CAPTCHA-Based Image Labeling on the Soylent Grid

Total Page:16

File Type:pdf, Size:1020Kb

CAPTCHA-Based Image Labeling on the Soylent Grid CAPTCHA-based Image Labeling on the Soylent Grid Peter Faymonville1,∗ Kai Wang1, John Miller2, Serge Belongie1 † 1Department of Computer Science and Engineering and 2Calit2 University of California, San Diego [email protected], [email protected], [email protected], [email protected] ABSTRACT sets and/or tasks exist. Therefore, the surrounding infras- We introduce an open labeling platform for Computer Vision tructure around a Captcha doesn’t have to be implemented researchers based on Captchas, creating as a byproduct la- each time a research group decides to try a new Captcha beled image data sets while supporting web security. For the method and long-term relationships to Captcha-dependent two different tasks of annotation and detection, we provide websites can be established, reducing the integration costs a security analysis and explore usability issues. We present for these websites. the interfaces used by researchers, website administrators and users and experimental results obtained using the plat- This research was motivated through the GroZi project, form. Finally, we discuss system sustainability issues in the which aims at creating a technological solution for grocery context of a broader “ecosystem” for the platform. shopping for blind and visually impaired users. Part of this solution will be a mobile device with a camera running a Categories and Subject Descriptors text-recognition algorithm. Providing training data for this algorithm was the initial goal of this research project. K.6.5 [Computing Milieux]: Management of Computing and Information Systems—Security and Protection 2. RELATED WORK This paper builds on [6], which described the general Soy- 1. INTRODUCTION lentGrid infrastructure. We now present an implementation, In today’s web surfing experience, the task of solving a experiments and an ecosystem based on this infrastructure Captcha (Completely Automated Public Turing test to tailored to image labeling. tell Computers and Humans Apart) has become ubiquitous, with application ranging from preventing comment spam to The idea of a Captcha has first been formally introduced stopping automatic account creation. With the advent of in [1], along with the proposal to use hard AI problems ReCaptcha [8], the idea of using these tests to create la- for Captchas. Captchas based on recognizing objects – beled data sets was introduced. Our labeling tool on the specifically animals – in images are proposed in [2]. Initial Soylent Grid platform advances this idea in two ways, (1) observations on the usability of Captchas can be found in by supporting more than one task and (2) by creating an [9]. In [8], the authors present a way to display a Captcha open platform for all researchers to get their data sets la- problem that simultaneously provides security and gathers beled. Furthermore, we address the security and quality- user input for improving OCR systems, which is referred to of-service problems resulting from the openness. Given the as ReCaptcha. unrelenting demand for labeled image data sets by the AI community, we assume for sake of argument the availability The work of [10] also describes a general framework for hu- of a bottomless source of image data sets at our disposal. man computation involving researchers, website administra- tors, and users. In that work, they broadly outline different Due to the variety of tasks and data sets, the system becomes models for how the three entities could potentially interact – harder to attack if the different tasks and data sets are dis- including models where money or services are exchanged be- played at random and security measures for retiring data tween the person needing human computation and internet user. In contrast, our framework observes that each party Visiting Student from University of Potsdam, Germany ∗ provides a different value to the system, and we position †Contact author. them to interact in a cooperative setting. Users provide hu- man computation cycles and desire content from websites. Website administrators want users to access their content but desire security. Researchers provide data to be used for security but desire human computation. This work de- scribes how we channel the goals of each group so that their strengths are leveraged and needs are satisfied. 