You are on page 1of 9

Business Parking

Kevin Allen, Ismael Arafath, Bryan Avila and Jesus Ortha

Abstract—The abstract goes here. XI Activity Diagram 4


XI-A Diagram . . . . . . . . . . . . . . . . . 4
C ONTENTS
XI-B Description . . . . . . . . . . . . . . . . 4
I Introduction 2
I-A Purpose . . . . . . . . . . . . . . . . . . 2 XII Object Diagram 4
I-B Scope . . . . . . . . . . . . . . . . . . . 2
XII-A Diagram . . . . . . . . . . . . . . . . . 4
I-C Overview . . . . . . . . . . . . . . . . . 2
XII-B object diagram: as shown in figure The
II General Description 2 system already has variables assigned,
II-A Product Perspective . . . . . . . . . . . 2 the operation basically works in this
II-B Product Functionality . . . . . . . . . . 2 way the employee registers the vehicle
with its respective data after this he
III Constraints 2 makes a record of the entry and exit
date, the reason for the visit and is
IV Assumptions and Dependencies 3 assigned an access ID . . . . . . . . . . 5
V Foreseeable System Evolution 3
XIII Component Diagram 5
VI Functional Requirements 3 XIII-A Diagram . . . . . . . . . . . . . . . . . 5
VI-A Functional Requierment 1 . . . . . . . . 3 XIII-B component diagram: the first diagram
VI-B functional Requierment 2 . . . . . . . . 3 shows the vehicle entry activity where
VI-C functional Requierment 3 . . . . . . . . 3 the safe simulates the system or where
VI-D functional Requierment 4 . . . . . . . 3 the actions are carried out, initially the
VI-E functional Requierment 5 . . . . . . . . 3 employee arrives at the parking lot and
VI-F functional Requierment 6 . . . . . . . 3 requests to enter the parking lot, and the
security checks the system your access
VII Non-Functional Requirements 3 credential, after that the entry of the em-
VII-A Non Functional Requierment 1 . . . . . 3 ployee and the vehicle data are recorded. 5
VII-B Non functional Requierment 2 . . . . . 3
VII-C Non functional Requierment 3 . . . . . 3
VII-D Non functional Requierment 4 . . . . . 3 XIV State Diagram 5
VII-E Non functional Requierment 5 . . . . . 3 XIV-A Diagram . . . . . . . . . . . . . . . . . 5
VII-F Non functional Requierment 6 . . . . . 3 XIV-B State diagram: In the same way as the
VII-G Non functional Requierment 7 . . . . . 3 previous diagram, the action to be car-
VII-H Non functional Requierment 8 . . . . . 3 ried out is to enter the parking lot, hav-
VII-I Non functional Requierment 9 . . . . . 3 ing as a difference the different states
VII-J Non functional Requierment 10 . . . . 3 in which the entry process is carried
out, we begin with the subsequent en-
VIII Use case Diagram 4 try request and the employee’s data is
VIII-A Diagram . . . . . . . . . . . . . . . . . 4 checked. The data is verified and ap-
VIII-B Description . . . . . . . . . . . . . . . . 4 proved as valid to enter, it is processed
to register the vehicle and it passes to
IX Class diagram 4 the registered status, finally the entry
IX-A Diagram . . . . . . . . . . . . . . . . . 4 record and the reason are created and
IX-B description . . . . . . . . . . . . . . . . 4 they end up as registered. . . . . . . . . 5
X Secuence Diagram 4
X-A Diagram . . . . . . . . . . . . . . . . . 4 XV Colaboration Diagram 5
X-B Description . . . . . . . . . . . . . . . . 4 XV-A Diagram . . . . . . . . . . . . . . . . . 5
XV-B Collaboration diagram: This diagram A. Purpose
describes step by step the activity to be For the purpose of this software, it will be registiring vehicle
carried out in this case, the assignment information, as well as the person in the vehicle entering the
of a role, mainly the administrator is the parking, this implementing a credential per employee. We
only one with the level to perform this will also implement a database that will be containing all
action, first start the system, select the the information will be provided for secure management and
role interface, assigns the role id, the reporting all the vehicles at this business.
role name and the permissions it will
have and registers the necessary role. . 5 B. Scope
• Improvment on vehicular access control: This way, we
XVI Binnacle 5
prevent unauthorized entry.
XVI-A Purpose . . . . . . . . . . . . . . . . . 5
• Facilitating visitor management.
XVII Screens 6 • History and auditing: A complete history is available that
XVII-A Log in . . . . . . . . . . . . . . . . . . 6 can be audited if necessary regarding vehicular access
activities.
XVII-B Main Screen . . . . . . . . . . . . . . . 6
• Maintaining order within the facilities.
XVII-C Access . . . . . . . . . . . . . . . . . . 6
• Improvement on the automatization between the entry and
XVII-D Record . . . . . . . . . . . . . . . . . . 6
the information from the vehicle and person in it.
XVII-E Rol . . . . . . . . . . . . . . . . . . . . 6
XVII-F Exit . . . . . . . . . . . . . . . . . . . . 6 C. Overview
XVII-G Continuous Improvement . . . . . . . . 6
This system is being developed to be user-friendly and
XVIII Data Base 7 straightforward, providing a complete atomatization between
XVIII-A Collection . . . . . . . . . . . . . . . . 7 users and this software and the users that will be interacting
with it. We will provide a easy to analize and use interface that
XIX Final Product 7 will show all information from vehicular access and users that
XIX-A Log in . . . . . . . . . . . . . . . . . . 7 are inside each one of them, this preventing from non-intended
XIX-B Menu . . . . . . . . . . . . . . . . . . . 7 users or people that a risk the company.
XIX-C Register . . . . . . . . . . . . . . . . . 7 II. G ENERAL D ESCRIPTION
XIX-D Access . . . . . . . . . . . . . . . . . . 7
XIX-E Access Credential . . . . . . . . . . . . 7 A. Product Perspective
XIX-F Event . . . . . . . . . . . . . . . . . . . 8 The Business Parking Manager System is a predefined soft-
XIX-G Rol . . . . . . . . . . . . . . . . . . . . 8 ware, that it’s designed to be the solution for non-authorized
XIX-H Employee . . . . . . . . . . . . . . . . 8 people in the facilities, as well, as managing all information
XIX-I Vehicular count . . . . . . . . . . . . . 8 from users entering the parking. This software is susceptible
to improvements in future periods
XX User manual 8
XX-A Log in . . . . . . . . . . . . . . . . . . 8 B. Product Functionality
XX-B Menu . . . . . . . . . . . . . . . . . . . 8 This software will check the entries and exits from the
XX-C Register . . . . . . . . . . . . . . . . . 8 parking, this will be implemented by a code scanner or a card
XX-D Access . . . . . . . . . . . . . . . . . . 8 reader , which will send the information of the user to a data
XX-E Access Credential . . . . . . . . . . . . 8 base, as follow the information is stored on the database for
XX-F Event . . . . . . . . . . . . . . . . . . . 9 futher checking into non-authorized personal.
XX-G Rol . . . . . . . . . . . . . . . . . . . . 9
XX-H Employee . . . . . . . . . . . . . . . . 9 III. C ONSTRAINTS
XX-I Vehicular count . . . . . . . . . . . . . 9 • Programming Languages: Since the application will be
developed exclusively for computer usage, we will be
I. I NTRODUCTION using Python as our principal languaje.

I N this document we have intended to present our first


progress through this subject class that is Programming in
Client-Server Environment. The pourpose of this document is
• Hardware: The system will operate exclusively on a
singular interface, machine to computer interaction, an
employee will check on the computer database for infor-
to detail the funtional and non-functional requierments of the mation recovery as well, as detailed information of the
software we will develope through this course. The software service.
that in this case will be presented is automatic business parking • Operating System: The application should be compatible
manager, that will help with the entrys at the business in all with recent and popular versions of windows, it’s made
means. intentionally for windows 10 and foward.
• Specific Standards: All transactions and storage of per- E. functional Requierment 5
sonal data must comply with data protection regulations Reports and Statistics: It should generate reports on park-
such as GDPR and other local privacy laws. ing usage, including data such as average occupancy, generated
• Development Methodologies: An agile methodology, revenue, and usage trends.
such as Scrum, will be adopted for software development,
with regular iterations and reviews. F. functional Requierment 6
• Platform Limitations: Since Python will be used, the
Event registration: the case or event to which the external
inherent limitations of our python knowledge platform
authorization was given will be recorded.
must be considered, also as system permissions, and the
variety of devices and screen sizes. VII. N ON -F UNCTIONAL R EQUIREMENTS
IV. A SSUMPTIONS AND D EPENDENCIES A. Non Functional Requierment 1
• Operating System Availability: It’s assumed that the most Security: The system must ensure the security and protec-
recent versions of the mentioned operating systems will tion of user information. It must comply with applicable data
be available and dominant in the market during the privacy regulations.
software’s development and release.
• Network Infrastructure: It is presumed that the parking
has a stable and secure network infrastructure, essential B. Non functional Requierment 2
for real-time operations like information consultation. Availability: The system should be available 24/7 to ensure
• Third-Party Providers: The system might rely on third- constant access to the parking area.
party hardware, that can help with streamline the flow of
information itself. C. Non functional Requierment 3
• User Adoption: It is expected that users (like security
personal), to adopt this system, for easy managment, and Performance: The system should handle a high volume of
numerous task inside the system. entry and exit transactions without performance degradation.

V. F ORESEEABLE S YSTEM E VOLUTION D. Non functional Requierment 4


• Expansion to Other Locations: If the system y well imple- Scalability: It should be scalable to accommodate an in-
mented as well, being functional at it’s work enviroment, crease in the number of users and vehicles.
it can be implemented in various facilities from the same
business or reach for other companies. E. Non functional Requierment 5
• Possible to upgrade: We will keep the software managable Usability: The user interface must be intuitive and user-
for future upgrades, that could be implemented to auto- friendly for both users and administrators.
mate the process through diferent modes.
F. Non functional Requierment 6
VI. F UNCTIONAL R EQUIREMENTS
Maintenance and Support: There should be a plan for on-
A. Functional Requierment 1 going maintenance and support to address issues and perform
User Registration: The system must allow users to register updates.
and create personal or company accounts, providing informa-
tion such as name, contact and vehicle details. G. Non functional Requierment 7
Compatibility: The system should be compatible with
B. functional Requierment 2 various card reader devices.

Entry and Exit: Must be able to efficiently record vehi- H. Non functional Requierment 8
cle entry and exit, whether through key cards, license plate
Energy Efficiency:If applicable, the system should mini-
recognition, or other methods.
mize the energy consumption of the devices used.
C. functional Requierment 3
I. Non functional Requierment 9
Access control: It must ensure that only authorized users
have access to the parking facilities, using secure methods Legal Compliance: The system must comply with local
such as access cards. laws and regulations related to parking and personal data
management.
D. functional Requierment 4
Availability management: It should maintain a real-time J. Non functional Requierment 10
record of available parking spaces and display this information Data Backup: Regular data backups should be performed
to users. to prevent the loss of important information.
VIII. U SE CASE D IAGRAM X. S ECUENCE D IAGRAM
A. Diagram
A. Diagram

B. Description
The employee hands over the access card to the guard,
and the guard checks in the system whether it’s valid in the
database. The system returns the data and either accepts or
B. Description
denies access, informing the guard. The guard then informs
In the first scenario, the employee requests registration, pro- the employee whether entry has been accepted or not.
vides personal information and vehicle details to be registered XI. ACTIVITY D IAGRAM
in their name. Security records it in the database and assigns
a parking space, allowing entry to the parking area. A. Diagram
In the second scenario, the employee requests access, pro-
vides an access card, waits for confirmation from security,
accepts entry, and proceeds to the parking area to their
assigned parking space. In the third scenario, the employee
hands over the access card, security records the exit, and the
employee exits the parking area.

IX. C LASS DIAGRAM B. Description


In the first activity, The employee arrives at the parking
A. Diagram area. The employee hands over the access credential. Security
scans the card. If access is granted, security informs and allows
entry. If access is denied, the reason is communicated, an event
is recorded, and access is refused.
In the second activity, The employee requests registration.
Security receives the request. Security consults with the com-
pany. If accepted, security requests employee and vehicle
information, assigns a parking space, and issues an access
card. If not accepted, the reason is communicated, access
is denied, and the employee is advised to verify with the
company.
In the third activity, A visitor arrives and requests access.
Security checks if there is a scheduled visit. If there is
a scheduled visit, security asks for the reason, records the
reason, assigns a parking space, and grants access. If there
B. description is no scheduled visit, the visitor is informed, and access is
denied.
The employee is allowed to request access using the pro-
XII. O BJECT D IAGRAM
vided access credential, and this same employee, depending
on the situation, provides reasons for the visit, whether it’s an A. Diagram
entry or a visit.
When requesting access, the event is recorded in the system,
including event description and data. Upon entry, the count
of vehicle entries is recorded. The security role, in this case,
security itself, grants or denies access.
B. object diagram: as shown in figure The system already has B. Collaboration diagram: This diagram describes step by
variables assigned, the operation basically works in this way step the activity to be carried out in this case, the assignment
the employee registers the vehicle with its respective data after of a role, mainly the administrator is the only one with the
this he makes a record of the entry and exit date, the reason level to perform this action, first start the system, select the
for the visit and is assigned an access ID . role interface, assigns the role id, the role name and the
permissions it will have and registers the necessary role.
XIII. C OMPONENT D IAGRAM
Index Terms—IEEE, IEEEtran, journal, LATEX, paper, tem-
plate.
A. Diagram
XVI. B INNACLE
A. Purpose
The purpose is to provide a comprehensive an detailed
information about our process developing this app as well,
showing our incidents and how can we improve futher in
development.This documentation serves as a tool for contin-
uous improvement. By critically analyzing our development
process, we can identify strengths and areas for enhancement.
B. component diagram: the first diagram shows the vehicle This introspective approach not only benefits the ongoing
entry activity where the safe simulates the system or where project but also contributes to refining our overall development
the actions are carried out, initially the employee arrives at practices.
the parking lot and requests to enter the parking lot, and the In addition to documenting challenges and successes, this
security checks the system your access credential, after that resource aims to be a reference guide for future projects.
the entry of the employee and the vehicle data are recorded. It provides insights into decision-making processes, design
choices, and development strategies, empowering future teams
XIV. S TATE D IAGRAM to make informed decisions based on our experiences.

A. Diagram Week 1 : When designing the login we utilized certain


libraries for the ease of functions. We added a button that
could execute and verify the data in the textboxes, allowing
us to log in and also we used this section to select it from
the folder and place it in that specific part. We placed the
labels on the screen in the same way. For the textboxes,
it was made to show what goes in that textbox to make it
easier for the user, and it disappears when we start typing in it.
B. State diagram: In the same way as the previous diagram,
the action to be carried out is to enter the parking lot, having Week 2 : When designing the interface, we based it on
as a difference the different states in which the entry process is a basic registration system for handling this information as
carried out, we begin with the subsequent entry request and the well as immediate query capabilities. Labels were added
employee’s data is checked. The data is verified and approved to provide context to the user about the actions they can
as valid to enter, it is processed to register the vehicle and it perform with this application. And the other screens, it
passes to the registered status, finally the entry record and the was exactly the same, a reordering and updating of names
reason are created and they end up as registered. and positions, which, likewise, did not cause any incidents.
Instead, it facilitated the programming of them, something
XV. C OLABORATION D IAGRAM that, once we finish the programming entirely, will probably
have a bit more design added so that they are not so similar,
A. Diagram
also adding a background and a more elaborate company logo.

Week 3 : In the creation of the main screen, it shows


6 options, including the option to log out. Clicking on any
button takes us to the corresponding screen, thanks to the call
we make to another file in the same folder.

Week 4 : For the creation of the database, we first


created the eight entities. After this, in each entity, we
created a document and proceeded to fill the entities with
their respective attributes. This process was repeated for each believe this is due to the lack of a database since we don’t
entity. have a place to register the data.

XVII. S CREENS D. Record


A. Log in
includegraphics[scale=0.25]registro.png
Incidents: The error in creating this screen was that we first
created the content, then attempted to apply the design, which,
upon doing so, wiped out all the content on the screen. This
was resolved by changing the frame of the color we intended
to use.

E. Rol

Incidents: First of all, in order to work on this project, we


had to research how to program with Python using Tkinter,
as we had never done it before or at least not extensively.
The first thing we did was the login, a necessary screen for
most programs to log in with different users. To some extent,
it was easy because the application we used (Visual Studio
Code) indicated when we needed a dependency/library to use
certain functions for program editing.

B. Main Screen
Incidents: There were no incidents with this screen.

F. Exit

Incidents: The only issue here is that the buttons aren’t fully
displayed depending on the screen resolution where it’s
running. This is resolved by changing the project’s geometry. :
There were no incidents with this screen.
C. Access
G. Continuous Improvement
Lessons Learned: Reflection on incidents and challenges,
extracting key lessons for future projects. Best Practices:
Identification and documentation of successful strategies and
practices employed during development. Feedback Mecha-
nisms: Establishing feedback loops for team members to share
insights, suggestions, and critiques. Design Decisions: Details
on the decisions made during the planning phase regarding the
integration of a database and the overall program architecture.
Database Integration: A step-by-step account of integrating
the database into the application, addressing challenges, and
Incidents: An issue we have here is that when we enter the implementing best practices. User Training: Strategies for user
data in the text boxes and click the register button, it still training to adapt to changes introduced by the integrated
doesn’t show in the viewer we have below the text boxes. We database and refined program design.
XVIII. DATA BASE B. Menu
A. Collection

Buttons for the new screens were added in this screen, as,
according to the requirements, more functional screens were
incorporated. Each button directs to its respective screen.
The rest of us decided to use mongoDB since it has Data
Schema Flexibility which means that it does not require a
fixed schema like relational databases. This provides flexibility
C. Register
to adapt to changes in project requirements without needing to
modify the database structure. Another important point why
we selected MongoDB is that it offers a complete set of fea-
tures, such as automatic replication, partitioning, and disaster
recovery, which are essential for client-server environments
seeking high availability and reliability.

In this screen, which already existed previously, the upper part


where the buttons are located was edited, adding the missing
ones. Textboxes were also added, including: vehicleID, brands,
model, and color, as these are the data recorded for the vehicle
in the database.

D. Access

We change from a nosql database manager to a sql database


manager and rebuild the database in postgresql.
To create the database, we first create the eight entities. Similar to the other screens, the upper part was edited.
After this, in each entity we proceeded to fill the entities with Textboxes for Credential, vehicle, and entry date were added
their respective attributes. This process was repeated for each here; the access card was changed only to Access ID.
entity.
Incidents: lack of mongodb domain for this reason we
changed the database manager E. Access Credential
XIX. F INAL P RODUCT
A. Log in

This was one of the new screens added, where an access


credential is assigned to employees, providing them with an
No changes or incidents. access level and a status, indicating whether it is active or not.
F. Event XX. U SER MANUAL
A. Log in

In this screen, the event ID was added to identify which one


it is, the access of the person entering, the reason, role, and We enter the username and then the administrator password
additional details if necessary. B. Menu

G. Rol

This will send you to the menu where you can choose which
screen to go to, choose the one you prefer or the one you
need.
C. Register

There were minimal changes in this screen, where the names


of the variables were modified to identify them more easily.

H. Employee

On this screen we enter the data of the vehicle that is going


to enter the parking lot and proceed to save the information
by pressing the new registration button.
D. Access

In the employee screen, an ID is assigned along with their


data, as well as the ID of their respective role.

I. Vehicular count

For this screen, the entry of the previously registered vehicle


is recorded and its entry date is recorded.
E. Access Credential

In this last screen, the registration of the entered vehicles is


done, as well as the registration of the person who entered, to
keep track of the number of people inside the parking lot.
In general, there were no incidents, as most of the function-
alities were already implemented. The credential that will be used to enter the parking lot is
registered.
F. Event

For this screen, the fields are filled out for an event that takes
place in the company, for example an audit.
G. Rol

For this screen, the role that the employee will have and their
permissions are recorded.
H. Employee

The new user is registered with their personal data and the
role they will have.
I. Vehicular count

For this screen the number of vehicles already registered


increases.

You might also like