Enviar pesquisa
Carregar
Comunicação Android Arduino - JASI 2015
•
0 gostou
•
531 visualizações
Rodrigo Reis Alves
Seguir
Principios da comunicação entre Android e Arduino
Leia menos
Leia mais
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 30
Baixar agora
Baixar para ler offline
Recomendados
Mango64 u boot 업데이트 하기
Mango64 u boot 업데이트 하기
종인 전
[가상편] 하드웨어에 생명을 주는 아두이노
[가상편] 하드웨어에 생명을 주는 아두이노
Chiwon Song
DDAA FPGA - Multiplexor De Numeros en Display 7 Segmentos En Tiempo
DDAA FPGA - Multiplexor De Numeros en Display 7 Segmentos En Tiempo
Fernando Marcos Marcos
Hackers vs Hackers
Hackers vs Hackers
jobandesther
F z94 l-_pioneer__tuner__arp2134
F z94 l-_pioneer__tuner__arp2134
Peru Electronics
KILL MD5
KILL MD5
Ange Albertini
Programação completa e perfeira
Programação completa e perfeira
Magno Rodrigues
Exploiting hash collisions
Exploiting hash collisions
Ange Albertini
Recomendados
Mango64 u boot 업데이트 하기
Mango64 u boot 업데이트 하기
종인 전
[가상편] 하드웨어에 생명을 주는 아두이노
[가상편] 하드웨어에 생명을 주는 아두이노
Chiwon Song
DDAA FPGA - Multiplexor De Numeros en Display 7 Segmentos En Tiempo
DDAA FPGA - Multiplexor De Numeros en Display 7 Segmentos En Tiempo
Fernando Marcos Marcos
Hackers vs Hackers
Hackers vs Hackers
jobandesther
F z94 l-_pioneer__tuner__arp2134
F z94 l-_pioneer__tuner__arp2134
Peru Electronics
KILL MD5
KILL MD5
Ange Albertini
Programação completa e perfeira
Programação completa e perfeira
Magno Rodrigues
Exploiting hash collisions
Exploiting hash collisions
Ange Albertini
I made some more expansion board for M5Stack
I made some more expansion board for M5Stack
Masawo Yamazaki
The Ring programming language version 1.10 book - Part 16 of 212
The Ring programming language version 1.10 book - Part 16 of 212
Mahmoud Samir Fayed
Crash_Report_Mechanism_In_Tizen
Crash_Report_Mechanism_In_Tizen
Lex Yu
Of class3
Of class3
Janet Huang
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - key logger-video mouse
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - key logger-video mouse
Felipe Prado
CODE BLUE 2014 : A security assessment study and trial of Tricore-powered aut...
CODE BLUE 2014 : A security assessment study and trial of Tricore-powered aut...
CODE BLUE
20120822 joxa
20120822 joxa
ericbmerritt
start_printf: dev/ic/com.c comstart()
start_printf: dev/ic/com.c comstart()
Kiwamu Okabe
Аварийный дамп – чёрный ящик упавшей JVM. Андрей Паньгин
Аварийный дамп – чёрный ящик упавшей JVM. Андрей Паньгин
odnoklassniki.ru
ipython notebook poc memory forensics
ipython notebook poc memory forensics
Vincent Ohprecio
Learn Frontend Testing
Learn Frontend Testing
Ryan Roemer
DomCode 2015 - Abusing phones to make the internet of things
DomCode 2015 - Abusing phones to make the internet of things
Jan Jongboom
Learning Dtrace
Learning Dtrace
JeongHun Byeon
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
Felipe Prado
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
Priyanka Aash
Android Things in action
Android Things in action
Stefano Sanna
Network security mannual (2)
Network security mannual (2)
Vivek Kumar Sinha
Arduino shield wifi-monitorizarelocuinta
Arduino shield wifi-monitorizarelocuinta
Iulius Bors
망고100 보드로 놀아보자 15
망고100 보드로 놀아보자 15
종인 전
Scottish Ruby Conference 2010 Arduino, Ruby RAD
Scottish Ruby Conference 2010 Arduino, Ruby RAD
lostcaggy
Gps c
Gps c
UD. Berkah Jaya Komputer
Computer Networks Lab File
Computer Networks Lab File
Kandarp Tiwari
Mais conteúdo relacionado
Mais procurados
I made some more expansion board for M5Stack
I made some more expansion board for M5Stack
Masawo Yamazaki
The Ring programming language version 1.10 book - Part 16 of 212
The Ring programming language version 1.10 book - Part 16 of 212
Mahmoud Samir Fayed
Crash_Report_Mechanism_In_Tizen
Crash_Report_Mechanism_In_Tizen
Lex Yu
Of class3
Of class3
Janet Huang
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - key logger-video mouse
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - key logger-video mouse
Felipe Prado
CODE BLUE 2014 : A security assessment study and trial of Tricore-powered aut...
CODE BLUE 2014 : A security assessment study and trial of Tricore-powered aut...
CODE BLUE
20120822 joxa
20120822 joxa
ericbmerritt
start_printf: dev/ic/com.c comstart()
start_printf: dev/ic/com.c comstart()
Kiwamu Okabe
Аварийный дамп – чёрный ящик упавшей JVM. Андрей Паньгин
Аварийный дамп – чёрный ящик упавшей JVM. Андрей Паньгин
odnoklassniki.ru
ipython notebook poc memory forensics
ipython notebook poc memory forensics
Vincent Ohprecio
Learn Frontend Testing
Learn Frontend Testing
Ryan Roemer
DomCode 2015 - Abusing phones to make the internet of things
DomCode 2015 - Abusing phones to make the internet of things
Jan Jongboom
Mais procurados
(12)
I made some more expansion board for M5Stack
I made some more expansion board for M5Stack
The Ring programming language version 1.10 book - Part 16 of 212
The Ring programming language version 1.10 book - Part 16 of 212
Crash_Report_Mechanism_In_Tizen
Crash_Report_Mechanism_In_Tizen
Of class3
Of class3
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - key logger-video mouse
DEF CON 23 - Yaniv Balmas and Lior Oppenheim - key logger-video mouse
CODE BLUE 2014 : A security assessment study and trial of Tricore-powered aut...
CODE BLUE 2014 : A security assessment study and trial of Tricore-powered aut...
20120822 joxa
20120822 joxa
start_printf: dev/ic/com.c comstart()
start_printf: dev/ic/com.c comstart()
Аварийный дамп – чёрный ящик упавшей JVM. Андрей Паньгин
Аварийный дамп – чёрный ящик упавшей JVM. Андрей Паньгин
ipython notebook poc memory forensics
ipython notebook poc memory forensics
Learn Frontend Testing
Learn Frontend Testing
DomCode 2015 - Abusing phones to make the internet of things
DomCode 2015 - Abusing phones to make the internet of things
Semelhante a Comunicação Android Arduino - JASI 2015
Learning Dtrace
Learning Dtrace
JeongHun Byeon
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
Felipe Prado
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
Priyanka Aash
Android Things in action
Android Things in action
Stefano Sanna
Network security mannual (2)
Network security mannual (2)
Vivek Kumar Sinha
Arduino shield wifi-monitorizarelocuinta
Arduino shield wifi-monitorizarelocuinta
Iulius Bors
망고100 보드로 놀아보자 15
망고100 보드로 놀아보자 15
종인 전
Scottish Ruby Conference 2010 Arduino, Ruby RAD
Scottish Ruby Conference 2010 Arduino, Ruby RAD
lostcaggy
Gps c
Gps c
UD. Berkah Jaya Komputer
Computer Networks Lab File
Computer Networks Lab File
Kandarp Tiwari
Applications secure by default
Applications secure by default
Slawomir Jasek
Applications secure by default
Applications secure by default
SecuRing
Automated malware analysis
Automated malware analysis
Ibrahim Baliç
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
Aleksandr Yampolskiy
StatsCraft 2015: Monitoring using riemann - Moshe Zada
StatsCraft 2015: Monitoring using riemann - Moshe Zada
StatsCraft
Labs_BT_20221017.pptx
Labs_BT_20221017.pptx
ssuserb4d806
Lucas apa pacsec slides
Lucas apa pacsec slides
PacSecJP
Степан Кольцов — Rust — лучше, чем C++
Степан Кольцов — Rust — лучше, чем C++
Yandex
Using Android Things to Detect & Exterminate Reptilians
Using Android Things to Detect & Exterminate Reptilians
Nilhcem
Reutov, yunusov, nagibin random numbers take ii
Reutov, yunusov, nagibin random numbers take ii
DefconRussia
Semelhante a Comunicação Android Arduino - JASI 2015
(20)
Learning Dtrace
Learning Dtrace
DEF CON 24 - Patrick Wardle - 99 problems little snitch
DEF CON 24 - Patrick Wardle - 99 problems little snitch
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
Android Things in action
Android Things in action
Network security mannual (2)
Network security mannual (2)
Arduino shield wifi-monitorizarelocuinta
Arduino shield wifi-monitorizarelocuinta
망고100 보드로 놀아보자 15
망고100 보드로 놀아보자 15
Scottish Ruby Conference 2010 Arduino, Ruby RAD
Scottish Ruby Conference 2010 Arduino, Ruby RAD
Gps c
Gps c
Computer Networks Lab File
Computer Networks Lab File
Applications secure by default
Applications secure by default
Applications secure by default
Applications secure by default
Automated malware analysis
Automated malware analysis
Much ado about randomness. What is really a random number?
Much ado about randomness. What is really a random number?
StatsCraft 2015: Monitoring using riemann - Moshe Zada
StatsCraft 2015: Monitoring using riemann - Moshe Zada
Labs_BT_20221017.pptx
Labs_BT_20221017.pptx
Lucas apa pacsec slides
Lucas apa pacsec slides
Степан Кольцов — Rust — лучше, чем C++
Степан Кольцов — Rust — лучше, чем C++
Using Android Things to Detect & Exterminate Reptilians
Using Android Things to Detect & Exterminate Reptilians
Reutov, yunusov, nagibin random numbers take ii
Reutov, yunusov, nagibin random numbers take ii
Último
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
apidays
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Overkill Security
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
apidays
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Último
(20)
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Comunicação Android Arduino - JASI 2015
1.
