0700384_UK.PPT-1 Swarming Network for Intruder Detection Jerry A. Krill, Mike J. O‘Driscoll Johns Hopkins University - Applied Physics Laboratory.

Slides:



Advertisements
Similar presentations
Caltech Proprietary Videoconferencing Security in VRVS 3.0 and Future Videoconferencing Security in VRVS 3.0 and Future Kun Wei California Institute of.
Advertisements

CLOSED CIRCUIT TELEVISION (CCTV) SURVEILLANCE SYSTEMS
HWg-Juno HW group is a manufacturer of IP-based sensors from Prague, Czech republic. HWg delivers remote monitoring & control solutions.
Computational Model of a 5th Percentile Male Human Torso Emily Ward, Inventor Jack Roberts, Inventor Michael Kleinberger, Inventor.
Trusted Ring: A Security Enhancing Software Architecture Michael DiRossi, Inventor The Johns Hopkins University Applied Physics Laboratory.
Lighting Automation LLC 800-LED Lighting Automation Smart Lighting Systems.
CollabSpace – An Advanced Geospatial Collaboration Environment Nigel Tzeng, PI Jennifer Ockerman, Nathan Koterba, Osbaldo Cantu Johns Hopkins University.
An Information Visualization Software System to Manage Resource Access Control Policies Jaime Montemayor, Inventor Thomas Llanso, Inventor.
A GENERIC OFFICE WITHOUT THE WISENET SYSTEM A GENERIC OFFICE WITH THE WISENET SYSTEM.
EMI Systems Limited specializes in CCTV surveillance systems that ranges from stand-alone cameras to fully integrated security control centers and to the.
Social Relationship Identification in Informal, Online Communication Archives Chris Diehl, JHU/APL Galileo Namata and Lise Getoor, University of Maryland.
Wireless LAN Technology
Graph Query Language for Analyzing Data Graphs David Silberberg, Paul Frank, Wayne Bethea and John Gersh – Inventors.
Remotely Directed Vehicle Inspection System Protagoras Cutchis, Inventor.
SMART HOMES The way we nest now Suhasini K Vamsi Priya V Sushmitha K.
Unbounded media have network signals that are not bound by any type of fiber or cable; hence, they are also called wireless technologies Wireless LAN.
Base Protection Lab (BPL) December 12, 2007 ONR Program Officer: William “Kip” Krebs, , Alternate POC: Annetta Burger.
Wireless LAN Technology
Wireless Tracking System Midcourse Design Review Team Members Ying W. Moy Mohammed A. Dastigir Hassan Malik Advisors Prof. Moritz Prof. Krishna Prof. Koren.
Communication Links Communication Link = Physical connection or Physical Medium Types: Wire Pair or Twisted Pair Coaxial Cable Fiber Optics Bandwidth,
A New Household Security Robot System Based on Wireless Sensor Network Reporter :Wei-Qin Du.
Chapter Preview  In this chapter, we will study:  The basic components of a telecomm system  The technologies used in telecomm systems  Various ways.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
Towards Higher Assurance Software Construction via Aspects Thomas Llansó, Inventor.
ENGINEERING APPLICATIONS Telecommunication Long Distance Communication Handle large number of channels Signalling purposes Computer Networks Connecting.
WLAN. A wireless LAN, or WLANLAN WLAN, is a local area network that does not have wired Ethernet connections. A WLAN can be either an extension to a current.
Fire Detection Presentation
1 Lecture Network Media Media refers to the means used to link a network's nodes together communications channel is the transmission media on which.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Wireless LAN Technology.
Communications & Networks
Use amateur radio in the VHF and UHF bands to obtain a greater range compared to past races Due to signal propagation limits, a repeater is used to increase.
Service Section Technical Training Dec A Standard Wireless Networking Protocol Zigbee Wireless Technology.
The special unit for special tasks.  Installation possibilities Private area Special object Industrial park.
Sensors and Actuator Network Based Architectures and Protocols for Smart Homes Bluetooth enabled Smart Home Mark Shaw Giorgio Politano Supervisor: Mieso.
Chapter 11: Wireless LANs Business Data Communications, 6e.
Agenda Item: GSC 2GSC The IEEE Standards Association Serving Global Standardization Through Openness and Collaboration GSC April - 1 May 2003.
A Mobile Sensor Network Using Autonomously Controlled Animals Yihan Li, Shivendra S. Panwar and Srinivas Burugupalli New York State Center for Advanced.
Capability Based Planning Methodology and Tool Karen Kohri, Jeff Brown Clarence Wong, Chris Latimer Inventors.
HPC use in Testing Ad Hoc Wireless Sensor Networks
High Value Research Sweet Sixteen Maryland State Highway Administration Allison Hardt.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
For: Communication Technology 2201 By: Chris Murphy.
A First Look at WirelessHART ® An e-book by Pepperl+Fuchs.
Week 12 (2012) Dr. Ghada Drahem. INTENDED LEARNING OUTCOMES This lecture covers: Networking concepts and terminology Common networking and communications.
Copyright © 2007 Wavetrend (US) Inc. 1 A World Leader in the Deployment of Active RFID (Radio Frequency Identification) Solutions.
FBI Unveils Next-Gen IT Strategy By Antoine Tadros May 20, 2010.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 23 Wireless LAN Technology Layer 1&2.
Human Alive Detection and Locating the Detection Area Using GPS and XBee Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Vehicle Identification Study Ingress/egress to a parking area For private audience and use only October 2015.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Presented by : Rashmy Balasubramanian.  Aimed at saving endangered species of turtle in Ontario  The WSN gathers information regarding risks factors.
Advanced AMR Utilizing a Radio Mesh Network In Rural Electric Cooperatives Matthew Ryan Advanced AMR
Introduction for Personal Area Networks including Infrared, Bluetooth, and Near-Field Communication. Presented By Valerie Lim.
WIRELESS INTEGRATED NETWORK SENSORS
Realization of Home Appliances Control System based on Power Line Communication Technology.
Wireless LAN Technology Chapter 13. Wireless LAN Applications LAN Extension Cross-building interconnect Nomadic Access Ad hoc networking.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
1. 2 The electrocardiograph (ECG) is an instrument, which records the electrical activity of the heart. Electrical signal from the heart characteristically.
High Altitude Long Operation
Residential Security, Access Control, and Surveillance Copyright © 2005 Heathkit Company, Inc. All Rights Reserved Presentation 3 – Motion Detection.
Universal IR Controller -- Home Automation. Universal IR Controller Features 360° full range IR launch Wifi, RF communication Remote control Delicate.
The Physical Security in UTM NAWAF OMAR MAN Prof Hafiza Abas.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Wireless LAN Technology.
Light Communication Use-Cases
Wireless LAN Technology
Smart Zone Sensing With Auto Breaking System Using ARM
Wireless LAN Technology
Communication Systems Continuous Signals and Systems Optical communications Inforamtion and communication systems security Software for communications.
Wireless LAN.
Presentation transcript:

_UK.PPT-1 Swarming Network for Intruder Detection Jerry A. Krill, Mike J. O‘Driscoll Johns Hopkins University - Applied Physics Laboratory

_UK.PPT-2 Background Various video and infrared (IR) monitoring methods exist today to monitor and control access –Video monitoring –IR moving object detectors –IR tripwire paths We propose a new approach to intruder detection and location – a swarming sensor network

_UK.PPT-3 Basic Technology Many sensor “pebbles” connected in a very simple network Act as cueing nodes using an influential form of communications without protocols Swarming of pebble behavior in response to cue stimulation from pebbles Means to remotely monitor the sensor network

_UK.PPT-4 Pebble Configuration Sensor Window Protective, Disguised Cover transmit / receive RF antennas Solar Cells Sensor Window 1-2 cm diameter

_UK.PPT-5 Elements of the Network Corporate Facilities Security Office Remote Receivers Sensor “Pebble Field”

_UK.PPT-6 Intruder Detection Corporate Facilities Security Office Remote Receivers Sensor “Pebble Field”

_UK.PPT-7 Intruder Detection via Microwave Signal Blockage All nodes operate on communications frequency Several nodes act as “illuminators” Corporate Facilities Security Office Remote Receivers Sensor “Pebble Field”

_UK.PPT-8 Commercial Applications Means to monitor security zones –difficult to counter –highly automated and relatively inexpensive Scalable from room size to many square miles –Examples: Offices  Industrial complexes Malls  Utility installations Office buildings  Military test ranges Existing designs provide a practical starting point for rapid prototyping

_UK.PPT-9 Contact Information To be presented at 3 rd International Conference on Intelligent Sensors, Sensor Networks, and Information Processing (ISSNIP) 2007 For technical information contact: Mike O’Driscoll, Inventor For licensing information contact: John Bacon, Technology Manager Office of Technology Transfer The Johns Hopkins University Applied Physics Laboratory Johns Hopkins Road Laurel, MD