this is a project related to schedule of meetings and this project provides details about the room and equipment present in that room for meeting..
this is a general description about the project and UML diagrams of the project..
The development and coding of project is not yet finalized.
this is a project related to schedule of meetings and this project provides details about the room and equipment present in that room for meeting..
this is a general description about the project and UML diagrams of the project..
The development and coding of project is not yet finalized.
Intelligent Agent PPT ON SLIDESHARE IN ARTIFICIAL INTELLIGENCEKhushboo Pal
n artificial intelligence, an intelligent agent (IA) is an autonomous entity which acts, directing its activity towards achieving goals (i.e. it is an agent), upon an environment using observation through sensors and consequent actuators (i.e. it is intelligent).An intelligent agent is a program that can make decisions or perform a service based on its environment, user input and experiences. These programs can be used to autonomously gather information on a regular, programmed schedule or when prompted by the user in real time. Intelligent agents may also be referred to as a bot, which is short for robot.Examples of intelligent agents
AI assistants, like Alexa and Siri, are examples of intelligent agents as they use sensors to perceive a request made by the user and the automatically collect data from the internet without the user's help. They can be used to gather information about its perceived environment such as weather and time.
Infogate is another example of an intelligent agent, which alerts users about news based on specified topics of interest.
Autonomous vehicles could also be considered intelligent agents as they use sensors, GPS and cameras to make reactive decisions based on the environment to maneuver through traffic.
Examples of intelligent agents
AI assistants, like Alexa and Siri, are examples of intelligent agents as they use sensors to perceive a request made by the user and the automatically collect data from the internet without the user's help. They can be used to gather information about its perceived environment such as weather and time.
Infogate is another example of an intelligent agent, which alerts users about news based on specified topics of interest.
Autonomous vehicles could also be considered intelligent agents as they use sensors, GPS and cameras to make reactive decisions based on the environment to maneuver through traffic.
cuACS Requirements Analysis Document Nicholas Aubé.docxdorishigh
cuACS
Requirements Analysis Document
Nicholas Aubé 101032093
Ibiduneyitayo, 101018199
Peter MacDonald, 100683150
Submitted to:
Dr. Christine Laurendeau
COMP 3004 Object-Oriented Software Engineering
School of Computer Science
Carleton University
1
Table of Contents
Introduction + Overview of Document…………………………………………………………………………….1
Functional Requirements…………..……………………………………………………..……………………………..2
Non-functional Requirements………………………………………………………………………………………2-4
Use Case Model…………………………………………………………………………………………….……………4-15
Object Model……………………………………………………………………………………………………………...…16
Introduction
The cuACS program is designed to find the best possible matches between a variety
of different animals and clients that are looking for a new pet. The Carleton University
Animal Case System will revolutionize the way that we adopt animals. The main advantage
of the cuACS system is the dynamic algorithm that matches shelter animals and human
clients based on compatibility factors such as habitat, size, and temperament. The
algorithm is optimized to create the largest number of sufficient matches, not just one or
two perfect ones. The cuACS program will allow clients to look at animal profiles and edit
their own detailed profiles. There will also be functionality to manage client profiles and
animal preferences. There are even multiple types of users that can access the system, staff
and clients. Both types of users have different permissions, which will be managed by the
system.
This report will cover many different aspects of the cuACS system, including an
overview of the program, functional and non-functional requirements, the user case model
and the object model.
2
Functional requirements
Traceability: functional requirements are preceded by the letter F when referred to in
other sections of the requirements analysis. E.g. F-1.1 refers to the staff interaction 1.1
functional requirement.
1. Staff interactions
1.1. Staff should be able to add new animals and clients
1.2. Staff should be able to view client and animal information
1.3. Staff should be able to edit animal and client profiles
1.4. Staff should be able to start the Matching algorithm process
1.5. Staff should be able to view a summary of matches made by the Matching algorithm
1.6. Staff should be able to view the details of a specific match made by the algorithm
2. Client interactions
2.1. Clients can view and edit their profile
2.2. Clients can view animal profiles
3. Algorithm
3.1. There should be an algorithm that can create optimal matches between clients and
animals
3.2. The algorithm should look at client preferences and match them with animal traits
3.3. The algorithm should attempt to create the largest number of acceptable matches
possible rather than a small number of extremely compatible matches.
3.4. The algorithm should provide output in a for.
Intelligent Agent PPT ON SLIDESHARE IN ARTIFICIAL INTELLIGENCEKhushboo Pal
n artificial intelligence, an intelligent agent (IA) is an autonomous entity which acts, directing its activity towards achieving goals (i.e. it is an agent), upon an environment using observation through sensors and consequent actuators (i.e. it is intelligent).An intelligent agent is a program that can make decisions or perform a service based on its environment, user input and experiences. These programs can be used to autonomously gather information on a regular, programmed schedule or when prompted by the user in real time. Intelligent agents may also be referred to as a bot, which is short for robot.Examples of intelligent agents
AI assistants, like Alexa and Siri, are examples of intelligent agents as they use sensors to perceive a request made by the user and the automatically collect data from the internet without the user's help. They can be used to gather information about its perceived environment such as weather and time.
Infogate is another example of an intelligent agent, which alerts users about news based on specified topics of interest.
Autonomous vehicles could also be considered intelligent agents as they use sensors, GPS and cameras to make reactive decisions based on the environment to maneuver through traffic.
Examples of intelligent agents
AI assistants, like Alexa and Siri, are examples of intelligent agents as they use sensors to perceive a request made by the user and the automatically collect data from the internet without the user's help. They can be used to gather information about its perceived environment such as weather and time.
Infogate is another example of an intelligent agent, which alerts users about news based on specified topics of interest.
Autonomous vehicles could also be considered intelligent agents as they use sensors, GPS and cameras to make reactive decisions based on the environment to maneuver through traffic.
cuACS Requirements Analysis Document Nicholas Aubé.docxdorishigh
cuACS
Requirements Analysis Document
Nicholas Aubé 101032093
Ibiduneyitayo, 101018199
Peter MacDonald, 100683150
Submitted to:
Dr. Christine Laurendeau
COMP 3004 Object-Oriented Software Engineering
School of Computer Science
Carleton University
1
Table of Contents
Introduction + Overview of Document…………………………………………………………………………….1
Functional Requirements…………..……………………………………………………..……………………………..2
Non-functional Requirements………………………………………………………………………………………2-4
Use Case Model…………………………………………………………………………………………….……………4-15
Object Model……………………………………………………………………………………………………………...…16
Introduction
The cuACS program is designed to find the best possible matches between a variety
of different animals and clients that are looking for a new pet. The Carleton University
Animal Case System will revolutionize the way that we adopt animals. The main advantage
of the cuACS system is the dynamic algorithm that matches shelter animals and human
clients based on compatibility factors such as habitat, size, and temperament. The
algorithm is optimized to create the largest number of sufficient matches, not just one or
two perfect ones. The cuACS program will allow clients to look at animal profiles and edit
their own detailed profiles. There will also be functionality to manage client profiles and
animal preferences. There are even multiple types of users that can access the system, staff
and clients. Both types of users have different permissions, which will be managed by the
system.
This report will cover many different aspects of the cuACS system, including an
overview of the program, functional and non-functional requirements, the user case model
and the object model.
2
Functional requirements
Traceability: functional requirements are preceded by the letter F when referred to in
other sections of the requirements analysis. E.g. F-1.1 refers to the staff interaction 1.1
functional requirement.
1. Staff interactions
1.1. Staff should be able to add new animals and clients
1.2. Staff should be able to view client and animal information
1.3. Staff should be able to edit animal and client profiles
1.4. Staff should be able to start the Matching algorithm process
1.5. Staff should be able to view a summary of matches made by the Matching algorithm
1.6. Staff should be able to view the details of a specific match made by the algorithm
2. Client interactions
2.1. Clients can view and edit their profile
2.2. Clients can view animal profiles
3. Algorithm
3.1. There should be an algorithm that can create optimal matches between clients and
animals
3.2. The algorithm should look at client preferences and match them with animal traits
3.3. The algorithm should attempt to create the largest number of acceptable matches
possible rather than a small number of extremely compatible matches.
3.4. The algorithm should provide output in a for.
Learn how to update tracking information for the submission of PI progress, financial and cost share reports in MSU’s new research administration system.
Learn how to update tracking information for the submission of PI progress, financial and cost share reports in MSU’s new research administration system.
Software Requirements ElicitationRequirements specify a set of f.docxwhitneyleman54422
Software Requirements Elicitation
Requirements specify a set of functions a software development project must deliver. Functional requirements define system capabilities, for example, “The system shall permit users to inquire about Berta’s Pizzeria menu via an email message.” Additionally requirements specify non-functional standards that the system must operate within. Examples of non-functional requirements are performance, quality, safety, security, and interface requirements. An example of a performance requirement is, “The system shall have the ability to process 1MB/sec of input.” An example of a quality requirement is, “The MTBF (mean time between failures) shall be greater than 90 days.”
The iterative and incremental development processes of agile methods permit frequent changes to requirements and documentation. Early requirements analysis is required only for features developed in early iterations. Scrum and XP are agile methods that facilitate requirements gathering flexibility. Agile methods require direct involvement of the end-user though-out the software lifecycle. The requirement elicitation differs depending on the agile methodology used. The Unified Process (UP) creates use cases as requirements. Scrum records initial requirements in the form of a product backlog and prioritises them. Extreme Programming (XP) derives user stories and organizes them on a corkboard, or storyboard into deliverables for each iteration.
Requirements elicitation is considered the most difficult part of a development project. The Importance of identifying correct requirements is valuable to the both software developer and the customer. Systems delivered according to incorrect or inadequate requirements may be disparaging to the development organization and disappointing and wasteful to the client. Difficulties with requirements elicitation and analysis include:
1. lack of domain knowledge by the development team
2. Users are not knowledgeable of software capabilities
3. A communication disconnect between the users and the development team
4. Stakeholders cannot definitively specify the requirements
5. Stakeholders underestimate the importance of requirements gathering
6. Nonfunctional requirements are not addressed
7. Stakeholders alter the requirements during the software lifecycle
Requirements elicitation steps include:
1. collection of application information
2. optionally building analysis models
3. developing requirements and constraints
4. feasibility study
5. requirements specification review
The collection of application information involves inquiries about internal and external influences on the business environment, policies, regulations, business goals, and standards. Analysis models may be constructed to understand the business processes and objectives. The customer or user plays a critical role in driving and prioritizing requirements to satisfy the business needs. When the practicability of implementing particular requirements is in q.
1. TABLE OF CONTENTS
1. Introduction…………………………………………………………………………...2
1.1.Use Case Description……………………………………………………………...2
1.2.High Level Use Case Diagram…………………………………………………..9
1.3.Domain Model…………………………………………………………………....10
1.4.Sequence Diagram……………………………………………………………….11
1.5.Collaboration Diagram…………………………………….…………………….19
1.6.Operations Contract……………………………………………………………..23
1.7.DesignClass Diagram…………………………………………………………....27
1.8.Data Model………………………………………………………….…………………..28
2. Deliverable 2 1
1 PUCIT | EM Planner
1. Introduction
Our project is an Event Management Planner, which is basically for the people who want to organize
some events and want a variety of choices that may help them to organize their event more
efficiently. Our project is basically web-based application in which clients/users can post their
requirements according to their event needs and on the other hand event organizer can also post the
services they are providing in the market. The basic theme of this application is to create a platform
for both the organizers and Clients/Users to accomplish their needs on a single platform.
The modules of the system are consisting of these ends.
Sign In Module
Place Order Module
View Services Module
Select services or packages
Place Order
Now we are ready to strive for a solution for the problem domain by using object-oriented approach.
Following artifacts are included in this deliverable. And we will work on these artifacts.
1. Use case descriptions
2. Use case diagram refined
3. Domain Model
4. Sequence Diagram
5. Collaboration Diagram
6. Operation Contracts
7. Design Class Diagram
8. Data Model
3. Deliverable 2 2
2 PUCIT | EM Planner
1.1 Use case Description
1.1.1 UC_LOGIN:
Brief Description:
This Use Case describes the process by which administrator and customer log into the event management
system. It also sets up access permissions for various categories of users.
Primary Actors:
Administrator
Customer
Stake Holders:
Administrator: Want to successfully login to the system.
Customer: Want to successfully login to the system.
Pre-Conditions: Administrator and customer should already been registered by the developer.
Basic Flow:
1. The Use Case starts when the administrator and customer starts the application.
2. The system will display the login screen
3. The administrator and customer enters a username and password.
4. The system will verify the information.
5. The system will set access permissions.
6. The system will display the main screen
.
4. Deliverable 2 3
3 PUCIT | EM Planner
Alternate Flows:
1. (a) If the invalid login information is provided, it will be prompted entering the correct
information.
Post Conditions: Administrator and customer would get login successfully.
1.1.2 UC_ALLOCATE_ADMIN
Brief Description:
Administrator should have authority to add another administrator so that if present
administrator has been changed or in case of some emergency, admin will assign authorities to the
new admin.
Primary Actors:
Administrator
Stake Holders:
Administrator: Want to add another admin successfully.
Pre-Conditions: Administrator should be authenticated admin.
Basic Flow:
1. Admin login to the application.
2. Select option to add an admin.
3. Admin provides specific information and hand over the admin rights to the new admin.
Alternate Flows:
1. (a) Login Failed.
Post Conditions: The new Admin now can do all the tasks assigned to the administrator.
1.1.3 UC_ENROLL_EVENT
Brief Description:
Admin and customer enroll new event using enrollment form.
Primary Actors:
Administrator
Stake Holders:
5. Deliverable 2 4
4 PUCIT | EM Planner
Administrator: Successfully add event’s information.
Customer : Successfully add event information
Pre-Conditions:
1. Admin and customer itself should be already enrolled.
2. Event must be a final for Management.
Basic Flow:
1. Admin and customer logs in and start enrolling event and recording their Emil id.
2. Admin and customer give the full description about the event.
3. Admin and customer successfully updates application’s data.
4. Admin and customers successfully log out from the application.
Alternate Flows:
1. (a) Login failed.
2. (a) If the invalid information is provided in the enrollment form, it will be prompted for
entering the correct information.
Post Conditions: Data would be successfully entered in the database.
1.1.4 UC_DELETE_EVENT
Brief Description:
Admin can delete the event after some particular time.
Primary Actors:
Administrator
Stake Holders:
Administrator: Successfully delete event that will be post on site for the biding
Pre-Conditions:
3. Admin itself should be already enrolled.
4. Event must be a upload on the website for biding.
Basic Flow:
5. Admin logs in and start delete event
6. Admin confirm delete that event
7. Admin successfully updates application’s data.
8. Admin successfully log out from the application.
6. Deliverable 2 5
5 PUCIT | EM Planner
Alternate Flows:
3. (a) Login failed.
4. (a) If the invalid information is provided, it will not be delete the particular event
5. (a)event time period will be end or close for biding
Post Conditions: updating data would be successfully entered in the database.
1.1.5 UC_CHECK_IN_STATUS
Brief Description:
Admin will check how many users are currently login.
Primary Actors:
Administrator, Customer, Viewers
Stake Holders:
Customers: Wants to successfully check-in in the system.
Administrator: Wants to check that who is currently login.
Pre-Conditions: Admin must be login and have specific option in interface.
Basic Flow:
1. Admin must be login successfully
2. Admin view the check in status of the users.
Alternate Flows:
1. (a) Login failed.
Post Conditions: Admin could check the check in status successfully.
1.1.6 UC_BID_ON_EVENT
Brief Description:
Customer, Viewers and providers can bid on the suitable event that they want to manage
Primary Actors:
Providers
Stake Holders:
Providers: Want to successfully bid on the event.
7. Deliverable 2 6
6 PUCIT | EM Planner
Pre-Conditions: provider will be the member of the website through the signup form.
Basic Flow:
1. Provider login through the email id and valid password
2. And bid on the suitable project.
3. Logout after the successfully biding on the event.
Alternate Flows:
1. (a) login failed
(b) Biding event cannot match with the skill of provider
Post Conditions: The information send to provider and that want to manage the event also through
the email.
1.1.7 UC_EVENT_EMAIL
Brief Description:
During the lifecycle of an Event a number of emails will be generated by the Event
Administrator.
Primary Actors:
Administrator
Customer
Stake Holders:
Administrator: Wants to generate the performance report of the employees’ on the basis of
given input.
Pre-Conditions: The admin is successfully login.
Basic Flow:
1. Sent Emails should be archived with a record of to whom they were sent.
2. A standard set of embeddable links should be available -
○ View the event
○ Register for the event
○ Change your registration
3. Open rates and click-through should be tracked for events
Alternate Flows:
1. (a) Application is unable to provide services due to server down.
(b) Information provided is invalid.
8. Deliverable 2 7
7 PUCIT | EM Planner
Post Conditions: The report is generated successfully
1.1.8 UC_EVENT_LOCATION
Brief Description:
Location of Events is something that both Event Administrators as
well as Participants need to do.
Primary Actors:
Administrator and customer
Stake Holders:
Administrator: Wants to give the exact map of the event location.
Customer: Wants to give the exact location where he want to manage the event
Pre-Conditions:
1. Administrator’ information is already saved in the system.
2. Customer’ attendance record is maintained in the system.
Basic Flow:
1. Admin will select location option from the system.
2. Admin will give the exact location by any resources it may be Google map and another.
3. Admin will review the location of the event.
Alternate Flows:
1. (a) Admin can change the location of the event.
2. (a) Connection to the database fails and record is not upload.
Post Conditions:
Admin will give the exact date and time.
1.1.9 UC_AUTO _EMAIL_GENERATED
Brief Description:
As the result of some customer actions emails will be automatically generated
Primary Actors:
9. Deliverable 2 8
8 PUCIT | EM Planner
Customer
Stake Holders:
Application: Wants to generate the report of the event on the basis of given input.
Pre-Conditions: The admin is successfully login.
Basic Flow:
1. Upon registration either a “successful registration” or a “registration pending” email
will be sent to the registrant (what do with registrants who don't have emails?).An
approved pending registration will result in a notification email to the registrant.
2. A cancellation or change of information regarding an event will result in a notification
email to all registered users as well as all registration pending users.
3. A new registration or pending registration will result in an email being sent to the
Event
Alternate Flows:
2. (a) Application is unable to provide services due to server down.
(b) Information provided is invalid.
Post Conditions: The Email is generated successfully
10. Deliverable 2 9
9 PUCIT | EM Planner
1.2 High level use case diagram:
24. Deliverable 2 23
23 PUCIT | EM Planner
1.5.8 UC_LOGOUT_COLLABORATION
1.6 Operational Contracts
Name : placeOrder()
Responsibilities: Reservean Event
Cross References : Uc_1
Exceptions : None
Preconditions: Customer view the event description
Post Conditions : Order successfully placed
Name : viewServices()
25. Deliverable 2 24
24 PUCIT | EM Planner
Responsibilities:To provideservices information
Cross References : UC_4
Exceptions : None
Preconditions : conduciveenvironmentand necessary condition for successful
interaction are available.
Postconditions : Services should be reviewed by customer
Name : makeYourOwnMenu()
Responsibilities: To make order for an event according to customer choice
Cross References : Uc_1
Exceptions : None
Preconditions : Customer will choosethe products to make menu
PostConditions : Customizemenu successfully created.
Name : selectExistingPackages()
Responsibilities: Providecustomer with different packages.
Cross References : Uc_1
Exceptions : None
Preconditions : Customer will view the existing packages.
PostConditions : Customer will select packages according to his choice.
Name : orderPlaced()
Responsibilities: Placed the customer order successfully
Cross References : Uc_1
26. Deliverable 2 25
25 PUCIT | EM Planner
Exceptions : None
Preconditions : Customer view the event description
PostConditions : Order successfully placed.
Name : giveFeedback()
Responsibilities: Customer can give any feedback.
Cross References : Uc_1
Exceptions : None
Preconditions : Customer musthave an email address.
PostConditions : Feedback posted.
Name : Subscribe()
Responsibilities: Providesubscription facility for update information
Cross References : Uc_1
Exceptions : None
Preconditions : Customer should have an email address to subscribe.
PostConditions : Customer will receive confirmation email for subscription.
27. Deliverable 2 26
26 PUCIT | EM Planner
Name : makePayment()
Responsibilities: To handle customer payments
Cross Refrences: Uc_1
Exceptions : None
Preconditions : Customer should have to register for an event.
PostConditions : Paymentshould be in formof draftor cash.