To see the other types of publications on this topic, follow the link: Home computer.

Dissertations / Theses on the topic 'Home computer'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Home computer.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Baillie, Lynne. "The home workshop : a method for investigating the home." Thesis, Edinburgh Napier University, 2002. http://researchrepository.napier.ac.uk/Output/3858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.

Full text
Abstract:

Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.

This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.

APA, Harvard, Vancouver, ISO, and other styles
3

Hellmuth, George F. "Personal computer based home automation system." Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-09192009-040212/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brown, Anthony. "Domesticating home networks." Thesis, University of Nottingham, 2016. http://eprints.nottingham.ac.uk/34145/.

Full text
Abstract:
This thesis addresses the following question: How should domestic networks be reinvented to support self-management by domestic users? It takes a user-centred design approach to redesign the underlying domestic network infrastructure to better fit domestic users. The overall aim of this work is to create user-centred mechanisms to support self-management of domestic networks by domestic users. Two areas of the domestic network are studied in detail, user-centred mechanisms for domestic network infrastructure control and user-centred presentations of network data. User-centred mechanisms for domestic network infrastructure control are explored to improve Wi-Fi device association in domestic environments. A user-centred design approach is adopted to create a new method for sharing Wi-Fi credentials between devices, specifically tailored for domestic environments called MultiNet. The network performance impact of MultiNet is quantified using the standard metrics of throughput, latency, and jitter in a lab based experiment. MultiNet's usability is then compared to Wi-Fi Protected Setup in a lab based usability evaluation. These show that better Wi-Fi device association methods targeted for domestic environments can be built. It also shows that user-centred networking infrastructure can support self-management by domestic users. User-centred presentations of network data address the poor legibility of domestic networks hinders configuration and maintenance of them. A user-centred approach is adopted to design and construct a network data visualisation and annotation platform, HomeNetViewer. Through a series of deployments in real households the HomeNetViewer platform is used to explore user-centred presentations of network data to support the local negotiation of domestic network policy. HomeNetViewer improves domestic network legibility by enabling the construction of user-centred presentations of domestic network data. Additionally, it shows that users are comfortable annotating their network data using activities, applications, and users as a vocabulary. Together this highlights, with the correct user-centred tools, that domestic users are able to gain new insight into their networks to support self-management. HomeNetViewer also shows that manually annotating domestic traffic place an ongoing burden on the users. Automating user-centred presentations of network data are explored to address the burden the annotation process places on users. The use of enterprise traffic classification techniques to generate user-centred presentations of network data struggle to classify the data annotated by HomeNetViewer participants. It concludes by suggesting two ways in which these difficulties could be addressed in future work. Overall the domestic access point provides an important point of configuration, visibility and control over the domestic network infrastructure. This dissertation demonstrates that taking a user-centred design approach to reinventing the domestic network, to support self-management by users, can resolve the existing problems and merits further research and exploration by industry and standardisation bodies.
APA, Harvard, Vancouver, ISO, and other styles
5

Mani, Kartik M. 1978. "Computer support for home-based health care." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86818.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (leaves 75-76).
by Kartik M. Mani.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
6

Martinez, Reyes Fernando. "Making ubicomp acceptable in the home." Thesis, University of Nottingham, 2009. http://eprints.nottingham.ac.uk/10742/.

Full text
Abstract:
This thesis is concerned with the uses of ubiquitous computing (ubicomp) technologies in everyday domestic settings. In contrast to goal-oriented technology adoption (e.g. in the workplace), the integration of pervasive technology in the home faces not only social but also physical and technical constraints. We propose a design framework for the introduction of ubicomp technology into today’s homes that, firstly, considers a holistic approach to integrating pervasive technology; secondly, takes into account social factors and domestic activity when defining the nature of the system’s interaction; and thirdly, allows the user to adapt the system’s interaction and collaboration. Most of the work to date on domestic ubicomp takes the customization of domestic spaces for granted, presuming that the integration of sensing technologies can be accomplished to any required degree and usually assuming that context-aware systems have to be proactive, limiting users to the role of consumers of the system’s actions rather than allowing them a more participative or cooperative role. We have applied our framework to design a domestic ubicomp system to support parents with childcare in the home. The “Context-Aware Room” and the “The Parent-Child Companion Tool” prototypes are built to take account of the interaction between the social and physical and the social and digital contexts in order to address issues of integration of sensing technology, socially respectful collaboration and system adaptation. Two studies explore the potential social acceptance of the PChCT. The panel study considers parents’ overall perceptions of whether these kinds of ubicomp tools might help with parental tasks. The usability study considers the usefulness and usability of the PChCT. The results of the study reflect a positive attitude to the PChCT. Parents liked the collaborative resources and facilities to tailor collaboration. Further work might be done to assess how the system’s adaptation might fit within a wider context of user needs. Nevertheless, we argue that the use of our framework can lead to more socially acceptable ubicomp experiences in the home.
APA, Harvard, Vancouver, ISO, and other styles
7

Kan, Pei Chen. "Computer aided design of home medical alert system." Connect to resource, 2008. http://hdl.handle.net/1811/35644.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

D'Alemberte, Trelles Whitfield. "Gender Roles and Home Computer Use by Children." W&M ScholarWorks, 1991. https://scholarworks.wm.edu/etd/1539625702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Muhammad, Adnan. "Remote Testing of home based computers." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4133.

