Вы находитесь на странице: 1из 27

Bachelor of ICT Assessment Cover Sheet

Assessment Title

Project in Systems Analysis and Design

Programme Title:

Bachelor of Information and Communication Technology

Course Code:

ITB6001

Course Title:

Systems Analysis and Design

Student Name:

Hussain AlMukhtar Hussain Nama Moh'd Jaffar

Student ID:

201101942 201000790 - 201102019

Tutor:

Mr. Momir Radicevic

Due Date:

12/05/2013

Date submitted:

12/05/2013

By submitting this assessment for marking, either electronically or as hard copy, I confirm the
following:

This assignment is my own work


Any information used has been properly referenced.
I understand that a copy of my work may be used for moderation.
I have kept a copy of this assignment

Do not write below this line. For Polytechnic use only.

Assessor:

Date of Marking:

Grade/Mark:
Comments:

Page 1 of 27

1. Table of Contents

1.

Table of Contents ...........................................................................................................................................2

2.

Project Request: .............................................................................................................................................3

3.

PROBLEM STATEMENT MATRIX .....................................................................................................................4

4.

Ishikawa Diagram for the problem of your choice.........................................................................................5

5.

Problems, Opportunities, Objectives and Constraints Matrix .......................................................................6

6.

Requirements Model Diagram of the system ................................................................................................7

7.

Actor Glossary ................................................................................................................................................8

8.

Use Case Glossary ..........................................................................................................................................9

9.

Analysis Use Case Model Diagram ...............................................................................................................10

10.

Analysis Use Case narrative for Trigger Fire Alarm' ................................................................................11

Detectors ..................................................................................................................................................................11
System Response .....................................................................................................................................................11
11.

Analysis Use Case narrative for Disarm Security System .......................................................................12

Authorized person....................................................................................................................................................12
System Response .....................................................................................................................................................12
12.

Analysis Use Case narrative for Notify Fire Department .......................................................................13

Fire Alarm .................................................................................................................................................................13


System ......................................................................................................................................................................13
13.

Activity Diagram for Trigger Fire Alarm'..................................................................................................14

14.

Activity Diagram for Disarm Security System.........................................................................................15

15.

Activity Diagram for Notify Fire Department' .........................................................................................16

16.

Potential Object List .................................................................................................................................17

17.

Refined Object List ...................................................................................................................................19

18.

Proposed Object List ................................................................................................................................22

19.

Analysis Class Diagram & Entity Relationship Diagram............................................................................23

20.

Cost/Benefit Analysis ...............................................................................................................................24

21.

MS Project file ..........................................................................................................................................25

22.1 Gantt Chart ...............................................................................................................................................25


22.2 Detailed Gantt ..........................................................................................................................................26
22.

Interview form/forms ..............................................................................................................................27

Page 2 of 27

2. Project Request:
ITALIANO
Phone: 17236521

DATE OF REQUEST
12/05/2013

Fax: 17236521

SERVICE REQUESTED FOR DEPARTMENT(S)

(Computerized System) for The Modern Art Gallery

SUBMITTED BY

EXECUTIVE SPONSOR (funding authority)

Name: Italiano

Name: Momir Radicevic

Title: Company

Title: Mr

Office: Polytechnic

Office: 26.004

Phone: +973-393-00909

Phone: +973-39279313

TYPE OF SERVICE REQUESTED:

Information Strategy Planning

Existing Application Enhancement

Business Process Analysis and Redesign

Existing Application Maintenance (problem fix)

New Application Development

Not Sure

Other (please specify) _______________________________________________________________________


BRIEF STATEMENT OF PROBLEM, OPPORTUNITY, OR DIRECTIVE (attach additional documentation as necessary)
1.

Current system protects only against intrusion.

2.

The MAG is unprotected during 12-6 a.m.

The MAG is contracting with the security guard of Montenegro. The problem is the owner of the gallery art does not want to spend more money by
hiring more guards to cover the period of time after mid-night between 12 to 6 a.m. this will save around 21,600 for the company. Also, they pay a high
insurance premium.

BRIEF STATEMENT OF EXPECTED SOLUTION


Replace the current system with a computerized system.
Computer along with sensors and alarm detectors attached to the doors and windows will operate the computerized system. Also, the MAG will be
protected 24/7(all the time).
This system will be more efficient and will decrease the payments that the MAG has to pay to secure the place.
MAG should be able to use a secure computerized system to store process and maintain information of the employees, fire brigades and Security
Guard Montenegro.
The new system should notify the MAG manager or other employees in case of fire or intrusion.

ACTION (ISS Office Use Only)


Feasibility assessment approved

Assigned to Italiano

Feasibility assessment waived

Approved Budget $ _____________


Start Date 25/05/2013 Deadline 20/07/2013

Request delayed

Backlogged until date: ______________

Request rejected

Reason: ________________________________________________

Authorized Signatures:

Page 3 of 27

__________________Italiano_____________________

_____________________________________

Project Executive Sponsor

3. PROBLEM STATEMENT MATRIX


PROJECT:

Secure computerized system

CREATED BY:
DATE CREATED:

PROJECT MANAGER:

Italiano
13/05/2013

Brief Statements of Problem,

Urgency

Momir Radicevic

LAST UPDATED BY:

Italiano

DATE LAST UPDATED:

18/05/2013

Visibility

Annual Benefits

Opportunity, or Directive
3.

Current system protects only


against intrusion

7Weeks

High

No benefits, it is

Priority or

Proposed

Rank

Solution

Replace it with

costly due to the

new

guards salary and

computerized

the security

system

insurance
4.

The MAG is unprotected during


12-6 a.m.

7Weeks

High

The Art Gallery will

Using new
system

be protected 24/7

operated with
computers,
sensors and
detectors
5.

Call the second closest not busy


line of fire brigades when the fire
alarm is triggered

7Weeks

High

If the first line is

Storing the

busy the system

telephone

will automatically

numbers of all

call the second

fire brigades of

closest fire

the city. When

brigades and that

the nearest fire

will save the Art

brigades line is

museum

busy the system


will call the one
which comes
after it

6.

MAG pays high insurance for


building and artworks.

7Weeks

High

Decrease the cost

Develop the

of guarding the

system by

building

replacing it with
a computerized
system

7.

Provide computerized security


system

7Weeks

High

Save 21,600 in

Implement the

security guard

designed

salaries and 3000

computerized

in insurance

system into
realty

8.

The security of the gallery is


based on the attendance of
security guards

7Weeks

High

The Art Gallery will

Using new

be protected all

system that

the time

keeps track of
all sensors and
detectors

Page 4 of 27

4. Ishikawa Diagram for the problem of your choice

Page 5 of 27

5. Problems, Opportunities, Objectives and Constraints Matrix


Project: New security system

Project Manager:

Created by:

Last Updated by:

Italiano

Date Last Updated:

12/5/2013

Italiano

Date Created: 9/4/2013

CAUSE AND EFFECT ANALYSIS


Problem or Opportunity
1.

The company is
not covered by
any security during
the period
between midnight
and 6 A.M.

SYSTEM IMPROVEMENT OBJECTIVES

Causes and Effects


1.

Momir Radicevic

Causes: the manager


do not want to employ
any other guards
because of the
increases in the salary
costs

Effects: The building will


not be secured all the day.

System Objective
1.

protect the building


and artworks displayed
against fire

1.2 computer-based
1.3 contain smoke, heat &
fire detectors

System Constraint
1.

configured by a
computer

1.2 should operate in two


modes: normal, secure
1.3 in Secure Mode'
disarm it by using a
wall mounted interface
based on card & PIN
number
1.4 writes a log about each
action
1.5 should store data of all
fire brigades in this city
and call in case of fire
based on the closest

2.

3.

The Owner
doesnt feel like
hiring new
employees to
guard the place

The art gallery is


not protected
from fire and
other incidents

2.

Cause: The Owner is


not willing to pay extra
money for security

2.

The secure
computerized system
will be operating
instead of hiring the
security guard to
secure the place

3.

In order to overcome
this obstacle, if the
sensors or detectors
detects something,
signals will be send to
the system to notify
the manager or the fire
brigades

Effect: The building will


not be secure and it
will raise the security
guard salaries.
3.

Cause: There are no


sensors or fire
detectors in the
building.
Effect: The building will
be (in danger ) not
protected from fire
accident

Page 6 of 27

2.

The system will


detects any unusual
moves, heat and fire
smoke.

3.

Placing sensors on the


doors and windows
along with fire
detectors in different
locations to cover the
whole area.

6. Requirements Model Diagram of the system

Page 7 of 27

7. Actor Glossary

Actor Glossary
Actor

Description

MAG manager

The manager and the owner of the Modern Art Gallery

Librarian

Works in the library

Receptionist

Work in the reception

Hostesses

Works to serve and guide the visitors

Accountants

Works for the accounting department as a full time


employees

Cleaning lady

Cleaning the premises from 1 pm to 3 pm every


Saturday and Sunday

Security Guard Montenegro

Provides the MAG with security guards

Security guards

Work a roster of 6 hours-shift s, seven days a week

Fire brigades

Response when the fire alarm is triggered/ receiving


calls from the museum in case of emergency

Authorized Person

The person who have permission to disarmed the


security system

Page 8 of 27

8. Use Case Glossary


Use-Case Glossary
Use-Case Name

Use-Case Description

Trigger local and


remote alarm

Notify security guard Montenegro in


case of intrusion, or a firedepartment in case of fire

Store employee data

Storing employee data within the


systems database
will be used for fire detection during
normal working hours
will be used both for fire and
intrusion detection while the gallery
is unattended
to disable the secure mode by
swiping a special card and entering a
pin key

Operate normal mode


Operate secure mode

Disarmed the secure


mode

track of all the sensors


and detectors

Triggered fire alarm

Store fire brigades


Record the failure
loges
Notify Fire Department

Toa allocate the location of a sensor


or a detector being triggered and
also the date and time when it was
triggered and the mode of the
security system at that time
the system will call the nearest fire
brigade, if the telephone line is busy,
the system will automatically calss
the colsest one.
System should store all fire brigades
information of the area
To store log of failure of the system
This case describes the process
where the system will notify the fire
department

Page 9 of 27

Participating
Actors and
Roles
System
Montenegro
guards MAG
manager
another
employee
Employee
system
System
System

Authorized
person
System
Manager
System

System fire
brigade

System
employee
System
System
Fire department

9. Analysis Use Case Model Diagram

Page 10 of 27

10. Analysis Use Case narrative for Trigger Fire Alarm'


10.1 Author (s): Italiano

Date:

28/04/2013

Version: 2.0
USE CASE NAME:

Trigger Fire Alarm

USE CASE ID:

TFA01

USE CASE TYPE


Business Requirements:

System Analysis:

System Design:

PRIORITY:
SOURCE:
ACTORS:

Detectors

OTHER PARTICIPATING ACTORS:

fire-department

STAKEHOLDERS:
DESCRIPTION:

The scenario that will happen in case of fire

PRE-CONDITION:

Security system must exist


The system must be set on secure mode
The system must be configured to take the right actions in case of fires

TRIGGER:

Fire happen inside the building and detected by the detectors

TYPICAL COURSE

Detectors

System Response

OF EVENTS (FLOW OF

Step1: Detector detects something like

ACTIVITIES):

fire, smoke or heat.


Step2: activation of fire detectors
Step3: send a notification to system

Step 4: System will receive the notification that sent


from the detector.
Step5: The system will trigger the sounding local
alarm
Step 6: The system will activate the remote alarm.
Step7: Save the detector location and time been
triggered by invoking " Keep Track case
Step8: notify the fire department.

ALTERNATE COURSES

Step2.1: if the detectors activate wrongly without smoke or heat or fire, the system should invoke

(EXCEPTION CONDITIONS):

"Force Stop Alarm" case to eliminate the failure.


Step 4.1: System dont recognize the signal from the sensors.
Step8.1: the system fails to notify the fire department, the system must notify the manager or
another employee.
Step8.2: Notify fire Department Manually

CONCLUSION:

The fire department will send fighters to fight the fire

POST-CONDITION:

The system will be turned into secure mode again after the situation is under control

BUSINESS RULES
IMPLEMENTATION
CONTRAINTS AND
SPECIFICATIONS
ASSUMPTIONS:
OPEN ISSUES:

Page 11 of 27

11. Analysis Use Case narrative for Disarm Security System


11.1 Author (s):Italiano

Date:

01/05/2013

Version: 3.4
USE CASE NAME:

Disarm Security System

USE CASE ID:

DSS02

USE CASE TYPE


Business Requirements:

System Analysis:

System Design:

PRIORITY:
SOURCE:
ACTORS:

authorized person

OTHER PARTICIPATING ACTORS:


STAKEHOLDERS:
DESCRIPTION:

The scenario to stop the alarm

PRE-CONDITION:

Security system must exist


The alarm must be enabled
The wall mounted interface must exist

TRIGGER:

The alarm "triggered "turn on for a reason and the person entered to disarmed it.

TYPICAL COURSE
Authorized person

System Response

OF EVENTS (FLOW OF

Step 1: The person will try to disable the

Step 2: The system will ask for a special card to be

ACTIVITIES):

alarm through the wall interface

swept

Step 3: The person will Sweep the special

Step4: System will verify and recognize the card

card
Step5: System will invoke 'Employee details case
"from the database and system will search for the
employee details.
Step6: The system will ask for a PIN to be entered
Step 7: The person will enter the

Step8: The system will invoke "PIN details case" from

required PIN

the database
Step 9: The system will verify the PIN entered

Step 10: The system will disable the alarm

ALTERNATE COURSES

Step 4.1: in case the card is not useable the system will print out a notification indicating that

(EXCEPTION CONDITIONS):

Step5.1: if the employee not found the system will reject the disarmed action and will end
Step 9.1: in case the PIN is not correct the system will ask for the card again in step 3
Step9.2: if authorized person failed to disarm the system by entering PIN three times wrong, he
should notify fire brigades and the Manager of the "False" alarm notification.

CONCLUSION:

The alarm will turn off

POST-CONDITION:

Turn the system to secure mode

BUSINESS RULES
IMPLEMENTATION
CONTRAINTS AND
SPECIFICATIONS
ASSUMPTIONS:
OPEN ISSUES:

Page 12 of 27

12. Analysis Use Case narrative for Notify Fire Department


12.1 Author (s):Italiano

Date:04/05/2013
Version: 2.0

USE CASE NAME:

Notify Fire Department

USE CASE ID:

NFD03

PRIORITY:

High

USE CASE TYPE

SOURCE:

Business Requirements:

System Analysis:

System Design:

ACTORS:
OTHER PARTICIPATING ACTORS:

fire brigade

STAKEHOLDERS:
DESCRIPTION:

The scenario to call a fire brigade

PRE-CONDITION:

Security system must exist


The information about fire brigades are stored in the system

TRIGGER:

the smoke, fire or heat detectors detect something in the fire Department

TYPICAL COURSE

OF EVENTS (FLOW OF

Fire Alarm

System

Step8: Notify the Fire Department

Step 1: System will search the data base for the

ACTIVITIES):

closest fire department


Step2: Select the closest fire department number
Step3: The system will call the closest fire
department
Step4: Send the location and time of the detectors
been triggered

ALTERNATE COURSES

Step 3.1: in case the line was busy the system will search for the next closest fire department and

(EXCEPTION CONDITIONS):

call it
Step4.1: the system fails to notify the fire department, the system must notify the manager or
another employee.

CONCLUSION:

The fire department should be aware of the fire and they will take action

POST-CONDITION:

the system will search for the next steps

BUSINESS RULES
IMPLEMENTATION
CONTRAINTS AND
SPECIFICATIONS
ASSUMPTIONS:
OPEN ISSUES:

Page 13 of 27

13. Activity Diagram for Trigger Fire Alarm'

Page 14 of 27

14. Activity Diagram for Disarm Security System

Page 15 of 27

15. Activity Diagram for Notify Fire Department'

Page 16 of 27

16. Potential Object List


Potential Object

Employees
Department
Sensors
Detectors
Fire Brigades
FailuresLog
Outsource
Emp_ID
Emp_position
Emp_name
Emp_phone
Emp_city
Dept_ID
Dept_address
Dept_secure_mode
Dept_phone
Sensor_ID
Sensor_location
Sensor_type
Sensor_time
Sensor_date
Sensor_secure_mode
Detector_ID
Detector_location
Detectors ds _type
Detectors _time
Detectors _date
Detectors_secure_mode
Brigade_id
Brigade_name
Brigade_location
Brigade_phone
Page 17 of 27

Failure_ID
Failure_date
Failure_time
Failure_description
Outsource_id
Outsource_name
Outsource_salary
Outsource_time_start
Outsource_time_end

Page 18 of 27

17. Refined Object List


Potential Object

Notes

Employees

It will contains the


employee details

Department

Sensors

Detectors

Fire Brigades

FailuresLog

Outsource

Emp_ID
Emp_position
Emp_name
Emp_phone

Emp_city
Dept_ID

Dept_address
Dept_secure_mode

Object

It will contains different


types of departments with
all information needed
It will contains the sensors
details

It will contains the


detectors details

It will contains the Fire


brigades information

This will contain the


records of the failures
occurs to the system

This will contain the


outsourced employee
A unique number which
relates to an employee
Contain the current
position of the employee
This will contain the name
of the employee
This will contain the
contact number for the
employee
This will contain the city of
the employee
It will contain a unique
number that related to the
department
This will contain the
location of the department
It will contain the security
mode in the department
(Normal mode / Secure
mode)

X
X

Reason
Employee is important
because it will contain the
employee information
Department is important
because it will gather all
information thats relate to it.
Sensor is important because
it will contain all information
about the sensors
detector is important because
it will contain all information
about the detectors
Fire brigades is important
because it will contain all
information about the Fire
brigades
Failures Log is important
because it will keep tracking
of all the failures in the
system
Outsource will contain the
detail about the persons who
work for the department
Attribute of Employee
Attribute of Employee
Attribute of Employee
Attribute of Employee

Attribute of Employee
Attribute of Department

Attribute of Department
Attribute of Department

Page 19 of 27

Dept_phone

It will contains the contact


number of the department
Sensor_ID
A unique number which
relates to a sensor
Sensor_location
Identify the exact location
of the sensor
Sensor_type
It will determined type of
sensors ( motion
perimeter, etc..)
Sensor_time
It will store the time of the
sensor
Sensor_date
It will store the date of the
sensor
Sensor_secure_mode
It will store the secure
mode of the sensor
Detector_ID
A unique number which
relates to a detector
Detector_location
Identify the exact location
of the detector
Detectors ds _type
It will determined type of
detectors (heat smokefire)
Detectors _time
It will store the time of the
detectors
Detectors _date
It will store the date of the
detectors
Detectors_secure_mode It will store the secure
mode of the detectors
Brigade_id
A unique number which
relates to a Fire brigades
Brigade_name
This will contain the name
of the Fire department
Brigade_location
Identify the exact location
of the Fire brigades
Brigade_phone
This will contain the
contact number for the
Fire brigade department
Failure_ID
A unique number which
relates to FailuresLog
Failure_date
It will store the date of the
FailuresLog
Failure_time
It will store the time of the
FailuresLog
Failure_description
It will store a description
about the failure thats
occur in the FailuresLog

X
X
X

Attribute of Department
Attribute of Sensors
Attribute of Sensors
Attribute of Sensors

X
X
X
X
X

Attribute of Sensors
Attribute of Sensors
Attribute of Sensors
Attribute of Detectors
Attribute of Detectors
Attribute of Detectors

X
X
X
X
X
X

Attribute of Detectors
Attribute of Detectors
Attribute of Detectors
Attribute of Fire brigades
Attribute of Fire brigades
Attribute of Fire brigades
Attribute of Fire brigades

X
X
X

Attribute of FailuresLog
Attribute of FailuresLog
Attribute of FailuresLog
Attribute of FailuresLog

Page 20 of 27

Outsource_id
Outsource_name
Outsource_salary
Outsource_time_start

Outsource_time_end

A unique number which


relates to the outsource
Name of the outsource
The salary of the
outsource
The time when the
manager contract with the
outsource
The time when the
contract with the
outsource expired

X
X
X

Attribute of outsource
Attribute of outsource
Attribute of outsource
Attribute of outsource

X
Attribute of outsource
X

Page 21 of 27

18. Proposed Object List


Potential Object

Notes

Employees

Emp_ID, Emp_position,
Emp_name, Emp_phone,
Emp_city

Department

Sensors

Detectors

Fire Brigades

FailuresLog

Outsource

Object

Dept_ID
Dept_address
Dept_secure_mode
Dept_phone

Sensor_ID
Sensor_location
Sensor_type
Sensor_time
Sensor_date
Sensor_secure_mode
Detector_ID
Detector_location
Detectors ds _type
Detectors _time
Detectors _date
Detectors_secure_mode
Brigade_id
Brigade_name
Brigade_location
Brigade_phone

Sensor is important because it


will contain all information
about the sensors

Outsource_id
Outsource_name
Outsource_salary
Outsource_time_start
Outsource_time_end

Department is important
because it will gather all
information thats relate to it.

detector is important because


it will contain all information
about the detectors

Failure_ID
Failure_date
Failure_time
Failure_description

Reason
Employee is important
because it will contain the
employee information

Page 22 of 27

Fire brigades is important


because it will contain all
information about the Fire
brigades
Failures Log is important
because it will keep tracking of
all the failures in the system

Outsource will contain the


detail about the persons who
work for the department

19. Analysis Class Diagram & Entity Relationship Diagram

Page 23 of 27

20. Cost/Benefit Analysis

Page 24 of 27

21. MS Project file


22.1 Gantt Chart

Page 25 of 27

22.2 Detailed Gantt

Page 26 of 27

22. Interview form/forms

INTERVIEW PLAN
PROJECT:

Call Reporting

PROJECT MANAGER:

MomirRadcevic

CREATED BY:

Italiano

LAST UPDATED BY:

Italiano

DATE CREATED:

9/5/2013

DATE LAST UPDATED:

9/5/2013

Date

Time

Participant
Momir

Thursday

4P.M.

Hussain ALMukhtar
Hussain Nama

Category
Question

Answer

Requirement

General information

Is there any costs that


we should include in
the Cost/Benefit
analysis?

Training cost = 1000


Development Costs =
calculated by ( hours worked on
project * (rate/per hour)

Add these costs in our cost/benefits


analysis

General information

Is there a discount we
should give?
if yes what is the
discount rate?

Yes, the discount factor (13%)

Will be added to the cost/benefit


analysis

General information

What is the tax rate?

Tax rate = 17%

The tax on profit in our project is 17%


to calculate the net after tax

General information

What is the calculation


of hourly rate for
developing the system?

Calculate the hours spent


analysing and designing the
project and multiply it with a
chosen rate
for example rate of 5-10 Euro

Make Sure you cover the


PIECES framework

Page 27 of 27

Вам также может понравиться