Disclaimer: This is an example of a student written essay.
Click here for sample essays written by our professional writers.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.com.

System to Develop Library Infrastructure

Paper Type: Free Essay Subject: Information Systems
Wordcount: 3415 words Published: 18th May 2020

Reference this

Project proposal

Abstract

The proposed report tends to provide the complex knowledge about the proposed system which offer an exciting infrastructure to the libraries and will change its behaviour from existing ones for example books usually contain ISBN, author name, book number, category, price and also sheds upon the risk involve into the project and their proper mitigation techniques. The proposal clearly indicates the risks involved in this project and the possible risks with the help of risk management factors. The risks are being critically discussed to provide an overview of the possible and the intensity of those risks involved in the project. Visualization methods such as the data flow diagram and the context diagram will be used in the proposal to find a clear view of the organization’s background. In addition, this statement tends to provide knowledge about the services that will be provided to a library user with the help of a wireless network. The problem that people cause today, like the days before when there is less technology, is queuing to pay or borrow a book from the library. The solution that this project focuses on is to create an infrastructure that allows people to bring the books from the library they want to obtain without any face-to-face interaction with people to pay or enter the details in the registry to register and track records.( The Android Studio is used to create the application for mobile responsive and other things. For backup we use the MySQL that is best for creating the database for our application. The MySQL is a Structured Query Language which is easily to use and build the database very effective for the application.)

Data flow

 

Overview

The idea of proposed system we got from amazon go online store which serve in the field of shopping without facing people on the checkout counter and eliminate the step of being in a long line. Amazon go established their stores in 2019 in Chicago, New York and 15 more cities of USA. As amazon go store reduce the steps of checkout and payment steps for shopping by the customers our proposed system makes the library work easy and give friendly environment to the library client. The system support to the cashless society where cash is replaced by digital currencies. Moving on, the system that we are going to build is with the idea of ​​obtaining books from libraries without going through the person at the desk. The idea is based on an application that will help people to register in the library and obtain books and other materials without any other human interaction. People must download the proposed application first on their mobile (which is linked to library’s database which contains customer number) to manage their account for getting books from the library. People simply go to the library to see what they want and put that material in their bags and leave, but the only thing they need is to register with the library with the proposed application by their mobile phones. This application would be used to scan the book’s ISBN number in the library. Holding the mobile screen and with the help of mobile phone’s camera one has to scan the book’s bar code/ ISBN number. The books or other material that someone removes from the shelf will be automatically added to the virtual chat when the book’s ISBN is scanned by the user with their mobile phone. When someone is done with books, he / she wants from the library, he / she must go without facing any desk person or someone else. There are no lines, there is no payment steps. Soon after, the person who takes things from the library will receive a notification that his/her’ s receipt is ready with ISBN numbers of books and books count which are taken by one of the customer of library with due issued and due date for that particular book and customers would be responsible for penalty for they the books they borrow or under guarantee. The charge would be deducted from the responsible person’s account when the due date of return the books will be expired. For implementing this thing, we will work on the proposed project which have some phases like First, the login process would be performed by the person who wishes to take the services of the library. Registration must  be done first for the people who will use the services first time after this application is implemented in the library, but people who are already customers of library like who have Library card can use the services by using that identity number which provided by library to him/her previously. Basic information must be obtained at the registration stage, such as first name, last name, contact number, email address, password, etc. The next phase is to manage the bank details like card number, CVV, and card’s expiry date of the person who wishes to obtain library services. After successfully registering with the library application on the user’s mobile, user will able to get the books or other material from the library. The proposed application would contain information related to the contact, followed by sending an email to customer service for any questions or technical assistance. The feedback command will also be there, apart from the proposed system through which a user can give their feedback. At the time of returning the bought books the responsible person simply drops the books on the drop box and will also return those books to the person on the desk, when book again scanned by the librarian to palace on it right place, the conformation of returning will be generated and updated the user’s account as well.

Scope

 

      The customer satisfaction will increase of getting books easily without be in line or go through the details they provide at the desk counter of library.

      Once they log in to this application, will able to get things easier in the library.

      Work in the library will be reduced and became easy to track the record of every book in a digital way.

      Proper high-level security management will be provided by the proposed system to prevent the user’s sensitive data from miss user or any misshapen.

                          Project scope statement

Project Name

Date of project approval

Submission date

Knight Lib

26 August 2019

20 October 2019

Project description

This project offers services to the library same as amazon go serve to the grocery stores.

Scope description

      Satisfaction of Customer will increase in easily obtaining books without having to queue or view detailed information provided at the library checkout.

Project Deliverable

      After logging into this application, it will be easier for customer in the library to get the books easily.

      Work in the library will be reduced and it will be easier to track the record of each book in digital form.

      The proposed system will ensure appropriate high-level security management to prevent confidential user data from missing or distorted users

Assumptions

      Data loss may be happened while creating database or any other disaster.

      Privacy issues may occur if proper privacy rules will not be implemented.

      Security attacks may cause, if proper security protocols will not be implemented.

Initial identified risk

      Problem in returning step of books which had taken by client.

      Quality risk

      Conflicts in team

      Budget risk

      Operational risk

      Security attack

      Client’s data Privacy

Funds limitation

As we are using free software’s and other needed equipment’s we there will be no funds limitations for this project.

Scheduled milestones

      Project should be completed at 20th October 2019.

      Monitoring and controlling the risk, schedule and cost to successfully complete the project.

Project acceptance criteria

All the aspects should be completed which are mention in the project proposal at the time of project submission and instructions should be followed by project team.

Project requirements

Eclipse studio, SQL setup, Oracle software, Software for managing and controlling project’s tasks, time and cost.

WBS

Project Methodology and requirements

 The matrix below describes How the project will be carried out. It contains which equipment we are going to use in our proposed project.

Roles & responsibilities (Equipment’s used) matrix

Sr. No

Activity name

Responsible person

Role

Technology

1

Presenting Project proposal

All three group members

Presenter

Project libre

2

Making project plan

All three member of group

Planner

Project libre

3

Creating database for library books and bar code

Kamaljeet kaur

Database developer

My SQL /Oracle

4

Creating database for users

Kamaljeet Kaur

Database developer

MySQL / Oracle

5

Create login user interface design

Kanwer dawinder

User Interface Developer

android studio

6

Registration page

Kanwer dawinder

Designer & developer

android studio

7

Feedback template & page

Anoli patel

Designer & Developer

 android studio

8

Page and Receipt design

Anoli patel

Designer & Developer

android studio

9

Camera testing

Kanwer dawinder

Tester

android studio

10

Contact Us page

Kanwer dawinder

Developer

android studio

11

Monitoring

Anoli patel

Tester

android studio

12

Deployment of Project

All three members

 

 

The matrix below describes the cost of the equipment we are going to use in our project.

 

Cost matrix

Sr. no

Equipment

Cost

1

Project libre

Its open source and free software

2

Android studio

Its also available free software

3

My SQL

It’s also available free software

4

Oracle

It’s available free of cost to use

5

Trello

It is web site which provide free service that we use for communication

 

The risk analysis matrix below describes that which risks could be occur in our proposed project.

4. Potential Risks and mitigation techniques

Risk

Mitigation

Seriousness

Likelihood

After implement mitigation change

Strategic risk

Strategy management plan

High

Low

Down the impact generate from the risk

Problem in returning books

Hire a Desk person or proper solution for take books from the person who had bought those on loan.

Medium

Medium

Down the impact generate from the risk

Operational risk

Operational management plan

High

Medium

Down the impact generate from the risk

Security attack

Provide best security software to prevent user’s crucial data such as card detail from hacking or breaching.

High

High

Down the impact generate from the risk

Data privacy

Classify sensitive data have to consider and develop network security protocol to implement security system management.

High

High

Down the impact generate from the risk

Service down time

Acceptable service downtime penalty management plan.

Medium

Low

Down the impact generate from the risk

Conflicts in team members

Use a team formation model to form the team and use proper communication management plan to avoid such conflicts.

High

Medium

Down the impact generate from the risk

Budget risk

Budget management plan/ Monitoring and controlling budget

High

Medium

Down the impact generate from the risk

Resource risk

Resource management plan

High

Medium

Down the impact generate from the risk

Quality risk

Time to time monitoring and controlling the proposed system.

High

Medium

Down the impact generate from the risk

Project plan and schedule

Below I provide a Gantt chart that is a graphic diagram of a list that assistances you plan, coordinate and track specific tasks in a project.

Work Cited

 

  • (n.d.). Retrieved from https://www.amazon.com/b?node=16008589011
  • project scope management PMBOK5th Edition. (n.d.). Retrieved from https://www.google.com/search?q=what+is+scope+statement+in+project+management&safe=active&source=lnms&tbm=isch&sa=X&ved=0ahUKEwjjm8aU8KbkAhXGeisKHcXICvgQ_AUIESgB&biw=1366&bih=624#imgrc=hbaywbUXWEPbIM:
  • thakur, s. (n.d.). Risk Assessment Matrix – How to Use It in Risk Management. Retrieved from brighthub: https://www.brighthubpm.com/risk-management/88566-tool-for-assessing-project-risk/

 

 

 

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: