Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Software Engineering Expert

Company Universal Consulting is a large consulting firm that specializes in IT consulting services for the Healthcare industry. The company employs over 2,000 dedicated IT professionals who design, develop, and implement tailored IT salutations for their clients. In order to instill the sense of community into its employees and to improve employee collaboration and innovativeness, Universal Consulting is planning to develop an Event Management Information System (EMIS) through which employees could further improve/expand their skills/knowledge useful for their own professions, collaborate on new ideas and initiatives, and socially connect with other members of the company and clients. The detailed requirements for EMIS are described in the following.

Events are classified into three categories-learning events, social events, and collaboration events. Learning events are for job-related trainings and seminars, social events are for social networking among employees and potential/existing clients, and collaboration events are for internal collaboration on the new idea/product development. Every year, an employee must attend at least one learning event, one social event, and one collaboration event.

An event manager creates and manages all events. The manager uses the EMIS to create an event and detail the event information including objectives, time, date, location, capacity, brief description, instructor/facilitator information. Once an event is created, the event manager invites senior managers to view, comment, and approve/reject the new event. The event manager may need to revise event details based on suggestions from the senior managers. Once an event is finally approved, the event manager publishes the event so that the event is available for public view and a notification of the event is sent out via email to all employees.

Upon receiving the notification, employees could log into the event management information system to review the event details, and register themselves to the event. Employees could also cancel the registered events, but they must provide reasons for the cancellation. Once registered, all participants will receive a reminder three days before the event. Participant could not cancel an event after the event reminder.

If it is considered necessary to involve existing/potential clients in some events, the event notification will be sent to the clients as well. In that case, the clients need to register themselves first, and create their own login ID and password to be able to register themselves to the events.

For any event to take place, a minimum of ten people is required. Therefore, the event manager could cancel an event if it attracts insufficient interests or an emergent situation happens. During the event, the event manager will keep track of event attendance, and record each participant's attendance on EMIS. Once an event is completed, the event manager will send out an online survey (created using EMIS) to the participants to gather their opinions and suggestions, which will be used for evaluating the event and for developing future events. The completed events will be archived and taken out from the EMIS web site.

In the year end, each department manager could access the EMIS to generate reports on his or her subordinate's event registration, cancelation, and attendance. The information will be used for each employee's annual assessment.

Content Requirements

Your individual project is developed based on the case description on project management system. In the individual project, you are required to compile all individual assignments together using Visio. Copy all Visio diagrams to the MS Word, arrange these diagrams in the following order.

Detailed Content of individual project

Requirement analysis and modeling

Event Table
Identify all events in the case and create an event table, and also build a noun table

Class Diagram
Draw a domain class diagram for the PMS system based on the noun table you have developed

Use Case Diagram
Draw a use case diagram for the system

Use Case
Write a detailed use case description for each use case of the system.

Activity Diagrams
Build activity diagrams for each use case description

System Sequence Diagram
Draw a sequence diagram for each use case.

Statechart Diagram
Draw a state chart diagram for any objects with dynamic behaviors in the system

  1. First, name each state chart diagram based on the name of the class for which the diagram is developed.
  2. Second, make sure that the states in the state chart diagram are the states of the class.
  3. Third, the class(es) should be in your class diagram.
  4. Fourth, when you have a composite state, Visio automatically opens another window allowing you to specify transitions of states within the state. Include both in your diagrams

Design Specifications

Detailed class diagram
Build a design class diagram based on the class diagram you have developed.

Note the following important things....

  1. First, you need to indicate navigation visibility in the design class diagram.
  2. Second, you need to include attributes and methods for each class, and specify attribute and method visibility.
  3. Third, no more multiplicities in the design class diagram.
  4. Forth, you could add handlers to your diagram as well as method(s) for each handler.

Detailed system sequence diagrams

Draw a detailed sequence diagram for each use case, based on the system sequence diagrams you developed and the design class diagram.

Software Engineering, Computer Science

  • Category:- Software Engineering
  • Reference No.:- M9523939

Have any Question?


Related Questions in Software Engineering

Proposaldesign of an efficient gps tracking system tag for

Proposal Design of an efficient GPS Tracking System (tag) for monitoring small species IMPLEMENTING EMBEDDED SYSTEMS USING SYSML Task Using PapyrusSysML Software (Downloadable online - Evaluation Copy- Latest Version) Mo ...

Address the following integrating biblical perspectives

Address the following, integrating biblical perspectives where appropriate: Define a hate crime and describe how white supremacist groups use the Internet to spread their message of hate. Explain why hate crime legislati ...

Research projectin the course we have covered various

RESEARCH PROJECT In the course, we have covered various security and privacy issues that arise in the cyberspace field. We have learned to identify these risks and have discussed the current approaches and developments f ...

Assignment lab - statement of workclient liberty vacation

Assignment Lab - Statement of Work Client: Liberty Vacation Planning Inc. (LVP) Project: Website Assessment 1. Project Objectives With this statement of work, LVP is engaging you to conduct a website assessment to determ ...

In this assignment you will answer the following review

In this assignment, you will answer the following review questions from the reading materials of the module/week. 1. "What are the key components of a typical P2P application? Describe their functions." 2. "What are the ...

Reply to this article with apa referencehate crimes

Reply to this article with APA reference. Hate crimes According to Merriam-Webster, hate crime is any of various crimes (such as assault or defacement of property) when motivated by hostility to the victim as a member of ...

Instructionsprivacy-preserving data miningdata mining

INSTRUCTIONS PRIVACY-PRESERVING DATA MINING Data mining technology can be exploited to reveal sensitive information from the original data. Thus it is important to preservethe privacy of the parties that the data refer t ...

Instructions - onion routingin this assignment you will

INSTRUCTIONS - ONION ROUTING In this assignment, you will answer the following questions related to Onion Routing and Tor. 1. Describe the infrastructure of Onion Routing and explain how it works for providing anonymity ...

In this assignment you will answer the following questions

In this assignment, you will answer the following questions related to Android platform and Android security design. 1. Describe Android architecture in detail by explaining the four conceptual layers. 2. Describe Androi ...

The research paper for this course is about some of the

The research paper for this course is about some of the best sources of digital evidence for child abuse and exploitation, domestic violence, and gambling according to the National Institute of Justice. Research commerci ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As