3. PROPOSED APPROACH The SoylentGrid platform keeps track of data from researchers that require human annotation. These data sets contain el- ements that are hand labeled by the researchers themselves – the control data – and elements without labels that need to be labeled by users – the experiment data. When a data set is initially uploaded to SoylentGrid, we first subject it to a period of evaluation to gauge the difficultly of the labeling task; this period of time is referred to as a data set’s pilot study. Details about how we conduct the pilot study are in Section 6.3. After this evaluation is complete, the data set is added to the SoylentGrid and is assigned a priority for how often the data from a particular researcher’s Figure 1: User Interface ‘Both’-Task. Displayed are set is presented to users. A higher priority for a data set two product images with bounding boxes around the means the data will be labeled sooner. The details of how words to be entered already drawn. The words are we determine priority are discussed in Section 6. also entered already. For the annotation task, the bounding boxes would be supplied by the task, for From a user’s point of view, we present each of the tasks the detection task, the label would be supplied by twice side-by-side. Following the approach of [8], one of the task. them is the experiment task, the other one the control task. For the control task, the task solution is already known, whereas for the experiment task, the solution is the label 3.2 User tasks sought by the researcher. The data for the tasks is drawn at Users want to access a resources on the internet, and an random respectively from the experiment and control data attempt to access one protected by SoylentGrid results in a sets. It is not revealed which task is experiment and which prompt to complete one of a number of tasks that acts as is control. a Captcha. We describe two tasks we’ve implemented for our experiments: image annotation and object detection. If the solution for the control task is correct, the user is granted access to the secured resource and the experiment In the annotation task, an image is displayed together with task data is saved. If the solution is not correct, the user an overlay rectangle highlighting a part of that image. The is presented with a new task. This approach provides a user is supposed to type in the word displayed in the high- Captcha, as long as the given task can only be solved with lighted area. Therefore, we can support labeling multiple low probability by a computer program. areas per image. The user can click on the image to see a larger version of the image as an overlay to the complete Since the user interface of our Captcha is going to be em- website. bedded into another website, the user interface has to be constrained in size, our implementation is 400 pixels wide For the detection task, a user is given a word and is supposed and 200 pixels high. Each of the displayed images is resized to draw a bounding box around the given word by either to 150x150 pixels. clicking on one corner and dragging and releasing the mouse or by clicking on two corners of the box. In each method, a tentative rectangle follows the cursor. 3.1 Definitions Three stakeholders participate in the platform: The ‘both’-task is a combination of the two tasks: The user chooses a word from the presented image, draws a rectangle Researchers: Provide image data sets and need labels around it and types it. This task has the highest requirement for control data items, because all possible words and their Website Administrators: Need portions of their website pro- bounding boxes in the image have to be previously known. tected by Captchas This task can be seen in figure 1. Users: Want access to a Captcha-secured resource 3.3 Researcher tasks Three different tasks are implemented: From an researcher’s point of view, SoylentGrid is used as an image labeling tool. He provides the system with his data Annotation: Type a text label given a bounding box set and configuration parameters. The data set contains labeled control data and and unlabeled experiment data. Detection: Draw a bounding box given a text label The configuration parameters consist of the level of tolerance to accept labels as being correct and the number of times a Both: A combination of both tasks particular unit of data needs to be consistently labeled by users to satisfy the researcher. In the following sections, we define each of the stakeholders and their associated tasks. 3.4 Website Admin tasks For a website administrator, the motivation to use a Captcha comes from the need to protect certain resources of a web- site, i.e. web forms, account creation sites, search boxes, control right is therefore the inverse of the number of words due to concerns for the site performance, spam or other in the dictionary (m). malicious behavior. A website administrator needs to in- 1 tegrate our Captcha solution into his web application to pann = (1) make sure that his resources are effectively protected. Key m to the adoption of Captchas is to provide an easy mecha- nism to use them with popular content management systems such as Drupal and Wordpress. Therefore, we’re planning Detection. The trivial attack on the detection task would to publish these plugins to facilitate widespread adoption of place a random bounding box on the given image surface.
Recommended publications
  • Google Ad Tech
    Yaletap University Thurman Arnold Project Digital Platform Theories of Harm Paper Series: 4 Report on Google’s Conduct in Advertising Technology May 2020 Lissa Kryska Patrick Monaghan I. Introduction Traditional advertisements appear in newspapers and magazines, on television and the radio, and on daily commutes through highway billboards and public transportation signage. Digital ads, while similar, are powerful because they are tailored to suit individual interests and go with us everywhere: the bookshelf you thought about buying two days ago can follow you through your favorite newspaper, social media feed, and your cousin’s recipe blog. Digital ads also display in internet search results, email inboxes, and video content, making them truly ubiquitous. Just as with a full-page magazine ad, publishers rely on the revenues generated by selling this ad space, and the advertiser relies on a portion of prospective customers clicking through to finally buy that bookshelf. Like any market, digital advertising requires the matching of buyers (advertisers) and sellers (publishers), and the intermediaries facilitating such matches have more to gain every year: A PwC report estimated that revenues for internet advertising totaled $57.9 billion for 2019 Q1 and Q2, up 17% over the same half-year period in 2018.1 Google is the dominant player among these intermediaries, estimated to have netted 73% of US search ad spending2 and 37% of total US digital ad spending3 in 2019. Such market concentration prompts reasonable questions about whether customers are losing out on some combination of price, quality, and innovation. This report will review the significant 1 PricewaterhouseCoopers for IAB (October 2019), Internet Advertising Revenue Report: 2019 First Six Months Results, p.2.
    [Show full text]
  • Privacy Policy Interpretation and Definitions
    Privacy Policy This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You. We use Your Personal data to provide and improve the Service. By using the Service, You agree to the collection and use of information in accordance with this Privacy Policy. Interpretation and Definitions Interpretation The words of which the initial letter is capitalized have meanings defined under the following conditions. The following definitions shall have the same meaning regardless of whether they appear in singular or in plural. Definitions For the purposes of this Privacy Policy: • You means the individual accessing or using the Service, or the company, or other legal entity on behalf of which such individual is accessing or using the Service, as applicable. Under GDPR (General Data Protection Regulation), You can be referred to as the Data Subject or as the User as you are the individual using the Service. • Company (referred to as either "the Company", "We", "Us" or "Our" in this Agreement) refers to Adventure City Inc., 1238 S. BEACH BLVD., SUITE E. For the purpose of the GDPR, the Company is the Data Controller. • Affiliate means an entity that controls, is controlled by or is under common control with a party, where "control" means ownership of 50% or more of the shares, equity interest or other securities entitled to vote for election of directors or other managing authority. • Account means a unique account created for You to access our Service or parts of our Service.
    [Show full text]
  • What Is Dart?
    1 Dart in Action By Chris Buckett As a language on its own, Dart might be just another language, but when you take into account the whole Dart ecosystem, Dart represents an exciting prospect in the world of web development. In this green paper based on Dart in Action, author Chris Buckett explains how Dart, with its ability to either run natively or be converted to JavaScript and coupled with HTML5 is an ideal solution for building web applications that do not need external plugins to provide all the features. You may also be interested in… What is Dart? The quick answer to the question of what Dart is that it is an open-source structured programming language for creating complex browser based web applications. You can run applications created in Dart by either using a browser that directly supports Dart code, or by converting your Dart code to JavaScript (which happens seamlessly). It is class based, optionally typed, and single threaded (but supports multiple threads through a mechanism called isolates) and has a familiar syntax. In addition to running in browsers, you can also run Dart code on the server, hosted in the Dart virtual machine. The language itself is very similar to Java, C#, and JavaScript. One of the primary goals of the Dart developers is that the language seems familiar. This is a tiny dart script: main() { #A var d = “Dart”; #B String w = “World”; #C print(“Hello ${d} ${w}”); #D } #A Single entry point function main() executes when the script is fully loaded #B Optional typing (no type specified) #C Static typing (String type specified) #D Outputs “Hello Dart World” to the browser console or stdout This script can be embedded within <script type=“application/dart”> tags and run in the Dartium experimental browser, converted to JavaScript using the Frog tool and run in all modern browsers, or saved to a .dart file and run directly on the server using the dart virtual machine executable.
    [Show full text]
  • TIBCO Activematrix® BPM Web Client Developer's Guide Software Release 4.3 April 2019 2
    TIBCO ActiveMatrix® BPM Web Client Developer's Guide Software Release 4.3 April 2019 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. ANY SOFTWARE ITEM IDENTIFIED AS THIRD PARTY LIBRARY IS AVAILABLE UNDER SEPARATE SOFTWARE LICENSE TERMS AND IS NOT PART OF A TIBCO PRODUCT. AS SUCH, THESE SOFTWARE ITEMS ARE NOT COVERED BY THE TERMS OF YOUR AGREEMENT WITH TIBCO, INCLUDING ANY TERMS CONCERNING SUPPORT, MAINTENANCE, WARRANTIES, AND INDEMNITIES. DOWNLOAD AND USE OF THESE ITEMS IS SOLELY AT YOUR OWN DISCRETION AND SUBJECT TO THE LICENSE TERMS APPLICABLE TO THEM. BY PROCEEDING TO DOWNLOAD, INSTALL OR USE ANY OF THESE ITEMS, YOU ACKNOWLEDGE THE FOREGOING DISTINCTIONS BETWEEN THESE ITEMS AND TIBCO PRODUCTS.
    [Show full text]
  • Attacking AJAX Web Applications Vulns 2.0 for Web 2.0
    Attacking AJAX Web Applications Vulns 2.0 for Web 2.0 Alex Stamos Zane Lackey [email protected] [email protected] Blackhat Japan October 5, 2006 Information Security Partners, LLC iSECPartners.com Information Security Partners, LLC www.isecpartners.com Agenda • Introduction – Who are we? – Why care about AJAX? • How does AJAX change Web Attacks? • AJAX Background and Technologies • Attacks Against AJAX – Discovery and Method Manipulation – XSS – Cross-Site Request Forgery • Security of Popular Frameworks – Microsoft ATLAS – Google GWT –Java DWR • Q&A 2 Information Security Partners, LLC www.isecpartners.com Introduction • Who are we? – Consultants for iSEC Partners – Application security consultants and researchers – Based in San Francisco • Why listen to this talk? – New technologies are making web app security much more complicated • This is obvious to anybody who reads the paper – MySpace – Yahoo – Worming of XSS – Our Goals for what you should walk away with: • Basic understanding of AJAX and different AJAX technologies • Knowledge of how AJAX changes web attacks • In-depth knowledge on XSS and XSRF in AJAX • An opinion on whether you can trust your AJAX framework to “take care of security” 3 Information Security Partners, LLC www.isecpartners.com Shameless Plug Slide • Special Thanks to: – Scott Stender, Jesse Burns, and Brad Hill of iSEC Partners – Amit Klein and Jeremiah Grossman for doing great work in this area – Rich Cannings at Google • Books by iSECer Himanshu Dwivedi – Securing Storage – Hackers’ Challenge 3 • We are
    [Show full text]
  • GOOGLE ADVERTISING TOOLS (FORMERLY DOUBLECLICK) OVERVIEW Last Updated October 1, 2019
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
    [Show full text]
  • Cliente Twitter Con Compresión De Datos
    PROYECTO FIN DE GRADO GRADO EN INGENIERÍA INFROMÁTICA CLIENTE TWITTER CON COMPRESIÓN DE DATOS Autor: Plácido Fernández Declara Tutores: Luis Miguel Sánchez García Rafael Sotomayor Fernández Colmenarejo, Febrero de 2013 RESUMEN La popular red social Twitter es usada hoy en día en diversos lugares y momentos, gracias también a las redes móviles que nos proporcionan conexión a internet en casi cualquier lugar. Twitter permite publicar y mandar mensajes cortos de texto plano con un máximo de 140 caracteres, así como la lectura de estos mensajes cortos de otros usuarios a los que podemos seguir para tal propósito. Hacer uso de este servicio en zonas con buena cobertura, o cuando usamos Wi-fi no supone generalmente ningún problema. Es cuando nos encontramos en zonas de poca cobertura cuando vemos problemas para hacer uso de este servicio, ya que las velocidades de descarga pueden disminuir hasta el punto de necesitar decenas de segundos para disponer de los mensajes cortos, los “Tweets”. A esto hay que añadir que los planes de datos actuales están limitados de alguna forma (al alcanzar un número de Mb), por lo que la cantidad de Mb usada es hoy también un factor importante. Para ello esta aplicación ofrece la experiencia de un cliente Twitter sencillo en el que consultar los “Tweets” de a quien seguimos, así como publicar “Tweets”, haciendo uso de un Proxy que comprime estos datos considerablemente de forma que se reducen los tiempos de descarga para las zonas de poca cobertura y además se reduce el número de Mb consumidos por el dispositivo móvil. Índice de contenido RESUMEN .................................................................................................................................
    [Show full text]
  • In the Common Pleas Court Delaware County, Ohio Civil Division
    IN THE COMMON PLEAS COURT DELAWARE COUNTY, OHIO CIVIL DIVISION STATE OF OHIO ex rel. DAVE YOST, OHIO ATTORNEY GENERAL, Case No. 21 CV H________________ 30 East Broad St. Columbus, OH 43215 Plaintiff, JUDGE ___________________ v. GOOGLE LLC 1600 Amphitheatre Parkway COMPLAINT FOR Mountain View, CA 94043 DECLARATORY JUDGMENT AND INJUNCTIVE RELIEF Also Serve: Google LLC c/o Corporation Service Co. 50 W. Broad St., Ste. 1330 Columbus OH 43215 Defendant. Plaintiff, the State of Ohio, by and through its Attorney General, Dave Yost, (hereinafter “Ohio” or “the State”), upon personal knowledge as to its own acts and beliefs, and upon information and belief as to all matters based upon the investigation by counsel, brings this action seeking declaratory and injunctive relief against Google LLC (“Google” or “Defendant”), alleges as follows: I. INTRODUCTION The vast majority of Ohioans use the internet. And nearly all of those who do use Google Search. Google is so ubiquitous that its name has become a verb. A person does not have to sign a contract, buy a specific device, or pay a fee to use Good Search. Google provides its CLERK OF COURTS - DELAWARE COUNTY, OH - COMMON PLEAS COURT 21 CV H 06 0274 - SCHUCK, JAMES P. FILED: 06/08/2021 09:05 AM search services indiscriminately to the public. To use Google Search, all you have to do is type, click and wait. Primarily, users seek “organic search results”, which, per Google’s website, “[a] free listing in Google Search that appears because it's relevant to someone’s search terms.” In lieu of charging a fee, Google collects user data, which it monetizes in various ways—primarily via selling targeted advertisements.
    [Show full text]
  • Google's March 2021 Announcement
    ACXIOM POINT OF VIEW GOOGLE’S MARCH 2021 ANNOUNCEMENT WHAT YOU NEED TO KNOW EXECUTIVE SUMMARY When Google speaks, everyone listens. It owns over 60% of browser market share and over 29% of the U.S. digital ad revenue.1, 2 Any change that Google makes to its Chrome browser will likely impact all advertisers, publishers and adtech vendors that depend on the internet as a way to make money. Just the facts. 1. What did Google say on March 3? • The company reiterated that third-party cookies will go away on Chrome in March 2022. • Google will not build alternate user-based identifiers to track individuals, nor use them in its products. • As part of Chrome’s Privacy Sandbox proposals, different APIs will be used for different use cases. FLoC (Interest-based targeting), Fledge (Remarketing), and Conversions API (Measurement use cases} are three out of the nine APIs that will be available. All data will be aggregated and no longer used to track and target users at the individual user level. Per Google’s announcement, we have one year to prepare for a world without third-party cookies. While we’ve all known this was coming, we really didn’t know when. Now you can set your countdown timer to March 2022. Google has also clarified that there will be no alternate identifiers used in Google products. In a blog post, David Temkin, Google’s Director of Product Management, made it clear Google would be curbing any attempt by third-party intermediaries to track individuals across sites as they browse the internet.
    [Show full text]
  • Towards Secure and Reusable Web Applications
    Mashups and Modularity: Towards Secure and Reusable Web Applications Antero Taivalsaari Tommi Mikkonen Sun Microsystems Laboratories [email protected] http://research.sun.com/projects/lively 2 Evolution of the Web 1) Simple pages with text and static images only (e.g., http://www.google.com) 2) Animated pages with plug-ins (e.g., http://www.cadillac.com) 3) Rich Internet Applications (e.g., docs.google.com) What's Next? 3 Web Applications – Implications • Web-based software will dramatically change the way people develop, deploy and use software. • No more installations! > Applications will simply run off the Web. • No more upgrades! > Always run the latest application version. • Instant worldwide deployment! > No middlemen or distributors needed. • No CPU dependencies, OS dependencies, ... > The Web is the Platform. 4 Unfortunately... • The web browser was not designed for running real applications. > It was designed in the early 1990s for viewing documents, forms and other page-structured artifacts – not applications. > Programming capabilities on the web were an afterthought, not something inherent in the design of the browser. • Various Rich Internet Application (RIA) technologies have been introduced recently to retrofit application execution capabilities into the web browser. 5 Web Development vs. Conventional Software The Impedance Mismatch Web Development Conventional SW Development - Documents - Applications - Page / form oriented interaction - Direct manipulation - Managed graphics, static layout - Directly drawn, dynamic
    [Show full text]
  • Online Advertising in the UK
    Online advertising in the UK A report commissioned by the Department for Digital, Culture, Media & Sport January 2019 Stephen Adshead, Grant Forsyth, Sam Wood, Laura Wilkinson plumconsulting.co.uk About Plum Plum is an independent consulting firm, focused on the telecommunications, media, technology, and adjacent sectors. We apply extensive industry knowledge, consulting experience, and rigorous analysis to address challenges and opportunities across regulatory, radio spectrum, economic, commercial, and technology domains. About this study This study for the Department of Digital, Culture, Media & Sport explores the structure of the online advertising sector, and the movement of data, content and money through the online advertising supply chain. It also assesses the potential for harms to arise as a result of the structure and operation of the sector. Plum Consulting 10 Fitzroy Square London W1T 5HP T +44 20 7047 1919 E [email protected] Online advertising in the UK Contents Executive summary 5 Introduction 5 Taxonomy of online advertising 6 Market size and growth 7 Value chain and roles 8 Market dynamics 11 Money flows 12 Data flows 14 Ad flows and control points 16 Assessment of potential harms 17 1 Introduction 20 1.1 Terms of reference 20 1.2 Methodology 20 1.3 Caveats 20 1.4 Press publishers 21 1.5 Structure of this report 21 2 Taxonomy of online advertising 22 2.1 Online advertising formats 22 2.2 Targeting of online advertising 33 2.3 Future developments 34 3 Market size and growth 35 4 Value chain and roles 40 4.1 Overview
    [Show full text]
  • Diseño De Un Sistema De Monitorización De Dispositivos Móviles
    Departamento de Informática PROYECTO FIN DE GRADO DISEÑO DE UN SISTEMA DE MONITORIZACIÓN DE DISPOSITIVOS MÓVILES Autor: Antonio Becerra López Tutor: Luis Miguel Sánchez García Colmenarejo, Septiembre de 2012 1 Diseño de un sistema de monitorización de dispositivos móviles Título: Diseño de un sistema de monitorización de dispositivos móviles Autor: Antonio Becerra López Director: EL TRIBUNAL Presidente: Vocal: Secretario: Realizado el acto de defensa y lectura del Proyecto Fin de Carrera el día __ de _______ de 20__ en Leganés, en la Escuela Politécnica Superior de la Universidad Carlos III de Madrid, acuerda otorgarle la CALIFICACIÓN de VOCAL SECRETARIO PRESIDENTE 1 2 Diseño de un sistema de monitorización de dispositivos móviles Resumen AndroidMonitor es un sistema cuya finalidad consiste en monitorizar distribuidamente dispositivos móviles con el sistema operativo Android. Los teléfonos móviles en la actualidad son un elemento indispensable más de las personas junto con las llaves de casa y la cartera con los documentos personales. En el año 2011, la población total de la Tierra superaba la asombrosa cantidad de siete mil millones de personas. En ese mismo año, se calculaba que el número de teléfonos móviles en el mundo era superior a los 5.600 millones. Los dispositivos móviles cuentan con gran variedad de sensores: acelerómetro, sensor de luz, sensor de temperatura, barómetro, sensor de gravedad, sensor de presión; Sensores que recopilan información de su entorno que puede ser utilizada para comprar la situación del terminal. El objetivo de este proyecto es el análisis, el diseño y el desarrollo de un sistema para monitorizar remotamente los valores de los sensores de dispositivos móviles.
    [Show full text]