Personal Alert and Safety System Small Business Innovation Research (SBIR) documentation. Written by CS410 Blue Team: Brittany Dufort Jonathon Szewczak Gordon Bland Braden Gibson Marcus Henry Dan Cox 10 December 2010 Table of Contents 1 – Project Summary ..................................................................................................................................... 5 2 – Problem Description ............................................................................................................................... 6 2.1 – Historical Data ...................................................................................................................................... 7 2.1.1 On and Around the Old Dominion University Campus in 20082 .................................................. 7 2.2 – Problem Characteristics ....................................................................................................................... 8 2.3 – Customer Definition ............................................................................................................................. 9 3 – Solution Description .............................................................................................................................. 10 3.1 – Objectives........................................................................................................................................... 11 3.1.1 How it works............................................................................................................................... 11 3.1.2 Goals ........................................................................................................................................... 11 3.2 – Major Functional Component and Data Flow Diagrams .................................................................... 13 3.2.1 Major Functional Component Diagram ...................................................................................... 13 3.2.2 Data Flow Diagram ..................................................................................................................... 14 3.3 – Requirements ..................................................................................................................................... 15 3.3.1 Phase 0 ....................................................................................................................................... 15 3.3.2 Phase 1 ....................................................................................................................................... 15 3.3.3 Phase 2 (Additional from Phase 1) ............................................................................................. 15 3.3.4 Phase 3 and Beyond (Additional from Phase 2) ......................................................................... 15 3.4 – Software Development ...................................................................................................................... 16 3.4.1 Milestones .................................................................................................................................. 16 3.4.1.1 Phase 0 and 1 ....................................................................................................................... 16 3.4.1.2 Phase 2 ................................................................................................................................. 16 3.4.1.3 Phase 3 and beyond ............................................................................................................ 16 3.4.2 Database Schema Diagram......................................................................................................... 17 3.4.3 Data Representation in Master Control Unit ............................................................................. 17 4 – References............................................................................................................................................. 18 5 – Appendix ............................................................................................................................................... 19 5.1 – Management Plan .............................................................................................................................. 20 2 10 December 2010 5.1.1 Program Identification ............................................................................................................... 20 5.1.1.1 Program Management Overview .......................................................................................... 20 5.1.1.2 Management Approach ........................................................................................................ 21 5.1.2 Project Outlook .......................................................................................................................... 21 5.1.3 Tool Utilization ........................................................................................................................... 21 5.1.4 Team Organization and Corporate Structure ............................................................................. 21 5.1.4.1 Phase 0 (CS410) ................................................................................................................... 22 5.1.4.2 Phase 1 (CS411) ................................................................................................................... 23 5.1.4.3 Phase 2 – Functional Prototype and Development............................................................. 25 5.1.4.4 Phase 3 – Post Production.................................................................................................... 26 5.1.4.5 Program Duration ................................................................................................................ 27 5.1.5 Progress Performance Assessment .............................................................................................. 27 5.2 – Funding Plan ....................................................................................................................................... 28 5.2.1 Phase 1 Funding ......................................................................................................................... 28 5.2.2 Phase 2 Funding ......................................................................................................................... 29 5.2.3 Phase 3 Funding ......................................................................................................................... 30 5.3 – Staffing Plan ....................................................................................................................................... 31 5.3.1 Phase 0 ....................................................................................................................................... 31 5.3.2 Phase 1 ....................................................................................................................................... 31 5.3.3 Phase 2 ....................................................................................................................................... 32 5.3.4 Phase 3 ....................................................................................................................................... 32 5.4 – Resource Plan ..................................................................................................................................... 33 5.4.1 Phase 0 ....................................................................................................................................... 33 5.4.2 Phase 1 ....................................................................................................................................... 33 5.4.3 Phase 2 ....................................................................................................................................... 33 5.5 – Risk Mitigation Plan............................................................................................................................ 34 5.5.1 Summary ..................................................................................................................................... 34 5.5.2 Risk Matrix .................................................................................................................................. 34 5.5.3 Risks and Mitigation ................................................................................................................... 34 5.5.3.1 Cost to Customer ................................................................................................................. 34 5.5.3.2 Initial Cost Outlay ................................................................................................................ 35 5.5.3.3 Radio Signal Interference ................................................................................................... 35 3 10 December 2010 5.5.3.4 High Maintenance Costs / Requirements ........................................................................... 35 5.5.3.5 PASS Fails When Triggered .................................................................................................. 36 5.5.3.6 Possible Misuse / Deviant Usage ......................................................................................... 36 5.5.3.7 FCC Regulation Prohibition.................................................................................................. 36 5.6 – Evaluation Plan................................................................................................................................... 38 5.6.1 Purpose....................................................................................................................................... 38 5.6.2 Evaluation Criteria ...................................................................................................................... 38 5.6.3 Phase 0 ....................................................................................................................................... 38 5.6.4 Phase 1 ....................................................................................................................................... 39 5.6.5 Phase 2 ....................................................................................................................................... 39 5.6.6 Phase 3 ....................................................................................................................................... 40 5.7 – Marketing Plan ................................................................................................................................... 41 5.7.1 Potential Market ........................................................................................................................ 41 5.7.2 Initial Market .............................................................................................................................. 41 5.7.3 Product Package ......................................................................................................................... 41 5.7.4 Customer Return on Investment ................................................................................................ 41 5.7.5 Team Return on Investment....................................................................................................... 42 5.8 – WBS per Phase ................................................................................................................................... 43 5.8.1. Phase 0 WBS ............................................................................................................................... 43 5.8.2 Phase 1 WBS ............................................................................................................................... 44 5.8.3 Phase 2 WBS ............................................................................................................................... 45 5.8.4 Phase 3 WBS ............................................................................................................................... 46 4 10 December 2010 1 – Project Summary In times of need, people know to call 9-1-1 for assistance. Unfortunately, calling 9-1-1 requires two things to work: a phone and a voice conversation. In the event of a personal crime (i.e. robbery or assault) the victims do not want to be fishing in their pocket or purse for a phone, or trying to place a call for fear of aggravating their assailant. Consequently, they wait until after the crime has been committed to make the call. Now imagine a system very much like the silent alarms used in banks, but small enough that it can be carried around in a pocket or purse. One push of a button on a small handheld device and a dispatch station knows that a person is trouble, where they are, and that they are in a situation where they cannot call 9-1-1 directly. The Personal Alert and Safety System (PASS) is such a system. The small device that a user would carry on their person is a device very similar to a modern vehicle’s wireless remote, known as a fob. This device is small, lightweight, unobtrusive, and easy to use. The user only needs to push a button on the fob and the alert signal is on its way to dispatch. There is no audible sound to aggravate or warn an attacker. There is no flashing light to annoy the assailant. It’s just a push of a button. The signal is carried over a network of wireless radio transceivers back to the dispatch station where it is caught, processed and presented to the dispatch personnel on duty. The alert is displayed on a map of the network area pinpointing the location of the alarm and basic vital information about the victim. Best of all, once triggered the alert will repeat itself allowing dispatch to track the progress of an alert that is in motion, until it is reset by a first responder. PASS is intended for large institutions that have a security force that can act as first responders and dispatch monitoring personnel (i.e. civil/business complexes and universities/colleges). PASS is not intended to be a substitute for any 9-1-1 system, but to be an added layer of extra personal security. 5 10 December 2010 2 – Problem Description 1. Historical Data 2. Problem Characteristics 3. Customer Definition 6 10 December 2010 2.1 – Historical Data US Department of Justice, Office of Justice Programs, Bureau of Justice Statistics1 2.1.1 On and Around the Old Dominion University Campus in 20082 10 personal crimes on campus 2 in residence halls 4 off campus 46 in the surrounding neighborhoods That averages 1 crime per week for the entire year. 7 10 December 2010 2.2 – Problem Characteristics Security professionals, public and private, often find themselves in a reactive role. A call for help comes in and they must respond as quickly as possible. Therefore by the very nature of reactive roles, the amount of time it takes a security professional to answer the call is critical. In the case of personal crimes (i.e. robbery, assault, etc.) it is even more so. In some extreme cases a savings in response time of even a single minute can mean the difference between life and death. As a result, as a society that is becoming increasingly security conscious, it is prudent to do everything possible to decrease response times. However, this is an ideal that is easier stated than accomplished. Response time is heavily dependent on a number of factors: the nature of the problem, inadequate information from the victim, the location of the event in regards to the closest first responder, and many others. It is often very difficult to isolate a single cause for the delays that response time can be subject to. PASS aims takes aim at two of the