Essays about: "IOT application"
Showing result 1 - 5 of 177 essays containing the words IOT application.
-
1. Control system and simplified timesynchronization for heterogenous IoT systems with medium time requirements
University essay from KTH/Hälsoinformatik och logistikAbstract : The company QTPIE conducts research on drivers and their unconscious reactions when driving. To help, they use smart devices that today must be individually handled at the start and end of a run, and have individually set timestamps, which can lead to differences between the units when data is entered and collation of the units' data after a run. READ MORE
-
2. Comparative Analysis of In-Body to Out-Body Wireless CommunicationModules: Test Design and PerformanceEvaluation
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Wireless communication for biomedical equipment is rapidly improving with the invention of new technologies. Due to the absence of cables, wireless technology is a growing area of interest for biomedical applications. As technology advances, many gadgets are becoming smaller and more portable. READ MORE
-
3. A cybersecurity audit of the Garmin Venu
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The presence of smart wearables has established itself as a norm of the 21 st century, but the state of their trustworthiness from the viewpoint of personal safety remains debatable. The information gathered by such devices has great potential for personal safety risks and must be handled safely. READ MORE
-
4. Unsupervised Online Anomaly Detection in Multivariate Time-Series
University essay from Uppsala universitet/DatorteknikAbstract : This research aims to identify a method for unsupervised online anomaly detection in multivariate time series in dynamic systems in general and on the case study of Devwards IoT-system in particular. A requirement of the solution is its explainability, online learning and low computational expense. READ MORE
-
5. Profile Based Access Control Model Using JSON Web Tokens
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE