Job Fair Pervasive Computing System Project Plan Project Team: Dec0912 Client: Iowa State University Faculty Adviser: Qiao, Daji, PhD Course Coordinator: Jason Boyd Team Members: Adam Lee Kartik Subbu Nicholas Oakman Gabriel Semonis REPORT DISCLAIMER NOTICE DISCLAIMER: This document was developed as a part of the requirements of an electrical and computer engineering course at Iowa State University, Ames, Iowa. This document does not constitute a professional engineering design or a professional land surveying document. Although the information is intended to be accurate, the associated students, faculty, and Iowa State University make no claims, promises, or guarantees about the accuracy, completeness, quality, or adequacy of the information. The user of this document shall ensure that any such use does not violate any laws with regard to professional licensing and certification requirements. This use includes any work resulting from this student-prepared document that is required to be under the responsible charge of a licensed engineer or surveyor. This document is copyrighted by the students who produced this document and the associated faculty advisors. No part may be reproduced without the written permission of the senior design course coordinator. Job Fair Pervasive Computing System, Group Dec0912 Page 1 Table of Contents 1 2 3 Tables Figures, and Definitions ............................................................................................................. 4 1.1 Tables ............................................................................................................................................ 4 1.2 Figures ........................................................................................................................................... 4 1.3 Definitions ..................................................................................................................................... 4 Introduction .......................................................................................................................................... 5 2.1 Problem Statement and Executive Summary ............................................................................... 5 2.2 Operating Environment ................................................................................................................ 5 2.3 Intended Users and Uses .............................................................................................................. 5 2.4 Assumptions .................................................................................................................................. 6 2.5 Limitations..................................................................................................................................... 6 2.6 Expected End Product ................................................................................................................... 6 Proposed Approach............................................................................................................................... 7 3.1 Concept Sketches .......................................................................................................................... 7 3.2 Functional Requirements of System ............................................................................................. 9 3.3 Constraints and Concerns ........................................................................................................... 10 3.3.1 Generalized Constraints and Concerns ............................................................................... 10 3.3.2 Specific Instances of Constraints......................................................................................... 10 3.3.3 Individual Constraint Scenarios........................................................................................... 11 3.4 Technology Concerns .................................................................................................................. 12 3.4.1 3.5 I/O Devices .......................................................................................................................... 12 Technical Approach ..................................................................................................................... 13 3.5.1 The V Model ........................................................................................................................ 13 3.5.2 Prototyping ......................................................................................................................... 13 3.6 Testing Requirements ................................................................................................................. 14 3.7 Security ....................................................................................................................................... 14 3.8 Safety .......................................................................................................................................... 14 3.9 Intellectual Property ................................................................................................................... 15 3.10 Commercialization ...................................................................................................................... 15 3.11 Risks and Risk Management ....................................................................................................... 15 Job Fair Pervasive Computing System, Group Dec0912 Page 2 3.11.1 Time Management .............................................................................................................. 