In this research thesis, I identify and then analyze several of the barriers to IoT benefits realization. These include issues related to IoT architectural heterogeneity, the challenges with securing the IoT, the reduction in privacy that the IoT creates and the resultant regulatory burden and the need for new business models to realize the value that the IoT can create. For each identified barrier I look to contribute to the literature by furthering understanding of that phenomena in question and/or by exploring potential solutions to improve benefits realization. Adopting a “Thesis including Publications” approach the analysis of each barrier is presented in a separate self-contained research paper with four papers presented in total. Two of these research papers (on IoT Architecture and Privacy) have been published and a further two (on IoT Security and Business Models) have been submitted for publication.
Subjects/Keywords: IoT;
Internet of Things
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Goad, D. D. (2021). Barriers to IoT Benefits Realization
. (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/24520
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Goad, David Douglas. “Barriers to IoT Benefits Realization
.” 2021. Thesis, University of Sydney. Accessed April 21, 2021.
http://hdl.handle.net/2123/24520.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Goad, David Douglas. “Barriers to IoT Benefits Realization
.” 2021. Web. 21 Apr 2021.
Vancouver:
Goad DD. Barriers to IoT Benefits Realization
. [Internet] [Thesis]. University of Sydney; 2021. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/2123/24520.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Goad DD. Barriers to IoT Benefits Realization
. [Thesis]. University of Sydney; 2021. Available from: http://hdl.handle.net/2123/24520
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Sydney
17.
Zhang, Rui.
Resource Access in the Internet-of-Things
.
Degree: 2020, University of Sydney
URL: http://hdl.handle.net/2123/23211
► The Internet-of-Things (IoT) refers to the networked interconnection of massive objects in daily life. With the ability of data collection, information sharing, and task computing,…
(more)
▼ The Internet-of-Things (IoT) refers to the networked interconnection of massive objects in daily life. With the ability of data collection, information sharing, and task computing, the IoT bridges diverse technologies to provide ubiquitous services with intelligence. However, in the coming years, the IoT devices are facing challenges coming from their inherent features. Generally speaking, the IoT devices are deployed massively and usually in mobile scenarios. This makes the wired power supply hard to be implemented. Meanwhile, the small size of IoT devices restricts their computational capability. Furthermore, licensing a certain spectrum bandwidth to the IoT is expensive, thus pushes the IoT devices to share the spectrum resources with licensed users. In this thesis, we introduce several strategies for IoT devices to deal with the shortage of several resources, i.e. the spectrum, computational, and energy resources. In the first part, we propose a learning-based two-stage spectrum sharing strategy, which allow the IoT devices to access the spectrum resource as an unlicensed user. In the second one, we develop a new online algorithm to enable distributed decision making on the task offloading. This enables the vehicular IoT devices to access computational resources of nearby network nodes. Lastly, we propose and analyze a new full-duplex cooperative cognitive radio network, which allows the IoT devices to harvest energy wirelessly from radio frequency signals and cooperate with the licensed users.
Subjects/Keywords: resource access;
internet-of-things
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Zhang, R. (2020). Resource Access in the Internet-of-Things
. (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/23211
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Zhang, Rui. “Resource Access in the Internet-of-Things
.” 2020. Thesis, University of Sydney. Accessed April 21, 2021.
http://hdl.handle.net/2123/23211.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Zhang, Rui. “Resource Access in the Internet-of-Things
.” 2020. Web. 21 Apr 2021.
Vancouver:
Zhang R. Resource Access in the Internet-of-Things
. [Internet] [Thesis]. University of Sydney; 2020. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/2123/23211.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Zhang R. Resource Access in the Internet-of-Things
. [Thesis]. University of Sydney; 2020. Available from: http://hdl.handle.net/2123/23211
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Stellenbosch University
18.
Nel, Charles Benjamin Hirschowitz.
The development of a policy framework for integrating smart asset management within operating theatres in a private healthcare group to mitigate critical system failure.
Degree: MEng, Industrial Engineering, 2018, Stellenbosch University
URL: http://hdl.handle.net/10019.1/103427
► ENGLISH ABSTRACT: According to the World Health Organisation (WHO), health technologies are an essential basis for the correct functionality of an effective healthcare system. It…
(more)
▼ ENGLISH ABSTRACT: According to the World Health Organisation (WHO), health technologies
are an essential basis for the correct functionality of an effective healthcare system. It is within this hospital environment that medical equipment is considered
hospital assets that can directly affect human lives. However hospitals within the private healthcare industry are also considered businesses which apart from dealing with human lives, are also accountable to
management to be profitable, where assets are also considerable investments and maintenance costs need to be factored into the return of asset investment as well as income
generated from asset utilisation and performance. It is therefore important to have a well planned and managed physical asset
management (PAM) programme that is able to keep the medical equipment in a healthcare institution reliable, safe and available for use when it is needed. This thesis has narrowed down the strategic execution of PAM to an operating theatre as a critical asset, both in terms of human safety and also operational importance. By utilising a case study approach to qualitatively explore the implementation of PAM, a new concept known as Smart Asset
Management (SAM) has been identified as a means to assist physical asset
management strategic execution (PAMSE).
SAM is a new expression where the term smart, is a concept used increasingly within the commercial environment, which relates to a perception of
technological intelligence. The concept of the
Internet of
Things (IoT) has also become a reality which necessitates the need for a different approach to managing physical assets. With this emergence of technological intelligence,
comes the possibility of vast quantities of asset data and the analysis thereof which has proven to add value to asset
management. In order to capitalise and expand on this value creation, SAM came into being by incorporating
proven methodologies and applying these within real-time
management structures.
This thesis also sets out to create industry awareness about the business potential of incorporating SAM within automated asset environments for assisting
in strategic
management decisions. In order to do so, SAM applications are investigated, as well as requirements and benefits of SAM implementation
according to various literature sources. By investigating concepts such as; performance
management (PM) and condition monitoring (CM), in conjunction with SAM; this thesis aims to illustrate how SAM can be incorporated within the strategic execution of PAM to predict and avoid critical system failure.
Considering the qualitative intricacies of this investigation, it was identified that
management at various levels need to be engaged as well as informed with regards to the context in which SAM can be utilised to address potential risks.
Ultimately the case study approach was adopted to portray a common understanding experienced by technical managers operating within various hospitals
across South Africa. Hence by providing a view of an ideal,…
Advisors/Committee Members: Jooste, J. L., Stellenbosch University. Faculty of Engineering. Dept. of Industrial Engineering., Stellenbosch University. Faculty of Engineering. Dept. of Industrial Engineering..
Subjects/Keywords: Asset-liability management; Smart Asset Management; UCTD; Big Data; Internet of Things; Health care technology
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Nel, C. B. H. (2018). The development of a policy framework for integrating smart asset management within operating theatres in a private healthcare group to mitigate critical system failure. (Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/103427
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Nel, Charles Benjamin Hirschowitz. “The development of a policy framework for integrating smart asset management within operating theatres in a private healthcare group to mitigate critical system failure.” 2018. Thesis, Stellenbosch University. Accessed April 21, 2021.
http://hdl.handle.net/10019.1/103427.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Nel, Charles Benjamin Hirschowitz. “The development of a policy framework for integrating smart asset management within operating theatres in a private healthcare group to mitigate critical system failure.” 2018. Web. 21 Apr 2021.
Vancouver:
Nel CBH. The development of a policy framework for integrating smart asset management within operating theatres in a private healthcare group to mitigate critical system failure. [Internet] [Thesis]. Stellenbosch University; 2018. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/10019.1/103427.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Nel CBH. The development of a policy framework for integrating smart asset management within operating theatres in a private healthcare group to mitigate critical system failure. [Thesis]. Stellenbosch University; 2018. Available from: http://hdl.handle.net/10019.1/103427
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Penn State University
19.
Karamchandani, Neeraj.
MUTATION BASED PROTOCOL FUZZER FOR IOT.
Degree: 2017, Penn State University
URL: https://submit-etda.libraries.psu.edu/catalog/14890njk5270
► Internet of Things (IoT) is changing the way we live. Now everyday objects are being connected to the Internet from thermostats to CCTV cameras, from…
(more)
▼ Internet of
Things (IoT) is changing the way we live. Now everyday objects are being connected to the
Internet from thermostats to CCTV cameras, from refrigerators to watches. The type and volume of data flowing in and out of the devices are at an unprecedented level. While the industries are focusing on connecting everything to the
Internet without focusing on security, IoT related cyber-attacks have touched record heights. One of the challenges when dealing with security of the
Internet of
Things is that there is no standardization of protocols or platforms to be used. New protocols and platforms are being developed now and then. There is a lack of understanding of how these platform work. Apple’s HomeKit and Google’s Android
Things are two of the most promising IoT platforms. In the first half of this thesis, we look at the security challenges of IoT and try to explain how Apple’s HomeKit and Google’s Android
Things works along with the security features built in them.
Most of the security problems are usually attributed to the incorrect implementation of different protocols. IoT devices rely on different protocols to talk with each other. Thus, it becomes very important for IoT devices to test the implementation of that protocol rigorously. Protocol fuzzers are one of the most widely used tools for testing the implementation. But the problem with the current protocol fuzzers is that usually, they are not optimal, inefficient, time-consuming and do not cover all the possible inputs. In the second half of this thesis, we propose an efficient model for an IoT protocol fuzzer. We harness the power of state machine and packet representation to not blindly mutate the data input, but we mutate the states in the state machine. We mutate based on context, timings, feedback/fitness, probability code coverage along with standard mutation operator. We implemented this design to test it on an IP camera and got two Denial of Service (DoS) vulnerabilities that were being caused by sending one malformed packet with special characters.
Advisors/Committee Members: Sencun Zhu, Thesis Advisor/Co-Advisor.
Subjects/Keywords: Fuzzer; Android Things; HomeKit; IoT; Internet of Things; Security of Internet of Things
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Karamchandani, N. (2017). MUTATION BASED PROTOCOL FUZZER FOR IOT. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/14890njk5270
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Karamchandani, Neeraj. “MUTATION BASED PROTOCOL FUZZER FOR IOT.” 2017. Thesis, Penn State University. Accessed April 21, 2021.
https://submit-etda.libraries.psu.edu/catalog/14890njk5270.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Karamchandani, Neeraj. “MUTATION BASED PROTOCOL FUZZER FOR IOT.” 2017. Web. 21 Apr 2021.
Vancouver:
Karamchandani N. MUTATION BASED PROTOCOL FUZZER FOR IOT. [Internet] [Thesis]. Penn State University; 2017. [cited 2021 Apr 21].
Available from: https://submit-etda.libraries.psu.edu/catalog/14890njk5270.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Karamchandani N. MUTATION BASED PROTOCOL FUZZER FOR IOT. [Thesis]. Penn State University; 2017. Available from: https://submit-etda.libraries.psu.edu/catalog/14890njk5270
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
20.
Aïssaoui, François.
Autonomic Approach based on Semantics and Checkpointing for IoT System Management : Approche autonomique basée sur la sémantique et le checkpointing pour la gestion des systèmes de l'internet des objets.
Degree: Docteur es, Informatique, 2018, Université Toulouse I – Capitole
URL: http://www.theses.fr/2018TOU10061
Le résumé en français n'a pas été communiqué par l'auteur.
Le résumé en anglais n'a pas été communiqué par l'auteur.
Advisors/Committee Members: Monteil, Thierry (thesis director), Tazi, Saïd (thesis director).
Subjects/Keywords: Internet des objets; Internet of Things
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Aïssaoui, F. (2018). Autonomic Approach based on Semantics and Checkpointing for IoT System Management : Approche autonomique basée sur la sémantique et le checkpointing pour la gestion des systèmes de l'internet des objets. (Doctoral Dissertation). Université Toulouse I – Capitole. Retrieved from http://www.theses.fr/2018TOU10061
Chicago Manual of Style (16th Edition):
Aïssaoui, François. “Autonomic Approach based on Semantics and Checkpointing for IoT System Management : Approche autonomique basée sur la sémantique et le checkpointing pour la gestion des systèmes de l'internet des objets.” 2018. Doctoral Dissertation, Université Toulouse I – Capitole. Accessed April 21, 2021.
http://www.theses.fr/2018TOU10061.
MLA Handbook (7th Edition):
Aïssaoui, François. “Autonomic Approach based on Semantics and Checkpointing for IoT System Management : Approche autonomique basée sur la sémantique et le checkpointing pour la gestion des systèmes de l'internet des objets.” 2018. Web. 21 Apr 2021.
Vancouver:
Aïssaoui F. Autonomic Approach based on Semantics and Checkpointing for IoT System Management : Approche autonomique basée sur la sémantique et le checkpointing pour la gestion des systèmes de l'internet des objets. [Internet] [Doctoral dissertation]. Université Toulouse I – Capitole; 2018. [cited 2021 Apr 21].
Available from: http://www.theses.fr/2018TOU10061.
Council of Science Editors:
Aïssaoui F. Autonomic Approach based on Semantics and Checkpointing for IoT System Management : Approche autonomique basée sur la sémantique et le checkpointing pour la gestion des systèmes de l'internet des objets. [Doctoral Dissertation]. Université Toulouse I – Capitole; 2018. Available from: http://www.theses.fr/2018TOU10061

Texas A&M University
21.
Liu, Xiaosen.
Power Management ICs for Internet of Things, Energy Harvesting and Biomedical Devices.
Degree: PhD, Electrical Engineering, 2016, Texas A&M University
URL: http://hdl.handle.net/1969.1/187367
► This dissertation focuses on the power management unit (PMU) and integrated circuits (ICs) for the internet of things (IoT), energy harvesting and biomedical devices. Three…
(more)
▼ This dissertation focuses on the power
management unit (PMU) and integrated circuits (ICs) for the
internet of
things (IoT), energy harvesting and biomedical devices. Three monolithic power harvesting methods are studied for different challenges of smart nodes of IoT networks. Firstly, we propose that an impedance tuning approach is implemented with a capacitor value modulation to eliminate the quiescent power consumption. Secondly, we develop a hill-climbing MPPT mechanism that reuses and processes the information of the hysteresis controller in the time-domain and is free of power hungry analog circuits. Furthermore, the typical power-performance tradeoff of the hysteresis controller is solved by a self-triggered one-shot mechanism. Thus, the output regulation achieves high-performance and yet low-power operations as low as 12 µW. Thirdly, we introduce a reconfigurable charge pump to provide the hybrid conversion ratios (CRs) as 1⅓× up to 8× for minimizing the charge redistribution loss. The reconfigurable feature also dynamically tunes to maximum power point tracking (MPPT) with the frequency modulation, resulting in a two-dimensional MPPT. Therefore, the voltage conversion efficiency (VCE) and the power conversion efficiency (PCE) are enhanced and flattened across a wide harvesting range as 0.45 to 3 V. In a conclusion, we successfully develop an energy harvesting method for the IoT smart nodes with lower cost, smaller size, higher conversion efficiency, and better applicability.
For the biomedical devices, this dissertation presents a novel cost-effective automatic resonance tracking method with maximum power transfer (MPT) for piezoelectric transducers (PT). The proposed tracking method is based on a band-pass filter (BPF) oscillator, exploiting the PT’s intrinsic resonance point through a sensing bridge. It guarantees automatic resonance tracking and maximum electrical power converted into mechanical motion regardless of process variations and environmental interferences. Thus, the proposed BPF oscillator-based scheme was designed for an ultrasonic vessel sealing and dissecting (UVSD) system. The sealing and dissecting functions were verified experimentally in chicken tissue and glycerin. Furthermore, a combined sensing scheme circuit allows multiple surgical tissue debulking, vessel sealer and dissector (VSD) technologies to operate from the same sensing scheme board. Its advantage is that a single driver controller could be used for both systems simplifying the complexity and design cost. In a conclusion, we successfully develop an ultrasonic scalpel to replace the other electrosurgical counterparts and the conventional scalpels with lower cost and better functionality.
Advisors/Committee Members: Sanchez-Sinencio, Edgar (advisor), Enjeti, Prasad (committee member), Entesari, Kamran (committee member), Parlos, Alexander G. (committee member).
Subjects/Keywords: energy harvesting; power management; Internet of Things; MPPT; piezoelectric transducers; biomedical device; surgical instruments
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Liu, X. (2016). Power Management ICs for Internet of Things, Energy Harvesting and Biomedical Devices. (Doctoral Dissertation). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/187367
Chicago Manual of Style (16th Edition):
Liu, Xiaosen. “Power Management ICs for Internet of Things, Energy Harvesting and Biomedical Devices.” 2016. Doctoral Dissertation, Texas A&M University. Accessed April 21, 2021.
http://hdl.handle.net/1969.1/187367.
