• Title/Summary/Keyword: Smart Controls

Search Result 190, Processing Time 0.025 seconds

Proposal of Hostile Command Attack Method Using Audible Frequency Band for Smart Speaker (스마트 스피커 대상 가청 주파수 대역을 활용한 적대적 명령어 공격 방법 제안)

  • Park, Tae-jun;Moon, Jongsub
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.1-9
    • /
    • 2022
  • Recently, the functions of smart speakers have diversified, and the penetration rate of smart speakers is increasing. As it becomes more widespread, various techniques have been proposed to cause anomalous behavior against smart speakers. Dolphin Attack, which causes anomalous behavior against the Voice Controllable System (VCS) during various attacks, is a representative method. With this method, a third party controls VCS using ultrasonic band (f>20kHz) without the user's recognition. However, since the method uses the ultrasonic band, it is necessary to install an ultrasonic speaker or an ultrasonic dedicated device which is capable of outputting an ultrasonic signal. In this paper, a smart speaker is controlled by generating an audio signal modulated at a frequency (18 to 20) which is difficult for a person to hear although it is in the human audible frequency band without installing an additional device, that is, an ultrasonic device. As a result with the method proposed in this paper, while humans could not recognize voice commands even in the audible band, it was possible to control the smart speaker with a probability of 82 to 96%.

MCU Module Design for Smart Farm Sensor Processing (스마트팜 센서 처리용 MCU 모듈 설계)

  • Kim, Gwan-hyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.285-286
    • /
    • 2021
  • With the recent development of Internet of Things (IoT) technology, smartization technology is expanding to the fields of agriculture, livestock, and fisheries, and smartization is in progress. In this smart technology, the most important thing is how to measure the data in the field and transmit it to the management system. Currently, the sensors used in the construction of smart farms and other livestock houses and farms are measuring and monitoring smart farms and other environmental conditions through various sensors such as temperature, humidity, CO gas, CO2, hydrogen, and O2. The communication method between these sensors and the HMI (Human Machine Interface) module that controls and manages the smart farm is still mainly using the RS-485-based modbus-RTU method. In this paper, we intend to design the MCU module for HMI so that various sensor modules can be connected to manage data through the RS-485-based Modbus method so that the sensor data required for smart farm construction can be managed by the HMI module.

  • PDF

Indoor Surveillance Camera based Human Centric Lighting Control for Smart Building Lighting Management

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Lee, Min Woo;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.207-212
    • /
    • 2020
  • The human centric lighting (HCL) control is a major focus point of the smart lighting system design to provide energy efficient and people mood rhythmic motivation lighting in smart buildings. This paper proposes the HCL control using indoor surveillance camera to improve the human motivation and well-beings in the indoor environments like residential and industrial buildings. In this proposed approach, the indoor surveillance camera video streams are used to predict the day lights and occupancy, occupancy specific emotional features predictions using the advanced computer vision techniques, and this human centric features are transmitted to the smart building light management system. The smart building light management system connected with internet of things (IoT) featured lighting devices and controls the light illumination of the objective human specific lighting devices. The proposed concept experimental model implemented using RGB LED lighting devices connected with IoT features open-source controller in the network along with networked video surveillance solution. The experiment results are verified with custom made automatic lighting control demon application integrated with OpenCV framework based computer vision methods to predict the human centric features and based on the estimated features the lighting illumination level and colors are controlled automatically. The experiment results received from the demon system are analyzed and used for the real-time development of a lighting system control strategy.

Study on the Camera Image Frame's Comparison for Authenticating Smart Phone Users (스마트폰 사용자 인증을 위한 카메라 영상 프레임 비교에 관한 연구)

  • Jang, Eun-Gyeom;Nam, Seok-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.155-164
    • /
    • 2011
  • APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposures of smart phones cause loss of assets including leaks of official/private information by outsiders. Though secret keys, pattern recognition technologies, and single image authentication techniques are being applied as protective methods, but they have problems in that accesses are possible by utilizing static key values or images like pictures. Therefore, this study proposes a face authentication technology for protecting smart phones from these dangerous factors and problems. The proposed technology authenticates users by extracting key frames of user's facial images by real time, and also controls accesses to the smart phone. Authentication information is composed of multiple key frames, and the user' access is controlled by distinction algorism of similarity utilizing DC values of image's pixel and luminance.

Public bicycle system using smart phone (스마트폰을 이용한 공용 자전거 시스템)

  • Kim, Jeong-Muk;Kim, Ji-In;Kim, Jeong-Sig;Kwon, Goo-Rak
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.6
    • /
    • pp.727-731
    • /
    • 2014
  • Nowadays, most people have been using a bicycle as a transportation or exercise. The bicycle is so indispensable to the public means of transportation. The demand of the bicycle is increasing since one is becoming advancement more and more. We propose a smart bicycle that can controls the individual parts of the bicycle by smart phone. This paper verifies and validates the problem and the advanced direction after confirming the smart phone's public bicycle to learn about market trends and the analysis of future prospects. Based on the analyzed contents of the problem and improving the direction, we implement public bicycle system with smart bicycle. The implementation of the proposed method shows the available and the effective system with the promote public health by cycling and contributing to the domestic bicycle industry.

