SlideShare a Scribd company logo
Software Engineering:
A Practitioner’s Approach, 7/e
Design by m.h.jalili
Chapter 7
KEY CONCEPTS
flow
A
WebApp
D
behavior
B
pattern
C
How data object
transformed
control structure of
a system
Such UML
deliver a complex
array of content and
functionality
Overiew
oAren’t those requirements modeling representations enough?
owhat is requirement modeling ?
owho dose it ?
owhy is important ?
owhat are the step ?
oWhat is the work product ?
oHow do I ensure that I’ve done it righ ?
• One view of requirements modeling, called structured analysis,
considers data and the processes that transform the data as separate
entities
• Data objects are modeled in a way that defines their attributes and
relationships.
• Processes that manipulate data objects are modeled in a manner that shows
how they transform data as data objects flow through the system.
• A second approach to analysis modeled, called objectoriented analysis,
focuses on
• the definition of classes and
• the manner in which they collaborate with one another to effect customer
requirements.
• what approach choose software team ?

Recommended for you

Software Design and Modularity
Software Design and ModularitySoftware Design and Modularity
Software Design and Modularity

Software design is a process through which requirements are translated into a ― blueprint for constructing the software. Initially, the blueprint shows how the software will look and what kind of data or components will be required to in making it. The software is divided into separately named components, often called ‘MODULES’, that are used to detect problems at ease. This follows the "DIVIDE AND CONQUER" conclusion. It's easier to solve a complex problem when you break it into manageable pieces.

softwaredesigntypes
Rational Unified Process
Rational Unified ProcessRational Unified Process
Rational Unified Process

The document discusses Object Oriented Design and Analysis using the Rational Unified Process (RUP). RUP is an iterative software development process framework for building object-oriented systems. It is comprised of four phases - Inception, Elaboration, Construction, and Transition. Within each phase are iterative cycles of requirements analysis, design, implementation, testing and feedback. The goal is to produce high-quality software that meets user needs within schedule and budget.

Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12

The document discusses object-oriented design (OOD) and describes its key characteristics and processes. Specifically, it covers: 1) Objects communicate by message passing and are self-contained entities that encapsulate state and behavior. 2) The OOD process involves identifying objects and classes, defining their interfaces, relationships, and developing models of the system. 3) The Unified Modeling Language (UML) is used to describe OOD models including classes, objects, associations, and other relationships.

oRepresents how data objects are transformed at they Represents how data
objects are transformed at they move through the system
ocan be used to complement UML diagrams and provide additional insight into
system requirements and flow.
odata flow diagram (DFD) is the diagrammatic form that is used
Software engineering rogers pressman chapter 7
The Flow Model
computer
based
system
input output
Every computer-based system is an
information transform ....
Flow Modeling Notation
external entity
process
data flow
data store

Recommended for you

Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...

Full clear download( no error formatting) at: https://goo.gl/XmRyGP software engineering a practitioner's approach 8th edition pdf free download software engineering a practitioner's approach 8th edition ppt software engineering a practitioner's approach 6th edition pdf software engineering pressman 9th edition pdf software engineering a practitioner's approach 9th edition software engineering a practitioner's approach 9th edition pdf software engineering a practitioner's approach 7th edition solution manual pdf roger s. pressman

8th editionmaximpressman
Waterfall model in SDLC
Waterfall model in SDLCWaterfall model in SDLC
Waterfall model in SDLC

The Waterfall model is a popular sequential model of the software development life cycle where each phase must be completed before the next begins. It consists of requirements, design, implementation, verification, and maintenance phases. Though simple to understand and manage, the Waterfall model works best for smaller, well-defined projects as it is inflexible to changes and produces no working software until late in the cycle.

techncialtechnologycsd
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models

This document discusses different process models used in software development. It describes the key phases and characteristics of several common process models including waterfall, prototyping, V-model, incremental, iterative, spiral and agile development models. The waterfall model involves sequential phases from requirements to maintenance without iteration. Prototyping allows for user feedback earlier. The V-model adds verification and validation phases. Incremental and iterative models divide the work into smaller chunks to allow for iteration and user feedback throughout development.

software engineeringsoftware process modelsincremental model
External Entity
o A producer or consumer of data
o Examples: a person, a device, a sensor
o Another example: computer-basedsystem
o Data must always originate some where
and must always be sent to something
Process
oA data transformer (changes input to output)
oExamples: compute taxes, determine
area,
oformat report, display graph
oData must always be processed in some
way to achieve system function
• Data flows through a system, beginningas
input and transformed into output.
Data Flow
compute
triangle
area
base
height
area
Data Stores
• Data is often stored for later use.
look-up
sensor
data
sensor #
report required
sensor #, type,
location, age
sensor data
sensor number
type,
location, age

Recommended for you

Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design

This document provides an overview of object-oriented analysis and design. It defines key terms and concepts in object-oriented modeling like use cases, class diagrams, states, sequences. It describes developing requirements models using use cases and class diagrams. It also explains modeling object behavior through state and sequence diagrams and transitioning analysis models to design.

information systems design
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING

This lecture provide a review of requirement engineering process. The slides have been prepared after reading Ian Summerville and Roger Pressman work. This lecture is helpful to understand user, and user requirements.

requirement analysisrequirement engineeringre
software engineering
software engineeringsoftware engineering
software engineering

The document discusses the origins and drivers of software engineering as a discipline. It arose in response to frequent software project failures in the late 1960s, termed the "software crisis". Key points: - Software engineering aims to apply systematic and quantifiable principles to software development and maintenance to improve quality, productivity and job satisfaction. - It draws on computer science, management science, economics and other fields. Processes and models help manage complex software projects. - Early process models included waterfall and prototyping. Later agile models like spiral emphasize iterative development and risk management over rigid phases.

fb
Software engineering rogers pressman chapter 7
Example
Creating a Control Flow Model
oFor some types of applications, the data model and the data flow diagram
are all that is necessary to obtain meaningful insight into software
requirements.
olarge class of applications are “driven” by events rather than data
oproduce control information rather than reports or displays, and process
information with heavy concern for time and performance
oSuch applications require the use of control flow modelingin addition to
data flow modeling.
Creating a Control Flow Model .cont
event or control item
o To select potential candidate events, the following guidelines are suggested:
 List all sensors that are “read” by the software.
 List all interrupt conditions.
 List all “switches” that are actuated by an operator.
 List all data conditions.
 Recalling the noun/verb parse that was applied to the processing narrative,
 review all “control items” as possible control specification inputs/outputs.
 Describe the behavior of a system by identifying its states, identify how each
 state is reached, and define the transitions between states.
 Focus on possible omissions—a very common error in specifying control; for
 example, ask: “Is there any other way I can get to this state or exit from it?”

Recommended for you

Waterfall model
Waterfall modelWaterfall model
Waterfall model

The document discusses the waterfall model of software development. It describes the five phases of the waterfall model as requirements gathering and analysis, design, coding, testing, and maintenance. It provides details on the activities in each phase, including documenting requirements, designing logical modules, writing code, testing software, and maintaining the system. The waterfall model is advantageous for small projects but inflexible if requirements change, as it is a sequential process where each phase must be completed before the next.

Agile Methodology - Software Engineering
Agile Methodology - Software EngineeringAgile Methodology - Software Engineering
Agile Methodology - Software Engineering

Learn about Agile Methodology of Software Engineering and study concepts like What is Agile, Why Agile is there, Agile Principles, Agile Manifesto with Pros & Cons of it. Presentation also include Agile Testing Methodology like Scrum, Crystal Methodologies, DSDM, Feature Driven Development, Lean Software Development & Extreme Programming. If you watch this one please rate it and do share this presentation to others so then can easily learn more about the Agile Methodology.

software developmentagile software developmentagile
Ch03 prescriptive process models
Ch03 prescriptive process modelsCh03 prescriptive process models
Ch03 prescriptive process models

Prescriptive process models advocate for orderly and structured approaches to software engineering. However, if these models strive for too much order, they may be inappropriate for an evolving software world that thrives on change. Yet rejecting traditional structured models could make it impossible to achieve coordination on software projects. The document then describes several prescriptive process models including the waterfall model, incremental model, RAD model, and evolutionary models like prototyping, spiral development, and concurrent development. It also mentions other approaches like component-based development, formal methods, aspect-oriented software development, and the unified process.

software engineering
Control Specification
A control specification(CSPEC)
represents the behavior of the system
in tow way
oThe CSPEC contains a state diagram that
is a sequential specification of behavior.
oIt can also contain a program activation
table—a combinatorial specification of
behavior
oCSPEC can be:
o state diagram
o state transition table
o decision tables
o activation tables
for example:
Safe home
State diagram for Safe Home security function
Process Activation Table
PAT
oA some what different mode of behavioral representation is the
process activation table
oThe PAT represents information contained in the state diagram in the
context of processes, not states
othe table indicates which processes (bubbles) in the flow model will
be invoked when an event occurs
ocan be used as a guide for a designer who must build an executive
that controls the processes represented at this level

