A2_2_4 Project Proposal v2

advertisement
“Over Watch”
Project
Project Members: Quinn Calvert, Mike Duong, Chris
Kibler
Employer: Mr. Buchs
1/16/12
2
Contents
Problem Statement .................................................................................................................................... 4
Statement Elaboration: .............................................................................................................................. 4
Statistics .................................................................................................................................................. 4
Existing Approaches .............................................................................................................................. 4
Statement of Purpose ................................................................................................................................ 4
Executive Summary ................................................................................................................................... 5
Performance Benchmarks ........................................................................................................................ 6
MSE Concepts ............................................................................................................................................ 7
Mathematics ............................................................................................................................................ 7
Science .................................................................................................................................................... 7
Engineering ............................................................................................................................................. 7
Expert Input and Needs............................................................................................................................. 9
Past and Present Solutions .................................................................................................................... 10
Passive Infrared (PIR) Motion Sensors ............................................................................................ 10
Closed Circuit Television (CCTV) ...................................................................................................... 10
Glass Break Sensors ........................................................................................................................... 11
Magnetic Contact Sensors .................................................................................................................. 11
Infrared (IR) Camera............................................................................................................................ 12
Patents ................................................................................................................................................... 12
Market Research ...................................................................................................................................... 14
Evaluating the Competition: ................................................................................................................ 14
Users/Buyers: ....................................................................................................................................... 15
The Market: ........................................................................................................................................... 15
Gantt Chart ................................................................................................................................................ 17
3
Problem Statement
“According to the annual report by the Boise City Police in 2007, 92% of all burglaries
go unsolved throughout the residential U.S. In the past four years, this low identification
rate has been due to conventional security system's lack of a tagging method, that is, a
way of marking the intruder.”
Statement Elaboration:
Statistics




2,800,000 break-ins occur in the United States per year (1990-2010)
1-in-5 chance of being broken into per house
Only 25% of Urban break-ins are solved
30% of homes have commercial security systems
Existing Approaches



Essentially, there has not been a product which addresses this problem
Closed Circuit Television (CCTV) Systems are currently the primary source of intruder
identification.
o These lack a sufficiently successful identification rate, as is evident by the percentage of
burglaries that go unsolved.
The only other security products function are sensors that function
Statement of Purpose
“Develop a tagging system to mark intruders that is viable for use across the Residential
United States.”
4
Executive Summary
There have been 2,800,000 break-ins across the U.S. each year for the past
twenty years (1990-2010); of these break-ins, more than 90% go unsolved. This low
rate of criminal identification can be largely attributed to the lack of a sufficient tagging
method – that is, some form of mark or trace (physical or digital) which can be used to
bolster identification. That is why we here at HomeNet plan to develop a tagging
system to mark intruders which is viable for use across the residential United States.
The unique aspect of this problem is that there is virtually no existing
documentation of attempted solutions – a promising and cautionary sign. Further
research revealed that conventional security systems have a void when it comes to any
form of identification improvement, with security cameras being the only product widely
used to improve identification. The main issue with cameras is that they are extremely
unreliable – one need only to wear a mask and the benefits of a camera are almost
entirely mitigated.
Initial market research shows that there should be a sizable profit available for an
effective solution to this problem, but only if one were to sell to or partner with an
existing security provider. This is mainly because the Security Industry relies greatly on
established reputation, which current companies like ADT and Brinks embody. As such,
the ability of an up-start company attain such a reputation among this market would
require a time and capital investment far greater than is generally feasible.
5
Performance Benchmarks
The idea is that a set list of topics will be used to measure the performance of the final
solution and that these topics should be based upon what is considered important to the
solution’s success. The following are the current benchmarks being used by this
project:
 Ease of Use
o A quantitative survey of a group who volunteered to test the system might
be used to measure this.
o A 5-point scale (or similar method) would be used to rate its ease, with 5
being easiest use.
o The average score should be above a 4 (or whatever number fits the
same meaning).
o An additional feedback section may provide suggestions for design
problems that need to be addressed.
 Ease of Installation
o Essentially the same method as the ease of use, except it would be a
survey of installation crews after a simulated installation.
 Ease of Mainatainence
o Essentially the same method as the ease of use, except it would be a
survey of maintainence crews after a simulated maintainence session.
 Will it damage the residence when in use?
o A simple Yes/No check after usage testing
 Accuaracy
o # of successful tags/# of attempted tags
 Effectiveness of the tag
o Depending on the exact tag choice, this may relate to measuring the
visability, durability, etc.
 Improvement in target identification due to the tag
o This may be difficult to measure until after it has been implemented
o An experiment could be generated to simulate a home break-in, at which
point the identification of the tagging device would be compared to that of
its closest competitor, the CCTV.
o This theoretical experiment would be repeated many times in order to
generate a sufficient identification rate.
6
MSE Concepts
During the course of this design problem, we will need to research a wide variety of
Math, Science, and Engineering (MSE) Concepts related to our envisioned solution.
The current concepts are as follows:
Mathematics
 Ballistics/Trajectory
o One proposed solution involves the firing of some projectile tag, in such a
situation, it would be vital to understand the ballistics and trajectory
information behind it.
 Programming/Computer Science
o Currently, all theorized solutions will require some deal of programming to
fully realize them.
 Biometrics
o These algorithmic techniques could be used to automatically disable the
system for the home owners.
o Further understanding may allow for feasible implementation and/or
increased identification.
Science
 Chemical and Material Properties
o Will be vital in determining what tag type, assuming its physical, is best, as
well as what to build the structures out of (essentially the same as
Material/Chemical Engineering).
 Understanding of Light Properties (Especially IR, UV, and Microwave)
o Will better allow for utilization of motion sensing and other optic
technology.
 Criminology/Psychology
o Would be beneficial to know how the possible intruder’s mind works, as it
may give insight into a strategic placement of the solution, once made.
 Radioactivity
o The predictable halflife times of various radioactive isotopes may prove
useful in some form.
o Otherwise, this subject area purely relates to one proposed solution that
involves tracking radioactive tags with a greiger counter.
Engineering
 Structural
o On whatever solution we create, it must be housed in some sort of
structure that allows it to function while still rendering it protected.
7




o Knowledge of the stuctural aspects of a home may prove necessary in
certain solutions, especially when it comes to the possibility of embedding
components into the walls.
Material/Chemical Engineering
o Should we pursue a physical tag, then knowledge of what materials and
chemicals that are available to us may prove beneficial.
Electrical
o This should let us better create a modern system with efficient power
designs that accomplishes what we need.
Computer
o A computerized interface will likely be used with whatever solution we
decide upon, allowing the customization of controls for maximum ease of
the customer.
o It is likely that our solution will contain computerized components and thus
it will be necessary to understand the engineering aspects of them.
A better understanding of functionality of:
o Paintball Guns
o Servo Motors
o Target Acquisition Systems
o Security Sensors
o Biodegradable Materials
o Cell Networks
8
Expert Input and Needs
Throughout the course of this project will be seeking and will need to seek expert input
on the multitude of topics that this project will likely cover. Currently:
 Required Expert Inputs:
o Intruder Identification Methods
 Biometrics
 Police Methodology
o Security Industry Insights
o Advanced Sensor Usage/Security System Design
o Ballistics/Trajectory
 Current Expert Input
o Vague biometric knowledge
 The first experts we requested input from replied with automated
emails stating we should look at their webpage – which is why the
information is vague.
o Basic Sensor Understanding
 Also found from the websites of the contacted organizations
 This knowledge could use a great deal of improvement.
9
Past and Present Solutions
Passive Infrared (PIR) Motion Sensors
 A device that emits a beam of infrared light to a partnered sensor or sensors, and
uses this to monitor temperature.
o Some variations will phase across a region to monitor a greater area.
o The temperature differentials created by movement across multiple
sectors cause the sensor to trigger.
 The problem is that the device is only a sensor: it detects the intrusion but does
not react to it.
o If combined with other systems, it can be made more reactive to an
intrusion.
 Our tagging method would not be a replacement, but rather an addition, for a
tagging method needs to have a trigger – and a PIR is a highly affective one.
Closed Circuit Television (CCTV)
o A network of surveillance cameras linked to a central control, usually a DVR or
Computer.
 Most cameras tended to be low resolution and black/white images. Now,
trends are changing towards HD color video.
o The main issue is the necessity for a human being to review all of the footage
surrounding the crime – often multiple times – on a 1:1 relation to actual time.
 The other defect is the camera’s inability to guarantee a usable image of the
intruder.
o A tagging method would likely accompany these, but could also replace them.
 A tagging method should – hopefully – have a better success rate than
cameras and cut out or minimize the need to review video footage.
10
Glass Break Sensors
 A specialized sensor that functions in one of two ways:
o It can detect the frequency emitted by glass breaking – such as that of a
window – and thus will trigger regardless of location.
o It can also function as a device that detects the vibration of glass breaking,
but it must be placed on the window/glass.
o Some variations of this device are capable of performing both methods
simultaneously.
 The major shortcoming of this device is that it only detects an entry, nothing else.
o There is also a good chance of the acoustic sensor triggering incorrectly if
a piece of glassware is broken.
 Once again, this is a sensor – it would likely function in tandem with the tagging
method for better results.
o A tagging method solves identification, not detection.
Magnetic Contact Sensors
 These sensors are a two part device that attach to a window, door, or drawer so
that the contacts touch in the closed position. Thus, when separated, the
connection is broken and the sensor triggers.
o Can be inverted to trigger once contact is made.
 The major challenge is incorporating these into the residence while still
concealing them.
o Theoretically, a burglar who knows the location of these devices could use
a magnet to percent the sensor from triggering.
 As has been said already, this sensor would augment the tagging method and
not directly compete with it.
o The tagging method would fill a niche that is apparently vacant and would
integrate well into current systems with sensors like this – as well as many
other sensor types.
11
Infrared (IR) Camera
 Using an IR filter lenses and IR emitting LEDs, this camera is capable of
recording accurate temperature differential footage in real time, regardless of
lighting conditions.
 The IR camera does not provide perfect physical details, due to its output of a
thermal imaging spectrum.
 While technically competing with the tagging method, redundancy is a vital
aspect of the security industry.
o Thus, the tagging method would likely work in tandem with cameras to
provide better results.
Patents
1. Patent 4060039 Security System
a. Early yet not exactly effective for identification and tagging
2. Patent 3131376 Security Line Surveillance System
a. The technical base behind surveillance cameras, which are used for
identification
3. Patent 3726238 Security System
a. The basis of the modern-day security system, using sensors and a central
command unit
4. Patent 4001771 Intruder Detecting Security System
a. A basic version of the common process used by modern security systems,
as to alert not only residing people within the victimized building, but also
local authorities
5. Patent 3739703 Concealment of Cameras for Observation
a. As thieves found more ways to bypass security systems, more compact
cameras in domes real cameras, and improve the ability to identify and
catch criminals
6. Patent 6830387 Modular Security Camera System
a. The latest breakthrough in observation technology, this camera was able
to detect temperature output, and through that, observe and show the
viewer the position of criminals hidden in the dark
12
13
Market Research
Evaluating the Competition:
The strengths and weaknesses of the existing approaches used by Industry Leaders
are instrumental in determining if the problem is still unsolved:
- Generic Security Providers (ADT, First Alert, etc.)
o While there is a slight competition – our solution and these both act as
security methods – it is more likely that our solution be integrate into one
of these systems, as that is the nature of the security industry.
o The Generic Security System utilizes a variety of sensors linked to a
central control pad and accompanied by external monitoring by the
provider.
 Pros: Convenient for the homeowner to install, simple, effective at
deterrence, and requires little maintenance.
 Cons: High energy consumption, Does not improve identification,
Costly, Standardization allows criminals to develop bypass
methods.
