Difference between revisions of "F12: All Your Base are Belong to You"

From Embedded Systems Learning Academy
Jump to: navigation, search
(Objects & Introduction)
(Schedule)
Line 36: Line 36:
 
* Identify Hardware
 
* Identify Hardware
 
* Acquire Hardware
 
* Acquire Hardware
 +
* Design Security Sensor Wire Diagram
 
</td>
 
</td>
 
<td>
 
<td>
 +
* Done
 
* Done
 
* Done
 
* Done
 
* Done
Line 49: Line 51:
 
</center> </td>
 
</center> </td>
 
<td>
 
<td>
* Design Security Sensor Wire Diagram
+
* Wire up Security Sensor to the LPC MicroController and read sensor data
 +
* Have Raspberry Pi Wi-Fi Connectivity
 +
* Set up communication from MicroController to Hercules using Wi-Fi Module
 +
* Connect Server to Security Sensor Slave Module
 
</td>
 
</td>
 
<td>
 
<td>
 +
* N/A
 +
* N/A
 +
* N/A
 
* N/A
 
* N/A
 
</td>
 
</td>
Line 61: Line 69:
 
</center> </td>
 
</center> </td>
 
<td>
 
<td>
* Wire up Security Sensor to the LPC MicroController
+
* Create Security Sensor Alarm Protocol
* Program Wi-Fi drivers
+
* Establish Communication Between Raspberry Pi and Microcontroller through Wi-Fi
* Build user interface
+
* Design Network Heartbeat Function
* Connect Server to Security Sensor Slave Module
 
 
</td>
 
</td>
 
<td>
 
<td>
* N/A
 
 
* N/A
 
* N/A
 
* N/A
 
* N/A
Line 79: Line 85:
 
</center> </td>
 
</center> </td>
 
<td>
 
<td>
* Design Network Heartbeat Function
+
* Create Basic Web UI
 
</td>
 
</td>
 
<td>
 
<td>
Line 91: Line 97:
 
</center> </td>
 
</center> </td>
 
<td>
 
<td>
* Program Security Sensor to send data
+
* Integrate UI with the Server
* Program Security Sensor alarm protocol
 
</td>
 
<td>
 
* N/A
 
* N/A
 
</td>
 
</tr>
 
 
 
<tr>
 
<td> <center>
 
6
 
</center> </td>
 
<td>
 
* Create Security Alarm Function Settings for User
 
 
</td>
 
</td>
 
<td>
 
<td>
Line 113: Line 105:
  
 
<tr>
 
<tr>
<th>Week Number</th> <th>Scheduled Items</th> <th>Items Completed</th>
+
<th>Week Number</th> <th>Scheduled Items</th> <th>Actual</th>
 
</tr>
 
</tr>
 
</table>
 
</table>

Revision as of 17:01, 2 November 2012

All Your Base are Belong to You

Abstract

Objects & Introduction

This system will automate your security and home functions for a higher quality of life

Security Thermal Sensor

  • Security Thermal Sensor will capture movement and heat from intruders
  • Security Thermal Sensor will send an alarm signal to the server after the thermal value reaches a certain threshold
  • Alarm Signal from the Security Thermal Sensor will be sent to the server through Wi-Fi communication

Raspberry Pi (server)

  • Server will receive data from the Security Thermal Sensor
  • Server will receive alarm signal and be set to an alarm state until it is deactivated

Team Members

  • Christopher Cheng
  • Tyler Gray
  • Prateek Grover

Roles & Responsibilities

  • Christopher Cheng: Sensors, Wi-Fi, Raspberry Pi
  • Tyler Gray: Sensors, Wi-Fi, Raspberry Pi
  • Prateek Grover: Sensors, Wi-Fi, Raspberry Pi

Schedule

Week Number Scheduled Items Items Completed

1

  • Identify Team
  • Identify Hardware
  • Acquire Hardware
  • Design Security Sensor Wire Diagram
  • Done
  • Done
  • Done
  • Done

2

  • Wire up Security Sensor to the LPC MicroController and read sensor data
  • Have Raspberry Pi Wi-Fi Connectivity
  • Set up communication from MicroController to Hercules using Wi-Fi Module
  • Connect Server to Security Sensor Slave Module
  • N/A
  • N/A
  • N/A
  • N/A

3

  • Create Security Sensor Alarm Protocol
  • Establish Communication Between Raspberry Pi and Microcontroller through Wi-Fi
  • Design Network Heartbeat Function
  • N/A
  • N/A
  • N/A

4

  • Create Basic Web UI
  • N/A

5

  • Integrate UI with the Server
  • N/A
Week Number Scheduled Items Actual

Parts List and Cost

Item Number Items Cost

1

  • OV 7670
  • Low Resolution Camera

$7.98

2

Raspberry Pi

$86.54

3

  • 3x RN-XV WiFly Module - Wire Antenna
  • WRL-10822
  • Total = $104.85
  • Each = $34.95

4

  • Infrared Thermometer - MLX90614
  • SEN-09570

$19.95

Week Number Scheduled Items Items Completed

Design and Implementation

Hardware Design

Hardware Implementation

Software Design

Implementation

Testing and Technical Challenges

Conclusion

References