Academic literature on the topic 'Connected devices'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Connected devices.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Connected devices"

1

Tomlinson, Bill, Man Lok Yau, Eric Baumer, Joel Ross, Andrew Correa, and Gang Ji. "Richly Connected Systems and Multi-Device Worlds." Presence: Teleoperators and Virtual Environments 18, no. 1 (February 1, 2009): 54–71. http://dx.doi.org/10.1162/pres.18.1.54.

Full text
Abstract:
Many human activities now take place in settings that include several computational devices—such as desktop computers, laptops, and mobile phones—in the same physical space. However, we lack interaction paradigms that support a coherent experience across these collocated technologies and enable them to work effectively as systems. This article presents a conceptual framework for building richly connected systems of collocated devices, and offers two implemented examples of interactive virtual worlds built on this framework. Aspects of this framework include multiple channels of real and apparent connectivity among devices: for example, multiple kinds of data networking, cross-device graphics and sound, and embodied mobile agents that inhabit the multi-device system. In addition, integration of the system with the physical world helps bridge the gap between devices. We evaluate the framework in terms of the types of user experiences afforded and enabled by the implemented systems. We also present a number of lessons learned from this evaluation regarding how to develop richly connected systems using heterogeneous devices, as well as the expectations that users bring to this kind of system. The core contribution of this paper is a novel framework for collocated multi-device systems; by presenting this framework, this paper lays the groundwork for a wide range of potential applications.
APA, Harvard, Vancouver, ISO, and other styles
2

Klonoff, David C. "Cybersecurity for Connected Diabetes Devices." Journal of Diabetes Science and Technology 9, no. 5 (April 16, 2015): 1143–47. http://dx.doi.org/10.1177/1932296815583334.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maidment, David W., and Amyn M. Amlani. "Argumentum ad Ignorantiam: Smartphone-Connected Listening Devices." Seminars in Hearing 41, no. 04 (November 2020): 254–65. http://dx.doi.org/10.1055/s-0040-1718711.

Full text
Abstract:
AbstractIn this article, we review the current literature assessing the application and benefits of connected hearing technologies, as well as their potential to improve accessibility to and affordability of hearing healthcare. Over the past decade, there has been a proliferation of hearing devices that connect wirelessly to smartphone technologies via Bluetooth. These devices include (1) smartphone-connected hearing aids that must be obtained from a licensed audiologist or hearing aid dispenser; (2) direct-to-consumer devices, such as personal sound amplification products; and (3) smartphone-based hearing aid applications (or apps). Common to all these connected devices is that they permit the user to self-adjust and customize their device programs via an accompanying smartphone app. There has been a growing body of literature assessing connected hearing devices in adults living with hearing loss. Overall, the evidence to date supports the notion that all connected hearing devices can improve accessibility to and affordability of amplification. It is unclear, however, whether connected technologies are a clinically effective alternative to traditional hearing aids. Even so, the impact of connectivity is especially pertinent given the sudden disruption caused by the recent global COVID-19 pandemic, whereby connected technologies enable patients to receive treatment through mobile-based, tele-audiology platforms.
APA, Harvard, Vancouver, ISO, and other styles
4

Yoon, Dongkwan, Sungmin Lee, and Younghoon Cho. "Design Considerations of Series-Connected Devices Based LLC Converter." Energies 13, no. 1 (January 5, 2020): 264. http://dx.doi.org/10.3390/en13010264.

Full text
Abstract:
This paper describes the design of a Series-Connected Device based on a fixed–frequency LLC resonant converter (SCDLLC). Isolation of the dc-dc converter like the LLC resonant converter is used for the stability of the high voltage system such as a solid-state-transformer (SST). The series-connected devices driving method is one of the methods applicable to a high voltage system. When driving series-connected devices, an auxiliary circuit for voltage balancing between series-connected devices is required, which can be simply implemented using a passive element. In this paper, LLC converter design with balancing circuits configured in parallel with a device is provided, and both the simulations and experiments were performed.
APA, Harvard, Vancouver, ISO, and other styles
5

Sawade, Mr Akshay M., and Mr Aditya B. Mandlik. "Wireless Control of Electrical Devices with Realtime Feedback." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 1646–52. http://dx.doi.org/10.22214/ijraset.2022.45532.

Full text
Abstract:
Abstract: This research idea originates from the core concepts of IoT connecting devices and focuses on minimizing human interference regarding the control of devices. This invention shapes its user into smart ones by making them a vital part of the technology. The end-user can supervise the devices connected to the developed hardware that reflects the operating state of these connected devices by use of the microcontroller ESP12F. The device state is presented to the end-user through the mobile application using the backend as the Blynk platform. This project is run on the cloud server and hence provides real-time status of the connected device.
APA, Harvard, Vancouver, ISO, and other styles
6

Solera-Cotanilla, Sonia, Mario Vega-Barbas, Jaime Pérez, Gregorio López, Javier Matanza, and Manuel Álvarez-Campana. "Security and Privacy Analysis of Youth-Oriented Connected Devices." Sensors 22, no. 11 (May 24, 2022): 3967. http://dx.doi.org/10.3390/s22113967.

Full text
Abstract:
Under the Internet of Things paradigm, the emergence and use of a wide variety of connected devices and personalized telematics services have proliferated recently. As a result, along with the penetration of these devices in our daily lives, the users’ security and privacy have been compromised due to some weaknesses in connected devices and underlying applications. This article focuses on analyzing the security and privacy of such devices to promote safe Internet use, especially by young people. First, the connected devices most used by the target group are classified, and an exhaustive analysis of the vulnerabilities that concern the user is performed. As a result, a set of differentiated security and privacy issues existing in the devices is identified. The study reveals that many of these vulnerabilities are related to the fact that device manufacturers often prioritize functionalities and services, leaving security aspects in the background. These companies even exploit the data linked to the use of these devices for various purposes, ignoring users’ privacy rights. This research aims to raise awareness of severe vulnerabilities in devices and to encourage users to use them correctly. Our results help other researchers address these issues with a more global perspective.
APA, Harvard, Vancouver, ISO, and other styles
7

Camacho, Ricardo, and Mark Pitchford. "Connected Healthcare." New Electronics 51, no. 19 (October 22, 2019): 18–19. http://dx.doi.org/10.12968/s0047-9624(22)61458-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Norman, Helen. "Getting Connected." Consumer Electronics Test & Development 2021, no. 1 (July 2021): 16–20. http://dx.doi.org/10.12968/s2754-7744(23)70005-5.

Full text
Abstract:
Nicola Tonello, global laboratory methods competence leader at Electrolux, looks at the latest electronic system testing processes being adopted and how connected devices have revolutionized test methodologies
APA, Harvard, Vancouver, ISO, and other styles
9

Dormanns, Marcus. "Get Connected." Consumer Electronics Test & Development 2021, no. 1 (July 2021): 60–61. http://dx.doi.org/10.12968/s2754-7744(23)70017-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Naftalovich, Rotem, Steven Char, Andrew J. Iskander, and Daniel Naftalovich. "Even the Simplest Devices May Malfunction: Split Septum Design Revisited." Biomedical Instrumentation & Technology 55, no. 1 (January 1, 2021): 41–43. http://dx.doi.org/10.2345/0890-8205-55.1.41.

Full text
Abstract:
Abstract Split septum medical devices are used in tubing for intravenous (IV) fluid administration—an extremely common clinical task. These tubing caps contain a needleless, valveless system that allows fluid to flow directly through the lumen of the catheter but prevents backflow of fluid or blood when the tubing extension is not connected. We experienced complete failure of a needle-free connector extension set with a Luer-access split septum device in multiple patients due to the split septum remaining fused and essentially unsplit despite being connected on both ends. This led to an adverse event in a patient due to repeated unnecessary IV insertion attempts. This case shows how even the simplest of devices can malfunction and highlights the need for vigilance in clinical practice.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Connected devices"

1

Öhrström, Tobias, and Christoffer Olsson. "The precision of RSSI-fingerprinting based on connected Wi-Fi devices." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-12161.

Full text
Abstract:
Received Signal Strength Indication (RSSI) fingerprinting is a popular technique in the fieldof indoor positioning. Many studies on the subject exist acknowledging Wi-Fi signal variationconnected to Wi-Fi signals, but does not discuss possible signal variation created byconnected devices nor consequential precision loss.Understanding more about the origins of signal variation in received signal strength indication(RSSI) fingerprinting would help deal with or prevent them as well as provide moreknowledge for applications based on such signals. Environments with a varying number ofconnected devices would benefit from knowing changes in localization precision resultingfrom the devices connecting and disconnecting from the access point because it wouldindicate whether workarounds for such circumstances would be necessary.To address this issue, the work presented here focuses on how the precision of RSSIfingerprinting vary given different levels of connected Wi-Fi devices. It was carried out byconducting real world experiments at times of low- and normal levels of connected devices toaccess points on two separate locations and evaluating precision changes between statedactivity levels. These experiments took place at the University of Borås as well as at Ericssonin Borås.Experimental findings indicate that the accuracy does deteriorate in higher levels of activitythan in low activity, even though not enough evidence to determine the precision ofdeterioration. The experiments thereby provide a foundation for location-based applicationsand services that can communicate the level of positional error that exist in differentenvironments which would make the users aware but also make the applications adaptaccordingly to different environments. Based on the precision achieved, we identify variousapplications that would benefit from our proposed model. These were applications that wouldtrack mobile resources, find immobile resources, find the movement flows of users as well asnavigation- and Wi-Fi coverage applications.Further research for investigating the exact correlation between access point stress andprecision loss is proposed to fully understand the implications connected devices have onRSSI fingerprinting.
APA, Harvard, Vancouver, ISO, and other styles
2

Ting, Voon-Cheung Roger. "Separation and recognition of connected handprinted capital English characters." Thesis, University of British Columbia, 1986. http://hdl.handle.net/2429/26747.

Full text
Abstract:
The subject of machine recognition of connected characters is investigated. A generic single character recognizer (SCR) assumes there is only one character in the image. The goal of this project is to design a connected character segmentation algorithm (CCSA) without the above assumption. The newly designed CCSA will make use of a readily available SCR. The input image (e.g. a word with touching letters) is first transformed (thinned) into its skeletal form. The CCSA will then extract the image features (nodes and branches) and store them in a hierarchical form. The hierarchy stems from the left-to-right rule of writing of the English language. The CCSA will first attempt to recognize the first letter. When this is done, the first letter is deleted and the algorithm repeats. After extracting the image features, the CCSA starts to create a set of test images from the beginning of the word (i.e. beginning of the description). Each test image contains one more feature than its predecessor. The number of test images in the set is constrained by a predetermined fixed width or a fixed total number of features. The SCR is then called to examine each test image. The recognizable test image(s) in the set are extracted. Let each recognizable test image be denoted by C₁. For each C₁, a string of letters C₂, C₃, CL is formed. C₂ is the best recognized test image in a set of test images created after the deletion of C₁ from the beginning of the current word. C₃ through CL are created by the same method. All such strings are examined to determine which string contains the best recognized C₁. Experimental results on test images with two characters yield a recognition rate of 72.66%. Examples with more than two characters are also shown. Furthermore, the experimental results suggested that topologically simple test images can be more difficult to recognize than those which are topologically more complex.
Applied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
3

Rudberg, Zacharias, and Oscar Sandelin. "Impact on manufacturing execution systems through the use of smart connected devices." Thesis, KTH, Industriell produktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-246137.

Full text
Abstract:
The recent development of smart connected devices, in this paper defined as cyberphysical systems (CPS), within the context of Industry 4.0 presents an opportunity for the manufacturing industry to reach new levels of efficiency. The introduction of novel technologies onto the factory floor will however affect the manufacturing execution systems (MES) currently deployed. There exists an uncertainty whether the existing MES are able to be integrated with these new technologies. This paper aims to identify and investigate the main areas affected by the integration of CPS and MES. The results, gained through scientific studies as well as interviews with segments of concerned industry and researchers, allowed us to identify six areas that will be affected. Out of the six areas, two have evolved as to be of most interest, namely architectural integration of systems and the human resource area, since change within the other four areas depend on them. We found that an integration of CPS and MES will not be possible unless two key factors are considered, a standardization of communication between systems and a knowledgeable, open minded and inter-communicating workforce.
Den senaste tidens utveckling av smarta uppkopplade enheter, i texten benämnda cyberphysical systems, inom vad som kallas Industri 4.0 medför en möjlighet för effektivisering inom tillverkningsindustrin. Introduktionen av ny teknik inom tillverkningsindustrin kommer dock att påverka de befintliga produktionsstyrningssystemen och det råder idag en osäkerhet kring om en integration är möjlig. I denna uppsats är målet att identifiera och undersöka de områden som påverkas när smarta uppkopplade enheter introduceras i fabriker. Genom litteraturstudier, såväl som intervjuer med aktörer inom berörd industri och forskare, har vi identifierat sex påverkade områden. Utav dessa sex områden anser vi att två är utav störst intresse. Detta då utvecklingen inom dessa två områden kan ses som en förutsättning för utveckling inom de övriga områdena. De två områdena är systemintegration och personalresurser. Vi fann att en integration mellan smarta uppkopplade enheter och produktionsstyrningssystem endast är möjlig om två nyckelfaktorer beaktas, en standardisering av kommunikation mellan system och en välutbildad, öppen, arbetsstyrka.
APA, Harvard, Vancouver, ISO, and other styles
4

Blomér, Gustav, and Claes Kallström. "Identifying Potential Effects of Using ERP-Connected Mobile Devices in Manufacturing Companies." Thesis, Linköpings universitet, Industriell ekonomi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131004.

Full text
Abstract:
Smartphones and other mobile devices are a common sight in our daily lives. The improvement in technology has given us small and portable devices that have the performance only found in desktop computers and more high-end devices less than a decade ago. An industry that has been quick to adopt technologies in the past is the manufacturing industry, examples of these adoptions are the conveyor belt and robots, which both are innovations of their time. Aside from hardware technologies, there are software technologies that the manufacturing industry has been using, e.g. complex information systems to manage materials and resources in the production. With the developments in mobile technology, a question arises whether the information systems can be combined with it in the manufacturing companies. One of the technologies that has become popular in the past years is the use of mobile devices such as smartphones and tablets. These kinds of devices can improve communication and flexibility. This leads us to the purpose of identifying how the use of ERP-connected mobile and mobility-supporting devices can affect processes among shop floor and production management personnel in large manufacturing companies. Using a qualitative approach, case studies of eleven companies were conducted using semi-structured interviews and direct observations. Personnel with different roles were interviewed to identify applications and devices that would reduce execution time, improve quality, or improve the flexibility of processes and tasks. These eleven companies were analysed with a model that focus on the dimensions complexity, specificity, and dynamism of a company's production structure, as well as a model that focus on the same dimensions in the roles of production personnel. The result was six applications and corresponding devices that could improve the effectiveness and efficiency of a process in a significant way. The analysis showed that the management in companies had similar needs in mobile or mobility-supporting devices. Similarly, the assemblers and machine operators also had similar needs. No connection was found between the production strategy and the need for mobile or mobility-supporting devices.
APA, Harvard, Vancouver, ISO, and other styles
5

Hu, Ji. "Finite element electrothermal modelling and characterization of single and parallel connected power devices." Thesis, University of Warwick, 2016. http://wrap.warwick.ac.uk/86733/.

Full text
Abstract:
Power modules typically comprise of several power devices connected in parallel for the purpose of delivering high current capability. This is especially the case in SiC where small active area and low current MOSFETs are the only option due to defect density control and yield issues in the epitaxial growth of SiC wafers. Electrothermal variations between parallel connected devices can emerge from manufacturing variability, non-uniform degradation rates, variation in gate driving just to mention a few. The impact of electrothermal variation between parallel-connected devices as a function of device technology is thus important to consider especially since failure of the power module requires only failure in a single device. Furthermore, the impact of these electrothermal variations in parallel-connected devices on the total electrothermal ruggedness of the power module under anomalous switching conditions like unclamped inductive switching is important to consider for the different device technologies. In this thesis, the impact of initial junction temperature variation, switching rates and thermal boundary conditions between parallel-connected diodes have been evaluated for SiC Schottky and silicon PiN diodes under clamped and unclamped inductive switching. Finite element simulations have been used to support the experimental measurements. Similar studies have been performed in CoolMOS super-junction MOSFETs, silicon IGBTs and SiC power MOSFETs. New insights regarding the failure of parallel connected devices under unclamped inductive switching have been revealed from the models and measurements. Overall, the thesis makes a major contribution in the understanding of the electrothermal performance of parallel connected devices for different transistor and diode technologies.
APA, Harvard, Vancouver, ISO, and other styles
6

Patten, Jared Russell. "A Flexible FPGA-Assisted Framework for Remote Attestation of Internet Connected Embedded Devices." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6722.

Full text
Abstract:
Embedded devices permeate our every day lives. They exist in our vehicles, traffic lights, medical equipment, and infrastructure controls. In many cases, improper functionality of these devices can present a physical danger to their users, data or financial loss, etc. Improper functionality can be a result of software or hardware bugs, but now more than ever, is often the result of malicious compromise and tampering, or as it is known colloquially "hacking". We are beginning to witness a proliferation of cyber-crime, and as more devices are built with internet connectivity (in the so called "Internet of Things"), security should be of the utmost concern. Embedded devices have begun to seamlessly merge with our daily existence. Therefore the need for security grows as it more directly affects the safety of our data, property, and even physical health. This thesis presents an FPGA-assisted framework for remote attestation, a security service that allows a remote device to prove to a verifying entity that it can be trusted. In other words, it presents a protocol by which a device (be it an insulin pump, vehicle, etc.) can prove to a user (or other entity) that it can be trusted - i.e. that it has not been "hacked". This is accomplished through executable code integrity verification and run-time monitoring. In essence, the protocol verifies that a device is running authorized and untampered software and makes it known to a verifier in a trusted fashion. We implement the protocol on a physical device to demonstrate its feasibility and to examine its performance impact.
APA, Harvard, Vancouver, ISO, and other styles
7

Jönsson, Désirée. "On the investigation of vulnerabilities in smart connected cameras." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20497.

Full text
Abstract:
Människan har alltid utvecklat produkter för att förenkla sin vardag i hemmet. Ett område som växer snabbt är sakernas Internet där smarta ansluta enheter tillhör. Intentionen med smarta kameror är övervakning där man har möjlighet att bevaka sin intelligenta kamera trådlöst från exempelvis en smartmobil. Utmaningar med de intelligenta anslutna kamerorna är att hur kan man få kunskap om spionage, attacker och skador. Många av dessa smarta kameror har mindre resurser tillgängliga, och har då inte möjlighet att implementera optimala säkerhetsmekanismer. Även om dessa smarta enheter kan berika tillvaron och skapa trygghet med sin övervakning, så möjliggör också den smarta kameran nya sätt för angripare att göra intrång, då enheten är uppkopplade mot Internet.Syftet med den här uppsatsen är att undersöka vilken öppen data som finns tillgänglig på Internet om uppkopplade kameror. Detta genom att skapa ett program för att extrahera publik tillgänglig information om smarta kameror som är synliga för alla som har tillgång till Internet, och då också tillgång till Shodans sökmotor. Den öppna datan påvisar sårbarheter som kan utnyttjas för att göra intrång. Sårbarheterna som fanns hos de uppkopplade kamerorna på grund av tillgängligheten på Shodan var osäker konfigurations hantering och otillräcklig autentisering. Genom att belysa befintliga sårbarheter i smarta kameror som finns idag, kunna bidra till hur man med publik tillgänglig information kan få kunskap om sårbarheter hos smarta produkter. Med bakgrund till att sårbarheter finns och den smarta kameran är uppkopplad mot Internet, kan det vara så att det är fler än ägaren till den smarta kameran som övervakar hemmet.
Humans have always developed products to simplify their everyday lives in the home environment. A fast growing area is the Internet of Things where smart connect devices belong. The intention with smart cameras is surveillance where one can monitor their smart camera wireless from e.g a smartphone. Challenges with the intelligent connected cameras includes, how to get knowledge about espionage, attacks and damages. Many of these smart cameras have a reduced-size, low-power hardware with smaller resources available, and therefore unable to implement optimal security mechanisms. Although these connected cameras can enrich the safety and create security with their surveillance, the smart camera also allows new ways for attackers to intrude due to the devices are connected to the Internet.The purpose of this thesis is to investigate what kind of open data is available on the Internet from, connected cameras. This is done by creating a program to extract publicly available smart camera information that is visible to anyone who has access to the Internet, and thus access to Shodan’s search engine. The open data shows vulnerabilities that can potentially be exploited to intrude on devices. The vulnerabilities found in the connected cameras due to availability of Shodan, were insecure configuration management and insufficient authentication. By highlighting significant vulnerabilities in smart cameras found today, the thesis can contribute to how one with publicly available information can gain knowledge about vulnerabilities in smart devices. Given that vulnerabilities exist and the smart camera is connected to the Internet, it may be more than the owner of the smart camera that monitors the residence.
APA, Harvard, Vancouver, ISO, and other styles
8

Meder, Jens. "Human Empowerment in a Semantic Web of Things : Concept of a semantic platform for connected devices." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-226586.

Full text
Abstract:
The Internet of Things is a vision of autonomous devices that can gather, process, and transmit information without human intervention. The power of the Internet of Things lies in the connections between devices and internet resources. They allow humans to delegate automatable tasks to devices and internet services so that they can execute them. Yet, there is no common platform for connecting these resources today. Recent studies show that human autonomy, agency, and social injustice are of concern to users when asked about Internet of Things scenarios. Yet, research focuses on technological advancements, making internet enabled devices more autonomous instead of addressing needs and concerns of users. This thesis identifies requirements for a tool, that allows layman users to create connections between connected devices and internet resources. A Theory of Use incorporates these reqirements and outlines qualities of a good solution which are then refined by sketches. The resulting hypothesis incorporates these qualities as well as the principles of designing for appropriation to support adaptation and adoption by users. The outcome of this thesis is a framework that puts human needs first, supporting human autonomy, agency, and social justice. It includes concepts of the Semantic Web of Things for easy integration of devices and internet services and allows both humans and machines to make sense of the underlying information.
APA, Harvard, Vancouver, ISO, and other styles
9

Bugeja, Joseph. "Smart connected homes : concepts, risks, and challenges." Licentiate thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-7793.

Full text
Abstract:
The growth and presence of heterogeneous connected devices inside the home have the potential to provide increased efficiency and quality of life to the residents. Simultaneously, these devices tend to be Internet-connected and continuously monitor, collect, and transmit data about the residents and their daily lifestyle activities. Such data can be of a sensitive nature, such as camera feeds, voice commands, physiological data, and more. This data allows for the implementation of services, personalization support, and benefits offered by smart home technologies. Alas, there has been a rift of security and privacy attacks on connected home devices that compromise the security, safety, and privacy of the occupants. In this thesis, we provide a comprehensive description of the smart connected home ecosystem in terms of its assets, architecture, functionality, and capabilities. Especially, we focus on the data being collected by smart home devices. Such description and organization are necessary as a precursor to perform a rigorous security and privacy analysis of the smart home. Additionally, we seek to identify threat agents, risks, challenges, and propose some mitigation approaches suitable for home environments. Identifying these is core to characterize what is at stake, and to gain insights into what is required to build more robust, resilient, secure, and privacy-preserving smart home systems. Overall, we propose new concepts, models, and methods serving as a foundation for conducting deeper research work in particular linked to smart connected homes. In particular, we propose a taxonomy of devices; classification of data collected by smart connected homes; threat agent model for the smart connected home; and identify challenges, risks, and propose some mitigation approaches.
APA, Harvard, Vancouver, ISO, and other styles
10

Jakobi, Timo [Verfasser], Gunnar [Gutachter] Stevens, and Volker [Gutachter] Wulf. "Incorporating usable privacy into connected devices: a user‐centered perspective / Timo Jakobi ; Gutachter: Gunnar Stevens, Volker Wulf." Siegen : Universitätsbibliothek der Universität Siegen, 2019. http://d-nb.info/1213521807/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Connected devices"

1

van der Stok, Peter, ed. Dynamic and Robust Streaming in and between Connected Consumer-Electronic Devices. Dordrecht: Springer Netherlands, 2005. http://dx.doi.org/10.1007/1-4020-3454-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

der, Stok Peter van, ed. Dynamic and robust streaming in and between connected consumer-electronic devices. Dordrecht: Springer, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Antero, Taivalsaari, VandenBrink Mark, and Holliday Jim, eds. Programming wireless devices with the Java 2 platform, micro edition: J2ME Connected Limited Device Configuration (CLDC), Mobil Information Device Profile (MIDP). Boston: Addison-Wesley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Riggs, Roger. Programming wireless devices with the Java 2 platform, micro edition: J2ME Connected Limited Device Configuration (CLDC), Mobile Information Device Profile (MIDP). Edited by Taivalsaari Antero, VandenBrink Mark, and Holliday Jim. Boston: Addison-Wesley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

AARP tablets: Tech to connect. Waterville, Maine: Thorndike Press, a part of Gale, Cengage Learning, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hedayatnia, Mostafa. Optimization of a liquid crystal display to a heat seal connector process. Reading, Mass: Addison-Wesley Pub., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Amacom, ed. Wireless, Inc.: Using mobile devices and wireless applications to connect with customers, reduce costs, and maximize profits. New York: AMACOM, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zaleski, John. Connected Medical Devices. HIMSS Publishing, 2015. http://dx.doi.org/10.1201/b21577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cybersecurity for Connected Medical Devices. Elsevier Science & Technology, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cybersecurity for Connected Medical Devices. Elsevier, 2022. http://dx.doi.org/10.1016/c2018-0-03213-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Connected devices"

