FINGERPRINT LOCK SYSTEM PROJECT MANAGEMENT PLAN Course: Project Management IE 408 Student Names: Mirza Jašarspahić Emin Ždralović Eldin Salkanović Fall 2020 Fingerprint Lock System VERSION HISTORY Version # 1.0 Implemented By Miirza Jašarspahić Emin Ždralović Eldin Salkanović Revision Date 14.12.2020. Approved By Approval Date Reason UP Template Version: 11/30/06 Page 1 of 20 Fingerprint Lock System Page 2 of 20 Fingerprint Lock System TABLE OF CONTENTS 1 INTRODUCTION....................................................................................................... 4 1.1 Purpose of Project Management Plan ............................................................ 4 2 EXECUTIVE SUMMARY OF PROJECT CHARTER ....................................................... 5 2.1 Assumptions/Constraints ............................................................................... 5 3 SCOPE MANAGEMENT ............................................................................................ 6 3.1 Product breakdown structure ........................................................................ 6 3.2 work breakdown structure ............................................................................. 7 4 SCHEDULE/TIME MANAGEMENT ............................................................................. 8 4.1 Milestones .................................................................................................... 8 4.2 Project Schedule and network diagrams ........................................................ 9 4.2.1 Dependencies .......................................................................................... 9 4.3 Gant chart .................................................................................................. 10 5 COST/BUDGET MANAGEMENT .............................................................................. 12 5.1 Resource plan ............................................................................................. 12 5.2 Budget plan ................................................................................................ 13 5.3 project crashing (time cost trade offs) .......................................................... 14 6 SUMMARY ............................................................................................................. 15 7 REFERENCES ........................................................................................................ 15 APPENDIX A: PROJECT MANAGEMENT PLAN APPROVAL.......................................... 16 APPENDIX B: REFERENCES ....................................................................................... 17 APPENDIX C: KEY TERMS ......................................................................................... 18 APPENDIX D: SUMMARY OF SPENDING .................................................................... 19 Page 3 of 20 Fingerprint Lock System 1 INTRODUCTION 1.1 PURPOSE OF PROJECT MANAGEMENT PLAN The intended audience of the Fingerprint Lock System PMP is all project stakeholders including the project sponsor, senior leadership and the project team. The main concept of this project is to grant authentic right of access to separate units in a corporation by reading the fingerprint of the employee uniquely. We remove the need to keep track of keys or recall a password or a PIN, by designing this project. The specific door lock can be unlocked only if there is an authorized person accessing it, as there are no keys that can be copied or stolen, or locks that can be lockpicked. The Project Plan of the Fingerprint Lock System would include a definition of the project, with the priorities and aims of the project and details of how the project is managed, implemented and monitored. Which comprises the general arrangements and processes for the project and management, schedules and strategies for preparing and tracking the project as it progresses. Our project, The Fingerprint Lock System, authenticates users from accessing unique premises. The project device would be useful for automatically granting access only to registered users. This guarantees protection and safety to an office, building or home, to whichever building the security is needed. In several locations, such as factories, offices, and colleges or even at our home, the products built here can be used as safe storage for drugs, jewelry, guns, papers, and other useful or potentially dangerous objects. Both of these, along with other high-level organizations, are considered partners in this initiative. National houses, police stations, hospitals and tribunals are the most significant. The high-level