Condroid Remote Management - System Architecture & Requirement. Download the document in http://csd.xen.ssvl.kth.se/csdlive/content/remote-management-system-analysis-design
The document describes an integrated home automation system that allows users to control devices locally or remotely using GSM, web, or speech-based commands. The system has two main modules: 1) a server module with a database that stores control requests and commands devices, and 2) hardware interface modules that provide connections to home appliances. Users can send control requests via SMS, a web interface, or voice commands, which are stored in the server database and carried out by activating the relevant hardware interfaces. The system aims to provide a flexible platform for remote home device control using different input methods.
BLUETOOTH BASED OFFICE AUTOMATION AND SECURITY SYSTEM USING RASPBERRY PI AND ...IAEME Publication
An office receptionist is an employee who provides administrative support in the office. The position even though is of much importance, it hinders the use of man power for a much higher productive and useful purpose in the office. This paper deals with design and implementation of an automated office receptionist system using Raspberry Pi and an Android application. It not only helps the official to directly interact with the visitor but also to maintain a visitor’s record in the e-mail. This eliminates manual assistance and also improves the security. The device can also be used at home, corporate offices, hospitals, etc., for security purpose and administrative purposes. This simple and cost effective prototype device is designed and when tested it effectively performed the task of office receptionist
Implementation of Cmos Camera Device Driver and Wifi Technology on S3c2440 Us...IOSR Journals
Abstract: With the processing of CMOS technology, the technology of video acquisition based on CMOS is becoming a new trend. However, many CMOS camera chip is not supported by the newest Linux kernel yet. The environmental image acquirement and the Wi-Fi transmission system are studied and designed. In this paper, the method of designing the CMOS camera driver based on S3C2440 developing board with the embedded Linux environment is introduced and adds some components such as a USB Wi-Fi adapter. SCCB is a distinguishing feature of OV series CMOS chips. S3C2440 provides a camera interface, and the camera driver is designed based on it. The library and the utilities are compiled, and of images got from CMOS camera to the Wi-Fi mobile phone has been realized by means of programming.
Iaetsd arm based remote surveillance and motion detectionIaetsd Iaetsd
This document describes an arm-based remote surveillance and motion detection system using MJPEG compression. The system uses an ARM9 processor and Linux operating system to capture video from a camera. The video is compressed using MJPEG and transmitted over the internet. Users can view the live video stream and detect motions using a web browser. The system is designed for applications like security, transportation and home monitoring due to its low cost, stability and security compared to traditional DSP-based solutions.
This document provides a software requirements specification for a campus portal for wireless devices. It describes the overall product perspective, functions, user characteristics, and constraints. Specific requirements include external interfaces to connect wireless devices and a remote server, key functions like user authentication, adding/dropping courses, and cancelling classes. Performance requirements ensure simultaneous use by up to 2500 users. The document follows IEEE standards for SRS documents.
The main objective of this project is to develop wireless air mouse using accelerometer sensor. This implementation is done by using a sensor which
detects hand gestures. The sensor is placed on the user side, attached to the hand to sense the movement and gives the output to a PIC microcontroller
to process it. Needed modifications are done by the PIC microcontroller. These values are transmitted through a RF module to the PC. At the receiving
end a mouse control program which contains functions to control the mouse reads these values and performs many operations which is user friendly
because it helps in many ways like changing the slide, pointing purpose and for open a folder without using mouse pad.
Teks tersebut merupakan pengenalan tentang pemrograman berorientasi objek Java yang mencakup konsep-konsep penting seperti kelas, objek, konstruktor, metode, atribut, pewarisan, polimorfisme, dan pengkapsulan. Teks tersebut juga menjelaskan perbedaan antara pemrograman berorientasi objek dengan pemrograman berorientasi prosedural serta memberikan contoh kode untuk mengilustrasikan konsep-konsep tersebut.
[/ringkasan]
The document describes an integrated home automation system that allows users to control devices locally or remotely using GSM, web, or speech-based commands. The system has two main modules: 1) a server module with a database that stores control requests and commands devices, and 2) hardware interface modules that provide connections to home appliances. Users can send control requests via SMS, a web interface, or voice commands, which are stored in the server database and carried out by activating the relevant hardware interfaces. The system aims to provide a flexible platform for remote home device control using different input methods.
BLUETOOTH BASED OFFICE AUTOMATION AND SECURITY SYSTEM USING RASPBERRY PI AND ...IAEME Publication
An office receptionist is an employee who provides administrative support in the office. The position even though is of much importance, it hinders the use of man power for a much higher productive and useful purpose in the office. This paper deals with design and implementation of an automated office receptionist system using Raspberry Pi and an Android application. It not only helps the official to directly interact with the visitor but also to maintain a visitor’s record in the e-mail. This eliminates manual assistance and also improves the security. The device can also be used at home, corporate offices, hospitals, etc., for security purpose and administrative purposes. This simple and cost effective prototype device is designed and when tested it effectively performed the task of office receptionist
Implementation of Cmos Camera Device Driver and Wifi Technology on S3c2440 Us...IOSR Journals
Abstract: With the processing of CMOS technology, the technology of video acquisition based on CMOS is becoming a new trend. However, many CMOS camera chip is not supported by the newest Linux kernel yet. The environmental image acquirement and the Wi-Fi transmission system are studied and designed. In this paper, the method of designing the CMOS camera driver based on S3C2440 developing board with the embedded Linux environment is introduced and adds some components such as a USB Wi-Fi adapter. SCCB is a distinguishing feature of OV series CMOS chips. S3C2440 provides a camera interface, and the camera driver is designed based on it. The library and the utilities are compiled, and of images got from CMOS camera to the Wi-Fi mobile phone has been realized by means of programming.
Iaetsd arm based remote surveillance and motion detectionIaetsd Iaetsd
This document describes an arm-based remote surveillance and motion detection system using MJPEG compression. The system uses an ARM9 processor and Linux operating system to capture video from a camera. The video is compressed using MJPEG and transmitted over the internet. Users can view the live video stream and detect motions using a web browser. The system is designed for applications like security, transportation and home monitoring due to its low cost, stability and security compared to traditional DSP-based solutions.
This document provides a software requirements specification for a campus portal for wireless devices. It describes the overall product perspective, functions, user characteristics, and constraints. Specific requirements include external interfaces to connect wireless devices and a remote server, key functions like user authentication, adding/dropping courses, and cancelling classes. Performance requirements ensure simultaneous use by up to 2500 users. The document follows IEEE standards for SRS documents.
The main objective of this project is to develop wireless air mouse using accelerometer sensor. This implementation is done by using a sensor which
detects hand gestures. The sensor is placed on the user side, attached to the hand to sense the movement and gives the output to a PIC microcontroller
to process it. Needed modifications are done by the PIC microcontroller. These values are transmitted through a RF module to the PC. At the receiving
end a mouse control program which contains functions to control the mouse reads these values and performs many operations which is user friendly
because it helps in many ways like changing the slide, pointing purpose and for open a folder without using mouse pad.
Teks tersebut merupakan pengenalan tentang pemrograman berorientasi objek Java yang mencakup konsep-konsep penting seperti kelas, objek, konstruktor, metode, atribut, pewarisan, polimorfisme, dan pengkapsulan. Teks tersebut juga menjelaskan perbedaan antara pemrograman berorientasi objek dengan pemrograman berorientasi prosedural serta memberikan contoh kode untuk mengilustrasikan konsep-konsep tersebut.
[/ringkasan]
DIKTAT PANJAT TEBING (ROCK CLIMBING) ASTACALA - Bagian 7 Teknik LanjutLaili Aidi
Dokumen tersebut memberikan ringkasan singkat tentang teknik dasar panjat tebing (rock climbing) dalam 3 kalimat, yaitu:
Dokumen tersebut membahas tentang teknik-teknik dasar dalam melakukan panjat tebing seperti penggunaan alat, simpul-simpul dasar, teknik memimpin jalur (leading), dan teknik mengamankan (belaying).
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Laili Aidi
This presentation outlines a master's thesis proposal on developing business models for profitable mobile broadband media services in Indonesia. The proposal discusses background on shifting usage patterns and expectations for mobile broadband. It defines the problem of making these media services sustainable businesses while addressing common and unique market challenges in Indonesia. The methodology will use a mixed qualitative and quantitative approach including literature review, data collection from experts and users, and analysis of the broadband ecosystem and value networks. The expected results are identification of strategies by assessing existing business models and Indonesia's telecom landscape, understanding the market by analyzing user characteristics, and providing recommendations to feasibility test solutions and highlight suitable options.
2011 06 23 aspects juridiques ecommerce by competiticCOMPETITIC
Se prémunir des litiges juridiques que le commerce électronique peut générer.
Identifiez les risques juridiques liés au développement et à l'administration d'un site Internet :
- quels sont les risques ?
- quelles sont les solutions possibles ?
- Comment suivre l'évolution de la réglementation ?
Plus d'info : www.lenumeriquepourmonentreprise.com
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Laili Aidi
This thesis intends to systematically research the suitable business model options for mobile-broadband media services, which specifically focuses to Indonesia’s telecom market, as one of the world largest emerging economy.
Controlling Home Appliances by using Universal Remote Control System (IoT and...IRJET Journal
This document describes a system for controlling home appliances using a universal remote control over IoT and Bluetooth technologies. The system uses an ARM board connected to home appliances via the control box. An Android smartphone acts as the universal remote control and communicates with the ARM board and appliances wirelessly using IoT, Wi-Fi and Bluetooth. The system architecture includes the remote controller, target devices/appliances, and a software interface to generate control interfaces for different appliances on the remote. The system aims to provide simple control of multiple appliances using a single remote interface.
The evolving technology of the modern age has made it necessary to control the existing technologies efficiently and comfortably. The consumers expect the development of products that are easy to use and are efficient and which can be bought at the lowest possible cost from the industry. The daily difficulties related to lighting automation faced by people ranging from industry professionals to modern day housewives have inspired this project.
The project aims at controlling lighting appliances ranging from industries to sub-urban homes using web-based application at the front end complemented by an end user application developed for the aimed location using ZigBee based network. The other networking technologies like Bluetooth and WiFi consume a lot more energy as compared to ZigBee and are costlier too. The project facilitates controlling lighting appliances in groups as well as individually. The color and density of the lights can also be changed. The quick access feature is provided by the predefined end-user definable presets. The other features include scheduling options, obtaining live feedback, receiving notifications and maintenance pop-ups, bill estimation, power consumption etc.
Codesign-Oriented Platform for Agile Internet of Things Prototype DevelopmentJonathan Ruiz de Garibay
The Internet of Things offers a growing market open to new products. To be able to take advantages of this opportunity companies need to be able to quickly create prototypes of their products. Given the difficulties that the development of embedded devices presents, both on the hardware and software parts, it is a necessity to create tools that ease this process. In this paper we present a codesing-oriented platform that will help developers to create their prototypes in an agile manner. The presented platform simplifies the usage and integration of standardized peripherals and reduces the complexity of the development process. We also present a prototype created using the platform, showcasing its capabilities.
Ethernet Enabled Digital I/O Control in Embedded SystemsIOSR Journals
Abstract: This paper presents very simple and economical way to provide Ethernet connectivity to micro controller based embedded systems. This system uses arm7 controller to store the main application source code, web pages and TCP/IP stack which is a vital element of the system software. an Ethernet controller chip,ENC28J60 is used to handle the Ethernet controller chip.ENC28J60 is used to handle the Ethernet communications and is interfaced with the host micro controller using SPI pins. There are several I/O pins available at the micro controller which are used to interface with sensors and relays for monitoring and controlling operations. Now a day, internet has spread worldwide and most of the internet connections use Ethernet as media for data transfer. in industries or in home appliances ,most of the time we need to monitor and control different parameters using micro controllers. Once we enable Ethernet interface to such systems, we can communicate with them remotely over the internet Keywords:Ethernet controller; TCP/IP stack; serialperipheral interface (SPI),ENC28J60, Triac,Sensors
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET Journal
This document presents a system for remotely controlling a PC/laptop using an Android device. The system allows wireless control of keyboard, mouse, media playback, and presentations on the PC/laptop. It consists of an Android application and desktop application connected over WiFi. The Android app captures user input which is sent over sockets to the desktop app, simulating keyboard/mouse events on the PC/laptop in real-time. This allows remote control of the PC/laptop from the Android device. The system was implemented using Java, Android, and networking APIs to transmit data between devices for wireless control.
This document discusses the design methodology for Internet of Things (IoT) systems. It outlines the 10 steps in the IoT design process: 1) defining the purpose and requirements, 2) specifying the processes, 3) specifying the domain model, 4) specifying the information model, 5) specifying the services, 6) specifying the IoT level, 7) specifying the functional view, 8) specifying the operational view, 9) integrating devices and components, and 10) developing the IoT application. Embedded computing logic and common hardware platforms like Arduino and Raspberry Pi are also discussed.
