please write a 6 pages include the table paper which title is “smart-mirror” with CONCEPT DEVELOPMENT A. Alternative Options 1) Advantages 2) Disadvantages

the PowerPoint at:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

http://web.eng.fiu.edu/~arellano/4010/F2007/NeedAnalysis-ProblemStatement.ppt

Watch Rory Sutherland’s: Perspective is everything talk at:

Watch Tom Hulme’s: What can we learn from shortcuts? talk at:

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

  • For Wednesday
  • Need Specification:

    http://web.eng.fiu.edu/~arellano/4010/F2007/The_Needs_SpecificationFall2014.ppt

    And the video at:

    Study

  • the PowerPoint at: http://web.eng.fiu.edu/~arellano/4010/F2007/NeedAnalysis-ProblemStatement.ppt
  • 2.

  • Watch Rory Sutherland’s: Perspective is everything talk at: https://www.youtube.com/watch?v=iueVZJVEmEs
  • 3.

  • Watch Tom Hulme’s: What can we learn from shortcuts? talk at: https://www.youtube.com/watch?v=GzXqG505ORw
  • For Wednesday
    1.

  • Need Specification: http://web.eng.fiu.edu/~arellano/4010/F2007/The_Needs_SpecificationFall2014.ppt
  • 2.And the video at: https://www.youtube.com/watch?v=W7raJeMpyM0

    https://discord.gg/QY2Wbyt

     

    -Smart Mirror:

    https://www.hackster.io/ben-eagan/smart-mirror-with-optional-alexa-874d43

    http://web.eng.fiu.edu/~arellano/4010/F2007/Concept-EndProduct.ppt

    • https://www.youtube.com/watch?v=WpldYJ3sSIo       

    Senior Design I Proposal Part 1

    Genre: Design Proposal, used to present a new design or a new approach to an existing design, with the following purposes:

    1. Persuade a person or institution to approve your invention.

    2. Illustrate why the new product is needed and demonstrate that the product will be accepted by the potential users.

    3. Demonstrate your knowledge on the particular area.

    4. Demonstrate that you know how to create a new product from scratch and that you have a plan to make the project real.

    Audience: The proposal is intended for two audiences, on one hand for a technical audience of engineers who understands the details of the design and on the other hand for top managers that can make decisions to go ahead with the project. Some chapters of the proposal are dedicated exclusively to the technical audience while the others serve both audiences. In this assignment only Background and Intellectual Property are dedicated to the technical audience.

    Due date: Two weeks after last topic is covered in class.

    Format details according to modified IEEE style should be directly followed an can be found at:

    http://web.eng.fiu.edu/~arellano/1002/Style/msw_usletter_format_nov12mod

    Be sure to save time to edit to eliminate errors and typos that could lead your audience to question your professionalism and careful work.

    Please find grading details and page count in the following table. A detailed rubric with grading criteria will be provided.

    Please use the exact same section numbering.

    Section

    Weight

    Typical page count

    II.

     

              PROBLEM STATEMENT

                                            A.    Project Objectives

                                            B.    Constraints

    Write this part only after you complete the Need Analysis

     

    5

    1

     

    III.         ASSUMPTIONS AND LIMITATIONS.

     

                                            A.    Assumptions

    5

    1

                                            B.    Limitations

     

    IV.         NEEDS FEASIBILITY ANALYSIS

     

                                            A.    Needs Analysis Conclude with Problem Statement and Objectives

    10

    5

                                            B.    Need Specification

    10

    2

                                           D.    Marketability

    10

    1

    VI.         OPERATING ENVIRONMENT

    3

    1/2

    VII.       INTENDED USER(S) AND INTENDED USE(S)

     

                                            A.    Intended user(s).

    3

    1/2

                                            B.      Intended use(s).

    4

    1/2

    VIII.     BACKGROUND

    15

    10

    IX.           INTELLECTUAL PROPERTY

    10

    6

    XVII.
    CONCEPT DEVELOPMENT

    A.
    Alternative Options

    1)
    Advantages

    2)
    Disadvantages

    10

    6

    XVIII.
    END PRODUCT DESCRIPTION AND OTHER DELIVERABLES

    A.
    End Product Description

    B.
    Functions

    C.
    Specifications

    D.
    Other Deliverables

    15

    6

    TOTAL

    100

    39.5

    Format deductions

    4

    4

    7

    20%

    Reason

    Deduction

    Heading Style, Single Occurrence

    Heading Style, Multiple Occurrences

    7

    Not referencing Images, Single Occurrence

    Not referencing Images, Multiple Occurrences

    Assumptions Limitations errors

    1 Each

    Not reviewed by mentor

    25%

    For each Section

    Introductory Paragraph

    20%

    Body

    60%

    Concluding Paragraph

    Not presenting required information

    Case by Case

    Deliverables: Report,

    · PowerPoint

    · Presentation

    RESEARCH PROJECT REPORT GUIDELINES

    While you prepare your research project you will be working on some important and time consuming sections of your Senior Design II Proposal.

    · This paper has to be reviewed by your mentor and have his initials in the title page

    An approved proposal is required to pass this course. If your research document is not satisfactory you will:

    · Not have a good grade.

    · And still will need to do corrections.

    Use the check boxes after the item numbers to verify that you have followed all the steps.

    Remember that if you did not have time to do it right the first time, how are you going to have time to do it right the second time?

    Bellow you will find sections of your research document. I would recommend that:

    □ 1. You start early.

    □ 2. You use a uniform style across the project according to the format guidelines indicated in class.

    □ 3. Use the sections numbering according to that indicated in the Proposal Outline even if it means that you will have jumps in the numbering in this report.

    □ 4. Use the “Supermarket shopping list style” as indicated in the “Style” presentation (“Supermarket shopping list style” is a class example of somebody explaining an idea to a person he does not know).

    IV. NEEDS ANALYSIS

    A.
    Needs Analysis

    B.
    Need Specification

    C.
    Marketability

    Show that you understand that a “Successful Design” requires understanding the needs of clients and users. Follow the guidelines presented in the lecture. We would like to show the reader details about the methods you followed:

    · Show and explain the different steps of the Need Analysis including the tables with the objectives and their evolution. Explain all the steps.

    · Briefly explain how you came to an agreement on how to specify the objectives. For each objective provide a specification and a rationale on how and why the spec value was chosen (See lecture).

    · Write a separate section of your proposal about Marketability. Provide strong arguments of your project Marketability. You have to review two similar projects in https://www.kickstarter.com/.

    □ 1. Each item you review must have a Sub Section Heading and an entry in the Table of Contents.

    □ 2. In the beginning of the first paragraph of each kickstarter project you should name authors, institution date and citation number. Make sure that the citation number that is enclosed by square brackets. “in [1] . . . ”, rather than as “in reference [1] . . . ”. In general it is not necessary to mention the authors of a reference but in this case they are relevant to the context.

    □ 3. You have to find at least two projects that relate to your topic or that may have similar approaches.

    □ 4. The projects should be current.

    □ 5. For each project the corresponding section should include the following subsections:

    i. Project Summary: Natural Language description of the project.

    ii. Fund rising strategy (Rewards)

    i

    ii. Technology Overview (Type of Technology, Components used and their main characteristics, speed power consumption, etc). No explanations of the interconnections or operation are provided here.

    iv. System Description. Detailed explanation of the signals flow and interconnections including at least:

    v. One Block Diagram

    vi. One Picture

    □ 6. You must conclude with a hypothetical fund rising strategy, inspired by the examples you just analyzed, or by ideas presented at:

    http://www.cnbcprime.com/shark-tank?__source=pd|SharkTank|Google_Search&par=pd

    Start with something like: “If we were to make a fund rising …”

    VIII. BACKGROUND

    The intention of this section is for you to establish a frame of reference about available technology, current state of the art, and possible approaches.

    Please take into consideration that:

    □ 1. Each item you review must have a Sub Section Heading and an entry in the Table of Contents.

    □ 2. In the beginning of the first paragraph of each research project you should name authors, institution date and citation number. Make sure that the citation number that is enclosed by square brackets. “in [1] . . . ”, rather than as “in reference [1] . . . ”. In general it is not necessary to mention the authors of a reference but in this case they are relevant to the context.

    □ 3. You have to find at least three projects and/or products that relate to your topic or that may have similar approaches.

    □ 4. The topics should be current.

    □ 5. For each research project the corresponding section should include the following subsections:

    i. Project Summary: Natural Language description of the project.
    ii. Technology Overview (Type of Technology, Components used and their main characteristics, speed power consumption, etc). No explanations of the interconnections or operation are provided here.

    iii. System Description. Detailed explanation of the signals flow and interconnections including at least:

    iv. One Block Diagram

    v. One Picture

    □ 6. Use your own words, copy and paste of text will be considered plagiarism and will severely affect your grade depending on the magnitude of the case.

    □ 7. Any picture, figure, table or graphic item that you import from the document must include the name of the original project and a citation

    □ 8. You should write Project reviews of no less than 2 pages, no more than 3 pages.

    IX. INTELLECTUAL PROPERTY

    The intention of this section is to demonstrate that you are Intellectual Property aware, that you know what to look for and where. You must also demonstrate that when there are patents involved, that you are able to use different approaches in your design that would overcome the infringement. You should review at least three patent reviews. You should include:

    □ 1. Not to use less than a page per patent but no more than three pages for each patent.

    □ 2. Sub Section Heading and an entry in the Table of Contents per item reviewed.

    □ 3. Patent number as part of the Sub Section Heading.

    □ 4. An overview of the patent.

    □ 5. Summary of the claims that may relate to you project.

    □ 6. What measures could be taken to avoid infringement.

    □ 7. Include at least one figure from the patent.

    □ 8. No expired patents please.

    □ 9. Find a name for your team that does not have any copyright or trademark conflict.

    □ 10. Write an IP contract to be included in the appendix indicating:

    i. Your criteria for co-inventorship. Who will be considered inventor? In what extent? (Team members, mentor, sponsors)

    ii. Who will be the invention spokesman?

    iii. How you plan to split profit.

    iv. What will be the mechanism for intellectual property decision making?

    X. CONCEPT DEVELOPMENT

    □ 1. Follow the guidelines indicated in the Concept-End Product lecture.

    □ 2. Illustrate the method you follow and how you obtain the weights.

    □ 3. For each option indicate its advantages and disadvantages. Please do that not as a summary but in each option section.

    □ 4. Complete the whole section

    XI. END PRODUCT DESCRIPTION AND OTHER DELIVERABLES

    □ 1. Follow the guidelines indicated in the Concept-End Product lecture.

    □ 2. Indicate the functions and specifications for each block. These are input output specifications; they are not the need specifications.

    □ 3. Complete the whole section.

    THE FOLLOWING TEXT IS INTENDED TO PROVIDE A VISUAL IDEA ON HOW THE PROJECT SHOULD LOOK LIKE

    VIII. BACKGROUND

    In this section we will review three different projects that curabitur sit aenean. Dui massa quam, torquent lacus dolor lacus malesuada lacinia aliquam, arcu magna augue amet, vestibulum morbi urna aliquam non montes mi, commodo a amet. Sapien ut quisque elit sed est aliquam, eu maecenas dictumst ligula dolor, at integer morbi, praesent odit molestie morbi elementum nulla. Placerat lorem tincidunt tortor arcu. Tempor in a ad nulla egestas, in felis aliquet magna eleifend semper suscipit, in ac, maecenas rutrum a viverra. Massa sed id velit risus, nobis convallis dictum mauris, aenean ut, auctor sed fusce wisi ut.

    A.
    Autonomous Airplane

    This project was accomplished by John Smith and Alfred White at ABC University in 2001 [1]. Integer suspendisse et diam sed feugiat erat, integer integer id mi viverra nibh ipsum, posuere justo volutpat posuere pellentesque. Fusce quam, blandit orci dapibus ipsum massa, in dis. Dignissim iaculis sed nulla auctor. Eget eleifend sit phasellus, sed lorem a aliquet eu venenatis nibh, euismod massa class quam pharetra amet nostra.

    1)
    Summary:

    Sem consectetuer non sit magna donec risus, amet luctus. Risus fames ligula nulla metus auctor nulla, vitae consequat non placerat, diam tortor, sit mattis venenatis lorem, luctus luctus voluptates in vel magna. Sed exercitation lectus mollis dictum. Consectetuer fermentum massa laoreet, ut vestibulum massa eget id torquent nonummy. Amet consectetuer, ad in vehicula suspendisse, sodales metus maecenas congue sagittis ut et, a sed faucibus vivamus id, vitae eget est conubia enim sollicitudin ligula. Mi doloribus, vel commodo nunc elit urna, dui ornare velit velit tortor odio ultrices, condimentum elit vestibulum porta fringilla, neque lectus egestas auctor metus sed. Scelerisque nulla ac, ipsum congue, sed odio id felis est torquent fusce, lorem erat nibh eget, at amet ante nec cras eleifend. Inceptos montes massa urna varius mattis faucibus, praesent ullamcorper gravida venenatis auctor massa. Sit risus justo ducimus suspendisse arcu, ante lorem.

    2)
    Technology Review:

    Neque est metus, suscipit egestas, diam magnis fringilla, tristique natoque consequat imperdiet. Vestibulum ac nascetur ullamcorper wisi sit, a tempor nascetur, ullamcorper pellentesque sem mauris in, amet nec a dui wisi, pede nullam. Lacus nibh quisque fusce, ipsum enim adipiscing id non ut rutrum, ac metus scelerisque maecenas, ac non sodales quam ut tincidunt in, lectus at. Tincidunt imperdiet in vel et nonummy, felis orci sed non nonummy, lobortis suspendisse vitae est wisi nonummy. Velit donec, amet cubilia, pellentesque tempor risus sed penatibus, veniam accumsan in. Velit nulla wisi, enim suscipit etiam donec lacinia nunc nec. Vitae urna tincidunt in, ut in molestie at sapien. Tempus imperdiet enim, mauris pellentesque ligula tortor luctus wisi at. Feugiat ut in sed vestibulum, pede tincidunt, feugiat sit vivamus porta, fusce tortor wisi euismod. Nunc pulvinar hymenaeos integer, mi eget dui, feugiat urna vestibulum massa inceptos. Praesent nullam volutpat ullamcorper phasellus quis pede, diam pede amet erat ligula elementum, ut sit id nisl, sed nullam lobortis.

    3)
    System Description:

    Use this section to explain the block diagram. If the project does not have one, create one according to your interpretation of the project and state in the description that the block diagram is interpretation of the project. Massa tortor et magna, ut pellentesque. Vel sit vestibulum rutrum neque, nullam ligula felis, nulla etiam sodales convallis quis ac, dolor placerat massa donec scelerisque, enim at nunc nemo leo. Vestibulum felis convallis vel, accumsan hendrerit in ac arcu. Blandit fames lorem nisl elit, porttitor adipiscing placerat sit aliquam pulvinar, nullam felis iaculis vitae nec mauris, sit quis vestibulum fusce. Morbi vitae at orci morbi purus integer, commodo parturient sem justo pede in dis, lectus sed habitant rhoncus orci. Lectus ac ultrices placerat nunc. Et varius rhoncus. Nullam morbi vitae, arcu pede purus malesuada. Iaculis justo mauris magna.

    Figure 3 System Diagram, from page 10 of [1]

    (The figure has to be described in the text)

    Donec porttitor tempus egestas massa vivamus blandit, quisque gravida consequat eget, sed morbi. Mauris sed, odio justo convallis fermentum laoreet nulla, tincidunt nullam velit, lacinia porta, tortor cras ac leo integer. Eros ultrices, maxime amet et. Ut cras tincidunt quis odio, quam justo pharetra, tempor nec ac vestibulum id mollit lectus. Consectetuer eu, enim lacus vel condimentum est id libero, viverra quis, nam orci posuere arcu mi sed lorem, pulvinar nisl urna pellentesque nunc. Donec non sociis eum dolores, lacus minima facilisis eu tempor porta. Nonummy amet, eu mattis habitasse ante nibh, vivamus pellentesque duis volutpat facilisis ut. Platea lectus rhoncus quis urna, fusce praesent, amet vel.

    XVII. END PRODUCT DESCRIPTION AND OTHER DELIVERABLES

    A.
    Specifications.

    Read the Need Specification presentation and in agreement with your mentor determine the specs for each of the objectives of your project. Present the reasons for selecting each spec and summarize them in a table.

    IX. INTELLECTUAL PROPERTY

    We will discuss three patents that suspendisse pellentesque, mi litora metus. Nibh pede, eu ultricies vitae eget risus malesuada. Nullam orci mauris at, ut ut suspendisse ornare dignissim. A at sollicitudin bibendum, vitae eu suspendisse et dignissim maecenas odio, vel nunc non sit porta donec, consectetuer consectetuer malesuada, interdum urna wisi maecenas ullamcorper mauris mi. Mauris urna nam, justo quam, laoreet diam tempor hendrerit ac. Erat vestibulum litora natoque integer.

    A. Robot System, United States Patent 7,066,291

    This patent by Martins, et al. was granted in June 27, 2006 and will be describe in the next sections.

    1) Summary:

    Use your own words, do not copy and paste. A mobile robot system for performing a plurality of separate operations, and including at least one autonomous wheeled mobile robot having at least one wheel-driving motor, an on-board computer, a system for navigation, orientation, and maneuvering in an environment with moving obstacles, a sensor system, a wireless communication system operative to receive and send signals, and a plurality of dockable operation modules and operative to be selectively coupled to the autonomous mobile robot to form an operation unit, wherein the autonomous wheeled mobile robot autonomously docks to the dockable operation modules.

    2) Claims Summaries:

    In your own words make a summary of all the claims that could relate to your project. Elit dui aliquam tortor dignissim mi maecenas, in velit justo mi, sed viverra eget, diam accumsan interdum. Dapibus dolor nam amet sodales at ac, suscipit vel in accumsan vel et et, ut vivamus. Duis a, tempor nec pede. Nisl aliquam ac wisi posuere risus integer, ultricies magna amet mattis dignissim, metus iaculis id varius feugiat nec. Quis donec nullam arcu in dolores, nam habitasse luctus vivamus, eget purus non nec culpa natoque sit, primis neque morbi integer vestibulum. Ac augue sit elit scelerisque erat.

    3) Non Infringement:

    Explain here why you will not infringe. Make sure you avoid infringement of the claims. That is not necessary obtained by changing implementations. Like their patent is for a wireless product, ours is not.

    Concept Development and End Product Description

    *

    Concept Generation

    *

    Portable Audio Equalizer
    Objectives
    The system should have excellent sound quality.
    The system should have easy equalization
    The system should be of light weight
    The system should be low cost
    Constraints
    The system must be portable
    The system will be an add-on to existing MP3 player

    *

    Concept Fan
    The Concept Fan is a way of discovering alternative approach’s to a problem when you have discarded all obvious solutions. It develops the principle of ‘taking a step back’ to get a broader viewpoint. Initially, the Concept Fan requires you to draw a circle in the middle of a large piece of paper. Write the problem you are trying to solve in the circle. To the right of it radiate lines representing possible solutions to the problem see the diagram below:
    https://www.mycoted.com/Concept_Fan

    *

    Concept Fan
    It is possible that the ideas you have come up with are impractical or do not really solve the problem. If this is the case, take a ‘step back’ for a broader analysis of the problem. Drawing a circle to the left of the first circle does this, writing the broader definition into this new circle and linking it with an arrow to show that it comes from the first circle, see diagram below:

    Use this as a starting point to radiate out other ideas, if this does not give you an adequate amount of new ideas, you can take yet another step back (and another, and another…)
    https://www.mycoted.com/Concept_Fan

    *

    Concept Fan

    *

    Sheet1

    Audio Equalizer
    Input Amplifier
    Automatic Level control
    ALC
    Graphic Equalizer
    Single Transistor + OPAMP
    Dual OPAMP
    Analog Logarithmic Amplifier
    Microcontroller
    + variable Gain Amplifier
    Active Filter
    Digital Filter
    Pasive Filter
    Analog Filter

    Sheet2

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Moderate Cost Fully Featured

    Moderate to Implement Higher Signal to Noise ratio

    Sheet3

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Moderate Cost Fully Featured

    Moderate to Implement Low Signal to Noise ratio

    Concept Combination Table
    A concept Combination Table (also called morphology box) is a matrix of concept fragments organized by functions (each function forms a separate column) so that an integrated concept can be created by choosing any concept fragment for each function and combining them to complete the required functionality.
    https://books.google.com/books?id=9ZjLBQAAQBAJ&pg=PA114&lpg=PA114&dq=concept+combination+table&source=bl&ots=ceBcnUUi7f&sig=PiCBZeHApgZDjgYV2EtcYDbuWeA&hl=en&sa=X&sqi=2&ved=0ahUKEwinsOeq4bTPAhVJmR4KHeO0D9kQ6AEIXDAM#v=onepage&q=concept%20combination%20table&f=false

    *

    Concept Combination Table

    *

    Sheet1

    Audio Equalizer
    Input Amplifier
    Automatic Level control
    ALC
    Graphic Equalizer
    Single Transistor + OPAMP
    Dual OPAMP
    Analog Logarithmic Amplifier
    Microcontroller
    + variable Gain Amplifier
    Active Filter
    Digital Filter
    Pasive Filter
    Analog Filter

    Sheet2

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Low Cost Not many features

    Easy to Implement Low Signal to Noise ratio

    Sheet3

    Concept Combination Table

    *

    Sheet1

    Audio Equalizer
    Input Amplifier
    Automatic Level control
    ALC
    Graphic Equalizer
    Single Transistor + OPAMP
    Dual OPAMP
    Analog Logarithmic Amplifier
    Microcontroller
    + variable Gain Amplifier
    Active Filter
    Digital Filter
    Pasive Filter
    Analog Filter

    Sheet2

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Moderate Cost Low Signal to Noise ratio

    Moderate complexity to Implement

    Fully Featured

    Sheet3

    Concept Combination Table

    *

    Sheet1

    Audio Equalizer
    Input Amplifier
    Automatic Level control
    ALC
    Graphic Equalizer
    Single Transistor + OPAMP
    Dual OPAMP
    Analog Logarithmic Amplifier
    Microcontroller
    + variable Gain Amplifier
    Active Filter
    Digital Filter
    Pasive Filter
    Analog Filter

    Sheet2

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Moderate Cost Design Complexity

    Fully Featured

    Higher Signal to Noise ratio

    Sheet3

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Moderate Cost Fully Featured

    Moderate to Implement Low Signal to Noise ratio

    Concept Selection

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 5

    Low Cost 1/3 1/3 1/5 1

    This table compares the relative importance of the objectives.
    “Sound Quality is strongly more important than Easy Equalization”. (There is a 5 in this cell)

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.52

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 5.00 1.1362193665 0.23

    Low Cost 0.33 0.33 0.20 1.00 0.3860973951 0.08

    This table is used to determine the weights (importance) of the objectives Total 4.9924485625

    Sheet2

    Sheet3

    Concept Selection

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 2

    Low Cost 1/3 1/3 1/2 1

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19

    Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10

    Total 4.8592255762

    w

    Sound Quality. 0.53

    Easy Equalization 0.18

    Light Weight 0.19

    Low Cost 0.10

    Sheet2

    Sheet3

    Option 1 Option 2 Option 3 If a contraint is No

    Constraints That Option must be Discarded

    Must be Portable Yes Yes Yes

    Add-on to existing MP3 P. Yes Yes Yes Select option with Highest Score

    Objectives w

    Sound Quality. 0.52 3.00 1.56 3 1.56 5 2.60 5 is Maximum

    Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90

    Light Weight 0.23 5.00 1.15 4 0.92 4 0.92

    Low Cost 0.08 5.00 0.4 5 0.40 3 0.24

    3.83 3.78 4.66

    End Product Description
    In this section you will describe:
    The constituent modules and their interrelationships
    The functionality of the product
    The functionality of the different modules
    Present the product specs

    *

    Black Box
    In science, computing, and engineering, a black box is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings. Its implementation is “opaque” (black). Almost anything might be referred to as a black box: a transistor, an algorithm, or the human brain.
    https://en.wikipedia.org/wiki/Black_box

    *

    Block Diagram
    A block diagram is a diagram of a system in which the principal parts or functions are represented by blocks connected by lines that show the relationships of the blocks. They are heavily used in engineering in hardware design, electronic design, software design, and process flow diagrams.
    https://en.wikipedia.org/wiki/Block_diagram
    http://www.hobbyprojects.com/block_diagrams/block_diagrams.html

    *

    Level 0 Equalizer Functionality
    This is the product description without knowledge of the internal blocks (black box)

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 2

    Low Cost 1/3 1/3 1/2 1

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19

    Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10

    Total 4.8592255762

    w

    Sound Quality. 0.53

    Easy Equalization 0.18

    Light Weight 0.19

    Low Cost 0.10

    Sheet2

    Audio Input Signal Audio Equalizer

    Equalizer Control Audio output Signal

    Power

    Module Audio Equalizer

    Inputs – Audio input: 1V peak to peak
    – Power 9 V DC
    – Equalization Settings

    Outputs Equalized Audio : 1V peak to peak

    Functionality Equalize the input audio signal
    to provide desired frequency content

    Sheet3

    Option 1 Option 2 Option 3 If a contraint is No

    Constraints Yes Yes Yes That Option must be Discarded

    Must be Portable Yes Yes Yes

    Add-on to existing MP3 P. Yes Yes Yes

    Objectives w

    Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum

    Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90

    Light Weight 0.19 5.00 0.95 4 0.76 4 0.76

    Low Cost 0.10 5.00 0.5 5 0.50 4 0.40

    3.23 3.75 4.71

    Level 1 Equalizer Functionality
    This a general Description of the internal blocks
    Only Pre-AMP table shown. Show a table for each block

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 2

    Low Cost 1/3 1/3 1/2 1

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19

    Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10

    Total 4.8592255762

    w

    Sound Quality. 0.53

    Easy Equalization 0.18

    Light Weight 0.19

    Low Cost 0.10

    Sheet2

    Audio Input Signal Audio Equalizer

    Equalizer Control Audio output Signal

    Power

    Buffered Input Constant Amplitude Signal

    Audio Input Equalized Signal

    Power 9 V DC

    Module Pre Amplifier

    Inputs – Audio input: 1V peak to peak
    – Regulated 5 VDC

    Outputs Low impedance buffered output

    Functionality – Provides high input impedance
    – Provides low output impedance

    DC DC converters required

    Pre Amplifier
    Automatic Level
    control (ALC)
    Digital Filter
    Power Supply

    Sheet3

    Option 1 Option 2 Option 3 If a contraint is No

    Constraints Yes Yes Yes That Option must be Discarded

    Must be Portable Yes Yes Yes

    Add-on to existing MP3 P. Yes Yes Yes

    Objectives w

    Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum

    Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90

    Light Weight 0.19 5.00 0.95 4 0.76 4 0.76

    Low Cost 0.10 5.00 0.5 5 0.50 4 0.40

    3.23 3.75 4.71

    Level 2 Automatic Level
    control (ALC)

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 2

    Low Cost 1/3 1/3 1/2 1

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19

    Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10

    Total 4.8592255762

    w

    Sound Quality. 0.53

    Easy Equalization 0.18

    Light Weight 0.19

    Low Cost 0.10

    Sheet2

    Audio Input Signal Audio Equalizer

    Equalizer Control Audio output Signal

    Power

    Buffered Input Constant Amplitude Signal

    Audio Input Equalized Signal

    Power 120 VAC, 60Hz

    Pre Amplifier
    Automatic Lecel
    control (ALC)
    Digital Filter
    Power Supply

    Sheet4

    DC Voltage input

    Buffered Input Signal Constant Amplitude Signal

    Gain Control Output Sample

    Module Pre Amplifier

    Inputs – Audio input: 1V peak to peak low impedance
    – Regulated 5 VDC
    – Feedback from Microcontroller

    Outputs Constant peak value buffered audio signal

    Each Block is described in detail DC Voltage input Functionality – Samples the module output
    – Detects the peak values
    – Adjusts the amplifier’s gain

    Repeat as needed to explain all blocks in Level 1

    Variable Gain
    Amplifier
    Microcontroller

    Sheet3

    Option 1 Option 2 Option 3 If a contraint is No

    Constraints Yes Yes Yes That Option must be Discarded

    Must be Portable Yes Yes Yes

    Add-on to existing MP3 P. Yes Yes Yes

    Objectives w

    Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum

    Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90

    Light Weight 0.19 5.00 0.95 4 0.76 4 0.76

    Low Cost 0.10 5.00 0.5 5 0.50 4 0.40

    3.23 3.75 4.71

    Embedded Systems Require additional Information
    Functionality of embedded system requires different approach

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 2

    Low Cost 1/3 1/3 1/2 1

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19

    Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10

    Total 4.8592255762

    w

    Sound Quality. 0.53

    Easy Equalization 0.18

    Light Weight 0.19

    Low Cost 0.10

    Sheet2

    Audio Input Signal Audio Equalizer

    Equalizer Control Audio output Signal

    Power

    Buffered Input Constant Amplitude Signal

    Audio Input Equalized Signal

    Power 120 VAC, 60Hz

    Pre Amplifier
    Automatic Lecel
    control (ALC)
    Digital Filter
    Power Supply

    Sheet5

    Module Microcontroller

    Inputs – Audio output sample
    – Regulated + 5 VDC

    Outputs – Gain Control Signal

    Functionality

    Start
    Sample Audio Output
    Low Level?
    Amplify Control
    High Level?
    Amplify Control
    Attenuate Control
    Yes
    Yes
    No
    No

    Sheet4

    DC Voltage input

    Buffered Input Signal Constant Amplitude Signal

    DC Voltage input

    Variable Gain
    Amplifier
    Microcontroller

    Sheet3

    Option 1 Option 2 Option 3 If a contraint is No

    Constraints Yes Yes Yes That Option must be Discarded

    Must be Portable Yes Yes Yes

    Add-on to existing MP3 P. Yes Yes Yes

    Objectives w

    Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum

    Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90

    Light Weight 0.19 5.00 0.95 4 0.76 4 0.76

    Low Cost 0.10 5.00 0.5 5 0.50 4 0.40

    3.23 3.75 4.71

    Continue until the next step is to place components

    *

    Conventions
    Use buses (Thick lines) to represent several connecting lines that have common origin and destination
    Terminate the bus with an arrow head at the destination
    When information flow is bidirectional, place arrows at both ends of the bus
    When possible indicate the number of lines

    Conventions
    At some level of detail all individual lines must show
    Images from:

    http://file.scirp.org/Html/1-6401302_42760.htm
    and

    https://en.wikipedia.org/wiki/Control_system
    Remember, stop when the next step is placing components

    In Summary
    Describe diagrams in paragraphs with local functionality tables slides (11 to 14)
    Repeat Functionality Tables
    Put level 0 functionality in one table
    Group all level 1 functionality tables in one table
    Repeat for all levels
    At the end of de section include the Technical Specs that you obtained before

    *

    Example

    Diagrams and tables must be explained

    Diagrams and tables must be explained

    Diagrams and tables must be explained

    Diagrams and tables must be explained, as in this case.

    Diagrams and tables must be explained

    Other Deliverables
    Power Point Presentation
    Final Report
    User Manual
    etc

    *

    Audio
    Equalizer
    Input
    Amplifier
    Automatic
    Level
    control
    ALC
    Graphic
    Equalizer
    Single
    Transistor +
    OPAMP
    Dual OPAMP
    Analog
    Logarithmic
    Amplifier
    Microcontroller
    +
    variable
    Gain Amplifie
    r
    Active Filter
    Digital Filter
    Pasive Filter
    Analog
    Filter
    AdvantagesDisadvantages
    Low CostNot many features
    Easy to ImplementLow Signal to Noise ratio
    Digital Filter
    Graphic Equalizer
    Single Transistor +
    OPAMP
    Dual OPAMP
    Analog
    Logarithmic
    Microcontroller
    + variable Gain
    Active Filter
    Passive Filter
    Input Amplifier
    Automatic Level
    control ALC
    AdvantagesDisadvantages
    Moderate CostLow Signal to Noise ratio
    Moderate complexity to Implement
    Fully Featured
    Digital Filter
    Graphic Equalizer
    Single Transistor +
    OPAMP
    Dual OPAMP
    Analog
    Logarithmic
    Microcontroller
    + variable Gain
    Active Filter
    Passive Filter
    Input Amplifier
    Automatic Level
    control ALC
    AdvantagesDisadvantages
    Moderate CostDesign Complexity
    Fully Featured
    Higher Signal to Noise ratio
    Digital Filter
    Graphic Equalizer
    Single Transistor +
    OPAMP
    Dual OPAMP
    Analog
    Logarithmic
    Microcontroller
    + variable Gain
    Active Filter
    Passive Filter
    Input Amplifier
    Automatic Level
    control ALC
    Sound Quality.Easy EqualizationLight WeightLow Cost
    Sound Quality.1533
    Easy Equalization1/5113
    Light Weight1/3115
    Low Cost1/31/31/51
    1 = equal3 = moderate5 = strong7 = very strong9 = extreme
    Sound Quality.Easy EqualizationLight WeightLow CostG. Meanw
    Sound Quality.1.005.003.003.002.590020.52
    Easy Equalization0.201.001.003.000.8801120.18
    Light Weight0.331.001.005.001.1362190.23
    Low Cost0.330.330.201.000.3860970.08
    Total4.992449
    This table compares the relative importance of the objectives.
    “Sound Quality is strongly more important than Easy Equalization”. (There is a 5 in this cell)
    This table is used to determine the weights (importance) of the objectives
    total
    Mean
    G
    w
    A
    A
    A
    Mean
    G
    N
    N
    /
    .
    )
    (
    .
    1
    2
    1
    =
    ´
    ×
    ×
    ×
    ×
    ×
    ×
    ´
    ´
    =
    If a contraint is No
    ConstraintsThat Option must be Discarded
    Must be Portable
    Add-on to existing MP3 P.Select option with Highest Score
    Objectivesw
    Sound Quality.0.523.001.5631.5652.605 is Maximum
    Easy Equalization0.184.000.7250.9050.90
    Light Weight0.235.001.1540.9240.92
    Low Cost0.085.000.450.4030.24
    3.833.784.66
    Option 3

    Yes
    Yes
    Option 2

    Yes
    Yes
    Option 1

    Yes
    Yes
    Audio Input Signal
    Equalizer ControlAudio output Signal
    Power
    Module
    Inputs
    Outputs
    Functionality
    Audio Equalizer
    Equalized Audio : 1V peak to peak
    – Audio input: 1V peak to peak
    – Power 9 V DC
    – Equalization Settings
    Equalize the input audio signal
    to provide desired frequency content
    Audio Equalizer
    Buffered InputConstant Amplitude Signal
    Audio InputEqualized Signal
    ModulePre Amplifier
    Inputs
    Outputs
    Functionality
    DC DC converters required
    Power 9 V DC
    – Audio input: 1V peak to peak
    – Regulated 5 VDC
    – Provides high input impedance
    – Provides low output impedance
    Low impedance buffered output
    Pre AmplifierAutomatic Levelcontrol (ALC)Digital FilterPower Supply
    Buffered Input SignalConstant Amplitude Signal
    Gain ControlOutput Sample
    ModulePre Amplifier
    Inputs
    – Audio input: 1V peak to peak low impedance
    – Regulated 5 VDC
    – Feedback from Microcontroller
    OutputsConstant peak value buffered audio signal
    Each Block is described in detail
    Functionality
    – Samples the module output
    – Detects the peak values
    – Adjusts the amplifier’s gain
    Repeat as needed to explain all blocks in Level 1
    DC Voltage input
    DC Voltage input
    Variable GainAmplifierMicrocontroller
    Module
    Inputs
    Outputs
    Functionality
    – Audio output sample
    – Regulated + 5 VDC
    – Gain Control Signal

    Microcontroller
    Start
    Sample
    Audio
    Output
    Low
    Level?
    Amplify Control
    High
    Level?
    Attenuate Control
    Yes
    Yes
    No
    No
    I. CONCEPT DEVELOPMENT
    The objective of this section is to make a concept fan of all the possible options of
    implementing this project. We will analyze all the different implementations of this project in
    order to obtain an option which is viable and fits the needs of the client. It will need to meet our
    objectives and constraints in the most efficient way, while taking our assumptions and limitations
    into consideration. After analyzing all of the alternate options , we will construct a concept
    selection table with a weighted average in order to select the best concept to follow.
    The concept fan is a chart which shows all the different alternatives that we can choose from
    to arrive at the same objectives. After analyzing the concept fan, we will use the weighted table
    to determine which option proves to be the most viable. Figure 19 shows the concept fan chart,
    which was derived through brainstorming and analysis of the objectives.
    The chart in Figure I-1 first names our main objective which is to develop a telemetry band.
    The second level of the cha rt shows the different parts that are needed in order to arrive at the
    objective. Basically, we will need a user interface, transmitter, receiver, and control unit in order
    to achieve our design objectives. Each of the parts has its own set of components t hat are needed
    to fulfill that part. The user interface is the way in which the user will interact with the device.
    The transmitter will be responsible for transmitting power to the receiver, which will possibly
    demodulate the signal. The control unit will be used to control all of the various sensors and
    components which will be used in the arm band.

    Figure I-1. The Concept Fan Chart
    In the following sections we will present and analyze alternate soluti ons and implementations
    for the Telemetry Band. Once the best option is found, it components, inputs, outputs, and
    functions will be analyzed.
    low-power RFID, which in turn uses backscatter modulation. All of the processes will be
    controlled by the ARM microcontroller, which introduces the advant age of compatibility with
    C++, which most of our team is familiar with. The main advantages include direct control of the
    arm band, low-power operation, and ease of programming due to familiarity with computer
    programing.
    a) Disadvantages
    The disadvantage of using the computer as the user interface is that it limits the mobility of
    the arm band by needing a bulky device in order to receive and read the measurements. Also, the
    command-based user interface will require more complex programming. To modulate the power
    signal with BPSK also introduces increased circuit complexity, more components, and greater
    power consumption in the arm band. Using RFID will also require complex circuitry so that it
    can use the existing SCMR antenna. This will also present increased cos t due to the need to have
    a demodulator circuit in the receiver as well as an RFID transmitter.

    senior 模板-1

    1

    DEPARTMENT OF ELECTRICAL AND COMPUTER
    ENGINEERING

    EEL-4920
    SENIOR DESIGN I FINAL REPORT

    FALL 2015

    Infrared Remote Control Code Lock

    TEAM 6

    Xuefeng Li (5462535)
    (Team leader)

    Xiaolun Zhang (5577546)
    Shuo Qin (5576977)
    Jing Xiao (5577719)

    Yiming Huo (5596507)

    Mentor: Dr. Gustavo.Roig

    Fall 2015

    2

    Contents

    Acknowledgement and Abstract……………………………………………………………6
    I. EXECUTIVE SUMMARY……………………………………………………………….7
    A. summarized problem statement……………………………………………………….7
    B. objectives and constraints……………………………………………………………….7
    C. project description…………………………………………………………………………7
    D. sections………………………………………………………………………………………..7
    II. PROBLEM STATEMENT……………………………………………………………….9
    A. project objectives…………………………………………………………………………..9
    B. constraints…………………………………………………………………………………….9
    III. ASSUMPTIONS AND LIMITATIONS………………………………………….10
    A. Identifying Assumptions ……………………………………………………………..10
    B. Identifying Limitations ………………………………………………………………..10
    IV. NEEDS FEASIBILITY ANALYSIS………………………………………………11
    A. Needs Analysis……………………………………………………………………………11
    B. Need Specification……………………………………………………………………….15
    C. Feasibility Analysis……………………………………………………………………..16
    D. Marketability………………………………………………………………………………18
    V. RISK ANALYSIS…………………………………………………………………………23
    VI. OPERATING ENVIRONMENT……………………………………………………25
    VII Intended user(s) and Intended Use(s) …………………………………………….26
    A. Intended use(s) …………………………………………………………………………..26
    B. Intended user(s) ………………………………………………………………………….27
    VIII. BACKGROUND………………………………………………………………………27
    A. AugustSmartLock ………………………………………………………………………27
    B. RemoteLock 6i …………………………………………………………………………..29
    C. iTouchless Bio-Matic Fingerprint Door Lock …………………………………33
    IX INTELLECTUAL PROPERTY……………………………………………………..36
    A.Remote control door lock system ………………………………………………….36
    B.Security door lock with remote control …………………………………………..37
    C.Remote control mechanism for a locker ………………………………………….39
    X. STANDARDS CONSIDERATIONS………………………………………………40
    XI.GLOBALIZATION………………………………………………………………………46
    A. GLOBAL AWARENESS
…………………………………………………………..46
    B. GLOBALPERSPECTIVE
………………………………………………………….47
    C. GLOBALENGAGEMENT
…………………………………………………………47
    D. WORLD TRADE ORGANIZATION[4]
 ……………………………………..47

    3

    E. ELIMINATING BARRIERS
………………………………………………………49
    F. COLLABORATION TOOLS
……………………………………………………..49
    G. INTERNATIONAL CONTACTS
……………………………………………….49
    XII. HEALTHY AND SAFETY…………………………………………………………50
    XIII.ENVIRONMENTAL CONSIDERATION……………………………………51
    XIV. SUSTAINABILITY CONSIDERATIONS…………………………………..55
    XV. MANUFACTURABILITY CONSIDERATIONS………………………….56
    XVI.ETHICAL CONSIDERATIONS AND SOCIAL IMPACT…………….57
    A. Ethical Considerations ………………………………………………………………..58
    B. SOCIALIMPACTS …………………………………………………………………….59
    XVII.CONCEPT DEVELOPMENT……………………………………………………61
    A. ALTERNATIVE OPTIONS
……………………………………………………….61
    B. CONCEPTSELECTION
…………………………………………………………….64
    XVIII.END PRODUCT DESCRIPTION AND OTHER
    DELIVERABLES……………………………………………………………………………..66
    A. END PRODUCT DESCRIPTION
……………………………………………….66
    B. FUNCTIONS …………………………………………………………………………….66
    C. SPECIFICATIONS
……………………………………………………………………67
    D. OTHER DELIVERABLES
………………………………………………………..71
    XIX. PLAN OF ACTION……. ……………………………………………………………72
    A. Statement of Work (SOW) …………………………………………………………..72
    B. Online Structure (WBS) ………………………………………………………………73
    C. Project Milestones ………………………………………………………………………75
    D. Timeline
…………………………………………………………………………………..76
    E. Gantt chart and Pert Charts ………………………………………………………….76
    XX.MULTIDISCIPLINARY ASPECTS……………………………………………..79
    XXI.PERSONNEL……………………………………………………………………………80
    XXII.BUDGET…………………………………………………………………………………84
    XXIII. RESULTS EVALUATION……………………………………………………..85
    XXIV. LIFE LONG LEARNING……………………………………………………….86
    XXV. APPENDIX……………………………………………………………………………86
    A. Team contract ……………………………………………………………………………86
    B. Intellectual Property Contract ………………………………………………………87
    XXVI Senior Design II Procedures……………………………………………………..89
    References……………………………………………………………………………………….91

    4

    Figure Contents
    Figure 1 LINKA………………………………………………………………………………..19
    Figure 2 Flow chart of LINKA……………………………………………………………19
    Figure 3 Nuimo………….. ……………………………………………………………………20
    Figure 4 Flow Chart of Nuimo…… ………………………………………………………21
    Figure 5 Flow chart of our project……………………………………………………….22
    Figure 6 Risk Analysis Tree……. ………………………………………………………..23
    Figure 7 operating environment…….. …………………………………………………..26
    Figure 8 Schematic of August Lock Installation……………………………………29
    Figure 9: Diagram of the August Lock operating principle……………………..29
    Figure 10 Schematic of RemoteLock 6…………………………………………………32
    Figure 11 Schematic of network RemoteLock 6i wireless diagram………….32
    Figure 12: Block Diagram of Fingerprint identification system diagram…..35
    Figure 13: Picture of iTouchless Bio-Matic Fingerprint Door Lock…………35
    Figure 14 Patent 1……………………………………………………………………………..36
    Figure 15 Patent 2……………………………………………………………………………..38
    Figure 16 Patent 3……………………………………………………………………………..39
    Figure 17 LCA for Infrared remote control door lock……………………………52
    Figure 18 LCTA for Infrared remote control door lock …………………………53
    Figure 19 LCIA for Infrared remote control door lock by category…………54
    Figure 20 product cummulative cost per phase/time………………………………57
    Figure 21 Concept Fan………………………………………………………………………61
    Figure 22 Alternative 1 STC89c51-LCD-AT24C02………………………………62
    Figure 23 Alternative 2 STC89c51-LCD-ATMega88…………………………….63
    Figure 24 Alternative 3 AT90S1200-LED-AT24C02…………………………….63
    Figure 25 Alternative 4 AT90S1200-LCD-ATMega88………………………….64
    Figure 26 Level 0 FInfrared remote control lock functionality bBlock
    Ddiagram………………………………………………………………………………………….67
    Figure 27 Level 1 infrared remote control lock block diagram………………..68
    Figure 28 Level 2 Block Diagram………………………………………………………..68
    Figure 29 Clock Ccircuit…………………………………………………………………….69
    Figure 30 Reset Ccircuit……………………………………………………………………..69
    Figure 31 Flow Chart…………………………………………………………………………73
    Figure 32 Project Plan………………………………………………………………………..74
    Figure 33 Pert Chart…………………………………………………………………………..78

    5

    Table Contents

    Table 1Team Members………………………………………………………………………..7
    Table 2 Client Interview……………………………………………………………………..12
    Table 3 Client Interview and user survey………………………………………………13
    Table 4 Client Interview, survey and Team Ideas…………………………………..14
    Table 5 Objectives……………………………………………………………………………..15
    Table 6 Weighted scale and weight computation……………………………………16
    Table 7 Component Specifications………………………………………………………18
    Table 8 Likelihood of Occurrence ……………………………………………………….24
    Table 9 Action Table………………………………………………………………………….25
    Table 10 Ethical Solutions………………………………………………………………….59
    Table 11 Ethical Evaluations……………………………………………………………….59
    Table 12 Weighted Scores of Objectives………………………………………………65
    Table 13 Alternative Selection Table……………………………………………………65
    Table 14 Level 0 LInfrared remote control lock functionality………………….67
    Table 15 Level 1 infrared remote control lock block diagram………………….68
    Table 16 Level 2 Clock and Reset circuit……………………………………………..69
    Table 17 Project Sspecification……………………………………………………………70
    Table 18 Input and Output specification……………………………………………….71
    Table 19 Gantt chart for time line………………………………………………………..77
    Table 20 Gantt chart for budget ………………………………………………………….84

    6

    Acknowledgement

    We are writing acknowledgement to extend our sincere gratitude to our mentor Dr.
    Gustavo Roig for instructing us the issues of our senior design project. Dr. Gustavo Roig
    gave us an opportunity to work with him on an valuable project when we sought his
    advice at the beginning of our senior design. Dr. Gustavo Roig gave us a lot of support
    and guidance on the process of designing the product throughout this semester. We would
    also express thanks to our instructor, Professor Wilmer Arellano for teaching us to
    understand the various rules of electrical product and also guiding us to write a precise
    paper for senior design. The completion of this paper could not been finished without the
    work place which Electrical Engineering Department of FIU provide to us and the help of
    the people who have assisted us to finish the paper.

    Abstract

    In daily life, the traditional door lock can not meet all the requirement of people. For
    example, people cannot open the door lock only by walking to the door. To meet the
    requirements of the use of locks to increase their security and convenience, with a
    controller instead of the key came into being. Remote control door lock is safe, low cost,
    low power consumption, easy to operate.In one word, this new type lock has more
    advantages than traditional lock. At present the use of electronic locks are mostly based
    on microprocessor, main devices MCU, the encoder and decoder built into software. Our
    project uses SCM system(Mainly STC89C51 microcontroller minimum system), 4×4
    Matrix keyboard, LCD display and alarm system. Our project contains a lot of functions
    such as the setting function, modifying the six user password function, ultra alarm
    function, ultra lock function, password error alarm function and other functions(P0 port
    to control the design of the LCD display. If the password is correctly, the display will
    show “ok” on the screen. If the password is error, the0 display will show “error” on the
    screen. For more than three times to enter password error, the lock will be auto locked.
    The P1 port controls keyboard matrix containing the number keys 0-9 and A-F function
    keys). In addition to the above basic password lock feature, based on the actual situation
    we decided to add a remote control functions to our door lock. The system of our remote
    control door lock is low cost, safety, low power consumption and very easy to operate.
    These advantages of this new type electrical door lock attract us to spend our time to
    design it.

    7

    I. EXECUTIVE SUMMARY

    Infrared Remote Control Code Lock

    Team Number: 6 Team Name: Infrared Remote Control Code Lock

    Mentor: Dr. Gustavo. Roig Team Leader: Xuefeng Li

    Team Member: Jing Xiao Team Member: Shuo Qin

    Team Member: Xiaolun Zhang Team Member: Yiming Huo

    Table I: Team Members

    A. Summarized Problem Statement

    Our team came together with one
    thought: to improve a new type of lock
    which we can control the lock from a far
    distance. The purpose behind our
    thought is to make a lock without a key
    and can be controlled by a remote
    control.

    B. Objectives and Constraints

    In our project the main objectives are:

    1. Should be safe to use

    2. Should be easy to use

    3. The remote control device should
    be small and lightweight

    4. Should be easy to install

    In our project the main constraints
    are:

    1. Weigh less than 250g

    2. Cost less than $100

    3. Size should be about 7cm by 7cm

    4. The lock material requires very
    strong metal

    C. Project Description

    Our product will be a multi-function
    lock. The lock can be securely mounted
    on the door and will be controlled by an
    infrared remote control or password;
    while maintaining security, our product
    will be safe and easy to use. This device
    will be constructed primarily of metal. In
    general the installation procedure will be
    design to be very simple so the product
    will be widely applicable and accepted.

    Visually, our product will look
    similar to the locking mechanisms found
    on hotel doors. Although this appearance
    may not be aesthetically pleasing, it can
    be easily modified. Ideally in the eyes of
    the customer, the appearance will be
    completely customizable. However, this
    would reduce the economies of scale
    established when producing a uniform
    product. In light of this, we plan to
    conduct a survey and research current
    trends in order to design an acceptable

    8

    appearance.

    D. Sections

    Our team agrees that the most
    important sections in our report are the
    following sections:

    • Background

    • Globalization
    • Concept Development

    • End Product Description And Other

    Deliverables
    • Need Feasibility Analysis


    • Plan Of Action
    • Personnel
    • Budget
    • Conclusion

    And our team believes that these
    sections in our report can strongly show
    our logic reasoning and the thought
    process steps in this design. In the
    Personnel section describes a little about
    all the team members and we think this
    can a very effective way to portray our
    skills and shows the part we are
    responsible for in the report.

    9

    II. PROBLEM STATEMENT

    Our team came together with one thought: to improve a new type of lock which we
    can control the lock from a far distance. The purpose behind our thought is to make a
    lock without a key and can be controlled by a remote control device. Once you forgot or
    lost the key, you just need to input the six-digit password, and then you can get into
    home.

    A. Project Objectives

    The main objective for our team is to design a new type of lock, which we can control
    the lock from a far distance. The purpose behind our thought is to make a lock without a
    key and can be controlled by a remote control.

    In our project the main objectives are:

    l Should be safe to use
    l Should be easy to use
    l The remote control device should be small and lightweight
    l Should be easy to install

    B. Constraints 


    For all locks, the security of the system always comes first for all customers and
    designers. Besides that, we also need to make our lock easy to install in the door and the
    remote control device need to be lightweight, small and easy to use.

    In our project the constraints are: 


    l Weigh less than 250g

    l Cost less than $100

    l Size should be about 7cm by 7cm

    l The lock material requires very strong metal

    Making assumptions can help us to narrow down the unrealistic project aspirations,
    and the limitation will help our team to prevent inefficiency in our project managing.
    As for the limitation details, which may need to be requested from the client. Otherwise,
    there may exist plenty of unknown area with our project, and we need to study them and
    finish our goals. This is a very necessary step before the designing and research process.

    10

    III. ASSUMPTIONS AND LIMITATIONS

    The need feasibility analysis is very important for our project and it can give us a fully
    understanding of our project needs, so we can better accomplish our tasks and designs in
    our project. We must conduct the in formation from customers’ surveys and brainstorm
    of our team to find out exactly what we really needs and how we can make our product
    marketable and desirable it for clients. We will not only analyze our needs, but also
    analyze our skills too; this is the reason and importance for a needs feasibility analysis.

    A. Identifying Assumptions

    The appropriate assumption definition in Engineering is the “Accepted cause and
    effect relationships, or estimates of the existence of a fact from the known existence of
    other fact(s).” For our team as an Engineer, we should research some information
    completed and recorded our testing data when making assumptions for our design.
    Between the assumption and the potential idea, we can make a connection, and if the
    accomplished work were studied deeply. Besides, the appropriate assumptions in
    Engineering will help us to make a huge progress on our project. Our lock should have an
    alarm system, which can protect client safer. Besides, we can make an app on the phone
    for changing the password or informing the user the lock has been unlocked.

    1) Assumptions

    l The lock will have an alarm system

    l The lock will have an app to control the lock

    B. Identifying Limitations

    Limitations play a very important role in our project. Limitations are necessary for
    progress of our project. During researching previous work, which is notice us that project
    limitations is a necessary part for our project and will determine our success or not. The
    funding or sponsorship lacking and unavailable resources will also make our designing
    process failure. However, in some cases, the limitation will not discovered until after a
    failure design or project. In a word, the limitation is one of the most important parts in the
    whole project.

    1) Limitations

    l Infrared transmission distance (approx. 20 meter)
    l Remote control device battery Life (approx. 1 year)

    11

    IV. NEEDS FEASIBILITY ANALYSIS
    The need feasibility analysis will help each team members to get a full understanding

    of our design and what goals we need to achieve. So the surveys and brainstorm is a easy
    way to figure out exactly what we really needs and how we can make our project more
    marketable and acceptable for clients. Not only we will analyze our needs but also we
    will analyze our team skills too, which is the reason why the needs feasibility analysis is
    necessary foe our team.

    A. Needs Analysis

    For the need analysis part, the client survey is a easy and effective way to conduct the

    information from the client, and also for the clients inter view. At the beginning, we will
    deduce the information from the client interview, then the client surveys, and the last we
    will have a brainstorm to comp up with our own thoughts. This will give our team a
    better understanding of what the user really need.

    1) Client Interview
    To know more about the needs of the client, we use our client interview to conduct the

    key information. The client interview will help our team understand deeply and know
    how to make these ideas to become a real design, which is also an important part of our
    final product.

    1. What is the most attractive point of our lock for you?

    a. I think is the remote control, it is very convenient for me, I can open the door before

    I touch it or use the key.

    b. I like the function that one remote control device can open many doors, so that I do

    not need to hold so many keys and find which one is the correct.

    2. What is the different do you think between our lock and traditional lock?

    a. It is fix for almost all kinds of door, even for the storage. Besides, it is easy to
    install.

    b. I think it is safer than before, it do not have a keyhole, so the thief cannot open it.

    3. What is your acceptable price for it?

    Although I like this lock, I think the final cost of the lock system should be below
    $75.

    12

    Source Attribute

    Client Project should be convenient to use

    Client Project should open the door without
    keys

    Client Project should be fit for different kinds
    of door

    Client Project should be safe enough

    Client Project should have low price for client

    Table 2 Client Interview

    2) User Survey
    After using the client interview, we got some information about the need of client, but

    we think it is not comprehensive enough, so we decided to conduct user survey
    information to complete it and find potential clients. The user survey will help us have a
    better understanding of what clients need this product to turn out, and then we can have a
    successful design.

    1 What the price you will pay for an Infrared Lock?
    under 100 dollar (38)
    moren than 100 dollar (12)

    This question gives our team a reference for the acceptable price for the customer.

    2 Income (per month)

    1000-2000 (14)
    2000-5000 (29)
    5000+ (7)

    The same as question 1

    3 Are you always at home by yourself?

    Yes (17)
    No (27)
    Keep secret (6)

    This question we can know the number of potential customers.

    4 Have your house been break in?

    Yes (4)
    No (46)
    Keep secret (0)

    13

    The same as question 3

    5 Which part you are most concerned?
    Safety (37)
    Durability (5)
    Convenience (8)

    Ensure the main point for our design.

    6 Do you think the traditional lock is safe enough?

    Yes (32)
    No (18)

    This question we can know the number of potential customers.

    7 If it is safety enough. Do you want to try the Infrared Lock?

    Yes (42)
    No (8)

    This question we can know the number of potential customers.

    8 Will you pay for the installation?

    Yes (3)
    No (7)
    I can install it myself (14)
    I want the installation fee is include in the price. (26)

    This question we can know some details for the price.

