Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment Tasks

Part One - Use cases and Statechart

Consider a security system called a SHS. SHS consists of embedded software to drive the system hardware and to communicate with an external, home monitoring service. The hardware comprises of a keypad and LCD display for interacting with the user, a siren, an entry sensor, a motion sensor and a smoke sensor.

During installation, the keypad is used to configure the system. Each sensor is assigned a unique number, type and location. A 4-digit PIN is input into the system for arming and disarming SHS. The home address and a telephone number for dialing the home monitoring service are also input into the system at configuration.

When a sensor event is detected by the system, it turns on the siren. After a delay time that is specified by the homeowner during configuration, the system dials the specified number of the home monitoring service, and provides information about the home address, the nature and location of the sensor event. The number is re-dialed every 20 seconds until a connection is obtained.

You may make your own assumptions about the system (e.g., number and location of sensors, etc.), but they should not conflict with the above description and should be specified clearly in your answer.

1. Draw a use case diagram for the SHS. Your diagram should show all relationships between the use cases and should capture all of the information in the problem description.

2. Choose ONE of your use cases and give a detailed description of the sequence of steps in the use case. Use the template provided in the week 3 lectures for capturing the information. Be sure to include alternative and/or exceptional behaviours where appropriate.

3. Draw a Statechart diagram for SHS by using the Statechart notations introduced during the lectures. Your statechart must capture all the behaviour specified in the problem description above.

Part Two - (Architecture and Object-Oriented Design)

You have been asked to develop a system for stock information to help stock market dealers to evaluate investment scenarios. The system shall allow stock market dealers to access information about companies and to evaluate various investment scenarios using a simulation system. Each stock market dealer uses the simulation system in a different way, according to his or her experience and the type of stocks in question.

1. Suggest a client-server architecture model for the system. Justify the client-server model that you have chosen. Use a diagram to show how system functionality is partitioned in the client-server model that you have chosen.

2. You have been asked you to develop a software system to help a cargo shipping company track its customers' cargo. Every cargo has a unique tracking identifier, description, handling requirements and a delivery note. The delivery note specifies the cargo's port of origin, its final destination port and expected date of arrival at its destination (EDA). Cargo may be transported by sea or air and may travel through several transit ports before arriving at its final destination. The regulations for transporting cargo by sea and air are different. The shipping company would like the software system to maintain a movement history of the various transit ports the cargo travels through and the dates it arrives at these ports.

Identify possible objects in the system and their attributes and operations. Show how the objects are related, including their multiplicity.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92103118

Have any Question?


Related Questions in Computer Engineering

A researcher knows that the average distance commuting

A researcher knows that the average distance commuting students live from campus was previously 8.2 miles. Because of the rising prices of gasoline, the research wants to test the claim that commuting students now live c ...

The business model for jpmorgan chase was change in 2008

The business model for JPMorgan Chase was change in 2008. Could the upside of the strategy have been achieved without exposing JPMorgan Chase the bank?

A large furniture retailer wants to conduct a customer

A large furniture retailer wants to conduct a customer satisfaction survey. Customers are divided into groups based on the amount of money they have spent at the retailer's stores in the past year: less than $2000, from ...

In sql developerd1 create the following three user-defined

IN SQL DEVELOPER D1. Create the following three user-defined roles that are shown in the table below and assign them the specified permissions for the OE.CUSTOMERS table. Role Select Insert Update Delete account_managers ...

Restaurant management database project the restaurant

Restaurant Management Database Project : The restaurant maintains the catalog for the list of food and beverage items that it provides. Apart from providing food facility at their own premises, the restaurant takes order ...

String c is considered to be an interleaving of strings a

String C is considered to be an interleaving of strings A and B if it contains all (and only) the characters of both A and of B and their respective order is preserved in C. For example, C = aacabbaa is an interleaving o ...

Any help will be appreciatedscenarionbspyou are a

Any help will be appreciated Scenario: You are a networking and communications consultant working for HoustonComm Services, Inc, further referred to as HCS. HCS is a company providing technology consulting services to st ...

Would be being proposed transfer scheme answer the problems

Would be being proposed transfer scheme answer the problem/s seen in the implementation of the TRAIN law? Explain why or why not in light of the ongoing 4Ps etc. What are some other tax reform in Collas-Monsod's wish lis ...

Stack discussion forum 42 days ago discuss the stack data

Stack Discussion Forum 42 days ago Discuss the stack data structure. What are its unique structural and behavioral concepts? What are its most frequently used methods? What implementations are provided? What practical ap ...

Discussion a network-based intrusionimagine you live by

Discussion : A Network-Based Intrusion Imagine you live by yourself on a quiet street. Each day, you leave your house in the morning and drive to work. One day while you are at work, someone breaks into your house by kic ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As