Professional Documents
Culture Documents
ARDUINO
Ebina, Frederick C.
Montejo, Aurelio B.
1 Overview 1
1.1 Scope 1
1.2 Identification 1
1.3 System Overview 1
1.3.1 Operational Concept 1
1.3.2 Computer Software Configuration Items 1
1.4 Relationship to Other Plans 1
2 Reference Documents 2
3 Overview of Software Development Planning 2
3.1 Requirements and Development 2
3.2 Project Documentation 2
3.3 System Life Cycle 2
3.4 Schedules and Resources 3
3.5 Training Requirements 3
4 General Software Development Activities 3
4.1 Development Process 3
4.2 Development Methods 3
4.3 Product Standards 3
4.4 Reusable Products 3
4.4.1 Incorporating Reusable Products 3
4.4.2 Developing Reusable Products 3
4.5 Critical Requirements 3
4.6 Computer Hardware Resource Utilization 4
5 Detailed Software Development Activities 4
5.1 Project Planning and Oversight 4
5.2 Establishing a Software Development Environment 4
5.3 System Requirements Analysis 4
5.4 System Design 5
5.5 Software Requirements Analysis 5
5.6 Software Design 5
5.7 Software Implementation and Test/Code and Unit Test 5
5.8 Software Integration and Testing 5
5.9 System Integration and Testing 6
5.10 System Acceptance Test 6
5.11 Preparing for Software Use 6
5.11.1 Preparing for Software Transition 7
5.12 Software Configuration Management 7
5.13 Software Product Evaluation 7
5.14 Software Quality Assurance 7
5.15 Corrective Action 8
5.16 Technical and Management Reviews 8
5.17 Other Software Development Activities 8
6 Schedules and Activity Network 8
7 Program Organization and Resources 8
8 User Definitions 9
This project is about creating a classroom biometric security and energy saving
switch using Arduino. This switch will be used to control the lights, fans, and other
appliances in the classroom. The switch will use biometric authentication for security,
and will provide energy saving features to reduce electricity consumption and cost. The
system will consist of an Arduino controller, a biometric scanner, and a relay switch. The
Arduino will be used to read the user’s biometric information from the scanner,
authenticate the user, and then activate the relay switch to control the lights, fans, and
other appliances. The Arduino will also monitor the energy consumption and adjust the
settings accordingly to reduce electricity consumption. The system will be easy to install
and use, and will provide an extra layer of security in the classroom. It will also help
reduce costs by cutting down on electricity consumption. This project will be a great way
to promote energy efficiency and security in the classroom.
1.1 Scope
. This project is to design and develop a classroom biometric security and energy
saving switch system using Arduino. The system will use fingerprint recognition to
identify the user and provide access to the classroom. The user will be able to turn on
the lights when they enter the classroom and the lights will be switched off automatically
when they leave the classroom. The system will also include an energy saving feature
that will turn off the lights after a certain amount of time if the user has not left the
classroom. The system will be designed to be user friendly and secure. It will also be
designed in a way that it can be easily integrated into existing classrooms.
1.2 Identification
ACLC College of Bukidnon, Classroom biometric Security and Energy Saving Switch
using Arduino Uno
Version 1.0 Series of 2022
1.3 System Overview
The Classroom Biometric Security and Energy Saving Switch Using Arduino
System is a system that combines biometric security and energy conservation in order
to optimize the efficiency of classrooms. This system uses an Arduino Uno board and a
fingerprint scanner to detect a user’s identity, and then uses an energy saving switch to
activate or deactivate the power to the classroom’s lights, fans, and other electrical
systems. The system begins with a fingerprint scanner. This scanner is used to detect
the user’s identity, and the scanner is connected to the Arduino Uno board via the I2C
communication protocol. The Arduino Uno is programmed to detect the fingerprint and
compare it to the user’s identity stored in the system’s database. Once the user’s
identity is verified, an energy saving switch is used to activate or deactivate the power to
the classroom’s lights, fans, and other electrical systems. The energy saving switch is
connected to the Arduino board via a relay, and the relay is used to control the power to
the classroom’s lights, fans, and other electrical systems. When the switch is activated,
the Arduino board sends a signal to the relay, which then turns on the power to the
classroom’s lights, fans, and other electrical systems. When the switch is deactivated,
the Arduino board sends a signal to the relay, which then turns off the power to the
classroom’s lights, fans, and other electrical systems. The system also uses a light
sensor to detect the amount of natural light in the classroom, and the light sensor is
connected to the Arduino Uno board via the analog input port. The Arduino board is
programmed to detect the amount of natural light in the classroom and then adjust the
power to the classroom’s lights, fans, and other electrical systems accordingly. This
ensures that the classroom’s lights, fans, and other electrical systems are only used
when necessary. The system also uses a temperature sensor to detect the temperature
in the classroom, and the temperature sensor is connected to the Arduino Uno board
via the analog input port. The Arduino board is programmed to detect the temperature in
the classroom and then adjust the power to the classroom’s lights, fans, and other
electrical systems accordingly. This ensures that the classroom’s lights, fans, and other
electrical systems are only used when necessary. Finally, the system is connected to a
computer via a USB port. This allows users to monitor the system’s performance and
adjust accordingly. The system also allows users to add or delete users from the
system’s database and view reports on energy consumption. Classroom Biometric
Security and Energy Saving Switch Using Arduino System is an efficient way to ensure
the security of classrooms while also conserving energy. The system is easy to install
and maintain, and provides an effective way to ensure the safety and security of
classrooms.
The development of a biometric security and energy saving switch using an Arduino is
closely linked to hardware development plans. The Arduino board serves as the central
control unit for the biometric security system, and its programming language is used to
create the logic and functions necessary to operate the system. The hardware design of
the energy-saving switch must be tailored to the specific requirements of the biometric
security system and must be able to effectively detect various biometric characteristics
and provide the necessary security features. Additionally, the energy-saving switch
must also be designed to be energy-efficient and able to automatically detect when the
system is not in use and reduce power consumption. By utilizing the same hardware
platform, the Arduino board, for both the biometric security and energy-saving switch,
the development efforts will be more streamlined and the overall cost of the system will
be reduced.
Configuration and data management plans (CDMP)
The hardware components required for this system are Arduino board, motion
detector, light sensor, and a relay switch. The Arduino board will be used as the main
processor, which will be responsible for running the main program code. The motion
detector will be used to detect motion in the area and trigger the light sensor. The light
sensor will be used to detect the amount of light in the room and determine if the lights
need to be turned on or off. The relay switch will be used to control the lights based on
the light sensor’s reading.
2 Reference Documents
This section lists the number, title, revision, and date of all documents referenced in this
plan.
NUMBER TITLE REVISION DATE
Project plans 1
Operational 1
procedures
Engineering 1
instructions
The tool(s) used to produce this project documentation are Microsoft Word its help you
organize and write documents more efficiently, second one is Microsoft Excel enables
users to format, organize and calculate data in a spreadsheet and PDF.
.
This section describes the Classroom Biometric Security and Energy Saving Switch
using Arduino
Requirment
Analysis
Implementatio
Designing
n
Software
Developemn
t Cycle
Testing Coding
● Requirement Analysis
• Classroom Biometric Security: The system should be able to detect and
verify the identity of a person entering the classroom and provide
appropriate access to the classroom.
• Energy Saving Switch: The system should be able to detect the
presence of people in the classroom and switch off the lights and other
appliances when the room is empty.
• Arduino: The system should be able to use an Arduino microcontroller to
control the biometric security feature and energy saving switch.
● Implementation/Coding
● In this stage the components will code all the necessary implementations
needed for the completion of the system. The database needed for the
website will also be connected to the website for the security and record of
the website.
● Testing
For testing the classroom biometric security and energy saving switch using
Arduino, you should first check the power supply of the Arduino board. Ensure that it
is connected to a reliable power source and that the voltage is within the required
range. Next, connect the Arduino board to a PC and upload the code. Once the code
is uploaded, you should run the code and check if the biometric security system is
working correctly. For example, if you have set a certain threshold for authentication,
it should be successfully authenticated. Once the biometric security system is
working correctly, you can test the energy saving switch. First, connect the switch to
the Arduino board and upload the code. Then, you can test the switch by turning on
and off the power. Make sure that the switch is working correctly and that the energy
saving mechanism is activated when the switch is turned on. Finally, check if the
Arduino board is working correctly and that all connections are secure. Then, you
can test the entire system again to ensure that everything is working properly.
● Deployment
The deployment of a classroom biometric security and energy saving switch
using Arduino can be done in the following steps:
1. Setting up the Arduino board: The first step is to set up the Arduino board. This will
involve connecting the board to a power source, installing the necessary software, and
connecting the board to the network.
2. Setting up the biometric security system: The next step is to set up the biometric
security system. This will involve connecting the fingerprint reader and other biometric
components to the Arduino board.
3. Setting up the energy-saving switch: The third step is to set up the energy-saving
switch. This will involve connecting the switch to the Arduino board and programming it
to turn off the lights or other devices when the classroom is not in use.
4. Setting up the network: The fourth step is to set up a network connection between the
Arduino board and the classroom's computers. This will involve connecting the Arduino
board to the classroom's Wi-Fi router and configuring the router to allow the Arduino
board to access the classroom's computers.
5. Programming the Arduino board: The final step is to program the Arduino board with
the necessary code. This will involve writing the code to enable the biometric security
system and the energy-saving switch to work together.
This section provides the detailed schedule for the project. The schedule depicts the
assigned personnel as well as the critical path and any critical dependencies.
This section defines the software development training requirements for the project
software engineers.
Software:
1. Python - it is a powerful programming language that is simple to learn. It has
efficient high-level data structures and an object-oriented programming
technique that is simple but effective. Python will be used as the system's
backend language, assisting with hardware management.
2. React Native - is an open-source UI software framework. It allows developers
to use the React framework alongside native platform features to create apps
for Android, Android TV, iOS, macOS, tvOS, Web, Windows, and UWP.
React native will be used for the front end of the students’ mobile application
and the windows application for the faculty’s monitoring of classroom.
3. NodeJs - this is a JavaScript runtime that will act as the backend server and
is based on Chrome's V8 JavaScript engine. This will take care of sending
and receiving data to and from the database.
4. MySQL - is a relational database management system that is open-source.
This is where we store all the data collected.
Hardware:
1. Arduino uno - is a Microchip ATmega328P microcontroller-based open-
source microcontroller board. The board includes digital and analog
input/output pins that can be used to connect to expansion boards and other
devices. This is the main hardware of the system.
2. Fingerprint Sensor Module - these modules have FLASH memory to store
fingerprints and work with any TTL serial microcontroller or system. The
fingerprints will be registered and retrieved using this module.
3. TFT Touch Screen Display - is a combination device that includes a TFT LCD
display and a touch technology overlay on the screen. The device can both
display content and act as an interface device for the instructor to modify the
data for the information of the classroom.
4. Electrical Relay - are electrically operated switches that open and close the
circuits by receiving electrical signals from outside sources. This will be used
to attain an energy saving classroom.
5. LCD - the liquid crystal display is an electrical display device that works by
changing the optical properties of a layer of liquid crystal by applying varied
electric voltage to it. This gadget creates the layout or interface for the big-
screen display of information about classrooms.
6. Personal Computer - it's a general-purpose computer whose size,
capabilities, and initial sale price make it suitable for individuals, and it's
designed to be operated directly by the end-user without the need for a
computer operator. The employees will utilize this to gain access to the data
and manipulate it.
This section describes the software development process to be used. It also identifies
planned software builds, their objectives, and the software development activities to be
performed in each build.
Specifically, the researchers aim the following objectives:
Coding, testing, and operations are all progressing in the second semester. The
coding is already underway at the start of the semester. At this point, the website's
design is complete, and its functionalities are being added. The languages utilized here
are JavaScript, CSS, and HTML. If any faults or errors are discovered during the testing
phase, the website will go through a re-coding step and be checked once more until the
intended result is obtained. The testing part of the process is when we test if there are
bugs and errors if it is deployed in the environment. Last but not least, the operation
phase, during which we will launch the website in a real-world setting for student use,
For the security of the data in the database, website maintenance is necessary after it
has been deployed.
This section describes the approach to be followed for identifying, evaluating, and
incorporating reusable software products, including the scope of the search for such
products and the criteria to be used for their evaluation.
This project introduces a classroom security and energy saving switch using
Arduino, incorporating reusable products. The security aspect of the project involves a
biometric scanner integrated with a secure access control list (ACL). This biometric
scanner is used to authenticate the user, who is then given access to the classroom.
The energy saving aspect of the project is implemented by using an Arduino-based
programmable time switch, which can be programmed to turn off the lights and other
appliances when the classroom is not in use. The project also uses reusable
components such as a breadboard, a power supply module, a relay, and LED lights.
This section describes the approach to be followed for identifying, evaluating, and
reporting opportunities for developing reusable software products.
The project proposes to develop a classroom biometric security and energy saving
switch using Arduino which will be a device that can be used to secure a classroom, as
well as save energy by switching off the lights and other appliances when the classroom
is not in use. The device will be designed and programmed using Arduino, and will
include a biometric scanner. The biometric scanner will be used to identify authorized
users and grant them access to the classroom. It will also be able to detect when the
room is empty and will switch off the lights and other appliances. The device will be
reusable and can be used in different classrooms with minimal setup time. It will be
powered by a rechargeable battery. The project has the potential to save energy,
reduce electricity bills and provide better security in classrooms.
● Safety assurance
This project aims to develop a classroom biometric security and energy
saving switch using Arduino. The system will be designed to ensure the safety of
the students and staff in the classroom by using biometric authentication. It will
also be designed to save energy by automatically turning off the lights and other
electrical appliances when the classroom is not in use. Also provide a secure and
energy efficient classroom environment for students and staff. It will also help to
reduce the amount of energy consumed in the classroom, thus helping to reduce
the school’s utility bills.
● Security assurance
The proposed system is designed to provide a secure and energy efficient
classroom environment. The system uses a biometric security system to
authenticate users and a switch to control the energy consumption of the
classroom. The biometric security system uses an Arduino microcontroller to
read and store the biometric data of the user. The data is then compared with the
stored data to authenticate the user. The switch is used to control the energy
consumption of the classroom. The switch is connected to the Arduino
microcontroller and is programmed to turn off the lights and other appliances
when the user leaves the classroom. This helps to reduce the energy
consumption and save energy. The system also provides a secure environment
as only authenticated users can access the classroom.
● Privacy assurance
should be provided to all users of the biometric security and energy saving
switch, informing them of their rights and responsibilities regarding the use of the
biometric data.
● Assurance of other critical requirements
In order to ensure the security and energy saving of the ACLC classroom
biometric security and energy saving switch using Arduino, the following critical
requirements must be met:
1. User authentication: The system must be able to authenticate the user and
verify their identity before allowing access to the classroom.
2. Data security: The system must be able to protect the data stored in the
system from unauthorized access.
3. Access control: The system must be able to control who has access to the
classroom and when they can access it.
4. Energy efficiency: The system must be able to reduce energy consumption by
automatically turning off lights and other appliances when not in use.
5. Reliability: The system must be reliable and able to withstand any
environmental conditions.
6. Maintenance: The system must be easy to maintain and troubleshoot.
7. User interface: The system must have an intuitive user interface that is easy to
use.
8. Cost-effectiveness: The system must be cost-effective and provide value for
money.
4.6 Computer Hardware Resource Utilization
This project aims to develop a classroom biometric security and energy saving
switch using Arduino. The system will be able to detect the presence of authorized
personnel in the classroom and will be able to control the lighting and other electrical
appliances in the classroom. The system will also be able to save energy by
automatically switching off the lights and other electrical appliances when the classroom
is empty.
1. Designing the system architecture: This involves designing the overall system
architecture, including the hardware and software components, and the communication
protocols between them.
2. Developing the user interface: This involves designing the user interface for the
system, including the user interface for the biometric authentication, the energy saving
switch, and the control panel.
3. Developing the biometric authentication system: This involves developing the
software for the biometric authentication system, including the algorithms for facial
recognition, fingerprint recognition, and iris recognition.
4. Developing the energy saving switch: This involves developing the software for the
energy saving switch, including the algorithms for detecting motion and controlling the
power supply.
5. Developing the control panel: This involves developing the software for the control
panel, including the algorithms for controlling the system and displaying the status of the
system.
6. Testing and debugging: This involves testing the system to ensure that it is working
properly and debugging any errors that may occur.
7. Deployment: This involves deploying the system in the classroom and ensuring that it
is working properly.
5.1 Project Planning and Oversight
This section describes the approach to be followed for project planning and oversight.
Step 1: Research and Select a Biometric Security and Energy Saving Switch The
first step in the transition process is to research and select a biometric security
and energy saving switch that meets the needs of the classroom. Consider
factors such as cost, features, and compatibility with existing systems.
Step 2: Install the Biometric Security and Energy Saving Switch Once a switch
has been selected, the next step is to install the switch. This may involve wiring
the switch, connecting it to the existing network, and configuring the settings.
Step 3: Train Staff and Students Once the switch has been installed, it is
important to train staff and students on how to use the switch. This may include
providing instructions on how to use the switch, as well as providing information
on the security and energy saving features of the switch.
Step 4: Monitor and Adjust Once the switch is up and running, it is important to
monitor its performance and adjust settings as needed. This may involve making
changes to the security settings or energy saving features.
Step 5: Evaluate and Adjust Finally, it is important to evaluate the performance of
the switch and adjust as needed. This may involve making changes to the
security settings or energy saving features, or even replacing the switch if it is not
meeting the needs of the classroom.
● Following and updating plans, including the intervals for management review
1. Establish a timeline for the project, including the start date, end date, and any
milestones in between.
2. Identify the resources needed for the project, including personnel, materials,
and equipment.
3. Develop a budget for the project, including any costs associated with
personnel, materials, and equipment.
4. Create a project plan, including the tasks that need to be completed, the
order in which they should be completed, and the estimated time for each task.
5. Develop a risk management plan, including potential risks and strategies for
mitigating them.
6. Establish a communication plan, including who will be responsible for
communicating project updates to stakeholders.
7. Set up a system for tracking progress, including the metrics that will be used
to measure success.
8. Schedule regular management reviews of the project, including the intervals
at which they should take place.
9. Develop a plan for evaluating the success of the project, including any metrics
that will be used to measure success.
10. Develop a plan for transitioning the project to operational status, including
any steps that need to be taken to ensure a successful transition.
5.2 Establishing a Software Development Environment
This section describes the approach to be followed for establishing, controlling, and
maintaining a software development environment.
● Operational concept
The operational concept of the ACLC classroom biometric security and
energy saving switch using Arduino is quite simple. The system consists
of an Arduino board, which is the main control unit, and a biometric
sensor, which is used to identify the user. The user will first place their
finger on the biometric sensor, which will then scan their fingerprint to
identify the user. If the user is recognized, the Arduino will then activate
the switch and allow the user to turn on or off the light or device connected
to it. The switch will remain active for a certain amount of time, and then
automatically shut off after that time has elapsed. This will help to
conserve energy and ensure that the classroom is secure. The Arduino
board will also be connected to a computer, which will allow the user to
access the system remotely. The user can then access the settings and
adjust the settings according to their needs. This will help to ensure that
the system remains secure and efficient.
● System requirements
• Hardware:
1. Arduino Uno Board
2. Fingerprint Sensor
3. Relay Module
4. DC 12V Adaptor
5. Push Button
6. LEDs
• Software:
1. Arduino IDE
2. Processing Software (Optional)
3. Microsoft Office (Optional)
This section describes the approach to be followed for participating in system design.
The figure above is the activity diagram Fingerprint Sensor: The sensor is the first
block of the biometric system which collects all the important data for biometrics. It is
the interface between the system and the real world. Typically, it is an image
acquisition system, but it depends on the features or characteristics required that it
has to be replaced or not.
Pre-processing: It is the second block that executes all the pre-processing. Its
function is to enhance the input and to eliminate artifacts from the sensor, background
noise, etc. It performs some kind of normalization.
Feature extractor: This is the third and the most important step in the biometric
system. Extraction of features is to be done to identify them at a later stage. The goal
of a feature extractor is to characterize an object to be recognized by measurements.
Template generator: The template generator generates the templates that are used
for authentication with the help of the extracted features. A template is a vector of
numbers or an image with distinct tracts. Characteristics obtained from the source
groups come together to form a template. Templates are being stored in the database
for comparison and serve as input for the match.
Matcher: The matching phase is performed by the use of a match. In this part, the
procured template is given to a matcher that compares it with the stored templates
using various algorithms such as Hamming distance, etc. After matching the inputs,
the results will be generated.
6 Application device: It is a device that uses the results of a biometric system. The
Iris recognition system and facial recognition system are some common examples of
application devices.
TYPE SPECIFICATION
RAM 4GB
Storage 20 GB
Display 800x600
Hardware Specifications
TYPE SPECIFICATION
Operating System Windows 8 or later OS
Software Specifications
TYPE SPECIFICATION
Network 3G/4G/Wi-Fi
• Classroom Biometric Security: The system should be able to detect and verify
the identity of a person entering the classroom and provide appropriate access to
the classroom.
• Energy Saving Switch: The system should be able to detect the presence of
people in the classroom and switch off the lights and other appliances when the
room is empty.
• Arduino: The system should be able to use an Arduino microcontroller to control
the biometric security feature and energy saving switch.
This section describes the approach to be followed for software design. It also defines
the entrance and exit criteria for the software design process.
Star
t Biometric
Feature Extraction
Sensor
Test
Fingerprin
Matching
t ID:1789
Output
The Figure 5.6.1 above is the conceptual design of how using an Arduino Uno, the
system will be able to record and store an instructor's fingerprints. The data will be
linked to a database and used for biometric security. The database will reflect when
teachers and authorized users enter the classroom
Systems
Biometric
activates the
electricity inside
Unlocks Door the classroom
Manage Class
Info
● The system's detailed design is shown in the graphic above. Our actors are the
instructors, use biometrics to unlock doors, and assign class information to that
classroom. Students will view the information provided by the lecturer.
5.7 Software Implementation and Test/Code and Unit Test
This section describes the approach to be followed for software code and unit testing. It
also defines the entrance and exit criteria for the software code and unit test processes.
● Software code
//This code is for the Arduino based ACLC classroom biometric security and
energy saving switch.
//Define the pins to be used int switchPin = 2; int ledPin = 13; int biometricPin = 3;
//Setup the Arduino void setup() { pinMode(switchPin, INPUT); pinMode(ledPin,
OUTPUT); pinMode(biometricPin, INPUT); }
//Main loop void loop() { //Read the switch state int switchState =
digitalRead(switchPin); //Read the biometric state int biometricState =
digitalRead(biometricPin);
//If the switch is on and the biometric is authenticated, turn on the LED if
(switchState == HIGH && biometricState == HIGH) { digitalWrite(ledPin, HIGH); }
//Otherwise, turn off the LED else { digitalWrite(ledPin, LOW); } }
The first step in analyzing and recording unit test results is to determine the
objectives of the test. This will help to ensure that the test is designed to
accurately measure the performance of the system. Once the objectives are
established, the test should be designed to measure the performance of the
system in a variety of conditions. This will help to identify any potential problems
or areas of improvement. Once the test is designed, the results should be
recorded. This can be done by using a spreadsheet or other data collection tool.
The data should include the test conditions, the performance of the system, and
any other relevant information. This data should then be analyzed to identify any
areas of improvement or potential problems. Finally, the results should be
compared to the objectives of the test. This will help to identify any areas where
the system is not meeting the desired performance goals. Once any potential
problems or areas of improvement are identified, corrective action can be taken
to improve the system.
This section describes the software integration activities that focus on integrating
all the software components into a software element that will be further integrated with
the other elements to form the systems.
● Preparing for integration and testing: This includes the preparation of the test
environment, the development of test plans, the selection of test cases, and the
preparation of test data.
● Performing integration and testing: This includes the execution of the test cases, the
comparison of the test results with the expected results, and the identification of any
discrepancies.
● Revision and retesting: This includes the revision of the software components to fix
any discrepancies, the retesting of the revised components, and the verification of the
revised components.
● Analyzing and recording integration and test results: This includes the analysis of the
test results, the identification of any issues, and the recording of the results.
This section describes the approach to be followed for preparing for software
use.
Preparing the Executable Software This involves compiling the source code, creating
the executable and packaging it into a format that is suitable for distribution. This
includes creating an installation program, if necessary.
Preparing Version Descriptions for User Sites This involves creating a version
description that includes any changes made to the software, such as bug fixes, feature
additions, etc. The version description should also include instructions on how to install
and use the software.
Preparing User Manuals This involves creating user manuals that provide step-by-
step instructions on how to install and use the software. The user manual should also
include troubleshooting information and contact information for technical support.
Installing at User Sites This involves physically installing the software at the user
sites. This includes setting up the necessary hardware and any other required
components.
This section describes the approach to be followed for preparing for software transition.
Software transition consists of the preparation of all software files, including source and
executables, for delivery, and updating the final version descriptions. All files will be
identified and verified via recompilation and/or reference checking after that component
has successfully passed the required testing and been placed into controlled libraries
for inclusion in the software build.
● Preparing the executable software: The executable software must be tested and
verified according to the system requirements and the software requirements specified
in the software requirements specification. Any errors or discrepancies found should be
corrected and the executable software must be updated accordingly.
● Preparing source files: All source files associated with the software must be
identified, verified and stored in controlled libraries. Any discrepancies found should be
corrected and the source files must be updated accordingly.
● Preparing version descriptions for the support site: A version description must
be created and stored in the designated support site. This description must include the
version number, date, and the changes and/or improvements made to the software
since the last version.
● Preparing the “as-built” CSCI design and other software support information:
The “as-built” CSCI design must be prepared and stored in the designated support site.
This design should include all of the software components, their interfaces, and the
system architecture. Other software support information should also be prepared and
stored in the designated support site. This includes the software requirements, design
documents, test plans, and system diagrams.
● Updating the system design description: The system design description must be
updated to reflect the changes and/or improvements made to the software since the last
version.
● Preparing support manuals: The support manuals must be prepared and stored in
the designated support site. These manuals should include the software user manual,
installation guide, release notes, and other relevant information.
● Transitioning to the designated support site: The software must be transitioned to
the designated support site for storage and distribution. All files should be transferred to
the support site and the version description should be updated on the support site.
This section describes the approach to be followed for software CM. The CM processes
and procedures are described in the CDMP.
Configuration Identification This process will be used to identify and document all
software components of the project. All components of the system and their versions
will be identified and documented to ensure that the configuration of the system is
known. Configuration Control Configuration control is used to ensure that changes to
the system are made in a controlled manner. This includes the review and approval of
all changes to the system. The change control process will be used to track and control
all changes to the system.
Configuration Status Accounting Configuration status accounting is used to keep
track of the changes that have been made to the system. This process will be used to
ensure that all changes are documented and tracked.
Configuration Audits Configuration audits are used to verify the accuracy of the
system configuration. Audits will be conducted to ensure that the system is following the
project requirements.
Packaging, Storage, Handling, and Delivery Packaging, storage, handling, and
delivery processes are used to ensure that the system is properly packaged and stored
for delivery. This process will be used to ensure that the system is properly handled and
delivered to the customer.
This section describes the approach to be followed for software product evaluation.
Software product evaluation will be accomplished according to the program schedules
established for the project.
In-process and final software product evaluation: In-process and final software
product evaluation will be conducted during the development and implementation of the
software product. The software product evaluation will be conducted by a team of
experts who are knowledgeable in the area of software development and security. The
evaluation will include a review of the software product requirements, design, code, and
documentation. The product will be evaluated for compliance with the security
requirements, performance, scalability, and usability.
Software product evaluation records: The software product evaluation will be
documented and stored in the project’s records. The records will include items such as
the evaluation team, criteria used for the evaluation, findings, and recommendations.
Independence in software product evaluation: The software product evaluation will
be conducted by a team of experts who are independent of the development team. The
evaluation team will have the necessary knowledge and experience required to evaluate
the software product. The evaluation team will be selected based on their experience
and qualifications.
This section describes the approach to be followed for software quality assurance (QA).
Software Quality Assurance (QA) is a process of ensuring that the software
developed meets the requirements and is of high quality. This process includes
software development, testing, and quality control. The main objectives of software QA
are to ensure that the software meets the customer’s requirements, is of high quality
and is defect free.
Software QA process involves the following:
● Identifying the requirements of the software
● Developing the software
● Testing the software
● Monitoring the software for defects
● Providing feedback to the developers
● Ensuring that the software meets the customer’s requirements
Product evaluations involve assessing the software to determine if it meets the
customer’s requirements, is of high quality, and is defect free. This process includes
analyzing the software’s design, functionality, usability, and performance.
Software QA records should include the following items:
● Product requirements
● Software design
● Test plans
● Test results
● Defects and their resolution
This section describes the approach to be followed for corrective actions (i.e.,
problem/change reports, etc.).
1Problem/change reports should be submitted to the appropriate team leader or
supervisor.
2. The team should investigate the issue and conduct root cause analysis to
determine a corrective action.
3. The team should develop an action plan to address the issue and submit it to
the appropriate stakeholders for approval.
4. Once approved, the action plan should be implemented and monitored to
ensure effectiveness.
5. If the corrective action is not effective, the team should reassess the issue and
develop a new action plan.
6. The team should document all corrective action taken to ensure the issue is
resolved and to help prevent future occurrences.
This section describes the approach to be followed for technical and management
reviews.
1. Technical Review: The technical review will involve a comprehensive review of
the design and implementation of the proposed system. This will include a review of the
hardware, software, user interface, system architecture, data access, and security. The
review will assess the system's ability to meet the requirements and objectives outlined
in the project and evaluate the system's performance and reliability.
2. Management Review: The management review will focus on the project's cost,
schedule, and quality objectives. This review will assess the project's progress in
meeting the objectives and determine the necessary resources and strategies to
achieve them. The review will also consider the project's risk management, resource
allocation, and cost/benefit analysis.
This section describes the approach to be followed for other software development
activities.
● Risk Management: Risk management is an essential part of any software
development. By performing a risk analysis and assessment, potential risks can be
identified and managed. This includes identifying known risks and corresponding
strategies to mitigate them.
● Software Management Indicators: Software management indicators are
important to evaluate the progress, performance and quality of the project. Some of the
indicators that can be used include complexity, size, errors, defects, development time,
cost, and user satisfaction.
● Security and Privacy: Security and privacy are extremely important when
developing a software application. The application should be designed to protect the
users’ data and to ensure that their privacy is respected.
● Subcontractor Management: Subcontractors can be used to outsource certain
tasks in order to save time and money. It is important to manage subcontractors
properly in order to ensure that the tasks are completed on time and with high quality.
● Interface with Software Independent Verification and Validation Agents:
Software independent verification and validation agents can be used to review the
software and ensure that it is functioning correctly.
● Coordination with Associate Developers: Coordination with associate
developers is essential in order to ensure that tasks are completed on time and with
high quality.
● Improvement of Project Processes: It is important to continually review and
improve project processes in order to ensure that the project is running smoothly. This
includes reviewing the software development process and identifying areas where
improvements can be made.
6 Schedules and Activity Network
This section presents the schedule information or refers to detailed software schedules
published for the project, including:
Activity Network: Activity
1: Develop Arduino 6 program and test Activity
2: Design and Implement Biometric Security and Energy Saving Switch Activity
3: Create and Test the Prototype Activity
4: Test and Validate the Performance Activity
5: Finalize the Documentation
Activity 1 → Activity 2 → Activity 3 → Activity 4 → Activity 5
Schedule: Activity Start Date End Date
1. Develop Arduino 6 program and test September 23 Oct 15, 2022
2. Design and Implement Biometric Security and Energy Saving Switch September 26
Oct 18 ,2022
3. Create and Test the Prototype November 6 November 21, 2022
4. Test and Validate the Performance November 28 November 29 2022
5. Finalize the Documentation January 5 January 6 2023
7 Program Organization and Resources
This section describes the project organization and resources to be applied in each
software build, increment, iteration, or prototype.
Figure 1: Title
8 User Definitions