Dissertations / Theses on the topic 'Social Internet of Things (Social IoT)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Social Internet of Things (Social IoT).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
NITTI, MICHELE. "Managing the Internet of Things based on its Social Structure." Doctoral thesis, Università degli Studi di Cagliari, 2014. http://hdl.handle.net/11584/266422.
Full textEbrahiem, Waleed, and Naveed Arif. "Internet of Things : How vendors can use IoT to achieve value creation." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-144582.
Full textJohansson, Fredrik, and Martin Göthe. "Internet of Things, bekvämt, men säkert? : En studie kring säkerhetsaspekter inom IoT." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-135063.
Full textLaya, Andrés. "The Internet of Things in Health, Social Care, and Wellbeing." Doctoral thesis, KTH, Radio Systems Laboratory (RS Lab), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-212548.
Full textQC 20180828
IoT Ecosystems (VINNOVA)
COIN-SWEAT
MTC2020
M2MRISE
Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds." Thesis, Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024/document.
Full textThe paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
Hussein, Ali Dina. "A social Internet of Things application architecture : applying semantic web technologies for achieving interoperability and automation between the cyber, physical and social worlds." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2015. http://www.theses.fr/2015TELE0024.
Full textThe paradigm of the Social Internet of Things (SIoT) is being promoted in the literature to boost a new trend wherein the benefits of social network services are exhibited within the network of connected objects i.e., the Internet of Things (IoT). The novel user-friendly interaction framework of the SIoT opens the doors for enhancing the intelligence required to stimulate a shift in the IoT from a heterogeneous network of independently connected objects towards a manageable network of everything. In practice, achieving scalability within the large-scale and the heterogeneous paradigm of the IoT while maintaining on top of its user-friendly and intuitive services to bridge human-to-machine perceptions and encourage the technology’s adaptation is a major challenge which is hindering the realization and deployment of the IoT technologies and applications into people’s daily live. For the goal of handling IoT challenges, as well as improve the level of smart services adaptability to users’ situational needs, in this thesis, novel SIoT-based application architecture is provided. That is, Semantic Web Technologies are envisaged as a means to develop automated, value-added services for SIoT. While, interoperability and automation are essential requirement to seamlessly integrate such services into user life, Ontologies are used to semantically describe Web services with the aim of enabling the automatic invocation and composition of these services as well as support interactions across the cyber, physical and social worlds. On the other hand, handling the variety of contextual data in SIoT for intelligent decision making is another big challenge which is still in very early stages of research. In this thesis we propose a cognitive reasoning approach taking into consideration achieving situational-awareness (SA) in SIoT. This reasoning approach is deployed within two application domains where results show an improved level of services adaptability compared to location-aware services which are previously proposed in the literature
Åkerlund, Mathilda. "IoT on Twitter : A Mixed Methods Study." Thesis, Umeå universitet, Institutionen för informatik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-149232.
Full textLundgren, Emil, and Markus Karmehag. "SAMBANDET MELLAN AUTONOMI OCH IoT-LÖSNINGAR I EN LINJEORGANISATION." Thesis, Umeå universitet, Institutionen för informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-173342.
Full textDavids, Natheer. "The Privacy Paradox: Factors influencing information disclosure in the use of the Internet of Things (IoT) in South Africa." Master's thesis, Faculty of Commerce, 2021. http://hdl.handle.net/11427/32636.
Full textMasmoudi, Mariam. "Prévention des attaques de confiance en temps réel dans l'IoT social." Electronic Thesis or Diss., Toulouse 3, 2023. http://www.theses.fr/2023TOU30302.
Full textThe social IoT is a new paradigm that enhances the navigability of IoT networks and boosts service discovery by integrating social contexts. Nonetheless, this paradigm faces several challenges that reduce its performance quality. Trust, particularly trust attacks, is one of the most significant challenges. Some users resort to malicious behaviors and launch attacks to propagate malicious services. A trust management mechanism has become a major requirement in Social IoT to prevent these attacks in real-time and ensure trustworthy experiences for end-users. However, few studies have addressed trust management issues to prevent trust attacks in Social IoT environments. Most studies have been conducted to detect offline attacks with or without specifying the type of attack performed. Moreover, they did not consider security properties, such as cryptography, transparency, and immutability, etc. In fact, we must continuously process transactions to prevent these attacks at the transaction generation level while maintaining security properties. For this, we compared the previously used techniques and technologies, whose common point is attack prevention in the SN and IoT areas. Based on these comparisons, we indicated that blockchain technology can assist in developing a trust management mechanism that can prevent trust attacks while maintaining security. For real-time prevention, we proposed the combination of a distributed stream processing engine, known as Apache Spark, with blockchain technology. Our choice is based on a comparison of open-source data-stream processing engines. As a result, we propose a new trust management mechanism, based on blockchain and Apache Spark. This mechanism permit to prevent in real-time all trust attack types performed by malicious nodes, in order to obtain a reliable environment. Experimentation made on a real data-set enable us to prove the performance of our proposition
Svensson, Jesper, Niclas Carlén, and August Forsman. "Innovating with sensors : A micro-level perspective investigating how IoT solutions affect work practices." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-147760.
Full textFilip, Tomas, and Kobets Kirill. "Internet of Things inom integrerad vård för äldre : En kvalitativ studie ur ett säkerhetsperspektiv." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-98143.
Full textAs the elderly population in most countries continues to grow, the demand for elderly care is increasing. At the same time, the Internet of Things (IoT) has quickly become one of the most well-known and widely spoken concept of business and technology. One area of use that IoT is currently addressing is healthcare. In this area, IoT is expected to be able to provide the elderly with integrated care that in the future can reduce healthcare and costs. All the advantages of IoT have also brought disadvantages in the form of new security attacks and vulnerabilities in the health care systems. The problem with the IoT technology is that it is not currently supported by adequate privacy and security measures. The purpose of the study was to investigate how security issues affect the development of IoT solutions aimed at integrated care for the elderly. Through semi-structured interviews with five informants with experience and competence in the field of integrated care for elderly, IoT and security, the empirical data for the study could be collected. Furthermore, the empirical result was analyzed together with the literature, and a number of factors were identified that have influence on the development of IoT solutions aimed at integrated care for the elderly. The results of the study show that the factors of time, economy and user friendliness affect the actors' choice of prioritizing functionality before security during development. Instead, actors are forced to make a number of tradeoffs and work in different ways to implement adequate security in their IoT solutions. Furthermore, the results show that the lack of clear guidelines and standards is a factor that influences actors' compliance with laws and regulations that impose strict safety requirements. In addition, the results show that it is important to define the ownership issue during the development stage, as the issue is currently unclear and diffuse.
Byrskog, Michael. "Interoperabilitetinom eHälsa : Enkvalitativ studie om användningen av IoT för glukosdata." Thesis, Mittuniversitetet, Avdelningen för data- och systemvetenskap, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-31460.
Full textDenna studie handlar om interoperabilitet vid insamling och vidarebefordran av glukosdata och fokuserar på en ny teknik inom eHälsa. Denna teknik är en del av Internet of Things (IoT) och involverar interoperabilitet inom system med sensorer som appliceras på människokroppen. Syftet har varit att undersöka interoperabiliteten vid insamling och vidarebefordran av glukosdata utifrån frågeställningarna om vilka olika sorters interoperabilitet som förekommer, hur interoperabiliteten används och vilka för- och nackdelar som finns med olika sorters interoperabilitet. En fallstudie med sex semistrukturerade intervjuer har genomförts. Analysen av intervjuerna har utförts med hjälp av ett teoretiskt ramverk som behandlar IoT och interoperabilitet samt en tvådelad interoperabilitetsmodell. Första delen av modellen har använts för att analysera förekomsten av grundläggande, funktionell och semantisk interoperabilitet vid insamling och vidarebefordran av glukosdata. Andra delen av modellen har använts för att analysera informationssystemen utifrån olika mognadsnivåer för interoperabiliteten. Vid insamling av glukosdata förekommer grundläggande, funktionell och i viss mån semantisk interoperabilitet. Vid vidarebefordran av glukosdata förekommer grundläggande och funktionell interoperabilitet. Grundläggande interoperabilitet dominerar här med undantag för ett fall. Vid insamling av glukosdata har meddelanden och notifikationer och den automatiska justeringen av medicinering framkommit som fördelar. Vid vidarebefordran av glukosdata har det faktum att respondenterna inte behöver ta med sin anordning till vårdgivarna och, i ett fall, att flera användare kan se de insamlade glukosdata framkommit som fördelar. Några tydliga nackdelar har inte kunnat identifieras. Andra delen av interoperabilitetsmodellen har resulterat i två mognadsnivåer för interoperabiliteten vid vidarebefordran av glukosdata, ”distribuerad organisationsbunden” och ”integrerad nationell”.
Hakkestad, Mårten, and Simon Rynningsjö. "Who hacked my toaster? : A study about security management of the Internet of Things." Thesis, Linköpings universitet, Informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-158468.
Full textInternet of Things eller Sakernas internet är ett växande område med en växande hotbild och nya hot uppkommer dagligen. Att hålla sig uppdaterad, övervaka nätverk och enheter samt att reagera på att enheter och nätverk blir hackade är en svår och komplicerad uppgift. Den här uppsatsen ämnar undersöka hur ett IT-företag kan arbeta med säkerhetshantering inom Internet of Things. Detta har gjorts genom att kolla utmaningar och säkerhetslösningar inom de tre områdena uppdatera, övervaka och reagera. En kvalitativ forskningsmetod har använts i denna fallstudie tillsammans med ett tolkande synsätt och en abduktiv ansats. Vi har utfört intervjuer på ett stort IT-företag baserat i Sverige tillsammans med en utförlig dokumentanalys. Resultatet av denna uppsats påvisar ett antal utmaningar inom säkerhetshanteringen inom områdena uppdatera, övervaka och reagera tillsammans med hur vårt fallföretag jobbar med att motarbeta dessa utmaningar. I stort sett kan utmaningarna sammanfattas till att allting är svårare när mängden enheten är så hög som den är inom Internet of Things.
Vergara, Rammsy Andrea, Karolina Ekbäck, and Marcus Viksten. "Smart Omedelbart? : En kvalitativ studie om IoT och dess bidrag till smarthet inom offentlig verksamhet." Thesis, Umeå universitet, Institutionen för informatik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-183641.
Full textRosell, Mathias. "Hur bör manipulation av IoT-enheter i det smarta hemmet hanteras och åtgärdas av användare och utvecklare : En systematisk litteraturstudie för att kartlägga åtgärder för smarta hem." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18652.
Full textUsers of IoT devices are for many people today part of everyday life and more and more devices are connected to people's households. Smart homes have everything from refrigerators and surveillance cameras connected to a network and the internet. The problem with this is that many of these units do not have sufficient capacity or lack adequate security measures to protect themselves against potential attack vectors. Lack of security for devices in the smart home can cause the devices to be hacked and manipulated by attackers. Those who can protect the smart home from tampering with its IoT devices are the users in the smart home and the developers of the IoT devices. Although it is not always clear for whom the security measures apply to, which is something that this study aims to clarify. This literature study is based on existing security measures identified by previous research. It differs from previous research by mapping out which security measures and best practices that are applicable to users and developers to protect the smart home from being manipulated. Using a systematic literature search, 22 studies were selected to answer the study's question. To answer the study's research question, a mapping method is used. The method is used to map and identify which actions are recommended for both users and developers. Using the previous research, a framework is created to clarify what the user in the smart home can do and what actions developers can and should take. The framework also demonstrates a recommended order from the author in which the measures should be carried out.
Winnberg, Lise-Lott, and Mimmi Jackléus. "IoT användning inom kommunal verksamhet : – i Östergötland." Thesis, Linköpings universitet, Informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151405.
