Final Report 2
Final Report 2
by
ENGINEERING) (HONS.)
MAY 2021
APPROVAL PAGE
The undersigned certify that the above candidate has fulfilled the condition of the Final Year
Engineering) (Hons.)
SUPERVISOR:
Signature:
Date:
DECLARATION
I hereby declare that this report, submitted to Universiti Tenaga Nasional as a partial
fulfilment of the requirements for the Bachelor of Computer Science (Software Engineering)
(Hons.) has not been submitted as an exercise for a bachelor at any other university. I also
certify that the work described here is entirely my own except for excerpts and summaries
This report may be made available within the university library and may be photocopied or
31 MAY 2021
Signature
SW0104101
ABSTRACT
In the era of ubiquitous devices and mobility, students increasingly carry objects of great
value. Because of increased mobility, students are also more inclined to lose these objects.
We support the growth of a community of users able to solve the problem on their own using
their mobile phones. Therefore, the main objective of this project is to create a mobile
application, Lost Item Tracking System, that helps students to retrieve their lost items. The
application will be developed in both ios and android by using Xamarin. The method used to
develop this mobile application is by using the prototyping methodology. The reason this
method is chosen is because the developer will receive feedbacks from the client or the target
user for every prototype the developer has created. Therefore, the developer can refine the
prototype until it fulfils the product requirement. The requirements are gathered by
conducting web study and distributing an online survey. The results from the web study and
the online survey are analyzed. Based on the analyzed results, a Use-Case diagram, Entity-
Relational Diagram and interface design are constructed to be used as a reference for the
development of the mobile application. Features of the application are also based on the
analyzed results.
ACKNOWLEDGEMENT
In preparation of constructing the documentation for Final Year Project 1 (FYP1), I had to
receive guidance and assistance from some respected people, who deserve my highest
gratitude. Although the completion of this document brings me great relief, I would like to
express my gratitude to my supervisor, Tuan Yunus Bin Yusoff, Assoc. Prof. Ts. for giving
me helpful guidelines and assist me in this project. I would like to also extend my gratitude
to all the peoplewho have either directly or indirectly helped me in writing this document.
Moreover, I would like to express my gratitude to my peers for helping and supporting me
with this project by giving comments and their opinions in improving this document.
TABLE OF CONTENTS
PAGE
APPROVAL PAGE I
DECLARATION II
ABSTRACT III
ACKNOWLEDGEMENT IV
TABLE OF CONTENTS V
CHAPTER 1 INTRODUCTION
ERROR! BOOKMARK NOT DEFINED.
1.1 Project Background 1
1.2 Problem Statements 2
1.3 Project Objectives 3
1.4 Project Scopes 3
CHAPTER 2 METHODOLOGY 4
2.1 Review on Existing Systems 4
2.1.1 System 1 6
2.1.2 System 2 7
2.2 Finding and Analysis 9
REFERENCES 59
APPENDIX A: SOFTWARE REQUIREMENTS
SPECIFICATIONS 61
ii
CHAPTER 1
INTRODUCTION
Lost property process is time consuming for staff and students. Whether it’s the
property is a headache for all. Alongside other important tasks, staff are ill-equipped to
manage lost and found. Lost Item Tracking System is a mobile phone application which
will support all students. The popularity of smartphone has increases over the year. This
could change and speed up the process in universities. When their things are lost,
students can scan the QR code sticker on it, and the details of the code shall be send to
the system. Then, the system shall send the lost thing owner detail to the person who
scans it.
1
1.2 Problem Statements
University students are losing more things than ever, the average student loses 2 items
per year, anything from chargers to student IDs. Firstly, without a reliable lost property
process, losing things means replacing them. This could be a small or hefty price. With
students relying on student loans to stretch across living and academic costs, replacing
items is a huge inconvenience. There is an issue with the awareness of a lost property
process at universities that needs to change. Therefore, adopting a dedicated lost
property software will ensure more items are returned to students. Lastly, the lost
property process has a detrimental effect on student experience. Students trek around
campus, asking different people about their lost item. This time could be spent being
more productive. Furthermore, students are met with clueless staff who can’t offer any
help. This is confusing and frustrating.
2
1.3 Project Objectives
PO-1: Reduce time period of getting back student’s belongings that lost in university
campus.
PO-2: To simplify current lost item recovery process by automating the process.
PO-3: Shred the time spent by university staffs in managing lost and found by 50-80%.
1.4.1 User
The target users for this application are students or staff who lose their belongings.
1.4.2 System
a) Generate their QR code if their personal detail has been filled up.
3
CHAPTER 2
RELATED WORKS
QR codes were first invented in 1994 by the Denso Wave company to track their
manufacturing process for vehicles. That’s all there was to QR code usage. Just like
NFC and RFID, tracking items was what QR codes were primarily used for. Inventory
management needs nowadays have far surpassed what was required in the 1960s, so
Barcodes simply aren’t enough anymore. With complex global manufacturing and
logistics systems, QR Codes provide the capability to hold much more comprehensive
System 1
to midsize businesses in mind. The application’s core feature allows users to create and
track QR codes that can be scanned from mobile devices. As such, additional hardware
accessories such as barcode scanners are not required to use QR Inventory. Beyond QR
such as vendor managed inventory, kitting, lot traceability and reports. Users can create
4
customized inventory transactions and define what they want to track for each type of
monthly subscription, based on the number of items per month that the business is
tracking. It is operating system agnostic and compatible with both iOS and Android
devices.
5
6
System 2
Asset Panda is a cloud-based platform for facility managers that offers a suite of
with Windows, Mac, iPad, iPhone and can be used from anywhere while updating data
in real-time.
Asset Panda helps users assign contacts by location and track depreciation. The User
can use a qr code scanner to look up asset details and automate pick lists. Role-based
security ensures that employees are granted the appropriate level of access, so they
always see the information relevant to what they are working on. Asset Panda offers
customized exporting and reporting features. Reports can be automated via email, with
the ability to add custom calculation fields (and designate if each field should be
Asset Panda helps users in auditing, facilities management, equipment support ticketing,
7
8
2.2 Finding and Analysis
1 2018 Asset Panda Mac OS, Web QR CODE AND Keep tools from wandering away by
browser (OS BARCODE knowing exactly which crews have
agnostic), what, what job it's assigned to, and
Windows 8 what condition it is in.
2 2018 QR inventory Android QR CODE IN QR Inventory gives you the right tools
software, Mac SMARTPHONE to streamline inventory management
OS, Web and asset tracking process, in the field
browser (OS and warehouse.
agnostic)
9
CHAPTER 3
REQUIREMENT ANALYSIS
This section will provide information about the techniques that are used to gather
Web study is using the Internet to find and analyze information to understand the scope of
the proposed application which is lost item tracking using qr code. Also, this technique is
used to identify the components that are implemented that used to track user’s lost
analyzed to identify the features that should be implemented for tracking lost items.
10
3.1.2 Survey
Survey is a method that involves handing out a set of questions to multiple individuals to
gather information about how they track their lost belongings. This survey is conducted
online using Google Forms by sharing a link to other people to answer those questions.
This technique is conducted to analyze how often people lose their belonging and the items
3.2.2 Survey
The survey that has been conducted has received 15 respondents in total.
11
Figure 3.1 Results of Survey 1
Figure 3.1 shows the gender of all the respondents. 53.3% of the respondents are male
12
Figure 3.2 Results of Survey 2
Figure 3.2 shows that only 13.3% of student got back their lost belongings, whereas the
Figure 3.3 shows that most lost item by students is pendrive where 33.3% of the respondent has lost
it. Meanwhile, for chargers there are 26.7% of respondent has lost it followed by water bottles for
20% and 13.3% for wallet or purse and least lost item is mobile phone where only 6.7% of
13
3.3 Requirement Specifications
Based on the use case diagram above, the application will have two users which is students and
admin. Users need to enter their personal details into the system. When an item is lost, students can
scan the QR code sticker which stick on it, and code shall be send to the system. Then, the system
shall send the lost thing owner detail to the person that scan it. The system shall also send a
notification to the owner of the lost thing. In other side, administrator may get student details from
the system. Administrator may change and send the student account status back to the system.
14
CHAPTER 4
SYSTEM DESIGN
The purpose of this chapter is to document the system specifications and system design for the
mobile application. The system design is divided into three parts which are system architecture,
interface design and database design. Interface design is included to explain the flow of the
System Architecture is a diagram that represents the components and the subcomponents of a
system. Below is a system architecture to show the relationship between different components.
15
Figure 4.1 System Architecture
Figure 4.1 shows the system architecture that represents the component of the system and
the relationship between these components. The components of this system architecture is
the user, the hardware, the mobile application, the server and the database.