response time factors: verbal communication with responder operators and location. In existing emergency response models, a victim (or bystander) makes a telephone call to an emergency number like 9-1-1. The call is answered promptly and the victim is then required to give accurate information to the operator about the location and nature of the emergency. This call will usually be made after the incident has taken place. Sometimes the caller is in a panicked state and communication becomes difficult, thus the operators must be well-trained in communication skills in order to render the proper assistance. This model has been the standard for years and it works and yet there is always room for improvement. A properly implemented PASS system can do just that. 8 10 December 2010 2.3 – Customer Definition There are three main factors that will be considered when our target customer base is established: the size of the potential customer’s installation, the apparent need for our solution, and the ability to financially support PASS. In that regard what is looked for are large complexes set in an environment that is targeted by criminal elements. The first target customer type will be universities and colleges. These institutions are ideal for PASS because their members are prime targets of personal crimes. They are usually young men and women who may not be accustomed to paying special attention to their personal safety. The amount of acreage that these institutions cover is also ideal for PASS, since pinpointing a location could be difficult for a victim. On the financial side, universities and colleges can use the tuition and fees they charge students to offset the financial burdens of PASS. They can even declare a PASS fob as required so that most financial aid sources will help in covering the costs for the student. Also, there may be special grants and funding that the higher education institutions could apply for that would subsidize the installation of PASS. Other potential clients include large business complexes, like that of Google, Inc. or Microsoft Corporation. These businesses have a large employee base, their facilities are sprawling, and they already have security professionals on guard. They also have the financial wherewithal to easily support an implementation of PASS. Civil complexes such as those seen in Washington, D.C. would also be prime candidates. There are a vast number of people working in those buildings and areas. There are a lot of crime-ridden areas surrounding the government buildings. The cost of a large PASS system could be incorporated into the Homeland Security budget and therefore easily paid for with federal tax dollars. Finally there is one last note on potential customers. PASS implementations do not necessarily need to be used in a sprawling area. Because the location of the intrinsic transceivers will be known to the PASS control unit, PASS could easily be used in a large multi-floor office building such as Trump Tower. The owners of one of these buildings could then support the installation with proceeds from the leases they have issued to tenants. PASS is an innovative solution to a growing problem. Every large institution that covers a lot of acreage and fields its own security force could benefit from it. The safety of an institution’s members should be one of the paramount concerns for the institution’s governors; especially for those complexes that are situated in a more heavily populated and/or urban setting. 9 10 December 2010 3 – Solution Description 1. Objectives 2. Major Functional Component Diagram 3. Requirements 4. Software Development 10 10 December 2010 3.1 – Objectives A PASS implementation aims to improve response time of first responders attending a personal crime or emergency event. It does this by allowing the user to trigger a silent alarm via a small radio device. The alarm is received by the security force dispatch center and a first responder is routed to the scene. This method allows the first responders to report to the scene faster for several reasons. The use of the fob allows the victim to initiate a call for help without having to take time to look for a phone or place a call. Also, because the fob is small and unobtrusive, the call for help can be made earlier in the process of an event. As soon as a victim is accosted he/she could push a button and send an alert, thus eliminating the need to wait for the end of the event to call for help. A PASS system will triangulate a victim’s location and that information back to the dispatch station. This greatly aids in the response factor, since a dispatcher does not need to glean that information from a victim via slow verbal communication. 3.1.1 How it works A user of the system would be carrying a small radio signal emitting fob. The device would be no larger than an automobile wireless remote. It would also be capable of fitting on a user’s key ring to make it more convenient to carry. When the user presses a button – or perhaps a simple combination of buttons to avoid inadvertent trigger – the signal would be sent out. This signal would be received by multiple wireless transceivers installed strategically over the entire campus to afford the most coverage. When the first transceivers receive the signal from the fob, the transceiver’s microprocessor appends a prefix code telling the system which transceivers saw the signal first. It then retransmits the signal. The next transceiver inline sees that a prefix has been appended and then retransmits the signal again. This process continues until the signal reaches the dispatch station. At the dispatch station, a powered receiver senses the incoming signal and passes it to the Master Control Unit (MCU). The MCU is a computer server that will decode and process the signal. It will use the incoming signals to triangulate the location of the fob. Additionally, since each fob will be registered to a single user, the incoming signal can be used to pull vital statistics on the user. It will then display this information and the location to the dispatch operator via a convenient mapping graphic user interface. The dispatcher would then route the nearest first responder to the scene. Additionally, if the first responders had a computer that was linked to the same network as the dispatch station, the map data could be displayed there too. 3.1.2 Goals The following is an itemized list of goals that PASS aims to accomplish: 1. Users equipped with radio transmitter fobs. 2. Wireless Transceivers installed in the most strategic locations to give maximum coverage. 3. Transceivers relay received alert signals to dispatch station. 11 10 December 2010 4. MCU uses specialized software to process signal and display location in custom graphic user interface. 5. Allow graphic user interface to be viewed in first responder vehicles (if so equipped). 12 10 December 2010 3.2 – Major Functional Component and Data Flow Diagrams 3.2.1 Major Functional Component Diagram Through a series of transceivers that signal would be translated to dispatch. The signal will be received by a control unit / server. From there a graphic user interface will display the location of the emergency beacon on a map. Once activated the fob would automatically repeat its broadcast until reset by responders. When a fob button(s) is pushed a signal would be sent out. Dispatch would route a responder at a high priority to assess the situation. 13 10 December 2010 3.2.2 Data Flow Diagram 14 10 December 2010 3.3 – Requirements 3.3.1 Phase 0 1. Staffing 3.3.2 Phase 1 1. Facilities (ODU) 2. Equipment (ODU) 3. Prototype Hardware 3.3.3 Phase 2 (Additional from Phase 1) 1. Facilities: (2,000 square foot facility) 2. Equipment 3. System Hardware to complete first commercial implementation 3.3.4 Phase 3 and Beyond (Additional from Phase 2) 1. Marketing 15 10 December 2010 3.4 – Software Development 3.4.1 Milestones 3.4.1.1 Phase 0 and 1 1. Prototype GUI 2. Base Software 3. Transceiver Software 4. Fob software 5. Database 6. Drivers 3.4.1.2 Phase 2 1. Develop GUI a. Menus b. Map Display c. Database View d. Develop Color Scheme and Layout 2. Develop Base Software a. Develop Software to Receive signal from key fob b. Develop Software to send signal from fob to base Station c. Develop Triangulation Algorithm d. Develop map implementation from given location 3. Develop Database 4. Develop Drivers 3.4.1.3 Phase 3 and beyond 1. Update software based on location/Organization 2. Basic Updates for bugs/fixes [Left blank] 16 10 December 2010 3.4.2 Database Schema Diagram 3.4.3 Data Representation in Master Control Unit 17 10 December 2010 4 – References 1. U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. "Criminal Victimization in the United States, 2007 Statistical Tables" Page 115, Table 107. "Percent distribution of incidents where police came to the victim, by police response time and type of crime" Verified on 11 December 2010. http://bjs.ojp.usdoj.gov/content/pub/pdf/cvus07.pdf 2. ODU Police Department. "Crime Statistics" Verified on 11 December 2010 (http://www.odu.edu/af/police/crimes/statistics.shtml) 18 10 December 2010 5 – Appendix 1. Management plan 2. Funding plan 3. Resource plan 4. Risk mitigation plan 5. Evaluation plan 6. Marketing plan 7. WBS per phase 19 10 December 2010 5.1 – Management Plan 5.1.1 Program Identification The purpose of this Program Management Plan (PMP) is to identify key elements of the CS410 Blue Team Project. The project deliverable is the Personal Alert and Safety System (PASS) hardware, software and documentation. The PASS team is responsible for the integration, acceptance testing, and maintenance of the product. 5.1.1.1 Program Management Overview Program execution will be performed according to the standards developed by several PASS project specification documents. These documents are identified as the following: Funding Plan, Staffing Plan, Resource Plan, Risk Mitigation Plan, Evaluation Plan, and Marketing Plan. Funding Plan Staffing Plan Resource Plan Management Plan Risk Mitigation Plan Evalution Plan Marketing Plan Figure. 1 - Project Specification Document Hierarchy This Program Management Plan describes the management philosophy, program organization, schedule, and major milestones that serve as the guide for execution of the Program. The PMP also provides the customer with the information needed to monitor and evaluate the progress of PASS. This plan provides the following information: 20 10 December 2010 Corporate Organization during Phases 0-3 Program Team Organization with Areas of Responsibility Detailed Program Schedule and Milestones Work Breakdown Structure 5.1.1.2 Management Approach The project manager (PM) is responsible for all Program-related decisions and commitments with approval, as required, from the Corporate Management Team (Gene Price). A key element of PASS’s program management approach is customer involvement. We encourage the customer to retain an active role in monitoring the progress of all aspects of the program. The customer is encouraged to discuss technical details directly with members of the development team, provide planning and schedule recommendations, and assist in resolution of technical and programmatic issues. In order to facilitate customer involvement, PASS staff will provide access to program information including, but not limited to: 5.1.2 Program Plans and Schedules Program Status Formal Review Material Action Items System Drawings and Documentation Project Outlook The goal of PASS is to provide a solution to the problem: in the event of a personal crime or emergency, security professionals at higher education, business and civil complexes need an effective way to allow individuals to quickly and silently communicate their location to first responders. The PASS solution is a key fob that individuals would be equipped with that when pressed, would trigger an alert at a security dispatch center. The alert would be repeated every 30 seconds until first responders reset the unit, creating fast, efficient service to individuals in distress. 5.1.3 Tool Utilization PASS team members will primarily use recitation meetings to collaborate and communicate ideas. Google Chat and e-mail will be used to supplement in sharing and storing ideas and documents. 5.1.4 Team Organization and Corporate Structure The PASS Corporation formed in August of 2010 and its members made a commitment to quality innovation and production. The following sections outline the PASS Corporate organizational structure and member responsibilities during the different phases of the project. [Left blank] 21 10 December 2010 5.1.4.1 Phase 0 (CS410) Among the tasks, phase 0 of the project includes the problem identification and analysis, consultation with a domain expert, preparation of business plans. According to those tasks, the team consists of the following specialists: Gene Price General Manager Brittany Dufort Project Manager Marcus Henry Jon Szewczak Hardware Development, Financial Specialist Hardware Development, Financial Specialist Daniel Cox Assistant Manager, Web Developer Braden Gibson Software Development, Public Outreach Ray Bland Database Specialist, Public Outreach Figure 2. Phase 0 Organization Chart Staff Listing/Skills: Brittany Dufort: Project Manager The project manager maintains and monitors the working schedule of employees. It will be their duty to make sure that deadlines are met by both outside staff as well as our internal team. Marcus Henry: Hardware Development, Financial Specialist The hardware engineer will decide what components are possible in our key fob as well as what other devices will be needed to setup our nebula of tracking information. Jon Szewczak: Hardware Development, Financial Specialist 22 10 December 2010 The hardware engineer will decide what components are possible in our key fob as well as what other devices will be needed to setup our nebula of tracking information. Daniel Cox: Assistant Manager, Web Developer The Web developer will work with the Google API and ensuring that our software and website interact in a reasonable fashion. Braden Gibson: Software Development, Public Outreach The software developers will create a Graphical User Interface that will be used by dispatch to help locate users in distress. The Marketing Specialist will design, create, and deliver marketing programs to support expansion and growth of the company services and product Ray Bland: Database Specialist, Public Outreach The Database expert will plan out how are system will interact with the clients databases, providing us with a means to set up our key fob system and network. The Marketing Specialist will design, create, and deliver marketing programs to support expansion and growth of the company services and product. 5.1.4.2 Phase 1 (CS411) Phase 1 will begin prototype design and development, along with continuation of funding and technical writing. The following specialists will be included to the existing Phase 0 staff: Network Expert, Emergency Consultant. [Left blank] 23 10 December 2010 Gene Price General Manager Brittany Dufort Project Manager Marcus Henry Jon Szewczak Hardware Development, Financial Specialist Hardware Development, Financial Specialist Braden Gibson Daniel Cox Assistant Manager, Web Developer Ray Bland Database Specialist, Public Outreach Software Development, Public Outreach Network Expert Emergency Consultant Figure 3. Phase 1 Organization Chart Phase 1 Increased Staff Listing: Network Expert The network consultant works with staff members to provide reliable and optimal performance of network architecture. Emergency Consultant The emergency consultant will provide insight on dispatch procedures, and emergency personnel response protocols. 