Software Design Description For: COMSATS University Islamabad, COMSATS Road, Off GT Road, Sahiwal, Pakistan

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

COMSATS University Islamabad,

COMSATS Road, off GT Road, Sahiwal, Pakistan

SOFTWARE DESIGN
DESCRIPTION
(SDD DOCUMENT)

for

<Smart Security System>


Version 1.0

By
Jeevan Abbas CIIT/FA17-BCS-075/SWL

Numair Amiin CIIT/FA17-BCS-061/SWL

Supervisor
Dr Javed Ferzund

Bachelor of Science in Computer Science (2017-2021)

1
Contents
Table of Figures:.........................................................................................................................................3
Revision History..........................................................................................................................................4
Application Evaluation History....................................................................................................................5
1. Introduction.............................................................................................................................................6
2. Scope.......................................................................................................................................................6
3. Design methodology and software process model..................................................................................6
3.1 Incremental Model..........................................................................................................................6
3.2 Agile Model......................................................................................................................................7
4. System overview......................................................................................................................................7
5. Architectural design.................................................................................................................................7
5.1 Process flow/Representation...........................................................................................................9
6. Design models.......................................................................................................................................10
7. Data design............................................................................................................................................12
8. Data dictionary......................................................................................................................................12
9. Algorithm & Implementation.................................................................................................................13
10. Human interface design.......................................................................................................................13
10.1 Screen images...............................................................................................................................14
10.2 Screen objects and actions...........................................................................................................15

2
Table of Figures:
Figure 1: Architecture design using Model View Controller.......................................................................8
Figure 2: Architecture design System..........................................................................................................8
Figure 3: Flow Chart...................................................................................................................................9
Figure 4: Sequence Diagram.....................................................................................................................10
Figure 5 : Class Diagram...........................................................................................................................11
Figure 5 : DFD Level 0.............................................................................................................................11
Figure 6: DFD Level 1..............................................................................................................................12
Figure 8: Screen image 1...........................................................................................................................14
Figure 9: Screen image 2...........................................................................................................................14

3
Revision History
Name Date Reason for changes Version

4
Application Evaluation History
Comments (by committee) Action taken
*include the ones given at scope time both in doc and
presentation

Supervised by
<Muhammad Usman Nasir>

Signature______________

Co-Supervised by
<Muhammad Amir>

Signature______________

5
1. Introduction
Smart security system is designed to improve the security and to protect the privacy. This system
solves the problems of security. First the system detects the face of the person then face
normalization takes place in which the unnecessary factors are reduced to enhance the recognition
process then features of the face will be extracted and matched with the previous ones to recognize
the person. Algorithms are implemented to train the system to recognize person. If the face is
recognized by the system the door will open but if the system does not recognize the person it will
send notification to the admin. The second layer is used in this system is laser system, it contains
the receiver and laser light. The receiver continuously receives the light that is emitted from laser
light when the object held between receiver and light the bell alarms to warn the user. Incremental
methodology is used to develop this system. Code is written in python language. In this project
different components are used i.e., camera is used to detect person's face and Arduino board is
used to implement coding, relay module and door lock. This project detects the face and using the
facial recognition. Laser system is used to protect the walls of the building.

2. Scope
We are building this smart security system because we saw security problems in our society so
scope of our project is very precise. Initially the scope of our project is to detect and recognize the
person. The system would not detect covered faces. This system can be implemented in homes,
offices, hostels and organizations.

3. Design methodology and software process model

3.1 Incremental Model


Waterfall model has many drawbacks in the development of any product, to overcome these
drawbacks incremental model is used in the development phase of our project. In this model the
product is developed in increments and in module wise one after one, each modules contains more
functionalities than before. In smart security system we use incremental modal to develop the
system module wise. Firstly, code is embedded in the hardware then all the hardware components
are connected to work properly and algorithms are implemented on the system to train the date
then at last we have to train our system using different datasets.

4. System overview
The purpose of this system is to recognize the known or unknown person if the person is
recognized than the door will be open but if the system recognize the unknown person the door
will remain close. It is a desktop based smart security system by using this system the security can
be improved the interface of the system is very simple to operate and attractive to watch the user
can simply add information of user with dataset than train the dataset of user and then system
recognize the person on the basis of trained data different algorithms are used to extract features
from face on the basis of system recognized the person. The system also maintain the data of the
users the data can also be updated by single click .

6
5. Architectural design
The structure of the system explains its core components, their relationships, and how they deal
with each other. Software architecture and design includes several factors such as business
strategy, quality attributes, human dynamics, design and IT environment. In Architecture,
nonfunctional decisions are cast and separated by the functional requirements. In Design,
functional requirements are accomplished. Admin module is very important. It is a major module
in this admin have all rights to manage system, sales, client members, message, feedback.Anyone
can visit, anyone can visit the main page related to systemand can get information and know about
our system that how to use to system and how anyone can get their self-registered. A combination
of the modules makes up the system. We can use flowcharts to represent and illustrate the
architecture.

Figure 1: Architecture design using Model View Controller

7
Figure 2: Architecture design System

5.1 Process flow/Representation

Flow Chart

8
Figure 3: Flow Chart

6. Design models

Sequence Diagram
This image shows that how system will work, tasks after task with sequence wise. It gives the
complete description the working of our system.

9
Figure 4: Sequence Diagram

Class Diagram

10
Figure 5 : Class Diagram

Data Flow Diagram


This diagram represents the flow of data or process of the system. It gives complete information
about the outputs and generated after providing user’s inputs of each module and process itself.
LEVEL 0:

Figure 6 : DFD Level 0

LEVEL 1:

11
Figure 7: DFD Level 1

7. Data design
Data design is basically made to explain the relationship between data and the system how data is
stored in the system and how system works with using this data. We use SQL database to store
and manage the information of users. The information of the user is further used to train the
system the information can be updated or easily retrieved.

8. Data dictionary

9. Algorithm & Implementation

10. Human interface design


There will be a simple and attractive GUI. Admin can simply add user information with dataset
easily or can update the information if requirements changed. He can train the system in single
click. The design fulfill all the HCI guidelines to avoid the errors and provide consistency
throughout the system.

10.1 Screen images

12
13
14
10.2 Screen objects and actions
Screen objects contain the login panel where the admin can sing in into the system after the
successful sign in dashboard comes which contains multiple options like add user information
with dataset the user belongs to some department it can help to easily manage the large amount
of information, train the system using user's dataset and then detect the person and shows the
result on the screen.

Appendix I
 Epstein, N. (2018). Susan Sontag's On Photography: Macat Library.
 Freelancer. (2019). Freelancer Retrieved from https://www.freelancer.com
 Lee, C.-k. (2018). Time-lapse photography system and method: US Patent App. 15/622,975.
 symufa. (2019, 03 26). sellfy. Retrieved from https://sellfy.com
 Upwork. (2019). Upwork. Retrieved from https://www.upwork.com
 ViewBug. (2019). Retrieved from https://www.viewbug.com

15

You might also like