Uploaded by armin sehovic

IE408 Final Project Plan Fall-Fingerprint Lock System

advertisement
FINGERPRINT LOCK SYSTEM
PROJECT MANAGEMENT PLAN
Course: Project Management IE 408
Student Names:
Mirza Jašarspahić
Emin Ždralović
Eldin Salkanović
Fall 2020
Fingerprint Lock System
VERSION HISTORY
Version #
1.0
Implemented
By
Miirza Jašarspahić
Emin Ždralović
Eldin Salkanović
Revision
Date
14.12.2020.
Approved
By
Approval
Date
Reason
UP Template Version: 11/30/06
Page 1 of 20
Fingerprint Lock System
Page 2 of 20
Fingerprint Lock System
TABLE OF CONTENTS
1 INTRODUCTION....................................................................................................... 4
1.1
Purpose of Project Management Plan ............................................................ 4
2 EXECUTIVE SUMMARY OF PROJECT CHARTER ....................................................... 5
2.1
Assumptions/Constraints ............................................................................... 5
3 SCOPE MANAGEMENT ............................................................................................ 6
3.1
Product breakdown structure ........................................................................ 6
3.2
work breakdown structure ............................................................................. 7
4 SCHEDULE/TIME MANAGEMENT ............................................................................. 8
4.1
Milestones .................................................................................................... 8
4.2
Project Schedule and network diagrams ........................................................ 9
4.2.1 Dependencies .......................................................................................... 9
4.3
Gant chart .................................................................................................. 10
5 COST/BUDGET MANAGEMENT .............................................................................. 12
5.1
Resource plan ............................................................................................. 12
5.2
Budget plan ................................................................................................ 13
5.3
project crashing (time cost trade offs) .......................................................... 14
6 SUMMARY ............................................................................................................. 15
7 REFERENCES ........................................................................................................ 15
APPENDIX A: PROJECT MANAGEMENT PLAN APPROVAL.......................................... 16
APPENDIX B: REFERENCES ....................................................................................... 17
APPENDIX C: KEY TERMS ......................................................................................... 18
APPENDIX D: SUMMARY OF SPENDING .................................................................... 19
Page 3 of 20
Fingerprint Lock System
1 INTRODUCTION
1.1
PURPOSE OF PROJECT MANAGEMENT PLAN
The intended audience of the Fingerprint Lock System PMP is all project stakeholders
including the project sponsor, senior leadership and the project team.
The main concept of this project is to grant authentic right of access to separate units
in a corporation by reading the fingerprint of the employee uniquely. We remove the
need to keep track of keys or recall a password or a PIN, by designing this project. The
specific door lock can be unlocked only if there is an authorized person accessing it,
as there are no keys that can be copied or stolen, or locks that can be lockpicked.
The Project Plan of the Fingerprint Lock System would include a definition of the
project, with the priorities and aims of the project and details of how the project is
managed, implemented and monitored. Which comprises the general arrangements
and processes for the project and management, schedules and strategies for preparing
and tracking the project as it progresses.
Our project, The Fingerprint Lock System, authenticates users from accessing unique
premises. The project device would be useful for automatically granting access only to
registered users. This guarantees protection and safety to an office, building or home,
to whichever building the security is needed.
In several locations, such as factories, offices, and colleges or even at our home, the
products built here can be used as safe storage for drugs, jewelry, guns, papers, and
other useful or potentially dangerous objects. Both of these, along with other high-level
organizations, are considered partners in this initiative. National houses, police
stations, hospitals and tribunals are the most significant.
The high-level device to be shipped is a fingerprint reader/machine as well as a door
safety lock.
Additionally, the Plan will serve as an agreement between the following parties: Project
Sponsors, Project Manager, Project Team, and other people associated with or
affected by the project.
Page 4 of 20
Fingerprint Lock System
2 EXECUTIVE SUMMARY OF PROJECT CHARTER
This Fingerprint Lock System authenticates users from accessing specific premises.
For secure sites, this device is useful for automatically granting access only to
authorized users. This guarantees security and safety.
In several locations, such as factories, offices, and schools or even at our home, the
products developed here can be used as safe storage for medication, jewelry, firearms,
papers, and other sensitive or potentially harmful objects. Both of these, along with
other high-level organizations, are considered to be partners throughout this initiative.
National facilities, police stations, hospitals and courts are the most significant.
This project also has a number of supporters eager to take part in this venture, such
as, FMUP, Sword Security, Securitas BH, General Engineering, since a lot of software
and scripting is concealed behind this system to make it function as it is intended to,
since many businesses wish to improve total security and support this concept.
Items listed in the project charter, such as scope, risk management, time schedule,
resource and budget plan, etc., are briefly described in further text and all required
information is given.
The device to be shipped is a fingerprint reader/machine as well as a door safety lock.
2.1
ASSUMPTIONS/CONSTRAINTS
In planning the Project Plan, the following assumptions were made:
•
All participants in the project will comply with the requirements defined in this
plan.
•
Management can ensure that members of the project team are present to fulfill
project tasks and objectives as necessary.
•
Employees of the above-mentioned companies are willing to change business
tactics to take advantage of the features provided by the new technology based
on fingerprints.
•
The Municipality will ensure that there is a technical framework capable of
running the new security system.
•
The sponsors and partners will assist in the implementation of the project plan
and support it.
•
System incorrectness would result in additional testing, costing more resources
and effort.
•
Inability to recognize improvements to the draft milestones would result in
project delays within the period stated in the project timetable.
•
As new data and problems arise, the Project Plan could change.
Page 5 of 20
Fingerprint Lock System
3 SCOPE MANAGEMENT
Since the project requirements have been previously explained, as well as the purpose
and aims, we will explain additional information regarding specific project phases and
responsibilities in this part.
The plan is organized by the Project Manager, whose responsibility is to gather client
and potential consumer knowledge and expectations. The primary objective is to build
devices for biometric authentication, mainly fingerprint-based. The key point is that
there are two stages of development of the system: design and engineering.
The first step is design, which is the responsibility of the Department of Design. As well
as models, diagrams and illustrations of the finished product and how it will appear,
they will have suggestions and visions. The core element of this device is the fingerprint
sensor. It uses a biometric scanner for fingerprint recognition. This is the responsibility
of the Department of Biometric Safety which consists of several people whose primary
task is to build a sensor. This sensor utilizes various technologies and methods, such
as optical and infrared technologies, micro-controller, a fingerprint module, alarm,
switch, keypad, LCD monitor. These would be the main blocks of this project.
Cooperation with the Engineering and Electronic Department would be required. Then,
before we can distribute it to the clients, the final step is testing of the device.
3.1
PRODUCT BREAKDOWN STRUCTURE
The product breakdown structure of the Fingerprint Lock System project is represented
in the table below. There are resources that are required to accomplish this project's
objectives. PBS has a few items categorized according to the project phase, as we can
see in this table: Development and Design. Each of them has their own divisions that
also have the necessary items required to complete the project. In the table, all those
items are listed.
Page 6 of 20
Fingerprint Lock System
PRODUCT BREAKDOWN STRUCTURE
DEVELOPMENT
Engineering
Biometric security
Electronic
DESIGN
Testing
Design
Program
Sensors
LCD
Remote Control
Buttons
Computer
Microcontroller
DC Motor
Siren/Sound
Metal
Keypad
Optical Reader
Cables and Connectors
Computer Interface
Light Color
Display
Optical Light
Wires
Oscillators
Relay
Transistor
3.2
WORK BREAKDOWN STRUCTURE
The following table represents the Fingerprint Lock System's work breakdown
structure. This describes development that is mostly completed in several stages in
order to accomplish the final goal of the project.
As seen in the following table, according to the stages of development and design,
WBS has several sections divided once again, as previous section did as well. In order
to accomplish the objectives, each department has unique work to do. Each working
phase has its own title and is numbered, as can be seen in table.
Page 7 of 20
Fingerprint Lock System
WBS
DESIGN
DEVELOPMENT
1.0
DESIGN
2.0
ENGINEERING
3.0
BIOMETRIC SECURITY
4.0
ELECTRONIC
5.0
TESTING
1.1
Plans and diagrams
2.1 Circuits
3.1
Integrating components
4.1
Microcontroller
embedding
5.1
Creating test
cases
1.2
Shape and size of
the device
2.2
Executable
code
3.2
Installing optical reader
and light
4.2
Fingerprint module
5.2
Environment
1.3
Other details
2.3
Application
3.3
Checking functionality
and safety
4.3
Making device
5.3
Final testing
1.4
Final look
2.4
Program
5.4
Final product
4 SCHEDULE/TIME MANAGEMENT
4.1
MILESTONES
The table below lists the milestones for this project, along with their estimated
completion timeframe.