Comunicação Android <=>
Arduino
2.
3.
4.
5.
6.
7.
8.
Comunicação serial UART/USART void setup() { Serial.begin(9600); while (!Serial) {} pinMode(2, INPUT);
establishContact(); } void loop() { if (Serial.available() > 0) { firstSensor = analogRead(A0) / 4; secondSensor = analogRead(1) / 4; thirdSensor = map(digitalRead(2), 0, 1, 0, 255); Serial.write(firstSensor); Serial.write(secondSensor); Serial.write(thirdSensor); } } void establishContact() { while (Serial.available() <= 0) { Serial.print('A'); delay(300); } } int firstSensor = 0; int secondSensor = 0; int thirdSensor = 0;
9.
Serial.print(); ou Serial.write();? ?
10.
Serial.print(); Serial.print(2015); “2" “0" “1" “5"
11.
Serial.write(); Serial.write(2015); 2015 0x07DF 00000111 11011111
12.
Bluetooth
13.
WiFi
14.
USB
15.
NFC
16.
17.
+
18.
Com grandes poderes
vem grandes responsabilidades
19.
Velocidade Integridade Segurança
20.
Fale só o
necessário!
21.
String sensor_a =
“A:” + digitalRead(5); String sensor_b = “B:” + digitalRead(6); String sensor_c = “C:” + digitalRead(7); String sensor_d = “D:” + digitalRead(8); String sensor_e = “E:” + digitalRead(9); String sensor_f = “F:” + digitalRead(10); Serial.println(sensor_a); Serial.println(sensor_b); Serial.println(sensor_c); Serial.println(sensor_d); Serial.println(sensor_e); Serial.println(sensor_f); A:1 B:0 C:1 D:1 E:0 D:1 24 bytes
22.
int sensors []
= { digitalRead(5), digitalRead(6), digitalRead(7), digitalRead(8), digitalRead(9), digitalRead(10) }; char states = 0x00; for(int i = 0; i < sizeof(sensors )/sizeof(byte); i++) { states = states | (sensors[i] << i); } Serial.write(states); 00101101 1 byte
23.
Verifique suas coisas
ao sair e ao chegar!
24.
Checksum I received: 2 I
received: 51 I received: 67 I received: 48 I received: 48 I received: 67 I received: 69 I received: 55 I received: 53 I received: 52 I received: 67 I received: 67 I received: 66 I received: 3 2 51 67 48 48 67 69 55 53 52 67 67 66 3 2 51 67 48 48 67 69 55 53 52 67 67 66 3 51 67 48 48 67 69 55 53 52 67 67 66 51 67 48 48 67 69 55 53 52 67 67 66 3 C 0 0 C E 7 5 4 C C B 3C 00 CE 75 4C CB 3C ^ 00 ^ CE ^ 75 ^ 4C == CB
25.
https://github.com/tzikis/ArduinoMD5/ http://excamera.com/sphinx/article-crc.html https://github.com/vinmenn/Crc16 Checksum MD5 CRC-16 CRC-32
26.
< uses-perm ission
android:nam e= "android.perm ission.BLUETO O TH" /> < uses-perm ission android:nam e= "android.perm ission.BLUETO O TH_AD M IN" /> < uses-feature android:nam e= "android.hardw are.usb.accessory" /> < uses-perm ission android:nam e= "android.perm ission.ACCESS_W IFI_STATE" /> < uses-perm ission android:nam e= "android.perm ission.CHANG E_W IFI_STATE" /> < uses-perm ission android:nam e= "android.perm ission.CHANG E_NETW O RK_STATE" /> < uses-perm ission android:nam e= "android.perm ission.INTERNET" /> < uses-perm ission android:nam e= "android.perm ission.ACCESS_NETW O RK_STATE" /> Permissões AndroidManifest.xml Bluetooth USB WiFi < uses-feature android:nam e= "android.hardw are.nfc" android:required= "true" /> < uses-perm ission android:nam e= "android.perm ission.NFC" /> NFC
27.
Preparando... private final InputStream
mmInStream; private final OutputStream mmOutStream; InputStream tmpIn = null; OutputStream tmpOut = null; try { tmpIn = socket.getInputStream(); tmpOut = socket.getOutputStream(); } catch (IOException e) { } mmInStream = tmpIn; mmOutStream = tmpOut;
28.
public String read()
{ byte[] bytes = new byte[1024]; StringBuilder x = new StringBuilder(); int numRead = 0; while ((numRead = mmInStream.read(bytes)) >= 0) { x.append(new String(bytes, 0, numRead)); } } Lendo dados...
29.
public void write(byte[]
bytes) { try { mmOutStream.write(bytes); } catch (IOException e) { } } Enviando dados...
30.
????????????????????? ????????????????????? ????????????????????? ????????????????????? ?????????????????????
Baixar agora