You are on page 1of 19

FINGERPRINT LOCK SYSTEM

PROJECT MANAGEMENT PLAN

Course: Project Management IE 408

Student Names:
Mirza Jašarspahić Emin Ždralović Eldin Salkanović

Fall 2020

VERSION HISTORY
Version # Implemented Revision Approved Approval Reason
Fingerprint Lock System

By Date By Date
1.0 Miirza Jašarspahić 14.12.2020.
Emin Ždralović
Eldin Salkanović

UP Template Version: 11/30/06

Page 1 of 19
Fingerprint Lock System

Page 2 of 19
Fingerprint Lock System

TABLE OF CONTENTS
1 INTRODUCTION......................................................................................................................
1.1 Purpose of Project Management Plan...........................................................................
2 EXECUTIVE SUMMARY OF PROJECT CHARTER...............................................................
2.1 Assumptions/Constraints...............................................................................................
3 SCOPE MANAGEMENT..........................................................................................................
3.1 Product breakdown structure.........................................................................................
3.2 work breakdown structure..............................................................................................
4 SCHEDULE/TIME MANAGEMENT..........................................................................................
4.1 Milestones......................................................................................................................
4.2 Project Schedule and network diagrams.......................................................................
4.2.1 Dependencies.............................................................................................................
4.3 Gant chart.....................................................................................................................
5 COST/BUDGET MANAGEMENT...........................................................................................
5.1 Resource plan..............................................................................................................
5.2 Budget plan..................................................................................................................
5.3 project crashing (time cost trade offs)..........................................................................
6 SUMMARY..............................................................................................................................
7 REFERENCES.......................................................................................................................
APPENDIX A: PROJECT MANAGEMENT PLAN APPROVAL................................................
APPENDIX B: REFERENCES..................................................................................................
APPENDIX C: KEY TERMS.....................................................................................................
APPENDIX D: SUMMARY OF SPENDING.............................................................................

1 INTRODUCTION
1.1 PURPOSE OF PROJECT MANAGEMENT PLAN
The intended audience of the Fingerprint Lock System PMP is all project
stakeholders including the project sponsor, senior leadership and the project team.
The main concept of this project is to grant authentic right of access to separate
units in a corporation by reading the fingerprint of the employee uniquely. We
remove the need to keep track of keys or recall a password or a PIN, by designing
this project. The specific door lock can be unlocked only if there is an authorized
person accessing it, as there are no keys that can be copied or stolen, or locks
that can be lockpicked.
The Project Plan of the Fingerprint Lock System would include a definition of the
project, with the priorities and aims of the project and details of how the project is

Page 3 of 19
Fingerprint Lock System
managed, implemented and monitored. Which comprises the general
arrangements and processes for the project and management, schedules and
strategies for preparing and tracking the project as it progresses.
Our project, The Fingerprint Lock System, authenticates users from accessing
unique premises. The project device would be useful for automatically granting
access only to registered users. This guarantees protection and safety to an office,
building or home, to whichever building the security is needed.
In several locations, such as factories, offices, and colleges or even at our home,
the products built here can be used as safe storage for drugs, jewelry, guns,
papers, and other useful or potentially dangerous objects. Both of these, along
with other high-level organizations, are considered partners in this initiative.
National houses, police stations, hospitals and tribunals are the most significant.
The high-level device to be shipped is a fingerprint reader/machine as well as a
door safety lock.
Additionally, the Plan will serve as an agreement between the following parties:
Project Sponsors, Project Manager, Project Team, and other people associated
with or affected by the project.
2 EXECUTIVE SUMMARY OF PROJECT CHARTER
This Fingerprint Lock System authenticates users from accessing specific
premises. For secure sites, this device is useful for automatically granting access
only to authorized users. This guarantees security and safety.
In several locations, such as factories, offices, and schools or even at our home,
the products developed here can be used as safe storage for medication, jewelry,
firearms, papers, and other sensitive or potentially harmful objects. Both of these,
along with other high-level organizations, are considered to be partners throughout
this initiative. National facilities, police stations, hospitals and courts are the most
significant.
This project also has a number of supporters eager to take part in this venture,
such as, FMUP, Sword Security, Securitas BH, General Engineering, since a lot of
software and scripting is concealed behind this system to make it function as it is
intended to, since many businesses wish to improve total security and support this
concept.
Items listed in the project charter, such as scope, risk management, time schedule,
resource and budget plan, etc., are briefly described in further text and all required
information is given.
The device to be shipped is a fingerprint reader/machine as well as a door safety
lock.

