Skip to main content

Android-Powered, Automated Cat Feeder

This is my Android-powered, automated cat feeder:


The attached HTC Magic is running SL4A and provides scheduled and on demand feeding as well as an MJPEG webcam feed. Feeding is triggered via Bluetooth. The Arduino is hooked up to a SparkFun BlueSMiRF and a simple relay circuit I made on perfboard for powering the motor on and off.


The brackets and food chute were designed in SketchUp and printed on my MakerBot. You can find all the SKPs, STLs, schematic, and parts list on Thingiverse.

Here's the 50 odd lines of Python code running on the phone via SL4A that make the magic happen:
import android # See http://android-scripting.googlecode.com/
import gsd  # See http://getshitdone.googlecode.com/
import socket
import threading
import time

def feed(droid):
  droid.toggleBluetoothState(True)
  droid.bluetoothConnect('00001101-0000-1000-8000-00805F9B34FB', '00:06:66:04:b2:07')
  droid.bluetoothWrite('f')

class Server(gsd.App):
  def __init__(self, droid, webcam_url):
    self._droid = droid
    self._webcam_url = webcam_url

  def GET_(self, response):
    response.Render("""<html>
  <head>
  <title>Cat Feeder</title>
  </head>
  <body>
  <img src="%s">
  <br><a href="/feed">Feed!</a>
  </body>
  </html>""" % self._webcam_url)

  def GET_feed(self, response):
    feed(self._droid)
    response.Redirect('/')

def timer(droid):
  feedings = [4, 10, 20]
  last_feeding = None
  while True:
    hour = time.localtime().tm_hour
    if hour in feedings and hour != last_feeding:
      feed(droid)
      last_feeding = hour
    time.sleep(300)

def GetIpAddress():
  s = socket.socket(socket.AF_INET, socket.SOCK_DGRAM) 
  s.connect(('google.com', 0))
  return s.getsockname()[0]

def main():
  droid = android.Android()
  droid.wakeLockAcquirePartial()
  webcam_url = 'http://%s:%d/' % tuple(droid.webcamStart(5, 80).result)
  server = Server(droid, webcam_url)
  port = 8080
  base_url = 'http://%s:%d/' % (GetIpAddress(), port)
  threading.Thread(target=server.Serve, args=('0.0.0.0', port)).start()
  threading.Thread(target=timer, args=(droid,)).start()
  droid.notify('Cat Feeder', 'Running on: %s' % base_url)
  
if __name__ == '__main__':
  main()
And here's the Arduino code:
int relayPin = 13;
int portionSize = 10000;

void setup() {
  Serial.begin(115200);
  pinMode(relayPin, OUTPUT);
}

void loop() {
  if (Serial.available() > 0) {
    Serial.read();
    digitalWrite(relayPin, HIGH);
    delay(portionSize);
    digitalWrite(relayPin, LOW);
  }
}
This project was inspired by the Internet-Enabled Cat Feeder - Mark 2.

Popular posts from this blog

Python on Android

Note: This post is out of date. If you'd like to run Python on your Android device, please see my Android Scripting Environment project. Here's an early Christmas present for all those Python fanatics (self included) out there! With a lot of help from my friends (thanks Manuel and Thomas !) I managed to install Python 2.4.5 on my G1. It's still rough around the edges, but I think it's a good start. Klaus Reimer has a nice overview of how to cross-compile Python . My instructions borrow a lot from his. Download and build the Android source . These directions assume that you have installed the source to /android_src . Download and build the Python 2.4.5 source . These directions assume that you have installed the source to /python_src . Make copies of python and pgen for use later in the build process then clean up. $ cd /python_src $ cp python hostpython $ cp Parser/pgen Parser/hostpgen $ make distclean Apply the following patch to the Python source. diff -r -c -b P...
Read more

Email Injection

Not so long ago, I ran a wiki called SecurePHP. On that wiki, there was one particular article about email injection that received a lot of attention. Naturally, with all the attention came lots of spam. As a result, I disabled editing of the wiki and content stagnated. Still, the email injection article remained popular. About a year later, the server that hosted SecurePHP died and I never had a chance to hook it all back up. I saved the article though and I'm reposting it now. It may be a bit old (I've been away from PHP for a long time), and I didn't write all of it, so feel free to leave comments about needed updates and corrections. Though this article focuses on PHP, it provides a lot of general information regarding email injection attacks. The PHP mail() Function There are a lot of ways to send anonymous emails, some use it to mass mail, some use it to spoof identity, and some (a few) use it to send email anonymously. Usually a web mailform using the mail() funct...
Read more

Unblock Us Security

Unblock Us is an interesting solution to viewing region locked content online. Instead of offering VPN services, they offer a DNS-based solution. By using their DNS servers, geolocation requests by services such as Hulu and Pandora are directed through a geographically appropriate proxy. The remainder of your traffic (e.g. the video or audio stream) is accessed directly. That means you can make use of your connection's full bandwidth. Conversely, VPN connections often decrease your connection speed significantly. However, the DNS solution has security implications. As a DNS provider, Unblock Us is the in perfect position to perform a man in the middle attack . After all, that's what they're doing to sites like Hulu. (Note that SSL connections are safe from man in the middle attacks.) If you trust Unblock Us, then this isn't a problem. If you don't, it's best to limit the traffic that uses their DNS servers. The remainder of your traffic should use a trusted ...
Read more