Full text
Abstract:
Security testing is a topic that many organizations are discussing to impose on their tool in order to detect security threats. During my thesis work I used HIAB (Hacker in a Box) and Nessus (remote vulnerability security tool) to find out the vulnerabilities in the remote client PC. This thesis describes in detail the severe security issues which were found while running an experiment at an office network and individual home PC also through remote accessing and scanning. The results were inferred by describing the different security threats and vulnerabilities.
This is 60 point Master Programme in Computer Science Thesis
APA, Harvard, Vancouver, ISO, and other styles
10

Gregerman, Rhonda Jo. "Human factor's design of a home personal computer workstation." Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-05042010-020212/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Fohlin, Johan. "Home Storage Manager." Thesis, Högskolan i Gävle, Avdelningen för Industriell utveckling, IT och Samhällsbyggnad, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-17494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Patrick, Ryan Stewart. "Surveillance in a Smart Home Environment." Wright State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=wright1278508516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Warnock, David. "The application of multiple modalities to improve home care and reminder systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5164/.

Full text
Abstract:
Existing home care technology tends to be pre-programmed systems limited to one or two interaction modalities. This can make them inaccessible to people with sensory impairments and unable to cope with a dynamic and heterogeneous environment such as the home. This thesis presents research that considers how home care technology can be improved through employing multiple visual, aural, tactile and even olfactory interaction methods. A wide range of modalities were tested to gather a better insight into their properties and merits. That information was used to design and construct Dyna-Cue, a prototype multimodal reminder system. Dyna-Cue was designed to use multiple modalities and to switch between them in real time to maintain higher levels of effectiveness and acceptability. The Dyna-Cue prototype was evaluated against other models of reminder delivery and was shown to be an effective and appropriate tool that can help people to manage their time and activities.
APA, Harvard, Vancouver, ISO, and other styles
14

Branger, Jakob. "Standardization perspectives of communication infrastructure of future homes : from automated home to sustainable, healthy and manufacturing home." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122134.

Full text
Abstract:
Driven by the Internet of Things, devices and appliances will be increasingly connected to each other and the people within the home. In order for the communication to be possible a standard for communication is needed. In many cases there are too many standards, and for other cases there may instead be an absence of standard. This thesis provides a contemporary view of future developments of homes and the current standardization progress. Four domains in homes are investigated: the automated home domain, the sustainable home domain, the healthy home domain and the manufacturing home domain. Trends and technologies are identified that drive a change in homes. Services are described that may be provided in homes. The thesis discusses how services from different domains may be integrated, with a further investigation of the networked manufacturing service and its underlying communication infrastructure. Finally standards are identified and analyzed in regard to the communication infrastructure of the networked manufacturing service. The standardization development is progressing for each home domain. However, potential standard gaps are still present for many of the cross domain device communication. No standard has been identified for integration of services and integration of the business ecosystem in the manufacturing home domain. Similarly there is no standard for the software of 3D printing. New standards or further development of existing standards is needed to realize the networked manufacturing service.
APA, Harvard, Vancouver, ISO, and other styles
15

Gipson, Shannon D. "Ergonomic analysis of personal computer workstation environments in the home." Online version, 2009. http://www.uwstout.edu/lib/thesis/2009/2009gipsons.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Resner, Benjamin Ishak 1967. "Rover@Home : computer mediated remote interaction between humans and dogs." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/62357.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2001.
Includes bibliographical references (p. 104-109).
In this thesis we create a method to allow dogs and humans to interact over the Internet. In particular, we generalize an established dog training technique known as "clicker-training" such that the remote and co-located interactions are reported by dog owners to be similar. In the process of creating this computer-mediated interaction, we learn what it means to design an interface for a creature with very different sensory modalities than humans. Dogs are not "furry humans" but entirely different creatures with very different perceptual, motor, and cognitive systems than humans. This work is significant because by systematically applying HCI design principles to non-humans, we include animals in the HCI community. This creates an opportunity for the evaluation of the generality of much HCI literature, as well as increasing the sources from which we can draw inspiration.
Benjamin Ishak Resner.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
17

Lachut, David S. "A Comprehensive View of Home Energy Management." Thesis, University of Maryland, Baltimore County, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10825526.

Full text
Abstract:

Sensing, networking, and computing are becoming more pervasive, providing the potential to revolutionize our approach to residential energy consumption by assisting energy conservation and increasing the sustainability of energy use to improve users’ quality of life. There are many ways to approach the implementation of home energy management infrastructure.

