Solution Monitoring System Cup of Chi Systems. Security No matter what kind of service is being provided, all organisations or companies need to consider.

Slides:



Advertisements
Similar presentations
RFID Access Control System March, 2003 Softrónica.
Advertisements

TURKEY AWOS TRAINING 1.0 / ALANYA 2005 TRAINING COURSE ON AUTOMATED WEATHER OBSERVING SYSTEMS ( AWOS ) MODULE C.2: COMMUNICATION SONER KARATAŞ ELECTRONIC.
There are several research studies we would like to pursue with the HealthMonitor. These include long term monitoring of the elderly. We’re interested.
Number Systems and Codes
Multi-DNC Data Collection/Monitoring
In this presentation you will:
Developing a tool to monitor and help prevent concussions Instrumented Football Helmet Development Team Joseph Jackson (ME) Adam McCauley (ECE) Shawn Kachnowski.
Copyright 2014 Kenneth M. Chipps Ph.D. Network Management Using Sensors to Monitor Network Equipment Rooms Last Update
(855) SF10 Compact Cargo/Shipment Tracker Easily track and monitor packages, shipments, and mobile assets, in real time,
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
Department of Electrical & Computer Engineering Advisor: Michael Zink.
Managing data Resources: An information system provides users with timely, accurate, and relevant information. The information is stored in computer files.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
T24 Wireless Telemetry Advanced Intelligent Instrumentation.
Climate Monitoring WEB Interface Using 1_Wire™ Sensors Imad Hoteit Hassan Wehbe.
Interpret Application Specifications
Database Design Concepts Info 1408 Lecture 2 An Introduction to Data Storage.
University of Massachusetts Amherst InteLock TM Team: Emmanuel Seguin Josh Coffin Anh-Kiet Huynh Christos Tsiokos Remote Access and Proximity Key Advisor:
© 2009 Research In Motion Limited Introduction to developing applications for mobile devices.
One World Real Estate Company Technology Plan. New Computers For the Office Eight 13 inch MacBook Pros and three 27 inch iMac desktop computers Macs are.
 Wireless, Web-Based Monitoring System  Alarm/Event Notifications by Text Message and or  VPN Connection for Fast Response to Alarms and Events.
TelosB Charging and Energy Meter Kit(Dec1201) Group Leader: Tomas Mullins Communicator: Casey Liebl Webmaster: Shiya Liu Team Members: Andrew Gurik & Qiao.
Make your premises an Oasis of security Oasis_EN_1010_c1.
Liquid Management System Johnny Sang Vishnu Reddy Zachary Radtka.
Management Information Systems
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Problemsolving 2 Problem Solving: Designing a website solution Identifying how a solution will function Taking into account the technical constraints a.
COMPUTING FOR BUSINESS AND ECONOMICS-III. Lecture no.6 COURSE INSTRUCTOR- Ms. Tehseen SEMESTER- Summer 2010.
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
Chapter 1-3 The Ethernet LAN. Ethernet The networking protocol used in most modern computer networks is Ethernet. Ethernet is a CSMA/CD LAN protocol.
Investigating jobs in IT
ENERGY INSTITUTE Battery Research Group NiMH Battery Pack for HEV Cem Kaypmaz 2008 İstanbul.
Conditions and Terms of Use
The Internet When was it created and why?. What Is the Internet? A network of computer networks. It connects networks all over the world through the use.
Save-bees’ solution : Consists of standalone devices that are placed in the beehives and offer accurate measurement information for The weight of the.
200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt 400 pt 500 pt 100 pt 200 pt 300 pt.
University of Palestine Faculty of Applied Engineering and Urban Planning Software Engineering Department Prepared By Ahmed Obaid Wassim Salem Supervised.
Home Guard Security System. Introduction & Basic Ideas Home Guard Security System.
Chapter 1 1 Lecture # 1 & 2 Chapter # 1 Databases and Database Users Muhammad Emran Database Systems.
Solar Power Array Management for the Solar Racing Team Mark Calotes Ginah Colón Alemneh Haile Nidhi Joshi Michael Lu School of Electrical and Computer.
Problemsolving Problem Solving – 4 Stages Analysis Design Development Evaluate (ADDE) Note: In this unit Evaluate is not covered in depth.
3 / 12 Databases MIS105 Lec13 Irfan Ahmed Ilyas CHAPTER Prepared By:
Raymond Welch Forrest Holub Sean Brooks Advisor: Dr. Gayatri Mehta.
 Computer News/Tip  Facebook  Your Computer Problems  Next meeting January 11th  New & website 
Focuses on how individuals and organisations use, and can be affected by, ICT in their daily lives. Emphasis on the problem-solving stages of design and.
Aerospace Digital Communication Instrument Senior Design 1 Presentation.
Android Multi-Meter (AMM)
Tbox is a monitoring solution for all your computer systems Unifies and simplifies management of system surveillance Notifies you in the event of.
ClearVision Final Presentation Senior Design 1. Team Members Travis Ann Nylin Electrical Engineer System Testing Schematic Data-Logging and Retrieval.
1 Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Background Real-time environmental monitoring is a field garnering an ever-increasing amount of attention. The ability for sensors to make and publish.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
ICS 465 Midterm Project By David Neely and Brandon Lee.
LO2 Understand the key components used in networking.
BY TEAM FARMERS 16 TH MAY :00-14:00 Product Demonstration.
Attendance Online Management System
Smart Streetlight Proof of Concept Group 3 02/25/16 Thor Cutler Tucker Russ Anthony Giordano Brandon Berry.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Smart Streetlight Proof of Concept Group 3 03/26/16 Tucker Russ Thor Cutler Brandon Berry Anthony Giordano.
Managing Office 365 Identities and Requirements.
Windows Vista Configuration MCTS : Mobile Computers.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Immortals Security Solutions We are immortal through our work
Prepared by: Celeste Ng Updated: May, 2017.
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Managing data Resources:
X y y = x2 - 3x Solutions of y = x2 - 3x y x –1 5 –2 –3 6 y = x2-3x.
Are you looking for netgear -customer services we are 24X7 to serve you better,netgear -customer services.
About Us Scanster is one of the leading IT security software company. Our Software's are well integrated system that simplify computer security management.
Presentation transcript:

Solution Monitoring System Cup of Chi Systems

Security No matter what kind of service is being provided, all organisations or companies need to consider the issue of security. We have researched into a particular security scenario which has yet to have been addressed and devised a solution to the problem.

The issue A great number of universities in the United Kingdom run courses which require the use of laboratories. Among these is the University of Portsmouth. As hazardous and valuable substances are easily accessible to all laboratory users, there is a need for more security to monitor and regulate the usage.

Our Solution A security device able to constantly monitor a hazardous or valuable substance, measuring the amount that has been drawn out and alerting the relevant authorities in the case of unauthorised actions. A website is updated in real time with all the information of interest to the end user.

Design Requirements PriorityParameterRequirement(s) 1Operating Voltage range:7-12V DC 2Strain Gauge Detection range: 100g – 2.5Kg (+/- 10% tolerance) 3Minimum placement pad dimensions:12cm x 12cm 4Maximum user alert time upon an event:10 minutes 5 Periodic website update of system status (battery level, weight): 60 seconds 7 Wireless connectivity: Supported standards:802.11a/b/g Supported encryption:WEP, WPA-PSK, WPA2-PSK 8Working temperature range:-30 o C to 85 o C 9Minimum external display size: 12 ASCII characters (continuous string) 10 RFID authorisation: Code size:32 bit Operating frequency:125kHz Mode:Read only 11Max compiled program file size:32KB

Key functionality Recorded event history with graphical representation of data plus real time updates Existing university RFID cards can be used Instant notification upon unauthorised removal

Stages of prototyping Pressure pad => Strain Gauge for actual weight measurement. Accelerometer removed / not required

Questions?

References Att Security Guard 2009, Electro-Intro, China, viewed 15 May 2011,. intro.com/EX/ /att-security-guard jpg Mad Scientist 2009, Wired, US, viewed 15 May 2011,. istsvg.png Portsmouth University Logo 2010, Invest in Portsmouth, UK, viewed 15 May 2011,. Student Campus Card 2011, University of Portsmouth Lookup, UK, viewed 15 May 2011,. You Got Mail 2009, rgbstock, viewed 15 May 2011,. Nguyen, C (Lecturer) 2011, Design Process, media release, Department of Electronic and Computer Engineering, Portsmouth, viewed 15 May 2011,.