Chris Kibler, Quinn Calvert, and Mike Duong. Contents  Statements  Problem Justification  Statistics  Existing Approaches and Technology  Market.

Slides:



Advertisements
Similar presentations
How Will it Help Me Do My Job?
Advertisements

IT Issues and Support Structures Simulation Education and Complex Technology Based Practice.
SECAM Systems Product Presentation SECAM Systems © 2010.
Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 3.1.
SECURITY & SAFETY EXHIBITIONS CONNECTING LOCAL & GLOBAL MARKETS.
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
Proshield Business Plan Proshield — Day and Night! 24/ 7 PROSHIELD.
PARTNERSHIP FOR PRIORITY VIDEO ALARM RESPONSE Steve Dye, Chief of Police Grand Prairie Police Department.
ICASAS305A Provide Advice to Clients
Jim Niehaus October 9, Topics No Cost Considerations Systems with 24/7 Monitoring Service Cameras Motion Sensors References & Product Links.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
Communications Technology 2104 Jenn Sandifer. A security alarm is a system designed to detect intrusion – unauthorized entry – into a building or area.
C ONTENTS 1-Introduction What are smart homes 2-Why smart homes 3- Applications of smart homes 4- The main objective of the project 5- The main phases.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
© 1999 National Burglar & Fire Alarm Association 1-1 ALARMS: The First Line of Defense.
XFINITY HOME Presentation. WHY? A home or apartment burglary occurs ever 15 seconds. Home burglaries are most common during daylight hours – usually when.
Country house Control Panel Glass break detector Hooter alarm Magnetic sensor Motion detector Security light.
Technology and Hotel Security Hotel Mgmt. Hospitality Services R. McCann.
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
Financial Stewardship Institute Capstone Presentation 2014 Angie Donahue Jackie Etchison Turi Holte Lynn Egli Lisa Knox Pam Palanuk R eally F abulously.
Is the Traditional Utility-Customer Relationship Obsolete? October 2, 2011.
N ew Security Approaches Biometric Technologies are Coming of Age ANIL KUMAR GUPTA & SUMIT KUMAR CHOUDHARY.
A Company Smart Campus All Time Safety Security And Reliability.
PRODUCT LOCATOR PresentedBy Richard Raehl November 13, 2001.
By Bh.Phanindra Kumar. TECHNOLOGY is Making Things EASIER Day-By-Day. Our Concept is a Standing Example of the Same. RED TACTON Implies a Form of “GREENER.
For: Communication Technology 2201 By: Chris Murphy.
PERSONAL INTERACTIVE COMPUTER NETWORK TECHNOLOGY BASED SUPPORT Christopher E. Lang Computer Electronic Networking Dept. of Technology Eastern Kentucky.
February 17, 1999Open Forum on Metadata Registries 1 Census Corporate Statistical Metadata Registry By Martin V. Appel Daniel W. Gillman Samuel N. Highsmith,
INTEGRATED DATA COLLECTION FRAMEWORK IN LINE WITH SEEA CONCEPT -- FISHERIES Sachiko TSUJI, Jennifer gee, FIPS, FAO.
Identity Theft Project Erin L. Caraway Jacob Locke.
Biometrics Stephen Schmidt Brian Miller Devin Reid.
ALARM MONITORING SERVICE
Supporting Researchers and Institutions in Exploiting Administrative Databases for Statistical Purposes: Istat’s Strategy G. D’Angiolini, P. De Salvo,
Heroes Park Security Exploring security alternatives for Heroes Park.
1 Copyright © 2011 Pearson Education, Inc. publishing as Prentice Hall.
DATA PROTECTION ISSUES PERFORMING VIDEO SURVEILLANCE XIV Case Handling Workshop Athens, November 2006.
Choose the stage of Innovation you’ve submitted: IdeaPrototypeEstablishedScaling We have developed the complete prototype of our project that exactly replicates.
The Utilization of Artificial Intelligence in a Hybrid Intrusion Detection System Authors : Martin Botha, Rossouw von Solms, Kent Perry, Edwin Loubser.
R&A Home Security System Invented by: Amber Scheaffer Robby Harris.
Global Video Surveillance as a Service Market WEBSITE Single User License: US$ 2500 No of Pages: 62 Corporate User.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Consumer and Organizational Buyer Behavior
Reach us at Call: | Visit:
Automatic Data Capture  Process where many techniques are used to automatically collect data without need for manual entry. Manual entry has following.
AUTOMATING HOME SECURITY RYAN C. KRAUSE. BACKGROUND: HOME SECURITY Many providers including, self-building kits ADT, Gaurdian, Xfinity, LifeShield, Protection.
MarketsandMarkets Presents Home Security Solutions Market worth $34.46 Billion by 2017
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Unit 1: Protecting the Facility (Virtual Machines)
Information Technology: Inventing the Future. 2 “I do not fear computers. I fear the lack of them.” - Isaac Asimov ( )
Video Surveillance Market to Global Analysis and Forecasts by Components and End-user Industry No of Pages: 150 Publishing Date: Jan 2017 Single.
Home Security Solutions Market to Global Analysis and Forecasts by Components, Product Type and Solution Type No of Pages: 150 Publishing Date:
Home Security Solutions Market to Global Analysis and Forecasts by Components, Product Type and Solution Type No of Pages: 150 Publishing Date:
Video Surveillance Market to Global Analysis and Forecasts by Components and End-user Industry No of Pages: 150 Publishing Date: Feb 2017 Single.
Home Security Solutions Market to Global Analysis and Forecasts by Components, Product Type and Solution Type No of Pages: 150 Publishing Date:
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Home Security Solution Market.
Smart Homes & Buildings.
XBee Based Industrial And Home Security System
Chris Kibler, Quinn Calvert, and Mike Duong
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Electronic Security Market to cross $60bn by 2024.
Chris Kibler, Quinn Calvert, and Mike Duong
find-the-best-cctv-system-company-in-singapore
Blind Guidance system (BGS)
© Inge Hill Start Up, Palgrave 2015
THP² Europe is specialized in the development and implementation of all available digitized test and measuring equipment, as well as high-end, digitized.
Officer H Sonny McClamrock
Security Sales: Entering Uncharted Territory
Makes Life Easier for Business Owners by Using GPS Vehicle Tracking.
Security Dealers/Integrators Are Cautiously Optimistic
KS5 Curriculum Map Business Studies
Presentation transcript:

Chris Kibler, Quinn Calvert, and Mike Duong

Contents  Statements  Problem Justification  Statistics  Existing Approaches and Technology  Market Research  Preliminary Timeline of Tasks  Tasks Undertaken  Project Path

Statements  Problem Statement “According to the annual report by the Boise City Police in 2007, 92% of all burglaries go unsolved throughout the residential U.S. in the past four years. This low identification rate has been due to conventional security system's lack of a tagging method, that is, a way of marking the intruder.”  Statement of Purpose: “Develop a tagging system to mark intruders that is viable for use across the Residential United States.”

Problem Justification  Statistics  2,800,000 break-ins occur in the United States per year ( )  1-in-5 chance of being broken into per house  Only 25% of Urban break-ins are solved  Only 30% of Suburban break-ins are solved  Only 41% of Rural break-ins are solved  Only 45% of the nation’s burglaries occur in the South  30% of homes have commercial security systems  Higher risk of burglaries between 8 P.M. and 3 A.M.

Problem Justification (Cont.)  Existing Approaches  Commercialised Security Systems (ADT, First Alert)  Surveillance Cameras  Implementation of various Biometrics  Basic reinforced locks, doors, and glass  Existing Technology  Passive Infrared Motion Detector  Monitors temperatures across sectors  Surveillance Camera  Records video and feeds it back to central command  Magnetic Contact Sensors  Signal when the contact is broken  Glass Break Sensors  Sensors that analyse frequencies for breakage of glass

Market Research  Strengths and Weaknesses of competition  Understanding of this allows for a stronger, competitive product  Contacting of various field “Experts”  For in-depth information of field, and pro-tips  Identification of Users and Buyers  Knowing who to gear our product towards  Survey of Populace  Allows insight into the consumer

Market Research (Cont.)  Generic Security Providers (ADT, FirstAlert, etc...)  Simple, appeals to common homeowner  Rather effective at deterrence  Costly; subscription service  Does little to identify  Widespread “standardization” allows for tampering  Surveillance network (Lorex, Honeywell, etc...)  One-time purchase (no subscription)  Localized service minimizes risk of tampering  Very passive – person has to determine a crime  Localized service means disabling the system is easier

Market Research (Cont.)  Biometrics  Fastest and most accurate of identification methods  Employs a wide variety of methods:  DNA, Fingerprint, Retina, Teeth, Bones, Gait, Voice frequency, behaviour...  Very, very costly  Requires pre-loaded database of templates

Experts  Some experts we have located in the area of security are:  Federal Bureau of Investigation Biometric Center of Excellence  Transport Security Administration  Sentry Safe  Contact of these organizations yielded little:  Auto-responses with links to more information

Users and Buyers  Stiff competition from existing Security System giants  Common people purchase said giants' services  Many successful companies (Honeywell) sell to the giants  Users: Residence Owner  Buyers: Commercial Security System Provider

Time-line of Tasks

Tasks Undertaken  Identification and Justification of Problem  Too many robberies go unsolved  Lack of active tagging method  No real solution to this aspect of “tagging”  Research into market  Users and Buyers identified, but subject to change  Competition identified  Related technology identified  Creation of general time-line  Creation of Team Website for file/idea sharing

Project Path  Pending task: Survey of general populace  Will need to contact more experts with useful feedback  Create a design  Identify the Math, Science, Engineering, and Technological concepts utilized  Create prototype, testing each individual component during assembly  After solution is created, find a marketing plan  Presentation of solution and justification for marketing

Questions and/or Comments?