Senior Design 2 Documentation

Total Page:16

File Type:pdf, Size:1020Kb

Senior Design 2 Documentation UCF Senior Design II The Medspencer A Smart Medicine Dispenser that Dispenses Medicine on Fixed-Schedule or As-Needed Basis, for Individual or Family use Department of Electrical Engineering and Computer Science University of Central Florida Dr. Samuel Richie and Dr. Lei Wei Summer 2018 Senior Design 2 Document Group 6 Ivan Alvarez Computer & Electrical [email protected] Matthew Hoover Computer Engineer [email protected] Sakeenah Khan Electrical Engineer [email protected] Gustavo Morales Electrical Engineer [email protected] ii Table of Contents List of Figures .................................................................................................................... vi List of Tables ..................................................................................................................... ix 1.0 Executive Summary ...................................................................................................... 1 2.0 Project Description........................................................................................................ 2 2.1 Motivations and Goals .............................................................................................. 2 2.2 Objectives ................................................................................................................. 3 2.3 Requirements Specification ...................................................................................... 4 2.4 House of Quality ....................................................................................................... 5 3.0 Related Standards and Constraints................................................................................ 6 3.1 Project Related Stands .............................................................................................. 6 3.1.1 IEEE Standards .................................................................................................. 6 3.1.2 FDA Standards ................................................................................................... 7 3.1.3 Soldering Standards and Safety ......................................................................... 9 3.2 Design Constraints .................................................................................................. 11 3.2.1 Economic Constraints ...................................................................................... 11 3.2.2 Time Constraints .............................................................................................. 12 3.2.3 Manufacturability and Sustainability Constraints ............................................ 13 3.2.4 Parts, Component, and Testing Constraints ..................................................... 14 3.2.5 Environmental Constraints............................................................................... 16 3.2.6 Health and Safety Constraints .......................................................................... 17 3.2.7 Ethical and Legal Constraints .......................................................................... 19 3.2.8 Social and Cultural Constraints ....................................................................... 21 3.2.9 Political Constraints or FDA Standards ........................................................... 22 3.2.10 Security Constraints ....................................................................................... 25 i 3.2.11 Performance, Functionality, Usability, Reliability and Availability ............. 27 4.0 Research and Background Information ...................................................................... 28 4.1 Market Research ..................................................................................................... 28 4.1.1 Existing Products ............................................................................................. 28 4.1.2 Input from Medical Professionals .................................................................... 30 4.2 Microcontroller ....................................................................................................... 32 4.2.1 Research ........................................................................................................... 33 4.2.2 Microchip PIC32MZ DA ................................................................................. 34 4.2.3 Microchip PIC32MZ DA Starter Kit ............................................................... 36 4.2.4 MPLAB Harmony ............................................................................................ 37 4.2.5 ATMEGA328P Microcontroller ...................................................................... 40 4.2.6 Raspberry Pi Compute Module 3 Lite ............................................................. 40 4.3 Display .................................................................................................................... 40 4.3.1 Technical Background ..................................................................................... 41 4.3.2 Frame Buffer Space Saving Techniques .......................................................... 41 4.3.3 Innolux AT070TN90 ....................................................................................... 43 4.3.4 Resistive Touch Screen .................................................................................... 44 4.3.5 Resistive Touch Screen Controller .................................................................. 46 4.4 Wi-Fi connection .................................................................................................... 47 4.5 Fingerprint Scanner ................................................................................................. 48 4.6 Motors ..................................................................................................................... 49 4.7 Speaker .................................................................................................................... 50 4.8 Power ...................................................................................................................... 51 4.8.1 Power Supply ................................................................................................... 51 4.8.2 Power Regulation and Filtering ....................................................................... 52 ii 4.9 Communication Protocols ....................................................................................... 