device to be shipped is a fingerprint reader/machine as well as a door safety lock. Additionally, the Plan will serve as an agreement between the following parties: Project Sponsors, Project Manager, Project Team, and other people associated with or affected by the project. Page 4 of 20 Fingerprint Lock System 2 EXECUTIVE SUMMARY OF PROJECT CHARTER This Fingerprint Lock System authenticates users from accessing specific premises. For secure sites, this device is useful for automatically granting access only to authorized users. This guarantees security and safety. In several locations, such as factories, offices, and schools or even at our home, the products developed here can be used as safe storage for medication, jewelry, firearms, papers, and other sensitive or potentially harmful objects. Both of these, along with other high-level organizations, are considered to be partners throughout this initiative. National facilities, police stations, hospitals and courts are the most significant. This project also has a number of supporters eager to take part in this venture, such as, FMUP, Sword Security, Securitas BH, General Engineering, since a lot of software and scripting is concealed behind this system to make it function as it is intended to, since many businesses wish to improve total security and support this concept. Items listed in the project charter, such as scope, risk management, time schedule, resource and budget plan, etc., are briefly described in further text and all required information is given. The device to be shipped is a fingerprint reader/machine as well as a door safety lock. 2.1 ASSUMPTIONS/CONSTRAINTS In planning the Project Plan, the following assumptions were made: • All participants in the project will comply with the requirements defined in this plan. • Management can ensure that members of the project team are present to fulfill project tasks and objectives as necessary. • Employees of the above-mentioned companies are willing to change business tactics to take advantage of the features provided by the new technology based on fingerprints. • The Municipality will ensure that there is a technical framework capable of running the new security system. • The sponsors and partners will assist in the implementation of the project plan and support it. • System incorrectness would result in additional testing, costing more resources and effort. • Inability to recognize improvements to the draft milestones would result in project delays within the period stated in the project timetable. • As new data and problems arise, the Project Plan could change. Page 5 of 20 Fingerprint Lock System 3 SCOPE MANAGEMENT Since the project requirements have been previously explained, as well as the purpose and aims, we will explain additional information regarding specific project phases and responsibilities in this part. The plan is organized by the Project Manager, whose responsibility is to gather client and potential consumer knowledge and expectations. The primary objective is to build devices for biometric authentication, mainly fingerprint-based. The key point is that there are two stages of development of the system: design and engineering. The first step is design, which is the responsibility of the Department of Design. As well as models, diagrams and illustrations of the finished product and how it will appear, they will have suggestions and visions. The core element of this device is the fingerprint sensor. It uses a biometric scanner for fingerprint recognition. This is the responsibility of the Department of Biometric Safety which consists of several people whose primary task is to build a sensor. This sensor utilizes various technologies and methods, such as optical and infrared technologies, micro-controller, a fingerprint module, alarm, switch, keypad, LCD monitor. These would be the main blocks of this project. Cooperation with the Engineering and Electronic Department would be required. Then, before we can distribute it to the clients, the final step is testing of the device. 3.1 PRODUCT BREAKDOWN STRUCTURE The product breakdown structure of the Fingerprint Lock System project is represented in the table below. There are resources that are required to accomplish this project's objectives. PBS has a few items categorized according to the project phase, as we can see in this table: Development and Design. Each of them has their own divisions that also have the necessary items required to complete the project. In the table, all those items are listed. Page 6 of 20 Fingerprint Lock System PRODUCT BREAKDOWN STRUCTURE DEVELOPMENT Engineering Biometric security Electronic DESIGN Testing Design Program Sensors LCD Remote Control Buttons Computer Microcontroller DC Motor Siren/Sound Metal Keypad Optical Reader Cables and Connectors Computer Interface Light Color Display Optical Light Wires Oscillators Relay Transistor 3.2 WORK BREAKDOWN STRUCTURE The following table represents the Fingerprint Lock System's work breakdown structure. This describes development that is mostly completed in several stages in order to accomplish the final goal of the project. As seen in the following table, according to the stages of development and design, WBS has several sections divided once again, as previous section did as well. In order to accomplish the objectives, each department has unique work to do. Each working phase has its own title and is numbered, as can be seen in table. Page 7 of 20 Fingerprint Lock System WBS DESIGN DEVELOPMENT 1.0 DESIGN 2.0 ENGINEERING 3.0 BIOMETRIC SECURITY 4.0 ELECTRONIC 5.0 TESTING 1.1 Plans and diagrams 2.1 Circuits 3.1 Integrating components 4.1 Microcontroller embedding 5.1 Creating test cases 1.2 Shape and size of the device 2.2 Executable code 3.2 Installing optical reader and light 4.2 Fingerprint module 5.2 Environment 1.3 Other details 2.3 Application 3.3 Checking functionality and safety 4.3 Making device 5.3 Final testing 1.4 Final look 2.4 Program 5.4 Final product 4 SCHEDULE/TIME MANAGEMENT 4.1 MILESTONES The table below lists the milestones for this project, along with their estimated completion timeframe. Milestones Project planned and authorized to proceed Equipment and material ready Program and code created Machine designed Device made Device tested Product delivered Estimated Completion Timeframe Two weeks after project concept is approved 5 days after approval One week after equipment is collected One week after program is finished Two weeks after program is done Day after device is made 5 days after testing is finished Page 8 of 20 Fingerprint Lock System 4.2 PROJECT SCHEDULE AND NETWORK DIAGRAMS The following illustration represents the project's Network Diagram. It is a visual depiction of tasks and dependencies. Tasks are represented by boxes or nodes and dependencies are shown as lines that link those boxes. There is also the phase number of the work listed in the WBS in each box. We can see that certain work can be done at the same time in this diagram, except for the regular dependencies. 4.2.1 Dependencies The following is the table of all project's operations along with their predecessors and successors. DEPENDENCIES ACTIVITY PREDECESSOR ACTIVITY PREDECESSOR 1.1 / 3.2 3.1 1.2 , 1.3 1.1 3.3 3.2 1.4 1.2 , 1.3 4.1 3.3 2.1 1.4 4.2 4.1 2.2 2.1 4.3 4.2 2.3 2.2 5.1 , 5.2 4.3 2.4 2.3 5.3 5.1 , 5.2 3.1 2.4 5.4 5.3 Page 9 of 20 Fingerprint Lock System GANT CHART 4.3 The following table shows the Gantt map of this project that shows the schedule of the project. The dependency relationship between events and current schedule status is also shown. Name Duration October November 1 Design 8 days 2 Plan and diagrams 3 days 3 Shape and size of device 1 day 4 Other details 2 day 5 Final look 2 days 6 Engineering 14 days 7 Circuts 3 days 8 Executable code 7 days 9 Application 3 days 10 Program 1 day 11 Biometric security 6 days 12 Integrating components 4 days 13 Installing optical reader and light 1 day 14 Checking functionality and safety 1 day 15 Electronic 8 days 16 Microcontroller embedding 1 day 17 Fingerprint module 2 days 18 Making device 5 days 19 Testing 10 days 20 Creating test cases 2 days 21 Environment 1 day 22 Final testing 5 days General Engineering 23 Final product 2 days General Engineering Sword Security Sword Security Sword Security Sword Security General Engineering General Engineering General Engineering General Engineering Securitas BH General Engineering Securitas BH General Engineering Securitas BH FMUP General Engineering FMUP Page 10 of 20 December Fingerprint Lock System Page 11 of 20 Fingerprint Lock System In the table, the tasks to be carried out are shown on the vertical axis and time periods on the horizontal axis . Additionally, the width of the horizontal bars represents the length of each operation. The start and end dates of all aspects of the project can also be found here. 5 COST/BUDGET MANAGEMENT 5.1 RESOURCE PLAN People, supplies and high-quality machines are the tools required to complete this project. There are multiple team members split into divisions when it comes to people, where each person has his/her own job and specialized equipment required to accomplish their given task. Supplies will be listed, and their cost will be calculated in this segment, so the