A Software Engineering Project on Cyber cafe managementsvrohith 9
Cyber Café Management is a complete package developed for management of systems in a cyber café. This project is intended to be used in a Cyber Café. All cyber cafes have some basic needs likeable to control the systems that are being rented to the customers and are charged on timely basis.
The present project presented in:-
1. Use case diagram
2. Sequence diagram
3. Activity diagram
4. Class diagram
This project is based on online Attendance System for the college and School Attendance managing purpose. And it is also a major project for cs b.tech final year.
Ignou MCA 4th semester mini project report. College admission system. This project is based on real working system of University seat allocation to affiliate colleges. College admission system provide seat allocation process for various UG PG programs for every academic session.
A Software Engineering Project on Cyber cafe managementsvrohith 9
Cyber Café Management is a complete package developed for management of systems in a cyber café. This project is intended to be used in a Cyber Café. All cyber cafes have some basic needs likeable to control the systems that are being rented to the customers and are charged on timely basis.
The present project presented in:-
1. Use case diagram
2. Sequence diagram
3. Activity diagram
4. Class diagram
This project is based on online Attendance System for the college and School Attendance managing purpose. And it is also a major project for cs b.tech final year.
Ignou MCA 4th semester mini project report. College admission system. This project is based on real working system of University seat allocation to affiliate colleges. College admission system provide seat allocation process for various UG PG programs for every academic session.
This program is designed for the use of LibraryManagement System and its functioning Main Objective of this project to facilitate the transactions through use of electronic medium. We use java netbeans 6.5.1 software and Mysql to programming our project.
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriSyed Ubaid Ali Jafri
Final year project ideas and Aims related to computer science students, Students can get an idea and make their final year project belongs to the industry requirement.
An online quiz system project in java for cse student. This is the complete documentation of the project. This project can be presented as minor project for b.tech student.
Android Project report on City Tourist Location based services (Shuja ul hassan)Shuja Hassan
The aim to design and develop this project is to produce a
tourist guide for Skardu city, which can eefficiently guides the
tourist who visits Skardu. The Android tourist guide can be use in place of professional guide due to many reasons like reduce cost of guide, get more accurate information needed for decision making, giving weather and social networking services.The tourists can use this guide for different purposes like searching a location , calculate distance between two locations,getting basic textual information, pictorial information of location which normally we could not get in default Google maps.The guide uses Google Map API, global
positioning system( GPS), Internet and cellular data to provide
its services.
Shuja ul Hassan
IT Teacher
Android Developer
shuja2good@gmail.com
Web Vulnerability Scanner project ReportVikas Kumar
Online Web Scanner And Admin Finder is a web application vulnerability scanner. It is a web application written in PHP/MYSQL and can be used to test remote, or local, web applications for security vulnerabilities.
The purpose of developing attendance
management system is to computerized the tradition way of
taking attendance. Another purpose for developing this
software is to generate the report automatically at the end of
the session or in the between of the session
This program is designed for the use of LibraryManagement System and its functioning Main Objective of this project to facilitate the transactions through use of electronic medium. We use java netbeans 6.5.1 software and Mysql to programming our project.
Final Year Projects (Computer Science 2013) - Syed Ubaid Ali JafriSyed Ubaid Ali Jafri
Final year project ideas and Aims related to computer science students, Students can get an idea and make their final year project belongs to the industry requirement.
An online quiz system project in java for cse student. This is the complete documentation of the project. This project can be presented as minor project for b.tech student.
Android Project report on City Tourist Location based services (Shuja ul hassan)Shuja Hassan
The aim to design and develop this project is to produce a
tourist guide for Skardu city, which can eefficiently guides the
tourist who visits Skardu. The Android tourist guide can be use in place of professional guide due to many reasons like reduce cost of guide, get more accurate information needed for decision making, giving weather and social networking services.The tourists can use this guide for different purposes like searching a location , calculate distance between two locations,getting basic textual information, pictorial information of location which normally we could not get in default Google maps.The guide uses Google Map API, global
positioning system( GPS), Internet and cellular data to provide
its services.
Shuja ul Hassan
IT Teacher
Android Developer
shuja2good@gmail.com
Web Vulnerability Scanner project ReportVikas Kumar
Online Web Scanner And Admin Finder is a web application vulnerability scanner. It is a web application written in PHP/MYSQL and can be used to test remote, or local, web applications for security vulnerabilities.
The purpose of developing attendance
management system is to computerized the tradition way of
taking attendance. Another purpose for developing this
software is to generate the report automatically at the end of
the session or in the between of the session
Deploying Deep Learning Algorithm On AWS Cloud Platform.pdfLaveshLalwani1
Deploying deep learning algorithms on hardware platforms is difficult as it requires
lots of computational power, it becomes tedious, expensive, and contains very few
options for remote access. An organized cloud architecture can mitigate these
factors and provide a cost-effective, automatically scalable (up or down), and
elastic real-time on-demand AI solution. In this project, we propose an architecture
that consists of cloud services that help us to host the deep learning algorithm
and get the output predictions in real-time. These predictions are based on human
activity and are displayed on the website. The website is used to feed input videos
to the model; the website is also deployed on the cloud platform to increase the
overall performance, security, cost-effectiveness and provides easy maintenance.
This document is the Software Requirements Specification (SRS) for the Library Circulation
System (LCS). It contains detailed functional, non-functional, and support requirements and
establishes a requirements baseline for development of the system. The requirements
contained in the SRS are independent, uniquely numbered, and organized by topic. The SRS
serves as the official means of communicating user requirements to the developer and
provides a common reference point for both the developer team and stakeholder
community.
Software Requirements Specification on Student Information System (SRS on SIS)Minhas Kamal
Complete Software Requirements Specification (SRS) on a software project Student Information System (SIS). Chapters- Inception, Elicitation, Scenario-Based Model, Data Model, Class-Based Model, Flow-Oriented Model and Behavioral Model.
Created in 2nd year of Bachelor of Science in Software Engineering (BSSE) course at Institute of Information Technology, University of Dhaka (IIT, DU).
LPG Booking System [ bookmylpg.com ] ReportNandu B Rajan
BOOK LPG FROM ANYWHERE (Mini Project 2016)
During today’s busy life, no one is ready to waste the time by doing the time consuming and hassle refill booking like IVR Booking System. We are proposing a simple, interactive, hassle free, less time consuming and efficient LPG Booking System. This is beneficial for the Gas Agencies also, they get the refill booking requests and consumer details instantly. Our system is futuristic and can be updated according to the future needs easily.
Features:-
To book an LPG cylinder, you should be a authorised customer. An authorised customer can register to the website and get user id and password. After you have registered, you can log on to the LPG portal using the password and user id provided to you.
Pros:-
Consumers can book the refill by just one click, they can post queries or complaints. Needs only username and password. If they don’t have one, the valid consumers can get the username and passwords with simple registration process. The Admin can only access the database, only he can add the consumers and staff. So the system is secured. The authorized staff can see the bookings and the consumer details without any hassle. He can mark the status whether the refill delivered or not. If delivered then refill request will be automatically cleared.
full project report on online examination management system , Project contains quiz type questions answer type platform where a user can examine himself.
Similar to Software Requirement Analysis and Specification (SRS) of Automated Cyber Cafe System in Dhaka University Central Library. (20)
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2. AUTOMATED CYBER CAFE SYSTEM
SOFTWARE PROJECT LAB-II
COURSE CODE: SE 505
Submitted to
Emon Kumar Dey
Course Instructor of SE-505
Submitted by
Supervisor
Alim Ul Gias
Lecturer
Institute of Information Technology,
University of Dhaka
Date of Submission
05 April, 2015
Name Roll
Md. Rakib Hossain BSSE 0516
A. H. M Azimul Haque BSSE 0519
Mobashir Sadat BSSE 0507
3. Letter of Transmittal
Emon Kumar Dey
Lecturer,
Institute of Information Technology,
University of Dhaka
05 April 2015
Honorable Sir,
We have prepared the enclosed report on Software Requirements Specification of Automated
Cyber Cafe System for your approval. This report details the requirements we gathered for the
project.
The primary purpose of this document is creating SRS report for the project we are doing for our
software project lab-II. This report includes the details of each steps we followed to collect the
requirements.
Sincerely Yours,
Md Rakib Hossain
Mobashir Sadat
A.H.M Azimul Haque
4. Acknowledgement
As it is a complete project for us, we have completed our SRS part properly by the grace of
ALMIGHTY ALLAH.
Our grateful thanks to our supervisor Alim Ul Gias Sir who in spite of being busy with his duties
took time out to hear, guide and help us with his valuable information and knowledge to
complete this SRS report. Our honorable course coordinator Emon Kumar Dey Sir also has a
great contribution to complete this SRS report.
5. Executive Summary
The purpose of the SRS (Software Requirements Specification) document is to provide the
whole process and overall description of the Automated Cyber Cafe system of Center Library of
University of Dhaka. In this document the requirements of this software are specified. In
addition, the purpose of this software is to ease and automate the tasks carried out by the people
related with Cyber Cafe system automated operations. Specific design and software requirements
specifications are provided here for the system development.
6. Page | 1
Automated Cyber Cafe System
Tables of Contents
Chapter1 ..........................................................................7
Introduction to Automated Cyber Cafe System.....................................7
1.1 Purpose...........................................................................................................7
1.2 Overview........................................................................................................7
1.3 Conclusion .....................................................................................................8
Chapter 2 .........................................................................9
Inception of Automated Cyber Cafe System..........................................9
2.1 Introduction....................................................................................................9
2.2 Planning meeting ...........................................................................................9
2.3 Identifying Stakeholders................................................................................9
2.4 Our questions to the stakeholders................................................................10
2.5 Recognizing multiple viewpoints................................................................10
2.5.1 System Administrator Viewpoints............................................................................ 10
2.5.2 Regular Administrator Viewpoints........................................................................... 10
2.5.3. Student/User Viewpoints ......................................................................................... 11
2.6 Working towards collaboration ...................................................................11
2.7 Conclusion ...................................................................................................11
Chapter3 ........................................................................14
Elicitation of Automated Cyber Cafe System......................................14
3.1 Introduction..................................................................................................14
3.2 Eliciting Requirements of Automated Cyber Cafe System.........................14
3.2.1 Collaborative Requirements Gathering ....................................................14
(a) Problems of the scope................................................................................................... 15
(b) Problems of the understanding..................................................................................... 15
(c) Problems of the volatility ............................................................................................. 15
7. Page | 2
Automated Cyber Cafe System
(d)Requirement elicitation through interview.................................................................... 16
(e)Requirement elicitation through questioning: ............................................................... 16
(f)Questionnaire for the project ......................................................................................... 16
(g)Existing Resource:......................................................................................................... 17
(h)Observation: .................................................................................................................. 18
3.2.2 Quality Function Development ................................................................18
(a)Normal Requirements:................................................................................................... 18
(b)Expected Requirements:................................................................................................ 18
(c)Exciting Requirements: ................................................................................................. 18
3.2.3 Usage Scenario: ........................................................................................19
3.3 Conclusion:..................................................................................................22
Chapter 4 .......................................................................23
Scenario-based modeling of Automated Cyber Cafe System..............23
4.1 Introduction..................................................................................................23
4.2 Use case diagrams and scenario ..................................................................24
4.3 Conclusion ...................................................................................................81
Chapter 5 .......................................................................82
Data Model of Automated Cyber Cafe System....................................82
5.1 Data Modeling Concept...............................................................................82
5.2 Data Identification and Define Attributes for each Data.............................83
5.3 Create Data Relationship Diagram..............................................................85
5.4 Entity Relationship(ER) Diagram and Schema Diagram............................87
5.5 Conclusion ...................................................................................................90
Chapter 6 .......................................................................91
Class-based model of Automated Cyber Cafe System ........................91
6.1 Class Based Modeling Concept...................................................................91
6.2 Identifying Analysis Classes .......................................................................91
8. Page | 3
Automated Cyber Cafe System
6.3 Specifying Attributes...................................................................................95
6.4 Defining Operations.....................................................................................96
6.5 Class Diagram for Automated Cyber Cafe System.....................................97
6.6 Class-responsibility-collaboration card.....................................................100
6.7 Conclusion .................................................................................................102
Chapter 7 .....................................................................103
Data Flow Model of Automated Cyber Cafe System ........................103
7.1. Introduction...............................................................................................103
7.2. Data Flow Diagram (DFD).......................................................................103
7.3 Conclusion .................................................................................................106
Chapter 8 .....................................................................107
Behavioral Model of Automated Cyber Cafe System .......................107
8.1. Introduction...............................................................................................107
8.2. Identifying Events with the Use Case ......................................................107
8.3. State diagram for analysis classes ............................................................108
8.4. Sequence diagram.....................................................................................116
8.5 Conclusion .................................................................................................124
Chapter 9 .....................................................................125
Conclusion ..........................................................................................125
Chapter 10 ...................................................................126
Appendix and References...................................................................126
10.1 Questionnaires .........................................................................................126
10.2 References................................................................................................130
9. Page | 4
Automated Cyber Cafe System
All Figures and Tables List
Table 4(a) Use Case Scenario................................................................................24
Fig: Use case (a): Automated Cyber Cafe System (level 0)................................25
Fig: Use case (b): Automated Cyber Cafe System (level 1) ...............................26
Fig: Use case (c): Authentication (level 1.1) ........................................................27
Use Case Description (a): Log in ..........................................................................28
Fig: Activity diagram (a): Log in (level 1.1.1).....................................................29
Use Case Description Table (b): Log Out............................................................31
Fig: Activity diagram (b): Log out (level 1.1.2)...................................................32
Fig: Swimlane diagram (b): Log Out (level 1.1.2) ..............................................33
Fig: Use case (d): Update Admin Account (level 1.2).........................................34
Use Case Description Table (c): Edit Account....................................................35
Fig: Activity diagram (b): Edit Account (level 1.2.1) .........................................36
Fig: Swimlane diagram (c): Edit Account (level 1.2.1).......................................37
Use Case Description Table (d): Recover Password...........................................38
Fig: Activity diagram (d): Recover Password (level 1.2.2) ................................39
Fig: Swimlane diagram (d): Recover Password (level 1.2.2) .............................40
Use Case Description Table (e): Generate Cards ...............................................41
Fig: Activity diagram (e): Generate Cards (level 1.3)........................................42
Fig: Swimlane diagram (e): Generate Cards (level 1.3).....................................43
Use Case Description Table (f): Register User....................................................44
Fig: Activity diagram (f): Register User (level 1.4) ............................................45
Fig: Swimlane diagram (f): Register User (level 1.4) .........................................46
Fig: Use case (e): User Functionality in PC (level 1.5) .......................................47
Use Case Description Table (g): Enter Card Info...............................................48
Fig: Activity diagram (g): Enter Card Info (level 1.5.1) ....................................49
Fig: Swimlane diagram (g): Enter Card Info (level 1.5.1).................................50
Use Case Description Table (h): View Card Usage ............................................51
Fig: Activity diagram (h): View Card Usage (level 1.5.2)..................................52
Fig: Swimlane diagram (h): View Card Usage (level 1.5.2)...............................53
Use Case Description Table (i): Exit from System .............................................54
Fig: Activity diagram (i): Exit from System (level 1.5.3)...................................55
Fig: Swimlane diagram (i): Exit from System (level 1.5.3)................................56
Fig: Use case (f): System Activity in User PC (level 1.6)....................................57
10. Page | 5
Automated Cyber Cafe System
Use Case Description Table (j): System Activity in User PC ............................58
Fig: Activity diagram (j): System Activity in User Pc (level 1.6) ......................59
Fig: Swimlane diagram (j): System Activity in User Pc (level 1.6) ...................60
Fig: Use case (g): Update User Information (level 1.7) ......................................61
Use Case Description Table (k): Search User .....................................................62
Fig: Activity diagram (k): Search User (level 1.7.1)...........................................63
Fig: Swimlane diagram (k): Search User (level 1.7.1)........................................64
Use Case Description Table (l): Update Info.......................................................65
Fig: Activity diagram (l): Update Info (level 1.7.2) ............................................66
Fig: Swimlane diagram (l): Update Info (level 1.7.2) .........................................67
Use Case Description Table (m): Monthly Balance Sheet .................................68
Fig: Activity diagram (m): Monthly Balance Sheet (level 1.8)..........................69
Fig: Swimlane diagram (m): Monthly Balance Sheet (level 1.8).......................70
Fig: Use case (h) View History (level 1.9) ............................................................71
Use Case Description Table (n): View Active User.............................................72
Fig: Activity diagram (n): View active User (level 1.9.1)...................................73
Fig: Swimlane diagram (n): View active User (level 1.9.1)................................74
Use Case Description Table (o): View Particular Card Usage..........................75
Fig: Activity diagram (o): View Particular Card Usage (level 1.9.2)................76
Fig: Swimlane diagram (o): View Particular Card Usage (level 1.9.2) ............77
Use Case Description Table (p): View History....................................................78
Fig: Activity diagram (p): View History (level 1.9.3) .........................................79
Fig: Swimlane diagram (p): View History (level 1.9.3) ......................................80
Table 5(a): Data Object identification .................................................................84
Fig 5(a): Data Relationship Diagram...................................................................86
Fig 5(b): Schema Diagram ....................................................................................88
Fig 5(c): Schema relation diagram.......................................................................89
Table 6 (a): Potential Class identification table..................................................94
Table 6(b): Specifying Attributes. ........................................................................95
Table 6(c): Defining Operation.............................................................................96
Fig 6(a): Class diagram .........................................................................................98
Fig 6(b): Class Responsibility Collaboration Card...........................................102
Fig 7(b): data-flow diagram (level 1)..................................................................104
Fig 7(c): data-flow diagram (level 2)..................................................................104
11. Page | 6
Automated Cyber Cafe System
Fig 7(d): data-flow diagram (level 3)..................................................................105
Fig 7(e): data-flow diagram (level 4)..................................................................106
Table 8(a): Events identification table...............................................................108
Fig: State transition diagram (a): System Admin.............................................109
Fig: State transition diagram (b): Regular Admin...........................................110
Fig: State transition diagram (c): Student.........................................................111
Fig: State transition diagram (d): Card Generator..........................................112
Fig: State transition diagram (e): Balance Sheet Generator ...........................113
Fig: State transition diagram (f): Particular card usage .................................114
Fig: State transition diagram (f): History..........................................................114
Fig: State transition diagram (g): Active Card Usage......................................115
Fig: Sequence diagram (a): System Admin Generates Cards .........................116
Fig: Sequence diagram (b): Admins Register Student.....................................117
Fig: Sequence diagram (c): Admins updates student information .................118
Fig: Sequence diagram (d): Student views card usage.....................................119
Fig: Sequence diagram (e): System Admin generates balance sheet..............120
Fig: Sequence diagram (f): System automatically exits students from the
system..............................................................................................................121
Fig: Sequence diagram (g): Admin views particular card usage ....................122
Fig: Sequence diagram (h): Admin views card usage history .........................123
12. Page | 7
Automated Cyber Cafe System
Chapter1
Introduction to Automated Cyber Cafe System
An automated cyber cafe system is proposed for the Cyber Center, University of Dhaka located
beside the Central Library, University of Dhaka. The Cyber Center serves the students of
University of Dhaka by providing internet and computing facilities. To provide and avail these
facilities both the authority of DU Cyber Center and the students have to follow some predefined
processes. These processes are maintained by the administrators of DU Cyber Center .The
purpose of this automated cyber cafe system is to make all the manual functionality fully
automated .The sections below give overview of everything included in this SRS document, also,
the purpose of this document is described here.
1.1 Purpose
The document is about the Software Requirements Specification (SRS) for the Automated Cyber
Cafe System (ACCS). The purpose of this document is to give a detailed description of the
requirements for the Automated Cyber Cafe System (ACCS). This software requirements
specification document enlists all necessary requirements that are required for the project
development. To derive the requirements we need to have clear and thorough understanding of
the system to be developed. This has been prepared after detailed communications with the
project team and stakeholders.
It includes a set of use cases that describe interactions the users will have with the software. It
will also explain the system constraints, interface and interactions between the software and the
users.
1.2 Overview
The remainder of this document includes nine chapters and appendices.
The second and third chapters introduce different types of stakeholders and their
interaction to the system. The chapters also provide the requirements specification in
detail and provide a description of the different system interfaces.
The fourth one provides an overview of the system functionality and system interaction
with other systems based on the scenario of the Automated Cyber Cafe System (ACCS).
13. Page | 8
Automated Cyber Cafe System
The fifth and sixth chapters show the interaction of data within the system using various
functionalities. Different specification techniques are used in order to specify the
requirements more precisely for different audiences.
The seventh chapter shows the continuous flow of data within the system.
The eighth chapter describes the behavior of the software.
Conclusion is in the ninth chapter.
The Appendices at the end of the document include the necessary tools we have needed
to develop the SRS of the Automated Cyber Cafe System (ACCS).
1.3 Conclusion
In this document we have discussed our project overview including project purpose. In next
chapter, we discuss about inception of the project.
14. Page | 9
Automated Cyber Cafe System
Chapter 2
Inception of Automated Cyber Cafe System
2.1 Introduction
Inception is the beginning phase of requirements engineering. This phase helps to get orientation
and to make a first draft about the project planning.
The inception phase is not responsible to describe the requirements completely in detail. It
defines how the Automated Cyber Cafe System (ACCS) gets started and what the scope is and
nature of the problem to be solved. The goal of the inception phase is to identify concurrence
needs and conflict requirements among the stakeholders of this project. To establish the
groundwork we have worked with the following related to the inception phases:
Planning meeting
Identifying Stakeholders
Our questions to the stakeholders
Recognizing multiple viewpoints
Working towards collaboration factors
2.2 Planning meeting
At an early stage in the project, several stakeholders and subject matter experts are convened to
discuss the project and make the product plan. We have chosen stakeholders based on the nature
and complexity of the project and its product deliverable. Depending on the size of the project
and its complexity, the meeting may take several days or weeks.
2.3 Identifying Stakeholders
Stakeholder refers to any person or group who can influence or can be influenced by the system
directly or indirectly. Stakeholders include end-users who interact with the system and everyone
else in an organization that may be influenced by its installation. Stakeholder identification is the
process used to identify all stakeholders for a project. It is important to understand that not all
15. Page | 10
Automated Cyber Cafe System
stakeholders have the same influence or effect on a project, nor will they be influenced in the
same manner. It should be done in a methodical and logical way to ensure that stakeholders are
not easily omitted. The following questions help us to identify stakeholders:
Who uses the system?
Who is affected by the outputs of the project?
Who evaluates/approves system?
Who maintains the system?
Who has knowledge (specialist) about the system?
Whose work will influence my project? (During the project and also once the project is
completed).
2.4 Our questions to the stakeholders
We set our questions for the stakeholders in a way so that they could give their opinion and
requirements for the system. The questions are mentioned in the last part of the SRS. Our
questions also focus on the measurable benefits and successful implementation of the project.
2.5 Recognizing multiple viewpoints
We have collected the following view points by discussing with Md Muniruzzaman (Deputy
Director Library Cyber Center Dhaka University) who has enough experiences working in DU
Cyber Center. He is also the system administrator of DU Cyber Center. We have also discussed
with other regular staffs at DU Cyber Center to gather information and requirements. In absence
of system administrator they are considered as regular administrator at DU Cyber Center.
Moreover we have discussed with some students of University of Dhaka since they are also the
user of this Cyber Center and our stakeholder.
2.5.1 System Administrator Viewpoints
a) Prepaid card generating within desired range.
b) Monthly balance sheet generating
c) Maintain a database for viewing student information and card usage.
d) Database must be secured.
2.5.2 Regular Administrator Viewpoints
a) Easily access to the system.
b) Easy maintenance such as inserting, updating student information.
c) Easy to operate.
16. Page | 11
Automated Cyber Cafe System
2.5.3. Student/User Viewpoints
a) Easy to access in user pc.
b) Easy to view usage.
c) Easy to be registered and paid.
2.6 Working towards collaboration
We have asked our stakeholders for their requirements and found out that each of them has their
own requirements. Some of the requirements are common as well as conflicting. So we need to
follow the steps given below to merge the requirements:
Find out the common and conflicting requirements.
Divide the requirements into different categories.
Identify the special requirements that the stakeholders have.
Identify the all the requirements according to the stakeholder‟s priority points and
prioritize them through voting.
Take final decision about the requirements.
2.7 Conclusion
The inception phase of this project helped us to identify the stakeholders as well as their different
requirements. We have recognized multiple viewpoints of stakeholders by communicating with
them. In the next chapter, we have discussed about finding requirements and scenario.
17. Page | 12
Automated Cyber Cafe System
To make the project successful, we have made several group discussions
1. Date: 30/12/2014
Place: IIT DU
Meeting agenda: Identifying stakeholders with our supervisor
Group Members:
Mobashir Sadat (BSSE-0507)
Md Rakib Hossain (BSSE-0516)
A.H.M. Azimul Haque (BSSE-0519)
Group supervisor
Alim Ul Gias (Lecturer at IIT DU)
2. Date: 8/01/2015
Place: DU Cyber Center
Meeting agenda: Collecting requirements from stakeholders
Group Members:
Mobashir Sadat (BSSE-0507)
Md Rakib Hossain (BSSE-0516)
A.H.M. Azimul Haque (BSSE-0519)
3. Date: 18/01/15
Place: DU Cyber Center
Meeting agenda: Discussion on requirements with supervisor
Group Members:
Mobashir Sadat (BSSE-0507)
Md Rakib Hossain (BSSE-0516)
A.H.M. Azimul Haque (BSSE-0519)
Group supervisor
18. Page | 13
Automated Cyber Cafe System
Alim Ul Gias (Lecturer at IIT DU)
4. Date: 29/01/2015
Place: IIT DU
Meeting agenda: Discussion on report writing about “Inception” phase
Group Members:
Group Members:
Mobashir Sadat (BSSE-0507)
Md Rakib Hossain (BSSE-0516)
A.H.M Azimul Haque (BSSE-0519)
Group supervisor
Alim Ul Gias (Lecturer at IIT DU)
19. Page | 14
Automated Cyber Cafe System
Chapter3
Elicitation of Automated Cyber Cafe System
3.1 Introduction
Elicitation is the task that helps the developer to define what is required. To complete the
elicitation step of Automated Cyber Cafe System (ACCS) we face many problems like problems
of the scope, problems of the volatility and problems of understanding. However, this is not an
easy task. To help overcome this problem, we have worked with the elicitation requirement
activity in an organized and systematic manner.
3.2 Eliciting Requirements of Automated Cyber Cafe System
Requirements elicitation of ACCS combines elements of requirements gathering, problem
solving, elaboration, negotiation and specification. It requires the cooperation between the
stakeholders and us to elicit requirements. To elicit requirements of ACCS we completed
following tasks:
Collaborative Requirements Gathering
Quality Function Development
Usage scenario
3.2.1 Collaborative Requirements Gathering
The main goal of our project is to automate all the manual functionality and rebuild other
automated functionality of DU Cyber Center. So, at first we have tried to identify the scope of
the problem, problems of understanding, propose elements of the solution, negotiate different
approaches, and specify a preliminary set of solution requirements in an atmosphere that is
conducive to the accomplishment of the goal.
To better understand the flow of events of ACCS as they occur, we present a brief usage
scenario that outlines the sequence of events that led up to the requirements gathering. To gather
the requirement, we have used a technique called use “5Ws and an H”. It refers to:
1) Who 2) What 3) Why 4) When 5) Where 6) How
There are three problems that are encountered as elicitation of ACCS occurs:
20. Page | 15
Automated Cyber Cafe System
(a) Problems of the scope: The boundary of the ACCS is well defined. We know what we
are going to do and our limitations related to this project. To develop the software we will
perform the following tasks:
We will provide the access to the permitted users.
There will be the options for inserting and updating the existing administrator account
and student information.
The system will be developed using ASP .Net and C# programing language
Data of this system will be stored in database using MySQL/Sql Server
After developing this software we will not provide any kind of tools or environment needed for
this software. We will try to provide a user manual to maintain the software.
(b) Problems of the understanding: To have a clear understanding about the reason of
doing this as a project, we put ourselves in front of some questions such as:
What is needed from the software?
- DU Cyber Center‟s user activities, administrator activities and their financial
activities will be maintained by this software.
The capabilities and limitation of the computing environment:
- Now the financial part of DU Cyber Center is maintained manually, it lacks the
necessity of security and time safety. It will make the whole work automated, smooth and
authenticated.
-Bedsides all the machines of DU Cyber Center are backdated. They are not
compatible with the new technology. This causes us to develop this system as a platform
independent using minimal hardware resource.
The domain of the problem:
- We will develop the software only for DU Cyber Center‟s Administrator and their
users.
(c) Problems of the volatility: Requirements change overtime. This is due to dynamic
environment. We have considered the problem of volatility as an important aspect because the
requirements can change.
21. Page | 16
Automated Cyber Cafe System
(d)Requirement elicitation through interview:
Interviews are often the best means to elicit qualitative & quantitative information of
ACCS such as opinion, policies and narrative description of activities of the problem. We
discussed with our stakeholders Md Muniruzzaman (Deputy Director Library Cyber
Center Dhaka University) and regular staffs of DU Cyber Center to come up with the
deserved results. We also discussed with some students at DU Cyber Center.
(e)Requirement elicitation through questioning:
While interviewing our stakeholders, we asked several questions on different fields. The
questions are attached below:
(f)Questionnaire for the project
The aim of the questionnaire is to collect information on the methods and practices for this
project. Stakeholder‟s input is extremely important to identify gaps and desire data that will help
in driving future tools and methods that may better support their activity. The sample
questionnaire used for the project is given below. The fill-up document is later attached with the
SRS in the appendix section.
Questionnaires:
What are the functionalities of your old automated cyber cafe system?
Who directly interacts with the system?
Who has the administrator power over the software?
Is there any multiple admins or only one admin?
How you want to serve your client as the old system or in a new way?
Do you expect the same features as you are provided by the old software?
Are there any major problems you face from the old software? What are the problems?
How do you want to solve these problems?
How do you serve your clients?
Mainly who is the user of your Cyber Cafe? This system serves only DU Students or any
other People?
What is the information of the user you store in the ledger book when students are
registered as a client?
22. Page | 17
Automated Cyber Cafe System
What is the information that card contains?
After registration how they use this card to get the services?
How do you want to generate these cards? Generate one card when one user is registered
or many cards for many users as well as for future uses?
If you generate many cards at one time then what is the maximum and minimum
numbers of cards you want to generate at one time?
Who is responsible for generating the cards and distributing those cards?
What types of information the card number and the pin number would be?
Is the account number and the pin randomly generated or having any preferable choice
or any sequence related to the user‟s provided information?
In which environment (Operating system) you want to run the new software?
Is there any problem if we propose a new environment for the new software?
Do you need a user manual book for maintaining the software?
Do you provide a user manual book for your clients?
Are you in a need of some extra features that help your work?
Who is responsible for generating this monthly balance sheet?
What is the information the balance sheet contains?
If you are able to see the active user list then what is the information you want to see in
the active user list?
Can you see a particular card usage?
What is the information particular card usage contains.
In case of electricity failure what are the steps taken by you?
Do you want to add any other features with this automation?
The outcomes of the questions are given in appendix (10.1)
(g)Existing Resource:
A good volume of resource and reports of cyber cafe maintenance software are available,
which provide useful information about the existing system.
23. Page | 18
Automated Cyber Cafe System
(h)Observation:
Observation provides first-hand information of ACCS about how activities are carried
out. We have gone to the DU Cyber Center several times and noticed their regular
activities
3.2.2 Quality Function Development
Quality function deployment (QFD) is a quality management technique that translates the needs
of the customer into technical requirements for software. QFD “concentrates on maximizing
customer satisfaction from the software engineering process”. With respect to our project the
following requirements are identified by a QFD. We will cover the following requirements:
(a)Normal Requirements:
The system will preserve all the activities of DU Cyber Center including student and
administrator activities
It makes all the manual functionality automated and adds new features.
Keep track of all the financial activities at DU Cyber Center.
The system will allow only permitted admin to access through individual login account.
They can insert update and student information.
Administrator can generate prepaid card numbers for student.
At the end of a month administrator can generate monthly balance sheet.
(b)Expected Requirements:
The administrators view any fields of students.
The system shall automatically send notification to the user when their using time is close
to be finished.
Student can purchase multiple cards.
One card cannot be used at the same time more than one computers.
The system must ensure database backups, which are as recent and complete as possible
Backup files should be in readable file format in form of spread sheet and standard
compression formats.
(c)Exciting Requirements:
Platform independent.
Student can also view their card usage
24. Page | 19
Automated Cyber Cafe System
3.2.3 Usage Scenario:
Automated Cyber Cafe System, University of Dhaka
An automated cyber cafe system is proposed for the Cyber Center, University of Dhaka located
beside the Central Library, University of Dhaka. The Cyber Center serves the students of
University of Dhaka by providing internet and other computing facilities. To provide and avail
these facilities both the authority of DU Cyber Center and the students have to follow some
predefined processes. These processes are maintained by the administrators of DU Cyber Center.
There are two administrators, one is the system administrator and another is the regular
administrator. How this Cyber Center manually functions is described below.
How Does The DU Cyber Center Provide Internet Services to The Students?
With a view to giving the internet facilities the authority of DU Cyber Center maintains a prepaid
card distribution system. The students who want to get the service have to purchase a prepaid
card through a registration process at DU Cyber Center. The unit price of these prepaid cards is
60 taka .With these prepaid cards students are allowed to use internet facilities for 300 minutes
and the validity of these prepaid cards is 180 days. Within these 180 days the cardholder can use
the prepaid card any number of times for getting internet facilities until that prepaid card‟s usage
of 300 minutes is being finished.
How Do They Generate these Prepaid Cards?
The authority of DU Cyber Center has to generate these prepaid cards before providing the
services to the students. Every prepaid card contains two types of information .The first one is a
card number and the second one is a pin number, corresponding to that card number. The card
number would be a 10 digits numeric value where the first six digits contain the current
day/month/year and the last four digits contain a serial number. Suppose a card number is:
2002140001.Here the first six digits (200214) indicates current date: 20/02/14 and the last four
digits (0001) indicates the card serial number. Besides the pin number is auto generated
corresponding to the card number. The pin number would be an eight character long alpha
numeric value with the constraint of having only uppercase characters, for example,
(AFE4F6C7).However first of all; they only generate the prepaid card number and
corresponding pin number respectively in a spread sheet. They can generate any number of
25. Page | 20
Automated Cyber Cafe System
prepaid card numbers and corresponding pin numbers within a desired rang. The minimum
number is 500 and the maximum number is 2000.After generating that information they print
every card number and correspondent pin number individually in a well-designed card paper.
Moreover the card paper contains some instructions on how to use this card and the official logo
of University of Dhaka. After printing the card number, pin number, instructions and official
logo on this card paper, the card paper is considered to be the desired prepaid card.
How Do the Students Purchase these Cards and Register at DU Cyber
Center?
After generating these prepaid cards the authority of DU Cyber Center preserves these cards for
future uses. When a student is going to purchase a card s/he has to deposit 60 taka to the data
entry operator. The data entry operator makes the students registered by keeping track the
student‟s information in a ledger book. The students have to show their student‟s identity card
for providing that information. The data entry operator writes down the student‟s name,
department name, current academic year, department roll, attached hall name from the student‟s
identity card in the ledger book. Then the operator takes a generated prepaid card and writes
down that prepaid card number and pin number in the ledger book beside that student
information. Now the student is the owner of that card. Thus a student is fully registered to the
DU Cyber Center for getting the internet facilities by using his/her purchased card.
How Do The Students Use these Prepaid Cards to Get The Internet Services?
Becoming the owner of a prepaid card, now the students are able to use internet and other
computing facilities at DU Cyber Center. Inside the DU Cyber Center when the students sit
before a computer and turn on the computer, a window will appear in the computer screen .Here
they will be asked for entering the card number and the pin number of the prepaid card that
belongs to them by the system. The students will enter the card number and the pin number of
their own card. The card number and the pin number are case sensitive .It means that students
have to enter the card number and the pin number as same as they are mentioned in their card. If
they do anything wrong the system will let them know. However if they do it correctly, the
system will let them access to the computer home screen to use internet and other computing
facilities. In the home screen they will be able to see a small timer window where their 300
minutes countdown will appear. Gradually when the countdown becomes 15.00 minutes the
system will notify the students for the first time to save and pack up their work. Again the system
will notify the student when the countdown becomes 5.00 minutes. After finishing the 300
minutes countdown the system will automatically close and the card is considered as an expired
card. A card is also considered as an expired card after passing 180 days from the day, the card is
purchased. As a result the students are not allowed to access to the computer by using this
expired card.
26. Page | 21
Automated Cyber Cafe System
Moreover students are not allowed to use more than one computer using a valid card at the same
time. It is strictly prohibited as it makes their valid card invalid. Students must be aware of these
issues. If students face any problems using their card they are requested to contact with the
regular administrator to solve their problems
Apart from these Students are also allowed to see their card usage from the timer window. The
card usage contains card number, pin numbers, card owner‟s name, date, PC No (which
computer they used), Starting Time (when they started using), Ending Time (when they finished
using), Using Time (how long they used ),Remaining Time(how much time is remaining to
finish 300 minutes) and Card validity (how long the card is valid).
How Do The Administrators Maintain the Cyber Center Functions Properly?
As it is mentioned above there are two types of administrators who are responsible for
maintaining all the processes of DU Cyber Center. One is system administrator and another is
regular administrator. Both the administrators have some particular tasks and responsibilities to
do for maintaining these processes. Their tasks and responsibilities are mentioned below
respectively.
Card Generating:
It is the responsibility of system administrator to generate cards before providing services. Only
system administrator can perform this operation. Normally he has to decide how many cards
would be generated.
Register student and distribute Cards:
It is the responsibility of regular administrator to register the students and distribute the cards
among them. Here in this particular case regular administrator accomplishes this task as a data
entry operator.
Update Student information:
If any correction is needed after registration of the students then it is the responsibility of regular
administrator to make the correction and update the students‟ information.
Generating Monthly Balance Sheet:
Generating monthly balance sheet is the responsibility of system administrator. The balance
sheet contains date (from beginning to end of the month), Cards (how many cards are distributed
in each date), Unit price (prices of each card), Amount (total amount of card unit price on each
day), Bank Deposited & date (bank deposit amount and deposit‟s date).
27. Page | 22
Automated Cyber Cafe System
To generate this report system administrator has to fill up bank deposit amount and the deposit‟s
date in the balance Sheet. (On which date the system administrator deposited at bank and the
deposited amount)
View Active User:
Both the system administrator and the regular administrator can see a list of active users who are
using internet inside the DU Cyber Center. This contains PC No (In which computer they are
using), active user‟s Card number, Cardholder Name, Starting Time (when they started using),
Running Time (how long they are using), Remaining Time.
View A Particular Card Usage.
If required both the system administrator and the regular administrator can see any particular
card usage. The card usage contains card numbers, pin numbers, card owner‟s name, department
name, department roll, attached hall name, date, PC No (which computer they used), Starting
Time (when they started using), Ending Time (when they finished using), Using Time (how long
they used), Remaining Time (how much time remain to finish 300 minutes) and Card validity
(For how many days the card is validate).
View All Users History from a specific date to another specific date:
Occasionally both the system admin and regular admin are in a need of observing the users
history from a specific date to another specific date. So they are able to see all users‟ history
which contains two specific dates, Card Number, Cardholder Name, PC No, Starting Time,
Ending Time, Using Time, and Card Validity.
Electricity Failure:
In case of electricity failure the students are requested to turn on the computer and enter their
card number and pin number again for further usage.
3.3 Conclusion:
We have identified all the necessary requirements to fulfill our project scope. We have generated
our scenario of the project. Based on this scenario, we have developed scenario based model in
the next chapter.
28. Page | 23
Automated Cyber Cafe System
Chapter 4
Scenario-based modeling of Automated Cyber Cafe
System
This chapter describes the scenario-based modeling of Automated Cyber Cafe system (ACCS)
4.1 Introduction
Scenario based modeling comprises of three parts:
Use case diagram
Activity diagram
Swimlane diagram
Based on the scenario discussed on previous chapter, we have designed use case diagram,
activity diagram and swimlane diagram of the project.
A use case diagram is a graphic depiction of the interactions among the elements of a system. A
use case is a methodology used in system analysis to identify, clarify, and organize system
requirements and it contains some components.
The actors, usually individuals involved with the system defined according to their roles.
The use cases, which the specific roles are played by the actors within and around the
system.
The relationships between and among the actors and the use cases.
In Automated Cyber Cafe System (ACCS) the use case diagram represents the whole process
and activities of managing user and administrator operations of the Cyber Center of DU.
The actors are to be identified from the scenario.
These actors are of two types.
Primary actor
Secondary actor
Primary actor: The actors those both produce and consume information of a system.
Secondary actor: The actors those either produce or consume information of a system.
The identified actors of automated cyber cafe system are:
System admin (SA)
Regular admin (RA)
Student/User
System
29. Page | 24
Automated Cyber Cafe System
4.2 Use case diagrams and scenario
In this section use case diagram and scenario are described elaborately. Each use case diagram
contains its name, level number, primary and secondary actors.
The scenario of the first use-case diagram is provided in previous chapter as it represents the
whole scenario of the automated cyber cafe system.
Use Case Scenario
Level 0 Level 1 Level 2 Actors
Automated
Cyber Cafe
System
Authentication Log in System admin,
Regular admin
Log out System admin,
Regular admin
Update Admin
Account
Edit account System admin,
Regular admin
Recover Password System admin,
Regular admin
Generate Card Generate Card System admin
Register User Register User System admin,
Regular admin
User Activities Enter Card Info Student
View Card Usage Student
Exit From System Student
System activity in
user PC
System activity in
user PC
System
Update User
information
Search User System admin,
Regular admin
Update info System admin,
Regular admin
Generate monthly
Balance sheet
Generate monthly
Balance sheet
System admin,
View History View active user System admin,
Regular admin
View particular card
usage
System admin,
Regular admin
View history System admin,
Regular admin
Table 4(a) Use Case Scenario
30. Page | 25
Automated Cyber Cafe System
Fig: Use case (a): Automated Cyber Cafe System (level 0)
31. Page | 26
Automated Cyber Cafe System
Fig: Use case (b): Automated Cyber Cafe System (level 1)
32. Page | 27
Automated Cyber Cafe System
Fig: Use case (c): Authentication (level 1.1)
33. Page | 28
Automated Cyber Cafe System
(a) Use Case Description: Log In
Use Case Id Level 1.1.1
Use Case Name Log In
Primary Actor System Admin, Regular Admin
Secondary Actor none
Goal in Context To enter the system.
Precondition Must have an account on this system.
Scenario 1. View log in window.
2. Click on „Log In‟ button.
3. Input User name or User ID & Password.
4. Proceed to the next activity.
Exception 1. Unrecognized user-name or user id.
2. Incorrect Password.
3. User is blocked.
Priority Essential, must be implemented.
When Available First increment.
Frequency of Use Many times per day.
Use Case Description (a): Log in
34. Page | 29
Automated Cyber Cafe System
Fig: Activity diagram (a): Log in (level 1.1.1)
35. Page | 30
Automated Cyber Cafe System
System Admin Interface Regular Admin
Fig: Swimlane diagram (a): Log in (level 1.1.1)
Enter Admin
ID
Logged In
Enter Admin ID
Click Log In
Log In
Click Log In
Enter Password Enter Password
Retry Remain
Valid
Admin
ID
Prompt
For Retry
Valid
Passwor
d
Invalid
Admin ID
No Retry
Remain
Invalid
Password
36. Page | 31
Automated Cyber Cafe System
(b) Use Case Description: Log Out
Use Case Id Level 1.1.2
Use Case Name Log Out
Primary Actor System Admin, Regular Admin
Secondary Actor none
Goal in Context To exit from the system.
Precondition Must be logged in.
Scenario 1. Click the „Log Out‟ button.
2. Get out of the system.
Exception 1. System error.
2. Network error.
Priority Essential, must be implemented.
When Available Last increment.
Frequency of Use Many times per day.
Use Case Description Table (b): Log Out
37. Page | 32
Automated Cyber Cafe System
Fig: Activity diagram (b): Log out (level 1.1.2)
38. Page | 33
Automated Cyber Cafe System
Fig: Swimlane diagram (b): Log Out (level 1.1.2)
System Admin Interface Regular Admin
Ask for
Confirmation
Click Log Out
Log Out
Click Log Out
Yes
Log Out
Successfull
y
No
39. Page | 34
Automated Cyber Cafe System
Fig: Use case (d): Update Admin Account (level 1.2)
40. Page | 35
Automated Cyber Cafe System
(c) Use Case Description: Edit Account
Use Case Id Level 1.2.1
Use Case Name Edit Account
Primary Actor System Admin, Regular Admin
Secondary Actor none
Goal in Context To update one‟s information.
Precondition Must have an account on this system.
Scenario 1. Log in to the system.
2. Click „Edit Account‟ button.
3. Change information.
4. Save changes.
Exception 1. Function not configured for the system.
2. Unable to update.
3. Null information.
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Moderate frequency.
Use Case Description Table (c): Edit Account
42. Page | 37
Automated Cyber Cafe System
System Admin Interface Regular Admin
Fig: Swimlane diagram (c): Edit Account (level 1.2.1)
Update
Information
Send Confirmation
Message
Update
Information
Click Edit
Account
Edit Account
Click Edit
Account
Enter Password Enter Password
Retry Remain
Valid
Prompt
For Retry
No Retry
Remain
Save Changes Save Changes
Save
Invalid
Log Out
43. Page | 38
Automated Cyber Cafe System
(d) Use Case Description: Recover Password
Use Case Id Level 1.2.2
Use Case Name Recover Password
Primary Actor System Admin, Regular Admin
Secondary Actor none
Goal in Context Change password with email verification
Precondition Must have an account on this system and a valid email to recover
password.
Scenario 1. Click “Recover Password Link button”.
2. Enter registered email address on this system.
3. Click on the verification link.
4. Enter new password
5. Save Changes.
Exception 1. Unregistered email.
2. Link is not verified.
3. Account is blocked.
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Moderate frequency.
Use Case Description Table (d): Recover Password
45. Page | 40
Automated Cyber Cafe System
System Admin Interface Regular Admin
Fig: Swimlane diagram (d): Recover Password (level 1.2.2)
Recover Password
Click Recover
Password
Enter Email
ID
Click Recover
Password
Enter Email
ID
Prompt
For Retry
Invalid
Send Security
Code
Valid
Email ID
Retry Remain
Enter Security
Code
Enter Security
Code
Change Password
Invalid
Valid
No
Retry
Remain
46. Page | 41
Automated Cyber Cafe System
(e) Use Case Description: Generate Cards
Use Case Id Level 1.3
Use Case Name Generate Cards
Primary Actor System Admin
Secondary Actor none
Goal in Context To Generate Card Numbers and Pin numbers
Precondition Must be logged in to the system
Scenario 1. Click “Generate Card”.
2. Select preferable produce date.
3. Select numbers of cards to be produced
4. Click generate spread sheet
5. Click preview
6. Save file. /cancel.
Exception 1. Invalid date
2. Card number exceeds limit.
3. File not found.
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use One time for every month.
Use Case Description Table (e): Generate Cards
48. Page | 43
Automated Cyber Cafe System
Regular Admin Interface
Fig: Swimlane diagram (e): Generate Cards (level 1.3)
Click Generate Card
Save In Location
Generate Card
Set Date
Click Generate
Spread File
Set Number of Cards
within Range
Show
Preview
Click
Cancel
Click
Save
49. Page | 44
Automated Cyber Cafe System
(f) Use Case Description: Register User
Use Case Id Level 1.4
Use Case Name Register User
Primary Actor System Admin, regular admin
Secondary Actor None
Goal in Context To register student into the system
Precondition Must be logged in to the system
Scenario 1. Click register student
2. Input student‟s information
3. Input Card information
4. Register
Exception 1. Invalid input
2. Network error
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Many times per day.
Use Case Description Table (f): Register User
50. Page | 45
Automated Cyber Cafe System
Fig: Activity diagram (f): Register User (level 1.4)
51. Page | 46
Automated Cyber Cafe System
Regular Admin Interface
Fig: Swimlane diagram (f): Register User (level 1.4)
Click
Registration
Show Confirmation
Invalid
Info
Register User
Enter Required Info.
Enter Each
Card Number
Enter Number of
Cards
Enter Card‟s
Generation Date
Valid Info
Invalid
52. Page | 47
Automated Cyber Cafe System
Fig: Use case (e): User Functionality in PC (level 1.5)
53. Page | 48
Automated Cyber Cafe System
(g)Use Case Description: Enter Card Info
Use Case Id Level 1.5.1
Use Case Name Enter Card Info
Primary Actor Student
Secondary Actor none
Goal in Context To enter the PC desktop for using
Precondition Must be registered on this system
Scenario 1. Turn On the PC.
2. Window will be shown.
3. Input Card number & Pin number.
4. Click “Submit” button.
Exception 1. Unrecognized card number.
2. Incorrect pin number
3. Card is expired.
4. Card is used by another user.
Priority Essential, must be implemented.
When Available First increment.
Frequency of Use Many times per day.
Use Case Description Table (g): Enter Card Info
54. Page | 49
Automated Cyber Cafe System
Fig: Activity diagram (g): Enter Card Info (level 1.5.1)
55. Page | 50
Automated Cyber Cafe System
User Interface
Fig: Swimlane diagram (g): Enter Card Info (level 1.5.1)
Enter Card
Number
Window Appear
Enter Pin
Number
Enter Card Info
Access to Home
Screen
Prompt
For Retry
Valid Card
Number
Invalid
Valid Pin
Number
Invalid
Retry
Remains
No Retry
Remains
56. Page | 51
Automated Cyber Cafe System
(h) Use Case Description: View Card Usage
Use Case Id Level 1.5.2
Use Case Name View Card Usage
Primary Actor Student
Secondary Actor none
Goal in Context To observe one‟s card usage.
Precondition Must be accessed to the system.
Scenario 1. Click “View Usage” button.
2. Usage is shown in a new page or window.
Exception 1. View is not available
2. System error.
3. Network error.
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Many times per day.
Use Case Description Table (h): View Card Usage
58. Page | 53
Automated Cyber Cafe System
User Interface
Fig: Swimlane diagram (h): View Card Usage (level 1.5.2)
Click View Card
Usage
Show Card Usage
Show
Message
If
Available If Not
Available
View Card Usage
59. Page | 54
Automated Cyber Cafe System
(i) Use Case Description: Exit from System
Use Case Id Level 1.5.3
Use Case Name Exit from System
Primary Actor Student
Secondary Actor none
Goal in Context Stop using and to exit from the system
Precondition Must be accessed to this system
Scenario 1. Click the „Exit‟ button.
2. Get out of the system and PC home screen.
Exception 1. System error.
2. Network error.
Priority Essential, must be implemented.
When Available Last increment.
Frequency of Use Many times per day.
Use Case Description Table (i): Exit from System
60. Page | 55
Automated Cyber Cafe System
Fig: Activity diagram (i): Exit from System (level 1.5.3)
61. Page | 56
Automated Cyber Cafe System
User Interface
Fig: Swimlane diagram (i): Exit from System (level 1.5.3)
Exit from System
Click Exit
Exit Successfully
Yes
Ask For
Confirmation
No
62. Page | 57
Automated Cyber Cafe System
Fig: Use case (f): System Activity in User PC (level 1.6)
63. Page | 58
Automated Cyber Cafe System
(j) Usage Case Description: System activity in user PC
Use Case Id Level 1.6
Use Case Name System activity in user PC
Primary Actor System.
Secondary Actor student
Goal in Context To notify user.
Precondition Student must be signed in to the system.
Scenario 1. Checking remaining time
2. If reaming time is less than 15 minutes
3. Notify user
Exception 1. Accessing to home screen of pc when remaining time is less than
15 minutes
2. Accessing to home screen of pc when remaining time is less than
15 minutes
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Many times per day.
Use Case Description Table (j): System Activity in User PC
64. Page | 59
Automated Cyber Cafe System
Fig: Activity diagram (j): System Activity in User Pc (level 1.6)
65. Page | 60
Automated Cyber Cafe System
System Interface System
Fig: Swimlane diagram (j): System Activity in User Pc (level 1.6)
System Activity in User
PC
Check
Remaining
Time
Time=15
Minute
Send 15 Minute
Notification
Send 5 Minute
Notification
Make Auto Exit user
from system
Send
Emergency
Notification
Time<15
Minute
Time=5
Minute
Time=0
66. Page | 61
Automated Cyber Cafe System
Fig: Use case (g): Update User Information (level 1.7)
67. Page | 62
Automated Cyber Cafe System
(k) Usage Case Description: Search User
Use Case Id Level 1.7.1
Use Case Name Search User
Primary Actor System Admin, regular admin
Secondary Actor none
Goal in Context To search registered student information.
Precondition Student must be registered on the system.
Scenario 1. Click “Update info” button.
2. Enter search key.
3. View search result
Exception 1. Invalid search key
2. Search key does not find
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Many times per day.
Use Case Description Table (k): Search User
68. Page | 63
Automated Cyber Cafe System
Fig: Activity diagram (k): Search User (level 1.7.1)
69. Page | 64
Automated Cyber Cafe System
System Admin/ Regular Admin Interface
Fig: Swimlane diagram (k): Search User (level 1.7.1)
View Search Result
Click
Update Info
Ask For
Search Key
Search User
Enter Search
Key
Searching
70. Page | 65
Automated Cyber Cafe System
(l) Usage Case Description: Update info
Use Case Id Level 1.7.2
Use Case Name Update info
Primary Actor System admin, regular admin
Secondary Actor none
Goal in Context To update registered student information
Precondition Student must be registered on the system and search key must be found.
Scenario 1. Select User from search result
2. Chose option “Edit basic info” or ”Add new card”
3. Update Card Number or student basic information
4. Save changes.
Exception 1. Invalid card number
2. Invalid information.
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Many times per day.
Use Case Description Table (l): Update Info
71. Page | 66
Automated Cyber Cafe System
Fig: Activity diagram (l): Update Info (level 1.7.2)
72. Page | 67
Automated Cyber Cafe System
Regular Admin Interface
Fig: Swimlane diagram (l): Update Info (level 1.7.2)
Edit Basic Info
Save Changes
Enter Card Number
Add New
Card
Choose Option
Invalid
Number
Show Confirmation
Update Info
Select User
Valid
Number
Basic Info.
73. Page | 68
Automated Cyber Cafe System
(m) Usage Case Description: Monthly Balance Sheet
Use Case Id Level 1.8
Use Case Name Monthly Balance Sheet
Primary Actor System Admin
Secondary Actor none
Goal in Context To view or generate monthly balance sheet.
Precondition Must be logged in to the system
Scenario 1. Click “Balance Sheet” button.
2. Select Option “View Balance Sheet” or “Generate Balance Sheet”
3. Select month and show monthly balance sheet.
4. Enter deposited amount and date
5. Generate balance sheet.
Exception 1. System Error
2. Network Error
3. View does not available right that moment.
4. Month is not ended at all.
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Many times per day( View Balance Sheet),One time for every
month(Generate balance sheet)
Use Case Description Table (m): Monthly Balance Sheet
75. Page | 70
Automated Cyber Cafe System
System Admin Interface System Admin
Fig: Swimlane diagram (m): Monthly Balance Sheet (level 1.8)
Monthly Balance Sheet
Click Generate
Balance Sheet
Click
Generate
Click View
Select Month
Show Selected
Month Balance
Sheet
Save File
Select
Month
Enter Deposit
Date & Amount
Show Balance
Sheet
76. Page | 71
Automated Cyber Cafe System
Fig: Use case (h) View History (level 1.9)
77. Page | 72
Automated Cyber Cafe System
(n) Usage Case Description: View Active user
Use Case Id Level 1.9.1
Use Case Name View Active user
Primary Actor System Admin, regular admin
Secondary Actor none
Goal in Context To observe active user activity on the system
Precondition Must be logged in to the system
Scenario 1. Click “View active user” button.
2. View active user list
Exception 1. System Error
2. Network Error
3. View does not available right that moment.
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Many times per day.
Use Case Description Table (n): View Active User
78. Page | 73
Automated Cyber Cafe System
Fig: Activity diagram (n): View active User (level 1.9.1)
79. Page | 74
Automated Cyber Cafe System
System Admin Interface Regular Admin
Fig: Swimlane diagram (n): View active User (level 1.9.1)
View Active User
Click History
Click Active
User
Click History
Click Active
User
Show Active User
80. Page | 75
Automated Cyber Cafe System
(o) Usage Case Description: View Particular Card Usage
Use Case Id Level 1.9.2
Use Case Name View Particular Card Usage
Primary Actor System Admin, regular admin
Secondary Actor none
Goal in Context To observe particular card usage history in the system
Precondition Must be logged in to the system
Scenario 1. Click “View particular card usage” button.
2. Enter card number
3. Click “View Usage”.
4. Show Particular Card Usage.
Exception 1. System Error
2. Network Error
3. Invalid Card Number
4. Card is not registered.
5. View does not available right that moment.
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Many times per day.
Use Case Description Table (o): View Particular Card Usage
82. Page | 77
Automated Cyber Cafe System
System Admin Interface Regular Admin
Fig: Swimlane diagram (o): View Particular Card Usage (level 1.9.2)
Click Card
Usage
Show Card Usage
Click Active
User
Click History
View Particular Usage
Click History
Enter Card
Number
Enter Card
Number
Invalid
Valid
Show Message
Usage Available
Usage Not
Available
83. Page | 78
Automated Cyber Cafe System
(p) Usage Case Description: View Usage History
Use Case Id Level 1.9.3
Use Case Name View Usage History
Primary Actor System Admin, regular admin
Secondary Actor None
Goal in Context To observe user history between two specific date.
Precondition Must be logged in to the system
Scenario 1. Click “View usage history” button.
2. Select two specific date.
3. Click “View history”
4. Show Card Usage history.
Exception 1. System Error
2. Network Error
3. View does not available right that moment.
Priority Essential, must be implemented.
When Available Second increment.
Frequency of Use Many times per day.
Use Case Description Table (p): View History
84. Page | 79
Automated Cyber Cafe System
Fig: Activity diagram (p): View History (level 1.9.3)
85. Page | 80
Automated Cyber Cafe System
System Admin Interface Regular Admin
Fig: Swimlane diagram (p): View History (level 1.9.3)
View Usage History
Select Range
Click Usage
History
Click History
If Available
If Not
Available
Show Card Usage
Select Range
Click Usage
History
Click History
Click View Click View
86. Page | 81
Automated Cyber Cafe System
4.3 Conclusion
We have done this part to develop the scenario. In the next chapter data based model is appeared.
1. Date 25/02/2015
Place: IIT DU
Meeting agenda: Discussion on Scenario based modeling.
Group Members:
Mobashir Sadat (BSSE-0507)
Md Rakib Hossain (BSSE-0516)
A.H.M. Azimul Haque (BSSE-0519)
Group supervisor
Alim Ul Gias (Lecturer at IIT DU)
87. Page | 82
Automated Cyber Cafe System
Chapter 5
Data Model of Automated Cyber Cafe System
5.1 Data Modeling Concept
Data modeling is a common activity in the software development process of information
systems, which typically use database management systems to store information. The output of
this activity is the data model, which describes the static information structure in terms of data
entities and their relationships. This structure is often represented graphically in entity-
relationship diagrams (ERD).
The data model of our project contains important architectural information and serves the
following practical purposes:
Provide a conceptual design of objects in the system‟s domain and their relationships.
Provide a blueprint for creating the database structure.
Guide implementation of code units that access the database.
Guide performance enhancement in data access operations.
A set of following activities is done to design the Data Model.
Data Identification and Define Attributes for each Data
Create Data Relationship Diagram
ER Diagram
Table or Schema Generation
88. Page | 83
Automated Cyber Cafe System
5.2 Data Identification and Define Attributes for each Data
A data object or data is a representation of information which has different properties or
attributes that must be understood by the software. To identify a data object all the nouns of the
scenario are needed to be analyzed. So we prepared a noun table to identify the data objects.
Noun Table
Nouns Accepted/Rejected Comments
Cyber Center Rejected
Automated cyber cafe system Rejected
University of Dhaka Rejected
Central Library Rejected
Students Accepted Contains student
information
Authority of DU Cyber Center Rejected
Predefined processes Rejected
Administrators of DU Cyber Center Rejected Contains admin information
System administrator Rejected Type of admin
Regular administrator Rejected Type of admin
Card distribution system Rejected
Registration process Rejected
Prepaid card Accepted Contains card information
Internet facilities Rejected
Computing facilities Rejected
Unit price Rejected
60 taka Rejected
300 minutes Rejected
Validity of these prepaid cards Rejected Attribute of Card
180 days Rejected
Cardholder Rejected
Card number Rejected Attribute of Card
Pin number Rejected Attribute of Card
10 digits Rejected
Serial number Rejected
Eight character Rejected
Spread sheet Attribute of balance sheet
Desired rang Rejected
Minimum number Rejected
Maximum number Rejected
Well-designed card paper Rejected
Official logo Rejected
Instructions Rejected
89. Page | 84
Automated Cyber Cafe System
Deposit 60 taka Rejected
Data entry operator. Rejected
Student‟s information
A ledger book Rejected
Student‟s identity card Rejected
Student‟s name Rejected Attributes of student
Department name Rejected Attributes of student
current academic year Rejected Attributes of student
Department roll Rejected Attributes of student
Attached hall name Rejected Attributes of student
Generated prepaid card Rejected
Student information Rejected Attributes of student
Owner Rejected
Computer screen Rejected
Case sensitive Rejected
Small timer window Rejected
Countdown Rejected
15.00 minutes Rejected
5.00 minutes. Rejected
Expired card Rejected
Valid card Rejected
Card usage Accepted Contains card usage
information
Card owner‟s name Rejected
Date Rejected Attributes of Card
PC No Accepted Contains pc information
Starting Time Rejected Attributes of Card Usage
Ending Time Rejected Attributes of Card Usage
Using Time Rejected
Remaining Time Rejected Attributes of Card Usage
Card validity Rejected
Cards generating Rejected
Monthly Balance Sheet Accepted Contains balance sheet
information
Date Rejected Attributes of balance sheet
Unit price Rejected
Amount Rejected
Bank Deposited & date Rejected
Bank deposit amount Rejected
Deposit‟s date Rejected
Active User Rejected
Table 5(a): Data Object identification
90. Page | 85
Automated Cyber Cafe System
5.3 Create Data Relationship Diagram
From the noun table above we identified the following data objects and attributes:
Data Object: Card
Attributes
Card_number
Pin_number
Produce_date
Purchasing_date
Data Object: Student
Attributes
ID
First_name
Last_name
Department_name
Department_roll
Academic_year
Attached_hall
Data Object: Admin
Attributes
Id
Type
Name
Email
Password
Phone_number
Data Object: PC
Attributes
Id
Mac-Id
PC_name
Data Object: Card Usage
Attributes
Starting_time
Finishing_time
Remaning _time
Data Object: Balance_sheet
Attributes
Id
Month
Year
File
91. Page | 86
Automated Cyber Cafe System
Purchases
Generates
Generates
Has
Contains
Fig 5(a): Data Relationship Diagram
CardStudent
Admin Card
Admin Balance sheet
Card usageCard
PCCard_usage
92. Page | 87
Automated Cyber Cafe System
5.4 Entity Relationship(ER) Diagram and Schema Diagram
Card
Pin_number
Produces_date
Purchasing _date
Student
First_name
Last_name
Dep_name
Dep_roll
Aca_year
Attached_hall
ID
Purchase
Admin
Generate
Password
ID
Name
Email
Type
Balance sheet
ID Year
Month
File
Card Usage
Starting_time
Remining
time
Finishing
_time
Has
PC
PC_ID
PC_name
Mac_ID
Contains
Generate
95. Page | 90
Automated Cyber Cafe System
5.5 Conclusion
We have identified all the nouns and their attributes. We have established relationships among
the data objects. Class based model is described in the next chapter.
1. Date 05/03/2015
Place: IIT DU
Meeting agenda: Discussion on Data based modeling.
Group Members:
Mobashir Sadat (BSSE-0507)
Md Rakib Hossain (BSSE-0516)
A.H.M. Azimul Haque (BSSE-0519)
96. Page | 91
Automated Cyber Cafe System
Chapter 6
Class-based model of Automated Cyber Cafe System
This Chapter is intended to describe class based modeling of automated cyber cafe system.
6.1 Class Based Modeling Concept
Class-based modeling represents the objects that the system will manipulate, the operations that
will be applied to the objects, relationships between the objects and the collaborations that occur
between the classes that are defined. The elements of a class-based model include classes and
objects, attributes, operations, class-responsibility-collaborator (CRC) models, class diagrams.
6.2 Identifying Analysis Classes
Examining all the nouns from the usage scenario potential classes can be identified. For class
identification we have to go through the following steps.
Step 1
Identifying and categorize all nouns in following ways:
External Entities (e.g. other systems, devices, people) that produce or consume
information to be used by a computer-based-system.
Things (e.g. report, displays, letters, signals) that are part of the information domain for
the problem.
Occurrence or events (e.g. a property transfer or the completion of a series of robot
movements) that occur within the context of system operation.
Roles (e.g. manager, engineer) played by people who interact with the system.
Organizational units (e.g. division, group, and team) that is relevant to an application.
Places (e.g. manufacturing floor or loading dock) that establish of the problem and the
overall function of the system.
Structures (e.g. sensors, vehicles or computer) that define a class of objects or related
classes of object.
97. Page | 92
Automated Cyber Cafe System
Step 2
Selection of potential class is performed by considering six selection characteristics.
1. Retained information: The potential class will be useful during analysis only if information
about it must be remembered so that the system can function.
2. Needed services: The potential class must have a set of identifiable operations that can change
the value of its attributes in some way.
3. Multiple attribute: During requirement analysis, the focus should be on “major” information;
a class with a single attribute may, in fact, be useful during design, but is probably better
represented as an attribute of another class during the analysis activity.
4. Common attribute: A set of attributes can be defined for the potential class and these
attributes apply to all instances of the class.
5. Common operation: A set of operations can be defined for the potential class and these
operations apply to all instances of the class.
6. Essential requirements: External entities that appear in the problem space and produce or
consume information essential to the operation of any solution for the system will almost always
be defined as classes in the requirements model.
Potential class table:
Nouns General Classifications Characteristic Numbers
Cyber Center Places
Automated cyber cafe system Name
University of Dhaka Places
Central Library Places
Students External entities, roles,
organizational unit
1,2,3,4,5, Accepted
Authority of DU Cyber Center External entities,
organizational unit
2,3,5 Rejected
Predefined processes Occurrence or events 1,2 Rejected
Administrators of DU Cyber Center External entities,
organizational unit
2,3,5, Rejected
System administrator External entities, roles 1,2,3,4,5, Accepted
Regular administrator External entities, roles 1,2,3,4,5, Accepted
Card Generation Occurrences ,events 1,2,3,4,5, Accepted
Registration process Occurrences, events 2,3,4,5 Rejected
Prepaid card things
Internet facilities
Computing facilities
98. Page | 93
Automated Cyber Cafe System
Unit price things 1,rejected
60 taka
300 minutes
Validity of these prepaid cards 1,rejected
180 days
Cardholder External entities,
roles, organizational unit
Card number things 1 Rejected
Pin number things 1 Rejected
10 digits things 1 Rejected
First six digits things 1 Rejected
Last four digits things 1 Rejected
Serial number things 1 Rejected
Eight character things
Spread sheet things
Desired rang things
Minimum number things
Maximum number things
Well-designed card paper things
Official logo things
Instructions things
Deposit 60 taka
Data entry operator. External entities, roles, similar of regular admin
Student‟s information Things Similar of student
A ledger book Things
Student‟s identity card Things 1 Rejected
Student‟s name Things 1 Rejected
Department name Things 1 Rejected
current academic year Things 1 Rejected
Department roll Things 1 Rejected
Attached hall name Things 1 Rejected
Generated prepaid card Things Similar of card generation
Owner External entities, roles,
organizational unit
Similar of student
Computer screen things
Case sensitive
Small timer window Things, occurrence or
events
Countdown occurrence or events
15.00 minutes
5.00 minutes.
Expired card things
Valid card things
Card usage things
Card number things 1 Rejected
99. Page | 94
Automated Cyber Cafe System
Pin numbers things 1 Rejected
Card owner‟s name things Similar of student
Date things 1 Rejected
PC No things 1 Rejected
Starting Time things 1 Rejected
Ending Time things 1 Rejected
Using Time things 1 Rejected
Remaining Time things 1 Rejected
Card validity things 1 Rejected
Particular tasks things
Cards generating Occurrences or events Similar of card generation
Monthly Balance Sheet things 1,2,3,4,5, Accepted
Date things 1 Rejected
Cards things 1 Rejected
Unit price things 1 Rejected
Amount things 1 Rejected
Bank Deposited & date things 1 Rejected
Bank deposit amount things 1 Rejected
Deposit date things 1 Rejected
Active User External entities, roles,
organizational unit
3,4,5 Accepted
PC No Things 1 Rejected
Card number Things 1 Rejected
Cardholder Name Things Similar of student name
Starting Time Things 1 Rejected
Running Time Things 1 Rejected
Remaining Time Things 1 Rejected
Particular Card Usage Things 3,4, 5 Accepted
From a specific date Things 1 Rejected
To another specific date Things 1 Rejected
All Users History Things 3,4, 5 Accepted
Further usage Things 1 Rejected
Table 6 (a): Potential Class identification table
100. Page | 95
Automated Cyber Cafe System
6.3 Specifying Attributes
Attributes describe a class that has been selected for inclusion in the requirements model. In
essence, it is the attributes that define the class—that clarify what is meant by the class in the
context of the problem space.
We can represent the attributes of selected classes in the following manner:
Class Name Attributes
Student id + first_name + last_name + department_name
+department_roll +academic_year
+attached_hall + purches_card_number
Regular_admin id + name +email +password +phone_number
+view_card_usage
System_admin id + name +email +password +phone_number + card_generator
+blance_sheet_generator + view_card_usage
View_Card_Usage card_number +user_id +cardholder_name + PC_no +
starting_time + finishing_time + remaning_time+card_validity.
Active_Card_Usage running_time+active
Particular_card_uasge student
History from_date + to_date
Card_generator produce_date + number_of_cards
Balance_sheet_generator month+ deposite_date +deposite_amount +unit_prise
System remening_time + notification_message+total_time
Table 6(b): Specifying Attributes.
101. Page | 96
Automated Cyber Cafe System
6.4 Defining Operations
Operations define the behavior of an object. The operations or methods are given below:
Class Name Methods
Student get () +set () + accessing_into_system () + exit_from_system() +
view_card_usage ()
Regular_admin get()+set()+log_in()+log_out()+update_account()+register_student()
+update_student()+view_active_user()+view_particular_card_usage()+
view_history()
System_admin generate cards () + generate_balance_sheet () + view_balance_sheet ()
View_Card_Usage get () +set () +view_usage ()
Active_Card_Usage get () +set () +view_usage ()
Particular_card_uasge get () +set () +view_usage ()
History get () +set () +view usage ()
Card_generator get () +set () +produce_card_number () + produce_pin_number ()
Balance_sheet_generator get () +set () +prepare_balance_sheet () +show_balance_sheet ()
System get () +set () +auto_exit_from_system() +count_down ()
+show_notification ()
Table 6(c): Defining Operation.
102. Page | 97
Automated Cyber Cafe System
6.5 Class Diagram for Automated Cyber Cafe System
105. Page | 100
Automated Cyber Cafe System
6.6 Class-responsibility-collaboration card
Class name: Student
Responsibility Collaborator
Allow student accessing into the
system
Allow student view card usage
Allow student exit from the
system
System
Class name: Regular Admin
Responsibility Collaborator
Make the student registered
Updating student information
Viewing all types of card usage
Student
View_card_usage
View_active_card_usage
View_prticular_card_usage
View_history
Class name: System Admin
Responsibility Collaborator
Generating Prepaid Cards
Generating monthly balance
sheet
Making the student registered
Updating student information
Viewing all types of card usage
Student
View_card_usage
View_active_card_usage
View_prticular_card_usage
View_history
Card_generator
Balance_sheet_generator
106. Page | 101
Automated Cyber Cafe System
Class name: View Card Usage
Responsibility Collaborator
Allow admin to view card
usage
Regular_admin
System_admin
Class name: View Active Card Usage
Responsibility Collaborator
Allow admin to view active
card usage
Regular_admin
System_admin
Class name: View Particular Card Usage
Responsibility Collaborator
Allow admin to view a
particular card usage
Regular_admin
System_admin
Student
Class name: History
Responsibility Collaborator
Allow admin to view all card
usage
Regular_admin
System_admin
Class name: Card generator
Responsibility Collaborator
Generating Prepaid Cards
Numbers
Generating Pin Numbers
System_admin
107. Page | 102
Automated Cyber Cafe System
Class name: Balance Sheet Generator
Responsibility Collaborator
Preparing balance sheet
Allow admin to view balance
sheet
System_admin
Class name: System
Responsibility Collaborator
Sending notification to the user
Automatically make the user
exit from the system
Student
Fig 6(b): Class Responsibility Collaboration Card
6.7 Conclusion
We have identified all potential classes, drawn class diagram and developed CRC. Next chapter
is about dataflow model.
1. Date: 14/03/2015
Place: IIT DU
Meeting agenda: Discussion on Class based modeling.
Group Members:
Mobashir Sadat (BSSE-0507)
Md Rakib Hossain (BSSE-0516)
A.H.M. Azimul Haque (BSSE-0519)
108. Page | 103
Automated Cyber Cafe System
Chapter 7
Data Flow Model of Automated Cyber Cafe System
7.1. Introduction
Although data flow-oriented modeling is perceived as an outdated technique by some
software engineers, it continues to be one of the most widely used requirements analysis
notations in use today.
7.2. Data Flow Diagram (DFD)
A data flow diagram is a graphical representation that depicts information flow and the
transforms that are applied as data move from input to output. The DFD takes an input-
process-output view of a system. In the figures, data objects are represented by labeled
arrows and transformations are represented by circles. The DFD of our system is given
below:
Fig 7(a): data-flow diagram (level 0)
111. Page | 106
Automated Cyber Cafe System
Fig 7(e): data-flow diagram (level 4)
7.3 Conclusion
In dataflow model, we have provided an input process output view of our system. Behavioral
model is on next chapter.
112. Page | 107
Automated Cyber Cafe System
Chapter 8
Behavioral Model of Automated Cyber Cafe System
8.1. Introduction
Behavioral model describes the control structure of a dynamic system. This can be things like:
Sequence of operations
Object states and
Object interactions
The behavioral model indicates how the software responses to external events. Here, we first
identified all the events from the use case, then we drew state diagram for analysis class and we
drew sequence diagram.
8.2. Identifying Events with the Use Case
We identified the following events from the scenario:
System admin generates cards.
System admin/regular admin makes the student registered.
System admin/regular admin updates student information
System admin prepares balance sheet
System admin views balance sheet
Student views card usage
System admin/regular views active card usage
System admin/regular views particular card usage
System admin/regular views history
System automatically makes the user exit from the system.
113. Page | 108
Automated Cyber Cafe System
The table for the events identification is:
No Event Initiator Collaborator
1 Generating Cards System admin Card Generator
2 Making student registered System admin/regular admin Student
3 Updating student information System admin/regular admin Student
4 Preparing balance sheet System admin Balance sheet generator
5 Observing balance sheet System admin Balance sheet generator
6 Viewing card usage Student Viewing particular card
usage
7 Viewing active card usage System admin/regular admin Active card usage
8 Viewing particular card usage System admin/regular admin Particular card usage
9 Viewing history System admin/regular admin History
10 Making the user exit from the
system automatically
System Student
Table 8(a): Events identification table
8.3. State diagram for analysis classes
One component of a behavioral model is a state diagram that represents active states for each
class and the events that cause changes between these active states. We consider two different
characterization of state:
a) The state of each class as the system perform its function
b) The state of the system as observed from the outside as the system performs its function.
The state of the class takes on both active and passive state. State diagram for the analysis class
of our system is given below:
114. Page | 109
Automated Cyber Cafe System
Fig: State transition diagram (a): System Admin
115. Page | 110
Automated Cyber Cafe System
Fig: State transition diagram (b): Regular Admin
116. Page | 111
Automated Cyber Cafe System
Fig: State transition diagram (c): Student
117. Page | 112
Automated Cyber Cafe System
Fig: State transition diagram (d): Card Generator
118. Page | 113
Automated Cyber Cafe System
Fig: State transition diagram (e): Balance Sheet Generator
119. Page | 114
Automated Cyber Cafe System
Fig: State transition diagram (f): Particular card usage
Fig: State transition diagram (f): History
120. Page | 115
Automated Cyber Cafe System
Fig: State transition diagram (g): Active Card Usage
121. Page | 116
Automated Cyber Cafe System
8.4. Sequence diagram
Sequence diagram indicates how events cause transitions from object to object. They are given
below
Fig: Sequence diagram (a): System Admin Generates Cards
128. Page | 123
Automated Cyber Cafe System
Fig: Sequence diagram (h): Admin views card usage history
129. Page | 124
Automated Cyber Cafe System
8.5 Conclusion
In this chapter we have identified all events. Based on these events we have drawn state diagram
and sequential diagram.
1. Date 23/03/2015
Place: IIT DU
Meeting agenda: Discussion on Data based modeling.
Group Members:
Mobashir Sadat (BSSE-0507)
Md Rakib Hossain (BSSE-0516)
A.H.M Azimul Haque (BSSE-0519)
130. Page | 125
Automated Cyber Cafe System
Chapter 9
Conclusion
After a lot of hard working, at last we are able to complete the final SRS report on Automated
Cyber Cafe System Software. Here we have tried our best to identify necessary requirements
from our stakeholders and based on the requirements, we have illustrated different models with
diagrams which will help the developers, software designers and other people associated with it
to understand about the system and to do their tasks in a better way. Students as well as teachers
may use this document as academic learning resource. We hope that the readers will get benefit
from the document.
131. Page | 126
Automated Cyber Cafe System
Chapter 10
Appendix and References
10.1 Questionnaires
What are the functionalities of your old automated cyber cafe system?
Answer: The users purchase prepaid cards for using internet only for 300
minutes. The cards contains card number and pin number which are used
for logging in the computer. After finishing the 300 minutes their card
becomes invalid. Besides after passing 180 days the card considers as
invalid.
Who directly interacts with the system?
Answer: The Users use the system and the authority of DU Cyber Center
maintains the system.
Who has the administrator power over the software?
Answer: System administrator.
Is there any multiple admins or only one admin?
Answer: Yes, there is also a regular admin
How you want to serve your client as the old system or in a new way?
Answer: As the old system did, but with some supportive features.
Do you expect the same features as you are provided by the old software?
Answer: Yes, as the same features, but well secured, organized and
maintainable
Are there any major problems you face from the old software? What are the problems?
Answer: Yes, the problem is it didn‟t show the active user list.
How do you want to solve these problems?
Answer: Find an option that show us active user list.
How do you serve your clients?
Answer: Distributing this card through registration.
132. Page | 127
Automated Cyber Cafe System
Mainly who is the user of your Cyber Cafe? This system serves only DU Students or any
other People?
Answer: Only the hall registered students of University of Dhaka.
What is the information of the user you store in the ledger book when students are
registered as a client?
Answer: Registration date, student name, department name, department
roll, currently academic year, attached hall name.
What is the information that card contains?
Answer: card number and a pin number corresponding to the card
number.
After registration how they use this card to get the services?
Answer: Students use this cards number and pin number for using internet
and other computing facilities through by logging into the computer.
How do you want to generate these cards? Generate one card when one user is registered
or many cards for many users as well as for future uses?
Answer: Many cards at the same time for future uses.
If you generate many cards at one time then what is the maximum and minimum numbers
of cards you want to generate at one time?
Answer: minimum 500 and maximum 2000.
Who is responsible for generating the cards and distributing those cards?
Answer: System admin responsible for generating cards and regular
admin is responsible for distributing cards and the registration.
What types of information the card number and the pin number would be?
Answer: Card number is 10 digits long only numeric value, and pin
number is 8 characters long alpha numeric value with the constraint of
having only uppercase character.
Is the account number and the pin randomly generated or having any preferable choice or
any sequence related to the user‟s provided information?
Answer: In card number within these 10 digit first 6 digit indicates the
date and last 4 digits indicates the card serial number and a pin number is
correspondent to a card number
133. Page | 128
Automated Cyber Cafe System
In which environment (Operating system) you want to run the new software?
Answer: For user the environment would be Windows XP but in future it
will be upgraded. For the administrator the environment will be Linux.
Is there any problem if we propose a new environment for the new software?
Answer: Yes, there is a compatibility issues and lack of hardware
configuration.
Do you need a user manual book for maintaining the software?
Answer: Yes,
Do you provide a user manual book for your clients?
Answer: No, but the instructions on how to use this card is mention on the
card.
Are you in a need of some extra features that help your work?
Answer: Monthly balance sheet generating.
Who is responsible for generating this monthly balance sheet?
Answer: System admin.
What is the information the balance sheet contains?
Answer: The balance sheet contains date (from beginning to end of the
month), Cards (how many cards are distributed in each date), Unit price
(prices of each card), Amount (total amount of card unit price on each
day), Bank Deposited & date (bank deposit amount and deposit‟s date).
To generate this report system administrator has to fill up bank deposit
amount and the deposit‟s date in the balance Sheet. (On which date the
system administrator deposited at bank and the deposited amount)
If you are able to see the active user list then what is the information you want to see in
the active user list?
Answer: This contains PC No (In which computer they are using), active
user‟s Card number, Cardholder Name, Starting Time (when they started
using), Running Time (how long they are using), Remaining Time.
Can you see a particular card usage?
Answer: Yes, both the system admin and regular admin can see a
particular card usage
134. Page | 129
Automated Cyber Cafe System
What is the information particular card usage contains.
Answer: The card usage contains card numbers, pin numbers, card
owner‟s name, department name, department roll, attached hall name,
date, PC No (which computer they used), Starting Time (when they started
using), Ending Time (when they finished using), Using Time (how long
they used), Remaining Time (how much time remain to finish 300
minutes) and Card validity (For how many days the card is validate).
In case of electricity failure what are the steps taken by you?
Answer: In case of electricity failure the students are requested to turn on
the computer and enter their card number and pin number again for further
usage.