• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Software Development

Extracts from this document...

Introduction

HASSL

Software Development

Functional specification for the CUSSMOS System

City University has asked us to create a new security system, the CUSSMOS. The current system is subject to too many material losses in the buildings, “theft”, mainly committed by intruders. You want a security systems that allows you to know who is in the building and where at any moment. It also has to be able to detect intruders. You require the system to be simple to use, provide maximum security but with causing the less inconvenience possible.

It is a complicated system to design as it has to cover every single area of the buildings at all time but it has to be discrete, not too “eye-catching”.

This system as to detect movement in the buildings and have the ability to identify the person that is moving.

...read more.

Middle

Actors

-Person entering

-CUSSCard

-CUSSENSE

-CUSSARMO

-CUSSBASE

Assumptions

-Person has to have a valid CUSSCard

Steps

-The CUSSENSE detects the CUSScard.

-CUSSENSE sends a report to the CUSSARMO

-CUSSARMO sends the information to the CUSSBASE

Use case

Monitor movement within building

Description

Detect any movement in the buildings

Actors

-Person

-CUSSENSE

-CUSSARMO

-CUSSCard (secondary)

Assumptions

The CUSSense system works properly.

Steps

-Movement is detected by the CUSSENSE which send the information to a CUSSARMO

Use case

Record exit from building

Description

Keep track of information about people leaving the buildings

Actors

-Person

-CUSSCard

-CUSSENSE

-CUSSARMO

-CUSSBASE

Assumptions

The person is holding a CUSSCard

Steps

-The CUSSENSE detects the CUSScard.

-CUSSENSE sends a report to the CUSSARMO

-CUSSARMO sends the information to the CUSSBASE

Use case

Record out of hours entry

Description

Record information about people who enter the buildings after the normal opening hours

Actors

-Person

-CUSSCard

-CUSSOOHA

-CUSSBASE

Assumptions

The person holds a valid CUSSCard

Steps

-The person swipes the card

-Information is sent to the CUSSBASE and verified for validity

-If the card is valid, the door unlocks

Use case

Record out of hours exit

Description

...read more.

Conclusion

-CUSSBASE

-CUSSTARD

-Staff

Assumptions

Smoke and Heat detectors are installed

Steps

-Heat or smoke is detected by the sensors

-A message is sent to the fire brigade through the CUSSBASE

-Security is alerted by the CUSSTARD

Use case

Respond to dropped card

Description

Detect a card that has been lost.

Actors

-CUSSCard

-CUSSENSE

-CUSSARMO

-CUSSBASE

-CUSSTARD

Assumptions

The system can detect a card or person that is not moving

Steps

-The CUSSENSE senses a card that is not moving

-Information is sent to a CUSSTARD and the CUSSBASE in order to alert security

Use case

Alert security of intruder

Description

The system can detect an person that carries a non-valid or no CUSSCard and alerts security immediately

Actors

-Person

-CUSSCard(depends)

-CUSSENSE

-CUSSARMO

-CUSSBASE

-CUSSTARD

-Security

Assumptions

The system can detect a person that holds no card

Steps

-The CUSSENSE detects an unauthorized person after checking the CUSSBASE

-Information is sent to the CUSSTARD through a CUSSARMO

-Security is alerted of the intruder’s position

Use case

Generate Reports

Description

Records information on the long term

Actors

-CUSSBASE

Assumptions

The system has sufficient memory to record various operations

Steps

-The CUSSBASE Prints a record of every movement when prompted to

                                              CUSSMOS System

Valid Cardholder

                                                                                                                                                                        Security

Invalid cardholder

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Information systems development literature review. Since the 1960s Methodologies, Frameworks, Approaches and CASE ...

    The data flow labelled Update Treatment Plan identifies whereby the branch receptionist updates the clients treatment file from the information provided within the Referral Information Result, * Process 1.5 labelled Create Invoice involves a number of happenings. Firstly this process requires information stored within D1 & D4, data flow Treatment

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    { tt=0; highest_percentage = 0; while (tt < 36) { a = 0; result_match = 0 ; match_percentage = 0 ; for ( j = 0; j < 4; j ++) { a = ((quadrant1[tt][j])) ^ ((quadrant[x][j])); result_match = ((a & 0x0008)

  1. Data Warehouse Security

    the California State Bill, any security breach that will affect customers must be reported. Organisation Security Policy An organisation's security policy is the security rules that an organisation follows. The policy affects all the system's users, and so it is defined by the management of the organisation, making it unique for each organisation.

  2. IP network design

    Care is needed when selecting the encryption mechanism, to ensure that it is not easy to crack. For example, the wired equivalent privacy (WEP) system of 802.11 standard wireless Ethernet systems has been shown to be relatively straightforward to crack.

  1. Implementation of Path Finding Techniques in Homeland Security Robots

    The potential field method has a low computational load. In contrast, the global methods need complete information about the world and hence would require relatively large computational load. 1.3 Motivation Homeland robotics has assumed a great importance in the present age.

  2. Internet &amp;amp; Intranet Security

    the bottom CA and end-users subscriber. Certificate Trust List (CTL) was a list of signed trusted Certificate Authority (CA) certificates. Certificate trust was that a certificate was part of the CTL or that the CTL contained a trusted certificate from anther CA that was part of the certificate chain. aii.)

  1. So in order to understand what the main areas where organisation should be aware ...

    long as he doesn't include a signature with his packet that alerts the intrusion detection system in other way. * Fragmentation Scanning All IP packets that carry data can be fragmented. If we need to send information using TCP and to fragment our data, normally the destination port and source

  2. The term groupware refers to software products that support groups of people engaged in ...

    will make the definitive decision. The group can spawn ideas and cleave to free discussion, but at any instance the chairman may say that, having heard the argument, he or she has decided upon a given plan. Whether this method is effective depends a great deal upon whether the chairman

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work