Spelling suggestions: "subject:"remote control"" "subject:"remote coontrol""
91 |
Entwicklung eines Funkfernwirkkonzeptes mit erhöhtem SicherheitsprofilGommel, Christoph 04 December 2012 (has links) (PDF)
Die Öffnung von Toren mit Funkfernbedienungen ist bequem und daher weit verbreitet. Gäbe es eine Sicherheitslücke, die sich bei vielen Toren ausnutzen ließe, dann würde dies ein Risiko für eine Vielzahl von Personen und Gütern darstellen.
Funkfernbediente Tore gibt es schon seit vielen Jahren. Es liegt daher die Vermutung nahe, dass zumindest ältere Systeme einem Angriff mit moderner Technik nicht standhalten. Dass sich Meldungen über geknackte Funkfernbedienungen in Grenzen halten, darf hierbei kein Indiz für deren Sicherheit sein. Gerade die jüngere Vergangenheit hat gezeigt, dass Kriminelle auch hohe technische Hürden meistern. Wurde noch vor wenigen Jahren das Ausrüsten von Geldautomaten mit Skimming-Kameras oder das Manipulieren von EC-Terminals mit Spionagehardware für akademisch gehalten, sind diese Angriffsszenarien heute leider zur alltäglichen Realität geworden.
In dieser Arbeit wird die Sicherheit bestehender Funkfernbediensysteme analysiert. Aus dem Ergebnis dieser Analyse werden Anforderungen an ein besseres System abgeleitet. Schließlich wird ein Konzept und die prototypische Umsetzung einer Funkfernbedienung mit erhöhtem Sicherheitsprofil vorgestellt.
Durch die Kombination preiswert verfügbarer elektronischer Komponenten und erprobter Verschlüsselungsalgorithmen wird ein abgesichertes System vorgestellt, dass bei gleichem Nutzungskomfort wie bestehende Systeme deutlich erhöhte Sicherheit gegen unbefugten Zugang bietet.
Die Arbeit führt zunächst in die Grundlagen der verwendeten Funk- und Kryptografieverfahren ein. Im anschließenden Kapitel werden exemplarisch verschiedenartige Systeme hinsichtlich ihrer Sicherheit analysiert.
Aus den analysierten Stärken und Schwächen werden die Anforderungen an ein neues System abgeleitet. Es wird ein konkretes Konzept für ein neues System vorgestellt. Das darauf folgende Kapitel beschreibt die praktische Umsetzung des zuvor erarbeiteten Konzepts in Form eines Prototyps.
Die Arbeit schließt mit einem Fazit zur Sicherheit bestehender Systeme und des neu konzeptionierten Systems. Es werden weitere Verwendungsmöglichkeiten vorgestellt und schließlich die Praxistauglichkeit und Serienüberführbarkeit dargelegt.
|
92 |
Controlling a Passive Haptic Master During Bilateral TeleoperationBlack, Benjamin Andrew 27 August 2007 (has links)
Haptic devices allow a human to interact physically with a remote or virtual environment by providing tactile feedback to the user. In general haptic devices can be classified in two groups according to the energetic nature of their actuators. Devices using electric motors, pneumatic or hydraulic cylinders or other similar actuators that can add energy to the system are considered "active." Devices using brakes, clutches or other passive actuators are considered "passive" haptic devices. The research presented here focuses on the use of passive haptic devices used during teleoperation, the remote control of a "slave" device by the haptic "master" device. An actuation scheme as well as three different control methods is developed for providing the user with haptic feedback. As a final step, the effectiveness of the controllers is compared to that of a commercially available active haptic device. Twenty subjects provide data that shows the usefulness of the passive device in three typical teleoperation tasks.
|
93 |
Mobile phone based remote monitoring systemLiu, Danyi January 2008 (has links)
This thesis investigates embedded databases and graphical interfaces for the MicroBaseJ project. The project aim is the development of an integrated database and GUI user interface for a typical 3G, or 2.5G, mobile phone with Java MIDP2 capability. This includes methods for data acquisition, mobile data and information communication, data management, and remote user interface. Support of phone delivered informatics will require integrated server and networking infrastructure research and development to support effective and timely delivery of data for incorporation in mobile device-based informatics applications. A key research and development (R&D) challenge is to support effective and timely delivery of data for incorporation in mobile device-based informatics applications. Another important aspect of the project is determining how to develop efficient graphics for the small mobile screen. The research investigates and analyses the architecture of a mobile monitoring system. The project developed a generic solution that can be implemented in a number of commercial sectors, such as horticulture, building management and pollution/water management. The developed concept is tested using data relevant to the horticultural area of application. The system also addresses the main issues related to mobile monitoring, including real-time response, data integrity, solution cost, graphical presentation, and persistent storage capabilities of modern mobile devices. Four embedded databases based on J2ME have been investigated. Two of the four have been evaluated and analysed. The Insert function, Sequence Search, and Random Search of Perst List and RMS (Record Management System) databases have been tested. The size of the processed data was limited to 20,000 records when using the wireless toolkit simulator, and 11,000 records when using a mobile phone. Perst Lite reflects good performance and has out-performed RMS in all tests. User interface software such as J2ME Polish for mobile phones has been investigated. Custom J2ME class for graphical interface is developed. This provides the graphical presentation of the data collected from the sensors; including temperature, wind speed, wind direction, moisture, and leaf wetness. The graphical interface, bar charts, and line charts with trace ball for collected data have been designed and implemented. The embedded database performance and project performance have been investigated and analysed. The performances of Perst Lite and RMS are evaluated in terms of the insert, sequence search, and random search functions based on simulation and real devices. The record numbers vary from 1,000 to 20,000. The project performance contains data receiving and storage, and data presentation and configuration. The performance of data storage and configuration can be negated due to the running mode and the response time. Thus, data presenting performance is the key focus in this project. This performance was divided into the categories of initial, data search, data selection, and charting. The initial performance includes the initialisation of the project parameters, and the reaching of the welcome interface. Data search performance refers to the retrieval of the specified data from the embedded database, measured on 48 data points, which only can be presented on the mobile screen from the retrieved data. These four performance types are measured in thousands of record numbers, varying from 1,000 to 18,000 record numbers, with the retrieved data range varying from 1 day to 30 days.
|
94 |
Commande sans contact d'éclairage opératoire par méthodes de vision informatique / Non-contact remote control of surgical lighting devices by computer vision meansCollumeau, Jean-François 31 January 2014 (has links)
De nos jours, le maintien de l'asepsie dans la salle d'opération est vital pour la limitation de la transmission d'infections nosocomiales au patient lors de l'opération. Des mesures d'asepsie drastiques ont pour but de préserver la zone stérile de tout agent infectieux.Elles interdisent actuellement au chirurgien d'interagir avec les équipements non-stériles du bloc.Le chirurgien opérant souhaiterait cependant disposer d'un contrôle direct sur certains équipements spécifiques du bloc dans des situations données sans enfreindre ces mesures.Les travaux présentés dans cette thèse concernent le développement d'une Interface Homme-Machine permettant la commande gestuelle sans contact, et donc sans transmission d'agents infectieux, de tels équipements.Dans la continuité des travaux existants dans la littérature, une chaîne de traitement basée sur des techniques de vision informatique et un prototype de caméra portée par l'utilisateur ont ainsi été développés pour atteindre ces objectifs. Ce document présente les études comparatives menées sur des algorithmes issus de la littérature afin de sélectionner les plus aptes à être employés dans la chaîne logicielle. Un descripteur géométrique dédié aux mains est introduit, et des approches coopératives sont investiguées sur les étapes de localisation de la main et de classification de la posture prise.Les performances de la chaîne de traitement ainsi créée sont évaluées dans différentes situations à l'aide de bases d'images et de vidéos extensives acquises dans des conditions proches de celles du bloc opératoire, ainsi que sur des images synthétiques réalisées sur un modèle virtuel de main créé ad hoc.Un démonstrateur composé de la chaîne de traitement développée et d'un prototype de caméra frontale permet, associé à une simulation de bras-support d'éclairage opératoire, d'illustrer les possibilités ouvertes par le système développé au cours de cette thèse. / Asepsis preservation in operating rooms is nowadays compulsory for avoiding the spread of hospital-acquired diseases to patients during surgeries. Drastic asepsis measures aim at preserving the sterile area of the operating room from infective agents.These measures forbid surgeons from interacting with non-sterile devices. Surgeons wish nonetheless having direct control over some of these devices.The works presented in this thesis relate to the development of a Human-Computer Interface enabling remote, hence without transmission of infective agents, non-contact control over such devices.Following on from previous authors' works in the literature, an image processing chain based on computer vision techniques and a wearable camera prototype have been developed in order to achieve these goals.This document presents the comparative studies led with algorithms issued from the literature with the aim of selecting the most suitable for using in the processing chain. A dedicated geometry-based hand descriptor is introduced, and cooperative approaches are investigated in relation with the hand localization and posture classification steps.The performance achieved by the processing chain in various situations are quantified using extensive picture and video databases acquired in conditions close to those of the operating room. Synthetic pictures created using an ad hoc virtual model of the hand are used as well for this evaluation.A demonstrator composed of the developed processing chain, a wearable camera prototype and a surgical lighting arm simulator enables the illustration of the possiblities offered by the system developed during this thesis.
|
95 |
Desenvolvimento de um Sistema de Controle Remoto para Acionamento e monitoramento de Processos Químicos - CRAPQ / Development of a Remote Control system for operating and monitoring of Chemical Processes - CRAPQAlmeida, Ricardo Augusto de, 1972- 16 August 2018 (has links)
Orientador: Flávio Vasconcelos da Silva / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Química / Made available in DSpace on 2018-08-16T03:20:18Z (GMT). No. of bitstreams: 1
Almeida_RicardoAugustode_M.pdf: 4233077 bytes, checksum: 4cbc9345951c62a11dce6c45577964a5 (MD5)
Previous issue date: 2010 / Resumo: Os equipamentos e aparelhos contemporâneos utilizados em diversas aplicações do cotidiano doméstico e industrial agregam tecnologia suficiente para serem acionados a distância por diversos meios físicos de comunicação. Estes meios físicos evoluíram de um simples aparelho televisor acionado via luz infra-vermelha, até um braço robótico controlado pela Estação Internacional Espacial via sinais digitais por micro-ondas (KAUDERER, 2007). Seguindo esta tendência, as indústrias químicas, petroquímicas e bioquímicas têm instalado diversos equipamentos e instrumentos que podem ser controlados remotamente (SMAR, 2004). Atualmente é de suma importância que o monitoramento e controle de plantas químicas e processos de manufatura possam ser realizados a distância. Portanto o controle e o monitoramento remoto são imprescindíveis em locais de risco a saúde do homem, ou mesmo em locais de difícil acesso a dispositivos e instrumentos. Com a predominância dos computadores pessoais (PC) em aplicações industriais pode-se atribuir maior abrangência ao controle de processos computadorizados, facilitando a implementação de sistemas de acionamento remoto via redes de comunicações digitais. Este trabalho teve como principal objetivo, desenvolver um projeto capaz de administrar e acionar a distância algoritmos científicos e industriais através de Redes Virtuais Privadas (VPN). Os programas acessados pelas VPN's desenvolvem ambientes para Supervisão e Interface Homem Máquina (IHM), na área de pesquisa para controle de processos químicos e biotecnológicos. No ambiente de desenvolvimento tipo Controle de Supervisório e Aquisição de Dados (SCADA), foram desenvolvidas as aplicações para a supervisão de três processos químicos, um reator de precipitação da bromelina do abacaxi, um reator de biodiesel e um sistema de refrigeração, no Laboratório de Controle e Automação de Processos (LCAP/FEQ/UNICAMP). O desenvolvimento de um sistema remoto composto de três Servidores de VPN's, um Servidor de Internet Seguro resultaram num Ambiente Virtual de interação remota que propiciou interoperabilidade dos três experimentos no LCAP, de modo que novos experimentos possam ser agregados futuramente ao sistema com segurança e simplicidade / Abstract: Apparatus used in many contemporary applications of everyday in household and industry, got enough technology to be implement remote control actions and remote monitoring by diverse physical means of communications. Those physical means of communications were evoluting, starting of a simple TV apparatus controlled by infrared LED until a robot arm controlled by International Space Station by exchange digital communication microwave signal way (KAUDERER, 2007). The Chemical Industry, Oil Refinery Industry and Biochemical Industry are following this tendency because the remote monitoring and control remote of chemical plants are very principal where there danger the human heath's or local of difficult access by devices and instruments. In this context, currently industries made installing of many remote devices controlled (SMAR, 2004). With the major difusion of personal computers (PC) at industry applications there were a bigger abrangency at controll of process computed, who collaborating to easily implement the actioning by means remote networks of digital communications. The goal of this work was developing a project whose enabled management and the actioning of scientific computing algoritms and of algoritms of industry applications, by the means Virtual Private Networks (VPN). The access by VPN in development programs of Human Interface Machine (HIM) and Supervisory was made in area of control process chemical and biochemical. In this ambient of building the supervisory control and data acquisition (SCADA) the remote monitoring and the remote supervisory was use to of three apparatus, who are: a biodiesel reactor, a refrigeration system and a bromelin precipitation reactor. Those three apparatus were installed at Laboratory Control Automation of Chemicals Process (LCAP/FEQ/UNICAMP). The project was compost by three Servers of VPN and one Server secure of Internet, maintaining interoperability between apparatus with same or similar interactivity at of local user in SCADA systems installed's LCAP. In the future more apparatus can to be installed in project with security and simplicity / Mestrado / Sistemas de Processos Quimicos e Informatica / Mestre em Engenharia Química
|
96 |
Smart coffee maker / Smart kaffebryggareNi, Houbo January 2017 (has links)
Nowadays, more and more people drink coffee not only from Starbucks or other shops, but also brew coffee from coffee maker which with proper sizes which they can be put in the resting room of companies or homes. The products of coffee maker polarize in the market. Some of them have powerful functions and nice tastes with high prices. The others are simple, cheap but losing enjoyment of drinking coffee and people need to keep an eye on status of coffee maker. Most of people prefer the cheaper type. But more functions will take more convenience. Actually users can have them both. In this thesis, I design some functions based on the cheap type of coffee maker which will make drinking coffee more convenient and enjoyable. I use Arduino Uno as my control system, cooperating with sensors and special circuits. My system monitor working time of coffee maker, temperature of coffee and water level of both coffee pot and tank in the coffee maker. Then users can receive these values from their cell phone and doing remote control. Meanwhile considering about prices, I choose the most suitable sensors for measurement. I also do some jobs for saving energy and safe. The system locks or turns off the switch automatically for them. At last, all the sensors, wires and control chip are put in good positions in the maker.
|
97 |
Přístupový systém založený na protokolu ACP / Access Control System Based on ACP ProtocolJedlička, Zdeněk January 2012 (has links)
Work is focused on the possibility of implementation of ACP into applications for mobile devices using the Android operating system ogether with the implementation of this Protocol in the hardware device. Communication is based on standard TCP / IP and UDP protocol.
|
98 |
A Decentralized and Remote Controlled Webinar Approach, Utilizing Client-side Capabilities: To Increase Participant Limits and Reduce Operating CostsMeissner, Roy, Junghanns, Kurt, Martin, Michael 09 November 2018 (has links)
We present a concept and implementation on increasing the efficiency of webinar software by a remote control approach using the technology WebRTC. This technology enables strong security and privacy, is crossdevice usable, uses open-source technology and enables a new level of interactiveness to webinars. We used SlideWiki, WebRTC, and browser speech to text engines to provide innovative accessibility features like multilingual presentations and live subtitles. Our solution was rated for real world usage aspects, tested within the SlideWiki project and we determined technological limits. Such measurements are currently not available and show that our approach outperforms open-source market competitors by efficiency and costs.
|
99 |
Modulär och distribuerad arkitektur för styrning och avläsning av heterogen apparatur i flerklientmiljö / Modular and distributed architecture for control and measurement of heterogenous apparatus in a multi-client environmentStansvik, Elvis January 2015 (has links)
Följande projektrapport beskriver arbetet med att ta fram ett modulärt distribuerat system för fjärrstyrning och -avläsning av hårdvaruenheter i en apparat för mineralanalys. Resultatet visar hur ett sådant system med fördel kan byggas på fjärranrop, publiceringar och prenumerationer med hjälp av ett externt ramverk. Delar av systemet har testkörts mot målhårdvaran. Resterande delar har testats mot simulatorer. Systemet är flexibelt, med en stark separation mellan dess komponenter, och dess utökningsbarhet har verifierats kvalitativt. / The following report describes the design and development of a modular distributed system for remote control and measurement of hardware devices in a machine for mineral analysis. The result shows how such a system can be built on remote procedures, publications and subscriptions using an external framework. Parts of the system has been tested on the target machine. Remaining parts have been tested through simulation. The system is flexible, with a strong separation between components, and its extensibility has been verified qualitatively.
|
100 |
Relay-attacker : Utnyttjande av trådlösa bilnycklarMarklind, Anton, Marklind, Simon January 2019 (has links)
Bilen är en av de saker som många människor använder dagligenoch för att underlätta användandet kommer det hela tiden nya funk-tioner som underlättar användandet. Ett exempel är trådlösa nycklar.Många moderna bilar använder en teknik som kallas för “keyless” vilketinnebär att bilnycklarna under intervaller sänder ut radiosignaler. Detger en möjlighet att inte behöva hålla i nyckeln när bilen ska användasoch bilägaren har det lättare att öppna bilen och lasta in saker, utanatt aktivt behöva använda nycklen.Men är det tillräckligt säkert med helt trådlösa nycklar? Signaler-na är öppen för alla som kan avlyssna dem. Signalerna mellan bil ochnyckel skickas trådlöst och obehöriga kan lyssna av innehållet. I dettaprojekt undersöker vi möjligheten att spela in signalen och därefterspela upp den igen i syfte att låsa upp en bil, utan tillgång till denverkliga nyckeln. Vi utför experiment på X fordon, med olika nycklaroch olika signalfrekvenser. Om det är öppet för alla borde det ock-så gå att spela in dessa signaler och sända ut dem med hjälp utaven radiosändare. Det kallas för en relay-attack och där kommer syftetmed detta arbete, nämligen en studie om hur attackerna går till ochhur enkelt det egentligen är att göra dem själva. Samt att ett experi-ment utförs på en mängd olika bilar med olika typer av bilnycklar medvarierande frekvenser. / On a daily basis the car is frequently used, and a lot of people arein need of their cars. New technologies are developed to make it easierfor car owners to unlock the car and drive away without making theeffort of using the car keys. A technology called “keyless” car keys areimplemented in modern cars, the car keys sends out radio frequenciesin an interval on a couple of seconds.But is a complete wireless key system secure enough? The radiosignals are open to whoever wants to listen to them, and that couldhave devastating consequences. If it is open to everyone, then it shouldalso be possible to record these signals and send them out using a radiotransmitter. It’s called a relay attack and the purpose of this report isto get broader perspective of how an attack like that works and howeasy it is to execute the attack. The experiment was performed ondifferent types of cars and their keys with varying frequencies.
|
Page generated in 0.082 seconds