Essays about: "industrial internet of things"

Showing result 21 - 25 of 145 essays containing the words industrial internet of things.

  1. 21. Carbon Footprint of an Internet Service Provider : Exploring the carbon reduction potentials of a residential router applying EcoDesign

    University essay from KTH/Hållbar utveckling, miljövetenskap och teknik

    Author : Moritz Tjard Kübler; [2022]
    Keywords : ICT industry; carbon footprint; EcoDesign; GHG emissions; IKT-industrin; koldioxidavtryck; ekodesign; växthusgasutsläpp;

    Abstract : Global Warming is accelerated by human activity since the industrial revolution. We are currently experiencing the 4th industrial revolution with recent breakthroughs and rapid developments in digitalization, Industry 4.0 and Internet of Things (IoT). READ MORE

  2. 22. Comparison between consensus algorithms in an IIoT network : Analysis of Proof of Work, Proof of Stake and Proof of Authentication

    University essay from KTH/Hälsoinformatik och logistik

    Author : Baran Polat; Ilyas Göcmenoglu; [2022]
    Keywords : Proof of work; Proof of stake; IIoT; Proof of authentication; Blockchain; CloudRail; electricity consumption; time effectiveness; security; Proof of work; Proof of stake; IIoT; Proof of authentication; Blockkedja; CloudRail; elkonsumtion; tidseffektivitet; säkerhet;

    Abstract : The Industrial Internet of Things (IIoT) is growing day by day and is implemented in many industries. The centralized architecture of an IIoT system is composed of several devices that communicate with a special device only via one link, in an instance where this one link is attacked, major problems could occur for the whole system. READ MORE

  3. 23. 2D Orientation Estimation Using Machine Learning With Multiple 5G Base Stations

    University essay from Linköpings universitet/Reglerteknik; Linköpings universitet/Tekniska fakulteten

    Author : Jianxin Qu; Nikil Johny Kunnappallil; [2022]
    Keywords : ;

    Abstract : Localization of mobile devices has implications on a multitude of use cases such as estimating the location of the user originating an emergency call, localization of devices to enable autonomous operation required by industrial Internet of Things (IoT) use cases, etc. In futuristic use cases such as Augmented Reality (AR), Virtual Reality (VR), Extended Reality (XR), autonomous navigation of Unmanned Aerial Vehicles (UAVs), we will require the capability of estimating orientation in addition to position of such devices for efficient and effective provisioning of these services to the end-users. READ MORE

  4. 24. Wireless Model-Controlled Robotic Arm via IoT : Controlling a robotic arm with a model arm via the Internet of Things

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Mattis Druschke; Karl Voigt; [2022]
    Keywords : IoT; robotic arm; mechatronics; Raspberry Pi; microcontroller; IoT; robotarm; mekatronik; Raspberry Pi; mikrokontroller;

    Abstract : As the Internet of Things (IoT) is revolutionising and digitalising industry and the need for remote connectivity is increasing, there is an opportunity for new solutions for remotely controlled industrial equipment. One possible way of controlling industrial robot arms is by using a universal model arm input device of a different scale. READ MORE

  5. 25. Vulnerability assessment of IoT-based Smart Lighting Systems

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Saram Zafar; [2022]
    Keywords : ;

    Abstract : This study addresses the significant gap in literature regarding the security risks of smart lighting systems integrated within the Internet of Things (IoT) in commercial-industrial buildings. Utilizing the OCTAVE Allegro methodol-ogy(Caralli, Stevens, Young, & Wilson, 2007), a thorough risk assessment was performed, focusing on four main information assets: sensor data, sensors and their controllers, the centralized control server data of the Smart Lighting Sys-tems (SLS), and device identifiers and authentication credentials. READ MORE