Академический Документы
Профессиональный Документы
Культура Документы
[PAGE No.1]
AIM:
To design a system where information regarding train status is relayed from one station to the next on the same line to avoid any type of collision.
PROBLEM STATEMENT:
To build application using RFID FOR RAILWAYS which sends the information gathered at one station to other stations using the RFID technology. A RFID Railway system is available from Secure Networks in a number of configurations designed to economically meet a full range of service requirements. Reader systems provide automated tracking of railcars via RFID tags, Readers and integrated Middleware, and make railcar and locomotive identification and location information available to railroads for asset management and other purposes.
NEED FOR PROJECT\SCOPE:Railways are one of the most important modes of travel all over the world. So, all their operational procedures have to be simplified for deriving the best results. A)One such technology employed for providing the best service by the railways is the RFID railway technology. It simplifies the process of the movement of the passengers without causing any problems. The biggest benefit of such a system is in simplification of the its implementation checking system this system is completely flawless and fool proof. Since the number of passengers going through the railways has enhanced to such a large extent, the operational difficulties faced the organizations has increased considerably B)with the employment of RFID, it can hope to get rid of its many problems like increasing capital expenditure and debt management. This technology can help such organizations like railways in consolidating their revenues while cutting costs through better operations and asset operation. C)The implementation of the RFID in the railways can provide knowledge about the exact location of a particular person or his luggage. The RFID systems operated by the railways help them in making accurate decisions about managing the transportation occurring through the railways. Every operation of railways like train marshalling, train dispatching and managing train throughput can become hassle-free after the introduction of such systems . D)It will become simpler and easier for Railways to control the system of freight billing with the help of this technology. Passengers will also discover and feel the benefits of such systems.
[PAGE No.2]
[PAGE No.3]
To come to a final decision about our B.E project we had to take into consideration a lot of aspects. Considering the time that is given to us to complete it is one year and hence keeping that in mind we need to make a project that is impressive enough to fetch us a high score.
We also wanted the project to incorporate a vast variety of fields of engineering such that we could maximize the learning from our project. But at the same time it had to be simple enough to be able to finish it completely in the one year that is given. Another aspect was that the group being composed of 4people, it was evident that we had to come to a consensus on a particular topic. So we looked for projects that satisfied all the aspects. We found this field interesting because of its tremendous scope for future development. Coupled with RFID we could really expand our scope. we thought about the new and upcoming field of Radio Frequency Identification (RFID).. Market survey is the overview of the available design technologies and it involves the manner in which we compare, convert and implement the potential of our concept of desired system. Performance is perhaps the most widely used metric in marketing. Cost along with performance was the most widely used metric in implementing of the project. A detailed study was undertaken for a comprehensive understanding of RF communication and its application in enabling RFID standards and of the various components involved in the RFID system.
[PAGE No.4]
[PAGE No.5]
RFID tags
RFID tags consist of an integrated circuit (IC) attached to an antennatypically a small coil of wiresplus some protective packaging (like a plastic card) as determined by the application requirements. Tags also sometimes are called transponders, and sometimes they are called inlays, although technically an inlay is a tag mounted on a substrate that is ready to be converted into a smart label. RFID tags can come in many forms and sizes. Some can be as small as a grain of rice. Data is stored in the IC and transmitted through the antenna to a reader. RFID tags are either passive (no battery) or active (self-powered by a battery). Tags also can be read-only (stored data can be read but not changed), read/write (stored data can be altered or rewritten), or a combination, in which some data is permanently stored while other memory is left accessible for later encoding and updates.
[PAGE No.6]
computer that also might be used for scanning bar codes), or even embedded in electronic equipment such as print-on-demand label printers.
1. A processor controls the RFID sender / receiver controller; 2. An antenna sends high frequent energy with optional encoded information tot the transponder. 3. In the transponder, the high frequent energy is being converted to an electrical charge, which is saved; 4. This makes the transponder answer with its own, unique encoded information;
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.7]
5. The reader unit receives the transponder's answer; this information can be processed depending on the application.
TYPES OF RFID TAGS:1. Passive tags:Passive tags refer to RFID tags which are powered solely by the RFID interrogator. The interrogator emits a radio frequency (RF), which powers the silicon chip on the tag when it is within range of the RF field. When the power to the silicon chip on the tag meets the minimum voltage threshold it require to turn on, the silcion chip can then send back information on the same RF wave. Range is usually limited to several meters.
2. Active
Active tags refer to RFID tags which have their own power source, so they can receive a weaker signal from the interrogator (i.e. be further away), and the power source on the tag boosts the return signal. These types can have ranges of many tens of meters and even hundreds of meters, but cost more because of their size and sophistication. Battery life can also limit the life of the tag.
