Found 221 repositories(showing 30)
iobridge
ThingSpeak is an open source “Internet of Things” application and API to store and retrieve data from things using HTTP over the Internet or via a Local Area Network. With ThingSpeak, you can create sensor logging applications, location tracking applications, and a social network of things with status updates.
rohanchandra30
This is the code base for our ACM CSCS 2019 paper: "RobustTP: End-to-End Trajectory Prediction for Heterogeneous Road-Agents in Dense Traffic with Noisy Sensor Inputs". This codebase contains implementations for several trajectory prediction methods including Social-GAN and TraPHic.
harshalbenake
(1) Name :- accelormeterSensor Description :- Using acceloremeter sensor to print Sensor event values. (2) Name :- ActionBarDropdownNavigation Description :- Action bar with dropdown navigation type. (3) Name :- android-actionbar-master Description :- Action bar buttons like add/delete/show. (4) Name :- Android Contact ListView Description :- Fake Contact listview. (5) Name :- AndroidListViewActivity Description :- Listview by extending ListActivity. (6) Name :- android-pulltorefresh-master Description :- Pulltorefresh demo. (7) Name :- Android-PullToRefresh-master Description :- Pulltorefresh handmark demo. (8) Name :- Android-Universal-Image-Loader-master Description :- Universal Image loader. (9) Name :- AnimationAllInOne Description :- Animation like fade/zoom/rotate. (10) Name :- arrayloop Description :- Different types of loops for arraylist items. (11) Name :- autocompletetextimagedemo Description :- Autocomplete with image and text. (12) Name :- BarcodeScanner Description :- Intent for Barcord scanner from google play. (13) Name :- bluetoothtoggle Description :- Toggle on/off bluetooth. (14) Name :- buttonpressed Description :-Status of button is pressed or not. (15) Name :- call Description :- Using TelephonyManager to get device phone number. (16) Name :- calling Description :- Intent to make call to specific number. (17) Name :- cellid Description :- Get cellid to get location. (18) Name :- Compass Description :- Google Glass - compass. (19) Name :- countrycode Description :- Get country code using Locale. (20) Name :- CustomLinkyfy Description :- Using custom linkyfy for various intents. (21) Name :- customlistviewBaseAdapter Description :- Listview with custom base adapter. (22) Name :- custompopup Description :- Dialog custom popup. (23) Name :- CustomSpinner Description :- Custom spinner with default value. (24) Name :- custom-ui Description :- Social Auth – custom UI. (25) Name :- databaseFromAsset Description :- Access database from asset folder. (26) Name :- dragndrop Description :- Drag and drop image demo. (27) Name :- expandablelistview Description :- Expandable listview demo. (28) Name :- flightmode Description :- Toggle on/off flight mode. (29) Name :- FragmentsTest Description :- Simple Fragment demo. (30) Name :- gallerydemo Description :- Image Gallery demo. (31) Name :- GestureDetection Description :- Detect gestures from user. (32) Name :- google image loader api complete Description :- Google image loader. (33) Name :- gpsonoff Description :- Toggle on/off GPS. (34) Name :- gpsonofstatus Description :- Get status of GPS on/off. (35) Name :- Gridlayout Description :- Grid layout demo. (36) Name :- gridviewsimple Description :- Simple grid view. (37) Name :- gsondemo Description :- Gson demo. (38) Name :- hbcustomlibaray Description :- Custom library demo. (39) Name :- HBfragment Description :- Fragment demo with detail and list view. (40) Name :- hideappfromlauncher Description :- Hide app icon from launcher. (41) Name :- highlightedittext Description :- Highlight the selected text. (42) Name :- home pressed Description :- Detect home button press. (43) Name :- HorizontalScrollViewActivity Description :- Horizontal scroll view demo. (44) Name :- ImageGridActivity Description :- Image grid using lru cache. (45) Name :- imageloadergoogle Description :- Google Image loader for auto complete. (46) Name :- imageloaderListViewWithJSONFromURL Description :- Image loader in listview pasring. (47) Name :- InstalledAppNames Description :- Get list of installed apps. (48) Name :- itemcount Description :- Item count calculation. (49) Name :- jasondemo Description :- Jason parsing demo. (50) Name :- jasonparsedemo Description :- Various kind of object json parsing using pojo. (51) Name :- JSONExampleActivity Description :- Json parsing post. (52) Name :- Jsonparsefromtxtfile Description :- Json parsing from txt file. (53) Name :- layoutadddynamically Description :- Adding infinity layout dynamically on button press. (54) Name :- layoutweightdemo Description :- Using layout weight for UI. (55) Name :- Linkedin Description :- Linkedin integration. (56) Name :- linkedinbest Description :- Linkedin integration. (57) Name :- Listview_baseadapter_getItemViewType Description :- Listview with getitemview type for different ui view per listitem. (58) Name :- LiveWallpaper Description :- Live Wallpaper demo. (59) Name :- MyAndroidAppActivity Description :- Simple string buffer. (60) Name :- mypopup Description :- Custom dailog. (61) Name :- notification Description :- Simple notification demo. (62) Name :- Notification_count Description :- Notification Badge count. (63) Name :- Paginated ListView Demo Description :- Pagination for listview. (64) Name :- PayPalSDKExample Description :- Paypal integration. (65) Name :- PinItDemo Description :- Pint it integration. (66) Name :- progressbardemo Description :- Progressbar demo. (67) Name :- ProximatySensorDemo Description :- Using Proximaty sensor for printing values. (68) Name :- pulltorefresh and dragndrop to gridview Description :- Pulltorefresh and drag n drop to gridview. (69) Name :- readtextfile Description :- Read simple text file. (70) Name :- recentRunningBackgroundAppList Description :- Get list of apps that were running recently. (71) Name :- rfile Description :- Get id value from view using r file. (72) Name :- ribbonsample Description :- Ribbon sample demo. (73) Name :- roatation Description :- Get status of rotation on/off. (74) Name :- rotatecenter Description :- Animate image rotation at center point. (75) Name :- screenorientation Description :- Get status of screen orientation landscape/portrait. (76) Name :- SdcardFormat Description :- Format sd card. (77) Name :- selectspeed Description :- Select speed ui txtsheild. (78) Name :- sendemail Description :- Send an email using intent. (79) Name :- share-bar Description :- Social Auth – custom UI. (80) Name :- share-button Description :- Social Auth – custom UI. (81) Name :- sharemyapp Description :- Share app apk from device. (82) Name :- signature Description :- Signature using image bitmap paint. (83) Name :- SimpleListView Description :- Simple listview demo. (84) Name :- smserrors Description :- Send sms and get various exceptions. (85) Name :- socialauth-android Description :- Social Auth demo. (86) Name :- Stopwatch Description :- Google Glass - Stopwatch. (87) Name :- SwitchButton Description :- SwitchButton toggle on/off demo. (88) Name :- textlink Description :- Text as a link url. (89) Name :- Timer Description :- Google Glass - Timer. (90) Name :- toggleButton Description :- Get status Toggle button on/off. (91) Name :- triangledrawable Description :- Draw triangle using drawable xml. (92) Name :- uninstallapp Description :- Uninstall app. (93) Name :- unknownsource Description :- Toggle on/off unknown source flag. (94) Name :- videodemo Description :- Simple video view to play rstp files. (95) Name :- videoviewdemo Description :- Video view to play Youtube files. (96) Name :- ViewPagerDemo Description :- Simple viewpager demo. (97) Name :- ViewpagerInDialogPopup Description :- View pager inside Dialog pop. (98) Name :- webviewnonxss Description :- You tube video play in webview using video id. (99) Name :- webviewyoutubeapi Description :- Simple video play in webview. (100) Name :- zoomtry Description :- Zoom in and zoom out animation.
Integreight
An Android app used along with our hardware shield to either control Arduino, read your smartphone's sensors in your Arduino sketch, post on social media, or even control your smartphone. It enables you to scan, connect, and interact with nearby 1Sheelds using our custom protocol.
Proyecto Hugo: basado en Arduino UNO, orientado a aplicaciones educativas, cientificas y de prototipado con pantalla LCD/OLED, múltiples sensores (conductividad, temperatura y pH), compensaciones físicas y uso de modelos matemáticos seleccionables. Está documentado a detalle, modular, y realizado con un profundo sentido humano y compromiso social.
vidhipitroda
In IOT based monitoring project designed for keep on time track on the health status of the patient and updating to doctor at remote location anytime. With this effective device, health status of a critically ill patient can be constantly monitored. It can be used to keep track of health of aged people who frequently have heart or blood pressure issues. The IoT project developed here is built on Arduino UNO. It is interfaced with ESP8266 Wi-Fi modem to connect with an internet router and access the cloud server. The Arduino is interfaced with LM-35 temperature sensor to sense the body temperature and a pulse sensor to read pulse rate It continuously monitors the pulse rate and body temperature and updates them to an IoT platform. If any abnormalities are detected then system immediately sends notification to doctor. The IoT platform used in this project is ThingSpeak. Thingspeak has capabilities for Visualizing the collected data in the form of charts, Ability to create apps for collaborating with web services or social network and other APIs. The data from ThingSpeak to android application will send by HTTP request and HTTP response protocol. A threshold value is being set for pulse rate and body temperature. In android application there will be separate login credentials for patient and doctor. When the doctor will login, list of patients will be displayed along with two tags Patient Details and Health Status. In health status data from the Thingspeak will be fetched, doctor can check the medicine that the patient is consuming and can update is depending upon the health status. The patient can check the health status and medicine list and can also update details accordingly. Such a system consist of physiological data that stores, process and communicate through a local manner such as smart phones by using the system the health care professionals can monitor and advice their patient all the time.