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE cscpconf
Ubiquitous computing allows more efficient exploitation of information systems, economizes
user cost and effort to use the information system. The network technical room monitoring
problem, arising from network management practice, is important to operate the network, to
discover and resolve unpredictable situation. In addition, many of monitoring and sensor
product are shipped with closed proprietary software, and the interoperability between them is
very difficult. In this article, the author present several ubiquitous computing technologies,
propose a model of ubiquitous monitoring system for network technical room. This model
allows monitoring the network technical room remotely, via variable terminal devices and
variable communication infrastructure. The model has been implemented in Hanoi University of
Science and Technology (HUST) Network Information Centre with IP Cameras and RFID
devices.
Data Acquisition and Control System for Real Time Applicationsijsrd.com
This paper proposes an Embedded Ethernet which is nothing but a processor that is capable to communicate with the network. This helps in data acquisition and status monitoring with the help of standard LAN. Currently device with processor is widely used in industrial field. The Embedded Ethernet provides web access to distributed measurement/control systems and provides optimization for instrumentation, educational laboratories and home automation. However, a large number of devices don't have the network interface and the data from them cannot be transmitted in network. A design of ARM Processor based Embedded Ethernet interface is presented. In this design, data can be transmitted transparently through Ethernet interface unit to remote end desktop computer. By typing the IP address of LAN on the ARM9 board, the user gets sensor values on the PC screen at remote station. This provides the status of the devices at remote field. The user can also control the devices interfaced to the ARM9 Board by pressing the button displayed on the GUI of the remote Desktop PC.
Embedded systems have become an important part of every modern electronic component which will be at the cornerstone for deployment of Internet of Things solutions.
https://www.altencalsoftlabs.com/internet-of-things/
MIPI DevCon 2021: MIPI I3C Application and Validation Models for IoT Sensor N...MIPI Alliance
Presented by Eyuel Zewdu Teferi, David Schumacher and Souha Kouki, STMicroelectronics
This presentation provides a global overview of using MIPI I3C® protocol for on-board communication among subsystems of an IoT sensor node. It includes adoption of MIPI CTS by using SysML models of requirements and test cases as an approach to manage I3C application use cases requirement validation.
IRJET- A Smart Voice Controlled Robot AssistantIRJET Journal
This document describes the design and implementation of a smart voice controlled robot. The robot is designed to take voice commands from a user through an Android phone and move accordingly. It uses a microcontroller to process the voice commands received over Bluetooth and control the robot's motors. The robot is also able to talk to the user by playing pre-recorded audio files to communicate the command it is performing. The hardware components include a microcontroller, Bluetooth module, motors, power supply and an LCD screen. The software uses an Android app for voice recognition and a microcontroller IDE to program the robot's functionality.
Remote sensing and control of an irrigation system using a distributed wirele...nithinreddykaithi
This document describes the design of a remote irrigation system using a wireless sensor network. Sensors will monitor field conditions like voltage, current, temperature and irradiance. The sensor data will be transmitted periodically to a base station. A digital controller will regulate the power point using a DC-DC converter to identify the maximum power point based on a neural network model. A low-cost RF module wireless network will transmit communication data for remote monitoring and distributed control. Web-based software will provide remote access to field conditions and real-time control of power points in the smart photovoltaic system. The system uses a PIC microcontroller and sensors to monitor the field and an RF transmitter to send data to the receiver and base station
Design and Development of ARM9 Based Embedded Web ServerIJERA Editor
This paper describes the design of embedded web server based on ARM9 processor and Linux platform. It
analyses hardware configuration and software implementation for monitoring and controlling systems or
devices. User can monitor and control temperature and smoke information. It consists of application program
written in „C‟ for accessing data through the serial port and updating the web page, porting of Linux 2.6.3x
Kernel with application program on ARM9 board and booting it from the RAM.
DIKTAT PANJAT TEBING (ROCK CLIMBING) ASTACALA - Bagian 7 Teknik LanjutLaili Aidi
Dokumen tersebut memberikan ringkasan singkat tentang teknik dasar panjat tebing (rock climbing) dalam 3 kalimat, yaitu:
Dokumen tersebut membahas tentang teknik-teknik dasar dalam melakukan panjat tebing seperti penggunaan alat, simpul-simpul dasar, teknik memimpin jalur (leading), dan teknik mengamankan (belaying).
Master Thesis Proposal Presentation: Business Models for Mobile-broadband Med...Laili Aidi
This presentation outlines a master's thesis proposal on developing business models for profitable mobile broadband media services in Indonesia. The proposal discusses background on shifting usage patterns and expectations for mobile broadband. It defines the problem of making these media services sustainable businesses while addressing common and unique market challenges in Indonesia. The methodology will use a mixed qualitative and quantitative approach including literature review, data collection from experts and users, and analysis of the broadband ecosystem and value networks. The expected results are identification of strategies by assessing existing business models and Indonesia's telecom landscape, understanding the market by analyzing user characteristics, and providing recommendations to feasibility test solutions and highlight suitable options.
2011 06 23 aspects juridiques ecommerce by competiticCOMPETITIC
Se prémunir des litiges juridiques que le commerce électronique peut générer.
Identifiez les risques juridiques liés au développement et à l'administration d'un site Internet :
- quels sont les risques ?
- quelles sont les solutions possibles ?
- Comment suivre l'évolution de la réglementation ?
Plus d'info : www.lenumeriquepourmonentreprise.com
Master Thesis Proposal: Business Models for Mobile-broadband Media Services –...Laili Aidi
This thesis intends to systematically research the suitable business model options for mobile-broadband media services, which specifically focuses to Indonesia’s telecom market, as one of the world largest emerging economy.
Controlling Home Appliances by using Universal Remote Control System (IoT and...IRJET Journal
This document describes a system for controlling home appliances using a universal remote control over IoT and Bluetooth technologies. The system uses an ARM board connected to home appliances via the control box. An Android smartphone acts as the universal remote control and communicates with the ARM board and appliances wirelessly using IoT, Wi-Fi and Bluetooth. The system architecture includes the remote controller, target devices/appliances, and a software interface to generate control interfaces for different appliances on the remote. The system aims to provide simple control of multiple appliances using a single remote interface.
The evolving technology of the modern age has made it necessary to control the existing technologies efficiently and comfortably. The consumers expect the development of products that are easy to use and are efficient and which can be bought at the lowest possible cost from the industry. The daily difficulties related to lighting automation faced by people ranging from industry professionals to modern day housewives have inspired this project.
The project aims at controlling lighting appliances ranging from industries to sub-urban homes using web-based application at the front end complemented by an end user application developed for the aimed location using ZigBee based network. The other networking technologies like Bluetooth and WiFi consume a lot more energy as compared to ZigBee and are costlier too. The project facilitates controlling lighting appliances in groups as well as individually. The color and density of the lights can also be changed. The quick access feature is provided by the predefined end-user definable presets. The other features include scheduling options, obtaining live feedback, receiving notifications and maintenance pop-ups, bill estimation, power consumption etc.
Codesign-Oriented Platform for Agile Internet of Things Prototype DevelopmentJonathan Ruiz de Garibay
The Internet of Things offers a growing market open to new products. To be able to take advantages of this opportunity companies need to be able to quickly create prototypes of their products. Given the difficulties that the development of embedded devices presents, both on the hardware and software parts, it is a necessity to create tools that ease this process. In this paper we present a codesing-oriented platform that will help developers to create their prototypes in an agile manner. The presented platform simplifies the usage and integration of standardized peripherals and reduces the complexity of the development process. We also present a prototype created using the platform, showcasing its capabilities.
Ethernet Enabled Digital I/O Control in Embedded SystemsIOSR Journals
Abstract: This paper presents very simple and economical way to provide Ethernet connectivity to micro controller based embedded systems. This system uses arm7 controller to store the main application source code, web pages and TCP/IP stack which is a vital element of the system software. an Ethernet controller chip,ENC28J60 is used to handle the Ethernet controller chip.ENC28J60 is used to handle the Ethernet communications and is interfaced with the host micro controller using SPI pins. There are several I/O pins available at the micro controller which are used to interface with sensors and relays for monitoring and controlling operations. Now a day, internet has spread worldwide and most of the internet connections use Ethernet as media for data transfer. in industries or in home appliances ,most of the time we need to monitor and control different parameters using micro controllers. Once we enable Ethernet interface to such systems, we can communicate with them remotely over the internet Keywords:Ethernet controller; TCP/IP stack; serialperipheral interface (SPI),ENC28J60, Triac,Sensors
IRJET - Mirroring of Source and Sink Devices in Android Screen CastingIRJET Journal
This document presents a system for remotely controlling a PC/laptop using an Android device. The system allows wireless control of keyboard, mouse, media playback, and presentations on the PC/laptop. It consists of an Android application and desktop application connected over WiFi. The Android app captures user input which is sent over sockets to the desktop app, simulating keyboard/mouse events on the PC/laptop in real-time. This allows remote control of the PC/laptop from the Android device. The system was implemented using Java, Android, and networking APIs to transmit data between devices for wireless control.
This document discusses the design methodology for Internet of Things (IoT) systems. It outlines the 10 steps in the IoT design process: 1) defining the purpose and requirements, 2) specifying the processes, 3) specifying the domain model, 4) specifying the information model, 5) specifying the services, 6) specifying the IoT level, 7) specifying the functional view, 8) specifying the operational view, 9) integrating devices and components, and 10) developing the IoT application. Embedded computing logic and common hardware platforms like Arduino and Raspberry Pi are also discussed.
UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE cscpconf
Ubiquitous computing allows more efficient exploitation of information systems, economizes
user cost and effort to use the information system. The network technical room monitoring
problem, arising from network management practice, is important to operate the network, to
discover and resolve unpredictable situation. In addition, many of monitoring and sensor
product are shipped with closed proprietary software, and the interoperability between them is
very difficult. In this article, the author present several ubiquitous computing technologies,
propose a model of ubiquitous monitoring system for network technical room. This model
allows monitoring the network technical room remotely, via variable terminal devices and
variable communication infrastructure. The model has been implemented in Hanoi University of
Science and Technology (HUST) Network Information Centre with IP Cameras and RFID
devices.
Data Acquisition and Control System for Real Time Applicationsijsrd.com
This paper proposes an Embedded Ethernet which is nothing but a processor that is capable to communicate with the network. This helps in data acquisition and status monitoring with the help of standard LAN. Currently device with processor is widely used in industrial field. The Embedded Ethernet provides web access to distributed measurement/control systems and provides optimization for instrumentation, educational laboratories and home automation. However, a large number of devices don't have the network interface and the data from them cannot be transmitted in network. A design of ARM Processor based Embedded Ethernet interface is presented. In this design, data can be transmitted transparently through Ethernet interface unit to remote end desktop computer. By typing the IP address of LAN on the ARM9 board, the user gets sensor values on the PC screen at remote station. This provides the status of the devices at remote field. The user can also control the devices interfaced to the ARM9 Board by pressing the button displayed on the GUI of the remote Desktop PC.
Embedded systems have become an important part of every modern electronic component which will be at the cornerstone for deployment of Internet of Things solutions.
https://www.altencalsoftlabs.com/internet-of-things/
MIPI DevCon 2021: MIPI I3C Application and Validation Models for IoT Sensor N...MIPI Alliance
Presented by Eyuel Zewdu Teferi, David Schumacher and Souha Kouki, STMicroelectronics
This presentation provides a global overview of using MIPI I3C® protocol for on-board communication among subsystems of an IoT sensor node. It includes adoption of MIPI CTS by using SysML models of requirements and test cases as an approach to manage I3C application use cases requirement validation.
IRJET- A Smart Voice Controlled Robot AssistantIRJET Journal
This document describes the design and implementation of a smart voice controlled robot. The robot is designed to take voice commands from a user through an Android phone and move accordingly. It uses a microcontroller to process the voice commands received over Bluetooth and control the robot's motors. The robot is also able to talk to the user by playing pre-recorded audio files to communicate the command it is performing. The hardware components include a microcontroller, Bluetooth module, motors, power supply and an LCD screen. The software uses an Android app for voice recognition and a microcontroller IDE to program the robot's functionality.
Remote sensing and control of an irrigation system using a distributed wirele...nithinreddykaithi
This document describes the design of a remote irrigation system using a wireless sensor network. Sensors will monitor field conditions like voltage, current, temperature and irradiance. The sensor data will be transmitted periodically to a base station. A digital controller will regulate the power point using a DC-DC converter to identify the maximum power point based on a neural network model. A low-cost RF module wireless network will transmit communication data for remote monitoring and distributed control. Web-based software will provide remote access to field conditions and real-time control of power points in the smart photovoltaic system. The system uses a PIC microcontroller and sensors to monitor the field and an RF transmitter to send data to the receiver and base station
Design and Development of ARM9 Based Embedded Web ServerIJERA Editor
This paper describes the design of embedded web server based on ARM9 processor and Linux platform. It
analyses hardware configuration and software implementation for monitoring and controlling systems or
devices. User can monitor and control temperature and smoke information. It consists of application program
written in „C‟ for accessing data through the serial port and updating the web page, porting of Linux 2.6.3x
Kernel with application program on ARM9 board and booting it from the RAM.
Smart Surveillance Bot with Low Power MCUIRJET Journal
This document describes the design of a low-power, wirelessly controlled surveillance robot. The robot uses a CC3200 SimpleLink WiFi microcontroller and integrates an onboard video camera, ultrasonic sensor, Bluetooth module, GPS, and other components. The robot is intended to transmit real-time video data to a controller to monitor hard to access areas. The design aims to create an affordable and efficient robotic system for surveillance applications using low power consumption. Future extensions could include sensors for mine detection or fire detection.