    Source Attribute

    Client Project should be convenient to use

    Client Project should open the door without keys

    Client Project should be fit for different kinds of door

    Client Project should be safe enough

    Client Project should have low price for client

    Survey Project product should no more then 100 dollar

    Survey Project should durable enough

    Survey Project should have enough safety

    Survey Project should easy to install or offer free
    installation

    Table 3 Client Interview and user survey

    14

    3) Teams Input

    Our team came up with ideas that we thought would make our project more acceptable
    and marketable for the client:

    l Remote control the lock

    l Lock requires very strong metal

    l The remote control device should be lightweight and small

    l The whole system is easy to install and use

    In conclusion, the client interview, user survey and brainstorms give us a better
    understanding of what our design needs to be improve. Our system is a new type of lock
    which we can control the lock from a far distance. The purpose behind our thought is to
    make a lock without a key and can be controlled by a remote control. And it uses infrared
    remote control the lock. Besides, we support the 6-digit number password set. In theory,
    our lock is 100 times safer than 4-digit password locks. When someone tries to open the
    door and enter the wrong passwords more than 3 times (in the remote control device), it
    will be locked and cannot open. Then, the built-in siren and the LED light will work to
    alert people. It may seem like a difficult feat but we will do what we can to make this a
    possibility.

    Source Attribute

    Client Project should be convenient to use

    Client Project should open the door without keys

    Client Project should be fit for different kinds of door

    Client Project should be safe enough

    Client Project should have low price for client

    Survey Project product should no more then 100 dollar

    Survey Project should durable enough

    Survey Project should easy to install or offer free
    installation

    Team Project could be remote control

    Team Project should use very strong metal

    Team Project should be lightweight and small

    Table 4 Client Interview, survey and Team Ideas

    15

    B. Need Specification

    We will take the survey results into consideration, including our user survey, client
    survey and the team’s ideas. We will make the specification according to the results.
    There are two kinds of the requirements for the specifications, which are marketing
    requirements and engineering requirements.

    1) Marketing Requirements
    a) The design should have excellent solidity.
    b) The design should have good compatibility and be easy to install.
    c) The design should have low cost.
    d) The design should have low consumption of power.
    e) The design should be reliable.
    2) Engineering Requirements
    a) The design should not weigh more than 250 g (about 0.55 lbs.)
    b) The design should have size of about 15 cm length and 8 cm width.
    c) The design should read currents from 50 nA to 2 mA.
    d) The design should cost around $80.
    e) The design should be made by stainless steel.
    3) Specification
    Temperature: 20 to 40°C
    Pressure: common pressure
    Wet: 25% to 55%
    Force: common force
    50nA to 2 mA

    Table 5: Objectives
    Objectives Engineering Requirements Justification
    c, d The design should not weigh more than

    250 g (about 0.55 lbs.)
    This is almost similar to even lighter
    than the weight of products in the
    markets

    b The design should have size of about 15
    cm length and 8 cm width.

    This is the standard size so that it is
    easy for users to accept.

    d, e The design should read currents from 50
    nA to 2 mA.

    The energy consumption of sensor is
    very low, and the product will work
    normally under extreme situation.

    c The design should cost around $80. We consider it is a proper price
    which makes a balance between our
    users and the costs based on the user
    survey and our ideas.

    a, e The design should be made by stainless
    steel.

    This makes our product strong and
    will avoid being damaged.

    In conclusion, we thought a lot and received plenty of information from client

    interview and user survey. We have created a list of complete and instructive
    specifications for our project. In the next step, we will make a strong, reliable, and
    accurate device that can be installed easily in most situation and cost not too much.

    16

    C. Feasibility Analysis

    The feasibility analysis will be divided into these parts: technical feasibility,
    resource feasibility, economic feasibility, schedule feasibility, culture feasibility, legal
    feasibility, and marketing feasibility. We will give a weight to each part according to its
    importance based on our understanding. We will give a solution if we think there are
    problems to carry out.

    Table 6 Weighted scale and weight computation

    Attribute Weight 1-
    Lo
    w

    2 3-
    Me
    d

    4 5-
    Hig
    h

    Why Solution

    Technical
    Feasibility

    Does the
    technology
    exist and can
    it be obtained?

    0.6 X Implementation
    will become
    difficult if the
    technology does
    not exist.

    Research what
    technology we
    need.

    Are
    fundamental
    new
    inventions
    required?

    0.6 X We should know
    if we have to find
    a new way to
    proceed with our
    project.

    We will
    research and
    find any
    technology we
    need.

    Resource
    Feasibility

    Do we have
    enough
    equipment and
    number of
    people?

    0.6 X We need enough
    sources and labor
    so that we can
    make sure task be
    finished perfectly.

    No problem

    Do we have
    electronic
    skills?

    2 X The product must
    be made strong
    enough and will
    response
    accurately and
    immediately.

    We have good
    electronic skills

    Do we have
    the
    programming
    skills?

    2 X We have to make
    the program stable
    and reliable.

    We will
    research C++

    Economic
    Feasibility

    Can we
    complete the
    project with
    the resources
    and funds
    given?

    0.5 X We have to make
    sure we have
    enough resources
    and funds to finish
    project.

    The project can
    be completed
    with our
    resources.

    Schedule

    17

    Feasibility
    What are the
    chance we
    meet all goals
    we have
    scheduled?

    0.7 X We must make a
    good schedule and
    make sure we can
    get the project
    finished at time.

    If we delay in a
    certain part, just
    work harder to
    stay on the
    schedule.

    Cultural
    Feasibility

    Will the
    product
    accepted by
    society?

    0.5 We can’t make a
    product that
    society does not
    accept.

    It is socially
    acceptable.

    Will it have a
    positive
    impact on the
    general
    culture?

    0.5 X X The product will
    be more popular if
    the impact on the
    general culture is
    positive.

    It has a positive
    impact.

    Legal
    Feasibility

    Are there any
    regulations or
    laws limiting
    or impeding
    the project?

    0.5 X We will not create
    a product that is
    illegal.

    It is legal.

    Marketing
    Feasibility

    Will the
    general public
    accept the
    product?

    1 X We must make
    sure there is
    market for our
    product.

    There is a
    market

    Are there
    other products
    similar to ours
    in the market?

    0.5 X We need to
    research how to
    make our product
    competitive.

    We believe our
    product will be
    competitive.

    Total Weight:
    10

    10 1 4 9 16 15 Total Score: 45

    Weighted
    AVG: 3.25

    0.5 5.2 5.4 16.
    4

    5 Weight Score:
    32.5

    totalMeanGw
    AAAMeanG NN

    /.
    )(.
    1

    21

    =

    ×⋅⋅⋅⋅⋅⋅××=

    18

    Table 7 Component Specifications

    We discuss the problem which we may meet in the future as a team, and then we do

    the feasibility analysis and get the above table. We consider all parts of feasibility
    including Technical, Resource, Economic, Scheduling, Cultural, Legal, and Marketing
    feasibility. Feasibility is measured against attributes, so we create weighted scale. 1-5
    scale shows the different attributes contributing to the total in different proportions. “1” is
    our least confidence, while “5” indicates more confidence. We sign a weight for each
    attribute based on the importance level we think. Then we give a score ranging from 1 to
    5. We have the sum of score at the bottom. We also have the sum of weight score for
    each columns, which is sum of each score multiplied by the relative weight. Weighted
    AVG is calculated by taking the weighted score to divide total weight. From the weighted
    AVG, we can get the feasibility of the project, with “1” being the weakest and “5” being
    the strongest. We think we have made an accurate feasibility, and we believe we can
    solve any problem we will meet in the future.

    D. Marketability

    1)First similar project on Kickstarter
    LINKA: World’s First Auto-Unlocking Smart Bike Lock is the project we found on

    Kickstarter which is similar to our project. It is created by Velasso in Oakland, CA. This
    bike lock features Tamper Alerts, Auto-Unlock, Built-in Siren, Keyless Access and more!
    They are pledged of $25000 goal. The project has following parts to introduce product
    and catch customers’ heart.

    Technology overview: Lock Smarter Not Harder with LINKA. Our bike lock
    features Tamper Alerts, Auto-Unlock, Built-in Siren, Keyless Access & more!
    a) Introduction for users and client: what is the goal? How is LINKA unique? What
    do people benefit from the product? Pictures for product.
    b) Features: Built-in Siren, Recognized Locking, Tamper Alerts, Phone-Less Access,
    Theft Indicator Map, Long lasting battery, Lightweight.

    Technical Resource Economic Schedule Cultural Legal Marketing G.Mean w
    Technical 1 3 2 4 5 1/5 1/3 1.3459 0.1711

    Resource 1/3 1 1/4 1/2 1/5 1/3 1/4 0.3538 0.0450

    Economic 1/2 4 1 3 1/4 6 1/2 1.2397 0.1576

    Schedule 1/4 2 1/3 1 1/3 1/4 3 0.6351 0.0808

    Cultural 1/5 5 4 3 1 1/2 1/4 1.0596 0.1347

    Legal 5 3 1/6 4 2 1 1/3 1.3113 0.1667

    Marketing 3 4 2 1/3 4 3 1 1.9195 0.2441

    Total 7.8649 1

    19

    c) Chain Specs: weight: 1.9kg, length: 76cm, sleeve: heavy duty rip-stop nylon.
    d) Stretch Goal: 50K limited edition LINKA to 100K color option unlocked.
    e) Compatibility: two steps: 1. Make sure the bike have a brake bridge with
    mounting holes. 2. Measure from the mounting hole to the inner edge of the rim.
    f) Why are we doing this?
    g) Timeline
    h) What we need?
    i) Rewards

    j) Risk and challenges.

    Figure 1 LINKA

    Figure 2 Flow chart of LINKA

    2) Second similar project on Kickstarter

    This is another project we found on Kickstarter named Nuimo which is seamless
    smart home interface. It is created by Senic in Berlin, Germany. They are pledged of
    €55,000 goal. They have a different structure of project as following parts.

    Technology overview: Nuimo is an intuitive and natural way to interact with your
    connected devices. Nuimo works with any bluetooth device or application including

    20

    Sonos and Philips Hue. Connectivity, Compatibility, Battery, Dimensions, Weight,
    Sensors, Indicators, Mounting, Materials.
    a) Attractive introduction to user: NUIMO is reenvision what technology feels like.

    b) Natural user interface which is meaning seamless control for the things you love.
    Some pictures for product’s features.

    c) Express yourself. This product support most devices and apps.
    d) Plenty of video for user to watch so that they can fully learn about this product.
    e) Setup made simple: easily connect your most used apps and devices.
    f) Goes where you need it: wireless design fits seamlessly into your life.
    g) Tech specs: Connectivity, Compatibility, Battery, Dimensions, Weight, Sensors,

    Indicators, Mounting, Materials.
    h) Our story: a journey from vision to product.
    i) The next steps: why we need you to be part of this.
    j) Risk and challenges.

    Figure 3 Nuimo

    21

    Figure 4 Flow Chart of Nuimo
    3) Our project

    We are here to make a smart lock called “Infrared Remote Control Lock”,which
    will change the methods of people’s life. In this project, we will use SCM system,
    keyboard, LCD display and alarm system. The product should have two features so that it
    will be competitive with the similar products in the market. First of all is the security to
    user. Another feature is “user-friendly”. In this project, these steps will be followed to do
    a prefect project: First of all, we do enough surveys to determine what we are going to do
    and why we will do that. Secondly, we consider the marketability, intended user and use,
    operation environment. Thirdly, we do the feasibility analysis and risk analysis.
    One of our team members, Li, shared his experience with us that his house was
    stolen when he was young, and it caused a lot of damage to the property. Li said that the
    thief easily opened the door of his house. He hopes that there is a lock which is strong
    enough to protect people’s house from being broken into. We come together with Li to
    design a lock and we believe it can make contribution to the security of house.

    The product should have two features so that it will be competitive with the similar
    products in the market. First of all is the security to user. For all locks, the security of the
    system always comes first for all customers and designers. So our product has 3 measures
    to make it safer. Firstly, now most of the password lock just has 3 or 4-digit password,
    not safe enough to protect their things by using those locks. On the contrary, we support
    the 6-digit number password set. In theory, our lock is 100 times safer than 4-digit
    password locks. Secondly, we have 2 meanings for the automatic locking. On the one
    hand, when the user closes the door, the lock will automatically lock. On the other hand,
    when you enter wrong passwords more than 3 times (in the remote control device), it will
    be locked and cannot be opened. Thirdly, we want to give our lock a screeching 100 dB
    sirens and a small LED to ensuring all eyes are on preying thieves, before they try to
    open the door or lockers.

    22

    Another feature is “user-friendly”. There are also three ways to achieve it: firstly,
    password can be set and reset by user. If you want to reset the password, of course you
    have to input old password, and double check the new password. That is designed to
    prevent disoperation. Secondly, when you arrive at home carrying a lot of things, you do
    not have the third hand to open the door. If you installed this lock, you just need to
    unlock remotely, the door will open automatically, and you can freely walk into your
    house. We will have enough amount keys for family user. Thirdly, traditional lock is
    complex and inconvenient to install, but our lock will be easy to install and very strong.
    The lock will apply to most situations, and will work in rainy or hot environment.

    If we were to make a fund rising, we have a plan called “One dollar to follow us”, in
    which we will pick out one user of 100 users who followed us to give him one of our
    products for free. Then we sell the product in the price 30% off of the list price we
    expected, to up to 1000 persons. Next we sell the product in the price 20% off of the list
    price, to up to 2000 persons. Finally, we sell the product in the price 10% off of the list
    price, to up to 3000 persons.

    In conclusion, we are more confident now to do our project, and we believe that we
    have a good understanding about the specification and marketability, and we know now
    we have enough skills and power to carry the project out. Our product will be competitive
    and reliable.

    Figure 5 Flow chart of our project

    23

    V. RISK ANALYSIS

    Any project has risks, so we can improve the feasibility of our project by analyze the
    risk of our project. When we are analyzing the risk, we have to consider all the parts, for
    example the technical, resource, economic, schedule, legal, and marketing. When we
    have finished the analysis, we will have a deeper understanding of the project.

    Analysis of the risk means that we set a goal for us, and it can help us to finish the
    problems more easily and clearly. At the same time, we will solve the problems in a high
    purposeful way. The lock is a sensitive topic for public who would like to have a safe and
    stable lock. Especially, the lock uses a infrared remote control. We have to make sure that
    our product is perfect, so the risk analysis becomes very important.

    Figure 6 Risk Analysis Tree

    In the Figure II : Risk Analysis Tree, we can see the overall situation about the risk

    analysis, and we can find out that the risk that we have from all parts. They are the
    Technical;Resource;Economic;Schedule;Legal and Marketing. And we can realize
    what is the specific risk we have from all parts.

    24

    Table 8 Likelihood of Occurrence

    This table shows the Grade Evaluation about risk. From this table, we can easily find
    out the level about all kinds of risks.

    Class I risk means there is no risk, so we can ignore the risk. We can just do our

    project.

    Class II means that we have to pay some attention on these risks, but these problems

    and risks is not our main problem. We should not pay too much attention on it.

    Class III is what we have to concentrate on. These are some hard problems and we

    have to try our best to solve them. And we also have to make sure that these problems
    will not affect our project. Class III risk is worth for us to spend time to solve.

    Class IV is the most difficult problem, and maybe we are short for confidence about it.

    But we don’t think we have Class IV risk in our project. From this table, we think all the
    problems will remain under our control, and we can solve all the problems. These risks
    cannot stop us, if these problems happen, because we have enough skills and ability to
    solve them.

    25

    R2
    We currently don’t have the programing skill,
    but we can study it now or find someone to help
    us about the programing.

    M1 We can make our product more stable and safe to let the public accept our lock.

    M2
    We find some similar products. But I think our
    product is unique and we can make it more
    advanced.

    T1 Yes the tech is exsist. We have to do more study about this kind of technology.

    R1
    Yes we have this skill. But we still have to learn
    more about it. We can solve any electronic
    problem buy have a group meeting.

    E1
    The resource come from everywhere. We have
    to make it more clear and study it. Then the
    resource wo find to complete our product.

    Table 9 Action Table

    In this table, we can know what we should do for our project. Different problem have

    different way to solve. It is a constraint for our project and the solution.

    VI. OPERATING ENVIRONMENT

    Locks is an important part or our life, so the environment of a lock is important,
    because we have to make sure that our product can work well in most kinds of
    environment. You can use our product at home directly. Because the environment at
    home is stable, it has the common temperature, press, wet. Our product can also work in
    some extreme environments, such as in the factory and in the wild. If costumers have
    these kinds of requirement, we can update our products .But our main costumer is
    families. Basically, we will not consider about the extreme environments.

    Lock will be set up on a door. However, different people have different habits. While
    some people like to close the door gently, some people like to slam the door. So we have
    to make our lock more stable and strong.

    First of all, we will make sure that the lock is installed firmly on the door, and it is
    perfectly combined with the door, with no permission of any loose installment, as it
    might make the lock unstable and affect the safety. When someone close the door with a
    strong force, we have to make sure that the parts inside will keep stable, so the strong
    force will not affect the life of the lock. We will have all parts made with high quality
    materials. Users might let water come inside the lock, so our product must have the
    waterproof ability. Traditional locks will not have these problems because traditional
    locks don’t have electronic parts. We have to make sure that water will not destroy our
    products. So some of the specific data is as follows. Temperature environment is from
    20°C to 40°C. Wet environment is from 25% to 55%. Pressure environment is common
    pressure. Force environment is common force.

    26

    Figure 7 operating environment

    VII Intended user(s) and Intended Use(s)

    A. Intended use(s)

    Our team came together with one thought: to improve a new type of lock which we

    can control the lock from a far distance. The purpose behind our thought is to make a
    lock without a key and can be controlled by a remote control.

    1.The length of the password

    Now most of the password lock just has 3 or 4-digit password, is not safe enough to
    protect their things by using that locks. On the contrary, we support the 6-digit number
    password set. In theory, our lock is 100 times safer than 4-digit password locks.
    2.Automatic locking

    In this part, we have 2 meanings for the automatic locking. On the one hand, when the
    user closes the door, the lock will automatically lock. On the other hand, when you enter
    wrong passwords more than 3 times (in the remote control device), it will be locked and
    cannot open.
    3.Built-in siren

    We want to give our lock a screeching 100 dB sirens and a small LED to ensuring all
    eyes are on preying thieves, before they try to open the door or lockers.
    4.Friendly to user

    27

    Password can be set and reset by user. If you want to reset password, of course you
    have to input old password, and double check the new password. That is designed to
    prevent misoperation. When you got home carrying a lot of things, you do not have the
    third hand to open the door. If you stalled this lock, you just need to unlock remotely, the
    door will open automatically, and you can freely walk into your house. We will have
    enough amount keys for family user.

    B.Intended user(s)

    Our product is face to all kinds of users. When you forgot the keys, you just need to

    input the six numbers password, then you can get into home.However, traditional lock
    doesn’t have this function, if you forgot bring your keys, you have to wait for your
    relatives or climb the window.

    When a thief want to get into your room, if your door with a traditional lock,
    sometimes the thief just can use a small wire to open your door. However, if your door
    with electrical code lock, and the thief doesn’t know the password, he will not break the
    door because this action will make noise.

    Also, if there is a babysitter in your home, after your kids grow up, you don’t need to
    worry about if the babysitter will return your home without permit, because you can
    change the password in anytime. And if you change the password, even if she or he copy
    the remote, the new remote will not work. Actually, it’s hard to copy the remote, but it’s
    easy to copy the keys.

    VIII. BACKGROUND
    In order to design a new type lock for our senior design project, it is necessary to

    learn some knowledge and ideas from other projects or products. So in this section, we
    will introduce three different but similar projects. These projects are similar to our design,
    and their background information is very useful to us. These projects can help us in terms
    of how to build our design and will give us some effective ideas, especially the technical
    instructions. Specifically, in this section, we will introduce August Smart Lock, Remote
    Lock 6i iTouchless and Bio-Matic Fingerprint Door Lock.

    A. August Smart Lock

    This device was created by Jason Johnson, the founder and CEO of smart lock maker
    August, Managing Partner of Founders Den, Chairman of Internet of Things Consortium.
    The article that describes the device and explains the function and features was published
    October 14, 2014 by Andrew Tarantola [1].

    28

    1) Summary

    The August smart lock is a secure and easy-installing lock, which can let the host
    control the access to your home and manage how long their access lasts. This function
    can be used by iOS and Android smartphones, without the need for keys or codes. This
    encrypted technology is safer than keys that can get lost or codes that can be copied. Also,
    it is easy to install because people just need 10 minutes to replace the interior of their
    existing deadbolt, and the exterior hardware is unchanged. This device will not connect to
    the cable, because it’s powered by four AA batteries, even if when the power, Wi-Fi, or
    cable goes down, it will still work. When people return home, August Smart Lock can
    sense people’s approach and automatically unlocks the door. The lock also can
    automatically lock the door when people leave, so people don’t need to worry about
    whether the door is locked or not.

    2) Technical review

    August smart lock relies on wireless and telephone network, and the reliable Bluetooth
    technology to sync your cell phone. This device needs people to plug the August into a
    power outlet within 30 fee (while within 15 feet will be the optimal performance and
    reliability). Wait for the flashing green light on, and if the green light is not flashing,
    press and hold the button on August Connect for 3 seconds, and then wait. On the lock
    settings screen in the August app, select “Connect to Wi-Fi” and follow the instructions,
    this lock should connect with 2.4 GHZ Wi-Fi. After setup the lock, people can see who
    walked in and out, from custom’s phone or computer in anywhere.

    In 2015, August Smart Lock have updated iOS end app to support Apple Watch. Users
    can use Apple Watch to open the front door of his home, iOS end users after updating the
    app, not only can lock and open the door by Apple Watch, but also the watch receives
    notification of the August card key state information, and view the activity log lock. So
    the cell phone and the apple watch functioning as a remote, can control the lock in a short
    distance all the time.

    3) System Description
    August mainly depends on the Bluetooth connection. By using a wireless network,

    users can use mobile app to achieve its function. The motors in August are using the
    normal battery. It can supply sustainable power while never having a deadlock problem.
    Moreover, the entity key can get the door open because of the mechanical system. In the
    August system, the Bluetooth module receives signals from the cell phone or other
    equipment, and single chip receives instruction and start work. If Bluetooth is connected
    properly, the relay controls door lock, and door circuit will open and led will lit. If
    Bluetooth password is wrong, the connection will not and cannot control the Bluetooth
    module, enabling access control.

    29

    Figure 8 Schematic of August Lock Installation

    Figure 9: Diagram of the August Lock operating principle

    B. RemoteLock 6i

    This device was invented by a security company named Lockstate, which was founded
    in Colorado State in 2004. The article that describes this device and introduces the feature
    and functions was published on August 22, 2015 by Geeks News Desk. [2]
    1) Summary

    RemoteLock 6i is a new commercial WiFi lock with keyboard established for security.
    This kind of lock is perfect for office buildings, rental properties, residential, industrial,

    30

    and any location where needing remote supervising and management of locks. This
    device can connect to routers with no additional equipment needed. When people unlock
    your door, you will receive alerts when codes are used. It has weather proof finish and the
    keypad can protect the elements. Also, if people forget to bring their cell phones, they can
    use the keyboard to input the code to open the door, and the code can be changed on cell
    phones or computers.

    2) Technical Review

    Remotelock 6i is perfect for rental property, home,hotel or office use. Robust WiFi is
    enabled to lock the door by a remote control, and it can send alerts when people unlock
    your doors or using code.

    Features and Specifications: [2]

    • WiFi enabled lock connects directly to existing routers

    • Weather proof finish & keypad

    • One-touch lock button to quickly lock door on the way out

    • Up to 1000 user codes or guest codes available to store in its memory

    • View access history in real time from online account

    • Add or delete users and lock or unlock your door remotely

    • Set scheduled access times for users.

    • Choose between passage or storehouse mode

    • Set schedules to passage mode, or even lock or unlock door automatically at
    scheduled times

    • Set to privacy mode to temporarily disable all user codes

    • Lockout functionality (after 5 incorrect attempts)

    • Low Battery Warning

    Specifications:
    • Lock Weight: 6LB
    • Power Source: 4 AA Alkaline Batteries
    • Keypad: Weather Proof Keypad
    • Handle: Reversible Lever
    • Door Thickness: 1 3/8″ to 2″
    • Keyway: Schlage C6

    31

    • Temperature: -30 to 120 degrees F (-34 to 50C) C6
    • Front Lock Height: 6 ¾”
    • Front Width: 3”
    • Back Height: 6 ¾”
    • Back Width: 3”
    • Key Hole to Top of Lock: 5 1/8”
    • Working Current: 50 mA
    • Idle Current: 5 µA
    • Lock Back Time: 5 (1 – 25) Seconds
    • Working Voltage: 4.8-6.4V
    • Low Battery Warning: 4.8V or lower

    3) System Description

    RemoteLock 6i system is designed based on wireless networking system, and this
    kind of communication network consists of two parts: the wireless network and wired
    communications networks. Door lock and wireless base station (LA171) is connected
    between wireless signals, and the wireless base station (LA171) is via a wired Ethernet
    LAN to communicate with the management software. Each floor can be composed of a
    wireless communications network. There is a wireless base station (LA171), and a
    number of wireless bridges (LA172), and wireless networking with many locks (like
    RemoteLock 6i). In conclusion, the remotelock system consists of a wireless base station
    (LA171), a wireless bridge (LA172), and some wireless door locks.

    32

    Figure 10 Schematic of RemoteLock 6

    Figure 11 Schematic of network RemoteLock 6i wireless diagram

    33

    C. iTouchless Bio-Matic Fingerprint Door Lock

    This product was found from Amazon website. The date and the description were
    published July 19, 2004 by Amazon manufacture. [3]

    1). Summary
    The iTouchless Bio-Matic Fingerprint Door Lock is a latch-style lock that offers

    access with a fingerprint, passcode and key. This kind of electronic lock can store up to
    150 fingerprints and 78 passcodes, which is enough for a family or a small company. In
    this kind of lock, the controls of the optical sensor are hidden behind a sliding front cover,
    which in order to protect the electronics from the micro elements. If there is any trouble
    with the sensor, people can also input a code with numbers or use a regular key to open
    the door.

    2) Technical Review
    The iTouchless lock in place of your existing doorknob, and it utilizes a “live layer”

    optical sensor for reading fingerprints.
    Features and Specifications: [3]

    Features:
    • Bio-matic fingerprint door lock

    • Enjoy the freedom of being able to take your morning jog or walk the dog without
    carrying keys

    • Powered by 4 AA batteries (not included)

    • Easy Programming

    • Add or delete user is performed directly on the lock’s pin pad

    • Utilizes ‘Live Layer’ optical sensor technology to ensure accuracy and high level of
    security

    • Product Type: Combination Lock
    Specifications:
    •Assembled Depth (In Inches) 7
    •Assembled Height (In Inches) 7.38
    •Assembled Weight (In LBS) 5.6 Lbs.
    •Assembled Width (In Inches) 6
    •Country of Origin China
    •Item Depth 11 In.
    •Item Height 8 In.
    •Item Weight 7 Lbs.
    •Item Width 9 In.

    34

    3) System Description

    In iTouchless Bio-Matic Fingerprint Door Lock system, the most important system is
    fingerprint system, and this system can be divide by two independent systems:

    Fingerprint input: People can register fingerprint through the prompts that shows on
    LCD display. Considering the confidentiality of the fingerprint entry, when registering
    the new fingerprint, this system needs to enter the administrator password or login with
    administrator fingerprint to manage the registration of fingerprints.

    Fingerprint screen: Through the LCD display prompts for administrator password,
    people can use the administrator fingerprint to login management system, enter the
    fingerprint ID, and then that ID will be screen in the whole system.

    The processing process of the whole system is divided into seven steps:

    a. The image sensor will transfer the fingerprint image to FPGA, also
    designed preprocessing module which is used to data processing.

    b. Then get the gradient of each pixel point and the coordinates of the
    maximum points of all these data, collect these data and the original
    data, and save them in the DDR SDRAM;

    c. The DSP read all relevant data through the FPGA which from DDR
    SDRAM, calculating the direction of the ridge line and ridge line
    frequency.

    d. Then use the GABOR filter on original data, after the processing of
    image data by FPGA in the DDR SDRAM, so in the end of the DDR
    SDRAM, both input and output require buffer.

    e. According to the requirements of the DSP processing instruction, read
    out the data from the DDR SDRAM after filtering, by the comparison
    of the FPGA internal logic to extract the fingerprint image in each row
    (column) in the maximum points.

    f. Sent data to the DSP for further processing, and complete fingerprint
    image ridge line extraction

    g. Complete matching recognition algorithm by DSP, and outputs high
    level or low level to match results.

    35

    Figure 12: Block Diagram of Fingerprint identification system diagram

    Figure 13: Picture of iTouchless Bio-Matic Fingerprint Door Lock

    36

    IX INTELLECTUAL PROPERTY

    In this section, we would like to clarify the patents we researched that could possibly
    have relevance to our project Infrared Remote Control Code Door Lock. We will
    summarize three patents and claim that we are not intruding into any existing patents.
    After we review the patents in this section, we will highlight the differences between
    these patents and our project.

