Download presentation
Presentation is loading. Please wait.
Published byStanley Osborne Modified over 9 years ago
1
Chris Kibler, Quinn Calvert, and Mike Duong
2
Contents Statements Problem Justification Statistics Existing Approaches and Technology Market Research Preliminary Timeline of Tasks Tasks Undertaken Project Path
3
Statements Problem Statement “According to the annual report by the Boise City Police in 2007, 92% of all burglaries go unsolved throughout the residential U.S. in the past four years. This low identification rate has been due to conventional security system's lack of a tagging method, that is, a way of marking the intruder.” Statement of Purpose: “Develop a tagging system to mark intruders that is viable for use across the Residential United States.”
4
Problem Justification Statistics 2,800,000 break-ins occur in the United States per year (1990-2010) 1-in-5 chance of being broken into per house Only 25% of Urban break-ins are solved Only 30% of Suburban break-ins are solved Only 41% of Rural break-ins are solved Only 45% of the nation’s burglaries occur in the South 30% of homes have commercial security systems Higher risk of burglaries between 8 P.M. and 3 A.M.
5
Problem Justification (Cont.) Existing Approaches Commercialised Security Systems (ADT, First Alert) Surveillance Cameras Implementation of various Biometrics Basic reinforced locks, doors, and glass Existing Technology Passive Infrared Motion Detector Monitors temperatures across sectors Surveillance Camera Records video and feeds it back to central command Magnetic Contact Sensors Signal when the contact is broken Glass Break Sensors Sensors that analyse frequencies for breakage of glass
6
Market Research Strengths and Weaknesses of competition Understanding of this allows for a stronger, competitive product Contacting of various field “Experts” For in-depth information of field, and pro-tips Identification of Users and Buyers Knowing who to gear our product towards Survey of Populace Allows insight into the consumer
7
Market Research (Cont.) Generic Security Providers (ADT, FirstAlert, etc...) Simple, appeals to common homeowner Rather effective at deterrence Costly; subscription service Does little to identify Widespread “standardization” allows for tampering Surveillance network (Lorex, Honeywell, etc...) One-time purchase (no subscription) Localized service minimizes risk of tampering Very passive – person has to determine a crime Localized service means disabling the system is easier
8
Market Research (Cont.) Biometrics Fastest and most accurate of identification methods Employs a wide variety of methods: DNA, Fingerprint, Retina, Teeth, Bones, Gait, Voice frequency, behaviour... Very, very costly Requires pre-loaded database of templates
9
Experts Some experts we have located in the area of security are: Federal Bureau of Investigation Biometric Center of Excellence Transport Security Administration Sentry Safe Contact of these organizations yielded little: Auto-responses with links to more information
10
Users and Buyers Stiff competition from existing Security System giants Common people purchase said giants' services Many successful companies (Honeywell) sell to the giants Users: Residence Owner Buyers: Commercial Security System Provider
11
Time-line of Tasks
12
Tasks Undertaken Identification and Justification of Problem Too many robberies go unsolved Lack of active tagging method No real solution to this aspect of “tagging” Research into market Users and Buyers identified, but subject to change Competition identified Related technology identified Creation of general time-line Creation of Team Website for file/idea sharing
13
Project Path Pending task: Survey of general populace Will need to contact more experts with useful feedback Create a design Identify the Math, Science, Engineering, and Technological concepts utilized Create prototype, testing each individual component during assembly After solution is created, find a marketing plan Presentation of solution and justification for marketing
14
Questions and/or Comments?
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.