Software Requirement Specification For Smart Internet CafeHari
The document is a software requirements specification for a Smart Internet Cafe (SIC) system. It outlines requirements across many sections - introduction and document conventions, overall descriptions of the system and its users/environment, external interface requirements including the user interface, system features like authentication and monitoring, and non-functional requirements such as performance, security, and special user needs. The SIC will provide secure internet access and account/usage monitoring for clients of internet cafes and college computer labs.
This document describes the implementation of an embedded Bluetooth data broadcast system. The system uses an ARM9 microprocessor running Linux to broadcast information to multiple Bluetooth devices simultaneously via Bluetooth 2.0's EDR technology. It achieves both single-point and multi-point transmission of files and information updating through a Bluetooth-TCP/IP connection. Testing showed the system can reliably broadcast files to multiple devices simultaneously at rates up to 58.8KBps and update information through an FTP connection. The system provides a low-cost solution for wireless information broadcasting with applications in advertising and public information systems.
Abstract Enhance Data Rate (EDR) in Bluetooth 2.0 specifications provide condition for Bluetooth multi-point communication. Aiming at application requirements of Bluetooth technique in wireless communication, Embedded Bluetooth Information Broadcast System (EBIBS) based on ARM9 microprocessor S3C2440 was designed and implemented. The system runs on ARM-Linux operation system and achieves single point transmission, multi-point transmission and information update based on Bluetooth 2.0 specifications. BlueZ protocol stacks and object exchange (OBEX) were utilized to complete multi-point transmission. Device driver technique was used to switch core functions and retransmission mechanism to ensure reliability of information broadcast. The system has been verified at broad-level and practical application. The result was also provided. Index Terms: ARM, Bluetooth, embedded, information broadcast
Similar to Condroid Remote Management - System Architecture & Requirement (20)
Mobile Music Business Models in Asia's Emerging MarketsLaili Aidi
Aidi, Laili; Markendahl, Jan; Tollmar, Konrad; Selvakumar, Ekambar; Huang, Jin; and Blennerud, Greger, In proceeding of: 12th International Conference on Mobile Business, Berlin 2013
In the telecom business, there has been a heavy competition from Internet, media and handset vendors companies. These over-the-top (OTT) players offer compiling telecom services, cause a transformation in the telecom business ecosystem, and the most challenging services posed here are media services. China, India and Indonesia, as world’s emerging markets in Asia, are predicted to take the largest share in the global mobile traffic explosion by 2015. It is critical for mobile network operators (MNOs) in this region to explore strategy for mobile media services, as mobile broadband is likely preferred
compared to fixed broadband.
In this paper, we analyze and compare mobile music business models used in these markets and structure the relation models between the key actors, using Actors, Relations and Business Activities (ARA) model. We present the economic models that are emerging, and an insight of why and how these multitudes actors are betting on currently. We found that the MNOs generally have a much stronger position compared to their counterparts in the developed markets, and the personalization services, like ring-back tone, are still a huge success. The actors tend to deliver the services by their own, rather than to collaborate in a horizontal business setting.
Stream Control Transmission Protocol (SCTP) - IntroductionLaili Aidi
The document discusses the Stream Control Transmission Protocol (SCTP), a transport layer protocol that provides reliable message delivery like TCP but with some improvements. SCTP supports multi-homing where an endpoint can be associated with multiple IP addresses simultaneously. It also supports multi-streaming within a single association to reduce head-of-line blocking. SCTP uses a four-way handshake for connection setup and ensures reliable data transfer using transmission sequence numbers and selective acknowledgements.
Public version of my presentation slide as guess lecturer at Politeknik Telkom, Bandung, May 4, 2013, discussing about "Internet of Things" Feel free to comment and/or download
Master Thesis Report: Business Models for Mobile Broadband Media Services – C...Laili Aidi
The increase mobile data traffic from the emerging Internet services, especially multimedia, has posed considerable challenges for the telecom industry. Their initial mobile data services business models are generally not compatible with these emerging Internet services. Thus, there is a substantial need to investigate the suitable options to make media as a profitable telecom business sector. However, there are different challenges and opportunity factors in developing sustainable mobile media business in each market, due to the unique circumstances applied as the result of customer characteristics, mobile market situation and regulatory/law enforcement.
The first purpose of this thesis is to explore the business model options to deliver media services on top of mobile broadband. Although, we limit our focus to Indonesia, we first analyzed the worldwide patterns toward the media services in order to get a broader view of the current trend. We mapped multitudes of actor involved in digital online / on the top (OTT) media service, which together they form different types of constellation in the value network, as well as service, delivery and revenue model. We also put our focus to get the lessons learned from Spotify’s business model, by framing it using Chesbrough and Rosenbloom’s model.
The second purpose is to understand the Indonesian mobile user's characteristic toward the mobile media services. We conducted survey to 119 Indonesians, analyzed and validated the result with the correlation tests (Cronbach Alpha and Pearson correlation), within the Unified theory of acceptance and use of technology (UTAUT) framework. Our findings confirm the low willingness to pay, but an open attitude for the services. The mobile device and network quality are not the barriers for them to adopt the services, and there is a tight connection between the decisions to adopt the services with the perception that the service is popular.
Through those findings, we assessed the feasibility of the identified options and formulated the recommendations. We used our understanding about Indonesian market structure (telecom and media), regulation, and mobile user, as well as the lesson that we got from media services provisioning in Sweden and worldwide trend. We found that the pricing tiers, adjustable pricing, and differentiated features are some of the key success factors. Meanwhile, being part in the point-to-multipoint partnership with the well-known OTT player is the potential position that the Mobile network operators (MNOs) in Indonesia should take in provisioning OTT media services, rather than deliver the services by their own.
Paper - Competing or Aligning? Assessment for Telecom Operator's strategy to ...Laili Aidi
Up until recently, it was rarely direct competition between telecom operators, cable and satellite Pay-TV providers in digital TV/Video, as their business area were different and value chain was well established. However, technology advance has altered digital TV/Video landscape, made these Communication Service Providers (CSPs) cross other’s area and opened door for new actor (OTT player) to enter the market. This triggers second change in the landscape, as it potentially bypasses CSP’s role in digital media value chain.
There are generic potential options for telecom operator to address OTT service‘s treat, where the trend shows gradual shifts toward allowing or promoting. This study assesses telecom operator’s reaction strategies to react to this digital TV/Video convergence trend. Our analysis reveals two typical relation patterns in the value network, used by telecom operators based on strategy options above, which are ”point-to-point” and ”point-to-multipoint” relation model. We explore the underlining motivations that based these strategies, as well as analysis of the eco-systems: actors identification, business roles and distributed responsibilities among them, where we use ARA (Actors, Resource, Activities) point of view to model these value networks.
