m-cador - technical assessment 2 | epitech innovative project

Post on 27-Nov-2014

593 Views

Category:

Education

0 Downloads

Preview:

Click to see full reader

DESCRIPTION

Presentation for the Technical Assessment 2 for our final-year project (Epitech Innovative Project) at EPITECH. We did the presentation the 16th March 2013. Team : Chanh Allaux Amandine Armagnacq Jonathan Calmels Alexandre Champion Nicolas Danino Alexis Nugon Thomas Nugon Fares Sabbagh Guillaume Spera Jimmy Sun Laurine Taing David Tavares Nicolas Trincano Rodolph Vogt Danijel Zarkovic

TRANSCRIPT

Epitech Innovative Project Technical Assessment 2

March 2013www.m-cador.com

Multiple Capable Air-vehicle Designed for Observation and Rescue

M-CADOR is a monitoring system using a swarm of autonomous drones.Each drone has an artificial intelligence allowing optimal exploration of the area to be monitored. In order to be free of constraints of battery life, the aircraft uses a charging bases system. The bio-inspired system relies on collective intelligence similar to a swarm of bees.

A control interface allows the operator to control the swarm and to define the areas to be monitored. The controller can also watch video clips. Indeed, an algorithm selects the most relevant video sequences.

Possibles missions are natural disaster prevention and surveillance of industrial areas.

ArtificialIntelligence

1

cling lrta exploratorExploration algorithms

EVAP EVAW HYBRIDE Patrol algorithms

DEMO

Design planningEnergetic survival & intelligent environment

TheNetworking

2

Linux from scratch Raspberry PI

GNU/Linux Kernel 3.6, ARMv6zk oriented

Busybox 1.21 environment

ARM vector floating point unit

Cross compilation toolchain support G++11GCC 4.8, uClibC 0.9, binutils 2.21

B.A.T.M.A.N advanced builtin

IPv6 support

Video streaming

V4L2 capture

VP8/H264 encoding

MPEG4/WEBM/IVGcontainer serialization support

RTP in progress RFC draft, VP9 profile

Wireless Watchdog

WiFi 802.11n Handling

SSID tracking

EAP transactions

Implementation in progressWireless-tools API / WPA supplicant + DBUS

Security: Real Time stream watermarking in VP8

Crytographic hash computation

Asymmetric key algorithms / PSK, PRNG seeds

Frame tagging

VisionComputer

3

GOAL : INTRUSION DETECTIONUsing OpenCV library for real-time computer vision

ALREADY DONE: Brute difference between imagesUsing following algorithms: Histograms, Threshold, Erosion, Dilation

Image 1 Image 2

Result

what’s next ?Decrease the error margin & result analysis

Edge detection algorithm, SURF algorithm & SIFT algorithm

ElectronicThe

4

THE swarm is growingReception of the second drone

MODELING COMPONENTS

ROBOT OPERATING SYSTEMSoftware framework for robot software development

RecapFinal

5

Artificial Intelligence Network

Computer Vision

NetworkingNetworking

Electronic

M-CADORRECAP

top related