3. Semi Passive
Semi Passive tags refer to tags with a power source (usually a laminar, flexible, low cost battery) which can be used for on tag sensing (e.g. temperature), but not to boost range. An RFID tag will be connected to each engine of the train. RFID readers will be placed at each platform. When the train arrives at platform the reader will read the information in the RFID tag and display the train Name and Number on LCD. This information will also be conveyed to successive stations by using a GSM Port (Mobile Handset) in the form of SMS. This system will consist of transmitter and receiver. At the Receiver on receiving the information, it announces that the train has reached the transmitting station. This information is then processed on the computer and the time
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.8]
difference is calculated. This new information is then sent to all ticket holders via GSM, whose numbers are stored in the database on the computer.
[PAGE No.9]
BRIEF ANALYSIS OF RFID:Radio-frequency identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. The technology requires some extent of cooperation of an RFID reader and an RFID tag. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. An RFID tag is an object that can be applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. Some tags can be read from several meters away and beyond the line of sight of the reader. What is RFID? A basic RFID system consists of three components: a) An antenna or coil b) A transceiver (with decoder) c) A transponder (RF tag) Electronically programmed with unique information. There are many different types of RFID systems out in the market. They are categorized according to there frequency ranges. Some of the most commonly used RFID kits are as follows: 1) Low-frequency (30 KHz to 500 KHz) 2) Mid-Frequency (900KHz to 1500MHz) 3) High Frequency (2.4GHz to 2.5GHz)
[PAGE No.10]
These frequency ranges mostly tell the RF ranges of the tags from low frequency tag ranging from 3m to 5m, mid-frequency ranging from 5m to 17m and high frequency ranging from 5ft to 90ft. The cost of the system is based according to there ranges with low-frequency system ranging from a few hundred dollars to a high-frequency system ranging somewhere near 5000 dollars.
An antenna or coil A transceiver (with decoder) A transponder (RF tag) electronically programmed with unique information
1. ANTENNA
The antenna emits radio signals to activate the tag and read and write data to it. Antennas are the conduits between the tag and the transceiver, which controls the system's data acquisition and communication. Antennas are available in a variety of shapes and sizes; they can be built into a door frame to receive tag data from persons or things passing through the door, or mounted on an interstate tollbooth to monitor traffic passing by on a freeway. The
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.11]
electromagnetic field produced by an antenna can be constantly present when multiple tags are expected continually. If constant interrogation is not required, a sensor device can activate the field. Often the antenna is packaged with the transceiver and decoder to become a reader (a.k.a. interrogator), which can be configured either as a handheld or a fixed-mount device. The reader emits radio waves in ranges of anywhere from one inch to 100 feet or more, depending upon its power output and the radio frequency used. When an RFID tag passes through the electromagnetic zone, it detects the reader's activation signal. The reader decodes the data encoded in the tag's integrated circuit (silicon chip) and the data is passed to the host computer for processing.
2. TAGS (Transponders) An RFID tag is comprised of a microchip containing identifying information and an antenna that transmits this data wirelessly to a reader. At its most basic, the chip will contain a serialized identifier, or license plate number, that uniquely identifies that item, similar to the way many bar codes are used today. A key difference, however is that RFID tags have a higher data capacity than their bar code counterparts. This increases the options for the type of information that can be encoded on the tag, including the manufacturer, batch or lot number, weight, ownership, destination and history (such as the temperature range to which an item has been exposed). In fact, an unlimited list of other types of information can be stored on RFID tags, depending on application needs. An RFID tag can be placed on
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.12]
individual items, cases or pallets for identification purposes, as well as on fixed assets such as trailers, containers, totes, etc. Tags come in a variety of types, with a variety of capabilities. Key variables include: "Read-only" versus "read-write" There are three options in terms of how data can be encoded on tags: (1) Read-only tags contain data such as a serialized tracking number, which is pre-written onto them by the tag manufacturer or distributor. These are generally the least expensive tags because they cannot have any additional information included as they move throughout the supply chain. Any updates to that information would have to be maintained in the application software that tracks SKU movement and activity. (2) "Write once" tags enable a user to write data to the tag one time in production or distribution processes. Again, this may include a serial number, but perhaps other data such as a lot or batch number. (3) Full "read-write" tags allow new data to be written to the tag as neededand even written over the original data. Examples for the latter capability might include the time and date of ownership transfer or updating the repair history of a fixed asset. While these are the most costly of the three tag types and are not practical for tracking inexpensive items, future standards for electronic product codes (EPC) appear to be headed in this direction.
RFID TAGS Data capacity The amount of data storage on a tag can vary, ranging from 16 bits on the low end to as much as several thousand bits on the high end. Of course, the greater the storage capacity, the higher the price per tag.