- Surveillance Systems (Lorex, Honeywell, KemCo)
o As both our solution and these act to deter and/or prepare intruders for
identification after being apprehended.
o CCTV systems are widely used by corporations and businesses to prevent
or catch shoplifters and petty thieves. Activity is recorded with a maximum
replay time, with data being wiped on a regular basis.
 Pros: Well favored concept, Most common identification method
currently in use, Operation costs are minimal.
 Cons: Difficult for a clear image to be taken, Still lacks a real
improvement to identification, Requires long hours of revision to
notice criminal.
- Biometrics (F7, TSA, FBI, Fulcrum Biometrics, Police CSI)
o Competes on the identification basis, as both our solution and biometrics
attempt to solve or improve identification of an individual.
o Biometrics is the monitoring of unique physical characteristics for use in
identification, including: DNA, fingerprints, retinal scans, height,
complexion, gait, reaction, and general behavior.
 Pros: An augmentation to standard camera imaging systems, it
allows a system to detect and “recognize” and individual with a high
degree of certainty. Generally difficult to “fool”.
 Cons: The system needs data readily available for identification,
limiting it to repeat offenders. Expensive.
The security industry, in terms of new competitors, is largely static. The only future
competitor we are able to envision would be software security companies (Such as
Norton, AVG, or Avast), after homes become much more thoroughly integrated with
technology.
The greatest barrier for entry into this industry is its established dominance by a select
group of major companies
14
Users/Buyers:
User: One who will personally handle the system
Anticipated Users: Police, Installation crew, Residents
Buyer: A person or group who purchases product or design directly from HomeNet
Industries
Anticipated Buyer: Service provider (ADT)
HomeNet
Police
Homeowner will
contact Police as
needed, who will use
the system to help
solve break-ins
Security Provider
Installation Crew
Homeowner
The Market:
Major Company: This route includes selling the ‘Over Watch’ design to a major security
company such as ADT as a supplement to their security systems for either a continuous
fee or for an up-front free or some combination of the two. That company would then
sell the product as part of their services to a customer. An installation, construction, or
electrician team would install the product. The resident would turn the product on and
off as needed, and the police would identify the intruder after being tagged by a system.
Individual: This route includes directly selling to a resident and taking on the costs of
production and all other costs related to the produce. HomeNet would manufacture,
advertise, ship, and provide help for the product. Once sold, an installation,
construction, or electrical team would install the product. The resident would turn the
product on and off as needed, and the police would identify the intruder after being
tagged by a system.
Users: Police, Installation Crew, Residents
Buyer: Resident
Both: This route runs the other two options simultaneously.
Users: Police, Installation Crew, Residents
Buyers: Resident and Major Companies
Selection of Target Market
15
Requirement
Buyers and Users
are in the market
Able to do research
on market
Able to be done
based on
Resources
Major Company
Directly Selling
Both
YES
YES
YES
YES
YES
YES
YES
NO
NO
Selected Route
Major Company route is the only valid one out of the three options. Directly selling
would require too many resources to be a legitimate solution. Since there was a clear
best choice after the requirements identified, no more criteria or extra matrices were
needed. The best target buyer for the HomeNet “Over Watch” project is some type of
major security company (example: ADT). The target users are police, residents and
installation teams.
16
Gantt Chart
10/24/2011
12/13/2011
2/1/2012
3/22/2012
5/11/2012
Define a Problem
Brainstorming
Research Ideas
Explore Possibilities
Select an Approach
Develop a Proposal
Create/Test Prototype
Refine Design
Create Solution
Communicate Results
Communicate
Results
Start Date 11/1/2011
Duration
185.00
Create
Solution
4/1/2012
17.00
4/1/2012
Create/Test
Prototype
3/12/2012
Develop a
Proposal
3/1/2012
Select an
Approach
2/23/2012
Explore
Possibilities
2/1/2012
Research
Ideas
1/15/2012
Brainstormin
g
1/1/2012
Define a
Problem
11/1/2011
14.00
20.00
10.00
7.00
22.00
17.00
14.00
61.00
Refine Design
17
Download