Richard CraparottaMatthew MautoneMichael Carrano Joseph SchwarzeMengting Guo Client/Envisonary: John Keating.

Slides:



Advertisements
Similar presentations
CSCI 6962: Server-side Design and Programming Input Validation and Error Handling.
Advertisements

Tutorial 8: Developing an Excel Application
Introducing new GPS based Vehicle Tracking System DG-Tracker Digilog Systems is now Nelso Technology Pvt. Ltd.
The Tail-Gate Information System Team: Paul and David Wickert Sponsor: Colorado AAA Advisor: Dr. Mark Wickert.
RADIO FREQUENCY MODULE. Introduction  An RF module is a small electronic circuit used to transmit and receive radio signals.  As the name suggests,
DeVry University Donelle Vance. GRAB - The Cross Platform iPhone, iPad & Android Phone Sharing Application August 2011.
Multi-criteria infrastructure for location-based applications Shortly known as: Localization Platform Ronen Abraham Ido Cohen Yuval Efrati Tomer Sole'
1 CMPT 371 Data Communications and Networking Spread Spectrum.
With Microsoft Access 2010 © 2011 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Access.
Using free opensource tools to conduct surveys in vulnerable communities.
Location based social networking product. Overview  Mobile Tracking System was first released in Romania in February  Currently MTS works with.
Why to Apply Digital Transmission?
William Enck, Machigar Ongtang, and Patrick McDaniel.
Entity Relationship Model Chapter 6. Basic Elements of E-R Model Entity Object of the real world that stores data. Eg. Customer, State, Project, Supplier,
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
LIUPPA – Movies Team DSM’10 – Reno/Tahoe, Nevada, USA 17 October 2010 A DSML for Mobile Applications Testing Youssef RIDENE*/**, Nicolas BELLOIR*, Franck.
Object-Oriented Design & Patterns Cay S
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. ACCESS 2007 M I C R O S O F T ® THE PROFESSIONAL APPROACH S E R I E S Lesson 4 – Creating New.
Denise Luther Senior IT Consultant Practical Technology Enablement with Enterprise Integrator.
Android SMIL Messenger Presented By: Alex Povkov Brad Gardner Jeremy Spitzig Santiago Jamriska.
In addition to Word, Excel, PowerPoint, and Access, Microsoft Office® 2013 includes additional applications, including Outlook, OneNote, and Office Web.
 A database is a collection of data that is organized so that its contents can easily be accessed, managed, and updated. What is Database?
Security.  is one of the most widely used and regarded network services  currently message contents are not secure may be inspected either.
Asymmetric-Key Cryptography Also known as public-key cryptography, performs encryption and decryption with two different algorithms. Each node announces.
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Multimedia Support for Wireless W-CDMA with Dynamic Spreading By Ju Wang Mehmet Ali Elicin And Jonathan C.L. Liu Lecture by Seth Caplan.
GEOREMINDERS ANDROID APPLICATION BY: ADRIENNE KECK.
Outline Overview Video Format Conversion Connection with An authentication Streaming media Transferring media.
12 Developing a Web Site Section 12.1 Discuss the functions of a Web site Compare and contrast style sheets Apply cascading style sheets (CSS) to a Web.
Software Architecture
NFIRS Data Entry Browser Interface (DEBI)
When buying a product in today’s marketplace, an individual is faced with the challenge of remembering an abundance of information about the product that.
NETWORK SECURITY.
William Stallings Data and Computer Communications
Human Tracking System Using DFP in Wireless Environment 3 rd - Review Batch-09 Project Guide Project Members Mrs.G.Sharmila V.Karunya ( ) AP/CSE.
IAD 2263: System Analysis and Design Chapter 7: Designing System Databases, Interfaces and Security.
Chapter 11 Enhancing an Online Form and Using Macros Microsoft Word 2013.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Electronic Mail Security Prepared by Dr. Lamiaa Elshenawy
Emergency Response System for Android Phones By: Sudhanshu Mishra.
Flowchart. a diagram of the sequence of movements or actions of people or things involved in a complex system or activity. a graphical representation.
Scheduler CSE 403 Project SDS Presentation. What is our project? We are building a web application to manage user’s time online User comes to our webpage.
Release PCR Overview OCYF Incident Management Release Date: April 25, 2009.
START Application Spencer Johnson Jonathan Barella Cohner Marker.
Quality health plans & benefits Healthier living Financial well-being Intelligent solutions Dorothy Mims & Kareen Smith-Vissey Spring 2015 E-List Tool.
Chapter Nine: Data Transmission. Introduction Binary data is transmitted by either by serial or parallel methods Data transmission over long distances.
1 Example security systems n Kerberos n Secure shell.
PRG 421 ACADEMIC PROFESSOR/TUTORIALRANK For more course Tutorials
Selection Using IF THEN ELSE CASE Introducing Loops.
Inventory system is used through almanara program to do the inventory process with more easily and flexible way for all items that are existed within.
LOGO Supervisor: Mr.Huỳnh Anh Dũng Students: Nguyễn Công Tuyến Nguyễn Cảnh Phương Phạm Thị Hằng Bùi Thị Huệ Trần Đức Bình Nguyễn.
Lecture 8 (Chapter 18) Electronic Mail Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Outline  What is MySmartEye ?  Motivation, objectives.  Implementation.  Programming techniques.  Future Work.  Demo.
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
By Dan Gotlund & Eric Acierto
System Design Ashima Wadhwa.
elp.
Chapter 5: The Art of Ensuring Integrity
Materials and Methods (Continued)
Directional Driver Hazard Advisory System
Iteration 1 Presentation
Artificial Intelligence app
Student: Ying Hong Course: Database Security Instructor: Dr. Yang
Your team The 10 COY themes.
Security Of Wireless Sensor Networks
Coding Concepts (Basics)
Chapter Nine: Data Transmission
Sensor Controller for Obstacle Detection System
Instructor Materials Chapter 5: Ensuring Integrity
TE-CRG-CE Controls and Electrical Support for cryogenics
Presentation transcript:

Richard CraparottaMatthew MautoneMichael Carrano Joseph SchwarzeMengting Guo Client/Envisonary: John Keating

RescueMe Overview Percussive Protocol RescueMe Phone Implementation Platforms and Versions RescueMe Tablet Implementation Database Security Concerns Challenges Presentation Checklist

Problem: When trapped after an earthquake there is no cell service.

RescueMe App: the Solution Solution: To change those random noises into a message, like a complex morse code.

RescueMe: How does it save your life? Allow victim to send critical information to rescuer, for example:  location  condition  number of people This is called the Percussive Protocol

How Protocol Works: Sending Encoding Pulses (will be 2, 3, 4, or 5) After the user inputs the message, the system encodes it using the Percussive Protocol. The message is now a series of pulses ranging from 2- 5.

How Protocol Works: Receiving Rescue workers are using Tablet to rescue Decoding algorithm input pulses Display message Repeat for multiple inputs The rescuer, using a seismometer or audio sensor, listens for these pulses. Then inputs them into the Tablet. As the pulses are entered the message is decoded using the Percussive Protocol.

How Protocol Encodes: "A Message" "A" " " "M" "e" "s" "s" "a" "g" "e" "A" ASCII / UNICODE / etc values Base 2 # Base 2# Apply Error correction Base 2# Base 4# 2001 If Selected: Base 4# add 2 to each Digit to get Pulse values 4223

How Protocol Decodes: " " 3,2,2,2,6,6,3,4,5,2,3,4,3,4,6,6 Grabs the first part 3,2,2,2 and Decodes Grabs the Subject partNo subject in this message Grabs the Content part 3,4,5,2,3,4,3,4 and Decodes Decoding: -2 to each pulse convert to base 2# undo error correction if necessary convert to ACSII or Unicode

RescueMe Phone: Home Send a message to rescue workers Practice receiving messages from victims Settings o Prestored messages o Sending speeds o Number of rest pulses Learn about the application

RescueMe Phone: Settings Save / Delete prestored messages Three different speed levels Five different rest pulse lengths

RescueMe Phone: Send Message No error correction Error correction with Golay and Hamming Simple message with error correction

RescueMe Phone: Compose Message Can send different types of each message

RescueMe Phone: Sending Message The victim will transmit these pulses by using a rock or some other item. Strike to send pulse Take a rest

RescueMe Phone: Receive Message Display the textual message Display the pulse sequence Buttons to input pulse Can fix the pulse input if there was an error.

Platform and Version Breakdown Send Message Receive Message Preset Messages Checklist Messages Same as Phone: o Receive Message For Rescue Teams: o Extra information fields o Sending o Date/Time o GPS location Future Work: o Database Access o Audio Sensor o Seismometer o Compass o Picture attachments

Platform and Version Relationship

RescueMe: Tablet Implementation Message Entry Message Display Rescue Information Message Central Rescuer Information Tablet Information

Rescue Central Database Concept

MUST: Message content Pulse Bursts Entered Time Pulse Burst Entered Date message received Start of message time GPS Longitude GPS Latitude Trappers location Description Option: Picture attached Voice note attached Drawing attached

Rescue Central Database Concept Further Concern: Multi-language database save space vs. convert languages

Future Security Concerns: Future iterations of this application will have the greatest security concerns.

Future Implementation Diagram: Concern 1: Concern 2: Authentication/ Concern 3: Concern 4:

Security/Privacy Concerns: Percussive Protocol Jamming Malicious entities intentionally sending percussive signals to flood the tablet receiver

Security/Privacy Concerns: Database Information Flooding Flood the database with false reports to snag it o similar to a DOS or DDOS attack Forge reports in order to direct rescue teams in certain directions o Message legitimacy

Security/Privacy Concerns: User Authentication Public key crypto o (Asymmetric) Private key crypto o (Symmetric)

Challenges Faced in Development Learning Android development platform Integrating prototypes into the Android System GUI made in JAVA Percussive Protocol Error correction algorithms Multi-language in database

Thank You!