MLA Handbook (7th Edition):
Liu, Xiaosen. “Power Management ICs for Internet of Things, Energy Harvesting and Biomedical Devices.” 2016. Web. 21 Apr 2021.
Vancouver:
Liu X. Power Management ICs for Internet of Things, Energy Harvesting and Biomedical Devices. [Internet] [Doctoral dissertation]. Texas A&M University; 2016. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/1969.1/187367.
Council of Science Editors:
Liu X. Power Management ICs for Internet of Things, Energy Harvesting and Biomedical Devices. [Doctoral Dissertation]. Texas A&M University; 2016. Available from: http://hdl.handle.net/1969.1/187367

Stellenbosch University
22.
Vogt, Raphael.
Development of smart bin systems and derivation of generic design guidelines.
Degree: MEng, Industrial Engineering, 2019, Stellenbosch University
URL: http://hdl.handle.net/10019.1/105772
Subjects/Keywords: Intralogistics; Smart bin systems; Internet of things – Software; Requirement profiles; Data management; UCTD
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Vogt, R. (2019). Development of smart bin systems and derivation of generic design guidelines. (Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/105772
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Vogt, Raphael. “Development of smart bin systems and derivation of generic design guidelines.” 2019. Thesis, Stellenbosch University. Accessed April 21, 2021.
http://hdl.handle.net/10019.1/105772.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Vogt, Raphael. “Development of smart bin systems and derivation of generic design guidelines.” 2019. Web. 21 Apr 2021.
Vancouver:
Vogt R. Development of smart bin systems and derivation of generic design guidelines. [Internet] [Thesis]. Stellenbosch University; 2019. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/10019.1/105772.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Vogt R. Development of smart bin systems and derivation of generic design guidelines. [Thesis]. Stellenbosch University; 2019. Available from: http://hdl.handle.net/10019.1/105772
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Stellenbosch University
23.
Steenkamp, Lukas Petrus.
The application of production-related information technology architecture to improve on visual management systems within the manufacturing industry.
Degree: MEng, Industrial Engineering, 2017, Stellenbosch University
URL: http://hdl.handle.net/10019.1/101112
► ENGLISH ABSTRACT: This research investigates the relationship between technology advancements and the effects thereof in manufacturing industry in relation to the complexity of the production…
(more)
▼ ENGLISH ABSTRACT: This research investigates the relationship between technology advancements and the effects thereof in manufacturing industry in relation to the complexity of the production lines, resource efficiency and time management. Specifically, the study focuses on the use of Production-Related Information Technology Architecture (PRITA) to improve data sourcing, processing and communication within the manufacturing environment in order to improve the use of Visual Management System (VMS) capabilities. Current technologic advancements, and therefore the manufacturing paradigm by extension, have advanced enough to make VMS a possibility. Case studies were developed and implemented with the aim of identifying the elements of VMS that facilitate data sourcing and processing in order to yield production-related information after which the information was displayed digitally. These case studies were implemented within the academic manufacturing environment that replicates typical small medium enterprises (SMEs) in South Africa. The results revealed that the VMS was considered an important value-adding element to the manufacturing industry with 77% of the expert interview participants agreeing. VMS provided the functionalities of trend analytics that could provide information regarding the operational condition of production and making conservative predictions of the production cycle analysis. VMS can provide the solution to understanding and relating the information to improve on the traditional flow of information. This new method will involve an increased amount of data collection on lower operation levels from which the information can flow up through managerial levels to produce action items and information flowing down the model again. The study concluded with an effect and benefit summery of the PRITA and VMS model, a cost and labour analysis and a discussion of research limitations.
AFRIKAANSE OPSOMMING: Hierdie navorsing ondersoek die verwantskap tussen tegnologiese vooruitgang en die gevolge daarvan in die vervaardiging industrie en fokus op die kompleksiteit van die produksie lyne, doeltreffendheid hulpbron- en tydsbestuur. Die studie fokus spesifiek op die gebruik van Produksieverwante Inligtingstegnologie Argitektuur (PVITA) sisteme om data van die bron te kry, te verwerk en kommunikasie van inligting te verbeter binne die vervaardiging omgewing deur gebruik te maak van Visuele Bestuur Sisteem (VBS). Die vooruitgang van huidiglike tegnologie en dus die vervaardiging paradigma by uitbreiding, het genoeg ontwikkel die laaste tyd om VBS 'n moontlikheid te maak. Data versameling en verwerking wat deur elemente van die VBS gefasiliteer en evalueer word, wat produksieverwante inligting digitaal vertoon, is deur middel van die ontwikkeling van gevallestudies gedoen. Die gevallestudies is geïmplementeer in die akademiese vervaardigingsomgewing wat tipiese klein medium ondernemings (KMO) in Suid-Afrika verteenwoordig. Die gevolgtrekking van die navorsing is dat VBS ʼn belangrike waardetoevoeging element van…
Advisors/Committee Members: Von Leipzig, Konrad, Oosthuizen, Tiaan, Stellenbosch University. Faculty of Engineering. Dept. of Industrial Engineering..
Subjects/Keywords: Visual management system; Manufacturing industries – Technological innovations; Internet of things; Smart materials in design; UCTD
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Steenkamp, L. P. (2017). The application of production-related information technology architecture to improve on visual management systems within the manufacturing industry. (Thesis). Stellenbosch University. Retrieved from http://hdl.handle.net/10019.1/101112
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Steenkamp, Lukas Petrus. “The application of production-related information technology architecture to improve on visual management systems within the manufacturing industry.” 2017. Thesis, Stellenbosch University. Accessed April 21, 2021.
http://hdl.handle.net/10019.1/101112.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Steenkamp, Lukas Petrus. “The application of production-related information technology architecture to improve on visual management systems within the manufacturing industry.” 2017. Web. 21 Apr 2021.
