the PowerPoint at:
http://web.eng.fiu.edu/~arellano/4010/F2007/NeedAnalysis-ProblemStatement.ppt
Watch Rory Sutherland’s: Perspective is everything talk at:
Watch Tom Hulme’s: What can we learn from shortcuts? talk at:
Need Specification:
http://web.eng.fiu.edu/~arellano/4010/F2007/The_Needs_SpecificationFall2014.ppt
And the video at:
Study
2.
3.
For Wednesday
1.
2.And the video at: https://www.youtube.com/watch?v=W7raJeMpyM0
https://discord.gg/QY2Wbyt
-Smart Mirror:
https://www.hackster.io/ben-eagan/smart-mirror-with-optional-alexa-874d43
http://web.eng.fiu.edu/~arellano/4010/F2007/Concept-EndProduct.ppt
- https://www.youtube.com/watch?v=WpldYJ3sSIo
Senior Design I Proposal Part 1
Genre: Design Proposal, used to present a new design or a new approach to an existing design, with the following purposes:
1. Persuade a person or institution to approve your invention.
2. Illustrate why the new product is needed and demonstrate that the product will be accepted by the potential users.
3. Demonstrate your knowledge on the particular area.
4. Demonstrate that you know how to create a new product from scratch and that you have a plan to make the project real.
Audience: The proposal is intended for two audiences, on one hand for a technical audience of engineers who understands the details of the design and on the other hand for top managers that can make decisions to go ahead with the project. Some chapters of the proposal are dedicated exclusively to the technical audience while the others serve both audiences. In this assignment only Background and Intellectual Property are dedicated to the technical audience.
Due date: Two weeks after last topic is covered in class.
Format details according to modified IEEE style should be directly followed an can be found at:
http://web.eng.fiu.edu/~arellano/1002/Style/msw_usletter_format_nov12mod
Be sure to save time to edit to eliminate errors and typos that could lead your audience to question your professionalism and careful work.
Please find grading details and page count in the following table. A detailed rubric with grading criteria will be provided.
Please use the exact same section numbering.
Section
Weight
Typical page count
II.
PROBLEM STATEMENT
A. Project Objectives
B. Constraints
Write this part only after you complete the Need Analysis
5
1
III. ASSUMPTIONS AND LIMITATIONS.
A. Assumptions
5
1
B. Limitations
IV. NEEDS FEASIBILITY ANALYSIS
A. Needs Analysis Conclude with Problem Statement and Objectives
10
5
B. Need Specification
10
2
D. Marketability
10
1
VI. OPERATING ENVIRONMENT
3
1/2
VII. INTENDED USER(S) AND INTENDED USE(S)
A. Intended user(s).
3
1/2
B. Intended use(s).
4
1/2
VIII. BACKGROUND
15
10
IX. INTELLECTUAL PROPERTY
10
6
XVII.
CONCEPT DEVELOPMENT
A.
Alternative Options
1)
Advantages
2)
Disadvantages
10
6
XVIII.
END PRODUCT DESCRIPTION AND OTHER DELIVERABLES
A.
End Product Description
B.
Functions
C.
Specifications
D.
Other Deliverables
15
6
TOTAL
100
39.5
Format deductions
Reason |
Deduction |
|
Heading Style, Single Occurrence |
||
Heading Style, Multiple Occurrences |
7 |
|
Not referencing Images, Single Occurrence |
||
Not referencing Images, Multiple Occurrences |
||
Assumptions Limitations errors |
1 Each |
|
Not reviewed by mentor |
25% |
|
For each Section |
||
Introductory Paragraph |
20% |
|
Body |
60% |
|
Concluding Paragraph |
||
Not presenting required information |
Case by Case |
Deliverables: Report, |
· PowerPoint |
· Presentation |
RESEARCH PROJECT REPORT GUIDELINES
While you prepare your research project you will be working on some important and time consuming sections of your Senior Design II Proposal.
· This paper has to be reviewed by your mentor and have his initials in the title page
An approved proposal is required to pass this course. If your research document is not satisfactory you will:
· Not have a good grade.
· And still will need to do corrections.
Use the check boxes after the item numbers to verify that you have followed all the steps.
Remember that if you did not have time to do it right the first time, how are you going to have time to do it right the second time?
Bellow you will find sections of your research document. I would recommend that:
□ 1. You start early.
□ 2. You use a uniform style across the project according to the format guidelines indicated in class.
□ 3. Use the sections numbering according to that indicated in the Proposal Outline even if it means that you will have jumps in the numbering in this report.
□ 4. Use the “Supermarket shopping list style” as indicated in the “Style” presentation (“Supermarket shopping list style” is a class example of somebody explaining an idea to a person he does not know).
IV. NEEDS ANALYSIS
A.
Needs Analysis
B.
Need Specification
C.
Marketability
Show that you understand that a “Successful Design” requires understanding the needs of clients and users. Follow the guidelines presented in the lecture. We would like to show the reader details about the methods you followed:
· Show and explain the different steps of the Need Analysis including the tables with the objectives and their evolution. Explain all the steps.
· Briefly explain how you came to an agreement on how to specify the objectives. For each objective provide a specification and a rationale on how and why the spec value was chosen (See lecture).
· Write a separate section of your proposal about Marketability. Provide strong arguments of your project Marketability. You have to review two similar projects in https://www.kickstarter.com/.
□ 1. Each item you review must have a Sub Section Heading and an entry in the Table of Contents.
□ 2. In the beginning of the first paragraph of each kickstarter project you should name authors, institution date and citation number. Make sure that the citation number that is enclosed by square brackets. “in [1] . . . ”, rather than as “in reference [1] . . . ”. In general it is not necessary to mention the authors of a reference but in this case they are relevant to the context.
□ 3. You have to find at least two projects that relate to your topic or that may have similar approaches.
□ 4. The projects should be current.
□ 5. For each project the corresponding section should include the following subsections:
i. Project Summary: Natural Language description of the project.
ii. Fund rising strategy (Rewards)
i
ii. Technology Overview (Type of Technology, Components used and their main characteristics, speed power consumption, etc). No explanations of the interconnections or operation are provided here.
iv. System Description. Detailed explanation of the signals flow and interconnections including at least:
v. One Block Diagram
vi. One Picture
□ 6. You must conclude with a hypothetical fund rising strategy, inspired by the examples you just analyzed, or by ideas presented at:
http://www.cnbcprime.com/shark-tank?__source=pd|SharkTank|Google_Search&par=pd
Start with something like: “If we were to make a fund rising …”
VIII. BACKGROUND
The intention of this section is for you to establish a frame of reference about available technology, current state of the art, and possible approaches.
Please take into consideration that:
□ 1. Each item you review must have a Sub Section Heading and an entry in the Table of Contents.
□ 2. In the beginning of the first paragraph of each research project you should name authors, institution date and citation number. Make sure that the citation number that is enclosed by square brackets. “in [1] . . . ”, rather than as “in reference [1] . . . ”. In general it is not necessary to mention the authors of a reference but in this case they are relevant to the context.
□ 3. You have to find at least three projects and/or products that relate to your topic or that may have similar approaches.
□ 4. The topics should be current.
□ 5. For each research project the corresponding section should include the following subsections:
i. Project Summary: Natural Language description of the project.
ii. Technology Overview (Type of Technology, Components used and their main characteristics, speed power consumption, etc). No explanations of the interconnections or operation are provided here.
iii. System Description. Detailed explanation of the signals flow and interconnections including at least:
iv. One Block Diagram
v. One Picture
□ 6. Use your own words, copy and paste of text will be considered plagiarism and will severely affect your grade depending on the magnitude of the case.
□ 7. Any picture, figure, table or graphic item that you import from the document must include the name of the original project and a citation
□ 8. You should write Project reviews of no less than 2 pages, no more than 3 pages.
IX. INTELLECTUAL PROPERTY
The intention of this section is to demonstrate that you are Intellectual Property aware, that you know what to look for and where. You must also demonstrate that when there are patents involved, that you are able to use different approaches in your design that would overcome the infringement. You should review at least three patent reviews. You should include:
□ 1. Not to use less than a page per patent but no more than three pages for each patent.
□ 2. Sub Section Heading and an entry in the Table of Contents per item reviewed.
□ 3. Patent number as part of the Sub Section Heading.
□ 4. An overview of the patent.
□ 5. Summary of the claims that may relate to you project.
□ 6. What measures could be taken to avoid infringement.
□ 7. Include at least one figure from the patent.
□ 8. No expired patents please.
□ 9. Find a name for your team that does not have any copyright or trademark conflict.
□ 10. Write an IP contract to be included in the appendix indicating:
i. Your criteria for co-inventorship. Who will be considered inventor? In what extent? (Team members, mentor, sponsors)
ii. Who will be the invention spokesman?
iii. How you plan to split profit.
iv. What will be the mechanism for intellectual property decision making?
X. CONCEPT DEVELOPMENT
□ 1. Follow the guidelines indicated in the Concept-End Product lecture.
□ 2. Illustrate the method you follow and how you obtain the weights.
□ 3. For each option indicate its advantages and disadvantages. Please do that not as a summary but in each option section.
□ 4. Complete the whole section
XI. END PRODUCT DESCRIPTION AND OTHER DELIVERABLES
□ 1. Follow the guidelines indicated in the Concept-End Product lecture.
□ 2. Indicate the functions and specifications for each block. These are input output specifications; they are not the need specifications.
□ 3. Complete the whole section.
THE FOLLOWING TEXT IS INTENDED TO PROVIDE A VISUAL IDEA ON HOW THE PROJECT SHOULD LOOK LIKE
VIII. BACKGROUND
In this section we will review three different projects that curabitur sit aenean. Dui massa quam, torquent lacus dolor lacus malesuada lacinia aliquam, arcu magna augue amet, vestibulum morbi urna aliquam non montes mi, commodo a amet. Sapien ut quisque elit sed est aliquam, eu maecenas dictumst ligula dolor, at integer morbi, praesent odit molestie morbi elementum nulla. Placerat lorem tincidunt tortor arcu. Tempor in a ad nulla egestas, in felis aliquet magna eleifend semper suscipit, in ac, maecenas rutrum a viverra. Massa sed id velit risus, nobis convallis dictum mauris, aenean ut, auctor sed fusce wisi ut.
A.
Autonomous Airplane
This project was accomplished by John Smith and Alfred White at ABC University in 2001 [1]. Integer suspendisse et diam sed feugiat erat, integer integer id mi viverra nibh ipsum, posuere justo volutpat posuere pellentesque. Fusce quam, blandit orci dapibus ipsum massa, in dis. Dignissim iaculis sed nulla auctor. Eget eleifend sit phasellus, sed lorem a aliquet eu venenatis nibh, euismod massa class quam pharetra amet nostra.
1)
Summary:
Sem consectetuer non sit magna donec risus, amet luctus. Risus fames ligula nulla metus auctor nulla, vitae consequat non placerat, diam tortor, sit mattis venenatis lorem, luctus luctus voluptates in vel magna. Sed exercitation lectus mollis dictum. Consectetuer fermentum massa laoreet, ut vestibulum massa eget id torquent nonummy. Amet consectetuer, ad in vehicula suspendisse, sodales metus maecenas congue sagittis ut et, a sed faucibus vivamus id, vitae eget est conubia enim sollicitudin ligula. Mi doloribus, vel commodo nunc elit urna, dui ornare velit velit tortor odio ultrices, condimentum elit vestibulum porta fringilla, neque lectus egestas auctor metus sed. Scelerisque nulla ac, ipsum congue, sed odio id felis est torquent fusce, lorem erat nibh eget, at amet ante nec cras eleifend. Inceptos montes massa urna varius mattis faucibus, praesent ullamcorper gravida venenatis auctor massa. Sit risus justo ducimus suspendisse arcu, ante lorem.
2)
Technology Review:
Neque est metus, suscipit egestas, diam magnis fringilla, tristique natoque consequat imperdiet. Vestibulum ac nascetur ullamcorper wisi sit, a tempor nascetur, ullamcorper pellentesque sem mauris in, amet nec a dui wisi, pede nullam. Lacus nibh quisque fusce, ipsum enim adipiscing id non ut rutrum, ac metus scelerisque maecenas, ac non sodales quam ut tincidunt in, lectus at. Tincidunt imperdiet in vel et nonummy, felis orci sed non nonummy, lobortis suspendisse vitae est wisi nonummy. Velit donec, amet cubilia, pellentesque tempor risus sed penatibus, veniam accumsan in. Velit nulla wisi, enim suscipit etiam donec lacinia nunc nec. Vitae urna tincidunt in, ut in molestie at sapien. Tempus imperdiet enim, mauris pellentesque ligula tortor luctus wisi at. Feugiat ut in sed vestibulum, pede tincidunt, feugiat sit vivamus porta, fusce tortor wisi euismod. Nunc pulvinar hymenaeos integer, mi eget dui, feugiat urna vestibulum massa inceptos. Praesent nullam volutpat ullamcorper phasellus quis pede, diam pede amet erat ligula elementum, ut sit id nisl, sed nullam lobortis.
3)
System Description:
Use this section to explain the block diagram. If the project does not have one, create one according to your interpretation of the project and state in the description that the block diagram is interpretation of the project. Massa tortor et magna, ut pellentesque. Vel sit vestibulum rutrum neque, nullam ligula felis, nulla etiam sodales convallis quis ac, dolor placerat massa donec scelerisque, enim at nunc nemo leo. Vestibulum felis convallis vel, accumsan hendrerit in ac arcu. Blandit fames lorem nisl elit, porttitor adipiscing placerat sit aliquam pulvinar, nullam felis iaculis vitae nec mauris, sit quis vestibulum fusce. Morbi vitae at orci morbi purus integer, commodo parturient sem justo pede in dis, lectus sed habitant rhoncus orci. Lectus ac ultrices placerat nunc. Et varius rhoncus. Nullam morbi vitae, arcu pede purus malesuada. Iaculis justo mauris magna.
Figure 3 System Diagram, from page 10 of [1]
(The figure has to be described in the text)
Donec porttitor tempus egestas massa vivamus blandit, quisque gravida consequat eget, sed morbi. Mauris sed, odio justo convallis fermentum laoreet nulla, tincidunt nullam velit, lacinia porta, tortor cras ac leo integer. Eros ultrices, maxime amet et. Ut cras tincidunt quis odio, quam justo pharetra, tempor nec ac vestibulum id mollit lectus. Consectetuer eu, enim lacus vel condimentum est id libero, viverra quis, nam orci posuere arcu mi sed lorem, pulvinar nisl urna pellentesque nunc. Donec non sociis eum dolores, lacus minima facilisis eu tempor porta. Nonummy amet, eu mattis habitasse ante nibh, vivamus pellentesque duis volutpat facilisis ut. Platea lectus rhoncus quis urna, fusce praesent, amet vel.
XVII. END PRODUCT DESCRIPTION AND OTHER DELIVERABLES
A.
Specifications.
Read the Need Specification presentation and in agreement with your mentor determine the specs for each of the objectives of your project. Present the reasons for selecting each spec and summarize them in a table.
IX. INTELLECTUAL PROPERTY
We will discuss three patents that suspendisse pellentesque, mi litora metus. Nibh pede, eu ultricies vitae eget risus malesuada. Nullam orci mauris at, ut ut suspendisse ornare dignissim. A at sollicitudin bibendum, vitae eu suspendisse et dignissim maecenas odio, vel nunc non sit porta donec, consectetuer consectetuer malesuada, interdum urna wisi maecenas ullamcorper mauris mi. Mauris urna nam, justo quam, laoreet diam tempor hendrerit ac. Erat vestibulum litora natoque integer.
A. Robot System, United States Patent 7,066,291
This patent by Martins, et al. was granted in June 27, 2006 and will be describe in the next sections.
1) Summary:
Use your own words, do not copy and paste. A mobile robot system for performing a plurality of separate operations, and including at least one autonomous wheeled mobile robot having at least one wheel-driving motor, an on-board computer, a system for navigation, orientation, and maneuvering in an environment with moving obstacles, a sensor system, a wireless communication system operative to receive and send signals, and a plurality of dockable operation modules and operative to be selectively coupled to the autonomous mobile robot to form an operation unit, wherein the autonomous wheeled mobile robot autonomously docks to the dockable operation modules.
2) Claims Summaries:
In your own words make a summary of all the claims that could relate to your project. Elit dui aliquam tortor dignissim mi maecenas, in velit justo mi, sed viverra eget, diam accumsan interdum. Dapibus dolor nam amet sodales at ac, suscipit vel in accumsan vel et et, ut vivamus. Duis a, tempor nec pede. Nisl aliquam ac wisi posuere risus integer, ultricies magna amet mattis dignissim, metus iaculis id varius feugiat nec. Quis donec nullam arcu in dolores, nam habitasse luctus vivamus, eget purus non nec culpa natoque sit, primis neque morbi integer vestibulum. Ac augue sit elit scelerisque erat.
3) Non Infringement:
Explain here why you will not infringe. Make sure you avoid infringement of the claims. That is not necessary obtained by changing implementations. Like their patent is for a wireless product, ours is not.
Concept Development and End Product Description
*
Concept Generation
*
Portable Audio Equalizer
Objectives
The system should have excellent sound quality.
The system should have easy equalization
The system should be of light weight
The system should be low cost
Constraints
The system must be portable
The system will be an add-on to existing MP3 player
*
Concept Fan
The Concept Fan is a way of discovering alternative approach’s to a problem when you have discarded all obvious solutions. It develops the principle of ‘taking a step back’ to get a broader viewpoint. Initially, the Concept Fan requires you to draw a circle in the middle of a large piece of paper. Write the problem you are trying to solve in the circle. To the right of it radiate lines representing possible solutions to the problem see the diagram below:
https://www.mycoted.com/Concept_Fan
*
Concept Fan
It is possible that the ideas you have come up with are impractical or do not really solve the problem. If this is the case, take a ‘step back’ for a broader analysis of the problem. Drawing a circle to the left of the first circle does this, writing the broader definition into this new circle and linking it with an arrow to show that it comes from the first circle, see diagram below:
Use this as a starting point to radiate out other ideas, if this does not give you an adequate amount of new ideas, you can take yet another step back (and another, and another…)
https://www.mycoted.com/Concept_Fan
*
Concept Fan
*
Sheet1
Audio Equalizer
Input Amplifier
Automatic Level control
ALC
Graphic Equalizer
Single Transistor + OPAMP
Dual OPAMP
Analog Logarithmic Amplifier
Microcontroller
+ variable Gain Amplifier
Active Filter
Digital Filter
Pasive Filter
Analog Filter
Sheet2
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Moderate Cost Fully Featured
Moderate to Implement Higher Signal to Noise ratio
Sheet3
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Moderate Cost Fully Featured
Moderate to Implement Low Signal to Noise ratio
Concept Combination Table
A concept Combination Table (also called morphology box) is a matrix of concept fragments organized by functions (each function forms a separate column) so that an integrated concept can be created by choosing any concept fragment for each function and combining them to complete the required functionality.
https://books.google.com/books?id=9ZjLBQAAQBAJ&pg=PA114&lpg=PA114&dq=concept+combination+table&source=bl&ots=ceBcnUUi7f&sig=PiCBZeHApgZDjgYV2EtcYDbuWeA&hl=en&sa=X&sqi=2&ved=0ahUKEwinsOeq4bTPAhVJmR4KHeO0D9kQ6AEIXDAM#v=onepage&q=concept%20combination%20table&f=false
*
Concept Combination Table
*
Sheet1
Audio Equalizer
Input Amplifier
Automatic Level control
ALC
Graphic Equalizer
Single Transistor + OPAMP
Dual OPAMP
Analog Logarithmic Amplifier
Microcontroller
+ variable Gain Amplifier
Active Filter
Digital Filter
Pasive Filter
Analog Filter
Sheet2
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Low Cost Not many features
Easy to Implement Low Signal to Noise ratio
Sheet3
Concept Combination Table
*
Sheet1
Audio Equalizer
Input Amplifier
Automatic Level control
ALC
Graphic Equalizer
Single Transistor + OPAMP
Dual OPAMP
Analog Logarithmic Amplifier
Microcontroller
+ variable Gain Amplifier
Active Filter
Digital Filter
Pasive Filter
Analog Filter
Sheet2
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Moderate Cost Low Signal to Noise ratio
Moderate complexity to Implement
Fully Featured
Sheet3
Concept Combination Table
*
Sheet1
Audio Equalizer
Input Amplifier
Automatic Level control
ALC
Graphic Equalizer
Single Transistor + OPAMP
Dual OPAMP
Analog Logarithmic Amplifier
Microcontroller
+ variable Gain Amplifier
Active Filter
Digital Filter
Pasive Filter
Analog Filter
Sheet2
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Moderate Cost Design Complexity
Fully Featured
Higher Signal to Noise ratio
Sheet3
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Moderate Cost Fully Featured
Moderate to Implement Low Signal to Noise ratio
Concept Selection
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 5
Low Cost 1/3 1/3 1/5 1
This table compares the relative importance of the objectives.
“Sound Quality is strongly more important than Easy Equalization”. (There is a 5 in this cell)
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.52
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 5.00 1.1362193665 0.23
Low Cost 0.33 0.33 0.20 1.00 0.3860973951 0.08
This table is used to determine the weights (importance) of the objectives Total 4.9924485625
Sheet2
Sheet3
Concept Selection
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 2
Low Cost 1/3 1/3 1/2 1
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19
Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10
Total 4.8592255762
w
Sound Quality. 0.53
Easy Equalization 0.18
Light Weight 0.19
Low Cost 0.10
Sheet2
Sheet3
Option 1 Option 2 Option 3 If a contraint is No
Constraints That Option must be Discarded
Must be Portable Yes Yes Yes
Add-on to existing MP3 P. Yes Yes Yes Select option with Highest Score
Objectives w
Sound Quality. 0.52 3.00 1.56 3 1.56 5 2.60 5 is Maximum
Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90
Light Weight 0.23 5.00 1.15 4 0.92 4 0.92
Low Cost 0.08 5.00 0.4 5 0.40 3 0.24
3.83 3.78 4.66
End Product Description
In this section you will describe:
The constituent modules and their interrelationships
The functionality of the product
The functionality of the different modules
Present the product specs
*
Black Box
In science, computing, and engineering, a black box is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings. Its implementation is “opaque” (black). Almost anything might be referred to as a black box: a transistor, an algorithm, or the human brain.
https://en.wikipedia.org/wiki/Black_box
*
Block Diagram
A block diagram is a diagram of a system in which the principal parts or functions are represented by blocks connected by lines that show the relationships of the blocks. They are heavily used in engineering in hardware design, electronic design, software design, and process flow diagrams.
https://en.wikipedia.org/wiki/Block_diagram
http://www.hobbyprojects.com/block_diagrams/block_diagrams.html
*
Level 0 Equalizer Functionality
This is the product description without knowledge of the internal blocks (black box)
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 2
Low Cost 1/3 1/3 1/2 1
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19
Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10
Total 4.8592255762
w
Sound Quality. 0.53
Easy Equalization 0.18
Light Weight 0.19
Low Cost 0.10
Sheet2
Audio Input Signal Audio Equalizer
Equalizer Control Audio output Signal
Power
Module Audio Equalizer
Inputs – Audio input: 1V peak to peak
– Power 9 V DC
– Equalization Settings
Outputs Equalized Audio : 1V peak to peak
Functionality Equalize the input audio signal
to provide desired frequency content
Sheet3
Option 1 Option 2 Option 3 If a contraint is No
Constraints Yes Yes Yes That Option must be Discarded
Must be Portable Yes Yes Yes
Add-on to existing MP3 P. Yes Yes Yes
Objectives w
Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum
Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90
Light Weight 0.19 5.00 0.95 4 0.76 4 0.76
Low Cost 0.10 5.00 0.5 5 0.50 4 0.40
3.23 3.75 4.71
Level 1 Equalizer Functionality
This a general Description of the internal blocks
Only Pre-AMP table shown. Show a table for each block
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 2
Low Cost 1/3 1/3 1/2 1
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19
Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10
Total 4.8592255762
w
Sound Quality. 0.53
Easy Equalization 0.18
Light Weight 0.19
Low Cost 0.10
Sheet2
Audio Input Signal Audio Equalizer
Equalizer Control Audio output Signal
Power
Buffered Input Constant Amplitude Signal
Audio Input Equalized Signal
Power 9 V DC
Module Pre Amplifier
Inputs – Audio input: 1V peak to peak
– Regulated 5 VDC
Outputs Low impedance buffered output
Functionality – Provides high input impedance
– Provides low output impedance
DC DC converters required
Pre Amplifier
Automatic Level
control (ALC)
Digital Filter
Power Supply
Sheet3
Option 1 Option 2 Option 3 If a contraint is No
Constraints Yes Yes Yes That Option must be Discarded
Must be Portable Yes Yes Yes
Add-on to existing MP3 P. Yes Yes Yes
Objectives w
Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum
Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90
Light Weight 0.19 5.00 0.95 4 0.76 4 0.76
Low Cost 0.10 5.00 0.5 5 0.50 4 0.40
3.23 3.75 4.71
Level 2 Automatic Level
control (ALC)
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 2
Low Cost 1/3 1/3 1/2 1
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19
Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10
Total 4.8592255762
w
Sound Quality. 0.53
Easy Equalization 0.18
Light Weight 0.19
Low Cost 0.10
Sheet2
Audio Input Signal Audio Equalizer
Equalizer Control Audio output Signal
Power
Buffered Input Constant Amplitude Signal
Audio Input Equalized Signal
Power 120 VAC, 60Hz
Pre Amplifier
Automatic Lecel
control (ALC)
Digital Filter
Power Supply
Sheet4
DC Voltage input
Buffered Input Signal Constant Amplitude Signal
Gain Control Output Sample
Module Pre Amplifier
Inputs – Audio input: 1V peak to peak low impedance
– Regulated 5 VDC
– Feedback from Microcontroller
Outputs Constant peak value buffered audio signal
Each Block is described in detail DC Voltage input Functionality – Samples the module output
– Detects the peak values
– Adjusts the amplifier’s gain
Repeat as needed to explain all blocks in Level 1
Variable Gain
Amplifier
Microcontroller
Sheet3
Option 1 Option 2 Option 3 If a contraint is No
Constraints Yes Yes Yes That Option must be Discarded
Must be Portable Yes Yes Yes
Add-on to existing MP3 P. Yes Yes Yes
Objectives w
Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum
Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90
Light Weight 0.19 5.00 0.95 4 0.76 4 0.76
Low Cost 0.10 5.00 0.5 5 0.50 4 0.40
3.23 3.75 4.71
Embedded Systems Require additional Information
Functionality of embedded system requires different approach
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 2
Low Cost 1/3 1/3 1/2 1
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19
Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10
Total 4.8592255762
w
Sound Quality. 0.53
Easy Equalization 0.18
Light Weight 0.19
Low Cost 0.10
Sheet2
Audio Input Signal Audio Equalizer
Equalizer Control Audio output Signal
Power
Buffered Input Constant Amplitude Signal
Audio Input Equalized Signal
Power 120 VAC, 60Hz
Pre Amplifier
Automatic Lecel
control (ALC)
Digital Filter
Power Supply
Sheet5
Module Microcontroller
Inputs – Audio output sample
– Regulated + 5 VDC
Outputs – Gain Control Signal
Functionality
Start
Sample Audio Output
Low Level?
Amplify Control
High Level?
Amplify Control
Attenuate Control
Yes
Yes
No
No
Sheet4
DC Voltage input
Buffered Input Signal Constant Amplitude Signal
DC Voltage input
Variable Gain
Amplifier
Microcontroller
Sheet3
Option 1 Option 2 Option 3 If a contraint is No
Constraints Yes Yes Yes That Option must be Discarded
Must be Portable Yes Yes Yes
Add-on to existing MP3 P. Yes Yes Yes
Objectives w
Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum
Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90
Light Weight 0.19 5.00 0.95 4 0.76 4 0.76
Low Cost 0.10 5.00 0.5 5 0.50 4 0.40
3.23 3.75 4.71
Continue until the next step is to place components
*
Conventions
Use buses (Thick lines) to represent several connecting lines that have common origin and destination
Terminate the bus with an arrow head at the destination
When information flow is bidirectional, place arrows at both ends of the bus
When possible indicate the number of lines
Conventions
At some level of detail all individual lines must show
Images from:
http://file.scirp.org/Html/1-6401302_42760.htm
and
https://en.wikipedia.org/wiki/Control_system
Remember, stop when the next step is placing components
In Summary
Describe diagrams in paragraphs with local functionality tables slides (11 to 14)
Repeat Functionality Tables
Put level 0 functionality in one table
Group all level 1 functionality tables in one table
Repeat for all levels
At the end of de section include the Technical Specs that you obtained before
*
Example
Diagrams and tables must be explained
Diagrams and tables must be explained
Diagrams and tables must be explained
Diagrams and tables must be explained, as in this case.
Diagrams and tables must be explained
Other Deliverables
Power Point Presentation
Final Report
User Manual
etc
*
Audio
Equalizer
Input
Amplifier
Automatic
Level
control
ALC
Graphic
Equalizer
Single
Transistor +
OPAMP
Dual OPAMP
Analog
Logarithmic
Amplifier
Microcontroller
+
variable
Gain Amplifie
r
Active Filter
Digital Filter
Pasive Filter
Analog
Filter
AdvantagesDisadvantages
Low CostNot many features
Easy to ImplementLow Signal to Noise ratio
Digital Filter
Graphic Equalizer
Single Transistor +
OPAMP
Dual OPAMP
Analog
Logarithmic
Microcontroller
+ variable Gain
Active Filter
Passive Filter
Input Amplifier
Automatic Level
control ALC
AdvantagesDisadvantages
Moderate CostLow Signal to Noise ratio
Moderate complexity to Implement
Fully Featured
Digital Filter
Graphic Equalizer
Single Transistor +
OPAMP
Dual OPAMP
Analog
Logarithmic
Microcontroller
+ variable Gain
Active Filter
Passive Filter
Input Amplifier
Automatic Level
control ALC
AdvantagesDisadvantages
Moderate CostDesign Complexity
Fully Featured
Higher Signal to Noise ratio
Digital Filter
Graphic Equalizer
Single Transistor +
OPAMP
Dual OPAMP
Analog
Logarithmic
Microcontroller
+ variable Gain
Active Filter
Passive Filter
Input Amplifier
Automatic Level
control ALC
Sound Quality.Easy EqualizationLight WeightLow Cost
Sound Quality.1533
Easy Equalization1/5113
Light Weight1/3115
Low Cost1/31/31/51
1 = equal3 = moderate5 = strong7 = very strong9 = extreme
Sound Quality.Easy EqualizationLight WeightLow CostG. Meanw
Sound Quality.1.005.003.003.002.590020.52
Easy Equalization0.201.001.003.000.8801120.18
Light Weight0.331.001.005.001.1362190.23
Low Cost0.330.330.201.000.3860970.08
Total4.992449
This table compares the relative importance of the objectives.
“Sound Quality is strongly more important than Easy Equalization”. (There is a 5 in this cell)
This table is used to determine the weights (importance) of the objectives
total
Mean
G
w
A
A
A
Mean
G
N
N
/
.
)
(
.
1
2
1
=
´
×
×
×
×
×
×
´
´
=
If a contraint is No
ConstraintsThat Option must be Discarded
Must be Portable
Add-on to existing MP3 P.Select option with Highest Score
Objectivesw
Sound Quality.0.523.001.5631.5652.605 is Maximum
Easy Equalization0.184.000.7250.9050.90
Light Weight0.235.001.1540.9240.92
Low Cost0.085.000.450.4030.24
3.833.784.66
Option 3
Yes
Yes
Option 2
Yes
Yes
Option 1
Yes
Yes
Audio Input Signal
Equalizer ControlAudio output Signal
Power
Module
Inputs
Outputs
Functionality
Audio Equalizer
Equalized Audio : 1V peak to peak
– Audio input: 1V peak to peak
– Power 9 V DC
– Equalization Settings
Equalize the input audio signal
to provide desired frequency content
Audio Equalizer
Buffered InputConstant Amplitude Signal
Audio InputEqualized Signal
ModulePre Amplifier
Inputs
Outputs
Functionality
DC DC converters required
Power 9 V DC
– Audio input: 1V peak to peak
– Regulated 5 VDC
– Provides high input impedance
– Provides low output impedance
Low impedance buffered output
Pre AmplifierAutomatic Levelcontrol (ALC)Digital FilterPower Supply
Buffered Input SignalConstant Amplitude Signal
Gain ControlOutput Sample
ModulePre Amplifier
Inputs
– Audio input: 1V peak to peak low impedance
– Regulated 5 VDC
– Feedback from Microcontroller
OutputsConstant peak value buffered audio signal
Each Block is described in detail
Functionality
– Samples the module output
– Detects the peak values
– Adjusts the amplifier’s gain
Repeat as needed to explain all blocks in Level 1
DC Voltage input
DC Voltage input
Variable GainAmplifierMicrocontroller
Module
Inputs
Outputs
Functionality
– Audio output sample
– Regulated + 5 VDC
– Gain Control Signal
Microcontroller
Start
Sample
Audio
Output
Low
Level?
Amplify Control
High
Level?
Attenuate Control
Yes
Yes
No
No
I. CONCEPT DEVELOPMENT
The objective of this section is to make a concept fan of all the possible options of
implementing this project. We will analyze all the different implementations of this project in
order to obtain an option which is viable and fits the needs of the client. It will need to meet our
objectives and constraints in the most efficient way, while taking our assumptions and limitations
into consideration. After analyzing all of the alternate options , we will construct a concept
selection table with a weighted average in order to select the best concept to follow.
The concept fan is a chart which shows all the different alternatives that we can choose from
to arrive at the same objectives. After analyzing the concept fan, we will use the weighted table
to determine which option proves to be the most viable. Figure 19 shows the concept fan chart,
which was derived through brainstorming and analysis of the objectives.
The chart in Figure I-1 first names our main objective which is to develop a telemetry band.
The second level of the cha rt shows the different parts that are needed in order to arrive at the
objective. Basically, we will need a user interface, transmitter, receiver, and control unit in order
to achieve our design objectives. Each of the parts has its own set of components t hat are needed
to fulfill that part. The user interface is the way in which the user will interact with the device.
The transmitter will be responsible for transmitting power to the receiver, which will possibly
demodulate the signal. The control unit will be used to control all of the various sensors and
components which will be used in the arm band.
Figure I-1. The Concept Fan Chart
In the following sections we will present and analyze alternate soluti ons and implementations
for the Telemetry Band. Once the best option is found, it components, inputs, outputs, and
functions will be analyzed.
low-power RFID, which in turn uses backscatter modulation. All of the processes will be
controlled by the ARM microcontroller, which introduces the advant age of compatibility with
C++, which most of our team is familiar with. The main advantages include direct control of the
arm band, low-power operation, and ease of programming due to familiarity with computer
programing.
a) Disadvantages
The disadvantage of using the computer as the user interface is that it limits the mobility of
the arm band by needing a bulky device in order to receive and read the measurements. Also, the
command-based user interface will require more complex programming. To modulate the power
signal with BPSK also introduces increased circuit complexity, more components, and greater
power consumption in the arm band. Using RFID will also require complex circuitry so that it
can use the existing SCMR antenna. This will also present increased cos t due to the need to have
a demodulator circuit in the receiver as well as an RFID transmitter.
senior 模板-1
1
DEPARTMENT OF ELECTRICAL AND COMPUTER
ENGINEERING
EEL-4920
SENIOR DESIGN I FINAL REPORT
FALL 2015
Infrared Remote Control Code Lock
TEAM 6
Xuefeng Li (5462535)
(Team leader)
Xiaolun Zhang (5577546)
Shuo Qin (5576977)
Jing Xiao (5577719)
Yiming Huo (5596507)
Mentor: Dr. Gustavo.Roig
Fall 2015
2
Contents
Acknowledgement and Abstract……………………………………………………………6
I. EXECUTIVE SUMMARY……………………………………………………………….7
A. summarized problem statement……………………………………………………….7
B. objectives and constraints……………………………………………………………….7
C. project description…………………………………………………………………………7
D. sections………………………………………………………………………………………..7
II. PROBLEM STATEMENT……………………………………………………………….9
A. project objectives…………………………………………………………………………..9
B. constraints…………………………………………………………………………………….9
III. ASSUMPTIONS AND LIMITATIONS………………………………………….10
A. Identifying Assumptions ……………………………………………………………..10
B. Identifying Limitations ………………………………………………………………..10
IV. NEEDS FEASIBILITY ANALYSIS………………………………………………11
A. Needs Analysis……………………………………………………………………………11
B. Need Specification……………………………………………………………………….15
C. Feasibility Analysis……………………………………………………………………..16
D. Marketability………………………………………………………………………………18
V. RISK ANALYSIS…………………………………………………………………………23
VI. OPERATING ENVIRONMENT……………………………………………………25
VII Intended user(s) and Intended Use(s) …………………………………………….26
A. Intended use(s) …………………………………………………………………………..26
B. Intended user(s) ………………………………………………………………………….27
VIII. BACKGROUND………………………………………………………………………27
A. AugustSmartLock ………………………………………………………………………27
B. RemoteLock 6i …………………………………………………………………………..29
C. iTouchless Bio-Matic Fingerprint Door Lock …………………………………33
IX INTELLECTUAL PROPERTY……………………………………………………..36
A.Remote control door lock system ………………………………………………….36
B.Security door lock with remote control …………………………………………..37
C.Remote control mechanism for a locker ………………………………………….39
X. STANDARDS CONSIDERATIONS………………………………………………40
XI.GLOBALIZATION………………………………………………………………………46
A. GLOBAL AWARENESS
…………………………………………………………..46
B. GLOBALPERSPECTIVE
………………………………………………………….47
C. GLOBALENGAGEMENT
…………………………………………………………47
D. WORLD TRADE ORGANIZATION[4]
……………………………………..47
3
E. ELIMINATING BARRIERS
………………………………………………………49
F. COLLABORATION TOOLS
……………………………………………………..49
G. INTERNATIONAL CONTACTS
……………………………………………….49
XII. HEALTHY AND SAFETY…………………………………………………………50
XIII.ENVIRONMENTAL CONSIDERATION……………………………………51
XIV. SUSTAINABILITY CONSIDERATIONS…………………………………..55
XV. MANUFACTURABILITY CONSIDERATIONS………………………….56
XVI.ETHICAL CONSIDERATIONS AND SOCIAL IMPACT…………….57
A. Ethical Considerations ………………………………………………………………..58
B. SOCIALIMPACTS …………………………………………………………………….59
XVII.CONCEPT DEVELOPMENT……………………………………………………61
A. ALTERNATIVE OPTIONS
……………………………………………………….61
B. CONCEPTSELECTION
…………………………………………………………….64
XVIII.END PRODUCT DESCRIPTION AND OTHER
DELIVERABLES……………………………………………………………………………..66
A. END PRODUCT DESCRIPTION
……………………………………………….66
B. FUNCTIONS …………………………………………………………………………….66
C. SPECIFICATIONS
……………………………………………………………………67
D. OTHER DELIVERABLES
………………………………………………………..71
XIX. PLAN OF ACTION……. ……………………………………………………………72
A. Statement of Work (SOW) …………………………………………………………..72
B. Online Structure (WBS) ………………………………………………………………73
C. Project Milestones ………………………………………………………………………75
D. Timeline
…………………………………………………………………………………..76
E. Gantt chart and Pert Charts ………………………………………………………….76
XX.MULTIDISCIPLINARY ASPECTS……………………………………………..79
XXI.PERSONNEL……………………………………………………………………………80
XXII.BUDGET…………………………………………………………………………………84
XXIII. RESULTS EVALUATION……………………………………………………..85
XXIV. LIFE LONG LEARNING……………………………………………………….86
XXV. APPENDIX……………………………………………………………………………86
A. Team contract ……………………………………………………………………………86
B. Intellectual Property Contract ………………………………………………………87
XXVI Senior Design II Procedures……………………………………………………..89
References……………………………………………………………………………………….91
4
Figure Contents
Figure 1 LINKA………………………………………………………………………………..19
Figure 2 Flow chart of LINKA……………………………………………………………19
Figure 3 Nuimo………….. ……………………………………………………………………20
Figure 4 Flow Chart of Nuimo…… ………………………………………………………21
Figure 5 Flow chart of our project……………………………………………………….22
Figure 6 Risk Analysis Tree……. ………………………………………………………..23
Figure 7 operating environment…….. …………………………………………………..26
Figure 8 Schematic of August Lock Installation……………………………………29
Figure 9: Diagram of the August Lock operating principle……………………..29
Figure 10 Schematic of RemoteLock 6…………………………………………………32
Figure 11 Schematic of network RemoteLock 6i wireless diagram………….32
Figure 12: Block Diagram of Fingerprint identification system diagram…..35
Figure 13: Picture of iTouchless Bio-Matic Fingerprint Door Lock…………35
Figure 14 Patent 1……………………………………………………………………………..36
Figure 15 Patent 2……………………………………………………………………………..38
Figure 16 Patent 3……………………………………………………………………………..39
Figure 17 LCA for Infrared remote control door lock……………………………52
Figure 18 LCTA for Infrared remote control door lock …………………………53
Figure 19 LCIA for Infrared remote control door lock by category…………54
Figure 20 product cummulative cost per phase/time………………………………57
Figure 21 Concept Fan………………………………………………………………………61
Figure 22 Alternative 1 STC89c51-LCD-AT24C02………………………………62
Figure 23 Alternative 2 STC89c51-LCD-ATMega88…………………………….63
Figure 24 Alternative 3 AT90S1200-LED-AT24C02…………………………….63
Figure 25 Alternative 4 AT90S1200-LCD-ATMega88………………………….64
Figure 26 Level 0 FInfrared remote control lock functionality bBlock
Ddiagram………………………………………………………………………………………….67
Figure 27 Level 1 infrared remote control lock block diagram………………..68
Figure 28 Level 2 Block Diagram………………………………………………………..68
Figure 29 Clock Ccircuit…………………………………………………………………….69
Figure 30 Reset Ccircuit……………………………………………………………………..69
Figure 31 Flow Chart…………………………………………………………………………73
Figure 32 Project Plan………………………………………………………………………..74
Figure 33 Pert Chart…………………………………………………………………………..78
5
Table Contents
Table 1Team Members………………………………………………………………………..7
Table 2 Client Interview……………………………………………………………………..12
Table 3 Client Interview and user survey………………………………………………13
Table 4 Client Interview, survey and Team Ideas…………………………………..14
Table 5 Objectives……………………………………………………………………………..15
Table 6 Weighted scale and weight computation……………………………………16
Table 7 Component Specifications………………………………………………………18
Table 8 Likelihood of Occurrence ……………………………………………………….24
Table 9 Action Table………………………………………………………………………….25
Table 10 Ethical Solutions………………………………………………………………….59
Table 11 Ethical Evaluations……………………………………………………………….59
Table 12 Weighted Scores of Objectives………………………………………………65
Table 13 Alternative Selection Table……………………………………………………65
Table 14 Level 0 LInfrared remote control lock functionality………………….67
Table 15 Level 1 infrared remote control lock block diagram………………….68
Table 16 Level 2 Clock and Reset circuit……………………………………………..69
Table 17 Project Sspecification……………………………………………………………70
Table 18 Input and Output specification……………………………………………….71
Table 19 Gantt chart for time line………………………………………………………..77
Table 20 Gantt chart for budget ………………………………………………………….84
6
Acknowledgement
We are writing acknowledgement to extend our sincere gratitude to our mentor Dr.
Gustavo Roig for instructing us the issues of our senior design project. Dr. Gustavo Roig
gave us an opportunity to work with him on an valuable project when we sought his
advice at the beginning of our senior design. Dr. Gustavo Roig gave us a lot of support
and guidance on the process of designing the product throughout this semester. We would
also express thanks to our instructor, Professor Wilmer Arellano for teaching us to
understand the various rules of electrical product and also guiding us to write a precise
paper for senior design. The completion of this paper could not been finished without the
work place which Electrical Engineering Department of FIU provide to us and the help of
the people who have assisted us to finish the paper.
Abstract
In daily life, the traditional door lock can not meet all the requirement of people. For
example, people cannot open the door lock only by walking to the door. To meet the
requirements of the use of locks to increase their security and convenience, with a
controller instead of the key came into being. Remote control door lock is safe, low cost,
low power consumption, easy to operate.In one word, this new type lock has more
advantages than traditional lock. At present the use of electronic locks are mostly based
on microprocessor, main devices MCU, the encoder and decoder built into software. Our
project uses SCM system(Mainly STC89C51 microcontroller minimum system), 4×4
Matrix keyboard, LCD display and alarm system. Our project contains a lot of functions
such as the setting function, modifying the six user password function, ultra alarm
function, ultra lock function, password error alarm function and other functions(P0 port
to control the design of the LCD display. If the password is correctly, the display will
show “ok” on the screen. If the password is error, the0 display will show “error” on the
screen. For more than three times to enter password error, the lock will be auto locked.
The P1 port controls keyboard matrix containing the number keys 0-9 and A-F function
keys). In addition to the above basic password lock feature, based on the actual situation
we decided to add a remote control functions to our door lock. The system of our remote
control door lock is low cost, safety, low power consumption and very easy to operate.
These advantages of this new type electrical door lock attract us to spend our time to
design it.
7
I. EXECUTIVE SUMMARY
Infrared Remote Control Code Lock
Team Number: 6 Team Name: Infrared Remote Control Code Lock
Mentor: Dr. Gustavo. Roig Team Leader: Xuefeng Li
Team Member: Jing Xiao Team Member: Shuo Qin
Team Member: Xiaolun Zhang Team Member: Yiming Huo
Table I: Team Members
A. Summarized Problem Statement
Our team came together with one
thought: to improve a new type of lock
which we can control the lock from a far
distance. The purpose behind our
thought is to make a lock without a key
and can be controlled by a remote
control.
B. Objectives and Constraints
In our project the main objectives are:
1. Should be safe to use
2. Should be easy to use
3. The remote control device should
be small and lightweight
4. Should be easy to install
In our project the main constraints
are:
1. Weigh less than 250g
2. Cost less than $100
3. Size should be about 7cm by 7cm
4. The lock material requires very
strong metal
C. Project Description
Our product will be a multi-function
lock. The lock can be securely mounted
on the door and will be controlled by an
infrared remote control or password;
while maintaining security, our product
will be safe and easy to use. This device
will be constructed primarily of metal. In
general the installation procedure will be
design to be very simple so the product
will be widely applicable and accepted.
Visually, our product will look
similar to the locking mechanisms found
on hotel doors. Although this appearance
may not be aesthetically pleasing, it can
be easily modified. Ideally in the eyes of
the customer, the appearance will be
completely customizable. However, this
would reduce the economies of scale
established when producing a uniform
product. In light of this, we plan to
conduct a survey and research current
trends in order to design an acceptable
8
appearance.
D. Sections
Our team agrees that the most
important sections in our report are the
following sections:
• Background
• Globalization
• Concept Development
• End Product Description And Other
Deliverables
• Need Feasibility Analysis
• Plan Of Action
• Personnel
• Budget
• Conclusion
And our team believes that these
sections in our report can strongly show
our logic reasoning and the thought
process steps in this design. In the
Personnel section describes a little about
all the team members and we think this
can a very effective way to portray our
skills and shows the part we are
responsible for in the report.
9
II. PROBLEM STATEMENT
Our team came together with one thought: to improve a new type of lock which we
can control the lock from a far distance. The purpose behind our thought is to make a
lock without a key and can be controlled by a remote control device. Once you forgot or
lost the key, you just need to input the six-digit password, and then you can get into
home.
A. Project Objectives
The main objective for our team is to design a new type of lock, which we can control
the lock from a far distance. The purpose behind our thought is to make a lock without a
key and can be controlled by a remote control.
In our project the main objectives are:
l Should be safe to use
l Should be easy to use
l The remote control device should be small and lightweight
l Should be easy to install
B. Constraints
For all locks, the security of the system always comes first for all customers and
designers. Besides that, we also need to make our lock easy to install in the door and the
remote control device need to be lightweight, small and easy to use.
In our project the constraints are:
l Weigh less than 250g
l Cost less than $100
l Size should be about 7cm by 7cm
l The lock material requires very strong metal
Making assumptions can help us to narrow down the unrealistic project aspirations,
and the limitation will help our team to prevent inefficiency in our project managing.
As for the limitation details, which may need to be requested from the client. Otherwise,
there may exist plenty of unknown area with our project, and we need to study them and
finish our goals. This is a very necessary step before the designing and research process.
10
III. ASSUMPTIONS AND LIMITATIONS
The need feasibility analysis is very important for our project and it can give us a fully
understanding of our project needs, so we can better accomplish our tasks and designs in
our project. We must conduct the in formation from customers’ surveys and brainstorm
of our team to find out exactly what we really needs and how we can make our product
marketable and desirable it for clients. We will not only analyze our needs, but also
analyze our skills too; this is the reason and importance for a needs feasibility analysis.
A. Identifying Assumptions
The appropriate assumption definition in Engineering is the “Accepted cause and
effect relationships, or estimates of the existence of a fact from the known existence of
other fact(s).” For our team as an Engineer, we should research some information
completed and recorded our testing data when making assumptions for our design.
Between the assumption and the potential idea, we can make a connection, and if the
accomplished work were studied deeply. Besides, the appropriate assumptions in
Engineering will help us to make a huge progress on our project. Our lock should have an
alarm system, which can protect client safer. Besides, we can make an app on the phone
for changing the password or informing the user the lock has been unlocked.
1) Assumptions
l The lock will have an alarm system
l The lock will have an app to control the lock
B. Identifying Limitations
Limitations play a very important role in our project. Limitations are necessary for
progress of our project. During researching previous work, which is notice us that project
limitations is a necessary part for our project and will determine our success or not. The
funding or sponsorship lacking and unavailable resources will also make our designing
process failure. However, in some cases, the limitation will not discovered until after a
failure design or project. In a word, the limitation is one of the most important parts in the
whole project.
1) Limitations
l Infrared transmission distance (approx. 20 meter)
l Remote control device battery Life (approx. 1 year)
11
IV. NEEDS FEASIBILITY ANALYSIS
The need feasibility analysis will help each team members to get a full understanding
of our design and what goals we need to achieve. So the surveys and brainstorm is a easy
way to figure out exactly what we really needs and how we can make our project more
marketable and acceptable for clients. Not only we will analyze our needs but also we
will analyze our team skills too, which is the reason why the needs feasibility analysis is
necessary foe our team.
A. Needs Analysis
For the need analysis part, the client survey is a easy and effective way to conduct the
information from the client, and also for the clients inter view. At the beginning, we will
deduce the information from the client interview, then the client surveys, and the last we
will have a brainstorm to comp up with our own thoughts. This will give our team a
better understanding of what the user really need.
1) Client Interview
To know more about the needs of the client, we use our client interview to conduct the
key information. The client interview will help our team understand deeply and know
how to make these ideas to become a real design, which is also an important part of our
final product.
1. What is the most attractive point of our lock for you?
a. I think is the remote control, it is very convenient for me, I can open the door before
I touch it or use the key.
b. I like the function that one remote control device can open many doors, so that I do
not need to hold so many keys and find which one is the correct.
2. What is the different do you think between our lock and traditional lock?
a. It is fix for almost all kinds of door, even for the storage. Besides, it is easy to
install.
b. I think it is safer than before, it do not have a keyhole, so the thief cannot open it.
3. What is your acceptable price for it?
Although I like this lock, I think the final cost of the lock system should be below
$75.
12
Source Attribute
Client Project should be convenient to use
Client Project should open the door without
keys
Client Project should be fit for different kinds
of door
Client Project should be safe enough
Client Project should have low price for client
Table 2 Client Interview
2) User Survey
After using the client interview, we got some information about the need of client, but
we think it is not comprehensive enough, so we decided to conduct user survey
information to complete it and find potential clients. The user survey will help us have a
better understanding of what clients need this product to turn out, and then we can have a
successful design.
1 What the price you will pay for an Infrared Lock?
under 100 dollar (38)
moren than 100 dollar (12)
This question gives our team a reference for the acceptable price for the customer.
2 Income (per month)
1000-2000 (14)
2000-5000 (29)
5000+ (7)
The same as question 1
3 Are you always at home by yourself?
Yes (17)
No (27)
Keep secret (6)
This question we can know the number of potential customers.
4 Have your house been break in?
Yes (4)
No (46)
Keep secret (0)
13
The same as question 3
5 Which part you are most concerned?
Safety (37)
Durability (5)
Convenience (8)
Ensure the main point for our design.
6 Do you think the traditional lock is safe enough?
Yes (32)
No (18)
This question we can know the number of potential customers.
7 If it is safety enough. Do you want to try the Infrared Lock?
Yes (42)
No (8)
This question we can know the number of potential customers.
8 Will you pay for the installation?
Yes (3)
No (7)
I can install it myself (14)
I want the installation fee is include in the price. (26)
This question we can know some details for the price.
Source Attribute
Client Project should be convenient to use
Client Project should open the door without keys
Client Project should be fit for different kinds of door
Client Project should be safe enough
Client Project should have low price for client
Survey Project product should no more then 100 dollar
Survey Project should durable enough
Survey Project should have enough safety
Survey Project should easy to install or offer free
installation
Table 3 Client Interview and user survey
14
3) Teams Input
Our team came up with ideas that we thought would make our project more acceptable
and marketable for the client:
l Remote control the lock
l Lock requires very strong metal
l The remote control device should be lightweight and small
l The whole system is easy to install and use
In conclusion, the client interview, user survey and brainstorms give us a better
understanding of what our design needs to be improve. Our system is a new type of lock
which we can control the lock from a far distance. The purpose behind our thought is to
make a lock without a key and can be controlled by a remote control. And it uses infrared
remote control the lock. Besides, we support the 6-digit number password set. In theory,
our lock is 100 times safer than 4-digit password locks. When someone tries to open the
door and enter the wrong passwords more than 3 times (in the remote control device), it
will be locked and cannot open. Then, the built-in siren and the LED light will work to
alert people. It may seem like a difficult feat but we will do what we can to make this a
possibility.