A Deep Belief Network for Electricity Utilisation Feature Analysis of Air Conditioners Using a Smart IoT Platform

  • Song, Wei;Feng, Ning;Tian, Yifei;Fong, Simon;Cho, Kyungeun
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.162-175
    • /
    • 2018
  • Currently, electricity consumption and feedback mechanisms are being widely researched in Internet of Things (IoT) areas to realise power consumption monitoring and management through the remote control of appliances. This paper aims to develop a smart electricity utilisation IoT platform with a deep belief network for electricity utilisation feature modelling. In the end node of electricity utilisation, a smart monitoring and control module is developed for automatically operating air conditioners with a gateway, which connects and controls the appliances through an embedded ZigBee solution. To collect electricity consumption data, a programmable smart IoT gateway is developed to connect an IoT cloud server of smart electricity utilisation via the Internet and report the operational parameters and working states. The cloud platform manages the behaviour planning functions of the energy-saving strategies based on the power consumption features analysed by a deep belief network algorithm, which enables the automatic classification of the electricity utilisation situation. Besides increasing the user's comfort and improving the user's experience, the established feature models provide reliable information and effective control suggestions for power reduction by refining the air conditioner operation habits of each house. In addition, several data visualisation technologies are utilised to present the power consumption datasets intuitively.

The Smart Contract based Conference Key Distribution Scheme (스마트계약 기반 회의용 키 분배 기법)

  • Yun, Sunghyun
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.1-6
    • /
    • 2020
  • Recently, epidemic of covid-19 causes rapid increase in demand for untact video conferences. In existing server-client based video conference systems such as Zoom, Google Meet, etc., the server generates the conference key and controls the access rights of meeting members and their contents with it. In this case, the server can fabricate or repudiate the meeting. So, the privacy of the meeting members is not guaranteed. It's necessary to make the conference key distribution scheme where all participants can verify the trustfulness without help of the server. The smart contract is the program stored to the blockchain. Its contents cannot be altered due to the property of the blockchain, and everybody can verify the execution results of it. In this study, we propose the smart contract based conference key distribution scheme. The proposed scheme is consisted of smart contract deployment, conference key generation and verification stages. The smart contract replaces the role of existing trustful server and the meeting members can generate the conference key according to the protocols implemented on it. The proposed scheme can be applied to the video conference systems and only the meeting members can access the conference key.

Implementation of Smart Home System based on AWS IoT and MQTT (AWS IoT 와 MQTT 기반 스마트 홈 시스템 구현)

  • Jung, Inhwan;Hwang, Kitae;Lee, Jae-Moon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.7-12
    • /
    • 2022
  • This paper introduces the implementation of the AWS IoT service and MQTT based smart home system. The smart home system implemented in this study can monitor temperature and humidity, and can manually adjust the air conditioner heating, and can check the visitors with the camera and remotely control the door lock. The implemented smart home system controls door locks, heating and air conditioners using Arduino, and manages the collected data and control information using the AWS IoT service. In this study, the Android app has been developed to allow users to control IoT devices remotely, and the MQTT protocol was used for data communication and control between the app and the AWS IoT server and Arduino. The implemented smart home system has been implemented based on AWS IoT service, which has scalability to add sensors and devices.

A Study on the Causes of Security Vulnerability in 'Wall Pads' ('월패드'의 보안 취약 원인에 관한 고찰)

  • Kim Sang Choon;Jeon Jeong Hoon
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.59-66
    • /
    • 2022
  • Recently, smart home technology has been developed with a great response due to the convenience of home automation. Smart home technology provides various services by connecting various Internet of Things (IoT) and sensors to a home network through wired/wireless networks. In addition, the smart home service easily and conveniently controls lighting, energy, environment, and door cameras through a wall pad. However, while it has become a social issue due to the recent hacking accident of wall pads, personal information leakage and privacy infringement are expected. Accordingly, it is necessary to prepare preventive and countermeasures against security vulnerability factors of wall pads. Therefore, this study expects that it can be used as basic data for future smart home application and response technology development by examining the weak causes and countermeasures related to wall pads.

Investigating Cursor Control Types for Text Entry on Smartphones (스마트폰에서의 텍스트 입력을 위한 커서 조작 방식 연구)

  • Ahn, Junyoung;Kim, Kyungdoh
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.42 no.5
    • /
    • pp.352-359
    • /
    • 2016
  • The soft keyboard with touch interaction is universally available on mobile phone, a variety of previous studies with respect to the soft keyboard on smart devices had been conducted. However, previous studies of cursor control for text entry on smart devices such as smartphone did not performed. In this study, we compared three types of cursor controls (Default, 3D touch, Slide) in smartphone using Fitts' law and C-D ratio. Then we performed a laboratory experiment with three cursor control types and evaluated using cursor movement time as a quantitative evaluation and 8 subjective metrics for usability as a qualitative evaluation. Then, we discussed what types of cursor control showed better performance and subjective satisfaction through their results. From these results, this study recommended the design guidelines for cursor control on smartphones and developed its study methods as our contributions.