    A.Remote control door lock system

    United States Patent US6005306 A
    This patent, by Martins, Andrew M Pickard was granted in Dec 21, 1999, and will be
    described in the next section.

    Summary:
    This is a wireless remote control lock system for commercial and residential building

    doors. It is built with an electrically powered striker plate including a striker plate
    member and a door latch member, a radio range signal receiver, a receiving signal circuit,
    a radio transmitter, a control unit including a first self-latching relay, a selector switch,
    and a second relay. The door lock system achieves the function that the door can be
    opened by a remote control unit. When someone uses the selector switch to select an
    operating mode, the first self-latching relay send a frequency signal.

    Figure 14 Patent 1

    37

    Then the signal will be received by a radio frequency receiver and a transmitter circuit

    transmit the signal to electricity to the striker and open the door.

    The wireless remote control lock system invention can be adapted to residential doors
    and commercial building doors. Therefore, this new type of lock system can be utilized in
    a wild range in the future.

    1. Claims Summaries:
    There are nineteen claims associated with our project. Claim one is the lock system

    comprising a striker assembly, a striker plate member, a control unit, a wireless
    transmitter, and circuit elements. Claim two talks about the second relay in the control
    circuit. The third claim talks about a mode selector switch and claim four states that the
    selector switch is operable in a second position. Claim five introduces the actuator
    between the first and second switch. The sixth claim is the receiver that contains the first
    and second switch. The seventh claim explains the control unit. The eighth claim talks
    about a voltage regulator. The ninth claim is about the transmitter. Claim ten talks about
    the wireless remote control of the lock system and explains what consist of the wireless
    remote control very specifically. The eleventh, twelfth, thirteenth, fourteenth and
    fifteenth claims are about the circuit, relays, mode selectors and the actuator in the
    wireless remote control part. The sixteenth claim states the striker, control, wireless
    transmitter, first and second relays in the lock system. The claims seventeen, eighteen,
    and nineteen explain the mode selector switches and actuator in the sixteenth claim.

    1. Non Infringement:
    The system design and method behind this patent are controlling the door from a long
    distance which is similar to our goal. Our project aims to unlock the door using a control
    panel in a shorter distance than this patent (4-10 meters) and we prepare to use the
    infrared as the method to receive and send the signals, which is different from this patent
    using the radio frequency to send and receive the signals. Our project’s target consumers
    are different from this patent. Our project is more adapted in the residential doors and this
    patent can be used in residential and commercial doors. The purposes of our project and
    this patent are also different. This patent is building a system that can control many doors
    at the same time but our project aims at one door. Also, we use a code control panel to
    establish a password for the lock to make it safer, but this patent uses a selector to open a
    door. Clips mentioned above are the non infringement for our project.

    B.Security door lock with remote control

    United States Patent US6076385A
    This patent was invented by Paul L. Pedroso and Duarte M. Oliveira. It was granted in
    Jun 20, 2000 and will be described in the next section.

    1 ) Summary:

    38

    This patent is a lock system for doors with a remote control. The lock can be installed
    on the wall adjacent to the door frame. The lock system contains the lock, a remote
    receiver and power controller. The remote receiver is used to receive the signal when user
    starts the remote control. The power controller supplies the DC power to the receiver and
    the relays. This lock system provides a manual control for the lock along with indicator
    lights showing the lock status. It also contains an emergency DC battery. A remote
    control locks all the doors at the same time and the indicator lights can show the status of
    the lock. Therefore, this patent provides strong security for the door with a remote
    control.

    Figure 15 Patent 2

    1) Claims Summaries:

    This patent contains eighteen claims related to our design. Claims 1 through 8 pertain
    to the components of the security door lock inside the wall. The specifically mean for
    each component that are in the first claim. The particular items included in the lock part are explained in claim 2 to 8. The ninth claims pertains to the means of remote control transmitter, receiver, sensor, actuator, rods, and a horizontal bar. Moreover, claims 10 to 13 refer to the details of the ninth claim. The details of the rod
    holder bar, horizontal bar, and the power source have been added through claims 10 to 13.
    Furthermore, the fourteenth claim is about the steps of making this door lock. Claims 15
    to 18 explain the particular method mentioned in the nineteenth claim including
    generating a signal, extending one rod from holder bar, providing a door sensor, and
    providing a lever for the sleeve.
    1) Non Infringement:

    In reference to the security door lock with remote control, there are some similarities
    in that our project also aims at unlocking the door with the remote control. However, the
    core functions are different between our project and this patent. The core function of our
    project is to make it easier for users to open the lock, and at the same time we guarantee
    the safety of the lock. The core function of this patent is to make sure the lock system is
    safe by controlling all the door locks at the same time and showing the status of the lock
    with an indicator light. Depending on this reason, there is no infringement between our
    project and this patent.

    39

    C.Remote control mechanism for a locker

    United States Patent US 6185773 B1
    This patent was created by Kirby R. Goedde. It was published on Feb 13, 2001.

    Figure 16 Patent 3

    1 ) Summary:
    This patent is about a school locker with remote control to achieve the function of
    locking, opening and beeping. In order to assist students to find their locker easily, this
    patent uses a key pad transmitter with three buttons to achieve the goal. The first button is
    utilized to activate a locking mechanism. The second button is used to activate a door
    opening mechanism and the third button is.used for a sound making device. One
    electrical circuit is used for the opening and locking device and a different circuit is used
    for the function of beeping.

    40

    2) Claims Summaries:
    There are six claims which are related to our project contained in this patent. Claim

    1 covers the transmitter, a control module, and a door lock in the remote control
    mechanism. Claim 2 is about a button which transmits a signal contained in the
    transmitter. Claim 3 talks about the details of solenoid. Claim 4 explains the motor and
    the lock body in the locker system. Claim 5 states the latch pin in the locker. Claim 6
    involves the transducer of the locker.

    3) Non Infringement:
    There is no infringement between this patent and our project. This patent aims to

    design a locker system for students to open, lock and find their locker easily. The goal of
    our project is to make people easier to open the door and make the door safer than the key
    lock door. Also, we are going to design a code for the lock and it will be more different
    from this patent.

    X. STANDARDS CONSIDERATIONS

    Standards are a series of rules which have agreements to ensure that the function and
    the safety of the product. Today, every product in the market complies with a series of
    standards in order to guarantee the marketability. In order to make standards for our
    product properly, we compared the standards of the similar products of us to find the
    distribution, the growth, and the constraints of the design can be achieved in the process
    of making our product and make sure that we followed all the proper procedure.

    The standardization organizations are aimed to formulate and accredit the standards.
    The most recognized organizations in our professions are the Institute of Electrical and
    Electronic Engineers (IEEE), National Institute of Standards and Technology (NIST), the
    American Society for Testing and Materials (ASTM), Underwriters Laboratories (UL),
    American National Standards Institute (ANSI) and International Organization for
    Standards (ISO). These reputable companies earn the trust of the people because they
    assure the products to be safe, reliable, and make sure the functions of the product
    according to the specifications of the standards are complied in the product.

    In this section, we are going to analyze the most relevant standards that will relate to
    the successful implementation of our product and a detailed description of operating the
    standards in our product and achieving the expect standard compliance.

    41

    A. UL 60370 Standard for Automatic Electrical Controls for Household and Similar Use;

    Part 2: Particular Requirements for Electrically Operated Door Locks

    This standard applies to electrically operated door locks. It’s closely related with our
    project. This standard is for all electrically locks which are intended to prevent the
    opening of doors in equipment for household and similar use.
    This standard states that it applies to the inherent safety, to the operating values,
    operating sequences where such are associated with equipment protection, and to the
    testing of door locks used in, or in association with, household and similar equipment.
    This standard is also suitable for door locks for appliances within the scope of IEC
    60335-1. This standard does not apply to door locks designed exclusively for industrial
    applications. This standard is also suitable for individual door locks utilized as part of a
    control system or door locks which are mechanically integral with multi-functional
    controls having non-electrical outputs. Door locks for equipment not intended for normal
    household use, but which nevertheless might be used by the public, such as equipment
    intended to be used by laymen in shops, in light industry and on farms, are within the
    scope of this standard. This standard claims that it is not restricted to household locks.
    This standard presents that it applies to door locks with electrical circuits and control
    circuits which are, for example, operated by magnet coils, memory metals, pressure
    elements, temperature-sensitive expansion elements or electronic elements. This standard
    also applies to manual controls when such are electrically or mechanically integral with
    door locks. Requirements for manual switches not forming part of a door lock are
    contained in IEC 61058-1. This standard does not take into account the response value of
    an automatic action of a door lock, if such a response value is dependent upon the method
    of mounting the door lock in the equipment. Where a response value is of significant
    purpose for the protection of the user, or surroundings, the value defined in the
    appropriate household equipment standard or as determined by manufacturer shall apply.
    It’s an appropriate standard for our project. The rules contained in this standard
    normalized electrically locks and we can use these standardization to improve our project.
    Another part of UL 60370 standard UL 60370-2-9 describes the requirements for
    temperature sensing controls. It is also useful for our project to normalize our sensor
    include in our project. In order to make our project easy to trade and avoid any kind of
    plagiarism, we will comply with standards:
    UL60730
    The requirements for operated door locks

    B. UL1034 Standard for Burglary-Resistant Electric Locking Mechanisms

    This standard is about the burglary-resistance electric locking mechanism. These
    requirements describe the construction, performance, operation and related devices, such
    as control units, control switches and power supplies. This standard also state three
    elements used to determine its maximum effectiveness.

    42

    a) Static strength rating of 500 pounds-force (2224 N), 1000 pounds-force (4448 N), or
    1500 pounds-force (6673 N). See 55.2.1.

    b) Dynamic strength rating of 33 foot-pounds-force (45 J), 50 foot-pounds-force (68 J),
    or 70 foot-pounds-force (95 J). See 55.3.1.

    c) Endurance rating of 100,000 or 250,000 cycles. See 38.2.1.

    These are important factors to determine the safety of lock. We consider to apply
    these requirements to our project. The purpose of this standard is be used in conjunction
    with an access control system or a manual-release mechanism. The burglary-resistant
    electric locking mechanism should be constructed so that it either does not interfere with
    egress through the door or opening cover that is is used to control, or its locking action
    should be capable of being released as required by the authority having jurisdiction if an
    emergency egress is required. This standard refers to all types of electric locking
    mechanisms. In this standard, it declares a product that contains features, characteristics,
    components, materials, or systems new or different from those covered by the
    requirements in this standard, and that involves a risk of fire or of electric shock or injury
    to persons should be evaluated using appropriate additional component and end-product
    requirements to maintain the level of safety as originally anticipated by the intent of this
    standard. A product whose features, characteristics, components, materials, or systems
    conflict with specific requirements or provisions of this standard does not comply with
    this standard. Revision of requirements should be proposed and adopted in conformance
    with the methods employed for development, revision, and implementation of this
    standard.

    After discussion, we decide to follow some rules in this standard and make our
    project more standardized. In order to make our project easy to trade and avoid any kind
    of plagiarism, we will comply with standards:

    UL 1034

    The requirements for burglary resistant electric locking mechanism

    C. UL61131-2 Standard for Programmable Controllers – Part 2 : Equipment

    Requirements and Tests

    This is a part of standard IEC 61131 which stipulates requirements and relevant tests
    for programmable controllers (PLC) and their related peripherals. This standard is
    intended to use the control and command of machines and industrial processes. PLC and
    their related peripherals are intended to be used as open or enclosed equipment. If a PLC
    or its related peripherals are intended for use in other environments, then the specific
    requirements, standards and installation practices for other environments must be

    43

    additionally applied to the PLC and its associated peripherals. This standard can be
    applied to any products performing the function of PLC or their related peripherals.
    Equipment covered in this standard is intended to use in over voltage category II ( IEC
    60664-1) in low-voltage installations, where the rated mains supply voltage does not
    exceed a.c. 1 000 V r.m.s. (50/60 Hz), or d.c. 1 500 V. (If PLC or their related peripherals
    are applied in over voltage category III installations, then additional analysis will be
    required to determine the suitability of the equipment for those applications.) In this
    standard, it also contains rules that equipment operating at more than 600 V is considered
    as high voltage equipment with respect to the requirements in the National Electrical
    Code. This standard does not deal with the functional safety or other aspects of the
    overall automated system. The application programming and the related peripherals are
    considered as components of a control system. PLC safety as related to electric shock and
    fire hazards, electrical interference immunity and error detecting of the PLC-system
    operation are addressed. Refer to IEC 60364 or applicable national/local regulations for
    electrical installation and guidelines. The object of this standard is to establish the
    definitions and identify the principal characteristics relevant to the selection and
    application of PLC and the related peripherals. The another object of this standard is to
    specify the minimum requirements for functional, electrical, mechanical, environmental
    and construction characteristics, service conditions, safety, EMC, user programming and
    tests applicable to PLC and the related peripherals.

    a) service, storage and transportation requirements for PLC and the related
    peripherals(Clause 4);

    b) functional requirements for PLC and the related peripherals (Clause 5);

    c) EMC requirements for PLC and the related peripherals (Clause 8);

    d) safety requirements for PLC and the related peripherals (Clause 11);

    e) information that the manufacturer is required to supply (Clauses 7, 10 and 14);

    f) test methods and procedures that are to be used for the verification of compliance of
    PLC and the related peripherals with the requirements (Clauses 6, 9, and 12).

    This standard is about the programmable controller. We think it’s helpful for our
    project to manufacture a controller for our lock. Therefore we determine to comply with
    these requirements when we are building or project. In order to make our project easy to
    trade and avoid any kind of plagiarism, we will comply with standards:

    UL 61131-2

    The requirements for the equipment requirements and tests part of programmable
    controllers.

    44

    D. ISO 7240-3:2010(en) Fire detection and alarm systems-Part 3:Audible alarm devices

    This standard explains Audible alarm devices contained in fire detection and alarm
    systems. The purpose of this standard is to specify the requirements, test methods and
    performance criteria for audible alarm devices intended to signal an audible warning of
    fire between a detection and alarm system and the occupants of a building. It is intended
    to cover only those devices which derive their operating power by means of a physical
    electrical connection to an external source such as a fire alarm system. This standard is
    also intended to cover audible alarm devices capable of giving voice messages by the
    application of specific requirements, tests and performance criteria. In our project, we
    want to make an alarm on the lock to raise the alarm when someone tries to break the
    lock. Therefore, this standard is useful for us to follow the rules of the alarm part in the
    standard. This standard contains fire alarm audible alarm devices for two types of
    application environment, type A for indoor use and type B for outdoor use.
    The other parts of ISO 7240 standard are also intended to cover

    a) loudspeaker-type devices primarily intended for emitting emergency voice messages
    that are generated from an external audio source

    b) supervisory audible alarm devices, e.g. within the control and indicating equipment.

    All the rules claimed above are available for our project and we intend to follow
    some rules in this standard to create a lock alarm in our project. The objective of building
    an alarm on the lock is to guarantee the safety of the lock in order to make it more
    receivable around the world. In order to make our project easy to trade and avoid any
    kind of plagiarism, we will comply with standards:
    ISO 7240-3(en)
    The requirements for audible alarm devices

    E. UL 2058 Outline of Investigation for High- Security Electronic Locks

    This standard is related to the high security electronic locks designed for attachment
    on doors of safes, chests, vaults and the collects, to provide a means of locking the bolt
    against unauthorized opening. The purpose of this standard is to test the ability of
    high-security electronic locks to resist unauthorized opening for a limited period of time.
    Electronic locks covered by these requirements may or may not have integral protection
    against entry by force. In the standard, it claims that these requirements cover
    high-security electronic locks powered by low-voltage primary batteries, or from Class 2
    AC or DC power sources with secondary or primary standby batteries, or they generate
    their own power as a function of their operation. If the power supply for a high security
    electronic lock is connected to a source of high voltage, the high voltage requirements of
    the standard for power supplies for use with burglar alarm systems shall be applied to
    UL603.

    45

    After researches, the standard UL 2058 is relevant with our project and can be
    applicable to implement our project. In order to make our project easy to trade and avoid
    any kind of plagiarism, we will comply with standards:
    UL603
    The requirements of investigation for high security electronic locks

    F. UL 50V Outline of Investigation for Infrared Viewports

    Standard UL 50V specifies a fixed aperture, consisting of one or more openings or a
    solid infrared transmitting media, surrounded by a mounting bezel or frame, that provide
    a means for the passage of infrared radiation. The purpose of this standard is for factory
    installation in doors or walls of electrical enclosures for installation in ordinary locations
    to allow the use of IR scanners for monitoring temperatures of the enclosed equipment on
    which the viewport is installed, without compromising the integrity of the enclosure with
    respect to access to live parts. Viewports may be investigated for installation in Type 1
    enclosures or enclosures with other environmental ratings. This standard also claims that
    compliance with these requirements does not assure that the infrared viewport is suitable
    for use as a component of an end product. For example, accessibility of live parts is
    investigated with respect to industrial products rated 600 V and below, and additional
    investigation may be required for products rated over 600 V. The acceptability of an
    infrared viewport in any particular application depends upon its suitability for continued
    use under the conditions that prevail in actual service. Accordingly, for a particular
    application an infrared viewport may be affected by the requirements for the equipment
    in which it is used, and it may be necessary to additionally evaluate that infrared viewport
    for features or performance characteristics that are not specified in this outline of
    investigation.
    In summary, some requirements contained in this standard are not completely
    suitable for our project, so we decide to test the infrared remote controller of our project
    and comply with the requirements which can be adopted in our project. In order to make
    our project easy to trade and avoid any kind of plagiarism, we will comply with the
    standards:
    UL 50V
    The requirements of the infrared viewports of the project
    Below is a summary of the whole standards that are related to our project to make an
    implementation of the product:
    UL 60370 Standard for Automatic Electrical Controls for Household and Similar Use;
    Part 2: Particular Requirements for Electrically Operated Door Lock
    UL1034 Standard for Burglary-Resistant Electric Locking Mechanisms
    UL61131-2 Standard for Programmable Controllers – Part 2 : Equipment Requirements
    and Tests
    ISO 7240-3:2010(en) Fire detection and alarm systems-Part 3:Audible alarm devices
    UL 2058 Outline of Investigation for High- Security Electronic Locks
    UL 50V Outline of Investigation for Infrared Viewports

    46

    XI.GLOBALIZATION

    Ever since humans began to cultivate land, there has been a need to protect one’s
    property, especially one’s home. As time passed and technology increased, humans began
    to employ locks to secure such items. Although other areas of technology have improved
    over time, it seems as though the lock has remained relatively the same; even today
    traditional key locks are used on homes, apartments, businesses, and many other
    buildings. These “traditional locks” are made of mechanical components, which allows
    for breaches of security as people can unlock these without the key. A potential way
    around this type of breach is to remove the physical key from the equation and to employ
    digital locks. However, this digital lock will be influenced by local, global, intercultural
    issues, how to solve this problem become the main point for us.

    Our technology and the desire for it seem to grow hand in hand. As our society
    progresses, more people will be willing to change accept new technologies. A prime
    example of this can be seen each time a new Apple product is released. During this time,
    people stand in line and wait just to get the newest product. Although, Apple has a large
    pool of “early adopters” that can be fanatical, it seems as though this is a trend that is
    becoming more prominent across all technology. While we do not believe that people
    will wait in line for days for a digital lock, we do believe that people will be open to this
    product and will readily replace traditional locks with digital ones.

    There are many benefit of digital locks including the eradication of physical keys
    and increased security, but these locks will have a higher price which could prevent some
    from adopting it. However, as indicated by Moore’s Law, the cost prohibitive nature of
    the technology will decrease over time. In this respect, our product will have a reduced
    price without sacrificing security or convenience. Due to the desire for the increased
    security, convenience and decreased price, we believe that our product has the potential
    to be successful at a global level.

    We realize that global acceptance is one of the most important benchmarks for
    success, which is why we chose it as our standard. This will propel us forward and drive
    us to constantly improve our product for our consumers. As globalization has both
    advantages and disadvantages, we will consider all the factors when constructing our
    product. In order for our product to stand out amongst competitors, we will minimize the
    cost and maintain craftsmanship, performance, and universal compatibility. Our product
    must be acceptable around the world and in order to so, it will meet all nations’ standards
    before being introduced into the market. In the following paragraphs, we will introduce
    the items things we considered when designing our product.

    A. GLOBAL AWARENESS
    Global Awareness is a key factor to ensure a successful design. The differences and
    similarities among individuals and groups are key components to consider. Some of these
    include age, ethnicity, gender, cognitive ability, religion, culture, family situations,
    experiences, sexual orientation, and many more. Thus before designing, our

    47

    brainstorming included a significant portion of time to consider the universal nature of
    our design. We identified that people feel very strongly about home security as well as
    the cost of security. Due to this, our product’s security must be robust and have a price
    that is acceptable by the potential customers. As confidence can be conferred upon a
    product by receiving accreditation by an independent organizations, we will strive to earn
    the accreditation of the World Lock Industry Association (WLIA). This accreditation will
    facilitate global acceptance and ensure that our product is safe.

    B. GLOBAL PERSPECTIVE
    In order to develop a global perspective, it is necessary to understand worldwide
    business. Included in this is to establish a link between ourselves and others around the
    world. We have the advantage of designing our product at Florida International
    University because of the variety of cultures and points of view. This will allow us to
    gain valuable insight into worldwide opinions via our survey. In doing so, we will be able
    to understand requirements of potential consumers. Another benefit, intrinsic to our team,
    is our diversity. When combined, the survey results and our team will enable us to
    connect to nearly all cultures of the world.

    C. GLOBAL ENGAGEMENT
    The international standard for Burglary-resistant electric locking mechanisms (UL
    1034-2000) provided us standards from which we designed our product. Furthermore, our
    team personally conducted a survey in our university on students from around the world.
    This provided us with valuable feedback about our product. Aside from this, our senior
    design mentor gave us his real experience and advice to help improve our product. After
    we conclude the survey and had a meeting for “Global Engagement”, we were surprised
    to find that our design has a social, financial and cultural impact around the world.

    Initially we assumed that our product would be accepted all over the world, but we
    soon realized that there were some minor changes necessary to accommodate global
    engagement of the WLIA; most notably, we must comply with the regulation of the
    World Trade Organization (WTO) and organizations, such as the International
    Standardizing Organization (ISO), the International Electro Technical Commission
    (IETC), and the International Association for Electronic Electric and Automation
    Engineering (IAEEAE), which are responsible for controlling standards related to
    products such as ours. These rules and regulations are set, and all must be obeyed in order
    to be successful at the global level.

    D. WORLD TRADE ORGANIZATION[4]
    The World Trade Organization (WTO) is an international organization that deals
    with the rules of trade between nations. This organization functions based on the WTO
    agreements. These agreements were negotiated, ratified, and signed by the participating
    nations. Ultimately, these were put in place to help producers, exporters, and importers
    conduct business fairly. [4] WTO has many principles to make trade free and transparent
    between all participating nations. The pertinent principles will be discussed below.; these
    principles apply to agriculture, textiles and clothing, banking, telecommunications,

    48

    government purchases, industrial standards and product safety, food sanitation
    regulations, intellectual property, and many more industries.

    1) Trade without Discrimination
    No country should discriminate against trading partners. All WTO members
    should be fair and equitable when trading with other members. Under this
    principle, a nation must not favor one nation over another; nor should a nation
    give special favors to one over another. Also, a nation must treat locally-produced
    and imported goods equally once they have entered the market.

    2) Freer Trade
    Members are encouraged to lower trade barriers. In this respect, the barriers
    refer to duties, tariffs, and measure that selectively restrict quantities (such as bans
    and quotas). WTO member are also encouraged to discuss the reduction of
    bureaucratic issues including exchange rates and “red tape”. The idea behind this
    is to promote trade as well as make it easier to trade.

    3) Predictability
    Behind this principles it to encourage members to be predictable. Although
    this seems very simple, the predictable nature of a nation can do much to facilitate
    trade. For example, if a country has very strict standards for important food
    products and uniformly applies them, other members know what is expected and
    can make adjustments accordingly. This principle also allows members to
    understand the economic future of itself as well as other members. Predictability
    and stability go hand in hand and ensure the confidence of members when trading.

    4) Promoting Fair Competition
    The WTO encourages all members to partake in open, fair, and undistorted
    competition. This principles prevents instances such as members creating
    excessive barriers to entry or using subversive pricing techniques to gain an unfair
    advantage. While this issue is a complex one, it is designed to allow all members
    to play on a level field; there are also provide an avenue for recourse in the event
    of a member violate the principle.

    5) Encouraging Development and Economic Reform
    While this principle is aimed at development of less-developed nations, it
    also is concerned with flexibility for these nations. Development refers to the
    progress of a nation’s economy to market economies. In order to achieve this
    development, the developing nations are generally allowed some assistance and
    concessions to allow them to compete.

    6) The Principle of Transparency
    WTO members are advocated to reduce tariffs and trade barriers through
    negotiations based on the operator’s rights and obligations, implied by their own
    economic situation and competitiveness, reduce tariff and trade barriers through
    negotiations, then gradually opening up the market and achieve trade
    liberalization.

    7) The Principle of Liberalization
    Liberalization principle is in order to promoting freedom of trade

    49

    development, people limiting and the removal of all hampered and blocked for
    international trade, which including laws, regulations, policies and measures.

    8) The Principle of Market Access
    Market access principle is the principle that make foreign country’s goods,
    services and capital adequate to join in the market. This principle allows all the
    countries, based on their level of development, to gradually open up the market
    within a certain period, then achieve trade liberalization.

    E. ELIMINATING BARRIERS
    Due to globalization, we believe that the success of our product is directly related to
    its performance. In order to achieve this goal, we must consider the potential barriers and
    how to overcome them. Our barriers can include governmental forms, such as regulations
    and standards. We have realized that the best method to solve the trade barriers is to
    ensure that our design follows the standards which are set up by the authoritative world
    organizations. For example, we have studied some rules which listed by IEEE and ensure
    that our product will comply with all international standards, in order to eliminate trade
    barriers and make sure the design will be a successful one.

    F. COLLABORATION TOOLS
    When our team started on our project, we made a plan on how to accomplish our
    goals based on a set schedule. As a team, we need cooperate in order to stay on track
    according to our schedule. In the case of an unforeseen events, we understand that
    meeting each week may not be possible. To overcome this we have decided to use tools,
    such as Skpye and phone conferencing, to meet. Furthermore, we created a Google Drive
    folder in which we store and share all the useful materials with the entire team. Another
    issue arose from our international team; some members will leave the country during
    winter break. This will be dealt with via e-mail, and the previously mentioned tools, in
    order to meet our deadlines.

    G. INTERNATIONAL CONTACTS
    In order to know whether our project can has potential on the market, we spend time
    to talked with some contacts in China and Germany. We gave them our idea and our brief
    explanation of our project to them, then got some feedback from them. So we
    summarized what have gained from these international contacts in the next following
    paragraphs.
    Our first international contact was a mechanical engineer in China, Mr. ZhenQiang
    Li from Company of Shenhua, Beijng, China. We asked the flaws of traditional lock and
    shared our idea, which let electrical and mechanical technology combined to make a lock.
    He considered our idea is a pretty good idea and our idea solved many flaws in
    mechanical lock. He said although there are some electrical locks in global market now,
    the price of them are very expensive, and our product’s price are very low, so we have a
    great opportunity to beat them in the market.
    Our second international contact was an electrical engineering in Germany, Mr.
    Konrad Adenauer from a lock company named Dirak. He introduced us that people are
    very care about the safety for their houses in European, but seldom people changed their
    lock, because most of them don’t have enough money to buy a high price electrical lock

    50

    for their door. After we introduced our design, he said our product will help people save a
    lot of money and get more security for their family. Furthermore, he considered that we
    can promote our product to the whole world so that all the people can enjoy the benefits
    of our product.
    In conclusion, based on our international contact, we all think that the Chinese
    market is the most potential market in the world. Because China has a lot of industry
    companies, and the labor fee in China is cheap, so we can minimize our product as low as
    possible. Our international contracts inspired us how to improve our design and their
    advice will help compete with existing products in the future market. Now we believe
    that if we considered the all the requirements for globalization, our product will be a
    success in the future.

