Essays about: "IoT"

Showing result 41 - 45 of 920 essays containing the word IoT.

  1. 41. Performance Evaluation of Different RPL Formation Strategies

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Ziyi Chang; [2023]
    Keywords : IPv6 Routing Protocol for Low-Power and Lossy Networks RPL ; Multiple Sinks; Packet Delivery Ratio PDR ; Internet of Things; IPv6 Routing Protocol for Low-Power and Lossy Networks RPL ; Multi-Sink; Packet Delivery Ratio PDR ; Sakernas Internet;

    Abstract : The size of the IoT network is expanding due to advancements in the IoT field, leading to increased interest in the multi-sink mechanism. The IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL) is a representative IoT protocol that focuses on the Low-Power and Lossy Networks. READ MORE

  2. 42. A Low Noise Digitally Controlled Oscillator for a Wi-Fi 6 All-Digital PLL

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tommy Lundberg; [2023]
    Keywords : Digitally Controlled Oscillator; All-Digital Phase Locked Loop; Oscillator; Low Phase Noise; Class-C oscillator; Dual-Core; Dynamic BiasingCircuit; Digitalt Styrd Oscillator; Digital PLL; Lågt Fasbrus; Klass-C Oscillator; Dubbelkärnig; Dynamisk Bias-Krets;

    Abstract : Following the rise of Internet of Things (IoT), or just the technological advancements and expectations in a world where the things are or will be connected, new demands are put on Integrated Circuit (IC) for wireless connectivity. The use cases seem endless; smart home, healthcare, entertainment, and science are all areas that can benefit from connectivity of low power electronics. READ MORE

  3. 43. Autonomous Navigation in Partially-Known Environment using Nano Drones with AI-based Obstacle Avoidance : A Vision-based Reactive Planning Approach for Autonomous Navigation of Nano Drones

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Mattia Sartori; [2023]
    Keywords : Nano Drones; Obstacle Avoidance; Autonomous Exploration; Autonomous Surveillance; Resource-Constrained Drones; Safe Navigation; Reactive Planning; Vision-based Navigation; Nanodrönare; Undvikande av Hinder; Autonom Utforskning; Autonom Övervakning; Resursbegränsade Drönare; Säker Navigering; Reaktiv Planering; Visionsbaserad Navigering;

    Abstract : The adoption of small-size Unmanned Aerial Vehicles (UAVs) in the commercial and professional sectors is rapidly growing. The miniaturisation of sensors and processors, the advancements in connected edge intelligence and the exponential interest in Artificial Intelligence (AI) are boosting the affirmation of autonomous nano-size drones in the Internet of Things (IoT) ecosystem. READ MORE

  4. 44. Observability in Machine Learning based Intrusion Detection Systems for RPL-based IoT

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Malin Strand; [2023]
    Keywords : ;

    Abstract : As IoT devices become more and more present in our daily lives, security in IoT networks has become a major concern. A promising approach for detecting attacks is the use of machine learning based Intrusion Detection Systems (IDSs). The attack studied in this thesis is the blackhole attack, an attack causing parts of the network to disconnect. READ MORE

  5. 45. Penetration testing of Sesame Smart door lock

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Shuyuan Liu; [2023]
    Keywords : IoT; Smart door lock; State consistency; MITM attack; Replay attack; Reverse engineering; GPS spoofing; DoS attack; IoT; smart dörrlås; tillståndskonsistens; MITM-attack; Replay-attack; Reverse engineering; GPS-spoofing; DoS attack;

    Abstract : The Internet of things (IoT) device has been widely used in various fields, and its market is expanding rapidly. However, the growing usage of IoT devices also brings more security concerns. The smart door lock is one of the smart home IoT devices that need to be designed securely. READ MORE