Full textThe Internet of Things is becoming more common and more common and is already included in someplaces such as city plans for new buildings, in smart offices and infrastructure. There is a wealth ofprivately-owned companies specializing in IoT solutions and application of this to different parts of society.A great example is installing IoT sensors in water pipes so that maintenance can be foreseen, thus reducingsupply deviations and reducing any losses.In this qualitative bachelor thesis, we have investigated how IoT is used in municipalities, what they thinkIoT has to offer the future of Sweden's municipalities and how they see IoT can be used to create utility inmunicipal activities, but also what may be an obstacle in the process of realizing this.After interviewing a few of the municipalities across Östergötland County we have found that currentlythere are few IoT solutions in the municipalities and that it is due to several reasons. One of them is thelack of regulations that deal with IoT, but also the lack of standardisation of IoT, and what the introductionof IoT solutions would entail in municipalities or towns. What to invest in? There is some uncertainty there.If there were concrete examples of direct municipial operation benefit that would probably be a difference.This might possibly be resolved by the Digitaliseringsmyndigheten which will be established in the autumnhowever it seems that their role is not so well-defined, which we noticed when we spoke to respondents.They had different hopes of what the government can assist with or what their work would result in.We have discovered that there is no requirement for the state to provide municipalities with a strategy thataddresses the IoT or a digitization strategy. Nevertheless, a couple of respondents already have a digitizationstrategy or were working on it.Another reason is that the funds the municipalities currently have is not enough for such a venture, thosefunds are necessary to maintain and keep the municipal operation running. A municipality's focus is alwaysthe business and the citizens. If limited funds force a choice between investment in technical capabilities,although they can generate greater profit in the long run, and operational development of other forms ormaintenance, the operation will always come first. As one of the respondents explained, if the choice isbetween building a new preschool or investing in a new technology project, it is obvious where the moneyends up.
Henriksson, Joar, and Daniel Gustavsson. "Vårdplaceringsproblematik på Norrlands Universitetssjukhus : En fallstudie gällande vårdplaceringsprocessen och hur IoT kan användas inom den." Thesis, Umeå universitet, Institutionen för informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-159182.
Full textMasséus, Jonatan. "Where Did The Car Go? : Smart cities, calm technology and the future of autonomous cars." Thesis, Internationella Handelshögskolan, Jönköping University, IHH, Informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-50202.
Full textIezzi, Valeria. "Connectedness : Designing interactive systems that foster togetherness as a form of resilience for people in social distancing during Covid-19 pandemic. Exploring novel user experiences in the intersection between light perception, tangible interactions and social interaction design (SxD)." Thesis, Malmö universitet, Malmö högskola, Institutionen för konst, kultur och kommunikation (K3), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-37697.
Full textCorino, Gianni. "Internet of props : a performative ontology and design framework for the Internet of Things." Thesis, University of Plymouth, 2017. http://hdl.handle.net/10026.1/9511.
Full textSkytte, André, and Victor Olsson. "Framtidens teknikinformatör : Hur Internet of Things påverkar en arbetsroll." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-66810.
Full textA technology change towards the Internet of Things (IoT) can lead to changes for both businesses and consumers in the form of changing work roles, new ways of producing content and new ways to share content. The focus of this report has been on what this means for technical writers. To highlight this problem, an investigation has been conducted at a case company specializing in producing technical documentation and which has begun to look closer at IoT. The investigation led to the conclusion that the role of technical writer within an IoT-context looks different from a technical writer who writes traditionally. To write technical documentation for IoT, higher demands are placed on technical competence in the form of basic programming skills and object-oriented thinking.
Göttert, Rebecca. "Materializing social presence: Exploring the Internet of Things using a Research through Design approach." Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21210.
Full textAqeel, Muhammad. "Internet of Things : Systematic literature review of security and future research." Thesis, Uppsala universitet, Informationssystem, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420118.
Full textTägt, Daniel, and Erik Wijnbladh. "Informationssäkerhet inom Internet of Things, vad finns det för behov av en standard? : En kvalitativ studie om utvecklarnas syn på behovet av en standard inom Internet of Things." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-72501.
Full textAbdelghani, Wafa. "A multi-dimensional trust-model for dynamic, scalable and resources-efficient trust-management in social internet of things." Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30231.
Full textThe Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by giving them the ability to connect to the Internet, communicate and interact. The integration of the social component in the IoT has given rise to the Social Internet of Things (SIoT), which has overcome various issues such as interoperability, navigability and resource/service discovery. In this type of environment, participants compete to offer a variety of attractive services. Some of them resort to malicious behavior to propagate poor quality services. They launch so-called Trust-Attacks (TA) and break the basic functionality of the system. Several works in the literature have addressed this problem and have proposed different trust-models. Most of them have attempted to adapt and reapply trust models designed for traditional social networks or peer-to-peer networks. Despite the similarities between these types of networks, SIoT ones have specific particularities. In SIoT, there are different types of entities that collaborate: humans, devices, and services. Devices can have very limited computing and storage capacities, and their number can be as high as a few million. The resulting network is complex and highly dynamic, and the impact of Trust-Attacks can be more compromising. In this work, we propose a Multidimensional, Dynamic, Resources-efficient and Scalable trust-model that is specifically designed for SIoT environments. We, first, propose features to describe the behavior of the three types of nodes involved in SIoT networks and to quantify the degree of trust according to the three resulting Trust-Dimensions. We propose, secondly, an aggregation method based on Supervised Machine-Learning and Deep Learning that allows, on the one hand, to aggregate the proposed features to obtain a trust score allowing to rank the nodes, but also to detect the different types of Trust-Attacks and to counter them. We then propose a hybrid propagation method that allows spreading trust values in the network, while overcoming the drawbacks of centralized and distributed methods. The proposed method ensures scalability and dynamism on the one hand, and minimizes resource consumption (computing and storage), on the other. Experiments applied to synthetic data have enabled us to validate the resilience and performance of the proposed model
Ben, Saied Yosra. "Collaborative security for the internet of things." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0013.