2.1 ASSUMPTIONS/CONSTRAINTS
In planning the Project Plan, the following assumptions were made:

Page 4 of 19
Fingerprint Lock System
• All participants in the project will comply with the requirements defined in
this plan.
• Management can ensure that members of the project team are present to
fulfill project tasks and objectives as necessary.
• Employees of the above-mentioned companies are willing to change
business tactics to take advantage of the features provided by the new
technology based on fingerprints.
• The Municipality will ensure that there is a technical framework capable of
running the new security system.
• The sponsors and partners will assist in the implementation of the project
plan and support it.
• System incorrectness would result in additional testing, costing more
resources and effort.
• Inability to recognize improvements to the draft milestones would result in
project delays within the period stated in the project timetable.
• As new data and problems arise, the Project Plan could change.

3 SCOPE MANAGEMENT
Since the project requirements have been previously explained, as well as the
purpose and aims, we will explain additional information regarding specific project
phases and responsibilities in this part.
The plan is organized by the Project Manager, whose responsibility is to gather
client and potential consumer knowledge and expectations. The primary objective
is to build devices for biometric authentication, mainly fingerprint-based. The key
point is that there are two stages of development of the system: design and
engineering.
The first step is design, which is the responsibility of the Department of Design. As
well as models, diagrams and illustrations of the finished product and how it will
appear, they will have suggestions and visions. The core element of this device is
the fingerprint sensor. It uses a biometric scanner for fingerprint recognition. This
is the responsibility of the Department of Biometric Safety which consists of
several people whose primary task is to build a sensor. This sensor utilizes various
technologies and methods, such as optical and infrared technologies, micro-
controller, a fingerprint module, alarm, switch, keypad, LCD monitor. These would
be the main blocks of this project. Cooperation with the Engineering and Electronic
Department would be required. Then, before we can distribute it to the clients, the
final step is testing of the device.

Page 5 of 19
Fingerprint Lock System
3.1 PRODUCT BREAKDOWN STRUCTURE
The product breakdown structure of the Fingerprint Lock System project is
represented in the table below. There are resources that are required to
accomplish this project's objectives. PBS has a few items categorized according to
the project phase, as we can see in this table: Development and Design. Each of
them has their own divisions that also have the necessary items required to
complete the project. In the table, all those items are listed.

PRODUCT BREAKDOWN STRUCTURE

DEVELOPMENT DESIGN

Engineerin Biometric security Electronic Testing Design


g

Program Sensors LCD Remote Control Buttons

Computer Microcontroller DC Motor Siren/Sound Metal

Keypad Optical Reader Cables and Connectors Computer Interface Light Color

Display Optical Light Wires

Oscillators

Relay

Transistor

3.2 WORK BREAKDOWN STRUCTURE


The following table represents the Fingerprint Lock System's work breakdown
structure. This describes development that is mostly completed in several stages
in order to accomplish the final goal of the project.
As seen in the following table, according to the stages of development and design,
WBS has several sections divided once again, as previous section did as well. In
order to accomplish the objectives, each department has unique work to do. Each
working phase has its own title and is numbered, as can be seen in table.

WBS

DESIGN DEVELOPMENT

Page 6 of 19
Fingerprint Lock System

1.0 2.0 3.0 4.0 5.0


DESIGN ENGINEERING BIOMETRIC SECURITY ELECTRONIC TESTING

1.1 2.1 Circuits 3.1 4.1 5.1


Plans and diagrams Integrating components Microcontroller Creating test
embedding cases

1.2 2.2 3.2 4.2 5.2


Shape and size of Executable Installing optical reader Fingerprint module Environment
the device code and light

1.3 2.3 3.3 4.3 5.3


Other details Application Checking functionality Making device Final testing
and safety

1.4 2.4 5.4


Final look Program Final product

4 SCHEDULE/TIME MANAGEMENT
4.1 MILESTONES
The table below lists the milestones for this project, along with their estimated
completion timeframe.

Milestones Estimated Completion Timeframe


Project planned and authorized to Two weeks after project concept is approved
proceed
Equipment and material ready 5 days after approval
Program and code created One week after equipment is collected
Machine designed One week after program is finished
Device made Two weeks after program is done
Device tested Day after device is made
Product delivered 5 days after testing is finished

4.2 PROJECT SCHEDULE AND NETWORK DIAGRAMS


The following illustration represents the project's Network Diagram. It is a visual depiction
of tasks and dependencies. Tasks are represented by boxes or nodes and
dependencies are shown as lines that link those boxes.
There is also the phase number of the work listed in the WBS in each box. We can see
that certain work can be done at the same time in this diagram, except for the regular
dependencies.

Page 7 of 19
Fingerprint Lock System

4.2.1 Dependencies
The following is the table of all project's operations along with their predecessors
and successors.
DEPENDENCIES

ACTIVITY PREDECESSOR ACTIVITY PREDECESSOR


1.1 / 3.2 3.1
1.2 , 1.3 1.1 3.3 3.2
1.4 1.2 , 1.3 4.1 3.3
2.1 1.4 4.2 4.1
2.2 2.1 4.3 4.2
2.3 2.2 5.1 , 5.2 4.3
2.4 2.3 5.3 5.1 , 5.2
3.1 2.4 5.4 5.3
4.3 GANT CHART
The following table shows the Gantt map of this project that shows the schedule of
the project. The dependency relationship between events and current schedule
status is also shown.
Name Duration October November December

1 Design 8 days
Sword Security
2 Plan and diagrams 3 days

Sword Security
Page 8Sword
of 19 Security
Sword Security
Fingerprint Lock System
General Engineering
3 Shape and size of device 1 day General Engineering
General Engineering
General Engineering
4 Other details 2 day

5 Final look 2 days


Securitas BH
6 Engineering 14 days
General Engineering
7 Circuts 3 days Securitas BH

8 Executable code 7 days

9 Application 3 days

10 Program 1 day General Engineering


Securitas BH
11 Biometric security 6 days
FMUP
12 Integrating components 4 days

13 Installing optical reader and light 1 day


General Engineering
14 Checking functionality and safety 1 day General Engineering

15 Electronic 8 days General Engineering


FMUP
16 Microcontroller embedding 1 day

17 Fingerprint module 2 days

18 Making device 5 days

19 Testing 10 days

20 Creating test cases 2 days

21 Environment 1 day

22 Final testing 5 days

23 Final product 2 days

Page 9 of 19
Fingerprint Lock System

In the table, the tasks to be carried out are shown on the vertical axis and time periods
on the horizontal axis . Additionally, the width of the horizontal bars represents the
length of each operation. The start and end dates of all aspects of the project can also
be found here.

Page 10 of 19
Fingerprint Lock System
5 C
OST/BUDGET MANAGEMENT
5.1 RESOURCE PLAN
People, supplies and high-quality machines are the tools required to complete this
project. There are multiple team members split into divisions when it comes to
people, where each person has his/her own job and specialized equipment required
to accomplish their given task. Supplies will b e listed, and their cost will be
calculated in this segment, so the income of individuals will be in the next section,
the budget plan.

RESOURCE PLAN

Task Quantity Cost in KM Total cost in KM


CPU 1 200 200
Remote control 1 30 30
Siren 2 50 100
Transistor 1 200 200
Connectors 4 3 12
Cables 10 2 20
Oscillators 1 90 90
Wires 20 2 40
LCD 1 500 500
DC motor 1 650 650
Relay 2 80 160
Keypad 1 50 50
Display 1 100 100
Sensors 2 100 200
Optical light 1 300 300
Optical reader 1 400 400
Microcontroller 1 500 500

Total cost = 3,552 KM

5.2 BUDGET PLAN


The following table illustrates the budget necessary to complete the project.
However, only the budget required for employees is counted in this table, since the
cost of equipment and materials was already explained in the previous section.

Page 11 of 19
Fingerprint Lock System

BUDGET PLAN

Position Department Expected Hourly Cost No. of Total cost (KM)


working per wage per months
month (KM) month
(KM)
Project Engineering 132h 30 3,960 3 11,880
manager
Team member Engineering 100h 25 2,500 3 7,500
Team member Engineering 100h 25 2,500 3 7,500
Team member Biometric 90h 20 1,800 2 3,600
Security
Team member Biometric 90h 20 1,800 2 3,600
Security
Team member Electronics 90h 20 1,800 3 5,400
Team member Electronics 90h 20 1,800 3 5,400
Team member Design 30h 20 600 1 600
Total cost with 20% taxes = 54,576 KM

5.3 PROJECT CRASHING (TIME COST TRADE OFFS)


Project crash-time risk trade offs are seen in the table below. Each operation is seen
in this table with the usual required time and cost, but also with the time and cost of
the crash.
TIME COST TRADE OFFS

Activity Normal time Crash time Normal cost Crash cost Total Crash
in KM allowable cost per
crash time day in
KM
1.1 – 1.2; 1.3 7 days 2 days 1000 650 5 days 60
1.2; 1.3 – 1.4 12 days 4 days 500 250 8 days 18
1.4 – 2.1 3 days 1 day 100 50 2 days 25
2.1 – 2.2 2 days 1 day 500 650 1 day 50
2.2 – 2.3 5 days 2 days 150 300 3 days 80
2.3 – 2.4 7 days 3 days 300 250 4 days 60
2.4 – 3.1 9 days 3 days 700 300 6 days 50
3.1 – 3.2 4 days 1 day 200 150 3 days 33

Page 12 of 19
Fingerprint Lock System

3.2 – 3.3 3 days 1 day 300 500 2 days 100


3.3 – 4.1 1 day 0 days 50 300 1 day 300
4.1 – 4.2 3 days 1 day 400 500 2 days 250
4.2 – 4.3 10 days 3 days 1200 1800 7 days 250
4.3 – 5.1: 5.2 15 days 5 days 3000 2900 10 days 290
5.1; 5.2 – 5.3 4 days 1 day 500 800 3 days 133
5.3 – 5.4 3 day 1 day 100 500 2 days 250

Total = Total =
9,000 10,050
We can clearly see in the table that if any operation is performed in the ideal time,
the usual cost is 9,000KM, but the thing is that if there is a crashing project that is
not great, it will cost a lot more (1050KM). There are several concurrent tasks that
need to be completed at the same time, however one of them is also probably to be
finished and the other is not, which also contributes to project crashes.

6 SUMMARY
The Fingerprint Lock System project is intended to prevent organizational security
threats because bio-metric scanners are known to be one of the best ways to lock or
unlock any device or facility. The system makes it useful for protected locations to
automatically give access only to authorized users, ensuring safety and protection. In
several locations, such as factories, offices, and colleges or even at private
properties, the product built here can be used for safekeeping medicine, jewelry,
firearms, documents, and other private, important and potentially dangerous objects.
Any detail of this product's design and production is clearly described and outlined in
this project plan. Team members, along with their roles, budget as well as time taken
to complete the tasks, are all numbered and listed. The project timetable, but also the
project partners are all listed, and all relevant information is given. This project would
have a positive effect on both those who wish to be safe and protected and have
allowed access to their personal records and property, as well as important
businesses and national organizations who will benefit greatly from it, as it decreases
the risk of theft or damaging the valuable items. In the end, this strengthens security
in general and, when it comes to tech, brings our country in line with others.

7 REFERENCES
1. Crime Scene Investigation: Methods and Procedures , Ian K. PepperOpen University Press, 2005
2. Do Fingerprints Lie? , Specter, MichaelThe New Yorker, Vol. 78, No. 13, May 27, 2002
3. How We Can Improve the Reliability of Fingerprint Identification , Cherry, Michael; Imwinkelried,
EdwardJudicature, Vol. 90, No. 2, September/October 2006

Page 13 of 19
Fingerprint Lock System
4. Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number
Concept , Chaudhari, Atul S.; Patnaik, Girish K.; Patil, Sandip SInformatica Economica, Vol. 18,
No. 1, January 1, 2014
5. Fingerprints and Admissibility: Friction Ridges and Science, Ashbaugh, David R.; Houck, Max
MCanadian Journal of Police and Security Services, Vol. 3, No. 2, June 2005
6. Improved Fingerprint Acquisition, Hanson, DougLaw & Order, Vol. 54, No. 7, July 2006

Appendix A: Project Management Plan Approval


The undersigned acknowledge they have reviewed the Fingerprint Lock System
Project Management Plan and agree with the approach it presents. Changes to
this Project Management Plan will be coordinated with and approved by the
undersigned or their designated representatives.

Signature: Date:
Print Name: Mirza Jašarspahi ć
Title: Computer Engineer
Role: Project Ma nager

Signature: Date:
Print Name: Emin Žd ralović
Title: S oftware Engineer
Role: Biometric Engineer

Signature: Date:
Print Name: Eldin Salkanović
Title: Machine Engineer
Role: Electronics Manager

Page 14 of 19
Fingerprint Lock System

APPENDIX
B: REFERENCES
The following table summarizes the documents referenced in this document.
Links:

Document Name and Description Location


Version
Frontline. (2012). "The The reliability of forensic science https://www.youtube.com/watch?
Real CSI." 17 April and how forensic evidence is v=91GbKc0ijHU
2012. presented in the courtroom; cases
Web. 20 August 2018. include the trial of Casey Anthony,
the Madrid terrorist bombing and
capital cases in Mississippi.
Acts adopted under Acts adopted under title vi of the EU
the EO treaty. treaty on the stepping up of cross- https://eurlex.europa.eu/LexUriServ/LexUriS
Retrieved 2010-0510. erv.do?uri=OJ:L:2008:210:0001:
border cooperation, particularly in
0011:EN:PDF
combating terrorism and crossborder
crime

"Fbi — Iafis". Fbi.gov. The Integrated Automated https://web.archive.org/web/2012


199907-28. Archived Fingerprint 0921125141/http://www.fbi.gov/a
from the original on Identification System from the FBI boutus/cjis/fingerprints_biometrics/iafi
2012-09-21. s/iafis/

"FBI — Next FBI’s article on the present and the https://www.fbi.gov/services/cjis/fi


Generation future of biometrics ngerprints-and-otherbiometrics/ngi
Identification". Fbi.gov.
Retrieved 2013-04-19.

Nath, Dev & Ray, A comprehensive scoping of the https://www.researchgate.net/pu


Saurav & Ghosh, fingerprint recognition problem and blication/247773759_Fingerprint_
Sumit. (2011). address its major design and Recognition_System_Design_Ana lysis
Fingerprint Recognition implementation issues as well as

Page 15 of 19
Fingerprint Lock System

APPENDIX
System : Design & give an insight into its future
Analysis. prospects.

C: KEY TERMS
The following table provides definitions for terms relevant to this document.
Term Definition
Gantt Chart A bar chart that depicts a schedule of activities and
milestones. Generally activities (which may be projects,
operational activities, project activities, tasks, etc.) are listed
along the left side of the chart and the time line along the
top or bottom.
Stakeholders The people or groups that have a vested interest in the
outcome of the project.
Risk A risk is defined as an uncertain event or condition that, if it
occurs, has a positive or negative affect on a project's
objectives. An uncertain event that may affect the
performance objectives (i.e., cost, schedule, scope or
quality) of an investment, usually negatively.
Duration PMI PMBOK defines duration as the total number of work
periods required completing a schedule activity or WBS
component, usually expressed as work days or work
weeks.
Activity An activity is a term used by the SDN to distinguish a
service that is provided by the SDN within a particular
service that is being accessed by users.
Milestone A significant point or event in the project.

Page 16 of 19
Fingerprint Lock System

APPENDIX

D: SUMMARY OF SPENDING

Budget Item PY-1 PY CY BY BY + 1 BY + 2 BY + 3 BY + 4 Total


Planning:

Budgetary Resources $ 10,00 $ 15,00 $ 15,00 $ 45,00 $85,00

Outlays $ 15,00 $ 10,00 $ 30,00 $ 33,00 $78,00

Development &
Implementation of
Project:
Budgetary Resources $ 20,00 $ 10,00 $ 50,00 $ 22,00 $102,00

Outlays $ 30,00 $ 20,00 $ 40,00 $ 6,00 $96,00

Total, sum of stages:

Budgetary Resources $ 20,00 $ 40,00 $ 20,00 $ 5,00 $85,00

Outlays $ 20,00 $ 30,00 $ 20,00 $ 12,00 $82,00

Operations &
Maintenance:
Budgetary Resources $ 10,00 $ 20,00 $ 10,00 $ 8,00 $48,00

Outlays $ 5,00 $ 5,00 $ 5,00 $ 3,00 $18,00

Total, all stages:

Budgetary Resources $ 3,00 $ 8,00 $ 4,00 $ 20,00 $35,00

Outlays $ 2,00 $ 5,00 $ 7,00 $ 15,00 $29,00

Page 17 of 19
Fingerprint Lock System

APPENDIX
Government FTE cost $ 1,00 $ 2,00 $ 10,00 $ 10,00 $23,00

PY: Previous Year; CY: Current Year; BY: Budget Year

Page 18 of 19

You might also like