StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk analysis and system requirements - Essay Example

Cite this document
Summary
The overall goal of the project entails the design and development of an app for a smartphone/PDA. The application should allow the user to remotely control domestic services and/or appliances around the house…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.9% of users find it useful
Risk analysis and system requirements
Read Text Preview

Extract of sample "Risk analysis and system requirements"

 Risk analysis and system requirements Overview The overall goal of the project entails the design and development of an app for a smart phone/PDA. The application should allow the user to remotely control domestic services and/or appliances around the house. In this regard, my project precisely aims at coming up with an app for a PDA for controlling the actions of refrigerators/freezers while in the house or even miles away from the house; through a portable lightweight interface. Life has been made easier and enjoyable through technological inventions (Sommerville 2006). Most of the refrigerators are controlled manually, and they require the user to be next to them. However, this project strives to come up with an app for a PDA that will enhance the operation of refrigerators by their users. The PDA app to be developed will make it easier and convenient for individuals to use refrigerators and get the most out of them. The app will be used to regulate temperature in the fridge digitally. Temperature is an important parameter that in part determines the performance of refrigerators. Since the main purpose of the fridge is to preserve foodstuff, this app should provide foodstuff type tailored temperature regulation. The user will be able to manipulate the temperature of the fridge by being in a position to set a specific period when the fridge is going to remain cold or warm. This will allow the user to achieve tailored result depending on the food stuff to be preserved. This device will also be used to open and close the refrigerator doors digitally. Although most refrigerators have a circuit breaker to regulate turning on and off, this device will also have the capability of turning the freezer on and off so that the user can regulate it according to his/her needs. This app will also be able to analyze the performance of the refrigerator and give a summary on activities like; number of times the door was opened in a given timescale, amount of power it has consumed, the time it had the last circuit break and when its going to have the next, offer warnings incase the user is at risk like a warning when handling food/fridge compartments with wet hands, and offer notices when some parts are faulty i.e. doors, temperature components, electrical circulation, humidity. In this case, the device will be portable so that the user can still get these analyses even when out of the house through Wi-Fi technology. The device will be helpful to the old and the disabled. The app will allow for convenient refrigeration control. The device will rely on wireless technology. The device will be light, portable and ergonomic with simple navigation. It will rely on low power requirements (either batteries or electric current). System Requirements User Interfaces The app will be installed on Wi-Fi enabled PDAs allowing the user to manipulate the refrigerator from any Wi-Fi hotspot. Users will use either virtual keyboards or touch screen technology on their PDAs to manipulate their freezers. The PDA should provide the app link on the screen so that a single touch opens up the app’s page where the user can operate the appliance. The page should offer options to the user on how to proceed. User can therefore be able to input commands and check analyses. Hardware Interfaces The app will be installed on PDAs with Palm Operating System, Software Interfaces The PDA should run on any platform with a Java 6 compatible Runtime Environment. This Includes Palm Operating System, Windows, Mac OS, Linux and Sun Solaris. Communication Interfaces The PDA should have Bluetooth to enhance exchange of data and Wi-Fi Connectivity. In this regard, users will be able to connect to the internet when in Wi-Fi Hotspots and operate their Wi-Fi enabled appliances. Functional Requirements The functionality of the app will depend on a number or factors. First, the PDA will need to be Wi-Fi enabled so that it can connect to the internet in Wi-Fi hotspots. Secondly, the refrigerators will also need to be integrated with simulators to receive the commands from the PDA. In this case, the appliance will be Wi-Fi enabled. The commands from the app on a PDA will be transmitted through the web and received by the simulator on the appliance allowing for the execution of the command. This will require installation of digital thermostats that use relay or semiconductor device (triac) to act as a switch control for the HVACR units. The digital thermostat shall also have in built PID controller so that the thermostat can foresee how the system will react to its commands. Performance Requirements Continued performance of the app will rely on user environment. The user will be required to be in Wi-Fi hotspot with good internet connectivity speed. On the other hand, the appliance will need to be in a Wi-Fi hotspot with a reliable power source. The user will be required log in using user authorization password (with 8+ characters) in order to secure the usage of the app. Only users with authorization passwords will be able to access the user panel of the app on PDAs. Design Constraints Designing and developing real time software today proves to be a sophisticated juggling act (Chandrta 2004). Today’s systems employ more functionality than ever; elaborate GUIs, network connectivity and inter-processor communication. At the same time, the time constraint has to be met. Cost of production will also be a strong challenge because the project calls for great investment from key players. Others will include interface/protocol requirements, standards compliance, network communications, end user environment, availability of resources and interoperability requirements (Appleton 2004). Risk Analysis Since the app will depend on wireless connectivity, some risks inherent in wireless connectivity could be eminent. Wireless technology uses WAP/Bluetooth protocols for communication (Wiergers 2003). Each of this protocol has built in security to block break in by hackers. This could be problematic for apps that require user identification. In this regard, access control flows may arise allowing un-authorized access. This issue arises when we have unclear access policy and improper app design (inadequate input validation). Such risks can be avoided through accurate input validation and clear definition of the access policy (Ankolekar 2003). Buffer overflows could also arise causing the app to lose control of its execution. Again, input validation will be vital in handling this risk. Project Plan The project requires cooperation from three key players; a refrigerator manufacturer, Wi-Fi Service provider and me. The app will require windows 5 PDA (palm OS) and Web platforms. The IDE includes Sencha touch/www.sencha.com/products/touch (HTML 5 based mobile app development framework) and JavaScript language. The table below shows project activities and their relative time estimates. Estimated time (TE) = (O+4M+P)/6. Optimistic time=O, Pessimistic Time=P, Normal Time=M (Stellman & Green 2005) Time Estimates (in Months). ID Activity Predecessor Opt.(O) Normal(M) Pess.(P) Expected time (TE) 1 a. Project documentation (start) - 0.5 1 1.5 1 2 b. Identification of potential partners 1 1 2 3 2 3 c. Project analysis by partners 1 & 2 1 2 3 2 4 d. The Design process 3 3 4 5 4 5 e. 1st Testing 4 0.5 1 1.5 1 6 f. Corrections/Improvements 5 1 2 3 2 7 d. 2nd Testing 6 0.5 1 1.5 1 8 h. Launch (Finish) 7 7.5 13 18.5 13 The following is a representation of the activities on a Gantt chart and a Network Diagram. Gantt chart 1st Dec. 11’- 1st Jan. 12’-a 5th Jan.-5th March 12’-b 10th March-10th May 12’-c 15th May-15th Aug. 12’-d 20th Aug.-20th Sept. 12’-e 1st Oct.-Nov. 30th. 12’-f 1st -30th Dec. 12’-g 1st Jan. 13’-h The yellow bars represent the start and end of the project. The brown bars represent various activities and their predecessors. Activity b can only start when activity a is completed. Activity c relies on the completion of both activities a and b. Consequently, the previous activity forms the predecessor of the next activity. Currently, the project is at activity a. Network Diagram Identification of Potential Partners-b The Design Process-d Start-Plan/project Documentation-a 2nd Testing-g Project Analysis by Partners-c References Appleton, Brad 2004, A Software Design Specification Template. Retrieved on Dec. 20th, 2011 from http://www.bradapp.net Ankolekar, VL 2003, Application Development and Technology Tools: Vulnerabilities and Threat Management with Secure Programming Practices, a Defense in–depth approach. Bethesda, Maryland: SANS Institute Press. Chandrta, C 2004, Design Constraints of Real Time Applications. Retrieved on Dec. 20th 2011 from http://www.codeproject.com/KB/architecture/Real_Time_Applications.aspx Sommerville, Ian 2006, Software Engineering. Boston, Massachusetts: Addison-Wesley. Stellman, A and Green, F 2005, Applied Software Project Management. Cambridge, MA: O’Reilly Media. Wiergers, KE 2003, Software Requirements. Redmond: Microsoft Press. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Risk analysis and system requirements Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
Retrieved from https://studentshare.org/management/1394056-project-plan
(Risk Analysis and System Requirements Essay Example | Topics and Well Written Essays - 750 Words)
https://studentshare.org/management/1394056-project-plan.
“Risk Analysis and System Requirements Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/management/1394056-project-plan.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk analysis and system requirements

System Architecture & Design

This research paper describes the system architecture and design process, that identifies the specific design and architecture.... The researcher of this paper states that the system design needs to improve the hard drives to increase their performance speed.... system architecture is the specific model of a concept that describes the structure and the behavior of a given system.... The design of the hard disk drive, that is created in the research paper acts as a system solution provider for the users....
7 Pages (1750 words) Research Paper

Development and Relevance of System Development Life Cycles

As the prototype or demo system is further defined, feedback is elicited from users (Harbison, 1997) Thus, the domain models, reference requirements, and reference architecture are continually validated.... The prototype or demonstration system development process provides further validation of these requirements and models, and identifies needed refinements.... imitation:The whole project depends upon the "core product", and if in any case it is halted or bugged the whole system comes down....
9 Pages (2250 words) Essay

Safety Analysis for System Development

viating from the system requirements or becoming vulnerable to hackers & unauthorized modifications in production environment if improper controls are practiced in the development environment.... Automation of system processes has put a lot of demand on the underlying IT systems and software applications to the extent that there can be major hazards and accidents if there is an outage of one or more IT components that are responsible to control the critical states of the overall process flow....
18 Pages (4500 words) Essay

The Concept of Financial Regulation and Its Scope

However, the primary theme of international financial regulation was based on establishing minimum capital requirements.... The 1975 Basel Concordat formally established and distributed responsibilities for supervising international banks following which the Basel Capital Adequacy Accord was established in 1988 (Basel 1) defining minimum capital requirements for international banks.... Much of the blame is attributed to an international banking regulatory system that was primarily ad hoc in nature that simply responded to each crisis....
13 Pages (3250 words) Assignment

Business Domain & Requirements Analysis

This case study "Business Domain & requirements Analysis" discusses the IT services industry as a system integration exercise, and it is expected that the proposed environmental data capture and collation system will be implemented along these lines.... This Report is viewed as an initial stage in the definition of the requirements in terms of systems, processes, and software requirements for the new integrated environmental data gathering system, so no detailed cost-benefit analyses have been provided....
25 Pages (6250 words) Case Study

Requirements Analysis and Design in Software Development

This essay "Requirements analysis and Design in Software Development" presents a detailed analysis of the two most important stages of a traditional software development life cycle, these stages are: requirements analysis and software design.... Requirements analysis and software design processes of different software development methods will be also be discussed in this paper.... Basically, the objective of software engineering is to provide software engineers with a wide variety of guidelines, processes, techniques, and principles through which they can develop dependable, affordable, and efficient systems at the same time as satisfying all the requirements specified by the customers for those systems....
20 Pages (5000 words) Essay

Risk Assessment

hellip; The management of Hewlett-Packard undertook this risk assessment to meet the requirement of risk management ISO 27005 in order to perform an extensive assessment of the system.... nbsp;James Williams, Hewlett Packard systems administrator who provided information on how secure the system was for use online.... nbsp;Mike Johnson, Hewlett Packard computer security officer, gave information on the security system through doing reports and filling questionnaires....
30 Pages (7500 words) Essay

Importance of Requirement Engineering in Software Engineering

These are functional, non-functional, user and system requirement.... Then it explains, what are the requirements, why we need requirements for a project.... hellip; The field of requirements Engineering (RE) is comparatively novel requirements engineering relates to the progress of all software-intensive systems, but not in actual fact to the progress of all software.... So we can say that it analyze our collected requirements to ensure if they are feasible....
21 Pages (5250 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us