10 Steps To a Successful IP Surveillance Installation
Smart Security System Final Proposal
1. Page | I I
Smart Security System
Ibrahim Rogers
Viktar Rybaltouski
Guriqbal Singh
Proposal Submitted In Partial Fulfillment of the
Senior Level Capstone Design Course at Penn State Harrisburg
EET419 Section 001
EE405 Section 001
Fall Semester, 2014
2. Page | I I
Abstract
This document presents the background, top-level functional design and budget for a
proposed, security systemthat is applicable in private homes and businesses. In the first section
(Introduction) of this document the History of home security systems and current applicable
technologies are described, including features of the proposed product that would differentiate
it from the market. The second section (Experimental Methodology) includes Specifications for
the system which were derived along with the constraints. Also included in this section is a Level
2 functional decomposition which shows a flow chart description of how the proposed system
operates. Section three (Project Management) includes a project management plan along with
a Gantt chart. Section four (Cost Analysis) includes a proposed budget needed for the design.
Finally section five (summary and conclusion) includes a summary of all the research and
experimental methodology, along with a conclusion for the proposed design.
3. Page | I I
TABLE OF CONTENTS
INDEX OF SYMBOLS ...................................................................................................... 4
INDEX OF FIGURES ........................................................................................................ 5
Introduction.......................................................................Error! Bookmark not defined.
Project Introduction................................................Error! Bookmark not defined.
Technical History...................................................Error! Bookmark not defined.
Technical Research................................................Error! Bookmark not defined.
Lifecycle of Similar Products ................................Error! Bookmark not defined.
Experimental Methodology...............................................Error! Bookmark not defined.
Engineering Requirements Development .............Error! Bookmark not defined.
Constraints of the System ......................................Error! Bookmark not defined.
Functional Decomposition.....................................Error! Bookmark not defined.
Project Management .........................................................Error! Bookmark not defined.
Work Breakdown...................................................Error! Bookmark not defined.
Gantt Chart.............................................................Error! Bookmark not defined.
Cost Analysis .....................................................................Error! Bookmark not defined.
Summary and Conclusion..................................................Error! Bookmark not defined.
References..........................................................................Error! Bookmark not defined.
5. Page | I I
INDEX OF FIGURES
No table of figures entries found.
[The listof figuresabove iscreatedusingWord’sTable of Figures(TOF).The benefitof usingTOFis
automaticupdate forpage numbers.Tocreate a TOF, youmust create captionsforall figures.Tocreate
a caption,highlightafigure andgo to ReferencesandInsertCaption.The dialogbox will appear.Under
Options,choose Figure anda positionof captione.g.,above afigure.UnderCaption,write acaption
e.g.,Figure 1: Figure 1 title.Afterapplyingcaptions,putcursoronthe listof figurespage,goto
ReferencesandInsertTable of Figures.UnderGeneral,choose Figure forCaptionlabel.Toupdate,right
click,selectUpdate Fieldandchoose one of the two options.]
[Youmighthave to adjust“Caption”style.Todo so, rightclick“Caption”style andchoose Modify.You
needtoadjustonlyonce]
6. Page | I I
Introduction
Project Introduction
Imagine coming home after a long day of work to a house that has been burglarized, or
going to bed at night with no sense of security and having the thought of someone breaking
into your house and possibly harming you or your family run through your mind. According to
the FBI, there were an estimated 2,103,787 burglaries in 2012, a decrease of 3.7% compared to
2011. Compared to 3.7 million household burglaries each year on average from 2003 to 2007.
In about 28% of these burglaries, a household member was present during the burglary. As you
can see the amount of burglaries has had a steady decrease in the past decade but they’re still
occurring at a very high rate. Home intrusions occur every 13 seconds in the United States. Your
chances of becoming a victim can be severely decreased by having a home security system.
Surprisingly only 17% of homes in the United States have security systems, meanwhile homes
without security systems are up to 300% more likely to be broken into. Many people choose
not to have these systems because they’re either too expensive or too complicated to use.
