Chris Kibler, Quinn Calvert, and Mike Duong

Slides:



Advertisements
Similar presentations
How Will it Help Me Do My Job?
Advertisements

INTRUSION ALARM TECHNOLOGY
IT Issues and Support Structures Simulation Education and Complex Technology Based Practice.
SECAM Systems Product Presentation SECAM Systems © 2010.
SECURITY & SAFETY EXHIBITIONS CONNECTING LOCAL & GLOBAL MARKETS.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Proshield Business Plan Proshield — Day and Night! 24/ 7 PROSHIELD.
Jim Niehaus October 9, Topics No Cost Considerations Systems with 24/7 Monitoring Service Cameras Motion Sensors References & Product Links.
By: Monika Achury and Shuchita Singh
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Communications Technology 2104 Jenn Sandifer. A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or area.
C ONTENTS 1-Introduction What are smart homes 2-Why smart homes 3- Applications of smart homes 4- The main objective of the project 5- The main phases.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
© 1999 National Burglar & Fire Alarm Association 1-1 ALARMS: The First Line of Defense.
XFINITY HOME Presentation. WHY? A home or apartment burglary occurs ever 15 seconds. Home burglaries are most common during daylight hours – usually when.
Country house Control Panel Glass break detector Hooter alarm Magnetic sensor Motion detector Security light.
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
A Company Smart Campus All Time Safety Security And Reliability.
Chris Kibler, Quinn Calvert, and Mike Duong. Contents  Statements  Problem Justification  Statistics  Existing Approaches and Technology  Market.
Rural Intersection Collision Avoidance System (RICAS) US Highway 53 and State Highway 73 Minong, Wisconsin Additional information Project Website:
For: Communication Technology 2201 By: Chris Murphy.
PERSONAL INTERACTIVE COMPUTER NETWORK TECHNOLOGY BASED SUPPORT Christopher E. Lang Computer Electronic Networking Dept. of Technology Eastern Kentucky.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
ALARM MONITORING SERVICE
Heroes Park Security Exploring security alternatives for Heroes Park.
Jess Thornton Unit 9. Unit 9 Chores DiscussionQuiz Unit 9 Project (Look under unit 9 for direction) Seminar.
Choose the stage of Innovation you’ve submitted: IdeaPrototypeEstablishedScaling We have developed the complete prototype of our project that exactly replicates.
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
R&A Home Security System Invented by: Amber Scheaffer Robby Harris.
Physical Security By Nathan Conroy COSC Outline Purpose of physical security Two types of physical security Different types of security devices.
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
AUTOMATING HOME SECURITY RYAN C. KRAUSE. BACKGROUND: HOME SECURITY Many providers including, self-building kits ADT, Gaurdian, Xfinity, LifeShield, Protection.
Home Security Keep Your Family Safe. Crime is an unfortunate fact of life today, and you don't want to fall victim to thieves who steal more than just.
What is a Brownfield? Brownfield: A tract of land that has been developed for industrial purposes, polluted, and then abandoned. – Merriam-Webster’s 10.
Unit 1: Protecting the Facility (Virtual Machines)
CCTV CAMERAS powerscctvcamerass.blog.com / A few stuff you need to know about CCTV Cameras.
Team C Ryan Eavy Kiril Gantchev Scott Krasnigor Ljubomir Krispinovic Scott Noorthoek Chris Sharp STARS Social Trading Aggregation and Risk System.
Home Security Solutions Market to Global Analysis and Forecasts by Components, Product Type and Solution Type No of Pages: 150 Publishing Date:
Home Security Solutions Market to Global Analysis and Forecasts by Components, Product Type and Solution Type No of Pages: 150 Publishing Date:
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Home Security Solution Market.
Smart Homes & Buildings.
XBee Based Industrial And Home Security System
The Real Estate “Million Dollar Question”: Who Will Sell Next?
Presentation On Office security system
Security service management of tomorrow
Chris Kibler, Quinn Calvert, and Mike Duong
A Total Technology Company
RFID Trigger Lock By: Mike Jastrzebski.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Electronic Security Market to cross $60bn by 2024.
find-the-best-cctv-system-company-in-singapore
Blind Guidance system (BGS)
Security Alert System and Universal Access
Utilizing GSA for Procurements.
ALARM SYSTEM DELAY ALLOWS CRASH AND SMASH BREAK-IN.
ALARM SYSTEM DELAY ALLOWS CRASH AND SMASH BREAK-IN.
Physical Security Office
THP² Europe is specialized in the development and implementation of all available digitized test and measuring equipment, as well as high-end, digitized.
InLoox PM Web App product presentation
Officer H Sonny McClamrock
Security Sales: Entering Uncharted Territory
A Competitive Climate Companies that sell, lease, install, service and monitor security systems generated total 2015 estimated industry revenues of $75.0.
Financial Affairs Training Website
MATH 2311 Section 6.1.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Makes Life Easier for Business Owners by Using GPS Vehicle Tracking.
Security Dealers/Integrators Are Cautiously Optimistic
Unit 14 Emergency Planning IS 235
Presentation transcript:

Chris Kibler, Quinn Calvert, and Mike Duong

Contents Market Research Statements Problem Justification Statistics Existing Approaches and Technology Market Research Preliminary Timeline of Tasks Tasks Undertaken Project Path

Statements Problem Statement Statement of Purpose: “According to the annual report by the Boise City Police in 2007, 92% of all burglaries go unsolved throughout the residential U.S. in the past four years. This low identification rate has been due to conventional security system's lack of a tagging method, that is, a way of marking the intruder.” Statement of Purpose: “Develop a tagging system to mark intruders that is viable for use across the Residential United States.”

Problem Justification Statistics 2,800,000 break-ins occur in the United States per year (1990-2010) 1-in-5 chance of being broken into per house Only 25% of Urban break-ins are solved Only 30% of Suburban break-ins are solved Only 41% of Rural break-ins are solved Only 45% of the nation’s burglaries occur in the South 30% of homes have commercial security systems Higher risk of burglaries between 8 P.M. and 3 A.M.

Problem Justification (Cont.) Existing Approaches Commercialized Security Systems (ADT, First Alert) Surveillance Cameras Implementation of various Biometrics Basic reinforced locks, doors, and glass Existing Technology Passive Infrared Motion Detector Monitors temperatures across sectors Surveillance Camera Records video and feeds it back to central command Magnetic Contact Sensors Signal when the contact is broken Glass Break Sensors Sensors that analyze frequencies for breakage of glass

Market Research Generic Security Providers (ADT, FirstAlert, etc...) Simple, appeals to common homeowner Rather effective at deterrence Costly; subscription service Does little to identify Widespread “standardization” allows for tampering Surveillance network (Lorex, Honeywell, etc...) One-time purchase (no subscription) Localized service minimizes risk of tampering Very passive – person has to determine a crime Localized service means disabling the system is easier

Market Research Biometrics Fastest and most accurate of identification methods Employs a wide variety of methods: DNA, Fingerprint, Retina, Teeth, Bones, Gait, Voice frequency, behavior... Costly Requires pre-loaded database of templates

Experts Some experts we have located in the area of security are: Federal Bureau of Investigation Biometric Center of Excellence Transport Security Administration Sentry Safe Contact of these organizations yielded little: Auto-responses with links to more information

Users and Buyers Stiff competition from existing Security System giants Common people purchase said giants' services Many successful companies (Honeywell) sell to the giants Users: Residence Owner Buyers: Commercial Security System Provider

Time-line of Tasks

Tasks Undertaken Identification and Justification of Problem Too many robberies go unsolved Lack of active tagging method No real solution to this aspect of “tagging” Research into market Users and Buyers identified, but subject to change Competition identified Related technology identified Creation of general time-line Creation of Team Website for file/idea sharing

Project Path Pending task: Survey of general populace Will need to contact more experts with useful feedback Create a design Identify the Math, Science, Engineering, and Technological concepts utilized Create prototype, testing each individual component during assembly After solution is created, find a marketing plan Presentation of solution and justification for marketing

Questions and/or Comments?