[PAGE No.13]
Form factor The tag and antenna structure can come in a variety of physical form factors and can either be self-contained or embedded as part of a traditional label structure (i.e., the tag is inside what looks like a regular bar code labelthis is termed a 'Smart Label') companies must choose the appropriate form factors for the tag very carefully and should expect to use multiple form factors to suit the tagging needs of different physical products and units of measure. For example, a pallet may have an RFID tag fitted only to an area of protected placement on the pallet itself. On the other hand, cartons on the pallet have RFID tags inside bar code labels that also provide operators human-readable information and a back-up should the tag fail or pass through non RFID-capable supply chain links. Passive versus active Passive tags have no battery and "broadcast" their data only when energized by a reader. That means they must be actively polled to send information. "Active" tags are capable of broadcasting their data using their own battery power. In general, this means that the read ranges are much greater for active tags than they are for passive tagsperhaps a read range of 100 feet or more, versus 15 feet or less for most passive tags. The extra capability and read ranges of active tags, however, come with a cost; they are several times more expensive than passive tags. Today, active tags are much more likely to be used for high-value items or fixed assets such as trailers, where the cost is minimal compared to item value, and very long read ranges are required. Most traditional supply chain applications, such as the RFID-based tracking and compliance programs emerging in the consumer goods retail chain, will use the less expensive passive tags. Frequencies Like all wireless communications, there are a variety of frequencies or spectra through which RFID tags can communicate with readers. Again, there are trade-offs among cost,
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.14]
performance and application requirements. For instance, low-frequency tags are cheaper than ultra high-frequency (UHF) tags, use less power and are better able to penetrate non-metallic substances. They are ideal for scanning objects with high water content, such as fruit, at close range. UHF frequencies typically offer better range and can transfer data faster. But they use more power and are less likely to pass through some materials. UHF tags are typically best suited for use with or near wood, paper, cardboard or clothing products. Compared to lowfrequency tags, UHF tags might be better for scanning boxes of goods as they pass through a bay door into a warehouse. While the tag requirements for compliance mandates may be narrowly defined, it is likely that a variety of tag types will be required to solve specific operational issues. You will want to work with a company that is very knowledgeable in tag and reader technology to appropriately identify the right mix of RFID technology for your environment and applications. RF Transceiver: The RF transceiver is the source of the RF energy used to activate and power the passive RFID tags. The RF transceiver may be enclosed in the same cabinet as the reader or it may be a separate piece of equipment. When provided as a separate piece of equipment, the transceiver is commonly referred to as an RF module. The RF transceiver controls and modulates the radio frequencies that the antenna transmits and receives. The transceiver filters and amplifies the backscatter signal from a passive RFID tag. Typical Applications for RFID:
Automatic Vehicle identification Inventory Management Work-in-Process Container/ Yard Management Document/ Jewellery tracking Patient Monitoring
[PAGE No.15]
MICROSOFT VISUAL C# 2005 Microsoft Visual C# 2005, pronounced C sharp, is a programming language designed for building a wide range of applications that run on the .NET Framework. C# is simple, powerful, type-safe, and object-oriented. With its many innovations, C# enables rapid application development while retaining the expressiveness and elegance of C-style languages. Visual Studio supports Visual C# with a full-featured Code Editor, project templates, designers, code wizards, a powerful and easy-to-use debugger, and other tools. The .NET Framework class library provides access to a wide range of operating system services and other useful, welldesigned classes that speed up the development cycle significantly. Extensions for component-oriented development Visual C# provides developers with a powerful component-oriented development language that includes support for properties, indexers, delegates, inheritance, versioning, and attributes, without the need for esoteric or rigid naming patterns and companion classes. Interactive XML Web services Visual C# allows developers to deploy and consume rich, interactive XML Web services that reduce development time by enabling software aggregation from any platform. Microsoft is famous for hiding the details from the developer: This is both good and bad. Leverage the .NET Framework Visual C# provides developers with access to the Microsoft .NET Framework--a robust, threadsafe library of collection classes, data access classes, networking functions, etc. Recently, however, various bridge software offer . Object-based type system Visual C# provides developers an object-based type system that eliminates the need for complex, verbose data marshalling code commonly required by Java applications.
[PAGE No.16]
Target any device Visual C# lets developers target desktop computers or a variety of handheld and wireless devices using identical tools and skills. True, but all the devices must be Windows based. XML comments Visual C# allows developers to use eXtensible Markup Language (XML) Comments to provide useful and customizable source code documentation. Of course, so does Java although Microsoft does add its own twists to it.
