GROUP ONE ANIRUDH RAWAT | BRYANT DONATO | ALI SULTAN | BASIL DIXON CLOUD BASED LASER MICROPHONE.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Network Systems Sales LLC
Configuration management
Printing: This poster is 48” wide by 36” high. It’s designed to be printed on a large-format printer. Customizing the Content: The placeholders in this.
Project Management Methodology Procurement management.
Adding scalability to legacy PHP web applications Overview Mario A. Valdez-Ramirez.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Laser Microphone Project – Ethics Presentation GROUP 1 DIXON | DONATO | RAWAT | SULTAN.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
IS Audit Function Knowledge
INTRODUCTION Toomeeting Conference (TMC) is the easiest and more accessible multimedia videoconferencing solution on market. TMC offers a large portfolio.
Surveillance camera in terms of business. Index *surveillance systems * Types of control systems * Elements of control systems * Types of monitoring camera.
Lecture 1.
Network security policy: best practices
Providing Onboard and Onsite Ticketing Solutions to the Travel and Tourist Industry 1.
Cloud computing Tahani aljehani.
By Drudeisha Madhub Data Protection Commissioner Date:
HOME AUTOMATION THROUGH ANDROID MOBILE. What is Home Automation?  Home automation involves introducing a degree of computerized or automatic control.
Open Source for Government Alexander C. Pitzner Sr. Network Engineer Harrisburg University of Science and Technology
Course Overview Course Requirements Knowledge and Skills Student Expectations.
Chapter 1- Introduction
Solution Overview for NIPDEC- CDAP July 15, 2005.
Adam Leidigh Brandon Pyle Bernardo Ruiz Daniel Nakamura Arianna Campos.
Cloud Computing Saneel Bidaye uni-slb2181. What is Cloud Computing? Cloud Computing refers to both the applications delivered as services over the Internet.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
Management Information Systems
Department of Electrical and Computer Engineering Lighting Tool Box Winter 2004 ECE 498 Team Members: Nick Sitarski Blaine Thompson Brandon Harris Dave.
Computers Are Your Future Tenth Edition Chapter 12: Databases & Information Systems Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
COEN 252 Computer Forensics
14 Publishing a Web Site Section 14.1 Identify the technical needs of a Web server Evaluate Web hosts Compare and contrast internal and external Web hosting.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Ruslan Masinjila Aida Militaru.  Nature of the Problem  Our Solution: The Roaming Security Robot  Functionalities  General System View  System Design.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
 Cloud Computing is an emerging field wherein the focus is on providing virtualized resources as service.  Also the user is almost entirely blinded.
Electronic Commerce & Marketing. What is E-Commerce? Business communications and transactions over networks and through computers, specifically –The buying.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
COEN 252 Computer Forensics Collecting Network-based Evidence.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Configuration Management (CM)
Service Transition & Planning Service Validation & Testing
Computer Emergency Notification System (CENS)
Problem Statement Automotive and heavy equipment applications use sensors on machines to report temperatures, pressures, speeds, etc. to a central embedded.
9 Systems Analysis and Design in a Changing World, Fourth Edition.
TeleCont A short description of the application. Presentation topics TeleCont features Users and permission levels Sending commands to field devices Receiving.
Advisor: Dr. Edwin Jones 1 Client: Paul Jewell ISU Engineering Distance Learning Facility May01-13 Design Team: David DouglasCprE Matt EngelbartEE Hank.
Group 1 – Ethics Presentation
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
Printing: This poster is 48” wide by 36” high. It’s designed to be printed on a large-format printer. Customizing the Content: The placeholders in this.
| nectar.org.au NECTAR TRAINING Module 5 The Research Cloud Lifecycle.
Fall 2015CISC/CMPE320 - Prof. McLeod1 CISC/CMPE320 Assignment 1 due today, 7pm. RAD due next Friday in your Wiki. Presentations week 6. Today: –Continue.
Daredevil Robot Direction Module (DRDM) Senior Design II Final Presentation.
Introduction TO Network Administration
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Retele de senzori Curs 1 - 1st edition UNIVERSITATEA „ TRANSILVANIA ” DIN BRAŞOV FACULTATEA DE INGINERIE ELECTRICĂ ŞI ŞTIINŢA CALCULATOARELOR.
What is Cloud Computing 1. Cloud computing is a service that helps you to perform the tasks over the Internet. The users can access resources as they.
Computer Technology: Your Need to Know Chapter 1 Slide 1.
Getting Ready for the NOCTI test April 30, Study checklist #1 Analyze Programming Problems and Flowchart Solutions Study Checklist.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Short-Range Digital Laser Communication System
CompSci 280 S Introduction to Software Development
Chapter 1- Introduction
Set up your own Cloud The search for a secure and acceptable means of gaining access to your files stored at the office from a remote location.
Systems Analysis and Design
Security in Networking
LO2 - Be Able to Design IT Systems to Meet Business Needs
FPGA Vinyl to Digital Converter (VDC)
Chromebook Carts Kamiak High School.
Presentation transcript:

GROUP ONE ANIRUDH RAWAT | BRYANT DONATO | ALI SULTAN | BASIL DIXON CLOUD BASED LASER MICROPHONE

Problem Statement Objective Requirements Design Breakdown Technology Involved Timeline & Status OUTLINE

Remote audio surveillance is the lynchpin of intelligence gathering for law enforcement, government use, etc. Covert surveillance should be robust and not put the operators at risk for detection A chain of custody for evidence gathered can make or break a court case, so evidence preservation and logging is a prime concern. A need exists for an inexpensive, robust, and modular audio surveillance system that can record audio data without putting the operator at risk, and can maintain data integrity once audio is captured. PROBLEM STATEMENT CURRENT SOLUTIONS Are large, expensive, and cumbersome – expect to pay upwards of $1000 Require extensive set-up, and are not very robust Do not provide an intuitive signal processing or data management solution for long term use.

To provide a unique and innovative alternative to current laser audio surveillance devices that is inexpensive, easy to deploy and maintain, less risky for the operator, and robust. Our system can record audio using a reflected laser by measuring phase changes due to vibrations in the air caused by sounds. Three Fundamental Design Principles: Covert: very little time required to set-up and deploy laser microphone Robust: very easy to repair, modular design that requires little to no maintenance or technical knowledge Cost Effective: System should meet or beat current market offerings by at least 25% OBJECTIVE

OBJECTIVE TREE CBLM HARDWARE PLATFORM FIRE LASER AND CAPTURE REFLECTION EXTRACT AUDIO INFORMATION FILTER AND CLEAN SIGNAL BY REMOVING AMBIENT NOISE ENCODE AUDIO DATA IN.MP3 OR.WAV ASSIGN TIMESTAMP INFORMATION TRANSMIT DATA TO SOFTWARE PLATFORM SOFTWARE PLATFORM RUN USER SPECIFIED OS/DATABASE REQUIRE AUTHENTICATION STORE DATA IN LOGICAL ORDER ALLOW ONLINE STREAMING AND DOWNLOAD STORE VARIOUS SIGNAL PROCESSING /AUDIO ALGORITHMS

The system should be able to operate at a test distance of 10+ yards, with the ideal goal of 50+ yards. The system should be able to filter and amplify captured audio signals, and encode them in a easy to use format i.e. MP3 The system should be able to store and transmit audio data securely to a remote database with appropriate timestamp data. The system design should be modular, with easy to replace “modules” that require little to no setup time The system should be able to utilize traditional AC power, or operate off a battery pack for 3+ hours The system should be cost effective! PRELIMINARY REQUIREMENTS

The system must be modular The system must be cost effective The system should be able to run off battery power for more than an hour The system should be secure The system should be packaged neatly The system should include documentation on use The system should clearly indicate acceptable use of the product The system should clearly inform the user of legal and health risks The software platform should allow multiple user accounts MARKETING REQUIREMENTS

The system will use secure protocols to transmit data The system will require strong passwords to access database The system should have a battery pack with commonly available cells (AA, AAA etc.) The system should be able to operate at a distance of greater than 10 yards The system should be able to run for more than 1 hour on battery pack The system should be able to accommodate traditional AC power from an outlet The system should be able to account for ambient noise and vibrations, and filter accordingly The system must be able to utilize lasers of different wavelengths There should be a way to disconnect from the software platform, and use headphones to listen to audio The system should be completely modular. ENGINEERING REQUIREMENTS

ARCHITECHTURE – CLASS DIAGRAM

DESIGN BREAKDOWN | HARDWARE & SOFTWARE Two Distinct Design Platforms Hardware Platform Laser Unit Signal Processing Computer Power Supply Software Platform Cloud Database Android Application Web Interface Secure Protocols

Timeline TablePhase Phase HardwareSet up LaserTune Laser SoftwareSet up Cloud Secure Database IntegrationN/ATesting -Construct Hardware Platform first, and initiate testing. This will be straightforward, and will NOT require a lot of time. -Construct Software platform second, and initiate testing. This will be the most complex phase, and will require a lot of time. -Leave as much time as possible for integration, testing, as tuning; this is because we are attempting to integrate many different kinds of technologies. PROJECT PLAN - TIMELINE AND STATUS

PROJECT PLAN – GAANT CHART

Set up cloud storage server with proper services SSH Apache Web hosting Secure connection protocols Document all testing results thoroughly Ensure that a secure connection can be established to the server Ensure that the signal processing unit can establish a connection to the server Attempt and verify successful file transfers Set up laser unit, and fire at reflective surface Ensure that the reflection is easy to see and capture Set up headphones, and connect to basic amplification section of signal processing unit, attempt to listen to audio Determine the maximum distance at which laser signal is still clean enough to process Determine the effects of environmental conditions a. Ambient light b. Ambient noise c. Vibrations on target surface d. Vibrations on resting surface e. Document all testing results thoroughly PROJECT PLAN – TESTING PHASE 1 HARDWARE SOFTWARE

5 mW Laser (interchangeable) Tripod Phototransistor/Photodiode panel Raspberry Pi Gain/Filter IC packages Power Supply ~$150-$200 very liberal estimate TECHNOLOGY Amazon Cloud Database (MySQL / POSGRES) Webserver (APACHE2) OS: Windows Server or Ubuntu Linux Simple, 2-instance network ~$0 (based on bandwidth) HARDWARE SOFTWARE

PRODUCT PROCUREMENT All of our software has already been acquired, while our hardware will be acquired by July 2013 from online retailers such as Amazon and Newegg. We are currently distributing the costs amongst design team members using personal funds. REMAINING HARDWARE -Photodiodes -Additional Lasers -Rasberry Pi / CubieBoard PC -Decoders -Batteries -Power Supply -Integrated Circuit Packages and Operational Amplifiers

HARDWARE PLATFORM PROTOTYPE

FORSEEN CHALLENGES -Ambient noise – can introduce distortion in our captured signal -Solution: aggressive noise filtering using multiple algorithms -Ambient light – can also introduce distortion in our captured signal by confusing our diode panel, and rasing/lowering voltage levels -Solution: aggressive noise filtering -Vibrations on surface which laser microphone is mounted -Solution: create a steady mounting base

LEGAL ISSUES -The construction, possession, and sale of surveillance devices is tightly regulated by Federal, State, and Local laws -Many states like West Virginia criminalize possession of surveillance devices unless they are for government/law enforcement use – WV Code, 61-1D-4 (Wiretapping & Electronic Surveillance Act). -Many states have various wiretapping laws. For example, West Virginia requires that at least one person in a conversation must agree to a wiretap, whereas in nearby Maryland, all parties must agree -We must limit our sales to government agencies to abide by the law, and inform the end user of legal issues arising from surveillance -We must inform the end users thoroughly of the legal use of our product

Our system uses the maximum power laser allowed by Federal Law – A class IIIb 5mW laser. Anything higher may be illegal according to the American National Safety Institute (ANSI) Class IV – V lasers cannot be sold over the counter, and must be justified for medical/research purposes only. Beam density may not exceed 2.5 mW/square centimeter without a warning label that clearly states “Danger.” In many jurisdictions, shining a laser in public is illegal, especially when fired at airplanes, buses, etc. It is the design team’s responsibility to carefully restrict the distribution of our device, and thoroughly inform the end user that the responsibility to abide by all laws rests with them. This is to protect us from possible legal action. LEGAL ISSUES CONTINUED

According to ANZI standards, our laser can cause severe damage to an individual’s eyes if they are directly exposed to the retinas via an optical device (ANSI Z136.1) for greater than two minutes. It is our responsibility to warn the end user of the potential health hazards, and provide plenty of warning labels and documentation to avoid legal action against the design team Recommendations: do not look directly into the laser aperture. Eye protection is not necessary, but recommended. MEDICAL ISSUES

A neatly packaged, modular laser microphone and diode capture panel with an easily removable power supply, computer, tripod, and laser. The ability to record audio from a distance of at least 10 yards, in light or dark, and in quiet and noisy environments The ability to access and stream audio from a database using a mobile device and computer. Total cost under $500 EXPECTED OUTCOMES

For the foreseeable future, surveillance will continue to be the underpinning of effective intelligence gathering. This intelligence gathering technique can be for almost any reason imaginable, and likewise the individuals behind this can harbor an infinite number of motives. As society moves into a technologically demanding world, electronic surveillance will continue to be on the rise. What the design team proposes is a tiny slice of this rapidly changing field of electronic surveillance. Utilizing key principles in physics and electrical engineering, the team’s design is set apart from others in the field by its approachable cost, modular design, and easy to use interface. CONCLUSION

QUESTIONS?