yqmark
Privacy Policy introduction We understand the importance of personal information to you and will do our utmost to protect your personal information. We are committed to maintaining your trust in us and to abide by the following principles to protect your personal information: the principle of consistency of rights and responsibilities, the principle of purpose , choose the principle of consent, at least the principle of sufficient use, ensure the principle of security, the principle of subject participation, the principle of openness and transparency, and so on. At the same time, we promise that we will take appropriate security measures to protect your personal information according to the industry's mature security solutions. In view of this, we have formulated this "Private Privacy Policy" (hereinafter referred to as "this policy" /This Privacy Policy") and remind you: This policy applies to products or services on this platform. If the products or services provided by the platform are used in the products or services of our affiliates (for example, using the platform account directly) but there is no independent privacy policy, this policy also applies to the products or services. It is important to note that this policy does not apply to other third-party services provided by you, nor to products or services on this platform that have been independently set up with a privacy policy. Before using the products or services on this platform, please read and understand this policy carefully, and use the related products or services after confirming that you fully understand and agree. By using the products or services on this platform, you understand and agree to this policy. If you have any questions, comments or suggestions about the content of this policy, you can contact us through various contact methods provided by this platform. This privacy policy section will help you understand the following: How we collect and use your personal information How do we use cookies and similar technologies? How do we share, transfer, and publicly disclose your personal information? How we protect your personal information How do you manage your personal information? How do we deal with the personal information of minors? How your personal information is transferred globally How to update this privacy policy How to contact us 一、How we collect and use your personal information Personal information refers to various information recorded electronically or otherwise that can identify a specific natural person or reflect the activities of a particular natural person, either alone or in combination with other information. We collect and use your information for the purposes described in this policy. Personal information: (一)Help you become our user To create an account so that we can serve you, you will need to provide the following information: your nickname, avatar, gender, date of birth, mobile number/signal/QQ number, and create a username and password. During the registration process, if you provide the following additional information to supplement your personal information, it will help us to provide you with better service and experience: your real name, real ID information, hometown, emotional status, constellation, occupation, school Your real avatar. However, if you do not provide this information, it will not affect the basic functions of using the platform products or services. The above information provided by you will continue to authorize us during your use of the Service. When you voluntarily cancel your account, we will make it anonymous or delete your personal information as soon as possible in accordance with applicable laws and regulations. (二)Show and push goods or services for you In order to improve our products or services and provide you with personalized information search and transaction services, we will extract your browsing, search preferences, behavioral habits based on your browsing and search history, device information, location information, and transaction information. Features such as location information, indirect crowd portraits based on feature tags, and display and push information. If you do not want to accept commercials that we send to you, you can cancel them at any time through the product unsubscribe feature. (三)Provide goods or services to you 1、Information you provide to us Relevant personal information that you provide to us when registering for an account or using our services, such as phone numbers, emails, bank card numbers or Alipay accounts; The shared information that you provide to other parties through our services and the information that you store when you use our services. Before providing the platform with the aforementioned personal information of the other party, you need to ensure that you have obtained your authorization. 2、Information we collect during your use of the service In order to provide you with page display and search results that better suit your needs, understand product suitability, and identify account anomalies, we collect and correlate information about the services you use and how they are used, including: Device Information: We will receive and record information about the device you are using (such as device model, operating system version, device settings, unique device identifier, etc.) based on the specific permissions you have granted during software installation and use. Information about the location of the device (such as Idiv address, GdivS location, and Wi-Fi that can provide relevant information) Sensor information such as access points, Bluetooth and base stations. Since the services we provide are based on the mobile social services provided by the geographic location, you confirm that the successful registration of the "this platform" account is deemed to confirm the authorization to extract, disclose and use your geographic location information. . If you need to terminate your location information to other users, you can set it to be invisible at any time. Log information: When you use our website or the products or services provided by the client, we will automatically collect your detailed usage of our services as a related web log. For example, your search query content, Idiv address, browser type, telecom carrier, language used, date and time of access, and web page history you visit. Please note that separate device information, log information, etc. are information that does not identify a particular natural person. If we combine such non-personal information with other information to identify a particular natural person or use it in conjunction with personal information, such non-personal information will be treated as personal information during the combined use, except for your authorization. Or as otherwise provided by laws and regulations, we will anonymize and de-identify such personal information. When you contact us, we may save information such as your communication/call history and content or the contact information you left in order to contact you or help you solve the problem or to document the resolution and results of the problem. 3、Your personal information collected through indirect access You can use the products or services provided by our affiliates through the link of the platform provided by our platform account. In order to facilitate our one-stop service based on the linked accounts and facilitate your unified management, we will show you on this platform. Information or recommendations for information you are interested in, including information from live broadcasts and games. You can discover and use the above services through the homepage of the platform, "More" and other functions. When you use the above services through our products or services, you authorize us to receive, aggregate, and analyze from our affiliates based on actual business and cooperation needs, we confirm that their source is legal or that you authorize to consent to your personal information provided to us or Trading Information. If you refuse to provide the above information or refuse to authorize, you may not be able to use the corresponding products or services of our affiliates, or can not display relevant information, but does not affect the use of the platform to browse, chat, release dynamics and other core services. (四)Provide you with security Please note that in order to ensure the authenticity of the user's identity and provide you with better security, you can provide us with identification information such as identity card, military officer's card, passport, driver's license, social security card, residence permit, facial identification, and other biometric information. Personally sensitive information such as Sesame Credit and other real-name certifications. If you refuse to provide the above information, you may not be able to use services such as account management, live broadcast, and continuing risky transactions, but it will not affect your use of browsing, chat and other services. To improve the security of your services provided by us and our affiliates and partners, protect the personal and property of you or other users or the public from being compromised, and better prevent phishing websites, fraud, network vulnerabilities, computer viruses, cyber attacks , security risks such as network intrusion, more accurately identify violations of laws and regulations or the relevant rules of the platform, we may use or integrate your user information, transaction information, equipment information, related web logs and our affiliates, partners to obtain You authorize or rely on the information shared by law to comprehensively judge your account and transaction risks, conduct identity verification, detect and prevent security incidents, and take necessary records, audits, analysis, and disposal measures in accordance with the law. (五)Other uses When we use the information for other purposes not covered by this policy, or if the information collected for a specific purpose is used for other purposes, you will be asked for your prior consent. (六)Exception for authorization of consent According to relevant laws and regulations, collecting your personal information in the following situations does not require your authorized consent: 1、Related to national security and national defense security; 2、Related to public safety, public health, and major public interests; 3、Related to criminal investigation, prosecution, trial and execution of judgments, etc.; 4、It is difficult to obtain your own consent for the maintenance of the important legal rights of the personal information or other individuals’ lives and property; 5、The personal information collected is disclosed to the public by yourself; 二、How do we use cookies and similar technologies? (一)Cookies To ensure that your site is up and running, to give you an easier access experience, and to recommend content that may be of interest to you, we store a small data file called a cookie on your computer or mobile device. Cookies usually contain an identifier, a site name, and some numbers and characters. With cookies, websites can store data such as your preferences. (二)Website Beacons and Pixel Labels In addition to cookies, we use other technologies like web beacons and pixel tags on our website. For example, the email we send to you may contain an address link to the content of our website. If you click on the link, we will track the click to help us understand your product or service preferences so that we can proactively improve customer service. Experience. A web beacon is usually a transparent image that is embedded in a website or email. With the pixel tags in the email, we can tell if the email is open. If you don't want your event to be tracked this way, you can unsubscribe from our mailing list at any time. 三、How do we share, transfer, and publicly disclose your personal information? (一)shared We do not share your personal information with companies, organizations, and individuals other than the platform's service providers, with the following exceptions: 1、Sharing with explicit consent: We will share your personal information with others after obtaining your explicit consent. 2、Sharing under statutory circumstances: We may share your personal information in accordance with laws and regulations, litigation dispute resolution needs, or in accordance with the requirements of the administrative and judicial authorities. 3. Sharing with affiliates: In order to facilitate our services to you based on linked accounts, we recommend information that may be of interest to you or protect the personal property of affiliates or other users or the public of this platform from being infringed. Personal information may be shared with our affiliates. We will only share the necessary personal information (for example, to facilitate the use of our affiliated company products or services, we will share your necessary account information with affiliates) if we share your personal sensitive information or affiliate changes The use of personal information and the purpose of processing will be re-examined for your authorization. 4. Sharing with Authorized Partners: For the purposes stated in this Privacy Policy, some of our services will be provided by us and our authorized partners. We may share some of your personal information with our partners to provide better customer service and user experience. For example, arrange a partner to provide services. We will only share your personal information for legitimate, legitimate, necessary, specific, and specific purposes, and will only share the personal information necessary to provide the service. Our partners are not authorized to use shared personal information for other purposes unrelated to the product or service. Currently, our authorized partners include the following types: (2) Suppliers, service providers and other partners. We send information to suppliers, service providers and other partners who support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, and facilitating payments. Or conduct academic research and investigations. (1) Authorized partners in advertising and analytics services. We will not use your personally identifiable information (information that identifies you, such as your name or email address, which can be used to contact you or identify you) and provide advertising and analytics services, unless you have your permission. Shared by partners. We will provide these partners with information about their advertising coverage and effectiveness, without providing your personally identifiable information, or we may aggregate this information so that it does not identify you personally. For example, we’ll only tell advertisers how effective their ads are when they agree to comply with our advertising guidelines, or how many people see their ads or install apps after seeing ads, or work with them. Partners provide statistical information that does not identify individuals (eg “male, 25-29 years old, in Beijing”) to help them understand their audience or customers. For companies, organizations and individuals with whom we share personal information, we will enter into strict data protection agreements with them to process individuals in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures. information. (2) Transfer We do not transfer your personal information to any company, organization or individual, except: Transfer with the express consent: After obtaining your explicit consent, we will transfer your personal information to other parties; 2, in the case of mergers, acquisitions or bankruptcy liquidation, or other circumstances involving mergers, acquisitions or bankruptcy liquidation, if it involves the transfer of personal information, we will require new companies and organizations that hold your personal information to continue to receive This policy is bound, otherwise we will ask the company, organization and individual to re-seek your consent. (3) Public disclosure We will only publicly disclose your personal information in the following circumstances: We may publicly disclose your personal information by obtaining your explicit consent or based on your active choice; 2, if we determine that you have violated laws and regulations or serious violations of the relevant rules of the platform, or to protect the personal safety of the platform and its affiliates users or the public from infringement, we may be based on laws and regulations or The relevant agreement rules of this platform disclose your personal information, including related violations, and the measures that the platform has taken against you, with your consent. (4) Exceptions for prior authorization of consent when sharing, transferring, and publicly disclosing personal information In the following situations, sharing, transferring, and publicly disclosing your personal information does not require prior authorization from you: Related to national security and national defense security; Related to public safety, public health, and major public interests; 3, related to criminal investigation, prosecution, trial and judgment execution; 4, in order to protect your or other individuals' life, property and other important legal rights but it is difficult to get my consent; Personal information that you disclose to the public on your own; Collect personal information from legally publicly disclosed information, such as legal news reports and government information disclosure. According to the law, sharing, transferring and de-identifying personal information, and ensuring that the data recipient cannot recover and re-identify the personal information subject, does not belong to the external sharing, transfer and public disclosure of personal information. The preservation and processing of the class data will not require additional notice and your consent. How do we protect your personal information? (1) We have taken reasonable and feasible security measures in accordance with the industry's general solutions to protect the security of personal information provided by you, and to prevent unauthorized access, public disclosure, use, modification, damage or loss of personal information. For example, SSL (Secure Socket) when exchanging data (such as credit card information) between your browser and the server Layer) protocol encryption protection; we use encryption technology to improve the security of personal information; we use a trusted protection mechanism to prevent personal information from being maliciously attacked; we will deploy access control mechanisms to ensure that only authorized personnel can access individuals Information; and we will conduct security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information. (2) We have advanced data security management system around the data life cycle, which enhances the security of the whole system from organizational construction, system design, personnel management, product technology and other aspects. (3) We will take reasonable and feasible measures and try our best to avoid collecting irrelevant personal information. We will only retain your personal information for the period of time required to achieve the purposes stated in this policy, unless the retention period is extended or permitted by law. (4) The Internet is not an absolutely secure environment. We strongly recommend that you do not use personal communication methods that are not recommended by this platform. You can connect and share with each other through our services. When you create communications, transactions, or sharing through our services, you can choose who you want to communicate, trade, or share as a third party who can see your trading content, contact information, exchange information, or share content. If you find that your personal information, especially your account or password, has been leaked, please contact our customer service immediately so that we can take appropriate measures according to your application. Please note that the information you voluntarily share or even share publicly when using our services may involve personal information of you or others or even sensitive personal information, such as when you post a news or choose to upload in public in group chats, circles, etc. A picture containing personal information. Please consider more carefully whether you share or even share information publicly when using our services. Please use complex passwords to help us keep your account secure. We will do our best to protect the security of any information you send us. At the same time, we will report the handling of personal information security incidents in accordance with the requirements of the regulatory authorities. V. How your personal information is transferred globally Personal information collected and generated by us during our operations in the People's Republic of China is stored in China, with the following exceptions: Laws and regulations have clear provisions; 2, get your explicit authorization; 3, you through the Internet for cross-border live broadcast / release dynamics and other personal initiatives. In response to the above, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.
Ujj1225
Web Scraper + Sentiment Analysis + Notifying System = Social Sensor! 🕵️♂️📊📲 Get instant alerts about your online mentions. Manage your digital presence with AI insights! 🚀 #SocialSensor #AI #NLP
airalab
Decentralized application focused on end-user sensors networks.
GauravVermaji
The problem of network partition in ad-hoc networks received attention in the recent years. Many solutions have been proposed such as algorithms based, heuristics based, approximations based and meta-heuristic based to place additional relay nodes in partitioned heterogeneous wireless sensor networks to resume its operation. However, placing additional relay nodes in the partitioned network is shown an NP-Hard problem, because locations for relay node placements are not known in advance. Meta-heuristics are proven best-suited solutions to solve such kind of NP-Hard problem as well as optimization problem due to their problem independent and stochastic nature. In this research paper, we have introduced a network partition problem and developed a new nature inspired solution called Whale Optimizer to Repair Partitioned Heterogeneous wireless sensor networks (WORPH) based on the social behaviour of whales in the nature. In the proposed solution, a whale tries to find the optimal locations for attacking its prey. We have mimicked the said behaviour of whales in our proposed solution while considering the initial locations of deployed RNs inside disjoint partitions. The observed optimal positions are being used to find the optimal locations for deploying new RNs in such a way that partitioned network is restored in an optimal way. The simulation results are observed and compared with state-of-the-art approaches to prove the effectiveness of our proposed solution.
RamyaPayyavula
Our novel IoT-based VRLE application is used to monitor student EEG signal as they participate in different learning activities and, updates their responses in terms of emotions, which also appears as real-time visualization on the teacher's dashboard. This can help the teacher to keep track of all the students' brain signals as they are participating in the learning material, and accordingly give feedback, modify the content delivery and so on. Our edge application is essentially a Social Virtual Reality (VR) platform that collects EEG data from each student EEG sensor using EEG headbands like Emotiv [2] or Muse [3], feeds the data to the public cloud, updates the social portal and then provides visualization features for their response to the teacher.
VN0
Soshi is a native Android app that uses your phones many sensors and machine learning to help you become more social and build confidence
doplab
This repository contains documentation of the Breadcrumbs database. Breadcrumbs is a rich mobility dataset collected from multiple sensors (incl. GPS, GSM, WiFi, Bluetooth) on the smartphones of 81 individuals. In addition to sensor data, Breadcrumbs contains ground-truth data regarding people points of interest (incl. semantic labels) as well as demographic attributes, contact records, calendar events, lifestyle information, and social relationship labels between the participants of the study.
RespectableThieves
An open-source, React Native-based cycling computer! Track your ride metrics like speed, power, heart rate, and altitude in real time. Manage sensors easily, map your journeys, and look forward to amazing features like live shared data and tracking within your social ride groups. #ReactNative #OpenSource #CyclingTech 🚴♂️📲🌐
mitchtech
A framework for the integration of data collected from on-board sensors, web services, social media and external biosensors into a ContextProvider - a unified, query-able interface to all contextual data on the device.
aschuma
Stay informed on air quality with this simple bot, which posts real-time updates from a configurable sensor on the https://sensor.community network to Mastodon and Bluesky. See it in action by following #feinstaub and #cannstatt on https://mastodon.online/@aschuma or https://bsky.app/profile/aschuma.bsky.social
Mansoor1565
Introduction Metaverse is the next evolution of digital technologies. It includes 3D virtualization and will transform digital technologies in the next 5-10 years. Elements of a Metaverse are considered very important related to industry 4.0. Metaverse will have numerous technologies comprising the below: Digital currency Online shopping Workplace automation Social media Digital Humans Natural Language Processing Infrastructure Device independence In this article, we would understand what Metaverse is and what are its different elements? Description Metaverse is a combined virtual space. It is made by the convergence of virtually improved physical and digital reality. We can also say that it is device-free and is not owned by a single seller. Metaverse is known as an independent virtual economy. It is allowed by digital currencies and non-fungible tokens (NFTs). It characterizes a combinatorial innovation because it needs many technologies and trends to function. The following are contributing tech capabilities: Augmented reality (AR) Flexible work styles Head-mounted displays (HMDs) An AR cloud The Internet of Things (IoT) 5G Artificial intelligence (AI) Spatial technologies For better understanding, the concepts of a Metaverse, consider it as the next version of the Internet. That begins as separate bulletin boards and independent online destinations. In the long run, these destinations developed sites on a virtual shared space same as how a Metaverse would develop. Importance of the Metaverse There is a lot of exhilaration around Metaverse. Greatly of it driven by technology companies tactically claiming to be Metaverse companies. Similarly, Metaverse creates to improve or augment the digital and physical realities of people. Furthermore, deeds that now happen in siloed locations will finally occur in a single Metaverse, for example: Buying clothes and fittings for online avatars Business digital land and building virtual homes Take part in a virtual social experience Supermarkets run in virtual malls through immersive commerce With virtual classrooms to practice immersive learning Purchasing digital art, breakables, and assets (NFTs) Networking with digital humans for onboarding business connections It is likely that a Metaverse will make available determined, decentralized, joint, and interoperable opportunities. It will create the business models, which will allow organizations to extend digital business. Elements of a Metaverse Gartner is a technology research and consulting company. It described the elements of a Metaverse in the below diagram. Elements of a Metaverse Applications