This application has two types of users which is User and Admin. The user will be able to
access the application by using a mobile client which is their mobile phone. The user will
use the application to generate QR code, scan QR code and view the details stored in the
QR code scanned. The second user is the admin. Admin will be able to access the
16
Each of these actions requires the interaction between the application, the server and the
database. Whenever the user performs an action, the application will send a request to the
server. Then, the server will perform queries to execute the request from the application
Login
This function allow system to check either the login user is the account owner or not, by request
2. The system shall allow user login if both inputs are correct.
3. The system shall allow logged in user to use all the features which provided in their
account.
4. The system shall notify user if either one of the input was wrong.
Name Login
Associated Goal(s) The system shall enable account owner to access their account
to the application.
17
Other actor(s) NA
Post condition NA
login page.
and 7)
Alternative Scenario NA
Exception Scenario 1. If one of the inputs (ID and password) was invalid value or
18
Screen Sketches:
student.
19
Figure 2: Login page for admin. Figure 4: Main page for admin.
Generate QR Code
This function allow user to generate their QR code which will connect to their personal details page.
1. The system shall allow user to generate their QR code if their personal detail have been
filled up.
20
Name Generate QR Code
Associated Goal(s) The system shall enable user to generate and get their QR
code.
Other actor(s) NA
Post condition NA
Main Scenario 1.The user clicks on “Generate QR Code” button in the main
21
2.The system will generate a QR code for user if they have
Alternative Scenario NA
Exception Scenario 2.1 If user did not fill up those constraint of personal details,
page.
Screen Sketches:
22
Enter User Detail
This function allow user to enter their personal details and to be save in database. Priorities : High
Functional requirements :
2. The system shall allow user to enter all their personal details.
Associated Goal(s) The system shall enable user to save user detail in database.
23
Other actor(s) NA
Post condition NA
Main Scenario 1. The user clicks on “Enter User Detail” button in the
account.
Alternative Scenario NA
Exception Scenario 2.1 If user did not fill up those constraint of personal details,
be clicks.
Screen Sketches:
24
Figure 6: Page of enter user detail.
Scan QR Code
This function allow user to scan the QR code which is stick on lost thing. Priorities: High
Functional requirements:
1. The system shall able to scan the QR code which is stick on lost thing.
25
2. The system shall ask user permission of send their personal detail to lost thing’s owner,
Associated Goal(s) The system shall enable user to scan and read the QR code
Other actor(s) NA
Post condition NA
detail.
Main Scenario 1. User clicks on “Scan QR Code” button in the main page.
database.
Alternative Scenario NA
26
Exception Scenario 2.1 If the QR code was broken, system will not able to
thing owner, then the system will not show lost thing owner’s
details.
Screen Sketches:
27
Figure 7: Page of Scan QR code. Figure 8: Ask permission of send user details to lost thing’s
owner.
This function allow user to view lost thing’s owner details. Priorities: High
Functional requirements:
1. The system shall display all the owner detail on user phone.
28
Name Display Owner Detail
Associated Goal(s) The system shall enable user to view lost thing owner’s
details.
Other actor(s) NA
owner’s
Post condition NA
Main Scenario 1. User clicks on “Scan QR Code” button in the main page.
29
2. User need to scan the QR Code which stick on the lost
database.
Alternative Scenario NA
Exception Scenario 2.1 If the QR code was broken, system will not able to
4.1 If the user not allow their details to be send to lost thing
owner, then the system will not show lost thing owner’s
details.
Screen Sketches:
30
Figure 9: Lost thing’s owner detail.
View Notification
This function allow user to receive and view notifications about the details of owner user scanned,
31
1. The system shall keep all the event about user have scanned who’s QR code and user’s
2. The system shall allow use to view all the history which keep in notification.
Associated Goal(s) The system shall display all the previous history.
Other actor(s) NA
Pre-condition 1. Given the user QR code have been scanned by other or user
Post condition NA
page.
Alternative Scenario NA
Exception Scenario NA
Screen Sketches:
32
Figure 10: Page of View Notification.
33
Select Setting
This function allow user to use “Edit Profile”, “Choose Language”, “Help”, and “Contact Admin”
1. The system shall display features use “Edit Profile”, “Choose Language”, “Help”, and
“Contact Admin”.
2. The system shall allow user to use all the four feature.
Associated Goal(s) The system shall access and display the page user wanted to
go.