    XII. HEALTHY AND SAFETY

    The designers can affect the user’s health if they don’t design for sustainability or if
    their designs are not safe. Therefore the health and safety of the product is really
    important to our project. There’s one word recorded by World Health Organization,
    “Health is a state of complete physical, mental and society well-being and not merely the
    absence of disease or infirmity.” It is vital for us to make a safety manual for people who
    wants to buy our product. The purpose of our safety manual is to avoid any risk that may
    be harmful to the users. Some standard safety practices and rules will be contained in our
    project in order to protect the safety and health of the users. The standard such as “All
    devices using 120 Volts AC power should use the copper wire from the value 14AWG to
    carry up to 20A, to 10 AWG to carry up to 30A. ( National Electrical Code Table
    310.16).” will be the basic rule in our safety manual.
    The designers are the crucial part to minimize the risks while building the product. The
    equipment and materials can also be harmful to our health and safety. So we are planning
    to manufacture a manual for users to follow so that we can play our role better in the
    process of solving the safety and health problems. Actually, safety and health issues are
    the foundation of the product and need to be solved through amount of researches before
    designing the other part of the products.
    The safety and health issues are not just about the users but also about the designers.
    As the designers, we will spend much time on practicing to operate the instrument during
    the process of the building our project. We will focus on how to operate the equipment
    correctly first and follow the general safety rules such as avoid wearing rings, metallic
    watchbands and other metallic objects when working near high voltage environment and
    avoid working alone. The other rules like avoid working hot circuits and contacting with
    the contents of any broken electric component are also important for us.
    The dangers can be roughly divided to two variants. One is concealed dangers, another
    is obvious dangers. After researching, we will claim two kinds of dangers in our safety
    manual. The concealed dangers of our new type door lock could be the accidentally
    electric shock when inputting the password on the keyboard. The obvious dangers could
    be finger may be hit when the lock is closing. We need to consider all the conditions that
    may cause the injuries to the users and solve these problems before designing and testing
    the product.

    51

    For the safety and health issues of our project, we will provide a manual that contains
    the instruction for users to follow to use our product correctly. We will also provide all
    the email of the designers for users to contact in order to explain all the potential
    questions of the product.
    In conclusion, the safety and health of the users are the most important part in our
    project and we concerned all the potential dangers very carefully. We believe the users
    will be satisfied with the work we make for the safety of the users. We will also fix all the
    mistakes we make in the safety manual if users contact with us and help users to find the
    solution to solve the safety problems.

    XIII.ENVIRONMENTAL CONSIDERATION

    The most important environmental issues of a product include how to dispose the
    waste of the product and how to recycle the waste material of the product. After our team
    members are aware of how important the environmental issues are, we decide to make a
    plan to make the negative effect of our product to environment to be as minimum as we
    can.
    The first issue we need to focus is the the waste of the electrical product. “e-waste” or
    “Waste Electrical and Electronic Equipment”, normally we called them WEEE. WEEE is
    a waste type material including unwanted or broken electrical appliance. Many
    components of such equipment are considered as toxic or not biodegradable so we take
    much count of the waste material of our project.
    The second environmental issue is about the RoHS (The Restriction of Hazardous
    Substances Directive). The RoHS directive restricts the use of six hazardous materials in
    the manufacture of various types of the electrical equipment. The six substances which
    are restricted are below:
    • Lead(Pb)
    • Mercury
    • Cadmium
    • Hexavalent chromium (Chromium VI or Cr6+)
    • Polybrominated biphenyls (PBB)
    • PBDE (polybrominated diphenyl ether)
    • PBB and PBDE are flame retardants used in some plastics.
    Our project remote control door lock complies with all the rules in RoHS. We
    especially paid attention to avoid using the materials stated in the RoHS.
    The third issue we concentrate on is the Hannover principles. The power consumption
    of our project is very low close to 30 to 40 volts, but we still try to find the ways to make
    our product more sustainable. The Hannover principles can help us to achieve the goal to
    make our product more environmental friendly. We can maximize the long term value if
    we comply with the beneficial Hannover principles.The Hannover principles are
    beneficial for us to make our product more sustainable are below:
    1. The fourth principle: “Accept responsibility for the consequences of design decisions
    upon human, the viability of natural systems and their right to co-exist”
    2. The fifth principle: “Do not burden future generations with requirements for
    maintenance or vigilant administration of potential danger due to the careless creation of
    products, processes or standards.”

    52

    3. The sixth principle: “Eliminate the concept of waste. Evaluate and optimize the full
    life-cycle of products and processes, to approach the state of natural systems. in which
    there is no waste.”
    4. The eighth principle: “Understand the limitations of design. No human creation lasts
    forever and design does not solve all problems. Those who create and plan should
    practice humility in the face of nature. Treat nature as a model and mentor, not as an
    inconvenience to be evaded or controlled.
    The Hannover principles stated above is the guarantee of making our product achieve
    the long term value. Also, we care about the convenient disassemble of our product. We
    consider to make a manual to take down our lock on the door very easily and dismantle
    the lock very easily for users. We will make the disassemble procedure as simple as
    setting up the lock on the door and make every components in the lock very easy to take
    down.
    The last issue we need to concern about the effect to environment is to recycle the
    electrical and electronic materials contained in our product. In order to comply with the
    Life Cycle Assessment( LCA) appropriately to improve the the effect of our product in
    environmental aspects and potential aspects, we avoid using the using the materials
    consist in RoHS and use the LED screen made by glass which are biodegradable to
    ensure to maximize the long term value of our product. We consider our product
    minimize the risk which can be harmful to health and environment. We use a software of
    LCA to simulate the major components in infrared remote control door lock. The figure
    below shows the major components in software LCA evaluation for infrared remote
    control door lock:

    Figure 17 LCA for Infrared remote control door lock

    53

    We also use SimaPro 7.0 to evaluate the effect of Infrared remote control door lock for
    human health and environment. The software we use is Life Cycle Impact Assessment
    (LCIA). As the figure below shows, we can find out the impacts of our product on human
    health, ecosystem quality and resources. The first figure below shows the impact of
    product on three aspects, the second figure shows the impact on categories to indicate our
    product is environmental friendly:

    Figure 18 LCTA for Infrared remote control door lock

    54

    Figure 19 LCIA for Infrared remote control door lock by category

    55

    XIV. SUSTAINABILITY CONSIDERATIONS

    In today’s global market, it is necessary to produce some products and services which
    are not only satisfy environmental safety, but also satisfy sustainable. So, an important
    question remind us, “How will the code lock be a good product to achieve a long-term
    value?” In this world, we have many sources, so selecting components which to make
    product common, environmentally, user friendly, and circulation are what we need to
    consider. Our destination is to design a device which not only can be used for a long term,
    but also it can be recycle the materials when people replace it. At the same time, we are
    going to low the price to let customer enjoy the best product.
    The 51SCM is a normal material for our design, and people can buy it from everywhere,
    but in order to make the product sustainability, we need to find some way to improve our
    design. Firstly, we will do the survey to find out the most useful and the best quality
    materials in this world, actually, we have already found it from China, and the price in
    China is also the best for us. We believe that when our product is introduced to the people,
    it will present a new window to improve this product. And there will be a majority of
    recommendations which from the customers and factories. Then we will adopt these
    advice to achieve our goal, which means make the product more efficiency. When our
    code lock reaches a milestone point, we hope that our design will be one of the standards
    in the official design.

    From some ideas on internet, we are planning to use reliable components which make
    every components run smoothly, each selection is to ensure that our product will run
    properly. The most important part, which means using infrared and code will interact
    through 51SCM. The product used in these ways include an infrared receiver and a LED
    to prove whether the code is correct. This kind of technology usually used on safe box,
    seldom company use this on a code lock. We believe that even if our product have to be
    replaced in the future, our technology will be revolutionary.
    After we design or produce our product, we will find that some components are not
    necessary or can be replaced by others. For example, when we plan to use PCB board to
    test our design, we found that if we use bread board to replaced, we can connect it to my
    DAQ, so we can see how much voltage or current or other materials, based on that, we
    will try to improve our design. In the second procedure of our design, we are going to use
    51SCM to be our main control in our design, but when we found that the same one in
    different place have a large different price, we reconsidered our design, try to find that
    whether the quality of two same components have the same quality. After did a survey on
    this kind of 51 SCM, we found that we can replace it by using cheaper one but same
    quality, which will let our product achieve sustainability.
    Because most of our product’s components will be put in a very small box, so we need to
    organize the room when we make the code lock, because costumer want to use a small
    lock but achieve all the functions. After we organize all the room in this box, we will try
    to connect it to a physical lock, which means mechanical lock. And if necessary, we will
    do many test on customer’s house for free, make sure they satisfy our product, then
    produce it.

    56

    When designing a code lock, we need to take care of every components which we need
    to set up together. We think that our design’s technology doesn’t need be maintained too
    many times, because if it broken or have some problem, we can supply the warranty to
    the customer. Also, it will never expired. Once we achieve our goal, which help people
    save a lot of money and get more security on their house, our design will become one of
    the most important standards for lock field.

    XV. MANUFACTURABILITY CONSIDERATIONS

    In this section, we will present our opinion on how to produce a successful product by
    manufacture, which considered the most important process in the final of our design. In
    this procedure, we will take care of the design which have kinds of perspectives and let
    some manufacturer evaluate our project. This so important process can let we know that
    whether we are creating a product that will which will have an easy way in
    manufacturing, which not only influence our future life, but also a strategy to perfect our
    plan.
    If our product have some problem on manufacturing process, all the procedure which
    follows our plan will be shown before it sells on the market. Design for manufacturability,
    which we call it DFM, is the key process of designing products, which our goal is to
    optimize all the processes in manufacturing. In the rule of 10, it tells us that repair and
    find the problem will cost about 10 times greater than make the product, so we must find
    all the mistake in our plan and action. We think that the DFM will help us to define the
    best price, product quality, compliance, and reliability in standard regulations.
    In the next few following paragraph, we will describe how we are applying DFM to our
    design by discussing the rules.

    A. Strictly selection on components

    One of the method that we are going to use in our design is using standard components.
    This important process will make sure that our product will be produced in correct ways.
    For example, we will use some common parts such as everyone use it before and these
    parts can be bought from everywhere. When we want to buy the led screen, we found that
    some types of led can be bought everywhere, but some of them just can be bought in
    developed countries. In conclusion, we can make sure our customers trust us, low the
    costs of product, and make a easy manufacturing process by using standard components.

    B. Easy to Assemble

    Our product will be assemble by manufacturing and ourselves, so the user just need to
    use a remote to test whether it work. The customer don’t need to worry about assembling
    any parts, even the battery. The user can replace the battery after using it for several years,
    which is a usual process on electronic devices.
    F. Easy to fabricate
    The infrared detector in our design is fundamental modular of all the parts which already
    used before. In order to put them together, we eliminated the possibility of many errors

    57

    by testing assemble of our product, which to ensure that all the components run properly.
    Also, we are considering whether test all the components to ensure that all parts are
    inspected so we can eliminate the costs which we don’t need to spend on further.

    C. Simplifying the design

    Another important aspect of our design is the simplification, which will give us more
    benefits. If we simplify the design, it will ensure that our product is safe, add its
    reliability to customer, and it can help us to create a durable product. We plan to low the
    budget by reducing the number of parts, but not low the quality of the parts. Our main
    destination is to ease the manufacturing process, not only to save money.
    Our team believe that if we obey the above rule to make our product, we will make less
    mistakes in our process, then we can produce a satisfied product to customer. Another
    important thing which we paid more attention was the analysis of the committed cost,
    which show in the figure. In this figure, we can see that all the procedures need to be
    done in order to make a better product. As the figure shows, if we make wrong or bad
    decisions in the early of our design, if we don’t correct it right away, this mistake will
    drag on through the process and we will paid more energy and effort to correct all the
    influence.

    Figure 20 product cummulative cost per phase/time

    XVI.ETHICAL CONSIDERATIONS AND SOCIAL IMPACT

    Ethics will influence one’s or a group’s behavior when they design something. Any
    opinion or advice could be ethical. All the teams must upheld ethical standards. These
    kinds of standards can have a strong impact on our decisions. Whenever some ethical
    standards are violated by some teams, they can be considered as unethical. Ethical
    standards includes honesty, fairness, responsible and so on.

    58

    A. Ethical Considerations

    Ethical considerations can be utilized on both individuals and groups, even the
    whole society as well. Sometimes the individuals may be affected by a group or other
    team members. In order to obey the ethical considerations when we design our project,
    we need to study the IEEE code to avoid ethical problems. We present the IEEE code of
    ethics, to reminder us that we are following these codes all the time. (REF: 7.8 IEEE code
    of ethics, Professional Activities).
    1. To accept responsibility in making decisions consistent with the safety, health, and
    welfare of the public, and to disclose promptly factors that might endanger the public or
    the environment.
    2. To avoid real or perceived conflicts of interest whenever possible, and to disclose them
    to affected parties when they do exist.
    3. To be honest and realistic in stating claims or estimates based on available data.
    4. To reject bribery in all its forms.
    5. To improve the understanding of technology, it is appropriate application, and
    potential consequences.
    6. To maintain and improve our technical competence and to undertake technological
    tasks for others only if qualified by training or experience, or after full disclosure of
    pertinent limitations.
    7. To seek, accept, and offer honest criticism of technical work, to acknowledge and
    correct errors, and to credit properly the contributions of others.
    8. To treat fairly all persons and to not engage in acts of discrimination based on race,
    religion, gender, disability, age, national origin, sexual orientation, gender identity, or
    gender expression.
    9. To avoid injuring others, their property, reputation, or employment by false or
    malicious action.
    10. To assist colleagues and co-workers in their professional development and to support
    them in following this code of ethics.

    In order to obey these ethical codes, we will accept any kinds of suggestions and
    criticism from others. All of us think these advices and criticism are important to our
    product. According to the safety and health of the public, we will focus more on custom’s
    feeling of our product, then make sure they are willing to buy it.
    When we designing our product, our main ethical dilemma is some poor people still
    think our product is too expensive, so they have to bear the risk of theft in their family,
    even form a gap with rich people. Although traditional lock is cheaper, it just contains
    basic mechanical principle. Our product make mechanical and electrical technology
    combined, so we have to raise the price, this will make us in to a dilemma. In order to
    solve this problem, all we can do is to find somewhere can use less money to produce the
    same quality product, and finally we found that China is the best choice.
    In order to solve this dilemma issue, our team came up with 4 schemes shown in the
    following Table. Each scheme has a different result when we decide which one to choose.

    59

    Table 10 Ethical Solutions
    Opinion # Option Description

    1 Expensive components to make sure the lock works well and long life

    2 Normal price components with installation

    3 Normal price components and instruct how to install the lock

    4 Cheap components and instruct how to install the lock.

    The Table introduces the evaluations of each option. The weighted score is based on
    Utilitarianism, Egoism, Rights, and Kantian.

    Table 11 Ethical Evaluations
    Option# Utilitarianism Egoism Kantian Rights Score

    1 1 0.5 0.25 0.5 2.25

    2 0.75 0.25 0.25 0.75 2.0

    3 0.5 0.75 0.25 1 2.5

    4 0.25 0.25 0.5 0.25 1.25

    From the Table XXX Ethical Evaluations, we can see that Option 2 has the highest
    score. Its means that most of people willing to use normal components and install the
    product by themselves, because they can save a lot of money by choosing this method.
    Therefore, when we designing our product, we will follow the best option to satisfied
    customers, and make the maximum benefit for each side.

    B. SOCIAL IMPACTS

    1) Local Culture
    In our daily life, safety is a major concern both in work and home. Although
    technology has advanced significantly, we still use physical documents for sensitive
    information such as financial statements and personal. Protecting items such as these and
    all other valuables that are found in houses/apartments, most important of all human lives,
    robust security of the perimeter is necessary. One of the simplest, yet effective methods
    to securing a home is a strong lock on the doors. While traditional locks are relatively
    safe, they are not infallible. For example, thieves have the ability to pick locks. Also,

    60

    keys can be lost, which reduces the effectiveness of the lock. Traditional locks also have
    the inconvenience of requiring the user to carry a key. Therefore, one could be forced to
    carry multiple keys in an age when people are constantly looking to synchronize different
    facets of life. In respect to this, a remote or password controlled lock could solve the two
    aforementioned shortcomings of traditional locks.

    As science and technology continues to advance, the need for security in the digital
    sphere has also grown. A remote or password controlled lock has the potential to achieve
    increase safety. The desire for high technology and security gave birth to the idea of
    password controlled locks replacing traditional locks. These new locks are safe, low cost,
    low power consumption, easy to operate, and require a password rather than a key.
    Furthermore, our previous survey revealed that approximately 10% of people’s homes
    had been burglarized and felt a traditional lock is not sufficient. Also, more than 84%
    wanted to try the infrared remote control lock, which indicates the potential success of
    this product.

    Our product clearly has the potential to positive social impacts. It has the ability to
    make the life easier for users, while also ensuring security and peace of mind. An
    additional benefit of our design is that users will never need to worry about forgetting the
    keys at home or locking themselves out of the house. In order to provide a viable product,
    our team will improve on existing locks by allowing the user to control the lock from
    great distances.

    2) Global Culture

    Aside from the improvements to individuals’ lives, this product can improve the
    security of organizations, governments, as well as other entities. Our product also has the
    potential to stimulate economies with trickle down effects. For example, this device could
    be adapted for storage companies or banks. If this is accomplished, the users could grant
    access on an individual basis and be able to record exactly who activated the lock.

    Another global applications is that this product can be implemented into less developed
    parts of the world to stimulate economic growth. Certain part of the world suffer from
    corruption and theft; both of these can be reduced with our product. An example of this
    would be to secure vulnerable locations, such as voting locations, in order to prevent
    tampering with the polls. Not only would this secure the results, but it also has the
    potential to provide increased stability to regions and promote democracy wherever
    implemented.

    We recognize the effect of ethical dilemmas, as well as the impact on local and global

    culture, on our product’s ability to achieve large scale acceptance. Our ethical
    considerations included the IEEE code of ethics, IEEE 551-2006, IEEE 14143.1-2000,

    IEEE 450 INT 1-2005, IEEE C 37.59-2007, and IEEE NESCIR552-2008. Granted that all
    ethical dilemmas and social impacts are carefully considered, our project has the potential

    to be accepted globally and will revolutionize the way that people use locks.

    61

    XVII.CONCEPT DEVELOPMENT

    In order to reach a decision with scientific validity, concept development is
    commonly used. In this method, various possibilities are explored. After a thorough
    investigation, the most viable alternative is selected. During this analysis it is imperative
    to consider the impact of various factors on the product before selecting the best option
    form different combinations. Tables and data analysis, we calculate the respective
    weights of various properties which help to make to make informed decisions.

    In our project, we considered four alternatives. Each of these alternative has
    differing characteristics which will be evaluated in this chapter. Our final decision will be
    assisted by a weight table, which assigns different values of importance to different
    characteristics. After careful analysis, we will select the most viable alternative. The
    figure below demonstrates our concept fan.

    Figure 21 Concept Fan

    A. ALTERNATIVE OPTIONS
    Differing combinations of features can reflect the different properties of our product.
    In order to make our products successful and to achieve maximum efficiency, a variety of
    options will be considered. This section will introduce the four alternative which will be
    explored.

    The main components of our product are the Micro Controller, Screen, and
    Password Storage. We considered two different options for each of these components, as
    shown in the concept fan. In the case of the Micro Controller, STC89c51 and AT90S1200
    were considered. LCD and LED were considered for the Screen. AT24C02 and

    62

    ATMega88 were considered for Password Storage.

    Between the two Micro Controllers, STC89c51 is the most widespread used SMC
    and has superior adaptability and stability. However, AT90S1200 has superior speed and
    computing ability. The choice between LCD and LED was not a difficult one due to our
    product’s needs. Although LED has a far superior performance, LCD is the much more
    suitable for our project. Similar to the two Micro Controllers, the Password Storage
    options require careful consideration. Generally, AT24C02 has greater ability to resist
    interference and is a more stable system, but ATMega88 can rewrite more than 100,000
    times and has larger storage space. In the next part, we will consider our four alternatives
    and explore their advantages and disadvantages.

    Alternative 1

    Figure 22 Alternative 1 Configuration

    Alternative 1 combines the STC89c51 (Micro Controller), LCD (Screen), and AT24C02
    (Password Storage). This combination was created as this is the most suitable and
    common combination. In this configuration STC89c51 provides great adaptability, LCD
    is stable, and AT24C02 can execute quickly with no mistakes.

    Advantages Disadvantages

    a. Project will be stable
    b. Limited mistakes
    c. LCD facilitates connection
    d. Ease of establishment
    e. Lowest cost alternative

    a. Low writing speed
    b. High power burden.
    c. Low display effect.

    63

    Alternative 2

    Figure 23 Alternative 2 Configuration

    Alternative 2 is very similar to Alternative 1 in the only the Password Storage component
    is changed. This alternative has the following components: STC89c51 (Micro Controller),
    LCD (Screen), and ATMega88 (Password Storage). In this configuration, the Password
    Storage component has the better performance, larger storage space, and a greater ability
    to rewrite. However, this may not be the most needed capability for our project.

    Advantages Disadvantages

    a. Ease of establishment
    b. Large storage space
    c. Greater ability to rewrite
    d. Faster speed for changing password

    a. High cost
    b. More difficult connection
    c. Not stable
    d. Lower display performance

    Alternative 3

    Figure 24 Alternative 3 Configuration

    64

    Alternative 3 was constructed of a AT90S1200 (Micro Controller), LED (Screen), and
    AT24C02 (Password Storage). This configuration allows for increased running speed and
    has better performance. The use of the LED screen, enabled superior display performance,
    but severely reduces the lifetime of our project.

    Advantages Disadvantages

    a. Improved display performance
    b. Faster running speed
    c. High display performance quality

    a. High power consumption
    b. High power burden
    c. High cost
    d. Difficult to establish

    Alternative 4

    Figure 25 Alternative 4 Configuration

    Alternative 4 combined the AT90S1200 (Micro Controller), LCD (Screen), and
    ATMega88 (Password Storage). This alternative is very efficient due to its components;
    the writing speed is increased while the power burden is decreased.

    Advantages Disadvantages

    a. Highly efficiency
    b. Faster running speed
    c. Low power burden

    a. Difficult to establish
    b. High cost
    c. Not a stable system
    d. Lower display performance

    B. CONCEPT SELECTION

    In order to remove personal bias from the selection process, we considered the
    relative importance of differing objectives. A table was used in order to calculate
    weighing factors; the results of which are displayed below.

    65

    Table 12 Weighted Scores of Objectives

    Stability Ease of Establishment
    High

    Efficiency
    Low
    Cost G.Mean w

    Stability 1 1 5 3 1.97 0.28
    Ease of Establishment 1 1 3 3 1.32 0.19

    High Efficiency 5 3 1 1 1.97 0.28
    Low Cost 3 3 1 1 1.73 0.25

    Total 6.98 1

    The values of the different combinations range from 1 to 5. In this table, 1 indicates
    that the row’s objective is equal to the column’s objective; 3 indicates moderate and 5
    indicates strong. The table was populated with our project’s objectives, each pair was
    rated, and then the G.Mean and weight were calculated. The G.Mean and w (weight),
    shown in the table, was calculated using the following equations:

    !.#$%& = ()*(+*(,*…(.

    /
    0� �

    ! = #.%&'( )*+’,�

    From the previous table our team discovered that the weight of stability (0.28),
    ease of establishment (0.19), high efficiency is (0.28), and low cost (0.25). Following this,
    we created an alternative section table (below). Frist, our team considered if the
    alternatives were safe and stable. Our inspection revealed that each alternative satisfied
    these conditions. Following this, we rated the stability, ease of establishment, efficiency,
    and the cost of each alternate; the weighing factors were then multiplied by the rating in
    order to produce scores for each alternative.

    Table 13 Alternative Selection Table

    Constraints Alternative 1 Alternative 2 Alternative 3 Alternative 4
    Safe Yes Yes Yes Yes

    Stable Yes Yes Yes Yes

    Objectives w Alternative 1 Alternative 2 Alternative 3 Alternative 4
    Stability 0.28 5 1.40 4 1.12 4 1.12 4 1.12

    Ease of establishment 0.19 5 0.95 3 0.57 3 0.57 3 0.75
    High efficiency 0.28 3 0.84 5 1.40 4 1.12 5 1.40

    Low Cost 0.25 4 1.00 3 0.75 3 0.75 3 0.75
    4.19 3.84 3.56 4.02

    As shown in the table above, Alternative 1 received the highest score which
    indicated that it was the best alternative for our project. Although Alternative 1 had the
    highest score, Alternative 4 was a very close second place so if should be considered as
    well.

    Alternative 2 and 3 had very high performing components, but the combination of

    66

    the components was not as cost effect nor easy to establish. When considering the end
    product, a lock mechanism for house (or other similar door) door, a display component is
    needed and the LCD screen will suffice. The lock must also be stable, safe, and low cost.
    To accomplish this, the STC89c51 Micro Controller will be used. Although the
    AT90S1200 is more developed than the STC89c51, for this project it is more important
    to consider the connection, stability, and ease of establishment; this is most applicable for
    our selection. In terms of the Password Storage component, the ATMega88 proved to be
    is too advanced to establish in our lock system.

    XVIII.END PRODUCT DESCRIPTION AND OTHER
    DELIVERABLES

    In this section, we will have a clear description of end product for an infrared remote
    control lock and functions of each component of the project, as will the specifications of
    the part of the design; our lock will be used on doors such as those found on houses, but
    will not be applicable to vehicle’s doors. This is the concept development we followed
    and it indicates how we will deal with the idea for the design we will achieve.

    A. END PRODUCT DESCRIPTION
    Our product will be a multi-function lock. The lock can be securely mounted on the
    door and will be controlled by an infrared remote control or password; while maintaining
    security, our product will be safe and easy to use. This device will be constructed
    primarily of metal. In general the installation procedure will be design to be very simple
    so the product will be widely applicable and accepted

    Visually, our product will look similar to the locking mechanisms found on hotel
    doors. Although this appearance may not be aesthetically pleasing, it can be easily
    modified. Ideally in the eyes of the customer, the appearance will be completely
    customizable. However, this would reduce the economies of scale established when
    producing a uniform product. In light of this, we plan to conduct a survey and research
    current trends in order to design an acceptable appearance.

    Users will be able to gain access using a password or an infrared remote control.
    When using the password option, the system will have the ability to recognize if the input
    it correct or incorrect. If correct, the lock will open and the door can be opened. If
    incorrect, the user will have to re-input the password. If the password is incorrectly input
    three times consecutively, as a safety feature, the lock will not accept any more inputs;
    not even the correct password will work at this point. To override this, the administrative
    password must be used. When using the remote control option, the device will unlock
    once the remote is within the sight distance of the sensor.

    B. FUNCTIONS

    67

    The design is based on the principles of infrared remote control and our product will
    use the infrared remote control technique to build a remote controlled lock. An
    improvement to existing systems that we will incorporate is the ability to use a password,
    rather than just the remote. In this section, we will discuss our project’s functions. The
    functions are divided into three levels: level 0, 1, and 2.

    Level 0
    The diagram below demonstrates the overall functionality of the infrared remote
    control lock. The first diagram shows that the product will work only when it has a power
    supply and input signal. When this occurs, the SCM system will provide an output signal;
    this process will be stable and smooth. Below the diagram, our product is described
    verbally rather than with a diagram.

    Figure 26 Level 0 Functionality Block Diagram

    Table 14 Level 0 Lock functionality

    Module SCM System
    Inputs Input signal voltage: 5V
    Outputs Control signal determining to unlock or lock the smart lock
    Functionality The input /output signal will be recognized as binary; “1” means unlock and

    “0”means lock

    Level 1

    When the key provides an infrared signal, it will be received by the sensor inside the
    lock and transfer it to an electric signal. The electric signal will go through the SCM
    system, which will analyze the signal and produce an output signal. The output signal
    will be received by the second sensor. If the signal is “+”, the lock will unlock; receiving
    a “-” signal will prompt the user to try again. As previously mentioned, if the user inputs
    the password incorrectly he/she will be locked out and a built-in siren will screech.

    68

    Figure 27 Level 1 infrared remote control lock block diagram

    Table 15 Level 1 infrared remote control lock block diagram

    Module Infrared remote control lock
    Input Infrared signal
    Output Electric signal with “+” and “-“

    Built-in siren
    Lock device

    Functionality Lock or unlock and siren screech when necessary

    Level 2

    Within the SCM system, there is a clock circuit which will produce the clock signal
    inside the system via a self-excited oscillator; a block diagram of this can be seen below.

    Figure 28 Level 2 Block Diagram

    69

    Table 16 Level 2 Clock and Reset circuit

    Module Clock and Reset circuit
    Input Infrared signal
    Output High and low level electric signal
    Functionality Deal with input signal and send it to SCM system

    Capacitance C3 and Y1 have the task of maintaining a stable frequency and fast start. The
    magnitude is about 5-30 pF, but the typical value is 30 pF; this is shown below.

