479 research outputs found

    Software design for a Smart Lock System for Home Automation

    Get PDF
    The idea that motivated this thesis work was to design a smart lock system and access control. This system was designed to control the access to a room using portable devices such as mobile phones or tablets. Its principal objective was to create a basic, but functional prototype that could be placed in a real room, and be implemented and integrated easily without much modification of the doors’ structure, yet accomplish its purpose. To achieve this goal the work was divided in two separate parts the hardware part and the software part. This thesis focuses on the Software part. All progresses made and final results were obtained after using a design, implementation and test method. Working closely and in constant feedback with the hardware part, the programs and code developed has been always tested with the hardware to ensure that the right results were obtained and required modifications were made if needed. In general, the project was carried out as follows. First the documentation process was completed and then, the devices, the coding languages and tools were selected. Next, the designing process was accomplished where the basic structure of the programs was developed and created. After that, the implementation and testing process were simultaneously done to perfect the result and obtain the best solution possible. This process was completed when the real working prototype was obtained. The device successfully connected to a self-designed smartphone app and controlled the access to the room. The prototype could be mounted on a demonstration door to show how it is supposed to work in the real application. In general, all the main goals were achieved although some rectification and improvements are still to be studied more in depth and be applied on future expansions

    Distributed Monitoring and Controlling Using Microcontroller and Virtual Internet Protocol

    Get PDF
    Nowadays, the applications based on TCP/IP (transmission control protocol/internet protocol) network are growing rapidly. By this application monitoring and control functions are easily and widely accessible through networks. Every PC (Personal Computer) can be connected to several microcontroller, but there are difficulties to access microcontroller directly through TCP/IP networks. This research study the use of virtual IP on a PC that connected with several microcontrollers, where each microcontroller is connected to a sensor device to monitoring temperature and a relay for controlling. In this method, each set of the microcontroller can be accessed directly using the IP. The results show that this system can be a distributed monitoring and controlling system which has the ability to record and display the results in the form of graphs.

    CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information

    Get PDF
    Machine learning has become mainstream across industries. Numerous examples proved the validity of it for security applications. In this work, we investigate how to reverse engineer a neural network by using only power side-channel information. To this end, we consider a multilayer perceptron as the machine learning architecture of choice and assume a non-invasive and eavesdropping attacker capable of measuring only passive side-channel leakages like power consumption, electromagnetic radiation, and reaction time. We conduct all experiments on real data and common neural net architectures in order to properly assess the applicability and extendability of those attacks. Practical results are shown on an ARM CORTEX-M3 microcontroller. Our experiments show that the side-channel attacker is capable of obtaining the following information: the activation functions used in the architecture, the number of layers and neurons in the layers, the number of output classes, and weights in the neural network. Thus, the attacker can effectively reverse engineer the network using side-channel information. Next, we show that once the attacker has the knowledge about the neural network architecture, he/she could also recover the inputs to the network with only a single-shot measurement. Finally, we discuss several mitigations one could use to thwart such attacks.Comment: 15 pages, 16 figure

    Design of in-vehicle networked control system architectures through the use of new design to cost and weight processes : innovation report

    Get PDF
    Over the last forty years, the use of electronic controls within the automotive industry has grown considerably. In-vehicle network technologies such as the Controller Area Network (CAN) and Local Interconnect Network (LIN) are used to connect Electronic Control Units (ECU) together, mainly to reduce the amount of wiring that would be required if hardwired integration were used. Modern passenger cars contain many networks, which means that for the architecture designer, there is an almost overwhelming number of choices on how to design/partition the system depending on factors such as cost, weight, availability of ECUs, safety, Electro-Magnetic Compatibility (EMC) etc. Despite the increasing role played by in-vehicle networks in automotive electrical architectures, its design could currently be described as a “black art”. Not only is there an almost overwhelming number of choices facing the designer, but there is currently a lack of a quantifiable process to aid decision making and there is a dearth of published literature available. NetGen is a software tool used to design CAN/J1939, LIN and FlexRay networks. For the product to remain competitive, it is desirable to have novel features over the competition. This report describes a body of work, the aim of which was to research in-vehicle network design processes, and to provide an improvement to such processes. The opportunities of customer projects and availability of customer information resulted in the scope of the research focusing on the adoption of LIN technology and whether the adoption of it could reduce the cost and weight of the target architecture. The research can therefore be seen to address two issues: firstly the general problem of network designers needing to design in-vehicle network based architectures balancing the needs of many design targets such as cost, weight etc, and secondly the commercial motivation to find novel features for the design tool, NetGen. The outcome of the research described in this report was the development of design processes that can be used for the selection of low cost and weight automotive electrical architectures using coarse information, such as that which would be easily available at the very beginning of a vehicle design programme. The key benefit of this is that a number of candidate networked architectures can be easily assessed for their ability to reduce cost and weight of the electrical architecture

    A tutorial guide to programming PIC18, PIC24 and ATmega microcontrollers with FlashForth

    Get PDF

    Eliminating stack overflow by abstract interpretation

    Get PDF
    ManuscriptAn important correctness criterion for software running on embedded microcontrollers is stack safety: a guarantee that the call stack does not overflow. Our first contribution is a method for statically guaranteeing stack safety of interrupt-driven embedded software using an approach based on context-sensitive dataflow analysis of object code. We have implemented a prototype stack analysis tool that targets software for Atmel AVR microcontrollers and tested it on embedded applications compiled from up to 30,000 lines of C. We experimentally validate the accuracy of the tool, which runs in under 10 sec on the largest programs that we tested. The second contribution of this paper is the development of two novel ways to reduce stack memory requirements of embedded software
    • …
    corecore