BY TEAM FARMERS 16 TH MAY 2011 10:00-14:00 Product Demonstration.

Slides:



Advertisements
Similar presentations
Point of Sale (POS) Client & Back Office Server. Operational Concept What is our Objective? What is our Objective? What are our Goals? What are our Goals?
Advertisements

Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Communication is the way information is sent and received Business success depends on clear and effective communications within and between organisations.
Operational Risks Task 13. What is CNP? CNP stands for Card Not Present and is when you order or pay for something online as you are not in front of the.
Helping Your Child Learn to Read
Intracompany Stock Transfer Scenario Overview
Gallup Q12 Definitions Notes to Managers
Implications and Security Issues of the Internet By Neelesh Patel.
ITKS540 Fall 2008University of Jyväskylä ITKS540 Introduction to mobile technology and business Jani Kurhinen Fall 2008.
Why is there Concern about the Effect of the Internet in Society? E-Commerce: Jason Logan eBay: Ben King Hacking: Khyle Westmoreland Censorship: Ben King.
Substitute FAQs SubFinder Overview. FAQs Do I have to have touch-tone service to use SubFinder? No, but you do need a telephone that can be switched from.
ICT Curriculum Evening – an introduction to Wizkid.
Team Wolf Distributed, Consistent and Secure USB Storage Final Project Review Eddie Lai Matt Dube Sean Busch Zhou Zheng.
Computer Systems Week 3: Social Issues Alma Whitfield.
Customer Service Scenario: Purchasing a Desktop Computer from Office Depot by Tony Fernand.
Copyright © 2003 Bolton Institute Dept. of Computing and Electronic Technology - Multimedia Integration and Applications Lecture 5: Design and Prototype.
Conceptual Model by Aaron Garrett and David Thornton Mindstorms Internet Control Environment.
©© 2013 SAP AG. All rights reserved. Scenario/Processes Make-to-Stock Scenario Overview Planning Supply Initiating Production Executing Production Processing.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
Electronics Travel Games Name: Centre Number: Candidate Number:
SDLC Project Brady Goyn, Doug Reeves Planning Analyze Design
Copyright ©: SAMSUNG & Samsung Hope for Youth. All rights reserved Tutorials The internet: Safe online shopping Suitable for: Improver.
Employee Engagement Survey
The Study of Security and Privacy in Mobile Applications Name: Liang Wei
Mobile Computing Applications Nour El Kadri Based on Jani Kurhinen Notes.
NET 499 Leonard Paul Vinas Network Security and Electronics Department of Technology.
Specification section 6.1. What do you need to learn? The effects on society and advantages/disadvantages of ICT in the design, development, marketing.
Staying Safe Online Keep your Information Secure.
LOD Surveillance System Jamie Creech Software Engineer.
Computer Services Overview. Computer Services Offices Main Office: D ‐ 127 Phone: 652 ‐ 4335 Hours: 8:30 am to 5:00 pm Monday ‐ Friday Academic Computer.
Homeland Security System Danny Butler EKU, Dept. of Technology.
Save-bees’ solution : Consists of standalone devices that are placed in the beehives and offer accurate measurement information for The weight of the.
INFORMATION SECURITY WHAT IS IT? Information Security The protection of Information Systems against unauthorized access to or modification of information,
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
JFK-103B1W9 and JFK-103B3W9 This program is going to be used to learn about:  Decision Making Skills  Communication Skills  Team Building Skills and.
Professional IT Roles Investigate IT professional roles. Find out what each role involves, what the job entails. Identify what personal qualities are needed.
Specialist communication channel. Sarah-Jane king.
Ch. 6 Team Effectiveness. Here are some team building ideas, techniques, and tips you can try when managing teams in your situation.
Session 7 - Maintenance - contract and day-to-day Maintenance Support Presenter  Grenville Powell (Managing Director - of Shokaz Integrated Computing.
LPM – Unit 1 L 4 Socialising on the internet. How do you keep in contact with your friends and family? List all of the different types of technology.
Basic Community Tools: Surveys, tasks, chat room, blogs, forums and the gallery.
Minding your business on the internet Kelly Trevino Regional Director October 6,2015.
Isolation Lock-Out Room Johns River Quarry Site Contact: Blake Ardrey, Quarry Manager, BCM, Johns River Quarry Phone:
Online Safety Parent Workshop Helping to keep your children safe online.
Compliance Monitoring and Enforcement Audit Program - The Audit Process.
Measured Progress © New Mexico SBA iTester 3  Webinar Administration Best Practices This presentation will begin momentarily... Please call in by.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Library Training Self-Guided Tutorial Information Desk Worker.
Medication Compliance Alarm (MCA) Senior Design I Final Presentation.
Julie Latham Digital Citizenship: An Informational Guide.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
V i t a l i s Wireless Biometric Sensor ECE 477 Final Presentation Team 13  Spring 2013 Paste a photo of team members with completed project here. Annotate.
Computer Security By Duncan Hall.
May07-02: Parking Meter Clint Hertz: Team Leader Austyn Trace: Communications Nick Hollander Christian Baldus.
MICROCONTROLLER DETECTION SYSTEM Joshua Bosiljevac EKU.
ONLINE SECURITY Tips 1 Online Security Online Security Tips.
A Global fully incorporated Virtual ecommerce Software Solution.
Introduction Before the internet became an integral part of our lives, advertising a business was done mainly on outdoor billboards, posters, tv ads and.
Telecare and Community Alarms Service Keith Hannah, Head of Directorate Support.
Engineered Security Systems, Inc. Access Control Systems CCTV Systems Asset Protection Systems Fire Alarm Systems Laptop Protection Systems Burglar Alarm.
Avalon Science and Engineering Fair 2015 Let’s Get Started Science and Engineering Fair packets will go home this week. All 2 nd, 3 rd, 4 th and 5 th.
Intracompany Stock Transfer Scenario Overview
Intracompany Stock Transfer Scenario Overview
Risk of the Internet At Home
Intracompany Stock Transfer Scenario Overview
Handling Information Securely
This is a template for a presentation that you can use to introduce your team to Harvest. You can customize the content of the slides. You’ll want to pay.
Presentation transcript:

BY TEAM FARMERS 16 TH MAY :00-14:00 Product Demonstration

Introduction The security system in which we have been specified to manufacture will help us to get an insight into how this system works, and working in a team environment. In this presentation we will be giving you an insight into our products design, a demonstration of the product and how we encountered this in our team.

Design Requirements 1. To detect a change in the object on the website within 5 seconds 2. A minimum movement sensitivity of 2cm 3. To acknowledge an object weighing over 250g 4. To monitor the object in two dimensions 5. Connect wirelessly to an access point within a clear line of sight of 10m 6. The whole unit must fit on an 30cm by 40cm base 7. The unit must be under 50cm in height 8. The whole product must weigh less than 1Kg 9. Must run for 12 hours on one 9v battery 10. Must be able to be massed produced for a cost less than £50 per unit

Design Highlights Working with the design requirements we have kept these into consideration throughout the period of constructing this project. The push button method was used because this was quick and easy to set up on a breadboard and use as a prototype design.

User Case Scenario 1 Small shop security Trish owns her own antique shop, it’s a family business operating out of the high- street. She does not have an integrated till system, so therefore has a desktop computer for stock counting and has a connection to the internet to deal with card payments. She has presently fitted some of her more expensive items with our security system for an added defence in her crowded shop which has blind spots from the till area. Trish is at the till area during her monthly stock check when a group of customers enter the shop. She already has her PC turned on with her till program ; also a web browser running our site. She is able to carryon working and dealing with current customers. When the site beeps and she is able to see that her vase sensor has been triggered. This now gives her the opportunity to go check on the customer or to wait to see if its put back and if it is still triggered when the customer leaves she can confront the customer what is going on.

User Case Scenario 2 Museum security system Museums tend to be extremely busy, so therefore they need a good security system for expensive products. Our product could be used within the museum industry. Mrs Brown works in the D-Day museum in Portsmouth and one Saturday it is extremely busy. She has been left to run the museum on her own to work for that day because one of the other employees has gone sick. Therefore they have fitted our system to some of their products. She has a computer monitor at the front desk with internet connection and constant updates to the website we have given her with our security system. The museum has several cameras throughout but as she is the only person working she is not able to monitor it regularly. So the vase which is in the main room has been fitted with the push button sensor system because it is of a high value and an appealing asset to the museum. So if anyone touches it or tries to remove this vase then the monitor at the front desk will alarm whether Mrs Brown is present or not. The alarm on the system is loud enough for her to hear and quickly approach the situation before it is too late for the product to be taken. This means that the product would be reliable and has a significant specification that other sensor systems do not currently have.

User Case Scenario 3 Christopher is a businessman who relies heavily on his laptop for his work. His laptop contains important and valuable information that is highly confidential, and it is crucial that it remains in his possession. When he has the chance to enjoy recreational activities he needs to have the peace of mind that his laptop is safe from intruders or anyone that isn't authorised to gain access to it. In order to protect the laptop from intruders or un-trusted family members, it will need a trusted and reliable security system. If something or someone moved the laptop, it would trigger the alarm and notify Christopher via his mobile phone, this would link to the internet which also has a live footage from the webcam of the laptop, this can then be used as proof to verify whether the laptop has be moved or taken. When Christopher acknowledges that his laptop has been interfered with or stolen, he could then take action by calling the police or his family.

Images of previous prototypes Above is the first idea for the layout of the push buttons. These are showing roughly what size item we can protect. From this we decided a vase was the best item for the overall presentation of our security system. Below is the first test of the buttons with LED’s connected so that we could make sure this idea would work correctly.

Prototype in Progress

Demonstration of Prototype

Final Design

Eagle Circuit Diagram

PCB Design

Website

Conclusion Overall in this group project we have learnt several important aspects within the Electronic engineering, Communications Engineering,Computing and Network degrees. These are: Learnt not only our sector of engineering but learnt programming and website design. Keeping to specific deadlines. Constructing a weekly journal consistently. Here are some aspects that individuals learnt throughout this period:

The end Do you have any questions? Thank you for your time. Team Farmers