Sensor networks on a mobile platform University of Missouri-Columbia Ryan Donnelly, Paul Baskett, Tiancheng Zhaung Smartphones have many sensors and collectively.

Slides:



Advertisements
Similar presentations
Blue Eye T E C H N O L G Y.
Advertisements

CMP206 – Introduction to Data Communication & Networks Lecture 1 - Networking Fundamentals.
Bryan Donyanavard Nik Sumikawa. Project Description Transfer data between two mobile phones via Bluetooth. A unique cell phone movement will establish.
WAWC’05 Enhancing Mobile Peer-To-Peer Environment with Neighborhood Information Arto Hämäläinen -
Red Hat Linux Network. Red Hat Network Red Hat Network is the environment for system- level support and management of Red Hat Linux networks. Red Hat.
Network Management 2 School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 16, Thursday 4/19/2007)
Layer 7- Application Layer
Supporting Mobile Sensors and Typed Data Exchange Through the JXTA p2p Framework Supporting Mobile Sensors and Typed Data Exchange Through the JXTA p2p.
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal Video Conference Archives Indexing System.
OUTLINE WHAT ? HOW ? WHY ? BLUEPOST Poster and Message Content Specified by the User Displaying the Poster Content on a Monitor Sending Messages to.
WSN Simulation Template for OMNeT++
BLUESMIRF SILVER BY MICHAEL SANCHEZ AND HECTOR REYNA.
Using Bluetooth on Android Devices to Implement Real-Time Multiplayer Games Brad Boone, Corey Darr, Chris Hayes, Dale Musser, Ph.D. Introduction With the.
Supervisor: Mr. Hai Vortman. The ultimate goal Creating a wireless sensor network using Bluetooth technology.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Authentication Approaches over Internet Jia Li
CHAPTER 5 : COMMUNICATIONS AND THE INTERNET (PART 1) INFORMATION TECHNOLOGY AND ITS APPLICATIONS SSK3000 Faculty of Computer Science and Information Technology,
Communications & Networks
Information Systems Today: Managing in the Digital World TB4-1 4 Technology Briefing Networking.
What is Blue Tooth ? Blue tooth is a cable replacement technology that can be used to connect almost any device to any other devices. Blue tooth is the.
思科网络技术学院理事会. 1 Application Layer Functionality and Protocols Network Fundamentals – Chapter 3.
Lecturer: Ghadah Aldehim
Web Mastering Module Internet Fundamentals. What is the Internet? –Global network of networks –Communicating using same set of rules (protocols/languages)
INTRODUCTION Bluetooth technology is code name for Personal Area Network (PAN) technology that makes it extremely easy to connect a mobile, computing device.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Near Field Communication: Experiments with Android Michael Humphries.
1 1 Local vs. remote intelligence A quick look at two different architecture management systems Copyright Nitrosoft 2010.
Android Data Entry, 3/10/2012 “Android Galaxy, Morgan Divine” Problem Definition Data entry solutions are in ever higher demand as small businesses continue.
Foundations of Computer Science Computing …it is all about Data Representation, Storage, Processing, and Communication of Data 10/4/20151CS 112 – Foundations.
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal Video Conference Archives Indexing System.
Team 16 : MedFRS Device Diagnostic Software Misha DowdProject Manager Delnaz GundeviaLife Cycle Planner Anfal Abdul JaleelSystem Architect Nanda Kishore.
11 Mobile GIS Technology >GTI’s technology for tracking and traceability with ASTM F2897: ─Tablet computer with mobile GIS data collection software ─High.
M & E Working Group Meeting: New Technology Applications in M & E Wireless Data Entry & Wireless Data Transmission from Mobile Devices to Web Virginia.
Department of Computer Science and Engineering, CUHK 1 Final Year Project 2003/2004 LYU0302 PVCAIS – Personal VideoConference Archives Indexing System.
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
Sensor networks on a mobile platform Ryan Donnelly.
Specialized Input and Output. Inputting Sound ● The microphone is the most basic device for inputting sounds into a computer ● Microphones capture sounds.
Measurement and Control. Control Systems A control system usually consists of a processor, a control program, interfaces and a device under the processor's.
4 - 1 Copyright © 2006, The McGraw-Hill Companies, Inc. All rights reserved. Computer Software Chapter 4.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
A Distributive Server Alberto Pareja-Lecaros. Introduction Uses of distributive computing - High powered applications - Ever-expanding server so there’s.
The Design of Learning Environments BY: Rachel Rose Ulgado University of California, Irvine Anthropology, Informatics Mentors Professor Gillian Hayes Meg.
Final Presentation for Senior Project April 25, of 25 Jarrett Allen Luis Cintron Michael Kubacki Robert Skinner Department of Computer Science and.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Programming technical terms Program is like a recipe. It contains a list of ingredients (called variables) and a list of directions (called statements)
Lecture (Mar 23, 2000) H/W Assignment 3 posted on Web –Due Tuesday March 28, 2000 Review of Data packets LANS WANS.
TCP/IP (Transmission Control Protocol / Internet Protocol)
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
Cybikos: wireless handheld computers Cybikos specifications: 32-bit processor running at 11mhz 4mhz coprocessor for its radio transmitter 512k of RAM 512k.
Author: Tatsuya Yamazaki National institute of Information and Communications Technology Presenter: Samanvoy Panati.
Flat Files Relational Databases
Windows Movie Maker. Definition You can use Windows Movie Maker to capture audio and video to your computer from a video camera, Web camera, or other.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
At the end of each day the evening manager at each store enters a code into the cash register, after which the cash register connects to the central computer.
Interfaces. Peripheral devices connect to the CPU, via slots on the back of the computer.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
Project Description MintTrack is a mobile application built for the Android OS that will help keep track of where a user’s money is being spent via expense.
PROWIND (Positioning Relay over Wirelessly Networked Devices) Team Members: Alexander Smithson, Dian Ding, Yeh Cheng Yuan Graduate Advisor: Eric Liao Faculty.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
A microcontroller-based system for multi sensor monitoring and messaging via GSM network Bachelor thesis Angelakis Vaios Supervisor:Kazarlis S.
Computer Network Architecture Lecture 1: Introduction to Computer Networking.
SOURCE:2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING AUTHER: MINGLIU LIU, DESHI LI, HAILI MAO SPEAKER: JIAN-MING HONG.
Bluetooth for Ad-Hoc Networking
Universal Automotive Computer
Mobile Testing - Bug Report
Casey O’Leary – Washington State University
Technology Literacy Hardware.
Meng Cao, Xiangqing Sun, Ziyue Chen May 28th, 2014
Presentation transcript:

Sensor networks on a mobile platform University of Missouri-Columbia Ryan Donnelly, Paul Baskett, Tiancheng Zhaung Smartphones have many sensors and collectively they can form a sensor network to monitor the environment. A security network was created with three to four smartphones, where the smartphones react to their sensors and collect data. The data can track things like who entered a room and what that person is doing. When the light sensor receives light, the program takes a picture and records audio. One major problem is that the light sensor is inconsistent. All of the data collected from each sensor is returned to one central smartphone. This data, picture and audio files, can then be interpreted. This ad-hoc type of security network could be very helpful if you need to set up quickly. IntroductionScreenshots Ryan Donnelly Undergraduate Student: Computer Science Student Mentor: Paul Baskett Graduate Student: Computer Science Student Mentor: Tiancheng Zhaung Graduate Student: Computer Science Methods The application was developed for Android devices using Eclipse integrated development environment. Devices communicate with each other using Bluetooth file transfer protocol. The master sensor can connect to many slave sensors at a time, up to seven currently. The application must be started when in a lit area, because this first value is used to compare what is light and what is dark for the light sensor. Whenever this initial value or higher is obtained from the light sensor, the slave sensor will take a picture and start recording audio. Every ten seconds, the application will check to see if there is still light being received. If there is light being received, audio will continue to be recorded, and another picture will be taken. Whenever the light sensor stops receiving light, the audio will stop being recorded and if a master sensor is connected via Bluetooth, the data will be sent back to it. A message will also pop up on the slave sensor with the filename and path of the recorded audio. The pictures will be sent to the master sensor also, and will be stored in the same directory. ProblemsFuture WorkAcknowledgement This undergraduate research project has been funded by the National Science Foundation. Light sensor is very inconsistent Still has bugs Unclean code structure Making the light sensor more reliable Making the interface look better Adding video capture to the slave sensors Fix all bugs Clean up code structure Results The results showed that the light sensor is extremely finicky and does not work consistently. Sitting completely still in one light source, the light sensor brightness will fluctuate. When the application gathers the audio and picture data, sometimes it will fail to capture more pictures. Beyond this, there are still bugs in the code and it is far from perfect. Faculty Mentor: Dale Musser Professor: Information Technology