Difference between revisions of "Team:UNOTT/Software"

Line 433: Line 433:
 
<p> As a final wrap up for the project, all the software and modeling was put together to create an additional security layer on top of Linux for the Raspberry Pi. A Raspberry Pi is a super low budget low-end computer which is favoured by enthusiasts and computer hobbyists which is designed to be programmed easily for, as the hardware comes unlocked. The reason we chose this was because it would give us the least issues when it came to editing the security protocols of Linux.  <p>
 
<p> As a final wrap up for the project, all the software and modeling was put together to create an additional security layer on top of Linux for the Raspberry Pi. A Raspberry Pi is a super low budget low-end computer which is favoured by enthusiasts and computer hobbyists which is designed to be programmed easily for, as the hardware comes unlocked. The reason we chose this was because it would give us the least issues when it came to editing the security protocols of Linux.  <p>
 
<br> </br>
 
<br> </br>
 +
<p style="text-align: center;" > Figure 9 </p>
 +
<p style="text-align: center;" > <img src="https://static.igem.org/mediawiki/2017/4/4a/T--UNOTT--rpi.jpeg" class="border" width="400" height="400" > </p>
 +
 
<p> This was done to show people how Key.Coli could be used to secure your computer from strangers who don't have the Key.Coli but might know your password as well as giving us a physical demonstration of Key.Coli to show at the Jamboree.</p>
 
<p> This was done to show people how Key.Coli could be used to secure your computer from strangers who don't have the Key.Coli but might know your password as well as giving us a physical demonstration of Key.Coli to show at the Jamboree.</p>
 
<br> </br>
 
<br> </br>
Line 438: Line 441:
 
This is compared <sup> 1 </sup> and if it matches the threshold, the computer unfreezes.</p>  
 
This is compared <sup> 1 </sup> and if it matches the threshold, the computer unfreezes.</p>  
 
<br> </br>
 
<br> </br>
 +
 
<p> Using the Key.Coli Verification  software developed and modifying it to support the file system on the Pi, this successfully happened. In order to "unlock" your computer, the user would need to connect the Raspberry Pi to two different fluorescent readers: one for the mother colony, and one for the Key.Coli mechanism. Both readings would be stored in a temporary file space and compared for similarity. </p>  
 
<p> Using the Key.Coli Verification  software developed and modifying it to support the file system on the Pi, this successfully happened. In order to "unlock" your computer, the user would need to connect the Raspberry Pi to two different fluorescent readers: one for the mother colony, and one for the Key.Coli mechanism. Both readings would be stored in a temporary file space and compared for similarity. </p>  
 
<br> </br>
 
<br> </br>

Revision as of 00:00, 2 November 2017





SOFTWARE

Overview

About our software and why iGEM Nottingham chose to produce it

Image Comparison Software

Comparing images of spectra from two different colonies to check for similiarity

Key.Coli Verification

Comparing the raw data of two different colonies straight from the fluorescence reader

Fluorescence Spectra Simulation

Simulating fluorescence spectra from given protein concentrations

Random Number Generation

Generating random numbers from our randomly constructed colonies

Linux Key.Coli Security Layer

Porting our comparison software to low end hardware to safeguard a system