1

Asif, Saad Z. "Connected Devices." In 5G Mobile Communications Concepts and Technologies, 217–35. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis: CRC Press, 2018. http://dx.doi.org/10.1201/9780429466342-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Scarcelli, Cosimo Marco. "Intimately Connected Devices." In Young People and the Smartphone, 29–45. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-06311-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jain, Rajat, V. K. Tewari, Yogendra Singh, Nitin Chandola, and Saurabh Badola. "Connected and Smart Medical Devices." In Disruptive Technologies and Digital Transformations for Society 5.0, 199–209. Singapore: Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9476-9_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Riposan-Taylor, Adina, and Ian J. Taylor. "Personal Connected Devices for Healthcare." In Internet of Things, 333–61. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-96550-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sivani, T., and Sushruta Mishra. "Wearable Devices: Evolution and Usage in Remote Patient Monitoring System." In Connected e-Health, 311–32. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97929-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Landon, Chris. "Connected Device for Improved Adherence." In Closing the Care Gap with Wearable Devices, 143–44. New York: Productivity Press, 2022. http://dx.doi.org/10.4324/9781003304036-20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Veeman, Dhinakaran, M. Varsha Shree, M. Swapna Sai, Akshita Kancharla, and Chaudhery Mustansar Hussain. "AI in Acquisition, Analysis and Processing of Medical Signal Data Collected By Wearable Devices." In Connected e-Health, 125–45. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97929-4_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tretter, Dan, Jerry Liu, Xuemei Zhang, Yuli Gao, Brian Atkins, Hui Chao, Jun Xiao, Peng Wu, and Qian Lin. "Multimedia Experience on Web-Connected CE Devices." In Multimedia Interaction and Intelligent User Interfaces, 271–300. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-507-1_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Maikap, Subhadhriti, Pushkar Kishore, Swadhin Kumar Barisal, and Durga Prasad Mohapatra. "Familial Analysis of Malicious Android Apps Controlling IOT Devices." In Internet of Things and Connected Technologies, 205–14. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-94507-7_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gordon, Robert. "Trust Issues with Wireless Internet Devices." In Towards a Wireless Connected World: Achievements and New Technologies, 3–16. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-04321-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Connected devices"

1

Osman, Mohammed, Mohamed Nasor, and Ahmed Imran. "Connected Healthcare Solution Using Cell Phone." In ASME 2010 5th Frontiers in Biomedical Devices Conference. American Society of Mechanical Engineers, 2010. http://dx.doi.org/10.1115/biomed2010-32020.

Full text
Abstract:
Recent developments in device technology and widespread use of cell phone and wireless technology globally have provided an unprecedented opportunity for enhanced healthcare delivery. This study presents development of a cell phone based electronic healthcare system for remote monitoring and control of patients. The system comprises of two modules, each connected to a cell phone for communication of data or instructions. The first module allows real-time data acquisition and analysis from several devices that may be connected to the patient. By calling the cell phone for this module, data can be accessed or any of the connected devices be controlled remotely. Any observed abnormality is reported in real-time by calling a pre-set cell phone. This module allows interactive communication utilizing machine generated voice. Also, this module calls the second module at regular time intervals to transfer the patient’s data over phone. The second module thus receives the data for storage in a central location. All of these features of the system were tested successfully on simulated patient devices. For data and device security, ID and password verifications are required.
APA, Harvard, Vancouver, ISO, and other styles
2

Chukwu, Michael. "Media Adaptation for Connected Mobile Devices." In 2009 6th IEEE Consumer Communications and Networking Conference (CCNC). IEEE, 2009. http://dx.doi.org/10.1109/ccnc.2009.4784822.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Eun, Chang-O., Tae Hyoung Kim, and Im Young Jung. "Which Devices are Connected around us?" In 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS). IEEE, 2018. http://dx.doi.org/10.1109/bds/hpsc/ids18.2018.00065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Samudrala, Nagaraju, and Manjushree B.M. "DynaSurface:A Framework for Device Notifications using Nano Coatings in Connected Devices." In 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing. ICST, 2013. http://dx.doi.org/10.4108/icst.collaboratecom.2013.254080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pramanick, S., N. Konar, S. Dey, S. Som, and P. K. Gayen. "Study on Power Quality Phenomena of Grid-connected AC Micro-grid." In 2021 Devices for Integrated Circuit (DevIC). IEEE, 2021. http://dx.doi.org/10.1109/devic50843.2021.9455917.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bolsens, I., Jerry Fiddler, and Wim Roelandts. "Connected, smart devices ?computing beyond the desktop." In the conference. New York, New York, USA: ACM Press, 2000. http://dx.doi.org/10.1145/343647.343676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Millar, Kyle, Adriel Cheng, Hong Gunn Chew, and Cheng-Chew Lim. "Characterising Network-Connected Devices Using Affiliation Graphs." In NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2020. http://dx.doi.org/10.1109/noms47738.2020.9110309.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stefanizzi, Maria Laura, Luca Mottola, Luca Mainetti, and Luigi Patrono. "COIN: System Architecture for Programmable Connected Devices." In 2016 International Conference on Distributed Computing in Sensor Systems (DCOSS). IEEE, 2016. http://dx.doi.org/10.1109/dcoss.2016.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Khurana, Malika, Zhenfang Chen, Daragh Byrne, and Yang Bai. "SneezeLove: Embodying Cultural Superstitions in Connected Devices." In DIS '21: Designing Interactive Systems Conference 2021. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3461778.3462118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Postolache, Octavian, and Pedro Silva Girao. "Physiotherapy smart connected devices for S-health." In 2016 7th International Conference on Information, Intelligence, Systems & Applications (IISA). IEEE, 2016. http://dx.doi.org/10.1109/iisa.2016.7785336.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Connected devices"

1

Waghale, Anay, Michael Poplawski, Jason Tuenge, and Shat Pratoomratana. Characterization and Analysis of the Energy-Reporting Accuracy of Connected Devices. Office of Scientific and Technical Information (OSTI), August 2020. http://dx.doi.org/10.2172/1669039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Waghale, Anay, Michael Poplawski, Jason Tuenge, and Shat Pratoomratana. Characterization and Analysis of the Energy-Reporting Accuracy of Connected Devices. Office of Scientific and Technical Information (OSTI), June 2020. http://dx.doi.org/10.2172/1673633.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hudgins, Andrew P., Bethany F. Sparn, Xin Jin, and Brian Seal. NREL Topic 1 Final Report: Cohesive Application of Standards-Based Connected Devices to Enable Clean Energy Technologies. Office of Scientific and Technical Information (OSTI), February 2018. http://dx.doi.org/10.2172/1422887.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Patel, Jay S. Fast Electro-Optic Devices for Next Generation Optical Cross-Connects. Fort Belvoir, VA: Defense Technical Information Center, September 2001. http://dx.doi.org/10.21236/ada397966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Lingxi, Yaobin Chen, Renren Tian, Feng Li, Howell Li, and James R. Sturdevant. An Integrated Critical Information Delivery Platform for Smart Segment Dissemination to Road Users. Purdue University, 2022. http://dx.doi.org/10.5703/1288284317440.

Full text
Abstract:
An integrated critical information delivery platform for smart segment dissemination to road users was developed. A statewide baseline milepost geodatabase was created at 0.1-mile resolution with tools, protocols, and interfaces that allow other data sources to be efficiently utilized. A variety of data sources (e.g., INRIX, CARS, Doppler, camera images, connected vehicle data, automated vehicle location) were integrated into existing and new dashboards for stakeholders to monitor roadway conditions and after-action reviews. Additionally, based on these data sources, algorithms were developed and an API was created to identify hazardous road conditions when the location of the end-user mobile device was given. Message delivery schemes were successfully implemented to issue alerts to drivers, which were integrated with two in-vehicle smartphone applications. The performance of the integrated platform was evaluated using both the driving simulator and a number of simulated and on-road tests. The results demonstrated the system was able to disseminate data in real-time using the developed platform.
APA, Harvard, Vancouver, ISO, and other styles
6

Lewis, Dustin, and Naz Modirzadeh. Taking into Account the Potential Effects of Counterterrorism Measures on Humanitarian and Medical Activities: Elements of an Analytical Framework for States Grounded in Respect for International Law. Harvard Law School Program on International Law and Armed Conflict, May 2021. http://dx.doi.org/10.54813/qbot8406.

