+ All Categories
Home > Documents > Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline...

Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline...

Date post: 26-Sep-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
78
Economic Home Security System Uma Abu, Lucas Jedlicka, Merin Mundt, Kamini Saldanha, Sohum Sawant, Andrew Tran Senior Design Group, May 42 0
Transcript
Page 1: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Economic Home Security SystemUma Abu, Lucas Jedlicka, Merin Mundt, Kamini Saldanha, Sohum Sawant, Andrew Tran

Senior Design Group, May 42

0

Page 2: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Team Members

Lucas JedlickaDev Ops

Merin MundtFrontend

Andrew TranBackend

Uma AbuFrontend

Sohum SawantBackend

Kamini SaldanhaBackend

Page 3: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Outline

1. Problem

2. Supporting Information

3. Our solution

4. Deliverables

5. Constraints

6. Diagrams

1

7. Testing

8. Technology Stack

9. Design Considerations

10. Future Plans

11. Prototype

12. Conclusion

Page 4: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

The Problem

⚫Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

2

Page 5: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

The Problem

● Large number of crimes every year in the U.S.

2

⚫Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 6: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

The Problem

● Large number of crimes every year in the U.S.

● High cost of security systems

Top: NestBottom: Simplisafe 2

⚫Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 7: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

The Problem

● Large number of crimes every year in the U.S.

● High cost of security systems● Observation:

○ Smartphones sitting unused

Top: NestBottom: Simplisafe 2

⚫Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 8: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Motivation and Supporting Information

3

⚪Problem ⚫Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 9: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Motivation

● Need for security cameras in homes

3

⚪Problem ⚫Motivation ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 10: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Motivation

● Need for security cameras in homes○ Roughly 2.5 million burglaries a year

3

⚪Problem ⚫Motivation ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 11: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Motivation

● Need for security cameras in homes○ Roughly 2.5 million burglaries a year

■ 66% are home break-ins

3

⚪Problem ⚫Motivation ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 12: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Motivation

● Need for security cameras in homes○ Roughly 2.5 million burglaries a year

■ 66% are home break-ins■ 13% reported cases solved

Source: https://www.alarms.org/burglary-statistics/

3

⚪Problem ⚫Motivation ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 13: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Motivation

● Need for security cameras in homes○ Roughly 2.5 million burglaries a year

■ 66% are home break-ins■ 13% reported cases solved

Source: https://www.alarms.org/burglary-statistics/

● Less than 20% of unwanted smartphones are recycled a year

Source: https://www.wastecare.com/Articles/Cell_Phone_Recycling.htmSource: Paul’s Hardware - “I Have a LOT to Learn About DIY Home Surveillance.”

3

⚪Problem ⚫Motivation ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 14: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Supporting Information

Customers may pay upfront cost and monthly fees using a service

4

⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 15: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Supporting Information

Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+

4

⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 16: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Supporting Information

Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+

● Monthly costs $5-$35+

4

⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 17: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Supporting Information

Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+

● Monthly costs $5-$35+

● A popular exception is Wyze

4

⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 18: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Supporting Information

Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+

● Monthly costs $5-$35+

● A popular exception is Wyze

○ ~$25 camera

4

⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 19: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Supporting Information

Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+

● Monthly costs $5-$35+

● A popular exception is Wyze

○ ~$25 camera

○ No fees for basic features

4

⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 20: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Supporting Information

Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+

● Monthly costs $5-$35+

● A popular exception is Wyze

○ ~$25 camera

○ No fees for basic features

DIY Home Security Systems

4

⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 21: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Supporting Information

Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+

● Monthly costs $5-$35+

● A popular exception is Wyze

○ ~$25 camera

○ No fees for basic features

DIY Home Security Systems● Raspberry Pi copying files to storage on

network from IP Cameras

4

⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 22: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Supporting Information

Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+

● Monthly costs $5-$35+

● A popular exception is Wyze

○ ~$25 camera

○ No fees for basic features

DIY Home Security Systems● Raspberry Pi copying files to storage on

network from IP Cameras

● Raspberry Pi with camera module

4

⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 23: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Supporting Information

Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+

● Monthly costs $5-$35+

● A popular exception is Wyze

○ ~$25 camera

○ No fees for basic features

DIY Home Security Systems● Raspberry Pi copying files to storage on

network from IP Cameras

● Raspberry Pi with camera module

● Dedicated computer running software

○ Free software (ContaCam or iSpy)

○ Per camera fees

4

⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 24: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Solution

5

⚪Problem ⚪Motivation & Supporting Information ⚫Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 25: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Build a security system from recycled smartphones

● Allow users to disconnect from the cloud

5

⚪Problem ⚪Motivation & Supporting Information ⚫Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 26: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Build a security system from recycled smartphones

● Allow users to disconnect from the cloud● Avoid monthly fees

5

⚪Problem ⚪Motivation & Supporting Information ⚫Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 27: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Build a security system from recycled smartphones

● Allow users to disconnect from the cloud● Avoid monthly fees● Use old smartphones

5

⚪Problem ⚪Motivation & Supporting Information ⚫Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 28: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

6

Page 29: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● User login and authentication

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

6

Page 30: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● User login and authentication ● Phones locally detect motion

6

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 31: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● User login and authentication ● Phones locally detect motion

○ Begin recording upon detecting motion

6

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 32: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● User login and authentication ● Phones locally detect motion

○ Begin recording upon detecting motion○ Continuous recording until kill signal is sent

6

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 33: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● User login and authentication ● Phones locally detect motion

○ Begin recording upon detecting motion○ Continuous recording until kill signal is sent

● Person detection

6

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 34: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● Send notifications or alerts

6

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 35: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● Send notifications or alerts○ Email notification

6

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 36: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● Send notifications or alerts○ Email notification

● Store clips

6

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 37: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● Send notifications or alerts○ Email notification

● Store clips○ Encourage user to delete clip

6

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 38: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● Send notifications or alerts○ Email notification

● Store clips○ Encourage user to delete clip

● Accessible from any modern web browser

6

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 39: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Deliverables

● Send notifications or alerts○ Email notification

● Store clips○ Encourage user to delete clip

● Accessible from any modern web browser● Respond to an event within five seconds

6

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 40: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Constraints

8

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚫Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 41: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Constraints

● Only Android 4.4+ and iOS 11+ devices can be used

8

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚫Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 42: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Constraints

● Only Android 4.4+ and iOS 11+ devices can be used● Host computer needs:

○ At least 5 Mbps symmetric internet link

8

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚫Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 43: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Constraints

● Only Android 4.4+ and iOS 11+ devices can be used● Host computer needs:

○ At least 5 Mbps symmetric internet link○ Generous free disk space

8

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚫Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 44: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Diagrams

8

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 45: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Use Case Diagram 9

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 46: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Use Case Diagram 9

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 47: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Use Case Diagram 9

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 48: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Use Case Diagram 9

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 49: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Use Case Diagram 9

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 50: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Use Case Diagram 9

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 51: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Use Case Diagram 9

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 52: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Use Case Diagram 9

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 53: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Backend Component Diagram 10

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 54: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Frontend Component Diagram

⚪Problem ⚪Supporting Information ⚪Solution ⚪Requirements ⚪Assumptions & Limitations ⚫Diagrams ⚪Technology Stack ⚪Timeline & Considerations

11

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 55: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Testing

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚫Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 56: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Testing

● Manual testing

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚫Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 57: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Testing

● Manual testing● CI/CD testing

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚫Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 58: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Testing

● Manual testing● CI/CD testing● Integration testing

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚫Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 59: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Technology Stack

12

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚫Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 60: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Technology Stack

● Docker● MySQL● Django Rest Framework

○ Djoser/JWT● React

○ NGINX● Node.js

○ Medooze Media Server

12

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚫Technology Stack ⚪Timeline & Considerations ⚪ Prototype

Page 61: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Design considerations

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 62: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Design considerations● Cloud is avoided to protect user privacy

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 63: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Design considerations● Cloud is avoided to protect user privacy

○ User owns their data

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 64: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Design considerations● Cloud is avoided to protect user privacy

○ User owns their data○ Avoid monthly fees

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 65: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Design considerations● Cloud is avoided to protect user privacy

○ User owns their data○ Avoid monthly fees

● Possibility of incorporating an existing security system

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 66: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Design considerations● Cloud is avoided to protect user privacy

○ User owns their data○ Avoid monthly fees

● Possibility of incorporating an existing security system○ Currently no way to work with commercial systems

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 67: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Design considerations● Cloud is avoided to protect user privacy

○ User owns their data○ Avoid monthly fees

● Possibility of incorporating an existing security system○ Currently no way to work with commercial systems○ Ability to add additional IP cameras, tablets, etc.

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 68: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Design considerations● Cloud is avoided to protect user privacy

○ User owns their data○ Avoid monthly fees

● Possibility of incorporating an existing security system○ Currently no way to work with commercial systems○ Ability to add additional IP cameras, tablets, etc.

● Open source codebase

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 69: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Design considerations● Cloud is avoided to protect user privacy

○ User owns their data○ Avoid monthly fees

● Possibility of incorporating an existing security system○ Currently no way to work with commercial systems○ Ability to add additional IP cameras, tablets, etc.

● Open source codebase○ Allows more features and sensors for a more robust system

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 70: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Future plans

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 71: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Future plans

● Allow users to use IP cameras as well to stream

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 72: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Future plans

● Allow users to use IP cameras as well to stream ● Communication between multiple devices

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 73: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Future plans

● Allow users to use IP cameras as well to stream ● Communication between multiple devices ● Identify specific objects of interest to search for

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 74: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Future plans

● Allow users to use IP cameras as well to stream ● Communication between multiple devices ● Identify specific objects of interest to search for ● Automated testing

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 75: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Future plans

● Allow users to use IP cameras as well to stream ● Communication between multiple devices ● Identify specific objects of interest to search for ● Automated testing● Stream viewing

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype

Page 76: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Prototype

⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚫ Prototype

Page 77: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Conclusion

Page 78: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints

Thank you!


Recommended