home security economic systemsdmay20-42.sd.ece.iastate.edu/docs/final presentation.pdf · outline...
TRANSCRIPT
![Page 1: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/1.jpg)
Economic Home Security SystemUma Abu, Lucas Jedlicka, Merin Mundt, Kamini Saldanha, Sohum Sawant, Andrew Tran
Senior Design Group, May 42
0
![Page 2: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/2.jpg)
Team Members
Lucas JedlickaDev Ops
Merin MundtFrontend
Andrew TranBackend
Uma AbuFrontend
Sohum SawantBackend
Kamini SaldanhaBackend
![Page 3: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/3.jpg)
Outline
1. Problem
2. Supporting Information
3. Our solution
4. Deliverables
5. Constraints
6. Diagrams
1
7. Testing
8. Technology Stack
9. Design Considerations
10. Future Plans
11. Prototype
12. Conclusion
![Page 4: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/4.jpg)
The Problem
⚫Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
2
![Page 5: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/5.jpg)
The Problem
● Large number of crimes every year in the U.S.
2
⚫Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 6: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/6.jpg)
The Problem
● Large number of crimes every year in the U.S.
● High cost of security systems
Top: NestBottom: Simplisafe 2
⚫Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 7: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/7.jpg)
The Problem
● Large number of crimes every year in the U.S.
● High cost of security systems● Observation:
○ Smartphones sitting unused
Top: NestBottom: Simplisafe 2
⚫Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 8: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/8.jpg)
Motivation and Supporting Information
3
⚪Problem ⚫Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 9: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/9.jpg)
Motivation
● Need for security cameras in homes
3
⚪Problem ⚫Motivation ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 10: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/10.jpg)
Motivation
● Need for security cameras in homes○ Roughly 2.5 million burglaries a year
3
⚪Problem ⚫Motivation ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 11: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/11.jpg)
Motivation
● Need for security cameras in homes○ Roughly 2.5 million burglaries a year
■ 66% are home break-ins
3
⚪Problem ⚫Motivation ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 12: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/12.jpg)
Motivation
● Need for security cameras in homes○ Roughly 2.5 million burglaries a year
■ 66% are home break-ins■ 13% reported cases solved
Source: https://www.alarms.org/burglary-statistics/
3
⚪Problem ⚫Motivation ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 13: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/13.jpg)
Motivation
● Need for security cameras in homes○ Roughly 2.5 million burglaries a year
■ 66% are home break-ins■ 13% reported cases solved
Source: https://www.alarms.org/burglary-statistics/
● Less than 20% of unwanted smartphones are recycled a year
Source: https://www.wastecare.com/Articles/Cell_Phone_Recycling.htmSource: Paul’s Hardware - “I Have a LOT to Learn About DIY Home Surveillance.”
3
⚪Problem ⚫Motivation ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 14: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/14.jpg)
Supporting Information
Customers may pay upfront cost and monthly fees using a service
4
⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 15: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/15.jpg)
Supporting Information
Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+
4
⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 16: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/16.jpg)
Supporting Information
Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+
● Monthly costs $5-$35+
4
⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 17: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/17.jpg)
Supporting Information
Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+
● Monthly costs $5-$35+
● A popular exception is Wyze
4
⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 18: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/18.jpg)
Supporting Information
Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+
● Monthly costs $5-$35+
● A popular exception is Wyze
○ ~$25 camera
4
⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 19: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/19.jpg)
Supporting Information
Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+
● Monthly costs $5-$35+
● A popular exception is Wyze
○ ~$25 camera
○ No fees for basic features
4
⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 20: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/20.jpg)
Supporting Information
Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+
● Monthly costs $5-$35+
● A popular exception is Wyze
○ ~$25 camera
○ No fees for basic features
DIY Home Security Systems
4
⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 21: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/21.jpg)
Supporting Information
Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+
● Monthly costs $5-$35+
● A popular exception is Wyze
○ ~$25 camera
○ No fees for basic features
DIY Home Security Systems● Raspberry Pi copying files to storage on
network from IP Cameras
4
⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 22: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/22.jpg)
Supporting Information
Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+
● Monthly costs $5-$35+
● A popular exception is Wyze
○ ~$25 camera
○ No fees for basic features
DIY Home Security Systems● Raspberry Pi copying files to storage on
network from IP Cameras
● Raspberry Pi with camera module
4
⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 23: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/23.jpg)
Supporting Information
Customers may pay upfront cost and monthly fees using a service● Upfront costs $100+
● Monthly costs $5-$35+
● A popular exception is Wyze
○ ~$25 camera
○ No fees for basic features
DIY Home Security Systems● Raspberry Pi copying files to storage on
network from IP Cameras
● Raspberry Pi with camera module
● Dedicated computer running software
○ Free software (ContaCam or iSpy)
○ Per camera fees
4
⚪Problem ⚫Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 24: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/24.jpg)
Solution
5
⚪Problem ⚪Motivation & Supporting Information ⚫Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 25: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/25.jpg)
Build a security system from recycled smartphones
● Allow users to disconnect from the cloud
5
⚪Problem ⚪Motivation & Supporting Information ⚫Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 26: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/26.jpg)
Build a security system from recycled smartphones
● Allow users to disconnect from the cloud● Avoid monthly fees
5
⚪Problem ⚪Motivation & Supporting Information ⚫Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 27: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/27.jpg)
Build a security system from recycled smartphones
● Allow users to disconnect from the cloud● Avoid monthly fees● Use old smartphones
5
⚪Problem ⚪Motivation & Supporting Information ⚫Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 28: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/28.jpg)
Deliverables
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
6
![Page 29: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/29.jpg)
Deliverables
● User login and authentication
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
6
![Page 30: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/30.jpg)
Deliverables
● User login and authentication ● Phones locally detect motion
6
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 31: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/31.jpg)
Deliverables
● User login and authentication ● Phones locally detect motion
○ Begin recording upon detecting motion
6
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 32: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/32.jpg)
Deliverables
● User login and authentication ● Phones locally detect motion
○ Begin recording upon detecting motion○ Continuous recording until kill signal is sent
6
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 33: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/33.jpg)
Deliverables
● User login and authentication ● Phones locally detect motion
○ Begin recording upon detecting motion○ Continuous recording until kill signal is sent
● Person detection
6
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 34: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/34.jpg)
Deliverables
● Send notifications or alerts
6
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 35: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/35.jpg)
Deliverables
● Send notifications or alerts○ Email notification
6
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 36: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/36.jpg)
Deliverables
● Send notifications or alerts○ Email notification
● Store clips
6
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 37: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/37.jpg)
Deliverables
● Send notifications or alerts○ Email notification
● Store clips○ Encourage user to delete clip
6
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 38: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/38.jpg)
Deliverables
● Send notifications or alerts○ Email notification
● Store clips○ Encourage user to delete clip
● Accessible from any modern web browser
6
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 39: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/39.jpg)
Deliverables
● Send notifications or alerts○ Email notification
● Store clips○ Encourage user to delete clip
● Accessible from any modern web browser● Respond to an event within five seconds
6
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚫Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 40: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/40.jpg)
Constraints
8
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚫Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 41: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/41.jpg)
Constraints
● Only Android 4.4+ and iOS 11+ devices can be used
8
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚫Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 42: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/42.jpg)
Constraints
● Only Android 4.4+ and iOS 11+ devices can be used● Host computer needs:
○ At least 5 Mbps symmetric internet link
8
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚫Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 43: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/43.jpg)
Constraints
● Only Android 4.4+ and iOS 11+ devices can be used● Host computer needs:
○ At least 5 Mbps symmetric internet link○ Generous free disk space
8
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚫Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 44: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/44.jpg)
Diagrams
8
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 45: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/45.jpg)
Use Case Diagram 9
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 46: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/46.jpg)
Use Case Diagram 9
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 47: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/47.jpg)
Use Case Diagram 9
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 48: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/48.jpg)
Use Case Diagram 9
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 49: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/49.jpg)
Use Case Diagram 9
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 50: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/50.jpg)
Use Case Diagram 9
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 51: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/51.jpg)
Use Case Diagram 9
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 52: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/52.jpg)
Use Case Diagram 9
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 53: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/53.jpg)
Backend Component Diagram 10
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 54: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/54.jpg)