Full textThis thesis addresses new security challenges in the Internet of Things (IoT). The current transition from legacy Internet to Internet of Things leads to multiple changes in its communication paradigms. Wireless sensor networks (WSNs) initiated this transition by introducing unattended wireless topologies, mostly made of resource constrained nodes, in which radio spectrum therefore ceased to be the only resource worthy of optimization. Today's Machine to Machine (M2M) and Internet of Things architectures further accentuated this trend, not only by involving wider architectures but also by adding heterogeneity, resource capabilities inconstancy and autonomy to once uniform and deterministic systems. The heterogeneous nature of IoT communications and imbalance in resources capabilities between IoT entities make it challenging to provide the required end-to-end secured connections. Unlike Internet servers, most of IoT components are characterized by low capabilities in terms of both energy and computing resources, and thus, are unable to support complex security schemes. The setup of a secure end-to-end communication channel requires the establishment of a common secret key between both peers, which would be negotiated relying on standard security key exchange protocols such as Transport Layer Security (TLS) Handshake or Internet Key Exchange (IKE). Nevertheless, a direct use of existing key establishment protocols to initiate connections between two IoT entities may be impractical because of the technological gap between them and the resulting inconsistencies in their cryptographic primitives. The issue of adapting existing security protocols to fulfil these new challenges has recently been raised in the international research community but the first proposed solutions failed to satisfy the needs of resource-constrained nodes. In this thesis, we propose novel collaborative approaches for key establishment designed to reduce the requirements of existing security protocols, in order to be supported by resource-constrained devices. We particularly retained TLS handshake, Internet key Exchange and HIP BEX protocols as the best keying candidates fitting the end-to-end security requirements of the IoT. Then we redesigned them so that the constrained peer may delegate its heavy cryptographic load to less constrained nodes in neighbourhood exploiting the spatial heterogeneity of IoT nodes. Formal security verifications and performance analyses were also conducted to ensure the security effectiveness and energy efficiency of our collaborative protocols. However, allowing collaboration between nodes may open the way to a new class of threats, known as internal attacks that conventional cryptographic mechanisms fail to deal with. This introduces the concept of trustworthiness within a collaborative group. The trustworthiness level of a node has to be assessed by a dedicated security mechanism known as a trust management system. This system aims to track nodes behaviours to detect untrustworthy elements and select reliable ones for collaborative services assistance. In turn, a trust management system is instantiated on a collaborative basis, wherein multiple nodes share their evidences about one another's trustworthiness. Based on an extensive analysis of prior trust management systems, we have identified a set of best practices that provided us guidance to design an effective trust management system for our collaborative keying protocols. This effectiveness was assessed by considering how the trust management system could fulfil specific requirements of our proposed approaches for key establishment in the context of the IoT. Performance analysis results show the proper functioning and effectiveness of the proposed system as compared with its counterparts that exist in the literature
Ciortea, Andrei-Nicolae. "Tisser le Web Social des Objets : Permettre une Interaction Autonome et Flexible dans l’Internet des Objets." Thesis, Lyon, 2016. http://www.theses.fr/2016EMSE0813/document.
Full textThe Internet of Things (IoT) aims to create a global ubiquitous ecosystem composed of large numbers of heterogeneous devices. To achieve this vision, the World Wide Web is emerging as a suitable candidate to interconnect IoT devices and services at the application layer into a Web of Things (WoT).However, the WoT is evolving towards large silos of things, and thus the vision of a global ubiquitous ecosystem is not fully achieved. Furthermore, even if the WoT facilitates mashing up heterogeneous IoT devices and services, existing approaches result in static IoT mashups that cannot adapt to dynamic environments and evolving user requirements. The latter emphasizes another well-recognized challenge in the IoT, that is enabling people to interact with a vast, evolving, and heterogeneous IoT.To address the above limitations, we propose an architecture for an open and self-governed IoT ecosystem composed of people and things situated and interacting in a global environment sustained by heterogeneous platforms. Our approach is to endow things with autonomy and apply the social network metaphor to createflexible networks of people and autonomous things. We base our approach on results from multi-agent and WoT research, and we call the envisioned IoT ecosystem the Social Web of Things.Our proposal emphasizes heterogeneity, discoverability and flexible interaction in the IoT. In the same time, it provides a low entry-barrier for developers and users via multiple layers of abstraction that enable them to effectively cope with the complexity of the overall ecosystem. We implement several application scenarios to demonstrate these features
Ben, Saied Yosra. "Collaborative security for the internet of things." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00879790.
Full textYelasani, kailash kumar yadav. "ECONOMIZED SENSOR DATA PROCESSING WITH VEHICLE PLATOONING." OpenSIUC, 2018. https://opensiuc.lib.siu.edu/theses/2305.
Full textAbed, Javad. "A NOVEL FRAMEWORK FOR SOCIAL INTERNET OF THINGS: LEVERAGING THE FRIENDSHIPS AND THE SERVICES EXCHANGED BETWEEN SMART DEVICES." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/5980.
Full textVaisutis, Kathleen Learmonth. "Understanding the roles of social and tangible technologies in maintaining social interaction, habits and independence into old age." Thesis, Queensland University of Technology, 2015. https://eprints.qut.edu.au/91542/1/Kathleen_Vaisutis_Thesis.pdf.
Full textAlbrektsson, Elof, and Per Helsingen. "Informationshantering i fastighetsbranschen." Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23539.
Full textCaballero, Codina Víctor. "New Challenges on Web Architectures for the Homogenization of the Heterogeneity of Smart Objects in the Internet of Things." Doctoral thesis, Universitat Ramon Llull, 2020. http://hdl.handle.net/10803/669186.