Vancouver:
Steenkamp LP. The application of production-related information technology architecture to improve on visual management systems within the manufacturing industry. [Internet] [Thesis]. Stellenbosch University; 2017. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/10019.1/101112.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Steenkamp LP. The application of production-related information technology architecture to improve on visual management systems within the manufacturing industry. [Thesis]. Stellenbosch University; 2017. Available from: http://hdl.handle.net/10019.1/101112
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Toronto
24.
Li, David King Wai.
A Power Management Scheme Using A Time-shared Inductor for Energy Harvester Applications with Low Cold-start Voltage.
Degree: 2017, University of Toronto
URL: http://hdl.handle.net/1807/76844
► Performance of energy harvesters is investigated for Internet-of-Things (IoT) applica- tions. Analysis reveals the inductor can be time-shared between energy harvesting and load regulation in…
(more)
▼ Performance of energy harvesters is investigated for Internet-of-Things (IoT) applica-
tions. Analysis reveals the inductor can be time-shared between energy harvesting and
load regulation in an energy-ecient manner by leveraging IoT systems' low activity fac-
tor. However, such implementations can impair the harvester's capability during cold-
start. Subsequently, the system has to compromise its input/output voltage range and/or
increase the inductance.
Two novel architectures - Zero Reference, Self-Starving Ring Oscillator and Dickson-
Linked Voltage Doubler - are developed to enhance the converter's cold-start. Post-layout simulations demonstrate the proposed solution can cold-start from 225mV input using 4.7H inductor, translating to 25% improvement over existing solutions.
Besides time-sharing the inductor, the periodic nature of IoT applications is exploited
to enhance dynamic response of load regulation. A Preemptive Concurrent Control
(PCC) scheme is established and presented. Experimental results show the PCC sur-
passes existing solutions in dynamic response and achieves same specications using 10x less capacitance.
M.A.S.
Advisors/Committee Members: Trescases, Olivier, Electrical and Computer Engineering.
Subjects/Keywords: Cold Start; Dynamic Response; Integrated Circuits; Internet of Things; Low Voltage; Power Management; 0537
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Li, D. K. W. (2017). A Power Management Scheme Using A Time-shared Inductor for Energy Harvester Applications with Low Cold-start Voltage. (Masters Thesis). University of Toronto. Retrieved from http://hdl.handle.net/1807/76844
Chicago Manual of Style (16th Edition):
Li, David King Wai. “A Power Management Scheme Using A Time-shared Inductor for Energy Harvester Applications with Low Cold-start Voltage.” 2017. Masters Thesis, University of Toronto. Accessed April 21, 2021.
http://hdl.handle.net/1807/76844.
MLA Handbook (7th Edition):
Li, David King Wai. “A Power Management Scheme Using A Time-shared Inductor for Energy Harvester Applications with Low Cold-start Voltage.” 2017. Web. 21 Apr 2021.
Vancouver:
Li DKW. A Power Management Scheme Using A Time-shared Inductor for Energy Harvester Applications with Low Cold-start Voltage. [Internet] [Masters thesis]. University of Toronto; 2017. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/1807/76844.
Council of Science Editors:
Li DKW. A Power Management Scheme Using A Time-shared Inductor for Energy Harvester Applications with Low Cold-start Voltage. [Masters Thesis]. University of Toronto; 2017. Available from: http://hdl.handle.net/1807/76844
25.
Marques, Sofia Sucena Melo.
IoT traffic flow management in software defined networks
.
Degree: 2018, Universidade de Aveiro
URL: http://hdl.handle.net/10773/25032
► In the past few years we have witnessed a growing interest in the Internet of Things (IoT ) concept, which has resulted in new challenges…
(more)
▼ In the past few years we have witnessed a growing interest in the
Internet of
Things (IoT ) concept, which has resulted in new challenges to current and future
networks. Each IoT device has been designed to meet a specific objective
as well as the environment where these devices are deployed. This implies
the creation of IoT subnetworks, where there is a variety of heterogeneous
communications.
Besides this, due to the increase of devices connected to the
Internet, the size
and complexity of modern infrastructures deployments have evolved to a state
that challenges their
management. As the number of connected devices continues
to expand, the network capacity is becoming limited and networks are
facing a tipping point, as mobile data is also on the rise. The traditional networking
approach requires the manual configuration of each network device,
which contributes to the increase of costs for network operators as they have
to upgrade their networks to meet the current demand.
To comply with these objectives, it is necessary to adopt new strategies that
are able to integrate this heterogeneity in the devices and also in the network
in a stable communication platform and this where the concept of Software
Defined Networking (SDN) will contribute.
SDN represents a modern networking approach, where the data and control
planes are separated which enables a more scalable and flexible network
architecture. By leveraging network infrastructures in a scalable and practical
way, SDN allows the simplification of the network design and as well as
dynamic control, while it reduces the investment in hardware platforms. It
provides tools that are implemented through software processes that can be
applied centrally and provisioned automatically using orchestration tools.
This master thesis aims to show that SDN is a viable tool to manage the increased
IoT traffic in the network with high efficiency and to guarantee the
QoS demanded by these types of data.
Advisors/Committee Members: Corujo, Daniel Nunes (advisor), Aguiar, Rui Luís Andrade (advisor).