Milestones
Project planned and authorized to proceed
Equipment and material ready
Program and code created
Machine designed
Device made
Device tested
Product delivered
Estimated Completion Timeframe
Two weeks after project concept is approved
5 days after approval
One week after equipment is collected
One week after program is finished
Two weeks after program is done
Day after device is made
5 days after testing is finished
Page 8 of 20
Fingerprint Lock System
4.2
PROJECT SCHEDULE AND NETWORK DIAGRAMS
The following illustration represents the project's Network Diagram. It is a visual depiction of
tasks and dependencies. Tasks are represented by boxes or nodes and dependencies
are shown as lines that link those boxes.
There is also the phase number of the work listed in the WBS in each box. We can see that
certain work can be done at the same time in this diagram, except for the regular
dependencies.
4.2.1 Dependencies
The following is the table of all project's operations along with their predecessors and
successors.
DEPENDENCIES
ACTIVITY
PREDECESSOR
ACTIVITY
PREDECESSOR
1.1
/
3.2
3.1
1.2 , 1.3
1.1
3.3
3.2
1.4
1.2 , 1.3
4.1
3.3
2.1
1.4
4.2
4.1
2.2
2.1
4.3
4.2
2.3
2.2
5.1 , 5.2
4.3
2.4
2.3
5.3
5.1 , 5.2
3.1
2.4
5.4
5.3
Page 9 of 20
Fingerprint Lock System
GANT CHART
4.3
The following table shows the Gantt map of this project that shows the schedule of the
project. The dependency relationship between events and current schedule status is
also shown.
Name
Duration
October
November
1
Design
8 days
2
Plan and diagrams
3 days
3
Shape and size of device
1 day
4
Other details
2 day
5
Final look
2 days
6
Engineering
14 days
7
Circuts
3 days
8
Executable code
7 days
9
Application
3 days
10
Program
1 day
11
Biometric security
6 days
12
Integrating components
4 days
13
Installing optical reader and light
1 day
14
Checking functionality and safety
1 day
15
Electronic
8 days
16
Microcontroller embedding
1 day
17
Fingerprint module
2 days
18
Making device
5 days
19
Testing
10 days
20
Creating test cases
2 days
21
Environment
1 day
22
Final testing
5 days
General Engineering
23
Final product
2 days
General Engineering
Sword Security
Sword Security
Sword Security
Sword Security
General Engineering
General Engineering
General Engineering
General Engineering
Securitas BH
General Engineering
Securitas BH
General Engineering
Securitas BH
FMUP
General Engineering
FMUP
Page 10 of 20
December
Fingerprint Lock System
Page 11 of 20
Fingerprint Lock System
In the table, the tasks to be carried out are shown on the vertical axis and time periods on
the horizontal axis . Additionally, the width of the horizontal bars represents the length of
each operation. The start and end dates of all aspects of the project can also be found here.
5 COST/BUDGET MANAGEMENT
5.1
RESOURCE PLAN
People, supplies and high-quality machines are the tools required to complete this
project. There are multiple team members split into divisions when it comes to people,
where each person has his/her own job and specialized equipment required to
accomplish their given task. Supplies will be listed, and their cost will be calculated in
this segment, so the income of individuals will be in the next section, the budget plan.
RESOURCE PLAN
Task
Quantity
Cost in KM
CPU
1
200
200
Remote control
1
30
30
Siren
2
50
100
Transistor
1
200
200
Connectors
4
3
12
Cables
10
2
20
Oscillators
1
90
90
Wires
20
2
40
LCD
1
500
500
DC motor
1
650
650
Relay
2
80
160
Keypad
1
50
50
Display
1
100
100
Sensors
2
100
200
Optical light
1
300
300
Optical reader
1
400
400
Microcontroller
1
500
500
Total cost = 3,552 KM
Page 12 of 20
Total cost in KM
Fingerprint Lock System
BUDGET PLAN
5.2
The following table illustrates the budget necessary to complete the project. However,
only the budget required for employees is counted in this table, since the cost of
equipment and materials was already explained in the previous section.
BUDGET PLAN
Position
Department
Expected
Hourly
working per wage
month
(KM)
Cost
per
month
(KM)
No. of Total cost (KM)
months
Project
manager
Engineering
132h
30
3,960
3
11,880
Team member
Engineering
100h
25
2,500
3
7,500
Team member
Engineering
100h
25
2,500
3
7,500
Team member
Biometric
Security
90h
20
1,800
2
3,600
Team member
Biometric
Security
90h
20
1,800
2
3,600
Team member
Electronics
90h
20
1,800
3
5,400
Team member
Electronics
90h
20
1,800
3
5,400
Team member
Design
30h
20
600
1
600
Total cost with 20% taxes = 54,576 KM
Page 13 of 20
Fingerprint Lock System
5.3
PROJECT CRASHING (TIME COST TRADE OFFS)
Project crash-time risk trade offs are seen in the table below. Each operation is seen in
this table with the usual required time and cost, but also with the time and cost of the
crash.
TIME COST TRADE OFFS
Activity
Normal time
Crash
time
Normal
cost in KM
Crash cost
Total
allowable
crash time
Crash
cost
per day
in KM
1.1 – 1.2; 1.3
7 days
2 days
1000
650
5 days
60
1.2; 1.3 – 1.4
12 days
4 days
500
250
8 days
18
1.4 – 2.1
3 days
1 day
100
50
2 days
25
2.1 – 2.2
2 days
1 day
500
650
1 day
50
2.2 – 2.3
5 days
2 days
150
300
3 days
80
2.3 – 2.4
7 days
3 days
300
250
4 days
60
2.4 – 3.1
9 days
3 days
700
300
6 days
50
3.1 – 3.2
4 days
1 day
200
150
3 days
33
3.2 – 3.3
3 days
1 day
300
500
2 days
100
3.3 – 4.1
1 day
0 days
50
300
1 day
300
4.1 – 4.2
3 days
1 day
400
500
2 days
250
4.2 – 4.3
10 days
3 days
1200
1800
7 days
250
4.3 – 5.1: 5.2
15 days
5 days
3000
2900
10 days
290
5.1; 5.2 – 5.3
4 days
1 day
500
800
3 days
133
5.3 – 5.4
3 day
1 day
100
500
2 days
250
Total =
9,000
Total =
10,050
We can clearly see in the table that if any operation is performed in the ideal time, the
usual cost is 9,000KM, but the thing is that if there is a crashing project that is not great,
it will cost a lot more (1050KM). There are several concurrent tasks that need to be
completed at the same time, however one of them is also probably to be finished and
the other is not, which also contributes to project crashes.
Page 14 of 20
Fingerprint Lock System
6 SUMMARY
The Fingerprint Lock System project is intended to prevent organizational security
threats because bio-metric scanners are known to be one of the best ways to lock or
unlock any device or facility. The system makes it useful for protected locations to
automatically give access only to authorized users, ensuring safety and protection. In
several locations, such as factories, offices, and colleges or even at private properties,
the product built here can be used for safekeeping medicine, jewelry, firearms,
documents, and other private, important and potentially dangerous objects. Any detail
of this product's design and production is clearly described and outlined in this project
plan. Team members, along with their roles, budget as well as time taken to complete
the tasks, are all numbered and listed. The project timetable, but also the project
partners are all listed, and all relevant information is given. This project would have a
positive effect on both those who wish to be safe and protected and have allowed
access to their personal records and property, as well as important businesses and
national organizations who will benefit greatly from it, as it decreases the risk of theft or
damaging the valuable items. In the end, this strengthens security in general and, when
it comes to tech, brings our country in line with others.
7 REFERENCES
1. Crime Scene Investigation: Methods and Procedures , Ian K. PepperOpen University Press, 2005
2. Do Fingerprints Lie? , Specter, MichaelThe New Yorker, Vol. 78, No. 13, May 27, 2002
3. How We Can Improve the Reliability of Fingerprint Identification , Cherry, Michael; Imwinkelried,
EdwardJudicature, Vol. 90, No. 2, September/October 2006
4. Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept
, Chaudhari, Atul S.; Patnaik, Girish K.; Patil, Sandip SInformatica Economica, Vol. 18, No. 1, January
1, 2014
5. Fingerprints and Admissibility: Friction Ridges and Science, Ashbaugh, David R.; Houck, Max
MCanadian Journal of Police and Security Services, Vol. 3, No. 2, June 2005
6. Improved Fingerprint Acquisition, Hanson, DougLaw & Order, Vol. 54, No. 7, July 2006
Page 15 of 20
Fingerprint Lock System
Appendix A: Project Management Plan Approval
The undersigned acknowledge they have reviewed the Fingerprint Lock System Project
Management Plan and agree with the approach it presents. Changes to this Project
Management Plan will be coordinated with and approved by the undersigned or their
designated representatives.
Signature:
Date:
Print Name:
Mirza Jašarspahić
Title:
Computer Engineer
Role:
Project Manager
Signature:
Date:
Print Name:
Emin Ždralović
Title:
Software Engineer
Role:
Biometric Engineer
Signature:
Date:
Print Name:
Eldin Salkanović
Title:
Machine Engineer
Role:
Electronics Manager
Page 16 of 20
Fingerprint Lock System
APPENDIX B: REFERENCES
The following table summarizes the documents referenced in this document.
Links:
Document Name and
Version
Description
Location
Frontline. (2012). "The
Real CSI." 17 April 2012.
Web. 20 August 2018.
The reliability of forensic science and how
forensic evidence is presented in the
courtroom; cases include the trial of Casey
Anthony, the Madrid terrorist bombing and
capital cases in Mississippi.
https://www.youtube.com/watch?
v=91GbKc0ijHU
Acts adopted under the EO
treaty. Retrieved 2010-0510.
Acts adopted under title vi of the EU treaty on
the stepping up of cross-border cooperation,
particularly in combating terrorism and crossborder crime
https://eurlex.europa.eu/LexUriServ/LexUriS
erv.do?uri=OJ:L:2008:210:0001:
0011:EN:PDF
"Fbi — Iafis". Fbi.gov. 199907-28. Archived from the
original on 2012-09-21.
The Integrated Automated Fingerprint
Identification System from the FBI
https://web.archive.org/web/2012
0921125141/http://www.fbi.gov/a
boutus/cjis/fingerprints_biometrics/iafi
s/iafis/
"FBI — Next Generation
Identification". Fbi.gov.
Retrieved 2013-04-19.
FBI’s article on the present and the future of
biometrics
https://www.fbi.gov/services/cjis/fi
ngerprints-and-otherbiometrics/ngi
Nath, Dev & Ray, Saurav &
Ghosh, Sumit. (2011).
Fingerprint Recognition
System : Design &
Analysis.
A comprehensive scoping of the fingerprint
recognition problem and address its major
design and implementation issues as well as
give an insight into its future prospects.
https://www.researchgate.net/pu
blication/247773759_Fingerprint_
Recognition_System_Design_Ana
lysis
Page 17 of 20
Fingerprint Lock System
APPENDIX C: KEY TERMS
The following table provides definitions for terms relevant to this document.
Term
Definition
Gantt Chart
A bar chart that depicts a schedule of activities and milestones.
Generally activities (which may be projects, operational
activities, project activities, tasks, etc.) are listed along the left
side of the chart and the time line along the top or bottom.
Stakeholders
The people or groups that have a vested interest in the
outcome of the project.
Risk
A risk is defined as an uncertain event or condition that, if it
occurs, has a positive or negative affect on a project's
objectives. An uncertain event that may affect the performance
objectives (i.e., cost, schedule, scope or quality) of an
investment, usually negatively.
Duration
PMI PMBOK defines duration as the total number of work
periods required completing a schedule activity or WBS
component, usually expressed as work days or work weeks.
Activity
An activity is a term used by the SDN to distinguish a service
that is provided by the SDN within a particular service that is
being accessed by users.
Milestone
A significant point or event in the project.
Page 18 of 20
Fingerprint Lock System
APPENDIX D: SUMMARY OF SPENDING
Budget Item
Planning:
PY-1
PY
CY
BY
BY + 1
BY + 2
BY + 3
BY + 4
Total
$
$
10,00
15,00
$ 15,00
$ 10,00
$ 15,00
$ 30,00
$
$
45,00
33,00
$85,00
$78,00
Budgetary Resources
Outlays
$
$
20,00
30,00
$ 10,00
$ 20,00
$ 50,00
$ 40,00
$
$
22,00
6,00
$102,00
$96,00
Total, sum of stages:
Budgetary Resources
Outlays
$
$
20,00
20,00
$ 40,00
$ 30,00
$ 20,00
$ 20,00
$
$
5,00
12,00
$85,00
$82,00
$
$
10,00 $ 20,00
5,00 $ 5,00
$ 10,00
$ 5,00
$
$
8,00
3,00
$48,00
$18,00
$ 4,00
$ 7,00
$ 10,00
$
$
$
20,00
15,00
10,00
$35,00
$29,00
$23,00
Budgetary Resources
Outlays
Development &
Implementation of
Project:
Operations &
Maintenance:
Budgetary Resources
Outlays
Total, all stages:
Budgetary Resources
Outlays
$
$
$
Government FTE cost
3,00 $
2,00 $
1,00 $
PY: Previous Year; CY: Current Year; BY: Budget Year
Page 19 of 20
8,00
5,00
2,00
Download