Mobile phone based environment control/security system Christopher Carroll B.E. Electronic and Computer Engineering.

Slides:



Advertisements
Similar presentations
Introduction to Unlicensed Mobile Access. Contents Basic Concept Operation Overview Major Advantages.
Advertisements

Mobil game : A mobile game is a video game played on a mobile phone, smartphone, PDA, handheld computer or portable media player Type of language writing.
By Amelia Hart.  Both have a lot in common:  1. Both are Linux-based operating systems for smartphones that have been put together by companies best.
What’s new in this release? September 6, Milestone Systems Confidential Milestone’s September release 2012 XProtect ® Web Client 1 Connect instantly.
App Development on Android
TEMPLATE DESIGN © Bluetooth Login Key RIT Computer Engineering Senior Design Project Tim Wesley, Dan Chen Spring 2009.
 IPhone came out first and had more time to develop. (3G)  Also was developed using OS-X  Android was started as a mobile device OS acquired by google.
A Guide to major network components
System Components Hardware overview for Apollo ACS.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department Asst.Prof.Dr.Ahmet Ünveren SPRING Computer Engineering Department.
Chapter 4 Section 3.
Media Engineering and Technology 2008 Bachelor Thesis Projects Dr. Fatma Meawad.
EXPLORING COMPUTER SCIENCE UNIT 1 – HUMAN COMPUTER INTERACTIONS Introduction to Zero to Hero Blogging Project.
NFC Inventory Android App
Remote Access. What is the Remote Access Domain? remote access: the ability for an organization’s users to access its non-public computing resources from.
SURF-IT Symposium Luke Heidbrink Mentor: Mark Bachman August 26, 2011.
A+ Certification Guide Chapter 10 Mobile Devices.
Mobile Handset Hardware Architecture
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 6 1 Real-Time Communication on the Internet Exploring Wireless Networks Tutorial.
INTRODUCTION TO MOBILE COMPUTING. MOBILE COMPUTING  Mobile computing is the act of interacting with a computer through the use of a mobile device. 
Telecommunications. General Information Industry: Telecommunication Industry Patent Number: (US Patent) Title: Electronic Device Security.
Cloud Control Senior Project Summer Overview Cloud Control is a platform to control data transmission to/from internet connected devices from the.
1 CHAPTER 18 Creating a Wireless Organization. 2 Learning Outcomes Explain how a wireless device helps an organization conduct business anytime, anywhere,
Chapter 5: Computer Networks
Adviser: Yih-Ran Sheu Adviser : Yih-Ran Sheu Student : Shin-hao Wang SN:MA Mohammed A Qadeer Dept of Computer Engg Aligarh Muslim University, Aligarh,
Basic Computer Components. What’s inside your computer?
Performance analysis and prediction of physically mobile systems Point view: Computational devices including Mobile phones are expanding. Different infrastructure.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
Bluetooth POP3 Relay Project Benjamin Kennedy April 30 th, 2002.
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Near Field Communication: Experiments with Android Michael Humphries.
Embedded Systems Mohammad A. Gowayyed (c) 2012 Mohammad A. Gowayyed1.
Secure Search Engine Ivan Zhou Xinyi Dong. Introduction  The Secure Search Engine project is a search engine that utilizes special modules to test the.
Project and programme NHS It is a research and development system, is also used to find achievable milestones or to find risks, it will also manage documentation.
1 Android- Platform Overview. 2 What is Android? Android is a software stack for mobile devices that includes an operating system, middleware and key.
Android Husam Abdel Rahman. Introduction Android Operating system is most popular operating system these days with the advance in voice communications.
Rider/Drive r Major Modules Cloud Personal Data Routing Data Phone Interfaces Browser Interface.
Ubiquitous learning. What is ubiquitous learning? Computing and communication technologies Characteristics of ubiquitous learning Context and ubiquitous.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
BY: JAILYN WILLIAMS COMPUTER SOFTWARE ENGINEER. HOW TO BECOME? To become a Computer Software Engineer First you have to take classes for Computer Science.
Home Media Centre Smart Interface Demonstration School of Information Technologies University of Sydney.
Rick Conrad Efrain Lopez III Saeed Noori. What is Experience Sampling? Survey method People’s experiences Real-time Format Paper and Pencil Handheld devices.
G063 - Standards & Protocols. Learning Objectives: By the end of this topic you will be able to: explain the importance of standards for communicating.
Final Presentation for Senior Project April 25, of 25 Jarrett Allen Luis Cintron Michael Kubacki Robert Skinner Department of Computer Science and.
Power Wheelchairs and Integrated Controls Allison Fracchia George Gober.
Background Nowadays, different software systems developed in- house are growing; companies or organization is facing problems of new collaborations and.
I4ma Server Overview. High Level Architecture Internet Mobile Device Web Browser I4ma Server SMS SMS Service.
Mobile Phone Based Environment Control/Security System Christopher Carroll B.E. Electronic and Computer Engineering.
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
For Wi-Fi The is internationally describing characteristics of a wireless local network. It was named after a group of people who invented.
Gregory Dunn Paul LaMotte Alex Nesteruk.  Manage inventory for small businesses  Analyze sales/inventory data  Easy, mobile access to the data  Aid.
Cloud Computing 12/7/ Traditional Computing Hardware – Computers with CPU (hardware) – Storage (hard disk or other materials) – Software packages.
Home and Personal Communication Systems Lesson 7 – Personal Connections.
link2 is a GPS software application designed specifically to link professionals.
Smart Surveillance Technology Javier OcasioWilliam Sanchez Mariel MartinezAbraham Diaz.
An Online learning journal system. Staff record children's progress and activities using tablet devices and PCs. Parents can view their child’s journal.
MODEM B Y K H U S H. With the evolution of technology, world has contracted in to a small village. One single click on your computer can connect you to.
Introduction for Personal Area Networks including Infrared, Bluetooth, and Near-Field Communication. Presented By Valerie Lim.
Smart Instant HKU Context-aware Instant Messenger for Mobile Users Supervisor: Dr.Cho-Li Wang CS Final Year Project (Year )
IDENTIFY COMPUTER FUNDAMENTALS A COMPUTER IS A ELECTRONIC DEVICE THAT PERFORMS THE FOUR BASIC OPERATIONS THAT COMPRISE THE INFORMATION PROCESSING CYCLE.
 There are many android hack tool given on the internet that promises to give you best performance. But unfortunately most of the android hack tool are.
Able to transfer and adapt their skills Able to understand the consequences of their actions Able to use software and devices efficiently Responsible.
By : Abhishek Verma Main Topics : 1. Introduction 2. Platform 3. Software Development 4. Overall Evaluation.
Information Technology Part 2. Part2-2 Next Three Chapters Copyright © 2016 Pearson Education, Inc. Chapter 4 discusses hardware, software, and mobile.
ICT Unit 4: Network and the effects of using them
 Gmail is a free webmail service, developed by Google.  Gmail also supports advertising.  Users can access Gmail on the desktop, laptop or through.
What Is Tapestry? An Online learning journal system.
What is an Operating System?
Unit I Flash Cards Start.
COMPUTER NETWORKS AND THE INTERNET Chapter 6
Presentation transcript:

Mobile phone based environment control/security system Christopher Carroll B.E. Electronic and Computer Engineering

Micro Blogging Alarm Lights Heater Kettle Radio Bluetooth Device System Overview SMS Device Mobile Phone Everything Okay? Password

Milestones Background research, analysis of similar systems and identification of hardware and software components to be used Develop Java phone application to communicate with Bluetooth device Control of external devices such as lights, heater, kettle, radio and alarm using Bluetooth technology Modify system to also include the use of SMS to control devices when outside Bluetooth connectivity range

Milestones Use of micro blogging (SMOB) to record history of system control Extend system to communicate with elderly/disabled user to assess situation. Automatically contact carer if help required Explore adaptation of system for use via a Google Android application