This dissertation builds a comprehensive picture of such a system that combines a network of consumer-grade home automation components with sophisticated data analytics to manage home energy and contrasts it with a specifically targeted approach based on a custom sensor package. The comprehensive system takes input from various sensors and user input to detect activity, predict home energy consumption, and help the user understand his energy use. The custom sensor eschews the large sensing infrastructure as it helps the user hunt down sources of wasted energy. The projects use in-home hardware and software, a mobile component for user interaction, and a back-end for coordination and computation. These projects exemplify the use of emerging technologies for data collection, user feedback, and data analysis in a residential setting. By contrasting prototypes of a compre- hensive and a specialized system, building energy management infrastructure is explored from multiple directions.

APA, Harvard, Vancouver, ISO, and other styles
18

Ali, Yusuf. "Rent a home: a cross platform mobile application to list and search rental homes." Kansas State University, 2016. http://hdl.handle.net/2097/32621.

Full text
Abstract:
Master of Science
Department of Computing and Information Sciences
Daniel Andresen
Finding a desired off-campus home could be a difficult task for incoming students at K-State. This cross platform mobile application can help students in this task. This mobile application will serve as platform for students and home owners to find, list and review a property. Users can create their personal account and manage their profile and properties they listed. They can post multiple property listings with the key details and these listings will be visible to all the other users. To avoid spam and repetitive postings there is an address verification system in place. While posting a property listing the address is verified with Google maps database. If Google maps fail to identify the address or if that address is already listed, the user will not be allowed to list that property. Users can see all the property listings and their details including a Google map location image, a link to navigate to the address, contact details of the owner, reviews of other users. Users can rate a property from 1(low) to 5(high) along with an optional review. The review and rating can help other user to select a desired place to live. The user interface is developed with web technologies and using Cordova the same code can be used to convert it into a mobile application for both iOS and Android which makes this application platform independent and easily available.
APA, Harvard, Vancouver, ISO, and other styles
19

Wiklander, Levi. "Intertextuella strövtåg i Akademia : måhända som en galaktisk reseskildring anno 1998 = [Intertextual browsing within Academia] : [perhaps a galactic journey account in 1998] /." Stockholm : Univ, 1998. http://www.fek.su.se/home/lew/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Malm, Anders, and Fredrik Mjörning. "Home Automation Using Elvin." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-475.

Full text
Abstract:

Home automation systems of today tend to be external solutions to an existing product that enable rather complex and expensive communications equipment to be attached to existing products. This is because it would not be economically defendable to implement the communications hardware internally in the products, due to a high increase of the cost for the product. This thesis tries to solve this problem by introducing a low-cost product-embedded solution for home automation. By using the Elvin protocol together with low-cost communication solutions, such as the RS232 protocol and Open/Closed circuits, communications could be embedded into products and device interaction could be implemented without increasing the cost of already existing products too much. Furthermore this thesis will discuss an implementation of an Elvin router that will act as a bridge between RS232, Open/Closed circuits and the Ethernet network that contains an Elvin server.

APA, Harvard, Vancouver, ISO, and other styles
21

Gummalla, Ajay Chandra V. "Wireless home networks : architecture and access protocols." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/15004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Carter, Mary C. "Present use and future needs of selected Virginia home computer owners." Thesis, Virginia Tech, 1985. http://hdl.handle.net/10919/45569.

Full text
Abstract:

The study was designed to identify how home computers were being used by 200 selected home computer owners living in Richmond, Virginia. The 1984 study identified the expressed problems these owners experienced using home computers and determined what changes or information the owners believed were needed to use the computer more effectively.

The most commonly used home computer applications were personal word processing, entertainment, and work related word processing. Many home computer owners indicated that no factor had prevented them from using their computer. Those indicating that some factor had prevented their use, reported the high cost of software, the lack of useful software, and unclear or incorrect instructions presented problems.

Males were much more likely than females to be the principal computer user. Consistent with Rogers (1983) diffusion theory, most computer owners did use personal sources during their prepurchase information search.

Statistically significant differences existed between the owners satisfaction with hardware and the number of products and services used and between overall satisfaction and the amount spent on software. Significant inverse relationships indicated that those respondents who spent less on hardware and had less random access memory had higher levels of overall satisfaction than those who spent more on hardware and had more random access memory. Recommendations included methods of individualizing service and assistance for owners after the purchase.


Master of Science
APA, Harvard, Vancouver, ISO, and other styles
23

Kalinauskas, Arunas, and Slepov Dennis. "Deploying and testing Home Assistant at HINT." Thesis, Högskolan i Halmstad, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44812.

Full text
Abstract:
Thanks to recent advancements in low-power communication methods and lower costs, smart home devices are expected to hit over 100 million European households by 2024.This study concerns the installation and configuration of Home Assistant at the Halmstad Intelligent Home (HINT).HINT is a realistic home environment created for research studies and experiments to develop innovations. Several automations are created that automate daily tasks throughout the day.This was accomplished by assembling a test setup using Home Assistant as a platform and several smart home devices that communicate using different protocols.The results include a Home Assistant based automation that monitors and assists in routine tasks using smart home devices at HINT. A GUI was also built to enable user-friendly control of the system. Results also include the integration of an Onyx oximeter which can allow the resident to monitor and follow up blood oxygen level, respiration, and heartbeat rates.
Smarta-enheter beräknas nå över 100 miljoner hushåll i Europa 2024 tack vare de senaste framstegen inom kommunikationsmetoder med låg strömförbrukning och lägre priser.Denna studie undersöker hur ett smart hem kan förbättra en persons liv genom att tillhandahålla automatiseringar och tjänster med hjälp av elektroniska enheter som kommunicerar via lokal nätverk.Detta åstadkoms genom att sätta ihop en test-setup med flera populära smarta enheter som kommunicerar genom olika protokoll och utveckla automationer med hjälp av Halmstad Intelligent Home (HINT) en test-lägenhet som erbjuder en realistisk hemmiljö för forskningsstudier och experiment. Studien resulterade i ett hemautomationssystem byggt med Home Assistant som kan styra flera populära (IoT) enheter, inklusive en Onyx 3-oximeter som integrerades under denna studie, som användare kan styra och analysera med ett grafiskt användargränssnitt.
APA, Harvard, Vancouver, ISO, and other styles
24

Yang, Jeonghwa. "Eden an interactive home network management system /." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31755.

Full text
Abstract:
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2010.
Committee Chair: W. Keith Edwards; Committee Member: Blair MacIntyre; Committee Member: David McDonald; Committee Member: Ellen Yi-Luen Do; Committee Member: John Stasko. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
25

Chetty, Marshini. "Making infrastructure visible: a case study of home networking." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41152.

Full text
Abstract:
In this dissertation, I examine how making infrastructure visible affects users' engagement with that infrastructure, through the case study of home networking. I present empirical evidence of the visibility issues that home networks present to users and how these results informed the design of a prototype called Kermit to visualize aspects of the home network. Through my implementation and evaluation of Kermit, I derive implications for making infrastructure visible in ways that enable end-users to manage and understand the systems they use everyday. I conclude with suggestions for future work for making home networks, and infrastructure more generally, more visible.
APA, Harvard, Vancouver, ISO, and other styles
26

Abdul, Azeez Khan Mohamed Shoaib Khan. "Redefining Insteon home control networking protocol." Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1583654.

Full text
Abstract:

The two main purposes of developing a Home Control Networking protocol are to offer indoor lifestyle sophistication and for the security of our residences. There are numerous protocols based on ZigBee, Z-Wave, Wavenis, X10 and Insteon technologies. These technologies do have good indoor lifestyle sophistication features. Insteon provides wide range of products in this aspect and is the latest and improved version. But the existing Insteon protocol is functional in only smaller Power Line Communication networks. There will be demand for the implementation of Insteon home control networking protocol in larger residential areas and in industrial areas due to its steady growth and popularity. Implementing the existing protocol in larger networks is infeasible because of data collision due to flooding. Therefore, there is a need to redefine and expand the protocol, such that the network could accommodate many devices and increase the size of the network. To achieve the same gradient based routing is implemented that helps to choose a particular path to reach a particular end device. This eventually reduces flooding and useful data packets can be saved from collision. After implementation of gradient based protocol, collision has reduced by 56.63%, delay decreased by 65% and throughput increased by 105.6%.

APA, Harvard, Vancouver, ISO, and other styles
27

Tang, Jin. "Mobile IPv4 Secure Access to Home Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11536.

Full text
Abstract:
With the fast development of wireless networks and devices, Mobile IP is expected to be used widely so that mobile users can access the Internet anywhere, anytime without interruption. However, some problems, such as firewall traversal and use of private IP addresses, restrict use of Mobile IP. The objective of this thesis is to design original schemes that can enable a mobile node at abroad to access its home network as well as the Internet securely and that can help Mobile IP to be used widely and commercially. Our solutions are secure, efficient, and scalable. They can be implemented and maintained easily. In this thesis, we mainly consider Mobile IPv4, instead of Mobile IPv6. Three research topics are discussed. In each topic, the challenges are investigated and the new solutions are presented. The first research topic solves the firewall traversal problems in Mobile IP. A mobile node cannot access its firewall-protected home network if it fails the authentication by the firewall. We propose that an IPsec tunnel be established between the firewall and the foreign agent for firewall traversal and that an IPsec transport security association be shared by the mobile node and a correspondent node for end-to-end security. The second topic researches further on firewall traversal problems and investigates the way of establishing security associations among network entities. A new security model and a new key distribution method are developed. With the help of the security model and keys, the firewall and the relevant network entities set up IPsec security associations to achieve firewall traversal. A mobile node from a private home network cannot communicate with other hosts with its private home address when it is visiting a public foreign network. A novel and useful solution is presented in the third research topic. We suggest that the mobile node use its Network Access Identifier (NAI) as its identification and obtain a public home address from its home agent. In addition, a new tunnel between the mobile node and its home agent is proposed.
APA, Harvard, Vancouver, ISO, and other styles
28

Basu, Priyam. "WIRELESS COMMUNICATION FOR HOME CARE AND HOSPITAL INTENSIVE CARE." Master's thesis, Temple University Libraries, 2013. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/216512.

