Atm Doc
Atm Doc
Atm Doc
1. ABSTRACT
2. INTRODUCTION
All activities directly related to the purpose are considered to be in scope. All
activities not directly related to the purposes are considered to be out of
scope. For example, issues concerning ATM hardware and network
availability are not within the scope of this project.
• provide all deliverables identified in section 1.1.3 by the project due date
• this project will deliver only the software components of the larger project
• initial estimates for the project as provided in this SPMP are +/- 40%
• the larger project that this project is a part of has already defined the
hardware that the software will run on
• the ATM hardware is defined (4th generation NCR ATM hardware) and
detaileddocumentation about the platform will be delivered to Terasoft by
June 1, 2004.
• budget
machines, it will take 30 days for NNB to install the physical ATM
machines in their permanent locations
Staff two outside consultants from Banks Etc. will be required to
assist in the requirements and detail design phases of the project, so as
to lend their extensive ATM experience to the project. The consultants
will also supplement our team elsewhere, as necessary.
Maintenance : the software will have to be designed such that
maintenance expenses do not exceed $100,000 per year (software
maintenance portion of the total $600,000 budget)
Project Deliverables
• Software documentation
Installation documentation
End-user documentation
updates applied to NNB’s central bank documentation
• Project documentation
Start-up Plan
Estimation Plan
Schedule, Cost, and Resource Estimates: An estimation chart
showing activities, estimated duration, estimated cost, and estimated
resource requirements.
Estimation methods
Schedule duration and work estimation for each leaf activity in the
Work Breakdown Structure (WBS) will be performed using a
combination of the following methods and data sources:
o Resource input
For the resource(s) identified as being required to complete the
activity, the resources will be asked for an estimate of the amount of
time required to complete the activity. A detailed estimate will be
requested, broken down into subactivity milestones. Subactivity
milestones tied to the “% complete” metric will force a consideration
of everything that is involved in the activity as well as providing a
basis for EVM monitoring.
WORK PLAN
5. PROJECT ORGANIZATION
5.1 PROCESS MODEL
PROJECT RESPONSIBILITIES
PROGRAM MANAGER - The Project Manager shall be responsible for
defining and controlling project work activities and schedules. Other
team members shall work in conjunction with the project manager to
define the elements of their task assignments, establish a schedule
baseline, collect metric data to assess performance against that
baseline, and conduct re-base lining activities as required. The Project
Manager shall submit the initial baseline and any baseline modifications
to the Program Manager for approval.
CONFIGURATION MANAGER - The CM is responsible for maintaining a
matrix of all customer approved requirements; is responsible for
oversight of the requirements change control process; is responsible
Performance Reporting
The project will report performance to plan with the following metrics:
Earned Value
• Budgeted Cost of Work Scheduled (BCWS) vs. Budgeted Cost of
Work
• Performed (BWCP)
• Schedule Variance (CV)
• Budgeted Cost of Work Performed (BCWP) vs. Actual Cost of
Work
• Performance (ACWP)
• Cost Variance (CV)
• Cost Performance Index (CPI)
• Schedule Performance Index (SPI)
Critical Ratio (CR)
• Estimated Cost at Completion (ECAC)
• Estimated Time at Completion (ETAC)
Requirements
• Requirements change count
Configuration
• Configuration churn
Quality
• Open defects vs. closed defects over time
• Lines of code (LOC)
• Comment percentage
• Defects per LOC
Risks
• Risk exposure
• Top 10 risks
• Weekly risk changes
Development methodology
Development techniques
The requirement passed down to this project from the larger ATM
project is that the software be based on an open architecture using
a Windows NT-based platform and Windows Open Services
Architecture / eXtensions for Financial Services (WOSA/XFS). This
architecture allows us to use object-oriented methods and tools for
analysis, design, and implementation. We will use Object Modeling
Technique (OMT) for this purpose.
Tools
The following work categories will have their work products satisfied
by the identified tools:
• Team member desktop foundation
• Microsoft Windows 2000 desktop operating system
• VMWare Workstation 4.5 [virtual machine support – one VM
per active project]
• Microsoft Office 2003 productivity application suite
• IBM Lotus Notes R6 [e- mail, calendar]
• MindJet MindManager X5 Pro [information organization,
brainstorming]
• Adobe Acrobat 6.0 [creating/viewing PDF files]
• Project management
• Microsoft Project 2003 [WBS, schedule/cost estimates,
resource planning, project
• control]
• Best Carpe Diem [electronic time sheet]
• Tera metric [internally-developed metrics collection database]
• Quality
• Terametric [internally-developed metrics collection database]
• Requirements
IBM Rational RequisitePro [requirements tracking]
• Design
IBM Rational Rose Data Modeler [database design]
IBM Rational Rose Technical Developer [use cases, non
database software design]
• Implementation
Microsoft Visual C++ [programming language, development
tools and object code generation]
Windows Software Development Kit (SDK) [programming
support]
• Testing
IBM Rational Robot [automated functional and
regression testing]
• Training
Microsoft PowerPoint 2003 [training presentations]
Online Performance Reporting
Microsoft Windows 2000 Server Standard [server operating
system],
ATM Management system-Biometric ATM , a Proposal - 14 -
UOM IBM MS (Tech) 7th Semester
Transaction Functionality
We have described the various elements that intervene in an ATM
transaction, the card and the ATM components. Figure 1 shows the
sequence of events involved in the authorization process together with
the functionality of the central authorization system to which the ATM
is connected.
Biometric Technology
The term biometrics comes from the word bio (life) and metric
(measurement). Biometric equipment has the capability to measure,
codify, compare, store, transmit, and/or recognize a specific
characteristic of a person with a high level of precision and
trustworthiness. Biometric technology is based on the scientific fact
that there are certain characteristics of living forms that are unique
and not repetitive for each individual; these characteristics represent
the only technically viable alternative to positively identify a person
Without the use of other forms of identification more susceptible to
fraudulent behavior
Restricted in the past due to its high cost and lack of social acceptance,
biometric identification is now experiencing a higher level of
acceptance not only in high security applications such as banks and
governmental facilities, but also in health clubs, sports events, office
and industrial sites. Costs have been reduced to a reasonable level and
functionality and reliability of the devices is today satisfactory.
ATM Management system-Biometric ATM , a Proposal - 18 -
UOM IBM MS (Tech) 7th Semester
Learning. Each time the user utilizes the system the template is
updated through learning processes taking into account gradual
changes due to age and physical growth. These are later utilized by the
system to determine whether to grant or deny access.
There are a lot of benefits which can be obtained from the synergistic
effect of offering welfare and pension payments through biometrics-
equipped bank ATM networks:
1. Government could reduce its cost and provide a more efficient and
timely service to its constituents.
2. Banks, other financial institutions and retailers could increase the
volume and reduce their ATM unit transaction costs; increase their
revenues by charging the government agencies for the service; and
expand their potential customer base.
3. Transaction processing services companies would increase their
revenues with a higher volume of transactions and from the
provisioning of biometrics database and verification services.
4. Pension and welfare recipients could receive their benefits faster, in
a more convenient and secure form.
5. The public at large could benefit through a reduction in taxes as a
result of a more efficient government.
information from the customer's card and the PIN the customer
entered.
If the bank reports that the customer's PIN is invalid, the Invalid PIN
extension will be performed and then an attempt will be made to
continue the transaction. If the customer's card is retained due to too
many invalid PINs, the transaction will be aborted, and the customer
will not be offered the option of doing another.
All messages to the bank and responses back are recorded in the
ATM's log.
original request is sent to the bank again. If the bank now approves
the transaction, or disapproves it for some other reason, the original
use case is continued; otherwise the process of re-entering the PIN is
repeated. Once the PIN is successfully re-entered, it is used for both
the current transaction and all subsequent transactions in the session.
If the customer fails three times to enter the correct PIN, the card is
permanently retained, a screen is displayed informing the customer of
this and suggesting he/she contact the bank, and the entire customer
session is aborted.
This interface is the very first interface the bank customer interacts
with on the ATM machine. This interface prompts the customer to
insert ATM card and proceeds with the entire authentication processes,
that is, inputting the ID (or card number) and PIN number (see figure
3). If the user enters an invalid card number or PIN number, a
dialogue box appears prompting an invalid PIN or invalid card number
and the system returns enter a valid PIN number. A typical description
of this is shown in figure 4. After validating the customer’s card and
PIN number, the customer is directed to the next phase of the
authentication process via the authentication dialogue box for inputting
the fingerprint. LOGIN INTERFACE
Fingerprint Interface
dialogue box for which the customer can choose Ok, and as soon as
this done the system automatically log off the customer.
Withdrawal Interface
This interface enables the customer withdraw money from his/her
account. It shows the customers current balance by subtracting the
amount withdrawn from the previous account balance. After the
customer has completed all his/her withdrawals, a dialogue box pops
up notifying the customer of his/her successful withdrawal transaction.
The interface is shown below.
a. An agent requests all rooms for a given date that are available
2. Display all of the available rooms for a certain date with certain criteria
a. When agent signs in, all reservations for days passed are purged and the screen
displays the number of reservations purged and their id’s and dates
4. Agent creates new reservation for a certain number of rooms for a certain
number of days
5. Agent deletes reservation from system (must remove all days and rooms)
b. Number of beds and types of beds are specified (includes pull out couch)
e. Kitchenette present
b. The bill needs to detail the cost of the room, taxes and any fees incurred
a. Need for the back up of the files each time you open and save them
USECASE DIAGRAM
What is Risk?
Risk is defined as "The possibility of suffering harm or loss; danger." Even if we're not
familiar with the formal definition, most of us have an innate sense of risk. We are aware
of the potential dangers that permeate even simple daily activities, from getting injured
when crossing the street to having a heart attack because our cholesterol level is too high.
Although we prefer not to dwell on the myriad of hazards that surround us, these risks
shape many of our behaviors. Experience (or a parent) has taught us to look both ways
before stepping off the curb and most of us at least think twice before ordering a steak.
Indeed, we manage personal risks every day.
Making a list of all of the potential dangers that will affect the project
Assessing the probability of occurrence and potential loss of each item listed
Ranking the items (from most to least dangerous)
1. PROPERTY
Fire and Explosion
Natural disaster and third party
Security
Environment
2. PEOPLE
3. OPERATIONAL
Business interruption
Project risk
IT and communications
Product liability
Catastrophe recovery
Regulatory compliance
4. COMMERCIAL
Legal liability
Industry risks
Financial risk
Political risk
Exchange rate risk
Corporate reputation
Services liability
5. TOP TEN SOFTWARE RISKS IDENTIFIED
Personnel Shortfalls
Unrealistic schedules and budgets
Requirements Mismatch/Gold Plating
Developing the wrong functions and properties
Developing the wrong user interface
Continuing stream of requirements changes
Shortfalls in externally furnished components
Shortfalls in externally performed tasks
Real-time performance shortfalls
- Coming up with techniques and strategies to mitigate the highest ordered risks
- Implementing the strategies to resolve the high order risks factors
- Monitoring the effectiveness of the strategies and the changing levels of risk
throughout the project
Design recovery;
Phase-out options analysis;
Restructuring
Prototyping;
scenarios;
user characterization (functionality, style, workload)
Qualification testing;
benchmarking;
prototyping;
reference checking;
compatibility analysis;
vendor analysis;
evolution support analysis
Reference checking;
audits;
award-fee contracts;
competitive designer prototyping;
team-building
Technical analysis;
cost-benefit analysis;
prototyping;
reference checking
9. FEASIBILITY STUDY
The “Hotel Management System” software will be used by the receptionists to check-in,
check-out and billing customers, accounts personal and the other employee’s such as the
managers to check the reports. The software fulfills all necessary requirements for such
application. It provides a graphical user interface that makes easier for the staff to use. It
also provides easy to understand menu structure. It’s easy to use nature makes it readily
acceptable to the end users, who need not have much technical knowledge to use it.
This project is designed to meet the requirements of Hotel Management System. It has
been developed in visual basic and MS Access keeping in mind the specifications of the
system. The Hotel Management System’s objectives are to provide a system to manage a
hotel that has increased in size to a total of 100 rooms. Without automation the
management of the hotel has become an unwieldy task. The end users’ day-to-day jobs of
managing a hotel will be simplified by a considerable amount through the automated
system. The system will be able to handle many services to take care of all customers in a
quick manner. The system should be user appropriate, easy to use, provide easy recovery
of errors and have an overall end user high subjective satisfaction.
REFERENCES