Essays about: "Control of Internet"

Showing result 11 - 15 of 452 essays containing the words Control of Internet.

  1. 11. Quality Characteristics of Surveillance Systems

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Brwa Sultan; [2023]
    Keywords : Internet of Things; IoT; Quality Characteristics of Surveillance Systems; quality characteristics; surveillance systems; reliability; security; privacy;

    Abstract : The Internet of Things (IoT) has transformed our technological landscape by seamlessly connecting devices, sensors, and systems, with surveillance systems being one of its prominent applications. These systems offer advanced monitoring, control, and analysis capabilities, enabling their deployment in diverse domains such as security, transportation, healthcare, and smart cities. READ MORE

  2. 12. Exploring User Experience and Control in IoT Environments through Assisted Reality

    University essay from Lunds universitet/Ergonomi och aerosolteknologi; Lunds universitet/Certec - Rehabiliteringsteknik och Design

    Author : Carl Rutholm; [2023]
    Keywords : Assisted Reality; Internet of Things; Smart device; Google Glass; Technology and Engineering;

    Abstract : Internet of things is a rapidly expanding area with new exciting devices being developed each year. Traditional Internet of Things devices are usually controlled through a smart phone which can be exhausting and overwhelming with multiple applications needed to monitor a set of devices. READ MORE

  3. 13. Performance Evaluation of LoRa networks for Air-to-Ground Communications

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kiana Khorsandi; Sareh Jalalizad; [2023]
    Keywords : IoT; LPWAN; LoRaWan; UAV; LAP; Bit error rate; Line of sight;

    Abstract : The current focus on the Internet of Things (IoT) has led to the emergence of many network scenarios with unlimited use cases, including smart homes, smart cities, smart agriculture, and more. Unmanned aerial vehicles (UAVs), also known as drones, have become increasingly popular due to their versatility and ability to collect and transmit data through various sensors and cameras. READ MORE

  4. 14. Third-party risks in industrial control systems: : A case study in the wind power sector

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Abdullahi Ahmed; [2023]
    Keywords : Supply chain security; Wind power; Risk management; Third-party risk management; SCADA-system; Säkerhetshantering för försörjningskedjan; Vindkraft; Riskhantering; Tredjeparts riskhantering; SCADA-system;

    Abstract : This report investigates third-party risk for SCADA systems, using Swedish wind power as an empirical case study. Supervisory, Control, and Data Acquisition (SCADA) systems are used in the wind power industry to monitor and control the operational process. The paper also proposed potential strategies for reducing third-party risks and exposures. READ MORE

  5. 15. Performance Evaluation of Different RPL Formation Strategies

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyi Chang; [2023]
    Keywords : IPv6 Routing Protocol for Low-Power and Lossy Networks RPL ; Multiple Sinks; Packet Delivery Ratio PDR ; Internet of Things; IPv6 Routing Protocol for Low-Power and Lossy Networks RPL ; Multi-Sink; Packet Delivery Ratio PDR ; Sakernas Internet;

    Abstract : The size of the IoT network is expanding due to advancements in the IoT field, leading to increased interest in the multi-sink mechanism. The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a representative IoT protocol that focuses on the Low-Power and Lossy Networks. READ MORE