24 10 December 2010 5.1.4.3 Phase 2 – Functional Prototype and Development During phase 2, when the actual product is developed from the previously built prototype, the team is increased with the following additional specialists: Tech Support and Outreach Assistant. Gene Price General Manager Brittany Dufort Project Manager Marcus Henry Jon Szewczak Hardware Development, Financial Specialist Hardware Development, Financial Specialist Assistant Manager, Web Developer Software Development, Public Outreach Network Expert Tech Support Emergency Consultant Daniel Cox Braden Gibson Ray Bland Database Specialist, Public Outreach Outreach Assistant Figure 4. Phase 2 Organization Chart Phase 2 Increased Staff Listing: Tech Support: Personnel are necessary to facilitate support roles and help solve user problems and frustrations. Outreach Assistant: Personnel facilitate all inter-office communication necessary for outreach and public relations operations. The assistant would help communicate all current and future goals as they apply to the work schedule. 25 10 December 2010 5.1.4.4 Phase 3 – Post Production To begin mass production of the PASS, additional staff will need to be acquired, in the following capacities: Accounting Specialist and Administrative Assistant. Gene Price General Manager Brittany Dufort Administrative Assistant Accounting Specialist Braden Gibson Ray Bland Project Manager Marcus Henry Jon Szewczak Hardware Development, Financial Specialist Hardware Development, Financial Specialist Assistant Manager, Web Developer Software Development, Public Outreach Communicatio n Expert Network Expert Tech Support Emergency Consultant Daniel Cox Database Specialist, Public Outreach Outreach Assistant Figure 3. Phase 3 Organization Chart Phase 3 Increased Staff Listing: Accounting Specialist: Responsibilities include: development, maintenance, and enhancement of current and future fiscal procedures. Administrative Assistant: Responsibilities include: inter-office communication, contacting of necessary personnel per job requirements. 26 10 December 2010 5.1.4.5 Program Duration The PASS program is a 3 year project. The first prototype deliverable will be produced by May 2011 in Phase 1 of the project. Subsequent releases of the prototype will be produced in accordance with client requests. 5.1.5 Progress Performance Assessment All PASS Team members will participate in progress reporting and team management. PASS staff will track technical and financial progress of the program, and meetings will be held monthly or as mutually agreeable the project manager and customer to discuss: Report on progress to date Present work to be performed during the next month Present status of all deliverables and review planned delivery dates Discuss technical or programmatic issues as necessary. In preparation for the meetings the PASS Project Manager will collect the current status data on relevant on-going activities, progress against schedule and budget, and planned activity for the next reporting period. Quality reviews of all program documentation and procedures will be held periodically. In particular, the quality program will be involved with program deliveries and milestones and will work off of the master program schedule laid out by the work breakdown structure. Following are the details of the project milestones and the work breakdown structure. 27 10 December 2010 5.2 – Funding Plan 5.2.1 Phase 1 Funding Phase 1 Staffing Position Number of Employees Hourly Rate Hours Needed Cost Loaded (Cost + 40%) Project Manager 1 $55.00 800 $44,000 $61,600 Software Developer 2 $20.00 840 $33,600 $47,040 Documentation Specialist 1 $15.00 792 $11,880 $16,632 Hardware Engineer 1 $30.00 288 $8,640 $12,096 Network Consultant 1 $40.00 240 $9,600 $13,440 Database Expert 1 $40.00 56 $2,240 $3,136 Web Developer 1 $40.00 72 $2,880 $4,032 Marketing Specialist 1 $20.00 648 $12,960 $18,144 Totals 9 $125,800 $176,120 Phase 1 Budget Staffing $176,120.00 Facilities $0.00 Equipment $0.00 Other $100.00 Totals $176,220.00 28 10 December 2010 5.2.2 Phase 2 Funding Phase 2 Staffing Number of Employees Position Hourly Rate Hours Needed Cost Loaded (Cost + 40%) Project Manager 1 $55.00 704 $38,720 $54,208 Software Developers 4 $20.00 176 $14,080 $19,712 Documentation Specialist 1 $15.00 704 $10,560 $14,784 Hardware Engineers 3 $30.00 704 $63,360 $88,704 Network Engineer 2 $40.00 704 $56,320 $78,848 Database Expert 1 $40.00 176 $7,040 $9,856 Web Developers 2 $40.00 176 $14,080 $19,712 Financial Experts 1 $40.00 176 $7,040 $9,856 Marketing Specialists 1 $20.00 704 $14,080 $19,712 $225,280 $315,392 Totals 16 Phase 2 Budget Staffing $315,392.00 Facilities $27,000.00 Equipment $30,000.00 Other $430,000.00 Totals $802,392.00 29 10 December 2010 5.2.3 Phase 3 Funding Phase 3 Staffing Position Number of Employees Hourly Rate Hours Needed Cost Loaded (Cost + 40%) Project Manager 1 $55.00 720 $39,600 $55,440 Software Engineers 3 $20.00 176 $10,560 $14,784 Web Developers 2 $40.00 176 $14,080 $19,712 Database Expert 1 $40.00 176 $7,040 $9,856 Network Engineer 2 $40.00 704 $56,320 $78,848 Hardware Engineers 3 $30.00 704 $63,360 $88,704 Financial Experts 1 $40.00 176 $7,040 $9,856 Documentation Specialist 1 $15.00 704 $10,560 $14,784 Marketing Specialists 1 $20.00 704 $14,080 $19,712 Technicians 10 $15.00 704 $105,600 $147,840 Totals 25 $328,240 $459,536 Phase 3 Budget Staffing $459,536.00 Facilities $0.00 Equipment $0.00 Other $10,000.00 Totals $469,536.00 30 10 December 2010 5.3 – Staffing Plan 5.3.1 Phase 0 Staff Brittany Dufort: Project Manager The project manager maintains and monitors the working schedule of employees. It will be their duty to make sure that deadlines are met by both outside staff as well as our internal team. Marcus Henry: Hardware Development, Financial Specialist The hardware engineer will decide what components are possible in our key fob as well as what other devices will be needed to setup our nebula of tracking information. Jon Szewczak: Hardware Development, Financial Specialist The hardware engineer will decide what components are possible in our key fob as well as what other devices will be needed to setup our nebula of tracking information. Daniel Cox: Assistant Manager, Web Developer The Web developer will work with the Google API and ensuring that our software and website interact in a reasonable fashion. Braden Gibson: Software Development, Public Outreach The software developers will create a Graphical User Interface that will be used by dispatch to help locate users in distress. The Marketing Specialist will design, create, and deliver marketing programs to support expansion and growth of the company services and product Ray Bland: Database Specialist, Public Outreach The Database expert will plan out how are system will interact with the clients databases, providing us with a means to set up our key fob system and network. The Marketing Specialist will design, create, and deliver marketing programs to support expansion and growth of the company services and product. 5.3.2 Phase 1 Increased Staff Network Expert The network consultant works with staff members to provide reliable and optimal performance of network architecture. 31 10 December 2010 Emergency Consultant The emergency consultant will provide insight on dispatch procedures, and emergency personnel response protocols. 5.3.3 Phase 2 Increased Staff: Tech Support: Personnel are necessary to facilitate support roles and help solve user problems and frustrations. Outreach Assistant: Personnel will facilitate all inter-office communication necessary for outreach and public relations operations. The assistant would help communicate all current and future goals as they apply to the work schedule. 5.3.4 Phase 3 Increased Staff: Accounting Specialist: Responsibilities include: development, maintenance, and enhancement of current and future fiscal procedures. Administrative Assistant: Responsibilities include: inter-office communication, contacting of necessary personnel per job requirements. 