    Y1

    11.0592MHz

    C2

    30pF

    C3

    30pF

    18

    19

    Figure 29 Clock Circuit

    Our reset circuit, shown below, will function in the event of a high level hold two
    cycle. The simplest automatic reset circuit is realized by the capacitor of external reset
    circuit charge and discharge. As long as the rate of increase of Vcc is less than 1ms, it can
    realize the automatic power-on reset. In addition to the power-on reset, it may also be
    necessary to press the manual reset occasionally. In order to provide for this eventuality,
    our design provides a reset button (shown below). Resetting can be accomplished by the
    manual reset level mode and pulse mode. Reset is done by RST (9) Terminal and the
    power supply Vcc.

    R1

    10k

    C1

    10uF

    S4VCC
    9

    Figure 30 Reset Circuit

    By analyzing the output signal, the system will take the proper action depending on
    whether the signal is high or low level. A high level signal will tell the device to unlock;
    low level will prompt the user to try again and/or make the built-in siren screech. As a
    whole, this system is stable and reliable.

    70

    C. SPECIFICATIONS
    This design consists of a MCU, matrix keyboard, LCD display, and password
    storage component. The matrix keyboard allows you to enter the digital code and
    function implementations. Users enters a password through keyboard, the SCM system
    compares it with the stored password, and judges whether the password is correct. Then,
    the control system will give and output to the unlock circuit or alarm circuit control.

    The system consists of two parts, hardware and software. Our hardware part is
    comprised of eight components: power supply, keyboard, password storage, reset, crystal
    vibration, display, alarm, and unlock component. All the while, our software includes ten
    programs: main, initial, LCD display, keyboard scan, start, close, built function, password
    set, EEPROM read/write, and delay program.

    1) Marketing Requirements
    a. The design should have excellent security.
    b. The design should have good compatibility and be easy to install.
    c. The design should have a low cost.
    d. The design should have low power consumption.
    e. The design should be reliable.

    2) Specification

    a. Operating Temperature: 20 to 40°C
    b. Operating Pressure: common pressure
    c. Humidity: 25% to 55%
    d. Force: common force
    e. Current: 50nA to 2 mA

    Table 17 Project Specification

    Objective Engineering Requirements Justification

    c, d
    The design should not weigh
    more than 250 g (about 0.55
    lbs.)

    This is similar or lighter than existing products in the
    markets

    b
    The design should have size of
    about 15 cm long and 8 cm
    wide.

    This is the standard size which users prefer.

    d, e
    The design should read currents
    from 50 nA to 2 mA.

    The energy consumption of sensor is very low and the
    product will work normally under extreme situation.

    c The design should cost around
    $80.

    We consider this a fair price compromise between our
    users and the costs based on the user survey and our
    ideas.

    a, e The design should be made by stainless steel.
    This makes our product strong and will avoid being
    damaged.

    The specification in this table shows us how the system works and interacts with the
    user. The input and output are clearly indicated and each module works normally based
    on its functionality.

    71

    Table 18 Input and Output specification

    Level Module Inputs Outputs Functionality

    0 SCM System

    Input
    signal
    voltage:
    5V

    Control signal determines
    lock/unlock

    Dealing with input signal and output
    will be recognized with “1” or “0”, “1”
    means unlock, “0”means lock.

    1
    Infrared
    remote
    control lock

    Infrared
    signal

    Electric signal with “+”
    and “-“.
    Built-in siren
    Lock device

    Lock or unlock and siren screech when
    necessary

    2
    Clock and
    Reset circuit

    Infrared
    signal
    Voltage
    5V

    High and low level
    electric signal

    Deal with input signal and send it to
    SCM system

    D. OTHER DELIVERABLES
    We have made a clear plan and schedule to implement the project. In order to
    combine our original ideas with market requirement and users’ needs, we have conducted
    multiple surveys. Our research discovered that we can show our product in great detail
    but when doing so, we need to be conscious of our audience. Our descriptions need to be
    clear and specify in engineering language and also simple language when it is appropriate.
    Regardless of the audience, it is necessary to include how the product was built, how the
    functions were achieved, and how the system operates. To do this, we will provide the
    following deliverables:

    1) A total completed report, which have figures and specifications.
    2) A PowerPoint presentation to show the product, features, functions, purposes, and

    specifications.
    3) The end product display, including how to manufacture and how to operate it.

    Our end product will be designed and made based on the features and functions
    previously mentioned. We believe that it will work with basic functions and innovative
    solutions. The report provides figures which will make it easier to understand the
    functions of the product.

    72

    XIX. PLAN OF ACTION

    In the plan of action section, our team will demonstrate the responsibilities of each

    teammate by dividing the work and assigning deadlines for each task of our project. Our
    team will prepare well for the whole project, but the meeting scheduling will as more
    compact as we can. Therefore, in order to determine the graphical depiction of the
    process, our team will analyze the distribution of the tasks using open workbench
    software, through the use of Gantt charts, which is shown at the end of the section. As a
    result, this software is important for our team to plan and complete every task that is
    associated with our project, since it can distribute the appropriate duration needed for
    each task. A suitable plan of action for every team member is critical to successfully
    complete the project.

    It serves as a proposal to achieving our aim of completing our design. Utilizing this
    software, we will allocate the appropriate resources needed to accomplish our project
    goals. For this reason, we divided the project into several phases, tasks, and goals.
    Following the plan of action, we established a project timeline and individual work
    assignments. The work was also divided within the design and implementation processes,
    so that given tasks could lead to the completion of project milestones. 


    A. Statement of Work (SOW)

    Research is the fundamental base for our project, so before any design is created, all
    project modules and components should need to be analyzed. Materials and methods also
    should be studied, in order to create the final design. A project outline will be created to
    include software and product drawings.

    1) Scope of Work

    Our design is based on the principle of infrared remote control and microprocessor.
    Besides, the encoder and decoder built into software. Our project includes the SCM
    system (Mainly STC89C51 microcontroller minimum system), 4×4 Matrix keyboard,
    LCD display and alarm system. With the settings, it can modify the six-digit user
    password, Automatic alarm, Automatic Lock, Password error alarm and other functions.
    (P0 port to control the design of the LCD display, Password correctly display password
    ok!Password error display password error! For more than three times to enter the error
    automatically lock. The P1 port control keyboard matrix containing the number keys 0-9
    and A-F function keys). Besides, our project also can be remote controlled by the infrared
    control device. The picture xxx is our software flow diagram.

    The group was divided into three sub-teams:

    Team 1: Yiming Huo and Xuefeng Li, who are in charge of the research.

    Team 2: Shuo Qin and Jing Xiao, who are in charge of the programming.

    73

    Team 3: Xiaolun Zhang, who is in charge of the assembling and testing the product.

    Figure 31 Flow Chart

    2) Location of Work

    Approximately seventy percent of the project will be completed on the Florida
    International University Engineering Campus; the remaining thirty percent will be done
    at our respective homes.

    A portion of the device testing will take place in the Florida International University
    Electrical Engineering labs on the Engineering campus. So our equipment cost almost be
    0 dollar.

    3) Deliverables Schedule

    The Senior Design I presentation is scheduled for December 10, 2015


    The Senior Design II final demonstration is scheduled for April 30, 2016.

    B. Online Structure (WBS)

    An outline structure of a project illustrates essential phases and tasks, to help team
    members identify crucial elements of the project and have a transparent understanding of
    the scope of the project including the roles of the individual team members. Critical
    elements of our project consist of the core microprocessor (STC89C51 microcontroller)
    and the remote infrared transmitter-receiver module. The following chart illustrates an
    outline of the infrared remote control lock project below:

    74

    Figure 32 Project Plan

    1) Phase 1- Core Microprocessor

    In the phase 1, we want to use the STC89C51 microcontroller as a core processor, and
    programming the microcontroller to sort and organize the data that is obtained as well as
    perform any necessary calculations.

    a) Objective
    Utilize the STC89C51 microcontroller and write the appropriate software to crate a

    multifunctional core for our project, and it can control the whole system such as saving
    and changing the password and opening or closing the lock, which can make our product
    more convenient.

    b) Approach
    We will do some research to get more information about the STC89C51

    microcontroller, and we will discuss with our mentor about our programming part and
    our circuit part.

    c) Tasks
    This phase will consist of the following tasks:

    1.1 Research the STC89C51 microcontroller functionality.
    1.2 Research the STC89C51 microcontroller circuits.
    1.3 Research the STC89C51 microcontroller programming.
    1.4 Find the tutorials for the STC89C51 microcontroller.
    1.5 Find the tutorials for writing the program for the microcontroller.

    2) Phase 2- Infrared Receiver and Transmitter Module
    In the phase 2, it contains of the infrared receiver module and the infrared transmitter

    module, which are the signal transmission and reception system and play an important
    role for the whole lock system.

    a) Objective

    75

    The Infrared Transmitter can emit the signal to the main system, and the Infrared
    Receiver will receive that signal and Transmit to the core microprocessor.

    b) Approach
    We will discuss with our mentor about the infrared receiver and transmitter devices,

    and do some research to get the information.

    c) Tasks
    This phase will consist of the following tasks:

    2.1 Research the Infrared Receiver Module.
    2.2 Research the Infrared Transmitter Module.
    2.3 Research the Infrared Receiver Module circuit.
    2.4 Research the Infrared Transmitter Module circuit.
    2.5 Find the tutorials for Infrared Receiver Module.
    2.6 Find the tutorials for Infrared Transmitter Module.

    3) Phase 3- Input Module and Display Screen

    In the phase 3, the Input Module contains of a 4*4 matrix keyboard. Besides, we will
    use a LCD screen, which can display the password and status of the system.

    a) Objective
    The input keyboard will be a small size and lightweight for the clients can easy carry it.

    The LCD screen can display the password and status of the system.

    b) Approach
    We will research some other products that similar to our project, and find some benefit

    for the design of the input keyboard and the LCD screen.

    c) Tasks
    This phase will consist of the following tasks:

    3.1 Research the design of Input Module.
    3.2 Research the LCD circuit.
    3.3 Research the Input keyboard circuit.
    3.4 Find the tutorials for the LCD screen.
    3.5 Find the tutorials for Input keyboard.

    C. Project Milestones

    Milestones are used as indicators of significant events in project development. They

    require unique attention since they represent the success of a phase, and they provide a
    key piece of information for following progressive phases.

    Several project phases or milestones are identified in order to progress with the project.
    Which consists of choosing a proposed project, researching core processor can control
    the whole system perfectly, researching infrared receiver and transmitter devices from

    76

    other similar projects, acquiring programming skills essential for the integrating process,.
    The final hardware will be tested in the lab. During the final phase of the project, the final
    product of this device will be introduced to our mentor.

    D. Timeline

    1) Phase1.1-1.5

    Target date: 11/06/2015

    Stretch date: 12/04/2015

    2) Phase2.1-2.6

    Target date: 12/08/2015

    Stretch date: 01/09/2016

    3) Phase3.1-3.5

    Target date: 01/21/2016

    Stretch date: 03/14/2016

    E. Gantt chart and Pert Charts

    The Gantt chart helps us estimate the start and finish dates of terminal and summarizes
    elements of our project. With it is graphical representation we can represent our team
    project with the developmental segments into phases and tasks with their corresponding
    starting date and ending date.

    77

    Table 19 Gantt chart for time line

    78

    Figure 33 Pert Chart

    As a conclusion, our team divided our project into different phases, tasks, and
    milestones. The Open Workbench software helps us to use of the work down structure
    through tasks, milestones, and baselines that were set. In addition, the software allows us
    for scheduling our project plans with dependencies, assigning resources to tasks,
    scheduling work on tasks over a period time, and adjusting the schedule as actual work
    that is recorded. The software shows charts and diagrams that take into account tasks,
    constraints, dependencies, priorities, and resource constraints, generating the best method

    79

    for project completion.

    Besides, if any task or phase is met early, we could change our tasks by using this
    software, which would give us a final complete budget. Using the Open Workbench
    software, a Gantt chart, a PERT chart, and a Budget were created automatically. Using
    the Gantt chart, we were able to schedule our phases and tasks accordingly. Taking into
    account the Gantt chart, we divided the group into three teams to complete the different
    phases. The PERT Chart produces the best path to implement our tasks, and Open
    Workbench produces PERT charts from the Gantt charts. The budget and its contents,
    such as lab space and equipment cost, will be discussed in depth in a later section.

    XX.MULTIDISCIPLINARY ASPECTS

    There are a lot of factors that influence the success of our project. One of these
    factors is the collective knowledge in electrical engineering. The core of the collective
    knowledge is multidisciplinary aspect of our team. Although most of us are not
    experienced engineer in solving all kinds of problems, we believe our collective
    knowledge can help us to complete our project and help us to learn how to find the
    solution. Our team consists of five electrical engineers, we all made concerted effort yet.
    It is desirable that we all work as a unified team and our variable knowledge and
    experience support us to pursue an outstanding end product. In this section, the
    multidisciplinary aspects of five electrical engineers will be presented.

    1) Xuefeng Li
    Auto CAD Experience
    Skillful at Visual C++
    Matlab Experience
    Control system Experience
    Open Workbench Experience
    Simulink and Multisim software Experience
    As the leader of the team, Xuefeng Li is proficient in Auto CAD and control system.
    He is also very skillful at the theory of the project and the examination of the product so
    he can pledge the function of our product work well and dispose the problem of building
    the circuit and assembling all parts of our project.

    2) Yiming Huo
    Electrical circuit backgrounds
    Matlab skills
    AutoCAD Experience
    Proficient in Visual C++
    Skillful at circuit processing software
    Yiming Huo is experienced in designing code lock. So he will help the team to
    design a code for the lock and handle the problems of how to change the password of the

    80

    lock and how to write a sic digit code for lock. Also, he can help to examine the circuit of
    the lock to make sure that everything goes well.

    3) Jing Xiao
    Power system Experience
    Control system installation
    Proficient in Visual C++
    Risk analysis
    Auto CAD Experience
    Analytical analysis
    Jing Xiao is good at analytical analysis, risk analysis and power system. He will
    make analysis for our project to make sure that we will reduce the risk of our product to
    minimum and he will assist the team to make the power part of our project work well.

    4) Shuo Qin
    Proficient in Control system
    Circuit analysis
    Power system Experience
    Open workbench Experience
    Skillful at Visual C
    Products standard
    Shuo Qin is skillful at Visual C so he can help the team to finish the programming
    part of the project. Also he can design the circuit for the whole project and do the circuit
    analysis for the product.

    5) Xiaolun Zhang
    Knowledge in Power system
    Communication Experience
    Skillful at making plan
    Market analysis
    Auto CAD Experience
    Efficiency Analysis
    Xiaolun Zhang is very skilled at making plan for the project and make schedule for
    the team to finish the product in time. Xiaolun Zhang is also very skillful at market
    analysis so he can ensure that our product has marketable.
    In conclusion, we are confident in our multidisciplinary aspects of knowledge and
    also confident in making an outstanding product. We believe the variable knowledge of
    us can help us to follow the time schedule to finish our project.

    XXI.PERSONNEL

    In this section, we are going to divide the task to everybody of the team in order to
    finish the project. To make this project successful, we analyzed their abilities which each
    member assigned in their resume. Their resumes include education background, which
    can make every member using their skills to improve our design. In our team, all of us

    81

    are studying electrical engineers and some related branches now. We think that these
    kinds of branches can help us a lot in designing our project, which include Electronics
    I&II, Controls Systems I&II, Communications System, Solid State Device, Logic Design
    and Computer Design.

    XUEFENG LI

    1599 SW 113TH AVE., Miami, Florida 33174
    Cellular: (305) 487 – 2663 Email: xli055@fiu.edu

    EDUCATION
    High School diploma
    • Baoding no1. High school

    Bachelor degree
    • Hebei University of Technology,

    Tianjin, China
    Major: Electrical Engineering and
    Automation
    Bachelor degree
    • Florida International University,

    Miami, Florida
    Major: Electrical and Electronics
    Engineering
    AREA EXPERIENCE
    • Visual C++
    • Auto CAD
    • MATLAB
    • Simulink
    • Multism
    • Photoshop

    Business Tools: Microsoft Office Suite
    (Excel, Word, Power Point)
    Open workbench
    WORK EXPERIENCE/
    ASSOCIATIONS
    • Hebei University of Technology,

    Tianjin, China
    • Background
    • Globalization
    • Ethical Considerations and Social

    Impact
    RELEVANT COURSE WORK
    • Power Systems I
    • Control System
    • Electronics I & II
    • Signal and system
    • Fields and Wave
    • Communication System
    • Solid State Devices

    Shuo Qin
    120 sw 109th ave APT 23, Miami, Florida 33172

    Cellular: (786) 620 – 7867 Email: qshuo001@fiu.edu
    EDUCATION:
    High School diploma

    • Yu Xin Middle School
    Bachelor degree

    • North China Electric Power
    University, China.

    Major: Electrical Engineering
    Bachelor degree

    • Florida International University,
    Miami, Florida

    Major: Electrical Engineering

    82

    AREA EXPERIENCE
    • Visual C
    • MATLAB
    • Auto CAD
    • Multism
    • Photoshop

    Business Tools: Microsoft Office Suite
    (Excel, Word, Power Point)
    WORK EXPERIENCE/
    ASSOCIATIONS

    • North China Electric Power
    University, China.

    • Member of the Students Union
    • Help other students learning

    English.
    • Hold the New Year Evening

    Party.
    RELEVANT COURSE WORK

    • Power Systems I & II
    • Control Systems

    • Electronics I & II
    • Communication Systems
    • Solid State Devices

    Jing Xiao

    II. 120 sw 109th ave, miami, Florida 33174
    III. Phone: (786)606-6223 Email: xjing002@fiu.edu

    EDUCATION:
    High School diploma

    • ShaoDong no1. Middle
    school

    Bachelor degree
    • North China Electrical

    Power University, China
    Major: Electrical and Electronic
    Engineering
    Bachelor degree

    • Florida International
    University, Miami, FL

    Major: Electrical and Electronic
    Engineering

    AREA EXPERIENCE:
    • Visual C++
    • MATLAB
    • Simulink, Multism

    • Photoshop
    Business Tools: Microsoft
    Office Suite (Excel, Word, Power Point)

    WORK EXPERIENCE/
    ASSOCIATIONS:

    • North China Electrical
    Power University, BaoDing,
    China

    • ShaoYang Cheng Guang
    Company

    • Senior Design group
    RELEVANT COURSE WORK:

    • Power Systems I, II
    • Control System
    • Electronics I, II
    • Digital Signal Processing
    • Solid State Devices

    Yiming Huo

    9650 Fontainebleau Blvd, Miami, Florida 33174
    Cellular: (786) 303 – 7302 Email: yhuo003@fiu.edu

    Education
    High School diploma

    • Shijiazhuang no2. Middle school
    Bachelor degree

    • Hebei University of Technology,
    Tianjin, China

    Major: Electrical Engineering and
    Automation

    83

    Bachelor degree
    • Florida International University,

    Miami, Florida
    Major: Electrical and Electronic
    Engineering
    Area Experience

    • Visual C++
    • Auto CAD
    • MATLAB
    • Simulink, Multism
    • National Instrument

    Business Tools: Microsoft Office Suite
    (Excel, Word, Power Point)
    Education Work/Association

    • Hebei University of Technology,
    Tianjin, China

    • Group Leader in Circuit lab
    • Help other students learning the

    basic knowledge of circuit

    Relevant Course Work
    • Power Systems I
    • Control Systems
    • Electronics I & II
    • Communication Systems
    • Solid State Devices
    • Field and waves
    • Computer design
    • Signal and system

    Xiaolun Zhang
    120st 109ave apt23. Miami, Florida 33174

    Cellular: (786) 606 – 5380 Email: xzhan063@fiu.edu
    Education:
    High School diploma Education:

    • Shijiazhuang No.43. Middle
    school

    Bachelor degree
    • North China Electric Power

    University, Beijing, China
    • Florida International University,

    Miami, Florida
    Major: Electrical Engineering
    Bachelor degree

    • North China Electric Power
    University, Beijing, China

    Major: Electrical Engineering
    Area Experience

    • Visual C Relevant Course Work:
    • Auto CAD
    • MATLAB
    • Multism

    Business Tools: Microsoft Office Suite
    (Excel, Word, Power Point)

    Work Experience/Associations:
    • North China Electric Power

    University, Beijing, China
    • Rapids Association
    • Action Director

    Relevant Course Work:
    • Power Systems I, II.
    • Control Systems
    • Electronics II
    • Communication Systems
    • Solid State Device

    84

    XXII.BUDGET

    This section will demonstrate the cost associated with bringing this project to
    fruition. A detailed cost estimate was conducted and is demonstrated below. Our budget
    will ensure that resources are used properly and efficiently. The first table, below,
    displays labor and workspace cost. Based on our estimate, the total resources cost will be
    $1500.
    Aside from the labor and workspace, our estimate includes the cost of components,
    hardware, electronics, and tools. Some examples of these include circuit boards, diodes,
    key boards, Hand Soldering, etc. Based on our estimate, the total cost for components
    will be $150.
    When considered as a whole, the cost of resources and components needed for this
    project’s completion sums to approximately $1800; this is demonstrated in the table
    below.

    Table 20 Gantt chart for budget

    85

    XXIII. RESULTS EVALUATION

    In this section, we will focus on the results evaluation of end product. We already
    accomplish most part of our product and it can work with most functions based on our
    expected goal. But there are still some troubles we meet, this section will also state why
    we don’t finish yet. There are also modular concepts provided to ensure results match
    objectives, concepts, objectives, deliverables and specifications mentioned on the
    proposal.
    As described on the proposal, we are going to design an infrared remote control door
    lock, this lock is a multi-functional lock and it can be stable mounting on the door. you
    can open the lock with an infrared remote control or a password. At the same time, our
    product is safe and easy to use. The design should not weigh more than 250 g (about 0.55
    lbs.) so that we can make sure this is almost similar to even lighter than the weight of
    products in the markets. The design should have size of about 15 cm length and 8 cm
    width because this is the standard size so that it is easy for users to accept. The design
    should read currents from 50 nA to 2 mA so that the energy consumption of sensor is
    very low, and the product will work normally under extreme situation. The design should
    cost around $80 as we consider it is a proper price which makes a balance between our
    users and the costs based on the user survey and our ideas. As well as the design should
    be made by stainless steel so that our product can be strong enough and will avoid being
    damaged. In case of the Micro Controller, STC89c51 is the most widespread used SMC
    and has superior adaptability and stability, so we used this SMC for our product. At the
    same time, we used LCD for the screen. ATT24C02 was considered for Password
    Storage.
    We have analyzed the most relevant standards that will relate to the successful
    implementation of our product and a detailed description of operating the standards in our
    product and achieving the expected standard compliance. The standardization
    organizations are aimed to formulate and accredit the standards. The most recognized
    organizations in our professions are the Institute of Electrical and Electronic Engineers
    (IEEE), National Institute of Standards and Technology (NIST), the American Society
    for Testing and Materials (ASTM), Underwriters Laboratories (UL), American National
    Standards Institute (ANSI) and International Organization for Standards (ISO). These
    reputable companies earn the trust of the people because they assure the products to be
    safe, reliable, and make sure the functions of the product according to the specifications
    of the standards complied in the product.
    In conclusion, we made a successful product which meet the excepted goal, and all
    parts walk on time. We did our best to make our product have common standards and
    good globalization. We believe our product will be accepted by the market.

    86

    XXIV. LIFE LONG LEARNING

    When we made the decision to design an infrared remote control lock as our senior
    design project, we knew we were doing a great job. We all know nothing is more
    important than the Security of life and property, so our project are closely related to
    people’s lives. We also understand that we should practice ourselves to adapt the fast
    changing of market, and we are supposed to think about the requirement of the market
    then adjusting our idea to meet them.
    Actually in this project, we want to make a functional remote control door lock
    because of the living examples happened to one member of our group. One of our team
    members, Li, shared his experience with us that his house was stolen when he was young,
    and it caused a lot of damage to the property. Li said that the thief easily opened the door
    of his house. He hopes that there is a lock which is strong enough to protect people’s
    house from being broken into. We come together with Li to design a lock and we believe
    it can make contribution to the security of house.
    We made a clear plan and schedule to implement our project, we will have a prefect
    prototype in this semester, next semester we will work more and begin to design our final
    product based on the prototype. Before next semester, we will have time to think about
    our idea and do more research on it. At the same time we will try to find new technology
    which can make our product stronger but will not increase the pressure of budget. We
    should prepare for developing any new technology that are available to our product. It is
    a chance to study new technique and participate in the creation.
    All of our team know the importance of life-long learning. The work we finished now
    is not the end, and the final product we will finish next semester will also not be the end.
    We all know the most important thing for us is developing an agile mind and
    extraordinary hands-on ability. We are confident that we will make a lot of progress after
    we finish both of our design by the end of next semester. All hard working and new
    knowledge we learned will benefit us a lot.

    XXV. APPENDIX

    A. Team contract

    After discussion,our team member agree to follow the following conditions:
    1. I agree to follow rules and guidelines that have been attained and established by the
    team in a “majority of votes”decision.

    87

    2. I will demonstrate great interest to participate in class, share my ideas and discuss them
    openly with other team members.
    3. I am solely responsible for any assigned material by the team. I will submit my work
    on time and in good shape.
    4. In case of an unforeseen absence it is my responsibility to promptly contact my team
    members and learn of any new material. An announced and anticipated absence is greatly
    appreciated.
    5. I am not allowed to abandon my team under any circumstances.6. The team holds the
    right to release me after the third (3rd) warning (decided by majority of votes), I am
    thereof entitled to file an appeal to the class professor and request arbitration.
    7. My performance is regularly reviewed and openly shared by the team. In case of a
    negative performance (decided by majority of votes) I will be issued a written warning.
    8. Reason(s) to issue a warning may be but are not restricted by the following reasons:
    a. Unable to submit an assignment on time.
    b. Lack of team participation.
    c. Obscene and improper conduct.

    The signature of every team member:

    ________________________________________________________________________

    Xuefeng Li Yiming Huo

    Jing Xiao Shuo Qin

    Xiaolun Zhang

    B.Intellectual Property Contract

    Criteria for inventor ship being used for the senior design team, is the same criteria
    used in the US Case Law, Court Opinions & Decisions. This criteria states that an
    Inventor of a product is any person associated with the invention and designing process.
    This criteria will be distributed among all team members, as well as our mentor Dr.
    Gustavo Roig, since he will provide intellectual guidance.

    88

    Criteria for declaration of Inventorship being used for the senior design team, consists
    of a team member contributing a significant amount of intellectual work and ideas to the
    invention and designing process. Our mentor Dr. Gustavo Roig will be acknowledged
    with declaration of Inventorship through his intellectual input and mentoring.
    The invention spokesman will be the inventor representative of the invention. All the
    Co-Inventors will mutually decide who the Invention Spokesman will be for the
    invention. If a mutual decision cannot be made among the Co-Inventors, the Team
    Leader of the senior design team will act as the Invention Spokesman.
    The mechanism for the intellectual property decision making process, will be
    conducted by a team consensus and mutual agreement on what percentage of the
    intellectual property is distributed individually among the Inventors. This will be based
    on the amount of work and intellectual contribution provided by that respective
    Inventor.
    Profit that is generated during and after the project designing process, will be split
    among Inventors equally. Each inventor gains 20% of the profit.

    89

    XXVI Senior Design II Procedures

    Course Number: EEL 4920 Semester: Fall 2015

    Reference Number: Faculty Name:

    Senior Design I Instructor’s Name: Dr.Gustavo.Roig

    Team Leader Name: Xuefeng Li PID:5462535

    Major: Electrical Engineering Discipline/Specialization: Research and
    Theory

    Phone Number: (305)487-2663

    Other Member Information:

    Name

    PID

    Major(e.g. Electrical,

    Computer, Civil)

    Discipline / Area of

    Specialization
(e.g.

    Communications,

    Powers,

    Transportation)

    Yiming Huo 5596507 Electrical Engineering Research and Theory

    Xiaolun Zhang 5577546 Electrical Engineering Assembling and
    Testing

    Shuo Qin 5576977 Electrical Engineering Programming
    Jing Xiao 5577719 Electrical Engineering Programming

    Proposed Project

    A. Project Title: Infrared Remote Control Code Lock
    B. Design Specifications(Please List items)

    1.Dimensions: At most 20cm*15cm*6cm (L*W*H)

    2.Weight: At most 500g
    3.Power Supply: Battery
    4.Micro Controller: STC89c51
    5.Screen: LCD
    6.Password Storage: AT24C02
    7.Operating Environment Wet: 25%-55%
    8.Operating Environment Temperature 20degree-40degree
    9.Working Life: More than 10years

    C. Design Constraints. (Marketing, Economic, Durability, Safety, Ethics, Culture, Patents)

    90

    1 The Lock must fit any door.
    2 The price must under 100dollars.
    3 The life time must longer than 5years.

    D. Project Evaluation/Testing Criteria

    1. When we do the test, the key must be linked correctly, admin password must be valuable, that is
    mean when the user forgets password admin password can reset password.

    2. When the password is entered correctly, the lock operating well.
    3. Our locks need to work under different environments, different environments are normal hot

    weather and cold weather.

    E. Initial research results. Analysis and synthesis, procedures to be pursued. Evaluation of alternate

    solutions.
    At present, the parts we can determine are micro controller. Screen. Storage password. We have

    different combinations for these three parts. Through concept development. We have the final result.
    Because the efficiency of this combination is the highest. Is also the most suitable for our project. We
    choose STC89c51 for micro controller. LCD for screen. AT24C02 for the password storage.
    On this basis. We make the part of the connection. STC89c51 has the lock program inside. We will
    first test the circuit board connection. If it runs well. We will carry out the physical connection. In the
    future. We will install the lock on doors. Let our project have a real lock function.

    F. Multi-Disciplinary Areas Involved in the Project


    Our project mainly involved two subject areas. The Electrical engineering and Computer
    Engineering. We are all Electrical engineering. But we can study the computer engineering knowledge
    or find someone help us with the programing problems.

    G. Team Assignments

    Xuefeng Li: Research and Theory
    Yiming Huo: Research and Theory
    Xiaolun Zhang: Assembling and Testing
    Shuo Qin: Programming and Connection
    Jing Xiao: Programming and Connection

    H. E-mail address and phone number and PID of ALL team members

    Name PID Email Address Phone Number
    Xuefeng Li 5462535 xli055@fiu.edu 305-487-2663
    Yiming Huo 5596507 yhuo003@fiu.edu 786-303-7302

    Xiaolun Zhang 5577546 xzhan063@fiu.edu 786-606-5380
    Shuo Qin 5576977 qshuo001@fiu.edu 786-620-7867
    Jing Xiao 5577719 xjing002@fiu.edu 786-606-6223

    PRINT SIGNATURE DATE
    Team Leader Xuefeng Li
    Team Member Yiming Huo
    Team Member Xiaolun Zhang
    Team Member Shuo Qin
    Team Member Jing Xiao

    Senior Design I Coordinator

    Mentor Dr.Gustavo.Roig

    91

    References
    [1] Tarantola, Andre. “August Smart Lock Review: A Great Lock That Moves With
    You.” Gizmodo. N.p., 14 Oct. 2014. Web. 04 Nov. 2015.
    [2] Company, Lockstate. “RemoteLock 6i.” RemoteLock. Geeks News Desk, 22 Aug.
    2015. Web. 04 Nov. 2015.
    [3] Warehousedeals, Amazon. “ITouchless Bio-Matic Fingerprint Door Lock.” N.p., 19
    July 2004. Web.
    [4] “WORLD TRADE ORGANIZATION.” World Trade Organization. N.p.,n.d. Web.
    29 Mar. 2015.

    __MACOSX/._senior 模板-1

    IEEE Communications Magazine • November 201524 0163-6804/15/$25.00 © 2015 IEEE

    The authors are with
    Florida International
    University.

    INTRODUCTION
    The importance of senior design courses and
    projects as a fundamental source for document-
    ing the achievement of ABET’s student out-
    comes [1] is widely recognized [2–4]. Some of
    ABET’s indicated outcomes such as “(c) an abil-
    ity to design a system, component, or process to
    meet desired needs within realistic constraints
    such as economic, environmental, social, politi-
    cal, ethical, health and safety, manufacturability,
    and sustainability”, and “(f) an understanding of
    professional and ethical responsibility” [1], are
    often used as standards to allow the use of senior
    design courses as an assessment tool during
    accreditation. We can safely say that instructors
    entice their senior design students to illustrate
    their understanding and fulfillment of the needs
    expressed in outcomes (c) and (f) when writing
    the final project reports.

    At Florida International University’s Depart-
    ment of Electrical and Computer Engineering

    (FIU-ECE) we see senior design as a multi-
    faceted experience that we often summarize as
    “project management with an example.” The
    example is represented by the students’ project
    designs in compliance with ABET’s outcome (e):
    “an ability to identify, formulate, and solve engi-
    neering problems.” On the other hand, project
    management is inspired by ABET’s outcomes (c)
    and (f) described earlier, as well as outcomes (d)
    and (g), which relate to communication and
    team work [1]. Our senior design courses have
    been certified by the Writing Across the Cur-
    riculum (WAC) program and the Office of Glob-
    al Learning Initiatives at FIU. With these, we
    aim to teach our students minimization of the
    barriers to trade and global success. In particu-
    lar, we discuss topics related to the World Trade
    Organization (WTO), international standardiza-
    tion bodies, the International Electrotechnical
    Commission (IEC), the International Organiza-
    tion for Standardization (ISO), and the Interna-
    tional Telecommunication Union (ITU). Our
    Senior Design Experience is divided into two
    semesters. During the first semester students
    learn topics directly associated with ABET’s out-
    comes and write a comprehensive project pro-
    posal. During the second semester, students
    execute the project design and write the final
    report. There are several senior design projects
    every semester related to wireless communica-
    tions and networks.

    At FIU-ECE we place great importance on
    ethical considerations and societal impact in
    s e n i o r d e s i g n p r o j e c t s , i n a l i g n m e n t w i t h
    ABET’s outcomes (c) and (f). When dealing
    with ethics in senior design, recent works [5–7]
    use “The Code Model” for analyzing the code
    of ethics for engineering societies and corpora-
    tions. The problem with this approach is that
    sometimes ethical codes do not address an ethi-
    cal situation adequately, or do not address it at
    all. For this reason, in addition to the codes of
    ethics, we introduce the students to the process
    of making decisions based on ethical theories:
    “ T h e T h e o r y M o d e l . ” T h i s m o d e l p r o v i d e s
    guidance in making ethical decisions when the
    code model is not adequate. For the solution of

    ABSTRACT
    Wireless communications engineers may face

    complex ethical dilemmas while designing prod-
    ucts for consumers. At Florida International
    University’s Electrical and Computer Engineer-
    ing Department, we place great importance on
    training our students to address such ethical
    dilemmas, in alignment with ABET require-
    ments. To this end, an ethical training frame-
    work is integrated into our two-semester senior
    design project course. In addition to the codes of
    ethics, our students use “The Theory Model” to
    make decisions based on ethical theories. For
    the solution of ethical dilemmas by means of
    ethical theories, they apply a modified version of
    the line drawing method. In this article we briefly
    explain the theories and methods that our stu-
    dents consider when facing ethical dilemmas.
    Then we present excerpts from four past senior
    design projects related to wireless communica-
    tions. We also summarize the methodology the
    students use for identifying the best option to
    address ethical dilemmas.

    COMMUNICATIONS EDUCATION AND TRAINING

    Wilmer Arellano, Ismail Guvenc, and Nezih Pala

    Integration of Ethical Training into
    Undergraduate Senior Design Projects on
    Wireless Communications

    ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 24

    IEEE Communications Magazine • November 2015 25

    ethical dilemmas by means of ethical theories,
    we use a modified version of the line drawing
    method presented in [8].

    When preparing their project proposal and
    the final report, our students show their under-
    standing of IEEE’s code of ethics and further
    reflect on some of its canons that particularly
    relate to their project. In addition, our students
    must perform a broad search and identify an
    ethical issue that relates to the project, which in
    the event that it happens, would not be ade-
    quately analyzed by the code of ethics. Subse-
    quently, the students are required to use ethical
    theories based on the Theory Model. This leads
    to interesting analysis of ethical issues by the
    students, where ethical analysis is sometimes
    highly hypothetical, but nevertheless it creates
    awareness for the students that sometimes engi-
    neers should step a little bit into philosophy.

    The rest of this article is organized as follows.
    The following section shows the elements that
    our students consider when facing ethical dilem-
    mas and societal impact while they are working
    on their senior design projects. Then we present
    excerpts from four past senior design projects
    related to wireless communications, as examples
    of the students’ ethical considerations. The fol-
    lowing projects are selected to demonstrate the
    results of our approach:
    • uPark Assistant for vehicular ad-hoc net-

    works
    • GSM Relay Copter
    • Copter Triangulation Locator
    • Visible Light Communications
    The final section concludes the article.

    ETHICAL CONSIDERATIONS AND
    SOCIETAL IMPACTS IN

    SENIOR DESIGN PROJECTS

    At FIU-ECE we consider that IEEE and its
    code of ethics represent important guidelines for
    both electrical and computer engineering majors.
    In their project proposals and final reports, our
    students must explicitly express that they are in
    compliance with IEEE’s code of ethics, and
    highlight those canons when describing the main
    significance to their project. Students must find
    a complex dilemma related to their project,
    which cannot be adequately addressed by the
    code. Subsequently, this complex dilemma has to
    be resolved using the Theory Model.

    Finding a complex ethical dilemma is not
    always an easy task. In order to help the stu-
    dents in this process, we suggest that the stu-
    dents consider these possibilities:
    • Projects that pose an ethical dilemma. To

    illustrate this approach we analyze the case
    of “Robot workers versus human workers”
    [9]. In this example, the workers can be
    negatively affected by losing their job to a
    machine.

    • Projects that help solve an ethical dilemma.
    We illustrate this approach with the case of
    “The Intelligent Wheel Chair” [10]. In this
    example, the handicapped individuals are
    positively impacted when an intelligent
    wheel chair helps them obtain a job.

    • Projects in which flaws in the design create
    an ethical dilemma. We illustrate this
    approach with “Silicon Valley Programmer
    Indicted for Manslaughter” [11]. In this fic-
    tional scenario, the harm caused by a faulty
    design is shown.
    From the many different ethical theories

    available, we made a selection of four theories
    that we believe have strong relation to engineer-
    ing ethics. These theories are:
    • Utilitarianism: The morally right action is

    the one that generates the greatest benefit
    (or least amount of harm) for the greatest
    number of individuals.

    • Ethical Egoism: The morally right action is
    the one that safeguards and/or promotes your
    own or your organization’s best interests.

    • Kantian Ethics: The morally right action is
    the one that is based on rules, obtained by
    rationality, and will also be followed in sim-
    ilar situations.

    • Rights Ethics: The morally right action is
    the one that respects society and the indi-
    vidual’s rights.
    The first two theories are called Consequen-

    tialist, as the goodness of actions is based on the
    consequence of those actions. The last two theo-
    ries are referred to as Non-Consequentialist, and
    they represent two faces of the same coin. Kan-
    tian Ethics basically establishes that we have the
    duty to perform the morally correct actions, but
    at the same time, each duty is associated with
    other people’s right. Our students use Kantian
    and Rights Ethics in their analysis, as looking
    from the opposite points of view of duty and
    right helps in the analysis.

    In [8] the author proposes a “line drawing
    method” to solve ethical dilemmas. A line seg-
    ment is drawn; the left end is associated with a
    morally incorrect extreme, while the right end is
    associated with a morally correct extreme. Sever-
    al options are presented to solve the dilemma
    and placed on the line according to their level of
    goodness. An option that is better than the other
    should be closer to the right. The solution would
    be the option closest to the right end. The prob-
    lem with this method would be that the options
    could be placed on the line subjectively. To help
    minimize this problem, we use a scoring system
    where we chose the option with the highest
    score. The score for each option is obtained by
    summing up how well it satisfies the different
    ethical theories. A score of 0 represents not sat-
    isfying the theory, while a score of 1 represents
    full satisfaction. Accepted score values are 0,
    0.25, 0.50, 0.75, and 1.

    We illustrate the method by presenting the
    options and scores of one of the student’s exam-
    ples that we present later. The team designing
    the uPark Assistant [12], after selecting their
    topic, found that privacy is an important issue
    when designing VANET applications. Ignoring
    the problem would be unethical while solving
    the problem would prevent them from complet-
    ing the project on time. In Table 1 we show the
    options they presented, while in Table 2 we show
    the scores they determined. Options 2 and 3
    were highly egoistic and received very low scores.
    The team chose Option 1 as their solution. This
    option produced the greatest good, respected

    At FIU-ECE we con-

    sider that IEEE and

    its code of ethics

    represent important

    guidelines for both

    electrical and com-

    puter engineering

    majors. In their pro-

    ject proposals and

    final reports, our stu-

    dents must explicitly

    express that they are

    in compliance with

    IEEE code of ethics,

    and highlight those

    canons on main sig-

    nificance to their

    project.

    ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 25

    IEEE Communications Magazine • November 201526

    people’s rights, and the score to become a rule
    was 0.5. The score to become a rule was not per-
    fect, because the solution would be available after
    the product sold and not at acquisition time.

    Students are also required to write an essay-
    type sub-section on social impact. They need to
    write about how the project will contribute to
    local culture and global culture. In this section
    they include data obtained using two instru-
    ments: a survey they are required to create and
    run, and international interviews they are
    required to conduct. Both instruments gather
    acceptance questions along with technical ques-
    tions from potential users.

    SAMPLE PROJECTS AND
    ETHICAL COMPONENTS

    In this section we will present four example
    senior design projects related to wireless com-
    munications and networks, which have been
    recently carried out at FIU-ECE. We will also
    discuss how the students have handled ethical
    aspects of the projects.

    PARK ASSISTANT

    uPark Assistant is a VANET application intend-
    ed to help drivers find parking spots efficiently.
    In this system vehicles interact with a centralized
    server in a parking lot/garage. Upon connection
    and service acceptance, the system displays the
    nearest vacant parking location, and based on
    the GPS coordinates provided by the vehicle’s
    onboard unit, directs the driver to the nearest
    vacant location. Once parked, the system keeps
    track of the vehicle’s position and length of stay.
    Lastly, after the vehicle leaves the location, the
    system will store the parking lot usage data and
    update the database to make the spot vacant for
    the next vehicle.

    After some research and analysis, the stu-
    dents became aware that privacy would be an
    issue, since the communication with the vehicle
    could provide information on the driver’s loca-
    tion. The students analyzed the dilemma using
    the theory model, and considering the following
    options:
    1. Inform users that a new feature will be

    added to the design in order to prevent
    access to this information.

    2. Ignore the chances that the location track-
    ing information can be misused;

    3. Let the users know that this may happen,
    but do not offer any help.
    The resolution of the ethical dilemma, after

    applying the method, was “1. Inform users that a
    new feature will be added to the design in order
    to prevent access to this information.” The
    implementation was left for a hypothetical fea-
    ture as this change would have exceeded the
    allotted time to complete the project.

    GSM RELAY COPTER
    Wireless communications and network infra-
    structure can be damaged during natural disas-
    ters and terrorist attacks. For example, the 2011
    Tsunami in Japan severely damaged the cellular
    network infrastructure, which negatively affected
    search and rescue operations, emergency com-
    munic at ions , and c oor dinat ion am ong first
    responders [13]. In this senior design project, the
    students developed an unmanned aerial vehicle
    (UAV) system based on a software defined radio
    (SDR) platform (see Fig. 1), which can be rapid-
    ly deployed for use in emergency communication
    scenarios [14]. In particular, the UAVs can serve
    as flying GSM base stations and provide cellular
    network coverage to users within their vicinity.
    The universal software radio peripheral (USRP)
    equipment is used as the SDR equipment, and
    they are controlled via Beagle Bone boards that
    run OpenBTS software for implementing the
    GSM technology.

    After some research, the students identified
    the following ethical and privacy related issues
    related to the use of the developed technology:
    • The t ec hnology c an b e ab used by those

    savvy enough to use the device to disrupt
    calls, push their own information onto a
    network, or drop into private conversations.
    The data that can be acquired by such
    means is desired by those who commit fraud.

    • The physical device can be hazardous to
    those who are not cautious of the blades of

    Table 1. Possible solutions.

    Table 2. Possible solutions score.

    Option # Description

    1
    Tell users a new feature will be added to the design in order to
    prevent access to this information.

    2
    Ignore the chances that the location tracking information can be
    misused.

    3 Let the users know this may happen, but do not offer any help.

    Theories

    Option # Utilitarianism Egoism Rights Kantian Score

    1 1.00 0.00 1.00 0.50 2.50

    2 0.00 1.00 0.00 0.00 1.00

    3 0.00 1.00 0.25 0.00 1.25

    Figure 1. A senior design student at FIU, work-
    ing on the GSM relay copter prototype [14].

    ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 26

    IEEE Communications Magazine • November 2015 27

    the propellers, which move with sufficient
    speed to injure an irresponsible operator.

    • The batteries can combust if not properly
    maintained and might burn users who are
    not cautious while servicing the device.
    The students came up with four options to

    deal with the ethical issues:
    1. Add a warning label about rogue users.
    2. Restrict access to users by using a user code

    or number.
    3. Implement frequency hopping of data so

    other parties cannot easily sniff data.
    4. Issue user or code number and frequency

    hopping.
    After utilizing the scoring mechanism as in Table
    3 for four different ethical theories, option 4
    received the highest score, and students pro-
    ceeded with this option.

    The students also investigated the social
    impacts of their project. For example, search
    and rescue operations were identified as a major
    application, in which their device can be used to
    create communications in places where a person
    is lost. As an example, they specified the Florida
    Everglades, which is a dead spot for communica-
    tion. By creating a private GSM network in the
    Everglades, a stranded person can call for help.
    Another interesting use case is for crashed
    planes where a large area needs to be covered.
    The GSM Network Copter can comb the area
    and look for cell phones that are active. Once a
    ce l l p hone is identified, the GSM Networ k
    Copter can notify the search and rescue team of
    the location.

    COPTER TRIANGULATION LOCATOR
    This project aimed to develop a low-cost, accu-
    rate, efficient, and practical localization system
    using a quadcopter and software defined radio
    equipment such as USRPs. Such a product can
    be utilized to help locate missing people in large
    outdoor areas. By integrating different engineer-
    ing concepts, i.e. a triangulation algorithm from
    software engineering, analog and digital signal
    processing, and wireless communication, the
    final product is envisioned to be an inexpensive
    deployment of triangulation techniques to be
    used in search and rescue operations [13]. The
    effectiveness of the system is validated using
    appropriately selected test cases and verification
    procedures. The design complements the exist-
    ing localization methods by extending the oper-
    ating scope into UAV based scenarios.

    After some research, the students specified
    an ethical problem as follows: one of the quad-
    copters can go awry and decrease the accuracy
    of the whole system based on statistical data
    gathered. The students identified five ways to
    deal with this problem:
    • Deny the existence of the problem.
    • There is deviation in the system, the cus-

    t o mer is informed of it, but no help is
    offered.

    • A warning label says that the deviation
    should not be used for certain applications.

    • Recall notices are sent out, and all deviated
    copters are replaced.

    • Replacement copters are offered only if the
    customer notices the problem.

    Using the scoring system of the theory model, as

    shown in Table 4, Option 4 received the highest
    score, and was chosen as the resolution mechanism.

    VISIBLE LIGHT COMMUNICATIONS
    Recently, a rapid increase in the number of
    mobile devices has pushed the radio frequency
    (RF)-based wireless technologies to their limits.
    This RF spectrum crunch has motivated the
    research community to look for solutions and
    alternative spectrum resources. A promising
    approach is to use the optical spectrum bands to
    complement the legacy RF technologies. The
    concept, known as optical wireless communica-
    tion (OWC) or free-space-optical communica-
    tion (FSO), loads the directional optical beams
    via non-negative modulation techniques and
    demodulates the light beam on a passive receiv-
    er, which is typically a photodetector (PD).

    When the visible optical spectrum band is
    used, OWC/FSO translates into a particular
    f or m k nown as v is ib le light c ommunic at ion
    ( VLC) [ 15] . VLC is of int er es t par t ic ular ly
    because its transmitters are light emitting diodes
    (LEDs), which are also the same devices used
    for solid-state lighting (SSL). The integration of
    VLC into SSL modules presents a great oppor-
    tunity for a range of applications beyond just
    lighting and illumination. In this project the stu-
    dents aimed to build a multi-transceiver VLC
    access point in the form of a desk lamp using
    off-the shelf components with a price tag of
    $200. Along with all the technical, economic,
    environmental, and social aspects of the project,
    the students also discussed its ethical challenges.

    Throughout their project the students fol-
    lowed the IEEE Code of Ethics, which states “to

    Table 3. Possible solutions score.

    Theories
    Option # Utilitarianism Egoism Rights Kantian Score

    1 0 1 0 0 1

    2 0.25 0.5 0.25 0.25 1.25

    3 0.5 0.75 0.75 0.5 2.5

    4 1 0.25 1 1 3.25

    Table 4. Possible solutions score.

    Theories
    Option # Utilitarianism Egoism Rights Kantian Score
    1 0 1 0 0 1

    2 0 1 0.25 0 1.25

    3 0.25 1 0.25 0.25 1.75

    4 1 0 1 1 3

    5 0.25 0.75 0.25 0.25 1.25

    ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 27

    IEEE Communications Magazine • November 201528

    seek, accept and offer honest criticism of techni-
    cal work, to acknowledge and correct errors, and
    to credit properly the contributions of others.”
    They made changes in the product according to
    the feedback they received from various sources,
    such as the surveys they conducted. The project
    also requires compliance with the IEEE 802.15.7
    standard, which provides a global standard for
    short-range optical wireless communication
    using the visible light spectrum. This standard
    provides access to several hundred THz of unli-
    censed spectrum, immunity to electromagnetic
    interference and noninterference with RF sys-
    tems, and additional security by allowing the
    user to see the communication channel. It also
    allows for communication augmenting and com-
    plementing existing services from visible-light
    infrastructures. The IEEE 802.15.7 standard
    adheres to applicable eye safety regulations.

    The ethical dilemma selected by the students
    was the action against a hardware problem. To
    use the Theory Model for assessing the ethical
    choices, they first identified the possible actions.
    The first option is to do nothing and deny that
    the problem even exists. The second option
    would be to tell consumers that there is a possi-
    bility of existence of a problem. The third option
    they came up with is to refund money to con-
    sumers limited to a set time period after the dis-
    covery of the problem. The fourth option is to
    send a technical support employee to resolve the
    problem. The last option they came up with is to
    give consumers some sort of incentive such as a
    coupon or gift card for future purchases of their
    products.

    If option 1 were chosen the consumers would
    be enraged that nothing was being done, and as
    a result they would lose business. Option 2 would
    forewarn consumers that there may be a prob-
    lem, so they would know ahead of the time.
    However, consumers may still become enraged
    and frustrated once the problem arises. Option 3
    would show consumers that the manufacturer
    cares about them and acknowledges that there
    was a mistake and will make up for it. At the
    same time the manufacturer would save money
    by only refunding for a set time period. Option 4
    would cost the manufacturer significant profit by
    sending technical support to all our consumers,
    and the consumers would most likely still be
    angry that they have to wait for help to arrive.
    Option 5 might make the consumers happier;

    even though the manufacturer would not fix the
    problem, they gave consumers discounts on
    more products. This shows the customers that
    the manufacturer did sympathize with them, and
    it saves the company money at the same time.

    As shown in Table 5, the students scored the
    options according to the four ethical theories on
    the ethical line diagram. They concluded that
    the fifth option was the best due to the higher
    score between the alternatives available through
    all of the different ethical theories proposed.
    The third option was also a very good option,
    coming in second place, and it would most likely
    make the consumers a lot happier if they went
    with that option.

    CONCLUDING REMARKS
    In this article we discussed how we train our
    undergraduate students at FIU-ECE to address
    ethical dilemmas, via senior design projects. We
    discussed four representative senior design pro-
    ject examples in which students came up with a
    hypothetical ethical dilemma, identified multiple
    options to address the dilemma, and used a
    methodological approach to choose the best
    option. With emerging 5G wireless technologies,
    wireless systems will be integrated into trillions
    of connected Internet of Things (IoT) devices,
    immersed into our daily lives. We will continue
    evolving our ethical training framework at FIU-
    ECE through senior design projects to address
    ethical issues that may arise as a result of emerg-
    ing applications and technologies.

    ACKNOWLEDGMENT
    The aut hor s would lik e t o t hank the senior
    design students at FIU-ECE, who have worked
    on the individual projects, namely: D. Guerra,
    V. Ramos, M. Forest, C. Boza, and E. Fiallo
    (uPark Assistant project); K. Guevara, M.
    Rodriguez, N. Gallo, and G. Vellasco (GSM
    Relay Copter project); R. Calderon, L. Perez, L.
    Gu, and H. Liang (Copter Triangulation Locator
    project); S. Asratyan, S. Coriolan, R. Gonzalez,
    R. Luabeya Mafu, and M. Salazar (Visible Light
    Communications project). This work was sup-
    ported in part by NSF CNS-1453678, NSF AST-
    1443999, and NSF CNS-1422062.

    REFERENCES
    [1] “Criteria for Accrediting Engineering Programs,

    2015–2016|ABET;” available: http://www.abet.org/
    accreditation/accreditation-criteria/criteria-for-accredit-
    ing-engineering-programs-2015-2016/#objectives,
    accessed: 02-Jul-2015.

    [2] J. R. Goldberg, “Senior Design Capstone Courses and
    ABET Outcomes,” IEEE Eng. Med. Biol. Mag., vol. 25,
    no. 4, Jul. 2006, pp. 84–86.

    [3] V. Wilczynski and A. C. Foley, “Designing a Capstone
    Design Course to Achieve Student Outcomes,” Proc.
    ASME Mechanical Engineering Congress and Exposition,
    2014, pp. V005T05A026–V005T05A026.

    [4] S. J. Stagg et al., “Incorporating Design into Undergrad-
    uate Biomedical Engineering Curriculum,” Proc. ASEE
    Gulf-Southwest Annual Conf., San Antonio, TX, 2015.

    [5] C. L. Dym, P. Little, and E. J. Orwin, Engineering
    Design: A Project-Based Introduction, 4th ed., New
    York: Wiley, 2014.

    [6] G. E. Dieter and L. C. Schmidt, Engineering Design, 5th
    ed. New York: McGraw-Hill, 2013.

    [7] H. Jack, Engineering Design, Planning, and Manage-
    ment, Amsterdam; Boston: Elsevier/AP (Academic Press
    is an imprint of Elsevier), 2013.

    Table 5. Possible solutions score.

    Theories
    Option # Utilitarianism Egoism Rights Kantian Score

    1 0 1.00 0 0 1.00

    2 0 1.00 0.25 0 1.25

    3 1.00 0.25 0.50 0.25 2.00

    4 1.00 0 0.50 0.25 1.75

    5 0.75 0.75 0.50 0.75 2.75

    ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 28

    IEEE Communications Magazine • November 2015 29

    [8] C. B. Fleddermann, Engineering Ethics, 4th ed., Upper
    Saddle River: Prentice Hall, 2012.

    [9] “Ethical Issues Concerning Robots and Android
    Humanoids Technology, Links999;” available: http://
    www.links999.net/robotics/robots/robots_ethical.html;
    accessed: 09-Jul-2015.

    [10] “Choice: Ethical and Legal Rehabilitation Challenges;”
    available: http://www.worksupport.com/documents/
    proed9.html.htm, accessed: 09-Jul-2015.

    [11] “Killer Robot,” available: https://ethics.csc.ncsu.edu/
    risks/safety/killer_robot/, [Accessed: 10-Jul-2015].

    [12] D. Guerra et al., “uPark Assistant,” Senior Design Pro-
    ject, Florida International University, Miami, Fl., 2013.

    [13] A. Merwaday and I. Guvenc, “UAV Assisted Heteroge-
    neous Networks for Public Safety Communications,”
    Proc. IEEE Wireless Communications and Networking
    Conf. (WCNC) Workshops (WCNCW), Mar. 2015, New
    Orleans, LA, pp. 329–34.

    [14] K. Guevara et al., “UAV-Based GSM Network for Public
    Safety Communications,” Proc. IEEE SoutheastCon, Apr.
    2015, Fort Lauderdale, FL, pp. 1–2.

    [15] A. Sahin et al., “Hybrid 3D Localization for Visible
    Light Communication Systems,” submitted to IEEE J.
    Lightwave Tech., May 2015.

    BIOGRAPHIES
    WILMER ARELLANO (arellano@fiu.edu) is a full time senior
    instructor in the Department of Electrical and Computer

    Engineering, Florida International University, Miami, Flori-
    da. His research areas of interest include vehicular ad hoc
    networks (VANETs) and swarm intelligence. He has
    authored several publications on VANETs and a book chap-
    ter on swarm intelligence. His M.S. and B.S. degrees are in
    electronic engineering from Universidad Simon Bolivar, in
    Caracas, Venezuela. He is a member of the IEEE and Tau
    Beta Pi.

