summaryrefslogtreecommitdiffstats
path: root/notFinishedCode/Report/test.aux
blob: 2bc478e6b4805144202f8fb3f769e9999cba3ecc (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
\relax 
\select@language{english}
\@writefile{toc}{\select@language{english}}
\@writefile{lof}{\select@language{english}}
\@writefile{lot}{\select@language{english}}
\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction and Motivation}{3}}
\citation{network}
\citation{network}
\@writefile{toc}{\contentsline {section}{\numberline {2}Requirements}{4}}
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces }}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}Logical and algorithmic requirements}{4}}
\citation{python}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces }}{5}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Software requirements}{5}}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces }}{6}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.3}Hardware requirements}{7}}
\@writefile{toc}{\contentsline {section}{\numberline {3}Database design}{8}}
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces }}{8}}
\citation{wiki}
\@writefile{toc}{\contentsline {section}{\numberline {4}Software design}{10}}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces }}{10}}
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces }}{11}}
\citation{mysqlManual}
\citation{wiki}
\citation{wiki}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}Database access}{12}}
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces }}{12}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Controlling the cell phones}{12}}
\citation{socket}
\citation{wiki}
\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces }}{13}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Client and Server class}{13}}
\citation{wiki}
\citation{wiki}
\@writefile{lof}{\contentsline {figure}{\numberline {9}{\ignorespaces }}{14}}
\@writefile{lof}{\contentsline {figure}{\numberline {10}{\ignorespaces }}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Ping class}{14}}
\@writefile{lof}{\contentsline {figure}{\numberline {11}{\ignorespaces }}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}Data logging}{15}}
\@writefile{lof}{\contentsline {figure}{\numberline {12}{\ignorespaces }}{15}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}SSH Class}{15}}
\citation{beagleDataSheet}
\@writefile{toc}{\contentsline {section}{\numberline {5}Hardware design}{16}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}BeagleBoard}{16}}
\@writefile{lof}{\contentsline {figure}{\numberline {13}{\ignorespaces }}{16}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}Cell phones}{17}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Cables for the cell phones}{17}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.4}Server}{17}}
\@writefile{toc}{\contentsline {section}{\numberline {6}Communication protocol}{18}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.1}Communication between the handler and controller}{18}}
\citation{spin}
\citation{spin}
\citation{wiki}
\@writefile{lof}{\contentsline {figure}{\numberline {14}{\ignorespaces }}{19}}
\@writefile{lof}{\contentsline {figure}{\numberline {15}{\ignorespaces }}{19}}
\@writefile{toc}{\contentsline {subsection}{\numberline {6.2}Verification of the protocol}{19}}
\@writefile{lof}{\contentsline {figure}{\numberline {16}{\ignorespaces }}{20}}
\citation{sshTunnel}
\@writefile{toc}{\contentsline {section}{\numberline {7}Security and safety of the system}{22}}
\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}Encryption of the communication channels}{22}}
\@writefile{lof}{\contentsline {figure}{\numberline {17}{\ignorespaces }}{22}}
\citation{https}
\@writefile{toc}{\contentsline {subsection}{\numberline {7.2}Security on the web site}{23}}
\citation{https}
\citation{https}
\@writefile{toc}{\contentsline {section}{\numberline {8}Web page}{27}}
\@writefile{toc}{\contentsline {subsection}{\numberline {8.1}Communication between the web page and the test software}{27}}
\@writefile{toc}{\contentsline {subsection}{\numberline {8.2}Results on the web page}{27}}
\citation{pChart}
\@writefile{lof}{\contentsline {figure}{\numberline {18}{\ignorespaces }}{28}}
\@writefile{toc}{\contentsline {section}{\numberline {9}How to use and start the system}{29}}
\@writefile{toc}{\contentsline {subsection}{\numberline {9.1}Required libraries}{29}}
\@writefile{toc}{\contentsline {subsection}{\numberline {9.2}Configuring hardware}{29}}
\@writefile{toc}{\contentsline {section}{\numberline {10}Conclusion}{30}}
\bibcite{network}{1}
\bibcite{python}{2}
\bibcite{mysqlManual}{3}
\bibcite{wiki}{4}
\bibcite{socket}{5}
\bibcite{spin}{6}
\bibcite{sshTunnel}{7}
\bibcite{https}{8}
\bibcite{pChart}{9}
\bibcite{beagleDataSheet}{10}
\newlabel{LastPage}{{}{31}}