Master Thesis Presentation: Business Models for Mobile Broadband Media Servic...Laili Aidi
The increase mobile data traffic from the emerging Internet services, especially multimedia, has posed considerable challenges for the telecom industry. Their initial mobile data services business models are generally not compatible with these emerging Internet services. Thus, there is a substantial need to investigate the suitable options to make media as a profitable telecom business sector. However, there are different challenges and opportunity factors in developing sustainable mobile media business in each market, due to the unique circumstances applied as the result of customer characteristics, mobile market situation and regulatory/law enforcement.
The first purpose of this thesis is to explore the business model options to deliver media services on top of mobile broadband. Although, we limit our focus to Indonesia, we first analyzed the worldwide patterns toward the media services in order to get a broader view of the current trend. We mapped multitudes of actor involved in digital online / on the top (OTT) media service, which together they form different types of constellation in the value network, as well as service, delivery and revenue model. We also put our focus to get the lessons learned from Spotify’s business model, by framing it using Chesbrough and Rosenbloom’s model.
The second purpose is to understand the Indonesian mobile user's characteristic toward the mobile media services. We conducted survey to 119 Indonesians, analyzed the result with one sample T-tests and validated it with the correlation tests (Cronbach Alpha and Pearson correlation), within the Unified theory of acceptance and use of technology (UTAUT) framework. Our findings confirm the low willingness to pay, but an open attitude for the services. The mobile device and network quality are not the barriers for them to adopt the services, and there is a tight connection between the decisions to adopt the services with the perception that the service is popular.
Through those findings, we assessed the feasibility of the identified options and formulated the recommendations. We used our understanding about Indonesian market structure (telecom and media), regulation, and mobile user, as well as the lesson that we got from media services provisioning in Sweden and worldwide trend. We found that the pricing tiers, adjustable pricing, and differentiated features are some of the key success factors. Meanwhile, being part in the point-to-multipoint partnership with the well-known OTT player is the potential position that the Mobile network operators (MNOs) in Indonesia should take in provisioning OTT media services, rather than deliver the services by their own.
Abstract - Competing or Aligning? Assessment for Telecom Operator's strategy ...Laili Aidi
Up until recently, it was rarely direct competition between telecom operators, cable and satellite Pay-TV providers in digital TV/Video, as their business area were different and value chain was well established. However, technology advance has altered digital TV/Video landscape, made these Communication Service Providers (CSPs) cross other’s area and opened door for new actor (OTT player) to enter the market. This triggers second change in the landscape, as it potentially bypasses CSP’s role in digital media value chain.
There are generic potential options for telecom operator to address OTT service‘s treat, where the trend shows gradual shifts toward allowing or promoting. This study assesses telecom operator’s reaction strategies to react to this digital TV/Video convergence trend. Our analysis reveals two typical relation patterns in the value network, used by telecom operators based on strategy options above, which are ”point-to-point” and ”point-to-multipoint” relation model. We explore the underlining motivations that based these strategies, as well as analysis of the eco-systems: actors identification, business roles and distributed responsibilities among them, where we use ARA (Actors, Resource, Activities) point of view to model these value networks.
Nowadays, more and more we see the collaboration between the Music industry Players with other Players in other industries. It started decade ago by the collaboration with the Internet industry (such as iTunes), and then recently expanded to the collaboration with the players in the different industries.
This project figure out the pattern of the bytes in the stego file and how steganalysis tool can identify the bytes appended to the truck file by steganography tool. This analysis is based on basic theory of steganography and steganalysis, and using a hex editor in order to check what kind of bytes that the steganography tool appends to the truck file.
---
Please contact to lailiaidi at gmail.com for download request
These days, the interests in challenged networks are increasing and many researches are performed to seek a reliable end-to-end connectivity under harsh environments, which have a long propagation delay, high error rates, low data rate, and intermittent connectivity. Delay Tolerant Network was introduced to provide challenged networks with reliable transmission and interoperability with an overlay network concept. In this paper, we present comprehensive overview of Delay Tolerant Network and introduce a study case about the implementation of this network. This paper is designed to encourage the exploration of this field by giving basic concept and also motivate to investigate this area by presenting a study case at the end section.
---
Please contact to lailiaidi@gmail.com for download request
These days, the interests in challenged networks are increasing and many researches are performed to seek a reliable end-to-end connectivity under harsh environments, which have a long propagation delay, high error rates, low data rate, and intermittent connectivity. Delay Tolerant Network was introduced to provide challenged networks with reliable transmission and interoperability with an overlay network concept. In this paper, we present comprehensive overview of Delay Tolerant Network and introduce a study case about the implementation of this network. This paper is designed to encourage the exploration of this field by giving basic concept and also motivate to investigate this area by presenting a study case at the end section.
---
Please contact to lailiaidi@gmail.com for download request
Dimensioning and Cost Structure Analysis of Wide Area Data Service Network - ...Laili Aidi
This report contains discussion of the radio access network design and the cost structure analysis of different deployment options of Radio Access Technologies (RATs). The objective is to provide specific amount of user, with specific traffic demand and deployment scenario.
--
Please contact trough lailiaidi at gmail.com for download request
Analysis of WiMAX regulation in South Korea and Indonesia - PresentationLaili Aidi
Abstract—The development and rollout of WiMAX introduces several regulatory and policy issues. This paper highlights the WiMAX Regulation in South Korea, as a country that is already more mature and had become the first to implement Wireless Broadband Access (WBA) of its kind (WiBro) in the world, and Indonesia, as a country that is still in the process of formulating the reconcilable regulation. The paper begins with a brief overview of the technologies behind WiMAX and compared the market situation relative to broadband and 3G mobile networks. Next, the paper examines the potentially significant specific policy and regulatory issues for regulator in each country and competition climate between stockholders. Finally, this data was used to obtain recommendations to overcome the said problems. We found out that WiMAX may prove to be a disruptive technology for existing telecommunication and Internet sector, but careful policy effectuation can ensure that the disruption could create the maximum benefit possible in the society and market.
---
Please contact trough lailiaidi at gmail.com for download request
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringLaili Aidi
This document contains implementation report of a system that is able to monitor the network using SNMP and identify the specific possible attacks (DoS and port scan) using a cluster analysis. In the first task, the program discovers the topology of the network. After successful discovery phase, it will be able to monitor the link utilization (network link-states) for a specified period of time, and then detect the anomaly, using k-means clustering scheme [1]. These anomalies will be analyzed to recognize the attack. Moreover, this program also provides an advance feature, which is defined as optional task, as it executes online monitoring and detects the attacks using Davies-Bouldin Index as quality scoring measurement [2].