15 3.11.2 Traceability/ Tracking Procedures ...................................................................................... 15 3.12 4 5 6 7 8 Milestones and Evaluation Criteria ............................................................................................. 17 Statement of Work.............................................................................................................................. 18 4.1 Problem ....................................................................................................................................... 18 4.2 Technology and Implementation Considerations ....................................................................... 18 4.3 End Product ................................................................................................................................. 18 4.3.1 Design.................................................................................................................................. 19 4.3.2 Implementation .................................................................................................................. 21 4.3.3 Testing ................................................................................................................................. 21 4.3.4 Documentation ................................................................................................................... 21 4.3.5 Demonstration .................................................................................................................... 21 Estimated Resources and Schedules ................................................................................................... 22 5.1 Personal Effort Requirement ...................................................................................................... 22 5.2 Estimated Resource Requirement and their Financial Requirements ........................................ 22 Schedules ............................................................................................................................................ 23 6.1 First Semester ............................................................................................................................. 23 6.2 Second Semester......................................................................................................................... 24 Closure Materials ................................................................................................................................ 25 7.1 Project Team Information ........................................................................................................... 25 7.2 Closing Summary......................................................................................................................... 26 References: ......................................................................................................................................... 26 Job Fair Pervasive Computing System, Group Dec0912 Page 3 1 Tables Figures, and Definitions 1.1 Tables Table 1 – Definitions ..................................................................................................................................... 4 Table 2 – System Requirements.................................................................................................................. 10 Table 3 – Examples of possible costs .......................................................................................................... 11 Table 4 – Testing Requirements.................................................................................................................. 14 Table 5 – Security Requirements ................................................................................................................ 14 Table 6 – Example evaluation ..................................................................................................................... 17 Table 7 – Personal Task Estimates .............................................................................................................. 22 Table 8 - Possible resources and services needed ...................................................................................... 22 Table 9 – Faculty advisor............................................................................................................................. 25 Table 10 – Team members.......................................................................................................................... 25 1.2 Figures Figure 1-Concept Sketch ............................................................................................................................... 7 Figure 2-Pre Check in and Check in Concept Scetch ..................................................................................... 8 Figure 3 – Employer booth check-in ............................................................................................................. 9 Figure 4 – Example of possible GUI for employer’s computers .................................................................. 12 Figure 5 – Testing model ............................................................................................................................. 13 Figure 6 – Screenshot of file repository ...................................................................................................... 16 Figure 7 – Rough sketch of product ............................................................................................................ 