smart tv
Recently Published Documents


TOTAL DOCUMENTS

350
(FIVE YEARS 71)

H-INDEX

11
(FIVE YEARS 3)

2022 ◽  
Vol 2146 (1) ◽  
pp. 012039
Author(s):  
Fanhua Wang ◽  
Jiangli Qu

Abstract With the advent of the information age, IOTT has been favored by many industries and has become another profound revolution in the IT industry. In such an era, the application of IOTT in IB construction can broaden the practicability of intelligent system, ORA, improve the management and service ability of IB, so as to improve people’s quality of life. This paper expounds the development status and future challenges of IOTH, and analyzes the interactive design of smart TV.


Author(s):  
Mana Saleh Al Reshan

Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices.


2021 ◽  
Vol 11 (24) ◽  
pp. 12031
Author(s):  
Michał Majchrowicz ◽  
Piotr Duch

The smart TV market is growing at an ever faster pace every year. Smart TVs are equipped with many advanced functions, allow users to search, chat, browse, share, update, and download different content. That is one of the reason why smart TVs became a target for the hacker community. In this article, we decided to test security of Tizen operating system, which is one of the most popular smart TV operating systems. Tizen is used on many different devices including smartphones, notebooks, wearables, infotainment systems, and smart TVs. By now, there are articles which present security mechanisms of Tizen OS, and sometimes with a way to bypass them; however, none of them are applicable to the smart TVs. In the article, we focused on developing an algorithm that will allow us to gain root access to the smart TV. The proposed attack scenario uses CVE-2014-1303 and CVE-2015-1805 bugs to bypass or disable security mechanisms in Tizen OS and finally gain root access.


2021 ◽  
pp. 78-79
Author(s):  
Avni KP Skandhan ◽  
Skandhan KP ◽  
Prasad BS

Our knowledge on X-rays, gamma rays and ultraviolet radiation is ionising . Non-ionising gadget radiation is from Mobile Phone, Laptop, Tablet Smart TV etc. and harmful radiations is from mobile towers . FM radio waves, Microwaves, Visible light are also other forms of non-ionizing radiation.


2021 ◽  
Vol 5 (ISS) ◽  
pp. 1-18
Author(s):  
Futian Zhang ◽  
Sachi Mizobuchi ◽  
Wei Zhou ◽  
Edward Lank

One common task when controlling smart displays is the manipulation of menu items. Given current examples of smart displays that support distant bare hand control, in this paper we explore menu item selection tasks with three different mappings of barehand movement to target selection. Through a series of experiments, we demonstrate that Positional mapping is faster than other mappings when the target is visible but requires many clutches in large targeting spaces. Rate-based mapping is, in contrast, preferred by participants due to its perceived lower effort, despite being slightly harder to learn initially. Tradeoffs in the design of target selection in smart tv displays are discussed.


2021 ◽  
pp. 31-58
Author(s):  
Mumtaz Khan ◽  
Shah Khusro ◽  
Iftikhar Alam
Keyword(s):  
The Road ◽  

2021 ◽  
pp. 165-181
Author(s):  
Chuck Easttom
Keyword(s):  

2021 ◽  
Vol 27 (1) ◽  
pp. 33
Author(s):  
Ernes Cahyo Nugroho ◽  
Erni Widarti ◽  
Neira Anjar Pujisusilo ◽  
Bayu Adi Catur
Keyword(s):  

STMIK AUB Surakarta telah memanfaatkan media website sebagai sarana penyampaian informasi. Namun dalam lingkungan internal masih menggunakan cara konvensional dengan menempel lembar pengumuman pada papan informasi yang tersedia, masih banyak informasi atau pengumuman yang harus disampaikan dengan cepat, informatif dan up to date, seperti informasi proses belajar mengajar, agenda atau kegiatan di jurusan, maupun informasi lainnya yang berhubungan dengan layanan konvensional dan statis melalui papan pengumuman. Informasi yang diberikan menggunakan lembaran yang ditempelkan di papan informasi yang tersedia. Dengan cara ini tentu akan memboroskan kertas dan biaya, karena hanya digunakan sekali saja, setelah pengumuman itu kadaluarsa, lembaran informasi tersebut tidak berguna lagi dan dapat memberikan kesan kotor pada papan bekas tempelan selembaran kertas pengumuman tersebut. Tujuan dari penelitian ini adalah menyampaikan segala informasi tentang STMIK AUB Surakarta secara menarik, informatif, dinamis, dan real time. Peneliti memberikan solusi dengan menggunakan Digital Signage sebagai papan informasi digital yang dapat menyajikan informasi secara up to date, informatif, dinamis, dan menarik. Hasil dari penelitian ini adalah perangkat Digital Signage dengan menggunakan Android TV Box sebagai media pemutar konten yang berupa gambar, video, dan text, serta LCD TV sebagai tampilan layarnya. Untuk TV yang sudah Smart TV tidak memerlukan perangkat Android TV Box. Kesimpulan penelitian ini adalah Digital Signage dapat digunakan untuk menyampaikan informasi pada STMIK AUB Surakarta. Digital Signage dapat menyampaikan informasi secara up to date, informatif, dinamis, dan menarik. Digital Signage dapat menyampaikan informasi secara real time tanpa perlu menunggu dalam jangka waktu yang lama.


2021 ◽  
Vol 23 (08) ◽  
pp. 334-343
Author(s):  
Shweta Sharma ◽  

Technologies have made a drastic change over years from mainframe computers to laptops, from telephone to cellular phone everything is changing and becoming digital. The online platform is the new way of working whether it is related to education, social gathering or business everything is going online which is easy, comfortable and consumes less time. Smart tv smartphones smartwatches that come under the category of IoT has been deployed all over the world nowadays, features like voice recognition system face detection system have become a crucial part of the most of the smart device. Nowadays it has become an essential part of our daily life but with the benefits, there is also a major concern that is increasing day by day that is cyber-attack. Security over cyberspace is a most crucial thing what user seeks for When security & machine learning both come into one picture it makes a huge impact on user’s safety. This research paper deals with the overview of machine learning and the need for machine learning in cybersecurity. I have also performed a comparison between two classifiers Naïve Bayes and decision tree by feeding the spam email dataset in the WEKA tool. The motive behind doing this classification is to check which classifier can interpret the result more accurately.


2021 ◽  
Author(s):  
Yijie Zhou ◽  
Xuewen Shen ◽  
Suiyu Zhang ◽  
Dingguo Yu ◽  
Guandong Xu
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document