Full textEsta tesis trata de dos de las novedosas tecnologías relacionadas con la Internet of Things (IoT) y su integración con el campo de las Smart Grids (SGs); estas tecnologías son laWeb of Things (WoT) y la Social Internet of Things (SIoT). La WoT es una tecnología que se espera que provea de un entorno escalable e interoperable a la IoT usando la infraestructura web existente, los protocolos web y la web semántica. También se espera que la SIoT contribuya a solucionar los retos de escalabilidad y capacidad de descubrimiento creando una red social de agentes (objetos y humanos). Para explorar la sinergia entre estas tecnologías, el objetivo es el de proporcionar evidencia práctica y empírica, generalmente en forma de prototipos de implementación y experimentación empírica. En relación con la WoT y las SGs, se ha creado un prototipo para la Web of Energy (WoE) que tiene como objetivo abordar los desafíos presentes en el dominio las SGs. El prototipo es capaz de proporcionar interoperabilidad y homogeneidad entre diversos protocolos. El diseño de implementación se basa en el Modelo de Actores, que también proporciona escalabilidad del prototipo. La experimentación muestra que el prototipo puede manejar la transmisión de mensajes para aplicaciones de las SGs que requieran que la comunicación se realice bajo umbrales de tiempo críticos. También se toma otra dirección de investigación similar, menos centrada en las SGs, pero para una gama más amplia de dominios de aplicación. Se integra la descripción de los flujos de ejecución como máquinas de estados finitos utilizando ontologías web (Resource Description Framework (RDF)) y metodologías de la WoT (las acciones se realizan basándose en peticiones Hyper-Text Transfer Protocol/Secure (HTTP/S) a Uniform Resource Locators (URLs)). Este flujo de ejecución, que también puede ser una plantilla para permitir una configuración flexible en tiempo de ejecución, se implementa e interpreta como si fuera (y a través de) un Virtual Object (VO). El objetivo de la plantilla es que sea reutilizable y se pueda compartir entre múltiples despliegues de la IoT dentro del mismo dominio de aplicación. Debido a las tecnologías utilizadas, la solución no es adecuada para aplicaciones de tiempo crítico (umbral de tiempo relativamente bajo y rígido). Sin embargo, es adecuado para aplicaciones que no demandan respuesta en un tiempo crítico y que requieren el despliegue de VOs similares en cuanto al flujo de ejecución. Finalmente, el trabajo se enfoca en otra tecnología destinada a mejorar la escalabilidad y la capacidad de descubrimiento en la IoT. La SIoT está emergiendo como una nueva estructura de la IoT que une los nodos a través de relaciones significativas. Estas relaciones tienen como objetivo mejorar la capacidad de descubrimiento; en consecuencia, mejora la escalabilidad de una red de la IoT. En este trabajo se aplica este nuevo paradigma para optimizar la gestión de la energía en el lado de la demanda en las SGs. El objetivo es aprovechar las características de la SIoT para ayudar en la creación de Prosumer Community Groups (PCGs) (grupos de usuarios que consumen o producen energía) con el mismo objetivo de optimización en el uso de la energía. La sinergia entre la SIoT y las SGs ha sido denominada Social Internet of Energy (SIoE). Por lo tanto, con la SIoE y con el foco en un desafío específico, se establece la base conceptual para la integración entre la SIoT y las SG. Los experimentos iniciales muestran resultados prometedores y allanan el camino para futuras investigaciones y evaluaciones de la propuesta. Se concluye que la WoT y la SIoT son dos paradigmas complementarios que nutren la evolución de la próxima generación de la IoT. Se espera que la próxima generación de la IoT sea un Multi-Agent System (MAS) generalizado. Algunos investigadores ya están apuntando a la Web y sus tecnologías (por ejemplo,Web Semántica, HTTP/S)—y más concretamente a la WoT — como el entorno que nutra a estos agentes. La SIoT puede mejorar tanto el entorno como las relaciones entre los agentes en esta fusión. Como un campo específico de la IoT, las SGs también pueden beneficiarse de los avances de la IoT.
This thesis deals with two novel Internet of Things (IoT) technologies and their integration to the field of the Smart Grid (SG); these technologies are the Web of Things (WoT) and the Social Internet of Things (SIoT). The WoT is an enabling technology expected to provide a scalable and interoperable environment to the IoT using the existing web infrastructure, web protocols and the semantic web. The SIoT is expected to expand further and contribute to scalability and discoverability challenges by creating a social network of agents (objects and humans). When exploring the synergy between those technologies, we aim at providing practical and empirical evidence, usually in the form of prototype implementations and empirical experimentation. In relation to the WoT and SG, we create a prototype for the Web of Energy (WoE), that aims at addressing challenges present in the SG domain. The prototype is capable of providing interoperability and homogeneity among diverse protocols. The implementation design is based on the Actor Model, which also provides scalability in regards to the prototype. Experimentation shows that the prototype can handle the transmission of messages for time-critical SG applications. We also take another similar research direction less focused on the SG, but for a broader range of application domains. We integrate the description of flows of execution as Finite-State Machines (FSMs) using web ontologies (Resource Description Framework (RDF)) and WoT methodologies (actions are performed on the basis of calls Hyper Text Transfer Protocol/ Secure (HTTP/S) to a Uniform Resource Locator (URL)). This execution flow, which can also be a template to allow flexible configuration at runtime, is deployed and interpreted as (and through) a Virtual Object (VO). The template aims to be reusable and shareable among multiple IoT deployments within the same application domain. Due to the technologies used, the solution is not suitable for time-critical applications. Nevertheless, it is suitable for non-time-critical applications that require the deployment of similar VOs. Finally, we focus on another technology aimed at improving scalability and discoverability in IoT. The SIoT is emerging as a new IoT structure that links nodes through meaningful relationships. These relationships aim at improving discoverability; consequently, improving the scalability of an IoT network. We apply this new paradigm to optimize energy management at the demand side in a SG. Our objective is to harness the features of the SIoT to aid in the creation of Prosumer Community Group (PCG) (groups of energy users that consume or produce energy) with the same Demand Side Management (DSM) goal. We refer to the synergy between SIoT and SG as Social Internet of Energy (SIoE). Therefore, with the SIoE and focusing on a specific challenge, we set the conceptual basis for the integration between SIoT and SG. Initial experiments show promising results and pave the way for further research and evaluation of the proposal. We conclude that the WoT and the SIoT are two complementary paradigms that nourish the evolution of the next generation IoT. The next generation IoT is expected to be a pervasive Multi-Agent System (MAS). Some researchers are already pointing at the Web and its technologies (e.g. Semantic Web, HTTP/S) — and more concretely at the WoT — as the environment nourishing the agents. The SIoT can enhance both the environment and the relationships between agents in this fusion. As a specific field of the IoT, the SG can also benefit from IoT advancements.
Tsipenyuk, Gregory. "Evaluation of decentralized email architecture and social network analysis based on email attachment sharing." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/273963.
Full textAlves, Tiago Marcos. "Explorando a internet das coisas sociais utilizando NFC em um campus universitário." Universidade do Vale do Rio dos Sinos, 2015. http://www.repositorio.jesuita.org.br/handle/UNISINOS/4968.
