Milestone #1 – Project Design Chris Thomas CS 2310 – Software Engineering.

Slides:



Advertisements
Similar presentations
Network II.5 simulator ..
Advertisements

General Information Software Robot Benri. Characteristics 1. Connect up to 16 cameras. 2. Do six different type of detections. 3. Define sub-areas where.
Fuzzy Logic and its Application to Web Caching
System Concepts. What is a System? Set of inter-related components with a clearly defined boundary Working together to achieve objectives.
Problem Description Security systems use many different inputs to alert the owners, but can do very little as far as actively deterring intruders and.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 10 Performance Tuning.
Linkage Connecting system components. Allows configuring automatic actions Triggering outputs based on specific inputs Used for removing human reliance.
Katie Dellaquila Jeremy Nelson Khiem Tong.  Project Overview [KED]  Multidisciplinary Aspects [KED]  Motivation (Similar Products) [KED]  System Schematic.
Chapter 1 System Concepts. Announcement The Pre-lab must be completed before lab. Let me show you what to do…
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
Prototyping. CS351 - Software Engineering (AY2004)2 Scenario Customer: “We would like the word processor to check the spelling of what is typed in. We.
OUTLINE WHAT ? HOW ? WHY ? BLUEPOST Poster and Message Content Specified by the User Displaying the Poster Content on a Monitor Sending Messages to.
11 MONITORING MICROSOFT WINDOWS SERVER 2003 Chapter 3.
© 2006 Carnegie Mellon Robotics Academy Designed for use with the LEGO MINDSTORMS ® Education NXT Software and Base Set #9797 Sentry System One-Way Communication.
Behavior Analysis Midterm Report Lipov Irina Ravid Dan Kotek Tommer.
DISTRIBUTED PROCESS IMPLEMENTAION BHAVIN KANSARA.
MileStone1 Thermometer SIS WEI GUO. System Overview Goal: Help senior citizen form thermometer data, and warning the abnormal thermometer. Input processor.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Department of Computer Science MILE STONE 1 Hospital Finder Component for SIS System Anatoli Shein
Hjemmeeksamen 1 INF3190. Oppgave Develop a monitoring/administration tool which allows an administrator to use a client to monitor all processes running.
Wen-Chyi Lin CS2310 Software Engineering.  “Never express yourself more clearly than you are able to think” by Niels Bohr. However, there are times and.
Computer System Lifecycle Chapter 1. Introduction Computer System users, administrators, and designers are all interested in performance evaluation. Whether.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 13 Slide 1 Application architectures.
Department of Computer Science Virtual Attendant for Mild Cognitive Impaired Patients CS2310: Multimedia Software Engineering Daniel Petrov School of Arts.
Web Interface for Health Care Database Priyanka Walke.
MCTS Guide to Microsoft Windows 7
1 Validation & Verification Chapter VALIDATION & VERIFICATION Very Difficult Very Important Conceptually distinct, but performed simultaneously.
Course Presentation EEL5881, Fall, 2003 Project: Network Reliability Tests Project: Network Reliability Tests Team: Gladiator Team: Gladiator Shuxin Li.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Marcel Casado NCAR/RAP WEATHER WARNING TOOL NCAR.
Looking at systems. What is a SYSTEM? The radiator makes the room warmer by turning ON when the temperature of the room is lower than required The THERMOSTAT.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Little Brother Surveillance Nathaniel Brown and Chris Mordue.
A Review by Raghu Rangan WPI CS525 September 19, 2012 An Early Warning System Based on Reputation for Energy Control Systems.
IT Introduction to Information Technology CHAPTER 01.
April 2004 At A Glance CAT is a highly portable exception monitoring and action agent that automates a set of ground system functions. Benefits Automates.
System Initialization 1)User starts application. 2)Client loads settings. 3)Client loads contact address book. 4)Client displays contact list. 5)Client.
Kinect Monitor SIS Server Kinect Sensor Some Monitor... Uploader GUI Universal Interface Health Sensors Input Processor
1 DREAMS NOTIFIER Vijaya Mekala The University of Texas Health Science Center at Houston Arden Syntax SIG Jan 14, 2003, San Antonio, TX.
IPower: An Energy Conservation System for Intelligent Buildings International Journal of Sensor Networks Yu-Chee Tseng, You-Chiun Wang, and Lun- Wu Yeh.
Module 15 Monitoring SQL Server 2008 R2 with Alerts and Notifications.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Click to edit Master title style Ramsey Baker Kunal Parbadia Radford Parker Rohit Sahay David Salazar SecurityCam Single Modular Wi-Fi Enabled Security.
Milestone 1 Senhua Chang. System Overview The health Care SIS can help a senior citizen who may not be computer-literate. What my project mainly contains.
Course Presentation EEL5881, Fall, 2003 Project: Network Reliability Tests Project: Network Reliability Tests Team Client: Dr. Joseph Berrios Team Client:
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Information Systems Analysis and Design Reviews of IS and Software Process Spring Semester
Monitoring and Managing Server Performance. Server Monitoring To become familiar with the server’s performance – typical behavior Prevent problems before.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
August 2003 At A Glance The IRC is a platform independent, extensible, and adaptive framework that provides robust, interactive, and distributed control.
Correlator GUI Sonja Vrcic Socorro, April 3, 2006.
Mile stone 1 Project report Anh Phan Nguyen
T EST T OOLS U NIT VI This unit contains the overview of the test tools. Also prerequisites for applying these tools, tools selection and implementation.
DataTAG is a project funded by the European Union International School on Grid Computing, 23 Jul 2003 – n o 1 GridICE The eyes of the grid PART I. Introduction.
Front Panel A generic PVSS GUI for device control PP a-MMA_FrontPanel.pptm Front Panel - A generic PVSS GUI for device control 1.
Nguyen Thi Thanh Nha HMCL by Roelof Kemp, Nicholas Palmer, Thilo Kielmann, and Henri Bal MOBICASE 2010, LNICST 2012 Cuckoo: A Computation Offloading Framework.
VIDYA PRATISHTHAN’S COLLEGE OF ENGINEERING, BARAMATI.
SQL Database Management
Excuber ' Product introduction.
HARDWARE The hardware is the part you can see the computer, ie all components of their physical structure. The screen, keyboard, and mouse tower of the.
Technology Literacy Hardware.
Object Modeling Approach
Initial job submission and monitoring efforts with JClarens
Input-Output-Process Demo
Identifying Slow HTTP DoS/DDoS Attacks against Web Servers DEPARTMENT ANDDepartment of Computer Science & Information SPECIALIZATIONTechnology, University.
OpenSec:Policy-Based Security Using Software-Defined Networking
CS 2310 Course Project Qiao Zhang.
Model-based Adaptation for Self-Healing Systems David Garlan, Bradley Schmert ELSEVIER Sciences of Computer Programming 57 (2005) 이경렬
Presentation transcript:

Milestone #1 – Project Design Chris Thomas CS 2310 – Software Engineering

Motivation Monitoring of pets is more complicated and time consuming than initially seems Pets often become neglected if not monitored This project demonstrates monitoring a pet snake’s behavior Heater gets set high (around 110 degrees) – certain times of year it needs high eat and also after eating or if sick it wants high heat Also some heat gets lost because heater is under the tank If the snake doesn’t want the high heat it will sit in the water bowl or drink frequently from the water bowl If this is observed the heat should be adjusted, but if the heat is under 87 degrees and observed, no adjustment should be made

Physical System Design

Software Design

Component Descriptions Universal Interface - Any message sent from one component to another component will be displayed on the right panel. (It is for testing the system and observing all messages in SIS system). SIS Server – Routes all messages and processes them. Uses messages Create, Kill, and Activate to create, kill, or activate components. GUI Interface – Just an interface for specifying thresholds and rule parameters which are used by the Fuzzy Logic Engine. The GUI just stores the parameters; no logic is in the GUI component. Contactor – Accepts a MSG 38 message and sends an ALERT to owner. Fuzzy Logic Engine – Implements the fuzzy logic rules for determining whether a problem exists based on image and temperature data. Temperature Capturer (Fake) – PRJREMOTE.exe will generate temperature readings or it will just read them from a file and broadcast them. We will not actually use the thermostat here. Message 31 is defined as containing temperature readings which get broadcast. Camera Input Capturer – Captures Frames from Webcam or Kinnect and stores them for use by Image Processor. Sends MSG 33 to notify SIS of new image. Image Processor – Receives MSG 33 and loads image of timestamp in MSG. Perform SURF Object detection to detect whether snake head is present or snake body is also present in the water bowl. Outputs message 34 with the SURF values for the snake head (drinking) and body (in bowl) Fuzzy Logic Engine – Implements the fuzzy decision rule algorithm described in the paper I chose. If the conditions seem anomalous, MSG 38 is generated to alert user of the anomaly and that temperature is hot. Receives message 34 and message 31.

SIS Messages Message 20: Used to Create Components Message 23: Used to Connect Component to SIS server Message 31: Temperature Reading Message 33: Image Capture Notification Message 34: Image Computation Values Message 38: Alert Fired

Scenarios The perceived usage scenario is the following: The owner adjusts the thermostat higher because the snake has just eaten. The owner uses the GUI to set the parameters to check every 10 seconds for the camera and the thermostat and threshold probabilities for the fuzzy learner. TempCap sends msg 31 every 10 seconds and CamCap sends message 33 every 10 seconds. CamProc accepts message 33 and performs analysis, sending message 34. The Fuzzy Learner accepts message 34 (probabilities) and message 31 (temperatures). The fuzzy learner checks the values against the fuzzy learning model specified by the user in the GUI (which is saved to the configuration file). The fuzzy model may suggest unusual behavior by the snake. If it does, it broadcasts message 38 to the SIS system. The contactor receives message 38 and triggers an alert message with statistics included provided by the fuzzy learner in message 38.