--
Please contact trough lailiaidi at gmail.com for download request
This document discusses the actors involved in Sweden's telecom markets and their roles. The key actors identified are: the telecom regulator (Post- och telestyrelsen), mobile network operators such as Telia and Tele2 who own infrastructure, mobile virtual network operators like Easy Telecom who operate on other networks, mobile virtual network enablers like Spinbox AB who provide backend services, mobile phone companies, network equipment vendors, outsourcing companies, mobile software providers, and card vendors. Examples of companies in each category that operate in Sweden are provided.
Condroid WSN/DTN Gateway - System Architecture & Requirement Laili Aidi
Condroid WSN/DTN Gateway - System Architecture & Requirement. Download the document in http://csd.xen.ssvl.kth.se/csdlive/content/wsndtn-gateway-system-analysis-design
Condroid WSN/DTN Gateway - User Manual & Installation GuideLaili Aidi
Condroid WSN/DTN Gateway - User Manual & Installation Guide. Download the document in http://csd.xen.ssvl.kth.se/csdlive/content/wsndtn-gateway-system-deployment-testing
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Condroid Remote Management - System Architecture & Requirement
1. !
!"#$%"&#'(')"#"(%&&
*+*%"#&'!,-.%",%/!"&&
0&!"1/.!"#"(%&&
2"!*.$(&345&
2011
!"#$%&'()%*+(,%+-%"( !"#$%&'(&#*&.(
& (
&
Lan Sun (lansun@kth.se), 15 ECTS (((((/#*&.(*01(2"#$%&'(#30%"(
Hervé Ntareme
Qing An (qinga@kth.se), 15 ECTS
/#4&#*&.(
Michel Hognerud
Jun Gao (jungao@kth.se), 15 ECTS
/.*+25#0(
Laili Aidi (aidi@kth.se), 18 ECTS
Björn Pehrson!
Yasir Ali (yasireal@kth.se), 15 ECTS
SUMMER CSD
2. Remote Management
System Architecture & Requirement V1.3
!
Revision History
Version Date Responsible Change
V1.0 2011-07-08 Jun Gao and Laili Aidi Initial version of the document
Combining the System Architecture
V1.1 2011-07-15 Laili Aidi document and System Requirement
document
V1.2 2011-07-16 Laili Aidi Adding the detail in section 2
V1.3 2011-10-07 Laili Aidi Cover, Abbreviation, Introduction
2
3. Remote Management
System Architecture & Requirement V1.3
!
Contents
Contents .............................................................................................................................................3!
Summary.............................................................................................................................................4!
Abbreviation.......................................................................................................................................5!
1. System Architecture ........................................................................................................................6!
2. System Requirement........................................................................................................................7!
2.1 Approaches................................................................................................................................7!
2.2 General Requirement .................................................................................................................7!
2.3 Open-Access Approach Specific Requirement ...........................................................................8!
2.4 ADB Approach Specific Requirement .....................................................................................10!
2.5 Open-Accessories and ADB comparison .................................................................................11!
3. References.....................................................................................................................................12!
3
4. Remote Management
System Architecture & Requirement V1.3
!
Summary
This document describes the System Architecture and System Requirement of the ConDroid in order to
develop and implement a Remote Management interface for WiFi Repeater and Optical Amplifier.
4
5. Remote Management
System Architecture & Requirement V1.3
!
Abbreviation
Abbreviations used in this document:
Abbreviation Description
ADK Access Development Kit
ADB Android Debug Bridge
HiperTerminal Terminal emulation software for Windows OS
Minicom Text-based modem control and terminal emulation program for Unix- like OS
UART Universal asynchronous receiver/transmitter
TTL Transistor–transistor logic
RS232 Recommended Standard 232
WiFi Local Area Network products based on IEEE 802.11
IOIO A USB I/O breakout board for Android
Seeduino Arduino compatible board
Freeduino Arduino compatible board
SMS Short Message Service
5
6. Remote Management
System Architecture & Requirement V1.3
!
1. System Architecture
One of the Condroid CSD project aim is develop a Remote Management interface in order to support and
troubleshoot the network equipments (WiFi Repeater and Optical amplifier in this project), which make it
enable to connect to the network equipments that situated far away in the isolated area.
Below is the design of system architecture in order to meet the requirement mentioned above:
Figure 1. ConDroid System Architecture design
Figure 1 shows that the administrator is far away from the network equipments (which will be WiFi repeater or
optical amplifier in this project). The ConDroid system provides both local control approach (Minicom or
HiperTerminal-like console) and remote approach for administrator to manage the network equipments using
cell phones through dialing, short message or the Internet connection.
6
7. Remote Management
System Architecture & Requirement V1.3
!
2. System Requirement
In this section, we give a detail description of the components of this system. But the important thing needs to
be clarified here is there are 2 possible ways that we consider to be used to achieve the USB-to-Serial
connection for Android device without the need to develop the driver and change the OS kernel. The first
approach is by using Open-Access API and the other is by using the Android Debug Bridge. This approach
has similar architecture but create different requirement. This section describes the approaches and then the
general requirements of the hardware. After that, there is also description of specific requirement of the
hardware based on different approaches and finally we give brief comparison between the approaches.
2.1 Approaches
There are 2 Approaches that are considered to be used in order to solve this requirement:
a. Using Open-Access API
This approach works via Android Open Accessory support, which allows external USB hardware (an Android
USB accessory) to interact with an Android-powered device in "accessory" mode [1]. Android USB accessories
mode specifically designed to attach to Android-powered devices / USB host capable microcontroller (ADK)
and adhere to Android accessory protocol / Open Access API that allows them to detect Android-powered
devices.
b. Using ADB
This approach uses the USB protocol for debugging applications [4]. It provides useful functionality and allows
the Android application to listen on a certain port and accept connections from the outside world without a
need to modify the OS. This functionality including file-system access/pushing files to the device, Linux shell
access, TCP socket, etc.
2.2 General Requirement
The hardware requirements of the ConDroid system are described below:
a. Android Smart-Phone
Because this project is aim to develop the software that run above the Android platform, thus the first
component that is needed is an android smart-phone, which will run the ConDroid software. As mentioned
earlier in the approaches description, there are some specific requirements for the OS version of this smart-
phone, which is depended on the approach and described in the section 2.2 and 2.1.