Full textMade available in DSpace on 2015-11-30T12:28:21Z (GMT). No. of bitstreams: 1 TIAGO MARCOS ALVES_.pdf: 2097379 bytes, checksum: f4cd33a52ef54f387fff8437a89207e8 (MD5) Previous issue date: 2015-08-26
UNISINOS - Universidade do Vale do Rio dos Sinos
A Internet das Coisas (IoT) permite a interconexão de objetos inteligentes, tais como smartphones, tablets, televisores e sensores sem fio, com os seres humanos, usando diferentes protocolos de comunicação através do desenvolvimento de uma rede heterogênea multimodal dinâmica. Neste sentido a convergência da tecnologia de IoT com o conceito de redes sociais fez surgir um paradigma chamado Internet das Coisas Sociais (SIoT). Na SIoT, os objetos imitam comportamentos de seres humanos e criam seus próprios relacionamentos baseado em regras estabelecidas pelos seus proprietários. Nesse âmbito, este trabalho propõe a disponibilização de uma rede social que explore os conceitos de SIoT utilizando a tecnologia Near Field Communication (NFC). O modelo proposto define uma plataforma para lidar com a comunicação de objetos inteligentes em um campus universitário para benefício dos estudantes, professores e demais participantes da comunidade acadêmica. Neste modelo, a definição de objetos inteligentes é a de objetos que oferecem funcionalidades para interação com os seres humanos, tais como smartphones, tablets, refrigeradores e televisores. Como contribuição científica, este trabalho propõe uma rede social para objetos inteligentes com aplicação em um ambiente universitário, baseada na abordagem de SIoT. O modelo, denominado SIoTCampus, foca no uso dos inúmeros objetos existentes em um campus universitário, propondo um relacionamento entre estes com a finalidade de ser uma nova ferramenta para disseminar informações entre os membros que compõem a comunidade universitária, tais como professores, funcionários, alunos e visitantes. Dentre os cenários existentes de aplicações exclusivas para SIoT não foi observado uma aplicação para este tipo de relacionamento focada para um campus universitário. Desta forma, a proposta do modelo SIoTCampus é a de uma rede social exclusiva para objetos inteligentes em um ambiente acadêmico em que as informações de contexto, como localização, agenda, etc são usadas como critérios para estabelecer relacionamentos entre os dispositivos inteligentes. Configurações iniciais sobre preferências dos proprietários são informadas neste modelo em um aplicativo móvel desenvolvido para esta função. Assim, informações específicas sobre determinados assuntos, eventos publicados, notícias relevantes a determinados temas em um campus universitário, que forem capturados por estes objetos são enviadas a um servidor e analisadas de forma que estas informações possam ser ou não usadas para estabelecer relações entre estes objetos. Os resultados obtidos com a realização deste trabalho apresentaram uma arquitetura de comunicação que buscou lidar com os possíveis relacionamentos entre os objetos inteligentes presentes na universidade. A avaliação deste trabalho foi feita através da utilização de cenários visando explorar a ideia principal aqui descrita que é o relacionamento entre os objetos inteligentes. Alguns cenários para esta avaliação foram executados e aplicados a um grupo de estudantes do curso de Ciência da Computação da Universidade do Vale do Rio dos Sinos. Dentre os resultados alcançados cabe destacar que para 80% dos usuários que participaram desta avaliação o modelo pode se tornar uma importante ferramenta de integração entre os componentes do campus acadêmico. Outro ponto importante destacado para o perfil de participantes desta avaliação foi que o emprego da tecnologia NFC amplia as possibilidades de uso do modelo. Isto se justifica devido às novas formas de interação entre os dispositivos de usuários que poderiam ser atendidas pelo emprego desta tecnologia.
The Internet of Things (IoT) allows the interconnection of smart objects, such as smartphones, tablets, televisions and wireless sensors, with humans, using different communication protocols through the development of a heterogeneous multi-modal dynamic network. In this sense the convergence of IoT technology with the concept of social networks has given rise to a paradigm called Internet of Things Social (SIoT). In SIoT objects mimic behaviors of humans and create their own relationships based on rules established by its owners. In this context, this paper proposes the provision of a social network that explore the concepts of SIoT using Near Field Communication (NFC) technology. The proposed model defines a platform to handle communication of smart objects on a college campus for the benefit of students, teachers and other participants from the academic community. In this model, the definition of the smart objects are objects that provide functionality for interacting with humans, such as smartphones, tablet, refrigerators and televisions. As a scientific contribution this paper proposes a social network for smart objects with application in a university setting, based on the approach of SIoT. The model, called SIoTCampus, focuses on the use of several existing objects on a college campus, suggesting a relationship between these in order to be a new tool to disseminate information among the members of the university community, including faculty, staff, students and visitors. Among the existing scenarios of unique applications for SIoT, it was not observed an application for this kind of focused relationship to a college campus. Thus the proposal of SIoTCampus model is an exclusive social network for smart objects in an academic environment in which context information such as location, calendar, etc. are used as criteria for establishing relationships between intelligent devices. Initial settings on preferences of owners are informed in this model in a mobile application developed for this function. So specific information about certain subjects, published events, relevant news certain topics on a college campus, which are captured by these objects are sent to a server and analyzed so that this information may or may not be used to establish relationships between these objects. The results of this work showed a communications architecture that sought to deal with the possible relationships between intelligent objects present at the university. The assessment of this work was done through the use of scenarios to explore the main idea here is that described the relationship between Smart Objects. Some scenarios for this assessment were implemented and applied to a group of students of Computer Science Course of the Universidad do Vale do Rio dos Sinos. Among the results we highlight that for 80% of users who participated in this evaluation found that the model can become an important integration tool among members of the academic campus. Another important point highlighted to the participants profile of this evaluation was that the use of NFC technology expands the model of using possibilities. This is justified due to new forms of interaction between devices of users that could be met by the use of this technology.
Pacheco, Fabiana Beal. "Modelos de negócio para produtos/serviços baseados em internet das coisas: o caso de uma empresa de automação residencial." Universidade do Vale do Rio dos Sinos, 2015. http://www.repositorio.jesuita.org.br/handle/UNISINOS/4884.
Full textMade available in DSpace on 2015-10-23T14:44:19Z (GMT). No. of bitstreams: 1 Fabiana Beal Pacheco_.pdf: 1625052 bytes, checksum: f8aba4b963587ce97156993ac679d2d9 (MD5) Previous issue date: 2015-05-29
Nenhuma
A Internet das Coisas (IoT) é uma evolução dentro do paradigma de computação ubíqua, que consiste na presença pervasiva de objetos e “coisas” inteligentes ao nosso redor. A IoT inspira um novo modelo de negócios, o qual força as organizações de vários setores a ajustar suas estratégias, a fim de obter sucesso no mercado digital que se expandirá cada vez mais. Muitas empresas enfrentam dificuldades de entender a complexidade sem precedentes de desenvolver modelos de negócio adequados à evolução das tecnologias digitais. Desta forma, o presente estudo teve como objetivo analisar como pode ser definido um modelo de negócio para produtos e serviços baseados em IoT, identificando os elementos mais relevantes e os facilitadores e as barreiras existentes neste contexto tecnológico. Para a presente pesquisa adotou-se uma abordagem qualitativa, de nível exploratório, tendo como método de pesquisa a metodologia baseada em design - a Design Research (DR). A DR foi utilizada para instanciação de um modelo de negócio, seguindo o Business Model Canvas, para um produto baseado em IoT. Para obtenção de dados empíricos, o estudo foi realizado em uma empresa de desenvolvimento de produtos eletrônicos, mais especificamente, na linha de automação residencial. As atividades realizadas com a empresa, as quais compreenderam sessões de trabalho e entrevistas semiestruturadas, tiveram como propósito compreender o problema a ser tratado na pesquisa, levantar a motivação da empresa em abordá-lo, realizar o desenho do modelo de negócio e, posteriormente, executar a validação do mesmo, assim como avaliar o método de pesquisa utilizado. Os principais resultados indicam que um modelo de negócio para produtos e serviços baseados em IoT podem ser gerados a partir do Business Model Canvas, porém possuem elementos específicos que precisam ser considerados, especialmente relacionados com aspectos tecnológicos advindos de IoT e a oferta de serviços integrados ao produto. Além disso, foram identificados oito facilitadores e sete barreiras para a geração de modelos de negócio para IoT, que contribuem tanto para enriquecer a literatura sobre o tema, como referência para os gestores no momento da concepção de novos modelos de negócios para produtos e serviços baseado em IoT.
The Internet of Things (IoT) is an evolution from ubiquitous computing, which concept is the pervasive presence around us of a variety of smart objects and things. The IoT inspires innovative business models, which forces organizations across industries to adjust their strategies in order to succeed in digital market environments. Many companies have difficulties to capture the unprecedented complexity and to develop adequate business models to address digital innovation. In this way, this study aims to analyze how a business model to Internet of Things (IoT) products and services can be generated, identifying key components, opportunities and challenges that could be faced in such technological context. A qualitative approach, in an exploratory level, was chosen to be followed as well as a design science method, named as Design Research (DR). The DR was applied to instantiate a business model to an IoT product, having Business Model Canvas as guidance. In order to get empirical data and evidence, this study was conducted in an electronic solutions company, focused on home automation. Several activities were executed along with managers of this company, which included work sessions and semi-structured interviews. The purpose of these activities were understanding the problem to be addressed during the research and the motivation behind this initiative, designing a business model, and validating it and the research method applied afterwards. This research main outcomes suggest that a business model to IoT products and services could be generated from the Business Model Canvas, although there are specific elements that need to be considered, especially those related to technological matters and an integrated product and services offering. Besides that, there have been found eight opportunities and seven challenges concerning business model generation to IoT, which contributes as an enhancement to this topic literature and as reference to managers when conceiving new business models to IoT products and services.
Alam, Kazi Masudul. "Towards Cloud-based Vehicular Cyber-physical Systems." Thesis, Université d'Ottawa / University of Ottawa, 2017. http://hdl.handle.net/10393/36227.
Full textPretorius, Daniel Arnoldus. "Factors that affect digital transformation in the telecommunication industry." Thesis, Cape Peninsula University of Technology, 2019. http://hdl.handle.net/20.500.11838/3023.
Full textThe internet, mobile communication, social media, and other digital services have integrated so much into our daily lives and businesses alike. Companies facing digital transformation experience this as exceptionally challenging. While there are several studies that state the importance of digital transformation and how it influences current and future businesses, there is little academic literature available on factors that affect the success or failure of digital transformation in companies. It is unclear what factors affect digital transformation in an established telecommunications company. The aim of this study was therefore to explore the factors that affect digital transformation in a telecommunications company in South Africa, and to what extent. One primary research question was posed, namely: “What factors affect digital transformation in a telecommunications company in South Africa?” To answer the question, a study was conducted at a telecommunications company in South Africa. The researcher adopted a subjective ontological and interpretivist epistemological stance, as the data collected from the participants’ perspective were interpreted to make claims about the truth, and because there are many ways of looking at the phenomena. An inductive approach was selected to enable the researcher to gain in-depth insight into the views and perspective of factors that influence digital transformation in the specific company. The explorative research strategy was used to gain an understanding of the underlying views, reasons, opinions, and thoughts of the 15 participants by means of semi-structured interviews. The participants were made aware that they do not have to answer any question if they are uncomfortable, and they could withdraw their answers at any time. The data collected were transcribed, summarised, and categorised to provide a clear understanding of the data. For this study, 36 findings were identified. From this research, it was inter alia concluded that successful digital transformation of companies depends on how Management drives digital transformation, and the benefits of new digital technologies should be carefully considered when planning to implement digital transformation.
Anantharam, Pramod. "Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social Systems." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1464417646.
Full textKazeem, Ganiat Omolara. "Technology In Policing : An ethnographic study of the use of information and communication technology within Bedfordshire police force." Thesis, Linnéuniversitetet, Institutionen för informatik (IK), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-76419.
Full textAttié, Elodie. "The connected consumer : A theoretical framework of consumer adoption/consequences of the Internet of Things and smart connected objects." Thesis, Toulouse 1, 2019. http://www.theses.fr/2019TOU10048.