Others rely on the protection of having home insurance but sometimes buglers steal things that
have sentimental value and can’t be replaced. Almost all home security systems available to
consumers require monitoring by an outside party such as ADT and ESCO; these outside parties
usually charge an installation fee and a recurring monthly fee. Our design called The Smart
Security System (SSS) will allow home and business owners to monitor their homes and
businesses via their smart phones. Activating and deactivating the sensors will be done via their
smart phone wirelessly using Wi-Fi technology. This allows them to have control of the system
regardless of where they are. Our system will include a motion sensor, gas/smoke detector,
7. Page | I I
temperature sensor and built in camera. Almost all the security systems available in the market
today only come with motion detectors and the rest are sold separate at an extra cost to the
customer. With our design customers will only have the one-time cost of the device with no
installation fees or reoccurring monthly fee, this allows them to save hundreds each year. The
SSS will be more convenient and portable since every component (such as motion sensor and
camera) will be built in one device allowing customers to self-install the device.
Technical History
In recent years, home security has moved away from simple control panels and deadbolt
locks to high-tech security technologies that are composed on many homeowners’ wish lists.
Today’s security systems are not simply the product of technological developments of the past
few years, but the combination of experience and hard work throughout decades. To understand
how home security became as what it is today, we should take a look back to the past.
The increase in crime after World War I resulted in Americans becoming sensitive to
security needs and they were willing to find methods to keep themselves and their property
secured [1]. Additionally, many insurance companies stepped in, offering premium discounts to
alarm subscribers. During this time period demand for alarm systems had begun to peak and the
American telephone companies introduced emergency call systems that invited police and fire
fighting personnel into the security system era [1].
Although video surveillance technology was developed in the 1940s, it was not until the
1970s that it was used in homes as a security measure. After World War II home security
systems became less expensive and more versatile for use in 1980s [2]. Early advanced home
security systems included bulky camera that would be motorized and moved down a track to
8. Page | I I
view the outdoor of the home throughout eyeholes mounted in the front door [2]. The video
cameras transmitted rough images of visitors to a stationary television monitor that also served as
the control panel where the homeowner could remotely control the camera’s movements.
Now days, surveillance cameras are as small as one square inch and connected to the
Internet. These camera can be outfitted with powerful lenses that can capture and stream high
definition video online that can be viewed from anywhere in the world. The signal is transmitted
wirelessly to the user. Additionally, with a connected smart home, homeowners can program
their security systems to send a live video clip of an area if motion is detected when the home is
unoccupied and the alarm is activated. Some systems not only can warn you of intruders, but also
can notify authorities of a medical emergency, monitor smoke, and carbon monoxide and water
levels or pressures. Some systems also are linked into your home's wiring, heating or lighting
systems and use your mobile phone, device, or computer to control them [3].
Technical Research
Home security systems work on the simple concept of securing entry points into
a home with sensors that communicate with a control panel or command center installed in a
convenient location somewhere in the home [4]. Sensors are typically placed in doors that lead
to and from a house as well as easily accessible windows, particularly any that open, especially
those at ground level. Some systems not only can warn you of intruders, but also can notify
authorities of a medical emergency and monitor smoke and carbon monoxide levels. Some
systems can be linked into your home's wiring, heating or lighting systems and use your mobile
phone or computer to control them [3]. There are a few companies that provide the similar
9. Page | I I
features in their home security system but they require multicomponent such camera, smoke
and carbon monoxide and even a pin pad to activate and deactivate the system.
ADT and Brinks are just a few companies that provide many useful features but they
also offer separate components and you have to pay each month to keep your systemup and
running [5]. ADT provides 3 different security plans, first is a basic home security with gives you
a few good features for less cost. If you want their best features which include remote alarm
system and live video, it will cost you a lot more than the basic plan [5]. Another company that
provides home security systemis Brinks. Brinks has many useful features in their security
system but same as ADT if you want the high end security features you have to pay more [6].
Our Smart Security System offers advantages like video surveillance, a smoke detector, carbon
monoxide detector and a temperature/humidity sensor all built into one device. Also the
activation and deactivation of the systemwill be done through a mobile device or smart device.
