1 / 15

Polytect Security System

Polytect Security System. Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita. Overview. Problem Statement Background Objectives Intended Users and Uses Need/Feasibility Analysis Concept Development Standards

alodie
Download Presentation

Polytect Security System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita

  2. Overview • Problem Statement • Background • Objectives • Intended Users and Uses • Need/Feasibility Analysis • Concept Development • Standards • Ethical Considerations • Budget • End Product Description • Conclusion

  3. Problem Statement • The need for integrated sensors • Detects gas, smoke, and home invasion (burglar alarm ) • Web-Based platform • Pre-defined Actions

  4. Background • Wireless Fire Alarm System (University of Connecticut) • Portable Gas Sensor (Iowa State University) • Speech Synthesized Temperature Sensor (University of Illinois)

  5. Objectives • This system should activate an alarm • This system should be accessible • The device should be useful • The system should be Marketable • The system should be valuable • Monitored status should be accessible remotely, private, user friendly

  6. Intended Users and Uses • Users • Computer Literate • Uses • monitor the status of gas and smoke concentrations, and intrusion

  7. Needs / Feasibility Analysis • Needs Analysis • Question 1: Why is there a problem with sensors locating a specific threat? • Question 2: Why does the threat have to be located specifically if the alarm alerts the user with sound? • Question 3: Why is there a need to have three separate sensors for one system instead of integrating them into one? • Question 4: Why is there a need for web-based monitoring when some systems can be monitored using a LCD panel? • Question 5: Why is there a need for the system to control functions in the home to eliminate certain threats?

  8. Feasibility Analysis

  9. Concept Development The pros and cons of selections • Advantages: • Power • Wireless • Serial • Individual connections • Disadvantages: • Wired systems may be more costly • Cumbersome • Constant battery replacement • Signal interferance • Serial Signal Delays

  10. Standards • ISO 7240-1 • connected to control and indicating equipment • AS/NZS 4379.2:1996 • the remote database access client, when database language used is SQL • ITS-90 • t90 / °C = T90/K - 273.15

  11. Ethical Considerations • Dilemma • unauthorized access to private information • security risk from altered information • Stakeholders • The stakeholders involved in this project will be the owner or other users of the security system, hackers, and the general public. • Determining the options • Best extreme • Worst extreme • Compromise • Application of Ethical Theories • Ethical egoism • Utilitarianism • Ethics of care

  12. Budget

  13. End Product Description • Functions • Functional Block Diagram

  14. Conclusion • After performing a Feasibility Analysis, Gant chart, and budget it is concluded that the project is feasible and will be accomplished within the allotted time.

  15. Questions?

More Related