polytect security system senior design ii proposal april 20, 2006 group # 3 sheena ingram kerece...
TRANSCRIPT
![Page 1: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/1.jpg)
Polytect Security SystemPolytect Security System
Senior Design II ProposalApril 20, 2006
Group # 3Sheena Ingram
Kerece RichardsonHai Nguyen
Diego Amezquita
![Page 2: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/2.jpg)
Overview• Problem StatementProblem Statement• BackgroundBackground• ObjectivesObjectives• Intended Users and UsesIntended Users and Uses• Need/Feasibility AnalysisNeed/Feasibility Analysis• Concept DevelopmentConcept Development• StandardsStandards• Ethical ConsiderationsEthical Considerations• BudgetBudget• End Product DescriptionEnd Product Description• ConclusionConclusion
![Page 3: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/3.jpg)
Problem StatementProblem Statement
– The need for integrated sensors– Detects gas, smoke, and home invasion
(burglar alarm )– Web-Based platform – Pre-defined Actions
![Page 4: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/4.jpg)
BackgroundBackground
• Wireless Fire Alarm System (University of Connecticut)
• Portable Gas Sensor (Iowa State University)
• Speech Synthesized Temperature Sensor (University of Illinois)
![Page 5: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/5.jpg)
ObjectivesObjectives
• This system should activate an alarm
• This system should be accessible
• The device should be useful
• The system should be Marketable
• The system should be valuable
• Monitored status should be accessible remotely, private, user friendly
![Page 6: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/6.jpg)
Intended Users and UsesIntended Users and Uses
• UsersUsers
– Computer LiterateComputer Literate
• UsesUses
– monitor the status of gas and smoke monitor the status of gas and smoke concentrations, and intrusionconcentrations, and intrusion
![Page 7: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/7.jpg)
Needs / Feasibility Analysis • Needs AnalysisNeeds Analysis
– Question 1: Why is there a problem with sensors locating a Question 1: Why is there a problem with sensors locating a specific threat?specific threat?
– Question 2: Why does the threat have to be located specifically if Question 2: Why does the threat have to be located specifically if the alarm alerts the user with sound?the alarm alerts the user with sound?
– Question 3: Why is there a need to have three separate sensors Question 3: Why is there a need to have three separate sensors for one system instead of integrating them into one?for one system instead of integrating them into one?
– Question 4: Why is there a need for web-based monitoring when Question 4: Why is there a need for web-based monitoring when some systems can be monitored using a LCD panel?some systems can be monitored using a LCD panel?
– Question 5: Why is there a need for the system to control Question 5: Why is there a need for the system to control functions in the home to eliminate certain threats?functions in the home to eliminate certain threats?
![Page 8: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/8.jpg)
Feasibility AnalysisFeasibility Analysis
![Page 9: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/9.jpg)
Concept DevelopmentThe pros and cons of selections• Advantages:
– Power – Wireless– Serial– Individual connections
• Disadvantages: – Wired systems may be more costly – Cumbersome– Constant battery replacement– Signal interferance– Serial Signal Delays
![Page 10: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/10.jpg)
Standards
• ISO 7240-1– connected to control and indicating equipment
• AS/NZS 4379.2:1996 – the remote database access client, when
database language used is SQL
• ITS-90– t90 / °C = T90/K - 273.15
![Page 11: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/11.jpg)
Ethical ConsiderationsEthical Considerations • DilemmaDilemma
– unauthorized access to private information – security risk from altered information
• StakeholdersStakeholders– The stakeholders involved in this project will be the owner or
other users of the security system, hackers, and the general public.
• Determining the optionsDetermining the options – Best extreme – Worst extreme – Compromise
• Application of Ethical TheoriesApplication of Ethical Theories – Ethical egoism – Utilitarianism – Ethics of care
![Page 12: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/12.jpg)
BudgetBudgetCost Category Price
Components Max. $700
Time $15/hr * 10hr/wk * 4wk/mn * 4mn * 4people = $9600
Lab Space $400/mn * 1mn/4wk * 1wk/168hr * 15hr/wk * 4 wk/mn * 4 mn = $250
Lab Equipment $300/wk * 15hr/168hr * 4 wk/mn * 4 mn = $428
Fringe Benefit .30 * $7200 = $2880
Instructor Salary
$200/hr * 1hr/wk * 4wk/mn * 4mn = $3200
Grand Total $14178
![Page 13: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/13.jpg)
End Product DescriptionEnd Product Description• Functions
– Functional Block Diagram
![Page 14: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/14.jpg)
ConclusionConclusion
• After performing a Feasibility Analysis, Gant chart, and budget it is concluded that the project is feasible and will be accomplished within the allotted time.
![Page 15: Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita](https://reader035.vdocuments.us/reader035/viewer/2022072017/56649efd5503460f94c10bb5/html5/thumbnails/15.jpg)
Questions?