76,398 research outputs found

    The Smart House Intelligent Management System : a thesis presented in partial fulfilment of the requirements for the degree of Master of Engineering in Information Engineering at Massey University

    Get PDF
    In October 2002, Massey University embarked on the Smart House Project. It was intended to be a test bed of different technologies that improve the safety and quality of life within the home. This thesis presents the design and current status of the Smart House Intelligent Management System, a management system for processing the commands received in the Massey University Smart House. There will be two parts to this Management System: an Expert System which will be responsible for the supervision of the house, its rules and its devices, as well as a conversation module which will converse with the occupant/s of the Smart House. The system will receive voice or text commands from the user as input and process the information through performing database queries about the received command, to ascertain whether it is valid. Validity is dependent on the command's adhering to house rules, which have been set by the user beforehand. This Management System will communicate with three other modules: the Bluetooth Smart Watch, the Speech Recognition/Generation System and the Ethernet Switching System, which enables access to the house devices

    NAVIGATING USER INTERFACES ON A MOBILE COMPUTING DEVICE

    Get PDF
    This publication describes systems and techniques for navigating user interfaces by moving or tapping a computing device (e.g., a smart phone, a computerized watch, computerized eyewear, laptop computer, or any other wearable or non-wearable mobile computing device). The computing device may include motion sensors (e.g., gyroscope, accelerometer, magnetometer, etc.) and/or pressure sensors (e.g., strain gauges, barometric sensors, switches, pressure plates, capacitive sensors, resistive sensors, etc.). Such sensors may detect tapping on the computing device and/or rotation of the computing device and provide the sensor data to the computing device. Using the data generated by one or more of these sensors, the computing device may determine that a user of the computing device is navigating a user interface displayed by the computing device and may move a cursor or other navigational element to different selectable user interface elements (e.g., buttons, links, text input fields, radio buttons, checkboxes, images, etc.) or may move the cursor within an editable region (e.g., a text edit region of the user interface)

    DolphinAtack: Inaudible Voice Commands

    Full text link
    Speech recognition (SR) systems such as Siri or Google Now have become an increasingly popular human-computer interaction method, and have turned various systems into voice controllable systems(VCS). Prior work on attacking VCS shows that the hidden voice commands that are incomprehensible to people can control the systems. Hidden voice commands, though hidden, are nonetheless audible. In this work, we design a completely inaudible attack, DolphinAttack, that modulates voice commands on ultrasonic carriers (e.g., f > 20 kHz) to achieve inaudibility. By leveraging the nonlinearity of the microphone circuits, the modulated low frequency audio commands can be successfully demodulated, recovered, and more importantly interpreted by the speech recognition systems. We validate DolphinAttack on popular speech recognition systems, including Siri, Google Now, Samsung S Voice, Huawei HiVoice, Cortana and Alexa. By injecting a sequence of inaudible voice commands, we show a few proof-of-concept attacks, which include activating Siri to initiate a FaceTime call on iPhone, activating Google Now to switch the phone to the airplane mode, and even manipulating the navigation system in an Audi automobile. We propose hardware and software defense solutions. We validate that it is feasible to detect DolphinAttack by classifying the audios using supported vector machine (SVM), and suggest to re-design voice controllable systems to be resilient to inaudible voice command attacks.Comment: 15 pages, 17 figure

    Software for Wearable Devices: Challenges and Opportunities

    Full text link
    Wearable devices are a new form of mobile computer system that provides exclusive and user-personalized services. Wearable devices bring new issues and challenges to computer science and technology. This paper summarizes the development process and the categories of wearable devices. In addition, we present new key issues arising in aspects of wearable devices, including operating systems, database management system, network communication protocol, application development platform, privacy and security, energy consumption, human-computer interaction, software engineering, and big data.Comment: 6 pages, 1 figure, for Compsac 201

    Pet Watch

    Get PDF
    This paper outlines our project of building Pet Watch. Pet Watch is a device similar to a Fit Bit except that it tracks your pet’s activity instead of your own. You can then access this data on our website. This paper defines our requirements, how the system works, and how we built this system
    • …
    corecore