SlideShare a Scribd company logo
Spime: Personal Assistant
995002513 Kir Chou
1
Define
 Based on IOT
 Additional

Decision-making ability

Self-learning ability

The ability of interacting with other spimes
2
Her, 2013
3
http://www.wired.com/images_blogs/design/2014/01/her5.jpg
Scenario
4
http://images.gizmag.com/hero/12313_23070942439.jpg
System structure with components
5
Cloud
Wireless Module
Sensor
Processor
Thermometer Gyro
Accelerometer Magnetometer
Luminance
meter
Manometer
Hygrometer Microphone
Speaker …etc
S
p
i
m
e
Data transfer
Others
cache
Procedural flows among components
6
Wireless Module
Because of space, energy restrictions,
⇒reduce the amount of calculation and storage
To reduce the amount of calculation
⇒Transfer data to cloud for computing and store
Cloud
1. Permanent
Connection
2. Exchange
Data
Procedural flows among components
7
Catch all possible physical data
⇒Environment situation, Biometrics, Voice…
Communication with users
⇒Voice
Sensor Voice
Procedural flows among components
8
Encrypt and decrypt data between cloud and spimes
⇒To avoid MITM or other attacks
Wireless Module
Sensor
Processor cache
Cloud
C
C
P
P
C
C
C
P
C
P
* 存非 式加密 制現 對稱 機
*Cache and store temporary data
Interact with others
9
1. After user agree
Send a special pattern to other spimes
2. Then cloud can access other spimes’ data
A B
Use case / Actions/ Operations
10
Passive: User ask question (higher privacy)
⇒Spime reply user
Active: User doesn’t ask question
⇒Spime decide whether to provide data to user or
not (Based on machine learning result)
Use case / Actions/ Operations
 Basic (higher privacy) : search

Weather data

Transportation data

Environmental recognition
 Advanced : store

Line tracing

Spime recognition(meet views, area, time)
11
SRC
SRC
Use case / Actions/ Operations
 Cloud data mining (lower privacy) : manage

Schedule reminder

Life suggestion(eat, wear, transportation)

Environmental prediction

Spime prediction

Healthy management

Early learning

Chatting

Agency identity response

Explore new demand
12
SRC
Not yet!
User interface with your preference style
 Privacy mechanism

Role: Group / Field / Friend

Service: The level of machine learning
13
http://select.cs.cmu.edu/code/graphlab/images/ppt/fig_10.gif
Why we don’t have the kind of things?
 Privacy responsibility
 Limitation of Energy
 Limitation of AI
14
*According from my startup friend.
Thank you 
15

More Related Content

More from Kir Chou (18)

PPTX
Introduction of CTF and CGC
Kir Chou
 
PPTX
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
Kir Chou
 
PPTX
GCC
Kir Chou
 
PPTX
Ch9 package & port(2013 ncu-nos_nm)
Kir Chou
 
PPTX
Ch8 file system management(2013 ncu-nos_nm)
Kir Chou
 
PPTX
Ch7 user management(2013 ncu-nos_nm)
Kir Chou
 
PPTX
Ch10 firewall(2013 ncu-nos_nm)
Kir Chou
 
PDF
Cms part2
Kir Chou
 
PDF
Cms part1
Kir Chou
 
PDF
Webapp(2014 ncucc)
Kir Chou
 
PDF
廢除雙二一議題 保留方論點 (2013ncu全幹會)
Kir Chou
 
PPTX
Ch6 ssh(2013 ncu-nos_nm)
Kir Chou
 
PPTX
Ch5 network basic(2013 ncu-nos_nm)
Kir Chou
 
PPTX
Ch4 vi editor(2013 ncu-nos_nm)
Kir Chou
 
PPTX
Ch3 basic command(2013 ncu-nos_nm)
Kir Chou
 
PPTX
Ch2 unix introduction(2013 ncu-nos_nm)
Kir Chou
 
PPTX
Ch1.b hardware & hypervisor(2013 ncu-nos_nm)
Kir Chou
 
PPTX
Ch1 computer hardware(2013 ncu-nos_nm)
Kir Chou
 
Introduction of CTF and CGC
Kir Chou
 
PyCon TW 2017 - Why do projects fail? Let's talk about the story of Sinon.PY
Kir Chou
 
Ch9 package & port(2013 ncu-nos_nm)
Kir Chou
 
Ch8 file system management(2013 ncu-nos_nm)
Kir Chou
 
Ch7 user management(2013 ncu-nos_nm)
Kir Chou
 
Ch10 firewall(2013 ncu-nos_nm)
Kir Chou
 
Cms part2
Kir Chou
 
Cms part1
Kir Chou
 
Webapp(2014 ncucc)
Kir Chou
 
廢除雙二一議題 保留方論點 (2013ncu全幹會)
Kir Chou
 
Ch6 ssh(2013 ncu-nos_nm)
Kir Chou
 
Ch5 network basic(2013 ncu-nos_nm)
Kir Chou
 
Ch4 vi editor(2013 ncu-nos_nm)
Kir Chou
 
Ch3 basic command(2013 ncu-nos_nm)
Kir Chou
 
Ch2 unix introduction(2013 ncu-nos_nm)
Kir Chou
 
Ch1.b hardware & hypervisor(2013 ncu-nos_nm)
Kir Chou
 
Ch1 computer hardware(2013 ncu-nos_nm)
Kir Chou
 

Recently uploaded (20)

PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
PDF
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
Per Axbom: The spectacular lies of maps
Nexer Digital
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PPTX
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
PPTX
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PDF
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PPTX
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
Per Axbom: The spectacular lies of maps
Nexer Digital
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
Agentic AI in Healthcare Driving the Next Wave of Digital Transformation
danielle hunter
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
How ETL Control Logic Keeps Your Pipelines Safe and Reliable.pdf
Stryv Solutions Pvt. Ltd.
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
NewMind AI Weekly Chronicles – July’25, Week III
NewMind AI
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
Ad

Spime - personal assistant

  • 2. Define  Based on IOT  Additional  Decision-making ability  Self-learning ability  The ability of interacting with other spimes 2
  • 5. System structure with components 5 Cloud Wireless Module Sensor Processor Thermometer Gyro Accelerometer Magnetometer Luminance meter Manometer Hygrometer Microphone Speaker …etc S p i m e Data transfer Others cache
  • 6. Procedural flows among components 6 Wireless Module Because of space, energy restrictions, ⇒reduce the amount of calculation and storage To reduce the amount of calculation ⇒Transfer data to cloud for computing and store Cloud 1. Permanent Connection 2. Exchange Data
  • 7. Procedural flows among components 7 Catch all possible physical data ⇒Environment situation, Biometrics, Voice… Communication with users ⇒Voice Sensor Voice
  • 8. Procedural flows among components 8 Encrypt and decrypt data between cloud and spimes ⇒To avoid MITM or other attacks Wireless Module Sensor Processor cache Cloud C C P P C C C P C P * 存非 式加密 制現 對稱 機 *Cache and store temporary data
  • 9. Interact with others 9 1. After user agree Send a special pattern to other spimes 2. Then cloud can access other spimes’ data A B
  • 10. Use case / Actions/ Operations 10 Passive: User ask question (higher privacy) ⇒Spime reply user Active: User doesn’t ask question ⇒Spime decide whether to provide data to user or not (Based on machine learning result)
  • 11. Use case / Actions/ Operations  Basic (higher privacy) : search  Weather data  Transportation data  Environmental recognition  Advanced : store  Line tracing  Spime recognition(meet views, area, time) 11 SRC SRC
  • 12. Use case / Actions/ Operations  Cloud data mining (lower privacy) : manage  Schedule reminder  Life suggestion(eat, wear, transportation)  Environmental prediction  Spime prediction  Healthy management  Early learning  Chatting  Agency identity response  Explore new demand 12 SRC Not yet!
  • 13. User interface with your preference style  Privacy mechanism  Role: Group / Field / Friend  Service: The level of machine learning 13 http://select.cs.cmu.edu/code/graphlab/images/ppt/fig_10.gif
  • 14. Why we don’t have the kind of things?  Privacy responsibility  Limitation of Energy  Limitation of AI 14 *According from my startup friend.

Editor's Notes

  • #5: <number>
  • #12: <number>