52 5.0 Project Hardware and Software Design Details.......................................................... 56 5.1 Hardware Design .................................................................................................... 56 5.1.1 Hardware Block Diagram ................................................................................ 56 5.1.2 Hardware Design Overview ............................................................................. 58 5.1.3 Microcontroller Design .................................................................................... 60 5.1.4 Wi-Fi Module................................................................................................... 64 5.1.5 Display Design ................................................................................................. 65 5.1.6 Fingerprint Scanner .......................................................................................... 68 5.1.7 Dispensing Mechanism .................................................................................... 69 5.1.8 Speaker ............................................................................................................. 71 5.1.9 Power Supply ................................................................................................... 72 5.1.10 Power Regulation and Filtering ..................................................................... 73 5.2 Software Design ...................................................................................................... 79 5.2.1 ATMega328P Software ................................................................................... 80 5.2.2 User Interface ................................................................................................... 81 5.2.3 SQLite .............................................................................................................. 82 5.2.4 Wi-Fi Communication ..................................................................................... 82 5.2.5 Fingerprint Scanner .......................................................................................... 83 5.2.6 Patient Identification & Adding/Removing a Patient ...................................... 88 5.2.7 Prescription Parameters and Schedules ........................................................... 89 5.2.8 As-needed Medication Requests ...................................................................... 90 5.2.9 Fixed-schedule Medicine Notifications and Requests ..................................... 90 5.2.10 Rescheduling Doses ....................................................................................... 90 5.2.11 Recording events in Schedule & Summary Reports ...................................... 91 iii 5.2.12 Python Structure............................................................................................. 91 6.0 Prototype Construction ............................................................................................... 95 6.1 Parts Acquisition and Bill of Materials
Recommended publications
  • NIST SP 800-175B (DRAFT) Guideline for Using Crypto Standards: Cryptographic Mechanisms
    The attached DRAFT document (provided here for historical purposes) has been superseded by the following publication: Publication Number: NIST Special Publication (SP) 800-175B Title: Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms Publication Date: 8/22/2016 • Final Publication: http://dx.doi.org/10.6028/NIST.SP.800-175B (which links to http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-175B.pdf). • Information on other NIST cybersecurity publications and programs can be found at: http://csrc.nist.gov/ The following information was posted with the attached DRAFT document: March 11, 2016 NIST Released Draft SP 800-175B, Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms NIST requests comments on Special Publication 800-175B,Guideline for Using Cryptographic Standards in the Federal Government: Cryptographic Mechanisms. The SP 800-175 publications are intended to be a replacement for SP 800-21, Guideline for Implementing Cryptography in the Federal Government, but with a focus on using the cryptographic offerings currently available, rather than building one’s own implementation. SP 800-175B is intended to provide guidance to the Federal government for using cryptography and NIST’s cryptographic standards to protect sensitive, but unclassified digitized information during transmission and while in storage. The cryptographic methods and services to be used are also discussed. The first document in the series (i.e., SP 800-175A) will be available shortly. Please provide comments on SP 800-175B by Friday, April 29, 2016. Comments may be sent to [email protected], with “Comments on SP 800-175B” as the subject.
    [Show full text]
  • Competency Models
    SCIENCE, TECHNOLOGY, ENGINEERING & MATHEMATICS Architectural and Engineering Managers ACCCP Engineering and Technology Alabama Competency Model Architectural and Engineering Managers Code 1 Tier 1: Personal Effectiveness Competencies 1.1 Interpersonal Skills: Displaying the skills to work effectively with others from diverse backgrounds. 1.1.1 Demonstrating sensitivity/empathy 1.1.1.1 Show sincere interest in others and their concerns. 1.1.1.2 Demonstrate sensitivity to the needs and feelings of others. 1.1.1.3 Look for ways to help people and deliver assistance. 1.1.2 Demonstrating insight into behavior Recognize and accurately interpret the communications of others as expressed through various 1.1.2.1 formats (e.g., writing, speech, American Sign Language, computers, etc.). 1.1.2.2 Recognize when relationships with others are strained. 1.1.2.3 Show understanding of others’ behaviors and motives by demonstrating appropriate responses. 1.1.2.4 Demonstrate flexibility for change based on the ideas and actions of others. 1.1.3 Maintaining open relationships 1.1.3.1 Maintain open lines of communication with others. 1.1.3.2 Encourage others to share problems and successes. 1.1.3.3 Establish a high degree of trust and credibility with others. 1.1.4 Respecting diversity 1.1.4.1 Demonstrate respect for coworkers, colleagues, and customers. Interact respectfully and cooperatively with others who are of a different race, culture, or age, or 1.1.4.2 have different abilities, gender, or sexual orientation. Demonstrate sensitivity, flexibility, and open-mindedness when dealing with different values, 1.1.4.3 beliefs, perspectives, customs, or opinions.
    [Show full text]
  • Interoperability Strategic Vision: Enabling an Interactive Grid DRAFT
    Interoperability Strategic Vision: Enabling an Interactive Grid DRAFT April 2017 SE Widergren M Martin MR Knight B Nordman RB Melton A Khandekar D Narang K Hardy PNNL-26338 DRAFT PNNL-26338 DRAFT Interoperability Strategic Vision: Enabling an Interactive Grid SE Widergren1 M Martin2 MR Knight1 B Nordman3 RB Melton1 A Khandekar3 D Narang2 K Hardy4 April 2017 An Interim Deliverable for Review 1 Pacific Northwest National Laboratory 2 National Renewable Energy Laboratory 3 Lawrence Berkeley National Laboratory 4 Argonne National Laboratory PNNL-26338 Executive Summary The purpose of this Interoperability Strategic Vision document is to promote a common understanding of the meaning and characteristics VALUE OF of interoperability and to promote a strategy to advance the state of INTEROPERABILITY interoperability as applied to integration challenges facing grid modernization. This includes addressing the quality of integrating Reduces the cost and effort for devices and systems and the discipline to improve the process of system integration successfully integrating these components as business models and Improves grid performance and information technology improve over time. Stated succinctly, efficiency interoperability is “the ability of two or more systems or components to exchange information and to use the information that has been Facilitates more comprehensive grid security and cybersecurity exchanged.”1 Reasons to invest effort in addressing interoperability practices issues are reflected in the sidebar.2 Increases customer choice and Interoperability has important economic consequences. Systems that participation integrate simply and predictably have lower equipment costs and Establishes industry-wide best lower transactions costs, higher productivity through automation, practices more conversion of data and information into insight, higher competition between technology suppliers, and increased technology Is a catalyst of innovation and application innovation.
    [Show full text]
  • Follow-Up to NIST's Consideration of XTS-AES As Standardized by IEEE Std 1619-2007 � Date: April 29, 2009 �
    To: [email protected] � From: Matthew V. Ball, Sun Microsystems, Chair of IEEE Security in Storage Working Group (P1619) � Subject: Follow-up to NIST's Consideration of XTS-AES as standardized by IEEE Std 1619-2007 � Date: April 29, 2009 � Table of Contents Introduction.............................................................................................................................................................2 � The XTS algorithm itself.........................................................................................................................................2 � Comments From Moses Liskov and Kazuhiko Minematsu................................................................................2 � Comments From Vijay Bharadwaj and Neils Ferguson of Microsoft..................................................................2 � Comment From Phillip Rogaway of Univ. of CA, Davis......................................................................................4 � Comment From Boaz Shahar of Entropic Communications..............................................................................5 � Comments From Michael Willett of Seagate Technology...................................................................................6 � The depth of support in the storage industry for which it was designed..................................................................7 � Current Industry Support...................................................................................................................................7
    [Show full text]
  • Computer Security Division 2009 Annual Report Table of Contents
    Computer Security Division 2009 Annual Report Table of Contents Welcome 1 Development of FIPS 140-3, Security Requirements for Cryptographic Modules 25 Division Organization 2 Systems and Emerging Technologies Security Research Group 27 The Computer Security Division Implements the Federal Information Security Management Act of 2002 3 Identity Management Systems 27 Personal Identity Verification 27 Security Management and Assurance Group 4 NIST Personal Identity Verification Program 28 Conformance Tests for Transportation Workers Identification Federal Information Security Management Act Implementation Project 4 Credential Specifications 29 FISMA Implementation Project – Phase I 4 Identity Credential Smart Card Interoperability ISO/IEC 24727 FISMA Implementation Project – Phase II 5 Identification Cards Integrated Circuit Cards Programming Interfaces 29 Outreach and Awareness 6 Computer Security Resource Center 6 Biometric Standards and Conformity Assessment Activities 31 Federal Computer Security Program Managers’ Forum 8 Research in Emerging Technologies 33 Federal Information Systems Security Educators’ Association 8 Access Control - Information Sharing Environment 33 Information Security and Privacy Advisory Board 9 Automated Combinatorial Testing for Software 33 Security Practices and Policies 11 Conformance Verification for Access Control Policies 34 Small and Medium Size Business Outreach 11 Forensics for Web Services 35 Health Information Technology Security 12 Mobile Handheld Device Security and Forensics 35 NIST Cloud Computing
    [Show full text]
  • Design Space Exploration for Ultra-Low Energy and Secure Iot Mcus
    1 Design Space Exploration for Ultra-Low Energy and Secure IoT MCUs EHSAN AERABI, Iran University of Science and Technology, Iran.(*Corresponding Author) MILAD BOHLOULI, Iran University of Science and Technology, Iran MOHAMMADHASAN AHMADI LIVANY, University of Tehran, Iran ◦ MAHDI FAZELI , Iran University of Science and Technology, Iran.(*Corresponding Author) ATHANASIOS PAPADIMITRIOU, Univ. Grenoble Alpes, Grenoble INP ESISAR, ESYNOV, France DAVID HELY, Univ. Grenoble Alpes, Grenoble INP, LCIS, France This paper explores the design space of secure communication in ultra-low-energy IoT devices based on Micro-Controller Units (MCUs). It tries to identify, benchmark and compare security-related design choices in a Commercial-Off-The-Shelf (COTS) embedded IoT system which contributes to the energy consumption. We conduct a study over a large group of software crypto algorithms: symmetric, stream, hash, AEAD, MAC, digital signature and key exchange. A comprehensive report of the targeted optimization attributes (memory, performance and specifically energy) will be presented from over 450 experiments and 170 different crypto source codes. The paper also briefly explores a few system-related choices which can affect the energy consumption of secure communication, namely: architecture choice, communication bandwidth, signal strength, and processor frequency. In the end, the paper gives an overview of the obtained results and the contribution of all. Finally, it shows, in a case study, how the results could be utilized to have a secure communication in an exemplary IoT device. This paper gives IoT designers an insight on the ultra-low-energy security, helps them to choose appropriate cryptographic algorithms, reduce trial-and-error of alternatives, save effort and hence cut the design costs.
    [Show full text]
  • Iot Enabled Connected Capabilities for Banking and Financial Services
    IoT Enabled Connected Capabilities for Banking and Financial Services July 7, 2020 © 2020 Wells Fargo Bank, N.A. All rights reserved. Contents Abstract .................................................................................................................................................................................................................................... 3 What is a “Connected Device Network” ...................................................................................................................................................................... 3 Foundational Elements of the ”Connected Capabilities” Framework ............................................................................................................. 4 Use cases for Banking and Financial Services Organizations ............................................................................................................................. 7 Putting it all together .......................................................................................................................................................................................................... 8 References ............................................................................................................................................................................................................................... 9 Contributors .........................................................................................................................................................................................................................10
    [Show full text]
  • VLSI Circuits for Cryptographic Authentication
    Research Collection Doctoral Thesis VLSI Circuits for Cryptographic Authentication Author(s): Henzen, Luca Publication Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-006299208 Rights / License: In Copyright - Non-Commercial Use Permitted This page was generated automatically upon download from the ETH Zurich Research Collection. For more information please consult the Terms of use. ETH Library VLSI Circuits for Cryptographic Authentication Diss. ETH No. 19351 VLSI Circuits for Cryptographic Authentication A dissertation submitted to ETH ZURICH for the degree of Doctor of Sciences presented by LUCA HENZEN Dipl. El.-Ing. ETH (MSc ETH) born March 30th, 1982 citizen of Blatten VS, Switzerland accepted on the recommendation of Prof. Dr. Wolfgang Fichtner, examiner Prof. Dr. Willi Meier, co-examiner 2010 Abstract Nowadays, digital communication protocols rely on cryptographic mech- anisms to protect sensitive information from unauthorized access and modification. Cryptographic primitives, such as hash functions, block and stream ciphers, are key components of many information security applications, employed to provide privacy, authentication, and data integrity. Following the massive differentiation of modern commu- nication technologies, cryptography must be able to provide highly- efficient algorithms that combine strong security with optimal imple- mentability. It becomes therefore unlikely that a single cipher or hash function would be able to meet all the constraints imposed by the wide plethora of communication protocols. Researchers and designers are thus asked to develop application-specific algorithms that are jointly optimized for security and implementation performance. This thesis is concerned with the design of very large scale inte- gration (VLSI) circuits for cryptographic hash functions and block cipher authenticated encryption modes.
    [Show full text]