Prerequisites: -Emotiv headset (aprox. 300 $) - Head (you should have one)

Slides:



Advertisements
Similar presentations
Lecture 6 Testing and Debugging on a Physical Android Device and other Power User Stuff.
Advertisements

The Patient Held Record Your Health in Your Hands.
Computer networks Fundamentals of Information Technology Session 6.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
1 Ports and IPv6. 2 Ports Transmission Control Protocol (TCP) or the User Datagram Protocol (UDP), used for communication Generally speaking, a computer.
NEUROPHONE: BRAIN- MOBILE PHONE INTERFACE USING A WIRELESS EEG HEADSET Andrew T. Campbell, Tanzeem Choudhury, Shaohan Hu, Hong Lu, Matthew K. Mukerjee!,
Computer Science 6390 – Advanced Computer Networks Dr. Jorge A. Cobb How to provide Inter-domain multicast routing? PIM-SM MSDP MBGP.
Cluster Computing and Genetic Algorithms With ClusterKnoppix David Tabachnick.
TCP/IP Protocol Suite 1 Chapter 18 Upon completion you will be able to: Remote Login: Telnet Understand how TELNET works Understand the role of NVT in.
A CHAT CLIENT-SERVER MODULE IN JAVA BY MAHTAB M HUSSAIN MAYANK MOHAN ISE 582 FALL 2003 PROJECT.
Reliable Networking Systems The goals: Implement a reliable network application of a file sharing network. Implement a reliable network application of.
DCP: The Datagram Control Protocol Eiman Zolfaghari E190 – Technical Communications Professor Hatton April 2002.
● To make a presentable way to show the nurse the information on each patient that needs to be monitored ● We take data from the sensors taken from the.
NetComm Wireless SMS Forwarding Feature Spotlight.
Asymmetric encryption. Asymmetric encryption, often called "public key" encryption, allows Alice to send Bob an encrypted message without a shared secret.
SURVEY VIEWER HYPACK Sending SURVEY Windows Across the Network to Non-HYPACK Computers. HYPACK Computer Non-HYPACK Computer Running SURVEY VIEWER.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
NETWORKING PRACTICAL EXAMPLE. REQUIRED HARDWARE BASICS Network Interface Card Ethernet Cable Client Server.
Researchers turn USB cable into attack tool 報告人:劉旭哲.
VNC Greg Fankhanel Jessica Nunn Jennifer Romero. What is it? Stands for Virtual Network Computing It is remote control software which allows you to view.
Brain-Computer-Interface for Stress Detection Hassan Farooq, Ilona Wong Supervisor: Steve Mann Administrator: Cristiana Amza Section 8 Collecting Brainwave.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
The University of Oklahoma Virtual Private Network How it works.
© Lethbridge/Laganière 2005 Chap. 3: Basing Development on Reusable Technology The Client-Server Architecture A distributed system is a system in.
CBS APPS INC. KEYBOARD CHARGER. RESOURCES Electrical wires USB Connector Protective wire coating Silicon rubber Energy converter.
Position of application layer. Application layer duties.
Presented by Rebecca Meinhold But How Does the Internet Work?
What is CrossLoop? FREE secure screen sharing utility designed for people of all technical skill levels. Connect any two PCs on Earth Available in 21 Languages.
CS101 Network Setup. Parts of a network Everything on a network is called a ____ Three main types of _____: –__________ Devices = Printers, Scanners,
Connection Establishment and Termination. Tcpdump tcpdump is a common packet analyzer that runs under the command line. It allows the user to intercept.
Computer Networks & FirewallsUniversity IT Security Office - Tom Davis, CISSP University IT Security Officer Office of the Vice.
ARP ‘n RARP. The Address Resolution Protocol (ARP) is a request sent out by a computer to find another computer’s MAC address. It already knows the IP.
Ch26 Ameera Almasoud 1 Based on Data Communications and Networking, 4th Edition. by Behrouz A. Forouzan, McGraw-Hill Companies, Inc., 2007.
SURVEY VIEWER Note: SURVEY VIEWER functions are now available from the Remote Viewing that is built into HYPACK SURVEY. SURVEY VIEWER still works, but.
A Local Area Network Chat Client ITTC LAN CHAT John Vincent Cecogo Jerikho Daguno Ardee Santos Elaine Mendoza Anjomar Pat Del Mindo Philip John Sales Philip.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
How To Set Up A Wireless Network. What is a wireless network  A wireless network is a computer network that allows computers and other electronic devices.
M2 Encryption techniques Gladys Nzita-Mak. What is encryption? Encryption is the method of having information such as text being converted into a format.
全面推开营业税改征 增值税试点政策培训. 什么是营改增? “营改增”中的“营”指的是营业税,“ 增”指的是增值税。对大多数企业来说,增 值税所带来的税负远低于营业税。 减税本身就是积极的财政政策。营改增所 实现的减税,不仅规模大、范围广,它本质 上是一种“结构性减税”,从而构成“结构 性改革”攻坚战中的实招。
VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Understand Wireless Security LESSON Security Fundamentals.
Introduction To Application Layer
Design and implementation of Cross domain cooperative firewall Jerry Cheng, Hao Yang, Starsky H.Y. Wong, Petros Zerfos, Songwu Lu UCLA Computer Science.
Networks 2 Key Revision Points.
Deep Blue Brain Drone Introduction Brain Drone Components Purpose
What is a router? A router is a device that connects multiple computers together. Not to be confused with a switch Routers transmit packets of data across.
Kerberos Kerberos is a network authentication protocol and it is designed to provide strong authentication for client server applications. It uses secret.
Topic 1: Data, information, knowledge and processing
Introduction to Networking
Brain State Modeling from EEG data through Machine Learning
TLS Receive Side Crypto Offload to NIC
Unix access in the 1970s-1980s Each monitor+keyboard directly connected to server HW (serial line) Multi-user Program on mainframe that lets you “talk”
Department of Computer Science University of Calgary
File Transfer Protocol
Remote Login: Telnet Objectives Chapter 18
SSH: SECURE LOGIN CONNECTIONS OVER THE INTERNET
Firewalls Routers, Switches, Hubs VPNs
The Secure Sockets Layer (SSL) Protocol
Hyperlinks and Protocols
Hyper Text Transfer Protocol
Level 3 Extended Diploma Unit 13 Computer Systems Architecture
Smart Television.
Тархи ба оюун \Brain and Mind\
Protocol Application TCP/IP Layer Model
Snippet Engine as a Database Server
Unit 32 Every class minute counts! 2 assignments 3 tasks/assignment
Request for Comments(RFC) 3489
To connect to the Internet, you must record the computers’ MAC Address. Follow these instructions. Click on Start Then Run.
Chapter 15 - IP: Software To Create A Virtual Network
Presentation transcript:

Prerequisites: -Emotiv headset (aprox. 300 $) - Head (you should have one)

Mind 2Keyboard How to use: Connect Emotiv EEG to a computer Run the data broadcaster on the same computer Inspect sent data using the RAW EEG Viewer If everything works use the MindKeyboard to type words BroadcasterRAW EEG ViewerMindKeyboard

Broadcaster The broadcaster receives encrypted data directly from the USB dongle, decrypts it and send it over the network using the TCP protocol. Receive data Decrypt data Send over network

RAW EEG Viewer The next step is to view the RAW EEG data in a graph. This shows the data that will be used by the MindKeyboard

MindKeyboard The MindKeybaord application uses the same data as the RAW EEG Viewer presented earlier. It enables the user to select a letter by using the gyro controls of the headset. What remains to be done: develop a machine learning algorithm that can differentiate between normal brain activity and user attempt to click.

Q&A