Source Attribute
Client Project should be convenient to use
Client Project should open the door without keys
Client Project should be fit for different kinds of door
Client Project should be safe enough
Client Project should have low price for client
Survey Project product should no more then 100 dollar
Survey Project should durable enough
Survey Project should easy to install or offer free
installation
Team Project could be remote control
Team Project should use very strong metal
Team Project should be lightweight and small
Table 4 Client Interview, survey and Team Ideas
15
B. Need Specification
We will take the survey results into consideration, including our user survey, client
survey and the team’s ideas. We will make the specification according to the results.
There are two kinds of the requirements for the specifications, which are marketing
requirements and engineering requirements.
1) Marketing Requirements
a) The design should have excellent solidity.
b) The design should have good compatibility and be easy to install.
c) The design should have low cost.
d) The design should have low consumption of power.
e) The design should be reliable.
2) Engineering Requirements
a) The design should not weigh more than 250 g (about 0.55 lbs.)
b) The design should have size of about 15 cm length and 8 cm width.
c) The design should read currents from 50 nA to 2 mA.
d) The design should cost around $80.
e) The design should be made by stainless steel.
3) Specification
Temperature: 20 to 40°C
Pressure: common pressure
Wet: 25% to 55%
Force: common force
50nA to 2 mA
Table 5: Objectives
Objectives Engineering Requirements Justification
c, d The design should not weigh more than
250 g (about 0.55 lbs.)
This is almost similar to even lighter
than the weight of products in the
markets
b The design should have size of about 15
cm length and 8 cm width.
This is the standard size so that it is
easy for users to accept.
d, e The design should read currents from 50
nA to 2 mA.
The energy consumption of sensor is
very low, and the product will work
normally under extreme situation.
c The design should cost around $80. We consider it is a proper price
which makes a balance between our
users and the costs based on the user
survey and our ideas.
a, e The design should be made by stainless
steel.
This makes our product strong and
will avoid being damaged.
In conclusion, we thought a lot and received plenty of information from client
interview and user survey. We have created a list of complete and instructive
specifications for our project. In the next step, we will make a strong, reliable, and
accurate device that can be installed easily in most situation and cost not too much.
16
C. Feasibility Analysis
The feasibility analysis will be divided into these parts: technical feasibility,
resource feasibility, economic feasibility, schedule feasibility, culture feasibility, legal
feasibility, and marketing feasibility. We will give a weight to each part according to its
importance based on our understanding. We will give a solution if we think there are
problems to carry out.
Table 6 Weighted scale and weight computation
Attribute Weight 1-
Lo
w
2 3-
Me
d
4 5-
Hig
h
Why Solution
Technical
Feasibility
Does the
technology
exist and can
it be obtained?
0.6 X Implementation
will become
difficult if the
technology does
not exist.
Research what
technology we
need.
Are
fundamental
new
inventions
required?
0.6 X We should know
if we have to find
a new way to
proceed with our
project.
We will
research and
find any
technology we
need.
Resource
Feasibility
Do we have
enough
equipment and
number of
people?
0.6 X We need enough
sources and labor
so that we can
make sure task be
finished perfectly.
No problem
Do we have
electronic
skills?
2 X The product must
be made strong
enough and will
response
accurately and
immediately.
We have good
electronic skills
Do we have
the
programming
skills?
2 X We have to make
the program stable
and reliable.
We will
research C++
Economic
Feasibility
Can we
complete the
project with
the resources
and funds
given?
0.5 X We have to make
sure we have
enough resources
and funds to finish
project.
The project can
be completed
with our
resources.
Schedule
17
Feasibility
What are the
chance we
meet all goals
we have
scheduled?
0.7 X We must make a
good schedule and
make sure we can
get the project
finished at time.
If we delay in a
certain part, just
work harder to
stay on the
schedule.
Cultural
Feasibility
Will the
product
accepted by
society?
0.5 We can’t make a
product that
society does not
accept.
It is socially
acceptable.
Will it have a
positive
impact on the
general
culture?
0.5 X X The product will
be more popular if
the impact on the
general culture is
positive.
It has a positive
impact.
Legal
Feasibility
Are there any
regulations or
laws limiting
or impeding
the project?
0.5 X We will not create
a product that is
illegal.
It is legal.
Marketing
Feasibility
Will the
general public
accept the
product?
1 X We must make
sure there is
market for our
product.
There is a
market
Are there
other products
similar to ours
in the market?
0.5 X We need to
research how to
make our product
competitive.
We believe our
product will be
competitive.
Total Weight:
10
10 1 4 9 16 15 Total Score: 45
Weighted
AVG: 3.25
0.5 5.2 5.4 16.
4
5 Weight Score:
32.5
totalMeanGw
AAAMeanG NN
/.
)(.
1
21
=
×⋅⋅⋅⋅⋅⋅××=
18
Table 7 Component Specifications
We discuss the problem which we may meet in the future as a team, and then we do
the feasibility analysis and get the above table. We consider all parts of feasibility
including Technical, Resource, Economic, Scheduling, Cultural, Legal, and Marketing
feasibility. Feasibility is measured against attributes, so we create weighted scale. 1-5
scale shows the different attributes contributing to the total in different proportions. “1” is
our least confidence, while “5” indicates more confidence. We sign a weight for each
attribute based on the importance level we think. Then we give a score ranging from 1 to
5. We have the sum of score at the bottom. We also have the sum of weight score for
each columns, which is sum of each score multiplied by the relative weight. Weighted
AVG is calculated by taking the weighted score to divide total weight. From the weighted
AVG, we can get the feasibility of the project, with “1” being the weakest and “5” being
the strongest. We think we have made an accurate feasibility, and we believe we can
solve any problem we will meet in the future.
D. Marketability
1)First similar project on Kickstarter
LINKA: World’s First Auto-Unlocking Smart Bike Lock is the project we found on
Kickstarter which is similar to our project. It is created by Velasso in Oakland, CA. This
bike lock features Tamper Alerts, Auto-Unlock, Built-in Siren, Keyless Access and more!
They are pledged of $25000 goal. The project has following parts to introduce product
and catch customers’ heart.
Technology overview: Lock Smarter Not Harder with LINKA. Our bike lock
features Tamper Alerts, Auto-Unlock, Built-in Siren, Keyless Access & more!
a) Introduction for users and client: what is the goal? How is LINKA unique? What
do people benefit from the product? Pictures for product.
b) Features: Built-in Siren, Recognized Locking, Tamper Alerts, Phone-Less Access,
Theft Indicator Map, Long lasting battery, Lightweight.
Technical Resource Economic Schedule Cultural Legal Marketing G.Mean w
Technical 1 3 2 4 5 1/5 1/3 1.3459 0.1711
Resource 1/3 1 1/4 1/2 1/5 1/3 1/4 0.3538 0.0450
Economic 1/2 4 1 3 1/4 6 1/2 1.2397 0.1576
Schedule 1/4 2 1/3 1 1/3 1/4 3 0.6351 0.0808
Cultural 1/5 5 4 3 1 1/2 1/4 1.0596 0.1347
Legal 5 3 1/6 4 2 1 1/3 1.3113 0.1667
Marketing 3 4 2 1/3 4 3 1 1.9195 0.2441
Total 7.8649 1
19
c) Chain Specs: weight: 1.9kg, length: 76cm, sleeve: heavy duty rip-stop nylon.
d) Stretch Goal: 50K limited edition LINKA to 100K color option unlocked.
e) Compatibility: two steps: 1. Make sure the bike have a brake bridge with
mounting holes. 2. Measure from the mounting hole to the inner edge of the rim.
f) Why are we doing this?
g) Timeline
h) What we need?
i) Rewards
j) Risk and challenges.
Figure 1 LINKA
Figure 2 Flow chart of LINKA
2) Second similar project on Kickstarter
This is another project we found on Kickstarter named Nuimo which is seamless
smart home interface. It is created by Senic in Berlin, Germany. They are pledged of
€55,000 goal. They have a different structure of project as following parts.
Technology overview: Nuimo is an intuitive and natural way to interact with your
connected devices. Nuimo works with any bluetooth device or application including
20
Sonos and Philips Hue. Connectivity, Compatibility, Battery, Dimensions, Weight,
Sensors, Indicators, Mounting, Materials.
a) Attractive introduction to user: NUIMO is reenvision what technology feels like.
b) Natural user interface which is meaning seamless control for the things you love.
Some pictures for product’s features.
c) Express yourself. This product support most devices and apps.
d) Plenty of video for user to watch so that they can fully learn about this product.
e) Setup made simple: easily connect your most used apps and devices.
f) Goes where you need it: wireless design fits seamlessly into your life.
g) Tech specs: Connectivity, Compatibility, Battery, Dimensions, Weight, Sensors,
Indicators, Mounting, Materials.
h) Our story: a journey from vision to product.
i) The next steps: why we need you to be part of this.
j) Risk and challenges.
Figure 3 Nuimo
21
Figure 4 Flow Chart of Nuimo
3) Our project
We are here to make a smart lock called “Infrared Remote Control Lock”,which
will change the methods of people’s life. In this project, we will use SCM system,
keyboard, LCD display and alarm system. The product should have two features so that it
will be competitive with the similar products in the market. First of all is the security to
user. Another feature is “user-friendly”. In this project, these steps will be followed to do
a prefect project: First of all, we do enough surveys to determine what we are going to do
and why we will do that. Secondly, we consider the marketability, intended user and use,
operation environment. Thirdly, we do the feasibility analysis and risk analysis.
One of our team members, Li, shared his experience with us that his house was
stolen when he was young, and it caused a lot of damage to the property. Li said that the
thief easily opened the door of his house. He hopes that there is a lock which is strong
enough to protect people’s house from being broken into. We come together with Li to
design a lock and we believe it can make contribution to the security of house.
The product should have two features so that it will be competitive with the similar
products in the market. First of all is the security to user. For all locks, the security of the
system always comes first for all customers and designers. So our product has 3 measures
to make it safer. Firstly, now most of the password lock just has 3 or 4-digit password,
not safe enough to protect their things by using those locks. On the contrary, we support
the 6-digit number password set. In theory, our lock is 100 times safer than 4-digit
password locks. Secondly, we have 2 meanings for the automatic locking. On the one
hand, when the user closes the door, the lock will automatically lock. On the other hand,
when you enter wrong passwords more than 3 times (in the remote control device), it will
be locked and cannot be opened. Thirdly, we want to give our lock a screeching 100 dB
sirens and a small LED to ensuring all eyes are on preying thieves, before they try to
open the door or lockers.
22
Another feature is “user-friendly”. There are also three ways to achieve it: firstly,
password can be set and reset by user. If you want to reset the password, of course you
have to input old password, and double check the new password. That is designed to
prevent disoperation. Secondly, when you arrive at home carrying a lot of things, you do
not have the third hand to open the door. If you installed this lock, you just need to
unlock remotely, the door will open automatically, and you can freely walk into your
house. We will have enough amount keys for family user. Thirdly, traditional lock is
complex and inconvenient to install, but our lock will be easy to install and very strong.
The lock will apply to most situations, and will work in rainy or hot environment.
If we were to make a fund rising, we have a plan called “One dollar to follow us”, in
which we will pick out one user of 100 users who followed us to give him one of our
products for free. Then we sell the product in the price 30% off of the list price we
expected, to up to 1000 persons. Next we sell the product in the price 20% off of the list
price, to up to 2000 persons. Finally, we sell the product in the price 10% off of the list
price, to up to 3000 persons.
In conclusion, we are more confident now to do our project, and we believe that we
have a good understanding about the specification and marketability, and we know now
we have enough skills and power to carry the project out. Our product will be competitive
and reliable.
Figure 5 Flow chart of our project
23
V. RISK ANALYSIS
Any project has risks, so we can improve the feasibility of our project by analyze the
risk of our project. When we are analyzing the risk, we have to consider all the parts, for
example the technical, resource, economic, schedule, legal, and marketing. When we
have finished the analysis, we will have a deeper understanding of the project.
Analysis of the risk means that we set a goal for us, and it can help us to finish the
problems more easily and clearly. At the same time, we will solve the problems in a high
purposeful way. The lock is a sensitive topic for public who would like to have a safe and
stable lock. Especially, the lock uses a infrared remote control. We have to make sure that
our product is perfect, so the risk analysis becomes very important.
Figure 6 Risk Analysis Tree
In the Figure II : Risk Analysis Tree, we can see the overall situation about the risk
analysis, and we can find out that the risk that we have from all parts. They are the
Technical;Resource;Economic;Schedule;Legal and Marketing. And we can realize
what is the specific risk we have from all parts.
24
Table 8 Likelihood of Occurrence
This table shows the Grade Evaluation about risk. From this table, we can easily find
out the level about all kinds of risks.
Class I risk means there is no risk, so we can ignore the risk. We can just do our
project.
Class II means that we have to pay some attention on these risks, but these problems
and risks is not our main problem. We should not pay too much attention on it.
Class III is what we have to concentrate on. These are some hard problems and we
have to try our best to solve them. And we also have to make sure that these problems
will not affect our project. Class III risk is worth for us to spend time to solve.
Class IV is the most difficult problem, and maybe we are short for confidence about it.
But we don’t think we have Class IV risk in our project. From this table, we think all the
problems will remain under our control, and we can solve all the problems. These risks
cannot stop us, if these problems happen, because we have enough skills and ability to
solve them.
25
R2
We currently don’t have the programing skill,
but we can study it now or find someone to help
us about the programing.
M1 We can make our product more stable and safe to let the public accept our lock.
M2
We find some similar products. But I think our
product is unique and we can make it more
advanced.
T1 Yes the tech is exsist. We have to do more study about this kind of technology.
R1
Yes we have this skill. But we still have to learn
more about it. We can solve any electronic
problem buy have a group meeting.
E1
The resource come from everywhere. We have
to make it more clear and study it. Then the
resource wo find to complete our product.
Table 9 Action Table
In this table, we can know what we should do for our project. Different problem have
different way to solve. It is a constraint for our project and the solution.
VI. OPERATING ENVIRONMENT
Locks is an important part or our life, so the environment of a lock is important,
because we have to make sure that our product can work well in most kinds of
environment. You can use our product at home directly. Because the environment at
home is stable, it has the common temperature, press, wet. Our product can also work in
some extreme environments, such as in the factory and in the wild. If costumers have
these kinds of requirement, we can update our products .But our main costumer is
families. Basically, we will not consider about the extreme environments.
Lock will be set up on a door. However, different people have different habits. While
some people like to close the door gently, some people like to slam the door. So we have
to make our lock more stable and strong.
First of all, we will make sure that the lock is installed firmly on the door, and it is
perfectly combined with the door, with no permission of any loose installment, as it
might make the lock unstable and affect the safety. When someone close the door with a
strong force, we have to make sure that the parts inside will keep stable, so the strong
force will not affect the life of the lock. We will have all parts made with high quality
materials. Users might let water come inside the lock, so our product must have the
waterproof ability. Traditional locks will not have these problems because traditional
locks don’t have electronic parts. We have to make sure that water will not destroy our
products. So some of the specific data is as follows. Temperature environment is from
20°C to 40°C. Wet environment is from 25% to 55%. Pressure environment is common
pressure. Force environment is common force.
26
Figure 7 operating environment
VII Intended user(s) and Intended Use(s)
A. Intended use(s)
Our team came together with one thought: to improve a new type of lock which we
can control the lock from a far distance. The purpose behind our thought is to make a
lock without a key and can be controlled by a remote control.
1.The length of the password
Now most of the password lock just has 3 or 4-digit password, is not safe enough to
protect their things by using that locks. On the contrary, we support the 6-digit number
password set. In theory, our lock is 100 times safer than 4-digit password locks.
2.Automatic locking
In this part, we have 2 meanings for the automatic locking. On the one hand, when the
user closes the door, the lock will automatically lock. On the other hand, when you enter
wrong passwords more than 3 times (in the remote control device), it will be locked and
cannot open.
3.Built-in siren
We want to give our lock a screeching 100 dB sirens and a small LED to ensuring all
eyes are on preying thieves, before they try to open the door or lockers.
4.Friendly to user
27
Password can be set and reset by user. If you want to reset password, of course you
have to input old password, and double check the new password. That is designed to
prevent misoperation. When you got home carrying a lot of things, you do not have the
third hand to open the door. If you stalled this lock, you just need to unlock remotely, the
door will open automatically, and you can freely walk into your house. We will have
enough amount keys for family user.
B.Intended user(s)
Our product is face to all kinds of users. When you forgot the keys, you just need to
input the six numbers password, then you can get into home.However, traditional lock
doesn’t have this function, if you forgot bring your keys, you have to wait for your
relatives or climb the window.
When a thief want to get into your room, if your door with a traditional lock,
sometimes the thief just can use a small wire to open your door. However, if your door
with electrical code lock, and the thief doesn’t know the password, he will not break the
door because this action will make noise.
Also, if there is a babysitter in your home, after your kids grow up, you don’t need to
worry about if the babysitter will return your home without permit, because you can
change the password in anytime. And if you change the password, even if she or he copy
the remote, the new remote will not work. Actually, it’s hard to copy the remote, but it’s
easy to copy the keys.
VIII. BACKGROUND
In order to design a new type lock for our senior design project, it is necessary to
learn some knowledge and ideas from other projects or products. So in this section, we
will introduce three different but similar projects. These projects are similar to our design,
and their background information is very useful to us. These projects can help us in terms
of how to build our design and will give us some effective ideas, especially the technical
instructions. Specifically, in this section, we will introduce August Smart Lock, Remote
Lock 6i iTouchless and Bio-Matic Fingerprint Door Lock.
A. August Smart Lock
This device was created by Jason Johnson, the founder and CEO of smart lock maker
August, Managing Partner of Founders Den, Chairman of Internet of Things Consortium.
The article that describes the device and explains the function and features was published
October 14, 2014 by Andrew Tarantola [1].
28
1) Summary
The August smart lock is a secure and easy-installing lock, which can let the host
control the access to your home and manage how long their access lasts. This function
can be used by iOS and Android smartphones, without the need for keys or codes. This
encrypted technology is safer than keys that can get lost or codes that can be copied. Also,
it is easy to install because people just need 10 minutes to replace the interior of their
existing deadbolt, and the exterior hardware is unchanged. This device will not connect to
the cable, because it’s powered by four AA batteries, even if when the power, Wi-Fi, or
cable goes down, it will still work. When people return home, August Smart Lock can
sense people’s approach and automatically unlocks the door. The lock also can
automatically lock the door when people leave, so people don’t need to worry about
whether the door is locked or not.
2) Technical review
August smart lock relies on wireless and telephone network, and the reliable Bluetooth
technology to sync your cell phone. This device needs people to plug the August into a
power outlet within 30 fee (while within 15 feet will be the optimal performance and
reliability). Wait for the flashing green light on, and if the green light is not flashing,
press and hold the button on August Connect for 3 seconds, and then wait. On the lock
settings screen in the August app, select “Connect to Wi-Fi” and follow the instructions,
this lock should connect with 2.4 GHZ Wi-Fi. After setup the lock, people can see who
walked in and out, from custom’s phone or computer in anywhere.
In 2015, August Smart Lock have updated iOS end app to support Apple Watch. Users
can use Apple Watch to open the front door of his home, iOS end users after updating the
app, not only can lock and open the door by Apple Watch, but also the watch receives
notification of the August card key state information, and view the activity log lock. So
the cell phone and the apple watch functioning as a remote, can control the lock in a short
distance all the time.
3) System Description
August mainly depends on the Bluetooth connection. By using a wireless network,
users can use mobile app to achieve its function. The motors in August are using the
normal battery. It can supply sustainable power while never having a deadlock problem.
Moreover, the entity key can get the door open because of the mechanical system. In the
August system, the Bluetooth module receives signals from the cell phone or other
equipment, and single chip receives instruction and start work. If Bluetooth is connected
properly, the relay controls door lock, and door circuit will open and led will lit. If
Bluetooth password is wrong, the connection will not and cannot control the Bluetooth
module, enabling access control.
29
Figure 8 Schematic of August Lock Installation
Figure 9: Diagram of the August Lock operating principle
B. RemoteLock 6i
This device was invented by a security company named Lockstate, which was founded
in Colorado State in 2004. The article that describes this device and introduces the feature
and functions was published on August 22, 2015 by Geeks News Desk. [2]
1) Summary
RemoteLock 6i is a new commercial WiFi lock with keyboard established for security.
This kind of lock is perfect for office buildings, rental properties, residential, industrial,
30
and any location where needing remote supervising and management of locks. This
device can connect to routers with no additional equipment needed. When people unlock
your door, you will receive alerts when codes are used. It has weather proof finish and the
keypad can protect the elements. Also, if people forget to bring their cell phones, they can
use the keyboard to input the code to open the door, and the code can be changed on cell
phones or computers.
2) Technical Review
Remotelock 6i is perfect for rental property, home,hotel or office use. Robust WiFi is
enabled to lock the door by a remote control, and it can send alerts when people unlock
your doors or using code.
Features and Specifications: [2]
• WiFi enabled lock connects directly to existing routers
• Weather proof finish & keypad
• One-touch lock button to quickly lock door on the way out
• Up to 1000 user codes or guest codes available to store in its memory
• View access history in real time from online account
• Add or delete users and lock or unlock your door remotely
• Set scheduled access times for users.
• Choose between passage or storehouse mode
• Set schedules to passage mode, or even lock or unlock door automatically at
scheduled times
• Set to privacy mode to temporarily disable all user codes
• Lockout functionality (after 5 incorrect attempts)
• Low Battery Warning
Specifications:
• Lock Weight: 6LB
• Power Source: 4 AA Alkaline Batteries
• Keypad: Weather Proof Keypad
• Handle: Reversible Lever
• Door Thickness: 1 3/8″ to 2″
• Keyway: Schlage C6
31
• Temperature: -30 to 120 degrees F (-34 to 50C) C6
• Front Lock Height: 6 ¾”
• Front Width: 3”
• Back Height: 6 ¾”
• Back Width: 3”
• Key Hole to Top of Lock: 5 1/8”
• Working Current: 50 mA
• Idle Current: 5 µA
• Lock Back Time: 5 (1 – 25) Seconds
• Working Voltage: 4.8-6.4V
• Low Battery Warning: 4.8V or lower
3) System Description
RemoteLock 6i system is designed based on wireless networking system, and this
kind of communication network consists of two parts: the wireless network and wired
communications networks. Door lock and wireless base station (LA171) is connected
between wireless signals, and the wireless base station (LA171) is via a wired Ethernet
LAN to communicate with the management software. Each floor can be composed of a
wireless communications network. There is a wireless base station (LA171), and a
number of wireless bridges (LA172), and wireless networking with many locks (like
RemoteLock 6i). In conclusion, the remotelock system consists of a wireless base station
(LA171), a wireless bridge (LA172), and some wireless door locks.
32
Figure 10 Schematic of RemoteLock 6
Figure 11 Schematic of network RemoteLock 6i wireless diagram
33
C. iTouchless Bio-Matic Fingerprint Door Lock
This product was found from Amazon website. The date and the description were
published July 19, 2004 by Amazon manufacture. [3]
1). Summary
The iTouchless Bio-Matic Fingerprint Door Lock is a latch-style lock that offers
access with a fingerprint, passcode and key. This kind of electronic lock can store up to
150 fingerprints and 78 passcodes, which is enough for a family or a small company. In
this kind of lock, the controls of the optical sensor are hidden behind a sliding front cover,
which in order to protect the electronics from the micro elements. If there is any trouble
with the sensor, people can also input a code with numbers or use a regular key to open
the door.
2) Technical Review
The iTouchless lock in place of your existing doorknob, and it utilizes a “live layer”
optical sensor for reading fingerprints.
Features and Specifications: [3]
Features:
• Bio-matic fingerprint door lock
• Enjoy the freedom of being able to take your morning jog or walk the dog without
carrying keys
• Powered by 4 AA batteries (not included)
• Easy Programming
• Add or delete user is performed directly on the lock’s pin pad
• Utilizes ‘Live Layer’ optical sensor technology to ensure accuracy and high level of
security
• Product Type: Combination Lock
Specifications:
•Assembled Depth (In Inches) 7
•Assembled Height (In Inches) 7.38
•Assembled Weight (In LBS) 5.6 Lbs.
•Assembled Width (In Inches) 6
•Country of Origin China
•Item Depth 11 In.
•Item Height 8 In.
•Item Weight 7 Lbs.
•Item Width 9 In.
34
3) System Description
In iTouchless Bio-Matic Fingerprint Door Lock system, the most important system is
fingerprint system, and this system can be divide by two independent systems:
Fingerprint input: People can register fingerprint through the prompts that shows on
LCD display. Considering the confidentiality of the fingerprint entry, when registering
the new fingerprint, this system needs to enter the administrator password or login with
administrator fingerprint to manage the registration of fingerprints.
Fingerprint screen: Through the LCD display prompts for administrator password,
people can use the administrator fingerprint to login management system, enter the
fingerprint ID, and then that ID will be screen in the whole system.
The processing process of the whole system is divided into seven steps:
a. The image sensor will transfer the fingerprint image to FPGA, also
designed preprocessing module which is used to data processing.
b. Then get the gradient of each pixel point and the coordinates of the
maximum points of all these data, collect these data and the original
data, and save them in the DDR SDRAM;
c. The DSP read all relevant data through the FPGA which from DDR
SDRAM, calculating the direction of the ridge line and ridge line
frequency.
d. Then use the GABOR filter on original data, after the processing of
image data by FPGA in the DDR SDRAM, so in the end of the DDR
SDRAM, both input and output require buffer.
e. According to the requirements of the DSP processing instruction, read
out the data from the DDR SDRAM after filtering, by the comparison
of the FPGA internal logic to extract the fingerprint image in each row
(column) in the maximum points.
f. Sent data to the DSP for further processing, and complete fingerprint
image ridge line extraction
g. Complete matching recognition algorithm by DSP, and outputs high
level or low level to match results.
35
Figure 12: Block Diagram of Fingerprint identification system diagram
Figure 13: Picture of iTouchless Bio-Matic Fingerprint Door Lock
36
IX INTELLECTUAL PROPERTY
In this section, we would like to clarify the patents we researched that could possibly
have relevance to our project Infrared Remote Control Code Door Lock. We will
summarize three patents and claim that we are not intruding into any existing patents.
After we review the patents in this section, we will highlight the differences between
these patents and our project.
A.Remote control door lock system
United States Patent US6005306 A
This patent, by Martins, Andrew M Pickard was granted in Dec 21, 1999, and will be
described in the next section.
Summary:
This is a wireless remote control lock system for commercial and residential building
doors. It is built with an electrically powered striker plate including a striker plate
member and a door latch member, a radio range signal receiver, a receiving signal circuit,
a radio transmitter, a control unit including a first self-latching relay, a selector switch,
and a second relay. The door lock system achieves the function that the door can be
opened by a remote control unit. When someone uses the selector switch to select an
operating mode, the first self-latching relay send a frequency signal.
Figure 14 Patent 1
37
Then the signal will be received by a radio frequency receiver and a transmitter circuit
transmit the signal to electricity to the striker and open the door.
The wireless remote control lock system invention can be adapted to residential doors
and commercial building doors. Therefore, this new type of lock system can be utilized in
a wild range in the future.