Other actor(s) NA
Post condition NA
Main Scenario 1.User clicks on “Settings” button in the main page. 2.System
Alternative Scenario NA
34
Exception Scenario NA
Screen Sketches:
35
Figure 11: Page of Settings.
Edit Profile
This function allow user to edit and customize their account details to their own preferences.
2. The system shall allow user to change and customize their details and save it.
3. The system shall save and replace old details to new user details into database.
36
Name Edit Profile
Associated Goal(s) The system shall enable user to edit their current details and
Other actor(s) NA
Post condition NA
37
Main Scenario 1. User clicks the “Setting” button and “Profile Setting”
15)
4. System will save the new user detail to replace the old
one in database.
Alternative Scenario NA
Exception Scenario 3.1 If the user does not wish to enter certain details, they can
leave some of the sections blank and continue with the other
parts.
Screen Sketches:
38
Figure 12: Page of Edit Profile.
39
Choose Language
This function allow user to change language between English and Malay as application’s default
language.
1. The system shall display all the possible language that can be choose.
3. The system shall change application’s language to the language which selected by user.
Associated Goal(s) The system shall able user to choose application’s language.
Other actor(s) NA
Post condition NA
40
language.
Alternative Scenario NA
Exception Scenario NA
Screen Sketches:
41
Figure 13: Choose language user interface.
Display Help
This function acts as a guide and a tutorial that will help explain the user on how to use application
1. The system shall display application guide line for the whole system.
2. The system shall allow user to choose which part they wanted to read.
3. The system shall display the part of guide line which chosen by user.
42
Name Display Help
Associated Goal(s) The system shall provide relevant information that will guide
Other actor(s) NA
Post condition NA
Result(s) - The system displays system guide line for user to read.
43
3. System shall display system guide line list. (Figure
17)
read.
Alternative Scenario NA
Exception Scenario NA
Screen Sketches:
44
Report to Admin
This function will be use when user facing problems to the system. User is able to send comment to
1. The system shall allow user to fill up personal info and comment of system problem.
45
Name Report to Admin
Associated Goal(s) The system shall provide boxes to get user info and comment.
Other actor(s) NA
Post condition NA
Request” button.
report profile.
Alternative Scenario NA
Exception Scenario 4.1 If user did not fill up all those boxes, then the system will
Screen Sketches:
46
Figure 15: Page of Help.
47
Modify Student Account Status
This function allow admin to modify UNITEN undergraduate student account. Priorities : High
Functional requirements :
1. The system shall allow Admin to create account, frozen account, unfrozen account, and
delete account.
2. The system shall update all the change of UNITEN undergraduate student account by
admin.
Associated Goal(s) The system shall enable admin to manage and control all
account.
Other actor(s) NA
Post condition NA
student account.
48
Main Scenario 1. Admin clicks the “Modify Student Account Status”
in database.
Alternative Scenario NA
Exception Scenario 3.1 If the account number have been typed in was not match.
49
Screen Sketches:
Figure 16: Page of View frozen account. Figure 17: Page of View unfrozen account.
50
Figure 18: Page of delete existing Figure 19: Page of change student account status.
student account.
Log out
This function allows logged in user and admin to log out the system. Priorities: High
Functional requirements:
1. The system shall allow user to log out when they wanted.
51
Associated Goal(s) The system shall enable account owner to access their account
to the application.
Other actor(s) NA
Post condition NA
Result(s) - The user and admin successfully to log out from their
account.
Main Scenario 1. User need to click “Exit” button in order to log out
Alternative Scenario NA
Exception Scenario NA
52
Related Use case(s) NA
Screen Sketches:
53
4.4 Database Design
Figure 4.2: Data Modeling Diagram of the Lost Item Tracking System
54
Entity Attribute Description Data Type Constraint
55
Password Primary Key Varchar2(15) Not Null
UNITEN
student’s
unique
password
56
Phone_Number Primary Key Number (11) Not Null
Personal
phone
number of
students
57
Scanner_ Address Home or Varchar2(25) Null
Hostel
address of
scanner
58
CHAPTER 5
5.1 Conclusion
For people who lost their things, the Lost Item Tracking System is an information system that
will provide information about the owner of the things that lost to who found it. The system
will store the name and contact information of the thing’s owner in the QR code and people
can simply print it and attached to their belongings. To people who found any things, they
can scan the QR code to contact the person. This system will help people to find their
personal thing’s. Unlike the current situation where people post about their missing product
on social media to find it, our product will help people to find their belongings in a short
period.
In conclusion, the QR Tracking Code System is meant to help the UNITEN Committee by
reducing the effort to find their lost belongings. For the FYP 2 this system will be developed
as a hybrid application that can be used by both android and ios users.
59
REFERENCES
2- "Barcode Readers using the Camera Device in Mobile Phones". Retrieve from
https://ieeexplore.ieee.org › document
4. https://www.softwareadvice.com/inventory-management/qr-inventory-profile/
60
APPENDIX A: SOFTWARE REQUIREMENTS SPECIFICATIONS
61
Software Requirements
Specification
for
62
63
Software Requirements Specification for [QR CODE TRACKING SYSTEM] Page lxiv
Table of Contents
1. Introduction ..............................................................................................................................1
1.1 Purpose.......................................................................................................................................... 1
1.2 Project Scope and Product Features .............................................................................................. 1
1.3 Definitions, Acronyms, and Abbreviations ................................................................................... 2
1.4 References ..................................................................................................................................... 3
1.5 Overview ....................................................................................................................................... 3
2. Overall Description ..................................................................................................................4
2.1 Product Perspective ....................................................................................................................... 4
2.2 Product Functions ......................................................................................................................... 7
2.3 User Classes and Characteristics................................................................................................... 8
2.4 Constraints .................................................................................................................................... 8
2.5 Assumptions and Dependencies.................................................................................................... 8
2.6 Apportioning of Requirements...................................................................................................... 8
3. System Features .......................................................................................................................9
4. Other Nonfunctional Requirements .....................................................................................14
Revision History
Name Date Reason For Changes Version
HARVEEN 19/03/21 Reason (initial draft) 1.0
HARVEEN 31/05/21 Final draft 2.0
1.Introduction
This document is System Requirements Specification (SRS) for “Lost Item Tracking System”. The
aim of this document is to gather and analyze and give an in-depth insight of the complete Lost Item
Tracking System by defining the problem statement in detail.
1.1 Purpose
The purpose of the document is to collect and analyze all assorted ideas that have come up to define
the system, its requirements with respect to consumers. Also, we shall predict and sort out how we
hope this product will be used in order to gain a better understanding of the project, outline concepts
that may be developed later, and document ideas that are being considered, but may be discarded as
the product develops.
Moreover, the purpose of this SRS document is to provide a detailed overview of our software
product, its parameters and goals. This document describes the project’s target audience and its user
interface, hardware and software requirements. It defines how our client, team and audience see the
product and its functionality. Nonetheless, it helps any designer and developer to assist in software
development lifecycle (SDLC) processes.
NA No applicable
PF Product Function
PR Performance Requirements
PK Primary Key
FK Foreign Key
REL Reliability
AVL Availability
SEC Security
MAI Maintainability
POR Portability
1.4 References
1- "Two-Dimensional Bar-code Decoding with Camera-Equipped Mobile Phones".
Retrieve from https://ieeexplore.ieee.org › document
2- “Barcode Readers using the camera device in Mobile Phone”. Retrieve from
https://ieeexplore.ieee.org › document
1.5 Overview
2. Overall Description
This section will give an overview of the whole Lost Item Tracking System. The system
background will be providing, and system functional requirement will be describing in hare. This
section will consist of “Product Perspective”, “Vision Statement of the Solution”, “Product
Function”, “User classes and characteristics”, “Design and Implementation Constraints”, “User
Documentation” and “Assumptions and Dependencies
Copyright © [2021] by [Harveen Velan]. All Rights Reserved.
Software Requirements Specification for [QR CODE TRACKING SYSTEM] Page 4
a) System interfaces
b) User interfaces
c) Hardware interfaces
d) Software interfaces
e) Communications interfaces
f) Memory
g) Operations
h) Site adaptation requirements
PF2- User can generate their own QR code, when they have filled up their personal details.
PF4- Provide quick response method to get lost thing owner details. PF5- Allow user to view lost
thing owner details.
PF6- User can view their history about the name of owner they scanned, and the people who have
scanned their QR code.
PF7- User is given choose to use Profile Setting, Choose Language, Help, and Contact Admin.
PF9- User can change system language between English and Malay. PF10- User can view system
guide line to get help.
PF12- Admin can create account, frozen account, unfrozen account, ban account and delete account.
The user interface for this application shall be compatible with any android and ios smartphones.
The user interface shall be implemented with any tool or software package. Details for the user
interface will be included in System Design.
2.1.3 Hardware interfaces
The application can only be accessed on android and iOS mobile phones. All hardware for the
application requires a connection to the internet. All devices require camera functionality to access
or detect the QR code.
Lost Item Tracking System application shall use HTTP protocol for communication over the
Internet.
Not Applicable.
2.1.7 Operations
Not Applicable.
UNITEN This type of user is allowed to use most of the system features. They
Student are able to use the system to generate their own personal QR code,
and scan other people’s QR code. For an example, if user found any
lost thing, they can scan the QR code sticker which stick
on lost thing in order to get owner detail, and return the thing. This is
same of their QR code to other people.
2.4 Constraints
CT-1: This web application requires a maximum of 4 months for thedevelopment,
CT-2: For final year project purpose, the application is built by only one person.
Copyright © [2021] by [Harveen Velan]. All Rights Reserved.
Software Requirements Specification for [QR CODE TRACKING SYSTEM] Page 7
AD2- User should have a valid internet to login and use the application.
AD4- System should only allow to be use at smart phone with version more than 4 for Android and
version more than 7 for IOS.
AD5- Project scope will not require to be change when stakeholder sign off the scope statement.
AD6- Project model will not change throughout the execution of system.
AD7- UNITEN provide permission for UNITEN student to use the application.
3. System Features
Login
Description and Priorities
This function allow system to check either the login user is the account owner or not, by
request their ID and password.
Priorities : High
Functional requirements :
Generate QR code
Description and Priorities
This function allow user to generate their QR code which will connect to their
personal details page.
Priorities : High
Functional requirements :
1.The system shall allow user to generate their QR code if their personal detail
have been filled up.
Name Generate QR Code
Source(s) System – UNITEN Lost Item Tracking System
Associated Goal(s) The system shall enable user to generate and get their QR
code.
Primary actor(s) UNITEN Undergraduate Student
Other actor(s) NA
Pre-condition 1.The user is authenticated to login into the system.
Post condition NA
Result(s) - The user QR code have been generated.
Main Scenario 1.The user clicks on “Generate QR Code” button in the
main page to access “Generate QR Code” page.
Other actor(s) NA
Pre-condition 1.The user is authenticated to login into the system.
Post condition NA
Result(s) - The user QR code have been saved in database.
Main Scenario 1.The user clicks on “Enter User Detail” button in the
“Generate QR Code” page.
2.User need to fill up specific personal details and clicks
“save” button. (Figure 9)
3.Those user detail will be store in database and under
user account.
Alternative Scenario NA
Exception Scenario 2.1 If user did not fill up those constraint of personal
details, then the system will not allow the “save” button to
be clicks.
Related Use case(s) NA
Scan QR Code
1,The system shall able to scan the QR code which is stick on lost thing
2.The system shall ask user permission of send their personal detail to lostthings
owner, in purpose to get lost thing’s owner detail.
The requirements in this section provide a detailed information regarding to the system
performance.
PR1- The system should login and logout the user account within 2 second.
PR2- After scanning the QR code, receive time of owner details will not more than 4 second.
PR3- The system speed should not be affected, when login user not more than 1000 people.
PR4- If the system down suddenly, it will automatically start up within 3 minutes.
C-1. Input modes / data types, including numeric, alphanumeric, binary/byte and
kanji/kana.
C-4. Size of generated QR code should be at least 1 x 1 inch. Or 2.5 x 2.5 cm (in
width and height)
This section will state quality properties for the entire QR-CTS. Below show five
quality properties which relate to this system.
4.4.1 Reliability
4.4.2 Availability
AVL2- QR-CTS should be down at last day of each month, for service purpose.
4.4.3 Security
SEC1- QR-CTS should lock the user’s account after five time getting wrong password
and send a massage with an additional password for unlock the account to the user.
SEC2- The user should available to change new password when they have enter current
password correctly.
4.4.4 Maintainability
MAI1- QR-CTS should no need more than one week for programmer to add a new
Copyright © [2021] by [Harveen Velan]. All Rights Reserved.
Software Requirements Specification for [QR CODE TRACKING SYSTEM] Page 15
system feature.
MAI2- QR-CTS should test in every perspective more than 30 times when bug happen.
4.4.5 Portability
POR1- The application of QR-CTS should work on every phone’s Operating System.