Professional Documents
Culture Documents
Course: CSE-434
Total
Contact CGPA
Photo Name ID Email Credit
No. Acquired
Passed
u1604122
Sadia Tasnuva Pritha 1604122 01788905333 121.25 3.30
@student.cuet.ac.bd
u1604103
Rahnuma Tasnim 1604103 01772035052 121.25 3.40
@student.cuet.ac.bd
1
Executive Summary
2
Contents
1 Introduction 7
1.1 Goals and Objectives of the project . . . . . . . . . . . . . . . . . . . . 7
1.2 Scope of the work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2.1 Current situation and context . . . . . . . . . . . . . . . . . . . 7
1.2.2 Competing products (available in market) . . . . . . . . . . . . 8
1.3 System overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.4 Structure of the document . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.5 Terms, Acronyms, and Abbreviations Used . . . . . . . . . . . . . . . . 8
3 Requirement Specifications 12
3.1 Stakeholders for the system . . . . . . . . . . . . . . . . . . . . . . . . 12
3.2 Use case diagram with Graphical and Textual Description . . . . . . . 12
3.3 Activity Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.4 Static model – class diagram . . . . . . . . . . . . . . . . . . . . . . . . 15
3.5 Dynamic model – sequence diagram . . . . . . . . . . . . . . . . . . . . 15
3.6 Safety and Security requirements . . . . . . . . . . . . . . . . . . . . . 17
3.6.1 Access Requirements . . . . . . . . . . . . . . . . . . . . . . . . 17
3.6.2 Integrity Requirements . . . . . . . . . . . . . . . . . . . . . . . 17
3
3.6.3 Privacy Requirements . . . . . . . . . . . . . . . . . . . . . . . 17
4 Architecture 18
4.1 Architectural model/style used . . . . . . . . . . . . . . . . . . . . . . . 18
4.1.1 Rationale for choosing your architectural model/style . . . . . . 19
4.2 Technology, software, and hardware used . . . . . . . . . . . . . . . . . 19
4
List of Figures
5
List of Tables
6
Chapter 1
Introduction
7
So, it becomes more difficult for parents to understand which rules to teach and how
to effectively teach them. Also, sensitive topics need to be taught in a kid friendly
manner. As a result, children do not learn how to keep themselves safe in dangerous
situations.
A mobile application that teaches all the important safety rules is the best option since
almost every household owns a smartphone today. And it’s easier to engage children’s
attention when lessons are shorter and taught using attractive interfaces. The scope
for mobile application can be a platform where children learn important safety rules
effectively and parents and teachers monitor the children’s progress in learning the
safety rules and ensure the children are well-equipped with the rules.
8
Chapter 2
9
Figure 2.1: Process Model
10
2.3 Risk Analysis
2.4 Constraints to project implementation
2.5 Hardware and Software Resource (Tools/Lan-
guage) Requirements
The hardware and software resources that are required to complete the proposed
methodology are specified below.
Software: Java Development Kit(JDK), Android Studio
Languages: JavaScript, Html, CSS, MySQL
11
Chapter 3
Requirement Specifications
12
attend class, complete a quiz and view his/her progress using the respective processes.
The parent and teacher can login using the child’s name and view the progress too.
13
Figure 3.2: Activity Diagram
14
Figure 3.3: Class Diagram
15
Figure 3.4: Sequence Diagram
16
3.6 Safety and Security requirements
3.6.1 Access Requirements
3.6.2 Integrity Requirements
3.6.3 Privacy Requirements
17
Chapter 4
Architecture
18
4.1.1 Rationale for choosing your architectural model/style
The user interface gathers the information provided by the user during the registration
process and stores it in the database This information is accessed to verify the user
login. Also, after each lesson completion, the results of the quiz are stored in the
database. When children, parents, and teachers want to view the progress, these results
are accessed from the database and viewed by them. So, our system is data-centered
and the data stored in the database is frequently accessed. Also, the components of
our system are independent and only interact and access data through the database.
This model also ensures data integrity and ensures scalability. So, we can add new
components to the system later on without affecting the previous components. Hence,
we used the data-centered architecture model.
19
Chapter 5
20
Acknowledgement
21
Bibliography
22