Video and Sensor Network Architecture and Displays

Slides:



Advertisements
Similar presentations
Spring 2010 – Dr. Son VuongCpsc Cpsc 527 Project List n LIVES (Mobile Learning) (Learning through Interactive Voice Educational System) u A alpha-beta.
Advertisements

Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
PAWN: A Novel Ingestion Workflow Technology for Digital Preservation
Tcl Agent : A flexible and secure mobile-agent system Paper by Robert S. Gray Dartmouth College Presented by Vipul Sawhney University of Pennsylvania.
Firewalls and VPNS Team 9 Keith Elliot David Snyder Matthew While.
THE SECOND LIFE OF A SENSOR: INTEGRATING REAL-WORLD EXPERIENCE IN VIRTUAL WORLDS USING MOBILE PHONES Sherrin George & Reena Rajan.
INFORMATION TECHNOLOGY IN BUSINESS AND SOCIETY SESSION 21 – LOCATION-BASED SERVICES SEAN J. TAYLOR.
Ten Reasons to Buy a Network Camera. Focus 10 of the most important functional differences between analog and network cameras.
Moving the RFID Value Chain Value Proposition Cost and Complexity What is it? (passive RFID) Where is it? (active RFID) How is it? (Sensors) Adapt to it.
DCE (distributed computing environment) DCE (distributed computing environment)
Chapter 6 – Connectivity Devices
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
AMSA TO 4 Advanced Technology for Sensor Clouds 09 May 2012 Anabas Inc. Indiana University.
NETWORK VIDEO SURVEILLANCE. CCTV Closed-Circuit Television (CCTV) is the use of video cameras to transmit signal to a specific place on a designated device.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
 Background  Introduction  Purpose  Basic rover services  Physical architecture of Rover System  Server operation  Logical Architecture of A Rover.
Introduction to Mobile-Cloud Computing. What is Mobile Cloud Computing? an infrastructure where both the data storage and processing happen outside of.
Mary Ganesan and Lora Strother Campus Tours Using a Mobile Device.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Distributed Systems Architectures. Topics covered l Client-server architectures l Distributed object architectures l Inter-organisational computing.
E-Business Infrastructure PRESENTED BY IKA NOVITA DEWI, MCS.
Java Web Services Orca Knowledge Center – Web Service key concepts.
WHY VIDEO SURVELLIANCE
Connected Infrastructure
Sensors Journal, IEEE, Issue Date: May 2013,
Module 1: Understanding Local Area Networks
Chapter 19: Network Management
A brief introduction to IoT gateway
NET 536 Network Security Firewalls and VPN
HTTP and Abstraction on the Internet
HTTP AND ABSTRACTION ON THE INTERNET
Bluetooth Low Energy Overview.
What is WWW? The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists of all the public Web sites connected to the Internet.
The Cost of Free Lesson 4-4.
HTTP and Abstraction on the Internet
THE OSI MODEL By: Omari Dasent.
Information Collection and Presentation Enriched by Remote Sensor Data
Abstract Intrusion detection in networks is of practical interest in many applications such as detecting an intruder in a battlefield. The intrusion detection.
Connected Infrastructure
Distributed web based systems
EMV® 3-D Secure - High Level Overview
The Client/Server Database Environment
Telecommunications, the Internet, and Wireless Technology
CHAPTER 3 Architectures for Distributed Systems
Wireless Instant Messaging Using J2ME
CHAPTER 2 Application Layer.
Understanding the OSI Reference Model
Datamining : Refers to extracting or mining knowledge from large amounts of data Applications : Market Analysis Fraud Detection Customer Retention Production.
Introduction to client/server architecture
Introduction to Wireless Sensor Networks
1603, Sidra Tower, Shaikh Zayed Road Dubai Media City, Dubai UAE PO Box No : Transactional / Promotional.
#01 Client/Server Computing
Chapter 1 Introduction.
An Overview of MPEG-21 Cory McKay.
Packet Sniffing.
Networking | Hardware Components
GPRS GPRS stands for General Packet Radio System. GPRS provides packet radio access for mobile Global System for Mobile Communications (GSM) and time-division.
Computer Simulation of Networks
Wavestore Integrates…
Lecture 1: Multi-tier Architecture Overview
Systems Analysis and Design in a Changing World, 6th Edition
Chapter 17: Client/Server Computing
NVR 3 Corporate
SAMANVITHA RAMAYANAM 18TH FEBRUARY 2010 CPE 691
Telecommunications, the Internet, and Wireless Technology
WHY VIDEO SURVELLIANCE
Mobile Commerce and Ubiquitous Computing
#01 Client/Server Computing
Discussion Issues on IMS-based NGN
Distributed Systems and Algorithms
Presentation transcript:

Video and Sensor Network Architecture and Displays Douglas Fidaleo Mohan Trivedi (PI) Center for Wireless COMMUNICATIONS

Overview Sensor data can be overwhelming especially with visual (video) sensors Transmission of higher level semantic content rather than low level detail Network architecture in support of this goal

Network Architecture: Goals Data warehouse Flexibility Reconfigurability Easily Scalable Bi-directional communication Simulated sensor-to-sensor communication Sensors 2-3 min Scalability is especially important for sensor networks as there are so many types of sensors: GPS, Text message from PDA, seismic, temperature, fluid flow, video. And they come in totally different packages: Cameras come on cell phones, PDAs, fixed video feeds, controllable PTZ cameras. Bidirectionality: Most sensor networks are designed to collect information from point sources and transmit to a single data warehouse. These architectures don’t allow for adaptaptive sensing of the environment. For example, each local node likely has little analytical power, so most of the analysis is occuring off site…but what if that off-site processor determines that some change in sensing will make the information more useful…we need to be able to communicate that back to the sensor. A simple example of this is the PTZ unit of a video sensor. If the analysis module determines that there is something of interest in the scene, it should be able to send a control signal to the PTZ unit to allow it to focus in on the event. This is also essential for selective capture of events…for example, for high power or bandwidth sensors, we may not want to or be able to consistently capture information…we can hoewever, use a control signal to trigger the capture at times that are most relevant.

Observation Application Network Architecture Clients Database Application Observation Application GPS Cell phone Tablet PC Seismic sensor General framework Thin clients XML data packets Bi-directional communication Independent video server Video Analysis Application Server (2-3 min) Describe general architecture: thin clients, XML packets, bidirectional, Explain how different modules can be instantiated as examples of clients Explain how video must be handled differently as it is streaming data Show direct video server connections. Clients can feed extracted events onto the network.

Mobile Visual Communicator Clients Clients Database Application Observation Application GPS Cell phone Tablet PC Seismic sensor Tablet PC Wireless transmission and visualization of user position Remote mobile video observations snapshots GPS Video Analysis Application Server Server (2-3 min) Describe general architecture: thin clients, XML packets, bidirectional, Explain how different modules can be instantiated as examples of clients Explain how video must be handled differently as it is streaming data Show direct video server connections. Clients can feed extracted events onto the network.

Demo application:

Current Implementation Server built on top of Fortress online game server Secure client authentication Secure communication channels Added sensor network Java API Thin client Data descriptors Message routing and filtering Current implementation uses the Fortress online game server as the glue to provide basic secure client authentication and packet handling. We have developed a layer on top of this to handle client message filters and routing of packets. We have also developed a set of thin clients in Java for interfacing to the server.

Visualization and Interfaces Direct visualization of data streams Temperature gauge Embedded visualization GPS location on a spatial map Video augmented 2D maps Data abstraction and interpretation The NeST is intended to be a flexible backbone for event capture, but there are other challenges such visualization of the data streams. Again there are several different levels at which we can approach this: T A very important area of exploration is how to abstract and make sense of the abundance of sensor data. If we have a mish-mash of thousands of sensors, it is clearly impossible to directly visualize each sensor, whether they are embedded or not. For certain domains it may be possible to simply pick out certain sensors that are problematic with a beacon, but we may require more in-depth understanding.

Data Abstraction: The SimCity Analogy City is populated with sensors Advisors make sense of data Provide feedback to operator (Mayor) An interesting analogy here are the “advisors” in the game SimCity. The game is effectively a set of virtual sensors, and the advisor’s role is to make sense of the information and point out to the Mayor the areas that must be addressed. The advisor’s each have specific roles and goals, but their primary function is to interface between the abundant sensor data and the “operator”.

Future Plans: Short Term Security and Privacy Client-server architecture enhancement Sensor control API Application APIs Interface existing capture and analysis modules Face recognition, Body posture analysis, Body tracking Integrate a wider variety of sensors and processing clients RFIDs, PDAs, Cell phones Security: Can easily secure the connection channels between the clients and the server, but also need a way to restrict access to data Privacy: User selectable tracking is a first step. But the issue is more complicated. Object tracking generally occurs before identification, so there may be an implicit record of where you were for the last 5 minutes, before the system actually knows that this record belongs to you. So you can say “only track those objects for whom you have the identity”, but this excludes a huge portion of potentially useful information.

Future Plans: Longer Term Large scale data abstraction and human interfacing (aka the SimCity model) Sensor data archiving (DB)