Virtual reality The social network company Facebook launched a social VR world named Facebook Horizon in 2019. Facebook chairman Mark Zuckerberg confirmed in 2021, a company pledged to develop a metaverse. Several VR technologies promoted by Meta Platforms remain to be developed. Microsoft developed the VR Company AltspaceVR in 2017. Microsoft has since applied metaverse features for example virtual avatars and meetings thought in virtual reality into Microsoft Teams. Future implementations for metaverse technology comprise refining work output, shared learning environments, e-commerce, real estate, and fashion. Video games Many works of metaverse technologies have by now been developed inside modern internet-enabled video games. The Second Life is combined several features of social media into a determined three-dimensional world with the user signified as an avatar. Social functions are repeatedly an integral story in many hugely multiplayer online games. Social-based gameplay of Minecraft characterizes an innovative analog of a metaverse. Hardware Technology Entrance points for metaverse comprise general-purpose computers and smartphones. Also, included augmented reality (AR), mixed reality, virtual reality (VR), and virtual world technologies. Need on VR technology has limited metaverse growth and wide-scale acceptance. Limits of moveable hardware and the requirement to balance cost and design have produced a deficiency of high-quality graphics and mobility. Lightweight wireless headsets have fought to attain the retina display pixel density required for visual immersion. Present hardware development is dedicated to choking limitations of VR headsets, sensors, and growing immersion with haptic technology. Software Technology There has been nothing for wide-scale acceptance of a uniform technical requirement for metaverse applications. Current applications depend chiefly on proprietary technology. Interoperability is the main anxiety in metaverse development. There have been a number of virtual environment standardization projects. Metaverse is known as a three-dimensional Internet that is occupied with live people. The technology company NVIDIA declared in 2021 they will accept USD for their metaverse development tools. The OpenXR is an open standard for entree into virtual and augmented reality plans and involvements. It has been accepted by Microsoft for HoloLens 2, Meta Platforms for the Oculus Quest, and Valve for SteamVR. For more details visit: https://www.technologiesinindustry4.com
Yens-Water
"Skirt of Liberty" is a cooperative project from Asumi Kitahori and Yen Tzu Chang in Fashionable technology lecture. We developed work on the project together including the concept, handmade part, and programming. The way to interactive is dress on the skirt, then the a strip of LED blink up, however, it is not just a decoration, but also sending out the word “FREEDOM”. The interactive person have to turn a round again and again, and the camera take a picture on top in long term exposure to print out the word. Even people could not see the message by eyes, but they can see afterimage by camera. No matter the man, woman or third gender, all are welcomed to try on this works. We want to bring out the questions of gender equality, social stereotypes. Are we truly free in nowadays? Do our social go to the “right” direction? In the feature, we would like to develop more details, for instance, put sensor to detect the speed of rotating, collecting data of how many times people's rotating, and automatically take a photos by camera. Materials: - Skirt x1 - Condoctive Thread - Needle x1 - Gemma Arduino x1 - Flora NeoPixel x10 - Lithium polymer battery x1 - Velcro Technological Part: Fix Arduino problems 1_We need to install the new arduino IDE(1.6.4). 2_Download Adafruit_NeoPixel library (from here: https://learn.adafruit.com/flora-rgb-smart-pixels/run-pixel-test-code), then rename the fold and put in the arduino library. Now, we have port problems 1_copy this link to reference->additional Boards Manager URLS https://adafruit.github.io/arduino-board-index/package_adafruit_index.json 2_go to Board-> board manger->select type to contributed-> install the adafruit AVR Boards 3_ Tools-> Programmer-> select “USBtinyISP” restart the IDE! 3_choose the adafruit gemma 8hz 4_example->Adafruit_NeoPixel->sample select the right pin from LED #define PIN 1 #define NUMPIXELS 1 If you want to check our project code, please check this link: Special Thanks Ricardo Nascimento de Oliveira bring a nice workshop for Interface Culture.
demoonism
Topical sensor for social media
rezafaisal
Social Network Sensor for Natural Disaster
asuprem
Adaptive Social Sensor Event Detection
jiejiang-jojo
An sensor data collecting platform for social researchers based on IoT.
adithya-m-s-989
A multi-layered interactive dashboard for real-time crisis monitoring and intelligence. This project integrates social media signals, infrastructure data, and sensor-based disaster events into a unified geospatial interface to support fast, data-driven emergency response.
sgandhi04
New social distancing guidelines imposed during COVID-19 have made it extremely difficult for the bind to maintain their independence. The World Health Organization (WHO) estimates that 88% of the world's blind population is 50 years and older, making this demographic extremely vulnerable to COVID-19. Despite this alarming statistic, little has been done to help the visually impaired cope with this pandemic. The CAT-EYE, a low- cost wearable assistive technology in the form of a hat, solves this problem by assisting blind individuals with navigating in a pandemic-stricken world. The CAT-EYE consists of three systems that work together to inform a blind user about their surroundings: 1. Mask Detection: When individuals come within six-feet of the user, CAT-EYE detects their presence using a LIDAR sensor and communicates their general location through vibrotactile motors. 2. Proximity Sensing: When individuals within six feet of the user are not wearing a mask, the device beeps loudly. This system was built using computer vision for the first prototype and AI, 3. IoT, and the NVIDIA Jetson Nano for the second prototype. 3. Public Alert: The user has the option to broadcast an alert through a speaker on the hat. This alert will notify people in the user's surroundings about the presence of a blind individual. The CAT-EYE was tested by analyzing performance in the camera's field of vision from 90 to 135 degrees. Design iterations based on test results helped CAT-EYE achieve 87% accuracy. The results demonstrated the applicability of the proposed solution as a pandemic-navigation aid to the blind.
