Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita.

Slides:



Advertisements
Similar presentations
EE 294 Master’s Project Spring 2006 D.A.S. Deaf Alert System By Robert Wangai Samer Ashkouri.
Advertisements

PC Anywhere By: Neil Meharu Jewel Libid Pete Ramirez Lynn Hy.
Multi Layered Pool Intrusion Detection System TEAM G  Orlando Carol  Jay Cueco  Rene Mendoza.
Team members: Sven SoellEE Miao QinCprE Hwa-Sung RyuCprE Pek-Yee TeohEE Abstract In most homes combustion gases are produced by appliances such as gas-fired.
Team 7 / May 24, 2006 Web Based Automation & Security Client Capstone Design Advisor Prof. David Bourner Team Members Lloyd Emokpae (team Lead) Vikash.
1 Application Accessory For Cellular Phone - Characterization Presentation - Performed by: Avi Feldman Omer Kamerman Project instructor: Boaz Mizrachi.
WISENET Wireless Sensor Network Project Team: J. Dunne D. Patnode Advisors: Dr. Malinowski Dr. Schertz.
WISENET Wireless Sensor Network Project Team: J. Dunne D. Patnode Advisors: Dr. Malinowski Dr. Schertz.
DUE Security and Fire Alarm Systems LEARNING OUTCOME 7B Describe design overview and location considerations.
1 INTRUSION ALARM TECHNOLOGY WIRELESS SYSTEMS. 2 INTRUSION ALARM TECHNOLOGY Wireless systems use radio frequencies (RF) to connect sensors to the control.
1 INTRUSION ALARM TECHNOLOGY LOCAL VS. MONITORING.
BUILDING SECURITY ALARM SYSTEM. BUILDING SECURITY ALARM SYSTEM Any electrical or mechanical device which is designed or used for the detection of an unauthorized.
Team Members: Nahiyan Ali Shrabantee Chatterjee Vaibhav Kumar Alex Weigel Tao Zeng Advisor: Dr. Mani Mina Client: Senior Design Dr. Gregory Smith.
H-1 Network Management Network management is the process of controlling a complex data network to maximize its efficiency and productivity The overall.
Smart Home for disabled people Students: Atara Gutman and Anastasia Logvinenko Instructor: Alexander Kinko Final Presentation Semester Spring part.
ING SECURITY SYSTEM WITH ARDUINO Anthony Friend Eastern Kentucky University Network Security & Electronics Program NET 499 – Capstone.
Monitoring, measurement and control technology. Definition of data logging Data logging – collecting data automatically from sensors over a certain period.
May Team Information Client Department of Electrical and Computer Engineering, Iowa State University Faculty Advisor Professor Gary Tuttle Team Members.
Our senses We can use our eyes to see things Our senses We use our ears to hear.
Ruslan Masinjila Aida Militaru.  Nature of the Problem  Our Solution: The Roaming Security Robot  Functionalities  General System View  System Design.
Flatiron Mobile Device Security Monitor Thomas Horacek Lucas Greve.
Inter Semester Presentation By Andrew Mepham Development of a Lightweight Stock Movement System.
Save-bees’ solution : Consists of standalone devices that are placed in the beehives and offer accurate measurement information for The weight of the.
For: Communication Technology 2201 By: Chris Murphy.
Senior Design II Final Presentation Senior Design I April 12, 2006 Team Members: Julian Ross Felipe Prieto Arnoldo Perez Alexander Fontao.
Automated Nightlight May06-19 Project May06-19 Website: seniord.ee.iastate.edu/may0619 Client: ECpE Senior Design Faculty Advisor: Dr. Degang Chen
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Problem Statement Automotive and heavy equipment applications use sensors on machines to report temperatures, pressures, speeds, etc. to a central embedded.
The group will focus on the design of a “smart” device. This includes researching the best method of design and fabricating the design to create a working.
Intelligent Database Systems Lab 國立雲林科技大學 National Yunlin University of Science and Technology 1 Wireless Sensor Network Wireless Sensor Network Based.
D.H.S. Digijock Home Security ECE477 – Team 7: Linda Stefanutti Zach Smith Stuart Pulliam Will Granger.
Smart Surveillance Technology Javier OcasioPerezWilliam Sanchez Rosa Mariel Martinez MarreroAbraham Diaz Santiago.
North Shore Schools Security Upgrades
Name Of The College & Dept
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Remote Control of Home Appliances PROJECT PLAN Team: ◦ Elie Abichar –CE ◦ Chris Tefer –CE ◦ Ananta Upadhyaya.
ARM Based Gas Leakage Detection System Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Smart Surveillance Technology Javier OcasioWilliam Sanchez Mariel MartinezAbraham Diaz.
Introduction ProjectRequirements Project Requirements In a previous senior design project, a wireless front-end was added to Iowa State University’s Teradyne.
Community Support Health and Community Services Barry Fearon Senior Commissioning Manager.
CONTENTS: 1.Abstract. 2.Objective. 3.Block diagram. 4.Methodology. 5.Advantages and Disadvantages. 6.Applications. 7.Conclusion.
Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
A Web-based Console for Controlling a Wireless Sensor network Team A: Thang Nguyen – Duc Duong Course CSCI 5234: Web Security Instructor: Dr. T. Andrew.
FERNANDO J. ARROYO LÓPEZ (PM) EDWARD CAMACHO PADILLA JAIME LÓPEZ VALENTIN YANIRA RIVERA NEGRON STEVEN MORALES ROSARIO LIFE CONNECTION PROPOSAL PITCH PREPARED.
Abstract Keeping multiple children safe and accounted for can be a daunting task. When someone loses track of a child, even for a little while, anxiety.
ELVIS Educational Laboratory Virtual Instrumentation Suite: Phase II Abstract Problem Statement The goal of this project is to convert the EE 201 labs.
Nighttime outings can pose hazardous situations, especially for lone females. People traveling alone across campus at night are prime targets for attackers.
EDGE™ Final Project Plan Presentation P09001 – RFID Reader & Active Tag Philip Davenport (Industrial and Systems Engineering)
16 February 2016 Connected Worker. © 2015 by Honeywell International Inc. All rights reserved. Connected Worker 1 Real Time Gas Detection, Real Time Telematics.
DH Housing LIN Virtual Care Village Eileen Waddington – Independent Consultant Peter Woodhouse – Cumbria County Council.
VEHICLE BACK UP ALARM DESIGN Student: Qi Zhou Mentor: Dr. Stanislaw Legowski.
SIDS Alert Device BY ERIC BAGNARD JT HIRSIG. Overview Background SIDS stands for Sudden Infant Death Syndrome One of the leading causes of death for infants.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Security Systems Presented By:
Senior Design 2  Intelligent Wheelchair  Group Members  Jose Vivian  Oscar Garcia  Alan Mairena.
PROJECT PRESENTATION Nanjing- China. Nanjing Project covers an area of 87,600 square meters, with a total construction area of 233,900 square meters,
Home security consultants provide hardware and customer support services to help homeowners prevent crime and fires in their homes and on their property.
XBee Based Industrial And Home Security System
Dec03-11 Portable Gas Safety Sensor December 9, 2003
How SCADA Systems Work?.
Home Automation System
Chapter 8 Advanced SQL Pearson Education © 2014.
WISENET Wireless Sensor Network
Nick Van Lieshout, Garrett Dougherty, Gina Gilmartin, Kyle Wisbrock
ECE 477 Digital Systems Senior Design Project  Spring 2013
Student’s Name with USN No.
Elecbits.
RFID Security System Problem Impact Approach Diagram
Presentation transcript:

Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita

Overview Problem StatementProblem Statement BackgroundBackground ObjectivesObjectives Intended Users and UsesIntended Users and Uses Need/Feasibility AnalysisNeed/Feasibility Analysis Concept DevelopmentConcept Development StandardsStandards Ethical ConsiderationsEthical Considerations BudgetBudget End Product DescriptionEnd Product Description ConclusionConclusion

Problem Statement –The need for integrated sensors –Detects gas, smoke, and home invasion (burglar alarm ) –Web-Based platform –Pre-defined Actions

Background Wireless Fire Alarm System (University of Connecticut) Portable Gas Sensor (Iowa State University) Speech Synthesized Temperature Sensor (University of Illinois)

Objectives This system should activate an alarm This system should be accessible The device should be useful The system should be Marketable The system should be valuable Monitored status should be accessible remotely, private, user friendly

Intended Users and Uses UsersUsers –Computer Literate UsesUses –monitor the status of gas and smoke concentrations, and intrusion

Needs / Feasibility Analysis Needs AnalysisNeeds Analysis –Question 1: Why is there a problem with sensors locating a specific threat? –Question 2: Why does the threat have to be located specifically if the alarm alerts the user with sound? –Question 3: Why is there a need to have three separate sensors for one system instead of integrating them into one? –Question 4: Why is there a need for web-based monitoring when some systems can be monitored using a LCD panel? –Question 5: Why is there a need for the system to control functions in the home to eliminate certain threats?

Feasibility Analysis

Concept Development The pros and cons of selections Advantages: –Power –Wireless –Serial –Individual connections Disadvantages: –Wired systems may be more costly –Cumbersome –Constant battery replacement –Signal interferance –Serial Signal Delays

Standards ISO –connected to control and indicating equipment AS/NZS :1996 –the remote database access client, when database language used is SQL ITS-90 –t90 / °C = T90/K

Ethical Considerations DilemmaDilemma –unauthorized access to private information –security risk from altered information StakeholdersStakeholders –The stakeholders involved in this project will be the owner or other users of the security system, hackers, and the general public. Determining the optionsDetermining the options –Best extreme –Worst extreme –Compromise Application of Ethical TheoriesApplication of Ethical Theories –Ethical egoism –Utilitarianism –Ethics of care

Budget Cost CategoryPrice ComponentsMax. $700 Time$15/hr * 10hr/wk * 4wk/mn * 4mn * 4people = $9600 Lab Space$400/mn * 1mn/4wk * 1wk/168hr * 15hr/wk * 4 wk/mn * 4 mn = $250 Lab Equipment$300/wk * 15hr/168hr * 4 wk/mn * 4 mn = $428 Fringe Benefit.30 * $7200 = $2880 Instructor Salary $200/hr * 1hr/wk * 4wk/mn * 4mn = $3200 Grand Total$14178

End Product Description Functions –Functional Block Diagram

Conclusion After performing a Feasibility Analysis, Gant chart, and budget it is concluded that the project is feasible and will be accomplished within the allotted time.

Questions?