CIS 4913 - Assignment 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 19

Course Work Assessment - Alternative Assessment

Semester 202310 Division CIS


Assessment title in
Assignment 2 Program Information
Syllabus Technology

Course Code CIS-4913

Course Title Capstone Project - I

Course Instructor Dr. HCT Dean CRN <<CRN>>


End of Week-10
Assessment Weight 25% Submission Date

For Group Work submissions an additional individual assessment will be conducted.


Grades for the students in one group will vary based on the individual performance in the
additional assessment.

Student Declaration:
Academic Integrity Statement
In accordance with the HCT Academic Integrity Policy
• Students are required to refrain from all forms of academic integrity breaches as defined and
explained by HCT.
• A student found guilty of having committed acts of academic integrity breach(es) will be
subject to the relevant sanctions as outlined by HCT.

assignment is entirely my own work except where I have duly acknowledged other sources in the
text and listed those sources at the end of the assignment. I have not previously submitted this
work to the HCT, or any other entity. I understand that I may be orally examined on my submission.
Student (s) Signature: ___________________________________

Gestures Identification System


for people with special needs

Student Name 2 Name 3


Name 1
Name

Student H00 H00


H00
ID’s

CIS-202220-CIS4913-Assignment-I Page 1|2


`

Outline of the Talk


ABSTRACT ............................................................................................................................................. 3

INTRODUCTION ................................................................................................................................... 3

ADOPTED METHODOLOGY ............................................................................................................... 4

ANALYSIS APPROCH ........................................................................................................................... 5

TIME MANAGEMENT........................................................................................................................ 15

COST MANAGEMENT ....................................................................................................................... 17

RISK MANAGEMENT ......................................................................................................................... 17

REFLECTION ........................................................................................................................................ 19

REFERNCES ......................................................................................................................................... 19

CIS-202220-CIS4913-Assignment-I Page 2|2


ABSTRACT
In this exhaustive report, we meticulously navigate the analysis phase, beginning with the
discerning definition of a methodological framework for our project, articulating its
advantages. Subsequently, we detail the intricacies of data collection to identify target
stakeholders. Thoroughly employing the FURPS+ model, we define both functional and non-
functional aspects of the project. The denouement involves crafting comprehensive analysis
models using sophisticated tools like STARUML and draw.io, elucidating the system from
diverse perspectives through four distinct diagrams. Our report concludes with a reflective
analysis, delving into lessons learned and challenges overcome, accompanied by a
comprehensive list of references supporting our scholarly endeavours in constructing the
secondary assignment. This approach ensures a thorough and academic treatment of the
analysis phase, aligning with rigorous standards of scholarly discourse.

INTRODUCTION
The central objectives of this report are to elucidate the requisites of the gesture identification
system application designed for individuals with special needs, thereby formulating a robust
project strategy plan. Through an intricate process of modelling and analyzing requirements,
as well as delineating user-operable processes, we aim to foster a comprehensive
comprehension that serves as the foundation for project initiation. Furthermore, the
meticulous management of time is integral to optimizing the efficacy of individual efforts for
enhanced productivity within constrained timelines. The conclusive facet involves rigorous
cost management, encompassing the systematic gathering and evaluation of information to
discern the nuanced cost implications inherent in the project. This scholarly approach ensures
a thorough exploration of the multifaceted dimensions inherent in the development of the
gesture identification system, aligning with best practices in project management.

CIS-202220-CIS4913-Assignment-I Page 3|2


ADOPTED METHODOLOGY
contemporary and fitting approach that seamlessly aligns with the dynamic nature of our
project processes. This methodology, widely embraced in modern projects, excels in
accommodating swift changes during iterative phases, providing a robust framework for
efficient project management. Key attributes include the active involvement of stakeholders
throughout the project lifecycle, ensuring their requirements are integrated seamlessly to
enhance overall project satisfaction. The amalgamation of the Agile methodology with an
object-oriented approach unfolds through a systematic progression, encapsulated by key
steps:
1) Requirement gathering
2) Strategic Planning
3) Data Collection and Information Analysis
4) Model Design
5) Software Coding
6) User Testing and Evaluation

Furthermore, the widespread adoption of the Agile methodology over the past decade can be
attributed to its multifaceted advantages, such as:
1) Flexibility
2) Stakeholder Engagement
3) Iterative and Incremental Development
4) Simplified Modelling
5) Versatile Framework Approaches
6) incremental Deliverables

CIS-202220-CIS4913-Assignment-I Page 4|2


ANALYSIS APPROCH

Survey Method:
To ensure the gesture identification system meets project requirements effectively, we
conducted a survey involving 50 students from various Higher Colleges of Technology
(HCT) campuses. The survey, featuring four questions with different response types, aimed
to gather insights on crucial features, challenges for individuals with special needs, the
importance of user involvement, and familiarity with existing gesture identification
technologies. We categorized multiple choice responses, analyzed written answers for
challenges, and quantified the importance of user involvement on a scale. The survey
provided valuable perspectives, ensuring the project aligns with stakeholder needs and
enhances overall quality

(Figure A)

CIS-202220-CIS4913-Assignment-I Page 5|2


(Figure B)

(Figure C)

CIS-202220-CIS4913-Assignment-I Page 6|2


(Figure D)

(Figure E)

CIS-202220-CIS4913-Assignment-I Page 7|2


Interview Method:
Conducted with Dr. Rizwan Wadood, a distinguished lecturer in the Faculty of Media at our
campus, this interview comprises four inquiries strategically tailored to garner insights
relevant to the capstone project. The focus of the questions is primarily directed toward TDO
students within HCT, and the responses from Dr. Wadood are accorded due consideration
within the context of the project's development. The interview serves as a pivotal academic
engagement, contributing valuable perspectives from a seasoned professional in the field of
media education.

Question 1: What is the main assessment of the concept behind the capstone project? Lecturer
Answer: The capstone project appears highly significant, extending beyond kindergarten
applications to potentially benefit government sectors. The system's flexibility, particularly
for TDO students, is noteworthy, and I believe enhanced access and integration of additional
technologies could yield more favorable outcomes.

Question 2: In your opinion, are there any potential features or feedback that could enhance
the capstone project?
Lecturer Answer: Introducing sensors to capture individuals and display them as pointers
could significantly improve engagement, making students the central focus and encouraging
greater involvement with the system.

Question 3: How do special needs students interact with technology in classroom settings?
Lecturer Answer: Various strategies, such as calling names and incorporating visual effects
on screens, are employed to promote interaction among special needs students in class.

Question 4: In your teaching experience, what are the most significant difficulties you have
encountered with special needs students? Lecturer Answer: Over my 5+ years at HCT, I've
faced challenges including diverse levels of special needs requiring distinct communication
approaches, the specificity of interactions in different situations, the importance of relating
lessons to real-life scenarios, and the necessity of obtaining constructive feedback for student
development/

CIS-202220-CIS4913-Assignment-I Page 8|2


System Requirements:
Functional requirements define the specific functionalities, features, and capabilities that a
system or software must possess. features such as user authentication, gesture recognition
algorithms, user progress tracking, and system restart capabilities.

Functional Requirements
The system enables users to access control settings.
Users have the capability to select courses from their respective categories within the
system.
Utilizing a specific point on the body, users can control the system.
Users are granted the ability to restart the system as needed.
The system provides administrators with the functionality to add features to the system.
Administrators possess complete control over the database within the system.
Administrators have access to monitor and track user progress within the system.

Non-functional requirements, on the other hand, outline the qualities, characteristics, and
constraints that the system or software must adhere to, but they don't directly relate to
specific functionalities. These requirements address aspects like performance, reliability,
usability, and security. criteria such as response time, system availability, security protocols,
and user interface design principles.

Non Functional Requirements


Usability The system is designed to be user-friendly, particularly catering to a
kindergarten audience. The interface is intentionally straightforward,
featuring step-by-step instructions for utilizing gestures with minimal
complexity in each operation
Reliability The system operates independently of an internet connection and
ensures real time responsiveness in detecting body parts, accurately
aligning them to the on-screen pointer
Performance he system prioritizes speed and responsiveness, facilitating swift
tracking of body movements to enhance overall flexibility in usage.
Additionally, it efficiently calculates scores and presents results to the
user at the conclusion of the interaction
Security exclusive administrative access is granted for functions such as
addition, updating, and deletion within the system, ensuring a secure
environment where these critical operations are confined to authorized
personnel.

CIS-202220-CIS4913-Assignment-I Page 9|2


Analysis Outputs:

(Figure 1: Use case Diagram)

In the use case diagram, we establish a system boundary to delineate the functions accessible
to users within the system. Three distinct actors—Player, Assistance, and Admin—are
identified, each with their specific use cases. Player and Assistance are generalized as users,
allowing both to initiate the system based on the player's situation. Upon system initiation,
users select a course from available categories. For Player use cases, actions include starting a
game, answering questions, and viewing progress results. Admin, on the other hand, has
access to the database for adding, updating, and removing courses. Additionally, Admin can
modify system settings in a centralized manner. This use case diagram provides a structured
representation of the system's functionalities and interactions

CIS-202220-CIS4913-Assignment-I P a g e 10 |
2
Use Case Description:

CIS-202220-CIS4913-Assignment-I P a g e 11 |
2
(Figure 2: Activity Diagram)
In the activity diagram, we have delineated two processes one detailing user activities and the
other focusing on admin tasks. The initial activity outlines the sequential steps users
undertake before initiating a game. This involves selecting a course category, starting the
game, answering questions, The second activity illustrates the systematic process through
which an admin modifies the database. This includes actions such as adding, updating, or
removing courses from the system.

CIS-202220-CIS4913-Assignment-I P a g e 12 |
2
(Figure 3: Analysis Sequence Diagram)
The sequence diagram intricately illustrates the initiation of the "Start Game" use case,
providing a detailed process for users to access the game. The sequential steps involve the
user choosing a course and selecting a specific body point, which is subsequently tracked
through the kinetic sensor. This diagram serves as a comprehensive visual representation,
elucidating the systematic flow of actions required for users to commence the game, thereby
enhancing understanding of the detailed process within an academic context.

The sequence diagram meticulously details the "Access Database" use case, providing a
comprehensive understanding of the sequential steps necessary before implementing changes
to the system. The diagram incorporates various types of messages and employs different
combined fragments, such as ALT for alternatives, OPT for optional choices, and PAR for
tasks occurring simultaneously. This visual representation serves as an academic resource,
simplifying the intricate process and enhancing comprehension of the system's database
access dynamics.

CIS-202220-CIS4913-Assignment-I P a g e 13 |
2
(Figure 4: Domain Class Diagram)

The class diagram features 13 classes, each outlined with their specific attributes and
operations. To make it more detailed, three design patterns are applied. The Facade pattern
simplifies user interactions by hiding system complexities. The Leaf-tree pattern organizes
classes in a hierarchical structure, enhancing clarity. The State pattern adeptly manages
different object states like adding and updating. At the system's core is the Main class,
initiating the interface. The Facade distinguishes user and admin roles, guiding them based on
permissions. Admins access the backend to modify course states. Users, categorized into
players and assistants, navigate game interfaces for tasks. In this simplified description, the
focus is on clarity, design patterns, and functionality within the class diagram.

CIS-202220-CIS4913-Assignment-I P a g e 14 |
2
TIME MANAGEMENT
Time management involves planning, organizing, and controlling activities to make efficient
use of time. It includes setting priorities, creating schedules, and prioritizing tasks to optimize
productivity and meet goals. Effective time management is essential for reducing stress,
meeting deadlines, and enhancing overall efficiency in both personal and professional
contexts.

(Figure 5: Work Break Down Strucure)


WBS stands for Work Breakdown Structure. It is a hierarchical decomposition of a project
into smaller, more manageable components or work packages. The WBS breaks down the
project into tasks, deliverables, and subtasks, providing a visual and systematic way to
understand the scope of work. Each level of the WBS represents a more detailed level of the
project, allowing for better organization, planning, and control of project activities. It is a
fundamental tool in project management used to facilitate project planning, communication,
and resource allocation.

CIS-202220-CIS4913-Assignment-I P a g e 15 |
2
(Figure 6: Gantt Chart)
The Gantt chart is a powerful visual tool that helps to plan, coordinate, and track tasks and
resources over time. The Gantt chart will enable us to identify major milestones, estimate
project duration, and manage project resources.

CIS-202220-CIS4913-Assignment-I P a g e 16 |
2
COST MANAGEMENT
Cost management is a set of processes and practices aimed at planning, estimating, budgeting,
financing, funding, managing, and controlling costs within a project or business. It involves
assessing and forecasting the financial aspects of a project or business initiative to ensure that
it stays within the allocated budget. Key components of cost management include:

(Figure 7: Project Budget)

RISK MANAGEMENT
Risk management is a process of identifying, assessing, and controlling risks that may have
an adverse impact on an organization's objectives or operations. It involves analyzing
potential risks, evaluating the likelihood and impact of those risks, and developing strategies
to mitigate or manage them. Risk management aims to minimize the negative impact of risks
while maximizing the opportunities that may arise from them. Effective risk management can
help organizations anticipate potential problems and take proactive measures to avoid or
minimize their impact. It is a critical aspect of organizational management and is applied in
various fields, including finance, healthcare, and project management.

CIS-202220-CIS4913-Assignment-I P a g e 17 |
2
To proactively address potential project risks, our team will employ a defense strategy
focused on preventing vulnerabilities in the system. This involves countering threats,
eliminating asset vulnerabilities, restricting access to authorized users, and implementing
protective safeguards. Three common methods for risk defense include policy application,
training and education, and the use of technology.

Additionally, as a team, we propose specific solutions to tackle potential risks and challenges.
For instance, to mitigate the risk of missing project deadlines, we plan to establish a
comprehensive time management plan outlining tasks and deadlines. In addressing budget
overruns, we will develop a cost management plan with detailed calculations. Furthermore, to
address technical issues, we aim to enhance the smart face recognition system by utilizing
high-quality cameras.

CIS-202220-CIS4913-Assignment-I P a g e 18 |
2
REFLECTION
Our team has identified several key challenges that need to be addressed for the successful
implementation of our project. Firstly, accurately identifying and recognizing different types
of courses poses a significant challenge. This necessitates the implementation of robust
machine learning algorithms and the development of an extensive training database.
Additionally, the system must exhibit adaptability to function effectively in diverse
environments, varying lighting conditions, and handle different distances and angles from the
camera.

Another substantial challenge involves creating a user-friendly interface that is both easy to
use and intuitive, especially for users without prior experience with gesture recognition
systems. Seamless integration with existing technology is also a critical consideration. In
essence, the success of our project hinges on effectively overcoming these challenges and
delivering a gesture identification system that is not only functional and reliable but also user-
friendly. Achieving this goal requires a strategic focus on machine learning algorithms, the
acquisition of extensive training data, and a commitment to developing a system that is
intuitive, reliable, and adaptable to various environments while seamlessly integrating with
existing technology

REFERNCES
1) Chan, F. K. Y., & Thong, J. Y. L. (2009). Acceptance of agile methodologies: A critical
review and conceptual framework. Decision Support Systems, 46(4), 803–814.
https://www.sciencedirect.com/science/article/abs/pii/S0167923608002133
2) Satzinger, J. W., Jackson, R. B., & Burd, S. D. (2015). Systems analysis and design in a
changing world (7th ed.). Cengage Learning.
3) Bell, J., & Waters, S. (2018). Doing your research project: A guide for first-time
researchers (7th ed.). London McGraw Hill Education.
4) Willman, N. (2011). Your research project: designing and planning your work. SAGE
Publications Ltd.
5) Project Management Institute. (2017). A Guide to the PROJECT MANAGEMENT BODY
OF KNOWLEDGE (PMBOK ® GUIDE) Sixth Edition. http://faspa.ir/wp-
content/uploads/2017/09/PMBOK6-2017.pdf

CIS-202220-CIS4913-Assignment-I P a g e 19 |
2

You might also like