Full textOver the last decade, technological and Internet innovations have increasingly invaded the consumer market (N’Goala, 2016). The Internet of Things (IoT) is becoming a common platform, and disrupts relationships between consumers and companies (Bohli et al., 2009); in essence, this is a timely research. The major goal of this thesis is to deepen the understanding of the acceptance and the adoption processes of the IoT and smart connected technologies, as well as the related consequences on perceived well-being. To do this, four contexts of study have been explored: smart connected objects, smart sleep applications, smart homes, and smart stores. First, we performed qualitative exploratory studies, and secondly we conducted quantitative studies to build conceptual models according to our qualitative findings and the literature. The results show that technology benefits are the first factors that enable technology acceptance through perceived usefulness and perceived ease of use; subsequently, self-improvement, through perceived social image and well-being benefits, are the main reasons to continue using the IoT and smart connected technologies. The acceptance and the adoption of these technologies also depend on users’ personality traits while perceived risks and fears on the use of the personal data are the main barriers. In turn, the IoT and smart connected technologies influence perceived well-being according to the experience of use, personality traits, and the technology
Riaño, Diana Patricia Riaño. "Integração de dados estatísticos sociais no desenvolvimento de uma possível arquitetura para a internet das coisas." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/3/3142/tde-20122016-081503/.
Full textThe objectives of this master thesis consist in determining: (i) how modify an IoT reference architecture to identify and prioritize end user\'s needs in a given context; (ii) how transform subjective social data in a objective measure of social impact; (iii) how correlate social data and digital data to measure the end users\' satisfaction with the developed IoT services; (iv) how validate the total system; and (v) if the architecture is reconfigurable and can be adopted and validated in di?erent use cases. The development method started with and extensive bibliographic research about IoT projects, architectures and platforms, already developed and under development, social technology and graphs theory. A conceptual map is proposed and is used as a basis for the entire work. The graphs theory provides a set of metrics that allow the identification of end users\' and communities\' needs and, then, to specify the IoT applications and services to be developed. A fitness function is proposed to evaluate the fulfillment of requirements of a specification. The whole method validation is made by means of a case study. To do so, the available educational, health and transport services of a hypothetical city are described. The problem of o?ering educational services to distant communities and the need to integrate such services to the cultural and health entities are identified. As a result, a Mobile Class application is specified. This application is completely described by the domain, informational, functional and communicational models of the IoT-A reference architecture. For the software development, a complete UML description is made: class diagrams and sequence diagrams. In spite of having adopted a simple case study, the feasibility of integrating the social statistical data evaluation in the design cycle of IoT applications is demonstrated. It is also shown that IoT applications generate social impact in the short, medium and large terms. The method and architecture proposed in this work are generic enough to be used in other applications related to a city as is other domains as M2M and from the Industry 4.0 Initiative.
Elvin, Nicklas, and Frida Nilsson. "Barriärer för digital transformation : En kvalitativ fallstudie i försäkringsbranschen." Thesis, Umeå universitet, Institutionen för informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-171106.
Full textMartof, Jan. "Návrh změn marketingové komunikace vybrané společnosti na Internetu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318314.
Full textIgelmo, Victor. "Context-aware augmented reality experiences using cloud-based systems." Thesis, Högskolan i Skövde, Institutionen för ingenjörsvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-19172.
Full textDomanski, Mikolaj. "The concept of a smart hotel and its impact on guests’ satisfaction, privacy and the perception of the service quality." Thesis, Södertörns högskola, Turismvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-41848.
Full textBotero, Oscar. "Heterogeneous RFID framework design, analysis and evaluation." Electronic Thesis or Diss., Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0011.
Full textThe Internet of Things paradigm establishes interaction and communication with a huge amount of actors. The concept is not a new-from-scratch one; actually, it combines a vast number of technologies and protocols and surely adaptations of pre-existing elements to offer new services and applications. One of the key technologies of the Internet of Things is the Radio Frequency Identification just abbreviated RFID. This technology proposes a set of solutions that allow tracking and tracing persons, animals and practically any item wirelessly. Considering the Internet of Things concept, multiple technologies need to be linked in order to provide interactions that lead to the implementation of services and applications. The challenge is that these technologies are not necessarily compatible and designed to work with other technologies. Within this context, the main objective of this thesis is to design a heterogeneous framework that will permit the interaction of diverse devices such as RFID, sensors and actuators in order to provide new applications and services. For this purpose in this work, our first contribution is the design and analysis of an integration architecture for heterogeneous devices. In the second contribution, we propose an evaluation model for RFID topologies and an optimization tool that assists in the RFID network planning process. Finally, in our last contribution, we implemented a simplified version of the framework by using embedded hardware and performance metrics are provided as well as the detailed configuration of the test platform
Botero, Oscar. "Heterogeneous RFID framework design, analysis and evaluation." Phd thesis, Institut National des Télécommunications, 2012. http://tel.archives-ouvertes.fr/tel-00714120.
Full textChih-HsiangShao and 邵致翔. "A Group Handoff Scheme for Proximate Data Sharing Using the Social Internet of Thing (S-IOT) Mechanism." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/71930925312618906682.
Full text國立成功大學
資訊工程學系
105
Internet of Things (IOT) emerge in large numbers surrounding us and it has already been along with us everywhere. The things not only communicate with each other without human intervention but also own some relationships called Social IOT (S-IOT), which is the same as social relationships of human beings. In this work, architecture and scheme for a group handoff from a mobile AP to a fixed AP and vice versa, for which the group is for downloading and sharing of geo touring information, e.g., Point Of Interest’s (POI’s), using the proposed S-IOT mechanism. Using the proposed mechanism, all handheld devices in a touring group can communicate with each other and then have the group handoff from a mobile AP to a fixed AP and vice versa automatically and transparently to provide the required POI’s content in a more efficient way. This work (1) defines an S-IOT architecture and two functional scenarios called m-AP mode and f-AP mode for group touring, (2) proposes two control schemes called conservative mode and aggressive mode to handle the handoff from m-AP mode to f-AP mode, and (3) provides control schemes for handoff from m-AP mode to f-AP mode and vice versa. A real system is developed using the Android system and the performance analysis is evaluated from the perspective of power consuming, service time, etc.