Recommended for you

Software development process models
Software development process modelsSoftware development process models
Software development process models

Software development process models Rapid Application Development (RAD) Model Evolutionary Process Models Spiral Model THE FORMAL METHODS MODEL Specialized Process Models The Concurrent Development Model

software engineeringsoftware process models
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process Framework

Software engineering is the application of engineering principles to software development to obtain economical and quality software. It is a layered technology with a focus on quality. The foundation is the software process, which provides a framework of activities. This includes common activities like communication, modeling, planning, construction, and deployment. Additional umbrella activities support the process, such as quality assurance, configuration management, and risk management.

what is software engineering?layered technologysoftware process framework
Cocomo model
Cocomo modelCocomo model
Cocomo model

The COCOMO model is a widely used software cost estimation model that predicts development effort and schedule based on project attributes. It includes basic, intermediate, and detailed models of increasing complexity. The intermediate model estimates effort as a function of source lines of code and cost drivers. The detailed model further incorporates the impact of cost drivers on development phases. COCOMO 2 expands on this with application composition, early design, reuse, and post-architecture models for different project stages.

ii year cse
Software engineering rogers pressman chapter 7
The Process Specification(PSPEC)
• used to describe all flow model processes that appear at the final level of
refinement
• narrative text
• program design language (PDL)
• mathematical equations
• tables, or UML activity diagrams.
• To illustrate the use of the PSPEC
• consider the process password transform represented in the flow model for
SafeHome
PSPEC: process password (at control panel)
The process password transform performs password validation at the control panel for the Safe
Home security function. Process password receives a four-digit password from the interact with user
function. The password is first compared to the master password stored within the system. If the
master password matches, <valid id message = true> is passed to the message and status display
function. If the master password does not match, the four digits are compared to a table of secondary
passwords (these may be assigned to house guests and/or workers who require entry to the home
when the owner is not present). If the password matches an entry within the table,<valid id message =
true> is passed to the message and status display function. If there is no match, <valid id message =
false> is passed to the message and status display function
Software engineering rogers pressman chapter 7

Recommended for you

SE_Lec 05_System Modelling and Context Model
SE_Lec 05_System Modelling and Context ModelSE_Lec 05_System Modelling and Context Model
SE_Lec 05_System Modelling and Context Model

System modeling is the process of developing abstract models of a system using graphical notations like the Unified Modeling Language (UML) to represent different views of a system. Models help analysts understand system functionality and communicate with customers. Models of existing and new systems are used during requirements engineering to clarify current systems, discuss strengths/weaknesses, and explain proposed requirements.

Software maintenance Unit5
Software maintenance  Unit5Software maintenance  Unit5
Software maintenance Unit5

This document provides an overview of software maintenance. It discusses that software maintenance is an important phase of the software life cycle that accounts for 40-70% of total costs. Maintenance includes error correction, enhancements, deletions of obsolete capabilities, and optimizations. The document categorizes maintenance into corrective, adaptive, perfective and preventive types. It also discusses the need for maintenance to adapt to changing user requirements and environments. The document describes approaches to software maintenance including program understanding, generating maintenance proposals, accounting for ripple effects, and modified program testing. It discusses challenges like lack of documentation and high staff turnover. The document also introduces concepts of reengineering and reverse engineering to make legacy systems more maintainable.

software maintenance unit5
software engineering
software engineeringsoftware engineering
software engineering

The document provides information about software engineering for the second semester of the second year B.Tech IT course, including the syllabus, textbooks, and an index of process model lecture topics and slides. Process models covered include waterfall, incremental, RAD, evolutionary prototypes, spiral, and unified process. Software requirements topics such as functional and non-functional requirements are also outlined.

Overview
• The behavioral model indicates how software will respond to external
events or stimuli
• for create this model
• Evaluate all use cases to fully understand the sequence of interaction within
the system.
• Identify events that drive the interaction sequence and understand how these
events relate to specific objects.
• Create a sequence for each use case.
• Build a state diagram for the system.
• Review the behavioral model to verify accuracy and consistency.
Identifying Events With the Use Case
oIn general, an event occurs whenever the system and an actor
exchange information
oA use case is examined for points of information exchange. To
illustrate, we reconsider the use case for a portion of the SafeHome
security function.
oA use case is examined for points of information exchange
oAs an example of a typical event
homeowner uses the keypad to key in a four-digit password.
oafter recognize all event
State Representations
two different characterizations of states must be considered
1. the state of each class as the system performs its function
o passive
 A passive state is simply the current status of all of an object’s attributes.
o active
 The active state of an object indicates the current status of the object as it undergoes a
continuing transformation or processing.
2. the state of the system as observed from the outside as the system
performs its function
Two Different Behavior
State diagrams for
analysis classes.
indicates how an
individual class changes
state based on external
events
Sequence diagrams.
One component of a
behavioral model is a UML
state diagram9 that
represents active states for
each class and the events
(triggers) that cause
changes between these
active states
shows the behavior of
the software as a
function of time.
sequence diagram in
UML, indicates how
events cause transitions
from object to object

Recommended for you

Chapter 13
Chapter 13Chapter 13
Chapter 13

These slides discuss web application design and accompany a textbook on software engineering. They cover topics like when web design is important, key qualities of good web design like security and usability, design goals for consistency and identity. Interface design principles are outlined focusing on navigation, consistency and usability. Models for content, architecture and navigation design are also presented.

system
Software Engineering chapter 19
Software Engineering chapter 19Software Engineering chapter 19
Software Engineering chapter 19

This document provides an overview of web application design modeling. It discusses when web design should be emphasized, important quality dimensions like security, availability and scalability. It also covers design goals like consistency, identity, robustness and navigability. The document outlines the web design pyramid with layers including architecture, interface, content, navigation and technology. It describes concepts like the model-view-controller architecture, navigation design with semantic units, and the object-oriented hypermedia design method.

Slides chapters 26-27
Slides chapters 26-27Slides chapters 26-27
Slides chapters 26-27

This document summarizes key aspects of quality management and software engineering based on a textbook. It discusses definitions of software quality, types of quality (design and conformance), the costs of quality, software quality assurance techniques like reviews and inspections, roles of a software quality assurance group, metrics for reviews, standards like ISO 9001, change management, software configuration management, and baselines.

State Diagram for the ControlPanel Class
reading
locked
select ing
password
ent ered
comparing
password = incorrect
& numberOfTries < maxTries
password = correct
act iv at ion successful
key hit
do: validat ePassw ord
numberOfTries > maxTries
t imer < lockedTime
t imer > lockedTime
The States of a System
ostate—a set of observable circum-stances that characterizes the
behavior of a system at a given time
ostate transition—the movement from one state to another
oevent—an occurrence that causes the system to exhibit some
predictable form of behavior
oaction—process that occurs as a consequence of making a transition
Behavioral Modeling
• make a list of the different states of a system (How does the system
behave?)
• indicate how the system makes a transition from one state to another
(How does the system change state?)
• indicate event
• indicate action
• draw a state diagram or a sequence diagram
Sequence Diagram
homeowner cont rol panel sensorssyst em sensors
syst em
ready
reading
request lookup
comparing
result
password ent ered
password = correct
request act ivat ion
act ivat ion successful
locked
num berOf Tries > m axTries
select ing
t imer > lockedTime
A
A
Figure 8 .2 7 Sequence diagram (part ial) f or Saf eHome securit y f unct ion
act ivat ion successful

Recommended for you

Software Engineering - Ch12
Software Engineering - Ch12Software Engineering - Ch12
Software Engineering - Ch12

This document discusses different architectures for distributed systems, including client-server architectures, distributed object architectures, and middleware. It describes the characteristics and advantages of distributed systems as well as challenges like complexity, security, and unpredictability. Specific architectures covered include multiprocessor systems, thin and fat client models, and three-tier client-server approaches. Distributed object architectures are also introduced where any object can provide or use services.

Software Engineering - Ch7
Software Engineering - Ch7Software Engineering - Ch7
Software Engineering - Ch7

This document discusses requirements engineering processes and activities. It describes the key activities in requirements engineering as requirements elicitation, analysis, validation, and management. These activities involve discovering requirements through interviews and scenarios, analyzing requirements from different stakeholder viewpoints, validating requirements, and managing an evolving set of requirements. The document provides examples and details of each activity, such as how to conduct interviews, define viewpoints and scenarios, and iterate on requirements through a spiral process.