The best thing about our system is that you don’t have to pay a monthly fee, it’s a once time
cost and total monitoring/control is done by the owner.
Lifecycle of similar products
Funlux 8ch 960h
10. Page | I I
Experimental Methodology
EngineeringRequirementsDevelopment
Planning
Requirements
& Analysis
Architecture &
Design
Development
Testing
Deployment
Maintenance
Marketing
Requirements
Engineering Requirements Justifications
11. Page | I I
The systemthat we have designed will operate off a battery or it will have backup
battery in case of an emergency. The systemthat we have designed is very efficient because it
only needs 5V maximum to power the entire system so that means we could use a 9V battery
to run our system which makes it more portable. The weight of the system will be 453 grams so
it will be able to be mounted to the ceiling. The systemwill be able to provide the user with
visual images that will be supported by all smart phones such as Android, IOS, and Windows.
The security systemwill be connected to the internet though W-FI but controlled by a smart
phone at all times.
Constraints of the system
Safety:
1,2 The systemmustbe batteryoperated. Replaceable 9v battery or
rechargeable battery to keep
cost down or connected to a
constant power source such as
an outlet.
3,6 Maximumproductlengthis13 inch
Maximumproductwidthis10 inch
Maximumproductthicknessis2 1/2 inch
Maximumproductweightis453 grams
Mounted on the ceiling.
5 Visual imageswill be inJointPhotographic
ExpertsGroup(JPEG) format.The Imageswill be
ina formatcompatible withPortableNetwork
Graphic (PNG) andWindowsBitmapFormat
(DIB).
Format that will be supported
on mobile and computer
devices
4 Device shouldbe controlledwirelesslyvia
BluetoothorWi-Fi.
Most smart phonesand
computersalreadyhave
BluetoothorWi-Fi capabilities
Marketingrequirements:
1. Must be available forpurchase of the general publicin$300-$400 range
2. Must be battery poweredorchargeable
3. Must not be greaterthan 10 x 13 inch
4. Must be able tohave full control of the system
5. Must be able toreceive visual andaudiblealerts
6. Must be able tobe mountedonthe wall orceiling
12. Page | I I
Our product will be designed as a low power device (5V max). The system will be
battery operated.
Testing:
Testing will be done in lab and in the environment with all possible conditions. The
testing will include durability, reliability and efficiency.
Cost:
The prototype will cost $135.
Timing:
The actual prototype is expected to be finished on May 1st 2015.
The system is very low powered device that will only need 5v maximum supply. To
make the system more portable, a 9V battery can be used. Most of testing will be done is a lab
but the system will be put through many tests to ensure quality of our product. The total cost of
the system is $135 and the prototype is expected to be finished by May 1st 2015.
Functional Decomposition
External device: Smart phone
Module Temperature &Humiditysensor
Input Temperature &Humiditychanges
Outputs Digital signal tothe microprocessor
Function To monitortemperature andhumiditychanges
13. Page | I I
Module Smoke sensor
Input LPG, i-butane,methane,andalcohol
Outputs Analogsignal tothe microprocessor
Function To detectgassesin the securedarea
Module CO sensor
Input CO gas
Outputs Digital signal tothe microprocessor
Function To detectexcessCOgas
Module Motionsensor
Input Passive Infrared
Outputs Digital signal tothe microprocessor
Function To detectmotion
Module Camera
Input Light
Outputs JPEG image to microprocessor
Function To take an image of securedarea
Module Microprocessor
Input Sensors,camera,andWi-Fi
Outputs Signal toWi-Fi,cameraand buzzers
Function Receive/interpretdata
Module Wi-Fi
Input Microprocessorandsmartphone
Outputs Microprocessorandsmartphone
Function Communicationbetweenmicroprocessorandsmartphone
Module Smart phone
Input Analyzeddatafrommicroprocessor,user
Outputs Commandstothe microprocessor
Function To control/manage the system
14. Page | I I
Project Management
Work Breakdown
Gantt Chart