This document describes a course project for a product and service design course. The project involves designing a wearable medical device called HomeAlone. HomeAlone measures vital signs and transmits the data through a Central Monitoring System (CMS) to physicians. The five-part project assignment has students: 1) sketch and describe their design idea; 2) identify stakeholders; 3) complete a system context diagram; 4) describe use cases; and 5) summarize requirements. Completing the project applies the design process skills learned in the course.
Welcome to my series of articles on Unified Modeling Language. This is "Session 8 – Package Diagram" of the series.
Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 1 – Introduction to UML" of the series. Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 5 – Composite Structure Diagram" of the series. Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 2 – Use Case UML" of the series. I have covered Use Case Scenario, Use Case Narrative and Use Case Model in this session.
Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 4 – Object Diagram" of the series.
Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 11 – Communication Diagram" of the series. Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 8 – Package Diagram" of the series.
Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 1 – Introduction to UML" of the series. Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 5 – Composite Structure Diagram" of the series. Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 2 – Use Case UML" of the series. I have covered Use Case Scenario, Use Case Narrative and Use Case Model in this session.
Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 4 – Object Diagram" of the series.
Please view my other documents where I have covered each UML diagram with examples
Welcome to my series of articles on Unified Modeling Language. This is "Session 11 – Communication Diagram" of the series. Please view my other documents where I have covered each UML diagram with examples
Thinking Outside The Little Black Box: Interaction Design in The Post-Mobile EraJonathan Stark
It will soon be economically feasible to put chips, sensors, actuators, and radios into a wide range of previously “dumb” everyday items. The resulting explosion of connected objects will have profound effects on art, culture, and design.
Decades of designing and developing for the distributed architecture of the web has uniquely positioned web professionals to thrive the connected future that is fast approaching.
Please join Jonathan for an eye-opening look at the challenges and opportunities that will be created for web professionals in the post-mobile computing era.
1. Likely winners —and losers— in the coming networked society
2. How to transition web skills to broader application space
3. What the web might look like in 3D virtual space
4. Approaches to designing front-ends for screenless devices
5. Implications of extending back-end code into physical space
Administrative InformationDate AssignedSaturday, March 30, 2.docxcoubroughcosta
Administrative Information
Date Assigned
Saturday, March 30, 2019
Date Due
Monday, April 7, at 11:59 pm.
Material covered
Lectures for Data Migration & Loading and Verification
Value of the Assignment
6% of the course grade, or 60 points out of 1000
Value of Each Question
The assignment is graded on a scale of 0-100%, and then that percentage is applied against the value of the assignment. So if you earn a 90% on this assignment, that = 90% of 60 = 54. If you earn 3 of the 8 extra points, you would now have a 93%. 93% of 60 = 55.8. See each question for its value.
Method of Submission
Download this assignment, enter your answers into the document, save it, and then upload the document to the Folio drop box. No other method will be accepted.
Part 1: Data Migration and Loading (aka Extraction, Transformation, and Loading)
This problem is worth 40% of the assignment.
An important element of the migration of data from an old system and loading it onto a new system is the all-important intermediate process of transformation. That’s why this is also known as Extraction, Transformation, and Loading, or ETL processes.
When data is transformed, it must be mapped from the old system to the new. Mapping answers the question, given data field X in the old system, what is its corresponding field Y in the new system? But before we even perform the mapping, we have to ensure that, as a minimum, data in the old system is in Third Normal Form (3NF). Otherwise, we will be introducing possible redundancies into the new system.
This problem requires you to take a set of data that is in 1NF, and transform it into 3NF. You will be given the initial table layout with sample data in an Excel spreadsheet. You may recreate the data in 3NF in the Excel spreadsheet, or on the following blank page using the Insert Table function. You do not have to provide 2NF version of the database, just provide the 3NF version, which must include all applicable tables, and, given the data provided to you, the data in the tables. So, when this entire assignment has been completed, if you choose to complete this problem in the Excel workbook, you will be submitting TWO files – this Word document, and the Excel document.
The problem itself deals with patients in a doctor’s office. Before you reduce it from 1NF all the way to 3NF, you will need to know the following dependencies, which are listed below:
In addition, you will need to know that:
· Each patient is a member of a household
· Each patient has been to the doctor for at least one “service”
Spring 2019, HW4
4
Dependencies given to you (see listing below for column [field] name meanings):
P-Nbr HH-Nbr, HHName, Street, City, State, Zip, Balance, P-Name
HH-Nbr HH-Name, Street, City, State, Zip, Balance
SvcCode Description, Fee
P-Nbr, SvcCode Date
Initial Patient Table column heading explanations used in the Excel version is below. Use the SAME column headings in your work, and the SAME data p.
BUA 3305 MIS Analysis and Design Summary Report Assi.docxShiraPrater50
BUA 3305: MIS Analysis and Design
Summary Report Assignments Guidelines and Rubric
Overview: Summary report assignments will be assigned in several modules throughout the course. The resources assigned for these
assignments are intended to provide thought-provoking, technology-relevant content that the textbook does not address. The textbook for this
course presents a general survey of timeless information about systems analysis and design, without specific concentration in any particular
technology area. The resources in these assignments will expose you to specific real-world technology-related concepts that are beyond the
scope of the text and are intended to connect basic system concepts to provocative theories, and in some cases, cutting-edge technologies.
Directions: For each summary report assignment, you will write a summary report analyzing the main arguments of the assigned article or video.
To complete this assignment, address the following critical elements in a written summary report:
● Summarize the article overall in the form of an abstract statement. This should be a succinctly written summary (two or three sentences)
to aid the reader in discerning the article or video’s purpose.
● Describe the main points (two to three paragraphs minimum)
● Explain whether you agree or disagree with any of the points made and why (two paragraphs minimum)
● Analyze the social or ethical issues involved from your vantage point
● Finally, list 10 nuggets of information you found interesting or did not know
Guidelines for Submission: Your summary report must be submitted as a two- to three-page Microsoft Word document plus a title page, with
double spacing, 12-point Times New Roman font, and one-inch margins. Resources outside of the assigned article are not required.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center.
Rubric
Criteria Exemplary (100%) Needs Improvement (75%) Not Evident (0%) Value
Summary
Summarizes the resource overall in the form
of an abstract statement.
Summarizes the resource overall in the form
of an abstract statement, but lacks in clarity.
Does not summarize the resource overall in
the form of an abstract statement.
15
Main Points Describes the speaker’s main points. Describes the speaker’s main points, but lacks
in detail or clarity.
Does not describe the speaker’s main points. 15
BUA 3305: MIS Analysis and Design
Evaluation of
Main Points
Explains agreement or disagreement with any
of the points made and why.
Explains agreement or disagreement with any
of the points made and why, but lacks in detail
or clarity.
Does not explain agreement or disagreement
with any of the points made and why.
20
Social or
Ethical Issues
Analyzes the social or ethical issues involved. Analyzes the social or ethical issues involved,
but lacks in detail or clarity.
Do ...
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
A Model of Local Area Network Based Application for Inter-office Communicationtheijes
In most organizations, information circulation within offices poses a problem because clerical officers and office messengers usually dispatch letters and memos from one office to another manually. Sequel to this circulation procedure, implementation of decisions is always difficult and slow. On one hand, clerical officers sometimes divulge confidential information during the process of receiving and sending of mails and other documents. On the other hand, money is wasted on the purchase of paper for printing. However, it is cheerful to learn that technology has made it possible for staff, structures and infrastructures to control and share organization resources; hardware; software and knowledge by means of modern electronic communication. One cannot deny the fact that the flow of information is very imperative in every organization as it determines the effectiveness of decision-making and implementation. This feat can be achieved using Object-Oriented System Analysis and Design Methodology (OSADM). This is structurally analyzed with Use Case Diagram (UCD), Class Diagram, Sequence Diagram, State Transition Diagram, and Activity Diagram. Moreover, the system is coded with Java 1.6 version, in a client-server network running on star topology in LAN environment. This is the concept of this paper. The system is designed to work in two parts – the control part that is installed on the server; and the messenger part that is installed in the clients. This research work integrates the utility and organization resources into a shared center for all users to have access to; and for free communication during office hours.
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docxjacksnathalie
Due 24 August (Friday, 11:59 p.m. EDT)
Use Module 1 and Book Chapters 1 – 3 (module at bottom/chapters attached)
SHOW ALL WORK OR NO CREDIT
1. (10 Points) Virtualization is a concept that has taken on major importance in the early twenty-first century. Explain what is meant by virtualization.
2. (10 Points) What is a protocol? What is a standard? Do all protocols have to be standards? Explain.
3. (10 Points) Protocols and standards are important features of networks. Why is this so?
4. (10 Points) What are the most important ideas, keywords, and phrases that are stated in the definition of a system?
5. (10 Points) Convert the following hexadecimal numbers to decimal: .
a) 4E
b) 3D7
c) 3D70
6. (10 Points) Add the following binary numbers:
a)
101101101
+ 10011011
b)
110111111
+ 110111111
c)
1101
1010
111
+ 101
7. (10 Points) Multiply the following binary numbers together:
a)
1101
× 101
b)
11011
× 1011
8. (10 Points) Perform the following binary divisions:
a) 1010001001 ÷ 110
b) 11000000000 ÷ 1011
9. (10 Points) Using the division method, convert the following decimal numbers to binary:
a.) 4098
b) 71269
10. (10 Points) Convert the following binary numbers directly to hexadecimal: .
a) 101101110111010
b) 1111111111110001
Module 1
1. Computer Systems
We start this section with a short discussion of why you should be studying software, hardware, and data concepts. You may ask:
· Why should we study the concepts of computer data, computer hardware, and computer software?
· What are the components of a digital computer system and how do they work together?
· How are information systems developed for computers?1.1 Why Study Computer Concepts?
The answer to this question is that the understanding of these concepts is at the very foundation of being both competent and successful in your segment of the field of computers.
Computer users will:
· be aware of system capabilities, strategies, and limitations
· better understand the commands that they use
· be able to make informed decisions about computer equipment and applications
· improve their ability to communicate with other computer professionals
Computer programmers will:
· be able to write better programs by using characteristics of the computer to make the programs more efficient
· understand why compiled languages such as COBOL, C++, or Java run faster than interpreted languages such as BASIC
System analysts will be able to:
· read and understand technical specifications
· determine the correct computer strategy for a particular application
· assist management in determining computer strategy
· determine when to replace older equipment
System administrators or managers will:
· maximize the efficiency of their computer systems
· know when additional resources are required for those systems
· understand how to specify and configure operating system parameters
· know how to set up file systems
· be able to manage system and user PC upgrades
Each of these computer pro ...
Thinking Outside The Little Black Box: Interaction Design in The Post-Mobile EraJonathan Stark
It will soon be economically feasible to put chips, sensors, actuators, and radios into a wide range of previously “dumb” everyday items. The resulting explosion of connected objects will have profound effects on art, culture, and design.
Decades of designing and developing for the distributed architecture of the web has uniquely positioned web professionals to thrive the connected future that is fast approaching.
Please join Jonathan for an eye-opening look at the challenges and opportunities that will be created for web professionals in the post-mobile computing era.
1. Likely winners —and losers— in the coming networked society
2. How to transition web skills to broader application space
3. What the web might look like in 3D virtual space
4. Approaches to designing front-ends for screenless devices
5. Implications of extending back-end code into physical space
Administrative InformationDate AssignedSaturday, March 30, 2.docxcoubroughcosta
Administrative Information
Date Assigned
Saturday, March 30, 2019
Date Due
Monday, April 7, at 11:59 pm.
Material covered
Lectures for Data Migration & Loading and Verification
Value of the Assignment
6% of the course grade, or 60 points out of 1000
Value of Each Question
The assignment is graded on a scale of 0-100%, and then that percentage is applied against the value of the assignment. So if you earn a 90% on this assignment, that = 90% of 60 = 54. If you earn 3 of the 8 extra points, you would now have a 93%. 93% of 60 = 55.8. See each question for its value.
Method of Submission
Download this assignment, enter your answers into the document, save it, and then upload the document to the Folio drop box. No other method will be accepted.
Part 1: Data Migration and Loading (aka Extraction, Transformation, and Loading)
This problem is worth 40% of the assignment.
An important element of the migration of data from an old system and loading it onto a new system is the all-important intermediate process of transformation. That’s why this is also known as Extraction, Transformation, and Loading, or ETL processes.
When data is transformed, it must be mapped from the old system to the new. Mapping answers the question, given data field X in the old system, what is its corresponding field Y in the new system? But before we even perform the mapping, we have to ensure that, as a minimum, data in the old system is in Third Normal Form (3NF). Otherwise, we will be introducing possible redundancies into the new system.
This problem requires you to take a set of data that is in 1NF, and transform it into 3NF. You will be given the initial table layout with sample data in an Excel spreadsheet. You may recreate the data in 3NF in the Excel spreadsheet, or on the following blank page using the Insert Table function. You do not have to provide 2NF version of the database, just provide the 3NF version, which must include all applicable tables, and, given the data provided to you, the data in the tables. So, when this entire assignment has been completed, if you choose to complete this problem in the Excel workbook, you will be submitting TWO files – this Word document, and the Excel document.
The problem itself deals with patients in a doctor’s office. Before you reduce it from 1NF all the way to 3NF, you will need to know the following dependencies, which are listed below:
In addition, you will need to know that:
· Each patient is a member of a household
· Each patient has been to the doctor for at least one “service”
Spring 2019, HW4
4
Dependencies given to you (see listing below for column [field] name meanings):
P-Nbr HH-Nbr, HHName, Street, City, State, Zip, Balance, P-Name
HH-Nbr HH-Name, Street, City, State, Zip, Balance
SvcCode Description, Fee
P-Nbr, SvcCode Date
Initial Patient Table column heading explanations used in the Excel version is below. Use the SAME column headings in your work, and the SAME data p.
BUA 3305 MIS Analysis and Design Summary Report Assi.docxShiraPrater50
BUA 3305: MIS Analysis and Design
Summary Report Assignments Guidelines and Rubric
Overview: Summary report assignments will be assigned in several modules throughout the course. The resources assigned for these
assignments are intended to provide thought-provoking, technology-relevant content that the textbook does not address. The textbook for this
course presents a general survey of timeless information about systems analysis and design, without specific concentration in any particular
technology area. The resources in these assignments will expose you to specific real-world technology-related concepts that are beyond the
scope of the text and are intended to connect basic system concepts to provocative theories, and in some cases, cutting-edge technologies.
Directions: For each summary report assignment, you will write a summary report analyzing the main arguments of the assigned article or video.
To complete this assignment, address the following critical elements in a written summary report:
● Summarize the article overall in the form of an abstract statement. This should be a succinctly written summary (two or three sentences)
to aid the reader in discerning the article or video’s purpose.
● Describe the main points (two to three paragraphs minimum)
● Explain whether you agree or disagree with any of the points made and why (two paragraphs minimum)
● Analyze the social or ethical issues involved from your vantage point
● Finally, list 10 nuggets of information you found interesting or did not know
Guidelines for Submission: Your summary report must be submitted as a two- to three-page Microsoft Word document plus a title page, with
double spacing, 12-point Times New Roman font, and one-inch margins. Resources outside of the assigned article are not required.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center.
Rubric
Criteria Exemplary (100%) Needs Improvement (75%) Not Evident (0%) Value
Summary
Summarizes the resource overall in the form
of an abstract statement.
Summarizes the resource overall in the form
of an abstract statement, but lacks in clarity.
Does not summarize the resource overall in
the form of an abstract statement.
15
Main Points Describes the speaker’s main points. Describes the speaker’s main points, but lacks
in detail or clarity.
Does not describe the speaker’s main points. 15
BUA 3305: MIS Analysis and Design
Evaluation of
Main Points
Explains agreement or disagreement with any
of the points made and why.
Explains agreement or disagreement with any
of the points made and why, but lacks in detail
or clarity.
Does not explain agreement or disagreement
with any of the points made and why.
20
Social or
Ethical Issues
Analyzes the social or ethical issues involved. Analyzes the social or ethical issues involved,
but lacks in detail or clarity.
Do ...
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
Dear students get fully solved assignments
Send your semester & Specialization name to our mail id :
“ help.mbaassignments@gmail.com ”
or
Call us at : 08263069601
(Prefer mailing. Call in emergency )
A Model of Local Area Network Based Application for Inter-office Communicationtheijes
In most organizations, information circulation within offices poses a problem because clerical officers and office messengers usually dispatch letters and memos from one office to another manually. Sequel to this circulation procedure, implementation of decisions is always difficult and slow. On one hand, clerical officers sometimes divulge confidential information during the process of receiving and sending of mails and other documents. On the other hand, money is wasted on the purchase of paper for printing. However, it is cheerful to learn that technology has made it possible for staff, structures and infrastructures to control and share organization resources; hardware; software and knowledge by means of modern electronic communication. One cannot deny the fact that the flow of information is very imperative in every organization as it determines the effectiveness of decision-making and implementation. This feat can be achieved using Object-Oriented System Analysis and Design Methodology (OSADM). This is structurally analyzed with Use Case Diagram (UCD), Class Diagram, Sequence Diagram, State Transition Diagram, and Activity Diagram. Moreover, the system is coded with Java 1.6 version, in a client-server network running on star topology in LAN environment. This is the concept of this paper. The system is designed to work in two parts – the control part that is installed on the server; and the messenger part that is installed in the clients. This research work integrates the utility and organization resources into a shared center for all users to have access to; and for free communication during office hours.
Due 24 August (Friday, 1159 p.m. EDT)Use Module 1 and Book Ch.docxjacksnathalie
Due 24 August (Friday, 11:59 p.m. EDT)
Use Module 1 and Book Chapters 1 – 3 (module at bottom/chapters attached)
SHOW ALL WORK OR NO CREDIT
1. (10 Points) Virtualization is a concept that has taken on major importance in the early twenty-first century. Explain what is meant by virtualization.
2. (10 Points) What is a protocol? What is a standard? Do all protocols have to be standards? Explain.
3. (10 Points) Protocols and standards are important features of networks. Why is this so?
4. (10 Points) What are the most important ideas, keywords, and phrases that are stated in the definition of a system?
5. (10 Points) Convert the following hexadecimal numbers to decimal: .
a) 4E
b) 3D7
c) 3D70
6. (10 Points) Add the following binary numbers:
a)
101101101
+ 10011011
b)
110111111
+ 110111111
c)
1101
1010
111
+ 101
7. (10 Points) Multiply the following binary numbers together:
a)
1101
× 101
b)
11011
× 1011
8. (10 Points) Perform the following binary divisions:
a) 1010001001 ÷ 110
b) 11000000000 ÷ 1011
9. (10 Points) Using the division method, convert the following decimal numbers to binary:
a.) 4098
b) 71269
10. (10 Points) Convert the following binary numbers directly to hexadecimal: .
a) 101101110111010
b) 1111111111110001
Module 1
1. Computer Systems
We start this section with a short discussion of why you should be studying software, hardware, and data concepts. You may ask:
· Why should we study the concepts of computer data, computer hardware, and computer software?
· What are the components of a digital computer system and how do they work together?
· How are information systems developed for computers?1.1 Why Study Computer Concepts?
The answer to this question is that the understanding of these concepts is at the very foundation of being both competent and successful in your segment of the field of computers.
Computer users will:
· be aware of system capabilities, strategies, and limitations
· better understand the commands that they use
· be able to make informed decisions about computer equipment and applications
· improve their ability to communicate with other computer professionals
Computer programmers will:
· be able to write better programs by using characteristics of the computer to make the programs more efficient
· understand why compiled languages such as COBOL, C++, or Java run faster than interpreted languages such as BASIC
System analysts will be able to:
· read and understand technical specifications
· determine the correct computer strategy for a particular application
· assist management in determining computer strategy
· determine when to replace older equipment
System administrators or managers will:
· maximize the efficiency of their computer systems
· know when additional resources are required for those systems
· understand how to specify and configure operating system parameters
· know how to set up file systems
· be able to manage system and user PC upgrades
Each of these computer pro ...
1. CESY501: Getting Started on Product and Service Design
1
Copyright 2011, eCornell. All rights reserved.
CESY501
Getting Started on Product and Service
Design
Submitted By: Kanishk Srivastava
2. CESY501: Getting Started on Product and Service Design
2
Copyright 2011, eCornell. All rights reserved.
CESY501
Getting Started on Product and Service Design
Course Project
The course project is designed to give you practical experience applying the tools and
skills the course provides. Completion of the project is a requirement for the course. It is
also an excellent way to build a detailed set of notes about how to initiate the design
process.
Your initial work on the course project involves sketching your design idea and
identifying stakeholders relevant to your design project. In addition, you use a tool
presented in the course to define the system-design context. Later, the course project
invites you to analyze use-cases regarding how the product or service will be used and
derive requirements from them. As a final step, you summarize the requirements.
The five parts of this course project are laid out sequentially. Please complete one part
of the project before proceeding to the next. Please do not submit your project for
review until you have completed Part Five.
3. CESY501: Getting Started on Product and Service Design
3
Copyright 2011, eCornell. All rights reserved.
Part One
Make Your Own Sketch
1. Create an annotated product sketch to illustrate the product or service idea you have
chosen. To record your sketch so that it can be submitted to your instructor, you may
do any of the following:
Create the sketch on paper and scan it
Create the sketch using a drawing or paint program
Create the sketch using clip art with the software of your choice
Make sure your sketch includes a title and whatever annotations it may need.
Otherwise, the only requirement for the sketch is that its composition be uniquely
yours and that it adequately conveys your intention. Copy and paste the file into this
document.
Insert sketch:
4. CESY501: Getting Started on Product and Service Design
4
Copyright 2011, eCornell. All rights reserved.
5. CESY501: Getting Started on Product and Service Design
5
Copyright 2011, eCornell. All rights reserved.
2. Describe your product or service idea. Do not write informally: use complete
sentences. When you submit all five parts of your completed project at the end of the
course, your instructor will compare your concept sketch to your written description
of it.
HomeAlone is a wearable device, which helps patients and physicians to track vital
signs like Blood Pressure, Heart Rate, Body temperature, etc. in addition to being a
watch. This device along with a CMS (Central Monitoring System), stores all the data
supplied from the HomeAlone device. The hard drive in the CMS helps storing large
amount of data and seamlessly transmits it to the main server where physicians can log
into the HomeAlone application and monitor the patients’ vitals. CMS is connected with
a Phone Line which enables the HomeAlone device to also act as a phone. Whenever
there is an anomaly noticed in the vitals of the patients, a distress signal is sent to the
“BA Biotech Unit” where a customer service representative speaks directly to the
patients about the health. If the patient is not able to communicate about their health,
the unit will send the message for sending an Ambulance at the patient’s home. The
data is automatically transmitted from HomeAlone Device to CMS at a regular interval of
five minutes. This is the industry setting and can be reduced to a minimum of a minute
by the user. However the device restricts the user go over the 5 minute. HomeAlone
device will be powered by Lithium coin cells and CMS will be powered by the power
socket. It also has a backup battery of 9V which will last the device for 6 hours in case
of power failure. CMS also has USB ports to manually retrieve the data.
Remember to save your work for this part before going further in the course. You will
encounter part 2 of the course project at the end of the next topic, "Your Stakeholders
and Your Mission".
6. CESY501: Getting Started on Product and Service Design
6
Copyright 2011, eCornell. All rights reserved.
Part Two
Name the Stakeholders
Before you begin work on this part of your course project, be sure you have completed
the topic, "Your Stakeholders and Your Mission". Please answer the following
questions:
1. Who is the owner of your design project?
BA Biotech Inc.
2. Who is the customer of your design project?
Hospitals
Physcians
Healthcare Insurance Companies
Family of patients
Patients
3. Who is the user of your design project?
Patients
Identify these individuals using the guidelines presented in this course topic. In some
cases, more than one individual may fill a particular role. If there is some ambiguity,
indicate how you might simplify your consideration of stakeholders and roles.
When you have completed this assignment, remember to save your work. You will
encounter part 3 of the course project at the end of the next topic, "Boundary and
Context".
7. CESY501: Getting Started on Product and Service Design
7
Copyright 2011, eCornell. All rights reserved.
Part Three
Complete the Matrix
Before you begin work on this part of your course project, be sure you have finished the topic, "Boundary and Context".
1. Fill in the name of the system, either HomeAlone or Internet Meal Service, at the top of the matrix.
2. Fill in the names of three to five important entities in the appropriate cells in the top row. You may list the internal
entities of the system individually if you wish, or list them together as "system." If you list them individually, be sure to
group them so you are able to draw the system boundary around them.
3. Fill in the names of the three to five important entities in the left-most column, going down. Be sure to use exactly the
same entities in the same order you chose in step 2.
4. Draw a thick boundary around the cells of the matrix that represent the total group of the system entities. You may find
that this boundary includes just one cell of the table or several. Use cell shading or border formatting to clearly
indicate the cells of the matrix that represent the total group of the system entities.
5. Populate the matrix with phrases that specify the relationships between the entities. For example, to specify the
relationship of entity 1 to entity 2, fill in the cell in row 2 column 3.
Notes for Filling in the Matrix
It is not necessary to specify the relationships of entities with themselves. For example, it isn't necessary to fill in row 2
column 2, because this cell would contain the relationship of entity 1 with itself.
The contents of the cells in any column X should match the contents of its counterpart, row X. For example, the
contents of row 2 should match the contents of column 2, because they both represent the relationships of entity 1.
Note: You will return to complete this matrix in part 4.
8. CESY501: Getting Started on Product and Service Design
8
Copyright 2011, eCornell. All rights reserved.
HomeAlone
Watch
CMS Storage Touchscreen
Display
Special Metal
Patients Watch and Vital
Signal
measuring
device
GUI & User
Interaction
Measures vitals
Lithium Cell Power Source
Transmitters Transmit Signal
between devices
Transmit Signal
between devices
9V battery Auxiliary power
source
USB Manual Data
Transfer
Phone
Connects
BA Biotech Call
and Dispatch
Unit
Connects to
Customer
Service Rep
through CDMA
technology
Connects to
Customer
Service Rep
through CDMA
technology
9. CESY501: Getting Started on Product and Service Design
9
Copyright 2011, eCornell. All rights reserved.
Touchscreen Display
HomeAlone Watch CMS Storage
Special Metal
Measures Vitals
Sends Vitals data for storage
Patients
GUI &
User Interaction
Lithium Cell
Power source
Transmitters
Transmit Signals
Transmit Signals
9V battery
Auxiliary
Power Source
Phone
BA Biotech Call and
Dispatch Unit
Connects Connects
Connects to Customer
Service Rep through CDMA
HomeAlone Context Diagram
Watch & vital signals
measuring device
USB
Manual Data
Transfer
Measure
Vitals Data
Display
Data
10. CESY501: Getting Started on Product and Service Design
10
Copyright 2011, eCornell. All rights reserved.
Part Four
Describe the Behavior and Expand the Context
Use the tables below to complete Part Four.
1. Identify one primary use-case for your design project.
2. Complete two use-case behavior tables (below) detailing two behaviors for that use-case, specifying the initial
condition of the system for each.
3. Return to the completed context matrix from Part Three of the course project and expand it, using entities you
discovered from the use-case behaviors described in the first part of this assignment.
When you have finished this assignment, please save your work to a convenient location on your computer where you
can easily find it again. You will revisit this document later in the course.
11. CESY501: Getting Started on Product and Service Design
11
Copyright 2011, eCornell. All rights reserved.
Part Four—Use Case 1 [Patient measures vitals – Data Save Successful]
Initial Conditions
1. The system is in Watch mode
2.
Behavior Thread
Operator (Patient) System (HomeAlone Watch) CMS Storage device
The patient shall push “Measure”
on touchscreen
The System shall switch to Vital
Sign Mode
The System shall begin measuring
vital signs
The system shall display vital sign
measurements on the display
The patient shall review data
The patient shall click “Save”
The system shall transmit the data
Vital Data received from
the system
The System shall Display “Save
Successful”
The patient shall switch to “Watch
mode”
Ending Conditions
1. The system is in Watch mode
2.
12. CESY501: Getting Started on Product and Service Design
12
Copyright 2011, eCornell. All rights reserved.
Notes
1. Assuming CMS is powered on
2.
Part Four—Use Case 2 [Patient measures vitals- Data Save Error received]
Initial Conditions
1. The system is in Watch mode
2.
Behavior Thread
Operator (Patient) System (HomeAlone Watch) CMS storage device
The patient shall push “Measure”
on touchscreen
The System shall switch Vital Sign
Mode
The System shall begin measuring
vital signs
The system shall display vital sign
measurements on the display
The patient shall review data
The patient shall click “Save”
The system shall transmit the data
Vital Data not received
The System shall display “Save
Error”
The patient shall check CMS
storage device.
13. CESY501: Getting Started on Product and Service Design
13
Copyright 2011, eCornell. All rights reserved.
Ending Conditions
1. The Data not saved.
2. The system is in Watch mode.
Notes
1. Assuming CMS storage device is not powered on.
2. Assuming CMS storage device back-up battery is not present.
3. Assuming CMS storage is not functioning properly.
Part Five
Define Functional Requirements
Before you begin work on this part of your course project, be sure you have finished the topic, "Summarize and Finalize
Requirements."
Step 1: List and Summarize the Functional Requirements
1. List your detailed requirements in the "Source" column of the table below. Add rows as needed.
2. Once you've created your list, identify possible groupings of two or more detailed requirements that you could
summarize to create a single more general abstract requirement. For each grouping, develop a summarized
requirement that conforms to the guidelines presented in this course. You may use more or fewer groupings than
appear in the table below.
14. CESY501: Getting Started on Product and Service Design
14
Copyright 2011, eCornell. All rights reserved.
3. In the table below called Originating Requirements, create a single list consisting of:
Source
ThesystemshallswitchtoVitalSign
Mode
Thesystemshallmeasure
vitalsigns
Thesystemshalldisplayvital
signmeasurementson
touchscreen
Thesystemshalltransmit
thedata
Thesystemshall
display"Save
Successful"and
"SaveError"
TheSystemshallswitchto
VitalSignMode
TheSystemshallswitchtoVitalSign
Mode
TheSystemshallbegin
measuringvitalsigns
Thesystemshalldisplayvital
signmeasurementsonthe
display
Thesystemshalltransmit
thedata
TheSystemshall
Display“Save
Successful”
TheSystemshallbegin
measuringvitalsigns
TheSystemshall
display“SaveError”
Thesystemshalldisplayvital
signmeasurementsonthe
display
Thesystemshalltransmit
thedata
TheSystemshallDisplay
“SaveSuccessful”
TheSystemshalldisplay
“SaveError”
15. CESY501: Getting Started on Product and Service Design
15
Copyright 2011, eCornell. All rights reserved.
Summarized requirements
Detailed requirements that did not require summarization
This list contains the functional requirements for your system.
Originating Requirements
The system shall switch to Vital Sign Mode.
The system shall measure vital signs.
The system shall display vital sign measurements on touchscreen.
The system shall transmit the data.
The system shall display "Save Successful" and "Save Error".
16. CESY501: Getting Started on Product and Service Design
16
Copyright 2011, eCornell. All rights reserved.
Step 2: Finalize the Functional Requirements
4. Review your list of functional requirements.
Are you aware of any issues that you should resolve?
Do any of your requirements need to be clarified or revised in any way?
In the space below, please enter the criteria you used to evaluate your requirements, and make a note of any revisions
you made at this stage.
1. The system shall switch to Vital Sign Mode – This is a separate screen from the watch screen. The digital watch mode will
switch to the vital sign mode and all the vital measurements will be displayed on the watch.
2. The system shall transmit the data – There will be an icon on the watch screen which will display if the HomeAlone Watch
is connected to the CMS storage device, similar to the Bluetooth icon.
When you have finished with this document, save it with the name
CESYS501_XYZ replacing XYZ with your initials.
Return to the course and use the directions to submit the project to
your instructor for review.