32 10 December 2010 5.4 – Resource Plan 5.4.1 Phase 0 No additional materials would be needed excluding initial staff. [See Management Plan] 5.4.2 Phase 1 Additional resources include: Prototype Hardware [See Funding Plan] Prototype Software (GUI) [See Software Development Milestones] 5.4.3 Phase 2 Additional resources include: Production Hardware [See Funding Plan] Production Software [See Software Development Milestones] Facilities 33 10 December 2010 5.5 – Risk Mitigation Plan 5.5.1 Summary This document will identify the risks that have been deemed the most detrimental to the project. There were several factors used to determine the degree of hazard of any particular risk. Each of those factors was weighted for each individual risk. Any risk that posed almost no threat to the project is not listed herein. 5.5.2 Risk Matrix Cost to Customer Very High Initial Cost Outlay Probability High Medium False Alarms Signal Interference System Maintenance Low Very Low System Abuse Very Low System Malfunction FCC Regulations Low Medium High Very High Impact Above is the risk matrix for this project. This matrix illustrates the likelihood and severity of each risk if the worst should happen and the risk prove true. Each risk will be detailed further in the next section along with any plans for mitigation. 5.5.3 Risks and Mitigation 5.5.3.1 Cost to Customer Description The cost of PASS to any customer can be summarized to be in the range of $450,000 - $500,000. This indicates that only the largest and most financially stable institutions will be interested in the system. For this reason, this risk has been deemed the largest for the PASS project. Mitigation There is not much the PASS team will be able to do to mitigate this risk except for expert marketing and financial consultations. It is the opinion of the PASS project team that targeting universities and colleges for the first round of customers holds the best possible chance of success. This is due in large part to the 34 10 December 2010 fact that universities and colleges can pass on a portion of the costs to their student body in the way of fees. Also, since the purpose of the system is to make the institution safer, there’s a good possibility that grants and special funding from the local, state, and federal government level might be available to the university or college. 5.5.3.2 Initial Cost Outlay Description PASS is a large system. The principles are simple, but the implementation is anything but. It is not unrealistic to consider that an implementation of PASS would consist of 5,000 fob devices and 10,000 transceivers. The scale is very large. As such, it will take a substantial outlay of money just for production costs. After everything is summed, it is possible that the SBIR Phase II money will not cover the costs for getting to Phase 3. Mitigation There are several ways of limiting the impact of the expenditures. The first is to find a supplier that for the components that is the most cost effective. The second is to seek additional funding from venture capitalists. However this method would probably only work once Phase 1 is complete and we have at least a working agreement with our first customer. Finally, we could partner with a larger firm that has greater resources at its disposal. 5.5.3.3 Radio Signal Interference Description Since PASS will utilize well known and extensively used frequency bandwidths as laid out by FCC guidelines, there is a possibility that common wireless devices such as cordless phones, wireless home networks, and 2-way radios will interfere with the PASS network. There are two ways that interference can cause trouble for PASS. The first is that an unauthorized device triggers an alert signal. The other is that another device inhibits the broadcasting (jamming) of the alert signal to the control unit / server. Mitigation To solve the problem of another device triggering an alert we will use software controls in the control unit / server that will make sure that the received signal is from an authorized fob. To solve the jamming issue we will rely on two principles: the first is that the alert signal is repeated until the fob unit is reset by first responders; and the second is that fob should not be the only method a victim uses to call for help (i.e. 9-1-1). 5.5.3.4 High Maintenance Costs / Requirements Description PASS uses thousands of transceivers in its network of devices. Each of these devices will require some maintenance (i.e. battery replacement). Maintaining these devices will be no small undertaking (in time and resources) for the customers. 35 10 December 2010 Mitigation The project team will make every effort to make the transceivers as maintenance free as possible. One way of doing this is to make available a solar powered option. This will greatly reduce the need for battery maintenance (the number one maintenance concern). Another way is to use rugged enclosures that are impervious to most normal-extreme weather conditions. 5.5.3.5 PASS Fails When Triggered Description There is a danger in any technological solution that when it is needed the most that it fails. It is possible, although unlikely, that if a victim triggers an alert via their fob, that the device does not trigger an alert at dispatch. Mitigation It should be made abundantly clear on all packaging, contracts, and all other documentation that PASS is not a substitute for dialing 9-1-1 during an emergency. As such, a victim should never solely rely on the device. A phone call to 9-1-1 should be made as soon as it is possible after triggering the alert via fob. 5.5.3.6 Possible Misuse / Deviant Usage Description There were a couple of scenarios that the project team came up with which could be an issue if they were not accounted for. The first is that a lost fob device could be used to trigger false alarms that draw first responders away from the real incident location. The second is that an alert signal could be triggered as part of a prank. Mitigation It has already been discussed that the control unit / server will have software that will verify that a signal is from an authorized device. So if a user reports that a device is lost or stolen then the authorities can mark that device as unauthorized and then any signals emanating from that device will be ignored by PASS. Also, to act as a deterrent for triggering false alarms as part of a prank, the institution could and should enact policies that make the misuse of the fobs costly to the user. Also, in a university or college setting, the proper usage of the device could be made part of the honor code which affects every student and their privilege to attend the institution. 5.5.3.7 FCC Regulation Prohibition Description There is a small chance that Federal Communications Commission (FCC) regulations will prohibit large radio frequency networks such as PASS across the frequency ranges that we have determined as optimal. Also there is a chance that permits and/or license may be required for the implementation of PASS. 36 10 December 2010 Mitigation The project team will work closely with FCC representatives to ensure that PASS meets all regulations for a large wireless network in the desired frequency ranges. If permits / licenses are required for the customer implementation, then the PASS team should act as a facilitating agent for the customer in obtaining the correct licenses / permits. 37 10 December 2010 5.6 – Evaluation Plan 5.6.1 Purpose This document is the Evaluation Plan for the PASS Project. The purpose of the plan is to describe the goals and points at which project milestones can be considered achieved. Each phase of a workbreakdown schedule is considered using select criteria in grading the performance during each step. 5.6.2 Evaluation Criteria The evaluation of the phases of the project can be broken down into the following three categories: 5.6.3 Financial Marketing Deliverables Phase 0 Phase 0 is unique in that it represents the starting and planning point for the later phases. During this phase, the initial framework is considered and outlined. Because of its position, two extra grading criteria are added as part of this phase that represents the seed idea and the finalization of the workbreakdown schedule and thus the beginning of Phase One. Phase 0 is evaluated using the following categories: Defining Problem and Solution The problem and the solution defining can be said to be completed when the problem statement is confirmed by the professor and the proposed solution has been reviewed and discussed by student peers. Marketing (Feasibility) The marketing stage of phase zero, the feasibility category, can be said to be completed upon the delivering of the second presentation which covers information that satisfies that subject area. Deliverables (Milestones) Upon the completion of the final presentation, the fourth one, this category can said to be satisfactory achieved. The fourth presentation includes information that would have been presented in the other three presentations as well as the defining and demonstration of a workbreakdown schedule that has set milestones for the project to accomplish (i.e. the next phases of the project). Final Approval (Website) The last category is only achieved at the professor’s grading period. Upon submission of the website, for review, and after the final presentation has been given, a grade is assigned to the team members. This grade signifies that work, of some degree, was done up to the end of phase zero and officially ends the phase. 38 10 December 2010 5.6.4 Phase 1 Phase one marks the beginning of a second semester and the official end of the initial planning. At this stage, resource requirements are considered and recorded as the first prototype of several key systems are designed and implemented, at least preliminarily. Phase 1 is evaluated using the following categories: Financial (system requirements) This category deals primarily with the generation of requirements and the documentation of said requirements. It is said to be completed once the initial grading period or presentation is accomplished. Additional considerations of SBIR and other funding are finalized during this category as well. Marketing Since the project is targeted at ODU and other large campuses, this category would not be accomplished until either officials representing campus that fit the target market are met with and a discussion takes place, or sufficient market research is done to point to other alternative target markets. Deliverables (Prototype Hardware and Software; Testing) The closing category of phase one is the development of prototype hardware, software and the testing of the combination of the two. Once the requirements are met upon the completion of the system requirement category, the results of the documentation and research can be used to generate the design of models of either the whole system or parts of it. These example system can then be tested to find the ideally values for phase two. 5.6.5 Phase 2 Phase 2 is the culmination of the two previous stages. The planning and documentation of resource requirements are used here to finalize the design of each area that will then be used in the final phase as the full production. Phase 2 is evaluated using the following categories: Financial Using information gleamed from the phase one funding cycle, the project would proceed into getting funding for this phase of development. Achievement of this goal would entail the filling out and submitting of the necessary forms. Marketing This category can be marked as achieved only when a formal agreement or introduction of new markets are recorded. As this phase represents the end of all major designing, the markets and customers will need to be rather specific and known by this point. Deliverables (Hardware and Software Design; Documentation) By the end of this phase, all designs and the majority of documentation should be finished. 39 10 December 2010 During this phase, all designs will be corrected and planned for mass production from the values that were taken from the testing stage part of phase one. Upon the competition of this step, the product will be ready for mass production. 5.6.6 Phase 3 Phase 3 represents the summation and culmination of all work done previously. From the planning to the designs, all work is combined and is finally put into large scale practice. This phase marks the end of the beginning for a company or production of a product and the beginning of the product being put into the hands of consumers. Phase 3 is evaluated using the following categories: Financial For Phase 3, the fiscal responsibilities consist of analyzing the budget and, if needed, seeking additional funding of even investors before the push of mass producing the final product. Before additional funding can be accessed, all other funding specific to each phase must be either used or otherwise marked. Marketing Similar to Phase 2, the marketing should be a known item by the point. At least one customer should be lined up with others in talks or about to be contacted. Deliverables (Ordering Hardware and Software; Documentation) Mass production happens here. Due to the large number of radio devices needed, our project will be outsourcing most of actual building of the devices to other companies or services. All finalizations to software installers and documentation will also be accomplished in this step. 40 10 December 2010 5.7 – Marketing Plan 5.7.1 Potential Market The Personal Alert and Safety System (PASS) has a very broad marketability. PASS may be marketed to a variety of institutions and businesses where safety in densely populated areas is paramount. Though universities are the initial market, business buildings, complexes, correctional facilities, government buildings, hospitals, and public schools are all appropriate customers. 5.7.2 Initial Market The initial market of the PASS is Old Dominion University (ODU). ODU’s campus is set in an urban area with a high crime rate. Though the university strives to better protect their students and faculty, safety has had little improvement even with their implementation of a private police force. Furthermore, it appears ODU has reached the limit where more police will not necessarily provide a safer environment, while costs continue to increase. PASS will allow the current police force to better protect the campus via geo-location data to pinpoint where problems arise more rapidly then what their current model provides. Marketing of the product will be simplified with ODU as the first customer. Statistics from this first implementation will be proof of the effectiveness of the product. Universities are continually looking for new ways to protect the students and faculty, thus this system will spread much by word of mouth, news, and promotional packages. A demonstration may also be setup once more funding is achieved. 5.7.3 Product Package A base package for PASS will include installation and support, survey of the complex for recommended transceiver locations, 5,000 transceivers, 3,000 fobs, a master receiver, and all necessary software. This base package costs approximately $300,000; however, some complexes may require additional components. For larger complexes, or complexes with more patrons, additional transceivers and fobs may be purchased. 5.7.4 Customer Return on Investment PASS is not meant to necessarily be monetarily profitable to the customer, but instead the return is safety. The question instead becomes sustainability, and for ODU it is very achievable. Once the transceivers are in place on the campus, only new fobs need to be replaced every so often. The solution for universities, like ODU, is to add the cost of the fob into the housing rates for on-campus living. Concerned parents typically will not mind a small fee for the safety of their children, and over time, it will provide funding for more units to be purchased. As to not upset those who live off-campus, units could be purchased optionally. For ODU, where many students live a few streets off-campus where the crime rate is high, this may be of interest them. 41 10 December 2010 5.7.5 Team Return on Investment The PASS team’s expected return on investment is expected to start off slow to gain market through real-world use. The key is to produce the product with as little overhead as possible and a narrow profit margin to continually improve the product. Once the product has been established with a strong market, more profit will be made from new installations, upgrades, technical support, and replacement components such as the fobs. The product will become profitable upon the fifth sale with maintenance and support. At this point we estimate the team will have spent approximately $2.47 million dollars and will have produced at least $2.50 million dollars. 42 10 December 2010 5.8 – WBS per Phase 5.8.1. Phase 0 WBS Name PHASE 0 (Conceptual Design) Define Project Members Define Problem & Identify Solution Define Problem Define Solution Present Project Definition Feasibility Define Risks Build ROM Cost Projection Build History Study Develop Prelim Hardware Requirements Develop Prelim Software Requirements Present Feasibility Analysis Milestone Define Risk Mitigation Financial Analysis Management Plan Work Breakdown Schedules Define Hardware Milestones Define Software Milestones Present Milestone Analysis Final Approval Prepare Present Website Stand Up Project Wiki Stand Up External Project Website Populate External Project Website End PHASE 0 Duration 74 days 1 day 36 days 6 days 31 days 1 day 8 days 6 days 6 days 6 days 6 days 6 days 1 day 8 days 8 days 8 days 8 days 8 days 8 days 8 days 1 day 22 days 21 days 1 day 68 days 2 days 5 days 34 days 0 days Start 9/6/2010 9/6/2010 9/6/2010 9/6/2010 9/13/2010 10/25/2010 10/25/2010 10/25/2010 10/25/2010 10/25/2010 10/25/2010 10/25/2010 11/3/2010 11/4/2010 11/4/2010 11/4/2010 11/4/2010 11/4/2010 11/4/2010 11/4/2010 11/15/2010 11/16/2010 11/16/2010 12/15/2010 9/13/2010 9/18/2010 10/26/2010 10/31/2010 12/17/2010 Finish Level 12/17/2010 1 9/6/2010 2 10/25/2010 2 9/13/2010 3 10/24/2010 3 10/25/2010 3 11/3/2010 2 11/1/2010 3 11/1/2010 3 11/1/2010 3 11/1/2010 3 11/1/2010 3 11/3/2010 3 11/15/2010 2 11/14/2010 3 11/14/2010 3 11/14/2010 3 11/14/2010 3 11/14/2010 3 11/14/2010 3 11/15/2010 3 12/15/2010 2 12/14/2010 3 12/15/2010 3 12/15/2010 2 9/20/2010 3 10/30/2010 3 12/15/2010 3 12/17/2010 2 43 10 December 2010 5.8.2 Phase 1 WBS ID Name 30 PHASE 1 (Preliminary Design) 31 Define System Requirements 32 Hardware Requirements 33 Software Requirements 34 Support Requirements 35 Generate Requirements Documentation 36 Marketing 37 Approach ODU 38 Assess Further Possible Customers 39 Financials 40 Define Budget Requirements 41 Seek SBIR Funding (Phase 1) 42 Prototype 43 Acquire Test Hardware 44 Hardware 45 Create Unique KeyFob Address(es) 46 Modifying Transceivers for Task 47 Modify Master Receiver for Task 48 Software 49 Graphic User Interface 50 Database 51 Hardware Driver 52 Triangulation 53 Testing 54 Signal Strength of KeyFobs 55 Testing at Various Locations 56 Ensure Location Algorithm Correctness 57 GUI and Database Functionality 58 Test Result Analysis 59 Presentation of Prototype 60 End PHASE 1 Duration 100 days 11 days 6 days 6 days 6 days 6 days 81 days 81 days 81 days 14 days 3 days 11 days 76 days 2 days 11 days 4 days 4 days 3 days 35 days 35 days 35 days 21 days 35 days 30 days 3 days 4 days 7 days 7 days 22 days 1 day 1 day Start 1/3/2011 1/4/2011 1/5/2011 1/6/2011 1/7/2011 1/10/2011 1/10/2011 1/10/2011 1/10/2011 1/10/2011 1/10/2011 1/13/2011 1/28/2011 1/28/2011 2/1/2011 2/1/2011 2/7/2011 2/11/2011 2/1/2011 2/1/2011 2/1/2011 2/1/2011 2/1/2011 3/21/2011 3/21/2011 3/23/2011 3/23/2011 3/23/2011 4/1/2011 5/13/2011 5/15/2011 Finish Level 5/20/2011 1 1/17/2011 2 1/10/2011 3 1/10/2011 3 1/10/2011 3 1/17/2011 3 5/2/2011 2 5/2/2011 3 5/2/2011 3 1/27/2011 2 1/12/2011 3 1/27/2011 3 5/15/2011 2 1/31/2011 3 2/15/2011 3 2/4/2011 4 2/10/2011 4 2/15/2011 4 3/21/2011 3 3/21/2011 4 3/21/2011 4 3/1/2011 4 3/21/2011 4 5/1/2011 3 3/23/2011 4 3/28/2011 4 3/31/2011 4 3/31/2011 4 5/1/2011 4 5/13/2011 3 5/15/2011 3 44 10 December 2010 5.8.3 Phase 2 WBS ID Name 61 PHASE 2 (Detailed Design) 62 Financials 63 Budget Analysis 64 Seek SBIR Funding (Phase 2) 65 Project Team Expansion 66 Design 67 Hardware 68 Finalize Transceiver Design 69 Antenna 70 Battery 71 Enclosure 72 Finalize FOB Design 73 Button Arrangement 74 Anti-Accidental Trigger Mechanism 75 Finalize Main Receiver Design 76 Antenna 77 Battery 78 Enclosure 79 Production Drawings 80 Software 81 Finalize Graphic User Interface 82 Alert Mapping 83 Transceiver Status 84 Logging 85 Finalize Database 86 Schema 87 Technology 88 Finalize Triangulation 89 Optimize for Speed 90 Finalize Drivers 91 Fob Registration Utility 92 Testing 93 Battery Consumption 94 Rolling Frequency 95 Signal Strength 96 Duty Cycle 97 Software BETA Tests 98 Marketing Duration Start 230 days 11/15/2010 22 days 6/1/2011 22 days 6/1/2011 8 days 6/1/2011 23 days 6/1/2011 88 days 6/1/2011 88 days 6/1/2011 22 days 6/1/2011 13 days 6/1/2011 13 days 6/1/2011 9 days 6/20/2011 21 days 6/1/2011 7 days 6/1/2011 14 days 6/10/2011 22 days 6/1/2011 13 days 6/1/2011 13 days 6/1/2011 9 days 6/20/2011 67 days 7/1/2011 22 days 6/1/2011 21 days 6/1/2011 21 days 6/1/2011 21 days 6/1/2011 21 days 6/1/2011 5 days 6/1/2011 5 days 6/1/2011 5 days 6/1/2011 7 days 6/1/2011 7 days 6/1/2011 14 days 6/1/2011 22 days 6/1/2011 44 days 7/1/2011 44 days 7/1/2011 3 days 7/1/2011 5 days 7/1/2011 5 days 7/1/2011 88 days 11/15/2010 66 days 7/1/2011 Finish Level 10/1/2011 1 6/30/2011 2 6/30/2011 3 6/10/2011 3 7/1/2011 2 10/1/2011 2 10/1/2011 3 6/30/2011 4 6/17/2011 5 6/17/2011 5 6/30/2011 5 6/29/2011 4 6/9/2011 5 6/29/2011 5 6/30/2011 4 6/17/2011 5 6/17/2011 5 6/30/2011 5 10/1/2011 4 6/30/2011 3 6/29/2011 4 6/29/2011 5 6/29/2011 5 6/29/2011 5 6/7/2011 4 6/7/2011 5 6/7/2011 5 6/9/2011 4 6/9/2011 5 6/20/2011 4 6/30/2011 4 8/31/2011 3 8/31/2011 4 7/5/2011 4 7/7/2011 4 7/7/2011 4 3/16/2011 4 9/30/2011 2 45 10 December 2010 99 100 101 102 103 104 5.8.4 Establish formal agreements with ODU Seek New Customers Documentation User Manual Online Help Documentation End PHASE 2 14 days 89 days 30 days 30 days 30 days 1 day 6/1/2011 6/1/2011 6/15/2011 6/15/2011 6/15/2011 10/1/2011 6/20/2011 10/1/2011 7/26/2011 7/26/2011 7/26/2011 10/1/2011 3 3 2 3 3 2 Phase 3 WBS ID Name 105 PHASE 3 (Operational Production) 106 Financials 107 Budget Analysis 108 Seek Funding 109 Project Team Expansion 110 Hardware Order (Out Sourced) 111 Choose Manufacturer 112 Issue Manufacturing Order 113 Scout Warehouse Space 114 Receive Hardware 115 Full System Test 116 Package for Shipment 117 Software Order 118 Installers 119 Marketing Establish Formal Agreements with 120 Customers 121 Seek New Customers 122 Documentation 123 Installation Guide 124 User Manual 125 Contracts 126 Finalize contract with ODU 127 Ship to Customer (ODU) 128 End PHASE 3 Duration Start 90 days 10/2/2011 22 days 10/2/2011 23 days 10/2/2011 14 days 10/2/2011 23 days 10/2/2011 80 days 10/3/2011 11 days 10/3/2011 4 days 10/17/2011 11 days 10/3/2011 23 days 11/3/2011 30 days 12/5/2011 5 days 1/16/2012 24 days 10/3/2011 24 days 10/3/2011 90 days 10/3/2011 Finish Level 2/3/2012 1 11/1/2011 2 11/1/2011 3 10/19/2011 3 11/1/2011 2 1/20/2012 2 10/17/2011 3 10/20/2011 3 10/17/2011 3 12/5/2011 3 1/13/2012 3 1/20/2012 3 11/3/2011 2 11/3/2011 3 2/3/2012 2 14 days 90 days 30 days 30 days 30 days 14 days 14 days 1 day 1 day 10/20/2011 2/3/2012 11/11/2011 11/11/2011 11/11/2011 10/20/2011 10/20/2011 2/1/2012 2/3/2012 10/3/2011 10/3/2011 10/3/2011 10/3/2011 10/3/2011 10/3/2011 10/3/2011 2/1/2012 2/3/2012 3 3 2 3 3 2 3 2 2 46