Vous êtes sur la page 1sur 11

PROJECT SYNOPSIS

Title of the project: Radio Frequency Identification (RFID) based Access Control

System (ACS) for Gated Community.

Statement about the problem:

When you think of a gated community, what comes to mind? Probably things like safety,

security, exclusivity, expensive homes, and more. Gated communities provide a lot of

benefits to the residents that live within them. The number one reason people choose to

live in gated communities is the security element.

Gated community living concept started with an aim of increasing the security aspects

and expecting minimum chances of theft, security breaches and other crimes. Though

the number of such incidents has been reduced, however, such incidents still happens

due to following lacuna:-

- Frequent rotation/change of security guard/watchman.

- There is no concept of identity proof as ID card, Access Card etc for residents

and others like housekeepers, servants, gardener, babysitters, delivery people,

repair workers, visitors etc in most of the gated community.

- Guard does not properly check the qualifications and authenticity of personal

before letting them in as people get irritated by frequent checks and sometimes

due to carelessness of themselves.


-The outgoing and incoming of personnel are not properly maintained in the

registers. If maintained also it will be difficult to analyze due to various reasons

as poor handwriting, careless entry etc. It is just maintained for formality.

It is very difficult for guards to remember all the residents and others by face and name.

There are two reasons for this

- Guards are rotated frequently by security agency so they should not get

familiarized and friendly with residents and others as it will increases the chances

for carelessness in turn theft and security breaches.

- Guards change their job place frequently.

- Guards are not competent and qualified enough to do their job. They are

generally hired to show some threat to thief, burglar and other unsocial elements.

When security guards cannot remember the residents by face it further causes following

two problems.

-When the guards check or verify the residents and others at the gate, it takes

long time and if happens regularly the residents starts getting irritated and trying

to avoid these things by some argument which result in unhappy situation and

cause de-motivate the security staff to perform their duties.

-Generally guards check the people for formality. What does the guard check is

become a serious question mark? The gatekeeper might be letting everyone in.

While we may assume that only residents are allowed inside the gate, there are
other people who may be coming or going every day, such as delivery people,

repair workers, housekeepers, and babysitters.

Objectives and scope of the project:

Objective of this project to design and develop RFID (Radio Frequency Identification)

based ACS (Access Control System) for gated community to provide better security to

them.

Scope of the projects are following:-

(i) Design and development of Access Control Software (Watch Dog Access

Control Software).

(ii) Selection of RFID Reader best suitable for current requirement.

(iii) All members will get RFID based ID Card which will provide them hassle

free and secure access to their community. Addition to this they will also

be provided with RFID tags for vehicles.

(iv) Others like permanent workers, servant, gardener etc will also get RFID

based ID Card which will not only provide them access to community but

also record their in/out timings which can be used for their wages

calculation.

(v) Visitors, delivery people, repair workers, hawkers etc will get temporary

RFID based ID Card which will be used to track their movement and

properly recoding their in/out timing.


(iv) Access Control Software will keep the record of all in/out movements of

members and others with the help of RFID tags. Reports can be generated as

per the requirement as date, time, member ID etc. When we have the record of

every person who are going out and coming in, it becomes very easy to track the

criminal whenever some incidents or security breach happens. The records will

contain profile of the person who are going out /in along with time and date. This

recording process will take less than a second with the used of Watch Dog

Access Control Software.

Methodology:

Waterfall methodology will be followed for this project development; progress will flow

from top to bottom.

The waterfall model is a sequential software development process, in which progress is

seen as flowing steadily downwards (like a waterfall) through the phases of

requirement, design, implementation, verification and maintenance.


WATERFALL MODEL : PROGRESS FLOWS FROM THE TOP TO THE

BOTTOM, LIKE A WATERFALL.

Requirement

The most important task in software based product is extracting the requirements from

users or requirement analysis. At the preliminary stage requirement of gated community

will be collected. This can be done by either visiting the locality or interacting with

community member or by studying the various documents, literature etc or collecting the

information through internet.

Design

The design phase begins the extremely technical portion of development methodology.

At this point in the process, the project’s requirements, collected during the requirement

phase to produce the Technical Design document for the project. This is comparable to

an architectural blueprint. The Technical Design contains the component, package, and
object layout of project and illustrates how they will interact. It also contains scalability

parameters, detailed hardware requirements, and test plans. With this document, the

project is ready to proceed with the development. This is often called a scope

document.

Once the requirements are gathered, an analysis of the scope of project development

should be determined and clearly stated.

Solution by Innovations

Watch Dog Access Control System is innovative solution for gated community to

provide security at very basic level. It is combination of hardware (RFID Reader) and

software (Watch Dog Access Control Software). Watch Dog Access Control Software

which will have the databank of all the residents, serving people and all other concerned

persons of the community. Every one will be allotted a unique Radio Frequency

Identification (RFID) based Identity Card (ID Card). As the RF ID Card holder passes

the card near a proximity card reader, their particulars with picture will be displayed

on the monitor. The security guards verify the person by comparing him with the

photograph and particulars in the monitor screen and accordingly he can take the

decision whether allow or not to the person. In/Out timing will be automatically updated

in the database and same can be retrieved at latter stage for analyze and investigation.

There are mainly three modules in this software they are

(i) Database Management Module to maintain database of resident, serving

personnel and other concerned persons. This module will have the code
to add, delete and update the database of persons including RFID detail

and picture.

(ii) In/Out Access Operation Module This is main operation module

containing access control code for in/out movement.

(iii) Report Generation Module This module will contain code to generate

various reports for record purpose, analyzing and investigation.

Addition to this there are some support module

(iv) Software Access Module This module contains code for software access

management as operator level, Supervisor level and administrator level.

(v) RFID Reader Access Module This module will contain code to control

RFID reader and read & write operation from RFID reader.

Watch Dog Access Control System : Features

It is user friendly customized software. Every resident in the gated community will have

a unique Radio Frequency Identity Card (RF ID card).

As the RFID Card holder passes over the proximity card reader, the profile of the

individual will pop up in the Monitor. The guards can verify the photograph on the

monitor and the card holder along with their other details.

Hardware Requirement
-One Personal Computer

-Proximity card reader

-Proximity card (RFID Card)

Software

Watch Dog Access Control Software

Implementation

Implementation is the part of the process where software engineers actually program

the code for the project. At this stage software code will be written as per the technical

design document. In the implementation phase, the project team is expanded to include

software engineers and specialists in production, documentation, and quality assurance.

Documenting the internal design of software for the purpose of future maintenance and

enhancement is done throughout development. It is very important to document

everything in the project.

Visual Basic 6 (VB6) language is selected to write the code for the Watch Dog

Access Control Software. Database will be developed in Microsoft Access.

Microsoft Visual Studio IDE (Integrated Development Environment) will be used as

development environment.

Verification

Verification or Software testing is an integral and important part of the software

development process. This part of the process ensures that defects are recognized as
early as possible. Software will be tested at every stage and final testing will be done in

dummy environment.

Maintenance

Deployment will start after the code or program is appropriately tested. People are often

resistant to change and avoid venturing into an unfamiliar area, so as a part of the

deployment phase, it is very important to have training classes for new users of your

software. Maintaining and enhancing software to cope with newly discovered problems

or new requirements can take far more time than the initial development of the software.

It may be necessary to add code that does not fit the original design to correct an

unforeseen problem or it may be that a customer is requesting more functionality and

code can be added to accommodate their requests. If the labor cost of the maintenance

phase exceeds 25% of the prior-phases' labor cost, then it is likely that the overall

quality of at least one prior phase is poor. In that case, management should consider

the option of rebuilding the system (or portions) before maintenance cost is out of

control.Bug Tracking System tools are often deployed at this stage of the process to

allow development teams to interface with customer/field teams testing the software to

identify any real or perceived issues. All aspects of software development will be taken

care. Industry best practiced Software Development Life Cycle (SDLC) will be followed

to design and develop international standard product.

Chapterisation scheme:

Following chapter schema will be followed in main report. It will sequentially represent

the case/report.
(i) Chapter-I: Introduction of the Problem: This Chapter will include

background of the problem, and what is proposed to be developed. The

significance of the problem, the objectives and the scope of the project and the

contribution and impact by the project will be elaborated. A brief description of

the about gated community where the finally project will be implemented will also

be provided.

(ii) Chapter-II : Technological Perspective: This chapter will include an

overview of the technological concepts related to the project as Radio Frequency

Identification (RFID) technology, Relational Database Management System

(RDBMS), Microsoft Visual Studio (IDE) etc. This chapter will also include about

existing software available in the market, their merit and demerit and

limitations/drawbacks of currently available solution in the market.

(iii) Chapter-III : Methodology: This chapter will describe in detail the steps

followed in completing the project. All aspects of software development will be

considered in this chapter. Full description of Software Development Life Cycle

(SDLC) process will be defined here.

(iv) Chapter- IV Design: This chapter will describe the detail design of project as

Flow Chart (FC), Data Flow Diagram (DFD), Physical Diagram (PD), Logical

Diagram (LD), Flow of Data, Flow of Module etc.

(v) Chapter- V Implementation: This chapter will include the final coding of the

software and documentation of source code. Documentation is very important for


the purpose of future maintenance and development. Listing of full source code

with documentation will be included as Appendix.

(vi) Chapter- VI Verification or Software testing : Verification or Software

testing is an integral and important part of the software development process.

Various testing scenario will be described in this chapter and result will be

included as Appendix.

(vii) Chapter- VII Deployment & Maintenance: This chapter will describe about

the various deployment scenario and procedure for Access Control System in

gated community. Maintainability aspect will also be described in this chapter.

Maintaining and enhancing software to cope with newly discovered problems or

new requirements is essential for any software development.

(viii) Chapter- VII Summary: This chapter will depict the summary of the project

“Radio Frequency Identification (RFID) based Access Control System (ACS) for Gated

Community”.

Vous aimerez peut-être aussi