Professional Documents
Culture Documents
Abstract: Uom Ibm Ms (Tech) 7 Semester
Abstract: Uom Ibm Ms (Tech) 7 Semester
1. ABSTRACT
2. INTRODUCTION
• provide all deliverables identified in section 1.1.3 by the project due date
• this project will deliver only the software components of the larger project
• initial estimates for the project as provided in this SPMP are +/- 40%
• the larger project that this project is a part of has already defined the
hardware that the software will run on
• the ATM hardware is defined (4th generation NCR ATM hardware) and
detaileddocumentation about the platform will be delivered to Terasoft by
June 1, 2004.
• budget
Project Deliverables
• Software documentation
Installation documentation
End-user documentation
updates applied to NNB’s central bank documentation
• Project documentation
Start-up Plan
Estimation Plan
Schedule, Cost, and Resource Estimates: An estimation chart
showing activities, estimated duration, estimated cost, and estimated
resource requirements.
Estimation methods
Schedule duration and work estimation for each leaf activity in the
Work Breakdown Structure (WBS) will be performed using a
combination of the following methods and data sources:
o Resource input
WORK PLAN
5. PROJECT ORGANIZATION
5.1 PROCESS MODEL
PROJECT RESPONSIBILITIES
PROGRAM MANAGER - The Project Manager shall be responsible for
defining and controlling project work activities and schedules. Other
team members shall work in conjunction with the project manager to
define the elements of their task assignments, establish a schedule
Performance Reporting
The project will report performance to plan with the following metrics:
Earned Value
Budgeted Cost of Work Scheduled (BCWS) vs. Budgeted Cost of
Work
Performed (BWCP)
Schedule Variance (CV)
Budgeted Cost of Work Performed (BCWP) vs. Actual Cost of
Work
Performance (ACWP)
Cost Variance (CV)
Cost Performance Index (CPI)
Schedule Performance Index (SPI)
Critical Ratio (CR)
Estimated Cost at Completion (ECAC)
Estimated Time at Completion (ETAC)
Requirements
Requirements change count
Configuration
Configuration churn
Quality
Open defects vs. closed defects over time
Lines of code (LOC)
Comment percentage
Defects per LOC
Risks
Risk exposure
Top 10 risks
Weekly risk changes
Development methodology
Development techniques
The requirement passed down to this project from the larger ATM
project is that the software be based on an open architecture using
a Windows NT-based platform and Windows Open Services
Architecture / eXtensions for Financial Services (WOSA/XFS). This
architecture allows us to use object-oriented methods and tools for
analysis, design, and implementation. We will use Object Modeling
Technique (OMT) for this purpose.
Tools
The following work categories will have their work products satisfied
by the identified tools:
Team member desktop foundation
Microsoft Windows 2000 desktop operating system
VMWare Workstation 4.5 [virtual machine support – one VM
per active project]
Microsoft Office 2003 productivity application suite
IBM Lotus Notes R6 [e- mail, calendar]
MindJet MindManager X5 Pro [information organization,
brainstorming]
Adobe Acrobat 6.0 [creating/viewing PDF files]
ATM Management system-Biometric ATM , a Proposal - 13 -
UOM IBM MS (Tech) 7th Semester
Project management
Microsoft Project 2003 [WBS, schedule/cost estimates,
resource planning, project
control]
Best Carpe Diem [electronic time sheet]
Tera metric [internally-developed metrics collection database]
Document publishing (applies to all documents published by
the project)
Microsoft Word 2003 [document preparation and revision]
Configuration Management & Change Management
IBM Rational Clear Case LT [version control]
IBM Rational Clear Quest [defect and change tracking]
Quality
Terametric [internally-developed metrics collection database]
Requirements
IBM Rational RequisitePro [requirements tracking]
Design
IBM Rational Rose Data Modeler [database design]
IBM Rational Rose Technical Developer [use cases, non
database software design]
Implementation
Microsoft Visual C++ [programming language, development
tools and object code generation]
Windows Software Development Kit (SDK) [programming
support]
Testing
entity issuing the card and, in some cases, the client can then change
it at his/her convenience. The card and the PIN are directly related to
the user identification and allow for the utilization of electronic
channels just like as is the case with the ATMs.
Transaction Functionality
We have described the various elements that intervene in an ATM
transaction, the card and the ATM components. Figure 1 shows the
sequence of events involved in the authorization process together with
the functionality of the central authorization system to which the ATM
is connected.
Biometric Technology
The term biometrics comes from the word bio (life) and metric
(measurement). Biometric equipment has the capability to measure,
codify, compare, store, transmit, and/or recognize a specific
characteristic of a person with a high level of precision and
trustworthiness. Biometric technology is based on the scientific fact
that there are certain characteristics of living forms that are unique
and not repetitive for each individual; these characteristics represent
the only technically viable alternative to positively identify a person
Without the use of other forms of identification more susceptible to
fraudulent behavior
Restricted in the past due to its high cost and lack of social
acceptance, biometric identification is now experiencing a higher level
of acceptance not only in high security applications such as banks and
governmental facilities, but also in health clubs, sports events, office
and industrial sites. Costs have been reduced to a reasonable level and
functionality and reliability of the devices is today satisfactory.
Learning. Each time the user utilizes the system the template is
updated through learning processes taking into account gradual
changes due to age and physical growth. These are later utilized by
the system to determine whether to grant or deny access.
There are a lot of benefits which can be obtained from the synergistic
effect of offering welfare and pension payments through biometrics-
equipped bank ATM networks:
1. Government could reduce its cost and provide a more efficient and
timely service to its constituents.
2. Banks, other financial institutions and retailers could increase the
volume and reduce their ATM unit transaction costs; increase their
revenues by charging the government agencies for the service; and
expand their potential customer base.
ATM Management system-Biometric ATM , a Proposal - 25 -
UOM IBM MS (Tech) 7th Semester
information from the customer's card and the PIN the customer
entered.
If the bank reports that the customer's PIN is invalid, the Invalid PIN
extension will be performed and then an attempt will be made to
continue the transaction. If the customer's card is retained due to too
many invalid PINs, the transaction will be aborted, and the customer
will not be offered the option of doing another.
All messages to the bank and responses back are recorded in the
ATM's log.
original request is sent to the bank again. If the bank now approves
the transaction, or disapproves it for some other reason, the original
use case is continued; otherwise the process of re-entering the PIN is
repeated. Once the PIN is successfully re-entered, it is used for both
the current transaction and all subsequent transactions in the session.
If the customer fails three times to enter the correct PIN, the card is
permanently retained, a screen is displayed informing the customer of
this and suggesting he/she contact the bank, and the entire customer
session is aborted.
This interface is the very first interface the bank customer interacts
with on the ATM machine. This interface prompts the customer to
insert ATM card and proceeds with the entire authentication processes,
that is, inputting the ID (or card number) and PIN number (see figure
3). If the user enters an invalid card number or PIN number, a
dialogue box appears prompting an invalid PIN or invalid card number
and the system returns enter a valid PIN number. A typical description
of this is shown in figure 4. After validating the customer’s card and
PIN number, the customer is directed to the next phase of the
authentication process via the authentication dialogue box for
inputting the fingerprint. LOGIN INTERFACE
Fingerprint Interface
dialogue box for which the customer can choose Ok, and as soon as
this done the system automatically log off the customer.
Withdrawal Interface
This interface enables the customer withdraw money from his/her
account. It shows the customers current balance by subtracting the
amount withdrawn from the previous account balance. After the
customer has completed all his/her withdrawals, a dialogue box pops
up notifying the customer of his/her successful withdrawal transaction.
The interface is shown below.
a. An agent requests all rooms for a given date that are available
2. Display all of the available rooms for a certain date with certain criteria
a. When agent signs in, all reservations for days passed are purged and the screen
displays the number of reservations purged and their id’s and dates
4. Agent creates new reservation for a certain number of rooms for a certain
number of days
5. Agent deletes reservation from system (must remove all days and rooms)
b. Number of beds and types of beds are specified (includes pull out couch)
e. Kitchenette present
b. The bill needs to detail the cost of the room, taxes and any fees incurred
a. Need for the back up of the files each time you open and save them
USECASE DIAGRAM
What is Risk?
Risk is defined as "The possibility of suffering harm or loss; danger." Even if we're not
familiar with the formal definition, most of us have an innate sense of risk. We are aware
of the potential dangers that permeate even simple daily activities, from getting injured
when crossing the street to having a heart attack because our cholesterol level is too high.
Although we prefer not to dwell on the myriad of hazards that surround us, these risks
shape many of our behaviors. Experience (or a parent) has taught us to look both ways
before stepping off the curb and most of us at least think twice before ordering a steak.
Indeed, we manage personal risks every day.
Making a list of all of the potential dangers that will affect the project
Assessing the probability of occurrence and potential loss of each item listed
1. PROPERTY
Fire and Explosion
Security
Environment
2. PEOPLE
ATM Management system-Biometric ATM , a Proposal - 50 -
UOM IBM MS (Tech) 7th Semester
Key personnel
3. OPERATIONAL
Business interruption
Project risk
IT and communications
Product liability
Catastrophe recovery
Regulatory compliance
4. COMMERCIAL
Legal liability
Industry risks
Financial risk
Political risk
Corporate reputation
Services liability
Personnel Shortfalls
- Coming up with techniques and strategies to mitigate the highest ordered risks
- Implementing the strategies to resolve the high order risks factors
- Monitoring the effectiveness of the strategies and the changing levels of risk
throughout the project
incentives;
team-building;
training;
peer reviews
design to cost;
incremental development;
software reuse;
requirements descoping;
mission analysis;
ops-concept formulation;
user surveys;
prototyping;
design/develop to cost
Design recovery;
Restructuring
Prototyping;
scenarios;
ATM Management system-Biometric ATM , a Proposal - 54 -
UOM IBM MS (Tech) 7th Semester
Qualification testing;
benchmarking;
prototyping;
reference checking;
compatibility analysis;
vendor analysis;
Reference checking;
audits;
award-fee contracts;
team-building
simulation;
benchmarking;
modeling;
prototyping;
tuning
Technical analysis;
cost-benefit analysis;
prototyping;
reference checking
9. FEASIBILITY STUDY
managers to check the reports. The software fulfills all necessary requirements for such
application. It provides a graphical user interface that makes easier for the staff to use. It
also provides easy to understand menu structure. It’s easy to use nature makes it readily
acceptable to the end users, who need not have much technical knowledge to use it.
This project is designed to meet the requirements of Hotel Management System. It has
been developed in visual basic and MS Access keeping in mind the specifications of the
system. The Hotel Management System’s objectives are to provide a system to manage a
hotel that has increased in size to a total of 100 rooms. Without automation the
management of the hotel has become an unwieldy task. The end users’ day-to-day jobs
of managing a hotel will be simplified by a considerable amount through the automated
system. The system will be able to handle many services to take care of all customers in
a quick manner. The system should be user appropriate, easy to use, provide easy
recovery of errors and have an overall end user high subjective satisfaction.
REFERENCES
http://www.123eng.com
www.ignoujugaad.com/Project/