    ISMAIL GUVENC (iguvenc@fiu.edu) received his Ph.D. degree
    in electrical engineering from the University of South Flori-
    da in 2006. He was a research engineer at DOCOMO Inno-
    vations from 2006 to 2012. Since August 2012 he has
    been an assistant professor at Florida International Univer-
    sity. His recent research interests include heterogeneous
    wireless networks and 5G wireless systems. He is a recipi-
    ent of the 2014 Ralph E. Powe Junior Faculty Enhancement
    Award and 2015 NSF CAREER Award.

    NEZIH PALA (npala@fiu.edu) is an associate professor in the
    Electrical and Computer Engineering Department at Florida
    International University, Miami, FL. He received his Ph.D.
    degree in electrical engineering from Rensselaer Polytechnic
    Institute, Troy, NY in 2002. His research interests include
    the design, fabrication and characterization of nanoscale
    systems, electronic and optoelectronic devices for biologi-
    cal and chemical sensing, energy harvesting and storage,
    plasmonics, THz applications, free space optical communi-
    cation, and visible light communication.

    ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 29

    << /ASCII85EncodePages false /AllowTransparency false /AutoPositionEPSFiles true /AutoRotatePages /None /Binding /Left /CalGrayProfile (Dot Gain 20%) /CalRGBProfile (sRGB IEC61966-2.1) /CalCMYKProfile (U.S. Web Coated \050SWOP\051 v2) /sRGBProfile (sRGB IEC61966-2.1) /CannotEmbedFontPolicy /Error /CompatibilityLevel 1.3 /CompressObjects /Off /CompressPages true /ConvertImagesToIndexed true /PassThroughJPEGImages true /CreateJobTicket true /DefaultRenderingIntent /Default /DetectBlends true /DetectCurves 0.1000 /ColorConversionStrategy /LeaveColorUnchanged /DoThumbnails false /EmbedAllFonts true /EmbedOpenType false /ParseICCProfilesInComments true /EmbedJobOptions true /DSCReportingLevel 0 /EmitDSCWarnings false /EndPage -1 /ImageMemory 1048576 /LockDistillerParams true /MaxSubsetPct 100 /Optimize false /OPM 1 /ParseDSCComments true /ParseDSCCommentsForDocInfo true /PreserveCopyPage false /PreserveDICMYKValues true /PreserveEPSInfo true /PreserveFlatness false /PreserveHalftoneInfo false /PreserveOPIComments false /PreserveOverprintSettings true /StartPage 1 /SubsetFonts true /TransferFunctionInfo /Apply /UCRandBGInfo /Remove /UsePrologue false /ColorSettingsFile (None) /AlwaysEmbed [ true ] /NeverEmbed [ true ] /AntiAliasColorImages false /CropColorImages false /ColorImageMinResolution 300 /ColorImageMinResolutionPolicy /OK /DownsampleColorImages false /ColorImageDownsampleType /Average /ColorImageResolution 300 /ColorImageDepth -1 /ColorImageMinDownsampleDepth 1 /ColorImageDownsampleThreshold 1.50000 /EncodeColorImages true /ColorImageFilter /DCTEncode /AutoFilterColorImages true /ColorImageAutoFilterStrategy /JPEG /ColorACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >>
    /ColorImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >>
    /JPEG2000ColorACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >>
    /JPEG2000ColorImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >>
    /AntiAliasGrayImages false
    /CropGrayImages false
    /GrayImageMinResolution 300
    /GrayImageMinResolutionPolicy /OK
    /DownsampleGrayImages false
    /GrayImageDownsampleType /Average
    /GrayImageResolution 300
    /GrayImageDepth -1
    /GrayImageMinDownsampleDepth 2
    /GrayImageDownsampleThreshold 1.50000
    /EncodeGrayImages true
    /GrayImageFilter /DCTEncode
    /AutoFilterGrayImages true
    /GrayImageAutoFilterStrategy /JPEG
    /GrayACSImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >>
    /GrayImageDict << /QFactor 0.15 /HSamples [1 1 1 1] /VSamples [1 1 1 1] >>
    /JPEG2000GrayACSImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >>
    /JPEG2000GrayImageDict << /TileWidth 256 /TileHeight 256 /Quality 30 >>
    /AntiAliasMonoImages false
    /CropMonoImages false
    /MonoImageMinResolution 1200
    /MonoImageMinResolutionPolicy /OK
    /DownsampleMonoImages false
    /MonoImageDownsampleType /Average
    /MonoImageResolution 1200
    /MonoImageDepth -1
    /MonoImageDownsampleThreshold 1.50000
    /EncodeMonoImages true
    /MonoImageFilter /CCITTFaxEncode
    /MonoImageDict << /K -1 >>
    /AllowPSXObjects false
    /CheckCompliance [
    /None
    ]
    /PDFX1aCheck false
    /PDFX3Check false
    /PDFXCompliantPDFOnly false
    /PDFXNoTrimBoxError true
    /PDFXTrimBoxToMediaBoxOffset [
    0.00000
    0.00000
    0.00000
    0.00000
    ]
    /PDFXSetBleedBoxToMediaBox true
    /PDFXBleedBoxToTrimBoxOffset [
    0.00000
    0.00000
    0.00000
    0.00000
    ]
    /PDFXOutputIntentProfile (None)
    /PDFXOutputConditionIdentifier (CGATS TR 001)
    /PDFXOutputCondition ()
    /PDFXRegistryName (http://www.color.org)
    /PDFXTrapped /False
    /CreateJDFFile false
    /Description << /CHS
    /CHT
    /DAN
    /DEU
    /ESP
    /FRA
    /ITA
    /JPN
    /KOR
    /NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken die zijn geoptimaliseerd voor prepress-afdrukken van hoge kwaliteit. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5.0 en hoger.)
    /NOR
    /PTB
    /SUO
    /SVE
    /ENU (Cadmus settings for Acrobat Distiller 9)
    >>
    /Namespace [
    (Adobe)
    (Common)
    (1.0)
    ]
    /OtherNamespaces [
    << /AsReaderSpreads false /CropImagesToFrames true /ErrorControl /WarnAndContinue /FlattenerIgnoreSpreadOverrides false /IncludeGuidesGrids false /IncludeNonPrinting false /IncludeSlug false /Namespace [ (Adobe) (InDesign) (4.0) ] /OmitPlacedBitmaps false /OmitPlacedEPS false /OmitPlacedPDF false /SimulateOverprint /Legacy >>
    << /AddBleedMarks false /AddColorBars false /AddCropMarks false /AddPageInfo false /AddRegMarks false /BleedOffset [ 0 0 0 0 ] /ConvertColors /NoConversion /DestinationProfileName (U.S. Web Coated \(SWOP\) v2) /DestinationProfileSelector /UseName /Downsample16BitImages true /FlattenerPreset << /ClipComplexRegions true /ConvertStrokesToOutlines false /ConvertTextToOutlines false /GradientResolution 300 /LineArtTextResolution 2400 /PresetName (Cadmus_Flattener_Presert) /PresetSelector /UseName /RasterVectorBalance 1 >>
    /FormElements false
    /GenerateStructure false
    /IncludeBookmarks false
    /IncludeHyperlinks false
    /IncludeInteractive false
    /IncludeLayers false
    /IncludeProfiles true
    /MarksOffset 6
    /MarksWeight 0.250000
    /MultimediaHandling /UseObjectSettings
    /Namespace [
    (Adobe)
    (CreativeSuite)
    (2.0)
    ]
    /PDFXOutputIntentProfileSelector /UseName
    /PageMarksFile /RomanDefault
    /PreserveEditing true
    /UntaggedCMYKHandling /LeaveUntagged
    /UntaggedRGBHandling /LeaveUntagged
    /UseDocumentBleed false
    >>
    << /AllowImageBreaks true /AllowTableBreaks true /ExpandPage false /HonorBaseURL true /HonorRolloverEffect false /IgnoreHTMLPageBreaks false /IncludeHeaderFooter false /MarginOffset [ 0 0 0 0 ] /MetadataAuthor () /MetadataKeywords () /MetadataSubject () /MetadataTitle () /MetricPageSize [ 0 0 ] /MetricUnit /inch /MobileCompatible 0 /Namespace [ (Adobe) (GoLive) (8.0) ] /OpenZoomToHTMLFontSize false /PageOrientation /Portrait /RemoveBackground false /ShrinkContent true /TreatColorsAs /MainMonitorColors /UseEmbeddedProfiles false /UseHTMLTitleAsMetadata true >>
    ]
    >> setdistillerparams
    << /HWResolution [2400 2400] /PageSize [612.000 792.000] >> setpagedevice

    Concept Development and End Product Description

    *

    Concept Generation

    *

    Portable Audio Equalizer
    Objectives
    The system should have excellent sound quality.
    The system should have easy equalization
    The system should be of light weight
    The system should be low cost
    Constraints
    The system must be portable
    The system will be an add-on to existing MP3 player

    *

    Concept Fan
    The Concept Fan is a way of discovering alternative approach’s to a problem when you have discarded all obvious solutions. It develops the principle of ‘taking a step back’ to get a broader viewpoint. Initially, the Concept Fan requires you to draw a circle in the middle of a large piece of paper. Write the problem you are trying to solve in the circle. To the right of it radiate lines representing possible solutions to the problem see the diagram below:
    https://www.mycoted.com/Concept_Fan

    *

    Concept Fan
    It is possible that the ideas you have come up with are impractical or do not really solve the problem. If this is the case, take a ‘step back’ for a broader analysis of the problem. Drawing a circle to the left of the first circle does this, writing the broader definition into this new circle and linking it with an arrow to show that it comes from the first circle, see diagram below:

    Use this as a starting point to radiate out other ideas, if this does not give you an adequate amount of new ideas, you can take yet another step back (and another, and another…)
    https://www.mycoted.com/Concept_Fan

    *

    Concept Fan

    *

    Sheet1

    Audio Equalizer
    Input Amplifier
    Automatic Level control
    ALC
    Graphic Equalizer
    Single Transistor + OPAMP
    Dual OPAMP
    Analog Logarithmic Amplifier
    Microcontroller
    + variable Gain Amplifier
    Active Filter
    Digital Filter
    Pasive Filter
    Analog Filter

    Sheet2

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Moderate Cost Fully Featured

    Moderate to Implement Higher Signal to Noise ratio

    Sheet3

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Moderate Cost Fully Featured

    Moderate to Implement Low Signal to Noise ratio

    Concept Combination Table
    A concept Combination Table (also called morphology box) is a matrix of concept fragments organized by functions (each function forms a separate column) so that an integrated concept can be created by choosing any concept fragment for each function and combining them to complete the required functionality.
    https://books.google.com/books?id=9ZjLBQAAQBAJ&pg=PA114&lpg=PA114&dq=concept+combination+table&source=bl&ots=ceBcnUUi7f&sig=PiCBZeHApgZDjgYV2EtcYDbuWeA&hl=en&sa=X&sqi=2&ved=0ahUKEwinsOeq4bTPAhVJmR4KHeO0D9kQ6AEIXDAM#v=onepage&q=concept%20combination%20table&f=false

    *

    Concept Combination Table

    *

    Sheet1

    Audio Equalizer
    Input Amplifier
    Automatic Level control
    ALC
    Graphic Equalizer
    Single Transistor + OPAMP
    Dual OPAMP
    Analog Logarithmic Amplifier
    Microcontroller
    + variable Gain Amplifier
    Active Filter
    Digital Filter
    Pasive Filter
    Analog Filter

    Sheet2

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Low Cost Not many features

    Easy to Implement Low Signal to Noise ratio

    Sheet3

    Concept Combination Table

    *

    Sheet1

    Audio Equalizer
    Input Amplifier
    Automatic Level control
    ALC
    Graphic Equalizer
    Single Transistor + OPAMP
    Dual OPAMP
    Analog Logarithmic Amplifier
    Microcontroller
    + variable Gain Amplifier
    Active Filter
    Digital Filter
    Pasive Filter
    Analog Filter

    Sheet2

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Moderate Cost Low Signal to Noise ratio

    Moderate complexity to Implement

    Fully Featured

    Sheet3

    Concept Combination Table

    *

    Sheet1

    Audio Equalizer
    Input Amplifier
    Automatic Level control
    ALC
    Graphic Equalizer
    Single Transistor + OPAMP
    Dual OPAMP
    Analog Logarithmic Amplifier
    Microcontroller
    + variable Gain Amplifier
    Active Filter
    Digital Filter
    Pasive Filter
    Analog Filter

    Sheet2

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Moderate Cost Design Complexity

    Fully Featured

    Higher Signal to Noise ratio

    Sheet3

    Input Amplifier Automatic Level control ALC Graphic Equalizer

    Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter

    Dual OPAMP Microcontroller
    + variable Gain Amplifier Passive Filter

    Digital Filter

    Advantages Disadvantages

    Moderate Cost Fully Featured

    Moderate to Implement Low Signal to Noise ratio

    Concept Selection

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 5

    Low Cost 1/3 1/3 1/5 1

    This table compares the relative importance of the objectives.
    “Sound Quality is strongly more important than Easy Equalization”. (There is a 5 in this cell)

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.52

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 5.00 1.1362193665 0.23

    Low Cost 0.33 0.33 0.20 1.00 0.3860973951 0.08

    This table is used to determine the weights (importance) of the objectives Total 4.9924485625

    Sheet2

    Sheet3

    Concept Selection

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 2

    Low Cost 1/3 1/3 1/2 1

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19

    Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10

    Total 4.8592255762

    w

    Sound Quality. 0.53

    Easy Equalization 0.18

    Light Weight 0.19

    Low Cost 0.10

    Sheet2

    Sheet3

    Option 1 Option 2 Option 3 If a contraint is No

    Constraints That Option must be Discarded

    Must be Portable Yes Yes Yes

    Add-on to existing MP3 P. Yes Yes Yes Select option with Highest Score

    Objectives w

    Sound Quality. 0.52 3.00 1.56 3 1.56 5 2.60 5 is Maximum

    Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90

    Light Weight 0.23 5.00 1.15 4 0.92 4 0.92

    Low Cost 0.08 5.00 0.4 5 0.40 3 0.24

    3.83 3.78 4.66

    End Product Description
    In this section you will describe:
    The constituent modules and their interrelationships
    The functionality of the product
    The functionality of the different modules
    Present the product specs

    *

    Black Box
    In science, computing, and engineering, a black box is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings. Its implementation is “opaque” (black). Almost anything might be referred to as a black box: a transistor, an algorithm, or the human brain.
    https://en.wikipedia.org/wiki/Black_box

    *

    Block Diagram
    A block diagram is a diagram of a system in which the principal parts or functions are represented by blocks connected by lines that show the relationships of the blocks. They are heavily used in engineering in hardware design, electronic design, software design, and process flow diagrams.
    https://en.wikipedia.org/wiki/Block_diagram
    http://www.hobbyprojects.com/block_diagrams/block_diagrams.html

    *

    Level 0 Equalizer Functionality
    This is the product description without knowledge of the internal blocks (black box)

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 2

    Low Cost 1/3 1/3 1/2 1

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19

    Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10

    Total 4.8592255762

    w

    Sound Quality. 0.53

    Easy Equalization 0.18

    Light Weight 0.19

    Low Cost 0.10

    Sheet2

    Audio Input Signal Audio Equalizer

    Equalizer Control Audio output Signal

    Power

    Module Audio Equalizer

    Inputs – Audio input: 1V peak to peak
    – Power 9 V DC
    – Equalization Settings

    Outputs Equalized Audio : 1V peak to peak

    Functionality Equalize the input audio signal
    to provide desired frequency content

    Sheet3

    Option 1 Option 2 Option 3 If a contraint is No

    Constraints Yes Yes Yes That Option must be Discarded

    Must be Portable Yes Yes Yes

    Add-on to existing MP3 P. Yes Yes Yes

    Objectives w

    Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum

    Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90

    Light Weight 0.19 5.00 0.95 4 0.76 4 0.76

    Low Cost 0.10 5.00 0.5 5 0.50 4 0.40

    3.23 3.75 4.71

    Level 1 Equalizer Functionality
    This a general Description of the internal blocks
    Only Pre-AMP table shown. Show a table for each block

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 2

    Low Cost 1/3 1/3 1/2 1

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19

    Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10

    Total 4.8592255762

    w

    Sound Quality. 0.53

    Easy Equalization 0.18

    Light Weight 0.19

    Low Cost 0.10

    Sheet2

    Audio Input Signal Audio Equalizer

    Equalizer Control Audio output Signal

    Power

    Buffered Input Constant Amplitude Signal

    Audio Input Equalized Signal

    Power 9 V DC

    Module Pre Amplifier

    Inputs – Audio input: 1V peak to peak
    – Regulated 5 VDC

    Outputs Low impedance buffered output

    Functionality – Provides high input impedance
    – Provides low output impedance

    DC DC converters required

    Pre Amplifier
    Automatic Level
    control (ALC)
    Digital Filter
    Power Supply

    Sheet3

    Option 1 Option 2 Option 3 If a contraint is No

    Constraints Yes Yes Yes That Option must be Discarded

    Must be Portable Yes Yes Yes

    Add-on to existing MP3 P. Yes Yes Yes

    Objectives w

    Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum

    Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90

    Light Weight 0.19 5.00 0.95 4 0.76 4 0.76

    Low Cost 0.10 5.00 0.5 5 0.50 4 0.40

    3.23 3.75 4.71

    Level 2 Automatic Level
    control (ALC)

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 2

    Low Cost 1/3 1/3 1/2 1

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19

    Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10

    Total 4.8592255762

    w

    Sound Quality. 0.53

    Easy Equalization 0.18

    Light Weight 0.19

    Low Cost 0.10

    Sheet2

    Audio Input Signal Audio Equalizer

    Equalizer Control Audio output Signal

    Power

    Buffered Input Constant Amplitude Signal

    Audio Input Equalized Signal

    Power 120 VAC, 60Hz

    Pre Amplifier
    Automatic Lecel
    control (ALC)
    Digital Filter
    Power Supply

    Sheet4

    DC Voltage input

    Buffered Input Signal Constant Amplitude Signal

    Gain Control Output Sample

    Module Pre Amplifier

    Inputs – Audio input: 1V peak to peak low impedance
    – Regulated 5 VDC
    – Feedback from Microcontroller

    Outputs Constant peak value buffered audio signal

    Each Block is described in detail DC Voltage input Functionality – Samples the module output
    – Detects the peak values
    – Adjusts the amplifier’s gain

    Repeat as needed to explain all blocks in Level 1

    Variable Gain
    Amplifier
    Microcontroller

    Sheet3

    Option 1 Option 2 Option 3 If a contraint is No

    Constraints Yes Yes Yes That Option must be Discarded

    Must be Portable Yes Yes Yes

    Add-on to existing MP3 P. Yes Yes Yes

    Objectives w

    Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum

    Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90

    Light Weight 0.19 5.00 0.95 4 0.76 4 0.76

    Low Cost 0.10 5.00 0.5 5 0.50 4 0.40

    3.23 3.75 4.71

    Embedded Systems Require additional Information
    Functionality of embedded system requires different approach

    *

    Sheet1

    0.4761904762

    Sound Quality. Easy Equalization Light Weight Low Cost

    Sound Quality. 1 5 3 3

    Easy Equalization 1/5 1 1 3

    Light Weight 1/3 1 1 2

    Low Cost 1/3 1/3 1/2 1

    1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme

    Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w

    Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53

    Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18

    Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19

    Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10

    Total 4.8592255762

    w

    Sound Quality. 0.53

    Easy Equalization 0.18

    Light Weight 0.19

    Low Cost 0.10

    Sheet2

    Audio Input Signal Audio Equalizer

    Equalizer Control Audio output Signal

    Power

    Buffered Input Constant Amplitude Signal

    Audio Input Equalized Signal

    Power 120 VAC, 60Hz

    Pre Amplifier
    Automatic Lecel
    control (ALC)
    Digital Filter
    Power Supply

    Sheet5

    Module Microcontroller

    Inputs – Audio output sample
    – Regulated + 5 VDC

    Outputs – Gain Control Signal

    Functionality

    Start
    Sample Audio Output
    Low Level?
    Amplify Control
    High Level?
    Amplify Control
    Attenuate Control
    Yes
    Yes
    No
    No

    Sheet4

    DC Voltage input

    Buffered Input Signal Constant Amplitude Signal

    DC Voltage input

    Variable Gain
    Amplifier
    Microcontroller

    Sheet3

    Option 1 Option 2 Option 3 If a contraint is No

    Constraints Yes Yes Yes That Option must be Discarded

    Must be Portable Yes Yes Yes

    Add-on to existing MP3 P. Yes Yes Yes

    Objectives w

    Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum

    Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90

    Light Weight 0.19 5.00 0.95 4 0.76 4 0.76

    Low Cost 0.10 5.00 0.5 5 0.50 4 0.40

    3.23 3.75 4.71

    Continue until the next step is to place components

    *

    Conventions
    Use buses (Thick lines) to represent several connecting lines that have common origin and destination
    Terminate the bus with an arrow head at the destination
    When information flow is bidirectional, place arrows at both ends of the bus
    When possible indicate the number of lines

    Conventions
    At some level of detail all individual lines must show
    Images from:

    http://file.scirp.org/Html/1-6401302_42760.htm
    and

    https://en.wikipedia.org/wiki/Control_system
    Remember, stop when the next step is placing components

    In Summary
    Describe diagrams in paragraphs with local functionality tables slides (11 to 14)
    Repeat Functionality Tables
    Put level 0 functionality in one table
    Group all level 1 functionality tables in one table
    Repeat for all levels
    At the end of de section include the Technical Specs that you obtained before

    *

    Example

    Diagrams and tables must be explained

    Diagrams and tables must be explained

    Diagrams and tables must be explained

    Diagrams and tables must be explained, as in this case.

    Diagrams and tables must be explained

    Other Deliverables
    Power Point Presentation
    Final Report
    User Manual
    etc

    *

    Audio
    Equalizer
    Input
    Amplifier
    Automatic
    Level
    control
    ALC
    Graphic
    Equalizer
    Single
    Transistor +
    OPAMP
    Dual OPAMP
    Analog
    Logarithmic
    Amplifier
    Microcontroller
    +
    variable
    Gain Amplifie
    r
    Active Filter
    Digital Filter
    Pasive Filter
    Analog
    Filter
    AdvantagesDisadvantages
    Low CostNot many features
    Easy to ImplementLow Signal to Noise ratio
    Digital Filter
    Graphic Equalizer
    Single Transistor +
    OPAMP
    Dual OPAMP
    Analog
    Logarithmic
    Microcontroller
    + variable Gain
    Active Filter
    Passive Filter
    Input Amplifier
    Automatic Level
    control ALC
    AdvantagesDisadvantages
    Moderate CostLow Signal to Noise ratio
    Moderate complexity to Implement
    Fully Featured
    Digital Filter
    Graphic Equalizer
    Single Transistor +
    OPAMP
    Dual OPAMP
    Analog
    Logarithmic
    Microcontroller
    + variable Gain
    Active Filter
    Passive Filter
    Input Amplifier
    Automatic Level
    control ALC
    AdvantagesDisadvantages
    Moderate CostDesign Complexity
    Fully Featured
    Higher Signal to Noise ratio
    Digital Filter
    Graphic Equalizer
    Single Transistor +
    OPAMP
    Dual OPAMP
    Analog
    Logarithmic
    Microcontroller
    + variable Gain
    Active Filter
    Passive Filter
    Input Amplifier
    Automatic Level
    control ALC
    Sound Quality.Easy EqualizationLight WeightLow Cost
    Sound Quality.1533
    Easy Equalization1/5113
    Light Weight1/3115
    Low Cost1/31/31/51
    1 = equal3 = moderate5 = strong7 = very strong9 = extreme
    Sound Quality.Easy EqualizationLight WeightLow CostG. Meanw
    Sound Quality.1.005.003.003.002.590020.52
    Easy Equalization0.201.001.003.000.8801120.18
    Light Weight0.331.001.005.001.1362190.23
    Low Cost0.330.330.201.000.3860970.08
    Total4.992449
    This table compares the relative importance of the objectives.
    “Sound Quality is strongly more important than Easy Equalization”. (There is a 5 in this cell)
    This table is used to determine the weights (importance) of the objectives
    total
    Mean
    G
    w
    A
    A
    A
    Mean
    G
    N
    N
    /
    .
    )
    (
    .
    1
    2
    1
    =
    ´
    ×
    ×
    ×
    ×
    ×
    ×
    ´
    ´
    =
    If a contraint is No
    ConstraintsThat Option must be Discarded
    Must be Portable
    Add-on to existing MP3 P.Select option with Highest Score
    Objectivesw
    Sound Quality.0.523.001.5631.5652.605 is Maximum
    Easy Equalization0.184.000.7250.9050.90
    Light Weight0.235.001.1540.9240.92
    Low Cost0.085.000.450.4030.24
    3.833.784.66
    Option 3

    Yes
    Yes
    Option 2

    Yes
    Yes
    Option 1

    Yes
    Yes
    Audio Input Signal
    Equalizer ControlAudio output Signal
    Power
    Module
    Inputs
    Outputs
    Functionality
    Audio Equalizer
    Equalized Audio : 1V peak to peak
    – Audio input: 1V peak to peak
    – Power 9 V DC
    – Equalization Settings
    Equalize the input audio signal
    to provide desired frequency content
    Audio Equalizer
    Buffered InputConstant Amplitude Signal
    Audio InputEqualized Signal
    ModulePre Amplifier
    Inputs
    Outputs
    Functionality
    DC DC converters required
    Power 9 V DC
    – Audio input: 1V peak to peak
    – Regulated 5 VDC
    – Provides high input impedance
    – Provides low output impedance
    Low impedance buffered output
    Pre AmplifierAutomatic Levelcontrol (ALC)Digital FilterPower Supply
    Buffered Input SignalConstant Amplitude Signal
    Gain ControlOutput Sample
    ModulePre Amplifier
    Inputs
    – Audio input: 1V peak to peak low impedance
    – Regulated 5 VDC
    – Feedback from Microcontroller
    OutputsConstant peak value buffered audio signal
    Each Block is described in detail
    Functionality
    – Samples the module output
    – Detects the peak values
    – Adjusts the amplifier’s gain
    Repeat as needed to explain all blocks in Level 1
    DC Voltage input
    DC Voltage input
    Variable GainAmplifierMicrocontroller
    Module
    Inputs
    Outputs
    Functionality
    – Audio output sample
    – Regulated + 5 VDC
    – Gain Control Signal

    Microcontroller
    Start
    Sample
    Audio
    Output
    Low
    Level?
    Amplify Control
    High
    Level?
    Attenuate Control
    Yes
    Yes
    No
    No
    I. CONCEPT DEVELOPMENT
    The objective of this section is to make a concept fan of all the possible options of
    implementing this project. We will analyze all the different implementations of this project in
    order to obtain an option which is viable and fits the needs of the client. It will need to meet our
    objectives and constraints in the most efficient way, while taking our assumptions and limitations
    into consideration. After analyzing all of the alternate options , we will construct a concept
    selection table with a weighted average in order to select the best concept to follow.
    The concept fan is a chart which shows all the different alternatives that we can choose from
    to arrive at the same objectives. After analyzing the concept fan, we will use the weighted table
    to determine which option proves to be the most viable. Figure 19 shows the concept fan chart,
    which was derived through brainstorming and analysis of the objectives.
    The chart in Figure I-1 first names our main objective which is to develop a telemetry band.
    The second level of the cha rt shows the different parts that are needed in order to arrive at the
    objective. Basically, we will need a user interface, transmitter, receiver, and control unit in order
    to achieve our design objectives. Each of the parts has its own set of components t hat are needed
    to fulfill that part. The user interface is the way in which the user will interact with the device.
    The transmitter will be responsible for transmitting power to the receiver, which will possibly
    demodulate the signal. The control unit will be used to control all of the various sensors and
    components which will be used in the arm band.

    Figure I-1. The Concept Fan Chart
    In the following sections we will present and analyze alternate soluti ons and implementations
    for the Telemetry Band. Once the best option is found, it components, inputs, outputs, and
    functions will be analyzed.
    low-power RFID, which in turn uses backscatter modulation. All of the processes will be
    controlled by the ARM microcontroller, which introduces the advant age of compatibility with
    C++, which most of our team is familiar with. The main advantages include direct control of the
    arm band, low-power operation, and ease of programming due to familiarity with computer
    programing.
    a) Disadvantages
    The disadvantage of using the computer as the user interface is that it limits the mobility of
    the arm band by needing a bulky device in order to receive and read the measurements. Also, the
    command-based user interface will require more complex programming. To modulate the power
    signal with BPSK also introduces increased circuit complexity, more components, and greater
    power consumption in the arm band. Using RFID will also require complex circuitry so that it
    can use the existing SCMR antenna. This will also present increased cos t due to the need to have
    a demodulator circuit in the receiver as well as an RFID transmitter.

    Still stressed with your coursework?
    Get quality coursework help from an expert!