Mansoor1565
Introduction Metaverse is the next evolution of digital technologies. It includes 3D virtualization and will transform digital technologies in the next 5-10 years. Elements of a Metaverse are considered very important related to industry 4.0. Metaverse will have numerous technologies comprising the below: Digital currency Online shopping Workplace automation Social media Digital Humans Natural Language Processing Infrastructure Device independence In this article, we would understand what Metaverse is and what are its different elements? Description Metaverse is a combined virtual space. It is made by the convergence of virtually improved physical and digital reality. We can also say that it is device-free and is not owned by a single seller. Metaverse is known as an independent virtual economy. It is allowed by digital currencies and non-fungible tokens (NFTs). It characterizes a combinatorial innovation because it needs many technologies and trends to function. The following are contributing tech capabilities: Augmented reality (AR) Flexible work styles Head-mounted displays (HMDs) An AR cloud The Internet of Things (IoT) 5G Artificial intelligence (AI) Spatial technologies For better understanding, the concepts of a Metaverse, consider it as the next version of the Internet. That begins as separate bulletin boards and independent online destinations. In the long run, these destinations developed sites on a virtual shared space same as how a Metaverse would develop. Importance of the Metaverse There is a lot of exhilaration around Metaverse. Greatly of it driven by technology companies tactically claiming to be Metaverse companies. Similarly, Metaverse creates to improve or augment the digital and physical realities of people. Furthermore, deeds that now happen in siloed locations will finally occur in a single Metaverse, for example: Buying clothes and fittings for online avatars Business digital land and building virtual homes Take part in a virtual social experience Supermarkets run in virtual malls through immersive commerce With virtual classrooms to practice immersive learning Purchasing digital art, breakables, and assets (NFTs) Networking with digital humans for onboarding business connections It is likely that a Metaverse will make available determined, decentralized, joint, and interoperable opportunities. It will create the business models, which will allow organizations to extend digital business. Elements of a Metaverse Gartner is a technology research and consulting company. It described the elements of a Metaverse in the below diagram. Elements of a Metaverse Applications Virtual reality The social network company Facebook launched a social VR world named Facebook Horizon in 2019. Facebook chairman Mark Zuckerberg confirmed in 2021, a company pledged to develop a metaverse. Several VR technologies promoted by Meta Platforms remain to be developed. Microsoft developed the VR Company AltspaceVR in 2017. Microsoft has since applied metaverse features for example virtual avatars and meetings thought in virtual reality into Microsoft Teams. Future implementations for metaverse technology comprise refining work output, shared learning environments, e-commerce, real estate, and fashion. Video games Many works of metaverse technologies have by now been developed inside modern internet-enabled video games. The Second Life is combined several features of social media into a determined three-dimensional world with the user signified as an avatar. Social functions are repeatedly an integral story in many hugely multiplayer online games. Social-based gameplay of Minecraft characterizes an innovative analog of a metaverse. Hardware Technology Entrance points for metaverse comprise general-purpose computers and smartphones. Also, included augmented reality (AR), mixed reality, virtual reality (VR), and virtual world technologies. Need on VR technology has limited metaverse growth and wide-scale acceptance. Limits of moveable hardware and the requirement to balance cost and design have produced a deficiency of high-quality graphics and mobility. Lightweight wireless headsets have fought to attain the retina display pixel density required for visual immersion. Present hardware development is dedicated to choking limitations of VR headsets, sensors, and growing immersion with haptic technology. Software Technology There has been nothing for wide-scale acceptance of a uniform technical requirement for metaverse applications. Current applications depend chiefly on proprietary technology. Interoperability is the main anxiety in metaverse development. There have been a number of virtual environment standardization projects. Metaverse is known as a three-dimensional Internet that is occupied with live people. The technology company NVIDIA declared in 2021 they will accept USD for their metaverse development tools. The OpenXR is an open standard for entree into virtual and augmented reality plans and involvements. It has been accepted by Microsoft for HoloLens 2, Meta Platforms for the Oculus Quest, and Valve for SteamVR.
CarterLoftus
This repository contains all code necessary to reproduce the results from “Loftus et al. 2022. Ecological and social pressures interfere with homeostatic sleep regulation in the wild. eLife. https://doi.org/10.7554/eLife.73695”. To reproduce the analysis, run the scripts in the order they are numbered. Please email me with any questions at jcloftus@ucdavis.edu. Main analysis: The script “00_processing_raw_acc.ipynb” takes the raw GPS and accelerometry data from 2012, downloaded with “all sensor types” (i.e. including both GPS and accelerometry data) from Movebank as an input – “Collective movement in wild baboons.csv”. The script then removes columns that are not needed, and downsamples and interpolates the daytime accelerometry data to match the nighttime accelerometry bursts. It outputs the file “all_burst_acc.csv”. The script “01_acc_to_vedba.R” takes “all_burst_acc.csv” as an input, calculates the average VeDBA and log VeDBA for each accelerometry burst, and outputs the file “full_night_and_day_data.csv” The script “02_acc_1min_vedba_2012.m” takes the raw data as an input (“Collective movement in wild baboons.csv”, downloaded from Movebank), calculates the average VeDBA for each minute of the day, using “02a_calc_vedba.m” and “02b_calc_stat_only_vedba.m”, and produces “vedba_mean_2012.csv” as an output. The script “03_baboon_sleep_analysis.R” performs most of the analysis associated with the manuscript. It requires the following files inputs (with the locations of the inputs in parentheses): “full_night_and_day_data.csv” (produced by script above), “sleep trees.cpg/.dbf/.prj/.shp/shx” (Dyrad), “env_data.csv-6150899038464587825.csv” (Dryad), “vedba_mean_2012.csv” (both produced by script above, and also available on Dryad). The script runs the sleep classification algorithm using the log VeDBA data, adds all data that is used for predictor variables in the models (e.g. temperature, moon phase), runs most of the models used in the analysis, and plots several the results from these models. The script “04_social_sleep_analysis.R” takes “full_night_and_day_data.csv” (produced by “01_acc_to_vedba.R”) and “final_sleep.csv" (produced by “03_baboon_sleep_analysis.R”) as inputs. The script performs permutations to test the sentinel hypothesis (whether at least one group member is awake more often than expected by chance) and whether the group exhibits synchronization in their sleep-wake patterns during the night. The script then runs a model to test whether baboons are more likely to synchronize their sleep-wake patterns when they are sleeping in the same tree. The script “05_arousal_threshold_analysis.R” takes “sleep_analysis_pub_code_pre_mods.RData” (produced by “03_baboon_sleep_analysis.R”) as an input. The script further prepares the data for analysis and runs a model to test whether baboons are less likely to wake in response to the waking activity of their neighbors (i.e. if they have a higher arousal threshold) following nights of poor sleep. The raw data is available for download from the project called “Collective movement in wild baboons” on Movebank. Validation study: The script “00_processing_raw_acc_2019.ipynb” takes the raw GPS and accelerometry data from 2019, downloaded with “all sensor types” (i.e. including both GPS and accelerometry data) from Movebank as an input – “Papio Anubis Mpala 2019.csv”. The script then removes columns that are not needed as well as the data from individuals whose collars were programmed to sample on a different schedule than in 2012. With a different sampling schedule, we could not apply the same sleep algorithm to these individuals. The script then produces the output “2019_Papio_anubis_acc_Loftus_et_al_Dryad.csv", which is published on Dryad (note: the full 2019 dataset is not yet publicly available on Movebank), and this file becomes the input for the rest of the script. The rest of the script interpolates both the daytime and nighttime accelerometry data to match the sampling rate of the 2012 accelerometry bursts. It outputs the file “validation_burst_acc.csv”. The script “01_acc_to_vedba_2019.R” takes “validation_burst_acc.csv” as an input, trims the daytime accelerometry to match the nighttime accelerometry bursts, calculates the average VeDBA and log VeDBA for each burst, and outputs this information in the dataframe “2019_full_night_and_day_data.csv”. The script “02_sleep_validation.R” performs the actual validation of the sleep algorithm. It takes “2019_full_night_and_day_data.csv” and files within the folder “loopy_focal_follows_2021_09_17”, which contain the behavioral observations from the thermal imagery, as inputs. It also requires the input file “tag_metadata.csv”, and .txt files associated with the thermal videos that are saved within the archive of the MPI-AB EAS department storage (these raw inputs are not needed if downloading the data from Dryad). The script first runs the sleep classification algorithm on the log VeDBA data, and saves the sleep classification. The script then aggregates the behavioral observation data into one dataframe, adds the real (absolute) timestamps based on the timestamps of the frames of the videos, trims the dataframe to only the relevant observations, and produces the file “2019_Papio_anubis_behavioral_scoring_Loftus_et_al_Dryad.csv”, which is available for download on Dryad (the raw behavioral observations are not available for download). The rest of the script uses the sleep classification from above within this script, and the behavioral scoring csv that is available on Dryad as inputs, and applies a time correction to he behavioral scoring, so that it matches GPS time, then compares the sleep classification from the algorithm to the sleep classification from behavioral observations to determine the accuracy of, and produce a confusion matrix for, the accelerometry-based sleep classification algorithm.
wangshilianghit
No description available
MercuryInduction
An intelligent IOT application based on car sensor data that provides instant relief and help during a crash or emergency. It introduces a new revolution that collaborates insurance companies, hospitals, first responders and the victim through webRTC video conferencing. The app also does analysis and social media sharing based on SMAC(Social Mobile Analytics Cloud) technology . In addition, it facilitates real time communication to minimize insurance fraud and maximize instant relief service which will foster human safety. Another add on feature is that the entire video conference is recorded and upload the video to cloud so that Insurance (claim adjuster) or any other organization can look at the entire incident of accident later on.
nitheesh2008
this code helps to keep social distancing made with,arduino uno,sensor,buzzer,led.For more codes like robot,etc....follow me.For humanoid robot jarvis and more code I uploaded in nitheesh2008/tony
It is extremely difficult for people with visual impairment to acquire basic knowledge and vital information because of difficulty in communication. Out of 285 million visually impaired people, most are not able to get adequately involved socially because of poor access to knowledge and lack of easy communication. Braille is a worldwide accepted system for reading and writing for the visually impaired people. There are some electronic systems available for access to braille materials and literature, but most of them have lack of privacy issues and suitability for computer based interaction. In this paper, the design and implementation of a low cost wireless braille system hand glove have been described. Slot sensors and pager motors are used for writing and reading in Braille system, respectively, to communicate using computers with billions of people in the virtual world. Using this communicating device, by simple hand gestures or by sensing vibration on fingers, one can write to or read from a computer, respectively, all English Language characters in Braille system. The device is low cost and effective and operates in real time