Homeland Security System Danny Butler EKU, Dept. of Technology.

Slides:



Advertisements
Similar presentations
WEB DESIGN TABLES, PAGE LAYOUT AND FORMS. Page Layout Page Layout is an important part of web design Why do you think your page layout is important?
Advertisements

With Folder HelpDesk for Outlook, support centres and other helpdesks can work efficiently with support cases inside Microsoft Outlook. The support tickets.
XProtect ® Express Integration made easy. With support for up to 48 cameras, XProtect Express is easy and affordable IP video surveillance software with.
Internet Online Safety How to have FUN and Stay in Control.
Tel: Unique Home Security Systems Security Supplies Captures Boards Digital Video Recorders Power Line Communication Wireless Solutions.
Welcome to Keyboarding Pro DELUXE ® Get Started Get Started Create Your Student Record Create Your Student Record The Main Menu The Main Menu Send Files.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
MICROCONTROLLED HOME Keith Jones EKU Deparment of Technology CEN.
Unit 9.2 / Activity 2 / presentation2a Collaborative Working.
Assistive Technology on the Job With Nancy Jo Geise.
Remote Surveillance System Presented by: Robarin Holdings Limited Telephone: Facsimile:
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
HUNTINGTON BEACH PUBLIC LIBRARY Basics. What is ? short for electronic mail send & receive messages over the internet.
Computer Networks IGCSE ICT Section 4.
. Introduction to Welcome to . This module will give you the skills you need to send and receive . Also to send and receive attachments.
Evidence By Jordan Shurety. This I where you write who you are going to send the to. Cc in an means carbon copy or courtesy copy. You.
You can customize your privacy settings. The privacy page gives you control over who can view your content. At most only your friends, their friends and.
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
Better Communication Through the Right Technology Michelle SimpsonJan Goldstein.
Microcontroller Based Wireless Camera Security System John Saylor Computer Electronic Networking.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
Introduction CSE 1310 – Introduction to Computers and Programming
Presented by Chad Kafka This Month’s Topic: Wikispaces Advanced Today’s session is an introduction to what a WIKI is and how they can be used in education.
Outer north east London Barking and Dagenham, Havering, Redbridge and Waltham Forest How to use SurveyMonkey Laura Hayes Senior Communications Manager.
This presentation will be all about s, etiquette and software. I will be going through each one of these individually and thoroughly step.
XP New Perspectives on Browser and Basics Tutorial 1 1 Browser and Basics Tutorial 1.
LOD Surveillance System Jamie Creech Software Engineer.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
Welcome to the Class Websites! (If available, use “Slide Show” above for best viewing. Slides advance by themselves, or you can click your mouse to advance.
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
GROUP POLICIES AND SECURITY USING WINDOWS SERVER 2008 Raymond Ross EKU, Dept. of Technology, CEN.
Royal Latin School. Spec Coverage: a) Explain the advantages of networking stand-alone computers into a local area network e) Describe the differences.
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
CALENDAR MANAGEMENT Calendar Management makes sharing calendars with teammates easy. You can divide calendars into sub-calendars (e.g., speaking engagements,
Chapter 5 Protecting Your PC from Viruses Prepared by: Khurram N. Shamsi.
PERSONAL INTERACTIVE COMPUTER NETWORK TECHNOLOGY BASED SUPPORT Christopher E. Lang Computer Electronic Networking Dept. of Technology Eastern Kentucky.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
MOVIE TERMINAL APPLICATION Michael Disney EKU, Dept. of Technology, CEN/CET.
Microsoft Office Outlook 2013 Microsoft Office Outlook 2013 Courseware # 3252 Lesson 6: Organizing Information.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
ITGS Networks. ITGS Networks and components –Server computers normally have a higher specification than regular desktop computers because they must deal.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Topic 5: Basic Security.
Edmodo for Educational Networking. Table of Contents O Getting Started with Edmodo Getting Started with Edmodo O Features of Edmodo Features of Edmodo.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
Introduction to Python Lesson 1 First Program. Learning Outcomes In this lesson the student will: 1.Learn some important facts about PC’s 2.Learn how.
How MS Outlook Can Save Your Life! or at least make you a little more sane.
Do This file can be found at
Introduction CSE 1310 – Introduction to Computers and Programming Vassilis Athitsos University of Texas at Arlington 1.
HOME SECURITY USING PLC Ryan Badgett EKU, Dept. of Technology, CEN.
Google Classroom Getting started with Google LMS..
Internet Flow By: Terry Hernandez. Getting from the customers computer onto the internet Internet Browser
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
BACK NEXT YOUR PROGRESS CC HOSTING A WEBEX FOR INSTRUCTION CPCC WebEx Training BACK NEXT YOUR PROGRESS CC.
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
QR Codes “Scan Your Way to Engagement” Pamala Heller Woodland High School – Henry County
Internet Safety Review Focus: Cyber Security A Literacy-Based Teaching and Learning Activity Level 6.
8 – Protecting Data and Security
Network and hardware revision
Introduction CSE 1310 – Introduction to Computers and Programming
THE BASICS.
Huntington Beach Public Library
Provide Real-Time Appointment Status & Improve Patient Satisfaction
Starfish Faculty Training How to Raise Flags and Kudos
Basics HURY DEPARTMENT OF COMPUTER SCIENCE M.TEJASWINI.
How to Use Yamm Yet Another Mail Merge.
Presentation transcript:

Homeland Security System Danny Butler EKU, Dept. of Technology

2 OUTLINE Introduction of the Homeland Security System. Behind the making of the Homeland Security System. Simple instruction over the use of the system. Potential future add-ins to the system.

3 MOTIVATION The driving force behind the homeland security system: The threat of theft or privacy violation is always present, I decided to create something that alerts the end-user automatically of an intruder to provide peace of mind. I was also just curious what, if anything, happened in my room when I was not there…

4 INTRODUCTION Security has been an issue ever since people began to collect things. The human emotion of jealousy can instigate activities of theft or sabotage. Many great individual detectives, and agencies have arisen throughout the years to aid in the protection of our personal belongings: Nancy Drew, the Hardy boys, Sherlock Holmes and Dr. Watson, Inspector Gadget… and now we have Danny’s Homeland Security!

5 The Goals of Danny’s Homeland Security Everyone deserves a little confidence when it comes to protecting their things and themselves. I feel that the average computer user should be capable of setting up their own home security system quickly and effectively. To increase the ease of this usually complicated process, a number of features need to be incorporated in a pre-packaged system. Also a zero maintenance/upkeep cost is appealing.

6 The Making of: Danny’s Homeland Security Identify the specific functions which a good security system will implement. Research the topic. Hardware setup. Software setup. Testing & troubleshooting. Verifying results.

Specific Functions List of features required for an effective surveillance system: The security system needs to create a video of the intrusion. The security system needs to alert the end-user of the intrusion in real time. The security system needs to save the video to a location accessible anywhere by the end-user. 7

Research Investigate other programs that are similar in design and implementation. Determine what components will be needed and how they will interact. Webcam. Motion detector (develop a hardware switch or simulate through software.) Auto record video once motion is detected. the video File and send a text message. 8

Hardware Setup This step was very simple, I had shopped around for webcam and settled on the Logitech Orbit. One of the features that came with the webcam software was motion detection tied in with auto video recording. Of course there are lists of other freeware programs I found through research that take pictures once movement have triggered the motion detection algorithms. 9

Software Setup I did research into what programming language to use, I discovered that I could achieve all of my requirements by using Visual Basic. (Plus I already had it installed.) After a few trips to the internet I learned how to write using the system.net libraries, including.mail and.networkinformation. With these libraries I was able to write code to achieve the following: Scan a selected folder and determine when a file has been written inside the folder. Once detected, the file pathname is saved to a variable. This pathname is then passed to an writing function that attaches the file and sends an and text message 10

Testing and Troubleshooting I approached the testing process one function at a time in my code: I implemented a function, then tested it independently. Once all of my functions worked separately I tied them all together and tested how they worked as a program. The one significant problem encountered was when g-mail changed the mail server welcome port number. However, I was able to quickly fix it after two or three google searches… 11

Verifying Results Simply put… It worked. I was able to receive text messages and check out video of my roommate taking some beer from my refrigerator while I was at work. (I told him he could… just not why…) 12

Using the Homeland Security System 13 Very easy to use: Set the webcam software to take videos of motion, point your webcam, enter your information, then activate your system. Now you have started protecting your things!

Using the Homeland Security System 14 As you can see I have entered in my contact information, activated the system and now I am recording my movement to a video file.

Using the Homeland Security System 15 Here is my message with the video attachment.

Using the Homeland Security System 16 These are the snapshots of my text message corresponding with the last intrusion detection.

17 RESULTS I have created a very efficient security system that costs nothing and is portable from one computer to the next. My belongings in my apartment are being watched!

18 CONCLUSIONS I designed and created my own security system that uses multiple steps to create one desired outcome. I have, by accomplishing this challenge, gained more experience in researching Visual Basic’s.net libraries and the different functions they were designed to complete. I have, as a result of this, learned a lot more about Visual Basic programming.

19 Potential Future Add-ins The computer makes it possible to customize the security system to have more features than it currently possesses. Possible ideas include… An audible alarm to deter the intruder. A picture snapshot sent to the user via attachment to the text message. Increased scalability to include multiple cameras. Any other ideas from the audience?

~Fin~ Questions? Comments? Or, request your own copy of Danny’s Homeland Security System! Contact me at 20