income of individuals will be in the next section, the budget plan. RESOURCE PLAN Task Quantity Cost in KM CPU 1 200 200 Remote control 1 30 30 Siren 2 50 100 Transistor 1 200 200 Connectors 4 3 12 Cables 10 2 20 Oscillators 1 90 90 Wires 20 2 40 LCD 1 500 500 DC motor 1 650 650 Relay 2 80 160 Keypad 1 50 50 Display 1 100 100 Sensors 2 100 200 Optical light 1 300 300 Optical reader 1 400 400 Microcontroller 1 500 500 Total cost = 3,552 KM Page 12 of 20 Total cost in KM Fingerprint Lock System BUDGET PLAN 5.2 The following table illustrates the budget necessary to complete the project. However, only the budget required for employees is counted in this table, since the cost of equipment and materials was already explained in the previous section. BUDGET PLAN Position Department Expected Hourly working per wage month (KM) Cost per month (KM) No. of Total cost (KM) months Project manager Engineering 132h 30 3,960 3 11,880 Team member Engineering 100h 25 2,500 3 7,500 Team member Engineering 100h 25 2,500 3 7,500 Team member Biometric Security 90h 20 1,800 2 3,600 Team member Biometric Security 90h 20 1,800 2 3,600 Team member Electronics 90h 20 1,800 3 5,400 Team member Electronics 90h 20 1,800 3 5,400 Team member Design 30h 20 600 1 600 Total cost with 20% taxes = 54,576 KM Page 13 of 20 Fingerprint Lock System 5.3 PROJECT CRASHING (TIME COST TRADE OFFS) Project crash-time risk trade offs are seen in the table below. Each operation is seen in this table with the usual required time and cost, but also with the time and cost of the crash. TIME COST TRADE OFFS Activity Normal time Crash time Normal cost in KM Crash cost Total allowable crash time Crash cost per day in KM 1.1 – 1.2; 1.3 7 days 2 days 1000 650 5 days 60 1.2; 1.3 – 1.4 12 days 4 days 500 250 8 days 18 1.4 – 2.1 3 days 1 day 100 50 2 days 25 2.1 – 2.2 2 days 1 day 500 650 1 day 50 2.2 – 2.3 5 days 2 days 150 300 3 days 80 2.3 – 2.4 7 days 3 days 300 250 4 days 60 2.4 – 3.1 9 days 3 days 700 300 6 days 50 3.1 – 3.2 4 days 1 day 200 150 3 days 33 3.2 – 3.3 3 days 1 day 300 500 2 days 100 3.3 – 4.1 1 day 0 days 50 300 1 day 300 4.1 – 4.2 3 days 1 day 400 500 2 days 250 4.2 – 4.3 10 days 3 days 1200 1800 7 days 250 4.3 – 5.1: 5.2 15 days 5 days 3000 2900 10 days 290 5.1; 5.2 – 5.3 4 days 1 day 500 800 3 days 133 5.3 – 5.4 3 day 1 day 100 500 2 days 250 Total = 9,000 Total = 10,050 We can clearly see in the table that if any operation is performed in the ideal time, the usual cost is 9,000KM, but the thing is that if there is a crashing project that is not great, it will cost a lot more (1050KM). There are several concurrent tasks that need to be completed at the same time, however one of them is also probably to be finished and the other is not, which also contributes to project crashes. Page 14 of 20 Fingerprint Lock System 6 SUMMARY The Fingerprint Lock System project is intended to prevent organizational security threats because bio-metric scanners are known to be one of the best ways to lock or unlock any device or facility. The system makes it useful for protected locations to automatically give access only to authorized users, ensuring safety and protection. In several locations, such as factories, offices, and colleges or even at private properties, the product built here can be used for safekeeping medicine, jewelry, firearms, documents, and other private, important and potentially dangerous objects. Any detail of this product's design and production is clearly described and outlined in this project plan. Team members, along with their roles, budget as well as time taken to complete the tasks, are all numbered and listed. The project timetable, but also the project partners are all listed, and all relevant information is given. This project would have a positive effect on both those who wish to be safe and protected and have allowed access to their personal records and property, as well as important businesses and national organizations who will benefit greatly from it, as it decreases the risk of theft or damaging the valuable items. In the end, this strengthens security in general and, when it comes to tech, brings our country in line with others. 7 REFERENCES 1. Crime Scene Investigation: Methods and Procedures , Ian K. PepperOpen University Press, 2005 2. Do Fingerprints Lie? , Specter, MichaelThe New Yorker, Vol. 78, No. 13, May 27, 2002 3. How We Can Improve the Reliability of Fingerprint Identification , Cherry, Michael; Imwinkelried, EdwardJudicature, Vol. 90, No. 2, September/October 2006 4. Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept , Chaudhari, Atul S.; Patnaik, Girish K.; Patil, Sandip SInformatica Economica, Vol. 18, No. 1, January 1, 2014 5. Fingerprints and Admissibility: Friction Ridges and Science, Ashbaugh, David R.; Houck, Max MCanadian Journal of Police and Security Services, Vol. 3, No. 2, June 2005 6. Improved Fingerprint Acquisition, Hanson, DougLaw & Order, Vol. 54, No. 7, July 2006 Page 15 of 20 Fingerprint Lock System Appendix A: Project Management Plan Approval The undersigned acknowledge they have reviewed the Fingerprint Lock System Project Management Plan and agree with the approach it presents. Changes to this Project Management Plan will be coordinated with and approved by the undersigned or their designated representatives. Signature: Date: Print Name: Mirza Jašarspahić Title: Computer Engineer Role: Project Manager Signature: Date: Print Name: Emin Ždralović Title: Software Engineer Role: Biometric Engineer Signature: Date: Print Name: Eldin Salkanović Title: Machine Engineer Role: Electronics Manager Page 16 of 20 Fingerprint Lock System APPENDIX B: REFERENCES The following table summarizes the documents referenced in this document. Links: Document Name and Version Description Location Frontline. (2012). "The Real CSI." 17 April 2012. Web. 20 August 2018. The reliability of forensic science and how forensic evidence is presented in the courtroom; cases include the trial of Casey Anthony, the Madrid terrorist bombing and capital cases in Mississippi. https://www.youtube.com/watch? v=91GbKc0ijHU Acts adopted under the EO treaty. Retrieved 2010-0510. Acts adopted under title vi of the EU treaty on the stepping up of cross-border cooperation, particularly in combating terrorism and crossborder crime https://eurlex.europa.eu/LexUriServ/LexUriS erv.do?uri=OJ:L:2008:210:0001: 0011:EN:PDF "Fbi — Iafis". Fbi.gov. 199907-28. Archived from the original on 2012-09-21. The Integrated Automated Fingerprint Identification System from the FBI https://web.archive.org/web/2012 0921125141/http://www.fbi.gov/a boutus/cjis/fingerprints_biometrics/iafi s/iafis/ "FBI — Next Generation Identification". Fbi.gov. Retrieved 2013-04-19. FBI’s article on the present and the future of biometrics https://www.fbi.gov/services/cjis/fi ngerprints-and-otherbiometrics/ngi Nath, Dev & Ray, Saurav & Ghosh, Sumit. (2011). Fingerprint Recognition System : Design & Analysis. A comprehensive scoping of the fingerprint recognition problem and address its major design and implementation issues as well as give an insight into its future prospects. https://www.researchgate.net/pu blication/247773759_Fingerprint_ Recognition_System_Design_Ana lysis Page 17 of 20 Fingerprint Lock System APPENDIX C: KEY TERMS The following table provides definitions for terms relevant to this document. Term Definition Gantt Chart A bar chart that depicts a schedule of activities and milestones. Generally activities (which may be projects, operational activities, project activities, tasks, etc.) are listed along the left side of the chart and the time line along the top or bottom. Stakeholders The people or groups that have a vested interest in the outcome of the project. Risk A risk is defined as an uncertain event or condition that, if it occurs, has a positive or negative affect on a project's objectives. An uncertain event that may affect the performance objectives (i.e., cost, schedule, scope or quality) of an investment, usually negatively. Duration PMI PMBOK defines duration as the total number of work periods required completing a schedule activity or WBS component, usually expressed as work days or work weeks. Activity An activity is a term used by the SDN to distinguish a service that is provided by the SDN within a particular service that is being accessed by users. Milestone A significant point or event in the project. Page 18 of 20 Fingerprint Lock System APPENDIX D: SUMMARY OF SPENDING Budget Item Planning: PY-1 PY CY BY BY + 1 BY + 2 BY + 3 BY + 4 Total $ $ 10,00 15,00 $ 15,00 $ 10,00 $ 15,00 $ 30,00 $ $ 45,00 33,00 $85,00 $78,00 Budgetary Resources Outlays $ $ 20,00 30,00 $ 10,00 $ 20,00 $ 50,00 $ 40,00 $ $ 22,00 6,00 $102,00 $96,00 Total, sum of stages: Budgetary Resources Outlays $ $ 20,00 20,00 $ 40,00 $ 30,00 $ 20,00 $ 20,00 $ $ 5,00 12,00 $85,00 $82,00 $ $ 10,00 $ 20,00 5,00 $ 5,00 $ 10,00 $ 5,00 $ $ 8,00 3,00 $48,00 $18,00 $ 4,00 $ 7,00 $ 10,00 $ $ $ 20,00 15,00 10,00 $35,00 $29,00 $23,00 Budgetary Resources Outlays Development & Implementation of Project: Operations & Maintenance: Budgetary Resources Outlays Total, all stages: Budgetary Resources Outlays $ $ $ Government FTE cost 3,00 $ 2,00 $ 1,00 $ PY: Previous Year; CY: Current Year; BY: Budget Year Page 19 of 20 8,00 5,00 2,00