Adam Turner Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.

Slides:



Advertisements
Similar presentations
Introduction  If you have ever been to shooting range before, you know that firing a gun is fun. Time flies when you’re sending hundreds of rounds down.
Advertisements

VEX Robotics Platform and ROBOTC Software Introduction.
Aaron Eastham Network Security & Electronics Program Dept. of Applied Engineering & Technology Eastern Kentucky University.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
P OOR MAN ’ S SECURITY Sean Evans EKU, Dept. of Technology, Net Program.
FUNDAMENTALS OF PROGRAMMING SM1204 Semester A 2010/2011.
ORACLE Lecture 1: Oracle 11g Introduction & Installation.
Home Media Server With PLEX 499 CAPSTONE SPRING 2014 MATTHEW MARRS EASTERN KENTUCKY UNIVERSITY.
Unmanned Surveillance Tank Frederick Guilfoil Eastern Kentucky University Dept. of Technology, CEN 499.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
PI : TV A PI MEDIA CENTER Michael Hoskins Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University.
OUTLINE  Motivation  Introduction  Problem Statement  Assumptions  Proposed Solution  Results  Conclusions  Future Work  References  Acknowledgements.
DIY Engine management system: Take full control of your car
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
VEX Robotics Platform and ROBOTC Software
MC TOOLBOX Presented by: Kevin Lay Eastern Kentucky University Spring 2013.
REMOTE DOOR LOCK CONTROL Robert B. Schidle EKU, Dept. of Technology, CEN.
MINI MEDIA CENTER Charles Hayden Network Security and Electronics Department of Applied Engineering and Technology Eastern Kentucky University.
FUNDAMENTALS OF PROGRAMMING SM1204 SEMESTER A 2012.
ECE 477 Design Review Group 11  Spring 2005 Paul Dulle Pat McLaughlin Randy Scheifele Chad Bjorklund David Meyer.
ANTICLICK: INCREASING DESKTOP SECURITY Jason Petrey Computer Electronic Networking Dept. of Technology Eastern Kentucky University.
RFID P ET F EEDER Sally Smith Eastern Kentucky University Department of Technology NET program.
MICROCONTROLLER BASED PARKING GARAGE Kevin Reynolds EKU, Dept. of Technology Computer Electronic Networking.
Introduction to the VEX ® Robotics Platform and ROBOTC Software © 2012 Project Lead The Way, Inc.Principles of Engineering.
Homeland Security System Danny Butler EKU, Dept. of Technology.
Active Home Timmy Henery Affiliation EKU, Dept. of Technology.
PHP MYWIKI Brian Casey Eastern Kentucky University.
Common Servers in a Workplace Environment Brandon Reynolds Computer Electronic Networking Dept. of Technology, Eastern Kentucky University.
PERSONAL INTERACTIVE COMPUTER NETWORK TECHNOLOGY BASED SUPPORT Christopher E. Lang Computer Electronic Networking Dept. of Technology Eastern Kentucky.
Linux/Windows File Sharing Othman Almazrooa CEN Student, Eastern Kentucky University.
ANDREW SIX EASTERN KENTUCKY UNIVERSITY RED Rover.
FAST: Fully Autonomous Sentry Turret
F.A.C.T. Turret Team 9 Anthony Ragghianti David Fixter Danny Smith Jack Hunt Joseph Potter.
MOVIE TERMINAL APPLICATION Michael Disney EKU, Dept. of Technology, CEN/CET.
NETWORK OPERATING SYSTEM INTEROPERABILITY Jason Looney EKU, Department of Technology, CEN.
SECURING YOUR HOME AND HOME NETWORK Ryan Lewis Eastern Kentucky University Network Security & Electronics Spring 2015 Capstone.
Windows Server 2003 with Active Directory and Group Policies Wendy Hurst Eastern Kentucky University Department of Technology CEN/CET.
3D C&P MACHINE MK. I Bryan Roark Eastern Kentucky University NET Capstone.
Brandon McGee Eastern Kentucky University Capstone 2015.
CENTRAL SECURED PROXY NETWORK Zachary Craig Eastern Kentucky University Dept. of Technology, NET.
ECE 4007 L01 DK6 1 FAST: Fully Autonomous Sentry Turret Patrick Croom, Kevin Neas, Anthony Ogidi, Joleon Pettway ECE 4007 Dr. David Keezer.
Master/Slave networking configuration Alan Maynard Computer Electronic Networking.
SOLARPACKING Mitch Vernon Eastern Kentucky University.
MY NETWORK TAP Richard Elswick Easter Kentucky University.
1.Introduction about camera auto balancing system of UAV 2.Proposal auto balancing platform 3.Step by step solving rotation (attitude) of an IMU O Outline.
Home Security Cameras Emmanuel Payton EKU Dept of Technology CEN/CET.
HOME SECURITY USING PLC Ryan Badgett EKU, Dept. of Technology, CEN.
HOME AUTOMATION Robert Brandenburg EKU, Dept. of Technology, CEN/CET.
Raspberry Pi Garage Door Mark Barron NET 499 Eastern Kentucky University.
PARSLEY PIE BOX James (Kyle) Parsley Network Security & Electronics Program.
OPERATING SYSTEMS (OS) By the end of this lesson you will be able to explain: 1. What an OS is 2. The relationship between the OS & application programs.
HIGH END DESKTOP WITHOUT HIGH END PRICE VIRGIL EDWARDS NET 499 SPRING 2016 EASTERN KENTUCKY UNIVERSITY 1.
LEARNBOT Matthew Williams Network Security and Electronics Program Dept. of Applied Engineering & Technology, Eastern Kentucky University.
Different Operating Systems
Introducing, Installing, and Upgrading Windows 7
Tips for Taking the Paper-Based FSA ELA Reading Assessments
Mickey hand By: Marquise Piton Network Security & Electronics /Contact: (954)
Introduction to Eclipse
The Claw Alert Feline Training Assistant
Cat Litter Box Ventilation System
Clinton A Jones Eastern Kentucky University Department of Technology
Fix Microsoft Office Error Code Call
Tips for Taking the Paper-Based FSA ELA Reading Assessments
Tips for Taking the Paper-Based FSA ELA Reading Assessments
Tips for Taking the Paper-Based FSA ELA Reading Assessments
Spyware. By: Katheryn L. Gaston.
Different Operating Systems
RText CSSE2003 Tu8a Adam Setch Dale Bliss Steven Edge Milosh Kovacevic.
Ubuntu MYSQL Database Server
Presentation transcript:

Adam Turner Network Security & Electronics Program, Dept. of Applied Engineering & Technology, Eastern Kentucky University

OUTLINE  Sometimes persons may enter rooms in my home and mess with my stuff without permission. My home does not have many doors downstairs where most of my cool stuff lives. A sentry turret that fires plastic 6mm airsoft pellets should hopefully keep people away from my stuff. A turret will be constructed and installed in one of my rooms without a door. The turret should not cause real physical harm to persons or animals, only keep them away from my stuff. 2

MOTIVATION  My closet has no doors  My two animals can eat or destroy anything  A sentry presence should keep them away 3

INTRODUCTION  Autonomous Sentry Project has been around for many years  Open source code is available for the tracking software.  Many people have been successful using this code. 4

PROBLEM STATEMENT 5

Assumptions  Builder has access to an arduino  Builder understands basic mechanical engineering  Builder understands basic electronic engineering  Builder can read and edit java  Builder wants a sentry 6

PROPOSED SOLUTION  Attempted a direct drive sentry  Parts were too heavy for servos to support them  Had to create support for servos  Had to design a system that could withstand lots of torque and inertia from moving parts 7

Initial Platform 8

Many parts were salvaged/free 9

I needed a sentry, to protect my sentry build 10

Block Design 11

Wiring Schematic 12

RESULTS  Main issues were with the software  Was intended for older operating systems  Had to download many C libraries not included with windows 7  Had to find Arduino libraries called in the code and put them in the correct folders for processing 13

Source: Sentry Gun

CONCLUSIONS  Appears to work, however, will track any motion or perceived change  Software at mercy of the webcam  Vibrations in the camera make the software perceive motion 15

FUTURE WORK  Stop the vibration with even more rubber washers  Make a mount that attaches to picatinny rails and adjusts for center of gravity  Contact: 16

REFERENCES  Make Your Own - Project Sentry Gun. (n.d.). Retrieved April 13, 2015, from  Real-Life Sentry Guns for Sale - Targeting System Software History. (n.d.). Retrieved February 15, 2015, from  SENTRY GUN - New Airsoft gun by Redwolf Airsoft [English]. (n.d.). Retrieved February 23, 2015, from  Autonomous Paintball Sentry Gun. (n.d.). Retrieved February 23, 2015, from  Sentrifying a Nerf gun. (n.d.). Retrieved March 2, 2015, from  SentryGun53/Project-Sentry-Gun. (n.d.). Retrieved March 2, 2015, from  Download Processing. Processing is available for Linux, Mac OS X, and Windows. Select your choice to download the software below. (n.d.). Retrieved April 13, 2015, from  Arduino - Learn the basics. (n.d.). Retrieved April 13, 2015, from 17

ACKNOWLEDGEMENTS  Project Sentry at Rudolph Labs  Link to project video: