cri sheroze
DESCRIPTION
bookTRANSCRIPT
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
Module Name: CREATIVITY AND INNOVATION
Module Code:
Name: SHEROZE ALI
TP Number: TP031374
Intake Code: UC2F1501ITBIS
Submission Deadline: 26/10/2015
Asia Pacific University Page 1
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
Table of ContentsExecutive Summary...............................................................................................................................4
Introduction...........................................................................................................................................4
Problem Statement...............................................................................................................................4
Competitor Analysis..............................................................................................................................5
Bio Home Security System Vs Ufacekey.............................................................................................7
Idea Generation:....................................................................................................................................8
Concept Fan:..........................................................................................................................................9
Force Fitting Trigger:..........................................................................................................................9
Outcomes........................................................................................................................................10
Scamper:..........................................................................................................................................10
Idea Summary:.....................................................................................................................................11
Product Description:............................................................................................................................11
View of the Product:........................................................................................................................11
Availability of the Product:..............................................................................................................12
Features...........................................................................................................................................12
Functionality:...................................................................................................................................12
Price:................................................................................................................................................13
Technology:.....................................................................................................................................13
Market Identification...........................................................................................................................13
Purchasing Power:...........................................................................................................................14
Idea Evaluation:...................................................................................................................................15
Force Field Analysis:........................................................................................................................15
Before Improvement:..................................................................................................................15
After Improvement:.....................................................................................................................15
FFA Result:.......................................................................................................................................16
STICKING DOTS:...............................................................................................................................16
Conclusion:..........................................................................................................................................17
References...........................................................................................................................................18
Asia Pacific University Page 2
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
Executive SummaryBio-Home is a company that works on making use of technology for the improvement of the
home security. Therefore a product is designed by the Bio-Home company for alerting the
residents staying in a house, condominium, apartment etc. The Bio-Home company was
made on a contract with governmental seismic centers and later they established a standalone
company and now making new products to reduce robberies, thefts etc. The new product
introduced is “Bio-Home Security System”.
IntroductionHome security systems have been changing over time and in the near future people will not
have to carry a bunch of metal keys or key cards as smart home systems with facial
recognition technology will recognize residents as soon as they arrive at their front door.
Once users register their biometric data (the requirement would be the face and the
fingerprint), which takes under 10 seconds, they will be able to authenticate themselves at
any point thereafter in less than a second. The device’s software keeps up-to-date biometric
data on users, while any slight alterations, such as weight gain, will not impact the
recognition rate.
Problem Statement
Misplacement of Tools: Tools such as keys or access cards can easily be lost as
human tend to forget things where they go or there is a chance of getting robbed while
people are coming back from their destinations.
Using passwords for security that are easily guessed or well-known is a
reckless habit. If the password is easy enough that any acquaintance can guess
it, then obviously it can be easily hacked or an authorized person can have
access.
Buying and installing security products that aren’t compatible or
effective together is a bad practice that may compromise the security entirely.
Asia Pacific University Page 3
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
A tracking security camera may disrupt a motion detector; placing two pieces
of equipment near each other might result in electromagnetic interference,
which could disrupt either piece’s function.
Improperly calibrated and poorly maintained equipment is another common
failure of home security. In order to avoid the dreaded false alarm, many people
calibrate their equipment too leniently. Alternatively, equipment can fall into disrepair
and become useless. Motion sensors, for example, are often programmed to exclude a
few feet of crawling room so that pets cannot trigger an alarm; criminals are
frequently aware of this.
Competitor Analysis
FIVEGT “UFACEKEY” facial recognition-based home security device
(Figure 01: UFACEKEY Device)
Jeong Gyu-taek, chief executive of start-up FiveGt, which produces facial recognition
devices, is a South Korean tech pioneer who wants to keep the home safe and secure through
biometric technology. “Ufacekey, a facial recognition device designed for home automation
systems is intuitive, fast and precise and FiveGT also tried to make the gadget read the users’
minds,” said Jeong, who worked for 30 years at the Korean unit of Tyco International, a
Asia Pacific University Page 4
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
security systems firm headquartered in Ireland, before establishing the start-up in 2012.The
facial scanner can tell the difference between identical twins and recognize users with or
without glasses.Equipped with an infrared camera. The CEO referred to Ufacekey as a social
Internet of Things device since it not only connects things with users but also helps users
communicate with each other. Through Internet networks, Ufacekey can send pictures of
someone who tries to enter a home to the smartphones of the residents, who can then choose
whether to grant the person entry or call the police. Family members can also share voice or
photo messages through Ufacekey, and can check them upon entering their home.
(Figure 02: UFACEKEY Jeong Gyu-taek, CEO of FiveGT with face-recognition Device)
Asia Pacific University Page 5
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
Bio Home Security System Vs Ufacekey
(Table 01: Bio Home Security System vs Ufacekey)
Product Name Bio Home Security System Ufacekey
Company Name BIO-HOME Security
System
FIVEGT
Product/System
Screen/Photo
Features Provides
Complete security
Face Recognition,
Fingerprint
Hard disk for storing
data
LCD comes in many
colors and different
LCD size
Water Proof
Crystal clear display
of the LCD.
Time
Provides Security Face Recognition LCD Buttons
Target Market Worldwide, based on
statistics of areas mostly
affected by the security
issues
Korea
Weakness Battery Life as 2 things
are used for security
There can be a camera issue as it can be broken or face could not be recognized due to darkness.A scar or a problem on the resident’s face is a huge factor as he/she might not be able to
Asia Pacific University Page 6
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
access it as the faces don’t match.
Pricing 350$ for each product 450$ for each product
Warranty 2 years NONE
Idea Generation:
Idea generation has many techniques and in this proposal three of them are used as mentioned
below:
(Figure 03: Bio Home Security System Idea)
Asia Pacific University Page 7
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
Concept Fan:
(Figure 04: Concept Fan)
Force Fitting Trigger:
In the force fitting trigger one needs to choose 3 pictures of 3 unique objects. The pictures
can be irregular. At that point we need to think about a couple words to identify with every
photo. At that point we need to select a couple of results of the 3 pictures by including single
word for every photo to generate new ideas.
(Table 02: Force Fitting Trigger)
Work Powerful Fast
Asia Pacific University Page 8
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
Necessary Less Failure Security
Portably Plastic and Metal Higher Accuracy
Reliability Light weight Comfortable
Portable Water Proof Good design
Outcomes Work + Powerful + Fast
Necessary + Less Failure + Security
Portably + Plastic and Metal + Higher Accuracy
Reliability + Light weight + Comfortable
Portable + Water Proof + Good design
Scamper:
Scamper is just a checklist for the idea generation that has the following table and is followed
by the product table.
(Table 03: Scamper list)
Substitute Substitute the LCD screen with a monitorCombine Combine the finger print and face recognition in a single
screen to save costAdapt Adapt to all age from old to young so all can useModify Modify if one of the system is not in usePut to other use Instead of just security purposes the camera can also be used
to recordEliminate All should be combined in one and be made a single productReverse LCD, fingerprint scanner and face recognition
Asia Pacific University Page 9
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
Idea Summary:
Based on the outcomes, a lot of many other combinations were made and it is decided that the
LCD will have a plastic body with a high quality display that has an embedded a camera and
a thumb/finger reader built on the custom operating system. Will be made available in many
countries but as a test it will be first released in the US due to technological advancements 4
outcomes are there from the force fitting trigger technique. The outcome that is chosen is the
2 one. The first one also suits but that might require high cost.
Product Description:The product description includes five key elements stated below and explained in context
with the product:
View of the Product:
(Figure 05: Product View)
Asia Pacific University Page 10
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
Availability of the Product:
The availability of the product basically depends upon the market. The market area can be
explained based on the statistics by the security issues around the world. There are 15 million
victims every year in the US in which people get robbed at their homes, apartments and then
their important documents are misused in a lot of ways. Hence the product will be released as
a test in United States only due advancement in technology and suitable environment. After
releasing the product a detailed analysis will be done on the progress of the product and is
intended to be released in Malaysia, Australia and Saudi Arabia.
Features(Table 04: Product Features)
LCD TYPE : Amoled capacitive touchscreen, 16M colors
SIZE : 5.1 inches
RESOLUTION : 1440 x 2560 pixels
PROTECTION : Aluminum body
OS Custom designed by Bio-Home Company
Vibration Only for Notification
DC POWER 12 Volt rechargeable battery plus also can be worked on
24/7 cable (direct electricity would save cost)
Fingerprint
Scanner
Custom designed by Bio-Home Company
Face
Recognition
Custom designed by Bio-Home Company
Functionality:
The Bio-Home Security System is actually a device that takes the security level for the
residents to the next level. Basically with the introduction of this product, the security level is
upgraded. The residents living in the apartment condominium or house have an option in
which they can both fingerprint and open the gate of the particular place or they can just use
face recognition and the door gets open.
Asia Pacific University Page 11
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
Price:The pricing of the product depends upon the market and basically this product is actually to
help people from sever earthquake loss. Therefore, the price should not be kept high. The
Target market for the first release in America is basically the people that affected more from
the robberies and the statistics are mentioned in the availability of the product. Therefore,
based on statistics and people the price of the product is 350 US$ and has the warranty of 2
years with a replacement policy within six months.
Technology:The technology used can be reflected easily by the features of the product. But overall the
technology used is the combination of a Face recognition, fingerprint and best quality LCD.
The collective product is linked to the most reliable seismic stations hence user can make use
of the technology in a useful way.
Market Identification(Table 05: Market Identification)
Demographic Age: All ages having the knowledge of
general computer or IT
Gender: Male
Female
Occupation/
Sectors:
House/bungalow: If any case of
robbery the system is designed in
such a way that straight away the
alarm would start ringing after a
certain number of tries by an
authorized user.
Condominium/Compound: There
are people around as it is a place
where there are many flats, blocks
and so the product would just help
in alerting the security
Asia Pacific University Page 12
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
department.
Flat: after a certain number of
wrong tried by the thief/
unauthorized person warnings
would be given and the door
would be locked unless and until
the correct person comes and
takes the access.
Geographic Countries: US (First Release)
Malaysia
Saudi Arabia
Japan
Australia
Philippine
Thailand
China
Pakistan
Areas Town
Village
Cities
Basically all areas having frequent
earthquake based on statistics
mentioned in availability.
Purchasing Power:
The price of the product is kept low as it is the start and gaining customer’s trust is the
number one priority and the other reason why the price is low is because the areas mostly
affected by these thefts/robberies is not well developed and people do not have that big
amount of income due to frequent damage to that area. Therefore all these points are kept in
mind and the price of the kept low around 300 to 400 US $.
Asia Pacific University Page 13
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
Idea Evaluation:
Force Field Analysis:
Before Improvement:
(Figure 06: Force Field before Improvement)
Asia Pacific University Page 14
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
After Improvement:
(Figure 07: Force Field After Improvement)
FFA Result:
Plastic and aluminum body is strong and durable and was accepted by the people but the
battery life was an issue therefore it improved little bit. The High cost demand was also not
attracting the customers much and was reduced to average cheap price and all these analysis
were actually done based on the statistics of the survey that helped a lot.
STICKING DOTS:(Table 06: Sticking Dots Analysis)
Attributes Bio home security system
Ufacekey
Comfort **** ****Features **** **Design *** **Benefits **** ***Safety **** ****Technology **** *****Price **** ***
Asia Pacific University Page 15
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
LEGENDS:
(Table 07: Legend For Sticking Dots)
EXCELLENT *****VERY GOOD ****GOOD ***NOT BAD **
Conclusion:
Bio home security system is made in this assignment that fulfills all the requirements for the
assignment and every criterion in the proposal is considered for the product making a perfect
product. This product is going to help people a lot specially areas that are frequently affected
by the Thefts/robberies. At least by this product people can go out without any tension as
they know how secured their home is.
Asia Pacific University Page 16
[CREATIVITY & INNOVATION] UC2F1501ITBIS [Sheroze Ali TP:031374]
ReferencesAsia, A. (2015, March 06). Home Security. Retrieved October 08, 2015, from Ave Asia:
https://aveasia.wordpress.com/2015/03/06/korean-startup-fivegt-develops-facial-recognition-based-home-security-device/
Maythew, S. (2015, March 04). Home Security. Retrieved October 08, 2015, from Bio Metric Update: http://www.biometricupdate.com/201503/korean-startup-fivegt-develops-facial-recognition-based-home-security-device
Thatcher, B. (2013, June 22). Home Security Problems. Retrieved October 07, 2015, from Backwod Survival: http://www.backwoodssurvivalblog.com/2013/06/5-most-common-problems-with-home.html
Theft, I. (2012, June). Victims. Retrieved October 12, 2015, from Identity Theft: http://www.identitytheft.info/victims.aspx
Asia Pacific University Page 17