Sökning: "Constrained Devices"
Visar resultat 16 - 20 av 128 uppsatser innehållade orden Constrained Devices.
16. Securing LwM2M with Mbed TLS in Contiki-NG
Magister-uppsats, Uppsala universitet/Institutionen för informationsteknologiSammanfattning : As the Internet of Things (IoT) becomes increasingly integrated into our personal lives and industries, security concerns and attacks on these devices are growing. This concern is one of the major bottlenecks for adopting IoT, as these devices can often collect sensitive information. LÄS MER
17. Using Requirement-Driven Symbolic Execution to Test Implementations of the CoAP and EDHOC Network Protocols
Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/DatalogiSammanfattning : As the number of Internet of Things devices is increasing rapidly, it is of utmost significance that the implementations of protocols for constrained devices are bug-free. In general implementations of network protocols are error-prone due to their complex nature and ambiguities in the protocol specification. LÄS MER
18. Edge Compute Offloading Strategies using Heuristic and Reinforcement Learning Techniques.
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : The emergence of 5G alongside the distributed computing paradigm called Edge computing has prompted a tremendous change in the industry through the opportunity for reducing network latency and energy consumption and providing scalability. Edge computing extends the capabilities of users’ resource-constrained devices by placing data centers at the edge of the network. LÄS MER
19. Energy Sustainable Reinforcement Learning-based Adaptive Duty-Cycling in Wireless Sensor Networks-based Internet of Things Networks
Master-uppsats, Luleå tekniska universitet/Institutionen för system- och rymdteknikSammanfattning : The Internet of Things (IoT) is widely adopted across various fields due to its flexibility and low cost. Energy-harvesting Wireless Sensor Networks (WSNs) are becoming a building block of many IoT applications and provide a perpetual source of energy to power energy-constrained IoT devices. LÄS MER
20. Decentralized Learning over Wireless Networks with Imperfect and Constrained Communication : To broadcast, or not to broadcast, that is the question!
Master-uppsats, Linköpings universitet/KommunikationssystemSammanfattning : The ever-expanding volume of data generated by network devices such as smartphones, personal computers, and sensors has significantly contributed to the remarkable advancements in artificial intelligence (AI) and machine learning (ML) algorithms. However, effectively processing and learning from this extensive data usually requires substantial computational capabilities centralized in a server. LÄS MER