1. Claims Summaries:
There are nineteen claims associated with our project. Claim one is the lock system
comprising a striker assembly, a striker plate member, a control unit, a wireless
transmitter, and circuit elements. Claim two talks about the second relay in the control
circuit. The third claim talks about a mode selector switch and claim four states that the
selector switch is operable in a second position. Claim five introduces the actuator
between the first and second switch. The sixth claim is the receiver that contains the first
and second switch. The seventh claim explains the control unit. The eighth claim talks
about a voltage regulator. The ninth claim is about the transmitter. Claim ten talks about
the wireless remote control of the lock system and explains what consist of the wireless
remote control very specifically. The eleventh, twelfth, thirteenth, fourteenth and
fifteenth claims are about the circuit, relays, mode selectors and the actuator in the
wireless remote control part. The sixteenth claim states the striker, control, wireless
transmitter, first and second relays in the lock system. The claims seventeen, eighteen,
and nineteen explain the mode selector switches and actuator in the sixteenth claim.
1. Non Infringement:
The system design and method behind this patent are controlling the door from a long
distance which is similar to our goal. Our project aims to unlock the door using a control
panel in a shorter distance than this patent (4-10 meters) and we prepare to use the
infrared as the method to receive and send the signals, which is different from this patent
using the radio frequency to send and receive the signals. Our project’s target consumers
are different from this patent. Our project is more adapted in the residential doors and this
patent can be used in residential and commercial doors. The purposes of our project and
this patent are also different. This patent is building a system that can control many doors
at the same time but our project aims at one door. Also, we use a code control panel to
establish a password for the lock to make it safer, but this patent uses a selector to open a
door. Clips mentioned above are the non infringement for our project.
B.Security door lock with remote control
United States Patent US6076385A
This patent was invented by Paul L. Pedroso and Duarte M. Oliveira. It was granted in
Jun 20, 2000 and will be described in the next section.
1 ) Summary:
38
This patent is a lock system for doors with a remote control. The lock can be installed
on the wall adjacent to the door frame. The lock system contains the lock, a remote
receiver and power controller. The remote receiver is used to receive the signal when user
starts the remote control. The power controller supplies the DC power to the receiver and
the relays. This lock system provides a manual control for the lock along with indicator
lights showing the lock status. It also contains an emergency DC battery. A remote
control locks all the doors at the same time and the indicator lights can show the status of
the lock. Therefore, this patent provides strong security for the door with a remote
control.
Figure 15 Patent 2
1) Claims Summaries:
This patent contains eighteen claims related to our design. Claims 1 through 8 pertain
to the components of the security door lock inside the wall. The specifically mean for
each component that are in the first claim. The particular items included in the lock part are explained in claim 2 to 8. The ninth claims pertains to the means of remote control transmitter, receiver, sensor, actuator, rods, and a horizontal bar. Moreover, claims 10 to 13 refer to the details of the ninth claim. The details of the rod
holder bar, horizontal bar, and the power source have been added through claims 10 to 13.
Furthermore, the fourteenth claim is about the steps of making this door lock. Claims 15
to 18 explain the particular method mentioned in the nineteenth claim including
generating a signal, extending one rod from holder bar, providing a door sensor, and
providing a lever for the sleeve.
1) Non Infringement:
In reference to the security door lock with remote control, there are some similarities
in that our project also aims at unlocking the door with the remote control. However, the
core functions are different between our project and this patent. The core function of our
project is to make it easier for users to open the lock, and at the same time we guarantee
the safety of the lock. The core function of this patent is to make sure the lock system is
safe by controlling all the door locks at the same time and showing the status of the lock
with an indicator light. Depending on this reason, there is no infringement between our
project and this patent.
39
C.Remote control mechanism for a locker
United States Patent US 6185773 B1
This patent was created by Kirby R. Goedde. It was published on Feb 13, 2001.
Figure 16 Patent 3
1 ) Summary:
This patent is about a school locker with remote control to achieve the function of
locking, opening and beeping. In order to assist students to find their locker easily, this
patent uses a key pad transmitter with three buttons to achieve the goal. The first button is
utilized to activate a locking mechanism. The second button is used to activate a door
opening mechanism and the third button is.used for a sound making device. One
electrical circuit is used for the opening and locking device and a different circuit is used
for the function of beeping.
40
2) Claims Summaries:
There are six claims which are related to our project contained in this patent. Claim
1 covers the transmitter, a control module, and a door lock in the remote control
mechanism. Claim 2 is about a button which transmits a signal contained in the
transmitter. Claim 3 talks about the details of solenoid. Claim 4 explains the motor and
the lock body in the locker system. Claim 5 states the latch pin in the locker. Claim 6
involves the transducer of the locker.
3) Non Infringement:
There is no infringement between this patent and our project. This patent aims to
design a locker system for students to open, lock and find their locker easily. The goal of
our project is to make people easier to open the door and make the door safer than the key
lock door. Also, we are going to design a code for the lock and it will be more different
from this patent.
X. STANDARDS CONSIDERATIONS
Standards are a series of rules which have agreements to ensure that the function and
the safety of the product. Today, every product in the market complies with a series of
standards in order to guarantee the marketability. In order to make standards for our
product properly, we compared the standards of the similar products of us to find the
distribution, the growth, and the constraints of the design can be achieved in the process
of making our product and make sure that we followed all the proper procedure.
The standardization organizations are aimed to formulate and accredit the standards.
The most recognized organizations in our professions are the Institute of Electrical and
Electronic Engineers (IEEE), National Institute of Standards and Technology (NIST), the
American Society for Testing and Materials (ASTM), Underwriters Laboratories (UL),
American National Standards Institute (ANSI) and International Organization for
Standards (ISO). These reputable companies earn the trust of the people because they
assure the products to be safe, reliable, and make sure the functions of the product
according to the specifications of the standards are complied in the product.
In this section, we are going to analyze the most relevant standards that will relate to
the successful implementation of our product and a detailed description of operating the
standards in our product and achieving the expect standard compliance.
41
A. UL 60370 Standard for Automatic Electrical Controls for Household and Similar Use;
Part 2: Particular Requirements for Electrically Operated Door Locks
This standard applies to electrically operated door locks. It’s closely related with our
project. This standard is for all electrically locks which are intended to prevent the
opening of doors in equipment for household and similar use.
This standard states that it applies to the inherent safety, to the operating values,
operating sequences where such are associated with equipment protection, and to the
testing of door locks used in, or in association with, household and similar equipment.
This standard is also suitable for door locks for appliances within the scope of IEC
60335-1. This standard does not apply to door locks designed exclusively for industrial
applications. This standard is also suitable for individual door locks utilized as part of a
control system or door locks which are mechanically integral with multi-functional
controls having non-electrical outputs. Door locks for equipment not intended for normal
household use, but which nevertheless might be used by the public, such as equipment
intended to be used by laymen in shops, in light industry and on farms, are within the
scope of this standard. This standard claims that it is not restricted to household locks.
This standard presents that it applies to door locks with electrical circuits and control
circuits which are, for example, operated by magnet coils, memory metals, pressure
elements, temperature-sensitive expansion elements or electronic elements. This standard
also applies to manual controls when such are electrically or mechanically integral with
door locks. Requirements for manual switches not forming part of a door lock are
contained in IEC 61058-1. This standard does not take into account the response value of
an automatic action of a door lock, if such a response value is dependent upon the method
of mounting the door lock in the equipment. Where a response value is of significant
purpose for the protection of the user, or surroundings, the value defined in the
appropriate household equipment standard or as determined by manufacturer shall apply.
It’s an appropriate standard for our project. The rules contained in this standard
normalized electrically locks and we can use these standardization to improve our project.
Another part of UL 60370 standard UL 60370-2-9 describes the requirements for
temperature sensing controls. It is also useful for our project to normalize our sensor
include in our project. In order to make our project easy to trade and avoid any kind of
plagiarism, we will comply with standards:
UL60730
The requirements for operated door locks
B. UL1034 Standard for Burglary-Resistant Electric Locking Mechanisms
This standard is about the burglary-resistance electric locking mechanism. These
requirements describe the construction, performance, operation and related devices, such
as control units, control switches and power supplies. This standard also state three
elements used to determine its maximum effectiveness.
42
a) Static strength rating of 500 pounds-force (2224 N), 1000 pounds-force (4448 N), or
1500 pounds-force (6673 N). See 55.2.1.
b) Dynamic strength rating of 33 foot-pounds-force (45 J), 50 foot-pounds-force (68 J),
or 70 foot-pounds-force (95 J). See 55.3.1.
c) Endurance rating of 100,000 or 250,000 cycles. See 38.2.1.
These are important factors to determine the safety of lock. We consider to apply
these requirements to our project. The purpose of this standard is be used in conjunction
with an access control system or a manual-release mechanism. The burglary-resistant
electric locking mechanism should be constructed so that it either does not interfere with
egress through the door or opening cover that is is used to control, or its locking action
should be capable of being released as required by the authority having jurisdiction if an
emergency egress is required. This standard refers to all types of electric locking
mechanisms. In this standard, it declares a product that contains features, characteristics,
components, materials, or systems new or different from those covered by the
requirements in this standard, and that involves a risk of fire or of electric shock or injury
to persons should be evaluated using appropriate additional component and end-product
requirements to maintain the level of safety as originally anticipated by the intent of this
standard. A product whose features, characteristics, components, materials, or systems
conflict with specific requirements or provisions of this standard does not comply with
this standard. Revision of requirements should be proposed and adopted in conformance
with the methods employed for development, revision, and implementation of this
standard.
After discussion, we decide to follow some rules in this standard and make our
project more standardized. In order to make our project easy to trade and avoid any kind
of plagiarism, we will comply with standards:
UL 1034
The requirements for burglary resistant electric locking mechanism
C. UL61131-2 Standard for Programmable Controllers – Part 2 : Equipment
Requirements and Tests
This is a part of standard IEC 61131 which stipulates requirements and relevant tests
for programmable controllers (PLC) and their related peripherals. This standard is
intended to use the control and command of machines and industrial processes. PLC and
their related peripherals are intended to be used as open or enclosed equipment. If a PLC
or its related peripherals are intended for use in other environments, then the specific
requirements, standards and installation practices for other environments must be
43
additionally applied to the PLC and its associated peripherals. This standard can be
applied to any products performing the function of PLC or their related peripherals.
Equipment covered in this standard is intended to use in over voltage category II ( IEC
60664-1) in low-voltage installations, where the rated mains supply voltage does not
exceed a.c. 1 000 V r.m.s. (50/60 Hz), or d.c. 1 500 V. (If PLC or their related peripherals
are applied in over voltage category III installations, then additional analysis will be
required to determine the suitability of the equipment for those applications.) In this
standard, it also contains rules that equipment operating at more than 600 V is considered
as high voltage equipment with respect to the requirements in the National Electrical
Code. This standard does not deal with the functional safety or other aspects of the
overall automated system. The application programming and the related peripherals are
considered as components of a control system. PLC safety as related to electric shock and
fire hazards, electrical interference immunity and error detecting of the PLC-system
operation are addressed. Refer to IEC 60364 or applicable national/local regulations for
electrical installation and guidelines. The object of this standard is to establish the
definitions and identify the principal characteristics relevant to the selection and
application of PLC and the related peripherals. The another object of this standard is to
specify the minimum requirements for functional, electrical, mechanical, environmental
and construction characteristics, service conditions, safety, EMC, user programming and
tests applicable to PLC and the related peripherals.
a) service, storage and transportation requirements for PLC and the related
peripherals(Clause 4);
b) functional requirements for PLC and the related peripherals (Clause 5);
c) EMC requirements for PLC and the related peripherals (Clause 8);
d) safety requirements for PLC and the related peripherals (Clause 11);
e) information that the manufacturer is required to supply (Clauses 7, 10 and 14);
f) test methods and procedures that are to be used for the verification of compliance of
PLC and the related peripherals with the requirements (Clauses 6, 9, and 12).
This standard is about the programmable controller. We think it’s helpful for our
project to manufacture a controller for our lock. Therefore we determine to comply with
these requirements when we are building or project. In order to make our project easy to
trade and avoid any kind of plagiarism, we will comply with standards:
UL 61131-2
The requirements for the equipment requirements and tests part of programmable
controllers.
44
D. ISO 7240-3:2010(en) Fire detection and alarm systems-Part 3:Audible alarm devices
This standard explains Audible alarm devices contained in fire detection and alarm
systems. The purpose of this standard is to specify the requirements, test methods and
performance criteria for audible alarm devices intended to signal an audible warning of
fire between a detection and alarm system and the occupants of a building. It is intended
to cover only those devices which derive their operating power by means of a physical
electrical connection to an external source such as a fire alarm system. This standard is
also intended to cover audible alarm devices capable of giving voice messages by the
application of specific requirements, tests and performance criteria. In our project, we
want to make an alarm on the lock to raise the alarm when someone tries to break the
lock. Therefore, this standard is useful for us to follow the rules of the alarm part in the
standard. This standard contains fire alarm audible alarm devices for two types of
application environment, type A for indoor use and type B for outdoor use.
The other parts of ISO 7240 standard are also intended to cover
a) loudspeaker-type devices primarily intended for emitting emergency voice messages
that are generated from an external audio source
b) supervisory audible alarm devices, e.g. within the control and indicating equipment.
All the rules claimed above are available for our project and we intend to follow
some rules in this standard to create a lock alarm in our project. The objective of building
an alarm on the lock is to guarantee the safety of the lock in order to make it more
receivable around the world. In order to make our project easy to trade and avoid any
kind of plagiarism, we will comply with standards:
ISO 7240-3(en)
The requirements for audible alarm devices
E. UL 2058 Outline of Investigation for High- Security Electronic Locks
This standard is related to the high security electronic locks designed for attachment
on doors of safes, chests, vaults and the collects, to provide a means of locking the bolt
against unauthorized opening. The purpose of this standard is to test the ability of
high-security electronic locks to resist unauthorized opening for a limited period of time.
Electronic locks covered by these requirements may or may not have integral protection
against entry by force. In the standard, it claims that these requirements cover
high-security electronic locks powered by low-voltage primary batteries, or from Class 2
AC or DC power sources with secondary or primary standby batteries, or they generate
their own power as a function of their operation. If the power supply for a high security
electronic lock is connected to a source of high voltage, the high voltage requirements of
the standard for power supplies for use with burglar alarm systems shall be applied to
UL603.
45
After researches, the standard UL 2058 is relevant with our project and can be
applicable to implement our project. In order to make our project easy to trade and avoid
any kind of plagiarism, we will comply with standards:
UL603
The requirements of investigation for high security electronic locks
F. UL 50V Outline of Investigation for Infrared Viewports
Standard UL 50V specifies a fixed aperture, consisting of one or more openings or a
solid infrared transmitting media, surrounded by a mounting bezel or frame, that provide
a means for the passage of infrared radiation. The purpose of this standard is for factory
installation in doors or walls of electrical enclosures for installation in ordinary locations
to allow the use of IR scanners for monitoring temperatures of the enclosed equipment on
which the viewport is installed, without compromising the integrity of the enclosure with
respect to access to live parts. Viewports may be investigated for installation in Type 1
enclosures or enclosures with other environmental ratings. This standard also claims that
compliance with these requirements does not assure that the infrared viewport is suitable
for use as a component of an end product. For example, accessibility of live parts is
investigated with respect to industrial products rated 600 V and below, and additional
investigation may be required for products rated over 600 V. The acceptability of an
infrared viewport in any particular application depends upon its suitability for continued
use under the conditions that prevail in actual service. Accordingly, for a particular
application an infrared viewport may be affected by the requirements for the equipment
in which it is used, and it may be necessary to additionally evaluate that infrared viewport
for features or performance characteristics that are not specified in this outline of
investigation.
In summary, some requirements contained in this standard are not completely
suitable for our project, so we decide to test the infrared remote controller of our project
and comply with the requirements which can be adopted in our project. In order to make
our project easy to trade and avoid any kind of plagiarism, we will comply with the
standards:
UL 50V
The requirements of the infrared viewports of the project
Below is a summary of the whole standards that are related to our project to make an
implementation of the product:
UL 60370 Standard for Automatic Electrical Controls for Household and Similar Use;
Part 2: Particular Requirements for Electrically Operated Door Lock
UL1034 Standard for Burglary-Resistant Electric Locking Mechanisms
UL61131-2 Standard for Programmable Controllers – Part 2 : Equipment Requirements
and Tests
ISO 7240-3:2010(en) Fire detection and alarm systems-Part 3:Audible alarm devices
UL 2058 Outline of Investigation for High- Security Electronic Locks
UL 50V Outline of Investigation for Infrared Viewports
46
XI.GLOBALIZATION
Ever since humans began to cultivate land, there has been a need to protect one’s
property, especially one’s home. As time passed and technology increased, humans began
to employ locks to secure such items. Although other areas of technology have improved
over time, it seems as though the lock has remained relatively the same; even today
traditional key locks are used on homes, apartments, businesses, and many other
buildings. These “traditional locks” are made of mechanical components, which allows
for breaches of security as people can unlock these without the key. A potential way
around this type of breach is to remove the physical key from the equation and to employ
digital locks. However, this digital lock will be influenced by local, global, intercultural
issues, how to solve this problem become the main point for us.
Our technology and the desire for it seem to grow hand in hand. As our society
progresses, more people will be willing to change accept new technologies. A prime
example of this can be seen each time a new Apple product is released. During this time,
people stand in line and wait just to get the newest product. Although, Apple has a large
pool of “early adopters” that can be fanatical, it seems as though this is a trend that is
becoming more prominent across all technology. While we do not believe that people
will wait in line for days for a digital lock, we do believe that people will be open to this
product and will readily replace traditional locks with digital ones.
There are many benefit of digital locks including the eradication of physical keys
and increased security, but these locks will have a higher price which could prevent some
from adopting it. However, as indicated by Moore’s Law, the cost prohibitive nature of
the technology will decrease over time. In this respect, our product will have a reduced
price without sacrificing security or convenience. Due to the desire for the increased
security, convenience and decreased price, we believe that our product has the potential
to be successful at a global level.
We realize that global acceptance is one of the most important benchmarks for
success, which is why we chose it as our standard. This will propel us forward and drive
us to constantly improve our product for our consumers. As globalization has both
advantages and disadvantages, we will consider all the factors when constructing our
product. In order for our product to stand out amongst competitors, we will minimize the
cost and maintain craftsmanship, performance, and universal compatibility. Our product
must be acceptable around the world and in order to so, it will meet all nations’ standards
before being introduced into the market. In the following paragraphs, we will introduce
the items things we considered when designing our product.
A. GLOBAL AWARENESS
Global Awareness is a key factor to ensure a successful design. The differences and
similarities among individuals and groups are key components to consider. Some of these
include age, ethnicity, gender, cognitive ability, religion, culture, family situations,
experiences, sexual orientation, and many more. Thus before designing, our
47
brainstorming included a significant portion of time to consider the universal nature of
our design. We identified that people feel very strongly about home security as well as
the cost of security. Due to this, our product’s security must be robust and have a price
that is acceptable by the potential customers. As confidence can be conferred upon a
product by receiving accreditation by an independent organizations, we will strive to earn
the accreditation of the World Lock Industry Association (WLIA). This accreditation will
facilitate global acceptance and ensure that our product is safe.
B. GLOBAL PERSPECTIVE
In order to develop a global perspective, it is necessary to understand worldwide
business. Included in this is to establish a link between ourselves and others around the
world. We have the advantage of designing our product at Florida International
University because of the variety of cultures and points of view. This will allow us to
gain valuable insight into worldwide opinions via our survey. In doing so, we will be able
to understand requirements of potential consumers. Another benefit, intrinsic to our team,
is our diversity. When combined, the survey results and our team will enable us to
connect to nearly all cultures of the world.
C. GLOBAL ENGAGEMENT
The international standard for Burglary-resistant electric locking mechanisms (UL
1034-2000) provided us standards from which we designed our product. Furthermore, our
team personally conducted a survey in our university on students from around the world.
This provided us with valuable feedback about our product. Aside from this, our senior
design mentor gave us his real experience and advice to help improve our product. After
we conclude the survey and had a meeting for “Global Engagement”, we were surprised
to find that our design has a social, financial and cultural impact around the world.
Initially we assumed that our product would be accepted all over the world, but we
soon realized that there were some minor changes necessary to accommodate global
engagement of the WLIA; most notably, we must comply with the regulation of the
World Trade Organization (WTO) and organizations, such as the International
Standardizing Organization (ISO), the International Electro Technical Commission
(IETC), and the International Association for Electronic Electric and Automation
Engineering (IAEEAE), which are responsible for controlling standards related to
products such as ours. These rules and regulations are set, and all must be obeyed in order
to be successful at the global level.
D. WORLD TRADE ORGANIZATION[4]
The World Trade Organization (WTO) is an international organization that deals
with the rules of trade between nations. This organization functions based on the WTO
agreements. These agreements were negotiated, ratified, and signed by the participating
nations. Ultimately, these were put in place to help producers, exporters, and importers
conduct business fairly. [4] WTO has many principles to make trade free and transparent
between all participating nations. The pertinent principles will be discussed below.; these
principles apply to agriculture, textiles and clothing, banking, telecommunications,
48
government purchases, industrial standards and product safety, food sanitation
regulations, intellectual property, and many more industries.
1) Trade without Discrimination
No country should discriminate against trading partners. All WTO members
should be fair and equitable when trading with other members. Under this
principle, a nation must not favor one nation over another; nor should a nation
give special favors to one over another. Also, a nation must treat locally-produced
and imported goods equally once they have entered the market.
2) Freer Trade
Members are encouraged to lower trade barriers. In this respect, the barriers
refer to duties, tariffs, and measure that selectively restrict quantities (such as bans
and quotas). WTO member are also encouraged to discuss the reduction of
bureaucratic issues including exchange rates and “red tape”. The idea behind this
is to promote trade as well as make it easier to trade.
3) Predictability
Behind this principles it to encourage members to be predictable. Although
this seems very simple, the predictable nature of a nation can do much to facilitate
trade. For example, if a country has very strict standards for important food
products and uniformly applies them, other members know what is expected and
can make adjustments accordingly. This principle also allows members to
understand the economic future of itself as well as other members. Predictability
and stability go hand in hand and ensure the confidence of members when trading.
4) Promoting Fair Competition
The WTO encourages all members to partake in open, fair, and undistorted
competition. This principles prevents instances such as members creating
excessive barriers to entry or using subversive pricing techniques to gain an unfair
advantage. While this issue is a complex one, it is designed to allow all members
to play on a level field; there are also provide an avenue for recourse in the event
of a member violate the principle.
5) Encouraging Development and Economic Reform
While this principle is aimed at development of less-developed nations, it
also is concerned with flexibility for these nations. Development refers to the
progress of a nation’s economy to market economies. In order to achieve this
development, the developing nations are generally allowed some assistance and
concessions to allow them to compete.
6) The Principle of Transparency
WTO members are advocated to reduce tariffs and trade barriers through
negotiations based on the operator’s rights and obligations, implied by their own
economic situation and competitiveness, reduce tariff and trade barriers through
negotiations, then gradually opening up the market and achieve trade
liberalization.
7) The Principle of Liberalization
Liberalization principle is in order to promoting freedom of trade
49
development, people limiting and the removal of all hampered and blocked for
international trade, which including laws, regulations, policies and measures.
8) The Principle of Market Access
Market access principle is the principle that make foreign country’s goods,
services and capital adequate to join in the market. This principle allows all the
countries, based on their level of development, to gradually open up the market
within a certain period, then achieve trade liberalization.
E. ELIMINATING BARRIERS
Due to globalization, we believe that the success of our product is directly related to
its performance. In order to achieve this goal, we must consider the potential barriers and
how to overcome them. Our barriers can include governmental forms, such as regulations
and standards. We have realized that the best method to solve the trade barriers is to
ensure that our design follows the standards which are set up by the authoritative world
organizations. For example, we have studied some rules which listed by IEEE and ensure
that our product will comply with all international standards, in order to eliminate trade
barriers and make sure the design will be a successful one.
F. COLLABORATION TOOLS
When our team started on our project, we made a plan on how to accomplish our
goals based on a set schedule. As a team, we need cooperate in order to stay on track
according to our schedule. In the case of an unforeseen events, we understand that
meeting each week may not be possible. To overcome this we have decided to use tools,
such as Skpye and phone conferencing, to meet. Furthermore, we created a Google Drive
folder in which we store and share all the useful materials with the entire team. Another
issue arose from our international team; some members will leave the country during
winter break. This will be dealt with via e-mail, and the previously mentioned tools, in
order to meet our deadlines.
G. INTERNATIONAL CONTACTS
In order to know whether our project can has potential on the market, we spend time
to talked with some contacts in China and Germany. We gave them our idea and our brief
explanation of our project to them, then got some feedback from them. So we
summarized what have gained from these international contacts in the next following
paragraphs.
Our first international contact was a mechanical engineer in China, Mr. ZhenQiang
Li from Company of Shenhua, Beijng, China. We asked the flaws of traditional lock and
shared our idea, which let electrical and mechanical technology combined to make a lock.
He considered our idea is a pretty good idea and our idea solved many flaws in
mechanical lock. He said although there are some electrical locks in global market now,
the price of them are very expensive, and our product’s price are very low, so we have a
great opportunity to beat them in the market.
Our second international contact was an electrical engineering in Germany, Mr.
Konrad Adenauer from a lock company named Dirak. He introduced us that people are
very care about the safety for their houses in European, but seldom people changed their
lock, because most of them don’t have enough money to buy a high price electrical lock
50
for their door. After we introduced our design, he said our product will help people save a
lot of money and get more security for their family. Furthermore, he considered that we
can promote our product to the whole world so that all the people can enjoy the benefits
of our product.
In conclusion, based on our international contact, we all think that the Chinese
market is the most potential market in the world. Because China has a lot of industry
companies, and the labor fee in China is cheap, so we can minimize our product as low as
possible. Our international contracts inspired us how to improve our design and their
advice will help compete with existing products in the future market. Now we believe
that if we considered the all the requirements for globalization, our product will be a
success in the future.
XII. HEALTHY AND SAFETY
The designers can affect the user’s health if they don’t design for sustainability or if
their designs are not safe. Therefore the health and safety of the product is really
important to our project. There’s one word recorded by World Health Organization,
“Health is a state of complete physical, mental and society well-being and not merely the
absence of disease or infirmity.” It is vital for us to make a safety manual for people who
wants to buy our product. The purpose of our safety manual is to avoid any risk that may
be harmful to the users. Some standard safety practices and rules will be contained in our
project in order to protect the safety and health of the users. The standard such as “All
devices using 120 Volts AC power should use the copper wire from the value 14AWG to
carry up to 20A, to 10 AWG to carry up to 30A. ( National Electrical Code Table
310.16).” will be the basic rule in our safety manual.
The designers are the crucial part to minimize the risks while building the product. The
equipment and materials can also be harmful to our health and safety. So we are planning
to manufacture a manual for users to follow so that we can play our role better in the
process of solving the safety and health problems. Actually, safety and health issues are
the foundation of the product and need to be solved through amount of researches before
designing the other part of the products.