Full text
Abstract:
For at least a decade, States, humanitarian bodies, and civil-society actors have raised concerns about how certain counterterrorism measures can prevent or impede humanitarian and medical activities in armed conflicts. In 2019, the issue drew the attention of the world’s preeminent body charged with maintaining or restoring international peace and security: the United Nations Security Council. In two resolutions — Resolution 2462 (2019) and Resolution 2482 (2019) — adopted that year, the Security Council urged States to take into account the potential effects of certain counterterrorism measures on exclusively humanitarian activities, including medical activities, that are carried out by impartial humanitarian actors in a manner consistent with international humanitarian law (IHL). By implicitly recognizing that measures adopted to achieve one policy objective (countering terrorism) can impair or prevent another policy objective (safeguarding humanitarian and medical activities), the Security Council elevated taking into account the potential effects of certain counterterrorism measures on exclusively humanitarian activities to an issue implicating international peace and security. In this legal briefing, we aim to support the development of an analytical framework through which a State may seek to devise and administer a system to take into account the potential effects of counterterrorism measures on humanitarian and medical activities. Our primary intended audience includes the people involved in creating or administering a “take into account” system and in developing relevant laws and policies. Our analysis zooms in on Resolution 2462 (2019) and Resolution 2482 (2019) and focuses on grounding the framework in respect for international law, notably the U.N. Charter and IHL. In section 1, we introduce the impetus, objectives, and structure of the briefing. In our view, a thorough legal analysis of the relevant resolutions in their wider context is a crucial element to laying the conditions conducive to the development and administration of an effective “take into account” system. Further, the stakes and timeliness of the issue, the Security Council’s implicit recognition of a potential tension between measures adopted to achieve different policy objectives, and the relatively scant salient direct practice and scholarship on elements pertinent to “take into account” systems also compelled us to engage in original legal analysis, with a focus on public international law and IHL. In section 2, as a primer for readers unfamiliar with the core issues, we briefly outline humanitarian and medical activities and counterterrorism measures. Then we highlight a range of possible effects of the latter on the former. Concerning armed conflict, humanitarian activities aim primarily to provide relief to and protection for people affected by the conflict whose needs are unmet, whereas medical activities aim primarily to provide care for wounded and sick persons, including the enemy. Meanwhile, for at least several decades, States have sought to prevent and suppress acts of terrorism and punish those who commit, attempt to commit, or otherwise support acts of terrorism. Under the rubric of countering terrorism, States have taken an increasingly broad and diverse array of actions at the global, regional, and national levels. A growing body of qualitative and quantitative evidence documents how certain measures designed and applied to counter terrorism can impede or prevent humanitarian and medical activities in armed conflicts. In a nutshell, counterterrorism measures may lead to diminished or complete lack of access by humanitarian and medical actors to the persons affected by an armed conflict that is also characterized as a counterterrorism context, or those measures may adversely affect the scope, amount, or quality of humanitarian and medical services provided to such persons. The diverse array of detrimental effects of certain counterterrorism measures on humanitarian and medical activities may be grouped into several cross-cutting categories, including operational, financial, security, legal, and reputational effects. In section 3, we explain some of the key legal aspects of humanitarian and medical activities and counterterrorism measures. States have developed IHL as the primary body of international law applicable to acts and omissions connected with an armed conflict. IHL lays down several rights and obligations relating to a broad spectrum of humanitarian and medical activities pertaining to armed conflicts. A violation of an applicable IHL provision related to humanitarian or medical activities may engage the international legal responsibility of a State or an individual. Meanwhile, at the international level, there is no single, comprehensive body of counterterrorism laws. However, States have developed a collection of treaties to pursue specific anti-terrorism objectives. Further, for its part, the Security Council has assumed an increasingly prominent role in countering terrorism, including by adopting decisions that U.N. Member States must accept and carry out under the U.N. Charter. Some counterterrorism measures are designed and applied in a manner that implicitly or expressly “carves out” particular safeguards — typically in the form of limited exceptions or exemptions — for certain humanitarian or medical activities or actors. Yet most counterterrorism measures do not include such safeguards. In section 4, which constitutes the bulk of our original legal analysis, we closely evaluate the two resolutions in which the Security Council urged States to take into account the effects of (certain) counterterrorism measures on humanitarian and medical activities. We set the stage by summarizing some aspects of the legal relations between Security Council acts and IHL provisions pertaining to humanitarian and medical activities. We then analyze the status, consequences, and content of several substantive elements of the resolutions and what they may entail for States seeking to counter terrorism and safeguard humanitarian and medical activities. Among the elements that we evaluate are: the Security Council’s new notion of a prohibited financial “benefit” for terrorists as it may relate to humanitarian and medical activities; the Council’s demand that States comply with IHL obligations while countering terrorism; and the constituent parts of the Council’s notion of a “take into account” system. In section 5, we set out some potential elements of an analytical framework through which a State may seek to develop and administer its “take into account” system in line with Resolution 2462 (2019) and Resolution 2482 (2019). In terms of its object and purpose, a “take into account” system may aim to secure respect for international law, notably the U.N. Charter and IHL pertaining to humanitarian and medical activities. In addition, the system may seek to safeguard humanitarian and medical activities in armed conflicts that also qualify as counterterrorism contexts. We also identify two sets of preconditions arguably necessary for a State to anticipate and address relevant potential effects through the development and execution of its “take into account” system. Finally, we suggest three sets of attributes that a “take into account” system may need to embody to achieve its aims: utilizing a State-wide approach, focusing on potential effects, and including default principles and rules to help guide implementation. In section 6, we briefly conclude. In our view, jointly pursuing the policy objectives of countering terrorism and safeguarding humanitarian and medical activities presents several opportunities, challenges, and complexities. International law does not necessarily provide ready-made answers to all of the difficult questions in this area. Yet devising and executing a “take into account” system provides a State significant opportunities to safeguard humanitarian and medical activities and counter terrorism while securing greater respect for international law.
APA, Harvard, Vancouver, ISO, and other styles
7

BOND-SLIP TESTING AND PERFORMANCE EVALUATION OF SEMI-RIGID FLANGE FOLDED WEB SHEAR KEYS. The Hong Kong Institute of Steel Construction, December 2022. http://dx.doi.org/10.18057/ijasc.2022.18.4.3.

Full text
Abstract:
The shear key is crucial to the overall mechanical performance of the structure. A new type of semi-rigid connector-flange folded web shear key was proposed to determine the effective unity of higher bearing capacity and deformation. A total of five groups of specimens were designed, and the push-out test method was used to evaluate the ultimate bearing capacity, bond-slip process, failure mode, and strain distribution of the new shear key. The results show that before sliding, the embedded effect of the concrete and shear key is significant, and it has a significant sliding stiffness. After sliding, the steel plate in the middle of the opening of the outer folded plate buckles, which shows certain semi-rigid characteristics. Compared with equal-area studs, the bearing capacity of the new shear key is increased by more than 40%, and the deformation capacity exceeds 60 %, indicating good bond-slip performance. The constraint range of the shear key is greatly improved compared with the stud, and a trapezoidal area of constraint centered on the shear key is formed, accounting for more than half of the area of the concrete slab. Based on an experimental study, a practical calculation method of ultimate bearing capacity of the shear key is proposed, which can meet engineering safety requirements. Based on the analysis of bond-slip characteristics of different forms of shear keys, compared with the rigid T-shaped shear key, the slip load and ultimate bearing capacity of the new shear key are found to be increased by 39 % and 74 %, respectively, and the deformation capacity is increased more than 10-fold. Compared with the flexible stud shear connectors, the sliding load is increased by 86 %, the ultimate bearing capacity is increased more two-fold, and the stiffness is increased by nearly five times. The device exhibits good comprehensive performance.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography