Professional Documents
Culture Documents
Student Names:
Mirza Jašarspahić Emin Ždralović Eldin Salkanović
Fall 2020
VERSION HISTORY
Version # Implemented Revision Approved Approval Reason
Fingerprint Lock System
By Date By Date
1.0 Miirza Jašarspahić 14.12.2020.
Emin Ždralović
Eldin Salkanović
Page 1 of 19
Fingerprint Lock System
Page 2 of 19
Fingerprint Lock System
TABLE OF CONTENTS
1 INTRODUCTION......................................................................................................................
1.1 Purpose of Project Management Plan...........................................................................
2 EXECUTIVE SUMMARY OF PROJECT CHARTER...............................................................
2.1 Assumptions/Constraints...............................................................................................
3 SCOPE MANAGEMENT..........................................................................................................
3.1 Product breakdown structure.........................................................................................
3.2 work breakdown structure..............................................................................................
4 SCHEDULE/TIME MANAGEMENT..........................................................................................
4.1 Milestones......................................................................................................................
4.2 Project Schedule and network diagrams.......................................................................
4.2.1 Dependencies.............................................................................................................
4.3 Gant chart.....................................................................................................................
5 COST/BUDGET MANAGEMENT...........................................................................................
5.1 Resource plan..............................................................................................................
5.2 Budget plan..................................................................................................................
5.3 project crashing (time cost trade offs)..........................................................................
6 SUMMARY..............................................................................................................................
7 REFERENCES.......................................................................................................................
APPENDIX A: PROJECT MANAGEMENT PLAN APPROVAL................................................
APPENDIX B: REFERENCES..................................................................................................
APPENDIX C: KEY TERMS.....................................................................................................
APPENDIX D: SUMMARY OF SPENDING.............................................................................
1 INTRODUCTION
1.1 PURPOSE OF PROJECT MANAGEMENT PLAN
The intended audience of the Fingerprint Lock System PMP is all project
stakeholders including the project sponsor, senior leadership and the project team.
The main concept of this project is to grant authentic right of access to separate
units in a corporation by reading the fingerprint of the employee uniquely. We
remove the need to keep track of keys or recall a password or a PIN, by designing
this project. The specific door lock can be unlocked only if there is an authorized
person accessing it, as there are no keys that can be copied or stolen, or locks
that can be lockpicked.
The Project Plan of the Fingerprint Lock System would include a definition of the
project, with the priorities and aims of the project and details of how the project is
Page 3 of 19
Fingerprint Lock System
managed, implemented and monitored. Which comprises the general
arrangements and processes for the project and management, schedules and
strategies for preparing and tracking the project as it progresses.
Our project, The Fingerprint Lock System, authenticates users from accessing
unique premises. The project device would be useful for automatically granting
access only to registered users. This guarantees protection and safety to an office,
building or home, to whichever building the security is needed.
In several locations, such as factories, offices, and colleges or even at our home,
the products built here can be used as safe storage for drugs, jewelry, guns,
papers, and other useful or potentially dangerous objects. Both of these, along
with other high-level organizations, are considered partners in this initiative.
National houses, police stations, hospitals and tribunals are the most significant.
The high-level device to be shipped is a fingerprint reader/machine as well as a
door safety lock.
Additionally, the Plan will serve as an agreement between the following parties:
Project Sponsors, Project Manager, Project Team, and other people associated
with or affected by the project.
2 EXECUTIVE SUMMARY OF PROJECT CHARTER
This Fingerprint Lock System authenticates users from accessing specific
premises. For secure sites, this device is useful for automatically granting access
only to authorized users. This guarantees security and safety.
In several locations, such as factories, offices, and schools or even at our home,
the products developed here can be used as safe storage for medication, jewelry,
firearms, papers, and other sensitive or potentially harmful objects. Both of these,
along with other high-level organizations, are considered to be partners throughout
this initiative. National facilities, police stations, hospitals and courts are the most
significant.
This project also has a number of supporters eager to take part in this venture,
such as, FMUP, Sword Security, Securitas BH, General Engineering, since a lot of
software and scripting is concealed behind this system to make it function as it is
intended to, since many businesses wish to improve total security and support this
concept.
Items listed in the project charter, such as scope, risk management, time schedule,
resource and budget plan, etc., are briefly described in further text and all required
information is given.
The device to be shipped is a fingerprint reader/machine as well as a door safety
lock.
2.1 ASSUMPTIONS/CONSTRAINTS
In planning the Project Plan, the following assumptions were made:
Page 4 of 19
Fingerprint Lock System
• All participants in the project will comply with the requirements defined in
this plan.
• Management can ensure that members of the project team are present to
fulfill project tasks and objectives as necessary.
• Employees of the above-mentioned companies are willing to change
business tactics to take advantage of the features provided by the new
technology based on fingerprints.
• The Municipality will ensure that there is a technical framework capable of
running the new security system.
• The sponsors and partners will assist in the implementation of the project
plan and support it.
• System incorrectness would result in additional testing, costing more
resources and effort.
• Inability to recognize improvements to the draft milestones would result in
project delays within the period stated in the project timetable.
• As new data and problems arise, the Project Plan could change.
3 SCOPE MANAGEMENT
Since the project requirements have been previously explained, as well as the
purpose and aims, we will explain additional information regarding specific project
phases and responsibilities in this part.
The plan is organized by the Project Manager, whose responsibility is to gather
client and potential consumer knowledge and expectations. The primary objective
is to build devices for biometric authentication, mainly fingerprint-based. The key
point is that there are two stages of development of the system: design and
engineering.
The first step is design, which is the responsibility of the Department of Design. As
well as models, diagrams and illustrations of the finished product and how it will
appear, they will have suggestions and visions. The core element of this device is
the fingerprint sensor. It uses a biometric scanner for fingerprint recognition. This
is the responsibility of the Department of Biometric Safety which consists of
several people whose primary task is to build a sensor. This sensor utilizes various
technologies and methods, such as optical and infrared technologies, micro-
controller, a fingerprint module, alarm, switch, keypad, LCD monitor. These would
be the main blocks of this project. Cooperation with the Engineering and Electronic
Department would be required. Then, before we can distribute it to the clients, the
final step is testing of the device.
Page 5 of 19
Fingerprint Lock System
3.1 PRODUCT BREAKDOWN STRUCTURE
The product breakdown structure of the Fingerprint Lock System project is
represented in the table below. There are resources that are required to
accomplish this project's objectives. PBS has a few items categorized according to
the project phase, as we can see in this table: Development and Design. Each of
them has their own divisions that also have the necessary items required to
complete the project. In the table, all those items are listed.
DEVELOPMENT DESIGN
Keypad Optical Reader Cables and Connectors Computer Interface Light Color
Oscillators
Relay
Transistor
WBS
DESIGN DEVELOPMENT
Page 6 of 19
Fingerprint Lock System
4 SCHEDULE/TIME MANAGEMENT
4.1 MILESTONES
The table below lists the milestones for this project, along with their estimated
completion timeframe.
Page 7 of 19
Fingerprint Lock System
4.2.1 Dependencies
The following is the table of all project's operations along with their predecessors
and successors.
DEPENDENCIES
1 Design 8 days
Sword Security
2 Plan and diagrams 3 days
Sword Security
Page 8Sword
of 19 Security
Sword Security
Fingerprint Lock System
General Engineering
3 Shape and size of device 1 day General Engineering
General Engineering
General Engineering
4 Other details 2 day
9 Application 3 days
19 Testing 10 days
21 Environment 1 day
Page 9 of 19
Fingerprint Lock System
In the table, the tasks to be carried out are shown on the vertical axis and time periods
on the horizontal axis . Additionally, the width of the horizontal bars represents the
length of each operation. The start and end dates of all aspects of the project can also
be found here.
Page 10 of 19
Fingerprint Lock System
5 C
OST/BUDGET MANAGEMENT
5.1 RESOURCE PLAN
People, supplies and high-quality machines are the tools required to complete this
project. There are multiple team members split into divisions when it comes to
people, where each person has his/her own job and specialized equipment required
to accomplish their given task. Supplies will b e listed, and their cost will be
calculated in this segment, so the income of individuals will be in the next section,
the budget plan.
RESOURCE PLAN
Page 11 of 19
Fingerprint Lock System
BUDGET PLAN
Activity Normal time Crash time Normal cost Crash cost Total Crash
in KM allowable cost per
crash time day in
KM
1.1 – 1.2; 1.3 7 days 2 days 1000 650 5 days 60
1.2; 1.3 – 1.4 12 days 4 days 500 250 8 days 18
1.4 – 2.1 3 days 1 day 100 50 2 days 25
2.1 – 2.2 2 days 1 day 500 650 1 day 50
2.2 – 2.3 5 days 2 days 150 300 3 days 80
2.3 – 2.4 7 days 3 days 300 250 4 days 60
2.4 – 3.1 9 days 3 days 700 300 6 days 50
3.1 – 3.2 4 days 1 day 200 150 3 days 33
Page 12 of 19
Fingerprint Lock System
Total = Total =
9,000 10,050
We can clearly see in the table that if any operation is performed in the ideal time,
the usual cost is 9,000KM, but the thing is that if there is a crashing project that is
not great, it will cost a lot more (1050KM). There are several concurrent tasks that
need to be completed at the same time, however one of them is also probably to be
finished and the other is not, which also contributes to project crashes.
6 SUMMARY
The Fingerprint Lock System project is intended to prevent organizational security
threats because bio-metric scanners are known to be one of the best ways to lock or
unlock any device or facility. The system makes it useful for protected locations to
automatically give access only to authorized users, ensuring safety and protection. In
several locations, such as factories, offices, and colleges or even at private
properties, the product built here can be used for safekeeping medicine, jewelry,
firearms, documents, and other private, important and potentially dangerous objects.
Any detail of this product's design and production is clearly described and outlined in
this project plan. Team members, along with their roles, budget as well as time taken
to complete the tasks, are all numbered and listed. The project timetable, but also the
project partners are all listed, and all relevant information is given. This project would
have a positive effect on both those who wish to be safe and protected and have
allowed access to their personal records and property, as well as important
businesses and national organizations who will benefit greatly from it, as it decreases
the risk of theft or damaging the valuable items. In the end, this strengthens security
in general and, when it comes to tech, brings our country in line with others.
7 REFERENCES
1. Crime Scene Investigation: Methods and Procedures , Ian K. PepperOpen University Press, 2005
2. Do Fingerprints Lie? , Specter, MichaelThe New Yorker, Vol. 78, No. 13, May 27, 2002
3. How We Can Improve the Reliability of Fingerprint Identification , Cherry, Michael; Imwinkelried,
EdwardJudicature, Vol. 90, No. 2, September/October 2006
Page 13 of 19
Fingerprint Lock System
4. Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number
Concept , Chaudhari, Atul S.; Patnaik, Girish K.; Patil, Sandip SInformatica Economica, Vol. 18,
No. 1, January 1, 2014
5. Fingerprints and Admissibility: Friction Ridges and Science, Ashbaugh, David R.; Houck, Max
MCanadian Journal of Police and Security Services, Vol. 3, No. 2, June 2005
6. Improved Fingerprint Acquisition, Hanson, DougLaw & Order, Vol. 54, No. 7, July 2006
Signature: Date:
Print Name: Mirza Jašarspahi ć
Title: Computer Engineer
Role: Project Ma nager
Signature: Date:
Print Name: Emin Žd ralović
Title: S oftware Engineer
Role: Biometric Engineer
Signature: Date:
Print Name: Eldin Salkanović
Title: Machine Engineer
Role: Electronics Manager
Page 14 of 19
Fingerprint Lock System
APPENDIX
B: REFERENCES
The following table summarizes the documents referenced in this document.
Links:
Page 15 of 19
Fingerprint Lock System
APPENDIX
System : Design & give an insight into its future
Analysis. prospects.
C: KEY TERMS
The following table provides definitions for terms relevant to this document.
Term Definition
Gantt Chart A bar chart that depicts a schedule of activities and
milestones. Generally activities (which may be projects,
operational activities, project activities, tasks, etc.) are listed
along the left side of the chart and the time line along the
top or bottom.
Stakeholders The people or groups that have a vested interest in the
outcome of the project.
Risk A risk is defined as an uncertain event or condition that, if it
occurs, has a positive or negative affect on a project's
objectives. An uncertain event that may affect the
performance objectives (i.e., cost, schedule, scope or
quality) of an investment, usually negatively.
Duration PMI PMBOK defines duration as the total number of work
periods required completing a schedule activity or WBS
component, usually expressed as work days or work
weeks.
Activity An activity is a term used by the SDN to distinguish a
service that is provided by the SDN within a particular
service that is being accessed by users.
Milestone A significant point or event in the project.
Page 16 of 19
Fingerprint Lock System
APPENDIX
D: SUMMARY OF SPENDING
Development &
Implementation of
Project:
Budgetary Resources $ 20,00 $ 10,00 $ 50,00 $ 22,00 $102,00
Operations &
Maintenance:
Budgetary Resources $ 10,00 $ 20,00 $ 10,00 $ 8,00 $48,00
Page 17 of 19
Fingerprint Lock System
APPENDIX
Government FTE cost $ 1,00 $ 2,00 $ 10,00 $ 10,00 $23,00
Page 18 of 19