The safety and health issues are not just about the users but also about the designers.
As the designers, we will spend much time on practicing to operate the instrument during
the process of the building our project. We will focus on how to operate the equipment
correctly first and follow the general safety rules such as avoid wearing rings, metallic
watchbands and other metallic objects when working near high voltage environment and
avoid working alone. The other rules like avoid working hot circuits and contacting with
the contents of any broken electric component are also important for us.
The dangers can be roughly divided to two variants. One is concealed dangers, another
is obvious dangers. After researching, we will claim two kinds of dangers in our safety
manual. The concealed dangers of our new type door lock could be the accidentally
electric shock when inputting the password on the keyboard. The obvious dangers could
be finger may be hit when the lock is closing. We need to consider all the conditions that
may cause the injuries to the users and solve these problems before designing and testing
the product.
51
For the safety and health issues of our project, we will provide a manual that contains
the instruction for users to follow to use our product correctly. We will also provide all
the email of the designers for users to contact in order to explain all the potential
questions of the product.
In conclusion, the safety and health of the users are the most important part in our
project and we concerned all the potential dangers very carefully. We believe the users
will be satisfied with the work we make for the safety of the users. We will also fix all the
mistakes we make in the safety manual if users contact with us and help users to find the
solution to solve the safety problems.
XIII.ENVIRONMENTAL CONSIDERATION
The most important environmental issues of a product include how to dispose the
waste of the product and how to recycle the waste material of the product. After our team
members are aware of how important the environmental issues are, we decide to make a
plan to make the negative effect of our product to environment to be as minimum as we
can.
The first issue we need to focus is the the waste of the electrical product. “e-waste” or
“Waste Electrical and Electronic Equipment”, normally we called them WEEE. WEEE is
a waste type material including unwanted or broken electrical appliance. Many
components of such equipment are considered as toxic or not biodegradable so we take
much count of the waste material of our project.
The second environmental issue is about the RoHS (The Restriction of Hazardous
Substances Directive). The RoHS directive restricts the use of six hazardous materials in
the manufacture of various types of the electrical equipment. The six substances which
are restricted are below:
• Lead(Pb)
• Mercury
• Cadmium
• Hexavalent chromium (Chromium VI or Cr6+)
• Polybrominated biphenyls (PBB)
• PBDE (polybrominated diphenyl ether)
• PBB and PBDE are flame retardants used in some plastics.
Our project remote control door lock complies with all the rules in RoHS. We
especially paid attention to avoid using the materials stated in the RoHS.
The third issue we concentrate on is the Hannover principles. The power consumption
of our project is very low close to 30 to 40 volts, but we still try to find the ways to make
our product more sustainable. The Hannover principles can help us to achieve the goal to
make our product more environmental friendly. We can maximize the long term value if
we comply with the beneficial Hannover principles.The Hannover principles are
beneficial for us to make our product more sustainable are below:
1. The fourth principle: “Accept responsibility for the consequences of design decisions
upon human, the viability of natural systems and their right to co-exist”
2. The fifth principle: “Do not burden future generations with requirements for
maintenance or vigilant administration of potential danger due to the careless creation of
products, processes or standards.”
52
3. The sixth principle: “Eliminate the concept of waste. Evaluate and optimize the full
life-cycle of products and processes, to approach the state of natural systems. in which
there is no waste.”
4. The eighth principle: “Understand the limitations of design. No human creation lasts
forever and design does not solve all problems. Those who create and plan should
practice humility in the face of nature. Treat nature as a model and mentor, not as an
inconvenience to be evaded or controlled.
The Hannover principles stated above is the guarantee of making our product achieve
the long term value. Also, we care about the convenient disassemble of our product. We
consider to make a manual to take down our lock on the door very easily and dismantle
the lock very easily for users. We will make the disassemble procedure as simple as
setting up the lock on the door and make every components in the lock very easy to take
down.
The last issue we need to concern about the effect to environment is to recycle the
electrical and electronic materials contained in our product. In order to comply with the
Life Cycle Assessment( LCA) appropriately to improve the the effect of our product in
environmental aspects and potential aspects, we avoid using the using the materials
consist in RoHS and use the LED screen made by glass which are biodegradable to
ensure to maximize the long term value of our product. We consider our product
minimize the risk which can be harmful to health and environment. We use a software of
LCA to simulate the major components in infrared remote control door lock. The figure
below shows the major components in software LCA evaluation for infrared remote
control door lock:
Figure 17 LCA for Infrared remote control door lock
53
We also use SimaPro 7.0 to evaluate the effect of Infrared remote control door lock for
human health and environment. The software we use is Life Cycle Impact Assessment
(LCIA). As the figure below shows, we can find out the impacts of our product on human
health, ecosystem quality and resources. The first figure below shows the impact of
product on three aspects, the second figure shows the impact on categories to indicate our
product is environmental friendly:
Figure 18 LCTA for Infrared remote control door lock
54
Figure 19 LCIA for Infrared remote control door lock by category
55
XIV. SUSTAINABILITY CONSIDERATIONS
In today’s global market, it is necessary to produce some products and services which
are not only satisfy environmental safety, but also satisfy sustainable. So, an important
question remind us, “How will the code lock be a good product to achieve a long-term
value?” In this world, we have many sources, so selecting components which to make
product common, environmentally, user friendly, and circulation are what we need to
consider. Our destination is to design a device which not only can be used for a long term,
but also it can be recycle the materials when people replace it. At the same time, we are
going to low the price to let customer enjoy the best product.
The 51SCM is a normal material for our design, and people can buy it from everywhere,
but in order to make the product sustainability, we need to find some way to improve our
design. Firstly, we will do the survey to find out the most useful and the best quality
materials in this world, actually, we have already found it from China, and the price in
China is also the best for us. We believe that when our product is introduced to the people,
it will present a new window to improve this product. And there will be a majority of
recommendations which from the customers and factories. Then we will adopt these
advice to achieve our goal, which means make the product more efficiency. When our
code lock reaches a milestone point, we hope that our design will be one of the standards
in the official design.
From some ideas on internet, we are planning to use reliable components which make
every components run smoothly, each selection is to ensure that our product will run
properly. The most important part, which means using infrared and code will interact
through 51SCM. The product used in these ways include an infrared receiver and a LED
to prove whether the code is correct. This kind of technology usually used on safe box,
seldom company use this on a code lock. We believe that even if our product have to be
replaced in the future, our technology will be revolutionary.
After we design or produce our product, we will find that some components are not
necessary or can be replaced by others. For example, when we plan to use PCB board to
test our design, we found that if we use bread board to replaced, we can connect it to my
DAQ, so we can see how much voltage or current or other materials, based on that, we
will try to improve our design. In the second procedure of our design, we are going to use
51SCM to be our main control in our design, but when we found that the same one in
different place have a large different price, we reconsidered our design, try to find that
whether the quality of two same components have the same quality. After did a survey on
this kind of 51 SCM, we found that we can replace it by using cheaper one but same
quality, which will let our product achieve sustainability.
Because most of our product’s components will be put in a very small box, so we need to
organize the room when we make the code lock, because costumer want to use a small
lock but achieve all the functions. After we organize all the room in this box, we will try
to connect it to a physical lock, which means mechanical lock. And if necessary, we will
do many test on customer’s house for free, make sure they satisfy our product, then
produce it.
56
When designing a code lock, we need to take care of every components which we need
to set up together. We think that our design’s technology doesn’t need be maintained too
many times, because if it broken or have some problem, we can supply the warranty to
the customer. Also, it will never expired. Once we achieve our goal, which help people
save a lot of money and get more security on their house, our design will become one of
the most important standards for lock field.
XV. MANUFACTURABILITY CONSIDERATIONS
In this section, we will present our opinion on how to produce a successful product by
manufacture, which considered the most important process in the final of our design. In
this procedure, we will take care of the design which have kinds of perspectives and let
some manufacturer evaluate our project. This so important process can let we know that
whether we are creating a product that will which will have an easy way in
manufacturing, which not only influence our future life, but also a strategy to perfect our
plan.
If our product have some problem on manufacturing process, all the procedure which
follows our plan will be shown before it sells on the market. Design for manufacturability,
which we call it DFM, is the key process of designing products, which our goal is to
optimize all the processes in manufacturing. In the rule of 10, it tells us that repair and
find the problem will cost about 10 times greater than make the product, so we must find
all the mistake in our plan and action. We think that the DFM will help us to define the
best price, product quality, compliance, and reliability in standard regulations.
In the next few following paragraph, we will describe how we are applying DFM to our
design by discussing the rules.
A. Strictly selection on components
One of the method that we are going to use in our design is using standard components.
This important process will make sure that our product will be produced in correct ways.
For example, we will use some common parts such as everyone use it before and these
parts can be bought from everywhere. When we want to buy the led screen, we found that
some types of led can be bought everywhere, but some of them just can be bought in
developed countries. In conclusion, we can make sure our customers trust us, low the
costs of product, and make a easy manufacturing process by using standard components.
B. Easy to Assemble
Our product will be assemble by manufacturing and ourselves, so the user just need to
use a remote to test whether it work. The customer don’t need to worry about assembling
any parts, even the battery. The user can replace the battery after using it for several years,
which is a usual process on electronic devices.
F. Easy to fabricate
The infrared detector in our design is fundamental modular of all the parts which already
used before. In order to put them together, we eliminated the possibility of many errors
57
by testing assemble of our product, which to ensure that all the components run properly.
Also, we are considering whether test all the components to ensure that all parts are
inspected so we can eliminate the costs which we don’t need to spend on further.
C. Simplifying the design
Another important aspect of our design is the simplification, which will give us more
benefits. If we simplify the design, it will ensure that our product is safe, add its
reliability to customer, and it can help us to create a durable product. We plan to low the
budget by reducing the number of parts, but not low the quality of the parts. Our main
destination is to ease the manufacturing process, not only to save money.
Our team believe that if we obey the above rule to make our product, we will make less
mistakes in our process, then we can produce a satisfied product to customer. Another
important thing which we paid more attention was the analysis of the committed cost,
which show in the figure. In this figure, we can see that all the procedures need to be
done in order to make a better product. As the figure shows, if we make wrong or bad
decisions in the early of our design, if we don’t correct it right away, this mistake will
drag on through the process and we will paid more energy and effort to correct all the
influence.
Figure 20 product cummulative cost per phase/time
XVI.ETHICAL CONSIDERATIONS AND SOCIAL IMPACT
Ethics will influence one’s or a group’s behavior when they design something. Any
opinion or advice could be ethical. All the teams must upheld ethical standards. These
kinds of standards can have a strong impact on our decisions. Whenever some ethical
standards are violated by some teams, they can be considered as unethical. Ethical
standards includes honesty, fairness, responsible and so on.
58
A. Ethical Considerations
Ethical considerations can be utilized on both individuals and groups, even the
whole society as well. Sometimes the individuals may be affected by a group or other
team members. In order to obey the ethical considerations when we design our project,
we need to study the IEEE code to avoid ethical problems. We present the IEEE code of
ethics, to reminder us that we are following these codes all the time. (REF: 7.8 IEEE code
of ethics, Professional Activities).
1. To accept responsibility in making decisions consistent with the safety, health, and
welfare of the public, and to disclose promptly factors that might endanger the public or
the environment.
2. To avoid real or perceived conflicts of interest whenever possible, and to disclose them
to affected parties when they do exist.
3. To be honest and realistic in stating claims or estimates based on available data.
4. To reject bribery in all its forms.
5. To improve the understanding of technology, it is appropriate application, and
potential consequences.
6. To maintain and improve our technical competence and to undertake technological
tasks for others only if qualified by training or experience, or after full disclosure of
pertinent limitations.
7. To seek, accept, and offer honest criticism of technical work, to acknowledge and
correct errors, and to credit properly the contributions of others.
8. To treat fairly all persons and to not engage in acts of discrimination based on race,
religion, gender, disability, age, national origin, sexual orientation, gender identity, or
gender expression.
9. To avoid injuring others, their property, reputation, or employment by false or
malicious action.
10. To assist colleagues and co-workers in their professional development and to support
them in following this code of ethics.
In order to obey these ethical codes, we will accept any kinds of suggestions and
criticism from others. All of us think these advices and criticism are important to our
product. According to the safety and health of the public, we will focus more on custom’s
feeling of our product, then make sure they are willing to buy it.
When we designing our product, our main ethical dilemma is some poor people still
think our product is too expensive, so they have to bear the risk of theft in their family,
even form a gap with rich people. Although traditional lock is cheaper, it just contains
basic mechanical principle. Our product make mechanical and electrical technology
combined, so we have to raise the price, this will make us in to a dilemma. In order to
solve this problem, all we can do is to find somewhere can use less money to produce the
same quality product, and finally we found that China is the best choice.
In order to solve this dilemma issue, our team came up with 4 schemes shown in the
following Table. Each scheme has a different result when we decide which one to choose.
59
Table 10 Ethical Solutions
Opinion # Option Description
1 Expensive components to make sure the lock works well and long life
2 Normal price components with installation
3 Normal price components and instruct how to install the lock
4 Cheap components and instruct how to install the lock.
The Table introduces the evaluations of each option. The weighted score is based on
Utilitarianism, Egoism, Rights, and Kantian.
Table 11 Ethical Evaluations
Option# Utilitarianism Egoism Kantian Rights Score
1 1 0.5 0.25 0.5 2.25
2 0.75 0.25 0.25 0.75 2.0
3 0.5 0.75 0.25 1 2.5
4 0.25 0.25 0.5 0.25 1.25
From the Table XXX Ethical Evaluations, we can see that Option 2 has the highest
score. Its means that most of people willing to use normal components and install the
product by themselves, because they can save a lot of money by choosing this method.
Therefore, when we designing our product, we will follow the best option to satisfied
customers, and make the maximum benefit for each side.
B. SOCIAL IMPACTS
1) Local Culture
In our daily life, safety is a major concern both in work and home. Although
technology has advanced significantly, we still use physical documents for sensitive
information such as financial statements and personal. Protecting items such as these and
all other valuables that are found in houses/apartments, most important of all human lives,
robust security of the perimeter is necessary. One of the simplest, yet effective methods
to securing a home is a strong lock on the doors. While traditional locks are relatively
safe, they are not infallible. For example, thieves have the ability to pick locks. Also,
60
keys can be lost, which reduces the effectiveness of the lock. Traditional locks also have
the inconvenience of requiring the user to carry a key. Therefore, one could be forced to
carry multiple keys in an age when people are constantly looking to synchronize different
facets of life. In respect to this, a remote or password controlled lock could solve the two
aforementioned shortcomings of traditional locks.
As science and technology continues to advance, the need for security in the digital
sphere has also grown. A remote or password controlled lock has the potential to achieve
increase safety. The desire for high technology and security gave birth to the idea of
password controlled locks replacing traditional locks. These new locks are safe, low cost,
low power consumption, easy to operate, and require a password rather than a key.
Furthermore, our previous survey revealed that approximately 10% of people’s homes
had been burglarized and felt a traditional lock is not sufficient. Also, more than 84%
wanted to try the infrared remote control lock, which indicates the potential success of
this product.
Our product clearly has the potential to positive social impacts. It has the ability to
make the life easier for users, while also ensuring security and peace of mind. An
additional benefit of our design is that users will never need to worry about forgetting the
keys at home or locking themselves out of the house. In order to provide a viable product,
our team will improve on existing locks by allowing the user to control the lock from
great distances.
2) Global Culture
Aside from the improvements to individuals’ lives, this product can improve the
security of organizations, governments, as well as other entities. Our product also has the
potential to stimulate economies with trickle down effects. For example, this device could
be adapted for storage companies or banks. If this is accomplished, the users could grant
access on an individual basis and be able to record exactly who activated the lock.
Another global applications is that this product can be implemented into less developed
parts of the world to stimulate economic growth. Certain part of the world suffer from
corruption and theft; both of these can be reduced with our product. An example of this
would be to secure vulnerable locations, such as voting locations, in order to prevent
tampering with the polls. Not only would this secure the results, but it also has the
potential to provide increased stability to regions and promote democracy wherever
implemented.
We recognize the effect of ethical dilemmas, as well as the impact on local and global
culture, on our product’s ability to achieve large scale acceptance. Our ethical
considerations included the IEEE code of ethics, IEEE 551-2006, IEEE 14143.1-2000,
IEEE 450 INT 1-2005, IEEE C 37.59-2007, and IEEE NESCIR552-2008. Granted that all
ethical dilemmas and social impacts are carefully considered, our project has the potential
to be accepted globally and will revolutionize the way that people use locks.
61
XVII.CONCEPT DEVELOPMENT
In order to reach a decision with scientific validity, concept development is
commonly used. In this method, various possibilities are explored. After a thorough
investigation, the most viable alternative is selected. During this analysis it is imperative
to consider the impact of various factors on the product before selecting the best option
form different combinations. Tables and data analysis, we calculate the respective
weights of various properties which help to make to make informed decisions.
In our project, we considered four alternatives. Each of these alternative has
differing characteristics which will be evaluated in this chapter. Our final decision will be
assisted by a weight table, which assigns different values of importance to different
characteristics. After careful analysis, we will select the most viable alternative. The
figure below demonstrates our concept fan.
Figure 21 Concept Fan
A. ALTERNATIVE OPTIONS
Differing combinations of features can reflect the different properties of our product.
In order to make our products successful and to achieve maximum efficiency, a variety of
options will be considered. This section will introduce the four alternative which will be
explored.
The main components of our product are the Micro Controller, Screen, and
Password Storage. We considered two different options for each of these components, as
shown in the concept fan. In the case of the Micro Controller, STC89c51 and AT90S1200
were considered. LCD and LED were considered for the Screen. AT24C02 and
62
ATMega88 were considered for Password Storage.
Between the two Micro Controllers, STC89c51 is the most widespread used SMC
and has superior adaptability and stability. However, AT90S1200 has superior speed and
computing ability. The choice between LCD and LED was not a difficult one due to our
product’s needs. Although LED has a far superior performance, LCD is the much more
suitable for our project. Similar to the two Micro Controllers, the Password Storage
options require careful consideration. Generally, AT24C02 has greater ability to resist
interference and is a more stable system, but ATMega88 can rewrite more than 100,000
times and has larger storage space. In the next part, we will consider our four alternatives
and explore their advantages and disadvantages.
Alternative 1
Figure 22 Alternative 1 Configuration
Alternative 1 combines the STC89c51 (Micro Controller), LCD (Screen), and AT24C02
(Password Storage). This combination was created as this is the most suitable and
common combination. In this configuration STC89c51 provides great adaptability, LCD
is stable, and AT24C02 can execute quickly with no mistakes.
Advantages Disadvantages
a. Project will be stable
b. Limited mistakes
c. LCD facilitates connection
d. Ease of establishment
e. Lowest cost alternative
a. Low writing speed
b. High power burden.
c. Low display effect.
63
Alternative 2
Figure 23 Alternative 2 Configuration
Alternative 2 is very similar to Alternative 1 in the only the Password Storage component
is changed. This alternative has the following components: STC89c51 (Micro Controller),
LCD (Screen), and ATMega88 (Password Storage). In this configuration, the Password
Storage component has the better performance, larger storage space, and a greater ability
to rewrite. However, this may not be the most needed capability for our project.
Advantages Disadvantages
a. Ease of establishment
b. Large storage space
c. Greater ability to rewrite
d. Faster speed for changing password
a. High cost
b. More difficult connection
c. Not stable
d. Lower display performance
Alternative 3
Figure 24 Alternative 3 Configuration
64
Alternative 3 was constructed of a AT90S1200 (Micro Controller), LED (Screen), and
AT24C02 (Password Storage). This configuration allows for increased running speed and
has better performance. The use of the LED screen, enabled superior display performance,
but severely reduces the lifetime of our project.
Advantages Disadvantages
a. Improved display performance
b. Faster running speed
c. High display performance quality
a. High power consumption
b. High power burden
c. High cost
d. Difficult to establish
Alternative 4
Figure 25 Alternative 4 Configuration
Alternative 4 combined the AT90S1200 (Micro Controller), LCD (Screen), and
ATMega88 (Password Storage). This alternative is very efficient due to its components;
the writing speed is increased while the power burden is decreased.
Advantages Disadvantages
a. Highly efficiency
b. Faster running speed
c. Low power burden
a. Difficult to establish
b. High cost
c. Not a stable system
d. Lower display performance
B. CONCEPT SELECTION
In order to remove personal bias from the selection process, we considered the
relative importance of differing objectives. A table was used in order to calculate
weighing factors; the results of which are displayed below.
65
Table 12 Weighted Scores of Objectives
Stability Ease of Establishment
High
Efficiency
Low
Cost G.Mean w
Stability 1 1 5 3 1.97 0.28
Ease of Establishment 1 1 3 3 1.32 0.19
High Efficiency 5 3 1 1 1.97 0.28
Low Cost 3 3 1 1 1.73 0.25
Total 6.98 1
The values of the different combinations range from 1 to 5. In this table, 1 indicates
that the row’s objective is equal to the column’s objective; 3 indicates moderate and 5
indicates strong. The table was populated with our project’s objectives, each pair was
rated, and then the G.Mean and weight were calculated. The G.Mean and w (weight),
shown in the table, was calculated using the following equations:
!.#$%& = ()*(+*(,*…(.
/
0� �
! = #.%&'( )*+’,�
From the previous table our team discovered that the weight of stability (0.28),
ease of establishment (0.19), high efficiency is (0.28), and low cost (0.25). Following this,
we created an alternative section table (below). Frist, our team considered if the
alternatives were safe and stable. Our inspection revealed that each alternative satisfied
these conditions. Following this, we rated the stability, ease of establishment, efficiency,
and the cost of each alternate; the weighing factors were then multiplied by the rating in
order to produce scores for each alternative.
Table 13 Alternative Selection Table
Constraints Alternative 1 Alternative 2 Alternative 3 Alternative 4
Safe Yes Yes Yes Yes
Stable Yes Yes Yes Yes
Objectives w Alternative 1 Alternative 2 Alternative 3 Alternative 4
Stability 0.28 5 1.40 4 1.12 4 1.12 4 1.12
Ease of establishment 0.19 5 0.95 3 0.57 3 0.57 3 0.75
High efficiency 0.28 3 0.84 5 1.40 4 1.12 5 1.40
Low Cost 0.25 4 1.00 3 0.75 3 0.75 3 0.75
4.19 3.84 3.56 4.02
As shown in the table above, Alternative 1 received the highest score which
indicated that it was the best alternative for our project. Although Alternative 1 had the
highest score, Alternative 4 was a very close second place so if should be considered as
well.
Alternative 2 and 3 had very high performing components, but the combination of
66
the components was not as cost effect nor easy to establish. When considering the end
product, a lock mechanism for house (or other similar door) door, a display component is
needed and the LCD screen will suffice. The lock must also be stable, safe, and low cost.
To accomplish this, the STC89c51 Micro Controller will be used. Although the
AT90S1200 is more developed than the STC89c51, for this project it is more important
to consider the connection, stability, and ease of establishment; this is most applicable for
our selection. In terms of the Password Storage component, the ATMega88 proved to be
is too advanced to establish in our lock system.
XVIII.END PRODUCT DESCRIPTION AND OTHER
DELIVERABLES
In this section, we will have a clear description of end product for an infrared remote
control lock and functions of each component of the project, as will the specifications of
the part of the design; our lock will be used on doors such as those found on houses, but
will not be applicable to vehicle’s doors. This is the concept development we followed
and it indicates how we will deal with the idea for the design we will achieve.
A. END PRODUCT DESCRIPTION
Our product will be a multi-function lock. The lock can be securely mounted on the
door and will be controlled by an infrared remote control or password; while maintaining
security, our product will be safe and easy to use. This device will be constructed
primarily of metal. In general the installation procedure will be design to be very simple
so the product will be widely applicable and accepted
Visually, our product will look similar to the locking mechanisms found on hotel
doors. Although this appearance may not be aesthetically pleasing, it can be easily
modified. Ideally in the eyes of the customer, the appearance will be completely
customizable. However, this would reduce the economies of scale established when
producing a uniform product. In light of this, we plan to conduct a survey and research
current trends in order to design an acceptable appearance.
Users will be able to gain access using a password or an infrared remote control.
When using the password option, the system will have the ability to recognize if the input
it correct or incorrect. If correct, the lock will open and the door can be opened. If
incorrect, the user will have to re-input the password. If the password is incorrectly input
three times consecutively, as a safety feature, the lock will not accept any more inputs;
not even the correct password will work at this point. To override this, the administrative
password must be used. When using the remote control option, the device will unlock
once the remote is within the sight distance of the sensor.
B. FUNCTIONS
67
The design is based on the principles of infrared remote control and our product will
use the infrared remote control technique to build a remote controlled lock. An
improvement to existing systems that we will incorporate is the ability to use a password,
rather than just the remote. In this section, we will discuss our project’s functions. The
functions are divided into three levels: level 0, 1, and 2.
Level 0
The diagram below demonstrates the overall functionality of the infrared remote
control lock. The first diagram shows that the product will work only when it has a power
supply and input signal. When this occurs, the SCM system will provide an output signal;
this process will be stable and smooth. Below the diagram, our product is described
verbally rather than with a diagram.
Figure 26 Level 0 Functionality Block Diagram
Table 14 Level 0 Lock functionality
Module SCM System
Inputs Input signal voltage: 5V
Outputs Control signal determining to unlock or lock the smart lock
Functionality The input /output signal will be recognized as binary; “1” means unlock and
“0”means lock
Level 1
When the key provides an infrared signal, it will be received by the sensor inside the
lock and transfer it to an electric signal. The electric signal will go through the SCM
system, which will analyze the signal and produce an output signal. The output signal
will be received by the second sensor. If the signal is “+”, the lock will unlock; receiving
a “-” signal will prompt the user to try again. As previously mentioned, if the user inputs
the password incorrectly he/she will be locked out and a built-in siren will screech.
68
Figure 27 Level 1 infrared remote control lock block diagram
Table 15 Level 1 infrared remote control lock block diagram
Module Infrared remote control lock
Input Infrared signal
Output Electric signal with “+” and “-“
Built-in siren
Lock device
Functionality Lock or unlock and siren screech when necessary
Level 2
Within the SCM system, there is a clock circuit which will produce the clock signal
inside the system via a self-excited oscillator; a block diagram of this can be seen below.
Figure 28 Level 2 Block Diagram
69
Table 16 Level 2 Clock and Reset circuit
Module Clock and Reset circuit
Input Infrared signal
Output High and low level electric signal
Functionality Deal with input signal and send it to SCM system
Capacitance C3 and Y1 have the task of maintaining a stable frequency and fast start. The
magnitude is about 5-30 pF, but the typical value is 30 pF; this is shown below.
Y1
11.0592MHz
C2
30pF
C3
30pF
18
19
Figure 29 Clock Circuit
Our reset circuit, shown below, will function in the event of a high level hold two
cycle. The simplest automatic reset circuit is realized by the capacitor of external reset
circuit charge and discharge. As long as the rate of increase of Vcc is less than 1ms, it can
realize the automatic power-on reset. In addition to the power-on reset, it may also be
necessary to press the manual reset occasionally. In order to provide for this eventuality,
our design provides a reset button (shown below). Resetting can be accomplished by the
manual reset level mode and pulse mode. Reset is done by RST (9) Terminal and the
power supply Vcc.
R1
10k
C1
10uF
S4VCC
9
Figure 30 Reset Circuit
By analyzing the output signal, the system will take the proper action depending on
whether the signal is high or low level. A high level signal will tell the device to unlock;
low level will prompt the user to try again and/or make the built-in siren screech. As a
whole, this system is stable and reliable.
70
C. SPECIFICATIONS
This design consists of a MCU, matrix keyboard, LCD display, and password
storage component. The matrix keyboard allows you to enter the digital code and
function implementations. Users enters a password through keyboard, the SCM system
compares it with the stored password, and judges whether the password is correct. Then,
the control system will give and output to the unlock circuit or alarm circuit control.
The system consists of two parts, hardware and software. Our hardware part is
comprised of eight components: power supply, keyboard, password storage, reset, crystal
vibration, display, alarm, and unlock component. All the while, our software includes ten
programs: main, initial, LCD display, keyboard scan, start, close, built function, password
set, EEPROM read/write, and delay program.
1) Marketing Requirements
a. The design should have excellent security.
b. The design should have good compatibility and be easy to install.
c. The design should have a low cost.
d. The design should have low power consumption.
e. The design should be reliable.
2) Specification
a. Operating Temperature: 20 to 40°C
b. Operating Pressure: common pressure
c. Humidity: 25% to 55%
d. Force: common force
e. Current: 50nA to 2 mA
Table 17 Project Specification
Objective Engineering Requirements Justification
c, d
The design should not weigh
more than 250 g (about 0.55
lbs.)
This is similar or lighter than existing products in the
markets
b
The design should have size of
about 15 cm long and 8 cm
wide.
This is the standard size which users prefer.
d, e
The design should read currents
from 50 nA to 2 mA.
The energy consumption of sensor is very low and the
product will work normally under extreme situation.
c The design should cost around
$80.
We consider this a fair price compromise between our
users and the costs based on the user survey and our
ideas.
a, e The design should be made by stainless steel.
This makes our product strong and will avoid being
damaged.
The specification in this table shows us how the system works and interacts with the
user. The input and output are clearly indicated and each module works normally based
on its functionality.
71
Table 18 Input and Output specification
Level Module Inputs Outputs Functionality
0 SCM System
Input
signal
voltage:
5V
Control signal determines
lock/unlock
Dealing with input signal and output
will be recognized with “1” or “0”, “1”
means unlock, “0”means lock.
1
Infrared
remote
control lock
Infrared
signal
Electric signal with “+”
and “-“.
Built-in siren
Lock device
Lock or unlock and siren screech when
necessary
2
Clock and
Reset circuit
Infrared
signal
Voltage
5V
High and low level
electric signal
Deal with input signal and send it to
SCM system
D. OTHER DELIVERABLES
We have made a clear plan and schedule to implement the project. In order to
combine our original ideas with market requirement and users’ needs, we have conducted
multiple surveys. Our research discovered that we can show our product in great detail
but when doing so, we need to be conscious of our audience. Our descriptions need to be
clear and specify in engineering language and also simple language when it is appropriate.
Regardless of the audience, it is necessary to include how the product was built, how the
functions were achieved, and how the system operates. To do this, we will provide the
following deliverables:
1) A total completed report, which have figures and specifications.
2) A PowerPoint presentation to show the product, features, functions, purposes, and
specifications.
3) The end product display, including how to manufacture and how to operate it.
Our end product will be designed and made based on the features and functions
previously mentioned. We believe that it will work with basic functions and innovative
solutions. The report provides figures which will make it easier to understand the
functions of the product.
72
XIX. PLAN OF ACTION
In the plan of action section, our team will demonstrate the responsibilities of each
teammate by dividing the work and assigning deadlines for each task of our project. Our
team will prepare well for the whole project, but the meeting scheduling will as more
compact as we can. Therefore, in order to determine the graphical depiction of the
process, our team will analyze the distribution of the tasks using open workbench
software, through the use of Gantt charts, which is shown at the end of the section. As a
result, this software is important for our team to plan and complete every task that is
associated with our project, since it can distribute the appropriate duration needed for
each task. A suitable plan of action for every team member is critical to successfully
complete the project.
It serves as a proposal to achieving our aim of completing our design. Utilizing this
software, we will allocate the appropriate resources needed to accomplish our project
goals. For this reason, we divided the project into several phases, tasks, and goals.
Following the plan of action, we established a project timeline and individual work
assignments. The work was also divided within the design and implementation processes,
so that given tasks could lead to the completion of project milestones.
A. Statement of Work (SOW)
Research is the fundamental base for our project, so before any design is created, all
project modules and components should need to be analyzed. Materials and methods also
should be studied, in order to create the final design. A project outline will be created to
include software and product drawings.
1) Scope of Work
Our design is based on the principle of infrared remote control and microprocessor.
Besides, the encoder and decoder built into software. Our project includes the SCM
system (Mainly STC89C51 microcontroller minimum system), 4×4 Matrix keyboard,
LCD display and alarm system. With the settings, it can modify the six-digit user
password, Automatic alarm, Automatic Lock, Password error alarm and other functions.
(P0 port to control the design of the LCD display, Password correctly display password
ok!Password error display password error! For more than three times to enter the error
automatically lock. The P1 port control keyboard matrix containing the number keys 0-9
and A-F function keys). Besides, our project also can be remote controlled by the infrared
control device. The picture xxx is our software flow diagram.
The group was divided into three sub-teams:
Team 1: Yiming Huo and Xuefeng Li, who are in charge of the research.
Team 2: Shuo Qin and Jing Xiao, who are in charge of the programming.
73
Team 3: Xiaolun Zhang, who is in charge of the assembling and testing the product.
Figure 31 Flow Chart
2) Location of Work
Approximately seventy percent of the project will be completed on the Florida
International University Engineering Campus; the remaining thirty percent will be done
at our respective homes.
A portion of the device testing will take place in the Florida International University
Electrical Engineering labs on the Engineering campus. So our equipment cost almost be
0 dollar.
3) Deliverables Schedule
The Senior Design I presentation is scheduled for December 10, 2015
The Senior Design II final demonstration is scheduled for April 30, 2016.
B. Online Structure (WBS)
An outline structure of a project illustrates essential phases and tasks, to help team
members identify crucial elements of the project and have a transparent understanding of
the scope of the project including the roles of the individual team members. Critical
elements of our project consist of the core microprocessor (STC89C51 microcontroller)
and the remote infrared transmitter-receiver module. The following chart illustrates an
outline of the infrared remote control lock project below:
74
Figure 32 Project Plan
1) Phase 1- Core Microprocessor
In the phase 1, we want to use the STC89C51 microcontroller as a core processor, and
programming the microcontroller to sort and organize the data that is obtained as well as
perform any necessary calculations.
a) Objective
Utilize the STC89C51 microcontroller and write the appropriate software to crate a
multifunctional core for our project, and it can control the whole system such as saving
and changing the password and opening or closing the lock, which can make our product
more convenient.
b) Approach
We will do some research to get more information about the STC89C51
microcontroller, and we will discuss with our mentor about our programming part and
our circuit part.
c) Tasks
This phase will consist of the following tasks:
1.1 Research the STC89C51 microcontroller functionality.
1.2 Research the STC89C51 microcontroller circuits.
1.3 Research the STC89C51 microcontroller programming.
1.4 Find the tutorials for the STC89C51 microcontroller.
1.5 Find the tutorials for writing the program for the microcontroller.
2) Phase 2- Infrared Receiver and Transmitter Module
In the phase 2, it contains of the infrared receiver module and the infrared transmitter
module, which are the signal transmission and reception system and play an important
role for the whole lock system.
a) Objective
75
The Infrared Transmitter can emit the signal to the main system, and the Infrared
Receiver will receive that signal and Transmit to the core microprocessor.
b) Approach
We will discuss with our mentor about the infrared receiver and transmitter devices,
and do some research to get the information.
c) Tasks
This phase will consist of the following tasks:
2.1 Research the Infrared Receiver Module.
2.2 Research the Infrared Transmitter Module.
2.3 Research the Infrared Receiver Module circuit.
2.4 Research the Infrared Transmitter Module circuit.
2.5 Find the tutorials for Infrared Receiver Module.
2.6 Find the tutorials for Infrared Transmitter Module.
3) Phase 3- Input Module and Display Screen
In the phase 3, the Input Module contains of a 4*4 matrix keyboard. Besides, we will
use a LCD screen, which can display the password and status of the system.
a) Objective
The input keyboard will be a small size and lightweight for the clients can easy carry it.
The LCD screen can display the password and status of the system.
b) Approach
We will research some other products that similar to our project, and find some benefit
for the design of the input keyboard and the LCD screen.
c) Tasks
This phase will consist of the following tasks:
3.1 Research the design of Input Module.
3.2 Research the LCD circuit.
3.3 Research the Input keyboard circuit.
3.4 Find the tutorials for the LCD screen.
3.5 Find the tutorials for Input keyboard.
C. Project Milestones
Milestones are used as indicators of significant events in project development. They
require unique attention since they represent the success of a phase, and they provide a
key piece of information for following progressive phases.
Several project phases or milestones are identified in order to progress with the project.
Which consists of choosing a proposed project, researching core processor can control
the whole system perfectly, researching infrared receiver and transmitter devices from
76
other similar projects, acquiring programming skills essential for the integrating process,.
The final hardware will be tested in the lab. During the final phase of the project, the final
product of this device will be introduced to our mentor.
D. Timeline
1) Phase1.1-1.5
Target date: 11/06/2015
Stretch date: 12/04/2015
2) Phase2.1-2.6
Target date: 12/08/2015
Stretch date: 01/09/2016
3) Phase3.1-3.5
Target date: 01/21/2016
Stretch date: 03/14/2016
E. Gantt chart and Pert Charts
The Gantt chart helps us estimate the start and finish dates of terminal and summarizes
elements of our project. With it is graphical representation we can represent our team
project with the developmental segments into phases and tasks with their corresponding
starting date and ending date.
77
Table 19 Gantt chart for time line
78
Figure 33 Pert Chart
As a conclusion, our team divided our project into different phases, tasks, and
milestones. The Open Workbench software helps us to use of the work down structure
through tasks, milestones, and baselines that were set. In addition, the software allows us
for scheduling our project plans with dependencies, assigning resources to tasks,
scheduling work on tasks over a period time, and adjusting the schedule as actual work
that is recorded. The software shows charts and diagrams that take into account tasks,
constraints, dependencies, priorities, and resource constraints, generating the best method
79
for project completion.
Besides, if any task or phase is met early, we could change our tasks by using this
software, which would give us a final complete budget. Using the Open Workbench
software, a Gantt chart, a PERT chart, and a Budget were created automatically. Using
the Gantt chart, we were able to schedule our phases and tasks accordingly. Taking into
account the Gantt chart, we divided the group into three teams to complete the different
phases. The PERT Chart produces the best path to implement our tasks, and Open
Workbench produces PERT charts from the Gantt charts. The budget and its contents,
such as lab space and equipment cost, will be discussed in depth in a later section.
XX.MULTIDISCIPLINARY ASPECTS
There are a lot of factors that influence the success of our project. One of these
factors is the collective knowledge in electrical engineering. The core of the collective
knowledge is multidisciplinary aspect of our team. Although most of us are not
experienced engineer in solving all kinds of problems, we believe our collective
knowledge can help us to complete our project and help us to learn how to find the
solution. Our team consists of five electrical engineers, we all made concerted effort yet.
It is desirable that we all work as a unified team and our variable knowledge and
experience support us to pursue an outstanding end product. In this section, the
multidisciplinary aspects of five electrical engineers will be presented.
1) Xuefeng Li
Auto CAD Experience
Skillful at Visual C++
Matlab Experience
Control system Experience
Open Workbench Experience
Simulink and Multisim software Experience
As the leader of the team, Xuefeng Li is proficient in Auto CAD and control system.
He is also very skillful at the theory of the project and the examination of the product so
he can pledge the function of our product work well and dispose the problem of building
the circuit and assembling all parts of our project.
2) Yiming Huo
Electrical circuit backgrounds
Matlab skills
AutoCAD Experience
Proficient in Visual C++
Skillful at circuit processing software
Yiming Huo is experienced in designing code lock. So he will help the team to
design a code for the lock and handle the problems of how to change the password of the
80
lock and how to write a sic digit code for lock. Also, he can help to examine the circuit of
the lock to make sure that everything goes well.
3) Jing Xiao
Power system Experience
Control system installation
Proficient in Visual C++
Risk analysis
Auto CAD Experience
Analytical analysis
Jing Xiao is good at analytical analysis, risk analysis and power system. He will
make analysis for our project to make sure that we will reduce the risk of our product to
minimum and he will assist the team to make the power part of our project work well.
4) Shuo Qin
Proficient in Control system
Circuit analysis
Power system Experience
Open workbench Experience
Skillful at Visual C
Products standard
Shuo Qin is skillful at Visual C so he can help the team to finish the programming
part of the project. Also he can design the circuit for the whole project and do the circuit
analysis for the product.
5) Xiaolun Zhang
Knowledge in Power system
Communication Experience
Skillful at making plan
Market analysis
Auto CAD Experience
Efficiency Analysis
Xiaolun Zhang is very skilled at making plan for the project and make schedule for
the team to finish the product in time. Xiaolun Zhang is also very skillful at market
analysis so he can ensure that our product has marketable.
In conclusion, we are confident in our multidisciplinary aspects of knowledge and
also confident in making an outstanding product. We believe the variable knowledge of
us can help us to follow the time schedule to finish our project.
XXI.PERSONNEL
In this section, we are going to divide the task to everybody of the team in order to
finish the project. To make this project successful, we analyzed their abilities which each
member assigned in their resume. Their resumes include education background, which
can make every member using their skills to improve our design. In our team, all of us
81
are studying electrical engineers and some related branches now. We think that these
kinds of branches can help us a lot in designing our project, which include Electronics
I&II, Controls Systems I&II, Communications System, Solid State Device, Logic Design
and Computer Design.
XUEFENG LI
1599 SW 113TH AVE., Miami, Florida 33174
Cellular: (305) 487 – 2663 Email: xli055@fiu.edu
EDUCATION
High School diploma
• Baoding no1. High school
Bachelor degree
• Hebei University of Technology,
Tianjin, China
Major: Electrical Engineering and
Automation
Bachelor degree
• Florida International University,
Miami, Florida
Major: Electrical and Electronics
Engineering
AREA EXPERIENCE
• Visual C++
• Auto CAD
• MATLAB
• Simulink
• Multism
• Photoshop
Business Tools: Microsoft Office Suite
(Excel, Word, Power Point)
Open workbench
WORK EXPERIENCE/
ASSOCIATIONS
• Hebei University of Technology,
Tianjin, China
• Background
• Globalization
• Ethical Considerations and Social
Impact
RELEVANT COURSE WORK
• Power Systems I
• Control System
• Electronics I & II
• Signal and system
• Fields and Wave
• Communication System
• Solid State Devices
Shuo Qin
120 sw 109th ave APT 23, Miami, Florida 33172
Cellular: (786) 620 – 7867 Email: qshuo001@fiu.edu
EDUCATION:
High School diploma
• Yu Xin Middle School
Bachelor degree
• North China Electric Power
University, China.
Major: Electrical Engineering
Bachelor degree
• Florida International University,
Miami, Florida
Major: Electrical Engineering
82
AREA EXPERIENCE
• Visual C
• MATLAB
• Auto CAD
• Multism
• Photoshop
Business Tools: Microsoft Office Suite
(Excel, Word, Power Point)
WORK EXPERIENCE/
ASSOCIATIONS
• North China Electric Power
University, China.
• Member of the Students Union
• Help other students learning
English.
• Hold the New Year Evening
Party.
RELEVANT COURSE WORK
• Power Systems I & II
• Control Systems
• Electronics I & II
• Communication Systems
• Solid State Devices
Jing Xiao
II. 120 sw 109th ave, miami, Florida 33174
III. Phone: (786)606-6223 Email: xjing002@fiu.edu
EDUCATION:
High School diploma
• ShaoDong no1. Middle
school
Bachelor degree
• North China Electrical
Power University, China
Major: Electrical and Electronic
Engineering
Bachelor degree
• Florida International
University, Miami, FL
Major: Electrical and Electronic
Engineering
AREA EXPERIENCE:
• Visual C++
• MATLAB
• Simulink, Multism
• Photoshop
Business Tools: Microsoft
Office Suite (Excel, Word, Power Point)
WORK EXPERIENCE/
ASSOCIATIONS:
• North China Electrical
Power University, BaoDing,
China
• ShaoYang Cheng Guang
Company
• Senior Design group
RELEVANT COURSE WORK:
• Power Systems I, II
• Control System
• Electronics I, II
• Digital Signal Processing
• Solid State Devices
Yiming Huo
9650 Fontainebleau Blvd, Miami, Florida 33174
Cellular: (786) 303 – 7302 Email: yhuo003@fiu.edu
Education
High School diploma
• Shijiazhuang no2. Middle school
Bachelor degree
• Hebei University of Technology,
Tianjin, China
Major: Electrical Engineering and
Automation
83
Bachelor degree
• Florida International University,
Miami, Florida
Major: Electrical and Electronic
Engineering
Area Experience
• Visual C++
• Auto CAD
• MATLAB
• Simulink, Multism
• National Instrument
Business Tools: Microsoft Office Suite
(Excel, Word, Power Point)
Education Work/Association
• Hebei University of Technology,
Tianjin, China
• Group Leader in Circuit lab
• Help other students learning the
basic knowledge of circuit
Relevant Course Work
• Power Systems I
• Control Systems
• Electronics I & II
• Communication Systems
• Solid State Devices
• Field and waves
• Computer design
• Signal and system
Xiaolun Zhang
120st 109ave apt23. Miami, Florida 33174
Cellular: (786) 606 – 5380 Email: xzhan063@fiu.edu
Education:
High School diploma Education:
• Shijiazhuang No.43. Middle
school
Bachelor degree
• North China Electric Power
University, Beijing, China
• Florida International University,
Miami, Florida
Major: Electrical Engineering
Bachelor degree
• North China Electric Power
University, Beijing, China
Major: Electrical Engineering
Area Experience
• Visual C Relevant Course Work:
• Auto CAD
• MATLAB
• Multism
Business Tools: Microsoft Office Suite
(Excel, Word, Power Point)
Work Experience/Associations:
• North China Electric Power
University, Beijing, China
• Rapids Association
• Action Director
Relevant Course Work:
• Power Systems I, II.
• Control Systems
• Electronics II
• Communication Systems
• Solid State Device
84
XXII.BUDGET
This section will demonstrate the cost associated with bringing this project to
fruition. A detailed cost estimate was conducted and is demonstrated below. Our budget
will ensure that resources are used properly and efficiently. The first table, below,
displays labor and workspace cost. Based on our estimate, the total resources cost will be
$1500.
Aside from the labor and workspace, our estimate includes the cost of components,
hardware, electronics, and tools. Some examples of these include circuit boards, diodes,
key boards, Hand Soldering, etc. Based on our estimate, the total cost for components
will be $150.
When considered as a whole, the cost of resources and components needed for this
project’s completion sums to approximately $1800; this is demonstrated in the table
below.
Table 20 Gantt chart for budget
85
XXIII. RESULTS EVALUATION
In this section, we will focus on the results evaluation of end product. We already
accomplish most part of our product and it can work with most functions based on our
expected goal. But there are still some troubles we meet, this section will also state why
we don’t finish yet. There are also modular concepts provided to ensure results match
objectives, concepts, objectives, deliverables and specifications mentioned on the
proposal.
As described on the proposal, we are going to design an infrared remote control door
lock, this lock is a multi-functional lock and it can be stable mounting on the door. you
can open the lock with an infrared remote control or a password. At the same time, our
product is safe and easy to use. The design should not weigh more than 250 g (about 0.55
lbs.) so that we can make sure this is almost similar to even lighter than the weight of
products in the markets. The design should have size of about 15 cm length and 8 cm
width because this is the standard size so that it is easy for users to accept. The design
should read currents from 50 nA to 2 mA so that the energy consumption of sensor is
very low, and the product will work normally under extreme situation. The design should
cost around $80 as we consider it is a proper price which makes a balance between our
users and the costs based on the user survey and our ideas. As well as the design should
be made by stainless steel so that our product can be strong enough and will avoid being
damaged. In case of the Micro Controller, STC89c51 is the most widespread used SMC
and has superior adaptability and stability, so we used this SMC for our product. At the
same time, we used LCD for the screen. ATT24C02 was considered for Password
Storage.
We have analyzed the most relevant standards that will relate to the successful
implementation of our product and a detailed description of operating the standards in our
product and achieving the expected standard compliance. The standardization
organizations are aimed to formulate and accredit the standards. The most recognized
organizations in our professions are the Institute of Electrical and Electronic Engineers
(IEEE), National Institute of Standards and Technology (NIST), the American Society
for Testing and Materials (ASTM), Underwriters Laboratories (UL), American National
Standards Institute (ANSI) and International Organization for Standards (ISO). These
reputable companies earn the trust of the people because they assure the products to be
safe, reliable, and make sure the functions of the product according to the specifications
of the standards complied in the product.
In conclusion, we made a successful product which meet the excepted goal, and all
parts walk on time. We did our best to make our product have common standards and
good globalization. We believe our product will be accepted by the market.
86
XXIV. LIFE LONG LEARNING
When we made the decision to design an infrared remote control lock as our senior
design project, we knew we were doing a great job. We all know nothing is more
important than the Security of life and property, so our project are closely related to
people’s lives. We also understand that we should practice ourselves to adapt the fast
changing of market, and we are supposed to think about the requirement of the market
then adjusting our idea to meet them.
Actually in this project, we want to make a functional remote control door lock
because of the living examples happened to one member of our group. One of our team
members, Li, shared his experience with us that his house was stolen when he was young,
and it caused a lot of damage to the property. Li said that the thief easily opened the door
of his house. He hopes that there is a lock which is strong enough to protect people’s
house from being broken into. We come together with Li to design a lock and we believe
it can make contribution to the security of house.
We made a clear plan and schedule to implement our project, we will have a prefect
prototype in this semester, next semester we will work more and begin to design our final
product based on the prototype. Before next semester, we will have time to think about
our idea and do more research on it. At the same time we will try to find new technology
which can make our product stronger but will not increase the pressure of budget. We
should prepare for developing any new technology that are available to our product. It is
a chance to study new technique and participate in the creation.
All of our team know the importance of life-long learning. The work we finished now
is not the end, and the final product we will finish next semester will also not be the end.
We all know the most important thing for us is developing an agile mind and
extraordinary hands-on ability. We are confident that we will make a lot of progress after
we finish both of our design by the end of next semester. All hard working and new
knowledge we learned will benefit us a lot.
XXV. APPENDIX
A. Team contract
After discussion,our team member agree to follow the following conditions:
1. I agree to follow rules and guidelines that have been attained and established by the
team in a “majority of votes”decision.
87
2. I will demonstrate great interest to participate in class, share my ideas and discuss them
openly with other team members.
3. I am solely responsible for any assigned material by the team. I will submit my work
on time and in good shape.
4. In case of an unforeseen absence it is my responsibility to promptly contact my team
members and learn of any new material. An announced and anticipated absence is greatly
appreciated.
5. I am not allowed to abandon my team under any circumstances.6. The team holds the
right to release me after the third (3rd) warning (decided by majority of votes), I am
thereof entitled to file an appeal to the class professor and request arbitration.
7. My performance is regularly reviewed and openly shared by the team. In case of a
negative performance (decided by majority of votes) I will be issued a written warning.
8. Reason(s) to issue a warning may be but are not restricted by the following reasons:
a. Unable to submit an assignment on time.
b. Lack of team participation.
c. Obscene and improper conduct.
The signature of every team member:
________________________________________________________________________
Xuefeng Li Yiming Huo
Jing Xiao Shuo Qin
Xiaolun Zhang
B.Intellectual Property Contract
Criteria for inventor ship being used for the senior design team, is the same criteria
used in the US Case Law, Court Opinions & Decisions. This criteria states that an
Inventor of a product is any person associated with the invention and designing process.
This criteria will be distributed among all team members, as well as our mentor Dr.
Gustavo Roig, since he will provide intellectual guidance.
88
Criteria for declaration of Inventorship being used for the senior design team, consists
of a team member contributing a significant amount of intellectual work and ideas to the
invention and designing process. Our mentor Dr. Gustavo Roig will be acknowledged
with declaration of Inventorship through his intellectual input and mentoring.
The invention spokesman will be the inventor representative of the invention. All the
Co-Inventors will mutually decide who the Invention Spokesman will be for the
invention. If a mutual decision cannot be made among the Co-Inventors, the Team
Leader of the senior design team will act as the Invention Spokesman.
The mechanism for the intellectual property decision making process, will be
conducted by a team consensus and mutual agreement on what percentage of the
intellectual property is distributed individually among the Inventors. This will be based
on the amount of work and intellectual contribution provided by that respective
Inventor.
Profit that is generated during and after the project designing process, will be split
among Inventors equally. Each inventor gains 20% of the profit.
89
XXVI Senior Design II Procedures
Course Number: EEL 4920 Semester: Fall 2015
Reference Number: Faculty Name:
Senior Design I Instructor’s Name: Dr.Gustavo.Roig
Team Leader Name: Xuefeng Li PID:5462535
Major: Electrical Engineering Discipline/Specialization: Research and
Theory
Phone Number: (305)487-2663
Other Member Information:
Name
PID
Major(e.g. Electrical,
Computer, Civil)
Discipline / Area of
Specialization (e.g.
Communications,
Powers,
Transportation)
Yiming Huo 5596507 Electrical Engineering Research and Theory
Xiaolun Zhang 5577546 Electrical Engineering Assembling and
Testing
Shuo Qin 5576977 Electrical Engineering Programming
Jing Xiao 5577719 Electrical Engineering Programming
Proposed Project
A. Project Title: Infrared Remote Control Code Lock
B. Design Specifications(Please List items)
1.Dimensions: At most 20cm*15cm*6cm (L*W*H)
2.Weight: At most 500g
3.Power Supply: Battery
4.Micro Controller: STC89c51
5.Screen: LCD
6.Password Storage: AT24C02
7.Operating Environment Wet: 25%-55%
8.Operating Environment Temperature 20degree-40degree
9.Working Life: More than 10years
C. Design Constraints. (Marketing, Economic, Durability, Safety, Ethics, Culture, Patents)
90
1 The Lock must fit any door.
2 The price must under 100dollars.
3 The life time must longer than 5years.
D. Project Evaluation/Testing Criteria
1. When we do the test, the key must be linked correctly, admin password must be valuable, that is
mean when the user forgets password admin password can reset password.
2. When the password is entered correctly, the lock operating well.
3. Our locks need to work under different environments, different environments are normal hot
weather and cold weather.
E. Initial research results. Analysis and synthesis, procedures to be pursued. Evaluation of alternate
solutions.
At present, the parts we can determine are micro controller. Screen. Storage password. We have
different combinations for these three parts. Through concept development. We have the final result.
Because the efficiency of this combination is the highest. Is also the most suitable for our project. We
choose STC89c51 for micro controller. LCD for screen. AT24C02 for the password storage.
On this basis. We make the part of the connection. STC89c51 has the lock program inside. We will
first test the circuit board connection. If it runs well. We will carry out the physical connection. In the
future. We will install the lock on doors. Let our project have a real lock function.
F. Multi-Disciplinary Areas Involved in the Project
Our project mainly involved two subject areas. The Electrical engineering and Computer
Engineering. We are all Electrical engineering. But we can study the computer engineering knowledge
or find someone help us with the programing problems.
G. Team Assignments
Xuefeng Li: Research and Theory
Yiming Huo: Research and Theory
Xiaolun Zhang: Assembling and Testing
Shuo Qin: Programming and Connection
Jing Xiao: Programming and Connection
H. E-mail address and phone number and PID of ALL team members
Name PID Email Address Phone Number
Xuefeng Li 5462535 xli055@fiu.edu 305-487-2663
Yiming Huo 5596507 yhuo003@fiu.edu 786-303-7302
Xiaolun Zhang 5577546 xzhan063@fiu.edu 786-606-5380
Shuo Qin 5576977 qshuo001@fiu.edu 786-620-7867
Jing Xiao 5577719 xjing002@fiu.edu 786-606-6223
PRINT SIGNATURE DATE
Team Leader Xuefeng Li
Team Member Yiming Huo
Team Member Xiaolun Zhang
Team Member Shuo Qin
Team Member Jing Xiao
Senior Design I Coordinator
Mentor Dr.Gustavo.Roig
91
References
[1] Tarantola, Andre. “August Smart Lock Review: A Great Lock That Moves With
You.” Gizmodo. N.p., 14 Oct. 2014. Web. 04 Nov. 2015.
[2] Company, Lockstate. “RemoteLock 6i.” RemoteLock. Geeks News Desk, 22 Aug.
2015. Web. 04 Nov. 2015.
[3] Warehousedeals, Amazon. “ITouchless Bio-Matic Fingerprint Door Lock.” N.p., 19
July 2004. Web.
[4] “WORLD TRADE ORGANIZATION.” World Trade Organization. N.p.,n.d. Web.
29 Mar. 2015.
__MACOSX/._senior 模板-1
IEEE Communications Magazine • November 201524 0163-6804/15/$25.00 © 2015 IEEE
The authors are with
Florida International
University.
INTRODUCTION
The importance of senior design courses and
projects as a fundamental source for document-
ing the achievement of ABET’s student out-
comes [1] is widely recognized [2–4]. Some of
ABET’s indicated outcomes such as “(c) an abil-
ity to design a system, component, or process to
meet desired needs within realistic constraints
such as economic, environmental, social, politi-
cal, ethical, health and safety, manufacturability,
and sustainability”, and “(f) an understanding of
professional and ethical responsibility” [1], are
often used as standards to allow the use of senior
design courses as an assessment tool during
accreditation. We can safely say that instructors
entice their senior design students to illustrate
their understanding and fulfillment of the needs
expressed in outcomes (c) and (f) when writing
the final project reports.
At Florida International University’s Depart-
ment of Electrical and Computer Engineering
(FIU-ECE) we see senior design as a multi-
faceted experience that we often summarize as
“project management with an example.” The
example is represented by the students’ project
designs in compliance with ABET’s outcome (e):
“an ability to identify, formulate, and solve engi-
neering problems.” On the other hand, project
management is inspired by ABET’s outcomes (c)
and (f) described earlier, as well as outcomes (d)
and (g), which relate to communication and
team work [1]. Our senior design courses have
been certified by the Writing Across the Cur-
riculum (WAC) program and the Office of Glob-
al Learning Initiatives at FIU. With these, we
aim to teach our students minimization of the
barriers to trade and global success. In particu-
lar, we discuss topics related to the World Trade
Organization (WTO), international standardiza-
tion bodies, the International Electrotechnical
Commission (IEC), the International Organiza-
tion for Standardization (ISO), and the Interna-
tional Telecommunication Union (ITU). Our
Senior Design Experience is divided into two
semesters. During the first semester students
learn topics directly associated with ABET’s out-
comes and write a comprehensive project pro-
posal. During the second semester, students
execute the project design and write the final
report. There are several senior design projects
every semester related to wireless communica-
tions and networks.
At FIU-ECE we place great importance on
ethical considerations and societal impact in
s e n i o r d e s i g n p r o j e c t s , i n a l i g n m e n t w i t h
ABET’s outcomes (c) and (f). When dealing
with ethics in senior design, recent works [5–7]
use “The Code Model” for analyzing the code
of ethics for engineering societies and corpora-
tions. The problem with this approach is that
sometimes ethical codes do not address an ethi-
cal situation adequately, or do not address it at
all. For this reason, in addition to the codes of
ethics, we introduce the students to the process
of making decisions based on ethical theories:
“ T h e T h e o r y M o d e l . ” T h i s m o d e l p r o v i d e s
guidance in making ethical decisions when the
code model is not adequate. For the solution of
ABSTRACT
Wireless communications engineers may face
complex ethical dilemmas while designing prod-
ucts for consumers. At Florida International
University’s Electrical and Computer Engineer-
ing Department, we place great importance on
training our students to address such ethical
dilemmas, in alignment with ABET require-
ments. To this end, an ethical training frame-
work is integrated into our two-semester senior
design project course. In addition to the codes of
ethics, our students use “The Theory Model” to
make decisions based on ethical theories. For
the solution of ethical dilemmas by means of
ethical theories, they apply a modified version of
the line drawing method. In this article we briefly
explain the theories and methods that our stu-
dents consider when facing ethical dilemmas.
Then we present excerpts from four past senior
design projects related to wireless communica-
tions. We also summarize the methodology the
students use for identifying the best option to
address ethical dilemmas.
COMMUNICATIONS EDUCATION AND TRAINING
Wilmer Arellano, Ismail Guvenc, and Nezih Pala
Integration of Ethical Training into
Undergraduate Senior Design Projects on
Wireless Communications
ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 24
IEEE Communications Magazine • November 2015 25
ethical dilemmas by means of ethical theories,
we use a modified version of the line drawing
method presented in [8].
When preparing their project proposal and
the final report, our students show their under-
standing of IEEE’s code of ethics and further
reflect on some of its canons that particularly
relate to their project. In addition, our students
must perform a broad search and identify an
ethical issue that relates to the project, which in
the event that it happens, would not be ade-
quately analyzed by the code of ethics. Subse-
quently, the students are required to use ethical
theories based on the Theory Model. This leads
to interesting analysis of ethical issues by the
students, where ethical analysis is sometimes
highly hypothetical, but nevertheless it creates
awareness for the students that sometimes engi-
neers should step a little bit into philosophy.
The rest of this article is organized as follows.
The following section shows the elements that
our students consider when facing ethical dilem-
mas and societal impact while they are working
on their senior design projects. Then we present
excerpts from four past senior design projects
related to wireless communications, as examples
of the students’ ethical considerations. The fol-
lowing projects are selected to demonstrate the
results of our approach:
• uPark Assistant for vehicular ad-hoc net-
works
• GSM Relay Copter
• Copter Triangulation Locator
• Visible Light Communications
The final section concludes the article.
ETHICAL CONSIDERATIONS AND
SOCIETAL IMPACTS IN
SENIOR DESIGN PROJECTS
At FIU-ECE we consider that IEEE and its
code of ethics represent important guidelines for
both electrical and computer engineering majors.
In their project proposals and final reports, our
students must explicitly express that they are in
compliance with IEEE’s code of ethics, and
highlight those canons when describing the main
significance to their project. Students must find
a complex dilemma related to their project,
which cannot be adequately addressed by the
code. Subsequently, this complex dilemma has to
be resolved using the Theory Model.
Finding a complex ethical dilemma is not
always an easy task. In order to help the stu-
dents in this process, we suggest that the stu-
dents consider these possibilities:
• Projects that pose an ethical dilemma. To
illustrate this approach we analyze the case
of “Robot workers versus human workers”
[9]. In this example, the workers can be
negatively affected by losing their job to a
machine.
• Projects that help solve an ethical dilemma.
We illustrate this approach with the case of
“The Intelligent Wheel Chair” [10]. In this
example, the handicapped individuals are
positively impacted when an intelligent
wheel chair helps them obtain a job.
• Projects in which flaws in the design create
an ethical dilemma. We illustrate this
approach with “Silicon Valley Programmer
Indicted for Manslaughter” [11]. In this fic-
tional scenario, the harm caused by a faulty
design is shown.
From the many different ethical theories
available, we made a selection of four theories
that we believe have strong relation to engineer-
ing ethics. These theories are:
• Utilitarianism: The morally right action is
the one that generates the greatest benefit
(or least amount of harm) for the greatest
number of individuals.
• Ethical Egoism: The morally right action is
the one that safeguards and/or promotes your
own or your organization’s best interests.
• Kantian Ethics: The morally right action is
the one that is based on rules, obtained by
rationality, and will also be followed in sim-
ilar situations.
• Rights Ethics: The morally right action is
the one that respects society and the indi-
vidual’s rights.
The first two theories are called Consequen-
tialist, as the goodness of actions is based on the
consequence of those actions. The last two theo-
ries are referred to as Non-Consequentialist, and
they represent two faces of the same coin. Kan-
tian Ethics basically establishes that we have the
duty to perform the morally correct actions, but
at the same time, each duty is associated with
other people’s right. Our students use Kantian
and Rights Ethics in their analysis, as looking
from the opposite points of view of duty and
right helps in the analysis.
In [8] the author proposes a “line drawing
method” to solve ethical dilemmas. A line seg-
ment is drawn; the left end is associated with a
morally incorrect extreme, while the right end is
associated with a morally correct extreme. Sever-
al options are presented to solve the dilemma
and placed on the line according to their level of
goodness. An option that is better than the other
should be closer to the right. The solution would
be the option closest to the right end. The prob-
lem with this method would be that the options
could be placed on the line subjectively. To help
minimize this problem, we use a scoring system
where we chose the option with the highest
score. The score for each option is obtained by
summing up how well it satisfies the different
ethical theories. A score of 0 represents not sat-
isfying the theory, while a score of 1 represents
full satisfaction. Accepted score values are 0,
0.25, 0.50, 0.75, and 1.
We illustrate the method by presenting the
options and scores of one of the student’s exam-
ples that we present later. The team designing
the uPark Assistant [12], after selecting their
topic, found that privacy is an important issue
when designing VANET applications. Ignoring
the problem would be unethical while solving
the problem would prevent them from complet-
ing the project on time. In Table 1 we show the
options they presented, while in Table 2 we show
the scores they determined. Options 2 and 3
were highly egoistic and received very low scores.
The team chose Option 1 as their solution. This
option produced the greatest good, respected
At FIU-ECE we con-
sider that IEEE and
its code of ethics
represent important
guidelines for both
electrical and com-
puter engineering
majors. In their pro-
ject proposals and
final reports, our stu-
dents must explicitly
express that they are
in compliance with
IEEE code of ethics,
and highlight those
canons on main sig-
nificance to their
project.
ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 25
IEEE Communications Magazine • November 201526
people’s rights, and the score to become a rule
was 0.5. The score to become a rule was not per-
fect, because the solution would be available after
the product sold and not at acquisition time.
Students are also required to write an essay-
type sub-section on social impact. They need to
write about how the project will contribute to
local culture and global culture. In this section
they include data obtained using two instru-
ments: a survey they are required to create and
run, and international interviews they are
required to conduct. Both instruments gather
acceptance questions along with technical ques-
tions from potential users.
SAMPLE PROJECTS AND
ETHICAL COMPONENTS
In this section we will present four example
senior design projects related to wireless com-
munications and networks, which have been
recently carried out at FIU-ECE. We will also
discuss how the students have handled ethical
aspects of the projects.
PARK ASSISTANT
uPark Assistant is a VANET application intend-
ed to help drivers find parking spots efficiently.
In this system vehicles interact with a centralized
server in a parking lot/garage. Upon connection
and service acceptance, the system displays the
nearest vacant parking location, and based on
the GPS coordinates provided by the vehicle’s
onboard unit, directs the driver to the nearest
vacant location. Once parked, the system keeps
track of the vehicle’s position and length of stay.
Lastly, after the vehicle leaves the location, the
system will store the parking lot usage data and
update the database to make the spot vacant for
the next vehicle.
After some research and analysis, the stu-
dents became aware that privacy would be an
issue, since the communication with the vehicle
could provide information on the driver’s loca-
tion. The students analyzed the dilemma using
the theory model, and considering the following
options:
1. Inform users that a new feature will be
added to the design in order to prevent
access to this information.
2. Ignore the chances that the location track-
ing information can be misused;
3. Let the users know that this may happen,
but do not offer any help.
The resolution of the ethical dilemma, after
applying the method, was “1. Inform users that a
new feature will be added to the design in order
to prevent access to this information.” The
implementation was left for a hypothetical fea-
ture as this change would have exceeded the
allotted time to complete the project.
GSM RELAY COPTER
Wireless communications and network infra-
structure can be damaged during natural disas-
ters and terrorist attacks. For example, the 2011
Tsunami in Japan severely damaged the cellular
network infrastructure, which negatively affected
search and rescue operations, emergency com-
munic at ions , and c oor dinat ion am ong first
responders [13]. In this senior design project, the
students developed an unmanned aerial vehicle
(UAV) system based on a software defined radio
(SDR) platform (see Fig. 1), which can be rapid-
ly deployed for use in emergency communication
scenarios [14]. In particular, the UAVs can serve
as flying GSM base stations and provide cellular
network coverage to users within their vicinity.
The universal software radio peripheral (USRP)
equipment is used as the SDR equipment, and
they are controlled via Beagle Bone boards that
run OpenBTS software for implementing the
GSM technology.
After some research, the students identified
the following ethical and privacy related issues
related to the use of the developed technology:
• The t ec hnology c an b e ab used by those
savvy enough to use the device to disrupt
calls, push their own information onto a
network, or drop into private conversations.
The data that can be acquired by such
means is desired by those who commit fraud.
• The physical device can be hazardous to
those who are not cautious of the blades of
Table 1. Possible solutions.
Table 2. Possible solutions score.
Option # Description
1
Tell users a new feature will be added to the design in order to
prevent access to this information.
2
Ignore the chances that the location tracking information can be
misused.
3 Let the users know this may happen, but do not offer any help.
Theories
Option # Utilitarianism Egoism Rights Kantian Score
1 1.00 0.00 1.00 0.50 2.50
2 0.00 1.00 0.00 0.00 1.00
3 0.00 1.00 0.25 0.00 1.25
Figure 1. A senior design student at FIU, work-
ing on the GSM relay copter prototype [14].
ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 26
IEEE Communications Magazine • November 2015 27
the propellers, which move with sufficient
speed to injure an irresponsible operator.
• The batteries can combust if not properly
maintained and might burn users who are
not cautious while servicing the device.
The students came up with four options to
deal with the ethical issues:
1. Add a warning label about rogue users.
2. Restrict access to users by using a user code
or number.
3. Implement frequency hopping of data so
other parties cannot easily sniff data.
4. Issue user or code number and frequency
hopping.
After utilizing the scoring mechanism as in Table
3 for four different ethical theories, option 4
received the highest score, and students pro-
ceeded with this option.
The students also investigated the social
impacts of their project. For example, search
and rescue operations were identified as a major
application, in which their device can be used to
create communications in places where a person
is lost. As an example, they specified the Florida
Everglades, which is a dead spot for communica-
tion. By creating a private GSM network in the
Everglades, a stranded person can call for help.
Another interesting use case is for crashed
planes where a large area needs to be covered.
The GSM Network Copter can comb the area
and look for cell phones that are active. Once a
ce l l p hone is identified, the GSM Networ k
Copter can notify the search and rescue team of
the location.
COPTER TRIANGULATION LOCATOR
This project aimed to develop a low-cost, accu-
rate, efficient, and practical localization system
using a quadcopter and software defined radio
equipment such as USRPs. Such a product can
be utilized to help locate missing people in large
outdoor areas. By integrating different engineer-
ing concepts, i.e. a triangulation algorithm from
software engineering, analog and digital signal
processing, and wireless communication, the
final product is envisioned to be an inexpensive
deployment of triangulation techniques to be
used in search and rescue operations [13]. The
effectiveness of the system is validated using
appropriately selected test cases and verification
procedures. The design complements the exist-
ing localization methods by extending the oper-
ating scope into UAV based scenarios.
After some research, the students specified
an ethical problem as follows: one of the quad-
copters can go awry and decrease the accuracy
of the whole system based on statistical data
gathered. The students identified five ways to
deal with this problem:
• Deny the existence of the problem.
• There is deviation in the system, the cus-
t o mer is informed of it, but no help is
offered.
• A warning label says that the deviation
should not be used for certain applications.
• Recall notices are sent out, and all deviated
copters are replaced.
• Replacement copters are offered only if the
customer notices the problem.
Using the scoring system of the theory model, as
shown in Table 4, Option 4 received the highest
score, and was chosen as the resolution mechanism.
VISIBLE LIGHT COMMUNICATIONS
Recently, a rapid increase in the number of
mobile devices has pushed the radio frequency
(RF)-based wireless technologies to their limits.
This RF spectrum crunch has motivated the
research community to look for solutions and
alternative spectrum resources. A promising
approach is to use the optical spectrum bands to
complement the legacy RF technologies. The
concept, known as optical wireless communica-
tion (OWC) or free-space-optical communica-
tion (FSO), loads the directional optical beams
via non-negative modulation techniques and
demodulates the light beam on a passive receiv-
er, which is typically a photodetector (PD).
When the visible optical spectrum band is
used, OWC/FSO translates into a particular
f or m k nown as v is ib le light c ommunic at ion
( VLC) [ 15] . VLC is of int er es t par t ic ular ly
because its transmitters are light emitting diodes
(LEDs), which are also the same devices used
for solid-state lighting (SSL). The integration of
VLC into SSL modules presents a great oppor-
tunity for a range of applications beyond just
lighting and illumination. In this project the stu-
dents aimed to build a multi-transceiver VLC
access point in the form of a desk lamp using
off-the shelf components with a price tag of
$200. Along with all the technical, economic,
environmental, and social aspects of the project,
the students also discussed its ethical challenges.
Throughout their project the students fol-
lowed the IEEE Code of Ethics, which states “to
Table 3. Possible solutions score.
Theories
Option # Utilitarianism Egoism Rights Kantian Score
1 0 1 0 0 1
2 0.25 0.5 0.25 0.25 1.25
3 0.5 0.75 0.75 0.5 2.5
4 1 0.25 1 1 3.25
Table 4. Possible solutions score.
Theories
Option # Utilitarianism Egoism Rights Kantian Score
1 0 1 0 0 1
2 0 1 0.25 0 1.25
3 0.25 1 0.25 0.25 1.75
4 1 0 1 1 3
5 0.25 0.75 0.25 0.25 1.25
ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 27
IEEE Communications Magazine • November 201528
seek, accept and offer honest criticism of techni-
cal work, to acknowledge and correct errors, and
to credit properly the contributions of others.”
They made changes in the product according to
the feedback they received from various sources,
such as the surveys they conducted. The project
also requires compliance with the IEEE 802.15.7
standard, which provides a global standard for
short-range optical wireless communication
using the visible light spectrum. This standard
provides access to several hundred THz of unli-
censed spectrum, immunity to electromagnetic
interference and noninterference with RF sys-
tems, and additional security by allowing the
user to see the communication channel. It also
allows for communication augmenting and com-
plementing existing services from visible-light
infrastructures. The IEEE 802.15.7 standard
adheres to applicable eye safety regulations.
The ethical dilemma selected by the students
was the action against a hardware problem. To
use the Theory Model for assessing the ethical
choices, they first identified the possible actions.
The first option is to do nothing and deny that
the problem even exists. The second option
would be to tell consumers that there is a possi-
bility of existence of a problem. The third option
they came up with is to refund money to con-
sumers limited to a set time period after the dis-
covery of the problem. The fourth option is to
send a technical support employee to resolve the
problem. The last option they came up with is to
give consumers some sort of incentive such as a
coupon or gift card for future purchases of their
products.
If option 1 were chosen the consumers would
be enraged that nothing was being done, and as
a result they would lose business. Option 2 would
forewarn consumers that there may be a prob-
lem, so they would know ahead of the time.
However, consumers may still become enraged
and frustrated once the problem arises. Option 3
would show consumers that the manufacturer
cares about them and acknowledges that there
was a mistake and will make up for it. At the
same time the manufacturer would save money
by only refunding for a set time period. Option 4
would cost the manufacturer significant profit by
sending technical support to all our consumers,
and the consumers would most likely still be
angry that they have to wait for help to arrive.
Option 5 might make the consumers happier;
even though the manufacturer would not fix the
problem, they gave consumers discounts on
more products. This shows the customers that
the manufacturer did sympathize with them, and
it saves the company money at the same time.
As shown in Table 5, the students scored the
options according to the four ethical theories on
the ethical line diagram. They concluded that
the fifth option was the best due to the higher
score between the alternatives available through
all of the different ethical theories proposed.
The third option was also a very good option,
coming in second place, and it would most likely
make the consumers a lot happier if they went
with that option.
CONCLUDING REMARKS
In this article we discussed how we train our
undergraduate students at FIU-ECE to address
ethical dilemmas, via senior design projects. We
discussed four representative senior design pro-
ject examples in which students came up with a
hypothetical ethical dilemma, identified multiple
options to address the dilemma, and used a
methodological approach to choose the best
option. With emerging 5G wireless technologies,
wireless systems will be integrated into trillions
of connected Internet of Things (IoT) devices,
immersed into our daily lives. We will continue
evolving our ethical training framework at FIU-
ECE through senior design projects to address
ethical issues that may arise as a result of emerg-
ing applications and technologies.
ACKNOWLEDGMENT
The aut hor s would lik e t o t hank the senior
design students at FIU-ECE, who have worked
on the individual projects, namely: D. Guerra,
V. Ramos, M. Forest, C. Boza, and E. Fiallo
(uPark Assistant project); K. Guevara, M.
Rodriguez, N. Gallo, and G. Vellasco (GSM
Relay Copter project); R. Calderon, L. Perez, L.
Gu, and H. Liang (Copter Triangulation Locator
project); S. Asratyan, S. Coriolan, R. Gonzalez,
R. Luabeya Mafu, and M. Salazar (Visible Light
Communications project). This work was sup-
ported in part by NSF CNS-1453678, NSF AST-
1443999, and NSF CNS-1422062.
REFERENCES
[1] “Criteria for Accrediting Engineering Programs,
2015–2016|ABET;” available: http://www.abet.org/
accreditation/accreditation-criteria/criteria-for-accredit-
ing-engineering-programs-2015-2016/#objectives,
accessed: 02-Jul-2015.
[2] J. R. Goldberg, “Senior Design Capstone Courses and
ABET Outcomes,” IEEE Eng. Med. Biol. Mag., vol. 25,
no. 4, Jul. 2006, pp. 84–86.
[3] V. Wilczynski and A. C. Foley, “Designing a Capstone
Design Course to Achieve Student Outcomes,” Proc.
ASME Mechanical Engineering Congress and Exposition,
2014, pp. V005T05A026–V005T05A026.
[4] S. J. Stagg et al., “Incorporating Design into Undergrad-
uate Biomedical Engineering Curriculum,” Proc. ASEE
Gulf-Southwest Annual Conf., San Antonio, TX, 2015.
[5] C. L. Dym, P. Little, and E. J. Orwin, Engineering
Design: A Project-Based Introduction, 4th ed., New
York: Wiley, 2014.
[6] G. E. Dieter and L. C. Schmidt, Engineering Design, 5th
ed. New York: McGraw-Hill, 2013.
[7] H. Jack, Engineering Design, Planning, and Manage-
ment, Amsterdam; Boston: Elsevier/AP (Academic Press
is an imprint of Elsevier), 2013.
Table 5. Possible solutions score.
Theories
Option # Utilitarianism Egoism Rights Kantian Score
1 0 1.00 0 0 1.00
2 0 1.00 0.25 0 1.25
3 1.00 0.25 0.50 0.25 2.00
4 1.00 0 0.50 0.25 1.75
5 0.75 0.75 0.50 0.75 2.75
ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 28
IEEE Communications Magazine • November 2015 29
[8] C. B. Fleddermann, Engineering Ethics, 4th ed., Upper
Saddle River: Prentice Hall, 2012.
[9] “Ethical Issues Concerning Robots and Android
Humanoids Technology, Links999;” available: http://
www.links999.net/robotics/robots/robots_ethical.html;
accessed: 09-Jul-2015.
[10] “Choice: Ethical and Legal Rehabilitation Challenges;”
available: http://www.worksupport.com/documents/
proed9.html.htm, accessed: 09-Jul-2015.
[11] “Killer Robot,” available: https://ethics.csc.ncsu.edu/
risks/safety/killer_robot/, [Accessed: 10-Jul-2015].
[12] D. Guerra et al., “uPark Assistant,” Senior Design Pro-
ject, Florida International University, Miami, Fl., 2013.
[13] A. Merwaday and I. Guvenc, “UAV Assisted Heteroge-
neous Networks for Public Safety Communications,”
Proc. IEEE Wireless Communications and Networking
Conf. (WCNC) Workshops (WCNCW), Mar. 2015, New
Orleans, LA, pp. 329–34.
[14] K. Guevara et al., “UAV-Based GSM Network for Public
Safety Communications,” Proc. IEEE SoutheastCon, Apr.
2015, Fort Lauderdale, FL, pp. 1–2.
[15] A. Sahin et al., “Hybrid 3D Localization for Visible
Light Communication Systems,” submitted to IEEE J.
Lightwave Tech., May 2015.
BIOGRAPHIES
WILMER ARELLANO (arellano@fiu.edu) is a full time senior
instructor in the Department of Electrical and Computer
Engineering, Florida International University, Miami, Flori-
da. His research areas of interest include vehicular ad hoc
networks (VANETs) and swarm intelligence. He has
authored several publications on VANETs and a book chap-
ter on swarm intelligence. His M.S. and B.S. degrees are in
electronic engineering from Universidad Simon Bolivar, in
Caracas, Venezuela. He is a member of the IEEE and Tau
Beta Pi.
ISMAIL GUVENC (iguvenc@fiu.edu) received his Ph.D. degree
in electrical engineering from the University of South Flori-
da in 2006. He was a research engineer at DOCOMO Inno-
vations from 2006 to 2012. Since August 2012 he has
been an assistant professor at Florida International Univer-
sity. His recent research interests include heterogeneous
wireless networks and 5G wireless systems. He is a recipi-
ent of the 2014 Ralph E. Powe Junior Faculty Enhancement
Award and 2015 NSF CAREER Award.
NEZIH PALA (npala@fiu.edu) is an associate professor in the
Electrical and Computer Engineering Department at Florida
International University, Miami, FL. He received his Ph.D.
degree in electrical engineering from Rensselaer Polytechnic
Institute, Troy, NY in 2002. His research interests include
the design, fabrication and characterization of nanoscale
systems, electronic and optoelectronic devices for biologi-
cal and chemical sensing, energy harvesting and storage,
plasmonics, THz applications, free space optical communi-
cation, and visible light communication.
ARELLANO_LAYOUT.qxp_Author Layout 10/30/15 2:29 PM Page 29
<<
/ASCII85EncodePages false
/AllowTransparency false
/AutoPositionEPSFiles true
/AutoRotatePages /None
/Binding /Left
/CalGrayProfile (Dot Gain 20%)
/CalRGBProfile (sRGB IEC61966-2.1)
/CalCMYKProfile (U.S. Web Coated \050SWOP\051 v2)
/sRGBProfile (sRGB IEC61966-2.1)
/CannotEmbedFontPolicy /Error
/CompatibilityLevel 1.3
/CompressObjects /Off
/CompressPages true
/ConvertImagesToIndexed true
/PassThroughJPEGImages true
/CreateJobTicket true
/DefaultRenderingIntent /Default
/DetectBlends true
/DetectCurves 0.1000
/ColorConversionStrategy /LeaveColorUnchanged
/DoThumbnails false
/EmbedAllFonts true
/EmbedOpenType false
/ParseICCProfilesInComments true
/EmbedJobOptions true
/DSCReportingLevel 0
/EmitDSCWarnings false
/EndPage -1
/ImageMemory 1048576
/LockDistillerParams true
/MaxSubsetPct 100
/Optimize false
/OPM 1
/ParseDSCComments true
/ParseDSCCommentsForDocInfo true
/PreserveCopyPage false
/PreserveDICMYKValues true
/PreserveEPSInfo true
/PreserveFlatness false
/PreserveHalftoneInfo false
/PreserveOPIComments false
/PreserveOverprintSettings true
/StartPage 1
/SubsetFonts true
/TransferFunctionInfo /Apply
/UCRandBGInfo /Remove
/UsePrologue false
/ColorSettingsFile (None)
/AlwaysEmbed [ true
]
/NeverEmbed [ true
]
/AntiAliasColorImages false
/CropColorImages false
/ColorImageMinResolution 300
/ColorImageMinResolutionPolicy /OK
/DownsampleColorImages false
/ColorImageDownsampleType /Average
/ColorImageResolution 300
/ColorImageDepth -1
/ColorImageMinDownsampleDepth 1
/ColorImageDownsampleThreshold 1.50000
/EncodeColorImages true
/ColorImageFilter /DCTEncode
/AutoFilterColorImages true
/ColorImageAutoFilterStrategy /JPEG
/ColorACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/ColorImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/JPEG2000ColorACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/JPEG2000ColorImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/AntiAliasGrayImages false
/CropGrayImages false
/GrayImageMinResolution 300
/GrayImageMinResolutionPolicy /OK
/DownsampleGrayImages false
/GrayImageDownsampleType /Average
/GrayImageResolution 300
/GrayImageDepth -1
/GrayImageMinDownsampleDepth 2
/GrayImageDownsampleThreshold 1.50000
/EncodeGrayImages true
/GrayImageFilter /DCTEncode
/AutoFilterGrayImages true
/GrayImageAutoFilterStrategy /JPEG
/GrayACSImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/GrayImageDict <<
/QFactor 0.15
/HSamples [1 1 1 1] /VSamples [1 1 1 1]
>>
/JPEG2000GrayACSImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/JPEG2000GrayImageDict <<
/TileWidth 256
/TileHeight 256
/Quality 30
>>
/AntiAliasMonoImages false
/CropMonoImages false
/MonoImageMinResolution 1200
/MonoImageMinResolutionPolicy /OK
/DownsampleMonoImages false
/MonoImageDownsampleType /Average
/MonoImageResolution 1200
/MonoImageDepth -1
/MonoImageDownsampleThreshold 1.50000
/EncodeMonoImages true
/MonoImageFilter /CCITTFaxEncode
/MonoImageDict <<
/K -1
>>
/AllowPSXObjects false
/CheckCompliance [
/None
]
/PDFX1aCheck false
/PDFX3Check false
/PDFXCompliantPDFOnly false
/PDFXNoTrimBoxError true
/PDFXTrimBoxToMediaBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXSetBleedBoxToMediaBox true
/PDFXBleedBoxToTrimBoxOffset [
0.00000
0.00000
0.00000
0.00000
]
/PDFXOutputIntentProfile (None)
/PDFXOutputConditionIdentifier (CGATS TR 001)
/PDFXOutputCondition ()
/PDFXRegistryName (http://www.color.org)
/PDFXTrapped /False
/CreateJDFFile false
/Description <<
/CHS
/CHT
/DAN
/DEU
/ESP
/FRA
/ITA
/JPN
/KOR
/NLD (Gebruik deze instellingen om Adobe PDF-documenten te maken die zijn geoptimaliseerd voor prepress-afdrukken van hoge kwaliteit. De gemaakte PDF-documenten kunnen worden geopend met Acrobat en Adobe Reader 5.0 en hoger.)
/NOR
/PTB
/SUO
/SVE
/ENU (Cadmus settings for Acrobat Distiller 9)
>>
/Namespace [
(Adobe)
(Common)
(1.0)
]
/OtherNamespaces [
<<
/AsReaderSpreads false
/CropImagesToFrames true
/ErrorControl /WarnAndContinue
/FlattenerIgnoreSpreadOverrides false
/IncludeGuidesGrids false
/IncludeNonPrinting false
/IncludeSlug false
/Namespace [
(Adobe)
(InDesign)
(4.0)
]
/OmitPlacedBitmaps false
/OmitPlacedEPS false
/OmitPlacedPDF false
/SimulateOverprint /Legacy
>>
<<
/AddBleedMarks false
/AddColorBars false
/AddCropMarks false
/AddPageInfo false
/AddRegMarks false
/BleedOffset [
0
0
0
0
]
/ConvertColors /NoConversion
/DestinationProfileName (U.S. Web Coated \(SWOP\) v2)
/DestinationProfileSelector /UseName
/Downsample16BitImages true
/FlattenerPreset <<
/ClipComplexRegions true
/ConvertStrokesToOutlines false
/ConvertTextToOutlines false
/GradientResolution 300
/LineArtTextResolution 2400
/PresetName (Cadmus_Flattener_Presert)
/PresetSelector /UseName
/RasterVectorBalance 1
>>
/FormElements false
/GenerateStructure false
/IncludeBookmarks false
/IncludeHyperlinks false
/IncludeInteractive false
/IncludeLayers false
/IncludeProfiles true
/MarksOffset 6
/MarksWeight 0.250000
/MultimediaHandling /UseObjectSettings
/Namespace [
(Adobe)
(CreativeSuite)
(2.0)
]
/PDFXOutputIntentProfileSelector /UseName
/PageMarksFile /RomanDefault
/PreserveEditing true
/UntaggedCMYKHandling /LeaveUntagged
/UntaggedRGBHandling /LeaveUntagged
/UseDocumentBleed false
>>
<<
/AllowImageBreaks true
/AllowTableBreaks true
/ExpandPage false
/HonorBaseURL true
/HonorRolloverEffect false
/IgnoreHTMLPageBreaks false
/IncludeHeaderFooter false
/MarginOffset [
0
0
0
0
]
/MetadataAuthor ()
/MetadataKeywords ()
/MetadataSubject ()
/MetadataTitle ()
/MetricPageSize [
0
0
]
/MetricUnit /inch
/MobileCompatible 0
/Namespace [
(Adobe)
(GoLive)
(8.0)
]
/OpenZoomToHTMLFontSize false
/PageOrientation /Portrait
/RemoveBackground false
/ShrinkContent true
/TreatColorsAs /MainMonitorColors
/UseEmbeddedProfiles false
/UseHTMLTitleAsMetadata true
>>
]
>> setdistillerparams
<<
/HWResolution [2400 2400]
/PageSize [612.000 792.000]
>> setpagedevice
Concept Development and End Product Description
*
Concept Generation
*
Portable Audio Equalizer
Objectives
The system should have excellent sound quality.
The system should have easy equalization
The system should be of light weight
The system should be low cost
Constraints
The system must be portable
The system will be an add-on to existing MP3 player
*
Concept Fan
The Concept Fan is a way of discovering alternative approach’s to a problem when you have discarded all obvious solutions. It develops the principle of ‘taking a step back’ to get a broader viewpoint. Initially, the Concept Fan requires you to draw a circle in the middle of a large piece of paper. Write the problem you are trying to solve in the circle. To the right of it radiate lines representing possible solutions to the problem see the diagram below:
https://www.mycoted.com/Concept_Fan
*
Concept Fan
It is possible that the ideas you have come up with are impractical or do not really solve the problem. If this is the case, take a ‘step back’ for a broader analysis of the problem. Drawing a circle to the left of the first circle does this, writing the broader definition into this new circle and linking it with an arrow to show that it comes from the first circle, see diagram below:
Use this as a starting point to radiate out other ideas, if this does not give you an adequate amount of new ideas, you can take yet another step back (and another, and another…)
https://www.mycoted.com/Concept_Fan
*
Concept Fan
*
Sheet1
Audio Equalizer
Input Amplifier
Automatic Level control
ALC
Graphic Equalizer
Single Transistor + OPAMP
Dual OPAMP
Analog Logarithmic Amplifier
Microcontroller
+ variable Gain Amplifier
Active Filter
Digital Filter
Pasive Filter
Analog Filter
Sheet2
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Moderate Cost Fully Featured
Moderate to Implement Higher Signal to Noise ratio
Sheet3
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Moderate Cost Fully Featured
Moderate to Implement Low Signal to Noise ratio
Concept Combination Table
A concept Combination Table (also called morphology box) is a matrix of concept fragments organized by functions (each function forms a separate column) so that an integrated concept can be created by choosing any concept fragment for each function and combining them to complete the required functionality.
https://books.google.com/books?id=9ZjLBQAAQBAJ&pg=PA114&lpg=PA114&dq=concept+combination+table&source=bl&ots=ceBcnUUi7f&sig=PiCBZeHApgZDjgYV2EtcYDbuWeA&hl=en&sa=X&sqi=2&ved=0ahUKEwinsOeq4bTPAhVJmR4KHeO0D9kQ6AEIXDAM#v=onepage&q=concept%20combination%20table&f=false
*
Concept Combination Table
*
Sheet1
Audio Equalizer
Input Amplifier
Automatic Level control
ALC
Graphic Equalizer
Single Transistor + OPAMP
Dual OPAMP
Analog Logarithmic Amplifier
Microcontroller
+ variable Gain Amplifier
Active Filter
Digital Filter
Pasive Filter
Analog Filter
Sheet2
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Low Cost Not many features
Easy to Implement Low Signal to Noise ratio
Sheet3
Concept Combination Table
*
Sheet1
Audio Equalizer
Input Amplifier
Automatic Level control
ALC
Graphic Equalizer
Single Transistor + OPAMP
Dual OPAMP
Analog Logarithmic Amplifier
Microcontroller
+ variable Gain Amplifier
Active Filter
Digital Filter
Pasive Filter
Analog Filter
Sheet2
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Moderate Cost Low Signal to Noise ratio
Moderate complexity to Implement
Fully Featured
Sheet3
Concept Combination Table
*
Sheet1
Audio Equalizer
Input Amplifier
Automatic Level control
ALC
Graphic Equalizer
Single Transistor + OPAMP
Dual OPAMP
Analog Logarithmic Amplifier
Microcontroller
+ variable Gain Amplifier
Active Filter
Digital Filter
Pasive Filter
Analog Filter
Sheet2
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Moderate Cost Design Complexity
Fully Featured
Higher Signal to Noise ratio
Sheet3
Input Amplifier Automatic Level control ALC Graphic Equalizer
Single Transistor + OPAMP Analog Logarithmic Amplifier Active Filter
Dual OPAMP Microcontroller
+ variable Gain Amplifier Passive Filter
Digital Filter
Advantages Disadvantages
Moderate Cost Fully Featured
Moderate to Implement Low Signal to Noise ratio
Concept Selection
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 5
Low Cost 1/3 1/3 1/5 1
This table compares the relative importance of the objectives.
“Sound Quality is strongly more important than Easy Equalization”. (There is a 5 in this cell)
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.52
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 5.00 1.1362193665 0.23
Low Cost 0.33 0.33 0.20 1.00 0.3860973951 0.08
This table is used to determine the weights (importance) of the objectives Total 4.9924485625
Sheet2
Sheet3
Concept Selection
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 2
Low Cost 1/3 1/3 1/2 1
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19
Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10
Total 4.8592255762
w
Sound Quality. 0.53
Easy Equalization 0.18
Light Weight 0.19
Low Cost 0.10
Sheet2
Sheet3
Option 1 Option 2 Option 3 If a contraint is No
Constraints That Option must be Discarded
Must be Portable Yes Yes Yes
Add-on to existing MP3 P. Yes Yes Yes Select option with Highest Score
Objectives w
Sound Quality. 0.52 3.00 1.56 3 1.56 5 2.60 5 is Maximum
Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90
Light Weight 0.23 5.00 1.15 4 0.92 4 0.92
Low Cost 0.08 5.00 0.4 5 0.40 3 0.24
3.83 3.78 4.66
End Product Description
In this section you will describe:
The constituent modules and their interrelationships
The functionality of the product
The functionality of the different modules
Present the product specs
*
Black Box
In science, computing, and engineering, a black box is a device, system or object which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings. Its implementation is “opaque” (black). Almost anything might be referred to as a black box: a transistor, an algorithm, or the human brain.
https://en.wikipedia.org/wiki/Black_box
*
Block Diagram
A block diagram is a diagram of a system in which the principal parts or functions are represented by blocks connected by lines that show the relationships of the blocks. They are heavily used in engineering in hardware design, electronic design, software design, and process flow diagrams.
https://en.wikipedia.org/wiki/Block_diagram
http://www.hobbyprojects.com/block_diagrams/block_diagrams.html
*
Level 0 Equalizer Functionality
This is the product description without knowledge of the internal blocks (black box)
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 2
Low Cost 1/3 1/3 1/2 1
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19
Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10
Total 4.8592255762
w
Sound Quality. 0.53
Easy Equalization 0.18
Light Weight 0.19
Low Cost 0.10
Sheet2
Audio Input Signal Audio Equalizer
Equalizer Control Audio output Signal
Power
Module Audio Equalizer
Inputs – Audio input: 1V peak to peak
– Power 9 V DC
– Equalization Settings
Outputs Equalized Audio : 1V peak to peak
Functionality Equalize the input audio signal
to provide desired frequency content
Sheet3
Option 1 Option 2 Option 3 If a contraint is No
Constraints Yes Yes Yes That Option must be Discarded
Must be Portable Yes Yes Yes
Add-on to existing MP3 P. Yes Yes Yes
Objectives w
Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum
Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90
Light Weight 0.19 5.00 0.95 4 0.76 4 0.76
Low Cost 0.10 5.00 0.5 5 0.50 4 0.40
3.23 3.75 4.71
Level 1 Equalizer Functionality
This a general Description of the internal blocks
Only Pre-AMP table shown. Show a table for each block
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 2
Low Cost 1/3 1/3 1/2 1
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19
Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10
Total 4.8592255762
w
Sound Quality. 0.53
Easy Equalization 0.18
Light Weight 0.19
Low Cost 0.10
Sheet2
Audio Input Signal Audio Equalizer
Equalizer Control Audio output Signal
Power
Buffered Input Constant Amplitude Signal
Audio Input Equalized Signal
Power 9 V DC
Module Pre Amplifier
Inputs – Audio input: 1V peak to peak
– Regulated 5 VDC
Outputs Low impedance buffered output
Functionality – Provides high input impedance
– Provides low output impedance
DC DC converters required
Pre Amplifier
Automatic Level
control (ALC)
Digital Filter
Power Supply
Sheet3
Option 1 Option 2 Option 3 If a contraint is No
Constraints Yes Yes Yes That Option must be Discarded
Must be Portable Yes Yes Yes
Add-on to existing MP3 P. Yes Yes Yes
Objectives w
Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum
Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90
Light Weight 0.19 5.00 0.95 4 0.76 4 0.76
Low Cost 0.10 5.00 0.5 5 0.50 4 0.40
3.23 3.75 4.71
Level 2 Automatic Level
control (ALC)
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 2
Low Cost 1/3 1/3 1/2 1
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19
Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10
Total 4.8592255762
w
Sound Quality. 0.53
Easy Equalization 0.18
Light Weight 0.19
Low Cost 0.10
Sheet2
Audio Input Signal Audio Equalizer
Equalizer Control Audio output Signal
Power
Buffered Input Constant Amplitude Signal
Audio Input Equalized Signal
Power 120 VAC, 60Hz
Pre Amplifier
Automatic Lecel
control (ALC)
Digital Filter
Power Supply
Sheet4
DC Voltage input
Buffered Input Signal Constant Amplitude Signal
Gain Control Output Sample
Module Pre Amplifier
Inputs – Audio input: 1V peak to peak low impedance
– Regulated 5 VDC
– Feedback from Microcontroller
Outputs Constant peak value buffered audio signal
Each Block is described in detail DC Voltage input Functionality – Samples the module output
– Detects the peak values
– Adjusts the amplifier’s gain
Repeat as needed to explain all blocks in Level 1
Variable Gain
Amplifier
Microcontroller
Sheet3
Option 1 Option 2 Option 3 If a contraint is No
Constraints Yes Yes Yes That Option must be Discarded
Must be Portable Yes Yes Yes
Add-on to existing MP3 P. Yes Yes Yes
Objectives w
Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum
Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90
Light Weight 0.19 5.00 0.95 4 0.76 4 0.76
Low Cost 0.10 5.00 0.5 5 0.50 4 0.40
3.23 3.75 4.71
Embedded Systems Require additional Information
Functionality of embedded system requires different approach
*
Sheet1
0.4761904762
Sound Quality. Easy Equalization Light Weight Low Cost
Sound Quality. 1 5 3 3
Easy Equalization 1/5 1 1 3
Light Weight 1/3 1 1 2
Low Cost 1/3 1/3 1/2 1
1 = equal 3 = moderate 5 = strong 7 = very strong 9 = extreme
Sound Quality. Easy Equalization Light Weight Low Cost G. Mean w
Sound Quality. 1.00 5.00 3.00 3.00 2.5900200641 0.53
Easy Equalization 0.20 1.00 1.00 3.00 0.8801117368 0.18
Light Weight 0.33 1.00 1.00 2.00 0.9036020036 0.19
Low Cost 0.33 0.33 0.50 1.00 0.4854917717 0.10
Total 4.8592255762
w
Sound Quality. 0.53
Easy Equalization 0.18
Light Weight 0.19
Low Cost 0.10
Sheet2
Audio Input Signal Audio Equalizer
Equalizer Control Audio output Signal
Power
Buffered Input Constant Amplitude Signal
Audio Input Equalized Signal
Power 120 VAC, 60Hz
Pre Amplifier
Automatic Lecel
control (ALC)
Digital Filter
Power Supply
Sheet5
Module Microcontroller
Inputs – Audio output sample
– Regulated + 5 VDC
Outputs – Gain Control Signal
Functionality
Start
Sample Audio Output
Low Level?
Amplify Control
High Level?
Amplify Control
Attenuate Control
Yes
Yes
No
No
Sheet4
DC Voltage input
Buffered Input Signal Constant Amplitude Signal
DC Voltage input
Variable Gain
Amplifier
Microcontroller
Sheet3
Option 1 Option 2 Option 3 If a contraint is No
Constraints Yes Yes Yes That Option must be Discarded
Must be Portable Yes Yes Yes
Add-on to existing MP3 P. Yes Yes Yes
Objectives w
Sound Quality. 0.53 2.00 1.06 3 1.59 5 2.65 5 is Maximum
Easy Equalization 0.18 4.00 0.72 5 0.90 5 0.90
Light Weight 0.19 5.00 0.95 4 0.76 4 0.76
Low Cost 0.10 5.00 0.5 5 0.50 4 0.40
3.23 3.75 4.71
Continue until the next step is to place components
*
Conventions
Use buses (Thick lines) to represent several connecting lines that have common origin and destination
Terminate the bus with an arrow head at the destination
When information flow is bidirectional, place arrows at both ends of the bus
When possible indicate the number of lines
Conventions
At some level of detail all individual lines must show
Images from:
http://file.scirp.org/Html/1-6401302_42760.htm
and
https://en.wikipedia.org/wiki/Control_system
Remember, stop when the next step is placing components
In Summary
Describe diagrams in paragraphs with local functionality tables slides (11 to 14)
Repeat Functionality Tables
Put level 0 functionality in one table
Group all level 1 functionality tables in one table
Repeat for all levels
At the end of de section include the Technical Specs that you obtained before
*
Example
Diagrams and tables must be explained
Diagrams and tables must be explained
Diagrams and tables must be explained
Diagrams and tables must be explained, as in this case.
Diagrams and tables must be explained
Other Deliverables
Power Point Presentation
Final Report
User Manual
etc
*
Audio
Equalizer
Input
Amplifier
Automatic
Level
control
ALC
Graphic
Equalizer
Single
Transistor +
OPAMP
Dual OPAMP
Analog
Logarithmic
Amplifier
Microcontroller
+
variable
Gain Amplifie
r
Active Filter
Digital Filter
Pasive Filter
Analog
Filter
AdvantagesDisadvantages
Low CostNot many features
Easy to ImplementLow Signal to Noise ratio
Digital Filter
Graphic Equalizer
Single Transistor +
OPAMP
Dual OPAMP
Analog
Logarithmic
Microcontroller
+ variable Gain
Active Filter
Passive Filter
Input Amplifier
Automatic Level
control ALC
AdvantagesDisadvantages
Moderate CostLow Signal to Noise ratio
Moderate complexity to Implement
Fully Featured
Digital Filter
Graphic Equalizer
Single Transistor +
OPAMP
Dual OPAMP
Analog
Logarithmic
Microcontroller
+ variable Gain
Active Filter
Passive Filter
Input Amplifier
Automatic Level
control ALC
AdvantagesDisadvantages
Moderate CostDesign Complexity
Fully Featured
Higher Signal to Noise ratio
Digital Filter
Graphic Equalizer
Single Transistor +
OPAMP
Dual OPAMP
Analog
Logarithmic
Microcontroller
+ variable Gain
Active Filter
Passive Filter
Input Amplifier
Automatic Level
control ALC
Sound Quality.Easy EqualizationLight WeightLow Cost
Sound Quality.1533
Easy Equalization1/5113
Light Weight1/3115
Low Cost1/31/31/51
1 = equal3 = moderate5 = strong7 = very strong9 = extreme
Sound Quality.Easy EqualizationLight WeightLow CostG. Meanw
Sound Quality.1.005.003.003.002.590020.52
Easy Equalization0.201.001.003.000.8801120.18
Light Weight0.331.001.005.001.1362190.23
Low Cost0.330.330.201.000.3860970.08
Total4.992449
This table compares the relative importance of the objectives.
“Sound Quality is strongly more important than Easy Equalization”. (There is a 5 in this cell)
This table is used to determine the weights (importance) of the objectives
total
Mean
G
w
A
A
A
Mean
G
N
N
/
.
)
(
.
1
2
1
=
´
×
×
×
×
×
×
´
´
=
If a contraint is No
ConstraintsThat Option must be Discarded
Must be Portable
Add-on to existing MP3 P.Select option with Highest Score
Objectivesw
Sound Quality.0.523.001.5631.5652.605 is Maximum
Easy Equalization0.184.000.7250.9050.90
Light Weight0.235.001.1540.9240.92
Low Cost0.085.000.450.4030.24
3.833.784.66
Option 3
Yes
Yes
Option 2
Yes
Yes
Option 1
Yes
Yes
Audio Input Signal
Equalizer ControlAudio output Signal
Power
Module
Inputs
Outputs
Functionality
Audio Equalizer
Equalized Audio : 1V peak to peak
– Audio input: 1V peak to peak
– Power 9 V DC
– Equalization Settings
Equalize the input audio signal
to provide desired frequency content
Audio Equalizer
Buffered InputConstant Amplitude Signal
Audio InputEqualized Signal
ModulePre Amplifier
Inputs
Outputs
Functionality
DC DC converters required
Power 9 V DC
– Audio input: 1V peak to peak
– Regulated 5 VDC
– Provides high input impedance
– Provides low output impedance
Low impedance buffered output
Pre AmplifierAutomatic Levelcontrol (ALC)Digital FilterPower Supply
Buffered Input SignalConstant Amplitude Signal
Gain ControlOutput Sample
ModulePre Amplifier
Inputs
– Audio input: 1V peak to peak low impedance
– Regulated 5 VDC
– Feedback from Microcontroller
OutputsConstant peak value buffered audio signal
Each Block is described in detail
Functionality
– Samples the module output
– Detects the peak values
– Adjusts the amplifier’s gain
Repeat as needed to explain all blocks in Level 1
DC Voltage input
DC Voltage input
Variable GainAmplifierMicrocontroller
Module
Inputs
Outputs
Functionality
– Audio output sample
– Regulated + 5 VDC
– Gain Control Signal
Microcontroller
Start
Sample
Audio
Output
Low
Level?
Amplify Control
High
Level?
Attenuate Control
Yes
Yes
No
No
I. CONCEPT DEVELOPMENT
The objective of this section is to make a concept fan of all the possible options of
implementing this project. We will analyze all the different implementations of this project in
order to obtain an option which is viable and fits the needs of the client. It will need to meet our
objectives and constraints in the most efficient way, while taking our assumptions and limitations
into consideration. After analyzing all of the alternate options , we will construct a concept
selection table with a weighted average in order to select the best concept to follow.
The concept fan is a chart which shows all the different alternatives that we can choose from
to arrive at the same objectives. After analyzing the concept fan, we will use the weighted table
to determine which option proves to be the most viable. Figure 19 shows the concept fan chart,
which was derived through brainstorming and analysis of the objectives.
The chart in Figure I-1 first names our main objective which is to develop a telemetry band.
The second level of the cha rt shows the different parts that are needed in order to arrive at the
objective. Basically, we will need a user interface, transmitter, receiver, and control unit in order
to achieve our design objectives. Each of the parts has its own set of components t hat are needed
to fulfill that part. The user interface is the way in which the user will interact with the device.
The transmitter will be responsible for transmitting power to the receiver, which will possibly
demodulate the signal. The control unit will be used to control all of the various sensors and
components which will be used in the arm band.
Figure I-1. The Concept Fan Chart
In the following sections we will present and analyze alternate soluti ons and implementations
for the Telemetry Band. Once the best option is found, it components, inputs, outputs, and
functions will be analyzed.
low-power RFID, which in turn uses backscatter modulation. All of the processes will be
controlled by the ARM microcontroller, which introduces the advant age of compatibility with
C++, which most of our team is familiar with. The main advantages include direct control of the
arm band, low-power operation, and ease of programming due to familiarity with computer
programing.
a) Disadvantages
The disadvantage of using the computer as the user interface is that it limits the mobility of
the arm band by needing a bulky device in order to receive and read the measurements. Also, the
command-based user interface will require more complex programming. To modulate the power
signal with BPSK also introduces increased circuit complexity, more components, and greater
power consumption in the arm band. Using RFID will also require complex circuitry so that it
can use the existing SCMR antenna. This will also present increased cos t due to the need to have
a demodulator circuit in the receiver as well as an RFID transmitter.