Use case modeling involves describing how users will interact with a system to achieve goals. A use case represents a dialog between a user and the system, specifying what information must pass between them without detailing the system's internal workings. Each use case should have a name that includes a verb describing the user's goal. Actors represent people or systems that interact with the system-to-be to accomplish responsibilities. Sequence diagrams visually depict the information exchanged between actors and the system in specific use case scenarios.
Chapter 9: Evaluation techniques
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
Software design is a process through which requirements are translated into a ― blueprint for constructing the software.
Initially, the blueprint shows how the software will look and what kind of data or components will be required to in making it.
The software is divided into separately named components, often called ‘MODULES’, that are used to detect problems at ease.
This follows the "DIVIDE AND CONQUER" conclusion. It's easier to solve a complex problem when you break it into manageable pieces.
Chapter 9: Evaluation techniques
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
Software design is a process through which requirements are translated into a ― blueprint for constructing the software.
Initially, the blueprint shows how the software will look and what kind of data or components will be required to in making it.
The software is divided into separately named components, often called ‘MODULES’, that are used to detect problems at ease.
This follows the "DIVIDE AND CONQUER" conclusion. It's easier to solve a complex problem when you break it into manageable pieces.
what is user support system???
This file will provide detailed overview about the user support system and how it will works in human computer interaction and why we need it .....
Chapter 11: User support
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
This lecture provide a review of requirement engineering process. The slides have been prepared after reading Ian Summerville and Roger Pressman work. This lecture is helpful to understand user, and user requirements.
what is user support system???
This file will provide detailed overview about the user support system and how it will works in human computer interaction and why we need it .....
Chapter 11: User support
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
This lecture provide a review of requirement engineering process. The slides have been prepared after reading Ian Summerville and Roger Pressman work. This lecture is helpful to understand user, and user requirements.
Information systems analysis and requirements analysis produces a requirements specification. This specification states the project goal and the related data storage, data movement
object oriented analysis and design.
requirement analysis.
what is requirement?
types of requirement.
functional requirements.
nonfunctional requirements.
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
Presented at NUS: Fuzzing and Software Security Summer School 2024
This keynote talks about the democratization of fuzzing at scale, highlighting the collaboration between open source communities, academia, and industry to advance the field of fuzzing. It delves into the history of fuzzing, the development of scalable fuzzing platforms, and the empowerment of community-driven research. The talk will further discuss recent advancements leveraging AI/ML and offer insights into the future evolution of the fuzzing landscape.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Vaccine management system project report documentation..pdfKamal Acharya
The Division of Vaccine and Immunization is facing increasing difficulty monitoring vaccines and other commodities distribution once they have been distributed from the national stores. With the introduction of new vaccines, more challenges have been anticipated with this additions posing serious threat to the already over strained vaccine supply chain system in Kenya.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
Maintaining high-quality standards in the production of TMT bars is crucial for ensuring structural integrity in construction. Addressing common defects through careful monitoring, standardized processes, and advanced technology can significantly improve the quality of TMT bars. Continuous training and adherence to quality control measures will also play a pivotal role in minimizing these defects.
Event Management System Vb Net Project Report.pdfKamal Acharya
In present era, the scopes of information technology growing with a very fast .We do not see any are untouched from this industry. The scope of information technology has become wider includes: Business and industry. Household Business, Communication, Education, Entertainment, Science, Medicine, Engineering, Distance Learning, Weather Forecasting. Carrier Searching and so on.
My project named “Event Management System” is software that store and maintained all events coordinated in college. It also helpful to print related reports. My project will help to record the events coordinated by faculties with their Name, Event subject, date & details in an efficient & effective ways.
In my system we have to make a system by which a user can record all events coordinated by a particular faculty. In our proposed system some more featured are added which differs it from the existing system such as security.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
2. What is an use case?
description of how a user will use the planned system to accomplish business goals
represents a dialog between the user and the system with the aim of helping the user achieve a
business goal
in each dialog, the user initiates actions and the system responds with reactions
specifies what information must pass the boundary (without considering what happens inside
the system)
3. Naming Convention
use cases represent recipes for user achieving goals, each use-case name must include a verb
capturing the goal achievement, for example, Withdraw cash
4. Actors and Their Goals
Actor: any entity (human, physical object, or another system) external to the system-to-be that
interacts with the system-to-be
Actors have their responsibilities and seek the system’s assistance in managing those
responsibilities
To carry out its responsibilities, an actor sets goals, which are time and context-dependent
For example, a resident leaving the apartment for work has a goal of locking the door; when
coming back, the resident’s goal is to open the door and enter the apartment
5. Actions
To achieve its goals, an actor performs some actions
An action is the triggering of an interaction with the system-to-be
8. The Customer’s Statement
The system offers house access control.
The system could be required to authenticate (“Are you who you claim to be?”) and validate
(“Are you supposed to be entering this building?”) people attempting to enter a building
Along with controlling the locks, the system may also control other household devices, such as
the lighting, air conditioning, heating, alarms, etc.
9.
10. Actors
Tenant is the home occupant
Landlord is the property owner or manager
Device is a physical device to be controlled by the system-to-be, such as lock-mechanism and
light-switch
Other potential actors: Maintenance, Police, etc.
11. How to decide an actor?
Does the system provide different service(s) to the new actor?
an actor is associated with a role rather than with a person
12. Classification of actors
Initiating actor (also called primary actor or simply user)
Participating actor (also called secondary actor)
◦ Supporting actor
◦ Offstage actor
16. Types of Requirements
Functionality
functional requirements
security: data integrity and authorized access to information
Usability: ease of use, esthetics, consistency, and documentation
Reliability: expected frequency of system failure under certain operating conditions,
recoverability, predictability, accuracy, and mean time to failure
Performance: computing speed, efficiency, resource consumption, throughput, and
response time
Supportability: testability, adaptability, maintainability, compatibility, configurability,
installability, scalability, and localizability
17. More on Requirements
All requirements must be written so that they are testable
o Bad Example: system should be “easy to use”
Prioritizing requirements: cost-value approach
1. Essential: have to be realized to make the system acceptable to the customer.
2. Desirable: highly desirable, but not mandatory requirements
3. Optional: might be realized if time and resources permit
4. Future: will not be realized in the current version of the system-to-be, but should be
recorded for consideration in future versions
18. Assignment
Consider the following nonfunctional requirements and determine which of them can be verified
and which cannot. Write acceptance tests for each requirement or explain why it is not testable.
(a) “The user interface must be user-friendly and easy to use.”
(b) “The number of mouse clicks the user needs to perform when navigating to any window
of the system’s user interface must be less than 10.”
(c) “The user interface of the new system must be simple enough so that any user can use it
with a minimum training.”
(d) “The maximum latency from the moment the user clicks a hyperlink in a web page until
the rendering of the new web page starts is 1 second over a broadband connection.”
(e) “In case of failure, the system must be easy to recover and must suffer minimum loss of
important data.”
19.
20. «extend» – optional extensions of the main case
«include» – required subtasks of the main case
«include» – required subtasks of the main case
24. Use Case Specification
REPRESENTS A USE CASE OF THE SYSTEM AS A SEQUENCE OF
INTERACTIONS BETWEEN EXTERNAL ENTITIES (ACTORS) AND THE
SYSTEM-TO-BE
25. Traceability Matrix
Priority weight (PW)
Use cases specify what information must pass the boundary of a system when a user or another system
interacts with it
33. Lab Assignment
Consider an online auction site, such as eBay.com, with selling, bidding, and buying services.
Assume that you are a buyer, you have placed a bid for an item, and you just received a
notification that the bidding process is closed and you won it. Write a single use case that
represents the subsequent process of purchasing the item with a credit card. Assume the
business model where the funds are immediately transferred to the seller’s account, without
waiting for the buyer to confirm the receipt of the goods. Also, only the seller is charged selling
fees. Start from the point where you are already logged in the system and consider only what
happens during a single sitting at the computer terminal. (Unless otherwise specified, use cases
are normally considered only for the activities that span a single sitting.) List also some
alternate scenarios.
34. Lab Assignment
Suppose that by observation you determine that the generic Buyer
and Seller roles can be further differentiated into more specialized
roles:
Occasional Buyer, Frequent Buyer, and Collector
Small Seller, Frequent Seller, and Corporate Seller
Identify the use cases for both situations: generic Buyers and
Sellers vs. differentiated Buyers and Sellers. Discuss the similarities
and differences. Draw the use case diagrams for both situations.
35. Sequence Diagrams
visual form of a usage scenario that an actor experiences while trying to obtain
a service from the system
summarize textual description of the use case scenarios
a use case may have different scenarios, the main success scenario and the
alternate ones. A sequence diagram may represent one of those scenarios in
entirety, or a subpart of a scenario.
36. Sequence Diagrams
key purpose of sequence diagrams is to represent what information must pass
the system boundary and in what sequence
a system sequence diagram can contain only a single box, named System
all other entities must be actors
at this stage of the development cycle, the system is still considered atomic
and must not be decomposed into its constituent parts.