Académique Documents
Professionnel Documents
Culture Documents
CYBORG-daBOT
Submitted by
Supervisor
Assad, Hunain
CYBORG v4 Talha Final complete draft, which is giving as deliberal 25 March 2018
CONTENTS
1. Introduction ........................................................................................................................................ 5
1.1 Purpose of Document ................................................................................................................... 5
1.2 Intended Audience ........................................................................................................................ 5
1.3 Abbreviations ................................................................................................................................ 5
2. Overall System Description .............................................................................................................. 6
2.1 Project Background ....................................................................................................................... 6
2.2 Problem Statement ....................................................................................................................... 6
2.3 Project Scope ................................................................................................................................ 6
2.4 Not In Scope .................................................................................................................................. 6
2.5 Project Objectives ......................................................................................................................... 7
2.6 Stakeholders & Affected Groups .................................................................................................. 8
2.7 Operating Environment ................................................................................................................ 8
2.8 System Constraints ....................................................................................................................... 8
2.9 Assumptions & Dependencies ...................................................................................................... 8
3. External Interface Requirements ...................................................................................................... 9
3.1 Hardware Interfaces ..................................................................................................................... 9
3.2 Software Interfaces ....................................................................................................................... 9
3.3 Communications Interfaces .......................................................................................................... 9
4. System Functions / Functional Requirements ............................................................................. 10
4.1 System Functions ........................................................................................................................ 10
4.2 Use Cases .................................................................................................................................... 11
4.2.1 List of Actors........................................................................................................................ 11
4.2.2 List of Use Cases .................................................................................................................. 11
4.2.3 Use Case Diagram ............................................................................................................... 12
4.2.4 Description of Use Cases ..................................................................................................... 12
5. Non - Functional Requirements ..................................................................................................... 14
5.1 Performance Requirements ........................................................................................................ 16
5.2 Safety Requirements ................................................................................................................... 16
5.3 Security Requirements ................................................................................................................ 17
5.4 Reliability Requirements ............................................................................................................. 17
5.5 Usability Requirements ............................................................................................................... 17
5.6 Supportability Requirements ...................................................................................................... 17
5.7 User Documentation ................................................................................................................... 17
6. References ......................................................................................................................................... 19
1. Introduction
The reason of this archive is to supply a Nitti gritty diagram of our computer program items, its
parameters and objectives. This report portrays the project's target group of onlookers and its client
interface, equipment and computer program necessities.
The intended audience of this project are the people who like to secure their areas by implementing
surveillance systems whether it a private organizations or government sectors.
1.3 Abbreviations
According to our research and knowledge there is no such application/software being working that
can detect as well as try to find the person identification by recognizing the culprit with the help of
data provided over the internet. But there is Chinese base project more or less similar to our project
and working on it named as “Chinese street surveillance system”.
We have seen that in a security control room only one or two operator are there to manage the huge
amount of computer screens. Normally human couldn’t watch all the computer screens properly at
the same time stamp. So there is a high chance of missing some important events.
Target locker
Objects scanner
Unethical objects identifier
Alarming system
Person recognizer
Alerting third party
It will scan all the objects that comes in front of the lens and when a harmful or
unethical object (i.e. gun, knife, etc.) comes in contact with a lens it will notify the
user and will lock that object and the person holding it and will try to identify the
person using facial recognition system form the provided database or over the social
media. We will highlight the target on display screen.
2.6 Stakeholders & Affected Groups
Muhammad Hunain, Muhammad Assad Siyal and Talha Iqbal (FYP Student)
Muhammad Azmi Umer (Supervisor)
Dr. Hironao Takahashi (Co-Supervisor)
Client( user of our product )
Lack of resources.
High processing machine.
Data gathering.
We are giving the user manual to the client and assume that the organization
or client that are going to use our surveillance system must go through the
given manual provided to them and we assume that they can understood the
operating manual.
3. External Interface Requirements
Python
Sypder IDE
Java
Netbeans IDE
J-soup
NoSQL
Google API
Anaconda
rd
SMTP to send notification (mail) to 3 party.
4. System Functions / Functional Requirements
R1.2 The admin shall be Evident System Data shall be fed into the
able to Signup registration system within 2 seconds.
time
R3.1 The Detection Evident System Data shall be fed into the
Response time system within milliseconds.
R4.1 The Alarming system Hidden/ System Load The dashboard shall be
on time loaded within 1 minute
Frill
R4.2 The Notification Hidden/ System Data shall be fed into the
Response time system within milliseconds.
Frill
System Attributes/ Nonfunctional Requirements
Super Admin
Admin
system
Super Admin
Admin
System
4.2.4 Description of Use Cases
Name: Login
Name: Login
Actors: Admin
Actors: System
.
0
Response Time: Response time depends on the bandwidth of the internet; the
greater the bandwidth, the lesser the response time. Response time of the
search feature will not only depend upon the bandwidth but also upon the
amount of data stored in the database. And the efficient query we apply to
retrieve the data from the database
Work load: Workload would depend upon the amount of data is stored in the
database, as our system gather a huge amount of data which include pictures,
names, address, numbers etc. so we should designed our system that much
efficient and fast to access the GBs of data in seconds
Platform: The platform would be Desktop app for all operating systems, i.e.
Windows, Linux, etc.
List References