Subjects/Keywords: Software Defined Networks (SDN);
OpenFlow;
OpenDaylight;
Internet of Things (IoT);
Traffic management
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Marques, S. S. M. (2018). IoT traffic flow management in software defined networks
. (Thesis). Universidade de Aveiro. Retrieved from http://hdl.handle.net/10773/25032
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Marques, Sofia Sucena Melo. “IoT traffic flow management in software defined networks
.” 2018. Thesis, Universidade de Aveiro. Accessed April 21, 2021.
http://hdl.handle.net/10773/25032.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Marques, Sofia Sucena Melo. “IoT traffic flow management in software defined networks
.” 2018. Web. 21 Apr 2021.
Vancouver:
Marques SSM. IoT traffic flow management in software defined networks
. [Internet] [Thesis]. Universidade de Aveiro; 2018. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/10773/25032.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Marques SSM. IoT traffic flow management in software defined networks
. [Thesis]. Universidade de Aveiro; 2018. Available from: http://hdl.handle.net/10773/25032
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Uppsala University
26.
Hahne, Johannes.
Vägen mot en integration av BIM och Internet of Things : En modell över fördelar och förutsättningar vid användning av Internet of Things i BIM.
Degree: Byggteknik, 2018, Uppsala University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355791
► This thesis considers the integration of BIM and IoT in the building process of offices. The thesis is hopefully going to create knowledge about…
(more)
▼ This thesis considers the integration of BIM and IoT in the building process of offices. The thesis is hopefully going to create knowledge about BIM and IoT and describe what needs to be done to carry out an integration.The planning of offices today consists of the use of BIM and a lot of smart solutions. But what are the benefits from an integration of BIM and Internet of Things and how can this be used throughout the building process? New and smart solutions are invented all the time and although not all are possible to use in everyday offices, some can already be of great use. For the future there is a great need for smart and sustainable solutions that helps to conserve energy but at the same time are economically sustainable. This needs to become a part of our everyday to help conquer one of our times biggest challenges, the environmental issue. This thesis highlights the advantages, disadvantages and requirements of an integration of BIM and IoT. It concerns the technology behind IoT and what the future has to offer.The result of the written thesis is a model that describes how an integration of BIM and IoT can be carried out during the different stages of the building process. The model is going to work like a cycle where information from sensors constantly flows to the BIM model during the entire building process. Information and experiences gained from the different stages of the building process can be used to evaluate the construction and its different systems and the experience gained is used in the next project.An integration will be hard to do on a big scale due to different factors. The technology is here but the pathway and standards for it are not.
Subjects/Keywords: Internet of Things; Building Information Model; kontor; smarta byggnader; Construction Management; Byggproduktion
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hahne, J. (2018). Vägen mot en integration av BIM och Internet of Things : En modell över fördelar och förutsättningar vid användning av Internet of Things i BIM. (Thesis). Uppsala University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355791
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Hahne, Johannes. “Vägen mot en integration av BIM och Internet of Things : En modell över fördelar och förutsättningar vid användning av Internet of Things i BIM.” 2018. Thesis, Uppsala University. Accessed April 21, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355791.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Hahne, Johannes. “Vägen mot en integration av BIM och Internet of Things : En modell över fördelar och förutsättningar vid användning av Internet of Things i BIM.” 2018. Web. 21 Apr 2021.
Vancouver:
Hahne J. Vägen mot en integration av BIM och Internet of Things : En modell över fördelar och förutsättningar vid användning av Internet of Things i BIM. [Internet] [Thesis]. Uppsala University; 2018. [cited 2021 Apr 21].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355791.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Hahne J. Vägen mot en integration av BIM och Internet of Things : En modell över fördelar och förutsättningar vid användning av Internet of Things i BIM. [Thesis]. Uppsala University; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-355791
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Windsor
27.
Chen, Long.
Security Management for The Internet of Things.
Degree: MA, Electrical and Computer Engineering, 2017, University of Windsor
URL: https://scholar.uwindsor.ca/etd/5932
► The expansion of Internet connected automation provides a number of opportunities and applications that were not imaginable before. A prominent example is the Internet of…
(more)
▼ The expansion of
Internet connected automation provides a number of opportunities and applications that were not imaginable before. A prominent example is the
Internet of
things (IoT). IoT is a network system that consists of many wired or wireless smart sensors and applications. The development of IoT has been taking decades. However, cyberattacks threat the IoT since the day it was born; different threats and attacks may cause serious disasters to the network system without the essential security protection. Thus, the security and the
management of the IoT security system become quite significant. This research work into security
management of IoT involves five sections. We first point out the conception and background of the IoT. Then, the security requirements for the IoT have been discussed intensively. Next a proposed layered-security
management architecture has been outlined and described. An example of how conveniently this proposed architecture can be used to come up with the security
management for a network of the IoT is explained in detail. Finally, summarise the results of implementing the proposed security functions architecture to obtain the efficient and strong security in an IoT environment.
Advisors/Committee Members: Erfani, Shervin.
Subjects/Keywords: Architecture and Layers; Internet of Things; Security and Management; Threats and Attacks
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Chen, L. (2017). Security Management for The Internet of Things. (Masters Thesis). University of Windsor. Retrieved from https://scholar.uwindsor.ca/etd/5932
Chicago Manual of Style (16th Edition):
Chen, Long. “Security Management for The Internet of Things.” 2017. Masters Thesis, University of Windsor. Accessed April 21, 2021.
https://scholar.uwindsor.ca/etd/5932.
MLA Handbook (7th Edition):
Chen, Long. “Security Management for The Internet of Things.” 2017. Web. 21 Apr 2021.
Vancouver:
Chen L. Security Management for The Internet of Things. [Internet] [Masters thesis]. University of Windsor; 2017. [cited 2021 Apr 21].
Available from: https://scholar.uwindsor.ca/etd/5932.