Frontend Component Diagram
⚪Problem ⚪Supporting Information ⚪Solution ⚪Requirements ⚪Assumptions & Limitations ⚫Diagrams ⚪Technology Stack ⚪Timeline & Considerations
11
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚫Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 55: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/55.jpg)
Testing
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚫Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 56: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/56.jpg)
Testing
● Manual testing
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚫Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 57: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/57.jpg)
Testing
● Manual testing● CI/CD testing
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚫Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 58: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/58.jpg)
Testing
● Manual testing● CI/CD testing● Integration testing
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚫Testing ⚪Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 59: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/59.jpg)
Technology Stack
12
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚫Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 60: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/60.jpg)
Technology Stack
● Docker● MySQL● Django Rest Framework
○ Djoser/JWT● React
○ NGINX● Node.js
○ Medooze Media Server
12
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚫Technology Stack ⚪Timeline & Considerations ⚪ Prototype
![Page 61: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/61.jpg)
Design considerations
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 62: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/62.jpg)
Design considerations● Cloud is avoided to protect user privacy
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 63: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/63.jpg)
Design considerations● Cloud is avoided to protect user privacy
○ User owns their data
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 64: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/64.jpg)
Design considerations● Cloud is avoided to protect user privacy
○ User owns their data○ Avoid monthly fees
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 65: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/65.jpg)
Design considerations● Cloud is avoided to protect user privacy
○ User owns their data○ Avoid monthly fees
● Possibility of incorporating an existing security system
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 66: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/66.jpg)
Design considerations● Cloud is avoided to protect user privacy
○ User owns their data○ Avoid monthly fees
● Possibility of incorporating an existing security system○ Currently no way to work with commercial systems
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 67: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/67.jpg)
Design considerations● Cloud is avoided to protect user privacy
○ User owns their data○ Avoid monthly fees
● Possibility of incorporating an existing security system○ Currently no way to work with commercial systems○ Ability to add additional IP cameras, tablets, etc.
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 68: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/68.jpg)
Design considerations● Cloud is avoided to protect user privacy
○ User owns their data○ Avoid monthly fees
● Possibility of incorporating an existing security system○ Currently no way to work with commercial systems○ Ability to add additional IP cameras, tablets, etc.
● Open source codebase
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 69: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/69.jpg)
Design considerations● Cloud is avoided to protect user privacy
○ User owns their data○ Avoid monthly fees
● Possibility of incorporating an existing security system○ Currently no way to work with commercial systems○ Ability to add additional IP cameras, tablets, etc.
● Open source codebase○ Allows more features and sensors for a more robust system
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 70: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/70.jpg)
Future plans
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 71: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/71.jpg)
Future plans
● Allow users to use IP cameras as well to stream
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 72: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/72.jpg)
Future plans
● Allow users to use IP cameras as well to stream ● Communication between multiple devices
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 73: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/73.jpg)
Future plans
● Allow users to use IP cameras as well to stream ● Communication between multiple devices ● Identify specific objects of interest to search for
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 74: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/74.jpg)
Future plans
● Allow users to use IP cameras as well to stream ● Communication between multiple devices ● Identify specific objects of interest to search for ● Automated testing
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 75: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/75.jpg)
Future plans
● Allow users to use IP cameras as well to stream ● Communication between multiple devices ● Identify specific objects of interest to search for ● Automated testing● Stream viewing
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚫Timeline & Considerations ⚪ Prototype
![Page 76: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/76.jpg)
Prototype
⚪Problem ⚪Motivation & Supporting Information ⚪Solution ⚪Deliverables ⚪Assumptions & Limitations ⚪Diagrams ⚪Testing ⚪Technology Stack ⚪Timeline & Considerations ⚫ Prototype
![Page 77: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/77.jpg)
Conclusion
![Page 78: Home Security Economic Systemsdmay20-42.sd.ece.iastate.edu/docs/Final Presentation.pdf · Outline 1. Problem 2. Supporting Information 3. Our solution 4. Deliverables 5. Constraints](https://reader034.vdocument.in/reader034/viewer/2022051921/600e39ee86cf6e14bb062dfc/html5/thumbnails/78.jpg)
Thank you!