Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chris Kibler, Quinn Calvert, and Mike Duong. Contents  Statements  Problem Justification  Statistics  Existing Approaches and Technology  Market.

Similar presentations


Presentation on theme: "Chris Kibler, Quinn Calvert, and Mike Duong. Contents  Statements  Problem Justification  Statistics  Existing Approaches and Technology  Market."— Presentation transcript:

1 Chris Kibler, Quinn Calvert, and Mike Duong

2 Contents  Statements  Problem Justification  Statistics  Existing Approaches and Technology  Market Research  Preliminary Timeline of Tasks  Tasks Undertaken  Project Path

3 Statements  Problem Statement “According to the annual report by the Boise City Police in 2007, 92% of all burglaries go unsolved throughout the residential U.S. in the past four years. This low identification rate has been due to conventional security system's lack of a tagging method, that is, a way of marking the intruder.”  Statement of Purpose: “Develop a tagging system to mark intruders that is viable for use across the Residential United States.”

4 Problem Justification  Statistics  2,800,000 break-ins occur in the United States per year (1990-2010)  1-in-5 chance of being broken into per house  Only 25% of Urban break-ins are solved  Only 30% of Suburban break-ins are solved  Only 41% of Rural break-ins are solved  Only 45% of the nation’s burglaries occur in the South  30% of homes have commercial security systems  Higher risk of burglaries between 8 P.M. and 3 A.M.

5 Problem Justification (Cont.)  Existing Approaches  Commercialised Security Systems (ADT, First Alert)  Surveillance Cameras  Implementation of various Biometrics  Basic reinforced locks, doors, and glass  Existing Technology  Passive Infrared Motion Detector  Monitors temperatures across sectors  Surveillance Camera  Records video and feeds it back to central command  Magnetic Contact Sensors  Signal when the contact is broken  Glass Break Sensors  Sensors that analyse frequencies for breakage of glass

6 Market Research  Strengths and Weaknesses of competition  Understanding of this allows for a stronger, competitive product  Contacting of various field “Experts”  For in-depth information of field, and pro-tips  Identification of Users and Buyers  Knowing who to gear our product towards  Survey of Populace  Allows insight into the consumer

7 Market Research (Cont.)  Generic Security Providers (ADT, FirstAlert, etc...)  Simple, appeals to common homeowner  Rather effective at deterrence  Costly; subscription service  Does little to identify  Widespread “standardization” allows for tampering  Surveillance network (Lorex, Honeywell, etc...)  One-time purchase (no subscription)  Localized service minimizes risk of tampering  Very passive – person has to determine a crime  Localized service means disabling the system is easier

8 Market Research (Cont.)  Biometrics  Fastest and most accurate of identification methods  Employs a wide variety of methods:  DNA, Fingerprint, Retina, Teeth, Bones, Gait, Voice frequency, behaviour...  Very, very costly  Requires pre-loaded database of templates

9 Experts  Some experts we have located in the area of security are:  Federal Bureau of Investigation Biometric Center of Excellence  Transport Security Administration  Sentry Safe  Contact of these organizations yielded little:  Auto-responses with links to more information

10 Users and Buyers  Stiff competition from existing Security System giants  Common people purchase said giants' services  Many successful companies (Honeywell) sell to the giants  Users: Residence Owner  Buyers: Commercial Security System Provider

11 Time-line of Tasks

12 Tasks Undertaken  Identification and Justification of Problem  Too many robberies go unsolved  Lack of active tagging method  No real solution to this aspect of “tagging”  Research into market  Users and Buyers identified, but subject to change  Competition identified  Related technology identified  Creation of general time-line  Creation of Team Website for file/idea sharing

13 Project Path  Pending task: Survey of general populace  Will need to contact more experts with useful feedback  Create a design  Identify the Math, Science, Engineering, and Technological concepts utilized  Create prototype, testing each individual component during assembly  After solution is created, find a marketing plan  Presentation of solution and justification for marketing

14 Questions and/or Comments?


Download ppt "Chris Kibler, Quinn Calvert, and Mike Duong. Contents  Statements  Problem Justification  Statistics  Existing Approaches and Technology  Market."

Similar presentations


Ads by Google