Chapter: 4
[PAGE No.17]
[PAGE No.18]
(G)SRS document is made to specify various acronyms, abbreviations and their meaning. This document will give overall description of Project in terms of product perspective, product functions, general constraints and assumptions. It will also specify specific requirements like external interface, functional requirements performance requirements and design constraints
Problem Statement:
To build application using RFID FOR RAILWAYS which sends the information gathered at one station to other stations using the RFID technology. A RFID Railway system is available from Secure Networks in a number of configurations designed to economically meet a full range of service requirements. Reader systems provide automated tracking of railcars via RFID tags, Readers and integrated Middleware, and make railcar and locomotive identification and location information available to railroads for asset management and other purposes.
Need For Project Scope:Railways are one of the most important modes of travel all over the world. So, all their operational procedures have to be simplified for deriving the best results. a)One such technology employed for providing the best service by the railways is the RFID railway technology. It simplifies the process of the movement of the passengers without causing any problems. The biggest benefit of such a system is in simplification of the its implementation checking system this system is completely flawless and fool proof. Since the number of passengers going through the railways has enhanced to such a large extent, the operational difficulties faced the organizations has increased considerably. b)with the employment of RFID, it can hope to get rid of its many problems like increasing capital expenditure and debt management. This technology can help such organizations like railways in consolidating their revenues while cutting costs through better operations and asset operation. c)The implementation of the RFID in the railways can provide knowledge about the exact location of a particular person or his luggage.
[PAGE No.19]
The RFID systems operated by the railways help them in making accurate decisions about managing the transportation occurring through the railways. Every operation of railways like train marshalling, train dispatching and managing train throughput can become hassle-free after the introduction of such systems. d)It will become simpler and easier for Railways to control the system of freight billing with the help of this technology. Passengers will also discover and feel the benefits of such systems.
Goals and objective The Objective of the project is to strengthen the present railway anti-collision systems by making them work collaboratively in the network. Reader systems provide automated tracking of railcars via RFID tags, Readers and integrated Middleware, and make railcar and locomotive identification and location information available to railroads for asset management and other purposes The main goals in the project are 1. Toimplement an anti-collision system using radiofrequency identifications. 2. To use the mechanism of rfid for applications like asset tracking etc.
[PAGE No.20]
RFID Device CPU Memory Display Options Input Device Operating Systems Application Libraries Technologies / Software Pentium IV 512 MB RAM VGA Keyboard, Mouse Windows XP/Windows 2000 .Net Framework, ASP.Net, C# ASP.Net (Front End), IIS (Server) and SQLServer (Back End)
FEATURES/BENEFITS :I)The System stores tag data including time, date, train direction and speed. II) It also responds to inquiries via modem and interfaces to scales, video systems and diagnostic and monitoring devices.
[PAGE No.21]
III)Timely data to increase capacity, speed, automation and operational flexibility IV)Arrival and departure data for signal and control operations
ASSUMPTIONS:-
I)The components/Modules will be developed in C#.Net and the front end will be ASP.Net and would comply to .NET framework specifications. II)Components may inherit from existing available Microsoft .NET components but may customize to suit the requirements. III)All the project team members have good knowledge of .NET framework basics, ASP.Net, C#.Net programming . IV)Some smaller dummy implementation applications would need to be developed to test & demonstrate the functionality provided by these components.
Chapter: 5
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.22]
Introduction
This section gives the specification of various tasks performed during the project-planning phase of RFID for railways. It highlights the project idea, relevance, objectives and resources along with the work structure proposed for the project. The RMMM plan and the SQA plan are also proposed after the risk analysis and the resource estimation for the project. 5.1Project Scope
Reliability
The System shall be self-monitoring. The System is not immune to changes under any abnormal conditions such as hardware failure or OS crash etc. The system can be run only on android platform.
Availability
The System is available all the time with just mobile GPRS active in.
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.23]
Security
The security provided to the system is same as that provided by Google to the Gmail since entire data is going to be stored on the Gmail account of the user.
Maintainability
The system requires zero maintenance from the user side.
Technical Feasibility:
Technical feasibility is the study of the hardware and software requirement i.e. the technical requirement of the system in order to inform the management and user that for particular system designing this much technical resource are required. In order to know the user and management view regarding the technical resources, following are the technical resources required for developing the system.
Software Requirements :
Microsoft windows operating system Microsoft windows operating system is used as if it is widely available and fulfills all the requirements of our project Microsoft DotNet Framework 3.5 Net Framework is used for developing the project because it is very convenient for developing user interface as well as handling database connectivity.
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.24]
Microsoft C# 2005 Vulguard will be interacting with a host of software during its execution. Primarily it interacts with SQL Server, .Net framework, XML parser, and all of their updates. Secondarily it will interact with Windows Firewall which at high security level might block the execution of our software; here it may be need user to enable execution by unblocking.
Hardware Requirements
Intel Core2Duo PC with 1GB Ram 1GB of Hard Disk Space 2.66 GHZ Processor speed No additional Hardware would be required other than normal
Economic Feasibility:
As it is an internal project the development cost of our project is minimal. The softwares and hardwares required are provided to us by our college. Thus, the expenditure of Software and Hardware is also minimal.
5.4
SQA Plan:
This document describes the Software Quality Assurance Plan for the Webbased Skills Tracking System. It mainly focuses on the construction phase of development. The analysis and design phases are also taken into consideration. Software Quality Assurance is an umbrella activity and will cover all major phases of the software development- requirements gathering, analysis, design, code development and testing. There will not be any special group to perform the SQA activities but the project team itself will be actively involved in ensuring the following: Conformance to explicitly state functional and functional and performance Explicitly documented development standards. Implicit characteristics that are expected of all professionally developed requirements.
The SQA plan is made to describe all the software process activities that are covered by quality assurance. The whole purpose of this plan is to ensure that quality is maintained throughout the software project lifecycle.
SQA Activities:
SQA Task#1: The first SQA task will be development of the projects software process description. SQA Task#2: The second SQA task will be to conduct formal reviews of the software engineering activities to verify compliance with the defined software process. SQA Task#3: The third SQA task will be to audit designated software work products to verify compliance with those defined as part of the software process. SQA Task#4: The fourth SQA task will be to ensure that deviations in software work and work products are documented and handled according to a documented procedure. SQA Task#5: The final SQA task will be to record any noncompliance.
5.5 Documentation:
As a result of the above SQA activities, changes to the initial design were made in order to take into consideration, the exact requirements of the customer. The corresponding changes were also incorporated into the architectural design of the software. As a result of the above SQA activities, changes to the initial design were made in order to take into consideration, the exact requirements of the customer. The corresponding changes were also incorporated into the architectural design of the software. The work products produced as part of the software process are: Project plan. Data Flow Diagrams
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.27]
Technical Documents Software Requirement Specification. Test Plans User documents like help pages and Guide. Management: Organization: Help provides by guide. Tasks: Periodical checks of the work. Responsibilities: The responsibility lies on the project group. Problem Reporting and corrective action: The unforeseen problems which occur are reported to the guide during the periodical reviews. The corrective actions are taken as per the suggestions and advices given by them. Standardization: The document standards are all according to standard IEEE format and ISO Std
[PAGE No.28]
Problem Reporting and corrective action: The unforeseen problems which occur are reported to the guide during the periodical reviews. The corrective actions are taken as per the suggestions and advices given by them. Standardization: The document standards are all according to standard IEEE format and ISO Std. 5.6 Major software functions There are following major functions 5.6.1 Project Estimates We are following the Constructive Cost Model (COCOMO) for estimating the effort required in completing the project. The initial effort (Ei) in man months is calculated using the equation : Ei = a * (KLOC)^b where a and b are constants depending whether the project organic, semidetached, or embedded category. The values are as follows : System Organic Semidetached Embedded A 3.2 3.0 2.8 B 1.05 1.12 1.20
Our system belongs to semidetached category which falls between the organic and embedded systems. Organic projects are in an area in which the organization has considerable experience and whose requirements are less stringent. Embedded projects are those which have tight constraints, in which the organization has little experience and stringent requirements for aspects such as interfacing and reliability. Therefore a = 3.0 and b = 1.12 There are 15 cost drivers which may either increase or decrease the final effort depending upon the rating. The effort adjustment factor is calculated by multiplying the various cost driver multipliers. The final effort estimate, E, is obtained by multiplying the initial estimate by the EAF.
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.29]
E = EAF * Ei
Cost Drivers Software Reliability Req. Data Base Size Product Complexity Execution Time Constraint Main Storage Constraint Virtual Machine Volatility Machine Turnaround Time Analyst Capability Application Experience Programmer Capability Programming Lang Exp. Modern Prog. Practice Use of SW tools Development Schedule
Rating High Low High Nominal Nominal Low Nominal High Nominal High High Nominal High Nominal
Multiplier 1.15 0.94 1.15 1.0 1.0 0.87 1.0 0.86 1.0 0.86 0.95 1.0 1.0 1.0
The table below gives the ratings and multipliers for the various cost drivers in the project. EAF = 1.15 * 0.94 * 1.15 * 1.0 * 1.0 * 0.87 * 1.0 * 0.86 * 1.0 * 0.86 * 0.9 *1.0* 1.0 * 1.0 EAF = 0.76
[PAGE No.30]
b. Prepare the design document 4.Enhancement of knowledge / skill set. a. Discuss the implementation issues to find out what additional skills are required b.Dedicate enough time so that these skills are acquired. 5.Implementation. a. Divide the modules to be done between the members. b.Do the implementation . 6.Delivering the first prototype. a. Integrate all the modules. b.Do deployment c.Give a demonstration of the working module. 7Delivering the advanced prototype a. Include additional features based on time remaining. b. Integrate and stabilize the software. c. Give a demonstration of this prototype. 5.7 Risk Management The RMMM plan prepared by us tackles risks through RISK Assessment and Risk Control. Risk Assessment involves Risk Identification, Risk Analysis and Risk Prioritization, while Risk Control involves Risk Management Planning, Risk Resolution and Risk Monitoring. 5.7.1 Project Risks 5.7.2 Risk Identification Our development team identified different potential risks to the project. These risks were analyzed and were classified into various categories depending upon the threat they posed to the project. Some of these risks were generic risks while others were product specific risks. A considerable amount of time was spent in analyzing the product specific risks. 5.7.3 Risk Analysis We analyzed all the risks individually and we came up with a classification of risks on the basis of their impact on project schedule. These risks were rated as follows : Catastrophic Critical Marginal
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.31]
Negligible These were then reviewed and a consensus on the impact was reached. 5.7.4 Risk Prioritization After analyzing the risks, the risks were prioritized based on the review and consensus among the developers. 3.2 Risk Table Sr.No. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10 11. 12. 13. 14. 15. 16 17. 18. 19. Risk Stricter completion deadline Wrong estimate of size and effort Overly optimistic schedule Error prone modules require more testing and implementation work Lower use of code than expected Lack of sufficient research or development in field Developers work slower than expected Increase on workload on developers and hence divided attention on project Lack of hardware resources Developers assignments dont match their strength Lack of rapport amongst team members Change of technical guide Inexperience in project software environment Inexperience in programming language Lack of technical support on unforeseen environment Requirements have been finalized but continue to change Schedule omits necessary tasks Design neglects major issues Integrating new code with existing code may be difficult Category Business Project Project Project Technical Technical Personnel Personnel Project Personnel Personnel Personnel Technical Technical Technical Project Project Project Technical Probability 10% 40% 30% 30% 25% 30% 30% 50% 50% 30% 25% 75% 40% 10% 35% 45% 20% 20% 35% Impact Critical Critical Critical Critical Critical Critical Critical Marginal Critical Marginal Negligible Marginal Marginal Marginal Critical Critical Critical Critical Critical
Risk Management Software Risk management is a set of practices that enable software development projects to access overall project risk and identify, prioritize and manage specific risk.
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.32]
Projects using risk management to manage their risks have realized benefits including: Prevention of schedule delays Reduce project cost More predictable schedules Better attainment of customer commitments
5.8 Project Risks Major risks for this software development are 1) Increase of workload on developers and hence divided attention on project. 2) Insufficient guidance in the fields of the project. 3) Inexperience in project software environment. 4) Requirements have been finalized but continue to change. 5) Overly optimistic schedules. 6) 5.8.1 Risk Table Risk 1 Increase of workload on developers and hence divided attention on project. 2 Insufficient guidance in the fields of the project 3 Inexperience in project software environment 4 Requirements have been finalized but continue to change 5 Overly optimistic schedules 6 Lack of sufficient research in the respective technologies 7 A wrong estimate on size and effort Category Probability Impact Personnel 25% Marginal Technical Technical Project Project Technical Project 10% 35% 30% 20% 20% 25% Critical Marginal Negligible Negligible Critical Marginal
Critical: Failure would degrade performance, mission success is questionable. Marginal: Failure would result in degradation of secondary mission. Negligible: Failure to meet would create inconvenience or slight impact. 5.8.3 Overview of Risk Mitigation, Monitoring, Management 5.8.4 Work Distribution chart
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.33]
Task Drafting the problem statement Project synopsis Information gathering Study of existing systems Study of .NET Requirement Analysis Authorization main code Package Design Front end design Test plan Installation Testing Project report 5.9 Staff Organization 5.9.1Team structure
Parag Haide r
Harsh Sudhansh
5.9.2 Management reporting and communication There was a compulsory weekly meeting in addition to other meetings. Each group member would discuss the goals achieved as well as targets were set for the next week along with consultation with the internal guide. Meetings were conducted with internal guide on a regular basis along with constant consultation via e-mail.
[PAGE No.34]
Software: Eclipse 3.2, Java Development Kit 1.5, Oracle 9i 5.11 Staff Organization 5.11.1 Team structure The team consists of four people. The sub-components are divided among them. 5.1.1 Roles and Responsibilities The roles and responsibilities of the group members are as follows:
Functions 1. Scope Definition 2. Technical Research : Key generation, Encryption Modules 3. Prototype Implementation 4. Analysis 5. Design 1. 2. 3. 4. 5. Scope Definition Technical Research : Decryption and SMS Modules Prototype Implementation Analysis Design
5.11.2 Management reporting and communication For progress reporting and inter/intra team communication, we are using mechanisms like maintaining a log-book of all meetings with our internal and external guide.
[PAGE No.35]
[PAGE No.36]
ACTIVITY DIAGRAM
[PAGE No.37]
[PAGE No.38]
CLASS DIAGRAM
[PAGE No.39]
SEQUENCE DIAGRAM
[PAGE No.40]
COMPONENT DIAGRAM
[PAGE No.41]
DEPLOYMENT DIAGRAM
[PAGE No.42]
Chapter: 07 TESTING
[PAGE No.43]
[PAGE No.44]
7.1.2 Statement of scope This application is developed for the main Authorization algorithm, to make sure that the values returned are in tune with the existing rules and user qualifications. For various functions that can be performed by the administrator complex queries fetch data from the databases, all these queries need to be tested. The most important element to be tested is the time that a particular transaction takes, coming up with associated figures and attempt to engineer constantly to improve the results.
[PAGE No.45]
Control decisions: When to start, end, suspend, resume, and return the test, actions to be taken in case of exceptional situations (for e.g. if the network gets lost during the backup period).
7.3Testing strategy
The overall strategy for software testing is described. 7.3.1Unit testing (White Box Testing) The system consists of several components that work together. Unit testing focuses verification effort on the smallest unit of software design-the software component or module. The unit test is white box oriented and can be conducted in parallel for multiple components. Following are the steps taken for unit testing: A functional module was created by the respective programmer and tested if it works properly for the expected inputs. If error occurs for certain conditions or boundary cases, they were rectified. It is made sure that the system doesnt crash for any input. It is made sure that necessary Error Messages are displayed to users. Maintaining the authenticity of the administrator and the users.
[PAGE No.46]
The diagram above outlines the Test Process approach that will be followed. a. b. Organize Project involves creating a System Test Plan, Schedule & Test Approach, and requesting/assigning resources. Design/Build System Test involves identifying Test Cycles, Test Cases, Entrance & Exit Criteria, Expected Results, etc. In general, test conditions/expected results will be identified by the Test Team in conjunction with the Project Business Analyst or Business Expert. The Test Team will then identify Test Cases and the Data required. The Test conditions are derived from the Business Design and the c. Transaction Requirements Documents Design/Build Test Procedures includes setting up procedures such as Error Management systems and Status reporting, and setting up the data tables for the d. e. f. g. Automated Testing Tool. Build Test Environment includes requesting/building hardware, software and data set-ups. Execute Project Integration Test - Test Phases & Cycles Execute Operations Acceptance Test - Test Phases & Cycles Signoff - Signoff happens when all pre-defined exit criteria have been achieved.
[PAGE No.47]
Software validation is achieved through a series of black block tests that demonstrates conformity with requirements. Validation succeeds when software functions in manner that can be reasonably expected by customer.
Alpha Testing: This test is conducted at developers site by customer. The software is
used in a natural setting with the developer looking over the shoulder of the user and recording errors and usage problems.
Beta Testing: This test is conducted by one or more customer sites by end user of the
software. This test is a live application of the software in an environment that cannot be controlled by the developer.
[PAGE No.48]
7.5Test schedule A detailed schedule for unit, integration, and validation testing as well as high order tests is described. Task No of people Unit Testing involved 3 Man hrs required 15 3 21 Feb 2007 Integration Testing 3 20 6 4 March 2007 Stress and 3 15 3 14 Mar 2007 23 Feb -2007 9 Mar 2007 16 Mar 2007 No. of days Start date End date
Validation Testing.
Purpose of the test cases: Test cases help us in building confidence in our code. Test cases should be plotted in such a manner, that they exercise different parts of the code. By testing the code as per the plotted cases, we can easily check out the system functionality. We also get to know the scenarios for which the system fails. The corresponding code can then be examined and corrected. Thus, a good set of test cases not only ensures correct system functionality but also aids in error detection and correction.
[PAGE No.49]
Sr.n o 1 Functionality Working of rfid Objectives To allow Steps and data Expected result Select appropriate connectivity IRFID device,tag, anteena should communicate properly else error should be Select one of the database and press Yes. displayed. After pressing Yes list of maintainance types within that database will be displayed, AlternateResult If communication doesnt established than appropriate, error messages should be displayed. If Yes is pressed without selecting database then error message will be displayed Pass Remark Pass
device,anteena,tag reliable Track inspection system,Wagon 2 Yard Maintainance tracking Effective error handling
communication database
[PAGE No.50]
8.1 Applications:
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.51]
The system can be used by administrator for having the current location of the train railyard information managegment,Track inspection system,maintainance etc Better equipment distribution and management RFID tags are assign a particular tag no,tag index,tag id to avoid any confusion Database is used to keep the details as a reference for future enhancement 8.2 Future Enhancements: I) In future the system can be accommodated using google API(application programming interface) technology a) It enhance the rate of perfection along with precision. b)Service provided by google II) The project can be enhanced by using GSM technology. Using GSM technology admin will be able to receive information about current location of the train,next stop at the arrival of current stop,wagon tracking m and it will also provide information about various routes available
III).Active RFID technology can be used for larger scale or for commercial purposes as it
has larger communication range. IV)latest compatible rfid readers,anteenas along with appropriate tags with as much fields of information as possible. Cost of the project is the important aspect of its implementation steps should be taken to reduce the cost as much as possible by implementing latest compatible rfid readers,anteenas Along with appropriate tags with as much fields of information as possible. V)Effective and large scale database to enlarge the area of working of our project
VI ) limited functionality can be created with lot of more functionality providing developer with more functions implemented in class.
8.3 Limitations: The system can only generate classes of c# language these classes doesnt support another language. Cost of RFID readers,tags & device is major aspect to deal with
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.52]
Accuracy The System should be 100 % accurate ideally. It should not suffer from any bug. Our system is not providing any authority to user for updating database. So it is very accurate. Timing Describe the timing requirements to be imposed on the system, such as: Response time between input data and system availability should be least as possible keeping correct results in mind. Response time of queries should be fast Capacity Limits There is no capacity limit only there should have space on hard disk to store the generated classes.
[PAGE No.53]
Summary:
[PAGE No.54]
Problem definition was thoroughly understood and scope of project was determined. Requirement analysis was done for gathering requirements and determining functionality of tool. Proper design was done as per given requirement and modules to be developed were determined. Total architecture of system was finalized.
Conclusion:
In the end we like to conclude that the potential for the project is very high. A totally new business model can be evolved from this project. This tool can be used effectively used on various database applications and also its cost effectiveness is very high. Various data losses due to vulnerable procedures can now be overcome with the help of this system. The efficient data storage and then backing up the lost data that is in the form of various formats which gives this system an edge as compared to the other system present in the market. The use software engineering principles in the end helped in keeping the project focus and completing the project on time. It helped to clear many design issues and provide clarity of thoughts. Software Testing helped us to recognize various flaws present in the system which were unrecognized during the implementation process. Thus we would like to conclude that in the end the project was properly implemented and above all very good learning experience. The second and the more important side is what we as engineering students learned in the course of this project academically and professionally.
[PAGE No.55]
[PAGE No.56]
[PAGE No.57]
[PAGE No.58]
[PAGE No.59]
[PAGE No.61]
[PAGE No.65]
List of Tables
[PAGE No.66]
1. SOFTWARE & HARDWARE SPECIFICATION 2. PROJECT ESTIMATES 3. RISK PRI0RITISATION 4. WORK DISTRIBUTION 5. ROLES & RESPONSIBILITIES 6. TEST SCHEDULE 7. TEST CASES
16 29 31 32 34 48 49
List of Figures & Diagrams 1. RFID TAG 2. 3. 4. RFID WORKING DIAGRAM TYPES OF RFID TAGS RFID ANTEENA INTERNAL LAYOUT 5. TESTING STRATEGY WORKIKG IMPLEMENTATION 6. USE CASE DAIGRAM 7. ACTIVITY DIAGRAM 8. CLASS DIAGRAM 9. SEQUENCE DIAGRAM 10. COMPONENT DUAGRAM 11. DEPLOYMENT DIAGRAM 06 07 08 12 45 36 37 38 39 40 41
[PAGE No.67]
Chapter: 12 REFERENCES
REFERENCES:[1] The Complete Reference C#.NET 2008, Herbert Schildt, Tata McGraw-Hill Edition [2] Black Book of C#.Net TMH- Second Edition
SIT ,COMPUTER ENGINEERING 2010-11 [PAGE No.68]
[3] Professional C# 2008,Nagel,Evjen,Glynn,Watson,Skinner ; WROX-Wiley India Pvt Ltd. [4] Steve Hodges & Mark Harrison, White Paper-Demystifying RFID: Principles & Practicalities, Auto-ID Centre Institute For Manufacturing, University of Cambridge, Mill Lane, Cambridge, United Kingdom, Jan 2004. [5] Klaus Finkenzeller. RFID Handbook : Fundamentals and Applications of RFID, Chichester : John Wiley, Leipzig, Dritte Edition, 2003. . [6] Software Engineering-A practitioners approach by Roger Pressman [7] The Unified Modeling Language User Guide by Grady Booch, James Ram Baugh & Ivar Jacobson [8]S. Sarma, D. Brock, and D. Engels, Radio Frequency Identification and the Electronic Product Code, IEEE Micro, v.21 no 6, p. 50-54, November 2001.
[PAGE No.69]