150 likes | 219 Views
Polytect Security System. Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita. Overview. Problem Statement Background Objectives Intended Users and Uses Need/Feasibility Analysis Concept Development Standards
E N D
Polytect Security System Senior Design II Proposal April 20, 2006 Group # 3 Sheena Ingram Kerece Richardson Hai Nguyen Diego Amezquita
Overview • Problem Statement • Background • Objectives • Intended Users and Uses • Need/Feasibility Analysis • Concept Development • Standards • Ethical Considerations • Budget • End Product Description • Conclusion
Problem Statement • The need for integrated sensors • Detects gas, smoke, and home invasion (burglar alarm ) • Web-Based platform • Pre-defined Actions
Background • Wireless Fire Alarm System (University of Connecticut) • Portable Gas Sensor (Iowa State University) • Speech Synthesized Temperature Sensor (University of Illinois)
Objectives • This system should activate an alarm • This system should be accessible • The device should be useful • The system should be Marketable • The system should be valuable • Monitored status should be accessible remotely, private, user friendly
Intended Users and Uses • Users • Computer Literate • Uses • monitor the status of gas and smoke concentrations, and intrusion
Needs / Feasibility Analysis • Needs Analysis • Question 1: Why is there a problem with sensors locating a specific threat? • Question 2: Why does the threat have to be located specifically if the alarm alerts the user with sound? • Question 3: Why is there a need to have three separate sensors for one system instead of integrating them into one? • Question 4: Why is there a need for web-based monitoring when some systems can be monitored using a LCD panel? • Question 5: Why is there a need for the system to control functions in the home to eliminate certain threats?
Concept Development The pros and cons of selections • Advantages: • Power • Wireless • Serial • Individual connections • Disadvantages: • Wired systems may be more costly • Cumbersome • Constant battery replacement • Signal interferance • Serial Signal Delays
Standards • ISO 7240-1 • connected to control and indicating equipment • AS/NZS 4379.2:1996 • the remote database access client, when database language used is SQL • ITS-90 • t90 / °C = T90/K - 273.15
Ethical Considerations • Dilemma • unauthorized access to private information • security risk from altered information • Stakeholders • The stakeholders involved in this project will be the owner or other users of the security system, hackers, and the general public. • Determining the options • Best extreme • Worst extreme • Compromise • Application of Ethical Theories • Ethical egoism • Utilitarianism • Ethics of care
End Product Description • Functions • Functional Block Diagram
Conclusion • After performing a Feasibility Analysis, Gant chart, and budget it is concluded that the project is feasible and will be accomplished within the allotted time.