Software Engineering - Ch17
Software Engineering - Ch17Software Engineering - Ch17
Software Engineering - Ch17

This document discusses rapid software development methods. It covers agile development methods like extreme programming (XP), which uses practices like test-driven development, pair programming, and frequent releases. XP emphasizes customer involvement, handling changing requirements, and maintaining simple code. Rapid application development and prototyping are also discussed. Prototypes help explore requirements and design but are discarded, while RAD relies on tools to quickly build database-driven business applications. The document compares incremental development, which starts with best-understood requirements, to throw-away prototyping, which starts with least-understood requirements.

Software engineering rogers pressman chapter 7
Patterns for Requirements Modeling
o Software patterns are a mechanism for capturing domain knowledge in a way that allows
it to be reapplied when a new problem is encountered
 domain knowledge can be applied to a new problem within the same application domain
 the domain knowledge captured by a pattern can be applied by analogy to a completely
different application domain.
o The original author of an analysis pattern does not “create” the pattern, but rather,
discovers it as requirements engineering work is being conducted.
o Once the pattern has been discovered, it is documented
Discovering Analysis Patterns
oThe most basic element in the description of a requirements
model is the use case.
oA coherent set of use cases may serve as the basis for
discovering one or more analysis patterns.
oA semantic analysis pattern (SAP) “is a pattern that describes a
small set of coherent use cases that together describe a basic generic
application.”
An Example
o Consider the following
preliminary use case for
software required to control
and monitor a real-view
camera and proximity sensor
for an automobile:
o Use case: Monitor reverse motion
o Description: When the vehicle is placed in reverse
gear, the control software enables a video feed from
a rear-placed video camera to the dashboard display.
The control software superimposes a variety of
distance and orientation lines on the dashboard
display so that the vehicle operator can maintain
orientation as the vehicle moves in reverse. The
control software also monitors a proximity sensor to
determine whether an object is inside 10 feet of the
rear of the vehicle. It will automatically break the
vehicle if the proximity sensor indicates an object
within 3 feet of the rear of the vehicle.

Recommended for you

Slides chapters 24-25
Slides chapters 24-25Slides chapters 24-25
Slides chapters 24-25

The document discusses project scheduling and tracking in software engineering. It provides reasons why projects may be late, such as unrealistic deadlines or changing requirements. It discusses principles for effective scheduling like compartmentalization of tasks and defining responsibilities. Metrics like earned value analysis are presented to quantitatively track project progress versus what was planned. Risk management techniques like proactive risk analysis are outlined to improve project success.

Risk Management by Roger Pressman
Risk Management by Roger PressmanRisk Management by Roger Pressman
Risk Management by Roger Pressman

The document discusses various aspects of risk management for software engineering projects. It describes reactive risk management where risks are addressed after they occur versus proactive risk management where formal risk analysis is performed upfront. It outlines seven principles for effective risk management including maintaining a global perspective, encouraging open communication, and emphasizing a continuous process. The document also discusses different aspects of risk management such as risk identification, assessment, projection, and mitigation strategies.

riskmanagementroger
Software Engineering - Ch2
Software Engineering - Ch2Software Engineering - Ch2
Software Engineering - Ch2

This document discusses socio-technical systems and their engineering. It defines socio-technical systems as systems that include both technical and human/organizational elements. Key points include: emergent properties depend on relationships between system components; reliability depends on interactions between hardware, software, and human factors; systems engineering involves specifying, designing, and maintaining complex systems; organizational context and processes affect system design and use; legacy systems are critical but costly to maintain.

Actuator-Sensor Pattern
o Pattern Name: Actuator-Sensor
o Intent: Specify various kinds of sensors and actuators in an embedded system.
o Motivation: Embedded systems usually have various kinds of sensors and actuators. These sensors
and actuators are all either directly or indirectly connected to a control unit. Although many of the
sensors and actuators look quite different, their behavior is similar enough to structure them into a
pattern. The pattern shows how to specify the sensors and actuators for a system, including
attributes and operations. The Actuator-Sensor pattern uses a pull mechanism (explicit request for
information) for PassiveSensors and a push mechanism (broadcast of information) for the
ActiveSensors.
o Constraints:
o Each passive sensor must have some method to read sensor input and attributes that represent the
sensor value.
o Each active sensor must have capabilities to broadcast update messages when its value changes.
o Each active sensor should send a life tick, a status message issued within a specified time frame, to
detect malfunctions.
o Each actuator must have some method to invoke the appropriate response determined by the
ComputingComponent.
o Each sensor and actuator should have a function implemented to check its own operation state.
o Each sensor and actuator should be able to test the validity of the values received or sent and set its
operation state if the values are outside of the specifications
Actuator-Sensor Pattern .cont
Applicability: Useful in any system in which multiple sensors
and actuators are present.
Structure: A UML class diagram for the Actuator-Sensor Pattern
is shown in Figure 7.8. Actuator, PassiveSensor and
ActiveSensor are abstract classes and denoted in italics. There
are four different types of sensors and actuators in this pattern.
The Boolean, integer, and real classes represent the most
common types of sensors and actuators. The complex classes
are sensors or actuators that use values that cannot be easily
represented in terms of primitive data types, such as a radar
device. Nonetheless, these devices should still inherit the
interface from the abstract classes since they should have basic
functionalities such as querying the operation states.
Actuator-Sensor Pattern .cont
Behavior: Figure 7.9 presents a UML sequence diagram for an
example of the Actuator-Sensor Pattern as it might be applied for
the Safe Home function that controls the positioning (e.g., pan,
zoom) of a security camera. Here, the Control Panel queries a
sensor (a passive position sensor) and an actuator (pan control)
to check the operation state for diagnostic purposes before reading
or setting a value. The messages Set Physical Value and Get
Physical Value are not messages between objects. Instead, they
describe the interaction between the physical devices of the
system and their software counterparts. In the lower part of the
diagram, below the horizontal line, the Position Sensor reports that
the operation state is zero. The Computing Component then
sends the error code for a position sensor failure to the Fault
Handler that will decide how this error affects the system and
what actions are required. it gets the data from the sensors and
computes the required response for the actuators.
Software engineering rogers pressman chapter 7

Recommended for you

Slides chapters 6-7
Slides chapters 6-7Slides chapters 6-7
Slides chapters 6-7

The document discusses system engineering and requirements engineering for software systems. It covers topics such as: 1) The hierarchy of system elements including software, hardware, people, databases, documentation and procedures. 2) The requirements engineering process including inception, elicitation, elaboration, negotiation, specification and validation. 3) Techniques for eliciting requirements such as use cases, scenarios, interviews and collaborative requirements gathering meetings.

Daily Newsletter - 20 12-2012
Daily Newsletter - 20 12-2012Daily Newsletter - 20 12-2012
Daily Newsletter - 20 12-2012

The daily newsletter from Shah Advisory provides a summary of market trends and recommendations for several stocks. Overall trends in the key indices (BSE Sensex, S&P 500) are up on the daily, weekly and monthly basis. Recommendations are given to hold long positions in these markets. Analysis and trade recommendations are also given for several Indian and US stocks, with both long and short suggestions based on overall trends and technical indicators. Stocks exhibiting positive and negative breakouts are also listed.

מפגש שולחן עגול אבטחת מידע בגופים פיננסיים
מפגש שולחן עגול אבטחת מידע בגופים פיננסייםמפגש שולחן עגול אבטחת מידע בגופים פיננסיים
מפגש שולחן עגול אבטחת מידע בגופים פיננסיים

This document announces a free webinar hosted by BDO IT Consulting Group on July 4th, 2012. The webinar will cover topics including GRC management, 3D security modeling, and easy2comply compliance software. It will include presentations from BDO IT Consulting Group and guest speakers. Details such as dates, times, and contact information are provided for those interested in registering.

באזלסולבנסי257
WebApps modeling
Content Analysis. The full spectrum of content to be provided by the WebApp is identified,
including text, graphics and images, video, and audio data. Data modeling can be used to
identify and describe each of the data objects.
Interaction Analysis. The manner in which the user interacts with the WebApp is described
in detail. Use-cases can be developed to provide detailed descriptions of this interaction.
Functional Analysis. The usage scenarios (use-cases) created as part of interaction analysis
define the operations that will be applied to WebApp content and imply other processing
functions. All operations and functions are described in detail.
Configuration Analysis. The environment and infrastructure in which the WebApp resides
are described in detail.
When Do We Perform Analysis?
• In some WebE situations, analysis and design merge. However, an
explicit analysis activity occurs when …
• the WebApp to be built is large and/or complex
• the number of stakeholders is large
• the number of Web engineers and other contributors is large
• the goals and objectives (determined during formulation) for the WebApp
will effect the business’ bottom line
• the success of the WebApp will have a strong bearing on the success of the
business
The Content Model
Content objects are extracted from use-cases
examine the scenario description for direct and indirect references to content
Attributes of each content object are identified
The relationships among content objects and/or the hierarchy of content maintained
by a WebApp
• Relationships—entity-relationship diagram or UML
• Hierarchy—data tree or UML
Data Tree
Figure 1 8 .3 Dat a t ree for aSafeHom e c om ponent
component
part Number
part Name
part Type
descript ion
price
Market ingDescript ion
Phot ograph
TechDescript ion
Schemat ic
Video
WholesalePrice
Ret ailPrice

Recommended for you

Leveraging Social Media Marketing Trends in the Apartment Industry
Leveraging Social Media Marketing Trends in the Apartment Industry  Leveraging Social Media Marketing Trends in the Apartment Industry
Leveraging Social Media Marketing Trends in the Apartment Industry

Building and maintaining an on-going positive relationship with consumers and customers through advanced social media tactics and technology is critical to your company’s success! The use of social media and new technology holds tremendous opportunities for companies looking to drive new business, retain customers, create engagement and increase revenue. Whether you are completely clueless, somewhat familiar, or advanced, Erica Campbell, Director of Social Media for Dominion Homes Media, the umbrella division for Homes.com and ForRent.com will discuss how to leverage social media and become part of the consumer dialogue. This session will provide attendees with strategic insight into creating a center of excellence, how and why social media works for businesses across all touch points, improving consumer engagement and other emerging opportunities.

forrent.comerica campbellpinterest
The Independent Magazine's media kit 2015
The Independent Magazine's media kit 2015 The Independent Magazine's media kit 2015
The Independent Magazine's media kit 2015

This document is a media kit that provides information for advertisers about advertising opportunities in The Independent Magazine and The New Review magazines. It summarizes the magazines' target audience as young, affluent ABC1 consumers and influential early adopters of fashion and technology trends. It also notes that the magazines offer engaging interviews and features on topics like food, drink, fashion, beauty, and more. The media kit provides advertising rates and specifications, as well as readership demographics showing the magazines reach over 3.4 million online visitors with 81% of readers being ABC1s aged 25-54 on average.

magazineadvertisingnewspapers
SPRSWAduckhuntingstudyprogressreportApril2012
SPRSWAduckhuntingstudyprogressreportApril2012SPRSWAduckhuntingstudyprogressreportApril2012
SPRSWAduckhuntingstudyprogressreportApril2012

1. The study aims to evaluate the effects of more restrictive versus less restrictive hunting regulations on duck hunter success, activity, satisfaction, and duck distribution across state wildlife areas in Colorado's South Platte River corridor. 2. Preliminary results after the fourth field season found higher season-long duck harvest success under the restrictive regulations compared to the unrestricted areas of similar size and habitat. Hunter satisfaction was similar across areas. 3. Duck numbers in the corridor were relatively high in October-November but ducks moved to large reservoirs in January when temperatures dropped, limiting river use until freezing. The study will continue for two more years.

The Interaction Model
Composed of four elements:
o use-cases
o sequence diagrams
o state diagrams
o a user interface prototype
Each of these is an important UML notation and is described in
Appendix I
Sequence Diagram
Figure 18.5 Sequence diagram f or use-case:select Saf eHome component s
new cust o mer
:Room :FloorPlan
d e sc ri b e s
ro o m *
p l a c e s ro o m
i n f l o o r p l a n
:Product
Component
se l e c t s p ro d u c t c o m p o n e n t *
:Billof
Mat erials
a d d t o Bo M
FloorPlan
Reposit ory
sa v e f l oo r p l a n c o n f i g u ra t i o n
sa v e b i l l o f m a t e ri a l s
BoM
Reposit ory
State Diagram
Figure 1 8 .6 Part ial st at e diagram f or ne w c us t om e rint eract ion
n e w cu st o m e r
Validat ing user
syst em st at us=“input ready”
displaymsg = “ent eruserid”
displaymsg =“ent erpswd”
ent ry/ log-in request ed
do: run user validat ion
exit / set user access swit ch
select “log-in”
userid
validat ed
password validat ed
Select ing user act ion
syst em st at us=“link ready”
display: navigat ion choices”
ent ry/ validat ed user
do: link as required
exit / user act ion select ed
select ot her f unct ions
select cust omizat ion f unct ionalit y
select e-commerce (purchase) f unct ionalit y
Cust omizing
syst em st at us=“input ready”
display: basic inst ruct ions
ent ry/ validat ed user
do: process user select ion
exit / cust omizat ion t erminat ed
select descript ive
cont ent
room being def ined
Def ining room
syst em st at us=“input ready”
display: roomdef . window
ent ry/ roomdef . select ed
do: run room queries
do: st ore room variables
exit / room complet ed
select descript ive
cont ent
Building f loor plan
syst em st at us=“input ready”
display: f loor plan window
ent ry/ f loor plan select ed
do: insert room in place
do: st ore f loor plan variables
exit / room insert ion complet ed
select descript ive
cont ent
select ent er room in f loor plan
Saving f loor plan
syst em st at us=“input ready”
display: st orage indicat or
ent ry/ f loor plan save select ed
do: st ore f loor plan
exit / save complet ed
select save f loor plan
room insert ion complet ed
next select ion
cust omizat ion complet e
all rooms
def ined
The Functional Model
The functional model addresses two processing elements of the WebApp
o user observable functionality that is delivered by the WebApp to end-users
o the operations contained within analysis classes that implement behaviors associated
with the class.
An activity diagram can be used to represent processing flow

Recommended for you

First Line Of Defense
First Line Of DefenseFirst Line Of Defense
First Line Of Defense

The document discusses protective wall coatings for masonry buildings. It notes that while masonry is durable, buildings will inevitably leak due to construction defects. Protective coatings can serve as the first line of defense against moisture ingress. The document outlines best practices for selecting, applying, and installing protective coatings to properly repair masonry and prevent water damage. These include assessing damage, using vapor permeable coatings formulated for masonry, installing mock-ups, and applying the coating uniformly to form a continuous protective barrier.

Cataratas del Niagara en Invierno
Cataratas del Niagara en InviernoCataratas del Niagara en Invierno
Cataratas del Niagara en Invierno

Las Cataratas del Niagara en invierno

Information literacy @ CPUT
Information literacy @ CPUTInformation literacy @ CPUT
Information literacy @ CPUT

This document summarizes Information Literacy initiatives at CPUT. It discusses the Information Literacy policy, committee, and certificate program. The certificate program includes 5 modules taught over 5 weeks and is assessed through a multiple choice test. Statistics on participation in the program from 2009-2015 are provided. Challenges include large class sizes, scheduling sessions, and ensuring teaching skills for librarians. Next steps discussed are improving long-term skills retention, taking a departmental approach, and integrating Information Literacy across subjects and levels as a graduate attribute.

Activity Diagram
Figur e 1 8 .7 Act ivit y diagr am f or c o m p u t e Pr i c e( ) o p e r a t i o n
init ialize t ot alCost
invoke
calcShipping Cost
g et price and
quant it y
c omponent s remain onBoMList
invoke
det ermineDiscount
disc ount < = 0
disc ount >0
t ot alCost=
t ot alCost - discount
t axTot al=
t ot alCost x t axrat e
no c omponent s remain onBoMList
lineCost =
price x quant it y
add lineCost t o
t ot alCost
priceTot al =
t ot alCost + t axTot al
+ shipping Cost
ret urns:
shipping Cost
ret urns: discount
The Configuration Model
Server-side
oServer hardware and operating system environment must be specified
oInteroperability considerations on the server-side must be considered
oAppropriate interfaces, communication protocols and related collaborative
information must be specified
Client-side
oBrowser configuration issues must be identified
oTesting requirements should be defined
Navigation Modeling-I
Should certain elements be easier to reach (require fewer navigation steps) than
others? What is the priority for presentation?
Should certain elements be emphasized to force users to navigate in their direction?
How should navigation errors be handled?
Should navigation to related groups of elements be given priority over navigation to a
specific element.
Should navigation be accomplished via links, via search-based access, or by some
other means?
Should certain elements be presented to users based on the context of previous
navigation actions?
Should a navigation log be maintained for users?
Navigation Modeling-II
o Should a full navigation map or menu (as opposed to a single “back” link or directed
pointer) be available at every point in a user’s interaction?
o Should navigation design be driven by the most commonly expected user behaviors or
by the perceived importance of the defined WebApp elements?
o Can a user “store” his previous navigation through the WebApp to expedite future
usage?
o For which user category should optimal navigation be designed?
o How should links external to the WebApp be handled? overlaying the existing browser
window? as a new browser window? as a separate frame?

Recommended for you

Daily Newsletter: 13th July, 2011
Daily Newsletter: 13th July, 2011Daily Newsletter: 13th July, 2011
Daily Newsletter: 13th July, 2011

- The Indian stock markets ended lower for the third straight day due to sell-offs in global markets from fears over the spreading eurozone debt crisis. The BSE Sensex closed down 1.65% and the NSE Nifty fell 1.60%. - Globally, stocks also extended losses over concerns about Ireland's credit rating downgrade and signs that Europe's debt crisis is spreading. The Dow fell 0.47% and S&P 500 dropped 0.44%. - Domestically, industrial production growth slowed to 5.6% in May, below forecasts, weighing on sentiment. A cabinet reshuffle also failed to lift markets due to insignificant changes.

Software engg. pressman_ch-8
Software engg. pressman_ch-8Software engg. pressman_ch-8
Software engg. pressman_ch-8

This document discusses various modeling techniques used during the analysis phase of software engineering. It covers scenario-based modeling including use cases, activity diagrams, and swimlane diagrams. It also discusses flow-oriented modeling using data flow diagrams and grammars. Additionally, it discusses class-based modeling including identifying analysis classes, class diagrams, and the class-responsibility-collaborator technique. Finally, it discusses behavioral modeling including identifying events and creating state and sequence diagrams.

Week 5
Week 5Week 5
Week 5

System models abstractly describe systems being analyzed and are used to communicate with customers. Different models show the system from external, behavioral, and structural perspectives. Common system models include context models depicting system boundaries, data flow diagrams modeling data processing, state machine models representing system states and transitions, and object models describing the system in terms of object classes and relationships. The Unified Modeling Language provides standard notations for object-oriented modeling.

Software engineering rogers pressman chapter 7

More Related Content

What's hot

Software design
Software designSoftware design
Software design
Benazir Fathima
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case Diagram
Kumar
 
Software design
Software designSoftware design
Software Design and Modularity
Software Design and ModularitySoftware Design and Modularity
Software Design and Modularity
Danyal Ahmad
 
Rational Unified Process
Rational Unified ProcessRational Unified Process
Rational Unified Process
Kumar
 
Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12
koolkampus
 
Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...
Drusilla918
 
Waterfall model in SDLC
Waterfall model in SDLCWaterfall model in SDLC
Waterfall model in SDLC
HND Assignment Help
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
Hassan A-j
 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design
Haitham El-Ghareeb
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
Saqib Raza
 
software engineering
software engineeringsoftware engineering
software engineering
Azad public school
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
BHARGAV VISANI
 
Agile Methodology - Software Engineering
Agile Methodology - Software EngineeringAgile Methodology - Software Engineering
Agile Methodology - Software Engineering
Purvik Rana
 
Ch03 prescriptive process models
Ch03 prescriptive process modelsCh03 prescriptive process models
Ch03 prescriptive process models
Dr. C.V. Suresh Babu
 
Software development process models
Software development process modelsSoftware development process models
Software development process models
Muhammed Afsal Villan
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process Framework
JAINAM KAPADIYA
 
Cocomo model
Cocomo modelCocomo model
Cocomo model
Baskarkncet
 
SE_Lec 05_System Modelling and Context Model
SE_Lec 05_System Modelling and Context ModelSE_Lec 05_System Modelling and Context Model
SE_Lec 05_System Modelling and Context Model
Amr E. Mohamed
 
Software maintenance Unit5
Software maintenance  Unit5Software maintenance  Unit5
Software maintenance Unit5
Mohammad Faizan
 

What's hot (20)

Software design
Software designSoftware design
Software design
 
Use Case Diagram
Use Case DiagramUse Case Diagram
Use Case Diagram
 
Software design
Software designSoftware design
Software design
 
Software Design and Modularity
Software Design and ModularitySoftware Design and Modularity
Software Design and Modularity
 
Rational Unified Process
Rational Unified ProcessRational Unified Process
Rational Unified Process
 
Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12Object Oriented Design in Software Engineering SE12
Object Oriented Design in Software Engineering SE12
 
Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...Software engineering a practitioners approach 8th edition pressman solutions ...
Software engineering a practitioners approach 8th edition pressman solutions ...
 
Waterfall model in SDLC
Waterfall model in SDLCWaterfall model in SDLC
Waterfall model in SDLC
 
Software Process Models
Software Process ModelsSoftware Process Models
Software Process Models
 
Object Oriented Analysis and Design
Object Oriented Analysis and DesignObject Oriented Analysis and Design
Object Oriented Analysis and Design
 
REQUIREMENT ENGINEERING
REQUIREMENT ENGINEERINGREQUIREMENT ENGINEERING
REQUIREMENT ENGINEERING
 
software engineering
software engineeringsoftware engineering
software engineering
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
Agile Methodology - Software Engineering
Agile Methodology - Software EngineeringAgile Methodology - Software Engineering
Agile Methodology - Software Engineering
 
Ch03 prescriptive process models
Ch03 prescriptive process modelsCh03 prescriptive process models
Ch03 prescriptive process models
 
Software development process models
Software development process modelsSoftware development process models
Software development process models
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process Framework
 
Cocomo model
Cocomo modelCocomo model
Cocomo model
 
SE_Lec 05_System Modelling and Context Model
SE_Lec 05_System Modelling and Context ModelSE_Lec 05_System Modelling and Context Model
SE_Lec 05_System Modelling and Context Model
 
Software maintenance Unit5
Software maintenance  Unit5Software maintenance  Unit5
Software maintenance Unit5
 

Viewers also liked

software engineering
software engineeringsoftware engineering
software engineering
ramyavarkala
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
romallieocampo14
 
Software Engineering chapter 19
Software Engineering chapter 19Software Engineering chapter 19
Software Engineering chapter 19
Liz Tee
 
Slides chapters 26-27
Slides chapters 26-27Slides chapters 26-27
Slides chapters 26-27
Priyanka Shetty
 
Software Engineering - Ch12
Software Engineering - Ch12Software Engineering - Ch12
Software Engineering - Ch12
Siddharth Ayer
 
Software Engineering - Ch7
Software Engineering - Ch7Software Engineering - Ch7
Software Engineering - Ch7
Siddharth Ayer
 
Software Engineering - Ch17
Software Engineering - Ch17Software Engineering - Ch17
Software Engineering - Ch17
Siddharth Ayer
 
Slides chapters 24-25
Slides chapters 24-25Slides chapters 24-25
Slides chapters 24-25
Priyanka Shetty
 
Risk Management by Roger Pressman
Risk Management by Roger PressmanRisk Management by Roger Pressman
Risk Management by Roger Pressman
Rogerio P C do Nascimento
 
Software Engineering - Ch2
Software Engineering - Ch2Software Engineering - Ch2
Software Engineering - Ch2
Siddharth Ayer
 
Slides chapters 6-7
Slides chapters 6-7Slides chapters 6-7
Slides chapters 6-7
Priyanka Shetty
 
Daily Newsletter - 20 12-2012
Daily Newsletter - 20 12-2012Daily Newsletter - 20 12-2012
Daily Newsletter - 20 12-2012
Shah Advisory
 
מפגש שולחן עגול אבטחת מידע בגופים פיננסיים
מפגש שולחן עגול אבטחת מידע בגופים פיננסייםמפגש שולחן עגול אבטחת מידע בגופים פיננסיים
מפגש שולחן עגול אבטחת מידע בגופים פיננסיים
Yuval Segev
 
Leveraging Social Media Marketing Trends in the Apartment Industry
Leveraging Social Media Marketing Trends in the Apartment Industry  Leveraging Social Media Marketing Trends in the Apartment Industry
Leveraging Social Media Marketing Trends in the Apartment Industry
Erica Campbell Byrum
 
The Independent Magazine's media kit 2015
The Independent Magazine's media kit 2015 The Independent Magazine's media kit 2015
The Independent Magazine's media kit 2015
Newsworks
 
SPRSWAduckhuntingstudyprogressreportApril2012
SPRSWAduckhuntingstudyprogressreportApril2012SPRSWAduckhuntingstudyprogressreportApril2012
SPRSWAduckhuntingstudyprogressreportApril2012
Mike McConnell
 
First Line Of Defense
First Line Of DefenseFirst Line Of Defense
First Line Of Defense
cjperego
 
Cataratas del Niagara en Invierno
Cataratas del Niagara en InviernoCataratas del Niagara en Invierno
Cataratas del Niagara en Invierno
quienentravuelve
 
Information literacy @ CPUT
Information literacy @ CPUTInformation literacy @ CPUT
Information literacy @ CPUT
HELIGLIASA
 
Daily Newsletter: 13th July, 2011
Daily Newsletter: 13th July, 2011Daily Newsletter: 13th July, 2011
Daily Newsletter: 13th July, 2011
Fullerton Securities
 

Viewers also liked (20)

software engineering
software engineeringsoftware engineering
software engineering
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
Software Engineering chapter 19
Software Engineering chapter 19Software Engineering chapter 19
Software Engineering chapter 19
 
Slides chapters 26-27
Slides chapters 26-27Slides chapters 26-27
Slides chapters 26-27
 
Software Engineering - Ch12
Software Engineering - Ch12Software Engineering - Ch12
Software Engineering - Ch12
 
Software Engineering - Ch7
Software Engineering - Ch7Software Engineering - Ch7
Software Engineering - Ch7
 
Software Engineering - Ch17
Software Engineering - Ch17Software Engineering - Ch17
Software Engineering - Ch17
 
Slides chapters 24-25
Slides chapters 24-25Slides chapters 24-25
Slides chapters 24-25
 
Risk Management by Roger Pressman
Risk Management by Roger PressmanRisk Management by Roger Pressman
Risk Management by Roger Pressman
 
Software Engineering - Ch2
Software Engineering - Ch2Software Engineering - Ch2
Software Engineering - Ch2
 
Slides chapters 6-7
Slides chapters 6-7Slides chapters 6-7
Slides chapters 6-7
 
Daily Newsletter - 20 12-2012
Daily Newsletter - 20 12-2012Daily Newsletter - 20 12-2012
Daily Newsletter - 20 12-2012
 
מפגש שולחן עגול אבטחת מידע בגופים פיננסיים
מפגש שולחן עגול אבטחת מידע בגופים פיננסייםמפגש שולחן עגול אבטחת מידע בגופים פיננסיים
מפגש שולחן עגול אבטחת מידע בגופים פיננסיים
 
Leveraging Social Media Marketing Trends in the Apartment Industry
Leveraging Social Media Marketing Trends in the Apartment Industry  Leveraging Social Media Marketing Trends in the Apartment Industry
Leveraging Social Media Marketing Trends in the Apartment Industry
 
The Independent Magazine's media kit 2015
The Independent Magazine's media kit 2015 The Independent Magazine's media kit 2015
The Independent Magazine's media kit 2015
 
SPRSWAduckhuntingstudyprogressreportApril2012
SPRSWAduckhuntingstudyprogressreportApril2012SPRSWAduckhuntingstudyprogressreportApril2012
SPRSWAduckhuntingstudyprogressreportApril2012
 
First Line Of Defense
First Line Of DefenseFirst Line Of Defense
First Line Of Defense
 
Cataratas del Niagara en Invierno
Cataratas del Niagara en InviernoCataratas del Niagara en Invierno
Cataratas del Niagara en Invierno
 
Information literacy @ CPUT
Information literacy @ CPUTInformation literacy @ CPUT
Information literacy @ CPUT
 
Daily Newsletter: 13th July, 2011
Daily Newsletter: 13th July, 2011Daily Newsletter: 13th July, 2011
Daily Newsletter: 13th July, 2011
 

Similar to Software engineering rogers pressman chapter 7

Software engg. pressman_ch-8
Software engg. pressman_ch-8Software engg. pressman_ch-8
Software engg. pressman_ch-8
Dhairya Joshi
 
Week 5
Week 5Week 5
3 interaction and_state_modeling
3 interaction and_state_modeling3 interaction and_state_modeling
3 interaction and_state_modeling
Minal Maniar
 
Sdlc
SdlcSdlc
Sdlc
SdlcSdlc
Object oriented methodologies
Object oriented methodologiesObject oriented methodologies
Object oriented methodologies
naina-rani
 
Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes
arvind pandey
 
Unit 3 system models
Unit 3 system modelsUnit 3 system models
Unit 3 system models
Azhar Shaik
 
Analysis modeling in software engineering
Analysis modeling in software engineeringAnalysis modeling in software engineering
Analysis modeling in software engineering
MuhammadTalha436
 
Ch08
Ch08Ch08
Ch08
Ch08Ch08
Analysis modeling
Analysis modelingAnalysis modeling
Analysis modeling
Inocentshuja Ahmad
 
Software engineering srs, dfd
Software engineering srs, dfdSoftware engineering srs, dfd
Software engineering srs, dfd
Dr. Anthony Vincent. B
 
SubirTarea.pdf
SubirTarea.pdfSubirTarea.pdf
SubirTarea.pdf
julioamericoramirezs
 
object oriented methodologies
object oriented methodologiesobject oriented methodologies
object oriented methodologies
Amith Tiwari
 
Free ebooks download ! Edhole
Free ebooks download ! EdholeFree ebooks download ! Edhole
Free ebooks download ! Edhole
Edhole.com
 
Free ebooks download ! Edhole
Free ebooks download ! EdholeFree ebooks download ! Edhole
Free ebooks download ! Edhole
Edhole.com
 
Cs8592 ooad unit 1
Cs8592 ooad unit 1Cs8592 ooad unit 1
Cs8592 ooad unit 1
VADUGANATHAND1
 
Cs8592 ooad unit 1
Cs8592 ooad unit 1Cs8592 ooad unit 1
Cs8592 ooad unit 1
MAYILVELKUMARPONNUSA
 
Uml
UmlUml
Uml
anwitat
 

Similar to Software engineering rogers pressman chapter 7 (20)

Software engg. pressman_ch-8
Software engg. pressman_ch-8Software engg. pressman_ch-8
Software engg. pressman_ch-8
 
Week 5
Week 5Week 5
Week 5
 
3 interaction and_state_modeling
3 interaction and_state_modeling3 interaction and_state_modeling
3 interaction and_state_modeling
 
Sdlc
SdlcSdlc
Sdlc
 
Sdlc
SdlcSdlc
Sdlc
 
Object oriented methodologies
Object oriented methodologiesObject oriented methodologies
Object oriented methodologies
 
Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes
 
Unit 3 system models
Unit 3 system modelsUnit 3 system models
Unit 3 system models
 
Analysis modeling in software engineering
Analysis modeling in software engineeringAnalysis modeling in software engineering
Analysis modeling in software engineering
 
Ch08
Ch08Ch08
Ch08
 
Ch08
Ch08Ch08
Ch08
 
Analysis modeling
Analysis modelingAnalysis modeling
Analysis modeling
 
Software engineering srs, dfd
Software engineering srs, dfdSoftware engineering srs, dfd
Software engineering srs, dfd
 
SubirTarea.pdf
SubirTarea.pdfSubirTarea.pdf
SubirTarea.pdf
 
object oriented methodologies
object oriented methodologiesobject oriented methodologies
object oriented methodologies
 
Free ebooks download ! Edhole
Free ebooks download ! EdholeFree ebooks download ! Edhole
Free ebooks download ! Edhole
 
Free ebooks download ! Edhole
Free ebooks download ! EdholeFree ebooks download ! Edhole
Free ebooks download ! Edhole
 
Cs8592 ooad unit 1
Cs8592 ooad unit 1Cs8592 ooad unit 1
Cs8592 ooad unit 1
 
Cs8592 ooad unit 1
Cs8592 ooad unit 1Cs8592 ooad unit 1
Cs8592 ooad unit 1
 
Uml
UmlUml
Uml
 

Recently uploaded

2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
KlettWorldLanguages
 
AI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdfAI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdf
SrimanigandanMadurai
 
L1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 interventionL1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 intervention
RHODAJANEAURESTILA
 
Webinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional SkillsWebinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional Skills
EduSkills OECD
 
NLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacherNLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacher
AngelicaLubrica
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
Nguyen Thanh Tu Collection
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
Celine George
 
How to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 NotebookHow to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 Notebook
Celine George
 
How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17
Celine George
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
JackieSparrow3
 
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptxUnlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
bipin95
 
Principles of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptxPrinciples of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptx
ibtesaam huma
 
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptxChapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Brajeswar Paul
 
How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17
Celine George
 
(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening
MJDuyan
 
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Neny Isharyanti
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
marianell3076
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
Elizabeth Walsh
 
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
heathfieldcps1
 
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Murugan Solaiyappan
 

Recently uploaded (20)

2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference2024 KWL Back 2 School Summer Conference
2024 KWL Back 2 School Summer Conference
 
AI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdfAI_in_HR_Presentation Part 1 2024 0703.pdf
AI_in_HR_Presentation Part 1 2024 0703.pdf
 
L1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 interventionL1 L2- NLC PPT for Grade 10 intervention
L1 L2- NLC PPT for Grade 10 intervention
 
Webinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional SkillsWebinar Innovative assessments for SOcial Emotional Skills
Webinar Innovative assessments for SOcial Emotional Skills
 
NLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacherNLC English 7 Consolidation Lesson plan for teacher
NLC English 7 Consolidation Lesson plan for teacher
 
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
CHUYÊN ĐỀ DẠY THÊM TIẾNG ANH LỚP 12 - GLOBAL SUCCESS - FORM MỚI 2025 - HK1 (C...
 
Front Desk Management in the Odoo 17 ERP
Front Desk  Management in the Odoo 17 ERPFront Desk  Management in the Odoo 17 ERP
Front Desk Management in the Odoo 17 ERP
 
How to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 NotebookHow to Add Colour Kanban Records in Odoo 17 Notebook
How to Add Colour Kanban Records in Odoo 17 Notebook
 
How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17How to Create Sequence Numbers in Odoo 17
How to Create Sequence Numbers in Odoo 17
 
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdfThe Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
The Jewish Trinity : Sabbath,Shekinah and Sanctuary 4.pdf
 
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptxUnlocking Educational Synergy-DIKSHA & Google Classroom.pptx
Unlocking Educational Synergy-DIKSHA & Google Classroom.pptx
 
Principles of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptxPrinciples of Roods Approach!!!!!!!.pptx
Principles of Roods Approach!!!!!!!.pptx
 
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptxChapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
Chapter-2-Era-of-One-party-Dominance-Class-12-Political-Science-Notes-2 (1).pptx
 
How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17How to Show Sample Data in Tree and Kanban View in Odoo 17
How to Show Sample Data in Tree and Kanban View in Odoo 17
 
(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening(T.L.E.) Agriculture: Essentials of Gardening
(T.L.E.) Agriculture: Essentials of Gardening
 
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
Understanding and Interpreting Teachers’ TPACK for Teaching Multimodalities i...
 
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
 
Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024Howe Writing Center - Orientation Summer 2024
Howe Writing Center - Orientation Summer 2024
 
The basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptxThe basics of sentences session 9pptx.pptx
The basics of sentences session 9pptx.pptx
 
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
Lecture_Notes_Unit4_Chapter_8_9_10_RDBMS for the students affiliated by alaga...
 

Software engineering rogers pressman chapter 7

  • 1. Software Engineering: A Practitioner’s Approach, 7/e Design by m.h.jalili
  • 2. Chapter 7 KEY CONCEPTS flow A WebApp D behavior B pattern C How data object transformed control structure of a system Such UML deliver a complex array of content and functionality
  • 3. Overiew oAren’t those requirements modeling representations enough? owhat is requirement modeling ? owho dose it ? owhy is important ? owhat are the step ? oWhat is the work product ? oHow do I ensure that I’ve done it righ ?
  • 4. • One view of requirements modeling, called structured analysis, considers data and the processes that transform the data as separate entities • Data objects are modeled in a way that defines their attributes and relationships. • Processes that manipulate data objects are modeled in a manner that shows how they transform data as data objects flow through the system. • A second approach to analysis modeled, called objectoriented analysis, focuses on • the definition of classes and • the manner in which they collaborate with one another to effect customer requirements. • what approach choose software team ?
  • 5. oRepresents how data objects are transformed at they Represents how data objects are transformed at they move through the system ocan be used to complement UML diagrams and provide additional insight into system requirements and flow. odata flow diagram (DFD) is the diagrammatic form that is used
  • 7. The Flow Model computer based system input output Every computer-based system is an information transform ....
  • 8. Flow Modeling Notation external entity process data flow data store
  • 9. External Entity o A producer or consumer of data o Examples: a person, a device, a sensor o Another example: computer-basedsystem o Data must always originate some where and must always be sent to something
  • 10. Process oA data transformer (changes input to output) oExamples: compute taxes, determine area, oformat report, display graph oData must always be processed in some way to achieve system function
  • 11. • Data flows through a system, beginningas input and transformed into output. Data Flow compute triangle area base height area
  • 12. Data Stores • Data is often stored for later use. look-up sensor data sensor # report required sensor #, type, location, age sensor data sensor number type, location, age
  • 15. Creating a Control Flow Model oFor some types of applications, the data model and the data flow diagram are all that is necessary to obtain meaningful insight into software requirements. olarge class of applications are “driven” by events rather than data oproduce control information rather than reports or displays, and process information with heavy concern for time and performance oSuch applications require the use of control flow modelingin addition to data flow modeling.
  • 16. Creating a Control Flow Model .cont event or control item o To select potential candidate events, the following guidelines are suggested:  List all sensors that are “read” by the software.  List all interrupt conditions.  List all “switches” that are actuated by an operator.  List all data conditions.  Recalling the noun/verb parse that was applied to the processing narrative,  review all “control items” as possible control specification inputs/outputs.  Describe the behavior of a system by identifying its states, identify how each  state is reached, and define the transitions between states.  Focus on possible omissions—a very common error in specifying control; for  example, ask: “Is there any other way I can get to this state or exit from it?”
  • 17. Control Specification A control specification(CSPEC) represents the behavior of the system in tow way oThe CSPEC contains a state diagram that is a sequential specification of behavior. oIt can also contain a program activation table—a combinatorial specification of behavior oCSPEC can be: o state diagram o state transition table o decision tables o activation tables for example: Safe home
  • 18. State diagram for Safe Home security function
  • 20. PAT oA some what different mode of behavioral representation is the process activation table oThe PAT represents information contained in the state diagram in the context of processes, not states othe table indicates which processes (bubbles) in the flow model will be invoked when an event occurs ocan be used as a guide for a designer who must build an executive that controls the processes represented at this level
  • 22. The Process Specification(PSPEC) • used to describe all flow model processes that appear at the final level of refinement • narrative text • program design language (PDL) • mathematical equations • tables, or UML activity diagrams. • To illustrate the use of the PSPEC • consider the process password transform represented in the flow model for SafeHome
  • 23. PSPEC: process password (at control panel) The process password transform performs password validation at the control panel for the Safe Home security function. Process password receives a four-digit password from the interact with user function. The password is first compared to the master password stored within the system. If the master password matches, <valid id message = true> is passed to the message and status display function. If the master password does not match, the four digits are compared to a table of secondary passwords (these may be assigned to house guests and/or workers who require entry to the home when the owner is not present). If the password matches an entry within the table,<valid id message = true> is passed to the message and status display function. If there is no match, <valid id message = false> is passed to the message and status display function
  • 25. Overview • The behavioral model indicates how software will respond to external events or stimuli • for create this model • Evaluate all use cases to fully understand the sequence of interaction within the system. • Identify events that drive the interaction sequence and understand how these events relate to specific objects. • Create a sequence for each use case. • Build a state diagram for the system. • Review the behavioral model to verify accuracy and consistency.
  • 26. Identifying Events With the Use Case oIn general, an event occurs whenever the system and an actor exchange information oA use case is examined for points of information exchange. To illustrate, we reconsider the use case for a portion of the SafeHome security function. oA use case is examined for points of information exchange oAs an example of a typical event homeowner uses the keypad to key in a four-digit password. oafter recognize all event
  • 27. State Representations two different characterizations of states must be considered 1. the state of each class as the system performs its function o passive  A passive state is simply the current status of all of an object’s attributes. o active  The active state of an object indicates the current status of the object as it undergoes a continuing transformation or processing. 2. the state of the system as observed from the outside as the system performs its function
  • 28. Two Different Behavior State diagrams for analysis classes. indicates how an individual class changes state based on external events Sequence diagrams. One component of a behavioral model is a UML state diagram9 that represents active states for each class and the events (triggers) that cause changes between these active states shows the behavior of the software as a function of time. sequence diagram in UML, indicates how events cause transitions from object to object
  • 29. State Diagram for the ControlPanel Class reading locked select ing password ent ered comparing password = incorrect & numberOfTries < maxTries password = correct act iv at ion successful key hit do: validat ePassw ord numberOfTries > maxTries t imer < lockedTime t imer > lockedTime
  • 30. The States of a System ostate—a set of observable circum-stances that characterizes the behavior of a system at a given time ostate transition—the movement from one state to another oevent—an occurrence that causes the system to exhibit some predictable form of behavior oaction—process that occurs as a consequence of making a transition
  • 31. Behavioral Modeling • make a list of the different states of a system (How does the system behave?) • indicate how the system makes a transition from one state to another (How does the system change state?) • indicate event • indicate action • draw a state diagram or a sequence diagram
  • 32. Sequence Diagram homeowner cont rol panel sensorssyst em sensors syst em ready reading request lookup comparing result password ent ered password = correct request act ivat ion act ivat ion successful locked num berOf Tries > m axTries select ing t imer > lockedTime A A Figure 8 .2 7 Sequence diagram (part ial) f or Saf eHome securit y f unct ion act ivat ion successful
  • 34. Patterns for Requirements Modeling o Software patterns are a mechanism for capturing domain knowledge in a way that allows it to be reapplied when a new problem is encountered  domain knowledge can be applied to a new problem within the same application domain  the domain knowledge captured by a pattern can be applied by analogy to a completely different application domain. o The original author of an analysis pattern does not “create” the pattern, but rather, discovers it as requirements engineering work is being conducted. o Once the pattern has been discovered, it is documented
  • 35. Discovering Analysis Patterns oThe most basic element in the description of a requirements model is the use case. oA coherent set of use cases may serve as the basis for discovering one or more analysis patterns. oA semantic analysis pattern (SAP) “is a pattern that describes a small set of coherent use cases that together describe a basic generic application.”
  • 36. An Example o Consider the following preliminary use case for software required to control and monitor a real-view camera and proximity sensor for an automobile: o Use case: Monitor reverse motion o Description: When the vehicle is placed in reverse gear, the control software enables a video feed from a rear-placed video camera to the dashboard display. The control software superimposes a variety of distance and orientation lines on the dashboard display so that the vehicle operator can maintain orientation as the vehicle moves in reverse. The control software also monitors a proximity sensor to determine whether an object is inside 10 feet of the rear of the vehicle. It will automatically break the vehicle if the proximity sensor indicates an object within 3 feet of the rear of the vehicle.
  • 37. Actuator-Sensor Pattern o Pattern Name: Actuator-Sensor o Intent: Specify various kinds of sensors and actuators in an embedded system. o Motivation: Embedded systems usually have various kinds of sensors and actuators. These sensors and actuators are all either directly or indirectly connected to a control unit. Although many of the sensors and actuators look quite different, their behavior is similar enough to structure them into a pattern. The pattern shows how to specify the sensors and actuators for a system, including attributes and operations. The Actuator-Sensor pattern uses a pull mechanism (explicit request for information) for PassiveSensors and a push mechanism (broadcast of information) for the ActiveSensors. o Constraints: o Each passive sensor must have some method to read sensor input and attributes that represent the sensor value. o Each active sensor must have capabilities to broadcast update messages when its value changes. o Each active sensor should send a life tick, a status message issued within a specified time frame, to detect malfunctions. o Each actuator must have some method to invoke the appropriate response determined by the ComputingComponent. o Each sensor and actuator should have a function implemented to check its own operation state. o Each sensor and actuator should be able to test the validity of the values received or sent and set its operation state if the values are outside of the specifications
  • 38. Actuator-Sensor Pattern .cont Applicability: Useful in any system in which multiple sensors and actuators are present. Structure: A UML class diagram for the Actuator-Sensor Pattern is shown in Figure 7.8. Actuator, PassiveSensor and ActiveSensor are abstract classes and denoted in italics. There are four different types of sensors and actuators in this pattern. The Boolean, integer, and real classes represent the most common types of sensors and actuators. The complex classes are sensors or actuators that use values that cannot be easily represented in terms of primitive data types, such as a radar device. Nonetheless, these devices should still inherit the interface from the abstract classes since they should have basic functionalities such as querying the operation states.
  • 39. Actuator-Sensor Pattern .cont Behavior: Figure 7.9 presents a UML sequence diagram for an example of the Actuator-Sensor Pattern as it might be applied for the Safe Home function that controls the positioning (e.g., pan, zoom) of a security camera. Here, the Control Panel queries a sensor (a passive position sensor) and an actuator (pan control) to check the operation state for diagnostic purposes before reading or setting a value. The messages Set Physical Value and Get Physical Value are not messages between objects. Instead, they describe the interaction between the physical devices of the system and their software counterparts. In the lower part of the diagram, below the horizontal line, the Position Sensor reports that the operation state is zero. The Computing Component then sends the error code for a position sensor failure to the Fault Handler that will decide how this error affects the system and what actions are required. it gets the data from the sensors and computes the required response for the actuators.
  • 41. WebApps modeling Content Analysis. The full spectrum of content to be provided by the WebApp is identified, including text, graphics and images, video, and audio data. Data modeling can be used to identify and describe each of the data objects. Interaction Analysis. The manner in which the user interacts with the WebApp is described in detail. Use-cases can be developed to provide detailed descriptions of this interaction. Functional Analysis. The usage scenarios (use-cases) created as part of interaction analysis define the operations that will be applied to WebApp content and imply other processing functions. All operations and functions are described in detail. Configuration Analysis. The environment and infrastructure in which the WebApp resides are described in detail.
  • 42. When Do We Perform Analysis? • In some WebE situations, analysis and design merge. However, an explicit analysis activity occurs when … • the WebApp to be built is large and/or complex • the number of stakeholders is large • the number of Web engineers and other contributors is large • the goals and objectives (determined during formulation) for the WebApp will effect the business’ bottom line • the success of the WebApp will have a strong bearing on the success of the business
  • 43. The Content Model Content objects are extracted from use-cases examine the scenario description for direct and indirect references to content Attributes of each content object are identified The relationships among content objects and/or the hierarchy of content maintained by a WebApp • Relationships—entity-relationship diagram or UML • Hierarchy—data tree or UML
  • 44. Data Tree Figure 1 8 .3 Dat a t ree for aSafeHom e c om ponent component part Number part Name part Type descript ion price Market ingDescript ion Phot ograph TechDescript ion Schemat ic Video WholesalePrice Ret ailPrice
  • 45. The Interaction Model Composed of four elements: o use-cases o sequence diagrams o state diagrams o a user interface prototype Each of these is an important UML notation and is described in Appendix I
  • 46. Sequence Diagram Figure 18.5 Sequence diagram f or use-case:select Saf eHome component s new cust o mer :Room :FloorPlan d e sc ri b e s ro o m * p l a c e s ro o m i n f l o o r p l a n :Product Component se l e c t s p ro d u c t c o m p o n e n t * :Billof Mat erials a d d t o Bo M FloorPlan Reposit ory sa v e f l oo r p l a n c o n f i g u ra t i o n sa v e b i l l o f m a t e ri a l s BoM Reposit ory
  • 47. State Diagram Figure 1 8 .6 Part ial st at e diagram f or ne w c us t om e rint eract ion n e w cu st o m e r Validat ing user syst em st at us=“input ready” displaymsg = “ent eruserid” displaymsg =“ent erpswd” ent ry/ log-in request ed do: run user validat ion exit / set user access swit ch select “log-in” userid validat ed password validat ed Select ing user act ion syst em st at us=“link ready” display: navigat ion choices” ent ry/ validat ed user do: link as required exit / user act ion select ed select ot her f unct ions select cust omizat ion f unct ionalit y select e-commerce (purchase) f unct ionalit y Cust omizing syst em st at us=“input ready” display: basic inst ruct ions ent ry/ validat ed user do: process user select ion exit / cust omizat ion t erminat ed select descript ive cont ent room being def ined Def ining room syst em st at us=“input ready” display: roomdef . window ent ry/ roomdef . select ed do: run room queries do: st ore room variables exit / room complet ed select descript ive cont ent Building f loor plan syst em st at us=“input ready” display: f loor plan window ent ry/ f loor plan select ed do: insert room in place do: st ore f loor plan variables exit / room insert ion complet ed select descript ive cont ent select ent er room in f loor plan Saving f loor plan syst em st at us=“input ready” display: st orage indicat or ent ry/ f loor plan save select ed do: st ore f loor plan exit / save complet ed select save f loor plan room insert ion complet ed next select ion cust omizat ion complet e all rooms def ined
  • 48. The Functional Model The functional model addresses two processing elements of the WebApp o user observable functionality that is delivered by the WebApp to end-users o the operations contained within analysis classes that implement behaviors associated with the class. An activity diagram can be used to represent processing flow
  • 49. Activity Diagram Figur e 1 8 .7 Act ivit y diagr am f or c o m p u t e Pr i c e( ) o p e r a t i o n init ialize t ot alCost invoke calcShipping Cost g et price and quant it y c omponent s remain onBoMList invoke det ermineDiscount disc ount < = 0 disc ount >0 t ot alCost= t ot alCost - discount t axTot al= t ot alCost x t axrat e no c omponent s remain onBoMList lineCost = price x quant it y add lineCost t o t ot alCost priceTot al = t ot alCost + t axTot al + shipping Cost ret urns: shipping Cost ret urns: discount
  • 50. The Configuration Model Server-side oServer hardware and operating system environment must be specified oInteroperability considerations on the server-side must be considered oAppropriate interfaces, communication protocols and related collaborative information must be specified Client-side oBrowser configuration issues must be identified oTesting requirements should be defined
  • 51. Navigation Modeling-I Should certain elements be easier to reach (require fewer navigation steps) than others? What is the priority for presentation? Should certain elements be emphasized to force users to navigate in their direction? How should navigation errors be handled? Should navigation to related groups of elements be given priority over navigation to a specific element. Should navigation be accomplished via links, via search-based access, or by some other means? Should certain elements be presented to users based on the context of previous navigation actions? Should a navigation log be maintained for users?
  • 52. Navigation Modeling-II o Should a full navigation map or menu (as opposed to a single “back” link or directed pointer) be available at every point in a user’s interaction? o Should navigation design be driven by the most commonly expected user behaviors or by the perceived importance of the defined WebApp elements? o Can a user “store” his previous navigation through the WebApp to expedite future usage? o For which user category should optimal navigation be designed? o How should links external to the WebApp be handled? overlaying the existing browser window? as a new browser window? as a separate frame?