Full text
Abstract:
Computer and Information Science
M.S.
Many emerging and existing medical applications can benefit from having continuous access to the patients vitals. This paper presents the results of a set of experiments conducted in a medical setting to determine the feasibility of using wireless communication in both home care and hospital intensive care environments. The study is also done with the intention of developing a new wireless protocol for use in medical settings. This protocol will later be incorporated into different medical devices operating inside a patient room with a view that significant performance improvements should be observed.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
29

Kabelac, Zachary(Zachary E. ). "In-home passive monitoring for medical applications." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121613.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 145-161).
Recent years have witnessed a surge of in-home monitoring and sensing systems. They promise to change healthcare as we know it by continuously monitoring patients at home. Yet, despite all of the interest and effort that has gone into designing these systems, their capabilities are rudimentary and long term retention rates remain low. One of the main reasons for this is that they require the user to either wear or interact with the sensor in order to work effectively. This thesis addresses many of the challenges faced by systems today enabling novel applications in both in-home monitoring and healthcare. To overcome these challenges, this thesis introduces a novel hardware / software sensor that uses radio signals to enable patient health monitoring at home. It hangs on the wall like a picture frame and transmits low-power radio signals which reflect off of the user and return back to the device. By capturing and processing the reflected signals, physiological metrics related to mobility and vital signs can be extracted without touching the user in any way. Furthermore, it relates these health signals to symptoms of Parkinson Disease by deploying the sensor in a pilot study and comparing the health metrics to gold standard clinical assessments.
by Zachary E. Kabelac.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
30

Ofori-Tenkorang, John. "A microprocessor-based interactive home energy monitor." Thesis, Massachusetts Institute of Technology, 1993. http://hdl.handle.net/1721.1/12609.

Full text
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1993.
Includes bibliographical references (leaves 88-89).
by John Ofori-Tenkorang.
M.S.
APA, Harvard, Vancouver, ISO, and other styles
31

Donnal, John Sebastian. "Home NILM : a comprehensive energy monitoring toolkit." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82386.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2013.
Cataloged from PDF version of thesis.
Includes bibliographical references (p. 193-196).
In this thesis we present two powerful new non-intrusive sensor designs, one for measuring equipment power consumption and one for measuring equipment vibration. We also discuss a unified data management framework for storing, processing, and viewing the large amounts of information collected from these sensors. Our electric power sensor can detect current and voltage with no ohmic contact to the wire. This enables power measurements from previously unavailable locations such as the front of the circuit breaker or the surface of a multi wire cable. This sensor is based off a Tunneling Magnetoresistive (TMR) element which is wrapped in a novel feedback architecture to provide a linear measurement of magnetic field strength over several orders of magnitude. The vibration sensor is part of a larger embedded energy harvesting project which aims to provide diagnostic feedback on motors during operation. The management framework is a powerful collection of software programs that allows data to be collected and stored locally but efficiently manipulated remotely by users anywhere in the world.
by John Sebastian Donnal.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
32

Yip, Gina F. (Gina Fui Yuen) 1978. "3D echo cancellation in a home environment." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/16867.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (p. 100-101).
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
This thesis describes the work done to research, implement, and compare various algorithms for the cancellation of echoes in a home environment, where the room impulse response is unknown and variable. The general problem, where the speaker's movements are completely unrestricted, is a very hard one, and research in this area has only begun in the last several years. Therefore, this thesis addresses a simplified version of the problem, where the impulse response of the multipath environment is assumed to be stationary within the duration of a verbal command. Given this assumption, which is reasonable for most situations, algorithms based on the complex cepstrum, autocorrelation, and delay and sum methods of echo cancellation were chosen and developed for the study. Many simulation tests were done to determine the behavior of the algorithms under different echo environments. The test signals were based on the simple delay and attenuation echo model with one microphone, and on a more realistic echo model, generated by the Cool Edit Pro software, with one or three microphones. The performance metrics were the number of errors and the percent of improvement in speech recognition by Dragon Systems' Naturally Speaking software. The results showed vast improvement for the cepstral domain methods on the simple echo signals, but the numbers were mixed for the complex model, one microphone cases. However, with three microphones, the delay and sum algorithm showed consistent improvement. Given that research in this specific area of 3D echo cancellation in a home environment, where 3D refers to the moving speech source, is still in its early stage, the results are encouraging.
by Gina F. Yip.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
33

Šturcová, Zdenka. "The use of computer vision techniques to augment home based sensorised environments." Thesis, University of Ulster, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.558785.

Full text
Abstract:
Sensorised environments offer opportunities in the support of our everyday lives, in particular, towards realising the concepts of 'Ageing in place'. Such environments are capable of allowing occupants to live independently by providing remote monitoring services and by supporting the completion of activities of daily living. This research focuses on augmenting sensorised environments and promoting improved health- care services with video based solutions. The aim was to demonstrate that video based solutions are feasible and have wide usability and potential in health care, elderly care and generally within sensorised environments. This aim was addressed by considering a number of research objectives, which have been investigated and presented as a series of studies within this thesis. Specifically, the first study targeted multiple occupancy within sensorised environments where a solution based on tracking persons through the use of video was proposed. The results show that multiple occupancy can be handled using video and that users can be successfully tracked within an environment. The second study used video to investigate repetitive behaviour patterns in persons with dementia. The experiment showed that the repetitive behaviour can be extracted and successfully analysed using a single camera. Thirdly, a target group of Parkinson's disease patients are considered with whom video analysis is used to build an automated diary describing their changing status over the day. Results showed that the changes in the patient's movement abilities can be revealed from a video. The final study investigated a specific type of movement disorder known as a tremor. A method involving frequency analysis of tremor from video data was validated in a clinical study involving 31 participants. Furthermore, this study resulted in the development of an open-source software application for routine tremor assessment. This thesis offers a contribution to knowledge by demonstrating that video can be used to further augment sensorised environments to support non-invasive remote monitoring and assessment.
APA, Harvard, Vancouver, ISO, and other styles
34

Claar, Chester L. "The Adoption of Computer Security: An Analysis of Home Personal Computer User Behavior Using the Health Belief Model." DigitalCommons@USU, 2011. https://digitalcommons.usu.edu/etd/878.

Full text
Abstract:
The primary purpose of this research was to examine the adoption of computer security software in the home computer environment. The use of the Health Belief Model as a framework to design a model to examine home user adoption of computer security provided the basis for this research. The method of the investigation was a cross-sectional study using a self-reported web-based survey to test the theoretical model derived from the Health Belief Model. The survey targeted individuals who are responsible for the selection, installation, and maintenance of software on their home computers. The data collection relied on a snowball sampling technique that recruited a total of 186 participants who completed the online survey. The research model contains a total of 26 hypothesized relationships that were tested using multiple regression analysis techniques. The research model contains six main predicting variables (perceived vulnerability, perceived severity, perceived benefits, perceived barriers, self-efficacy, and cues to action) and four moderating variables (age, gender, education, and prior experience of attack). The model explains 30.4% of the variance in computer security usage, the dependent variable in the research model. The results demonstrate that certain constructs found in the Health Belief Model are more effective than others in motivating individuals to utilize computer security software. Specifically, the results show that perceived vulnerability (H1), perceived barriers (H4), self-efficacy (H5), and the two-way interactions of age and barriers (H8d), education and benefits (H9c), prior experience and perceived severity (H10b), and prior experience and self-efficacy (H10e) had significant effects on computer security usage. Additionally, prior experience was found to have a significant main effect on the dependent variable. Information from this research provides evidence that the Health Belief Model can be used to study the computer security usage behavior of home computer users. Further, the relationship of perceived vulnerability and computer security usage provides a way for practitioners to increase computer security usage behavior through targeted media campaigns.
APA, Harvard, Vancouver, ISO, and other styles
35

Beremark, Mikael, and John Fryland. "A Comparison of Intrusion Detection Systems in Home Networks." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37709.

Full text
Abstract:
The security in home networks is a growing concern, not in the least due to the increase in connected devices with the Internet of Things (IoT). Different types of Intrusion Detection Systems (IDS’s) exists with various system requirements. This thesis will research and compare two of these, Bro and Snort IDS in order to determine their functionality in a low resource environment such as a Raspberry Pi. In order to measure functionality and performance, several experiments have been conducted such as penetration testing and thorough installation and configuration experiments.

Nationell ämneskategori - osäker på om det är rätt

APA, Harvard, Vancouver, ISO, and other styles
36

Phillips, Newton Ann E. "Cyberbullying: When Bullies Follow You Home." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4581/.

Full text
Abstract:
Researchers have studied adolescent bullying behavior since the 1970s, however, today's technological advances have opened the door to a new form of abuse. Teens can no longer escape the wrath of their bullies once they have left the school grounds, because bullies are following them home. Cyberbullying is a new phenomenon in which bullies use computer-mediated communication (CMC) to torment their victims. This research project focused on uncovering some of the mysteries surrounding this new means of bullying. A grounded theory analysis of stories written by victims revealed cyberbullies often use synchronous chat tools, e-mail, web sites, and cell phone text messages to reach their victims. Data analysis also revealed victims use of contextualization, descriptions of their bullying episodes, and discussions of their responses and outcomes to characterize their experiences. Interestingly, the researcher found victims of cyberbullying generally were also victims off face-to-face bullying as well.
APA, Harvard, Vancouver, ISO, and other styles
37

Bishehsari, Taraneh. "A Wearable Device for Physiotherapeutic Home Training." Thesis, Uppsala universitet, Människa-datorinteraktion, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-447416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Schulz, Arno. "Decontamination of arbitrary networks with multiple mobile agent home bases." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27292.

Full text
Abstract:
In this thesis we consider the problem of searching for an intruder in arbitrary networks. A team of mobile software agents is deployed to capture the intruder (i.e., a virus) and decontaminate the network. These agents follow a common protocol, derived from the Breadth-First Search (BFS) algorithm, that is independent of the intruders' speed or knowledge and is designed to prevent any further re-contamination. To measure the efficiency of our protocols and find the ones which give the best results, we conduct experiments on arbitrary synchronous and asynchronous networks. In each experiment, we study a different aspect of the impact multiple starting locations and different levels of visibility have on minimizing the number of mobile software agents required to decontaminate the network and the time used in the process.
APA, Harvard, Vancouver, ISO, and other styles
39

Uhlán, Christian. "Security in Digital Home Visits." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-74989.

Full text
Abstract:
The purpose of this thesis is to study security for digital home visits, where traditional home visits are replaced by digital home visits using digital technology. The report examines the safety aspects for welfare technology solutions where data is collected from sensor systems and digital platforms and examines di↵erent Swedish laws that implies on a digital home visit. The study proposes an implementation of a prototype application to support users, relatives, and healthcare professionals to conduct digital home visits in a safe manner. The chosen scenario of the digital home visit was to check whether the person has eaten food during the day or not. This was done in a lab kitchen at Lule°a University of Technology with help of Z-wave sensors and a implemented systems. The result is displayed on a secure website. The solution is discussed and compared to other technical solutions of this problem and also to several Swedish laws. This paper finishes with a section aimed to provide a variety of recommendations when implementing a similar system.
APA, Harvard, Vancouver, ISO, and other styles
40

Zou, Zichuan. "Remote Client of Home Video Surveillance System." Case Western Reserve University School of Graduate Studies / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=case1459453065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Jonnalagadda, Hari Krishna. "Secure Communication Scheme in Smart Home Environment." Scholar Commons, 2016. http://scholarcommons.usf.edu/etd/6270.

Full text
Abstract:
Internet of Things, has started to mark its existence from past few years. Right from its inception with a coke machine at Carnegie Mellon University, it has come a long way, connecting billions of devices to internet. This journey is well supported by the advancements in networking, hardware miniaturization and sensing capabilities. Diverse nature of applications of Internet of Things, has cut the communication barriers between the varieties of fields ranging from manufacturing industry to health-care industry. Smart Home is one such application of Internet of Things. Connectivity of home appliances, to achieve automation in living, defines Smart Home. Out of welter of applications that are derived from Internet of Things, this thesis concentrates on Smart Home. Smart Home, in practical is expected to conserve lot of energy, by achieving automation of home appliances, on par with best living experience. Existing technologies such as Z-wave, One-Net, ZigBee, Insteon, had already occupied the Smart Home communication. However, these technologies face the problem of identifying the smart devices uniquely and also exhibit security vulnerabilities. Proposed scheme exploits accelerometer fingerprinting to identify the smart devices uniquely. Security vulnerabilities of existing protocols are addressed by encrypting the data on move with CCM mode of AES encryption.
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Wei. "Home Automation using Nexa, Tellstick and the SensibleThings Platform." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-26200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Oyekunle, Abiola Taiwo. "Wireless Short Range Communication Technologies for Home Automation." Thesis, Halmstad University, Halmstad Embedded and Intelligent Systems Research (EIS), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4017.

Full text
Abstract:

A modern home contains varieties of electronic equipment and systems like: TV, Hi-fi equipment, central heating systems, fire alarm systems, security alarm systems, lighting systems etc. Enabling these devices to communicate is the first step towards the long-predicted smart home, but this requires communication standards to follow. It can be anticipated that the technology must be wireless in order for such network to be feasible.  Large set of standards are present for as well wired as wireless communication in between such devices, but today no standard communication interface available.

 

The goal of this project is to survey available standards for short-range wireless communication, and to evaluate and compare their capabilities to become a general standard for home automation. The evaluation must take such aspects as security, range, network architecture and the heterogeneous set of devices into consideration. Furthermore, this thesis proposes how to interconnect the home network to the external network for remote supervision and control.

APA, Harvard, Vancouver, ISO, and other styles
44

Parker, Jack. "Stroke patients' utilisation of extrinsic feedback from computer-based technology in the home." Thesis, Sheffield Hallam University, 2012. http://shura.shu.ac.uk/20775/.