19 1.3 Definitions Table 1 – Definitions Term Algorithm CprE 489 Filter Greedy algorithm GUI ISU Card RFID USB Definition Sequence of finite instructions used for calculations and data processing Communication Networking Class at Iowa State University A method by which unwanted elements are removed from the selection process Algorithm that makes the locally optimum choice at each stage Graphical User Interface Iowa State University Student Card Radio Frequency Identification Device Universal Serial Bus Job Fair Pervasive Computing System, Group Dec0912 Page 4 2 Introduction 2.1 Problem Statement and Executive Summary Organizing a job fair is an important task for any university to provide opportunities for students to seek employment opportunities and also for the employers to recruit employees with right skill sets. The Iowa State Engineering Career Fair is the largest collegiate career fair in the entire country [1]. Given the magnitude of the event, ensuring that the event serves its purpose for both employers and students is of utmost importance. The job fair process becomes complex especially when the number of students and employers is very large. Students should be able to meet with the right set of employers, and viceversa. The Dec0912 project team will develop a pervasive computing system composed of embedded systems/software and wireless networking components. A system that will not only improve the coordination of the job fair but will also lead the prospective employers/ employees to have a more absorbing and fruitful experience. The team will develop a prototype demonstration application for solving the job-fair coordination problem. The proof-of-concept system will be designed to solve complex problems with multiple constraints like real-time deadline and connectivity. The goal is to design a pervasive computing system that can improve the efficiency of the job fair process, with the following objectives: (i) Maximize the chances of students meeting as many suitable employers as possible. (ii) Maximize the chances of employers meeting as many suitable students as possible. 2.2 Operating Environment The new pervasive computing system will be installed in Hilton Coliseum and Scheman Building, locations where the Engineering Career fairs are held every year at Iowa State University in Ames, IA. The centralized server’s database will be handling information of over 2000 students and over 250 employers. There will be a wireless network environment, where each laptop has access to the internet. 2.3 Intended Users and Uses Three types of users will utilize the system. The first type includes students and prospective employees whose information the central server holds primarily. The second types of users are the employers who come to ISU to recruit prospective employees. For these types of users, information can be made available if needed. The third types of users are the administrators of the servers and other people with special access to the data. These users can modify the settings and the functionalities of the system. Each type of user can use the system in a variety of ways. The varied uses also depend on what the team defines as the scope of the project. Under the current vision, these three users will have the following uses of the system: Job Fair Pervasive Computing System, Group Dec0912 Page 5 2.3.1 First type of users Query the system to list out potential employers to visit in an ordered preference based on different parameters like line length, employer needs and student preferences. By actively sending information to the server using a certain communication module, help the system make real-time decisions for other participants 2.3.2 Second type of users (Optional) Query the system to find out how many potential employees visited them over the entire course of the career fair. (Optional) View potential employee resumes and help reduce paper clutter by taking down electronic notes on the resume and save it for later reference. 2.3.2 Third type of users 2.4 Troubleshooting tasks involving the centralized server, the database and potential problems with the front-end aspect of the system hierarchy. Update and modify system functionalities as the required needs/demands of the system change over the course of time. Assumptions Mentioned below are some of the assumptions incorporated in designing the system 2.5 No more than 300 employers and 2000 students will be present at any point in time at the career fair. Wireless Internet connectivity will be provided throughout the career fair. All employers will bring along with them their laptops. Employer laptops have USB capability All students will get their ISU cards/remember their Student ID numbers Limitations The system has some limitations which must be considered when designing it. The system must implement most, if not all features as mentioned in the problem statement. The user interface (front end) needs to be compact and easy to use. The system must allow for different functionalities for the different types of users. The centralized server must have a back-up if it crashes or malfunctions at all. 2.6 Expected End Product The expected end products for the project will be a functional pervasive system with all necessary hardware and software components along with their interfaces, something that both potential employers and students can use. Job Fair Pervasive Computing System, Group Dec0912 Page 6 3 Proposed Approach To develop the system to meet the needs of Iowa State and the realistic needs of those that would eventually use the system, team Dec0912 developed a list of functional requirements. These are broken down from the very general system requirements to those of the individual sub-systems and components. As for the system, the most fundamental functional requirement is that it shall be set up in such a way that students may use it in order to save time. Later the project plan will describe a timeline for acquiring materials and programming functionality into the system. In approaching the project our report will cover the functional requirements, constraints and concerns, and the technical approach. 3.1 Concept Sketches Figure 1-Concept Sketch Figure 1 describes how the system will look at the career fair. A student will check in, receive a card after being verified by the server. That card will be matched to his user profile on the database and he can then swipe at employer booths which will then query his information on the database. To receive where the student should go next he can swipe at terminals which will print off a list of where to go next. There are other methods to receive that data that have not been shown in the figure. Job Fair Pervasive Computing System, Group Dec0912 Page 7 Figure 2-Pre Check in and Check in Concept Scetch Figure 2 describes how the pre check in and check in processes will look according to the end-user. Job Fair Pervasive Computing System, Group Dec0912 Page 8 Figure 3 – Employer booth check-in Figure 3 describes how the booth check-in works from the end-user perspective. 3.2 Functional Requirements of System In order to complete the project, team Dec0912 is employing a commonly used methodology of utilizing system requirements to gauge how well they are meeting the project demands. The most basic and general system requirements are presented below, and a table is given. The system design will employ multiple input devices to best determine which booth a student should visit next. The next visit decision shall use a best fit matching algorithm that takes into consideration number of students at each both and each student’s established criteria. There will be an interface put up that will allow user input of his/her filters and information for use by the system. There will be a check-in kiosk in which a user is assigned an input device. There shall be a way for which the user will receive his next destination. There shall be a mechanism which will check-out a user with minimal interference to the employer or the student. Job Fair Pervasive Computing System, Group Dec0912 Page 9 Table 2 – System Requirements Requirement System Requirement 1 System Requirement 2 System Requirement 3 System Requirement 4 System Requirement 5 System Requirement 6 3.3 Statement The system shall employ multiple input devices to best determine which booth a student should visit next. The next visit decision shall utilize a greedy algorithm that takes into account the number of visiting students at each booth and criteria based on student or employer pre-set filters. There will be an interface that allows user input of relevant information. There shall be a check-in kiosk where users can get their unique input device. There shall be a way in which the user will retrieve his next destination information. There shall be a way for a user to be checked out of an individual employer booth. Constraints and Concerns 3.3.1 Generalized Constraints and Concerns In general, team Dec0912 is worried about the complexity of the project and how they can implement it in a secure and realizable fashion. The system being designed for the indoors makes planning a bit easier, as they do not have to worry about adequate power, connectivity, and integrity of the system against outside effects. Cost is a major constraint and concern, and the team has already run into barriers regarding access rights and has been lectured on privacy concerns. The usefulness of the endproduct has also been under question, and whether or not the system will be non-disruptive has come up. The product must provide more utility than it takes away, and this is the goal when it comes to the project in general. 3.3.2 3.3.2.1 Specific Instances of Constraints Access Rights In order to effectively use something, one must have rights to do so. The team has not been given permission to use the ISU card in any way, so the team tried to get the said permission, but was unsuccessful in doing so. 3.3.2.2 Cost Cost is a major factor in our project. According to our tentative plans, the team is going to be installing sensors or readers at each employer booth. This eliminates some of the more expensive options such as certain RFID readers. The team is trying to find existing resources to use in our project, and is looking into other alternatives such as using bar-codes or manual user input. A few examples of initial costs that would be incurred using different implementations of our project: Job Fair Pervasive Computing System, Group Dec0912 Page 10 Table 3 – Examples of possible costs RFID Scanners $80 Each; $24,000 if 300 employer booths Magnetic Card Readers $70 Each $21,000 if 300 employer booths Passive RFID tags $.50 Each; $5000 if 10,000 unique visitors Terminals $500* Each $2000 for 4 terminals on each corner of coliseum NOTE: These are initial costs, and will decrease after reusing system *Note that much of this equipment may already be owned by Iowa State and free to use. 3.3.2.3 Effectiveness This project should help people in saving time and energy, and if the project itself is not effective then spending the time and money to develop the system would be a waste. Since the ISU Career fair is the nation’s largest collegiate indoor career fair [1] and is held twice a year, this would be the best place to start this system to benefit the most people. 3.3.2.4 Non-Disruptiveness The system should not be disruptive, or cause too much effort to be put forth on the user’s side. Examples of disruptive behavior would be if text messages are sent too often by the system, checking in becomes a hassle, or installing the software on employer laptops is disruptive. 3.3.3 Individual Constraint Scenarios 3.3.3.1 The ISU Card Debacle While planning out the project, the team came up with a variety of options in how to implement the system. However, many constraints were found. Chiefly among them were policy and security related, as the group was not able to utilize the ISU Card system already set up based on both intellectual property concerns and privacy and security concerns. The group found through meeting with a former adviser Roger Bentley that although the card system is already well established and can provide the information needed to simplify the task if it was feasible, it was not up to him or ISU but a corporate entity that manages the ISU card system. Furthermore, ISU would not allow this to be done anyways based on privacy and security issues that come with having access to ISU card data. 3.3.3.2 The Ranged RFID Cost Concern One of the options the team came across was the hassle-free crowd detection feature, where sensing how crowded each part of the coliseum was based on how many cards were detected within specific ranges on an array of active RFID reader/scanners. This turned up too costly, however, and also the issue of interference and complexity came up. Job Fair Pervasive Computing System, Group Dec0912 Page 11 3.4 Technology Concerns 3.4.1 3.4.1.1 I/O Devices The Input Devices The input device that the group will use in the project has by far been our biggest quandary. The group has gone through five options, the ISU card, RFID cards, text messaging, local terminals, and a web interface. Of the five options we have decided to utilize at least one of them, the RFID card. 3.4.1.2 The Output Devices As for how we will output the data, the team has also come up with quite a lot devices including: printers, text messaging, web interface, and terminal display. Of these the team is leaning towards utilizing all of them. As for the employer application, the team also needs to figure out what operating systems should be supported and in what language. Below is a sample display of how non-interfering the employer application would be: 3.4.1.3 The Employer’s Program In all implementation schemes an employer must utilize a program to access information related to each student’s input device. Most likely each employer will need to install a program on their computer to process and interact with the system and input device, and pull data from the information server. A simple yet functional user interface is required [see Fig 1]. Employer operating system must also be dealt with, as one operating system may process input differently and not handle certain types of programs. Also memory and space requirements must be considered. As the program is planned to be very small it should not be a big problem in terms of memory space or processor consumption. See figure 1 for a rough estimate of the user GUI. Figure 4 – Example of possible GUI for employer’s computers Job Fair Pervasive Computing System, Group Dec0912 Page 12 3.5 Technical Approach 3.5.1 The V Model As project is developed, the group is mindful of the risks of getting behind. To minimize this risk our approach will be based on first a logical sequence and then on the V model because it allows us to plan for testing beforehand while following the basics of the waterfall model. This model will be used in code development and can also be used to describe our project development in general. Acceptance Testing Requirements Analysis Architecture Design Design Test System Design Module Design System Testing Integration Testing Unit Testing Coding Figure 5 – Testing model The use of this model ensures testing at each stage of development as well as a logical sequence for us to follow. This semester the group will cover the left hand side of the V model including designing tests for the system components and levels. 3.5.2 Prototyping Before physically implementing the system, a prototype will be constructed without the input devices, and will test the back-end server and the client programs. In this case the team will simulate users by manually typing identification keys and testing the next visit algorithm and interface look and feel. Registration System Prototype The registration system may be prototyped and deployed as a separate component which can be tested locally before being deployed and integrated. Check-In System Simulation Simulated check-ins without the corresponding I/O Device Testing Test the basic functionality and behaviors of the devices separately, and report on their characteristics. Job Fair Pervasive Computing System, Group Dec0912 Page 13 3.6 Testing Requirements Table 4 – Testing Requirements TR1 (requirements) TR2 (system) TR3(architecture) TR4(code 3.7 The project itself will be graded by the faculty advisor Daji Qiao, the final project will be tested by him for requirement correctness. The prototype system shall be tested by a variety of users and under boundary conditions and nonsequester events. The system including hardware and software will be tested. Individual software components will be tested as a group. Each function should be unit tested, and modules of code will also be tested. (For example J Unit Testing may be employed for java code.) Security Security is obviously a major point in any application. Data security is what the group is primarily concerned with, and in order to ensure this a set of security requirements have been created: Table 5 – Security Requirements Sec1(data protection) TR2 (communication protection) 3.8 The system should be programmed in such a way that any non-authorized users cannot access secure information. (This can be achieved through a combination of protecting variables and limiting available functions based on user type.) The data transmitted across any medium must be secure, especially on wireless unencrypted communications. (To do this a scheme of sending a Spartan amount of information will be imposed and if it needs to be secure it will be encrypted.) Safety As the system does not utilize any major moving parts, anything sharp, or any level of frequency that has been found to be dangerous, the group has less of a task of rigorous testing in the area of safety. Of course the electric RFID readers should be away from water and perhaps a sign mentioning not to spill anything on the readers or laptops should be displayed. In any case, safety will be properly documented, and tests will be done if necessary to determine the distinctions between the system safety precautions and those of its individual components. A few other issues that came up in this regard: Job Fair Pervasive Computing System, Group Dec0912 Page 14 3.9 Intellectual Property As the system utilizes existing technology at the device level, it is hard to imagine any intellectual property concerns that will come up. Also, as this is not a commercial product and is for a public university, any intellectual property that is created through this project will be in the hands of the University when finished. As for the code in the project, the team is planning on using open-source code or making new code. From what the group has discussed, there will be a learning curve on the clientserver code as only 1 of us has finished Cpre489. 3.10 Commercialization One can think of many closely related projects that could be used in industry, such as a smart logistics service or perhaps a restaurant queue system. The existing setup could also be utilized in other university career fairs. As of now we have not planned on how we would commercialize the system. 3.11 Risks and Risk Management 3.11.1 Time Management In order to avoid risk, the group is using Microsoft Project to create timelines of the project from start to finish. Time is of course a major obstacle and how the each team member spends it should be partitioned in a realizable way to finish our project. Please refer to the timelines in chapter 4 for more details. 3.11.2 Traceability/ Tracking Procedures In order to complete the project efficiently, much previous work must be referenced. All the work on the project should be traced back to its owner or creator so that questions can be answered and so that team members can build up skills in the specific area they are covering. To do this the group has set up a Google Site with a file repository in which versions can be tracked by whom, and files can be shared without having to worry to update as with CVS or SVN. A screenshot of our main file repository is shown below: Job Fair Pervasive Computing System, Group Dec0912 Page 15 Figure 6 – Screenshot of file repository Other version control tools the group may employ when the group gets into programming the software are: SVN, CVS. Emails and weekly reports are often a more informal method used for communication between the group and sending out emails detailing who should do what. Each member is responsible for sharing accurate hours with the group, and the validity of the reported hours should be reflected by how much work is accomplished and how well that work was documented. Job Fair Pervasive Computing System, Group Dec0912 Page 16 3.12 Milestones and Evaluation Criteria Major Milestones 1. Setting up the network a. Database b. Communication protocol c. Client programs 2. Programming the terminals a. Configuring printing b. Display 3. System Logic a. Next-Visit Algorithm 4. Determining Input Device a. Linking device tag to back-end information b. Physically acquiring the devices 5. Web Interface a. Programming b. Testing c. Deployment 6. Prototype System- The prototype system will be a combination of laptops arranged to simulate the career fair. Input methods will be devised and output will be observed. a. Set-up b. Testing c. Deployment Evaluation Criteria Each milestone will be evaluated based on completion and accuracy. Each project member responsible for a portion of the project or a milestone will be evaluated based on the percentage of that milestone completed. An example of how this is done is shown below: Table 6 – Example evaluation Work Team Members Due Date Score Prototype the Employer GUI Adam Lee 3/3/2009 100% (prototype is functional and documented) Test the Web Interface Nick Oakman 3/12/2009 40% (did not test 60% of the interface, lacking documentation, etc.) Program Printing functionality on the terminals Kartik Subbu 4/23/2009 N/A (date not yet arrived) Configuring peripheral devices Gabriel Semonis 4/24/09 N/A (date not yet arrived) Job Fair Pervasive Computing System, Group Dec0912 Page 17 4 Statement of Work 4.1 Problem The career fair is busy and students might have a difficult time finding which employers to talk to based on their skills and interests. This team’s project will provide a service to ensure students meet with as many employers as possible, as efficiently as possible. Some of the problems which are still unresolved are which input and output devices to use. The choice is important because the system must be pervasive, but costs must be taken into consideration as well. 4.2 Technology and Implementation Considerations Deciding which technology to use is a big part of the project, mainly for the devices which will be used for students to interact with the system. For instance, for the input device, RFID could be used, which currently seems like the best option. However, RFID readers are very expensive, especially considering there would need to be one at each of the 200+ booths at the career fair. Another option would be using ISU Student ID cards, which would be a convenient way to go about this since every student has one of these cards. However, due to privacy reasons, it was not possible to obtain much information on what kind of information is on the ISU Cards or how they could be utilized. On the other hand, other options would be cheaper and easy to implement, such as using keypads, where students would enter a unique code to check into the system. However, compared to swiping a card, typing a code on a keypad takes a lot more time and is relatively disruptive. 4.3 End Product The requirements of the end product are as follows. The end product will be a prototype, or a small scale version of how this could be implemented at a real career fair. The prototype will only have a few booths, although the server, database, and all software will still have to be fully functional. Job Fair Pervasive Computing System, Group Dec0912 Page 18 Figure 7 – Rough sketch of product 4.3.1 Design 4.3.1.1 Input Devices The system shall employ one or more input devices to best determine which booth a student should visit next. The input device serves as a pervasive and non-disruptive way to identify each student. Currently, RFID, ISU Cards, and Bar code look like the possible choices. 4.3.1.2 Algorithm An algorithm shall be developed which will match students with employers using information entered into the registration system. The goal is to ensure students meet with as many potential employers as possible by matching students' skills with the job requirements, and filtering out jobs which the student is not eligible for. The algorithm shall also take into account the queue length for each booth, and determine the order each booth should be visited to save time. Job Fair Pervasive Computing System, Group Dec0912 Page 19 Algorithm Variables 4.3.1.3 Student Name Student Major Student Year Employer Name Employer Types of Position (for example internship, co-op, full-time) Employer Required Major Employer Queue Length List of Employers Student has already visited Registration System A registration system shall be implemented. Prior to visiting the career fair, students will register with the system, and can submit their resume and enter other information such as major, year, GPA, skills, interests, experience, and whether the student is looking for an internship, coop, or full time employment. Employers will also register with the system, and can enter information which will be matched with students to find which potential employees are best suited for the job. This information could include skills necessary for the job, if the position is an internship or full-time, and which majors are eligible to fill this position. The registration system is simply an online form which will be used to submit information into the main database. Another important reason for registration is so students can enter their cell phone number, which will be needed for the text messaging system. 4.3.1.4 Check-in System There shall be a check-in system, at both the entrance, and at each employer booth. Booths will have readers, and students will check-in upon entering the queue for a booth. The system shall keep track of how many people are waiting to talk to that employer. Checking in at the entrance allows students to receive their input device if needed, in addition to a name tag. The type of readers used will depend on which type of technology we choose as the input device. 4.3.1.5 Web Interface The system shall have a web-based program which employers can access. This program shall allow employers to view the resume and other information of students who are currently checked into that booth. To accomplish this, the program will connect to a server which has a database with all information submitted through the registration system. The purpose of this is to make it easier for employers to obtain information about each student they talk to, and save the information if desired. Additionally, students will not need to carry around their resume if it is already in the database. The software will have a check-out button to allow the employer to remove the student from the queue after they are done talking with them. 4.3.1.6 Output Device A passive system shall be implemented which will notify students about which employer they should visit next. This notification shall be sent after checking in at the main entrance, and any time a student checks out of a booth. There are a few choices for which output device to use, but at this time text messaging appears to be the most pervasive way for sending real-time updates, since most students have cell phones. Job Fair Pervasive Computing System, Group Dec0912 Page 20 4.3.1.7 Information Kiosks There will be information kiosks located around the area with computers which students can use to access information from the system. These kiosks will mainly be for students who do not have a cell phone, or do not wish to receive text messages. Each student will have a unique code which they can enter into the computer, and obtain the latest update of which employer booth they should visit next. Specific software must be developed for these computers to allow them to access the system. 4.3.2 Implementation During the first semester the project team will be focusing mainly on design, and exactly how the system is going to work. This will involve things like deciding which input and output devices to use, which programming language to use and whether software will be web based or native to a certain operating system. The second semester will focus more on implementation. The implementation is where all the programming will take place, as well as putting the system together as a whole. Some hardware will need to be purchased, such as readers for the input devices, and possibly terminal computers for the kiosks. 4.3.3 Testing For testing, we will be using the V model. For more information on testing, see section 3.5.1 of this document. 4.3.4 Documentation Formal documents for this project will include the project plan, design report, poster, and a final report. Also, all software will have documentation. Deliverables: Project Plan Design Report Poster Final Report 4.3.5 Demonstration The prototype will be demonstrated in a lab setting, with a few computers. For the demonstration, everything will be implemented the same as if it were a real career fair, with the exception that the number of booths will be substantially less. Job Fair Pervasive Computing System, Group Dec0912 Page 21 5 Estimated Resources and Schedules This section gives an estimate of the resources needed and the schedule to be followed in order to successfully complete the project. It will tentatively be used to keep the team on track during the entire course of the project. 5.1 Personal Effort Requirement This section includes a tentative number of hours to be put in by individual team members in order to successfully complete the project. Table 7 – Personal Task Estimates Member Hours (Tentative) 200 200 200 200 Adam Lee Nick Oakman Kartik Subbu Gabriel Semonis 5.2 Labor Cost ( $10 / hour) $2000 $2000 $2000 $2000 Estimated Resource Requirement and their Financial Requirements Some of the components and resources that will be needed involve RFID tags, RFID Scanners, wireless internet connection, Terminals and a Server. Wireless internet connection necessary to access the front end will be provided inside the coliseum by the university itself. The server, another massive investment, if not already available for use, will presumably be brought into Hilton Coliseum solely for the purpose of the Career Fair, given its magnitude and importance. Under these assumptions, resources and other services that shall be needed are summarized below (the list is subject to change as the project progresses) Table 8 - Possible resources and services needed RFID Scanners Passive RFID tags Terminals Printed Poster Poster Paper Binding $80 Each; $24,000 if 300 employer booths $.50 Each; $5000 if 10,000 unique visitors $500* Each; $2000 for 4 terminals on each corner of coliseum $20 $30 $30 Job Fair Pervasive Computing System, Group Dec0912 Page 22 6 Schedules A schedule of how the work will be split up. As stated earlier, the project team will focus mostly on the design for the first semester, and the implementation for the second semester. These schedules are only tentative and are subject to change. The first semester, the group will plan out the project, design and plan out the back-end and front-end of the system. 6.1 First Semester Job Fair Pervasive Computing System, Group Dec0912 Page 23 6.2 Second Semester The second semester focuses on implementation. Setting up the network, programming the terminals, implementing input devices and designing and developing the web interface are all aspects of this schedule. Job Fair Pervasive Computing System, Group Dec0912 Page 24 7 Closure Materials 7.1 Project Team Information Iowa State University Faculty Advisor Table 9 – Faculty advisor Name Daji Qiao Major Assistant Professor of Computer Engineering Contact Information 3214 Coover Hall Ames Iowa, 50011 (515)294-2390 daji@iastate.edu Name Adam Lee Major Computer Engineering Contact Information 9121 Buchanan Vance Ames Iowa, 50013 (515)708-5154 adamryanlee@gmail.com Nick Oakman Computer Engineering 101 N. Hyland Ave. unit 3 Ames Iowa, 50014 (563)570-0310 nmoakman@gmail.com Gabriel Semonis Computer Engineering 405 4th St. N.E. Mitchellville IA, 50169 (515)554-3137 gsemonis@iastate.edu Kartik Subbu Electrical Engineering 2123 Fredrickson Ct. Ames Iowa, 50010 (515)441-2209 kartiksubbu@gmail.com Team Members Table 10 – Team members Job Fair Pervasive Computing System, Group Dec0912 Page 25 7.2 Closing Summary The job fair is a powerful tool for students to meet employers and employers to recruit students; however, when there are a large numbers of students and employers, the process of meeting each other can become inefficient. The team will design a pervasive system to track where students are at in order to inform them of where to go next so that they can have the best chance of meeting with the greatest number of employers seeking recruits with their skill sets, thereby increasing the efficiency of the job fair. In order to fully maximize the team’s maximum efficiency, this project plan has been created addressing key issues of our project plan and development. 8 References: [1] “Career Fairs.” Engineering Career Services. February 20, 2009. <http://www.eng.iastate.edu/ecs/what/fairs.html> Job Fair Pervasive Computing System, Group Dec0912 Page 26