design alternatives

design alternatives - O ur group used the 4-3-3 method We...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
Our group used the 4-3-3 method. We have 4 group members, and in each rotation we procured 3 concepts. We managed to get through 3 full rotations giving the total of the 4-3-3 method. INPUT: user input and energy OUTPUT: motion and sound Secondary Functions Read user input- The door mechanism needs to be able to differentiate between people who are authorized to enter the building and people who are not. With these different methods, the door mechanism will be able to determine who can enter the building. 1. Eye scanner- Requires no use of hands and is a method that could differentiate between authorized people and non-authorized people through different retinal scans. 2. Magnetic card- Not best alternative, although it is easier to use rather than having to swipe a card fully through a scanner. 3. Finger print- Allows the user to simply press one finger against the mechanism rather than having to procure his/her card from a pocket or bag. Allows for more simple entry into the building and provides unique authorization due to changes in everyone’s fingerprints. 4. Voice activation- This would be the most user friendly device to open a door but one of the hardest to implement due to background noise, similarities in many people’s voice level and pitch, and would need everyone’s pre recorded voice in the system before it could be used. 5. Smart “key”- A very practical approach to this problem, it would allow the user to open the door simply by just having his/her key in their pocket due to wireless communication between the smart “key” and the device mechanism of the door. Process user input – As stated previously, the device needs some mechanism that determines whether or not the user can enter the building. This requires some sort of program that will verify identification or deny identification of the user.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1. Computer program- A computer program would be the easiest device to use in this situation due to its speed and capability of reading information extremely fast and efficiently. Storing identification- In order for a device to determine whether or not a user can enter the building, it needs to have some way of cross referencing whether or not the user is in the system and is allowed to enter. This requires some sort of storage device that can hold the vast amount of information. 1. Hard drive- This device is very useful when trying to store hard information that a computer program can reference to. The only problem with a hard drive is that you would
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

Page1 / 6

design alternatives - O ur group used the 4-3-3 method We...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online