Full text
Abstract:
Background: Evidence indicates that post-stroke rehabilitation improves function, independence and quality of life. A key aspect of rehabilitation is the provision of appropriate information and feedback to the learner. Advances in information technology (IT) have allowed for the development of various systems to complement stroke rehabilitation that could be used in the home setting. In the near future these systems may increase the provision of rehabilitation a stroke survivor receives and carries out, as well as providing a learning platform that facilitates long-term self-management. Aim: To explore the utilisation of extrinsic feedback from computer-based technology to facilitate post-stroke upper-limb rehabilitation in the home. Method: Using the principles of realistic evaluation, this study explored the context of utilising computer feedback for upper limb stroke rehabilitation in the home setting; the underpinning theory-driven mechanisms of the intervention and how these impacted on theoretical outcomes. Focus groups with Community Stroke Teams were followed by initial testing and multi-method case studies before, during and after the use of computer-based equipment. Data were analysed in relation to the hypotheses case by case. This was followed by a synthesis of the findings to answer the question, 'what works for whom and in what circumstances and respects?' Findings: Data analysis reveals that in order to achieve desired outcomes through the use of computer technology, key elements of computer-feedback such as; accurate, measurable, rewarding, adaptable, and knowledge of results feedback are required to trigger the mechanisms underpinning the intervention. In addition, the pre-existing context and the personal and environmental contexts such as; previous experiences of service delivery, personal goals, trust in technology, social circumstances and practicalities may also enable or constrain the underpinning theory-driven mechanisms. Discussion: This research has explored the implications of the paradigm shift from therapist led rehabilitation where feedback is provided face-to-face to a more patient led model of rehabilitation where feedback is provided by a computer in the absence of a therapist. Findings suggest that the delivery of feedback in clinical practice is led by their empirical knowledge and understanding of the therapists. However, this model of delivery may not be conducive to motor learning and self-management and may also influence the personal context of users. The theory-driven mechanisms underpinning the utilisation of feedback from computer-based technology for home-based upper-limb post-stroke rehabilitation are dependent on key elements of computer feedback and the personal and environmental context. The discovery of these elements may therefore result in the development of technology; therapy education and the subsequent adoption of technology and a self-management paradigm; long-term self-managed rehabilitation; and importantly, improvements in the physical and psychosocial aspects of recovery. Further work is required to; develop the technology so that it incorporates the elements of feedback highlighted by this research; ensure the technology is robust, reliable and accurate; investigate the clinical utility of technology for home-based stroke rehabilitation, and the extent to which it might encourage utilisation by the end user.
APA, Harvard, Vancouver, ISO, and other styles
45

Sidorenko, Elizabeth Bradley. "A teacher's initial use of computer-mediated communications: a case for home access /." The Ohio State University, 1995. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487928649988912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Veerapuneni, Satish Kumar. "Benchmarking smart homes using a humanoid robot approach." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0006467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Paris, Karen Lee 1945. "A STUDY OF COMPUTER USE AND NEEDS IN SOUTHERN ARIZONA HOME ECONOMICS CLASSROOMS GRADES SIX THROUGH TWELVE (SOFTWARE)." Thesis, The University of Arizona, 1986. http://hdl.handle.net/10150/276357.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Herr, Lea. "Home management system application development for inventory management /." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/lherr2007.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Schleich, Christopher W. "Designing a Customer Relationship Management (CRM) System for the Home Automation Industry." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10263119.

Full text
Abstract:

In recent years, businesses have begun storing their data in the Cloud due to an increased demand for having business information accessible at remote locations. A large portion of the technology used to store company data in the Cloud is generic software with features applicable to most types of industries. However, the home automation industry does not fit this mold.

Home automation companies’ employees spend most of their time working away from the office. As such, they need to have business information - such as contacts, tasks, work orders, purchase and change orders, accessible from laptops, phones, and tablets. Most companies in the industry use D-Tools System Integrator, a Windows-based application used to generate contracts and sell home automation technologies to clients. However, not only does D- Tools System Integrator fail to provide the tools needed to manage daily operations once a contract is signed, it also fails to provide compatibility with non-Windows computers. Thankfully there is a newly developed system to help fix these shortcomings.

Automation Pro is an online Customer Relationship Management (CRM) System designed by Christopher Schleich, tailored specifically for the home automation industry. Automation Pro is built in ASP.NET and MVC frameworks using Microsoft Visual Studio. The goal of the system is to provide all of the tools that D-Tools System Integrator fails to deliver, and develop a user interface that will automatically resize based on the device accessing the system. The design and implementation of Automation Pro is the focus of this project.

APA, Harvard, Vancouver, ISO, and other styles
50

Alhamid, Mohammed. "Hamon: An Activity Recognition Framework for Health Monitoring Support in Home Environments." Thesis, University of Ottawa (Canada), 2010. http://hdl.handle.net/10393/28704.

Full text
Abstract:
Nowadays, technology advances accelerate the quality and type of services provided for health care and especially for monitoring health conditions. Sensors have become more powerful to sense different physiological signs and have the ability to be worn on the human body using wireless communication modules. A variety of software tools have been developed to help in processing a variance list of vital signs by analyzing and visualizing data generated by multiple sensors. In this thesis, we introduced a Health signs and Activity recognition MONitoring framework (Hamon). Hamon, of German origin meaning a home protector, is designed to be an enabling prototype for health monitoring applications. Using off-the-shelf sensors, we implemented an activity detection framework for detecting five types of activity: falling, lying down, sitting, standing, and walking. The framework collects and analyzes sensory data in real-time, and provides different feedback to the users. In addition, it can generate alerts based on the detected events and store the data collected to a medical sever. Context information such as the weather condition, the type of activity, and physiological data collected such as the heart rate, is also integrated in the framework. A number of challenges have been addressed in this thesis including: the design and the implementation of the framework, the selection and the implementation of the activity recognition algorithm, and the classification method used for detection.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography