Modern Software Engineering for Distributed Embedded Systems Joseph Voelmle, Carlos Daboin, Joanne Sirois, Josh Gallegos Mentor: Dr. Janusz Zalewski.

Slides:



Advertisements
Similar presentations
1 iHome Automation System Home Automation System Team: Million Dollar Contingency Regiment Adam Doehling Chris Manning Ryan Patterson.
Advertisements

“NEFTOGAZ TECH” LLC President of the Group of companies “ND” Leonid Pashkevych, 2014 Specialized presentation about the System of complex automation of.
Mark Heggli Consultant to the World Bank Expert Real-time Hydrology Information Systems Workshop Module 4: Data Management Solutions for a Modernized HIS.
June 2010 At A Glance The Room Alert Adapter software in conjunction with AVTECH Room Alert™ devices assists in monitoring computer room environments as.
Managing Data from Avian Radar Systems Edwin Herricks, PhD Siddhartha Majumdar.
Acceptable Use Policy (or Fair Use): For Users of Computers and other technology.
RFID Enabled Access Limited (R.E.A.L.) Security Christopher Lange, Team Leader Clinton Plaza Paul Brown David Kenney.
VxWorks Real-Time Kernel Connectivity
SMART HOMES The way we nest now Suhasini K Vamsi Priya V Sushmitha K.
2008/7/3 NanoMon: An Adaptable Sensor Network Monitoring Software Misun Yu, Haeyong Kim, and Pyeongsoo Mah Embedded S/W Research Division Electronics and.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Number:D1123 Supervisor: Erez Zilber Semester:Spring 2004 Final Presentation.
Remote Surveillance Vehicle Design Review By: Bill Burgdorf Tom Fisher Eleni Binopolus-Rumayor.
Series DATA MANAGEMENT. 1 Why ? Alarm/Status Notification –Remote unattended sites »Pumping stations –Pharmaceutical/Plant maintenance.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
Energy Smart Room GROUP 9 PRESENTERS DEMO DATE SPECIAL THANKS TO ADVISOR PRESENTERS Thursday April 19, 2007 Department of Electrical and Systems Engineering.
Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 2, p.p. 980 – 984, July 2011 Cross Strait Quad-Regional Radio Science.
Building an Application Server for Home Network based on Android Platform Yi-hsien Liao Supervised by : Dr. Chao-huang Wei Department of Electrical Engineering.
Smart Mail lets you send and receive s from your mobile phone in a quick and easy way using your favorite mail account.
SCADA and Telemetry Presented By:.
E-LABORATORY PRACTICAL TEACHING FOR APPLIED ENGINEERING SCIENCES OPEN DAY University of Oradea 12 March 2012 Project HURO/0901/028 Acronym: EPRAS Pavel.
STRATEGIES INVOLVED IN REMOTE COMPUTATION
Presented by Amira Ahmed El-Sharkawy Ibrahim.  There are six of eight turtle species in Ontario are listed as endangered, threatened or of special concern.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
LOD Surveillance System Jamie Creech Software Engineer.
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Tells - a facility for web-based, remote real time laboratory experiments University of Limerick Ireland.
 The ability to develop step by step procedures for solving problems  She uses algorithmic thinking by setting up her charts.
NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented by: Santosh kumar Swain Technical Seminar Presentation by SANTOSH KUMAR SWAIN Roll # CS
Data Acquisition Dr inż. ZDZISŁAW PÓLKOWSKI Polkowice, 2015 University of Pitesti Dolnośląska Wyższa Szkoła Przedsiębiorczości i Techniki w Polkowicach.
Team 16 : MedFRS Device Diagnostic Software Misha DowdProject Manager Delnaz GundeviaLife Cycle Planner Anfal Abdul JaleelSystem Architect Nanda Kishore.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Grid-based Sensor Network Service on Future Internet By Mohammad Mehedi Hassan Student ID:
Building Information Exchange with First Responders (BIEFR) David Holmberg, NIST June 11, 2009 Slides credit to Alan Vinh.
2A – Acquisition and Automation technology Application Features Summary.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Topics of presentation
The group will focus on the design of a “smart” device. This includes researching the best method of design and fabricating the design to create a working.
Grid-based Future Internet with Wireless sensor network By Mohammad Mehedi Hassan Student ID:
RFID Enabled Access Limited (R.E.A.L.) Security Christopher Lange, Team Leader Clinton Plaza Paul Brown David Kenney.
$20 billion business 230 million printers sold  170 million inkjet  60 million laserjet #1 in ink, laser, scanners, designjet, print servers Consistent.
“ Getting to Know Networks”. What Is a Network? A network is a collection of computers hooked up together, usually by cables or telephone wires, for the.
ISU Science Center : Phase 3 : Dec Speedometer Station This station matches two areas of study into one cohesive system. Current will be induced.
Click to edit Master title style Ramsey Baker Kunal Parbadia Radford Parker Rohit Sahay David Salazar SecurityCam Single Modular Wi-Fi Enabled Security.
Hands-on Teleoperation TARET Winter School Villach, February 5 –16, 2007 Darko Hercog.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
Embedded Design Using ARM For Strong Room Security System
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Background Real-time environmental monitoring is a field garnering an ever-increasing amount of attention. The ability for sensors to make and publish.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Name Of The College & Dept
Computer Science, Software Engineering & Robotics Workshop, FGCU, April 27-28, 2012 Remotely Controlled Robotic Arm Kyle Rosier Adrian Saldivar Computer.
Automated Data Capture Technologies O It is often necessary or convenient to capture data automatically, for example the delivery of a package by an Cable.
TECHDOTCOMP SUPPORT TECHDOTCOMP nd Ave, Seattle, WA 98122, USA Phone:
SPK – 4 Golomazov Artem in my life. Hello! My name is Artem and I’d like to tell you about Information Technology by using Information Technology! It.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Fermilab Scientific Computing Division Fermi National Accelerator Laboratory, Batavia, Illinois, USA. Off-the-Shelf Hardware and Software DAQ Performance.
NETWORK VIDEO SURVEILLANCE. CCTV Closed-Circuit Television (CCTV) is the use of video cameras to transmit signal to a specific place on a designated device.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
BUILDING AND IMPLEMENT A EMBEDDED WEB SERVER BASE ON TCP/IP STACK WITH A SoC PLATFORM Professor : CHI-JO WANG Name : Bui Quang Hoa (M982b211)
Components of information systems
Information Technology Deanship
How SCADA Systems Work?.
Data Management Solutions for a Modernized HIS
Computer Technology Notes #4
PLC / SCADA / HMI Controllers: Name : Muhammad Zunair Comsats University Date: 28-October-2018.
Rapid Automation Design
REMOTE POWER MONITORING OF MARINE SITES
Presentation transcript:

Modern Software Engineering for Distributed Embedded Systems Joseph Voelmle, Carlos Daboin, Joanne Sirois, Josh Gallegos Mentor: Dr. Janusz Zalewski

Abstract In this project we look at three approaches to solving the problem of remote measurement and control using embedded systems. The first approach, RFID (Radio Frequency ID), is used in many different industries to improve productivity and help with loss prevention. It provides tracking of inventory as it passes through a building, by setting up an array of sensors, effective loss prevention, as items have better accountability, time management properties, as an item “production time” can be monitored, and assurance of job quality, as items must pass through particular doors in time frames. The second approach involves data transmission surveillance and control to a remote site from a remote computer using the eBox It is a device accessible to clients/users via a network. In this application we use it to transmit video, temperatures, and webcam rotation commands. The third approach deals with the issue of data acquisition systems which need to be monitored frequently. If errors occur in the readings provided by sensors and instruments, the results could be considered completely worthless. That is why issues have to be resolved as quickly as possible. One solution is based on the one developed at Fermilab, which gives technicians the ability to see the status of data acquisition devices quickly through any computer with an Internet connection.

Introduction The eBox 2300 makes use of a video surveillance web camera, the temperature sensor, and a servo motor to track and control environmental changes on a remote site that have access to a network. eBox uses Windows CE Operating System and is programmed in C# The Single Board Computer (SBC) runs Wind River VxWorks Real Time Operating System. The SBC runs a web server that automates the surveillance of a data acquisition system connected to it. It allows the taking of reliable readings remotely using specific measurement instruments. It helps monitor these instruments via the Internet RFID technology uses a device that can sniff out electric tags in the surrounding area, which have unique information associated with them. If ten tags are in the area, then they can all be noticed and logged. This has countless applications in commercial and military environments, allowing inventory, timekeeping and accountability for a number of objects. It can be put in cell phones to track employees through buildings, can be placed on animals to locate subjects immediately by unique identifiers, or can make barcode scanning of hundreds of items go from an hour long project to a second. Also, unlike barcodes, it can be done at a distance and from angles, circumventing frustrating operational parameters required for barcode scanners.

Equipment Configuration eBox Network DiagramVxWorks Context Diagram RFID Wiring Schematic

Solution eBox Structure Diagram VxWorks Message format for DAQ Devices RFIDApp Class - responsible for switching between the various panels, giving the user the proper display

Experiments eBox Performance vs. the number of Threads Number of readings per distance of the RFID sensor for three tags

Conclusions The purpose of using the eBox 2300 is to make devices accessible for remote users. The communication between the eBox 2300 and the remote user is over network infrastructures. The eBox 2300 approach demonstrates the successful use of a network to communicate with remote devices. However, the study indicates that with the increase of the number of users, the performance of the system may suffer significantly because of the increased number of program threads. RFID technology offers a very simple capability: When a tag passes nearby, it records it with a unique identifier and a timestamp. All of the applications of this sort of technology are extensions on this very basic ability. Our study indicates a significant degradation of signal’s power with distance, so only certain types of tags will have to be selected for particular applications. For the VxWorks Real-Time Kernel, connectivity and a host web server which collects information from a set of data acquisition devices that have their own specialized web servers installed on them we demonstrated the viability of this approach. To take the project to the next level, the information from the devices has to be published it to a viewable webpage