Senior Design Lab Security
Project Plan
Team May03-02
September 24, 2002
Client/Advisors: Dr. Lamont and Dr. Patterson (ECprE)
Robert Smith
Josh Hale
Ryan Peterson
Ryan Parnow
Brad Wilson
1
Table of Contents:
List of Figures...... 2
List of Tables...... 3
1 Abstract...... 4
2 Introduction
2.1 General Background...... 5
2.2 Technical Problem...... 5
2.3 Operating Environment...... 5
2.4 Intended User(s) and Use(s)...... 5
2.5 Assumptions...... 5
2.6 Limitations...... 6
3 Design Requirements
3.1 Design Objectives...... 7
3.2 Functional Requirements...... 7
3.3 Design Constraints...... 7
3.4 Measurable Milestones...... 8
4 End Product Description...... 9
5 Approach and Design
5.1 Technical Approaches...... 10
5.2 Technical Design...... 10
5.3 Testing Description...... 10
5.4 Risks and Risk Management...... 11
6 Financial Budget...... 12
7 Personnel Effort Budget...... 12
8 Project Schedule...... 13
9 Project Team Information
9.1 Clients/Faculty Advisors...... 14
9.2 Team Members...... 14
10 Summary...... 15
11 References...... 16
12 Appendices
Appendix 1...... 17
List of Figures:
8.1 Project Schedule
List of Tables:
6.1 Financial Budget
7.1 Personnel Effort Budget
1
1 Abstract:
The intention of this project is to provide additional security for the Electrical and Computer Engineering Senior Design Labs located in 322 and 316 Town Engineering. A high occurrence of theft in these rooms necessitates the need for additional security measures. The combination of security protocols and equipment are to be evaluated and selected for the protection of equipment and tools. The new measures are to aid in the prevention of theft and the apprehension of guilty parties. Due to the limited budget of the Department of Electrical and Computer Engineering, loss of items resulting from theft has become a major concern that provides reason for increasing security measures in the labs.
2 Introduction:
2.1 General Background:
Over the past few semesters the senior design labs located in Town 316 and 322 have been the target of numerous thefts. Some of the items taken include memory and small tools. The purpose of this project is to provide additional security to the labs to reduce the incidence of theft.
2.2 Technical Problem:
The basic technical problem is to keep the inventory in Town 316 and 322 from leaving intentionally. The type of inventory that we are trying to keep within the lab includes items ranging from screwdrivers to computer components. Many different types of hardware to increase the security of the senior design labs are being evaluated. Possible hardware includes motion activated cameras, keycard admittance systems, and automated inventory control systems.
2.3 Operating Environment:
The operating environment for the security system is nearly identical to the conditions that exist within all of Town Engineering. The only variable condition is the amount of light present in the room. The system will need to operate 24 hours a day, 365 days a year. The Town 322 and 316 are labs typical of the department.
2.4 Intended Users and Use:
There will be two types of user interaction with the system. One group is the people being monitored, and the other group is the people in charge of lab security. The system will be used to enhance security through deterrence and apprehension.
2.5 Assumptions:
The following assumptions have been made:
- No variable weather conditions inside the lab, to include snow, fog, rain, or extreme temperature variances.
- The appropriate personnel will be available to monitor the video. surveillance if used.
- Timely discovery of missing equipment.
- A limited number of personnel will have access to the computer/recording equipment.
- There will be a location given for the computer/recording equipment.
- No major modifications can be made to the senior design labs.
2.6 Limitations:
The following limitations are assumed to be present:
- Not all thefts will be prevented.
- Not all thieves will be apprehended.
- Amount of time for system administration.
- No direct lab monitors will be present.
- The project is limited to the budget provided by the department.
1
3 Design Requirements:
3.1 Design Objectives:
The following is a list of design objectives for the end system:
- A monitoring system – A system that is designed to monitor the movement of people and tools in the lab through the use of video, RF-tags, or another media.
- An inventory system – A way of keeping track of items in the labs implemented either through the use of protocols or electronics.