7
8. Remote Management
System Architecture & Requirement V1.3
!
b. USB-to-Serial converter board
Normally, the smart-phone will provide WIFI, Bluetooth and mini or micro USB. To connect to the network
equipment, which provides a serial management interface, we need a converter. Actually, to solve this problem,
Bluetooth to serial converter can be used and there are products providing this function. But, Bluetooth is too
power consuming and the smart-phone cannot be charged through the link, which will lead to the power-
recharging problem. Since the charging requirement will be easier to deal using the USB connection, thus, we
chose this interface.
As we chose USB to connect to the equipment, the first thing need to be solved is to convert the USB into
serial interface. If the general USB-to-serial converter is chosen, then we need to provide specific the driver to
the converter in the android OS system, which will then require to recompile the kernel. The IOIO and
Seeduino board provide firmware that specifically built for and can be accessed using Java API available in the
android system, so the smart-phone can connected to the board via USB link.
c. Serial Converter Cable
The third component in this system is a serial convert cable and it will only be used when the converter boards
provide different serial interface from the equipments. Normally, the board will provide a TTL (Transistor-
Transistor Logic) serial interface. However, the network equipment we aim to connect via Android normally
only provide the RS232 as the management interface, thus the TTL-to-RS232 cable is needed in order to
connect the serial-converter board. Luckily, the difference between TTL serial and RS232 serial is only the
electronic signal level, so there is no need for a driver for the converting.
2.3 Open-Access Approach Specific Requirement
Below are the specific specifications of the hardware in order to be able to use this approach:
! Phone: Android phone version 2.3.4 Gingerbread or 3.1 Honeycomb
! USB-to-Serial Converter Board: Open Accessories development Kit (ADK) or Android Open
Accessory compatible development board. After doing the research, the board that we consider to be used
in this research are:
8
9. Remote Management
System Architecture & Requirement V1.3
!
a. Seeduino ADK Main Board [2, 3]:
Features:
• Android ADK compatible, thus it supports Android v2.3.4 and above devices
• Backward compatible: It works with Android Debug Bridge (ADB) protocol using MircroBridge
firmware, thus it supports Android v1.5 and above devices
• It is Arduino Mega 2560 compatible, thus it simply works like an Arduino Mega with an integrated USB
Shield
• 4 Hardware serial ports (UART) = TTL Serial Port
• On board USB host (MAX3421) and On board USB slave (FT232RL)
• The board running at 5v/3.3v IO Level selectable
• Manual select power source, build-in 5V-1A switched power regulator (input range 6V - 18V) or 3.3V-
500mA LDO power regulators.
Limitation:
• It only provides TTL serial ports thus we need TTL-to-RS232 converter to connect to RS232 Level Serial
interface in the network equipments (WiFi repeater and Optical amplifier).
• It uses an SMT version of the main AVR chip, so the chip cannot be replaced or moved to another board.
• The next purchasing period is August 2011.
Prize:
79.90$ and we can customize the board and tell them the specific requirement and quantity we need.
b. Freeduino USB Host Board
Feature:
• It provides an Arduino-compatible board that supports ADK firmware thus it can connect with any
Android phone with the “Accessory mode”
• USB hosting via MAX3421 chip
• 1.5 A linear regulator
• 6-9 volts external power, with 6 volts being ideal
• Based on Arduino Uno Boot loader
• It provides TxD and RxD (data Input/output for USART)
Limitation:
• No specification of serial port availibility
• Lack of support and documentation
9
10. Remote Management
System Architecture & Requirement V1.3
!
Prize:
$79.00
2.4 ADB Approach Specific Requirement
Below are the specific specifications of the hardware in order to be able to use this approach:
1. Phone: Android phone version 1.5 Cupcake and above
2. USB-To-Serial Converter Board: ADB supported board.
After doing the research, the board that we consider to be used in this research is the IOIO Board DEV-
10748 [5, 6], an ADB implementation with a solid Java library. It gives the phone direct control over the
various pins of its PIC24 chip, removing the need for to write our own firmware.
Features:
• Fully controllable from Android application, using ADB library that provided in SDK API, thus it
supports Android v1.5 and above devices
• It gives the phone direct control over the various pins of its PIC24 chip, removing the need for to write
our own firmware. The firmware code is open-source with a FreeBSD license at [7] and includes secure
boot-loader, which enables firmware upgrades to be performed through the Android device
• The firmware works with beta version with ADK, thus it supports Android v2.3.4 and above devices, and
it is open-source with a FreeBSD license too at [8]. Thus it provides extensive and robust connectivity to
an Android device via a USB connection using both ADB and ADK.
• The board running at 5V-15V switch-mode regulators through the VIN pin and allows for simultaneous
charging of the Android device and powering two standard servos.
Limitations:
• It only provides TTL serial ports thus we need TTL-to-RS232 converter to connect to RS232 Level Serial
interface in the network equipments (WiFi repeater and Optical amplifier).
• The devices proven to work are: G1, Nexus One, Nexus S, Motorola Droid X. With other devices there is
no guarantee to work. And the ADK support is beta version.
Prize:
$44.96
10
11. Remote Management
System Architecture & Requirement V1.3
!
2.5 Open-Accessories and ADB comparison
Open-Accessory's main advantages over ADB are:
• Better throughput and latency.
• Does not require the user to enable USB debugging.
• More secure (IOIO takes its own measures to guarantee that the power of ADB cannot be exploited by a
malicious firmware).
• Allows applications to be notified upon connection of the accessory. The user can choose which
application to launch when the accessory connects. This might be doable with ADB too, but IOIO
doesn't do that.
ADB's main advantages over Open-Accessory are:
• Available on broad Android devices version.
• Provides useful features, such as file-system access (IOIO uses this for firmware upgrades).
• More mature, does not suffer from some problems currently existing in OpenAccessory.
• Simpler to work with on the Android application side - just listen on a TCP socket.
11
12. Remote Management
System Architecture & Requirement V1.3
!
3. References
[1] Android Open Accessory Development Kit http://developer.android.com/guide/topics/usb/adk.html
[2] Seeduino ADK Main Board http://www.seeedstudio.com/depot/seeeduino-adk-main-board-p-
846.html
[3] Seeduino ADK Main Board - Wiki
http://garden.seeedstudio.com/index.php?title=Seeeduino_ADK_Main_Board
[4] Android Debug Bridge http://developer.android.com/guide/developing/tools/adb.html
[5] IOIO for Android http://www.sparkfun.com/products/10748
[6] IOIO over Open-Accessory (ADK) Available http://ytai-mer.blogspot.com/2011/06/ioio-over-
openaccessory-adk-available.html
[7] Hardware, Software and Firmware of the IOIO project
http://codaset.com/ytai/ioio/source/master/tree/firmware
[8] IOIO Over Open-Accessory Beta http://codaset.com/ytai/ioio/wiki/IOIO-Over-OpenAccessory-Beta
12