Council of Science Editors:
Chen L. Security Management for The Internet of Things. [Masters Thesis]. University of Windsor; 2017. Available from: https://scholar.uwindsor.ca/etd/5932

Texas State University – San Marcos
28.
Radhakrishna, Chaithra.
IOT Based Network Management Portal for Augmented Reality Applications.
Degree: MS, Engineering, 2018, Texas State University – San Marcos
URL: https://digital.library.txstate.edu/handle/10877/7877
► Internet of Things (IoT) along with the evolution of Wireless sensor networks and Augmented Reality technologies has opened many avenues in multiple real-world scenarios that…
(more)
▼ Internet of
Things (IoT) along with the evolution of Wireless sensor networks and Augmented Reality technologies has opened many avenues in multiple real-world scenarios that need extensive human interaction. The potent combination of technologies seamlessly amalgamates real and digital world allowing us to improvise in the field of education. Zigbee wireless protocol (802.15.4) has been instrumental in achieving low cost continuous monitoring systems but the ability to demonstrate the network topology depends solely on the distance separating the various nodes. We improvise the existing protocol and thus facilitate the nodes to form mesh topology based on pre-defined parameters but predominantly based on Link Quality Indicator (LQI). A network
management portal is created which gives us the ability to control the type of desired network topology based on the defined protocol and interact with actuators. This further integrates with an Augmented Reality application thus providing us with an ability to control and visualize the topology through the AR interface. A comparative analysis of the node behavior under different external factors is done and conclusion is made regarding the sustainability of the proposed model for short range experimentation in educational applications.
Advisors/Committee Members: Koutitas, George (advisor), Aslan, Semih (committee member), Stapleton, William (committee member).
Subjects/Keywords: Network management; Portals; Augmented reality; Link Quality Indicator; Internet of things; Augmented reality
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Radhakrishna, C. (2018). IOT Based Network Management Portal for Augmented Reality Applications. (Masters Thesis). Texas State University – San Marcos. Retrieved from https://digital.library.txstate.edu/handle/10877/7877
Chicago Manual of Style (16th Edition):
Radhakrishna, Chaithra. “IOT Based Network Management Portal for Augmented Reality Applications.” 2018. Masters Thesis, Texas State University – San Marcos. Accessed April 21, 2021.
https://digital.library.txstate.edu/handle/10877/7877.
MLA Handbook (7th Edition):
Radhakrishna, Chaithra. “IOT Based Network Management Portal for Augmented Reality Applications.” 2018. Web. 21 Apr 2021.
Vancouver:
Radhakrishna C. IOT Based Network Management Portal for Augmented Reality Applications. [Internet] [Masters thesis]. Texas State University – San Marcos; 2018. [cited 2021 Apr 21].
Available from: https://digital.library.txstate.edu/handle/10877/7877.
Council of Science Editors:
Radhakrishna C. IOT Based Network Management Portal for Augmented Reality Applications. [Masters Thesis]. Texas State University – San Marcos; 2018. Available from: https://digital.library.txstate.edu/handle/10877/7877

Virginia Tech
29.
Saha, Avijit.
Development of a Software Platform with Distributed Learning Algorithms for Building Energy Efficiency and Demand Response Applications.
Degree: PhD, Electrical Engineering, 2017, Virginia Tech
URL: http://hdl.handle.net/10919/74423
► In the United States, over 40% of the country's total energy consumption is in buildings, most of which are either small-sized (<5,000 sqft) or medium-sized…
(more)
▼ In the United States, over 40% of the country's total energy consumption is in buildings, most of which are either small-sized (<5,000 sqft) or medium-sized (5,000-50,000 sqft). These buildings offer excellent opportunities for energy saving and demand response (DR), but these opportunities are rarely utilized due to lack of effective building energy
management systems and automated algorithms that can assist a building to participate in a DR program. Considering the low load factor in US and many other countries, DR can serve as an effective tool to reduce peak demand through demand-side load curtailment. A convenient option for the customer to benefit from a DR program is to use automated DR algorithms within a software that can learn user comfort preferences for the building loads and make automated load curtailment decisions without affecting customer comfort. The objective of this dissertation is to provide such a solution.
First, this dissertation contributes to the development of key features of a building energy
management open source software platform that enable ease-of-use through plug and play and interoperability of devices in a building, cost-effectiveness through deployment in a low-cost computer, and DR through communication infrastructure between building and utility and among multiple buildings, while ensuring security of the platform.
Second, a set of reinforcement learning (RL) based algorithms is proposed for the three main types of loads in a building: heating, ventilation and air conditioning (HVAC) loads, lighting loads and plug loads. In absence of a DR program, these distributed agent-based learning algorithms are designed to learn the user comfort ranges through explorative interaction with the environment and accumulating user feedback, and then operate through policies that favor maximum user benefit in terms of saving energy while ensuring comfort.
Third, two sets of DR algorithms are proposed for an incentive-based DR program in a building. A user-defined priority based DR algorithm with smart thermostat control and utilization of distributed energy resources (DER) is proposed for residential buildings. For commercial buildings, a learning-based algorithm is proposed that utilizes the learning from the RL algorithms to use a pre-cooling/pre-heating based load reduction method for HVAC loads and a mixed integer linear programming (MILP) based optimization method for other loads to dynamically maintain total building demand below a demand limit set by the utility during a DR event, while minimizing total user discomfort. A user defined priority based DR algorithm is also proposed for multiple buildings in a community so that they can participate in realizing combined DR objectives.
The software solution proposed in this dissertation is expected to encourage increased participation of smaller and medium-sized buildings in demand response and energy saving activities. This will help in alleviating power system stress conditions by employing the untapped DR potential in such buildings.
Advisors/Committee Members: Rahman, Saifur (committeechair), De La Reelopez, Jaime (committee member), Yu, Guoqiang (committee member), Haghighat, Alireza (committee member), Pipattanasomporn, Manisa (committee member).
Subjects/Keywords: Building Energy Management System; Energy Efficiency; Demand Response; Internet of Things; Reinforcement Learning
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Saha, A. (2017). Development of a Software Platform with Distributed Learning Algorithms for Building Energy Efficiency and Demand Response Applications. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/74423
Chicago Manual of Style (16th Edition):
Saha, Avijit. “Development of a Software Platform with Distributed Learning Algorithms for Building Energy Efficiency and Demand Response Applications.” 2017. Doctoral Dissertation, Virginia Tech. Accessed April 21, 2021.
http://hdl.handle.net/10919/74423.
MLA Handbook (7th Edition):
Saha, Avijit. “Development of a Software Platform with Distributed Learning Algorithms for Building Energy Efficiency and Demand Response Applications.” 2017. Web. 21 Apr 2021.
Vancouver:
Saha A. Development of a Software Platform with Distributed Learning Algorithms for Building Energy Efficiency and Demand Response Applications. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2021 Apr 21].
Available from: http://hdl.handle.net/10919/74423.
Council of Science Editors:
Saha A. Development of a Software Platform with Distributed Learning Algorithms for Building Energy Efficiency and Demand Response Applications. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/74423

Clemson University
30.
Zhang, Xiaonan.
Enable Reliable and Secure Data Transmission in Resource-Constrained Emerging Networks.
Degree: PhD, Computer Engineering, 2020, Clemson University
URL: https://tigerprints.clemson.edu/all_dissertations/2686
► The increasing deployment of wireless devices has connected humans and objects all around the world, benefiting our daily life and the entire society in…
(more)
▼ The increasing deployment of wireless devices has connected humans and objects all around the world, benefiting our daily life and the entire society in many aspects. Achieving those connectivity motivates the emergence of different types of paradigms, such as cellular networks, large-scale
Internet of
Things (IoT), cognitive networks, etc. Among these networks, enabling reliable and secure data transmission requires various resources including spectrum, energy, and computational capability. However, these resources are usually limited in many scenarios, especially when the number of devices is considerably large, bringing catastrophic consequences to data transmission. For example, given the fact that most of IoT devices have limited computational abilities and inadequate security protocols, data transmission is vulnerable to various attacks such as eavesdropping and replay attacks, for which traditional security approaches are unable to address. On the other hand, in the cellular network, the ever-increasing data traffic has exacerbated the depletion of spectrum along with the energy consumption. As a result, mobile users experience significant congestion and delays when they request data from the cellular service provider, especially in many crowded areas.
In this dissertation, we target on reliable and secure data transmission in resource-constrained emerging networks. The first two works investigate new security challenges in the current heterogeneous IoT environment, and then provide certain countermeasures for reliable data communication. To be specific, we identify a new physical-layer attack, the signal emulation attack, in the heterogeneous environment, such as smart home IoT. To defend against the attack, we propose two defense strategies with the help of a commonly found wireless device. In addition, to enable secure data transmission in large-scale IoT network, e.g., the industrial IoT, we apply the amply-and-forward cooperative communication to increase the secrecy capacity by incentivizing relay IoT devices. Besides security concerns in IoT network, we seek data traffic alleviation approaches to achieve reliable and energy-efficient data transmission for a group of users in the cellular network. The concept of mobile participation is introduced to assist data offloading from the base station to users in the group by leveraging the mobility of users and the social features among a group of users. Following with that, we deploy device-to-device data offloading within the group to achieve the energy efficiency at the user side while adapting to their increasing traffic demands. In the end, we consider a perpendicular topic - dynamic spectrum access (DSA) - to alleviate the spectrum scarcity issue in cognitive radio network, where the spectrum resource is limited to users. Specifically, we focus on the security concerns and further propose two physical-layer schemes to prevent spectrum misuse in DSA in both additive white Gaussian noise and fading environments.
Advisors/Committee Members: Dr. Linke Guo, Committee Chair, Dr. Daniel Noneaker, Dr. Harlan Russell, Dr. Long Cheng.
Subjects/Keywords: Dynamic Spectrum Access; Internet of Things; Resource Management; Wireless Network; Wireless Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Zhang, X. (2020). Enable Reliable and Secure Data Transmission in Resource-Constrained Emerging Networks. (Doctoral Dissertation). Clemson University. Retrieved from https://tigerprints.clemson.edu/all_dissertations/2686
Chicago Manual of Style (16th Edition):
Zhang, Xiaonan. “Enable Reliable and Secure Data Transmission in Resource-Constrained Emerging Networks.” 2020. Doctoral Dissertation, Clemson University. Accessed April 21, 2021.
https://tigerprints.clemson.edu/all_dissertations/2686.
MLA Handbook (7th Edition):
Zhang, Xiaonan. “Enable Reliable and Secure Data Transmission in Resource-Constrained Emerging Networks.” 2020. Web. 21 Apr 2021.
Vancouver:
Zhang X. Enable Reliable and Secure Data Transmission in Resource-Constrained Emerging Networks. [Internet] [Doctoral dissertation]. Clemson University; 2020. [cited 2021 Apr 21].
Available from: https://tigerprints.clemson.edu/all_dissertations/2686.
Council of Science Editors:
Zhang X. Enable Reliable and Secure Data Transmission in Resource-Constrained Emerging Networks. [Doctoral Dissertation]. Clemson University; 2020. Available from: https://tigerprints.clemson.edu/all_dissertations/2686
◁ [1] [2] [3] [4] [5] … [13256] ▶
.