- A storage system – A way of storing the information collected from the monitoring system either through the use of a computer or a video recording system.
3.2 Functional Requirements:
The following is a list of functional requirements for the end system
- A deterrence effect – This system needs to be able to present a psychological effect that one would get caught for steeling items from the lab.
- Identification – This system should provide a way to identify people who remove items illegally from the lab using high quality video, RF tags, or another media.
- Adequate storage – The media on which video or other information is stored, such as video tape or computer hard drive, should be adequate in size to store a reasonable amount of coverage time.
- Motion activation – If a video system is chosen it will need to be able to take into account for a large amount of time where no one is present in the labs.
3.3 Design Constraints:
- Light condition independent – This system should be able to function adequately with the lights both on and off or have some way of provided light on its own.
- Low overhead – This system should be easy to use for the lab administrators, and not require much, if any, time from them.
- Budget – The system must costs less than the amount allotted for equipment.
3.4 Measurable Milestones:
- System Type Choice – Is the end of the system research part of the project, meaning that a type of system has been chosen. This also signifies the beginning of the equipment research period and the protocol design phase.
- Protocol Design Complete – The protocols for managing the system have been defined.
- Equipment Choice – Is the end of the equipment research part of the project, meaning that a specific set of equipment has been chosen for the implementation and will be ordered or built.
- Equipment Received/Completed –This denotes that all equipment has either been received or built, leading into the implementation phase.
- Hardware Implementation Completed – This denotes that the equipment has been installed and the testing phase can begin.
- Testing Completed – The initial testing of the system is complete, which leads to protocol implementation.
- Protocol Implementation Completed – This signifies the end of the project.
1
4 End Product Description:
The Senior Design Laboratory security system located in 322 and 316 Town Engineering has been designed to enhance the security of the rooms to reduce the number of thefts occurring during the year, and also to aid in the apprehension or identification of persons responsible for the thefts. It consists of a monitoring system to record or log movement of people and tools within the lab, and protocols that are used to keep up to date inventory, timely discovery of missing items, and correct use of the system.
1
5Approach and Design:
5.1 Technical Approaches:
The problem will be approached in many ways. Members of the team are currently researching many different avenues which include:
- Video Surveillance:
- Types of Cameras, such as infrared, etc.
- Camera location
- Motion activation
- Number of Cameras
- Image storage media
- Image quality
- Lens type
- Room Entry:
- Manual combination lock
- Current door lock
- Automated systems
- Keycards
- Radio Frequency Identification
- Logging of who enters and when
- Inventory:
- Procedures to check inventory on a more regular basis
- Alternate locations for items to highlight their disappearance
- Automated vs. Manual systems
5.2 Technical Design:
The following criteria will be applied to evaluate any given design for thesystem:
- Amount of labor needed for administration
- Amount of deterrence/visibility
- Cost
- Effectiveness of identification
- Suspect
- Item(s) missing
- Feet on chairs
- Size of installed equipment
- Accessibility
- Ease of administration
5.3 Testing Description:
To facilitate testing the members of the team will try to evade the various options. Volunteers will also be used to test the effectiveness of the system that is decided upon.
5.4 Risks and Risk management:
- False Identification
- Will be managed by appropriate personnel through whatever means that are appropriate.
- Failure to discover theft/missing items
- Routine inventories will reduce this, but nothing can be done to completely eliminate this.
- Loss of Team member(s)
- Project or timeline may need to be scaled back or changed.
- Lead times of needed equipment
- Necessary items will need to be purchased well ahead of time.
- Structural problems
- Mounting locations may need to be changed to facilitate the structure present in the room.
1
6Financial Budget:
Item / Estimated CostPoster / $50
Computer Equipment / $500
Security Equipment / $450
Total / $1,000
Table 6.1 Estimated Budget
1
7Personnel Time Budget:
Team Member / Original Estimated EffortRobert Smith / 80 Hours
Ryan Parnow / 88 Hours
Ryan Peterson / 70 Hours
Brad Wilson / 85 Hours
Josh Hale / 93 Hours
Table 7.1 Estimated Personnel Effort
1
8Project Schedule:
Figure 8.1 Semester Project Schedule
1
9Project Team Information:
9.1 Clients/Faculty Advisors:
Prof. John Lamont
324 Town Engineering
Ames, IA 50011
Office: (515) 294-3600
Fax: (515) 294-6760
9.2 Team Members:
Robert Smith
258 N. Hyland Apt 16
Ames, IA50010
(515) 296-0234 or 2-0899
CprE
Ryan Parnow
4912 Mortensen #632
Ames, IA50014
(563) 503-6096
EE
Brad Wilson
215 Beach Apt 1
Ames, IA50014
(515)210-1296
EE
Prof. Ralph Patterson III
326 Town Engineering
Ames, IA 50011
Office: (515) 294-2428
Fax: (515) 294-6760
Ryan Peterson
300 Stanton Ave #210
Ames, IA 50014
(515) 441-3788
EE
Josh Hale
311 Ash Ave
Ames, IA50014
(515) 450-1610
CprE
1
10 Summery:
Intentional theft is generally a crime of opportunity, so by introducing a system to reduce the perceived opportunity of getting away with the crime, the overall occurrences are effectively reduced. This system will be designed not only to reduce the perceived opportunity, but also to increase the chance timely discovery of missing items, and increase the chance of identification and apprehension of the offender. With a substantial reduction of the amount of theft in the labs, the system will be saving the Department of Electrical and Computer Engineering an amount on the order of $1,000 per year.
1
11References:
Lamont, John, Senior Design - Course Information and Notes, 2001, version 3.51
1
Appendix 1:
2.13 SENIOR DESIGN LABORATORY
The senior design laboratory is located in Rooms 316 and 322 in Town Engineering. Room 322 is the general senior design laboratory. Four computers and associated equipment are located in this laboratory for the use of senior design students working on their projects. Some bench workspace and lockable storage space is also available in the senior design laboratory. This room is available to senior design students who do not have other space in which to work on their project(s). If a senior design project is affiliated with a research project or an instructional laboratory, it is assumed that those projects will be conducted in the corresponding research or laboratory space.
Room 316 is a specially equipped laboratory for the building and testing of electronic circuits. Only teams with special needs will be given the combination to this room. This laboratory contains both a digital work area and an analog work area. This equipment in this laboratory was acquired new during the summer of 2001.
The senior design course coordinator is responsible for these laboratories. If you need special equipment or special space for your senior design project, please discuss your needs with the senior design course coordinator. The course coordinator should also be contacted if you have need for specific instruments, tools, etc. Limited locked storage space is available. You should contact the course coordinator is you need such space.
The door to this laboratory has a combination lock. Each project team will be assigned its own combination. The following rules apply to both laboratories:
- Please do not share door combinations with persons outside of your senior design team.
- Please be sure that the door is locked when you leave this laboratory.
- This is an instructional laboratory for senior design project work. Do not use the room as a general-purpose study room.
- No beverages and no food are to be consumed in this room.
- Please do your part to keep the room neat and clean.
- Do not leave valuable items laying around in laboratories; they will disappear.
If you have project materials in this room--either on a bench on any shelf of one of the cabinets, please label your materials clearly; include the names, phone numbers and e-mail addresses of all team members and your project advisor. Please note that any unmarked materials may be discarded during laboratory cleanup by the senior design coordinators. Such clean-ups will occur without notice.
Software available on the personal computers includes:
- Adobe Acrobat Reader 3.0
- MicroSim PSpice Evaluation Copy Release 8
- Microsoft Office 2000 (Word, Excel, Power Point, & Access)
- Microsoft Project 2000
- Microsoft Front Page 2000
- Microsoft Photo Editor 3.0
- Student MATLAB 5.0.0.4073
- Smartdraw
- Visio Technical 4.5
- Winzip 6.2
1