You are on page 1of 7

Business Parking

Kevin Allen, Ismael Arafath, Bryan Avila and Jesus Ortha

Abstract—The abstract goes here. XI Activity Diagram 4


XI-A Diagram . . . . . . . . . . . . . . . . . 4
C ONTENTS
XI-B Description . . . . . . . . . . . . . . . . 4
I Introduction 2
I-A Purpose . . . . . . . . . . . . . . . . . . 2 XII Object Diagram 4
I-B Scope . . . . . . . . . . . . . . . . . . . 2
XII-A Diagram . . . . . . . . . . . . . . . . . 4
I-C Overview . . . . . . . . . . . . . . . . . 2
XII-B object diagram: as shown in figure The
II General Description 2 system already has variables assigned,
II-A Product Perspective . . . . . . . . . . . 2 the operation basically works in this
II-B Product Functionality . . . . . . . . . . 2 way the employee registers the vehicle
with its respective data after this he
III Constraints 2 makes a record of the entry and exit
date, the reason for the visit and is
IV Assumptions and Dependencies 2 assigned an access ID . . . . . . . . . . 4
V Foreseeable System Evolution 3
XIII Component Diagram 4
VI Functional Requirements 3 XIII-A Diagram . . . . . . . . . . . . . . . . . 4
VI-A Functional Requierment 1 . . . . . . . . 3 XIII-B component diagram: the first diagram
VI-B functional Requierment 2 . . . . . . . . 3 shows the vehicle entry activity where
VI-C functional Requierment 3 . . . . . . . . 3 the safe simulates the system or where
VI-D functional Requierment 4 . . . . . . . 3 the actions are carried out, initially the
VI-E functional Requierment 5 . . . . . . . . 3 employee arrives at the parking lot and
VI-F functional Requierment 6 . . . . . . . 3 requests to enter the parking lot, and the
security checks the system your access
VII Non-Functional Requirements 3 credential, after that the entry of the em-
VII-A Non Functional Requierment 1 . . . . . 3 ployee and the vehicle data are recorded. 5
VII-B Non functional Requierment 2 . . . . . 3
VII-C Non functional Requierment 3 . . . . . 3
VII-D Non functional Requierment 4 . . . . . 3 XIV State Diagram 5
VII-E Non functional Requierment 5 . . . . . 3 XIV-A Diagram . . . . . . . . . . . . . . . . . 5
VII-F Non functional Requierment 6 . . . . . 3 XIV-B State diagram: In the same way as the
VII-G Non functional Requierment 7 . . . . . 3 previous diagram, the action to be car-
VII-H Non functional Requierment 8 . . . . . 3 ried out is to enter the parking lot, hav-
VII-I Non functional Requierment 9 . . . . . 3 ing as a difference the different states
VII-J Non functional Requierment 10 . . . . 3 in which the entry process is carried
out, we begin with the subsequent en-
VIII Use case Diagram 3 try request and the employee’s data is
VIII-A Diagram . . . . . . . . . . . . . . . . . 3 checked. The data is verified and ap-
VIII-B Description . . . . . . . . . . . . . . . . 3 proved as valid to enter, it is processed
to register the vehicle and it passes to
IX Class diagram 4 the registered status, finally the entry
IX-A Diagram . . . . . . . . . . . . . . . . . 4 record and the reason are created and
IX-B description . . . . . . . . . . . . . . . . 4 they end up as registered. . . . . . . . . 5
X Secuence Diagram 4
X-A Diagram . . . . . . . . . . . . . . . . . 4 XV Colaboration Diagram 5
X-B Description . . . . . . . . . . . . . . . . 4 XV-A Diagram . . . . . . . . . . . . . . . . . 5
XV-B Collaboration diagram: This diagram C. Overview
describes step by step the activity to be This system is being developed to be user-friendly and
carried out in this case, the assignment straightforward, providing a complete atomatization between
of a role, mainly the administrator is the users and this software and the users that will be interacting
only one with the level to perform this with it. We will provide a easy to analize and use interface that
action, first start the system, select the will show all information from vehicular access and users that
role interface, assigns the role id, the are inside each one of them, this preventing from non-intended
role name and the permissions it will users or people that a risk the company.
have and registers the necessary role. . 5
II. G ENERAL D ESCRIPTION
XVI Binnacle 5
A. Product Perspective
XVI-A Purpose . . . . . . . . . . . . . . . . . 5
The Buissness Parking Manager System is a predefined soft-
XVII Screens 5 ware, that it’s designed to be the solution for non-authorized
XVII-A Log in . . . . . . . . . . . . . . . . . . 5 people in the facilities, as well, as managing all information
from users entering the parking. This software is susceptible
XVII-B Main Screen . . . . . . . . . . . . . . . 6
to improvements in future periods
XVII-C Access . . . . . . . . . . . . . . . . . . 6
XVII-D Record . . . . . . . . . . . . . . . . . . 6 B. Product Functionality
XVII-E Rol . . . . . . . . . . . . . . . . . . . . 6 This software will check the entries and exits from the
XVII-F Exit . . . . . . . . . . . . . . . . . . . . 6 parking, this will be implemented by a code scanner or a card
XVII-G Continuous Improvement . . . . . . . . 6 reader , which will send the information of the user to a data
base, as follow the information is stored on the database for
XVIII Data Base 6 futher checking into non-authorized personal.
XVIII-A Collection . . . . . . . . . . . . . . . . 6
III. C ONSTRAINTS
I. I NTRODUCTION • Programming Languages: Since the application will be
developed exclusively for computer usage, we will be

I N this document we have intended to present our first


progress through this subject class that is Programming in
Client-Server Environment. The pourpose of this document is

using Python as our principal languaje.
Hardware: The system will operate exclusively on a
singular interface, machine to computer interaction, an
to detail the funtional and non-functional requierments of the employee will check on the computer database for infor-
software we will develope through this course. The software mation recovery as well, as detailed information of the
that in this case will be presented is automatic buissnes parking service.
manager, that will help with the entrys at the buissnes in all • Operating System: The application should be compatible
means. with recent and popular versions of windows, it’s made
intentionally for windows 10 and foward.
A. Purpose • Specific Standards: All transactions and storage of per-
sonal data must comply with data protection regulations
For the purpose of this software, it will be registiring vehicle
such as GDPR and other local privacy laws.
information, as well as the person in the vehicle entering the
• Development Methodologies: An agile methodology,
parking, this implementing a credential per employee. We
such as Scrum, will be adopted for software development,
will also implement a database that will be containing all
with regular iterations and reviews.
the information will be provided for secure management and
• Platform Limitations: Since Python will be used, the
reporting all the vehicles at this buissnes.
inherent limitations of our python knowledge platform
must be considered, also as system permissions, and the
B. Scope variety of devices and screen sizes.
• Improvment on vehicular access control: This way, we
prevent unauthorized entry. IV. A SSUMPTIONS AND D EPENDENCIES
• Facilitating visitor management. • Operating System Availability: It’s assumed that the most
• History and auditing: A complete history is available that recent versions of the mentioned operating systems will
can be audited if necessary regarding vehicular access be available and dominant in the market during the
activities. software’s development and release.
• Maintaining order within the facilities. • Network Infrastructure: It is presumed that the parking
• Improvement on the automatization between the entry and has a stable and secure network infrastructure, essential
the information from the vehicle and person in it. for real-time operations like information consultation.
• Third-Party Providers: The system might rely on third- C. Non functional Requierment 3
party hardware, that can help with streamline the flow of Performance: The system should handle a high volume of
information itself. entry and exit transactions without performance degradation.
• User Adoption: It is expected that users (like security
personal), to adopt this system, for easy managment, and D. Non functional Requierment 4
numerous task inside the system. Scalability: It should be scalable to accommodate an in-
crease in the number of users and vehicles.
V. F ORESEEABLE S YSTEM E VOLUTION
• Expansion to Other Locations: If the system y well imple- E. Non functional Requierment 5
mented as well, being functional at it’s work enviroment, Usability: The user interface must be intuitive and user-
it can be implemented in various facilities from the same friendly for both users and administrators.
buissnes or reach for other companies.
• Possible to upgrade: We will keep the software managable F. Non functional Requierment 6
for future upgrades, that could be implemented to auto- Maintenance and Support: There should be a plan for on-
mate the process through diferent modes. going maintenance and support to address issues and perform
updates.
VI. F UNCTIONAL R EQUIREMENTS
A. Functional Requierment 1 G. Non functional Requierment 7
User Registration: The system must allow users to register Compatibility: The system should be compatible with
and create personal or company accounts, providing informa- various card reader devices.
tion such as name, contact and vehicle details. H. Non functional Requierment 8
Energy Efficiency:If applicable, the system should mini-
B. functional Requierment 2 mize the energy consumption of the devices used.
Entry and Exit: Must be able to efficiently record vehi- I. Non functional Requierment 9
cle entry and exit, whether through key cards, license plate
recognition, or other methods. Legal Compliance: The system must comply with local
laws and regulations related to parking and personal data
C. functional Requierment 3 management.
Access control: It must ensure that only authorized users J. Non functional Requierment 10
have access to the parking facilities, using secure methods
such as access cards. Data Backup: Regular data backups should be performed
to prevent the loss of important information.
D. functional Requierment 4
VIII. U SE CASE D IAGRAM
Availability management: It should maintain a real-time
record of available parking spaces and display this information A. Diagram
to users.
E. functional Requierment 5
Reports and Statistics: It should generate reports on park-
ing usage, including data such as average occupancy, generated
revenue, and usage trends.
F. functional Requierment 6
Event registration: the case or event to which the external
authorization was given will be recorded.
B. Description
VII. N ON -F UNCTIONAL R EQUIREMENTS In the first scenario, the employee requests registration, pro-
A. Non Functional Requierment 1 vides personal information and vehicle details to be registered
Security: The system must ensure the security and protec- in their name. Security records it in the database and assigns
tion of user information. It must comply with applicable data a parking space, allowing entry to the parking area.
privacy regulations. In the second scenario, the employee requests access, pro-
vides an access card, waits for confirmation from security,
accepts entry, and proceeds to the parking area to their
B. Non functional Requierment 2 assigned parking space. In the third scenario, the employee
Availability: The system should be available 24/7 to ensure hands over the access card, security records the exit, and the
constant access to the parking area. employee exits the parking area.
IX. C LASS DIAGRAM B. Description
A. Diagram
In the first activity, The employee arrives at the parking
area. The employee hands over the access credential. Security
scans the card. If access is granted, security informs and allows
entry. If access is denied, the reason is communicated, an event
is recorded, and access is refused.
In the second activity, The employee requests registration.
Security receives the request. Security consults with the com-
pany. If accepted, security requests employee and vehicle
information, assigns a parking space, and issues an access
card. If not accepted, the reason is communicated, access
is denied, and the employee is advised to verify with the
company.
In the third activity, A visitor arrives and requests access.
B. description Security checks if there is a scheduled visit. If there is
a scheduled visit, security asks for the reason, records the
The employee is allowed to request access using the pro-
reason, assigns a parking space, and grants access. If there
vided access credential, and this same employee, depending
is no scheduled visit, the visitor is informed, and access is
on the situation, provides reasons for the visit, whether it’s an
denied.
entry or a visit.
When requesting access, the event is recorded in the system,
including event description and data. Upon entry, the count
of vehicle entries is recorded. The security role, in this case,
XII. O BJECT D IAGRAM
security itself, grants or denies access.

X. S ECUENCE D IAGRAM A. Diagram


A. Diagram

B. object diagram: as shown in figure The system already has


B. Description variables assigned, the operation basically works in this way
the employee registers the vehicle with its respective data after
The employee hands over the access card to the guard, this he makes a record of the entry and exit date, the reason
and the guard checks in the system whether it’s valid in the for the visit and is assigned an access ID .
database. The system returns the data and either accepts or
denies access, informing the guard. The guard then informs
the employee whether entry has been accepted or not. XIII. C OMPONENT D IAGRAM

XI. ACTIVITY D IAGRAM


A. Diagram
A. Diagram
B. component diagram: the first diagram shows the vehicle In addition to documenting challenges and successes, this
entry activity where the safe simulates the system or where resource aims to be a reference guide for future projects.
the actions are carried out, initially the employee arrives at It provides insights into decision-making processes, design
the parking lot and requests to enter the parking lot, and the choices, and development strategies, empowering future teams
security checks the system your access credential, after that to make informed decisions based on our experiences.
the entry of the employee and the vehicle data are recorded.
XIV. S TATE D IAGRAM Week 1 : When designing the login we utilized certain
libraries for the ease of functions. We added a button that
A. Diagram could execute and verify the data in the textboxes, allowing
us to log in and also we used this section to select it from
the folder and place it in that specific part. We placed the
labels on the screen in the same way. For the textboxes,
it was made to show what goes in that textbox to make it
easier for the user, and it disappears when we start typing in it.
B. State diagram: In the same way as the previous diagram, Week 2 : When designing the interface, we based it on
the action to be carried out is to enter the parking lot, having a basic registration system for handling this information as
as a difference the different states in which the entry process is well as immediate query capabilities. Labels were added
carried out, we begin with the subsequent entry request and the to provide context to the user about the actions they can
employee’s data is checked. The data is verified and approved perform with this application. And the other screens, it
as valid to enter, it is processed to register the vehicle and it was exactly the same, a reordering and updating of names
passes to the registered status, finally the entry record and the and positions, which, likewise, did not cause any incidents.
reason are created and they end up as registered. Instead, it facilitated the programming of them, something
XV. C OLABORATION D IAGRAM that, once we finish the programming entirely, will probably
A. Diagram have a bit more design added so that they are not so similar,
also adding a background and a more elaborate company logo.

Week 3 : In the creation of the main screen, it shows


6 options, including the option to log out. Clicking on any
button takes us to the corresponding screen, thanks to the call
we make to another file in the same folder.

Week 4 : For the creation of the database, we first


created the eight entities. After this, in each entity, we
created a document and proceeded to fill the entities with
B. Collaboration diagram: This diagram describes step by their respective attributes. This process was repeated for each
step the activity to be carried out in this case, the assignment entity.
of a role, mainly the administrator is the only one with the XVII. S CREENS
level to perform this action, first start the system, select the
A. Log in
role interface, assigns the role id, the role name and the
permissions it will have and registers the necessary role.
Index Terms—IEEE, IEEEtran, journal, LATEX, paper, tem-
plate.

XVI. B INNACLE
A. Purpose
The purpose is to provide a comprehensive an detailed
information about our process developing this app as well,
showing our incidents and how can we improve futher in
development.This documentation serves as a tool for contin- -Incidents: First of all, in order to work on this project, we
uous improvement. By critically analyzing our development had to research how to program with Python using Tkinter,
process, we can identify strengths and areas for enhancement. as we had never done it before or at least not extensively.
This introspective approach not only benefits the ongoing The first thing we did was the login, a necessary screen for
project but also contributes to refining our overall development most programs to log in with different users. To some extent,
practices. it was easy because the application we used (Visual Studio
Code) indicated when we needed a dependency/library to use E. Rol
certain functions for program editing.

B. Main Screen

Incidents: There were no incidents with this screen.


F. Exit
Incidents: The only issue here is that the buttons aren’t fully
displayed depending on the screen resolution where it’s
running. This is resolved by changing the project’s geometry.

C. Access

Incidents: There were no incidents with this screen.


G. Continuous Improvement
Lessons Learned: Reflection on incidents and challenges,
extracting key lessons for future projects. Best Practices:
Identification and documentation of successful strategies and
Incidents: An issue we have here is that when we enter the practices employed during development. Feedback Mecha-
data in the text boxes and click the register button, it still nisms: Establishing feedback loops for team members to share
doesn’t show in the viewer we have below the text boxes. We insights, suggestions, and critiques. Design Decisions: Details
believe this is due to the lack of a database since we don’t on the decisions made during the planning phase regarding the
have a place to register the data. integration of a database and the overall program architecture.
Database Integration: A step-by-step account of integrating
D. Record the database into the application, addressing challenges, and
implementing best practices. User Training: Strategies for user
training to adapt to changes introduced by the integrated
database and refined program design.
XVIII. DATA BASE
A. Collection

Incidents: The error in creating this screen was that we


first created the content, then attempted to apply the design,
which, upon doing so, wiped out all the content on the screen. The rest of us decided to use mongoDB since it has Data
This was resolved by changing the frame of the color we Schema Flexibility which means that it does not require a
intended to use. fixed schema like relational databases. This provides flexibility
to adapt to changes in project requirements without needing to
modify the database structure. Another important point why
we selected MongoDB is that it offers a complete set of fea-
tures, such as automatic replication, partitioning, and disaster
recovery, which are essential for client-server environments
seeking high availability and reliability.

You might also like